id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_15922_chunk_0
List of MeSH codes (B05)
The following is a partial list of the "B" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (B04). Codes following these are found at List of MeSH codes (B06). For other MeSH codes, see List of MeSH c...
wikipedia
wiki_26054_chunk_29
Dalian Software Park
In Dalian Software Park Built and managed by Dalian Software Co., Ltd. American companies: Accenture, Fidelity Investments, Genpact (a GE company), HP, IBM, Oracle Corporation, Cisco, Symantec, Netapp, etc. Chinese companies: China Software & Service (CS&S), Neusoft Group, Neusoft Institute of Information, New Touch, ...
wikipedia
wiki_6529_chunk_3
NL (complexity)
NL-complete problems Several problems are known to be NL-complete under log-space reductions, including ST-connectivity and 2-satisfiability. ST-connectivity asks, for nodes S and T in a directed graph, whether T is reachable from S. 2-satisfiability asks, given a propositional formula of which each clause is the disj...
wikipedia
wiki_3421_chunk_2
Piecewise linear function
Other examples of piecewise linear functions include the absolute value function, the sawtooth function, and the floor function. Fitting to a curve An approximation to a known curve can be found by sampling the curve and interpolating linearly between the points. An algorithm for computing the most significant points s...
wikipedia
wiki_9794_chunk_4
Powerhouse (TV series)
Episode list "With a Little Help From My Friends (Part 1)": Brenda Gaines inherits her late father's gym, Powerhouse, intending to convert it into a youth center. She receives help from Jennifer LaBianca, Kevin Jackson, Tony Dominguez, Lolo Knopke, and Pepper McKenzie, but their efforts are threatened by a gang led by...
wikipedia
wiki_26525_chunk_16
Materials science in science fiction
In the video game Fallout 3, one of the consumable items is called the "Nuka-Cola Quantum", which supposedly gets its unique properties from the addition of strontium-90 in its formula. |A dirty bomb containing strontium-90 is a potential terrorist weapon. |- |Thallium |Protector and other Larry Niven works set in Know...
wikipedia
wiki_9207_chunk_10
Phonological history of English close back vowels
{| cellspacing="0" cellpadding="0" |- | style="width:9em"| | style="width:3em" valign="center"| | style="width:3em"| | style="width:3em"| | style="width:3em"| | style="width:3em" | | |- style="text-align:center" | | moodgoosetooth | goodfootbook | bloodfloodbrother | cutdullfun | putfullsugar |- style="text-align:cente...
wikipedia
wiki_20621_chunk_6
Evergreen (software)
Evergreen's features include: Circulation: for staff to check items in and out to patrons Cataloging: to add items to the library's collection and input information, classifying and indexing those items. Evergreen is known for an extremely flexible indexing system that allows for a high level of customization and by...
wikipedia
wiki_33193_chunk_19
Combinatorics on words
Considered problems One problem considered in the study of combinatorics on words in group theory is the following: for two elements x,y of a semigroup, does x=y modulo the defining relations of x and y. Post and Markov studied this problem and determined it undecidable. Undecidable means the theory cannot be proved....
wikipedia
wiki_6311_chunk_11
Code reuse
Systematic software reuse is a strategy for increasing productivity and improving the quality of the software industry. Although it is simple in concept, successful software reuse implementation is difficult in practice. A reason put forward for this is the dependence of software reuse on the context in which it is imp...
wikipedia
wiki_28484_chunk_7
Annotated Code of Maryland
Named articles The following is a list of the 36 named articles of the code, with the year of enactment of each. Multiple entries mean that an article was enacted in stages. Agriculture (1973) Alcoholic Beverages (2016) Business Occupations and Professions (1989) Business Regulation (1992) Commercial Law (1975) Corpora...
wikipedia
wiki_7456_chunk_6
Mode (statistics)
The following MATLAB (or Octave) code example computes the mode of a sample: X = sort(x); % x is a column vector dataset indices = find(diff([X; realmax]) > 0); % indices where repeated values change [modeL,i] = max (diff([0; indices])); % longest persistence length of repeated val...
