text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
sector, where service providers usually enjoy a monopoly, the usage gap is probably the most important factor in activity development. However, persuading more consumers to take up family benefits, for example, is probably more important to the relevant government department than opening more local offices. Usage gap is most important for brand leaders. If a company has a significant share of the whole market, they may find it worthwhile to invest in making the market bigger. This option is not generally open to minor players, though they may still profit by targeting specific offerings as market extensions. All other gaps relate to the difference between existing sales (market share) and total sales of the market as a whole. The difference is the competitor share. These gaps therefore, relate to competitive activity. === Product gap === The product gap—also called the segment or positioning gap—is that part of the market a particular organization is excluded from because of product or service characteristics. This may be because the market is segmented and the organization does not have offerings in some segments, or because the organization positions its offerings in a way that effectively excludes certain potential consumers—because competitive offerings are much better placed for these consumers. This segmentation may result from deliberate policy. Segmentation and positioning are powerful marketing techniques, but the trade-off—against better focus—is that market segments may effectively be put beyond reach. On the other hand, product gap can occur by default; the organization has thought out its positioning, its offerings drifted to a particular market segment. The product gap may be the main element of the planning gap where an organization can have productive input; hence the emphasis on the importance of correct positioning. == Used to develop a better process == A gap analysis can also be used
|
{"page_id": 2835766, "title": "Gap analysis"}
|
premiered on September 21, 2017. On May 13, 2018, Fox renewed the series for a fifth and final season originally consisting of 10 episodes then later increased to 12. The season began production in July that year, and premiered on January 3, 2019. Although the series is set in Gotham, various names and character designs from the Batman franchise were ultimately not allowed to be used in order to reserve them for the DCEU, combined with concerns from Warner Bros. about the television series potentially diluting the brand. This was later clarified by Cameron Monaghan, who stated that "higher-ups" did not allow his character to use the name Joker and the usage of his traditional green-hair look. Fox Entertainment President David Madden said that the show's production team "have masterfully honored the mythology of Gotham and brought it to life with depth, emotion, and memorable high drama." === Casting === In January 2014, rumors arose that Donal Logue would portray Gordon in the series. Logue denied these rumors via Twitter. Logue was eventually cast as Harvey Bullock. In February 2014, Ben McKenzie was cast as James Gordon. McKenzie had shot a previous pilot with Heller for CBS, which led to Heller writing his characterization of Gordon with McKenzie in mind. Casting Bruce Wayne was challenging in part because, as Heller put it "It's such an important casting and it would've been very dangerous to cast the wrong person" adding that the casting process for Wayne "took a lot of negotiation, a lot of back and forth so that everyone was happy and comfortable." In early March 2014, David Mazouz was cast as Bruce Wayne while Camren Bicondova was cast as Selina Kyle. At the 2014 Chicago Comic & Entertainment Expo, DC's Jim Cunningham said that Renee Montoya would be a
|
{"page_id": 40624310, "title": "Gotham (TV series)"}
|
and deleterious materials that would impair bonding of the grout or interfere with grouting procedures. Compressed air used for cleaning must be clean, dry, and free from oil or contaminants. Prevent the leakage of grout through the anchorage assembly by positive mechanical means. Before starting daily grouting activities, drain the pump system to remove any water from the piping system. Break down and thoroughly clean the pump and piping system after each grouting session. After completing duct grouting activities: 1. Abrasive blast clean and expose the aggregate of concrete surfaces where concrete is to be placed to cover and encase the anchorage assemblies 2. Remove the ends of vents 1 inch below the roadway surface 50-1.03B(2)(d)(ii) Grouting Equipment Grouting equipment must be: 1. Capable of grouting at a pressure of at least 100 psi 2. Equipped with a pressure gauge having a full-scale reading of not more than 300 psi 3. Able to continuously grout the longest tendon on the project in less than 20 minutes Grout must pass through a screen with clear openings of 1/16 inch or less before entering the pump. Fit grout injection pipes, ejection pipes, and vents with positive mechanical shutoff valves capable of withstanding the pumping pressures. If authorized, you may substitute mechanical valves with suitable alternatives after demonstrating their effectiveness. Provide a standby grout mixer and pump. 50-1.03B(2)(d)(iii) Mixing and Proportioning Proportion solids by weight to an accuracy of 2 percent. Proportion liquids by weight or volume to an accuracy of 1 percent. Mix the grout as follows: 1. Add water to the mixer followed by the other ingredients. 2. Mix the grout with mechanical mixing equipment that produces a uniform and thoroughly mixed grout without an excessive temperature increase or loss of properties of the mixture. 3. Do not exceed 5 gal
|
{"source": 1498, "title": "from dpo"}
|
CAROLYN** (1974) MICROWAVE COOKING OF FROZEN PORK USING PLASTIC FILM. THE RELATIONSHIP BETWEEN AN ENCOUNTER-GROUP EXPERIENCE, SELF-PERCEPTION AND STUDENT-TEACHING BEHAVIOR IN A PROGRAM FOR SECONDARY EDUCATION STUDENT-TEACHERS. THE IN VIVO METABOLISM OF HYDROGEN-3-MOLTING HORMONES DURING DEVELOPMENT OF CHIRONOMUS TENTANS AND CALLIPHORA ERYTHROCEPHALA. EFFECT OF A LONG TERM PHYSICAL FITNESS PROGRAM ON SELECTED PHYSIOLOGICAL AND BIOCHEMICAL VARIABLES AND THEIR PERSONALITY CORRELATES IN ADULT MEN. AN EXPERIMENTAL INVESTIGATION OF THE EFFECTS OF POSITIVE AND NEGATIVE REINFORCEMENT ON STUDENTS WITH DIFFERENT LEVELS OF SELF-CONFIDENCE AS A COMMUNICATOR. BIOCHEMICAL AND CYTOCHEMICAL DISTRIBUTION OF ADENYLATE-CYCLASE AMONG ANIMAL AND PLANT MEMBRANES. [Automata and the monadic theory of ordinals [less than] omega(2) or = omega(2)]( **ZAKEM, STEVEN BERNARD** (1974) A PHYSICAL AND MATHEMATICAL MODEL FOR THE FLOW OF SUSPENSIONS. INFRARED AND VISIBLE PHOTON UPCONVERSION IN PRASEODYMIUM(III) DOPED LANTHANUM-FLUORIDE AND LANTHANUM-CHLORIDE(NEODYMIUM(III)). APPLICATION OF COMPUTER CONTROLLED MONITORING AND DATA REDUCTION TO POTENTIOMETRY AND VOLTAMMETRY. SEMANTIC DECOMPOSITION OF COMPUTER PROGRAMS: A PROGRAM TEST AID. THE INTERNAL STRUCTURE OF ALGORITHMS. Dissertations & Theses from 1973 -------------------------------- **ABO-KHATWA, AHMED NABIL** (1973) THE EFFECT OF FORMAMIDINE DERIVATIVES AND OTHER PESTICIDES ON MITOCHONDRIAL FUNCTION. SAGT: A NEW CODING SYSTEM AND THE SYSTEMATIC ANALYSIS OF METAL CUTTING OPERATIONS ECONOMIC AND NON-ECONOMIC BARRIERS TO THE USE OF NEEDED MEDICAL SERVICES. COMPUTATIONAL SOLUTION OF GLOBAL NONLINEAR LEAST-SQUARES PROBLEMS. CELL WALL ENZYMES AND SENESCENCE IN STRAWBERRY FRUITS [THE PHYSIOLOGICAL IMPORTANCE OF THE NUCLEAR-RECEPTOR.ESTROGEN COMPLEX IN ESTROGEN-SENSITIVE TISSUES OF THE RAT]( **ANDERSON,
|
{"source": 3879, "title": "from dpo"}
|
Social Development Plan Plan national de développement sanitaire et social [This was then replaced by the National Health Development Plan (PNDS).] (Senegal) PNDS National Health Development Plan Plan national de développement sanitaire (Benin, Côte d'Ivoire, Senegal) PNE peaceful nuclear explosion PNE Treaty Treaty between the United States of America and This Glossary has not been updated since 2015-03-24. ## Please check IAEAterm ( or email the Terminology and Reference – Contact Point (TaRCP@iaea.org) for up-to-date information. - 322 -the Union of Soviet Socialist Republics on Underground Nuclear Explosions for Peaceful Purposes PNEDD National Environment Programme for Sustainable Development Plan national de l'environnement pour un développement durable (Niger) PNGRR National Radioactive Waste Management Programme Programa Nacional de Gestión de Residuos Radiactivos (Argentina) PNLLUB National Programme for the Fight Against Leprosy and Buruli Ulcer Programme national de lutte contre la lèpre et l'ulcère de Buruli (Benin) PNLMT National Programme for the Fight Against Communicable Diseases Programme national de lutte contre les maladies transmissibles (Benin) PNLMNT National Programme for the Fight Against Non-Communicable Diseases Programme national de lutte contre les maladies non transmissibles PNLP National Programme for the Fight Against Malaria Programme national de lutte contre le paludisme (Benin) PNLS National Programme for the Fight Against AIDS Programme national de lutte contre le SIDA (Benin, Democratic Republic of the Congo) PNNC National Community Nutrition Programme Programme national de nutrition communautaire (Madagascar) PNNL Pacific Northwest National Laboratory (USA) PNOC Philippine National Oil Company PNPI Petersburg Nuclear Physics Institute (Russian Federation) PNPMT National Programme for Pharmacopoeia and Traditional Medicine Programme national de la pharmacopée et de la médecine traditionnelles (Benin) PNPP Philippine nuclear power plant PNRA Pakistan Nuclear Regulatory Authority PNRB Pakistan Nuclear Regulatory Board [This was replaced by the Pakistan Nuclear Regulatory Authority (PNRA) in 2001.] PNRI Philippine Nuclear Research Institute PNS Partnership for
|
{"source": 5831, "title": "from dpo"}
|
has not recommended any changes in consumer behavior. Consumer Reports recommended: That the EPA and FDA eliminate arsenic-containing fertilizer, drugs, and pesticides in food production; That the FDA establish a legal limit for food; That industry change production practices to lower arsenic levels, especially in food for children; and That consumers test home water supplies, eat a varied diet, and cook rice with excess water, then draining it off (reducing inorganic arsenic by about one third along with a slight reduction in vitamin content). Evidence-based public health advocates also recommend that, given the lack of regulation or labeling for arsenic in the U.S., children should eat no more than 1.5 servings per week of rice and should not drink rice milk as part of their daily diet before age 5. They also offer recommendations for adults and infants on how to limit arsenic exposure from rice, drinking water, and fruit juice. A 2014 World Health Organization advisory conference was scheduled to consider limits of 200–300 ppb for rice. ==== Reducing arsenic content in rice ==== In 2020, scientists assessed multiple preparation procedures of rice for their capacity to reduce arsenic content and preserve nutrients, recommending a procedure involving parboiling and water-absorption. === Occupational exposure limits === === Ecotoxicity === Arsenic is bioaccumulative in many organisms, marine species in particular, but it does not appear to biomagnify significantly in food webs. In polluted areas, plant growth may be affected by root uptake of arsenate, which is a phosphate analog and therefore readily transported in plant tissues and cells. In polluted areas, uptake of the more toxic arsenite ion (found more particularly in reducing conditions) is likely in poorly-drained soils. === Toxicity in animals === === Biological mechanism === Arsenic's toxicity comes from the affinity of arsenic(III) oxides for thiols. Thiols, in
|
{"page_id": 897, "title": "Arsenic"}
|
A word n-gram language model is a purely statistical model of language. It has been superseded by recurrent neural network–based models, which have been superseded by large language models. It is based on an assumption that the probability of the next word in a sequence depends only on a fixed size window of previous words. If only one previous word is considered, it is called a bigram model; if two words, a trigram model; if n − 1 words, an n-gram model. Special tokens are introduced to denote the start and end of a sentence ⟨ s ⟩ {\displaystyle \langle s\rangle } and ⟨ / s ⟩ {\displaystyle \langle /s\rangle } . To prevent a zero probability being assigned to unseen words, each word's probability is slightly lower than its frequency count in a corpus. To calculate it, various methods were used, from simple "add-one" smoothing (assign a count of 1 to unseen n-grams, as an uninformative prior) to more sophisticated models, such as Good–Turing discounting or back-off models. == Unigram model == A special case, where n = 1, is called a unigram model. Probability of each word in a sequence is independent from probabilities of other word in the sequence. Each word's probability in the sequence is equal to the word's probability in an entire document. P uni ( t 1 t 2 t 3 ) = P ( t 1 ) P ( t 2 ) P ( t 3 ) . {\displaystyle P_{\text{uni}}(t_{1}t_{2}t_{3})=P(t_{1})P(t_{2})P(t_{3}).} The model consists of units, each treated as one-state finite automata. Words with their probabilities in a document can be illustrated as follows. Total mass of word probabilities distributed across the document's vocabulary, is 1. ∑ word in doc P ( word ) = 1 {\displaystyle \sum _{\text{word in doc}}P({\text{word}})=1} The probability generated
|
{"page_id": 70541543, "title": "Word n-gram language model"}
|
(Component E-H, Implix BF, Progro H, Synovex H) Ethinylestradiol/methyltestosterone (Taril) == Estrogens and progestogens == === Oral === ==== Marketed ==== In birth control pills: Drospirenone/estetrol (Nextstellis, Drovelis, Lydisilka) Estradiol/nomegestrol acetate (Naemis, Zoely) Estradiol valerate/cyproterone acetate (Femilar) Estradiol valerate/dienogest (Natazia, Qlaira) Ethinylestradiol/chlormadinone acetate (Belara) Ethinylestradiol/cyproterone acetate (Diane, Diane-35) Ethinylestradiol/desogestrel (Alenvona, Apri, Azurette, Bekyree, Bimizza, Caziant, Cesia, Cimizt, Cyclessa, Cyred, Denise, Desogen, Desirett, Emoquette, Enskyce, Gedarel, Gracial, Isibloom, Juleber, Kalliga, Kariva, Kimidess, Laurina, Linessa, Marvelon, Mercilon, Mircette, Mirvala, Novynette, Ortho-Cept, Pimtrea, Reclipsen, Regulon, Simliya, Solia, Velivet, Viorele, Volnea) Ethinylestradiol/dienogest (Valette) Ethinylestradiol/dimethisterone (Oracon) Ethinylestradiol/drospirenone (Yasmin, Yasminelle, Yaz) Ethinylestradiol/drospirenone/levomefolic acid (Beyaz, Safyral) Ethinylestradiol/etynodiol diacetate (Demulen) Ethinylestradiol/gestodene (Femodene, Femodette, Gynera, Harmonet, Meliane, Minesse, Minulet) Ethinylestradiol/levonorgestrel (Amethyst, Aviane, Balcoltra, Falmina, Levlen, Lillow, Orsythia, Vienva) Ethinylestradiol/levonorgestrel/bisglycinate Ethinylestradiol/levonorgestrel/ferrous fumarate Ethinylestradiol/lynestrenol (Lyndiol) Ethinylestradiol/medroxyprogesterone acetate (Gianda, Provest) Ethinylestradiol/megestrol acetate (Nuvacon, Volidan) Ethinylestradiol/norethisterone (Brevicon, Norinyl 1+35, Ortho-Novum 7/7/7, Taytulla, Tri-Norinyl, Zenchent) Ethinylestradiol/norethisterone/ferrous fumarate (Blisovi 24 FE, Estrostep Fe, Femcon FE, Kaitlib FE, Lo Minastrin Fe, Loestrin 24 Fe, Microgestin 24 FE) Ethinylestradiol/norethisterone acetate (FemHRT) Ethinylestradiol/norethisterone acetate/ferrous fumarate Ethinylestradiol/norgestimate (Ortho Tri-Cyclen, Sprintec) Ethinylestradiol/norgestrel (Ovral) Ethinylestradiol/norgestrienone (Miniplanor, Planor) Ethinylestradiol/quingestanol acetate (Riglovis) Ethinylestradiol sulfonate/norethisterone acetate (Deposiston) Mestranol/anagestone acetate (Neo-Novum) Mestranol/chlormadinone acetate (C-Quens, Lutedion) Mestranol/etynodiol diacetate (Ovulen) Mestranol/hydroxyprogesterone acetate (Hormolidin) Mestranol/lynestrenol (Lyndiol) Mestranol/norethisterone (Norethin, Noriday, Norinyl, Norquen, Ortho-Novum) Mestranol/noretynodrel (Enavid, Enovid) Quinestrol/etynodiol diacetate (Soluna) Quinestrol/levonorgestrel (Yuèkětíng, Àiyuè) Quinestrol/norgestrel (Compound Norgestrel) Quinestrol/quingestanol acetate (Unovis) For menopausal hormone therapy and/or gynecological disorders: Conjugated estrogens/medrogestone (Presomen) Conjugated estrogens/medroxyprogesterone acetate (Prempro, Premphase) Conjugated estrogens/norgestrel (Prempak-C) Estradiol/drospirenone (Angeliq) Estradiol/dydrogesterone (Femoston) Estradiol/gestodene (Avaden, Avadene) Estradiol/levonorgestrel Estradiol/medroxyprogesterone acetate (Indivina, Tridestra) Estradiol/norethisterone acetate (Activella, Activelle, Cliane, Estalis, Eviana, Evorel, Kliogest, Novofem) Estradiol/norgestimate (Prefest) Estradiol/progesterone (Bijuva) Estradiol/trimegestone (Lovelle, Totelle) Estradiol valerate/cyproterone acetate (Climen, Climen 28) Estradiol valerate/estriol/levonorgestrel (CycloÖstrogynal) Estradiol valerate/levonorgestrel (Cyclo-Progynova N) Estradiol valerate/medroxyprogesterone acetate (Dilena, Divina, Divitren, Farludiol, Indivina, Sisare) Estradiol valerate/norethisterone (Climagest, Climesse) Estradiol valerate/norethisterone acetate (Cliovelle, Norestin, Trisequens) Estradiol valerate/norgestrel
|
{"page_id": 58508500, "title": "List of combined sex-hormonal preparations"}
|
Emi Nakamura (born October 1980) is a Canadian-American economist. She is the Chancellor's Professor of Economics at University of California, Berkeley. Nakamura is a research associate and co-director of the Monetary Economics Program of the National Bureau of Economic Research, and a co-editor of the American Economic Review. == Education == Nakamura graduated summa cum laude from Princeton University with a Bachelor of Arts in economics in 2001, completing a senior thesis titled "An Economy with Monetary Business Cycles" under the supervision of Michael Woodford. Nakamura then went on to pursue graduate studies in economics at Harvard University, receiving a Ph.D. in economics in 2007 after completing her doctoral dissertation, titled "Price Adjustment, Pass-through and Monetary Policy", under the supervision of Robert Barro and Ariel Pakes. == Research == Nakamura's research focuses on empirical issues in macroeconomics, including price stickiness, the impact of fiscal shocks, and measurement errors in official statistics. Her citation for the John Bates Clark Medal from the American Economic Association states that Nakamura has "greatly increased our understanding of price-setting by firms and the effects of monetary and fiscal policies", and cited her "creativity in suggesting new sources of data to address long-standing questions". Nakamura is a prominent figure in the field of new Keynesian economics, which incorporates microeconomic theories and ideas and places them into macroeconomic theories. Nakamura demonstrates this in her work, “Five facts about prices”, by including microdata from the Bureau of Labor Statistics to prove macroeconomic ideas. In her most cited work, "Five facts about prices", Nakamura and Jón Steinsson showed that many measured price changes are due to temporary sales, scheduled far in advance, rather than happening as dynamic responses to economic conditions. This suggested that even though economic data features frequent price changes, this can be compatible with macroeconomic models
|
{"page_id": 54800469, "title": "Emi Nakamura"}
|
a quantum simulator. Maintained by Quantuloop, the project emphasizes accessibility and versatility for researchers and developers. The following example demonstrates the implementation of a Bell state using Ket: ==== LQP ==== The Logic of Quantum Programs (LQP) is a dynamic quantum logic, capable of expressing important features of quantum measurements and unitary evolutions of multi-partite states, and provides logical characterizations of various forms of entanglement. The logic has been used to specify and verify the correctness of various protocols in quantum computation. ==== Q language ==== Q Language is the second implemented imperative quantum programming language. Q Language was implemented as an extension of C++ programming language. It provides classes for basic quantum operations like QHadamard, QFourier, QNot, and QSwap, which are derived from the base class Qop. New operators can be defined using C++ class mechanism. Quantum memory is represented by class Qreg. The computation process is executed using a provided simulator. Noisy environments can be simulated using parameters of the simulator. ==== Q# ==== A language developed by Microsoft to be used with the Quantum Development Kit. ==== QCL ==== Quantum Computation Language (QCL) is one of the first implemented quantum programming languages. The most important feature of QCL is the support for user-defined operators and functions. Its syntax resembles the syntax of the C programming language and its classical data types are similar to primitive data types in C. One can combine classical code and quantum code in the same program. ==== qGCL ==== Quantum Guarded Command Language (qGCL) was defined by P. Zuliani in his PhD thesis. It is based on Guarded Command Language created by Edsger Dijkstra. It can be described as a language of quantum programs specification. ==== QMASM ==== Quantum Macro Assembler (QMASM) is a low-level language specific to quantum annealers such as
