id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_7093_chunk_7
Two-port network
Figure 3 shows a bipolar current mirror with emitter resistors to increase its output resistance. Transistor Q1 is diode connected, which is to say its collector-base voltage is zero. Figure 4 shows the small-signal circuit equivalent to Figure 3. Transistor Q1 is represented by its emitter resistance rE ≈ VT/IE (VT is thermal voltage, IE is Q-point emitter current), a simplification made possible because the dependent current source in the hybrid-pi model for Q1 draws the same current as a resistor 1 / gm connected across rπ. The second transistor Q2 is represented by its hybrid-pi model. Table 1 below shows the z-parameter expressions that make the z-equivalent circuit of Figure 2 electrically equivalent to the small-signal circuit of Figure 4.
wikipedia
wiki_6999_chunk_14
Foreign exchange option
The earliest currency options pricing model was published by Biger and Hull, (Financial Management, spring 1983). The model preceded the Garmam and Kolhagen's Model. In 1983 Garman and Kohlhagen extended the Black–Scholes model to cope with the presence of two interest rates (one for each currency). Suppose that is the risk-free interest rate to expiry of the domestic currency and is the foreign currency risk-free interest rate (where domestic currency is the currency in which we obtain the value of the option; the formula also requires that FX rates – both strike and current spot be quoted in terms of "units of domestic currency per unit of foreign currency"). The results are also in the same units and to be meaningful need to be converted into one of the currencies.
wikipedia
wiki_565_chunk_11
Semantic network
SciCrunch is a collaboratively edited knowledge base for scientific resources. It provides unambiguous identifiers (Research Resource IDentifiers or RRIDs) for software, lab tools etc. and it also provides options to create links between RRIDs and from communities. Another example of semantic networks, based on category theory, is ologs. Here each type is an object, representing a set of things, and each arrow is a morphism, representing a function. Commutative diagrams also are prescribed to constrain the semantics.
wikipedia
wiki_2261_chunk_8
Polymorphism (computer science)
data List a = Nil | Cons a (List a) length :: List a -> Integer length Nil = 0 length (Cons x xs) = 1 + length xs map :: (a -> b) -> List a -> List b map f Nil = Nil map f (Cons x xs) = Cons (f x) (map f xs) Parametric polymorphism is also available in several object-oriented languages. For instance, templates in C++ and D, or under the name generics in C#, Delphi and Java:
wikipedia
wiki_22864_chunk_1
Compile-time function execution
If the value of only some of the arguments are known, the compiler may still be able to perform some level of compile-time function execution (partial evaluation), possibly producing more optimized code than if no arguments were known. Examples The Lisp macro system is an early example of the use of compile-time evaluation of user-defined functions in the same language. The Metacode extension to C++ (Vandevoorde 2003) was an early experimental system to allow compile-time function evaluation (CTFE) and code injection as an improved syntax for C++ template metaprogramming.
wikipedia
wiki_34205_chunk_42
Wiles's proof of Fermat's Last Theorem
Among the introductory presentations are an email which Ribet sent in 1993; Hesselink's quick review of top-level issues, which gives just the elementary algebra and avoids abstract algebra; or Daney's web page, which provides a set of his own notes and lists the current books available on the subject. Weston attempts to provide a handy map of some of the relationships between the subjects. F. Q. Gouvêa's 1994 article "A Marvelous Proof", which reviews some of the required topics, won a Lester R. Ford award from the Mathematical Association of America. Faltings' 5-page technical bulletin on the matter is a quick and technical review of the proof for the non-specialist. For those in search of a commercially available book to guide them, he recommended that those familiar with abstract algebra read Hellegouarch, then read the Cornell book, which is claimed to be accessible to "a graduate student in number theory". The Cornell book does not cover the entirety of the Wiles proof.
wikipedia
wiki_25948_chunk_2
Listing (computer)
Assembly-code listings are occasionally analysed by programmers who want to understand how a compiler is translating their source code into assembly language. For example, the GNU C Compiler (gcc) will produce an assembly code listing if it is invoked with the command-line option -S. Listings of computer programs are still important in US patent law. They are defined as follows in the Manual of Patent Examining Procedure: References External links WordPress Price List Builder Source code Text editor features
wikipedia
wiki_2861_chunk_28
Cooley–Tukey FFT algorithm
The following is pseudocode for iterative radix-2 FFT algorithm implemented using bit-reversal permutation. algorithm iterative-fft is input: Array a of n complex values where n is a power of 2. output: Array A the DFT of a. bit-reverse-copy(a, A) n ← a.length for s = 1 to log(n) do m ← 2s ωm ← exp(−2πi/m) for k = 0 to n-1 by m do ω ← 1 for j = 0 to m/2 – 1 do t ← ω A[k + j + m/2] u ← A[k + j] A[k + j] ← u + t A[k + j + m/2] ← u – t ω ← ω ωm return A
wikipedia
wiki_12069_chunk_8
Functional Requirements for Bibliographic Records
Further reading Karen Coyle, FRBR Before and After, online, CC-BY license. American Library Association, 2015. IFLA Study Group on the Functional Requirements for Bibliographic Records. Functional requirements for bibliographic records : final report. — München: K.G. Saur, 1998. — (UBCIM publications ; new series, vol. 19). — . (Accessed Nov. 6, 2005) Tillett, Barbara. FRBR: A Conceptual Model for the Bibliographic Universe. Library of Congress Cataloging Distribution Service, 2004. (Accessed Nov. 6, 2005)
wikipedia
wiki_10308_chunk_10
Kozloduy Nuclear Power Plant
In 2013 the Austrian Environment Agency prepared a report on the Bulgarian Ministry for the Environment's Environmental Impact Assessment (EIA) on the proposed 7th unit of the Kozloduy Nuclear Power Plant. It assesses whether the EIA-Report allows for making reliable conclusions about the potential trans-boundary impacts on Austria. The Austrian report considers the assumption, that the Kozloduy NPP site is flood-proof, to be well-founded and the seismic hazard at the site to be low (but points out that the seismic hazard study needs updating as it was performed 20 years ago). It also highlights a number of unsubstantiated claims and some failings in the Bulgarian EIA report. These include: shortcomings in the safety analyses of the reactors being considered, including a lack of the consideration of post-Fukushima lessons learned and, as far as applicable, the use of the concept of practical elimination (pgs 60-61); serious gaps in the assessment of the impact of external human induced events such as crashes, leaks etc. (pgs 72-73); contrary to IAEA (2002) analysis requirements, the EIA report does not contain considerations about the formation of pressure shock waves and their possible impact on buildings of the NNU due to explosions outside the perimeter of the NPP (pg 73) no comprehensible technical basis provided for an evaluation of design basis accidents and severe accidents (pg 84) only three (insufficient) “typical” dry case weather conditions were used for the calculations of the trans-boundary impacts on the Austrian territory, not worse case scenarios.
wikipedia
wiki_11322_chunk_10
Proof complexity
For many weak proof systems it is known that they do not simulate certain stronger systems (see below). However, the question remains open if the notion of simulation is relaxed. For example, it is open whether Resolution effectively polynomially simulates Extended Frege. Automatability of proof search An important question in proof complexity is to understand the complexity of searching for proofs in proof systems. Problem (Automatability) Are there efficient algorithms searching for proofs in standard proof systems such as Resolution or the Frege system? The question can be formalized by the notion of automatability (also known as automatizability).
wikipedia
wiki_24188_chunk_26
Model of hierarchical complexity
Algebra (Commons, Giri, & Harrigan, 2014) Animal stages (Commons & Miller, 2004) Atheism (Commons-Miller, 2005) Attachment and loss (Commons, 1991; Miller & Lee, 2000) Balance beam and pendulum (Commons, Goodheart, & Bresette, 1995; Commons, Giri, & Harrigan, 2014) Contingencies of reinforcement (Commons & Giri, 2016) Counselor stages (Lovell, 2002) Empathy of hominids (Commons & Wolfsont, 2002) Epistemology (Kitchener & Fischer, 1990; Kitchener & King, 1990) Evaluative reasoning (Dawson, 2000) Four story problem (Commons, Richards & Kuhn, 1982; Kallio & Helkama, 1991) Good education (Dawson-Tunik, 2004) Good interpersonal relations (Armon, 1984a; Armon, 1984b; Armon, 1989) Good work (Armon, 1993) Honesty and kindness (Lamborn, Fischer & Pipp, 1994) Informed consent (Commons & Rodriguez, 1990; Commons & Rodriguez, 1993; Commons, Goodheart, Rodriguez, & Gutheil, 2006) Language stages (Commons et al., 2007) Leadership before and after crises (Oliver, 2004) Loevinger's sentence completion task (Cook-Greuter, 1990) Moral judgment (Armon & Dawson, 1997; Dawson, 2000) Music (Beethoven) (Funk, 1989) Physics tasks (Inhelder & Piaget, 1958) Political development (Sonnert & Commons, 1994) Report patient's prior crimes (Commons, Lee, Gutheil, et al., 1995) Social perspective-taking (Commons & Rodriguez, 1990; Commons & Rodriguez, 1993) Spirituality (Miller & Cook-Greuter, 1994) Tool making of hominids (Commons & Miller 2002) Views of the good life (Armon, 1984b; Danaher, 1993; Dawson, 2000; Lam, 1995) Workplace culture (Commons, Krause, Fayer, & Meaney, 1993) Workplace organization (Bowman, 1996)
wikipedia
wiki_34020_chunk_33
Merit Network
Merit's statewide fiber-optic network strategy began to take shape when: in 2003 a fiber ring was deployed in Lansing; in 2003 Michigan State University, the University of Michigan, and Wayne State University launched the Michigan LambdaRail Network (MiLR) project to link the campuses to each other and to Chicago using privately owned fiber, with Merit to operate MiLR on behalf of the three universities and using some of the MiLR fiber for its own network; in 2004 fiber rings were added in Grand Rapids and Chicago; in August 2005 Merit was utilizing dark fiber from Michigan Lambda Rail (MiLR) between Detroit and Chicago to support the southern portion of its network backbone; in July 2006 Merit began to use optical fiber that had been installed by a consortium of government and community organizations in the Alpena area; in February 2006 Merit and the Ontario Research and Innovation Optical Network (ORION) were linked using fiber optic cable across the US-Canada border through the Detroit–Windsor Tunnel, later in September 2008, a wireless connection across the Soo Locks between Sault Ste. Marie, Michigan and Sault Ste. Marie, Ontario provided a second link between Merit and ORION; in September 2007 Merit created the first high-speed network connection between Michigan's two peninsulas with fiber optic cable across the Mackinac Bridge; in November 2007 Merit completed Phase I of its fiber network expansion into the Upper Peninsula of Michigan, connecting Lake Superior State University (LSSU), Michigan Technological University (MTU), and Northern Michigan University (NMU) via fiber-optic cable at gigabit Ethernet speeds; in May 2008 Merit completes a new fiber optic link from Southfield to Toledo providing a 10 Gbit/s link to OSCnet, Ohio's regional research and education network, and a second path between Merit and the Internet2 network; in March 2009 a partnership between the City of Hillsdale, Hillsdale College, Hillsdale County Intermediate School District (ISD), and Merit, completed a fiber-optic ring to improve connectivity in the city and reduce network costs for the Hillsdale-area organizations; and in December 2009 Merit began to use a new fiber optic link between Mt. Pleasant and Big Rapids. This completed the "Blue-Line" fiber optic network that links 16 cities in the lower half of Michigan's lower peninsula (Kalamazoo, Grand Rapids, Muskegon, Big Rapids, Mt. Pleasant, Midland, Saginaw, Flint, Pontiac, Rochester, Southfield, Ypsilanti, Ann Arbor, Jackson, East Lansing, and Battle Creek).