wikipedia
wiki_4594_chunk_2
Rapid single flux quantum
An SFQ pulse is produced when magnetic flux through a superconducting loop containing a Josephson junction changes by one flux quantum, Φ0 as a result of the junction switching. SFQ pulses have a quantized area ʃV(t)dt = Φ0 ≈ = 2.07 mV⋅ps = 2.07 mA⋅pH due to magnetic flux quantization, a fundamental property of superc...
wikipedia
wiki_12803_chunk_29
Science, technology, engineering, and mathematics
An exhaustive list of STEM disciplines does not exist because the definition varies by organization. The U.S. Immigration and Customs Enforcement lists disciplines including architecture, physics, actuarial science, chemistry, biology, mathematics, applied mathematics, statistics, computer science, computational scienc...
wikipedia
wiki_11673_chunk_6
Cognitive robotics
Some researchers in cognitive robotics have tried using architectures such as (ACT-R and Soar (cognitive architecture)) as a basis of their cognitive robotics programs. These highly modular symbol-processing architectures have been used to simulate operator performance and human performance when modeling simplistic and...
wikipedia
wiki_35806_chunk_11
Advanced Telescope for High Energy Astrophysics
Athena science goals The "Hot and Energetic Universe" science theme revolves around two fundamental questions in astrophysics: How does ordinary matter assemble into the large-scale structures that we see today? And how do black holes grow and shape the Universe? Both questions can only be answered using a sensitive ...
wikipedia
wiki_15198_chunk_3
Ab initio quantum chemistry methods
One needs to consider the computational cost of ab initio methods when determining whether they are appropriate for the problem at hand. When compared to much less accurate approaches, such as molecular mechanics, ab initio methods often take larger amounts of computer time, memory, and disk space, though, with modern ...
wikipedia
wiki_26180_chunk_15
Physical unclonable function
In 2015, some studies claimed it is possible to attack certain kinds of PUFs with low-cost equipment in a matter of milliseconds. A team at Ruhr Universität of Bochum, Germany demonstrated a method to create a model of XOR Arbiter PUFs and thus be able to predict their response to any kind of challenge. Their method re...
wikipedia
wiki_1303_chunk_9
Generic programming
A broad survey of genericity mechanisms in programming languages follows. For a specific survey comparing suitability of mechanisms for generic programming, see. In object-oriented languages When creating container classes in statically typed languages, it is inconvenient to write specific implementations for each data...
wikipedia
wiki_15092_chunk_8
Rugged computer
Standards MIL-STD-810: Specifically MIL-STD-810G CN1 (2014), a military standard, issued in 1962, which establishes a set of tests for determining equipment suitability to military operations. Often used as a reference in the commercial laptop industry. MIL-STD-461: A United States Military Standard that describes ho...
wikipedia
wiki_24940_chunk_41
Network motif
G-Tries In 2010, Pedro Ribeiro and Fernando Silva proposed a novel data structure for storing a collection of sub-graphs, called a g-trie. This data structure, which is conceptually akin to a prefix tree, stores sub-graphs according to their structures and finds occurrences of each of these sub-graphs in a larger graph...
wikipedia
wiki_3403_chunk_1
Amoeba (operating system)
Overview The goal of the Amoeba project was to construct an operating system for networks of computers that would present the network to the user as if it were a single machine. An Amoeba network consists of a number of workstations connected to a "pool" of processors, and executing a program from a terminal causes it ...
wikipedia
wiki_1166_chunk_13
Maple (software)
Solve equations numerically The following code numerically calculates the roots of a high-order polynomial: f := x^53-88*x^5-3*x-5 = 0 fsolve(f) -1.097486315, -.5226535640, 1.099074017 The same command can also solve systems of equations: f := (cos(x+y))^2 + exp(x)*y+cot(x-y)+cosh(z+x) = 0:
wikipedia
wiki_21351_chunk_7
Inter-American Biodiversity Information Network
The Thematic Networks, or TNs, are intended to lead the development of theme-specific standards and protocols and in the maintenance of hemisphere-wide networks of specialists and specialized institutions. In each case a Coordinating Institution has signed a memorandum of understanding with the IEC to lead the work of ...
wikipedia
wiki_34155_chunk_10
Arithmetic circuit complexity
The state of the art is a lower bound for the size of a circuit computing, e.g., the polynomial given by Strassen and by Baur and Strassen. More precisely, Strassen used Bézout's lemma to show that any circuit that simultaneously computes the polynomials is of size and later Baur and Strassen showed the following:...
