id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_7936_chunk_3
North American Vexillological Association
NAVA honors achievement in the field with several honors and awards: Captain William Driver Award: presented to the individual who presents the best paper at the association's annual meeting; The Vexillonnaire Award: recognizing a flag scholar who becomes personally involved in a significant and successful act of cre...
wikipedia
wiki_38561_chunk_11
Comparison of programming paradigms
Pseudocode examples comparing various paradigms A pseudocode comparison of imperative, procedural, and object oriented approaches used to calculate the area of a circle (πr²), assuming no subroutine inlining, no macro preprocessors, register arithmetic, and weighting each instruction 'step' as only 1 instruction – as ...
wikipedia
wiki_23321_chunk_5
Medical statistics
Related statistical theory Survival analysis Proportional hazards models Active control trials: clinical trials in which a kind of new treatment is compared with some other active agent rather than a placebo. ADLS(Activities of daily living scale): a scale designed to measure physical ability/disability that is use...
wikipedia
wiki_13176_chunk_3
American Journal of Physics
Abstracting and indexing This journal is indexed in the following databases: Abstract Bulletin of the Institute of Paper Chemistry (PAPERCHEM in 1969) Applied Science & Technology Index (H.W. Wilson Company) Chemical Abstracts Computer & Control Abstracts Current Index to Journals in Education (CSA Illumina - ERIC data...
wikipedia
wiki_639_chunk_15
Supercomputer
As the price, performance and energy efficiency of general-purpose graphics processing units (GPGPUs) have improved, a number of petaFLOPS supercomputers such as Tianhe-I and Nebulae have started to rely on them. However, other systems such as the K computer continue to use conventional processors such as SPARC-based d...
wikipedia
wiki_19567_chunk_5
Herbert Power Stakes
2021 - Delphi 2020 - Chapada 2019 - The Chosen One 2018 - Yucatan 2017 - Lord Fandango 2016 - Assign 2015 - Amralah 2014 - Big Memory 2013 - Sea Moon 2012 - Shahwardi 2011 - Tanby 2010 - Linton 2009 - Alcopop 2008 - Dolphin Jo 2007 - Master O'Reilly 2006 - Growl 2005 - Leica Falcon 2004 - Rizon 2003 ...
wikipedia
wiki_22448_chunk_5
Difference-map algorithm
Example: logical satisfiability Incomplete algorithms, such as stochastic local search, are widely used for finding satisfying truth assignments to boolean formulas. As an example of solving an instance of 2-SAT with the difference-map algorithm, consider the following formula (~ indicates NOT): (q1 or q2) and (~q1 or...
wikipedia
wiki_16888_chunk_9
1954–55 United States network television schedule
ABCReturning SeriesThe Adventures of Ozzie and Harriet Bachelor Father The Big Picture Boxing from Eastern Parkway Break the Bank Cavalcade of America Compass Dollar a Second The Dotty Mack Show Enterprise Fight Talk Jamie John Daly and the News Kraft Television Theater Kukla, Fran and Ollie The Lone Ranger Make Room f...
wikipedia
wiki_1022_chunk_43
Abstraction (computer science)
See also Abstraction principle (computer programming) Abstraction inversion for an anti-pattern of one danger in abstraction Abstract data type for an abstract description of a set of data Algorithm for an abstract description of a computational procedure Bracket abstraction for making a term into a function of a ...
wikipedia
wiki_33700_chunk_0
Game theory in communication networks
Game theory has been used as a tool for modeling and studying interactions between cognitive radios envisioned to operate in future communications systems. Such terminals will have the capability to adapt to the context they operate in, through possibly power and rate control as well as channel selection. Software agen...
wikipedia
wiki_38029_chunk_5
La Suerte Biological Field School
The conservancy runs a primate field school at La Suerte which has such courses as "Primate Behavior and Ecology", "Advanced Primate Behavior and Ecology", and "Primate Conservation". The courses center on the two native primate species of the area: white-faced capuchin monkeys (Cebus capucinus) and Mantled Black Howl...
wikipedia
wiki_20963_chunk_6
Imperative logic
Mixed inferences The following is an example of a pure imperative inference: P1. Do both of the following: wash the dishes and clean your room! C1. Therefore, clean your room! In this case, all the sentences making up the argument are imperatives. Not all imperative inferences are of this kind. Consider again: P1. Take...
