id stringlengths 14 20 | title stringlengths 4 131 | text stringlengths 52 43k | source stringclasses 1
value |
|---|---|---|---|
wiki_7936_chunk_3 | North American Vexillological Association | NAVA honors achievement in the field with several honors and awards:
Captain William Driver Award: presented to the individual who presents the best paper at the association's annual meeting;
The Vexillonnaire Award: recognizing a flag scholar who becomes personally involved in a significant and successful act of cre... | wikipedia |
wiki_38561_chunk_11 | Comparison of programming paradigms | Pseudocode examples comparing various paradigms
A pseudocode comparison of imperative, procedural, and object oriented approaches used to calculate the area of a circle (πr²), assuming no subroutine inlining, no macro preprocessors, register arithmetic, and weighting each instruction 'step' as only 1 instruction – as ... | wikipedia |
wiki_23321_chunk_5 | Medical statistics | Related statistical theory
Survival analysis
Proportional hazards models
Active control trials: clinical trials in which a kind of new treatment is compared with some other active agent rather than a placebo.
ADLS(Activities of daily living scale): a scale designed to measure physical ability/disability that is use... | wikipedia |
wiki_13176_chunk_3 | American Journal of Physics | Abstracting and indexing
This journal is indexed in the following databases:
Abstract Bulletin of the Institute of Paper Chemistry (PAPERCHEM in 1969)
Applied Science & Technology Index (H.W. Wilson Company)
Chemical Abstracts
Computer & Control Abstracts
Current Index to Journals in Education (CSA Illumina - ERIC data... | wikipedia |
wiki_639_chunk_15 | Supercomputer | As the price, performance and energy efficiency of general-purpose graphics processing units (GPGPUs) have improved, a number of petaFLOPS supercomputers such as Tianhe-I and Nebulae have started to rely on them. However, other systems such as the K computer continue to use conventional processors such as SPARC-based d... | wikipedia |
wiki_19567_chunk_5 | Herbert Power Stakes | 2021 - Delphi
2020 - Chapada
2019 - The Chosen One
2018 - Yucatan
2017 - Lord Fandango
2016 - Assign
2015 - Amralah
2014 - Big Memory
2013 - Sea Moon
2012 - Shahwardi
2011 - Tanby
2010 - Linton
2009 - Alcopop
2008 - Dolphin Jo
2007 - Master O'Reilly
2006 - Growl
2005 - Leica Falcon
2004 - Rizon
2003 ... | wikipedia |
wiki_22448_chunk_5 | Difference-map algorithm | Example: logical satisfiability
Incomplete algorithms, such as stochastic local search, are widely used for finding satisfying truth assignments to boolean formulas. As an example of solving an instance of 2-SAT with the difference-map algorithm, consider the following formula (~ indicates NOT):
(q1 or q2) and (~q1 or... | wikipedia |
wiki_16888_chunk_9 | 1954–55 United States network television schedule | ABCReturning SeriesThe Adventures of Ozzie and Harriet
Bachelor Father
The Big Picture
Boxing from Eastern Parkway
Break the Bank
Cavalcade of America
Compass
Dollar a Second
The Dotty Mack Show
Enterprise
Fight Talk
Jamie
John Daly and the News
Kraft Television Theater
Kukla, Fran and Ollie
The Lone Ranger
Make Room f... | wikipedia |
wiki_1022_chunk_43 | Abstraction (computer science) | See also
Abstraction principle (computer programming)
Abstraction inversion for an anti-pattern of one danger in abstraction
Abstract data type for an abstract description of a set of data
Algorithm for an abstract description of a computational procedure
Bracket abstraction for making a term into a function of a ... | wikipedia |
wiki_33700_chunk_0 | Game theory in communication networks | Game theory has been used as a tool for modeling and studying interactions between cognitive radios envisioned to operate in future communications systems. Such terminals will have the capability to adapt to the context they operate in, through possibly power and rate control as well as channel selection. Software agen... | wikipedia |
wiki_38029_chunk_5 | La Suerte Biological Field School | The conservancy runs a primate field school at La Suerte which has such courses as "Primate Behavior and Ecology", "Advanced Primate Behavior and Ecology", and "Primate Conservation". The courses center on the two native primate species of the area: white-faced capuchin monkeys (Cebus capucinus) and Mantled Black Howl... | wikipedia |
wiki_20963_chunk_6 | Imperative logic | Mixed inferences The following is an example of a pure imperative inference: P1. Do both of the following: wash the dishes and clean your room!
