text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
we define explicit privacy attributes and implicit privacy attributes as follows: ![Image 3: thumbnail. Note that explicit privacy attributes refer to traditional privacy attributes in this paper. **Definition 2** ((_θ_, _β_)-implicit privacy attribute). Given a dataset _D_ = (**_x_**, _s_), including the public attributes **_x_** and an explicit privacy attribute _s_ (_e.g._, income, disease status), each attribute in **_x_**_p_ ⊆ **_x_** is said to be a (_θ_, _β_)-implicit privacy attribute for _s_ with the correlation metric _ρ_ and the performance metric _τ_ if a classification algorithm _f_ : **_x_**_p_ → _s_ exists, such that τ(f(x p),s)≥β,(6) where **_x_**_p_ = {_x_ _i_|_ρ_(_x_ _i_, _s_)≥_θ_, _x_ _i_ ∈ **_x_**}, _ρ_(*, *) is a function that measures the correlation between two attributes, such as the normalized mutual information [( ( and Pearson correlation coefficient [( and _τ_ represents performance measurement of classifiers, such as Accuracy and F1-score. Here the performance threshold _β_ with higher values indicates the higher prediction performance from **_x_**_p_ to _s_ by _f_. The selection of _β_ depends on the tolerance of implicit privacy disclosure. With a high risk of implicit privacy disclosure tolerated, we can select a larger _β_ to obtain higher data utility. Otherwise, we can select a smaller _β_ to achieve better privacy protection. Similarly, as a correlation threshold, the higher _θ_ indicates that each attribute selected has a higher correlation with _s_. Generally speaking, the stronger the correlation between **_x_**_p_ and _s_, the stronger the predictive ability from **_x_**_p_ to _s_. For example, in the feature engineering, we also select the features that are
|
{"source": 6206, "title": "from dpo"}
|
The Linde–Frank–Caro process is a method for hydrogen production by removing hydrogen and carbon dioxide from water gas by condensation. The process was invented in 1909 by Adolf Frank and developed with Carl von Linde and Heinrich Caro. == Process description == Water gas is compressed to 20 bar and pumped into the Linde–Frank–Caro reactor. A water column removes most of the carbon dioxide and sulfur. Tubes with caustic soda then remove the remaining carbon dioxide, sulphur, and water from the gas stream. The gas enters a chamber and is cooled to −190 °C, resulting in the condensation of most of the gas to a liquid. The remaining gas is pumped to the next vessel where the nitrogen is liquefied by cooling to −205 °C, resulting in hydrogen gas as an end product. == See also == Water gas shift reaction Timeline of hydrogen technologies Frank–Caro process, another process used to produce cyanamide from calcium carbide and nitrogen gas in an electric furnace == References ==
|
{"page_id": 22423074, "title": "Linde–Frank–Caro process"}
|
when confronted with 5-oxo-ETE rapidly metabolize it to 5(S)-HETE. However, cells undergoing aging, senescence, apoptosis, oxidative stress, or other conditions that raise their levels of reactive oxygen species (e.g. superoxide anion, oxygen radicals, and peroxides) either physiologically (e.g. human phagocytes engulfing bacteria) or pathologically (e.g. oxidatively challenged B-lymphocytes) use up NADP+, have low NADPH/NADP+ ratios, and therefore readily convert 5(S)-HETE to 5-oxo-ETE. Thus, many pathological conditions that involve oxidative stress such as occurs in rapidly growing cancers may be important promoters of 5-oxo-ETE accumulation in vivo. 5-Oxo-ETE can also be made from either 5(S)-HpETE (and possibly 5(R)-HpEPE) by the action of cytochrome P450 (CYP) enzymes such as CYP1A1, CYP1A2, CYP1B1, and CYP2S1, or from 5(S)-HETE (and probably 5(R)-HETE) by the non-enzymatic attack with heme or various other dehydrating agents. It may also form by the conversion of 5-(S)-HpETE or 5(R)-HpETE to 5-oxo-ETE due to the action of a mouse macrophage 50–60 kilodalton cytosolic protein. The contribution of the latter three pathways to the physiological production of 5-oxo-ETE has not been fully evaluated. An isomer of 5-oxo-ETE, 5-oxo-(7E,9E,11Z,14Z)-eicosatetraenoic acid, forms non-enzymatically as a byproduct of hydrolyses of the 5-lipoxgenase metabolite, leukotriene A4. This byproduct differs from 5-oxo-ETE not only in the position and geometry of its double bounds but also in its activity: it stimulates human neutrophils apparently by acting on one or more LTB4 receptors rather than OXER1. == Tissue sources == === Cellular production === Human neutrophils, monocytes, eosinophils, B-lymphocytes, dendritic cells, platelets, airway epithelial cells and smooth muscle cells, vascular endothelial cells, and skin keratinocytes have been found and/or suggested to make 5-oxo-ETE from endogenous or exogenous 5-HETE, particularly under conditions of oxidative stress; cell lines derived from human cancers such as those from breast, prostate, lung, colon, and various types of leukemia have likewise been shown to
|
{"page_id": 47891463, "title": "5-Oxo-eicosatetraenoic acid"}
|
Operation Red Hat was a United States Department of Defense movement of chemical warfare munitions from Okinawa, Japan to Johnston Atoll in the North Pacific Ocean, which occurred in 1971. == Background == U.S. chemical weapons were brought into Okinawa in 1962 based on the recommendation of Secretary of Defense Robert McNamara, according to declassified documents. In 1970, U.S. Defense Secretary Melvin Laird met Japan Defense Agency chief Yasuhiro Nakasone, and said that the United States had received information that North Korea had a supply of chemical weapons. The move of U.S. chemical weapons to Okinawa in 1962 was meant to serve as a deterrent. The Red Hat code name was assigned by the Assistant Chief of Staff for Intelligence, Department of the Army, on November 12, 1962, during the planning to deploy chemical agents to the 267th Chemical Platoon on Okinawa. The 267th Chemical Platoon (Service) was activated on Okinawa on December 1, 1962 at Chibana Ammunition Depot. The depot was a hill-top installation next to Kadena Air Base. During this deployment, "Unit personnel were actively engaged in preparing RED HAT area, site 2 for the receipt and storage of first increment items, [shipment] "YBA", DOD Project 112." The company received further shipments, code named YBB and YBF, which according to declassified documents also included sarin, VX, and mustard gas. By 1969, according to later newspaper reports, there was an estimated 1.9 million kg (1,900 metric tons) of VX stored on Okinawa. In 1969, over 20 personnel (23 U.S. soldiers and one U.S. civilian, according to other reports) were exposed to low levels of the nerve agent sarin while sandblasting and repainting storage containers. The resultant publicity appears to have contributed to the decision to move the weapons off Okinawa. Chemical agents were stored in the high security Red
|
{"page_id": 4859968, "title": "Operation Red Hat"}
|
References == This article incorporates public domain material from The World Factbook. CIA. == External links == Official website
|
{"page_id": 43014103, "title": "Tuvalu Telecommunications Corporation"}
|
of the ‘Mannheim’. The result, in 1944, was the Ansbach. It had a collapsible reflector of diameter 4.5 meters, operating on a wavelength of 53.6 cm, and peak power of 8 kW, giving it a normal range 25–35 km (70 km in search mode) with an accuracy of 30–40 meters. Azimuth and elevation accuracy was around ±0.2°. The antenna and reflector were remote controlled from a Bayern control van up to 30 meters away. The control system was based on the remote control system of the Michael microwave communication system, this was based on the Ward-Leonard AC/DC control system. The Ansbach was to be installed in large Flak batteries with six or more guns, but only a few were produced by the end of the war, and these did not see operational service == Medium-range search == === Freya & similar units === FuMG 450 Freya / FuMG 41G: This was a 2D Early warning radar. (2D means unable to indicate height). It was used for fighter direction and target indication for the Würzburg. Operating wavelength of approx 2.4 meters (125 MHz). In response to jamming various models were developed to operate on various frequencies called "Islands". Over 1000 units delivered in various models FuMG 401 / FMG 42 FREYA - LZ (Models A - D). An Air portable version, the model differences were due to an operating frequency range being in 4 discrete bands between 91 and 200 MHz. Freya-Rotschwarz and Freya-Grünschwarz: These two systems were Freya modified to operate on the same frequency as the British radio navigation system GEE to avoid jamming. However, as by the time they were ready the Germans were jamming GEE it is not clear whether any were ever deployed. FuMG 451 A Freya Flamme: Freya which had been built to use the
|
{"page_id": 49072410, "title": "Luftwaffe and Kriegsmarine radar equipment of World War II"}
|
opponent wherever the operator pleases: these were called grapplers. Diesector, the superheavyweight champion of BattleBots 2.0 and 5.0, combined an electric clamper with smaller hammer arms. Middleweight BattleBots 4.0 runner-up Complete Control was another successful lifting clamper. Big Nipper, a horizontal grabber/lifter, won several untelevised championships in the UK after the end of Robot Wars. Bite Force won the 2015 season of BattleBots using a grabbing arm as its only form of weaponry, though in subsequent series its design was modified into a vertical spinner on a four-wheeled chassis. Crusher – Crushers are similar to grabbers, though they emphasize damage via one or more piercing hydraulic arms. Like flywheels, crushers can be separated into horizontal and vertical variants. Robot Wars Series 5 champion Razer was the first vertical crusher, and by far the most successful of its era. Another UK-built vertical crusher, Spectre, won the first King of Bots tournament in 2018, and has competed in BattleBots 2019 and 2023 under the name Quantum. Two-time Robot Wars Annihilator champion Kan-Opener was armed with a pair of horizontal crushing claws, one of the few examples of a successful horizontal crusher. === Hammers and axes === Swinging an overhead axe, spike, or hammer at high speed onto an opponent offers another method of attacking the vulnerable top surface. The weapon is typically driven by a pneumatic or electric actuator via a rack and pinion or direct mechanical linkage. The attack may damage the opposing robot directly or may lodge in their robot and provide a handle for dragging them toward a trap. Several successful hammerbots have been designed by UK's Team Hurtz: Battlebots 1.0 heavyweight semi-finalist Killerhurtz was armed with a spike-headed pneumatic axe, Robot Wars Series 6 grand finalist Terrorhurtz possessed a two-bladed pneumatic axe, and Battlebots 2016 quarter-finalist Beta utilized
|
{"page_id": 1657350, "title": "Robot combat"}
|
to identify mutations in the TTR gene, but may include other corroborative investigation. Nerve conduction testing typically shows an axonal polyneuropathy, with sensory involvement greater than motor. Superimposed mononeuropathies may also be evident, such as a median mononeuropathy at the wrist (carpal tunnel syndrome). Electromyography (EMG) may show evidence of chronic denervation and reinnervation. Autonomic testing, including quantitative sweat testing, can reveal involvement of the autonomic nervous system. Occasionally, biopsy of skin, nerve, or muscle may be performed, which can show signs of denervation and amyloid deposition with response to anti-TTR antibodies. Additional testing should be performed to identify involvement of the heart or kidneys. Sudomotor function through electrochemical skin conductance may provide a measure of subclinical autonomic involvement. == Treatments == The medication tafamidis has been approved for the treatment of transthyretin familial amyloid polyneuropathy in Europe. Studies have found that it delays neurological problems when started early. The US Food and Drug Administration's Peripheral and Central Nervous System Drugs Advisory Committee rejected the drug in June 2012, in a 13–4 vote. The committee stated that there was not enough evidence supporting efficacy of the drug, and requested additional clinical trials. In May 2019, the FDA approved two tafamidis preparations for the treatment of transthyretin-mediated cardiomyopathy, but has not approved it for the treatment of transthyretin familial amyloid polyneuropathy. In August 2018, the FDA approved patisiran, an siRNA-based treatment, at an expected cost of up to $450,000 per year. In August 2021 six patients with hereditary ATTR amyloidosis with polyneuropathy were given doses of NTLA-2001, based on a CRISPR gene editing system. Researchers reported mild adverse events and decreases in serum misfolded transthyretin protein concentrations through targeted knockout. Eplontersen (Wainua) was approved for medical use in the United States in December 2023. == Prognosis == In the absence of
|
{"page_id": 6154342, "title": "Familial amyloid polyneuropathy"}
|
NGC 4030 is a grand design spiral galaxy located about 64 million light years away in the constellation Virgo. It is a member of the NGC 4030 Group of galaxies, which is a member of the Virgo II Groups, a series of galaxies and galaxy clusters strung out from the southern edge of the Virgo Supercluster. With an apparent visual magnitude of 10.6, it is visible with a small telescope as a 3 arc minute wide feature about 4.75° to the southeast of the star Beta Virginis. It is inclined by an angle of 47.1° to the line of sight from the Earth and is receding at a velocity of 1,465 km/s. The morphological classification of NGC 4030 in the De Vaucouleurs system is SA(s)bc, which indicates a spiral structure (SA) with no bar (s) and moderate to loosely wound arms (bc). The inner part of the galaxy shows a complex structure with multiple spiral arms, which becomes a symmetric, double arm pattern beyond 49″ from the core. The central bulge is relatively young with an estimated age of two billion years, while the nucleus is inactive. In 2007, a supernova explosion was discovered in the galaxy from images taken on February 19 from the 1 m Swope telescope at Las Campanas Observatory in Chile. Designated SN 2007aa, it was a type IIP supernova positioned 68″.5 north and 60″.8 east of the galactic nucleus. The progenitor was a red giant star with 8.5–16.5 times the mass of the Sun. == Gallery == == References == == External links == Media related to NGC 4030 at Wikimedia Commons
|
{"page_id": 40011527, "title": "NGC 4030"}
|
final products according to different size ranges. All the final products are up to the related standards within and beyond India. Of course, according to different requirements, customers can adjust the size of their final products from this stone crushing plant. Process of Stone Crushing Plant Clients will get the satisfactory products after objects being crushed for several times. Dust is generated during the working process while the dust control units are needed. == See also == Crusher == References ==
|
{"page_id": 38269892, "title": "Crushing plant"}
|
1 Gb slots using SFP transceivers or SFP Twinax cables. The 3130X also offers the 4 external 10/100/1000BaseT connections and two modules for X2 10 Gb uplinks. Both 3130 switches offer 'stacking' or 'virtual blade switch'. One can stack up to 8 Catalyst 3130 switches to behave like one single switch. This can simplify the management of the switches and simplify the (spanning tree) topology as the combined switches are just one switch for spanning tree considerations. It also allows the network manager to aggregate uplinks from physically different switch-units into one logical link. The 3130 switches come standard with IP Base IOS offering all layer 2 and the basic layer 3 or routing-capabilities. Users can upgrade this basic license to IP Services or IP Advanced services adding additional routing capabilities such as EIGRP, OSPF or BGP4 routing protocols, IPv6 routing and hardware based unicast and multicast routing. These advances features are built into the IOS on the switch, but a user has to upgrade to the IP (Advanced) Services license to unlock these options === Nexus Fabric Extender === Since January 2013 Cisco and Dell offer a Nexus Fabric Extender for the M1000e chassis: Nexus B22Dell. Such FEX's were already available for HP and Fujitsu blade systems, and now there is also a FEX for the M1000e blade system. The release of the B22Dell is approx. 2,5 years after the initially planned and announced date: a disagreement between Dell and Cisco resulted in Cisco stopping the development of the FEX for the M1000e in 2010. Customers manage a FEX from a core Nexus 5500 series switch. == Other I/O cards == An M1000e enclosure can hold up to 6 switches or other I/O cards. Besides the Ethernet switches as the Powerconnect M-series, Force10 MXL and Cisco Catalyst 3100 switches
|
{"page_id": 32224263, "title": "Dell M1000e"}
|
Advance Intersection Mandatory Movement Lane Control R3-7 2B.30 Advance Intersection Lane Control R3-8 2C.35 Advance Traffic Control Warning (Signal Ahead) W3-3 2C.65 Advance Street Name Supplemental Plaque W16-8P 2D.45 Street Name D3-1 2D.46 Advance Street Name D3-2 2D.36 Overhead Destination Guide D Series Notes: 1. See Table 2C-3 for location. 2. If D3-2 is not used. 3. Pavement markings shown for reference only. See Part 3 for criteria. D – Multi-lane approach with mandatory movement turn lanes Legend Direction of travel Page 56 MUTCD 11th Edition December 2023 Sect. 2A.13 Figure 2A-4. Relative Locations of Regulatory, Warning, and Guide Signs on an Intersection Approach (Sheet 4 of 4) W2-6 (see Note 1) Alternate signing at overhead location Sign Schedule Shoulder Travel lane Left only 200 ft min. Varies Travel lane Left or thru Travel lane Right only Shoulder Shoulder Travel lane Left only Travel lane Left or thru Travel lane Right only Shoulder R3-5 Series R3-6 Series R3-8 Series Section Sign Name Sign Designation 2B.28 Mandatory Movement Overhead Lane Control R3-5 Series 2B.29 Optional Movement Overhead Lane Control R3-6 Series 2B.30 Advance Intersection Lane Control R3-8 2C.41 Intersection Warning (Circular Intersection W2-6 2D.36 Overhead Destination Guide D Series 2D.37 Advance Intersection Overhead Arrow-per-Lane Guide D Series Notes: 1. See Table 2C-3 for location. 2. Pavement markings shown for reference only. See Part 3 for criteria. R3-8 Series R3-8 Series E – Multi-lane approach to a circular intersection with optional movement turn lanes Legend Direction of travel MUTCD 11th Edition Page 57 December 2023 B. Route or directional signs are grouped to clarify information to motorists; C. Regulatory signs that do not conflict with each other are grouped, such as Turn Prohibition si gns posted with ONE WAY signs or a parking regulation sign posted with a Speed Limit sign; or
|
{"source": 1185, "title": "from dpo"}
|
