id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_33074_chunk_4
International Requirements Engineering Board
CPRE Foundation Level The IREB Syllabus for the CPRE Foundation Level of the IREB Certified Professional for Requirements Engineering sets the following priorities: The focus is on acquiring the necessary practical knowledge and learning the basic concepts in Requirements Engineering, with reinforcement through pract...
wikipedia
wiki_164_chunk_4
Descriptive statistics
The use of descriptive and summary statistics has an extensive history and, indeed, the simple tabulation of populations and of economic data was the first way the topic of statistics appeared. More recently, a collection of summarisation techniques has been formulated under the heading of exploratory data analysis: an...
wikipedia
wiki_19012_chunk_27
Impact of nanotechnology
Regulatory bodies such as the United States Environmental Protection Agency and the Food and Drug Administration in the U.S. or the Health & Consumer Protection Directorate of the European Commission have started dealing with the potential risks posed by nanoparticles. So far, neither engineered nanoparticles nor the p...
wikipedia
wiki_36883_chunk_1
Laboratory for Computational Cultural Dynamics
Motivation The overall goal of the LCCD is to develop the computational infrastructure needed to help others when decision making in a cultural situation is required. The technologies developed at the lab see potential application in: understanding terrorist organizations and predicting terrorist behavior; understand...
wikipedia
wiki_155_chunk_6
Clay Mathematics Institute
In recognition of major breakthroughs in mathematical research, the institute has an annual prize — the Clay Research Award. Its recipients to date are Ian Agol, Manindra Agrawal, Yves Benoist, Manjul Bhargava, Tristan Buckmaster, Danny Calegari, Alain Connes, Nils Dencker, Alex Eskin, David Gabai, Ben Green, Mark Gros...
wikipedia
wiki_591_chunk_28
Temporomandibular joint dysfunction
Possible associations TMD has been suggested to be associated with other conditions or factors, with varying degrees evidence and some more commonly than others. E.g. It has been shown that 75% of people with TMD could also be diagnosed with fibromyalgia, since they met the diagnostic criteria, and that conversely, 18%...
wikipedia
wiki_24985_chunk_3
Computer Task Group
Diversified Systems Inc. (1983) Automated Business Systems, Inc. (1983) Berger, Vernay & Co. (1985) Delta Force Inc. (1985) Documentation Resources, Inc. (1986) Shubrooks International, Ltd. (1986) Applied Management Systems, Inc. (1988) Connolly Data Systems Inc. (1990) Telecommunications Management Consultant...
wikipedia
wiki_862_chunk_56
Philosophiæ Naturalis Principia Mathematica
Cambridge University Library has Newton's own copy of the first edition, with handwritten notes for the second edition. The Earl Gregg Swem Library at the College of William & Mary has a first edition copy of the Principia. Throughout are Latin annotations written by Thomas S. Savage. These handwritten notes are curre...
wikipedia
wiki_22679_chunk_6
The Zoological Record
Online availability The Zoological Record is one of the few extremely important historical publications in the field of zoological nomenclature that are not available at open access to the public in a digitised image format, for example at the Biodiversity Heritage Library or the Internet Archive. In the United States...
wikipedia
wiki_26525_chunk_6
Materials science in science fiction
|Duralumin is a rather old aluminum alloy with unexceptional properties by modern standards. Furthermore, other metals such as titanium are much stronger and about the same weight. |- |Einsteinium |The Tashkent Crisis|In William Craig's Cold War novel, einsteinium-119 is used to build a nuclear warhead into the casing...
wikipedia
wiki_37811_chunk_7
Go (programming language)
Design Go is influenced by C (especially the Plan 9 dialect ), but with an emphasis on greater simplicity and safety. The language consists of: A syntax and environment adopting patterns more common in dynamic languages: Optional concise variable declaration and initialization through type inference (x := 0 instead o...
wikipedia
wiki_6057_chunk_9
List of 7400-series integrated circuits
Normal inputs / push–pull outputs {| class="wikitable" |- ! Configuration !! Buffer !! Inverter |- | Hex 1-input || 74x34 || 74x04 |} {| class="wikitable" |- ! Configuration !! AND !! NAND !! OR !! NOR !! XOR !! XNOR |- | Quad 2-input || 74x08 || 74x00 || 74x32 || 74x02 || 74x86 || 74x7266 |- | Triple 3-Input || 74x11 ...
