id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_10647_chunk_1
Clinical ecology
Clinical ecologists support a cause-and-effect relationships for non-specific symptoms reported by some people after low-dose exposure to chemical, biologic, or physical agents. This pattern of low-dose reaction is not generally accepted by toxicologists. Although some of the mainstream medical community continue to reject these claims, the concept is gaining some recognition under the modern and more clearly articulated classification of environmental medicine.
wikipedia
wiki_220_chunk_58
Field (mathematics)
These two types of local fields share some fundamental similarities. In this relation, the elements and (referred to as uniformizer) correspond to each other. The first manifestation of this is at an elementary level: the elements of both fields can be expressed as power series in the uniformizer, with coefficients in . (However, since the addition in is done using carrying, which is not the case in , these fields are not isomorphic.) The following facts show that this superficial similarity goes much deeper: Any first-order statement that is true for almost all is also true for almost all . An application of this is the Ax-Kochen theorem describing zeros of homogeneous polynomials in . Tamely ramified extensions of both fields are in bijection to one another. Adjoining arbitrary -power roots of (in ), respectively of (in ), yields (infinite) extensions of these fields known as perfectoid fields. Strikingly, the Galois groups of these two fields are isomorphic, which is the first glimpse of a remarkable parallel between these two fields:
wikipedia
wiki_11218_chunk_3
Psychological biblical criticism
The world behind the text What was the author of the text thinking? What was their background, why were they writing? What situations drove them to put pen to paper and produce this work? What is the cultural, historical, and social context of the text? Although traditional uses of psychological theory in the study of ancient texts have sought to generate a complete psychoanalysis of scriptural writers, there has always been the hindrance of temporal and cultural distance between the analyst and analysand. Psychological biblical criticism best serves not as a reductionistic tool, but as another heuristic for use alongside traditional methods of historical and cultural criticism, illuminating aspects of purpose and meaning in the language and cognition of texts (Kille, 2001: 22–23; 2004: 23–25). In essence, a study of the world behind the text involves such questions as "... what makes them write the way they do and what realities, truths, and insights they want to share with us." (Rollins, 1983: 99).
wikipedia
wiki_30093_chunk_4
Award Software
See also BIOS features comparison Phoenix Technologies References External links Award website (archive) Award Software has merged with Phoenix Technologies (archive) Unicore Software, Inc. (archive) Archives of Award Taiwan website (English) Taiwan Venutures Capital Corp · SC 13G · Award Software International Inc · On 2/14/97 Archives of AwardBIOS motherboard download page BIOS Software companies based in the San Francisco Bay Area Defunct companies based in the San Francisco Bay Area Defunct software companies of the United States Companies based in Mountain View, California Software companies established in 1983 Software companies disestablished in 1998 1998 mergers and acquisitions
wikipedia
wiki_5093_chunk_15
List of important publications in chemistry
Description: Unique very advanced and comprehensive coverage of every element known at the time by chapter describing all known compounds yet discovered or synthesised. Approaches chemistry as the study of elements and compounds without the later emphasis on bond theory and analysis. Importance: Inspired and instructed generations of English speaking scientists and students. Chemistry of the Elements N. N. Greenwood and A. Earnshaw Heinemann (later Elsevier), 1st Ed 1984, 2nd Ed 1997 Description: Unique comprehensive descriptive coverage of all the elements and their compounds, with a strong focus on 'real life' and industrial applications.
wikipedia
wiki_14338_chunk_79
Zero-energy building
California The State of California has proposed that all new low- and mid-rise residential buildings, and all new commercial buildings, be designed and constructed to ZNE standards beginning in 2020 and 2030, respectively. The requirements, if implemented, will be promulgated via the California Building Code, which is updated on a three-year cycle and which currently mandates some of the highest energy efficiency standards in the United States. California is anticipated to further increase efficiency requirements by 2020, thus avoiding the trends discussed above of building standard housing and achieving ZNE by adding large amounts of renewables. The California Energy Commission is required to perform a cost-benefit analysis to prove that new regulations create a net benefit for residents of the state. West Village, located on the University of California campus in Davis, California, was the largest ZNE-planned community in North America at the time of its opening in 2014. The development contains student housing for approximately 1,980 UC Davis students as well as leasable office space and community amenities including a community center, pool, gym, restaurant and convenience store. Office spaces in the development are currently leased by energy and transportation-related University programs. The project was a public-private partnership between the university and West Village Community Partnership LLC, led by Carmel Partners of San Francisco, a private developer, who entered into a 60-year ground lease with the university and was responsible for the design, construction, and implementation of the $300 million project, which is intended to be market-rate housing for Davis. This is unique as the developer designed the project to achieve ZNE at no added cost to themselves or to the residents. Designed and modeled to achieve ZNE, the project uses a mixture of passive elements (roof overhangs, well-insulated walls, radiant heat barriers, ducts in insulated spaces, etc.) as well as active approaches (occupancy sensors on lights, high-efficiency appliances and lighting, etc.). Designed to out-perform California's 2008 Title 24 energy codes by 50%, the project produced 87% of the energy it consumed during its first year in operation. The shortcoming in ZNE status is attributed to several factors, including improperly functioning heat pump water heaters, which have since been fixed. Occupant behavior is significantly different from that anticipated, with the all-student population using more energy on a per-capita basis than typical inhabitants of single-family homes in the area. One of the primary factors driving increased energy use appears to be the increased miscellaneous electrical loads (MEL, or plug loads) in the form of mini-refrigerators, lights, computers, gaming consoles, televisions, and other electronic equipment. The university continues to work with the developer to identify strategies for achieving ZNE status. These approaches include incentivizing occupant behavior and increasing the site's renewable energy capacity, which is a 4 MW photovoltaic array per the original design. The West Village site is also home to the Honda Smart Home US, a beyond-ZNE single-family home that incorporates cutting-edge technologies in energy management, lighting, construction, and water efficiency. The IDeAs Z2 Design Facility is a net zero energy, zero carbon retrofit project occupied since 2007. It uses less than one fourth the energy of a typical U.S. office by applying strategies such as daylighting, radiant heating/cooling with a ground-source heat pump and high energy performance lighting and computing. The remaining energy demand is met with renewable energy from its building-integrated photovoltaic array. In 2009, building owner and occupant Integrated Design Associates (IDeAs) recorded actual measured energy use intensity of per year, with per year produced, for a net of per year. The building is also carbon neutral, with no gas connection, and with carbon offsets purchased to cover the embodied carbon of the building materials used in the renovation. The Zero Net Energy Center, scheduled to open in 2013 in San Leandro, is to be a 46,000-square-foot electrician training facility created by the International Brotherhood of Electrical Workers Local 595 and the Northern California chapter of the National Electrical Contractors Association. Training will include energy-efficient construction methods. The Green Idea House is a net zero energy, zero-carbon retrofit in Hermosa Beach. George LeyVa Middle School Administrative Offices, occupied since fall 2011, is a net zero energy, net zero carbon emissions building of just over 9,000 square feet. With daylighting, variable refrigerant flow HVAC, and displacement ventilation, it is designed to use half of the energy of a conventional California school building, and, through a building-integrated solar array, provides 108% of the energy needed to offset its annual electricity use. The excess helps power the remainder of the middle school campus. It is the first publicly funded NZE K–12 building in California. The Stevens Library at Sacred Heart Schools in California is the first net-zero library in the United States, receiving Net Zero Energy Building status from the International Living Future Institute, part of the PG&E Zero Net Energy Pilot Project. The Santa Monica City Services Building is among the first net-zero energy, net-zero water public/municipal buildings in California. Completed in 2020, the 50,000-square-foot addition to the historic Santa Monica City Hall building was designed to provide its own energy and water, and to minimize energy use through efficient building systems. At 402,000 square-feet, the California Air Resources Board Southern California Headquarters - Mary D. Nichols Campus, is the largest net-zero energy facility in the United States. A photovoltaic system covers 204,903 square-feet between the facility rooftop and parking pavilions. The +3.5 megawatt system is anticipated to generate roughly 6,235,000 kWh reusable energy per year. The facility was dedicated on November 18, 2021.
wikipedia
wiki_26514_chunk_3
Genetic algorithm scheduling
Use of algorithms in scheduling In very complex problems such as scheduling there is no known way to get to a final answer, so we resort to searching for it trying to find a "good" answer. Scheduling problems most often use heuristic algorithms to search for the optimal solution. Heuristic search methods suffer as the inputs become more complex and varied. This type of problem is known in computer science as an NP-Hard problem. This means that there are no known algorithms for finding an optimal solution in polynomial time.
wikipedia
wiki_1016_chunk_7
Power series
Multiplication and division With the same definitions for and , the power series of the product and quotient of the functions can be obtained as follows: The sequence is known as the convolution of the sequences and For division, if one defines the sequence by then and one can solve recursively for the terms by comparing coefficients. Solving the corresponding equations yields the formulae based on determinants of certain matrices of the coefficients of and
wikipedia
wiki_36837_chunk_3
American Public Power Association
Activities APPA is the national advocate for public power in Washington, D.C., on legislative and regulatory issues, and in legal proceedings. APPA lobbies public power positions, and monitors and reports on federal events and activities. Its Legislative & Resolutions Committee gives all utility members an opportunity to develop consensus on issues, as do task forces, committees, and work groups. The annual Legislative Rally brings managers and policymakers to Washington, D.C., to tell the public power story. APPA provides programs and resources to help utilities adopt new technologies and improve customer service, reliability, safety, physical and cybersecurity, and disaster preparation efforts through programs such as the eReliability Tracker, the Public Power Safety Manual, and the Reliable Public Power Provider certification program. Public Power magazine and Public Power Daily newsletter are sources of information about public power and the industry. APPA’s website provides information for a variety of audiences. Specialized publications, reports, surveys, and Internet-based networking groups inform and educate in various utility disciplines. APPA offers many opportunities to learn from and network with colleagues, utility experts, and local and national policymakers. The annual National Conference is the largest public power meeting. Other annual meetings cover business and financial, engineering and operations, legal, community broadband, and customer and community services topics. APPA also conducts smaller professional-development courses and provides a variety of continuing education and consumer-oriented materials. The Demonstration of Energy-Efficient Developments (DEED) program provides grants to APPA-member utilities and students from public power communities. Projects explore techniques and technologies that could be widely applicable to public power. Major awards are given at APPA’s National Conference to executives and policymakers who have advanced public power’s goals, as well as to utilities that have met the highest standards. Throughout the year, others are recognized for safety records, reliability, annual reports, lineworker skills, continuing education, and dedication to energy innovation.
