Dataset Viewer
Auto-converted to Parquet
id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_28575_chunk_5
Window function (SQL)
Example Window functions allow access to data in the records right before and after the current record. A window function defines a frame or window of rows with a given length around the current row, and performs a calculation across the set of data in the window. NAME | ------------ Aaron| <-- Preceding (unbounded) Andrew| Amelia| James| Jill| Johnny| <-- 1st preceding row Michael| <-- Current row Nick| <-- 1st following row Ophelia| Zach| <-- Following (unbounded) In the above table, the next query extracts for each row the values of a window with one preceding and one following row: SELECT LAG(name, 1) OVER(ORDER BY name) "prev", name, LEAD(name, 1) OVER(ORDER BY name) "next" FROM people ORDER BY nameThe result query contains the following values: | PREV | NAME | NEXT | |----------|----------|----------| | (null)| Aaron| Andrew| | Aaron| Andrew| Amelia| | Andrew| Amelia| James| | Amelia| James| Jill| | James| Jill| Johnny| | Jill| Johnny| Michael| | Johnny| Michael| Nick| | Michael| Nick| Ophelia| | Nick| Ophelia| Zach| | Ophelia| Zach| (null)|
wikipedia
wiki_19741_chunk_0
Gambling mathematics
Experiments, events and probability spaces The technical processes of a game stand for experiments that generate aleatory events. Here are a few examples: Throwing the dice in craps is an experiment that generates events such as occurrences of certain numbers on the dice, obtaining a certain sum of the shown numbers, and obtaining numbers with certain properties (less than a specific number, higher than a specific number, even, uneven, and so on). The sample space of such an experiment is {1, 2, 3, 4, 5, 6} for rolling one die or {(1, 1), (1, 2), ..., (1, 6), (2, 1), (2, 2), ..., (2, 6), ..., (6, 1), (6, 2), ..., (6, 6)} for rolling two dice. The latter is a set of ordered pairs and counts 6 x 6 = 36 elements. The events can be identified with sets, namely parts of the sample space. For example, the event occurrence of an even number is represented by the following set in the experiment of rolling one die: {2, 4, 6}. Spinning the roulette wheel is an experiment whose generated events could be the occurrence of a certain number, of a certain color or a certain property of the numbers (low, high, even, uneven, from a certain row or column, and so on). The sample space of the experiment involving spinning the roulette wheel is the set of numbers the roulette holds: {1, 2, 3, ..., 36, 0, 00} for the American roulette, or {1, 2, 3, ..., 36, 0} for the European. The event occurrence of a red number is represented by the set {1, 3, 5, 7, 9, 12, 14, 16, 18, 19, 21, 23, 25, 27, 30, 32, 34, 36}. These are the numbers inscribed on the roulette wheel and table, in red. Dealing cards in blackjack is an experiment that generates events such as the occurrence of a certain card or value as the first card dealt, obtaining a certain total of points from the first two cards dealt, exceeding 21 points from the first three cards dealt, and so on. In card games we encounter many types of experiments and categories of events. Each type of experiment has its own sample space. For example, the experiment of dealing the first card to the first player has as its sample space the set of all 52 cards (or 104, if played with two decks). The experiment of dealing the second card to the first player has as its sample space the set of all 52 cards (or 104), less the first card dealt. The experiment of dealing the first two cards to the first player has as its sample space a set of ordered pairs, namely all the 2-size arrangements of cards from the 52 (or 104). In a game with one player, the event the player is dealt a card of 10 points as the first dealt card is represented by the set of cards {10β™ , 10♣, 10β™₯, 10♦, Jβ™ , J♣, Jβ™₯, J♦, Qβ™ , Q♣, Qβ™₯, Q♦, Kβ™ , K♣, Kβ™₯, K♦}. The event the player is dealt a total of five points from the first two dealt cards is represented by the set of 2-size combinations of card values {(A, 4), (2, 3)}, which in fact counts 4 x 4 + 4 x 4 = 32 combinations of cards (as value and symbol). In 6/49 lottery, the experiment of drawing six numbers from the 49 generates events such as drawing six specific numbers, drawing five numbers from six specific numbers, drawing four numbers from six specific numbers, drawing at least one number from a certain group of numbers, etc. The sample space here is the set of all 6-size combinations of numbers from the 49. In draw poker, the experiment of dealing the initial five card hands generates events such as dealing at least one certain card to a specific player, dealing a pair to at least two players, dealing four identical symbols to at least one player, and so on. The sample space in this case is the set of all 5-card combinations from the 52 (or the deck used). Dealing two cards to a player who has discarded two cards is another experiment whose sample space is now the set of all 2-card combinations from the 52, less the cards seen by the observer who solves the probability problem. For example, if you are in play in the above situation and want to figure out some odds regarding your hand, the sample space you should consider is the set of all 2-card combinations from the 52, less the three cards you hold and less the two cards you discarded. This sample space counts the 2-size combinations from 47.
wikipedia
wiki_3104_chunk_0
Illinois Mathematics and Science Academy
{{Infobox school | name = Illinois Mathematics and Science Academy (IMSA) | image = | imagesize = 250px | caption = | streetaddress = 1500 Sullivan Rd. | city = Aurora | state = Illinois | zipcode = 60506-1000 | country = United States | coordinates = | authority = | oversight = | founder = Leon Lederman | specialist = | president = Dr. Evan Glazer | head of school = | head_label = Paolo Palocios | head = | chairperson = Paula Olszewski-Kubilius | principal = Dr. Comfort Akwaji-Anderson | director = | staff = 55 | faculty = | teaching_staff = | ceeb = | avg_class_size = | ratio = | SAT = | ACT = 31 | gender = Coed | schooltype = Public residential magnet | endowment = | budget = | grades = 10–12 | campus size = | campus type = Suburban | conference = | slogan = To ignite and nurture creative, ethical, scientific minds that advance the human condition | song = | fightsong = | motto = | accreditation = AdvancED | mascot = | mascot image = | team_name = Titans | nickname = | colors = Columbia blue Silver | yearbook = 'Gallimaufry | newspaper = The Acronym | established = 1985 | status = | closed = | nobel_laureates = 1 | enrollment = 650 | free_label = | free_text = | free_label1 = | free_text1 = | free_label2 = | free_text2 = | free_label3 = | free_text3 = | free_label4 = | free_text4 = | free_label5 = | free_text5 = | picture = IMSA-01.JPG | homepage = }}
wikipedia
wiki_2345_chunk_16
Prism (geometry)
A 1-polytopic prism is a rectangle, made from 2 translated line segments. It is represented as the product SchlΓ€fli symbol {}Γ—{}. If it is square, symmetry can be reduced: Example: Square, {}Γ—{}, two parallel line segments, connected by two line segment sides. A polygonal prism is a 3-dimensional prism made from two translated polygons connected by rectangles. A regular polygon {p} can construct a uniform n-gonal prism represented by the product {p}Γ—{}. If , with square sides symmetry it becomes a cube: Example: Pentagonal prism, {5}Γ—{}, two parallel pentagons connected by 5 rectangular sides. A polyhedral prism is a 4-dimensional prism made from two translated polyhedra connected by 3-dimensional prism cells. A regular polyhedron {p,Β q} can construct the uniform polychoric prism, represented by the product {p,Β q}Γ—{}. If the polyhedron is a cube, and the sides are cubes, it becomes a tesseract: {4,Β 3}Γ—{} = Example: Dodecahedral prism, {5,Β 3}Γ—{}, two parallel dodecahedra connected by 12 pentagonal prism sides. ...
wikipedia
wiki_8588_chunk_30
Matrix calculus
{|class="wikitable" |+ Result of differentiating various kinds of aggregates with other kinds of aggregates ! colspan=2 rowspan=2 | ! colspan=2 | Scalar y ! colspan=2 | Column vector y (size mΓ—1) ! colspan=2 | Matrix Y (size mΓ—n) |- ! Notation !! Type ! Notation !! Type ! Notation !! Type |- ! rowspan=2 | Scalar x ! Numerator | rowspan=2 style="text-align:center;" | | rowspan=2 | Scalar | rowspan=2 style="text-align:center;" | | Size-m column vector | rowspan=2 style="text-align:center;" | | mΓ—n matrix |- ! Denominator | Size-m row vector | |- ! rowspan=2 | Column vector x(size nΓ—1) ! Numerator | rowspan=2 style="text-align:center;" | | Size-n row vector | rowspan=2 style="text-align:center;" | | mΓ—n matrix | rowspan=2 style="text-align:center;" | | rowspan=2 | |- ! Denominator | Size-n column vector | nΓ—m matrix |- ! rowspan=2 | Matrix X(size pΓ—q) ! Numerator | rowspan=2 style="text-align:center;" | | qΓ—p matrix | rowspan=2 style="text-align:center;" | | rowspan=2 | | rowspan=2 style="text-align:center;" | | rowspan=2 | |- ! Denominator | pΓ—q matrix |}
wikipedia
wiki_1266_chunk_25
Postcodes in the United Kingdom
Notes: As all formats end with 9AA, the first part of a postcode can easily be extracted by ignoring the last three characters. Areas with only single-digit districts: BR, FY, HA, HD, HG, HR, HS, HX, JE, LD, SM, SR, WC, WN, ZE (although WC is always subdivided by a further letter, e.g. WC1A) Areas with only double-digit districts: AB, LL, SO Areas with a district '0' (zero): BL, BS, CM, CR, FY, HA, PR, SL, SS (BS is the only area to have both a district 0 and a district 10) The following central London single-digit districts have been further divided by inserting a letter after the digit and before the space: EC1–EC4 (but not EC50), SW1, W1, WC1, WC2 and parts of E1 (E1W), N1 (N1C and N1P), NW1 (NW1W) and SE1 (SE1P). The letters Q, V and X are not used in the first position. The letters I, J and Z are not used in the second position. The only letters to appear in the third position are A, B, C, D, E, F, G, H, J, K, P, S, T, U and W when the structure starts with A9A. The only letters to appear in the fourth position are A, B, E, H, M, N, P, R, V, W, X and Y when the structure starts with AA9A. The final two letters do not use C, I, K, M, O or V, so as not to resemble digits or each other when hand-written. Postcode sectors are one of ten digits: 0 to 9, with 0 only used once 9 has been used in a post town, save for Croydon and Newport (see above).
wikipedia
wiki_10162_chunk_4
Murderous Maths
The following are the thirteen books that are available in the series. Guaranteed to Bend Your Brain (previously Murderous Maths), - (addition, subtraction, multiplication, division, percentages, powers, tessellation, Roman numerals, the development of the "10" and the place system, shortcomings of calculators, prime numbers, time - how the year and day got divided, digital/analogue clocks, angles, introduction to real Mathematicians, magic squares, mental arithmetic, card trick with algebra explanation, rounding and symmetry.) Guaranteed to Mash your Mind (previously More Murderous Maths), (the monomino, domino, tromino, tetromino, pentomino, hexomino and heptomino, length area and volume, dimensions, measuring areas and volumes, basic rectangle and triangle formulas, speed, conversion of units, MΓΆbius strip, Pythagoras, right-angled triangles, irrational numbers, pi, area and perimeter, bisecting angles, triangular numbers, topology networks, magic squares.)Awesome Arithmetricks (previously The Essential Arithmetricks: How to + - Γ— Γ·), - (counting, odd even and negative numbers, signs of maths, place value and rounding off, manipulating equations, + - x Γ· %, long division, times tables, estimation, decimal signs, QED.)The Mean & Vulgar Bits (previously The Mean & Vulgar Bits: Fractions and Averages), (fractions, converting improper and mixed fractions, adding subtracting multiplying and dividing fractions, primes and prime factors, reducing fractions, highest common factor and lowest common denominators, Egyptian fractions, comparing fractions, cancelling out fractions, converting fractions to decimals, decimal place system, percentages: increase and decrease, averages: mean mode and median.)Desperate Measures (previously Desperate Measures: Length, Area and Volume), (measuring lines: units and accuracy, old measuring systems, the development of metric, the SI system and powers of ten, shapes, measuring areas and area formulas, weight, angles, measuring volume, Archimedes Principle, density, time and how the modern calendar developed.)Do You Feel Lucky? (previously Do You Feel Lucky: The Secrets of Probability), (chance, tree diagrams, mutually exclusive and independent chances, Pascal's Triangle, permutations and combinations, sampling.)Savage Shapes (previously Vicious Circles and Other Savage Shapes), (signs in geometric diagrams, Loci, constructions: perpendicular bisectors; dropping perpendiculars; bisecting angles, triangles: similar; congruent; equal areas, polygons: regular; irregular; angle sizes and construction, tessellations and Penrose Tiles, origami, circles: chord; tangent; angle theorems, regular solids, Euler's formula, ellipses, Geometric proof of Pythagoras' Theorem.)The Key To The Universe (previously Numbers: The Key To The Universe), (phi, Fibonacci Series, Golden Ratio, properties of Square, Triangle, Cube, Centred Hexagon and Tetrahedral numbers, "difference of two squares", number superstitions, prime numbers, Mersenne primes, tests to see if a number will divide by anything from 2-13 and 19, finger multiplication, binary, octal, and hexadecimal, perfect numbers, tricks of the nine times table, irrational transcendental and imaginary numbers, infinity.)The Phantom X (previously The Phantom X: Algebra), (variables, elementary algebra, brackets, factorising, expanding, and simplifying expressions, solving quadratics and the quadratic formula, "Think of a number" tricks, difference of two squares, coefficients of (a-b)n, linear graphs: co-ordinates; gradients; y intercept, non-linear function graphs including parabolas, simultaneous equations: substitution and elimination, dividing by zero!.)The Fiendish Angletron (previously The Fiendish Angletron: Trigonometry), (scales and ratios in maps and diagrams, protractor and compass, SIN, COS and TAN ratios in right angled triangles, trig on a calculator; normal and inverse, sine and cosine formulas for non-right-angled triangles, triangulation, parallax angles and parsecs, sin/cos/tan relationships, sin wave, bearings.)The Perfect Sausages (previously The Perfect Sausage and other Fundamental Formulas), (areas and volumes, ellipsoids and toruses, number formulas (e.g. triangle, hexagonal), speed, acceleration, stopping time, distance, force, gravity, projectiles, Money: percentages; simple and compound interest, permutations and combinations.)The 5ecret L1fe of Code5 (previously Codes: How to Make Them and Break Them), (patterns, logic and deduction, prime numbers, high powers, modular arithmetic.) Easy Questions, Evil Answers, (formulas, working out square roots by hand, Ο€, Pythagoras, paradoxes, problem solving, metric prefixes, large numbers, vectors.) Related puzzle books have been published also:Professor Fiendish's Book of Diabolical Brain-benders, (mazes, logic, coin problems, number crosswords, shape cutting/rearranging, number squares.)Professor Fiendish's Book of Brain-benders (a smaller version of the above) (same as above)'Sudoku: 100 Fun Number Puzzles, Kakuro and Other Fiendish Number Puzzles, One title that covers many different areas of mathematics has also been released:The Most Epic Book of Maths Ever (previously The Murderous Maths of Everything), ' (prime numbers, Sieve of Eratosthenes, Pythagoras' Theorem, triangular numbers, square numbers, the International Date Line, geometry, geometric constructions, topology, MΓΆbius strips, curves (conic sections and cycloids Golomb Rulers, four-dimensional "Tic Tac Toe", The Golden Ratio, Fibonacci sequence, Logarithmic spirals, musical ratios, Theorems (including Ham sandwich theorem and Fixed point theorem), probability (cards, dice, cluedo etc.), Pascal's Triangle, Sierpinski Triangle, chess board, light years, size and distance of moon and planets, orbit, size of stars, shape of galaxy.)