|
{"page_id": 2137644, "title": "Quantum programming"}
|
6 Sagittarii is a massive, orange-hued star in the southern zodiac constellation of Sagittarius. With an apparent visual magnitude of 6.27, it is just below the nominal brightness limit for visibility with the typical naked eye under ideal viewing conditions. The distance can be estimated from the annual parallax shift of 1.24±0.44 mas as roughly 2,600 light years away. It is moving closer to the Sun with a heliocentric radial velocity of −22 km/s. 6 Sagittarii has a peculiar velocity of 31.8+9.9−14.1 km/s, which may indicate it is a runaway star. This is an evolved giant star with a stellar classification of K2 III. It is only 25 million years old and has around ten times the mass of the Sun. The star is radiating about 6,817 times the Sun's luminosity from its photosphere at an effective temperature of 3,778 K. It appears to be a source of extended infrared excess, but this emission may be due to intervening cirrus. == References ==
|
{"page_id": 30520955, "title": "6 Sagittarii"}
|
The SuperBook Project started at Bell Communications Research, Morristown, USA. The purpose of the project was to find new ways of navigating online books. Jacob Nielsen commented online that "In 1990, Bell Communications Research's SuperBook project proved the benefits of integrating search results with navigation menus and other information space overviews." The decision is taken (at the CALITE 85 conference) to found ASCILITE, the Australian Society of Computers In Learning In Tertiary Education. (It took two more years for all details to be finalised.) See the history of ASCILITE. ASCILITE is the co-publisher of the Australasian Journal of Educational Technology (AJET). === 1986 === Tony Bates publishes "Computer Assisted Learning or Communications: Which Way for Information Technology in Distance Education?", Journal of Distance Education/ Revue de l'enseignement a distance, reflecting (in 1986!) on ways forward for e-learning, based on 15 years of operational use of computer networks at the Open University and nine years of systematic R&D on CAL, viewdata/videotex, audio-graphic teleconferencing and computer conferencing. Many of the systems specification issues discussed later are rehearsed here. Edward Barrett comes to MIT in the Program in Writing and Humanistic Studies. He becomes co-director of a group working on a distance learning project called the "Networked Educational Online System" (NEOS), a suite of programs for teaching writing and other subjects in specially designed electronic seminar rooms. First version of LISTSERV is written by Eric Thomas, an engineering student in Paris, France. It was first used in the BITNET network for electronic mailing lists among universities. Fifth Canadian Symposium on Instructional Technology held May 5–7 in Ottawa. First version of CSILE installed on a small network of Cemcorp ICON computers at an elementary school in Toronto, Canada. CSILE included text and graphical notes authored by several kinds of users (students, teachers, others) with
|
{"page_id": 25012873, "title": "History of virtual learning environments"}
|
Pi Andromedae is a binary star system in the northern constellation of Andromeda. Its Bayer designation is latinized from π Andromedae, and abbreviated Pi And or π And, respectively. With an apparent visual magnitude of 4.4, it is visible to the naked eye. Based on parallax measurements, it is located at a distance of approximately 580 light-years (180 parsecs) from Earth. The pair is classified as a blue-white B-type main sequence dwarf, with an apparent magnitude of +4.34. It is a spectroscopic binary with an orbital period of 143.5 days and an eccentricity of 0.54. The spectroscopic binary forms a triple system with BD+32 102, a magnitude 8.6 star located 35.9 arcseconds away. At 55 arcseconds separation is an 11th magnitude companion that is just located on the same line of sight, but at a very different distance from us. == Naming == In Chinese, 奎宿 (Kuí Sù), meaning Legs (asterism), refers to an asterism consisting of π Andromedae, η Andromedae, 65 Piscium, ζ Andromedae, ε Andromedae, δ Andromedae, ν Andromedae, μ Andromedae, β Andromedae, σ Piscium, τ Piscium, 91 Piscium, υ Piscium, φ Piscium, χ Piscium and ψ¹ Piscium. Consequently, the Chinese name for π Andromedae itself is 奎宿六 (Kuí Sù liù, English: the Sixth Star of Legs.) == References == == External links == Image Pi Andromedae
|
{"page_id": 2781000, "title": "Pi Andromedae"}
|
is a machine used for transferring water from a low-lying body of water into irrigation ditches. Water is pumped by turning a screw-shaped surface inside a pipe. The screw pump is commonly attributed to Archimedes, Artificial intelligence – (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. In computer science AI research is defined as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Colloquially, the term "artificial intelligence" is applied when a machine mimics "cognitive" functions that humans associate with other human minds, such as "learning" and "problem solving". Assembly drawing – see Technical drawing. Automaton clock – An automaton clock or automata clock is a type of striking clock featuring automatons. Clocks like these were built from the 1st century BC through to Victorian times in Europe. A cuckoo clock is a simple form of this type of clock. Automobile – a wheeled motor vehicle used for transportation. Most definitions of car say they run primarily on roads, seat one to eight people, have four tires, and mainly transport people rather than goods. Automobile handling – Automobile handling and vehicle handling are descriptions of the way a wheeled vehicle responds and reacts to the inputs of a driver, as well as how it moves along a track or road. It is commonly judged by how a vehicle performs particularly during cornering, acceleration, and braking as well as on the vehicle's directional stability when moving in steady state condition. Automotive engineering – Automotive engineering, along with aerospace engineering and marine engineering, is a branch of vehicle engineering, incorporating elements of mechanical, electrical, electronic, software and safety engineering as applied to the design,
|
{"page_id": 50783328, "title": "Glossary of mechanical engineering"}
|
suite for random number generators Non-uniform random variate generation Hardware random number generator Random number generator attack Randomness TestU01 – statistical test suite for random number generators == References == == External links == SP800-90 series on Random Number Generation, NIST Random Number Generation in the GNU Scientific Library Reference Manual Random Number Generation Routines in the NAG Numerical Library Chris Lomont's overview of PRNGs, including a good implementation of the WELL512 algorithm Source code to read data from a TrueRNG V2 hardware TRNG
|
{"page_id": 4160163, "title": "List of random number generators"}
|
units for data collection, terrain modeling for both transportation and flood control purposes, surface analysis and as-built surveys using a 3D scanner, least square analysis for coordinate adjustments, the usage of a robotic total station, and photogrammetric measure - ments using aerial photos and remote sensing imagery including unmanned aerial systems (UAS’s). 221 Plane Surveying II (3) UC:CSU Prerequisites: Engineering Support 121. > LECTURE, 2 HOURS; LABORATORY, 3 HOURS. This is an advanced course in plane surveying. Topics include topographic survey, earthmoving quantity take- off, horizontal and vertical curves, construction staking, real property survey using electronic data measurement (EDM), application of global positioning system (GPS) and geographic information systems (GIS), and green surveys. Field work is performed. 224 Land Surveyor-In-Training Review Course (2) > LECTURE, 1 HOUR; LABORATORY, 3 HOURS. This course prepares students for the State of Califor - nia, Land Surveyor in Training (LSIT) certificate which is the first step required under California law towards becoming licensed as a Professional Land Surveyor. 225 Boundary Control for Surveyors (2) CSU > LECTURE, 1 HOUR; LABORATORY, 3 HOURS. This is an advanced course in boundary control surveying. Topics include history and concept of boundary control surveys and the role of the surveyor; creation of boundary lines, description of real property, metes and bounds, and boundary law; Federal and State non-sectionalized land, easements, reversions, riparian, and littoral boundaries; theory of retracing and resurveying of sectionalized lands, locating sequential conveyances, simultaneously created boundaries, and locating combination descriptions. # Engineering Technician (ENG TEK) 101 Engineering Technology Application (2) CSU Advisory: Manufacturing & Industrial Technology 101. > LECTURE, 1 HOUR; LABORATORY, 2 HOURS. This project based learning course utilizes various hands on modules in engineering technology fields, to familiarize and prepare the students for entry level engineering tech - nician positions in industry. 111
|
{"source": 957, "title": "from dpo"}
|
mapping to support irregular data access while maintaining a minimal memory size. The online decoding step enables efficient on-chip sparse voxel grid processing, incorporating bitmap masking to mitigate PSNR loss caused by hash collisions. To further optimize performance, we design a dedicated hardware architecture supporting our sparse voxel grid processing technique. Experimental results demonstrate that SpNeRF achieves an average 21.07× reduction in memory size while maintaining comparable PSNR levels. When benchmarked against Jetson XNX, Jetson ONX, RT-NeRF.Edge and NeuRex.Edge, our design achieves speedups of 95.1×, 63.5×, 1.5× and 10.3×, and improves energy efficiency by 625.6×, 529.1×, 4×, and 4.4×, respectively. 11:05 CEST TS21.2 SBQ: EXPLOITING SIGNIFICANT BITS FOR EFFICIENT AND ACCURATE POST-TRAINING DNN QUANTIZATION Speaker: Jiayao Ling, Shanghai Jiao Tong University, CN Authors: Jiayao Ling1, Gang Li2, Qinghao Hu2, Xiaolong Lin1, Cheng Gu1, Jian Cheng3 and Xiaoyao Liang1 1Shanghai Jiao Tong University, CN; 2Institute of Computing Technology, Chinese Academy of Sciences, CN; 3Institute of Automation, CN Abstract Post-Training Quantization is an effective technique for deep neural network acceleration. However, as the bit-width decreases to 4 bits and below, PTQ faces significant challenges in preserving accuracy, especially for attention-based models like LLMs. The main issue lies in considerable clipping and rounding errors induced by the limited number of quantization levels and narrow data range in conventional low-precision quantization. In this paper, we present an efficient and accurate PTQ method that targets 4 bits and below through algorithm and architecture co-design. Our key idea is to dynamically extract a small portion of significant bit terms from high-precision operands to perform low-precision multiplications under the given computational budget. Specifically, we propose Significant-Bit Quantization (SBQ). It exploits a product-aware method to dynamically identify significant terms and an error-compensated computation scheme to minimize compute errors. We present a dedicated inference engine to unleash the power
|
{"source": 2311, "title": "from dpo"}
|
In the categorial approach, we can associate to with distinct categories to reflect the ways in which it might interact with other elements in a sentence. The fairly abstract combinatoric rules would then sort out which derivations are possible. Therefore, the source of ambiguity arises not from the grammar but rather from the lexicon. Let’s see how this works by considering several possible derivations for this example. To capture the case where the prepositional phrase to Reno modifies the flight , we assign the preposition to the category (NP \NP )/NP , which gives rise to the following derivation. United diverted the flight to Reno NP (S\NP )/NP NP /N N (NP \NP )/NP NP > >> NP NP \NP S\NP >> NP S\S > > S\NP >> NP PP > > (S\NP )/PP > S\NP < SWhile CCG parsers are still subject to ambiguity arising from the choice of grammar rules, including the kind of spurious ambiguity discussed in Chapter 12, it should be clear that the choice of lexical categories is the primary problem to be addressed in CCG parsing. ## 14.7.2 CCG Parsing Frameworks Since the rules in combinatory grammars are either binary or unary, a bottom-up, tabular approach based on the CKY algorithm should be directly applicable to CCG parsing. Recall from Fig. 14.3 that PCKY employs a table that records
|
{"source": 1010, "title": "from dpo"}
|
ACM (2018). "), 10"), 13. ")]. Most of these approaches utilize a model checking methodology. As mentioned in Sect.1, 397–434 (2010). ")], has been successfully applied to a variety of programming languages, including C [12. "), 16. ")], Java [3. ")], JavaScript [31. ")], Ethereum Virtual Machine [( "Hildenbrandt, E., et al: KEVM: a complete formal semantics of the ethereum virtual machine. In: Proceedings of IEEE Computer Security Foundations Symposium,
|
{"source": 5784, "title": "from dpo"}
|
) , {\displaystyle {\hat {I}}\mathbf {M} _{JM}(\theta ,\varphi )=(-1)^{J+1}\mathbf {M} _{JM}(\theta ,\varphi ),} === Fluid dynamics === In the calculation of the Stokes' law for the drag that a viscous fluid exerts on a small spherical particle, the velocity distribution obeys Navier–Stokes equations neglecting inertia, i.e., 0 = ∇ ⋅ v , 0 = − ∇ p + η ∇ 2 v , {\displaystyle {\begin{aligned}0&=\nabla \cdot \mathbf {v} ,\\\mathbf {0} &=-\nabla p+\eta \nabla ^{2}\mathbf {v} ,\end{aligned}}} with the boundary conditions v = { 0 r = a , − U 0 r → ∞ . {\displaystyle \mathbf {v} ={\begin{cases}\mathbf {0} &r=a,\\-\mathbf {U} _{0}&r\to \infty .\end{cases}}} where U is the relative velocity of the particle to the fluid far from the particle. In spherical coordinates this velocity at infinity can be written as U 0 = U 0 ( cos θ r ^ − sin θ θ ^ ) = U 0 ( Y 10 + Ψ 10 ) . {\displaystyle \mathbf {U} _{0}=U_{0}\left(\cos \theta \,{\hat {\mathbf {r} }}-\sin \theta \,{\hat {\mathbf {\theta } }}\right)=U_{0}\left(\mathbf {Y} _{10}+\mathbf {\Psi } _{10}\right).} The last expression suggests an expansion in spherical harmonics for the liquid velocity and the pressure p = p ( r ) Y 10 , v = v r ( r ) Y 10 + v ( 1 ) ( r ) Ψ 10 . {\displaystyle {\begin{aligned}p&=p(r)Y_{10},\\\mathbf {v} &=v^{r}(r)\mathbf {Y} _{10}+v^{(1)}(r)\mathbf {\Psi } _{10}.\end{aligned}}} Substitution in the Navier–Stokes equations produces a set of ordinary differential equations for the coefficients. == Integral relations == Here the following definitions are used: Y e m n = cos m φ P n m ( cos θ ) Y o m n = sin m φ P n m ( cos θ ) {\displaystyle {\begin{aligned}Y_{emn}&=\cos m\varphi P_{n}^{m}(\cos \theta )\\Y_{omn}&=\sin
|
{"page_id": 16589498, "title": "Vector spherical harmonics"}
|
not considered seriously in conventional DNNs, all learning for DSNs and TDSNs is done in batch mode, to allow parallelization. Parallelization allows scaling the design to larger (deeper) architectures and data sets. The basic architecture is suitable for diverse tasks such as classification and regression. == Physics-informed == Such a neural network is designed for the numerical solution of mathematical equations, such as differential, integral, delay, fractional and others. As input parameters, PINN accepts variables (spatial, temporal, and others), transmits them through the network block. At the output, it produces an approximate solution and substitutes it into the mathematical model, considering the initial and boundary conditions. If the solution does not satisfy the required accuracy, one uses the backpropagation and rectify the solution. Besides PINN, there exists deep neural operator (DeepONet) and Fourier neural operator (FNO). == Regulatory feedback == Regulatory feedback networks account for feedback found throughout brain recognition processing areas. Instead of recognition-inference being feedforward (inputs-to-output) as in neural networks, regulatory feedback assumes inference iteratively compares inputs to outputs & neurons inhibit their own inputs, collectively evaluating how important and unique each input is for the next iteration. This ultimately finds neuron activations minimizing mutual input overlap, estimating distributions during recognition and offloading the need for complex neural network training & rehearsal. Regulatory feedback processing suggests an important real-time recognition processing role for ubiquitous feedback found between brain pre and post synaptic neurons, which is meticulously maintained by homeostatic plasticity: found to be kept in balance through multiple, often redundant, mechanisms. RF also inherently shows neuroscience phenomena such as Excitation-Inhibition balance, network-wide bursting followed by quieting, and human cognitive search phenomena of difficulty with similarity and pop-out when multiple inputs are present, without additional parameters. A regulatory feedback network makes inferences using negative feedback. The feedback is used
|
{"page_id": 28016652, "title": "Types of artificial neural networks"}
|
from the cell. In the bacteria Listeria monocytogenes a multi-drug efflux transporter has been found that could export both metals and antibiotics. Experimental work has shown that exposure to zinc can lead to increased levels of bacterial resistance to antibiotics. Several other studies have reported cross-resistance to various types of metals and antibiotics. These worked through several mechanisms, like drug efflux systems and disulphide bond formation systems. The possible implication of this is that not only the presence of antibacterial compounds can lead to the development of resistance against antibiotics, but also environmental factors like exposure to heavy metals. == Collateral sensitivity == Collateral sensitivity is a phenomenon where resistance to a drug leads to increased susceptibility to another drug. This concept has been studied in both bacteria and in pathogenic fungi Researchers have discovered that collateral sensitivity-based treatments are effective against resistant populations in vitro, which is promising regarding the effort to combat the harms created by cross resistance to commonly used antibiotics. Increased sensitivity to an antibiotic means that a lower concentration of antibiotic can be used to achieve adequate growth inhibition. While the individual mechanisms for collateral sensitivity are not yet well-understood, it is thought that collateral sensitivity and antimicrobial resistance exist as a trade-off in which the benefits gained by antibiotic resistance are balanced by the risks introduced by collateral sensitivity. A specific mechanism of antimicrobial resistance may reduce the organism's fitness, and therefore expose or increase its vulnerability to a different class of drug. As more research is conducted in this area collateral sensitivity based treatments could be utilised for known multidrug resistant pathogens, such as methicillin resistant Staphylococcus aureus, Candida auris and Candida albicans. == See also == Drug resistance Pesticide resistance == References ==
|
{"page_id": 10479653, "title": "Cross-resistance"}
|
0.05% of the world total, 64.5 addresses per 1000 people (2012). Internet Service Providers: 5 ISPs (1999); cable internet in widespread use; DSL and WAP available in major cities. === Internet censorship and surveillance === There are no government restrictions on access to the Internet or Internet chat rooms; however, several NGOs claim the government monitors their e-mail. Individuals and groups engage in the expression of views via the Internet, including by e-mail and social media. The constitution provides for freedom of speech and press, but the government used administrative, judicial, and financial means to limit the exercise of these rights. Although the law provides that the right to information cannot be subjected to censorship, it also establishes retroactive liability, including criminal penalties for libel and slander. During the November 2012 municipal elections, a popular Web site that allowed voters to register complaints or allegations of election fraud was apparently hacked on several occasions and forced to shut for significant portions of the day. Certain NGOs claimed the Web site was tampered with to prevent dissemination of voter complaints. During 2012 there were several reported cases of threats and violence against the press. On December 11, the spokesman of the Supreme Court of Justice publicly accused the online newsweekly Confidential of being financed by narcotics trafficking organizations, an allegation rights groups said was politically motivated. == See also == Media of Nicaragua National University of Engineering (Nicaragua), registrar for the .ni domain. == References == This article incorporates public domain material from The World Factbook (2025 ed.). CIA. (Archived 2014 edition.) This article incorporates public domain material from websites or documents of the United States Department of State. == External links == NIC.ni, registrar for the .ni domain (in Spanish).
