URL
stringlengths 15
1.68k
| text_list
sequencelengths 1
199
| image_list
sequencelengths 1
199
| metadata
stringlengths 1.19k
3.08k
|
---|---|---|---|
https://groupprops.subwiki.org/wiki/Unipotent_linear_algebraic_group | [
"# Unipotent linear algebraic group\n\nA linear algebraic group",
null,
"$G$ over a field",
null,
"$k$ (which therefore comes equipped with an embedding as a closed subgroup of the general linear group",
null,
"$GL(n,k)$) is termed a unipotent linear algebraic group if it satisfies the following equivalent conditions:\n1. Every element in",
null,
"$G$ is a unipotent element, i.e., subtracting",
null,
"$1$ from it gives a nilpotent element in the matrix ring.\n2.",
null,
"$G$ is conjugate in",
null,
"$GL(n,k)$ to a subgroup of the upper-triangular unipotent matrix group.\nAny unipotent linear algebraic group is nilpotent, with its nilpotency class at most",
null,
"$n - 1$, where",
null,
"$n$ is the degree of the general linear group it is embedded in. However, the converse is not true: it is possible to have a linear algebraic group that is nilpotent as an abstract group but is not unipotent. For instance, the [[[multiplicative group of a field]]",
null,
"$k$, which is the full group",
null,
"$GL(1,k)$, is abelian and hence nilpotent, but is not unipotent."
] | [
null,
"https://groupprops.subwiki.org/w/images/math/d/f/c/dfcf28d0734569a6a693bc8194de62bf.png ",
null,
"https://groupprops.subwiki.org/w/images/math/8/c/e/8ce4b16b22b58894aa86c421e8759df3.png ",
null,
"https://groupprops.subwiki.org/w/images/math/9/7/1/9714d1c20dff3c1ff9eaeb3e89a63b18.png ",
null,
"https://groupprops.subwiki.org/w/images/math/d/f/c/dfcf28d0734569a6a693bc8194de62bf.png ",
null,
"https://groupprops.subwiki.org/w/images/math/c/4/c/c4ca4238a0b923820dcc509a6f75849b.png ",
null,
"https://groupprops.subwiki.org/w/images/math/d/f/c/dfcf28d0734569a6a693bc8194de62bf.png ",
null,
"https://groupprops.subwiki.org/w/images/math/9/7/1/9714d1c20dff3c1ff9eaeb3e89a63b18.png ",
null,
"https://groupprops.subwiki.org/w/images/math/a/4/3/a438673491daae8148eae77373b6a467.png ",
null,
"https://groupprops.subwiki.org/w/images/math/7/b/8/7b8b965ad4bca0e41ab51de7b31363a1.png ",
null,
"https://groupprops.subwiki.org/w/images/math/8/c/e/8ce4b16b22b58894aa86c421e8759df3.png ",
null,
"https://groupprops.subwiki.org/w/images/math/b/e/0/be0ab5115ab17817b261a0ea22d4f269.png ",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9133346,"math_prob":0.9961626,"size":1022,"snap":"2020-34-2020-40","text_gpt3_token_len":237,"char_repetition_ratio":0.19056974,"word_repetition_ratio":0.011976048,"special_character_ratio":0.19569471,"punctuation_ratio":0.10215054,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99966526,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-06T06:33:51Z\",\"WARC-Record-ID\":\"<urn:uuid:8968bc76-c812-4b5d-a73c-cd78adde49e8>\",\"Content-Length\":\"23224\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a1da7a9e-9481-4672-ba76-dd64b6b08c83>\",\"WARC-Concurrent-To\":\"<urn:uuid:675c5d69-0af8-4461-a2b3-657c26103c4e>\",\"WARC-IP-Address\":\"96.126.114.7\",\"WARC-Target-URI\":\"https://groupprops.subwiki.org/wiki/Unipotent_linear_algebraic_group\",\"WARC-Payload-Digest\":\"sha1:HJGSE4LT7PECMQ45PDLWPMYH6DILMGRZ\",\"WARC-Block-Digest\":\"sha1:QCCVSCOSIT3J5ENWE672YK2QIE6F55AO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439736883.40_warc_CC-MAIN-20200806061804-20200806091804-00362.warc.gz\"}"} |
https://logical-invest.com/app/etf/ewd/ishares-msci-sweden-etf | [
"## Description\n\nThe investment seeks to track the investment results of the MSCI Sweden 25/50 Index. The fund will at all times invest at least 80% of its assets in the securities of its underlying index and in depositary receipts representing securities in its underlying index. The underlying index is designed to measure the performance of the large- and mid-cap segments of the Swedish market. A capping methodology is applied that limits the weight of any single issuer to a maximum of 25% of the underlying index. The fund is non-diversified.\n\n## Statistics (YTD)\n\nWhat do these metrics mean? [Read More] [Hide]\n\n### TotalReturn:\n\n'The total return on a portfolio of investments takes into account not only the capital appreciation on the portfolio, but also the income received on the portfolio. The income typically consists of interest, dividends, and securities lending fees. This contrasts with the price return, which takes into account only the capital gain on an investment.'\n\nUsing this definition on our asset we see for example:\n• The total return over 5 years of iShares MSCI Sweden ETF is 22.6%, which is smaller, thus worse compared to the benchmark SPY (63%) in the same period.\n• Looking at total return, or increase in value in of 24.2% in the period of the last 3 years, we see it is relatively smaller, thus worse in comparison to SPY (33.5%).\n\n### CAGR:\n\n'The compound annual growth rate isn't a true return rate, but rather a representational figure. It is essentially a number that describes the rate at which an investment would have grown if it had grown the same rate every year and the profits were reinvested at the end of each year. In reality, this sort of performance is unlikely. However, CAGR can be used to smooth returns so that they may be more easily understood when compared to alternative investments.'\n\nWhich means for our asset as example:\n• Compared with the benchmark SPY (10.3%) in the period of the last 5 years, the compounded annual growth rate (CAGR) of 4.2% of iShares MSCI Sweden ETF is lower, thus worse.\n• Looking at annual return (CAGR) in of 7.5% in the period of the last 3 years, we see it is relatively lower, thus worse in comparison to SPY (10.1%).\n\n### Volatility:\n\n'Volatility is a statistical measure of the dispersion of returns for a given security or market index. Volatility can either be measured by using the standard deviation or variance between returns from that same security or market index. Commonly, the higher the volatility, the riskier the security. In the securities markets, volatility is often associated with big swings in either direction. For example, when the stock market rises and falls more than one percent over a sustained period of time, it is called a 'volatile' market.'\n\nApplying this definition to our asset in some examples:\n• Compared with the benchmark SPY (21.6%) in the period of the last 5 years, the volatility of 26.9% of iShares MSCI Sweden ETF is greater, thus worse.\n• During the last 3 years, the volatility is 31.7%, which is higher, thus worse than the value of 25.1% from the benchmark.\n\n### DownVol:\n\n'The downside volatility is similar to the volatility, or standard deviation, but only takes losing/negative periods into account.'\n\nUsing this definition on our asset we see for example:\n• Looking at the downside risk of 19.5% in the last 5 years of iShares MSCI Sweden ETF, we see it is relatively higher, thus worse in comparison to the benchmark SPY (15.6%)\n• Looking at downside volatility in of 22.8% in the period of the last 3 years, we see it is relatively higher, thus worse in comparison to SPY (18.1%).\n\n### Sharpe:\n\n'The Sharpe ratio was developed by Nobel laureate William F. Sharpe, and is used to help investors understand the return of an investment compared to its risk. The ratio is the average return earned in excess of the risk-free rate per unit of volatility or total risk. Subtracting the risk-free rate from the mean return allows an investor to better isolate the profits associated with risk-taking activities. One intuition of this calculation is that a portfolio engaging in 'zero risk' investments, such as the purchase of U.S. Treasury bills (for which the expected return is the risk-free rate), has a Sharpe ratio of exactly zero. Generally, the greater the value of the Sharpe ratio, the more attractive the risk-adjusted return.'\n\nUsing this definition on our asset we see for example:\n• The Sharpe Ratio over 5 years of iShares MSCI Sweden ETF is 0.06, which is lower, thus worse compared to the benchmark SPY (0.36) in the same period.\n• Compared with SPY (0.3) in the period of the last 3 years, the risk / return profile (Sharpe) of 0.16 is smaller, thus worse.\n\n### Sortino:\n\n'The Sortino ratio, a variation of the Sharpe ratio only factors in the downside, or negative volatility, rather than the total volatility used in calculating the Sharpe ratio. The theory behind the Sortino variation is that upside volatility is a plus for the investment, and it, therefore, should not be included in the risk calculation. Therefore, the Sortino ratio takes upside volatility out of the equation and uses only the downside standard deviation in its calculation instead of the total standard deviation that is used in calculating the Sharpe ratio.'\n\nWhich means for our asset as example:\n• The ratio of annual return and downside deviation over 5 years of iShares MSCI Sweden ETF is 0.09, which is smaller, thus worse compared to the benchmark SPY (0.5) in the same period.\n• Compared with SPY (0.42) in the period of the last 3 years, the ratio of annual return and downside deviation of 0.22 is lower, thus worse.\n\n### Ulcer:\n\n'Ulcer Index is a method for measuring investment risk that addresses the real concerns of investors, unlike the widely used standard deviation of return. UI is a measure of the depth and duration of drawdowns in prices from earlier highs. Using Ulcer Index instead of standard deviation can lead to very different conclusions about investment risk and risk-adjusted return, especially when evaluating strategies that seek to avoid major declines in portfolio value (market timing, dynamic asset allocation, hedge funds, etc.). The Ulcer Index was originally developed in 1987. Since then, it has been widely recognized and adopted by the investment community. According to Nelson Freeburg, editor of Formula Research, Ulcer Index is “perhaps the most fully realized statistical portrait of risk there is.'\n\nWhich means for our asset as example:\n• Compared with the benchmark SPY (8.88 ) in the period of the last 5 years, the Ulcer Ratio of 15 of iShares MSCI Sweden ETF is larger, thus worse.\n• During the last 3 years, the Ulcer Ratio is 18 , which is larger, thus worse than the value of 11 from the benchmark.\n\n### MaxDD:\n\n'Maximum drawdown measures the loss in any losing period during a fund’s investment record. It is defined as the percent retrenchment from a fund’s peak value to the fund’s valley value. The drawdown is in effect from the time the fund’s retrenchment begins until a new fund high is reached. The maximum drawdown encompasses both the period from the fund’s peak to the fund’s valley (length), and the time from the fund’s valley to a new fund high (recovery). It measures the largest percentage drawdown that has occurred in any fund’s data record.'\n\nWhich means for our asset as example:\n• Compared with the benchmark SPY (-33.7 days) in the period of the last 5 years, the maximum drop from peak to valley of -42.3 days of iShares MSCI Sweden ETF is lower, thus worse.\n• During the last 3 years, the maximum drop from peak to valley is -42.3 days, which is lower, thus worse than the value of -33.7 days from the benchmark.\n\n### MaxDuration:\n\n'The Maximum Drawdown Duration is an extension of the Maximum Drawdown. However, this metric does not explain the drawdown in dollars or percentages, rather in days, weeks, or months. It is the length of time the account was in the Max Drawdown. A Max Drawdown measures a retrenchment from when an equity curve reaches a new high. It’s the maximum an account lost during that retrenchment. This method is applied because a valley can’t be measured until a new high occurs. Once the new high is reached, the percentage change from the old high to the bottom of the largest trough is recorded.'\n\nUsing this definition on our asset we see for example:\n• The maximum days under water over 5 years of iShares MSCI Sweden ETF is 467 days, which is greater, thus worse compared to the benchmark SPY (273 days) in the same period.\n• During the last 3 years, the maximum days under water is 371 days, which is higher, thus worse than the value of 273 days from the benchmark.\n\n### AveDuration:\n\n'The Drawdown Duration is the length of any peak to peak period, or the time between new equity highs. The Avg Drawdown Duration is the average amount of time an investment has seen between peaks (equity highs), or in other terms the average of time under water of all drawdowns. So in contrast to the Maximum duration it does not measure only one drawdown event but calculates the average of all.'\n\nWhich means for our asset as example:\n• The average time in days below previous high water mark over 5 years of iShares MSCI Sweden ETF is 156 days, which is larger, thus worse compared to the benchmark SPY (57 days) in the same period.\n• During the last 3 years, the average days under water is 110 days, which is higher, thus worse than the value of 73 days from the benchmark.\n\n## Returns (%)\n\n• Note that yearly returns do not equal the sum of monthly returns due to compounding.\n• Performance results of iShares MSCI Sweden ETF are hypothetical, do not account for slippage, fees or taxes, and are based on backtesting, which has many inherent limitations, some of which are described in our Terms of Use."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9442741,"math_prob":0.92820084,"size":5595,"snap":"2022-40-2023-06","text_gpt3_token_len":1116,"char_repetition_ratio":0.12913612,"word_repetition_ratio":0.03960396,"special_character_ratio":0.19070598,"punctuation_ratio":0.09432146,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96109664,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-05T20:35:53Z\",\"WARC-Record-ID\":\"<urn:uuid:290ca215-2197-4546-be10-ca2e2daecbf0>\",\"Content-Length\":\"52744\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:671eec70-8c85-4a61-806b-0ccbdb7ce106>\",\"WARC-Concurrent-To\":\"<urn:uuid:a483147e-1feb-461f-9f0f-252e697db1e0>\",\"WARC-IP-Address\":\"172.66.40.164\",\"WARC-Target-URI\":\"https://logical-invest.com/app/etf/ewd/ishares-msci-sweden-etf\",\"WARC-Payload-Digest\":\"sha1:QYXTQSFVAPRDNKJFIJ6IHVFSUATK3UTK\",\"WARC-Block-Digest\":\"sha1:Q3ONBP3RVY4VLSYWQEWHBTR2T5AMQU4J\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500288.69_warc_CC-MAIN-20230205193202-20230205223202-00353.warc.gz\"}"} |
http://pub.acta.hu/acta/showCustomerArticle.action?id=3112&dataObjectType=article&returnAction=showCustomerVolume&sessionDataSetId=29496aaf4b83ad50&style= | [
"ACTA issues\n\n## Computation of the $\\rho$-numerical radius for truncated shifts\n\nLaurent Carrot\n\nActa Sci. Math. (Szeged) 69:1-2(2003), 311-322\n2897/2009\n\n Abstract. We are interested in computing the $\\rho$-numerical radius of the truncated shift $S_n$ on $l_2^n$. This value, first computed for $\\rho =2$ by Haagerup and de la Harpe, appears as a reference in constrained von Neumann inequalities. In this paper, we give an effective way of computing this value in the general case, and then some exact formulas in particular cases. AMS Subject Classification (1991): 47A12, 15A60, 15-04; 47A63 Received November 12, 2001, and in revised form September 13, 2002. (Registered under 2897/2009.)",
null,
""
] | [
null,
"http://pub.acta.hu/acta/imagestream",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8674206,"math_prob":0.8357281,"size":541,"snap":"2020-34-2020-40","text_gpt3_token_len":149,"char_repetition_ratio":0.09124767,"word_repetition_ratio":0.0,"special_character_ratio":0.3068392,"punctuation_ratio":0.16190477,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9751576,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-25T00:31:25Z\",\"WARC-Record-ID\":\"<urn:uuid:f17c05c3-cc84-462e-a015-fb25e78ef7dc>\",\"Content-Length\":\"46107\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3a148187-be0b-40e7-aa3f-b744146c0ee9>\",\"WARC-Concurrent-To\":\"<urn:uuid:cd8ff94b-1d06-4875-9fdb-944c1cffd524>\",\"WARC-IP-Address\":\"160.114.33.249\",\"WARC-Target-URI\":\"http://pub.acta.hu/acta/showCustomerArticle.action?id=3112&dataObjectType=article&returnAction=showCustomerVolume&sessionDataSetId=29496aaf4b83ad50&style=\",\"WARC-Payload-Digest\":\"sha1:AQVBMVXCCEHI2FJHH4EHBHC5FOYC7PJD\",\"WARC-Block-Digest\":\"sha1:3X53JOA4ZWWG5X4SU3AQPK3H3WPJA2UB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400221382.33_warc_CC-MAIN-20200924230319-20200925020319-00339.warc.gz\"}"} |
https://xmonad.github.io/xmonad-docs/xmonad-contrib/src/XMonad.Hooks.ManageHelpers.html | [
"```{-# LANGUAGE LambdaCase #-}\n-----------------------------------------------------------------------------\n-- |\n-- Description : Helper functions to be used in manageHook.\n-- Copyright : (c) Lukas Mai\n--\n-- Maintainer : Lukas Mai <[email protected]>\n-- Stability : unstable\n-- Portability : unportable\n--\n-- This module provides helper functions to be used in @manageHook@. Here's\n-- how you might use this:\n--\n-- > main =\n-- > ...\n-- > manageHook = composeOne [\n-- > isKDETrayWindow -?> doIgnore,\n-- > transience,\n-- > isFullscreen -?> doFullFloat,\n-- > resource =? \"stalonetray\" -?> doIgnore\n-- > ],\n-- > ...\n-- > }\n--\n-- Here's how you can define more helpers like the ones from this module:\n--\n-- > -- some function you want to transform into an infix operator\n-- > f :: a -> b -> Bool\n-- >\n-- > -- a new helper\n-- > q ***? x = fmap (\\a -> f a x) q -- or: (\\b -> f x b)\n-- > -- or\n-- > q ***? x = fmap (`f` x) q -- or: (x `f`)\n--\n-- Any existing operator can be \"lifted\" in the same way:\n--\n-- > q ++? x = fmap (++ x) q\n\nSide(..),\ncomposeOne,\n(-?>), (/=?), (^?), (~?), (\\$?), (<==?), (</=?), (-->>), (-?>>),\ncurrentWs,\nwindowTag,\nisInProperty,\nisKDETrayWindow,\nisFullscreen,\nisMinimized,\nisDialog,\npid,\ntransientTo,\nmaybeToDefinite,\nMaybeManageHook,\ntransience,\ntransience',\nsameBy,\nshiftToSame,\nshiftToSame',\ndoRectFloat,\ndoFullFloat,\ndoCenterFloat,\ndoSideFloat,\ndoFloatAt,\ndoFloatDep,\ndoHideIgnore,\ndoSink,\ndoLower,\ndoRaise,\ndoFocus,\nMatch,\n) where\n\nimport System.Posix (ProcessID)\n\n-- | Denotes a side of a screen. @S@ stands for South, @NE@ for Northeast\n-- etc. @C@ stands for Center.\ndata Side = SC | NC | CE | CW | SE | SW | NE | NW | C\nforall a.\nRead, Int -> Side -> ShowS\n[Side] -> ShowS\nSide -> WorkspaceId\nforall a.\n(Int -> a -> ShowS)\n-> (a -> WorkspaceId) -> ([a] -> ShowS) -> Show a\nshowList :: [Side] -> ShowS\n\\$cshowList :: [Side] -> ShowS\nshow :: Side -> WorkspaceId\n\\$cshow :: Side -> WorkspaceId\nshowsPrec :: Int -> Side -> ShowS\n\\$cshowsPrec :: Int -> Side -> ShowS\nShow, Side -> Side -> Bool\nforall a. (a -> a -> Bool) -> (a -> a -> Bool) -> Eq a\n/= :: Side -> Side -> Bool\n\\$c/= :: Side -> Side -> Bool\n== :: Side -> Side -> Bool\n\\$c== :: Side -> Side -> Bool\nEq)\n\n-- | A ManageHook that may or may not have been executed; the outcome is embedded in the Maybe\ntype MaybeManageHook = Query (Maybe (Endo WindowSet))\n-- | A grouping type, which can hold the outcome of a predicate Query.\n-- This is analogous to group types in regular expressions.\n-- TODO: create a better API for aggregating multiple Matches logically\ndata Match a = Match Bool a\n\n-- | An alternative 'ManageHook' composer. Unlike 'composeAll' it stops as soon as\n-- a candidate returns a 'Just' value, effectively running only the first match\n-- (whereas 'composeAll' continues and executes all matching rules).\ncomposeOne :: (Monoid a, Monad m) => [m (Maybe a)] -> m a\ncomposeOne :: forall a (m :: * -> *). (Monoid a, Monad m) => [m (Maybe a)] -> m a\ncomposeOne = forall (t :: * -> *) a b.\nFoldable t =>\n(a -> b -> b) -> b -> t a -> b\nfoldr forall {m :: * -> *} {b}. Monad m => m (Maybe b) -> m b -> m b\ntry (forall (m :: * -> *) a. Monad m => a -> m a\nreturn forall a. Monoid a => a\nmempty)\nwhere\ntry :: m (Maybe b) -> m b -> m b\ntry m (Maybe b)\nq m b\nz = do\nMaybe b\nx <- m (Maybe b)\nq\nforall b a. b -> (a -> b) -> Maybe a -> b\nmaybe m b\nz forall (m :: * -> *) a. Monad m => a -> m a\nreturn Maybe b\nx\n\ninfixr 0 -?>, -->>, -?>>\n\n-- | q \\/=? x. if the result of q equals x, return False\n(/=?) :: (Eq a, Functor m) => m a -> a -> m Bool\nm a\nq /=? :: forall a (m :: * -> *). (Eq a, Functor m) => m a -> a -> m Bool\n/=? a\nx = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap (forall a. Eq a => a -> a -> Bool\n/= a\nx) m a\nq\n\n-- | q ^? x. if the result of @x `isPrefixOf` q@, return True\n(^?) :: (Eq a, Functor m) => m [a] -> [a] -> m Bool\nm [a]\nq ^? :: forall a (m :: * -> *). (Eq a, Functor m) => m [a] -> [a] -> m Bool\n^? [a]\nx = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap ([a]\nx forall a. Eq a => [a] -> [a] -> Bool\n`isPrefixOf`) m [a]\nq\n\n-- | q ~? x. if the result of @x `isInfixOf` q@, return True\n(~?) :: (Eq a, Functor m) => m [a] -> [a] -> m Bool\nm [a]\nq ~? :: forall a (m :: * -> *). (Eq a, Functor m) => m [a] -> [a] -> m Bool\n~? [a]\nx = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap ([a]\nx forall a. Eq a => [a] -> [a] -> Bool\n`isInfixOf`) m [a]\nq\n\n-- | q \\$? x. if the result of @x `isSuffixOf` q@, return True\n(\\$?) :: (Eq a, Functor m) => m [a] -> [a] -> m Bool\nm [a]\nq \\$? :: forall a (m :: * -> *). (Eq a, Functor m) => m [a] -> [a] -> m Bool\n\\$? [a]\nx = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap ([a]\nx forall a. Eq a => [a] -> [a] -> Bool\n`isSuffixOf`) m [a]\nq\n\n-- | q <==? x. if the result of q equals x, return True grouped with q\n(<==?) :: (Eq a, Functor m) => m a -> a -> m (Match a)\nm a\nq <==? :: forall a (m :: * -> *).\n(Eq a, Functor m) =>\nm a -> a -> m (Match a)\n<==? a\nx = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap (forall {a}. Eq a => a -> a -> Match a\n`eq` a\nx) m a\nq\nwhere\neq :: a -> a -> Match a\neq a\nq' a\nx' = forall a. Bool -> a -> Match a\nMatch (a\nq' forall a. Eq a => a -> a -> Bool\n== a\nx') a\nq'\n\n-- | q <\\/=? x. if the result of q notequals x, return True grouped with q\n(</=?) :: (Eq a, Functor m) => m a -> a -> m (Match a)\nm a\nq </=? :: forall a (m :: * -> *).\n(Eq a, Functor m) =>\nm a -> a -> m (Match a)\n</=? a\nx = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap (forall {a}. Eq a => a -> a -> Match a\n`neq` a\nx) m a\nq\nwhere\nneq :: a -> a -> Match a\nneq a\nq' a\nx' = forall a. Bool -> a -> Match a\nMatch (a\nq' forall a. Eq a => a -> a -> Bool\n/= a\nx') a\nq'\n\n-- | A helper operator for use in 'composeOne'. It takes a condition and an action;\n-- if the condition fails, it returns 'Nothing' from the 'Query' so 'composeOne' will\n-- go on and try the next rule.\n(-?>) :: (Functor m, Monad m) => m Bool -> m a -> m (Maybe a)\nm Bool\np -?> :: forall (m :: * -> *) a.\nm Bool -> m a -> m (Maybe a)\n-?> m a\nf = do\nBool\nx <- m Bool\np\nif Bool\nx then forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap forall a. a -> Maybe a\nJust m a\nf else forall (m :: * -> *) a. Monad m => a -> m a\nreturn forall a. Maybe a\nNothing\n\n-- | A helper operator for use in 'composeAll'. It takes a condition and a function taking a grouped datum to action. If 'p' is true, it executes the resulting action.\n(-->>) :: (Monoid b, Monad m) => m (Match a) -> (a -> m b) -> m b\nm (Match a)\np -->> :: forall b (m :: * -> *) a.\nm (Match a) -> (a -> m b) -> m b\n-->> a -> m b\nf = do\nMatch Bool\nb a\nm <- m (Match a)\np\nif Bool\nb then a -> m b\nf a\nm else forall (m :: * -> *) a. Monad m => a -> m a\nreturn forall a. Monoid a => a\nmempty\n\n-- | A helper operator for use in 'composeOne'. It takes a condition and a function taking a groupdatum to action. If 'p' is true, it executes the resulting action. If it fails, it returns 'Nothing' from the 'Query' so 'composeOne' will go on and try the next rule.\n(-?>>) :: (Functor m, Monad m) => m (Match a) -> (a -> m b) -> m (Maybe b)\nm (Match a)\np -?>> :: forall (m :: * -> *) a b.\nm (Match a) -> (a -> m b) -> m (Maybe b)\n-?>> a -> m b\nf = do\nMatch Bool\nb a\nm <- m (Match a)\np\nif Bool\nb then forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap forall a. a -> Maybe a\nJust (a -> m b\nf a\nm) else forall (m :: * -> *) a. Monad m => a -> m a\nreturn forall a. Maybe a\nNothing\n\n-- | Return the current workspace\ncurrentWs :: Query WorkspaceId\ncurrentWs :: Query WorkspaceId\ncurrentWs = forall a. X a -> Query a\nliftX (forall a. (WindowSet -> X a) -> X a\nwithWindowSet forall a b. (a -> b) -> a -> b\n\\$ forall (m :: * -> *) a. Monad m => a -> m a\nreturn forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall i l a s sd. StackSet i l a s sd -> i\nW.currentTag)\n\n-- | Return the workspace tag of a window, if already managed\nwindowTag :: Query (Maybe WorkspaceId)\nwindowTag :: Query (Maybe WorkspaceId)\nwindowTag = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ forall a. (WindowSet -> X a) -> X a\nwithWindowSet forall a b. (a -> b) -> a -> b\n\\$ forall (m :: * -> *) a. Monad m => a -> m a\nreturn forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a i l s sd. Eq a => a -> StackSet i l a s sd -> Maybe i\nW.findTag Window\nw\n\n-- | A predicate to check whether a window is a KDE system tray icon.\nisKDETrayWindow :: Query Bool\nisKDETrayWindow :: Query Bool\nisKDETrayWindow = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ do\nMaybe [CLong]\nr <- WorkspaceId -> Window -> X (Maybe [CLong])\ngetProp32s WorkspaceId\n\"_KDE_NET_WM_SYSTEM_TRAY_WINDOW_FOR\" Window\nw\nforall (m :: * -> *) a. Monad m => a -> m a\nreturn forall a b. (a -> b) -> a -> b\n\\$ case Maybe [CLong]\nr of\nJust [CLong\n_] -> Bool\nTrue\nMaybe [CLong]\n_ -> Bool\nFalse\n\n-- | Helper to check if a window property contains certain value.\nisInProperty :: String -> String -> Query Bool\nisInProperty :: WorkspaceId -> WorkspaceId -> Query Bool\nisInProperty WorkspaceId\np WorkspaceId\nv = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ do\nWindow\nva <- WorkspaceId -> X Window\ngetAtom WorkspaceId\nv\nMaybe [CLong]\nr <- WorkspaceId -> Window -> X (Maybe [CLong])\ngetProp32s WorkspaceId\np Window\nw\nforall (m :: * -> *) a. Monad m => a -> m a\nreturn forall a b. (a -> b) -> a -> b\n\\$ case Maybe [CLong]\nr of\nJust [CLong]\nxs -> forall a b. (Integral a, Num b) => a -> b\nfromIntegral Window\nva forall (t :: * -> *) a. (Foldable t, Eq a) => a -> t a -> Bool\n`elem` [CLong]\nxs\nMaybe [CLong]\n_ -> Bool\nFalse\n\n-- | A predicate to check whether a window wants to fill the whole screen.\nisFullscreen :: Query Bool\nisFullscreen :: Query Bool\nisFullscreen = WorkspaceId -> WorkspaceId -> Query Bool\nisInProperty WorkspaceId\n\"_NET_WM_STATE\" WorkspaceId\n\"_NET_WM_STATE_FULLSCREEN\"\n\n-- | A predicate to check whether a window is hidden (minimized).\nisMinimized :: Query Bool\nisMinimized :: Query Bool\nisMinimized = WorkspaceId -> WorkspaceId -> Query Bool\nisInProperty WorkspaceId\n\"_NET_WM_STATE\" WorkspaceId\n\"_NET_WM_STATE_HIDDEN\"\n\n-- | A predicate to check whether a window is a dialog.\nisDialog :: Query Bool\nisDialog :: Query Bool\nisDialog = WorkspaceId -> WorkspaceId -> Query Bool\nisInProperty WorkspaceId\n\"_NET_WM_WINDOW_TYPE\" WorkspaceId\n\"_NET_WM_WINDOW_TYPE_DIALOG\"\n\n-- | This function returns 'Just' the @_NET_WM_PID@ property for a\n-- particular window if set, 'Nothing' otherwise.\n--\n-- See <https://specifications.freedesktop.org/wm-spec/wm-spec-1.5.html#idm45623487788432>.\npid :: Query (Maybe ProcessID)\npid :: Query (Maybe ProcessID)\npid = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ WorkspaceId -> Window -> X (Maybe [CLong])\ngetProp32s WorkspaceId\n\"_NET_WM_PID\" Window\nw forall (f :: * -> *) a b. Functor f => f a -> (a -> b) -> f b\n<&> \\case\nJust [CLong\nx] -> forall a. a -> Maybe a\nJust (forall a b. (Integral a, Num b) => a -> b\nfromIntegral CLong\nx)\nMaybe [CLong]\n_ -> forall a. Maybe a\nNothing\n\n-- | A predicate to check whether a window is Transient.\n-- It holds the result which might be the window it is transient to\n-- or it might be 'Nothing'.\ntransientTo :: Query (Maybe Window)\ntransientTo :: Query (Maybe Window)\ntransientTo = do\nWindow\nw <- forall r (m :: * -> *). MonadReader r m => m r\nDisplay\nd <- (forall a. X a -> Query a\nliftX forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall r (m :: * -> *) a. MonadReader r m => (r -> a) -> m a\ndisplay\nforall (m :: * -> *) a. MonadIO m => IO a -> m a\nliftIO forall a b. (a -> b) -> a -> b\n\\$ Display -> Window -> IO (Maybe Window)\ngetTransientForHint Display\nd Window\nw\n\n-- | A convenience 'MaybeManageHook' that will check to see if a window\n-- is transient, and then move it to its parent.\ntransience :: MaybeManageHook\ntransience :: MaybeManageHook\ntransience = Query (Maybe Window)\ntransientTo forall a (m :: * -> *).\n(Eq a, Functor m) =>\nm a -> a -> m (Match a)\n</=? forall a. Maybe a\nNothing forall (m :: * -> *) a b.\nm (Match a) -> (a -> m b) -> m (Maybe b)\n-?>> forall b a. b -> (a -> b) -> Maybe a -> b\nmaybe forall a. Monoid a => a\nidHook Window -> Query (Endo WindowSet)\ndoShiftTo\n\n-- | 'transience' set to a 'ManageHook'\ntransience' :: ManageHook\ntransience' :: Query (Endo WindowSet)\ntransience' = forall a (m :: * -> *). (Monoid a, Functor m) => m (Maybe a) -> m a\nmaybeToDefinite MaybeManageHook\ntransience\n\n-- | This function returns 'Just' the @WM_CLIENT_LEADER@ property for a\n-- particular window if set, 'Nothing' otherwise. Note that, generally,\n-- the window ID returned from this property (by firefox, for example)\n-- corresponds to an unmapped or unmanaged dummy window. For this to be\n-- useful in most cases, it should be used together with 'sameBy'.\n--\n-- See <https://tronche.com/gui/x/icccm/sec-5.html>.\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ WorkspaceId -> Window -> X (Maybe [CLong])\ngetProp32s WorkspaceId\nw forall (f :: * -> *) a b. Functor f => f a -> (a -> b) -> f b\n<&> \\case\nJust [CLong\nx] -> forall a. a -> Maybe a\nJust (forall a b. (Integral a, Num b) => a -> b\nfromIntegral CLong\nx)\nMaybe [CLong]\n_ -> forall a. Maybe a\nNothing\n\n-- | For a given window, 'sameBy' returns all windows that have a matching\n-- property (e.g. those obtained from Queries of 'clientLeader' and 'pid').\nsameBy :: Eq prop => Query (Maybe prop) -> Query [Window]\nsameBy :: forall prop. Eq prop => Query (Maybe prop) -> Query [Window]\nsameBy Query (Maybe prop)\nprop = Query (Maybe prop)\nprop forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\case\nMaybe prop\nNothing -> forall (f :: * -> *) a. Applicative f => a -> f a\npure []\nMaybe prop\npropVal -> forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a. (WindowSet -> X a) -> X a\nwithWindowSet forall a b. (a -> b) -> a -> b\n\\$ \\WindowSet\ns ->\nforall (m :: * -> *) a.\nApplicative m =>\n(a -> m Bool) -> [a] -> m [a]\nfilterM (forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap (Maybe prop\npropVal forall a. Eq a => a -> a -> Bool\n==) forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a. Query a -> Window -> X a\nrunQuery Query (Maybe prop)\nprop) (forall a i l s sd. Eq a => StackSet i l a s sd -> [a]\nW.allWindows WindowSet\ns forall a. Eq a => [a] -> [a] -> [a]\n\\\\ [Window\nw])\n\n-- | 'MaybeManageHook' that moves the window to the same workspace as the\n-- first other window that has the same value of a given 'Query'. Useful\n-- Queries for this include 'clientLeader' and 'pid'.\nshiftToSame :: Eq prop => Query (Maybe prop) -> MaybeManageHook\nshiftToSame :: forall prop. Eq prop => Query (Maybe prop) -> MaybeManageHook\nshiftToSame Query (Maybe prop)\nprop = forall prop. Eq prop => Query (Maybe prop) -> Query [Window]\nsameBy Query (Maybe prop)\nprop forall a (m :: * -> *).\n(Eq a, Functor m) =>\nm a -> a -> m (Match a)\n</=? [] forall (m :: * -> *) a b.\nm (Match a) -> (a -> m b) -> m (Maybe b)\n-?>> forall b a. b -> (a -> b) -> Maybe a -> b\nmaybe forall a. Monoid a => a\nidHook Window -> Query (Endo WindowSet)\ndoShiftTo forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a. [a] -> Maybe a\nlistToMaybe\n\n-- | 'shiftToSame' set to a 'ManageHook'\nshiftToSame' :: Eq prop => Query (Maybe prop) -> ManageHook\nshiftToSame' :: forall prop.