id
stringlengths 14
20
| title
stringlengths 4
131
| text
stringlengths 52
43k
| source
stringclasses 1
value |
|---|---|---|---|
wiki_15922_chunk_0
|
List of MeSH codes (B05)
|
The following is a partial list of the "B" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (B04). Codes following these are found at List of MeSH codes (B06). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – fungi
|
wikipedia
|
wiki_26054_chunk_29
|
Dalian Software Park
|
In Dalian Software Park
Built and managed by Dalian Software Co., Ltd.
American companies: Accenture, Fidelity Investments, Genpact (a GE company), HP, IBM, Oracle Corporation, Cisco, Symantec, Netapp, etc.
Chinese companies: China Software & Service (CS&S), Neusoft Group, Neusoft Institute of Information, New Touch, etc.
European companies: British Telecom (UK), SAP (Germany), Oostsourcing (A joint venture of Akyla 40%, Better Be 40%, Insight 20%, Netherlands)
Japanese companies Alpine, Fujitsu Device, Hitachi, NEC, Panasonic, OMRON, Sony, Sumitomo Wiring Systems, Yokogawa Electric, etc.
Other companies: Satyam (India), Wistron (Taiwan), etc.
|
wikipedia
|
wiki_6529_chunk_3
|
NL (complexity)
|
NL-complete problems
Several problems are known to be NL-complete under log-space reductions, including ST-connectivity and 2-satisfiability. ST-connectivity asks, for nodes S and T in a directed graph, whether T is reachable from S. 2-satisfiability asks, given a propositional formula of which each clause is the disjunction of two literals, if there is a variable assignment that makes the formula true. An example instance, where indicates not, might be:
|
wikipedia
|
wiki_3421_chunk_2
|
Piecewise linear function
|
Other examples of piecewise linear functions include the absolute value function, the sawtooth function, and the floor function. Fitting to a curve An approximation to a known curve can be found by sampling the curve and interpolating linearly between the points. An algorithm for computing the most significant points subject to a given error tolerance has been published. Fitting to data If partitions, and then breakpoints, are already known, linear regression can be performed independently on these partitions.
However, continuity is not preserved in that case, and also there is no unique reference model underlying the observed data. A stable algorithm with this case has been derived.
|
wikipedia
|
wiki_9794_chunk_4
|
Powerhouse (TV series)
|
Episode list
"With a Little Help From My Friends (Part 1)": Brenda Gaines inherits her late father's gym, Powerhouse, intending to convert it into a youth center. She receives help from Jennifer LaBianca, Kevin Jackson, Tony Dominguez, Lolo Knopke, and Pepper McKenzie, but their efforts are threatened by a gang led by the mysterious Castor.
"With a Little Help From My Friends (Part 2)": Having been framed for a crime she didn't commit, Brenda tries to learn Castor's identity and successfully open Powerhouse.
"Life or Breath": The son of a foreign ambassador is kidnapped, and the Powerhouse gang urgently attempts to find and rescue him, as he needs medicine for a stress-related illness.
"Master of the Art": When an artifact is delivered to the local museum, the Powerhouse gang and the curator attempt to prove that there are flaws with the museum's alarm system.
"You Make Me Sick": When people all over town contract a fatal virus, the gang sets out to find the cause. Their task becomes more urgent when Brenda herself catches the virus after taking a bite of a tainted tuna fish sandwich.
"Celebration": Lolo decides to call off his Bar Mitzvah after he and his grandfather become victims of a hate crime.
"Something for Nothing": Brenda temporarily closes Powerhouse following an accident that hurts Lolo. While she goes to New York to get money for repairs, the kids decide to film a commercial about Powerhouse, unaware they are being scammed by a crooked landowner and his accomplice.
"Cheers": Pepper and Lt. Al Gambrino's son Peter learn the hard way about the dangers of drinking excessively.
"Name of the Game": Both Tony's foot injury and the antagonistic behavior of new team player El Gato threaten Powerhouse's chances of winning the championship soccer game.
"One of the Gang": Kevin refuses help from Mike, a boy with a prosthetic arm. Meanwhile, at a nursing home, elderly resident Diamonds O'Toole is targeted by a thief posing as an orderly, who tries to torture him into revealing the location of diamonds he hid somewhere in Powerhouse.
"Something Ventured" (the pilot episode): The Powerhouse gang and Brenda attempt to identify the perpetrator of a series of burglaries. In this episode, Kevin is Brenda's son, and Bobby and Bizzy are later renamed Tony and Pepper. Also, both the gang and Powerhouse are already established.
"Help Wanted": Tammy DeWitt arrives with her baby son David, and the Powerhouse gang try to work out whether she kidnapped him.
"What Have You Got to Lose?": Kevin and his boss Mr. Baxter agree to try a doctor's weight loss program.
"Big Devil": Angie tries to prove herself as a female jockey by riding Big Devil.
"Fit to be Tied": When a visitor's brother is kidnapped by people who want a microfilm, the Powerhouse gang try to rescue him.
"The Short Life of Lolo Knopke": A bomb goes off at Powerhouse, killing Lolo. Brenda, Jennifer, and Kevin recount all the times he helped solve crimes and problems. But nothing is what it appears to be.
|
wikipedia
|
wiki_26525_chunk_16
|
Materials science in science fiction
|
In the video game Fallout 3, one of the consumable items is called the "Nuka-Cola Quantum", which supposedly gets its unique properties from the addition of strontium-90 in its formula.
|A dirty bomb containing strontium-90 is a potential terrorist weapon.
|-
|Thallium
|Protector and other Larry Niven works set in Known Space
|In these works, humans are derived from another race, in which human-like beings are the juvenile form of a smarter and tougher adult, the Pak Protector. The transformation between the forms is triggered by a virus. These beings establish an Earth colony, but the virus requires significant amounts of thallium oxide in the environment. Since the Earth does not have enough thallium, the virus dies out, and humans then evolved from the juvenile form. Critics have noted this cannot explain the similarity of DNA in humans and much older life forms on Earth.
|Niven's use is plausible but fictional. The same effect occurs in vitamin deficiency.
|-
|Thorium
|Robert A. Heinlein's novels, Star Wars, others
|Robert A. Heinlein envisioned thorium as being a spacecraft fuel of the near future Earth shown in Rocket Ship Galileo and Have Space Suit—Will Travel, and of the more advanced space-traveling civilization described in his novel Citizen of the Galaxy. This use is also seen in the Master of Orion series of video games.
|
wikipedia
|
wiki_9207_chunk_10
|
Phonological history of English close back vowels
|
{| cellspacing="0" cellpadding="0"
|-
| style="width:9em"|
| style="width:3em" valign="center"|
| style="width:3em"|
| style="width:3em"|
| style="width:3em"|
| style="width:3em" |
|
|- style="text-align:center"
|
| moodgoosetooth
| goodfootbook
| bloodfloodbrother
| cutdullfun
| putfullsugar
|- style="text-align:center"
| Middle English
|style="border-top:1px solid;border-left:1px solid"|
|style="border-top:1px solid"|
|style="border-top:1px solid"|
|style="border-top:1px solid;border-left:1px solid"|
|style="border-top:1px solid"|
|- style="text-align:center"
| Great Vowel Shift
|style="border-top:1px dotted;border-left:1px solid"|
|style="border-top:1px dotted"|
|style="border-top:1px dotted"|
|style="border-left:1px solid"|
|
|- style="text-align:center"
| Early Shortening
|style="border-left:1px solid"|
|
|style="border-top:1px dotted;border-left:1px solid"|
|
|
|- style="text-align:center"
| Quality adjustment
|style="border-left:1px solid"|
|
|style="border-top:1px dotted;border-left:1px solid"|
|style="border-top:1px dotted"|
|style="border-top:1px dotted"|
|- style="text-align:center"
| Foot–strut split
|style="border-left:1px solid"|
|
|style="border-top:1px dotted;border-left:1px solid"|
|style="border-top:1px dotted"|
|style="border-left:1px solid"|
|- style="text-align:center"
| Later shortening
|style="border-left:1px solid"|
|style="border-top:1px dotted;border-left:1px solid"|
|style="border-left:1px solid"|
|
|style="border-left:1px solid"|
|- style="text-align:center"
| Quality adjustment
|style="border-left:1px solid"|
|style="border-left:1px solid"|
|style="border-top:1px dotted;border-left:1px solid"|
|style="border-top:1px dotted"|
|style="border-left:1px solid"|
|- style="text-align:center"
| RP output
|style="border-left:1px solid"|
|style="border-left:1px solid"|
|style="border-left:1px solid"|
|
|style="border-left:1px solid"|
|-
|+ Stages of the – split and beyond, as described by
|}
|
wikipedia
|
wiki_20621_chunk_6
|
Evergreen (software)
|
Evergreen's features include:
Circulation: for staff to check items in and out to patrons
Cataloging: to add items to the library's collection and input information, classifying and indexing those items. Evergreen is known for an extremely flexible indexing system that allows for a high level of customization and by default uses Library of Congress MODS as its standard.
Online public access catalog (OPAC): a public catalog, or discovery interface, for patrons to find and request books, view their account information, and save book information in Evergreen "bookbags." The OPAC received a makeover in early 2009 with the new, optional skin, Craftsman. There is also an optional Children's OPAC. Various patron services such as paying bills by PayPal and Stripe, optional retaining of circulation history, book bags and more.
Self Service - Evergreen comes with self checkout and registration options that can be activated by the libraries.
OPAC exposes structured web data by schema.org standards to aid discovery by major search engines.
Acquisitions: for staff to keep track of those materials purchased; invoices, purchase orders, selection lists, etc.
Authorities
Serials
Web based staff client that is OS independent
Added Content services Chillifresh, Content Cafe, Novelist, OpenLibrary and Syndetics natively supported with others supportable.
Native APIs for writing custom clients.
Statistical Reporting: flexible, powerful reporting for retrieval of any statistical information stored in the database.
SIP 2.0 support: for interaction with computer management software, self-check machines, and other applications.
Search/Retrieve via URL and Z39.50 servers
|
wikipedia
|
wiki_33193_chunk_19
|
Combinatorics on words
|
Considered problems
One problem considered in the study of combinatorics on words in group theory is the following: for two elements x,y of a semigroup, does x=y modulo the defining relations of x and y. Post and Markov studied this problem and determined it undecidable. Undecidable means the theory cannot be proved. The Burnside question was proved using the existence of an infinite cube-free word. This question asks if a group is finite if the group has a definite number of generators and meets the criteria xn=1, for x in the group.
|
wikipedia
|
wiki_6311_chunk_11
|
Code reuse
|
Systematic software reuse is a strategy for increasing productivity and improving the quality of the software industry. Although it is simple in concept, successful software reuse implementation is difficult in practice. A reason put forward for this is the dependence of software reuse on the context in which it is implemented. Some problematic issues that need to be addressed related to systematic software reuse are:
a clear and well-defined product vision is an essential foundation to an software product line (SPL).
an evolutionary implementation strategy would be a more pragmatic strategy for the company.
there exist a need for continuous management support and leadership to ensure success.
an appropriate organisational structure is needed to support SPL engineering.
the change of mindset from a project-centric company to a product-oriented company is essential.
|
wikipedia
|
wiki_28484_chunk_7
|
Annotated Code of Maryland
|
Named articles
The following is a list of the 36 named articles of the code, with the year of enactment of each. Multiple entries mean that an article was enacted in stages.