wikipedia
wiki_30349_chunk_30
Global Energy and Water Exchanges
The GEWEX project has been in existence for over 30 years, and while some climate oscillations are short, such as El-Nino, some climate oscillations last for decades, such as the North Atlantic Oscillation. Some have proposed extrapolating pre-GEWEX information using new information and measurements taken with pre-GEWEX technology. The MAGS project, located in Northwestern Canada utilized indigenous peoples traditional experiences. In addition, in other parts of the GEWEX study, these oscillations are an aspect of climate forcing, which allow testing of predictions and models. This modelling may be complicated by the fact that the North Atlantic Oscillation in switching state (see graph) as the effects of global warming are becoming more prominent. For example, 2006 and 2007 saw one of the most dramatic declines in Arctic Sea ice, a decline that was largely unpredicted and can shift the late summer albedo in the northern hemisphere. In 2008, sea ice extent decline has backed off from the previous years' trend, and researchers had forecast a strong La Nina event for late 2007 and 2008. However, unexpectedly the surface temperatures in the Eastern Pacific have already begun to rise to El-Nino temperature ranges, indicating the La Nina event may terminate unexpectedly. With this, the loss of Northern Polar sea ice has begun to accelerate back toward the earlier trend. Such rapid and unexpected changes in climate-forcing events eventually suggest that modellers need to include parameters such as ocean temperature thermoclines, energy accumulation in the tropical oceans, sea ice extents in the polar regions, land glacial ice retraction in Greenland, and sheet ice and shelf ice remodelling in Antarctica. When multiple climate-forcing influences are acting simultaneously in which one of the events will eventually take dominance, lack of precedents from the past study of similar confluences of events, as well as knowledge of the uncertainty of sensitive 'switches' in the oceanic/atmospheric switches may affect the ability to provide accurate models and predictions. In addition, sampling points may be spread to monitor leading indicators in one common scenario may be useless during an oscillation where the pool of energy shifts to an unmonitored region so that the magnitude of the shift avoids computation.
wikipedia
wiki_35835_chunk_23
Journal of Cell Biology
An update to the software in August 2012 allows the user to smoothly transition from 1 millimeter to 1 micrometer magnification of images assembled from optical and electron microscopes. As an example, they provide a complete image of a zebrafish embryo. References External links JCB DataViewer RU Press Facebook Image database for cell biology Celling my soul Cell biologists share their snaps Microscopic marvels Publications established in 1955 Delayed open access journals Creative Commons-licensed journals Molecular and cellular biology journals Rockefeller University Press academic journals 1955 establishments in New York City
wikipedia
wiki_682_chunk_32
Optimizing compiler
Tail call optimization A function call consumes stack space and involves some overhead related to parameter passing and flushing the instruction cache. Tail recursive algorithms can be converted to iteration through a process called tail recursion elimination or tail call optimization. Deforestation (data structure fusion) In languages where it is common for a sequence of transformations to be applied to a list, deforestation attempts to remove the construction of intermediate data structures. Partial evaluation
wikipedia
wiki_15563_chunk_1
Proxy (statistics)
Examples In social sciences, proxy measurements are often required to stand in for variables that cannot be directly measured. This process of standing in is also known as operationalization. Per-capita gross domestic product (GDP) is often used as a proxy for measures of standard of living or quality of life. Montgomery et al. examine several proxies used, and point out limitations with each, stating "In poor countries, no single empirical measure can be expected to display all of the facets of the concept of income. Our judgment is that consumption per adult is the best measure among those collected in cross-sectional surveys."
wikipedia
wiki_33155_chunk_6
Complexity index
See also Rademacher complexity for a recently introduced class complexity index. Example: continuous spaces Class C of circles in has detail , as shown in the picture on left below. Similarly, for the class of segments on , as shown in the picture on right. Example: discrete spaces The class on whose concepts are illustrated in the following scheme, where "+" denotes an element belonging to , "-" an element outside , and ⃝ a sentry point: This class has . As usual we may have different sentineling functions. A worst case , as illustrated, is: . However a cheaper one is : References
wikipedia
wiki_18947_chunk_3
Addison-Wesley Secondary Math: An Integrated Approach: Focus on Algebra
What other kinds of pollution besides air pollution might threaten our planet? [page 163, in the introduction to 3-1 Functional Relationships] Each year the Oilfield Chili Appreciation Society holds a chili cook-off. . . . 1. The chili cook-off raises money for charity. Describe some ways the organizers could raise money in the cook- off. 2. What is the hottest kind of pepper that you have eaten? People who have tasted them agree that cayenne peppers are hotter than pimento peppers. How would you set up a hotness scale for peppers? . . . . [page 217, in the introduction to 4-1 Solving Linear Equations] What role should zoos play in today's society? . . . . [page 233, in the introduction to 4-2 Other Techniques for Solving Linear Equations]
wikipedia
wiki_33620_chunk_4
Michigan State University College of Engineering
The professional or student-run groups and organizations available in the college are listed below. American Association of Blacks in Energy(AABE) American Institute for Chemical Engineers (AIChE) American Society of Agricultural and Biological Engineers (ASABE) American Society of Civil Engineers (ASCE) American Society of Mechanical Engineers (ASME) Association for Computing Machinery (ACM) Audio Enthusiasts and Engineers (AEE) Biomedical Engineering Society (BMES) Biosystems Engineering Student Club Chi Epsilon (XE) Division of Engineering Computing Services (DECS) Engineers Without Borders (EWB) Environmental Engineering Student Society(ESS) Eta Kappa Nu (ΗΚΝ) Formula SAE IEEE MSU Student Branch International Society of Pharmaceutical Engineering Leadership Advantage MSE Society Michigan State University's Amateur Radio Club (W8SH) Michigan State University's Society of Automotive Engineers Baja SAE MSU Women in Computing National Association of Black Chemists and Chemical Engineers (NOBCCHE) National Society of Black Engineers (NSBE) National Society of Professional Engineers(NSPE) Omega Chi Epsilon Pi Tau Sigma SAMPE (SAMPE) Society of Applied Engineering Sciences (SAES) Society of Hispanic Professional Engineers (SHPE) Society of Plastics Engineers (SPE) Society of Women Engineers MSU Solar Car Racing Team Student Engineering Council (SEC) Tau Beta Pi MSU Chapter Triangle Fraternity MSU Chapter Upsilon Pi Epsilon
wikipedia
wiki_2654_chunk_3
Parameter (computer programming)
Example The following program in the C programming language defines a function that is named "SalesTax" and has one parameter named "price". The type of price is "double" (i.e. a double-precision floating point number). The function's return type is also a double. double SalesTax(double price) { return 0.05 * price; } After the function has been defined, it can be invoked as follows: SalesTax(10.00);
wikipedia
wiki_30779_chunk_6
Computational geophysics
Elsewhere, Rice University has a Center for Computational Geophysics, while Princeton University,  the University of Texas,  and California Institute of Technology have similar research centers. Experts, laboratories, projects, internships, undergraduate programs, graduate programs and/or facilities in the program exist at the University of Queensland, Wyoming University, Boston University, Stanford University, Uppsala University, Kansas State University, Kingston University, Australian National University, University of California, San Diego, University of Washington, ETH Zurich, University of Sydney, Appalachian State University, University of Minnesota, University of Tasmania, Bahria University, Boise State University, University of Michigan, University of Oulu, University of Utah, and others.
wikipedia
wiki_6721_chunk_31
Directorate-General for European Civil Protection and Humanitarian Aid Operations
European Parliament Report The Committee on Development (CD) of the EP commissioned the Overseas Development Institute to undertake a project on the effectiveness of international development assistance from the European Commission in 2010. The project focused on the cases of Cambodia, Mozambique and Peru. The findings and policy suggested can be summarized as follows: Harmonisation and alignment (H&A) is crucial for state capacity and should be expanded from sharing and spreading information to increasing joint activities in the short-term. Donor harmonisation efforts need to be scaled up to include agreements on joint technical assistance and the streamlining of systems and procedures Extremely fragmented aid systems impose unreasonably high transaction costs on the government, drains valuable resources, and fundamentally weakens state capacity. EC procedures and structures remain highly complicated and bureaucratic. Much of the success or failure of cooperation depends on individual interactions, specific innovators and appropriate staffing levels to carry out the tasks at hand, but the costs are also quite high. Country Strategy Papers could improve aid effectiveness — but their quality is uneven. Relations between HQ and delegations needs to be improved.
wikipedia
wiki_19897_chunk_4
Software evolution
Software evolution has been greatly impacted by the Internet: the rapid growth of World Wide Web and Internet Resources make it easier for users and engineers to find related information. open source development where anybody could download the source codes and hence modify it has enabled fast and parallel evolution (through forks). Types of software maintenance E.B. Swanson initially identified the three categories of maintenance: corrective, adaptive, and perfective. Four categories of software were then catalogued by Lientz and Swanson (1980). These have since been updated and normalized internationally in the ISO/IEC 14764:2006:
wikipedia
wiki_217_chunk_79
Euclidean algorithm
Combining the estimated number of steps with the estimated computational expense per step shows that the Euclid's algorithm grows quadratically (h2) with the average number of digits h in the initial two numbers a and b. Let h0, h1, ..., hN−1 represent the number of digits in the successive remainders r0, r1, ..., rN−1. Since the number of steps N grows linearly with h, the running time is bounded by
wikipedia
wiki_13393_chunk_29
Proof of impossibility
Can this string be compressed? Chaitin's proof For an exposition suitable for non-specialists see Beltrami p. 108ff. Also see Franzen Chapter 8 pp. 137–148, and Davis pp. 263–266. Franzén's discussion is significantly more complicated than Beltrami's and delves into Ω—Gregory Chaitin's so-called "halting probability". Davis's older treatment approaches the question from a Turing machine viewpoint. Chaitin has written a number of books about his endeavors and the subsequent philosophic and mathematical fallout from them.
wikipedia
wiki_25055_chunk_7
Javan warty pig
The most recent conservation project, through the World Association of Zoos and Aquariums, aims to capture healthy Javan warty pigs and breed them in captivity. The offspring of this program are then supposed to be released into protected habitats. This method of reintroduction of the offspring will ensure the long-term survival of the species. One of the problems with this project is finding true S. verrucosus, not hybrids, which brings up another goal of the program, molecular mapping. Scientists will extract DNA from the wild pigs and record their genetic code to separate hybrids from true S. verrucosus. Along with this project are plans to educate the locals about the importance and endangerment of this species. The locals sometimes comment that they cannot distinguish the banded pig from the Javan pig, and with education, this confusion can be reduced.
wikipedia
wiki_12142_chunk_10
Open Invention Network
Inter partes review is a procedure for challenging the validity of an issued patent owned by a third party. By challenging patents with IPRs, the Linux and broader open source community can help to eliminate them. Unified Patents has successfully invalidated a number of patents using Inter Partes Review. Third-Party Preissuance Submissions provide for challenging the validity of a patent application. They provide a mechanism for third parties to submit prior art of potential relevance to the United States Patent and Trademark Office during the examination of another party’s patent application. In this way, the Linux and broader open source community can help to eliminate patents, and particularly help to mitigate the issuance of new low-quality patents. A patent application challenger may remain unnamed or anonymous by asking a firm to complete the Third-Party Preissuance Submission on its behalf. Defensive publication, an intellectual property strategy used to prevent another party from obtaining a patent. The strategy consists in disclosing an enabling description and/or drawing of the product, apparatus, or method so that it enters the public domain and becomes prior art. Many defensive publications can be searched for free in IP.com’s Prior Art Database.
