id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_33154_chunk_1
Algorithmic inference
The Fisher parametric inference problem Concerning the identification of the parameters of a distribution law, the mature reader may recall lengthy disputes in the mid 20th century about the interpretation of their variability in terms of fiducial distribution , structural probabilities , priors/posteriors , and so on. From an epistemology viewpoint, this entailed a companion dispute as to the nature of probability: is it a physical feature of phenomena to be described through random variables or a way of synthesizing data about a phenomenon? Opting for the latter, Fisher defines a fiducial distribution law of parameters of a given random variable that he deduces from a sample of its specifications. With this law he computes, for instance “the probability that μ (mean of a Gaussian variable – our note) is less than any assigned value, or the probability that it lies between any assigned values, or, in short, its probability distribution, in the light of the sample observed”.
wikipedia
wiki_2907_chunk_16
Question answering
MathQA methods need to combine natural and formula language. One possible approach is to perform supervised annotation via Entity Linking. The "ARQMath Task" at CLEF 2020 was launched to address the problem of linking newly posted questions from the platform Math Stack Exchange (MSE) to existing ones that were already answered by the community. The lab was motivated by the fact that Mansouri et al. discovered that 20% of the mathematical queries in general-purpose search engines are expressed as well-formed questions. It contained two separate sub-tasks. Task 1: "Answer retrieval" matching old post answers to newly posed questions and Task 2: "Formula retrieval" matching old post formulae to new questions. Starting with the domain of mathematics, which involves formula language, the goal is to later extend the task to other domains (e.g., STEM disciplines, such as chemistry, biology, etc.), which employ other types of special notation (e.g., chemical formulae).
wikipedia
wiki_3468_chunk_4
Directed-energy weapon
Active Denial System Active Denial System is a millimeter wave source that heats the water in a human target's skin and thus causes incapacitating pain. It was developed by the U.S. Air Force Research Laboratory and Raytheon for riot-control duty. Though intended to cause severe pain while leaving no lasting damage, concern has been voiced as to whether the system could cause irreversible damage to the eyes. There has yet to be testing for long-term side effects of exposure to the microwave beam. It can also destroy unshielded electronics. The device comes in various sizes, including attached to a Humvee. Vigilant Eagle Vigilant Eagle is a proposed airport defense system that directs high-frequency microwaves towards any projectile that is fired at an aircraft. The system consists of a missile-detecting and tracking subsystem (MDT), a command and control system, and a scanning array. The MDT is a fixed grid of passive infrared (IR) cameras. The command and control system determines the missile launch point. The scanning array projects microwaves that disrupt the surface-to-air missile's guidance system, deflecting it from the aircraft. Bofors HPM Blackout Bofors HPM Blackout is a high-powered microwave weapon that is said to be able to destroy at short distance a wide variety of commercial off-the-shelf (COTS) electronic equipment and is purportedly non-lethal.Magnus Karlsson (2009). "Bofors HPM Blackout". Artilleri-Tidskrift (2–2009): s. s 12–15. Retrieved 2010-01-04. EL/M-2080 Green Pine|EL/M-2080 Green P The effective radiated power (ERP) of the EL/M-2080 Green Pine radar makes it a hypothetical candidate for conversion into a directed-energy weapon, by focusing pulses of radar energy on target missiles. The energy spikes are tailored to enter missiles through antennas or sensor apertures where they can fool guidance systems, scramble computer memories or even burn out sensitive electronic components. Active electronically scanned array AESA radars mounted on fighter aircraft have been slated as directed energy weapons against missiles, however, a senior US Air Force officer noted: "they aren't particularly suited to create weapons effects on missiles because of limited antenna size, power and field of view". Potentially lethal effects are produced only inside 100 meters range, and disruptive effects at distances on the order of one kilometer. Moreover, cheap countermeasures can be applied to existing missiles. Counter-electronics High Power Microwave Advanced Missile Project Counter-electronics High Power Microwave Advanced Missile Project
wikipedia
wiki_11435_chunk_4
Computer-assisted orthopedic surgery
Shortcomings Although CAOS has advantages in both the accuracy and precision of the procedure at hand, it is still not widely accepted within the orthopedic community for various reasons. One such reason is the increased medical costs to the patient. Regardless of the navigation preference, the inclusion of computer technology results in increased hospital expenditures, which are then billed to the patient. Since CAOS is still an area of active research, insurance plans are also unlikely to cover the cost of the procedures. Some studies suggest CAOS can be cost-effective for the hospital under the circumstance that a large volume of procedures are conducted on geriatric patients. Other than costs, each of the navigation methods has a shortcoming: CT-based navigation systems increase radiation exposure to the patient; fluoroscopy-based navigation increases the duration of the procedure due to the surgeon pausing to take images for an appropriate template; and imageless navigation relies heavily upon the skill of the surgeon to input accurate values derived from Orthopedic tests.
wikipedia
wiki_20329_chunk_6
Mathematica: A World of Numbers... and Beyond
Large-scale bean machine showing the binomial distribution as an approximation of the normal distribution in probability theory Möbius strip with a motorized red arrow that can trace a complete circuit of the one-sided surface A curved funnel-shaped surface modeling a gravitational well using ball bearings orbiting in ellipses A three-dimensional cube illustrating the concept of multiplication Soap bubbles and films, as examples of minimal surfaces Mechanical linkages, such as the Sarrus linkage Topological surfaces, such as the Klein bottle Models showing perspective and geometric projection Wall-spanning timeline of the history of mathematical thought and discoveries An arrangement of strings and lights demonstrating Conic sections (Unique to the IBM Pavilion/The Henry Ford exhibit) An automated dice game demonstrating Random walk (Unique to the IBM Pavilion/The Henry Ford exhibit)
wikipedia
wiki_4396_chunk_5
Alabama School of Mathematics and Science
Summer program ASMS also offers an academic summer camp for students entering the 6th through 9th grades. The Adventures In Math and Science summer program is typically held in June and enrolls roughly 1,000 students over the course of three weeks. Students from across Alabama can enroll in classes that are taught by ASMS instructors. Courses include: 3D Printing and Design; ACT Prep; All About Animals – Inside and Out; Apps for Smart Devices; Basic Geometry with Computers; CSI: Fun Forensics; Discovering the Alabama Outdoors; Drones and Race cars; Environmental Science; Estuaries: Where Rivers Meet the Sea; Exploring Inner Space; Game Design with Unity 3D; Geology of Minecraft; Invertebrate Zoology; Labs of Doom; Land, Sea, and Air: Basic Navigation, Buoyancy, and Energy of Propulsion; Learning Linux using the Raspberry Pi; Marine Biology; Meteorology; Phun Physics; Python Programming with Raspberry Pi; Robotics; Rocketry; and Studying Nature-Field Biology. The camp offers a residential program as well as a day-school program. AIMS runs for three week-long sessions. Each AIMS student takes three courses of their choice per week each weekday with a weekend interim period at a local waterpark for students staying more than one week. Admissions to AIMS is highly competitive. More than 50 percent of incoming, full-time students have attended the AIMS summer program. AIMS is made possible from the ASMSEA. ASMSEA stands for ASMS Educational Association and has hosted the many different camps available. The association decides which camps to host the cost and many other details involved. It has around 15 board members, but anyone can vote for a new program.
wikipedia
wiki_21680_chunk_9
Everyday Mathematics
Additional references About Everyday Mathematics: Research & Development. (2003) Retrieved June 27, 2006. Bas, Braams. (2003) Spiraling Through UCSMP Everyday Mathematics. Retrieved June 27, 2006. Current Curriculum: About Everyday Mathematics. (2002) Retrieved June 27, 2006. Knight, Michelle. (2005) Everyday Math Has Its Proponents. Retrieved June 27, 2006. Foundations for Success, The Final Report of the National Mathematics Advisory Panel (2008) U.S. Department of Education. Retrieved April 19, 2009 Johnson, Jerry. (2000) Teaching and Learning Mathematics: Using Research to Shift from “Yesterday” Mind to “Tomorrow” Mind. Retrieved June 27, 2006. Program Components for Grades 1-6. (2003) Retrieved June 27, 2006. University of Chicago School Mathematics Project. (2005) . Retrieved June 29, 2006. Wertheimer, Richard. (2002) Forum: Making It All Add Up. Retrieved June 29, 2006.
wikipedia
wiki_19718_chunk_2
Association of Teachers of Mathematics
Guiding principles ATM lists as its guiding principles: The ability to operate mathematically is an aspect of human functioning which is as universal as language itself. Attention needs constantly to be drawn to this fact. Any possibility of intimidating with mathematical expertise is to be avoided. The power to learn rests with the learner. Teaching has a subordinate role. The teacher has a duty to seek out ways to engage the power of the learner. It is important to examine critically approaches to teaching and to explore new possibilities, whether deriving from research, from technological developments or from the imaginative and insightful ideas of others. Teaching and learning are cooperative activities. Encouraging a questioning approach and giving due attention to the ideas of others are attitudes to be encouraged. Influence is best sought by building networks of contacts in professional circles.
wikipedia
wiki_32495_chunk_1
Barrow Area Information Database
The BAID Internet Map Server (BAID-IMS) is freely available to scientists, land managers, educators and the local community. Users can navigate to areas of interest and explore or query information about field-based scientific research. Current and historic research sites are shown as points with links to details about project investigators, discipline, funding program, year, related web sites, site photos and other information. Users can print or export maps for presentations and export tabular information.
wikipedia
wiki_37550_chunk_21
Generic-case complexity
In a 2006 paper, Bogdanov and Trevisan came close to defining generic case complexity. Instead of partial algorithms, they consider so-called errorless heuristic algorithms. These are complete algorithms which may fail by halting with output "?". The class AvgnegP is defined to consist of all errorless heuristic algorithms A which run in polynomial time and for which the probability of failure on is negligible, i.e., converges superpolynomially fast to 0. AvgnegP is a subset of GenP. Errorless heuristic algorithms are essentially the same as the algorithms with benign faults defined by Impagliazzo where polynomial time on average algorithms are characterized in terms of so-called benign algorithm schemes.
wikipedia
wiki_2247_chunk_6
Experimental mathematics
If a counterexample is being sought or a large-scale proof by exhaustion is being attempted, distributed computing techniques may be used to divide the calculations between multiple computers. Frequent use is made of general mathematical software or domain-specific software written for attacks on problems that require high efficiency. Experimental mathematics software usually includes error detection and correction mechanisms, integrity checks and redundant calculations designed to minimise the possibility of results being invalidated by a hardware or software error. Applications and examples Applications and examples of experimental mathematics include:
wikipedia
wiki_17820_chunk_16
List of Quantum Leap characters
Lee Harvey Oswald (Willie Garson) - An emotionally disturbed man believed to be the sole assassin of President John F. Kennedy. Clint Hill (Himself (archival photographs)) - A Secret Service agent on President Kennedy's protection detail. Nikos Stathatos (Socrates Alafouzos) - A sailor marooned on an island with a beautiful but shrewish heiress. Ronald Miller (Michael Carpenter) - A double-amputee recovering at a military hospital. Leon Stiles (Cameron Dye) - A serial killer holding a woman and her daughter hostage. Maxwell "Max" Stoddard (Douglas Stark) - An old man with a UFO fixation. James "Jimmy" LaMotta (Brad Silverman) - a previous Leapee with Down syndrome. Connie LaMotta ² (Laura Harrington) - Homemaker and sister-in-law to Jimmy LaMotta Sheriff Clayton Fuller (James Whitmore, Jr.) - Small town sheriff with a troubled but loving daughter. Deputy Sheriff William "Will" Kinman (Travis Fine) - Deputy sheriff trying to protect his fiancée from an angry mob. Lawrence "Larry" Stanton III (W.K. Stratton) - Lawyer defending a woman for the murder of her long-time aggressor. William "Willie" Walters, Jr. (Daniel Engstrom) - Part of a trio of bank robbers with a room full of hostages. Martin "Marty" Elroy - A traveling salesman with two wives and families on the verge of meeting. Margaret Sanders - A homemaker and casual participant in the Women's Liberation Movement. Dr. Ruth Westheimer (herself) - Famous sex therapist. Lord Nigel Corrington (Robert MacKenzie) - Eccentric artist and occultist believed to be a vampire. Arnold Watkins (Tristan Tait) - A college student moonlighting as a heroic vigilante, the Midnight Marauder. Dawn Taylor ² (Raquel Krelle) - A college student dating the head of a fraternity. Elizabeth "Liz" Tate (Cynthia Steele) - A prison inmate accused of murdering another inmate. Angela Jensen ² (Laura O’Loughlin) - A prison inmate accused of murdering another inmate. Clifton Myers ³ (Sam Scarber) - The warder of a women's prison that sexually abuses the prisoners. Dennis Boardman (Stephen Bowers) - Bodyguard to Marilyn Monroe. Henry Adams (Mike Jolly) - A Vietnam veteran living in isolation in the mountains. Captain John Beckett (Rob Hyland) - Sam's ancestor fighting in the Civil War. Elvis Presley (Michael St. Gerard) - 19-year-old amateur musician on the verge of getting discovered.
wikipedia
wiki_6720_chunk_15
Ramaty High Energy Solar Spectroscopic Imager
Ramaty High-Energy Solar Spectroscopic Imager (RHESSI) RHESSI is intended to image at high resolution solar flares in X-rays and gamma rays. The X-rays and gamma rays covers an energy range of 3 keV-20 MeV with an energy resolution of about 1 keV and a spatial resolution of just a few seconds of arc. The imaging is accomplished by a tube containing nine pairs (one behind the other, spaced apart) of tungsten or molybdenum wire grids of width mounted parallel to the rotation axis of the tube pointing at the Sun. The tube rotates about its axis as the spacecraft spins at a rate of 15 rpm. During a rotation, a photon from any point on the Sun can either pass through a grid-pair or be blocked by one or other of the grids. This causes a modulation of the intensity of photons emanating from that point. The depth of modulation is zero for the photons arriving exactly along the spin axis and gradually increases to the off-axis photons. Behind each grid-pair is a cryogenic (75 K) germanium detector of 7.1 cm diameter and thickness. The output from each of the nine detectors, at any given energy, can be Fourier-analyzed to provide a full two-dimensional spatial spectrum of an extended source region on the Sun. The full spatial spectrum is possible because each wire grid pair has a different slit width, spacing and wire thickness. Data accumulaton is about 16 Gb during a 10-minutes rotation. The telemetry data was collected at Berkeley (California), Wallops Flight Facility (WFF), Virginia, Santiago, Chile and Weilheim, Germany. Science analysis of the data was involved close collaboration with many dedictated ground based and satellite based solar observatories. A secondary goal of RHESSI is to observe astronomical sources such as Crab Nebula.
wikipedia
wiki_5978_chunk_7
Nanorobotics
Nanorobot race In the same ways that technology research and development drove the space race and nuclear arms race, a race for nanorobots is occurring. There is plenty of ground allowing nanorobots to be included among the emerging technologies. Some of the reasons are that large corporations, such as General Electric, Hewlett-Packard, Synopsys, Northrop Grumman and Siemens have been recently working in the development and research of nanorobots; surgeons are getting involved and starting to propose ways to apply nanorobots for common medical procedures; universities and research institutes were granted funds by government agencies exceeding $2 billion towards research developing nanodevices for medicine; bankers are also strategically investing with the intent to acquire beforehand rights and royalties on future nanorobots commercialisation. Some aspects of nanorobot litigation and related issues linked to monopoly have already arisen. A large number of patents has been granted recently on nanorobots, done mostly for patent agents, companies specialized solely on building patent portfolios, and lawyers. After a long series of patents and eventually litigations, see for example the invention of radio, or the war of currents, emerging fields of technology tend to become a monopoly, which normally is dominated by large corporations.
wikipedia
wiki_445_chunk_43
Probability distribution
Beta distribution, for a single probability (real number between 0 and 1); conjugate to the Bernoulli distribution and binomial distribution Gamma distribution, for a non-negative scaling parameter; conjugate to the rate parameter of a Poisson distribution or exponential distribution, the precision (inverse variance) of a normal distribution, etc. Dirichlet distribution, for a vector of probabilities that must sum to 1; conjugate to the categorical distribution and multinomial distribution; generalization of the beta distribution Wishart distribution, for a symmetric non-negative definite matrix; conjugate to the inverse of the covariance matrix of a multivariate normal distribution; generalization of the gamma distribution
wikipedia
wiki_8168_chunk_43
Business process re-engineering
The first step towards any successful transformation effort is to convey an understanding of the necessity for change. Management rewards system, stories of company origin and early successes of founders, physical symbols, and company icons constantly enforce the message of the current culture. Implementing BPR successfully is dependent on how thoroughly management conveys the new cultural messages to the organization. These messages provide people in the organization with a guideline to predict the outcome of acceptable behavior patterns. People should be the focus of any successful business change. BPR is not a recipe for successful business transformation if it focuses on only computer technology and process redesign. In fact, many BPR projects have failed because they did not recognize the importance of the human element in implementing BPR. Understanding the people in organizations, the current company culture, motivation, leadership, and past performance is essential to recognize, understand, and integrate into the vision and implementation of BPR. If the human element is given equal or greater emphasis in BPR, the odds of successful business transformation increase substantially.