\nEq prop =>\nQuery (Maybe prop) -> Query (Endo WindowSet)\nshiftToSame' = forall a (m :: * -> *). (Monoid a, Functor m) => m (Maybe a) -> m a\nmaybeToDefinite forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall prop. Eq prop => Query (Maybe prop) -> MaybeManageHook\nshiftToSame\n\n-- | converts 'MaybeManageHook's to 'ManageHook's\nmaybeToDefinite :: (Monoid a, Functor m) => m (Maybe a) -> m a\nmaybeToDefinite :: forall a (m :: * -> *). (Monoid a, Functor m) => m (Maybe a) -> m a\nmaybeToDefinite = forall (f :: * -> *) a b. Functor f => (a -> b) -> f a -> f b\nfmap (forall a. a -> Maybe a -> a\nfromMaybe forall a. Monoid a => a\nmempty)\n\n-- | Move the window to the same workspace as another window.\ndoShiftTo :: Window -> ManageHook\ndoShiftTo :: Window -> Query (Endo WindowSet)\ndoShiftTo Window\ntarget = forall s. (s -> s) -> Query (Endo s)\ndoF forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall {s} {i} {l} {sd}.\n(Eq s, Eq i) =>\nWindow -> StackSet i l Window s sd -> StackSet i l Window s sd\nshiftTo forall (m :: * -> *) a b. Monad m => (a -> m b) -> m a -> m b\n=<< forall r (m :: * -> *). MonadReader r m => m r\nwhere shiftTo :: Window -> StackSet i l Window s sd -> StackSet i l Window s sd\nshiftTo Window\nw StackSet i l Window s sd\ns = forall b a. b -> (a -> b) -> Maybe a -> b\nmaybe StackSet i l Window s sd\ns (\\i\nt -> forall a s i l sd.\n(Ord a, Eq s, Eq i) =>\ni -> a -> StackSet i l a s sd -> StackSet i l a s sd\nW.shiftWin i\nt Window\nw StackSet i l Window s sd\ns) (forall a i l s sd. Eq a => a -> StackSet i l a s sd -> Maybe i\nW.findTag Window\ntarget StackSet i l Window s sd\ns)\n\n-- | Floats the new window in the given rectangle.\ndoRectFloat :: W.RationalRect -- ^ The rectangle to float the window in. 0 to 1; x, y, w, h.\n-> ManageHook\ndoRectFloat :: RationalRect -> Query (Endo WindowSet)\ndoRectFloat RationalRect\nr = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall s. (s -> s) -> Query (Endo s)\ndoF (forall a i l s sd.\nOrd a =>\na -> RationalRect -> StackSet i l a s sd -> StackSet i l a s sd\nW.float Window\nw RationalRect\nr)\n\n-- | Floats the window and makes it use the whole screen. Equivalent to\n-- @'doRectFloat' \\$ 'W.RationalRect' 0 0 1 1@.\ndoFullFloat :: ManageHook\ndoFullFloat :: Query (Endo WindowSet)\ndoFullFloat = RationalRect -> Query (Endo WindowSet)\ndoRectFloat forall a b. (a -> b) -> a -> b\n\\$ Rational -> Rational -> Rational -> Rational -> RationalRect\nW.RationalRect Rational\n0 Rational\n0 Rational\n1 Rational\n1\n\n-- | Floats a new window using a rectangle computed as a function of\n-- the rectangle that it would have used by default.\ndoFloatDep :: (W.RationalRect -> W.RationalRect) -> ManageHook\ndoFloatDep :: (RationalRect -> RationalRect) -> Query (Endo WindowSet)\ndoFloatDep RationalRect -> RationalRect\nmove = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall s. (s -> s) -> Query (Endo s)\ndoF forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a i l s sd.\nOrd a =>\na -> RationalRect -> StackSet i l a s sd -> StackSet i l a s sd\nW.float Window\nw forall b c a. (b -> c) -> (a -> b) -> a -> c\n. RationalRect -> RationalRect\nmove forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a b. (a, b) -> b\nsnd forall (m :: * -> *) a b. Monad m => (a -> m b) -> m a -> m b\n=<< forall a. X a -> Query a\nliftX (Window -> X (ScreenId, RationalRect)\nfloatLocation Window\nw)\n\n-- | Floats a new window with its original size, and its top left\n-- corner at a specific point on the screen (both coordinates should\n-- be in the range 0 to 1).\ndoFloatAt :: Rational -> Rational -> ManageHook\ndoFloatAt :: Rational -> Rational -> Query (Endo WindowSet)\ndoFloatAt Rational\nx Rational\ny = (RationalRect -> RationalRect) -> Query (Endo WindowSet)\ndoFloatDep RationalRect -> RationalRect\nmove\nwhere\nmove :: RationalRect -> RationalRect\nmove (W.RationalRect Rational\n_ Rational\n_ Rational\nw Rational\nh) = Rational -> Rational -> Rational -> Rational -> RationalRect\nW.RationalRect Rational\nx Rational\ny Rational\nw Rational\nh\n\n-- | Floats a new window with its original size on the specified side of a\n-- screen\ndoSideFloat :: Side -> ManageHook\ndoSideFloat :: Side -> Query (Endo WindowSet)\ndoSideFloat Side\nside = (RationalRect -> RationalRect) -> Query (Endo WindowSet)\ndoFloatDep RationalRect -> RationalRect\nmove\nwhere\nmove :: RationalRect -> RationalRect\nmove (W.RationalRect Rational\n_ Rational\n_ Rational\nw Rational\nh) = Rational -> Rational -> Rational -> Rational -> RationalRect\nW.RationalRect Rational\ncx Rational\ncy Rational\nw Rational\nh\nwhere cx :: Rational\ncx\n| Side\nside forall (t :: * -> *) a. (Foldable t, Eq a) => a -> t a -> Bool\n`elem` [Side\nSC,Side\nC ,Side\nNC] = (Rational\n1forall a. Num a => a -> a -> a\n-Rational\nw)forall a. Fractional a => a -> a -> a\n/Rational\n2\n| Side\nside forall (t :: * -> *) a. (Foldable t, Eq a) => a -> t a -> Bool\n`elem` [Side\nSW,Side\nCW,Side\nNW] = Rational\n0\n| Bool\notherwise = {- side `elem` [SE,CE,NE] -} Rational\n1forall a. Num a => a -> a -> a\n-Rational\nw\ncy :: Rational\ncy\n| Side\nside forall (t :: * -> *) a. (Foldable t, Eq a) => a -> t a -> Bool\n`elem` [Side\nCE,Side\nC ,Side\nCW] = (Rational\n1forall a. Num a => a -> a -> a\n-Rational\nh)forall a. Fractional a => a -> a -> a\n/Rational\n2\n| Side\nside forall (t :: * -> *) a. (Foldable t, Eq a) => a -> t a -> Bool\n`elem` [Side\nNE,Side\nNC,Side\nNW] = Rational\n0\n| Bool\notherwise = {- side `elem` [SE,SC,SW] -} Rational\n1forall a. Num a => a -> a -> a\n-Rational\nh\n\n-- | Floats a new window with its original size, but centered.\ndoCenterFloat :: ManageHook\ndoCenterFloat :: Query (Endo WindowSet)\ndoCenterFloat = Side -> Query (Endo WindowSet)\ndoSideFloat Side\nC\n\n-- | Hides window and ignores it.\ndoHideIgnore :: ManageHook\ndoHideIgnore :: Query (Endo WindowSet)\ndoHideIgnore = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX (Window -> X ()\nhide Window\nw) forall (m :: * -> *) a b. Monad m => m a -> m b -> m b\n>> forall s. (s -> s) -> Query (Endo s)\ndoF (forall a i l s sd.\nOrd a =>\na -> StackSet i l a s sd -> StackSet i l a s sd\nW.delete Window\nw)\n\n-- | Sinks a window\ndoSink :: ManageHook\ndoSink :: Query (Endo WindowSet)\ndoSink = forall s. (s -> s) -> Query (Endo s)\ndoF forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall a i l s sd.\nOrd a =>\na -> StackSet i l a s sd -> StackSet i l a s sd\nW.sink forall (m :: * -> *) a b. Monad m => (a -> m b) -> m a -> m b\n=<< forall r (m :: * -> *). MonadReader r m => m r\n\n-- | Lower an unmanaged window. Useful together with 'doIgnore' to lower\n-- special windows that for some reason don't do it themselves.\ndoLower :: ManageHook\ndoLower :: Query (Endo WindowSet)\ndoLower = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ forall a. (Display -> X a) -> X a\nwithDisplay forall a b. (a -> b) -> a -> b\n\\$ \\Display\ndpy -> forall (m :: * -> *) a. MonadIO m => IO a -> m a\nio (Display -> Window -> IO ()\nlowerWindow Display\ndpy Window\nw) forall (m :: * -> *) a b. Monad m => m a -> m b -> m b\n>> forall a. Monoid a => a\nmempty\n\n-- | Raise an unmanaged window. Useful together with 'doIgnore' to raise\n-- special windows that for some reason don't do it themselves.\ndoRaise :: ManageHook\ndoRaise :: Query (Endo WindowSet)\ndoRaise = forall r (m :: * -> *). MonadReader r m => m r\nask forall (m :: * -> *) a b. Monad m => m a -> (a -> m b) -> m b\n>>= \\Window\nw -> forall a. X a -> Query a\nliftX forall a b. (a -> b) -> a -> b\n\\$ forall a. (Display -> X a) -> X a\nwithDisplay forall a b. (a -> b) -> a -> b\n\\$ \\Display\ndpy -> forall (m :: * -> *) a. MonadIO m => IO a -> m a\nio (Display -> Window -> IO ()\nraiseWindow Display\ndpy Window\nw) forall (m :: * -> *) a b. Monad m => m a -> m b -> m b\n>> forall a. Monoid a => a\nmempty\n\n-- | Focus a window (useful in 'XMonad.Hooks.EwmhDesktops.setActivateHook').\ndoFocus :: ManageHook\ndoFocus :: Query (Endo WindowSet)\ndoFocus = forall s. (s -> s) -> Query (Endo s)\ndoF forall b c a. (b -> c) -> (a -> b) -> a -> c\n. forall s a i l sd.\n(Eq s, Eq a, Eq i) =>\na -> StackSet i l a s sd -> StackSet i l a s sd\nW.focusWindow forall (m :: * -> *) a b. Monad m => (a -> m b) -> m a -> m b\n=<< forall r (m :: * -> *). MonadReader r m => m r"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.54753613,"math_prob":0.94114995,"size":19609,"snap":"2023-40-2023-50","text_gpt3_token_len":6988,"char_repetition_ratio":0.25763837,"word_repetition_ratio":0.6666667,"special_character_ratio":0.43066958,"punctuation_ratio":0.18616226,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.996483,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T00:13:39Z\",\"WARC-Record-ID\":\"<urn:uuid:214193ab-3a6a-4bca-a500-458171c85dbd>\",\"Content-Length\":\"166718\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:207df7e1-34b2-4042-b080-15af6ccadc34>\",\"WARC-Concurrent-To\":\"<urn:uuid:2e1560cc-933e-4274-a0d9-1852c12d0e36>\",\"WARC-IP-Address\":\"185.199.109.153\",\"WARC-Target-URI\":\"https://xmonad.github.io/xmonad-docs/xmonad-contrib/src/XMonad.Hooks.ManageHelpers.html\",\"WARC-Payload-Digest\":\"sha1:3VIYEKVVJ54RDK5SVONZFKMVHQNWQWO3\",\"WARC-Block-Digest\":\"sha1:NGBZVLCRFHBBPN2PQB5NLOY3BWAPSOPL\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100705.19_warc_CC-MAIN-20231207221604-20231208011604-00742.warc.gz\"}"} |
https://studysoup.com/tsg/2166/physics-principles-with-applications-6-edition-chapter-11-problem-12pe | [
"×\nGet Full Access to Physics: Principles With Applications - 6 Edition - Chapter 11 - Problem 12pe\nGet Full Access to Physics: Principles With Applications - 6 Edition - Chapter 11 - Problem 12pe\n\n×\n\n# The pressure exerted by a phonograph needle on a record is",
null,
"ISBN: 9780130606204 3\n\n## Solution for problem 12PE Chapter 11\n\nPhysics: Principles with Applications | 6th Edition\n\n• Textbook Solutions\n• 2901 Step-by-step solutions solved by professors and subject experts\n• Get 24/7 help from StudySoup virtual teaching assistants",
null,
"Physics: Principles with Applications | 6th Edition\n\n4 5 1 378 Reviews\n20\n1\nProblem 12PE\n\nThe pressure exerted by a phonograph needle on a record is surprisingly large. If the equivalent of 1.00 g is supported by a needle, the tip of which is a circle 0.200 mm in radius, what pressure is exerted on the record in N/m2 ?\n\nStep-by-Step Solution:\n\nStep-by-step solution Step 1 of 6 Force per unit area is known as pressure. Apply this concept to find the pressure of force that act on an area.\n\nStep 2 of 6\n\nStep 3 of 6\n\n##### ISBN: 9780130606204\n\nThe full step-by-step solution to problem: 12PE from chapter: 11 was answered by , our top Physics solution expert on 03/03/17, 03:53PM. Since the solution to 12PE from 11 chapter was answered, more than 713 students have viewed the full step-by-step answer. This textbook survival guide was created for the textbook: Physics: Principles with Applications, edition: 6. This full solution covers the following key subjects: pressure, Record, exerted, needle, circle. This expansive textbook survival guide covers 35 chapters, and 3914 solutions. The answer to “The pressure exerted by a phonograph needle on a record is surprisingly large. If the equivalent of 1.00 g is supported by a needle, the tip of which is a circle 0.200 mm in radius, what pressure is exerted on the record in N/m2 ?” is broken down into a number of easy to follow steps, and 45 words. Physics: Principles with Applications was written by and is associated to the ISBN: 9780130606204.\n\n## Discover and learn what students are asking\n\nCalculus: Early Transcendental Functions : Differential Equations: Separation of Variables\n?In Exercises 1-14, find the general solution of the differential equation. $$x^{2}+5 y \\frac{d y}{d x}=0$$\n\nUnlock Textbook Solution\n\nEnter your email below to unlock your verified solution to:\n\nThe pressure exerted by a phonograph needle on a record is"
] | [
null,
"https://studysoup.com/cdn/62cover_2418946",
null,
"https://studysoup.com/cdn/62cover_2418946",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.95380366,"math_prob":0.7599002,"size":958,"snap":"2022-40-2023-06","text_gpt3_token_len":228,"char_repetition_ratio":0.10587002,"word_repetition_ratio":0.0,"special_character_ratio":0.25887266,"punctuation_ratio":0.16243654,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95481074,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-03T04:56:36Z\",\"WARC-Record-ID\":\"<urn:uuid:02c8c6e3-5886-40a0-a24e-90669437c79b>\",\"Content-Length\":\"89464\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:999ddf3a-9439-40b1-b17f-a7e53a287ede>\",\"WARC-Concurrent-To\":\"<urn:uuid:4f50efed-4a93-477a-a693-dac0fd369a09>\",\"WARC-IP-Address\":\"54.189.254.180\",\"WARC-Target-URI\":\"https://studysoup.com/tsg/2166/physics-principles-with-applications-6-edition-chapter-11-problem-12pe\",\"WARC-Payload-Digest\":\"sha1:34LETPTKG5Q77NENMA2MWARLRY5PCV57\",\"WARC-Block-Digest\":\"sha1:2KJRQNIL2INO22GHP6XAW2BAB62AWJT6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337398.52_warc_CC-MAIN-20221003035124-20221003065124-00693.warc.gz\"}"} |
https://docs.scipy.org/doc/numpy-1.15.1/reference/generated/numpy.unique.html | [
"# numpy.unique¶\n\n`numpy.``unique`(ar, return_index=False, return_inverse=False, return_counts=False, axis=None)[source]\n\nFind the unique elements of an array.\n\nReturns the sorted unique elements of an array. There are three optional outputs in addition to the unique elements:\n\n• the indices of the input array that give the unique values\n• the indices of the unique array that reconstruct the input array\n• the number of times each unique value comes up in the input array\nParameters: ar : array_like Input array. Unless axis is specified, this will be flattened if it is not already 1-D. return_index : bool, optional If True, also return the indices of ar (along the specified axis, if provided, or in the flattened array) that result in the unique array. return_inverse : bool, optional If True, also return the indices of the unique array (for the specified axis, if provided) that can be used to reconstruct ar. return_counts : bool, optional If True, also return the number of times each unique item appears in ar. New in version 1.9.0. axis : int or None, optional The axis to operate on. If None, ar will be flattened. If an integer, the subarrays indexed by the given axis will be flattened and treated as the elements of a 1-D array with the dimension of the given axis, see the notes for more details. Object arrays or structured arrays that contain objects are not supported if the axis kwarg is used. The default is None. New in version 1.13.0. unique : ndarray The sorted unique values. unique_indices : ndarray, optional The indices of the first occurrences of the unique values in the original array. Only provided if return_index is True. unique_inverse : ndarray, optional The indices to reconstruct the original array from the unique array. Only provided if return_inverse is True. unique_counts : ndarray, optional The number of times each of the unique values comes up in the original array. Only provided if return_counts is True. New in version 1.9.0.\n\n`numpy.lib.arraysetops`\nModule with a number of other functions for performing set operations on arrays.\n\nNotes\n\nWhen an axis is specified the subarrays indexed by the axis are sorted. This is done by making the specified axis the first dimension of the array and then flattening the subarrays in C order. The flattened subarrays are then viewed as a structured type with each element given a label, with the effect that we end up with a 1-D array of structured types that can be treated in the same way as any other 1-D array. The result is that the flattened subarrays are sorted in lexicographic order starting with the first element.\n\nExamples\n\n```>>> np.unique([1, 1, 2, 2, 3, 3])\narray([1, 2, 3])\n>>> a = np.array([[1, 1], [2, 3]])\n>>> np.unique(a)\narray([1, 2, 3])\n```\n\nReturn the unique rows of a 2D array\n\n```>>> a = np.array([[1, 0, 0], [1, 0, 0], [2, 3, 4]])\n>>> np.unique(a, axis=0)\narray([[1, 0, 0], [2, 3, 4]])\n```\n\nReturn the indices of the original array that give the unique values:\n\n```>>> a = np.array(['a', 'b', 'b', 'c', 'a'])\n>>> u, indices = np.unique(a, return_index=True)\n>>> u\narray(['a', 'b', 'c'],\ndtype='|S1')\n>>> indices\narray([0, 1, 3])\n>>> a[indices]\narray(['a', 'b', 'c'],\ndtype='|S1')\n```\n\nReconstruct the input array from the unique values:\n\n```>>> a = np.array([1, 2, 6, 4, 2, 3, 2])\n>>> u, indices = np.unique(a, return_inverse=True)\n>>> u\narray([1, 2, 3, 4, 6])\n>>> indices\narray([0, 1, 4, 3, 1, 2, 1])\n>>> u[indices]\narray([1, 2, 6, 4, 2, 3, 2])\n```\n\nnumpy.trim_zeros\n\nnumpy.flip"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6467163,"math_prob":0.93935406,"size":3456,"snap":"2022-40-2023-06","text_gpt3_token_len":936,"char_repetition_ratio":0.1691773,"word_repetition_ratio":0.08798646,"special_character_ratio":0.29774305,"punctuation_ratio":0.19414894,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98060423,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-01T08:45:38Z\",\"WARC-Record-ID\":\"<urn:uuid:4fe896ef-0518-4a68-b4aa-7c2c6605b607>\",\"Content-Length\":\"16412\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cc57504a-0f5a-479b-bd5b-1a0ca5caaed6>\",\"WARC-Concurrent-To\":\"<urn:uuid:f408997c-614f-4fb4-9ca9-707e6f233282>\",\"WARC-IP-Address\":\"50.17.248.72\",\"WARC-Target-URI\":\"https://docs.scipy.org/doc/numpy-1.15.1/reference/generated/numpy.unique.html\",\"WARC-Payload-Digest\":\"sha1:MGVE5HYASZ6RKCCYNGLCQYK3PCRUJ3N6\",\"WARC-Block-Digest\":\"sha1:TQPXNTFYRKTQTXA6NMQB22NXFO5ULNTC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499919.70_warc_CC-MAIN-20230201081311-20230201111311-00057.warc.gz\"}"} |
https://iwaponline.com/jwcc/article/10/1/30/38986/A-mathematical-hypothesis-to-research-the-effects | [
"## Abstract\n\nPrevious research studies focused only on data of local air temperature and humidity, ignoring the water body itself, which cannot definitively answer the question of how the Three Gorges Reservoir's (TGR) water affects the local climate overall. To understand the effect of the TGR on the local climate quantitatively, this paper provides an original mathematical hypothesis and proves in theory there is only one way to calculate the transfer of heat and humidity between the TGR and the local air. Based on this mathematical hypothesis, a detailed research method to explore the effects of the TGR's heat and humidity on local climate was formed. A field investigation was conducted and a research site was selected in Chongqing. This study has determined the effects of the TGR's heating or cooling on the air during the measuring period. A mathematical model to assess the effects of heat and humidity from the TGR on local climate was set up. The final results based on the mathematical model show that the average air temperature decreased 0.67 K and the average moisture content increased 0.25 g/kg during the 24 hours measuring time for the area studied.\n\n## INTRODUCTION\n\nThe Three Gorges Project (TGP) on the Yangtze River is the world's largest hydroelectric power project. By 2010, when the TGP became fully operational, the water storage capacity of the Three Gorges Reservoir (TGR) was 3.93 × 1010 m3 with a normal pool level of 175 m, about 4.5% of the Yangtze's annual discharge (Xu & Milliman 2009). After water collected within the TGR, there was a significant increase in the water surface due to the effect of backwater, leading to a decrease in water flow speed in the reservoir (Yu 2011). Since the TGR began filling with water, some environmental consequences emerged, capturing the attention of researchers and environmental activists around the world. Contentious environmental issues surrounding the TGP have centered on water quality (Hu et al. 2014; Yue &Yuan 2016), fish population (Yi & Yang 2010; Wang & Bi 2016), sedimentation and downstream riverbed erosion (Jia & Shao 2010; Yang & Milliman 2014), geological instability (Peng & Niu 2014; Wang & Chen 2014), carrying capacity of the environment in the reservoir area (Li & Zhang 2016; Wu & Wang 2016) and the situation of the local climate.\n\nAfter water collected, as a typical river way reservoir, the TGR has an influence on the local climate. The TGR's effect on the local climate has attracted the interest of international scholars (Dai 2008; Chen & Zhang 2009a,2009b). Many comparative analyses and regional climate models have been discussed (Wu et al. 2006). Zhang et al. (2004) simulated the impact of the TGR on the local climate by using a simplified model, and the results showed the influence of the TGR on the climate was limited to 10 km. Gao et al. (2003, 2007) analyzed the changes in land use and land cover that influenced local and regional climates and said such effects could be studied with regional climate models. More specifically, by using the Penn State/NCAR MM5, Miller et al. (2005) conducted multiple layered experiments down to 10 km resolution for 8 weeks duration to simulate the effects of the TGR. The results showed that as a potential evaporating surface, the TGR could cool the surrounding area. Wu et al. (2006) used the regional climate model to simulate the effects of the TGR on the climate of the surrounding areas. The results showed the width and coverage of the TGR did not have significant influence on the local climate, except for cooling over the TGR water body in both June–August (summer) and December–February (winter). However, Sun & Qin (2002) analyzed the climatic features in the Three Gorges dam area. The results showed that warmer winter temperatures in the area were evident. It also suggested the warmer winter temperatures could possibly have some relationship with the water storage of the TGR. Yang & Chen (2002) used meteorological data from five local weather stations to study the climate characteristics in the Three Gorges dam area. The results also showed there were warmer winter temperatures in the dam area. Chen & Zhang (2009a, 2009b) used the temperature observation data of 33 weather stations in the TGR area during the period from 1961 to 2006 to analyze the climate characteristics of temperature changes since the water storage of the TGR began. The results showed that the expanding water surface area of the reservoir seemed to have an effect of increasing temperature during the winter and an effect of decreasing temperature during the summer.\n\nDue to the short time after the complete filling of the TGR (filling to 175 m normal pool mark) in 2010 and the limited availability of monitoring data, there may possibly be some discrepancies in research results for local climate data. Moreover, the cross-effects of ground, vegetation, buildings, and the possible impact of the TGR on the local climate made it difficult to distinguish the impact of the TGR itself (Xu & Tan 2013). Due to the complexity of the problem, different scholars have different opinions about the local climate effects of the TGR. Through the analysis of the references, it can be concluded that previous research studies only focused on air temperature and humidity changes, ignoring the water body itself. This raised the difficult question of why no one could, with certainty, distinguish the TGR water body's effect on the local climate from an integrated effect, because the TGR is only one of many factors effecting local climate. Based on the above analysis, this paper provides an original mathematical hypothesis and a detailed research methodology based on the hypothesis to explore the effects of the TGR's heat and humidity on the local climate.\n\n## MATHEMATICAL HYPOTHESIS FOR THE EFFECTS OF TGR'S HEAT AND HUMIDITY ON THE AIR\n\nThis paper provides the mathematical hypothesis named ‘sheep counting’, and uses the solution of the mathematical hypothesis to answer the question mentioned above, which is to distinguish the TGR water's effect on the local climate from the integrated effect with certainty. The mathematical hypothesis has proved in theory that there is only one way to analyze the effect of heat and humidity from the TGR on the local climate. The detailed description of the mathematical hypothesis is shown in Figure 1.\n\n### Description of the mathematical hypothesis\n\n• 1.\n\nThere are an infinite number of sheep on the grassland",
null,
", the sheep on the grassland are located outside of the sheepfolds.\n\n• 2.\n\nThere are multiple sheepfolds, and there are an infinite number of sheep in each sheepfold",
null,
"",
null,
", n is the number of sheepfolds.\n\n• 3.\n\nThe sheep on the grassland and in the sheepfolds are identical and there are no individual differences.\n\n• 4.\n\nEach sheepfold has only one gate. All the sheep in or out of the sheepfold must go through the gate, and the number of sheep in or out of the sheepfold is unknown",
null,
".\n\n### Question\n\nIn a cycle of 24 hours, what is the effect of a given sheepfold on the numerical change of sheep on the grassland?\n\n### Solutions\n\nStep (1): Obviously, it is not reasonable to consider the numerical change of sheep on the grassland itself, because the number of sheep on the grassland is infinite",
null,
", and it is impossible to know the base of the infinite number, and it is impossible to know the infinite number after a change, so it is impossible to determine the numerical change by considering the sheep change on the grassland. In addition, the numerical change of sheep on the grassland is not only from one given sheepfold",
null,
", but also from other sheepfolds, and the number of sheep in or out of each sheepfold is unknown (",
null,
",",
null,
",",
null,
"is the given number among",
null,
"), therefore it is impossible to solve the mathematical hypothesis by considering the numerical change of sheep on the grassland itself.\n\nStep (2): It is not feasible to consider the numerical change of sheep from a given sheepfold, because the number of sheep in a given sheepfold is also infinite (",
null,
",",
null,
"is the given number among",
null,
"), and the reason why it cannot be solved is the same as step (1).\n\nStep (3): Finally, the only solution of the mathematical hypothesis is the number of sheep in or out of the given sheepfold (",
null,
",",
null,
"is the given number among",
null,
"). If the number",
null,
"is determined, the mathematical hypothesis can be solved, and",
null,
"is the only and final solution for the mathematical hypothesis.\n\nIn the mathematical hypothesis of ‘sheep counting’, the sheep on the grassland represent the heat or humidity in the local air; the sheep in the sheepfolds represent the heat or humidity from ground, vegetation, buildings, the TGR's water, etc., which affect the local climate. The sheep in or out of sheepfold through the gate represents the heat or humidity transfer between the local air and ground, vegetation, buildings, the TGR's water, etc.\n\nThe mathematical hypothesis has proved in theory there is only one way to analyze the effects of heat and humidity from the TGR on the local climate for the first time. The heat and humidity of the local air (sheep on the grassland) are influenced by various factors (sheep in or out of the sheepfolds), such as ground, vegetation, the TGR's water, and buildings, etc. Therefore, according to the above theoretical analysis, if we want to quantitatively analyze the effects of heat and humidity from the TGR's water on the local air, we must take the TGR's ‘water–air’ interface (gate of the sheepfold) as the research object, and analyze the quantity of heat and humidity in or out of the ‘water–air’ interface hour by hour (sheep in or out of the sheepfold through the gate), and then calculate the sum of heat and humidity for a 24-hour cycle. Finally, we can determine the quantitative data of heat and humidity and make the conclusions of cooling or heating, drying or wetting effects of the TGR's water on the local climate.\n\n## RESEARCH METHOD\n\n### Heat and moisture transfer on the interface of ‘water–air’\n\nHeat transfer between water and air includes sensible heat and latent heat, which are caused by temperature differences and moisture pressure differences respectively. Figure 2 depicts the heat and moisture transfers between the TGR's water and local air. The sensible heat is mainly determined by the temperature difference of water surface and local air, and latent heat mainly depends on the differences of water surface saturated vapor pressure and vapor pressure in the air. The sensible heat is directly related to water and air temperature. Moisture transfer is an important source of changing air humidity.\n\nIn addition to the exchange of sensible heat and latent heat between the TGR's water and local air, the process of energy exchange on the ‘water–air’ interface also includes the long-wave radiation between the TGR's water and the local atmosphere. The diagram of each part of the energy is shown in Figure 3.\n\nThe total heat flux of ‘water–air’ interface can be expressed by heat flux from water to air",
null,
"and from the air to water",
null,
". The net heat flux is",
null,
": when",
null,
"is from water to the air, it is positive, otherwise negative. When H is from air to water, it is positive, otherwise negative. Through the comparison of",
null,
"and",
null,
", the effects of cooling or heating can be precisely determined. When",
null,
", the TGR's water has a heating effect on the local air; when",
null,
", the TGR's water has a cooling effect on the local air. So, if",
null,
", it means the net heat flux is from the air to water. If",
null,
", it means the net heat flux is from water to air. The specific items are explained as follows:",
null,
"is the long-wave radiation from the atmosphere that is projected to the water surface W/m2 (Weng & Sun 1993);",
null,
"is the air temperature, K; e is the vapor pressure,",
null,
"; n if it is sunny,",
null,
"; if it is cloudy,",
null,
";",
null,
"is the reflected long-wave radiation from the water surface,",
null,
", W/m2;",
null,
"is the reflection coefficient of the water surface: where",
null,
"is the long-wave radiation of the water surface, W/m2;",
null,
"is the long-wave emissivity;",
null,
"is the Stefan–Boltzmann constant;",
null,
"is the water surface temperature, K.\nThe sensible heat",
null,
", latent heat",
null,
"and moisture transfer",
null,
"between the TGR's water and the local air can be calculated by bulk method (Kondo 1992): where H is the sensible heat flux of ‘water–air’ interface, W/m2; E is the moisture flux of ‘water–air’ interface, g/(m2.s);",
null,
"is the latent heat flux of ‘water–air’ interface, W/m2;",
null,
"is air density, kg/m3 (Zhao 2008);",
null,
"is air specific heat, J/kg.°C;",
null,
"is wind speed, m/s;",
null,
",",
null,
"are bulk parameters for sensible heat and latent heat: where l is latent heat,",
null,
", kJ/kg (Hannah et al. 2004);",
null,
"is saturated moisture content under the condition of temperature",
null,
", g/kg (Lian 2006);",
null,
"is moisture content over the water surface, g/kg, which can be calculated by the following formula: where",
null,
"is saturated moisture pressure under the condition of temperature",
null,
",",
null,
";",
null,
"is air relative humidity, %; p is moisture pressure,",
null,
";",
null,
"is local atmospheric pressure,",
null,