wikipedia
wiki_16545_chunk_1
Cell software development
Adapting VMX for SPU Differences between VMX and SPU The VMX (Vector Multimedia Extensions) technology is conceptually similar to the vector model provided by the SPU processors, but there are many significant differences. The VMX Java mode conforms to the Java Language Specification 1 subset of the default IEEE Standa...
wikipedia
wiki_4902_chunk_2
Moufang loop
Examples Any group is an associative loop and therefore a Moufang loop. The nonzero octonions form a nonassociative Moufang loop under octonion multiplication. The subset of unit norm octonions (forming a 7-sphere in O) is closed under multiplication and therefore forms a Moufang loop. The subset of unit norm integ...
wikipedia
wiki_414_chunk_91
Nuclear power
Speed of transition and investment needed Analysis in 2015 by professor Barry W. Brook and colleagues found that nuclear energy could displace or remove fossil fuels from the electric grid completely within 10 years. This finding was based on the historically modest and proven rate at which nuclear energy was added in ...
wikipedia
wiki_1270_chunk_19
National Science Foundation Network
In addition to the five NSF supercomputer centers, NSFNET provided connectivity to eleven regional networks and through these networks to many smaller regional and campus networks. The NSFNET regional networks were: BARRNet, the Bay Area Regional Research Network in Palo Alto, California; CERFnet, California Education ...
wikipedia
wiki_23109_chunk_9
List of Philippine mythological figures
Chief Spirits: may take the form of human beings, former mortals who mix with the living, and reside in bathing places Anlabban: looks after the general welfare of the people; special protector of hunters Bago: the spirit of the forest Sirinan: the spirit of the river Landusan: responsible for some cases of extreme pov...
wikipedia
wiki_9392_chunk_40
Galactic Civilizations II: Dread Lords
Two new civilizations: a genocidal Drengin offshoot called the Korath and a civilization called the Krynn A new campaign in which the player leads the Drengin Empire The ability to create custom opponents An "environment" statistic to planets, which will determine which civilization can innately colonize or what tec...
wikipedia
wiki_28990_chunk_4
Network Centric Product Support
Typical Usage The extension of the World Wide Web architecture into the product is important to understand, as all decisions for manufacturing of spare parts, scheduling for flights, and other factory OEM and airline operator functions, are driven primarily by what happens to the product in the field (rate of wear and ...
wikipedia
wiki_33201_chunk_7
List of surviving DuMont Television Network broadcasts
The Admiral Broadway Revue – three half-hour segments The Adventures of Ellery Queen – one episode (December 21, 1950) The Alan Dale Show – one episode (June 1948 ) The Armed Forces Hour – two 15-minute segments The Arthur Murray Party – one hour-long episode, one half-hour episode, and four half-hour segments The...
wikipedia
wiki_2017_chunk_12
Scale-free network
Immunization The question of how to immunize efficiently scale free networks which represent realistic networks such as the Internet and social networks has been studied extensively. One such strategy is to immunize the largest degree nodes, i.e., targeted (intentional) attacks since for this case p is relatively high ...
wikipedia
wiki_1229_chunk_5
Bytecode
More recently, the authors of V8 and Dart have challenged the notion that intermediate bytecode is needed for fast and efficient VM implementation. Both of these language implementations currently do direct JIT compiling from source code to machine code with no bytecode intermediary.
wikipedia
wiki_9084_chunk_19
SK8 (programming language)
References Citations Bibliography Related patents System and method of using object sensitivity for selecting computer-generated objects, United States Patent 5737554 Graphical interface for interacting constrained actors, United States Patent 5450540 Further reading How to make complex software customizable, Systems, ...
wikipedia
wiki_7192_chunk_12
Deontic logic
Mally's first deontic logic and von Wright's first plausible deontic logic Ernst Mally, a pupil of Alexius Meinong, was the first to propose a formal system of deontic logic in his Grundgesetze des Sollens (1926) and he founded it on the syntax of Whitehead's and Russell's propositional calculus. Mally's deontic vocabu...
wikipedia
wiki_30183_chunk_7
Integrated Space Cell
Technology Experiment Satellite or (TES) is an experimental satellite to demonstrate and validate, in orbit, technologies that could be used in the future satellites of Indian Space Research Organisation (ISRO). The Technology Experiment Satellite (TES) has a panchromatic camera capable of producing images of 1 meter r...
