id
stringlengths 14
20
| title
stringlengths 4
131
| text
stringlengths 52
43k
| source
stringclasses 1
value |
|---|---|---|---|
wiki_7093_chunk_7
|
Two-port network
|
Figure 3 shows a bipolar current mirror with emitter resistors to increase its output resistance. Transistor Q1 is diode connected, which is to say its collector-base voltage is zero. Figure 4 shows the small-signal circuit equivalent to Figure 3. Transistor Q1 is represented by its emitter resistance rE ≈ VT/IE (VT is thermal voltage, IE is Q-point emitter current), a simplification made possible because the dependent current source in the hybrid-pi model for Q1 draws the same current as a resistor 1 / gm connected across rπ. The second transistor Q2 is represented by its hybrid-pi model. Table 1 below shows the z-parameter expressions that make the z-equivalent circuit of Figure 2 electrically equivalent to the small-signal circuit of Figure 4.
|
wikipedia
|
wiki_6999_chunk_14
|
Foreign exchange option
|
The earliest currency options pricing model was published by Biger and Hull, (Financial Management, spring 1983). The model preceded the Garmam and Kolhagen's Model. In 1983 Garman and Kohlhagen extended the Black–Scholes model to cope with the presence of two interest rates (one for each currency). Suppose that is the risk-free interest rate to expiry of the domestic currency and is the foreign currency risk-free interest rate (where domestic currency is the currency in which we obtain the value of the option; the formula also requires that FX rates – both strike and current spot be quoted in terms of "units of domestic currency per unit of foreign currency"). The results are also in the same units and to be meaningful need to be converted into one of the currencies.
|
wikipedia
|
wiki_565_chunk_11
|
Semantic network
|
SciCrunch is a collaboratively edited knowledge base for scientific resources. It provides unambiguous identifiers (Research Resource IDentifiers or RRIDs) for software, lab tools etc. and it also provides options to create links between RRIDs and from communities. Another example of semantic networks, based on category theory, is ologs. Here each type is an object, representing a set of things, and each arrow is a morphism, representing a function. Commutative diagrams also are prescribed to constrain the semantics.
|
wikipedia
|
wiki_2261_chunk_8
|
Polymorphism (computer science)
|
data List a = Nil | Cons a (List a) length :: List a -> Integer
length Nil = 0
length (Cons x xs) = 1 + length xs map :: (a -> b) -> List a -> List b
map f Nil = Nil
map f (Cons x xs) = Cons (f x) (map f xs) Parametric polymorphism is also available in several object-oriented languages. For instance, templates in C++ and D, or under the name generics in C#, Delphi and Java:
|
wikipedia
|
wiki_22864_chunk_1
|
Compile-time function execution
|
If the value of only some of the arguments are known, the compiler may still be able to perform some level of compile-time function execution (partial evaluation), possibly producing more optimized code than if no arguments were known. Examples
The Lisp macro system is an early example of the use of compile-time evaluation of user-defined functions in the same language. The Metacode extension to C++ (Vandevoorde 2003) was an early experimental system to allow compile-time function evaluation (CTFE) and code injection as an improved syntax for C++ template metaprogramming.
|
wikipedia
|
wiki_34205_chunk_42
|
Wiles's proof of Fermat's Last Theorem
|
Among the introductory presentations are an email which Ribet sent in 1993; Hesselink's quick review of top-level issues, which gives just the elementary algebra and avoids abstract algebra; or Daney's web page, which provides a set of his own notes and lists the current books available on the subject. Weston attempts to provide a handy map of some of the relationships between the subjects. F. Q. Gouvêa's 1994 article "A Marvelous Proof", which reviews some of the required topics, won a Lester R. Ford award from the Mathematical Association of America. Faltings' 5-page technical bulletin on the matter is a quick and technical review of the proof for the non-specialist. For those in search of a commercially available book to guide them, he recommended that those familiar with abstract algebra read Hellegouarch, then read the Cornell book, which is claimed to be accessible to "a graduate student in number theory". The Cornell book does not cover the entirety of the Wiles proof.
|
wikipedia
|
wiki_25948_chunk_2
|
Listing (computer)
|
Assembly-code listings are occasionally analysed by programmers who want to understand how a compiler is translating their source code into assembly language. For example, the GNU C Compiler (gcc) will produce an assembly code listing if it is invoked with the command-line option -S. Listings of computer programs are still important in US patent law. They are defined as follows in the Manual of Patent Examining Procedure: References External links
WordPress Price List Builder Source code
Text editor features
|
wikipedia
|
wiki_2861_chunk_28
|
Cooley–Tukey FFT algorithm
|
The following is pseudocode for iterative radix-2 FFT algorithm implemented using bit-reversal permutation.
algorithm iterative-fft is
input: Array a of n complex values where n is a power of 2.
output: Array A the DFT of a.
bit-reverse-copy(a, A)
n ← a.length
for s = 1 to log(n) do
m ← 2s
ωm ← exp(−2πi/m)
for k = 0 to n-1 by m do
ω ← 1
for j = 0 to m/2 – 1 do
t ← ω A[k + j + m/2]
u ← A[k + j]
A[k + j] ← u + t
A[k + j + m/2] ← u – t
ω ← ω ωm
return A
|
wikipedia
|
wiki_12069_chunk_8
|
Functional Requirements for Bibliographic Records
|
Further reading
Karen Coyle, FRBR Before and After, online, CC-BY license. American Library Association, 2015.
IFLA Study Group on the Functional Requirements for Bibliographic Records. Functional requirements for bibliographic records : final report. — München: K.G. Saur, 1998. — (UBCIM publications ; new series, vol. 19). — . (Accessed Nov. 6, 2005) Tillett, Barbara. FRBR: A Conceptual Model for the Bibliographic Universe. Library of Congress Cataloging Distribution Service, 2004. (Accessed Nov. 6, 2005)
|
wikipedia
|
wiki_10308_chunk_10
|
Kozloduy Nuclear Power Plant
|
In 2013 the Austrian Environment Agency prepared a report on the Bulgarian Ministry for the Environment's Environmental Impact Assessment (EIA) on the proposed 7th unit of the Kozloduy Nuclear Power Plant. It assesses whether the EIA-Report allows for making reliable conclusions about the potential trans-boundary impacts on Austria. The Austrian report considers the assumption, that the Kozloduy NPP site is flood-proof, to be well-founded and the seismic hazard at the site to be low (but points out that the seismic hazard study needs updating as it was performed 20 years ago). It also highlights a number of unsubstantiated claims and some failings in the Bulgarian EIA report. These include:
shortcomings in the safety analyses of the reactors being considered, including a lack of the consideration of post-Fukushima lessons learned and, as far as applicable, the use of the concept of practical elimination (pgs 60-61);
serious gaps in the assessment of the impact of external human induced events such as crashes, leaks etc. (pgs 72-73);
contrary to IAEA (2002) analysis requirements, the EIA report does not contain considerations about the formation of pressure shock waves and their possible impact on buildings of the NNU due to explosions outside the perimeter of the NPP (pg 73)
no comprehensible technical basis provided for an evaluation of design basis accidents and severe accidents (pg 84)
only three (insufficient) “typical” dry case weather conditions were used for the calculations of the trans-boundary impacts on the Austrian territory, not worse case scenarios.
|
wikipedia
|
wiki_11322_chunk_10
|
Proof complexity
|
For many weak proof systems it is known that they do not simulate certain stronger systems (see below). However, the question remains open if the notion of simulation is relaxed. For example, it is open whether Resolution effectively polynomially simulates Extended Frege. Automatability of proof search An important question in proof complexity is to understand the complexity of searching for proofs in proof systems. Problem (Automatability)
Are there efficient algorithms searching for proofs in standard proof systems such as Resolution or the Frege system? The question can be formalized by the notion of automatability (also known as automatizability).
|
wikipedia
|
wiki_24188_chunk_26
|
Model of hierarchical complexity
|
Algebra (Commons, Giri, & Harrigan, 2014)
Animal stages (Commons & Miller, 2004)
Atheism (Commons-Miller, 2005)
Attachment and loss (Commons, 1991; Miller & Lee, 2000)
Balance beam and pendulum (Commons, Goodheart, & Bresette, 1995; Commons, Giri, & Harrigan, 2014)
Contingencies of reinforcement (Commons & Giri, 2016)
Counselor stages (Lovell, 2002)
Empathy of hominids (Commons & Wolfsont, 2002)
Epistemology (Kitchener & Fischer, 1990; Kitchener & King, 1990)
Evaluative reasoning (Dawson, 2000)
Four story problem (Commons, Richards & Kuhn, 1982; Kallio & Helkama, 1991)
Good education (Dawson-Tunik, 2004)
Good interpersonal relations (Armon, 1984a; Armon, 1984b; Armon, 1989)
Good work (Armon, 1993)
Honesty and kindness (Lamborn, Fischer & Pipp, 1994)
Informed consent (Commons & Rodriguez, 1990; Commons & Rodriguez, 1993; Commons, Goodheart, Rodriguez, & Gutheil, 2006)
Language stages (Commons et al., 2007)
Leadership before and after crises (Oliver, 2004)
Loevinger's sentence completion task (Cook-Greuter, 1990)
Moral judgment (Armon & Dawson, 1997; Dawson, 2000)
Music (Beethoven) (Funk, 1989)
Physics tasks (Inhelder & Piaget, 1958)
Political development (Sonnert & Commons, 1994)
Report patient's prior crimes (Commons, Lee, Gutheil, et al., 1995)
Social perspective-taking (Commons & Rodriguez, 1990; Commons & Rodriguez, 1993)
Spirituality (Miller & Cook-Greuter, 1994)
Tool making of hominids (Commons & Miller 2002)
Views of the good life (Armon, 1984b; Danaher, 1993; Dawson, 2000; Lam, 1995)
Workplace culture (Commons, Krause, Fayer, & Meaney, 1993)
Workplace organization (Bowman, 1996)
|
wikipedia
|
wiki_34020_chunk_33
|
Merit Network
|
Merit's statewide fiber-optic network strategy began to take shape when:
in 2003 a fiber ring was deployed in Lansing;
in 2003 Michigan State University, the University of Michigan, and Wayne State University launched the Michigan LambdaRail Network (MiLR) project to link the campuses to each other and to Chicago using privately owned fiber, with Merit to operate MiLR on behalf of the three universities and using some of the MiLR fiber for its own network;
in 2004 fiber rings were added in Grand Rapids and Chicago;
in August 2005 Merit was utilizing dark fiber from Michigan Lambda Rail (MiLR) between Detroit and Chicago to support the southern portion of its network backbone;
in July 2006 Merit began to use optical fiber that had been installed by a consortium of government and community organizations in the Alpena area;
in February 2006 Merit and the Ontario Research and Innovation Optical Network (ORION) were linked using fiber optic cable across the US-Canada border through the Detroit–Windsor Tunnel, later in September 2008, a wireless connection across the Soo Locks between Sault Ste. Marie, Michigan and Sault Ste. Marie, Ontario provided a second link between Merit and ORION;
in September 2007 Merit created the first high-speed network connection between Michigan's two peninsulas with fiber optic cable across the Mackinac Bridge;
in November 2007 Merit completed Phase I of its fiber network expansion into the Upper Peninsula of Michigan, connecting Lake Superior State University (LSSU), Michigan Technological University (MTU), and Northern Michigan University (NMU) via fiber-optic cable at gigabit Ethernet speeds;
in May 2008 Merit completes a new fiber optic link from Southfield to Toledo providing a 10 Gbit/s link to OSCnet, Ohio's regional research and education network, and a second path between Merit and the Internet2 network;
in March 2009 a partnership between the City of Hillsdale, Hillsdale College, Hillsdale County Intermediate School District (ISD), and Merit, completed a fiber-optic ring to improve connectivity in the city and reduce network costs for the Hillsdale-area organizations; and
in December 2009 Merit began to use a new fiber optic link between Mt. Pleasant and Big Rapids. This completed the "Blue-Line" fiber optic network that links 16 cities in the lower half of Michigan's lower peninsula (Kalamazoo, Grand Rapids, Muskegon, Big Rapids, Mt. Pleasant, Midland, Saginaw, Flint, Pontiac, Rochester, Southfield, Ypsilanti, Ann Arbor, Jackson, East Lansing, and Battle Creek).