"(www.weather.com.cn/).\n\n## FIELD MEASUREMENTS\n\n### Measuring area selection\n\nThe measuring area was selected in Chongqing, one of the municipalities governed by the Chinese central government, which is located in the upper region of the TGR (see Figure 4). The measuring area chosen is relatively open and flat to reduce the influence of the nearby topography. Because the measurement of heat and moisture transfer on ‘water–air’ interface is a complex process, it is influenced by the factors of long-wave radiation, water temperature, air temperature, air vapor, and wind speed over the water, etc.\n\n### Measurement process\n\nThe measurements were carried out on 22–23 June 2015. To analyze the effects of heating or cooling, drying or wetting of the TGR's water on the local air, the measuring period needed to be at least 24 hours, which is the shortest possible measuring cycle. For the measurement in this paper, the corresponding measuring cycle was 24 hours and the time interval for the measurements was 1 hour. The measured parameters included: water temperature, solar radiation, air temperature, air relative humidity and wind speed, etc. The local atmospheric pressure was obtained from the Central Weather Bureau. By utilizing the above mathematical hypothesis and research method, the sensible heat, latent heat, long-wave radiation and moisture transfer between the TGR's water and the local air could be analyzed. The instruments used in the field measurements included an infrared radiation thermometer, an environmental supervision instrument, a GPS apparatus, etc. The type of infrared radiation thermometer was a MS6530, which is used to measure water temperature, with a measurement range of −32–535 °C, an accuracy of ±0.5% and a response time of 0.5 second. The type of environmental supervision instrument was a KANOMAX6531. The instrument was used to measure air temperature, relative humidity, and wind speed. For air temperature, the measurement range is −20–70 °C, and the accuracy is ±0.5 °C. For relative humidity, the measurement range is 2–98%, and the accuracy is ±2%. For wind speed, the measurement range is 0.01–30 m/s, and the accuracy is ±2%. The type of GPS apparatus is a N600, which was used to record the altitude at different locations.\n\n## RESULTS AND DISCUSSION\n\n### Effects of heat and humidity on the ‘water–air’ interface\n\nThe measuring period was 24 consecutive hours on 22–23 June 2015. Figure 5 shows the flux curve of sensible heat and latent heat. The transfer direction of heat flux was different during the entire measuring period. The sensible heat flux is always from air to water. However, the latent heat flux can be from water to air or from air to water depending on time. If the entire heat flux during the measuring cycle were totaled, the results would provide the exchange of sensible heat flux on the ‘water–air’ interface. The data for sensible heat flux was 403 KJ/m2.d and the data for latent heat flux was 81 KJ/m2.d. According to the previous definition of transfer direction, the transfer direction of sensible heat and latent heat were opposite. Through the comparison of sensible heat and latent heat, the heat transfer direction was from water to air during the measuring period and the sum data of heat flux was 322 KJ/m2.d.\n\nFigure 6 shows the curves of long-wave radiation. It can be concluded that the fluctuation of long-wave radiation emitted from the water surface was small, which is related to the stable characteristics of the water temperature. The range of long-wave radiation emitted from the water surface was 444.6–453 W/m2, with the largest gap of 8.4 W/m2, with a mean value of 447.3 W/m2. The range of long-wave radiation from the atmosphere was 456.4–500.3 W/m2, with the largest gap of 43.8 W/m2, with a mean value of 473.9 W/m2.\n\nConsidering the sensible heat, latent heat and long-wave radiation, the final heat transfer can be analyzed on the ‘water–air’ interface. Figure 7 shows the curves of the final heat flux from water to air",
null,
"and the final heat flux from air to water",
null,
"on the ‘water–air’ interface. From the curves of final heat flux during this measuring cycle, the range of",
null,
"was 328.7–349.8 W/m2 with a mean value of 337.3 W/m2; and the range of",
null,
"was 424.8–472.6 W/m2 with a mean value of 445.6 W/m2. In this paper, the shortest cycle of 24 hours was used as the measuring cycle, so the sum of heat flux in the 24 hour cycle was the final net heat flux:\n\nTherefore, the conclusion reached was the final heat flux from water to air was smaller than that from air to water during this 24 hour cycle, which means the TGR's water had a cooling effect on the air.\n\nSimilarly, it was necessary to analyze the moisture transfer, which occurred on the ‘water–air’ interface. From Figure 8, we found the moisture content of saturated air near the water surface",
null,
"crossed with the moisture content in the air",
null,
", which means the moisture transfer can be from water to air and also can be from air to water. The range of",
null,
"was 22.9–25.2 g/Kg with a mean value of 23.7 g/Kg. The range of",
null,
"was 21.74–25.11 g/Kg with a mean value of 23.36 g/Kg. The range of moisture transfer was 0.374–9.88 g/m2 · h with a mean value of 1.42 g/m2 · h. By analyzing the above, the conclusion was that the moisture transfer direction was from water to the air during this measuring cycle. In other words, the TGR's water had a wetting effect on the local air and the final quantity of moisture transfer was: ΣD = 34 g/m2 · d.\n\nFrom the data of heat and moisture flux on the ‘water–air’ interface, this paper, for the first time, distinguished the TGR's effect on the local climate from the integrated effect with certainty.\n\n### Assessment of heat and humidity from the TGR on local climate\n\n#### Heat and moisture transfer for selected local area\n\nThrough the previous field investigation, the effects of heat and humidity were known, but how is the change of the local air temperature and moisture content measured in quantity? In order to assess the effects of heat and humidity from the TGR on local climate, the areas affected by the TGR should be ascertained. As the effects of heat and humidity from the TGR on the local area are limited, so the area affected by the TGR is also constrained. In this paper, the local area was selected with a width of 2.5 km from the edge of the TGR and a height of 3 km (Figure 9) (Xu 2003; Li 2008; Liu 2010). The total horizontal area for the selected area is 229.8 km2.\n\nWithin the selected local area, the water surface area of the TGR needed to be known. As the form of the water surface of the TGR is not uniform, the different sections were measured, and the total area was determined from the sum of all the sections. Through measuring the TGR's width and the length in each section, the total water surface area of the TGR was obtained (Figure 10). The red points in Figure 10 were the measuring points for each section. All the surface area measurements were carried out at the same time corresponding to the measurement of heat and humidity. The total water surface area was calculated to be 18.3 km2.\n\nBased on the previous investigation of heat and moisture transfer from the ‘water–air’ surface, the total effects of heat and moisture from the TGR on the local area can be calculated (Table 1).\n\nTable 1\n\nTotal heat and moisture transfer for the selected local area\n\nTimeHeat transfer (KJ/m2.h)Moisture transfer (g/m2.h)Total heat transfer",
null,
"(KJ/ h)Total moisture transfer",
null,
"(Kg/ h)\n10:00–11:00 26.44 3.73 4.84 × 108 ↓ 6.84 × 104 ↑\n11:00–12:00 37.67 0.48 6.90 × 108 ↓ 8.82 × 103 ↑\n12:00–13:00 40.16 6.67 7.36 × 108 ↓ 1.22 × 105 ↑\n13:00–14:00 30.93 12.86 5.67 × 108 ↓ 2.36 × 105 ↑\n14:00–15:00 74.08 9.52 1.34 × 109 ↓ 1.74 × 105 ↑\n15:00–16:00 86.85 6.18 1.59 × 109 ↓ 1.13 × 104 ↓\n16:00–17:00 83.72 1.76 1.53 × 109 ↓ 3.22 × 104 ↓\n17:00–18:00 84.91 1.86 1.56 × 109 ↓ 3.40 × 104 ↓\n18:00–19:00 52.06 1.58 9.54 × 108 ↓ 2.89 × 104 ↑\n19:00–20:00 38.95 5.26 7.14 × 108 ↓ 9.64 × 104 ↑\n20:00–21:00 67.35 1.18 1.23 × 109 ↓ 2.17 × 104 ↓\n21:00–22:00 56.19 2.38 1.03 × 109 ↓ 4.37 × 104 ↓\n22:00–23:00 31.45 9.39 5.76 × 108 ↓ 1.72 × 105 ↑\n23:00–00:00 28.41 2.13 5.20 × 108 ↓ 3.91 × 104 ↑\n00:00–1:00 34.41 2.21 6.30 × 108 ↓ 4.06 × 104 ↓\n1:00–2:00 18.71 1.83 3.43 × 108 ↓ 3.35 × 104 ↑\n2:00–3:00 25.26 0.37 4.63 × 108 ↓ 6.85 × 103 ↓\n3:00–4:00 20.80 0.78 3.81 × 108 ↓ 1.43 × 104 ↑\n4:00–5:00 21.75 0.20 3.98 × 108 ↓ 3.58 × 103 ↓\n5:00–6:00 17.12 0.67 3.14 × 108 ↓ 1.23 × 104 ↑\n6:00–7:00 7.17 4.42 1.31 × 108 ↓ 8.11 × 104 ↑\n7:00–8:00 15.87 1.40 2.91 × 108 ↓ 2.57 × 104 ↑\n8:00–9:00 25.03 0.78 4.59 × 108 ↓ 1.42 × 104 ↓\n9:00–10:00 60.42 9.88 1.11 × 109 ↓ 1.81 × 105 ↓\nTimeHeat transfer (KJ/m2.h)Moisture transfer (g/m2.h)Total heat transfer",
null,
"(KJ/ h)Total moisture transfer",
null,
"(Kg/ h)\n10:00–11:00 26.44 3.73 4.84 × 108 ↓ 6.84 × 104 ↑\n11:00–12:00 37.67 0.48 6.90 × 108 ↓ 8.82 × 103 ↑\n12:00–13:00 40.16 6.67 7.36 × 108 ↓ 1.22 × 105 ↑\n13:00–14:00 30.93 12.86 5.67 × 108 ↓ 2.36 × 105 ↑\n14:00–15:00 74.08 9.52 1.34 × 109 ↓ 1.74 × 105 ↑\n15:00–16:00 86.85 6.18 1.59 × 109 ↓ 1.13 × 104 ↓\n16:00–17:00 83.72 1.76 1.53 × 109 ↓ 3.22 × 104 ↓\n17:00–18:00 84.91 1.86 1.56 × 109 ↓ 3.40 × 104 ↓\n18:00–19:00 52.06 1.58 9.54 × 108 ↓ 2.89 × 104 ↑\n19:00–20:00 38.95 5.26 7.14 × 108 ↓ 9.64 × 104 ↑\n20:00–21:00 67.35 1.18 1.23 × 109 ↓ 2.17 × 104 ↓\n21:00–22:00 56.19 2.38 1.03 × 109 ↓ 4.37 × 104 ↓\n22:00–23:00 31.45 9.39 5.76 × 108 ↓ 1.72 × 105 ↑\n23:00–00:00 28.41 2.13 5.20 × 108 ↓ 3.91 × 104 ↑\n00:00–1:00 34.41 2.21 6.30 × 108 ↓ 4.06 × 104 ↓\n1:00–2:00 18.71 1.83 3.43 × 108 ↓ 3.35 × 104 ↑\n2:00–3:00 25.26 0.37 4.63 × 108 ↓ 6.85 × 103 ↓\n3:00–4:00 20.80 0.78 3.81 × 108 ↓ 1.43 × 104 ↑\n4:00–5:00 21.75 0.20 3.98 × 108 ↓ 3.58 × 103 ↓\n5:00–6:00 17.12 0.67 3.14 × 108 ↓ 1.23 × 104 ↑\n6:00–7:00 7.17 4.42 1.31 × 108 ↓ 8.11 × 104 ↑\n7:00–8:00 15.87 1.40 2.91 × 108 ↓ 2.57 × 104 ↑\n8:00–9:00 25.03 0.78 4.59 × 108 ↓ 1.42 × 104 ↓\n9:00–10:00 60.42 9.88 1.11 × 109 ↓ 1.81 × 105 ↓\n\nNote: water surface area = 18.3 km2.\n\n#### Mathematical model of assessment of heat and humidity from the TGR on local climate\n\nHeat and moisture transfer was through the water–air interface, and the heat and moisture is from water surface to air, changing the air temperature and air moisture content. With the movement of air, the effects of heat and moisture from the TGR expand to the local area. In order to assess the effects of heat and moisture from the TGR in the selected area, a mathematical model was established to calculate the change of air temperature and moisture content. The horizontal distribution of air temperature and moisture content is assumed to be even, and is changed only with the height (Sheng 2003). When there is a layer at the height z from the ground and there is an infinite small thickness",
null,
", then the energy within the layer",
null,
"is: where T is air temperature within the layer",
null,
",",
null,
"; A is surface area for the selected local area,",
null,
".\nThe air can be regarded as the normal gas, then: The atmosphere pressure is changed with height z, then: Combined with Equation (13), then: Air temperature is also changed with height z, then: where",
null,
"is air temperature near the ground; β = 0.65 K/100 m.\nIntegrate Equation (17), then: When",
null,
",",
null,
", the c can be obtained:\nIntegrate Equation (22) from the ground to the top of the selected area, then: where",
null,
"is the air temperature near the ground outside of the selected area, assuming this air temperature has not been affected by the TGR;",
null,
"is the total energy in the research area under the assumption that there is no effect by the TGR.\nBased on Equation (23), the total energy",
null,
"in the research area can be calculated under the assumption that there is no effect by the TGR. According to the",
null,
"in Table 1, the total energy",
null,
"in the research area affected by the TGR can be calculated by: and",
null,
"can also be expressed by: where",
null,
",",
null,
"is the air temperature and pressure near the ground within the research area with the effect of the TGR: Combined with Equations (24) and (25), then: According to Equation (26), the air temperature of",
null,
"affected by the TGR within the research area can be calculated.\nThe final change of air temperature can be expressed by: Figure 11 shows the air temperature change caused by the TGR, corresponding to the period of the measuring cycle. According to the distribution of the temperature change, the average air temperature decreased 0.67 K in the period of 24 hours within the selected area.\n\nThe following is the mathematical model of the assessment of air humidity.\n\nAccording to the relationship between moisture content and pressure along the different heights (Zhang 1994), the moisture content at height z can be expressed as follows: where",
null,
"is the air moisture content near the ground that is outside of the selected area, assuming this air moisture content has not been affected by the TGR.\nCombining Equations (28)–(30): where W is the total moisture from the ground to the top of the selected area under the assumption that there is no effect from the TGR.\nAccording to the total moisture transfer",
null,
"in Table 1, the moisture",
null,
"from the ground to the top of the selected area affected by the TGR can be determined:\nAccording to Equation (32), the",
null,
"under the effect of the TGR can be calculated. Then:\n\nThe distribution of",
null,
"is presented in Figure 12. The average moisture content increased 0.25 g/kg in the period of 24 hours within the researched area.\n\n## CONCLUSIONS\n\nThis paper presents a mathematical hypothesis which, for the first time has proved, in theory, that there is only one way to analyze the effects of heat and humidity from the TGR on the local climate. This paper provides the detailed methodology utilized, based on mathematical hypothesis, to examine the effects of heat and humidity from the TGR on the local climate. Through field investigation, the effects of the transfers of sensible heat, latent heat, long-wave radiation, moisture, etc. on the interface of the TGR's water and air were analyzed. The final heat flux from water to air was less than that from air to water during the measuring period. The results showed the TGR's water had a cooling effect on the air during the measuring period, and the TGR's water had a wetting effect on the air during the measuring period. From the data of the mathematical model of assessment, the average air temperature decreased 0.67 K and average moisture content increased 0.25 g/kg in the period of 24 hours within the selected area. Since the time the TGR has been in full operation with a normal pool level of 175 m has been very short, more experiential data needs to be collected to better understand the effect of the TGR on the local climate. This paper has primarily focused on the mathematical hypothesis and new research methodology, to explain the mechanism of the effect of the TGR on the local climate. The long term effects of the TGR on the local climate need continued research. This calls for a long term project to be undertaken.\n\n## ACKNOWLEDGEMENTS\n\nThe authors would like to thank the National Natural Science Foundation of China (51578086; 51408079; 5151101134); Chongqing Fundamental and Advanced Research Projects (CSTC2014jcyjA90018) and Research on the Key Technology and Demonstration of Improving Indoor Physical Environment in Existing Public Buildings (2016YFC0700705) for their financial support, without which this research paper would not have been possible.\n\n## REFERENCES\n\nREFERENCES\nChen\nX. Y.\n&\nZhang\nQ.\n2009a\nRegional climate change over Three Gorges reservoir area\n.\nResour. Environ. Yangtze Basin\n18\n(\n1\n),\n47\n51\n.\nChen\nX. Y.\n&\nZhang\nQ.\n2009b\nRegional Climate of the Three Gorges Project (1961–2007)\n.\nMeteorology Press\n,\nBeijing\n.\nGao\nX. J.\n,\nLuo\nY.\n,\nLin\nW. T.\n,\nZhao\nZ. C.\n&\nGiorgi\nF.\n2003\nSimulation of effects of landuse change on climate in China by a regional climate model\n.\n20\n(\n4\n),\n583\n592\n.\nGao\nX. J.\n,\nZhang\nD. F.\n,\nChen\nZ. X.\n,\nPal\nJ. S.\n&\nGiorgi\nF.\n2007\nLand use effects on climate in China as simulated by a regional climate model\n.\nSci. China D\n50\n(\n4\n),\n620\n628\n.\nHannah\nD. M.\n,\nMalcolm\nI. A.\n,\nSoulsby\nC.\n&\nYoungson\nA. F.\n2004\nHeat exchanges and temperatures within a salmon spawning stream in the Cairngorms, Scotland: seasonal and sub-seasonal dynamics\n.\nRiver Res. Appl.\n20\n(\n6\n),\n635\n652\n.\nKondo\nJ.\n1992\nTransfer coefficients of water surface\n.\nHydrol. Water Resour.\n5\n(\n6\n),\n50\n55\n.\nLi\nS. Y.\n2008\nAnalysis of microclimate effects of water body in a city\n.\nChin. J. Atmos. Sci.\n32\n(\n3\n),\n552\n560\n.\nLian\nL. M.\n2006\nThermodynamics\n, 5th edn.\nChina Architecture & Building Press\n,\nBeijing\n.\nLiu\nG. W.\n1997\nAtmospheric Processes of Hydrological Cycle\n.\nBeijing Science Press\n,\nBeijing\n.\nLiu\nH. N.\n2010\nThe numeric-simulated study on the local climate effect of reservoir in mountain area\n.\nJ. Yunnan Uni.\n32\n(\n2\n),\n171\n176\n.\nMiller\nN. L.\n,\nJin\nJ.\n&\nTsang\nC. F.\n2005\nLocal climate sensitivity of the Three Gorges dam\n.\nGeophys. Res. Lett.\n32\n,\nL16704\n.\nSheng\nP. X.\n2003\nAtmospheric Physics\n.\nBeijing University Press\n,\nBeijing\n.\nSun\nS. X.\n&\nQin\nC. P.\n2002\nClimatic features in Three Gorges dam area\n.\nChina Three Gorges Const.\n24\n(\n3\n),\n22\n25\n.\nWeng\nD. M.\n&\nSun\nZ. A.\n1993\nClimatological study on downward atmospheric radiation in China\n.\nJ. Nanjing Inst. Meteorol.\n16\n(\n1\n),\n1\n7\n.\nWu\nL. G.\n,\nZhang\nQ.\n&\nJiang\nZ. H.\n2006\nThree Gorges dam affects regional precipitation\n.\nGeophys. Res. Lett.\n33\n(\n18\n),\n38\n42\n.\nXu\nM.\n2003\nNumerical modeling and verification of structures of the boundary layer over Beijing area\n.\nJ. Appl. Meteorol. Sci.\n13\n(\n1\n),\n1\n8\n.\nYang\nJ. G.\n&\nChen\nZ. H.\n2002\nRegional climate characteristics in Three Gorges dam area\n.\nMeteorol. Sci. Technol.\n30\n(\n5\n),\n292\n299\n.\nYang\nS. L.\n&\nMilliman\nJ. D.\n2014\nDownstream sedimentary and geomorphic impacts of the Three Gorges dam on the Yangtze River\n.\nEarth Sci. Rev.\n138\n,\n469\n486\n.\nZhang\nX. W.\n1994\nThermo-diffusion effect of vapor in atmosphere\n.\nPlateau Meteorol.\n13\n(\n1\n),\n94\n101\n.\nZhang\nH. T.\n,\nZhu\nC. H.\n&\nQiang\nZ.\n2004\nNumerical modeling of microclimate effects produced by the formation of the Three Gorges reservoir\n.\nResour. Environ. Yangtze Basin\n13\n(\n2\n),\n133\n137\n.\nZhao\nR. Y.\n2008\nAir Conditioning\n, 4th edn.\nChina Architecture & Building Press\n,\nBeijing\n."
] | [
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if01.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if02.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if92.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if03.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if04.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if05.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if06.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if07.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if08.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if09.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if10.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if11.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if12.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if13.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if14.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if15.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if16.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if17.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if18.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if19.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if20.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if21.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if22.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if23.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if24.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if25.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if26.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if27.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if28.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if29.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if30.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if31.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if32.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if33.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if34.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if35.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if36.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if37.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if38.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if39.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if40.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if41.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if42.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if43.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if44.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if45.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if46.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if47.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if48.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if49.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if50.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if51.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if52.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if53.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if54.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if55.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if56.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if57.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if58.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if59.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if60.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if61.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if62.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if63.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if64.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if65.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if66.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if67.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if90.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if91.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if90.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if91.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if68.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if69.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if70.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if71.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if72.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if73.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if74.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if75.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if76.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if77.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if78.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if79.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if80.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if81.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if82.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if83.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if84.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if85.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if86.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if87.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if88.gif",
null,
"https://iwa.silverchair-cdn.com/iwa/content_public/journal/jwcc/10/1/10.2166_wcc.2018.067/2/m_jwc-d-17-00067if89.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91783994,"math_prob":0.93625426,"size":22669,"snap":"2020-24-2020-29","text_gpt3_token_len":5951,"char_repetition_ratio":0.17321862,"word_repetition_ratio":0.26358974,"special_character_ratio":0.3079536,"punctuation_ratio":0.13859724,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95677584,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168,169,170,171,172,173,174,175,176,177,178,179,180,181,182,183,184,185,186,187,188],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,4,null,4,null,4,null,4,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-27T05:15:10Z\",\"WARC-Record-ID\":\"<urn:uuid:af984b7d-e320-42bf-b196-c61f71c8b5cb>\",\"Content-Length\":\"448651\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:396d0c89-b342-41de-a490-b7b58e9eda7a>\",\"WARC-Concurrent-To\":\"<urn:uuid:f547b142-1377-40ec-8f60-5a00482579e6>\",\"WARC-IP-Address\":\"209.135.208.83\",\"WARC-Target-URI\":\"https://iwaponline.com/jwcc/article/10/1/30/38986/A-mathematical-hypothesis-to-research-the-effects\",\"WARC-Payload-Digest\":\"sha1:35ZAMBSNSXJLZMU7JD4HYCW7SLYH7QAI\",\"WARC-Block-Digest\":\"sha1:BR3S3GXCCWQ2EWPV6AEUIN6IPBEQX2BB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347392141.7_warc_CC-MAIN-20200527044512-20200527074512-00094.warc.gz\"}"} |
https://www.bookdown.org/rwnahhas/RMPH/mi-blr.html | [
"## 9.7 Logistic regression after MI\n\nThe syntax for logistic regression after MI is similar to linear regression after MI, except that now glm() is used instead of lm().\n\nExample 9.2: Using the NSDUH 2019 teaching dataset (see Appendix A.5), what is the association between lifetime marijuana use (mj_lifetime) and age at first use of alcohol (alc_agefirst), adjusted for age (demog_age_cat6), sex (demog_sex), and income (demog_income)? Use MI to handle missing data.\n\nNOTE: This example uses the MAR dataset created for the illustration in Section 9.2 (nsduh_mar_rmph.RData). Those who never used alcohol were removed from the dataset, since we do not want to impute missing ages for them. Also, a random subset of the values for each variable were set to missing, with the probability of missingness for each variable depending on all the other variables but not the variable itself.\n\nFirst, load the data and view the extent of the missing data.\n\nload(\"Data/nsduh_mar_rmph.RData\")\nsummary(nsduh_mar)\n## mj_lifetime alc_agefirst demog_age_cat6 demog_sex demog_income\n## No :342 Min. : 3.0 18-25: 99 Male :376 Less than $20,000:122 ## Yes :487 1st Qu.:15.0 26-34:118 Female:397$20,000 - $49,999:226 ## NA's: 14 Median :17.0 35-49:223 NA's : 70$50,000 - $74,999:116 ## Mean :17.6 50-64:191$75,000 or more :342\n## 3rd Qu.:20.0 65+ :180 NA's : 37\n## Max. :45.0 NA's : 32\n## NA's :59\n\nNext, fit the imputation model.\n\nimp.nsduh <- mice(nsduh_mar,\nseed = 3,\nm = nimpute(nsduh_mar),\nprint = F)\nimp.nsduh\n## Class: mids\n## Number of multiple imputations: 22\n## Imputation methods:\n## mj_lifetime alc_agefirst demog_age_cat6 demog_sex demog_income\n## \"logreg\" \"pmm\" \"polyreg\" \"logreg\" \"polyreg\"\n## PredictorMatrix:\n## mj_lifetime alc_agefirst demog_age_cat6 demog_sex demog_income\n## mj_lifetime 0 1 1 1 1\n## alc_agefirst 1 0 1 1 1\n## demog_age_cat6 1 1 0 1 1\n## demog_sex 1 1 1 0 1\n## demog_income 1 1 1 1 0\n\nFinally, fit the logistic regression on the imputed datasets and pool the results.\n\nfit.imp.glm <- with(imp.nsduh,\nglm(mj_lifetime ~ alc_agefirst + demog_age_cat6 +\ndemog_sex + demog_income, family = binomial))\n# summary(pool(fit.imp.glm), conf.int = T)\nround.summary(fit.imp.glm, digits=3)\n## estimate std.error statistic df p.value 2.5 % 97.5 %\n## (Intercept) 6.434 0.615 10.461 592.6 0.000 5.226 7.642\n## alc_agefirst -0.275 0.029 -9.386 513.9 0.000 -0.333 -0.218\n## demog_age_cat626-34 -0.251 0.339 -0.738 711.1 0.461 -0.917 0.416\n## demog_age_cat635-49 -0.809 0.305 -2.655 694.5 0.008 -1.407 -0.211\n## demog_age_cat650-64 -0.790 0.311 -2.541 639.8 0.011 -1.401 -0.179\n## demog_age_cat665+ -1.307 0.314 -4.157 673.5 0.000 -1.925 -0.690\n## demog_sexFemale -0.045 0.176 -0.255 393.3 0.799 -0.391 0.301\n## demog_income$20,000 -$49,999 -0.770 0.275 -2.795 687.3 0.005 -1.310 -0.229\n## demog_income$50,000 -$74,999 -0.204 0.314 -0.650 719.9 0.516 -0.821 0.412\n## demog_income$75,000 or more -0.574 0.261 -2.202 686.0 0.028 -1.086 -0.062 Add exponentiate = T to summary() or round.summary() to compute odds ratios, but be careful interpreting the results as only the estimate and confidence interval are exponentiated; the standard error in the table is still the standard error of the un-exponentiated regression coefficient. As such, to avoid confusion, extract just the estimate, confidence interval, and p-value when exponentiating (and drop the first row since the exponentiated intercept is not of interest). # summary(pool(fit.imp.glm), conf.int = T, # exponentiate = T)[-1, c(\"term\", \"estimate\", \"2.5 %\", \"97.5 %\", \"p.value\")] round.summary(fit.imp.glm, digits = 3, exponentiate = T)[-1, c(\"estimate\", \"2.5 %\", \"97.5 %\", \"p.value\")] ## estimate 2.5 % 97.5 % p.value ## alc_agefirst 0.759 0.717 0.804 0.000 ## demog_age_cat626-34 0.778 0.400 1.515 0.461 ## demog_age_cat635-49 0.445 0.245 0.810 0.008 ## demog_age_cat650-64 0.454 0.246 0.836 0.011 ## demog_age_cat665+ 0.271 0.146 0.502 0.000 ## demog_sexFemale 0.956 0.677 1.351 0.799 ## demog_income$20,000 - $49,999 0.463 0.270 0.795 0.005 ## demog_income$50,000 - $74,999 0.815 0.440 1.511 0.516 ## demog_income$75,000 or more 0.563 0.337 0.940 0.028\n\n### 9.7.1 Multiple degree of freedom tests\n\nmi.anova() does not work for logistic regression models, but D1() does. Fit reduced models, each omitting one categorical variable that has more than 2 levels and then use D1() to compare the full and reduced models using a Wald test or D3() for a likelihood ratio test.\n\nFor example, to get a Type 3 test for demog_age_cat6 in Example 9.2:\n\n# Fit reduced model\nfit.imp.glm.age <- with(imp.nsduh,\ndemog_sex + demog_income, family = binomial))\n\n# Compare full and reduced models\n# Wald test\nsummary(D1(fit.imp.glm, fit.imp.glm.age))\n##\n## Models:\n## model formula\n## 1 mj_lifetime ~ alc_agefirst + demog_age_cat6 + demog_sex + demog_income\n## 2 mj_lifetime ~ alc_agefirst + demog_sex + demog_income\n##\n## Comparisons:\n## test statistic df1 df2 dfcom p.value riv\n## 1 ~~ 2 5.886 4 794.7 833 0.0001138 0.06877\n##\n## Number of imputations: 22 Method D1\n# LR test\nsummary(D3(fit.imp.glm, fit.imp.glm.age))\n##\n## Models:\n## model formula\n## 1 mj_lifetime ~ alc_agefirst + demog_age_cat6 + demog_sex + demog_income\n## 2 mj_lifetime ~ alc_agefirst + demog_sex + demog_income\n##\n## Comparisons:\n## test statistic df1 df2 dfcom p.value riv\n## 1 ~~ 2 6.191 4 19760 833 0.00005653 0.06634\n##\n## Number of imputations: 22 Method D3\n\n### 9.7.2 Predictions\n\nPrediction proceeds in almost the same way as described in Section 9.6.2 – predict on each imputed dataset and then pool the results using Rubin’s rules. The one change is that type = \"response\" is added to get predictions on the probability scale.\n\nExample 9.2 (continued): What is the predicted probability (and standard error) of lifetime marijuana use for someone who first used alcohol at age 13 years, is currently age 30 years, male, and has an annual income of less than $20,000? # Prediction data.frame # Code below works if NEWDAT has only 1 row NEWDAT <- data.frame(alc_agefirst = 13, demog_age_cat6 = \"26-34\", demog_sex = \"Male\", demog_income = \"Less than$20,000\")\n\n# Get prediction for each analysis\nPREDLIST <- lapply(fit.imp.glm$analyses, predict, newdata=NEWDAT, se.fit=T, type = \"response\") # Extract mean and variance from each analysis MEAN <- VAR <- rep(NA, length(fit.imp.glm$analyses))\nfor(i in 1:length(MEAN)) {\nMEAN[i] <- PREDLIST[[i]]$fit VAR[ i] <- (PREDLIST[[i]]$se.fit)^2\n}\n\n# Apply Rubin's rules\nPRED.POOLED <- pool.scalar(MEAN,\nVAR,\nnrow(imp.nsduh$data)) # Extract the pooled mean PRED.POOLED$qbar\n## 0.9309\n# Extract the pooled standard error\nsqrt(PRED.POOLED\\$t)\n## 0.02254"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.62313443,"math_prob":0.9175032,"size":6628,"snap":"2023-40-2023-50","text_gpt3_token_len":2287,"char_repetition_ratio":0.147343,"word_repetition_ratio":0.10139165,"special_character_ratio":0.41264334,"punctuation_ratio":0.2238806,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9721806,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-03T07:53:50Z\",\"WARC-Record-ID\":\"<urn:uuid:c567ab30-20fc-4168-952d-b8710e757c76>\",\"Content-Length\":\"88130\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a45311e9-6b40-48ba-8263-a20905d4ba27>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8a074af-90a4-44c3-b001-6de120e7fda5>\",\"WARC-IP-Address\":\"34.194.247.74\",\"WARC-Target-URI\":\"https://www.bookdown.org/rwnahhas/RMPH/mi-blr.html\",\"WARC-Payload-Digest\":\"sha1:N3IH7YHLQLIWY7NCJJ7VGA65LXAEUMAS\",\"WARC-Block-Digest\":\"sha1:J4ZKVGLVNBLDRI2PYPUCB4GKRART2WBD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100489.16_warc_CC-MAIN-20231203062445-20231203092445-00068.warc.gz\"}"} |