wikipedia
wiki_16629_chunk_7
List of Georgia Confederate Civil War units
Other units 1st (Fannin's) Reserves 1st (Symons') Reserves 1st Battalion, Reserves, Artillery 1st Battalion, Reserves, Cavalry 1st Battalion, Reserves, Infantry 1st City Battalion, Infantry (Columbus) 1st Confederate Battalion, Infantry 1st Local Troops, Infantry 1st Militia 1st Ordnance Battalion 1st Regiment (Army of Georgia) 1st Regiment (Reserves) 1st Regiment, Engineer Troops 1st Regiment, Infantry (Local Troops) (Augusta) 1st Regiment, Light Duty Men 1st Regiment, Troops and Defenses (Macon) 1st State Line 2nd Battalion Troops and Defences (Macon) 2nd Militia 2nd Regiment, Militia 2nd Reserves 2nd State Line, Including Stapleton's and Storey's 3d Infantry 2nd Division, Militia 3rd Reserves 4th (Avery's) Cavalry 4th (Clinch's) Cavalry 4th Infantry (State Guard) 4th Reserves 5th Militia 5th Reserves 6th Militia 6th Reserves 6th State Line 10th Militia 12th Militia 23rd Battalion, Militia (Cook's Reserve Battalion) 23rd Battalion, Infantry, Local Defense (Athens Battalion, Enfield Rifle Battalion) 25th Battalion, Infantry (Provost Guard) 27th Battalion, Infantry (Non-Conscripts) Alexander's (Captain) Company, Cavalry Alexander's (Captain) Company, Infantry Allen's (Captain) Company, Cavalry Anderson's (Captain) Company, Infantry (Anderson Guards) Arnold's (Captain) Company, Cavalry Arsenal Battalion, Infantry (Columbus) Asher's (Captain) Company (Murray Cavalry) Athens Reserve Corps, Infantry Atlanta Arsenal Battery, Light Artillery (Local Troops) Atwater's (Captain) Company, Infantry Augusta Battalion, Infantry Baird's (Captain) Company, Infantry Baldwin Ordnance Battalion (Local Defense) Bard's Company, Infantry Barney's (Captain) Company, Infantry (Richmond Factory Guards) Blue Ridge Tiger Regiment (State Guard) Boddie's (Captain) Company (Troup [County] Independent Cavalry) Bradshaw's Cavalry Battalion Brook's (Captain) Company, Infantry (Mitchell Home Guards) Camden County Militia (Mounted) Caraker's (Captain) Company, Infantry (Milledgeville Guards) Chapman's (Captain) Company, Infantry (Defenders) Chatham Light Horse City Battalion, Infantry (Columbus) City Light Guards (Columbus) Clemons' (Captain) Company, Infantry Coast Guard Battalion, Militia Cobb's Guards, Infantry Coffee Revengers Collier's (Captain) Company, Infantry Collier's (Captain) Company, Infantry (Collier Guards) Conscripts, Georgia Corbin's (Captain) Company, Cavalry Dorough's Battalion, Cavalry Dozier's (Captain) Company, Infantry Ezzard's (Captain) Company, Infantry First Battalion, Reserve Cavalry Floyd's (Captain) Company, Cavalry Fuller's (Captain) Company, Infantry Garrison's (Captain) Company, Infantry (Ogeechee Minute Men) Gartrell's (Captain) Company, Cavalry Green's (Captain) Company, Infantry (State Armory Guards) Grubb's (Captain) Company, Infantry Hall's (Captain) Company, Cavalry Hamlet's (Captain) Company, Infantry Hardwick Mounted Rifles Harris' (Captain) Independent Company, Infantry (Brunswick Rifles) Heard County Rangers, Infantry (part of the 41st Infantry) Hendry's (Captain) Company, Cavalry (Atlantic and Gulf Guards) Hendry's (Captain) Company, Mounted Infantry (Pierce Mounted Volunteers) Holmes' (Captain) Company, Infantry (Wright Local Guards) Howard's (Captain) Company, Infantry (Non-Conscripts) Hull's (Captain) Company, Infantry Humphrey's (Captain) Company, Independent Cavalry (Reserves) Jackson's (Captain) Company, Infantry Jones' (Captain) Company, Infantry (Jones Hussars) Kay's (Captain) Company, Infantry (Franklin County Guards) Lane's (Captain) Company, Infantry (Jasper and Butts County Guards) Logan's (Captain) Company, Cavalry (White County Old Men's Home Guards) Matthews' (Captain) Company, Infantry (East to West Point Guards) Mayer's (Captain) Company (Appling Cavalry) Medlin's (Captain) Independent Company, Infantry (High Shoals Defenders) Milner's (Captain) Company, Infantry (Madison County Home Guard) Miscellaneous, Georgia Moore's (Captain) Company, Infantry (Baldwin Infantry) Moring's (Captain) Company, Infantry (Emanuel Troops) Nancy Harts (Nancy Hart Rifles) Nelson's (Captain) Independent Company, Cavalry Newbern's (Captain) Company, Cavalry (Coffee Revengers) Pemberton's (Captain) Company, Cavalry Pool's (Captain) Company, Infantry Porter's (Captain) Company (Georgia Railroad Guards) Preston's (Captain) Company (Railroad Guards) Ragland's Company, Cavalry Rigdon Guards Roberts' (Captain) Company, Exempts Roswell Battalion, Cavalry Rowland's Battalion, Conscripts Rumph's (Captain) Company (Wayne Cavalry Guards) Russell's (Captain) Company (Newton Factory Employees) Russell's (Captain) Company, Cavalry Taylor's (Captain) Company Thornton's (Captain) Company (Muscogee Guards) Waring's (Lieutenant) Company, Cavalry Weem's (Lieutenant) Detachment, Camp Guard (Augusta) White's (Captain) Company Whiteside's Naval Battalion, Infantry (Local Defense) Witt's (Captain) Company (Express Infantry) Wyly's (Captain) Company (Mell Scouts) Young's (Captain) Company, Cavalry (Alleghany Troopers) Youngblood's Battalion, Infantry Zollicoffer Guards, Infantry
wikipedia
wiki_2017_chunk_3
Scale-free network
Recent interest in scale-free networks started in 1999 with work by Albert-László Barabási and colleagues at the University of Notre Dame who mapped the topology of a portion of the World Wide Web, finding that some nodes, which they called "hubs", had many more connections than others and that the network as a whole had a power-law distribution of the number of links connecting to a node. After finding that a few other networks, including some social and biological networks, also had heavy-tailed degree distributions, Barabási and collaborators coined the term "scale-free network" to describe the class of networks that exhibit a power-law degree distribution. However, studying seven examples of networks in social, economic, technological, biological, and physical systems, Amaral et al. were not able to find a scale-free network among these seven examples. Only one of these examples, the movie-actor network, had degree distribution P(k) following a power law regime for moderate k, though eventually this power law regime was followed by a sharp cutoff showing exponential decay for large k.
wikipedia
wiki_27680_chunk_0
Ultracomputer
The New York University's Ultracomputer is a significant processor design in the history of parallel computing. The system has N processors, N memories, and an N log N message-passing switch connecting them. The system supported an innovative fetch-and-add process coordination instruction, and the custom VLSI network switches could combine references (including fetch-and-adds) from several processors into a single reference, to reduce memory contention.
wikipedia
wiki_14026_chunk_10
Physics beyond the Standard Model
Koide formula - an unexplained empirical equation remarked upon by Yoshio Koide in 1981, and later by others. It relates the masses of the three charged leptons: . Standard Model does not predict masses of leptons (they are free parameters of the theory). However, the value of Koide formula being equal to 2/3 within experimental errors of measured lepton masses suggests existence of theory which is able to predict lepton masses. The CKM matrix, if interpreted as a rotation matrix in a 3-dimensional vector space, "rotates" vector composed of square roots of down-type quark masses into vector of square roots of up-type quark masses , up to vector lengths, a result due to Kohzo Nishida. The sum of squares of Yukawa couplings of all Standard Model fermions is approximately 0.98, which is very close to 1.
wikipedia
wiki_9097_chunk_8
The Civilizing Process
A particular criticism of The Civilizing Process was formulated by German ethnologist and cultural anthropologist Hans Peter Duerr in his 5-volume Der Mythos vom Zivilisationsprozeß (1988–2002), pointing out there existed plenty of social restrictions and regulations in Western culture and elsewhere since long before the Medieval period. Elias and his supporters responded that he had never intended to claim that social regulations or self-restraining psychological agents would be institutions singular to Western modernity, it is just that Western culture developed particularly sophisticated, concise, comprehensive, and rigid institutions apparent for instance in its decisive technological advances when compared to other cultures.<ref name="Lilienthal-2001">{{Citation |last=Lilienthal |first=Markus |chapter=Interpretation. Norbert Elias: Über den Prozeß der Zivilisation |editor-last1=Gamm |editor-first1=Gerhard |title=Interpretationen. Hauptwerke der Sozialphilosophie |publisher=Reclam |year=2001 |pages=134-147 |isbn=3150181143}}</ref>
wikipedia
wiki_942_chunk_13
CYK algorithm
Using the Coppersmith–Winograd algorithm for multiplying these matrices, this gives an asymptotic worst-case running time of . However, the constant term hidden by the Big O Notation is so large that the Coppersmith–Winograd algorithm is only worthwhile for matrices that are too large to handle on present-day computers , and this approach requires subtraction and so is only suitable for recognition. The dependence on efficient matrix multiplication cannot be avoided altogether: has proved that any parser for context-free grammars working in time can be effectively converted into an algorithm computing the product of -matrices with 0-1-entries in time , and this was extended by Abboud et al. to apply to a constant-size grammar.
wikipedia
wiki_16117_chunk_7
Engineering change order
With time-to-market pressures and rising mask costs in the semiconductor industry, several electronic design automation (EDA) companies are beginning to bring more automation into the ECO implementation process. Most popular place and route products have some level of built-in ECO routing to help with implementing physical-level ECOs. Cadence Design Systems has recently announced a product called conformal ECO designer, that automates the creation of Functional ECOs, usually the most tedious process in implementing an ECO. It uses formal equivalence checking and logic synthesis techniques to produce a gate-level ECO netlist based on the changed RTL. Synopsys in the past had a product called ECO compiler that is now defunct. Synopsys now has primetime-ECO for dealing with ECOs. Tweaker-F1 & Tweaker-T1 have also come into the limelight in the recent DAC-2012 for their ECO algorithms.
wikipedia
wiki_39291_chunk_7
List of awards and nominations received by Andrea Bocelli
|- | style="text-align:center;" rowspan="4"| 2000 || style="text-align:left;"| Andrea Bocelli || Male Artist of the Year || |- |style="text-align:left;"| Aria: The Opera Album || Album of the Year || |- |style="text-align:left;" rowspan="2"|Sacred Arias || Album of the Year || |- || Best Selling Classical Album || |- | style="text-align:center;"| 2001 || style="text-align:left;"| Verdi || Rover Album of the Year || |- | style="text-align:center;"| 2002 || style="text-align:left;"| Andrea Bocelli || Outstanding Contribution to Music || |- | style="text-align:center;" rowspan="3"| 2003 || style="text-align:left;" rowspan="3"| Sentimento || Male Artist of the Year || |- || Album of the Year || |- || Best Selling Classical Album || |- | style="text-align:center;"| 2009 || style="text-align:left;"| Incanto || NS&I Album of the Year || |- | style="text-align:center;" rowspan="3"| 2012 || style="text-align:left;"| Andrea Bocelli || International Artist of the Year || |- | style="text-align:center;" rowspan="2"| Concerto: One Night in Central Park || Male Artist of the Year || |- || Album of the Year || |-
wikipedia
wiki_1565_chunk_13
Incidence algebra
Subset poset and exponential generating functions For the Boolean poset of finite subsets ordered by inclusion , the reduced incidence algebra consists of invariant functions defined to have the same value on isomorphic intervals [S,T] and [S',T'] with |T\S| = |T'\S'|. Again, let t denote the invariant delta function with t(S,T) = 1 for |T\S| = 1 and t(S,T) = 0 otherwise. Its powers are: where the sum is over all chains and the only non-zero terms occur for saturated chains with since these correspond to permutations of n, we get the unique non-zero value n!. Thus, the invariant delta functions are the divided powers and we may write any invariant function as where [n] = {1, . . . , n}. This gives a natural isomorphism between the reduced incidence algebra and the ring of exponential generating functions. The zeta function is with Möbius function: Indeed, this computation with formal power series proves that Many combinatorial counting sequences involving subsets or labeled objects can be interpreted in terms of the reduced incidence algebra, and computed using exponential generating functions.