C1. Therefore, clean your room! In this case, all the sentences making up the argument are imperatives. Not all imperative inferences are of this kind. Consider again: P1. Take... | wikipedia |
wiki_36396_chunk_3 | The Redstone Acceleration & Innovation Network | References
Altevogt, Bruce, Sarah Hanson and Lori Nadig. Venture Philanthropy Strategies to Support Translational Research. Institute of Medicine of the National Academies. 2009 February 25.
Rimer, Skip. “Sumner M. Redstone Charitable Foundation Awards $35 Million Grant to FasterCures/The Center for Accelerating Medica... | wikipedia |
wiki_25973_chunk_4 | Radiobiology | Quantitative data on the effects of ionizing radiation on human health is relatively limited compared to other medical conditions because of the low number of cases to date, and because of the stochastic nature of some of the effects. Stochastic effects can only be measured through large epidemiological studies where e... | wikipedia |
wiki_8125_chunk_6 | Alkane stereochemistry | The textbook explanation for the existence of the energy maximum for an eclipsed conformation in ethane is steric hindrance, but, with a C-C bond length of 154 pm and a Van der Waals radius for hydrogen of 120 pm, the hydrogen atoms in ethane are never in each other's way. The question of whether steric hindrance is re... | wikipedia |
wiki_1970_chunk_17 | Bellman–Ford algorithm | described another improvement to the Bellman–Ford algorithm. His improvement first assigns some arbitrary linear order on all vertices and then partitions the set of all edges into two subsets. The first subset, Ef, contains all edges (vi, vj) such that i < j; the second, Eb, contains edges (vi, vj) such that i > j. Ea... | wikipedia |
wiki_38348_chunk_1 | Simons Center for Geometry and Physics | Background
James H. Simons was the chair of the mathematics department at Stony Brook from 1968 to 1976. After deciding to leave academia, he then went on to make billions with his investment firm Renaissance Technologies. On February 27, 2008 he announced a donation totaling $60 million (including a $25 million gift ... | wikipedia |
wiki_32526_chunk_1 | Journal of Computer-Mediated Communication | Editors
The following persons have been editor-in-chief of the journal:
2018–present Richard Ling (Nanyang Technological University)
2014–2017: Shyam Sundar (Pennsylvania State University)
2011–2013: Maria Bakardjieva (University of Calgary)
2008–2010: Kevin Wright (University of Oklahoma)
2005–2007: Susan Herrin... | wikipedia |
wiki_25274_chunk_3 | Flow computer | Algorithms one can expect to see implemented in a typical gas flow computer are AGA Report No. 3, AGA Report No. 7, AGA Report No. 8 in the U.S. market. Internationally, ISO 5167-1:2003 and other ISO gas standard equivalents are in widespread use. Additional to natural gas, some flow computers offer an array of densi... | wikipedia |
wiki_23321_chunk_3 | Medical statistics | Basic concepts
For describing situations
Incidence (epidemiology) vs. Prevalence vs. Cumulative incidence
Many medical tests (such as pregnancy tests) have two possible results: positive or negative. However, tests will sometimes yield incorrect results in the form of false positives or false negatives. False positive... | wikipedia |
wiki_16851_chunk_9 | 1955–56 United States network television schedule | Tuesday
{| class="wikitable" style="width:100%;margin-right:0;text-align:center"
|-
! colspan="2" style="background-color:#C0C0C0;text-align:center"| Network
! style="background-color:#C0C0C0;text-align:center"| 7:00 PM
! style="background-color:#C0C0C0;text-align:center"| 7:30 PM
! style="background-color:#C0C0C0;tex... | wikipedia |
wiki_12925_chunk_2 | EDA database | Mature design databases
Many instances of mature design databases exist in the EDA industry, both as a basis for commercial EDA tools as well as proprietary EDA tools developed by the CAD groups of major electronics companies.