Markov random field dependency structure among the observations in both input and latent spaces. We show that existing pairwise similarity DR methods can be retrieved from our framework with particular choices of priors for the graphs. Moreover this reveals that these methods relying on shift-invariant kernels suffer from a statistical degeneracy that explains poor performances in conserving coarse-grain dependencies. New links are drawn with PCA which appears as a non-degenerate graph coupling model. _Ali Seyfi, Jean-Francois Rajotte, Raymond T. Ng_ **tl;dr:** Generating Multivariate Time Series coming from a common source using a novel framework, COSCI-GAN, by focusing on inter-channel/feature relationship preservation. !Image 1862 the individual time series are generated from a common point in latent space and 2) a central discriminator favors the preservation of inter-channel/feature dynamics. We demonstrate empirically that our method helps preserve channel/feature correlations and that our synthetic data performs very well in downstream tasks with medical and financial data. _Xufeng Cai, Chaobing Song, Cristóbal A Guzmán, Jelena Diakonikolas_ **tl;dr:** We provide state-of-the art variance reduced guarantees for all standard classes of stochastic Lipschitz monotone inclusion problems, using variants of Halpern iteration.  PPL ( ↓ ) Unique Token (%) ( ↑ ) BERTScore METROR ROUGE SacreBLEU Original 74.7 1.1 63.4 99.4 98.3 98.3 97.9 Retain 0 2.3 18.0 68.5 14.4 10.4 2 \hdashlineFlip Sign First 𝑁 1 2.7 35.5 67.9 16.6 9.3 2.3 Flip Sign Top- 𝑘 1 2.7 36.1 68.6 16.8 9.3 2.3 Rand Noise Rand 𝑁 2.4 1.3 50.4 68.8 21.1 11.5 3.2 Rand Noise Top- 𝑘 1.2 2.4 39.3 69 17.5 9.9 2.6 Reverse Order 1.4 1.7 47.9 69.6 18.5 10.8 1.9 Shuffle 2.5 1.4 45.8 69.5 20.3 11.9 3.6 Zero Out First 𝑁 7.9 1.3 52 73.8 26.6 17.2 9 Zero Out Top- 𝑘 3.4 1.3 51.9 72 22 11.7 3.2 Table 11:Ablating the corruption function for the HP Book unlearning task on OLMo-7B. We see that the selection of corruption function and corruption strength is not as important on unlearning BBC News and HP Book as it is on the TOFU dataset, based on text similarity metrics. This suggests that the forget quality metric is a more rigorous measure than mere text similarity, as it evaluates the distributional similarity between the outputs of an unlearned model and a retrained model. Therefore, in practice, we recommend always searching for the best corruption
|
{"source": 6599, "title": "from dpo"}
|
Adsorption Method for Sampling of Dioxins and Furans (AMESA) is an automatic system for continuous monitoring of emissions of dioxins and furans from industrial processes which require official approval in compliance with environmental regulations. Applications include refuse incinerators and hazardous material incinerators. == Method == A sample is continuously extracted from the gas stream being monitored using a titanium probe, which is water-cooled to below 70 °C (why?). The sample flow rate is automatically adjusted to ensure isokinetic sampling (the velocity of gas entering the sampling system is equal to the velocity of the gas in the system under test). The sample gas is drawn through a quartz wool pre-filter and then across a cartridge filled with resin, such as XAD 2. The sample gas is also cooled to below 5 °C to condense and remove water vapour. All system parameters are recorded digitally during sampling. The resin cartridge and the condensate are removed at the end of a monitoring period, and the contents are analysed to determine levels of dioxins and furans. == References ==
|
{"page_id": 1919103, "title": "Adsorption Method for Sampling of Dioxins and Furans"}
|
laser enrichment facility at a test loop in Wilmington, North Carolina. On October 11, the Dongfang Electric generator stator of the Taishan 1 EPR is installed in Guangdong, China. At 1750 MWe it is said to be the largest single-piece electrical generator in the world. In December, the 20-year Megatons to Megawatts Program successfully concludes with the final Russian delivery of low-enriched uranium to the US. Critics later say that it led to Rosatom's dominance over the global enriched uranium market. 2016 On 2017 In November, Russia completes the first test of the 9M730 Burevestnik, the first nuclear-powered cruise missile and the first nuclear-powered aircraft of any kind. 2018 In December, the Taishan 1 EPR begins operation in Guangdong, China. At 1660 MWe it is the largest nuclear reactor unit by electrical power ever. 2019 On August 8, a Russian explosion and radiation accident kills five military and civilian specialists off the coast of Nyonoksa, on the White Sea floor. Russia claimed the accident was related to an "isotope power source for a liquid-fuelled rocket engine". A US delegate tells the United Nations General Assembly First Committee that a nuclear reaction occurred. CNBC and Reuters report it occurred during recovery of a previously tested 9M730 Burevestnik nuclear-powered cruise missile left on the seabed to cool the fission core's decay heat. On December 8, the US NRC grants a 20-year extension to Turkey Point Nuclear Generating Station Units 3 and 4, the first US reactors licensed for an 80-year lifetime. On December 19, Akademik Lomonosov, the first commercial floating nuclear power plant, begins operation in Chukotka, Russia. == 2020s == 2022 On February 24, during their invasion of Ukraine, Russian Armed Forces capture the Chernobyl exclusion zone including the power plant. On March 4, Russian Armed Forces capture Zaporizhzhia Nuclear Power
|
{"page_id": 78489626, "title": "Timeline of nuclear power"}
|
+ y ) 3 = x x x + x x y + x y x + x y y + y x x + y x y + y y x + y y y ( 2 3 terms ) = x 3 + 3 x 2 y + 3 x y 2 + y 3 ( 3 + 1 terms ) {\displaystyle {\begin{aligned}(x+y)^{3}&=xxx+xxy+xyx+xyy+yxx+yxy+yyx+yyy&(2^{3}{\text{ terms}})\\&=x^{3}+3x^{2}y+3xy^{2}+y^{3}&(3+1{\text{ terms}})\end{aligned}}} with 1 + 3 + 3 + 1 = 2 3 {\displaystyle 1+3+3+1=2^{3}} . A simple example with a specific positive value of y: ( x + 2 ) 3 = x 3 + 3 x 2 ( 2 ) + 3 x ( 2 ) 2 + 2 3 = x 3 + 6 x 2 + 12 x + 8. {\displaystyle {\begin{aligned}(x+2)^{3}&=x^{3}+3x^{2}(2)+3x(2)^{2}+2^{3}\\&=x^{3}+6x^{2}+12x+8.\end{aligned}}} A simple example with a specific negative value of y: ( x − 2 ) 3 = x 3 − 3 x 2 ( 2 ) + 3 x ( 2 ) 2 − 2 3 = x 3 − 6 x 2 + 12 x − 8. {\displaystyle {\begin{aligned}(x-2)^{3}&=x^{3}-3x^{2}(2)+3x(2)^{2}-2^{3}\\&=x^{3}-6x^{2}+12x-8.\end{aligned}}} === Geometric explanation === For positive values of a and b, the binomial theorem with n = 2 is the geometrically evident fact that a square of side a + b can be cut into a square of side a, a square of side b, and two rectangles with sides a and b. With n = 3, the theorem states that a cube of side a + b can be cut into a cube of side a, a cube of side b, three a × a × b rectangular boxes, and three a × b × b rectangular boxes. In calculus, this picture also gives a geometric proof of the derivative ( x n ) ′ = n x
|
{"page_id": 4677, "title": "Binomial theorem"}
|
WZ Doradus (HD 33684; HR 1695; 21 G. Doradus) is a solitary red-hued variable star located in the southern constellation Dorado. It has an average apparent magnitude of 5.21, making it faintly visible to the naked eye under ideal conditions. Gaia DR3 parallax measurements imply a distance of 580 light-years and it is currently receding with a heliocentric radial velocity of 19.3 km/s. At its current distance, WZ Doradus is diminished by two-tenths of a magnitude due to interstellar extinction and it has an absolute magnitude of −1.00. HD 33684 was first observed to vary in brightness by astronomer P. M. Corben in 1971. It was said to have an amplitude of 0.18 magnitudes. A year later, HD 33684 was given the variable star designation WZ Doradus. It was again observed in 1973 by Olin J. Eggen and he noticed that it varied within 40 days. A 1998 survey found no strong emissions indicating dust around the star. Another survey also found no technetium in its spectrum. WZ Doradus is a semiregular variable of subtype SRb that varies between 5.2 and 5.32 within an average period of 40 days. Tabur et al. (2009) found two periods for the star after it was widely believed to only have one period. WZ Doradus has a stellar classification of M3 III, indicating that it is an evolved red giant. It is currently on the asymptotic giant branch, generating energy via the fusion of hydrogen and helium shells around an inert carbon core. As a result of its evolved state, it has expanded to 88.3 times the radius of the Sun and it now radiates 1,248 times the luminosity of the Sun from its enlarged photosphere at an effective temperature of 3,603 K. == References ==
|
{"page_id": 74742754, "title": "WZ Doradus"}
|
disorders such as dementia and impairment in cognitive functioning have risen as a healthcare concern, especially among the older generation. Solving jigsaw puzzles is an effective way to develop visuospatial functioning and keeping the mind sharp. Anyone can do it, as it is low-cost and can be intrinsically motivating. The important part about jigsaw puzzles is that it is challenging, especially compared to other activities, such as watching television. Engagement in such an intellectual activity predicts a lower risk in developing a cognition disorder later on in life. There is also the category of the self-empowering mind game, as in psychodrama, or mental and fantasy workshops – elements which might be seen as an ultimate outgrowth of yoga as a set of mental (and physical) disciplines. The ability to imagine and walk oneself through various scenarios is a mental exercise in itself. Self-reflection in this way taps into many different cognitive capabilities, including questioning rigid viewpoints, elaborating on experience, and knowing oneself through their relational context. == Commercial programs == By 2016, companies offering products and services for cognitive training were marketing them as improving educational outcomes for children, and for adults as improving memory, processing speed, and problem-solving, and even as preventing dementia or Alzheimers. They often have supported their marketing with discussion about the educational or professional background of their founders, some discuss neuroscience that supports their approach—especially concepts of neuroplasticity and transfer of learning, and some cite evidence from clinical trials. The key claim made by these companies is that the specific training that they offer generalizes to other fields—academic or professional performance generally or everyday life. CogniFit was founded in 1999, Cogmed in 2001, Posit Science in 2002, and Brain Age was first released in 2005, all capitalizing on the growing interest within the public in
|
{"page_id": 8188320, "title": "Brain training"}
|
The world, or universe, is divided into two parts: the elementary and the ethereal. The elementary consists of four parts: the earth, about which is water, then air, then fire, reaching up to the moon. Above this is the ethereal which is immutable and called the 'fifth essence' by the philosophers. All are mobile except heavy earth which is the center of the world. === The universe as a machine === Sacrobosco spoke of the universe as the machina mundi, the machine of the world, suggesting that the reported eclipse of the Sun at the crucifixion of Jesus was a disturbance of the order of that machine. This concept is similar to the clockwork universe analogy that became very popular centuries later, during the Enlightenment.: 465 === Spherical Earth === Though principally about the universe, De sphaera 1230 A.D. contains a clear description of the Earth as a sphere which agrees with widespread opinion in Europe during the higher Middle Ages, in contrast to statements of some 19th- and 20th-century historians that medieval scholars thought the Earth was flat.: 19, 26–27 As evidence for the Earth being a sphere, in Chapter One he cites the observation that stars rise and set sooner for those in the east ("Orientals"), and lunar eclipses happen earlier; that stars near the North Pole are visible to those further north and those in the south can see different ones; that at sea one can see further by climbing up the mast; and that water seeks its natural shape which is round, as a drop. == See also == Armillary sphere Orrery == References == == Sources == Pedersen, Olaf (1975). Gingerich, Owen; Dobrzycki, Jerzy (eds.). "The Corpus Astronomicum and the Traditions of Medieval Latin Astronomy: A Tentative Interpretation". Colloquia Copernicana III. Wrocław: Ossolineum: 59–76. Thorndike,
|
{"page_id": 2457060, "title": "De sphaera mundi"}
|
more cellular devices being used in a known area. For example, if visual surveillance is being conducted on a group of protestors, a StingRay can be used to download the IMSI or equivalent identifier from each phone within the protest area. After identifying the phones, locating and tracking operations can be conducted, and service providers can be forced to turn over account information identifying the phone users. ==== Forcing an increase in signal transmission power ==== Cellular telephones are radio transmitters and receivers, much like a walkie-talkie. However, the cell phone communicates only with a repeater inside a nearby cell tower installation. At that installation, the device takes in all cell calls in its geographic area and repeats them out to other cell installations which repeat the signals onward to their destination telephone (either by radio or landline wires). Radio is used also to transmit a caller's voice/data back to the receiver's cell telephone. The two-way duplex phone conversation then exists via these interconnections. To make all that work correctly, the system allows automatic increases and decreases in transmitter power (for the individual cell phone and for the tower repeater, too) so that only the minimum transmit power is used to complete and hold the call active, "on", and allows the users to hear and be heard continuously during the conversation. The goal is to hold the call active but use the least amount of transmitting power, mainly to conserve batteries and be efficient. The tower system will sense when a cell phone is not coming in clearly and will order the cell phone to boost transmit power. The user has no control over this boosting; it may occur for a split second or for the whole conversation. If the user is in a remote location, the power boost may
|
{"page_id": 33170045, "title": "Stingray phone tracker"}
|
Globe at Night is an international scientific research program that crowdsources measurements of light pollution in the night sky. At set time periods within each year, the project asks people to count the number of stars that they can see from their location and report it to the project's website. The coordinating researchers compile this information to produce a public, freely available map of global light pollution. By September 2011, almost 70,000 measurements had been made. The use of data collected by the public makes the program an example of citizen science. Globe at Night began as a NASA educational program in the US organized by the NOAO, and was expanded internationally during the 2009 International Year of Astronomy; it is an offshoot of the GLOBE Program, which focuses on school-based science education. == Scientific rationale == Light pollution, the introduction of artificial light into formerly dark ecosystems, has numerous adverse ecological effects. Exposure to artificial light can prove fatal for some organisms (e.g. moths that fly into a burning flame), can interrupt a life cycle phase for others (e.g. glowworms are unable to attract mates), and can reduce the possibilities for finding food (because of increased risk of predation). Light at night can also interfere with the chronobiology of many animals, including humans, through suppression of melatonin secretion. There are also cultural and economic reasons for concern about excessive light at night. Skyglow prevents large fractions of the Earth's population from viewing the Milky Way, which drove the development of much of ancient science, mythology, and religion. In the US, the cost of generating wasted light is estimated to be 7 billion US dollars per year; the production of the electricity for this wasted light also results in the release of chemical pollution and greenhouse gases. The Globe at
|
{"page_id": 35043403, "title": "Globe at Night"}
|
out,” which became the impetus for a national “Goodwill # 16 CASE 16 • GOODWILL OF SAN FRANCISCO, SAN MATEO AND MARIN COUNTIES — 2009 159 Movement.” In 1916, Helms worked with a Bay Area religious leader, Reverend Samuel Quickmire. Together they opened the third Goodwill in the nation, Goodwill of San Francisco, to help local citizens who were still recovering from the 1906 earthquake. Over the next 20 years, Goodwill opened seven more operations in Northern California. Deborah Alvarez-Rodriguez joined Goodwill in 2004 when she inherited an organi-zation that was struggling operationally and financially. Prior to this she had been the director of San Francisco City and County’s Department of Children, Youth and their Families. In 2008, the San Francisco Business Times named her the Most Admired Nonprofit CEO. In 2009, she was named one of the Bay Area’s most influential women in business for the fourth year in a row. Immediately after her appointment, Alvarez-Rodriguez began a planning process in collaboration with the Goodwill board of directors and a newly developed internal, cross-functional Change Management Team. The intensive process began with a revision of Goodwill’s mission and vision. This interdisciplinary team, which involved staff from all levels of the organization, not only reviewed the organization’s mission, goals, and values; it also researched the external forces (social, governmental, and economic) that challenge Goodwill’s ability to offer successful programs for the population it was designed to serve. Their work resulted in the following new Vision and Mission statements, which were unanimously adopted by the Board of Directors in 2006: > Vision: Our Goodwill envisions a world free of poverty where people have the power to support themselves and their families, live in safe and thriving communities, and actively care for the environment. > Mission: We create solutions to poverty through
|
{"source": 4976, "title": "from dpo"}
|
Skytide is a reporting and analytics company whose software applications measure the performance of streaming video. Skytide is notable because its software is facilitating the trend by telecommunications service providers (TSPs) to operate their own content delivery networks (CDNs), in an effort to generate additional revenue from the increasing volume of video flowing over their broadband networks. In December 2013, Skytide was acquired by Citrix Systems Inc. == Patents == Skytide holds U.S. patents 7,630,956 and 8,346,811, covering its proprietary method for analyzing and reporting extensible data from multiple sources in multiple formats. == Honors & Recognition == Selected by Gartner as "Cool Vendor" in Communication Service Provider Infrastructure Winner of the 2009 Streaming Media Reader’s Choice Award Winner of the 7th Annual eWeek Excellence Awards Winner of 2007 Red Herring 100 award == See also == IPTV Over-the-top content (OTT) Internet television Connected TV Online video analytics Web log analysis software Web analytics == References == == External links == Skytide Granite Ventures "4 Keys to Telco CDN Success" white paper "6 Online Video Trends to Watch in 2013" white paper "Online Video Trends to Watch in 2014" white paper "How Telcos & ISPs Can Learn to Love OTT" white paper "What Every Service Provider Should Know About Federated CDNs" white paper "Improving CDN Capacity Utilization with Peak-Load Pricing" white paper