wikipedia
wiki_21394_chunk_13
Rhind Mathematical Papyrus
Book III – Miscellany The third part of the Rhind papyrus consists of the remainder of the 91 problems, being 61, 61B, 62–82, 82B, 83–84, and "numbers" 85–87, which are items that are not mathematical in nature. This final section contains more complicated tables of data (which frequently involve Horus eye fractions), several pefsu problems which are elementary algebraic problems concerning food preparation, and even an amusing problem (79) which is suggestive of geometric progressions, geometric series, and certain later problems and riddles in history. Problem 79 explicitly cites, "seven houses, 49 cats, 343 mice, 2401 ears of spelt, 16807 hekats." In particular problem 79 concerns a situation in which 7 houses each contain seven cats, which all eat seven mice, each of which would have eaten seven ears of grain, each of which would have produced seven measures of grain. The third part of the Rhind papyrus is therefore a kind of miscellany, building on what has already been presented. Problem 61 is concerned with multiplications of fractions. Problem 61B, meanwhile, gives a general expression for computing 2/3 of 1/n, where n is odd. In modern notation the formula given is The technique given in 61B is closely related to the derivation of the 2/n table.
wikipedia
wiki_918_chunk_19
MathML
would be marked up using LaTeX syntax like this: x=\frac{-b \pm \sqrt{b^2 - 4ac}}{2a} in troff/eqn like this: x={-b +- sqrt{b sup 2 – 4ac}} over 2a in Apache OpenOffice Math and LibreOffice Math like this (all three are valid): x={-b plusminus sqrt {b^2 – 4 ac}} over {2 a} x={-b +- sqrt {b^2 – 4ac}} over {2a} x={-b Β± sqrt {b^2 – 4ac}} over {2a} in AsciiMath like this: x=(-b +- sqrt(b^2 - 4ac))/(2a) The above equation could be represented in Presentation MathML as an expression tree made up from layout elements like mfrac or msqrt elements: <math mode="display" xmlns="http://www.w3.org/1998/Math/MathML"> <semantics> <mrow> <mi>x</mi> <mo>=</mo> <mfrac> <mrow> <mo form="prefix">βˆ’</mo> <mi>b</mi> <mo>&pm;</mo> <msqrt> <msup><mi>b</mi><mn>2</mn></msup> <mo>βˆ’</mo> <mn>4</mn><mo>&it;</mo><mi>a</mi><mo>&it;</mo><mi>c</mi> </msqrt> </mrow> <mrow> <mn>2</mn> <mo>&it;</mo> <mi>a</mi> </mrow> </mfrac> </mrow> <annotation encoding="application/x-tex"><!-- TeX --> x=\frac{-b\pm\sqrt{b^2-4ac}}{2a} </annotation> <annotation encoding="StarMath 5.0"> x={-b plusminus sqrt {b^2 - 4 ac}} over {2 a} </annotation> <!-- More annotations can be written: application/x-troff-eqn for eqn, application/x-asciimath for AsciiMath... --> <!-- Semantic MathML go under <annotation-xml encoding="MathML-Content">. --> </semantics> </math>
wikipedia
wiki_6682_chunk_21
Ancient Egyptian mathematics
Area: Triangles: The scribes record problems computing the area of a triangle (RMP and MMP). Rectangles: Problems regarding the area of a rectangular plot of land appear in the RMP and the MMP. A similar problem appears in the Lahun Mathematical Papyri in London. Circles: Problem 48 of the RMP compares the area of a circle (approximated by an octagon) and its circumscribing square. This problem's result is used in problem 50, where the scribe finds the area of a round field of diameter 9 khet. Hemisphere: Problem 10 in the MMP finds the area of a hemisphere. Volumes: Cylindrical granaries: Several problems compute the volume of cylindrical granaries (RMP 41–43), while problem 60 RMP seems to concern a pillar or a cone instead of a pyramid. It is rather small and steep, with a seked (reciprocal of slope) of four palms (per cubit). In section IV.3 of the Lahun Mathematical Papyri the volume of a granary with a circular base is found using the same procedure as RMP 43. Rectangular granaries: Several problems in the Moscow Mathematical Papyrus (problem 14) and in the Rhind Mathematical Papyrus (numbers 44, 45, 46) compute the volume of a rectangular granary. Truncated pyramid (frustum): The volume of a truncated pyramid is computed in MMP 14.
wikipedia
wiki_27525_chunk_7
Magic circle (mathematics)
Ding Yidong was a mathematician contemporary with Yang Hui. In his magic circle with 6 rings, the unit numbers of the 5 outer rings, combined with the unit number of the center ring, form the following magic square: {| class="wikitable" | 4 || 9 || 2 |- | 3 || 5 || 7 |- | 8 || 1 || 6 |} Method of construction: Let radial group 1 =1,11,21,31,41 Let radial group 2=2,12,22,32,42 Let radial group 3=3,13,23,33,43 Let radial group 4=4,14,24,34,44 Let radial group 6=6,16,26,36,46 Let radial group 7=7,17,27,37,47 Let radial group 8=8,18,28,38,48 Let radial group 9=9,19,29,39,49 Let center group =5,15,25,35,45 Arrange group 1,2,3,4,6,7,9 radially such that each number occupies one position on circle alternate the direction such that one radial has smallest number at the outside, the adjacent radial has largest number outside. Each group occupies the radial position corresponding to the number on the Luoshu magic square, i.e., group 1 at 1 position, group 2 at 2 position etc. Finally arrange center group at the center circle, such that number 5 on group 1 radial number 10 on group 2 radial number 15 on group 3 radial ... number 45 on group 9 radial
wikipedia
wiki_10935_chunk_9
XCOR Aerospace
The "multi-year project’s main objective [was] to produce a flight-ready LOX/LH2 upper-stage engine in the -thrust class that costs significantly less to produce and is easier to operate and integrate than competing engine technologies"<ref name=aw20110323> {{cite news |last=Morring |first=Frank, Jr. |title=ULA, XCOR to Develop Upper-Stage Engine |url=http://www.aviationweek.com/aw/generic/story.jsp?id=news/awx/2011/03/22/awx_03_22_2011_p0-299850.xml&headline=ULA,%20XCOR%20to%20Develop%20Upper-Stage%20Engine&channel=space |access-date=2011-03-25 |newspaper=Aviation Week |date=2011-03-23 |quote=United Launch Alliance (ULA) and XCOR Aerospace are planning a joint effort to develop a low-cost upper-stage engine in the same class as the venerable RL-10…" }}</ref>
wikipedia
wiki_12541_chunk_5
Mathematics in medieval Islam
Sharaf al-DΔ«n al-αΉ¬Ε«sΔ« (? in Tus, Iran – 1213/4) developed a novel approach to the investigation of cubic equationsβ€”an approach which entailed finding the point at which a cubic polynomial obtains its maximum value. For example, to solve the equation , with a and b positive, he would note that the maximum point of the curve occurs at , and that the equation would have no solutions, one solution or two solutions, depending on whether the height of the curve at that point was less than, equal to, or greater than a. His surviving works give no indication of how he discovered his formulae for the maxima of these curves. Various conjectures have been proposed to account for his discovery of them.<ref>{{cite journal |last1=Berggren |first1=J. Lennart |title=Innovation and Tradition in Sharaf al-DΔ«n al-αΉ¬Ε«sΔ«'s al-Muʿādalāt |jstor=604533 |journal=Journal of the American Oriental Society |volume=110 |issue=2 |year=1990 |pages=304–309 |doi=10.2307/604533 |last2=Al-TΕ«sΔ« |first2=Sharaf Al-DΔ«n |last3=Rashed |first3=Roshdi}}</ref>
wikipedia
wiki_20600_chunk_2
Lehmer's GCD algorithm
Say we want to obtain the GCD of the two integers a and b. Let a β‰₯ b. If b contains only one digit (in the chosen base, say Ξ² = 1000 or Ξ² = 232), use some other method, such as the Euclidean algorithm, to obtain the result. If a and b differ in the length of digits, perform a division so that a and b are equal in length, with length equal to m. Outer loop: Iterate until one of a or b is zero: Decrease m by one. Let x be the leading (most significant) digit in a, x = a div Ξ² m and y the leading digit in b, y = b div Ξ² m. Initialize a 2 by 3 matrix to an extended identity matrix and perform the euclidean algorithm simultaneously on the pairs (x + A, y + C) and (x + B, y + D), until the quotients differ. That is, iterate as an inner loop: Compute the quotients w1 of the long divisions of (x + A) by (y + C) and w2 of (x + B) by (y + D) respectively. Also let w be the (not computed) quotient from the current long division in the chain of long divisions of the euclidean algorithm. If w1 β‰  w2, then break out of the inner iteration. Else set w to w1 (or w2). Replace the current matrix
wikipedia
wiki_13449_chunk_13
Turing's proof
An example to illustrate the first proof An example: Suppose machine H has tested 13472 numbers and produced 5 satisfactory numbers, i.e. H has converted the numbers 1 through 13472 into S.D's (symbol strings) and passed them to D for test. As a consequence H has tallied 5 satisfactory numbers and run the first one to its 1st "figure", the second to its 2nd figure, the third to its 3rd figure, the fourth to its 4th figure, and the fifth to its 5th figure. The count now stands at N = 13472, R = 5, and B' = ".10011" (for example). H cleans up the mess on its tape, and proceeds:H increments N = 13473 and converts "13473" to symbol string ADRLD. If sub-machine D deems ADLRD unsatisfactory, then H leaves the tally-record R at 5. H will increment the number N to 13474 and proceed onward. On the other hand, if D deems ADRLD satisfactory then H will increment R to 6. H will convert N (again) into ADLRD [this is just an example, ADLRD is probably useless] and β€œrun” it using the universal machine U until this machine-under-test (U "running" ADRLD) prints its 6th β€œfigure” i.e. 1 or 0. H will print this 6th number (e.g. β€œ0”) in the β€œoutput” region of its tape (e.g. B’ = β€œ.100110”).
wikipedia
wiki_16770_chunk_9
Music and mathematics
{|class="wikitable" !Commonterm !Examplename !Hz !Multiple offundamental !Ratio ofwithin octave !Centswithin octave |- |Fundamental |A2 |110 | | | |- |rowspan=2 style="text-align:center;" |Octave |rowspan=2 style="text-align:center;" |A3 |rowspan=2 |220 |rowspan=2 style="text-align:center;" | | | |- | | |- |Perfect Fifth |E4 |330 | | | |- |rowspan=2 style="text-align:center;" |Octave |rowspan=2 style="text-align:center;" |A4 |rowspan=2 |440 |rowspan=2 style="text-align:center;" | | | |- | | |- |Major Third |C5 |550 | | | |- |Perfect Fifth |E5 |660 | | | |- |Harmonic seventh |G5 |770 | | | |- |rowspan=2 style="text-align:center;" |Octave |rowspan=2 style="text-align:center;" |A5 |rowspan=2 |880 |rowspan=2 style="text-align:center;" | | | |- | | |}
wikipedia
wiki_4553_chunk_7
American Invitational Mathematics Examination
Sample problems Given that where and are positive integers and is as large as possible, find (2003 AIME I #1) Solution: 839 If the integer is added to each of the numbers , , and , one obtains the squares of three consecutive terms of an arithmetic series. Find . (1989 AIME #7) Solution: 925 Complex numbers , and are the zeros of a polynomial , and . The points corresponding to , , and in the complex plane are the vertices of a right triangle with hypotenuse . Find . (2012 AIME I #14) Solution: 375 Note
wikipedia
wiki_8588_chunk_42
Matrix calculus
{|class="wikitable" style="text-align: center;" |+ Identities: scalar-by-matrix ! scope="col" width="175" | Condition ! scope="col" width="10" | Expression ! scope="col" width="100" | Numerator layout, i.e. by XT ! scope="col" width="100" | Denominator layout, i.e. by X |- | a is not a function of X || | || |- | a is not a function of X, u = u(X) || | colspan=2| |- | u = u(X), v = v(X) || | colspan=2| |- | u = u(X), v = v(X) || | colspan=2| |- | u = u(X) || | colspan=2| |- | u = u(X) || | colspan=2| |- | rowspan=2|U = U(X) || rowspan=2|Β Β Β Β  || || |- | colspan=2|Both forms assume numerator layout for i.e. mixed layout if denominator layout for X is being used. |- style="border-top: 3px solid;" | a and b are not functions of X || ||| |- | a and b are not functions of X || ||| |- | a, b and C are not functions of X || ||| |- | a, b and C are not functions of X || ||| |- style="border-top: 3px solid;" | || || colspan=2| |- | U = U(X), V = V(X) || || colspan=2| |- | a is not a function of X, U = U(X) || || colspan=2| |- | g(X) is any polynomial with scalar coefficients, or any matrix function defined by an infinite polynomial series (e.g. eX, sin(X), cos(X), ln(X), etc. using a Taylor series); g(x) is the equivalent scalar function, gβ€²(x) is its derivative, and gβ€²(X) is the corresponding matrix function || || || |- | A is not a function of X || Β Β Β Β  || || |- | A is not a function of X || Β Β Β Β  || || |- | A is not a function of X || Β Β Β Β  || || |- | A is not a function of X || Β Β Β Β  || || |- | A, B are not functions of X || || || |- | A, B, C are not functions of X || || || |- | n is a positive integer || Β Β Β Β  || || |- | A is not a function of X, n is a positive integer || Β Β Β Β  || || |- | || Β Β Β Β  || || |- | || Β Β Β Β  || || |- style="border-top: 3px solid;" | || Β Β Β Β  || || |- | a is not a function of X || || || |- | A, B are not functions of X || Β Β Β Β  || || |- | n is a positive integer || Β Β Β Β  || || |- | (see pseudo-inverse) || Β Β Β Β  || || |- | (see pseudo-inverse) || Β Β Β Β  || || |- | A is not a function of X,X is square and invertible || || || |- | A is not a function of X,X is non-square,A is symmetric || || || |- | A is not a function of X,X is non-square,A is non-symmetric || | | |}
wikipedia
wiki_38599_chunk_14
List of power stations in Ethiopia
{| class="wikitable sortable" ! ICS Solar park ! Location !class="unsortable"|Coordinates ! Installedcapacity(MWac) ! Capacityfactor ! park size[km2] ! Operationalsince ! Status ! class="unsortable" |Notes |- | Metehara |Metehara | |style="text-align:center" data-sort-value="100" | (100) |style="text-align:center" data-sort-value="0.32"| (0.32) |style="text-align:center" data-sort-value="2.5"| (2.5) |style="text-align:center"| | projectimplementation | data-sort-value="0" | 1st solar park |} No solar-thermal power plants are planned. The first large solar park is considered to be operational by 2019. All solar parks will be operated by private owners equipped with a long-term power purchase agreement.
