id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_15922_chunk_0
List of MeSH codes (B05)
The following is a partial list of the "B" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (B04). Codes following these are found at List of MeSH codes (B06). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – fungi
wikipedia
wiki_26054_chunk_29
Dalian Software Park
In Dalian Software Park Built and managed by Dalian Software Co., Ltd. American companies: Accenture, Fidelity Investments, Genpact (a GE company), HP, IBM, Oracle Corporation, Cisco, Symantec, Netapp, etc. Chinese companies: China Software & Service (CS&S), Neusoft Group, Neusoft Institute of Information, New Touch, etc. European companies: British Telecom (UK), SAP (Germany), Oostsourcing (A joint venture of Akyla 40%, Better Be 40%, Insight 20%, Netherlands) Japanese companies Alpine, Fujitsu Device, Hitachi, NEC, Panasonic, OMRON, Sony, Sumitomo Wiring Systems, Yokogawa Electric, etc. Other companies: Satyam (India), Wistron (Taiwan), etc.
wikipedia
wiki_6529_chunk_3
NL (complexity)
NL-complete problems Several problems are known to be NL-complete under log-space reductions, including ST-connectivity and 2-satisfiability. ST-connectivity asks, for nodes S and T in a directed graph, whether T is reachable from S. 2-satisfiability asks, given a propositional formula of which each clause is the disjunction of two literals, if there is a variable assignment that makes the formula true. An example instance, where indicates not, might be:
wikipedia
wiki_3421_chunk_2
Piecewise linear function
Other examples of piecewise linear functions include the absolute value function, the sawtooth function, and the floor function. Fitting to a curve An approximation to a known curve can be found by sampling the curve and interpolating linearly between the points. An algorithm for computing the most significant points subject to a given error tolerance has been published. Fitting to data If partitions, and then breakpoints, are already known, linear regression can be performed independently on these partitions. However, continuity is not preserved in that case, and also there is no unique reference model underlying the observed data. A stable algorithm with this case has been derived.
wikipedia
wiki_9794_chunk_4
Powerhouse (TV series)
Episode list "With a Little Help From My Friends (Part 1)": Brenda Gaines inherits her late father's gym, Powerhouse, intending to convert it into a youth center. She receives help from Jennifer LaBianca, Kevin Jackson, Tony Dominguez, Lolo Knopke, and Pepper McKenzie, but their efforts are threatened by a gang led by the mysterious Castor. "With a Little Help From My Friends (Part 2)": Having been framed for a crime she didn't commit, Brenda tries to learn Castor's identity and successfully open Powerhouse. "Life or Breath": The son of a foreign ambassador is kidnapped, and the Powerhouse gang urgently attempts to find and rescue him, as he needs medicine for a stress-related illness. "Master of the Art": When an artifact is delivered to the local museum, the Powerhouse gang and the curator attempt to prove that there are flaws with the museum's alarm system. "You Make Me Sick": When people all over town contract a fatal virus, the gang sets out to find the cause. Their task becomes more urgent when Brenda herself catches the virus after taking a bite of a tainted tuna fish sandwich. "Celebration": Lolo decides to call off his Bar Mitzvah after he and his grandfather become victims of a hate crime. "Something for Nothing": Brenda temporarily closes Powerhouse following an accident that hurts Lolo. While she goes to New York to get money for repairs, the kids decide to film a commercial about Powerhouse, unaware they are being scammed by a crooked landowner and his accomplice. "Cheers": Pepper and Lt. Al Gambrino's son Peter learn the hard way about the dangers of drinking excessively. "Name of the Game": Both Tony's foot injury and the antagonistic behavior of new team player El Gato threaten Powerhouse's chances of winning the championship soccer game. "One of the Gang": Kevin refuses help from Mike, a boy with a prosthetic arm. Meanwhile, at a nursing home, elderly resident Diamonds O'Toole is targeted by a thief posing as an orderly, who tries to torture him into revealing the location of diamonds he hid somewhere in Powerhouse. "Something Ventured" (the pilot episode): The Powerhouse gang and Brenda attempt to identify the perpetrator of a series of burglaries. In this episode, Kevin is Brenda's son, and Bobby and Bizzy are later renamed Tony and Pepper. Also, both the gang and Powerhouse are already established. "Help Wanted": Tammy DeWitt arrives with her baby son David, and the Powerhouse gang try to work out whether she kidnapped him. "What Have You Got to Lose?": Kevin and his boss Mr. Baxter agree to try a doctor's weight loss program. "Big Devil": Angie tries to prove herself as a female jockey by riding Big Devil. "Fit to be Tied": When a visitor's brother is kidnapped by people who want a microfilm, the Powerhouse gang try to rescue him. "The Short Life of Lolo Knopke": A bomb goes off at Powerhouse, killing Lolo. Brenda, Jennifer, and Kevin recount all the times he helped solve crimes and problems. But nothing is what it appears to be.
wikipedia
wiki_26525_chunk_16
Materials science in science fiction
In the video game Fallout 3, one of the consumable items is called the "Nuka-Cola Quantum", which supposedly gets its unique properties from the addition of strontium-90 in its formula. |A dirty bomb containing strontium-90 is a potential terrorist weapon. |- |Thallium |Protector and other Larry Niven works set in Known Space |In these works, humans are derived from another race, in which human-like beings are the juvenile form of a smarter and tougher adult, the Pak Protector. The transformation between the forms is triggered by a virus. These beings establish an Earth colony, but the virus requires significant amounts of thallium oxide in the environment. Since the Earth does not have enough thallium, the virus dies out, and humans then evolved from the juvenile form. Critics have noted this cannot explain the similarity of DNA in humans and much older life forms on Earth. |Niven's use is plausible but fictional. The same effect occurs in vitamin deficiency. |- |Thorium |Robert A. Heinlein's novels, Star Wars, others |Robert A. Heinlein envisioned thorium as being a spacecraft fuel of the near future Earth shown in Rocket Ship Galileo and Have Space Suit—Will Travel, and of the more advanced space-traveling civilization described in his novel Citizen of the Galaxy. This use is also seen in the Master of Orion series of video games.
wikipedia
wiki_9207_chunk_10
Phonological history of English close back vowels
{| cellspacing="0" cellpadding="0" |- | style="width:9em"| | style="width:3em" valign="center"| | style="width:3em"| | style="width:3em"| | style="width:3em"| | style="width:3em" | | |- style="text-align:center" | | moodgoosetooth | goodfootbook | bloodfloodbrother | cutdullfun | putfullsugar |- style="text-align:center" | Middle English |style="border-top:1px solid;border-left:1px solid"| |style="border-top:1px solid"| |style="border-top:1px solid"| |style="border-top:1px solid;border-left:1px solid"| |style="border-top:1px solid"| |- style="text-align:center" | Great Vowel Shift |style="border-top:1px dotted;border-left:1px solid"| |style="border-top:1px dotted"| |style="border-top:1px dotted"| |style="border-left:1px solid"| | |- style="text-align:center" | Early Shortening |style="border-left:1px solid"| | |style="border-top:1px dotted;border-left:1px solid"| | | |- style="text-align:center" | Quality adjustment |style="border-left:1px solid"| | |style="border-top:1px dotted;border-left:1px solid"| |style="border-top:1px dotted"| |style="border-top:1px dotted"| |- style="text-align:center" | Foot–strut split |style="border-left:1px solid"| | |style="border-top:1px dotted;border-left:1px solid"| |style="border-top:1px dotted"| |style="border-left:1px solid"| |- style="text-align:center" | Later shortening |style="border-left:1px solid"| |style="border-top:1px dotted;border-left:1px solid"| |style="border-left:1px solid"| | |style="border-left:1px solid"| |- style="text-align:center" | Quality adjustment |style="border-left:1px solid"| |style="border-left:1px solid"| |style="border-top:1px dotted;border-left:1px solid"| |style="border-top:1px dotted"| |style="border-left:1px solid"| |- style="text-align:center" | RP output |style="border-left:1px solid"| |style="border-left:1px solid"| |style="border-left:1px solid"| | |style="border-left:1px solid"| |- |+ Stages of the – split and beyond, as described by |}
wikipedia
wiki_20621_chunk_6
Evergreen (software)
Evergreen's features include: Circulation: for staff to check items in and out to patrons Cataloging: to add items to the library's collection and input information, classifying and indexing those items. Evergreen is known for an extremely flexible indexing system that allows for a high level of customization and by default uses Library of Congress MODS as its standard. Online public access catalog (OPAC): a public catalog, or discovery interface, for patrons to find and request books, view their account information, and save book information in Evergreen "bookbags." The OPAC received a makeover in early 2009 with the new, optional skin, Craftsman. There is also an optional Children's OPAC. Various patron services such as paying bills by PayPal and Stripe, optional retaining of circulation history, book bags and more. Self Service - Evergreen comes with self checkout and registration options that can be activated by the libraries. OPAC exposes structured web data by schema.org standards to aid discovery by major search engines. Acquisitions: for staff to keep track of those materials purchased; invoices, purchase orders, selection lists, etc. Authorities Serials Web based staff client that is OS independent Added Content services Chillifresh, Content Cafe, Novelist, OpenLibrary and Syndetics natively supported with others supportable. Native APIs for writing custom clients. Statistical Reporting: flexible, powerful reporting for retrieval of any statistical information stored in the database. SIP 2.0 support: for interaction with computer management software, self-check machines, and other applications. Search/Retrieve via URL and Z39.50 servers
wikipedia
wiki_33193_chunk_19
Combinatorics on words
Considered problems One problem considered in the study of combinatorics on words in group theory is the following: for two elements x,y of a semigroup, does x=y modulo the defining relations of x and y. Post and Markov studied this problem and determined it undecidable. Undecidable means the theory cannot be proved. The Burnside question was proved using the existence of an infinite cube-free word. This question asks if a group is finite if the group has a definite number of generators and meets the criteria xn=1, for x in the group.
wikipedia
wiki_6311_chunk_11
Code reuse
Systematic software reuse is a strategy for increasing productivity and improving the quality of the software industry. Although it is simple in concept, successful software reuse implementation is difficult in practice. A reason put forward for this is the dependence of software reuse on the context in which it is implemented. Some problematic issues that need to be addressed related to systematic software reuse are: a clear and well-defined product vision is an essential foundation to an software product line (SPL). an evolutionary implementation strategy would be a more pragmatic strategy for the company. there exist a need for continuous management support and leadership to ensure success. an appropriate organisational structure is needed to support SPL engineering. the change of mindset from a project-centric company to a product-oriented company is essential.