https://wiki.haskell.org/Haskell_Quiz/Grid_Folding/Solution_Dolio | [
"# Haskell Quiz/Grid Folding/Solution Dolio\n\nThe basis for my solution is simple. Consider each square to be a single-element list initially. Then, a row of such squares is a list of such lists. An entire grid is then a list of those lists.\n\nWhen folding horizontally, one splits each row, reverses the half to go on top (as well as its elements, since they'll be flipped), and zips the two halves together by appending corresponding elements. This results in a top-first list of the stacked squares.\n\nWhen folding vertically, one splits the grid in half, reverses the half to go on top, and zips the two grid halves together. The function that combines corresponding rows is yet another zip that appends corresponding elements (again, reversing the ones on top).\n\n```module Main where\nimport Data.Char\nimport System\n\ngrid n = break . map return \\$ [1..(n*n)]\nwhere break [] = []\nbreak l = let (h,t) = splitAt n l in h : break t\n\nfold 'T' = folder vzipper\nfold 'B' = folder (flip vzipper)\nfold 'L' = map (folder hzipper)\nfold 'R' = map (folder \\$ flip hzipper)\nfold _ = error \"Unrecognized letter.\"\n\nvzipper = zipWith (zipWith \\$ (++) . reverse) . reverse\nhzipper = zipWith (++) . (map reverse . reverse)\n\nfolder z = uncurry z . ap (flip splitAt) ((`div` 2) . length)\n\npretty = unlines . map (unwords . map show)\n\noutput s | all isSpace s = error \"Invalid folding scheme\"\n| otherwise = putStr s\n\nmain = do [n, s] <- getArgs\noutput . pretty . foldl (flip fold) (grid \\$ read n) \\$ s\n```"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8004603,"math_prob":0.9877727,"size":1534,"snap":"2022-40-2023-06","text_gpt3_token_len":405,"char_repetition_ratio":0.11045752,"word_repetition_ratio":0.014440433,"special_character_ratio":0.26923078,"punctuation_ratio":0.12937063,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99249274,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-27T11:06:06Z\",\"WARC-Record-ID\":\"<urn:uuid:0c0578ff-e754-4891-958c-feff694a8b5e>\",\"Content-Length\":\"19734\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b379d223-6852-4aec-9908-fb96f1ea0621>\",\"WARC-Concurrent-To\":\"<urn:uuid:f1802952-3162-4ba4-8699-31d32ff807e5>\",\"WARC-IP-Address\":\"146.75.37.175\",\"WARC-Target-URI\":\"https://wiki.haskell.org/Haskell_Quiz/Grid_Folding/Solution_Dolio\",\"WARC-Payload-Digest\":\"sha1:KDU5VOWQFBLJ2HW3RQ2N56YE67RHOQIC\",\"WARC-Block-Digest\":\"sha1:BVJ6WJYEN3EAERXSY3YOSKU32WKUH45H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335004.95_warc_CC-MAIN-20220927100008-20220927130008-00524.warc.gz\"}"} |
http://www.readbag.com/dioceseofjoliet-cso-documents-curmathgoal9geometry | [
"#### Read MATH CURRICULUM text version\n\n`MATHEMATICS CURRICULUM PROJECT GOAL 9: Standard A: Use geometric methods to analyze, categorize and draw conclusions about points, lines, planes and space. Demonstrate and apply geometric concepts involving points, lines, planes and space. Grade 1 1. Identify two- and threedimensional shapes. 2. Model two-dimensional geometric shapes by drawing or building. 3. Describe and interpret relative positions in space and apply concepts of relative position (e.g., above/below). 4. Recognize and describe shapes that have line symmetry. 5. Identify geometric shapes and structures in the environment. 6. Explore the effects of translations (slides), reflections (flips) and rotations (turns) with concrete objects. Grade 2 1. Investigate and predict the results of putting together and taking apart two- and three-dimensional shapes (e.g., put two triangles together to make a quadrilateral). 2. Describe and interpret direction and distance in navigating space and apply concepts of direction and distance (e.g., nearer/farther). 3. Perform translations (slides), reflections (flips) and rotations (turns) with concrete objects. 4. Create and complete shapes that have line symmetry. Grade 3 1. Find and name two- and three-dimensional geometric figures in every day objects. 2. Identify the properties, number of sides and corners of geometric shapes. 3. Draw two-dimensional shapes using rulers, graphing paper and tracing paper. 4. Visualize the transition from two-dimensional to its threedimensional figure. 5. Construct three-dimensional geometric figures. 6. Locate and identify points using numbers and symbols on a grid and describe how points relate to each other on a grid. Grade 4 1. Identify, draw and label lines, line segments, rays, parallel lines, intersecting lines, perpendicular lines, acute angles, obtuse angles, right angles and acute, obtuse, right, scalene, isosceles and equilateral triangles. 2. Identify, draw and build regular and irregular polygons. 3. Read and plot ordered pairs of numbers in the positive quadrant of the Cartesian plane. 4. Describe paths and movement using coordinate systems. 5. Differentiate between polygons and non-polygons. 6. Identify and label radius and diameter of a circle. 7. Explore and describe rotational symmetry of twoand three-dimensional shapes. 8. Construct a circle with a specified radius or diameter using a compass.As a result of their schooling students will be able to...Kindergarten 1. Identify circle, square, triangle and rectangle. 2. Begin to recognize other shapes of objects. 3. Explore three-dimensional shapes.June 2005Geometry, Goal 9 - Page 1\fMATHEMATICS CURRICULUM PROJECT GOAL 9: Standard A: Use geometric methods to analyze, categorize and draw conclusions about points, lines, planes and space. Demonstrate and apply geometric concepts involving points, lines, planes and space. Grade 6 1. Plot and read ordered pairs of numbers in all four quadrants. 2. Describe sizes, positions and orientations of shapes under transformations, including dilations. 3. Perform simple constructions (e.g., equal segments, angle and segment bisectors, or perpendicular lines, inscribing a hexagon in a circle) with a compass and straightedge or a mira. 4. Determine and describe the relationship between pi, the diameter, the radius and the circumference of a circle. 5. Determine unknown angle measures using angle relationships and properties of a triangle or a quadrilateral.Grade 7 Grade8/Pre-Algebra/AlgebraAs a result of their schooling students will be able to...Grade 5 1. Identify, compare and analyze attributes of two- and threedimensional shapes and develop vocabulary to describe the attributes. 2. Classify two- or three-dimensional shapes according to their properties (e.g., regular and irregular types of quadrilaterals, pyramids and prisms). 3. Investigate and describe the results of subdividing and combining shapes. 4. Describe paths using coordinate systems. 5. Determine the distance between points along horizontal and vertical lines of a coordinate system. 6. Identify and justify rotational symmetry in two- and three-dimensional shapes. 7. Identify and describe how geometric figures are used in practical settings (e.g., construction, art, advertising, architecture). 8. Identify and label radius, diameter, chord and circumference of a circle. 9. Copy a line segment or an angle using a straightedge and a compass. 10. Construct angles and perpendicular bisectors of line segments. 11. Solve problems using properties of triangles (e.g., sum of interior angles of a triangle is 180°).1.2.3.4.5.6.Examine and describe a geometric shape, such as a regular polygon or a quadrilateral with pairs of parallel or perpendicular sides, using coordinate geometry. Draw geometric shapes with specified properties, such as side lengths or angle measures. Examine and describe line or rotational symmetry of objects in terms of transformations. Draw transformations of figures in a plane to match specified criteria. Perform constructions of congruent angles or parallel lines using a compass and straightedge, paper folding, or a mira. Determine the relationship among the number of edges, faces and vertices in a threedimensional object.1. 2. 3.4.5. 6. 7. 8.Solve problems involving two- and three-dimensional shapes. Apply and use the Pythagorean Theorem. Identify, describe and determine the radius, diameter and circumference of a circle and their relationship to each other and to pi. Graph points and identify coordinates of points on the Cartesian coordinate plane. Represent and identify geometric figures using coordinate geometry. Use transformations in a Cartesian coordinate plane. Identify relationships of angles formed by intersecting lines. Solve problems involving vertical, complementary and supplementary angles.June 2005Geometry, Goal 9 - Page 2\fMATHEMATICS CURRICULUM PROJECT GOAL 9: Standard B: Use geometric methods to analyze, categorize and draw conclusions about points, lines, planes and space. Identify, describe, classify and compare relationships using points, lines, planes, and solids. Grade 1 1. Identify objects that are the same shape. 2. Compare and sort two- and three-dimensional objects. 3. Compare and contrast sides and corners of basic geometric shapes. Grade 2 1. Identify objects that are congruent 2. Compare and contrast attributes of two- and threedimensional objects using appropriate vocabulary. Grade 3 1. Identify parallel and intersecting lines. 2. Identify polygons v. nonpolygons by defining components. 3. Recognize and identify symmetrical figures with one and two lines of symmetry. 4. Identify congruent figures in different positions. 5. Identify similar figures that are not congruent and tell how they are similar. Grade 4 1. Determine congruence and similarity of given shapes. 2. Explore polyhedra (threedimensional figures) using concrete models.As a result of their schooling students will be able to...Kindergarten 1. Identify and sort objects according to their shape.June 2005Geometry, Goal 9 - Page 3\fMATHEMATICS CURRICULUM PROJECT GOAL 9: Standard B: Use geometric methods to analyze, categorize and draw conclusions about points, lines, planes and space. Identify, describe, classify and compare relationships using points, lines, planes, and solids. Grade 6 1. Determine the relationships between the number of vertices or sides in a polygon, the number of diagonals and the sum of its angles. 2. Analyze quadrilaterals for defining characteristics. 3. Create a three-dimensional object from any two-dimensional representation of the object, including multiple views, nets, or technological representations. 4. Identify and describe the five regular polyhedra. 5. Create regular and semi-regular tessellations using pattern blocks, other manipulatives or technology to tile a plane.Grade 7 Grade8/Pre-Algebra/AlgebraAs a result of their schooling students will be able to...Grade 5 1. Demonstrate congruence of plane figures using transformations (translation, rotation, reflection). 2. Determine if two polygons are congruent using measures of angles and sides. 3. Match a front, right side and top view drawing with a threedimensional model built with cubes.1.2. 3.Describe, classify and justify relationships among types of twoand three-dimensional objects using their defining properties. Solve problems using properties of polygons and circles. Classify and order quadrilaterals according to their properties.1.2. 3.Identify front, side and top views of a three-dimensional solid built with cubes. Solve problems involving congruent and similar figures. Relate absolute value to distance on the number line.June 2005Geometry, Goal 9 - Page 4\fMATHEMATICS CURRICULUM PROJECT GOAL 9: Standard C: Standard D: Use geometric methods to analyze, categorize and draw conclusions about points, lines, planes and space. Construct convincing arguments and proofs to solve problems. Use trigonometric ratios and circular functions to solve problems (only applies to grades 7 & 8). Grade 1 1. Recognize and explain a geometric pattern. 2. Verbalize the rule for the geometric pattern sequence (e.g., amount doubles). Grade 2 1. Justify an extension of a pattern. Grade 3 1. Verbally describe the properties of basic geometric figures. 2. Create and explain patterns using pattern blocks and manipulatives. Grade 4 3. Make and test predictions about mathematical properties and relationships and justify the conclusions.As a result of their schooling students will be able to...Kindergarten 1. Verbally explain the different qualities of the shape of an object.June 2005Geometry, Goal 9 - Page 5\fMATHEMATICS CURRICULUM PROJECT GOAL 9: Standard C: Standard D: Use geometric methods to analyze, categorize and draw conclusions about points, lines, planes and space. Construct convincing arguments and proofs to solve problems. Use trigonometric ratios and circular functions to solve problems (only applies to grades 7 & 8). Grade 6 1. Make, test and justify conjectures about various quadrilateral and triangle relationships, including the triangle inequality. 2. Justify the relationship between vertical angles. 3. Justify that the sum of the angles of a triangle is 180 degrees.Grade 7 Grade8/Pre-Algebra/AlgebraAs a result of their schooling students will be able to...Grade 5 1. Make and test conjectures about mathematical properties and relationships and develop logical arguments to justify conclusions. 2. Make and test conjectures about the results of subdividing and combining shapes.1.2.3.4.Create and critique arguments about geometric relationships in figures based upon inductive and deductive reasoning. Justify the area formulas for triangles, parallelograms and trapezoids based on the formula for the area of a rectangle. Make and test conjectures about the relationships between side length and angle measure in various triangles and quadrilaterals. Justify the properties of angles formed by parallel lines cut by a transversal using appropriate terminology.1.2.3.Create and critique arguments concerning geometric ideas and relationships, such as congruence, similarity, the Pythagorean relationship, or formulas for surface areas or volume of simple threedimensional objects. Represent, solve and explain numerical and algebraic relationships using geometric concepts. Provide examples or counter-examples to either illustrate or disprove conjectures about geometric characteristics.Standard D 1. Analyze the relationship between sides of right triangles using the Pythagorean theorem. 2. Solve problems that involve the use of proportions and the Pythagorean theorem in similar right triangles with whole number side lengths.Standard D 1. Recognize Pythagorean Triples. 2. Identify the basic trigonometric ratio in terms of lengths of the sides of a right triangle and an acute angle.June 2005Geometry, Goal 9 - Page 6\f`\n\n6 pages\n\n#### Report File (DMCA)\n\nOur content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:\n\nReport this file as copyright or inappropriate\n\n731005"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8394614,"math_prob":0.96637595,"size":12216,"snap":"2020-34-2020-40","text_gpt3_token_len":2639,"char_repetition_ratio":0.14624959,"word_repetition_ratio":0.18992248,"special_character_ratio":0.20252128,"punctuation_ratio":0.17340522,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9934876,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-18T14:22:53Z\",\"WARC-Record-ID\":\"<urn:uuid:890e1d3c-8e87-4c7f-b249-6d49f4690a59>\",\"Content-Length\":\"20114\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ec471514-7909-45ff-90c0-f4f5c2812f8f>\",\"WARC-Concurrent-To\":\"<urn:uuid:c2ba984c-7729-471f-9289-02455eea6958>\",\"WARC-IP-Address\":\"172.67.214.81\",\"WARC-Target-URI\":\"http://www.readbag.com/dioceseofjoliet-cso-documents-curmathgoal9geometry\",\"WARC-Payload-Digest\":\"sha1:H65AC7XDQHOUOJR7QPQH3TLSS7VBX22A\",\"WARC-Block-Digest\":\"sha1:6LGXLIFDX3BXUPOOCSOG6VLPCIOW5JTW\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400187899.11_warc_CC-MAIN-20200918124116-20200918154116-00428.warc.gz\"}"} |
https://stats.stackexchange.com/questions/32657/r-package-tsa-how-to-interpret-the-io-coefficients-output-of-the-arimax-functio | [
"# R package TSA: how to interpret the IO coefficients output of the arimax function\n\nI was playing with the TSA package in R and wanted to test the arimax function to the solution provided in Pankratz's Forecasting with Dynamic Regression Models, chapter 8. The savings rate and the function seems to provide similar results as the ones in the book except for the IO weights which are quite different. I bet there is a transformation that I might be missing.\n\nAny help on understanding why IO coefficients are so different would be appreciated...\n\nthe solution states\n\nAO @ t=82,43,89\nLS @ t=99\nIO @ t=62,55\n\n\nwith Parameters estimates\n\nC = 6.1635\nw82 = 2.3346\nw99 = -1.5114\nw43 = 1.1378\nw62 = 1.4574\nw55 = -1.4915\nw89 = -1.0702\nAR1 = 0.7976\nMA2 = -0.3762\n\n\nTo fit the model in R, I used (saving is the data)\n\narimax(saving, order = c(1,0,2), fixed=c(NA,0,NA,NA,NA,NA,NA,NA,NA,NA), io=c(55,62),\nxreg=data.frame(AO82=1*(seq(saving)==82),\nAO43=1*(seq(saving)==43),\nAO89=1*(seq(saving)==89),\nLS99=1*(seq(saving)>=99)),\nmethod='ML')\n\n\nThe savings rate data is (100 points)\n\n4.9 5.2 5.7 5.7 6.2 6.7 6.9 7.1 6.6 7 6.9 6.4 6.6 6.4 7 7.3 6 6.3 4.8 5.3 5.4 4.7 4.9 4.4 5.1 5.3 6 5.9 5.9 5.6 5.3 4.5 4.7 4.6 4.3 5 5.2 6.2 5.8 6.7 5.7 6.1 7.2 6.5 6.1 6.3 6.4 7 7.6 7.2 7.5 7.8 7.2 7.5 5.6 5.7 4.9 5.1 6.2 6 6.1 7.5 7.8 8 8 8.1 7.6 7.1 6.6 5.6 5.9 6.6 6.8 7.8 7.9 8.7 7.7 7.3 6.7 7.5 6.4 9.7 7.5 7.1 6.4 6 5.7 5 4.2 5.1 5.4 5.1 5.3 5 4.8 4.7 5 5.4 4.3 3.5\n\nhere it is my output\n\n> arimax(saving, order = c(1,0,2),fixed=c(NA,0,NA,NA,NA,NA,NA,NA,NA,NA),io=c(55,62),xreg=data.frame(AO82=1*(seq(saving)==82),\n+ AO43=1*(seq(saving)==43),AO89=1*(seq(saving)==89),LS99=1*(seq(saving)>=99)),method='ML')\n\nCall:\narimax(x = saving, order = c(1, 0, 2), xreg = data.frame(AO82 = 1 * (seq(saving) ==\n82), AO43 = 1 * (seq(saving) == 43), AO89 = 1 * (seq(saving) ==\n89), LS99 = 1 * (seq(saving) >= 99)), fixed = c(NA, 0, NA, NA, NA, NA,\nNA, NA, NA, NA), method = \"ML\", io = c(55, 62))\n\nCoefficients:\nar1 ma1 ma2 intercept AO82 AO43 AO89 LS99 IO-55 IO-62\n0.7918 0 0.3406 6.0628 2.3800 1.1297 -1.0466 -1.4885 -0.5958 0.5517\ns.e. 0.0674 0 0.1060 0.3209 0.3969 0.3780 0.3835 0.5150 0.4044 0.3772\n\nsigma^2 estimated as 0.2611: log likelihood = -75.57, aic = 169.14"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.69719666,"math_prob":0.99852806,"size":2130,"snap":"2021-43-2021-49","text_gpt3_token_len":1080,"char_repetition_ratio":0.1378175,"word_repetition_ratio":0.016666668,"special_character_ratio":0.5685446,"punctuation_ratio":0.26478493,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9976158,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-04T20:07:24Z\",\"WARC-Record-ID\":\"<urn:uuid:702302b1-25fd-44db-b663-e60ca325ce47>\",\"Content-Length\":\"135548\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9ead8616-c83d-4b81-9eeb-c0ecfa8b405e>\",\"WARC-Concurrent-To\":\"<urn:uuid:bf9cc1c3-5da6-411a-bbfe-702e91e117d5>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://stats.stackexchange.com/questions/32657/r-package-tsa-how-to-interpret-the-io-coefficients-output-of-the-arimax-functio\",\"WARC-Payload-Digest\":\"sha1:3GJQLFKP6FX2A55LJ3O36RAVBVY4T5RS\",\"WARC-Block-Digest\":\"sha1:OONOZ3VGPIHFUFY6S35JUJSNKYEE55PY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363006.60_warc_CC-MAIN-20211204185021-20211204215021-00223.warc.gz\"}"} |
https://brilliant.org/discussions/thread/mathemagic-u/ | [
"MatheMagic !!!\n\nTwo boys went to a book shop and purchased a book which costs $50. They paid$25 each for the book and left the store. When the store manager went to the cashier, he found that they have taken $5 extra from them. So, the actual cost of the book was$45. The manager gave $5 to a worker out there to return it to those boys. Let's make it more interesting, the worker was a bit greedy, he took$2 from it and returned $3 to the boys. They distributed$1.5 and $1.5 each and thought that they have paid$25 - $1.5 =$23.5 each for the book. Here comes the problem, Now, we all (I mean those who are reading this thread) know that the boys paid $23.5 +$23.5 = $47 and the worker have only$2 which adds up to $49. Where do you think$1 lost in the process ?",
null,
"Note by Abhishek Kumar\n6 years, 4 months ago\n\nThis discussion board is a place to discuss our Daily Challenges and the math and science related to those challenges. Explanations are more than just a solution — they should explain the steps and thinking strategies that you used to obtain the solution. Comments should further the discussion of math and science.\n\nWhen posting on Brilliant:\n\n• Use the emojis to react to an explanation, whether you're congratulating a job well done , or just really confused .\n• Ask specific questions about the challenge or the steps in somebody's explanation. Well-posed questions can add a lot to the discussion, but posting \"I don't understand!\" doesn't help anyone.\n• Try to contribute something new to the discussion, whether it is an extension, generalization or other idea related to the challenge.\n• Stay on topic — we're all here to learn more about math and science, not to hear about your favorite get-rich-quick scheme or current world events.\n\nMarkdownAppears as\n*italics* or _italics_ italics\n**bold** or __bold__ bold\n\n- bulleted\n- list\n\n• bulleted\n• list\n\n1. numbered\n2. list\n\n1. numbered\n2. list\nNote: you must add a full line of space before and after lists for them to show up correctly\nparagraph 1\n\nparagraph 2\n\nparagraph 1\n\nparagraph 2\n\n> This is a quote\nThis is a quote\n# I indented these lines\n# 4 spaces, and now they show\n# up as a code block.\n\nprint \"hello world\"\n# I indented these lines\n# 4 spaces, and now they show\n# up as a code block.\n\nprint \"hello world\"\nMathAppears as\nRemember to wrap math in $$...$$ or $...$ to ensure proper formatting.\n2 \\times 3 $2 \\times 3$\n2^{34} $2^{34}$\na_{i-1} $a_{i-1}$\n\\frac{2}{3} $\\frac{2}{3}$\n\\sqrt{2} $\\sqrt{2}$\n\\sum_{i=1}^3 $\\sum_{i=1}^3$\n\\sin \\theta $\\sin \\theta$\n\\boxed{123} $\\boxed{123}$\n\nSort by:\n\nyou are supposed to add $3 to$47 because the worker's $2 is counted in the$47\n\n- 6 years, 4 months ago\n\nu r talking about cost price in the first half and then reverse calculating it by sell price in the second half.so its obvious why they are not adding up\n\n- 6 years, 4 months ago\n\nthat is subtract $3 from$50 then subtract $2 thus it adds up - 6 years, 4 months ago Log in to reply do like this they each have paid$23.5 so in total $47.now waht u r duin rong is that they actually bought the book for$45(after gettin money back) but they paid $47 because the cashier cheated$2 on them i.e $47 -$2\n\n- 6 years, 4 months ago"
] | [
null,
"https://ds055uzetaobb.cloudfront.net/brioche/avatars-2/resized/45/f7e48998860544528d082e40a9191f60.2d604c381259b3831493694306635229.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.95471096,"math_prob":0.94674104,"size":2083,"snap":"2019-43-2019-47","text_gpt3_token_len":556,"char_repetition_ratio":0.10822511,"word_repetition_ratio":0.0052083335,"special_character_ratio":0.2918867,"punctuation_ratio":0.11258278,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9627267,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-18T10:28:08Z\",\"WARC-Record-ID\":\"<urn:uuid:5c05a831-1fc3-40d7-b0eb-2e59e03b4d64>\",\"Content-Length\":\"63628\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:74fb183e-4e35-41dc-a3c3-7f6d9eaede4c>\",\"WARC-Concurrent-To\":\"<urn:uuid:eacd4ef4-ca9a-4731-b476-ebd1af90b3a2>\",\"WARC-IP-Address\":\"104.20.34.242\",\"WARC-Target-URI\":\"https://brilliant.org/discussions/thread/mathemagic-u/\",\"WARC-Payload-Digest\":\"sha1:D3TAWE6YL4PZRBUKZYMING4HTSJPDD6G\",\"WARC-Block-Digest\":\"sha1:2SA6GGOHGTVKMXT7MBWB723WAQ7VRKCI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986679439.48_warc_CC-MAIN-20191018081630-20191018105130-00328.warc.gz\"}"} |
https://media.alavareyes.com/b1kaqe4/37ea61-associative-vector-c%2B%2B | [
"Boots Multivitamins Review, Remove Kitchen Faucet Nut, Tcp Smart Wall Socket With Usb, Flip Door Lock Home Depot, Home Depot 50 Amp Breaker, Bunny Rescue Near Me, Sunday River Mountain Stats, Medical School Secondary Essays, Riverside Car Park Windsor, \" /> Boots Multivitamins Review, Remove Kitchen Faucet Nut, Tcp Smart Wall Socket With Usb, Flip Door Lock Home Depot, Home Depot 50 Amp Breaker, Bunny Rescue Near Me, Sunday River Mountain Stats, Medical School Secondary Essays, Riverside Car Park Windsor, \" />\n\nClosure: If x is any vector and c is any real number in the vector space V, then x. c belongs to V. Associative Law: For all real numbers c and d, and the vector x in V, then c. (d. v) = (c . C++11 has eight associative containers. It should be equal to c times v dot w. of the product of . An associative memory M is a system that relates input patterns and output patterns as follows : with x and y being the input and output patterns vectors. BOOK FREE CLASS; ... Commutative Law: A + B = B + A Associative Law: A + (B + C) = (A + B) + C. With C++17, you can more comfortably insert new elements into them, merge existing associative containers, or move elements from one container into another if they are similar. Contribute to TakeAsh/cpp-AssociativeVector development by creating an account on GitHub. v; Distributive law: For all real numbers c and d, and the vector x in V, (c + d).v = c.v + c.d Each of the following containers use different algorithm for data storage thus for different operations they have different speed. Associative array implemented by std::vector. scalar multiplication distributes over complex addition $(c_1 + c_2) \\cdot V = c_1 \\cdot V + c_2 \\cdot V$ any set with properties marked (A) is an Abelian group real vector space: non-empty set $\\mathbb{V}$ of … Thus, vector addition is commutative : A + B = B + A (4.1) The addition of vectors also obeys the associative law as illustrated in Fig. 4.4(c), the same vector R is obtained. The associative law, which states that the sum of three vectors does not depend on which pair of vectors is added first: $$(\\vc{a}+\\vc{b})+\\vc{c} = \\vc{a} + (\\vc{b}+\\vc{c}).$$ You can explore the properties of vector addition with the following applet. Memory overhead.The C++ standard does not specify requirements on memory consumption, but virtually any implementation of vector has the same behavior with respect to memory usage: the memory allocated by a vector v with n elements of type T is . An associative memory is represented by a matrix whose … Welcome back for our second part in our series on removing elements from C++ containers! • Vector addition is commutative: a + b = b + a. Several properties of vector addition are easily verified. Print vector in C++ A vector algebra is an algebra where the terms are denoted by vectors and operations are performed corresponding to algebraic expressions. I find that semantic relatedness, as quantified by these models, is able to provide a good measure of the associations Sequence Containers: In standard template library they refer to the group of container class template, we use to them store data.One common property as the name suggests is that elements can be accessed sequentially. Associative Law - the addition of three vectors is independent of the pair of vectors added first. The more cache line aware the container is, the faster is the access time of the elements: std::vector > std::deque > (std::list, std::forward_list). Notes: When two vectors having the same magnitude are acting on a body in opposite directions, then their resultant vector is zero. The container manages the storage space that is allocated for its elements and provides member functions to access them, either directly or through iterators (objects with properties similar to pointers). First, understand the vector -a. c c-plus-plus information-retrieval cmake algorithm avx bit-manipulation simd integer-compression sparse-vectors sparse-matrix bit-array indexing-engine bit-vector adjacency-matrix associative-array sparse-vector These are special kind of arrays, where indexing can be numeric or any other data type i.e can be numeric 0, 1, 2, 3.. Although, STL classes are there to simplify and efficiently implement associative array, but it was my own idea to reinvent the wheel and build things grounds up, except for using the vector class. We construct a parallelogram. where c is v. capacity and e is sizeof (T). We can therefore write both as a + b + c. • a + 0 = 0 + a = a. For any vectors a, b, and c of the same size we have the following. vector addition is commutative. the direction . 4.4(d). The vector triple product has the form A × (B × C).The parentheses are necessary, because the cross product is not associative, meaning that A × (B × C) is not necessarily equal to (A × B) × C.If B and C are proportional, making them collinear, the vector triple product is zero and we need not discuss it further. We will find that vector addition is commutative, that is a + b = b + a . B. 6. Associative Judgment and Vector Space Semantics Sudeep Bhatia University of Pennsylvania I study associative processing in high-level judgment using vector space semantic models. Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. If the data structure in your paper meets that requirement, it is an associative container. There are three classes of containers -- sequence containers, associative containers, and unordered associative containers -- each of which is designed to support a different set of operations. So let me show you. Image display that parallelogram law that proves the addition of vector is independent of the order of vector, i.e. Each input vector form an association with its corresponding output vector. The access to the associative and sequential container was unified. arghm and gog) then AB represents the result of writing one after the other (i.e. If I take some scalar and I multiply it times v, some vector v. And then I take the dot product of that with w, if this is associative the way multiplication in our everyday world normally works, this should be equal to-- and it's still a question mark because I haven't proven it to you. b) Verify using an example that Vector a + (Vector b • Vector c) is not equal to (Vector a + Vector b) • (Vector a +Vector c). We also find that vector addition is associative, that is (u + v) + w = u + (v + w ). d). Let these two vectors represent two adjacent sides of a parallelogram. m v = c∙e, . v i = O, ••• ,n s n number of searching steps s (1) In mathematics, the associative property ... and the vector cross product. A vector $$\\vec{AB}$$, in simple words, means the displacement from point A to point B.Now, imagine a scenario where a boy moves from point A to B and then from point B to C. Associative containers are set, multiset, map, and multimap Unordered associative containers are unordered_set, unordered_multiset, unordered_map and unordered_multimap. In view of the associative law we naturally write abc for both f(f(a, b), c) and f(a, f(b, c), and similarly for strings of letters of any length.If A and B are two such strings (e.g. (This means that addition does not distribute over the dot product.) An associative container is any container that is not necessarily indexed with sequential integers that start with the base for the language (0 in most of the C-based languages, 1 for some others). B + A as in Fig. How to Remove Elements from a Sequence Container (vector, string, deque, list); How to Remove Pointers from a Vector in C++ (co-written with Gaurav Sehgal); How to Remove Elements from an Associative Container (maps and sets) Two vectors of different magnitudes cannot give zero resultant vector. The following properties hold for vector addition: ab ba … commutative law abc abc … associative law 2. Vector Subtraction. Vector Addition is Commutative. parallelogram law for vector addition because, in a geometrical interpretation of vector addition, c is the diagonal of a parallelogram formed by the two vectors a and b, Fig. Elements of vectors are stored in continues memory location, so it is easy to print vector c++. Triangle Law of Vector Addition. = t. - L. , .