wikipedia
wiki_27675_chunk_8
Social network aggregation
Applications in marketing Social network aggregators are a powerful tool in marketing. They appear to be an efficient way to have an organized view of the content to get a better insight into the market. The needs about them are real: a study provided by eMarketer shows that 43% of marketers are complaining about a sig...
wikipedia
wiki_8382_chunk_5
National Agricultural Statistics Service
Producers, farm organizations, agribusinesses, lawmakers and government agencies all rely on the information produced by NASS. For instance: Statistical information on acreage, production, stocks, prices and value is essential for the smooth operation of federal farm programs. Agricultural data are indispensable for p...
wikipedia
wiki_7072_chunk_6
Nested function
Quicksort A more realistic example is this implementation of quicksort: void sort(int *items, int size) { void quickSort(int first, int last) { void swap(int p, int q) { int tmp = items[p]; items[p] = items[q]; items[q] = tmp; } int partition() { ...
wikipedia
wiki_8463_chunk_19
Archaeological theory
The impact of ideology Archaeology has been and remains a cultural, gender and political battlefield. Many groups have tried to use archaeology to prove some current cultural or political point. Marxist or Marxist-influenced archaeologists in the USSR and the UK (among others) often try to prove the truth of dialectica...
wikipedia
wiki_11412_chunk_3
Calculus on Manifolds (book)
ReceptionCalculus on Manifolds aims to present the topics of multivariable and vector calculus in the manner in which they are seen by a modern working mathematician, yet simply and selectively enough to be understood by undergraduate students whose previous coursework in mathematics comprises only one-variable calculu...
wikipedia
wiki_8497_chunk_14
Computerized adaptive testing
Components There are five technical components in building a CAT (the following is adapted from Weiss & Kingsbury, 1984 ). This list does not include practical issues, such as item pretesting or live field release. Calibrated item pool Starting point or entry level Item selection algorithm Scoring procedure Termin...
wikipedia
wiki_29242_chunk_16
Airborne Networking
Fighter Platforms An airborne fighter platform flight profile includes periods of stable flight patterns and dynamic maneuvers at high speeds. Its relatively small size limits the amount of space available for mounting antennas and installing equipment. It will be employed as part of a strike package or combat air pa...
wikipedia
wiki_51_chunk_13
Biostatistics
Experimental design Experimental designs sustain those basic principles of experimental statistics. There are three basic experimental designs to randomly allocate treatments in all plots of the experiment. They are completely randomized design, randomized block design, and factorial designs. Treatments can be arrange...
wikipedia
wiki_24707_chunk_3
Reactive programming
Several popular approaches are employed in the creation of reactive programming languages. Specification of dedicated languages that are specific to various domain constraints. Such constraints usually are characterized by real-time, embedded computing or hardware description. Another approach involves the specificatio...
wikipedia
wiki_15182_chunk_3
Joint Policy Board for Mathematics
JPBM Communications Award winners 2022: Talithia Williams 2021: John Bailer, Richard Campbell, Rosemary Pennington, and Erica Klarreich 2020: Christopher Budd and James Tanton 2019: Margot Lee Shetterly 2018: Vi Hart and Matt Parker 2017: Siobhan Roberts, for Expository and Popular Books, and Arthur T. Benjamin, for Pu...
wikipedia
wiki_33655_chunk_10
Wind power in New York
On September 8, 2011, the New York Power Authority, Long Island Power Authority, and Con Edison (the Offshore Wind Collaborative) filed a request with the US Department of the Interior, Bureau of Ocean Energy Management (BOEM) to issue a commercial lease on the outer continental shelf to the New York Power Authority fo...
wikipedia
wiki_8599_chunk_2
Future-proof
In future-proof electrical systems, buildings should have "flexible distribution systems to allow communication technologies to expand., Image-related processing software should be flexible, adaptable, and programmable to be able to work with several different potential media in the future as well as to handle increasi...
wikipedia
wiki_15836_chunk_0
List of MeSH codes (E04)
The following is a partial list of the "E" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (E03). Codes following these are found at List of MeSH codes (E05). For other MeSH codes, see List of MeSH c...