wikipedia
wiki_89_chunk_92
Computer program
Here is a C programming language source code for the PERSON abstract datatype in a simple school application: /* person.c */ /* -------- */ #include "person.h" PERSON *person_new( char *name ) { PERSON *person; if ( ! ( person = calloc( 1, sizeof( PERSON ) ) ) ) { fprintf(stderr, "ERROR ...
wikipedia
wiki_20067_chunk_5
K-set (geometry)
Construction algorithms Edelsbrunner and Welzl first studied the problem of constructing all k-sets of an input point set, or dually of constructing the k-level of an arrangement. The k-level version of their algorithm can be viewed as a plane sweep algorithm that constructs the level in left-to-right order. Viewed in...
wikipedia
wiki_33177_chunk_87
Robotics
Moreover, there are certain skills to which humans will be better suited than machines for some time to come and the question is how to achieve the best combination of human and robot skills. The advantages of robotics include heavy-duty jobs with precision and repeatability, whereas the advantages of humans include cr...
wikipedia
wiki_9_chunk_10
Algorithms for calculating variance
The following formulas can be used to update the mean and (estimated) variance of the sequence, for an additional element xn. Here, denotes the sample mean of the first n samples , their biased sample variance, and their unbiased sample variance. These formulas suffer from numerical instability, as they repeatedly s...
wikipedia
wiki_31320_chunk_19
Topology (electrical circuits)
Comprehensive cataloguing of network graphs as they apply to electrical circuits began with Percy MacMahon in 1891 (with an engineer friendly article in The Electrician in 1892) who limited his survey to series and parallel combinations. MacMahon called these graphs yoke-chains. Ronald M. Foster in 1932 categorised g...
wikipedia
wiki_38249_chunk_2
Algorithmic skeleton
Example program The following example is based on the Java Skandium library for parallel programming. The objective is to implement an Algorithmic Skeleton-based parallel version of the QuickSort algorithm using the Divide and Conquer pattern. Notice that the high-level approach hides Thread management from the program...
wikipedia
wiki_918_chunk_13
MathML
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE math PUBLIC "-//W3C//DTD MathML 2.0//EN" "http://www.w3.org/Math/DTD/mathml2/mathml2.dtd"> <math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <mi>a</mi> <mo>&InvisibleTimes;</mo> <msup><mi>x</mi><mn>2</mn></msup> <mo>+</mo><mi>b</mi><mo>&Invisibl...
wikipedia
wiki_8345_chunk_3
Intrinsic function
C and C++ Compilers for C and C++, of Microsoft, Intel, and the GNU Compiler Collection (GCC) implement intrinsics that map directly to the x86 single instruction, multiple data (SIMD) instructions (MMX, Streaming SIMD Extensions (SSE), SSE2, SSE3, SSSE3, SSE4, AVX, AVX2, AVX512, FMA, ...). The Microsoft Visual C++ co...
wikipedia
wiki_24497_chunk_15
List of problems in loop theory and quasigroup theory
Loops with abelian inner mapping group Let Q be a loop with abelian inner mapping group. Is Q nilpotent? If so, is there a bound on the nilpotency class of Q? In particular, can the nilpotency class of Q be higher than 3? Proposed: at Loops '07, Prague 2007 Comments: When the inner mapping group Inn(Q) is finite and a...
wikipedia
wiki_8969_chunk_12
Combat flight simulation game
Survey A survey simulation is a classification of simulator that includes a variety (or survey) of aircraft from the period in question. This type of classification applies to many historical combat simulators, and typically includes aircraft from all nations participating in the conflict. Early simulators suffered fro...
wikipedia
wiki_24205_chunk_15
Rod calculus
Sunzi Suanjing described in detail the algorithm of multiplication. On the left are the steps to calculate 38×76: Place the multiplicand on top, the multiplier on bottom. Line up the units place of the multiplier with the highest place of the multiplicand. Leave room in the middle for recording. Start calculating from ...
wikipedia
wiki_19298_chunk_9
1950–51 United States network television schedule
NBCReturning SeriesThe Aldrich Family Armstrong Circle Theatre Bonny Maid Versatile Varieties Break the Bank Camel News Caravan Cameo Theatre Candid Camera The Clock Duffy's Tavern Fireside Theatre Garroway at Large Gillette Cavalcade of Sports Greatest Fights of the Century The Halls of Ivy Hawkins Falls The Jack Cart...