|
{"page_id": 21368, "title": "Telecommunications in Nicaragua"}
|
the monotone circuit complexity of an explicit function, obtained via the Karchmer–Wigderson characterization of monotone circuit size in terms of communication complexity. == Open problems == Considering a 0 or 1 input matrix M f = [ f ( x , y ) ] x , y ∈ { 0 , 1 } n {\displaystyle M_{f}=[f(x,y)]_{x,y\in \{0,1\}^{n}}} , the minimum number of bits exchanged to compute f {\displaystyle f} deterministically in the worst case, D ( f ) {\displaystyle D(f)} , is known to be bounded from below by the logarithm of the rank of the matrix M f {\displaystyle M_{f}} . The log rank conjecture proposes that the communication complexity, D ( f ) {\displaystyle D(f)} , is bounded from above by a constant power of the logarithm of the rank of M f {\displaystyle M_{f}} . Since D(f) is bounded from above and below by polynomials of log rank ( M f ) {\displaystyle (M_{f})} , we can say D(f) is polynomially related to log rank ( M f ) {\displaystyle (M_{f})} . Since the rank of a matrix is polynomial time computable in the size of the matrix, such an upper bound would allow the matrix's communication complexity to be approximated in polynomial time. Note, however, that the size of the matrix itself is exponential in the size of the input. For a randomized protocol, the number of bits exchanged in the worst case, R(f), was conjectured to be polynomially related to the following formula: log min ( rank ( M f ′ ) : M f ′ ∈ R 2 n × 2 n , ( M f − M f ′ ) ∞ ≤ 1 / 3 ) . {\displaystyle \log \min({\textrm {rank}}(M'_{f}):M'_{f}\in \mathbb {R} ^{2^{n}\times 2^{n}},(M_{f}-M'_{f})_{\infty }\leq 1/3).} Such log rank conjectures are
|
{"page_id": 50329, "title": "Communication complexity"}
|
The Bulletin of Geosciences is a peer-reviewed scientific journal publishing original research papers, review articles, and short contributions. It covers all aspects of palaeoenvironmental geology, including palaeontology, stratigraphy, sedimentology, palaeogeography, palaeoecology, palaeoclimatology, geochemistry, mineralogy, geophysics, and related fields. It is published by the Czech Geological Survey, West Bohemian Museum in Plzeň, Palacký University Olomouc and the Geological institute of Czech Academy of Sciences. == Abstracting and indexing == This journal is abstracted and indexed in: Science Citation Index Expanded Current Contents/Physical, Chemical & Earth Sciences Scopus GeoRef The journal is included in the Geoscience e-Journals collection. According to the Journal Citation Reports, the journal has a 2013 impact factor of 1.495. == References == == External links == Official website
|
{"page_id": 36783396, "title": "Bulletin of Geosciences"}
|
4-Vinylcyclohexene dioxide (VCD) is an organic compound that contains two epoxide functional groups. It is industrially used as a crosslinking agent for the production of epoxy resins. It is a colourless liquid. It is an intermediate for synthesis of organic compounds. == Preparation and properties == 4-Vinylcyclohexene dioxide is prepared by epoxidation of 4-vinylcyclohexene with peroxybenzoic acid. Its viscosity is 15 mPa·s. == Safety == 4-Vinylcyclohexene dioxide, like other volatile epoxides, is classified as an alkylating agent. VCD has toxic effects on fertility. It is a killer of oocytes, eggs in a female's ovaries, in immature ovarian follicles in mice and rats. In pest control, it has been used as an ovotoxic agent for reducing rat fertility. == References ==
|
{"page_id": 46260673, "title": "Vinylcyclohexene dioxide"}
|
Equatorial seasons and climate == Seasons result from the tilt of Earth's axis away from a line perpendicular to the plane of its revolution around the Sun. Throughout the year, the Northern and Southern hemispheres are alternately turned either toward or away from the Sun, depending on Earth's position in its orbit. The hemisphere turned toward the Sun receives more sunlight and is in summer, while the other hemisphere receives less sun and is in winter (see solstice). At the equinoxes, Earth's axis is perpendicular to the Sun rather than tilted toward or away, meaning that day and night are both about 12 hours long across the whole of Earth. Near the equator, this means the variation in the strength of solar radiation is different relative to the time of year than it is at higher latitudes: maximum solar radiation is received during the equinoxes, when a place at the equator is under the subsolar point at high noon, and the intermediate seasons of spring and autumn occur at higher latitudes; and the minimum occurs during both solstices, when either pole is tilted towards or away from the sun, resulting in either summer or winter in both hemispheres. This also results in a corresponding movement of the equator away from the subsolar point, which is then situated over or near the relevant tropic circle. Nevertheless, temperatures are high year-round due to the Earth's axial tilt of 23.5° not being enough to create a low minimum midday declination to sufficiently weaken the Sun's rays even during the solstices. High year-round temperatures extend to about 25° north or south of the equator, although the moderate seasonal temperature difference is defined by the opposing solstices (as it is at higher latitudes) near the poleward limits of this range. Near the equator, there is
|
{"page_id": 20611356, "title": "Equator"}
|
reasons why a sequence may fail to converge. It may go off to infinity, or it may oscillate. The boundedness condition prevents the former from happening. The latter is impossible by a "gambling" argument. Specifically, consider a stock market game in which at time t {\displaystyle t} , the stock has price X t {\displaystyle X_{t}} . There is no strategy for buying and selling the stock over time, always holding a non-negative amount of stock, which has positive expected profit in this game. The reason is that at each time the expected change in stock price, given all past information, is at most zero (by definition of a supermartingale). But if the prices were to oscillate without converging, then there would be a strategy with positive expected profit: loosely, buy low and sell high. This argument can be made rigorous to prove the result. === Proof sketch === The proof is simplified by making the (stronger) assumption that the supermartingale is uniformly bounded; that is, there is a constant M {\displaystyle M} such that | X n | ≤ M {\displaystyle |X_{n}|\leq M} always holds. In the event that the sequence X 1 , X 2 , … {\displaystyle X_{1},X_{2},\dots } does not converge, then lim inf X n {\displaystyle \liminf X_{n}} and lim sup X n {\displaystyle \limsup X_{n}} differ. If also the sequence is bounded, then there are some real numbers a {\displaystyle a} and b {\displaystyle b} such that a < b {\displaystyle a<b} and the sequence crosses the interval [ a , b ] {\displaystyle [a,b]} infinitely often. That is, the sequence is eventually less than a {\displaystyle a} , and at a later time exceeds b {\displaystyle b} , and at an even later time is less than a {\displaystyle a} , and so
|
{"page_id": 12261058, "title": "Doob's martingale convergence theorems"}
|
Cytochrome c oxidase subunit 6A1, mitochondrial is a protein that in humans is encoded by the COX6A1 gene. Cytochrome c oxidase 6A1 is a subunit of the cytochrome c oxidase complex, also known as Complex IV, the last enzyme in the mitochondrial electron transport chain. A mutation of the COX6A1 gene is associated with a recessive axonal or mixed form of Charcot-Marie-Tooth disease. == Structure == The COX6A1 gene, located on the q arm of chromosome 12 in position 24.2, contains 3 exons and is 2,653 base pairs in length. The COX6A1 protein weighs 12 kDa and is composed of 109 amino acids. The protein is a subunit of Complex IV, a heteromeric complex consisting of 3 catalytic subunits encoded by mitochondrial genes and multiple structural subunits encoded by nuclear genes. This nuclear gene encodes polypeptide 1 (liver isoform) of subunit VIa, and polypeptide 1 is found in all non-muscle tissues. Polypeptide 2 (heart/muscle isoform) of subunit VIa is encoded by a different gene, COX6A2, and is present only in striated muscles. These two polypeptides share 66% amino acid sequence identity. == Function == Cytochrome c oxidase (COX) is the terminal enzyme of the mitochondrial respiratory chain. It is a multi-subunit enzyme complex that couples the transfer of electrons from cytochrome c to molecular oxygen and contributes to a proton electrochemical gradient across the inner mitochondrial membrane to drive ATP synthesis via protonmotive force. The mitochondrially-encoded subunits perform the electron transfer of proton pumping activities. The functions of the nuclear-encoded subunits are unknown but they may play a role in the regulation and assembly of the complex. Summary reaction: 4 Fe2+-cytochrome c + 8 H+in + O2 → 4 Fe3+-cytochrome c + 2 H2O + 4 H+out == Clinical significance == A mutation leading to a 5 base pair deletion
|
{"page_id": 15183270, "title": "COX6A1"}
|
2 kpaz 2 kpar 2 longlongs 2 whiten 2 empress 2 corals 2 caybwdav 2 informática 2 txgmu 2 bago 2 hdu 2 hdw 2 tarkd 2 createusers 2 rasen 2 sphinxes 2 highboy 2 starlet 2 caqvgpyn 2 customdesign 2 daiegn 2 sportsheadline 2 segv 2 crockett 2 sherlockholmes 2 kookaburra 2 nertzsol 2 consetrado 2 toffees 2 koyama 2 ygraut 2 coversexperts 2 hhhhɉhh 2 haggis 2 jamb 2 cacryoeu 2 ontothereichstag 2 backgroundright 2 nzbu 2 firmletter 2 rocketplume 2 busdriver 2 lqwcx 2 traduction 2 pyk 2 pyw 2 pyp 2 qjdpv 2 cashliwz 2 externaleditor 2 caulqhqi 2 popuppremium 2 classicalarchives 2 rgpen 2 rgpej 2 museumshooter 2 hlaer 2 hodgkin 2 oprahflash 2 biodegradable 2 trackkeywords 2 jfmjfhklogoienhpfnppmbcbjfjnkonk 2 instutility 2 bluetableft 2 pvcsuser 2 downhillsnowboard 2 ma's 2 virtuoso 2 uhuh 2 uhul 2 onlinetours 2 babyblock 2 masquer 2 mastergroup 2 ckt 2 ckh 2 oligomer 2 sullivan's 2 lastgd 2 aldj 2 aldt 2 pppstats 2 hidepanel 2 caqrqnwt 2 cacjchyv 2 persiancrocodile 2 globetextfield 2 cayxkhux 2 ctivex 2 steganos 2 frqchk 2 midband 2 rvd 2 britcom 2 catkcsjc 2 sdti 2 omf 2 ybsd 2 lviy 2 dower 2 srkl 2 rearmed 2 foyersculpt 2 compote 2 houseground 2 pnens 2 kabalend 2 agq 2 agt 2 agu 2 agx 2 caettfvl 2 agi 2 windowdecals 2 mythic 2 jojosfashionshow 2 cheftnakmquf 2 combinat 2 kybox 2 troppo 2 tonys 2 mpro 2 irpty 2 guildcommon 2 camrglmf 2 daps 2 dapi 2 bestvista 2 driverdownloading 2 testcases 2 emission 2 zybsf 2 calcite 2 ocscast 2 mariage 2 surinam 2 heizung 2 vistacamera 2 dvzz 2 inlineresource 2 cawtcsmo 2 noti 2 powerfloat 2 escutcheon 2 cakpgjoc 2 typevalues 2 reneezellweger 2 rents 2 bateaux 2 unionfs
|
{"source": 1028, "title": "from dpo"}
|
(e.g., 80% chance of being “spam”). It uses the sigmoid function to map inputs to probabilities between 0 and 1. 2. **Linear Decision Boundary**: It assumes the data can be separated by a straight line (or a hyperplane in higher dimensions). If the data isn’t linearly separable, Logistic Regression may struggle. 3. **Simple and Interpretable**: It’s easy to implement and interpret, making it a good starting point for classification problems. The coefficients of the model can also tell you how each feature influences the outcome. 4. **Works Well for Linearly Separable Data**: Logistic Regression performs well when the relationship between the input features and the output is linear. 5. **Efficient for Large Datasets**: It’s computationally efficient and scales well to large datasets, making it a popular choice for many real-world applications. ### Support Vector Machine (SVM) 1. **Maximizes the Margin**: SVM focuses on finding the decision boundary that maximizes the margin (the distance between the boundary and the closest data points of each class). This makes it more robust to new data. 2. **Handles Non-Linear Data**: SVM can handle non-linear data using the “kernel trick,” which transforms the data into a higher-dimensional space where it becomes easier to separate. 3. **Effective in High Dimensions**: SVM works well even when the number of features (dimensions) is much larger than the number of samples, making it suitable for complex datasets. 4. **Robust to Overfitting**: By focusing on the points closest to the boundary (support vectors), SVM is less likely to overfit, especially in smaller datasets. 5. **Requires Tuning**: SVM requires careful tuning of parameters (like the choice of kernel and regularization) to achieve optimal performance, which can be time-consuming. How Does Support Vector Machine Algorithm Work? ----------------------------------------------- SVM is defined such that it is defined in terms of the support vectors only,
|
{"source": 3336, "title": "from dpo"}
|
3, "format": "plain"}, "remove_chinese": true, "remove_edit_buttons": true, "extract_latex": true}, "warc_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163915534/warc/CC-MAIN-20131204133155-00080-ip-10-33-133-15.ec2.internal.warc.gz"} This function calculates deterministic equilibria for the mosquito lifecycle model. equilibrium_lifeycle( params, NF, phi = 0.5, log_dd = TRUE, spn_P, pop_ratio_Aq = NULL, pop_ratio_F = NULL, pop_ratio_M = NULL, cube ) Arguments params a named list of parameters (see details) vector of female mosquitoes at equilibrium, for every population in the environment sex ratio of mosquitoes at emergence Boolean: TRUE implies logistic density dependence, FALSE implies Lotka-Volterra model the set of places (P) (see details) May be empty; if not, a named vector or matrix. (see details) May be empty; if not, a named vector or matrix. (see details) May be empty; if not, a named vector or matrix. (see details) an inheritance cube from the MGDrivE package (e.g. cubeMendelian) Value a list with 3 elements: init a matrix of equilibrium values for every life-cycle stage, params a list of parameters for the simulation, M0 a vector of initial conditions Details Equilibrium can be calculated using one of two models: classic logistic dynamics or following the Lotka-Volterra competition model. This is determined by the parameter log_dd, and it changes elements of the return list: K is returned for logistic dynamics, or gamma is returned for Lotka-Volterra dynamics. The places (spn_P) object is generated from one of the following: spn_P_lifecycle_node, spn_P_lifecycle_network, spn_P_epiSIS_node, spn_P_epiSIS_network, spn_P_epiSEIR_node, or spn_P_epiSEIR_network. The initial population genotype ratios are set by supplying the pop_ratio_Aq, pop_ratio_F, and pop_ratio_M values. The default value is NULL, and the function will use the wild-type alleles provided in the cube object. However, one can supply several different objects to set the initial genotype ratios. All genotypes provided must exist in the cube (this is checked by the function). If a single, named vector is provided, then all patches will be initialized
|
{"source": 5224, "title": "from dpo"}
|
which point she knows the packet-length and the padding-length — and verifies the MAC tag. The most commonly used variant of SSH in CBC mode with AES has a feature called inter-packet chaining (IPC). This means that only the IV of the first packet is chosen randomly; each subsequent packet sets its IV equal to the last block of ciphertext from the previous packet. In addition, Bob typically chooses new pseudorandom padding for each packet (although the standards allow a fixed padding that’s the same for all packets). In Bellare, Kohno, and Namprempre found a chosen-plaintext attack on SSH-IPC. This type of attack is of practical value in situations where the plaintext is known to come from a small set of possibilities (“buy” or “sell”; “attack now” or “delay attack”). The attack in proceeds as follows. Chris has a target ciphertext block C∗, which is assumed to be the first block of an encrypted packet that Bob sent to Alice, and he has a guess P about what the corresponding plaintext block is. He knows the initialization vector (IV) for that block (which was the last ciphertext block of the previous packet). He also knows the last ciphertext block of the last packet that Bob encrypted, which is the IV for the first block of the next packet that Bob will send. Chris XORs the two IV’s, and then XORs the result with P to get P ′, and somehow he persuades Bob to encrypt P ′ and send the ciphertext to Alice. If the ciphertext that Bob sends is C∗,then Chris knows that his guess was correct, and otherwise he knows that his guess was incorrect. 18 NEAL KOBLITZ AND ALFRED MENEZES This attack is not very practical because Chris has to compute P ′ and get
|
{"source": 6441, "title": "from dpo"}
|
This is generally done by ring opening of an aziridine, and subsequent trapping by a dipolarophile before the stereochemistry can scramble. Like other 1,3-dipolar cycloaddition reactions, azomethine ylide cycloadditions can form endo or exo products. This selectivity can be tuned using metal catalysis. === Enantioselective synthesis === Enantioselective cycloaddition of azomethine ylides using chiral catalysts was first described in a seminal work by Allway and Grigg in 1991. This powerful method was further developed by Jørgensen and Zhang. These reactions generally use zinc, silver, copper, nickel, and calcium complexes. Using chiral phosphine catalysts, enantiomerically pure spiroindolinones can be synthesized. The method described by Gong, et al. leads to an unexpected regiochemical outcome that does not follow electronic effects. This is attributed to favorable pi stacking with the catalyst. == Other reactions == === Electrocyclizations === Conjugated azomethine ylides are capable of [1,5]- and [1,7]-electrocyclizations. An example of a [1,7]-electrocyclization of a diphenylethenyl-substituted azomethine ylide is shown below. This conrotatory ring-closing is followed by a suprafacial [1,5]-hydride shift, which affords the rearomatized product. The sterics and geometry of the reacting phenyl ring play a major role in the success of the reaction. The compounds resulting from this type of electrocyclization have been used as dienes in Diels–Alder reactions to attach compounds to fullerenes. == Use in synthesis == === Total synthesis of martinellic acid === A cycloaddition of an azomethine ylide with an unactivated alkene was used in total synthesis of martinellic acid. The cycloaddition step formed two rings, including a pyrrolidine, and two stereocenters. === Total synthesis of spirotryprostatin B === In the synthesis of spirotryprostatin B, an azomethine ylide is formed from condensation of an amine with an aldehyde. The ylide then reacts with an electron-deficient alkene on an indolinone, resulting in formation of a spirocyclic pyrrolidine and four
|
{"page_id": 3359945, "title": "Azomethine ylide"}
|