wikipedia
wiki_36396_chunk_3
The Redstone Acceleration & Innovation Network
References Altevogt, Bruce, Sarah Hanson and Lori Nadig. Venture Philanthropy Strategies to Support Translational Research. Institute of Medicine of the National Academies. 2009 February 25. Rimer, Skip. “Sumner M. Redstone Charitable Foundation Awards $35 Million Grant to FasterCures/The Center for Accelerating Medica...
wikipedia
wiki_25973_chunk_4
Radiobiology
Quantitative data on the effects of ionizing radiation on human health is relatively limited compared to other medical conditions because of the low number of cases to date, and because of the stochastic nature of some of the effects. Stochastic effects can only be measured through large epidemiological studies where e...
wikipedia
wiki_8125_chunk_6
Alkane stereochemistry
The textbook explanation for the existence of the energy maximum for an eclipsed conformation in ethane is steric hindrance, but, with a C-C bond length of 154 pm and a Van der Waals radius for hydrogen of 120 pm, the hydrogen atoms in ethane are never in each other's way. The question of whether steric hindrance is re...
wikipedia
wiki_1970_chunk_17
Bellman–Ford algorithm
described another improvement to the Bellman–Ford algorithm. His improvement first assigns some arbitrary linear order on all vertices and then partitions the set of all edges into two subsets. The first subset, Ef, contains all edges (vi, vj) such that i < j; the second, Eb, contains edges (vi, vj) such that i > j. Ea...
wikipedia
wiki_38348_chunk_1
Simons Center for Geometry and Physics
Background James H. Simons was the chair of the mathematics department at Stony Brook from 1968 to 1976. After deciding to leave academia, he then went on to make billions with his investment firm Renaissance Technologies. On February 27, 2008 he announced a donation totaling $60 million (including a $25 million gift ...
wikipedia
wiki_32526_chunk_1
Journal of Computer-Mediated Communication
Editors The following persons have been editor-in-chief of the journal: 2018–present Richard Ling (Nanyang Technological University) 2014–2017: Shyam Sundar (Pennsylvania State University) 2011–2013: Maria Bakardjieva (University of Calgary) 2008–2010: Kevin Wright (University of Oklahoma) 2005–2007: Susan Herrin...
wikipedia
wiki_25274_chunk_3
Flow computer
Algorithms one can expect to see implemented in a typical gas flow computer are AGA Report No. 3, AGA Report No. 7, AGA Report No. 8 in the U.S. market. Internationally, ISO 5167-1:2003 and other ISO gas standard equivalents are in widespread use. Additional to natural gas, some flow computers offer an array of densi...
wikipedia
wiki_23321_chunk_3
Medical statistics
Basic concepts For describing situations Incidence (epidemiology) vs. Prevalence vs. Cumulative incidence Many medical tests (such as pregnancy tests) have two possible results: positive or negative. However, tests will sometimes yield incorrect results in the form of false positives or false negatives. False positive...
wikipedia
wiki_16851_chunk_9
1955–56 United States network television schedule
Tuesday {| class="wikitable" style="width:100%;margin-right:0;text-align:center" |- ! colspan="2" style="background-color:#C0C0C0;text-align:center"| Network ! style="background-color:#C0C0C0;text-align:center"| 7:00 PM ! style="background-color:#C0C0C0;text-align:center"| 7:30 PM ! style="background-color:#C0C0C0;tex...
wikipedia
wiki_12925_chunk_2
EDA database
Mature design databases Many instances of mature design databases exist in the EDA industry, both as a basis for commercial EDA tools as well as proprietary EDA tools developed by the CAD groups of major electronics companies. IBM, Hewlett-Packard, SDA Systems and ECAD (now Cadence Design Systems), High Level Design Sy...
wikipedia
wiki_3511_chunk_5
Reflexive operator algebra
In the case of a reflexive algebra of matrices with nonzero entries specified by a given pattern, the problem of finding the distance constant can be rephrased as a matrix-filling problem: if we fill the entries in the complement of the pattern with arbitrary entries, what choice of entries in the pattern gives the sma...
wikipedia
wiki_7809_chunk_2
Array of Low Energy X-ray Imaging Sensors
There were six EUV telescopes which were arranged in three co-aligned pairs which cover three overlapping 33° fields-of-view. At each rotation of the satellite, ALEXIS monitored the entire anti-solar hemisphere. Each telescope consisted of a spherical mirror with a Mo-Si layered synthetic microstructure (LSM) or Multil...