wikipedia
wiki_2915_chunk_15
Technological utopianism
Technology reflects and encourages the best aspects of human nature, fostering “communication, collaboration, sharing, helpfulness, and community.” Technology improves our interpersonal communication, relationships, and communities. Early Internet users shared their knowledge of the Internet with others around them. Technology democratizes society. The expansion of access to knowledge and skills led to the connection of people and information. The broadening of freedom of expression created “the online world...in which we are allowed to voice our own opinions.” The reduction of the inequalities of power and wealth meant that everyone has an equal status on the internet and is allowed to do as much as the next person. Technology inevitably progresses. The interactivity that came from the inventions of the TV remote control, video game joystick, computer mouse and computer keyboard allowed for much more progress. Unforeseen impacts of technology are positive. As more people discovered the Internet, they took advantage of being linked to millions of people, and turned the Internet into a social revolution. The government released it to the public, and its “social side effect… [became] its main feature.” Technology increases efficiency and consumer choice. The creation of the TV remote, video game joystick, and computer mouse liberated these technologies and allowed users to manipulate and control them, giving them many more choices. New technology can solve the problems created by old technology. Social networks and blogs were created out of the collapse of dot.com bubble businesses’ attempts to run pyramid schemes on users.
wikipedia
wiki_22939_chunk_17
Whitacre College of Engineering
Notable organizations Alpha Omega Epsilon sorority - Beta Alpha chapter Alpha Pi Mu chapter (Industrial Engineering Honor Society) American Institute of Chemical Engineers chapter American Society of Civil Engineers chapter American Society of Heating, Refrigeration and Air Conditioning Engineers American Society of Mechanical Engineers chapter Associated General Contractors chapter Association for Computing Machinery chapter Association of Women in Electrical Engineering chapter Chi Epsilon chapter (Civil Engineering Honor Society) Construction Specifications Institute chapter Engineers Without Borders chapter Eta Kappa Nu Gamma Nu chapter (Electrical Engineering Honor Society) Human Factors and Ergonomics Society chapter Institute of Electrical and Electronics Engineers chapter Institute of Industrial Engineers chapter National Society of Black Engineers chapter Omega Chi Epsilon Alpha Omicron chapter (Chemical Engineering Honor Society) Pi Epsilon Tau Gamma chapter (Petroleum Engineering Honor Society) Pi Tau Sigma Sigma Epsilon chapter (Mechanical Engineering Honor Society) Society of Automotive Engineers chapter Society of Engineering Technologists founding chapter Society of Hispanic Professional Engineers chapter Society of Manufacturing Engineers chapter Society of Petroleum Engineers chapter Society of Plastics Engineers chapter Society of Women Engineers chapter Tau Alpha Pi chapter (Engineering Technology Honor Society) Tau Beta Pi Texas Beta chapter (Engineering Honor Society) Texas Society of Professional Engineers chapter Upsilon Pi Epsilon Beta chapter (Computer Science Honor Society)
wikipedia
wiki_30953_chunk_13
Abraham Moles
Notes and references ↑ Notice d'autorité personne [archive] sur le site du catalogue général de la BnF ↑ Cf. Martial Robert, 1999, p. 138. Pierre Schaeffer, des transmissions à Orphée''. Paris, L'Harmattan, 416 p. ↑ https://web.archive.org/web/20150220050452/http://www.esprit68.org/misere.html [archive] ↑ catalogue.bibliothequedesociologie.cnrs.fr [archive] References
wikipedia
wiki_483_chunk_30
Polymath
Burns, Peter, "What makes a Renaissance Man?". Edmonds, David (August 2017). Does the world need polymaths?, BBC. Frost, Martin, "Polymath: A Renaissance Man". Grafton, A, "The World of the Polyhistors: Humanism and Encyclopedism", Central European History, 18: 31–47. (1985). Jaumann, Herbert, "Was ist ein Polyhistor? Gehversuche auf einem verlassenen Terrain", Studia Leibnitiana, 22: 76–89. (1990) . Mirchandani, Vinnie, "The New Polymath: Profiles in Compound-Technology Innovations", John Wiley & Sons. (2010). Twigger, Robert, "Anyone can be a Polymath" We live in a one-track world, but anyone can become a polymath – Robert Twigger | Aeon Essays. Waquet, F, (ed.) "Mapping the World of Learning: The 'Polyhistor' of Daniel Georg Morhof" (2000). Wiens, Kyle, "In defense of polymaths". Brown, Vincent Polymath-Info Portal.
wikipedia
wiki_7123_chunk_7
Downsampling (signal processing)
For completeness, we now mention that a possible, but unlikely, implementation of each phase is to replace the coefficients of the other phases with zeros in a copy of the h[•] array, process the original x[•] sequence at the input rate (which means multiplying by zeros), and decimate the output by a factor of M. The equivalence of this inefficient method and the implementation described above is known as the first Noble identity. It is sometimes used in derivations of the polyphase method. Anti-aliasing filter
wikipedia
wiki_5553_chunk_5
Canadian Mathematical Society
The CMS publishes ten issues per year of Crux Mathematicorum, which contains problem-solving challenges and techniques suitable for training in secondary school problem solving competitions such as the Canadian Mathematical Olympiad or the International Mathematical Olympiad. All past issues except the last five volumes are free to download and use. The CMS also publishes A Taste of Mathematics (ATOM), a series of small booklets on a variety of topics suitable for high school enrichment.
wikipedia
wiki_8361_chunk_6
Day–Stout–Warren algorithm
routine vine-to-tree(root, size) leaves ← size + 1 − 2⌊log2(size + 1))⌋ compress(root, leaves) size ← size − leaves while size > 1 compress(root, ⌊size / 2⌋) size ← ⌊size / 2⌋ routine compress(root, count) scanner ← root for i ← 1 to count child ← scanner.right scanner.right ← child.right scanner ← scanner.right child.right ← scanner.left scanner.left ← child Notes References Search trees Amortized data structures
wikipedia
wiki_9378_chunk_19
Structural equation modeling
General approach to SEM Although each technique in the SEM family is different, the following aspects are common to many SEM methods, as it can be summarized as a 4E framework by many SEM scholars like Alex Liu, that is 1) Equation (model or equation specification), 2) Estimation of free parameters, 3) Evaluation of models and model fit, 4) Explanation and communication, as well as execution of results. Model specification
wikipedia
wiki_32439_chunk_4
Electronic Network for Arab-West Understanding
The Center for Intercultural Dialogue and Translation (CIDT), an Egyptian not for profit company founded in 2005, the Arab-West Foundation in the Netherlands, an NGO founded in 2005 and the Center for Arab-West Understanding, an Egyptian NGO founded in 2007 were established to continue this work and work together on building and expanding the Arab-West Report electronic database with a thorough search system that provides readers with rapid insights into different ways of thinking and reporting from what most audiences are used to seeing. In 2007/2008, the Anna Lindh Foundation agreed to provide the necessary financial support that actualized the ENAWU project. Prior to that Arab-West Report was built without a standard platform and the databases of participating organizations were distributed on different platforms. In 2008, a portal was developed to link the web-based resources and archives belonging to 15 organizations. These were the organizations that had demonstrated commitment to aspects like intercultural, inter-faith, and dialogue-based activities. The essence of having the portal as searchable as possible was to make it easy for the specific users to access, retrieve, and share information which would be contributing to better understand issues as reported in contemporary media. Key to the ENAWU project was enhancing the search functions. CIDT developed an indexation system based on the Dewey classification system that university libraries worldwide use. Through this a user can search for topics and see how topics are related to each other. The purpose is showing users that reported items never stand on their own but must be understood in their wider context.
wikipedia
wiki_35156_chunk_6
Biology Today
Preston Adams Thomas Peter Bennett Konrad E. Bloch John Tyler Bonner Susan Bryant Frank Macfarlane Burnet Michael Crichton Elizabeth G. Cutter Max Delbrück Joyce A. F. Diener John E. Dowling John C. Eccles Leland N. Edmunds, Jr. J. S. Finlayson William Fishbein Paul Gebhard Terrell H. Hamilton Peter H. Hartline J. Woodland Hastings Jonathan Hodge John Holland Yashuo Hotta Tom D. Humphreys II Daniel H. Janzen William A. Jensen Robert W. Kistner Hans Adolf Krebs Lee H. Kronenberg Richard C. Lewontin Robert D. Lisk William F. Loomis, Jr. Vincent T. Marchesi Peter Marler Donald M. Maynard James L. McGaugh Stanley L. Miller James V. Neel David M. Phillips David M. Prescott Eugene Rabinowitch Roberts Rugh Howard A. Schneiderman Michael Soulé Paul S. G. Stein Payson R. Stevens Albert Szent-Györgyi J. Herbert Taylor Kenneth V. Thimann Jared Tinklenberg Gordon M. Tomkins Harold C. Urey James D. Watson J. S. Weiner Robert H. Whittaker
wikipedia
wiki_39433_chunk_12
Astrobiology Science and Technology for Exploring Planets
Works cited Billings, L. (2008, 01 22). About ASTEP. Retrieved from Astrobiology: https://web.archive.org/web/20100528091403/http://astrobiology.nasa.gov/astep/about/ Billings, L. (2008, 02 06). NASA Astrobiology Roadmap 2008. Retrieved from Astrobiology: https://web.archive.org/web/20100219093302/http://astrobiology.nasa.gov/roadmap/ Commodore, J. (2010, 02). NRA Proposers Guidebook - Final. Retrieved from NASA: http://www.hq.nasa.gov/office/procurement/nraguidebook/ German, C. (2009, 10 21). Astrobiology Magazine. Retrieved from Oases for Life on the Mid-Caymen Rise: http://www.astrobio.net/pressrelease/3287/oases-for-life-on-the-mid-caymen-rise Marinova, M. (2010, 02 01). Astrobiology Magazine. Retrieved from IceBite Blog: Saying Farewell to a Frozen World: http://www.astrobio.net/index.php?option=com_expedition&task=detail&id=3388&type=blog&pid=19 Peter Doran, P. C. (2010). RESULTS FROM ASTEP AND OTHER ASTROBIOLOGY FIELD CAMPAIGNS II. Schirber, M. (2010, 01 03). Astrobiology Magazine. Retrieved from First Fossil-Makers in Hot Water: http://www.astrobio.net/exclusive/3418/first-fossil-makers-in-hot-water Schirber, M. (2010, 02 15). Astrobiology Magazine. Retrieved from Detecting Our Martian Cousins: http://www.astrobio.net/exclusive/3401/detecting-our-martian-cousins
wikipedia
wiki_25892_chunk_3
Accounting software
Non-core modules Debt collection—where the company tracks attempts to collect overdue bills (sometimes part of accounts receivable) Electronic payment processing Expense—where employee business-related expenses are entered Inquiries—where the company looks up information on screen without any edits or additions Payroll—where the company tracks salary, wages, and related taxes Reports—where the company prints out data Timesheet—where professionals (such as attorneys and consultants) record time worked so that it can be billed to clients Purchase requisition—where requests for purchase orders are made, approved and tracked Reconciliation—compares records from parties at both sides of transactions for consistency Drill down Journals Departmental accounting Support for value added taxation Calculation of statutory holdback Late payment reminders Bank feed integration Document attachment system Document/Journal approval system
wikipedia
wiki_16503_chunk_26
Kőnig's theorem (graph theory)
Theorem for vertex-weighted graphs One can consider a graph in which each vertex v has a non-negative integer weight bv. The weight vector is denoted by b. The b-weight of a vertex-cover is the sum of bv for all v in the cover. A b-matching is an assignment of a non-negative integral weight to each edge, such that the sum of weights of edges adjacent to any vertex v is at most bv. Egervary's theorem can be extended, using a similar argument, to graphs that have both edge-weights w and vertex-weights b:In any edge-weighted vertex-weighted bipartite graph, the maximum w-weight of a b-matching equals the minimum b-weight of vertices in a w-vertex-cover.