wikipedia
wiki_23909_chunk_4
European Sensory Network
ESN Studies Some examples: Proficiency Testing in Sensory Analysis : within the frame of the EU-funded project "ProfiSens", ESN has contributed to the development of international guidelines on how to evaluate panel performance and on how to monitor the consistency and comparability of test data in sensory laboratori...
wikipedia
wiki_27985_chunk_4
Bees algorithm
Pseudocode for the standard bees algorithm 1 for i=1,…,ns i scout[i]=Initialise_scout() ii flower_patch[i]=Initialise_flower_patch(scout[i]) 2 do until stopping_condition=TRUE i Recruitment() ii for i =1,...,na 1 flower_patch[i]=Local_search(flower_patch...
wikipedia
wiki_14705_chunk_8
Extreme Networks
Therefore, through a series of historical and contemporary merger and acquisition activity, Extreme Networks claims an industry lineage that includes, at a minimum, the networking-focused elements of the following companies: Digital, Chantry, Siemens, Cabletron, Enterasys, AirDefense, Symbol, Motorola, Zebra, Wellfleet...
wikipedia
wiki_30342_chunk_17
List of renewable energy companies by stock exchange
|- |Iberdrola Renovables, SA | style="text-align:center;"| Madrid | style="text-align:center;"| | style="text-align:center;"| 2007 | style="text-align:center;"| Wind, solar, biomass |- |Infigen Energy | style="text-align:center;"| Sydney | style="text-align:center;"| | style="text-align:center;"| 2003 | style="text-a...
wikipedia
wiki_32051_chunk_39
Introduction to evolution
Biogeography is the study of the geographical distribution of species. Evidence from biogeography, especially from the biogeography of oceanic islands, played a key role in convincing both Darwin and Alfred Russel Wallace that species evolved with a branching pattern of common descent. Islands often contain endemic spe...
wikipedia
wiki_8093_chunk_3
Autocode
Below is an example of Glennie's Autocode function which calculates the formula: . The example omits necessary scaling instruction needed to place integers into variables and assumes that results of multiplication fit into lower accumulator.
wikipedia
wiki_22603_chunk_17
Harvard John A. Paulson School of Engineering and Applied Sciences
Howard H. Aiken (AM '37, PhD '39) - computer scientist and designer of the Harvard Mark I Hardy Cross (MCE '11) - American structural engineer and developer of the moment distribution method for structural analysis of statically indeterminate structures Howard Wilson Emmons (PhD '38) - mechanical engineer considered ...
wikipedia
wiki_34580_chunk_0
Common modeling infrastructure
Common modeling infrastructure refers to software libraries that can be shared across multiple institutions in order to increase software reuse and interoperability in complex modeling systems. Early initiatives were in the climate and weather domain, where software components representing distinct physical domains (f...
wikipedia
wiki_17797_chunk_11
Armed Forces Radiobiology Research Institute
Operating research facilities for and disseminate results from the study of radiobiology and ionizing radiation bioeffects and the development of medical countermeasures against ionizing radiation Providing analysis, study, and consultation on the impact of the biological effects of ionizing radiation on the organizat...
wikipedia
wiki_5511_chunk_15
Topological sorting
Application to shortest path finding The topological ordering can also be used to quickly compute shortest paths through a weighted directed acyclic graph. Let be the list of vertices in such a graph, in topological order. Then the following algorithm computes the shortest path from some source vertex to all other ve...
wikipedia
wiki_2247_chunk_8
Experimental mathematics
Visual investigations In Indra's Pearls, David Mumford and others investigated various properties of Möbius transformation and the Schottky group using computer generated images of the groups which: furnished convincing evidence for many conjectures and lures to further exploration. Plausible but false examples Some pl...
wikipedia
wiki_35939_chunk_12
Human–computer interaction
The following experimental design principles are considered, when evaluating a current user interface, or designing a new user interface: Early focus is placed on the user(s) and task(s): How many users are needed to perform the task(s) is established and who the appropriate users should be is determined (someone who ...
wikipedia
wiki_30027_chunk_26
Zonal spherical function
Computing the inner product above leads to Harish-Chandra's formula for the zonal spherical function {| border="1" cellspacing="0" cellpadding="5" | |} as an integral over K.
wikipedia
wiki_4824_chunk_7
National Cryptologic Museum
Early Cryptology, which deals with cryptologic history prior to the formation of NSA, with exhibits dating back to the 16th century (the Renaissance-era book Polygraphiae) forward to the early 1950s, focusing on artifacts from the Founding Fathers of the United States, the American Civil War, the United States Army Cod...