wikipedia
wiki_7395_chunk_56
History of chemistry
A Swedish chemist and disciple of Dalton, Jöns Jacob Berzelius embarked on a systematic program to try to make accurate and precise quantitative measurements and to ensure the purity of chemicals. Along with Lavoisier, Boyle, and Dalton, Berzelius is known as the father of modern chemistry. In 1828 he compiled a table ...
wikipedia
wiki_31884_chunk_16
Polyhedral combinatorics
However, the Birkhoff polytope is unusual in that a complete description of its facets is available. For many other 0-1 polytopes, there are exponentially many or superexponentially many facets, and only partial descriptions of their facets are available. See also Abstract polytope Combinatorial commutative algebra ...
wikipedia
wiki_29515_chunk_16
Edward Wright (mathematician)
While the first edition of Certaine Errors contained an abridged table six pages in length, in the second edition which appeared in 1610 Wright published a full table across 23 pages with figures for parallels at one-minute intervals. The table is remarkably accurate – American geography professor Mark Monmonier wrote ...
wikipedia
wiki_4287_chunk_13
Max Planck Institute for Extraterrestrial Physics
Many experiments of the Max-Planck-Institut für extraterrestrische Physik (MPE) have to be carried out above the dense Earth's atmosphere using aircraft, rockets, satellites and space probes. In the early days experiments were also flown on balloons. To run advanced extraterrestrial physics and state-of-the-art experim...
wikipedia
wiki_6686_chunk_2
Computational science
Computational science is now commonly considered a third mode of science , complementing and adding to experimentation/observation and theory (see image on the right). Here, one defines a system as a potential source of data, an experiment as a process of extracting data from a system by exerting it through its inputs ...
wikipedia
wiki_10215_chunk_0
European Network for Training and Research in Electrical Engineering
Exchange programs for Electrical Engineering students between 18 universities in Europe. It is also known as Entree. Their members are: Chalmers Lindholmen University College (Sweden) University of Aalborg (Denmark) Heriot-Watt University (United Kingdom) Brunel University (United Kingdom) Delft University of T...
wikipedia
wiki_7091_chunk_5
Feature (machine learning)
Higher-level features can be obtained from already available features and added to the feature vector; for example, for the study of diseases the feature 'Age' is useful and is defined as Age = 'Year of death' minus 'Year of birth' . This process is referred to as feature construction. Feature construction is the appli...
wikipedia
wiki_14184_chunk_10
Ottawa-Carleton Educational Space Simulation
Complete details regarding the EEP are available on the OCESS Website. Planetarium Program The Planetarium Program involves transporting the OCESS's inflatable planetarium to elementary or high schools across the Ottawa region and delivering a presentation involving constellations, luminosity, temperature of stars, and...
wikipedia
wiki_33072_chunk_12
Pleiades (supercomputer)
Gallery In popular culture In the 2015 film The Martian, astrodynamicist Rich Purnell uses the Pleiades supercomputer to verify calculations for a gravity assist maneuver for a spacecraft, in order to rescue an astronaut stranded on Mars. Unlike what is shown in the movie, one need not be physically present inside the...
wikipedia
wiki_3058_chunk_13
Civil-military co-operation
Summary "This CECIL-tool is ideal for the CIMIC branches to manage their information which assists to stabilize the mission area. Information sharing through one database is essential for civilian and military partners." CECIL is designed to focus on the most important issues. The Afghan Country Stability Picture gives...
wikipedia
wiki_372_chunk_3
Microcode
Overview The lowest layer in a computer's software stack is traditionally raw machine code instructions for the processor. In microcoded processors, the microcode fetches and executes those instructions. To avoid confusion, each microprogram-related element is differentiated by the micro prefix: microinstruction, micro...
wikipedia
wiki_14275_chunk_4
Business simulation game
Real-world applications Because business simulations simulate real-world systems, they are often used in management, marketing, economics and hospitality education. Some benefits of business simulations are that they permit students to experience and test themselves in situations before encountering them in real life,...
wikipedia
wiki_21524_chunk_6
Little man computer
The table below shows a typical numeric instruction set and the equivalent mnemonic codes. Examples Using Numeric Instruction Codes This program (instruction 901 to instruction 000) is written just using numeric codes. The program takes two numbers as input and outputs the difference. Notice that execution starts at...