wikipedia
wiki_331_chunk_75
Lambda calculus
Parallelism and concurrency The Church–Rosser property of the lambda calculus means that evaluation (β-reduction) can be carried out in any order, even in parallel. This means that various nondeterministic evaluation strategies are relevant. However, the lambda calculus does not offer any explicit constructs for parallelism. One can add constructs such as Futures to the lambda calculus. Other process calculi have been developed for describing communication and concurrency.
wikipedia
wiki_5974_chunk_17
Needleman–Wunsch algorithm
Different scoring matrices have been statistically constructed which give weight to different actions appropriate to a particular scenario. Having weighted scoring matrices is particularly important in protein sequence alignment due to the varying frequency of the different amino acids. There are two broad families of scoring matrices, each with further alterations for specific scenarios: PAM BLOSUM
wikipedia
wiki_21758_chunk_5
Global Energy Network Institute
Numerous articles have been published on and about the organization, the concept, and its personnel in the following publications. Some are in academic and professional publications: Simulation, (April, 1995) (A monthly peer-reviewed publication of the Society for Computer Simulation); New Scientist,(July, 1995); IEEE Power Engineering Review, (Several) (A monthly peer-reviewed publication of the IEEE); (GENI organized the ongoing series of Power Engineering Society panel sessions on various renewable energy technologies.); The Rotarian, April 2007, In Focus column on Peter Meisen and GENI;
wikipedia
wiki_8759_chunk_3
POWER4
Execution units The POWER4 implements a superscalar microarchitecture through high-frequency speculative out-of-order execution using eight independent execution units. They are: two floating-point units (FP1-2), two load-store units (LD1-2), two fixed-point units (FX1-2), a branch unit (BR), and a conditional-register unit (CR). These execution units can complete up to eight operations per clock (not including the BR and CR units):
wikipedia
wiki_14220_chunk_7
Yerevan Physics Institute
Experimental physics workshops are also parts of the institute. The main fields of research are: elementary particle physics nuclear physics cosmic ray physics and astrophysics theoretical physics condensed matter physics radiobiology Isotop investigation and production computer networking, computing educational programme Directors Artem Alikhanian (1943-1973) Andrey Amatuni (1973-1992) Ruben Mkrtchyan (1992-2001) Hrachia Asatryan (2001-2008) Ashot Chilingarian (2008–2018) Ani Aprahamian (2018–present) References External links
wikipedia
wiki_31460_chunk_8
Data vault modeling
It is necessary to evolve the specification to include the new components, along with the best practices in order to keep the EDW and BI systems current with the needs and desires of today's businesses. History Data vault modeling was originally conceived by Dan Linstedt in the 1990s and was released in 2000 as a public domain modeling method. In a series of five articles on The Data Administration Newsletter the basic rules of the Data Vault method are expanded and explained. These contain a general overview, an overview of the components, a discussion about end dates and joins, link tables, and an article on loading practices.
wikipedia
wiki_8832_chunk_12
Loop dependence analysis
Loop-carried dependence vs. loop independent dependence Loop-carried dependencies and loop independent dependencies are determined by the relationships between statements in iterations of a loop. When a statement in one iteration of a loop depends in some way on a statement in a different iteration of the same loop, a loop-carried dependence exists. However, if a statement in one iteration of a loop depends only on a statement in the same iteration of the loop, this creates a loop independent dependence. // Code block 1 // Code block 2 for (i = 1; i <= 4; i++) for (i = 0; i < 4; i++) S1: b[i] = 8; S1: b[i] = 8; S2: a[i] = b[i-1] + 10; S2: a[i] = b[i] + 10;In this example, code block 1 shows loop-dependent dependence between statement S2 iteration i and statement S1 iteration i-1. This is to say that statement S2 cannot proceed until statement S1 in the previous iteration finishes. Code block 2 show loop independent dependence between statements S1 and S2 in the same iteration.
wikipedia
wiki_37649_chunk_3
Physical neural network
Alex Nugent describes a physical neural network as one or more nonlinear neuron-like nodes used to sum signals and nanoconnections formed from nanoparticles, nanowires, or nanotubes which determine the signal strength input to the nodes. Alignment or self-assembly of the nanoconnections is determined by the history of the applied electric field performing a function analogous to neural synapses. Numerous applications for such physical neural networks are possible. For example, a temporal summation device can be composed of one or more nanoconnections having an input and an output thereof, wherein an input signal provided to the input causes one or more of the nanoconnection to experience an increase in connection strength thereof over time. Another example of a physical neural network is taught by U.S. Patent No. 7,039,619 entitled "Utilized nanotechnology apparatus using a neural network, a solution and a connection gap," which issued to Alex Nugent by the U.S. Patent & Trademark Office on May 2, 2006.
wikipedia
wiki_35666_chunk_22
Format-preserving encryption
Hasty Pudding Cipher The Hasty Pudding Cipher uses custom constructions (not depending on existing block ciphers as primitives) to encrypt arbitrary finite small domains. The FFSEM/FFX mode of AES The FFSEM mode of AES (specification) that has been accepted for consideration by NIST uses the Feistel network construction of Black and Rogaway described above, with AES for the round function, with one slight modification: a single key is used and is tweaked slightly for each round.
wikipedia
wiki_862_chunk_15
Philosophiæ Naturalis Principia Mathematica
Book 3, De mundi systemate Book 3, subtitled De mundi systemate (On the system of the world), is an exposition of many consequences of universal gravitation, especially its consequences for astronomy. It builds upon the propositions of the previous books, and applies them with further specificity than in Book 1 to the motions observed in the Solar System. Here (introduced by Proposition 22, and continuing in Propositions 25–35) are developed several of the features and irregularities of the orbital motion of the Moon, especially the variation. Newton lists the astronomical observations on which he relies, and establishes in a stepwise manner that the inverse square law of mutual gravitation applies to Solar System bodies, starting with the satellites of Jupiter and going on by stages to show that the law is of universal application. He also gives starting at Lemma 4 and Proposition 40 the theory of the motions of comets, for which much data came from John Flamsteed and Edmond Halley, and accounts for the tides, attempting quantitative estimates of the contributions of the Sun and Moon to the tidal motions; and offers the first theory of the precession of the equinoxes. Book 3 also considers the harmonic oscillator in three dimensions, and motion in arbitrary force laws.
wikipedia
wiki_19395_chunk_1
Functional reactive programming
FRP has taken many forms since its introduction in 1997. One axis of diversity is discrete vs. continuous semantics. Another axis is how FRP systems can be changed dynamically. Continuous The earliest formulation of FRP used continuous semantics, aiming to abstract over many operational details that are not important to the meaning of a program. The key properties of this formulation are:
wikipedia
wiki_1073_chunk_46
ANSI escape code
Users can employ escape codes in their scripts by including them as part of standard output or standard error. For example, the following GNU sed command embellishes the output of the make command by displaying lines containing words starting with "WARN" in reverse video and words starting with "ERR" in bright yellow on a dark red background (letter case is ignored). The representations of the codes are highlighted. make 2>&1 | sed -e 's/.*\bWARN.*/\x1b[7m&\x1b[0m/i' -e 's/.*\bERR.*/\x1b[93;41m&\x1b[0m/i'
wikipedia
wiki_37940_chunk_4
Clinical Systems and Networks
“Set of interdependent elements interacting to achieve a common aim. These elements may be both human and nonhuman (equipment, technologies, etc.).” Source: Kohn, L.T., Corrigan, J.M., Donaldson, M.S. (Eds). Committee on Quality of Health Care in America, Institute of Medicine. (2000) To Err is Human. Building a Safer Health System. National Academy Press, Washington. (p. 211)
wikipedia
wiki_2250_chunk_16
Oz (programming language)
Lazy evaluation gives the possibility of storing truly infinite data structures in Oz. The power of lazy evaluation can be seen from the following code sample: declare fun lazy {Merge Xs Ys} case Xs#Ys of (X|Xr)#(Y|Yr) then if X < Y then X|{Merge Xr Ys} elseif X>Y then Y|{Merge Xs Yr} else X|{Merge Xr Yr} end end end
wikipedia
wiki_17220_chunk_3
Chemical computer
Current research In 1989 it was demonstrated how light-sensitive chemical reactions could perform image processing. This led to an upsurge in the field of chemical computing. Andrew Adamatzky at the University of the West of England has demonstrated simple logic gates using reaction–diffusion processes. Furthermore, he has theoretically shown how a hypothetical "2+ medium" modelled as a cellular automaton can perform computation. Adamatzky was inspired by a theoretical article on computation by using balls on a billiard table to transfer this principle to the BZ-chemicals and replace the billiard balls with waves: if two waves meet in the solution, they create a third wave which is registered as a 1. He has tested the theory in practice and is working to produce some thousand chemical versions of logic gates to create a chemical pocket calculator. One of the problems with the present version of this technology is the speed of the waves; they only spread at a rate of a few millimeters per minute. According to Adamatzky, this problem can be eliminated by placing the gates very close to each other, to make sure the signals are transferred quickly. Another possibility could be new chemical reactions where waves propagate much faster.