|
wikipedia
|
wiki_30349_chunk_30
|
Global Energy and Water Exchanges
|
The GEWEX project has been in existence for over 30 years, and while some climate oscillations are short, such as El-Nino, some climate oscillations last for decades, such as the North Atlantic Oscillation. Some have proposed extrapolating pre-GEWEX information using new information and measurements taken with pre-GEWEX technology. The MAGS project, located in Northwestern Canada utilized indigenous peoples traditional experiences. In addition, in other parts of the GEWEX study, these oscillations are an aspect of climate forcing, which allow testing of predictions and models. This modelling may be complicated by the fact that the North Atlantic Oscillation in switching state (see graph) as the effects of global warming are becoming more prominent. For example, 2006 and 2007 saw one of the most dramatic declines in Arctic Sea ice, a decline that was largely unpredicted and can shift the late summer albedo in the northern hemisphere. In 2008, sea ice extent decline has backed off from the previous years' trend, and researchers had forecast a strong La Nina event for late 2007 and 2008. However, unexpectedly the surface temperatures in the Eastern Pacific have already begun to rise to El-Nino temperature ranges, indicating the La Nina event may terminate unexpectedly. With this, the loss of Northern Polar sea ice has begun to accelerate back toward the earlier trend. Such rapid and unexpected changes in climate-forcing events eventually suggest that modellers need to include parameters such as ocean temperature thermoclines, energy accumulation in the tropical oceans, sea ice extents in the polar regions, land glacial ice retraction in Greenland, and sheet ice and shelf ice remodelling in Antarctica. When multiple climate-forcing influences are acting simultaneously in which one of the events will eventually take dominance, lack of precedents from the past study of similar confluences of events, as well as knowledge of the uncertainty of sensitive 'switches' in the oceanic/atmospheric switches may affect the ability to provide accurate models and predictions. In addition, sampling points may be spread to monitor leading indicators in one common scenario may be useless during an oscillation where the pool of energy shifts to an unmonitored region so that the magnitude of the shift avoids computation.
|
wikipedia
|
wiki_35835_chunk_23
|
Journal of Cell Biology
|
An update to the software in August 2012 allows the user to smoothly transition from 1 millimeter to 1 micrometer magnification of images assembled from optical and electron microscopes. As an example, they provide a complete image of a zebrafish embryo. References External links
JCB DataViewer
RU Press
Facebook
Image database for cell biology
Celling my soul
Cell biologists share their snaps
Microscopic marvels Publications established in 1955
Delayed open access journals
Creative Commons-licensed journals
Molecular and cellular biology journals
Rockefeller University Press academic journals
1955 establishments in New York City
|
wikipedia
|
wiki_682_chunk_32
|
Optimizing compiler
|
Tail call optimization A function call consumes stack space and involves some overhead related to parameter passing and flushing the instruction cache. Tail recursive algorithms can be converted to iteration through a process called tail recursion elimination or tail call optimization. Deforestation (data structure fusion) In languages where it is common for a sequence of transformations to be applied to a list, deforestation attempts to remove the construction of intermediate data structures. Partial evaluation
|
wikipedia
|
wiki_15563_chunk_1
|
Proxy (statistics)
|
Examples
In social sciences, proxy measurements are often required to stand in for variables that cannot be directly measured. This process of standing in is also known as operationalization. Per-capita gross domestic product (GDP) is often used as a proxy for measures of standard of living or quality of life. Montgomery et al. examine several proxies used, and point out limitations with each, stating "In poor countries, no single empirical measure can be expected to display all of the facets of the concept of income. Our judgment is that consumption per adult is the best measure among those collected in cross-sectional surveys."
|
wikipedia
|
wiki_33155_chunk_6
|
Complexity index
|
See also Rademacher complexity for a recently introduced class complexity index. Example: continuous spaces
Class C of circles in has detail , as shown in the picture on left below. Similarly, for the class of segments on , as shown in the picture on right. Example: discrete spaces
The class on whose concepts are illustrated in the following scheme, where "+" denotes an element belonging to , "-" an element outside , and ⃝ a sentry point: This class has . As usual we may have different sentineling functions. A worst case , as illustrated, is: . However a cheaper one is : References
|
wikipedia
|
wiki_18947_chunk_3
|
Addison-Wesley Secondary Math: An Integrated Approach: Focus on Algebra
|
What other kinds of pollution besides air pollution might threaten our planet? [page 163, in the introduction to 3-1 Functional Relationships]
Each year the Oilfield Chili Appreciation Society holds a chili cook-off. . . . 1. The chili cook-off raises money for charity. Describe some ways the organizers could raise money in the cook- off. 2. What is the hottest kind of pepper that you have eaten? People who have tasted them agree that cayenne peppers are hotter than pimento peppers. How would you set up a hotness scale for peppers? . . . . [page 217, in the introduction to 4-1 Solving Linear Equations]
What role should zoos play in today's society? . . . . [page 233, in the introduction to 4-2 Other Techniques for Solving Linear Equations]
|
wikipedia
|
wiki_33620_chunk_4
|
Michigan State University College of Engineering
|
The professional or student-run groups and organizations available in the college are listed below.
American Association of Blacks in Energy(AABE)
American Institute for Chemical Engineers (AIChE)
American Society of Agricultural and Biological Engineers (ASABE)
American Society of Civil Engineers (ASCE)
American Society of Mechanical Engineers (ASME)
Association for Computing Machinery (ACM)
Audio Enthusiasts and Engineers (AEE)
Biomedical Engineering Society (BMES)
Biosystems Engineering Student Club
Chi Epsilon (XE)
Division of Engineering Computing Services (DECS)
Engineers Without Borders (EWB)
Environmental Engineering Student Society(ESS)
Eta Kappa Nu (ΗΚΝ)
Formula SAE
IEEE MSU Student Branch
International Society of Pharmaceutical Engineering
Leadership Advantage
MSE Society
Michigan State University's Amateur Radio Club (W8SH)
Michigan State University's Society of Automotive Engineers Baja SAE
MSU Women in Computing
National Association of Black Chemists and Chemical Engineers (NOBCCHE)
National Society of Black Engineers (NSBE)
National Society of Professional Engineers(NSPE)
Omega Chi Epsilon
Pi Tau Sigma
SAMPE (SAMPE)
Society of Applied Engineering Sciences (SAES)
Society of Hispanic Professional Engineers (SHPE)
Society of Plastics Engineers (SPE)
Society of Women Engineers
MSU Solar Car Racing Team
Student Engineering Council (SEC)
Tau Beta Pi MSU Chapter
Triangle Fraternity MSU Chapter
Upsilon Pi Epsilon
|
wikipedia
|
wiki_2654_chunk_3
|
Parameter (computer programming)
|
Example
The following program in the C programming language defines a function that is named "SalesTax" and has one parameter named "price". The type of price is "double" (i.e. a double-precision floating point number). The function's return type is also a double.
double SalesTax(double price)
{
return 0.05 * price;
} After the function has been defined, it can be invoked as follows:
SalesTax(10.00);
|
wikipedia
|
wiki_30779_chunk_6
|
Computational geophysics
|
Elsewhere, Rice University has a Center for Computational Geophysics, while Princeton University, the University of Texas, and California Institute of Technology have similar research centers. Experts, laboratories, projects, internships, undergraduate programs, graduate programs and/or facilities in the program exist at the University of Queensland, Wyoming University, Boston University, Stanford University, Uppsala University, Kansas State University, Kingston University, Australian National University, University of California, San Diego, University of Washington, ETH Zurich, University of Sydney, Appalachian State University, University of Minnesota, University of Tasmania, Bahria University, Boise State University, University of Michigan, University of Oulu, University of Utah, and others.
|
wikipedia
|
wiki_6721_chunk_31
|
Directorate-General for European Civil Protection and Humanitarian Aid Operations
|
European Parliament Report
The Committee on Development (CD) of the EP commissioned the Overseas Development Institute to undertake a project on the effectiveness of international development assistance from the European Commission in 2010. The project focused on the cases of Cambodia, Mozambique and Peru. The findings and policy suggested can be summarized as follows:
Harmonisation and alignment (H&A) is crucial for state capacity and should be expanded from sharing and spreading information to increasing joint activities in the short-term.
Donor harmonisation efforts need to be scaled up to include agreements on joint technical assistance and the streamlining of systems and procedures
Extremely fragmented aid systems impose unreasonably high transaction costs on the government, drains valuable resources, and fundamentally weakens state capacity.
EC procedures and structures remain highly complicated and bureaucratic.
Much of the success or failure of cooperation depends on individual interactions, specific innovators and appropriate staffing levels to carry out the tasks at hand, but the costs are also quite high.
Country Strategy Papers could improve aid effectiveness — but their quality is uneven.
Relations between HQ and delegations needs to be improved.
|
wikipedia
|
wiki_19897_chunk_4
|
Software evolution
|
Software evolution has been greatly impacted by the Internet: the rapid growth of World Wide Web and Internet Resources make it easier for users and engineers to find related information. open source development where anybody could download the source codes and hence modify it has enabled fast and parallel evolution (through forks). Types of software maintenance E.B. Swanson initially identified the
three categories of maintenance: corrective, adaptive, and perfective. Four categories of software were then catalogued by Lientz and Swanson (1980).
These have since been updated and normalized internationally in the ISO/IEC 14764:2006:
|
wikipedia
|
wiki_217_chunk_79
|
Euclidean algorithm
|
Combining the estimated number of steps with the estimated computational expense per step shows that the Euclid's algorithm grows quadratically (h2) with the average number of digits h in the initial two numbers a and b. Let h0, h1, ..., hN−1 represent the number of digits in the successive remainders r0, r1, ..., rN−1. Since the number of steps N grows linearly with h, the running time is bounded by
|
wikipedia
|
wiki_13393_chunk_29
|
Proof of impossibility
|
Can this string be compressed? Chaitin's proof For an exposition suitable for non-specialists see Beltrami p. 108ff. Also see Franzen Chapter 8 pp. 137–148, and Davis pp. 263–266. Franzén's discussion is significantly more complicated than Beltrami's and delves into Ω—Gregory Chaitin's so-called "halting probability". Davis's older treatment approaches the question from a Turing machine viewpoint. Chaitin has written a number of books about his endeavors and the subsequent philosophic and mathematical fallout from them.
|
wikipedia
|
wiki_25055_chunk_7
|
Javan warty pig
|
The most recent conservation project, through the World Association of Zoos and Aquariums, aims to capture healthy Javan warty pigs and breed them in captivity. The offspring of this program are then supposed to be released into protected habitats. This method of reintroduction of the offspring will ensure the long-term survival of the species. One of the problems with this project is finding true S. verrucosus, not hybrids, which brings up another goal of the program, molecular mapping. Scientists will extract DNA from the wild pigs and record their genetic code to separate hybrids from true S. verrucosus. Along with this project are plans to educate the locals about the importance and endangerment of this species. The locals sometimes comment that they cannot distinguish the banded pig from the Javan pig, and with education, this confusion can be reduced.
|
wikipedia
|
wiki_12142_chunk_10
|
Open Invention Network
|
Inter partes review is a procedure for challenging the validity of an issued patent owned by a third party. By challenging patents with IPRs, the Linux and broader open source community can help to eliminate them. Unified Patents has successfully invalidated a number of patents using Inter Partes Review.
Third-Party Preissuance Submissions provide for challenging the validity of a patent application. They provide a mechanism for third parties to submit prior art of potential relevance to the United States Patent and Trademark Office during the examination of another party’s patent application. In this way, the Linux and broader open source community can help to eliminate patents, and particularly help to mitigate the issuance of new low-quality patents. A patent application challenger may remain unnamed or anonymous by asking a firm to complete the Third-Party Preissuance Submission on its behalf.