wikipedia
wiki_25966_chunk_1
Michael Meeks (software developer)
Meeks is a free software hacker who has contributed a lot of time to decreasing program load time. He created the direct binding, hashvals, and dynsort implementations for GNU Binutils and glibc. Most of this work was focused at making OpenOffice.org and now its fork LibreOffice start faster, and was later subsumed int...
wikipedia
wiki_4695_chunk_1
Buchberger's algorithm
Input A set of polynomials F that generates I Output A Gröbner basis G for I G := F For every fi, fj in G, denote by gi the leading term of fi with respect to the given ordering, and by aij the least common multiple of gi and gj. Choose two polynomials in G and let Sij = (aij / gi) fi − (aij / gj) fj (Note that the ...
wikipedia
wiki_7997_chunk_37
Advanced Idea Mechanics
Ultimate Marvel In the Ultimate Marvel reality, A.I.M. commissioned Mad Thinker to steal Cerebro from the X-Men and frame the Fantastic Four, as seen in the Ultimate X4 mini-series. Ultimate A.I.M.'s full purpose and function has yet to be revealed. The miniseries Ultimate Vision introduces A.I.M. as composed of severa...
wikipedia
wiki_6927_chunk_4
Computational topology
SnapPea implements an algorithm to convert a planar knot or link diagram into a cusped triangulation. This algorithm has a roughly linear run-time in the number of crossings in the diagram, and low memory profile. The algorithm is similar to the Wirthinger algorithm for constructing presentations of the fundamental g...
wikipedia
wiki_4937_chunk_5
Network theory
Since the 1970s, the empirical study of networks has played a central role in social science, and many of the mathematical and statistical tools used for studying networks have been first developed in sociology. Amongst many other applications, social network analysis has been used to understand the diffusion of innov...
wikipedia
wiki_36759_chunk_0
Leiden Open Variation Database
The Leiden Open Variation Database (LOVD) is a free, flexible web-based open source database developed in the Leiden University Medical Center in the Netherlands, designed to collect and display variants in the DNA sequence. The focus of an LOVD is usually the combination between a gene and a genetic (heritable) diseas...
wikipedia
wiki_33706_chunk_4
Domain-specific multimodeling
Enterprise systems based on multiple domain-specific languages are abundant. Languages with a metamodel defined in the Extensible Markup Language (XML) enjoy particularly widespread adoption. To illustrate development with multiple languages, we will draw an example from a case study: The Apache Open For Business (OFBi...
wikipedia
wiki_25185_chunk_5
Market engineering
Evaluation Having designed the market, it is tested upon its technical and economic properties. The evaluation stage comprises functionality tests of a software prototype to ensure its correctness, economic tests to measure the outcome performance of the market, and an assessment of the business model. Functionality t...
wikipedia
wiki_5951_chunk_1
Irreducibility (mathematics)
A polynomial over a field may be an irreducible polynomial if it cannot be factored over that field. In abstract algebra, irreducible can be an abbreviation for irreducible element of an integral domain; for example an irreducible polynomial. In representation theory, an irreducible representation is a nontrivial re...
wikipedia
wiki_549_chunk_10
Search algorithm
Another important sub-class consists of algorithms for exploring the game tree of multiple-player games, such as chess or backgammon, whose nodes consist of all possible game situations that could result from the current situation. The goal in these problems is to find the move that provides the best chance of a win, ...
wikipedia
wiki_7184_chunk_0
Ihara zeta function
In mathematics, the Ihara zeta function is a zeta function associated with a finite graph. It closely resembles the Selberg zeta function, and is used to relate closed walks to the spectrum of the adjacency matrix. The Ihara zeta function was first defined by Yasutaka Ihara in the 1960s in the context of discrete subgr...
wikipedia
wiki_2296_chunk_1
Resonance (chemistry)
Overview Under the framework of valence bond theory, resonance is an extension of the idea that the bonding in a chemical species can be described by a Lewis structure. For many chemical species, a single Lewis structure, consisting of atoms obeying the octet rule, possibly bearing formal charges, and connected by bo...
wikipedia
wiki_1166_chunk_11
Maple (software)
Examples of Maple code The following code, which computes the factorial of a nonnegative integer, is an example of an imperative programming construct within Maple: myfac := proc(n::nonnegint) local out, i; out := 1; for i from 2 to n do out := out * i end do; out end proc; Simple functions can al...