wikipedia
wiki_11603_chunk_1
Computational Chemistry List
History The CCL is a mailing list, portal, and community which brings together people interested in computational chemistry. It was formed in 1991 by initiative of Jan Labanowski, at the time a computational chemistry specialist in the Ohio Supercomputing Center, as a mailing list for the hundred persons who had participated in a workshop he had organized together with one of the founding fathers of the field, Charles Bender. The purpose of the list as first created was to continue the lively discussions and encounters that had taken place in the workshop and help grow the field which was accelerating due to the recent availability of maturing quantum, classical and semi-empirical methods, of supercomputers and their power, of personal computers and their flexibility and interoperability, of promising software packages bound to occupy a market niche in the chemical and pharmaceutical industry.
wikipedia
wiki_947_chunk_42
Technological singularity
According to Eliezer Yudkowsky, a significant problem in AI safety is that unfriendly artificial intelligence is likely to be much easier to create than friendly AI. While both require large advances in recursive optimisation process design, friendly AI also requires the ability to make goal structures invariant under self-improvement (or the AI could transform itself into something unfriendly) and a goal structure that aligns with human values and does not automatically destroy the human race. An unfriendly AI, on the other hand, can optimize for an arbitrary goal structure, which does not need to be invariant under self-modification. proposes an AI design that avoids several dangers including self-delusion, unintended instrumental actions, and corruption of the reward generator. He also discusses social impacts of AI and testing AI. His 2001 book Super-Intelligent Machines advocates the need for public education about AI and public control over AI. It also proposed a simple design that was vulnerable to corruption of the reward generator.
wikipedia
wiki_362_chunk_36
Molecular nanotechnology
Drexler argues that we may need to wait until our conventional nanotechnology improves before solving these issues: "Molecular manufacturing will result from a series of advances in molecular machine systems, much as the first Moon landing resulted from a series of advances in liquid-fuel rocket systems. We are now in a position like that of the British Interplanetary Society of the 1930s which described how multistage liquid-fueled rockets could reach the Moon and pointed to early rockets as illustrations of the basic principle." However, Freitas and Merkle argue that a focused effort to achieve diamond mechanosynthesis (DMS) can begin now, using existing technology, and might achieve success in less than a decade if their "direct-to-DMS approach is pursued rather than a more circuitous development approach that seeks to implement less efficacious nondiamondoid molecular manufacturing technologies before progressing to diamondoid".
wikipedia
wiki_7487_chunk_3
Electronic communication network
ECNs have complicated stock exchanges through their interaction with NASDAQ. One of the key developments in the history of ECNs was the NASDAQ over-the-counter quotation system. NASDAQ was created following a 1969 American Stock Exchange study which estimated that errors in the processing of handwritten securities orders cost brokerage firms approximately $100 million per year. The NASDAQ system automated such order processing and provided brokers with the latest competitive price quotes via a computer terminal. In March 1994, a study by two economists, William Christie and Paul Schultz, noted that NASDAQ bid–ask spreads were larger than was statistically likely, indicating "We are unable to envision any scenario in which 40 to 60 dealers who are competing for order flow would simultaneously and consistently avoid using odd-eighth quotes without an implicit agreement to post quotes only on the even price fractions. However, our data do not provide direct evidence of tacit collusion among NASDAQ market makers".
wikipedia
wiki_19831_chunk_2
Artificial intelligence systems integration
Why integration? The focus on systems integration, especially with regard to modular approaches, derive from the fact that most intelligences of significant scales are composed of a multitude of processes and/or utilize multi-modal input and output. For example, a humanoid-type of intelligence would preferably have to be able to talk using speech synthesis, hear using speech recognition, understand using a logical (or some other undefined) mechanism, and so forth. In order to produce artificially intelligent software of broader intelligence, integration of these modalities is necessary. Challenges & solutions
wikipedia
wiki_16270_chunk_7
Carrara (software)
Version 8.5 Native DSON importer Native auto-fit and improved fit-to-functionality for figures' clothing and accessories Improved sequencer, key-framing, and animation tools "Smart" content and CMS integration Animation commands — "Zero", "Memorise", "Restore" (for figures, selections, and selection trees) Improved representation of lights in viewport (spot, sun, moon, tube, and shape lights) Shader additions (Multi-Layer Shader and Elements)
wikipedia
wiki_3646_chunk_0
Astrophysics Data System
The SAO/NASA Astrophysics Data System (ADS) is an online database of over 16 million astronomy and physics papers from both peer reviewed and non-peer reviewed sources. Abstracts are available free online for almost all articles, and full scanned articles are available in Graphics Interchange Format (GIF) and Portable Document Format (PDF) for older articles. It was developed by the National Aeronautics and Space Administration (NASA), and is managed by the Smithsonian Astrophysical Observatory.
wikipedia
wiki_23168_chunk_3
Agent-based computational economics
The method has benefited from continuing improvements in modeling techniques of computer science and increased computer capabilities. The ultimate scientific objective of the method is to "test theoretical findings against real-world data in ways that permit empirically supported theories to cumulate over time, with each researcher’s work building appropriately on the work that has gone before." The subject has been applied to research areas like asset pricing, competition and collaboration, transaction costs, market structure and industrial organization and dynamics, welfare economics, and mechanism design, information and uncertainty, macroeconomics, and Marxist economics.
wikipedia
wiki_29571_chunk_2
George W. Woodruff School of Mechanical Engineering
The G.W. Woodruff School occupies eight buildings, most of which are located in west campus. Fuller E. Callaway Jr. Manufacturing Research Center (MARC) Integrated Acoustics Laboratory (anechoic-chamber) Manufacturing, CAE/Design, and Automation/ Mechatronics research groups Manufacturing Related Disciplines Complex (MRDC) Tribology and Mechanics of Materials research groups Student machine shops including "Invention Studio" J. Erskine Love Jr. Manufacturing Building (MRDC II) Underwater acoustics tank, wind tunnel, and MEMS clean room Acoustics, Fluid Mechanics, Heat Transfer, and MEMS research groups Frank H. Neely Research Center Nuclear and Radiological Engineering/Medical Physics program Fission, Fusion, and Medical Physics research groups Parker H. Petit Biotechnology Building Bioengineering research group Institute of Paper Science and Technology Heat Transfer research group Robert C. Williams Paper Museum IPST Centennial Engineering Building Student Competition Center (Tin Building) Houses various student competition groups, including GT motorsports, GT Off-Road (the SAE-baja team), Robojackets and Wreck Racing
wikipedia
wiki_38249_chunk_48
Algorithmic skeleton
Two type of components are presented in. Scientific Components (SC) which provide the functional code; and Communication Aspect Components (CAC) which encapsulate non-functional behavior such as communication, distribution processor layout and replication. For example, SC components are connected to a CAC component which can act as a manager at runtime by dynamically re-mapping processors assigned to a SC. A use case showing improved performance when using CAC components is shown in.
wikipedia
wiki_13795_chunk_2
Science and Development Network
The SciDev.Net website is made up of a global and six regional editions. SciDev.Net publishes in four languages: English, Spanish, French and Arabic. Content includes: News, Analysis, Multimedia, Practical Guides, Learning Series reports, Opinions editorials, Spotlights and Data Visualisations. News: SciDev.Net's news coverage is at the heart of its website and articles are added daily. Freelance journalists throughout the developing world write much of this material and work closely with a team of editors to ensure timely and accurate coverage of breaking news.
wikipedia
wiki_39391_chunk_3
Unimolecular ion decomposition
A rate constant of 106 s−1 is sufficiently fast for ion decomposition within the ion source of a typical mass spectrometer. Ions with rate constants less than 106 s−1 and greater than approximately 105 s−1 (lifetimes between 10−5 and 10−6 s) have a high probability of decomposing in the mass spectrometer between the ion source and the detector. These rate constants are indicated in the Wahrhaftig diagram by the log k = 5 and log k = 6 dashed lines.
wikipedia
wiki_51_chunk_46
Biostatistics
As a summary, some points about the application of quantitative genetics are: This has been used in agriculture to improve crops (Plant breeding) and livestock (Animal breeding). In biomedical research, this work can assist in finding candidates gene alleles that can cause or influence predisposition to diseases in human genetics Expression data
wikipedia
wiki_507_chunk_0
Code refactoring
In computer programming and software design, code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behavior. Refactoring is intended to improve the design, structure, and/or implementation of the software (its non-functional attributes), while preserving its functionality. Potential advantages of refactoring may include improved code readability and reduced complexity; these can improve the source codes maintainability and create a simpler, cleaner, or more expressive internal architecture or object model to improve extensibility. Another potential goal for refactoring is improved performance; software engineers face an ongoing challenge to write programs that perform faster or use less memory.