to escape the immune system. Genes coding for surface antigens in these organisms are located at subtelomeric regions, and it has been speculated that this preferred location facilitates gene switching and expression, and the generation of new variants. For example, the genes belonging to the var family in Plasmodium falciparum (agent of malaria) are mostly localized in subtelomeric regions. Antigenic variation is orchestrated by epigenetic factors, including monoallelic var transcription at separate spatial domains at the nuclear periphery (nuclear pore), differential histone marks on otherwise identical var genes, and var silencing mediated by telomeric heterochromatin. Other factors such as non-coding RNA produced in subtelomeric regions adjacent or within var genes may contribute as well to antigenic variation. In Trypanosoma brucei (agent of sleeping sickness), variable surface glycoprotein (VSG) antigenic variation is a relevant mechanism used by the parasite to evade the host immune system. VSG expression is exclusively subtelomeric and occurs either by in situ activation of a silent VSG gene or by DNA rearrangement that inserts an internal silent copy of a VSG gene into an active telomeric expression site. To contrast with Plasmodium falciparum, in Trypanosoma brucei, antigenic variation is orchestrated by epigenetic and genetic factors. In Pneumocystis jirovecii major surface glycoprotein (MSG) gene family cause antigenic variation. MSG genes are like boxes at chromosome ends, and only the MSG gene at the unique locus UCS (upstream conserved sequence) is transcribed. Different MSG genes can occupy the expression site (UCS), suggesting that recombination can take a gene from a pool of silent donors and install it at the expression site, possibly via crossovers, activating transcription of a new MSG gene, and changing the surface antigen of Pneumocystis jirovecii. Switching at the expression site is probably facilitated by the subtelomeric locations of expressed and silent MSG genes. A second
|
{"page_id": 2794604, "title": "Subtelomere"}
|
the hindbrain splits into the metencephalon (which will contain the cerebellum and pons) and the myelencephalon (which will contain the medulla oblongata). Each of these areas contains proliferative zones where neurons and glial cells are generated; the resulting cells then migrate, sometimes for long distances, to their final positions. Once a neuron is in place, it extends dendrites and an axon into the area around it. Axons, because they commonly extend a great distance from the cell body and need to reach specific targets, grow in a particularly complex way. The tip of a growing axon consists of a blob of protoplasm called a growth cone, studded with chemical receptors. These receptors sense the local environment, causing the growth cone to be attracted or repelled by various cellular elements, and thus to be pulled in a particular direction at each point along its path. The result of this pathfinding process is that the growth cone navigates through the brain until it reaches its destination area, where other chemical cues cause it to begin generating synapses. Considering the entire brain, thousands of genes create products that influence axonal pathfinding. The synaptic network that finally emerges is only partly determined by genes, though. In many parts of the brain, axons initially "overgrow", and then are "pruned" by mechanisms that depend on neural activity. In the projection from the eye to the midbrain, for example, the structure in the adult contains a very precise mapping, connecting each point on the surface of the retina to a corresponding point in a midbrain layer. In the first stages of development, each axon from the retina is guided to the right general vicinity in the midbrain by chemical cues, but then branches very profusely and makes initial contact with a wide swath of midbrain neurons. The
|
{"page_id": 3717, "title": "Brain"}
|
will say, "Your powers are now mine!". The announcer will announce how many rounds the player has completed. The game also includes a Simon-style game called "2 Wizards are Better Than One" which involves sticking with one pattern and adding an extra command on it each time. Game 3 has different music to the other 2 games on which requires 2 wands. One player makes a pattern and sends it to the other wand and then the other player has to repeat it back. == Test modes/demo modes == Tiger Electronics and Hasbro are known to include a hidden test mode (also known as a demo mode) in all their electronic games. These test modes signal either a sine wave or a square wave tone usually at 1000hz as a way of testing the speaker and then play through all of the sounds that are pre-programmed in the device either manually (by pushing a button), or automatic (playing every sound by itself). Games like Brain Warp, Brain Shift, Boogey Ball, and Brain Bash have these test modes, as do tabletop games (such as Who Wants to Be a Millionaire?). == References == == External links == Wired article: 'Moody Furballs and the Developers Who Love Them' Tiger Handhelds at the Electronic Handheld Game Museum
|
{"page_id": 292781, "title": "Tiger Electronics"}
|
in weight and used less power than comparable vacuum tube rectifiers, they had the disadvantage of finite life expectancy, increasing resistance with age, and were only suitable to use at low frequencies. Both selenium and copper oxide rectifiers have somewhat better tolerance of momentary voltage transients than silicon rectifiers. Typically these rectifiers were made up of stacks of metal plates or washers, held together by a central bolt, with the number of stacks determined by voltage; each cell was rated for about 20 V. An automotive battery charger rectifier might have only one cell: the high-voltage power supply for a vacuum tube might have dozens of stacked plates. Current density in an air-cooled selenium stack was about 600 mA per square inch of active area (about 90 mA per square centimeter). ==== Silicon and germanium diodes ==== Silicon diodes are the most widely used rectifiers for lower voltages and powers, and have largely replaced other rectifiers. Due to their substantially lower forward voltage (0.3V versus 0.7V for silicon diodes) germanium diodes have an inherent advantage over silicon diodes in low voltage circuits. ==== High power: thyristors (SCRs) and newer silicon-based voltage sourced converters ==== In high-power applications, from 1975 to 2000, most mercury valve arc-rectifiers were replaced by stacks of very high power thyristors, silicon devices with two extra layers of semiconductor, in comparison to a simple diode. In medium-power transmission applications, even more complex and sophisticated voltage sourced converter (VSC) silicon semiconductor rectifier systems, such as insulated gate bipolar transistors (IGBT) and gate turn-off thyristors (GTO), have made smaller high voltage DC power transmission systems economical. All of these devices function as rectifiers. As of 2009 it was expected that these high-power silicon "self-commutating switches", in particular IGBTs and a variant thyristor (related to the GTO) called the integrated
|
{"page_id": 60569, "title": "Rectifier"}
|
are small, durable, and still provide adequate performance. On the other hand, there has been a resurgence of parallel data links in RF communication. Rather than transmitting one bit at a time (as in Morse code and BPSK), well-known techniques such as PSM, PAM, and Multiple-input multiple-output communication send a few bits in parallel. (Each such group of bits is called a "symbol"). Such techniques can be extended to send an entire byte at once (256-QAM). == See also == Data transmission Serial port Bit-level parallelism == References == This article incorporates public domain material from Federal Standard 1037C. General Services Administration. Archived from the original on 2022-01-22. (in support of MIL-STD-188).
|
{"page_id": 882939, "title": "Parallel communication"}
|
The galactic coordinate system is a celestial coordinate system in spherical coordinates, with the Sun as its center, the primary direction aligned with the approximate center of the Milky Way Galaxy, and the fundamental plane parallel to an approximation of the galactic plane but offset to its north. It uses the right-handed convention, meaning that coordinates are positive toward the north and toward the east in the fundamental plane. == Spherical coordinates == === Galactic longitude === Longitude (symbol l) measures the angular distance of an object eastward along the galactic equator from the Galactic Center. Analogous to terrestrial longitude, galactic longitude is usually measured in degrees (°). === Galactic latitude === Latitude (symbol b) measures the angle of an object northward of the galactic equator (or midplane) as viewed from Earth. Analogous to terrestrial latitude, galactic latitude is usually measured in degrees (°). == Definition == The first galactic coordinate system was used by William Herschel in 1785. A number of different coordinate systems, each differing by a few degrees, were used until 1932, when Lund Observatory assembled a set of conversion tables that defined a standard galactic coordinate system based on a galactic north pole at RA 12h 40m, dec +28° (in the B1900.0 epoch convention) and a 0° longitude at the point where the galactic plane and equatorial plane intersected. In 1958, the International Astronomical Union (IAU) defined the galactic coordinate system in reference to radio observations of galactic neutral hydrogen through the hydrogen line, changing the definition of the Galactic longitude by 32° and the latitude by 1.5°. In the equatorial coordinate system, for equinox and equator of 1950.0, the north galactic pole is defined at right ascension 12h 49m, declination +27.4°, in the constellation Coma Berenices, with a probable error of ±0.1°. Longitude 0° is
|
{"page_id": 48389, "title": "Galactic coordinate system"}
|
disc set to about −0.83° (or −50 arcminutes). The above general equation can be also used for any other solar altitude. The NOAA provides additional approximate expressions for refraction corrections at these other altitudes. There are also alternative formulations, such as a non-piecewise expression by G.G. Bennett used in the U.S. Naval Observatory's "Vector Astronomy Software". == Complete calculation on Earth == The generalized equation relies on a number of other variables which need to be calculated before it can itself be calculated. These equations have the solar-earth constants substituted with angular constants expressed in degrees. === Calculate current Julian day === n = ⌈ J date − 2451545.0 + 0.0008 ⌉ {\displaystyle n=\lceil J_{\text{date}}-2451545.0+0.0008\rceil } where: n {\displaystyle n} is the number of days since Jan 1st, 2000 12:00. J date {\displaystyle J_{\text{date}}} is the Julian date; 2451545.0 is the equivalent Julian year of Julian days for Jan-01-2000, 12:00:00. 0.0008 is the fractional Julian Day for leap seconds and terrestrial time (TT). TT was set to 32.184 sec lagging TAI on 1 January 1958. By 1972, when the leap second was introduced, 10 sec were added. By 1 January 2017, 27 more seconds were added coming to a total of 69.184 sec. 0.0008=69.184 / 86400 without DUT1. The ⌈ ⋅ ⌉ {\displaystyle \lceil \cdot \rceil } operation rounds up to the next integer day number n. === Mean solar time === J ⋆ = n − l w 360 ∘ {\displaystyle J^{\star }=n-{\dfrac {l_{w}}{360^{\circ }}}} where: J ⋆ {\displaystyle J^{\star }} is an approximation of mean solar time at integer n {\displaystyle n} expressed as a Julian day with the day fraction. l ω {\displaystyle l_{\omega }} is the longitude (west is negative, east is positive) of the observer on the Earth; === Solar mean anomaly === M =
|
{"page_id": 4517642, "title": "Sunrise equation"}
|
Manfredo Perdigão do Carmo (15 August 1928, Maceió – 30 April 2018, Rio de Janeiro) was a Brazilian mathematician. He spent most of his career at IMPA and is seen as the doyen of differential geometry in Brazil. == Education and career == Do Carmo studied civil engineering at the University of Recife from 1947 to 1951. After working a few years as engineer, he accepted a teaching position at the newly created Institute of Physics and Mathematics at Recife. On suggestion of Elon Lima, in 1959 he went to Instituto Nacional de Matemática Pura e Aplicada to improve his background and in 1960 he moved to the US to pursue a Ph.D. in mathematics at the University of California, Berkeley under the supervision of Shiing-Shen Chern. He defended his thesis, entitled "The Cohomology Ring of Certain Kahlerian Manifolds", in 1963. After working again at University of Recife and at the University of Brasilia, in 1966 he became professor at Instituto Nacional de Matemática Pura e Aplicada (IMPA) in Rio de Janeiro. From 2003 to his death he was emeritus professor at the same institution. Do Carmo was a Guggenheim Fellow in 1965 and 1968. In 1978 he was invited speaker at the International Congress of Mathematicians held in Helsinki. In 1991 he obtained a Doctorate honoris causa from Federal University of Alagoas and in 2012 from University of Murcia and from Federal University of Amazonas. He served as president of the Brazilian Mathematical Society in the term 1971–1973. He was elected a member of the Brazilian Academy of Sciences in 1970, a member of The World Academy of Sciences (TWAS) in 1997 and a fellow of the American Mathematical Society In 2013. Among his awards, he received the Prêmio Almirante Álavaro Alberto from the National Council for Scientific and
|
{"page_id": 45041862, "title": "Manfredo do Carmo"}
|
QSO B0133+476, alternatively known as DA 55, is a blazar located in the constellation of Andromeda. Its redshift is (z) 0.859 and it was first discovered as an astronomical radio source by astronomers who conducted a survey at 1.4 GHz in 1970. This object has also been referred to as an optically violent variable (OVV) quasar due to its variability, a BL Lac object and a highly polarized quasar (HPQ). == Description == QSO B0133+476 is in a constant active state. It is known to exhibit several outbursts showing longer outburst time scales at longer wavelengths and a recorded amplitude outburst reaching near 15 to 31 GHz, during observations spanning roughly one decade. Its pre-outburst spectrum, found relatively flat between 2.7 and 31.4 GHz, started rising and became inverted during an outburst in between 1973 and 1974. Between 1978 and 1980 it had another outburst with the peak of the spectrum reaching 8 GHz in 1979.5 and 2.7 GHz by 1980.3. When compared to the 1973-1974 outburst, the spectrum was much flatter which it subsequently broadened. A flare was detected from QSO B0133+476 in the middle of July 2002, with a brightness increase to 14.3 magnitude. It was followed by another flare detected from November 2024 during which the flux density rose steadily to 16.1 magnitude between January 20 and 21 2025. Near-infrared activity was detected towards the end of 2008, in 2011 and again in February 2013. The source of QSO B0133+476 is classified as double. Based on polarization images presented by Very Long Baseline Interometry, it has a compact radio structure, mainly comprising an elongated strong radio core, a faint weak secondary component that is located 3.7 milliarcseconds (mas) from the core and signs of an extended diffused structure in the west direction. Observations also showed most of
|
{"page_id": 79692960, "title": "QSO B0133+476"}
|
“explanation” for a one week gap in your resume? Come on. It’s not like he abandoned an existing job for this, so this just gets added to the existing gap. 3. !Image 1071 laugh at the recruiter’s baffled reaction before explaining further.
|
{"source": 1700, "title": "from dpo"}
|
conjecture on graph containment in that motivated what is now the Park- Pham Theorem (PPT). KKC2 says that , the threshold for containing a graph in , satisfies , where is the smallest such that the expected number of copies of any subgraph of is at least one. In other words, for this class of problems, the expectation threshold in PPT can be replaced by the smaller . We show that (implying via PPT). Joint with Jeff Kahn and Jinyoung Park. (Received September 09, 2024) 1203-05-43454 Enrique Gomez-Leos* . Tilings in randomly perturbed dense multipartite graphs. Preliminary report. Many results in extremal graph theory concern minimum degree conditions that guarantee the existence of a perfect tiling in a host graph by a fixed subgraph . Recall that the Erdős-Rényi random graph consists of the vertex set where each edge is present, independently, with probability . In this regime, a key question is to determine the threshold for which contains a perfect -tiling. In 2003, Bohman, Frieze, and Martin introduced the randomly perturbed graph model which connects the two questions together. In this talk we discuss a multipartite variant of this graph model and determine the threshold for a perfect clique tiling. This is joint work with Ryan R. Martin. (Received September 09, 2024) 1203-05-43456 Michael Santana* , Theodore Molla . Codegree conditions for disjoint Berge cycles in $r$-uniform hypergraphs. Preliminary report. In 1963, Corrádi and Hajnal showed that every -vertex graph with and , contains disjoint cycles. This result has motivated a great deal of research in recent years involving finding other cycle structures along with using other sufficient conditions. As with many cycle problems in graphs, when exploring analogous results in hypergraphs there are several questions that have to be addressed including the meaning of phrases such as ‘minimum
|
{"source": 3883, "title": "from dpo"}
|
is achieved by using a challenge value that is time-varying. Referring to the above protocol, there are three general types of challenge values that might be used. The property of each is that the challenge value is not repeatedly sent to multiple claimants. Such a value is sometimes referred to as a nonce ,since it is a value that is “ not used more than once.” The challenge value could be a randomly gen-erated value (see Random bit generation (hard-ware)), in which case V would send a random value c to C. Alternatively, the challenge value might be a sequence number, in which case the verifier V would maintain a sequence value corresponding to each challenger. At each challenge, the stored sequence number would be increased by (at least) 1 before sending to the claimant. Finally, the chal-lenge value might be a function of the current time. In this case, a challenge value need not be sent from V to C, but could be sent by C, along with the computed verifier. As long as the time cho-sen was within an accepted threshold, V would accept. There are three general classes of functions and secret values that might be used as part of a challenge–response protocol. The first is symmetric-key based in which the claimant C and verifier V a priori share a secret key K. The func-tion f() is a symmetric encryption function (see Symmetric Cryptosystem), a hash function, or a Message Authentication Code (see MAC algori-thms). Both Kerberos (see Kerberos authentica-tion protocol) and the Needham–Schroeder pro-tocol are examples of symmetric-key based challenge–response identification. In addition, the protocols of ISO/IEC 9798-2 perform identification using symmetric key techniques. Alternatively, a public key based solution may be used. In this case, the claimant C has the pri-vate key in a public
|
{"source": 5836, "title": "from dpo"}
|
called myotomes or myomeres, the shape of which varies along the length of the body. In three dimensions, the myomeres constitute a series of overlapping cones that are bounded by connective tissue sheets or myocommata called myosepta. Typically, a transverse steak through the fillet will cut through several myotomes at different levels. Each myotome contains a lateral superficial strip of dark muscle primarily composed of slow contracting fibre types that are used for sustained swimming activity (Johnston et al., 1977).
