text
stringlengths 5
10.5k
| source
stringlengths 33
146
|
|---|---|
same linear transformation can be expressed in the Fourier basis and this yields Definition 2.3. Definition 2.2 (Transition matrix [4, Definition 3.2 ]). Let F : Fn > 2 → Fm > 2 be a function. Define T F : R[Fn > 2 ] → R[Fm > 2 ] as the unique linear operator defined by δx → δF(x) for all x ∈ Fn > 2 . The transition matrix of F is the coordinate repre-sentation of T F with respect to the standard bases of R[Fn > 2 ] and R[Fm > 2 ]. Definition 2.3 (Correlation matrix [4, Definition 3.3 ]). Let F : Fn > 2 → Fm > 2 be a function. Define CF : R[Fn > 2 ] → R[Fm > 2 ] as the Fourier transformation of T F. That is, CF = Fm T F F −1 > n . The correlation matrix of F is the coordinate representation of CF with respect to the standard bases of R[Fn > 2 ] and R[Fm > 2 ]. The coordinates of the correlation matrix CF correspond to the correlations of linear approximations over F. In particular, CF > v,u = 2 Pr [ vTF(x) + uTx = 0] −1with x uniform random. In fact, the original definition of correlation matrices due to Daemen et al. starts from this equivalence. Correlation matrices satisfy several natural properties, most of which are direct consequences of the properties of transition matrices and Defintion 2.3. In particular, for a function F = Fr ◦ · · · ◦ F1, it holds that CF = CFr CFr−1 · · · CF1 . Expanding the above equation in coordinates yields the following identity: CF > ur+1 ,u 1 = ∑ > u2,...,u r > r ∏ > i=1 CFi >
|
{"source": 5838, "title": "from dpo"}
|
which Annie removed her socks, as usual, before getting into bed. Not untrue, but if the speaker were aware of the order in which the events took place, certainly rather uncooperative. For (2) is under 198 Chapter Six those circumstances rather misleading. We normally assume that speakers are inclined to be orderly. If two events are mentioned one after the other, then we tend to assume-as long as we have not heard the contrary-that the temporal order in which they were described is a reflection of that in which they took place. The qualification "as long as we have not heard the contrary" contains the explanation for sentences like (3). In stating (3), a speaker explicitly un-derlines the fact that he is unaware of the order in which the events took place so as to avoid misleading the listener. One advantage of this approach is that a completely analogous explanation can be given for the difference between (4) and (5): (4) Annie took off her socks. She jumped into bed. (5) Annie jumped into bed. She took off her socks. The difference in meaning hetween (4) and (5) is exactly the same as the dif-ference between (I) and (2). But it is difficult to see how the first approach, which localized the difference in the conjunction and, could account for it, since the word is absent (especially given that leaving out the conjunction, a stylistic device known as asyndeton, generally only strengthens the suggestion of temporal succession). A uniform explanation such as that given by the sec-ond approach is preferable. We have now distinguished two different approaches. One can assume that the conjunctions have various meanings, only one of which is found in propo-sitional logic. This could be called the semantic approach, since an attempt is made to solve problems
|
{"source": 6818, "title": "from dpo"}
|
In high energy particle physics nucleon-lepton scattering, the semi-inclusive deep inelastic scattering (SIDIS) is a method to obtain information on the nucleon structure. It expands the traditional method of deep inelastic scattering (DIS). In DIS, only the scattered lepton is detected while the remnants of the shattered nucleon are ignored (inclusive experiment). In SIDIS, a high momentum hadron, a.k.a. as the leading hadron is detected in addition to the scattered lepton. This allows us to obtain additional details about the scattering process kinematics. == Usefulness == The leading hadron results from the hadronization of the struck quark. This latter retains the information on its motion inside the nucleon, including its transverse momentum which allows to access the transverse momentum distributions (TMDs) of partons. Likewise, by detecting the leading hadron, one essentially tags (i.e. identifies) the quark on which the scattering occurred. For example, if the leading hadron is a kaon, we know that the scattering occurred on one of the strange quarks of the nucleon's quark sea. In DIS the struck quark is not identified and the information is an indistinguishable sum over all the quark flavors. SIDIS allows to disentangle this information. == Experiments == SIDIS measurements were pioneered at DESY by the HERMES experiment. They are currently (2021) being carried out at CERN by the COMPASS experiment and several experiments at Jefferson Lab. SIDIS will be an important technique used in the future Electron Ion Collider scientific program. == References ==
|
{"page_id": 67785773, "title": "Semi-inclusive deep inelastic scattering"}
|
2013: The SNIF-NMR method is recognized by the European Committee for Standardization for acetic acid. The International Organisation of Vine and Wine (OIV) adopts it as an official method. == Principle == === Isotopic distribution === The atoms hydrogen, oxygen, and carbon co-exist naturally in specific proportions with their stable isotopes, 2H (or D), 18O and 13C respectively, in different proportions as shown in the figure. The amount and distribution of the different isotopes in a molecule is influenced in for natural products by: Environmental (climatic and geographical) conditions, and Chemical or biochemical processes, primary metabolism, photosynthetic metabolism in plants, etc. A phenomenon known as natural isotopic fractionation (see figure) means that an isotopic fingerprint composed of ratios of isotopes at each atom of a molecule can be determined to provide information on the origin—botanical, synthetic, geographical—of the molecule or product. === Principles underlying specific methods === ==== SNIF-NMR ==== SNIF-NMR is built on the principle of natural isotopic fractionation. NMR of two nuclei are routinely used for assessing for food authenticity: Hydrogen nuclei, 2H-SNIF-NMR method which was the original application of SNIF-NMR, measuring the ratio of deuterium/hydrogen at each atom of a sample molecule; and Carbon nuclei: 13, where the C-SNIF-NMR method has opened new applications of SNIF-NMR, where the method determines the ratios of 13C over 12C at each site of a molecule. ===== Steps of the method ===== The SNIF-NMR is applied on purified molecules; therefore, preparative steps are required before instrumental analysis. For example, for the SNIF-NMR of ethanol, according to official methods, preparative steps include: fermentation (for fruit juices); quantitative extraction of ethanol by distillation; and standardized preparation of NMR samples, followed by NMR acquisition, and interpretation of the results, and report regarding sample authenticity. At each step of the SNIF-NMR sample preparation and analysis,
|
{"page_id": 43955768, "title": "Isotopic analysis by nuclear magnetic resonance"}
|
Hong Kong, Singapore, Taiwan, Malaysia, Indonesia, and South Korea. The series is licensed in EMEA regions by LUK International; it premiered in Spain in 1993 and France in 2003. It has also been distributed in South American countries, including Brazil, Colombia, and Chile. In 2017, POPS Worldwide, a Vietnamese multimedia company, collaborated with TV Asahi to release the anime series on YouTube and other digital platforms. ==== Films ==== By 2025, there have been 44 annual feature-length animated films produced by Shin-Ei Animation and released by Toho. The first twenty-five films are based on the 1979 anime, while the rest are based on the 2005 anime. Unlike the anime and manga series, the films are more action-adventure oriented, taking the familiar characters of Doraemon and placing them in a variety of exotic and perilous settings. A 3D computer animated film, Stand by Me Doraemon, debuted in Japan on August 8, 2014. Directed by Takashi Yamazaki and Ryūichi Yagi, it combines elements from the short stories of the manga series: "All the Way from the Country of the Future", "Imprinting Egg", "Goodbye, Shizuka-chan", "Romance in Snowy Mountain", "Nobita's the Night Before a Wedding", and "Goodbye, Doraemon ..." into a new complete story, from the first time Doraemon came to Nobita's house to Doraemon bidding farewell to Nobita. The film was a box office success, grossing $183.4 million worldwide. A sequel, Stand by Me Doraemon 2, also directed by Yamazaki and Yagi, was released on November 20, 2020. ==== Short films, OVA and crossover ==== Several Doraemon short films were produced and released between 1989 and 2004. These include 2112: The Birth of Doraemon, a film about the life of Doraemon from birth before coming to Nobita; Doraemon: Nobita's the Night Before a Wedding, a film about the events related to the
|
{"page_id": 8412, "title": "Doraemon"}
|
= x , {\displaystyle \forall x,y,z:x*(y*z)=(x*y)*z,\quad \forall x:x*1=x,\quad \forall x:1*x=x,} or, shortly, x ∗ ( y ∗ z ) = ( x ∗ y ) ∗ z , x ∗ 1 = x , 1 ∗ x = x . {\displaystyle x*(y*z)=(x*y)*z,\qquad x*1=x,\qquad 1*x=x.} So, these formulas are identities in every monoid. As for any equality, the formulas without quantifier are often called equations. In other words, an identity is an equation that is true for all values of the variables. == See also == Accounting identity List of mathematical identities Law (mathematics) == References == === Notes === === Citations === === Sources === == External links == The Encyclopedia of Equation Online encyclopedia of mathematical identities (archived) A Collection of Algebraic Identities Archived 2011-10-01 at the Wayback Machine
|
{"page_id": 298428, "title": "Identity (mathematics)"}
|
and the orbit spacing has been made uniform. ==== Geocentric Revolution ==== The Geocentric Revolution dial is located on the left of the right section, and shows the ecliptic longitudes of the sun, moon, lunisolar nodes, lunar perigee, and moon phase. These are all complex motions, particularly the moon position, however these calculations are not performed in this module alone. Rather, most of the formulation of anomalies is handled by the Equation Works and transmitted to the Geocentric Revolution dial, where they are combined with mean motions via differentials to produce the display. ==== Julian Period ==== The Julian Period movement is located at the bottom of the right section, and indicates both the Julian Year as well as the Julian Day. These are both discontinuous motions like the Gregorian Calendar, but with a roll-over time of 1pm CET. ==== Equation Works ==== The Equation Works movement has no display on the front of the clock, and is located behind the Main Calendar in the center section. However, it has labelling that is indicative of its various functions, as well as small dials for setting them. The purpose of the Equation Works is to create rotational rates of astronomical significance to be used elsewhere in the clock either directly, or to produce some linear motion at those rates to be used elsewhere. The Equation Works has its own weight as a power source and is regulated in time with a 36 tooth ratchet wheel advanced by an impulse from the Mean Time module. These rates and their usages are listed here, in order of left to right when looking at the front of the clock (or right to left if viewing from the back, where the movement is more visible): 1/2 Tropical Year (182d 14h 54m 23s). Generates a sinusoidal
|
{"page_id": 4785198, "title": "Jens Olsen's World Clock"}
|
In digital circuits, a logic level is one of a finite number of states that a digital signal can inhabit. Logic levels are usually represented by the voltage difference between the signal and ground, although other standards exist. The range of voltage levels that represent each state depends on the logic family being used. A logic-level shifter can be used to allow compatibility between different circuits. == 2-level logic == In binary logic the two levels are logical high and logical low, which generally correspond to binary numbers 1 and 0 respectively or truth values true and false respectively. Signals with one of these two levels can be used in Boolean algebra for digital circuit design or analysis. === Active state === The use of either the higher or the lower voltage level to represent either logic state is arbitrary. The two options are active high (positive logic) and active low (negative logic). Active-high and active-low states can be mixed at will: for example, a read only memory integrated circuit may have a chip-select signal that is active-low, but the data and address bits are conventionally active-high. Occasionally a logic design is simplified by inverting the choice of active level (see De Morgan's laws). The name of an active-low signal is historically written with a bar above it to distinguish it from an active-high signal. For example, the name Q, read Q bar or Q not, represents an active-low signal. The conventions commonly used are: a bar above (Q) a leading slash (/Q) a leading exclamation mark (!Q) a lower-case n prefix or suffix (nQ, Qn or Q_n) an upper-case N suffix (Q_N) a trailing # (Q#), or an _B or _L suffix (Q_B or Q_L). Many control signals in electronics are active-low signals (usually reset lines, chip-select lines and
|
{"page_id": 5652077, "title": "Logic level"}
|
casting purposes for this reason. British metallurgist Thomas Turner reported that silicon also reduces shrinkage and the formation of blowholes, lowering the number of bad castings. However, too much silicon present in the iron leads to increased brittleness and moderate hardness. ==== Phosphorus ==== Phosphorus (P) has four major effects on iron: increased hardness and strength, lower solidus, increased fluidity, and cold shortness. Depending on the use intended for the iron, these effects are either good or bad. Bog ore often has a high phosphorus content. The strength and hardness of iron increases with the concentration of phosphorus. 0.05% phosphorus in wrought iron makes it as hard as medium-carbon steel. High-phosphorus iron can also be hardened by cold hammering. The hardening effect is true for any concentration of phosphorus. The more phosphorus, the harder the iron becomes and the more it can be hardened by hammering. Modern steel makers can increase hardness by as much as 30%, without sacrificing shock resistance by maintaining phosphorus levels between 0.07 and 0.12%. It also increases the depth of hardening due to quenching, but at the same time also decreases the solubility of carbon in iron at high temperatures. This would decrease its usefulness in making blister steel (cementation), where the speed and amount of carbon absorption is the overriding consideration. The addition of phosphorus has a downside. At concentrations higher than 0.2%, iron becomes increasingly cold short, or brittle at low temperatures. Cold short is especially important for bar iron. Although bar iron is usually worked hot, its uses often require it to be tough, bendable, and resistant to shock at room temperature. A nail that shatters when hit with a hammer or a carriage wheel that breaks when it hit a rock would not sell well. High enough concentrations of phosphorus render
|
{"page_id": 145352, "title": "Iron ore"}
|
links == Official website Adam Cheyer Keynote Speaker Bio Page A patent in speech assistance Personalized vocabulary for digital assistant, published Dec 2, 2014 (Google Patents website)
|
{"page_id": 34000257, "title": "Adam Cheyer"}
|
The AES coarse-groove calibration discs (AES-S001-064) are a boxed set of two identical discs, one for routine use, one for master reference. The intent is to characterize the reproduction chain for the mass transfer of coarse-groove records to digital media, much like using a photographic calibration reference in image work. Libraries and archives around the world have collections of many thousands of coarse-groove mechanical audio recordings, phonograph or gramophone records, largely 78s or 78 revolutions per minute (rpm) discs. This is a substantial recorded heritage of mankind's music and spoken word made over a period of 65 years. The 78 rpm disc was largely out of production by 1960. These mechanical recordings won't be available indefinitely since the plastics used in their manufacture are deteriorating slowly but steadily. Preservation programs have been underway by a number of organizations. Decreasing costs of digital storage media now make it possible to consider all mechanical audio recordings for transfer to the digital domain. Thus a widespread need was recognized by the Audio Engineering Society (AES) to provide a calibration tool for standard transfer of mechanical coarse-groove audio recordings from the analog to the digital domain. == Specifications == Side A: Gliding tone, 20 Hz to 20 kHz Speed: 77.92 rpm Lateral (mono) coarse groove Time constants: 3180/450/0 ms Separate outer & inner bands: 1 kHz trigger tone Gliding tone, 20 Hz to 20 kHz 1 kHz reference level* *20 mm Light Band Width (LBW); approx 8 cm/s peak-to-peak, 5.7 cm/s rms Side B: Single tones, 18kHz to 30 Hz Speed: 77.92 rpm Lateral (mono) coarse groove Time constants: 3180/450/50 ms (Pressed under license from EMI Records Ltd.) == A Closer Look At The Preservation Problem == According to Ted Kendall, maker of the Front End audio restoration unit also known as "The Mousetrap",
|
{"page_id": 13067121, "title": "AES64"}
|
[–] One of the best engineering talks is about this notion that simple!=easy : This is surprisingly often not understood, even by people I showed the video. And I am not sure why. But I do think it's necessary in out field to start understanding this much more deeply, especially for senior engineers. mandeepj on Jan 21, 2019 | root | parent | prev | next [–] Good definition of 'Simple'. Simple and easy may not be the same but there are situations where they are similar. For e.g. - for production deployment, I could either put the entire office upside down. Fires across the departments. Broken applications. Rollbacks. Or, I can automate all of our QA test cases and have a one-click deployment. No huss or fuss. I'm sure after having this experience, someone will definitely say - well, this was easy. Anyway, good discussion. gerbilly on Jan 21, 2019 | root | parent | prev | next [–] > I think you are conflating simple and easy. I like to state it as complex vs. difficult. Finding a bug in ten thousand lines of crappy VB code code is 'difficult', but not fun. Writing an space/time efficient implementation of level set topology optimization is complex. Senior developers usually love complex problems, but hate merely difficult problems. webdood90 on Jan 21, 2019 | root | parent | prev | next [–] Are things in place to make the job easier? Seniors don’t need easier and this is a huge turnoff. What? I feel like you have a very narrow-minded idea of what sr engineers want. drb91 on Jan 21, 2019 | root | parent | next [–] Well, unambitious seniors are a good bet on who not to hire. They’ll only work what you pay them for, those
|
{"source": 10, "title": "from dpo"}
|
on top of a hold and used to pull up. heel toe lock —A technique where Marines wedge his/her foot in a crack lengthwise. jam —Wedging feet, hands, fingers of other body parts to gain purchase in a crack. jug —A large easy to hold feature. jummar —A device used to ascend a rope by only sliding in one direction. lead —To climb with the rope starting at the ground and clipping into protection on the way up. mantel —A technique that involves the transfer of force from a pulling up motion to a pushing up motion. mono —A pocket only one finger can fit into. mountain pickets —Are team to squad sized patrols (2–13) that post on or move along the tops of ridgelines to provide reconnaissance, surveillance, security, calling and adjusting supporting arms into adjacent or unoccupied compartments in a unit’s area of operations. They may be employed as flank security during movements or to control terrain within a moun-tainous area of operations. move —Movement; one of a series of motions necessary to gain climbing distance. nuts —A piece of metal that is wider at one end. It is inserted into cracks for protection. Glossary-6 __________________________________________________________________________________________ MCRP 3-35.1C offwidth —A crack that is too wide for a hand jam and too narrow to fit the entire body into. open hand —Grabbing a hold and relying on getting the maximum amount of friction possible to hold on. pitch —A section of climb between two belays and no longer than the length of one rope. p i t o n s — M e t a l s p i k e s o f v a r i o u s s h a p e s , hammered into the rock to provide anchors in cracks. Also called