wikipedia
wiki_7906_chunk_11
Principles and Standards for School Mathematics
Number and Operations and Algebra: Developing quick recall of multiplication facts and related division facts and fluency with whole number multiplicationStudents use understandings of multiplication to develop quick recall of the basic multiplication facts and related division facts. They apply their understanding of models for multiplication (i.e., equal-sized groups, arrays, area models, equal intervals on the number line), place value, and properties of operations (in particular, the distributive property) as they develop, discuss, and use efficient, accurate, and generalizable methods to multiply multidigit whole numbers. They select appropriate methods and apply them accurately to estimate products or calculate them mentally, depending on the context and numbers involved. They develop fluency with efficient procedures, including the standard algorithm, for multiplying whole numbers, understand why the procedures work (on the basis of place value and properties of operations), and use them to solve problems.
wikipedia
wiki_2056_chunk_45
Code-switching
Limitations The lack of controlled environments for test subjects and their cognitive capabilities regarding language use and fluency has long been a concern in multilingual experimentation. Researchers try to "offset" results that follow no trends by analyzing social and linguistic history of the populations they are testing, but a good method to standardize data patterns and variation based on individual idiolects has yet to be created and implemented. Only a few studies have been done to measure brain activity during code switches, and so general trends cannot be expanded into larger theories without additional research.
wikipedia
wiki_19011_chunk_5
Configuration (geometry)
Notable projective configurations include the following: (11), the simplest possible configuration, consisting of a point incident to a line. Often excluded as being trivial. (32), the triangle. Each of its three sides meets two of its three vertices, and vice versa. More generally any polygon of sides forms a configuration of type () (43 62) and (62 43), the complete quadrangle and complete quadrilateral respectively. (73), the Fano plane. This configuration exists as an abstract incidence geometry, but cannot be constructed in the Euclidean plane. (83), the Möbius–Kantor configuration. This configuration describes two quadrilaterals that are simultaneously inscribed and circumscribed in each other. It cannot be constructed in Euclidean plane geometry but the equations defining it have nontrivial solutions in complex numbers. (93), the Pappus configuration. (94 123), the Hesse configuration of nine inflection points of a cubic curve in the complex projective plane and the twelve lines determined by pairs of these points. This configuration shares with the Fano plane the property that it contains every line through its points; configurations with this property are known as Sylvester–Gallai configurations due to the Sylvester–Gallai theorem that shows that they cannot be given real-number coordinates . (103), the Desargues configuration. (124 163), the Reye configuration. (125 302), the Schläfli double six, formed by 12 of the 27 lines on a cubic surface (153), the Cremona–Richmond configuration, formed by the 15 lines complementary to a double six and their 15 tangent planes (166), the Kummer configuration. (214), the Grünbaum–Rigby configuration. (273), the Gray configuration (354), Danzer's configuration., (6015), the Klein configuration.
wikipedia
wiki_6889_chunk_5
Spigot algorithm
Calculating each of these terms and adding them to a running total where we again only keep the fractional part, we have: {| class="wikitable" |- ! k ! A = 27−k ! B = A mod k ! C = B / k ! Sum of C mod 1 |- | 1 | 64 | 0 | 0 | 0 |- | 2 | 32 | 0 | 0 | 0 |- | 3 | 16 | 1 | 1/3 | 1/3 |- | 4 | 8 | 0 | 0 | 1/3 |- | 5 | 4 | 4 | 4/5 | 2/15 |- | 6 | 2 | 2 | 1/3 | 7/15 |- | 7 | 1 | 1 | 1/7 | 64/105 |}
wikipedia
wiki_3117_chunk_9
International Code of Nomenclature for algae, fungi, and plants
The Code now permits electronic-only publication of names of new taxa; no longer will it be a requirement to deposit some paper copies in libraries. The requirement for a Latin validating diagnosis or description was changed to allow either English or Latin for these essential components of the publication of a new name (Article 39). "One fungus, one name" and "one fossil, one name" are important changes; the concepts of anamorph and teleomorph (for fungi) and morphotaxa (for fossils) have been eliminated. As an experiment with "registration of names", new fungal descriptions require the use of an identifier from "a recognized repository"; there are two recognized repositories so far, Index Fungorum and MycoBank.
wikipedia
wiki_13013_chunk_5
Tiny C Compiler
Here are two benchmark examples: A recursive Fibonacci algorithm on a 1.8 GHz Intel Centrino laptop with 512 MB RAM yields a noticeable difference in results between Microsoft Visual C++ compiler 13.10.3052 and TCC. To calculate the 49th Fibonacci number, it took a MS Visual C++ program approximately 18% longer than the TCC compiled program. With a tcc modified to compile GCC, running cc1 (the GCC C compiler) on itself required 518 seconds when compiled using GCC 3.4.2, 558 seconds using GCC 2.95.3, 545 using Microsoft C compiler, and 1145 seconds using tcc. The level of optimization in each compiler was -O1 or similar.
wikipedia
wiki_1928_chunk_19
Real options valuation
Closed form, Black–Scholes-like solutions are sometimes employed. These are applicable only for European styled options or perpetual American options. Note that this application of Black–Scholes assumes constant — i.e. deterministic — costs: in cases where the project's costs, like its revenue, are also assumed stochastic, then Margrabe's formula can (should) be applied instead, here valuing the option to "exchange" expenses for revenue. (Relatedly, where the project is exposed to two (or more) uncertainties — e.g. for natural resources, price and quantity — some analysts attempt to use an overall volatility; this, though, is more correctly treated as a rainbow option, typically valued using simulation as below.) The most commonly employed methods are binomial lattices. These are more widely used given that most real options are American styled. Additionally, and particularly, lattice-based models allow for flexibility as to exercise, where the relevant, and differing, rules may be encoded at each node. Note that lattices cannot readily handle high-dimensional problems; treating the project's costs as stochastic would add (at least) one dimension to the lattice, increasing the number of ending-nodes by the square (the exponent here, corresponding to the number of sources of uncertainty). Specialised Monte Carlo Methods have also been developed and are increasingly, and especially, applied to high-dimensional problems. Note that for American styled real options, this application is somewhat more complex; although recent research combines a least squares approach with simulation, allowing for the valuation of real options which are both multidimensional and American styled; see . When the Real Option can be modelled using a partial differential equation, then Finite difference methods for option pricing are sometimes applied. Although many of the early ROV articles discussed this method, its use is relatively uncommon today—particularly amongst practitioners—due to the required mathematical sophistication; these too cannot readily be used for high-dimensional problems.
wikipedia
wiki_4737_chunk_8
Atmospheric chemistry
Laboratory studies Measurements made in the laboratory are essential to our understanding of the sources and sinks of pollutants and naturally occurring compounds. These experiments are performed in controlled environments that allow for the individual evaluation of specific chemical reactions or the assessment of properties of a particular atmospheric constituent. Types of analysis that are of interest includes both those on gas-phase reactions, as well as heterogeneous reactions that are relevant to the formation and growth of aerosols. Also of high importance is the study of atmospheric photochemistry which quantifies how the rate in which molecules are split apart by sunlight and what resulting products are. In addition, thermodynamic data such as Henry's law coefficients can also be obtained.
wikipedia
wiki_6055_chunk_15
G-code
Two high-level paradigm shifts have been toward: abandoning "manual programming" (with nothing but a pencil or text editor and a human mind) for CAM software systems that generate G-code automatically via postprocessors (analogous to the development of visual techniques in general programming) abandoning hardcoded constructs for parametric ones (analogous to the difference in general programming between hardcoding a constant into an equation versus declaring it a variable and assigning new values to it at will; and to the object-oriented approach in general).
wikipedia
wiki_279_chunk_4
Erectile dysfunction
Causes Causes of or contributors to ED include the following: Diets high in saturated fat are linked to heart disease and men with heart disease are more likely to experience ED. By contrast, plant-based diets show a lower risk for ED. Prescription drugs (e.g., SSRIs, beta blockers, alpha-2 adrenergic receptor agonists, thiazides, hormone modulators, and 5α-reductase inhibitors) Neurogenic disorders (e.g., diabetic neuropathy, temporal lobe epilepsy, multiple sclerosis, Parkinson's disease, multiple system atrophy) Cavernosal disorders (e.g., Peyronie's disease) Hyperprolactinemia (e.g., due to a prolactinoma) Psychological causes: performance anxiety, stress, and mental disorders Surgery (e.g., radical prostatectomy) Aging: after age 40 years, aging itself is a risk factor for ED, although numerous other pathologies that may occur with aging, such as testosterone deficiency, cardiovascular diseases, or diabetes, among others, appear to have interacting effects Kidney disease: ED and chronic kidney disease have pathological mechanisms in common, including vascular and hormonal dysfunction, and may share other comorbidities, such as hypertension and diabetes mellitus that can contribute to ED Lifestyle habits, particularly smoking, which is a key risk factor for ED as it promotes arterial narrowing. COVID-19: preliminary research indicates that COVID-19 viral infection may affect sexual and reproductive health Surgical intervention for a number of conditions may remove anatomical structures necessary to erection, damage nerves, or impair blood supply. ED is a common complication of treatments for prostate cancer, including prostatectomy and destruction of the prostate by external beam radiation, although the prostate gland itself is not necessary to achieve an erection. As far as inguinal hernia surgery is concerned, in most cases, and in the absence of postoperative complications, the operative repair can lead to a recovery of the sexual life of people with preoperative sexual dysfunction, while, in most cases, it does not affect people with a preoperative normal sexual life.
wikipedia
wiki_16547_chunk_6
Cell microprocessor implementations
Understanding the limitations of the restrictive two pipeline design is one of the key concepts a programmer must grasp to write efficient SPU code at the lowest level of abstraction. For programmers working at higher levels of abstraction, a good compiler will automatically balance pipeline concurrency where possible. SPE power and performance As tested by IBM under a heavy transformation and lighting workload [average IPC of 1.4], the performance profile of this implementation for a single SPU processor is qualified as follows:
wikipedia
wiki_28186_chunk_3
African Malaria Network Trust
Continued failure of current strategies (prompt diagnosis, early correct treatment, and the use of insecticide treated nets (ITNs) calls for a need to develop entirely new tools that would contribute to the fight of a resilient enemy and reverse its devastation. Over the last three decades there has been considerable interest in research and development of malaria vaccines. Research results that have been obtained so far show that malaria vaccine candidates would differ not only in their biological properties, but also in their eventual applications. Vaccines have been exceptionally effective against a number of diseases and have become one of the safest and most cost-effective weapons in medicine's arsenal against communicable disease. Perhaps no other intervention has had such a dramatic impact on the health and well-being of our society as the introduction of vaccines.
wikipedia
wiki_32591_chunk_1
Project management simulation
Training Project management simulation for training is an interactive learning activity, frequently practiced as a group exercise. The purpose of the simulation is to impart to students the competencies (i.e. knowledge, skills, and attitudes) that will ultimately improve their performance. It confronts trainees with the situations and problems that arise in real world projects. Trainees see the consequences of the decisions they make. They can track the evolution of the project parameters: scope, costs, schedule, and quality, as well as human factors. The simulation provides an opportunity for learners to solve typical project problems, to make mistakes and analyze them. Pedagogic goals of project management simulation can be to teach how to: determine goal and objectives of a project; estimate cost; plan tasks of the project; plan resources in a project; use project management tools; control the progress of a project; make team decisions under stress; react appropriately in typical project management situations Different studies suggest that using simulation-based training for training project managers is superior to other methods.
wikipedia
wiki_15691_chunk_11
List of proprietary software for Linux
First-person shooter {| class="wikitable sortable" style="margin:auto; margin:auto;" !style="text-align:center;"|Game !style="text-align:center;"|Publisher !style="text-align:center;"|Support status !style="text-align:center;"|Native binary !style="text-align:center;"|Source code !style="text-align:center;"|Pricing |- |Aliens versus Predator | | | | | |- |America's Army | | | | | |- |Counter-Strike: Global Offensive |Valve |Active | | | |- |Dark Horizons Lore: Invasion | | | | | |- |Descent³ | | | | | |- |Doom 3 | | | | | |- |Duke Nukem 3D | | | | | |- |Enemy Territory: Quake Wars | | | | | |- |Grappling Hook | | | | | |- |Medal of Honor: Allied Assault | |Unfinished beta | | | |- |Postal² | | | | | |- |Team Fortress 2|Valve |Active | | | |- |Unreal Tournament |GT Interactive Software | | | | |- |Unreal Tournament 2003 |Infogrames Entertainment | | | | |- |Unreal Tournament 2004 |Atari | | | | |- |}
wikipedia
wiki_2681_chunk_5
Tierra (computer simulation)
Further reading Bentley, Peter, J. 2001, "Digital Biology:How Nature is transforming Our Technology and Our Lives", Simon & Schuster, New York, NY. Previously published in Great Britain in 2001 by Headline Book Publishing. Ray, T. S. 1991, "Evolution and optimization of digital organisms", in Billingsley K.R. et al. (eds), Scientific Excellence in Supercomputing: The IBM 1990 Contest Prize Papers, Athens, GA, 30602: The Baldwin Press, The University of Georgia. Publication date: December 1991, pp. 489–531. Casti, John L. (1997). Would-Be-Worlds. John Wiley & Sons, Inc. New York
wikipedia
wiki_400_chunk_15
Neuroscience
Making sense of the nervous system's dynamic complexity is a formidable research challenge. Ultimately, neuroscientists would like to understand every aspect of the nervous system, including how it works, how it develops, how it malfunctions, and how it can be altered or repaired. Analysis of the nervous system is therefore performed at multiple levels, ranging from the molecular and cellular levels to the systems and cognitive levels. The specific topics that form the main focus of research change over time, driven by an ever-expanding base of knowledge and the availability of increasingly sophisticated technical methods. Improvements in technology have been the primary drivers of progress. Developments in electron microscopy, computer science, electronics, functional neuroimaging, and genetics and genomics have all been major drivers of progress.
wikipedia
wiki_12579_chunk_22
Entropy in thermodynamics and information theory
Shannon entropy has been related by physicist Léon Brillouin to a concept sometimes called negentropy. In 1953, Brillouin derived a general equation stating that the changing of an information bit value requires at least kT ln(2) energy. This is the same energy as the work Leo Szilard's engine produces in the idealistic case, which in turn equals to the same quantity found by Landauer. In his book, he further explored this problem concluding that any cause of a bit value change (measurement, decision about a yes/no question, erasure, display, etc.) will require the same amount, kT ln(2), of energy. Consequently, acquiring information about a system's microstates is associated with an entropy production, while erasure yields entropy production only when the bit value is changing. Setting up a bit of information in a sub-system originally in thermal equilibrium results in a local entropy reduction. However, there is no violation of the second law of thermodynamics, according to Brillouin, since a reduction in any local system's thermodynamic entropy results in an increase in thermodynamic entropy elsewhere. In this way, Brillouin clarified the meaning of negentropy which was considered as controversial because its earlier understanding can yield Carnot efficiency higher than one. Additionally, the relationship between energy and information formulated by Brillouin has been proposed as a connection between the amount of bits that the brain processes and the energy it consumes: Collell and Fauquet argued that De Castro analytically found the Landauer limit as the thermodynamic lower bound for brain computations. However, even though evolution is supposed to have "selected" the most energetically efficient processes, the physical lower bounds are not realistic quantities in the brain. Firstly, because the minimum processing unit considered in physics is the atom/molecule, which is distant from the actual way that brain operates; and, secondly, because neural networks incorporate important redundancy and noise factors that greatly reduce their efficiency. Laughlin et al. was the first to provide explicit quantities for the energetic cost of processing sensory information. Their findings in blowflies revealed that for visual sensory data, the cost of transmitting one bit of information is around 5 × 10−14 Joules, or equivalently 104 ATP molecules. Thus, neural processing efficiency is still far from Landauer's limit of kTln(2) J, but as a curious fact, it is still much more efficient than modern computers.
