id
stringlengths 14
20
| title
stringlengths 4
131
| text
stringlengths 52
43k
| source
stringclasses 1
value |
|---|---|---|---|
wiki_3427_chunk_8
|
Reflection high-energy electron diffraction
|
Here, khl is the wave vector of the elastically diffracted electrons of the order (hl) at any intersection of reciprocal lattice rods with Ewald's sphere The projections of the two vectors onto the plane of the sample's surface differ by a reciprocal lattice vector Ghl, (3) Figure 3 shows the construction of the Ewald's sphere and provides examples of the G, khl and ki vectors.
|
wikipedia
|
wiki_1107_chunk_37
|
Compiler-compiler
|
The characteristics of the metaprogramming metalanguages above are common to all Schorre metacompilers and those derived from them. META I
META I was a hand compiled metacompiler used to compile META II. Little else is known of META I except that the initial compilation of META II produced nearly identical code to that of the hand coded META I compiler. META II
|
wikipedia
|
wiki_656_chunk_15
|
Activation energy
|
In the following graphic there is a representation of a reaction between hydrogen in the gas phase and a metal: tungsten. The potential energy is obtained with PES calculations and consistent with the position of H from the NEB method calculations. A 2-dimensional interpolation with the spline method can be used to evaluate the potential energy at these positions. Products and reactants can be found in the blue surface, however the red surface corresponds to the steady-state approximation.
|
wikipedia
|
wiki_21781_chunk_45
|
History of algebra
|
R. Rashed and Angela Armstrong write: Al-Jabr is divided into six chapters, each of which deals with a different type of formula. The first chapter of Al-Jabr deals with equations whose squares equal its roots the second chapter deals with squares equal to number the third chapter deals with roots equal to a number the fourth chapter deals with squares and roots equal a number the fifth chapter deals with squares and number equal roots and the sixth and final chapter deals with roots and number equal to squares
|
wikipedia
|
wiki_6573_chunk_13
|
Evolutionary medicine
|
Medicine, in turn, ignored evolution, and instead focused (as done in the hard sciences) upon proximate mechanical causes.
medicine has modelled itself after a mechanical physics, deriving from Galileo, Newton, and Descartes.... As a result of assuming this model, medicine is mechanistic, materialistic, reductionistic, linear-causal, and deterministic (capable of precise predictions) in its concepts. It seeks explanations for diseases, or their symptoms, signs, and cause in single, materialistic— i.e., anatomical or structural (e.g., in genes and their products)— changes within the body, wrought directly (linearly), for example, by infectious, toxic, or traumatic agents. p. 510
George C. Williams was the first to apply evolutionary theory to health in the context of senescence. Also in the 1950s, John Bowlby approached the problem of disturbed child development from an evolutionary perspective upon attachment.
|
wikipedia
|
wiki_18985_chunk_21
|
Reader's Digest Select Editions
|
2008Volume 295 - #1 The Overlook - Michael Connelly
Meet Me in Venice - Elizabeth Adler
Step on a Crack - James Patterson & Michael Ledwidge
An Irish Country Doctor - Patrick TaylorVolume 296 - #2 Bad Blood - Linda Fairstein
The Long Walk Home - Will North
The Blue Zone - Andrew Gross
Iris & Ruby - Rosie Thomas
"James Penney's New Identity" (short story) - Lee ChildVolume 297 - #3 The Ghost - Robert Harris
The Choice - Nicholas Sparks
The Watchman - Robert Crais
Her Royal Spyness - Rhys BowenVolume 298 - #4 Blue Heaven - C. J. Box
The First Patient - Michael Palmer
The Sugar Queen - Sarah Addison Allen
Dead Heat - Dick Francis & Felix FrancisVolume 299 - #5 Sundays at Tiffany's - James Patterson & Gabrielle Charbonnet
Lady Killer - Lisa Scottoline
The Christmas Promise - Donna VanLiere
Final Theory - Mark AlpertVolume 300 - #6 Where Are You Now? - Mary Higgins Clark
A Single Thread - Marie Bostwick
An Irish Country Village - Patrick Taylor
Italian Lessons - Peter Pezzelli
|
wikipedia
|
wiki_9819_chunk_4
|
Custom hardware attack
|
An alternative approach is to use FPGAs (field-programmable gate arrays); these are slower and more expensive per gate, but can be reprogrammed for different problems. COPACOBANA (Cost-Optimized Parallel COde Breaker) is one such machine, consisting of 120 FPGAs of type Xilinx Spartan3-1000 which run in parallel. History
|
wikipedia
|
wiki_30185_chunk_24
|
Crystallographic database
|
Projected lattice geometries can be represented by so-called ‘lattice-fringe fingerprint plots’ (LFFPs), also called angular covariance plots. The horizontal axis of such a plot is given in reciprocal lattice length and is limited by the point resolution of the microscope. The vertical axis is defined as acute angle between Fourier transformed lattice fringes or electron diffraction spots. A 2D data point is defined by the length of a reciprocal lattice vector and its (acute) angle with another reciprocal lattice vector. Sets of 2D data points that obey Weiss’s zone law are subsets of the entirety of data points in an LFFP. A suitable search-match algorithm using LFFPs, therefore, tries to find matching zone axis subsets in the database. It is, essentially, a variant of a lattice matching algorithm.
|
wikipedia
|
wiki_789_chunk_32
|
Simulation
|
Simulation is being used to study patient safety, as well as train medical professionals. Studying patient safety and safety interventions in healthcare is challenging, because there is a lack of experimental control (i.e., patient complexity, system/process variances) to see if an intervention made a meaningful difference (Groves & Manges, 2017). An example of innovative simulation to study patient safety is from nursing research. Groves et al. (2016) used a high-fidelity simulation to examine nursing safety-oriented behaviors during times such as change-of-shift report.
|
wikipedia
|
wiki_13672_chunk_4
|
Computational electromagnetics
|
Overview of methods
One approach is to discretize the space in terms of grids (both orthogonal, and non-orthogonal) and solving Maxwell's equations at each point in the grid. Discretization consumes computer memory, and solving the equations takes significant time. Large-scale CEM problems face memory and CPU limitations. As of 2007, CEM problems require supercomputers, high performance clusters, vector processors and/or parallelism. Typical formulations involve either time-stepping through the equations over the whole domain for each time instant; or through banded matrix inversion to calculate the weights of basis functions, when modeled by finite element methods; or matrix products when using transfer matrix methods; or calculating integrals when using method of moments (MoM); or using fast Fourier transforms, and time iterations when calculating by the split-step method or by BPM.
|
wikipedia
|
wiki_15699_chunk_4
|
List of Ace miscellaneous letter-series single titles
|
F-118 NA Jacob O. Kamm Making Profits in the Stock Market (1961)
F-132 NA Mario Cappelli Scramble! (1962)
F-137 NA R. Dewitt Miller Impossible: Yet It Happened! (1962)
F-140 NA Leonie St. John Love With A Harvard Accent (1962)
F-146 NA John Jakes (as Jay Scotland) Sir Scoundrel (1962)
F-151 NA Nedra Tyre Reformatory Girls (1962)
F-163 NA Adele De Leeuw Doctor Ellen (1962)
F-175 NA Evelyn Berckman Lament For Four Brides (1962)
F-198 NA Simenon The Short Cases Of Inspector Maigret
F-202 NA Evelyn Berckman The Hovering Darkness (1963)
F-218 NA Allen Churchill They Never Came Back (1960)
F-219 NA Henry Makow Ask Henry (1963)
F-278 NA Frances Spatz Leighton Patty Goes To Washington (1964)
F-288 NA Hal Sherman Fishing For Laughs
F-331 NA Gahan Wilson Graveside Manner (1965)
F-339 NA Arlene Hale Private Duty for Nurse Scott (1965)
F-341 NA Suzanne Roberts A Prize For Nurse Darci (1965)
F-349 NA Suzanne Roberts Celebrity Suite Nurse (1965)
F-352 NA Arlene Hale Nurse On Leave (1965)
F-359 NA Sharon Heath Jungle Nurse (1965)
F-362 NA Suzanne Roberts The Two Dr. Barlowes (1965)
F-368 NA Arlene Hale Chicago Nurse (1965)
F-369 NA Samuel A. Peeples (as Samuel Anthony Peeples) The Lobo Horseman (1965)
F-371 NA Arlene Hale Camp Nurse (1965)
F-378 NA Mary Mann Fletcher Danger - Nurse At Work (1966)
F-381 NA Sharon Heath Nurse At Shadow Manor (1966)
F-384 NA L. P. Holmes The Savage Hours (1966)
F-385 NA Arlene Hale Emergency For Nurse Selena (1966)
F-387 NA Arlene Hale Mountain Nurse (1966)
F-394 NA Gail Everett Journey For A Nurse (1966)
F-397 NA Willo Davis Roberts Nurse Kay's Conquest (1966)
F-405 NA Suzanne Roberts Vietnam Nurse (1966)
F-410 NA Arlene Hale Lake Resort Nurse (1966)
F-413 NA Sharon Heath A Vacation For Nurse Dean (1966)
F-417 NA Willo Davis Roberts Once A Nurse (1966)
F-419 NA Suzanne Roberts Rangeland Nurse (1967)
F-424 NA Arlene Hale Community Nurse (1967)
F-430 NA Arlene Hale Nurse On The Beach (1967)
|
wikipedia
|
wiki_39990_chunk_14
|
N50, L50, and related statistics
|
Values of the list L = (2, 2, 2, 3, 3, 4, 8, 8) Values of the new list L' = (2 2 2 2 2 2 3 3 3 3 3 3 4 4 4 4 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8) Ranks of L' values = 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 References Arachne wiki at Broad Institute
L50-vs-N50 blog post (07-Oct-2015)
|
wikipedia
|
wiki_1594_chunk_43
|
Engineering drawing
|
With the advent of computer generated drawings for manufacturing and machining, many symbols have fallen out of common use. This poses a problem when attempting to interpret an older hand-drawn document that contains obscure elements that cannot be readily referenced in standard teaching text or control documents such as ASME and ANSI standards. For example, ASME Y14.5M 1994 excludes a few elements that convey critical information as contained in older US Navy drawings and aircraft manufacturing drawings of World War 2 vintage. Researching the intent and meaning of some symbols can prove difficult. Example
|
wikipedia
|
wiki_26225_chunk_1
|
Networks and Spatial Economics
|
Abstracting and indexing
NETS is abstracted/indexed in ABI inform, CompuMath Citation Index, Current Contents/Engineering, Computing and Technology, Current Index to Statistics, EBSCO, ECONIS, Research Papers in Economics (RePEc), ISI Science Citation Index Expanded, SCOPUS, Zentralblatt Math. According to the Journal Citation Reports, the journal has a 2019 impact factor of 2.379, ranking it 31st out of 83 journals in the category "Operations Research & Management Science" and 19th out of 36 journals in the category "Transportation Science & Technology". The journal was indexed by ISI after only three years because of its consistent on-time publication record and because it has had since inception an editorial board that is unusually distinguished for a new journal. The editorial board consists of engineers, economists, geographers, applied mathematicians, computer scientists, game theorists, and physicists.
|
wikipedia
|
wiki_15588_chunk_35
|
N-body simulation
|
for (size_t entity_idx = 0; entity_idx < 9 + N_ASTEROIDS; entity_idx++)
{
orbital_entities[entity_idx].e[0] += orbital_entities[entity_idx].e[3] * dt;
orbital_entities[entity_idx].e[1] += orbital_entities[entity_idx].e[4] * dt;
orbital_entities[entity_idx].e[2] += orbital_entities[entity_idx].e[5] * dt;
}
t += dt;
}Focusing on the inner four rocky planets in the simulation, the trajectories resulting from the above propagation is shown below:
|
wikipedia
|
wiki_14419_chunk_26
|
List of African-American mathematicians
|
2000s
Carla Cotwright-Williams (born 1973), degrees from California State University, Long Beach, Southern University, and University of Mississippi (PhD, mathematics).