\" COMMUTATIVE LAW OF VECTOR ADDITION: Consider two vectors and . From my perspective, they are underrepresented in the C++ … The Negative Vector: and . The result of adding vectors A and B first and then adding vector C is the same as the result of adding B and C first and then adding vector A : Vector quantities also satisfy two distinct operations, vector addition and multiplication of a vector by a scalar. 1.1.1b. Initially, numbers.empty(): true After adding elements, numbers.empty(): false Three numbers are needed to represent the magnitude and direction of a vector quantity in a three dimensional space. magnitude. In C++. • Vector addition is associative: (a + b) + c = a + (b + c). (This means that the dot product is not associative.) Vector Addition is Associative. ( a + b ) + c = a + ( b + c ) Thus vector addition is associative. But that is not all. This can be illustrated in the following diagram. Adding the zero vector to a vector … Other Containers (skips back) Standard Library Associative Containers article; C++; containers; hash-map; hash-set; hashing; map; set arghmgog).We have here used the convention (to be followed throughout) that capital letters are variables for strings of letters. I think I should write a similar post to the associative containers in the standard template library. What's next? C. may be considered to represent boththe . Associative learning has been shown in a variety of insects, including the mosquitoes Culex quinquefasciatus and Anopheles gambiae.This study demonstrates associative learning for the first time in Aedes aegypti, an important vector of dengue, yellow fever and chikungunya viruses.This species prefers to rest on dark surfaces and is attracted to the odor of 1-octen-3-ol. This … This law is known as the associative law of vector addition. In fact, the vector . A. and . Associative arrays are also called map or dictionaries. A Self-organizing Associative Memory System for Control Applications 337 best aatching cell the template vector 10 of the accessed association cell is compared to the stiaulus and a differ ence vector is calculated. Explain why it is not possible for Vector a • (Vector b • Vector c) to equal (Vector a • Vector b) • Vector c . (a+b)+c=a+(b+c). These quantities are called vector quantities. Well, Associative array had been implemented for C++ language in here. Thus, a plane area in space may be looked upon as possessing a direction in addition to a magnitude, the directional character Learn addition, dot and cross product here. = a + b + a Unordered associative containers are unordered_set, unordered_multiset, unordered_map and unordered_multimap paper meets requirement. In a three dimensional space an association with its corresponding output vector product is not.. Using vector space semantic models different algorithm for data storage thus for operations. From C++ containers dimensional space is v. capacity and e associative vector c++ sizeof T. E is sizeof ( T ) this means that addition does not distribute over the dot product. (! Performed corresponding to algebraic expressions the following properties hold for vector addition and multiplication of a …! Data storage thus for different operations they have different speed ( to be followed )... Been implemented for C++ language in here memory location, so it is an container! The standard template library capital letters are variables for strings of letters = b + a ( b a. Associative containers in the standard template library an associative container the vector -a. associative array had implemented... ) + c = a + b = b + c = a + )! Where the terms are denoted by vectors and to TakeAsh/cpp-AssociativeVector development by creating an on... For any vectors a, b, and multimap Unordered associative containers the! B = b + c ) I should write a similar post to the associative and sequential container unified... Is known as the associative law - the addition of three vectors is independent of the same vector is. Commutative, that is a + b = b + a the dot.... Semantics Sudeep Bhatia University of Pennsylvania I study associative processing in high-level using! Mathematics, the same magnitude are acting on a body in opposite directions, then their resultant vector for... The magnitude and direction of a vector … so let me show you b! C ), the directional in space may be looked upon as a. Two adjacent sides of a vector quantity in a three dimensional space, unordered_map and unordered_multimap are on... It is an algebra where the terms are denoted by associative vector c++ and operations are performed corresponding to expressions. The zero vector to a vector … so let me show you thus. Added first a, b, and multimap Unordered associative containers are set, multiset map! That addition does not distribute over the dot product is not associative. law known. ( to be followed throughout ) that capital letters are variables for strings of.. Thus, a plane area in space may be looked upon as possessing a direction in addition a... The dot product. vector form an association with its corresponding output vector dot product. ).We here. Associative containers are set, multiset, map, and multimap Unordered associative containers are set multiset... Form an association with its corresponding output vector space Semantics Sudeep Bhatia University of Pennsylvania I study processing... Association with its corresponding output vector in the standard template library b ) + c.! Think I should write a similar post to the associative containers are unordered_set unordered_multiset....We have here used the convention ( to be followed throughout ) that capital letters are variables for of... Numbers are needed to represent the magnitude and direction of a vector is... Vectors are stored in continues memory location, so it is an algebra the... Of writing one after the other ( i.e result of writing one the. B ) + c = a + 0 = 0 + a = +! … commutative law abc abc … associative law 2 after the other ( i.e multiset, map, and Unordered. This … Well, associative array implemented by std::vector needed represent... Meets that requirement, it is easy to print vector C++ in continues memory location so. Product. … associative law of vector addition is commutative: a + b ) + c ) is algebra. Implemented for C++ language in here the access to the associative law of vector addition and multiplication a... Size we have the following properties hold for vector addition elements of vectors first... Addition and multiplication of a vector quantity in a three dimensional space each of the same vector R is.... Law of vector addition is associative: ( a + b = b + •! Denoted by vectors and operations are performed corresponding to algebraic expressions std::vector C++ containers a plane area space! The result of writing one after the other ( i.e thus, plane. Are denoted by vectors and added first thus, a plane area in space may be looked as! Map, and multimap Unordered associative containers in the standard template library commutative, that is +! - the addition of three vectors is independent of the same size have..., multiset, map, and c of the pair of vectors first! Been implemented for C++ language in here addition does not distribute over the dot product. two!... and the vector -a. associative array had been implemented for C++ language here! Sides of a vector quantity in a three dimensional space Pennsylvania I associative! Thus, a plane area in space may be looked upon as possessing a direction associative vector c++ addition to a algebra... Welcome back for our second part in our series on removing elements from containers. The terms are denoted by vectors and operations are performed corresponding to algebraic expressions a parallelogram addition does distribute! Access to the associative containers in the standard template library result of writing one after the (! C of the following containers use different algorithm for data storage thus for different operations they have different speed is. Part in our series on removing elements from C++ containers is obtained its corresponding output vector ( T.... By a scalar association with its corresponding output vector + 0 = 0 + =. Vectors and operations are performed corresponding to algebraic expressions a plane area in space be! Structure in your paper meets that requirement, it is an associative container associative. using space! Semantics Sudeep Bhatia University of Pennsylvania I study associative processing in high-level Judgment using vector Semantics! And sequential container was unified direction in addition to a vector quantity in a three dimensional space its output... Stored in continues memory location, so it is an algebra where the terms are denoted vectors! That addition does not distribute over the dot product is not associative. structure in your paper meets that,. A magnitude, the same vector R is obtained to print vector C++ of vector addition C++! That requirement, it is easy to print vector C++, then their vector. So let me show you, the directional independent of the pair of vectors first! Are denoted by vectors and second part in our series on removing elements from C++ containers vector:... + c. • a + b = b + c. • a + b + =. Capacity and e is sizeof ( T ) vector R is obtained three vectors is of... Of Pennsylvania I study associative processing in high-level Judgment using vector space semantic models When two vectors and the vector... As possessing a direction in addition to a magnitude, the directional in,. Find that vector addition: Consider two vectors having the same magnitude are acting on a body in directions! Arghmgog ).We have here used the convention ( to be followed throughout ) that capital are. We will find that vector addition is commutative: a + 0 0... Addition: Consider two vectors represent two adjacent sides of a vector … so me! Corresponding output vector not distribute over the dot product. b ) + c = a therefore write both a. Same magnitude are acting on a body in opposite directions, then their resultant vector meets that requirement it! Can not give zero resultant associative vector c++ for any vectors a, b, and multimap Unordered containers! Are denoted by vectors and vectors a, b, and multimap Unordered associative containers are unordered_set,,. Adding the zero vector to a vector algebra is an associative container can. Also satisfy two distinct operations, vector addition is commutative, that is a (...... and the vector cross product. implemented for C++ language in.... Different speed I study associative processing in high-level Judgment using vector space Sudeep. Direction of a vector … so let me show you location, it... Algorithm for data storage thus for different operations they have different speed of... Elements from C++ containers are acting on a body in opposite directions, then their resultant vector c.. ) + c = a ).We have here used the convention ( to be followed throughout that... Algorithm for data storage thus for different operations they have different speed the dot.!, a plane area in space may be looked upon as possessing direction. Where associative vector c++ terms are denoted by vectors and operations are performed corresponding to algebraic expressions a scalar of! An associative container series on removing elements from C++ containers multimap Unordered containers. Of vectors are stored in continues memory location, so it is an algebra where the terms are denoted vectors... Vector associative vector c++ as the associative containers are set, multiset, map, and c the., and c of the same magnitude are acting on a body in opposite directions, their! Understand the vector cross product. 0 + a throughout ) that capital letters are variables for strings of.! When two vectors represent two adjacent sides of a parallelogram implemented for C++ language in here vectors of magnitudes...",
null,
""
] | [
null,
"https://secure.gravatar.com/avatar/",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9075743,"math_prob":0.9519452,"size":19936,"snap":"2021-04-2021-17","text_gpt3_token_len":4251,"char_repetition_ratio":0.18191852,"word_repetition_ratio":0.24828614,"special_character_ratio":0.2206561,"punctuation_ratio":0.14353561,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98607224,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-19T05:14:58Z\",\"WARC-Record-ID\":\"<urn:uuid:5c35fd00-1418-44d4-b852-fd1e06f00af8>\",\"Content-Length\":\"113604\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bdc7c675-9b5e-4a12-850a-515472fc31f1>\",\"WARC-Concurrent-To\":\"<urn:uuid:19381e4d-b193-4c31-b9d4-94b3e4adf26b>\",\"WARC-IP-Address\":\"52.211.197.73\",\"WARC-Target-URI\":\"https://media.alavareyes.com/b1kaqe4/37ea61-associative-vector-c%2B%2B\",\"WARC-Payload-Digest\":\"sha1:P7HM4LZ7OMAJ7KQARVLM726GVIRVUXMO\",\"WARC-Block-Digest\":\"sha1:35KL6GXOQWN7XUYMSNDYSKNO4FXNRHO4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038878326.67_warc_CC-MAIN-20210419045820-20210419075820-00420.warc.gz\"}"} |
https://decompile.com/cpp/faq/pointer_arithmetic.htm | [
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Pointer Arithmetic\n\nby Curtis Krauskopf\n\nOne of the most common C++ programming problems is the way that pointers are handled in the C++ programming language.\n\nAlmost every programmer is comfortable with arrays. Code snippet 1 defines an array of 5 integers and then obtains the 4th integer in the array:\n\nint sample;\nint random = sample;\n\nIn the second line of code snippet 1, the array offset really is the fourth integer in the array because arrays in C++ start at 0:\n\nArray Element Array Index Value 1st ??? 2nd ??? 3rd ??? 4th ??? 5th ???\n\nAlso, in code snippet 1, the choice of naming the variable random is not an accident or just a cute name. The value really is random because the values of the array defined in the first line of the code snippet were not defined. The result of sample in an uninitialized array is a random value -- in other words, it could be any integer value.\n\nAn array access and pointer arithmetic are the same thing. Code snippet 2 is an example of an array access. The last line of the snippet accesses the same array element using pointer arithmetic.\n\nint sample;\nint random;\nrandom = sample;\nrandom = *(sample + 3);\n\nOf course, most programmers use the shorter version of those two expressions but the C++ language allows us to use either form.\n\nPointer arithmetic works by translating an expression:\n\np + n\n\ninto the following expression:\n\np + n * sizeof(whatever p points to)\n\nHere's a simple example of some misleading code. The code in figure 1 is reading the values in an array of chars and then writing the value of the array elements to cout.\n\n#include <iostream.h>\n\n// Create a program that type casts an array of chars\n// into an array of shorts and then traverse the array.\n// Prevent the last 8 chars of the array from being\n// dereferenced.\n//\nint main(int, char*)\n{\nconst BUFFERSIZE = 20;\nunsigned char *p = (unsigned char*) new char[BUFFERSIZE];\nunsigned short *sptr = NULL;\nint line = 0;\n\n// Pointer arithmetic in the limit of this for() loop\n// causes the wrong limit address to be calculated.\nfor(line = 1, sptr = (unsigned short *)p;\n(sptr < (unsigned short*)p + BUFFERSIZE - 8);\nsptr++, line++) {\ncout << dec << \"Line \" << line << \": \";\ncout << hex << \"sptr = \" << sptr << \"h\";\ncout << \", stop at: \";\ncout << ((unsigned short*)p + BUFFERSIZE - 8);\ncout << \"h\" << dec << endl;\n}\n\ncout << \"---------------------------------\" << endl;\n\n// Casting the limit part of the for() loop to an\n// unsigned char* causes the program to do the right\n// thing, but the displayed limit is still wrong.\nfor(line = 1, sptr = (unsigned short*) p;\n((unsigned char*)sptr < p + BUFFERSIZE - 8);\nsptr++, line++) {\ncout << dec << \"Line \" << line << \": \";\ncout << hex << \"sptr = \" << sptr << \"h\";\n\n// --- this looks right but is wrong because\n// operator<<(unsigned char*) dereferences the\n// pointer passed to it and then tries to\n// print what the dereferenced pointer points to:\n// cout << \", stop at: \" << (p + BUFFERSIZE - 8);\n//\n// -- this throws a compile-time error: size of\n// type 'void' is unknown or zero\n// cout << \", stop at: \" << ((void*)p + BUFFERSIZE - 8);\n\ncout << \", stop at: \";\ncout << ((unsigned short*)p + BUFFERSIZE - 8);\ncout << \"h\" << dec << endl;\n}\n\ncout << \"---------------------------------\" << endl;\n\n// This is one way to do it right -- declare a variable\n// to hold the for loop's limit:\nunsigned char* limit = p + BUFFERSIZE - 8;\nfor(line = 1, sptr = (unsigned short*) p;\n((unsigned char*)sptr < limit);\nsptr++, line++) {\ncout << dec << \"Line \" << line << \": \";\ncout << hex << \"sptr = \" << sptr << \"h\";\n// --- We can use (void*) now because we don't need to use\n// any pointer arithmetic to show the right value.\ncout << \", stop at: \" << ((void*)limit);\ncout << \"h\" << dec << endl;\n}\n\nreturn 0;\n}\n\nPopular C++ topics at The Database Managers:",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"C++ FAQ Services | Programming | Contact Us | Recent Updates Send feedback to:",
null,
""
] | [
null,
"https://decompile.com/siteimages/DM.logo.gif",
null,
"https://decompile.com/siteimages/top.image.jpg",
null,
"https://decompile.com/siteimages/contents.gif",
null,
"https://decompile.com/siteimages/address.gif",
null,
"https://decompile.com/siteimages/top.corner.gif",
null,
"https://decompile.com/siteimages/up.border.gif",
null,
"https://decompile.com/siteimages/home.corner.gif",
null,
"https://decompile.com/siteimages/leftside.gif",
null,
"https://decompile.com/siteimages/bottomright.gif",
null,
"https://decompile.com/siteimages/leftside.gif",
null,
"https://decompile.com/siteimages/leftside.border3.gif",
null,
"https://decompile.com/siteimages/clearpixel.gif",
null,
"https://decompile.com/siteimages/leftside.border3.gif",
null,
"https://decompile.com/siteimages/leftside.border.bottom.gif",
null,
"https://decompile.com/siteimages/bottom.border3.gif",
null,
"https://decompile.com/siteimages/clearpixel.gif",
null,
"https://decompile.com/siteimages/bottom.border2.gif",
null,
"https://decompile.com/images/emailAddress.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.69378793,"math_prob":0.98276824,"size":3845,"snap":"2022-05-2022-21","text_gpt3_token_len":1058,"char_repetition_ratio":0.1476178,"word_repetition_ratio":0.21448088,"special_character_ratio":0.34850454,"punctuation_ratio":0.14550643,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9963185,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,null,null,1,null,1,null,1,null,1,null,1,null,1,null,2,null,1,null,2,null,2,null,2,null,2,null,1,null,1,null,2,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-26T06:01:58Z\",\"WARC-Record-ID\":\"<urn:uuid:ee3ab8ef-3cd0-4768-8c4d-2f12a82c1dd6>\",\"Content-Length\":\"31439\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f3b4f967-6d46-44d4-bd46-f62c7ba3cae8>\",\"WARC-Concurrent-To\":\"<urn:uuid:7c5e31ef-f777-4c24-b8cb-599053b4ab86>\",\"WARC-IP-Address\":\"52.32.71.173\",\"WARC-Target-URI\":\"https://decompile.com/cpp/faq/pointer_arithmetic.htm\",\"WARC-Payload-Digest\":\"sha1:774JGIAVOG3VEVVJZGTK5E4BC4UOKWYF\",\"WARC-Block-Digest\":\"sha1:JVWJXFEHTJ4C2M4HV5JQSXPM4QTU7LMZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304915.53_warc_CC-MAIN-20220126041016-20220126071016-00206.warc.gz\"}"} |
https://stats.stackexchange.com/questions/198595/expected-value-of-gamma-distribution/198602 | [
"# Expected Value of Gamma Distribution\n\nIf $$X \\sim \\text{Gamma}(\\alpha,\\beta)$$, how would I go about finding $$E\\left(\\frac 1{X^2}\\right)$$?\n\n• Please add the [self-study] tag & read its wiki. Then tell us what you understand thus far, what you've tried & where you're stuck. We'll provide hints to help you get unstuck. – gung - Reinstate Monica Feb 25 '16 at 21:37\n• I tried simplifying the integral, but I can't seem to find anyway to simplify it. – TJ Phu Feb 25 '16 at 21:50\n• Could you give us some more details about what you attempted? You may find it useful to know you can write maths using Latex by enclosing it in $...$ - see our editing help – Silverfish Feb 25 '16 at 22:02\n• Maybe you guys hurried up to pur this question on hold as off-topic. I have a hunch that he only tried integration by party and by substitution without using any intrinsic property of gamma function. Of course that is my own humble opinions and I don't want to act as TJ Phu advocate. – Adam Przedniczek Feb 26 '16 at 11:40\n• Related question about finding $E[X^{-1}]$. – Dilip Sarwate Feb 26 '16 at 14:22\n\nI would go about it the lazy way: by starting with a definition and looking hard at what ensues, in order to see whether somebody has already shown me the answer. In what follows no calculations are needed at all, and only the very simplest rules (of exponents and integrals) are required to follow the algebra.\n\nLet's begin with the Gamma distribution. Choose a unit of measurement of $$X$$ in which $$\\beta = 1$$, so that we may fairly say $$X$$ has a $$\\Gamma(\\alpha)$$ distribution. This means the density is positive only for positive values, where the probability density element is given by\n\n$$f_\\alpha(x)dx = \\frac{1}{\\Gamma(\\alpha)} x^{\\alpha} e^{-x} \\frac{dx}{x}.$$\n\n(If you're curious, the expression $$dx/x$$ is explained at https://stats.stackexchange.com/a/185709. If you don't like it, replace $$x^\\alpha dx/x$$ by $$x^{\\alpha-1} dx$$.)\n\nRecall that the normalizing constant is there to make the integral of $$f_\\alpha(x) dx$$ unity, whence we can deduce that\n\n$$\\Gamma(\\alpha) = \\Gamma(\\alpha)(1) = \\Gamma(\\alpha)\\int_0^\\infty f_\\alpha(x) dx = \\frac{\\Gamma(\\alpha)}{\\Gamma(\\alpha)}\\int_0^\\infty x^{\\alpha} e^{-x} \\frac{dx}{x} = \\int_0^\\infty x^{\\alpha} e^{-x} \\frac{dx}{x}.\\tag{1}$$\n\nIt doesn't matter what number $$\\Gamma(\\alpha)$$ actually is. It suffices to see that it is well-defined and finite provided $$\\alpha\\gt 0$$ and otherwise diverges.\n\nNow let's turn to the rules for expectation. The \"law of the unconscious statistician\" says the expectation of any function of $$X$$, such as $$X^p$$ for some power $$p$$, is obtained by integrating that function of $$x$$ against the density:\n\n$$E[X^p] = \\int_0^\\infty x^p \\frac{1}{\\Gamma(\\alpha)} x^{\\alpha} e^{-x} \\frac{dx}{x}.$$\n\nIt's time to stare. Ignoring the integral, the integrand is a simple enough expression. Let's simplify it using the rules of algebra and, in the process, move that constant value of $$1/\\Gamma(\\alpha)$$ out of the integral:\n\n$$E[X^p] = \\frac{1}{\\Gamma(\\alpha)} \\int_0^\\infty x^{p+\\alpha} e^{-x} \\frac{dx}{x}.\\tag{2}$$\n\nThat should look awfully familiar: it's just like another Gamma distribution density function, but with the power $$p+\\alpha$$ instead of $$\\alpha$$. Equation $$(1)$$ tells us immediately, with no further thinking or calculation, that\n\n$$\\int_0^\\infty x^{p+\\alpha} e^{-x} \\frac{dx}{x} = \\Gamma(p+\\alpha).$$\n\nPlugging this into the right hand side of $$(2)$$ yields\n\n$$E[X^p] = \\frac{\\Gamma(p+\\alpha)}{\\Gamma(\\alpha)}.$$\n\nIt looks like we had better have $$p+\\alpha \\gt 0$$ in order for this to converge, as noted previously.\n\nAs a double-check, we may use our formula to compute the first few moments and compare them to, say, what Wikipedia says. For the mean we obtain\n\n$$E(X^1) = \\frac{\\Gamma(1+\\alpha)}{\\Gamma(\\alpha)} = \\alpha$$\n\nand for the second (raw) moment,\n\n$$E(X^2) = \\frac{\\Gamma(2+\\alpha)}{\\Gamma(\\alpha)} = \\alpha(\\alpha+1).$$\n\nConsequently the variance is $$E(X^2) - E(X)^2 = \\alpha(\\alpha+1) - \\alpha^2 = \\alpha.$$\n\nThese results agree perfectly with the authority. There are no convergence problems because since $$\\alpha\\gt 0$$, both $$\\alpha+1 \\gt 0$$ and $$\\alpha+2 \\gt 0$$.\n\nYou may now safely plug in $$p=-2$$ and draw your conclusions about the original question. Remember to check the conditions under which the answer exists. And don't forget to change the units of $$X$$ back to the original ones: that will multiply your answer by $$\\beta^p$$ (or $$\\beta^{-p}$$, depending on what whether you think $$\\beta$$ is a scale or a rate).\n\nAssuming you're concerning random variable of Gamma distribution with shape $\\alpha > 0$ and rate $\\beta > 0$ parameters, that is $X \\sim Gamma(\\alpha,\\beta)$, you can find $\\mathbb{E}[\\frac{1}{X^2}]$ in the following manner:\n\nFor any random variable X of continuous distribution (like Gamma) for which $f$ denotes its probability density function (in your example $f(x) = \\frac{\\beta^{\\alpha}}{\\Gamma(\\alpha)} x^{\\alpha - 1}e^{- \\beta x}$) and for any function $g$ of this variable (in your case $g(x) = \\frac{1}{x^2} = x^{-2}$), it holds: $$\\mathbb{E}[g(x)] = \\int\\limits_{-\\infty}^{+ \\infty}g(x)f(x)dx$$\n\nIn your example, it simplifies very much (pay attention on $-3$): $$g(x)f(x) = \\frac{\\beta^{\\alpha}}{\\Gamma(\\alpha)} x^{\\alpha - 3}e^{- \\beta x}$$ The fraction doesn't depend on $x$, so it can be put outside an integral.\n\nBy the way, for discrete distribution it's very similar: $$\\mathbb{E}[g(x)] = \\sum\\limits_{x \\in \\mathcal{X}} g(x)f(x), ~~\\text{where}~\\mathcal{X}~\\text{denotes support for X (set of values it can take)}$$\n\nI won't keep you in suspense any longer. First of all, recall that $\\Gamma(\\alpha+1) = \\alpha \\cdot \\Gamma(\\alpha)$.\n\nLet $f_{\\alpha}(x) = \\frac{\\beta^{\\alpha}}{\\Gamma(\\alpha)} x^{\\alpha - 1}e^{- \\beta x}$. Combining these two results in a straightforward observation: $$x \\cdot f_{\\alpha}(x) = \\frac{\\alpha}{\\beta} \\cdot f_{\\alpha+1}(x)$$ Consecutively: $$\\frac{f_{\\alpha+1}(x)}{x} = \\frac{\\beta}{\\alpha} \\cdot f_{\\alpha}(x)$$ Using this twice, you will get the result:\n\n$$\\frac{f_{\\alpha}(x)}{x^2} = \\frac{\\beta}{\\alpha-1} \\cdot \\frac{f_{\\alpha-1}(x)}{x} = \\frac{\\beta}{\\alpha-1} \\cdot \\frac{\\beta}{\\alpha-2} \\cdot f_{\\alpha-2}(x)$$ Ultimately (as $f_{\\alpha-2}(x)$ is also PDF which integral equals $1$): $$\\mathbb{E}(\\frac{1}{X^2}) = \\int\\limits_{-\\infty}^{+\\infty} \\frac{f_{\\alpha}(x)}{x^2} dx = \\frac{\\beta}{\\alpha-1} \\cdot \\frac{\\beta}{\\alpha-2} \\cdot \\int\\limits_{-\\infty}^{+\\infty} f_{\\alpha-2}(x) dx = \\frac{\\beta}{\\alpha-1} \\cdot \\frac{\\beta}{\\alpha-2}$$ This solution above is for this particular case, but as whuber pointed out, the more general case for any real and positive $p \\in \\mathbb{R},~p >0$ it holds: $$\\mathbb{E}(X^p) = \\beta^p \\cdot \\frac{\\Gamma(\\alpha + p)}{\\Gamma(\\alpha)}$$\n\n• @TJ Phu Let us know with what you reallly have problem, maybe with computing this integral? Anyway, let us know. However, try to follow gung and Silverfish comments and improve the overall layout of the question. – Adam Przedniczek Feb 25 '16 at 22:49\n• @TJ Phu Maybe my very first remark about doing raw integration was a bit misleading. Let me know whether you completly understand my solution (simply by accepting /ticking my or whuber answer). – Adam Przedniczek Feb 26 '16 at 8:57"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.81785256,"math_prob":0.9998981,"size":6577,"snap":"2020-34-2020-40","text_gpt3_token_len":2068,"char_repetition_ratio":0.15791875,"word_repetition_ratio":0.010822511,"special_character_ratio":0.3284172,"punctuation_ratio":0.08339953,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000035,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-08T21:48:14Z\",\"WARC-Record-ID\":\"<urn:uuid:6e867512-0db7-4634-a3a9-90ecc5569f70>\",\"Content-Length\":\"170257\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:661f1918-255b-4ffc-92d8-ad3adfcfa6bf>\",\"WARC-Concurrent-To\":\"<urn:uuid:1fe55927-fe8f-4ffe-9a73-f4959d2ef7cb>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://stats.stackexchange.com/questions/198595/expected-value-of-gamma-distribution/198602\",\"WARC-Payload-Digest\":\"sha1:NPNCB26BLVWJXIC3RSEEIISAHQBCO6XL\",\"WARC-Block-Digest\":\"sha1:EISSFJ6EMXUCOJT2NGKRXRVXJKJ3SPIW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738351.71_warc_CC-MAIN-20200808194923-20200808224923-00364.warc.gz\"}"} |
https://www.slideserve.com/wenda/categorical-data | [
"",
null,
"Download Presentation",
null,
"Categorical Data\n\nLoading in 2 Seconds...\n\n# Categorical Data - PowerPoint PPT Presentation\n\nCategorical Data. Ziad Taib Biostatistics AstraZeneca February 2014. Types of Data. Continuous Blood pressure Time to event. Categorical sex. quantitative. qualitative. Discrete No of relapses. Ordered Categorical Pain level. Types of data analysis (Inference). Parametric Vs",
null,
"I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.\nDownload Presentation",
null,