Agriculture (1973)
Alcoholic Beverages (2016)
Business Occupations and Professions (1989)
Business Regulation (1992)
Commercial Law (1975)
Corporations and Associations (1975)
Correctional Services (1999, 2008)
Courts and Judicial Proceedings (1973)
Criminal Law (2002)
Criminal Procedure (2001, 2008)
Economic Development (2008)
Education (1978)
Election Law (2002)
Environment (1982, 1987)
Estates and Trusts (1974)
Family Law (1984)
Financial Institutions (1980)
General Provisions (2014)
Health - General (1982)
Health Occupations (1981)
Housing and Community Development (Division I) (2005)
Housing and Community Development (Division II) (2006)
Human Services (2007)
Insurance (1995, 1996, 1997)
Labor and Employment (1991)
Land Use (2012)
Local Government (2013)
Natural Resources (1973)
Public Safety (2003)
Public Utilities (1998, 2008, 2010)
Real Property (1974)
State Finance and Procurement (1985, 1988)
State Government (1984, 1985)
Human Relations Commission (2009)
State Personnel and Pensions (1993, 1994)
Tax - General (1988)
Tax - Property (1985)
Transportation (1977)
|
wikipedia
|
wiki_7456_chunk_6
|
Mode (statistics)
|
The following MATLAB (or Octave) code example computes the mode of a sample: X = sort(x); % x is a column vector dataset
indices = find(diff([X; realmax]) > 0); % indices where repeated values change
[modeL,i] = max (diff([0; indices])); % longest persistence length of repeated values
mode = X(indices(i));
|
wikipedia
|
wiki_4594_chunk_2
|
Rapid single flux quantum
|
An SFQ pulse is produced when magnetic flux through a superconducting loop containing a Josephson junction changes by one flux quantum, Φ0 as a result of the junction switching. SFQ pulses have a quantized area ʃV(t)dt = Φ0 ≈ = 2.07 mV⋅ps = 2.07 mA⋅pH due to magnetic flux quantization, a fundamental property of superconductors. Depending on the parameters of the Josephson junctions, the pulses can be as narrow as 1 ps with an amplitude of about 2 mV, or broader (e.g., 5–10 ps) with correspondingly lower amplitude. The typical value of the pulse amplitude is approximately 2IcRn, where IcRn is the product of the junction critical current, Ic, and the junction damping resistor, Rn. For Nb-based junction technology IcRn is on the order of 1 mV.
|
wikipedia
|
wiki_12803_chunk_29
|
Science, technology, engineering, and mathematics
|
An exhaustive list of STEM disciplines does not exist because the definition varies by organization. The U.S. Immigration and Customs Enforcement lists disciplines including architecture, physics, actuarial science, chemistry, biology, mathematics, applied mathematics, statistics, computer science, computational science, psychology, biochemistry, robotics, computer engineering, electrical engineering, electronics, mechanical engineering, industrial engineering, information science, information technology, civil engineering, aerospace engineering, chemical engineering, astrophysics, astronomy, optics, nanotechnology, nuclear physics, mathematical biology, operations research, neurobiology, biomechanics, bioinformatics, acoustical engineering, geographic information systems, atmospheric sciences, educational/instructional technology, software engineering, and educational research.
|
wikipedia
|
wiki_11673_chunk_6
|
Cognitive robotics
|
Some researchers in cognitive robotics have tried using architectures such as (ACT-R and Soar (cognitive architecture)) as a basis of their cognitive robotics programs. These highly modular symbol-processing architectures have been used to simulate operator performance and human performance when modeling simplistic and symbolized laboratory data. The idea is to extend these architectures to handle real-world sensory input as that input continuously unfolds through time. What is needed is a way to somehow translate the world into a set of symbols and their relationships. Questions
|
wikipedia
|
wiki_35806_chunk_11
|
Advanced Telescope for High Energy Astrophysics
|
Athena science goals
The "Hot and Energetic Universe" science theme revolves around two fundamental questions in astrophysics: How does ordinary matter assemble into the large-scale structures that we see today? And how do black holes grow and shape the Universe? Both questions can only be answered using a sensitive X-ray space observatory. Its combination of scientific performance exceeds any existing or planned X-ray missions by over one order of magnitude on several parameter spaces: effective area, weak line sensitivity, survey speed, just to mention a few. Athena will perform very sensitive measurements on a wide range of celestial objects. It will investigate the chemical evolution of the hot plasma permeating the intergalactic space in cluster of galaxies, search for elusive observational features of the Warm-Hot Intergalactic Medium, investigate powerful outflows ejected from accreting black holes across their whole mass spectrum, and study their impact on the host galaxy, and identify sizeable samples of comparatively rare populations of Active Galactic Nuclei (AGN) that are key to understanding the concurrent cosmological evolution of accreting black holes and galaxies. Among them are highly obscured and high-redshift (z≥6) AGN. Furthermore, Athena will be an X-ray observatory open to the whole astronomical community, poised to provide wide-ranging discoveries in almost all fields of modern astrophysics, with a large discovery potential of still unknown and unexpected phenomena. It represents the X-ray contribution to the fleet of large-scale observational facilities to be operational in the 2030s (incl. SKA, ELT, ALMA, LISA...).
|
wikipedia
|
wiki_15198_chunk_3
|
Ab initio quantum chemistry methods
|
One needs to consider the computational cost of ab initio methods when determining whether they are appropriate for the problem at hand. When compared to much less accurate approaches, such as molecular mechanics, ab initio methods often take larger amounts of computer time, memory, and disk space, though, with modern advances in computer science and technology such considerations are becoming less of an issue. The Hartree-Fock (HF) method scales nominally as N4 (N being a relative measure of the system size, not the number of basis functions) – e.g., if one doubles the number of electrons and the number of basis functions (double the system size), the calculation will take 16 (24) times as long per iteration. However, in practice it can scale closer to N3 as the program can identify zero and extremely small integrals and neglect them. Correlated calculations scale less favorably, though their accuracy is usually greater, which is the trade off one needs to consider. One popular method is Møller–Plesset perturbation theory (MP). To second order (MP2), MP scales as N4. To third order (MP3) MP scales as N6. To fourth order (MP4) MP scales as N7. Another method, coupled cluster with singles and doubles (CCSD), scales as N6 and extensions, CCSD(T) and CR-CC(2,3), scale as N6 with one noniterative step which scales as N7. Hybrid Density functional theory (DFT) methods using functionals which include Hartree–Fock exchange scale in a similar manner to Hartree–Fock but with a larger proportionality term and are thus more expensive than an equivalent Hartree–Fock calculation. Local DFT methods that do not include Hartree–Fock exchange can scale better than Hartree–Fock.
|
wikipedia
|
wiki_26180_chunk_15
|
Physical unclonable function
|
In 2015, some studies claimed it is possible to attack certain kinds of PUFs with low-cost equipment in a matter of milliseconds. A team at Ruhr Universität of Bochum, Germany demonstrated a method to create a model of XOR Arbiter PUFs and thus be able to predict their response to any kind of challenge. Their method requires only 4 CRPs which even on resource-constrained devices should not take more than about 200ms to produce. Using this method and a $25 device or an NFC-enabled smartphone, the team was able to successfully clone PUF-based RFID cards stored in the wallet of users while it was in their back pocket.
|
wikipedia
|
wiki_1303_chunk_9
|
Generic programming
|
A broad survey of genericity mechanisms in programming languages follows. For a specific survey comparing suitability of mechanisms for generic programming, see. In object-oriented languages When creating container classes in statically typed languages, it is inconvenient to write specific implementations for each datatype contained, especially if the code for each datatype is virtually identical. For example, in C++, this duplication of code can be circumvented by defining a class template:
template<typename T>
class List {
// Class contents.
};
|
wikipedia
|
wiki_15092_chunk_8
|
Rugged computer
|
Standards
MIL-STD-810: Specifically MIL-STD-810G CN1 (2014), a military standard, issued in 1962, which establishes a set of tests for determining equipment suitability to military operations. Often used as a reference in the commercial laptop industry.
MIL-STD-461: A United States Military Standard that describes how to test equipment for electromagnetic compatibility.
MIL-S-901: a military standard for shock which applies to equipment mounted on ships. Two levels apply. Grade A items are items which are essential to the safety and continued combat capability of the ship. Grade B items are items whose operation is not essential to the safety and combat capability of the ship but which could become a hazard to personnel, to Grade A items, or to the ship as a whole as a result of exposure to shock. Qualification testing is performed on a barge floating in a pond where TNT is detonated at various distances and depths in the pond to impart shock to the barges.
IEEE 1156.1-1993 IEEE Standard Microcomputer Environmental Specifications for Computer Modules
IEEE 1613 Computers in electrical substations used to concentrate data or communicate with SCADA systems follow IEEE 1613 "Standard Environmental and Testing Requirements for Communications Networking Devices in Electric Power Substations."
IP (Ingress Protection): see IP Code
IS (Intrinsic Safety): see Intrinsic safety
TEMPEST: see Tempest (codename)
ATEX (Potentially Explosive Atmospheres): see Equipment and protective systems intended for use in potentially explosive atmospheres
NEMA (National Electrical Manufacturers Association)
IK Code (Also known as EN50102) see EN 50102
European standard EN 50155, "Railway Applications—Electronic Equipment Used On Rolling Stock", provides an example of a tough non-military specification. It extends operating temperature range (−25 – +70 °C), resistance to humidity, shocks, vibrations, radiation - encountered in vehicle or airborne installations.
|
wikipedia
|
wiki_24940_chunk_41
|
Network motif
|
G-Tries
In 2010, Pedro Ribeiro and Fernando Silva proposed a novel data structure for storing a collection of sub-graphs, called a g-trie. This data structure, which is conceptually akin to a prefix tree, stores sub-graphs according to their structures and finds occurrences of each of these sub-graphs in a larger graph. One of the noticeable aspects of this data structure is that coming to the network motif discovery, the sub-graphs in the main network are needed to be evaluated. So, there is no need to find the ones in random network which are not in the main network. This can be one of the time-consuming parts in the algorithms in which all sub-graphs in random networks are derived.
|
wikipedia
|
wiki_3403_chunk_1
|
Amoeba (operating system)
|
Overview
The goal of the Amoeba project was to construct an operating system for networks of computers that would present the network to the user as if it were a single machine. An Amoeba network consists of a number of workstations connected to a "pool" of processors, and executing a program from a terminal causes it to run on any of the available processors, with the operating system providing load balancing. Unlike the contemporary Sprite, Amoeba does not support process migration.