wikipedia
wiki_28484_chunk_7
Annotated Code of Maryland
Named articles The following is a list of the 36 named articles of the code, with the year of enactment of each. Multiple entries mean that an article was enacted in stages. Agriculture (1973) Alcoholic Beverages (2016) Business Occupations and Professions (1989) Business Regulation (1992) Commercial Law (1975) Corporations and Associations (1975) Correctional Services (1999, 2008) Courts and Judicial Proceedings (1973) Criminal Law (2002) Criminal Procedure (2001, 2008) Economic Development (2008) Education (1978) Election Law (2002) Environment (1982, 1987) Estates and Trusts (1974) Family Law (1984) Financial Institutions (1980) General Provisions (2014) Health - General (1982) Health Occupations (1981) Housing and Community Development (Division I) (2005) Housing and Community Development (Division II) (2006) Human Services (2007) Insurance (1995, 1996, 1997) Labor and Employment (1991) Land Use (2012) Local Government (2013) Natural Resources (1973) Public Safety (2003) Public Utilities (1998, 2008, 2010) Real Property (1974) State Finance and Procurement (1985, 1988) State Government (1984, 1985) Human Relations Commission (2009) State Personnel and Pensions (1993, 1994) Tax - General (1988) Tax - Property (1985) Transportation (1977)
wikipedia
wiki_7456_chunk_6
Mode (statistics)
The following MATLAB (or Octave) code example computes the mode of a sample: X = sort(x); % x is a column vector dataset indices = find(diff([X; realmax]) > 0); % indices where repeated values change [modeL,i] = max (diff([0; indices])); % longest persistence length of repeated values mode = X(indices(i));
wikipedia
wiki_4594_chunk_2
Rapid single flux quantum
An SFQ pulse is produced when magnetic flux through a superconducting loop containing a Josephson junction changes by one flux quantum, Φ0 as a result of the junction switching. SFQ pulses have a quantized area ʃV(t)dt = Φ0 ≈ = 2.07 mV⋅ps = 2.07 mA⋅pH due to magnetic flux quantization, a fundamental property of superconductors. Depending on the parameters of the Josephson junctions, the pulses can be as narrow as 1 ps with an amplitude of about 2 mV, or broader (e.g., 5–10 ps) with correspondingly lower amplitude. The typical value of the pulse amplitude is approximately 2IcRn, where IcRn is the product of the junction critical current, Ic, and the junction damping resistor, Rn. For Nb-based junction technology IcRn is on the order of 1 mV.
wikipedia
wiki_12803_chunk_29
Science, technology, engineering, and mathematics
An exhaustive list of STEM disciplines does not exist because the definition varies by organization. The U.S. Immigration and Customs Enforcement lists disciplines including architecture, physics, actuarial science, chemistry, biology, mathematics, applied mathematics, statistics, computer science, computational science, psychology, biochemistry, robotics, computer engineering, electrical engineering, electronics, mechanical engineering, industrial engineering, information science, information technology, civil engineering, aerospace engineering, chemical engineering, astrophysics, astronomy, optics, nanotechnology, nuclear physics, mathematical biology, operations research, neurobiology, biomechanics, bioinformatics, acoustical engineering, geographic information systems, atmospheric sciences, educational/instructional technology, software engineering, and educational research.
wikipedia
wiki_11673_chunk_6
Cognitive robotics
Some researchers in cognitive robotics have tried using architectures such as (ACT-R and Soar (cognitive architecture)) as a basis of their cognitive robotics programs. These highly modular symbol-processing architectures have been used to simulate operator performance and human performance when modeling simplistic and symbolized laboratory data. The idea is to extend these architectures to handle real-world sensory input as that input continuously unfolds through time. What is needed is a way to somehow translate the world into a set of symbols and their relationships. Questions
wikipedia
wiki_35806_chunk_11
Advanced Telescope for High Energy Astrophysics
Athena science goals The "Hot and Energetic Universe" science theme revolves around two fundamental questions in astrophysics: How does ordinary matter assemble into the large-scale structures that we see today? And how do black holes grow and shape the Universe? Both questions can only be answered using a sensitive X-ray space observatory. Its combination of scientific performance exceeds any existing or planned X-ray missions by over one order of magnitude on several parameter spaces: effective area, weak line sensitivity, survey speed, just to mention a few. Athena will perform very sensitive measurements on a wide range of celestial objects. It will investigate the chemical evolution of the hot plasma permeating the intergalactic space in cluster of galaxies, search for elusive observational features of the Warm-Hot Intergalactic Medium, investigate powerful outflows ejected from accreting black holes across their whole mass spectrum, and study their impact on the host galaxy, and identify sizeable samples of comparatively rare populations of Active Galactic Nuclei (AGN)  that are key to understanding the concurrent cosmological evolution of accreting black holes and galaxies. Among them are highly obscured and high-redshift (z≥6) AGN. Furthermore, Athena will be an X-ray observatory open to the whole astronomical community, poised to provide wide-ranging discoveries in almost all fields of modern astrophysics, with a large discovery potential of still unknown and unexpected phenomena. It represents the X-ray contribution to the fleet of large-scale observational facilities to be operational in the 2030s (incl. SKA, ELT, ALMA, LISA...).
wikipedia
wiki_15198_chunk_3
Ab initio quantum chemistry methods
One needs to consider the computational cost of ab initio methods when determining whether they are appropriate for the problem at hand. When compared to much less accurate approaches, such as molecular mechanics, ab initio methods often take larger amounts of computer time, memory, and disk space, though, with modern advances in computer science and technology such considerations are becoming less of an issue. The Hartree-Fock (HF) method scales nominally as N4 (N being a relative measure of the system size, not the number of basis functions) – e.g., if one doubles the number of electrons and the number of basis functions (double the system size), the calculation will take 16 (24) times as long per iteration. However, in practice it can scale closer to N3 as the program can identify zero and extremely small integrals and neglect them. Correlated calculations scale less favorably, though their accuracy is usually greater, which is the trade off one needs to consider. One popular method is Møller–Plesset perturbation theory (MP). To second order (MP2), MP scales as N4. To third order (MP3) MP scales as N6. To fourth order (MP4) MP scales as N7. Another method, coupled cluster with singles and doubles (CCSD), scales as N6 and extensions, CCSD(T) and CR-CC(2,3), scale as N6 with one noniterative step which scales as N7. Hybrid Density functional theory (DFT) methods using functionals which include Hartree–Fock exchange scale in a similar manner to Hartree–Fock but with a larger proportionality term and are thus more expensive than an equivalent Hartree–Fock calculation. Local DFT methods that do not include Hartree–Fock exchange can scale better than Hartree–Fock.
wikipedia
wiki_26180_chunk_15
Physical unclonable function
In 2015, some studies claimed it is possible to attack certain kinds of PUFs with low-cost equipment in a matter of milliseconds. A team at Ruhr Universität of Bochum, Germany demonstrated a method to create a model of XOR Arbiter PUFs and thus be able to predict their response to any kind of challenge. Their method requires only 4 CRPs which even on resource-constrained devices should not take more than about 200ms to produce. Using this method and a $25 device or an NFC-enabled smartphone, the team was able to successfully clone PUF-based RFID cards stored in the wallet of users while it was in their back pocket.
wikipedia
wiki_1303_chunk_9
Generic programming
A broad survey of genericity mechanisms in programming languages follows. For a specific survey comparing suitability of mechanisms for generic programming, see. In object-oriented languages When creating container classes in statically typed languages, it is inconvenient to write specific implementations for each datatype contained, especially if the code for each datatype is virtually identical. For example, in C++, this duplication of code can be circumvented by defining a class template: template<typename T> class List { // Class contents. };
wikipedia
wiki_15092_chunk_8
Rugged computer
Standards MIL-STD-810: Specifically MIL-STD-810G CN1 (2014), a military standard, issued in 1962, which establishes a set of tests for determining equipment suitability to military operations. Often used as a reference in the commercial laptop industry. MIL-STD-461: A United States Military Standard that describes how to test equipment for electromagnetic compatibility. MIL-S-901: a military standard for shock which applies to equipment mounted on ships. Two levels apply. Grade A items are items which are essential to the safety and continued combat capability of the ship. Grade B items are items whose operation is not essential to the safety and combat capability of the ship but which could become a hazard to personnel, to Grade A items, or to the ship as a whole as a result of exposure to shock. Qualification testing is performed on a barge floating in a pond where TNT is detonated at various distances and depths in the pond to impart shock to the barges. IEEE 1156.1-1993 IEEE Standard Microcomputer Environmental Specifications for Computer Modules IEEE 1613 Computers in electrical substations used to concentrate data or communicate with SCADA systems follow IEEE 1613 "Standard Environmental and Testing Requirements for Communications Networking Devices in Electric Power Substations." IP (Ingress Protection): see IP Code IS (Intrinsic Safety): see Intrinsic safety TEMPEST: see Tempest (codename) ATEX (Potentially Explosive Atmospheres): see Equipment and protective systems intended for use in potentially explosive atmospheres NEMA (National Electrical Manufacturers Association) IK Code (Also known as EN50102) see EN 50102 European standard EN 50155, "Railway Applications—Electronic Equipment Used On Rolling Stock", provides an example of a tough non-military specification. It extends operating temperature range (−25 – +70 °C), resistance to humidity, shocks, vibrations, radiation - encountered in vehicle or airborne installations.
wikipedia
wiki_24940_chunk_41
Network motif
G-Tries In 2010, Pedro Ribeiro and Fernando Silva proposed a novel data structure for storing a collection of sub-graphs, called a g-trie. This data structure, which is conceptually akin to a prefix tree, stores sub-graphs according to their structures and finds occurrences of each of these sub-graphs in a larger graph. One of the noticeable aspects of this data structure is that coming to the network motif discovery, the sub-graphs in the main network are needed to be evaluated. So, there is no need to find the ones in random network which are not in the main network. This can be one of the time-consuming parts in the algorithms in which all sub-graphs in random networks are derived.
wikipedia
wiki_3403_chunk_1
Amoeba (operating system)
Overview The goal of the Amoeba project was to construct an operating system for networks of computers that would present the network to the user as if it were a single machine. An Amoeba network consists of a number of workstations connected to a "pool" of processors, and executing a program from a terminal causes it to run on any of the available processors, with the operating system providing load balancing. Unlike the contemporary Sprite, Amoeba does not support process migration. The workstations would typically function as networked terminals only. Aside from workstations and processors, additional machines operate as servers for files, directory services, TCP/IP communications etc.