wikipedia
wiki_29312_chunk_45
Network science
Since the 1970s, the empirical study of networks has played a central role in social science, and many of the mathematical and statistical tools used for studying networks have been first developed in sociology. Amongst many other applications, social network analysis has been used to understand the diffusion of innov...
wikipedia
wiki_5854_chunk_3
British Aerospace EAP
Background The origins of the EAP can be found within the Agile Combat Aircraft (ACA) programme performed by British Aerospace (BAe) during the late 1970s and early 1980s. It is known that ACA had involved the combining of several years of private venture research conducted by BAe, costed at around £25 million, togethe...
wikipedia
wiki_12129_chunk_16
Chennai Mathematical Institute
Till 2006, students received their B.Sc. and M.Sc. degrees from MPBOU and their Ph.D. degrees from Madras University. CMI conducts its academic programmes in conjunction with IMSc, so students from either institute can take courses at the other. CMI has agreements with TIFR (Tata Institute of Fundamental Research) an...
wikipedia
wiki_1964_chunk_11
James Gregory (mathematician)
Mathematics The following excerpt is from the Pantologia. A new (cabinet) cyclopædia (1813) Mr. James Gregory was a man of a very acute and penetrating genius. ...The most brilliant part of his character was that of his mathematical genius as an inventor, which was of the first order; as will appear by... his invention...
wikipedia
wiki_21428_chunk_4
Energy Biosciences Institute
Using a former industrial fermentation process, EBI scientists have developed a way to extract the acetone, butanol, and ethanol from a fermentation mixture and reformulate the products using chemical catalysts to produce diesel-like fuels. Designing modified yeast strains that could simultaneously use 5-carbon and 6-...
wikipedia
wiki_6637_chunk_65
FOCAL (programming language)
External links FOCAL source code, FOCAL source for several programs, including Lunar Lander, Sumer Game, and others DEC's FOCAL 1969 Promotional Booklet The Computer History Simulation Project (Focal is available as a free download here) ftp://www.cozx.com/pub/langs/focal.tar.gz C-source version that runs under several...
wikipedia
wiki_5511_chunk_1
Topological sorting
Examples The canonical application of topological sorting is in scheduling a sequence of jobs or tasks based on their dependencies. The jobs are represented by vertices, and there is an edge from x to y if job x must be completed before job y can be started (for example, when washing clothes, the washing machine must ...
wikipedia
wiki_26493_chunk_162
Comparison of programming languages (associative array)
irb(main):007:0> ### iterate over keys and values irb(main):008:0* phonebook.each {|key, value| puts key + " => " + value} Sally Smart => 555-9999 John Doe => 555-1212 J. Random Hacker => 553-1337 => {"Sally Smart"=>"555-9999", "John Doe"=>"555-1212", "J. Random Hacker"=>"553-1337"} irb(main):009:0> ### iterate keys on...
wikipedia
wiki_16650_chunk_2
Programming the Universe
In the space of 221 dense, frequently thrilling and occasionally exasperating pages, … tackles computer logic, thermodynamics, chaos theory, complexity, quantum mechanics, cosmology, consciousness, sex and the origin of life — throwing in, for good measure, a heartbreaking afterword that repaints the significance of a...
wikipedia
wiki_6604_chunk_5
Crime Writers of Canada Awards of Excellence
Best Juvenile or Young Adult Crime Book 1994 - John Dowd, Abalone Summer 1995 - James Heneghan, Torn Away 1996 - Norah McClintock, Mistaken Identity 1997 - Linda Bailey, How Can a Frozen Detective Stay Hot on the Trail? 1998 - Norah McClintock, The Body in the Basement 1999 - Norah McClintock, Sins of the Father 2000 -...
wikipedia
wiki_24026_chunk_5
Multiservice tactical brevity code
D Dakota No air to ground (ATG) ordnance remaining. Dash (#) Aircraft position within a flight. Use if specific call sign is unknown. Data Standby for improved data modem (IDM) data message concerning (object) at stated location. Datum Last known position of a submarine contact after contact was lost. Deadeye Informat...
wikipedia
wiki_12037_chunk_18
Linear network coding
There are new methods emerging to use Network Coding in multiaccess systems to develop Software Defined Wire Area Networks (SD-WANs) that can offer lower delay, jitter and high robustness. The proposal mentions that the method is agnostic to underlying technologies like LTE, Ethernet, 5G. Maturity & Issues Since this ...