wikipedia
wiki_32944_chunk_11
Catalog of articles in probability theory
Binomial distribution / (1:D) (a,b,0) class of distributions / (1:D) Anscombe transform Bernoulli distribution / (1:B) Beta distribution / (1:C) Bose–Einstein statistics / (F:D) Cantor distribution / (1:C) Cauchy distribution / (1:C) Chi-squared distribution / (1:C) Compound Poisson distribution / (F:DR) Degenerate distribution / (1:D) Dirichlet distribution / (F:C) Discrete phase-type distribution / (1:D) Erlang distribution / (1:C) Exponential-logarithmic distribution / (1:C) Exponential distribution / (1:C) F-distribution / (1:C) Fermi–Dirac statistics / (1F:D) Fisher–Tippett distribution / (1:C) Gamma distribution / (1:C) Generalized normal distribution / (1:C) Geometric distribution / (1:D) Half circle distribution / (1:C) Hypergeometric distribution / (1:D) Normal distribution / Gau Integration of the normal density function / Gau anl Lévy distribution / (1:C) Matrix normal distribution / Gau Maxwell–Boltzmann statistics / (F:D) McCullagh's parametrization of the Cauchy distributions / (1:C) Multinomial distribution / (F:D) Multivariate normal distribution / Gau Negative binomial distribution / (1:D) Pareto distribution / (1:C) Phase-type distribution / (1:C) Poisson distribution / (1:D) Power law / (1:C) Skew normal distribution / (1:C) Stable distribution / (1:C) Student's t-distribution / (1:C) Tracy–Widom distribution / rmt Triangular distribution / (1:C) Weibull distribution / (1:C) Wigner semicircle distribution / (1:C) Wishart distribution / (F:C) Zeta distribution / (1:D) Zipf's law / (1:D)
wikipedia
wiki_9620_chunk_5
Lukhdhirji Engineering College
Academic departments The institute has ten major academic departments: Department of Electrical Engineering (Est. 1951, Intake- UG -120, PG-18) Department of Civil Engineering (Est. 1951, Intake- UG -120, PG-18) Department of Mechanical Engineering (Est. 1951, Intake- UG -60) Department of IT Engineering (Est. 1999, Intake- UG -30) Department of Production Engineering (Est. 1970, Intake- UG-30) Department of Chemical Engineering (Est. 2008, Intake- UG -60) Department of Industrial Engineering (Est. 1983, Intake- UG -30) Department of Power Electronics Engineering (Est. 1983, Intake- UG -60, PG-18) General Department (Humanities, Maths & Physics Department) Applied Mechanics Department
wikipedia
wiki_15023_chunk_3
Naturalness (physics)
Suppose a physics model requires four parameters which allow it to produce a very high quality working model, calculations, and predictions of some aspect of our physical universe. Suppose we find through experiments that the parameters have values: 1.2 1.31 0.9 and 404,331,557,902,116,024,553,602,703,216.58 (roughly 4 x 1029).
wikipedia
wiki_7943_chunk_7
Paul Seymour (mathematician)
In about 1990 Robin Thomas began to work with Robertson and Seymour. Their collaboration resulted in several important joint papers over the next ten years: a proof of a conjecture of Sachs, characterising by excluded minors the graphs that admit linkless embeddings in 3-space; a proof that every graph that is not five-colourable has a six-vertex complete graph as a minor (the four-colour theorem is assumed to obtain this result, which is a case of Hadwiger's conjecture); with Dan Sanders, a new, simplified, computer based proof of the four-colour theorem; and a description of the bipartite graphs that admit Pfaffian orientations. In the same period, Seymour and Thomas also published several significant results: (with Noga Alon) a separator theorem for graphs with an excluded minor, extending the planar separator theorem of Richard Lipton and Robert Tarjan; a paper characterizing treewidth in terms of brambles; and a polynomial-time algorithm to compute the branch-width of planar graphs.
wikipedia
wiki_11088_chunk_7
Tom Powers
A Window on Washington Park (1913) - The young millionaire Barnaby Rudge (1915) - Barnaby Rudge As Ye Repent (1915) - Harry Somers The Auction Block (1917) - Bob Wharton Double Indemnity (1944) - Mr. Dietrichson Practically Yours (1944) - Commander Harry Harpe The Phantom Speaks (1945) - Harvey Bogardus The Chicago Kid (1945) - Mike Thurber Two Years Before the Mast (1946) - Bellamer The Blue Dahlia (1946) - Capt. Hendrickson Her Adventurous Night (1946) - Dan Carter The Last Crooked Mile (1946) - Floyd Sorelson Angel and the Badman (1947) - Dr. Mangram The Farmer's Daughter (1947) - Hy Nordick For the Love of Rusty (1947) - Hugh Mitchell They Won't Believe Me (1947) - Trenton The Son of Rusty (1947) - Hugh Mitchell I Love Trouble (1948) - Ralph Johnston Up in Central Park (1948) - Rogan The Time of Your Life (1948) - Freddy Blick (a stool pigeon and frame-up artist) The Velvet Touch (1948) - Detective (uncredited) Station West (1948) - Capt. Iles Angel in Exile (1948) - Warden Mexican Hayride (1948) - Ed Mason Special Agent (1949) - Chief Special Agent Wilcox Scene of the Crime (1949) - Umpire Menafoe Chicago Deadline (1949) - Glenn Howard Chinatown at Midnight (1949) - Capt. Howard Brown East Side, West Side (1949) - Owen Lee The Nevadan (1950) - Bill Martin Destination Moon (1950) - General Thayer Right Cross (1950) - Tom Balford Again Pioneers (1950) - Ken Keeler Fighting Coast Guard (1951) - Admiral Ryan The Strip (1951) - Detective Lt. Bonnabel The Tall Target (1951) - Simon G. Stroud (uncredited) The Well (1951) - Mayor Phone Call from a Stranger (1952) - Dr. Fernwood (uncredited) Flesh and Fury (1952) - Andy Randolph Deadline – U.S.A. (1952) - Andrew Wharton (uncredited) The Fabulous Senorita (1952) - Delaney Jet Job (1952) - Oscar Collins Denver and Rio Grande (1952) - Sloan Bal Tabarin (1952) - Eddie Mendies Diplomatic Courier (1952) - Cherney (uncredited) We're Not Married! (1952) - Atty. Gen. Frank Bush (uncredited) The WAC from Walla Walla (1952) - General (uncredited) Horizons West (1952) - Frank Tarleton The Steel Trap (1952) - Valcourt, Travel Agent The Marksman (1953) - Lt. Governor Watson Scared Stiff (1953) - Police Lieutenant (uncredited) Julius Caesar (1953) - Metellus Cimber Hannah Lee (1953) - Sheriff The Last Posse (1953) - Frank White Devil's Canyon (1953) - Joe Holbert (uncredited) I, the Jury (1953) - Milt Miller Donovan's Brain (1953) - Donovan's Washington Advisor Sea of Lost Ships (1953) - Rear Admiral Lucky Me (1954) - Thayer Crony (uncredited) The Mad Magician (1954) - Inspector (uncredited) The Americano (1955) - Jim Rogers Ten Wanted Men (1955) - Henry Green New York Confidential (1955) - District Attorney Rossi The Eternal Sea (1955) - General (uncredited) Double Jeopardy (1955) - Harry Sheldon The Go-Getter (1956) - Miller's Business Partner
wikipedia
wiki_13342_chunk_2
Suppliers and Parts database
SQL The following SQL schema is one possible expression of the Suppliers-and-Parts database. CREATE TABLE Supplier ( SID int primary key, SName varchar(10) NOT NULL, Status int NOT NULL, City varchar(10) NOT NULL ) CREATE TABLE Part ( PID int primary key, PName varchar(10) NOT NULL, Color int NOT NULL, Weight real NOT NULL, City varchar(10) NOT NULL )
wikipedia
wiki_22467_chunk_6
Quantile function
For statistical applications, users need to know key percentage points of a given distribution. For example, they require the median and 25% and 75% quartiles as in the example above or 5%, 95%, 2.5%, 97.5% levels for other applications such as assessing the statistical significance of an observation whose distribution is known; see the quantile entry. Before the popularization of computers, it was not uncommon for books to have appendices with statistical tables sampling the quantile function. Statistical applications of quantile functions are discussed extensively by Gilchrist.
wikipedia
wiki_11201_chunk_4
Mathematical Association
Past presidents Past presidents of The Association for the Improvement of Geometrical Teaching included: 1871 Thomas Archer Hirst 1878 R B Hayward MA, FRS 1889 Professor G M Minchin MA, FRS 1891 James Joseph Sylvester 1892 The Reverend C Taylor DD 1893 R Wormell MA, DSc 1895 Joseph Larmor Past presidents of The Mathematical Association have included: 1897 Alfred Lodge 1899–1900 Robert Stawell Ball 1901 John Fletcher Moulton, Baron Moulton 1903 Andrew Forsyth 1905 George Ballard Mathews 1907 George H. Bryan 1909–1910 Herbert Hall Turner 1911–1912 E. W. Hobson 1913–1914 Alfred George Greenhill 1915–1916 Alfred North Whitehead 1918–1919 Percy Nunn 1920 E. T. Whittaker 1921 James Wilson 1922–1923 Thomas Little Heath 1924–1925 G. H. Hardy 1926–1927 Micaiah John Muller Hill 1928–1929 William Fleetwood Sheppard 1930–1931 Arthur Eddington 1932–1933 G. N. Watson 1934 Eric Harold Neville 1935 A W Siddons 1936 Andrew Forsyth 1937 Louis Napoleon George Filon 1938 W Hope-Jones 1939 W C Fletcher 1944 C O Tuckey MA 1945 Sydney Chapman 1946 Warin Foster Bushell 1947 George Barker Jeffery 1948 Harold Spencer Jones 1949 A Robson MA 1950 Professor H R Hasse MA, DSc 1951 Mary Cartwright 1952 K S Snell MA 1953 Professor T A A Broadbent MA 1954 W. V. D. Hodge 1955 G L Parsons MA 1956 George Frederick James Temple 1957 W J Langford JP, MSc 1958 Max Newman 1959 Louise Doris Adams 1960 Edwin A. Maxwell 1961 J T Combridge MA, MSc 1962 Professor V C A Ferraro PhD, DIC 1963 J B Morgan MA 1964 Ida Busbridge 1965 Elizabeth Williams 1966 F W Kellaway BSc 1967 A.P. Rollett 1968 Charles Coulson 1969 Bertha Swirles 1970 James Lighthill 1971 B T Bellis MA, FRSE, FIMA 1972 C T Daltry BSc, FIMA 1973 William McCrea 1974 Margaret Hayman 1975 Reuben Goodstein 1976 E Kerr BSc, PhD, FIMA, FBCS 1977 Professor G Matthews MA, PhD, FIMA 1978 Alan Tammadge 1979 Clive W. Kilmister 1980 D A Quadling MA, FIMA, later OBE 1981 Michael Atiyah 1982 F J Budden BSc 1983 Rolph Ludwig Edward Schwarzenberger 1984 P B Coaker BSc, ARCS, DIC, FIMA, FBCS 1985 Hilary Shuard 1986 Anita Straker 1987 Margaret Rayner 1988 A.G. Howson 1989 Mr Peter Reynolds MA 1990 Margaret Brown 1991 1992 Mr John Hersee MA 1993 Dr William Wynne-Wilson BA, PhD 1994 Mary Bradburn 1995 E. Roy Ashley 1996 W. P. Richardson 1997 Tony Gardiner 1998 Professor J Chris Robson 1999 John S Berry 2000 Mr Stephen Abbott BSc, MSc 2001 Dr Sue Sanders Cert.Ed, BA, MEd, PhD 2002 Mr Barry Lewis BSc, BA, FIMA 2003 Christopher Zeeman 2004 Professor Adam McBride 2005 Sue Singer 2006 Mr Doug French 2007 Rob Eastaway 2008 Mr Robert Barbour 2009 Mrs Jane Imrie 2010 David Acheson 2011 Dr Paul Andrews 2012 Marcus Du Sautoy 2013 Peter Ransom 2014 Lynne McClure 2015 Peter M. Neumann 2016 Dr Jennie Golding 2017 Mr Tom Roper 2018 Professor Mike Askew 2019 Ems Lord 2020 Hannah Fry (President) 2021 Dr Chris Pritchard {President Designate)
wikipedia
wiki_2442_chunk_9
Cross-functional team
Greater range of users Cross-functional teams consist of people from different parts of an organization. Information must be made understandable to all users. Not only engineers use technical data, and not only accountants use financial data, and not only human resources personnel use HR data. Modern organizations lack middle managers to combine, sort, and prioritize the data. Technical, financial, marketing, and all other types of information must come in a form that all members of a cross-functional team can understand. This involves reducing the amount of specialized jargon, sorting information based on importance, hiding complex statistical procedures from the users, giving interpretations of results, and providing clear explanations of difficult. Data visualization systems can present complex results in an intuitive manner.