wikipedia
wiki_7173_chunk_25
Corecursion
In "Programming with streams in Coq: a case study: the Sieve of Eratosthenes" we find hd (conc a s) = a tl (conc a s) = s (sieve p s) = if div p (hd s) then sieve p (tl s) else conc (hd s) (sieve p (tl s))
wikipedia
wiki_11655_chunk_2
List of ISO 639-2 codes
*Synonyms for terminology applications (ISO 639-2/T) and for *bibliographic applications (ISO 639-2/B) Notes See also Lists of ISO 639 codes References External links ISO 639-2:1998 - ISO.org ISO 639-2 Registration Authority - Library of Congress ISO 639-2 codes, List of
wikipedia
wiki_34696_chunk_6
Sri Ramakrishna Engineering College
Non Technical Entrepreneurship Development Cell (EDC) English Literary Society (ELS) Tamil Mandram Fine Arts Club (FAC) Quiz club(Q'Zenith) Philately and Numismatics Club Red Ribbon Club Sports Nature Club Library The total area of the Library is 35172 Sq. ft (3269 sq. m) with a seating capacity of 100 General Reference: 40 Journals Section. Total No.of Titles: 17273 Total no.of Volumes: 52221 Digital Library Language Laboratory
wikipedia
wiki_20700_chunk_3
ECL programming language
An ECL procedure for computing the greatest common divisor of two integers according to the Euclidean algorithm could be defined as follows: gcd <- EXPR(m:INT BYVAL, n: INT BYVAL; INT) BEGIN DECL r:INT; REPEAT r <- rem(m, n); r = 0 => n; m <- n; n <- r; END; END This is an assignment of a procedure constant to the variable gcd. The line EXPR(m:INT BYVAL, n: INT BYVAL; INT)
wikipedia
wiki_13731_chunk_8
Foreign function interface
# Equivalent to: floor(3.14159); floor.call(3.14159) #=> 3.0 Python provides the ctypes and cffi modules. For example, the ctypes module can load C functions from shared libraries/DLLs on-the-fly and translate simple data types automatically between Python and C semantics as follows: import ctypes libc = ctypes.CDLL('/lib/libc.so.6') # Under Linux/Unix t = libc.time(None) # Equivalent C code: t = time(NULL) print(t) P/Invoke, which provides an interface between the Microsoft Common Language Runtime and native code. Racket has a native FFI based heavily on macros that enables importing arbitrary shared libraries dynamically. Raku can call Ruby, Python, Perl, Brainfuck, Lua, C, C++, Go and Scheme Guile/Gambit Rust also defines a foreign function interface. Visual Basic has a declarative syntax that allows it to call non-Unicode C functions. One of the bases of the Component Object Model is a common interface format, which natively uses the same types as Visual Basic for strings and arrays. LuaJIT, a just-in-time implementation of Lua, has an FFI that allows "calling external C functions and using C data structures from pure Lua code". PhoneGap (was called by the name Apache Callback, but now Apache Cordova) is a platform for building native mobile applications using HTML, CSS and JavaScript. Additionally has FFIs via JavaScript callback functions for access to methods and properties of mobile phone's native features including Accelerometer, Camera (also PhotoLibrary and SavedPhotoAlbum), Compass, Storage (SQL database and localStorage), Notification, Media and Capture (playing and recording or audio and video), File, Contacts (address book), Events, Device and Connection information.,. Wolfram Language provides a technology called WSTP (Wolfram Symbolic Transfer Protocol) which enables bidirectional calling of code between other languages with bindings for C++, Java, .NET and other languages. Zig provides FFI to c using the builtin function. In addition, many FFIs can be generated automatically: for example, SWIG. However, in the case of an extension language a semantic inversion of the relationship of guest and host can occur, when a smaller body of extension language is the guest invoking services in the larger body of host language, such as writing a small plugin for GIMP.
wikipedia
wiki_9113_chunk_5
Australian Speleological Federation
ASF's contribution to cave and karst protection ASF has contributed to protection of the cave and karst environment by: Consulting on environmental management issues to Commonwealth, New South Wales, Tasmanian, Victorian, South Australia, Western Australia and Northern Territory government instrumentalities; Publishing a respected, biennial peer-refereed journal reporting scientific research (Helictite) Developing an electronic database of over 10,000 cave and karst features in Australia; Cooperating with or lobbying other bodies for better educational and conservation practices e.g. Australian Geological Survey Organisation, Australian Army, Karst & Geodiversity Unit. Through its tax-deductible public fund and occasional government grants e.g. from the Natural Heritage Trust, ASF conducts programs and projects to raise community awareness of karst-related environmental issues, especially those of national or regional significance. ASF does not receive any ongoing public funding, and has no paid staff and the members act in a purely voluntary capacity. In addition, by the same means and by persuasion and example it encourages member societies and individuals to undertake practical cave conservation and protection measures in co-operation with owners and managers.
wikipedia
wiki_16962_chunk_1
List of Texas Civil War Confederate units
Infantry 1st Infantry (2nd Infantry, Ragged Old First) Company A (Marion Guards) Company B (Livingston Guards) Company C (Palmer Guards) Company D (Star Rifles) Company E (Corsicana Invincibles; Marshall Guards) Company F (Woodsville Rifles) Company G (Anderson Co. Guards; Reagan Guards) Company H (Texas Guards) Company I (Crockett Southerns) Company K (Daniel Boone Rifles; Texas Invincibles) Company L (Lone Star Rifles) Company M (Sumter Light Infantry) 1st Infantry, Consolidated (6th, 7th & 10th Infantry, 15th, 17th, 18th, 24th & 25th Cavalry) 2nd Infantry (Moore's 1st Infantry; Galveston Regiment; Van Dorn Regiment) Company A (San Jacinto Guards) Company B (Confederate Guards) Company C (Bayland Guards) Company D (Confederate Grays) Company E Company F (Mounted Riflemen) Company G (Burleson Guards) Company H (Lexington Grays) Company I (Gonzales Invincibles; Wilson Rifles) 3rd Infantry (Luckett's 1st Infantry) Company A (Gillespie Rifles) Company B Company C (Lone Star Defenders) 4th Infantry (Hood's Regiment; John Bell Regiment) 5th Infantry (Archer's Regiment) 6th Infantry (Likens's Battalion; Garland's Regiment; 1st Infantry, Consolidated) 7th Infantry (Gregg's Regiment; 1st Infantry, Consolidated) Company A (Waco Guards) Company B (Johnson Guards) Company C Company E (Cherokee Rifles) Company A (Van Dorn Guards) Company B (Ruess Battery) 8th Infantry (Hobby`s) 9th Infantry (Young's; Maxey's 8th Infantry) Company A (German Citizen Guards) Company B (Galveston Guards; German Citizen Guards) Company C (German Citizen Guards) Company D (Cypress Rifles) 9th Infantry (Nichols's 5th Infantry) (6 months) 10th Infantry (Nelson's Regiment; 1st Infantry, Consolidated) Company A (Grimes Boys) Company C (Alvarado Rifles) Company D (Wilson's Guards) Company G (Labadie Rifles) Company H (Coryell Yankee Hunters) 11th Infantry (Roberts's Rangers) Company A (Engledow's Texas Rebels) Company D (Titus Hunters) 12th Infantry (Young's 8th Infantry) Company A (Lavaca County) Company B (Nacogdoches County) Company C (Robertson County) Company D (Grimes County) Company E (Tarrent County) Company F (Milam County) Company G (Grime County) Company I (Freestone County) Company K (Hill County) 13th Infantry (Bates's Infantry Battalion) Company A (Austin Grays) Company B (Perkins' 1st Company; Austin Grays) Company D (Moseley's Battery) Company E Company G (Brazoria Rangers) Company H (Field Battery) 14th Infantry (Clark's Regiment) Company D 15th Infantry (Speight's Regiment) Company E (Navarro Countians) Company G (Fouty's Company) 16th Infantry (Flournoy's 7th Infantry) 17th Infantry (Allen's Regiment) 18th Infantry (Ochiltree's Regiment) 19th Infantry (Waterhouse's Regiment) 20th Infantry (Elmore's Regiment) 21st Infantry (Speight's Battalion; Swamp Angels; Spaight's Regiment) Company A (Sabine Pass Guard) Company B Company C Company D Company E Company F 22nd Infantry (Hubbard's Battalion) Company F 1st Infantry Battalion (15th Infantry) 1st Infantry Battalion (Burnet's Sharp Shooters) 4th Infantry Battalion (Oswald's German Battalion) (6 months) 5th Infantry Battalion (22nd Infantry) 6th Infantry Battalion (11th Infantry & Cavalry Battalion) 8th Infantry Battalion (Hobby's Battalion; 8th Infantry) 21st Infantry Battalion (Griffin's Battalion; 21st Infantry)
wikipedia
wiki_72_chunk_19
Combinatorics
In probabilistic combinatorics, the questions are of the following type: what is the probability of a certain property for a random discrete object, such as a random graph? For instance, what is the average number of triangles in a random graph? Probabilistic methods are also used to determine the existence of combinatorial objects with certain prescribed properties (for which explicit examples might be difficult to find), simply by observing that the probability of randomly selecting an object with those properties is greater than 0. This approach (often referred to as the probabilistic method) proved highly effective in applications to extremal combinatorics and graph theory. A closely related area is the study of finite Markov chains, especially on combinatorial objects. Here again probabilistic tools are used to estimate the mixing time.
wikipedia
wiki_32944_chunk_33
Catalog of articles in probability theory
Almost surely / (1:C) (LS:D) Gambler's ruin / gmb (L:D) Loop-erased random walk / (L:D) (U:C) Preferential attachment / (L:D) Random walk / (FLS:BD) (U:C) Typical set / (L:D) Real-valued, arbitrary (L:R) Convergence of random variables / (LS:R) Law of large numbers / (LS:R) Maximum likelihood / (FL:R) Stochastic convergence / (LS:R)
wikipedia
wiki_17683_chunk_1
Faugère's F4 and F5 algorithms
The Faugère F5 algorithm first calculates the Gröbner basis of a pair of generator polynomials of the ideal. Then it uses this basis to reduce the size of the initial matrices of generators for the next larger basis: If Gprev is an already computed Gröbner basis (f2, …, fm) and we want to compute a Gröbner basis of (f1) + Gprev then we will construct matrices whose rows are m f1 such that m is a monomial not divisible by the leading term of an element of Gprev. This strategy allows the algorithm to apply two new criteria based on what Faugère calls signatures of polynomials. Thanks to these criteria, the algorithm can compute Gröbner bases for a large class of interesting polynomial systems, called regular sequences, without ever simplifying a single polynomial to zero—the most time-consuming operation in algorithms that compute Gröbner bases. It is also very effective for a large number of non-regular sequences.