wikipedia
wiki_36736_chunk_19
Conditional probability
{| class="wikitable" style="text-align:center; width:300px" |+ Table 3 ! rowspan=2 colspan=2 | + ! colspan=6 | D2 |- ! scope="col" | 1 ! scope="col" | 2 ! scope="col" | 3 ! scope="col" | 4 ! scope="col" | 5 ! scope="col" | 6 |- ! rowspan=6 scope="row" | D1 ! 1 | style="background:silver;" | 2 || style="background:silver;" | 3 || style="background:silver;" | 4 || style="background:silver;" | 5 || 6 || 7 |- ! scope="row" | 2 | style="background:red;" | 3 || style="background:red;" | 4 || style="background:red;" | 5 || 6 || 7 || 8 |- ! scope="row" | 3 | style="background:silver;" | 4 || style="background:silver;" | 5 || 6 || 7 || 8 || 9 |- ! scope="row" | 4 | style="background:silver;" | 5 || 6 || 7 || 8 || 9 || 10 |- ! scope="row" | 5 | 6 || 7 || 8 || 9 || 10 || 11 |- ! scope="row" | 6 | 7 || 8 || 9 || 10 || 11 || 12 |}
wikipedia
wiki_26525_chunk_12
Materials science in science fiction
In the 2016 tenth season of the television show The X-Files, the episode "My Struggle" features a triangular, levitating aircraft built from alien technology. When Fox Mulder asks a scientist how the aircraft could turn invisible, the scientist states "Element 115: Ununpentium," apparently obtained from the alien spacecraft crash site at Roswell, New Mexico in 1947. |There is considerable scientific speculation about the possibility of stable elements in the Island of stability. However, moscovium has been produced by two different groups and is highly unstable. It decays in less than a second to nihonium, element 113, by alpha emission. |- |Neutronium |various (see this list, for example) |An extremely dense material made entirely of neutrons, it is theorized to be the main constituent of neutron stars, held together by its own gravity. Authors build space ships out of it and attribute to it various desirable qualities as armor, structural material, etc. Under the immense pressure of the neutron star's gravity, the atoms at the surface form a material roughly 1013 times as dense as earth iron and at least 10 billion (1010) times as strong as earth steel and which might be incorporated into a composite material in the same way as nanotubes. |Neutronium is actually expected to decompose messily at any reasonable pressure. |- |Perfluoropropyl furan (oxygenated perfluorocarbon for liquid breathing) |The Abyss|A mysterious (unnamed?) breathable liquid is used as the oxygen-carrying atmosphere in a deep-sea diving suit. A real lab rat is "drowned" in a beaker of the liquid, but overcoming initial panic, swims around quite happily. Critics have noted this as an example of an implausible science fiction effect that is really possible. |Although applications for humans are limited to artificial respiration systems (e.g. LiquiVent), mice have survived prolonged submersions in liquid fluorocarbons in which the solubility of oxygen is very high. When the animal is returned to dry land, the liquid vaporizes from its lungs and it can again breathe air. |- |Polonium |various |In Sold to Satan by Mark Twain, Satan's body of radium is cloaked in a protective skin of polonium. |Polonium makes a very poor protective coating – at just above room temperature, it evaporates into air in a short time. |- |Rhodium |Jack Williamson's The Humanoids|Rhodium and metals next to it in the periodic table can be used to harness "rhodomagnetism", a force similar to electromagnetism. This force has truly spectacular properties – it propagates instantaneously, can fission any heavy element, and deforms the space-time continuum, enabling faster-than-light communication and travel. Rhodomagnetism is also mentioned in passing in Fredric Brown's What Mad Universe. However, this has been derided by critics as "sheerest gobbledygook". |Rhodium is a member of the platinum group of metals, which has useful but not spectacular properties. |- |Room temperature superconductors |Ringworld and many others |In science fiction, superconductors that operate at ambient temperature and pressure are used to levitate massive objects without use of power, and revolutionize many technologies, among them power transmission and energy storage. |The idea is not absurd; room temperature superconductivy has been achieved at high pressure and possible routes to more practical efforts are under investigation. In particular, it is very difficult to state categorically that low pressure, room temperature superconductivity is impossible, since there is currently no theory that explains how high temperature superconductors (which still require cooling much below room temperature) work. |- |Selenium |Ghostbusters, Evolution, I, Robot, Lexx|In the film Ghostbusters, the site of the climactic final battle against Gozer takes place on the Ivo Shandor building which earlier in the film is stated as being “cold-riveted girders, with cores of pure selenium.” The building itself is used as an antenna to draw surrounding psychokinetic energy in order to bring Gozer into our world.
wikipedia
wiki_16532_chunk_1
Computational visualistics
Overview Images take a rather prominent place in contemporary life in the western societies. Together with language, they have been connected to human culture from the very beginning. For about one century – after several millennia of written word's dominance – their part is increasing again remarkably. Steps toward a general science of images, which we may call 'general visualistics' in analogy to general linguistics, have only been taken recently. So far, a unique scientific basis for circumscribing and describing the heterogeneous phenomenon "image" in an interpersonally verifiable manner hasstill been missing while distinct aspects falling in the domain of visualistics have predominantly been dealt with in several other disciplines, among them in particular philosophy, psychology, and art history. Last (though not least), important contributions to certain aspects of a new science of images have come from computer science.
wikipedia
wiki_15364_chunk_21
Mathematical sociology
The Mathematical Sociology section of The American Sociological Association in 2002 initiated awards for contributions to the field, including The James S. Coleman Distinguished Career Achievement Award. (Coleman had died in 1995 before the section had been established.) Given every other year, the awardees include some of those just listed in terms of their career-long research programs: 2020: Noah Friedkin, University of California, Santa Barbara 2018: Ronald Breiger, University of Arizona 2017: Lynn Smith-Lovin, Duke University. 2014: Philip Bonacich, University of California, Los Angeles. 2012: John Skvoretz, University of South Florida. 2010: David R. Heise, Indiana University. 2008: Scott Boorman, Yale University. 2006: Linton Freeman, University of California, Irvine. 2004: Thomas Fararo, University of Pittsburgh. 2002: Harrison White, Columbia University.
wikipedia
wiki_15536_chunk_7
Parks–McClellan filter design algorithm
The Parks–McClellan Algorithm may be restated as the following steps: Make an initial guess of the L+2 extremal frequencies. Compute δ using the equation given. Using Lagrange Interpolation, we compute the dense set of samples of A(ω) over the passband and stopband. Determine the new L+2 largest extrema. If the alternation theorem is not satisfied, then we go back to (2) and iterate until the alternation theorem is satisfied. If the alternation theorem is satisfied, then we compute h(n) and we are done.
wikipedia
wiki_5536_chunk_2
Unicon (programming language)
Feature list Classes and packages Exceptions as a contributed class library - see mailing list Loadable child programs Monitoring of child programs Dynamic loading of C modules (some platforms) Multiple inheritance, with novel semantics ODBC database access dbm files can be used as associative arrays Posix system interface 3D graphics True concurrency (on platforms supporting Posix threads) When run as a graphical IDE, the Unicon program ui.exe continues to offer links to Icon help.
wikipedia
wiki_28992_chunk_11
Routing in delay-tolerant networking
An adaptive algorithm is used to determine the delivery predictabilities in each Mule. The Mule M stores delivery predictabilities P(M,D) for each known destination D. If the Mule has not stored a predictability value for a destination P(M,D) is assumed to be zero. The delivery predictabilities used by each Mule are recalculated at each opportunistic encounter according to three rules: When the Mule M encounters another Mule E, the predictability for E is increased: P(M,E)new = P(M,E)old + (1 - P(M,E)old) * Lencounter where Lencounter is an initialisation constant. The predictabilities for all destinations D other than E are 'aged': P(M,D)new = P(M,D)old * γK where γ is the aging constant and K is the number of time units that has elapsed since the last aging. Predictabilities are exchanged between M and E and the 'transitive' property of predictability is used to update the predictability of destinations D for which E has a P(E,D) value on the assumption that M is likely to meet E again: P(M,D)new = P(M,D)old + (1 - P(M,D)old) * P(M,E) * P(E,D) * β where β is a scaling constant.
wikipedia
wiki_36606_chunk_8
National Institute for Mathematical and Biological Synthesis
Research The need for the Institute arose out of the significant growth of the field of mathematical biology over the last decade with research becoming more closely linked to observation and experiment. Rather than starting from mathematical abstractions, it is now common for researchers to: 1) Begin with observations; 2) Use those to suggest promising methods, tools and models; and 3) Proceed to analysis, simulation, evaluation and application. Across the spectrum of the life sciences in which mathematics has been contributing new insights, data are increasingly used to focus conceptual models as the first step in problem formulation.
wikipedia
wiki_14220_chunk_6
Yerevan Physics Institute
Below are the integral parameters characterizing the efficiency of research conducted by national lab: number of publications and citations. The sizable enlargement of both parameters during last years is apparent. National lab scientists publish appr. 30% of scientific publications of Armenia. Most of publications appear in high impact factor journals; high quality of research in national lab is proved by citations – more than 60% of overall citations to papers published by scientists from Armenia belong to national lab. Structure The YerPhI has seven divisions and Computer Centre.
wikipedia
wiki_29330_chunk_1
Monoculture (computer science)
Overview With the global trend of increased usage and reliance on computerized systems, some vendors supply solutions that are used throughout the industry (such as Microsoft Windows) - this forms algorithmic monocultures. Monocultures form naturally since they utilize economies of scale, it is cheaper to manufacture and distribute a single solution. Furthermore, by being used by a large community bugs are discovered relativity fast.
wikipedia
wiki_30212_chunk_3
Car Mechanics
Project cars In the early days of Car Mechanics, project cars were an important part of the magazine and Kelsey reintroduced them, having now had over 100 project cars since 1992. Current projects include a Ford Fiesta MkVII and a Vauxhall Insignia. Past projects have ranged in price from free - Volvo 240, Rover 600, Ford Granada MkIII Ghia to three or four thousand pounds - BMWs etc. They include a Ford Escort MkIV, Ford Mondeo MkI, Citroen 2CV restoration, MGB restoration, Austin Metro, a Jaguar XJ40, an ex police Vauxhall Astra MkIII, ex-customs seizure Citroen XM TD, even a Sherpa minibus and, more recently, an ex-police Ford Mondeo MkIII, Jaguar X300, Volvo V70 diesel, Mazda MX-5, MG ZR, Saab 9-5, Land Rover Freelander, Volkswagen Golf MkIV, Skoda Octavia, Audi A6 Avant, Land Rover Discovery, Jaguar S Type, Vauxhall Astra MkIV, Ford Escort Mexico, Alfa Romeo 156, Lexus IS200, Audi A3, Daewoo Matiz, a Nissan Micra, a Ford Focus Diesel Estate, Vauxhall Zafira, Jaguar X Type, Toyota Prius, Mercedes Benz E Class diesel Estate, Ford Ka and Peugeot 207CC . Some of their restoration project articles were compiled and sold in book form.
wikipedia
wiki_1061_chunk_3
Bresenham's line algorithm
A description of the line drawing routine was accepted for presentation at the 1963 ACM national convention in Denver, Colorado. It was a year in which no proceedings were published, only the agenda of speakers and topics in an issue of Communications of the ACM. A person from the IBM Systems Journal asked me after I made my presentation if they could publish the paper. I happily agreed, and they printed it in 1965. Bresenham's algorithm has been extended to produce circles, ellipses, cubic and quadratic bezier curves, as well as native anti-aliased versions of those. Method
wikipedia
wiki_12276_chunk_0
Microsimulation
Microsimulation (from microanalytic simulation or microscopic simulation) is a category of computerized analytical tools that perform highly detailed analysis of activities such as highway traffic flowing through an intersection, financial transactions, or pathogens spreading disease through a population. Microsimulation is often used to evaluate the effects of proposed interventions before they are implemented in the real world. For example, a traffic microsimulation model could be used to evaluate the effectiveness of lengthening a turn lane at an intersection, and thus help decide whether it is worth spending money on actually lengthening the lane. Introduction
wikipedia
wiki_19395_chunk_5
Functional reactive programming
Implementation issues There are two types of FRP systems, push-based and pull-based. Push-based systems take events and push them through a signal network to achieve a result. Pull-based systems wait until the result is demanded, and work backwards through the network to retrieve the value demanded. Some FRP systems such as Yampa use sampling, where samples are pulled by the signal network. This approach has a drawback: the network has to wait up to the duration of one computation step to find out about changes to the input. Sampling is an example of pull-based FRP.