wikipedia
wiki_1166_chunk_13
Maple (software)
Solve equations numerically The following code numerically calculates the roots of a high-order polynomial: f := x^53-88*x^5-3*x-5 = 0 fsolve(f) -1.097486315, -.5226535640, 1.099074017 The same command can also solve systems of equations: f := (cos(x+y))^2 + exp(x)*y+cot(x-y)+cosh(z+x) = 0:
wikipedia
wiki_21351_chunk_7
Inter-American Biodiversity Information Network
The Thematic Networks, or TNs, are intended to lead the development of theme-specific standards and protocols and in the maintenance of hemisphere-wide networks of specialists and specialized institutions. In each case a Coordinating Institution has signed a memorandum of understanding with the IEC to lead the work of the TN. They are also tasked with development of search tools and linking of data in their thematic area with data of the other TNs. The TNs, with the coordinating institution in parentheses, are: Species and Specimens (INBio, Costa Rica), Ecosystems (NatureServe, USA), Protected Areas (UNEP-WCMC, UK), Invasive Species I3N Network (United States Geological Survey, USA), and Pollinators (CoEvolution Institute, USA).
wikipedia
wiki_34155_chunk_10
Arithmetic circuit complexity
The state of the art is a lower bound for the size of a circuit computing, e.g., the polynomial given by Strassen and by Baur and Strassen. More precisely, Strassen used Bézout's lemma to show that any circuit that simultaneously computes the polynomials is of size and later Baur and Strassen showed the following: given an arithmetic circuit of size computing a polynomial one can construct a new circuit of size at most that computes and all the partial derivatives of Since the partial derivatives of are the lower bound of Strassen applies to as well. This is one example where some upper bound helps in proving lower bounds; the construction of a circuit given by Baur and Strassen implies a lower bound for more general polynomials.
wikipedia
wiki_27675_chunk_8
Social network aggregation
Applications in marketing Social network aggregators are a powerful tool in marketing. They appear to be an efficient way to have an organized view of the content to get a better insight into the market. The needs about them are real: a study provided by eMarketer shows that 43% of marketers are complaining about a significant lack of time to find relevant content for their business. Social network aggregators grant features to share your own content in many social media to reach as many people as possible. That way, social network aggregators become a productivity enhancement tool. A list of some example social media aggregators for brands can be found here.
wikipedia
wiki_8382_chunk_5
National Agricultural Statistics Service
Producers, farm organizations, agribusinesses, lawmakers and government agencies all rely on the information produced by NASS. For instance: Statistical information on acreage, production, stocks, prices and value is essential for the smooth operation of federal farm programs. Agricultural data are indispensable for planning and administering related federal and state programs in such areas as consumer protection, conservation and environmental quality, trade, education and recreation. NASS data helps to ensure an orderly flow of goods and services among agriculture's producing, processing and marketing sectors. Reliable, timely and detailed crop and livestock statistics help to maintain a stable economic climate and minimize the uncertainties and risks associated with the production, marketing and distribution of commodities. Farmers and ranchers rely on NASS reports in making various production and marketing decisions, such as how much grain to plant, how much livestock to raise and when to buy or sell agricultural commodities. NASS estimates and forecasts are used by the transportation sector, warehouse and storage companies, banks and other lending institutions, commodity traders and food processors. The businesses that provide farmers with seeds, equipment, chemicals and other goods and services use the data when planning their marketing strategies. Analysts transform the statistics into projections of coming trends, interpretations of the trends’ economic implications and evaluations of alternative courses of action for producers, agribusinesses and policymakers. Crop reports relating to acreage, yields, and production.
wikipedia
wiki_7072_chunk_6
Nested function
Quicksort A more realistic example is this implementation of quicksort: void sort(int *items, int size) { void quickSort(int first, int last) { void swap(int p, int q) { int tmp = items[p]; items[p] = items[q]; items[q] = tmp; } int partition() { int pivot = items[first], index = first; swap(index, last); for (int i = first; i < last; i++) if (items[i] < pivot) swap(index++, i); swap(index, last); return index; }
wikipedia
wiki_8463_chunk_19
Archaeological theory
The impact of ideology Archaeology has been and remains a cultural, gender and political battlefield. Many groups have tried to use archaeology to prove some current cultural or political point. Marxist or Marxist-influenced archaeologists in the USSR and the UK (among others) often try to prove the truth of dialectical materialism or to highlight the past (and present) role of conflict between interest groups (e.g. male vs. female, elders vs. juniors, workers vs. owners) in generating social change. Some contemporary cultural groups have tried, with varying degrees of success, to use archaeology to prove their historic right to ownership of an area of land. Many schools of archaeology have been patriarchal, assuming that in prehistory men produced most of the food by hunting, and women produced little nutrition by gathering; more recent studies have exposed the inadequacy of many of these theories. Some used the "Great Ages" theory implicit in the three-age system to argue continuous upward progress by Western civilisation. Much contemporary archaeology is influenced by neo-Darwinian evolutionary thought, phenomenology, postmodernism, agency theory, cognitive science, functionalism, gender-based and Feminist archaeology and Systems theory.
wikipedia
wiki_11412_chunk_3
Calculus on Manifolds (book)
ReceptionCalculus on Manifolds aims to present the topics of multivariable and vector calculus in the manner in which they are seen by a modern working mathematician, yet simply and selectively enough to be understood by undergraduate students whose previous coursework in mathematics comprises only one-variable calculus and introductory linear algebra. While Spivak's elementary treatment of modern mathematical tools is broadly successful—and this approach has made Calculus on Manifolds a standard introduction to the rigorous theory of multivariable calculus—the text is also well known for its laconic style, lack of motivating examples, and frequent omission of non-obvious steps and arguments. For example, in order to state and prove the generalized Stokes' theorem on chains, a profusion of unfamiliar concepts and constructions (e.g., tensor products, differential forms, tangent spaces, pullbacks, exterior derivatives, cube and chains) are introduced in quick succession within the span of 25 pages. Moreover, careful readers have noted a number of nontrivial oversights throughout the text, including missing hypotheses in theorems, inaccurately stated theorems, and proofs that fail to handle all cases.
wikipedia
wiki_8497_chunk_14
Computerized adaptive testing
Components There are five technical components in building a CAT (the following is adapted from Weiss & Kingsbury, 1984 ). This list does not include practical issues, such as item pretesting or live field release. Calibrated item pool Starting point or entry level Item selection algorithm Scoring procedure Termination criterion
wikipedia
wiki_29242_chunk_16
Airborne Networking
Fighter Platforms An airborne fighter platform flight profile includes periods of stable flight patterns and dynamic maneuvers at high speeds. Its relatively small size limits the amount of space available for mounting antennas and installing equipment. It will be employed as part of a strike package or combat air patrol (CAP). The strike package or CAP will have supporting airborne C2 and ISR platform(s), tanker (refueling) platform(s), and ground C2 platform(s). Each airborne fighter platform requires connectivity to all other strike package or CAP and supporting platforms; however, a majority of information will be exchanged between airborne fighter platforms. This is driven in large part by the need for frequent situational awareness and target sorting updates in a highly mobile environment. Pilots will be provided services such as real-time data, digital voice, and interactive data sharing.
wikipedia
wiki_51_chunk_13
Biostatistics
Experimental design Experimental designs sustain those basic principles of experimental statistics. There are three basic experimental designs to randomly allocate treatments in all plots of the experiment. They are completely randomized design, randomized block design, and factorial designs. Treatments can be arranged in many ways inside the experiment. In agriculture, the correct experimental design is the root of a good study and the arrangement of treatments within the study is essential because environment largely affects the plots (plants, livestock, microorganisms). These main arrangements can be found in the literature under the names of “lattices”, “incomplete blocks”, “split plot”, “augmented blocks”, and many others. All of the designs might include control plots, determined by the researcher, to provide an error estimation during inference.
wikipedia
wiki_24707_chunk_3
Reactive programming
Several popular approaches are employed in the creation of reactive programming languages. Specification of dedicated languages that are specific to various domain constraints. Such constraints usually are characterized by real-time, embedded computing or hardware description. Another approach involves the specification of general-purpose languages that include support for reactivity. Other approaches are articulated in the definition, and use of programming libraries, or embedded domain-specific languages, that enable reactivity alongside or on top of the programming language. Specification and use of these different approaches results in language capability trade-offs. In general, the more restricted a language is, the more its associated compilers and analysis tools are able to inform developers (e.g., in performing analysis for whether programs are able to execute in actual real time). Functional trade-offs in specificity may result in deterioration of the general applicability of a language.
wikipedia
wiki_15182_chunk_3
Joint Policy Board for Mathematics
JPBM Communications Award winners 2022: Talithia Williams 2021: John Bailer, Richard Campbell, Rosemary Pennington, and Erica Klarreich 2020: Christopher Budd and James Tanton 2019: Margot Lee Shetterly 2018: Vi Hart and Matt Parker 2017: Siobhan Roberts, for Expository and Popular Books, and Arthur T. Benjamin, for Public Outreach 2016: Simon Singh, for Expository and Popular Books, and the National Museum of Mathematics, for Public Outreach 2015: Nate Silver 2014: Danica McKellar 2013: John Allen Paulos 2012: Dana Mackenzie 2011: Nicolas Falacci and Cheryl Heuton 2010: Marcus du Sautoy 2009: George Csicsery 2008: Carl Bialik 2007: Steven H. Strogatz 2006: Roger Penrose 2005: Barry Arthur Cipra 2003: Robert Osserman 2002: Helaman Ferguson and Claire Ferguson 2001: Keith J. Devlin 2000: Sylvia Nasar 1999: Ian Stewart 1998: Constance Reid 1997: Philip J. Davis 1996: Gina Kolata 1994: Martin Gardner 1993: Joel Schneider 1991: Ivars Peterson 1990: Hugh Whitemore 1988: James Gleick
wikipedia
wiki_33655_chunk_10
Wind power in New York
On September 8, 2011, the New York Power Authority, Long Island Power Authority, and Con Edison (the Offshore Wind Collaborative) filed a request with the US Department of the Interior, Bureau of Ocean Energy Management (BOEM) to issue a commercial lease on the outer continental shelf to the New York Power Authority for the development of the Long Island - New York City Offshore Wind Project. This project would be located in the Atlantic Ocean off Nassau County, approximately 13 nautical miles off Rockaway Peninsula, in a long 65,000-acre wedge-shaped area between shipping channels, directionally aligned southwest of Rockaway Peninsula. The project as now configured consists of 97 offshore turbines, with a total nameplate generating capacity of 350 MW. With 194 turbines, generating capacity could be doubled to 700 MW. Given the lengthy permitting process, the Collaborative's proposed project would not be operational until 2018 at the earliest. On January 4, 2013, BOEM issued a Request for Interest (Docket ID: BOEM-2012-0083) to determine whether other parties were interested in developing the same area. In addition to the Collaborative's response, BOEM received letters of interest in a commercial lease for this area from Fishermen's Energy LLC and Energy Management, Inc.
wikipedia
wiki_8599_chunk_2
Future-proof
In future-proof electrical systems, buildings should have "flexible distribution systems to allow communication technologies to expand., Image-related processing software should be flexible, adaptable, and programmable to be able to work with several different potential media in the future as well as to handle increasing file sizes. Image-related processing software should also be scalable and embeddable in other words, the use or place in which the software is employed is variable and the software needs to accommodate the variable environment. Higher processing integration is required to support future computational requirements in image processing as well.