IBM, Hewlett-Packard, SDA Systems and ECAD (now Cadence Design Systems), High Level Design Sy... | wikipedia |
wiki_3511_chunk_5 | Reflexive operator algebra | In the case of a reflexive algebra of matrices with nonzero entries specified by a given pattern, the problem of finding the distance constant can be rephrased as a matrix-filling problem: if we fill the entries in the complement of the pattern with arbitrary entries, what choice of entries in the pattern gives the sma... | wikipedia |
wiki_7809_chunk_2 | Array of Low Energy X-ray Imaging Sensors | There were six EUV telescopes which were arranged in three co-aligned pairs which cover three overlapping 33° fields-of-view. At each rotation of the satellite, ALEXIS monitored the entire anti-solar hemisphere. Each telescope consisted of a spherical mirror with a Mo-Si layered synthetic microstructure (LSM) or Multil... | wikipedia |
wiki_7395_chunk_56 | History of chemistry | A Swedish chemist and disciple of Dalton, Jöns Jacob Berzelius embarked on a systematic program to try to make accurate and precise quantitative measurements and to ensure the purity of chemicals. Along with Lavoisier, Boyle, and Dalton, Berzelius is known as the father of modern chemistry. In 1828 he compiled a table ... | wikipedia |
wiki_31884_chunk_16 | Polyhedral combinatorics | However, the Birkhoff polytope is unusual in that a complete description of its facets is available. For many other 0-1 polytopes, there are exponentially many or superexponentially many facets, and only partial descriptions of their facets are available. See also
Abstract polytope
Combinatorial commutative algebra
... | wikipedia |
wiki_29515_chunk_16 | Edward Wright (mathematician) | While the first edition of Certaine Errors contained an abridged table six pages in length, in the second edition which appeared in 1610 Wright published a full table across 23 pages with figures for parallels at one-minute intervals. The table is remarkably accurate – American geography professor Mark Monmonier wrote ... | wikipedia |
wiki_4287_chunk_13 | Max Planck Institute for Extraterrestrial Physics | Many experiments of the Max-Planck-Institut für extraterrestrische Physik (MPE) have to be carried out above the dense Earth's atmosphere using aircraft, rockets, satellites and space probes. In the early days experiments were also flown on balloons. To run advanced extraterrestrial physics and state-of-the-art experim... | wikipedia |
wiki_6686_chunk_2 | Computational science | Computational science is now commonly considered a third mode of science , complementing and adding to experimentation/observation and theory (see image on the right). Here, one defines a system as a potential source of data, an experiment as a process of extracting data from a system by exerting it through its inputs ... | wikipedia |
wiki_10215_chunk_0 | European Network for Training and Research in Electrical Engineering | Exchange programs for Electrical Engineering students between 18 universities in Europe. It is also known as Entree. Their members are:
Chalmers Lindholmen University College (Sweden)
University of Aalborg (Denmark)
Heriot-Watt University (United Kingdom)
Brunel University (United Kingdom)
Delft University of T... | wikipedia |
wiki_7091_chunk_5 | Feature (machine learning) | Higher-level features can be obtained from already available features and added to the feature vector; for example, for the study of diseases the feature 'Age' is useful and is defined as Age = 'Year of death' minus 'Year of birth' . This process is referred to as feature construction. Feature construction is the appli... | wikipedia |
wiki_14184_chunk_10 | Ottawa-Carleton Educational Space Simulation | Complete details regarding the EEP are available on the OCESS Website. Planetarium Program
The Planetarium Program involves transporting the OCESS's inflatable planetarium to elementary or high schools across the Ottawa region and delivering a presentation involving constellations, luminosity, temperature of stars, and... | wikipedia |
wiki_33072_chunk_12 | Pleiades (supercomputer) | Gallery In popular culture
In the 2015 film The Martian, astrodynamicist Rich Purnell uses the Pleiades supercomputer to verify calculations for a gravity assist maneuver for a spacecraft, in order to rescue an astronaut stranded on Mars. Unlike what is shown in the movie, one need not be physically present inside the... | wikipedia |
wiki_3058_chunk_13 | Civil-military co-operation | Summary
"This CECIL-tool is ideal for the CIMIC branches to manage their information which assists to stabilize the mission area. Information sharing through one database is essential for civilian and military partners." CECIL is designed to focus on the most important issues. The Afghan Country Stability Picture gives... | wikipedia |
wiki_372_chunk_3 | Microcode | Overview
The lowest layer in a computer's software stack is traditionally raw machine code instructions for the processor. In microcoded processors, the microcode fetches and executes those instructions. To avoid confusion, each microprogram-related element is differentiated by the micro prefix: microinstruction, micro... | wikipedia |
wiki_14275_chunk_4 | Business simulation game | Real-world applications
Because business simulations simulate real-world systems, they are often used in management, marketing, economics and hospitality education. Some benefits of business simulations are that they permit students to experience and test themselves in situations before encountering them in real life,... | wikipedia |
wiki_21524_chunk_6 | Little man computer | The table below shows a typical numeric instruction set and the equivalent mnemonic codes. Examples Using Numeric Instruction Codes
This program (instruction 901 to instruction 000) is written just using numeric codes. The program takes two numbers as input and outputs the difference. Notice that execution starts at... | wikipedia |
wiki_25966_chunk_1 | Michael Meeks (software developer) | Meeks is a free software hacker who has contributed a lot of time to decreasing program load time. He created the direct binding, hashvals, and dynsort implementations for GNU Binutils and glibc. Most of this work was focused at making OpenOffice.org and now its fork LibreOffice start faster, and was later subsumed int... | wikipedia |
wiki_4695_chunk_1 | Buchberger's algorithm | Input A set of polynomials F that generates I
Output A Gröbner basis G for I
G := F
For every fi, fj in G, denote by gi the leading term of fi with respect to the given ordering, and by aij the least common multiple of gi and gj.