wikipedia
wiki_27325_chunk_5
American Railway Engineering and Maintenance-of-Way Association
Technical committees AREMA has 29 technical committees, organized in six functional groups. The committees, whose volunteer members come from the railroad industry, meet on a regular basis and use their expertise to come up with the best methods to maintain a railroad. Structures Timber Structures (Committee 7) Concrete Structures & Foundations (Committee 8) Seismic Design for Railway Structures (Committee 9) Structures Maintenance & Construction (Committee 10) Steel Structures (Committee 15) Clearances (Committee 28) Passenger & Transit Commuter & Intercity Rail Systems (Committee 11) Rail Transit (Committee 12) High Speed Rail Systems (Committee 17) Electric Energy Utilization (Committee 33) Track Roadway & Ballast (Committee 1) Rail (Committee 4) Track (Committee 5) Maintenance of Way Work Equipment (Committee 27) Ties (Committee 30) Engineering Services Track Measuring and Assessment Systems (Committee 2) Building & Support Facilities (Committee 6) Environmental (Committee 13) Yards & Terminals (Committee 14) Economics of Railway Engineering & Operations (Committee 16) Light Density & Short Line Railways (Committee 18) Education & Training (Committee 24) Communications & Signals Scales (Committee 34) Highway-Rail Grade Crossing Warning Systems (Committee 36) Signal Systems (Committee 37) Information, Defect Detection & Energy Systems (Committee 38) Positive Train Control (Committee 39) Maintenance Engineering Safety Steering Team (Committee 40) Track Maintenance Steering Team (Committee 41) Bridge Maintenance Steering Team (Committee 42) Signals Maintenance Steering Team (Committee 43)
wikipedia
wiki_9704_chunk_6
Goertzel algorithm
DFT computations For the important case of computing a DFT term, the following special restrictions are applied. The filtering terminates at index , where is the number of terms in the input sequence of the DFT. The frequencies chosen for the Goertzel analysis are restricted to the special form The index number indicating the "frequency bin" of the DFT is selected from the set of index numbers Making these substitutions into equation (6) and observing that the term , equation (6) then takes the following form:
wikipedia
wiki_11354_chunk_2
Ben Mathews
|- style="background-color: #EAEAEA" ! scope="row" style="text-align:center" | 1997 |style="text-align:center;"| | 36 || 4 || 1 || 0 || 18 || 13 || 31 || 3 || 5 || 0.3 || 0.0 || 4.5 || 3.3 || 7.8 || 0.8 || 1.3 |- ! scope="row" style="text-align:center" | 1998 |style="text-align:center;"| | 36 || 0 || — || — || — || — || — || — || — || — || — || — || — || — || — || — |- style="background:#eaeaea;" ! scope="row" style="text-align:center" | 1999 |style="text-align:center;"| | 36 || 17 || 4 || 0 || 122 || 82 || 204 || 47 || 16 || 0.2 || 0.0 || 7.2 || 4.8 || 12.0 || 2.8 || 0.9 |- ! scope="row" style="text-align:center" | 2000 |style="text-align:center;"| | 36 || 22 || 2 || 4 || 270 || 164 || 434 || 102 || 30 || 0.1 || 0.2 || 12.3 || 7.5 || 19.7 || 4.6 || 1.4 |- style="background:#eaeaea;" ! scope="row" style="text-align:center" | 2001 |style="text-align:center;"| | 4 || 23 || 4 || 2 || 264 || 146 || 410 || 113 || 46 || 0.2 || 0.1 || 11.5 || 6.3 || 17.8 || 4.9 || 2.0 |- ! scope="row" style="text-align:center" | 2002 |style="text-align:center;"| | 4 || 21 || 4 || 1 || 211 || 150 || 361 || 66 || 65 || 0.2 || 0.0 || 10.0 || 7.1 || 17.2 || 3.1 || 3.1 |- style="background:#eaeaea;" ! scope="row" style="text-align:center" | 2003 |style="text-align:center;"| | 4 || 23 || 4 || 0 || 237 || 152 || 389 || 94 || 59 || 0.2 || 0.0 || 10.3 || 6.6 || 16.9 || 4.1 || 2.6 |- ! scope="row" style="text-align:center" | 2004 |style="text-align:center;"| | 4 || 24 || 6 || 8 || 239 || 204 || 443 || 109 || 94 || 0.3 || 0.3 || 10.0 || 8.5 || 18.5 || 4.5 || 3.9 |- style="background:#eaeaea;" ! scope="row" style="text-align:center" | 2005 |style="text-align:center;"| | 4 || 25 || 6 || 4 || 200 || 161 || 361 || 77 || 75 || 0.2 || 0.2 || 8.0 || 6.4 || 14.4 || 3.1 || 3.0 |- ! scope="row" style="text-align:center" | 2006 |style="text-align:center;"| | 4 || 14 || 5 || 2 || 83 || 77 || 160 || 44 || 37 || 0.4 || 0.1 || 5.9 || 5.5 || 11.4 || 3.1 || 2.6 |- style="background:#eaeaea;" ! scope="row" style="text-align:center" | 2007 |style="text-align:center;"| | 4 || 23 || 8 || 2 || 168 || 137 || 305 || 89 || 67 || 0.3 || 0.1 || 7.3 || 6.0 || 13.3 || 3.9 || 2.9 |- ! scope="row" style="text-align:center" | 2008 |style="text-align:center;"| | 4 || 2 || 1 || 1 || 12 || 11 || 23 || 9 || 4 || 0.5 || 0.5 || 6.0 || 5.5 || 11.5 || 4.5 || 2.0 |- class="sortbottom" ! colspan=3| Career ! 198 ! 45 ! 24 ! 1824 ! 1297 ! 3121 ! 753 ! 498 ! 0.2 ! 0.1 ! 9.2 ! 6.6 ! 15.8 ! 3.8 ! 2.5 |}
wikipedia
wiki_7131_chunk_4
Revolutions per minute
On many kinds of disc recording media, the rotational speed of the medium under the read head is a standard given in rpm. Phonograph (gramophone) records, for example, typically rotate steadily at , , 45 or 78 rpm (0.28, 0.55, 0.75, or 1.3 Hz respectively). Modern air turbine dental drills can rotate at up to 800,000 rpm (13.3 kHz). The second hand of a conventional analog clock rotates at 1 rpm. Audio CD players read their discs at a precise, constant rate (4.3218 Mbit/s of raw physical data for 1.4112 Mbit/s (176.4 kB/s) of usable audio data) and thus must vary the disc's rotational speed from 8 Hz (480 rpm) when reading at the innermost edge, to 3.5 Hz (210 rpm) at the outer edge. DVD players also usually read discs at a constant linear rate. The disc's rotational speed varies from 25.5 Hz (1530 rpm) when reading at the innermost edge, to 10.5 Hz (630 rpm) at the outer edge. A washing machine's drum may rotate at 500 to 2,000 rpm (8–33 Hz) during the spin cycles. A baseball thrown by a Major League Baseball pitcher can rotate at over 2,500 rpm (41.7 Hz); faster rotation yields more movement on breaking balls. A power generation turbine (with a two-pole alternator) rotates at 3000 rpm (50 Hz) or 3600 rpm (60 Hz), depending on country – see AC power plugs and sockets. Modern automobile engines are typically operated around 2,000–3,000 rpm (33–50 Hz) when cruising, with a minimum (idle) speed around 750–900 rpm (12.5–15 Hz), and an upper limit anywhere from 4500 to 10,000 rpm (75–166 Hz) for a road car, or nearly (sometimes over) 20,000 rpm for racing engines such as those in Formula 1 cars (during the season, with the 2.4 L N/A V8 engine configuration; currently limited to 15,000 rpm, with the 1.6 L V6 turbo-hybrid engine configuration). The exhaust note of V8, V10, and V12 F1 cars has a much higher pitch than an I4 engine, because each of the cylinders of a four-stroke engine fires once for every two revolutions of the crankshaft. Thus an eight-cylinder engine turning 300 times per second will have an exhaust note of 1,200 Hz. A piston aircraft engine typically rotates at a rate between 2,000 and 3,000 rpm (30–50 Hz). Computer hard drives typically rotate at 5,400 or 7,200 rpm (90 or 120 Hz), the most common speeds for the ATA or SATA-based drives in consumer models. High-performance drives (used in fileservers and enthusiast-gaming PCs) rotate at 10,000 or 15,000 rpm (160 or 250 Hz), usually with higher-level SATA, SCSI or Fibre Channel interfaces and smaller platters to allow these higher speeds, the reduction in storage capacity and ultimate outer-edge speed paying off in much quicker access time and average transfer speed thanks to the high spin rate. Until recently, lower-end and power-efficient laptop drives could be found with 4,200 or even 3,600 rpm spindle speeds (70 and 60 Hz), but these have fallen out of favour due to their lower performance, improvements in energy efficiency in faster models and the takeup of solid-state drives for use in slimline and ultraportable laptops. Similar to CD and DVD media, the amount of data that can be stored or read for each turn of the disc is greater at the outer edge than near the spindle; however, hard drives keep a constant rotational speed so the effective data rate is faster at the edge (conventionally, the "start" of the disc, opposite to a CD or DVD). Floppy disc drives typically ran at a constant 300 or occasionally 360 rpm (a relatively slow 5 or 6 Hz) with a constant per-revolution data density, which was simple and inexpensive to implement, though inefficient. Some designs such as those used with older Apple computers (Lisa, early Macintosh, later II's) were more complex and used variable rotational speeds and per-track storage density (at a constant read/record rate) to store more data per disc; for example, between 394 rpm (with 12 sectors per track) and 590 rpm (8 sectors) with Mac's 800 KB double-density drive at a constant 39.4 KB/s (max) – versus 300 rpm, 720 KB and 23 KB/s (max) for double-density drives in other machines. A Zippe-type centrifuge for enriching uranium spins at 90,000 rpm (1,500 Hz) or faster. Gas turbine engines rotate at tens of thousands of rpm. JetCat model aircraft turbines are capable of over 100,000 rpm (1,700 Hz) with the fastest reaching 165,000 rpm (2,750 Hz). A Flywheel energy storage system works at 60,000–200,000 rpm (1–3 kHz) range using a passively magnetic levitated flywheel in a vacuum. The choice of the flywheel material is not the most dense, but the one that pulverises the most safely, at surface speeds about 7 times the speed of sound. A typical 80 mm, 30 CFM computer fan will spin at 2,600–3,000 rpm (43–50 Hz) on 12-V DC power. A millisecond pulsar can have near 50,000 rpm (833 Hz). A turbocharger can reach 290,000 rpm (4.8 kHz), while 80,000–200,000 rpm (1–3 kHz) is common. A supercharger can spin at speeds between or as high as 50,000-65,000 rpm (833–1083 Hz) Molecular microbiology – molecular engines. The rotation rates of bacterial flagella have been measured to be 10,200 rpm (170 Hz) for Salmonella typhimurium, 16,200 rpm (270 Hz) for Escherichia coli, and up to 102,000 rpm (1,700 Hz) for polar flagellum of Vibrio alginolyticus, allowing the latter organism to move in simulated natural conditions at a maximum speed of 540 mm/h.
wikipedia
wiki_37773_chunk_11
Statistics education
Scheaffer states that a goal of statistics education is to have students see statistics broadly. He developed a list of views of statistics that can lead to this broad view, and describes them as follows: Statistics as number sense: Do I understand what the numbers mean? (seeing data as numbers in context, reading charts, graphs and tables, understanding numerical and graphical summaries of data, etc.) Statistics as a way of understanding the world: Can I use existing data to help make decisions? (using census data, birth and death rates, disease rates, CPI, ratings, rankings, etc., to describe, decide and defend) Statistics as organized problem solving: Can I design and carry out a study to answer specific questions? (pose problem, collect data according to a plan, analyze data, and draw conclusions from data)
wikipedia
wiki_15804_chunk_1
Molecular model
Overview Physical models of atomistic systems have played an important role in understanding chemistry and generating and testing hypotheses. Most commonly there is an explicit representation of atoms, though other approaches such as soap films and other continuous media have been useful. There are several motivations for creating physical models: as pedagogic tools for students or those unfamiliar with atomistic structures; as objects to generate or test theories (e.g., the structure of DNA); as analogue computers (e.g., for measuring distances and angles in flexible systems); as aesthetically pleasing objects on the boundary of art and science.
wikipedia
wiki_36620_chunk_7
Grey Literature Network Service
GreyNet and the OpenGrey Repository For the past 20 years, GreyNet has sought to serve researchers and authors in the field of grey literature. To further this end, GreyNet has signed on to the OpenGrey repository and in so doing seeks to preserve and make openly available research results originating in the International Conference Series on Grey Literature. GreyNet together with INIST-CNRS have designed the format for a metadata record, which encompasses standardized PDF attachments of the full-text conference preprints, PowerPoint presentations, abstracts, biographical notes, and post-publication commentaries. GreyNet's collection of over 270 conference preprints is both current and comprehensive. Comment from Peter Suber, Open Access News (Thursday, January 29, 2009): GreyNet started making its conference proceedings OA through its repository in May 2008. I applaud its determination to complete the collection retroactively, even if it means buying permission from a publisher. Note to other conference organizers: This is a reason to self-archive your proceedings as you go, or at least to retain the right to self-archive them without a fee.
wikipedia
wiki_13839_chunk_16
Computational theory of mind
Pancomputationalism Supporters of CTM are faced with a simple yet important question whose answer has proved elusive and controversial: what does it take for a physical system (such as a mind, or an artificial computer) to perform computations? A very straightforward account is based on a simple mapping between abstract mathematical computations and physical systems: a system performs computation C if and only if there is a mapping between a sequence of states individuated by C and a sequence of states individuated by a physical description of the system
wikipedia
wiki_18985_chunk_24
Reader's Digest Select Editions
2011Volume 313 - #1 61 Hours - Lee Child Small Change - Sheila Roberts Nowhere to Run - C. J. Box Leaving Unknown - Kerry ReichsVolume 314 - #2 Crossfire - Dick Francis and Felix Francis Sweet Misfortune - Kevin Alan Milne Outwitting Trolls - William G. Tapply Letters from Home - Kristina McMorrisVolume 315 - #3 Safe Haven - Nicholas Sparks The Sentry - Robert Crais An Irish Country Courtship - Patrick Taylor The Provence Cure for the Brokenhearted - Bridget AsherVolume 316 - #4 Never Look Away - Linwood Barclay Promise Me - Richard Paul Evans Lipstick in Afghanistan - Roberta Gately I Still Dream About You - Fannie FlaggVolume 317 - #5 Now You See Her - Joy Fielding The Peach Keeper - Sarah Addison Allen Buried Secrets - Joseph Finder The Oracle of Stamboul - Michael David LukasVolume 318 - #6 The Orchard - Jeffrey Stepakoff Worth Dying For - Lee Child How to Bake a Perfect Life - Barbara O'Neal On Borrowed Time - David Rosenfelt
wikipedia
wiki_15699_chunk_2
List of Ace miscellaneous letter-series single titles
D-032 NA Dorothy Malone Cookbook For Beginners (1953) D-043 NA George S. Viereck and Paul Eldridge Salome: My First 2000 Years Of Love (1953) S-054 NA Carl Offord The Naked Fear (1954) S-058 NA Joachim Joesten Vice, Inc. (1954) D-062 NA Ken Murray Ken Murray's Giant Joke Book (1954) D-065 NA Juanita Osborne Tornado Edward Kimbrough Night Fire (1954) S-067 NA Robert Bloch The Will to Kill (1954) S-070 NA Rae Loomis Luisita (1954) S-074 NA Virginia M. Harrison (as Wilene Shaw) Heat Lightning (1954) S-075 NA Ralph E. Shikes (ed.) Cartoon Annual (1954) S-076 NA Émile Zola Shame S-080 NA Wilene Shaw The Fear and the Guilt S-085 NA Ernst-Maurice Tessier (as Maurice Dekobra) The Bachelor's Widow (1954) S-087 NA Noland Miller Why I Am So Beat (1955) D-088 NA Dexter Davis (author) 7-Day System for Gaining Self-Confidence (1955) S-091 NA Stanley Baron End of the Line (1955) S-093 NA H. T. Elmo Modern Casanova's Handbook (1955) S-095 NA Harry Whittington The Naked Jungle (1955) S-100 NA Henry Lewis Nixon The Caves (1955) S-102 NA George Albert Glay Oath of Seven (1955) S-104 NA R. V. Cassill and Eric Protter Left Bank Of Desire (1955) S-105 NA Edward De Roo The Fires of Youth (1955) S-107 NA C. P. Hewitt (as Peter Twist) The Gilded Hideaway (1955) S-108 NA Leslie Waller (as C.S. Cody) Lie Like a Lady (1955) S-111 NA Harry Harrison Kroll The Smoldering Fire (1955) S-114 NA Edward Adler Living It Up (1955) S-116 NA Brant House Words Fail Me (1955) S-117 NA Kim Darien Dark Rapture (1955) S-119 NA Lawrence Easton The Driven Flesh (1955) S-122 NA Ledru Baker Jr. The Preying Streets (1955) S-124 NA Rae Loomis House of Deceit (1955) S-126 NA A. H. Berzen Washington Bachelor (1955) D-127 NA Robert Payne Alexander And The Camp Follower (1955) S-130 NA Sidney Weissman Backlash (1955) D-131 NA Eugene Wyble The Ripening S-132 NA Brant House (ed.) Cartoon Annual #2 (1955) S-136 NA R. V. Cassill A Taste of Sin S-137 NA Ralph Jackson Violent Night (1955) S-140 NA H. T. Elmo Honeymoon Humor (1956) S-141 NA Oliver Crawford Blood on the Branches (1956) S-142 NA Glenn M. Barns Masquerade in Blue (1956) S-143 NA Harry Whittington A Woman On The Place (1956) S-145 NA Brant House (ed.) Little Monsters (1956) S-151 NA Robert Novak Climb a Broken Ladder (1956) S-152 NA Henry Felsen Medic Mirth (1956) S-153 NA Hallam Whitney The Wild Seed (1956) D-154 NA Sloan Wilson Voyage to Somewhere (1956) S-158 NA Kim Darien Golden Girl (1956) S-159 NA Jack Webb (as John Farr) She Shark (1956) S-161 NA E. Davis Gag Writer's Private Joke Book (1956) D-163 NA Russell Boltar Woman's Doctor (1956) S-165 NA Brant House (ed.) Love and Hisses (1956) S-171 NA Eddie Davis (ed.) Campus Joke Book (1956) S-174 NA Robert Novak B-Girl (1956) D-175 NA Irving Settel (ed.) Best Television Humor of the Year (1956) D-178 NA Jean Paradise The Savage City (1956) S-179 