|
{"page_id": 29631395, "title": "Skytide"}
|
!= 5 && item <= 10) { /* do something with item */ } } Note If you really need to break out a loop, a break is typically better than alternatives such as modifying the loop variable or a goto: Enforcement ??? ES.78: Don’t rely on implicit fallthrough in switch statements Reason Always end a non-empty case with a break. Accidentally leaving out a break is a fairly common bug. A deliberate fallthrough can be a maintenance hazard and should be rare and explicit. Example switch (eventType) { case Information: update_status_bar(); break; case Warning: write_event_log(); // Bad - implicit fallthrough case Error: display_error_window(); break; } Multiple case labels of a single statement is OK: switch (x) { case 'a': case 'b': case 'f': do_something(x); break; } Return statements in a case label are also OK: switch (x) { case 'a': return 1; case 'b': return 2; case 'c': return 3; } Exceptions In rare cases if fallthrough is deemed appropriate, be explicit and use the [[fallthrough]] annotation: switch (eventType) { case Information: update_status_bar(); break; case Warning: write_event_log(); [[fallthrough]]; case Error: display_error_window(); break; } NoteEnforcement Flag all implicit fallthroughs from non-empty cases. ES.79: Use default to handle common cases (only) Reason Code clarity. Improved opportunities for error detection. Example enum E { a, b, c, d }; void f1(E x) { switch (x) { case a: do_something(); break; case b: do_something_else(); break; default: take_the_default_action(); break; } } Here it is clear that there is a default action and that cases a and b are special. Example But what if there is no default action and you mean to handle only specific cases? In that case, have an empty default or else it is impossible to know if you meant to handle all cases: void f2(E x) { switch (x) {
|
{"source": 5230, "title": "from dpo"}
|
scales learning with a trust region constraint to jointly optimize for low sharpness parameters and low curvature representations. !Image 747 reports improving domain generalization by reducing the loss surface curvature in the parameter space. However, generalization during _fine-tuning_ is often more dependent on the transferability of _representations_ in the function space. Trust-region methods (TR) target this goal by regularizing representation curvature to reduce catastrophic forgetting of pre-trained task-agnostic information while adopting task-specific skills. We consider unifying these strategies for low curvature in both parameter space and function space to improve out-of-domain (OOD) generalization. We propose **Trust Region Aware Minimization** (TRAM), a SAM algorithm fine-tuning for low parameter sharpness and smooth, informative representations preserving pre-trained structure. TRAM uses a trust region bound to inform the SAM adversarial neighborhood, introducing an awareness of function curvature within optimization for flatter minima. We empirically validate TRAM in vision (cross-dataset adaptation) and text (OOD language modeling, zero-shot cross-lingual transfer) tasks where robust domain transfer and representation generality are critical. TRAM outperforms SAM- and TR-based optimization across all tasks, notably surpassing competing methods for hard transfer between _anticorrelated_ domains. TRAM establishes a novel standard in fine-tuning for domain-generalizable models with minimal additional computation over previous sharpness-aware methods. _Shurui Gui, Xiner Li, Shuiwang Ji_ **tl;dr:** We propose ATTA, an innovative setting, standing as a cost-effective option for efficiency and effectiveness between Test-Time Adaptation and Active Domain Adaptation. !Image 748 addresses distribution shifts for streaming test data in unsupervised settings. Currently, most TTA methods can only deal with minor shifts and rely heavily on heuristic and empirical studies. To advance TTA under domain shifts, we propose the novel problem setting of active test-time adaptation (ATTA) that integrates active learning within the fully TTA setting. We provide a learning theory analysis, demonstrating that
|
{"source": 3883, "title": "from dpo"}
|
secret seed/key. We show how to instantiate functional hinting PRGs and functional hinting weak PRFs for certain (families of) functions by building upon our simple techniques for realizing plain hinting PRGs/weak PRFs. We also demonstrate the applicability of a functional hinting weak PRF with certain algebraic properties in realizing KDM-secure public-key encryption in a black-box manner. - Finally, we show the first black-box separation between hinting weak PRFs (and hinting PRGs) from public-key encryption using simple realizations of these primitives given only a random oracle. ![Image 9: YouTube video: Jorge Chavez-Saab (in person) (paper #27) Hashing arbitrary values to points on an elliptic curve is a required step in many cryptographic constructions, and a number of techniques have been proposed to do so over the years. One of the first ones was due to Shallue and van de Woestijne (ANTS-VII), and it had the interesting property of applying to essentially all elliptic curves over finite fields. It did not, however, have the desirable property of being *indifferentiable from a random oracle* when composed with a random oracle to the base field. Various approaches have since been considered to overcome this limitation, starting with the foundational work of Brier et al. (CRYPTO 2011). For example, if f: F_q→E(F_q) is the Shallue--van de Woestijne (SW) map and H, H' are *two* independent random oracles, we now know that m↦f(H(m))+f(H'(m)) is indifferentiable from a random oracle. Unfortunately, this approach has the drawback of being twice as expensive to compute than the straightforward, but not indifferentiable, m↦f(H(m)). Most other solutions so far have had the same issue: they are at least as costly as two base field exponentiations, whereas plain encoding maps like f cost only
|
{"source": 5847, "title": "from dpo"}
|
to go to an excited state. The moment the amount of atoms in the excited state is higher than the amount in the normal ground state, the population inversion occurs. The inversion, like the one caused with germanium, makes it possible for materials to act as lasers. Photochromic applications. Photochromism causes a transformation of two forms of a molecule by absorbing a photon. For example, the BIPS molecule(2H-l-benzopyran-2,2-indolines) can convert from trans to cis and back by absorbing a photon. The different forms are associated with different absorption bands. In a cis-form of BIPS, the transient absorption band has a value of 21050 cm−1, in contrast to the band from the trans-form, that has a value of 16950 cm−1. The results were optically visible, where the BIPS in gels turned from a colorless appearance to a brown or pink color after repeatedly being exposed to a high energy UV pump beam. High energy photons cause a transformation in the BIPS molecule making the molecule change its structure. On the nuclear scale photoexcitation includes the production of nucleon and delta baryon resonances in nuclei. == References ==
|
{"page_id": 3147924, "title": "Photoexcitation"}
|
Frank Farmer OBE (18 September 1912 – 16 July 2004) was an English physicist, and a pioneer in the application of physics to medicine, particularly in relation to the practical aspects of cancer treatment by radiation. == Early life and education == Frank Taylor Farmer was born in Bexleyheath, Kent and studied at Eltham College before graduating with a first-class honours degree in electrical engineering from King's College London in 1933. He then continued to the University of Cambridge, where he completed a four-year PhD on radio-wave propagation in the ionosphere, working as part of J. A. Ratcliffe's research group. He continued researching this topic thereafter at the Marconi Research Centre near Chelmsford, Essex. == Career == In 1940, Farmer began working as assistant physicist in the radiography department at Middlesex Hospital, one of a group of physicists employed by London hospitals during the war to work on issues related to the emerging technology of X-rays, and the use of radium to treat cancer. These issues would become the central focus of Farmer's subsequent career. One of the instruments he invented while at Middlesex, the Farmer dosimeter, became a standard tool used in hospitals around the world to calibrate X-ray machines, and is still produced commercially today. In 1945 he moved to become head physicist at the Royal Victoria Infirmary (RVI) in Newcastle-Upon-Tyne. The hospital at that time had Marconi deep therapy X-Ray machines installed, with which Farmer was closely familiar from his time working at Marconi, and as a result the hospital was able to keep these machines in clinical use for many years. Farmer's team brought together experts in health physics, radio-isotopes, ultrasonics, instrumentation and physiological measurement. Specific innovations included the world's first gantry-mounted linear particle accelerator for cancer treatment, installed in 1963, and numerous clinical uses of
|
{"page_id": 8873476, "title": "Frank Farmer (physicist)"}
|
the figures indicate a continuing classicism. This compositional pattern is repeated with little variation on later hunting sarcophagi. == See also == Great Ludovisi sarcophagus == Bibliography == Ranuccio Bianchi Bandinelli and Mario Torelli, L'arte dell'antichità classica, Etruria-Roma, Utet, Turin 1976.
|
{"page_id": 20592701, "title": "Mattei sarcophagus I"}
|
Uridine diphosphate glucose (uracil-diphosphate glucose, UDP-glucose) is a nucleotide sugar. It is involved in glycosyltransferase reactions in metabolism. == Functions == UDP-glucose is used in nucleotide sugar metabolism as an activated form of glucose, a substrate for enzymes called glucosyltransferases. UDP-glucose is a precursor of glycogen and can be converted into UDP-galactose and UDP-glucuronic acid, which can then be used as substrates by the enzymes that make polysaccharides containing galactose and glucuronic acid. UDP-glucose can also be used as a precursor of sucrose, lipopolysaccharides and glycosphingolipids. == Components == UDP-glucose consists of the pyrophosphate group, ribose, glucose, and uracil. == See also == DNA Nucleoside Nucleotide Oligonucleotide RNA TDP-glucose Uracil Uridine diphosphate == References ==
|
{"page_id": 9713318, "title": "Uridine diphosphate glucose"}
|
process (no energy transfer by way of heat). As the rising parcel of air loses energy while it acts upon the surrounding atmosphere, no heat energy is transferred from the atmosphere to the air parcel to compensate for the heat loss. The parcel of air loses energy as it reaches greater altitude, which is manifested as a decrease in the temperature of the air mass. Analogously, the reverse process occurs within a cold parcel of air that is being compressed and is sinking to the planetary surface. The compression and the expansion of an air parcel are reversible phenomena in which energy is not transferred into or out of the air parcel; atmospheric compression and expansion are measured as an isentropic process ( d S = 0 {\displaystyle dS=0} ) wherein there occurs no change in entropy as the air parcel rises or falls within the atmosphere. Because the heat exchanged ( d Q = 0 {\displaystyle dQ=0} ) is related to the change in entropy ( d S {\displaystyle dS} by d Q = T d S {\displaystyle dQ=TdS} ) the equation governing the air temperature as a function of altitude for a mixed atmosphere is: d S d z = 0 {\displaystyle {\frac {\,dS\,}{dz}}=0} where S is the entropy. The isentropic equation states that atmospheric entropy does not change with altitude; the adiabatic lapse rate measures the rate at which temperature decreases with altitude under such conditions. ==== Humidity ==== If the air contains water vapor, then cooling of the air can cause the water to condense, and the air no longer functions as an ideal gas. If the air is at the saturation vapor pressure, then the rate at which temperature decreases with altitude is called the saturated adiabatic lapse rate. The actual rate at which the
|
{"page_id": 41822, "title": "Troposphere"}
|
G {\displaystyle g\in G} there exists k ∈ N {\displaystyle k\in \mathbb {N} } such that g k = e {\displaystyle g^{k}=e} , and hence f ( g ) k = f ( g k ) = f ( e ) = 1 {\displaystyle f(g)^{k}=f(g^{k})=f(e)=1} . Each character f is a constant on conjugacy classes of G, that is, f(hgh−1) = f(g). For this reason, a character is sometimes called a class function. A finite abelian group of order n has exactly n distinct characters. These are denoted by f1, ..., fn. The function f1 is the trivial representation, which is given by f 1 ( g ) = 1 {\displaystyle f_{1}(g)=1} for all g ∈ G {\displaystyle g\in G} . It is called the principal character of G; the others are called the non-principal characters. == Definition == If G is an abelian group, then the set of characters fk forms an abelian group under pointwise multiplication. That is, the product of characters f j {\displaystyle f_{j}} and f k {\displaystyle f_{k}} is defined by ( f j f k ) ( g ) = f j ( g ) f k ( g ) {\displaystyle (f_{j}f_{k})(g)=f_{j}(g)f_{k}(g)} for all g ∈ G {\displaystyle g\in G} . This group is the character group of G and is sometimes denoted as G ^ {\displaystyle {\hat {G}}} . The identity element of G ^ {\displaystyle {\hat {G}}} is the principal character f1, and the inverse of a character fk is its reciprocal 1/fk. If G {\displaystyle G} is finite of order n, then G ^ {\displaystyle {\hat {G}}} is also of order n. In this case, since | f k ( g ) | = 1 {\displaystyle |f_{k}(g)|=1} for all g ∈ G {\displaystyle g\in G} , the inverse of a character
|
{"page_id": 1384568, "title": "Character group"}
|
This is a list of officially named craters in the Solar System as named by IAU's Working Group for Planetary System Nomenclature. As of 2017, there is a total of 5,223 craters on 40 astronomical bodies, which includes minor planets (asteroids and dwarf planets), planets, and natural satellites. All geological features of a body (including craters) are typically named after a specific theme. For completeness, the list also refers to the craters on § Earth, which naming process is not overseen by IAU's WGPSN. == Amalthea (2) == == Ariel (17) == == Arrokoth (1) == == Callisto (141) == == Ceres (90) == == Charon (6) == == Dactyl (2) == == Deimos (2) == == Dione (73) == == Earth (190) == == Enceladus (53) == == Epimetheus (2) == == Eros (37) == == Europa (41) == == Ganymede (131) == === Dropped or not approved names === == Gaspra (31) == == Hyperion (4) == == Iapetus (58) == == Ida (21) == == Itokawa (10) == == Janus (4) == == Lutetia (19) == == Mars (1092) == == Mathilde (23) == == Mercury (397) == == Mimas (35) == == Miranda (7) == == Moon (1624) == == Oberon (9) == == Phobos (17) == == Phoebe (24) == == Pluto (14) == == Proteus (1) == == Puck (3) == == Rhea (128) == == Steins (23) == == Tethys (50) == == Thebe (1) == == Titan (11) == == Titania (15) == == Triton (9) == == Umbriel (13) == == Venus (900) == == Vesta (90) == == See also == List of largest craters in the Solar System == References == == External links == Gazetteer of Planetary Nomenclature, International Astronomical Union (IAU) Working Group for Planetary System Nomenclature
|
{"page_id": 54899959, "title": "List of craters in the Solar System"}
|
Hindu mythology. Andromeda is the location of the radiant for the Andromedids, a weak meteor shower that occurs in November. == History and mythology == The uranography of Andromeda has its roots most firmly in the Greek tradition, though a female figure in Andromeda's location had appeared earlier in Babylonian astronomy. The stars that make up Pisces and the middle portion of modern Andromeda formed a constellation representing a fertility goddess, sometimes named as Anunitum or the Lady of the Heavens. Andromeda is known as "the Chained Lady" or "the Chained Woman" in English. It was known as Mulier Catenata ("chained woman") in Latin and al-Mar'at al Musalsalah in Arabic. It has also been called Persea ("Perseus's wife") or Cepheis ("Cepheus's daughter"), all names that refer to Andromeda's role in the Greco-Roman myth of Perseus, in which Cassiopeia, the queen of Aethiopia, bragged that her daughter was more beautiful than the Nereids, sea nymphs blessed with incredible beauty. Offended at her remark, the nymphs petitioned Poseidon to punish Cassiopeia for her insolence, which he did by commanding the sea monster Cetus to attack Aethiopia. Andromeda's panicked father, Cepheus, was told by the Oracle of Ammon that the only way to save his kingdom was to sacrifice his daughter to Cetus. She was chained to a rock by the sea but was saved by the hero Perseus, who in one version of the story used the head of Medusa to turn the monster into stone; in another version, by the Roman poet Ovid in his Metamorphoses, Perseus slew the monster with his diamond sword. Perseus and Andromeda then married; the myth recounts that the couple had nine children together – seven sons and two daughters – and founded Mycenae and its Persideae dynasty. After Andromeda's death Athena placed her in the
|
{"page_id": 153353, "title": "Andromeda (constellation)"}
|
n {\displaystyle \textstyle {\bigcap _{n=1}^{\infty }G_{n}}} . == Examples == An invertible measure-preserving transformation on a standard probability space that obeys the 0-1 law is called a Kolmogorov automorphism. All Bernoulli automorphisms are Kolmogorov automorphisms but not vice versa. The presence of an infinite cluster in the context of percolation theory also obeys the 0-1 law. Let { X n } n {\displaystyle \{X_{n}\}_{n}} be a sequence of independent random variables, then the event { lim n → ∞ ∑ k = 1 n X k exists } {\displaystyle \left\{\lim _{n\rightarrow \infty }\sum _{k=1}^{n}X_{k}{\text{ exists }}\right\}} is a tail event. Thus by Kolmogorov 0-1 law, it has either probability 0 or 1 to happen. Note that independence is required for the tail event condition to hold. Without independence we can consider a sequence that's either ( 0 , 0 , 0 , … ) {\displaystyle (0,0,0,\dots )} or ( 1 , 1 , 1 , … ) {\displaystyle (1,1,1,\dots )} with probability 1 2 {\displaystyle {\frac {1}{2}}} each. In this case the sum converges with probability 1 2 {\displaystyle {\frac {1}{2}}} . == See also == Borel–Cantelli lemma Hewitt–Savage zero–one law Lévy's zero–one law Tail sigma-algebra Long tail Tail risk == References == Stroock, Daniel (1999). Probability theory: An analytic view (revised ed.). Cambridge University Press. ISBN 978-0-521-66349-6.. Brzezniak, Zdzislaw; Zastawniak, Thomasz (2000). Basic Stochastic Processes. Springer. ISBN 3-540-76175-6. Rosenthal, Jeffrey S. (2006). A first look at rigorous probability theory. Hackensack, NJ: World Scientific Publishing Co. Pte. Ltd. p. 37. ISBN 978-981-270-371-2. == External links == The Legacy of Andrei Nikolaevich Kolmogorov Curriculum Vitae and Biography. Kolmogorov School. Ph.D. students and descendants of A. N. Kolmogorov. A. N. Kolmogorov works, books, papers, articles. Photographs and Portraits of A. N. Kolmogorov.