wikipedia
wiki_956_chunk_42
Unification (computer science)
{| style="border: 1px solid darkgray;" |+ One-sided paramodulation rules |- border="0" | align="right" | G βˆͺ { f(s1,...,sn) ≐ f(t1,...,tn) } | ; S | β‡’ | align="right" | G βˆͺ { s1 ≐ t1, ..., sn ≐ tn } | ; S| | Β  Β  decompose |- | align="right" | G βˆͺ { x ≐ t } | ; S| β‡’ | align="right" | G { x ↦ t } |; S{x↦t} βˆͺ {x↦t} | align="right" | if the variable x doesn't occur in t| Β  Β  eliminate |- | align="right" | G βˆͺ { f(s1,...,sn) ≐ t } | ; S| β‡’ | align="right" | G βˆͺ { s1 ≐ u1, ..., sn ≐ un, r ≐ t } | ; S| align="right" | Β  Β  if f(u1,...,un) β†’ r is a rule from R| Β  Β  mutate |- | align="right" | G βˆͺ { f(s1,...,sn) ≐ y } | ; S|β‡’ | align="right" | G βˆͺ { s1 ≐ y1, ..., sn ≐ yn, y ≐ f(y1,...,yn) } | ; S| align="right" | if y1,...,yn are new variables | Β  Β  imitate |}
wikipedia
wiki_8879_chunk_12
HITS algorithm
Pseudocode G := set of pages for each page p in G do p.auth = 1 // p.auth is the authority score of the page p p.hub = 1 // p.hub is the hub score of the page p for step from 1 to k do // run the algorithm for k steps norm = 0 for each page p in G do // update all authority values first p.auth = 0 for each page q in p.incomingNeighbors do // p.incomingNeighbors is the set of pages that link to p p.auth += q.hub norm += square(p.auth) // calculate the sum of the squared auth values to normalise norm = sqrt(norm) for each page p in G do // update the auth scores p.auth = p.auth / norm // normalise the auth values norm = 0 for each page p in G do // then update all hub values p.hub = 0 for each page r in p.outgoingNeighbors do // p.outgoingNeighbors is the set of pages that p links to p.hub += r.auth norm += square(p.hub) // calculate the sum of the squared hub values to normalise norm = sqrt(norm) for each page p in G do // then update all hub values p.hub = p.hub / norm // normalise the hub values
wikipedia
wiki_21415_chunk_2
Software analysis pattern
Describing an analysis pattern While doing Analysis we are trying to understand the problem. Fowler does not detail in his book a formal way to write or to describe analysis patterns. Suggestions have been raised since to have a consistent and uniform format for describing them. Most of them are based on the work from Erich Gamma, Frank Buschmann and Christopher Alexander on patterns (in architecture or computer science). One of them, proposed by Hahsler, has the following structure:
wikipedia
wiki_80_chunk_40
Computer science
Overview "Within more than 70 chapters, every one new or significantly revised, one can find any kind of information and references about computer science one can imagine. […] all in all, there is absolute nothing about Computer Science that can not be found in the 2.5 kilogram-encyclopaedia with its 110 survey articles […]." (Christoph Meinel, Zentralblatt MATH) "[…] this set is the most unique and possibly the most useful to the [theoretical computer science] community, in support both of teaching and research […]. The books can be used by anyone wanting simply to gain an understanding of one of these areas, or by someone desiring to be in research in a topic, or by instructors wishing to find timely information on a subject they are teaching outside their major areas of expertise." (Rocky Ross, SIGACT News) "Since 1976, this has been the definitive reference work on computer, computing, and computer science. […] Alphabetically arranged and classified into broad subject areas, the entries cover hardware, computer systems, information and data, software, the mathematics of computing, theory of computation, methodologies, applications, and computing milieu. The editors have done a commendable job of blending historical perspective and practical reference information. The encyclopedia remains essential for most public and academic library reference collections." (Joe Accardin, Northeastern Illinois Univ., Chicago)
wikipedia
wiki_3877_chunk_4
Azimuthal quantum number
{| class="wikitable" |+ Quantum subshells for the azimuthal quantum number |- ! style="text-align: center; vertical-align: bottom;"| AzimuthalnumberΒ (β„“) ! style="text-align: center; vertical-align: bottom;"| Historicalletter ! style="text-align: center; vertical-align: bottom;"| Maximumelectrons ! style="text-align: center; vertical-align: bottom;"| Historicalname ! style="text-align: left; vertical-align: bottom;"| Shape |- | style="text-align: center;"| 0 | style="text-align: center;"| s | style="text-align: center;"| 2 | sharp || spherical |- | style="text-align: center;"| 1 | style="text-align: center;"| p | style="text-align: center;"| 6 | principal | three dumbbell-shaped polar-aligned orbitals; one lobe on each pole of the x, y, and z (+ and βˆ’ axes) |- | style="text-align: center;"| 2 | style="text-align: center;"| d | style="text-align: center;"| 10 | diffuse || nine dumbbells and one doughnut (or β€œunique shape #1” see this picture of spherical harmonics, third row center) |- | style="text-align: center;"| 3 | style="text-align: center;"| f | style="text-align: center;"| 14 | fundamental || β€œunique shape #2” (see this picture of spherical harmonics, bottom row center) |- | style="text-align: center;"| 4 | style="text-align: center;"| g | style="text-align: center;"| 18 | || |- | style="text-align: center;"| 5 | style="text-align: center;"| h | style="text-align: center;"| 22 | || |- | style="text-align: center;"| 6 | style="text-align: center;"| i | style="text-align: center;"| 26 | || |- | colspan=5 style="text-align: left; text-align: center;" | The letters after the f sub-shell just follow letterΒ f in alphabetical order, except the letterΒ j and those already used. |}
wikipedia
wiki_7104_chunk_5
Bridge (graph theory)
Tarjan's bridge-finding algorithm The first linear time algorithm for finding the bridges in a graph was described by Robert Tarjan in 1974. It performs the following steps: Find a spanning forest of Create a rooted forest from the spanning forest Traverse the forest in preorder and number the nodes. Parent nodes in the forest now have lower numbers than child nodes. For each node in preorder (denoting each node using its preorder number), do: Compute the number of forest descendants for this node, by adding one to the sum of its children's descendants. Compute , the lowest preorder label reachable from by a path for which all but the last edge stays within the subtree rooted at . This is the minimum of the set consisting of the preorder label of , of the values of at child nodes of and of the preorder labels of nodes reachable from by edges that do not belong to . Similarly, compute , the highest preorder label reachable by a path for which all but the last edge stays within the subtree rooted at . This is the maximum of the set consisting of the preorder label of , of the values of at child nodes of and of the preorder labels of nodes reachable from by edges that do not belong to . For each node with parent node , if and then the edge from to is a bridge.
wikipedia
wiki_33567_chunk_2
Network of Conservation Educators and Practitioners
Each module includes a Synthesis document that brings together key concepts, applications, and literature for a topic, as well as an easily modified visual Presentation, and a practical Exercise for laboratory or field use. Exercise solutions and teaching notes are also provided for the instructor, as are learning goals and student assessment questions. In addition, interdisciplinary Case Studies integrate key concepts and questions that span the topics of more than one module. The modules are flexible and adaptable resources for professors and trainers in the field of biodiversity conservation and are tailored to the context where they will be used in terms of language and examples. They model the richly interconnected, interdisciplinary, and rapidly evolving nature of the field of conservation biology, and focus on developing the skills needed to decide when, how, and why a tool is the best choice for a particular conservation application. At present, more than 100 complete or partial modules are available for use and testing in several languages (English, Spanish, French, and Lao), and this number is expected to continue to grow. Modules are distributed free of cost to the users, and are available in printed form, on CD-ROM, and in electronic form via the Internet (http://ncep.amnh.org).
wikipedia
wiki_5483_chunk_23
Array programming
R The R language supports array paradigm by default. The following example illustrates a process of multiplication of two matrices followed by an addition of a scalar (which is, in fact, a one-element vector) and a vector: > A <- matrix(1:6, nrow=2) # !!this has nrow=2 ... and A has 2 rows > A [,1] [,2] [,3] [1,] 1 3 5 [2,] 2 4 6 > B <- t( matrix(6:1, nrow=2) ) # t() is a transpose operator !!this has nrow=2 ... and B has 3 rows --- a clear contradiction to the definition of A > B [,1] [,2] [1,] 6 5 [2,] 4 3 [3,] 2 1 > C <- A %*% B > C [,1] [,2] [1,] 28 19 [2,] 40 28 > D <- C + 1 > D [,1] [,2] [1,] 29 20 [2,] 41 29 > D + c(1, 1) # c() creates a vector [,1] [,2] [1,] 30 21 [2,] 42 30
wikipedia
wiki_35152_chunk_16
IEEE Nanotechnology Council
The Nanotechnology community in Canada is very active. Many IEEE NTC conferences were recently hosted in Canada (e.g., IEEE NANO 2014 in Ottawa) and there is more to come (i.e., IEEE NANO 2021 in MontrΓ©al and IEEE NMDC 2021 in Vancouver). One of the goals of Mr. Berkenbrock is to connect with this dynamic community for supporting students and young professionals and strengthening the presence of the Council in the region. Seeking to achieve this goal, a webinar was co-hosted by IEEE North Saskatchewan Section on December 9th with the presence of speakers from across Canada. The theme of this inaugural webinar was β€œPerovskites for solar cells” with Dr. Saidaminov (University of Victoria, British Columbia) and Dr. Rosei (INRS, QuΓ©bec) as speakers and Mr. Kahwagi from the Koleilat’s research group (Dalhousie University, New Brunswick) as the Moderator. Briefly, in numbers, the event of about one and a half hours had 80 people interested to attend, 60 subscribed and 24 attendees. Afterwards, all those registered received the link to access the recording and a survey about the event. The survey (5) showed the event attracted people from countries beyond the Americas (e.g., Bangladesh, India, Malaysia, and Portugal) and exceeded people’s expectations. The next webinar is expected to happen in late January with the theme β€œMicrodevices and the Pandemics” (Please, follow our page on LinkedIn for more info).
wikipedia
wiki_28756_chunk_27
Computational creativity
Poetry More than iron, more than lead, more than gold I need electricity.I need it more than I need lamb or pork or lettuce or cucumber.I need it for my dreams. Racter, from The Policeman's Beard Is Half Constructed Like jokes, poems involve a complex interaction of different constraints, and no general-purpose poem generator adequately combines the meaning, phrasing, structure and rhyme aspects of poetry. Nonetheless, Pablo GervΓ‘s has developed a noteworthy system called ASPERA that employs a case-based reasoning (CBR) approach to generating poetic formulations of a given input text via a composition of poetic fragments that are retrieved from a case-base of existing poems. Each poem fragment in the ASPERA case-base is annotated with a prose string that expresses the meaning of the fragment, and this prose string is used as the retrieval key for each fragment. Metrical rules are then used to combine these fragments into a well-formed poetic structure. Racter is an example of such a software project.
wikipedia
wiki_32762_chunk_7
FACT (computer language)
Source statements: P 85 BOND PROCEDURE. WRITE BONDORDER AND SUBTRACT 1 FROM NUM. P 86 P 87 NOTE. PHASE I OF SAMPLE PROGRAM. THE FOLLOWING PROCEDURES ARE USED TO P 88 MAKE BATCH CHECKS DURING THE CARD READING PASS. P 89 P 90 SUMMATION PROCEDURE. ADD RP HOURS TO SUM-OF-HOURS. ADD 1 TO CARDS-IN- P 91 -BATCH. P 92 P 93 BATCH-CHECK PROCEDURE. IF BATCH-SUM IS NOT EQUAL TO SUM-OF-HOURS OR BATCH- P 94 -COUNT IS NOT EQUAL TO CARDS-IN-BATCH SEE BAD-BATCH. SET SUM-OF-HOURS P 95 AND CARDS-IN-BATCH TO ZERO. P 96 P 97 BAD-BATCH PROCEDURE. REVERSE NEW-MASTER. CLOSE PAGE OF ERROR-REPORT. P 98 P 99 L. PUT ZEROS INTO PRINTLINE. SET NUM TO 8. P 100 P 101 BUILD. PUT EMPLOYNO AND RP HOURS INTO (NUM)TH EN AND EH. SUB- P 102 TRACT 1 FROM CARDS-IN-BATCH AND NUM. IF CARDS-IN-BATCH IS ZERO WRITE P 103 ERROR-REPORT, REVERSE NEW-MASTER, LEAVE PROCEDURE. GET NEXT GROUP. P 104 IF NUM IS ZERO WRITE ERROR-REPORT AND GO TO L, OTHERWISE RETURN TO P 105 BUILD. END OF PROCEDURE.
wikipedia
wiki_11781_chunk_14
Distribution (differential geometry)
Non-integrable ones The Martinet distribution on is given by , for ; equivalently, it is generated by the vector fields and . It is bracket-generating since , but it is not weakly regular: has rank 3 everywhere except on the surface . The contact distribution on is given by , for ; equivalently, it is generated by the vector fields and , for . It is weakly regular, with grow vector , and bracket-generating, with . One can also define an abstract contact structures on a manifold as a hyperplane distribution which is maximally non-integrable, i.e. it is as far from being involutive as possible. An analogue of the Darboux theorem shows that such structure has the unique local model described above. The Engel distribution on is given by , for and ; equivalently, it is generated by the vector fields and . It is weakly regular, with grow vector , and bracket-generating. One can also define an abstract Engel structure on a manifold as a weakly regular rank 2 distribution such that has rank 3 and has rank 4; Engel proved that such structure has the unique local model described above. In general, a Goursat structure on a manifold is a rank 2 distribution which is weakly regular and bracket-generating, with grow vector . For and one recovers, respectively, contact distributions on 3-dimensional manifolds and Engel distributions. Goursat structures are locally diffeomorphic to the Cartan distribution of the jet bundles .
wikipedia
wiki_39905_chunk_10
Religious and political symbols in Unicode
Miscellaneous Symbols and Pictographs block The Unicode chart for the Miscellaneous Symbols and Pictographs block notes many religious symbols: {| class="wikitable" style="text-align:center" ! Text !! Emoji !! Code point !! Name and notes |- | || || U+1F4FF || style="text-align:left" | PRAYER BEADS |- | || || U+1F540 || style="text-align:left" | CIRCLED CROSS POMMEE (Orthodox typicon symbol for great feast service) |- | || || U+1F541 || style="text-align:left" | CROSS POMMEE WITH HALF-CIRCLE BELOW (Orthodox typicon symbol for vigil service) |- | || || U+1F542 || style="text-align:left" | CROSS POMMEE (Orthodox typicon symbol for Polyeleos) |- | || || U+1F543 || style="text-align:left" | NOTCHED LEFT SEMICIRCLE WITH THREE DOTS (Orthodox typicon symbol for lower rank feast) |- | || || U+1F544 || style="text-align:left" | NOTCHED RIGHT SEMICIRCLE WITH THREE DOTS (Orthodox typicon symbol for lower rank feast) |- | || || U+1F545 || style="text-align:left" | SYMBOL FOR MARKS CHAPTER (Orthodox typicon symbol for difficult sections) |- | || || U+1F546 || style="text-align:left" | WHITE LATIN CROSS = cross outline |- | || || U+1F547 || style="text-align:left" | HEAVY LATIN CROSS |- | || || U+1F548 || style="text-align:left" | CELTIC CROSS |- | || || U+1F549 || style="text-align:left" | OM SYMBOL (generic symbol independent of Devanagari font) |- | || || U+1F54A || style="text-align:left" | DOVE OF PEACE = peace |- | || || U+1F54B || style="text-align:left" | KAABA |- | || || U+1F54C || style="text-align:left" | MOSQUE |- | || || U+1F54D || style="text-align:left" | SYNAGOGUE |- | || || U+1F54E || style="text-align:left" | MENORAH WITH NINE BRANCHES = hanukiah |}
wikipedia
wiki_6866_chunk_25
Energy return on investment
EROI and payback periods of some types of power plants The following table is a compilation of sources of energy from German Wikipedia. The minimum requirement is a breakdown of the cumulative energy expenses according to material data. Frequently in literature harvest factors are reported, for which the origin of the values is not completely transparent. These are not included in this table. The bold numbers are those given in the respective literature source, the normal printed ones are derived (see Mathematical Description).