Christina Eubanks-Turner, degrees from Xavier University of Louisiana and University of Nebraska-Lincoln (PhD, mathematics).
Omayra Ortega, degrees from Pomona College and University of Iowa (PhD, mathematics).
Candice Price, degrees from California State University, Chico, San Francisco State University, and University of Iowa (PhD, mathematics).
Dionne Price, degrees from Norfolk State University, University of North Carolina, and Emory University (PhD, biostatistics).
Chelsea Walton (born 1983), degrees from Michigan State University and the University of Michigan (PhD, mathematics).
|
wikipedia
|
wiki_9378_chunk_6
|
Structural equation modeling
|
In SEM diagrams, latent variables are commonly shown as ovals and observed variables as rectangles. The diagram above shows how error (e) influences each intelligence question and the SAT, ACT, and GPA scores, but does not influence the latent variables. When applying this model to observed data generated from the instruments, the researcher can recover a measure of intelligence and academic performance for each individual observed with the instruments with a margin of error that is implied by the instruments. The researcher can then use intelligence to test a hypothesis, for example that intelligence causes academic performance (which is another latent variable in Figure 1) defined by a path model drawing an arrow from intelligence to performance. Figure 1 is therefore a general example of a SEM involving measurement of latent variables and estimation of a hypothesized effect between at least one latent variable and another observed or latent variable (in this case latent academic performance).
|
wikipedia
|
wiki_27806_chunk_1
|
Pleasant Prairie Power Plant
|
Background
The 30-year-old power plant has developed and applied a retrofit system that has helped reduce nitrogen oxide () by up to 90% and sulfur dioxide () by up to 95%. The Pleasant Prairie plant produces “8.6 million tons of annually – about as much as (that produced by) 1.7 million US cars”, according to The Wall Street Journal. The plant uses experimental technology designed by French Alstom SA to separate carbon dioxide from the exhaust, and is seen as a proving ground for clean coal technology. The plant is owned by We Energies. In an effort to reduce carbon dioxide () emissions, the plant uses a chilled ammonia (NH3) process developed by Alstom. that captures up to 90% of carbon emissions as it escapes the flue gas. The demonstration project began in March 2008 and would last for two years. The America’s Power Factuality Tour stopped at the Pleasant Prairie Power Plant to report on its role in generating electricity in the United States in 2009.
|
wikipedia
|
wiki_38048_chunk_4
|
Virgo (software)
|
Web admin console - deploy and manage artifacts, examine diagnostic dumps, and explore bundle wiring, either in a live system or offline following a resolution failure
Gogo shell - manage Virgo and deployed artifacts using a command line shell accessed via ssh or telnet
Plans - define the artifacts that compose an application, optionally making the application atomic to tie the artifact lifecycles together, and scoped to isolate the application from other applications
Provisioning - automatically supply the dependencies of an application including bundles, plans, plan archives (PARs), and configurations, from both local and remote repositories
Web container - supports vanilla WAR files, with all their dependencies in WEB-INF/lib, and Web Application Bundles, that import their dependencies via OSGi manifest metadata, via the reference implementation of the OSGi Web Container specification, based on embedded Apache Tomcat and configured using the standard Tomcat server.xml
User region - isolates the kernel from user-installed applications and enables administrators to focus on application artifacts and their dependencies without seeing those of the kernel as well
Spring – Virgo 3.6.2 packages Spring 3.1.x, Virgo 3.7 packages Spring 4.2.x
Hot deployment - deploy artifacts to Virgo by copying them into the pickup directory, either in archive or exploded form, as an alternative to deploying via the admin console or shell
Logging - via embedded LogBack with a rich set of appenders available out of the box
JMX management, accessed via the admin console, the shell, the Virgo IDE tooling, or directly via a JMX client such as JConsole
|
wikipedia
|
wiki_18748_chunk_17
|
List of programs aired by TV5 (Philippine TV network)
|
American/Canadian series
ALF (1999–2002)
Alfred Hitchcock Presents (1992)
America's Funniest Home Videos (2016–2017)
Arrow (2016–2018)
Batman (1992–1993)
Beach Patrol (2000–2001)
Big Bad Beetleborgs (1997–1999)
Blindspot (2017–2018)
Boiling Points (2017)
Bugging Out (2016–2017)
Bugs (2002–2004)
The Burning Zone (2000–2001)
The Cape (1998–2000)
Cashmere Mafia (2008)
Chicago Sons (1997–2001)
Clueless (1997–1999)
Cobra (1994)
The Cosby Show (1997–2001)
Diagnosis: Murder (2000–2001)
Eerie, Indiana
ER (1996–2004)
FBI: The Untold Stories
Frasier (1994–1996)
Friends (1995–2006)
F/X: The Series (2000–2002)
Gagsters (2004)
Gotham (2020–2021)
Growing Pains (1993–2000)
The Hat Squad (1993–1994)
Hearts Are Wild
Hercules: The Legendary Journeys (2000–2001)
High Tide (2000–2002)
Highlander: The Series
The Hitchhiker
How Clean Is Your House? (2006)
Hunter
The Last Frontier (1992–1995)
Law & Order: Trial by Jury (2005–2006)
Legends of Tomorrow (2020)
Life Goes On (1993–1997)
Life with Roger (2001–2003)
Lois & Clark: The New Adventures of Superman (1993–1998)
Love Monkey (2008)
MADtv (2001–2004)
Marvel's Agents of S.H.I.E.L.D. (2015–2017)
Masked Rider
Midnight Caller
Muppets Tonight (1998–2000)
Murphy Brown (1994–1997)
New York Undercover (2000–2001)
Nikita (2016–2017)
Normal, Ohio (2001–2004)
Once Upon a Time (2016)
Outcast (2016)
Peaceable Kingdom (1992)
Police Academy: The Series (2000–2002)
Poltergeist: The Legacy (2002–2003)
The Powers of Matthew Star (2000–2001)
Prison Break (2017)
Quantico (2017)
Quantum Leap (1992–1993)
Rachel Gunn, R.N. (1992)
Raven
Sabrina, the Teenage Witch (1998–2001)
Scandal (2016–2017)
Scorpion (2017–2019)
Seinfeld (2001–2002)
Sentinel (1998–2002)
Sightings
Sliders (2000–2001)
Small Wonder (1992–1996)
Smallville (2016–2017)
Snow Buddies
Soldier Of Fortune (2000–2001)
Spy Game
Star Trek: Deep Space Nine (1997–1999)
Star Trek: The Next Generation (1999–2001)
Star Trek: The Original Series (1994–1997)
Star Trek: Voyager (2001–2003)
Strangers (2000–2001)
Suddenly Susan (1998–2001)
Supergirl (2017–2018)
Supernatural (2014–2018)
Super Bloopers & Practical Jokes
Sweet Valley High
Tattooed Teenage Alien Fighters from Beverly Hills (1995–1996, 2002–2003)
Tarzan (2000–2001)
Team Knight Rider (2000–2001)
Teen Wolf (2015–2017)
That '70s Show (2001–2004)
The New Adventures of Robin Hood (2003–2004)
Touched by an Angel (1996–2002)
Two (2002–2003)
Under Suspicion
The Vampire Diaries (2015–2017)
Viper
VR Troopers (1998–2000, 2002–2003)
The Walking Dead (2016–2018)
Working (2001–2004)
Xena: Warrior Princess
|
wikipedia
|
wiki_27525_chunk_2
|
Magic circle (mathematics)
|
Yang Hui magic concentric circle
Yang Hui's magic concentric circle has the following properties
The sum of the numbers on four diameters = 147,
28 + 5 + 11 + 25 + 9 + 7 + 19 + 31 + 12 = 147
The sum of 8 numbers plus 9 at the center = 147;
28 + 27 + 20 + 33 + 12 + 4 + 6 + 8 + 9 = 147
The sum of eight radius without 9 = magic number 69: such as 27 + 15 + 3 + 24 = 69
The sum of all numbers on each circle (not including 9) = 2 × 69
There exist 8 semicircles, where the sum of numbers = magic number 69; there are 16 line segments (semicircles and radii) with magic number 69, more than a 6 order magic square with only 12 magic numbers.
|
wikipedia
|
wiki_15107_chunk_15
|
Epidemiological transition
|
One of the first to refine the idea of the epidemiological transition was Preston, who in 1976 proposed the first comprehensive statistical model relating mortality and cause-specific mortality. Preston used life tables from 43 national populations, including both developed countries such as United States and England and developing countries such as Chile, Colombia, Costa Rica, Guatemala, México, Panama, Taiwan, Trinidad and Tobago, and Venezuela. He used multiple linear regression to analyze the cause-specific-age-standardized death rates by sex. The estimated slopes represented the proportional contribution of each cause to a unit change in the total mortality rate. With the exception of neoplasms in both sexes and cardiovascular disease in males, all of the estimated slopes were positive and statistically significant. This demonstrated that the mortality rates from each specific cause were expected to decline as total mortality declined. The major causes accounting for the decline were all infectious and parasitic diseases.
|
wikipedia
|
wiki_21442_chunk_9
|
Differential item functioning
|
Before presenting statistical procedures for testing differences of item parameters, it is important to first provide a general understanding of the different parameter estimation models and their associated parameters. These include the one-, two-, and three-parameter logistic (PL) models. All these models assume a single underling latent trait or ability. All three of these models have an item difficulty parameter denoted b. For the 1PL and 2PL models, the b parameter corresponds to the inflection point on the ability scale, as mentioned above. In the case of the 3PL model, the inflection corresponds to 1 + c/2 where c is a lower asymptote (discussed below). Difficulty values, in theory, can range from -∞ to +∞; however in practice they rarely exceed ±3. Higher values are indicative of harder test items. Items exhibiting low b parameters are easy test items. Another parameter that is estimated is a discrimination parameter designated a . This parameter pertains to an item's ability to discriminate among individuals. The a parameter is estimated in the 2PL and 3PL models. In the case of the 1PL model, this parameter is constrained to be equal between groups. In relation to ICCs, the a parameter is the slope of the inflection point. As mentioned earlier, the slope is maximal at the inflection point. The a parameter, similar to the b parameter, can range from -∞ to +∞; however typical values are less than 2. In this case, higher value indicate greater discrimination between individuals. The 3PL model has an additional parameter referred to as a guessing or pseudochance parameter and is denoted by c. This corresponds to a lower asymptote which essentially allows for the possibility of an individual to get a moderate or difficult item correct even if they are low in ability. Values for c range between 0 and 1, however typically fall below .3.