|
{"page_id": 191797, "title": "Kolmogorov's zero–one law"}
|
textures look like stochastic textures when viewed from a distance. An example of a stochastic texture is roughcast. == Goal == Texture synthesis algorithms are intended to create an output image that meets the following requirements: The output should have the size given by the user. The output should be as similar as possible to the sample. The output should not have visible artifacts such as seams, blocks and misfitting edges. The output should not repeat, i. e. the same structures in the output image should not appear multiple places. Like most algorithms, texture synthesis should be efficient in computation time and in memory use. == Methods == The following methods and algorithms have been researched or developed for texture synthesis: === Tiling === The simplest way to generate a large image from a sample image is to tile it. This means multiple copies of the sample are simply copied and pasted side by side. The result is rarely satisfactory. Except in rare cases, there will be the seams in between the tiles and the image will be highly repetitive. === Stochastic texture synthesis === Stochastic texture synthesis methods produce an image by randomly choosing colour values for each pixel, only influenced by basic parameters like minimum brightness, average colour or maximum contrast. These algorithms perform well with stochastic textures only, otherwise they produce completely unsatisfactory results as they ignore any kind of structure within the sample image. === Single purpose structured texture synthesis === Algorithms of that family use a fixed procedure to create an output image, i. e. they are limited to a single kind of structured texture. Thus, these algorithms can both only be applied to structured textures and only to textures with a very similar structure. For example, a single purpose algorithm could produce high quality
|
{"page_id": 2327319, "title": "Texture synthesis"}
|
a creativity support system. The opportunities and impact offered by generative AI are mainly new, but many of the challenges are not. The principal challenge for generative AI, as with any computer-based support system, is whether or not the user can rely on it for the intended purpose. We will look at the three sectors of industry, education and research in turn. We take industry first, as the challenges in that sector also apply to most others. To help scope out the challenges posed by generative AI, we carried out a small experiment using the ChatGPT generative AI software that is freely available on the web.25 One of the authors asked ChatGPT the question “What are the disadvantages of generative AI?” on 9 January 2023 and again on 20 January 2023, as part of the same sequence of three prompts. As shown in Table 5, both responses included six specific disadvantages, but they were not the same: for example, legal issues were a heading in the first response but were not even mentioned in the second one. We will return to the significance of these differences later. Table 5. ChatGPT’s responses to “What are the disadvantages of generative AI?”. 9 January 2023 20 January 2023 There are several potential disadvantages of generative AI, including: Generative AI has several disadvantages, including: 1. Quality: Generated content may not be of the same quality as content created by humans. This is particularly true for tasks that require a high level of creativity or nuance, such as writing or art. 1. Complexity: Generative AI models can be computationally expensive and require large amounts of data and computational resources to train. 2. Bias: Generative AI systems can be biased if they are trained on biased data. This can result in generated content that is offensive
|
{"source": 968, "title": "from dpo"}
|
params = {}; memset(¶ms, 0, sizeof(params)); cudaSignalExternalSemaphoresAsync(&extSem, ¶ms, 1, stream); } An imported Vulkan semaphore object can be waited on as shown below. Waiting on such a semaphore object waits until it reaches the signaled state and then resets it back to the unsignaled state. The corresponding signal that this wait is waiting on must be issued in Vulkan. Additionally, the signal must be issued before this wait can be issued. void waitExternalSemaphore(cudaExternalSemaphore_t extSem, cudaStream_t stream) { cudaExternalSemaphoreWaitParams params = {}; memset(¶ms, 0, sizeof(params)); cudaWaitExternalSemaphoresAsync(&extSem, ¶ms, 1, stream); } 4.2.16.2. OpenGL Interoperability Traditional OpenGL-CUDA interop as outlined in OpenGL Interoperability works by CUDA directly consuming handles created in OpenGL. However, since OpenGL can also consume memory and synchronization objects created in Vulkan, there exists an alternative approach to doing OpenGL-CUDA interop. Essentially, memory and synchronization objects exported by Vulkan could be imported into both, OpenGL and CUDA, and then used to coordinate memory accesses between OpenGL and CUDA. Please refer to the following OpenGL extensions for further details on how to import memory and synchronization objects exported by Vulkan: GL_EXT_memory_object GL_EXT_memory_object_fd GL_EXT_memory_object_win32 GL_EXT_semaphore GL_EXT_semaphore_fd GL_EXT_semaphore_win32 4.2.16.3. Direct3D 12 Interoperability 4.2.16.3.1. Matching Device LUIDs When importing memory and synchronization objects exported by Direct3D 12, they must be imported and mapped on the same device as they were created on. The CUDA device that corresponds to the Direct3D 12 device on which the objects were created can be determined by comparing the LUID of a CUDA device with that of the Direct3D 12 device, as shown in the following code sample. Note that the Direct3D 12 device must not be created on a linked node adapter. I.e. the node count as returned by ID3D12Device::GetNodeCount must be 1. int getCudaDeviceForD3D12Device(ID3D12Device *d3d12Device) { LUID d3d12Luid = d3d12Device->GetAdapterLuid(); int cudaDeviceCount; cudaGetDeviceCount(&cudaDeviceCount); for (int cudaDevice =
|
{"source": 2332, "title": "from dpo"}
|
Deductions from total capital — Total capital ending amount (31/12/2023) 102,240 365 2023 Annual report Contents Business model and strategy > Responsible banking > Corporate governance > Economic and financial review > Risk, compliance &conduct management These tables show the total risk-weighted assets (comprising the denominator of capital requirements based on risk) as well as their distribution by geographic segment. Risk-weighted assets (phased-in CRR, phased-in IFRS 9) EUR million Minimum RWAs capital requirements 2023 2022 2023 Credit risk (excluding CCR) A 515,238 507,775 41,219 Of which: standardized approach (SA) 285,728 274,922 22,858 Of which: the foundation IRB (FIRB) approach 56,913 11,759 4,553 Of which: slotting approach B 14,123 14,509 1,130 Of which: equities under the simple risk-weighted approach 3,603 2,828 288 Of which: the advanced IRB (AIRB) approach 138,204 188,442 11,056 Counterparty credit risk (CCR) 13,593 13,096 1,087 Of which: standardized approach 10,150 9,493 812 Of which: internal model method (IMM) — — — Of which: exposures to a CCP 324 278 26 Of which: credit valuation adjustment (CVA) 680 1,097 54 Of which: other CCR 2,439 2,229 195 Settlement risk 4 4 0 Securitization exposure in the banking book (after the cap) 11,419 9,898 914 Of which: SEC-IRBA approach 4,275 4,471 342 Of which: SEC-ERBA approach 2,257 2,156 181 Of which: SEC-SA approach B 4,887 3,270 391 Of which: 1250% deduction C — — — Position, foreign exchange and commodities risks (Market risk) 16,454 15,791 1,316 Of which: standardized approach 9,166 7,521 733 Of which: internal model approach (IMA) 7,288 8,270 583 Large exposures — — — Operational risk 67,022 62,702 5,362 Of which: basic indicator approach — — — Of which: standardized approach 67,022 62,702 5,362 Of which: advanced measurement approach — — — Amounts below the thresholds for deduction 28,732 25,868 2,299 Total B 623,731 609,266 49,898
|
{"source": 4951, "title": "from dpo"}
|
simplified design of witness hiding protocols. In: Desmedt Y. (ed.) CRYPTO’94. LNCS, vol. 839, pp. 174–187. Springer, Santa Barbara, CA, USA (1994). .")] the authors describe how to additionally construct proofs of partial knowledge for any threshold, i.e., how to show that _r_ out of the _m_ statements are true. Their technique, together with a modification of \(\Pi _{\texttt{OR}}\), can be used to construct a proof in the VOLE setting where we implicitly only communicate the transcript of _r_ statements, and not all _m_ of them. Towards this, \(\Pi _{\texttt{OR}}\) can then be seen as a special case where \(r=1\). To generalize to arbitrary _r_ one now simulates the \(m-r\) possibly false proofs using false challenges. The prover then, based on the challenge _f_, computes the unique degree-\(m-t\) polynomial _s_ that evaluates to _f_ at point 0 and to the simulated challenge \(f_i\) for each _i_ where the sigma-protocol was simulated. It then derives the honest challenges by evaluating this polynomial at their indices, and sends _s_ to the verifier. Towards compressing the messages, [2 CRYPTO 2021, Part IV. LNCS, vol. 12828, pp. 92–122. Springer, Virtual Event (2021). .")] then consider the _r_ messages for the true branches as evaluations of a polynomial _t_ of degree \(r-1\). Namely, for each true evaluated branch _i_, they let _t_(_i_) be the message sent by \(\Pi _i\). The prover then computes this unique polynomial in canonical coefficient form and sends it to \(\mathcal {V} \), who derives the inputs to each simulated \(\Pi _i\) from _t_. Since both _s_,_t_ are of canonical form, they do not leak which of the branches are actually true. #### 5.3.3
|
{"source": 6237, "title": "from dpo"}
|
adenocarcinoma arises from secretory cells in the epithelium Clear cell adenocarcinoma of the vagina arises in response to prenatal exposure to diethylstilbestrol Vaginal melanoma arises from melanocytes in the epithelium === Inflammation === Candida vaginitis is a fungal infection; the discharge is irritating to the vagina and the surrounding skin. Bacterial vaginosis Gardnerella usually causes a discharge, itching, and irritation. Aerobic vaginitis thinned reddish vaginal epithelium, sometimes with erosions or ulcerations and abundant yellowish discharge === Atrophy === The vaginal epithelium changes significantly when estrogen levels decrease at menopause. Atrophic vaginitis usually causes scant odorless discharge == History == The vaginal epithelium has been studied since 1910 by a number of histologists. == Research == The use of nanoparticles that can penetrate the cervical mucus (present in the vagina) and vaginal epithelium has been investigated to determine if medication can be administered in this manner to provide protection from infection of the Herpes simplex virus. Nanoparticle drug administration into and through the vaginal epithelium to treat HIV infection is also being investigated. == See also == Vaginal cysts Vaginal tumors == References == == External links == Media related to Vaginal epithelium at Wikimedia Commons
|
{"page_id": 56502322, "title": "Vaginal epithelium"}
|
{\displaystyle {\frac {d\mathbf {x} _{\mathrm {A} }}{dt}}=\mathbf {v} _{\mathrm {AB} }+\mathbf {v} _{\mathrm {B} }+\sum _{j=1}^{3}x_{j}{\frac {d\mathbf {u} _{j}}{dt}}.} The interpretation of this equation is that the velocity of the particle seen by observers in frame A consists of what observers in frame B call the velocity, namely vB, plus two extra terms related to the rate of change of the frame-B coordinate axes. One of these is simply the velocity of the moving origin vAB. The other is a contribution to velocity due to the fact that different locations in the non-inertial frame have different apparent velocities due to the rotation of the frame; a point seen from a rotating frame has a rotational component of velocity that is greater the further the point is from the origin. To find the acceleration, another time differentiation provides: d 2 x A d t 2 = a A B + d v B d t + ∑ j = 1 3 d x j d t d u j d t + ∑ j = 1 3 x j d 2 u j d t 2 . {\displaystyle {\frac {d^{2}\mathbf {x} _{\mathrm {A} }}{dt^{2}}}=\mathbf {a} _{\mathrm {AB} }+{\frac {d\mathbf {v} _{\mathrm {B} }}{dt}}+\sum _{j=1}^{3}{\frac {dx_{j}}{dt}}{\frac {d\mathbf {u} _{j}}{dt}}+\sum _{j=1}^{3}x_{j}{\frac {d^{2}\mathbf {u} _{j}}{dt^{2}}}.} Using the same formula already used for the time derivative of xB, the velocity derivative on the right is: d v B d t = ∑ j = 1 3 d v j d t u j + ∑ j = 1 3 v j d u j d t = a B + ∑ j = 1 3 v j d u j d t . {\displaystyle {\frac {d\mathbf {v} _{\mathrm {B} }}{dt}}=\sum _{j=1}^{3}{\frac {dv_{j}}{dt}}\mathbf {u} _{j}+\sum _{j=1}^{3}v_{j}{\frac {d\mathbf {u} _{j}}{dt}}=\mathbf {a} _{\mathrm {B} }+\sum _{j=1}^{3}v_{j}{\frac {d\mathbf {u}
|
{"page_id": 1082841, "title": "Fictitious force"}
|
The molecular formula C22H24O2 may refer to: (R,R)-Tetrahydrochrysene, a drug used to study estrogen receptors in scientific research (S,S)-Tetrahydrochrysene, a steroid-like nonsteroidal estrogen and agonist of both the estrogen receptors
|
{"page_id": 49016310, "title": "C22H24O2"}
|
A total solar eclipse on August 12. A partial lunar eclipse on August 28. === Metonic === Preceded by: Lunar eclipse of November 8, 2022 Followed by: Lunar eclipse of June 15, 2030 === Tzolkinex === Preceded by: Lunar eclipse of July 16, 2019 Followed by: Lunar eclipse of October 8, 2033 === Half-Saros === Preceded by: Solar eclipse of August 21, 2017 Followed by: Solar eclipse of September 2, 2035 === Tritos === Preceded by: Lunar eclipse of September 28, 2015 Followed by: Lunar eclipse of July 27, 2037 === Lunar Saros 138 === Preceded by: Lunar eclipse of August 16, 2008 Followed by: Lunar eclipse of September 7, 2044 === Inex === Preceded by: Lunar eclipse of September 16, 1997 Followed by: Lunar eclipse of August 7, 2055 === Triad === Preceded by: Lunar eclipse of October 28, 1939 Followed by: Lunar eclipse of June 29, 2113 === Lunar eclipses of 2024–2027 === This eclipse is a member of a semester series. An eclipse in a semester series of lunar eclipses repeats approximately every 177 days and 4 hours (a semester) at alternating nodes of the Moon's orbit. The penumbral lunar eclipse on July 18, 2027 occurs in the next lunar year eclipse set. === Metonic series === The Metonic cycle repeats nearly exactly every 19 years and represents a Saros cycle plus one lunar year. Because it occurs on the same calendar date, the Earth's shadow will be in nearly the same location relative to the background stars. === Saros 138 === This eclipse is a part of Saros series 138, repeating every 18 years, 11 days, and containing 82 events. The series started with a penumbral lunar eclipse on October 15, 1521. It contains partial eclipses from June 24, 1918 through August 28, 2026; total eclipses
|
{"page_id": 22043242, "title": "August 2026 lunar eclipse"}
|
Zimmerman, it is important to note the difference in terms when analyzing the performance of the system during the war: Success rate – the percentage of Scuds destroyed or deflected to unpopulated areas Accuracy – the percentage of hits out of all the Patriots fired In accordance with the standard firing doctrine, on average four Patriots were launched at each incoming Scud – in Saudi Arabia an average of three Patriots were fired. The large number of missiles fired suggests low confidence in individual missiles and that a higher rate of successful interceptions was achieved through brute force. For example, if a Patriot has a 50% individual success rate, two missiles will intercept 75% of the time, and three will intercept 87.5% of the time. Only one has to hit for a successful interception, but this does not mean that the other missiles would not also have hit. The Iraqi redesign of the Scuds also played a role. Iraq had redesigned its Scuds by removing weight from the warhead to increase speed and range, but the changes weakened the missile and made it unstable during flight, creating a tendency for the Scud to break up during its descent from near space. This presented a larger number of targets as it was unclear which piece contained the warhead. According to the Zraket testimony, there was a lack of high quality photographic equipment necessary to record the interceptions of targets. Therefore, Patriot crews recorded each launch on standard-definition videotape, which was insufficient for detailed analysis. Damage assessment teams videotaped the Scud debris that was found on the ground. Crater analysis was then used to determine if the warhead was destroyed before the debris crashed or not. Part of the reason for the 30% improvement in success rate in Saudi Arabia compared to
|
{"page_id": 52024, "title": "MIM-104 Patriot"}
|
a global common and for space travel have been set by the Outer Space Treaty of 1967, which governs that space exploration and the use of celestial bodies are to be used for “peaceful purposes” and for scientific research, as established in Resolution 2222 (XXI). The Treaty states that no country can achieve sovereign control over regions of space. Consequently, the Treaty requires that space should be used as a resource of all people. Space law itself is relatively new as a branch of international law, encompassing the need to designate the access to, and freedom to explore, space. Especially with the establishment of the Committee on the Peaceful Uses of Outer Space (COPUOS) in 1959, participating countries within the United Nations have worked to regulate further human expansion into space, via five main international treaties of space law. These treaties include the Rescue Agreement, the Space Liability Convention, the Registration Convention, and the Moon Treaty, which together regulate activities conducted on celestial bodies. Other agreements aside from the main five were also established in efforts to avoid the use of weapons of mass destruction in space, such as the Partial Nuclear Test Ban Treaty of 1963, which bans the testing of nuclear based weapons in domains including space. === Rising pressure to reform space law treaties and principles === As the Outer Space Treaty was signed in 1967 as a consequence of the space race between the United States and the Soviet Union, continuous updates to the international agreement to space accounts for the great expansion of space travel in the past 20 years. Despite the attempts to preserve space as a global commons, demands due to technological and science advancements in space, including space exploration and private spaceflight, like in the other global commons domains, have been threatening
|
{"page_id": 67456408, "title": "Space diplomacy"}
|
== Although Gaynor was convinced that "I Will Survive" would be a hit and tried to persuade the label to release it as the A side, the label refused to entertain the idea and it was released as the B-side to "Substitute". Gaynor's husband took the song to the Studio 54 DJ Richie Kaczor, who loved it. Gaynor gave Kaczor a stack of the records to give to his friends. Other DJs in discos and radio stations soon followed and played that side of the record instead. The popularity of "I Will Survive" led to the label releasing the song as an A side. To support the single, a video shot at Xenon Discotheque in New York was released. It featured a roller skater – Sheila Reid-Pender from a local group called The Village Wizards – skate dancing on the dance floor. The original A side "Substitute" appeared on the US Billboard Hot Soul Singles chart for four weeks starting October 14, 1978, peaking at No. 78. It also appeared on the Billboard Bubbling Under the Hot 100 chart for four weeks in October–November 1978, peaking at No. 107. "I Will Survive" on the other hand performed significantly better; it entered the Billboard Hot 100 in December that year and reached No. 1 on the chart in March 1979. The song received the Grammy Award for Best Disco Recording in 1980, the only year the award was given. In 2012, the song was inducted into the Grammy Hall of Fame. == Remixes == Following the success of fellow 1970s disco stars Sister Sledge with remixed singles in the UK in 1993, "I Will Survive" was also remixed and released that summer. This remix reached number five on the UK Singles Chart and number three on the UK Dance Singles Chart.
|
{"page_id": 1436561, "title": "I Will Survive"}
|
was approved by the FDA in July 2024. Anti-amyloid drugs also cause brain shrinkage. The cholinesterase inhibitor benzgalantamine was approved by the FDA in July 2024. Specific medications that may reduce the risk or progression of Alzheimer's disease have been studied. The research trials investigating medications generally impact Aβ plaques, inflammation, APOE, neurotransmitter receptors, neurogenesis, growth factors or hormones. Machine learning algorithms with electronic health records are being studied as a way to predict Alzheimer's disease earlier. == References == == External links == "Alzheimer's Disease Research Timeline – Alzforum". www.alzforum.org. "Alzheimer's Disease Brain Cell Atlas- brain-map.org". portal.brain-map.org.
|
{"page_id": 18914017, "title": "Alzheimer's disease"}
|
This article describes the selection process, by country, for entrance into the International Mathematical Olympiad. The International Mathematical Olympiad (IMO) is an annual mathematics olympiad for students younger than 20 who have not started at university. Each year, participating countries send at most 6 students. The selection process varies between countries, but typically involves several rounds of competition, each progressively more difficult, after which the number of candidates is repeatedly reduced until the final 6 are chosen. Many countries also run training events for IMO potentials, with the aim of improving performance as well as assisting with team selection. == IMO Selection process by country == === Argentina === In Argentina, the Olimpíada Matemática Argentina is organized each year by Fundación Olimpíada Matemática Argentina. All students that took and passed the National Finals (fifth and last round of the competition) exams, usually held in November; and were born before July 1 21 years ago, are allowed to take two new written tests to be selected for IMO, usually in May. From the results of that tests, six titular students and a number of substitutes are selected to represent Argentina at the International Mathematical Olympiad. === Australia === In Australia, selection into the IMO team is determined by the Australian Mathematics Trust and is based on the results from the following exams: The Australian Mathematics Olympiad The Asian Pacific Mathematics Olympiad IMO selection exams in the AMOC Selection School in April The Australian Mathematical Olympiad (AMO) is held annually in the second week of February. It is composed of two four-hour papers held over two consecutive days. There are four questions in each exam for a total of eight questions. Entry is by invitation only, with approximately 200 candidates per year from Australia and New Zealand. [1] The top 25 from
|
{"page_id": 7020311, "title": "International Mathematical Olympiad selection process"}
|
in the number of individuals that experienced treatment interruptions from the quarter before lockdown. South Africa also saw that those infected with HIV had a great risk of complications if they contracted the COVID-19 virus, and more so if they were not receiving ART. The other issue seen before the COVID-19 pandemic arrived was the lack of health care workers. In a bar graph created by the World Health Organization (WHO) comparing regions and globally, Sub-Saharan Africa had the least number of health professionals per 10 000 people. === Middle East and North Africa === HIV/AIDS prevalence among the adult population (15-49) in the Middle East and North Africa (MENA) is estimated less than 0.1 between 1990 and 2018. This is the lowest prevalence rate compared to other regions in the world. In the MENA, roughly 230,000 people are living with HIV as of 2020, a slight decrease from 240,000 in 2018 where Iran accounted for approximately one-quarter (61,000) of the population with HIV followed by Sudan (59,000). As well as, Sudan (5,200), Iran (4,400) and Egypt (3,600) took up more than 60% of the number of new infections themselves in the MENA (20,000). Roughly two-thirds of AIDS-related deaths in this region happened in these countries for the year 2018. Although the prevalence is low, concerns remain in this region. First, unlike the global downward trend in new HIV infections and AIDS-related deaths, the numbers have continuously increased in the MENA. Second, compared to the global rate of antiretroviral therapy (62%), the MENA region's rate is far below in 2020 (43%). The low participation of antiretroviral therapy (ART) increases not only the number of AIDS-related deaths but the risk of mother-to-baby HIV infections, in which the MENA (24.7%) shows relatively high rates compared to other regions, for example, southern Africa
|
{"page_id": 2340554, "title": "Epidemiology of HIV/AIDS"}
|
be steadily illuminated. The gate arm shall remain in the upright position during the display of the steadily illuminated CIRCULAR YELLOW change interval. > 09 A change interval shall not be provided between the display of the steady CIRCULAR RED indication and the display of the flashing CIRCULAR YELLOW indication. Guidance: > 10 The steadily illuminated CIRCULAR YELLOW change interval should have a duration of at least 5 seconds, unless a different duration, within the range of durations recommended by Section 4F.17, is justified by engineering judgment. Section 6L.05 Portable Changeable Message Signs Support: > 01 Portable changeable message signs (PCMS) are TTC devices installed for temporary use with the flexibility to display a variety of messages. In most cases, portable changeable message signs follow the same provisions for design and application as those given for changeable message signs in Chapter 2L. The information in this Section describes situations where the provisions for portable changeable message signs differ from those given in Chapter 2L. > 02 Portable changeable message signs are used most frequently on high-density urban freeways, but have applications on all types of highways where highway alignment, road user routing problems, or other pertinent conditions require advance warning and information. > 03 Portable changeable message signs have a wide variety of applications in TTC zones including: roadway, lane, or ramp closures; incident management; width restriction information; speed control or reductions; advisories on work scheduling; road user management and diversion; warning of adverse conditions or special events; and other operational control. > 04 The primary purpose of portable changeable message signs in TTC zones is to advise the road user of unexpected situations. Portable changeable message signs are particularly useful as they are capable of: A. Conveying complex messages, B. Displaying real time information about conditions ahead, and C.