wikipedia
wiki_13442_chunk_3
Karmarkar's algorithm
Since the actual algorithm is rather complicated, researchers looked for a more intuitive version of it, and in 1985 developed affine scaling, a version of Karmarkar's algorithm that uses affine transformations where Karmarkar used projective ones, only to realize four years later that they had rediscovered an algorith...
wikipedia
wiki_793_chunk_43
Linear programming
Simplex pivot methods preserve primal (or dual) feasibility. On the other hand, criss-cross pivot methods do not preserve (primal or dual) feasibilitythey may visit primal feasible, dual feasible or primal-and-dual infeasible bases in any order. Pivot methods of this type have been studied since the 1970s. Essential...
wikipedia
wiki_890_chunk_54
Gray code
We can formalize the concept of monotone Gray codes as follows: consider the partition of the hypercube into levels of vertices that have equal weight, i.e. for . These levels satisfy . Let be the subgraph of induced by , and let be the edges in . A monotonic Gray code is then a Hamiltonian path in such that whene...
wikipedia
wiki_50_chunk_33
Binary-coded decimal
In more recent computers such capabilities are almost always implemented in software rather than the CPU's instruction set, but BCD numeric data are still extremely common in commercial and financial applications. There are tricks for implementing packed BCD and zoned decimal add–or–subtract operations using short but ...
wikipedia
wiki_2443_chunk_120
Quantitative genetics
To visualize the pattern in full cousin equations, start the series with the full sib equation re-written in iteration form: ft = (1/4)[2 f(t-1) + f(t-2) + 1 ]. Notice that this is the "essential plan" of the last term in each of the cousin iterative forms: with the small difference that the generation indices increme...
wikipedia
wiki_3472_chunk_76
List of important publications in computer science
See also DBLP (Digital Bibliography & Library Project in computer science) List of open problems in computer science List of computer science journals List of computer science conferences The Collection of Computer Science Bibliographies Paris Kanellakis Award, a prize given to honor specific theoretical accompli...
wikipedia
wiki_3661_chunk_1
Homological conjectures in commutative algebra
The Zero Divisor Theorem. If has finite projective dimension and is not a zero divisor on , then is not a zero divisor on . Bass's Question. If has a finite injective resolution then is a Cohen–Macaulay ring. The Intersection Theorem. If has finite length, then the Krull dimension of N (i.e., the dimension of R...
wikipedia
wiki_7838_chunk_20
GE Evolution Series
Cemex: One ES44AC unit, numbered 81, built in March 2008 as an add-on to a CSXT order. CSX Transportation: 550 ES44AH units, numbered 700–999 and 3000–3249. 847 and 963 have been wrecked and retired, 3112 renumbered to 1776. Three units have special names and paint schemes: 911 Spirit of Our First Responders, 3112 ...
wikipedia
wiki_331_chunk_70
Lambda calculus
In 2014 it was shown that the number of β-reduction steps taken by normal order reduction to reduce a term is a reasonable time cost model, that is, the reduction can be simulated on a Turing machine in time polynomially proportional to the number of steps. This was a long-standing open problem, due to size explosion, ...
wikipedia
wiki_10754_chunk_2
International Design Excellence Awards
Innovation: (design, experience, manufacturing) Benefit to User: (performance, comfort, safety, ease of use, usability, user interface, ergonomics, universal function and access, quality of life, affordability) Responsibility: Benefit to society, environment, culture and economy (improved accessibility to a greater per...
wikipedia
wiki_13675_chunk_12
Word problem (mathematics)
The word problem for free lattices has some interesting aspects. Consider the case of bounded lattices, i.e. algebraic structures with the two binary operations ∨ and ∧ and the two constants (nullary operations) 0 and 1. The set of all well-formed expressions that can be formulated using these operations on elements fr...
wikipedia
wiki_11143_chunk_1
Computational epidemiology
Introduction In contrast with traditional epidemiology, computational epidemiology looks for patterns in unstructured sources of data, such as social media. It can be thought of as the hypothesis-generating antecedent to hypothesis-testing methods such as national surveys and randomized controlled trials. A mathematica...