wikipedia
wiki_18764_chunk_126
Anonymous function
Visual Basic .NET Visual Basic .NET 2008 introduced anonymous functions through the lambda form. Combined with implicit typing, VB provides an economical syntax for anonymous functions. As with Python, in VB.NET, anonymous functions must be defined on one line; they cannot be compound statements. Further, an anonymous ...
wikipedia
wiki_7478_chunk_4
General Algebraic Modeling System
Background The driving force behind the development of GAMS were the users of mathematical programming who believed in optimization as a powerful and elegant framework for solving real life problems in science and engineering. At the same time, these users were frustrated by high costs, skill requirements, and an overa...
wikipedia
wiki_36728_chunk_20
List of important publications in theoretical computer science
Description: A very popular text on algorithms in the late 1980s. It was more accessible and readable (but more elementary) than Aho, Hopcroft, and Ullman. There are more recent editions. Introduction to Algorithms Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein 3rd Edition, MIT Press, 2...
wikipedia
wiki_32722_chunk_12
Pure (programming language)
let x = dmatrix {2,1,-1,8; -3,-1,2,-11; -2,1,2,-3}; x; gauss_elimination x; As a language based on term rewriting, Pure fully supports symbolic computation with expressions. Here is an example showing the use of local rewriting rules to expand and factor simple arithmetic expressions: expand = reduce with (a+b)*c = a...
wikipedia
wiki_12627_chunk_11
Gompertz function
Growth of tumors In the 1960s A.K. Laird for the first time successfully used the Gompertz curve to fit data of growth of tumors. In fact, tumors are cellular populations growing in a confined space where the availability of nutrients is limited. Denoting the tumor size as X(t) it is useful to write the Gompertz Curve ...
wikipedia
wiki_27152_chunk_3
Hardware scout
References Improving data cache performance by pre-executing instructions under a cache miss Improving processor performance by dynamically preprocessing the instruction stream High Performance Throughput Computing Runahead execution: an alternative to very large instruction windows for out-of-order processors Sun...
wikipedia
wiki_2158_chunk_19
Lock (computer science)
Lack of composability One of lock-based programming's biggest problems is that "locks don't compose": it is hard to combine small, correct lock-based modules into equally correct larger programs without modifying the modules or at least knowing about their internals. Simon Peyton Jones (an advocate of software transact...
wikipedia
wiki_14084_chunk_4
Tridiagonal matrix algorithm
The implementation in a VBA subroutine without preserving the coefficient vectors: Sub TriDiagonal_Matrix_Algorithm(N%, A#(), B#(), C#(), D#(), X#()) Dim i%, W# For i = 2 To N W = A(i) / B(i - 1) B(i) = B(i) - W * C(i - 1) D(i) = D(i) - W * D(i - 1) Next i X(N) = D(N) / B(N) ...
wikipedia
wiki_25402_chunk_12
Beznau Nuclear Power Plant
Furthermore, each reactor unit has been equipped with an emergency building (NANO, NAchrüstung NOtstandsystem). These contain additional safety systems for the reactor emergency shutdown and for the feeding of the steam generators, a 50 kV emergency power line, and a diesel electricity generator. They are heavily prote...
wikipedia
wiki_35603_chunk_1
Mia's Math Adventure: Just in Time!
Activities The game's 12 educational activities teach arithmetic (addition, subtraction, multiplication and division) geometry (circle, square, rectangle, triangle, closed and broken lines) logic, place value, fractions, measures, etc. Critical reception Mia's Math Adventure received positive reviews from the National ...
wikipedia
wiki_32367_chunk_18
Z88 FEM software
Application in the industry Due to the Open Source approach many applications use the Z88 solver, its plot output, etc. Among other things Z88 has been adapted into a program to calculate point concentrated and linear loads on glass panes in building construction. Routines have been implemented to determine the Young'...
wikipedia
wiki_2671_chunk_37
Reverse mathematics
Weaker systems than recursive comprehension can be defined. The weak system RCA consists of elementary function arithmetic EFA (the basic axioms plus Δ induction in the enriched language with an exponential operation) plus Δ comprehension. Over RCA, recursive comprehension as defined earlier (that is, with Σ inductio...
wikipedia
wiki_30692_chunk_68
Personal computer
See also List of home computers Public computer Portable computer Desktop replacement computer Quiet PC Pocket PC Market share of personal computer vendors Personal Computer Museum Enthusiast computer References Further reading Accidental Empires: How the boys of Silicon Valley make their millions, battle for...