Defensive publication, an intellectual property strategy used to prevent another party from obtaining a patent. The strategy consists in disclosing an enabling description and/or drawing of the product, apparatus, or method so that it enters the public domain and becomes prior art. Many defensive publications can be searched for free in IP.com’s Prior Art Database.
|
wikipedia
|
wiki_16629_chunk_7
|
List of Georgia Confederate Civil War units
|
Other units
1st (Fannin's) Reserves
1st (Symons') Reserves
1st Battalion, Reserves, Artillery
1st Battalion, Reserves, Cavalry
1st Battalion, Reserves, Infantry
1st City Battalion, Infantry (Columbus)
1st Confederate Battalion, Infantry
1st Local Troops, Infantry
1st Militia
1st Ordnance Battalion
1st Regiment (Army of Georgia)
1st Regiment (Reserves)
1st Regiment, Engineer Troops
1st Regiment, Infantry (Local Troops) (Augusta)
1st Regiment, Light Duty Men
1st Regiment, Troops and Defenses (Macon)
1st State Line
2nd Battalion Troops and Defences (Macon)
2nd Militia
2nd Regiment, Militia
2nd Reserves
2nd State Line, Including Stapleton's and Storey's 3d Infantry
2nd Division, Militia
3rd Reserves
4th (Avery's) Cavalry
4th (Clinch's) Cavalry
4th Infantry (State Guard)
4th Reserves
5th Militia
5th Reserves
6th Militia
6th Reserves
6th State Line
10th Militia
12th Militia
23rd Battalion, Militia (Cook's Reserve Battalion)
23rd Battalion, Infantry, Local Defense (Athens Battalion, Enfield Rifle Battalion)
25th Battalion, Infantry (Provost Guard)
27th Battalion, Infantry (Non-Conscripts)
Alexander's (Captain) Company, Cavalry
Alexander's (Captain) Company, Infantry
Allen's (Captain) Company, Cavalry
Anderson's (Captain) Company, Infantry (Anderson Guards)
Arnold's (Captain) Company, Cavalry
Arsenal Battalion, Infantry (Columbus)
Asher's (Captain) Company (Murray Cavalry)
Athens Reserve Corps, Infantry
Atlanta Arsenal Battery, Light Artillery (Local Troops)
Atwater's (Captain) Company, Infantry
Augusta Battalion, Infantry
Baird's (Captain) Company, Infantry
Baldwin Ordnance Battalion (Local Defense)
Bard's Company, Infantry
Barney's (Captain) Company, Infantry (Richmond Factory Guards)
Blue Ridge Tiger Regiment (State Guard)
Boddie's (Captain) Company (Troup [County] Independent Cavalry)
Bradshaw's Cavalry Battalion
Brook's (Captain) Company, Infantry (Mitchell Home Guards)
Camden County Militia (Mounted)
Caraker's (Captain) Company, Infantry (Milledgeville Guards)
Chapman's (Captain) Company, Infantry (Defenders)
Chatham Light Horse
City Battalion, Infantry (Columbus)
City Light Guards (Columbus)
Clemons' (Captain) Company, Infantry
Coast Guard Battalion, Militia
Cobb's Guards, Infantry
Coffee Revengers
Collier's (Captain) Company, Infantry
Collier's (Captain) Company, Infantry (Collier Guards)
Conscripts, Georgia
Corbin's (Captain) Company, Cavalry
Dorough's Battalion, Cavalry
Dozier's (Captain) Company, Infantry
Ezzard's (Captain) Company, Infantry
First Battalion, Reserve Cavalry
Floyd's (Captain) Company, Cavalry
Fuller's (Captain) Company, Infantry
Garrison's (Captain) Company, Infantry (Ogeechee Minute Men)
Gartrell's (Captain) Company, Cavalry
Green's (Captain) Company, Infantry (State Armory Guards)
Grubb's (Captain) Company, Infantry
Hall's (Captain) Company, Cavalry
Hamlet's (Captain) Company, Infantry
Hardwick Mounted Rifles
Harris' (Captain) Independent Company, Infantry (Brunswick Rifles)
Heard County Rangers, Infantry (part of the 41st Infantry)
Hendry's (Captain) Company, Cavalry (Atlantic and Gulf Guards)
Hendry's (Captain) Company, Mounted Infantry (Pierce Mounted Volunteers)
Holmes' (Captain) Company, Infantry (Wright Local Guards)
Howard's (Captain) Company, Infantry (Non-Conscripts)
Hull's (Captain) Company, Infantry
Humphrey's (Captain) Company, Independent Cavalry (Reserves)
Jackson's (Captain) Company, Infantry
Jones' (Captain) Company, Infantry (Jones Hussars)
Kay's (Captain) Company, Infantry (Franklin County Guards)
Lane's (Captain) Company, Infantry (Jasper and Butts County Guards)
Logan's (Captain) Company, Cavalry (White County Old Men's Home Guards)
Matthews' (Captain) Company, Infantry (East to West Point Guards)
Mayer's (Captain) Company (Appling Cavalry)
Medlin's (Captain) Independent Company, Infantry (High Shoals Defenders)
Milner's (Captain) Company, Infantry (Madison County Home Guard)
Miscellaneous, Georgia
Moore's (Captain) Company, Infantry (Baldwin Infantry)
Moring's (Captain) Company, Infantry (Emanuel Troops)
Nancy Harts (Nancy Hart Rifles)
Nelson's (Captain) Independent Company, Cavalry
Newbern's (Captain) Company, Cavalry (Coffee Revengers)
Pemberton's (Captain) Company, Cavalry
Pool's (Captain) Company, Infantry
Porter's (Captain) Company (Georgia Railroad Guards)
Preston's (Captain) Company (Railroad Guards)
Ragland's Company, Cavalry
Rigdon Guards
Roberts' (Captain) Company, Exempts
Roswell Battalion, Cavalry
Rowland's Battalion, Conscripts
Rumph's (Captain) Company (Wayne Cavalry Guards)
Russell's (Captain) Company (Newton Factory Employees)
Russell's (Captain) Company, Cavalry
Taylor's (Captain) Company
Thornton's (Captain) Company (Muscogee Guards)
Waring's (Lieutenant) Company, Cavalry
Weem's (Lieutenant) Detachment, Camp Guard (Augusta)
White's (Captain) Company
Whiteside's Naval Battalion, Infantry (Local Defense)
Witt's (Captain) Company (Express Infantry)
Wyly's (Captain) Company (Mell Scouts)
Young's (Captain) Company, Cavalry (Alleghany Troopers)
Youngblood's Battalion, Infantry
Zollicoffer Guards, Infantry
|
wikipedia
|
wiki_2017_chunk_3
|
Scale-free network
|
Recent interest in scale-free networks started in 1999 with work by Albert-László Barabási and colleagues at the University of Notre Dame who mapped the topology of a portion of the World Wide Web, finding that some nodes, which they called "hubs", had many more connections than others and that the network as a whole had a power-law distribution of the number of links connecting to a node. After finding that a few other networks, including some social and biological networks, also had heavy-tailed degree distributions, Barabási and collaborators coined the term "scale-free network" to describe the class of networks that exhibit a power-law degree distribution. However, studying seven examples of networks in social, economic, technological, biological, and physical systems, Amaral et al. were not able to find a scale-free network among these seven examples. Only one of these examples, the movie-actor network, had degree distribution P(k) following a power law regime for moderate k, though eventually this power law regime was followed by a sharp cutoff showing exponential decay for large k.
|
wikipedia
|
wiki_27680_chunk_0
|
Ultracomputer
|
The New York University's Ultracomputer is a significant processor design in the history of parallel computing. The system has N processors, N memories, and an N log N message-passing switch connecting them. The system supported an innovative fetch-and-add process coordination instruction, and the custom VLSI network switches could combine references (including fetch-and-adds) from several processors into a single reference, to reduce memory contention.
|
wikipedia
|
wiki_14026_chunk_10
|
Physics beyond the Standard Model
|
Koide formula - an unexplained empirical equation remarked upon by Yoshio Koide in 1981, and later by others. It relates the masses of the three charged leptons: . Standard Model does not predict masses of leptons (they are free parameters of the theory). However, the value of Koide formula being equal to 2/3 within experimental errors of measured lepton masses suggests existence of theory which is able to predict lepton masses.
The CKM matrix, if interpreted as a rotation matrix in a 3-dimensional vector space, "rotates" vector composed of square roots of down-type quark masses into vector of square roots of up-type quark masses , up to vector lengths, a result due to Kohzo Nishida.
The sum of squares of Yukawa couplings of all Standard Model fermions is approximately 0.98, which is very close to 1.
|
wikipedia
|
wiki_9097_chunk_8
|
The Civilizing Process
|
A particular criticism of The Civilizing Process was formulated by German ethnologist and cultural anthropologist Hans Peter Duerr in his 5-volume Der Mythos vom Zivilisationsprozeß (1988–2002), pointing out there existed plenty of social restrictions and regulations in Western culture and elsewhere since long before the Medieval period. Elias and his supporters responded that he had never intended to claim that social regulations or self-restraining psychological agents would be institutions singular to Western modernity, it is just that Western culture developed particularly sophisticated, concise, comprehensive, and rigid institutions apparent for instance in its decisive technological advances when compared to other cultures.<ref name="Lilienthal-2001">{{Citation |last=Lilienthal |first=Markus |chapter=Interpretation. Norbert Elias: Über den Prozeß der Zivilisation |editor-last1=Gamm |editor-first1=Gerhard |title=Interpretationen. Hauptwerke der Sozialphilosophie |publisher=Reclam |year=2001 |pages=134-147 |isbn=3150181143}}</ref>
|
wikipedia
|
wiki_942_chunk_13
|
CYK algorithm
|
Using the Coppersmith–Winograd algorithm for multiplying these matrices, this gives an asymptotic worst-case running time of . However, the constant term hidden by the Big O Notation is so large that the Coppersmith–Winograd algorithm is only worthwhile for matrices that are too large to handle on present-day computers , and this approach requires subtraction and so is only suitable for recognition. The dependence on efficient matrix multiplication cannot be avoided altogether: has proved that any parser for context-free grammars working in time can be effectively converted into an algorithm computing the product of -matrices with 0-1-entries in time , and this was extended by Abboud et al. to apply to a constant-size grammar.
|
wikipedia
|
wiki_16117_chunk_7
|
Engineering change order
|
With time-to-market pressures and rising mask costs in the semiconductor industry, several electronic design automation (EDA) companies are beginning to bring more automation into the ECO implementation process. Most popular place and route products have some level of built-in ECO routing to help with implementing physical-level ECOs. Cadence Design Systems has recently announced a product called conformal ECO designer, that automates the creation of Functional ECOs, usually the most tedious process in implementing an ECO. It uses formal equivalence checking and logic synthesis techniques to produce a gate-level ECO netlist based on the changed RTL. Synopsys in the past had a product called ECO compiler that is now defunct. Synopsys now has primetime-ECO for dealing with ECOs. Tweaker-F1 & Tweaker-T1 have also come into the limelight in the recent DAC-2012 for their ECO algorithms.
|
wikipedia
|
wiki_39291_chunk_7
|
List of awards and nominations received by Andrea Bocelli
|
|-
| style="text-align:center;" rowspan="4"| 2000 || style="text-align:left;"| Andrea Bocelli || Male Artist of the Year ||
|-
|style="text-align:left;"| Aria: The Opera Album || Album of the Year ||
|-
|style="text-align:left;" rowspan="2"|Sacred Arias || Album of the Year ||
|-
|| Best Selling Classical Album ||
|-
| style="text-align:center;"| 2001 || style="text-align:left;"| Verdi || Rover Album of the Year ||
|-
| style="text-align:center;"| 2002 || style="text-align:left;"| Andrea Bocelli || Outstanding Contribution to Music ||
|-
| style="text-align:center;" rowspan="3"| 2003 || style="text-align:left;" rowspan="3"| Sentimento || Male Artist of the Year ||
|-
|| Album of the Year ||
|-
|| Best Selling Classical Album ||
|-
| style="text-align:center;"| 2009 || style="text-align:left;"| Incanto || NS&I Album of the Year ||
|-
| style="text-align:center;" rowspan="3"| 2012 || style="text-align:left;"| Andrea Bocelli || International Artist of the Year ||
|-
| style="text-align:center;" rowspan="2"| Concerto: One Night in Central Park || Male Artist of the Year ||
|-
|| Album of the Year ||
|-
|
wikipedia
|
wiki_1565_chunk_13
|
Incidence algebra
|
Subset poset and exponential generating functions
For the Boolean poset of finite subsets ordered by inclusion , the reduced incidence algebra consists of invariant functions defined to have the same value on isomorphic intervals [S,T] and [S',T'] with |T\S| = |T'\S'|. Again, let t denote the invariant delta function with t(S,T) = 1 for |T\S| = 1 and t(S,T) = 0 otherwise. Its powers are: where the sum is over all chains and the only non-zero terms occur for saturated chains with since these correspond to permutations of n, we get the unique non-zero value n!. Thus, the invariant delta functions are the divided powers and we may write any invariant function as where [n] = {1, . . . , n}. This gives a natural isomorphism between the reduced incidence algebra and the ring of exponential generating functions. The zeta function is with Möbius function: Indeed, this computation with formal power series proves that Many combinatorial counting sequences involving subsets or labeled objects can be interpreted in terms of the reduced incidence algebra, and computed using exponential generating functions.