wikipedia
wiki_5691_chunk_4
Modular programming
Language support Languages that formally support the module concept include Ada, Algol, BlitzMax, C++, C#, Clojure, COBOL, Common_Lisp, D, Dart, eC, Erlang, Elixir, Elm, F, F#, Fortran, Go, Haskell, IBM/360 Assembler, Control Language (CL), IBM RPG, Java, MATLAB, ML, Modula, Modula-2, Modula-3, Morpho, NEWP, Oberon, Ob...
wikipedia
wiki_12260_chunk_10
Microelectronics and Computer Technology Corporation
Evolutionary Technologies International, a company focused on developing database tools and data warehousing, was spun off from MCC in 1990. See also Cyc Sematech, a semiconductor-industry focused consortium, previously in Austin; moved to Albany, NY in 2010 Notes Microelectronics and Computer Technology Corporatio...
wikipedia
wiki_21485_chunk_1
Dynamic problem (algorithms)
Problems of this class have the following measures of complexity: Space the amount of memory space required to store the data structure; Initialization time time required for the initial construction of the data structure; Insertion time time required for the update of the data structure when one more input element ...
wikipedia
wiki_25907_chunk_10
Balochistan University of Information Technology, Engineering & Management Sciences
Research and reputation The institute's research activities are governed by the Office of Research, Innovation, and Commercialization (ORIC) led by Dr. Anayatullah Baloch. It is responsible for promoting and enhancing quality research activities and publications. The office assists in Board of studies and conducts Adva...
wikipedia
wiki_5093_chunk_23
List of important publications in chemistry
Statistics for Experimenters: An Introduction to Design, Data Analysis, and Model Building George E.P. Box, J. Stuart Hunter & William G. Hunter John Wiley and Sons, Inc., 1st Edition 1978, 2nd Edition 2005 () Importance: Although almost devoid of classical chemistry, this is the definitive text for any experimentali...
wikipedia
wiki_12501_chunk_6
Asymptotically optimal algorithm
An example of an asymptotically optimal algorithm not used in practice is Bernard Chazelle's linear-time algorithm for triangulation of a simple polygon. Another is the resizable array data structure published in "Resizable Arrays in Optimal Time and Space", which can index in constant time but on many machines carries...
wikipedia
wiki_15969_chunk_0
List of MeSH codes (V02)
The following is a partial list of the "V" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (V01). Codes following these are found at List of MeSH codes (V03). For other MeSH codes, see List of MeSH c...
wikipedia
wiki_3840_chunk_1
Lists of mathematics topics
The purpose of this list is not similar to that of the Mathematics Subject Classification formulated by the American Mathematical Society. Many mathematics journals ask authors of research papers and expository articles to list subject codes from the Mathematics Subject Classification in their papers. The subject codes...
wikipedia
wiki_19886_chunk_1
Mathematical Institute, University of Oxford
Overview The Oxford Mathematical Institute includes both pure and applied mathematics (Statistics is a separate department) and is one of the largest and most respected mathematics departments in the UK with about 100 faculty members, and was ranked as the top mathematics department in the UK in the 2014 UK Research Ev...
wikipedia
wiki_9459_chunk_10
Reed–Muller code
A generator matrix for a Reed–Muller code of length can be constructed as follows. Let us write the set of all m-dimensional binary vectors as: We define in N-dimensional space the indicator vectors on subsets by: together with, also in , the binary operation referred to as the wedge product (not to be confused wit...
wikipedia
wiki_7172_chunk_26
Semisimple Lie algebra
For applications, one is often interested in a finite-dimensional simple -module (a finite-dimensional irreducible representation). This is especially the case when is the Lie algebra of a Lie group (or complexification of such), since, via the Lie correspondence, a Lie algebra representation can be integrated to a Li...
wikipedia
wiki_5878_chunk_28
Computational sociology
Academic programs, departments and degrees University of Bristol "Mediapatterns" project Carnegie Mellon University, PhD program in Computation, Organizations and Society (COS) University of Chicago Certificate, MA and PhD in Computational Social Sciences George Mason University PhD program in CSS (Computational ...
wikipedia
wiki_163_chunk_27
Data Encryption Standard
The next confirmed DES cracker was the COPACOBANA machine built in 2006 by teams of the Universities of Bochum and Kiel, both in Germany. Unlike the EFF machine, COPACOBANA consists of commercially available, reconfigurable integrated circuits. 120 of these field-programmable gate arrays (FPGAs) of type XILINX Spartan-...