wikipedia
wiki_15836_chunk_0
List of MeSH codes (E04)
The following is a partial list of the "E" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (E03). Codes following these are found at List of MeSH codes (E05). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – surgical procedures, operative – ambulatory surgical procedures
wikipedia
wiki_39880_chunk_3
Semel Institute for Neuroscience and Human Behavior
Integrative Phenotyping Center for Neuropsychiatry The institute plans to use a $14.9 million stimulus grant to create "The Integrative Phenotyping Center for Neuropsychiatry", a new interdisciplinary research center focused on the role of genetic and environmental factors in neuropsychiatric and behavioral disorders. This center is in the design phase and is expected to be under construction in 2011 and ready for occupancy in late 2012. It will employ around 180 employees and it will be housed in a space covering three renovated floors of the current Semel Institute tower. It will use a National Institutes of Health grant, funded through the American Recovery and Reinvestment Act of 2009, for research on autism, attention deficit disorder, schizophrenia, major depressive disorder, bipolar disorder, and Alzheimer's disease and other dementias. The facility will enable large-scale studies, including studies of personality, cognition, and brain activity and structure. "This project is completed."
wikipedia
wiki_17285_chunk_14
Hopcroft–Karp algorithm
Non-bipartite graphs The same idea of finding a maximal set of shortest augmenting paths works also for finding maximum cardinality matchings in non-bipartite graphs, and for the same reasons the algorithms based on this idea take phases. However, for non-bipartite graphs, the task of finding the augmenting paths within each phase is more difficult. Building on the work of several slower predecessors, showed how to implement a phase in linear time, resulting in a non-bipartite matching algorithm with the same time bound as the Hopcroft–Karp algorithm for bipartite graphs. The Micali–Vazirani technique is complex, and its authors did not provide full proofs of their results; subsequently, a "clear exposition" was published by and alternative methods were described by other authors. In 2012, Vazirani offered a new simplified proof of the Micali-Vazirani algorithm.
wikipedia
wiki_2803_chunk_7
Modeling language
Algebraic Algebraic Modeling Languages (AML) are high-level programming languages for describing and solving high complexity problems for large scale mathematical computation (i.e. large scale optimization type problems). One particular advantage of AMLs like AIMMS, AMPL, GAMS, Mosel, OPL and OptimJ is the similarity of its syntax to the mathematical notation of optimization problems. This allows for a very concise and readable definition of problems in the domain of optimization, which is supported by certain language elements like sets, indices, algebraic expressions, powerful sparse index and data handling variables, constraints with arbitrary names. The algebraic formulation of a model does not contain any hints how to process it.
wikipedia
wiki_19831_chunk_6
Artificial intelligence systems integration
Many online communities for A.I. developers exist where tutorials, examples, and forums aim at helping both beginners and experts build intelligent systems (for example the AI Depot, Generation 5). However, few communities have succeeded in making a certain standard or a code of conduct popular to allow the large collection of miscellaneous systems to be integrated with any ease. Recently, however, there have been focused attempts at producing standards for A.I. research collaboration, Mindmakers.org is an online community specifically created to harbor collaboration in the development of A.I. systems. The community has proposed the OpenAIR message and routing protocol for communication between software components, making it easier for individual developers to make modules instantly integrateble into other peoples' projects.
wikipedia
wiki_7943_chunk_9
Paul Seymour (mathematician)
In the 2010s Seymour worked mainly on χ-boundedness and the Erdős–Hajnal conjecture. In a series of papers with Alex Scott and partly with Chudnovsky, they proved two conjectures of András Gyárfás, that every graph with bounded clique number and sufficiently large chromatic number has an induced cycle of odd length at least five, and has an induced cycle of length at least any specified number. The series culminated in a paper of Scott and Seymour proving that for every fixed k, every graph with sufficiently large chromatic number contains either a large complete subgraph or induced cycles of all lengths modulo k, which leads to the resolutions of two conjectures of Gil Kalai and Roy Meshulam connecting the chromatic number of a graph with the homology of its independence complex. There was also a polynomial-time algorithm (with Chudnovsky, Scott, and Chudnovsky and Seymour's student Sophie Spirkl) to test whether a graph contains an induced cycle with length more than three and odd. Most recently, the four jointly resolved the 5-cycle case of the Erdős–Hajnal conjecture, which says that every graph without an induced copy of the 5-cycle contains an independent set or a clique of polynomial size.
wikipedia
wiki_372_chunk_42
Microcode
Writable Instruction Set Computer Capacitor Read-only Store Transformer Read-only Store A Brief History of Microprogramming Intel processor microcode security update (fixes the issues when running 32-bit virtual machines in PAE mode) Notes on Intel Microcode Updates, March 2013, by Ben Hawkes, archived from the original on September 7, 2015 Hole seen in Intel's bug-busting feature, EE Times, 2002, by Alexander Wolfe, archived from the original on March 9, 2003 Opteron Exposed: Reverse Engineering AMD K8 Microcode Updates, July 26, 2004
wikipedia
wiki_22565_chunk_17
History of biochemistry
Since then, biochemistry has advanced, especially since the mid-20th century, with the development of new techniques such as chromatography, X-ray diffraction, NMR spectroscopy, radioisotopic labelling, electron microscopy and molecular dynamics simulations. These techniques allowed for the discovery and detailed analysis of many molecules and metabolic pathways of the cell, such as glycolysis and the Krebs cycle (citric acid cycle). The example of an NMR instrument shows that some of these instruments, such as the HWB-NMR, can be very large in size and can cost anywhere from a few thousand dollars to millions of dollars ($16 million for the one shown here).
wikipedia
wiki_31281_chunk_1
Newcastle University Faculty of Science, Agriculture and Engineering
School of Computing School of Engineering School of Mathematics, Statistics and Physics School of Natural and Environmental Sciences Research and degrees The faculty offers over sixty undergraduate degrees, postgraduate degrees and research opportunities. Research funding sources include: The Biotechnology and Biological Sciences Research Council (BBSRC) The Natural Environment Research Council (NERC) The Engineering and Physical Sciences Research Council (EPSRC) The Science and Technology Facilities Council (STFC) The European Union The Environment Agency The Department for the Environment, Food and Rural Affairs (DEFRA) The Royal Society References External links Faculty of Science, Agriculture and Engineering at Newcastle University SAgE Research Directory at Newcastle University
wikipedia
wiki_9975_chunk_4
N400 (neuroscience)
An example of an experimental task used to study the N400 is a priming paradigm. Subjects are shown a list of words in which a prime word is either associatively related to a target word (e.g. bee and honey), semantically related (e.g. sugar and honey) or a direct repetition (e.g. honey and honey). The N400 amplitude seen to the target word (honey) will be reduced upon repetition due to semantic priming. The amount of reduction in amplitude can be used to measure the degree of relatedness between the words.
wikipedia
wiki_71_chunk_20
Bayesian probability
Indeed, some Bayesians have argued the prior state of knowledge defines the (unique) prior probability-distribution for "regular" statistical problems; cf. well-posed problems. Finding the right method for constructing such "objective" priors (for appropriate classes of regular problems) has been the quest of statistical theorists from Laplace to John Maynard Keynes, Harold Jeffreys, and Edwin Thompson Jaynes. These theorists and their successors have suggested several methods for constructing "objective" priors (Unfortunately, it is not clear how to assess the relative "objectivity" of the priors proposed under these methods): Maximum entropy Transformation group analysis Reference analysis
wikipedia
wiki_17578_chunk_7
Developmental cognitive neuroscience
Tools and techniques employed Absolutely critical to being able to understand brain function in children have been neuroimaging techniques, first EEG & ERPs, then fMRI, and more recently NIRS, MEG, & TMS that look at function and MRI, DTI, & MRS that look at structure, connectivity, and metabolism. Before functional neuroimaging techniques scientists were constrained to trying to understand function from dysfunction (i.e., trying to understand how the brain works from seeing what deficits occur when the brain is damaged or impaired). It is difficult to understate how important technological advances have been to the emerging field of developmental cognitive neuroscience.
wikipedia
wiki_1521_chunk_58
Sampling (statistics)
Formulas, tables, and power function charts are well known approaches to determine sample size. Steps for using sample size tables Postulate the effect size of interest, α, and β. Check sample size table Select the table corresponding to the selected α Locate the row corresponding to the desired power Locate the column corresponding to the estimated effect size. The intersection of the column and row is the minimum sample size required. Sampling and data collection Good data collection involves: Following the defined sampling process Keeping the data in time order Noting comments and other contextual events Recording non-responses
wikipedia
wiki_30340_chunk_4
UNSW Faculty of Engineering
MyUniversity is an Australian Government website providing information about Australian universities. As data is collected from different sources, percentages may collate to over 100%. Information is provided university wide, and on select disciplines. Results for all Engineering disciplines are listed below. Aerospace Engineering Students 97.7% of students have a positive outcome: 89.9% full-time job rate (highest amongst the Go8 and ATN universities in Australia) 7.8% of students go onto further full-time study 7.8% Attrition Rate (lowest amongst the Go8 and ATN universities in Australia) Computing and Information Systems 100% of students have a positive outcome: 93.5% full-time job rate (highest amongst the Go8 and ATN universities in Australia) 7.8% of students go onto further full-time study 8.6% Attrition Rate (lowest amongst the Go8 and ATN universities in Australia) Civil Engineering Students 100% of students have a positive outcome: 94.9% full-time job rate (highest amongst the Go8 and ATN universities in Australia) 9.1% of students go onto further full-time study 5.2% Attrition Rate (second lowest amongst the Go8 and ATN universities in Australia) Electrical and Electronic Engineering students 100% of students have a positive outcome: 92.4% full-time job rate (highest amongst the Go8 and ATN universities in Australia) 10.6% of students go onto further full-time study 5.0% Attrition Rate (lowest amongst the Go8 and ATN universities in Australia) Mechanical Engineering student 100% of students have a positive outcome: 90.1% full-time job rate (highest amongst the Go8 and ATN universities in Australia) 13.1% of students go onto further full-time study 6.7% Attrition Rate (second lowest amongst the Go8 and ATN universities in Australia)
wikipedia
wiki_19313_chunk_24
Hadamard code
Let be the codeword in corresponding to message . Let be the generator matrix of . By definition, . From this, . By the construction of , . Therefore, by substitution, . Proof of theorem 1 To prove theorem 1 we will construct a decoding algorithm and prove its correctness. Algorithm Input: Received word For each : Pick uniformly at random. Pick such that , where is the -th standard basis vector and is the bitwise xor of and . . Output: Message
wikipedia
wiki_31651_chunk_6
Functional flow block diagram
These diagrams are used both to develop requirements and to identify profitable trade studies. For example, does the spacecraft antenna acquire the tracking and data relay satellite (TDRS) only when the payload data are to be transmitted, or does it track TDRS continually to allow for the reception of emergency commands or transmission of emergency data? The FFBD also incorporates alternate and contingency operations, which improve the probability of mission success. The flow diagram provides an understanding of total operation of the system, serves as a basis for development of operational and contingency procedures, and pinpoints areas where changes in operational procedures could simplify the overall system operation. In certain cases, alternate FFBDs may be used to represent various means of satisfying a particular function until data are acquired, which permits selection among the alternatives.