wikipedia
wiki_7943_chunk_5
Paul Seymour (mathematician)
Major contributions Combinatorics in Oxford in the 1970s was dominated by matroid theory, due to the influence of Dominic Welsh and Aubrey William Ingleton. Much of Seymour's early work, up to about 1980, was on matroid theory, and included three important matroid results: his D.Phil. thesis on matroids with the max-fl...
wikipedia
wiki_2804_chunk_12
Berkeley Open Infrastructure for Network Computing
Projects There are 32 active projects listed in the BOINC official website: Amicable Numbers – Mathematics Asteroids@home – Astrophysics BOINC@TACC – Multiple scientific areas Climateprediction.net – Climate study Collatz Conjecture – Mathematics Cosmology@Home – Astronomy Einstein@home – Astrophysics Gerasim@H...
wikipedia
wiki_12260_chunk_11
Microelectronics and Computer Technology Corporation
External links Oral history interview with Laszlo A. Belady, Charles Babbage Institute, University of Minnesota. Discusses his tenure as Vice President and Program Director of the Microelectronics and Computer Technology Corporation (MCC); as Chairman, CTO, and CEO of the Mitsubishi Electric Research Laboratories, In...
wikipedia
wiki_14160_chunk_4
Logical matrix
A permutation matrix is a (0, 1)-matrix, all of whose columns and rows each have exactly one nonzero element. A Costas array is a special case of a permutation matrix. An incidence matrix in combinatorics and finite geometry has ones to indicate incidence between points (or vertices) and lines of a geometry, blocks ...
wikipedia
wiki_4231_chunk_16
Truth function
Instead of using truth tables, logical connective symbols can be interpreted by means of an interpretation function and a functionally complete set of truth-functions (Gamut 1991), as detailed by the principle of compositionality of meaning. Let I be an interpretation function, let Φ, Ψ be any two sentences and let the...
wikipedia
wiki_37773_chunk_34
Statistics education
Graduate coursework and programs Only three universities currently offer graduate programs in statistics education: the University of Granada, the University of Minnesota, and the University of Florida. However, graduate students in a variety of disciplines (e.g., mathematics education, psychology, educational psycholo...
wikipedia
wiki_9209_chunk_13
Renewable Energy Certificate (United States)
Whereas air and water pollution travels across state and national boundaries irrespective of its origin, the value of RECs and the emergence of RECs markets depend very much on the markets created state by state through legislative action to mandate a Renewable Portfolio Standard. Such a balkanized approach to establis...
wikipedia
wiki_4039_chunk_13
Simplified Instructional Computer
Emulating the SIC System Since the SIC and SIC/XE machines are not real machines, the task of actually constructing a SIC emulator is often part of coursework in a systems programming class. The purpose of SIC is to teach introductory-level systems programmers or collegiate students how to write and assemble code belo...
wikipedia
wiki_1067_chunk_41
Civil Service (United Kingdom)
Professions The lingua franca is to describe civil servants, and in particular their grades, predominantly through a lens of administrative activity (as in the current structure of the table above), but in practice the civil service has, and always had, a number of subdivisions, with the Historic Grades having an addi...
wikipedia
wiki_4415_chunk_1
Embedded software
Manufacturers build embedded software into the electronics of cars, telephones, modems, robots, appliances, toys, security systems, pacemakers, televisions and set-top boxes, and digital watches, for example. This software can be very simple, such as lighting controls running on an 8-bit microcontroller with a few kilo...
wikipedia
wiki_31260_chunk_3
Sexological testing
What is expected of psychological measurements is "sufficient" accuracy and reliability, i.e. capability to express an indication or focus which clinicians can use as a "guideline" to rapidly and accurately deepen the aspects highlighted by the measurements and check them together with their patients. For this purpose,...
wikipedia
wiki_410_chunk_3
List of NATO reporting names for miscellaneous aircraft
Aero L-29 "Maya" Antonov An-71 "Madcap" Beriev A-50 "Mainstay" Beriev Be-2 "Mote" Beriev Be-4 "Mug" Beriev Be-6 "Madge" Beriev Be-8 "Mole" Beriev Be-10 "Mallow" Beriev Be-12 "Mail" Beriev Be-40 "Mermaid" Beriev MBR-2 "Mote" Ilyushin Il-28U "Mascot" Ilyushin Il-38 "May" Ilyushin Il-78 "Midas" Ilyushin Il-8...