NA Brant House (ed.) Squelches (1956) D-181 NA Arthur Conan Doyle and John Dickson Carr The Exploits of Sherlock Holmes (1956) D-184 NA J. Mccague The Big Ivy (1956) S-188 NA Brant House (ed.) They Goofed! (1956) S-190 NA Henry Lewis Nixon The Golden Couch (1956) D-191 NA Frank Slaughter Apalachee Gold (1956) D-194 NA Theodor Plievier Moscow (1956) S-198 NA William Bender Jr. Tokyo Intrigue (1957) D-200 NA Edward J. Ruppelt Unidentified Flying Objects (1956) D-202 NA Leonard Kauffman The Color of Green (1957) D-207 NA Charles Grayson Hollywood DoctorD-210 NA Stephen Longstreet The Lion at Morning (1957) D-212 NA H. T. Elmo Hollywood Humor (1957) D-213 NA Peter J. Steincrohn, M.D. How to Stop Killing Yourself (1957) D-214 NA Martin L. Weiss Hate AlleyD-218 NA Sasha Siemel Tigrero! S-219 NA P. A. Hoover Backwater Woman (1957) D-222 NA R. Frison-Roche First on the Rope (1957) D-224 NA Shelby Steger Desire in the Ozarks (1957) D-228 NA David Howarth We Die Alone (1957) D-229 NA Walter Whitney Take It Out In Trade (1957) D-232 NA Willard Manies The Fixers (1957) D-234 NA Robert L. Scott Look of the Eagle (1957) D-238 NA Clellon Holmes Go (1957) D-239 NA G. Harry Stine Earth Satellite and the Race for Space Superiority (1957) D-243 NA Michael Wells The Roving Eye (1957) D-244 NA Terence Robinson Night Raider of the Atlantic: The Saga of the U-99 (1957) D-246 NA John Harriman The Magnate (1957) D-250 NA Arthur Steuer The Terrible Swift Sword (1957) D-251 NA Hamilton Cochran Windward Passage (1957) D-254 NA Marcos Spinelli The Lash of Desire (1957) S-256 NA Karl Ludwig Oritz The General (1957) D-257 NA Louis Malley Tiger in the Streets (1957) D-258 NA Sławomir Rawicz The Long Walk (1957) S-262 NA Leland Jamieson Attack! (1957) S-263 NA Virginia M. Harrison (as Wilene Shaw) See How They Run (1957) D-267 NA Jim Bosworth Speed Demon (1958) D-268 NA Brant House (ed.) Lincoln's Wit, Humorous Tales And Anecdotes By And About Our 16th President (1958) D-269 NA Michael Powell Death in the South AtlanticD-270 NA Bud Clifton D For DelinquentD-271 NA Cliff Howe Lovers And Libertines (1958) S-275 NA Brant House (ed.) Cartoon Annual #3- The Cream of the Year's Best Cartoons (1958) D-278 NA Donald Barr Chidsey This Bright Sword (1957) D-280 NA James P. S. Devereux The Story Of Wake IslandD-281 NA Norman Vincent Peale (ed.) Guideposts (1958) D-282 NA Cliff Howe Scoundrels, Fiends, and Human Monsters (1958) D-287 NA Holland M. Smith Coral And Brass (1958) D-290 NA P. A. Hoover A Woman Called Trouble (1958) D-292 NA Booth Mooney The Insiders (1958) D-293 NA Väinö Linna The Unknown Soldier (1954) D-296 NA John Clagett Run The River Gauntlet (1958) D-300 NA J. Walter Small The Dance Merchants (1958) D-302 NA Maurice Druon The Iron King (1956) D-306 NA Peyson Antholz All Shook Up (1958) D-307 NA Brant House (ed.) From Eve On: Wit And Wisdom About Women (1958) D-310 NA Marcos Spinelli Mocambu (1958) D-312 NA Harlan Ellison The Deadly Streets (1958) D-314 NA Blair Ashton Deeds Of Darkness (1958) D-318 NA Donald Barr Chidsey Captain Crossbones (1958) D-319 NA Hans-Otto Meissner The Man With Three Faces (1958) D-323 NA Brant House The Violent Ones (1958) D-325 NA Irving Werstein July 1863 (1958) D-326 NA Wilhelm Johnen Battling The BombersD-330 NA Bud Clifton Muscle Boy (1958) D-334 NA Stanley Johnston Queen of the Flat-Tops (1958) D-336 NA Samuel A. Krasney Morals SquadD-337 NA Jack Gerstine Play It CoolD-338 NA Edward De Roo The Fires Of YouthD-341 NA Rae Loomis The Marina Street Girls (1959) D-342 NA Nicholas Gorham Queen's Blade (1959) D-343 NA Edward de Roo The Young Wolves (1959) D-344 NA Gordon Landsborough Desert Fury (1959) G-352 NA Francis Leary Fire And Morning (1959) D-353 NA Donald A. Wollheim (ed.) The Macabre ReaderD-355 NA Bill Strutton and Michael Pearson The Beachhead Spies (1958) D-359 NA John Croydon (as John Cooper) The Haunted Strangler (1959) D-363 NA Samuel A. Krasney The Rapist (1959) D-364 NA Donald Barr Chidsey The Pipes Are Calling (1959) D-365 NA Robert Eunson MIG Alley (1959) D-370 NA Paul Ernst (as Ernest Jason Fredericks) Cry Flood (1959) G-371 NA Theodor Plievier Berlin (1959) D-374 NA Burgess Leonard The Thoroughbred And The Tramp (1959) G-376 NA J. Harvey Howells The Big Company Look (1959) D-378 NA Virginia M. Harrison (as Wilene Shaw) Out For KicksG-382 NA C. T. Ritchie Willing MaidD-383 NA David Stacton (as Bud Clifton) The Murder Specialist (1959) G-386 NA Richard O'Connor The Sulu Sword (1959) D-389 NA Cyril Henry Coles and Adelaide Manning (jointly as Manning Cole) No Entry (1959) G-390 NA R. Foreman Long PigD-394 NA Donald Barr Chidsey The Flaming Island (1959) D-396 NA Rae Loomis LuisitaD-398 NA Noland Miller Why Am I So BeatD-399 NA Edward Adler Living It Up (1955) G-402 NA Daniel P. Mannix Kiboko (1959) D-404 NA Clifford Anderson The Hollow Hero (1959) D-406 NA Edward Deroo Go, Man, Go! (1959) D-410 NA Donald Barr Chidsey Buccaneer's Blade (1959) D-414 NA Alexandre Dumas The Companions of Jehu (1960) D-416 NA John Kenneth The Big Question (1960) D-417 NA Edward de Roo Rumble at the Housing Project (1960) D-420 NA John A. Williams The Angry Ones (1960) D-423 NA Browning Norton Tidal Wave (1960) D-426 NA Robert S. Close Penal ColonyD-428 NA P. A. Hoover Scowtown WomanD-429 NA Charles Runyon The Anatomy Of Violence (1960) D-432 NA Donn Broward Convention Queen (1960) D-434 NA Jules Verne The Purchase of the North Pole (1960) D-435 NA C. T. Ritchie Lady In Bondage (1960) D-438 NA Charles Fogg The Panic Button (1960) G-440 NA Andrew Hepburn Letter Of Marque (1960) D-441 NA Lloyd E. Olson Skip Bomber (1960) D-444 NA Shepard Rifkin Desire Island (1960) D-446 NA Edward Moore Flight 685 Is Overdue (1960) D-452 NA Joe L. Hensley The Colour of Hate (1960) G-454 NA Anne Powers Ride East! Ride West! (1960) D-458 NA Harry Wilcox (as Mark Derby) Womanhunt (1960) D-460 NA James Macgregor When The Ship Sank (1960) D-464 NA Virginia M. Harrison (as Wilene Shaw) Tame The Wild Flesh (1960) D-467 NA William C. Anderson Five, Four, Three, Two, One-Pfftt Or 12,000 Men And One Bikini (1960) D-472 NA Harry Whittington A Night For ScreamingD-474 NA Leland Lovelace Lost Mines & Hidden TreasureD-481 NA Joseph F. Dinneen The Biggest Holdup (1960) D-486 NA Edward De Roo The Little CaesarsD-487 NA Leonard Sanders Four-Year HitchD-488 NA Dan Brennan Third Time Down (1961) D-493 NA Ellery Queen (ed.) The Queen's Awards, Fifth SeriesD-495 NA Samuel A. Krasney A Mania For Blondes (1961) D-501 NA David Stacton (as Bud Clifton) Let Him Go Hang (1961) D-503 NA Frances Nichols Hanna (as Fan Nichols) The Girl in the Death Seat (1961) D-506 NA Harry Harrison Kroll The Brazen Dream (1961) D-508 NA Donald A. Wollheim (ed.) More Macabre (1961) D-512 NA Donald Barr Chidsey Marooned (1961) D-513 NA Harlan Ellison The Juvies’’ D-518 NA Bill Miller and Robert Wade (as Wade Miller) Nightmare Cruise (1961) D-519 NA Carroll V. Glines and Wendell F. Moseley Air Rescue! (1961) D-520 NA Virginia M. Harrison (as Wilene Shaw) One Foot In Hell (1961) D-521 NA Margaret Howe The Girl in the White Cap (1961) D-522 NA Hal Ellson A Nest Of Fear (1961) D-523 NA John Jakes (as Jay Scotland) Strike The Black Flag (1961) D-524 NA Maysie Greig (as Jennifer Ames) Overseas Nurse (1961) D-526 NA Kim Darien Obsession (1961) D-529 NA Leslie Turner White The Pirate And The Lady (1961) D-532 NA Isabel Capeto (as Isabel Cabot) Nurse Craig (1961) D-533 NA H. T. Elmo Mad. Ave. (1961) D-536 NA Peggy Gaddis The Nurse And The Pirate (1961) D-539 NA Mary Mann Fletcher Psychiatric Nurse (1962) D-540 NA Arlene Hale School Nurse (1962) D-543 NA Harriet Kathryn Myers Small Town Nurse (1962) D-545 NA Suzanne Roberts Emergency Nurse (1962) D-548 NA Dudley Dean Mcgaughty (as Dean Owen) End of the World (1962) D-549 NA Tracy Adams Spotlight On Nurse Thorne (1962) D-552 NA Patricia Libby Hollywood Nurse D-553 NA William Hope Hodgson The House On The Borderland (1962) D-554 NA Jean Francis Webb (as Ethel Hamill) Runaway Nurse (1962) D-556 NA Ruth Macleod A Nurse For Dr. Sterling (1962) D-557 NA Florence Stuart Hope Wears White (1962) D-558 NA Suzanne Roberts Campus Nurse (1962) D-559 NA Jane L. Sears Ski Resort Nurse (1962) D-560 NA Robert H. Boyer Medic In Love (1962) D-561 NA Ann Rush Nell Shannon R. N. (1963) D-562 NA Patricia Libby Cover Girl Nurse (1963) D-563 NA Arlene Hale Leave It To Nurse Kathy (1963) D-564 NA Harriet Kathryn Myers Prodigal Nurse D-565 NA Ray Dorlen The Heart Of Dr. Hilary (1963) D-566 NA Suzanne Roberts Julie Jones, Cape Canaveral Nurse (1963) D-567 NA Isabel Moore A Challenge For Nurse Melanie (1963) D-569 NA Arlene Hale Dude Ranch Nurse (1963) D-571 NA Katherine Mccomb Princess Of White Starch (1963) D-575 NA Peggy Dern A Nurse Called Hope (1963) D-576 NA Dorothy Karns Dowdell Border Nurse (1963) D-577 NA Sarah Frances Moore Legacy Of Love (1963) D-579 NA Suzanne Roberts Hootenanny Nurse (1964) D-580 NA Arlene Hale Symptoms Of Love (1964) D-581 NA Suzanne Roberts Co-Ed In White (1964) D-582 NA Joan Sargent My Love An Altar (1964) D-583 NA Tracy Adams Hotel Nurse (1964) D-584 NA Monica Edwards Airport Nurse (1964) D-585 NA Arlene Hale Nurse Marcie's Island (1964) D-586 NA Barbara Grabendike San Francisco Nurse D-587 NA Arlene Hale Nurse Connor Comes Home (1964) D-589 NA Virginia B. Mcdonnell The Nurse With The Silver Skates (1964) D-591 NA Monica Heath (as Arlene J. Fitzgerald) Northwest Nurse (1964) D-593 NA Suzanne Roberts Sisters In White (1965) D-595 NA Ruth Macleod Nurse Ann In Surgery (1965) D-596 NA Arlene Hale Nurses On The Run (1965) D-598 NA Arlene Hale Disaster Area Nurse (1965) D-599 NA Patricia Libby Winged Victory For Nurse Kerry (1965)
wikipedia
wiki_2469_chunk_8
Varicella zoster virus
The genome was first sequenced in 1986. It is a linear duplex DNA molecule, a laboratory strain has 124,884 base pairs. The genome has 2 predominant isomers, depending on the orientation of the S segment, P (prototype) and IS (inverted S) which are present with equal frequency for a total frequency of 90–95%. The L segment can also be inverted resulting in a total of four linear isomers (IL and ILS). This is distinct from HSV's equiprobable distribution, and the discriminatory mechanism is not known. A small percentage of isolated molecules are circular genomes, about which little is known. (It is known that HSV circularizes on infection.) There are at least 70 open reading frames in the genome.
wikipedia
wiki_2443_chunk_140
Quantitative genetics
Applications (parent-offspring) The most obvious application is an experiment that contains all parents and their offspring, with or without reciprocal crosses, preferably replicated without bias, enabling estimation of all appropriate means, variances and covariances, together with their standard errors. These estimated statistics can then be used to estimate the genetic variances. Twice the difference between the estimates of the two forms of (corrected) parent-offspring covariance provides an estimate of s2D; and twice the cov(MPO) estimates s2A. With appropriate experimental design and analysis, standard errors can be obtained for these genetical statistics as well. This is the basic core of an experiment known as Diallel analysis, the Mather, Jinks and Hayman version of which is discussed in another section.
wikipedia
wiki_20870_chunk_1
One-pass algorithm
Example problems solvable by one-pass algorithms Given any list as an input: Count the number of elements. Given a list of numbers: Find the k largest or smallest elements, k given in advance. Find the sum, mean, variance and standard deviation of the elements of the list. See also Algorithms for calculating variance.
wikipedia
wiki_2858_chunk_9
TRAC (programming language)
Example program TRAC T84 script to compute Fibonacci numbers: :(s,fibo,( :(ei,<1>, 1, 0,( :(ei,<1>, 2, 1,( :(aa, :(ri,fibo,:(as, <1>,1)),:(ri,fibo,:(as, <1>,2))) )) )) ))` :(mw,fibo)' See also TTM (programming language), a programming language inspired by TRAC References
wikipedia
wiki_10559_chunk_4
Monte Carlo N-Particle Transport Code
History The Monte Carlo method for radiation particle transport has its origins at LANL dates back to 1946. The creators of these methods were Drs. Stanislaw Ulam, John von Neumann, Robert Richtmyer, and Nicholas Metropolis. Monte Carlo for radiation transport was conceived by Stanislaw Ulam in 1946 while playing Solitaire while recovering from an illness. "After spending a lot of time trying to estimate success by combinatorial calculations, I wondered whether a more practical method...might be to lay it out say one hundred times and simply observe and count the number of successful plays." In 1947, John von Neumann sent a letter to Robert Richtmyer proposing the use of a statistical method to solve neutron diffusion and multiplication problems in fission devices. His letter contained an 81-step pseudo code and was the first formulation of a Monte Carlo computation for an electronic computing machine. Von Neumann's assumptions were: time-dependent, continuous-energy, spherical but radially-varying, one fissionable material, isotropic scattering and fission production, and fission multiplicities of 2, 3, or 4. He suggested 100 neutrons each to be run for 100 collisions and estimated the computational time to be five hours on ENIAC. Richtmyer proposed suggestions to allow for multiple fissionable materials, no fission spectrum energy dependence, single neutron multiplicity, and running the computation for computer time and not for the number of collisions. The code was finalized in December 1947. The first calculations were run in April/May 1948 on ENIAC.
wikipedia
wiki_19091_chunk_4
Natality in population ecology
Calculating Natality for Animals has become an important part of the research for preservation of species. Studies have been conducted to determine whether a species may be going extinct because of climate or availability of resources. Measuring the natality of a species during extreme conditions such as drastic climate shift or a decrease in prey density will show scientists the measures that need to be taken to keep that species alive. Studies have been conducted about the Polar bear population in Svalbard, Norway from 1988 to 2002 (Derocher 2005). As the average adult ages of both female and male increased, the natality rate decreased. Due to this observation, there was an interest in discovering why. The study was able to correlate the density of ringed seals, which are the polar bears' main prey, to the low natality rates.
wikipedia
wiki_20036_chunk_0
Molecular cytogenetics
Molecular cytogenetics combines two disciplines, molecular biology and cytogenetics, and involves the analysis of chromosome structure to help distinguish normal and cancer-causing cells. Human cytogenetics began in 1956 when it was discovered that normal human cells contain 46 chromosomes. However, the first microscopic observations of chromosomes were reported by Arnold, Flemming, and Hansemann in the late 1800s. Their work was ignored for decades until the actual chromosome number in humans was discovered as 46. In 1879, Arnold examined sarcoma and carcinoma cells having very large nuclei. Today, the study of molecular cytogenetics can be useful in diagnosing and treating various malignancies such as hematological malignancies, brain tumors, and other precursors of cancer. The field is overall focused on studying the evolution of chromosomes, more specifically the number, structure, function, and origin of chromosome abnormalities. It includes a series of techniques referred to as fluorescence in situ hybridization, or FISH, in which DNA probes are labeled with different colored fluorescent tags to visualize one or more specific regions of the genome. Introduced in the 1980s, FISH uses probes with complementary base sequences to locate the presence or absence of the specific DNA regions you are looking for. FISH can either be performed as a direct approach to metaphase chromosomes or interphase nuclei. Alternatively, an indirect approach can be taken in which the entire genome can be assessed for copy number changes using virtual karyotyping. Virtual karyotypes are generated from arrays made of thousands to millions of probes, and computational tools are used to recreate the genome in silico.
wikipedia
wiki_31426_chunk_58
Nuclear power debate
Prevented mortality In March 2013, climate scientists Pushker Kharecha and James Hansen published a paper in Environmental Science & Technology, entitled Prevented mortality and greenhouse gas emissions from historical and projected nuclear power. It estimated an average of 1.8 million lives saved worldwide by the use of nuclear power instead of fossil fuels between 1971 and 2009. The paper examined mortality levels per unit of electrical energy produced from fossil fuels (coal and natural gas) as well as nuclear power. Kharecha and Hansen assert that their results are probably conservative, as they analyze only deaths and do not include a range of serious but non-fatal respiratory illnesses, cancers, hereditary effects and heart problems, nor do they include the fact that fossil fuel combustion in developing countries tends to have a higher carbon and air pollution footprint than in developed countries. The authors also conclude that the emission of some of carbon dioxide equivalent have been avoided by nuclear power between 1971 and 2009, and that between 2010 and 2050, nuclear power could additionally avoid up to .