|
{"page_id": 13108497, "title": "Myomere"}
|
that they are revolving around tremendous masses with very steep gravity gradients, suggesting black holes. Although quasars appear faint when viewed from Earth, they are visible from extreme distances, being the most luminous objects in the known universe. The brightest quasar in the sky is 3C 273 in the constellation of Virgo. It has an average apparent magnitude of 12.8 (bright enough to be seen through a medium-size amateur telescope), but it has an absolute magnitude of −26.7. From a distance of about 33 light-years, this object would shine in the sky about as brightly as the Sun. This quasar's luminosity is, therefore, about 4 trillion (4×1012) times that of the Sun, or about 100 times that of the total light of giant galaxies like the Milky Way. This assumes that the quasar is radiating energy in all directions, but the active galactic nucleus is believed to be radiating preferentially in the direction of its jet. In a universe containing hundreds of billions of galaxies, most of which had active nuclei billions of years ago but only seen today, it is statistically certain that thousands of energy jets should be pointed toward the Earth, some more directly than others. In many cases it is likely that the brighter the quasar, the more directly its jet is aimed at the Earth. Such quasars are called blazars. The hyperluminous quasar APM 08279+5255 was, when discovered in 1998, given an absolute magnitude of −32.2. High-resolution imaging with the Hubble Space Telescope and the 10 m Keck Telescope revealed that this system is gravitationally lensed. A study of the gravitational lensing of this system suggests that the light emitted has been magnified by a factor of ~10. It is still substantially more luminous than nearby quasars such as 3C 273. Quasars were much more
|
{"page_id": 25239, "title": "Quasar"}
|
charge each cell droplet after it has been measured based on a defined parameter. The charged droplet will then encounter an electrostatic deflection system that will sort the cell to a different container based on that charge. This allows cells to be separated on the basis of fluorescent content or scatter. To summarize, flow cytometry alone can be used to gather quantitative data about cell cycle phase distribution, but flow cytometry in coordination with FACS can be used to gather quantitative data and separate cells by phase for further study. Limitations include: for light scatter measurements, poor resolution between G2 and M (as with centrifugal elutriation) for fixed cells, unable to maintain living cultures for unfixed but dyed cells, possible disruption or mutagenesis of cells because of dye treatment some population heterogeneity may be maintained, as size separation may not always be accurate for measuring phase and not all cells may be at the same point within each phase (early G1 vs late G1) for DNA-edited cells, the process may take an extended period of time == Chemical blockade == The addition of exogenous substrates can be used to block cells in certain phases of the cell cycle and frequently target cell cycle checkpoints. These techniques can be carried out in vitro and do not require removal from the culture environment. The most common type of chemical blockade is arrest-and-release, which involves treatment of a culture with a chemical block and subsequent release by washing or addition of a neutralizing agent for the block. While chemical blockade is typically more effective and precise than physical separation, some methods can be imperfect for various reasons, including: the proportion of synchronized cells is insufficient chemical manipulations may disrupt cellular function and/or kill a portion of cells the treatment is toxic and not
|
{"page_id": 13092651, "title": "Cell synchronization"}
|
our standards on human rights, democracy and rule of law, and to develop relevant standard setting or capacity-building solutions". The large number of relevant documents identified by the CoE include guidelines, charters, papers, reports and strategies. The authoring bodies of these AI regulation documents are not confined to one sector of society and include organizations, companies, bodies and nation-states. In 2019, the Council of Europe initiated a process to assess the need for legally binding regulation of AI, focusing specifically on its implications for human rights and democratic values. Negotiations on a treaty began in September 2022, involving the 46 member states of the Council of Europe, as well as Argentina, Australia, Canada, Costa Rica, the Holy See, Israel, Japan, Mexico, Peru, the United States of America, and Uruguay, as well as the European Union. On 17 May 2024, the "Framework Convention on Artificial Intelligence and Human Rights, Democracy and the Rule of Law" was adopted. It was opened for signature on 5 September 2024. Although developed by a European organisation, the treaty is open for accession by states from other parts of the world. The first ten signatories were: Andorra, Georgia, Iceland, Norway, Moldova, San Marino, the United Kingdom, Israel, the United States, and the European Union. === European Union === The EU is one of the largest jurisdictions in the world and plays an active role in the global regulation of digital technology through the GDPR, Digital Services Act, and the Digital Markets Act. For AI in particular, the Artificial intelligence Act is regarded in 2023 as the most far-reaching regulation of AI worldwide. Most European Union (EU) countries have their own national strategies towards regulating AI, but these are largely convergent. The European Union is guided by a European Strategy on Artificial Intelligence, supported by a High-Level
|
{"page_id": 63451675, "title": "Regulation of artificial intelligence"}
|
In telecommunications, a quasi-analog signal is a digital signal that has been converted to a form suitable for transmission over a specified analog channel. The specification of the analog channel should include frequency range, bandwidth, signal-to-noise ratio, and envelope delay distortion. When quasi-analog form of signaling is used to convey message traffic over dial-up telephone systems, it is often referred to as voice-data. A modem may be used for the conversion process. == References == This article incorporates public domain material from Federal Standard 1037C. General Services Administration. Archived from the original on 2022-01-22. (in support of MIL-STD-188).
|
{"page_id": 41615, "title": "Quasi-analog signal"}
|
peak Mt. Kızılkaya 3,771 m (12,372 ft) Tahtalı Mountains or Anti-Taurus Mountains Munzur Mountains, eastern, highest peak Mt. Akbaba 3,462 m (11,358 ft) Mercan mountain range, within the Munzur === Southeastern Taurus === The Southeastern Taurus Mountains form the northern boundary of the Southeastern Anatolia Region and North Mesopotamia. They include the Nurhak Mountains, Malatya Mountains, Maden Mountains, Genç Mountains, and Bitlis Mountains. They are in the watershed of the Euphrates River and Tigris River. == Geology == The Taurus Mountains were formed by the collision of the African and Eurasian tectonic plates. The predominant underlying rock is limestone. In the Aladaglar and Bolkar mountains, limestone has eroded to form karstic landscapes of waterfalls, underground rivers, and some of the largest caves of Asia. The Manavgat River originates on the southern slopes of the Beydaglari range. == Climate == The mountains have a Mediterranean climate, with dry summers and rainy winters. Temperatures vary with elevation, with warm winters on the lower coastal slopes and cold winters in the high mountains and in the interior. == Flora and fauna == At lower elevations, the predominant vegetation forest and woodland of evergreen oaks and Turkish pine (Pinus brutia), and areas of maquis shrubland. Above 1200 meters elevation are montane forests of black pine (Pinus nigra), Lebanon cedar (Cedrus libani), Taurus fir (Abies cilicica), and juniper (Juniperus spp.). The high peaks are home to alpine meadows. == History == === Pre-history and early Roman period === The bull was commonly the symbol and depiction of ancient Near Eastern storm gods, hence Taurus the bull, and hence the name of the mountains. The mountains are a place of many ancient storm-god temples. Torrential thunderstorms in these mountains were deemed by the ancient Syrians to be the work of the storm-god Adad to make the
|
{"page_id": 596736, "title": "Taurus Mountains"}
|
is located where the river emerges from the last range of the Eastern Ghats into plains covered with deep alluvial sandy strata. At Polavaram, the river width is about 1,500 metres (4,900 ft). Due to the depth (more than 30 m) of the bedrock at this dam site, the dam project was not found economical to take up. However, a lucrative alternate site is located upstream of the Polavaram site where the river passes through deep gorges of Papi hill range. The width of river is about 300 metres (980 ft) in the rocky gorge stretch. Thirty years back, this alternative was found to be technologically challenging due to the need to connect the reservoir with the irrigation canals via tunnels across the ghat area. Also, it would need a costly underground hydroelectric station, compared to the riverbed-based hydroelectric station. When the project was actually taken up in the year 2004, the old finalised designs at Polavaram site were adopted without re-examining the latest cost of the upstream alternate site in view of state-of-the-art construction technology of tunnels and underground hydroelectric stations. The progress up to the year 2012 in construction of dam structures and the hydroelectric station is almost nil. The alternate site located in the gorge stretch still merits re-examination to reduce the ever-increasing cost of Polavaram dam. The spillway and non-overflow dam are founded on Khondalite bedrock in the Polavaram Project. Khondalites, which are feldspar-rich, often contain soft graphite, hard garnet, etc. in addition to other minerals. Khondalites are highly weathered and hence unsuitable at dam sites. == Technical details == The project reservoir has a live storage of 75.2 tmcft at the canal's full supply level of 41.15 metres (135 ft) MSL and a gross storage of 194 tmcft, thereby enabling irrigation of 2,320,000 acres (940,000
|
{"page_id": 29470091, "title": "Polavaram Project"}
|
feature. == Generalisations == The constant C in (1) can be made smaller at the price of adding another term to the right-hand side. By including a term that involves the gradient of a power of the single particle charge density ρ, the constant C can be improved to 1.45. Thus, for a uniform density system C ≤ 1.45. == References == == Further reading == Lieb, E. H.; Seiringer, R. (2010). The Stability of Matter in Quantum Mechanics. Cambridge University Press. ISBN 978-0-521-19118-0.
|
{"page_id": 44192006, "title": "Lieb–Oxford inequality"}
|
For power semiconductor devices (such as BJT, MOSFET, thyristor or IGBT), the safe operating area (SOA) is defined as the voltage and current conditions over which the device can be expected to operate without self-damage. SOA is usually presented in transistor datasheets as a graph with VCE (collector-emitter voltage) on the abscissa and ICE (collector-emitter current) on the ordinate; the safe 'area' referring to the area under the curve. The SOA specification combines the various limitations of the device — maximum voltage, current, power, junction temperature, secondary breakdown — into one curve, allowing simplified design of protection circuitry. Often, in addition to the continuous rating, separate SOA curves are also plotted for short duration pulse conditions (1 ms pulse, 10 ms pulse, etc.). The safe operating area curve is a graphical representation of the power handling capability of the device under various conditions. The SOA curve takes into account the wire bond current carrying capability, transistor junction temperature, internal power dissipation and secondary breakdown limitations. == Limits of the safe operating area == Where both current and voltage are plotted on logarithmic scales, the borders of the SOA are straight lines: SOA specifications are useful to the design engineer working on power circuits such as amplifiers and power supplies as they allow quick assessment of the limits of device performance, the design of appropriate protection circuitry, or selection of a more capable device. SOA curves are also important in the design of foldback circuits. == Secondary breakdown == For a device that makes use of the secondary breakdown effect see Avalanche transistor Secondary breakdown is a failure mode in bipolar power transistors. In a power transistor with a large junction area, under certain conditions of current and voltage, the current concentrates in a small spot of the base-emitter junction. This
|
{"page_id": 976730, "title": "Safe operating area"}
|
the Latin terminology. With the exception of sabato, the Esperanto names are all from French, cf. French dimanche, lundi, mardi, mercredi, jeudi, vendredi. === Germanic tradition === The Germanic peoples adapted the system introduced by the Romans by substituting the Germanic deities for the Roman ones (with the exception of Saturday) in a process known as interpretatio germanica. The date of the introduction of this system is not known exactly, but it must have happened later than 100 AD but before the introduction of Christianity during the 6th to 7th centuries, i.e., during the final phase or soon after the collapse of the Western Roman Empire. This period is later than the Common Germanic stage, but still during the phase of undifferentiated West Germanic. The names of the days of the week in North Germanic languages were not calqued from Latin directly, but taken from the West Germanic names. Sunday: Old English Sunnandæg (pronounced [ˈsunnɑndæj]), meaning "sun's day". This is a translation of the Latin phrase diēs Sōlis. English, like most of the Germanic languages, preserves the day's association with the sun. Many other European languages, including all of the Romance languages, have changed its name to the equivalent of "the Lord's day" (based on Ecclesiastical Latin dies Dominica). In both West Germanic and North Germanic mythology, the Sun is personified as Sunna/Sól. Monday: Old English Mōnandæg (pronounced [ˈmoːnɑndæj]), meaning "Moon's day". This is equivalent to the Latin name diēs Lūnae. In North Germanic mythology, the Moon is personified as Máni. Tuesday: Old English Tīwesdæg (pronounced [ˈtiːwezdæj]), meaning "Tiw's day". Tiw (Norse Týr) was a one-handed god associated with single combat and pledges in Norse mythology and also attested prominently in wider Germanic paganism. The name of the day is also related to the Latin name diēs Mārtis, "Day of
|
{"page_id": 1277350, "title": "Names of the days of the week"}
|
abnormal wear. Dew Point Measurement Trending Internal corrosion of system components (particularly HP air). When system internals are open and available for inspection. Nonintrusive Flow Measurement Trending Reduced flow through heat exchanger due to fouling. On condition where heat exchanger fouling, not pump condition, is suspected cause. NASA RELIABILITY-CENTERED MAINTENANCE GUIDE FOR FACILITIES AND COLLATERAL EQUIPMENT September 2008 F-9 Table F–13. Correlation of Trace Element Sensing with Other Technologies Technology Correlation Indication When Used Acoustic Leak Detection Time coincident Identifies location of leak requiring repair. Characteristic sonic or ultrasonic signature. On condition to confirm and locate leak. Thermal imaging Time coincident Identifies location of leak requiring repair. “Cool” spots indicate condenser leaks. On condition to confirm and locate leak. Lubricant Wear Particle Analysis Time coincident Trending Trace elements exposed by wear. Continuously monitor and confirm particle presence. Table F–14. Correlation of Ultrasonic Imaging with Other Technologies Technology Correlation Indication When Used Acoustic emission Trending Metal fatigue/intergranular stress corrosion cracking detectable in large metal vessels using ultrasonic imaging. Confirms whether or not acoustic emission indications of metal lattice breakdown are valid. Trace Element Sensing Time coincident Presence and concentration of trace element nuclides indicates erosion/corrosion induced wall thinning. To confirm and measure wall thinning. In Service Stress/Strain, Torque Measurement Trending Monitored stress exceeds yield point of monitored component. To confirm whether actual damage in the form of cracking or thinning has occurred. Radiography Trending Condition of objects being inspected for erosion, corrosion, cracking or exfoliation. When the item being inspected has a surface subject to wall thinning or an internal volume subject to cracking. NASA RELIABILITY-CENTERED MAINTENANCE GUIDE FOR FACILITIES AND COLLATERAL EQUIPMENT September 2008 F-10 Table F–15. Correlation of Radiography with Other Technologies Technology Correlation Indication When Used Acoustic Emission Trending Metal fatigue/intergranular stress corrosion cracking detectable in large metal
|
{"source": 958, "title": "from dpo"}
|
. . . . . . . . . . . . . . . . . . . . 57 3.3 Configuring the processor to include our counter device . . . . . . . . . . . . . . . . . . . . . . . 57 3.4 Testing the counter device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 3.5 Chisel code for counting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 3.6 Measure execution time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 3.7 A writable counter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 8.1 Demo application that initialises and sorts an array. . . . . . . . . . . . . . . . . . . . . . . . . . 90 8.2 Analysis report for the sort application . . . . . . . . . . . . . . . . . . . . . . .