|
wikipedia
|
wiki_32944_chunk_11
|
Catalog of articles in probability theory
|
Binomial distribution / (1:D)
(a,b,0) class of distributions / (1:D)
Anscombe transform
Bernoulli distribution / (1:B)
Beta distribution / (1:C)
Bose–Einstein statistics / (F:D)
Cantor distribution / (1:C)
Cauchy distribution / (1:C)
Chi-squared distribution / (1:C)
Compound Poisson distribution / (F:DR)
Degenerate distribution / (1:D)
Dirichlet distribution / (F:C)
Discrete phase-type distribution / (1:D)
Erlang distribution / (1:C)
Exponential-logarithmic distribution / (1:C)
Exponential distribution / (1:C)
F-distribution / (1:C)
Fermi–Dirac statistics / (1F:D)
Fisher–Tippett distribution / (1:C)
Gamma distribution / (1:C)
Generalized normal distribution / (1:C)
Geometric distribution / (1:D)
Half circle distribution / (1:C)
Hypergeometric distribution / (1:D)
Normal distribution / Gau
Integration of the normal density function / Gau anl
Lévy distribution / (1:C)
Matrix normal distribution / Gau
Maxwell–Boltzmann statistics / (F:D)
McCullagh's parametrization of the Cauchy distributions / (1:C)
Multinomial distribution / (F:D)
Multivariate normal distribution / Gau
Negative binomial distribution / (1:D)
Pareto distribution / (1:C)
Phase-type distribution / (1:C)
Poisson distribution / (1:D)
Power law / (1:C)
Skew normal distribution / (1:C)
Stable distribution / (1:C)
Student's t-distribution / (1:C)
Tracy–Widom distribution / rmt
Triangular distribution / (1:C)
Weibull distribution / (1:C)
Wigner semicircle distribution / (1:C)
Wishart distribution / (F:C)
Zeta distribution / (1:D)
Zipf's law / (1:D)
|
wikipedia
|
wiki_9620_chunk_5
|
Lukhdhirji Engineering College
|
Academic departments
The institute has ten major academic departments:
Department of Electrical Engineering (Est. 1951, Intake- UG -120, PG-18)
Department of Civil Engineering (Est. 1951, Intake- UG -120, PG-18)
Department of Mechanical Engineering (Est. 1951, Intake- UG -60)
Department of IT Engineering (Est. 1999, Intake- UG -30)
Department of Production Engineering (Est. 1970, Intake- UG-30)
Department of Chemical Engineering (Est. 2008, Intake- UG -60)
Department of Industrial Engineering (Est. 1983, Intake- UG -30)
Department of Power Electronics Engineering (Est. 1983, Intake- UG -60, PG-18)
General Department (Humanities, Maths & Physics Department)
Applied Mechanics Department
|
wikipedia
|
wiki_15023_chunk_3
|
Naturalness (physics)
|
Suppose a physics model requires four parameters which allow it to produce a very high quality working model, calculations, and predictions of some aspect of our physical universe. Suppose we find through experiments that the parameters have values: 1.2
1.31
0.9 and
404,331,557,902,116,024,553,602,703,216.58 (roughly 4 x 1029).
|
wikipedia
|
wiki_7943_chunk_7
|
Paul Seymour (mathematician)
|
In about 1990 Robin Thomas began to work with Robertson and Seymour. Their collaboration resulted in several important joint papers over the next ten years:
a proof of a conjecture of Sachs, characterising by excluded minors the graphs that admit linkless embeddings in 3-space;
a proof that every graph that is not five-colourable has a six-vertex complete graph as a minor (the four-colour theorem is assumed to obtain this result, which is a case of Hadwiger's conjecture);
with Dan Sanders, a new, simplified, computer based proof of the four-colour theorem;
and a description of the bipartite graphs that admit Pfaffian orientations.
In the same period, Seymour and Thomas also published several significant results: (with Noga Alon) a separator theorem for graphs with an excluded minor, extending the planar separator theorem of Richard Lipton and Robert Tarjan; a paper characterizing treewidth in terms of brambles; and a polynomial-time algorithm to compute the branch-width of planar graphs.
|
wikipedia
|
wiki_11088_chunk_7
|
Tom Powers
|
A Window on Washington Park (1913) - The young millionaire
Barnaby Rudge (1915) - Barnaby Rudge
As Ye Repent (1915) - Harry Somers
The Auction Block (1917) - Bob Wharton
Double Indemnity (1944) - Mr. Dietrichson
Practically Yours (1944) - Commander Harry Harpe
The Phantom Speaks (1945) - Harvey Bogardus
The Chicago Kid (1945) - Mike Thurber
Two Years Before the Mast (1946) - Bellamer
The Blue Dahlia (1946) - Capt. Hendrickson
Her Adventurous Night (1946) - Dan Carter
The Last Crooked Mile (1946) - Floyd Sorelson
Angel and the Badman (1947) - Dr. Mangram
The Farmer's Daughter (1947) - Hy Nordick
For the Love of Rusty (1947) - Hugh Mitchell
They Won't Believe Me (1947) - Trenton
The Son of Rusty (1947) - Hugh Mitchell
I Love Trouble (1948) - Ralph Johnston
Up in Central Park (1948) - Rogan
The Time of Your Life (1948) - Freddy Blick (a stool pigeon and frame-up artist)
The Velvet Touch (1948) - Detective (uncredited)
Station West (1948) - Capt. Iles
Angel in Exile (1948) - Warden
Mexican Hayride (1948) - Ed Mason
Special Agent (1949) - Chief Special Agent Wilcox
Scene of the Crime (1949) - Umpire Menafoe
Chicago Deadline (1949) - Glenn Howard
Chinatown at Midnight (1949) - Capt. Howard Brown
East Side, West Side (1949) - Owen Lee
The Nevadan (1950) - Bill Martin
Destination Moon (1950) - General Thayer
Right Cross (1950) - Tom Balford
Again Pioneers (1950) - Ken Keeler
Fighting Coast Guard (1951) - Admiral Ryan
The Strip (1951) - Detective Lt. Bonnabel
The Tall Target (1951) - Simon G. Stroud (uncredited)
The Well (1951) - Mayor
Phone Call from a Stranger (1952) - Dr. Fernwood (uncredited)
Flesh and Fury (1952) - Andy Randolph
Deadline – U.S.A. (1952) - Andrew Wharton (uncredited)
The Fabulous Senorita (1952) - Delaney
Jet Job (1952) - Oscar Collins
Denver and Rio Grande (1952) - Sloan
Bal Tabarin (1952) - Eddie Mendies
Diplomatic Courier (1952) - Cherney (uncredited)
We're Not Married! (1952) - Atty. Gen. Frank Bush (uncredited)
The WAC from Walla Walla (1952) - General (uncredited)
Horizons West (1952) - Frank Tarleton
The Steel Trap (1952) - Valcourt, Travel Agent
The Marksman (1953) - Lt. Governor Watson
Scared Stiff (1953) - Police Lieutenant (uncredited)
Julius Caesar (1953) - Metellus Cimber
Hannah Lee (1953) - Sheriff
The Last Posse (1953) - Frank White
Devil's Canyon (1953) - Joe Holbert (uncredited)
I, the Jury (1953) - Milt Miller
Donovan's Brain (1953) - Donovan's Washington Advisor
Sea of Lost Ships (1953) - Rear Admiral
Lucky Me (1954) - Thayer Crony (uncredited)
The Mad Magician (1954) - Inspector (uncredited)
The Americano (1955) - Jim Rogers
Ten Wanted Men (1955) - Henry Green
New York Confidential (1955) - District Attorney Rossi
The Eternal Sea (1955) - General (uncredited)
Double Jeopardy (1955) - Harry Sheldon
The Go-Getter (1956) - Miller's Business Partner
|
wikipedia
|
wiki_13342_chunk_2
|
Suppliers and Parts database
|
SQL The following SQL schema is one possible expression of the Suppliers-and-Parts database. CREATE TABLE Supplier (
SID int primary key,
SName varchar(10) NOT NULL,
Status int NOT NULL,
City varchar(10) NOT NULL
) CREATE TABLE Part (
PID int primary key,
PName varchar(10) NOT NULL,
Color int NOT NULL,
Weight real NOT NULL,
City varchar(10) NOT NULL
)
|
wikipedia
|
wiki_22467_chunk_6
|
Quantile function
|
For statistical applications, users need to know key percentage points of a given distribution. For example, they require the median and 25% and 75% quartiles as in the example above or 5%, 95%, 2.5%, 97.5% levels for other applications such as assessing the statistical significance of an observation whose distribution is known; see the quantile entry. Before the popularization of computers, it was not uncommon for books to have appendices with statistical tables sampling the quantile function. Statistical applications of quantile functions are discussed extensively by Gilchrist.
|
wikipedia
|
wiki_11201_chunk_4
|
Mathematical Association
|
Past presidents
Past presidents of The Association for the Improvement of Geometrical Teaching included:
1871 Thomas Archer Hirst
1878 R B Hayward MA, FRS
1889 Professor G M Minchin MA, FRS
1891 James Joseph Sylvester
1892 The Reverend C Taylor DD
1893 R Wormell MA, DSc
1895 Joseph Larmor
Past presidents of The Mathematical Association have included:
1897 Alfred Lodge
1899–1900 Robert Stawell Ball
1901 John Fletcher Moulton, Baron Moulton
1903 Andrew Forsyth
1905 George Ballard Mathews
1907 George H. Bryan
1909–1910 Herbert Hall Turner
1911–1912 E. W. Hobson
1913–1914 Alfred George Greenhill
1915–1916 Alfred North Whitehead
1918–1919 Percy Nunn
1920 E. T. Whittaker
1921 James Wilson
1922–1923 Thomas Little Heath
1924–1925 G. H. Hardy
1926–1927 Micaiah John Muller Hill
1928–1929 William Fleetwood Sheppard
1930–1931 Arthur Eddington
1932–1933 G. N. Watson
1934 Eric Harold Neville
1935 A W Siddons
1936 Andrew Forsyth
1937 Louis Napoleon George Filon
1938 W Hope-Jones
1939 W C Fletcher
1944 C O Tuckey MA
1945 Sydney Chapman
1946 Warin Foster Bushell
1947 George Barker Jeffery
1948 Harold Spencer Jones
1949 A Robson MA
1950 Professor H R Hasse MA, DSc
1951 Mary Cartwright
1952 K S Snell MA
1953 Professor T A A Broadbent MA
1954 W. V. D. Hodge
1955 G L Parsons MA
1956 George Frederick James Temple
1957 W J Langford JP, MSc
1958 Max Newman
1959 Louise Doris Adams
1960 Edwin A. Maxwell
1961 J T Combridge MA, MSc
1962 Professor V C A Ferraro PhD, DIC
1963 J B Morgan MA
1964 Ida Busbridge
1965 Elizabeth Williams
1966 F W Kellaway BSc
1967 A.P. Rollett
1968 Charles Coulson
1969 Bertha Swirles
1970 James Lighthill
1971 B T Bellis MA, FRSE, FIMA
1972 C T Daltry BSc, FIMA
1973 William McCrea
1974 Margaret Hayman
1975 Reuben Goodstein
1976 E Kerr BSc, PhD, FIMA, FBCS
1977 Professor G Matthews MA, PhD, FIMA
1978 Alan Tammadge
1979 Clive W. Kilmister
1980 D A Quadling MA, FIMA, later OBE
1981 Michael Atiyah
1982 F J Budden BSc
1983 Rolph Ludwig Edward Schwarzenberger
1984 P B Coaker BSc, ARCS, DIC, FIMA, FBCS
1985 Hilary Shuard
1986 Anita Straker
1987 Margaret Rayner
1988 A.G. Howson
1989 Mr Peter Reynolds MA
1990 Margaret Brown
1991
1992 Mr John Hersee MA
1993 Dr William Wynne-Wilson BA, PhD
1994 Mary Bradburn
1995 E. Roy Ashley
1996 W. P. Richardson
1997 Tony Gardiner
1998 Professor J Chris Robson
1999 John S Berry
2000 Mr Stephen Abbott BSc, MSc
2001 Dr Sue Sanders Cert.Ed, BA, MEd, PhD
2002 Mr Barry Lewis BSc, BA, FIMA
2003 Christopher Zeeman
2004 Professor Adam McBride
2005 Sue Singer
2006 Mr Doug French
2007 Rob Eastaway
2008 Mr Robert Barbour
2009 Mrs Jane Imrie
2010 David Acheson
2011 Dr Paul Andrews
2012 Marcus Du Sautoy
2013 Peter Ransom
2014 Lynne McClure
2015 Peter M. Neumann
2016 Dr Jennie Golding
2017 Mr Tom Roper
2018 Professor Mike Askew
2019 Ems Lord
2020 Hannah Fry (President)
2021 Dr Chris Pritchard {President Designate)
|
wikipedia
|
wiki_2442_chunk_9
|
Cross-functional team
|
Greater range of users
Cross-functional teams consist of people from different parts of an organization. Information must be made understandable to all users. Not only engineers use technical data, and not only accountants use financial data, and not only human resources personnel use HR data. Modern organizations lack middle managers to combine, sort, and prioritize the data. Technical, financial, marketing, and all other types of information must come in a form that all members of a cross-functional team can understand. This involves reducing the amount of specialized jargon, sorting information based on importance, hiding complex statistical procedures from the users, giving interpretations of results, and providing clear explanations of difficult. Data visualization systems can present complex results in an intuitive manner.