wikipedia
wiki_14646_chunk_10
Relation algebra
The most complete set of results of this nature is Chapter C of Carnap (1958), where the notation is rather distant from that of this entry. Chapter 3.2 of Suppes (1960) contains fewer results, presented as ZFC theorems and using a notation that more resembles that of this entry. Neither Carnap nor Suppes formulated their results using the RA of this entry, or in an equational manner. Expressive power The metamathematics of RA are discussed at length in Tarski and Givant (1987), and more briefly in Givant (2006).
wikipedia
wiki_29005_chunk_1
IUPAC nomenclature of inorganic chemistry 2005
The recommendations take up over 300 pages and the full text can be downloaded from IUPAC. Corrections have been issued. Apart from a reorganisation of the content, there is a new section on organometallics and a formal element list to be used in place of electronegativity lists in sequencing elements in formulae and names. The concept of a preferred IUPAC name (PIN), a part of the revised blue book for organic compound naming, has not yet been adopted for inorganic compounds. There are however guidelines as to which naming method should be adopted.
wikipedia
wiki_18711_chunk_5
Systems Biology Ontology
Since Level 2 Version 2 SBML provides a mechanism to annotate model components with SBO terms, therefore increasing the semantics of the model beyond the sole topology of interaction and mathematical expression. Modelling tools such as SBMLsqueezer use SBO terms too. Simulation tools can check the consistency of a rate law, convert reaction from one modelling framework to another (e.g., continuous to discrete), or distinguish between identical mathematical expressions based on different assumptions (e.g., Michaelis–Menten vs. Briggs–Haldane). Other tools such as semanticSBML can use the SBO annotation to integrate individual models into a larger one. The use of SBO is not restricted to the development of models. Resources providing quantitative experimental information such as SABIO Reaction Kinetics will be able to annotate the parameters (what do they mean exactly, how were they calculated) and determine relationships between them.
wikipedia
wiki_878_chunk_13
Cello (web browser)
An example of how to invoke Cello from a Microsoft Word macro: Sub MAIN ChanNum = DDEInitiate("Cello", "URL") DDEExecute(ChanNum, "http://www.law.cornell.edu") DDETerminate(ChanNum) End Sub System requirements Cello has the following system requirements:
wikipedia
wiki_1733_chunk_29
Multi-function printer
Software Computer systems equipped with the proper software must be able to take advantage of the MFP's capabilities, an important requirement to research when considering integrating an MFP with an existing office. Some or all of the following functionality might be provided: Device administration and configuration Document imaging, such as ad hoc scanning Document management such as remote scanning, document type conversion from text to PDF, OCR, etc. Document type/paper input mode selection Monitoring of print quotas, toner/ink levels etc.
wikipedia
wiki_32922_chunk_7
Earthquake Engineering Research Institute
Student involvement EERI has a student chapter in 29 colleges across the U.S. to further promote interest in earthquake engineering. A few representatives from each chapter make up the Student Leadership Council (SLC). Since 2008 the EERI and SLC have held the Undergraduate Seismic Design Competition, which was previously run by the Pacific Earthquake Engineering Research Center (PEER). In this competition a team of undergraduate college students must design and construct a structure made of balsa wood. The structure is limited by many rules, such as a weight limit, the individual heights of each floor, total height limit, and more. The structure is subjected to extra weight and placed on a shake table, which moves to simulate an earthquake. An accelerometer is placed on top of the building to measure how fast the top of the building shakes. Students’ structures are judged on a number of criteria, including the height of the structure, number of floors, the accelerometer readings, and whether the structure breaks. Students will want to make a building close to the height limit because the higher floors are worth more points. The 8th annual competition is to be held in Portland, OR, March 7 through 10, along with the 63rd EERI annual meeting.
wikipedia
wiki_8666_chunk_23
Tests of general relativity
Gravitational lensing One of the most important tests is gravitational lensing. It has been observed in distant astrophysical sources, but these are poorly controlled and it is uncertain how they constrain general relativity. The most precise tests are analogous to Eddington's 1919 experiment: they measure the deflection of radiation from a distant source by the Sun. The sources that can be most precisely analyzed are distant radio sources. In particular, some quasars are very strong radio sources. The directional resolution of any telescope is in principle limited by diffraction; for radio telescopes this is also the practical limit. An important improvement in obtaining positional high accuracies (from milli-arcsecond to micro-arcsecond) was obtained by combining radio telescopes across Earth. The technique is called very long baseline interferometry (VLBI). With this technique radio observations couple the phase information of the radio signal observed in telescopes separated over large distances. Recently, these telescopes have measured the deflection of radio waves by the Sun to extremely high precision, confirming the amount of deflection predicted by general relativity aspect to the 0.03% level. At this level of precision systematic effects have to be carefully taken into account to determine the precise location of the telescopes on Earth. Some important effects are Earth's nutation, rotation, atmospheric refraction, tectonic displacement and tidal waves. Another important effect is refraction of the radio waves by the solar corona. Fortunately, this effect has a characteristic spectrum, whereas gravitational distortion is independent of wavelength. Thus, careful analysis, using measurements at several frequencies, can subtract this source of error.
wikipedia
wiki_15477_chunk_17
Rajshahi University of Engineering & Technology
Organisations and clubs Students of RUET are involved in different organisations and clubs of the university. Members of these organisations and clubs organise different national programs at RUET. They also participate in different national and international competitions and shows indomitable performances. Some of the leading organisations and clubs of RUET are mentioned here. IEEE RUET Student Branch Robotic Society of RUET (RSR) Society of Automotive Engineers-RUET (SAER) Civil Engineering Society of RUET RUET Debating Club (RUET DC) RUET Career Forum (RCF) Telecommunication Club RUET Blood Directory(RBD) RUET Analytical Programming Lab (RAPL) Astronomy and Science Society of RUET ( ASSR ) অনুরণন: The cultural Club of RUET সমানুপাতিক : A voluntary organisation of RUET Photographic Society of RUET (PSR) RUET Cricket Club RUET Tabligh RUET Football Club (RUET FC) Society of Computer Aided Designer, RUET (SCADR) RUET Earthquake Society RUET AutoCad Club Tennis Club RUET Team Crack Platoon RUET Fitness Club নিরাপদ রক্তের বন্ধন(নিরব) : A voluntary blood donating organisation of RUET Machine Learning Group Of RUET RUET English Language Club (RELC) RUET Firefox Club Cube Club of RUET RUET Film Club Mathematical Society of RUET RUET Tourist Club RUET HAWKS (RUET Basketball Club) RUET Chess Club Innovation Society of RUET (ISR) Meditation Club of RUET (MCR)
wikipedia
wiki_29899_chunk_1
Continuous functions on a compact Hausdorff space
By Urysohn's lemma, separates points of : If are distinct points, then there is an such that The space is infinite-dimensional whenever is an infinite space (since it separates points). Hence, in particular, it is generally not locally compact. The Riesz–Markov–Kakutani representation theorem gives a characterization of the continuous dual space of Specifically, this dual space is the space of Radon measures on (regular Borel measures), denoted by This space, with the norm given by the total variation of a measure, is also a Banach space belonging to the class of ba spaces. Positive linear functionals on correspond to (positive) regular Borel measures on by a different form of the Riesz representation theorem. If is infinite, then is not reflexive, nor is it weakly complete. The Arzelà–Ascoli theorem holds: A subset of is relatively compact if and only if it is bounded in the norm of and equicontinuous. The Stone–Weierstrass theorem holds for In the case of real functions, if is a subring of that contains all constants and separates points, then the closure of is In the case of complex functions, the statement holds with the additional hypothesis that is closed under complex conjugation. If and are two compact Hausdorff spaces, and is a homomorphism of algebras which commutes with complex conjugation, then is continuous. Furthermore, has the form for some continuous function In particular, if and are isomorphic as algebras, then and are homeomorphic topological spaces. Let be the space of maximal ideals in Then there is a one-to-one correspondence between Δ and the points of Furthermore, can be identified with the collection of all complex homomorphisms Equip with the initial topology with respect to this pairing with (that is, the Gelfand transform). Then is homeomorphic to Δ equipped with this topology. A sequence in is weakly Cauchy if and only if it is (uniformly) bounded in and pointwise convergent. In particular, is only weakly complete for a finite set. The vague topology is the weak* topology on the dual of The Banach–Alaoglu theorem implies that any normed space is isometrically isomorphic to a subspace of for some
wikipedia
wiki_19705_chunk_25
Java version history
JSR 376: Modularization of the JDK under Project Jigsaw (Java Platform Module System) JavaDB was removed from JDK , define a standard means to invoke the equivalents of various java.util.concurrent.atomic and sun.misc.Unsafe operations , allow @SafeVarargs on private instance methods; Allow effectively-final variables to be used as resources in the try-with-resources statement; Allow diamond with anonymous classes if the argument type of the inferred type is denotable; Complete the removal, begun in Java SE 8, of underscore from the set of legal identifier names; Support for private methods in interfaces : JShell is a REPL command-line interface for the Java language. , it includes a Java implementation of Reactive Streams, including a new Flow class that included the interfaces previously provided by Reactive Streams , create a tool that can assemble and optimize a set of modules and their dependencies into a custom run-time image. It effectively allows to produce a fully usable executable including the JVM to run it , ahead-of-time compilation provided by GraalVM
wikipedia
wiki_7906_chunk_7
Principles and Standards for School Mathematics
Content standards Number and Operations: These are the fundamental basis of all mathematics, and teaching this critical area is the first content standard. All students must be taught to "understand numbers, ways of representing numbers, relationships among numbers, and number systems; understand meanings of operations and how they relate to one another; [and] compute fluently and make reasonable estimates." The ability to perform mental calculations and to calculate answers on paper is "essential." Algebra: The PSSM names four skills related to algebra that should be taught to all students: to "understand patterns, relations, and functions; represent and analyze mathematical situations and structures using algebraic symbols; use mathematical models to represent and understand quantitative relationships; [and] analyze change in various contexts." Very simple algebra skills are often taught to young children. For example, a student might convert an addition equation such as 19 + 15 = ? into a simpler equation, 20 + 14 = ? for easy calculation. Formally, this is described in algebraic notation like this: (19 + 1) + (15 − 1) = x, but even a young student might use this technique without calling it algebra. The PSSM recommends that all students complete pre-algebra coursework by the end of eighth grade and take an algebra class during high school. Geometry: The overall goals for learning geometry are to "analyze characteristics and properties of two- and three-dimensional geometric shapes and develop mathematical arguments about geometric relationships; specify locations and describe spatial relationships using coordinate geometry and other representational systems; apply transformations and use symmetry to analyze mathematical situations; [and] use visualization, spatial reasoning, and geometric modeling to solve problems." Some geometry skills are used in many everyday tasks, such as reading a map, describing the shape of an object, arranging furniture so that it fits in a room, or determining the amount of fabric or construction materials needed for a project. Teaching should be appropriate to students' developmental level: Young students should be able to explain the difference between a rectangle and a square, while older students should be able to express more complex reasoning, including simple mathematical proofs. (See van Hiele model.) The PSSM promotes the appropriate use of physical objects, drawings, and computer software for teaching geometry. Measurement: Measurement skills have many practical applications, as well as providing opportunities for advancing mathematical understand and for practicing other mathematical skills, especially number operations (e.g., addition or subtraction) and geometry. Students should "understand measurable attributes of objects and the units, systems, and processes of measurement; [and] apply appropriate techniques, tools, and formulas to determine measurements." Unlike more abstract skills, the practical importance of measurement is readily apparent to students and parents. Data analysis and probability: The PSSM says that all students should learn to "formulate questions that can be addressed with data and collect, organize, and display relevant data to answer them; select and use appropriate statistical methods to analyze data; develop and evaluate inferences and predictions that are based on data; [and] understand and apply basic concepts of probability." These skills allow students to make sense of critical information, such as medical statistics and the results of political surveys. These skills are increasingly important as statistical data are used selectively by manufacturers to promote products. While young students learn simple skills such as ways to represent the number of pets belonging to their classmates, or traditional skills such as calculating the arithmetic mean of several numbers, older students might learn concepts that were traditionally neglected, such as the difference between the occasionally dramatic relative risk reduction figures and the more concrete absolute risk reduction, or why political pollsters report the margin of error with their survey results.
wikipedia
wiki_1696_chunk_2
Relevance logic
How does relevance logic formally capture a notion of relevance? In terms of a syntactical constraint for a propositional calculus, it is necessary, but not sufficient, that premises and conclusion share atomic formulae (formulae that do not contain any logical connectives). In a predicate calculus, relevance requires sharing of variables and constants between premises and conclusion. This can be ensured (along with stronger conditions) by, e.g., placing certain restrictions on the rules of a natural deduction system. In particular, a Fitch-style natural deduction can be adapted to accommodate relevance by introducing tags at the end of each line of an application of an inference indicating the premises relevant to the conclusion of the inference. Gentzen-style sequent calculi can be modified by removing the weakening rules that allow for the introduction of arbitrary formulae on the right or left side of the sequents.
wikipedia
wiki_2604_chunk_5
Quine–McCluskey algorithm
Step 1: finding prime implicants First, we write the function as a table (where 'x' stands for don't care): {| class="wikitable" |- ! !! A !! B !! C !! D !! f |- | m0 || 0 || 0 || 0 || 0 || 0 |- | m1 || 0 || 0 || 0 || 1 || 0 |- | m2 || 0 || 0 || 1 || 0 || 0 |- | m3 || 0 || 0 || 1 || 1 || 0 |- | m4 || 0 || 1 || 0 || 0 || 1 |- | m5 || 0 || 1 || 0 || 1 || 0 |- | m6 || 0 || 1 || 1 || 0 || 0 |- | m7 || 0 || 1 || 1 || 1 || 0 |- | m8 || 1 || 0 || 0 || 0 || 1 |- | m9 || 1 || 0 || 0 || 1 || x |- | m10 || 1 || 0 || 1 || 0 || 1 |- | m11 || 1 || 0 || 1 || 1 || 1 |- | m12 || 1 || 1 || 0 || 0 || 1 |- | m13 || 1 || 1 || 0 || 1 || 0 |- | m14 || 1 || 1 || 1 || 0 || x |- | m15 || 1 || 1 || 1 || 1 || 1 |}
wikipedia
wiki_9173_chunk_4
Greek letters used in mathematics, science, and engineering
represents: the first angle in a triangle, opposite the side A the statistical significance of a result the false positive rate in statistics ("Type I" error) the fine structure constant in physics the angle of attack of an aircraft an alpha particle (He2+) angular acceleration in physics the linear thermal expansion coefficient the thermal diffusivity In organic chemistry the α-carbon is the backbone carbon next to the carbonyl carbon, most often for amino acids right ascension in astronomy the brightest star in a constellation Iron ferrite and numerous phases within materials science the return in excess of the compensation for the risk borne in investment the α-conversion in lambda calculus the independence number of a graph a placeholder for ordinal numbers in mathematical logic  a type of receptor for the neurotransmitter noradrenaline in neuroscience
wikipedia
wiki_10362_chunk_1
Pedotransfer function
The term pedotransfer function was coined by Johan Bouma as translating data we have into what we need. The most readily available data comes from a soil survey, such as the field morphology, soil texture, structure and pH. Pedotransfer functions add value to this basic information by translating them into estimates of other more laborious and expensively determined soil properties. These functions fill the gap between the available soil data and the properties which are more useful or required for a particular model or quality assessment. Pedotransfer functions utilize various regression analysis and data mining techniques to extract rules associating basic soil properties with more difficult to measure properties.