When applying statistical procedures to assess for DIF, the a and b parameters (discrimination and difficulty) are of particular interest. However, assume a 1PL model was used, where the a parameters are constrained to be equal for both groups leaving only the estimation of the b parameters. After examining the ICCs, there is an apparent difference in b parameters for both groups. Using a similar method to a Student's t-test, the next step is to determine if the difference in difficulty is statistically significant. Under the null hypothesis
H0: br = bf
Lord (1980) provides an easily computed and normally distributed test statistic.
d = (br - bf) / SE(br - bf)
The standard error of the difference between b parameters is calculated by
√[SE(br)]2 + √[SE(bf)]2
|
wikipedia
|
wiki_565_chunk_6
|
Semantic network
|
In Lisp
The following code shows an example of a semantic network in the Lisp programming language using an association list.
(setq *database*
'((canary (is-a bird)
(color yellow)
(size small))
(penguin (is-a bird)
(movement swim))
(bird (is-a vertebrate)
(has-part wings)
(reproduction egg-laying)))) To extract all the information about the "canary" type, one would use the assoc function with a key of "canary". WordNet
|
wikipedia
|
wiki_7943_chunk_8
|
Paul Seymour (mathematician)
|
In 2000 Robertson, Seymour, and Thomas were supported by the American Institute of Mathematics to work on the strong perfect graph conjecture, a famous open question that had been raised by Claude Berge in the early 1960s. Seymour's student Maria Chudnovsky joined them in 2001, and in 2002 the four jointly proved the conjecture. Seymour continued to work with Chudnovsky, and obtained several more results about induced subgraphs, in particular (with Cornuéjols, Liu, Vuskovic) a polynomial-time algorithm to test whether a graph is perfect, and a general description of all claw-free graphs. Other important results in this period include: (with Seymour's student Sang-il Oum) fixed-parameter tractable algorithms to approximate the clique-width of graphs (within an exponential bound) and the branch-width of matroids (within a linear bound); and (with Chudnovsky) a proof that the roots of the independence polynomial of every claw-free graph are real.
|
wikipedia
|
wiki_1348_chunk_27
|
Dynamic programming
|
Consider the problem of assigning values, either zero or one, to the positions of an matrix, with even, so that each row and each column contains exactly zeros and ones. We ask how many different assignments there are for a given . For example, when , five possible solutions are There are at least three possible approaches: brute force, backtracking, and dynamic programming. Brute force consists of checking all assignments of zeros and ones and counting those that have balanced rows and columns ( zeros and ones). As there are possible assignments and sensible assignments, this strategy is not practical except maybe up to .
|
wikipedia
|
wiki_3113_chunk_7
|
Contact (mathematics)
|
Bi-tangents in econometrics
In econometrics it is also possible to consider circles which have two point contact with two points S(t1), S(t2) on the curve. Such circles are bi-tangent circles. The centers of all bi-tangent circles form the symmetry set. The medial axis is a subset of the symmetry set. These sets have been used as a method of characterising the shapes of biological objects by Mario Henrique Simonsen, Brazilian and English econometrist. References Ian R. Porteous (2001) Geometric Differentiation, pp 152–7, Cambridge University Press .
|
wikipedia
|
wiki_21938_chunk_58
|
Contact mechanics
|
The equation for the cohesive gap between the two bodies takes the form This equation can be solved to obtain values of for various values of and . For large values of , and the JKR model is obtained. For small values of the DMT model is retrieved. Carpick-Ogletree-Salmeron (COS) model
The Maugis-Dugdale model can only be solved iteratively if the value of is not known a-priori. The Carpick-Ogletree-Salmeron approximate solution simplifies the process by using the following relation to determine the contact radius :
|
wikipedia
|
wiki_5076_chunk_6
|
1983–84 United States network television schedule
|
Returning SeriesThe A-TeamBuffalo Bill *CheersDiff'rent StrokesThe Facts of LifeFamily TiesGimme a Break!Hill Street BluesKnight RiderMama's FamilyNBC Monday Night at the MoviesReal PeopleRemington SteeleSt. ElsewhereSilver SpoonsNew SeriesBay City BluesBooneComedy Zone *Double Trouble *The Duck Factory *First CameraFor Love and HonorJennifer Slept HereLegmen *ManimalThe Master *Mr. SmithThe New Show *Night Court *People Are Funny *Riptide *The RoustersSummer Sunday U.S.A. *TV's Bloopers & Practical Jokes *We Got It MadeThe Yellow RoseNot returning from 1982–83:Bare EssenceCHiPsThe Devlin ConnectionFame ^The Family TreeFather MurphyGavilanLittle House: A New BeginningLove, SidneyMonitorThe News is the NewsThe Powers of Matthew StarQuincy, M.E.TaxiTeachers OnlyVoyagers!''
|
wikipedia
|
wiki_2360_chunk_5
|
Social statistics
|
Usage and applications Social scientists use social statistics for many purposes, including:
the evaluation of the quality of services available to a group or organization,
analyzing behaviors of groups of people in their environment and special situations,
determining the wants of people through statistical sampling
evaluation of wage expenditures and savings
preventing industrial diseases
prevention of industrial accidents
labour disputes, such as supporting the Anthracite Coal Strike Commission of 1902-1903
supporting governments in times of peace and war Reliability
|
wikipedia
|
wiki_31101_chunk_3
|
TigerLogic
|
2000: Definitive merger agreement between Omnis and PICK. Name changes to Raining Data Corporation integrating two companies to create an enterprise to take advantage of emerging trends in cross-platform, web-enabled, data intensive business applications.
2002: Raining Data, a long time provider of scalable data management software focuses company on XML market initiatives with new XML data management solutions that streamline access to a variety of critical business data.
2002: Raining Data announces the developer release of TigerLogic XML Data Management Server (XDMS) V1.0 on Windows 2000 and Windows XP Platforms.
2003: Availability of TigerLogic XDMS 1.1. supports Solaris, Windows 2000 and Windows XP environments and includes patent-pending technology that significantly boosts the performance and efficiency of data architectures.
2007: Major new 3.0 release of TigerLogic XDMS software now supports the January 2007 W3C XQuery 1.0 specification and an XQuery API for Java interface.
2008: TigerLogic announces new Web search product called Yolink, an Internet browser-based application that enhances the search experience of any popular search engine or Web page; company changes name from Raining Data.
2009: TigerLogic Corporation Releases Yolink 3.1 with Google Docs and Diigo Integration.
2009: TigerLogic Corporation Unveils Yolink 1.0 Developer Beta for Google Chrome Browser, with Google Docs Integration.
2010: TigerLogic Announces Major Releases of Its Next-Generation Database Management System.
2010: TigerLogic Announces Release of Mobile Apps Development Tool for the Apple iPhone, iPad, and iPod Touch.
2010: TigerLogic Launches PostPost, a Real-Time Facebook Newspaper.
2011: TigerLogic Launches PostPost App in Google Chrome Web Store.
2011: TigerLogic Launches Postano, a Social Media Postcasting Platform
2012: Tigerlogic signs definitive agreement to acquire mobile app publisher Storycode, Inc.
2013: Rocket Software Acquires TigerLogic's MultiValue Database Business.
2014: TigerLogic Announces Appointment of Brad Timchuk as CEO and Justin Garrity as President
2016: Sells off Postano to Sprinklr
2016: Sells off the Omnis part of the business and announced it would wind-up operations, dissolving as of October 31, 2016.
|
wikipedia
|
wiki_6476_chunk_5
|
Dedekind zeta function
|
Special values
Analogously to the Riemann zeta function, the values of the Dedekind zeta function at integers encode (at least conjecturally) important arithmetic data of the field K. For example, the analytic class number formula relates the residue at s = 1 to the class number h(K) of K, the regulator R(K) of K, the number w(K) of roots of unity in K, the absolute discriminant of K, and the number of real and complex places of K. Another example is at s = 0 where it has a zero whose order r is equal to the rank of the unit group of OK and the leading term is given by
|
wikipedia
|
wiki_35487_chunk_9
|
Software testability
|
It has been proved that each class is strictly included into the next. For instance, testing when we assume that the behavior of the implementation under test can be denoted by a deterministic finite-state machine for some known finite sets of inputs and outputs and with some known number of states belongs to Class I (and all subsequent classes). However, if the number of states is not known, then it only belongs to all classes from Class II on. If the implementation under test must be a deterministic finite-state machine failing the specification for a single trace (and its continuations), and its number of states is unknown, then it only belongs to classes from Class III on. Testing temporal machines where transitions are triggered if inputs are produced within some real-bounded interval only belongs to classes from Class IV on, whereas testing many non-deterministic systems only belongs to Class V (but not all, and some even belong to Class I). The inclusion into Class I does not require the simplicity of the assumed computation model, as some testing cases involving implementations written in any programming language, and testing implementations defined as machines depending on continuous magnitudes, have been proved to be in Class I. Other elaborated cases, such as the testing framework by Matthew Hennessy under must semantics, and temporal machines with rational timeouts, belong to Class II.
|
wikipedia
|
wiki_2741_chunk_47
|
Biological Weapons Convention
|
Potential misuse of rapid scientific and technological developments
Advances in science and technology are relevant to the BWC since they may affect the threat presented by biological weapons. The ongoing advances in synthetic biology and enabling technologies are eroding the technological barriers to acquiring and genetically enhancing dangerous pathogens and using them for hostile purposes. For example, a 2019 report by the Stockholm International Peace Research Institute finds that "advances in three specific emerging technologies—additive manufacturing (AM), artificial intelligence (AI) and robotics—could facilitate, each in their own way, the development or production of biological weapons and their delivery systems". Similarly, biological weapons expert Filippa Lentzos argues that the convergence of genomic technologies with "machine learning, automation, affective computing, and robotics (...) [will] create the possibility of novel biological weapons that target particular groups of people and even individuals". On the other hand, these scientific developments may improve pandemic preparedness by strengthening prevention and response measures.
|
wikipedia
|
wiki_12099_chunk_8
|
UTSA College of Engineering and Integrated Design
|
The department is also working extensively in the areas of cyber security and homeland defense. Reliable and secure voice and data communications are important in mission success and in providing assurances to the public. Electromagnetic wave analysis regarding fallout may become necessary after a physical attack. Computer information security, high-speed intrusion detection, problem identification, reliable high-speed network design and redundancy are all important for cyber attack prevention; computer engineering faculty work with the Center for Infrastructure Assurance and Security in these efforts. Target analysis and radar signature identification help identify and track friends or foes.
|
wikipedia
|
wiki_20689_chunk_11
|
CSA (database company)
|
Environmental Sciences & Pollution Management
This database provides abstracting and full bibliographic citation coverage of the available global literature which pertains to environmental sciences and pollution management. This database can link to full-text electronic journal articles. In addition, this database is indexed for more than 10,000 relevant publications of various types, or groupings, which are related to scientific journal content. Dates of coverage span from 1967 to present day. The update frequency is once a month, and approximately 6,000 new records are added each month. As of June 2010 the size of the database is more than 3,366,269 records. Temporal coverage is from 1967 to the present day.
|
wikipedia
|
wiki_26407_chunk_43
|
Text Executive Programming Language
|
_
_
_ The following routines allow you to easily draw pictures on the
_ the Televideo 950 terminal.