wikipedia
wiki_8121_chunk_15
Asynchronous circuit
Disadvantages Area overhead caused by additional logic implementing handshaking. In some cases an asynchronous design may require up to double the resources (area, circuit speed, power consumption) of a synchronous design, due to addition of completion detection and design-for-test circuits. Compared to a synchronous design as of 90s and early 2000s not many people are trained or experienced in designing of asynchronous circuits. Synchronous designs are inherently easier to test and debug than asynchronous designs. However, this position is disputed by Fant, who claims that the apparent simplicity of synchronous logic is an artifact of the mathematical models used by the common design approaches. Clock gating in more conventional synchronous designs is an approximation of the asynchronous ideal, and in some cases, its simplicity may outweigh the advantages of a fully asynchronous design. Performance (speed) of asynchronous circuits may be reduced in architectures that require input-completeness (more complex data path). Lack of dedicated, asynchronous design-focused commercial EDA tools. As of 2006 the situation was slowly improving however.
wikipedia
wiki_14234_chunk_3
Health ecology
Eco health approaches as currently practiced are participatory, systems-based approaches to understanding and promoting health and wellbeing in the context of social and ecological interactions. What differentiates these approaches from earlier integrative attempts is a firm grounding in complexity theories and post-normal science (Waltner-Toews, 2004; Waltner-Toews et al., 2008). While a variety of organizations promote integrative approaches such as One Health, the primary funder and promoter of Eco health in particular, world-wide, is the International Development Research Centre in Ottawa (https://web.archive.org/web/20100126030738/http://www.idrc.ca/ecohealth/).
wikipedia
wiki_28756_chunk_11
Computational creativity
Combinatorial creativity A great deal, perhaps all, of human creativity can be understood as a novel combination of pre-existing ideas or objects. Common strategies for combinatorial creativity include: Placing a familiar object in an unfamiliar setting (e.g., Marcel Duchamp's Fountain) or an unfamiliar object in a familiar setting (e.g., a fish-out-of-water story such as The Beverly Hillbillies) Blending two superficially different objects or genres (e.g., a sci-fi story set in the Wild West, with robot cowboys, as in Westworld, or the reverse, as in Firefly; Japanese haiku poems, etc.) Comparing a familiar object to a superficially unrelated and semantically distant concept (e.g., "Makeup is the Western burka"; "A zoo is a gallery with living exhibits") Adding a new and unexpected feature to an existing concept (e.g., adding a scalpel to a Swiss Army knife; adding a camera to a mobile phone) Compressing two incongruous scenarios into the same narrative to get a joke (e.g., the Emo Philips joke "Women are always using men to advance their careers. Damned anthropologists!") Using an iconic image from one domain in a domain for an unrelated or incongruous idea or product (e.g., using the Marlboro Man image to sell cars, or to advertise the dangers of smoking-related impotence). The combinatorial perspective allows us to model creativity as a search process through the space of possible combinations. The combinations can arise from composition or concatenation of different representations, or through a rule-based or stochastic transformation of initial and intermediate representations. Genetic algorithms and neural networks can be used to generate blended or crossover representations that capture a combination of different inputs.
wikipedia
wiki_19904_chunk_14
Paleontological Research Institution
The Teacher-Friendly Guide series The Teacher-Friendly Guide series published by PRI provides information for grades 6-9 teachers and includes guides for climate change, geology, and evolution in bivalves and maize. Teacher-Friendly Guides to Earth Sciences cover six US regions (the Northeast, Southeast, Midwest, West, South Central, Northwest Central, and Southwest), each with their own book. The Teacher-Friendly Guide to Geology of the Northeastern US (2003) The Teacher-Friendly Guide to Evolution Using Bivalves as a Model Organism (2011) The Teacher-Friendly Guide to the Earth Science of the Midwestern US (2014) The Teacher-Friendly Guide to the Earth Science of the Western US (2014) The Teacher-Friendly Guide to the Earth Science of the South Central US (2015) The Teacher-Friendly Guide to the Earth Science of the Northwest Central US (2015) The Teacher-Friendly Guide to the Earth Science of the Southeastern US (2016) The Teacher-Friendly Guide to the Earth Science of the Southwestern US (2016) The Teacher-Friendly Guide to Climate Change (2017)
wikipedia
wiki_83_chunk_23
Computational linguistics
Some projects are still trying to solve the problem which first started computational linguistics off as its field in the first place. However, methods have become more refined, and consequently, the results generated by computational linguists have become more enlightening. To improve computer translation, several models have been compared, including hidden Markov models, smoothing techniques, and the specific refinements of those to apply them to verb translation. The model which was found to produce the most natural translations of German and French words was a refined alignment model with a first-order dependence and a fertility model. They also provide efficient training algorithms for the models presented, which can give other scientists the ability to improve further on their results. This type of work is specific to computational linguistics and has applications that could vastly improve understanding of how language is produced and comprehended by computers.
wikipedia
wiki_16241_chunk_11
Functional completeness
The following are the minimal functionally complete sets of logical connectives with arity ≤ 2: One element {↑}, {↓}. Two elements , , , , , , , , , , , , , , , , , Three elements , , , , , There are no minimal functionally complete sets of more than three at most binary logical connectives. In order to keep the lists above readable, operators that ignore one or more inputs have been omitted. For example, an operator that ignores the first input and outputs the negation of the second can be replaced by a unary negation. Examples
wikipedia
wiki_5422_chunk_28
Envelope (mathematics)
Partial differential equations Envelopes can be used to construct more complicated solutions of first order partial differential equations (PDEs) from simpler ones. Let F(x,u,Du) = 0 be a first order PDE, where x is a variable with values in an open set Ω ⊂ Rn, u is an unknown real-valued function, Du is the gradient of u, and F is a continuously differentiable function that is regular in Du. Suppose that u(x;a) is an m-parameter family of solutions: that is, for each fixed a ∈ A ⊂ Rm, u(x;a) is a solution of the differential equation. A new solution of the differential equation can be constructed by first solving (if possible)
wikipedia
wiki_27877_chunk_5
Morphological dictionary
Sample data from SMOR (German SFST grammar):<Base_Stems>Aachen<NN><base><nativ><Name-Neut_s> <Base_Stems>Aal<NN><base><nativ><NMasc_es_e> <Base_Stems>Aarau<NN><base><nativ><Name-Neut_s>
wikipedia
wiki_9554_chunk_4
Heun function
{| class="wikitable" |+Forms of the Heun Equation |- ! Form !! Singularities !! Equation |- | General | 0, 1, a, ∞ | |- | Confluent | 0, 1, ∞ (irregular, rank 1) | |- | Doubly Confluent | 0 (irregular, rank 1), ∞ (irregular, rank 1) | |- | Biconfluent | 0, ∞ (irregular, rank 2) | |- | Triconfluent | ∞ (irregular, rank 3) | |}
wikipedia
wiki_20887_chunk_20
Wind power forecasting
Statistical models include linear and non-linear models, but also structural and black-box types of models. Structural models rely on the analyst's expertise on the phenomenon of interest while black-box models require little subject-matter knowledge and are constructed from data in a fairly mechanical way. Concerning wind power forecasting, structural models would be those that include a modeling of the diurnal wind speed variations, or an explicit function of meteorological variable predictions. Black-box models include most of the artificial-intelligence-based models such as Neural-Networks (NNs) and Support Vector Machines (SVMs). However, some models are 'in-between' the two extremes of being completely black-box or structural. This is the case of expert systems, which learn from experience (from a dataset), and for which prior knowledge can be injected. We then talk about grey-box modeling. Statistical models are usually composed by an autoregressive part, for seizing the persistent behavior of the wind, and by a 'meteorological' part, which consists in the nonlinear transformation of meteorological variable forecasts. The autoregressive part permits to significantly enhance forecast accuracy for horizons up to 6–10 hours ahead, i.e. over a period during which the sole use of meteorological forecast information may not be sufficient for outperforming persistence.
wikipedia
wiki_36737_chunk_10
Computational complexity of matrix multiplication
Henry Cohn, Robert Kleinberg, Balázs Szegedy and Chris Umans put methods such as the Strassen and Coppersmith–Winograd algorithms in an entirely different group-theoretic context, by utilising triples of subsets of finite groups which satisfy a disjointness property called the triple product property (TPP). They also give conjectures that, if true, would imply that there are matrix multiplication algorithms with essentially quadratic complexity. This implies that the optimal exponent of matrix multiplication is 2, which most researchers believe is indeed the case. One such conjecture is that families of wreath products of Abelian groups with symmetric groups realise families of subset triples with a simultaneous version of the TPP. Several of their conjectures have since been disproven by Blasiak, Cohn, Church, Grochow, Naslund, Sawin, and Umans using the Slice Rank method. Further, Alon, Shpilka and Chris Umans have recently shown that some of these conjectures implying fast matrix multiplication are incompatible with another plausible conjecture, the sunflower conjecture.
wikipedia
wiki_38465_chunk_0
Dubai Statistics Center
Dubai Statistics Center specializes in the construction of a modern and comprehensive statistical system and shall be the only official source for the collection, analysis and publication of statistical information and data in the Emirate of Dubai (UAE) adopting harmonized methodological international standards in the collection, analysis, and dissemination of statistical data according to the following: The collection, updating, maintenance, and protection of statistical data and information on the Emirate from all sources of data. The conduct of the population census, and economic and social statistical surveys either by total size or through sampling on a periodic basis and in cooperation with the Federal Ministry of Planning. The design and execution of studies and surveys based on the requirements of local and other departments and agencies, and based on what has been agreed upon with these agencies and departments. The provision of advice and statistical consultations to local government departments and institutions. The provision of data and statistical information to government institutions and departments, to the business community, and to individuals within its mandate. Work to standardize statistical concepts and definitions which are applied in the Emirate in conformity with international standards and classifications, and with coordination with Federal entities in the country. Preparation and publication of statistical booklets and material at the Emirate level.