wikipedia
wiki_2936_chunk_1
Functional equation
(Euler's reflection formula) The functional equation where are integers satisfying , i.e. = 1, defines to be a modular form of order . Miscellaneous examples, not necessarily involving standard or named functions: (Cauchy's functional equation), satisfied by linear maps satisfied by all exponential functions , satisfied by all logarithmic functions , satisfied by all power functions (quadratic equation or parallelogram law) (Jensen) (d'Alembert) (Abel equation) (Schröder's equation). (Böttcher's equation). (Julia's equation). (Translation equation) (Levi-Civita), and the pair of equations (sine addition formula and hyperbolic sine addition formula), (cosine addition formula), (hyperbolic cosine addition formula). A simple form of functional equation is a recurrence relation. This, formally speaking, involves unspecified functions on integers and also shift operators. One such example of a recurrence relation is The commutative and associative laws are functional equations. In its familiar form, the associative law is expressed by writing the binary operation in infix notation, but if we write f(a, b) instead of then the associative law looks more like a conventional functional equation,
wikipedia
wiki_22800_chunk_13
BLAT (bioinformatics)
For each search result, the user is provided with a link to the UCSC Genome Browser so they can visualise the alignment on the chromosome. This a major benefit of the web-based BLAT over the stand-alone BLAT. The user is able to obtain biological information associated with the alignment, such as information about the gene to which the query may match. The user is also provided with a link to view the alignment of the query sequence with the genome assembly. The matches between the query and genome assembly are blue and the boundaries of the alignments are lighter in colour. These exon boundaries indicate splice sites. The "I'm feeling lucky" search result returns the highest scoring alignment for the first query sequence based on the output sort option selected by the user.
wikipedia
wiki_639_chunk_26
Supercomputer
While in a traditional multi-user computer system job scheduling is, in effect, a tasking problem for processing and peripheral resources, in a massively parallel system, the job management system needs to manage the allocation of both computational and communication resources, as well as gracefully deal with inevitable hardware failures when tens of thousands of processors are present. Although most modern supercomputers use Linux-based operating systems, each manufacturer has its own specific Linux-derivative, and no industry standard exists, partly due to the fact that the differences in hardware architectures require changes to optimize the operating system to each hardware design. Software tools and message passing
wikipedia
wiki_22723_chunk_0
Archaeological Seminars Institute
Archaeological Seminars Institute, Ltd. is a private company based in Jerusalem, Israel that deals with archaeology and tourism. Founded in 1981 by archaeologist Bernie Alpert and his wife, Fran Alpert, as an educational tourist facility and joined in 1985 by archaeologist Dr. Ian Stern, Archaeological Seminars Institute runs the “Dig for a Day” program in Maresha and hires out licensed tour guides for private walking tours. The company also ran an official English-language tour guide course for ten years. “Dig for a Day” is a three-hour family activity that includes participating in an official archaeological excavation, licensed by the Israel Antiquities Authority, in one of the thousands of caves in the area of Maresha. Following an introductory explanation that provides context for the excavation, the participants then descend into one of the subterranean complexes. Inside these caves they excavate and then, above ground, sift through the material they have dug up. Afterwards, they go on a tour (a “crawl”) of an unexcavated cave system. Each group has its own guide for the duration of the activity. The dig ends with a short summation describing some of the most important finds, some of which are now displayed in the Israel Museum in Jerusalem. Clients pay for the activity which provides funds for the ongoing excavation as well as paying for staff. Many participants consider the dig “the highlight” of their visit to Israel. Archaeological Seminars Institute is now run by Dr. Ian Stern and his wife, Heidi Stern. The Maresha Excavation Project is operated as a full-fledged research project under the academic umbrella of the Nelson Glueck School of Biblical Archaeology of the Hebrew Union College-Jewish Institute of Religion.
wikipedia
wiki_27168_chunk_15
Radiative transfer equation and diffusion theory for photon transport in biological tissue
Pencil beam normally incident on a semi-infinite medium Using boundary conditions, one may approximately characterize diffuse reflectance for a pencil beam normally incident on a semi-infinite medium. The beam will be represented as two point sources in an infinite medium as follows (Figure 2): Set scattering anisotropy 2 for the scattering medium and set the new scattering coefficient μs2 to the original μs1 multiplied by 1, where 1 is the original scattering anisotropy. Convert the pencil beam into an isotropic point source at a depth of one transport mean free path ' below the surface and power = '. Implement the extrapolated boundary condition by adding an image source of opposite sign above the surface at 'b. The two point sources can be characterized as point sources in an infinite medium via
wikipedia
wiki_32580_chunk_5
Circumarctic Environmental Observatories Network
Deliberately, presentations of the CEON concept have made no mention or suggestion of measurements or processes that should or could be made or investigated. Instead, observers have been asked to introduce their own bias into the development of CEON by providing feedback to the following question: "What would you do if you had the opportunity to conduct/maintain standardized and integrated time series observations across multiple research stations and networks in the Arctic?" This 'bottom-up' approach has facilitated the development and scoping of CEON based on the experience, needs and future directions envisaged by a broad range of potential CEON stakeholder and user groups. Mission
wikipedia
wiki_37403_chunk_9
Logicomix
However, the global judgement by Mancosu is positive: Notes References External links Unusual Greek math comic tops bestseller lists worldwide, Deutsche Welle, October 12, 2009 Logicomix, en epic search for truth (private website, 7 August 2013) Making of Logicomix Reviews Math, Philosophy, Comics and Bertrand Russell’s Search for Truth, Publishers Weekly, April 14, 2009 Bertrand Russell: The thinking person's superhero, The Independent, September 2, 2009 Logicomix, Financial Times, September 5, 2009 Essay review by Paolo Mancosu, pp. 1–14, U.C. Berkeley, January 2010
wikipedia
wiki_18623_chunk_2
Spatiotemporal database
As of 2008, there are no RDBMS products with spatiotemporal extensions. There are some products such as the open-source TerraLib which use a middleware approach storing their data in a relational database. Unlike in the pure spatial domain, there are however no official or de facto standards for spatio-temporal data models and their querying. In general, the theory of this area is also less well-developed. Another approach is the constraint database system such as MLPQ (Management of Linear Programming Queries).
wikipedia
wiki_2040_chunk_18
Floyd–Warshall algorithm
There are also known algorithms using fast matrix multiplication to speed up all-pairs shortest path computation in dense graphs, but these typically make extra assumptions on the edge weights (such as requiring them to be small integers). In addition, because of the high constant factors in their running time, they would only provide a speedup over the Floyd–Warshall algorithm for very large graphs. References External links Interactive animation of the Floyd–Warshall algorithm Interactive animation of the Floyd–Warshall algorithm (Technical University of Munich) Graph algorithms Routing algorithms Polynomial-time problems Articles with example pseudocode Dynamic programming Graph distance
wikipedia
wiki_22254_chunk_5
Integrated computational materials engineering
ICMEg will create an international network of simulation providers and users. It will promote a deeper understanding between the different communities (academia and industry) each of them by now using very different tools/methods and data formats. The harmonization and standardization of information exchange along the life-cycle of a component and across the different scales (electronic, atomistic, mesoscopic, continuum) are the key activity of ICMEg.
wikipedia
wiki_38790_chunk_46
Educational neuroscience
Other researchers, such as Katzir & Pareblagoev have pointed out that neuroimaging methodology as it stands may not be suitable for the examination of higher level cognitive functions, because it relies primarily on the ‘subtraction method’. By this method, brain activity during a simple control task is subtracted from that of a ‘higher order’ cognitive task, thus leaving the activation that is related specifically to the function of interest. Katzir & Pareblagoev suggest that while this method may be very good for examining low level processing, such as perception, vision and touch, it is very hard to design an effective control task for higher order processing, such as comprehension in reading and inference making. Thus, some researchers argue that functional imaging technologies may not be best suited for the measurement of higher order processing. Katzir & Pareblagoev, suggest that this may not be a deficit of the technology itself, but rather of the design of experiments and the ability to interpret the results. The authors advocate using experimental measures in the scanner for which the behavioural data is already well understood, and for which there exists a strong theoretical framework.
wikipedia
wiki_24026_chunk_18
Multiservice tactical brevity code
S Saddled Informative call from wingman/element indicating the return to briefed formation position. SAM (direction) Visual acquisition of a SAM (surface-air missile) or SAM launch; should include position. Sandwiched A situation where an aircraft/element is positioned between opposing aircraft/elements. Saunter Fly at best endurance. Scram Emergency directive to egress for defensive or survival reasons. (Direction) Scramble Takeoff as quickly as possible. Scud Any threat tactical/theater ballistic missile (TBM). Separate Leave a specific engagement; may or may not re-enter. Shackle One weave, a single crossing of flight paths; maneuver to adjust/regain formation parameters. Shadow Follow indicated target. Shift Directive to shift laser illumination. Shooter Aircraft/unit designated to employ ordnance. Shotgun Pre-briefed weapons state at which separation/bugout should begin. Skate Informative call/directive to execute launch and leave tactics. Skip it Veto of fighter commit, usually followed with further directions. Skosh Aircraft is out of or unable to employ active radar missiles. Skunk A radar or visual maritime surface contact whose identity is unknown. Slapshot Directive for an aircraft to employ a range-unknown high-speed anti-radiation (type/bearing) missile (HARM) against a specified threat at the specified bearing. Slide Directive call to high value airborne asset (HVAA) to continue present mission while extending range from target in response to perceived threat. Slow Target with a ground speed of or less. Smash Directive to turn on/off anti-collision lights. Smoke Smoke marker used to mark a position. Snake Directive to oscillate an IR pointer about a target. Snap (direction) An immediate vector to the group described. Sniper Directive for an aircraft to employ a range-known HARM against a specified threat at the specified location. Snooze Directive/informative call indicating initiation of EMCON procedures. Sort/sorted Directive to assign targeting or monitoring responsibility for multiple targets within a group; criteria can be met visually, electronically (radar), or both. Sort responsibility has been met. Sour Equipment indicated is operating inefficiently. Invalid response to an administrative IFF check. (Opposite of sweet.) Spades An integrated group/radar contact which lacks the ATO (or equivalent) IFF modes and codes required for the ID criteria. Sparkle Target marking by IR pointer; target marking by gunship or forward air controller (airborne) (FAC-A) using incendiary rounds. Spike Radar warning receiver (RWR) indication of an AI radar in track, launch, or unknown mode. Add clock position/azimuth and radar type, if known. Spin Directive/informative call to execute a pre-briefed timing/spacing maneuver. Spitter An aircraft that has departed from the engagement or is departing the engaged (direction) fighters' targeting responsibility. Splash A/A Target destroyed, or A/S weapons impact. Split An informative call that a flight member is leaving formation to engage a threat; visual may not be maintained. Spoofing Informative call that voice deception is being employed. Spot Acquisition of laser designation. Squawk (number/code) Operate IFF as indicated or IFF is operating as indicated. Squawk flash Use the flash feature on the IFF which cause the transponder signal to highlight on radar display. Hence the term means to announce your location. Squawking An informative call denoting a bogey is responding with an IFF mode (#). Stack Two or more groups/contacts/formations with a high/low altitude separation in relation to each other. Status Request for tactical situation. Steady Directive to stop oscillation (wavering) of IR pointer. Steer Set magnetic compass heading indicated. Stern Request for, or directive to, intercept using stern geometry. Stinger Within a group, a formation of three or more aircraft with a single aircraft in trail. Stop Stop IR illumination of a target. Stranger Unidentified traffic that is not associated with the action in progress. Strangle () Turn off equipment indicated. Strip Individual fighter/section is leaving the formation to pursue separate attacks. Stripped Informative call from wingman/element indicating out of briefed formation/position. Strobe Radar indications of noise jamming. Sunshine Directive or informative call indicating illumination of target is being conducted with artificial illumination. Sunrise Informative call that C2 functions (Command & Control) are available. (opposite of midnight). Sweet Equipment indicated is operating efficiently. Valid response to an administrative IFF check. (Opposite of sour.) Switch/switched Indicates an attacker is changing from one aircraft to another.