_
_ xyplot—positions the cursor
_
_ gr—turns graphics mode on
_
_ nogr—turns graphics mode off
_
_ clear—clears the screen
_
_ load—used by xyplot to load the xytbl
_
!xyplot
ercall !load xytbl=xytbl
cx=(xytbl]'(x-1))']1
cy=(xytbl]'(y-1))']1
out:*ESC,"=",cy,cx,z
return
_
_
!load
xytbl=" !",/"/,"#$%&'()*+,-./"
xytbl=xytbl,"0123456789:;<=>?",*AT,"ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_"
xytbl=xytbl,"`abcdefghijklmnopqrstuvwxyz{|}~",*DEL
return
_
_
!gr nosubs
out:*ESC,"$" subs $
$*SVMD$ return
!nogr out:*ESC,"%" return
!clear out:*ESC,":" return
|
wikipedia
|
wiki_15954_chunk_0
|
List of MeSH codes (G03)
|
The following is a partial list of the "G" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (G02). Codes following these are found at List of MeSH codes (G04). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – environment and public health – environment – altitude – cities – confined spaces – conservation of natural resources
– conservation of energy resources
|
wikipedia
|
wiki_26375_chunk_1
|
Civilization: The Card Game
|
Overview
Civilization: The Card Game simulates the rise of empires as in the computer game Civilization. Players will collect resources, obtain plots of land, construct Buildings and Wonders, discover Technologies, and fight each other on their way to victory. The game ends when the final Technology is bought. The player with the most Victory Points (one each per Wonder, Technology, and Population) is declared the Winner, with tiebreakers found in number of technologies, and then number of populations acquired, and then the number of Wonders. Gameplay
|
wikipedia
|
wiki_10774_chunk_4
|
Computational genomics
|
The development of computer-assisted mathematics (using products such as Mathematica or Matlab) has helped engineers, mathematicians and computer scientists to start operating in this domain, and a public collection
of case studies and demonstrations is growing, ranging from whole genome comparisons to gene expression analysis. This has increased the introduction of different ideas, including concepts from systems and control, information theory, strings analysis and data mining. It is anticipated that computational approaches will become and remain a standard topic for research and teaching, while students fluent in both topics start being formed in the multiple courses created in the past few years.
|
wikipedia
|
wiki_38000_chunk_24
|
Consumer neuroscience
|
Real-world applications
Consumer research provides a real-world application for neuroscience studies. Consumer studies help neuroscience to learn more about how healthy and unhealthy brain functions differ, which may assist in discovering the neural source of consumption-related dysfunctions and treat a variety of addictions. Additionally, studies are currently underway to investigate the neural mechanism of “anchoring”, which has been thought to contribute to obesity because people are more influenced by the behaviors of their peers than an internal standard. Discovering a neural source of anchoring may be the key to preventing behaviors that typically lead to obesity.
|
wikipedia
|
wiki_19755_chunk_4
|
Package-merge algorithm
|
Performance improvements and generalizations
With this reduction, the algorithm is O(nL)-time and O(nL)-space. However, the original paper, "A fast algorithm for optimal length-limited Huffman codes", shows how this can be improved to O(nL)-time and O(n)-space. The idea is to run the algorithm a first time, only keeping enough data to be able to determine two equivalent subproblems that sum to half the size of the original problem. This is done recursively, resulting in an algorithm that takes about twice as long but requires only linear space.
|
wikipedia
|
wiki_35132_chunk_1
|
János Komlós (mathematician)
|
Notable results
He proved that every L1-bounded sequence of real functions contains a subsequence such that the arithmetic means of all its subsequences converge pointwise almost everywhere. In probabilistic terminology, the theorem is as follows. Let ξ1,ξ2,... be a sequence of random variables such that E[ξ1],E[ξ2],... is bounded. Then there exist a subsequence ξ'1, ξ'2,... and a random variable β such that for each further subsequence η1,η2,... of ξ'0, ξ'1,... we have (η1+...+ηn)/n → β a.s.
With Miklós Ajtai and Endre Szemerédi he proved the ct2/log t upper bound for the Ramsey number R(3,t). The corresponding lower bound was established by Jeong Han Kim only in 1995, and this result earned him a Fulkerson Prize.
|
wikipedia
|
wiki_36108_chunk_5
|
Dinic's algorithm
|
Algorithm
Dinic's Algorithm
Input: A network .
Output: An – flow of maximum value.
Set for each .
Construct from of . If , stop and output .
Find a blocking flow in .
Add augment flow by and go back to step 2. Analysis
It can be shown that the number of layers in each blocking flow increases by at least 1 each time and thus there are at most blocking flows in the algorithm. For each of them: the level graph can be constructed by breadth-first search in time
a blocking flow in the level graph can be found in time
|
wikipedia
|
wiki_414_chunk_64
|
Nuclear power
|
The impact of nuclear accidents is controversial. According to Benjamin K. Sovacool, fission energy accidents ranked first among energy sources in terms of their total economic cost, accounting for 41 percent of all property damage attributed to energy accidents. Another analysis found that coal, oil, liquid petroleum gas and hydroelectric accidents (primarily due to the Banqiao Dam disaster) have resulted in greater economic impacts than nuclear power accidents. The study compares latent cancer deaths attributable to nuclear with immediate deaths from other energy sources per unit of energy generated, and does not include fossil fuel related cancer and other indirect deaths created by the use of fossil fuel consumption in its "severe accident" (an accident with more than 5 fatalities) classification. The Chernobyl accident in 1986 caused approximately 50 deaths from direct and indirect effects, and some temporary serious injuries from acute radiation syndrome. The future predicted mortality from increases in cancer rates is estimated at about 4000 in the decades to come. However, the costs have been large and are increasing.
|
wikipedia
|
wiki_37095_chunk_8
|
National Evolutionary Synthesis Center
|
Senkowsky, S. (2007). "The Ascent of NESCent." BioScience 57(2): 106-111.
Bates, K. L. (2009). Putting it all together again: Frontier of biology assembles data, looks for patterns. Duke Research Magazine. External links
US National Science Foundation
Duke University
University of North Carolina at Chapel Hill
North Carolina State University Research institutes in the United States
|
wikipedia
|
wiki_4820_chunk_0
|
Geometric probability
|
Problems of the following type, and their solution techniques, were first studied in the 18th century, and the general topic became known as geometric probability. (Buffon's needle) What is the chance that a needle dropped randomly onto a floor marked with equally spaced parallel lines will cross one of the lines?
What is the mean length of a random chord of a unit circle? (cf. Bertrand's paradox).
What is the chance that three random points in the plane form an acute (rather than obtuse) triangle?
What is the mean area of the polygonal regions formed when randomly oriented lines are spread over the plane?
|
wikipedia
|
wiki_29291_chunk_1
|
Archaeological illustration
|
Surveying: To produce an accurate record of sites and buildings and to record accurately where the sites and buildings lie within the landscape. Surveyors use a range of equipment including tapes, plane tables, total stations, 3D scanners, GPS and GIS to produce illustrations including plans, sections and elevations as well as isometric and axonometric illustrations which are regularly used in building recording. Survey data will be gathered on acid free paper, polyvinyl permatrace and archive stable digital formats.
Photography: To produce a record of archaeological sites, buildings, artifacts and landscapes. Archaeological photographers will uses a range of different formats particularly black-and-white and colour slide. Digital photography is now starting to become more widely used and is especially useful for the recording of historic building. Aerial photography is commonly used as a tool for recording sites and is also used as a prospecting tool to locate new archaeological sites.
Artefact illustration: To record objects using agreed conventions to allow further study of the objects by specialists on publication. Artefact illustrators will use pen-and-ink as well as graphics and page layout software.
Interpretation and reconstruction illustration: To visualise the results of archaeological field work in a way that is meaningful and visually appealing to as many as possible. Reconstruction artists work in many media from traditional pen-and-ink and painted reconstruction to more modern techniques including 3D, virtual reality and video.
|
wikipedia
|
wiki_4634_chunk_9
|
Deformation (mathematics)
|
Cohomological Interpretation of deformations
It should be clear there could be many deformations of a single germ of analytic functions. Because of this, there are some book-keeping devices required to organize all of this information. These organizational devices are constructed using tangent cohomology. This is formed by using the Koszul–Tate resolution, and potentially modifying it by adding additional generators for non-regular algebras . In the case of analytic algebras these resolutions are called the Tjurina resolution for the mathematician who first studied such objects, Galina Tyurina. This is a graded-commutative differential graded algebra such that is a surjective map of analytic algebras, and this map fits into an exact sequenceThen, by taking the differential graded module of derivations , its cohomology forms the tangent cohomology of the germ of analytic algebras . These cohomology groups are denoted . The contains information about all of the deformations of and can be readily computed using the exact sequenceIf is isomorphic to the algebrathen its deformations are equal towere is the jacobian matrix of . For example, the deformations of a hypersurface given by has the deformationsFor the singularity this is the modulehence the only deformations are given by adding constants or linear factors, so a general deformation of is where the are deformation parameters.
|
wikipedia
|
wiki_226_chunk_27
|
Functional programming
|
A limited form of dependent types called generalized algebraic data types (GADT's) can be implemented in a way that provides some of the benefits of dependently typed programming while avoiding most of its inconvenience. GADT's are available in the Glasgow Haskell Compiler, in OCaml and in Scala, and have been proposed as additions to other languages including Java and C#. Referential transparency
|
wikipedia
|
wiki_39291_chunk_16
|
List of awards and nominations received by Andrea Bocelli
|
|-
| style="text-align:center;" rowspan="2"| 1998 || style="text-align:left;" rowspan="7"| Andrea Bocelli || Best-selling Classical Artist ||
|-
| Best-selling Italian Singer ||
|-
| style="text-align:center;" rowspan="2"| 2002 || Best-selling Classical Artist ||
|-
| Best-selling Italian Singer ||
|-
| style="text-align:center;" rowspan="2"| 2006 || Best-selling Classical Artist ||
|-
| Best-selling Italian Singer ||
|-
| style="text-align:center;" rowspan="2"| 2010 || Best-selling Classical Artist ||
|-
|
wikipedia
|
wiki_1924_chunk_12
|
Protein engineering
|
Protein threading
Protein threading can be used when a reliable homologue for the query sequence cannot be found. This method begins by obtaining a query sequence and a library of template structures. Next, the query sequence is threaded over known template structures. These candidate models are scored using scoring functions. These are scored based upon potential energy models of both query and template sequence. The match with the lowest potential energy model is then selected. Methods and servers for retrieving threading data and performing calculations are listed here: GenTHREADER, pGenTHREADER, pDomTHREADER, ORFEUS, PROSPECT, BioShell-Threading, FFASO3, RaptorX, HHPred, LOOPP server, Sparks-X, SEGMER, THREADER2, ESYPRED3D, LIBRA, TOPITS, RAPTOR, COTH, MUSTER.
|
wikipedia
|
wiki_12930_chunk_4
|
Video Encoded Invisible Light
|
Stripping the VEIL signal from the video is supposed to be more difficult than tampering with the VBI, therefore VEIL-I is proposed as a DRM tool. The signal can survive recording to video, and various sorts of digital compression. The detection devices are low-cost and can be used in a range of devices, from toys to cellphones. Use in toys
The technology was developed for The Batman TV series, for transmitting data from the video on-screen to a line of Batman toys based on the series, supplying them with information about the series and unlocking their hidden capabilities.
|
wikipedia
|
wiki_28511_chunk_4
|
Lasso Logic
|
External links
Business Week, Karen E. Klein, April 2005. "Have You Backed Up Your Data Today?"