Choose two polynomials in G and let Sij = (aij / gi) fi − (aij / gj) fj (Note that the ... | wikipedia |
wiki_7997_chunk_37 | Advanced Idea Mechanics | Ultimate Marvel
In the Ultimate Marvel reality, A.I.M. commissioned Mad Thinker to steal Cerebro from the X-Men and frame the Fantastic Four, as seen in the Ultimate X4 mini-series. Ultimate A.I.M.'s full purpose and function has yet to be revealed. The miniseries Ultimate Vision introduces A.I.M. as composed of severa... | wikipedia |
wiki_6927_chunk_4 | Computational topology | SnapPea implements an algorithm to convert a planar knot or link diagram into a cusped triangulation. This algorithm has a roughly linear run-time in the number of crossings in the diagram, and low memory profile. The algorithm is similar to the Wirthinger algorithm for constructing presentations of the fundamental g... | wikipedia |
wiki_4937_chunk_5 | Network theory | Since the 1970s, the empirical study of networks has played a central role in social science, and many of the mathematical and statistical tools used for studying networks have been first developed in sociology. Amongst many other applications, social network analysis has been used to understand the diffusion of innov... | wikipedia |
wiki_36759_chunk_0 | Leiden Open Variation Database | The Leiden Open Variation Database (LOVD) is a free, flexible web-based open source database developed in the Leiden University Medical Center in the Netherlands, designed to collect and display variants in the DNA sequence. The focus of an LOVD is usually the combination between a gene and a genetic (heritable) diseas... | wikipedia |
wiki_33706_chunk_4 | Domain-specific multimodeling | Enterprise systems based on multiple domain-specific languages are abundant. Languages with a metamodel defined in the Extensible Markup Language (XML) enjoy particularly widespread adoption. To illustrate development with multiple languages, we will draw an example from a case study: The Apache Open For Business (OFBi... | wikipedia |
wiki_25185_chunk_5 | Market engineering | Evaluation
Having designed the market, it is tested upon its technical and economic properties. The evaluation stage comprises functionality tests of a software prototype to ensure its correctness, economic tests to measure the outcome performance of the market, and an assessment of the business model. Functionality t... | wikipedia |
wiki_5951_chunk_1 | Irreducibility (mathematics) | A polynomial over a field may be an irreducible polynomial if it cannot be factored over that field.
In abstract algebra, irreducible can be an abbreviation for irreducible element of an integral domain; for example an irreducible polynomial.
In representation theory, an irreducible representation is a nontrivial re... | wikipedia |
wiki_549_chunk_10 | Search algorithm | Another important sub-class consists of algorithms for exploring the game tree of multiple-player games, such as chess or backgammon, whose nodes consist of all possible game situations that could result from the current situation. The goal in these problems is to find the move that provides the best chance of a win, ... | wikipedia |
wiki_7184_chunk_0 | Ihara zeta function | In mathematics, the Ihara zeta function is a zeta function associated with a finite graph. It closely resembles the Selberg zeta function, and is used to relate closed walks to the spectrum of the adjacency matrix. The Ihara zeta function was first defined by Yasutaka Ihara in the 1960s in the context of discrete subgr... | wikipedia |
wiki_2296_chunk_1 | Resonance (chemistry) | Overview
Under the framework of valence bond theory, resonance is an extension of the idea that the bonding in a chemical species can be described by a Lewis structure. For many chemical species, a single Lewis structure, consisting of atoms obeying the octet rule, possibly bearing formal charges, and connected by bo... | wikipedia |
wiki_1166_chunk_11 | Maple (software) | Examples of Maple code
The following code, which computes the factorial of a nonnegative integer, is an example of an imperative programming construct within Maple: myfac := proc(n::nonnegint)
local out, i;
out := 1;
for i from 2 to n do
out := out * i
end do;
out
end proc;
Simple functions can al... | wikipedia |
wiki_29312_chunk_45 | Network science | Since the 1970s, the empirical study of networks has played a central role in social science, and many of the mathematical and statistical tools used for studying networks have been first developed in sociology. Amongst many other applications, social network analysis has been used to understand the diffusion of innov... | wikipedia |
wiki_5854_chunk_3 | British Aerospace EAP | Background
The origins of the EAP can be found within the Agile Combat Aircraft (ACA) programme performed by British Aerospace (BAe) during the late 1970s and early 1980s. It is known that ACA had involved the combining of several years of private venture research conducted by BAe, costed at around £25 million, togethe... | wikipedia |
wiki_12129_chunk_16 | Chennai Mathematical Institute | Till 2006, students received their B.Sc. and M.Sc. degrees from MPBOU and their Ph.D. degrees from Madras University.