|
{"source": 2294, "title": "from dpo"}
|
iteratively apply this function to the innermost lambda of an expression e until all lambdas have disappeared. In the following example, the innermost lambda(s) has been underlined: C2 = λf . λx . f (f x ) (case 3) → λf . (S(λx . f )( λx . (f x ))) (cases 2, 3) → λf . (S(Kf )( S(λx . f )( λx . x ))) (cases 2, 1) → λf . (S(Kf )( S(Kf )I)) (case 3) → (S(λf . (S(Kf )))( λf . (S(Kf )I))) (case 3) → (S(S(λf . S )( λf . (Kf )))( λf . (S(Kf )I))) (cases 1, 3) → (S(S(KS )( S(λf . K )( λf . f )))( λf . (S(Kf )I))) (cases 2, 1) → (S(S(KS )( S(KK )I))( λf . (S(Kf )I))) (case 3) → (S(S(KS )( S(KK )I))( S(λf . (S(Kf )))( λf . I ))) (cases 3, 2) → (S(S(KS )( S(KK )I))( S(S(λf . S )( λf . (Kf )))( KI ))) (cases 2, 3) → (S(S(KS )( S(KK )I))( S(S(KS )( S(λf . K )( λf . f )))( KI ))) (cases 2, 1) → (S(S(KS )( S(KK )I))( S(S(KS )( S(KK )I))( KI ))) Were we to expand this expression using the definitions for S, K, I given above and simplify the term, we would end up with the expression for C2 again. # 3.2 SK Combinator Calculus The SKI combinator calculus is not minimal, it can still be reduced further. We can remove the I combinator by noting that I = ( SKK ): (SKKx ) → (Kx (Kx )) → x If we substitute ( SKK ) wherever we find I, we can express any term in the lambda calculus using only the combinators S and K and parentheses for grouping. 5
|
{"source": 4209, "title": "from dpo"}
|
recognize that question as ridiculous. No child will have precisely that weight. Real values can have infinite precision and as such it is a bit mind boggling to think about the probability that a random variable takes on a specific value. Instead, let's start by discretizing time, our continuous variable, by breaking it into 5 minute chunks. We can now think about something like, the probability that the bus arrives between 2:00p and 2:05 as an event with some probability (see figure below on the left). Five minute chunks seem a bit coarse. You could imagine that instead, we could have discretized time into 2.5 minute chunks (figure in the center). In this case the probability that the bus shows up between 15 mins and 20 mins after 2pm is the sum of two chunks, shown in orange. Why stop there? In the limit we could keep breaking time down into smaller and smaller pieces. Eventually we will be left with a derivative of probability at each moment of time, where the probability that is the integral of that derivative between 15 and 20 (figure on the right). Probability Density Functions In the world of discrete random variables, the most important property of a random variable was its probability mass function (PMF) that would tell you the probability of the random variable taking on any value. When we move to the world of continuous random variables, we are going to need to rethink this basic concept. In the continuous world, every random variable instead has a Probability Density Function (PDF) which defines the relative likelihood that a random variable takes on a particular value. We traditionally use the symbol for the probability density function and write it in one of two ways: Where the notation on the right hand side
|
{"source": 6077, "title": "from dpo"}
|
branches; that those stem branches only may have lived for a short time does not affect that assessment in cladistics. == In disciplines other than biology == The comparisons used to acquire data on which cladograms can be based are not limited to the field of biology. Any group of individuals or classes that are hypothesized to have a common ancestor, and to which a set of common characteristics may or may not apply, can be compared pairwise. Cladograms can be used to depict the hypothetical descent relationships within groups of items in many different academic realms. The only requirement is that the items have characteristics that can be identified and measured. Anthropology and archaeology: Cladistic methods have been used to reconstruct the development of cultures or artifacts using groups of cultural traits or artifact features. Comparative mythology and folktale use cladistic methods to reconstruct the protoversion of many myths. Mythological phylogenies constructed with mythemes clearly support low horizontal transmissions (borrowings), historical (sometimes Palaeolithic) diffusions and punctuated evolution. They also are a powerful way to test hypotheses about cross-cultural relationships among folktales. Literature: Cladistic methods have been used in the classification of the surviving manuscripts of the Canterbury Tales, and the manuscripts of the Sanskrit Charaka Samhita. Historical linguistics: Cladistic methods have been used to reconstruct the phylogeny of languages using linguistic features. This is similar to the traditional comparative method of historical linguistics, but is more explicit in its use of parsimony and allows much faster analysis of large datasets (computational phylogenetics). Textual criticism or stemmatics: Cladistic methods have been used to reconstruct the phylogeny of manuscripts of the same work (and reconstruct the lost original) using distinctive copying errors as apomorphies. This differs from traditional historical-comparative linguistics in enabling the editor to evaluate and place in genetic relationship
|
{"page_id": 5376, "title": "Cladistics"}
|
of 0.16 points over Phillips Exeter Academy's final score of 84.28, an extremely close win earned by Rye Country Day School's thoughtful and insightful oppositions. Other finalists included Cary Academy and Woodberry Forest School. == The Physics Fight == The USIYPT consists of six preliminary rounds and a set of final rounds. In each round, called a "Physics Fight," a student from the reporting team presents a 10-minute summary of their research into one of the four official tournament problems. Next, a student from another team engages the reporter in a 12-minute conversation about the reporting team's project. This opponent is charged with helping the audience understand the strengths and weaknesses of the report by means of a series of discussion questions. Only after this conversation is complete are jury members allowed to question the presenting students directly. Teams are judged as much on their ability to ask and answer questions in the physics fight as on the quality of their initial presentations. == Teacher education == Unusual among science competitions, the USIYPT aims to improve physics teaching skills as well as student understanding of the subject. High school teachers are participating members of each school's research team. The sponsoring organization chooses problems for each tournament that are "nontrivial, but not impossible," whose solutions are not necessarily unknown to practicing professional physicists, but are generally new to high school teachers and students. Research is expected to be conducted primarily in each team's school, with direction and assistance from a teacher at that school. == Results == == List of Participating Schools == The Harker School, California – 12 tournaments, 3 championships Phillips Exeter Academy, New Hampshire – 6 tournaments, 3 championships Rye Country Day School, New York – 15 tournaments, 3 championships The Nueva School, California – 5 tournaments, 2
|
{"page_id": 36532984, "title": "United States Invitational Young Physicists Tournament"}
|
sometimes with dots, spots and various colors. The labellum is the middle petal, is larger in size than the two lateral petals, and its shape is extremely variable: it often has three lobes, or unusual shapes, and with fleshy bumps or ridges or a basal spur, and often with a different coloration pattern than the lateral petals. The androecium is usually formed by one or two stamens (sometimes three), if only one derived from the middle stamen of the ancestral outer whorl and usually with two vestigial staminodes derived from the lateral stamens of an ancestral inner whorl. In some subfamilies, as in Apostasioideae or Cypripedioideae, there are two or three fertile stamens. When there are two, they have derived from the two lateral stamens of the ancestral inner whorl, and when three, they have originated from the two laterals of the inner whorl and the middle stamen of the outer whorl. The androcecium is fused to the style and stigma, which are highly modified, forming a structure known as a column, gynostema or gynostegium. The theca of the anthers are arranged in the portion of the gynostema called the clinandrium or androcline. The pollen is granular, in tetrads or agglutinated in two to eight soft or hard masses called pollinias. These pollinia present a filiform appendage—called caudicula—which is united with a sticky mass—retinaculum or viscidium—on the rostellum, a structure derived from the stigma with the shape of an elongated lobe and which is located on the receptive portion of the stigma. The set of pollinia, caudiculae and retinaculae is called pollinarium, which is the transport unit of the pollen during pollination. The anthers are longitudinally dehiscent and their connective is often modified into an operculum that covers the anther until pollination. The gynoecium consists of three carpels fused together,
|
{"page_id": 71883121, "title": "Floral morphology"}
|
for specific intervals, recalling his interest in the Seven Bridges of Königsberg (see above). The device drew renewed interest as the Tonnetz in Neo-Riemannian theory (see also Lattice (music)). Euler further used the principle of the "exponent" to propose a derivation of the gradus suavitatis (degree of suavity, of agreeableness) of intervals and chords from their prime factors – one must keep in mind that he considered just intonation, i.e. 1 and the prime numbers 3 and 5 only. Formulas have been proposed extending this system to any number of prime numbers, e.g. in the form d s = ∑ i ( k i p i − k i ) + 1 , {\displaystyle ds=\sum _{i}(k_{i}p_{i}-k_{i})+1,} where pi are prime numbers and ki their exponents. == Personal philosophy and religious beliefs == Euler was religious throughout his life. Much of what is known of his religious beliefs can be deduced from his Letters to a German Princess and an earlier work, Rettung der Göttlichen Offenbahrung gegen die Einwürfe der Freygeister (Defense of the Divine Revelation against the Objections of the Freethinkers). These show that Euler was a devout Christian who believed the Bible to be inspired; the Rettung was primarily an argument for the divine inspiration of scripture. Euler opposed the concepts of Leibniz's monadism and the philosophy of Christian Wolff. He insisted that knowledge is founded in part on the basis of precise quantitative laws, something that monadism and Wolffian science were unable to provide. Euler called Wolff's ideas "heathen and atheistic". There is a legend inspired by Euler's arguments with secular philosophers over religion, which is set during Euler's second stint at the St. Petersburg Academy. The French philosopher Denis Diderot was visiting Russia on Catherine the Great's invitation. The Empress was alarmed that Diderot's arguments for atheism
|
{"page_id": 17902, "title": "Leonhard Euler"}
|
in Suwon, South Korea. At the time, Samsung Group was known to the South Korean public as a trading company specialized in fertilizers and sweeteners. Despite the lack of technology and resources, falling shorter even than the domestic competitors, Samsung Group improved its footing in the manufacturing industry by cooperating with the Japanese companies, a decision that led to a significant amount of anti-Japanese public outcry and huge backlashes from the competitors fearing the outright subordination of the industry by the Japanese. The strategy was able to take off only after the government and Samsung declared that the company would exclusively focus on exports. Toshio Iue, the founder of Sanyo, played a role as an advisor to Lee Byung-chul, Samsung's founder, who was a novice in the electronics business. In December of the same year, Samsung Electric established a joint venture named Samsung-Sanyo Electric with Sanyo and Sumitomo Corporation. This is the direct predecessor of today's Samsung Electronics. The joint venture's early products were electronic and electrical appliances including televisions, calculators, refrigerators, air conditioners, and washing machines. In 1970, Samsung established the joint venture Samsung-NEC with Japan's NEC Corporation and Sumitomo Corporation to manufacture home appliances and audiovisual devices. Samsung-NEC later became Samsung SDI, the group's display and battery business unit. In 1973, Samsung and Sanyo created Samsung-Sanyo Parts, the predecessor of Samsung Electro-Mechanics. By 1981, Samsung Electric had manufactured over 10 million black-and-white televisions. In 1974, Samsung Group expanded into the semiconductor business by acquiring Korea Semiconductor, which was on the verge of bankruptcy while building one of the first chip-making facilities in the country at the time. Soon after, Korea Telecommunications, an electronic switching system producer and a Samsung Group company, took over the semiconductor business and became Samsung Semiconductor & Communications. In February 1983, Lee, along with
|
{"page_id": 46445426, "title": "Samsung Electronics"}
|
for which there are other organisations such as Medecins sans Frontieres and the Red Cross/Red Crescent, the IMCB envisioned three levels: response to communities who appeal on the basis of chronic disability due to a disaster, after its acute phase is over; represent victims at the international level, for example, the World Health Agency, to recommend legislative changes required to implement the International Bill of Rights relevant to health and safety, and working to define the appropriate public health investigations to serve the needs of the injured community rather than use the victim community to merely serve the needs of science. The International Bill of Rights includes: The Universal Declaration of Human Rights, proclaimed on 10 Dec 1948; The International Covenant on Economic, Social, and Cultural Rights (1976), and the International Covenant on Civil and Political Rights, 1976. The steps to be taken to achieve the full realisation of this right shall include: provision for the reduction of infant deaths and for healthy development of the child; improvement of all aspects of environmental and industrial hygiene; prevention, treatment, and control of epidemic, endemic, occupational and other diseases; creation of conditions which would assure to all people medical service and medical attention in the event of sickness, assuring the victims a living, work and social environment conducive to healing of its injuries. To protect these rights, an international body, free of industry and government pressures, and competent to advise on health and safety standards, is required to be able to mediate just and equitable resolution and compensation of damage in the case of unanticipated disasters. == Members of the IMCB == Rosalie Bertell (Canada), Gianni Tognoni (Italy) Thomas Callendar (USA) Jerry Havens (USA) V. Ramana Dhara (USA)[1] Birger Heinzow (Germany) Marinus Verweij (Netherlands) Sushma Acquilla (UK) Paul Cullinan (UK) Wang Zhengang
|
{"page_id": 9253629, "title": "International Medical Commission on Bhopal"}
|
than having the simple structure of just two ignimbrite sheets, the Lava Creek Tuff may consist of multiple ash-flow lobes from distinct magma bodies. The ash fallout from the Lava Creek Tuff eruption is known as the Lava Creek ash bed (formerly "Pearlette type O"), covering an area exceeding 3,000,000–4,000,000 km2 (1,200,000–1,500,000 sq mi). Perkins and Nash (2002) estimated that the volume of this ash bed is greater than 500 km3 (120 cu mi). It has been identified in the Gulf of Mexico, near Regina, Saskatchewan, in Ventura, California, and in Viola Center, Iowa. ==== Post-collapse rhyolites ==== Post-collapse rhyolites likely erupted shortly after the Lava Creek Tuff. The subaerial post-collapse silicic rocks are collectively referred to as the Plateau Rhyolite, which primarily consists of lava flows. Plateau Rhyolite is divided into three intracaldera members—Upper Basin Member, Mallard Lake Member, and Central Plateau Member—and two extracaldera members—Obsidian Creek Member and Roaring Mountain Member. It is likely that rhyolitic pumice and ash were erupted during the opening of vents for each of these lava flows. The earliest intracaldera rhyolite, the East Biscuit Basin Flow of the Upper Basin Member, is dated to 0.635±0.014 million years, followed by felsic lithic clasts of an unknown unit (0.6±0.02 million years) in Yellowstone Lake, and the North Biscuit Basin Flow (0.580±0.040 million years). The earliest extracaldera rhyolite is the Riverside Flow (0.5258±0.0033 million years) of the Roaring Mountain Member, broadly contemporaneous with the Middle Biscuit Basin Flow (0.527±0.028 million years). Two ash-flow tuff units of the Upper Basin Member include the 35 m (115 ft)-thick Tuff of Uncle Tom’s Trail and the 230 m (750 ft)-thick Tuff of Sulphur Creek, the latter dated at 0.479±0.02 million years. Tuff of Sulphur Creek is at least 13 km3 (3.1 cu mi). These tuffs were deposited on the
|
{"page_id": 379647, "title": "Yellowstone Caldera"}
|
→ Q ) → ( P → Q ) {\displaystyle ((\lnot P\to Q)\to Q)\to (P\to Q)} ( P ∧ ¬ P ) → ( Q ∧ ¬ Q ) {\displaystyle (P\land \lnot P)\to (Q\land \lnot Q)} ** not all contradictions are equivalent in paraconsistent logic ( P → Q ) → ( ¬ Q → ( P → R ) ) {\displaystyle (P\to Q)\to (\lnot Q\to (P\to R))} ( ( P → Q ) → R ) → ( ¬ P → R ) {\displaystyle ((P\to Q)\to R)\to (\lnot P\to R)} ( ( ¬ P → R ) → R ) → ( ( ( P → Q ) → R ) → R ) {\displaystyle ((\lnot P\to R)\to R)\to (((P\to Q)\to R)\to R)} ** counter-factual for {b,f}→? = {t,b} (inconsistent with b→f = f) === Strategy === Suppose we are faced with a contradictory set of premises Γ and wish to avoid being reduced to triviality. In classical logic, the only method one can use is to reject one or more of the premises in Γ. In paraconsistent logic, we may try to compartmentalize the contradiction. That is, weaken the logic so that Γ→X is no longer a tautology provided the propositional variable X does not appear in Γ. However, we do not want to weaken the logic any more than is necessary for that purpose. So we wish to retain modus ponens and the deduction theorem as well as the axioms which are the introduction and elimination rules for the logical connectives (where possible). To this end, we add a third truth-value b which will be employed within the compartment containing the contradiction. We make b a fixed point of all the logical connectives. b = ¬ b = ( b → b ) = ( b ∨
|
{"page_id": 421085, "title": "Paraconsistent logic"}
|