The workstations would typically function as networked terminals only. Aside from workstations and processors, additional machines operate as servers for files, directory services, TCP/IP communications etc.
|
wikipedia
|
wiki_1166_chunk_13
|
Maple (software)
|
Solve equations numerically
The following code numerically calculates the roots of a high-order polynomial:
f := x^53-88*x^5-3*x-5 = 0 fsolve(f) -1.097486315, -.5226535640, 1.099074017 The same command can also solve systems of equations:
f := (cos(x+y))^2 + exp(x)*y+cot(x-y)+cosh(z+x) = 0:
|
wikipedia
|
wiki_21351_chunk_7
|
Inter-American Biodiversity Information Network
|
The Thematic Networks, or TNs, are intended to lead the development of theme-specific standards and protocols and in the maintenance of hemisphere-wide networks of specialists and specialized institutions. In each case a Coordinating Institution has signed a memorandum of understanding with the IEC to lead the work of the TN. They are also tasked with development of search tools and linking of data in their thematic area with data of the other TNs. The TNs, with the coordinating institution in parentheses, are: Species and Specimens (INBio, Costa Rica), Ecosystems (NatureServe, USA), Protected Areas (UNEP-WCMC, UK), Invasive Species I3N Network (United States Geological Survey, USA), and Pollinators (CoEvolution Institute, USA).
|
wikipedia
|
wiki_34155_chunk_10
|
Arithmetic circuit complexity
|
The state of the art is a lower bound for the size of a circuit computing, e.g., the polynomial given by Strassen and by Baur and Strassen. More precisely, Strassen used Bézout's lemma to show that any circuit that simultaneously computes the polynomials is of size and later Baur and Strassen showed the following: given an arithmetic circuit of size computing a polynomial one can construct a new circuit of size at most that computes and all the partial derivatives of Since the partial derivatives of are the lower bound of Strassen applies to as well. This is one example where some upper bound helps in proving lower bounds; the construction of a circuit given by Baur and Strassen implies a lower bound for more general polynomials.
|
wikipedia
|
wiki_27675_chunk_8
|
Social network aggregation
|
Applications in marketing
Social network aggregators are a powerful tool in marketing. They appear to be an efficient way to have an organized view of the content to get a better insight into the market. The needs about them are real: a study provided by eMarketer shows that 43% of marketers are complaining about a significant lack of time to find relevant content for their business. Social network aggregators grant features to share your own content in many social media to reach as many people as possible. That way, social network aggregators become a productivity enhancement tool. A list of some example social media aggregators for brands can be found here.
|
wikipedia
|
wiki_8382_chunk_5
|
National Agricultural Statistics Service
|
Producers, farm organizations, agribusinesses, lawmakers and government agencies all rely on the information produced by NASS. For instance:
Statistical information on acreage, production, stocks, prices and value is essential for the smooth operation of federal farm programs.
Agricultural data are indispensable for planning and administering related federal and state programs in such areas as consumer protection, conservation and environmental quality, trade, education and recreation.
NASS data helps to ensure an orderly flow of goods and services among agriculture's producing, processing and marketing sectors.
Reliable, timely and detailed crop and livestock statistics help to maintain a stable economic climate and minimize the uncertainties and risks associated with the production, marketing and distribution of commodities.
Farmers and ranchers rely on NASS reports in making various production and marketing decisions, such as how much grain to plant, how much livestock to raise and when to buy or sell agricultural commodities.
NASS estimates and forecasts are used by the transportation sector, warehouse and storage companies, banks and other lending institutions, commodity traders and food processors.
The businesses that provide farmers with seeds, equipment, chemicals and other goods and services use the data when planning their marketing strategies.
Analysts transform the statistics into projections of coming trends, interpretations of the trends’ economic implications and evaluations of alternative courses of action for producers, agribusinesses and policymakers.
Crop reports relating to acreage, yields, and production.
|
wikipedia
|
wiki_7072_chunk_6
|
Nested function
|
Quicksort
A more realistic example is this implementation of quicksort:
void sort(int *items, int size) {
void quickSort(int first, int last) {
void swap(int p, int q) {
int tmp = items[p];
items[p] = items[q];
items[q] = tmp;
}
int partition() {
int pivot = items[first], index = first;
swap(index, last);
for (int i = first; i < last; i++)
if (items[i] < pivot)
swap(index++, i);
swap(index, last);
return index;
}
|
wikipedia
|
wiki_8463_chunk_19
|
Archaeological theory
|
The impact of ideology
Archaeology has been and remains a cultural, gender and political battlefield. Many groups have tried to use archaeology to prove some current cultural or political point. Marxist or Marxist-influenced archaeologists in the USSR and the UK (among others) often try to prove the truth of dialectical materialism or to highlight the past (and present) role of conflict between interest groups (e.g. male vs. female, elders vs. juniors, workers vs. owners) in generating social change. Some contemporary cultural groups have tried, with varying degrees of success, to use archaeology to prove their historic right to ownership of an area of land. Many schools of archaeology have been patriarchal, assuming that in prehistory men produced most of the food by hunting, and women produced little nutrition by gathering; more recent studies have exposed the inadequacy of many of these theories. Some used the "Great Ages" theory implicit in the three-age system to argue continuous upward progress by Western civilisation. Much contemporary archaeology is influenced by neo-Darwinian evolutionary thought, phenomenology, postmodernism, agency theory, cognitive science, functionalism, gender-based and Feminist archaeology and Systems theory.
|
wikipedia
|
wiki_11412_chunk_3
|
Calculus on Manifolds (book)
|
ReceptionCalculus on Manifolds aims to present the topics of multivariable and vector calculus in the manner in which they are seen by a modern working mathematician, yet simply and selectively enough to be understood by undergraduate students whose previous coursework in mathematics comprises only one-variable calculus and introductory linear algebra. While Spivak's elementary treatment of modern mathematical tools is broadly successful—and this approach has made Calculus on Manifolds a standard introduction to the rigorous theory of multivariable calculus—the text is also well known for its laconic style, lack of motivating examples, and frequent omission of non-obvious steps and arguments. For example, in order to state and prove the generalized Stokes' theorem on chains, a profusion of unfamiliar concepts and constructions (e.g., tensor products, differential forms, tangent spaces, pullbacks, exterior derivatives, cube and chains) are introduced in quick succession within the span of 25 pages. Moreover, careful readers have noted a number of nontrivial oversights throughout the text, including missing hypotheses in theorems, inaccurately stated theorems, and proofs that fail to handle all cases.
|
wikipedia
|
wiki_8497_chunk_14
|
Computerized adaptive testing
|
Components There are five technical components in building a CAT (the following is adapted from Weiss & Kingsbury, 1984 ). This list does not include practical issues, such as item pretesting or live field release. Calibrated item pool
Starting point or entry level
Item selection algorithm
Scoring procedure
Termination criterion
|
wikipedia
|
wiki_29242_chunk_16
|
Airborne Networking
|
Fighter Platforms
An airborne fighter platform flight profile includes periods of stable flight patterns and dynamic maneuvers at high speeds. Its relatively small size limits the amount of space available for mounting antennas and installing equipment. It will be employed as part of a strike package or combat air patrol (CAP). The strike package or CAP will have supporting airborne C2 and ISR platform(s), tanker (refueling) platform(s), and ground C2 platform(s). Each airborne fighter platform requires connectivity to all other strike package or CAP and supporting platforms; however, a majority of information will be exchanged between airborne fighter platforms. This is driven in large part by the need for frequent situational awareness and target sorting updates in a highly mobile environment. Pilots will be provided services such as real-time data, digital voice, and interactive data sharing.
|
wikipedia
|
wiki_51_chunk_13
|
Biostatistics
|
Experimental design
Experimental designs sustain those basic principles of experimental statistics. There are three basic experimental designs to randomly allocate treatments in all plots of the experiment. They are completely randomized design, randomized block design, and factorial designs. Treatments can be arranged in many ways inside the experiment. In agriculture, the correct experimental design is the root of a good study and the arrangement of treatments within the study is essential because environment largely affects the plots (plants, livestock, microorganisms). These main arrangements can be found in the literature under the names of “lattices”, “incomplete blocks”, “split plot”, “augmented blocks”, and many others. All of the designs might include control plots, determined by the researcher, to provide an error estimation during inference.
|
wikipedia
|
wiki_24707_chunk_3
|
Reactive programming
|
Several popular approaches are employed in the creation of reactive programming languages. Specification of dedicated languages that are specific to various domain constraints. Such constraints usually are characterized by real-time, embedded computing or hardware description. Another approach involves the specification of general-purpose languages that include support for reactivity. Other approaches are articulated in the definition, and use of programming libraries, or embedded domain-specific languages, that enable reactivity alongside or on top of the programming language. Specification and use of these different approaches results in language capability trade-offs. In general, the more restricted a language is, the more its associated compilers and analysis tools are able to inform developers (e.g., in performing analysis for whether programs are able to execute in actual real time). Functional trade-offs in specificity may result in deterioration of the general applicability of a language.
|
wikipedia
|
wiki_15182_chunk_3
|
Joint Policy Board for Mathematics
|
JPBM Communications Award winners
2022: Talithia Williams
2021: John Bailer, Richard Campbell, Rosemary Pennington, and Erica Klarreich
2020: Christopher Budd and James Tanton
2019: Margot Lee Shetterly
2018: Vi Hart and Matt Parker
2017: Siobhan Roberts, for Expository and Popular Books, and Arthur T. Benjamin, for Public Outreach
2016: Simon Singh, for Expository and Popular Books, and the National Museum of Mathematics, for Public Outreach
2015: Nate Silver
2014: Danica McKellar
2013: John Allen Paulos
2012: Dana Mackenzie
2011: Nicolas Falacci and Cheryl Heuton
2010: Marcus du Sautoy
2009: George Csicsery
2008: Carl Bialik
2007: Steven H. Strogatz
2006: Roger Penrose
2005: Barry Arthur Cipra
2003: Robert Osserman
2002: Helaman Ferguson and Claire Ferguson
2001: Keith J. Devlin
2000: Sylvia Nasar
1999: Ian Stewart
1998: Constance Reid
1997: Philip J. Davis
1996: Gina Kolata
1994: Martin Gardner
1993: Joel Schneider
1991: Ivars Peterson
1990: Hugh Whitemore
1988: James Gleick
|
wikipedia
|
wiki_33655_chunk_10
|
Wind power in New York
|
On September 8, 2011, the New York Power Authority, Long Island Power Authority, and Con Edison (the Offshore Wind Collaborative) filed a request with the US Department of the Interior, Bureau of Ocean Energy Management (BOEM) to issue a commercial lease on the outer continental shelf to the New York Power Authority for the development of the Long Island - New York City Offshore Wind Project. This project would be located in the Atlantic Ocean off Nassau County, approximately 13 nautical miles off Rockaway Peninsula, in a long 65,000-acre wedge-shaped area between shipping channels, directionally aligned southwest of Rockaway Peninsula. The project as now configured consists of 97 offshore turbines, with a total nameplate generating capacity of 350 MW. With 194 turbines, generating capacity could be doubled to 700 MW. Given the lengthy permitting process, the Collaborative's proposed project would not be operational until 2018 at the earliest. On January 4, 2013, BOEM issued a Request for Interest (Docket ID: BOEM-2012-0083) to determine whether other parties were interested in developing the same area. In addition to the Collaborative's response, BOEM received letters of interest in a commercial lease for this area from Fishermen's Energy LLC and Energy Management, Inc.