|
wikipedia
|
wiki_33714_chunk_37
|
Traditional ecological knowledge
|
According to indigenous philosopher and climate/environmental justice scholar Kyle Powys Whyte, "Anishinabe people throughout the Great Lakes region are at the forefront of native species conservation and ecological restoration. Nmé is the largest and oldest living fish in the Great Lakes basin, sometimes exceeding 100 years in age. Nmé served the Asnishinabe people as a substantial source of food, an indicator species for monitoring the environment, and a lachlan identity, playing a role in ceremonies and stories. Kenny Pheasant, an elder says, "Decline of the sturgeon has corresponded with decline in sturgeon clan families. Only a few sturgeon clan families are known around here" (Little River Band). The Natural Resources Department of the Ottawa Indians started a cultural context group, composed of a diverse range of tribal members and biologists, which developed goals and objectives for restoration. The goal was to "restore the harmony and connectivity between Nmé and the Anishinabe people and bring them both back to the river. Ultimately, the department created the first streamside rearing facility for protecting young sturgeon before they are released each fall in order to preserve their genetic parentage. Wild rice, or manoomin, grows in shallow, clear, and slow-moving waterways and can be harvested in early autumn. After harvesting, manoomin is processed through activities such as drying, parching, hulling, winnowing, and cleaning. After the Anishinabe migrated from the East and reached the Great Lakes region where they could grow crops on the water, neighboring groups of US and Canadian citizens and companies engaged in activities such as mining, damming, commercial farming and recreational boating. These activities directly affect manoomin and its habitat. Today the Anishinabe people are leaders in the conservation of wild rice. The Nibi (water) and Manoomin Symposium, which takes place every two years, brings tribal rice harvesters in the Great Lakes, indigenous scholars, paddy rice growers, representatives from mining companies and state agencies, and university researchers interested in the genetic modification of rice together. Elders share their stories about manoomin and youth share their perspective on how manoomin fits into their futures. Indigenous persons working as scientists in their tribes share the experiences working with elders to understand the deep historical implications of the work they do to study and conserve manoomin. Other indigenous people are often invited to share their experiences restoring and conserving other native species, such as taro and maize."
|
wikipedia
|
wiki_34522_chunk_28
|
Variable (computer science)
|
Variable types (based on lifetime)
In terms of the classifications of variables, we can classify variables based on the lifetime of them. The different types of variables are static, stack-dynamic, explicit heap-dynamic, and implicit heap-dynamic. A static variable is also known as global variable, it is bound to a memory cell before execution begins and remains to the same memory cell until termination. A typical example is the static variables in C and C++. A Stack-dynamic variable is known as local variable, which is bound when the declaration statement is executed, and it is deallocated when the procedure returns. The main examples are local variables in C subprograms and Java methods. Explicit Heap-Dynamic variables are nameless (abstract) memory cells that are allocated and deallocated by explicit run-time instructions specified by the programmer. The main examples are dynamic objects in C++ (via new and delete) and all objects in Java. Implicit Heap-Dynamic variables are bound to heap storage only when they are assigned values. Allocation and release occur when values are reassigned to variables. As a result, Implicit heap-dynamic variables have the highest degree of flexibility. The main examples are some variables in JavaScript, PHP and all variables in APL.
|
wikipedia
|
wiki_26398_chunk_0
|
International Max Planck Research School for Molecular Biology
|
International Max Planck Research School for Molecular Biology, also known as IMPRS for Molecular Biology, is a 1.5 years MSc program or a 4-year PhD program. The first year in both graduate tracks is the same and the students are studying together. The curriculum consists of intensive theoretical lectures covering all major fields of the molecular biosciences. Each lecture is followed by a tutorial for in-depth discussion of the topics covered. The practical education consists of 3 months of 2-day methods courses and three 2-month lab rotation projects. All practical work is done in different research laboratories in Göttingen. After an examination at the end of the first year, based on the final grades it is possible to continue towards a MSc or PhD, or PhD with integrated MSc degrees. There are about 20 students accepted each year selected on a highly competitive basis from applicants from all over the world. The IMPRS for Molecular Biology was one of the founding member members (along with the IMPRS for Neurosciences) and is part of the Göttingen Graduate School for Neurosciences and Molecular Biosciences (GGNB). Every year students from the graduate program are organizing the renowned international PhD symposium Horizons in Molecular Biology.
|
wikipedia
|
wiki_9316_chunk_8
|
Computer-aided audit tools
|
Benefits of audit software include:
They are independent of the system being audited and will use a read-only copy of the file to avoid any corruption of an organization’s data.
Many audit-specific routines are used such as sampling.
Provides documentation of each test performed in the software that can be used as documentation in the auditor’s work papers. Audit specialized software may perform the following functions: Data queries.
Data stratification.
Sample extractions.
Missing sequence identification.
Statistical analysis.
Calculations.
Duplicate transaction identification.
Pivot table creation.
Cross tabulation. CAATs Education and Professional Development
|
wikipedia
|
wiki_28674_chunk_9
|
Biblical software
|
Software for research
The Open Source SHEBANQ project is an initiative of the Eep Talstra Centre for Bible and Computer (ETCBC) of the Vrije Universiteit Amsterdam. The basis of the project is the ETCBC-database of the Hebrew Bible. The database contains the Masoretic text of the Hebrew Bible, which is richly encoded on the levels of morphology and syntax. On their website shebanq.ancient-data.org the text and its features can be inspected and lexical and grammatical queries can be made in the Mini Query Language (MQL), to which one can refer in other publications. The website also shows which other projects based on the ETCBC database have been initiated. The Python package text-fabric is a platform independent research tool with which one can preprocess data from the ETCBC database and store them in any desired format. The SHEBANQ project is based on the specific demands of research. These demands were formulated during the Lorentz conference, held in Leiden 2012.
|
wikipedia
|
wiki_15967_chunk_1
|
List of MeSH codes (V04)
|
– research support, u.s. gov't, non-p.h.s. – research support, u.s. gov't, p.h.s.
– research support, n.i.h., extramural
– research support, n.i.h., intramural The list continues at List of MeSH codes (Z01). V04
|
wikipedia
|
wiki_15544_chunk_30
|
Systems Programming Language
|
BEGIN
INTEGER A:=0, B, C:=1;
PROCEDURE N(X,Y,Z);
INTEGER X,Y,Z;
X:=X*(Y+Z);
FOR B:=1 UNTIL 20 DO
N(A,B,C);
END. References Citations Bibliography Systems programming languages
HP software
|
wikipedia
|
wiki_17288_chunk_5
|
Smile (software)
|
SmileLab Smile provides an Aqua interface to make any data graph "manually", and libraries of commands to make graphs and process data by script (SmileLab can display at any moment the script corresponding to the user's action.) Performances The mathematical commands are optimized, and versatile thanks to AppleScript. Graphical documents (PDFs, bitmaps, videos of 1D, 2D, and 3D graphs, and custom graphics) are of professional printable quality.
|
wikipedia
|
wiki_19317_chunk_10
|
1952–53 United States network television schedule
|
Not returning from 1951–52:
Admission Free
After the Deadlines
The Amazing Mr. Malone
America's Health
Betty Crocker Star Matinee
The Bill Gwinn Show
Byline
The Carmel Myers Show
Celanese Theater
Charlie Wild, Private Detective
The Clock
Crime with Father
Curtain Call
Curtain Up
The Dell O'Dell Show
Don McNeill's TV Club
Gruen Guild Playhouse
Harness Racing
Herb Shriner Time
Hollywood Premiere Theatre
The Jerry Colonna Show
Lesson in Safety
Life with Linkletter
The Marshall Plan in Action
Massland at Home Party
Mr. Arsenic
Mr. District of Attorney
Music in Velvet
On Trial
Other Lands, Other People
Out of the Fog
Paul Dixon Show
Personal Appearance Theater
Pulitzer Prize Playhouse
Q.E.D.
The Ruggles
Say It with Acting
Studs' Place
The Symphony
Versatile Varieties
What Do You Think?
|
wikipedia
|
wiki_16935_chunk_5
|
Rings of Power (video game)
|
Plot
Long ago, the divine being Nexus the Benevolent used the Rod of Creation to turn the desolate planet of Ushka Bau into a paradise. He then granted humanity the gift of the Six Arts: the Art of Separation, practiced by knights; the Art of Summoning, practiced by conjurors; the Art of Force, practiced by archers; the Art of Change, practiced by enchanters; the Art of the Body, practiced by necromancers; and the Art of the Mind, practiced by sorcerers. After a long age of prosperity, Nexus's envious demonic brother Void the Destroyer stole the Rod and created an age of chaos that lasted 66 years. Nexus and Void engaged in a titanic battle that split the Rod in two, and each fled with half. They further divided their halves into eleven Rings of Power and hid them to keep each other from reassembling the Rod and taking power again.
|
wikipedia
|
wiki_36067_chunk_3
|
Janusz Brzozowski (computer scientist)
|
He received the following academic awards and honours:
NSERC Scientific Exchange Award to France (1974–1975)
Japan Society for the Promotion of Science Research Fellowship (1984)
Computing Research Association Certificate of Appreciation for outstanding contributions and service as a member of the CRA Board of Directors (1992)
Distinguished Professor Emeritus, University of Waterloo, Canada (1996)
Medal of Merit, Catholic University of Lublin, Poland (2001)
IBM Canada Canadian Pioneer in Computing (2005)
The Role of Theory in Computer Science, a one-day conference in honour of John Brzozowski's 80th birthday (2015)
The Role of Theory in Computer Science: Essays Dedicated to Janusz Brzozowski, World Scientific (2017)
Lifetime Achievement Award, Computer Science Canada/Informatique Canada (CS-CAN/INFO-CAN) (2016)
CIAA 2017 Sheng Yu Award for Best Paper for Complexity of Proper Prefix-Convex Regular Languages by J. Brzozowski and C. Sinnamon
CIAA 2018 Sheng Yu Award for Best Paper for State Complexity of Overlap Assembly by J. Brzozowski, L. Kari, B. Li, M. Szykula
|
wikipedia
|
wiki_362_chunk_39
|
Molecular nanotechnology
|
In the latest report A Matter of Size: Triennial Review of the National Nanotechnology Initiative put out by the National Academies Press in December 2006 (roughly twenty years after Engines of Creation was published), no clear way forward toward molecular nanotechnology could yet be seen, as per the conclusion on page 108 of that report: "Although theoretical calculations can be made today, the eventually attainable
range of chemical reaction cycles, error rates, speed of operation, and thermodynamic
efficiencies of such bottom-up manufacturing systems cannot be reliably
predicted at this time. Thus, the eventually attainable perfection and complexity of
manufactured products, while they can be calculated in theory, cannot be predicted
with confidence. Finally, the optimum research paths that might lead to systems
which greatly exceed the thermodynamic efficiencies and other capabilities of
biological systems cannot be reliably predicted at this time. Research funding that
is based on the ability of investigators to produce experimental demonstrations
that link to abstract models and guide long-term vision is most appropriate to
achieve this goal." This call for research leading to demonstrations is welcomed by groups such as the Nanofactory Collaboration who are specifically seeking experimental successes in diamond mechanosynthesis. The "Technology Roadmap for Productive Nanosystems" aims to offer additional constructive insights.
|
wikipedia
|
wiki_12624_chunk_17
|
Racket (programming language)
|
At the end of 2014, much of Racket's code was moved into a new packaging system separate from the main code base. This new packaging system is serviced by a client program named raco. The new package system provides fewer features than PLaneT; a blog post by Jay McCarthy on the Racket blog explains the rationale for the change and how to duplicate the older system. Integrated Language Extensibility and Macros
|
wikipedia
|
wiki_984_chunk_25
|
Multiplication algorithm
|
In 1980, Everett L. Johnson proposed using the quarter square method in a digital multiplier. To form the product of two 8-bit integers, for example, the digital device forms the sum and difference, looks both quantities up in a table of squares, takes the difference of the results, and divides by four by shifting two bits to the right. For 8-bit integers the table of quarter squares will have 29-1=511 entries (one entry for the full range 0..510 of possible sums, the differences using only the first 256 entries in range 0..255) or 29-1=511 entries (using for negative differences the technique of 2-complements and 9-bit masking, which avoids testing the sign of differences), each entry being 16-bit wide (the entry values are from (0²/4)=0 to (510²/4)=65025).
|
wikipedia
|
wiki_4506_chunk_8
|
De Casteljau's algorithm
|
which we evaluate individually using De Casteljau's algorithm. Geometric interpretation
The geometric interpretation of De Casteljau's algorithm is straightforward.