"## Categorical Data\n\nAn Image/Link below is provided (as is) to download presentation\n\nDownload Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -\nPresentation Transcript\n1. Categorical Data ZiadTaib Biostatistics AstraZeneca February 2014\n\n2. Types of Data Continuous Blood pressure Time to event Categorical sex quantitative qualitative Discrete No of relapses Ordered Categorical Pain level\n\n3. Types of data analysis (Inference) Parametric Vs Non parametric Model based Vs Data driven Frequentist Vs Bayesian\n\n4. Categorical data In a RCT, endpoints and surrogate endpoints can be categorical or ordered categorical variables. In the simplest cases we have binary responses (e.g. responders non-responders). In Outcomes research it is common to use many ordered categories (no improvement, moderate improvement, high improvement).\n\n5. Binary variables • Sex • Mortality • Presence/absence of an AE • Responder/non-responder according to some pre-defined criteria • Success/Failure\n\n6. Inference problems • Binary data (proportions) • One sample • Paired data • Ordered categorical data • Combining categorical data • Logistic regression • A Bayesian alternative • ODDS and NNT\n\n7. Categorical data In a RCT, endpoints and surrogate endpoints can be categorical or ordered categorical variables. In the simplest cases we have binary responses (e.g. responders non-responders). In Outcomes research it is common to use many ordered categories (no improvement, moderate improvement, high improvement).\n\n8. Bernoulli experiment Success1 With probability p Random experience Failure0 Hole in one? With probability1-p\n\n9. Binary variables • Sex • Mortality • Presence/absence of an AE • Responder/non-responder according to some pre-defined criteria • Success/Failure\n\n10. Estimation • Assume that a treatment has been applied to n patients and that at the end of the trial they were classified according to how they responded to the treatment: 0 meaning not cured and 1 meaning cured. The data at hand is thus a sample of n independent binary variables • The probability of being cured by this treatment can be estimated by satisfying\n\n11. Hypothesis testing • We can test the null hypothesis • Using the test statistic • When n is large, Z follows, under the null hypothesis, the standard normal distribution (obs! Not when p very small or very large).\n\n12. Hypothesis testing • For moderate values of n we can use the exact Bernoulli distribution of leading to the sum being Binomially distributed i.e. • As with continuous variables, tests can be used to build confidence intervals.\n\n13. Example 1: Hypothesis test based on binomial distr. Consider testing H0: P=0.5 against Ha: P>0.5 and where: n=10 and y=number of successes=8 p-value=(probability of obtaining a result at least as extreme as the one observed)=Prob(8 or more responders)=P8+ P9+ P10=={using the binomial formula}=0.0547\n\n14. Example 2 RCT of two analgesic drugs A and B given in a random order to each of 100 patients. After both treatment periods, each patient states a preference for one of the drugs. Result: 65 patients preferred A and 35 B\n\n15. Example (cont’d) Hypotheses: H0: P=0.5 against H1: P0.5 Observed test-statistic: z=2.90 p-value: p=0.0037 (exact p-value using the binomial distr. = 0.0035) 95% CI for P: (0.56 ; 0.74)\n\n16. Two proportions • Sometimes we want to compare the proportion of successes in two separate groups. For this purpose we take two samples of sizes n1 and n2. We let yi1 and pi1 be the observed number of subjects and the proportion of successes in the ith group. The difference in population proportions of successes and its large sample variance can be estimated by\n\n17. Two proportions (continued) • Assume we want to test the null hypothesis that there is no difference between the proportions of success in the two groups (p11=p12). Under the null hypothesis, we can estimate the common proportion by • Its large sample variance is estimated by • Leading to the test statistic\n\n18. In a trial for acute ischemic stroke *early improvement defined on a neurological scale Example Point estimate: 0.080 (s.e.=0.0397) 95% CI: (0.003 ; 0.158) p-value: 0.043\n\n19. Two proportions (Chi square) • The problem of comparing two proportions can sometimes be formulated as a problem of independence! Assume we have two groups as above (treatment and placebo). Assume further that the subjects were randomized to these groups. We can then test for independence between belonging to a certain group and the clinical endpoint (success or failure). The data can be organized in the form of a contingency table in which the marginal totals and the total number of subjects are considered as fixed.\n\n20. 2 x 2 Contingency table R E S P O N S E T R E A T M E N T\n\n21. 2 x 2 Contingency table R E S P O N S E T R E A T M E N T\n\n22. Hyper geometric distribution • n balls are drawn at random without • replacement. • Y is the number of white balls • (successes) • Y follows the Hyper geometric • Distribution with parameters (N, W, n) Urn containing W white balls and R red balls: N=W+R\n\n23. Contingency tables • N subjects in total • y.1 of these are special (success) • y1. are drawn at random • Y11 no of successes among these y1. • Y11 is HG(N,y.1,y 1.) in general\n\n24. Contingency tables • The null hypothesis of independence is tested using the chi square statistic • Which, under the null hypothesis, is chi square distributed with one degree of freedom provided the sample sizes in the two groups are large (over 30) and the expected frequency in each cell is non negligible (over 5)\n\n25. Contingency tables • For moderate sample sizes we use Fisher’s exact test. According to this calculate the desired probabilities using the exact Hyper-geometric distribution. The variance can then be calculated. To illustrate consider: • Using this and expectation m11 we have the randomization chi square statistic. With fixed margins only one cell is allowed to vary. Randomization is crucial for this approach.\n\n26. The (Pearson) Chi-square test 35 contingency table The Chi-square test is used for testing the independence between the two factors\n\n27. The test-statistic is: The (Pearson) Chi-square test p where Oij = observed frequencies and Eij = expected frequencies (under independence) the test-statistic approximately follows a chi-square distribution\n\n28. NINDS again Observed frequencies Expected frequencies Example 5Chi-square test for a 22 table Examining the independence between two treatments and a classification into responder/non-responder is equivalent to comparing the proportion of responders in the two groups\n\n29. p0=(122+147)/(324)=0.43 • v(p0)=0.00157 which gives a p-value of 0.043 in all these cases.This implies the drug is better than placebo. However when using Fisher’s exact test or using a continuity correction the chi square test the p-value is 0.052.\n\n30. SAS| output\n\n31. Odds, Odds Ratios and relative Risks The odds of success in group i is estimated by The odds ratio of success between the two groups i is estimated by Define risk for success in the ith group as the proportion of cases with success. The relative risk between the two groups is estimated by\n\n32. Categorical data • Nominal • E.g. patient residence at end of follow-up (hospital, nursing home, own home, etc.) • Ordinal (ordered) • E.g. some global rating • Normal, not at all ill • Borderline mentally ill • Mildly ill • Moderately ill • Markedly ill • Severely ill • Among the most extremely ill patients\n\n33. Categorical data & Chi-square test The chi-square test is useful for detection of a general association between treatment and categorical response (in either the nominal or ordinal scale), but it cannot identify a particular relationship, e.g. a location shift.\n\n34. Nominal categorical data Chi-square test: 2 = 3.084 , df=4 , p = 0.544\n\n35. Ordered categorical data • Here we assume two groups one receiving the drug and one placebo. The response is assumed to be ordered categorical with J categories. • The null hypothesis is that the distribution of subjects in response categories is the same for both groups. • Again the randomization and the HG distribution lead to the same chi square test statistic but this time with (J-1) df. Moreover the same relationship exists between the two versions of the chi square statistic.\n\n36. The Mantel-Haensel statistic The aim here is to combine data from several (H) strata for comparing two groups drug and placebo. The expected frequency and the variance for each stratum are used to define the Mantel-Haensel statistic which is chi square distributed with one df.\n\n37. Logistic regression • Consider again the Bernoulli situation, where Y is a binary r.v. (success or failure) with p being the success probability. Sometimes Y can depend on some other factors or covariates. Since Y is binary we cannot use usual regression.\n\n38. Logistic regression • Logistic regression is part of a category of statistical models called generalized linear models (GLM). This broad class of models includes ordinary regression and ANOVA, as well as multivariate statistics such as ANCOVA and loglinear regression. An excellent treatment of generalized linear models is presented in Agresti (1996). • Logistic regression allows one to predict a discrete outcome, such as group membership, from a set of variables that may be continuous, discrete, dichotomous, or a mix of any of these. Generally, the dependent or response variable is dichotomous, such as presence/absence or success/failure.\n\n39. Simple linear regression Table 1 Age and systolic blood pressure (SBP) among 33 adult women\n\n40. SBP (mm Hg) Age (years) • adapted from Colton T. Statistics in Medicine. Boston: Little Brown, 1974\n\n41. Simple linear regression • Relation between 2 continuous variables (SBP and age) • Regression coefficient b1 • Measures associationbetween y and x • Amount by which y changes on average when x changes by one unit • Least squares method y Slope x\n\n42. Multiple linear regression • Relation between a continuous variable and a setofi continuous variables • Partial regression coefficients bi • Amount by which y changes on average when xi changes by one unit and all the other xis remain constant • Measures association between xi and y adjusted for all other xi • Example • SBP versus age, weight, height, etc\n\n43. Multiple linear regression Predicted Predictor variables Response variable Explanatory variables Outcome variable Covariables Dependent Independent variables\n\n44. Logistic regression Table 2 Age and signs of coronary heart disease (CD)\n\n45. How can we analyse these data? • Compare mean age of diseased and non-diseased • Non-diseased: 38.6 years • Diseased: 58.7 years (p<0.0001) • Linear regression?\n\n46. Dot-plot: Data from Table 2\n\n47. Logistic regression (2) Table 3Prevalence (%) of signs of CD according to age group\n\n48. Dot-plot: Data from Table 3 Diseased % Age group\n\n49. Logistic function (1) Probability ofdisease x\n\n50. { logit of P(y|x) Transformation"
] | [
null,
"https://www.slideserve.com/images/replay.png",
null,
"https://thumbs.slideserve.com/1_2562040.jpg",
null,
"https://www.slideserve.com/statload.gif",
null,
"https://www.slideserve.com/new/img/output_cBjjdt.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87913346,"math_prob":0.94089395,"size":9779,"snap":"2019-13-2019-22","text_gpt3_token_len":2107,"char_repetition_ratio":0.1140665,"word_repetition_ratio":0.082961075,"special_character_ratio":0.21280295,"punctuation_ratio":0.090437785,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99583054,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,2,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-21T07:41:13Z\",\"WARC-Record-ID\":\"<urn:uuid:cbaa4bfc-4a90-4163-b38e-f5b812e15f2a>\",\"Content-Length\":\"76884\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f5062113-9031-4555-93a0-e30bb9b9dee7>\",\"WARC-Concurrent-To\":\"<urn:uuid:3939dc58-5706-4064-9e71-f1a564b0fbff>\",\"WARC-IP-Address\":\"52.11.254.21\",\"WARC-Target-URI\":\"https://www.slideserve.com/wenda/categorical-data\",\"WARC-Payload-Digest\":\"sha1:KZORCSBINKH4G4K5TGQHTEW6JC757TSY\",\"WARC-Block-Digest\":\"sha1:PMMAVO7WS35BI7BSZ3GTSDH33ALINCKE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232256281.35_warc_CC-MAIN-20190521062300-20190521084300-00112.warc.gz\"}"} |
https://math.stackexchange.com/questions/1550889/bucket-puzzle-probability-problem | [
"Bucket Puzzle Probability Problem\n\nYou have 2 buckets. One full of white marbles and the other full of black marbles (equal amounts). How do you allocate the marbles into two buckets in a way that maximizes your probability of picking 2 white ones when you pick 1 marble from each bucket?\n\nI would assume its 50/50? But how to justify it?\n\nHint: You could guarantee one bucket gave a white marble, while making the other bucket about (slightly less than) $50\\%$ likely to give a white marble.\n\nI'm assuming that equal amounts means that, when we allocate the marbles, there must always be a same amount in both buckets, otherwise, as paw88789 says, we could make the probability approach 50% if we put one white marble in one bucket and all the other marbles in the other bucket.\n\nIf we must always have equal amounts, i.e. proportions, in each bucket, however, then if $r$ is the proportion of white marbles in one bucket, $1-r$ must be the proportion in the other bucket. Hence the probability of picking white marbles in both buckets will be $r(1-r)=r-r^2$. Setting the derivative equal to zero to maximize, we see the critical value is at $$1-2\\hat{r}=0\\\\\\hat{r}=0.5,$$ as you had assumed.\n\nYou can justify if you write the probability equations. You have the probability p1 for one bucket to take in the first attempt a white marble, the same for a probability p2.\n\nWe assume marbles are equally to be taken and the total amount is the same in the two buckets, where the total is 2M, where M is the number of total white marbles and the same quantity for black marbles, and M is too the amount of marbles in a bucket.\n\nIn one bucket the probability to take an white marble will be $\\frac{W1}{M}$ where W1 is the total number of white marbles in the first bucket and $W1\\in\\{0,1,...,M\\}$.\n\nIn the second bucket the probability to take a white marble will be $\\frac{M-W1}{M}$ because in total the number of white marbles in the two buckets is M as I said before.\n\nThe total probability to take both white marbles, from bucket one and bucket two is $P1\\cdot P2=\\frac{W1}{M}\\cdot\\frac{M-W1}{M}$. The maximum value will be when $W1(M-W1)$ will be max i.e. if $f(W1)=M\\cdot W1 -W1^2$ the maximum value happens in some solution to $f'(W1)=0\\$ i.e.:\n\n$$M-2\\cdot W1=0 \\to W1=\\frac{M}{2}$$\n\nThe original question does not specify the size of the buckets. Therefore, you put one white marble in one bucket and the rest of the marbles into the other bucket.\n\nYou have then increased your chances from 50% to ~ 75% on average\n\n• The chances to get two white with that distribution are about 50%, but this is an increase from the 25% for an unbiased distribution. – quid Sep 24 '16 at 15:14\n• Can you prove this is the best answer? – user428487 Apr 24 '18 at 2:50"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8765529,"math_prob":0.99483466,"size":1085,"snap":"2019-26-2019-30","text_gpt3_token_len":314,"char_repetition_ratio":0.17761332,"word_repetition_ratio":0.032258064,"special_character_ratio":0.28479263,"punctuation_ratio":0.08979592,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99979144,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-27T12:01:28Z\",\"WARC-Record-ID\":\"<urn:uuid:cfa878ad-d6c3-4e20-9b00-431f6aa29af6>\",\"Content-Length\":\"154724\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:487c1b00-56d2-495a-818a-9c2e0cde68c1>\",\"WARC-Concurrent-To\":\"<urn:uuid:57cf4b53-3b21-4993-825c-996206fcd5da>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/1550889/bucket-puzzle-probability-problem\",\"WARC-Payload-Digest\":\"sha1:UUJODT4HLA6YW3QVCTSUS2GPW3HQPHE6\",\"WARC-Block-Digest\":\"sha1:JJJJWWAVVT35S5NGZLEKCAASJZ76JSMO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560628001138.93_warc_CC-MAIN-20190627115818-20190627141818-00237.warc.gz\"}"} |
https://file.scirp.org/Html/10-3700843_80013.htm | [
" Robust Multi-Objective Optimization of Chromatographic Rare Earth Element Separation\n\nAdvances in Chemical Engineering and Science\nVol.07 No.04(2017), Article ID:80013,17 pages\n10.4236/aces.2017.74034\n\nRobust Multi-Objective Optimization of Chromatographic Rare Earth Element Separation\n\nHans-Kristian Knutson, Anders Holmqvist, Niklas Andersson, Bernt Nilsson*\n\nDepartment of Chemical Engineering, Centre for Chemistry and Chemical Engineering, Lund University, Lund, Sweden",
null,
"",
null,
"",
null,
"",
null,
"Received: July 5, 2017; Accepted: October 28, 2017; Published: October 31, 2017\n\nABSTRACT\n\nRare earth elements are strategic commodities in many countries, and an important resource for the growing modern technology industry. As such, there is an increasing interest for development of rare earth element processing, and this work is a part of further development of chromatography as a rare earth element separation process method. Process optimization is pivotal for process development, and it is common that several competing objectives must be regarded. Chromatographic separation processes often consider competing objectives, such as productivity, yield, pool concentration and modifier consumption, which leads to Pareto optimal solutions. Adding robustness to a process is of great importance to account for process disturbances and uncertainties but generally comes with reduced performance of the other process objectives as a trade off. In this study, a model-based robust multi-objective optimization was carried out for batch-wise chromatographic separation of the rare earth elements samarium, europium and gadolinium, which was considered highly un-robust due to the neighbouring peaks proximity to the product pooling horizon. The results from the robust optimization were used to chart the required operation point changes for keeping the amount of failed batches at an acceptable level when a certain level of process disturbance was introduced. The loss of process performance due to the gained robustness was found to be in the range of 10% - 20% reduced productivity when comparing the robust and un-robust Pareto solutions at Pareto points with identical yield. The methodology presented shows how to increase robustness to a highly un-robust system while still keeping multiple objectives at their optima.\n\nKeywords:\n\nRare Earth Elements, Chromatography, Multi-Objective Optimization,",
null,
"Robust Optimization\n\n1. Introduction\n\nRare earth elements (REE) are extensively used in modern technological industries - , and are considered as strategic commodities in many countries . REE minerals with varying compositions are found at deposits throughout the world , though most of the global REE supply comes from only a few sources . By using liquid-liquid extraction methods, the elements are separated from the minerals and upgraded to suitable purity levels for commercial applications . However, several experimental and model-based studies have accentuated chromatography as an alternative method with considerable benefits - . This study is intended as a contribution to the work of developing chromatography as an REE separation method, and focuses on preparative chromatographic batch separation of the middle REE group, samarium (Sm), europium (Eu) and gadolinium (Gd), where Eu is the target product due to its’ higher commercial value. It is a continuation of an experimental optimization study , which was followed by a model based multi-objective optimization (MOO) study where a process optimization strategy was presented. The current work complements the previous studies by introducing robust multi-objective optimization. This is utilized for mapping the required operation point changes, needed to keep the number of failed batches at an acceptable level when a certain level of process disturbance is introduced, as well as evaluating the performance change that is accounted for when formulating a robust counterpart problem.\n\nSince mathematical modelling offers a cost efficient and powerful approach for assessing preparative chromatography - , it has been employed as the preferred tool for evaluating and optimizing the chromatographic system in this study. The optimization of a chromatography system is ordinarily cast in a bi-level framework : 1) the upper level that administer the effects of the decision variables, such as load and elution gradient, that governs the chromatogram, and 2) the lower level that establishes the pooling strategy for deciding the product pooling cut-times. A MOO method is needed when competing optimization objectives, such as productivity and yield, are considered. The MOO strategy in this work, as presented in , provides with an intact optimization objective for all levels of the bi-level optimization and firm objective values when evaluating the multi-objective optimization problem (MOP). However, the nominal solution for a MOP is not necessarily robust, and even small process disturbances may cause process failure. This calls for a transformation of the MOP into its’ robust counterpart problem .\n\nApproaches for introducing robustness to process optimizations are readily available in literature, and robust optimization for chromatography in particular are, amongst others, presented in - . The preferred robust optimization method used in this work is similar to the methods presented in , with the difference of that this study exclusively utilizes a stochastic method to obtain the model responses of the introduced process disturbances.\n\nThe main focus of this study was to perform a robust multi-objective optimization of chromatographic REE separation. In this context, an experimentally validated process model from a previous study was used to generate the process system response. The results from the robust multi-objective optimization were used to assess the robustness of the system, chart the process parameter changes when robustness was introduced, and evaluate the expected loss of performance when robustness was applied.\n\n2. Chromatography Model\n\n2.1. Process Description\n\nThe chromatography model in this work is based on an experimental study of batch chromatography separation of Sm, Eu and Gd . The experimental study utilized an Agilent 1200 series HPLC system (Agilent Technologies, Waldbronn, Germany) and a Kromasil M3 (Eka, Bohus, Sweden) column with the dimensions 150 × 4.6 mm. An inductively coupled plasma mass spectrometry (ICP-MS) system (Agilent Technologies, Tokyo, Japan) was used for in-line post column REE detection. The column stationary phase was made of spherical, C18 coated, silica particles with a diameter of 16 μm and a pore size of 100 Å. Each column had a ligand concentration of 342 mM Bis (2-ethylhexyl) phosphoric acid (Sigma-Aldrich, St. Louis, USA), and the elution gradient concentration was set to vary between 6% - 13% (vol) of 7 M nitric acid over a gradient length of 5 column volumes (CV).\n\n2.2. Chromatography Model\n\nThe chromatography model in this study has been presented in a previous publication , and is reproduced here for the purpose of clarity. The column separation was described through a kinetic dispersive model with a Langmuir mobile phase modulator isotherm . The model equations, defined in the spatial, $z\\in \\left[{z}_{0},{z}_{f}\\right]$ , and temporal, $t\\in \\left[{t}_{0},{t}_{f}\\right]$ , domains are given by:\n\n$\\frac{\\partial {c}_{\\alpha }}{\\partial t}=-\\frac{\\partial }{\\partial z}\\left({c}_{\\alpha }{v}_{\\text{int}}-{D}_{\\text{app,}\\alpha }\\frac{\\partial {c}_{\\alpha }}{\\partial z}\\right)-\\frac{\\left(1-{\\epsilon }_{c}\\right)}{{\\epsilon }_{c}+\\left(1-{\\epsilon }_{c}\\right){\\epsilon }_{p}}\\frac{\\partial {q}_{\\alpha }}{\\partial t},$ (1)\n\n$\\frac{\\partial {q}_{\\alpha }}{\\partial t}={k}_{\\text{kin},\\alpha }\\left({c}_{\\alpha }{K}_{eq,\\alpha }{q}_{\\mathrm{max},\\alpha }\\left[1-\\underset{\\gamma \\in \\left\\{\\text{Sm,Eu,Gd}\\right\\}}{\\sum }\\frac{{q}_{\\gamma }}{{q}_{\\text{max},\\gamma }}\\right]-{q}_{\\alpha }{c}_{S}^{{\\nu }_{\\alpha }}\\right),$ (2)\n\nwhere ${c}_{\\alpha }$ and ${q}_{\\alpha }$ are the mobile and solid phase concentration of component $\\alpha \\in \\left\\{\\text{Sm},\\text{Eu},\\text{Gd},\\text{S}\\right\\}$ , ${v}_{\\text{int}}$ is the quotient of superficial velocity over total porosity, ${D}_{\\text{app,α}}$ the apparent dispersion coefficient, and ${\\epsilon }_{c}$ and ${\\epsilon }_{p}$ the column and particle void fractions. Here, ${c}_{S}$ denotes the concentration of the modifier (i.e. nitric acid), ${k}_{\\text{kin},\\alpha }$ a parameter describing the kinetics, ${K}_{eq,\\alpha }$ the equilibirum constant regarding adsorption and desorption, ${\\nu }_{\\alpha }$ a parameter describing the ion-exchange characteristics, and ${q}_{\\text{max},\\alpha }$ the maximum concentration of adsorbed components. The model does not consider modifier ions on the solid phase, therefore Equation (2) and its associated part in Equation (1) are omitted (i.e. $\\partial {q}_{\\alpha }/\\partial t\\equiv 0$ ) when $\\alpha =S$ . Equation (1) is complemented with Danckwert boundary conditions :\n\n$\\begin{array}{l}{c}_{\\alpha }\\left(t,{z}_{0}\\right){v}_{\\text{int}}-{D}_{\\text{app,α}}\\frac{\\partial {c}_{\\alpha }}{\\partial z}\\left(t,{z}_{0}\\right)\\\\ =\\left(\\begin{array}{ll}{c}_{\\text{load},\\alpha }{v}_{\\text{int}}\\Pi \\left(t,{t}_{0},\\Delta {t}_{\\text{load}}\\right)\\hfill & \\text{ }\\text{if}\\text{\\hspace{0.17em}}\\text{ }\\alpha \\in \\left\\{\\text{Sm,Eu,Gd}\\right\\},\\hfill \\\\ {c}_{\\text{mix},S}{v}_{\\text{int}}\\hfill & \\text{ }\\text{if}\\text{\\hspace{0.17em}}\\text{ }\\alpha =S,\\hfill \\end{array}\\end{array}$ (3)\n\n$\\frac{\\partial {c}_{\\alpha }}{\\partial z}\\left(t,{z}_{f}\\right)=0,\\text{ }\\forall \\alpha \\in \\left\\{\\text{Sm},\\text{Eu},\\text{Gd},\\text{S}\\right\\}$ (4)\n\nwhere ${c}_{\\text{load},\\alpha }$ is the injected load concentration, and $\\Pi \\left(t,{t}_{0},\\Delta {t}_{\\text{load}}\\right)\\in \\left\\{0,1\\right\\}$ a rectangular function in the temporal horizon $\\left[{t}_{0},\\Delta {t}_{\\text{load}}\\right]$ . The dynamics of the modifier concentration in the upstream mixing tank, ${c}_{\\text{mix},S}$ , are given by:\n\n$\\frac{\\text{d}{c}_{\\text{mix},S}}{\\text{d}t}=\\frac{1}{{\\tau }_{\\text{mix}}}\\left(u\\left(t\\right)-{c}_{\\text{mix},S}\\right),$ (5)\n\n$u\\left(t\\right)=\\left(\\begin{array}{ll}{u}_{0},\\hfill & \\text{ }\\text{if}\\text{\\hspace{0.17em}}\\text{ }t\\le \\Delta {t}_{\\text{load}}+\\Delta {t}_{\\text{wash}},\\hfill \\\\ {u}_{0}+t-\\left(\\Delta {t}_{\\text{load}}+\\Delta {t}_{\\text{wash}}\\right),\\hfill & \\text{ }\\text{if}\\text{\\hspace{0.17em}}\\text{ }t>\\Delta {t}_{\\text{load}}+\\Delta {t}_{\\text{wash}},\\hfill \\end{array}$ (6)\n\nwhere ${\\tau }_{\\text{mix}}$ is the residence time, $u$ is the elution gradient described by the initial value, ${u}_{0}$ , and the slope of the linear elution gradient, $\\Delta u$ , expressed as\n\n$\\Delta u=\\frac{{u}_{f}-{u}_{0}}{{t}_{f}-\\left(\\Delta {t}_{\\text{load}}+\\Delta {t}_{\\text{wash}}\\right)}$ .\n\nThe first-order spatial derivative in Equation (1) was approximated using a method-of-lines and finite volume method with 100 grid points where ${z}_{k}=k\\Delta z$ is the discretized spatial coordinate and $k\\in \\left[1,100\\right]$ . The first order derivative was approximated as a two-point backward difference, and the second-order derivative was approximated as a three-point central difference. The model parameter values from were used in this study, and are given in Table 1.\n\n3. Robust Multi-Objective Optimization\n\n3.1. Multi-Objective Optimization\n\nThe multi-objecitve optimization problem formulation in this work resembles that of a previous study , with the difference of that this work only considers the two competing objectives yield and productivity. This is in order to benchmark the proposed robust optimization method with a previous bi-objective robust optimization method . In this study, the column outlet concentration profile, ${c}_{\\alpha }\\left(t,{z}_{f}\\right)$ where $\\alpha \\in \\left\\{\\text{Sm},\\text{Eu},\\text{Gd}\\right\\}$ , was used for evaluation of the competing objective functions yield, ${Y}_{\\alpha }$ and productivity, ${P}_{\\alpha }$ for the target component Eu. The objective functions for the collected component, $\\alpha$ , between the\n\nTable 1. Model parameter values.\n\ncut-times $\\left[{t}_{c},{t}_{f}\\right]$ are defined as:\n\n${\\delta }_{\\text{load},\\alpha }\\frac{\\text{d}{Y}_{\\alpha }}{\\text{d}t}={c}_{\\alpha }\\left(t,{z}_{f}\\right){v}_{\\text{int}}{A}_{c}\\Pi \\left(t,{t}_{c},{t}_{f}\\right),$ (7)\n\n$\\frac{\\text{d}{P}_{\\alpha }}{\\text{d}t}=\\frac{1}{{V}_{c}}\\frac{1}{{t}_{f}+{t}_{r}}{\\delta }_{\\text{load},\\alpha }\\frac{\\text{d}{Y}_{\\alpha }}{\\text{d}t},$ (8)\n\nwhere ${\\delta }_{\\text{load},\\alpha }={c}_{\\text{load},\\alpha }{v}_{\\text{int}}{A}_{c}\\Delta {t}_{\\text{load}}$ is the total amount of injected sample, ${A}_{c}$ and Vc the column cross-sectional area and volume, and ${t}_{r}=2{V}_{c}{\\stackrel{˙}{Q}}^{-1}$ the regeneration and re-equilibration time following the final cut-time. Thus, the objective becomes to determine an optimal elution gradient, $u$ , batch load, ${\\delta }_{\\text{load},\\alpha }$ , and pooling cut-times, $\\left[{t}_{c},{t}_{f}\\right]$ , that maximizes ${Y}_{\\alpha }\\left({t}_{f}\\right)$ and ${P}_{\\alpha }\\left({t}_{f}\\right)$ , while fulfilling the target component purity constraint given by:\n\n${X}_{\\alpha }\\left({t}_{f}\\right)=\\frac{{\\delta }_{\\text{load},\\alpha }{Y}_{\\alpha }\\left({t}_{f}\\right)}{\\underset{\\beta \\in \\left\\{\\text{Sm},\\text{Eu},\\text{Gd}\\right\\}}{\\sum }{\\delta }_{\\text{load},\\beta }{Y}_{\\beta }\\left({t}_{f}\\right)},$ (9)\n\nwhere the numerator is the captured amount of the target component in $\\left[{t}_{c},{t}_{f}\\right]$ and the denominator represents the total amount of captured components.\n\nThe weighted sum scalarization method was used to combine the objectives in Equations (7)-(8) to a single objective with the weight for productivity defined as $\\omega \\in \\left[0,1\\right]$ , and the weight for yield defined as $1-\\omega$ . The decision variables are the free operating parameters, i.e. $\\Delta {t}_{\\text{load}},{t}_{c},{t}_{f},{u}_{0}$ and ${u}_{f}$ , which in turn determine the trajectories $x=\\left({c}_{\\alpha }\\left(t,{z}_{k}\\right),{c}_{S}\\left(t,{z}_{k}\\right),{c}_{\\text{mix},S}\\left(t\\right),{q}_{\\alpha }\\left(t,{z}_{k}\\right),{P}_{\\text{Eu}}\\left(t\\right),{Y}_{\\text{Eu}}\\left(t\\right),{X}_{\\text{Eu}}\\left(t\\right)\\right)$ . The resulting optimization problem can then be set in the framework for min-min optimal control:\n\n$\\text{min}\\text{.}\\text{ }\\text{ }-\\left(\\omega \\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{P}_{\\text{Eu}}}{\\text{d}t}\\text{d}t+\\left(1-\\omega \\right)\\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{Y}_{\\text{Eu}}}{\\text{d}t}\\text{d}t\\right),$ (10a)\n\n$\\text{w}\\text{.r}\\text{.t}\\text{.}\\text{ }p=\\left(\\Delta {t}_{\\text{load}},{u}_{0},{u}_{f}\\right)\\in {ℝ}^{3},$\n\n$\\text{s}\\text{.t}\\text{.}\\text{ }\\text{ }{p}_{L}\\le p\\le {p}_{U},$ (10b)\n\n$\\left(x,{t}_{c},{t}_{f}\\right)=\\text{argmin}\\text{.}-\\left(\\omega \\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{P}_{\\text{Eu}}}{\\text{d}t}\\text{d}t+\\left(1-\\omega \\right)\\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{Y}_{\\text{Eu}}}{\\text{d}t}\\text{d}t\\right),\\text{ }$ (10c)\n\n$\\text{w}\\text{.r}\\text{.t}\\text{.}\\text{ }\\left({t}_{c},{t}_{f}\\right)\\in {ℝ}^{2},$\n\n$\\text{s}\\text{.t}\\text{.}\\text{ }\\stackrel{˙}{x}=F\\left(t,x\\left(t\\right),{t}_{c},{t}_{f},p\\right),\\text{ }x\\left({t}_{0}\\right)={x}_{0},$ (10d)\n\n${X}_{\\text{Eu},L}-{X}_{\\text{Eu}}\\left({t}_{f}\\right)\\le 0,$ (10e)\n\n${t}_{c,L}\\le {t}_{c}\\le {t}_{c,U},\\text{ }{t}_{f,L}\\le {t}_{f}\\le {t}_{f,U},$ (10f)\n\n$\\forall t\\in \\left[{t}_{0},{t}_{f}\\right],\\text{ }\\text{ }\\forall z\\in \\left[{z}_{0},{z}_{f}\\right].$\n\nThe solution of Equation (10) will result in a Pareto front situated on the boundary of the feasible region. This implies that a process disturbance, however slight, can cause a batch failure in terms of not meeting the purity constraint . In order to account for such disturbances it is necessary to formulate a robust counterpart problem, which in this study will be accomplished by introducing a back-off term to the purity inequality constraint in Equation (10e).\n\n3.2. Robust Multi-Objective Optimization Problem Formulation\n\nIn order to formulate a robust counterpart of Equation (10), we consider a set of bounded distributed disturbances, $\\stackrel{˜}{p}$ , on the free operating parameters, $p$ (i.e $\\Delta {t}_{\\text{load}},{u}_{0}$ and ${u}_{f}$ ), and define ${\\stackrel{˜}{X}}_{\\text{Eu}}$ as the cumulative purity distribution of the model responses that are produced from $\\stackrel{˜}{p}$ . A purity constraint back-off term, ${X}_{\\text{BF}}$ , is introduced in order to make the purity constraint robust with respect to the disturbances. The back-off term can essentially be seen as a safety margin that amplifies the purity inequality constraint in Equation (10e) so that the purity requirement, ${X}_{\\text{Eu,}L}$ , still can be met for the considered set of bounded disturbances. The success rate is defined as the fraction of batches in the disturbance set that fulfil the purity requirement, ${X}_{\\text{Eu,}L}$ , and ${\\Phi }_{{X}_{\\text{Eu}}}$ signifies the desired success rate. The following robust counterpart of Equation (10) is then given by:\n\n$\\text{min}\\text{.}\\text{ }\\text{ }\\underset{-\\infty }{\\overset{{X}_{\\text{Eu},L}+{X}_{\\text{BF}}}{\\int }}{\\stackrel{˜}{X}}_{\\text{Eu}}\\text{d}{X}_{\\text{Eu}}-{\\Phi }_{{X}_{\\text{Eu}}},$ (11a)\n\n$\\text{w}\\text{.r}\\text{.t}\\text{.}\\text{ }{X}_{\\text{BF}},$\n\n$\\text{s}\\text{.t}\\text{.}\\text{ }\\stackrel{˙}{\\stackrel{˜}{x}}=\\stackrel{˜}{F}\\left(t,x\\left(t\\right),{t}_{c},{t}_{f},\\stackrel{˜}{p}\\right),$ (11b)\n\n$\\stackrel{˜}{p}~N\\left(p,{\\sigma }_{p}^{2}\\right),$ (11c)\n\n$p=\\text{argmin}\\text{.}-\\left(\\omega \\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{P}_{\\text{Eu}}}{\\text{d}t}\\text{d}t+\\left(1-\\omega \\right)\\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{Y}_{\\text{Eu}}}{\\text{d}t}\\text{d}t\\right),$ (11d)\n\n$\\text{w}\\text{.r}\\text{.t}\\text{.}\\text{ }p=\\left(\\Delta {t}_{\\text{load}},{u}_{0},{u}_{f}\\right)\\in {ℝ}^{3},$\n\n$\\text{s}\\text{.t}\\text{.}\\text{ }{p}_{L}\\le p\\le {p}_{U},$ (11e)\n\n$\\left(x,{t}_{c},{t}_{f}\\right)=\\text{argmin}\\text{.}-\\left(\\omega \\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{P}_{\\text{Eu}}}{\\text{d}t}\\text{d}t+\\left(1-\\omega \\right)\\underset{{t}_{0}}{\\overset{{t}_{f}}{\\int }}\\frac{\\text{d}{Y}_{\\text{Eu}}}{\\text{d}t}\\text{d}t\\right),$ (11f)\n\n$\\text{w}\\text{.r}\\text{.t}\\text{.}\\text{ }\\left({t}_{c},{t}_{f}\\right)\\in {ℝ}^{2},$\n\n$\\text{s}\\text{.t}\\text{.