wikipedia
wiki_7922_chunk_14
La Selva Biological Station
There is a great amount of research conducted at La Selva Biological Station. Each year, more than 240 papers are published from studies performed there. The station has grown and expanded its facilities to include two laboratories, workspaces, an academic center, a workers’ lounge, a researchers’ lounge, a river station, an herbarium, and of course, the surrounding reserve all for research purposes. Researchers can live on site at the station for anywhere between a few days to several months. To accommodate researchers there are cabin dormitories, family housing, a laundry room, a dining hall, and even a gift shop. Most of the tropical ecology research done by scientists at La Selva is related to one of these topics: interactions among interdependent species, carbon sequestration in forests, effects of climate change on ecosystems, mechanisms of speciation, food web dynamics, and maintenance of biodiversity Since there are many endangered species in tropical areas, a great amount of research is conducted on these species. Many researchers write papers analyzing data illustrating species’ decline, and often include thoughts on the conservation efforts needed to preserve them. And because humans are a major factor causing the endangerment of many of these species, mostly through habitat loss from human practices, there is extensive research done on impacts of humans in tropical forests. Research is done both on the effects of large companies conducting oil and mineral exploration, creating plantations, or cattle farming and also on local peoples who live in the forest and use its resources.
wikipedia
wiki_1739_chunk_16
Constraint programming
Example The syntax for expressing constraints over finite domains depends on the host language. The following is a Prolog program that solves the classical alphametic puzzle SEND+MORE=MONEY in constraint logic programming: % This code works in both YAP and SWI-Prolog using the environment-supplied % CLPFD constraint solver library. It may require minor modifications to work % in other Prolog environments or using other constraint solvers. :- use_module(library(clpfd)). sendmore(Digits) :- Digits = [S,E,N,D,M,O,R,Y], % Create variables Digits ins 0..9, % Associate domains to variables S #\= 0, % Constraint: S must be different from 0 M #\= 0, all_different(Digits), % all the elements must take different values 1000*S + 100*E + 10*N + D % Other constraints + 1000*M + 100*O + 10*R + E #= 10000*M + 1000*O + 100*N + 10*E + Y, label(Digits). % Start the search
wikipedia
wiki_11778_chunk_14
Computer facial animation
Face animation languages Many face animation languages are used to describe the content of facial animation. They can be input to a compatible "player" software which then creates the requested actions. Face animation languages are closely related to other multimedia presentation languages such as SMIL and VRML. Due to the popularity and effectiveness of XML as a data representation mechanism, most face animation languages are XML-based. For instance, this is a sample from Virtual Human Markup Language (VHML): <vhml> <person disposition="angry"> First I speak with an angry voice and look very angry, <surprised intensity="50"> but suddenly I change to look more surprised. </surprised> </person> </vhml> More advanced languages allow decision-making, event handling, and parallel and sequential actions. The Face Modeling Language (FML) is an XML-based language for describing face animation. FML supports MPEG-4 Face Animation Parameters (FAPS), decision-making and dynamic event handling, and typical programming constructs such as loops. It is part of the iFACE system. The following is an example from FML: <fml> <act> <par> <hdmv type="yaw" value="15" begin="0" end="2000" /> <expr type="joy" value="-60" begin="0" end="2000" /> </par> <excl event_name="kbd" event_value="" repeat="kbd;F3_up" > <hdmv type="yaw" value="40" begin="0" end="2000" event_value="F1_up" /> <hdmv type="yaw" value="-40" begin="0" end="2000" event_value="F2_up" /> </excl> </act> </fml>
wikipedia
wiki_35414_chunk_8
Mechanical systems drawing
Installation drawing A drawing which based on the detailed drawing, installation drawing or co-ordination drawing (interface drawing) with the primary purpose of defining that information needed by the tradesmen on site to install the works or concurrently work among various engineering assembly. The main features of typical installation drawings are: Plan layouts to a scale of at least 1:50, accompanied by cross-sections to a scale of at least 1:20 for all congested areas A spatially coordinated drawing, i.e., show no physical location clashes between the system components Allowance for inclusion of all supports and fixtures necessary to install the works Allowance for the service at its widest point for spaces between pipe and duct runs, for insulation, standard fitting dimensions, and joint widths Installation details provided from shop drawings Installation working space; space to facilitate commissioning and space to allow on-going operation and maintenance in accordance with the relevant health and safety requirements Plant and equipment including alternatives and options Dimensions where services positioning is important enough not to installers Plant room layouts to a scale of at least 1:20, accompanied by cross-sections and elevations to a scale of at least 1:20
wikipedia
wiki_8335_chunk_24
Physics (Aristotle)
Also includes On Coming-To-Be and Ceasing-To-Be I.4-5; On The Generation Of Animals I.22. Includes Physics I-II, III.1, VIII. This is the oldest of Loeb 255, reprinted or reissued many times subsequently under different subseries: Volume 5 of a 23-volume Aristotle set or Volume 2 of a 2-volume Aristotle Physics set. The terminology Volume 5, Volume 2, Volume 255 is apt to be confusing. Whatever the volume and printing date, Loeb 255 is still in copyright and therefore cannot be offered as a work in the public domain. Scanned as is. Includes the translators' emphases and divisions within chapters. Formatted text divided into books and chapters only. Minimally formatted text divided into books and "parts." Book IV is incomplete. Single text file arranged in paragraphs. Minimally formatted single pages accessed one at a time. Single pdf file of books and chapters. This is the oldest of Loeb 228, reprinted or reissued many times subsequently under different subseries: Volume 4 of a 23-volume Aristotle set or Volume 1 of a 2-volume Aristotle Physics set. The terminology Volume 4, Volume 1, Volume 228 is apt to be confusing. Whatever the volume and printing date, Loeb 228 is still in copyright and therefore cannot be offered as a work in the public domain.
wikipedia
wiki_7775_chunk_4
Embodied energy
Methodologies Embodied energy analysis is interested in what energy goes to supporting a consumer, and so all energy depreciation is assigned to the final demand of consumer. Different methodologies use different scales of data to calculate energy embodied in products and services of nature and human civilization. International consensus on the appropriateness of data scales and methodologies is pending. This difficulty can give a wide range in embodied energy values for any given material. In the absence of a comprehensive global embodied energy public dynamic database, embodied energy calculations may omit important data on, for example, the rural road/highway construction and maintenance needed to move a product, marketing, advertising, catering services, non-human services and the like. Such omissions can be a source of significant methodological error in embodied energy estimations. Without an estimation and declaration of the embodied energy error, it is difficult to calibrate the sustainability index, and so the value of any given material, process or service to environmental and economic processes.
wikipedia
wiki_21574_chunk_4
Fortune's algorithm
let be the transformation , where is the Euclidean distance between and the nearest site let be the "beach line" let be the region covered by site . let be the boundary ray between sites and . let be a set of sites on which this algorithm is to be applied. let be the sites extracted from with minimal -coordinate, ordered by -coordinate let DeleteMin() be the act of removing the lowest and leftmost site of (sort by y unless they're identical, in which case sort by x) let be the Voronoi map of which is to be constructed by this algorithm create initial vertical boundary rays while not IsEmpty() do ← DeleteMin() case of is a site in : find the occurrence of a region in containing , bracketed by on the left and on the right create new boundary rays and with bases replace with in delete from any intersection between and insert into any intersection between and insert into any intersection between and is a Voronoi vertex in : let be the intersection of on the left and on the right let be the left neighbor of and let be the right neighbor of in create a new boundary ray if , or create if is right of the higher of and , otherwise create replace with newly created in delete from any intersection between and delete from any intersection between and insert into any intersection between and insert into any intersection between and record as the summit of and and the base of output the boundary segments and endcase endwhile output the remaining boundary rays in
wikipedia
wiki_15788_chunk_0
List of MeSH codes
The following is a list of the codes for MeSH (Medical Subject Headings), a comprehensive controlled vocabulary for the purpose of indexing journal articles and books in the life sciences. It is a product of the United States National Library of Medicine (NLM). The prefixes (A01, etc.) are linked to more extensive sub-lists of codes; the medical terms are linked to articles on those topics. The source for this content is the set of 2006 MeSH Trees from NLM.
wikipedia
wiki_815_chunk_65
Reed–Solomon error correction
Decoder Now the decoding part: function [decoded, error_pos, error_mag, g, S] = rsDecoder(encoded, m, prim_poly, n, k) % RSDECODER Decode a Reed-Solomon encoded message % Example: % [dec, ~, ~, ~, ~] = rsDecoder(enc_msg, 8, 301, 12, numel(msg)) max_errors = floor((n - k) / 2); orig_vals = encoded.x; % Initialize the error vector errors = zeros(1, n); g = []; S = []; % Get the alpha alpha = gf(2, m, prim_poly); % Find the syndromes (Check if dividing the message by the generator % polynomial the result is zero) Synd = polyval(encoded, alpha .^ (1:n - k)); Syndromes = trim(Synd); % If all syndromes are zeros (perfectly divisible) there are no errors if isempty(Syndromes.x) decoded = orig_vals(1:k); error_pos = []; error_mag = []; g = []; S = Synd; return; end % Prepare for the euclidean algorithm (Used to find the error locating % polynomials) r0 = [1, zeros(1, 2 * max_errors)]; r0 = gf(r0, m, prim_poly); r0 = trim(r0); size_r0 = length(r0); r1 = Syndromes; f0 = gf([zeros(1, size_r0 - 1) 1], m, prim_poly); f1 = gf(zeros(1, size_r0), m, prim_poly); g0 = f1; g1 = f0; % Do the euclidean algorithm on the polynomials r0(x) and Syndromes(x) in % order to find the error locating polynomial while true % Do a long division [quotient, remainder] = deconv(r0, r1); % Add some zeros quotient = pad(quotient, length(g1)); % Find quotient*g1 and pad c = conv(quotient, g1); c = trim(c); c = pad(c, length(g0)); % Update g as g0-quotient*g1 g = g0 - c; % Check if the degree of remainder(x) is less than max_errors if all(remainder(1:end - max_errors) == 0) break; end % Update r0, r1, g0, g1 and remove leading zeros r0 = trim(r1); r1 = trim(remainder); g0 = g1; g1 = g; end % Remove leading zeros g = trim(g); % Find the zeros of the error polynomial on this galois field evalPoly = polyval(g, alpha .^ (n - 1 : - 1 : 0)); error_pos = gf(find(evalPoly == 0), m); % If no error position is found we return the received work, because % basically is nothing that we could do and we return the received message if isempty(error_pos) decoded = orig_vals(1:k); error_mag = []; return; end % Prepare a linear system to solve the error polynomial and find the error % magnitudes size_error = length(error_pos); Syndrome_Vals = Syndromes.x; b(:, 1) = Syndrome_Vals(1:size_error); for idx = 1 : size_error e = alpha .^ (idx * (n - error_pos.x)); err = e.x; er(idx, :) = err; end % Solve the linear system error_mag = (gf(er, m, prim_poly) \ gf(b, m, prim_poly))'; % Put the error magnitude on the error vector errors(error_pos.x) = error_mag.x; % Bring this vector to the galois field errors_gf = gf(errors, m, prim_poly); % Now to fix the errors just add with the encoded code decoded_gf = encoded(1:k) + errors_gf(1:k); decoded = decoded_gf.x; end
wikipedia
wiki_31651_chunk_12
Functional flow block diagram
Contextual and administrative data Each FFBD shall contain the following contextual and administrative data: Date the diagram was created Name of the engineer, organization, or working group that created the diagram Unique decimal delimited number of the function being diagrammed Unique function name of the function being diagrammed. Figure 8 and Figure 9 present the data in an FFBD. Figure 9 is a decomposition of the function F2 contained in Figure 8 and illustrates the context between functions at different levels of the model.
wikipedia
wiki_28077_chunk_3
Tracker (business software)
Stang, D. (2011, June 13). MarketScope for Project and Portfolio Management Applications. Gartner. Retrieved May 5, 2012, from http://www.gartner.com/id=1724626. Levine, R. (2011, February 26). TrackerSuite.Net 3.6 Review. Bright Hub. Retrieved March 8, 2011, from http://www.brighthub.com/office/project-management/reviews/108262.aspx. (2009, August 17). Products to Watch. eWeek. Retrieved August 21, 2009, from http://www.eweek-digital.com/eweek/20090817/?pg=45#pg45. Levine, R. (2009, July 30). Top 5 Project Management Cartoons. Bright Hub. Retrieved August 2, 2009, from http://www.brighthub.com/office/project-management/articles/13681.aspx. (2007, May). Lotus Advisor Editors' Choice Awards 2007. IBM Lotus Advisor. Retrieved January 16, 2008, from https://web.archive.org/web/20080507192328/http://my.advisor.com/doc/18931. (2006, May). Lotus Advisor Editors' Choice Awards 2006. IBM Lotus Advisor. Retrieved January 16, 2008, from https://web.archive.org/web/20090428015658/http://my.advisor.com/doc/18957. Nelson, K. (2004, September 14). Bristol West Moves to PPM. Insurance & Technology Online. Retrieved January 16, 2008, from https://web.archive.org/web/20061019223414/http://www.insurancetech.com/news/showArticle.jhtml?articleID=47205294 Bonasia, J. (2004, August 5). Managers Cautiously Using Employee 'Tracking' Software. Investor's Business Daily. Retrieved January 16, 2008, from http://www.accessmylibrary.com/coms2/summary_0286-8786107_ITM. Pickett, P. (2004, September 3). Drilling Down to the Heart of the Task. ITWorld Canada. Retrieved January 16, 2008, from http://www.itworldcanada.com/Pages/Docbase/ViewArticle.aspx?ID=idgml-766b7948-6411-4980-bf50-db9be02f93e3. (2002, December). Lotus Advisor Excellence Awards. IBM Lotus Advisor. Retrieved January 16, 2008, from https://web.archive.org/web/20080930170548/http://my.advisor.com/doc/11420. Lombardo, C. (2002, December). T&B Software: About Time- And More. Accounting Technology. Retrieved January 16, 2008, from http://www.accessmylibrary.com/coms2/summary_0286-26944159_ITM. Dauten, D. (2002, November 3). Going With the Flow Innovative Way to Grow. Chicago Tribune. Retrieved January 16, 2008, from https://pqasb.pqarchiver.com/chicagotribune/access/230358361.html?dids=230358361:230358361&FMT=ABS&FMTS=ABS:FT. George, T. (2002, June 10). DuPont Plays the Match Game. InformationWeek. Retrieved January 16, 2008, from http://www.informationweek.com/news/showArticle.jhtml?articleID=6504515. Fox, P. (2002, April 22). Tapping the Right Tools. ComputerWorld.com. Retrieved January 16, 2008, from https://web.archive.org/web/20070302144543/http://www.computerworld.com/action/article.do?command=viewArticleBasic. (2002, February). Sanyo Succeeds with Automation Centre's Personnel Tracker. EproMag.com. Moore, C. (2002, January 30). Lotusphere Showcases Messaging, Collaboration Software. InfoWorld. Retrieved January 16, 2008, from https://web.archive.org/web/20080121101838/http://www.infoworld.com/articles/hn/xml/02/01/30/020130hnlotuswrap.html Sullivan, Laurie. (2002, January 15). Pioneer-Standard Invests in Collaborative Software. EBN.com. Retrieved January 16, 2008, from http://www.alacrastore.com/storecontent/bni/25105125. Tillet, S. (2002, January 7). Project Mgm't Automated. Internet Week. Retrieved January 16, 2008, from HighBeam. Sanborn, S. and Moore, C. (2001, December 7). Collaboration Comes Together. InfoWorld. Retrieved January 16, 2008 from https://web.archive.org/web/20050223100842/http://www.infoworld.com/articles/fe/xml/01/12/10/011210fecollab.html. Moore, C. (2001, October 22). Collaboration Burrows Into Biz Apps. InfoWorld. Retrieved January 16, 2008 from https://web.archive.org/web/20050325171048/http://www.infoworld.com/articles/fe/xml/01/10/22/011022feedge.html
wikipedia
wiki_37376_chunk_12
Speakeasy (computational environment)
Depending on a specific setting, missing values can be represented by the above notation, by a question mark symbol, or a blank (useful in tables). When used in input the question mark is interpreted as an N.A. missing value. :_ b=timeseries(1,2,3,4 : 2010 1 4) :_ b B (A Time Series with 4 Components) 1 2 3 4 :_ b(2010 3) = ? :_ showmval qmark :_ b B (A Time Series with 4 Components) 1 2 ? 4 :_ 1/b 1/B (A Time Series with 4 Components) 1 .5 ? .25 :_ showmval explain :_ b B (A Time Series with 4 Components) 1 2 N.A. 4 :_ 1/b 1/B (A Time Series with 4 Components) 1 .5 N.C. .25
wikipedia
wiki_2790_chunk_4
Binary Golay code
Constructions Lexicographic code: Order the vectors in V lexicographically (i.e., interpret them as unsigned 24-bit binary integers and take the usual ordering). Starting with w0 = 0, define w1, w2, ..., w12 by the rule that wn is the smallest integer which differs from all linear combinations of previous elements in at least eight coordinates. Then W can be defined as the span of w1, ..., w12. Mathieu group: Witt in 1938 published a construction of the largest Mathieu group that can be used to construct the extended binary Golay code. Quadratic residue code: Consider the set N of quadratic non-residues (mod 23). This is an 11-element subset of the cyclic group Z/23Z. Consider the translates t+N of this subset. Augment each translate to a 12-element set St by adding an element ∞. Then labeling the basis elements of V by 0, 1, 2, ..., 22, ∞, W can be defined as the span of the words St together with the word consisting of all basis vectors. (The perfect code is obtained by leaving out ∞.) As a cyclic code: The perfect G23 code can be constructed via the factorization of over the binary field GF(2):
wikipedia
wiki_15482_chunk_6
Human Protein Reference Database
There are other databases that deal with human proteome (e.g. BioGRID, BIND, DIP, HPRD, IntAct, MINT, MIPS, PDZBase and Reactome). Each database has its own style of presenting the data. It is a difficult task for most investigators to compare the voluminous data from these databases in order to conclude strengths and weaknesses of each database. Mathivanan and colleagues tried to address this issue while analyzing protein data by asking various questions. This analysis will help biologists to choose among these databases based on their needs. References
wikipedia
wiki_33960_chunk_28
Renewable energy in Canada
One consideration of ocean energy not to be overlooked is the concurrent development and use of the ocean and its resources by all manners of industries, hobbyists, and wildlife. Power production facilities require their own space and can become danger to the animals and humans that get too close. One proposed solution that is seeing success along the North-East coast of Europe is Marine Spatial Planning, where instead of the free for all that naturally developed as humans increased their use of the ocean through fishing, transportation and industry, the government steps in to assign distinguished areas for each of these activities. In an area as small and densely trafficked, Marine Spatial Planning could be a great tool in the development and testing of ocean energy technologies in Canada.