Consider a Bézier curve with control points . Connecting the consecutive points we create the control polygon of the curve.
Subdivide now each line segment of this polygon with the ratio and connect the points you get. This way you arrive at the new polygon having one fewer segment.
Repeat the process until you arrive at the single point – this is the point of the curve corresponding to the parameter .
The following picture shows this process for a cubic Bézier curve:
|
wikipedia
|
wiki_4361_chunk_7
|
Computer-aided software engineering
|
Tools
CASE tools support specific tasks in the software development life-cycle. They can be divided into the following categories:
Business and Analysis modeling. Graphical modeling tools. E.g., E/R modeling, object modeling, etc.
Development. Design and construction phases of the life-cycle. Debugging environments. E.g., IISE LKO.
Verification and validation. Analyze code and specifications for correctness, performance, etc.
Configuration management. Control the check-in and check-out of repository objects and files. E.g., SCCS, IISE.
Metrics and measurement. Analyze code for complexity, modularity (e.g., no "go to's"), performance, etc.
Project management. Manage project plans, task assignments, scheduling.
Another common way to distinguish CASE tools is the distinction between Upper CASE and Lower CASE. Upper CASE Tools support business and analysis modeling. They support traditional diagrammatic languages such as ER diagrams, Data flow diagram, Structure charts, Decision Trees, Decision tables, etc. Lower CASE Tools support development activities, such as physical design, debugging, construction, testing, component integration, maintenance, and reverse engineering. All other activities span the entire life-cycle and apply equally to upper and lower CASE.
|
wikipedia
|
wiki_1098_chunk_103
|
Ocean thermal energy conversion
|
OTEC News - OTEC News website
Educational material about OTEC by the NOAA Ocean Exploration program
Ocean Energy Council: How does OTEC work?
nrel.gov - what is OTEC?
US Department of Energy, Information Resources
Wired Magazine's interview with John Piña Craven on the future of OTEC
2007 edition of the Survey of Energy Resources produced by the World Energy Council
The Green Ocean Project - OTEC Library
Plumbing the oceans could bring limitless clean energy
Maximum water flow capacity of steel pipes - dimensions ranging 2 - 24 inches
Hainan Ocean Thermal Energy Conversion (OTEC) Power Plant, China
20,000 megawatts under the sea: Oceanic steam engines. New Scientist, March 1, 2014. Preview only.
http://otecfoundation.org/
http://otecnews.com/
https://web.archive.org/web/20140321052029/http://www.ioes.saga-u.ac.jp/en/about_lab.html (Saga University OTEC Research Facility)
http://www.OTEC.ws
http://www.lockheedmartin.com/us/products/otec.html
http://www.makai.com/e-otec.htm
http://www.ocees.com
http://www.otecokinawa.com (Okinawa OTEC Project)
|
wikipedia
|
wiki_15107_chunk_21
|
Epidemiological transition
|
Building on the existing body of evidence, Salomon and Murray (2002), further add nuances to the traditional theory of epidemiological transition by disintegrating it based on disease categories and different age-sex groups, positing that the epidemiological transition entails a real transition in the cause composition of age-specific mortality, as opposed to just a transition in the age structure. Using Global Burden of Disease data from 1990, they disintegrate the transition across three cause groups: communicable diseases, non-communicable diseases and injuries, seeking to explain the variation in all-cause mortality as a function of cause-specific mortality in 58 countries from 1950 to 1998. This analysis validates the underlying premise of the classic epidemiological transition theory: as total mortality declines and income rises, communicable diseases cause less and less mortality compared to non-communicable diseases and injuries. Decomposing this overall impact by age-sex groups, they find that for males, when overall mortality decreases, the importance of non-communicable diseases (NCDs) increases relative to the other causes with an age-specific impact on the role of injuries, whereas for women, both NCDs and injuries gain a more significant share with mortality decreases. For children over one year, they find that there is a gradual transition from communicable to non-communicable diseases, with injuries remaining significant in males. For young adults, the epidemiological transition is particularly different: for males, there is a shift from injuries to NCDs in lower income settings, and the opposite in higher-income settings; for females, rising income also signifies a shift from NCDs to injuries, but the role of injuries becomes more significant over time compared to males. Finally, for both males and females over 50, there is no epidemiological transition impact on the cause composition of mortality.
|
wikipedia
|
wiki_22016_chunk_11
|
Localized molecular orbitals
|
Pipek and Mezey originally used Mulliken charges, which are mathematically ill defined. Recently, Pipek-Mezey style schemes based on a variety of mathematically well-defined partial charge estimates have been discussed. Some notable choices are Voronoi charges, Becke charges, Hirshfeld or Stockholder charges, intrinsic atomic orbital charges, Bader charges, or "fuzzy atom" charges. Rather surprisingly, despite of the wide variation in the (total) partial charges reproduced by the different estimates, analysis of the resulting Pipek-Mezey orbitals has shown that the localized orbitals are rather insensitive to the partial charge estimation scheme used in the localization process. However, due to the ill-defined mathematical nature of Mulliken charges (and Löwdin charges, which have also been used in some works), as better alternatives are nowadays available it is advisable to use them in favor of the original version.
|
wikipedia
|
wiki_23109_chunk_5
|
List of Philippine mythological figures
|
Supreme Being: referred to as Mayo, in one account; probably regarded as remote as fear and meticulous ritual care are often related instead towards the Añitu
Mayo: a fisherfolk hero who introduced the yuyus used to catch flying fishes called dibang, which are in turn used to catch the summertime fish arayu
The Giver: the entity who provides all things; the souls of the upper class travel to the beings's abode in heaven and become stars
Añitu: refers to the souls of the dead, place spirits, and wandering invisibles not identified nor tied down to any particular locale or thing
Añitu between Chavidug and Chavayan: place spirit Añitus who were reported to create sounds when the gorge between Chavidug and Chavayan were being created through dynamite explosions; believed to have shifted their residences after the construction of the passage
Rirryaw Añitu: place spirit Añitus who played music and sang inside a cave in Sabtang, while lighting up fire; believed to have change residences after they were disturbed by a man
ji Rahet Añitu: a grinning place spirit Añitu who lived in an old tree; a man later cut the tree and found an earthen pot believed to have been owned by the Añitu
Nuvwan Añitu: good place spirit Añitus who saved a woman from a falling tree; they are offered rituals through the vivyayin
ji P'Supwan Añitu: good place spirit Añitus who became friends and allies of a mortal woman named Carmen Acido; sometimes taking in the form of dogs, they aided her and guided her in many of her tasks until her death from old age; despite their kindness towards Carmen, most people avoided the farm where they live
Mayavusay Añitu: place spirit Añitus living in a parcel of land in Mayavusay; sometimes take in the form of piglets, and can return cut vegetation parts into the mother vegetation
Cairn-dwelling Añitu: place spirit Añitus who lived in cairns and put a curse towards a man who destroyed their home; appearing as humans, the shaman Balaw conversed with them to right the wrong made by the man against their home
Mayuray Añitu: a wandering Añitu who expanded and was filled with darkness; encountered by a young boy who the spirit did not harm; referred as a kapri, Añitus who walk around and grow as tall as the height for their surroundings
Dayanak Añitu: a type of very small Añitu with red eyes and gold ornaments; accepting their gold ornaments will cause misfortune
|
wikipedia
|
wiki_15845_chunk_18
|
MRC Laboratory of Molecular Biology
|
Instrumentation
Scientific advances often depend on technological advances: the LMB has been at the forefront of many of these. Some major examples include nucleic acid sequencing, protein and antibody engineering, construction of new X-ray equipment and the invention of the scanning confocal microscope. Administrative structure
|
wikipedia
|
wiki_21924_chunk_1
|
Kasami code
|
Kasami Set
The process of generating a Kasami sequence is initiated by generating a maximum length sequence a(n), where n=1..2N-1. Maximum length sequences are periodic sequences with a period of exactly 2N-1. Next, a secondary sequence is derived from the initial sequence via cyclic decimation sampling as b(n) = a(q*n), where q = 2N/2+1. Modified sequences are then formed by adding a(n) and cyclically time shifted versions of b(n) using modulo-two arithmetic, which is also termed the exclusive or (xor) operation. Computing modified sequences from all 2N/2 unique time shifts of b(n) forms the Kasami set of code sequences.
|
wikipedia
|
wiki_7997_chunk_41
|
Advanced Idea Mechanics
|
Video games
A.I.M. troopers and attack bots appear in Marvel Ultimate Alliance, with the former voiced by Steve Blum.
A.I.M. appears in the 2008 Iron Man film tie-in game. They work with Obadiah Stane to develop an army of Iron Men based on Tony Stark's original prototype suit. Although their attempts to develop an effective power source fail, they are able to create Titanium Man. However, Iron Man defeats it before thwarting A.I.M.'s attempt to acquire various satellites' power sources.
A.I.M. appears in the PS2 and PSP versions of Spider-Man: Web of Shadows, having aligned themselves with Spencer Smythe.
A.I.M. agents appear in Marvel Super Hero Squad, voiced by Travis Willingham, Nolan North, and Troy Baker.
A.I.M. appears in the Iron Man 2 film tie-in game, with its agents voiced by Catherine Campion, Andrew Chaikin, Denny Delk, Eric Goldberg, Adam Harrington, and Roger L. Jackson. They work with Kearson DeWitt in collaboration with Roxxon to perfect the Ultimo Program.
A.I.M. and their R.A.I.D. (Radically Advanced Ideas of Destruction) branch appears in Marvel Avengers Alliance.
A.I.M. appears in Iron Man 3: The Official Game.
A.I.M. appears in Marvel Heroes. Led by MODOK, they are shown working with the Wizard and Doctor Octopus.
A.I.M. appears in Lego Marvel Super Heroes. Led by MODOK, they are among the supervillains that allied themselves with Doctor Doom. Iron Man, Thor, and Spider-Man track Doom aboard an A.I.M. submarine, where they defeat MODOK and his agents.
A.I.M., hybridized with Resident Evils Umbrella Corporation to create "A.I.M.brella", appears as a stage in Marvel vs. Capcom Infinite. Unlike other fused locations, which were created by Ultron Sigma after they fused their respective universes together, A.I.M.brella was a proper company merger, as both A.I.M. and Umbrella are led by warped scientists who chose to pool their resources.
A.I.M. agents appear in Lego Marvel Super Heroes 2.
A.I.M. is referenced in Spider-Man, providing funding to Otto Octavius when the city rescinds his development grant.