wikipedia
wiki_4480_chunk_9
Affine plane (incidence geometry)
An alternate view of affine translation planes can be obtained as follows: Let be a -dimensional vector space over a field . A spread of is a set of -dimensional subspaces of that partition the non-zero vectors of . The members of are called the components of the spread and if and are distinct components then . Let be the incidence structure whose points are the vectors of and whose lines are the cosets of components, that is, sets of the form where is a vector of and is a component of the spread . Then: is an affine plane and the group of translations for a vector is an automorphism group acting regularly on the points of this plane.
wikipedia
wiki_2015_chunk_53
Computer Go
Extensive list of computer Go events All systems Go by David A. Mechner (1998), discusses the game where professional Go player Janice Kim won a game against program Handtalk after giving a 25-stone handicap. Kinger, Tim and Mechner, David. An Architecture for Computer Go (1996) Computer Go and Computer Go Programming pages at Sensei's Library Computer Go bibliography Another Computer Go Bibliography Computer Go mailing list Published articles about computer Go on Ideosphere gives current estimate of whether a Go program will be best player in the world Information on the Go Text Protocol commonly used for interfacing Go playing engines with graphical clients and internet servers The Computer Go Room on the K Go Server (KGS) for online discussion and running "bots" Two Representative Computer Go Games, an article about two computer Go games played in 1999, one with two computers players, and the other a 29-stone handicap human-computer game What A Way to Go describes work at Microsoft Research on building a computer Go player. Cracking Go by Feng-hsiung Hsu, IEEE Spectrum magazine (October 2007) – Why it should be possible to build a Go machine stronger than any human player computer-go-dataset, SGF datasets of 1,645,958 games
wikipedia
wiki_23974_chunk_9
Convex hull algorithms
Akl–Toussaint heuristic The following simple heuristic is often used as the first step in implementations of convex hull algorithms to improve their performance. It is based on the efficient convex hull algorithm by Selim Akl and G. T. Toussaint, 1978. The idea is to quickly exclude many points that would not be part of the convex hull anyway. This method is based on the following idea. Find the two points with the lowest and highest x-coordinates, and the two points with the lowest and highest y-coordinates. (Each of these operations takes O(n).) These four points form a convex quadrilateral, and all points that lie in this quadrilateral (except for the four initially chosen vertices) are not part of the convex hull. Finding all of these points that lie in this quadrilateral is also O(n), and thus, the entire operation is O(n). Optionally, the points with smallest and largest sums of x- and y-coordinates as well as those with smallest and largest differences of x- and y-coordinates can also be added to the quadrilateral, thus forming an irregular convex octagon, whose insides can be safely discarded. If the points are random variables, then for a narrow but commonly encountered class of probability density functions, this throw-away pre-processing step will make a convex hull algorithm run in linear expected time, even if the worst-case complexity of the convex hull algorithm is quadratic in n.
wikipedia
wiki_37693_chunk_2
Term (logic)
Given a set V of variable symbols, a set C of constant symbols and sets Fn of n-ary function symbols, also called operator symbols, for each natural number n ≥ 1, the set of (unsorted first-order) terms T is recursively defined to be the smallest set with the following properties: every variable symbol is a term: V ⊆ T, every constant symbol is a term: C ⊆ T, from every n terms t1,...,tn, and every n-ary function symbol f ∈ Fn, a larger term f(t1, ..., tn) can be built. Using an intuitive, pseudo-grammatical notation, this is sometimes written as: t ::= x | c | f(t1, ..., tn). Usually, only the first few function symbol sets Fn are inhabited. Well-known examples are the unary function symbols sin, cos ∈ F1, and the binary function symbols +, −, ⋅, / ∈ F2, while ternary operations are less known, let alone higher-arity functions. Many authors consider constant symbols as 0-ary function symbols F0, thus needing no special syntactic class for them.
wikipedia
wiki_38878_chunk_2
Physics Instructional Resource Association
PIRA has also generated a subset of this list called the PIRA 200. These 200 demonstrations are the recommended basic collection for any physics department. See also Scientific demonstration References External links Official PIRA website American Association of Physics Teachers web page AAPT sponsored events Physics education Physics organizations Professional associations based in the United States Teacher associations based in the United States
wikipedia
wiki_39528_chunk_11
Post-quantum cryptography
In some versions of Ring-LWE there is a security reduction to the shortest-vector problem (SVP) in a lattice as a lower bound on the security. The SVP is known to be NP-hard. Specific ring-LWE systems that have provable security reductions include a variant of Lyubashevsky's ring-LWE signatures defined in a paper by Güneysu, Lyubashevsky, and Pöppelmann. The GLYPH signature scheme is a variant of the Güneysu, Lyubashevsky, and Pöppelmann (GLP) signature which takes into account research results that have come after the publication of the GLP signature in 2012. Another Ring-LWE signature is Ring-TESLA. There also exists a "derandomized variant" of LWE, called Learning with Rounding (LWR), which yields " improved speedup (by eliminating sampling small errors from a Gaussian-like distribution with deterministic errors) and bandwidth." While LWE utilizes the addition of a small error to conceal the lower bits, LWR utilizes rounding for the same purpose.
wikipedia
wiki_2151_chunk_23
D (programming language)
Metaprogramming Metaprogramming is supported through templates, compile-time function execution, tuples, and string mixins. The following examples demonstrate some of D's compile-time features. Templates in D can be written in a more imperative style compared to the C++ functional style for templates. This is a regular function that calculates the factorial of a number: ulong factorial(ulong n) { if (n < 2) return 1; else return n * factorial(n-1); }
wikipedia
wiki_18128_chunk_6
Symposium on Logic in Computer Science
2013 Leo Bachmair, Harald Ganzinger, Uwe Waldmann, "Set constraints are the monadic class" André Joyal, Mogens Nielson, Glynn Winskel, "Bisimulation and open maps" Benjamin C. Pierce, Davide Sangiorgi, "Typing and subtyping for mobile processes" 2014 Martin Hofmann, Thomas Streicher, "The groupoid model refutes uniqueness of identity proofs" Dale A. Miller, "A multiple-conclusion meta-logic" 2015
wikipedia
wiki_36747_chunk_16
Associació d'Usuaris de Java de Catalunya
The second "Jornades Java Catalanes" was celebrated at the "Sala de Congressos del Parc d'Innovació La Salle", located at the university campus of the given university, in 14th and 15 April in 2005. The sponsors of this event were: Bea Systems Borland Caixa Penedès Data.ti Oracle Corporation Steria Sun MicroSystems The participant companies were:: Ilog MSS Quest Software They receive support from: CBA Computers, S.L. Filnet You can see several press notes on a different sources: - Press note at COEIC:
wikipedia
wiki_28494_chunk_5
Sawtooth Software
In addition to producing products, Sawtooth Software has also hosted a research conference every 18 months in the United States since 1987. The conference is not a sales event, and speakers with contrary opinions or competing products attend and present. References External links Sawtooth Software Homepage Companies based in Utah 1983 establishments in Idaho Market research organizations Market research companies of the United States Software companies based in Utah Statistical survey software Software companies of the United States Decision-making software
wikipedia
wiki_19298_chunk_7
1950–51 United States network television schedule
CBSReturning SeriesThe Alan Young Show Arthur Godfrey and His Friends Arthur Godfrey's Talent Scouts Beat the Clock Big Top CBS Television News Celebrity Time The Faye Emerson Show Ford Theater The Fred Waring Show The Garry Moore Show The Gene Autry Show The Goldbergs Joey Faye's Frolics The Ken Murray Show Mama Man Against Crime Our Miss Brooks Pabst Blue Ribbon Bouts The Show Goes On Starlight Theatre The Stork Club Suspense This Is Show Business Toast of the Town We Take Tour Word The Web The Week in Review What's My Line?New SeriesThe Ad-Libbers *Big TownThe Bigelow Theatre *Casey, Crime PhotographerCharlie Wild, Private Detective *DangerFaye Emerson's Wonderful Town *The Frank Sinatra ShowThe George Burns and Gracie Allen ShowThe Horace Heidt ShowThe Jack Benny ProgramThe Lux Video TheatreMagnavox TheatreThe Nash Airflyte TheaterThe Perry Como ShowPrudential Family PlayhouseRacket Squad *Star of the FamilySure as FateTruth or ConsequencesThe Vaughn Monroe ShowWho's Whose *Not returning from 1949–50:54th Street Revue Abe Burrows' Almanac The Bigelow Show The Black Robe Blues by Bargy Capitol Cloak Room Detective's Wife Earl Wrightson at Home The Ed Wynn Show Escape The Front Page Inside U.S.A. with Chevrolet Lucky Pup The Paul Arnold Show People's Platform Premiere Playhouse The Roar of the Rails Romance Ruthie on the Telephone The Silver Theatre The Sonny Kendis Show Stage 13 The Stage Door Starlight Theatre The Ted Steele Show Television Theatre To the Queen's Taste Tonight on Broadway The Trap Uptown Jubilee The Week in Sports Your Sports Special
wikipedia
wiki_21457_chunk_2
Atmospheric chemistry observational databases
Airborne observations Aircraft observations. Many aircraft campaigns have been conducted as part of the Suborbital Science Program and by the Earth Science Project Office an overview of these campaigns is available. The data can be accessed from the Earth Science Project Office archives. MOZAIC observations. The MOZAIC program (Measurement of OZone and water vapour by AIrbus in-service airCraft) was initiated in 1993 by European scientists, aircraft manufacturers and airlines to collect experimental data. Its goal is to help understand the atmosphere and how it is changing under the influence of human activity, with particular interest in the effects of aircraft. MOZAIC consists of automatic and regular measurements of ozone and water vapour by five long range passenger airliners flying all over the world. The aim is to build a large database of measurements to allow studies of chemical and physical processes in the atmosphere, and hence to validate global chemistry transport models. MOZAIC data provide, in particular, detailed ozone and water vapour climatologies at 9–12 km where subsonic aircraft emit most of their exhaust and which is a very critical domain (e.g. radiatively and S/T exchanges) still imperfectly described in existing models. This will be valuable to improve knowledge about the processes occurring in the upper troposphere/ lower stratosphere (UT/LS), and the model treatment of near tropopause chemistry and transport. The MOZAIC data is restricted access, to obtain access the forms need to be filled out. CARIBIC observations. The CARIBIC (Civil Aircraft for the Regular Investigation of the atmosphere Based on an Instrument Container) project is an innovative scientific project to study and monitor important chemical and physical processes in the Earth's atmosphere. Detailed and extensive measurements are made during long distance flights on board the Airbus A340-600 "Leverkusen" (http://www.flightradar24.com/data/airplanes/D-AIHE/). We deploy an airfreight container with automated scientific apparatuses, which are connected to an air and particle (aerosol) inlet underneath the aircraft. In contrast to MOZAIC, CARIBIC is only installed on one aircraft, but it measures a much wider spectrum of atmospheric constituents (CARIBIC -> instrumentation). Both, CARIBIC and MOZAIC are integrated in IAGOS. Data exist from 1998-2002 and from 2004-today. It can be requested via CARIBIC -> data access.
wikipedia
wiki_37418_chunk_3
Project Mathematics!