wikipedia
wiki_33714_chunk_37
Traditional ecological knowledge
According to indigenous philosopher and climate/environmental justice scholar Kyle Powys Whyte, "Anishinabe people throughout the Great Lakes region are at the forefront of native species conservation and ecological restoration. Nmé is the largest and oldest living fish in the Great Lakes basin, sometimes exceeding 100 years in age. Nmé served the Asnishinabe people as a substantial source of food, an indicator species for monitoring the environment, and a lachlan identity, playing a role in ceremonies and stories. Kenny Pheasant, an elder says, "Decline of the sturgeon has corresponded with decline in sturgeon clan families. Only a few sturgeon clan families are known around here" (Little River Band). The Natural Resources Department of the Ottawa Indians started a cultural context group, composed of a diverse range of tribal members and biologists, which developed goals and objectives for restoration. The goal was to "restore the harmony and connectivity between Nmé and the Anishinabe people and bring them both back to the river. Ultimately, the department created the first streamside rearing facility for protecting young sturgeon before they are released each fall in order to preserve their genetic parentage. Wild rice, or manoomin, grows in shallow, clear, and slow-moving waterways and can be harvested in early autumn. After harvesting, manoomin is processed through activities such as drying, parching, hulling, winnowing, and cleaning. After the Anishinabe migrated from the East and reached the Great Lakes region where they could grow crops on the water, neighboring groups of US and Canadian citizens and companies engaged in activities such as mining, damming, commercial farming and recreational boating. These activities directly affect manoomin and its habitat. Today the Anishinabe people are leaders in the conservation of wild rice. The Nibi (water) and Manoomin Symposium, which takes place every two years, brings tribal rice harvesters in the Great Lakes, indigenous scholars, paddy rice growers, representatives from mining companies and state agencies, and university researchers interested in the genetic modification of rice together. Elders share their stories about manoomin and youth share their perspective on how manoomin fits into their futures. Indigenous persons working as scientists in their tribes share the experiences working with elders to understand the deep historical implications of the work they do to study and conserve manoomin. Other indigenous people are often invited to share their experiences restoring and conserving other native species, such as taro and maize."
wikipedia
wiki_34522_chunk_28
Variable (computer science)
Variable types (based on lifetime) In terms of the classifications of variables, we can classify variables based on the lifetime of them. The different types of variables are static, stack-dynamic, explicit heap-dynamic, and implicit heap-dynamic. A static variable is also known as global variable, it is bound to a memory cell before execution begins and remains to the same memory cell until termination. A typical example is the static variables in C and C++. A Stack-dynamic variable is known as local variable, which is bound when the declaration statement is executed, and it is deallocated when the procedure returns. The main examples are local variables in C subprograms and Java methods. Explicit Heap-Dynamic variables are nameless (abstract) memory cells that are allocated and deallocated by explicit run-time instructions specified by the programmer. The main examples are dynamic objects in C++ (via new and delete) and all objects in Java. Implicit Heap-Dynamic variables are bound to heap storage only when they are assigned values. Allocation and release occur when values are reassigned to variables. As a result, Implicit heap-dynamic variables have the highest degree of flexibility. The main examples are some variables in JavaScript, PHP and all variables in APL.
wikipedia
wiki_26398_chunk_0
International Max Planck Research School for Molecular Biology
International Max Planck Research School for Molecular Biology, also known as IMPRS for Molecular Biology, is a 1.5 years MSc program or a 4-year PhD program. The first year in both graduate tracks is the same and the students are studying together. The curriculum consists of intensive theoretical lectures covering all major fields of the molecular biosciences. Each lecture is followed by a tutorial for in-depth discussion of the topics covered. The practical education consists of 3 months of 2-day methods courses and three 2-month lab rotation projects. All practical work is done in different research laboratories in Göttingen. After an examination at the end of the first year, based on the final grades it is possible to continue towards a MSc or PhD, or PhD with integrated MSc degrees. There are about 20 students accepted each year selected on a highly competitive basis from applicants from all over the world. The IMPRS for Molecular Biology was one of the founding member members (along with the IMPRS for Neurosciences) and is part of the Göttingen Graduate School for Neurosciences and Molecular Biosciences (GGNB). Every year students from the graduate program are organizing the renowned international PhD symposium Horizons in Molecular Biology.
wikipedia
wiki_9316_chunk_8
Computer-aided audit tools
Benefits of audit software include: They are independent of the system being audited and will use a read-only copy of the file to avoid any corruption of an organization’s data. Many audit-specific routines are used such as sampling. Provides documentation of each test performed in the software that can be used as documentation in the auditor’s work papers. Audit specialized software may perform the following functions: Data queries. Data stratification. Sample extractions. Missing sequence identification. Statistical analysis. Calculations. Duplicate transaction identification. Pivot table creation. Cross tabulation. CAATs Education and Professional Development
wikipedia
wiki_28674_chunk_9
Biblical software
Software for research The Open Source SHEBANQ project is an initiative of the Eep Talstra Centre for Bible and Computer (ETCBC) of the Vrije Universiteit Amsterdam. The basis of the project is the ETCBC-database of the Hebrew Bible. The database contains the Masoretic text of the Hebrew Bible, which is richly encoded on the levels of morphology and syntax. On their website shebanq.ancient-data.org the text and its features can be inspected and lexical and grammatical queries can be made in the Mini Query Language (MQL), to which one can refer in other publications. The website also shows which other projects based on the ETCBC database have been initiated. The Python package text-fabric is a platform independent research tool with which one can preprocess data from the ETCBC database and store them in any desired format. The SHEBANQ project is based on the specific demands of research. These demands were formulated during the Lorentz conference, held in Leiden 2012.
wikipedia
wiki_15967_chunk_1
List of MeSH codes (V04)
– research support, u.s. gov't, non-p.h.s. – research support, u.s. gov't, p.h.s. – research support, n.i.h., extramural – research support, n.i.h., intramural The list continues at List of MeSH codes (Z01). V04
wikipedia
wiki_15544_chunk_30
Systems Programming Language
BEGIN INTEGER A:=0, B, C:=1; PROCEDURE N(X,Y,Z); INTEGER X,Y,Z; X:=X*(Y+Z); FOR B:=1 UNTIL 20 DO N(A,B,C); END. References Citations Bibliography Systems programming languages HP software
wikipedia
wiki_17288_chunk_5
Smile (software)
SmileLab Smile provides an Aqua interface to make any data graph "manually", and libraries of commands to make graphs and process data by script (SmileLab can display at any moment the script corresponding to the user's action.) Performances The mathematical commands are optimized, and versatile thanks to AppleScript. Graphical documents (PDFs, bitmaps, videos of 1D, 2D, and 3D graphs, and custom graphics) are of professional printable quality.
wikipedia
wiki_19317_chunk_10
1952–53 United States network television schedule
Not returning from 1951–52: Admission Free After the Deadlines The Amazing Mr. Malone America's Health Betty Crocker Star Matinee The Bill Gwinn Show Byline The Carmel Myers Show Celanese Theater Charlie Wild, Private Detective The Clock Crime with Father Curtain Call Curtain Up The Dell O'Dell Show Don McNeill's TV Club Gruen Guild Playhouse Harness Racing Herb Shriner Time Hollywood Premiere Theatre The Jerry Colonna Show Lesson in Safety Life with Linkletter The Marshall Plan in Action Massland at Home Party Mr. Arsenic Mr. District of Attorney Music in Velvet On Trial Other Lands, Other People Out of the Fog Paul Dixon Show Personal Appearance Theater Pulitzer Prize Playhouse Q.E.D. The Ruggles Say It with Acting Studs' Place The Symphony Versatile Varieties What Do You Think?
wikipedia
wiki_16935_chunk_5
Rings of Power (video game)
Plot Long ago, the divine being Nexus the Benevolent used the Rod of Creation to turn the desolate planet of Ushka Bau into a paradise. He then granted humanity the gift of the Six Arts: the Art of Separation, practiced by knights; the Art of Summoning, practiced by conjurors; the Art of Force, practiced by archers; the Art of Change, practiced by enchanters; the Art of the Body, practiced by necromancers; and the Art of the Mind, practiced by sorcerers. After a long age of prosperity, Nexus's envious demonic brother Void the Destroyer stole the Rod and created an age of chaos that lasted 66 years. Nexus and Void engaged in a titanic battle that split the Rod in two, and each fled with half. They further divided their halves into eleven Rings of Power and hid them to keep each other from reassembling the Rod and taking power again.
wikipedia
wiki_36067_chunk_3
Janusz Brzozowski (computer scientist)
He received the following academic awards and honours: NSERC Scientific Exchange Award to France (1974–1975) Japan Society for the Promotion of Science Research Fellowship (1984) Computing Research Association Certificate of Appreciation for outstanding contributions and service as a member of the CRA Board of Directors (1992) Distinguished Professor Emeritus, University of Waterloo, Canada (1996) Medal of Merit, Catholic University of Lublin, Poland (2001) IBM Canada Canadian Pioneer in Computing (2005) The Role of Theory in Computer Science, a one-day conference in honour of John Brzozowski's 80th birthday (2015) The Role of Theory in Computer Science: Essays Dedicated to Janusz Brzozowski, World Scientific (2017) Lifetime Achievement Award, Computer Science Canada/Informatique Canada (CS-CAN/INFO-CAN) (2016) CIAA 2017 Sheng Yu Award for Best Paper for Complexity of Proper Prefix-Convex Regular Languages by J. Brzozowski and C. Sinnamon CIAA 2018 Sheng Yu Award for Best Paper for State Complexity of Overlap Assembly by J. Brzozowski, L. Kari, B. Li, M. Szykula
wikipedia
wiki_362_chunk_39
Molecular nanotechnology
In the latest report A Matter of Size: Triennial Review of the National Nanotechnology Initiative put out by the National Academies Press in December 2006 (roughly twenty years after Engines of Creation was published), no clear way forward toward molecular nanotechnology could yet be seen, as per the conclusion on page 108 of that report: "Although theoretical calculations can be made today, the eventually attainable range of chemical reaction cycles, error rates, speed of operation, and thermodynamic efficiencies of such bottom-up manufacturing systems cannot be reliably predicted at this time. Thus, the eventually attainable perfection and complexity of manufactured products, while they can be calculated in theory, cannot be predicted with confidence. Finally, the optimum research paths that might lead to systems which greatly exceed the thermodynamic efficiencies and other capabilities of biological systems cannot be reliably predicted at this time. Research funding that is based on the ability of investigators to produce experimental demonstrations that link to abstract models and guide long-term vision is most appropriate to achieve this goal." This call for research leading to demonstrations is welcomed by groups such as the Nanofactory Collaboration who are specifically seeking experimental successes in diamond mechanosynthesis. The "Technology Roadmap for Productive Nanosystems" aims to offer additional constructive insights.