|
wikipedia
|
wiki_8599_chunk_2
|
Future-proof
|
In future-proof electrical systems, buildings should have "flexible distribution systems to allow communication technologies to expand., Image-related processing software should be flexible, adaptable, and programmable to be able to work with several different potential media in the future as well as to handle increasing file sizes. Image-related processing software should also be scalable and embeddable in other words, the use or place in which the software is employed is variable and the software needs to accommodate the variable environment. Higher processing integration is required to support future computational requirements in image processing as well.
|
wikipedia
|
wiki_15836_chunk_0
|
List of MeSH codes (E04)
|
The following is a partial list of the "E" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (E03). Codes following these are found at List of MeSH codes (E05). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – surgical procedures, operative – ambulatory surgical procedures
|
wikipedia
|
wiki_39880_chunk_3
|
Semel Institute for Neuroscience and Human Behavior
|
Integrative Phenotyping Center for Neuropsychiatry
The institute plans to use a $14.9 million stimulus grant to create "The Integrative Phenotyping Center for Neuropsychiatry", a new interdisciplinary research center focused on the role of genetic and environmental factors in neuropsychiatric and behavioral disorders. This center is in the design phase and is expected to be under construction in 2011 and ready for occupancy in late 2012. It will employ around 180 employees and it will be housed in a space covering three renovated floors of the current Semel Institute tower. It will use a National Institutes of Health grant, funded through the American Recovery and Reinvestment Act of 2009, for research on autism, attention deficit disorder, schizophrenia, major depressive disorder, bipolar disorder, and Alzheimer's disease and other dementias. The facility will enable large-scale studies, including studies of personality, cognition, and brain activity and structure. "This project is completed."
|
wikipedia
|
wiki_17285_chunk_14
|
Hopcroft–Karp algorithm
|
Non-bipartite graphs
The same idea of finding a maximal set of shortest augmenting paths works also for finding maximum cardinality matchings in non-bipartite graphs, and for the same reasons the algorithms based on this idea take phases. However, for non-bipartite graphs, the task of finding the augmenting paths within each phase is more difficult. Building on the work of several slower predecessors, showed how to implement a phase in linear time, resulting in a non-bipartite matching algorithm with the same time bound as the Hopcroft–Karp algorithm for bipartite graphs. The Micali–Vazirani technique is complex, and its authors did not provide full proofs of their results; subsequently,
a "clear exposition" was published by and alternative methods were described by other authors. In 2012, Vazirani offered a new simplified proof of the Micali-Vazirani algorithm.
|
wikipedia
|
wiki_2803_chunk_7
|
Modeling language
|
Algebraic
Algebraic Modeling Languages (AML) are high-level programming languages for describing and solving high complexity problems for large scale mathematical computation (i.e. large scale optimization type problems). One particular advantage of AMLs like AIMMS, AMPL, GAMS, Mosel, OPL and OptimJ is the similarity of its syntax to the mathematical notation of optimization problems. This allows for a very concise and readable definition of problems in the domain of optimization, which is supported by certain language elements like sets, indices, algebraic expressions, powerful sparse index and data handling variables, constraints with arbitrary names. The algebraic formulation of a model does not contain any hints how to process it.
|
wikipedia
|
wiki_19831_chunk_6
|
Artificial intelligence systems integration
|
Many online communities for A.I. developers exist where tutorials, examples, and forums aim at helping both beginners and experts build intelligent systems (for example the AI Depot, Generation 5). However, few communities have succeeded in making a certain standard or a code of conduct popular to allow the large collection of miscellaneous systems to be integrated with any ease. Recently, however, there have been focused attempts at producing standards for A.I. research collaboration, Mindmakers.org is an online community specifically created to harbor collaboration in the development of A.I. systems. The community has proposed the OpenAIR message and routing protocol for communication between software components, making it easier for individual developers to make modules instantly integrateble into other peoples' projects.
|
wikipedia
|
wiki_7943_chunk_9
|
Paul Seymour (mathematician)
|
In the 2010s Seymour worked mainly on χ-boundedness and the Erdős–Hajnal conjecture. In a series of papers with Alex Scott and partly with Chudnovsky, they proved two conjectures of András Gyárfás, that every graph with bounded clique number and sufficiently large chromatic number has an induced cycle of odd length at least five, and has an induced cycle of length at least any specified number. The series culminated in a paper of Scott and Seymour proving that for every fixed k, every graph with sufficiently large chromatic number contains either a large complete subgraph or induced cycles of all lengths modulo k, which leads to the resolutions of two conjectures of Gil Kalai and Roy Meshulam connecting the chromatic number of a graph with the homology of its independence complex. There was also a polynomial-time algorithm (with Chudnovsky, Scott, and Chudnovsky and Seymour's student Sophie Spirkl) to test whether a graph contains an induced cycle with length more than three and odd. Most recently, the four jointly resolved the 5-cycle case of the Erdős–Hajnal conjecture, which says that every graph without an induced copy of the 5-cycle contains an independent set or a clique of polynomial size.
|
wikipedia
|
wiki_372_chunk_42
|
Microcode
|
Writable Instruction Set Computer
Capacitor Read-only Store
Transformer Read-only Store
A Brief History of Microprogramming
Intel processor microcode security update (fixes the issues when running 32-bit virtual machines in PAE mode)
Notes on Intel Microcode Updates, March 2013, by Ben Hawkes, archived from the original on September 7, 2015
Hole seen in Intel's bug-busting feature, EE Times, 2002, by Alexander Wolfe, archived from the original on March 9, 2003
Opteron Exposed: Reverse Engineering AMD K8 Microcode Updates, July 26, 2004
|
wikipedia
|
wiki_22565_chunk_17
|
History of biochemistry
|
Since then, biochemistry has advanced, especially since the mid-20th century, with the development of new techniques such as chromatography, X-ray diffraction, NMR spectroscopy, radioisotopic labelling, electron microscopy and molecular dynamics simulations. These techniques allowed for the discovery and detailed analysis of many molecules and metabolic pathways of the cell, such as glycolysis and the Krebs cycle (citric acid cycle). The example of an NMR instrument shows that some of these instruments, such as the HWB-NMR, can be very large in size and can cost anywhere from a few thousand dollars to millions of dollars ($16 million for the one shown here).
|
wikipedia
|
wiki_31281_chunk_1
|
Newcastle University Faculty of Science, Agriculture and Engineering
|
School of Computing
School of Engineering
School of Mathematics, Statistics and Physics
School of Natural and Environmental Sciences Research and degrees
The faculty offers over sixty undergraduate degrees, postgraduate degrees and research opportunities. Research funding sources include: The Biotechnology and Biological Sciences Research Council (BBSRC)
The Natural Environment Research Council (NERC)
The Engineering and Physical Sciences Research Council (EPSRC)
The Science and Technology Facilities Council (STFC)
The European Union
The Environment Agency
The Department for the Environment, Food and Rural Affairs (DEFRA)
The Royal Society References External links
Faculty of Science, Agriculture and Engineering at Newcastle University
SAgE Research Directory at Newcastle University
|
wikipedia
|
wiki_9975_chunk_4
|
N400 (neuroscience)
|
An example of an experimental task used to study the N400 is a priming paradigm. Subjects are shown a list of words in which a prime word is either associatively related to a target word (e.g. bee and honey), semantically related (e.g. sugar and honey) or a direct repetition (e.g. honey and honey). The N400 amplitude seen to the target word (honey) will be reduced upon repetition due to semantic priming. The amount of reduction in amplitude can be used to measure the degree of relatedness between the words.
|
wikipedia
|
wiki_71_chunk_20
|
Bayesian probability
|
Indeed, some Bayesians have argued the prior state of knowledge defines the (unique) prior probability-distribution for "regular" statistical problems; cf. well-posed problems. Finding the right method for constructing such "objective" priors (for appropriate classes of regular problems) has been the quest of statistical theorists from Laplace to John Maynard Keynes, Harold Jeffreys, and Edwin Thompson Jaynes. These theorists and their successors have suggested several methods for constructing "objective" priors (Unfortunately, it is not clear how to assess the relative "objectivity" of the priors proposed under these methods):
Maximum entropy
Transformation group analysis
Reference analysis
|
wikipedia
|
wiki_17578_chunk_7
|
Developmental cognitive neuroscience
|
Tools and techniques employed
Absolutely critical to being able to understand brain function in children have been neuroimaging techniques, first EEG & ERPs, then fMRI, and more recently NIRS, MEG, & TMS that look at function and MRI, DTI, & MRS that look at structure, connectivity, and metabolism. Before functional neuroimaging techniques scientists were constrained to trying to understand function from dysfunction (i.e., trying to understand how the brain works from seeing what deficits occur when the brain is damaged or impaired). It is difficult to understate how important technological advances have been to the emerging field of developmental cognitive neuroscience.
|
wikipedia
|
wiki_1521_chunk_58
|
Sampling (statistics)
|
Formulas, tables, and power function charts are well known approaches to determine sample size. Steps for using sample size tables
Postulate the effect size of interest, α, and β.
Check sample size table
Select the table corresponding to the selected α
Locate the row corresponding to the desired power
Locate the column corresponding to the estimated effect size.
The intersection of the column and row is the minimum sample size required. Sampling and data collection
Good data collection involves:
Following the defined sampling process
Keeping the data in time order
Noting comments and other contextual events
Recording non-responses
|
wikipedia
|
wiki_30340_chunk_4
|
UNSW Faculty of Engineering
|
MyUniversity is an Australian Government website providing information about Australian universities. As data is collected from different sources, percentages may collate to over 100%. Information is provided university wide, and on select disciplines. Results for all Engineering disciplines are listed below.
Aerospace Engineering Students
97.7% of students have a positive outcome:
89.9% full-time job rate (highest amongst the Go8 and ATN universities in Australia)
7.8% of students go onto further full-time study
7.8% Attrition Rate (lowest amongst the Go8 and ATN universities in Australia)
Computing and Information Systems
100% of students have a positive outcome:
93.5% full-time job rate (highest amongst the Go8 and ATN universities in Australia)
7.8% of students go onto further full-time study
8.6% Attrition Rate (lowest amongst the Go8 and ATN universities in Australia)
Civil Engineering Students
100% of students have a positive outcome:
94.9% full-time job rate (highest amongst the Go8 and ATN universities in Australia)
9.1% of students go onto further full-time study
5.2% Attrition Rate (second lowest amongst the Go8 and ATN universities in Australia)
Electrical and Electronic Engineering students
100% of students have a positive outcome:
92.4% full-time job rate (highest amongst the Go8 and ATN universities in Australia)
10.6% of students go onto further full-time study
5.0% Attrition Rate (lowest amongst the Go8 and ATN universities in Australia)
Mechanical Engineering student
100% of students have a positive outcome:
90.1% full-time job rate (highest amongst the Go8 and ATN universities in Australia)
13.1% of students go onto further full-time study
6.7% Attrition Rate (second lowest amongst the Go8 and ATN universities in Australia)
|
wikipedia
|
wiki_19313_chunk_24
|
Hadamard code
|
Let be the codeword in corresponding to message . Let be the generator matrix of . By definition, . From this, . By the construction of , . Therefore, by substitution, . Proof of theorem 1 To prove theorem 1 we will construct a decoding algorithm and prove its correctness. Algorithm
Input: Received word For each :
Pick uniformly at random.
Pick such that , where is the -th standard basis vector and is the bitwise xor of and .