wikipedia
wiki_24026_chunk_21
Multiservice tactical brevity code
W Wall Three or more groups or contacts primarily split in azimuth. Warning (color) Hostile attack is RED imminent or in progress. YELLOW probable. WHITE improbable (all clear). Weapons (followed by appropriate modifier below) Fire only; FREE at targets not identified as friendly in accordance with current rules of engagement (ROE). TIGHT at targets positively identified as hostile in accordance with current ROE. HOLD* (USA, USMC) in self-defense or in response to a formal order. SAFE (USN) NOTE: USN and NATO use weapons safe to avoid confusion with the phrase hold fire. Weeds Indicates that fixed-wing aircraft are operating below above ground level. What luck Request for results of missions or tasks. What state Report amount of fuel and missiles remaining. Ammunition and oxygen are reported only when specifically requested or critical. Active = number of active radar missiles remaining. Radar = number of semi-active radar missiles remaining. Heat = number of IR missiles remaining. Fuel = pounds of fuel or time remaining. Wilco Will comply Winchester No ordnance remaining, can be used to refer to specific types ordnance or all ordnance. Woodpecker Close in weapons system (CIWS). Words Directive or interrogative regarding further information or directives pertinent to mission. Working A suppression of enemy air defenses (SEAD) aircraft is gathering electronic order of battle (EOB) (which emitter controls the operations of other emitters) on a designated emitter; generally followed by signal type, (SAM/AAA/group) bearing, and range, if able. Aircraft executing electronic identification (EID) on a specific aircraft/group to obtain identification necessary for beyond visual range (BVR) employment.
wikipedia
wiki_594_chunk_48
Tree (data structure)
In computing, a common way to define well-founded trees is via recursive ordered pairs : a tree is a forest together with a "fresh" node . A forest in turn is a possibly empty set of trees with pairwise disjoint sets of nodes. For the precise definition, proceed similarly as in the construction of names used in the set-theoretic technique of forcing. Let be a set of nodes. In the superstructure over , define sets , of trees and forests, respectively, and a map assigning each tree its underlying set of nodes so that: {| cellpadding=0 style="border:0;" |- style="vertical-align:top;" | (trees over ) | | | style="width: 3em; text-align: center;" | ↔ | is a pair from such that for all , , |- style="vertical-align:top;" | (forests over ) | | | style="text-align: center;" | ↔ | is a subset of such that for every , , |- style="vertical-align:top;" | (nodes of trees) | | | style="text-align: center;" | ↔ | and either or for some . |}
wikipedia
wiki_39905_chunk_8
Religious and political symbols in Unicode
Miscellaneous Symbols block The Unicode chart for the Miscellaneous Symbols block has a section explicitly labelled "Religious and political symbols": {| class="wikitable" style="text-align:center" |- ! Text !! Emoji !! Code point !! Name and notes |- | || || U+2626 || style="text-align:left" | ORTHODOX CROSS |- | || || U+2627 || style="text-align:left" | CHI RHO = Constantine's cross, Christogram β†’ 2CE9 coptic symbol khi ro |- | || || U+2628 || style="text-align:left" | CROSS OF LORRAINE |- | || || U+2629 || style="text-align:left" | CROSS OF JERUSALEM β†’ 1F70A alchemical symbol for vinegar |- | || || U+262A || style="text-align:left" | STAR AND CRESCENT |- | || || U+262B || style="text-align:left" | FARSI SYMBOL = symbol of Iran (1.0) |- | || || U+262C || style="text-align:left" | ADI SHAKTI = Gurmukhi khanda - ਖੰ਑ਾ |- | || || U+262D || style="text-align:left" | HAMMER AND SICKLE |- | || || U+262E || style="text-align:left" | PEACE SYMBOL |- | || || U+262F || style="text-align:left" | YIN YANG β†’ 0FCA Tibetan symbol nor bu nyis -khyil |- | || || U+26E7 || style="text-align:left" | INVERTED PENTAGRAM |} Elsewhere in the block is: {| class="wikitable" style="text-align:center" |- ! Text !! Emoji !! Code point !! Name and notes |- | || || U+26E9 || style="text-align:left" | SHINTO SHRINE |}
wikipedia
wiki_12666_chunk_17
Dynamic energy budget theory
The general methodology of estimation of DEB parameters from data is described in van der Meer 2006; Kooijman et al 2008 shows which particular compound parameters can be estimated from a few simple observations at a single food density and how an increasing number of parameters can be estimated if more quantities are observed at several food densities. A natural sequence exists in which parameters can be known in principle. In addition, routines for data entry and scripts for parameter estimation are available as a free and documented software package DEBtool, aiming to provide a ready-to-use tool for users with less mathematical and programing background. Number of parameters, also pointed as relatively sparse for a bioenergetic model, vary depending on the main application and, because the whole life cycle of an organism is defined, the overall number of parameters per data-set ratio is relatively low. Linking the DEB (abstract) and measured properties is done by simple mathematical operations which include auxiliary parameters (also defined by the DEB theory and included in the DEBtool routines), and include also switching between energy-time and mass-time contexts. Add my pet (AmP) project explores parameter pattern values across taxa. The DEB notation is a result of combining the symbols from the main fields of science (biology, chemistry, physics, mathematics) used in the theory, while trying to keep the symbols consistent. As the symbols themselves contain a fair bit of information (see DEB notation document), they are kept in most of the DEB literature.
wikipedia
wiki_18998_chunk_4
The Engineering of Consent
The essay first appeared in the Annals of the American Academy of Political and Social Science. The author's observations in the essay include the following: The United States has become a small room where a single whisper is magnified thousands of times. There are two divisions in media: commercial and organized group information systems. Today’s leaders have become more remote physically from the public, yet, at the same time, the public has much greater familiarity with these leaders through the system of modern communications...Increased influence of mass media is due to widespread and enormously rapid diffusion of literacy. With the aid of technicians in the field who have specialized in utilizing the channels of communications, [some leaders] have been able to achieve purposefully and scientifically what we have termed "the engineering of consent". The freedoms of press, speech, petition and assembly, the freedoms which make the engineering of consent possible, are among the most cherished guarantees in the Constitution of the United States. Under no circumstances should the engineering of consent supersede or displace the educational system, either formal or informal, in bringing about understanding by the people as the basis for their actions. The engineering of consent often does supplement the educational process. The chief function [of the profession] is to analyze objectively and realistically the position of its client vis-a-vis a public, and to advise as to the necessary corrections in its client’s attitudes towards and approaches to that public. It must be remembered of course that good will, the basis of lasting adjustment, can be preserved in the long run, only by those whose actions warrant it... The public relations counsel has the professional responsibility to push only those ideas that he can respect, and not to promote causes or accept assignments for clients he considers anti-social. As in physical engineering, a feasibility study must be done and a budget drawn up. The engineer of consent must be powerfully equipped with facts, with truths, with evidence before he shows himself before a public. Bernays recommends World Almanac with lists of thousands of associations across the United States – a cross-section of the country. The public’s attitudes, ideas, presumptions or prejudices result from definite influences. One must try to find out what they are in any situation in which one is working. Democratic society is actually only a loose aggregate of constituent groups...To influence the public, the engineer of consent works with and through group leaders and opinion moulders on every level. Research furnishes the equivalent of the mariner's chart, the architect's blue print, the traveler's road map. Themes must appeal to the motives of the public. Motives are the activation of both conscious and subconscious pressure created by the force of desires Organization also correlates the activities of any specialists who may be called upon from time to time, such as opinion researchers, fund raisers, publicity men, radio and motion picture experts, specialists for women's clubs or foreign language groups, and the like. Set in motion a broad activity, the success of which depends on interlocking all phases and elements of the proposed strategy, implemented by tactics that are timed to the moment of maximum effectiveness. The developing of events and circumstances that are not routine is one of the basic functions of the engineer of consent.
wikipedia
wiki_5545_chunk_5
Holland Codes
Tracey and Rounds's octagonal model In the United States, the energetic trial is being made with the aim of the new model which surpasses Holland hexagon model in 1990's. Tracey & Rounds's octagonal model is one such example. Based on the empirical data, they argue that occupational interests can be placed circularly in a two-dimensional plane consisting of People/Things and Data/ldeas axes, and the number of regions can be arbitrarily determined. According to their model, only Holland's hexagonal model does not adequately represent the structure of occupational interest, and it is possible to retain validity as an octagonal or 16 square model if necessary.
wikipedia
wiki_16245_chunk_22
Gadfly (database)
Introspection By default a gadfly database automatically includes "introspective" tables which allow a gadfly query to "query the shape of the database"β€”for example to view table names and names of rows in tables: >>> g = gadfly() >>> g.startup("dbtest", "dbtest") >>> c = g.cursor() >>> c.execute("select * from __table_names__") >>> print c.pp() IS_VIEW | TABLE_NAME ========================= 1 | __TABLE_NAMES__ 1 | DUAL 1 | 1 | 1 | 1 | Here DUAL is a standard one row/one column test table (from the Oracle tradition) and the other tables provide information about the database schema: >>> c.execute("create table t1 (a varchar, b varchar)") >>> c.execute("create table t2 (b varchar, c varchar)") >>> c.execute("create unique index t1a on t1(a)") >>> c.execute("create index t1b on t1(b)") >>> c.execute("select * from __table_names__") >>> print c.pp() IS_VIEW | TABLE_NAME ========================= 0 | T1 1 | 1 | 0 | T2 1 | __TABLE_NAMES__ 1 | 1 | DUAL 1 | >>> c.execute("select * from __columns__") >>> print c.pp() COLUMN_NAME | TABLE_NAME ============================= A | T1 B | T1 NAME | DEFN | INDEX_NAME | TABLE_NAME | IS_UNIQUE | TABLE_NAME | __TABLE_NAMES__ IS_VIEW | __TABLE_NAMES__ B | T2 C | T2 COLUMN1 | DUAL TABLE_NAME | COLUMN_NAME | INDEX_NAME | COLUMN_NAME | >>> c.execute("select * from __indices__") >>> print c.pp() IS_UNIQUE | TABLE_NAME | INDEX_NAME =================================== 0 | T1 | T1B 1 | T1 | T1A >>> c.execute("select * from __indexcols__") >>> print c.pp() COLUMN_NAME | INDEX_NAME ======================== B | T1B A | T1A >>> c.execute("select * from dual") >>> print c.pp() COLUMN1 ======= 0
wikipedia
wiki_8588_chunk_49
Matrix calculus
{|class="wikitable" style="text-align: center;" |+ Differential identities: matrix ! Condition !! Expression !! Result (numerator layout) |- |A is not a function of X || || |- |a is not a function of X || || |- | || || |- | || || |- | (Kronecker product) || || |- | (Hadamard product) || || |- | || || |- | | | |- | (conjugate transpose) || || |- | n is a positive integer || || |- | | | |- | | | |- | is diagonalizable f is differentiable at every eigenvalue | | |} In the last row, is the Kronecker delta and is the set of orthogonal projection operators that project onto the k-th eigenvector of X. Q is the matrix of eigenvectors of , and are the eigenvalues. The matrix function is defined in terms of the scalar function for diagonalizable matrices by where with .
wikipedia
wiki_33196_chunk_17
Relationships among probability distributions
Consequences of the CLT: If X is a Poisson random variable with large mean, then for integers j and k, P(j ≀ X ≀ k) approximately equals to P(j βˆ’ 1/2 ≀ Y ≀ k + 1/2) where Y is a normal distribution with the same mean and variance as X. If X is a binomial(n, p) random variable with large np and n(1Β βˆ’Β p), then for integers j and k, P(j ≀ X ≀ k) approximately equals to P(j βˆ’ 1/2 ≀ Y ≀ k + 1/2) where Y is a normal random variable with the same mean and variance as X, i.e. np and np(1Β βˆ’Β p). If X is a beta random variable with parameters Ξ± and Ξ² equal and large, then X approximately has a normal distribution with the same mean and variance, i. e. mean Ξ±/(Ξ± + Ξ²) and variance Ξ±Ξ²/((Ξ± + Ξ²)2(Ξ± + Ξ² + 1)). If X is a gamma(Ξ±, Ξ²) random variable and the shape parameter Ξ± is large relative to the scale parameter Ξ², then X approximately has a normal random variable with the same mean and variance. If X is a Student's t random variable with a large number of degrees of freedom Ξ½ then X approximately has a standard normal distribution. If X is an F(Ξ½, Ο‰) random variable with Ο‰ large, then Ξ½X is approximately distributed as a chi-squared random variable with Ξ½ degrees of freedom.