Video module descriptions A total of nine educational video modules were created between 1988 and 2000. Another two modules, Teachers Workshop and Project MATHEMATICS! Contest, were created in 1991 for teachers and are only available on videotape. The content of the nine educational modules follows below. The Theorem of Pythagoras
wikipedia
wiki_33625_chunk_11
Environmental engineering science
"MIT Course Catalog: Department of Civil and Environmental Engineering." Massachusetts Institute of Technology. <http://web.mit.edu/catalogue/degre.engin.civil.shtml>. 2008-2009 Announcement. Brochure. Berkeley, 2008. Engineering Announcement 2008-2009. University of California, Berkeley. <https://web.archive.org/web/20081203005457/http://coe.berkeley.edu/students/EngAnn08.pdf>.
wikipedia
wiki_28251_chunk_48
Functional hypothalamic amenorrhea
Psychological assessment Patients with FHA should be screened for the presence of modifiable Axis I (mood) disorders or modified Axis II (personality) disorders and referred to appropriate psychiatric care where they can receive psychological support, such as CBT. This is especially true when psychological disorders (e.g. anorexia nervosa) co-present with amenorrhea through associated behaviors like hyperexercise and restrictive eating; in many of these cases, recovery may require CBT to modify the attitudes of patients who display abnormal behaviors related to diet, body image, exercise, and/or stress management. CBT may become a necessary consideration for this group of patients when general education about the health risks associated with long-term FHA do not motivate a change in behavior. Behavioral modifications which lead to a reversal of amenorrhea can simultaneously reduce cortisol levels and restore of ovarian function. It is also postulated that metabolic and neuroendocrine aberrations can be corrected with behavioral modifications. Studies have shown that in comparison to control groups, FHA patients who receive CBT had a heightened ability to restore ovulatory status and improve levels of leptin, TSH, and cortisol. Thus, stress reduction through CBT may correct the metabolic and neuroendocrine defects of energy deficiency independent of direct weight gain.
wikipedia
wiki_4915_chunk_15
Data modeling
These models are being used in the first stage of information system design during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms and their relationships) for a certain universe of discourse i.e. area of interest. Several techniques have been developed for the design of data models. While these methodologies guide data modelers in their work, two different people using the same methodology will often come up with very different results. Most notable are:
wikipedia
wiki_1921_chunk_18
Permanent (mathematics)
MacMahon's Master Theorem Another way to view permanents is via multivariate generating functions. Let be a square matrix of order n. Consider the multivariate generating function: The coefficient of in is perm(A). As a generalization, for any sequence of n non-negative integers, define: as the coefficient of inMacMahon's Master Theorem''' relating permanents and determinants is: where I is the order n identity matrix and X is the diagonal matrix with diagonal
wikipedia
wiki_1763_chunk_29
Computer-assisted language learning
The emergence of the World Wide Web (now known simply as "the Web") in the early 1990s marked a significant change in the use of communications technology for all computer users. Email and other forms of electronic communication had been in existence for many years, but the launch of Mosaic, the first graphical Web browser, in 1993 brought about a radical change in the ways in which we communicate electronically. The launch of the Web in the public arena immediately began to attract the attention of language teachers. Many language teachers were already familiar with the concept of hypertext on stand-alone computers, which made it possible to set up non-sequential structured reading activities for language learners in which they could point to items of text or images on a page displayed on the computer screen and branch to any other pages, e.g. in a so-called "stack" as implemented in the HyperCard program on Apple Mac computers. The Web took this one stage further by creating a worldwide hypertext system that enabled the user to branch to different pages on computers anywhere in the world simply by pointing and clicking at a piece of text or an image. This opened up access to thousands of authentic foreign-language websites to teachers and students that could be used in a variety of ways. A problem that arose, however, was that this could lead to a good deal of time-wasting if Web browsing was used in an unstructured way (Davies 1997: pp. 42–43), and language teachers responded by developing more structured activities and online exercises (Leloup & Ponterio 2003). Davies (2010) lists over 500 websites, where links to online exercises can be found, along with links to online dictionaries and encyclopaedias, concordancers, translation aids and other miscellaneous resources of interest to the language teacher and learner.
wikipedia
wiki_2158_chunk_23
Lock (computer science)
Programming languages vary in their support for synchronization: Ada provides protected objects that have visible protected subprograms or entries as well as rendezvous. The ISO/IEC C standard provides a standard mutual exclusion (locks) API since C11. The current ISO/IEC C++ standard supports threading facilities since C++11. The OpenMP standard is supported by some compilers, and allows critical sections to be specified using pragmas. The POSIX pthread API provides lock support. Visual C++ provides the synchronize attribute of methods to be synchronized, but this is specific to COM objects in the Windows architecture and Visual C++ compiler. C and C++ can easily access any native operating system locking features. C# provides the lock keyword on a thread to ensure its exclusive access to a resource. VB.NET provides a SyncLock keyword like C#'s lock keyword. Java provides the keyword synchronized to lock code blocks, methods or objects and libraries featuring concurrency-safe data structures. Objective-C provides the keyword @synchronized to put locks on blocks of code and also provides the classes NSLock, NSRecursiveLock, and NSConditionLock along with the NSLocking protocol for locking as well. PHP provides a file-based locking as well as a Mutex class in the pthreads extension. Python provides a low-level mutex mechanism with a Lock class from the threading module. The ISO/IEC Fortran standard (ISO/IEC 1539-1:2010) provides the lock_type derived type in the intrinsic module iso_fortran_env and the lock/unlock statements since Fortran 2008. Ruby provides a low-level mutex object and no keyword. Rust provides the Mutex<T> struct. x86 assembly provides the LOCK prefix on certain operations to guarantee their atomicity. Haskell implements locking via a mutable data structure called an MVar, which can either be empty or contain a value, typically a reference to a resource. A thread that wants to use the resource ‘takes’ the value of the MVar, leaving it empty, and puts it back when it is finished. Attempting to take a resource from an empty MVar results in the thread blocking until the resource is available. As an alternative to locking, an implementation of software transactional memory also exists. Go provides a low-level Mutex object in standard's library sync package. It can be use for locking code blocks, methods or objects.
wikipedia
wiki_83_chunk_17
Computational linguistics
Theoretical approaches to the structure of languages have also been developed. These works allow computational linguistics to have a framework within which to work out hypotheses that will further the understanding of the language in a myriad of ways. One of the original theoretical theses on the internalization of grammar and structure of language proposed two types of models. In these models, rules or patterns learned increase in strength with the frequency of their encounter. The work also created a question for computational linguists to answer: how does an infant learn a specific and non-normal grammar (Chomsky normal form) without learning an overgeneralized version and getting stuck? Theoretical efforts like these set the direction for research to go early in the lifetime of a field of study, and are crucial to the growth of the field.
wikipedia
wiki_3964_chunk_8
Facilities engineering
Day to Day Operations Operations Engineer Ensure a company’s operations are working properly Inspect operations, equipment and machinery Plan for maintenance and upgrade machinery Reduce or protect the company’s product from defects   Specialist Engineer Running diagnostics and test on specific machinery Determining the problems of the machinery by examining test Analyze the cost to repair or maintenance required to specific machinery Work on the specific machinery to fix or maintenance require   Maintenance Engineer Installation and maintenance of industrial equipment routine inspections and preventive maintenance of equipment troubleshooting issues on industrial equipment make on site repairs Consulting Engineer Understand and analyze an engineering system of different clients Find improvements or solutions in the engineering systems   Calculate numbers to show clients savings, advantages and cost Plan the operations need to complete the project Sell the project to the client   Analyzing, designing, and developing basic systems and plants knowledge to be able to improve quality and production Lead/analyze projects and technical responsibilities that a typical facility would have to go through on a day-to-day basis Be able to be a leader and function well in professional teams and overlooking staff/workers in a project Being able to Communicate effectively with different methods such as speaking and writing, and be able to argue efficiently and compellingly when having the positions of a foreman, manager or a supervisor Knowing professional and ethical morals when pushing forward the safety and regulation of a system operating efficiently and having the maintenance skills to be able to solve any problems presented
wikipedia
wiki_599_chunk_18
International Obfuscated C Code Contest
/* + + + + [ >i>n[t */ #include<stdio.h> /*2w0,1m2,]_<n+a m+o>r>i>=>(['0n1'0)1; */int/**/main(int/**/n,char**m){FILE*p,*q;int A,k,a,r,i/* #uinndcelfu_dset<rsitcdti_oa.nhs>i/_*/;char*d="P%" "d\n%d\40%d"/**/ "\n%d\n\00wb+",b[1024],y[]="yuriyurarararayuruyuri*daijiken**akkari~n**" "/y*u*k/riin<ty(uyr)g,aur,arr[a1r2a82*y2*/u*r{uyu}riOcyurhiyua**rrar+*arayra*=" "yuruyurwiyuriyurara'rariayuruyuriyuriyu>rarararayuruy9uriyu3riyurar_aBrMaPrOaWy^?" "*]/f]`;hvroai<dp/f*i*s/<ii(f)a{tpguat<cahfaurh(+uf)a;f}vivn+tf/g*`*w/jmaa+i`ni("/** */"i+k[>+b+i>++b++>l[rb";int/**/u;for(i=0;i<101;i++)y[i*2]^="~hktrvg~dmG*eoa+%squ#l2" ":(wn\"1l))v?wM353{/Y;lgcGp`vedllwudvOK`cct~[|ju {stkjalor(stwvne\"gt\"yogYURUYURI"[ i]^y[i*2+1]^4;/*!*/p=(n>1&&(m[1][0]-'-'||m[1][1] !='\0'))?fopen(m[1],y+298):stdin; /*y/riynrt~(^w^)],]c+h+a+r+*+*[n>)+{>f+o<r<(-m] =<2<5<64;}-]-(m+;yry[rm*])/[* */q=(n<3||!(m[2][0]-'-'||m[2][1]))?stdout /*]{ }[*/:fopen(m[2],d+14);if(!p||/* "]<<*-]>y++>u>>+r >+u+++y>--u---r>++i+++" <)< ;[>-m-.>a-.-i.++n.>[(w)*/!q/**/) return+printf("Can " "not\x20open\40%s\40" "" "for\40%sing\n",m[!p?1:2],!p?/* o=82]5<<+(+3+1+&.(+ m +-+1.)<)<|<|.6>4>-+(> m- &-1.9-2-)-|-|.28>-w-?-m.:>([28+ */"read":"writ");for ( a=k=u= 0;y[u]; u=2 +u){y[k++ ]=y[u];}if((a=fread(b,1,1024/* ,mY/R*Y"R*/,p/*U*/)/* R*/ )>/*U{ */ 2&& b/*Y*/[0]/*U*/=='P' &&4==/*"y*r/y)r\} */sscanf(b,d,&k,& A,& i, &r)&& ! (k-6&&k -5)&&r==255){u=A;if(n>3){/* ]&<1<6<?<m.-+1>3> +:+ .1>3+++ . -m-) -;.u+=++.1<0< <; f<o<r<(.;<([m(=)/8*/ u++;i++;}fprintf (q, d,k, u >>1,i>>1,r);u = k-5?8:4;k=3;}else /*]>*/{(u)=/*{ p> >u >t>-]s >++(.yryr*/+( n+14>17)?8/4:8*5/ 4;}for(r=i=0 ; ;){u*=6;u+= (n>3?1:0);if (y[u]&01)fputc(/* <g-e<t.c>h.a r -(-).)8+<1. >;+i.(<)< <)+{+i.f>([180*/1* (r),q);if(y[u ]&16)k=A;if (y[u]&2)k--;if(i/* ("^w^NAMORI; { I*/==a/*" )*/){/**/i=a=(u)*11 &255;if(1&&0>= (a= fread(b,1,1024,p))&& ")]i>(w)-;} { /i-f-(-m--M1-0.)<{" [ 8]==59/* */ )break;i=0;}r=b[i++] ;u+=(/**>> *..</<<<)<[[;]**/+8&* (y+u))?(10- r?4:2):(y[u] &4)?(k?2:4):2;u=y[u/* 49;7i\(w)/;} y}ru\=*ri[ ,mc]o;n}trientuu ren ( */]-(int)'`';} fclose( p);k= +fclose( q); /*] <*.na/m*o{ri{ d;^w^;} }^_^}} " */ return k- -1+ /*\' '-`*/ ( -/*}/ */0x01 ); {;{ }} ; /*^w^*/ ;}
wikipedia
wiki_19545_chunk_10
Circuit complexity
The k-clique problem is to decide whether a given graph on n vertices has a clique of size k. For any particular choice of the constants n and k, the graph can be encoded in binary using bits, which indicate for each possible edge whether it is present. Then the k-clique problem is formalized as a function such that outputs 1 if and only if the graph encoded by the string contains a clique of size k. This family of functions is monotone and can be computed by a family of circuits, but it has been shown that it cannot be computed by a polynomial-size family of monotone circuits (that is, circuits with AND and OR gates but without negation). The original result of Razborov in 1985 was later improved to an exponential-size lower bound by Alon and Boppana in 1987. In 2008, Rossman showed that constant-depth circuits with AND, OR, and NOT gates require size to solve the k-clique problem even in the average case. Moreover, there is a circuit of size that computes .