wikipedia
wiki_12693_chunk_7
Jerusalem (computer virus)
Get Password 1 (GP1): Discovered in 1991, this Novell NetWare-specific virus attempts to gather passwords from the NetWare DOS shell in memory upon user login, which it then broadcasts to a specific socket number on the network where a companion program can recover them. This virus does not work on Novell 2.x and newer versions. Suriv Viruses: Viruses that are earlier, more primitive versions of Jerusalem. The Jerusalem virus is considered to be based on Suriv-3, which is a logic bomb triggered when the date is Friday the 13th, switching off the computer on the 13th. In itself, Suriv-3 is based on its predecessors, Suriv-1 and Suriv-2, which are logic bombs triggered on April 1 (April Fools' Day), showing text reading "April 1, ha ha you have a virus!". Suriv-1 infects .COM files and Suriv-2 infects .EXE files, while Suriv-3 infects both types of files. The name of these viruses comes from spelling "virus" backwards. Sunday (Jeru-Sunday): (Main article: Sunday (computer virus))This virus grows files by 1,636 bytes. The variant is intended to delete every program as it is run every Sunday, but software bugs prevent this from happening. On each Sunday, the virus displays the following message:Today is SunDay! Why do you work so hard? All work and no play make you a dull boy! Come on! Let's go out and have some fun! Variants of Sunday Sunday.a: The original Sunday virus. Sunday.b: A version of Sunday which has a functional program-deleting function. Sunday.1.b: An improvement upon Sunday.b which fixes a bug regarding the Critical Error Handler, which causes problems on write-protected disks. Sunday.1.Tenseconds: A variant on Sunday.a which maintains a 10 second delay between messages and sets Sunday as day 0 instead of day 7. Sunday.2: A variant on Sunday.a which grows files by 1,733 bytes instead of the original 1,636 bytes. Anarkia: Anarkia has a trigger date of Tuesday the 13th and uses the self-recognition code "Anarkia". PSQR (1720): PQSR infects .COM and .EXE files, but does not infect overlay files or COMMAND.COM. It causes infected .COM files to grow by 1,720 bytes and .EXE files by 1,719-1,733 bytes. It activates on Friday the 13th, and will delete any file run that day. Garbage is written to the master boot record and the nine sectors after the MBR. The virus uses "PQSR" as its self-recognition code. Frère: Frère plays Frère Jacques on Fridays. It increases the size of infected .COM files by 1,813 bytes and .EXE files by 1,808-1,822 bytes, but does not infect COMMAND.COM. Westwood (Jerusalem-Westwood): Westwood causes files to grow by 1,829 bytes. If the virus is memory-resident, Westwood deletes any file run during Friday the 13th. Jerusalem 11-30: This virus infects .COM, .EXE, and overlay files, but not COMMAND.COM. The virus infects programs as they are used, and causes infected .COM files to grow by 2,000 bytes and .EXE files to grow by 2,000-2,014 bytes. However, unlike the original Jerusalem virus, it does not re-infect .EXE files. Jerusalem-Apocalypse: Developed in Italy, this virus infects programs as they are executed, and will insert the text "Apocalypse!!" in infected files. It causes infected .COM files to grow by 1,813 bytes and .EXE to grow by 1,808-1,822 bytes. It can re-infect .EXE files, and will increase the size of already infected .EXE files by 1,808 bytes. Jerusalem-VT1: If the virus is memory-resident, it will delete any file run on Tuesday the 1st. Jerusalem-T13: The virus causes .COM and .EXE files to grow by 1,812 bytes. If the virus is memory-resident, it will delete any program run on Tuesday the 13th. Jerusalem-Sat13: If the virus is memory-resident, it will delete any program run on Saturday the 13th. Jerusalem-Czech: The virus infects .COM and .EXE files, but not COMMAND.COM. It causes infected .COM files to grow by 1,735 bytes and .EXE files to grow by 1,735-1,749 bytes. It will not delete programs run on Friday the 13th. Jerusalem-Czech has a self-recognition code and a code placement that differ from the original Jerusalem, and is frequently detected as a Sunday variant. Jerusalem-Nemesis: This virus inserts the strings "NEMESIS.COM" and "NOKEY" in infected files. Jerusalem-Captain Trips: Jerusalem-Captain Trips contains the strings "Captain Trips" and "SPITFIRE". Captain Trips is the name of the apocalyptic plague described in Stephen King's novel The Stand. If the year is any year other than 1990 and the day is a Friday on or after the 15th, Jerusalem-Captain Trips creates an empty file with the same name as any program run that day. On the 16th Jerusalem-Captain Trip re-programs the video controller, and on several other dates it installs a routine in the timer tick that activates when 15 minutes pass. Jerusalem-Captain Trips has several errors. Jerusalem-J: The variant causes .COM files to grow by 1,237 bytes and .EXE files by about 1,232 bytes. The virus has no "Jerusalem effects", and originates from Hong Kong. Jerusalem-Yellow (Growing Block): Jerusalem-Yellow infects .EXE and .COM files. Infected .COM files grow by 1,363 bytes and .EXE files grow by 1,361-1,375 bytes. Jerusalem-Yellow creates a large yellow box with a shadow in the middle of the screen and the computer hangs. Jerusalem-Jan25: If the virus is memory-resident, it will activate on January 25 and will delete any program run that day. Additionally, it does not re-infect .EXE files. Skism: The virus will activate on any Friday after the 15th of the month, and causes infected .COM files to grow by 1,808 bytes and infected .EXE to grow by 1,808-1,822 bytes. Additionally, it can re-infect .EXE files. Carfield (Jeru-Carfield): The virus causes infected files to grow by 1,508 bytes. If the virus is memory-resident and the day is Monday, the computer will display the string "Carfield!" every 42 seconds. Mendoza (Jerusalem Mendoza): The virus does nothing if the year is 1980 or 1989, but for all other years a flag is set if the virus is memory resident and if the floppy disk motor count is 25. The flag will be set if a program is run from a floppy disk. If the flag is set, every program which runs is deleted. If the flag is not set and 30 minutes passes, the cursor is changed to a block. After one hour, Caps Lock, Nums Lock, and Scroll Lock are switched to "Off". Additionally, it does not re-infect .EXE files. Einstein: This is a small variant, only 878 bytes, and infects .EXE files. Moctezuma: This variant virus is 2,228 bytes and is encrypted. Century: This variant is a logic bomb with trigger date of January 1, 2000 that was supposed to display the message "Welcome to the 21st Century". However, no one is sure as to the legitimacy of the virus, as no one has seen it. Danube: The Danube virus is a unique variant of Jerusalem, as it has evolved beyond Jerusalem and only reflects very few parts of it. This virus is a multipartite virus, so it has several methods by which it can infect and spread: disk boot sectors as well as .COM and .EXE files. Because of this, how the virus works is dependent upon the origin of the virus (boot sector or program). When a contaminated program is executed, the virus resides in memory, taking 5 kB. Additionally, it will check if it also resides in the active boot sector and will place a copy of itself there if it was not present before. When a computer is booted from a contaminated boot sector/disk, the virus will place itself in memory before the operating system is even loaded. It reserves 5 kB of DOS base memory, and reserves 5 sectors on any disk it infects. HK: This variant of Jerusalem originates from Hong Kong, and references one of Hong Kong's technical schools in its code. Jerusalem-1767: This virus infects .EXE and .COM files, and will infect COMMAND.COM if it is executes. It causes .COM files to grow by 1,767 bytes and .EXE to grow by 1,767-1,799 bytes. Infected files include the strings "**INFECTED BY FRIDAY 13th**" or "COMMAND.COM". Jerusalem-1663: This virus infects .EXE and .COM files, including COMMAND.COM. Once memory resident, it infects programs as they are run. It causes .COM and .EXE files to grow by 1,663 bytes, but it cannot recognize infected files, so it may re-infect both .COM and .EXE files. Jerusalem-Haifa: This virus infects .EXE and .COM files, but not COMMAND.COM. It causes .COM files to grow by 2,178 bytes and .EXE files to grow by 1,960-1,974 bytes. Its name is due to the Hebrew word for Haifa, an Israeli city, being in the virus code. Phenome: This virus is similar to the Apocalypse variant, but will infect COMMAND.COM. It only activates on Saturdays, and does not allow the user to execute programs. It features the string "PHENOME.COM" and "MsDos".
wikipedia
wiki_11083_chunk_1
National Council for Scientific and Technological Development
Background The main attributes that the National Council for scientific and Technological Development (CNPq) see towards is the national development of Brazilian researchers and institutes, while developing recognition it wants on a global scale. The CNPq was started in 1951, and has a leading role in conducting and formulating research about technology, science and also innovation. The goal of the CNPq is to promote science, technology and innovation and act in the formulation of their policies which thereby will lead to taking the frontier in knowledge, national sovereignty and sustainable development. By doing this, they are on the road to being recognized for their excellence and development not only in these elements but for the country as a whole.
wikipedia
wiki_7134_chunk_13
Philomathean Society
Notable Philomatheans Philomatheans have included at least seven United States Representatives, three United States Senators, two ambassadors, and the founder of the Philadelphia Museum of Art, The Daily Pennsylvanian, Mask and Wig and the Pennsylvania Punch Bowl. Prominent Philomatheans have included: Thomas M. Pettit, 1813, Director of the U.S. Mint Henry Dilworth Gilpin, 1819, U.S. Attorney General Robert James Walker, 1819, U.S. Senator from Missouri, U.S. Secretary of the Treasury, Governor of Kansas and debating nemesis of Henry Clay John Cadwalader, 1821, U.S. Representative from Pennsylvania 1855 to 1857, U.S. Judge for the Eastern District of Pennsylvania 1858–1879 George Sharswood, 1828, founder, University of Pennsylvania School of Law and Chief Justice of Pennsylvania George Augustus Bicknell Jr., 1831, US Representative from Indiana 1877–1881 Henry Morton, 1859, 162nd Moderator, member of the committee to translate the Rosetta Stone, and founding president of the Stevens Institute of Technology 1870–1902 Persifor Frazer, 1862, professor of chemistry and pioneering chemist, geologist, and naturalist William Pepper, 1862, University Provost 1881–1894 Charles Custis Harrison, 1862, 176th Moderator, University Provost 1894–1910 Robert Adams Jr., 1869, 196th Moderator, Pennsylvania State Senator 1883–1886, U.S. Minister to Brazil 1889–1890, U.S. Representative from Pennsylvania 1893 Henry Galbraith Ward, 1870, 199th Moderator, Judge of U.S. Court of Appeals for the Second Circuit 1907–1933 W. Atlee Burpee, 1878, founder of Burpee Seeds Eli Kirk Price, 1881, founder, Philadelphia Museum of Art George Wharton Pepper, 1887, U.S. Senator from Pennsylvania, author and chronicler of the Senate Ellis Robins, 1904, businessman and public servant based in Rhodesia, ennobled as Baron Robins in 1958 Frank C. Baxter, 1928, TV personality, educator, and professor. Alfred Bester, 1934, recipient of the first Hugo Award for a science fiction Novel: The Demolished Man (1953), Science Fiction Grand Master (1988), and author of The Stars My Destination (1956) Bertram Korn, 1939, historian and senior rabbi at Reform Congregation Keneseth Israel. Carl Kaysen, 1940, director of the Institute for Advanced Study, MIT professor, and university trustee emeritus Hilary Putnam, 1948, philosopher, Walter Beverly Pearson Professor of Modern Mathematics and Mathematical Logic at Harvard University, and past president of the American Philosophical Association Arlen Specter, 1951, U.S. Senator from Pennsylvania Richard Wurtman, 1953, professor of neuroscience at MIT. Albert Fishlow, 1956, 406th Moderator, Professor of Economics at the University of California, Berkeley and former director of the Columbia Institute of Latin American Studies and Center for the Study of Brazil at Columbia, and former Senior Fellow for International Economics at the Council of Foreign Relations. Gary Goldschneider, 1959, pianist, composer, and writer. Victor Bockris, 1971, author, biographer, Andy Warhol associate. Mark Hosenball, 1974, investigative reporter at Reuters. Michael Bamberger, 1982, Sports Illustrated senior writer. Robert Gant, 1990, Queer as Folk actor. Robert Ritchie, Episcopal priest and author Caren Lissner, 1994, novelist, columnist, and Editor-in-Chief of the Hudson Reporter. Vivek Tiwary, 1995, New York Times'' bestselling author and Broadway theater producer.
wikipedia
wiki_32882_chunk_2
Partial element equivalent circuit
The PEEC method is not one of the most common techniques used in EM simulation software or as a research area but it has just been starting to gain recognition and for the first time there is a session at the 2001 IEEE EMC Symposium named after the technique. In the mid 1990s, two researchers from the University of L'Aquila in Italy, Professor Antonio Orlandi and Professor Giulio Antonini, published their first PEEC paper and are now together with Dr. Ruehli considered the top researchers in the area. Starting year 2006, several research projects have been initiated by the faculty of Computer Science and Electrical Engineering of Luleå University of Technology in Sweden in the focus area of PEEC with the emphasis on computer-based solvers for PEEC.
wikipedia
wiki_1547_chunk_2
Geek Code
Format Geek codes can be written in two formats; either as a simple string: GED/J d-- s:++>: a-- C++(++++) ULU++ P+ L++ E---- W+(-) N+++ o+ K+++ w--- O- M+ V-- PS++>$ PE++>$ Y++ PGP++ t- 5+++ X++ R+++>$ tv+ b+ DI+++ D+++ G+++++ e++ h r-- y++** ...or as a "Geek Code Block", a parody of the output produced by the encryption program PGP: -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GED/J d-- s:++>: a-- C++(++++) ULU++ P+ L++ E---- W+(-) N+++ o+ K+++ w--- O- M+ V-- PS++>$ PE++>$ Y++ PGP++ t- 5+++ X++ R+++>$ tv+ b+ DI+++ D+++ G+++++ e++ h r-- y++** ------END GEEK CODE BLOCK------ Note that this latter format has a line specifying the version of Geek Code being used.
wikipedia
wiki_27332_chunk_0
List of group-0 ISBN publisher codes
A list of publisher codes for (978) International Standard Book Numbers with a group code of zero. Assignation The group-0 publisher codes are assigned as follows: 2-digit publisher codes 3-digit publisher codes (Note: the status of codes not listed in this table is unclear; please help fill the gaps.) 4-digit publisher codes (Note: many codes are not yet listed in this table; please help fill the gaps.) 5-digit publisher codes (Note: many codes are not yet listed in this table; please help fill the gaps.)
wikipedia
wiki_26926_chunk_6
Proof (comics)
Collected editions The series has been collected into trade paperback: Goatsucker (collects Proof #1-5, 128 pages, June 2008, ) The Company Of Men (collects Proof #6-9, 128 pages, December 2008, ) Thunderbirds Are Go! (collects Proof #10-16, 144 pages, July 2009, ) Julia (collects Proof #18-23, 128 pages, July 2010, ) Blue Fairies (collects "Proof" #24-28, 128 pages, December 28, 2010, ) Endangered'' (collects "Proof" #29-33, 128 pages, December 28, 2011, ) Notes
wikipedia
wiki_12383_chunk_21
Philippine Statistics Authority
Functions The PSA has the following functions: Serve as the central statistical authority of the Philippine government on primary data collection; Prepare and conduct periodic censuses on population, housing, agriculture, fisheries, business, industry, and other sectors of the economy; Collect, compile, analyze, abstract and publish statistical information relating to the country's economic, social, demographic and general activities and condition of the people; Prepare and conduct statistical sample surveys on all aspects of socioeconomic life including agriculture, industry, trade, finance, prices and marketing information, income and expenditure, education, health, culture, and social situations for the use of the government and the public; Carry out, enforce and administer civil registration functions in the country as provided for in Act 3753, the Law on Registry of Civil Status; Collaborate with departments of the national government including GOCCs and their subsidiaries in the collection, compilation, maintenance and publication of statistical information, including special statistical data derived from the activities of those  departments, corporations and their subsidiaries; Promote and develop integrated social and economic statistics and coordinate plans for the integration of those statistics, including the national accounts; Develop and maintain appropriate frameworks and standards for the collection, processing, analysis and dissemination of data; Coordinate with government departments and local government units (LGUs) on the promotion and  adoption of statistical standards involving techniques, methodologies, concepts, definitions and classifications, and on the avoidance of duplication in the collection of statistical information; Conduct continuing methodological, analytical and development activities, in coordination with the PSRTI, to improve the conduct of censuses, surveys and other data collection activities; Recommend executive and legislative measures to enhance the development of the statistical activities and programs of the government; Prepare, in consultation with the PSA Board, a Philippine Statistical Development Program (PSDP); Implement policies on statistical matters and coordination, as directed by the PSA Board, and; Perform other functions as may be assigned by the PSA Board and as may be necessary to carry out the purposes of RA 10625.