wikipedia
wiki_37773_chunk_16
Statistics education
United Kingdom In the United Kingdom, at least some statistics has been taught in schools since the 1930s. At present, A-level qualifications (typically taken by 17- to 18-year-olds) are being developed in "Statistics" and "Further Statistics". The coverage of the former includes: Probability; Data Collection; Descriptive Statistics; Discrete Probability Distributions; Binomial Distribution; Poisson Distributions; Continuous Probability Distributions; The Normal Distribution; Estimation; Hypothesis Testing; Chi-Squared; Correlation and Regression. The coverage of "Further Statistics" includes: Continuous Probability Distributions; Estimation; Hypothesis Testing; One Sample Tests; Hypothesis Testing; Two Sample Tests; Goodness of Fit Tests; Experimental Design; Analysis of Variance (Anova); Statistical Process Control; Acceptance Sampling. The Centre for Innovation in Mathematics Teaching (CIMT) has online course notes for these sets of topics. Revision notes for an existing qualification indicate a similar coverage. At an earlier age (typically 15–16 years) GCSE qualifications in mathematics contain "Statistics and Probability" topics on: Probability; Averages; Standard Deviation; Sampling; Cumumulative Frequency Graphs (including median and quantiles); Representing Data; Histograms. The UK's Office for National Statistics has a webpage leading to material suitable for both teachers and students at school level. In 2004 the Smith inquiry made the following statement: "There is much concern and debate about the positioning of Statistics and Data Handling within the current mathematics GCSE, where it occupies some 25 per cent of the timetable allocation. On the one hand, there is widespread agreement that the Key Stage 4 curriculum is over-crowded and that the introduction of Statistics and Data Handling may have been at the expense of time needed for practising and acquiring fluency in core mathematical manipulations. Many in higher education mathematics and engineering departments take this view. On the other hand, there is overwhelming recognition, shared by the Inquiry, of the vital importance of Statistics and Data Handling skills both for a number of other academic disciplines and in the workplace. The Inquiry recommends that there be a radical re-look at this issue and that much of the teaching and learning of Statistics and Data Handling would be better removed from the mathematics timetable and integrated with the teaching and learning of other disciplines (e.g. biology or geography). The time restored to the mathematics timetable should be used for acquiring greater mastery of core mathematical concepts and operations."
wikipedia
wiki_30520_chunk_7
Crossing number (graph theory)
During World War II, Hungarian mathematician PΓ‘l TurΓ‘n was forced to work in a brick factory, pushing wagon loads of bricks from kilns to storage sites. The factory had tracks from each kiln to each storage site, and the wagons were harder to push at the points where tracks crossed each other, from which TurΓ‘n was led to ask his brick factory problem: how can the kilns, storage sites, and tracks be arranged to minimize the total number of crossings? Mathematically, the kilns and storage sites can be formalized as the vertices of a complete bipartite graph, with the tracks as its edges. A factory layout can be represented as a drawing of this graph, so the problem becomes: what is the minimum possible number of crossings in a drawing of a complete bipartite graph?
wikipedia
wiki_33342_chunk_21
Psychometric software
irtoys irtoys is an R package first published in 2007 and supporting almost everything in the book but limited to one booklet of dichotomous items. It is good for teaching, smaller projects, as a psychometrician's Swiss knife and as a source of building stones for other projects. The simple syntax files for ICL and BILOG-MG it writes can be studied and modified to handle more complicated problems.
wikipedia
wiki_8826_chunk_15
Internal Revenue Code
Subtitles A. Income Taxes (sections 1 through 1564)As a further example, here are the chapters of this subtitle: (sections 1 through 1400U3) (sections 1401 through 1403) (sections 1441 through 1464) (sections 1471–1474) (sections 1491-1494) (sections 1501 through 1564) B. Estate and Gift Taxes (sections 2001 through 2801) C. Employment Taxes (sections 3101 through 3510) D. Miscellaneous Excise Taxes (sections 4001 through 5000) E. Alcohol, Tobacco, and Certain Other Excise Taxes (sections 5001 through 5891) F. Procedure and Administration (sections 6001 through 7874) G. The Joint Committee on Taxation (sections 8001 through 8023) H. Financing of Presidential Election Campaigns (sections 9001 through 9042) I. Trust Fund Code (sections 9500 through 9602) ("Trust Fund Code of 1981") J. Coal Industry Health Benefits (sections 9701 through 9722) K. Group Health Plan Requirements (sections 9801 through 9834)
wikipedia
wiki_2250_chunk_5
Oz (programming language)
Basic data structures: Numbers: floating point or integer (real integer) Records: for grouping data : circle(x:0 y:1 radius:3 color:blue style:dots). Here the terms x,y, radius etc. are called features and the data associated with the features (in this case 0,1,3 etc.) are the values. Tuples: Records with integer features in ascending order: circle(1:0 2:1 3:3 4:blue 5:dots) . Lists: a simple linear structure '|'(2 '|'(4 '|'(6 '|'(8 nil)))) % as a record. 2|(4|(6|(8|nil))) % with some syntactic sugar 2|4|6|8|nil % more syntactic sugar [2 4 6 8] % even more syntactic sugar Those data structures are values (constant), first class and dynamically type checked. Variable names in Oz start with an uppercase letter to distinguish them from literals which always begin with a lowercase letter.
wikipedia
wiki_23161_chunk_6
FAME (database)
Toolkits and connectors FAME Desktop Add-in for Excel: FAME Desktop is an Excel add-in that supports the =FMD(expression,sd,ed,0,freq,orientation) and =FMS(expression,freq + date) formula, just as the 4GL command prompt does. These formulas can be placed in Excel spreadsheets and are linked to FAME objects and analytics stored on a FAME server. Sample excel templates for research and analytics, which act as accelerators for clients, are available in the template library. The FAME Desktop Add-in was first renamed as FAME Populator, then MarketMap Analytics.
wikipedia
wiki_4_chunk_48
Algorithm
An elegant program for Euclid's algorithm The flowchart of "Elegant" can be found at the top of this article. In the (unstructured) Basic language, the steps are numbered, and the instruction LET [] = [] is the assignment instruction symbolized by ←. 5 REM Euclid's algorithm for greatest common divisor 6 PRINT "Type two integers greater than 0" 10 INPUT A,B 20 IF B=0 THEN GOTO 80 30 IF A > B THEN GOTO 60 40 LET B=B-A 50 GOTO 20 60 LET A=A-B 70 GOTO 20 80 PRINT A 90 END How "Elegant" works: In place of an outer "Euclid loop", "Elegant" shifts back and forth between two "co-loops", an A > B loop that computes A ← A βˆ’ B, and a B ≀ A loop that computes B ← B βˆ’ A. This works because, when at last the minuend M is less than or equal to the subtrahend S (Difference = Minuend βˆ’ Subtrahend), the minuend can become s (the new measuring length) and the subtrahend can become the new r (the length to be measured); in other words the "sense" of the subtraction reverses.
wikipedia
wiki_2902_chunk_2
List of mathematical examples
Alexander horned sphere All horses are the same color Cantor function Cantor set Checking if a coin is biased Concrete illustration of the central limit theorem Differential equations of mathematical physics Dirichlet function Discontinuous linear map Efron's non-transitive dice Example of a game without a value Examples of contour integration Examples of differential equations Examples of generating functions Examples of groups List of the 230 crystallographic 3D space groups Examples of Markov chains Examples of vector spaces Fano plane Frieze group Gray graph Hall–Janko graph Higman–Sims graph Hilbert matrix Illustration of a low-discrepancy sequence Illustration of the central limit theorem An infinitely differentiable function that is not analytic Leech lattice Lewy's example on PDEs List of finite simple groups Long line Normally distributed and uncorrelated does not imply independent Pairwise independence of random variables need not imply mutual independence. Petersen graph Sierpinski space Simple example of Azuma's inequality for coin flips Proof that 22/7 exceeds Ο€ Solenoid (mathematics) Sorgenfrey plane Stein's example Three cards and a top hat Topologist's sine curve Tsirelson space Tutte eight cage Weierstrass function Wilkinson's polynomial Wallpaper group Uses of trigonometry (The "examples" in that article are not mathematical objects, i.e., numbers, functions, equations, sets, etc., but applications of trigonometry or scientific fields to which trigonometry is applied.)
wikipedia
wiki_10768_chunk_11
Steinhaus–Johnson–Trotter algorithm
Gray codes A Gray code for numbers in a given radix is a sequence that contains each number up to a given limit exactly once, in such a way that each pair of consecutive numbers differs by one in a single digit. The n! permutations of the n numbers from 1 to n may be placed in one-to-one correspondence with the n! numbers from 0 to n!Β βˆ’Β 1 by pairing each permutation with the sequence of numbers ci that count the number of positions in the permutation that are to the right of value i and that contain a value less thanΒ i (that is, the number of inversions for which i is the larger of the two inverted values), and then interpreting these sequences as numbers in the factorial number system, that is, the mixed radix system with radix sequence (1,2,3,4,...). For instance, the permutation (3,1,4,5,2) would give the values c1Β =Β 0, c2Β =Β 0, c3Β =Β 2, c4Β =Β 1, and c5Β =Β 1. The sequence of these values, (0,0,2,1,1), gives the number
wikipedia
wiki_37251_chunk_2
List of RCD Espanyol records and statistics
Overall seasons table in La Liga {|class="wikitable" |-bgcolor="#efefef" ! Pos. ! Club ! Season In D1 ! Pl. ! W ! D ! L ! GS ! GA ! Dif. ! Pts !Champion !2nd place !3rd place !4th place |- |align=center|7 |Espanyol |align=center|85 |align=center|2740 |align=center|979 |align=center|642 |align=center|1119 |align=center|3720 |align=center|4034 |align=center|-314 |align=center|2919 | align=center bgcolor=gold| 0 | align=center bgcolor=silver| 0 | align=center bgcolor=bronze| 4 | align=center | 5 |}
wikipedia
wiki_825_chunk_27
Lua (programming language)
Metatables Extensible semantics is a key feature of Lua, and the metatable concept allows powerful customization of tables. The following example demonstrates an "infinite" table. For any n, fibs[n] will give the n-th Fibonacci number using dynamic programming and memoization. fibs = { 1, 1 } -- Initial values for fibs[1] and fibs[2]. setmetatable(fibs, { __index = function(values, n) --[[__index is a function predefined by Lua, it is called if key "n" does not exist.]] values[n] = values[n - 1] + values[n - 2] -- Calculate and memorize fibs[n]. return values[n] end })
wikipedia
wiki_956_chunk_44
Unification (computer science)
For an example, a term rewrite system R is used defining the append operator of lists built from cons and nil; where cons(x,y) is written in infix notation as x.y for brevity; e.g. app(a.b.nil,c.d.nil) β†’ a.app(b.nil,c.d.nil) β†’ a.b.app(nil,c.d.nil) β†’ a.b.c.d.nil demonstrates the concatenation of the lists a.b.nil and c.d.nil, employing the rewrite rule 2,2, and 1. The equational theory E corresponding to R is the congruence closure of R, both viewed as binary relations on terms. For example, app(a.b.nil,c.d.nil) ≑ a.b.c.d.nil ≑ app(a.b.c.d.nil,nil). The paramodulation algorithm enumerates solutions to equations with respect to that E when fed with the example R.
wikipedia
wiki_8380_chunk_6
Complex network
Interest in scale-free networks began in the late 1990s with the reporting of discoveries of power-law degree distributions in real world networks such as the World Wide Web, the network of Autonomous systems (ASs), some networks of Internet routers, protein interaction networks, email networks, etc. Most of these reported "power laws" fail when challenged with rigorous statistical testing, but the more general idea of heavy-tailed degree distributionsβ€”which many of these networks do genuinely exhibit (before finite-size effects occur) -- are very different from what one would expect if edges existed independently and at random (i.e., if they followed a Poisson distribution). There are many different ways to build a network with a power-law degree distribution. The Yule process is a canonical generative process for power laws, and has been known since 1925. However, it is known by many other names due to its frequent reinvention, e.g., The Gibrat principle by Herbert A. Simon, the Matthew effect, cumulative advantage and, preferential attachment by BarabΓ‘si and Albert for power-law degree distributions. Recently, Hyperbolic Geometric Graphs have been suggested as yet another way of constructing scale-free networks.
wikipedia
wiki_27292_chunk_7
CuneiForm (software)
1999 New OEM contract with the Olivetti company on supplying the multi-function devices imported into Russia with the CuneiForm system; Distribution agreement with a leading European distributor of software company WSKA (France) on the distribution of OCR Cuneiform Direct in Europe; New version of the system released, Cuneiform 2000, that implements the method of "cognitive analysis TM”: an expert system is integrated into the recognition core, which analyses of alternatives to the estimates on the output from each detection algorithm, and choose the best option. The method of "Meridian table segmentation TM" is developed for the improvement of the accuracy of recreating the original form of the table in the output document; The original document form recreation mechanism - "What you scan is what you get TM" is introduced. The technology was aimed at saving the scanned document's original form in terms of its components placement. This particularly important for the documents with complex topology: multicolumn texts with headings, annotations, graphic illustrations, tables, etc.
wikipedia
wiki_4_chunk_42
Algorithm
An inelegant program for Euclid's algorithm The following algorithm is framed as Knuth's four-step version of Euclid's and Nicomachus', but, rather than using division to find the remainder, it uses successive subtractions of the shorter length s from the remaining length r until r is less than s. The high-level description, shown in boldface, is adapted from Knuth 1973:2–4:
wikipedia
wiki_6166_chunk_26
Loop unrolling
Converting to MIPS assembly language The following is MIPS assembly code that will compute the dot product of two 100-entry vectors, A and B, before implementing loop unrolling. The code below omits the loop initializations: Initialize loop count ($7) to 100. Initialize dot product ($f10) to 0. Initialize A[i] pointer ($5) to the base address of A. Initialize B[i] pointer ($6) to the base address of B. Note that the size of one element of the arrays (a double) is 8 bytes. loop3: l.d $f10, 0($5) ; $f10 ← A[i] l.d $f12, 0($6) ; $f12 ← B[i] mul.d $f10, $f10, $f12 ; $f10 ← A[i]*B[i] add.d $f8, $f8, $f10 ; $f8 ← $f8 + A[i]*B[i] addi $5, $5, 8 ; increment pointer for A[i] by the size ; of a double. addi $6, $6, 8 ; increment pointer for B[i] by the size ; of a double. addi $7, $7, -1 ; decrement loop count test: bgtz $7, loop3 ; Continue if loop count > 0
wikipedia
wiki_15398_chunk_12
Roxxon Energy Corporation
Hired agents Thomas Agar - Assault & Battery - Anton Aubuisson - A mercenary of Roxxon who massacres a tribe of Anuquit natives in order to build an oil pipeline but gets thwarted by War Machine. Coldblood-7 - Firebolt - He was hired to destroy the experiments at Project: PEGASUS. Fixer - Flag-Smasher - A mind-controlled operative. Dr. Jonas Harrow - scientist at Rye Research Facility and Roxxon's underground NYC facility. Hellrazor - Ivory - Mad Dog / Col. Buzz Baxter - Mycroft - Omega Flight - Overrider - Former S.H.I.E.L.D. agent with the ability to control machinery. Smokescream - Spymaster - He was hired by Roxxon to kill the Ghost. Was apparently killed by the Ghost, but later turned up alive. Voice - Jennifer Walters / She-Hulk - An attorney. Ghost - The Grapplers - They made an attempt to ransack Project: PEGASUS. Modular Man - A physicist at Roxxon's Brand Corporation. Nth Man - He was about to destroy what remained of the Project. He was also halted. Orka - He battled the Avengers in Jamaica, Queens. Squadron Supreme - Sunturion / Arthur Dearborn - Tarantula / Anton Miguel Rodriguez - Will o' the Wisp - He had his molecules torn apart after Brand's experiment went haywire and was put together by Spider-Man and Dr. Marla Madison. He is still seeking revenge on Brand.