wikipedia
wiki_39880_chunk_3
Semel Institute for Neuroscience and Human Behavior
Integrative Phenotyping Center for Neuropsychiatry The institute plans to use a $14.9 million stimulus grant to create "The Integrative Phenotyping Center for Neuropsychiatry", a new interdisciplinary research center focused on the role of genetic and environmental factors in neuropsychiatric and behavioral disorders. ...
wikipedia
wiki_17285_chunk_14
Hopcroft–Karp algorithm
Non-bipartite graphs The same idea of finding a maximal set of shortest augmenting paths works also for finding maximum cardinality matchings in non-bipartite graphs, and for the same reasons the algorithms based on this idea take phases. However, for non-bipartite graphs, the task of finding the augmenting paths with...
wikipedia
wiki_2803_chunk_7
Modeling language
Algebraic Algebraic Modeling Languages (AML) are high-level programming languages for describing and solving high complexity problems for large scale mathematical computation (i.e. large scale optimization type problems). One particular advantage of AMLs like AIMMS, AMPL, GAMS, Mosel, OPL and OptimJ is the similarity...
wikipedia
wiki_19831_chunk_6
Artificial intelligence systems integration
Many online communities for A.I. developers exist where tutorials, examples, and forums aim at helping both beginners and experts build intelligent systems (for example the AI Depot, Generation 5). However, few communities have succeeded in making a certain standard or a code of conduct popular to allow the large colle...
wikipedia
wiki_7943_chunk_9
Paul Seymour (mathematician)
In the 2010s Seymour worked mainly on χ-boundedness and the Erdős–Hajnal conjecture. In a series of papers with Alex Scott and partly with Chudnovsky, they proved two conjectures of András Gyárfás, that every graph with bounded clique number and sufficiently large chromatic number has an induced cycle of odd length at ...
wikipedia
wiki_372_chunk_42
Microcode
Writable Instruction Set Computer Capacitor Read-only Store Transformer Read-only Store A Brief History of Microprogramming Intel processor microcode security update (fixes the issues when running 32-bit virtual machines in PAE mode) Notes on Intel Microcode Updates, March 2013, by Ben Hawkes, archived from the or...
wikipedia
wiki_22565_chunk_17
History of biochemistry
Since then, biochemistry has advanced, especially since the mid-20th century, with the development of new techniques such as chromatography, X-ray diffraction, NMR spectroscopy, radioisotopic labelling, electron microscopy and molecular dynamics simulations. These techniques allowed for the discovery and detailed analy...
wikipedia
wiki_31281_chunk_1
Newcastle University Faculty of Science, Agriculture and Engineering
School of Computing School of Engineering School of Mathematics, Statistics and Physics School of Natural and Environmental Sciences Research and degrees The faculty offers over sixty undergraduate degrees, postgraduate degrees and research opportunities. Research funding sources include: The Biotechnology and Biol...
wikipedia
wiki_9975_chunk_4
N400 (neuroscience)
An example of an experimental task used to study the N400 is a priming paradigm. Subjects are shown a list of words in which a prime word is either associatively related to a target word (e.g. bee and honey), semantically related (e.g. sugar and honey) or a direct repetition (e.g. honey and honey). The N400 amplitude s...
wikipedia
wiki_71_chunk_20
Bayesian probability
Indeed, some Bayesians have argued the prior state of knowledge defines the (unique) prior probability-distribution for "regular" statistical problems; cf. well-posed problems. Finding the right method for constructing such "objective" priors (for appropriate classes of regular problems) has been the quest of statistic...
wikipedia
wiki_17578_chunk_7
Developmental cognitive neuroscience
Tools and techniques employed Absolutely critical to being able to understand brain function in children have been neuroimaging techniques, first EEG & ERPs, then fMRI, and more recently NIRS, MEG, & TMS that look at function and MRI, DTI, & MRS that look at structure, connectivity, and metabolism. Before functional n...
wikipedia
wiki_1521_chunk_58
Sampling (statistics)
Formulas, tables, and power function charts are well known approaches to determine sample size. Steps for using sample size tables Postulate the effect size of interest, α, and β. Check sample size table Select the table corresponding to the selected α Locate the row corresponding to the desired power Locate the c...