CMI conducts its academic programmes in conjunction with IMSc, so students from either institute can take courses at the other.
CMI has agreements with TIFR (Tata Institute of Fundamental Research) an... | wikipedia |
wiki_1964_chunk_11 | James Gregory (mathematician) | Mathematics
The following excerpt is from the Pantologia. A new (cabinet) cyclopædia (1813)
Mr. James Gregory was a man of a very acute and penetrating genius. ...The most brilliant part of his character was that of his mathematical genius as an inventor, which was of the first order; as will appear by... his invention... | wikipedia |
wiki_21428_chunk_4 | Energy Biosciences Institute | Using a former industrial fermentation process, EBI scientists have developed a way to extract the acetone, butanol, and ethanol from a fermentation mixture and reformulate the products using chemical catalysts to produce diesel-like fuels.
Designing modified yeast strains that could simultaneously use 5-carbon and 6-... | wikipedia |
wiki_6637_chunk_65 | FOCAL (programming language) | External links
FOCAL source code, FOCAL source for several programs, including Lunar Lander, Sumer Game, and others
DEC's FOCAL 1969 Promotional Booklet
The Computer History Simulation Project (Focal is available as a free download here)
ftp://www.cozx.com/pub/langs/focal.tar.gz C-source version that runs under several... | wikipedia |
wiki_5511_chunk_1 | Topological sorting | Examples
The canonical application of topological sorting is in scheduling a sequence of jobs or tasks based on their dependencies. The jobs are represented by vertices, and there is an edge from x to y if job x must be completed before job y can be started (for example, when washing clothes, the washing machine must ... | wikipedia |
wiki_26493_chunk_162 | Comparison of programming languages (associative array) | irb(main):007:0> ### iterate over keys and values
irb(main):008:0* phonebook.each {|key, value| puts key + " => " + value}
Sally Smart => 555-9999
John Doe => 555-1212
J. Random Hacker => 553-1337
=> {"Sally Smart"=>"555-9999", "John Doe"=>"555-1212", "J. Random Hacker"=>"553-1337"}
irb(main):009:0> ### iterate keys on... | wikipedia |
wiki_16650_chunk_2 | Programming the Universe | In the space of 221 dense, frequently thrilling and occasionally exasperating pages, … tackles computer logic, thermodynamics, chaos theory, complexity, quantum mechanics, cosmology, consciousness, sex and the origin of life — throwing in, for good measure, a heartbreaking afterword that repaints the significance of a... | wikipedia |
wiki_6604_chunk_5 | Crime Writers of Canada Awards of Excellence | Best Juvenile or Young Adult Crime Book
1994 - John Dowd, Abalone Summer
1995 - James Heneghan, Torn Away
1996 - Norah McClintock, Mistaken Identity
1997 - Linda Bailey, How Can a Frozen Detective Stay Hot on the Trail?
1998 - Norah McClintock, The Body in the Basement
1999 - Norah McClintock, Sins of the Father
2000 -... | wikipedia |
wiki_24026_chunk_5 | Multiservice tactical brevity code | D
Dakota No air to ground (ATG) ordnance remaining.
Dash (#) Aircraft position within a flight. Use if specific call sign is unknown.
Data Standby for improved data modem (IDM) data message concerning (object) at stated location.
Datum Last known position of a submarine contact after contact was lost.