|
{"source": 1185, "title": "from dpo"}
|
all candidates in its neighborhood. ## 4.5 Experiments In this section we validate the proposed method on carotid artery bifurcation detec-tion. The carotid artery is the main vessel supplying oxygenated blood to the head and neck. The common carotid artery originates from the aortic arch and runs up toward the head before bifurcating to the external carotid artery (supplying blood to face) and internal carotid artery (supplying blood to brain). Examination of the carotid artery helps to assess the stroke risk of a patient. Automatic detection of this bifurca-tion landmark provides a seed point for centerline tracing and lumen segmentation, thereby making automatic examination possible. However, as shown in Fig. 4.2a, the internal/external carotid arteries further bifurcate to many branches and there are other vessels (e.g., vertebral arteries and jugular veins) present nearby, which may cause confusion to an automatic detection algorithm. We collected a head-neck CT dataset from 455 patients. Each image slice has 512 × 512 pixels and a volume contains a variable number of slices (from 46 to 1181 slices). The volume resolution varies too, with a typical voxel size of 0 .46 × 0.46 × 0.50 mm 3 . To achieve a consistent resolution, we resample all input volumes to 1.0 mm. A fourfold cross validation is performed to evaluate the detection accuracy and determine the hyper parameters, e.g., the network size, smoothness constraint α in Eq. (4.6), sparsity constraint β in Eq. (4.8). There are two carotid arteries (left versus right) as shown in Fig. 4.2. Here, we report the bifurcation detection accuracy of the right carotid artery (as shown in Table 4.1) with different approaches. The detection accuracy of the left carotid artery bifurcation is similar. The rough location of the carotid artery bifurcation can be predicted by other landmarks using a landmark network
|
{"source": 3344, "title": "from dpo"}
|
you implement this, look for opportunities to use methods and syntax on Monoid to simplify your implementation. This is a good example of how type class abstractions work at multiple levels in our code. We’re using monoids to design a large component—our CRDTs—but they are also useful in the small, simplifying our code and making it shorter and clearer. Solution (click to reveal) 11.4 Abstracting GCounter to a Type Class We’ve created a generic GCounter that works with any value that has instances of BoundedSemiLattice and CommutativeMonoid. However we’re still tied to a particular representation of the map from machine IDs to values. There is no need to have this restriction, and indeed it can be useful to abstract away from it. There are many key-value stores that we want to work with, from a simple Map to a relational database. If we define a GCounter type class we can abstract over different concrete implementations. This allows us to, for example, seamlessly substitute an in-memory store for a persistent store when we want to change performance and durability tradeoffs. There are a number of ways we can implement this. One approach is to define a GCounter type class with dependencies on CommutativeMonoid and BoundedSemiLattice. We define this as a type class that takes a type constructor with two type parameters represent the key and value types of the map abstraction. trait GCounter[F[_,_],K, V] { def increment(f: F[K, V])(k: K, v: V) (implicit m: CommutativeMonoid[V]): F[K, V] def merge(f1: F[K, V], f2: F[K, V]) (implicit b: BoundedSemiLattice[V]): F[K, V] def total(f: F[K, V]) (implicit m: CommutativeMonoid[V]): V } object GCounter { def apply[F[_,_], K, V] (implicit counter: GCounter[F, K, V]) = counter } Try defining an instance of this type class for Map. You should be able to reuse your code
|
{"source": 5231, "title": "from dpo"}
|
equal to the size of the type, the atomic operation is likely to require a lock and have poor performance. !nontemporal does not have any defined semantics for atomic stores. The optional constant align argument specifies the alignment of the operation (that is, the alignment of the memory address). It is the responsibility of the code emitter to ensure that the alignment information is correct. Overestimating the alignment results in undefined behavior. Underestimating the alignment may produce less efficient code. An alignment of 1 is always safe. The maximum possible alignment is 1 << 32. An alignment value higher than the size of the loaded type implies memory up to the alignment value bytes can be safely loaded without trapping in the default address space. Access of the high bytes can interfere with debugging tools, so should not be accessed if the function has the sanitize_thread or sanitize_address attributes. The alignment is only optional when parsing textual IR; for in-memory IR, it is always present. An omitted align argument means that the operation has the ABI alignment for the target. The optional !nontemporal metadata must reference a single metadata name corresponding to a metadata node with one i32 entry of value 1. The existence of the !nontemporal metadata on the instruction tells the optimizer and code generator that this load is not expected to be reused in the cache. The code generator may select special instructions to save cache bandwidth, such as the MOVNT instruction on x86. The optional !invariant.group metadata must reference a single metadata name . See invariant.group metadata. Semantics: The contents of memory are updated to contain at the location specified by the operand. If is of scalar type then the number of bytes written does not exceed the minimum number of bytes needed to hold all
|
{"source": 6618, "title": "from dpo"}
|
the etiology, diagnosis, treatment and prevention of cognitive, perceptual, emotional and behavioral disorders. Related fields include psychotherapy and clinical psychology. === Interdisciplinary fields === Some interdisciplinary sub-specialties of medicine include: Addiction medicine deals with the treatment of addiction. Aerospace medicine deals with medical problems related to flying and space travel. Biomedical Engineering is a field dealing with the application of engineering principles to medical practice. Clinical pharmacology is concerned with how systems of therapeutics interact with patients. Conservation medicine studies the relationship between human and non-human animal health, and environmental conditions. Also known as ecological medicine, environmental medicine, or medical geology. Disaster medicine deals with medical aspects of emergency preparedness, disaster mitigation and management. Diving medicine (or hyperbaric medicine) is the prevention and treatment of diving-related problems. Evolutionary medicine is a perspective on medicine derived through applying evolutionary theory. Forensic medicine deals with medical questions in legal context, such as determination of the time and cause of death, type of weapon used to inflict trauma, reconstruction of the facial features using remains of deceased (skull) thus aiding identification. Gender-based medicine studies the biological and physiological differences between the human sexes and how that affects differences in disease. Health informatics is a relatively recent field that deal with the application of computers and information technology to medicine. Hospice and Palliative Medicine is a relatively modern branch of clinical medicine that deals with pain and symptom relief and emotional support in patients with terminal illnesses including cancer and heart failure. Hospital medicine is the general medical care of hospitalized patients. Physicians whose primary professional focus is hospital medicine are called hospitalists in the United States and Canada. The term Most Responsible Physician (MRP) or attending physician is also used interchangeably to describe this role. Laser medicine involves the use of lasers in
|
{"page_id": 18957, "title": "Medicine"}
|
root surface. The initial development of the Hartig net likely involves a regulated decrease of plant defense responses, thus allowing fungal infection. Studies carried out with the model ectomycorrhizal fungus Laccaria bicolor have shown that the fungus secretes a small effector protein (MISSP7) that may regulate plant defense mechanisms by controlling plant response to phytohormones. Unlike some plant root pathogenic fungi, ectomycorrhizal fungi are largely unable to produce many plant cell-wall-degrading enzymes, but increased pectin modification enzymes released by Laccaria bicolor during fungal infection and Hartig net development indicate that pectin degradation may function to loosen the adhesion between neighboring plant cells and allow room for hyphal growth between cells This Hartig net structure is common among ectomycorrhizal fungi, although the depth and thickness of the hyphal network can vary considerably depending on the host species. Fungi associating with plants in the Pinaceae form a robust Hartig net that penetrates between cells deep into the root cortex, while the Hartig net formation in ectomycorrhizal symbioses with many angiosperms may not extend beyond the root epidermis. It has also been demonstrated that the depth and development of the Hartig net can vary among different fungi, even among isolates of the same species. Interestingly, an experiment using two isolates of Paxillus involutus, one of which only developed a loose mantle at the root surface and no developed Hartig net in poplar roots, showed that plant nitrate uptake was still improved by the symbiosis regardless of the presence of internal hyphal structure. As an additional caveat some fungal species such as Tuber melanosporum can form arbutoid mycorrhizae, involving some intracellular penetration into plant root cells by fungal hyphae in addition to developing a shallow Hartig-net-like structure between epidermal cells. == Function == The Hartig net supplies the plant root with chemical elements required
|
{"page_id": 24488554, "title": "Hartig net"}
|
the replicated devices is detected to be defective, the other copy is still operational and is being utilized to generate a new copy on another device (usually available operational in a pool of stand-by devices for this purpose). Redundant array of independent disks (RAID) – This method generalizes the device mirroring above by allowing one device in a group of devices to fail and be replaced with the content restored (Device mirroring is RAID with n=2). RAID groups of n=5 or n=6 are common. n>2 saves storage, when compared with n=2, at the cost of more processing during both regular operation (with often reduced performance) and defective device replacement. Device mirroring and typical RAID are designed to handle a single device failure in the RAID group of devices. However, if a second failure occurs before the RAID group is completely repaired from the first failure, then data can be lost. The probability of a single failure is typically small. Thus the probability of two failures in the same RAID group in time proximity is much smaller (approximately the probability squared, i.e., multiplied by itself). If a database cannot tolerate even such a smaller probability of data loss, then the RAID group itself is replicated (mirrored). In many cases such mirroring is done geographically remotely, in a different storage array, to handle recovery from disasters (see disaster recovery above). === Network connectivity === A secondary or tertiary storage may connect to a computer utilizing computer networks. This concept does not pertain to the primary storage, which is shared between multiple processors to a lesser degree. Direct-attached storage (DAS) is a traditional mass storage, that does not use any network. This is still a most popular approach. This retronym was coined recently, together with NAS and SAN. Network-attached storage (NAS) is mass
|
{"page_id": 5300, "title": "Computer data storage"}
|
that directly link cannabis to any symptoms associated with amotivational syndrome. Though several studies contain data in which heavy cannabis users have reported feeling a lack of motivation, it has also been acknowledged that other variables such as comorbid drug use and baselines for low motivation may not be examined. === Cannabis amotivational syndrome controversy === There is directly conflicting evidence as to whether or not cannabis amotivational syndrome is real. A 2024 study found that cannabis had no effect on motivation. Participants in this study demonstrated "the same willingness to exert effort on tasks while high as when they were not". Cannabis use did however led to "decreased self-regulation, making users more impulsive and less orderly", which could be mistaken for amotivational syndrome. === SSRI-induced amotivational syndrome === Most research in psychological fields regarding amotivational syndrome caused by SSRI treatment has revolved around case studies and anecdotal reports to understand how SSRI medication influences levels of motivation and apathy in patients. There is considerable overlap in the clinical presentations of apathy and amotivation and depression. Many patients with amotivational or apathy syndrome reported that they felt a lack of motivation that was unlike what they had sometimes experienced during previous episodes or depression, or that their feelings of apathy had no link to depression. Apathy syndrome has also been reported in a number of patients that have received or are receiving selective serotonin reuptake inhibitor (SSRI) treatment over the last decade, which has also been linked to a deficit in the performance and activities of daily living, signaling a functional decline. It is a common behavioural problem that often goes undiagnosed and untreated, which is why it is considered to be clinical significant. Neuropsychological research has shown that a common feature of amotivational syndrome involves the presence of lesions
|
{"page_id": 818755, "title": "Amotivational syndrome"}
|
use of two message types, requests and responses, using a simple, binary header format. CoAP is by default bound to UDP and optionally to DTLS, providing a high level of communications security. When bound to UDP, the entire message must fit within a single datagram. When used with 6LoWPAN as defined in RFC 4944, messages should fit into a single IEEE 802.15.4 frame to minimize fragmentation. The smallest CoAP message is 4 bytes in length, if the token, options and payload fields are omitted, i.e. if it only consists of the CoAP header. The header is followed by the token value (0 to 8 bytes) which may be followed by a list of options in an optimized type–length–value format. Any bytes after the header, token and options (if any) are considered the message payload, which is prefixed by the one-byte "payload marker" (0xFF). The length of the payload is implied by the datagram length. === CoAP fixed-size header === The first 4 bytes are mandatory in all CoAP datagrams, they constitute the fixed-size header. These fields can be extracted from these 4 bytes in C via these macros: ==== Version (ver) (2 bits) ==== Indicates the CoAP version number. ==== Type (2 bits) ==== This describes the datagram's message type for the two message type context of Request and Response. Request 0 : Confirmable : This message expects a corresponding acknowledgement message. 1 : Non-confirmable : This message does not expect a confirmation message. Response 2 : Acknowledgement : This message is a response that acknowledge a confirmable message 3 : Reset : This message indicates that it had received a message but could not process it. ==== Token length (4 bits) ==== Indicates the length of the variable-length Token field, which may be 0–8 bytes in length. ==== Request/response
|
{"page_id": 32830538, "title": "Constrained Application Protocol"}
|
A logarithmic resistor ladder is an electronic circuit, composed of a series of resistors and switches, designed to create an attenuation from an input to an output signal, where the logarithm of the attenuation ratio is proportional to a binary number that represents the state of the switches. The logarithmic behavior of the circuit is its main differentiator in comparison with digital-to-analog converters (DACs) in general, and traditional R-2R Ladder networks specifically. Logarithmic attenuation is desired in situations where a large dynamic range needs to be handled. The circuit described in this article is applied in audio devices, since human perception of sound level is properly expressed on a logarithmic scale. == Logarithmic input/output behavior == As in digital-to-analog converters, a binary number is applied to the ladder network, whose N bits are treated as representing an integer value: C o d e V a l u e = ∑ i = 1 N s i ⋅ 2 i − 1 {\displaystyle \mathrm {CodeValue} =\sum _{i=1}^{N}s_{i}\cdot 2^{i-1}} where s i {\displaystyle s_{i}} is 0 or 1 depending on the state of the ith switch. For comparison, recall a conventional linear DAC or R-2R network produces an output voltage signal of: V o u t = V i n ⋅ c ⋅ ( C o d e V a l u e + d ) {\displaystyle V_{out}=V_{in}\cdot c\cdot (\mathrm {CodeValue} +d)} where c {\displaystyle c} and d {\displaystyle d} are design constants and where V i n {\displaystyle V_{in}} typically is a constant reference voltage (or is a variable input voltage for a multiplying DAC.) In contrast, the logarithmic ladder network discussed in this article creates a behavior as: log ( V o u t / V i n ) = c ⋅ C o d e V a l
|
{"page_id": 35251399, "title": "Logarithmic resistor ladder"}
|
mini-phonestations, printers, scanners, modems and controllers). In recent years USB flash-drives have become more popular and have almost replaced diskettes and CDs. Flash memory is well known from its use in USB flash-drives. Flash cards also are based on flash memory, such as Secure Digital (SD), Compact Flash and Memory Stick. These are much used in portable devices (cameras, mobile phones). Flash memory constitutes the biggest part of the portable data device market. == Identification cards == === Contact cards with ISO/IEC 7816 interface === Contact smart cards (with chip) have a contact zone consisting of a few small contact petals. When the card is inserted into the reader, the chip connects with the card reader which can then read and write information. The standard ISO/IEC 7816 also regulates data exchange protocols and some aspects of work with other smart card data. Such cards are used for holder authorization for reception of certain services, such as bank account access for payments realization, use of prepaid mobile services, etc. The most widespread contact smart cards are SIM cards, payphone cards and some banking cards. === Contact cards with USB interface === This is often a microcircuit, such as a SIM card segregated from the ISO/IEC 7816 card and mounted in a tiny case with reader and USB connector. It makes smart-card application for computer authentification much more convenient. For example, an electronic key or eToken which is a personal authentification tool and a protected data storage device, supporting work with digital certificates and with an electronic digital signature. === Contactless cards === These are smart cards that communicate with the reader through radio transmission. The card must be close enough to the reader to perform necessary operations. Contactless cards are often used in areas where operations must be performed quickly, for
|
{"page_id": 7480844, "title": "Data card"}
|
analysis in Vega involves: 1. The identification of genomic alignments using LastZ. 2. Prediction of the orthologue pairs using the Ensembl gene tree pipeline. Note that although the pipeline generates phylogenetic genetrees, the limited scope of the Vega comparative analysis means that these will necessarily be incomplete and consequently only orthologs are shown on the website. 3. The manual identification of alleles in either different human haplotypes or mouse strains. There are five sets of analyses: 1. The MHC region has been compared between dog, pig (two assemblies), gorilla, chimpanzee, wallaby, mouse and eight human haplotypes: dog chromosome 12-MHC gorilla chromosome 6-MHC chimpanzee chromosome 6-MHC wallaby chromosome 2-MHC pig chromosome 7 on Sscrofa10.2 (24.7Mb to 29.8Mbp) pig chromosome 7-MHC mouse chromosome 17 (33.3Mbp to 38.9Mbp) chromosome 6 on the human reference assembly (28Mbp to 34Mbp) chromosome 6 MHC region in the human COX, QBL, APD, DBB, MANN, MCF and SSTO haplotypes (full length chromosome fragments) 2. Comparisons between the LRC regions of pig, gorilla and human (nine haplotypes): pig chromosome 6 (53.6Mbp to 54.0Mbp) gorilla chromosome 19-LRC human chromosome 19q13.4 (54.6Mbp to 55.6Mbp) on the reference assembly. chromosome 19 LRC region in the COX_1, COX_2, PGF_1, PGF_2, DM1A, DM1B, MC1A and MC1B haplotypes (full length chromosome fragments). Insulin dependent diabetes (Idd) regions on six mouse chromosomes (1, 3, 4, 6, 11 and 17) have been compared between the CL57BL/6 reference and one or more of the DIL Non-Obese Diabetic (NOD), CHORI-29 NOD, and the 129 strains. Further details are described here 3. The regions of the CL57BL/6 reference assembly used in these comparisons are: Idd3.1: chromosome 3, clones AC117584.11 to AC115749.12 Idd4.1: chromosome 11, clones AL596185.12 to AL663042.5 Idd4.2: chromosome 11, clones AL663082.5 to AL604065.7 Idd4.2Q: chromosome 11, clones AL596111.7 to AL645695.18 Idd5.1: chromosome 1, clones AL683804.15 to AL645534.20 Idd5.3:
|