wikipedia
wiki_30340_chunk_4
UNSW Faculty of Engineering
MyUniversity is an Australian Government website providing information about Australian universities. As data is collected from different sources, percentages may collate to over 100%. Information is provided university wide, and on select disciplines. Results for all Engineering disciplines are listed below. Aerosp...
wikipedia
wiki_19313_chunk_24
Hadamard code
Let be the codeword in corresponding to message . Let be the generator matrix of . By definition, . From this, . By the construction of , . Therefore, by substitution, . Proof of theorem 1 To prove theorem 1 we will construct a decoding algorithm and prove its correctness. Algorithm Input: Received word For each : ...
wikipedia
wiki_31651_chunk_6
Functional flow block diagram
These diagrams are used both to develop requirements and to identify profitable trade studies. For example, does the spacecraft antenna acquire the tracking and data relay satellite (TDRS) only when the payload data are to be transmitted, or does it track TDRS continually to allow for the reception of emergency command...
wikipedia
wiki_8121_chunk_15
Asynchronous circuit
Disadvantages Area overhead caused by additional logic implementing handshaking. In some cases an asynchronous design may require up to double the resources (area, circuit speed, power consumption) of a synchronous design, due to addition of completion detection and design-for-test circuits. Compared to a synchronous...
wikipedia
wiki_14234_chunk_3
Health ecology
Eco health approaches as currently practiced are participatory, systems-based approaches to understanding and promoting health and wellbeing in the context of social and ecological interactions. What differentiates these approaches from earlier integrative attempts is a firm grounding in complexity theories and post-no...
wikipedia
wiki_28756_chunk_11
Computational creativity
Combinatorial creativity A great deal, perhaps all, of human creativity can be understood as a novel combination of pre-existing ideas or objects. Common strategies for combinatorial creativity include: Placing a familiar object in an unfamiliar setting (e.g., Marcel Duchamp's Fountain) or an unfamiliar object in a fam...
wikipedia
wiki_19904_chunk_14
Paleontological Research Institution
The Teacher-Friendly Guide series The Teacher-Friendly Guide series published by PRI provides information for grades 6-9 teachers and includes guides for climate change, geology, and evolution in bivalves and maize. Teacher-Friendly Guides to Earth Sciences cover six US regions (the Northeast, Southeast, Midwest, West,...
wikipedia
wiki_83_chunk_23
Computational linguistics
Some projects are still trying to solve the problem which first started computational linguistics off as its field in the first place. However, methods have become more refined, and consequently, the results generated by computational linguists have become more enlightening. To improve computer translation, several mod...
wikipedia
wiki_16241_chunk_11
Functional completeness
The following are the minimal functionally complete sets of logical connectives with arity ≤ 2: One element {↑}, {↓}. Two elements , , , , , , , , , , , , , , , , , Three elements , , , , , There are no minimal functionally complete sets of more than three at most binary logical connectives. In order to keep the lists...
wikipedia
wiki_5422_chunk_28
Envelope (mathematics)
Partial differential equations Envelopes can be used to construct more complicated solutions of first order partial differential equations (PDEs) from simpler ones. Let F(x,u,Du) = 0 be a first order PDE, where x is a variable with values in an open set Ω ⊂ Rn, u is an unknown real-valued function, Du is the gradient...
wikipedia
wiki_27877_chunk_5
Morphological dictionary
Sample data from SMOR (German SFST grammar):<Base_Stems>Aachen<NN><base><nativ><Name-Neut_s> <Base_Stems>Aal<NN><base><nativ><NMasc_es_e> <Base_Stems>Aarau<NN><base><nativ><Name-Neut_s>
wikipedia
wiki_9554_chunk_4
Heun function
{| class="wikitable" |+Forms of the Heun Equation |- ! Form !! Singularities !! Equation |- | General | 0, 1, a, ∞ | |- | Confluent | 0, 1, ∞ (irregular, rank 1) | |- | Doubly Confluent | 0 (irregular, rank 1), ∞ (irregular, rank 1) | |- | Biconfluent | 0, ∞ (irregular, rank 2) | |- | Triconfluent | ∞ (irregular, ...
wikipedia
wiki_20887_chunk_20
Wind power forecasting
Statistical models include linear and non-linear models, but also structural and black-box types of models. Structural models rely on the analyst's expertise on the phenomenon of interest while black-box models require little subject-matter knowledge and are constructed from data in a fairly mechanical way. Concerning ...