InfoWorld, Sean McCown, Jan, 2006, "Lasso Logic offers real easy real-time" backups"
Enterprise Storage Form, Paul Shread, November, 2005 "SonicWALL Corrals Lasso Logic"
Byte and Switch, "Lasso Logic Unveils CDP Appliance, Lasso Logic ships end-to-end CDP solution for SMB and remote office protection" Companies established in 2003
|
wikipedia
|
wiki_2155_chunk_36
|
Window function
|
Rife–Vincent windows are customarily scaled for unity average value, instead of unity peak value. The coefficient values below, applied to , reflect that custom. Class I, Order 1 (K = 1): Functionally equivalent to the Hann window. Class I, Order 2 (K = 2): Class I is defined by minimizing the high-order sidelobe amplitude. Coefficients for orders up to K=4 are tabulated. Class II minimizes the main-lobe width for a given maximum side-lobe. Class III is a compromise for which order K = 2 resembles the . Adjustable windows
|
wikipedia
|
wiki_473_chunk_16
|
P-code machine
|
This is the code for the machine, written in Pascal: const
amax=2047; {maximum address}
levmax=3; {maximum depth of block nesting}
cxmax=200; {size of code array} type
fct=(lit,opr,lod,sto,cal,int,jmp,jpc);
instruction=packed record
f:fct;
l:0..levmax;
a:0..amax;
end; var
code: array [0..cxmax] of instruction; procedure interpret; const stacksize = 500;
|
wikipedia
|
wiki_21832_chunk_5
|
Liverpool Software Gazette
|
Issue 5:
Xtal Basic - The Extendable One
Analysis of Systems Analysis
Cesil Interpreted in Basic
Algol 68
Fortran 77
Lisp
Forms Processing
Compiling Systems
The Users View of Visicalc Issue 6 (Pascal special):
'Warning' Prolonged use of Pascal may seriously damage your mental health
Integer Pascal on the Nascom
Structured and not so Structured Programming
TCL Pascal
A Readers Contribution
Alarming Your Computer
The Romplus and Keyboard Filter
Stargate Unlocked
Tangerine Article
MPL Language
|
wikipedia
|
wiki_4084_chunk_14
|
FSF Free Software Awards
|
Winners
The award was first awarded in 2005, and the recipients have been:
2005 Wikipedia
The Free Encyclopedia
2006 The Sahana FOSS Disaster Management System
"An entirely volunteer effort to create technology for managing large-scale relief efforts"
2007 Groklaw
"An invaluable source of legal and technical information for software developers, lawyers, law professors, and historians"
2008 Creative Commons
"[For] foster[ing] a growing body of creative, educational and scientific works that can be shared and built upon by others [and] work[ing] to raise awareness of the harm inflicted by increasingly restrictive copyright regimes."
2009 Internet Archive
For collecting freely available information, archiving the web, collaborating with libraries, and creating free software to make information available to the public.
2010 Tor
For writing software to help privacy online.
2011 GNU Health
For their work with health professionals around the world to improve the lives of the underprivileged.
2012 OpenMRS
"A free software medical record system for developing countries. OpenMRS is now in use around the world, including South Africa, Kenya, Rwanda, Lesotho, Zimbabwe, Mozambique, Uganda, Tanzania, Haiti, India, China, United States, Pakistan, the Philippines, and many other places."
2013 GNOME Foundation's Outreach Program for Women
OPW's work benefits society, "addressing gender discrimination by empowering women to develop leadership and development skills in a society which runs on technology".
2014 Reglue
which donates refurbished Linux computers to underprivileged children in Austin, TX.
2015 Library Freedom Project
a partnership among librarians, technologists, attorneys, and privacy advocates which aims to make real the promise of intellectual freedom in libraries. By teaching librarians about surveillance threats, privacy rights and responsibilities, and digital tools to stop surveillance, the project hopes to create a privacy-centric paradigm shift in libraries and the local communities they serve.
2016 SecureDrop
an open-source software platform for secure communication between journalists and sources (whistleblowers)
2017 Public Lab
a non-profit organization that facilitates collaborative, open source environmental research in a model known as Community Science
2018 OpenStreetMap
a collaborative project to create a free editable map of the world. Founded by Steve Coast in the UK in 2004, OpenStreetMap is built by a community of over one million community members and has found its application on thousands of Web sites, mobile apps, and hardware devices. OpenStreetMap is the only truly global service without restrictions on use or availability of map information.
2019 Let's Encrypt
a Certificate Authority (CA) that provides an easy way to obtain and install free TLS/SSL certificates.
2020 CiviCRM
free program that nonprofit organizations around the world use to manage their mailings and contact databases
|
wikipedia
|
wiki_855_chunk_18
|
Tree (graph theory)
|
Unlabeled trees
Counting the number of unlabeled free trees is a harder problem. No closed formula for the number t(n) of trees with n vertices up to graph isomorphism is known. The first few values of t(n) are
1, 1, 1, 1, 2, 3, 6, 11, 23, 47, 106, 235, 551, 1301, 3159, … .
proved the asymptotic estimate
with the values C and α known to be approximately 0.534949606... and 2.95576528565... , respectively. (Here, means that .) This is a consequence of his asymptotic estimate for the number r(n) of unlabeled rooted trees with n vertices:
with D around 0.43992401257... and the same α as above (cf. , chap. 2.3.4.4 and , chap. VII.5, p. 475).
|
wikipedia
|
wiki_1265_chunk_15
|
Appendix (anatomy)
|
Recently ... improved understanding of gut immunity has merged with current thinking in biological and medical science, pointing to an apparent function of the mammalian cecal appendix as a safe-house for symbiotic gut microbes, preserving the flora during times of gastrointestinal infection in societies without modern medicine. This function is potentially a selective force for the evolution and maintenance of the appendix.
Three morphotypes of cecal-appendices can be described among mammals based primarily on the shape of the cecum: a distinct appendix branching from a rounded or sac-like cecum (as in many primate species), an appendix located at the apex of a long and voluminous cecum (as in the rabbit, greater glider and Cape dune mole rat), and an appendix in the absence of a pronounced cecum (as in the wombat). In addition, long narrow appendix-like structures are found in mammals that either lack an apparent cecum (as in monotremes) or lack a distinct junction between the cecum and appendix-like structure (as in the koala). A cecal appendix has evolved independently at least twice, and apparently represents yet another example of convergence in morphology between Australian marsupials and placentals in the rest of the world. Although the appendix has apparently been lost by numerous species, it has also been maintained for more than 80 million years in at least one clade.
|
wikipedia
|
wiki_23109_chunk_101
|
List of Philippine mythological figures
|
Diwata na Magbabaya: simply referred as Magbabaya; the good supreme deity and supreme planner who looks like a man; created the earth and the first eight elements, namely bronze, gold, coins, rock, clouds, rain, iron, and water; using the elements, he also created the sea, sky, moon, and stars; also known as the pure god who wills all things; one of three deities living in the realm called Banting; holds up the serpent deities Intumbangol so they won't fall off the world; also referred to as Bathala
Dadanhayan ha Sugay: the evil lord from whom permission is asked; depicted as the evil deity with a human body and ten heads that continuously drools sticky saliva, which is the source of all waters; one of the three deities living in the realm called Banting
Agtayabun: the adviser and peace maker deity with a hawk-like head, wings, and a human body; tempers the heads of Diwata na Magbabaya and Dadanhayan ha Sugay whenever the two argue; one of the three deities living in the realm called Banting, where he holds the other two in a suspending fashion, while maintaining the balanace of Banting; the beating of his wings produce the wind
Incantus: six of the seven original figures initially created by the three supreme deities; became guardian spirits and divinities when they were finished by Dadanhayan ha Sugay; they are both good and evil, but they take care of nature and will give its fruits if given respect through offerings; if offended, they can send droughts, flood, pestilence, or sickness
Talagbugta: look after the soil
Ibabagsuk: take care of nature and grow plants
Bulalakaw: guards the water and all the creatures living in it
Mamelig: watch over the forest
Lalawig: watch over the bees and honey
Mamahandi: guards over the material wealth that men acquire
First Human: one of the seven original figures created by the three supreme deities; became the first human when finished by Diwata na Magbabaya; endowed with intelligence, and entrusted with the Haldan ta Paraiso
Magbabaya (general): general term for the gods of the universe living at the points where the world's concavities meet; usually referred simply to the supreme deity named Diwata na Magbabaya
Intumbangol: a pair of serpent deities who support the earth from the underworld; one is male, the other female; their movement causes earthquakes, their breathing causes winds, and their panting causes violent storms
Miyaw-Biyaw: the deity who breathes the makatu (soul) into humans at birth
Andalapit: leads the soul from the banquet in Kumbirahan into the foot of Mount Balatucan, where the gods of the seas are assembled to judge the soul
Mangilala: god of temptation that haunts the seventh tier of the underworld; brother of Magbabaya, who he aided in the creation of humans, although when Mangilala breathed into the figures, humans became tempted to evil things
Assistants of Magbabaya
Domalongdong: god of the north wind
Ognaaling: god of the south wind
Tagaloambung: god of the east wind
Magbaya: god of the west wind
Agents of Magbabaya
Tagumbanwa: guardian of the fields
Ibabasag: goddess of pregnant women
Ipamahandi: goddess of accidents
Pamahandi: protector of carabaos and horses
Tao-sa-sulup: god of material goods
Tigbas: god of good government
Busao: god of calamity
Talagbusao: bloodthirsty god of war
Camiguin: a mountain goddess who lived peacefully until the noisy kalaw disturbed her; sank and established Lake Mainit, and rose to sea, moving westward until she became the island of Camiguin
Python of Pusod Hu Dagat: the gigantic python living at the center of the sea; caused a massive flood when it coiled its body at sea
|
wikipedia
|
wiki_20649_chunk_9
|
Logic model
|
Various types of logic models The Inputs → Activities → Outputs → Outcomes template
Many authors and guides use the following template when speaking about logic model: Many refinements and variations have been added to the basic template. For example, many versions of logic models set out a series of outcomes/impacts, explaining in more detail the logic of how an intervention contributes to intended or observed results. Others often distinguish short-term, medium-term and long-term results, and between direct and indirect results. Intervention mapping logic models
|
wikipedia
|
wiki_11419_chunk_9
|
Computer-assisted proof
|
The emerging field of experimental mathematics is confronting this debate head-on by focusing on numerical experiments as its main tool for mathematical exploration. Applications Theorems proved with the help of computer programs
Inclusion in this list does not imply that a formal computer-checked proof exists, but rather, that a computer program has been involved in some way. See the main articles for details. Theorems for sale
In 2010, academics at The University of Edinburgh offered people the chance to "buy their own theorem" created through a computer-assisted proof. This new theorem would be named after the purchaser. This service now appears to no longer be available. See also
|
wikipedia
|
wiki_17601_chunk_22
|
Softmax function
|
Computation of this example using Python code: >>> import numpy as np
>>> a = [1.0, 2.0, 3.0, 4.0, 1.0, 2.0, 3.0]
>>> np.exp(a) / np.sum(np.exp(a))
array([0.02364054, 0.06426166, 0.1746813, 0.474833, 0.02364054,
0.06426166, 0.1746813])
|
wikipedia
|
wiki_5685_chunk_3
|
Evolution: The World of Sacred Device
|
Main characters
Mag Launcher - The 17-year-old protagonist of the series. Mag is the last in a family of adventurers, the Launchers. His parents never returned from an adventure, and he has been raised by Gre, his butler, ever since. Mag gets his assignments from the Society, an organization dedicated to studying ruins, and he gets around on his family's seaplane. Mag has a Cyframe shaped like a large hand, called Aeracomet.