Deadeye Informat... | wikipedia |
wiki_12037_chunk_18 | Linear network coding | There are new methods emerging to use Network Coding in multiaccess systems to develop Software Defined Wire Area Networks (SD-WANs) that can offer lower delay, jitter and high robustness. The proposal mentions that the method is agnostic to underlying technologies like LTE, Ethernet, 5G. Maturity & Issues
Since this ... | wikipedia |
wiki_13442_chunk_3 | Karmarkar's algorithm | Since the actual algorithm is rather complicated, researchers looked for a more intuitive version of it, and in 1985 developed affine scaling, a version of Karmarkar's algorithm that uses affine transformations where Karmarkar used projective ones, only to realize four years later that they had rediscovered an algorith... | wikipedia |
wiki_793_chunk_43 | Linear programming | Simplex pivot methods preserve primal (or dual) feasibility. On the other hand, criss-cross pivot methods do not preserve (primal or dual) feasibilitythey may visit primal feasible, dual feasible or primal-and-dual infeasible bases in any order. Pivot methods of this type have been studied since the 1970s. Essential... | wikipedia |
wiki_890_chunk_54 | Gray code | We can formalize the concept of monotone Gray codes as follows: consider the partition of the hypercube into levels of vertices that have equal weight, i.e. for . These levels satisfy . Let be the subgraph of induced by , and let be the edges in . A monotonic Gray code is then a Hamiltonian path in such that whene... | wikipedia |
wiki_50_chunk_33 | Binary-coded decimal | In more recent computers such capabilities are almost always implemented in software rather than the CPU's instruction set, but BCD numeric data are still extremely common in commercial and financial applications. There are tricks for implementing packed BCD and zoned decimal add–or–subtract operations using short but ... | wikipedia |
wiki_2443_chunk_120 | Quantitative genetics | To visualize the pattern in full cousin equations, start the series with the full sib equation re-written in iteration form: ft = (1/4)[2 f(t-1) + f(t-2) + 1 ]. Notice that this is the "essential plan" of the last term in each of the cousin iterative forms: with the small difference that the generation indices increme... | wikipedia |
wiki_3472_chunk_76 | List of important publications in computer science | See also
DBLP (Digital Bibliography & Library Project in computer science)
List of open problems in computer science
List of computer science journals
List of computer science conferences
The Collection of Computer Science Bibliographies
Paris Kanellakis Award, a prize given to honor specific theoretical accompli... | wikipedia |
wiki_3661_chunk_1 | Homological conjectures in commutative algebra | The Zero Divisor Theorem. If has finite projective dimension and is not a zero divisor on , then is not a zero divisor on .
Bass's Question. If has a finite injective resolution then is a Cohen–Macaulay ring.
The Intersection Theorem. If has finite length, then the Krull dimension of N (i.e., the dimension of R... | wikipedia |
wiki_7838_chunk_20 | GE Evolution Series | Cemex:
One ES44AC unit, numbered 81, built in March 2008 as an add-on to a CSXT order.
CSX Transportation:
550 ES44AH units, numbered 700–999 and 3000–3249. 847 and 963 have been wrecked and retired, 3112 renumbered to 1776.
Three units have special names and paint schemes: 911 Spirit of Our First Responders, 3112 ... | wikipedia |
wiki_331_chunk_70 | Lambda calculus | In 2014 it was shown that the number of β-reduction steps taken by normal order reduction to reduce a term is a reasonable time cost model, that is, the reduction can be simulated on a Turing machine in time polynomially proportional to the number of steps. This was a long-standing open problem, due to size explosion, ... | wikipedia |
wiki_10754_chunk_2 | International Design Excellence Awards | Innovation: (design, experience, manufacturing)
Benefit to User: (performance, comfort, safety, ease of use, usability, user interface, ergonomics, universal function and access, quality of life, affordability)
Responsibility: Benefit to society, environment, culture and economy (improved accessibility to a greater per... | wikipedia |
wiki_13675_chunk_12 | Word problem (mathematics) | The word problem for free lattices has some interesting aspects. Consider the case of bounded lattices, i.e. algebraic structures with the two binary operations ∨ and ∧ and the two constants (nullary operations) 0 and 1. The set of all well-formed expressions that can be formulated using these operations on elements fr... | wikipedia |
wiki_11143_chunk_1 | Computational epidemiology | Introduction
In contrast with traditional epidemiology, computational epidemiology looks for patterns in unstructured sources of data, such as social media. It can be thought of as the hypothesis-generating antecedent to hypothesis-testing methods such as national surveys and randomized controlled trials.