wikipedia
wiki_12624_chunk_17
Racket (programming language)
At the end of 2014, much of Racket's code was moved into a new packaging system separate from the main code base. This new packaging system is serviced by a client program named raco. The new package system provides fewer features than PLaneT; a blog post by Jay McCarthy on the Racket blog explains the rationale for the change and how to duplicate the older system. Integrated Language Extensibility and Macros
wikipedia
wiki_984_chunk_25
Multiplication algorithm
In 1980, Everett L. Johnson proposed using the quarter square method in a digital multiplier. To form the product of two 8-bit integers, for example, the digital device forms the sum and difference, looks both quantities up in a table of squares, takes the difference of the results, and divides by four by shifting two bits to the right. For 8-bit integers the table of quarter squares will have 29-1=511 entries (one entry for the full range 0..510 of possible sums, the differences using only the first 256 entries in range 0..255) or 29-1=511 entries (using for negative differences the technique of 2-complements and 9-bit masking, which avoids testing the sign of differences), each entry being 16-bit wide (the entry values are from (0²/4)=0 to (510²/4)=65025).
wikipedia
wiki_4506_chunk_8
De Casteljau's algorithm
which we evaluate individually using De Casteljau's algorithm. Geometric interpretation The geometric interpretation of De Casteljau's algorithm is straightforward. Consider a Bézier curve with control points . Connecting the consecutive points we create the control polygon of the curve. Subdivide now each line segment of this polygon with the ratio and connect the points you get. This way you arrive at the new polygon having one fewer segment. Repeat the process until you arrive at the single point – this is the point of the curve corresponding to the parameter . The following picture shows this process for a cubic Bézier curve:
wikipedia
wiki_4361_chunk_7
Computer-aided software engineering
Tools CASE tools support specific tasks in the software development life-cycle. They can be divided into the following categories: Business and Analysis modeling. Graphical modeling tools. E.g., E/R modeling, object modeling, etc. Development. Design and construction phases of the life-cycle. Debugging environments. E.g., IISE LKO. Verification and validation. Analyze code and specifications for correctness, performance, etc. Configuration management. Control the check-in and check-out of repository objects and files. E.g., SCCS, IISE. Metrics and measurement. Analyze code for complexity, modularity (e.g., no "go to's"), performance, etc. Project management. Manage project plans, task assignments, scheduling. Another common way to distinguish CASE tools is the distinction between Upper CASE and Lower CASE. Upper CASE Tools support business and analysis modeling. They support traditional diagrammatic languages such as ER diagrams, Data flow diagram, Structure charts, Decision Trees, Decision tables, etc. Lower CASE Tools support development activities, such as physical design, debugging, construction, testing, component integration, maintenance, and reverse engineering. All other activities span the entire life-cycle and apply equally to upper and lower CASE.
wikipedia
wiki_1098_chunk_103
Ocean thermal energy conversion
OTEC News - OTEC News website Educational material about OTEC by the NOAA Ocean Exploration program Ocean Energy Council: How does OTEC work? nrel.gov - what is OTEC? US Department of Energy, Information Resources Wired Magazine's interview with John Piña Craven on the future of OTEC 2007 edition of the Survey of Energy Resources produced by the World Energy Council The Green Ocean Project - OTEC Library Plumbing the oceans could bring limitless clean energy Maximum water flow capacity of steel pipes - dimensions ranging 2 - 24 inches Hainan Ocean Thermal Energy Conversion (OTEC) Power Plant, China 20,000 megawatts under the sea: Oceanic steam engines. New Scientist, March 1, 2014. Preview only. http://otecfoundation.org/ http://otecnews.com/ https://web.archive.org/web/20140321052029/http://www.ioes.saga-u.ac.jp/en/about_lab.html (Saga University OTEC Research Facility) http://www.OTEC.ws http://www.lockheedmartin.com/us/products/otec.html http://www.makai.com/e-otec.htm http://www.ocees.com http://www.otecokinawa.com (Okinawa OTEC Project)
wikipedia
wiki_15107_chunk_21
Epidemiological transition
Building on the existing body of evidence, Salomon and Murray (2002), further add nuances to the traditional theory of epidemiological transition by disintegrating it based on disease categories and different age-sex groups, positing that the epidemiological transition entails a real transition in the cause composition of age-specific mortality, as opposed to just a transition in the age structure. Using Global Burden of Disease data from 1990, they disintegrate the transition across three cause groups: communicable diseases, non-communicable diseases and injuries, seeking to explain the variation in all-cause mortality as a function of cause-specific mortality in 58 countries from 1950 to 1998. This analysis validates the underlying premise of the classic epidemiological transition theory: as total mortality declines and income rises, communicable diseases cause less and less mortality compared to non-communicable diseases and injuries. Decomposing this overall impact by age-sex groups, they find that for males, when overall mortality decreases, the importance of non-communicable diseases (NCDs) increases relative to the other causes with an age-specific impact on the role of injuries, whereas for women, both NCDs and injuries gain a more significant share with mortality decreases. For children over one year, they find that there is a gradual transition from communicable to non-communicable diseases, with injuries remaining significant in males. For young adults, the epidemiological transition is particularly different: for males, there is a shift from injuries to NCDs in lower income settings, and the opposite in higher-income settings; for females, rising income also signifies a shift from NCDs to injuries, but the role of injuries becomes more significant over time compared to males. Finally, for both males and females over 50, there is no epidemiological transition impact on the cause composition of mortality.
wikipedia
wiki_22016_chunk_11
Localized molecular orbitals
Pipek and Mezey originally used Mulliken charges, which are mathematically ill defined. Recently, Pipek-Mezey style schemes based on a variety of mathematically well-defined partial charge estimates have been discussed. Some notable choices are Voronoi charges, Becke charges, Hirshfeld or Stockholder charges, intrinsic atomic orbital charges, Bader charges, or "fuzzy atom" charges. Rather surprisingly, despite of the wide variation in the (total) partial charges reproduced by the different estimates, analysis of the resulting Pipek-Mezey orbitals has shown that the localized orbitals are rather insensitive to the partial charge estimation scheme used in the localization process. However, due to the ill-defined mathematical nature of Mulliken charges (and Löwdin charges, which have also been used in some works), as better alternatives are nowadays available it is advisable to use them in favor of the original version.
wikipedia
wiki_23109_chunk_5
List of Philippine mythological figures
Supreme Being: referred to as Mayo, in one account; probably regarded as remote as fear and meticulous ritual care are often related instead towards the Añitu Mayo: a fisherfolk hero who introduced the yuyus used to catch flying fishes called dibang, which are in turn used to catch the summertime fish arayu The Giver: the entity who provides all things; the souls of the upper class travel to the beings's abode in heaven and become stars Añitu: refers to the souls of the dead, place spirits, and wandering invisibles not identified nor tied down to any particular locale or thing Añitu between Chavidug and Chavayan: place spirit Añitus who were reported to create sounds when the gorge between Chavidug and Chavayan were being created through dynamite explosions; believed to have shifted their residences after the construction of the passage Rirryaw Añitu: place spirit Añitus who played music and sang inside a cave in Sabtang, while lighting up fire; believed to have change residences after they were disturbed by a man ji Rahet Añitu: a grinning place spirit Añitu who lived in an old tree; a man later cut the tree and found an earthen pot believed to have been owned by the Añitu Nuvwan Añitu: good place spirit Añitus who saved a woman from a falling tree; they are offered rituals through the vivyayin ji P'Supwan Añitu: good place spirit Añitus who became friends and allies of a mortal woman named Carmen Acido; sometimes taking in the form of dogs, they aided her and guided her in many of her tasks until her death from old age; despite their kindness towards Carmen, most people avoided the farm where they live Mayavusay Añitu: place spirit Añitus living in a parcel of land in Mayavusay; sometimes take in the form of piglets, and can return cut vegetation parts into the mother vegetation Cairn-dwelling Añitu: place spirit Añitus who lived in cairns and put a curse towards a man who destroyed their home; appearing as humans, the shaman Balaw conversed with them to right the wrong made by the man against their home Mayuray Añitu: a wandering Añitu who expanded and was filled with darkness; encountered by a young boy who the spirit did not harm; referred as a kapri, Añitus who walk around and grow as tall as the height for their surroundings Dayanak Añitu: a type of very small Añitu with red eyes and gold ornaments; accepting their gold ornaments will cause misfortune
wikipedia
wiki_15845_chunk_18
MRC Laboratory of Molecular Biology
Instrumentation Scientific advances often depend on technological advances: the LMB has been at the forefront of many of these. Some major examples include nucleic acid sequencing, protein and antibody engineering, construction of new X-ray equipment and the invention of the scanning confocal microscope. Administrative structure
wikipedia
wiki_21924_chunk_1
Kasami code
Kasami Set The process of generating a Kasami sequence is initiated by generating a maximum length sequence a(n), where n=1..2N-1. Maximum length sequences are periodic sequences with a period of exactly 2N-1. Next, a secondary sequence is derived from the initial sequence via cyclic decimation sampling as b(n) = a(q*n), where q = 2N/2+1. Modified sequences are then formed by adding a(n) and cyclically time shifted versions of b(n) using modulo-two arithmetic, which is also termed the exclusive or (xor) operation. Computing modified sequences from all 2N/2 unique time shifts of b(n) forms the Kasami set of code sequences.
wikipedia
wiki_7997_chunk_41
Advanced Idea Mechanics
Video games A.I.M. troopers and attack bots appear in Marvel Ultimate Alliance, with the former voiced by Steve Blum. A.I.M. appears in the 2008 Iron Man film tie-in game. They work with Obadiah Stane to develop an army of Iron Men based on Tony Stark's original prototype suit. Although their attempts to develop an effective power source fail, they are able to create Titanium Man. However, Iron Man defeats it before thwarting A.I.M.'s attempt to acquire various satellites' power sources. A.I.M. appears in the PS2 and PSP versions of Spider-Man: Web of Shadows, having aligned themselves with Spencer Smythe. A.I.M. agents appear in Marvel Super Hero Squad, voiced by Travis Willingham, Nolan North, and Troy Baker. A.I.M. appears in the Iron Man 2 film tie-in game, with its agents voiced by Catherine Campion, Andrew Chaikin, Denny Delk, Eric Goldberg, Adam Harrington, and Roger L. Jackson. They work with Kearson DeWitt in collaboration with Roxxon to perfect the Ultimo Program. A.I.M. and their R.A.I.D. (Radically Advanced Ideas of Destruction) branch appears in Marvel Avengers Alliance. A.I.M. appears in Iron Man 3: The Official Game. A.I.M. appears in Marvel Heroes. Led by MODOK, they are shown working with the Wizard and Doctor Octopus. A.I.M. appears in Lego Marvel Super Heroes. Led by MODOK, they are among the supervillains that allied themselves with Doctor Doom. Iron Man, Thor, and Spider-Man track Doom aboard an A.I.M. submarine, where they defeat MODOK and his agents. A.I.M., hybridized with Resident Evils Umbrella Corporation to create "A.I.M.brella", appears as a stage in Marvel vs. Capcom Infinite. Unlike other fused locations, which were created by Ultron Sigma after they fused their respective universes together, A.I.M.brella was a proper company merger, as both A.I.M. and Umbrella are led by warped scientists who chose to pool their resources. A.I.M. agents appear in Lego Marvel Super Heroes 2. A.I.M. is referenced in Spider-Man, providing funding to Otto Octavius when the city rescinds his development grant. A.I.M. appears in Marvel's Avengers. Founded by Dr. George Tarleton after the events of "A-Day", this version is portrayed as a powerful multinational corporation built to protect the world through science as opposed to heroes. They also develop robotic synthoids that perform public service duties and manage the growing population of Inhumans. Five years later, A.I.M. has established a virtual police state in the U.S. Additionally, a young Inhuman named Kamala Khan discovers that the company's leaders are experimenting on Inhumans rather than curing them as well as harvesting their powers to create an army of Adaptoids to replace the Avengers. A warped Tarleton, now MODOK, intends to wipe out all Inhumans and superpowers on Earth, but he is defeated by Khan and the Avengers. After he is presumed dead, Monica Rappaccini assumes control of A.I.M. and its assets. Realizing that the company is still an active threat, the Avengers partner with S.H.I.E.L.D. to locate and take out A.I.M.'s remaining facilities around the world.