wikipedia
wiki_36737_chunk_10
Computational complexity of matrix multiplication
Henry Cohn, Robert Kleinberg, Balázs Szegedy and Chris Umans put methods such as the Strassen and Coppersmith–Winograd algorithms in an entirely different group-theoretic context, by utilising triples of subsets of finite groups which satisfy a disjointness property called the triple product property (TPP). They also g...
wikipedia
wiki_38465_chunk_0
Dubai Statistics Center
Dubai Statistics Center specializes in the construction of a modern and comprehensive statistical system and shall be the only official source for the collection, analysis and publication of statistical information and data in the Emirate of Dubai (UAE) adopting harmonized methodological international standards in the...
wikipedia
wiki_4480_chunk_9
Affine plane (incidence geometry)
An alternate view of affine translation planes can be obtained as follows: Let be a -dimensional vector space over a field . A spread of is a set of -dimensional subspaces of that partition the non-zero vectors of . The members of are called the components of the spread and if and are distinct components then . ...
wikipedia
wiki_2015_chunk_53
Computer Go
Extensive list of computer Go events All systems Go by David A. Mechner (1998), discusses the game where professional Go player Janice Kim won a game against program Handtalk after giving a 25-stone handicap. Kinger, Tim and Mechner, David. An Architecture for Computer Go (1996) Computer Go and Computer Go Programm...
wikipedia
wiki_23974_chunk_9
Convex hull algorithms
Akl–Toussaint heuristic The following simple heuristic is often used as the first step in implementations of convex hull algorithms to improve their performance. It is based on the efficient convex hull algorithm by Selim Akl and G. T. Toussaint, 1978. The idea is to quickly exclude many points that would not be part ...
wikipedia
wiki_37693_chunk_2
Term (logic)
Given a set V of variable symbols, a set C of constant symbols and sets Fn of n-ary function symbols, also called operator symbols, for each natural number n ≥ 1, the set of (unsorted first-order) terms T is recursively defined to be the smallest set with the following properties: every variable symbol is a term: V ⊆ ...
wikipedia
wiki_38878_chunk_2
Physics Instructional Resource Association
PIRA has also generated a subset of this list called the PIRA 200. These 200 demonstrations are the recommended basic collection for any physics department. See also Scientific demonstration References External links Official PIRA website American Association of Physics Teachers web page AAPT sponsored events Ph...
wikipedia
wiki_39528_chunk_11
Post-quantum cryptography
In some versions of Ring-LWE there is a security reduction to the shortest-vector problem (SVP) in a lattice as a lower bound on the security. The SVP is known to be NP-hard. Specific ring-LWE systems that have provable security reductions include a variant of Lyubashevsky's ring-LWE signatures defined in a paper by G...
wikipedia
wiki_2151_chunk_23
D (programming language)
Metaprogramming Metaprogramming is supported through templates, compile-time function execution, tuples, and string mixins. The following examples demonstrate some of D's compile-time features. Templates in D can be written in a more imperative style compared to the C++ functional style for templates. This is a regular...
wikipedia
wiki_18128_chunk_6
Symposium on Logic in Computer Science
2013 Leo Bachmair, Harald Ganzinger, Uwe Waldmann, "Set constraints are the monadic class" André Joyal, Mogens Nielson, Glynn Winskel, "Bisimulation and open maps" Benjamin C. Pierce, Davide Sangiorgi, "Typing and subtyping for mobile processes" 2014 Martin Hofmann, Thomas Streicher, "The groupoid model refutes uniqu...
wikipedia
wiki_36747_chunk_16
Associació d'Usuaris de Java de Catalunya
The second "Jornades Java Catalanes" was celebrated at the "Sala de Congressos del Parc d'Innovació La Salle", located at the university campus of the given university, in 14th and 15 April in 2005. The sponsors of this event were: Bea Systems Borland Caixa Penedès Data.ti Oracle Corporation Steria Sun MicroSystems The...
wikipedia
wiki_28494_chunk_5
Sawtooth Software
In addition to producing products, Sawtooth Software has also hosted a research conference every 18 months in the United States since 1987. The conference is not a sales event, and speakers with contrary opinions or competing products attend and present. References External links Sawtooth Software Homepage Companies ba...