. Output: Message
|
wikipedia
|
wiki_31651_chunk_6
|
Functional flow block diagram
|
These diagrams are used both to develop requirements and to identify profitable trade studies. For example, does the spacecraft antenna acquire the tracking and data relay satellite (TDRS) only when the payload data are to be transmitted, or does it track TDRS continually to allow for the reception of emergency commands or transmission of emergency data? The FFBD also incorporates alternate and contingency operations, which improve the probability of mission success. The flow diagram provides an understanding of total operation of the system, serves as a basis for development of operational and contingency procedures, and pinpoints areas where changes in operational procedures could simplify the overall system operation. In certain cases, alternate FFBDs may be used to represent various means of satisfying a particular function until data are acquired, which permits selection among the alternatives.
|
wikipedia
|
wiki_8121_chunk_15
|
Asynchronous circuit
|
Disadvantages
Area overhead caused by additional logic implementing handshaking. In some cases an asynchronous design may require up to double the resources (area, circuit speed, power consumption) of a synchronous design, due to addition of completion detection and design-for-test circuits.
Compared to a synchronous design as of 90s and early 2000s not many people are trained or experienced in designing of asynchronous circuits.
Synchronous designs are inherently easier to test and debug than asynchronous designs. However, this position is disputed by Fant, who claims that the apparent simplicity of synchronous logic is an artifact of the mathematical models used by the common design approaches.
Clock gating in more conventional synchronous designs is an approximation of the asynchronous ideal, and in some cases, its simplicity may outweigh the advantages of a fully asynchronous design.
Performance (speed) of asynchronous circuits may be reduced in architectures that require input-completeness (more complex data path).
Lack of dedicated, asynchronous design-focused commercial EDA tools. As of 2006 the situation was slowly improving however.
|
wikipedia
|
wiki_14234_chunk_3
|
Health ecology
|
Eco health approaches as currently practiced are participatory, systems-based approaches to understanding and promoting health and wellbeing in the context of social and ecological interactions. What differentiates these approaches from earlier integrative attempts is a firm grounding in complexity theories and post-normal science (Waltner-Toews, 2004; Waltner-Toews et al., 2008). While a variety of organizations promote integrative approaches such as One Health, the primary funder and promoter of Eco health in particular, world-wide, is the International Development Research Centre in Ottawa (https://web.archive.org/web/20100126030738/http://www.idrc.ca/ecohealth/).
|
wikipedia
|
wiki_28756_chunk_11
|
Computational creativity
|
Combinatorial creativity
A great deal, perhaps all, of human creativity can be understood as a novel combination of pre-existing ideas or objects. Common strategies for combinatorial creativity include:
Placing a familiar object in an unfamiliar setting (e.g., Marcel Duchamp's Fountain) or an unfamiliar object in a familiar setting (e.g., a fish-out-of-water story such as The Beverly Hillbillies)
Blending two superficially different objects or genres (e.g., a sci-fi story set in the Wild West, with robot cowboys, as in Westworld, or the reverse, as in Firefly; Japanese haiku poems, etc.)
Comparing a familiar object to a superficially unrelated and semantically distant concept (e.g., "Makeup is the Western burka"; "A zoo is a gallery with living exhibits")
Adding a new and unexpected feature to an existing concept (e.g., adding a scalpel to a Swiss Army knife; adding a camera to a mobile phone)
Compressing two incongruous scenarios into the same narrative to get a joke (e.g., the Emo Philips joke "Women are always using men to advance their careers. Damned anthropologists!")
Using an iconic image from one domain in a domain for an unrelated or incongruous idea or product (e.g., using the Marlboro Man image to sell cars, or to advertise the dangers of smoking-related impotence).
The combinatorial perspective allows us to model creativity as a search process through the space of possible combinations. The combinations can arise from composition or concatenation of different representations, or through a rule-based or stochastic transformation of initial and intermediate representations. Genetic algorithms and neural networks can be used to generate blended or crossover representations that capture a combination of different inputs.
|
wikipedia
|
wiki_19904_chunk_14
|
Paleontological Research Institution
|
The Teacher-Friendly Guide series
The Teacher-Friendly Guide series published by PRI provides information for grades 6-9 teachers and includes guides for climate change, geology, and evolution in bivalves and maize. Teacher-Friendly Guides to Earth Sciences cover six US regions (the Northeast, Southeast, Midwest, West, South Central, Northwest Central, and Southwest), each with their own book.
The Teacher-Friendly Guide to Geology of the Northeastern US (2003)
The Teacher-Friendly Guide to Evolution Using Bivalves as a Model Organism (2011)
The Teacher-Friendly Guide to the Earth Science of the Midwestern US (2014)
The Teacher-Friendly Guide to the Earth Science of the Western US (2014)
The Teacher-Friendly Guide to the Earth Science of the South Central US (2015)
The Teacher-Friendly Guide to the Earth Science of the Northwest Central US (2015)
The Teacher-Friendly Guide to the Earth Science of the Southeastern US (2016)
The Teacher-Friendly Guide to the Earth Science of the Southwestern US (2016)
The Teacher-Friendly Guide to Climate Change (2017)
|
wikipedia
|
wiki_83_chunk_23
|
Computational linguistics
|
Some projects are still trying to solve the problem which first started computational linguistics off as its field in the first place. However, methods have become more refined, and consequently, the results generated by computational linguists have become more enlightening. To improve computer translation, several models have been compared, including hidden Markov models, smoothing techniques, and the specific refinements of those to apply them to verb translation. The model which was found to produce the most natural translations of German and French words was a refined alignment model with a first-order dependence and a fertility model. They also provide efficient training algorithms for the models presented, which can give other scientists the ability to improve further on their results. This type of work is specific to computational linguistics and has applications that could vastly improve understanding of how language is produced and comprehended by computers.
|
wikipedia
|
wiki_16241_chunk_11
|
Functional completeness
|
The following are the minimal functionally complete sets of logical connectives with arity ≤ 2: One element {↑}, {↓}.
Two elements , , , , , , , , , , , , , , , , ,
Three elements , , , , , There are no minimal functionally complete sets of more than three at most binary logical connectives. In order to keep the lists above readable, operators that ignore one or more inputs have been omitted. For example, an operator that ignores the first input and outputs the negation of the second can be replaced by a unary negation. Examples
|
wikipedia
|
wiki_5422_chunk_28
|
Envelope (mathematics)
|
Partial differential equations
Envelopes can be used to construct more complicated solutions of first order partial differential equations (PDEs) from simpler ones. Let F(x,u,Du) = 0 be a first order PDE, where x is a variable with values in an open set Ω ⊂ Rn, u is an unknown real-valued function, Du is the gradient of u, and F is a continuously differentiable function that is regular in Du. Suppose that u(x;a) is an m-parameter family of solutions: that is, for each fixed a ∈ A ⊂ Rm, u(x;a) is a solution of the differential equation. A new solution of the differential equation can be constructed by first solving (if possible)
|
wikipedia
|
wiki_27877_chunk_5
|
Morphological dictionary
|
Sample data from SMOR (German SFST grammar):<Base_Stems>Aachen<NN><base><nativ><Name-Neut_s> <Base_Stems>Aal<NN><base><nativ><NMasc_es_e> <Base_Stems>Aarau<NN><base><nativ><Name-Neut_s>
|
wikipedia
|
wiki_9554_chunk_4
|
Heun function
|
{| class="wikitable"
|+Forms of the Heun Equation
|-
! Form !! Singularities !! Equation
|-
| General
| 0, 1, a, ∞
|
|-
| Confluent
| 0, 1, ∞ (irregular, rank 1)
|
|-
| Doubly Confluent
| 0 (irregular, rank 1), ∞ (irregular, rank 1)
|
|-
| Biconfluent
| 0, ∞ (irregular, rank 2)
|
|-
| Triconfluent
| ∞ (irregular, rank 3)
|
|}
|
wikipedia
|
wiki_20887_chunk_20
|
Wind power forecasting
|
Statistical models include linear and non-linear models, but also structural and black-box types of models. Structural models rely on the analyst's expertise on the phenomenon of interest while black-box models require little subject-matter knowledge and are constructed from data in a fairly mechanical way. Concerning wind power forecasting, structural models would be those that include a modeling of the diurnal wind speed variations, or an explicit function of meteorological variable predictions. Black-box models include most of the artificial-intelligence-based models such as Neural-Networks (NNs) and Support Vector Machines (SVMs). However, some models are 'in-between' the two extremes of being completely black-box or structural. This is the case of expert systems, which learn from experience (from a dataset), and for which prior knowledge can be injected. We then talk about grey-box modeling. Statistical models are usually composed by an autoregressive part, for seizing the persistent behavior of the wind, and by a 'meteorological' part, which consists in the nonlinear transformation of meteorological variable forecasts. The autoregressive part permits to significantly enhance forecast accuracy for horizons up to 6–10 hours ahead, i.e. over a period during which the sole use of meteorological forecast information may not be sufficient for outperforming persistence.
|
wikipedia
|
wiki_36737_chunk_10
|
Computational complexity of matrix multiplication
|
Henry Cohn, Robert Kleinberg, Balázs Szegedy and Chris Umans put methods such as the Strassen and Coppersmith–Winograd algorithms in an entirely different group-theoretic context, by utilising triples of subsets of finite groups which satisfy a disjointness property called the triple product property (TPP). They also give conjectures that, if true, would imply that there are matrix multiplication algorithms with essentially quadratic complexity. This implies that the optimal exponent of matrix multiplication is 2, which most researchers believe is indeed the case. One such conjecture is that families of wreath products of Abelian groups with symmetric groups realise families of subset triples with a simultaneous version of the TPP. Several of their conjectures have since been disproven by Blasiak, Cohn, Church, Grochow, Naslund, Sawin, and Umans using the Slice Rank method. Further, Alon, Shpilka and Chris Umans have recently shown that some of these conjectures implying fast matrix multiplication are incompatible with another plausible conjecture, the sunflower conjecture.
|
wikipedia
|
wiki_38465_chunk_0
|
Dubai Statistics Center
|
Dubai Statistics Center specializes in the construction of a modern and comprehensive statistical system and shall be the only official source for the collection, analysis and publication of statistical information and data in the Emirate of Dubai (UAE) adopting harmonized methodological international standards in the collection, analysis, and dissemination of statistical data according to the following:
The collection, updating, maintenance, and protection of statistical data and information on the Emirate from all sources of data.
The conduct of the population census, and economic and social statistical surveys either by total size or through sampling on a periodic basis and in cooperation with the Federal Ministry of Planning.
The design and execution of studies and surveys based on the requirements of local and other departments and agencies, and based on what has been agreed upon with these agencies and departments.
The provision of advice and statistical consultations to local government departments and institutions.
The provision of data and statistical information to government institutions and departments, to the business community, and to individuals within its mandate.
Work to standardize statistical concepts and definitions which are applied in the Emirate in conformity with international standards and classifications, and with coordination with Federal entities in the country.