wikipedia
wiki_27_chunk_22
Automatic number announcement circuit
Local numbers These are regular numbers within valid local exchanges in the communities listed. Many belong to competitive local exchange carriers or independent telephone company exchanges. Supposedly, a test call gives an automatic announcement. Some may announce caller ID instead of ANI; these will incur a toll (if ...
wikipedia
wiki_1926_chunk_28
Conservation biology
Conservation physiology was defined by Steven J. Cooke and colleagues as: "An integrative scientific discipline applying physiological concepts, tools, and knowledge to characterizing biological diversity and its ecological implications; understanding and predicting how organisms, populations, and ecosystems respond to...
wikipedia
wiki_4142_chunk_22
Ant colony optimization algorithms
Convergence For some versions of the algorithm, it is possible to prove that it is convergent (i.e., it is able to find the global optimum in finite time). The first evidence of convergence for an ant colony algorithm was made in 2000, the graph-based ant system algorithm, and later on for the ACS and MMAS algorithms. ...
wikipedia
wiki_34956_chunk_2
Trapeze Software
2013 Acquired Mentor Engineering Inc. 2011 Created Cultura Technologies, bringing together the acquired Agri-Food software businesses. 2010 Acquired BMS Computer Solutions Ltd, a provider of software to the Agriculture industry. 2010 Acquired AGRIS and ExtendAg product suites from John Deere Agri Services, ...
wikipedia
wiki_2827_chunk_32
Simplex algorithm
In 2014, it was proved that a particular variant of the simplex method is NP-mighty, i.e., it can be used to solve, with polynomial overhead, any problem in NP implicitly during the algorithm's execution. Moreover, deciding whether a given variable ever enters the basis during the algorithm's execution on a given inpu...
wikipedia
wiki_20512_chunk_8
Unicode equivalence
Example {| class="wikitable" align="center" width="50%" style="text-align: center;" |+ |Amélie with its two canonically equivalent Unicode forms (NFC and NFD)|- style="background-color:#ffeaea" ! style="width: 10em;" | NFC character | | A || m || colspan="2" | é || l || i || e |- style="background-color:#ffc6c6" ! NFC...
wikipedia
wiki_24354_chunk_3
Shapley–Shubik power index
There are some algorithms for calculating the power index, e.g., dynamic programming techniques, enumeration methods and Monte Carlo methods. Since Shapley and Shubik have published their paper, several axiomatic approaches have been used to mathematically study the Shapley–Shubik power index, with the anonymity axiom,...
wikipedia
wiki_28036_chunk_4
Clone (algebra)
Abstract clones Philip Hall introduced the concept of abstract clone. An abstract clone is different from a concrete clone in that the set A is not given. Formally, an abstract clone comprises a set Cn for each natural number n, elements k,n in Cn for all k ≤ n, and a family of functions ∗:Cm × (Cn)m → Cn for all m ...
wikipedia
wiki_38422_chunk_5
Tensor software
Software for use with Maxima Maxima is a free open source general purpose computer algebra system which includes several packages for tensor algebra calculations in its core distribution. It is particularly useful for calculations with abstract tensors, i.e., when one wishes to do calculations without defining all comp...
wikipedia
wiki_23470_chunk_1
List of solar thermal power stations
Operational {| class="wikitable sortable" |+ Operational solar thermal power stations (of at least 50 MW capacity) |- !Name!!Country!!Location!!Coordinates !Electrical capacity (MW)!!Technology type !Storage hours!!Notes and references |- | Noor / Ouarzazate Solar Power Station || || Ghassate (Ouarzazate province) ||...
wikipedia
wiki_16607_chunk_6
Bruce Woodcock (computer games analyst)
Works "An Analysis of MMOG Subscription Growth", MMOGCHART.COM, 2002 - 2008 "Confessions of an MMOG Cross-Dresser", The Escapist #77, December, 2006 "Is Rape Wrong on Azeroth?", The Escapist #69, October, 2006 "IGDA 2004 Persistent Worlds Whitepaper", contributor, January, 2005 "Illusions of Reality", Quanta #3,...
wikipedia
wiki_35666_chunk_33
Format-preserving encryption
Another mode was included in the draft NIST guidance but was removed before final publication. FF2 is VAES3 scheme for FFX: An addendum to "The FFX Mode of Operation for Preserving Encryption": A parameter collection for encipher strings of arbitrary radix with subkey operation to lengthen life of the enciphering key. ...