wikipedia
wiki_31630_chunk_13
George Tyler Moore Center for the Study of the Civil War
The ongoing research at The George Tyler Moore Center for the Study of the Civil War involves the compilation of figures from the soldiers' compiled military service records which will lead to a more definitive number of veterans born in West Virginia. Within the next five years, data gleaned from the service records of soldiers serving in all of West Virginia's Union regiments and (Western) Virginia Confederate regiments will be compiled in the center's electronic database. Once completed, a simple query will be able to provide a very accurate total for both sides including data heretofore unavailable. Reference library
wikipedia
wiki_36311_chunk_2
Matheuristics
Some approaches using MP combined with metaheuristics have begun to appear regularly in the matheuristics literature. This combination can go two-ways, both in MP used to improve or design metaheuristics and in metaheuristics used for improving known MP techniques, even though the first of these two directions is by far more studied. References
wikipedia
wiki_21298_chunk_2
Codework
A variety of examples of codework can be found in the Electronic Literature Collections published by the Electronic Literature Organization, such as Alan Sondheim's online performance Internet Text (1994-), Giselle Beiguelman's Code Movie 1 (2004), Dan Shiovitz's interactive fiction Bad Machine (1999) (Volume 1), Mez Breeze's "netwurk repository" of "_mezangelles_," _cross.ova.ing ][4rm.blog.2.log][_ (2003-), Bjørn Magnhildøen's live writing performance/text movie, PlainTextPerformance (2010), and Nick Montfort's Perl poetry generator ppg256-1 (2008) (Volume 2).
wikipedia
wiki_10188_chunk_4
Profiling (computer programming)
A profiler can be applied to an individual method or at the scale of a module or program, to identify performance bottlenecks by making long-running code obvious. A profiler can be used to understand code from a timing point of view, with the objective of optimizing it to handle various runtime conditions or various loads. Profiling results can be ingested by a compiler that provides profile-guided optimization. Profiling results can be used to guide the design and optimization of an individual algorithm; the Krauss matching wildcards algorithm is an example. Profilers are built into some application performance management systems that aggregate profiling data to provide insight into transaction workloads in distributed applications.
wikipedia
wiki_16506_chunk_0
Nuclear astrophysics
Nuclear astrophysics is an interdisciplinary part of both nuclear physics and astrophysics, involving close collaboration among researchers in various subfields of each of these fields. This includes, notably, nuclear reactions and their rates as they occur in cosmic environments, and modeling of astrophysical objects where these nuclear reactions may occur, but also considerations of cosmic evolution of isotopic and elemental composition (often called chemical evolution). Constraints from observations involve multiple messengers, all across the electromagnetic spectrum (nuclear gamma-rays, X-rays, optical, and radio/sub-mm astronomy), as well as isotopic measurements of solar-system materials such as meteorites and their stardust inclusions, cosmic rays, material deposits on Earth and Moon). Nuclear physics experiments address stability (i.e., lifetimes and masses) for atomic nuclei well beyond the regime of stable nuclides into the realm of radioactive/unstable nuclei, almost to the limits of bound nuclei (the drip lines), and under high density (up to neutron star matter) and high temperature (plasma temperatures up to ). Theories and simulations are essential parts herein, as cosmic nuclear reaction environments cannot be realized, but at best partially approximated by experiments. In general terms, nuclear astrophysics aims to understand the origin of the chemical elements and isotopes, and the role of nuclear energy generation, in cosmic sources such as stars, supernovae, novae, and violent binary-star interactions.
wikipedia
wiki_4368_chunk_31
Peppered moth evolution
Bruce Grant has written several papers on melanism in the peppered moth which are listed on his home page. Online lecture: "The rise and fall of the melanic Peppered Moth" presented by Laurence Cook. The Peppered Moth: Decline of a Darwinian Disciple. This is the transcript of Michael Majerus' lecture delivered to the British Humanist Association on Darwin Day 2004. The Peppered Moth: The Proof of Darwinian Evolution. This is the transcript of Majerus' lecture given at the European Society for Evolutionary Biology meeting on 23 August 2007. The accompanying PowerPoint presentation is also available. On 19 June 2009, Telegraph.co.uk published an article on this evolutionary phenomenon and implored UK readers to visit the Moths Count website and record their observations of local moths, in an effort to help increase the available data for researchers.
wikipedia
wiki_14739_chunk_6
Agda (programming language)
Metavariables One of the distinctive features of Agda, when compared with other similar systems such as Coq, is heavy reliance on metavariables for program construction. For example, one can write functions like this in Agda: add : ℕ → ℕ → ℕ add x y = ? ? here is a metavariable. When interacting with the system in emacs mode, it will show the user expected type and allow them to refine the metavariable, i.e., to replace it with more detailed code. This feature allows incremental program construction in a way similar to tactics-based proof assistants such as Coq.
wikipedia
wiki_33196_chunk_20
Relationships among probability distributions
Some distributions have been specially named as compounds: beta-binomial distribution, beta-Pascal distribution, gamma-normal distribution.Examples: ' If X is a Binomial(n,p) random variable, and parameter p is a random variable with beta(α, β) distribution, then X is distributed as a Beta-Binomial(α,β,n). If X is a negative-binomial(m,p) random variable, and parameter p is a random variable with beta(α,β) distribution, then X is distributed as a Beta-Pascal(α,β,m'').
wikipedia
wiki_33525_chunk_4
Generalized Environmental Modeling System for Surfacewaters
Modeling techniques A GEMSS application requires two types of data: (1) spatial data (primarily the waterbody shoreline and bathymetry, but also locations, elevations, and configurations of man-made structures) and (2) temporal data (time-varying boundary condition data defining tidal elevation, inflow rate and temperature, inflow constituent concentration, outflow rate, and meteorological data. All deterministic models, including GEMSS, require uninterrupted time-varying boundary condition data. There can be no long gaps in the datasets and all required datasets must be available during the span of the proposed simulation period.
wikipedia
wiki_15834_chunk_0
List of MeSH codes (E06)
The following is a partial list of the "E" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (E05). Codes following these are found at List of MeSH codes (E07). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – dentistry – air abrasion, dental – anesthesia, dental – hypnosis, dental
wikipedia
wiki_9661_chunk_5
Earthquake engineering
Experimental assessment Experimental evaluations are expensive tests that are typically done by placing a (scaled) model of the structure on a shake-table that simulates the earth shaking and observing its behavior. Such kinds of experiments were first performed more than a century ago. Only recently has it become possible to perform 1:1 scale testing on full structures. Due to the costly nature of such tests, they tend to be used mainly for understanding the seismic behavior of structures, validating models and verifying analysis methods. Thus, once properly validated, computational models and numerical procedures tend to carry the major burden for the seismic performance assessment of structures.
wikipedia
wiki_9679_chunk_14
Basis set (chemistry)
The notation for the split-valence basis sets arising from the group of John Pople is typically X-YZg. In this case, X represents the number of primitive Gaussians comprising each core atomic orbital basis function. The Y and Z indicate that the valence orbitals are composed of two basis functions each, the first one composed of a linear combination of Y primitive Gaussian functions, the other composed of a linear combination of Z primitive Gaussian functions. In this case, the presence of two numbers after the hyphens implies that this basis set is a split-valence double-zeta basis set. Split-valence triple- and quadruple-zeta basis sets are also used, denoted as X-YZWg, X-YZWVg, etc. Here is a list of commonly used split-valence basis sets of this type:
wikipedia
wiki_10116_chunk_6
Java Pathfinder
Extensibility JPF is an open system that can be extended in a variety of ways. The main extension constructs are listeners - to implement complex properties (e.g. temporal properties) peer classes - to execute code at the host JVM level (instead of JPF), which is mostly used to implement native methods bytecode factories - to provide alternative execution semantics of bytecode instructions (e.g. to implement symbolic execution) choice generators - to implement state space branches such as scheduling choices or data value sets serializers - to implement program state abstractions publishers - to produce different output formats search policies - to use different program state space traversal algorithms
wikipedia
wiki_8830_chunk_6
Loop optimization
A unimodular transformation is legal if it preserves the temporal sequence of all dependencies; measuring the performance impact of a unimodular transformation is more difficult. Imperfectly nested loops and some transformations (such as tiling) do not fit easily into this framework. The polyhedral or constraint-based framework
wikipedia
wiki_20995_chunk_9
Patterson power cell
Further reading Bailey, Patrick and Fox, Hal (October 20, 1997). A review of the Patterson Power Cell. Retrieved November 19, 2011. An earlier version of this paper appears in: Energy Conversion Engineering Conference, 1997; Proceedings of the 32nd Intersociety Energy Conversion Engineering Conference. Publication Date: Jul 27 – Aug 1, 1997. Volume 4, pages 2289–2294. Meeting Date: July 27, 1997 – January 8, 1997. Location: Honolulu, HI, USA. Ask the experts, "What is the current scientific thinking on cold fusion? Is there any possible validity to this phenomenon?", Scientific American, October 21, 1999,(Patterson is mentioned on page 2). Retrieved December 5, 2007
wikipedia
wiki_27303_chunk_20
Loop-level parallelism
DOPIPE parallelism DOPIPE Parallelism implements pipelined parallelism for loop-carried dependence where a loop iteration is distributed over multiple, synchronized loops. The goal of DOPIPE is to act like an assembly line, where one stage is started as soon as there is sufficient data available for it from the previous stage. Consider the following, synchronous code with dependence S1[i] ->T S1[i + 1].