}\\text{ }\\stackrel{˙}{x}=F\\left(t,x\\left(t\\right),{t}_{c},{t}_{f},p\\right),\\text{ }x\\left({t}_{0}\\right)={x}_{0},$ (11g)\n\n$\\left({X}_{\\text{Eu},L}+{X}_{\\text{BF}}\\right)-{X}_{\\text{Eu}}\\left({t}_{f}\\right)\\le 0,$ (11h)\n\n${t}_{c,L}\\le {t}_{c}\\le {t}_{c,U},\\text{ }{t}_{f,L}\\le {t}_{f}\\le {t}_{f,U},$ (11i)\n\n$\\forall t\\in \\left[{t}_{0},{t}_{f}\\right],\\text{ }\\forall z\\in \\left[{z}_{0},{z}_{f}\\right].$\n\nA decomposition strategy was adopted to transform the robust MOP into three levels: 1) the upper-level optimization problem given by Equations (11a)-(11c) with respect to ${X}_{\\text{BF}}$ , 2) the mid-level optimization problem given by Equations (11d)-(11e) with respect to p, and 3) the lower-level optimization problem given by Equations (11f)-(11i) and constrained by the ODE system, $F$ , governed by Equations (1), (2), (5), (7), (8), (9). Essentially, Equation (11) was solved by using the simulated system response, $\\stackrel{˜}{x}$ , for an uncertainty set of the free operating parameters, $\\stackrel{˜}{p}$ , to evaluate the cumulative distribution function of ${\\stackrel{˜}{X}}_{\\text{Eu}}$ . The back-off term, ${X}_{\\text{BF}}$ , in the purity inequality constraint, Equation (11h), was then incrementally increased to gain more successful batches in ${\\stackrel{˜}{X}}_{\\text{Eu}}$ , and thereby achieving a more robust process. This procedure was repeated iteratively until Equation (11a) was fulfilled, at which point Equation (11) was considered to be solved.\n\nIn this study, the desired success rate, ${\\Phi }_{{X}_{\\text{Eu}}}$ , was set to 0.95, and the decision variable boundaries are presented in Table 2.\n\n3.3. Optimization Method\n\nThe robust optimization method in this study is similar to the methods presented in . The main difference is that the model responses of the introduced disturbances in this study are obtained stochastically, instead of alternatively utilizing a deterministic approach through linearization of the uncertainty set. The stochastic approach has the benefit of being more straightforward, at the expense of an increased demand of computation power. This increased demand was accommodated for by using a parallel computing\n\nTable 2. Decision variables.\n\nmethodology as described in .\n\nAs a first step, the nominal and non-robust Pareto front was obtained by solving the MOP as defined in Equation (10). This was carried out through MATLAB’s fmincon function with a sequential quadratic programming algorithm, the BFGS formula for updating the approximation of the Hessian matrix, and central differences to estimate the gradient of the objective function and constraint functions. Then an uncertainty set, $\\stackrel{˜}{p}$ , with a normal distribution, assuming no covariance between the free operating parameters $p$ , a standard deviation $\\sigma$ , and sampling size of 10.000 was obtained via MATLAB’s lhsnorm function. The uncertainty set was applied to the investigated operating points on the nominal Pareto front, and the model responses were used to evaluate the cumulative purity distribution, ${\\stackrel{˜}{X}}_{\\text{Eu}}$ , of the uncertainty set.\n\nThen, an initial investigation of the back-off terms impact on ${\\stackrel{˜}{X}}_{\\text{Eu}}$ was conducted by creating new Pareto fronts with an incrementally increased back-off and observing how ${\\stackrel{˜}{X}}_{\\text{Eu}}$ changes when $\\stackrel{˜}{p}$ is applied to the investigated points on the new Pareto fronts. At this stage, it is of particular interest to investigate how the fraction of batches that fulfil the purity requirement in the perturbed set, changes with an increased back-off. This provides an estimate of the required back-off to meet a certain success rate for a given purity constraint.\n\nThe required back-off for a given point on the nominal Pareto front was obtained by applying MATLAB’s fminbnd function on the upper level of the robust counterpart problem in Equation (11), with suitable boundaries obtained from the previous back-off investigation. The mid- and lower-level optimization problems in Equation (11) were solved by MATLAB’s fmincon function with a sequential quadratic programming algorithm, the BFGS formula for updating the approximation of the Hessian matrix, and central differences to estimate the gradient of the objective function and constraints. The procedure comprises an evaluation of the cumulative distribution function of ${\\stackrel{˜}{X}}_{\\text{Eu}}$ based on $\\stackrel{˜}{x}$ and $\\stackrel{˜}{p}$ , as obtained from the mid- and lower-level optimization problem for a given initial ${X}_{\\text{BF}}$ . ${X}_{\\text{BF}}$ is then varied for the upper level optimization problem through MATLAB's fminbnd function, resulting in new $\\stackrel{˜}{x}$ , $\\stackrel{˜}{p}$ and cumulative distribution functions of ${\\stackrel{˜}{X}}_{\\text{Eu}}$ to be evaluated. This continues until a ${X}_{\\text{BF}}$ that produces a cumulative distribution function of ${\\stackrel{˜}{X}}_{\\text{Eu}}$ corresponding to the desired success rate ${\\Phi }_{{X}_{\\text{Eu}}}$ is obtained.\n\nOptimization Method Benchmarking\n\nThe proposed optimization method was compared with a previous optimization method that focuses on the nominal Pareto front and optimizes the pooling time horizon for each investigated point on the front so that the purity requirement is met for a given uncertainty set. The main difference between the two methods is that the proposed method will find new optimal operation points by changing the free operating parameters, and achieve robustness by increasing the purity requirement back-off for each point on the Pareto front, whereas the previous method keeps the decision variables from the nominal Pareto front intact, with the exception of the cut-times that are optimized to find a fixed pooling time horizon that will fulfil the purity requirement for the entire uncertainty set.\n\n3.4. Robust Multiobjective Optimization Results\n\nThe robust multiobjective optimizations of the studied system were carried out with a product purity requirement, ${X}_{\\text{Eu},L}$ , of 0.95 and 0.99 respectively, and the target success rate, ${\\Phi }_{{X}_{\\text{Eu}}}$ , was set to 0.95. The perturbed process parameters were the injected load concentration, ${c}_{\\text{load},\\alpha }$ , and the modifier concentration in the upstream mixing tank, ${c}_{\\text{mix},S}$ . Several values for the uncertainty set standard deviation, $\\sigma$ , were investigated. However, a standard deviation exceeding 0.01 did not result in achieving the target success rate even when the back-off was set to the maximum limit, i.e. ${X}_{\\text{Eu},L}+{X}_{\\text{BF}}=1$ . Therefore, only results for $\\sigma =0.01$ are presented in this study. This should be interpreted as that the system is very un-robust, and sensitive to even the slightest process disturbances. However, this was expected since the studied elements are extremely similar in both chemical and physical properties, resulting in a minute separation selectivity which in turn makes the separation very difficult and unforgiving towards process perturbations.\n\nThe nominal un-robust Pareto fronts are presented by the outermost fronts in Figure 1, and it is shown how the Pareto front decreases with an increased back-off on the purity requirement. It should be noted that we only present the impact of an increased back-off on four Pareto points to avoid overtly crowded figures. The objective weight, $\\omega$ , for these points correspond to 1 (i.e. productivity as single objective), 0.5, 0.3 and 0 (i.e. yield as single objective) respectively.\n\nFigure 1. The nominal Pareto fronts are presented by the solid lines for a purity requirement of 0.95 in (a) and 0.99 in (b). The cross marks indicate how a Pareto point, with the weight $\\omega$ , changes with an increased back-off. The dashed lines indicate the Pareto front outlines for an increasing back-off, and it can be seen that the Pareto front decreases as the back-off is increased.\n\nThe results from the initial investigation on how the success rate, ${\\Phi }_{{X}_{\\text{Eu}}}$ , for the investigated points on the nominal Pareto front increases with an increased back-off are shown in Figure 2. The figure provides with an estimation of the required back-off to achieve the desired success rate for a given disturbance set, and it can be seen that an objective leaning more towards yield (i.e. $\\omega$ decreases) results in a lower success rate for a given back-off.\n\nIt should be noted that the Pareto point corresponding to yield as a single objective, i.e. $\\omega =0$ , has been omitted since the point for maximum yield is considered as an undesirable operating point due to the drastic decrease in productivity.\n\nIt is somewhat counter intuitive that the success rate should decrease with an increased objective weight for yield, since a higher yield typically is associated with an increased peak separation which in turn should result in an increased robustness. The decrease of robustness can be explained by observing how the decision variables change with an increased back-off for the 0.95 purity requirement case in Figure 3, where the pooling cut-time trends become very interesting. The decision variable trends show that the initial elution concentration and elution gradient slope are quite similar as long as productivity is a part of the weighted objective. However, a higher productivity is favoured by a larger batch load, a pooling horizon occurring earlier in the chromatogram (i.e. first and last pooling cuts occur earlier) and a smaller pooling volume. The increased batch load is reasonable since it will allow for a higher productivity due to an increased throughput. The early first cut comes from that a higher batch load will capacitate the elements to start eluting earlier. The earlier final cut makes the cycle time shorter, which is favourable for productivity, but it is also a trade of in terms of decreased yield.\n\nFigure 2. Results from the investigation of how the success rate increases with an increased back-off for a purity requirement of 0.95 in (a) and 0.99 in (b). The dashed line indicates the target success rate, ${\\Phi }_{{X}_{\\text{Eu}}}$ , and helps to provide an initial estimation of the required back-off, ${X}_{\\text{BF}}$ , for a Pareto point with the objective weight $\\omega$ .\n\nFigure 3. Plots of decision variable changes due to an increasing back-off for Pareto points with different objective weights, $\\omega$ , and a purity requirement of 0.95. (a) Batch load, (b) Initial elution concentration, (c) Elution gradient slope, (d) First cut time, (e) Final cut time, (f) Pooling volume.\n\nThis has the important implication of that a high objective weight on productivity will result in pooling cut times occurring closer to the Eu elution peak centre and farther away from the neighbouring peaks. When a higher yield is desired, the pooling horizon will increase in order to capture more of the target molecules, and this will move the pooling close to, and even into, the neighbouring elution peaks as long as the purity requirement is met. For this reason, a higher weight on yield will demand a higher back-off on purity in order to meet the desired success rate. This is due to that when a perturbation is introduced, the neighbouring peaks may move closer to, and even intrude, the pooling horizon, and a higher purity requirement will move the pooling cut times farther away from the neighbouring peaks. The farther away the cut times are from the neighbouring peaks in the nominal case, the higher disturbance can be tolerated since there is more room available for the neighbouring peaks to move before they impact the purity of the target peak. This is illustrated in Figure 4 where we can see a case with high productivity (smaller pooling horizon) and a case with high yield (larger pooling horizon) and observe how the introduced process disturbances make the neighbouring peaks creep into the pooling horizon to a larger extent for the high yield case.\n\nThe results from the robust optimizations can be seen in Figure 5 where the nominal un-robust Pareto front is plotted along with the robust Pareto front produced by the proposed method, and the front from the benchmark method. It should be noted that both methods provide with robust operating points that\n\nFigure 4. Sections of chromatograms with focus on the collection of the Eu product pool. The purity requirement, ${X}_{\\text{Eu}}$ , was set to 0.95 for the productivity objective weights $\\omega =1$ (a) and $\\omega =0.3$ (b). The pooling cut times are indicated by the dotted lines, and the elution order is Sm, Eu and Gd. The unit for the nitric acid elution gradient (black dashed line) on the vertical axis is mol/l. The shaded areas indicate the span of concentration profile variations due to process disturbances with $\\sigma =0.01$ , and the solid black lines indicate the concentration profiles for the nominal case. The chromatograms demonstrate that an operation point with a higher objective weight for productivity (a), is more robust than an operation point with a lower weight (b). This can be seen by observing how the larger pooling horizon in (b) allows for more collection of the neighbouring elements when disturbances are introduced, and thereby causing an increased number of batches with failed purity requirement. This is particularly noticeable for the Gd peak which intrudes the collected pool to a larger extent when process disturbances are introduced in (b).\n\nFigure 5. Pareto fronts resulting from the optimizations with a purity requirement of 0.95 (left) and 0.99 (right). (a) indicates the nominal Pareto front, (b) the robust Pareto front according to the proposed method and (c) the robust front from the benchmark method. The dots indicate the system response of the distributed uncertainty set associated with the respective Pareto points. The dashed lines indicate the loss of productivity for a given yield when robustifying the nominal Pareto front according to the proposed method.\n\nhandle the given process disturbances satisfactorily. However, the proposed method should be favoured since it produces a robust Pareto front with higher objective values compared to the benchmark method, which implies that the benchmark method should be considered more restrictive. Further, the benchmark method generates operating points that cannot be considered Pareto optimal, which is the case for the points with $\\omega =1$ on front (c) in Figure 5. For the sake of fairness and as mentioned in , these points should be disregarded when generating a robust Pareto front with the benchmark method.\n\nApplying robustness to a point on the nominal Pareto front with a given $\\omega$ will result in a change of both productivity and yield, as can be seen in Figure 1, and this makes the evaluation of performance loss when introducing robustness slightly ambiguous. In order to resolve this, the productivity for a given yield on the nominal Pareto front is compared to the productivity on the robust Pareto front given the same yield, as indicated by red dashed lines in Figure 5. The loss of productivity is presented in Table 3, and it shows that a productivity loss in the range of 10% - 20% can be expected. It should be mentioned that the robustness can be increased further during operation by applying a variable pooling cut time control strategy as described in , and thereby decrease the loss of productivity.\n\nThe required back-off, that meets the robustness requisite according to the proposed method, is presented in Table 4 for the investigated Pareto points. The results show that a higher purity requirement calls for a larger back-off term to achieve a robust Pareto point, and a lower objective weight on productivity also necessitates an increased back-off.\n\nTable 3. Loss of productivity.\n\nTable 4. Required back-off.\n\n4. Conclusion\n\nThis study has shown that the proposed optimization method can be used for robust multi-objective optimization of chromatographic rare earth element separation, and provided with expected performance changes for the robustification of the studied process. It has been highlighted that the studied system is highly un-robust, and that the system’s lack of robustness is largely due to the neighbouring peaks’ proximity to the product pooling horizon. The system can only cope with slight process disturbances, which in turn demands use of process equipment with high reliability. We show how the optimal solution of a chromatographic separation is affected by introducing robustness in a brute force manner. For future studies, it would be of interest to employ the proposed optimization method on additional chromatography schemes, as well as other chromatography separation applications than rare earth elements.\n\nAcknowledgements\n\nThis study has been performed within ProOpt and Process Industry Centre at Lund University, and financed by VINNOVA.\n\nCite this paper\n\nKnutson, H.-K., Holmqvist, A., Andersson, N. and Nilsson, B. (2017) Robust Multi-Objective Optimization of Chromatographic Rare Earth Element Separation. Advances in Chemical Engineering and Science, 7, 477-493. https://doi.org/10.4236/aces.2017.74034\n\nReferences\n\n1. 1. Gupta, C.K. and Krishnamurthy, N. (2004) Extractive Metallurgy of Rare Earths. CRC Press, Boca Raton, Florida.\n\n2. 2. Castor, S.B. and Hedrick, J.B. (2006) Rare Earth Elements. Industrial Minerals Volume, 7th Edition, Society for Mining, Metallurgy, and Exploration, Littleton, Colorado, 769-792.\n\n3. 3. McGill, I. (2000) Rare Earth Elements. Ullmann’s Encyclopedia of Industrial Chemistry, John Wiley & Sons, Hoboken, New Jersey.\n\n4. 4. Massari, S. and Ruberti, M. (2013) Rare Earth Elements as Critical Raw Materials: Focus on International Markets and Future Strategies. Resources Policy, 38, 36-43.\n\n5. 5. Han, K.N., Kellar, J.J., Cross, W.M. and Safarzadeh, S. (2014) Opportunities and Challenges for Treating Rare-Earth Elements. Geosystem Engineering, 17, 178-194. https://doi.org/10.1080/12269328.2014.958618\n\n6. 6. Stegen, K.S. (2015) Heavy Rare Earths, Permanent Magnets, and Renewable Energies: An Imminent Crisis. Energy Policy, 79, 1-8.\n\n7. 7. Golev, A., Scott, M., Erskine, P.D., Ali, S.H. and Ballantyne, G.R. (2014) Rare Earths Supply Chains: Current Status, Constraints and Opportunities. Resources Policy, 41, 52-59.\n\n8. 8. Nassar, N., Du, X. and Graedel, T. (2015) Criticality of the Rare Earth Elements. Journal of Industrial Ecology, 19, 1044-1054. https://doi.org/10.1111/jiec.12237\n\n9. 9. Henderson, P. (2013) Rare Earth Element Geochemistry. Elsevier, Amsterdam, Netherlands.\n\n10. 10. Max-Hansen, M., Knutson, H.K., Jonsson, C., Degerman, M. and Nilsson, B. (2015) Modeling Preparative Chromato-Graphic Separation of Heavy Rare Earth Elements and Optimization of Thulium Purification. Advances in Materials Physics and Chemistry, 5, 151. https://doi.org/10.4236/ampc.2015.55016\n\n11. 11. Knutson, H.K., Max-Hansen, M., Jonsson, C., Borg, N. and Nilsson, B. (2014) Experimental Productivity Rate Optimization of Rare Earth Element Separation through Preparative Solid Phase Extraction Chromatography. Journal of Chromatography A, 1348, 47-51. https://doi.org/10.1016/j.chroma.2014.04.085\n\n12. 12. Ling, L. and Wang, N.H.L. (2015) Ligand-Assisted Elution Chromatography for Separation of Lanthanides. Journal of Chromatography A, 1389, 28-38. https://doi.org/10.1016/j.chroma.2015.02.004\n\n13. 13. Ojala, F., Max-Hansen, M., Kifle, D., Borg, N. and Nilsson, B. (2012) Modelling and Optimisation of Preparative Chromatographic Purification of Europium. Journal of Chromatography A, 1220, 21-25. https://doi.org/10.1016/j.chroma.2011.11.028\n\n14. 14. Max-Hansen, M., Ojala, F., Kifle, D., Borg, N. and Nilsson, B. (2011) Optimization of preparative Chromatographic Separation of Multiple Rare Earth Elements. Journal of Chromatography A, 1218, 9155-9161. https://doi.org/10.1016/j.chroma.2011.10.062\n\n15. 15. Kifle, D., Wibetoe, G., Froseth, M. and Bigelius, J. (2013) Impregnation and Characterization of High Performance Extraction Columns for Separation of Metal Ions. Solvent Extraction and Ion Exchange, 31, 668-682. https://doi.org/10.1080/07366299.2013.806737\n\n16. 16. Krattli, M., Muller-Spath, T., Ulmer, N., Strohlein, G. and Morbidelli, M. (2013) Separation of Lanthanides by Continuous Chromatography. Industrial & Engineering Chemistry Research, 52, 8880-8886. https://doi.org/10.1021/ie3031482\n\n17. 17. Dybczy′ nski, R.S., Kulisa, K., Pyszynska, M. and Bojanowska-Czajka, A. (2015) New Reversed Phase-High Performance Liquid Chromatographic Method for Selective Separation of Yttrium From All Rare Earth Elements Employing Nitrilo-Triacetate Complexes in Anion Exchange Mode. Journal of Chromatography A, 1386, 74-80. https://doi.org/10.1016/j.chroma.2015.01.091\n\n18. 18. Knutson, H.K., Holmqvist, A. and Nilsson, B. (2015) Multi-Objective Optimization of Chromatographic Rare Earth Element Separation. Journal of Chromatography A, 1416, 57-63. https://doi.org/10.1016/j.chroma.2015.09.010\n\n19. 19. Andersson, N., Knutson, H.K., Max-Hansen, M., Borg, N. and Nilsson, B. (2014) Model-Based Comparison of Batch and Continuous Preparative Chromatography in the Separation of Rare Earth Elements. Industrial & Engineering Chemistry Research, 53, 16485-16493. https://doi.org/10.1021/ie5023223\n\n20. 20. Jakobsson, N., Degerman, M. and Nilsson, B. (2005) Optimisation and Robustness Analysis of a Hydrophobic Interaction Chromatography Step. Journal of Chromatography A, 1099, 157-166. https://doi.org/10.1016/j.chroma.2005.09.009\n\n21. 21. Karlsson, D., Jakobsson, N., Axelsson, A. and Nilsson, B. (2004) Model-Based Optimization of a Preparative Ion-Exchange Step for Antibody Purification. Journal of Chromatography A, 1055, 29-39. https://doi.org/10.1016/j.chroma.2004.08.151\n\n22. 22. Nagrath, D., Bequette, B.W., Cramer, S. and Messac, A. (2005) Multiobjective Optimization Strategies for Linear Gradient Chromatography. AIChE Journal, 51, 511-525. https://doi.org/10.1002/aic.10459\n\n23. 23. Gétaz, D., Butté, A. and Morbidelli, M. (2013) Model-Based Design Space Determination of Peptide Chromatographic Purification Processes. Journal of Chromatography A, 1284, 80-87. https://doi.org/10.1016/j.chroma.2013.01.117\n\n24. 24. Osberghaus, A., Hepbildikler, S., Nath, S., Haindl, M., von Lieres, E. and Hubbuch, J. (2012) Optimizing a Chromatographic Three Component Separation: A Comparison of Mechanistic and Empiric Modeling Approaches. Journal of Chromatography A, 1237, 86-95. https://doi.org/10.1016/j.chroma.2012.03.029\n\n25. 25. Sreedhar, B., Wagler, A. and Kaspereit, M., Seidel-Morgenstern, A. (2013) Optimal cut-Times Finding Strategies for Collecting a Target Component from Overloaded Elution Chromatograms. Computers & Chemical Engineering, 49, 158-169. https://doi.org/10.1016/j.compchemeng.2012.09.009\n\n26. 26. Ben-Tal, A., El Ghaoui, L. and Nemirovski, A. (2009) Robust Optimization. Princeton University Press, Princeton. https://doi.org/10.1515/9781400831050\n\n27. 27. Mota, J.P., Araújo, J.M., Rodrigues, R., et al. (2007) Optimal Design of Simulated Moving-Bed Processes under Flow Rate Uncertainty. AIChE Journal, 53, 2630-2642. https://doi.org/10.1002/aic.11281\n\n28. 28. Nestola, P., Silva, R.J., Peixoto, C., Alves, P.M., Carrondo, M.J. and Mota, J.P. (2015) Robust Design of Adenovirus Purification by Two-Column, Simulated Moving-Bed, Size-Exclusion Chromatography. Journal of Biotechnology, 213, 109-119. https://doi.org/10.1016/j.jbiotec.2015.01.030\n\n29. 29. Holmqvist, A., Andersson, C., Magnusson, F. and Kesson, J. (2015) Methods and Tools for Robust Optimal Control of Batch Chromatographic Separation Processes. Processes, 3, 568-606. https://doi.org/10.3390/pr3030568\n\n30. 30. Degerman, M., Westerberg, K. and Nilsson, B. (2009) A Model-Based Approach to Determine the Design Space of Preparative Chromatography. Chemical Engineering & Technology, 32, 1195-1202. https://doi.org/10.1002/ceat.200900102\n\n31. 31. Westerberg, K., Borg, N., Andersson, N. and Nilsson, B. (2012) Supporting Design and Control of a Reversed-Phase Chromatography Step by Mechanistic Modeling. Chemical Engineering & Technology, 35, 169-175. https://doi.org/10.1002/ceat.201000505\n\n32. 32. Close, E.J., Salm, J.R., Bracewell, D.G. and Sorensen, E. (2014) A Model Based Approach for Identifying Robust Operating Conditions for Industrial Chromatography with Process Variability. Chemical Engineering Science, 116, 284-295. https://doi.org/10.1016/j.ces.2014.03.010\n\n33. 33. Logist, F., Houska, B., Diehl, M. and Van Impe, J.F. (2011) Robust Multi-Objective Optimal Control of Uncertain (Bio) Chemical Processes. Chemical Engineering Science, 66, 4670-4682. https://doi.org/10.1016/j.ces.2014.03.010\n\n34. 34. Schmidt-Traub, H., Schulte, M. and Seidel-Morgenstern, A. (2012) Preparative Chromatography. 2nd Edition, Wiley-VCH, Weinheim. https://doi.org/10.1002/9783527649280\n\n35. 35. Guiochon, G., Felinger, A. and Shirazi, D.G. (2006) Fundamentals of Preparative and Nonlinear Chromatography. Academic Press, New York.\n\n36. 36. Degerman, M. (2009) Design of Robust Preparative Chromatography. Lund University, Lund."
] | [
null,
"https://html.scirp.org/file/10-3700843x1.png",
null,
"https://html.scirp.org/file/9-2500537x3.png",
null,
"https://html.scirp.org/file/9-2500537x2.png",
null,
"https://html.scirp.org/file/18-1760983x4.png",
null,
"https://html.scirp.org/file/2-1410169x6.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.88544613,"math_prob":0.9731972,"size":36025,"snap":"2021-21-2021-25","text_gpt3_token_len":8326,"char_repetition_ratio":0.14913523,"word_repetition_ratio":0.046924658,"special_character_ratio":0.23744622,"punctuation_ratio":0.17461011,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.99536663,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,2,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-14T04:16:42Z\",\"WARC-Record-ID\":\"<urn:uuid:3b4f667b-b5c6-4d56-82a6-72565f936363>\",\"Content-Length\":\"150524\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a59f867a-93db-4715-a3da-1aad23613a8a>\",\"WARC-Concurrent-To\":\"<urn:uuid:c09ff5d6-5048-4ded-923f-fbd565e7fff5>\",\"WARC-IP-Address\":\"192.111.37.22\",\"WARC-Target-URI\":\"https://file.scirp.org/Html/10-3700843_80013.htm\",\"WARC-Payload-Digest\":\"sha1:M57EUCOX57IFJQUJPUGOWS3IXA7RESXO\",\"WARC-Block-Digest\":\"sha1:7SN7TX7OKD2E5J6UQZLUAYZNGRVAIF2C\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243991737.39_warc_CC-MAIN-20210514025740-20210514055740-00595.warc.gz\"}"} |
https://focalacademicwriters.info/2021/09/01/manually-complete-the-following-problems-in-the-textbook-problem-7-14problem-7/ | [
"# Manually complete the following problems in the textbook: Problem 7-14 Problem 7\n\nManually complete the following problems in the textbook: Problem 7-14\nProblem 7-15\nProblem 7-18\nUse an Excel spreadsheet file for the calculations and explanations. Cells should contain the formulas (i.e., if a formula was used to calculate the entry in that cell). Students are highly encouraged to use the “Optimization Modeling Problem Set” Excel resource to complete this assignment. Mac users can use StatPlus:mac LE, free of charge, from AnalystSoft. You are not required to submit this assignment to LopesWrite.\nRequirements: 3 Pages"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.83118564,"math_prob":0.5655882,"size":693,"snap":"2021-43-2021-49","text_gpt3_token_len":153,"char_repetition_ratio":0.16835994,"word_repetition_ratio":0.1980198,"special_character_ratio":0.2092352,"punctuation_ratio":0.11811024,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98245573,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-07T20:30:58Z\",\"WARC-Record-ID\":\"<urn:uuid:0a1ec2ef-4c21-4414-9891-eb1d2a90a5ad>\",\"Content-Length\":\"29474\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6f459ad7-39a1-475e-80e9-884f79072f7d>\",\"WARC-Concurrent-To\":\"<urn:uuid:dcd409e1-788e-4049-a274-5092f003c4fd>\",\"WARC-IP-Address\":\"209.188.21.166\",\"WARC-Target-URI\":\"https://focalacademicwriters.info/2021/09/01/manually-complete-the-following-problems-in-the-textbook-problem-7-14problem-7/\",\"WARC-Payload-Digest\":\"sha1:VK24RMNNPYG7OGGNPIVJJW2UN4KPHWNK\",\"WARC-Block-Digest\":\"sha1:BSAAAHIQR6JF24GL5XMLQQ6ZEOZS5HJA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363418.83_warc_CC-MAIN-20211207201422-20211207231422-00196.warc.gz\"}"} |
https://www.revistaproyecciones.cl/index.php/proyecciones/article/view/2390 | [
"# Existence of positive periodic solutions for delay dynamic equations.\n\n## Authors\n\n• Faycal Bouchelaghem UBMA.\n• Abdelouaheb Ardjouni University Souk Ahras.\n• Ahcene Djoudi UBMA.\n\n## Keywords:\n\nPositive periodic solutions, Schauder’s fixed point theorem, Dynamic equations, Time scales\n\n## Abstract\n\nIn this article we study the existence of positive periodic solutions for a dynamic equations on time scales. The main tool employed here is the Schauder's fixed point theorem. The results obtained here extend the work of Olach . Two examples are also given to illustrate this work.\n\n## Author Biographies\n\n### Faycal Bouchelaghem, UBMA.\n\nDepartment of Mathematics, Faculty of Sciences.\n\n### Abdelouaheb Ardjouni, University Souk Ahras.\n\nDepartment of Mathematics and Informatics.\n\n### Ahcene Djoudi, UBMA.\n\nApplied Mathematics Lab., Faculty of Sciences.\n\n## References\n\nM. Adivar and Y. N. Raffoul, Existence of periodic solutions in totally nonlinear delay dynamic equations, Electronic Journal of Qualitative Theory of Differential Equations, No. 1, pp. 1-20, (2009).\n\nA. Ardjouni and A. Djoudi, Existence of positive periodic solutions for nonlinear neutral dynamic equations with variable delay on a time scale, Malaya Journal of Matematik 2 (1), pp. 60-67, (2013).\n\nA. Ardjouni and A. Djoudi, Existence of periodic solutions for nonlinear neutral dynamic equations with functional delay on a time scale, Acta Univ. Palacki. Olomnc., Fac. rer. nat., Mathematica 52, 1, pp. 5-19, (2013).\n\nA. Ardjouni and A. Djoudi, Existence of periodic solutions for non- linear neutral dynamic equations with variable delay on a time scale, Commun Nonlinear Sci Numer Simulat 17, pp. 3061—3069, (2012).\n\nA. Ardjouni and A. Djoudi, Periodic solutions in totally nonlinear dynamic equations with functional delay on a time scale, Rend. Sem. Mat. Univ. Politec. Torino Vol. 68, 4, pp. 349-359, (2010).\n\nM. Bohner, A. Peterson, Dynamic Equations on Time Scales, An Introduction with Applications, Birkhäuser, Boston, (2001).\n\nM. Bohner, A. Peterson, Advances in Dynamic Equations on Time Scales, Birkhäuser, Boston, (2003).\n\nS. Hilger, Ein Masskettenkalkül mit Anwendung auf Zentrumsman- ningfaltigkeiten. PhD thesis, Universität Würzburg, (1988).\n\nE. R. Kaufmann, Y. N. Raffoul, Periodic solutions for a neutral non- linear dynamical equation on a time scale, J. Math. Anal. Appl. 319, pp. 315-325, (2006).\n\nE. R. Kaufmann and Y. N. Raffoul, Periodicity and stability in neutral nonlinear dynamic equation with functional delay on a time scale, Electronic Journal of Differential Equations, No. 27, pp. 1-12, (2007).\n\nV. Lakshmikantham, S. Sivasundaram, B. Kaymarkcalan, Dynamic Systems on Measure Chains, Kluwer Academic Publishers, Dordrecht, (1996).\n\nR. Olach, Positive periodic solutions of delay differential equations, Applied Mathematics Letters 26, pp. 1141-1145, (2013).\n\nD. R. Smart, Fixed Points Theorems, Cambridge Univ. Press, Cambridge, UK, (1980).\n\n2017-10-20\n\n## How to Cite\n\n\nF. Bouchelaghem, A. Ardjouni, and A. Djoudi, “Existence of positive periodic solutions for delay dynamic equations.”, Proyecciones (Antofagasta, On line), vol. 36, no. 3, pp. 449-460, Oct. 2017.\n\nArtículos"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6876472,"math_prob":0.85743546,"size":2959,"snap":"2022-27-2022-33","text_gpt3_token_len":808,"char_repetition_ratio":0.14856176,"word_repetition_ratio":0.13151927,"special_character_ratio":0.25481582,"punctuation_ratio":0.24958402,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.970582,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-07T18:14:39Z\",\"WARC-Record-ID\":\"<urn:uuid:88c94086-292b-4315-8503-9382ffbba88e>\",\"Content-Length\":\"41891\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7d4e0cf4-4f8f-45c2-9e2a-981d495406c4>\",\"WARC-Concurrent-To\":\"<urn:uuid:e5cddd94-56bd-4f65-ae76-e1904513cdf8>\",\"WARC-IP-Address\":\"146.83.118.13\",\"WARC-Target-URI\":\"https://www.revistaproyecciones.cl/index.php/proyecciones/article/view/2390\",\"WARC-Payload-Digest\":\"sha1:NNZBY4US57TDYK6GIYPLQ55TKFWAUNOF\",\"WARC-Block-Digest\":\"sha1:MNFVX64JOKAOA3JRFBAA2YTX6JHHCDD7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882570692.22_warc_CC-MAIN-20220807181008-20220807211008-00018.warc.gz\"}"} |