{"page_id": 17742682, "title": "Vertebrate Genome Annotation Project"}
|
An interspecies friendship is a nonsexual bond that is formed between animals of different species. Numerous cases of interspecies friendships among wild and domesticated animals have been reported and documented with photography and video. Domestication of animals has led to interspecies friendships between species that would never naturally exist together. In many cases of interspecies friendship, the species are not normally seen together, and sometimes, one is of a species that ordinarily preys on the other in nature. The concept of interspecies friendship is similar to that of mutualism in that two individuals from different species exist in a relationship where each organism benefits from the activity of the other. Reasons for the formation of interspecies friendships include domestication, interspecies communication, mutually beneficial exchanges, desire for social bonding, protection, or is often unknown. == Friendships between humans and other animals == === Dogs === The relationship between a human and a household dog (Canis lupus familiaris) is quite common and said to be similar to the relationship seen between a parent and child. Many people agree that there is an emotional bond between themselves and their dog. An important indicator of the bond between a dog and its caregiver can be seen through separation and reunion incidences. The behaviour of the dog including approach latency and the frequency of initiating physical contact varies according to how familiar the dog is with the person. This can be viewed as a snapshot of their relationship. Behaviours such as tail wagging, lip licking, body shaking and vocalization also indicate this. The relationship between humans and dogs is so impactful that therapy dogs are a common practice. From hospitals to schools, dogs help comfort humans. === Cats === Friendships between household cats (Felis catus) and humans are also very common. The relationship between cats
|
{"page_id": 42160504, "title": "Interspecies friendship"}
|
windows were "printed"). In 2014, Local Motors debuted Strati, a functioning vehicle that was entirely 3D printed using ABS plastic and carbon fiber, except the powertrain. In May 2015 Airbus announced that its new Airbus A350 XWB included over 1000 components manufactured by 3D printing. In 2015, a Royal Air Force Eurofighter Typhoon fighter jet flew with printed parts. The United States Air Force has begun to work with 3D printers, and the Israeli Air Force has also purchased a 3D printer to print spare parts. In 2017, GE Aviation revealed that it had used design for additive manufacturing to create a helicopter engine with 16 parts instead of 900, with great potential impact on reducing the complexity of supply chains. === Firearms === AM's impact on firearms involves two dimensions: new manufacturing methods for established companies, and new possibilities for the making of do-it-yourself firearms. In 2012, the US-based group Defense Distributed disclosed plans to design a working plastic 3D-printed firearm "that could be downloaded and reproduced by anybody with a 3D printer". After Defense Distributed released their plans, questions were raised regarding the effects that 3D printing and widespread consumer-level CNC machining may have on gun control effectiveness. Moreover, armor-design strategies can be enhanced by taking inspiration from nature and prototyping those designs easily, using AM. === Health === Surgical uses of 3D printing-centric therapies began in the mid-1990s with anatomical modeling for bony reconstructive surgery planning. Patient-matched implants were a natural extension of this work, leading to truly personalized implants that fit one unique individual. Virtual planning of surgery and guidance using 3D printed, personalized instruments have been applied to many areas of surgery including total joint replacement and craniomaxillofacial reconstruction with great success. One example of this is the bioresorbable trachial splint to treat newborns with
|
{"page_id": 1305947, "title": "3D printing"}
|
things. More advanced managers can be more intuitive, gathering insights as they work with their team and making changes to team dynamics as the world around the team changes. This vision of management ultimately frames measurement as just one small tool in a much larger toolbox for organizing and coordinating software development work. Now all we need is a measure of good management. # Key Ideas The following are the key ideas from the chapter: • Improving productivity requires explaining the factors that affect it, but that requires qualitative insights into team behavior. • Teams are always changing, making it even harder to get insights about team behavior through data. • Managers are best positioned to get these qualitative insights by interacting with their team. Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License ( which permits any noncommercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if you modified the licensed material. You do not have permission under this license to share adapted material derived from this chapter or parts of it. The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. > Chapter 3 Why We Should Not Mea Sure produ Ctivity # PART II # Introduction to Productivity 29 © The Author(s) 2019 C. Sadowski and T. Zimmermann
|
{"source": 1730, "title": "from dpo"}
|
also influences OOD data. To benefit from this interplay, we introduce NECO, a novel post-hoc method for OOD detection, which leverages the geometric properties of “neural collapse” and of principal component spaces to identify OOD data. Our extensive experiments demonstrate that NECO achieves state-of-the-art results on both small and large-scale OOD detection tasks while exhibiting strong generalization capabilities across different network architectures. Furthermore, we provide a theoretical explanation for the effectiveness of our method in OOD detection. We plan to release the code after the anonymity period. _Giung Nam, Byeongho Heo, Juho Lee_ **tl;dr:** We propose a novel robust fine-tuning method tailored for vision-language models.  to turn the Cayley expanders of \cite{AR}, whose degree is polylog n, into constant degree expanders. ... more >>>$ Lower Bound on the Circuit Complexity of Affine Dispersers]( A Boolean function $f \colon \mathbb{F}^n_2 \rightarrow \mathbb{F}_2$ is called an affine disperser for sources of dimension $d$, if $f$ is not constant on any affine subspace of $\mathbb{F}^n_2$ of dimension at least $d$. Recently Ben-Sasson and Kopparty gave an explicit construction of an affine disperser for $d=o(n)$. The main ... more >>>-non-malleable extractor is a function nmExt : {0,1}^n x {0,1}^d -> {0,1} that takes two inputs, a weak source X~{0,1}^n of min-entropy k and an independent uniform seed s in {0,1}^d, and outputs a bit nmExt(X, s) that is \eps-close
|
{"source": 5874, "title": "from dpo"}
|
The Krüppel associated box (KRAB) domain is a category of transcriptional repression domains present in approximately 400 human zinc finger protein-based transcription factors (KRAB zinc finger proteins). The KRAB domain typically consists of about 75 amino acid residues, while the minimal repression module is approximately 45 amino acid residues. It is predicted to function through protein-protein interactions via two amphipathic helices. The most prominent interacting protein is called TRIM28 initially visualized as SMP1, cloned as KAP1 and TIF1-beta. Substitutions for the conserved residues abolish repression. Over 10 independently encoded KRAB domains have been shown to be effective repressors of transcription, suggesting this activity to be a common property of the domain. KRAB domains can be fused with dCas9 CRISPR tools to form even stronger repressors. == Evolution == The KRAB domain had initially been identified in 1988 as a periodic array of leucine residues separated by six amino acids 5’ to the zinc finger region of KOX1/ZNF10 coined heptad repeat of leucines (also known as a leucine zipper). Later, this domain was named in association with the C2H2-Zinc finger proteins Krüppel associated box (KRAB). The KRAB domain is confined to genomes from tetrapod organisms. The KRAB containing C2H2-ZNF genes constitute the largest sub-family of zinc finger genes. More than half of the C2H2-ZNF genes are associated with a KRAB domain in the human genome. They are more prone to clustering and are found in large clusters on the human genome. The KRAB domain presents one of the strongest repressors in the human genome. Once the KRAB domain was fused to the tetracycline repressor (TetR), the TetR-KRAB fusion proteins were the first engineered drug-inducible repressor that worked in mammalian cells. Two distinct types of KRAB A domains can be structurally and functionally distinguished. Ancestral KRAB A domains present in human PDRM9
|
{"page_id": 4000401, "title": "Krüppel associated box"}
|
An unusual unit of measurement is a unit of measurement that does not form part of a coherent system of measurement, especially because its exact quantity may not be well known or because it may be an inconvenient multiple or fraction of a base unit. Many of the unusual units of measurements listed here are colloquial measurements, units devised to compare a measurement to common and familiar objects. == Length == === Horizontal pitch === Horizontal pitch (HP) is a unit of length defined by the Eurocard printed circuit board standard used to measure the horizontal width of rack-mounted electronic equipment, similar to the rack unit (U) used to measure vertical heights of rack-mounted equipment. One HP is 0.2 inches (1⁄5″) or 5.08 millimetres wide. === Hammer unit === Valve's Source game engine uses the Hammer unit as its base unit of length. This unit refers to Source's official map creation software, Hammer. The exact definition varies from game to game, but a Hammer unit is usually defined as a sixteenth of a foot (16 Hammer units = 1 foot). This means that 1 Hammer unit is equal to exactly 19.05 millimetres or 0.75 inches (3⁄4″) . === Ligne === Button sizes are typically measured in ligne, which can be abbreviated as L. The measurement refers to the button diameter, or the largest diameter of irregular button shapes. There are 40 ligne in 1 inch. === Rack unit === One rack unit (U) is 1.75 inches (44.45 mm) and is used to measure rack-mountable audiovisual, computing and industrial equipment. Rack units are typically denoted without a space between the number of units and the 'U'. Thus, a 4 U server enclosure (case) is seven inches (177.8 mm) high, or more practically, built to occupy a vertical space seven inches high,
|
{"page_id": 23685094, "title": "List of unusual units of measurement"}
|
made by a mixture of polymorphonuclear neutrophis and eosinophils isolated from the blood of allergen-treated mini pigs and ECA4 is made by mouse eosinophils; lacking 15-LOX-1, it is assumed that these cells employ 12/15-lipoxygenase to initiate this synthesis. Indeed, mice made deficient of 12/15-lipooxygenase exhibit an attenuated allergic airway inflammation response compared to wild type control mice. == Function == The eoxins were first defined in 2008 and have not yet been determined to have any roles in human physiology or pathology. However, their production is stimulated in human eosinophils by physiological agonists such as prostaglandin D2, leukotriene C4, and interleukin 5. Furthermore, Eoxins stimulate vascular permeability in an ex vivo human vascular endothelial model system, and in a small study of 32 volunteers EXC4 production by eosinophils isolated from severe and aspirin-intolerant asthmatics was greater than that from healthy volunteers and mild asthmatic patients. These findings have led to suggestions that eoxins have pro-inflammatory actions and are involved in severe asthma, aspirin-induced asthma attacks, and perhaps other allergic reactions. A subsequent study found that eoxin levels in the exhaled breath of aspirin-sensitive and aspirin-intolerant asthmatic individuals did not rise after aspirin challenge and did not correlate with disease severity. The production of eoxins by Reed-Sternburg cells has also led to suggestion that they are involve in the lymphoma of Hodgkins disease and, possibly, prostate cancer, colon cancer, and other cancer types. == Eoxamides == The same pathways that metabolize arachidonic acid to eoxines have been shown to metabolize anandamide, N-arachidonoylethanolamine (i.e. arachidonic acid containing ethanolamine esterified to its carboxy residue) into a set of eoxamides that are identical to their eoxin counterparts except that they possess an ethanolamine ester. These metabolites have been named EXA4 ethanol amide, EXC4 ethanol amide, EXD4 ethanol amide, and EXE4 ethanol amide. These products
|
{"page_id": 44944704, "title": "Eoxin"}
|
to the Elijah Baley trilogy) Galactic Empire novels: Pebble in the Sky. 1950. ISBN 0-553-29342-7. {{cite book}}: ISBN / Date incompatibility (help) (early Galactic Empire) The Stars, Like Dust. 1951. ISBN 0-553-29343-5. {{cite book}}: ISBN / Date incompatibility (help) (long before the Empire) The Currents of Space. 1952. ISBN 0-553-29341-9. {{cite book}}: ISBN / Date incompatibility (help) (Republic of Trantor still expanding) Foundation prequels: Prelude to Foundation. 1988. ISBN 0-553-27839-8. Forward the Foundation. 1993. ISBN 0-553-40488-1. Original Foundation trilogy: Foundation. 1951. ISBN 0-553-29335-4. {{cite book}}: ISBN / Date incompatibility (help) Foundation and Empire. 1952. ISBN 0-553-29337-0. {{cite book}}: ISBN / Date incompatibility (help) (also published with the title 'The Man Who Upset the Universe' as a 35¢ Ace paperback, D-125, in about 1952) Second Foundation. 1953. ISBN 0-553-29336-2. {{cite book}}: ISBN / Date incompatibility (help) Extended Foundation series: Foundation's Edge. 1982. ISBN 0-553-29338-9. Foundation and Earth. 1986. ISBN 0-553-58757-9. ==== Lucky Starr series (as Paul French) ==== All published by Doubleday & Co David Starr, Space Ranger (1952) Lucky Starr and the Pirates of the Asteroids (1953) Lucky Starr and the Oceans of Venus (1954) Lucky Starr and the Big Sun of Mercury (1956) Lucky Starr and the Moons of Jupiter (1957) Lucky Starr and the Rings of Saturn (1958) ==== Norby Chronicles (with Janet Asimov) ==== All published by Walker & Company Norby, the Mixed-Up Robot (1983) Norby's Other Secret (1984) Norby and the Lost Princess (1985) Norby and the Invaders (1985) Norby and the Queen's Necklace (1986) Norby Finds a Villain (1987) Norby Down to Earth (1988) Norby and Yobo's Great Adventure (1989) Norby and the Oldest Dragon (1990) Norby and the Court Jester (1991) ==== Novels not part of a series ==== Novels marked with an asterisk (*) have minor connections to Foundation universe. The End of
|
{"page_id": 14573, "title": "Isaac Asimov"}
|
It will not completely restore the person's prior level of communication, but SLP can lead to a massive improvement of jargon aphasia. Recipients of this treatment typically achieve better use of residual language abilities, improved language skills, and the ability to communicate in a different way by making up for missing words in their speech. One specific method that has shown to lead to improvements with certain symptoms is phonological component analysis, or PCA for short. Participants in PCA therapy tend to improve in the ability to name specific items that they are test on, as well as the decrease in use of nonwords to describe said items. Seeing promising results from this type of therapy has led to much optimism in hopes of developing more treatment methods for jargon aphasia. == History == Hughlings Jackson is believed to have been the person who initially contributed the term "jargon" to aphasiology. He used this term not to distinguish a separate type of aphasia, but to describe the language output of certain people that was meaningless and incomprehensible to the listener, although it appeared to have some meaning for the speaker. == Other meanings and types == There are many different meanings when people refer to jargon aphasia. Since Hughling Jackson's time, it has covered a broad range of similar verbal behaviors and has been used to describe a multitude of different aphiastic disturbances. Some of the behaviors are described as the person having speaking in a "confused, unintelligible language", "a strange, outlandish, or barbarous dialect", "a hybrid language", and can be referred to as a pretentious language marked by circumlocutions and long words. Observation of these behaviors has led to a branching of different types of jargon. Neologistic jargon is the production of language containing non-existent words that are not
|
{"page_id": 28616120, "title": "Jargon aphasia"}
|
up to an altitude of 65 kilometres (an altitude at which the mesosphere has already been reached on Earth). At the top of the troposphere, temperature and pressure reach Earth-like levels. Winds at the surface are a few metres per second, reaching 70 m/s or more in the upper troposphere. The stratosphere and mesosphere extend from 65 km to 95 km in height. The thermosphere and exosphere begin at around 95 kilometres, eventually reaching the limit of the atmosphere at about 220 to 250 km. The air pressure at Venus' surface is about 92 times that of the Earth. The enormous amount of CO2 in the atmosphere creates a strong greenhouse effect, raising the surface temperature to around 470 °C, hotter than that of any other planet in the Solar System. ==== Mars ==== The Martian atmosphere is very thin and composed mainly of carbon dioxide, with some nitrogen and argon. The average surface pressure on Mars is 0.6-0.9 kPa, compared to about 101 kPa for Earth. This results in a much lower atmospheric thermal inertia, and as a consequence Mars is subject to strong thermal tides that can change total atmospheric pressure by up to 10%. The thin atmosphere also increases the variability of the planet's temperature. Martian surface temperatures vary from lows of approximately −140 °C (−220 °F) during the polar winters to highs of up to 20 °C (70 °F) in summers. Between the Viking and Mars Global Surveyor missions, Mars saw "Much colder (10-20 K) global atmospheric temperatures were observed during the 1997 versus 1977 perihelion periods" and "that the global aphelion atmosphere of Mars is colder, less dusty, and cloudier than indicated by the established Viking climatology," with "generally colder atmospheric temperatures and lower dust loading in recent decades on Mars than during the Viking
|
{"page_id": 11346753, "title": "Extraterrestrial atmosphere"}
|
Intelsat IVA F-6 was a geostationary communication satellite built by Hughes, it was owned by Intelsat. The satellite was based on the HS-353 platform and its estimated useful life was 7 years. == History == The Intelsat IVA F-6 was part of the Intelsat IVA series which consisted of 6 satellites, of which five were successfully placed into orbit. All five satellites in the series were retired and operated an average of almost 4 years beyond their life expectancies. The satellite antenna allowed coverage from the land masses on both sides of the Atlantic basin with four point beams and had sufficient insulation between the east beams and the western beams that used the same frequencies in the east and west. The separation of the beam by directional antenna allowed this dual use of the frequency, significantly increasing the capacity of satellite communication within an assigned frequency range. Although the initial requirement Intelsat VAT series was only for the Atlantic service, but also was given special attention during the project to provide service on the Indian Ocean and Pacific Ocean. The satellite had 20 transponders (individual radio transmitters) compared to 12 on board each Intelsat IV satellite. It had a total height of 22 feet 11 inches (6.99 meters) and a diameter of 7 feet 9 inches (2.36 meters). The solar panels, covered with about 17,000 solar cells, provided primary energy of 600 Watts. The weight of the satellite, which had an orbiting life project of 7 years, was about 3,335 pounds (1,513 kg). The satellite was successfully launched into space on March 31, 1978, by means of an Atlas-Centaur vehicle from the Cape Canaveral Air Force Station, United States. It had a launch mass of 1,515 kg. == See also == Intelsat == References ==
|
{"page_id": 53852340, "title": "Intelsat IVA F-6"}
|
separator, is an electroactive separator with reversible overcharge protection. == Placement == The separator is always placed between the anode and the cathode. The pores of the separator are filled with the electrolyte and packaged for use. == Essential properties == Chemical stability The separator material must be chemically stable against the electrolyte and electrode materials under the strongly reactive environments when the battery is fully charged. The separator should not degrade. Stability is assessed by use testing. Thickness A battery separator must be thin to facilitate the battery's energy and power densities. A separator that is too thin can compromise mechanical strength and safety. Thickness should be uniform to support many charging cycles. 25.4 μm (1.0 mil) is generally the standard width. The thickness of a polymer separator can be measured using the T411 om-83 method developed under the auspices of the Technical Association of the Pulp and Paper Industry. Porosity The separator must have sufficient pore density to hold liquid electrolyte that enables ions to move between the electrodes. Excessive porosity hinders the ability of the pores to close, which is vital to allow the separator to shut down an overheated battery. Porosity can be measured using liquid or gas absorption methods according to the American Society for Testing and Materials (ASTM) D-2873. Typically, a Li-ion battery separator provides porosity of 40%. Pore size Pore size must be smaller than the particle size of the electrode components, including the active materials and conducting additives. Ideally the pores should be uniformly distributed while also having a tortuous structure. This ensures a uniform current distribution throughout the separator while suppressing the growth of Li on the anode. The distribution and structure of pores can be analyzed using a Capillary Flow Porometer or a Scanning Electron Microscope. Permeability The separator must