wikipedia
wiki_10065_chunk_4
Complementary code keying
Mathematical description The CCK modulation used by 802.11b transmits data in symbols of eight chips, where each chip is a complex QPSK bit-pair at a chip rate of 11Mchip/s. In 5.5 Mbit/s and 11 Mbit/s modes respectively 4 and 8 bits are modulated onto the eight chips of the symbol c0,...,c7, where and are determined ...
wikipedia
wiki_15586_chunk_11
Smithy code
External links The complete text of the judgment was formerly available at http://www.hmcourts-service.gov.uk/images/judgment-files/baigent_v_rhg_0406.pdf. The archived copy of this text from 5 December 2006 can be found here , text of the judgment without the italics that mark out the cyphertext. Famous Unsolved Co...
wikipedia
wiki_16506_chunk_4
Nuclear astrophysics
During cosmic times, nuclear reactions re-arrange the nucleons that were left behind from the big bang (in the form of isotopes of hydrogen and helium, and traces of lithium, beryllium, and boron) to other isotopes and elements as we find them today (see graph). The driver is a conversion of nuclear binding energy to e...
wikipedia
wiki_793_chunk_8
Linear programming
Uses Linear programming is a widely used field of optimization for several reasons. Many practical problems in operations research can be expressed as linear programming problems. Certain special cases of linear programming, such as network flow problems and multicommodity flow problems are considered important enough...
wikipedia
wiki_36323_chunk_21
United States Geological Survey
While much less expensive to compile and produce, the revised digital U.S. topo maps have been criticized for a lack of accuracy and detail in comparison to older generation maps based on aerial photo surveys and field checks. As the digital databases were not designed for producing general-purpose maps, data integrati...
wikipedia
wiki_7690_chunk_22
DeCODE genetics
To understand the population that it is working in and to address broader questions few can in the same way, deCODE has also from its early days had its own genetic anthropology group. It has published pioneering work on mitochondrial and Y-chromosome mutation to trace the Norwegian and Celtic mix in the early populati...
wikipedia
wiki_23637_chunk_4
Government database
France Carnet B: Created in 1886, the Carnet B was, initially, a list of foreigners suspected of espionage. Prior to World War I, the list was gradually expanded to include all persons likely to disturb public order and antimilitarists who might oppose national mobilization. Those listed were to be arrested in the eve...
wikipedia
wiki_11990_chunk_8
Anonymous recursion
This is illustrated below using Python. First, a standard named recursion: def fact(n): if n == 0: return 1 return n * fact(n - 1) Using a higher-order function so the top-level function recurses anonymously on an argument, but still needing the standard recursive function as an argument: def fact0(n0):...
wikipedia
wiki_8587_chunk_3
Comprehensive School Mathematics Program
Overview The CSMP project employs four non-verbal languages for the purpose of posing problems and representing mathematical concepts: the Papy Minicomputer (mental computation), Arrows (relations), Strings (classification), and Calculators (patterns). It was designed to teach mathematics as a problem-solving activity...
wikipedia
wiki_30776_chunk_2
Nanomorphic cell
The nanomorphic cell model was applied to analyze the capabilities of an autonomous integrated microsystem on the order of the size of a living cell, i.e. a cube of 10 micrometer on a side [1, 2]. The function of this microsystem is, for example, upon injection into the body, to interact with living cells, e.g. determi...
wikipedia
wiki_1527_chunk_26
Generating function
Tools for processing and working with P-recursive sequences in Mathematica include the software packages provided for non-commercial use on the RISC Combinatorics Group algorithmic combinatorics software site. Despite being mostly closed-source, particularly powerful tools in this software suite are provided by the Gue...
wikipedia
wiki_32969_chunk_17
Energy policy of Morocco
The biggest CSP project in Morocco is Noor Solar, situated in the city of Ouarzazate, on the edge of the Sahara desert. The project comprises 3 phases: Noor I, Noor II and Noor III. This Noor project is supported by a BOOT (build, own, operate and transfer) basis of ACWA Power Ouarzazate, MASEN, Aries, and TSK. The fir...
wikipedia
wiki_20870_chunk_4
One-pass algorithm
Given a list of numbers: Find the median. Find the modes (This is not the same as finding the most frequent symbol from a limited alphabet). Sort the list. Count the number of items greater than or less than the mean. However, this can be done in constant memory with two passes: Pass 1 finds the average and pass 2...
wikipedia