|
{"source": 2314, "title": "from dpo"}
|
with HIV (PWH) with no neuropsychiatric symptoms, switching from raltegravir to dolutegravir containing ART, measured via fMRI in several brain networks using a behavioral stop signal reaction times (SSRT) task that evaluates inhibitory control, the process of being able to suppress interfering information to focus on complex tasks, an important pre-requisite for executive function. Furthermore, poor inhibitory control has been associated with sleep difficulties and cognitive impairment in HIV negative individuals. Different antiretroviral agents and combinations may have differing effects on cerebral function which are well recognised between the different non-nucleoside-reverse-transcriptase-inhibitors and protease inhibitors. Less data exists for differences in cerebral function parameters between the integrase inhibitors and no data exists comparing cerebral function parameters using fMRI in PWH with insomnia switching from dolutegravir to bictegravir (a recently approved integrase inhibitor ART medication associated with less CNS adverse events). In this study we aim to investigate changes in brain fMRI parameters (baseline and 120 days post-switch) in PWH with symptoms of insomnia switching from dolutegravir to bictegravir (23 switching; 23 remaining on previous regimen) with the interaction of interest being switch status x timepoint. We hypothesise that switching will be associated with changes in brain activity measured via whole brain fMRI (thresholded at p<0.05 cluster-wise FWE), and in fronto-striatal connectivity. ### Development of cortical head-direction coding in wild-type and Fmr1 knockout rats **Unique Code:**[PP001272]( **Authors:** Noah Moore - Centre for Discovery Brain Sciences University of Edinburgh, Adrian J. Duszkiewicz - Centre for Discovery Brain Sciences University of Edinburgh, Antonis Asiminas - Centre for Discovery Brain Sciences University of Edinburgh, Peter C. Kind - Centre for Discovery Brain Sciences University of Edinburgh, Paul A. Dudchenko - Division of Psychology University of Stirling, Adrien Peyrache - Montreal Neurological Institute McGIll University, Emma R. Wood -Simons Initiative for the Developing Brain and Centre
|
{"source": 4940, "title": "from dpo"}
|
construct a local collision. While the designers already indicated that there exist boomerangs on at most seven rounds, they had to consider attacks in the single- as well as in the related-key setting. Our described boomerang and rectangle attacks in the single-key setting do not violate their claims, but concretize the security threats in the single-key model and illustrate deeply that Kiasu-BC possesses one round less security than the AES-128 for differential attacks. 5.5.1 Discussion of Further Techniques Being of high interest for practice as well as for advancing cipher design and analysis, the AES is a testing ground for block-cipher cryptanalysis. Similarly, the TWEAKEY constructions and Kiasu-BC can be seen as a test bed for future tweakable block ciphers. Hence, the cryptanalytical efforts that have been applied successfully to the AES, are of similar interest for related tweakable block ciphers. Thus, there exist various directions for analyzing Kiasu-BC. One approach are (1) impossible-differential attacks – which implies similarly strong (2) zero-correlation and (3) statistical saturation attacks [SLR +15]; moreover, (4) integral attacks are well-known to be also applicable to AES-like ciphers due to the properties of the linear layers and the few rounds. Besides those established approaches, a set of more recent developments have also shown been demonstrated to be well applicable on the AES. This covers (5) polytopic, (6) subspace-trail, and (7) yoyo cryptanalysis that all lead 79 CHAPTER 5. DIFFERENTIAL CRYPTANALYSIS OF ROUND-REDUCED KIASU-BC to new highly efficient distinguishers on the AES. Moreover, the application of (8) statistical integral and standard-deviation analysis seems promising to extend integrals. We briefly compare our attacks to those techniques. Impossible Differentials and Similar Techniques. The most successful attacks on the AES-128 with respect to the number of covered rounds are MitM, impossible-differential, and integral attacks. The core gain for the cryptanalyst
|
{"source": 6182, "title": "from dpo"}
|
In the field of molecular biology, gene expression profiling is the measurement of the activity (the expression) of thousands of genes at once, to create a global picture of cellular function. These profiles can, for example, distinguish between cells that are actively dividing, or show how the cells react to a particular treatment. Many experiments of this sort measure an entire genome simultaneously, that is, every gene present in a particular cell. Several transcriptomics technologies can be used to generate the necessary data to analyse. DNA microarrays measure the relative activity of previously identified target genes. Sequence based techniques, like RNA-Seq, provide information on the sequences of genes in addition to their expression level. == Background == Expression profiling is a logical next step after sequencing a genome: the sequence tells us what the cell could possibly do, while the expression profile tells us what it is actually doing at a point in time. Genes contain the instructions for making messenger RNA (mRNA), but at any moment each cell makes mRNA from only a fraction of the genes it carries. If a gene is used to produce mRNA, it is considered "on", otherwise "off". Many factors determine whether a gene is on or off, such as the time of day, whether or not the cell is actively dividing, its local environment, and chemical signals from other cells. For instance, skin cells, liver cells and nerve cells turn on (express) somewhat different genes and that is in large part what makes them different. Therefore, an expression profile allows one to deduce a cell's type, state, environment, and so forth. Expression profiling experiments often involve measuring the relative amount of mRNA expressed in two or more experimental conditions. This is because altered levels of a specific sequence of mRNA suggest a changed
|
{"page_id": 4007073, "title": "Gene expression profiling"}
|
those viruses bound to antibodies are unable to link RBCs, meaning that a test’s positive result due to hemagglutination has been inhibited. On the contrary, if hemagglutination occurs, the test will result negative. Hemagglutination blood typing detection: This method consists of measuring the blood’s reflectance spectrum alone (non-agglutination), and that of blood mixed with antibody reagents (agglutination) using a waveguide-mode sensor. As a result, some differences in reflectance between the samples are observed. Once antibodies are added, blood types and Rh(D) typing can be determined using the waveguide-mode sensor. This technique is able to detect weak agglutinations that are almost impossible to detect with the human eye. ABO blood group determination: Using anti-A and anti-B antibodies that bind specifically to either the A or to the B blood group surface antigens on RBCs, it is possible to test a small sample of blood and determine the ABO blood type of an individual. It does not identify the Rh(D) antigen (Rh blood type). The bedside card method of blood grouping relies on visual agglutination to determine an individual's blood group. The card contains dried blood group antibody reagents fixed onto its surface. A drop of the individual's blood is placed on each blood group area on the card. The presence or absence of flocculation (visual agglutination) enables a quick and convenient method of determining the ABO and Rhesus status of the individual. As this technique depends on human eyes, it is less reliable than the blood typing based on waveguide-mode sensors. The agglutination of red blood cells is used in the Coombs test in diagnostic immunohematology to test for autoimmune hemolytic anemia. In the case of red blood cells, transformed cells are known as kodecytes. Kode technology exposes exogenous antigens on the surface of cells, allowing antibody-antigen responses to be detected
|
{"page_id": 20939260, "title": "Hemagglutinin"}
|
and inside the event horizon (Hartle 2003, chapter 12). == See also == Chasles' theorem (gravitation) Scale height == References ==
|
{"page_id": 2025989, "title": "Shell theorem"}
|
the Sun in all directions. This poses many challenges in data reduction, meaning that the greatest technical challenge of the mission is in ground-processing the images acquired by the four spacecraft. The PUNCH science objectives require measuring the faint sunlight reflected off electrons contained in the corona and solar wind (the extended K-corona). Ten degrees from the Sun, the K-corona is 1000x fainter than the background stars, requiring precise photometric calibration across the individual cameras, to measure and remove the background starfield, galaxy, and related features—which constitute 99.9% of the light incident on the cameras. The camera images are co-aligned to within 0.03 pixel RMS, requiring precise measurement of the optical distortion of each lens system. Point spread function effects, such as optical coma, are identified and removed in the PUNCH data reduction pipeline; and minor photometric errors introduced by data compression are also tracked and eliminated. Polarimetry of the K-corona is affected by the polarization of the starfield itself, which required developing a novel formalism to enable background subtraction while preserving linear polarimetry. The primary PUNCH data product is background-subtracted, polarimetric images produced by the constellation on a 4-minute cadence; these images are made available to everyone via NASA's SDAC facility and the Virtual Solar Observatory. == Collaborations == SwRI is collaborating with the Naval Research Laboratory (NRL) and the Rutherford Appleton Laboratory in Oxfordshire, England, United Kingdom. PUNCH, which will operate in low Earth orbit, will work in synergy with NASA's Parker Solar Probe and ESA's Solar Orbiter. == See also == Explorer program == References == == External links ==
|
{"page_id": 61101394, "title": "Polarimeter to Unify the Corona and Heliosphere"}
|
Ribo is the first social humanoid robot which can speak in Bengali. Ribo was created by RoboSUST, a robotics group of Shahjalal University of Science & Technology, Bangladesh. The team was supervised by Muhammed Zafar Iqbal. Bangladesh Science Fiction Society funded for making this humanoid robot Ribo. Ribo was first appeared in public on 11 December 2015 in a Science Fiction Festival held at the Public Library, Shahbag. == Development history == The team of 11 members of RoboSUST has been working for many robotics projects since it started. The project SUSTU was the inauguration of forming a humanoid robot. It was able to write its name on a paper and follow the directions that had been shown. Bangladesh Science Fiction Society sponsored for a humanoid robot to represent it on the annual Science Fiction Festival. The team then started to work in full swing in November. With huge possibilities, they had been able to display in time the first social humanoid robot in Bangladesh which was named as Ribo. Ribo has 24 degrees of freedom. It is an upper torso robot. It includes the following features: dances, shows facial expressions, handshakes with people, hands up and down when asked to, makes eye contact to the person it's talking to, makes conversation in Bengali, responds to its name. Ribo can understand the facial gestures of people. == Design == Ribo is an upper torso humanoid robot capable of interact with people. It features 24 degrees of freedom. It runs on a Core-2 Duo processor of 6GB RAM with another additional processor for hardware control. Ribo is controlled by Ubuntu and Windows based operating system (OS). The OS powers the robot's multimedia system including a camera, a microphone array with an RGB and depth camera. The microphone array of the Kinect
|
{"page_id": 60344068, "title": "Ribo (robot)"}
|
gases, which contribute to global climate change.” When electricity is produced on-site with a CHP plant, excess heat is recycled to produce both processed heat and additional power. === Waste heat recovery from air conditioning === Waste heat recovery from air conditioning is also used as an alternative to wasting heat to the atmosphere from chiller plants. Heat recovered in summer from chiller plants is stored in Thermalbanks in the ground and recycled back to the same building in winter via a heat pump to provide heating without burning fossil fuels. This elegant approach saves energy - and carbon - in both seasons by recycling summer heat for winter use. Some companies offer products to install on the HVAC Condenser Unit, to collect waste heat that the condenser is supposed to evacuate in the air, to heat up heat-producing devices like water heaters. Those devices are called heat recovery units (HRU). For residential applications, some units available are : HotSpot Energy Heat Recovery Unit or LG Heat Recovery Units For industrial applications, these units are usually called waste heat recovery unit (WHRU). === Heat pumps === Heat pumps and thermal energy storage are classes of technologies that can enable the recycling of energy that would otherwise be inaccessible due to a temperature that is too low for use or a time lag between when the energy is available and when it is needed. While enhancing the temperature of available renewable thermal energy, heat pumps have the additional property of leveraging electrical power (or in some cases mechanical or thermal power) by using it to extract additional energy from a low quality source (such as seawater, lake water, the ground, the air, or waste heat from a process). Innovation efforts are underway now for full electrification of industry, including with Industry
|
{"page_id": 15550386, "title": "Energy recycling"}
|
of bundles of fibres linking the white matter of the two cerebral hemispheres. Its caudal and splenium portions contain fibres that originate from the primary and second auditory cortices, and from other auditory responsive areas. Transcallosal interhemispheric transfer of auditory information plays a significant role in spatial hearing functions that depend on binaural cues. Various studies have shown that despite normal audiograms, children with known auditory interhemispheric transfer deficits have particular difficulty localizing sound and understanding speech in noise. The CC of the human brain is relatively slow to mature with its size continuing to increase until the fourth decade of life. From this point it then slowly begins to shrink. LiSN-S SRT scores show that the ability to understand speech in noisy environments develops with age, is beginning to be adult like by 18 years and starts to decline between 40 and 50 years of age. === Roles of the SOC and the MOC === The medial olivocochlear bundle (MOC) is part of a collection of brainstem nuclei known as the superior olivary complex (SOC). The MOC innervates the outer hair cells of the cochlea and its activity is able to reduce basilar-membrane responses to sound by reducing the gain of cochlear amplification. In a quiet environment when speech from a single talker is being listened to, then the MOC efferent pathways are essentially inactive. In this case the single speech stream enters both ears and its representation ascends the two auditory pathways. The stream arrives at both the right and left auditory cortices for eventual speech processing by the left hemisphere. In a noisy environment the MOC efferent pathways are required to be active in two distinct ways. The first is an automatic response to the multiple sound streams arriving at the two ears, while the second is
|
{"page_id": 32105732, "title": "Spatial hearing loss"}
|
on-line algorithm for K-servers on trees". SIAM Journal on Computing. 20 (1): 144–148. CiteSeerX 10.1.1.53.2395. doi:10.1137/0220008. Fiat, A.; Rabani, Y.; Ravid, Y. (1990). "Competitive k-server algorithms". Proceedings of the 31st Annual IEEE Symposium on Foundations of Computer Science. pp. 454–463. Koutsoupias, Elias; Papadimitriou, Christos H. (1995). "On the k-server conjecture". Journal of the ACM. 42 (5): 971–983. doi:10.1145/210118.210128. S2CID 5813837. Manasse, Mark; McGeoch, Lyle A.; Sleator, Daniel D. (1990). "Competitive algorithms for server problems". Journal of Algorithms. 11 (2): 208–230. doi:10.1016/0196-6774(90)90003-W. Sleator, Daniel D.; Tarjan, Robert E. (1985). "Amortized efficiency of list update and paging rules". Communications of the ACM. 28 (2): 202–208. doi:10.1145/2786.2793. S2CID 2494305.
|
{"page_id": 7767038, "title": "K-server problem"}
|
and Tychonoff (T3+1⁄2) topological space but unlike the usual topology, it not normal (T4). A subset Y ⊆ R d {\displaystyle Y\subseteq \mathbb {R} _{\mathrm {d} }} is nowhere dense (for the density topology) iff it is meagre (ditto) iff it is closed and discrete (ditto) iff it is a null set (in the sense of Lebesgue measure). The Borel subsets of R d {\displaystyle \mathbb {R} _{\mathrm {d} }} (for the density topology) are precisely the Lebesgue-measurable sets; and the complete Boolean algebra of regular open sets of R d {\displaystyle \mathbb {R} _{\mathrm {d} }} can be identified with the "reduced measure algebra", i.e., the Boolean algebra of Lebesgue-measurable sets modulo null sets. Like R {\displaystyle \mathbb {R} } with the usual topology, R d {\displaystyle \mathbb {R} _{\mathrm {d} }} is connected. Like R {\displaystyle \mathbb {R} } with the usual topology, R d {\displaystyle \mathbb {R} _{\mathrm {d} }} is a Baire space; in fact, unlike the usual topology, it is even hereditarily Baire in the sense that every subspace of R d {\displaystyle \mathbb {R} _{\mathrm {d} }} is a Baire space. The compact subspaces of R d {\displaystyle \mathbb {R} _{\mathrm {d} }} are precisely its finite subsets. The approximately continuous functions f : R → R {\displaystyle f\colon \mathbb {R} \to \mathbb {R} } are precisely the continuous functions f : R d → R {\displaystyle f:\mathbb {R} _{\mathrm {d} }\to \mathbb {R} } (i.e., placing the density topology at the source but the usual topology at the target). == Notes == == References == Springer Encyclopedia of Mathematics: article "Density topology" Tall, Franklin D. (1976). "The Density Topology". Pacific Journal of Mathematics. 62: 275–284. doi:10.2140/pjm.1976.62.275. Ciesielski, Krzysztof; Larson, Lee; Ostaszewski, Krzysztof (1994). I {\displaystyle {\mathcal {I}}} -density Continuous Functions. American Mathematical Society.