Linear Cannon - Mag's partner in exploring ruins. She is 16 years old. She mysteriously appeared on Mag's doorstep one day with a letter from his father, telling Mag to protect her. Linear never speaks, but has learned to play the Ocarina from Mag. In battle she uses a frying pan, her ocarina, and her special healing powers.
Gre Nade - Gre Nade is the Launcher family butler and has raised Mag since his parents disappeared. Gre is 58 years old. He uses a shotgun, martial arts, and his cooking skills in combat.
Pepper Box - An attractive young woman with a cheerful, yet wild and unpredictable personality. She never reveals her age, but is believed to be somewhere in her late twenties. Uses a bazooka Cyframe called Moranna Solnier.
Chain Gun - Mag's female rival. Chain has a Cyframe in the form of jet pack with a large blade attached, called Flamingo, and uses fire-based magic attacks. Chain is 15 years old.
Eugene - Prince of the 8th Imperial Army. He is obsessed with acquiring Linear for himself.
|
wikipedia
|
wiki_1738_chunk_1
|
Programming paradigm
|
Common programming paradigms include:
imperative in which the programmer instructs the machine how to change its state,
procedural which groups instructions into procedures,
object-oriented which groups instructions with the part of the state they operate on,
declarative in which the programmer merely declares properties of the desired result, but not how to compute it
functional in which the desired result is declared as the value of a series of function applications,
logic in which the desired result is declared as the answer to a question about a system of facts and rules,
mathematical in which the desired result is declared as the solution of an optimization problem
reactive in which the desired result is declared with data streams and the propagation of change
|
wikipedia
|
wiki_24617_chunk_0
|
Cylindrical algebraic decomposition
|
In mathematics, cylindrical algebraic decomposition (CAD) is a notion, and an algorithm to compute it, that are fundamental for computer algebra and real algebraic geometry. Given a set S of polynomials in Rn, a cylindrical algebraic decomposition is a decomposition of Rn into connected semialgebraic sets called cells, on which each polynomial has constant sign, either +, − or 0. To be cylindrical, this decomposition must satisfy the following condition: If 1 ≤ k < n and π is the projection from Rn onto Rn−k consisting in removing the last k coordinates, then for every pair of cells c and d, one has either π(c) = π(d) or π(c) ∩ π(d) = ∅. This implies that the images by π of the cells define a cylindrical decomposition of Rn−k.
|
wikipedia
|
wiki_28608_chunk_2
|
Scientific programming language
|
Scientific programming languages should not be confused with scientific language in general, which refers loosely to the higher standards in precision, correctness and concision expected from practitioners of the scientific method. Examples Linear algebra Scientific programming languages provide facilities to work with linear algebra. For example, the following Julia program solves a system of linear equations: A = rand(20, 20) # A is a 20x20 matrix
b = rand(20) # b is a 20-element vector
x = A\b # x is the solution to A*x = b
|
wikipedia
|
wiki_10742_chunk_9
|
Minnesota Transracial Adoption Study
|
Declines in IQ scores have been documented when individuals are retested on a revised form of an original measure, as well as when a test used at a first administration was normed earlier than a test used at a subsequent administration (see Flynn, 1984, for a review). For example, the decline in Full-Scale IQ score from the WAIS to the WAIS-R averaged 6.8 points across a number of studies (reviewed by Sattler, 1988) and was 7.5 points in a sample of 72 35- to 44-year-olds tested as part of the standardization of the WAIS-R (Wechsler, 1981). This is precisely the test combination used for adoptive parents in our study.
|
wikipedia
|
wiki_6502_chunk_44
|
Software patents under United States patent law
|
Landmark decisions
Gottschalk v. Benson
Parker v. Flook
Diamond v. Diehr
State Street Bank v. Signature Financial Group
In re Bilski
Alice Corp. v. CLS Bank International
DDR Holdings v. Hotels.com See also
Machine-or-transformation test
Software patent
Software patent debate
Software patents under the European Patent Convention
Software patents under TRIPs Agreement
Limitations on exclusive rights: Computer programs (United States copyright law) References Further reading
Ben Klemens, Math You Can't Use: Patents, Copyright, and Software. Brookings Institution Press, 2005.
Manual of Patent Examining Procedure, Chapter 2100
|
wikipedia
|
wiki_26847_chunk_3
|
Unified Power Format
|
The Design Automation Standards Committee (DASC) of the IEEE Standards Association sponsored working group 1801, with the project authorization approved on May 7, 2007.
Goals included:
clarify the semantics of the intent - this provides portability of design intent across many vendors tools
Add support for incremental refinement - Platinum source (constraints) from IP vendors, Golden source (configuration) from IP integrators, and Silicon source (implementation choices) from those that realize the instantiations.
Add support for bottom up and top down design
add documentation of the support for wildcard and regular expression selection of design instances
clarify the differences between ports and pins
provide for convergence capability from both UPF and Common Power Format of the Silicon Integration Initiative (Si2)
The IEEE group was initially called the "Low Power Study Group". Proposed standards have the letter "P" in front of them (such as P1801), which is removed and replaced with a dash and year when the standard is ratified.
Accelera's UPF 1.0 was donated to the IEEE as a basis of this standard in June 2006.
|
wikipedia
|
wiki_20479_chunk_4
|
Reciprocity (network science)
|
Garlaschelli and Loffredo's definition
In order to overcome the defects of the above definition, Garlaschelli and Loffredo defined reciprocity as the correlation coefficient between the entries of the adjacency matrix of a directed graph ( if a link from i to j is there, and if not): , where the average value . measures the ratio of observed to possible directed links (link density), and self-linking loops are now excluded from L because of i not equal to j. The definition can be written in the following simple form:
|
wikipedia
|
wiki_7096_chunk_8
|
Software quality
|
Risk management: Software failure has caused more than inconvenience. Software errors can cause human fatalities (see for example: List of software bugs). The causes have ranged from poorly designed user interfaces to direct programming errors, see for example Boeing 737 case or Unintended acceleration cases or Therac-25 cases. This resulted in requirements for the development of some types of software, particularly and historically for software embedded in medical and other devices that regulate critical infrastructures: "[Engineers who write embedded software] see Java programs stalling for one third of a second to perform garbage collection and update the user interface, and they envision airplanes falling out of the sky.". In the United States, within the Federal Aviation Administration (FAA), the FAA Aircraft Certification Service provides software programs, policy, guidance and training, focus on software and Complex Electronic Hardware that has an effect on the airborne product (a "product" is an aircraft, an engine, or a propeller). Certification standards such as DO-178C, ISO 26262, IEC 62304, etc. provide guidance.
Cost management: As in any other fields of engineering, a software product or service governed by good software quality costs less to maintain, is easier to understand and can change more cost-effective in response to pressing business needs. Industry data demonstrate that poor application structural quality in core business applications (such as enterprise resource planning (ERP), customer relationship management (CRM) or large transaction processing systems in financial services) results in cost, schedule overruns and creates waste in the form of rework (see Muda (Japanese term)). Moreover, poor structural quality is strongly correlated with high-impact business disruptions due to corrupted data, application outages, security breaches, and performance problems.
CISQ reports on the cost of poor quality estimates an impact of:
$2.08 trillion in 2020
$2.84 trillion in 2018
IBM's Cost of a Data Breach Report 2020 estimates that the average global costs of a data breach:
$3.86 million
|
wikipedia
|
wiki_353_chunk_5
|
Multivariate statistics
|
There are many different models, each with its own type of analysis:
Multivariate analysis of variance (MANOVA) extends the analysis of variance to cover cases where there is more than one dependent variable to be analyzed simultaneously; see also Multivariate analysis of covariance (MANCOVA).
Multivariate regression attempts to determine a formula that can describe how elements in a vector of variables respond simultaneously to changes in others. For linear relations, regression analyses here are based on forms of the general linear model. Some suggest that multivariate regression is distinct from multivariable regression, however, that is debated and not consistently true across scientific fields.
Principal components analysis (PCA) creates a new set of orthogonal variables that contain the same information as the original set. It rotates the axes of variation to give a new set of orthogonal axes, ordered so that they summarize decreasing proportions of the variation.
Factor analysis is similar to PCA but allows the user to extract a specified number of synthetic variables, fewer than the original set, leaving the remaining unexplained variation as error. The extracted variables are known as latent variables or factors; each one may be supposed to account for covariation in a group of observed variables.
Canonical correlation analysis finds linear relationships among two sets of variables; it is the generalised (i.e. canonical) version of bivariate correlation.
Redundancy analysis (RDA) is similar to canonical correlation analysis but allows the user to derive a specified number of synthetic variables from one set of (independent) variables that explain as much variance as possible in another (independent) set. It is a multivariate analogue of regression.
Correspondence analysis (CA), or reciprocal averaging, finds (like PCA) a set of synthetic variables that summarise the original set. The underlying model assumes chi-squared dissimilarities among records (cases).