Preparation and publication of statistical booklets and material at the Emirate level.
|
wikipedia
|
wiki_4480_chunk_9
|
Affine plane (incidence geometry)
|
An alternate view of affine translation planes can be obtained as follows: Let be a -dimensional vector space over a field . A spread of is a set of -dimensional subspaces of that partition the non-zero vectors of . The members of are called the components of the spread and if and are distinct components then . Let be the incidence structure whose points are the vectors of and whose lines are the cosets of components, that is, sets of the form where is a vector of and is a component of the spread . Then:
is an affine plane and the group of translations for a vector is an automorphism group acting regularly on the points of this plane.
|
wikipedia
|
wiki_2015_chunk_53
|
Computer Go
|
Extensive list of computer Go events
All systems Go by David A. Mechner (1998), discusses the game where professional Go player Janice Kim won a game against program Handtalk after giving a 25-stone handicap.
Kinger, Tim and Mechner, David. An Architecture for Computer Go (1996)
Computer Go and Computer Go Programming pages at Sensei's Library
Computer Go bibliography
Another Computer Go Bibliography
Computer Go mailing list
Published articles about computer Go on Ideosphere gives current estimate of whether a Go program will be best player in the world
Information on the Go Text Protocol commonly used for interfacing Go playing engines with graphical clients and internet servers
The Computer Go Room on the K Go Server (KGS) for online discussion and running "bots"
Two Representative Computer Go Games, an article about two computer Go games played in 1999, one with two computers players, and the other a 29-stone handicap human-computer game
What A Way to Go describes work at Microsoft Research on building a computer Go player.
Cracking Go by Feng-hsiung Hsu, IEEE Spectrum magazine (October 2007) – Why it should be possible to build a Go machine stronger than any human player
computer-go-dataset, SGF datasets of 1,645,958 games
|
wikipedia
|
wiki_23974_chunk_9
|
Convex hull algorithms
|
Akl–Toussaint heuristic
The following simple heuristic is often used as the first step in implementations of convex hull algorithms to improve their performance. It is based on the efficient convex hull algorithm by Selim Akl and G. T. Toussaint, 1978. The idea is to quickly exclude many points that would not be part of the convex hull anyway. This method is based on the following idea. Find the two points with the lowest and highest x-coordinates, and the two points with the lowest and highest y-coordinates. (Each of these operations takes O(n).) These four points form a convex quadrilateral, and all points that lie in this quadrilateral (except for the four initially chosen vertices) are not part of the convex hull. Finding all of these points that lie in this quadrilateral is also O(n), and thus, the entire operation is O(n). Optionally, the points with smallest and largest sums of x- and y-coordinates as well as those with smallest and largest differences of x- and y-coordinates can also be added to the quadrilateral, thus forming an irregular convex octagon, whose insides can be safely discarded. If the points are random variables, then for a narrow but commonly encountered class of probability density functions, this throw-away pre-processing step will make a convex hull algorithm run in linear expected time, even if the worst-case complexity of the convex hull algorithm is quadratic in n.
|
wikipedia
|
wiki_37693_chunk_2
|
Term (logic)
|
Given a set V of variable symbols, a set C of constant symbols and sets Fn of n-ary function symbols, also called operator symbols, for each natural number n ≥ 1, the set of (unsorted first-order) terms T is recursively defined to be the smallest set with the following properties:
every variable symbol is a term: V ⊆ T,
every constant symbol is a term: C ⊆ T,
from every n terms t1,...,tn, and every n-ary function symbol f ∈ Fn, a larger term f(t1, ..., tn) can be built.
Using an intuitive, pseudo-grammatical notation, this is sometimes written as:
t ::= x | c | f(t1, ..., tn).
Usually, only the first few function symbol sets Fn are inhabited. Well-known examples are the unary function symbols sin, cos ∈ F1, and the binary function symbols +, −, ⋅, / ∈ F2, while ternary operations are less known, let alone higher-arity functions. Many authors consider constant symbols as 0-ary function symbols F0, thus needing no special syntactic class for them.
|
wikipedia
|
wiki_38878_chunk_2
|
Physics Instructional Resource Association
|
PIRA has also generated a subset of this list called the PIRA 200. These 200 demonstrations are the recommended basic collection for any physics department. See also
Scientific demonstration References External links
Official PIRA website
American Association of Physics Teachers web page
AAPT sponsored events Physics education
Physics organizations
Professional associations based in the United States
Teacher associations based in the United States
|
wikipedia
|
wiki_39528_chunk_11
|
Post-quantum cryptography
|
In some versions of Ring-LWE there is a security reduction to the shortest-vector problem (SVP) in a lattice as a lower bound on the security. The SVP is known to be NP-hard. Specific ring-LWE systems that have provable security reductions include a variant of Lyubashevsky's ring-LWE signatures defined in a paper by Güneysu, Lyubashevsky, and Pöppelmann. The GLYPH signature scheme is a variant of the Güneysu, Lyubashevsky, and Pöppelmann (GLP) signature which takes into account research results that have come after the publication of the GLP signature in 2012. Another Ring-LWE signature is Ring-TESLA. There also exists a "derandomized variant" of LWE, called Learning with Rounding (LWR), which yields " improved speedup (by eliminating sampling small errors from a Gaussian-like distribution with deterministic errors) and bandwidth." While LWE utilizes the addition of a small error to conceal the lower bits, LWR utilizes rounding for the same purpose.
|
wikipedia
|
wiki_2151_chunk_23
|
D (programming language)
|
Metaprogramming
Metaprogramming is supported through templates, compile-time function execution, tuples, and string mixins. The following examples demonstrate some of D's compile-time features. Templates in D can be written in a more imperative style compared to the C++ functional style for templates. This is a regular function that calculates the factorial of a number: ulong factorial(ulong n) {
if (n < 2)
return 1;
else
return n * factorial(n-1);
}
|
wikipedia
|
wiki_18128_chunk_6
|
Symposium on Logic in Computer Science
|
2013
Leo Bachmair, Harald Ganzinger, Uwe Waldmann, "Set constraints are the monadic class"
André Joyal, Mogens Nielson, Glynn Winskel, "Bisimulation and open maps"
Benjamin C. Pierce, Davide Sangiorgi, "Typing and subtyping for mobile processes" 2014
Martin Hofmann, Thomas Streicher, "The groupoid model refutes uniqueness of identity proofs"
Dale A. Miller, "A multiple-conclusion meta-logic" 2015
|
wikipedia
|
wiki_36747_chunk_16
|
Associació d'Usuaris de Java de Catalunya
|
The second "Jornades Java Catalanes" was celebrated at the "Sala de Congressos del Parc d'Innovació La Salle", located at the university campus of the given university, in 14th and 15 April in 2005. The sponsors of this event were: Bea Systems
Borland
Caixa Penedès
Data.ti
Oracle Corporation
Steria
Sun MicroSystems The participant companies were:: Ilog
MSS
Quest Software They receive support from: CBA Computers, S.L.
Filnet You can see several press notes on a different sources: - Press note at COEIC:
|
wikipedia
|
wiki_28494_chunk_5
|
Sawtooth Software
|
In addition to producing products, Sawtooth Software has also hosted a research conference every 18 months in the United States since 1987. The conference is not a sales event, and speakers with contrary opinions or competing products attend and present. References External links
Sawtooth Software Homepage Companies based in Utah
1983 establishments in Idaho
Market research organizations
Market research companies of the United States
Software companies based in Utah
Statistical survey software
Software companies of the United States
Decision-making software
|
wikipedia
|
wiki_19298_chunk_7
|
1950–51 United States network television schedule
|
CBSReturning SeriesThe Alan Young Show
Arthur Godfrey and His Friends
Arthur Godfrey's Talent Scouts
Beat the Clock
Big Top
CBS Television News
Celebrity Time
The Faye Emerson Show
Ford Theater
The Fred Waring Show
The Garry Moore Show
The Gene Autry Show
The Goldbergs
Joey Faye's Frolics
The Ken Murray Show
Mama
Man Against Crime
Our Miss Brooks
Pabst Blue Ribbon Bouts
The Show Goes On
Starlight Theatre
The Stork Club
Suspense
This Is Show Business
Toast of the Town
We Take Tour Word
The Web
The Week in Review
What's My Line?New SeriesThe Ad-Libbers *Big TownThe Bigelow Theatre *Casey, Crime PhotographerCharlie Wild, Private Detective *DangerFaye Emerson's Wonderful Town *The Frank Sinatra ShowThe George Burns and Gracie Allen ShowThe Horace Heidt ShowThe Jack Benny ProgramThe Lux Video TheatreMagnavox TheatreThe Nash Airflyte TheaterThe Perry Como ShowPrudential Family PlayhouseRacket Squad *Star of the FamilySure as FateTruth or ConsequencesThe Vaughn Monroe ShowWho's Whose *Not returning from 1949–50:54th Street Revue
Abe Burrows' Almanac
The Bigelow Show
The Black Robe
Blues by Bargy
Capitol Cloak Room
Detective's Wife
Earl Wrightson at Home
The Ed Wynn Show
Escape
The Front Page
Inside U.S.A. with Chevrolet
Lucky Pup
The Paul Arnold Show
People's Platform
Premiere Playhouse
The Roar of the Rails
Romance
Ruthie on the Telephone
The Silver Theatre
The Sonny Kendis Show
Stage 13
The Stage Door
Starlight Theatre
The Ted Steele Show
Television Theatre
To the Queen's Taste
Tonight on Broadway
The Trap
Uptown Jubilee
The Week in Sports
Your Sports Special
|
wikipedia
|
wiki_21457_chunk_2
|
Atmospheric chemistry observational databases
|
Airborne observations
Aircraft observations. Many aircraft campaigns have been conducted as part of the Suborbital Science Program and by the Earth Science Project Office an overview of these campaigns is available. The data can be accessed from the Earth Science Project Office archives.
MOZAIC observations. The MOZAIC program (Measurement of OZone and water vapour by AIrbus in-service airCraft) was initiated in 1993 by European scientists, aircraft manufacturers and airlines to collect experimental data. Its goal is to help understand the atmosphere and how it is changing under the influence of human activity, with particular interest in the effects of aircraft. MOZAIC consists of automatic and regular measurements of ozone and water vapour by five long range passenger airliners flying all over the world. The aim is to build a large database of measurements to allow studies of chemical and physical processes in the atmosphere, and hence to validate global chemistry transport models. MOZAIC data provide, in particular, detailed ozone and water vapour climatologies at 9–12 km where subsonic aircraft emit most of their exhaust and which is a very critical domain (e.g. radiatively and S/T exchanges) still imperfectly described in existing models. This will be valuable to improve knowledge about the processes occurring in the upper troposphere/ lower stratosphere (UT/LS), and the model treatment of near tropopause chemistry and transport. The MOZAIC data is restricted access, to obtain access the forms need to be filled out.