Twister OS is a Linux-based operating system developed by Pi Labs for the Raspberry Pi series of single-board computers. A version for x86-64-based personal computers was released shortly after the initial Raspberry Pi release. The operating system is based on Raspberry Pi OS Lite and uses the Xfce desktop environment. Twister OS is intended to provide a general-purpose computing experience with a visual style that evokes familiarity with other operating systems. It includes themes that resemble those of various versions of Microsoft Windows and macOS. Variants of Twister OS have been developed for different hardware platforms, including ARM-based systems with RK3399 processors. == Features == Twister OS includes multiple desktop themes designed to replicate the appearance of Windows 95, XP, 7, 10, and 11, as well as macOS-inspired themes such as iTwister and iTwister Sur. Most themes include optional dark modes. The system also includes a custom "Twister OS" theme. The distribution includes compatibility tools such as: Box86, an emulator that allows the execution of x86 Linux applications on ARM devices. Wine, a compatibility layer that enables the execution of Windows applications on Linux systems. CommanderPi, a system utility for hardware monitoring and overclocking. == Variants == Twister OS is available in multiple versions tailored to different hardware configurations and use cases: === Twister OS === The standard version targeting ARM-based single-board computers with 64-bit BCM27xx processors like the Raspberry Pi 4/400 and 5/500. Includes all features, themes, and bundled utilities. === Twister OS Armbian === This version targets ARM-based single-board computers based on the Armbian framework, such as the Rock Pi 4B/4C and the Odroid N2/N2+. It comes preinstalled on select devices. === Twister UI === Designed for x86-64 systems, Twister UI is not a standalone operating system but a customization layer applied to existing installations of Linux Mint
|
{"page_id": 67568246, "title": "Twister OS"}
|
the Tommotian Stage, characterized by diversification and global distribution of organisms with mineral skeletons and the appearance of the first Archaeocyath bioherms. ==== Terreneuvian ==== The Terreneuvian is the lowermost series/epoch of the Cambrian, lasting from 538.8 ± 0.6 Ma to c. 521 Ma. It is divided into two stages: the Fortunian stage, 538.8 ± 0.6 Ma to c. 529 Ma; and the unnamed Stage 2, c. 529 Ma to c. 521 Ma. The name Terreneuvian was ratified by the International Union of Geological Sciences (IUGS) in 2007, replacing the previous "Cambrian Series 1". The GSSP defining its base is at Fortune Head on the Burin Peninsula, eastern Newfoundland, Canada (see Ediacaran - Cambrian boundary above). The Terreneuvian is the only series in the Cambrian to contain no trilobite fossils. Its lower part is characterised by complex, sediment-penetrating Phanerozoic-type trace fossils, and its upper part by small shelly fossils. ==== Cambrian Series 2 ==== The second series/epoch of the Cambrian is currently unnamed and known as Cambrian Series 2. It lasted from c. 521 Ma to c. 506.5 Ma. Its two stages are also unnamed and known as Cambrian Stage 3, c. 521 Ma to c. 514.5 Ma, and Cambrian Stage 4, c. 514.5 Ma to c. 506.5 Ma. The base of Series 2 does not yet have a GSSP, but it is expected to be defined in strata marking the first appearance of trilobites in Gondwana. There was a rapid diversification of metazoans during this epoch, but their restricted geographic distribution, particularly of the trilobites and archaeocyaths, have made global correlations difficult, hence ongoing efforts to establish a GSSP. ==== Miaolingian ==== The Miaolingian is the third series/epoch of the Cambrian, lasting from c. 506.5 Ma to c. 497 Ma, and roughly identical to the middle Cambrian in older
|
{"page_id": 5367, "title": "Cambrian"}
|
place, women were obviously identified socially through their relationship to a man, either as wife or daughter. These address terms continue to function as social category labels, identify-ing women, but not men, as married or not. A woman using Ms . as part of her address term is indicating that her social categorization is not based on her marital status. This type of observation leads us to a consideration of the most fundamental difference in social categorization, the one based on “gender.” # Gender We have already noted the difference between two uses of the word gender in Chapter 7. Biological (or “natural”) gender is the distinction in sex between the “male” and “female” of each species. Grammatical gender is the distinction between “masculine” and “feminine,” which is used to classify nouns in languages such as Spanish ( el sol , la luna ). A third use is for social gender , which is the distinction we make when we use words like “man” and “woman” to classify individuals in terms of their social roles. Although the biological distinction (“male, female”) underlies the social distinctions (“father, mother”), there is a great deal about the social roles of individuals as men or women that is unrelated to biology. It is in the sense of social gender, through the process of learning how to become a “boy” or a “girl,” that we inherit a gendered culture. This process can be as simple as learning which category should wear pink versus blue, or as complex as understanding how one category was excluded (by having no vote) from the process of representative government for such a long time. Becoming a social gender also involves becoming familiar with gendered language use. # Gendered words In Sidamo, spoken in Ethiopia, there are some words used only
|
{"source": 991, "title": "from dpo"}
|
##### 2 programming assignments•Total 360 minutes * Bloxorz•180 minutes * Bloxorz•180 minutes ### Type-Directed Programming Module 3•7 hours to complete Module details This week, we’ll learn how to make the compiler write programs for us! We’ll see how the compiler can summon program fragments based on their type and how this mechanism can be used to implement a new form of polymorphism (type classes). #### What's included 5 readings 3 assignments 2 programming assignments Show info about module content ##### 5 readings•Total 50 minutes * Motivating Example•10 minutes * Type-Directed Programming•10 minutes * Type Classes•10 minutes * Conditional Implicit Definitions•10 minutes * Implicit Conversions•10 minutes ##### 3 assignments•Total 30 minutes * Type-Directed Programming•0 minutes * Conditional Implicit Definitions•30 minutes * Implicit Conversions•0 minutes ##### 2 programming assignments•Total 360 minutes * JSON Codecs•180 minutes * JSON Codecs•180 minutes ### Functions and State Module 4•1 hour to complete Module details This week, we'll learn about state and side-effects. Through a rich example, we'll learn programming patterns for managing state in larger programs. We'll also learn about for-loops and while-loops in Scala. #### What's included 6 videos Show info about module content ##### 6 videos•Total 71 minutes * Lecture 4.1 - Functions and State•15 minutes•[Preview module]( * Lecture 4.2 - Identity and Change•8 minutes * Lecture 4.3 - Loops•8 minutes * Lecture 4.4 - Extended Example: Discrete Event Simulation•10 minutes * Lecture 4.5 - Discrete Event Simulation: API and Usage•10 minutes * Lecture 4.6 - Discrete Event Simulation: Implementation and Test•18 minutes ### Timely Effects Module 5•6 hours to complete Module details This week we'll learn a number of important programming patterns via examples, starting with the observer pattern, and then going on to functional reactive programming. #### What's included 4 videos 2 programming assignments Show info about module content ##### 4 videos•Total
|
{"source": 4161, "title": "from dpo"}
|
Southwest 13.0% United 11.0% Delta 10.8% US Airways 8.3% Continental 7.6% Northwest 6.4% JetBlue 4.3% AirTran 3.3% Alaska 2.9% Other 18.1% Market share is based on Revenue Passenger Miles for February 2008 to January 2009. Revenue Passenger Miles (RPMs) is a measure of passenger traffic calculated by multiplying the total number of revenue-paying passengers aboard by the distance traveled in miles. > Source: Adapted from Research and Innovative Technology Administration (RITA), Bureau of Transportation Statistics, April 29, 2009, shows that labor costs are AirTran’s second-highest cost category. Much of the workforce is represented by labor unions with different unions for flight attendants, pilots, dispatch-ers, and maintenance technicians and inspectors. Each group is covered by collective bargaining agreements that provide for annual pay rate increases. AirTran has reduced its labor costs in 2008 through voluntary leaves of absence and early exits. Exhibit 4 indicates that the labor costs (salaries, wages, and benefits) per ASM were the same for 2007 and 2008. AirTran stated in its 2008 Annual Report that it may reduce workforce levels and/or seek new wage concessions in response to significant fuel price increases. A recent article in the Associated Press (April 10, 2009) noted that AirTran pilots recently voted to become part of the Air Line Pilots Association (ALPA), the largest pilot union in the world. The Airline Industry and Competition Several of which compete using the low-cost model (such as AirTran and JetBlue). The intensity of competition and high fuel prices contributed to many airlines declaring Chapter 11 bankruptcy, including many legacy carriers such as Delta, Continental, Northwest, United, and US Airways. Within the last year, at least six airlines declared bankruptcy (and some have ceased operations): Aloha Airlines, ATA Airlines, Skybus Airlines, Frontier Airlines, Eos Airlines, and Sun Country Airlines. Of these six, only Aloha
|
{"source": 4976, "title": "from dpo"}
|
rk(A')=d. \end{aligned} The map f_R \in {\text {Hom}}_{GL_n({\mathbb F}_q)}(\textbf{V}_n^{\otimes s}, \textbf{V}_n^{\otimes k}) can now be described as follows: \begin{aligned} v_1\otimes \ldots \otimes v_s \; \mapsto \; \delta _{A'\textbf{v},\, \dot{0}} \, w_1 \otimes \ldots \otimes w_k, \;\;\; \text { where } \;\;\; \textbf{v} := \begin{bmatrix} v_1 \\ v_2 \\ \vdots \\ v_s \end{bmatrix},\;\; \begin{bmatrix} w_1\\ w_2 \\ \vdots \\ w_k \end{bmatrix} := A\textbf{v}, \end{aligned} Here, we used notation as defined in Section2.1 as follows: let A \in Mat_{k\times s}({\mathbb F}_q), A'\in Mat_{d\times s}({\mathbb F}_q) be such that \begin{aligned} R = Row\begin{bmatrix} -A &{}I_k\\ A' &{}0 \end{bmatrix}, \,\, rk(A')=d \end{aligned} Then, we set \begin{aligned} \hat{f}_R :=\left( {\text {Id}}_{\textbf{V}^{\otimes k}} \otimes (z^*)^{\otimes d} \right) \,\circ \, \mu _{\begin{bmatrix} A \\ A' \end{bmatrix}} \end{aligned} Diagrammatically, \hat{f}_R is given by !Image 85 Explicitly, this means that \hat{f}_R looks like this: !Image 86: figure aq, B'\in Mat_{d\times s}({\mathbb F}_q) be another pair of matrices such that \begin{aligned} R = Row\begin{bmatrix} B &{}I_k\\ B' &{}0 \end{bmatrix},\, rk(B')=d. \end{aligned} Then, we can find some D\in GL_d({\mathbb F}_q) and D'\in Mat_{k \times d} for which \begin{aligned} \begin{bmatrix} B \\ B' \end{bmatrix} = \begin{bmatrix} I_k &{}D'\\ 0 &{}D \end{bmatrix} \begin{bmatrix} A \\ A' \end{bmatrix}. \end{aligned} Thus, we only need to show that \begin{aligned} \left( {\text {Id}}_{\textbf{V}^{\otimes k}} \otimes (z^*)^{\otimes d} \right) \,\circ \, \mu _{\begin{bmatrix} I_k &{}D'\\ 0 &{}D \end{bmatrix}} = \left( {\text {Id}}_{\textbf{V}^{\otimes k}} \otimes (z^*)^{\otimes d} \right) \end{aligned} Diagrammatically, we need to prove that !Image 87 The left-hand side of Eq.( by definition, is
|
{"source": 6290, "title": "from dpo"}
|
in the area. His theory was rejected by Brazilian scientists who had studied twins living in Linha São Pedro; they suggested genetic factors within that community as a more likely explanation. A high twinning rate has also been observed in other places of the world, including: Igbo-Ora in Nigeria Kodinhi, located in Kerala, India Mohammadpur Umri, located in Uttar Pradesh, India In a study on the maternity records of 5750 Hausa women living in the Savannah zone of Nigeria, there were 40 twins and 2 triplets per 1000 births. Twenty-six percent of twins were monozygotic. The incidence of multiple births, which was about five times higher than that observed in any western population, was significantly lower than that of other ethnic groups, who live in the hot and humid climate of the southern part of the country. The incidence of multiple births was related to maternal age but did not bear any association to the climate or prevalence of malaria. Twins are more common in people of African descent. === Predisposing factors === The predisposing factors of monozygotic twinning are unknown. Dizygotic twin pregnancies are slightly more likely when the following factors are present in the woman: She is of West African descent (especially Yoruba) She is between the age of 30 and 40 years She is greater than average height and weight She has had several previous pregnancies. Women undergoing certain fertility treatments may have a greater chance of dizygotic multiple births. In the United States it has been estimated that by 2011 36% of twin births resulted from conception by assisted reproductive technology. The risk of twin birth can vary depending on what types of fertility treatments are used. With in vitro fertilisation (IVF), this is primarily due to the insertion of multiple embryos into the uterus. Ovarian
|
{"page_id": 79238, "title": "Twin"}
|
can yield large amounts of metallic sodium and gaseous chlorine, and is widely used in mineral dressing and metallurgy industries. The emf for this process is approximately −4 V indicating a (very) non-spontaneous process. In order for this reaction to occur the power supply should provide at least a potential difference of 4 V. However, larger voltages must be used for this reaction to occur at a high rate. === Electrolysis of water === Water can be converted to its component elemental gases, H2 and O2, through the application of an external voltage. Water does not decompose into hydrogen and oxygen spontaneously as the Gibbs free energy change for the process at standard conditions is very positive, about 474.4 kJ. The decomposition of water into hydrogen and oxygen can be performed in an electrolytic cell. In it, a pair of inert electrodes usually made of platinum immersed in water act as anode and cathode in the electrolytic process. The electrolysis starts with the application of an external voltage between the electrodes. This process will not occur except at extremely high voltages without an electrolyte such as sodium chloride or sulfuric acid (most used 0.1 M). Bubbles from the gases will be seen near both electrodes. The following half reactions describe the process mentioned above: Anode (oxidation): 2 H2O(l) → O2(g) + 4 H+(aq) + 4 e− Cathode (reduction): 2 H2O(g) + 2 e− → H2(g) + 2 OH−(aq) Overall reaction: 2 H2O(l) → 2 H2(g) + O2(g) Although strong acids may be used in the apparatus, the reaction will not net consume the acid. While this reaction will work at any conductive electrode at a sufficiently large potential, platinum catalyzes both hydrogen and oxygen formation, allowing for relatively low voltages (~2 V depending on the pH). === Electrolysis of aqueous
|
{"page_id": 9601, "title": "Electrochemistry"}
|
An ostiole is a small hole or opening through which algae or fungi release their mature spores. The word is a diminutive of "ostium", "opening". The term is also used in higher plants, for example to denote the opening of the involuted syconium (fig inflorescence) through which fig wasps enter to pollinate and breed. The species pharamacosycea have an arrangement interlocking pattern but there is an exception because of insipdia because it is partly cover the ostiole. On the adaxial side of the bracts is made out of cubic cells, that has a staining reactions and contain phenolic compounds. Sometimes a stomatal aperture is called an "ostiole". == See also == Ostium (disambiguation) == References == Castro-Cárdenas, N., Vázquez-Santana, S., Teixeira, S. P., & Ibarra-Manríquez, G. (2023). Correction to: The roles of the ostiole in the fig-fig wasp mutualism from a morphoanatomical perspective. Journal of Plant Research, 136(1), 157–157. https://doi.org/10.1007/s10265-022-01421-9
|
{"page_id": 8301528, "title": "Ostiole"}
|
no longer be considered canon to the franchise and subsequent reprints would be rebranded under the Star Wars Legends label, with downloadable content for the massively multiplayer online game The Old Republic the only Legends material to still be produced. The Star Wars canon was subsequently restructured to only include the existing six feature films, the animated film The Clone Wars (2008), and its companion animated series. All future projects and creative developments across all types of media would be overseen and coordinated by the story group, announced as a division of Lucasfilm created to maintain continuity and a cohesive vision on the storytelling of the franchise. Multiple comics series from Marvel and novels published by Del Rey were produced after the announcement. Since the new canon has been introduced, there has been a multitude of pieces of Expanded Universe continuity that have become a part of canon. === Print media === Star Wars in print predates the release of the first film, with the November 1976 novelization of Star Wars, initially subtitled "From the Adventures of Luke Skywalker". Credited to Lucas, it was ghostwritten by Alan Dean Foster. The first "Expanded Universe" story appeared in Marvel Comics' Star Wars #7 in January 1978 (the first six issues being an adaptation of the film), followed by Foster's sequel novel Splinter of the Mind's Eye the following month. ==== Novels ==== After penning the novelization of the original film, Foster followed it with the sequel Splinter of the Mind's Eye (1978). The novelizations of The Empire Strikes Back (1980) by Donald F. Glut and Return of the Jedi (1983) by James Kahn followed, as well as The Han Solo Adventures trilogy (1979–1980) by Brian Daley, and The Adventures of Lando Calrissian trilogy (1983) by L. Neil Smith. Timothy Zahn's bestselling Thrawn
|
{"page_id": 26678, "title": "Star Wars"}
|
→ {\displaystyle {\vec {b}}} is P ( a → , b → ) = − a → ⋅ b → . {\displaystyle P({\vec {a}},{\vec {b}})=-{\vec {a}}\cdot {\vec {b}}.} In particular, if the orientation of the two detectors is the same ( a → = b → {\displaystyle {\vec {a}}={\vec {b}}} ), then the outcome of one measurement is certain to be the negative of the outcome of the other, giving P ( a → , a → ) = − 1 {\displaystyle P({\vec {a}},{\vec {a}})=-1} . And if the orientations of the two detectors are orthogonal ( a → ⋅ b → = 0 {\displaystyle {\vec {a}}\cdot {\vec {b}}=0} ), then the outcomes are uncorrelated, and P ( a → , b → ) = 0 {\displaystyle P({\vec {a}},{\vec {b}})=0} . Bell proves by example that these special cases can be explained in terms of hidden variables, then proceeds to show that the full range of possibilities involving intermediate angles cannot. Bell posited that a local hidden-variable model for these correlations would explain them in terms of an integral over the possible values of some hidden parameter λ {\displaystyle \lambda } : P ( a → , b → ) = ∫ d λ ρ ( λ ) A ( a → , λ ) B ( b → , λ ) , {\displaystyle P({\vec {a}},{\vec {b}})=\int d\lambda \,\rho (\lambda )A({\vec {a}},\lambda )B({\vec {b}},\lambda ),} where ρ ( λ ) {\displaystyle \rho (\lambda )} is a probability density function. The two functions A ( a → , λ ) {\displaystyle A({\vec {a}},\lambda )} and B ( b → , λ ) {\displaystyle B({\vec {b}},\lambda )} provide the responses of the two detectors given the orientation vectors and the hidden variable: A ( a → , λ ) = ± 1
|
{"page_id": 56369, "title": "Bell's theorem"}
|
Wallenberg AI, Autonomous Systems and Software Program (WASP), launched in 2015, is Sweden’s largest individual research program. The total funding is 6,2 billion SEK, whereof 4,9 billion SEK is donated by Knut and Alice Wallenberg Foundation. Since January 2020, Sara Mazur is the chair of the program, and program director is Anders Ynnerman. == Research == The aim of the program is academic basic research in artificial intelligence, autonomous systems, and software. The goal is recruitment of 80 leading researchers and examination of 600 PhD students == Collaboration partners == WASP has five partner universities: Chalmers University of Technology, Linköping University, Lund University, KTH Royal Institute of Technology, and Umeå University. In addition, there are affiliated research groups at Örebro University, Uppsala University and Luleå University of Technology that are also included. Collaboration with Swedish industry is crucial, and, at present (January 2023) 60 companies are engaged in the program. == References == == External links == Wallenberg AI, Autonomous Systems and Software Program: WASP-HS The Wallenberg AI, Autonomous Systems and Software Program – Humanities and Society WASP-ED The Wallenberg AI and Transformative Technologies Education Development Program.