|
{"page_id": 30038658, "title": "Separator (electricity)"}
|
acrocephalus are referred to the genus Eusarcus. The genus Carcinosoma, to which the species Eurypterus scorpioides and Eurypterus scoticus are transferred, is designated as a junior synonym of Eusarcus. The species Eurypterus kokomoensis is raised to the subgeneric level under the subgenus name Onychopterus. 1914 Otto Jaekel described the new species Pterygotus rhenaniae, later designated as the type species of Jaekelopterus. Erwin H. Barbour described the new species Anthraconectes nebraskensis. The discovery helped reinforce the idea as Adelophthalmus (or Anthraconectes) as a freshwater animal. 1915 Xavier Stainier described the species Eurypterus dumonti, later referred to Adelophthalmus. Ellis W. Shuler described the species Stylonurus (Ctenopterus) alveolatus, later referred to Megalograptus. 1916 Thomas Edmund Savage described the species Eurypterus pumilus. === 1920s === 1920 Amadeus William Grabau described the species Anthraconectes chinensis. 1921 Ruedemann described the new species Pterygotus vernonensis. Ruedemann described the species Hughmilleria phelpsae, later designated as the type species of Pittsfordipterus. 1922 Walter A. Bell described the species Anthraconectes brasdorensis. 1924 Carl Owen Dunbar described the species Anthraconectes sellardsi. 1926 Embrik Strand described the species Pterygotus siemiradzkii. === 1930s === 1933 Boris Isidorovich Chernyshev described the species Eurypterus carbonarius, later referred to Adelophthalmus. 1934 Eusarcus is recognized as a pre-occupied name by Størmer, who transfers its species to the next oldest available name, Carcinosoma. Størmer describes the species Hughmilleria patteni. 1935 Ruedemann names new subgenera of Pterygotus: Curviramus and Acutiramus. They are differentiated by the curvature of denticles in their chelicerae. 1936 Størmer provides a more comprehensive and detailed description of Pterygotus rhenaniae. Etheridge, Jr. described the species Glyptoscorpius stevensoni. 1938 Carl E. Decker described the species Anthraconectes oklahomensis. 1939 Gilbert Oscar Raasch referred Strabops to the order Aglaspida. Roy Woodhouse Pocock and A. J. Butler discover a relatively complete telson of Eurypterus abbreviatus, showing that the species was
|
{"page_id": 58388405, "title": "Timeline of eurypterid research"}
|
currently an area of high research activity. Polymer electrolyte membrane electrolysis is a technique by which proton-exchange membranes are used to decompose water into hydrogen and oxygen gas. The proton-exchange membrane allows for the separation of produced hydrogen from oxygen, allowing either product to be exploited as needed. This process has been used variously to generate hydrogen fuel and oxygen for life-support systems in vessels such as US and Royal Navy submarines. A recent example is the construction of a 20 MW Air Liquide PEM electrolyzer plant in Québec. Similar PEM-based devices are available for the industrial production of ozone. == See also == == References == == External links == Dry solid polymer electrolyte battery EC-supported STREP program on high pressure PEM water electrolysis
|
{"page_id": 2328120, "title": "Proton-exchange membrane"}
|
chapters rely on hand-crafted lexicons that map from words to semantic predicates. But how can we analyze texts that contain words that we haven’t seen before? This chapter describes methods that learn representations of word meaning by analyzing unlabeled data, vastly improving the generalizability of natural language processing systems. The theory that makes it possible to acquire mean-ingful representations from unlabeled data is the distributional hypothesis . # 14.1 The distributional hypothesis Here’s a word you may not know: tezg ¨ uino (the example is from Lin, 1998). If you do not know the meaning of tezg ¨ uino , then you are in the same situation as a natural language processing system when it encounters a word that did not appear in its training data. Now suppose you see that tezg ¨ uino is used in the following contexts: (14.1) A bottle of is on the table. (14.2) Everybody likes .(14.3) Don’t have before you drive. (14.4) We make out of corn. 325 326 CHAPTER 14. DISTRIBUTIONAL AND DISTRIBUTED SEMANTICS (14.1) (14.2) (14.3) (14.4) ... tezg ¨ uino 1 1 1 1 loud 0 0 0 0 motor oil 1 0 0 1 tortillas 0 1 0 1 choices 0 1 0 0 wine 1 1 1 0Table 14.1: Distributional statistics for tezg ¨ uino and five related terms 4 3 2 1 0 1 2 3 44 > 3 > 2 > 1 > 01234 > sister brother niece nephew aunt uncle woman man heiress heir madam sir countess earl duchess duke queen king empress emperor 4202464 > 3 > 2 > 1 > 01234 > slow slower slowest short shorter shortest strong stronger strongest loud louder loudest clear clearer clearest soft softer softest dark darker darkest Figure 14.1: Lexical semantic relationships have regular linear structures in two
|
{"source": 972, "title": "from dpo"}
|
the CPC that you want to operate, and open OSA Advanced Facility. 3. Select OSC CHPID to import the OSA-ICC configuration file. Then, select Card specific advanced facilities .4. Select Manual configuration options and click OK .5. The Manual Configuration Options window opens. Select Import source file by FTP and click OK (Figure 7-23 on page 197). Chapter 7. Defining console communication 197 > Figure 7-23 HMC: Importing a source file 6. You are prompted to provide the FTP server and file location information (Figure 7-24). Click Import . > Figure 7-24 HMC: Importing a file 7. Figure 7-25 indicates that the source file import is complete. Click OK to continue. > Figure 7-25 HMC: Importing file successful 8. After importing the source file, you must validate it and activate the configuration. 198 IBM z16 Configuration Setup # 7.4 Verifying the OSA-ICC definition This section presents some tools that you can use to verify the OSA-ICC configuration. # 7.4.1 z/OS commands You can check your definition by using the following z/OS commands: DISPLAY M=CHP(xx) Check whether the CHPID DESC is displayed as OSA CONSOLE (Figure 7-26). > Figure 7-26 OSC D M=CHP DISPLAY M=DEV(xxxx) Using this command, you can confirm the channel path to a device. The node descriptor information that is returned includes the emulated control unit (CU) 2074. Also included is the 3931 machine type and serial number, as shown in Figure 7-27. > Figure 7-27 OSC D M=DEV(xxx) D M=CHP(B1) IEE174I 12.56.00 DISPLAY M 520 CHPID B1: TYPE=14, DESC=OSA CONSOLE, ONLINE DEVICE STATUS FOR CHANNEL PATH B1 0 1 2 3 4 5 6 7 8 9 A B C D E F0088 + + $@ $@ $@ $@ $@ $@ $@ $@ $@ $@ $@ $@ $@ $@ SWITCH DEVICE NUMBER = NONE PHYSICAL
|
{"source": 2332, "title": "from dpo"}
|
DIVISION, SALES) VALUES ('Qtr2-1999', 'Div4', 5); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr3-1999', 'Div1', 5); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr3-1999', 'Div2', 4); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr3-1999', 'Div3', 6); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr3-1999', 'Div4', 7); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr4-1999', 'Div1', 5); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr4-1999', 'Div2', 55); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr4-1999', 'Div3', 36); INSERT INTO T1 (QUARTER, DIVISION, SALES) VALUES ('Qtr4-1999', 'Div4', 43); as you can see there are four divisions in each quarter. the question is that show all those quarters in which the sales of div1 is greater than sales of div2. The out put should be like this QUARTER DIVISION SUM(SALES) --------------------------------------------- Qtr1-1999 Div1 123 Qtr1-1999 Div2 3 Qtr2-1998 Div1 43 Qtr2-1998 Div2 33 Qtr3-1999 Div1 5 Qtr3-1999 Div2 4 to acheive the above result i wrote the following query Select quarter, division, sum(sales) from T1 where division in ('Div1', 'Div2') GROUP BY quarter, division having quarter IN ( SELECT quarter FROM T1 GROUP BY QUARTER HAVING SUM(DECODE(division, 'Div1', sales, 0)) > SUM(decode(division, 'Div2', sales, 0)) ) this query is working fine, but for some reason I want a query without DECODE/CASE which returns same result. Could analytical functions help.? Thanks in advance May 21, 2003 - 3:14 pm UTC well, the right way to do this is in one pass. You get more pleasing output as well. we could unpivot the data using DUAL if necessary. But DECODE is the best answer. Just to make you happy, there is a non-decode (but slower) version. ops$tkyte@ORA920> select quarter, 2 sum(decode(division,'Div1',sales,null)) Div1, 3 sum(decode(division,'Div2',sales,null)) div2 4 from t1 5 group by quarter 6 having sum(decode(division,'Div1',sales,null)) > sum(decode(division,'Div2',sales,null)) 7 / QUARTER DIV1 DIV2 ---------- ---------- ----------
|
{"source": 4954, "title": "from dpo"}
|
perform a quantum computation with high fidelity it suffices to complete each step of the computation with high fidelity. How well does a quantum channel preserve information? 419 Quantum sources of information and the entanglement fidelity We’ve been talking about dynamic measures of information preservation, without defin-ing exactly what we mean by a quantum source of information. We’ll now explain two possible definitions for this notion, and use these definitions to motivate the introduc-tion of some dynamic measures of information preservation. A priori , it is not entirely clear how best to go about defining the notion of a quantum source of information. Classically, the best solution to this definitional problem is not at all obvious, and it is possible to come up with inequivalent definitions, each yielding a rich and useful theory of information. Since quantum information contains classical information as a subfield, it should not be surprising if there are even more ways of defining the notion of an information source quantum mechanically! To conclude this chapter we introduce two possible quantum definitions for the notion of an information source, explain how they motivate corresponding distance measures for the preservation of information, and prove some elementary properties of these distance measures. Further discussion of quantum sources of information is deferred until Chapter 12. One attractive definition for quantum sources is to imagine a stream of identical quan-tum systems (say, qubits) being produced by some physical process, where the states of the respective systems are given by ρX1 , ρ X2 , . . . , the Xj are independent and identically distributed random variables, and ρj is some fixed set of density operators. For example, one might imagine a stream of qubits, each of which is prepared in the state |0〉 with probability one half, or in the
|
{"source": 6248, "title": "from dpo"}
|
supports. For example, a person standing on the ground experiences zero net force, since a normal force (a reaction force) is exerted by the ground upward on the person that counterbalances his weight that is directed downward.: ch.12 Newton's contribution to gravitational theory was to unify the motions of heavenly bodies, which Aristotle had assumed were in a natural state of constant motion, with falling motion observed on the Earth. He proposed a law of gravity that could account for the celestial motions that had been described earlier using Kepler's laws of planetary motion. Newton came to realize that the effects of gravity might be observed in different ways at larger distances. In particular, Newton determined that the acceleration of the Moon around the Earth could be ascribed to the same force of gravity if the acceleration due to gravity decreased as an inverse square law. Further, Newton realized that the acceleration of a body due to gravity is proportional to the mass of the other attracting body. Combining these ideas gives a formula that relates the mass ( m ⊕ {\displaystyle m_{\oplus }} ) and the radius ( R ⊕ {\displaystyle R_{\oplus }} ) of the Earth to the gravitational acceleration: g = − G m ⊕ R ⊕ 2 r ^ , {\displaystyle \mathbf {g} =-{\frac {Gm_{\oplus }}{{R_{\oplus }}^{2}}}{\hat {\mathbf {r} }},} where the vector direction is given by r ^ {\displaystyle {\hat {\mathbf {r} }}} , is the unit vector directed outward from the center of the Earth. In this equation, a dimensional constant G {\displaystyle G} is used to describe the relative strength of gravity. This constant has come to be known as the Newtonian constant of gravitation, though its value was unknown in Newton's lifetime. Not until 1798 was Henry Cavendish able to make the
|
{"page_id": 10902, "title": "Force"}
|
In metallurgy, solid solution strengthening is a type of alloying that can be used to improve the strength of a pure metal. The technique works by adding atoms of one element (the alloying element) to the crystalline lattice of another element (the base metal), forming a solid solution. The local nonuniformity in the lattice due to the alloying element makes plastic deformation more difficult by impeding dislocation motion through stress fields. In contrast, alloying beyond the solubility limit can form a second phase, leading to strengthening via other mechanisms (e.g. the precipitation of intermetallic compounds). == Types == Depending on the size of the alloying element, a substitutional solid solution or an interstitial solid solution can form. In both cases, atoms are visualised as rigid spheres where the overall crystal structure is essentially unchanged. The rationale of crystal geometry to atom solubility prediction is summarized in the Hume-Rothery rules and Pauling's rules. Substitutional solid solution strengthening occurs when the solute atom is large enough that it can replace solvent atoms in their lattice positions. Some alloying elements are only soluble in small amounts, whereas some solvent and solute pairs form a solution over the whole range of binary compositions. Generally, higher solubility is seen when solvent and solute atoms are similar in atomic size (15% according to the Hume-Rothery rules) and adopt the same crystal structure in their pure form. Examples of completely miscible binary systems are Cu-Ni and the Ag-Au face-centered cubic (FCC) binary systems, and the Mo-W body-centered cubic (BCC) binary system. Interstitial solid solutions form when the solute atom is small enough (radii up to 57% the radii of the parent atoms) to fit at interstitial sites between the solvent atoms. The atoms crowd into the interstitial sites, causing the bonds of the solvent atoms to compress
|
{"page_id": 8292324, "title": "Solid solution strengthening"}
|
Mars, and Mercury) and satellites (e.g., Moon). Many of the ejecta blankets of Mars are characterized by fluidized flowing across the surface. In contrast, the ejecta blankets and proximal ejecta deposits of Moon and Mercury (or on airless bodies) are attributed to ballistic sedimentation. Lunar fresh impact craters preserve continuous ejecta blanket that are characterized by blocky and high albedo materials. Similar to the fresh lunar craters, the Mercurian impact craters also form continuous ejecta deposits of blocky and high albedo materials. Radial structure of ejecta deposits are seen around the lunar impact crater and generally thins out as increase distance form the center of the crater. Presence of boulder materials are also seen in the lunar ejecta deposits. However, the diameter of boulder found in ejecta deposits are directly correlated with the size of impact crater diameter. The low gravity and lack of atmosphere (air less bodies) favors the formation of the impact cratering and associated ejecta black on the surface of Moon and Mercury. Although a thick atmosphere and relatively higher gravity of Venus reduce the likelihood impact cratering, the higher surface temperature augments the efficiency of the impact melting and associated ejecta deposits. Ejecta blanket is a common feature to be seen on the Martian impact craters specifically around fresh impact crater. One-third of the Martian impact craters with ≥ 5 km diameter have discernible impact ejecta around. Layered ejecta blanket are plentiful on the surface of Mars as around 90% of ejecta are characterized as layered materials. Though impact cratering and resulted ejecta blanket are ubiquitous features in the solid bodies of the Solar System, the Earth rarely preserve the signature of impact ejecta blanket due to erosion. However, to date, there are 190 identified impact craters on the surface of Earth. == Morphology and types
|
{"page_id": 5587482, "title": "Ejecta blanket"}
|
The East Greenland Current (EGC) is a cold, low-salinity current that extends from Fram Strait (~80N) to Cape Farewell (~60N). The current is located off the eastern coast of Greenland along the Greenland continental margin. The current cuts through the Nordic Seas (the Greenland and Norwegian Seas) and through the Denmark Strait. The current is of major importance because it directly connects the Arctic to the Northern Atlantic, it is a major contributor to sea ice export out of the Arctic, and it is a major freshwater sink for the Arctic. == Water properties == The EGC is composed of a mixture of three distinct water masses. The water masses are Polar Water, Atlantic Water, and Deep Water. These water masses can be clearly seen throughout the EGC's tract southward; however, the upper layer water masses do change some due to atmospheric interaction along with inflow from other water sources in the Nordic Seas. The top 150 meters of the EGC is considered polar water and it is cold and low in salinity. The lowness in salinity has a lot to do with freshwater run off from sea ice melting, river runoff, and Pacific water flux and it is cold due to air-sea interactions while in the Arctic. Typical characteristics for the EGC Polar water are a temperature between 0 °C and –1.7 °C (e.g. freezing point of low-salinity sea water), and the salinity varies greatly from 30 psu (near the surface) to 34 psu at a 150-meter depth. The layer beneath the Polar Water is known as the Atlantic Water layer. It extends down to about 1000 m. This layer is defined as having relatively warm temperatures and saline waters. The temperatures are normally above 0 °C and have a salinity of 34 psu at 150 meters and it
|
{"page_id": 810040, "title": "East Greenland Current"}
|
A Mohr pipette, also known as a graduated pipette, is a type of pipette used to measure the volume of the liquid dispensed, although not as accurately as a volumetric pipette. These use a series of marked lines (as on a graduated cylinder) to indicate the different volumes. They come in a variety of sizes, and are used much like a burette, in that the volume is found by calculating the difference of the liquid level before and after. The last graduation mark is some distance from the tip, to avoid errors in measuring the narrower volume of the nozzle. It was invented by Karl Friedrich Mohr, the father of volumetric analysis. == References ==
|
{"page_id": 19379260, "title": "Mohr pipette"}
|
the roof prism. To approximately correct a roof prism for polychromatic light several phase-correction coating layers are superimposed, since every layer is wavelength and angle of incidence specific. The P-coating was developed in 1988 by Adolf Weyrauch at Carl Zeiss. Other manufacturers followed soon, and since then phase-correction coatings are used across the board in medium and high-quality roof prism binoculars. This coating suppresses the difference in phase shift between s- and p- polarization so both paths have the same polarization and no interference degrades the image. In this way, since the 1990s, roof prism binoculars have also achieved resolution values that were previously only achievable with Porro prisms. The presence of a phase-correction coating can be checked on unopened binoculars using two polarization filters. Dielectric phase-correction prism coatings are applied in a vacuum chamber with maybe thirty or more different superimposed vapor coating layers deposits, making it a complex production process. Binoculars using either a Schmidt–Pechan roof prism, Abbe–Koenig roof prism or an Uppendahl roof prism benefit from phase coatings that compensate for a loss of resolution and contrast caused by the interference effects that occur in untreated roof prisms. Porro prism and Perger prism binoculars do not split beams and therefore they do not require any phase coatings. === Metallic mirror === In binoculars with Schmidt–Pechan or Uppendahl roof prisms, mirror coatings are added to some surfaces of the roof prism because the light is incident at one of the prism's glass-air boundaries at an angle less than the critical angle so total internal reflection does not occur. Without a mirror coating most of that light would be lost. Roof prism aluminum mirror coating (reflectivity of 87% to 93%) or silver mirror coating (reflectivity of 95% to 98%) is used. In older designs silver mirror coatings were used