wikipedia
wiki_51_chunk_6
Biostatistics
Research planning Any research in life sciences is proposed to answer a scientific question we might have. To answer this question with a high certainty, we need accurate results. The correct definition of the main hypothesis and the research plan will reduce errors while taking a decision in understanding a phenomenon. The research plan might include the research question, the hypothesis to be tested, the experimental design, data collection methods, data analysis perspectives and costs evolved. It is essential to carry the study based on the three basic principles of experimental statistics: randomization, replication, and local control. Research question
wikipedia
wiki_471_chunk_40
Power law
Two-point fitting method This criterion can be applied for the estimation of power-law exponent in the case of scale free distributions and provides a more convergent estimate than the maximum likelihood method. It has been applied to study probability distributions of fracture apertures. In some contexts the probability distribution is described, not by the cumulative distribution function, by the cumulative frequency of a property X, defined as the number of elements per meter (or area unit, second etc.) for which XΒ >Β x applies, where x is a variable real number. As an example, the cumulative distribution of the fracture aperture, X, for a sample of N elements is defined as 'the number of fractures per meter having aperture greater than x . Use of cumulative frequency has some advantages, e.g. it allows one to put on the same diagram data gathered from sample lines of different lengths at different scales (e.g. from outcrop and from microscope).
wikipedia
wiki_38744_chunk_6
Barcode Project
The Barcode buildings are, from west to east: PriceWaterhouseCoopers (PWC) Building. 18 floors. Architects: a-lab. 12 floors. A glass structure of simple form with a central entrance five storeys high affording views through the building, and 3-storey voids within the building visible from the exterior. The first Barcode building to be completed. In April 2008 a-lab won the "Europe 40 under 40" prize in part on the basis of this design. Kommunal Landspensjonskasse (KLP) Building. 2 overlapping segments in contrasting materials and of differing shapes separated by a column of glass, varying between 8 and 18 floors. 31,700 sq. m. Architects: Solheim & Jacobsen (SJ). The western tower will contain 54 luxury apartments and the eastern the KLP offices. The building will have 5 roof surfaces, 3 of which will be gardens, the other two passive planting. Deloitte Building. 16,950 sq. m. Architects: SnΓΈhetta. This building will be between the KLP Building and the Station Common and will provide services associated with the station, probably including restaurants, on its lowest floors. It will be tall and narrow and the surface realized half in glass, half in dense elements. Its form was inspired by a calving glacier and it was initially referred to as "the Glacier." Visma Building. Three office towers joined by two columnar glass atria, varying between 12 and 17 floors. 20,800 sq. m. Architects: Dark Arkitekter. The cladding is to make it hard to read the number of floors from the exterior, a so-called "pixel facade." DnB NOR Building. Architects: MVRDV, Dark Arkitekter and a-lab. Three buildings linked by a below-ground "street" area, with restaurants and other shared areas on the first and second floors. Building A: 37,000 sq. m., architect: MVRDV and co-architects Dark Arkitekter. The center building and the new headquarters of the financial company. Offices will be grouped around voids and the exterior cladding will be 6-meter square "pixels." Building B: 22,500 sq. m. Architect: a-lab. The eastern building, on the longest site, will be set back behind a plaza on Dronning Eufemias gate and have offices on the lower floors, apartments with terraces on the upper floors. Building C: 14 floors, 13,000 sq. m. Architect: Dark Arkitekter. The western DnB NOR tower will be stepped, with a restaurant, bar, and terrace on the top floor accessible from Dronning Eufemias gate. The building will be clad in glass reflective panels tilted at slightly differing angles to reflect different fractions of the surrounding scenery. To open 2012.
wikipedia
wiki_3019_chunk_40
R (programming language)
use of community-developed external libraries (called packages), in this case caTools package handling of complex numbers multidimensional arrays of numbers used as basic data type, see variables C, Z and X. install.packages("caTools") # install external package library(caTools) # external package providing write.gif function jet.colors <- colorRampPalette(c("red", "blue", "#007FFF", "cyan", "#7FFF7F", "yellow", "#FF7F00", "red", "#7F0000")) dx <- 1500 # define width dy <- 1400 # define height C <- complex(real = rep(seq(-2.2, 1.0, length.out = dx), each = dy), imag = rep(seq(-1.2, 1.2, length.out = dy), dx)) C <- matrix(C, dy, dx) # reshape as square matrix of complex numbers Z <- 0 # initialize Z to zero X <- array(0, c(dy, dx, 20)) # initialize output 3D array for (k in 1:20) { # loop with 20 iterations Z <- Z^2 + C # the central difference equation X[, , k] <- exp(-abs(Z)) # capture results } write.gif(X, "Mandelbrot.gif", col = jet.colors, delay = 100)
wikipedia
wiki_26407_chunk_24
Text Executive Programming Language
A list of star variables follows: *account - user account number associated with the current userid *cl - the current line of the current file being edited *lcl - the length of the *cl value *clvl - current depth of calls *date - current date in the form of YY-MM-DD *eof - T if positioned after the last line of the current file or when there is no current file *in - contains the last response to an in or int TEX command execution *lin - length of *in *left or *l - left string from scan or split command execution *lleft or *ll - length of *left *middle or *m - middle string from scan or split command execution *lmiddle or *lm - length of *middle *right or *r - right string from scan or split command execution *lright or *lr - length of *right *null - represents the null string *random - contains a randomly selected digit from 0 to 9 *rmdr - remainder of the last division operation *snumb - system number of the last batch job run *svmd - TEX commands to restore the TEX modes at the time of the last interfile call or goto *sw00 to *sw35 - examines the TSS 36-bit switch word with 1 bit returning a T value and a 0 bit returning a F *time - current time in hh:mm:ss always to the nearest second *userid - current userid
wikipedia
wiki_26525_chunk_4
Materials science in science fiction
In real life, scientists have announced a plastic as strong as steel, but transparent. |- |Beryllium |Galaxy Quest, The Shadow |The starship NSEA Protector is powered by large spheres of beryllium. Also, beryllium is needed for the creation of a bomb and found by investigating the metal components of a supposed "beryllium coin" in The Shadow (1994). Critics have noted this similarity. |Beryllium's use in these fictional applications may arise from its actual use in some types of nuclear bombs. |- |Calcium carbonate |Stargate SG-1 |When made in suitable rocks such as calcium carbonate oxygen is produced as a by-product during the formation of Crystal tunnels by the Tokra allowing time to set up life support. |There is serious work in extracting oxygen from moon rocks for life support and propulsion. NASA has sponsored a prize (MoonROx) for the first working prototype, and at least one has been built. |- |Cobalt |Apocalyptic fiction such as The Moon is Green, "Exhibit Piece", and On the Beach. |The 5.27 year half life of radioactive 60Co is short enough to produce intense radiation, but long enough for it to disperse world-wide, and impractical to wait in shelters for it to decay. This combination of properties makes a cobalt bomb an excellent doomsday weapon. |The science here is realistic. Fortunately, cobalt bombs have remained in the domain of science fiction. |- |Copper and Copper(II) sulfate |The Skylark of Space series by Edward E. "Doc" Smith |In these stories, copper is used as spaceship fuel, being catalyzed by 'element X' directly into energy. When the ship's supply of copper is exhausted, it is able to refuel and return home by visiting the Green System, which has oceans containing copper sulfate. |Copper is indeed used in rocket engines, but for its high thermal conductivity, not as a power source. |- |Dilithium |Star Trek| Dilithium is fictionally used as shorthand for an extremely complex and hard crystalline structure (2(5)6 dilithium 2(:)l diallosilicate 1:9:1 heptoferranide), which occurs naturally on some planets. When placed in a high-frequency electromagnetic field, magnetic eddies are induced in its structure which keep charged particles away from the crystal lattice. This prevents it from reacting with antimatter when so energized, because the antimatter atoms never actually touch it. Therefore, it is used to contain and regulate the annihilation reaction of matter and antimatter in a starship's warp core, which otherwise would explode from the uncontrolled annihilation reaction. Though low-quality artificial crystals can be grown or replicated, they are limited in the power of the reaction they can regulate without fragmenting, and are therefore largely unsuitable for warp drive applications. Due to the need for natural dilithium crystals for interstellar travel, deposits of this material are a highly contested resource, and as such dilithium crystals have led to more interstellar conflict than all other reasons combined. |In reality dilithium describes a biatomic gas. |- |Duralumin |various |The Marvel Comics character Captain America wears a suit of light weight duralumin mail beneath his costume for added protection.
wikipedia
wiki_23618_chunk_32
Biomolecular engineering
Scaling up a process involves using data from an experimental-scale operation (model or pilot plant) for the design of a large (scaled-up) unit, of commercial size. Scaling up is a crucial part of commercializing a process. For example, insulin produced by genetically modified Escherichia coli bacteria was initialized on a lab-scale, but to be made commercially viable had to be scaled up to an industrial level. In order to achieve this scale-up a lot of lab data had to be used to design commercial sized units. For example, one of the steps in insulin production involves the crystallization of high purity glargin insulin. In order to achieve this process on a large scale we want to keep the Power/Volume ratio of both the lab-scale and large-scale crystallizers the same in order to achieve homogeneous mixing. We also assume the lab-scale crystallizer has geometric similarity to the large-scale crystallizer. Therefore,
wikipedia
wiki_18764_chunk_109
Anonymous function
irb(main):001:0> # Example 1: irb(main):002:0* # Purely anonymous functions using blocks. irb(main):003:0* ex = [16.2, 24.1, 48.3, 32.4, 8.5] => [16.2, 24.1, 48.3, 32.4, 8.5] irb(main):004:0> ex.sort_by { |x| x - x.to_i } # Sort by fractional part, ignoring integer part. => [24.1, 16.2, 48.3, 32.4, 8.5] irb(main):005:0> # Example 2: irb(main):006:0* # First-class functions as an explicit object of Proc - irb(main):007:0* ex = Proc.new { puts "Hello, world!" } => #<Proc:0x007ff4598705a0@(irb):7> irb(main):008:0> ex.call Hello, world! => nil irb(main):009:0> # Example 3: irb(main):010:0* # Function that returns lambda function object with parameters irb(main):011:0* def is_multiple_of(n) irb(main):012:1> lambda{|x| x % n == 0} irb(main):013:1> end => nil irb(main):014:0> multiple_four = is_multiple_of(4) => #<Proc:0x007ff458b45f88@(irb):12 (lambda)> irb(main):015:0> multiple_four.call(16) => true irb(main):016:0> multiple_four[15] => false
wikipedia
wiki_23735_chunk_3
Bowyer–Watson algorithm
Pseudocode The following pseudocode describes a basic implementation of the Bowyer-Watson algorithm. Its time complexity is . Efficiency can be improved in a number of ways. For example, the triangle connectivity can be used to locate the triangles which contain the new point in their circumcircle, without having to check all of the triangles - by doing so we can decrease time complexity to . Pre-computing the circumcircles can save time at the expense of additional memory usage. And if the points are uniformly distributed, sorting them along a space filling Hilbert curve prior to insertion can also speed point location.
wikipedia
wiki_3450_chunk_36
Jacobi elliptic functions
{| class="wikitable" style="text-align:center; width:200px”; |+ Residues of Jacobi Elliptic Functions !colspan="2" rowspan="2"| !colspan="4"|q |- ! width="40pt"|c ! width="40pt"|s ! width="40pt"|n ! width="40pt"|d |- !rowspan="6"|p |- ! height="40pt" |c | ||1|||| |- ! height="40pt" |s | || |||| |- ! height="40pt" |n |||1|| || |- ! height="40pt" | d | -1 || 1 || || |- |}
wikipedia
wiki_16044_chunk_6
Math circle
Guided exploration circles use self-discovery and the Socratic method to probe deep questions. Robert & Ellen Kaplan, in their book Out of the Labyrinth: Setting Mathematics Free, make a case for this format describing the non-profit Cambridge/Boston Math Circle they founded in 1994 in the Harvard University. The book describes the classroom, organizational and practical issues the Kaplans faced in founding their Math Circle. The meetings encourage a free discussion of ideas; while the content is mathematically rigorous, the atmosphere is friendly and relaxed. The philosophy of the teachers is, "What you have been obliged to discover by yourself leaves a path in your mind which you can use again when the need arises" (G. C. Lichtenberg). Children are encouraged to ask exploratory questions. Are there numbers between numbers? What's a geometry like with no parallel lines? Can you tile a square with squares all of different sizes?
wikipedia
wiki_549_chunk_5
Search algorithm
Problems in combinatorial optimization, such as: The vehicle routing problem, a form of shortest path problem The knapsack problem: Given a set of items, each with a weight and a value, determine the number of each item to include in a collection so that the total weight is less than or equal to a given limit and the total value is as large as possible. The nurse scheduling problem Problems in constraint satisfaction, such as: The map coloring problem Filling in a sudoku or crossword puzzle In game theory and especially combinatorial game theory, choosing the best move to make next (such as with the minmax algorithm) Finding a combination or password from the whole set of possibilities Factoring an integer (an important problem in cryptography) Optimizing an industrial process, such as a chemical reaction, by changing the parameters of the process (like temperature, pressure, and pH) Retrieving a record from a database Finding the maximum or minimum value in a list or array Checking to see if a given value is present in a set of values
wikipedia
wiki_7114_chunk_31
List of programs broadcast by Nine Network
1 vs. 100 (2007–2008) All About Faces (1971) Ampol Stamp Quiz (1964–1965) Bert's Family Feud (2006–2007) The Better Sex (1978) The Big Game (1966) Big Nine (1969–1970) Blankety Blanks (1985–1986, 1996) Burgo's Catch Phrase (1997–2001, 2002–2003) Cash Bonanza (2001) The Celebrity Game (1969) Celebrity Squares (1975–1976) Clever (2006) Concentration (1950s–1967) Crossfire (1987–1988) Do You Trust Your Wife? (1957–1958) Don't Forget Your Toothbrush (1995) Double Your Dollars (1965) Download (2000-2002) Fairway Fun (1960s) Family Feud (1977–1984) Fear Factor (2002) Ford Superquiz (1981–1982) Free for All (1973) Gambit (1974) The Golden Show (1960s) Guess What? (1992–1993) Happy Go Lucky (1961) Hole in the Wall (2008) Initial Reaction (Nine Network 2000) It Could Be You (1960–1967, 1969, 1982) Jackpot (1960-1961) Jigsaw (1960s) Keynotes (1964, 1992–1993) Let's Make a Deal (1968–1969, 1977) Letter Charades (1967) Little Aussie Battlers (1998) The Lucky Show (1959–1961) Match Mates (1981–1982) The Mint (2007–2008) The Million Dollar Drop (2011) Million Dollar Wheel of Fortune (2008) My Generation (1995–1996) Name That Tune (1956–1957, 1975) The Newlywed Game (1987) Now You See It (1998–1999) Pass the Buck (2002) Play Your Hunch (1962–1964) Power of 10 (2008) The Price Is Right (1958, 1993–1998, 2003–2005) Quizmania (2006–2007) Sale of the Century (1980–2001) Say G'day (1987) Say When!! (1962–1964) Shafted (2002) Show Me the Money The Singing Bee (2008) Spending Spree (1971–1976) Split Second (1972–1973) Strike It Lucky (1994) Supermarket Sweep (1992–1994) Surprise Package (1961) Take the Hint (1962–1966) Tell the Truth (1959–1965) Temptation (2005–2009) Tic-Tac-Dough (1960–1964) The Tommy Hanlon Show (1967–1968) Wheel of Fortune (1959–1962, no relation to later series of the same name) Who Wants to Be a Millionaire? (1999–2007) Who Wants to Be a Millionaire? Whizz Kids (2010) Wipeout Australia (2009)
wikipedia
wiki_33655_chunk_7
Wind power in New York
A NYISO study conducted in 2010, Growing Wind: Final Report of the NYISO 2010 Wind Generation Study (Sept. 2010), found that the New York power system will allow for the integration of up to 8,000 MW of wind generation with no adverse reliability impacts. At higher levels of wind generation, due to increased variability, the analysis determined that for every 1,000 MW increase between the 4,250 MW and 8,000 MW wind penetration level, the average regulation requirement increases approximately 9 percent. Further, given existing transmission constraints, at the 6,000 MW scenario modeled, 8.8% of the energy production in three areas of upstate New York (Zones C - Central, D - North, and E - Mohawk) would be "bottled" or undeliverable. With upgrades, the amount of bottled wind energy could be reduced to less than 2 percent. A similar bottling pattern was found in the 8,000 MW model. Offshore wind energy, as modeled, is fully deliverable.