|
{"page_id": 72704695, "title": "Wallenberg AI, Autonomous Systems and Software Program"}
|
the keys my predecessor did not prise are two". 'Inf. XXVII, 105. Centaurs: In Greek mythology, a race part Man and part horse, with a horse's body and a human head and torso. Supervising the punishment of the violent. Their leader Chiron appoints one of their number, Nessus, to guide the poets. Inf. XII, 55–139. The only one not with the violent is Cacus, who supervises the thieves. Inf. XXV, 28–30. Cited as examples of gluttony in Purgatory by a voice hidden in a tree of temptation, because of their drunken behavior at the marriage feast of Hippodamia. Purg. XXIV, 121–123. Ceperano: See Apulia. Cerberus: In Greek mythology, he was the three-headed dog who guarded the gate to Hades. In the Aeneid, Virgil has the Sibyl throw a drugged honey cake into Cerberus' mouths; in the Inferno, Dante has Virgil throw dirt instead. Encountered In the third circle. Inf. VI, 13–33. Example of divine punishment. Inf. IX, 98. Cesena: City on the Savio River during Dante's time, though free, its politics were controlled by Guido da Montefeltro's cousin Galasso da Montefeltro. Inf. XXVII, 52–54. Charles the Lame: Son of Charles of Anjou and King of Naples (1285–1309) Forced to marry off his daughters "like slaves" for political alliances. Purg. XX, 79–81. Charles of Anjou (also Charles I of Sicily) (1227–1285): Son of Louis VIII of France, he was one of the most powerful rulers of his age and the undisputed head of the Guelph faction in Italy. His dream of building a Mediterranean Empire was wrecked by the Sicilian Vespers. Dante probably alludes to the Byzantine money that it was believed Nicholas III had taken with the promise to hinder Charles' plans against Constantinople. Inf. XIX, 98–99. Defeated Conradin at Tagliacozzo in 1268 and became King of Sicily. Purg. XX,
|
{"page_id": 1967286, "title": "List of cultural references in the Divine Comedy"}
|
either insulating or conducting targets can be sputtered. IBS has found application in the manufacture of thin-film heads for disk drives. A pressure gradient between the ion source and the sample chamber is generated by placing the gas inlet at the source and shooting through a tube into the sample chamber. This saves gas and reduces contamination in UHV applications. The principal drawback of IBS is the large amount of maintenance required to keep the ion source operating. === Reactive sputtering === In reactive sputtering, the sputtered particles from a target material undergo a chemical reaction aiming to deposit a film with different composition on a certain substrate. The chemical reaction that the particles undergo is with a reactive gas introduced into the sputtering chamber such as oxygen or nitrogen, enabling the production of oxide and nitride films, respectively. The introduction of an additional element to the process, i.e. the reactive gas, has a significant influence in the desired depositions, making it more difficult to find ideal working points. Like so, the wide majority of reactive-based sputtering processes are characterized by an hysteresis-like behavior, thus needing proper control of the involved parameters, e.g. the partial pressure of working (or inert) and reactive gases, to undermine it. Berg et al. proposed a significant model, i.e. Berg Model, to estimate the impact upon addition of the reactive gas in sputtering processes. Generally, the influence of the reactive gas' relative pressure and flow were estimated in accordance to the target's erosion and film's deposition rate on the desired substrate. The composition of the film can be controlled by varying the relative pressures of the inert and reactive gases. Film stoichiometry is an important parameter for optimizing functional properties like the stress in SiNx and the index of refraction of SiOx. === Ion-assisted deposition
|
{"page_id": 9084531, "title": "Sputter deposition"}
|
,h(x_{k})} are independent random variables. Often it is inconvenient to achieve the perfect joint probability of m − k {\displaystyle m^{-k}} due to rounding issues. Following, one may define a ( μ , k ) {\displaystyle (\mu ,k)} -independent family to satisfy: ∀ {\displaystyle \forall } distinct ( x 1 , … , x k ) ∈ U k {\displaystyle (x_{1},\dots ,x_{k})\in U^{k}} and ∀ ( y 1 , … , y k ) ∈ [ m ] k {\displaystyle \forall (y_{1},\dots ,y_{k})\in [m]^{k}} , Pr h ∈ H [ h ( x 1 ) = y 1 ∧ ⋯ ∧ h ( x k ) = y k ] ≤ μ / m k {\displaystyle ~~\Pr _{h\in H}\left[h(x_{1})=y_{1}\land \cdots \land h(x_{k})=y_{k}\right]\leq \mu /m^{k}} Observe that, even if μ {\displaystyle \mu } is close to 1, h ( x i ) {\displaystyle h(x_{i})} are no longer independent random variables, which is often a problem in the analysis of randomized algorithms. Therefore, a more common alternative to dealing with rounding issues is to prove that the hash family is close in statistical distance to a k {\displaystyle k} -independent family, which allows black-box use of the independence properties. == Techniques == === Polynomials with random coefficients === The original technique for constructing k-independent hash functions, given by Carter and Wegman, was to select a large prime number p, choose k random numbers modulo p, and use these numbers as the coefficients of a polynomial of degree k − 1 whose values modulo p are used as the value of the hash function. All polynomials of the given degree modulo p are equally likely, and any polynomial is uniquely determined by any k-tuple of argument-value pairs with distinct arguments, from which it follows that any k-tuple of distinct arguments is equally likely
|
{"page_id": 31142742, "title": "K-independent hashing"}
|
( x ) = a f ( x ) {\displaystyle j(x)=af(x)} , we have j ′ ( x ) = a f ′ ( x ) {\displaystyle j^{\prime }(x)=af^{\prime }(x)} . == See also == Differentiation of integrals – Problem in mathematics Differentiation of trigonometric functions – Mathematical process of finding the derivative of a trigonometric function Differentiation rules – Rules for computing derivatives of functions Distribution (mathematics) – Mathematical term generalizing the concept of function General Leibniz rule – Generalization of the product rule in calculus Integration by parts – Mathematical method in calculus Inverse functions and differentiation – Formula for the derivative of an inverse functionPages displaying short descriptions of redirect targets Product rule – Formula for the derivative of a product Quotient rule – Formula for the derivative of a ratio of functions Table of derivatives – Rules for computing derivatives of functionsPages displaying short descriptions of redirect targets Vector calculus identities – Mathematical identities == References ==
|
{"page_id": 147909, "title": "Linearity of differentiation"}
|
Track []( tp+fp(2)R=tp tp+fn where _tp_ is the number of true positives (retrieved relevant documents), _fp_ is the false positives (retrieved non-relevant documents), and _fn_ is the false negatives (not retrieved relevant documents). Precision Eq. [(1)DCG=∑i=1 p 2 rel i-1 log 2(i+1)(4)NDCG=DCG IDCG where rel i is the relevance grade at rank position _i_. Relevance grade is either 0, 1, or 2 in this work. _p_ is the position at which this metric is calculated (typically _p_ is set to 1000th, which is the value used in this work). NDCG is a measure of the quality of the search results that models both relevance grade and rank position of relevant documents. It is based on the observation that the farther down the results list a relevant document is, the less useful that document is to a user perusing the list from the top. DCG is the unnormalized discounted cumulative gain and IDCG is the ideal DCG assuming the results are ordered by decreasing relevance grade—the perfect ranking order. infNDCG is a method to estimate NDCG with incomplete judgments []( Given a set
|
{"source": 1418, "title": "from dpo"}
|
bottle escapes, causing the equilibrium between gas-phase CO 2 and dissolved or aqueous CO 2 to shift, lowering the concentration of CO 2 in the soft drink. Less CO 2 dissolved in the liquid leads to carbonic acid decomposing to dissolved CO 2 and H 2O. The lowered carbonic acid concentration causes a shift of the final equilibrium. As long as the soft drink is in an open container, the CO 2 bubbles up out of the beverage, releasing the gas into the air ( Figure 13.4 ). With the lid off the bottle, the CO 2 reactions are no longer at equilibrium and will continue until no more of the reactants remain. This results in a soft drink with a much lowered CO 2 concentration, often referred to as “flat.” Figure 13.4 When a soft drink is opened, several equilibrium shifts occur. (credit: modification of work by “D Coetzee”/Flickr) Let us consider the evaporation of bromine as a second example of a system at equilibrium. Br 2(l) ⇌ Br 2(g) An equilibrium can be established for a physical change—like this liquid to gas transition—as well as for a chemical reaction. Figure 13.5 shows a sample of liquid bromine at equilibrium with bromine vapor in a closed container. When we pour liquid bromine into an empty bottle in which there is no bromine vapor, some liquid evaporates, the amount of liquid decreases, and the amount of vapor increases. If we cap the bottle so no vapor escapes, the amount of liquid and vapor will eventually stop changing and an equilibrium between the liquid and the vapor will be established. If the bottle were not capped, the bromine vapor would escape and no equilibrium would be reached. > Chapter 13 | Fundamental Equilibrium Concepts 733 Figure 13.5 An equilibrium is pictured
|
{"source": 3700, "title": "from dpo"}
|
shall be defined as either a Hybrid Software Module embodiment, or a Hybrid-Firmware module embodiment. PAA ● Module versioning information shall include the part number or version of the processor chip. ● Operational Environment: running on with with PAA PAI ● Module versioning information shall include the part number or version of the processor chip. ● Operational Environment: running on with with PAI Software/Firmware Module: If the software or firmware component of the module can support a cryptographic algorithm natively (within the software/firmware) or by utilizing an available PAA or PAI, the module shall be defined as either a Software module embodiment or a Firmware module embodiment, unless other requirements designate the module as hybrid. Implementation Guidance for FIPS PUB 140-3 and the Cryptographic Module Validation Program National Institute of Standards and Technology CMVP 17 04/18/2025 PAA ● Algorithm certificates; the accelerated algorithms shall be tested in both software/firmware only execution and PAA execution. ● Operational Environment: o running on with with PAA; o running on with without PAA PAI ● Algorithm certificates; the algorithms shall be tested in both software/firmware only execution and PAI execution. ● Operational Environment: o running on with with PAI; o running on with without PAI Testing requirements A module is considered a hybrid if all the Operational Environments (OEs) only support with PAA/PAI and were tested as such. A module can support PAA/PAI and be considered a software/firmware module instead of a hybrid if one of the following two options are chosen: 1. Perform module testing with and without PAA/PAI for all OEs on the certificate. a. OEs would either be listed with and without on the certificate (which is typical), or with or without (rare) if the algorithm and operational testing is performed on both options and shown in the Test Report. Sometimes
|
{"source": 5751, "title": "from dpo"}
|
newline); `\S` matches anything that isn’t whitespace. * `\w` matches any “word” character, i.e.letters and numbers; `\W` matches any “non-word” character. The following code demonstrates the six shortcuts with a selection of letters, numbers, and punctuation characters. ``` x │ abcd ABCD -!@#%. str_view(x, "\\D+") #> │ 12345 str_view(x, "\\s+") #> │ abcdABCD12345-!@#%. str_view(x, "\\S+") #> │ str_view(x, "\\w+") #> │ -!@#%. str_view(x, "\\W+") #> │ abcdABCD12345 ``` ### Quantifiers **Quantifiers** control how many times a pattern matches. In Section 15.2, `+` (1 or more matches), and `*` (0 or more matches). For example, `colou?r` will match American or British spelling, `\d+` will match one or more digits, and `\s?` will optionally match a single item of whitespace. You can also specify the number of matches precisely with `{}`: * `{n}` matches exactly n times. * `{n,}` matches at least n times. * `{n,m}` matches between n and m times. ### Operator precedence and parentheses What does `ab+` match? Does it match “a” followed by one or more “b”s, or does it match “ab” repeated any number of times? What does `^a|b$` match? Does it match the complete string a or the complete string b, or does it match a string starting with a or a string ending with b? The answer to these questions is determined by operator precedence, similar to the PEMDAS or BEDMAS rules you might have learned in school. You know that `a + b * c` is equivalent to `a + (b * c)` not `(a + b) * c` because `*` has higher precedence and `+` has lower precedence: you compute
|
{"source": 6825, "title": "from dpo"}
|
by the forces affecting lower values of k as well. For example, if the 1-mer A does not occur in a sequence, none of the 2-mers containing A (AA, AT, AG, and AC) will occur either, thereby linking the effects of the different forces. === k = 1 === When k = 1, there are four DNA k-mers, i.e., A, T, G, and C. At the molecular level, there are three hydrogen bonds between G and C, whereas there are only two between A and T. GC bonds, as a result of the extra hydrogen bond (and stronger stacking interactions), are more thermally stable than AT bonds. Mammals and birds have a higher ratio of Gs and Cs to As and Ts (GC-content), which led to the hypothesis that thermal stability was a driving factor of GC-content variation. However, while promising, this hypothesis did not hold up under scrutiny: analysis among a variety of prokaryotes showed no evidence of GC-content correlating with temperature as the thermal adaptation hypothesis would predict. Indeed, if natural selection were to be the driving force behind GC-content variation, that would require that single nucleotide changes, which are often silent, to alter the fitness of an organism. Rather, current evidence suggests that GC‐biased gene conversion (gBGC) is a driving factor behind variation in GC content. gBGC is a process that occurs during recombination which replaces As and Ts with Gs and Cs. This process, though distinct from natural selection, can nevertheless exert selective pressure on DNA biased towards GC replacements being fixed in the genome. gBGC can therefore be seen as an "impostor" of natural selection. As would be expected, GC content is greater at sites experiencing greater recombination. Furthermore, organisms with higher rates of recombination exhibit higher GC content, in keeping with the gBGC hypothesis's
|
{"page_id": 10573305, "title": "K-mer"}
|
cases of metal allergy are caused by consumer products containing metal; exposure at work can also cause metal allergies. The largest human exposure to metals is ingestion; while food or drink containing metals can cause an allergic reaction in people who already have an allergy, it's not clear if it can cause a new allergy, as of 2021. Some metal allergens are nutritionally necessary to humans. Airborne metals have been linked to higher rates of sensitization. It can be difficult to figure out what allergen a person with contact dermatitis is reacting to, especially if the allergic reaction is systemic, rather than just occurring where the allergen entered the body. Consumer products that have induced allergies include jewellery (both cheap and expensive, brand-name jewellery may release metal allergens), buttons, clothing fasteners (such as zippers, buckles, and hooks), dental restorations, mobile phones, and leather (from the tanning process). Metal hair fasteners may also leach allergens. The increase in consumer products, including consumer electronics, that use metal nanomaterials, mainly silicon, titanium, zinc and aluminum, increases exposure. Tattoo inks contaminated with metal allergens have been known to cause severe reactions, sometimes years later, when the original ink is not available for testing. Implants and prosthetics, including dental repairs, are also an exposure; dental work is the main way in which the general population is sensitized to palladium, and dental workers may get occupational palladium allergies, though cross-sensitization may also be a common way in which people develop an allergy to this fairly rare metal. Medications containing metals could also potentially cause sensitization. === Skin === Exposure on damaged skin, such as chapped hands or a piercing, increases the risk of sensitization from a low-level exposure to the allergen. == Diagnosis == Diagnosis is by patch testing, a method first used in 1895. Patches
|
{"page_id": 69209653, "title": "Metal allergy"}
|
of Oakland or in conjunction with a prepaid transit pass (in Chicago). These cards have been heavily criticized for their higher-than-average fees, such as excessive flat fees added onto every purchase made with the card. The U.S. federal government uses prepaid debit cards to make benefit payments to people who do not have bank accounts. In July 2013, the Association of Government Accountants released a report on government use of prepaid cards, concluding that such programs offer a number of advantages to governments and those who receive payments on a prepaid card rather than by check. The prepaid card programs benefit payments largely for the cost savings they offer and provide easier access to cash for recipients, as well as increased security. The report also advises that governments should consider replacing any remaining cheque-based payments with prepaid card programs in order to realize substantial savings for taxpayers as well as benefits for payees. ==== Impact of government-mandated fee-free bank accounts ==== In January 2016, the UK government introduced a requirement for banks to offer fee-free basic bank accounts for all, which had a significant impact on the prepaid industry, including the departure of a number of firms. == Consumer protection == Consumer protections vary depending on the network used. Visa and MasterCard, for instance, prohibit minimum and maximum purchase sizes, surcharges, and arbitrary security procedures on the part of merchants. Merchants are usually charged higher transaction fees for credit transactions since debit network transactions are less likely to be fraudulent. This may lead them to "steer" customers toward debit transactions. Consumers disputing charges may find it easier to do so with a credit card since the money will not immediately leave their control. Fraudulent charges on a debit card can also cause problems with a checking account because the money
|
{"page_id": 9008, "title": "Debit card"}
|
Nitracaine is a synthetic compound classified as a local anesthetic with stimulant properties. It falls into the class of drugs known as local anesthetics, and it is chemically related to cocaine. Nitracaine shares some similarities in effects with cocaine but has its own distinct pharmacological profile. The chemical structure of nitracaine consists of a benzoic acid ester with a para-substituted phenyl ring. It is formally known as 3-(diethylamino)-2,2-dimethylpropyl 4-nitrobenzoate. The presence of the nitro group (NO2) in its molecular structure contributes to its anesthetic properties. It is closely related to dimethocaine. == Legal status == Sweden's public health agency suggested classifying Nitracaine as a hazardous substance, on September 25, 2019. == See also == 3-(p-Fluorobenzoyloxy)tropane == References ==
|
{"page_id": 42242232, "title": "Nitracaine"}
|
are stable. Cavities at points exactly on the line are marginally stable; small variations in cavity length can cause the resonator to become unstable, and so lasers using these cavities are in practice often operated just inside the stability line. A simple geometric statement describes the regions of stability: A cavity is stable if the line segments between the mirrors and their centers of curvature overlap, but one does not lie entirely within the other. In the confocal cavity, if a ray is deviated from its original direction in the middle of the cavity, its displacement after reflecting from one of the mirrors is larger than in any other cavity design. This prevents amplified spontaneous emission and is important for designing high power amplifiers with good beam quality. == Practical resonators == If the optical cavity is not empty (e.g., a laser cavity which contains the gain medium), the value of L needs to be adjusted to account for the index of refraction of the medium. Optical elements such as lenses placed in the cavity alter the stability and mode size. In addition, for most gain media, thermal and other inhomogeneities create a variable lensing effect in the medium, which must be considered in the design of the laser resonator. Practical laser resonators may contain more than two mirrors; three- and four-mirror arrangements are common, producing a "folded cavity". Commonly, a pair of curved mirrors form one or more confocal sections, with the rest of the cavity being quasi-collimated and using plane mirrors. The shape of the laser beam depends on the type of resonator: The beam produced by stable, paraxial resonators can be well modeled by a Gaussian beam. In special cases the beam can be described as a single transverse mode and the spatial properties can be well
|
{"page_id": 591513, "title": "Optical cavity"}
|
1980s, both WPGH-TV, which was again sold, and WPTT-TV were losing money. WPTT-TV began running Home Shopping Network programming nightly between 1 and 6 a.m. In 1990, WPTT-TV and Pittsburgh's News Corporation (not affiliated with the News Corporation that owned Fox until 2013) entered into an agreement to produce a 10 p.m. newscast to air on WPTT-TV which was to begin in the summer of 1991, and would feature news anchors from WTAE-TV. After going through three owners, WPGH-TV was put up for sale again; Sinclair placed a bid for the station in 1991 and won; however, the group struggled to obtain financing. As part of a deal, the group sold WPTT-TV to its operations manager Eddie Edwards (who had been with WPTT-TV since its launch in 1978, and had become best known as host of the station's locally produced public affairs program Eddie's Digest, targeted towards local African-Americans). Soon after, the planned newscast with WPTT-TV was put on hold with an option to either produce it for WPGH-TV, reinstate the plans with WPTT-TV, or cancel it; it was eventually canceled. WPTT-TV also made a deal to increase Home Shopping Network programming hours to at least 15 hours a day with the option of running the programming the entire day. Rumors abounded that WPTT-TV would be running HSN programming for most of, if not the entire day, once the sale was completed. It was already established that some of WPTT-TV's first-run syndicated shows would go to WPGH-TV. The sales closed on August 29, 1991, with Sinclair acquiring WPGH-TV from Renaissance Broadcasting in the fall of that year. Rights to cash programming from WPTT-TV's schedule were moved to WPGH-TV, while barter shows were returned to syndication distributors (it was thought that WPTT-TV might wind up with some low-budget children's shows to