wikipedia
wiki_6230_chunk_26
Code injection
External links Article "Three Ways to Inject Your Code into Another Process" by Robert Kuster Article "Inject your code to a Portable Executable file" by A. Danehkar Article "Injective Code inside Import Table" by A. Danehkar Article "Defending against Injection Attacks through Context-Sensitive String Evaluation (...
wikipedia
wiki_11900_chunk_5
Software factory
Components Software factories are unique and therefore contain a unique set of assets designed to help build a specific type of application. In general, most software factories contain interrelated assets of the following types: Factory Schema: A document that categorizes and summarizes the assets used to build and ma...
wikipedia
wiki_2113_chunk_9
Validity (statistics)
A test has content validity built into it by careful selection of which items to include (Anastasi & Urbina, 1997). Items are chosen so that they comply with the test specification which is drawn up through a thorough examination of the subject domain. Foxcroft, Paterson, le Roux & Herbst (2004, p. 49)<ref>Foxcroft, ...
wikipedia
wiki_3849_chunk_5
Tiny Encryption Algorithm
void decrypt (uint32_t v[2], const uint32_t k[4]) { uint32_t v0=v[0], v1=v[1], sum=0xC6EF3720, i; /* set up; sum is (delta << 5) & 0xFFFFFFFF */ uint32_t delta=0x9E3779B9; /* a key schedule constant */ uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /* cache key */ for (i=0; i<32; i+...
wikipedia
wiki_26097_chunk_2
Lesk algorithm
A frequently used example illustrating this algorithm is for the context "pine cone". The following dictionary definitions are used: PINE 1. kinds of evergreen tree with needle-shaped leaves 2. waste away through sorrow or illness CONE 1. solid body which narrows to a point 2. something of this shape whether so...
wikipedia
wiki_4506_chunk_3
De Casteljau's algorithm
An example implementation of De Casteljau's algorithm in Python: def de_casteljau(t, coefs): beta = [c for c in coefs] # values in this list are overridden n = len(beta) for j in range(1, n): for k in range(n - j): beta[k] = beta[k] * (1 - t) + beta[k + 1] * t return beta[0] An examp...
wikipedia
wiki_16591_chunk_3
Pathfinder network
Example Here is an example of an undirected pathfinder network derived from average similarity ratings of a group of biology graduate students. The students rated the relatedness of all pairs of the terms shown, and the mean rating for each pair was computed. The network shown is the PFnet(2, ∞).
wikipedia
wiki_8919_chunk_1
Computerworld Smithsonian Award
Winners 1989 - Inaugural winners, all listed: Bell & Howell's Image Plus Search System; Orangeburg School District 5, Orangeburg, South Carolina; Passaic River Basin Early Flood Warning System, Sierra-Micro Inc.; FIX and FAST, Fidelity Investments; The Missing Children Project, University of Illinois; BI Home Escort S...
wikipedia
wiki_6115_chunk_4
Royal Meteorological Society
Atmospheric Science Letters: a monthly magazine that provides a peer reviewed publication route for new shorter contributions in the field of atmospheric and closely related sciences. Weather: a monthly magazine with many full colour illustrations and photos for specialists and general readers with an interest in mete...
wikipedia
wiki_33081_chunk_7
DiaGrid (distributed computing network)
http://www.dia-grid.org https://www.youtube.com/watch?v=CH_YHGYQl2g http://campustechnology.com/articles/2009/07/22/campus-technology-innovators-awards-2009-high-performance-computing.aspx http://markets.hpcwire.com/taborcomm.hpcwire/?GUID=10770002&Page=MediaViewer&ChannelID=3198 http://cloudcomputing.sys-con.com/node/...
wikipedia
wiki_22091_chunk_5
Peter Baumann (computer scientist)
Awards and patents (source: Peter Baumann's homepage) Copernicus Masters Competition 2014: >Winner, Big Data Challenge Open Geospatial Consortium Kenneth Gardels Award 2014 Geospatial World Forum Innovation Award 2013 Innovationspreis Mittelstand 2012, category: Best of Open Source European IT Prize 1998 Jos Schep...
wikipedia
wiki_21685_chunk_9
Connected Mathematics
Research findings Connected Mathematics has become the most widely used of middle school curriculum materials developed to implement the NCTM Standards. Effects of its use have been described in expository journal articles and evaluated in mathematics education research projects. Many of the research studies are mas...
wikipedia