wikipedia
wiki_19298_chunk_7
1950–51 United States network television schedule
CBSReturning SeriesThe Alan Young Show Arthur Godfrey and His Friends Arthur Godfrey's Talent Scouts Beat the Clock Big Top CBS Television News Celebrity Time The Faye Emerson Show Ford Theater The Fred Waring Show The Garry Moore Show The Gene Autry Show The Goldbergs Joey Faye's Frolics The Ken Murray Show Mama Man A...
wikipedia
wiki_21457_chunk_2
Atmospheric chemistry observational databases
Airborne observations Aircraft observations. Many aircraft campaigns have been conducted as part of the Suborbital Science Program and by the Earth Science Project Office an overview of these campaigns is available. The data can be accessed from the Earth Science Project Office archives. MOZAIC observations. The MOZA...
wikipedia
wiki_37418_chunk_3
Project Mathematics!
Video module descriptions A total of nine educational video modules were created between 1988 and 2000. Another two modules, Teachers Workshop and Project MATHEMATICS! Contest, were created in 1991 for teachers and are only available on videotape. The content of the nine educational modules follows below. The Theorem o...
wikipedia
wiki_33625_chunk_11
Environmental engineering science
"MIT Course Catalog: Department of Civil and Environmental Engineering." Massachusetts Institute of Technology. <http://web.mit.edu/catalogue/degre.engin.civil.shtml>. 2008-2009 Announcement. Brochure. Berkeley, 2008. Engineering Announcement 2008-2009. University of California, Berkeley. <https://web.archive.org/web/2...
wikipedia
wiki_28251_chunk_48
Functional hypothalamic amenorrhea
Psychological assessment Patients with FHA should be screened for the presence of modifiable Axis I (mood) disorders or modified Axis II (personality) disorders and referred to appropriate psychiatric care where they can receive psychological support, such as CBT. This is especially true when psychological disorders (...
wikipedia
wiki_4915_chunk_15
Data modeling
These models are being used in the first stage of information system design during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms a...
wikipedia
wiki_1921_chunk_18
Permanent (mathematics)
MacMahon's Master Theorem Another way to view permanents is via multivariate generating functions. Let be a square matrix of order n. Consider the multivariate generating function: The coefficient of in is perm(A). As a generalization, for any sequence of n non-negative integers, define: as the coefficient of inM...
wikipedia
wiki_1763_chunk_29
Computer-assisted language learning
The emergence of the World Wide Web (now known simply as "the Web") in the early 1990s marked a significant change in the use of communications technology for all computer users. Email and other forms of electronic communication had been in existence for many years, but the launch of Mosaic, the first graphical Web bro...
wikipedia
wiki_2158_chunk_23
Lock (computer science)
Programming languages vary in their support for synchronization: Ada provides protected objects that have visible protected subprograms or entries as well as rendezvous. The ISO/IEC C standard provides a standard mutual exclusion (locks) API since C11. The current ISO/IEC C++ standard supports threading facilities si...
wikipedia
wiki_83_chunk_17
Computational linguistics
Theoretical approaches to the structure of languages have also been developed. These works allow computational linguistics to have a framework within which to work out hypotheses that will further the understanding of the language in a myriad of ways. One of the original theoretical theses on the internalization of gra...
wikipedia
wiki_3964_chunk_8
Facilities engineering
Day to Day Operations Operations Engineer Ensure a company’s operations are working properly Inspect operations, equipment and machinery Plan for maintenance and upgrade machinery Reduce or protect the company’s product from defects   Specialist Engineer Running diagnostics and test on specific machinery Determining t...
wikipedia
wiki_599_chunk_18
International Obfuscated C Code Contest
/* + + + + [ >i>n[t */ #include<stdio.h> /*2w0,1m2,]_<n+a m+o>r>i>...
wikipedia
wiki_19545_chunk_10
Circuit complexity
The k-clique problem is to decide whether a given graph on n vertices has a clique of size k. For any particular choice of the constants n and k, the graph can be encoded in binary using bits, which indicate for each possible edge whether it is present. Then the k-clique problem is formalized as a function such that ...