|
{"page_id": 79370624, "title": "Density topology"}
|
later put into the setting of a boundary value problem by Eberhard Hopf. A breakthrough came with work of Vladimir Scheffer in the 1970s. He showed that if a smooth solution of the Navier−Stokes equations approaches a singular time, then the solution can be extended continuously to the singular time away from, roughly speaking, a curve in space. Without making such a conditional assumption on smoothness, he established the existence of Leray−Hopf solutions which are smooth away from a two-dimensional surface in spacetime. Such results are referred to as "partial regularity." Soon afterwards, Luis Caffarelli, Robert Kohn, and Nirenberg localized and sharpened Scheffer's analysis.[CKN82] The key tool of Scheffer's analysis was an energy inequality providing localized integral control of solutions. It is not automatically satisfied by Leray−Hopf solutions, but Scheffer and Caffarelli−Kohn−Nirenberg established existence theorems for solutions satisfying such inequalities. With such "a priori" control as a starting point, Caffarelli−Kohn−Nirenberg were able to prove a purely local result on smoothness away from a curve in spacetime, improving Scheffer's partial regularity. Similar results were later found by Michael Struwe, and a simplified version of Caffarelli−Kohn−Nirenberg's analysis was later found by Fang-Hua Lin. In 2014, the American Mathematical Society recognized Caffarelli−Kohn−Nirenberg's paper with the Steele Prize for Seminal Contribution to Research, saying that their work was a "landmark" providing a "source of inspiration for a generation of mathematicians." The further analysis of the regularity theory of the Navier−Stokes equations is, as of 2021, a well-known open problem. === Nonlinear elliptic partial differential equations === In the 1930s, Charles Morrey found the basic regularity theory of quasilinear elliptic partial differential equations for functions on two-dimensional domains. Nirenberg, as part of his Ph.D. thesis, extended Morrey's results to the setting of fully nonlinear elliptic equations.[N53a] The works of Morrey and Nirenberg made extensive use
|
{"page_id": 1814725, "title": "Louis Nirenberg"}
|
perhaps if it had, the history of physics might have been very different. But, OK, so in our models time is just the progressive application of rules. But there is a subtlety in exactly how this works that might at first seem like a detail, but that actually turns out to be huge, and in fact turns out to be the key to both relativity and quantum mechanics. At the beginning of this piece, I talked about the rule {{_x_, _y_}, {_x_, _z_}} → {{_x_, _z_}, {_x_, _w_}, {_y_, _w_}, {_z_, _w_}} !Image 46: RulePlot and transform them into four new connections, creating a new element in the process. So each “step” that we showed before actually consists of several individual “updating events” (where here newly added connections are highlighted, and ones that are about to be removed are dashed):  error in answering all pairwise shortest path distances in general graph. !Image 708 distances between vertices on general graphs under weight Differential Privacy (DP) is known as a challenging task. In previous work, to achieve DP with some fixed budget, with high probability the maximal absolute error among all published pairwise distances is roughly O(n) where n is the number of nodes. It was shown that this error could be reduced for some special graphs, which, however, is hard for general graphs. Therefore, whether the approximation error can be reduced to sublinear is posted as an interesting open problem. In this paper, we break the linear barrier on the distance approximation error of previous result, by proposing an algorithm that releases a constructed synthetic graph privately. Computing all pairwise distances on the constructed graph only introduces O(n^{1/2}) error in answering all pairwise shortest path distances for fixed privacy parameter. Our method is based on a novel graph diameter (link length) augmentation via constructing ``shortcuts'' for the paths. By adding a set of shortcut edges to the original graph, we show that any node pair has a shortest path with link length O(n^{1/2}). Then by adding noises with some positive mean to the edge weights, the new graph is differentially private and can be published to answer all pairwise shortest path distances with O(n^{1/2}) approximation error using
|
{"source": 3339, "title": "from dpo"}
|
above and below. When we have only an asymptotic upper bound , we use O-notation. For a given func-tion g.n/ , we denote by O.g.n// (pronounced “big-oh of g of n” or sometimes just “oh of g of n”) the set of functions O.g.n// D f f .n/ W there exist positive constants c and n0 such that 0 f .n/ cg.n/ for all n n0g : We use O-notation to give an upper bound on a function, to within a constant factor. Figure 3.1(b) shows the intuition behind O-notation. For all values n at and to the right of n0, the value of the function f .n/ is on or below cg.n/ .We write f .n/ D O.g.n// to indicate that a function f .n/ is a member of the set O.g.n// . Note that f .n/ D ‚.g.n// implies f .n/ D O.g.n// , since ‚-notation is a stronger notion than O-notation. Written set-theoretically, we have ‚.g.n// O.g.n// . Thus, our proof that any quadratic function an 2 C bn C c,where a > 0 , is in ‚.n 2/ also shows that any such quadratic function is in O.n 2/.What may be more surprising is that when a > 0 , any linear function an C b is in O.n 2/, which is easily verified by taking c D a C j bj and n0 D max .1; b=a/ .If you have seen O-notation before, you might find it strange that we should write, for example, n D O.n 2/. In the literature, we sometimes find O-notation informally describing asymptotically tight bounds, that is, what we have defined using ‚-notation. In this book, however, when we write f .n/ D O.g.n// , we are merely claiming that some constant multiple of g.n/ is
|
{"source": 5230, "title": "from dpo"}
|
phases, which are depicted at the bottom of Figure 3 . The three phases are discussed in more detail below. Because organizations are typically building and deploying many different apps at once, these lifecycle phases often occur concurrently within the same organization and should not be seen as progressive stages of maturity. Instead, think of them as cycles in an engine that is continuously running. In this metaphor, each app is a cylinder within the engine, and different apps may be at different phases of this lifecycle at the same time. > Figure 3:Container Technology Architecture Tiers, Components, and Lifecycle Phases NIST SP 800-190 APPLICATION CONTAINER SECURITY GUIDE 9 > This publication is available free of charge from: http s://doi.org/10.6028/ NIST.SP.800 -190 > 2.3.1 Image Creation, Testing, and Accreditation In the first phase of the container lifecycle, an app’s components are built and placed into an image (or perhaps into multiple images). An image is a package that contains all the files required to run a container. For example, an image to run Apache would include the httpd binary, along with associated libraries and configuration files. An image should only include the executables and libraries required by the app itself; all other OS functionality is provided by the OS kernel within the underlying host OS. Images often use techniques like layering and copy-on-write (in which shared master images are read only and changes are recorded to separate files) to minimize their size on disk and improve operational efficiency. Because images are built in layers, the underlying layer upon which all other components are added is often called the base layer . Base layers are typically minimalistic distributions of common OSs like Ubuntu and Windows Nano Server with the OS kernel omitted. Users begin building their full images by starting with
|
{"source": 6578, "title": "from dpo"}
|
The Ritter reaction (sometimes called the Ritter amidation) is a chemical reaction that transforms a nitrile into an N-alkyl amide using various electrophilic alkylating reagents. The original reaction formed the alkylating agent using an alkene in the presence of a strong acid. == Mechanism and scope == The Ritter reaction proceeds by the electrophilic addition of either a carbenium ion or covalent species to the nitrile. The resulting nitrilium ion is hydrolyzed to the desired amide. Primary, secondary, tertiary, and benzylic alcohols, as well as tert-butyl acetate, also successfully react with nitriles in the presence of strong acids to form amides via the Ritter reaction. A wide range of nitriles can be used. In particular, cyanide can be used to prepare formamides, which are useful precursors to isocyanides, or may also be hydrolysed to give amines. == Applications == A large scale application of the Ritter reaction is in the synthesis of tert-octylamine, by way of the intermediate formamide. This process was originally described by Ritter in 1948, and an estimated 10,000 tons/y (year: 2000) of this and related lipophilic amines are prepared in this way. Otherwise, the Ritter reaction is most useful in the formation of amines and amides of pharmaceutical interest. Real world applications include Merck's industrial-scale synthesis of anti-HIV drug Crixivan (indinavir); the production of the falcipain-2 inhibitor PK-11195; the synthesis of the alkaloid aristotelone; and synthesis of Amantadine, an antiviral and antiparkinsonian drug. Other applications of the Ritter reaction include synthesis of dopamine receptor ligands and production of racemic amphetamine from allylbenzene and methyl cyanide. The Ritter reaction is inferior to most amination methods because it cogenerates substantial amounts of salts. Illustrative is the conversion of isobutylene to tert-butylamine using HCN and sulfuric acid followed by base neutralization. The weight of the salt byproduct is greater
|
{"page_id": 31540845, "title": "Ritter reaction"}
|
The molecular formula C19H26N4O2 may refer to: BIMU8, a drug which acts as a 5-HT4 receptor selective agonist ADB-4en-PINACA, a cannabinoid designer drug Sucrononic acid, a guanidino derivative artificial sweetener
|
{"page_id": 35038731, "title": "C19H26N4O2"}
|
lightweight body. Often referred to as a Micro-D connector system, the connector is suited to a multitude of systems where weight, miniaturization or signal transmission integrity are paramount, such as missiles and their guidance systems, aerospace avionics, radars, shoulder-launched weapon systems, advanced soldier technology systems, military Global Positioning Systems, satellites, medical devices and down-hole drilling tools. The insert arrangements are provided in the associated specification sheets. The Micro-D form factor has become so popular among engineers and systems designers that many manufacturers have begun to offer high speed (up to 10 Gbit/s) and modular versions of the connector. MIL-DTL-83527, (formerly DoD-C-83527 and MIL-C-83527) describes the requirements, quality assurance criteria and test procedures for the design and fabrication of an environment resisting low insertion force, multiple insert rectangular connector used in the electrical/electronic bay areas of military aircraft. The connector provides the electrical interface between the avionics equipment and the equipment rack or tray. These connectors are military unique because they must operate satisfactory at high altitude 50,000 feet (15.2 km), endure 500 hours of salt spray, vibration testing (functional and endurance), shock (30 g's), and temperatures from −65 to +125 °C. These connectors must be used in conjunction with DoD-STD-1842 which describes the insert arrangements for use with MIL-DTL-83527 Rack-to-Panel connectors. The insert arrangements are provided in DOD-STD-1842. MIL-DTL-83538, (formerly MIL-C-83538) describes connectors and accessories, electrical, circular, umbilical. The connector assembly provides the necessary connections required to meet a MIL-STD-1760, Class I electrical interface between stores and their associated launchers using a "blind mating" mechanism. The connector assembly consists of a receptacle installed on the launcher, a receptacle installed on the store, and a buffer plug installed between the two receptacles. This specification also includes the required mounting adapters and nut, accessory adapter, cable bushing, and protective covers. This connector
|
{"page_id": 15470684, "title": "U.S. Military connector specifications"}
|
In database theory and knowledge representation, the certain answers is the set of answers to a given query consisting of the intersection of all the complete databases that are consistent with a given knowledge base. The notion of certain answer, investigated in database theory since the 1970s, is indeed defined in the context of open world assumption, where the given knowledge base is assumed to be incomplete. Intuitively, certain answers are the answers that are always returned when querying a given knowledge base, considering both the extensional knowledge that the possible implications inferred by automatic reasoning, regardless of the specific interpretation. == Definition == In literature, the set of certain answers is usually defined as follows: c e r t ∩ ( Q , D ) = ⋂ { Q ( D ′ ) | D ′ ∈ [ [ D ] ] } {\displaystyle cert_{\cap }(Q,D)=\bigcap \left\{Q(D')|D'\!\in [\![D]\!]\right\}} where: Q {\displaystyle Q} is a query D {\displaystyle D} is an incomplete database D ′ {\displaystyle D'} is any complete database consistent with D {\displaystyle D} [ [ D ] ] {\displaystyle [\![D]\!]} is the semantics of D {\displaystyle D} In description logics, such set may be defined in a similar way as follows: Given an ontology K = ⟨ T , A ⟩ {\displaystyle {\mathcal {K}}=\langle {\mathcal {T}},{\mathcal {A}}\rangle } and a query q ( x → ) {\displaystyle q({\vec {x}})} on K {\displaystyle {\mathcal {K}}} , c e r t ( q , K ) {\displaystyle cert(q,{\mathcal {K}})} is the set of tuples a → ⊆ Γ {\displaystyle {\vec {a}}\subseteq \Gamma } such that, for each model I {\displaystyle {\mathcal {I}}} of K {\displaystyle {\mathcal {K}}} , we have that I ⊨ q [ a → ] {\displaystyle {\mathcal {I}}\models q[{\vec {a}}]} . Where: T {\displaystyle {\mathcal {T}}}
|
{"page_id": 72120709, "title": "Certain answer"}
|
benefit public health. == Causes == Externalities often arise from poorly defined property rights. While property rights to some things, such as objects, land, and money can be easily defined and protected, air, water, and wild animals often flow freely across personal and political borders, making it much more difficult to assign ownership. This incentivizes agents to consume them without paying the full cost, leading to negative externalities. Positive externalities similarly accrue from poorly defined property rights. For example, a person who gets a flu vaccination cannot own part of the herd immunity this confers on society, so they may choose not to be vaccinated. When resources are managed poorly or there are no well-defined property rights, externalities frequently result, especially when it comes to common pool resources. Due to their rivalrous usage and non-excludability, common pool resources including fisheries, forests, and grazing areas are vulnerable to abuse and deterioration when access is unrestrained. Without clearly defined property rights or efficient management structures, people or organizations may misuse common pool resources without thinking through the long-term effects, which might have detrimental externalities on other users and society at large. This phenomenon—famously referred to by Garrett Hardin as the "tragedy of the commons"—highlights people's propensity to put their immediate self-interests ahead of the sustainability of shared resources. Imagine, for instance, that there are no rules or limits in place and that several fishers have access to a single fishing area. In order to maintain their way of life and earn income, fishers are motivated to maximize their catches, which eventually causes overfishing and the depletion of fish populations. Fish populations decrease, and as a result, ecosystems are irritated, and the fishing industry experiences financial losses. These consequences have an adverse effect on subsequent generations and other people who depend on the
|
{"page_id": 61193, "title": "Externality"}
|
A tidal bundle is a sedimentary structure that forms in tidal areas as a result of spring and neap tides. == Overview == A tidal bundle sequence can be seen as a variation in bed thickness with a periodicity of 14 days (diurnal) or 28 days (semidiurnal). During the neap tide, when the tidal current strength is weakest, smaller quantities of finer grains are deposited. As the tidal variation grows larger, towards the spring tide, larger quantities of coarser material will be deposited which results in an increasing bed thickness. Bed thickness will be greatest at the spring tide and then decreases as the tidal variation grows smaller, towards the neap tide again and the thinnest beds. === Significance === The presence of tidal bundles depends on the presence of spring and neap tides, which can only occur in three-body gravitational systems (the Earth, the Sun and the Moon). Therefore, the earliest time from which tidal bundles can be identified gives a conclusive lower bound on the age of the Moon. == See also == Herringbone cross-stratification == References ==
|
{"page_id": 33913790, "title": "Tidal bundle"}
|
be expanded to accommodate three pins and six LEDs, it would look like this: This presents a problem, however: In order for this circuit to act like the previous one, one of the pins must be disconnected before applying charge to the remaining two. If, for example, LED 5 was intended to be lit, X1 must be charged and X3 must be grounded. However, if X2 is also charged, LED 3 would illuminate as well. If X2 was instead grounded, LED1 would illuminate, meaning that LED 5 cannot be lit by itself. This can be solved by utilizing the tri-state logic properties of microcontroller pins. Microcontroller pins generally have several possible states: "output": the pin "drives". It can drive "high" (often 5 V) or "low" (usually 0 V). "input": the pin does not intentionally drive at all, but instead senses what some other device (or pin) is driving. It may draw current while doing so. "high-Z": the pin is in a high-impedance state. Essentially, it is disconnected from the circuit; it will neither drive nor draw any current. This allows the circuit to see any number of pins connected at any time, simply by changing the state of the pins. In order to drive the six-LED matrix above, the two pins corresponding to the LED to be lit are connected to 5 V (I/O pin "high" = binary number 1) and 0 V (I/O pin "low" = binary 0), while the third pin is set in its high-impedance state. In doing so, current leakage out of the third pin is prevented, ensuring that the LED which should be lit is the only one lit. Because the a diode (such as a LED) reduces the voltage available in series, current will not flow across alternate paths (an alternate 2-LED path exists
|
{"page_id": 5906299, "title": "Charlieplexing"}
|
rapidly heat the plasma beyond this so-called "radiation barrier" to hundreds of eV of temperature, where the plasma could be more easily sustained. However, problems with the novel solid-state RF amplifier led to only a fraction of this power being available for heating. As a result, rather than the hundreds of eV hoped for, only 40 eV of temperature was achieved. Furthermore, it was initially hoped for that the plasma could be kept away from the walls of the vacuum vessel by using low-resistance loops of copper that fit snugly around the vessel called "flux conservers." However the plasma was often observed to be in contact with the 40 cm inner diameter quartz vessel. == Legacy == The findings of STX were used to improve the TCS experiment, which eventually did demonstrate FRC formation solely from RMF. The TCS went on to heat the plasma to 350 eV. The idea of using an RMF-driven FRC to create a fusion rocket persists to this day. One example is the Direct Fusion Drive. == References ==
|
{"page_id": 58635628, "title": "Star Thrust Experiment"}
|
improve performance: Providing a cache between the CPU and the main memory. Providing separate caches or separate access paths for data and instructions (the so-called Modified Harvard architecture). Using branch predictor algorithms and logic. Providing a limited CPU stack or other on-chip scratchpad memory to reduce memory access. Implementing the CPU and the memory hierarchy as a system on chip, providing greater locality of reference and thus reducing latency and increasing throughput between processor registers and main memory. The problem can also be sidestepped somewhat by using parallel computing, using for example the non-uniform memory access (NUMA) architecture—this approach is commonly employed by supercomputers. It is less clear whether the intellectual bottleneck that Backus criticized has changed much since 1977. Backus's proposed solution has not had a major influence. Modern functional programming and object-oriented programming are much less geared towards "pushing vast numbers of words back and forth" than earlier languages like FORTRAN were, but internally, that is still what computers spend much of their time doing, even highly parallel supercomputers. === Self-modifying code === Aside from the von Neumann bottleneck, program modifications can be quite harmful, either by accident or design. In some simple stored-program computer designs, a malfunctioning program can damage itself, other programs, or the operating system, possibly leading to a computer crash. However, this problem also applies to conventional programs that lack bounds checking. Memory protection and various access controls generally safeguard against both accidental and malicious program changes. == See also == CARDboard Illustrative Aid to Computation Interconnect bottleneck Little man computer Random-access machine Harvard architecture Turing machine == References == == Further reading == == External links == Harvard vs von Neumann A tool that emulates the behavior of a von Neumann machine JOHNNY: A simple Open Source simulator of a von Neumann machine
|
{"page_id": 478091, "title": "Von Neumann architecture"}
|
occasions, the term is more deliberately used to refer to an object artificially constructed as a counterexample to these properties. A simple example is that from the definition of a triangle having angles which sum to π radians, a single straight line conforms to this definition pathologically. Since half a century we have seen arise a crowd of bizarre functions which seem to try to resemble as little as possible the honest functions which serve some purpose....Nay more, from the logical point of view, it is these strange functions which are the most general....to-day they are invented expressly to put at fault the reasonings of our fathers.... [The Dirichlet function] took on an enormous importance...as giving an incentive for the creation of new types of function whose properties departed completely from what intuitively seemed admissible. A celebrated example of such a so-called 'pathological' function...is the one provided by Weierstrass....This function is continuous but not differentiable. Note for that latter quote that as the differentiable functions are meagre in the space of continuous functions, as Banach found out in 1931, differentiable functions are colloquially speaking a rare exception among the continuous ones. Thus it can hardly be defended any-more to call non-differentiable continuous functions pathological. rigor (rigour) The act of establishing a mathematical result using indisputable logic, rather than informal descriptive argument. Rigor is a cornerstone quality of mathematics, and can play an important role in preventing mathematics from degenerating into fallacies. well-behaved An object is well-behaved (in contrast with being Pathological) if it satisfies certain prevailing regularity properties, or if it conforms to mathematical intuition (even though intuition can often suggest opposite behaviors as well). In some occasions (e.g., analysis), the term "smooth" can also be used to the same effect. == Descriptive informalities == Although ultimately every mathematical argument
|
{"page_id": 1042164, "title": "Glossary of mathematical jargon"}
|