|
{"page_id": 628402, "title": "WPNT"}
|
predetermined depths in the wellbore. This data can be used to determine reservoir life) Spinner Surveys (to determine which formation perforations have the best inflow / which perforations make the most water / liquids) Kinley perforator, sandline cutter, and caliper Running production logging tools Fishing operations (fishing usually refers to attempting to retrieve lost tools or wire, or other debris that was not intended to restrict the flow / disrupt the well operations. Fishing can be difficult, due to the fish being downhole, and other affecting conditions such as high pressure, the fish being jammed in the tubing / casing) Paraffin cutting (making a hole through and removing a wax buildup, which is a byproduct of oil cooling too much to reach surface) Chipping ice / salt (restrictions and plugs which can be formed as by products of a flowing well) Lubricating long assemblies in and out of the hole (lubricating is done via a larger than tool overall diameter pipe, joined at surface on top of the wellhead, which houses the valve that shuts the pressure in downhole. The lubricator should be long enough to be able to swallow the toolstring and downhole tools that are to be run or pulled) == Braided line == Braided line is generally used when the strength of slickline is insufficient for the task. Most commonly, this is for heavy fishing such as retrieving broken drill pipe. == Slickline tools == === Jar === This type of tool can be extended and closed rapidly to induce a mechanical shock to the tool string. This shock can induce certain components such as plugs to lock into place and then unlock for retrieving. Jars are commonly used to shear small brass or steel pins that are put in place to function certain down-hole tools at
|
{"page_id": 10369551, "title": "Slickline"}
|
10K resolution refers to a horizontal display resolutions of approximately 10,000 pixels. Unlike 4K UHD and 8K UHD, there are no 10K resolutions defined in the UHDTV broadcast standard. The first 10K displays demonstrated were ultrawide "21:9" screens with a resolution of 10240 × 4320, the same vertical resolution as 8K UHD. == History == On June 5, 2015, Chinese manufacturer BOE showed a 10K display with an aspect ratio of 64:27 (≈21:9) and a resolution of 10240 × 4320. In November 2016, the Consumer Technology Association published CTA-861-G, an update to their standard for digital video transmission formats. This revision added support for 10240 × 4320, a 10K resolution with an aspect ratio of 64:27 (≈21:9), at up to 120 Hz. On January 4, 2017, HDMI version 2.1 was officially announced, and was later released on November 28, 2017. HDMI 2.1 includes support for all the formats listed in the CTA-861-G standard, including 10K (10240 × 4320) at up to 120 Hz. HDMI 2.1 specifies a new Ultra High Speed HDMI cable which supports a bandwidth of up to 48 Gbit/s. Display Stream Compression (DSC) 1.2a is used for video formats higher than 8K resolution with 4:2:0 chroma subsampling. 10K resolutions are also sometimes seen in the case of gaming, for instance high resolution screenshots in the case of Minecraft with the OptiFine mod. == Cameras == As of 2021, there are multiple companies producing photo cameras capable of 10K and higher resolutions, such as Phase One, Fujifilm, Hasselblad, and Sony. Other companies also create sensors capable of 10K resolution, though they are mostly not available to the general public, and are often used for scientific or industrial purposes. Blackmagic Design is the only company producing a video camera capable of filming in resolutions 10K or higher with their
|
{"page_id": 52875487, "title": "10K resolution"}
|
The Danube fan is a relict sedimentary feature in the northwestern part of the bottom of the Black Sea. It crosses three of its four major physiographic provinces: basin slope, basin apron, and the Euxine abyssal plain) and splits the abyssal plain into two inequal parts. The fan was deposited by the Danube (mostly), Dniester, Southern Bug, and Dnieper rivers. It extends from the shelf break zone an approximately 200m isobath for about 150 km downslope and reaches the depth of about 2,200 m within the abyssal plain. The fan is a relict from Pleistocene times when the sea level was lower, and at present, little fluvial sediment is being added to the fan; most of material is deposited in the river estuaries. The Danube sediment supply is via the Danube Canyon (also called Viteaz Canyon). == References ==
|
{"page_id": 20932258, "title": "Danube fan"}
|
2; 1 ft freeboard at inl et Dewatering Practices, Outlet Protection Possible r eview by Wetlands and Waterways Program Temporary Barrier Diversion Convey runoff around construction Design storm = Q 2; 1 ft freeboard at inlet Dewatering Practices; Outlet Protection Mountable Berm Convey runoff Side slopes ≤ 5:1; minimum height 18 in. Earth Dike Diversion Fence Convey runoff Drainage area ≤ 2 ac Sediment Trap, Earth Dike, TSOS, TGOS, Outlet Protection Smaller footprint than other diversions; may not be applicable in areas with bedrock Pipe Slope Drain Convey runoff down slopes Drainage area ≤ 5 ac Earth Dike, Rock Outlet Protection, Sediment Traps, TSOS, TGOS Typically used for cut/fill slopes Stone Check Dam Minimize erosion, reduce velocities Velocity > 4 fps Soil Stabilization Matting, Sediment Trap, TSOS, TGOS Velocity check, not a sediment control Riprap Inflow Protection Convey runoff non -erosively Inflow slopes between 4:1 and 10:1 Sediment Traps/Basins, Temporary Swales, Earth Dike Gabion Inflow Pro tection Convey runoff non - erosively Inflow slopes steeper than 4:1 Sediment Traps/Basins, Temporary Swales, Earth Dike Rock Outlet Protection and Plunge Pools Prevent erosion at outlets Site specific Earth Dikes, Temporary Swales, Sediment Basins, Sedim ent Traps, PSD, Clear Water Diversion Pipe Points of concentrated discharge with erosive velocities Silt Fence Filter and retain sediment Sheet flo w from 5:1 slopes or flatter Filter Berms/Logs, Super Silt Fence, Stabilized Construction Entrance Silt Fence on Pavement Filter and retain sediment Sheet flow from 3:1 slopes or flatter Silt Fence, Super Silt Fence Used on pavement Super Silt Fence Filter and retain sediment Sheet flow from 2:1 slopes or flatter Filter Berms/Logs, Silt Fence, Stabilized C onstruction Entrance Clear Water Pipe through Silt Fence/Super Silt Fence Convey clear -water runoff through SF/SSF Site specific Silt Fence, Super Silt Fence, Pipe Slope Drain Filter Berm Filter
|
{"source": 42, "title": "from dpo"}
|
needed, ignoring vector instruction issue overhead? 4.4 Now assume that we can use scatter-gather loads and stores ( LVI and SVI ). Assume that tiPL , tiPR , clL , clR , and clP are arranged consecutively in memory. For example, if seq_length==500 , the tiPR array would begin 500 * 4 bytes after the tiPL array. How does this affect the way you can write the VMIPS code for this kernel? Assume that you can initialize vector registers with integers using the following technique which would, for example, initialize vec-tor register V1 with values (0,0,2000,2000): LI R2,0 SW R2,vec SW R2,vec+4 LI R2,2000 SW R2,vec+8 SW R2,vec+12 LV V1,vec > Constants Values > AA,AC,AG,AT 0,1,2,3 CA,CC,CG,CT 4,5,6,7 GA,GC,GG,GT 8,9,10,11 TA,TC,TG,TT 12,13,14,15 A,C,G,T 0,1,2,3 > Figure 4.32 Constants and values for the case study. 336 ■ Chapter Four Data-Level Parallelism in Vector, SIMD, and GPU Architectures Assume the maximum vector length is 64. Is there any way performance can be improved using gather-scatter loads? If so, by how much? 4.5 Now assume we want to implement the MrBayes kernel on a GPU using a single thread block. Rewrite the C code of the kernel using CUDA. Assume that pointers to the conditional likelihood and transition probability tables are specified as parameters to the kernel. Invoke one thread for each itera-tion of the loop. Load any reused values into shared memory before performing operations on it. 4.6 With CUDA we can use coarse-grain parallelism at the block level to compute the conditional likelihoods of multiple nodes in parallel. Assume that we want to compute the conditional likelihoods from the bottom of the tree up. Assume that the conditional likelihood and transition probability arrays are orga-nized in memory as described in question 4 and the
|
{"source": 2299, "title": "from dpo"}
|
each 0 < ϕ ≤ 1 / 12 0 < 𝜙 ≤ 1 / 12 the following is true for the output C 𝐶 of P a r a l l e l N i b b l e 𝑃 𝑎 𝑟 𝑎 𝑙 𝑙 𝑒 𝑙 𝑁 𝑖 𝑏 𝑏 𝑙 𝑒 ( G , ϕ ) ( 𝐺 , 𝜙 ) . If C ≠ ∅ 𝐶 ≠ ∅ , then Φ ( C ) ≤ 276 w ϕ Φ ( 𝐶 ) ≤ 276 𝑤 𝜙 . For each subset S ⊂ V 𝑆 ⊂ 𝑉 satisfying Vol ( S ) ≤ 2 3 ⋅ Vol ( V ) \ \ and \ \ \ Φ ( S ) ≤ 2 f ( ϕ ) , Vol ( 𝑆 ) ≤ 2 3 ⋅ Vol ( 𝑉 ) \ \ and \ \ \ Φ ( 𝑆 ) ≤ 2 𝑓 ( 𝜙 ) , define the random variable y 𝑦 as follows: y = { Vol ( S ) , if Vol ( C ) ≥ ( 1 / 24 ) Vol ( V ) Vol ( C ∩ S ) , otherwise. 𝑦 = { Vol ( 𝑆 ) , if Vol ( 𝐶 ) ≥ ( 1 / 24 ) Vol ( 𝑉 ) Vol ( 𝐶 ∩ 𝑆 ) , otherwise. Then, E [ y ] ≥ k Vol ( S ) 10 w Vol ( V ) ≥ Vol ( S ) g ( ϕ , Vol ( V ) ) 𝐸 [ 𝑦 ] ≥ 𝑘 Vol ( 𝑆 ) 10 𝑤 Vol ( 𝑉 ) ≥ Vol ( 𝑆 ) 𝑔 ( 𝜙 , Vol ( 𝑉 ) ) .
|
{"source": 4213, "title": "from dpo"}
|
hK 0n 〈2〉M M hK hK HK (M) > 34 / 62 ## MD preserves CR Assume • h is CR • H is built from h using MD Then • H is CR too! This means • No need to attack H! You won’t find a weakness in it unless h has one • H is guaranteed to be secure assuming h is. For this reason, MD is the design used in many current hash functions. Newer hash functions use other iteration methods with analogous properties. > 35 / 62 ## MD preserves CR Theorem: Let h : {0, 1}k × { 0, 1}b+n → { 0, 1}n be a family of functions and let H : {0, 1}k × D → { 0, 1}n be obtained from h via the MD transform. Then for any cr-adversary AH there exists a cr-adversary Ah such that Adv cr > H (AH ) ≤ Adv cr > h (Ah)and the running time of Ah is that of AH plus the time for computing h on the outputs of AH . Implication: h CR ⇒ Adv cr > H (Ah) small ⇒ Adv cr > H (AH ) small ⇒ H CR > 36 / 62 ## How Ah works Let ( M1, M2) be the HK -collision returned by AH . The Ah will trace the chains backwards to find an hk -collision. > 37 / 62 ## Case 1: ‖M1‖b 6 = ‖M2‖b Let x1 = 〈2〉|| V1 and x2 = 〈1〉|| V2. Then • hK (x1) = hK (x2) because HK (M1) = HK (M2). • But x1 6 = x2 because 〈1〉 6 = 〈2〉. > 38 / 62 ## Case 2: ‖M1‖b = ‖M2‖b x1 ← 〈 2〉|| V1 ; x2 ← 〈 2〉|| V2 If x1
|
{"source": 6091, "title": "from dpo"}
|
reflect the individual brain development and provide an opportunity to direct some edges of the human consensus brain graph. == References ==
|
{"page_id": 46798538, "title": "Budapest Reference Connectome"}
|
Alphapithovirus, is a genus of giant virus known from two species, Alphapithovirus sibericum, which infects amoebas, and Alphapithovirus massiliense. It is DNA-based and is a member of the nucleocytoplasmic large DNA viruses clade. It was discovered in 2014, when a viable specimen was found in a 30,000-year-old ice core harvested from permafrost in Siberia, Russia. == Description == The genus name Alphapithovirus, a reference to large storage containers of ancient Greece known as pithoi, was chosen to describe the new species. A specimen of Alphapithovirus measures approximately 1.5 μm (1500 nm) in length and 0.5 μm (500 nm) in diameter, making it one of the largest viruses yet found, second to Megaklothovirus. It is 50% larger in size than the Pandoraviridae, the previous largest-known viruses, and is larger than Ostreococcus, the smallest eukaryotic cell, although Pandoravirus has the largest viral genome, containing 1.9 to 2.5 megabases of DNA. Alphapithovirus has a thick, oval wall with an opening at one end. Internally, its structure resembles a honeycomb. The genome of Alphapithovirus contains 467 distinct genes, more than a typical virus, but far fewer than the 2556 putative protein-coding sequences found in Pandoravirus. Thus, its genome is far less densely packed than any other known virus. Two-thirds of its proteins are unlike those of other viruses. Despite the physical similarity with Pandoravirus, the Alphapithovirus genome sequence reveals that it is barely related to that virus, but more closely resembles members of Marseilleviridae, Megaviridae, and Iridoviridae. These families all contain large icosahedral viruses with DNA genomes. The Alphapithovirus genome has 36% GC-content, similar to the Megaviridae, in contrast to greater than 61% for pandoraviruses. The family Orpheoviridae and genus Alphaorpheovirus, the family Pithoviridae and genus Alphapithovirus, and the family Cedratviridae and genus, Alphacedratvirus, has now been ratified by the ICTV. === Replication ===
|
{"page_id": 42104047, "title": "Alphapithovirus"}
|
acids is nearly universal among all known living organisms. === Transcription === Transcription produces a single-stranded RNA molecule known as messenger RNA, whose nucleotide sequence is complementary to the DNA from which it was transcribed.: 6.1 The mRNA acts as an intermediate between the DNA gene and its final protein product. The gene's DNA is used as a template to generate a complementary mRNA. The mRNA matches the sequence of the gene's DNA coding strand because it is synthesised as the complement of the template strand. Transcription is performed by an enzyme called an RNA polymerase, which reads the template strand in the 3' to 5' direction and synthesizes the RNA from 5' to 3'. To initiate transcription, the polymerase first recognizes and binds a promoter region of the gene. Thus, a major mechanism of gene regulation is the blocking or sequestering the promoter region, either by tight binding by repressor molecules that physically block the polymerase or by organizing the DNA so that the promoter region is not accessible.: 7 In prokaryotes, transcription occurs in the cytoplasm; for very long transcripts, translation may begin at the 5' end of the RNA while the 3' end is still being transcribed. In eukaryotes, transcription occurs in the nucleus, where the cell's DNA is stored. The RNA molecule produced by the polymerase is known as the primary transcript and undergoes post-transcriptional modifications before being exported to the cytoplasm for translation. One of the modifications performed is the splicing of introns which are sequences in the transcribed region that do not encode a protein. Alternative splicing mechanisms can result in mature transcripts from the same gene having different sequences and thus coding for different proteins. This is a major form of regulation in eukaryotic cells and also occurs in some prokaryotes.: 7.5 ===
|
{"page_id": 4250553, "title": "Gene"}
|
spatially coherent, so it cannot approach the very high intensity characteristic of lasers. == Single-color LEDs == By selection of different semiconductor materials, single-color LEDs can be made that emit light in a narrow band of wavelengths from near-infrared through the visible spectrum and into the ultraviolet range. The required operating voltages of LEDs increase as the emitted wavelengths become shorter (higher energy, red to blue), because of their increasing semiconductor band gap. Blue LEDs have an active region consisting of one or more InGaN quantum wells sandwiched between thicker layers of GaN, called cladding layers. By varying the relative In/Ga fraction in the InGaN quantum wells, the light emission can in theory be varied from violet to amber. Aluminium gallium nitride (AlGaN) of varying Al/Ga fraction can be used to manufacture the cladding and quantum well layers for ultraviolet LEDs, but these devices have not yet reached the level of efficiency and technological maturity of InGaN/GaN blue/green devices. If unalloyed GaN is used in this case to form the active quantum well layers, the device emits near-ultraviolet light with a peak wavelength centred around 365 nm. Green LEDs manufactured from the InGaN/GaN system are far more efficient and brighter than green LEDs produced with non-nitride material systems, but practical devices still exhibit efficiency too low for high-brightness applications. With AlGaN and AlGaInN, even shorter wavelengths are achievable. Near-UV emitters at wavelengths around 360–395 nm are already cheap and often encountered, for example, as black light lamp replacements for inspection of anti-counterfeiting UV watermarks in documents and bank notes, and for UV curing. Substantially more expensive, shorter-wavelength diodes are commercially available for wavelengths down to 240 nm. As the photosensitivity of microorganisms approximately matches the absorption spectrum of DNA, with a peak at about 260 nm, UV LED emitting at
|
{"page_id": 18290, "title": "Light-emitting diode"}
|
a form of entropy encoding that assigns variable-length codes to input symbols based on their frequencies of occurrence. The basic principle is to assign shorter codes to more frequently occurring symbols and longer codes to less frequent symbols, thereby reducing the average code length compared to fixed-length codes. === Application in Image Compression === In image compression, Huffman coding is typically applied after other transformations like Discrete Cosine Transform (DCT) in the case of JPEG compression. After transforming the image data into a frequency domain representation, Huffman coding is used to encode the transformed coefficients efficiently. === Steps in Huffman Coding for Image Compression === Frequency Analysis: Calculate the frequency of occurrence of each symbol or symbol combination in the transformed image data. Constructing the Huffman Tree: Build a Huffman tree based on the symbol frequencies. The tree is constructed recursively by combining the nodes with the lowest frequencies until a single root node is formed. Assigning Codewords: Traverse the Huffman tree to assign variable-length codewords to each symbol, with shorter codewords assigned to more frequent symbols. Encoding: Replace the original symbols in the image data with their corresponding Huffman codewords to generate the compressed data stream. === Benefits of Huffman Coding in Image Compression === Lossless Compression: Huffman coding can be used in both lossy and lossless image compression techniques, providing flexibility in balancing between compression ratio and image quality. Efficiency: By assigning shorter codes to frequently occurring symbols, Huffman coding reduces the average code length, resulting in efficient data representation and reduced storage requirements. Compatibility: Huffman coding is widely supported and can be seamlessly integrated into existing image compression standards and algorithms. === Conclusion === Huffman coding plays a crucial role in image compression by efficiently encoding image data into a compact representation. Its ability to adaptively assign
|
{"page_id": 46469, "title": "Image compression"}
|
frame. ==== The XYZ unit basis vectors ==== Next, the following tensor rotates the vector about the new Y axis in a counter-clockwise direction with respect to the Y axis (The angle was chosen so that the C' axis would be pointed towards the corner of the box.): K 2 = [ cos ( θ ) 0 − sin ( θ ) 0 1 0 sin ( θ ) 0 cos ( θ ) ] {\displaystyle K_{2}={\begin{bmatrix}\cos {\left(\theta \right)}&0&-\sin {\left(\theta \right)}\\0&1&0\\\sin {\left(\theta \right)}&0&\cos {\left(\theta \right)}\end{bmatrix}}} θ = cos − 1 ( 2 3 ) → 35.26 ∘ {\displaystyle \theta =\cos ^{-1}\left({\sqrt {\frac {2}{3}}}\right)\to 35.26^{\circ }} , or K 2 = [ 2 3 0 − 1 3 0 1 0 1 3 0 2 3 ] {\displaystyle K_{2}={\begin{bmatrix}{\sqrt {\frac {2}{3}}}&0&-{\frac {1}{\sqrt {3}}}\\0&1&0\\{\frac {1}{\sqrt {3}}}&0&{\sqrt {\frac {2}{3}}}\end{bmatrix}}} . Notice that the distance from the center of the sphere to the midpoint of the edge of the box is √2 but from the center of the sphere to the corner of the box is √3. That is where the 35.26° angle came from. The angle can be calculated using the dot product. Let m → = ( 0 , 2 2 , 2 2 ) {\displaystyle {\vec {m}}=\left(0,{\frac {\sqrt {2}}{2}},{\frac {\sqrt {2}}{2}}\right)} be the unit vector in the direction of C' and let n → = ( 3 3 , 3 3 , 3 3 ) {\displaystyle {\vec {n}}=\left({\frac {\sqrt {3}}{3}},{\frac {\sqrt {3}}{3}},{\frac {\sqrt {3}}{3}}\right)} be a unit vector in the direction of the corner of the box at n → = ( 1 , 1 , 1 ) {\displaystyle {\vec {n}}=\left(1,1,1\right)} . Because m → ⋅ n → = | m → | | n → | cos θ , {\displaystyle {\vec {m}}\cdot {\vec {n}}=|{\vec
|
{"page_id": 20526418, "title": "Direct-quadrature-zero transformation"}
|
A liquid-mirror space telescope is a concept for a reflecting space telescope that uses a reflecting liquid such as mercury as its primary reflector. == Design == There are several designs for such a telescope: Twirled pail: A pair of objects, one the mirror assembly and the other a counterweight possibly containing a camera assembly, are spun up to induce centripetal acceleration on the surface of the mirror assembly. Half toroid: A hollow torus is spun up to maintain centripetal acceleration against the inside wall. The camera assembly sits in the center. The torus width is arbitrarily large. Optional other pieces include a large flat mirror in the center to allow randomly orienting the mirror without frequently changing the axis of spin. Balloon: A balloon with a reflective liquid on the inside is spun up and deforms itself into a parabolic shape. A flat mirror on the inside reflects light to the concave surface. Continuous-acceleration rocket. A spacecraft is accelerated by an ion thruster or something similar, which produces a constant linear acceleration for a long period of time. The spacecraft carries a rotating liquid mirror, the axis of which is parallel with the direction of acceleration. The spacecraft can be accelerated in any direction, so the mirror can be aimed in any direction. Regardless of the specific configuration, such a telescope would be similar to an Earth-based liquid-mirror telescope. However, instead of relying on Earth's gravity to maintain the necessary parabolic shape of the rotating mercury mirror, it relies on artificial gravity instead. Other possibilities for inducing a parabolic shape in the reflecting liquid include: magnetic fields on a viscous and partially magnetic liquid; internal pressures or surface tension effects on a reflective liquid; creating the telescope while the reflective surface is liquid, but depending on cooling effects to
|
{"page_id": 11914839, "title": "Liquid-mirror space telescope"}
|
no proposed mechanism of action by which the positions and motions of stars and planets could affect people and events on Earth that does not contradict well understood, basic aspects of biology and physics. Where astrology has made falsifiable predictions, it has been falsified. The most famous test was headed by Shawn Carlson and included a committee of scientists and a committee of astrologers. It led to the conclusion that natal astrology performed no better than chance. == See also == == Notes == == References == === Bibliography === == External links == The Astrotest - An account of a test of the predictive power of astrology, with references to other experiments.