|
{"page_id": 86058, "title": "Binoculars"}
|
not known, on the basis of their old age, William Buckland (1784–1856) realized that a dramatic step-change in the fossil record had occurred around the base of what we now call the Cambrian. Nineteenth-century geologists such as Adam Sedgwick and Roderick Murchison used the fossils for dating rock strata, specifically for establishing the Cambrian and Silurian periods. By 1859, leading geologists including Roderick Murchison were convinced that what was then called the lowest Silurian stratum showed the origin of life on Earth, though others, including Charles Lyell, differed. In On the Origin of Species, Darwin considered this sudden appearance of a solitary group of trilobites, with no apparent antecedents, and absent other fossils, to be "undoubtedly of the gravest nature" among the difficulties in his theory of natural selection. He reasoned that earlier seas had swarmed with living creatures, but that their fossils had not been found because of the imperfections of the fossil record. In the sixth edition of his book, he stressed his problem further as: To the question why we do not find rich fossiliferous deposits belonging to these assumed earliest periods prior to the Cambrian system, I can give no satisfactory answer. American paleontologist Charles Walcott, who studied the Burgess Shale fauna, proposed that an interval of time, the "Lipalian", was not represented in the fossil record or did not preserve fossils, and that the ancestors of the Cambrian animals evolved during this time. Earlier fossil evidence has since been found. The earliest claim is that the history of life on Earth goes back 3,850 million years: Rocks of that age at Warrawoona, Australia, were claimed to contain fossil stromatolites, stubby pillars formed by colonies of microorganisms. Fossils (Grypania) of more complex eukaryotic cells, from which all animals, plants and fungi are built, have been found
|
{"page_id": 19349161, "title": "Cambrian explosion"}
|
been used. Thus a pretest is needed to define a possibly existing preference for one compartment. In a biased context, it is to show an absolute CPP to the initially non-preferred place. Otherwise, for instance, when anxiolytic drugs are used as the rewarding agent, we can interpret only relative place preference to be derived from the anxiolytic effect of the drug. On the other hand, with a biased design, we can distinguish between the anxiolytic and anti-aversive effects of drugs independently from potential genuine rewarding effects. In addition, individuals who will be handling animals must be trained to do this consistently so as to minimize stress on the animal. It has been shown that stressful handling in rodents can weaken conditioning. There is debate over whether or not the results obtained from drug studies can be generalized to drug reward in humans. It has been claimed that since the animal passively receives the drug, it cannot be compared. == Extinction and reinstatement procedures == === Extinction === Extinction in the conditioned place preference paradigm is the process by which the association of the place compartment with the paired aversives or appetitive stimulus is greatly reduced, thus diminishing the place preference or aversion. Extinction occurs when the conditioned stimulus is presented on repeated trials without the presence of the appetitive or aversive stimulus. For example, if the animal had been given a reinforcing food stimulus when in one place compartment and established a preference for this place, the extinction process would be implemented by placing the animal in the compartment but not giving it the reinforcing food stimulus (unconditioned stimulus) while it was in the compartment. The extinction process can be used with knockout mice to establish whether certain receptors are particularly involved in the extinction process. Extinction is also used
|
{"page_id": 20876681, "title": "Conditioned place preference"}
|
unique such x {\displaystyle x} satisfying the equation and inequalities). Similarly we take u , v {\displaystyle u,v} satisfying N − k = u a + v b {\displaystyle N-k=ua+vb} and 0 ≤ u < b {\displaystyle 0\leq u<b} . Now we can add these equations to write N = ( u + x ) a + ( y + v ) b {\displaystyle N=(u+x)a+(y+v)b} which, using N = a b − a − b {\displaystyle N=ab-a-b} yields a b − b ( 1 + y + v ) = a ( x + u + 1 ) {\displaystyle ab-b(1+y+v)=a(x+u+1)} . The integer x + u + 1 {\displaystyle x+u+1} is positive, because x , u ≥ 0 {\displaystyle x,u\geq 0} . In fact, since the left-hand side of a b − b ( 1 + y + v ) = a ( x + u + 1 ) {\displaystyle ab-b(1+y+v)=a(x+u+1)} is divisible by b {\displaystyle b} , and ( a , b ) = 1 {\displaystyle (a,b)=1} , we must have that x + u + 1 {\displaystyle x+u+1} is divisible by b {\displaystyle b} . Yet x , u ≤ b − 1 {\displaystyle x,u\leq b-1} , so x + u + 1 ≤ 2 b − 1 {\displaystyle x+u+1\leq 2b-1} , so that x + u + 1 = b {\displaystyle x+u+1=b} . Substituting this into a b − b ( 1 + y + v ) = a ( x + u + 1 ) {\displaystyle ab-b(1+y+v)=a(x+u+1)} and subtracting a b {\displaystyle ab} from both sides yields b ( 1 + y + v ) = 0 {\displaystyle b(1+y+v)=0} . So 1 + y + v = 0 {\displaystyle 1+y+v=0} . This implies that y + v = − 1 {\displaystyle y+v=-1} , which means that
|
{"page_id": 2302444, "title": "Coin problem"}
|
In computer graphics and computer vision, image-based modeling and rendering (IBMR) methods rely on a set of two-dimensional images of a scene to generate a three-dimensional model and then render some novel views of this scene. The traditional approach of computer graphics has been used to create a geometric model in 3D and try to reproject it onto a two-dimensional image. Computer vision, conversely, is mostly focused on detecting, grouping, and extracting features (edges, faces, etc.) present in a given picture and then trying to interpret them as three-dimensional clues. Image-based modeling and rendering allows the use of multiple two-dimensional images in order to generate directly novel two-dimensional images, skipping the manual modeling stage. == Light modeling == Instead of considering only the physical model of a solid, IBMR methods usually focus more on light modeling. The fundamental concept behind IBMR is the plenoptic illumination function which is a parametrisation of the light field. The plenoptic function describes the light rays contained in a given volume. It can be represented with seven dimensions: a ray is defined by its position ( x , y , z ) {\displaystyle (x,y,z)} , its orientation ( θ , ϕ ) {\displaystyle (\theta ,\phi )} , its wavelength ( λ ) {\displaystyle (\lambda )} and its time ( t ) {\displaystyle (t)} : P ( x , y , z , θ , ϕ , λ , t ) {\displaystyle P(x,y,z,\theta ,\phi ,\lambda ,t)} . IBMR methods try to approximate the plenoptic function to render a novel set of two-dimensional images from another. Given the high dimensionality of this function, practical methods place constraints on the parameters in order to reduce this number (typically to 2 to 4). == IBMR methods and algorithms == View morphing generates a transition between images Panoramic imaging renders
|
{"page_id": 2723838, "title": "Image-based modeling and rendering"}
|
curve). artificial general intelligence A non-human mechanism that demonstrates a broad range of problem solving, creativity, and adaptability. For example, a program demonstrating artificial general intelligence could translate text, compose symphonies, and excel at games that have not yet been invented. artificial intelligence #fundamentals A non-human program or model that can solve sophisticated tasks. For example, a program or model that translates text or a program or model that identifies diseases from radiologic images both exhibit artificial intelligence. Formally, machine learning is a sub-field of artificial intelligence. However, in recent years, some organizations have begun using the terms artificial intelligence and machine learning interchangeably. attention #language A mechanism used in a neural network that indicates the importance of a particular word or part of a word. Attention compresses the amount of information a model needs to predict the next token/word. A typical attention mechanism might consist of a weighted sum over a set of inputs, where the weight for each input is computed by another part of the neural network. Refer also to self-attention and multi-head self-attention, which are the building blocks of Transformers. See LLMs: What's a large language model? in Machine Learning Crash Course for more information about self-attention. attribute #responsible Synonym for feature. In machine learning fairness, attributes often refer to characteristics pertaining to individuals. attribute sampling #df A tactic for training a decision forest in which each decision tree considers only a random subset of possible features when learning the condition. Generally, a different subset of features is sampled for each node. In contrast, when training a decision tree without attribute sampling, all possible features are considered for each node. AUC (Area under the ROC curve) #fundamentals #Metric A number between 0.0 and 1.0 representing a binary classification model's ability to separate positive classes from negative
|
{"source": 1194, "title": "from dpo"}
|
have sample complexity bounds scale with the size of the \emph{joint action space} when specialized to the canonical tabular Markov game setting, which is exponentially large in the number of agents. Our algorithms rely on two key technical innovations: (1) utilizing policy replay to tackle {\it non-stationarity} incurred by multiple agents and the use of function approximation; (2) separating learning Markov equilibria and exploration in the Markov games, which allows us to use the full-information no-regret learning oracle instead of the stronger bandit-feedback no-regret learning oracle used in the tabular setting. Furthermore, we propose an iterative-best-response type algorithm that can learn pure Markov Nash equilibria in independent linear Markov potential games, with applications in learning in congestion games. In the tabular case, by adapting the policy replay mechanism for independent linear Markov games, we propose an algorithm with $\widetilde{O}(\epsilon^{-2})$ sample complexity to learn Markov CCE, which improves the state-of-the-art result $\widetilde{O}(\epsilon^{-3})$ in \citep{daskalakis2022complexity}, where $\epsilon$ is the desired accuracy, and also significantly improves other problem parameters. Furthermore, we design the first provably efficient algorithm for learning Markov CE that breaks the curse of multiagents. ### On the Complexity of Multi-Agent Decision Making: From Learning in Games to Partial Monitoring **Time:** Thursday July 13 10:00 AM (In-person talk) **Authors:** Foster, Dean; Foster, Dylan J; Golowich, Noah; Rakhlin, Alexander **Abstract:** A central problem in the theory of multi-agent reinforcement learning (MARL) is to understand what structural conditions and algorithmic principles lead to sample-efficient learning guarantees, and how these considerations change as we move from few to many agents. We study this question in a general framework for interactive decision making with multiple agents, encompassing Markov games with function approximation and normal-form games with bandit feedback. We focus on equilibrium computation, in which a centralized learning algorithm aims to compute an equilibrium by
|
{"source": 3362, "title": "from dpo"}
|
no effect on the accuracy of the material part of the printout (the alcohol reading). On appeal, this interpretation has now been rejected by the House of Lords: only malfunctions that affect the way in which a computer processes, stores or retrieves the information used to generate the statement are relevant to section 69. 1 Ladkin and others, ‘The Law Commission presumption concerning the dependability of computer evidence’ (commented on this citation by the Law Commission, at 3: ‘We were surprised to read Tapper’s suggestion that the Tapper Condition categorises “most computer error”, even allowing that he was writing in 1991. Reading the original paper, it seems to us as if Professor Tapper was not categorising “most computer error” in unqualified terms, but rather considering particular phenomena that are manifest in the use of one specific sort of IT system, namely systems commonly used for clerical work (maybe, more specifically, for legal-clerical work). The Tapper Condition does not appear to hold in general.’ 2 It may be the case that computer technology made it increasingly difficult to comply with the provisions of s 69, but this is not an argument to presume that mechanical instruments were in order at the material time. Professor Les Hatton, in his article ‘The chimera of software quality’ 103, stated that: computer programs are fundamentally unquantifiable at the present stage of knowledge, and we must consider any proof based on them flawed until we can apply the same level of verification to a program as to a theorem. Scientific papers are peer reviewed with a long-standing and highly successful system. The computer programs we use today to produce those results generally fly somewhere off the peer- review radar. Even worse, scientists will swap their programs uncritically, passing on the virus of undiscovered software faults. That
|
{"source": 5648, "title": "from dpo"}
|
and increases by 6 each time. So we can write it as 4, 10, 16, ... And we know there are 20 houses, so we need to find the 20th number in the sequence. We could write out the sequence and look for the 20th number, but there's a better way. We can use the arithmetic sequence formula. The formula is $a_n=a_1+(n-1)*d$, where $a_n$ is the $n$th number in the sequence, $a_1$ is the first number, and $d$ is the common difference. So if we plug in $n=20$, $a_1=4$, and $d=6$, we get $a_n=4+(20-1)*6$. Which simplifies to $a_n=4+19*6$. And that gives us $a_n=4+114$. So the 20th number on the south side is 118. There is 1 digit in the number 4, 2 digits in the number 10, and so on. Right. So one house has 1 digit, 4 houses have 3 digits, and 15 houses have 2 digits. So the number of digits painted on the south side is $1+4*3+15*2$. Which simplifies to $1+12+30$. So 43 digits were painted on the south side. What about the north side? The sequence here is 3, 9, 15, ... And we know that there are 20 houses. So we need to find the 20th number in the sequence. The common difference is 6, and the first number is 3, so we can use the same formula as for the south side. $a_n=a_1+(n-1)*d$ gives us $a_n=3+(20-1)*6$. That simplifies to $a_n=3+19*6$. So $a_n=3+114$. Thus the 20th number on the north side is 117. How many digits were painted on the north side? The first number has only one digit. The third number, 15, has two digits What about the last number, 117? The rest of the houses have two digits The number of digits painted on the north side is then $2+3*3+15*2$. This simplifies to
|
{"source": 6641, "title": "from dpo"}
|
Florey went on to discover penicillin's therapeutic action and its chemical composition. Chain and Florey discovered how to isolate and concentrate the germ-killing agent in penicillin. For this research, Chain, Florey, and Fleming received the Nobel Prize in 1945. Along with Edward Abraham he was also involved in theorising the beta-lactam structure of penicillin in 1942, which was confirmed by X-ray crystallography done by Dorothy Hodgkin in 1945. Towards the end of World War II, Chain learned his mother and sister had been killed by the Nazis. After World War II, Chain moved to Rome, to work at the Istituto Superiore di Sanità (Superior Institute of Health). He returned to Britain in 1964 as the founder and head of the biochemistry department at Imperial College London, where he stayed until his retirement, specialising in fermentation technologies. On 17 March 1948 Chain was appointed a Fellow of the Royal Society. In spite of his successful scientific career and widespread recognition from his Nobel Prize, Chain was for some time barred from entry to the United States under the McCarran Internal Security Act of 1950, being declined a visa on two occasions in 1951. In 1948, he married Anne Beloff, sister of Renee Beloff, Max Beloff, John Beloff and Nora Beloff, and a biochemist of significant standing herself. In his later life, his Jewish identity became increasingly important to him. Chain was an ardent Zionist and he became a member of the board of governors of the Weizmann Institute of Science at Rehovot in 1954, and later a member of the executive council. He raised his children securely within the Jewish faith, arranging much extracurricular tuition for them. His views were expressed most clearly in his speech 'Why I am a Jew' given at the World Jewish Congress Conference of Intellectuals in
|
{"page_id": 740289, "title": "Ernst Chain"}
|
by the Mediterranean Science Commission. Marine research institutes were already in existence, starting with the Stazione Zoologica Anton Dohrn in Naples, Italy (1872), the Biological Station of Roscoff, France (1876), the Arago Laboratory in Banyuls-sur-mer, France (1882), the Laboratory of the Marine Biological Association in Plymouth, UK (1884), the Norwegian Institute for Marine Research in Bergen, Norway (1900), the Laboratory für internationale Meeresforschung, Kiel, Germany (1902). On the other side of the Atlantic, the Scripps Institution of Oceanography was founded in 1903, followed by the Woods Hole Oceanographic Institution in 1930, the Virginia Institute of Marine Science in 1938, the Lamont–Doherty Earth Observatory at Columbia University in 1949, and later the School of Oceanography at University of Washington. In Australia, the Australian Institute of Marine Science (AIMS), established in 1972 soon became a key player in marine tropical research. In 1921 the International Hydrographic Bureau, called since 1970 the International Hydrographic Organization, was established to develop hydrographic and nautical charting standards. == Related disciplines == == See also == == References == === Sources and further reading === Boling Guo, Daiwen Huang. Infinite-Dimensional Dynamical Systems in Atmospheric and Oceanic Science, 2014, World Scientific Publishing, ISBN 978-981-4590-37-2. Sample Chapter Hamblin, Jacob Darwin (2005) Oceanographers and the Cold War: Disciples of Marine Science. University of Washington Press. ISBN 978-0-295-98482-7 Lang, Michael A., Ian G. Macintyre, and Klaus Rützler, eds. Proceedings of the Smithsonian Marine Science Symposium. Smithsonian Contributions to the Marine Sciences, no. 38. Washington, D.C.: Smithsonian Institution Scholarly Press (2009) Roorda, Eric Paul, ed. The Ocean Reader: History, Culture, Politics (Duke University Press, 2020) 523 pp. online review Steele, J., K. Turekian and S. Thorpe. (2001). Encyclopedia of Ocean Sciences. San Diego: Academic Press. (6 vols.) ISBN 0-12-227430-X Sverdrup, Keith A., Duxbury, Alyn C., Duxbury, Alison B. (2006). Fundamentals of Oceanography,
|
{"page_id": 44044, "title": "Oceanography"}
|
efficient machine language instructions. Whereas third-generation languages historically generated many machine instructions for each statement, C has statements that may generate a single machine instruction. Moreover, an optimizing compiler might overrule the programmer and produce fewer machine instructions than statements. Today, an entire paradigm of languages fill the imperative, third generation spectrum. The fourth generation of programming language emphasizes what output results are desired, rather than how programming statements should be constructed. Declarative languages attempt to limit side effects and allow programmers to write code with relatively few errors. One popular fourth generation language is called Structured Query Language (SQL). Database developers no longer need to process each database record one at a time. Also, a simple select statement can generate output records without having to understand how they are retrieved. === Imperative languages === Imperative languages specify a sequential algorithm using declarations, expressions, and statements: A declaration introduces a variable name to the computer program and assigns it to a datatype – for example: var x: integer; An expression yields a value – for example: 2 + 2 yields 4 A statement might assign an expression to a variable or use the value of a variable to alter the program's control flow – for example: x := 2 + 2; if x = 4 then do_something(); ==== Fortran ==== FORTRAN (1958) was unveiled as "The IBM Mathematical FORmula TRANslating system". It was designed for scientific calculations, without string handling facilities. Along with declarations, expressions, and statements, it supported: arrays. subroutines. "do" loops. It succeeded because: programming and debugging costs were below computer running costs. it was supported by IBM. applications at the time were scientific. However, non-IBM vendors also wrote Fortran compilers, but with a syntax that would likely fail IBM's compiler. The American National Standards Institute (ANSI) developed
|
{"page_id": 5783, "title": "Computer program"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.