and connected tools or APIs to mediate interactions between the AI and the outside world. It uses the example of connecting an external weather API to the AI model so it can provide real-time weather information based on user input. > Use a tool with Amazon Nova 459 Amazon Nova User Guide for Amazon Nova .NET SDK for .NET Note There's more on GitHub. Find the complete example and learn how to set up and run in the AWS Code Examples Repository . The primary execution of the scenario flow. This scenario orchestrates the conversation between the user, the Amazon Bedrock Converse API, and a weather tool. using Amazon; using Amazon.BedrockRuntime; using Amazon.BedrockRuntime.Model; using Amazon.Runtime.Documents; using Microsoft.Extensions.DependencyInjection; using Microsoft.Extensions.DependencyInjection.Extensions; using Microsoft.Extensions.Hosting; using Microsoft.Extensions.Http; using Microsoft.Extensions.Logging; using Microsoft.Extensions.Logging.Console; namespace ConverseToolScenario; public static class ConverseToolScenario { /* Before running this .NET code example, set up your development environment, including your credentials. This demo illustrates a tool use scenario using Amazon Bedrock's Converse API and a weather tool. The script interacts with a foundation model on Amazon Bedrock to provide weather information based on user input. It uses the Open-Meteo API ( to retrieve current weather data for a given location. */ public static BedrockActionsWrapper _bedrockActionsWrapper = null!; > Use a tool with Amazon Nova 460 Amazon Nova User Guide for Amazon Nova public static WeatherTool _weatherTool = null!; public static bool _interactive = true; // Change this string to use a different model with Converse API. private static string model_id = "amazon.nova-lite-v1:0"; private static string system_prompt = @" You are a weather assistant that provides current weather data for user- specified locations using only the Weather_Tool, which expects latitude and longitude. Infer the coordinates from the location yourself. If the user specifies a state, country, or region, infer the locations of cities
|
{"source": 1707, "title": "from dpo"}
|
for large-scale problems and is very efficient when the data are fewer than the unknowns. In the standard formulation, Tikhonov regularization compensates for the inherent ill- conditioning of linear inverse problems by augmenting the data fidelity term measuring the mismatch between the data and the model output with a scaled penalty functional. The selection of the scaling of the penalty functional is a core problem in Tikhonov regularization. If an estimate of the amount of noise in the data is available, a popular way is to use the Morozov discrepancy principle, stating that the scaling parameter should be chosen so as to guarantees that the norm of the data fitting error is approximately equal to the norm of the noise in the data. A too small value of the regularization parameter would yield a solution that fits to the noise (too weak regularization) while a too large value would lead to an excessive penalization of the solution (too strong regularization). In many applications, it would be preferable to apply distributed regularization, replacing the regularization scalar by a vector valued parameter, so as to allow different regularization for different components of the unknown, or for groups of them. Distributed regularization is particularly well suited when the data have significantly different sensitivity to different components, or to promote sparsity of the solution. The numerical scheme that we propose for distributed regularization exploits the Bayesian interpretation of the inverse problem and identifies Tikhonov regularization with the Maximum A Posteriori (MAP) estimation. A clever combination of numerical linear algebra and numerical optimization layered on top of a probabilistic framework makes the scheme computationally efficient and suitable for problems where the matrix is not explicitly available. Moreover, in the case of underdetermined problems, passing through the adjoint formulation in data space may lead to substantial
|
{"source": 3883, "title": "from dpo"}
|
that only one identification scheme has been submitted). For FPGAs, benchmarking efforts have been fo-cused on legacy block ciphers and digital signature schemes. The project has attempted to evaluate to which extent implementations could be made more resis-tant against side channel attacks (such as timing attacks , power attacks , and fault analysis [3, 4]). ## Tools The NESSIE project has developed two types of tools. The general tools are not specific for the algo-rithms to be analyzed. Special tools, which are spe-cific for the analysis of one algorithm, have been developed when a special tool was required for the cryptanalysis of an algorithm. For the evaluation of the symmetric submis-sions, a comprehensive set of general tools was available within the project. These tools are in part based on an improved version of the statis-tical tools developed by the RIPE (RACE Integrity Primitives Evaluation) project . As expected, all the submitted algorithms passed these tests. In September 2000, the US NIST published a suite of statistical tests for the evaluation of se-quences of random or pseudo-random bits; this document has been revised in December 2000 . A careful comparison has been made between the RIPE and NIST test suites. 410 NESSIE project The NESSIE project has also developed a new generic tool to analyze block ciphers with differen-tial and linear cryptanalysis . This tool is based on a general description language for block ciphers. THE NESSIE S UBMISSIONS ## Response to the NESSIE Call The cryptographic community has responded very enthusiastically to the call. Thirty-nine algo-rithms have been received (43 when counting vari-ants) along with one proposal for a testing method-ology. After an interaction process, which took about 1 month, all submissions complied with the requirements of the call. The 26 symmetric algo-rithms include 17 block ciphers, which is
|
{"source": 5836, "title": "from dpo"}
|
magazine (July 1981): "Stephen Jay Gould states that creationists claim creation is a scientific theory. This is a false accusation. Creationists have repeatedly stated that neither creation nor evolution is a scientific theory (and each is equally religious)." Popper responded to news that his conclusions were being used by anti-evolutionary forces by affirming that evolutionary theories regarding the origins of life on Earth were scientific because "their hypotheses can in many cases be tested." Creationists claimed that a key evolutionary concept, that all life on Earth is descended from a single common ancestor, was not mentioned as testable by Popper, and claimed it never would be. In fact, Popper wrote admiringly of the value of Darwin's theory. Only a few years later, Popper wrote, "I have in the past described the theory as 'almost tautological' ... I still believe that natural selection works in this way as a research programme. Nevertheless, I have changed my mind about the testability and logical status of the theory of natural selection; and I am glad to have an opportunity to make a recantation." His conclusion, later in the article is "The theory of natural selection may be so formulated that it is far from tautological. In this case it is not only testable, but it turns out to be not strictly universally true." Debate among some scientists and philosophers of science on the applicability of falsifiability in science continues. Simple falsifiability tests for common descent have been offered by some scientists: for instance, biologist and prominent critic of creationism Richard Dawkins and J. B. S. Haldane both pointed out that if fossil rabbits were found in the Precambrian era, a time before most similarly complex lifeforms had evolved, "that would completely blow evolution out of the water." Falsifiability has caused problems for creationists:
|
{"page_id": 1115768, "title": "Rejection of evolution by religious groups"}
|
In particle physics, the Breit frame (also known as infinite-momentum frame or IMF) is a frame of reference used to describe scattering experiments of the form A + B → A + ∑ C i {\displaystyle A+B\rightarrow A+\sum C_{i}} , that is experiments in which particle A scatters off particle B, possibly producing particles C i {\displaystyle C_{i}} in the process. The frame is defined so that the particle A has its momentum reversed in the scattering process. Another way of understanding the Breit frame is to look at the elastic scattering A + γ → A ′ {\displaystyle A+\gamma \rightarrow A'} . The Breit frame is defined as the frame in which p → A + p → A ′ = 0 {\displaystyle {\vec {p}}_{A}+{\vec {p}}_{A'}=0} . There are different occasions when Breit frame can be useful, e.g., in measuring the electromagnetic form factor of a hadron, A {\displaystyle A} is the scattered hadron; while for deep inelastic scattering process, the elastically scattered parton should be considered as A {\displaystyle A} . It is only in the latter case the Breit frame gets related to infinite-momentum frame. It is named after the American physicist Gregory Breit. == See also == Center-of-momentum frame Laboratory frame of reference == References ==
|
{"page_id": 50226212, "title": "Breit frame"}
|
and processing have already been discussed where appropriate for each group. === Humans === The initial components of the gastrointestinal tract are the mouth and the pharynx, which is the common passage of the oral and nasal cavities. The pharynx leads to the esophagus, a muscular tube that delivers food to the stomach, where some preliminary digestion occurs; here, the digestion is extracellular. From the stomach, food passes to the small intestine, where a battery of digestive enzymes continue the digestive process. The products of digestion are absorbed across the wall of the intestine into the bloodstream. What remains is emptied into the large intestine, where some of the remaining water and minerals are absorbed; here the digestion is intracellular. == See also == Saprotrophic nutrition == References ==
|
{"page_id": 2541868, "title": "Extracellular digestion"}
|
GP Andromedae (often abbreviated to GP And) is a Delta Scuti variable star in the constellation Andromeda. It is a pulsating star, with its brightness varying with an amplitude of 0.55 magnitudes around a mean magnitude of 10.7. == System == GP Andromedae is a main sequence Population I star of spectral type A3, placing it in the instability strip of the Hertzsprung-Russell diagram where Delta Scuti variables lay. A visual companion star 11 arcseconds away, named TYC 1739-1526-2, shares a common proper motion and has a similar distance (measured by parallax) as GP Andromedae. There is no proof, however, that the two stars are gravitationally bound. == Variability == The observed variability of GP Andromedae is typical for a Delta Scuti variable; it's a purely monoperiodic radial pulsating star with a period of 0.0787 days. The period of pulsations is slowly and continuously increasing, matching the predictions of stellar evolution models for Delta Scuti variables. == References ==
|
{"page_id": 58995821, "title": "GP Andromedae"}
|
a series of arsons in Arizona. Using similar tactics to the ELF, they have caused more than US$5 million in damages. Media reports have tied Ted Kaczynski, also known as the Unabomber, to environmental activists, and say that the 23 injuries and three deaths through letter-bombs were the acts of an independent eco-terrorist. Among those making such accusations were ABC, The New York Times, Time magazine, and USA Today. A number of "local" organizations have also been indicted under US Federal laws related to eco-terrorism. These include, among others, the group Stop Huntingdon Animal Cruelty. Another example is the Hardesty Avengers who spiked trees in the Hardesty Mountains in Willamette National Forest in 1984. In 2008 the Federal Bureau of Investigation said eco-terrorists represented "one of the most serious domestic terrorism threats in the U.S. today" citing the sheer volume of their crimes (over 2,000 since 1979); the huge economic impact (losses of more than US$110 million since 1979); the wide range of victims (from international corporations to lumber companies to animal testing facilities to genetic research firms); and their increasingly violent rhetoric and tactics (one recent communiqué sent to a California product testing company said: "You might be able to protect your buildings, but can you protect the homes of every employee?"). Unclear, however, is the extent informants and controversial FBI entrapment operations play in creating eco-terrorist groups and furthering criminal acts. In 2015, so-called "green anarchist" Eric McDavid was freed from a 2007 conviction after it was disclosed the FBI operated a program to lure unsuspecting activists via "blatant entrapment." The 2007 conviction had been cited by the FBI in its 2008 claim eco-terrorism was a significant threat. The National Animal Interest Alliance in their animal rights extremism archives compiled a comprehensive list of major animal rights extremist
|
{"page_id": 303522, "title": "Eco-terrorism"}
|
2014 for a term from January 1, 2015 to December 31, 2017. In Its management, has developed actions in the national scenario to strengthen the Brazilian Engineering and the participation of professionals in the quotidian of the public policies that involve the technological areas. It has defended legality and transparency, guiding the activities of the Council with a focus on defending society and guaranteeing the sustainability of the Confea / Crea and Mútua System. == Plenary == The purpose of the Confea Plenary is to assess and decide on matters related to the competencies of the Federal Council. It is constituted by a president and by 18 federal councilors, according to the provisions of specific regulations, being renewed annually in one third. It is the plenary that appreciates and decides on draft resolutions aimed at regulating and executing the law and on draft normative decision aimed at establishing understandings or determining procedures for unity of action of the Confe / Crea System. The Plenary also regulates integration issues with the state and society, the qualification and professional supervision, and economic and financial control; Appreciates and decides on the normative act of Crea, among several other competences. More information about the Plenary and its competence can be found in Rules of Confea, approved by Resolution No. 1.015 / 2006. == Workgroups == Resolution No. 1,015 of June 30, 2006, which approves the Federal Council of Engineering, Architecture and Agronomy, created the possibility of having working groups to subsidize the execution of Federal actions. === Workgroups in force === Established by the Confea Plenary, the working groups deal with issues ranging from structural issues of the system and studies for changes in existing laws and regulations (such as shadowing assignments with other professions and advice and representation of mid-level technicians In plenary
|
{"page_id": 52763975, "title": "Federal Council of Engineering and Agronomy"}
|
vulnerability) Trusted Computing Trusted Execution Technology Trusted Platform Module == References == == External links == Intel® Converged Security and Management Engine Version Detection Tool (Intel® CSMEVDT) (Intel-SA-00086 security vulnerability detection tool) from Intel Download Center Behind the Scenes of Intel Security and Manageability Engine – A presentation by Intel security researchers presented in Black Hat USA 2019
|
{"page_id": 42053808, "title": "Intel Management Engine"}
|
the temperature and pH value of the environment where pH9 is the controlling value. Under a condition of pH lower than 9, silica precipitates out of the fluid; when the pH value is above 9, silica becomes highly soluble. === Permeation === In the silicification of woods, silica dissolves in hydrothermal fluid and seeps into lignin in cell walls. Precipitation of silica out of the fluids produces silica deposition within the voids, especially in the cell walls. Cell materials are broken down by the fluids, yet the structure remains stable due to the development of minerals. Cell structures are slowly replaced by silica. Continuous penetration of siliceous fluids results in different stages of silicification i.e. primary and secondary. The loss of fluids over time leads to the cementation of silicified woods through late silica addition. The rate of silicification depends on a few factors: 1) Rate of breakage of original cells 2) Availability of silica sources and silica content in the fluid 3) Temperature and pH of silicification environment 4) Interference of other diagenetic processes These factors affect the silicification process in many ways. The rate of breakage of original cells controls the development of the mineral framework, hence the replacement of silica. Availability of silica directly determines the silica content in fluids. The higher the silica content, the faster silicification could take place. The same concept applies to the availability of hydrothermal fluids. The temperature and pH of the environment determine the condition for silicification to occur. This is closely connected to the burial depth or association with volcanic events. Interference of other diagenetic processes could sometimes create disturbance to silicification. The relative time of silicification to other geological processes could serve as a reference for further geological interpretations. == Examples == === Volcanic rocks === In the Conception
|
{"page_id": 68834254, "title": "Silicification"}
|
State Scientific Research Institute of Aviation Systems or GosNIIAS for short (Russian: ГосНИИАС) is a Russian aerospace research centre. Founded by the decree of the Council of Ministers of the USSR on 26 February 1946 from a number of laboratories of the Flight Research Institute for operations research and aviation weapons systems development. The new institute was named NII-2. In March 1994 the institute was re-named with its current name (GosNIIAS). Initially, the institute was located in the buildings of the former Sergievo-Elizabethan Asylum. In GosNIIAS, there are six basic departments leading students and graduate students from three universities: Department FUPM MIPT “Avionics. Control and Information Systems. Organized in 1969, head. the department - academician E. A. Fedosov. Department MAI “System design of air complexes”. Organized in 1969, head. the department - doctor of technical sciences V. A. Stefanov. Department MAI "External design and efficiency of aviation complexes". Organized in 1973, head. Department - Doctor of Technical Sciences A. M. Zherebin. Department MAI "Systems of automatic and intelligent control." Organized in 1942, head. Department - Academician of the Russian Academy of Sciences S. Y. Zheltov. Department MIREA "Aviation and space information processing and control systems". Organized in 2002, head. Department - Corresponding Member of the Russian Academy of Sciences G. G. Sebryakov. Department MIREA "Avionics". Organized in 1988, head. Department - Academician of the Russian Academy of Sciences E. A. Fedosov. == Bibliography == List of GosNIIAS publications in the Scientific electronic library elibrary.ru == Notes == == References ==
|
{"page_id": 14609028, "title": "State Scientific Research Institute of Aviation Systems"}
|
and acoustics. It is also the fundamental principle behind the spring scale, the manometer, the galvanometer, and the balance wheel of the mechanical clock. The modern theory of elasticity generalizes Hooke's law to say that the strain (deformation) of an elastic object or material is proportional to the stress applied to it. However, since general stresses and strains may have multiple independent components, the "proportionality factor" may no longer be just a single real number, but rather a linear map (a tensor) that can be represented by a matrix of real numbers. In this general form, Hooke's law makes it possible to deduce the relation between strain and stress for complex objects in terms of intrinsic properties of the materials they are made of. For example, one can deduce that a homogeneous rod with uniform cross section will behave like a simple spring when stretched, with a stiffness k directly proportional to its cross-section area and inversely proportional to its length. == Formal definition == === Linear springs === Consider a simple helical spring that has one end attached to some fixed object, while the free end is being pulled by a force whose magnitude is Fs. Suppose that the spring has reached a state of equilibrium, where its length is not changing anymore. Let x be the amount by which the free end of the spring was displaced from its "relaxed" position (when it is not being stretched). Hooke's law states that F s = k x {\displaystyle F_{s}=kx} or, equivalently, x = F s k {\displaystyle x={\frac {F_{s}}{k}}} where k is a positive real number, characteristic of the spring. A spring with spaces between the coils can be compressed, and the same formula holds for compression, with Fs and x both negative in that case. According to this
|
{"page_id": 229553, "title": "Hooke's law"}
|
The newest Talmud research will have to also concern itself with ritual-murder. A study group cannot help but begin with ethnology, in order to put the research on the broadest possible basis. F. W. Ghillany(1), who was silenced by death, already blazed the trail a hundred years ago. If our own historical investigations could be extended in this direction -- of the Talmudists and ethnologists -- this would be their greatest reward. However, one should not be allowed to forget that for centuries, Jewry itself has taken care to work to "clear things up." Already, in printings of the Talmud of the 15th century, various printers had "left white, empty spots in many passages, in order to avoid as much as possible the chance of attack by non-Jews."(2) Thus the Amsterdam edition of the Talmud appears as "revised" in 1644, and the editions following in the next two centuries have also been still more thoroughly "checked." In Damascus, the former Rabbi Moses Abu-el-Afieh, having converted to Islam, spoke about this on the occasion of the ritual-murder trial in 1840 and said that in the editions of the Talmud which were intended for Europe, "empty places" were left in the books. At the inquiry of the Court's Chairman, as to what purpose these empty places served, Moses gave the diplomatic response: "In order to fill these up with the names of those (non-Jewish) peoples, and everything that concerns them.(3) It is extremely informative to discover in this connection that already, in the Trent ritual-murder trial of the year 1475, a colleague of this Rabbi, Samuel, stated that the Italian Jews had nothing "of this" in their books; but probably writings "about it" would be found (376)with the Jews beyond the Ocean(4)! Rohling correctly assumes that these "writings beyond the ocean" were
|
{"source": 959, "title": "from dpo"}
|
for Microequivalence In this section, we evaluate how the idea of partitioning the ROB can help us to develop a template for microequivalence based on our abstract out-of-order model. The template can be refined for any concrete out-of-order processor implementation. In the following, the ROB ID of the highest (= oldest in terms of program order) mispredicted SPI in the hierarchy, Inst n in Fig. 7.2, is denoted by root_ID .The ROB is partitioned into two sets: 58 Chapter 7. UPEC for Advanced Microarchitectural Features Head > ROB ID Speculation Tag > ROB ID Speculation Tag > ROB ID Speculation Tag > FU 1 > FU 2 > Decode > & > Dispatch > Instruction > 0 > 1 > 2 > 3 > 4 > 5 > 6 > 7 > Prediction Unit : > Instruction > Tail > Branch > Load > 0 > 1 > 0 > 1 > inst > inst > inst 0 > Will commit > (Main Sequence ) > Will be squashed (Transient) > Will be squashed > (Transient) > root_ID > Committable IDs > Uncommittable IDs > ROB > Issue Station Figure 7.4: Partitioning of the ROB > • Committable set : ROB slots with an ID that is before the root_ID , i.e., ROB IDs which are between ROB head and root_ID . Instructions in these slots can commit their results. > • Uncommittable set : ROB slots with an ID that is after the root_ID , i.e., ROB IDs which are not between ROB head and root_ID . Instructions in these slots cannot commit their results. They are squashed when the misprediction signal is asserted. Fig. 7.4 visualizes the idea of partiotining the ROB using the abstract out-of-order model. Based on the partitioning of the ROB, we describe three sets
|
{"source": 2328, "title": "from dpo"}
|
Day! Wed Nov 21 17:55:22 2001 eat lots of turkey, watch a bunch of football, and pass out on the couch from the triptophan... if you're bored, download this from Microsoft so your IE browser isn't as bug-ridden and easy to hack. - Myke Komarnitsky We hit the 2k mark Wed Nov 21 08:52:33 2001 I was wondering if we were going to top over 2000 before thanksgiving... and then wake up to find Jeff Lockyer went crazy and pushed us over the top. Thanks Jeff, and thanks to all of you who make this site what it is - the best damn climbing site on the internet, period. - Myke Komarnitsky Same Account for Sister Sites Tue Nov 20 14:29:23 2001 okay, work's done. Now your account (if you sign up, and you should, you freeloader) will be the same across all three sites - makes sense too, with all the climbers around here making the weekend drive over to indian creek. When you go to the moab or salt lake site, just click on contribute, and enter your email address on the right side. boom, you're done! All the people who already had two accounts, I've merged them, so you're already set to go. - Myke Komarnitsky Database Shakeup Tue Nov 20 13:33:29 2001 Once again, I'm doing a bunch of work behind the scenes... this time it's how it tracks and records people and their contributions. Let me know if you see any mistakes... except for Kreighton, I meant to blow all your contributions away. :-) - Myke Komarnitsky 560,000 hits last month Fri Nov 16 13:20:23 2001 I had an amazing conversation with a marketing genius today... and I realized that hits are a bigger number than page views, so it's better. I love marketing logic...
|
{"source": 4945, "title": "from dpo"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.