wikipedia
wiki_2222_chunk_8
Landscape ecology
Today, theory and application of landscape ecology continues to develop through a need for innovative applications in a changing landscape and environment. Landscape ecology relies on advanced technologies such as remote sensing, GIS, and models. There has been associated development of powerful quantitative methods to examine the interactions of patterns and processes. An example would be determining the amount of carbon present in the soil based on landform over a landscape, derived from GIS maps, vegetation types, and rainfall data for a region. Remote sensing work has been used to extend landscape ecology to the field of predictive vegetation mapping, for instance by Janet Franklin.
wikipedia
wiki_10288_chunk_3
Louis Vauxcelles
A movement I consider dangerous (despite the great sympathy I have for its perpetrators) is taking shape among a small clan of youngsters. A chapel has been established, two haughty priests officiating. MM Derain and Matisse; a few dozen innocent catechumens have received their baptism. Their dogma amounts to a wavering schematicism that proscribes modeling and volumes in the name of I-don't-know-what pictorial abstraction. This new religion hardly appeals to me. I don't believe in this Renaissance... M. Matisse, fauve-in-chief; M. Derain, fauve deputy; MM. Othon Friesz and Dufy, fauves in attendance... and M. Delaunay (a fourteen-year-old-pupil of M. Metzinger...), infantile fauvelet. (Vauxcelles, Gil Blas, 20 March 1907).
wikipedia
wiki_24017_chunk_5
School of Chemistry, University of Edinburgh
In the Research Assessment Exercise (RAE) 2008, the most in-depth analysis of research outputs for seven years, EaStCHEM, submitted 73% of all world leading outputs (4*) in Scotland and 12% of world leading outputs in all of the UK. From 31 submissions EastChem was the largest in UK Chemistry. EaStCHEM comes joint 4th in the Grade Point Average (GPA) metric, and first when staff numbers are factored in (the power ranking). Research Themes The School has four major research themes as part of EaStCHEM:
wikipedia
wiki_16044_chunk_4
Math circle
Project-based clubs may spend a few meetings building origami, developing a math trail in their town, or programming a mathy computer game together. Math-rich projects may be artistic, exploratory, applied to sciences, executable (software-based), business-oriented, or directed at real contributions to local communities. Museums, cultural and business clubs, tech groups, online networks, artists/musicians/actors active in the community, and other individual professionals can make math projects especially real and meaningful. Increasingly, math clubs invite remote participation of active people (authors, community leaders, professionals) through webinar and teleconferencing software.
wikipedia
wiki_21609_chunk_3
Tricorn (mathematics)
Basic properties The tricorn is compact, and connected. In fact, Nakane modified Douady and Hubbard's proof of the connectedness of the Mandelbrot set to construct a dynamically defined real-analytic diffeomorphism from the exterior of the tricorn onto the exterior of the closed unit disc in the complex plane. One can define external parameter rays of the tricorn as the inverse images of radial lines under this diffeomorphism. Every hyperbolic component of the tricorn is simply connected. The boundary of every hyperbolic component of odd period of the tricorn contains real-analytic arcs consisting of quasi-conformally equivalent but conformally distinct parabolic parameters. Such an arc is called a parabolic arc of the tricorn. This is in stark contrast with the corresponding situation for the Mandelbrot set, where parabolic parameters of a given period are known to be isolated. The boundary of every odd period hyperbolic component consists only of parabolic parameters. More precisely, the boundary of every hyperbolic component of odd period of the tricorn is a simple closed curve consisting of exactly three parabolic cusp points as well as three parabolic arcs, each connecting two parabolic cusps. Every parabolic arc of period k has, at both ends, an interval of positive length across which bifurcation from a hyperbolic component of odd period k to a hyperbolic component of period 2k occurs.
wikipedia
wiki_23502_chunk_0
Low-energy electron microscopy
Low-energy electron microscopy, or LEEM, is an analytical surface science technique used to image atomically clean surfaces, atom-surface interactions, and thin (crystalline) films. In LEEM, high-energy electrons (15-20 keV) are emitted from an electron gun, focused using a set of condenser optics, and sent through a magnetic beam deflector (usually 60˚ or 90˚). The “fast” electrons travel through an objective lens and begin decelerating to low energies (1-100 eV) near the sample surface because the sample is held at a potential near that of the gun. The low-energy electrons are now termed “surface-sensitive” and the near-surface sampling depth can be varied by tuning the energy of the incident electrons (difference between the sample and gun potentials minus the work functions of the sample and system). The low-energy elastically backscattered electrons travel back through the objective lens, reaccelerate to the gun voltage (because the objective lens is grounded), and pass through the beam separator again. However, now the electrons travel away from the condenser optics and into the projector lenses. Imaging of the back focal plane of the objective lens into the object plane of the projector lens (using an intermediate lens) produces a diffraction pattern (low-energy electron diffraction, LEED) at the imaging plane and recorded in a number of different ways. The intensity distribution of the diffraction pattern will depend on the periodicity at the sample surface and is a direct result of the wave nature of the electrons. One can produce individual images of the diffraction pattern spot intensities by turning off the intermediate lens and inserting a contrast aperture in the back focal plane of the objective lens (or, in state-of-the-art instruments, in the center of the separator, as chosen by the excitation of the objective lens), thus allowing for real-time observations of dynamic processes at surfaces. Such phenomena include (but are not limited to): tomography, phase transitions, adsorption, reaction, segregation, thin film growth, etching, strain relief, sublimation, and magnetic microstructure. These investigations are only possible because of the accessibility of the sample; allowing for a wide variety of in situ studies over a wide temperature range. LEEM was invented by Ernst Bauer in 1962; however, not fully developed (by Ernst Bauer and Wolfgang Telieps) until 1985.
wikipedia
wiki_34919_chunk_5
Process simulation
Efforts are made to develop new and improved models for the calculation of properties. This includes for example the description of thermophysical properties like vapor pressures, viscosities, caloric data, etc. of pure components and mixtures properties of different apparatus like reactors, distillation columns, pumps, etc. chemical reactions and kinetics environmental and safety-related data There are two main types of models: Simple equations and correlations where parameters are fitted to experimental data. Predictive methods where properties are estimated.
wikipedia
wiki_4142_chunk_10
Ant colony optimization algorithms
Algorithm and formula In the ant colony optimization algorithms, an artificial ant is a simple computational agent that searches for good solutions to a given optimization problem. To apply an ant colony algorithm, the optimization problem needs to be converted into the problem of finding the shortest path on a weighted graph. In the first step of each iteration, each ant stochastically constructs a solution, i.e. the order in which the edges in the graph should be followed. In the second step, the paths found by the different ants are compared. The last step consists of updating the pheromone levels on each edge.
wikipedia
wiki_1466_chunk_26
One-instruction set computer
Arithmetic machine In an attempt to make Turing machine more intuitive, Z. A. Melzac consider the task of computing with positive numbers. The machine has an infinite abacus, an infinite number of counters (pebbles, tally sticks) initially at a special location S. The machine is able to do one operation: Take from location X as many counters as there are in location Y and transfer them to location Z and proceed to next instruction.
wikipedia
wiki_34910_chunk_48
Watson (computer)
Several startups in the healthcare space have been effectively using seven business model archetypes to take solutions based on IBM Watson to the marketplace. These archetypes depends on the value generate for the target user (e.g. patient focus vs. healthcare provider and payer focus) and value capturing mechanisms (e.g. providing information or connecting stakeholders).
wikipedia
wiki_6736_chunk_1
List of interactive geometry software
There are three main types of computer environments for studying school geometry: supposers, dynamic geometry environments (DGEs) and Logo-based programs. Most are DGEs: software that allows the user to manipulate ("drag") the geometric object into different shapes or positions. The main example of a supposer is the Geometric Supposer, which does not have draggable objects, but allows students to study pre-defined shapes. Nearly all of the following programs are DGEs. For a related, comparative physical example of these algorithms, see Lenart Sphere. License and platform
wikipedia
wiki_8969_chunk_14
Combat flight simulation game
Study The "study sim" is a genre of simulation games that focuses on modelling an aircraft's systems as accurately as possible. Advancing computer technology made this possible, with the development of highly detailed models that improved upon the fidelity of avionics, weapons systems, physics, flight models, graphics, etc. and allowed for fully interactive cockpits where virtually every control was mapped and functional. This was important as modern jet combat aircraft and helicopters have a variety of complex electronic and weapon systems that are specific to a particular aircraft.
wikipedia
wiki_8558_chunk_6
Somatic cell count
As discussed in the paper Guidelines for Using the DHI Somatic Cell Count Program: The results of many studies suggest that cows with SCC of less than 200,000 are not likely to be infected with major mastitis pathogens, but cows with SCC above 300,000 are probably infected (Smith, 1996). Herds with bulk tank SCC above 200,000 will have varying degrees of subclinical mastitis present. Data from the National Mastitis Council (1987) show that 6% of the [udder] quarters in a herd could be expected to be infected in a herd with a bulk tank SCC of 200,000. At 500,000 SCC, 16% of the quarters may be infected with a 6% reduction in milk production compared to a SCC of 200,000.
wikipedia
wiki_16079_chunk_11
Energy (psychological)
Concerning meta-analyses, four revealed a large effect size and one a moderate effect size. The Gilomen & Lee (2015) meta-analysis indicated a moderate effect size of tapping on psychological distress (utilizing Hedge’s g as compared to the standard Cohen’s h), although they opined that the results could be due to factors common to other therapeutic approaches, and not necessarily due to tapping. Nelms & Castel (2016) found a large effect size on tapping for depression, Clond’s (2017) revealed a large effect size for treating anxiety, and Sebastian & Nelms (2017) also indicated a large effect size for PTSD. Regarding the question of acupoint tapping as an active therapeutic ingredient, the meta-analysis by Church, Stapleton, Kip & Gallo (2020) revealed a large effect size in this regard, supporting tapping as an active therapeutic ingredient.
wikipedia
wiki_843_chunk_47
Threaded code
External links Anton Ertl's explanatory page What is Threaded Code? describes different threading techniques and provides further references. The Development of the C Language by Dennis M. Ritchie describes B (a precursor of C) as implemented using "threaded code". Thinking Forth Project includes the seminal (but out of print) book Thinking Forth by Leo Brodie published in 1984. Starting FORTH online version of the book Starting FORTH by Leo Brodie published in 1981. Brad Rodriguez's Moving FORTH: Part 1: Design Decisions in the Forth Kernel covers threading techniques in depth. History of general purpose CPUs GCC extensions. Labels as Values (NB. Brief overview on the threaded languages, System and User RPL, used on the HP calculators like the HP 48.)
wikipedia
wiki_16371_chunk_6
Evolutionary educational psychology
Stated differently, Is the goal of education to have children recreate the process of discovery, to learn the products of discovery, or some combination? Some educators have advocated a focus on the process of discovery without full consideration of the constellation of traits and opportunity that contribute to the creation of secondary knowledge (e.g., Cobb, Yackel, & Wood, 1992). In fact, research on creative-productive individuals suggests that the full constellation of traits that facilitate the discovery and creation of secondary knowledge is rare and not likely reproducible on a large scale (Simonton, 1999a, 1999b, 2003; Sternberg, 1999; Wai, Lubinski, & Benbow, 2005).