Canonical (or "constrained") correspondence analysis (CCA) for summarising the joint variation in two sets of variables (like redundancy analysis); combination of correspondence analysis and multivariate regression analysis. The underlying model assumes chi-squared dissimilarities among records (cases).
Multidimensional scaling comprises various algorithms to determine a set of synthetic variables that best represent the pairwise distances between records. The original method is principal coordinates analysis (PCoA; based on PCA).
Discriminant analysis, or canonical variate analysis, attempts to establish whether a set of variables can be used to distinguish between two or more groups of cases.
Linear discriminant analysis (LDA) computes a linear predictor from two sets of normally distributed data to allow for classification of new observations.
Clustering systems assign objects into groups (called clusters) so that objects (cases) from the same cluster are more similar to each other than objects from different clusters.
Recursive partitioning creates a decision tree that attempts to correctly classify members of the population based on a dichotomous dependent variable.
Artificial neural networks extend regression and clustering methods to non-linear multivariate models.
Statistical graphics such as tours, parallel coordinate plots, scatterplot matrices can be used to explore multivariate data.
Simultaneous equations models involve more than one regression equation, with different dependent variables, estimated together.
Vector autoregression involves simultaneous regressions of various time series variables on their own and each other's lagged values.
Principal response curves analysis (PRC) is a method based on RDA that allows the user to focus on treatment effects over time by correcting for changes in control treatments over time.
Iconography of correlations consists in replacing a correlation matrix by a diagram where the “remarkable” correlations are represented by a solid line (positive correlation), or a dotted line (negative correlation).
|
wikipedia
|
wiki_521_chunk_25
|
Statistics
|
Various attempts have been made to produce a taxonomy of levels of measurement. The psychophysicist Stanley Smith Stevens defined nominal, ordinal, interval, and ratio scales. Nominal measurements do not have meaningful rank order among values, and permit any one-to-one (injective) transformation. Ordinal measurements have imprecise differences between consecutive values, but have a meaningful order to those values, and permit any order-preserving transformation. Interval measurements have meaningful distances between measurements defined, but the zero value is arbitrary (as in the case with longitude and temperature measurements in Celsius or Fahrenheit), and permit any linear transformation. Ratio measurements have both a meaningful zero value and the distances between different measurements defined, and permit any rescaling transformation.
|
wikipedia
|
wiki_35358_chunk_8
|
Swiss Seismological Service
|
Research and teaching
Besides earthquake monitoring and the assessment of seismic hazard, the researchers of the SED are involved in numerous national and international research projects, which are largely financed by third parties. This guarantees the permanent exchange of information across national borders. Fields in which the SED researchers are involved include, for example, glacial and engineering seismology, static seismology, induced seismic activity, as well as the monitoring of landslides and seismotectonics. The main aim of research conducted at the SED is to gain a clearer understanding of earthquakes and their consequences and thereby contribute towards improving the response to such natural hazards, which pose a threat worldwide. At the same time, SED seeks novel ways of using seismological methods to find out more about fundamental processes that shape the Earth. The training of junior researchers also plays an important role for the SED. This is done with lectures and seminars that are integral parts of the teaching program at ETH, as well as through the supervision of master's and doctoral theses.
|
wikipedia
|
wiki_24667_chunk_3
|
Kabsch algorithm
|
Computation of the optimal rotation matrix
It is possible to calculate the optimal rotation based on the matrix formula but implementing a numerical solution to this formula becomes complicated when all special cases are accounted for (for example, the case of not having an inverse). If singular value decomposition (SVD) routines are available, the optimal rotation, , can be calculated using the following simple algorithm. First, calculate the SVD of the covariance matrix . Next, decide whether we need to correct our rotation matrix to ensure a right-handed coordinate system Finally, calculate our optimal rotation matrix, , as
|
wikipedia
|
wiki_25305_chunk_0
|
National Agricultural Safety Database
|
The National Ag Safety Database (NASD) was developed with funding from the United States National Institute for Occupational Safety and Health (NIOSH), the US Centers for Disease Control and Prevention, and the USDA Cooperative Extension Service (CES). The information contained in NASD was contributed by safety professionals and organizations from across the United States. Specifically, the objectives of the NASD project are: 1) to provide a national resource for the dissemination of information; 2) to educate workers and managers about occupational hazards associated with agriculture-related injuries, deaths and illnesses; 3) to provide prevention information; 4) to promote the consideration of safety and health issues in agricultural operations; and 5) to provide a convenient way for members of the agricultural safety and health community to share educational and research materials with their colleagues.
|
wikipedia
|
wiki_3711_chunk_10
|
600-cell
|
Polyhedral sections
The mutual distances of the vertices, measured in degrees of arc on the circumscribed hypersphere, only have the values 36° = , 60° = , 72° = , 90° = , 108° = , 120° = , 144° = , and 180° = 𝜋. Departing from an arbitrary vertex V one has at 36° and 144° the 12 vertices of an icosahedron, at 60° and 120° the 20 vertices of a dodecahedron, at 72° and 108° the 12 vertices of a larger icosahedron, at 90° the 30 vertices of an icosidodecahedron, and finally at 180° the antipodal vertex of V. These can be seen in the H3 Coxeter plane projections with overlapping vertices colored.
|
wikipedia
|
wiki_11119_chunk_4
|
Curvature invariant (general relativity)
|
In four dimensions, the Bel decomposition of the Riemann tensor, with respect to a timelike unit vector field , not necessarily geodesic or hypersurface orthogonal, consists of three pieces
the electrogravitic tensor
the magnetogravitic tensor
the topogravitic tensor
Because these are all transverse (i.e. projected to the spatial hyperplane elements orthogonal to our timelike unit vector field), they can be represented as linear operators on three-dimensional vectors, or as three by three real matrices. They are respectively symmetric, traceless, and symmetric (6,8,6 linearly independent components, for a total of 20). If we write these operators as E, B, L respectively, the principal invariants of the Riemann tensor are obtained as follows:
is the trace of E2 + L2 - 2 B BT,
is the trace of B ( E - L ),
is the trace of E L - B2.
|
wikipedia
|
wiki_17345_chunk_9
|
American Society for Cell Biology
|
San Francisco Declaration on Research Assessment
At the American Society for Cell Biology meeting in San Francisco in 2012, scientists developed the Declaration on Research Assessment, which calls for scientific output to be measured accurately and evaluated wisely. It also calls for scientists and institutions to reevaluate the use of impact factor to assess individual scientific efforts . References External links ASCB Education: iBiology - free online biology lectures
The ASCB Post Non-profit organizations based in Maryland
Biology societies
Scientific organizations established in 1960
1960 establishments in Maryland
|
wikipedia
|
wiki_12176_chunk_6
|
Scientific and Technological Research Council of Turkey
|
Following research centers and institutes are subordinate to TÜBİTAK:
Marmara Research Center (MAM)
Energy Institute
Food Institute
Chemical Technology Institute
Environment and Cleaner Production Institute
Materials Institute
Earth and Marine Sciences Institute
Genetic Engineering and Biotechnology Institute
Center of Research for Advanced Technologies of Informatics and Information Security (BILGEM)
Advanced Technologies Research Institute
National Research Institute of Electronics and Cryptology
Information Technologies Institute
Research Institute of Fundamental Sciences
Research Institute for Software Development
Cyber Security Institute
Defense Industries Research and Development Institute (SAGE)
Space Technologies Research Institute (UZAY)
National Metrology Institute (UME)
Turkish Institute of Management Sciences (TUSSIDE)
Technology Free Zone and Technopark
National Academic Network and Information Center (ULAKBİM)
Bursa Test and Analysis Laboratory (BUTAL)
National Observatory (TUG)
Rail Transport Technologies Institute (RUTE)
|
wikipedia
|
wiki_4258_chunk_17
|
Duality (mathematics)
|
From any three-dimensional polyhedron, one can form a planar graph, the graph of its vertices and edges. The dual polyhedron has a dual graph, a graph with one vertex for each face of the polyhedron and with one edge for every two adjacent faces. The same concept of planar graph duality may be generalized to graphs that are drawn in the plane but that do not come from a three-dimensional polyhedron, or more generally to graph embeddings on surfaces of higher genus: one may draw a dual graph by placing one vertex within each region bounded by a cycle of edges in the embedding, and drawing an edge connecting any two regions that share a boundary edge. An important example of this type comes from computational geometry: the duality for any finite set of points in the plane between the Delaunay triangulation of and the Voronoi diagram of . As with dual polyhedra and dual polytopes, the duality of graphs on surfaces is a dimension-reversing involution: each vertex in the primal embedded graph corresponds to a region of the dual embedding, each edge in the primal is crossed by an edge in the dual, and each region of the primal corresponds to a vertex of the dual. The dual graph depends on how the primal graph is embedded: different planar embeddings of a single graph may lead to different dual graphs. Matroid duality is an algebraic extension of planar graph duality, in the sense that the dual matroid of the graphic matroid of a planar graph is isomorphic to the graphic matroid of the dual graph.
|
wikipedia
|
wiki_29633_chunk_6
|
Hoko River Archeological Site
|
Wet site
Archaeologists have discovered a variety of artifacts from the wet site. Items including: basketry, cords, a variety of fishing hooks, a 3,000-year-old fishnet (which is constructed from split spruce boughs), tiny stone blades (with their original cedar handles still intact), wood working tools, anchor stones with binding, various hafted microliths (such as fish knives) and micro blades, carved wood art, a variety of wooden objects, animal bone, shellfish remains, and plant remains. The abundance of flatfish, roundfish, rockfish, and over 400 wooden offshore-fishing hooks found in the wet site suggest the presence of fisheries. The water at the wet site preserved artifacts that would have been lost under normal conditions. These items required particular care and were treated with an aqueous solution consisting of 50% white glue in order to keep them intact. Archeologists have also studied large vegetal mats at the wet site. Each layer in the mat represents 10 to 20 years elapsed. At least 45 of the layers found are from 3000 to 2600 B.P. These mats are also of interest as a means of analyzing the flora present at the time the site was inhabited.
|
wikipedia
|
wiki_28245_chunk_2
|
Stress functions
|
where is an arbitrary second-rank tensor field that is at least twice differentiable, and is known as the Beltrami stress tensor. Its components are known as Beltrami stress functions. is the Levi-Civita pseudotensor, with all values equal to zero except those in which the indices are not repeated. For a set of non-repeating indices the component value will be +1 for even permutations of the indices, and -1 for odd permutations. And is the Nabla operator. For the Beltrami stress tensor to satisfy the Beltrami-Michell compatibility equations in addition to the equilibrium equations, it is further required that is at least four times continuously differentiable.
|
wikipedia
|
wiki_28756_chunk_20
|
Computational creativity
|
Example of a simile: "Felt like a tiger-fur blanket."