A.I.M. appears in Marvel's Avengers. Founded by Dr. George Tarleton after the events of "A-Day", this version is portrayed as a powerful multinational corporation built to protect the world through science as opposed to heroes. They also develop robotic synthoids that perform public service duties and manage the growing population of Inhumans. Five years later, A.I.M. has established a virtual police state in the U.S. Additionally, a young Inhuman named Kamala Khan discovers that the company's leaders are experimenting on Inhumans rather than curing them as well as harvesting their powers to create an army of Adaptoids to replace the Avengers. A warped Tarleton, now MODOK, intends to wipe out all Inhumans and superpowers on Earth, but he is defeated by Khan and the Avengers. After he is presumed dead, Monica Rappaccini assumes control of A.I.M. and its assets. Realizing that the company is still an active threat, the Avengers partner with S.H.I.E.L.D. to locate and take out A.I.M.'s remaining facilities around the world.
|
wikipedia
|
wiki_2222_chunk_8
|
Landscape ecology
|
Today, theory and application of landscape ecology continues to develop through a need for innovative applications in a changing landscape and environment. Landscape ecology relies on advanced technologies such as remote sensing, GIS, and models. There has been associated development of powerful quantitative methods to examine the interactions of patterns and processes. An example would be determining the amount of carbon present in the soil based on landform over a landscape, derived from GIS maps, vegetation types, and rainfall data for a region. Remote sensing work has been used to extend landscape ecology to the field of predictive vegetation mapping, for instance by Janet Franklin.
|
wikipedia
|
wiki_10288_chunk_3
|
Louis Vauxcelles
|
A movement I consider dangerous (despite the great sympathy I have for its perpetrators) is taking shape among a small clan of youngsters. A chapel has been established, two haughty priests officiating. MM Derain and Matisse; a few dozen innocent catechumens have received their baptism. Their dogma amounts to a wavering schematicism that proscribes modeling and volumes in the name of I-don't-know-what pictorial abstraction. This new religion hardly appeals to me. I don't believe in this Renaissance... M. Matisse, fauve-in-chief; M. Derain, fauve deputy; MM. Othon Friesz and Dufy, fauves in attendance... and M. Delaunay (a fourteen-year-old-pupil of M. Metzinger...), infantile fauvelet. (Vauxcelles, Gil Blas, 20 March 1907).
|
wikipedia
|
wiki_24017_chunk_5
|
School of Chemistry, University of Edinburgh
|
In the Research Assessment Exercise (RAE) 2008, the most in-depth analysis of research outputs for seven years, EaStCHEM, submitted 73% of all world leading outputs (4*) in Scotland and 12% of world leading outputs in all of the UK. From 31 submissions EastChem was the largest in UK Chemistry. EaStCHEM comes joint 4th in the Grade Point Average (GPA) metric, and first when staff numbers are factored in (the power ranking). Research Themes
The School has four major research themes as part of EaStCHEM:
|
wikipedia
|
wiki_16044_chunk_4
|
Math circle
|
Project-based clubs may spend a few meetings building origami, developing a math trail in their town, or programming a mathy computer game together. Math-rich projects may be artistic, exploratory, applied to sciences, executable (software-based), business-oriented, or directed at real contributions to local communities. Museums, cultural and business clubs, tech groups, online networks, artists/musicians/actors active in the community, and other individual professionals can make math projects especially real and meaningful. Increasingly, math clubs invite remote participation of active people (authors, community leaders, professionals) through webinar and teleconferencing software.
|
wikipedia
|
wiki_21609_chunk_3
|
Tricorn (mathematics)
|
Basic properties
The tricorn is compact, and connected. In fact, Nakane modified Douady and Hubbard's proof of the connectedness of the Mandelbrot set to construct a dynamically defined real-analytic diffeomorphism from the exterior of the tricorn onto the exterior of the closed unit disc in the complex plane. One can define external parameter rays of the tricorn as the inverse images of radial lines under this diffeomorphism.
Every hyperbolic component of the tricorn is simply connected.
The boundary of every hyperbolic component of odd period of the tricorn contains real-analytic arcs consisting of quasi-conformally equivalent but conformally distinct parabolic parameters. Such an arc is called a parabolic arc of the tricorn. This is in stark contrast with the corresponding situation for the Mandelbrot set, where parabolic parameters of a given period are known to be isolated.
The boundary of every odd period hyperbolic component consists only of parabolic parameters. More precisely, the boundary of every hyperbolic component of odd period of the tricorn is a simple closed curve consisting of exactly three parabolic cusp points as well as three parabolic arcs, each connecting two parabolic cusps.
Every parabolic arc of period k has, at both ends, an interval of positive length across which bifurcation from a hyperbolic component of odd period k to a hyperbolic component of period 2k occurs.
|
wikipedia
|
wiki_23502_chunk_0
|
Low-energy electron microscopy
|
Low-energy electron microscopy, or LEEM, is an analytical surface science technique used to image atomically clean surfaces, atom-surface interactions, and thin (crystalline) films. In LEEM, high-energy electrons (15-20 keV) are emitted from an electron gun, focused using a set of condenser optics, and sent through a magnetic beam deflector (usually 60˚ or 90˚). The “fast” electrons travel through an objective lens and begin decelerating to low energies (1-100 eV) near the sample surface because the sample is held at a potential near that of the gun. The low-energy electrons are now termed “surface-sensitive” and the near-surface sampling depth can be varied by tuning the energy of the incident electrons (difference between the sample and gun potentials minus the work functions of the sample and system). The low-energy elastically backscattered electrons travel back through the objective lens, reaccelerate to the gun voltage (because the objective lens is grounded), and pass through the beam separator again. However, now the electrons travel away from the condenser optics and into the projector lenses. Imaging of the back focal plane of the objective lens into the object plane of the projector lens (using an intermediate lens) produces a diffraction pattern (low-energy electron diffraction, LEED) at the imaging plane and recorded in a number of different ways. The intensity distribution of the diffraction pattern will depend on the periodicity at the sample surface and is a direct result of the wave nature of the electrons. One can produce individual images of the diffraction pattern spot intensities by turning off the intermediate lens and inserting a contrast aperture in the back focal plane of the objective lens (or, in state-of-the-art instruments, in the center of the separator, as chosen by the excitation of the objective lens), thus allowing for real-time observations of dynamic processes at surfaces. Such phenomena include (but are not limited to): tomography, phase transitions, adsorption, reaction, segregation, thin film growth, etching, strain relief, sublimation, and magnetic microstructure. These investigations are only possible because of the accessibility of the sample; allowing for a wide variety of in situ studies over a wide temperature range. LEEM was invented by Ernst Bauer in 1962; however, not fully developed (by Ernst Bauer and Wolfgang Telieps) until 1985.
|
wikipedia
|
wiki_34919_chunk_5
|
Process simulation
|
Efforts are made to develop new and improved models for the calculation of properties. This includes for example the description of
thermophysical properties like vapor pressures, viscosities, caloric data, etc. of pure components and mixtures
properties of different apparatus like reactors, distillation columns, pumps, etc.
chemical reactions and kinetics
environmental and safety-related data There are two main types of models:
Simple equations and correlations where parameters are fitted to experimental data.
Predictive methods where properties are estimated.
|
wikipedia
|
wiki_4142_chunk_10
|
Ant colony optimization algorithms
|
Algorithm and formula
In the ant colony optimization algorithms, an artificial ant is a simple computational agent that searches for good solutions to a given optimization problem. To apply an ant colony algorithm, the optimization problem needs to be converted into the problem of finding the shortest path on a weighted graph. In the first step of each iteration, each ant stochastically constructs a solution, i.e. the order in which the edges in the graph should be followed. In the second step, the paths found by the different ants are compared. The last step consists of updating the pheromone levels on each edge.
|
wikipedia
|
wiki_1466_chunk_26
|
One-instruction set computer
|
Arithmetic machine
In an attempt to make Turing machine more intuitive, Z. A. Melzac consider the task of computing with positive numbers. The machine has an infinite abacus, an infinite number of counters (pebbles, tally sticks) initially at a special location S. The machine is able to do one operation:
Take from location X as many counters as there are in location Y and transfer them to location Z and proceed to next instruction.
|
wikipedia
|
wiki_34910_chunk_48
|
Watson (computer)
|
Several startups in the healthcare space have been effectively using seven business model archetypes to take solutions based on IBM Watson to the marketplace. These archetypes depends on the value generate for the target user (e.g. patient focus vs. healthcare provider and payer focus) and value capturing mechanisms (e.g. providing information or connecting stakeholders).
|
wikipedia
|
wiki_6736_chunk_1
|
List of interactive geometry software
|
There are three main types of computer environments for studying school geometry: supposers, dynamic geometry environments (DGEs) and Logo-based programs. Most are DGEs: software that allows the user to manipulate ("drag") the geometric object into different shapes or positions. The main example of a supposer is the Geometric Supposer, which does not have draggable objects, but allows students to study pre-defined shapes. Nearly all of the following programs are DGEs. For a related, comparative physical example of these algorithms, see Lenart Sphere. License and platform
|
wikipedia
|
wiki_8969_chunk_14
|
Combat flight simulation game
|
Study
The "study sim" is a genre of simulation games that focuses on modelling an aircraft's systems as accurately as possible. Advancing computer technology made this possible, with the development of highly detailed models that improved upon the fidelity of avionics, weapons systems, physics, flight models, graphics, etc. and allowed for fully interactive cockpits where virtually every control was mapped and functional. This was important as modern jet combat aircraft and helicopters have a variety of complex electronic and weapon systems that are specific to a particular aircraft.
|
wikipedia
|
wiki_8558_chunk_6
|
Somatic cell count
|
As discussed in the paper Guidelines for Using the DHI Somatic Cell Count Program:
The results of many studies suggest that cows with SCC of less than 200,000 are not likely to be infected with major mastitis pathogens, but cows with SCC above 300,000 are probably infected (Smith, 1996).
Herds with bulk tank SCC above 200,000 will have varying degrees of subclinical mastitis present. Data from the National Mastitis Council (1987) show that 6% of the [udder] quarters in a herd could be expected to be infected in a herd with a bulk tank SCC of 200,000.
At 500,000 SCC, 16% of the quarters may be infected with a 6% reduction in milk production compared to a SCC of 200,000.
|
wikipedia
|
wiki_16079_chunk_11
|
Energy (psychological)
|
Concerning meta-analyses, four revealed a large effect size and one a moderate effect size. The Gilomen & Lee (2015) meta-analysis indicated a moderate effect size of tapping on psychological distress (utilizing Hedge’s g as compared to the standard Cohen’s h), although they opined that the results could be due to factors common to other therapeutic approaches, and not necessarily due to tapping. Nelms & Castel (2016) found a large effect size on tapping for depression, Clond’s (2017) revealed a large effect size for treating anxiety, and Sebastian & Nelms (2017) also indicated a large effect size for PTSD. Regarding the question of acupoint tapping as an active therapeutic ingredient, the meta-analysis by Church, Stapleton, Kip & Gallo (2020) revealed a large effect size in this regard, supporting tapping as an active therapeutic ingredient.
|
wikipedia
|
wiki_843_chunk_47
|
Threaded code
|
External links
Anton Ertl's explanatory page What is Threaded Code? describes different threading techniques and provides further references.
The Development of the C Language by Dennis M. Ritchie describes B (a precursor of C) as implemented using "threaded code".
Thinking Forth Project includes the seminal (but out of print) book Thinking Forth by Leo Brodie published in 1984.
Starting FORTH online version of the book Starting FORTH by Leo Brodie published in 1981.
Brad Rodriguez's Moving FORTH: Part 1: Design Decisions in the Forth Kernel covers threading techniques in depth.