wikipedia
wiki_5957_chunk_28
Robert Taylor (computer scientist)
The New Old Boys From the ARPAnet Extract from 'Tools for Thought' by Howard Rheingold 1984 ACM Software Systems Award citation 1994 ACM Fellow citation 2004 Draper Prize citation 1932 births 2017 deaths American computer scientists Digital Equipment Corporation people Xerox people Internet pioneers Scientists at PA...
wikipedia
wiki_19867_chunk_3
K correction
The exact nature of the calculation that needs to be applied in order to perform a K correction depends upon the type of filter used to make the observation and the shape of the object's spectrum. If multi-color photometric measurements are available for a given object thus defining its spectral energy distribution (SE...
wikipedia
wiki_3190_chunk_23
Computer-aided dispatch
Another problem comes from technologies using differing datums or coordinate systems. For example, suppose your AVL system uses degrees-decimal degrees format. The AVL display for a vehicle at the Heart Butte Post Office in Montana shows a latitude and longitude of 48.28333 N, -112.83583 W. The CAD system uses degrees-...
wikipedia
wiki_4084_chunk_2
FSF Free Software Awards
This is annually presented by the Free Software Foundation (FSF) to a person whom it deems to have made a great contribution to the progress and development of free software, through activities that accord with the spirit of free software. Winners Source: Award for the Advancement of Free Software 1998 Larry Wall for...
wikipedia
wiki_4466_chunk_28
E8 (mathematics)
The 248-dimensional adjoint representation of E8 may be considered in terms of its restricted representation to the first of these subgroups. It transforms under E7×SU(2) as a sum of tensor product representations, which may be labelled as a pair of dimensions as (3,1) + (1,133) + (2,56) (since there is a quotient in t...
wikipedia
wiki_3498_chunk_19
Spline (mathematics)
Representations and Names For a given interval [a,b] and a given extended knot vector on that interval, the splines of degree n form a vector space. Briefly this means that adding any two splines of a given type produces spline of that given type, and multiplying a spline of a given type by any constant produces a spl...
wikipedia
wiki_6802_chunk_8
Codex Mendoza
Content Written on European paper, it contains 71 pages, divided into three sections: Section I, folios 1r to 17r or 18r, is a history of the Aztec people from 1325 through 1521 — from the founding of Tenochtitlan through the Spanish conquest. It lists the reign of each ruler and the towns conquered by them. It is unc...
wikipedia
wiki_5352_chunk_3
Rainflow-counting algorithm
Igor Rychlik gave a mathematical definition for the rainflow counting method, thus enabling closed-form computations from the statistical properties of the load signal. Algorithms There are a number of different algorithms for identifying the rainflow cycles within a sequence. They all find the closed cycles and may be...
wikipedia
wiki_4663_chunk_29
Boyer–Moore string-search algorithm
def good_suffix_table(S: str) -> List[int]: """ Generates L for S, an array used in the implementation of the strong good suffix rule. L[i] = k, the largest position in S such that S[i:] (the suffix of S starting at i) matches a suffix of S[:k] (a substring in S ending at k). Used in Boyer-Moore, L give...
wikipedia
wiki_30757_chunk_14
Comparison of programming languages (list comprehension)
Mythryl s = [ 2*i for i in 1..100 where i*i > 3 ]; Multiple generators: pyth = [ (x,y,z) for x in 1..20 for y in x..20 for z in y..20 where x*x + y*y == z*z ]; Nemerle $[x*2 | x in [0 .. 100], x*x > 3] Nim Nim has built-in seq, set, table and object comprehensions on the sugar standard library module: import sugar
wikipedia
wiki_16584_chunk_29
National Academy of Engineering
Grand Challenge Scholars Program (GCSP) In 2010, NAE developed a plan for preparing engineering students at the undergraduate academic degree level to practice in career fields that emerged as a result of the effort to answer the Grand Challenges. The program had five components, namely: Research experience based up...
wikipedia
wiki_32301_chunk_8
Derek Jones (civil servant, born 1927)
Summary of the McKinsey Report, McKinsey & Company, Inc., November 1972. Edited by Kevin Sinclair, Who's who in Hong Kong, Hong Kong: Asianet Information Services Ltd., 1982. "Triumph, Failure or Pyrrhic Victory — the Tokyo Round in Perspective", World Economy Volume 10 Issue 3, September 1987. Who's Who, A & C Blac...
wikipedia