wikipedia
wiki_13774_chunk_5
Projection (mathematics)
In set theory: An operation typified by the jth projection map, written projj, that takes an element of the Cartesian product to the value This map is always surjective. A mapping that takes an element to its equivalence class under a given equivalence relation is known as the canonical projection. The evaluation map sends a function f to the value f(x) for a fixed x. The space of functions YX can be identified with the Cartesian product , and the evaluation map is a projection map from the Cartesian product. For relational databases and query languages, the projection is a unary operation written as where is a set of attribute names. The result of such projection is defined as the set that is obtained when all tuples in R are restricted to the set . R is a database-relation. In spherical geometry, projection of a sphere upon a plane was used by Ptolemy (~150) in his Planisphaerium. The method is called stereographic projection and uses a plane tangent to a sphere and a pole C diametrically opposite the point of tangency. Any point P on the sphere besides C determines a line CP intersecting the plane at the projected point for P. The correspondence makes the sphere a one-point compactification for the plane when a point at infinity is included to correspond to C, which otherwise has no projection on the plane. A common instance is the complex plane where the compactification corresponds to the Riemann sphere. Alternatively, a hemisphere is frequently projected onto a plane using the gnomonic projection. In linear algebra, a linear transformation that remains unchanged if applied twice: p(u) = p(p(u)). In other words, an idempotent operator. For example, the mapping that takes a point (x, y, z) in three dimensions to the point (x, y, 0) is a projection. This type of projection naturally generalizes to any number of dimensions n for the domain and k ≤ n for the codomain of the mapping. See Orthogonal projection, Projection (linear algebra). In the case of orthogonal projections, the space admits a decomposition as a product, and the projection operator is a projection in that sense as well. In differential topology, any fiber bundle includes a projection map as part of its definition. Locally at least this map looks like a projection map in the sense of the product topology and is therefore open and surjective. In topology, a retraction is a continuous map r: X → X which restricts to the identity map on its image. This satisfies a similar idempotency condition r2 = r and can be considered a generalization of the projection map. The image of a retraction is called a retract of the original space. A retraction which is homotopic to the identity is known as a deformation retraction. This term is also used in category theory to refer to any split epimorphism. The scalar projection (or resolute) of one vector onto another. In category theory, the above notion of Cartesian product of sets can be generalized to arbitrary categories. The product of some objects has a canonical projection morphism to each factor. This projection will take many forms in different categories. The projection from the Cartesian product of sets, the product topology of topological spaces (which is always surjective and open), or from the direct product of groups, etc. Although these morphisms are often epimorphisms and even surjective, they do not have to be.
wikipedia
wiki_2229_chunk_6
Automated Mathematician
External links Edmund Furse; Why did AM run out of steam? Ken Haase's Ph.D. Thesis; Invention and Exploration in Discovery, a rational reconstruction of Doug Lenat's seminal AM program and an analysis of the relationship between invention and exploration in discovery. open source Prolog claimed re-implementation of Lenat's AM available at https://github.com/akkartik/am-utexas Artificial intelligence
wikipedia
wiki_8185_chunk_1
Valence (chemistry)
Description The combining capacity, or affinity of an atom of a given element is determined by the number of hydrogen atoms that it combines with. In methane, carbon has a valence of 4; in ammonia, nitrogen has a valence of 3; in water, oxygen has a valence of 2; and in hydrogen chloride, chlorine has a valence of 1. Chlorine, as it has a valence of one, can be substituted for hydrogen. Phosphorus has a valence of 5 in phosphorus pentachloride, PCl5. Valence diagrams of a compound represent the connectivity of the elements, with lines drawn between two elements, sometimes called bonds, representing a saturated valency for each element. The two tables below show some examples of different compounds, their valence diagrams, and the valences for each element of the compound.
wikipedia
wiki_123_chunk_28
Military engineering vehicle
T-54 Dozer - T-54 fitted with bulldozer blades for clearing soil, obstacles and snow. ALT-55 - Bulldozer version of the T-55 with large flat-plate superstructure, angular concave dozer blade on front and prominent hydraulic rams for dozer blade. T-55 hull fitted with an excavator body and armoured cab. T-55 MARRS - Fitted with a Vickers armoured recovery vehicle kit. It has a large flat-plate turret with slightly chamfered sides, vertical rear and very chamfered front and a large A-frame crane on the front of the turret. The crane has cylindrical winch rope fed between legs of crane. A dozer blade is fitted to the hull front. MT-55 or MTU-55 (Tankoviy Mostoukladchik) - Soviet designator for Czechoslovakian MT-55A bridge-layer tank with scissors bridge. MTU-12 (Tankoviy Mostoukladchik)- Bridge-layer tank with 12 m single-span bridge that can carry 50 tonnes. The system entered service in 1955; today only a very small number remains in service. Combat weight: 34 tonnes. MTU-20 (Ob'yekt 602) (Tankoviy Mostoukladchik) - The MTU-20 consists of a twin-treadway superstructure mounted on a modified T-54 tank chassis. Each treadway is made up of a box-type aluminum girder with a folding ramp attached to both ends to save space in the travel position. Because of that the vehicle with the bridge on board is only 11.6 m long, but the overall span length is 20 m. This is an increase of about 62% over that of the older MTU-1. The bridge is launched by the cantilever method. First the ramps are lowered and fully extended before the treadways are forward with the full load of the bridge resting on the forward support plate during launch. The span is moved out over the launching girder until the far end reaches the far bank. Next the near end is lowered onto the near bank. This method of launching gives the bridgelayer a low silhouette which makes it less vulnerable to detection and destruction. MTU-20 based on the T-55 chassis. BTS-1 (Bronetankoviy Tyagach Sredniy - Medium Armoured Tractor) - This is basically a turretless T-54A with a stowage basket. BTS-1M - improved or remanufactured BTS-1. BTS-2 (Ob'yekt 9) (Bronetankoviy Tyagach Sredniy - Medium Armoured Tractor) - BTS-1 upgraded with a hoist and a small folding crane with a capacity of 3,000 kg. It was developed on the T-54 hull in 1951; series production started in 1955. The prototype Ob.9 had a commander's cupola with DShK 1938/46 machine gun, but the production model has a square commander's hatch, opening to the right. Combat weight: 32 tons. Only a very small number remains in service. BTS-3 (Bronetankoviy Tyagach Sredniy - Medium Armoured Tractor) - JVBT-55A in service with the Soviet Army. BTS-4 (Bronetankoviy Tyagach Sredniy - Medium Armoured Tractor) - Similar to BTS-2 but with snorkel. In the West generally known as T-54T. There are many different models, based on the T-44, T-54, T-55 and T-62. BTS-4B - Dozer blade equipped armoured recovery vehicle converted from the early -odd-shaped turret versions of the T-54. BTS-4BM - Experimental version of the BTS-4B with the capacity to winch over the front of the vehicle. IMR (Ob'yekt 616) (Inzhenernaya Mashina Razgrazhdeniya) - Combat engineer vehicle. It's a T-55 that had its turret replaced with a hydraulically operated 2t crane. The crane can also be fitted with a small bucket or a pair of pincer type grabs for removing trees and other obstacles. A hydraulically operated dozer blade mounts to the front of the hull; it can be used in a straight or V-configuration only. The IMR was developed in 1969 and entered service five years later. SPK-12G (Samokhodniy Pod’yomniy Kran) - Heavy crane mounted on T-55 chassis. Only two were built. BMR-2 (Boyevaya Mashina Razminirovaniya) - Mine clearing tank based on T-55 chassis. This vehicle has no turret but a fixed superstructure, armed with an NSVT machine gun. It is fitted with a KMT-7 mine clearing set and entered service around 1987 during the war in Afghanistan. Improved version of BMR-2 that has been seen fitted with a wide variety of mine roller designs.
wikipedia
wiki_12745_chunk_23
Metabolic network modelling
Dynamic simulation and parameter estimation In order to perform a dynamic simulation with such a network it is necessary to construct an ordinary differential equation system that describes the rates of change in each metabolite's concentration or amount. To this end, a rate law, i.e., a kinetic equation that determines the rate of reaction based on the concentrations of all reactants is required for each reaction. Software packages that include numerical integrators, such as COPASI or SBMLsimulator, are then able to simulate the system dynamics given an initial condition. Often these rate laws contain kinetic parameters with uncertain values. In many cases it is desired to estimate these parameter values with respect to given time-series data of metabolite concentrations. The system is then supposed to reproduce the given data. For this purpose the distance between the given data set and the result of the simulation, i.e., the numerically or in few cases analytically obtained solution of the differential equation system is computed. The values of the parameters are then estimated to minimize this distance. One step further, it may be desired to estimate the mathematical structure of the differential equation system because the real rate laws are not known for the reactions within the system under study. To this end, the program SBMLsqueezer allows automatic creation of appropriate rate laws for all reactions with the network.
wikipedia
wiki_2040_chunk_13
Floyd–Warshall algorithm
Pseudocode let dist be a array of minimum distances initialized to (infinity) let next be a array of vertex indices initialized to null procedure FloydWarshallWithPathReconstruction() is for each edge (u, v) do dist[u][v] ← w(u, v) // The weight of the edge (u, v) next[u][v] ← v for each vertex v do dist[v][v] ← 0 next[v][v] ← v for k from 1 to |V| do // standard Floyd-Warshall implementation for i from 1 to |V| for j from 1 to |V| if dist[i][j] > dist[i][k] + dist[k][j] then dist[i][j] ← dist[i][k] + dist[k][j] next[i][j] ← next[i][k]
wikipedia
wiki_34534_chunk_14
Jordan operator algebra
Classification of JBW factors of Type I The JBW factor of Type I1 is the real numbers. The JBW factors of Type I2 are the spin factors. Let H be a real Hilbert space of dimension greater than 1. Set M = H ⊕ R with inner product (u⊕λ,v⊕μ) =(u,v) + λμ and product (u⊕λ)∘(v⊕μ)=( μu + λv) ⊕ [(u,v) + λμ]. With the operator norm ||L(a)||, M is a JBW factor and also a JW factor. The JBW factors of Type I3 are the self-adjoint 3 by 3 matrices with entries in the real numbers, the complex numbers or the quaternions or the octonions. The JBW factors of Type In with 4 ≤ n < ∞ are the self-adjoint n by n matrices with entries in the real numbers, the complex numbers or the quaternions. The JBW factors of Type I∞ are the self-adjoint operators on an infinite-dimensional real, complex or quaternionic Hilbert space. The quaternionic space is defined as all sequences x = (xi) with xi in H and Σ |xi|2 < ∞. The H-valued inner product is given by (x,y) = Σ (yi)*xi. There is an underlying real inner product given by (x,y)R = Re (x,y). The quaternionic JBW factor of Type I∞ is thus the Jordan algebra of all self-adjoint operators on this real inner product space that commute with the action of right multiplication by H.
wikipedia
wiki_1855_chunk_11
Processor power dissipation
Reduction Power consumption can be reduced in several ways, including the following: Voltage reduction dual-voltage CPUs, dynamic voltage scaling, undervolting, etc. Frequency reduction underclocking, dynamic frequency scaling, etc. Capacitance reduction increasingly integrated circuits that replace PCB traces between two chips with relatively lower-capacitance on-chip metal interconnect between two sections of a single integrated chip; low-k dielectric, etc. Power gating techniques such as clock gating and globally asynchronous locally synchronous, which can be thought of as reducing the capacitance switched on each clock tick, or can be thought of as locally reducing the clock frequency in some sections of the chip. Various techniques to reduce the switching activity number of transitions the CPU drives into off-chip data buses, such as non-multiplexed address bus, bus encoding such as Gray code addressing, or value cache encoding such as power protocol. Sometimes an "activity factor" (A) is put into the above equation to reflect activity. Sacrificing transistor density for higher frequencies. Layering heat-conduction zones within the CPU framework ("Christmassing the Gate"). Recycling at least some of that energy stored in the capacitors (rather than dissipating it as heat in transistors) adiabatic circuit, energy recovery logic, etc. Optimizing machine code - by implementing compiler optimizations that schedules clusters of instructions using common components, the CPU power used to run an application can be significantly reduced.
wikipedia
wiki_31568_chunk_1
Timeline of geometry
1st millennium BC 800 BC – Baudhayana, author of the Baudhayana Sulba Sutra, a Vedic Sanskrit geometric text, contains quadratic equations, and calculates the square root of 2 correct to five decimal places ca. 600 BC – the other Vedic “Sulba Sutras” (“rule of chords” in Sanskrit) use Pythagorean triples, contain of a number of geometrical proofs, and approximate π at 3.16 5th century BC – Hippocrates of Chios utilizes lunes in an attempt to square the circle 5th century BC – Apastamba, author of the Apastamba Sulba Sutra, another Vedic Sanskrit geometric text, makes an attempt at squaring the circle and also calculates the square root of 2 correct to five decimal places 530 BC – Pythagoras studies propositional geometry and vibrating lyre strings; his group also discover the irrationality of the square root of two, 370 BC – Eudoxus states the method of exhaustion for area determination 300 BC – Euclid in his Elements studies geometry as an axiomatic system, proves the infinitude of prime numbers and presents the Euclidean algorithm; he states the law of reflection in Catoptrics, and he proves the fundamental theorem of arithmetic 260 BC – Archimedes proved that the value of π lies between 3 + 1/7 (approx. 3.1429) and 3 + 10/71 (approx. 3.1408), that the area of a circle was equal to π multiplied by the square of the radius of the circle and that the area enclosed by a parabola and a straight line is 4/3 multiplied by the area of a triangle with equal base and height. He also gave a very accurate estimate of the value of the square root of 3. 225 BC – Apollonius of Perga writes On Conic Sections and names the ellipse, parabola, and hyperbola, 150 BC – Jain mathematicians in India write the “Sthananga Sutra”, which contains work on the theory of numbers, arithmetical operations, geometry, operations with fractions, simple equations, cubic equations, quartic equations, and permutations and combinations 140 BC – Hipparchus develops the bases of trigonometry.
wikipedia
wiki_15970_chunk_0
List of MeSH codes (V01)
The following is a partial list of the "V" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (N05). Codes following these are found at List of MeSH codes (V02). For other MeSH codes, see List of MeSH codes. The source for this content is the set of 2006 MeSH Trees from the NLM. – publication components (publication type) – abstracts (publication type) – advertisements (publication type) – animation (publication type) – architectural drawings (publication type)
wikipedia
wiki_6933_chunk_5
The Brand New Monty Python Bok
Ferdean School Library Check-out History Safety Instructions The Old Story Teller Biggles Page 6: Film Rights Still Available Llap-Goch Advertisement Edward Woodward's Fish Page The Python Book of Etiquette Famous First Drafts Advertisements / My Garden Poem A Puzzle The Bigot Newsletter The London Casebook of Detective René Descartes Wallpapers 16 Magazine Summer Madness Masturbation: The Difficult One Coming Soon: Page 71! Python Panel The Adventures of Walter the Wallabee Mr. April (I've Got Two Legs) Competition Time World Record Attempt World Record Results / Invitations The Oxfod Simplified Dictionary Drawing Hands Film Review: Sam Peckinpah's "Salad Days" Rat Recipes Rat Menu Overland to the World This Page is in Colour Contents African Notebook: "A Lucky Escape" How To... Only 15 Pages to Page 71 Norman Henderson's Diary (Insert) Sex-Craft (Insert) How to Take Your Appendix Out on the Piccadilly Line Join the Dots Directory The British Apathy League Let's Talk About Bottoms Advertisements / Hobbies Page 71 Reviews of Page 71 Through the Looking Glass The Hackenthorpe Book of Lies Fairy Tale Ferndean School Report The Stratton Indicator Play Cheese Shop The Official Medallic Commemoration of the History of Mankind Anagrams Your Stars Hamsters: A Warning Teach Yourself Surgery The Author's Friend by Michael Palin, Age 8 (Back Inside Flap)
wikipedia
wiki_30830_chunk_18
Data & Analysis Center for Software
DACS Technical Inquiry Services As part of its outreach to address the needs of the software community, DACS provides a technical inquiry service, wherein it provides up to four hours of research, free of charge, to address any technical inquiry from any member of the DACS community. In some cases, DACS connects the inquirer directly with a Subject Matter Expert (SME) to satisfy the request. DTIC, the organization that funds the DACS, regards the number of technical inquiries handled by DACS each month as a key performance metric for operation of the IAC. The scope of questions asked is very broad, ranging from simple questions asking for a definition of an acronym, to very complex questions. The following list contains some recent requests that convey the essence and scope of this service. How does Agile handle turn-over in developers, vendors, etc.? My question stems from the fact that a system may be developed by one vendor, but may need to be maintained by another. "I've noticed a tendency for acronyms to proliferate within DoD. Is there a DoD clearinghouse/arbitrator through whom these entries are filtered?" We are implementing a new hr system - I have been tasked with proposing a model through which modifications/customizations standard ERP software can be evaluated and quantified against the objectives. Any recommendations on approach - thanks I am looking for information on how DoD manages software development project so there is no duplication. How does Agile implement Earned Value? The patron is looking for, size estimates of logical source lines of code ratios for different languages. He has looked at Capers Jones but needs more information. "I am trying to ferret out some very specific information about monitoring software defect trends. Again, it was years ago but I was a software development Program Manager and my team used a tool that tracked the progress of a defect find/fix rate over time. This trend was called a "glide slope". It was not a crystal ball but was reasonably illustrative in forecasting code stability and release date. I cannot locate my copy of the algorithm and have been doing an Internet search with no luck. Thanks for any help that you can provide." "Is there a standard methodology for determining the availability of a software system?" Under a DoD effort, we are trying to define a methodology that is used to derive an availability number. "What's your experience with model based testing. What are the drawbacks?" Student asked for an explanation of function points as a measure of software size, and whether they are useful for scientific programs.
wikipedia