|
{"page_id": 159668, "title": "Western astrology"}
|
In fluid dynamics, the Toms effect is a reduction of the drag of a turbulent flow through a pipeline when polymer solutions are added. In 1948, B. A. Toms discovered by experiments that the addition of a small amount of polymer into a Newtonian solvent (parts per million by weight), which results in a non-Newtonian fluid solution, can reduce the skin frictional drag on a stationary surface by up to 80% when turbulence is present. This technology has been successfully implemented to reduce pumping cost for oil pipelines, to increase the flow rate in fire fighting equipment and to help irrigation and drainage. It also has potential applications in the design of ship and submarine hulls to achieve an increased speed and reduced energy cost. == See also == Drag reducing agent FENE model Non-Newtonian fluid Direct numerical simulation == References == == External links == Alyeska Pipe Line EFFECTS OF FRICTION AND POLYMERS ON 2D TURBULENCE
|
{"page_id": 14353870, "title": "Toms effect"}
|
the tithi may end before the next sunrise in which case the next tithi begins. Because the length of a tithi is also variable a case can arise where a tithi begins after sunrise and ends prior to the next sunrise, which is called a kṣaya tithi. The opposite phenomenon can occur where a tithi in place during a sunrise is still present in the following sunrise which is called an adhika or ahorātra tithi. There are 30 tithis in each lunar month, named as: == See also == Tithi is one of the five elements of a Pañcāṅga. The other four elements: Nakshatra Karaṇa Nityayoga Vāra == References ==
|
{"page_id": 236524, "title": "Tithi"}
|
languages such as Chinese, where word separation isn’t a trivial task. 2. **You would need a massive vocabulary**: If we split things by words, we’d need to have a corresponding embedding for every possible word we might encounter. That’s a big number. And how do you know you saw every possible word in your training dataset? If you didn’t, the model won’t be able to process a new word. This is what happened in the past, and models were forced to the token to identify when it had encountered an unknown word. 3. **Larger vocabularies slow your model down**: Remember we want to process more data to get our model to learn more about language and perform better on our NLP tasks. This is one of the main benefits of the Transformer – we can process much more text than any previous model, which helps make these models better. However, if we use word level tokens, we need a large vocabulary which adds to the size of the model and limits its ability to be trained on more text.  Running Docker in production for 6 months (racknole.com) Leaving Academia (2013) (jakobegger.at) Open Source HTML5 Video Player with WebM/VP8 (from Zencoder, YC W10) (video-js.com) Treesaver.js - JavaScript library for creating magazine style layouts (treesaverjs.com) The Udemy Pyramid Scheme – Why I stopped Teaching at Udemy (osherove.com) Fast, isolated development environments using Docker. (orchardup.github.io) Vis.js: A Visual Interaction System (visjs.org) The Algebra of Algebraic Data Types, Part 2 (chris-taylor.github.io) How To Design Like Apple (pragmaticmarketing.com) OwnTracks: Self-hosted, open source location tracking (owntracks.org) Ask HN: Review my idea: "Organize the world's queues" (hackernewsexperiment.blogspot.com) Chaosnet Network Protocol (lm-3.github.io) Show HN: Kozmos – A Personal Library (getkozmos.com) ES6 Classes (javascriptjanuary.com) Noteplan – Markdown Calendar, Todos, and Notes (noteplan.co) '2 girls 1 cup' producer sentenced to 4 years in federal prison (cir.ca) Safeboot: Booting Linux Safely (safeboot.dev) How to Start a Hardware Company with Just $60K (cobattery.com) Storage engine design (akumuli.org) Show HN: We built real MMO Asteroids (mmoasteroids.com) WKWebView, an Electron alternative on macOS/iOS (holtwick.de) Autonomous Plant Watering (monotonous.org) Why becoming a data scientist is not easier than you think (josephmisiti.com) Shifd - Hack Day London Winner, Shift between your computer and mobile seamlessly (nytlabs.com) When to post to Hacker News and how many points to make it to the front page (readcodelearn.com) DspGuru (dspguru.com) Text Messaging to Groups is Simple & Free w/ SendHub (7x7.com) Native Clojure with GraalVM (janstepien.com) Web GL eye (vill.ee) Thoughts on vgo and dep (sdboyer.io) Eat Celebrity Meat with BiteLabs (bitelabs.org) React Hot Loader: Tweak React Components in Real Time (gaearon.github.io) What Apple Pay Could Mean for In-App Purchases (markokarppinen.com) Your content is distracting users from ads (fi.am) Magic mirror: One way mirror with a monitor behind it (michaelteeuw.nl) Vega: A Visualization Grammar (vega.github.io) Decentralization Roundup for 2017 (clutchofthedeadhand.com)
|
{"source": 2757, "title": "from dpo"}
|
its finished job before loading a new job. The in-port and out-port are designated as S0 and S4, and the machines as S1, S2, and S3. A job is introduced at the in-port S0, goes through the machines, and is dropped at the out-port S4. TABLE 10.4. Activity Transition Table of the ACD Model in Figure 10.16 No Activity At-begin BTO-event At-end Condition Action Time Name Arc Condition Action Influenced Activity 1 Create (C > 0) C−−; ta Created 1 true C++; Create 2 true Q1 ++; Process1 2 Process1 (Q1 > 0) & (M1 > 0) Q1 −−; M1 −−; t1 Processed1 1 true M1 ++; Process1 2 true Q2 ++; Process2 3 (M2 ≡0) D++; Decay 3 Process2 (Q2 > 0) & (M2 > 0) Q2 −−; M2 −−; t2 Processed2 1 true M2 ++; Process2 2 (Q2 >0) Cancel; Decay 3 true — — 4 Decay (D > 0) D−−; td Decayed 1 true R++; Return 5 Return (R > 0) & (Q2 > 0) R−−; Q2 −−; 0 Returned 1 true — — Initialize Initial Marking = {C = 1, M1 = 1, M2 = 1, Q1 = Q2 = D = R = 0}; Enabled Activities = {Create} Fig. 10.17. Event routine for the Fail activity in the resource failure model. > No Activity At-begin BTO-event At-end Condition Action Time Name Arc Condition Action Influenced Activity > 4Fail (F>0) F--; tfFailed 1true E++; Repair 2(M ≡0) M++; Cancel; Process Initialize Initial Marking = {C=1, M=1, Q=0, R=1, F=1, E=0}; Enabled Activities = {Create, Fail} > Execute-Failed-event-routine () If (true) {E++; Store-activity (Repair)}; If (M ≡0) {M++; Cancel-event (Processed)}; cycle Ti MeAn Alysis of work cells vi A A nAc Tivi Tycycle diAgr AM 315 When all machines are full (i.e., loaded with jobs), the robot
|
{"source": 4980, "title": "from dpo"}
|
other information contained in the ciphertext, but also gives the adversary more constraints on the private key. The fact that ciphertexts in our scheme give constraints relating to both 𝑥 → and 𝑦 → is one of the reasons our construction uses four generators 𝑔 1 , … , 𝑔 4 instead of the typical two generators in the Cramer–Shoup construction. We need a large enough vector space so that { 1 → , 𝑥 → , 𝑦 → } can all be linearly independent (in fact, they must also be linearly independent of 𝑧 → for additional reasons). Correctness Properties Under this linear-algebraic interpretation of our scheme, it is easy to see the correctness of the homomorphic transformation operations. Lemma 6.4 For all keypairs ( 𝑝 𝑘 ^ , 𝑠 𝑘 ^ ) , all (purported) CSL ciphertexts 𝑈 , and all 𝑈 ′ in the support of 𝑀 𝐶 𝑇 𝑟 𝑎 𝑛 𝑠 ( 𝑈 , 𝑇 σ ) , we have 𝑀 𝐷 𝑒 𝑐 𝑠 𝑘 ^ ( 𝑈 ′ ) = 𝑇 σ ( 𝑀 𝐷 𝑒 𝑐 𝑠 𝑘 ^ ( 𝑈 ) ) . Proof If 𝑣 → is the CSL strand of 𝑈 , then the strand of 𝑈 ′ is 𝑣 → + 𝑟 1 → for some 𝑟 ∈ 𝑍 𝑞 . Consider any decryption constraint on 𝑈 ′ . The left-hand side of the constraint is the left-hand side of the corresponding constraint from 𝑈 plus r times the left-hand side of the corresponding public-key constraint. By the definition of 𝑀 𝐶 𝑇 𝑟 𝑎 𝑛 𝑠 , the right-hand side of the constraint is also a combination of the right-hand sides of these two constraints with the same coefficients (with one of the constraints being further offset
|
{"source": 6346, "title": "from dpo"}
|
Climate Change and the Environment Julia Marton-Lefèvre, Director General, International Union for Conservation of Nature Herman Mulder, was Director-General and Head of Group Risk Management of ABN AMRO Bank, Amsterdam, Netherlands Peter May, President, International Society for Ecological Economics Ladislav Miko, Minister of Environment, Czech Republic Walter Reid, Director Conservation and Science Program, David and Lucile Packard Foundation Giles Atkinson, Reader in Environmental Policy, Department of Geography and Environment and Associate, Grantham Research Institute of Climate Change and Environment, London School of Economics Edward Barbier, Professor of Economics, Department of Economics and Finance, University of Wyoming Jacqueline McGlade, Executive Director, European Environment Agency Yolanda Kakabadse, President, World Wide Fund for Nature from January 2010 Jochen Flasbarth, President, Federal Environment Agency, Germany Karl-Göran Mäler, Professor in Economics, Stockholm School of Economics and Director, Beijer International Institute of Ecological Economics Joan Martinez Alier, Professor, Department of Economics and Economic History, Universitat Autonoma de Barcelona == Phase I: key messages == The world has already lost much of its biodiversity. TEEB indicates that pressure on commodity and food prices shows the consequences of this loss to society. TEEB recommends that urgent remedial action is essential because species loss and ecosystem degradation are inextricably linked to human well-being. Economic growth and the conversion of natural ecosystems to agricultural production are forecasted to continue, but TEEB feels that it is essential to ensure that such development takes proper account of the real value of natural ecosystems. This is central to both economic and environmental management. The findings of TEEB (Interim Report) were largely in three areas—the economic size and welfare impact of losses of ecosystems and biodiversity, the strong links between biodiversity conservation and ecosystem health on the one hand and poverty elimination and the achievement of Millennium Development Goals on the other, and the
|
{"page_id": 24131459, "title": "The Economics of Ecosystems and Biodiversity"}
|
Na+), they can still have very different equilibrium potentials, provided their outside and/or inside concentrations differ. Take, for example, the equilibrium potentials of potassium and sodium in neurons. The potassium equilibrium potential EK is −84 mV with 5 mM potassium outside and 140 mM inside. On the other hand, the sodium equilibrium potential, ENa, is approximately +66 mV with approximately 12 mM sodium inside and 140 mM outside. === Changes to membrane potential during development === A neuron's resting membrane potential actually changes during the development of an organism. In order for a neuron to eventually adopt its full adult function, its potential must be tightly regulated during development. As an organism progresses through development the resting membrane potential becomes more negative. Glial cells are also differentiating and proliferating as development progresses in the brain. The addition of these glial cells increases the organism's ability to regulate extracellular potassium. The drop in extracellular potassium can lead to a decrease in membrane potential of 35 mV. === Cell excitability === Cell excitability is the change in membrane potential that is necessary for cellular responses in various tissues. Cell excitability is a property that is induced during early embryogenesis. Excitability of a cell has also been defined as the ease with which a response may be triggered. The resting and threshold potentials forms the basis of cell excitability and these processes are fundamental for the generation of graded and action potentials. The most important regulators of cell excitability are the extracellular electrolyte concentrations (i.e. Na+, K+, Ca2+, Cl−, Mg2+) and associated proteins. Important proteins that regulate cell excitability are voltage-gated ion channels, ion transporters (e.g. Na+/K+-ATPase, magnesium transporters, acid–base transporters), membrane receptors and hyperpolarization-activated cyclic-nucleotide-gated channels. For example, potassium channels and calcium-sensing receptors are important regulators of excitability in neurons, cardiac myocytes
|
{"page_id": 563161, "title": "Membrane potential"}
|
has been awarded the EFOMP Medal by the European Federation of Organisations for Medical Physics, the Barclay Medal by the British Institute of Radiology, an Honorary Fellowship of the Institute of Physics and Engineering in Medicine, and honorary membership in the Deutsche Gesellschaft für Medizinische Physik e.V., the German Society for Medical Physics. In addition, he was awarded the degree of DSc (Med) Honoris Causa by the University of London. == Selected publications == Webb, Steve (2015). Intensity-Modulated Radiation Therapy. CRC Press. ISBN 9781420034110. Webb, Steve (2009). "The contribution, history, impact and future of physics in medicine". Acta Oncologica. 48 (2): 169–177. doi:10.1080/02841860802244158. PMID 18766998. S2CID 25179082. Webb, Steve (2003). "The physical basis of IMRT and inverse planning". The British Journal of Radiology. 76 (910): 678–689. doi:10.1259/bjr/65676879. PMID 14512327. Webb, Steve (1989). "Optimisation of conformal radiotherapy dose distribution by simulated annealing". Physics in Medicine and Biology. 34 (10): 1349–1370. Bibcode:1989PMB....34.1349W. doi:10.1088/0031-9155/34/10/002. PMID 2682694. S2CID 250749172. == Notes and references == == External links == Steve Webb publications indexed by Google Scholar
|
{"page_id": 41549776, "title": "Steve Webb (medical physicist)"}
|
going. 'Cause we got this thing called the Constitution, which doesn't allow cruel and unusual punishment. Which means YOU CAN'T STOP. 53 9 more replies 9 more replies [Continue this thread]( more replies 11 more replies [Continue this thread]( [ IBM 1401 IBM 1620 Model I NEAC 2201 (NEC) EMIDEC 1100 TRW RW-300 PDP-1 Standard Elektrik Lorenz SEL ER 56 == 1960s == === 1960 === AEI 1010 Bull Gamma 60 Honeywell 200 Honeywell 800 first installation 1960 UNIVAC LARC CDC 160 (7/60) CDC 1604 (1/60) Datasaab D2 DRTE Computer, expanded version Elliott 803 GE 210 AN/FSQ-32 (IBM 4020) AN/FSQ-31V IBM 7070 (6/60) Japan Electrotechnical Laboratory ETL Mark V (5/60) Mitsubishi MELCOM 3409 Clary DE-60 Monroe Calculating Machine Mark XI (or "Monrobot XI") Packard Bell Corporation PB 250 (PB250; no relation to the modern brand of personal computers) used, among others, as the controller for hybrid digital/analog system TRICE and HYCOMP 250, and as the control computer for mobile data systems Philco TRANSAC S-2000 Model 211 RCA 301 === 1961 === Plessey XL4 MANIAC III CAB 500 LEO III English Electric KDP10 Bendix G-20 NEC NEAC 2205 CDC 160A (7/61) CDC 924, CDC 924A (8/61) Fujitsu FACOM 222 GE-200 series GE-225 1961 GE-215 1963 GE-205,235 1964 GE Datanet 30 Honeywell 400 (12/61) IBM 1410 IBM 7030 Stretch IBM 7074 (12/51) Zuse Z23 IBM 7080 (9/61) IBM 1710 Matsushita MADIC IIA RCA 301 (2/61) TRW-130 aka AN/UYK-1 for Transit submarine navigation satellite receivers UNIVAC 490 Regnecentralen GIER === 1962 === Philco TRANSAC S-2000 Model 212 Atlas Computer (Manchester) ASC-15 Burroughs D825 CDC 1604-A DEC PDP-4 GE 412 (7/62) IBM 1620 Model II ICT 1301 ILLIAC II UNIVAC 1004 UNIVAC 1107 UNIVAC III IBM 7072 (6/62) IBM 7094 (9/62) Autonetics D-17B Royal Radar Establishment Automatic Computer Telefunken TR4 RW-400 aka AN/FSQ-27 by TRW
|
{"page_id": 24436297, "title": "List of transistorized computers"}
|
problems. Two critical issues need to be considered when attempting nanoindentation measurements on soft materials: stiffness and viscoelasticity. The first is the requirement that in any force-displacement measurement platform the stiffness of the machine ( k machine {\displaystyle k_{\text{machine}}} ) must approximately match the stiffness of the sample ( k sample {\displaystyle k_{\text{sample}}} ), at least in order of magnitude. If k machine {\displaystyle k_{\text{machine}}} is too high, then the indenter probe will simply run through the sample without being able to measure the force. On the other hand, if k machine {\displaystyle k_{\text{machine}}} is too low, then the probe simply will not indent into the sample, and no reading of the probe displacement can be made. For samples that are very soft, the first of these two possibilities is likely. The stiffness of a sample is given by k sample {\displaystyle k_{\text{sample}}} ≈ a {\displaystyle a} × E sample {\displaystyle E_{\text{sample}}} where a {\displaystyle a} is the size of the contact region between the indenter and the sample, and E {\displaystyle E} is the sample’s elastic modulus. Typical atomic-force microscopy (AFM) cantilevers have k machine {\displaystyle k_{\text{machine}}} in the range 0.05 to 50 N/m, and probe size in the range ~10 nm to 1 μm. Commercial nanoindenters are also similar. Therefore, if k machine {\displaystyle k_{\text{machine}}} ≈ k sample {\displaystyle k_{\text{sample}}} , then a typical AFM cantilever-tip or a commercial nanoindenter can only measure E sample {\displaystyle E_{\text{sample}}} in the ~kPa to GPa range. This range is wide enough to cover most synthetic materials including polymers, metals and ceramics, as well as a large variety of biological materials including tissues and adherent cells. However, there may be softer materials with moduli in the Pa range, such as floating cells, and these cannot be measured by an AFM or a