wikipedia
wiki_5957_chunk_28
Robert Taylor (computer scientist)
The New Old Boys From the ARPAnet Extract from 'Tools for Thought' by Howard Rheingold 1984 ACM Software Systems Award citation 1994 ACM Fellow citation 2004 Draper Prize citation 1932 births 2017 deaths American computer scientists Digital Equipment Corporation people Xerox people Internet pioneers Scientists at PARC (company) National Medal of Technology recipients Fellows of the Association for Computing Machinery Draper Prize winners University of Texas at Austin alumni United States Navy personnel of the Korean War People from Dallas People from Woodside, California Neurological disease deaths in California Deaths from Parkinson's disease
wikipedia
wiki_19867_chunk_3
K correction
The exact nature of the calculation that needs to be applied in order to perform a K correction depends upon the type of filter used to make the observation and the shape of the object's spectrum. If multi-color photometric measurements are available for a given object thus defining its spectral energy distribution (SED), K corrections then can be computed by fitting it against a theoretical or empirical SED template. It has been shown that K corrections in many frequently used broad-band filters for low-redshift galaxies can be precisely approximated using two-dimensional polynomials as functions of a redshift and one observed color. This approach is implemented in the K corrections calculator web-service.
wikipedia
wiki_3190_chunk_23
Computer-aided dispatch
Another problem comes from technologies using differing datums or coordinate systems. For example, suppose your AVL system uses degrees-decimal degrees format. The AVL display for a vehicle at the Heart Butte Post Office in Montana shows a latitude and longitude of 48.28333 N, -112.83583 W. The CAD system uses degrees-minutes-seconds format data and shows the same location as 481700N, 1125009W. How do you translate? This is sometimes a problem with neighboring CAD systems. Ideally, you should be able to send and receive calls to and from CAD systems in neighboring areas. What if the state or provincial government has standardized on a different coordinate system?
wikipedia
wiki_4084_chunk_2
FSF Free Software Awards
This is annually presented by the Free Software Foundation (FSF) to a person whom it deems to have made a great contribution to the progress and development of free software, through activities that accord with the spirit of free software. Winners Source: Award for the Advancement of Free Software 1998 Larry Wall for numerous contributions to Free Software, notably Perl. The other finalists were the Apache Project, Tim Berners-Lee, Jordan Hubbard, Ted Lemon, Eric S. Raymond, and Henry Spencer.
wikipedia
wiki_4466_chunk_28
E8 (mathematics)
The 248-dimensional adjoint representation of E8 may be considered in terms of its restricted representation to the first of these subgroups. It transforms under E7×SU(2) as a sum of tensor product representations, which may be labelled as a pair of dimensions as (3,1) + (1,133) + (2,56) (since there is a quotient in the product, these notations may strictly be taken as indicating the infinitesimal (Lie algebra) representations). Since the adjoint representation can be described by the roots together with the generators in the Cartan subalgebra, we may see that decomposition by looking at these. In this description, (3,1) consists of the roots (0,0,0,0,0,0,1,−1), (0,0,0,0,0,0,−1,1) and the Cartan generator corresponding to the last dimension; (1,133) consists of all roots with (1,1), (−1,−1), (0,0), (−,−) or (,) in the last two dimensions, together with the Cartan generators corresponding to the first seven dimensions; (2,56) consists of all roots with permutations of (1,0), (−1,0) or (,−) in the last two dimensions.
wikipedia
wiki_3498_chunk_19
Spline (mathematics)
Representations and Names For a given interval [a,b] and a given extended knot vector on that interval, the splines of degree n form a vector space. Briefly this means that adding any two splines of a given type produces spline of that given type, and multiplying a spline of a given type by any constant produces a spline of that given type. The dimension of the space containing all splines of a certain type can be counted from the extended knot vector: The dimension is equal to the sum of the degree plus the multiplicities
wikipedia
wiki_6802_chunk_8
Codex Mendoza
Content Written on European paper, it contains 71 pages, divided into three sections: Section I, folios 1r to 17r or 18r, is a history of the Aztec people from 1325 through 1521 — from the founding of Tenochtitlan through the Spanish conquest. It lists the reign of each ruler and the towns conquered by them. It is uncertain whether folios 17v and 18r belong to Section I or Section II. Section II, folios 17v or 18v to 54v, provides a list of the towns conquered by the Triple Alliance and the tributes paid by each. This section is closely related to, and probably copied from, the Matrícula de Tributos, but the Codex Mendoza contains five provinces not included in the Matrícula. This probably represents material now missing from the Matrícula but present when the Codex Mendoza was copied. Section III, folios 56v to 71v, is a pictorial depiction of the daily life of the Aztecs.
wikipedia
wiki_5352_chunk_3
Rainflow-counting algorithm
Igor Rychlik gave a mathematical definition for the rainflow counting method, thus enabling closed-form computations from the statistical properties of the load signal. Algorithms There are a number of different algorithms for identifying the rainflow cycles within a sequence. They all find the closed cycles and may be left with half closed residual cycles at the end. All methods start with the process of eliminating non turning points from the sequence. A completely closed set of rainflow cycles can be obtained for a repeated load sequence such as used in fatigue testing by starting at the largest peak and continue to the end and wrapping around to the beginning. Four point method
wikipedia
wiki_4663_chunk_29
Boyer–Moore string-search algorithm
def good_suffix_table(S: str) -> List[int]: """ Generates L for S, an array used in the implementation of the strong good suffix rule. L[i] = k, the largest position in S such that S[i:] (the suffix of S starting at i) matches a suffix of S[:k] (a substring in S ending at k). Used in Boyer-Moore, L gives an amount to shift P relative to T such that no instances of P in T are skipped and a suffix of P[:L[i]] matches the substring of T matched by a suffix of P in the previous match attempt. Specifically, if the mismatch took place at position i-1 in P, the shift magnitude is given by the equation len(P) - L[i]. In the case that L[i] = -1, the full shift table is used. Since only proper suffixes matter, L[0] = -1. """ L = [-1 for c in S] N = fundamental_preprocess(S[::-1]) # S[::-1] reverses S N.reverse() for j in range(0, len(S) - 1): i = len(S) - N[j] if i != len(S): L[i] = j return L
wikipedia
wiki_30757_chunk_14
Comparison of programming languages (list comprehension)
Mythryl s = [ 2*i for i in 1..100 where i*i > 3 ]; Multiple generators: pyth = [ (x,y,z) for x in 1..20 for y in x..20 for z in y..20 where x*x + y*y == z*z ]; Nemerle $[x*2 | x in [0 .. 100], x*x > 3] Nim Nim has built-in seq, set, table and object comprehensions on the sugar standard library module: import sugar
wikipedia
wiki_16584_chunk_29
National Academy of Engineering
Grand Challenge Scholars Program (GCSP) In 2010, NAE developed a plan for preparing engineering students at the undergraduate academic degree level to practice in career fields that emerged as a result of the effort to answer the Grand Challenges. The program had five components, namely: Research experience based upon a project or independent research related to a NAE Grand Challenges. Interdisciplinary curriculum materials inclusive of "..public policy, business, law, ethics, human behavior, risk as well as medicine and the sciences." Entrepreneurship inclusive of skills to translate "...invention to innovation... (and)... develop market ventures that scale to global solutions in the public interest." Global dimension and perspective necessary to "..address challenges that are inherently global as well as to lead innovation in a global economy." Service learning that develops and engages the engineer's social consciousness and its willingness to bring to bear the profession's technical expertise on societal problems through programs such as Engineers Without Borders, or Engineering World Health.
wikipedia
wiki_32301_chunk_8
Derek Jones (civil servant, born 1927)
Summary of the McKinsey Report, McKinsey & Company, Inc., November 1972. Edited by Kevin Sinclair, Who's who in Hong Kong, Hong Kong: Asianet Information Services Ltd., 1982. "Triumph, Failure or Pyrrhic Victory — the Tokyo Round in Perspective", World Economy Volume 10 Issue 3, September 1987. Who's Who, A & C Black, 2008. "Jones, Derek John Claremont C.M.G.", Telegraph Announcements, UK: Telegraph, 9 October 2008. London Gazette: (Supplement) no. 47723, page 3,.
wikipedia