wikipedia
wiki_24815_chunk_21
Sociological classifications of religious movements
Johnstone provides the following seven characteristics of churches: Claim universality, include all members of the society within their ranks, and have a strong tendency to equate "citizenship" with "membership" Exercise religious monopoly and try to eliminate religious competition Are very closely allied with the state and secular powers; frequently there is overlapping of responsibilities and much mutual reinforcement Are extensively organized as a hierarchical bureaucratic institution with a complex division of labor Employ professional, full-time clergy who possess the appropriate credentials of education and formal ordination Primarily gain new members through natural reproduction and the socialization of children into the ranks Allow for diversity by creating different groups within the church (e.g., orders of nuns or monks) rather than through the formation of new religions
wikipedia
wiki_7873_chunk_3
Medical algorithm
Examples of medical algorithms are: Calculators, e.g. an on-line or stand-alone calculator for body mass index (BMI) when stature and body weight are given; Flowcharts and drakon-charts, e.g. a binary decision tree for deciding what is the etiology of chest pain Look-up tables, e.g. for looking up food energy and nutritional contents of foodstuffs Nomograms, e.g. a moving circular slide to calculate body surface area or drug dosages.
wikipedia
wiki_5549_chunk_24
Nanotechnology education
United Kingdom Bangor University - master's University of Birmingham - Ph.D University of Cambridge - master's, Ph.D Cranfield University - master's, Ph.D (Certificate/Degree Programs) Heriot-Watt University - bachelor's, master's Lancaster University - master's Imperial College London - master's University College London - master's University of Leeds - bachelor's, master's University of Liverpool - master's University of Manchester- Ph.D University of Nottingham - master's University of Oxford - Postgraduate Certificate University of Sheffield - master's, Ph.D University of Surrey - master's University of Sussex - bachelor's University of Swansea- B.Eng, M.Eng, M.Sc, M.Res, M.Phil and Ph.D University of Ulster - master's University of York- bachelor's, master's
wikipedia
wiki_877_chunk_18
Deep Blue (chess computer)
External links IBM.com, IBM Research pages on Deep Blue IBM.com, IBM page with the computer logs from the games Chesscenter.com, Open letter from Feng-hsiung Hsu on the aborted rematch with Kasparov, The Week in Chess Magazine, issue 270, 10 January 2000 Chesscenter.com, Open Letter from Owen Williams (Gary Kasparov's manager), responding to Feng-hsiung Hsu, 13 January 2000 Sjeng.org, Deep Blue system described by Feng-hsiung Hsu, Murray Campbell and A. Joseph Hoane Jr. (PDF) Chessclub.com, ICC Interview with Feng-Hsiung Hsu, an online interview with Hsu in 2002 (annotated)
wikipedia
wiki_8469_chunk_9
Superconducting quantum computing
In the table below, the three archetypes are reviewed. In the first row, the qubit electrical circuit diagram is presented. In the second, the quantum Hamiltonian derived from the circuit is shown. Generally, the Hamiltonian can be divided to a "kinetic" and "potential" parts, in analogy to a particle in a potential well. The particle mass corresponds to some inverse function of the circuit capacitance, while the shape of the potential is governed by the regular inductors and Josephson junctions. One of the first challenges in qubit design is to shape the potential well and to choose the particle mass in a way that the energy separation between specific two of the energy levels will differ from all other inter-level energy separations in the system. These two levels will be used as the logical states of the qubit. The schematic wave solutions in the third row of the table depict the complex amplitude of the phase variable. In other words, if a phase of the qubit is measured while the qubit is in a specific state, there is a non-zero probability to measure a specific value only where the depicted wave function oscillates. All three rows are essentially three different presentations of the same physical system.
wikipedia
wiki_2524_chunk_38
Heyting algebra
Heyting algebra of propositional formulas in n variables up to intuitionist equivalence The metaimplication in the section "Provable identities" is proved by showing that the result of the following construction is itself a Heyting algebra: Consider the set L of propositional formulas in the variables A1, A2,..., An. Endow L with a preorder ≼ by defining F≼G if G is an (intuitionist) logical consequence of F, that is, if G is provable from F. It is immediate that ≼ is a preorder. Consider the equivalence relation F∼G induced by the preorder F≼G. (It is defined by F∼G if and only if F≼G and G≼F. In fact, ∼ is the relation of (intuitionist) logical equivalence.) Let H0 be the quotient set L/∼. This will be the desired Heyting algebra. We write [F] for the equivalence class of a formula F. Operations →, ∧, ∨ and ¬ are defined in an obvious way on L. Verify that given formulas F and G, the equivalence classes [F→G], [F∧G], [F∨G] and [¬F] depend only on [F] and [G]. This defines operations →, ∧, ∨ and ¬ on the quotient set H0=L/∼. Further define 1 to be the class of provably true statements, and set 0=[⊥]. Verify that H0, together with these operations, is a Heyting algebra. We do this using the axiom-like definition of Heyting algebras. H0 satisfies conditions THEN-1 through FALSE because all formulas of the given forms are axioms of intuitionist logic. MODUS-PONENS follows from the fact that if a formula ⊤→F is provably true, where ⊤ is provably true, then F is provably true (by application of the rule of inference modus ponens). Finally, EQUIV results from the fact that if F→G and G→F are both provably true, then F and G are provable from each other (by application of the rule of inference modus ponens), hence [F]=[G].
wikipedia
wiki_16399_chunk_6
Autonomic networking
In the case of autonomic networking, the state of the network may be defined by inputs from: individual network elements such as switches and network interfaces including specification and configuration historical records and current state traffic flows end-hosts application performance data logical diagrams and design specifications Most of these sources represent relatively raw and unprocessed views that have limited relevance. Post-processing and various forms of analysis must be applied to generate meaningful measurements and assessments against which current state can be derived.
wikipedia
wiki_7017_chunk_7
Concurrent engineering
Challenges associated with concurrent design Concurrent design comes with a series of challenges, such as implementation of early design reviews, dependency on efficient communication between engineers and teams, software compatibility, and opening up the design process. This design process usually requires that computer models (computer aided design, finite element analysis) are exchanged efficiently, something that can be difficult in practice. If such issues are not addressed properly, concurrent design may not work effectively. It is important to note that although the nature of some project activities project imposes a degree of linearity—completion of software code, prototype development and testing, for example—organizing and managing project teams to facilitate concurrent design can still yield significant benefits that come from the improved sharing of information.
wikipedia
wiki_3756_chunk_3
Function pointer
The following C program illustrates the use of two function pointers: func1 takes one double-precision (double) parameter and returns another double, and is assigned to a function which converts centimetres to inches. func2 takes a pointer to a constant character array as well as an integer and returns a pointer to a character, and is assigned to a C string handling function which returns a pointer to the first occurrence of a given character in a character array. #include <stdio.h> /* for printf */ #include <string.h> /* for strchr */
wikipedia
wiki_11615_chunk_17
Mathematics of Sudoku
In a 2005 study, Felgenhauer and Jarvis analyzed the permutations of the top band used in valid solutions. Once the Band1 symmetries and equivalence classes for the partial grid solutions were identified, the completions of the lower two bands were constructed and counted for each equivalence class. Summing completions over the equivalence classes, weighted by class size, gives the total number of solutions as 6,670,903,752,021,072,936,960, confirming the value obtained by QSCGZ. The value was subsequently confirmed numerous times independently. A second enumeration technique based on band generation was later developed that is significantly less computationally intensive. This subsequent technique resulted in roughly needing 1/97 of the number of computation cycles as the original techniques, but was significantly more complicated to set up.
wikipedia
wiki_39963_chunk_8
Read code
Read version 3 (Clinical Terms Version 3 or 'CTV3') A third and more radically progressive version was devised through the 1990s in an attempt to address some of the more serious technical limitations of the earlier designs, including: Although codes remain 5-bytes in length, the hierarchical relationship between codes is no longer represented through the codes themselves but rather through a separate table listing all binary parent-child relations; this allows for a polyhierarchy of indefinite depth. Codes exist independently from the terms associated with them; terms now have their own 5-Byte code identifier, usually beginning with the letter 'Y' Both concept codes and term codes have a release status, thus allowing authoring errors to be corrected: concepts and terms may be moved to different places in the polyhierarchy between releases, or retired from the scheme (and hierarchy) altogether. A large scale professional consultation exercise, the 'Clinical Terms Project', was conducted to identify clinically valuable concepts that were not codable within version 2. This led to a significant expansion in the content of CTV3, including improved support for the various 'professions allied to medicine', such as speech therapy, physiotherapy and community nursing. CTV3 concepts can be qualified or 'post-coordinated' by the addition of further codes, to form compound expressions with more detailed semantics than may be expressed by any single code alone. For example, a procedure code can be associated via a laterality attribute code with a laterality value (left/right/bilateral). Many concepts were provided with partially modelled definitions. Thus, many surgical procedures have a 'site' relationship linking to the code for the anatomical target(s) of the procedure:
wikipedia
wiki_18247_chunk_3
Networks II
Hacks Hosting of multiple forums. Threading of forums Binary searching the user entries (instead of sequential database access) Loading pointers into memory instead of the slow sequential text file methodology Support for extended and lower case characters. Interactive games and surveys. Switching from Networks II to ASCII Express Professional without disconnecting the user. This allowed Networks II to indirectly support XMODEM, Ward Christensen protocol, ZMODEM, and other advanced file transfer protocols. The only problem with this hack is that ASCII Express Pro cannot re-connect to Networks II. Support for more than two disk drives, i.e. support for multiple volumes when used with a hard disk drive. Support for ProDOS 8.
wikipedia
wiki_18764_chunk_76
Anonymous function
Performance metrics to analyze the space and time complexities of function calls, call stack, etc. in a JavaScript interpreter engine implement easily with these last anonymous function constructs. From the implications of the results, it is possible to deduce some of an engine's recursive versus iterative implementation details, especially tail-recursion. Julia In Julia anonymous functions are defined using the syntax (arguments)->(expression), julia> f = x -> x*x; f(8) 64 julia> ((x,y)->x+y)(5,6) 11
wikipedia
wiki_35535_chunk_3
Business & Information Systems Engineering
Types of Submissions BISE allows different types of submissions. Research articles are the core of the journal and provide completed research results as original and substantial contributions to the literature. The journal also publishes research notes, which promote the dialogue among the community on new and emerging developments. This can include reports on new conceptual ideas or successful applications in the field, which are relevant to practitioners and encourage future research. BISE also publishes state-of-the-art articles, which survey recent developments in a particular field of interest. All of the above types of submissions are double-blind peer-reviewed research contributions. The Department Human Computer Interaction and Social Computing is accepting Registered Reports since 2019.
wikipedia
wiki_25_chunk_53
Algebraic geometry
Algebraic stacks can be further generalized and for many practical questions like deformation theory and intersection theory, this is often the most natural approach. One can extend the Grothendieck site of affine schemes to a higher categorical site of derived affine schemes, by replacing the commutative rings with an infinity category of differential graded commutative algebras, or of simplicial commutative rings or a similar category with an appropriate variant of a Grothendieck topology. One can also replace presheaves of sets by presheaves of simplicial sets (or of infinity groupoids). Then, in presence of an appropriate homotopic machinery one can develop a notion of derived stack as such a presheaf on the infinity category of derived affine schemes, which is satisfying certain infinite categorical version of a sheaf axiom (and to be algebraic, inductively a sequence of representability conditions). Quillen model categories, Segal categories and quasicategories are some of the most often used tools to formalize this yielding the derived algebraic geometry, introduced by the school of Carlos Simpson, including Andre Hirschowitz, Bertrand Toën, Gabrielle Vezzosi, Michel Vaquié and others; and developed further by Jacob Lurie, Bertrand Toën, and Gabriele Vezzosi. Another (noncommutative) version of derived algebraic geometry, using A-infinity categories has been developed from the early 1990s by Maxim Kontsevich and followers.
wikipedia