|
{"page_id": 4023692, "title": "Nanoindentation"}
|
CMS-2 is an embedded systems programming language used by the United States Navy. It was an early attempt to develop a standardized high-level computer programming language intended to improve code portability and reusability. CMS-2 was developed primarily for the US Navy’s tactical data systems (NTDS). CMS-2 was developed by RAND Corporation in the early 1970s and stands for "Compiler Monitor System". The name "CMS-2" is followed in literature by a letter designating the type of target system. For example, CMS-2M targets Navy 16-bit processors, such as the AN/AYK-14. == History == CMS-2 was developed for FCPCPAC (Fleet Computer Programming Center - Pacific) in San Diego, CA. It was implemented by Computer Sciences Corporation in 1968 with design assistance from Intermetrics. The language continued to be developed, eventually supporting a number of computers including the AN/UYK-7 and AN/UYK-43 and UYK-20 and UYK-44 computers. == Language features == CMS-2 was designed to encourage program modularization, permitting independent compilation of portions of a total system. The language is statement oriented. The source is free-form and may be arranged for programming convenience. Data types include fixed-point, floating-point, boolean, character and status. Direct reference to, and manipulation of character and bit strings is permitted. Symbolic machine code may be included, known as direct code. == Program structure == A CMS-2 program is composed of statements. Statements are made up of symbols separated by delimiters. The categories of symbols include operators, identifiers, and constants. The operators are language primitives assigned by the compiler for specific operations or definitions in a program. Identifiers are unique names assigned by the programmer to data units, program elements and statement labels. Constants are known values that may be numeric, Hollerith strings, status values or Boolean. CMS-2 statements are free form and terminated by a dollar sign. A statement label may
|
{"page_id": 1181779, "title": "CMS-2"}
|
human behaviors (spirituality, religious fundamentalism, consciousness, free will, criminality, addiction). The technique has been successfully applied to a broad range of diseases and lesion types including lesions due to stroke, traumatic brain injury, tuberous sclerosis and multiple sclerosis. The technique has been broadened to map the connectivity of locations from transcranial magnetic stimulation and deep brain stimulation sites to understand treatment responsiveness. Research findings based on lesion network mapping have been reported in the New York Times, Scientific American and USA Today and the term has been included in the New England Journal of Medicine's general medical glossary. == References ==
|
{"page_id": 74621256, "title": "Lesion network mapping"}
|
received 100 short tons (89 long tons; 91 t) of wire. A machine was placed on the Manhattan anchorage to weave the wires. The Roeblings also ordered eight guide wires for the wheels that would carry the main cables' wires across the river. The first wire was strung across the East River on November 27, 1901. The Roeblings requested ten months to finish the wires, but city bridge commissioner Gustav Lindenthal refused to extend the deadline past April 1902. Work on each of the four cables proceeded simultaneously. Workers were able to string 50 wires in each strand during a 10-hour workday, or 400 wires per day in total. After each strand was completed, it was permanently attached to the eyebars in either anchorage. To save money, the wires were covered with oil and graphite, rather than galvanized; the Roebling Company was hesitant to use ungalvanized wire, but city officials claimed that the oil and graphite mix was adequate. The last major contract for the bridge was for the central span's deck. The bridge commissioners solicited bids for the deck in April 1901, and the Pennsylvania Steel Company submitted the lowest bid. Though a local resident sued to stop Pennsylvania Steel from receiving the contract, the city allowed the firm to sublease the work to the United Engineering and Construction Company. ==== Approach contracts and plans ==== The bridge commissioners were authorized to finalize the purchase of land for the Brooklyn approach in December 1899, but it took seven months for the Board of Estimate to approve bonds for the purchase. Buck estimated that it would take four to six months to raze all the buildings in the bridge's path. The bridge commissioners began soliciting bids for the approach viaducts in April 1900 and received bids the next month. More
|
{"page_id": 472720, "title": "Williamsburg Bridge"}
|
distinct values, such as non-negative integers from 0 to 255, or signed integers from −128 to 127. The IEEE 1541-2002 standard specifies "B" (upper case) as the symbol for byte (IEC 80000-13 uses "o" for octet in French, but also allows "B" in English). Bytes, or multiples thereof, are almost always used to specify the sizes of computer files and the capacity of storage units. Most modern computers and peripheral devices are designed to manipulate data in whole bytes or groups of bytes, rather than individual bits. === Nibble === A group of four bits, or half a byte, is sometimes called a nibble, nybble or nyble. This unit is most often used in the context of hexadecimal number representations, since a nibble has the same number of possible values as one hexadecimal digit has. === Word, block, and page === Computers usually manipulate bits in groups of a fixed size, conventionally called words. The number of bits in a word is usually defined by the size of the registers in the computer's CPU, or by the number of data bits that are fetched from its main memory in a single operation. In the IA-32 architecture more commonly known as x86-32, a word is 32 bits, but other past and current architectures use words with 4, 8, 9, 12, 13, 16, 18, 20, 21, 22, 24, 25, 29, 30, 31, 32, 33, 35, 36, 38, 39, 40, 42, 44, 48, 50, 52, 54, 56, 60, 64, 72 bits or others. Some machine instructions and computer number formats use two words (a "double word" or "dword"), or four words (a "quad word" or "quad"). Computer memory caches usually operate on blocks of memory that consist of several consecutive words. These units are customarily called cache blocks, or, in CPU caches, cache
|
{"page_id": 18075548, "title": "Units of information"}
|
Yeah. And so as a person with with much knowledge and love for theorems, what is your favorite favorite zero? CB: Okay, so I don't know if it's my favorite, but at least for this episode of My Favorite Theorem, the theorem I would like to share is the so-called — well, so there's this problem, and the theorem says that this is algorithmically undecidable. So what's the problem? The problem is called matrix mortality. EL: Which is a really an inviting name. KK: It’s a great name, right? It sounds like a video game or something. Yeah. CB: Yeah. So, in the most general sense it asks, so the input is a finite list of square matrices of the same size. And the the the decision problem is whether a product of these things in some order, possibly with repetitions, could be ever zero or not. So, if an algorithm would say yes or no to each such collection. And I think at first this was shown to be undecidable for already 3 × 3 matrices in the 70s. And then there were some further developments as to because of course, if I give you one matrix, then matrix mortality becomes is this matrix nilpotent, and you can determine that by the characteristic polynomial, so that is decidable. So how few, how short can the list get and remain undecidable? I think for 3 × 3 matrices, it has been shown in 2014 or so that six 3 × 3 matrices, the problem is undecidable. So like A, B, C, D, E, F, F, that’s six 3 × 3 matrices. So that's like, what, like 54 entries of integers? These are all integer matrices, by the way. KK: Okay. I was going to ask that. CB: Snd then the
|
{"source": 1441, "title": "from dpo"}
|
shows the F -statistic to be significant p=0.017 suggesting that the model is a significantly better predictor of kicking distance that the mean distance. This table shows both the H 0 and H1 model s and the constant (intercept) and regression coefficients (unstandardized) for all the predictors forced into the model. Even though the ANOVA shows the model to be significant none of the predictor regression coefficients is significant! The collinear ity statistics, Tolerance and VIF (Variance Inflation Factor) check the assumption of multicollinearity. As a rule of thumb if VIF >10 and tolerance 1 and tolerance <0.2 the model may be biased. In this case , the average VIF is quite large (around 5). 76 | P a g e JASP 0.14 - Dr Mark Goss -Sampson The casewise diagnostics table is empty! This is good news. This will highlight any cases (rows) that have residuals which are 3 or more standard deviations away from the mean. These cases wi th the largest errors may well be outliers . Too many outliers will have an impact on the model and should be dealt with in the usual way (see Exploring Data Integrity). As a comparison re -run the analyses but now choose Backward as the method of data en try. The outputs are as follows: JASP has now calculated 4 potential regression models. It can be seen that each consecutive model increases the adjusted R 2, with model 4 accounting for 73.5% of the outcome variance. The Durbin -Watson score is also higher than with the forced entry method. The ANOVA table indicates that each successive model is better as shown by the increasing F -value and improving p-value .77 | P a g e JASP 0.14 -
|
{"source": 3701, "title": "from dpo"}
|
> δ (√512 + 1) . If δ = 0 , Sparse is (α, β ) accurate for: α = 9c(ln k + ln(4 c/β )) Proof. Accuracy requires two conditions: first, that for all ai = ⊥: fi(D) ≤ T + α. This holds with probability 1 − β/ 2 by the accuracy theorem for Sparse. Next, for all ai ∈ R, it requires |fi(D) − ai| ≤ α.This holds for with probability 1 − β/ 2 by the accuracy of the Laplace mechanism. What did we show in the end? If we are given a sequence of queries together with a guarantee that only at most c of them have answers above T −α, we can answer those queries that are above a given thresh-old T , up to error α. This accuracy is equal, up to constants and a factor of log k, to the accuracy we would get, given the same privacy guar-antee, if we knew the identities of these large above-threshold queries ahead of time, and answered them with the Laplace mechanism. That is, the sparse vector technique allowed us to fish out the identities of these large queries almost “for free”, paying only logarithmically for the irrelevant queries. This is the same guarantee that we could have got-ten by trying to find the large queries with the exponential mechanism and then answering them with the Laplace mechanism. This algorithm, however, is trivial to run, and crucially, allows us to choose our queries adaptively. ## 3.7 Bibliographic notes Randomized Response is due to Warner (predating differential privacy by four decades!). The Laplace mechanism is due to Dwork et al. . The exponential mechanism was invented by McSherry and Talwar . Theorem 3.16 (simple composition) was claimed in ; the proof appearing in
|
{"source": 5783, "title": "from dpo"}
|
stalls in on O i+1. We choose some extension X from F that maximizes the number of processes with simultaneous pending non-trivial operations on O i+1 (we'll call this set of processes S i+1 and let |S i+1| be the number k'>0 we've been waiting for), and let E' be the minimum prefix of X such that these pending operations are still pending after EE'. We now look at the properties of EE'. We have: * EE' is p-free (follows from E being p-free and E'∈F, where everything in F is p-free). * Each process in S j has a pending operation on O j after EE' (it did after E, and didn't do anything in E'). In particular, this means that we can construct an execution EE'σ 1...σ i σ i+1 that includes k+k' memory stalls, by sending in the same sequences σ 1...σ i as before, then appending a new sequence of events where (a) p does all of its operations in σ up to its first operation on O i+1; then (b) all the processes in the set S i+1 of processes with pending events on O i+1 execute their pending events on O i+1; then (c) p does its first access to O i+1 from σ. Note that in addition to giving us k+k' memory stalls, σ i+1 also has the right structure for a (k+k')-stall execution. But there is one thing missing: we have to show that the weird condition on further extensions still holds. In particular, letting S' = S∪S i+1, we need to show that any (p∪S')-free extension α of EE' includes a non-trivial access to a base object accessed in σ 1...σ i+1. Observe first that since α is (p∪S')-free, then E'α is (p∪S)-free, and so it's in F: in particular, by
|
{"source": 7319, "title": "from dpo"}
|
containing a uniform mixture of linear polarisations at all possible angles. Since the average value of cos2 θ is 1/2, the transmission coefficient becomes I I 0 = 1 2 . {\displaystyle {\frac {I}{I_{0}}}={\frac {1}{2}}\,.} In practice, some light is lost in the polariser and the actual transmission of unpolarised light will be somewhat lower than this, around 38% for Polaroid-type polarisers but considerably higher (>49.9%) for some birefringent prism types. In addition to birefringence and dichroism in extended media, polarisation effects can also occur at the (reflective) interface between two materials of different refractive index. These effects are treated by the Fresnel equations. Part of the wave is transmitted and part is reflected, with the ratio depending on the angle of incidence and the angle of refraction. In this way, physical optics recovers Brewster's angle. When light reflects from a thin film on a surface, interference between the reflections from the film's surfaces can produce polarisation in the reflected and transmitted light. ===== Natural light ===== Most sources of electromagnetic radiation contain a large number of atoms or molecules that emit light. The orientation of the electric fields produced by these emitters may not be correlated, in which case the light is said to be unpolarised. If there is partial correlation between the emitters, the light is partially polarised. If the polarisation is consistent across the spectrum of the source, partially polarised light can be described as a superposition of a completely unpolarised component, and a completely polarised one. One may then describe the light in terms of the degree of polarisation, and the parameters of the polarisation ellipse. Light reflected by shiny transparent materials is partly or fully polarised, except when the light is normal (perpendicular) to the surface. It was this effect that allowed the mathematician Étienne-Louis
|
{"page_id": 22483, "title": "Optics"}
|
An external floating roof tank is a storage tank commonly used to store large quantities of petroleum products such as crude oil or condensate. It consists of an open- topped cylindrical steel shell equipped with a roof that floats on the surface of the stored liquid. The roof rises and falls with the liquid level in the tank. As opposed to a fixed roof tank there is no vapor space (ullage) in the floating roof tank (except for very low liquid level situations). In principle, this eliminates tank breathing loss and greatly reduces the evaporative loss of the stored liquid. There is a rim seal system between the tank shell and roof to reduce rim evaporation. The roof has support legs hanging down into the liquid. At low liquid levels the roof eventually lands and a vapor space forms between the liquid surface and the roof, similar to a fixed roof tank. The support legs are usually retractable to increase the working volume of the tank. == Advantages == External roof tanks are usually installed for environmental or economical reasons to limit product loss and reduce the likelihood of emission of volatile organic compounds (VOCs) and other potential air pollutants. Normally, the roof of the tank rests directly on the surface of the stored liquid, leaving little vapor space and consequently leading to a much lower risk of rim space fire. == Disadvantages == Snow and rain water can accumulate on the roof. Roofs are exposed to sunlight and weather which can accelerate corrosion. == System function == Water on the roof is usually drained by a special flexible hose or other special drain line system that runs from drain-sumps on the roof, through the stored liquid to a drain valve on the shell at the base of the tank.