The computational study of these phenomena has mainly focused on interpretation as a knowledge-based process. Computationalists such as Yorick Wilks, James Martin, Dan Fass, John Barnden, and Mark Lee have developed knowledge-based approaches to the processing of metaphors, either at a linguistic level or a logical level. Tony Veale and Yanfen Hao have developed a system, called Sardonicus, that acquires a comprehensive database of explicit similes from the web; these similes are then tagged as bona-fide (e.g., "as hard as steel") or ironic (e.g., "as hairy as a bowling ball", "as pleasant as a root canal"); similes of either type can be retrieved on demand for any given adjective. They use these similes as the basis of an on-line metaphor generation system called Aristotle that can suggest lexical metaphors for a given descriptive goal (e.g., to describe a supermodel as skinny, the source terms "pencil", "whip", "whippet", "rope", "stick-insect" and "snake" are suggested).
|
wikipedia
|
wiki_38870_chunk_20
|
Amateur flight simulation
|
FlightGear is a free and open-source flight simulator that also simulates space flight in Earth's orbit, and is actively maintained by a large user community. FlightGear is used in professionally in Aerospace engineering and research, with a flight dynamics engine (JSBSim) that is used in a 2015 NASA benchmark to judge new simulation code to the standards of the space industry, but is freely available to the amateur community. The FlightGear project receives development from people with scientific and engineering backgrounds, and is open to contributions from any source due to its nature. With regards to space flight, FlightGear can accurately handle speeds from transonic to high hypersonic or re-entry regimes with a flight dynamics engine that can incorporate windtunnel data or computational fluid dynamics, and uses a 3d model of gravity used for spaceflight based on spherical harmonics which can simulate the twisting force caused by gravity varying over a craft. Of particular note is FlightGear's Space Shuttle project, whose simulation is backed by NASA windtunnel data and is the most detailed and accurate simulation outside of NASA's internal ones. FlightGear also runs on Raspberri Pi from Pi 4 onwards through a special stripped down version.
Microsoft Flight Simulator series, Microsoft Flight Simulator X includes space as an area to be discovered, with a payware Space Shuttle add-on also being available. The series' latest installment, simply called Microsoft Flight Simulator, was released on August 18, 2020.
X-Plane, a realistic simulator developed by Laminar Research since 1993 which also includes a Space Shuttle and Mars flight simulators
Kerbal Space Program, spacecraft and aircraft construction and flight simulator; initially space-focused, but the addition of air-breathing engines and lift surfaces made atmospheric flight practical. The simulation is of a fictitious world and not based on the real world or solar system, and the idea is more to preserve some of the concepts of space flight while allowing entertaining gameplay
|
wikipedia
|
wiki_1797_chunk_6
|
Template metaprogramming
|
Compile-time class generation
What exactly "programming at compile-time" means can be illustrated with an example of a factorial function, which in non-template C++ can be written using recursion as follows:
unsigned factorial(unsigned n) {
return n == 0 ? 1 : n * factorial(n - 1);
}
|
wikipedia
|
wiki_27287_chunk_3
|
Insert (molecular biology)
|
History The field has expanded significantly since the publication in 1973 with biochemists Stanley N. Cohen and Herbert W. Boyer by using E. coli bacteria to learn how to cut fragments, rejoin different fragments, and insert the new genes. The field has expanded tremendously in terms of precision and accuracy since then. Computers and technology have made it technologically easier to achieve narrowing of error and expand understanding in this field. Computers having a high capacity for data and calculations which made processing the large volume of information tangible, i.e., the use of ChIP and gene sequence. Techniques and protocols
|
wikipedia
|
wiki_4624_chunk_9
|
Meander (mathematics)
|
The number of distinct semi-meanders of order n is the semi-meandric number Mn (usually denoted with an overline instead of an underline). The first fifteen semi-meandric numbers are given below . M1 = 1
M2 = 1
M3 = 2
M4 = 4
M5 = 10
M6 = 24
M7 = 66
M8 = 174
M9 = 504
M10 = 1406
M11 = 4210
M12 = 12198
M13 = 37378
M14 = 111278
M15 = 346846 Properties of meandric numbers
|
wikipedia
|
wiki_21394_chunk_4
|
Rhind Mathematical Papyrus
|
The first part of the Rhind papyrus consists of reference tables and a collection of 21 arithmetic and 20 algebraic problems. The problems start out with simple fractional expressions, followed by completion (sekem) problems and more involved linear equations (aha problems). The first part of the papyrus is taken up by the 2/n table. The fractions 2/n for odd n ranging from 3 to 101 are expressed as sums of unit fractions. For example, . The decomposition of 2/n into unit fractions is never more than 4 terms long as in for example .
|
wikipedia
|
wiki_4008_chunk_5
|
Glasgow Haskell Compiler
|
In the tradition of type-directed compilation, GHC's simplifier, or "middle end", where most of the optimizations implemented in GHC are performed, is structured as a series of source-to-source transformations on Core code. The analyses and transformations performed in this compiler stage include demand analysis (a generalization of strictness analysis), application of user-defined rewrite rules (including a set of rules included in GHC's standard libraries that performs foldr/build fusion), unfolding (called "inlining" in more traditional compilers), let-floating, an analysis that determines which function arguments can be unboxed, constructed product result analysis, specialization of overloaded functions, as well as a set of simpler local transformations such as constant folding and beta reduction.
|
wikipedia
|
wiki_21685_chunk_6
|
Connected Mathematics
|
While engaged in collaborative problem solving and classroom discourse about mathematics, students are explicitly encouraged to reflect on their use of what the NCTM standards called mathematics processes and the now refer to as mathematical practices—making sense of problems and solving them, reasoning abstractly and quantitatively, constructing arguments and critiquing reasoning of others, modeling with mathematics, using mathematical tools strategically, seeking and using structure, expressing regularity in repeated reasoning, and communicating ideas and results with precision.
|
wikipedia
|
wiki_36588_chunk_35
|
Psychological behaviorism
|
Psychological behaviorism's works project new basic and applied science at its various theory levels. The basic principles level, as one example, needs to study systematically the relationship of the classical conditioning of emotional responses and the operant conditioning of motor responses. As another projection, the field of child development should focus on the study of the learning of the basic repertoires. One essential is the systematic detailed study of the learning experiences of children in the home from birth on. He says such research could be accomplished by installing cameras in the homes of volunteering, remunerated families. This research should also be done to discover how such learning produces both normal and abnormal personality development. As another example, PB also calls for educational research into how school learning could be advanced using its methods and theories. Also, Staats' theory of human evolution is seen to call for research and theory developments.
|
wikipedia
|
wiki_38351_chunk_5
|
Quantum convolutional code
|
has support , weight three, delay one, and degree four. A sequence has finite support if its weight is finite. Let
denote the set of Pauli sequences with finite support. The following definition for a quantum convolutional code utilizes the set in its description. A rate -convolutional stabilizer code with is a commuting set of all -qubit shifts of a basic generator set . The basic generator set has
Pauli sequences of finite support: The constraint length of the code is the maximum degree of the
generators in . A frame of the code consists of qubits.
|
wikipedia
|
wiki_21574_chunk_6
|
Fortune's algorithm
|
Weighted sites may be used to control the areas of the Voronoi cells when using Voronoi diagrams to construct treemaps. In an additively weighted Voronoi diagram, the bisector between sites is in general a hyperbola, in contrast to unweighted Voronoi diagrams and power diagrams of disks for which it is a straight line. References External links
Steven Fortune's C implementation
Fortune's Voronoi algorithm implemented in C++
Fortune's algorithm implemented in JavaScript Computational geometry
Articles with example pseudocode
|
wikipedia
|
wiki_15388_chunk_16
|
Marcellus Empiricus
|
Thirty-six chapters on treatments, consisting mainly of recipes both pharmacological and magical, and arranged by convention anatomically a capite ad calcem (“from head to toe,” in the equivalent English expression) as were Marcellus's sources Scribonius Largus and the Medicina Plinii. The treatment chapters run to 255 pages in Niedermann's edition. Meyer lists 262 different plant names in Marcellus; allowing for synonyms, of which there are many, the number of plants mentioned would be around 131. About 25 of the botanicals most frequently prescribed are “exotica”’ such as galbanum, sagapenum, and ginger; these may have been available in Gaul as imports, but only to elite consumers. Other ingredients likely to have been rare for Marcellus’s intended audience include cinnamon, cloves, candied tragacanth, Alexandrian niter, and African snails, perhaps the Giant African land snail, which are prescribed live for pulping into a mélange. Availability is possibly a lesser criterion of selection for Marcellus than completeness and variety of interest.
And last, the Carmen de speciebus (“Song of Species”), a 78-line Latin hexameter poem on pharmacology, which Marcellus contrasts to his prose assemblage of prescriptions by asserting his originality in writing it.
|
wikipedia
|
wiki_23187_chunk_17
|
Unicode compatibility characters
|
Unicode also designates twenty-two (22) other letter-like symbols as compatibility characters.
Other Greek letter-based symbols (4): lunate epsilon (ϵ U+03F5), lunate sigma (ϲ U+03F2), capital lunate sigma (Ϲ U+03F9), upsilon with hook (ϒ U+03D2)
Mathematical constants (3): Euler constant (ℇ U+2107), Planck constant (ℎ U+210E), reduced Planck constant (ℏ U+210F),
Currency symbols (2): rupee sign (₨ U+20A8), rial sign (﷼ U+FDFC)
Punctuation (4): one dot leader (U+2024), no-break space (U+00A0), non-breaking hyphen (U+2011), Tibetan mark delimiter tsheg bstar (U+0F0C)
Other letter-like symbols (10): information source (ℹ U+2139), account of (℀ U+2100), addressed to the subject (℁ U+2101), care of (℅ U+2105), cada una (℆ U+2106), numero (№ U+2116), telephone sign (℡ U+2121), facsimile sign (℻ U+213B), trademark (™ U+2122), service mark (℠ U+2120)
|
wikipedia
|
wiki_29869_chunk_5
|
Virtual manipulatives for mathematics
|
Studies on the use of virtual manipulatives in mathematics for students with learning disabilities advocate the use of virtual manipulatives in mathematics for students with learning disabilities as it can favour: Practicality: Virtual manipulatives help where physical manipulation is not physically possible, it offers opportunities for repeated practice, it is accessible (i.e. accessed by phones, ipads, etc.) and cost effective (i.e. free or low cost).
|
wikipedia
|
wiki_4661_chunk_5
|
University of Engineering and Technology, Lahore
|
Faculty of Earth Sciences and Engineering
Department of Petroleum and Gas Engineering
Department of Mining Engineering
Department of Geological Engineering Faculty of Electrical Engineering
Department of Electrical Engineering
Department of Computer Engineering
Department of Computer Science Faculty of Mechanical Engineering
Department of Mechanical Engineering
Department of Automotive Engineering
Department of Industrial and Manufacturing Engineering
Department of Mechatronics and Control Engineering Faculty of Natural Sciences, Humanities and Islamic Studies
Department of Humanities, Social Sciences and Modern Languages
Department of Mathematics
Department of Physics
Department of Chemistry
Department of Islamic Studies
Institute of Business and Management (IBM) Research centers The university consists of following research centers:
|
wikipedia
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.