wikipedia
wiki_22923_chunk_7
List of Sinclair QL software
P Page Designer, Sector Software Page Designer 2, Sector Software Page Designer 3, Sector Software Paint Master, Shadow Games Pascal Compiler, Computer One Pascal (ISO 7185/ANSI 770×3.97), Prospero PC Conqueror (IBM PC emulator, supports MS-DOS v.3,4,5,6), Digital Precision PCB1, Talent PCB CAD, Lear Data Systems Peintre, Pyramide Perfect Pointer Tools, Digital Precision Perfection, Word Processor, Digital Precision Perfection Special Edition, Word Processor, Digital Precision Pointer's & Writer's Toolkit, JMS Professional Monitor, Compware Professional Publisher, Digital Precision
wikipedia
wiki_3295_chunk_24
Paraconsistent logic
Included Some tautologies of paraconsistent logic are: All axiom schemas for paraconsistent logic: ** for deduction theorem and ?→{t,b} = {t,b} ** for deduction theorem (note: {t,b}→{f} = {f} follows from the deduction theorem) ** {f}→? = {t} ** ?→{t} = {t} ** {t,b}→{b,f} = {b,f} ** ~{f} = {t} ** ~{t,b} = {b,f} (note: ~{t} = {f} and ~{b,f} = {t,b} follow from the way the truth-values are encoded) ** {t,b}v? = {t,b} ** ?v{t,b} = {t,b} ** {t}v? = {t} ** ?v{t} = {t} ** {f}v{f} = {f} ** {b,f}v{b,f} = {b,f} ** {f}&? = {f} ** ?&{f} = {f} ** {b,f}&? = {b.f} ** ?&{b,f} = {b,f} ** {t}&{t} = {t} ** {t,b}&{t,b} = {t,b} ** ? is the union of {t,b} with {b,f} Some other theorem schemas:
wikipedia
wiki_15880_chunk_0
List of MeSH codes (A16)
The following is a partial list of the "A" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (A15). Codes following these are found at List of MeSH codes (A17). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – embryonic structures
wikipedia
wiki_9435_chunk_6
Computerized physician order entry
Patient safety benefits In the past, physicians have traditionally hand-written or verbally communicated orders for patient care, which are then transcribed by various individuals (such as unit clerks, nurses, and ancillary staff) before being carried out. Handwritten reports or notes, manual order entry, non-standard abbreviations and poor legibility lead to errors and injuries to patients, . A follow up IOM report in 2001 advised use of electronic medication ordering, with computer- and internet-based information systems to support clinical decisions. Prescribing errors are the largest identified source of preventable hospital medical error. A 2006 report by the Institute of Medicine estimated that a hospitalized patient is exposed to a medication error each day of his or her stay. While further studies have estimated that CPOE implementation at all nonrural hospitals in the United States could prevent over 500,000 serious medication errors each year. Studies of computerized physician order entry (CPOE) has yielded evidence that suggests the medication error rate can be reduced by 80%, and errors that have potential for serious harm or death for patients can be reduced by 55%, and other studies have also suggested benefits. Further, in 2005, CMS and CDC released a report that showed only 41 percent of prophylactic antibacterials were correctly stopped within 24 hours of completed surgery. The researchers conducted an analysis over an eight-month period, implementing a CPOE system designed to stop the administration of prophylactic antibacterials. Results showed CPOE significantly improved timely discontinuation of antibacterials from 38.8 percent of surgeries to 55.7 percent in the intervention hospital. CPOE/e-Prescribing systems can provide automatic dosing alerts (for example, letting the user know that the dose is too high and thus dangerous) and interaction checking (for example, telling the user that 2 medicines ordered taken together can cause health problems). In this way, specialists in pharmacy informatics work with the medical and nursing staffs at hospitals to improve the safety and effectiveness of medication use by utilizing CPOE systems.
wikipedia
wiki_5600_chunk_10
Swiss Institute of Bioinformatics
Popular science The SIB is also involved in bringing bioinformatics to the layman. Understanding the growing importance this relatively recent science has in today’s society is becoming fundamental. Indeed, in not too distant a future, patients will be referring to results directly generated by bioinformatics methods. Since the year 2000, in order to heighten public awareness, the SIB has taken part in numerous science fairs, created two online magazines, an outdoor exhibition and, in 2012, a virtual exhibition. See also Lausanne campus List of biological databases Science and technology in Switzerland Notes and references
wikipedia
wiki_28484_chunk_9
Annotated Code of Maryland
The following is a list of some of the numbered articles, which were part of the recodification process before being reenacted into the named articles: 1 Rules of Interpretation 2B Alcoholic Beverages 19 Comptroller 20 Tri-County Council for Southern Maryland 20A Tri-County Council for Western Maryland 20B Tri-County Council for the Lower Eastern Shore of Maryland 20C Mid-Shore Regional Council 20D Upper Shore Regional Council 23 Miscellaneous Companies 23A Corporations - Municipal 23B Municipal Corporation Charter 24 Political Subdivisions - Miscellaneous Provisions 25 County Commissioners 25A Charted Counties of Maryland 25B Home Rule for Code Counties 26 Miscellaneous Governmental Entities 27 Crimes and Punishments 27A Public Defender 28 Maryland-National Capital Park and Planning Commission 29 Washington Suburban Sanitary District 31 Debt - Public 34 Estrays - Vessals Adrift - Drift Log 36 Fees of Officers 38A Fires and Investigations 41 Governor - Executive and Administrative Departments 43C Maryland Health and Higher Education Facilities Authority 45A Industrial Development 48 Inspections 49B Human Relations Commission 49D Children, Youth and Family Services 65 Militia 66B Land Use 75 Pleadings, Practice and Process at Law 78A Public Works 79 Releases and Receipts 82 Riots 83A Department of Business and Economic Development 88A Department of State Police 95 Treasurer 96 1/2 Veterans
wikipedia
wiki_819_chunk_3
Dijkstra's algorithm
Dijkstra's algorithm uses a data structure for storing and querying partial solutions sorted by distance from the start. While the original algorithm uses a min-priority queue and runs in time (where is the number of nodes and is the number of edges), it can also be implemented in using an array. The idea of this algorithm is also given in . propose using a Fibonacci heap min-priority queue to optimize the running time complexity to . This is asymptotically the fastest known single-source shortest-path algorithm for arbitrary directed graphs with unbounded non-negative weights. However, specialized cases (such as bounded/integer weights, directed acyclic graphs etc.) can indeed be improved further as detailed in Specialized variants. Additionally, if preprocessing is allowed algorithms such as contraction hierarchies can be up to seven orders of magnitude faster.
wikipedia
wiki_39184_chunk_3
Functional renormalization group
derived by Christof Wetterich and Tim R. Morris in 1993. Here denotes a derivative with respect to the RG scale at fixed values of the fields. Furthermore, denotes the functional derivative of from the left-hand-side and the right-hand-side respectively, due to the tensor structure of the equation. This feature is often shown simplified by the second derivative of the effective action. The functional differential equation for must be supplemented with the initial condition , where the "classical action" describes the physics at the microscopic ultraviolet scale . Importantly, in the infrared limit the full effective action is obtained. In the Wetterich equation denotes a supertrace which sums over momenta, frequencies, internal indices, and fields (taking bosons with a plus and fermions with a minus sign). The exact flow equation for has a one-loop structure. This is an important simplification compared to perturbation theory, where multi-loop diagrams must be included. The second functional derivative is the full inverse field propagator modified by the presence of the regulator .
wikipedia
wiki_6447_chunk_8
International Union of Biological Sciences
Publications The institution publishes four times a year Biology International and other publications such as IUBS Monograph Series, Methodology Manual Series and the Proceedings of the IUBS General Assemblies. Legal status and finance The International Union of Biological Sciences is non-profit and does not pursue economic goals. It is funded from the following sources: annual dues of full members; assistance received from UNESCO and other international organizations that support the scientific programs of the Union; other sources
wikipedia
wiki_4957_chunk_5
Strassen algorithm
Practical implementations of Strassen's algorithm switch to standard methods of matrix multiplication for small enough submatrices, for which those algorithms are more efficient. The particular crossover point for which Strassen's algorithm is more efficient depends on the specific implementation and hardware. Earlier authors had estimated that Strassen's algorithm is faster for matrices with widths from 32 to 128 for optimized implementations. However, it has been observed that this crossover point has been increasing in recent years, and a 2010 study found that even a single step of Strassen's algorithm is often not beneficial on current architectures, compared to a highly optimized traditional multiplication, until matrix sizes exceed 1000 or more, and even for matrix sizes of several thousand the benefit is typically marginal at best (around 10% or less). A more recent study (2016) observed benefits for matrices as small as 512 and a benefit around 20%.
wikipedia
wiki_4282_chunk_12
Knuth–Bendix completion algorithm
Description of the algorithm for finitely presented monoids Suppose we are given a presentation , where is a set of generators and is a set of relations giving the rewriting system. Suppose further that we have a reduction ordering among the words generated by (e.g., shortlex order). For each relation in , suppose . Thus we begin with the set of reductions . First, if any relation can be reduced, replace and with the reductions. Next, we add more reductions (that is, rewriting rules) to eliminate possible exceptions of confluence. Suppose that and overlap.
wikipedia