CARIBIC observations. The CARIBIC (Civil Aircraft for the Regular Investigation of the atmosphere Based on an Instrument Container) project is an innovative scientific project to study and monitor important chemical and physical processes in the Earth's atmosphere. Detailed and extensive measurements are made during long distance flights on board the Airbus A340-600 "Leverkusen" (http://www.flightradar24.com/data/airplanes/D-AIHE/). We deploy an airfreight container with automated scientific apparatuses, which are connected to an air and particle (aerosol) inlet underneath the aircraft. In contrast to MOZAIC, CARIBIC is only installed on one aircraft, but it measures a much wider spectrum of atmospheric constituents (CARIBIC -> instrumentation). Both, CARIBIC and MOZAIC are integrated in IAGOS. Data exist from 1998-2002 and from 2004-today. It can be requested via CARIBIC -> data access.
|
wikipedia
|
wiki_37418_chunk_3
|
Project Mathematics!
|
Video module descriptions
A total of nine educational video modules were created between 1988 and 2000. Another two modules, Teachers Workshop and Project MATHEMATICS! Contest, were created in 1991 for teachers and are only available on videotape. The content of the nine educational modules follows below. The Theorem of Pythagoras
|
wikipedia
|
wiki_33625_chunk_11
|
Environmental engineering science
|
"MIT Course Catalog: Department of Civil and Environmental Engineering." Massachusetts Institute of Technology. <http://web.mit.edu/catalogue/degre.engin.civil.shtml>. 2008-2009 Announcement. Brochure. Berkeley, 2008. Engineering Announcement 2008-2009. University of California, Berkeley. <https://web.archive.org/web/20081203005457/http://coe.berkeley.edu/students/EngAnn08.pdf>.
|
wikipedia
|
wiki_28251_chunk_48
|
Functional hypothalamic amenorrhea
|
Psychological assessment
Patients with FHA should be screened for the presence of modifiable Axis I (mood) disorders or modified Axis II (personality) disorders and referred to appropriate psychiatric care where they can receive psychological support, such as CBT. This is especially true when psychological disorders (e.g. anorexia nervosa) co-present with amenorrhea through associated behaviors like hyperexercise and restrictive eating; in many of these cases, recovery may require CBT to modify the attitudes of patients who display abnormal behaviors related to diet, body image, exercise, and/or stress management. CBT may become a necessary consideration for this group of patients when general education about the health risks associated with long-term FHA do not motivate a change in behavior. Behavioral modifications which lead to a reversal of amenorrhea can simultaneously reduce cortisol levels and restore of ovarian function. It is also postulated that metabolic and neuroendocrine aberrations can be corrected with behavioral modifications. Studies have shown that in comparison to control groups, FHA patients who receive CBT had a heightened ability to restore ovulatory status and improve levels of leptin, TSH, and cortisol. Thus, stress reduction through CBT may correct the metabolic and neuroendocrine defects of energy deficiency independent of direct weight gain.
|
wikipedia
|
wiki_4915_chunk_15
|
Data modeling
|
These models are being used in the first stage of information system design during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain universe of discourse i.e. area of interest. Several techniques have been developed for the design of data models. While these methodologies guide data modelers in their work, two different people using the same methodology will often come up with very different results. Most notable are:
|
wikipedia
|
wiki_1921_chunk_18
|
Permanent (mathematics)
|
MacMahon's Master Theorem Another way to view permanents is via multivariate generating functions. Let be a square matrix of order n. Consider the multivariate generating function: The coefficient of in is perm(A). As a generalization, for any sequence of n non-negative integers, define:
as the coefficient of inMacMahon's Master Theorem''' relating permanents and determinants is: where I is the order n identity matrix and X is the diagonal matrix with diagonal
|
wikipedia
|
wiki_1763_chunk_29
|
Computer-assisted language learning
|
The emergence of the World Wide Web (now known simply as "the Web") in the early 1990s marked a significant change in the use of communications technology for all computer users. Email and other forms of electronic communication had been in existence for many years, but the launch of Mosaic, the first graphical Web browser, in 1993 brought about a radical change in the ways in which we communicate electronically. The launch of the Web in the public arena immediately began to attract the attention of language teachers. Many language teachers were already familiar with the concept of hypertext on stand-alone computers, which made it possible to set up non-sequential structured reading activities for language learners in which they could point to items of text or images on a page displayed on the computer screen and branch to any other pages, e.g. in a so-called "stack" as implemented in the HyperCard program on Apple Mac computers. The Web took this one stage further by creating a worldwide hypertext system that enabled the user to branch to different pages on computers anywhere in the world simply by pointing and clicking at a piece of text or an image. This opened up access to thousands of authentic foreign-language websites to teachers and students that could be used in a variety of ways. A problem that arose, however, was that this could lead to a good deal of time-wasting if Web browsing was used in an unstructured way (Davies 1997: pp. 42–43), and language teachers responded by developing more structured activities and online exercises (Leloup & Ponterio 2003). Davies (2010) lists over 500 websites, where links to online exercises can be found, along with links to online dictionaries and encyclopaedias, concordancers, translation aids and other miscellaneous resources of interest to the language teacher and learner.
|
wikipedia
|
wiki_2158_chunk_23
|
Lock (computer science)
|
Programming languages vary in their support for synchronization:
Ada provides protected objects that have visible protected subprograms or entries as well as rendezvous.
The ISO/IEC C standard provides a standard mutual exclusion (locks) API since C11. The current ISO/IEC C++ standard supports threading facilities since C++11. The OpenMP standard is supported by some compilers, and allows critical sections to be specified using pragmas. The POSIX pthread API provides lock support. Visual C++ provides the synchronize attribute of methods to be synchronized, but this is specific to COM objects in the Windows architecture and Visual C++ compiler. C and C++ can easily access any native operating system locking features.
C# provides the lock keyword on a thread to ensure its exclusive access to a resource.
VB.NET provides a SyncLock keyword like C#'s lock keyword.
Java provides the keyword synchronized to lock code blocks, methods or objects and libraries featuring concurrency-safe data structures.
Objective-C provides the keyword @synchronized to put locks on blocks of code and also provides the classes NSLock, NSRecursiveLock, and NSConditionLock along with the NSLocking protocol for locking as well.
PHP provides a file-based locking as well as a Mutex class in the pthreads extension.
Python provides a low-level mutex mechanism with a Lock class from the threading module.
The ISO/IEC Fortran standard (ISO/IEC 1539-1:2010) provides the lock_type derived type in the intrinsic module iso_fortran_env and the lock/unlock statements since Fortran 2008.
Ruby provides a low-level mutex object and no keyword.
Rust provides the Mutex<T> struct.
x86 assembly provides the LOCK prefix on certain operations to guarantee their atomicity.
Haskell implements locking via a mutable data structure called an MVar, which can either be empty or contain a value, typically a reference to a resource. A thread that wants to use the resource ‘takes’ the value of the MVar, leaving it empty, and puts it back when it is finished. Attempting to take a resource from an empty MVar results in the thread blocking until the resource is available. As an alternative to locking, an implementation of software transactional memory also exists.
Go provides a low-level Mutex object in standard's library sync package. It can be use for locking code blocks, methods or objects.
|
wikipedia
|
wiki_83_chunk_17
|
Computational linguistics
|
Theoretical approaches to the structure of languages have also been developed. These works allow computational linguistics to have a framework within which to work out hypotheses that will further the understanding of the language in a myriad of ways. One of the original theoretical theses on the internalization of grammar and structure of language proposed two types of models. In these models, rules or patterns learned increase in strength with the frequency of their encounter. The work also created a question for computational linguists to answer: how does an infant learn a specific and non-normal grammar (Chomsky normal form) without learning an overgeneralized version and getting stuck? Theoretical efforts like these set the direction for research to go early in the lifetime of a field of study, and are crucial to the growth of the field.
|
wikipedia
|
wiki_3964_chunk_8
|
Facilities engineering
|
Day to Day Operations
Operations Engineer
Ensure a company’s operations are working properly
Inspect operations, equipment and machinery
Plan for maintenance and upgrade machinery
Reduce or protect the company’s product from defects
Specialist Engineer
Running diagnostics and test on specific machinery
Determining the problems of the machinery by examining test
Analyze the cost to repair or maintenance required to specific machinery
Work on the specific machinery to fix or maintenance require
Maintenance Engineer
Installation and maintenance of industrial equipment
routine inspections and preventive maintenance of equipment
troubleshooting issues on industrial equipment
make on site repairs
Consulting Engineer
Understand and analyze an engineering system of different clients
Find improvements or solutions in the engineering systems
Calculate numbers to show clients savings, advantages and cost
Plan the operations need to complete the project
Sell the project to the client
Analyzing, designing, and developing basic systems and plants knowledge to be able to improve quality and production
Lead/analyze projects and technical responsibilities that a typical facility would have to go through on a day-to-day basis
Be able to be a leader and function well in professional teams and overlooking staff/workers in a project
Being able to Communicate effectively with different methods such as speaking and writing, and be able to argue efficiently and compellingly when having the positions of a foreman, manager or a supervisor
Knowing professional and ethical morals when pushing forward the safety and regulation of a system operating efficiently and having the maintenance skills to be able to solve any problems presented
|
wikipedia
|
wiki_599_chunk_18
|
International Obfuscated C Code Contest
|
/*
+
+
+
+
[ >i>n[t
*/ #include<stdio.h>
/*2w0,1m2,]_<n+a m+o>r>i>=>(['0n1'0)1;
*/int/**/main(int/**/n,char**m){FILE*p,*q;int A,k,a,r,i/*
#uinndcelfu_dset<rsitcdti_oa.nhs>i/_*/;char*d="P%" "d\n%d\40%d"/**/
"\n%d\n\00wb+",b[1024],y[]="yuriyurarararayuruyuri*daijiken**akkari~n**"
"/y*u*k/riin<ty(uyr)g,aur,arr[a1r2a82*y2*/u*r{uyu}riOcyurhiyua**rrar+*arayra*="
"yuruyurwiyuriyurara'rariayuruyuriyuriyu>rarararayuruy9uriyu3riyurar_aBrMaPrOaWy^?"