A mathematica... | wikipedia |
wiki_5691_chunk_4 | Modular programming | Language support
Languages that formally support the module concept include Ada, Algol, BlitzMax, C++, C#, Clojure, COBOL, Common_Lisp, D, Dart, eC, Erlang, Elixir, Elm, F, F#, Fortran, Go, Haskell, IBM/360 Assembler, Control Language (CL), IBM RPG, Java, MATLAB, ML, Modula, Modula-2, Modula-3, Morpho, NEWP, Oberon, Ob... | wikipedia |
wiki_12260_chunk_10 | Microelectronics and Computer Technology Corporation | Evolutionary Technologies International, a company focused on developing database tools and data warehousing, was spun off from MCC in 1990. See also
Cyc
Sematech, a semiconductor-industry focused consortium, previously in Austin; moved to Albany, NY in 2010 Notes
Microelectronics and Computer Technology Corporatio... | wikipedia |
wiki_21485_chunk_1 | Dynamic problem (algorithms) | Problems of this class have the following measures of complexity:
Space the amount of memory space required to store the data structure;
Initialization time time required for the initial construction of the data structure;
Insertion time time required for the update of the data structure when one more input element ... | wikipedia |
wiki_25907_chunk_10 | Balochistan University of Information Technology, Engineering & Management Sciences | Research and reputation
The institute's research activities are governed by the Office of Research, Innovation, and Commercialization (ORIC) led by Dr. Anayatullah Baloch. It is responsible for promoting and enhancing quality research activities and publications. The office assists in Board of studies and conducts Adva... | wikipedia |
wiki_5093_chunk_23 | List of important publications in chemistry | Statistics for Experimenters: An Introduction to Design, Data Analysis, and Model Building
George E.P. Box, J. Stuart Hunter & William G. Hunter
John Wiley and Sons, Inc., 1st Edition 1978, 2nd Edition 2005 ()
Importance: Although almost devoid of classical chemistry, this is the definitive text for any experimentali... | wikipedia |
wiki_12501_chunk_6 | Asymptotically optimal algorithm | An example of an asymptotically optimal algorithm not used in practice is Bernard Chazelle's linear-time algorithm for triangulation of a simple polygon. Another is the resizable array data structure published in "Resizable Arrays in Optimal Time and Space", which can index in constant time but on many machines carries... | wikipedia |
wiki_15969_chunk_0 | List of MeSH codes (V02) | The following is a partial list of the "V" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (V01). Codes following these are found at List of MeSH codes (V03). For other MeSH codes, see List of MeSH c... | wikipedia |
wiki_3840_chunk_1 | Lists of mathematics topics | The purpose of this list is not similar to that of the Mathematics Subject Classification formulated by the American Mathematical Society. Many mathematics journals ask authors of research papers and expository articles to list subject codes from the Mathematics Subject Classification in their papers. The subject codes... | wikipedia |
wiki_19886_chunk_1 | Mathematical Institute, University of Oxford | Overview
The Oxford Mathematical Institute includes both pure and applied mathematics (Statistics is a separate department) and is one of the largest and most respected mathematics departments in the UK with about 100 faculty members, and was ranked as the top mathematics department in the UK in the 2014 UK Research Ev... | wikipedia |
wiki_9459_chunk_10 | Reed–Muller code | A generator matrix for a Reed–Muller code of length can be constructed as follows. Let us write the set of all m-dimensional binary vectors as: We define in N-dimensional space the indicator vectors on subsets by: together with, also in , the binary operation referred to as the wedge product (not to be confused wit... | wikipedia |
wiki_7172_chunk_26 | Semisimple Lie algebra | For applications, one is often interested in a finite-dimensional simple -module (a finite-dimensional irreducible representation). This is especially the case when is the Lie algebra of a Lie group (or complexification of such), since, via the Lie correspondence, a Lie algebra representation can be integrated to a Li... | wikipedia |
wiki_5878_chunk_28 | Computational sociology | Academic programs, departments and degrees
University of Bristol "Mediapatterns" project
Carnegie Mellon University, PhD program in Computation, Organizations and Society (COS)
University of Chicago
Certificate, MA and PhD in Computational Social Sciences
George Mason University
PhD program in CSS (Computational ... | wikipedia |
wiki_163_chunk_27 | Data Encryption Standard | The next confirmed DES cracker was the COPACOBANA machine built in 2006 by teams of the Universities of Bochum and Kiel, both in Germany. Unlike the EFF machine, COPACOBANA consists of commercially available, reconfigurable integrated circuits. 120 of these field-programmable gate arrays (FPGAs) of type XILINX Spartan-... | wikipedia |
wiki_10065_chunk_4 | Complementary code keying | Mathematical description
The CCK modulation used by 802.11b transmits data in symbols of eight chips, where each chip is a complex QPSK bit-pair at a chip rate of 11Mchip/s. In 5.5 Mbit/s and 11 Mbit/s modes respectively 4 and 8 bits are modulated onto the eight chips of the symbol c0,...,c7, where and are determined ... | wikipedia |
wiki_15586_chunk_11 | Smithy code | External links
The complete text of the judgment was formerly available at http://www.hmcourts-service.gov.uk/images/judgment-files/baigent_v_rhg_0406.pdf.