wikipedia
wiki_19227_chunk_2
Interactive Mathematics Program
Each book of the curriculum is divided into five- to eight-week units, each having a central problem or theme. This larger problem is intended to serve as motivation for students to develop the underlying skills and concepts needed to solve it, through solving a variety of smaller related problems. There is an emphasis on asking students to work together in collaborative groups. It is hoped that communication skills will be developed; exercises aimed at this goal are embedded throughout the curriculum, through the use of group and whole class discussions, the use of writing to present and clarify mathematical solutions; in some IEP classes, formal oral presentations are required. The IMP curriculum expects students to make nearly daily use of a scientific graphing calculator.
wikipedia
wiki_269_chunk_11
Heap (data structure)
Construction of a binary (or d-ary) heap out of a given array of elements may be performed in linear time using the classic Floyd algorithm, with the worst-case number of comparisons equal to 2N βˆ’ 2s2(N) βˆ’ e2(N) (for a binary heap), where s2(N) is the sum of all digits of the binary representation of N and e2(N) is the exponent of 2 in the prime factorization of N. This is faster than a sequence of consecutive insertions into an originally empty heap, which is log-linear. Variants
wikipedia
wiki_13893_chunk_26
Building information modeling
There have been attempts at creating information models for older, pre-existing facilities. Approaches include referencing key metrics such as the Facility Condition Index (FCI), or using 3D laser-scanning surveys and photogrammetry techniques (separately or in combination) or digitizing traditional building surveying methodologies by using mobile technology to capture accurate measurements and operation-related information about the asset that can be used as the basis for a model. Trying to model a building constructed in, say 1927, requires numerous assumptions about design standards, building codes, construction methods, materials, etc., and is, therefore, more complex than building a model during design.
wikipedia
wiki_22421_chunk_5
DMS Software Reengineering Toolkit
Changes to ASTs can be accomplished by both procedural methods coded in PARLANSE and source-to-source tree transformations coded as rewrite rules using surface-syntax conditioned by any extracted program facts, using DMS's Rule Specification Language (RSL). The rewrite rule engine supporting RSL handles associative and commutative rules. A rewrite rule for C to replace a complex condition by the ?: operator be written as: rule simplify_conditional_assignment(v:left_hand_side,e1:expression,e2:expression,e3:expression) :statement->statement = " if (\e1) \v=\e2; else \v=e3; " -> " \v=\e1?\e2:\e3; " if no_side_effects(v); Rewrite rules have names, e.g. simplify_conditional_assignment. Each rule has a "match this" and "replace by that" pattern pair separated by ->, in our example, on separate lines for readability. The patterns must correspond to language syntax categories; in this case, both patterns must be of syntax category statement also separated in sympathy with the patterns by ->. Target language (e.g., C) surface syntax is coded inside meta-quotes ", to separate rewrite-rule syntax from that of the target language. Backslashes inside meta-quotes represent domain escapes, to indicate pattern meta variables (e.g., \v, \e1, \e2) that match any language construct corresponding to the metavariable declaration in the signature line, e.g., e1 must be of syntactic category: (any) expression. If a metavariable is mentioned multiple times in the match pattern, it must match to identical subtrees; the same identically shaped v must occur in both assignments in the match pattern in this example. Metavariables in the replace pattern are replaced by the corresponding matches from the left side. A conditional clause if provides an additional condition that must be met for the rule to apply, e.g., that the matched metavariable v, being an arbitrary left-hand side, must not have a side effect (e.g., cannot be of the form of a[i++]; the no_side_effects predicate is defined by an analyzer built with other DMS mechanisms).
wikipedia
wiki_15618_chunk_6
Software audit review
The financial context: Further transparency is needed to clarify whether the software has been developed commercially and whether the audit was funded commercially (paid Audit). It makes a difference whether it is a private hobby / community project or whether a commercial company is behind it. Scientific referencing of learning perspectives: Each audit should describe the findings in detail within the context and also highlight progress and development needs constructively. An auditor is not the parent of the program, but serves in a role of a mentor if the auditor is regarded as part of a PDCA learning circle (PDCA = Plan-Do-Check-Act). There should be next to the description of the detected vulnerabilities also a description of the innovative opportunities and the development of the potentials. Literature-inclusion: A reader should not rely solely on the results of one review, but also judge according to a loop of a management system (e.g. PDCA, see above), to ensure, that the development team or the reviewer was and is prepared to carry out further analysis, and also in the development and review process is open to learnings and to consider notes of others. A list of references should be accompanied in each case of an audit. Inclusion of user manuals & documentation: Further a check should be done, whether there are manuals and technical documentations, and, if these are expanded. Identify references to innovations: Applications that allow both, messaging to offline and online contacts, so considering chat and e-mail in one application - as it is also the case with GoldBug - should be tested with high priority (criterion of presence chats in addition to the e-mail function). The auditor should also highlight the references to innovations and underpin further research and development needs. This list of audit principles for crypto applications describes - beyond the methods of technical analysis - particularly core values, that should be taken into account
wikipedia
wiki_17920_chunk_8
Origin (data analysis software)
Release history 2021/11/16 Origin 2022: Add Notes to Cells, Named Range, Image on Graph as Linked Files, Mini Toolbars on Object Manager, Connect to OneDrive and Google Drive for data. 2021/4/30 Origin 2021b: Mini toolbar for 3D graph, built-in Shapefile support, insert maps to graphs, NetCDF climate data, SQLite import export 2020/10/27 Origin 2021. Fully integrated Python support with new originpro package. New formula bar, color manager, chord diagram. New Apps including TDMS Connector, Import PDF Tables. 2020/4/30 Origin 2020b. Mini toolbar for worksheet & matrix, data connector navigator panel, browser graphs. Worksheet cells no longer showing ####. New Apps such as Canonical Correlation Analysis, Correlation plot etc. 2019/10/25 Origin 2020. Mini toolbars, much faster import and plotting of large dataset. Density dots, color dots, sankey diagram, improved pie and doughnut charts. Copy and Paste plot, Copy and Paste HTML or EMF table. 2019/04/24 Origin 2019b. HTML and Markdown reports. Web Data Connectors for CSV, JSON, Excel, MATLAB. Rug Plots, Split Heatmap Plot. Validation Reports using NIST data. New Apps for Quantile Regression, 2D Correlation, Isosurface Plot, etc. 2018/10/26 Origin 2019. Data Highlighter for data exploration, Windows-like search from Start menu, Conditional formatting of data cells, Violin plot, New apps like Stats Advisor, Image Object Counter, Design of Experiments, etc. 2018/4/24 Origin 2018b. Matrices embedded in workbook, Worksheet/matrix data preview, Dynamic graph preview in analysis, Distributed batch processing on multi-core CPU (app). 2017/11/9 Origin 2018. Cell formula, Unicode, Bridge chart, changed to a more compact file format (OPJU). 2016/11/10 Origin 2017. Trellis Plot, Geology fill patterns, JavaScript support from Origin C. 2015/10/23 Origin 2016. First version to support Apps in Origin, also added R support. 2014/10 Origin 2015 added graph thumbnail previews, project search, heat map, 2D kernel density plot and Python support. 2013/10 Origin 9.1 SR0 added support for Piper diagram, Ternary surface plot etc. 2012/10 Origin 9 with high performance OpenGL 3D Graphing, orthogonal regression for implicit/explicit functions 2011/11 Origin 8.6, first version in 64bit 2011/04 Origin 8.5.1 2010/09 Origin 8.5.0 2009/10 Origin 8.1 2009/08 Origin 8 SR6 2007/12 Origin 8 SR1 2007/10 Origin 8 2006/01 Origin 7.5 SR6 2003/10 Origin 7.5 2002/02 Origin 7.0 2000/09 Origin 6.1 1999/06 Origin 6.0 1997/08 Origin 5.0 1995/02 Origin 4.1 1994/07 Origin 3.5 1993/08 Origin 2.9 1993/?? Origin 2
wikipedia
wiki_19233_chunk_8
Spar Aerospace
Beckert, Beverly A., "Satellite Design Soars to New Heights", Computer-Aided Engineering, October 1993, p.Β 24. Berman, David, "When Bad Companies Happen to Good People", Canadian Business, March 27, 1998, pp.Β 78–81. Calamai, Peter, "Canada Mulls Shifting Space Contract to Europeans: U.S. Ban on Flow of Information, Technology Blamed", Toronto Star, May 29, 1999. Covault, Craig, "Ariane Launches Canadian MSat-1", Aviation Week and Space Technology, April 29, 1996, p.Β 29. De Santis, Solange, "In Reaching to Diversify, Spar Aerospace Loses Its Gripβ€”New Chief at Maker of Canadarm Has Hands Full with Leftover Problems", Wall Street Journal, June 26, 1996, p. B4. Hubbard, Craig, "Shuttle's Canadarm Earns Its 50-Mission Cap", Computing Canada, August 10, 1998, p.Β 4. Knapp, Bill, "Masters of the Universe", Canadian Business, November 1992, pp.Β 119–24. Litvak, Isaiah A., "Instant International: Strategic Reality for Small High-Technology Firms in Canada", Multinational Business, Summer 1990, pp.Β 1–12. Morgan, Walter L., "The Olympus Family", Satellite Communications, June 1985, p.Β 35ff. Savona, Dave, and Stephen W. Quickel, "Steel's New Gleam; Sparring Partner", International Business, March 1993, p.Β 126. Southerst, John, "An Arm with a Mind of Its Own", Canadian Business, March 1992, pp.Β 60–64. "Spar Aerospace Launches New Data Collection System", Plant Engineering & Maintenance, March/April 1993, pp.Β 15–18. "The Year of Living Differently", Canadian Business, June 1997, p.Β 16. Source: International Directory of Company Histories, Vol. 32. St. James Press, 2000.
wikipedia
wiki_9359_chunk_9
Computer-aided production engineering
The tools implementing these functions must be highly automated and integrated; and will need to provide quick access to a wide range of data. This data must be maintained in a format that is accessible and usable by the engineering tools. Some examples of the information that might be contained in these electronic libraries include: production process models and data and generic manufacturing systems configurations; machinery and equipment specifications, and vendor catalogs; recommended methods, practices, algorithms, etc., and benchmarking data; typical plant/system layouts, cost estimation models, labor rates, other cost data and budget templates, time standards, industrial standards, project plans, and laws/government regulations.
wikipedia
wiki_10480_chunk_29
List of programs broadcast by Seven Network
All-Star Squares (1999) Australia's Brainiest Kid (Seven Network 2004; Network Ten 2005-2007 as Australia's Brainiest) Beat The Star (2010) Blind Date (1974) Blockbusters (1990–1994) Cannonball (2017) Catch Us If You Can Celebrity Tattletales (1980) C'mon, Have A Go! (1985-1986) Coles Β£3000 Question and Coles $6000 Question (1960–1971) Concentration (1970s, 1997) Seven’s Deal Or No Deal (2003-2013) Dog Eat Dog (2002–2003) The Dulux Show (1957) Family Feud (1988–1996) Gladiators (1995–1996, 2008) Great Temptation (1970–1976) Have a Go (1987) High Rollers (1975) Hot Streak (1998) It Pays to Be Funny (1957–1958) Jeopardy! (1970-1978) Letterbox and $50,000 Letterbox (1963, 1981) The Love Game (1984) The Main Event (1991–1992) Man O Man (1994) The Master (2006) Midnight Zoo (2006) Million Dollar Chance Of A Lifetime (1999–2000) Million Dollar Minute (2013-2015) Minute to Win It (2010) National Bingo Night (2007) Now You See It (1985–1996) Opportunity Knocks (1977–1978) Perfect Match (2002) Pick a Box (1957–1971) Play Your Cards Right (1984) Press Your Luck (1987–1988) The Pressure Pak Show (1957–1958) The Price is Right (original format) (1957–1959, 1963) The New Price is Right (1981-1985) The Price is Right (2012-2013) Quiz Master (2002) The Rich List (2007-2008) Stop the Music (1950s) Take a Chance (1959) Take Me Out (2018) Talking Telephone Numbers (1996) Total Recall (1994–1995) The Trivial Video Show (1986) TV Talent Scout (1957–1958) Video Village (1962-1966) The Wall (2017) The Weakest Link (2001–2002) Wheel of Fortune: The Original Series (1981–2004, 2006 [unscreened episodes]) Larry Emdur & Laura Csortan's Wheel of Fortune (2005-2006) Who Dares Wins (1996–1998) Win Roy and HG's Money (2000) Wipeout (1999–2000)
wikipedia
wiki_2287_chunk_12
Perfect hash function
Pseudocode algorithm hash, displace, and compress is (1) Split S into buckets (2) Sort buckets Bi in falling order according to size |Bi| (3) Initialize array T[0...m-1] with 0's (4) for all i∈[r], in the order from (2), do (5) for l←1,2,... (6) repeat forming Ki←{l(x)|x∈Bi} (6) until |Ki|=|Bi| and Ki∩{j|T[j]=1}=&emptyset; (7) let Οƒ(i):= the successful l (8) for all j∈Ki let T[j]:=1 (9) Transform (Οƒi)0≀i<r into compressed form, retaining access.
wikipedia
wiki_2443_chunk_39
Quantitative genetics
Extensive binomial sampling – is panmixia restored? If the number of binomial samples is large (s β†’ ∞ ), then pβ€’ β†’ pg and qβ€’ β†’ qg. It might be queried whether panmixia would effectively re-appear under these circumstances. However, the sampling of allele frequencies has still occurred, with the result that Οƒ2p, q β‰  0. In fact, as s β†’ ∞, the , which is the variance of the whole binomial distribution. Furthermore, the "Wahlund equations" show that the progeny-bulk homozygote frequencies can be obtained as the sums of their respective average values (p2β€’ or q2β€’) plus Οƒ2p, q. Likewise, the bulk heterozygote frequency is (2 pβ€’ qβ€’) minus twice the Οƒ2p, q. The variance arising from the binomial sampling is conspicuously present. Thus, even when s β†’ ∞, the progeny-bulk genotype frequencies still reveal increased homozygosis, and decreased heterozygosis, there is still dispersion of progeny means, and still inbreeding and inbreeding depression. That is, panmixia is not re-attained once lost because of genetic drift (binomial sampling). However, a new potential panmixia can be initiated via an allogamous F2 following hybridization.
wikipedia
wiki_2443_chunk_124
Quantitative genetics
Following the hybridizing between A and R, the F1 (individual B) is crossed back (BC1) to an original parent (R) to produce the BC1 generation (individual C). [It is usual to use the same label for the act of making the back-cross and for the generation produced by it. The act of back-crossing is here in italics. ] Parent R is the recurrent parent. Two successive backcrosses are depicted, with individual D being the BC2 generation. These generations have been given t indices also, as indicated. As before, fD = ft = fCR = (1/2) [ fRB + fRR ] , using cross-multiplier 2 previously given. The fRB just defined is the one that involves generation (t-1) with (t-2). However, there is another such fRB contained wholly within generation (t-2) as well, and it is this one that is used now: as the co-ancestry of the parents of individual C in generation (t-1). As such, it is also the inbreeding coefficient of C, and hence is f(t-1). The remaining fRR is the coefficient of parentage of the recurrent parent, and so is (1/2) [1 + fR ] . Putting all this together : ft = (1/2) [ (1/2) [ 1 + fR ] + f(t-1) ] = (1/4) [ 1 + fR + 2 f(t-1) ] . The graphs at right illustrate Backcross inbreeding over twenty backcrosses for three different levels of (fixed) inbreeding in the Recurrent parent.
wikipedia
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
7