"*]/f]`;hvroai<dp/f*i*s/<ii(f)a{tpguat<cahfaurh(+uf)a;f}vivn+tf/g*`*w/jmaa+i`ni("/**
*/"i+k[>+b+i>++b++>l[rb";int/**/u;for(i=0;i<101;i++)y[i*2]^="~hktrvg~dmG*eoa+%squ#l2"
":(wn\"1l))v?wM353{/Y;lgcGp`vedllwudvOK`cct~[|ju {stkjalor(stwvne\"gt\"yogYURUYURI"[
i]^y[i*2+1]^4;/*!*/p=(n>1&&(m[1][0]-'-'||m[1][1] !='\0'))?fopen(m[1],y+298):stdin;
/*y/riynrt~(^w^)],]c+h+a+r+*+*[n>)+{>f+o<r<(-m] =<2<5<64;}-]-(m+;yry[rm*])/[*
*/q=(n<3||!(m[2][0]-'-'||m[2][1]))?stdout /*]{ }[*/:fopen(m[2],d+14);if(!p||/*
"]<<*-]>y++>u>>+r >+u+++y>--u---r>++i+++" <)< ;[>-m-.>a-.-i.++n.>[(w)*/!q/**/)
return+printf("Can " "not\x20open\40%s\40" "" "for\40%sing\n",m[!p?1:2],!p?/*
o=82]5<<+(+3+1+&.(+ m +-+1.)<)<|<|.6>4>-+(> m- &-1.9-2-)-|-|.28>-w-?-m.:>([28+
*/"read":"writ");for ( a=k=u= 0;y[u]; u=2 +u){y[k++ ]=y[u];}if((a=fread(b,1,1024/*
,mY/R*Y"R*/,p/*U*/)/* R*/ )>/*U{ */ 2&& b/*Y*/[0]/*U*/=='P' &&4==/*"y*r/y)r\}
*/sscanf(b,d,&k,& A,& i, &r)&& ! (k-6&&k -5)&&r==255){u=A;if(n>3){/*
]&<1<6<?<m.-+1>3> +:+ .1>3+++ . -m-) -;.u+=++.1<0< <; f<o<r<(.;<([m(=)/8*/
u++;i++;}fprintf (q, d,k, u >>1,i>>1,r);u = k-5?8:4;k=3;}else
/*]>*/{(u)=/*{ p> >u >t>-]s >++(.yryr*/+( n+14>17)?8/4:8*5/
4;}for(r=i=0 ; ;){u*=6;u+= (n>3?1:0);if (y[u]&01)fputc(/*
<g-e<t.c>h.a r -(-).)8+<1. >;+i.(<)< <)+{+i.f>([180*/1*
(r),q);if(y[u ]&16)k=A;if (y[u]&2)k--;if(i/*
("^w^NAMORI; { I*/==a/*" )*/){/**/i=a=(u)*11
&255;if(1&&0>= (a= fread(b,1,1024,p))&&
")]i>(w)-;} { /i-f-(-m--M1-0.)<{"
[ 8]==59/* */ )break;i=0;}r=b[i++]
;u+=(/**>> *..</<<<)<[[;]**/+8&*
(y+u))?(10- r?4:2):(y[u] &4)?(k?2:4):2;u=y[u/*
49;7i\(w)/;} y}ru\=*ri[ ,mc]o;n}trientuu ren (
*/]-(int)'`';} fclose( p);k= +fclose( q);
/*] <*.na/m*o{ri{ d;^w^;} }^_^}}
" */ return k- -1+ /*\' '-`*/
( -/*}/ */0x01 ); {;{ }}
; /*^w^*/ ;}
|
wikipedia
|
wiki_19545_chunk_10
|
Circuit complexity
|
The k-clique problem is to decide whether a given graph on n vertices has a clique of size k. For any particular choice of the constants n and k, the graph can be encoded in binary using bits, which indicate for each possible edge whether it is present. Then the k-clique problem is formalized as a function such that outputs 1 if and only if the graph encoded by the string contains a clique of size k. This family of functions is monotone and can be computed by a family of circuits, but it has been shown that it cannot be computed by a polynomial-size family of monotone circuits (that is, circuits with AND and OR gates but without negation). The original result of Razborov in 1985 was later improved to an exponential-size lower bound by Alon and Boppana in 1987. In 2008, Rossman showed that constant-depth circuits with AND, OR, and NOT gates require size to solve the k-clique problem even in the average case. Moreover, there is a circuit of size that computes .
|
wikipedia
|
wiki_5957_chunk_28
|
Robert Taylor (computer scientist)
|
The New Old Boys From the ARPAnet Extract from 'Tools for Thought' by Howard Rheingold
1984 ACM Software Systems Award citation
1994 ACM Fellow citation
2004 Draper Prize citation 1932 births
2017 deaths
American computer scientists
Digital Equipment Corporation people
Xerox people
Internet pioneers
Scientists at PARC (company)
National Medal of Technology recipients
Fellows of the Association for Computing Machinery
Draper Prize winners
University of Texas at Austin alumni
United States Navy personnel of the Korean War
People from Dallas
People from Woodside, California
Neurological disease deaths in California
Deaths from Parkinson's disease
|
wikipedia
|
wiki_19867_chunk_3
|
K correction
|
The exact nature of the calculation that needs to be applied in order to perform a K correction depends upon the type of filter used to make the observation and the shape of the object's spectrum. If multi-color photometric measurements are available for a given object thus defining its spectral energy distribution (SED), K corrections then can be computed by fitting it against a theoretical or empirical SED template. It has been shown that K corrections in many frequently used broad-band filters for low-redshift galaxies can be precisely approximated using two-dimensional polynomials as functions of a redshift and one observed color. This approach is implemented in the K corrections calculator web-service.
|
wikipedia
|
wiki_3190_chunk_23
|
Computer-aided dispatch
|
Another problem comes from technologies using differing datums or coordinate systems. For example, suppose your AVL system uses degrees-decimal degrees format. The AVL display for a vehicle at the Heart Butte Post Office in Montana shows a latitude and longitude of 48.28333 N, -112.83583 W. The CAD system uses degrees-minutes-seconds format data and shows the same location as 481700N, 1125009W. How do you translate? This is sometimes a problem with neighboring CAD systems. Ideally, you should be able to send and receive calls to and from CAD systems in neighboring areas. What if the state or provincial government has standardized on a different coordinate system?
|
wikipedia
|
wiki_4084_chunk_2
|
FSF Free Software Awards
|
This is annually presented by the Free Software Foundation (FSF) to a person whom it deems to have made a great contribution to the progress and development of free software, through activities that accord with the spirit of free software. Winners
Source: Award for the Advancement of Free Software 1998 Larry Wall
for numerous contributions to Free Software, notably Perl. The other finalists were the Apache Project, Tim Berners-Lee, Jordan Hubbard, Ted Lemon, Eric S. Raymond, and Henry Spencer.
|
wikipedia
|
wiki_4466_chunk_28
|
E8 (mathematics)
|
The 248-dimensional adjoint representation of E8 may be considered in terms of its restricted representation to the first of these subgroups. It transforms under E7×SU(2) as a sum of tensor product representations, which may be labelled as a pair of dimensions as (3,1) + (1,133) + (2,56) (since there is a quotient in the product, these notations may strictly be taken as indicating the infinitesimal (Lie algebra) representations). Since the adjoint representation can be described by the roots together with the generators in the Cartan subalgebra, we may see that decomposition by looking at these. In this description,
(3,1) consists of the roots (0,0,0,0,0,0,1,−1), (0,0,0,0,0,0,−1,1) and the Cartan generator corresponding to the last dimension;
(1,133) consists of all roots with (1,1), (−1,−1), (0,0), (−,−) or (,) in the last two dimensions, together with the Cartan generators corresponding to the first seven dimensions;
(2,56) consists of all roots with permutations of (1,0), (−1,0) or (,−) in the last two dimensions.
|
wikipedia
|
wiki_3498_chunk_19
|
Spline (mathematics)
|
Representations and Names
For a given interval [a,b] and a given extended knot vector on that interval, the splines of degree n form a vector space. Briefly this means that adding any two splines of a given type produces spline of that given type, and multiplying a spline of a given type by any constant produces a spline of that given type. The dimension of
the space containing all splines of a certain type can be counted from the extended knot vector: The dimension is equal to the sum of the degree plus the multiplicities
|
wikipedia
|
wiki_6802_chunk_8
|
Codex Mendoza
|
Content
Written on European paper, it contains 71 pages, divided into three sections:
Section I, folios 1r to 17r or 18r, is a history of the Aztec people from 1325 through 1521 — from the founding of Tenochtitlan through the Spanish conquest. It lists the reign of each ruler and the towns conquered by them. It is uncertain whether folios 17v and 18r belong to Section I or Section II.
Section II, folios 17v or 18v to 54v, provides a list of the towns conquered by the Triple Alliance and the tributes paid by each. This section is closely related to, and probably copied from, the Matrícula de Tributos, but the Codex Mendoza contains five provinces not included in the Matrícula. This probably represents material now missing from the Matrícula but present when the Codex Mendoza was copied.
Section III, folios 56v to 71v, is a pictorial depiction of the daily life of the Aztecs.
|
wikipedia
|
wiki_5352_chunk_3
|
Rainflow-counting algorithm
|
Igor Rychlik gave a mathematical definition for the rainflow counting method, thus enabling closed-form computations from the statistical properties of the load signal. Algorithms There are a number of different algorithms for identifying the rainflow cycles within a sequence. They all find the closed cycles and may be left with half closed residual cycles at the end. All methods start with the process of eliminating non turning points from the sequence. A completely closed set of rainflow cycles can be obtained for a repeated load sequence such as used in fatigue testing by starting at the largest peak and continue to the end and wrapping around to the beginning. Four point method
|
wikipedia
|
wiki_4663_chunk_29
|
Boyer–Moore string-search algorithm
|
def good_suffix_table(S: str) -> List[int]:
"""
Generates L for S, an array used in the implementation of the strong good suffix rule.
L[i] = k, the largest position in S such that S[i:] (the suffix of S starting at i) matches
a suffix of S[:k] (a substring in S ending at k). Used in Boyer-Moore, L gives an amount to
shift P relative to T such that no instances of P in T are skipped and a suffix of P[:L[i]]
matches the substring of T matched by a suffix of P in the previous match attempt.
Specifically, if the mismatch took place at position i-1 in P, the shift magnitude is given
by the equation len(P) - L[i]. In the case that L[i] = -1, the full shift table is used.
Since only proper suffixes matter, L[0] = -1.
"""
L = [-1 for c in S]
N = fundamental_preprocess(S[::-1]) # S[::-1] reverses S
N.reverse()
for j in range(0, len(S) - 1):
i = len(S) - N[j]
if i != len(S):
L[i] = j
return L
|
wikipedia
|
wiki_30757_chunk_14
|
Comparison of programming languages (list comprehension)
|
Mythryl s = [ 2*i for i in 1..100 where i*i > 3 ]; Multiple generators: pyth = [ (x,y,z) for x in 1..20 for y in x..20 for z in y..20 where x*x + y*y == z*z ]; Nemerle $[x*2 | x in [0 .. 100], x*x > 3] Nim Nim has built-in seq, set, table and object comprehensions on the sugar standard library module: import sugar
|
wikipedia
|
wiki_16584_chunk_29
|
National Academy of Engineering
|
Grand Challenge Scholars Program (GCSP)
In 2010, NAE developed a plan for preparing engineering students at the undergraduate academic degree level to practice in career fields that emerged as a result of the effort to answer the Grand Challenges. The program had five components, namely:
Research experience based upon a project or independent research related to a NAE Grand Challenges.
Interdisciplinary curriculum materials inclusive of "..public policy, business, law, ethics, human behavior, risk as well as medicine and the sciences."
Entrepreneurship inclusive of skills to translate "...invention to innovation... (and)... develop market ventures that scale to global solutions in the public interest."
Global dimension and perspective necessary to "..address challenges that are inherently global as well as to lead innovation in a global economy."
Service learning that develops and engages the engineer's social consciousness and its willingness to bring to bear the profession's technical expertise on societal problems through programs such as Engineers Without Borders, or Engineering World Health.
|
wikipedia
|
wiki_32301_chunk_8
|
Derek Jones (civil servant, born 1927)
|
Summary of the McKinsey Report, McKinsey & Company, Inc., November 1972.
Edited by Kevin Sinclair, Who's who in Hong Kong, Hong Kong: Asianet Information Services Ltd., 1982.
"Triumph, Failure or Pyrrhic Victory — the Tokyo Round in Perspective", World Economy Volume 10 Issue 3, September 1987.
Who's Who, A & C Black, 2008.
"Jones, Derek John Claremont C.M.G.", Telegraph Announcements, UK: Telegraph, 9 October 2008.
London Gazette: (Supplement) no. 47723, page 3,.
|
wikipedia
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.