The archived copy of this text from 5 December 2006 can be found here
, text of the judgment without the italics that mark out the cyphertext.
Famous Unsolved Co... | wikipedia |
wiki_16506_chunk_4 | Nuclear astrophysics | During cosmic times, nuclear reactions re-arrange the nucleons that were left behind from the big bang (in the form of isotopes of hydrogen and helium, and traces of lithium, beryllium, and boron) to other isotopes and elements as we find them today (see graph). The driver is a conversion of nuclear binding energy to e... | wikipedia |
wiki_793_chunk_8 | Linear programming | Uses
Linear programming is a widely used field of optimization for several reasons. Many practical problems in operations research can be expressed as linear programming problems. Certain special cases of linear programming, such as network flow problems and multicommodity flow problems are considered important enough... | wikipedia |
wiki_36323_chunk_21 | United States Geological Survey | While much less expensive to compile and produce, the revised digital U.S. topo maps have been criticized for a lack of accuracy and detail in comparison to older generation maps based on aerial photo surveys and field checks. As the digital databases were not designed for producing general-purpose maps, data integrati... | wikipedia |
wiki_7690_chunk_22 | DeCODE genetics | To understand the population that it is working in and to address broader questions few can in the same way, deCODE has also from its early days had its own genetic anthropology group. It has published pioneering work on mitochondrial and Y-chromosome mutation to trace the Norwegian and Celtic mix in the early populati... | wikipedia |
wiki_23637_chunk_4 | Government database | France
Carnet B: Created in 1886, the Carnet B was, initially, a list of foreigners suspected of espionage. Prior to World War I, the list was gradually expanded to include all persons likely to disturb public order and antimilitarists who might oppose national mobilization. Those listed were to be arrested in the eve... | wikipedia |
wiki_11990_chunk_8 | Anonymous recursion | This is illustrated below using Python. First, a standard named recursion:
def fact(n):
if n == 0:
return 1
return n * fact(n - 1)
Using a higher-order function so the top-level function recurses anonymously on an argument, but still needing the standard recursive function as an argument:
def fact0(n0):... | wikipedia |
wiki_8587_chunk_3 | Comprehensive School Mathematics Program | Overview
The CSMP project employs four non-verbal languages for the purpose of posing problems and representing mathematical concepts: the Papy Minicomputer (mental computation), Arrows (relations), Strings (classification), and Calculators (patterns). It was designed to teach mathematics as a problem-solving activity... | wikipedia |
wiki_30776_chunk_2 | Nanomorphic cell | The nanomorphic cell model was applied to analyze the capabilities of an autonomous integrated microsystem on the order of the size of a living cell, i.e. a cube of 10 micrometer on a side [1, 2]. The function of this microsystem is, for example, upon injection into the body, to interact with living cells, e.g. determi... | wikipedia |
wiki_1527_chunk_26 | Generating function | Tools for processing and working with P-recursive sequences in Mathematica include the software packages provided for non-commercial use on the RISC Combinatorics Group algorithmic combinatorics software site. Despite being mostly closed-source, particularly powerful tools in this software suite are provided by the Gue... | wikipedia |
wiki_32969_chunk_17 | Energy policy of Morocco | The biggest CSP project in Morocco is Noor Solar, situated in the city of Ouarzazate, on the edge of the Sahara desert. The project comprises 3 phases: Noor I, Noor II and Noor III. This Noor project is supported by a BOOT (build, own, operate and transfer) basis of ACWA Power Ouarzazate, MASEN, Aries, and TSK. The fir... | wikipedia |
wiki_20870_chunk_4 | One-pass algorithm | Given a list of numbers:
Find the median.
Find the modes (This is not the same as finding the most frequent symbol from a limited alphabet).
Sort the list.
Count the number of items greater than or less than the mean. However, this can be done in constant memory with two passes: Pass 1 finds the average and pass 2... | wikipedia |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.