History of general purpose CPUs
GCC extensions. Labels as Values
(NB. Brief overview on the threaded languages, System and User RPL, used on the HP calculators like the HP 48.)
|
wikipedia
|
wiki_16371_chunk_6
|
Evolutionary educational psychology
|
Stated differently, Is the goal of education to have children recreate the process of discovery, to learn the products of discovery, or some combination? Some educators have advocated a focus on the process of discovery without full consideration of the constellation of traits and opportunity that contribute to the creation of secondary knowledge (e.g., Cobb, Yackel, & Wood, 1992). In fact, research on creative-productive individuals suggests that the full constellation of traits that facilitate the discovery and creation of secondary knowledge is rare and not likely reproducible on a large scale (Simonton, 1999a, 1999b, 2003; Sternberg, 1999; Wai, Lubinski, & Benbow, 2005).
|
wikipedia
|
wiki_24815_chunk_21
|
Sociological classifications of religious movements
|
Johnstone provides the following seven characteristics of churches:
Claim universality, include all members of the society within their ranks, and have a strong tendency to equate "citizenship" with "membership"
Exercise religious monopoly and try to eliminate religious competition
Are very closely allied with the state and secular powers; frequently there is overlapping of responsibilities and much mutual reinforcement
Are extensively organized as a hierarchical bureaucratic institution with a complex division of labor
Employ professional, full-time clergy who possess the appropriate credentials of education and formal ordination
Primarily gain new members through natural reproduction and the socialization of children into the ranks
Allow for diversity by creating different groups within the church (e.g., orders of nuns or monks) rather than through the formation of new religions
|
wikipedia
|
wiki_7873_chunk_3
|
Medical algorithm
|
Examples of medical algorithms are:
Calculators, e.g. an on-line or stand-alone calculator for body mass index (BMI) when stature and body weight are given;
Flowcharts and drakon-charts, e.g. a binary decision tree for deciding what is the etiology of chest pain
Look-up tables, e.g. for looking up food energy and nutritional contents of foodstuffs
Nomograms, e.g. a moving circular slide to calculate body surface area or drug dosages.
|
wikipedia
|
wiki_5549_chunk_24
|
Nanotechnology education
|
United Kingdom
Bangor University - master's
University of Birmingham - Ph.D
University of Cambridge - master's, Ph.D
Cranfield University - master's, Ph.D (Certificate/Degree Programs)
Heriot-Watt University - bachelor's, master's
Lancaster University - master's
Imperial College London - master's
University College London - master's
University of Leeds - bachelor's, master's
University of Liverpool - master's
University of Manchester- Ph.D
University of Nottingham - master's
University of Oxford - Postgraduate Certificate
University of Sheffield - master's, Ph.D
University of Surrey - master's
University of Sussex - bachelor's
University of Swansea- B.Eng, M.Eng, M.Sc, M.Res, M.Phil and Ph.D
University of Ulster - master's
University of York- bachelor's, master's
|
wikipedia
|
wiki_877_chunk_18
|
Deep Blue (chess computer)
|
External links
IBM.com, IBM Research pages on Deep Blue
IBM.com, IBM page with the computer logs from the games
Chesscenter.com, Open letter from Feng-hsiung Hsu on the aborted rematch with Kasparov, The Week in Chess Magazine, issue 270, 10 January 2000
Chesscenter.com, Open Letter from Owen Williams (Gary Kasparov's manager), responding to Feng-hsiung Hsu, 13 January 2000
Sjeng.org, Deep Blue system described by Feng-hsiung Hsu, Murray Campbell and A. Joseph Hoane Jr. (PDF)
Chessclub.com, ICC Interview with Feng-Hsiung Hsu, an online interview with Hsu in 2002 (annotated)
|
wikipedia
|
wiki_8469_chunk_9
|
Superconducting quantum computing
|
In the table below, the three archetypes are reviewed. In the first row, the qubit electrical circuit diagram is presented. In the second, the quantum Hamiltonian derived from the circuit is shown. Generally, the Hamiltonian can be divided to a "kinetic" and "potential" parts, in analogy to a particle in a potential well. The particle mass corresponds to some inverse function of the circuit capacitance, while the shape of the potential is governed by the regular inductors and Josephson junctions. One of the first challenges in qubit design is to shape the potential well and to choose the particle mass in a way that the energy separation between specific two of the energy levels will differ from all other inter-level energy separations in the system. These two levels will be used as the logical states of the qubit. The schematic wave solutions in the third row of the table depict the complex amplitude of the phase variable. In other words, if a phase of the qubit is measured while the qubit is in a specific state, there is a non-zero probability to measure a specific value only where the depicted wave function oscillates. All three rows are essentially three different presentations of the same physical system.
|
wikipedia
|
wiki_2524_chunk_38
|
Heyting algebra
|
Heyting algebra of propositional formulas in n variables up to intuitionist equivalence
The metaimplication in the section "Provable identities" is proved by showing that the result of the following construction is itself a Heyting algebra:
Consider the set L of propositional formulas in the variables A1, A2,..., An.
Endow L with a preorder ≼ by defining F≼G if G is an (intuitionist) logical consequence of F, that is, if G is provable from F. It is immediate that ≼ is a preorder.
Consider the equivalence relation F∼G induced by the preorder F≼G. (It is defined by F∼G if and only if F≼G and G≼F. In fact, ∼ is the relation of (intuitionist) logical equivalence.)
Let H0 be the quotient set L/∼. This will be the desired Heyting algebra.
We write [F] for the equivalence class of a formula F. Operations →, ∧, ∨ and ¬ are defined in an obvious way on L. Verify that given formulas F and G, the equivalence classes [F→G], [F∧G], [F∨G] and [¬F] depend only on [F] and [G]. This defines operations →, ∧, ∨ and ¬ on the quotient set H0=L/∼. Further define 1 to be the class of provably true statements, and set 0=[⊥].
Verify that H0, together with these operations, is a Heyting algebra. We do this using the axiom-like definition of Heyting algebras. H0 satisfies conditions THEN-1 through FALSE because all formulas of the given forms are axioms of intuitionist logic. MODUS-PONENS follows from the fact that if a formula ⊤→F is provably true, where ⊤ is provably true, then F is provably true (by application of the rule of inference modus ponens). Finally, EQUIV results from the fact that if F→G and G→F are both provably true, then F and G are provable from each other (by application of the rule of inference modus ponens), hence [F]=[G].
|
wikipedia
|
wiki_16399_chunk_6
|
Autonomic networking
|
In the case of autonomic networking, the state of the network may be defined by inputs from:
individual network elements such as switches and network interfaces including
specification and configuration
historical records and current state
traffic flows
end-hosts
application performance data
logical diagrams and design specifications Most of these sources represent relatively raw and unprocessed views that have limited relevance. Post-processing and various forms of analysis must be applied to generate meaningful measurements and assessments against which current state can be derived.
|
wikipedia
|
wiki_7017_chunk_7
|
Concurrent engineering
|
Challenges associated with concurrent design
Concurrent design comes with a series of challenges, such as implementation of early design reviews, dependency on efficient communication between engineers and teams, software compatibility, and opening up the design process. This design process usually requires that computer models (computer aided design, finite element analysis) are exchanged efficiently, something that can be difficult in practice. If such issues are not addressed properly, concurrent design may not work effectively. It is important to note that although the nature of some project activities project imposes a degree of linearity—completion of software code, prototype development and testing, for example—organizing and managing project teams to facilitate concurrent design can still yield significant benefits that come from the improved sharing of information.
|
wikipedia
|
wiki_3756_chunk_3
|
Function pointer
|
The following C program illustrates the use of two function pointers:
func1 takes one double-precision (double) parameter and returns another double, and is assigned to a function which converts centimetres to inches.
func2 takes a pointer to a constant character array as well as an integer and returns a pointer to a character, and is assigned to a C string handling function which returns a pointer to the first occurrence of a given character in a character array. #include <stdio.h> /* for printf */
#include <string.h> /* for strchr */
|
wikipedia
|
wiki_11615_chunk_17
|
Mathematics of Sudoku
|
In a 2005 study, Felgenhauer and Jarvis analyzed the permutations of the top band used in valid solutions. Once the Band1 symmetries and equivalence classes for the partial grid solutions were identified, the completions of the lower two bands were constructed and counted for each equivalence class. Summing completions over the equivalence classes, weighted by class size, gives the total number of solutions as 6,670,903,752,021,072,936,960, confirming the value obtained by QSCGZ. The value was subsequently confirmed numerous times independently. A second enumeration technique based on band generation was later developed that is significantly less computationally intensive.
This subsequent technique resulted in roughly needing 1/97 of the number of computation cycles as the original techniques, but was significantly more complicated to set up.
|
wikipedia
|
wiki_39963_chunk_8
|
Read code
|
Read version 3 (Clinical Terms Version 3 or 'CTV3')
A third and more radically progressive version was devised through the 1990s in an attempt to address some of the more serious technical limitations of the earlier designs, including:
Although codes remain 5-bytes in length, the hierarchical relationship between codes is no longer represented through the codes themselves but rather through a separate table listing all binary parent-child relations; this allows for a polyhierarchy of indefinite depth.
Codes exist independently from the terms associated with them; terms now have their own 5-Byte code identifier, usually beginning with the letter 'Y'
Both concept codes and term codes have a release status, thus allowing authoring errors to be corrected: concepts and terms may be moved to different places in the polyhierarchy between releases, or retired from the scheme (and hierarchy) altogether.
A large scale professional consultation exercise, the 'Clinical Terms Project', was conducted to identify clinically valuable concepts that were not codable within version 2. This led to a significant expansion in the content of CTV3, including improved support for the various 'professions allied to medicine', such as speech therapy, physiotherapy and community nursing.
CTV3 concepts can be qualified or 'post-coordinated' by the addition of further codes, to form compound expressions with more detailed semantics than may be expressed by any single code alone. For example, a procedure code can be associated via a laterality attribute code with a laterality value (left/right/bilateral).
Many concepts were provided with partially modelled definitions. Thus, many surgical procedures have a 'site' relationship linking to the code for the anatomical target(s) of the procedure:
|
wikipedia
|
wiki_18247_chunk_3
|
Networks II
|
Hacks
Hosting of multiple forums.
Threading of forums
Binary searching the user entries (instead of sequential database access)
Loading pointers into memory instead of the slow sequential text file methodology
Support for extended and lower case characters.
Interactive games and surveys.
Switching from Networks II to ASCII Express Professional without disconnecting the user. This allowed Networks II to indirectly support XMODEM, Ward Christensen protocol, ZMODEM, and other advanced file transfer protocols. The only problem with this hack is that ASCII Express Pro cannot re-connect to Networks II.
Support for more than two disk drives, i.e. support for multiple volumes when used with a hard disk drive.
Support for ProDOS 8.
|
wikipedia
|
wiki_18764_chunk_76
|
Anonymous function
|
Performance metrics to analyze the space and time complexities of function calls, call stack, etc. in a JavaScript interpreter engine implement easily with these last anonymous function constructs. From the implications of the results, it is possible to deduce some of an engine's recursive versus iterative implementation details, especially tail-recursion. Julia
In Julia anonymous functions are defined using the syntax (arguments)->(expression),
julia> f = x -> x*x; f(8)
64
julia> ((x,y)->x+y)(5,6)
11
|
wikipedia
|
wiki_35535_chunk_3
|
Business & Information Systems Engineering
|
Types of Submissions
BISE allows different types of submissions. Research articles are the core of the journal and provide completed research results as original and substantial contributions to the literature. The journal also publishes research notes, which promote the dialogue among the community on new and emerging developments. This can include reports on new conceptual ideas or successful applications in the field, which are relevant to practitioners and encourage future research. BISE also publishes state-of-the-art articles, which survey recent developments in a particular field of interest. All of the above types of submissions are double-blind peer-reviewed research contributions. The Department Human Computer Interaction and Social Computing is accepting Registered Reports since 2019.
|
wikipedia
|
wiki_25_chunk_53
|
Algebraic geometry
|
Algebraic stacks can be further generalized and for many practical questions like deformation theory and intersection theory, this is often the most natural approach. One can extend the Grothendieck site of affine schemes to a higher categorical site of derived affine schemes, by replacing the commutative rings with an infinity category of differential graded commutative algebras, or of simplicial commutative rings or a similar category with an appropriate variant of a Grothendieck topology. One can also replace presheaves of sets by presheaves of simplicial sets (or of infinity groupoids). Then, in presence of an appropriate homotopic machinery one can develop a notion of derived stack as such a presheaf on the infinity category of derived affine schemes, which is satisfying certain infinite categorical version of a sheaf axiom (and to be algebraic, inductively a sequence of representability conditions). Quillen model categories, Segal categories and quasicategories are some of the most often used tools to formalize this yielding the derived algebraic geometry, introduced by the school of Carlos Simpson, including Andre Hirschowitz, Bertrand Toën, Gabrielle Vezzosi, Michel Vaquié and others; and developed further by Jacob Lurie, Bertrand Toën, and Gabriele Vezzosi. Another (noncommutative) version of derived algebraic geometry, using A-infinity categories has been developed from the early 1990s by Maxim Kontsevich and followers.
|
wikipedia
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.