|
{"page_id": 20625996, "title": "External floating roof tank"}
|
acoustical properties of the enclosure. Examples include Varese's Poeme Electronique (tape music performed in the Philips Pavilion of the 1958 World Fair, Brussels) and Stan Schaff's Audium installation, currently active in San Francisco." Through weekly programs (over 4,500 in 40 years), Shaff "sculpts" sound, performing now-digitized spatial works live through 176 speakers. Jean-Jacques Perrey experimented with Pierre Schaeffer's techniques on tape loops and was among the first to use the recently released Moog synthesizer developed by Robert Moog. With this instrument he composed some works with Gershon Kingsley and solo. A well-known example of the use of Moog's full-sized Moog modular synthesizer is the 1968 Switched-On Bach album by Wendy Carlos, which triggered a craze for synthesizer music. In 1969 David Tudor brought a Moog modular synthesizer and Ampex tape machines to the National Institute of Design in Ahmedabad with the support of the Sarabhai family, forming the foundation of India's first electronic music studio. Here a group of composers Jinraj Joshipura, Gita Sarabhai, SC Sharma, IS Mathur and Atul Desai developed experimental sound compositions between 1969 and 1973. === Computer music === Musical melodies were first generated by the computer CSIRAC in Australia in 1950. There were newspaper reports from America and England (early and recently) that computers may have played music earlier, but thorough research has debunked these stories as there is no evidence to support the newspaper reports (some of which were obviously speculative). Research has shown that people speculated about computers playing music, possibly because computers would make noises, but there is no evidence that they actually did it. The world's first computer to play music was CSIRAC, which was designed and built by Trevor Pearcey and Maston Beard in the 1950s. Mathematician Geoff Hill programmed the CSIRAC to play popular musical melodies from the very
|
{"page_id": 9510, "title": "Electronic music"}
|
Wat's Dyke (Welsh: Clawdd Wat) is a 40-mile (64 km) linear earthwork running through the northern Welsh Marches from Basingwerk Abbey on the River Dee estuary, passing east of Oswestry and on to Maesbury in Shropshire, England. It runs generally parallel to Offa's Dyke, sometimes within a few yards but never more than three miles (5 km) away. It now appears insignificant and is visible in some places as a raised hedgerow and in others no more than a cropmark. The ditch has long since been filled in and the bank ploughed away, but originally it was a considerable construction, considered to be strategically more sophisticated than Offa's Dyke. The date of construction is disputed, ranging from sub-Roman to the early ninth century. == Construction and siting == It consists of the usual bank and ditch of an ancient dyke, with the ditch on the western side, meaning that the dyke faces Wales and by implication can be seen as protecting the English lands to the east. The placement of the dyke in the terrain also shows that care was taken to provide clear views to the west and to use local features to the best defensive advantage. A section of the dyke extends north and south from Old Oswestry, an Iron Age hill fort. == Dating controversy == The dyke was previously thought to date to the early 8th century, constructed by Æthelbald, king of Mercia, who reigned from 716 to 757. Æthelbald's successor, Offa, built the dyke which carries his name at some point during his reign (757 to 796). Excavations in the 1990s at Maes-y-Clawdd near Oswestry uncovered the remains of a small fire site together with eroded shards of Romano-British pottery and quantities of charcoal, which have been dated to between 411 and 561 AD (centered
|
{"page_id": 8870657, "title": "Wat's Dyke"}
|
of ASICs. Most maskless lithography systems currently being developed are based on the use of multiple electron beams. The goal is to use the parallel scanning of the beams to speed up the patterning of large areas. However, a fundamental consideration here is to what degree electrons from neighboring beams can disturb one another (from Coulomb repulsion). Since the electrons in parallel beams are traveling equally fast, they will persistently repel one another, while the electron lenses act over only a portion of the electrons' trajectories. === Optical === Direct laser writing is a very popular form of optical maskless lithography, which offers flexibility, ease of use, and cost effectiveness in R&D processing (small batch production). The underlying technology uses spatial light modulating (SLM) micro-arrays based on glass to block laser pathway from reaching a substrate with a photoresist (in similar manner to digital micromirror devices). This equipment offers rapid patterning at sub-micrometer resolutions, and offers a compromise between performance and cost when working with feature sizes of approximately 200 nm or greater. Direct laser writing for microelectronics packaging, 3D electronics and heterogeneous integration were developed in 1995 at the Microelectronics and Computer Technology Corporation (or MCC) in Austin, Texas. The MCC system was fully integrated with precision control for 3D surfaces and artificial intelligence software with real-time machine learning and included laser wavelengths for standard i-line resist and DUV 248nm. The MCC system also included circuit editing capabilities for isolating circuits on a programmable wafer design. In 1999, the MCC system was advanced for use in MEMS manufacturing. Interference lithography or holographic exposures are not maskless processes and therefore do not count as "maskless", although they have no 1:1 imaging system in between. Plasmonic direct writing lithography uses localized surface plasmon excitations via scanning probes to directly expose the
|
{"page_id": 1903362, "title": "Maskless lithography"}
|
An Alu element is a short stretch of DNA originally characterized by the action of the Arthrobacter luteus (Alu) restriction endonuclease. Alu elements are the most abundant transposable elements in the human genome, present in excess of one million copies. Most Alu elements are thought to be selfish or parasitic DNA. However, it has been suggested that at least some are likely to play a role in evolution and have been used as genetic markers. They are derived from the small cytoplasmic 7SL RNA, a component of the signal recognition particle. Alu elements are not highly conserved within primate genomes, as only a minority have retained activity, and originated in the genome of an ancestor of Supraprimates. Alu insertions have been implicated in several inherited human diseases and in various forms of cancer. The study of Alu elements has also been important in elucidating human population genetics and the evolution of primates, including the evolution of humans. == Alu family == The Alu family is a family of repetitive elements in primate genomes, including the human genome. Modern Alu elements are about 300 base pairs long and are therefore classified as short interspersed nuclear elements (SINEs) among the class of repetitive RNA elements. The typical structure is 5' - Part A - A5TACA6 - Part B - PolyA Tail - 3', where Part A and Part B (also known as "left arm" and "right arm") are similar nucleotide sequences. Expressed another way, it is believed modern Alu elements emerged from a head to tail fusion of two distinct FAMs (fossil antique monomers) over 100 million years ago, hence its dimeric structure of two similar, but distinct monomers (left and right arms) joined by an A-rich linker. Both monomers are thought to have evolved from 7SL, also known as SRP RNA.
|
{"page_id": 367077, "title": "Alu element"}
|
with the convection zone and driven by the interplay between baroclinicity and Maxwell stresses. Helioseismology benefits most from continuous monitoring of the Sun, which began first with uninterrupted observations from near the South Pole over the austral summer. In addition, observations over multiple solar cycles have allowed helioseismologists to study changes in the Sun's structure over decades. These studies are made possible by global telescope networks like the Global Oscillations Network Group (GONG) and the Birmingham Solar Oscillations Network (BiSON), which have been operating for over several decades. == Types of solar oscillation == Solar oscillation modes are interpreted as resonant vibrations of a roughly spherically symmetric self-gravitating fluid in hydrostatic equilibrium. Each mode can then be represented approximately as the product of a function of radius r {\displaystyle r} and a spherical harmonic Y l m ( θ , ϕ ) {\displaystyle Y_{l}^{m}(\theta ,\phi )} , and consequently can be characterized by the three quantum numbers which label: the number of nodal shells in radius, known as the radial order n {\displaystyle n} ; the total number of nodal circles on each spherical shell, known as the angular degree ℓ {\displaystyle \ell } ; and the number of those nodal circles that are longitudinal, known as the azimuthal order m {\displaystyle m} . It can be shown that the oscillations are separated into two categories: interior oscillations and a special category of surface oscillations. More specifically, there are: === Pressure modes (p modes) === Pressure modes are in essence standing sound waves. The dominant restoring force is the pressure (rather than buoyancy), hence the name. All the solar oscillations that are used for inferences about the interior are p modes, with frequencies between about 1 and 5 millihertz and angular degrees ranging from zero (purely radial motion) to order
|
{"page_id": 408801, "title": "Helioseismology"}
|
he pretends to be retired while secretly solving cases undercover for Ms. O. Oksana (Madeleine Barbeau, seasons 1-2): The precinct's sole resident cook. She has a deadpan and sarcastic personality. Agent Olaf (Eshaan Buadwal, seasons 1-2): Agent Oren's partner. Olaf is happy-go-lucky but tends to be simple-minded. Despite this, he has displayed moments of intelligence, often to the shock and amazement of his fellow agents. He shares Oren's penchant for laziness. He dreams of becoming a dentist. He has an unusual potato obsession. Later on in the series, it is revealed that he is a werewolf. Agent Orchid (Michela Luci, seasons 1-3): One of the younger agents. She tends to be extremely stubborn and is often sarcastic and difficult as well as cunning and manipulative. She enjoys calling others "Sherman." Agent Oren (Brendan Heard, seasons 1-2): Agent Olaf's partner. Oren is depicted as snarky and arrogant. Oren and his partner have an ongoing rivalry with Olive and Otto. Oren has an unusual fear of pancakes and dreams of becoming an Odd Squad director and running his own precinct. Other Olympia (Saara Chaudry, seasons 1-2): Ms. O's old assistant. After defeating a villain, she became an agent alongside her partner Ozric. Her name used to be Olympia until she and Agent Olympia (Anna Cathcart) had a "name off" in the episode Other Olympia. Her name was later changed to Odal. Agent Owen (Christian Distefano, seasons 1-2): The head of the precinct's Security department, in charge of defending against intruders and other vital protective measures of the surrounding town, the squad and its employees. He is frequently seen going on break. Agent Orson (Nashton Avila, Nathan Avila, seasons 1-3): One of the baby agents, he is an excellent driver and was frequent winner of the precinct's employee of the month award until
|
{"page_id": 43926873, "title": "Odd Squad"}
|
Nucleic acids are large biomolecules that are crucial in all cells and viruses. They are composed of nucleotides, which are the monomer components: a 5-carbon sugar, a phosphate group and a nitrogenous base. The two main classes of nucleic acids are deoxyribonucleic acid (DNA) and ribonucleic acid (RNA). If the sugar is ribose, the polymer is RNA; if the sugar is deoxyribose, a variant of ribose, the polymer is DNA. Nucleic acids are chemical compounds that are found in nature. They carry information in cells and make up genetic material. These acids are very common in all living things, where they create, encode, and store information in every living cell of every life-form on Earth. In turn, they send and express that information inside and outside the cell nucleus. From the inner workings of the cell to the young of a living thing, they contain and provide information via the nucleic acid sequence. This gives the RNA and DNA their unmistakable 'ladder-step' order of nucleotides within their molecules. Both play a crucial role in directing protein synthesis. Strings of nucleotides are bonded to form spiraling backbones and assembled into chains of bases or base-pairs selected from the five primary, or canonical, nucleobases. RNA usually forms a chain of single bases, whereas DNA forms a chain of base pairs. The bases found in RNA and DNA are: adenine, cytosine, guanine, thymine, and uracil. Thymine occurs only in DNA and uracil only in RNA. Using amino acids and protein synthesis, the specific sequence in DNA of these nucleobase-pairs helps to keep and send coded instructions as genes. In RNA, base-pair sequencing helps to make new proteins that determine most chemical processes of all life forms. == History == Nucleic acid was, partially, first discovered by Friedrich Miescher in 1869 at the University
|
{"page_id": 21496, "title": "Nucleic acid"}
|
license authorizes and the restrictions that apply, see 31 CFR § 515.339(1)]( contains a general license that authorizes, subject to conditions, travel-related transactions and other transactions that are directly incident to professional research in Cuba. Among other things, this general license authorizes, subject to conditions, professional research in Cuba relating to a traveler’s profession, professional background,
|
{"source": 1016, "title": "from dpo"}
|
a round-trip time of 50 μs for the Alto over Ethernet, which is still a respectable latency. It was Boggs’ experience as a ham radio operator that led to a design that did not need a central arbiter, but instead listened before use and then varied back-off times in case of conflicts. The announcement by Digital Equipment Corporation, Intel, and Xerox of a standard for 10-Mbit/sec Ethernet was critical to the commercial success of Ethernet. This announcement short-circuited a lengthy IEEE standards effort, which eventually did publish IEEE 802.3 as a standard for Ethernet. There have been several unsuccessful candidates that have tried to replace the Ethernet. The Fiber Data Distribution Interconnect (FDDI) committee, unfortu-nately, took a very long time to agree on the standard, and the resulting interfaces were expensive. It was also a shared medium when switches were becoming affordable. ATM also missed the opportunity in part because of the long time to standardize the LAN version of ATM, and in part because of the high latency and poor behavior of ATM connectionless servers, as mentioned above. InfiniBand for the reasons discussed below has also faltered. As a result, Ethernet continues to be the absolute leader in the LAN environment, and it remains a strong oppo-nent in the high-performance computing market as well, competing against the SANs by delivering high bandwidth at low cost. The main drawback of Ethernet for high-end systems is its relatively high latency and lack of support in most interface cards to implement the necessary protocols. Because of failures of the past, LAN modernization efforts have been cen-tered on extending Ethernet to lower-cost media such as unshielded twisted pair (UTP), switched interconnects, and higher link speeds as well as to new domains such as wireless communication. Practically all new PC motherboards and laptops implement
|
{"source": 2299, "title": "from dpo"}
|
to prove them correct, proofs in these cases will always consist of two parts. > Proof of Theorem 2.2. To prove this theorem, let us first assume that s∗ is graphic. We then need to show that s is also graphic. Let G∗ be a sim-ple graph with degree sequence s∗. We now construct a simple graph G from G∗ with degree sequence s as follows (and in doing so, we show that s is graphic). Take G∗ and add a vertex u. For readability, let k = d1 and consider the k vertices v1, v2, . . . , vk from G∗ having respectively de-gree d∗ > 1 , d∗ > 2 , . . . , d∗ > k . We then join these vertices to the newly added vertex u. Obviously, u now has degree k, but also each vertex vi now has degree d∗ > i + 1. Because all other vertices of G∗ are not joined with u, their vertex degree is left unaffected. As a consequence, the newly constructed graph G has degree sequence [k, d∗ > 1 + 1, d∗ > 2 + 1, . . . , d∗ > k + 1, d∗ > k+1 , . . . , d∗ > n−1 ], which is precisely s.Let us now consider the opposite: if s is graphic, we need to show that s∗ is so as well. In other words, we need to find a graph G∗ that has degree sequence s∗. To this end, we consider three different sets of vertices from G. Let u be a vertex with degree k = d1. Let V = {v1, v2, . . . , vk} be the re-spective vertices with the k next highest degrees d2, d3, . . . , dk+1. Finally,
|
{"source": 4215, "title": "from dpo"}
|
length) gets larger. As the resources available to decrypt numbers increase, the size of the keys need to grow even faster. This is not a sustainable situation for mobile and low-powered devices that have limited computational power. The gap between factoring and multiplying is not sustainable in the long term. All this means is that RSA is not the ideal system for the future of cryptography. In an ideal Trapdoor Function, the easy way and the hard way get harder at the same rate with respect to the size of the numbers in question. We need a public key system based on a better Trapdoor. ### Elliptic curves: Building blocks of a better Trapdoor After the introduction of RSA and Diffie-Hellman, researchers explored other mathematics-based cryptographic solutions looking for other algorithms beyond factoring that would serve as good Trapdoor Functions. In 1985, cryptographic algorithms were proposed based on an esoteric branch of mathematics called elliptic curves. But what exactly is an elliptic curve and how does the underlying Trapdoor Function work? Unfortunately, unlike factoring — something we all had to do for the first time in middle school — most people aren't as familiar with the math around elliptic curves. The math isn't as simple, nor is explaining it, but I'm going to give it a go over the next few sections. (If your eyes start to glaze over, you can skip way down to the section: What does it all mean.) An elliptic curve is the set of points that satisfy a specific mathematical equation. The equation for an elliptic curve looks something like this: y 2 = x 3 + ax + b That graphs to something that looks a bit like the Lululemon logo tipped on its side: , argues that desert varnish, whose status as biological or nonbiological has been debated since the time of Darwin, should be investigated as a potential candidate for a shadow biosphere. Existence of a shadow biosphere could mean that life has independently evolved on Earth more than once, which means that microorganisms may exist on Earth which have no evolutionary connection with any other known form of life. It is suggested that if an alternate form of microbial life on Earth is discovered, the odds are good that life is also common elsewhere in the universe. == Criticism == Methods used by proponents and conclusions drawn from experiments that purport to show evidence of shadow biospheres have been criticized. For example, evidence that once seemed to support arsenic as a substitute for phosphorus in DNA could have resulted from lab or field contamination, and DNA that includes arsenic is chemically unstable. == See also == == References == == Further reading == == External links == A Shadow Biosphere Bacteria stir debate about 'shadow biosphere' Alternate "Life" Styles: Scientists Predict The Possibility Of A Shadow Biosphere
|
{"page_id": 4986999, "title": "Shadow biosphere"}
|
hydrogen. The trihalides are more stable, although they are chemically distinct from those of the lighter group 13 elements and are still the least stable in the whole group. For instance, thallium(III) fluoride, TlF3, has the β-BiF3 structure rather than that of the lighter group 13 trifluorides, and does not form the TlF−4 complex anion in aqueous solution. The trichloride and tribromide disproportionate just above room temperature to give the monohalides, and thallium triiodide contains the linear triiodide anion (I−3) and is actually a thallium(I) compound. Thallium(III) sesquichalcogenides do not exist. === Thallium(I) === The thallium(I) halides are stable. In keeping with the large size of the Tl+ cation, the chloride and bromide have the caesium chloride structure, while the fluoride and iodide have distorted sodium chloride structures. Like the analogous silver compounds, TlCl, TlBr, and TlI are photosensitive and display poor solubility in water. The stability of thallium(I) compounds demonstrates its differences from the rest of the group: a stable oxide, hydroxide, and carbonate are known, as are many chalcogenides. The double salt Tl4(OH)2CO3 has been shown to have hydroxyl-centred triangles of thallium, [Tl3(OH)]2+, as a recurring motif throughout its solid structure. The metalorganic compound thallium ethoxide (TlOEt, TlOC2H5) is a heavy liquid (ρ 3.49 g·cm−3, m.p. −3 °C), often used as a basic and soluble thallium source in organic and organometallic chemistry. === Organothallium compounds === Organothallium compounds tend to be thermally unstable, in concordance with the trend of decreasing thermal stability down group 13. The chemical reactivity of the Tl–C bond is also the lowest in the group, especially for ionic compounds of the type R2TlX. Thallium forms the stable [Tl(CH3)2]+ ion in aqueous solution; like the isoelectronic Hg(CH3)2 and [Pb(CH3)2]2+, it is linear. Trimethylthallium and triethylthallium are, like the corresponding gallium and indium compounds, flammable liquids
|
{"page_id": 30309, "title": "Thallium"}
|
a prescription. It functions well only in high-acid environments, such as that found in the human gut due to the addition of gastric juices from the stomach. Unfortunately, too much acid can denature it, so it should not be taken on an empty stomach. Also, the enzyme is ineffective if it does not reach the small intestine by the time the problematic food does. Lactose-sensitive individuals can experiment with both timing and dosage to fit their particular needs. While essentially the same process as normal intestinal lactose digestion, direct treatment of milk employs a different variety of industrially produced lactase. This enzyme, produced by yeast from the genus Kluyveromyces, takes much longer to act, must be thoroughly mixed throughout the product, and is destroyed by even mildly acidic environments. Its main use is in producing the lactose-free or lactose-reduced dairy products sold in supermarkets. === Rehabituation to dairy products === Regular consumption of dairy foods containing lactose can promote a colonic bacteria adaptation, enhancing a favorable microbiome, which allows people with primary lactase deficiency to diminish their intolerance and to consume more dairy foods. The way to induce tolerance is based on progressive exposure, consuming smaller amounts frequently, distributed throughout the day. Lactose intolerance can also be managed by ingesting live yogurt cultures containing lactobacilli that are able to digest the lactose in other dairy products. == Epidemiology == Worldwide, about 65% of people experience some form of lactose intolerance as they age past infancy, but there are significant differences between populations and regions. As few as 5% of northern Europeans are lactose intolerant, while as many as 90% of adults in parts of Asia are lactose intolerant. In northern European countries, early adoption of dairy farming conferred a selective evolutionary advantage to individuals that could tolerate lactose. This led
|
{"page_id": 56873, "title": "Lactose intolerance"}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.