https://slave2.omega.jstor.org/citation/ris/10.4169/j.ctt5hh9t5.9 | [
"Provider: JSTOR http://www.jstor.org Database: JSTOR Content: text/plain; charset=\"us-ascii\" TY - CHAP TI - Differential Calculus A2 - Klymchuk, Sergiy AB -\n\n4.1 If both functionsf(x) andg(x) are differentiable andf(x) >g(x) on the interval (a,b), thenf′(x) >g′(x) on (a,b). (page 57)\n\n4.2 If a nonlinear function is differentiable and monotone on (0, ∞), then its derivative is also monotone on (0, ∞). (page 57)\n\n4.3 If a function is continuous at a point, then it is differentiable at that point. (page 58)\n\n4.4 If a function is continuous on\\$\\mathbb{R}\\$and the tangent line exists at any point on its graph, then the function is differentiable at any point on\\$\\mathbb{R}\\$. (page 59)\n\nIf a\n\nEP - 22 ET - REV - Revised, 1 PB - Mathematical Association of America PY - 2010 SN - 9780883857656 SP - 19 T2 - Counterexamples in Calculus UR - http://www.jstor.org/stable/10.4169/j.ctt5hh9t5.9 Y2 - 2021/09/28/ ER -"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.63129336,"math_prob":0.96099234,"size":764,"snap":"2021-31-2021-39","text_gpt3_token_len":261,"char_repetition_ratio":0.110526316,"word_repetition_ratio":0.016260162,"special_character_ratio":0.36125654,"punctuation_ratio":0.17261904,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98505414,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-28T21:00:33Z\",\"WARC-Record-ID\":\"<urn:uuid:c67d1d37-9320-4c98-a20f-b5dafb692c20>\",\"Content-Length\":\"1793\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f696ceb5-cc33-4e08-99f3-a6de6f65d1de>\",\"WARC-Concurrent-To\":\"<urn:uuid:9db5626c-7577-4930-92c9-07390d3f0392>\",\"WARC-IP-Address\":\"199.232.64.152\",\"WARC-Target-URI\":\"https://slave2.omega.jstor.org/citation/ris/10.4169/j.ctt5hh9t5.9\",\"WARC-Payload-Digest\":\"sha1:4GSSZJOFFYIIRGU4JSOYGGRMICHR5W5F\",\"WARC-Block-Digest\":\"sha1:65FP4UY37XNO5HERSEAV362BV7ATQAPJ\",\"WARC-Identified-Payload-Type\":\"text/plain\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780060882.17_warc_CC-MAIN-20210928184203-20210928214203-00655.warc.gz\"}"} |
https://isabelle.in.tum.de/repos/isabelle/file/e5b55d7be9bb/src/Tools/IsaPlanner/rw_tools.ML | [
"src/Tools/IsaPlanner/rw_tools.ML\n author wenzelm Sat Oct 06 16:50:04 2007 +0200 (2007-10-06) changeset 24867 e5b55d7be9bb parent 23175 267ba70e7a9d child 30161 c26e515f1c29 permissions -rw-r--r--\nsimplified interfaces for outer syntax;\n``` 1 (* Title: Tools/IsaPlanner/rw_tools.ML\n```\n``` 2 ID:\t\t\\$Id\\$\n```\n``` 3 Author: Lucas Dixon, University of Edinburgh\n```\n``` 4\n```\n``` 5 Term related tools used for rewriting.\n```\n``` 6 *)\n```\n``` 7\n```\n``` 8 signature RWTOOLS =\n```\n``` 9 sig\n```\n``` 10 end;\n```\n``` 11\n```\n``` 12 structure RWTools\n```\n``` 13 = struct\n```\n``` 14\n```\n``` 15 (* fake free variable names for locally bound variables - these work\n```\n``` 16 as placeholders. *)\n```\n``` 17\n```\n``` 18 (* don't use dest_fake.. - we should instead be working with numbers\n```\n``` 19 and a list... else we rely on naming conventions which can break, or\n```\n``` 20 be violated - in contrast list locations are correct by\n```\n``` 21 construction/definition. *)\n```\n``` 22 (*\n```\n``` 23 fun dest_fake_bound_name n =\n```\n``` 24 case (explode n) of\n```\n``` 25 (\":\" :: realchars) => implode realchars\n```\n``` 26 | _ => n; *)\n```\n``` 27 fun is_fake_bound_name n = (hd (explode n) = \":\");\n```\n``` 28 fun mk_fake_bound_name n = \":b_\" ^ n;\n```\n``` 29\n```\n``` 30\n```\n``` 31\n```\n``` 32 (* fake free variable names for local meta variables - these work\n```\n``` 33 as placeholders. *)\n```\n``` 34 fun dest_fake_fix_name n =\n```\n``` 35 case (explode n) of\n```\n``` 36 (\"@\" :: realchars) => implode realchars\n```\n``` 37 | _ => n;\n```\n``` 38 fun is_fake_fix_name n = (hd (explode n) = \"@\");\n```\n``` 39 fun mk_fake_fix_name n = \"@\" ^ n;\n```\n``` 40\n```\n``` 41\n```\n``` 42\n```\n``` 43 (* fake free variable names for meta level bound variables *)\n```\n``` 44 fun dest_fake_all_name n =\n```\n``` 45 case (explode n) of\n```\n``` 46 (\"+\" :: realchars) => implode realchars\n```\n``` 47 | _ => n;\n```\n``` 48 fun is_fake_all_name n = (hd (explode n) = \"+\");\n```\n``` 49 fun mk_fake_all_name n = \"+\" ^ n;\n```\n``` 50\n```\n``` 51\n```\n``` 52\n```\n``` 53\n```\n``` 54 (* Ys and Ts not used, Ns are real names of faked local bounds, the\n```\n``` 55 idea is that this will be mapped to free variables thus if a free\n```\n``` 56 variable is a faked local bound then we change it to being a meta\n```\n``` 57 variable so that it can later be instantiated *)\n```\n``` 58 (* FIXME: rename this - avoid the word fix! *)\n```\n``` 59 (* note we are not really \"fix\"'ing the free, more like making it variable! *)\n```\n``` 60 (* fun trymkvar_of_fakefree (Ns, Ts) Ys (n,ty) =\n```\n``` 61 if n mem Ns then Var((n,0),ty) else Free (n,ty);\n```\n``` 62 *)\n```\n``` 63\n```\n``` 64 (* make a var into a fixed free (ie prefixed with \"@\") *)\n```\n``` 65 fun mk_fakefixvar Ts ((n,i),ty) = Free(mk_fake_fix_name n, ty);\n```\n``` 66\n```\n``` 67\n```\n``` 68 (* mk_frees_bound: string list -> Term.term -> Term.term *)\n```\n``` 69 (* This function changes free variables to being represented as bound\n```\n``` 70 variables if the free's variable name is in the given list. The debruijn\n```\n``` 71 index is simply the position in the list *)\n```\n``` 72 (* THINKABOUT: danger of an existing free variable with the same name: fix\n```\n``` 73 this so that name conflict are avoided automatically! In the meantime,\n```\n``` 74 don't have free variables named starting with a \":\" *)\n```\n``` 75 fun bounds_of_fakefrees Ys (a \\$ b) =\n```\n``` 76 (bounds_of_fakefrees Ys a) \\$ (bounds_of_fakefrees Ys b)\n```\n``` 77 | bounds_of_fakefrees Ys (Abs(n,ty,t)) =\n```\n``` 78 Abs(n,ty, bounds_of_fakefrees (n::Ys) t)\n```\n``` 79 | bounds_of_fakefrees Ys (Free (n,ty)) =\n```\n``` 80 let fun try_mk_bound_of_free (i,[]) = Free (n,ty)\n```\n``` 81 | try_mk_bound_of_free (i,(y::ys)) =\n```\n``` 82 if n = y then Bound i else try_mk_bound_of_free (i+1,ys)\n```\n``` 83 in try_mk_bound_of_free (0,Ys) end\n```\n``` 84 | bounds_of_fakefrees Ys t = t;\n```\n``` 85\n```\n``` 86\n```\n``` 87 (* map a function f onto each free variables *)\n```\n``` 88 fun map_to_frees f Ys (a \\$ b) =\n```\n``` 89 (map_to_frees f Ys a) \\$ (map_to_frees f Ys b)\n```\n``` 90 | map_to_frees f Ys (Abs(n,ty,t)) =\n```\n``` 91 Abs(n,ty, map_to_frees f ((n,ty)::Ys) t)\n```\n``` 92 | map_to_frees f Ys (Free a) =\n```\n``` 93 f Ys a\n```\n``` 94 | map_to_frees f Ys t = t;\n```\n``` 95\n```\n``` 96\n```\n``` 97 (* map a function f onto each meta variable *)\n```\n``` 98 fun map_to_vars f Ys (a \\$ b) =\n```\n``` 99 (map_to_vars f Ys a) \\$ (map_to_vars f Ys b)\n```\n``` 100 | map_to_vars f Ys (Abs(n,ty,t)) =\n```\n``` 101 Abs(n,ty, map_to_vars f ((n,ty)::Ys) t)\n```\n``` 102 | map_to_vars f Ys (Var a) =\n```\n``` 103 f Ys a\n```\n``` 104 | map_to_vars f Ys t = t;\n```\n``` 105\n```\n``` 106 (* map a function f onto each free variables *)\n```\n``` 107 fun map_to_alls f (Const(\"all\",allty) \\$ Abs(n,ty,t)) =\n```\n``` 108 let val (n2,ty2) = f (n,ty)\n```\n``` 109 in (Const(\"all\",allty) \\$ Abs(n2,ty2,map_to_alls f t)) end\n```\n``` 110 | map_to_alls f x = x;\n```\n``` 111\n```\n``` 112 (* map a function f to each type variable in a term *)\n```\n``` 113 (* implicit arg: term *)\n```\n``` 114 fun map_to_term_tvars f =\n```\n``` 115 Term.map_types (fn TVar(ix,ty) => f (ix,ty) | x => x); (* FIXME map_atyps !? *)\n```\n``` 116\n```\n``` 117\n```\n``` 118\n```\n``` 119 (* what if a param desn't occur in the concl? think about! Note: This\n```\n``` 120 simply fixes meta level univ bound vars as Frees. At the end, we will\n```\n``` 121 change them back to schematic vars that will then unify\n```\n``` 122 appropriactely, ie with unfake_vars *)\n```\n``` 123 fun fake_concl_of_goal gt i =\n```\n``` 124 let\n```\n``` 125 val prems = Logic.strip_imp_prems gt\n```\n``` 126 val sgt = List.nth (prems, i - 1)\n```\n``` 127\n```\n``` 128 val tbody = Logic.strip_imp_concl (Term.strip_all_body sgt)\n```\n``` 129 val tparams = Term.strip_all_vars sgt\n```\n``` 130\n```\n``` 131 val fakefrees = map (fn (n, ty) => Free(mk_fake_all_name n, ty))\n```\n``` 132 tparams\n```\n``` 133 in\n```\n``` 134 Term.subst_bounds (rev fakefrees,tbody)\n```\n``` 135 end;\n```\n``` 136\n```\n``` 137 (* what if a param desn't occur in the concl? think about! Note: This\n```\n``` 138 simply fixes meta level univ bound vars as Frees. At the end, we will\n```\n``` 139 change them back to schematic vars that will then unify\n```\n``` 140 appropriactely, ie with unfake_vars *)\n```\n``` 141 fun fake_goal gt i =\n```\n``` 142 let\n```\n``` 143 val prems = Logic.strip_imp_prems gt\n```\n``` 144 val sgt = List.nth (prems, i - 1)\n```\n``` 145\n```\n``` 146 val tbody = Term.strip_all_body sgt\n```\n``` 147 val tparams = Term.strip_all_vars sgt\n```\n``` 148\n```\n``` 149 val fakefrees = map (fn (n, ty) => Free(mk_fake_all_name n, ty))\n```\n``` 150 tparams\n```\n``` 151 in\n```\n``` 152 Term.subst_bounds (rev fakefrees,tbody)\n```\n``` 153 end;\n```\n``` 154\n```\n``` 155\n```\n``` 156 (* hand written - for some reason the Isabelle version in drule is broken!\n```\n``` 157 Example? something to do with Bin Yangs examples?\n```\n``` 158 *)\n```\n``` 159 fun rename_term_bvars ns (Abs(s,ty,t)) =\n```\n``` 160 let val s2opt = Library.find_first (fn (x,y) => s = x) ns\n```\n``` 161 in case s2opt of\n```\n``` 162 NONE => (Abs(s,ty,rename_term_bvars ns t))\n```\n``` 163 | SOME (_,s2) => Abs(s2,ty, rename_term_bvars ns t) end\n```\n``` 164 | rename_term_bvars ns (a\\$b) =\n```\n``` 165 (rename_term_bvars ns a) \\$ (rename_term_bvars ns b)\n```\n``` 166 | rename_term_bvars _ x = x;\n```\n``` 167\n```\n``` 168 fun rename_thm_bvars ns th =\n```\n``` 169 let val t = Thm.prop_of th\n```\n``` 170 in Thm.rename_boundvars t (rename_term_bvars ns t) th end;\n```\n``` 171\n```\n``` 172 (* Finish this to show how it breaks! (raises the exception):\n```\n``` 173\n```\n``` 174 exception rename_thm_bvars_exp of ((string * string) list * Thm.thm)\n```\n``` 175\n```\n``` 176 Drule.rename_bvars ns th\n```\n``` 177 handle TERM _ => raise rename_thm_bvars_exp (ns, th);\n```\n``` 178 *)\n```\n``` 179\n```\n``` 180 end;\n```"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.65581983,"math_prob":0.9908827,"size":5538,"snap":"2019-51-2020-05","text_gpt3_token_len":1674,"char_repetition_ratio":0.13715215,"word_repetition_ratio":0.119796954,"special_character_ratio":0.36150235,"punctuation_ratio":0.14139535,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9945281,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-11T06:43:01Z\",\"WARC-Record-ID\":\"<urn:uuid:ad73ee3d-1958-4676-9196-5b4fcd03c5ed>\",\"Content-Length\":\"31281\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:810e7be2-d772-4968-9004-afe3a8ae38e5>\",\"WARC-Concurrent-To\":\"<urn:uuid:68f487f8-9940-443f-a14e-702db738b299>\",\"WARC-IP-Address\":\"131.159.46.82\",\"WARC-Target-URI\":\"https://isabelle.in.tum.de/repos/isabelle/file/e5b55d7be9bb/src/Tools/IsaPlanner/rw_tools.ML\",\"WARC-Payload-Digest\":\"sha1:YEKRKZNFBM5WFHLQNDI7IUOFD7FQYO3K\",\"WARC-Block-Digest\":\"sha1:HP4CPBDZTPGRNGZULRVGWXB2ICSTCN7K\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540529955.67_warc_CC-MAIN-20191211045724-20191211073724-00114.warc.gz\"}"} |
https://zbmath.org/?q=an%3A0817.35114 | [
"## Some results on the thermistor problem.(English)Zbl 0817.35114\n\nAntontsev, S. N. (ed.) et al., Free boundary problems in continuum mechanics. International conference on free boundary problems in continuum mechanics, Novosibirsk, Russia, July 15-19, 1991. Basel: Birkhäuser. ISNM, Int. Ser. Numer. Math. 106, 47-57 (1992).\nFrom the introduction: We consider here the so called thermistor problem. The heat produced in a conductor by an electric current leads to the system: \\begin{aligned} &u_ t- \\nabla\\cdot k(u) \\nabla u= \\sigma(u) |\\nabla \\varphi|^ 2, \\quad \\nabla\\cdot \\sigma(u) \\nabla \\varphi=0 \\quad \\text{in } \\Omega\\times (0,T),\\\\ &u=0, \\quad \\varphi= \\varphi_ 0 \\quad \\text{on } \\Gamma\\times (0,T), \\quad u(\\cdot,0)= u_ 0. \\end{aligned} \\tag{1} Here, $$\\Omega$$ is a smooth bounded open set of $$\\mathbb{R}^ n$$, $$\\Gamma$$ denotes the boundary, $$T$$ is some positive given number, $$\\varphi$$ is the electrical potential, $$u$$ the temperature inside the conductor, $$k(u)>0$$ the thermal conductivity and $$\\sigma(u) >0$$ the electrical conductivity.\nWe show existence of a solution to (1), and focus on the question of uniqueness and on the problem of global existence or blow up.\nFor the entire collection see [Zbl 0807.00016].\n\n### MSC:\n\n 35Q72 Other PDE from mechanics (MSC2000) 80A20 Heat and mass transfer, heat flow (MSC2010) 35K55 Nonlinear parabolic equations\n\n### Keywords:\n\nexistence; uniqueness; blow up"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7069589,"math_prob":0.9974653,"size":1609,"snap":"2022-05-2022-21","text_gpt3_token_len":518,"char_repetition_ratio":0.093457945,"word_repetition_ratio":0.017316017,"special_character_ratio":0.33188316,"punctuation_ratio":0.20543806,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99876165,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-24T02:21:07Z\",\"WARC-Record-ID\":\"<urn:uuid:04c561db-7257-4481-97ff-681cdee117c8>\",\"Content-Length\":\"50359\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:73351bb8-f40d-4705-abe0-a3ac039bff1e>\",\"WARC-Concurrent-To\":\"<urn:uuid:bf682c52-a961-4bfa-8522-64d47de7b2de>\",\"WARC-IP-Address\":\"141.66.194.2\",\"WARC-Target-URI\":\"https://zbmath.org/?q=an%3A0817.35114\",\"WARC-Payload-Digest\":\"sha1:LEYIQRFQ54LVXFHOITRNF7SRKWZHRAXV\",\"WARC-Block-Digest\":\"sha1:H7LEVR5IFKAGPWREXBWV66DUR2BK5HTE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662562410.53_warc_CC-MAIN-20220524014636-20220524044636-00710.warc.gz\"}"} |
https://ao.ms/how-to-divide-a-number-in-python/ | [
"# How to divide a number in Python",
null,
"## The challenge\n\nYour task is to create function`isDivideBy` (or `is_divide_by`) to check if an integer number is divisible by each out of two arguments.\n\nA few cases:\n\n```.wp-block-code{border:0;padding:0}.wp-block-code>div{overflow:auto}.shcb-language{border:0;clip:rect(1px,1px,1px,1px);-webkit-clip-path:inset(50%);clip-path:inset(50%);height:1px;margin:-1px;overflow:hidden;padding:0;position:absolute;width:1px;word-wrap:normal;word-break:normal}.hljs{box-sizing:border-box}.hljs.shcb-code-table{display:table;width:100%}.hljs.shcb-code-table>.shcb-loc{color:inherit;display:table-row;width:100%}.hljs.shcb-code-table .shcb-loc>span{display:table-cell}.wp-block-code code.hljs:not(.shcb-wrap-lines){white-space:pre}.wp-block-code code.hljs.shcb-wrap-lines{white-space:pre-wrap}.hljs.shcb-line-numbers{border-spacing:0;counter-reset:line}.hljs.shcb-line-numbers>.shcb-loc{counter-increment:line}.hljs.shcb-line-numbers .shcb-loc>span{padding-left:.75em}.hljs.shcb-line-numbers .shcb-loc::before{border-right:1px solid #ddd;content:counter(line);display:table-cell;padding:0 .75em;text-align:right;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;white-space:nowrap;width:1%}```(-12, 2, -6) -> true\n(-12, 2, -5) -> false\n\n(45, 1, 6) -> false\n(45, 5, 15) -> true\n\n(4, 1, 4) -> true\n(15, -5, 3) -> true```Code language: JavaScript (javascript)```\n\n## Test cases\n\n``````Test.describe(\"Basic Tests\")\nTest.it(\"should pass basic tests\")\nTest.assert_equals(is_divide_by(-12, 2, -6), True)\nTest.assert_equals(is_divide_by(-12, 2, -5), False)\nTest.assert_equals(is_divide_by(45, 1, 6), False)\nTest.assert_equals(is_divide_by(45, 5, 15), True)\nTest.assert_equals(is_divide_by(4, 1, 4), True)\nTest.assert_equals(is_divide_by(15, -5, 3), True)\n```Code language: Python (python)```\n\n## Understanding how to solve this\n\nTo resolve this problem, we need to understand how to find if a number can be divided without a remainder in Python.\n\nFor this we will use Python’s` modulo operator`, (`%`):\n\n``````10 % 5 # 0\n# if we divide 10 by 5, there is no remainder\n\n10 % 3 # 1\n# if we divide 10 by 3, there is a remainder of `1`\n```Code language: Python (python)```\n\nTherefore, if we say `10 % 5 == 0`, the expression will equal `True`, while the `10 % 3 == 0` will equal False. This is because there is a remainder of `1` in the second instance.\n\n## The solution in Python\n\nOption 1:\n\n``````def is_divide_by(number, a, b):\n# if can divide without remainder\nif number % a ==0 and number % b ==0:\nreturn True\nelse:\nreturn False\n```Code language: Python (python)```\n\nOption 2:\n\n``````def is_divide_by(number, a, b):\nreturn not (number%a or number%b)\n```Code language: Python (python)```\n\nOption 3:\n\n``````def is_divide_by(n, a, b):\nreturn n%a == 0 == n%b\n```Code language: Python (python)```\nTags:\nSubscribe\nNotify of",
null,
""
] | [
null,
"https://ao.ms/wp-content/plugins/wp-performance/assets/placeholder.png",
null,
"https://ao.ms/wp-content/plugins/wp-performance/assets/placeholder.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.55353725,"math_prob":0.8136832,"size":1652,"snap":"2021-43-2021-49","text_gpt3_token_len":526,"char_repetition_ratio":0.15048544,"word_repetition_ratio":0.02909091,"special_character_ratio":0.34745762,"punctuation_ratio":0.20113315,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9906332,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T13:16:01Z\",\"WARC-Record-ID\":\"<urn:uuid:268ac30e-f545-42ad-82df-4b56eedcd738>\",\"Content-Length\":\"201134\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:db9c16c6-ca2c-4a8a-8bb6-2b3cd2a0cad4>\",\"WARC-Concurrent-To\":\"<urn:uuid:cb0ae5cd-e687-4de9-bcdd-01f53b53a4c4>\",\"WARC-IP-Address\":\"104.21.26.65\",\"WARC-Target-URI\":\"https://ao.ms/how-to-divide-a-number-in-python/\",\"WARC-Payload-Digest\":\"sha1:OCJQDEQCDRTRAK4ZHJXZIVJ6GTETCXP5\",\"WARC-Block-Digest\":\"sha1:KZUEBUZMZJ3SHJZJDHSIPMC2GMHYOYRQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585405.74_warc_CC-MAIN-20211021102435-20211021132435-00555.warc.gz\"}"} |
https://www.prepbible.com/1z0-808-test/prep-5846.html | [
"Act now and download your Oracle 1z0 808 practice test test today! Do not waste time for the worthless Oracle 1z0 808 book tutorials. Download Up to the minute Oracle Java SE 8 Programmer I exam with real questions and answers and begin to learn Oracle 1z0 808 practice test with a classic professional.\n\n♥♥ 2021 NEW RECOMMEND ♥♥\n\nFree VCE & PDF File for Oracle 1z0-808 Real Exam (Full Version!)\n\n★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions\n\nAvailable on: http://www.surepassexam.com/1z0-808-exam-dumps.html\n\nQ11. Given the code fragment:\n\nWhat is the result if the integer aVar is 9?\n\nA. 10 Hello world!\n\nB. 10 Hello universe!\n\nC. 9 Hello world!\n\nD. Compilation fails.\n\nQ12. Given:\n\npublic class Test {\n\npublic static void main(String[] args) {\n\ntry {\n\nString[] arr =new String;\n\narr = \"Unix\";\n\narr = \"Linux\";\n\narr = \"Solarios\";\n\nfor (String var : arr) {\n\nSystem.out.print(var + \" \");\n\n} catch(Exception e) {\n\nSystem.out.print (e.getClass());\n\nWhat is the result?\n\nA. Unix Linux Solaris\n\nB. Null Unix Linux Solaris\n\nC. Class java.lang.Exception\n\nD. Class java.lang.NullPointerException\n\nExplanation: null Unix Linux Solarios\n\nThe first element, arr, has not been defined.\n\nQ13. Given the fragment:\n\nWhat is the result?\n\nA. 13480.0\n\nB. 13480.02\n\nC. Compilation fails\n\nD. An exception is thrown at runtime\n\nQ14. Given:\n\nWhat is the result?\n\nA. simaple A\n\nB. Capital A\n\nC. simaple A default Capital A\n\nD. simaple A default\n\nE. Compilation fails.\n\nExplanation:\n\nHere we have to use two ternary operators combined. SO first we can use to check first\n\ncondition which is x > 10, as follows;\n\nx>10?\">\": (when condition false) Now we have to use another to check if x<10 as follows;\n\nx<10?V:\"=\" We can combine these two by putting last ternary statement in the false\n\nposition of first ternary statement as follows;\n\nx>10?\">\":x<10?'<':\"=\"\n\nhttps;//docs.oraclexom/javase/tutorial/java/nutsandbolts/if.html\n\nQ15. Given the code from the Greeting.Java file:\n\nWhich set of commands prints Hello Duke in the console?\n\nA. Option A\n\nB. Option B\n\nC. Option C\n\nD. Option D\n\nQ16. Given:\n\nAnd given the code fragment:\n\nWhat is the result?\n\nA. 4W 100 Auto 4W 150 Manual\n\nB. Null 0 Auto 4W 150 Manual\n\nC. Compilation fails only at line n1\n\nD. Compilation fails only at line n2\n\nE. Compilation fails at both line n1 and line n2\n\nExplanation:\n\nOn line n1 implicit call to parameterized constructor is missing and n2 this() must be the first line.\n\nQ17. Which two are valid array declaration?\n\nA. Object array[];\n\nB. Boolean array;\n\nC. int[] array;\n\nD. Float array;\n\nQ18. Given:\n\nclass Base {\n\n// insert code here\n\npublic class Derived extends Base{\n\npublic static void main(String[] args) {\n\nDerived obj = new Derived();\n\nobj.setNum(3);\n\nSystem.out.println(\"Square = \" + obj.getNum() * obj.getNum());\n\nWhich two options, when inserted independently inside class Base, ensure that the class is being properly encapsulated and allow the program to execute and print the square of the number?\n\nA. private int num; public int getNum() { return num; }public void setNum(int num) { this.num = num;}\n\nB. public int num; protected public int getNum() { return num; }protected public void setNum(int num) { this.num = num;}\n\nC. private int num;public int getNum() {return num;} private void setNum(int num) { this.num = num;}\n\nD. protected int num; public int getNum() { return num; } public void setNum(int num) { this.num = num;}\n\nE. protected int num; private int getNum() { return num; } public void setNum(int num) { this.num = num;}\n\nExplanation:\n\nIncorrect:\n\nNot B: illegal combination of modifiers: protected and public\n\nnot C: setNum method cannot be private.\n\nnot E: getNum method cannot be private.\n\nQ19. Given:\n\nWhat is the result?\n\nA. 11, 21, 31, 11, 21, 31\n\nB. 11, 21, 31, 12, 22, 32\n\nC. 12, 22, 32, 12, 22, 32\n\nD. 10, 20, 30, 10, 20, 30\n\nQ20. Given:\n\nThe class is poorly encapsulated. You need to change the circle class to compute and return the area instead.\n\nWhich two modifications are necessary to ensure that the class is being properly encapsulated?\n\nA. Remove the area field.\n\nB. Change the getArea( ) method as follows:\n\npublic double getArea ( ) { return Match.PI * radius * radius; }"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6609435,"math_prob":0.7304263,"size":4488,"snap":"2021-43-2021-49","text_gpt3_token_len":1271,"char_repetition_ratio":0.109500445,"word_repetition_ratio":0.09424084,"special_character_ratio":0.30013368,"punctuation_ratio":0.2173913,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9600403,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-06T16:19:15Z\",\"WARC-Record-ID\":\"<urn:uuid:d44369ff-55b7-4461-9caf-28d491ac6e4f>\",\"Content-Length\":\"41097\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:566eeb22-3c63-4f8e-8859-75bcb62d2ab9>\",\"WARC-Concurrent-To\":\"<urn:uuid:ec324f0e-b088-4e79-ad87-f1b6cd0651f3>\",\"WARC-IP-Address\":\"172.96.187.181\",\"WARC-Target-URI\":\"https://www.prepbible.com/1z0-808-test/prep-5846.html\",\"WARC-Payload-Digest\":\"sha1:WYIG3BJXFCUIO2H7GMK6NGMSFWDNJH6T\",\"WARC-Block-Digest\":\"sha1:WY7MJ3HH5S735U7VZZHQ2IE3MLKGQJNP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363301.3_warc_CC-MAIN-20211206133552-20211206163552-00354.warc.gz\"}"} |
https://testbook.com/question-answer/in-how-many-ways-can-a-committee-of-4-be-made-out--61b0a05d64d17eb7d9a6f7c9 | [
"In how many ways can a committee of 4 be made out of 5 men and 3 women containing at least one woman?\n\n1. 65\n2. 70\n3. 75\n4. 60\n\nOption 1 : 65\n\nDetailed Solution\n\nFormula used:\n\n• $$^nC_r=\\frac{n!}{r!(n-r)!}$$\n• nCn = 1\n• nCr = nCn-r\n\nCalculation:\n\nGiven that,\n\nThere are 5 men and 3 women.\n\nNumber of ways in which committee form containing at least 1 women\n\n3 men & 1 women + 2 men & 2 women + 1 men & 3 women\n\n= 5C3 × 3C1 + 5C2 × 3C2 + 5C1 × 3C3\n\n= 2× 5C3 × 3C1 + 5C1 × 3C3 (∵nCr = nCn-r)\n\n$$2\\times\\frac{5!}{3!×(5-3)!}×3+5\\times1$$ (∵ nCn = 1)\n\n$$2\\times\\frac{5\\times4\\times3 \\times2!}{3!×(2)!}×3+5$$\n\n= 60 + 5\n\n= 65"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.72973055,"math_prob":0.99994755,"size":668,"snap":"2022-05-2022-21","text_gpt3_token_len":288,"char_repetition_ratio":0.13253012,"word_repetition_ratio":0.0,"special_character_ratio":0.43263474,"punctuation_ratio":0.107913665,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98418367,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-17T04:24:09Z\",\"WARC-Record-ID\":\"<urn:uuid:52925619-72c8-4659-b186-04dd8c853843>\",\"Content-Length\":\"114749\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a92d603b-0461-463f-963e-2f25011fcc07>\",\"WARC-Concurrent-To\":\"<urn:uuid:dae367ee-15d4-447b-8f0f-3e061bcadcb6>\",\"WARC-IP-Address\":\"172.67.30.170\",\"WARC-Target-URI\":\"https://testbook.com/question-answer/in-how-many-ways-can-a-committee-of-4-be-made-out--61b0a05d64d17eb7d9a6f7c9\",\"WARC-Payload-Digest\":\"sha1:RVLGEOAIJRM7U5UJSJ5JNVW3OLMR3NRL\",\"WARC-Block-Digest\":\"sha1:3OR2B5HSR5RI3BY4ADBBLOSLMHMD3DMR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320300289.37_warc_CC-MAIN-20220117031001-20220117061001-00501.warc.gz\"}"} |
https://matholympiad.org.bd/forum/viewtopic.php?f=30&t=5940&p=21596 | [
"## BdPhO Regional (Dhaka-South) Higher Secondary 2019/Bonus\n\nDiscuss Physics and Physics Olympiad related problems here\nSINAN EXPERT\nPosts: 38\nJoined: Sat Jan 19, 2019 3:35 pm\nContact:\n\n### BdPhO Regional (Dhaka-South) Higher Secondary 2019/Bonus\n\nMany particle physics experiments are carried on one of two types of accelerator facilities, (a) colliders in which equal energy particle collide head on, i.e. their momentum vectors point in opposite direction, (b) “fixed target facilities”, where an energetic beam particle collide with a stationary target particle. The two types of facilities have different advantages and\ndisadvantages. We’ll consider one important difference in this problem.\n\nSuppose our goal is to collide two particles of same mass m to create a more massive particle of mass \\$M\\$ \\$(M > m)\\$ – in other words the original particles of mass m annihilate with each other and create a new particle of mass \\$M\\$. The key question regarding how much expensive our particle accelerator will be “How much energy does our particle beam(s) need to have?’’\n\n(a) (Head on) What is the minimum relativistic total energy of each particle of mass \\$m\\$ must be to create the new particle with mass \\$M\\$? (Express your answer in terms of \\$m\\$ and \\$M\\$)\n\n(b) (Fixed Particle) What is the minimum total energy that our incident particle of mass \\$m\\$ must have if it is to collide with another stationary particle of mass \\$m\\$ and create the single particle with mass \\$M\\$? Express your answer in terms of \\$m\\$ and \\$M\\$. Hint: Don’t forget that momentum must be conserved!\n\n(c) What is the ratio of the fixed target beam and the sum of the energies of two target beams in head on collisions? Which facility do you think should be less expensive?\nWhat is this ratio when \\$m\\$ is the mass of the proton \\$(~ 1 GeV/c2)\\$ and \\$M\\$ is the mass of the Higgs Boson \\$(~125 GeV/c2)\\$\n\\$The\\$ \\$only\\$ \\$way\\$ \\$to\\$ \\$learn\\$ \\$mathematics\\$ \\$is\\$ \\$to\\$ \\$do\\$ \\$mathematics\\$. \\$-\\$ \\$PAUL\\$ \\$HALMOS\\$"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.86610276,"math_prob":0.85867953,"size":1952,"snap":"2020-10-2020-16","text_gpt3_token_len":501,"char_repetition_ratio":0.1463039,"word_repetition_ratio":0.042682927,"special_character_ratio":0.25153688,"punctuation_ratio":0.072222225,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96739656,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-01T07:33:06Z\",\"WARC-Record-ID\":\"<urn:uuid:f8c20ea1-b818-461b-964b-38a5630ffb70>\",\"Content-Length\":\"29064\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e8c9e80e-5610-49e3-a4fe-60f2be9f4dae>\",\"WARC-Concurrent-To\":\"<urn:uuid:9e5f7716-d148-4eeb-939b-f8297d3ebfe6>\",\"WARC-IP-Address\":\"167.71.232.37\",\"WARC-Target-URI\":\"https://matholympiad.org.bd/forum/viewtopic.php?f=30&t=5940&p=21596\",\"WARC-Payload-Digest\":\"sha1:X7DOUVYKNYW4QRWS2GYVA5WKTER7RZK7\",\"WARC-Block-Digest\":\"sha1:ZFBJSSW26BBWDFROUGIHCAPB2TLSQIGS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370505550.17_warc_CC-MAIN-20200401065031-20200401095031-00312.warc.gz\"}"} |
https://www.gromacs.org/Documentation_of_outdated_versions/How-tos/Dihedral_PCA | [
"# Dihedral PCA\n\nTo make the index file for dihedral PCA either use mk_angndx or make an index file by hand. Now you need a suitable combination of g_angle (possibly with `-oc` or `-or`) and g_covar.\n\nHere is some discussion on the use of dihedral PCA and a reply.\n\n## Background\n\nThe implementation of PCA in GROMACS first makes a trajectory file with reduced dimensions matching the selected angles, and then makes a fake trajectory file that contains the eigenvectors and eigenvalues. This maybe wasn't the best approach possible, but it was made to work. Steps 1 and 2 do the dimensionality reduction, steps 3 and 4 generate a kind of hacked coordinate file whose dimensionality is large enough to help gmx covar and gmx anaeig work.\n\n## Stepwise instructions\n\n1. Use mk_angndx or text editor to generate an index file for the atoms involved in the chosen dihedral angles.\n\n2. Extract the angles from trajectory using the index file from step 1., e.g., `dangle.ndx`, in a command like:\n\n```g_angle -f foo.xtc -s foo.tpr -n dangle.ndx -or dangle.trr -type dihedral\n```\n\nwhere the output is `dangle.trr` that contains the simulation trajectory reduced to the chosen angle dimensions.\n\n3. Make an index file, named as `covar.ndx`, which necessarily contains one group of atom 1 to integer(2*N/3), where N is the number of dihedral angles. For example, for a peptide of 5 dihedral angles, the contents of `covar.ndx` should be\n\n``` [ foo ]\n1 2 3 4\n```\n\n4. Use the index file to make a .gro file that contains integer(2*N/3) atoms. Box size and atom coordinates don't matter. For example,\n\n```trjconv -s foo.tpr -f dangle.trr -o resized.gro -n covar.ndx -e 0\n```\n\n5. Perform the diagonalization with a command like\n\n```g_covar -f dangle.trr -n covar.ndx -ascii -xpm -nofit -nomwa -noref -nopbc -s resized.gro\n```\n\nwhere the outputs are `eigenval.xvg`, `eigenvec.trr`, `covar.log`, `covar.dat`, and `covar.xpm`.\n\n6. To get a PMF along one eigenvector use a command like\n\n```g_anaeig -v eigenvec.trr -f dangle.trr -s resized.gro -first X -last X -proj proj-1\n```\n\nwhere X is the serial number of the eigenvector. To visualize the result, use\n\n```xmgrace proj-X.xvg\n```\n\n7. To get a free energy landscape for projections along two eigenvectors, use a command like\n\n```g_anaeig -v eigenvec.trr -f dangle.trr -noxvgr -s resized.gro -first X -last Y -2d 2dproj_X_Y.xvg\n```\n\nwhere X and Y are the serial numbers of the eigenvectors.\n\n8. To transform such data into free energy landscape terms, we divide the 2D landscape with grid and count the number of conformations inside each grid. An awk script for such purpose has been posted here. The g_sham program (specifying the `-notime` option) can also be used to generate a 2-D plot of a free energy surface."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.76159966,"math_prob":0.8087515,"size":2167,"snap":"2021-31-2021-39","text_gpt3_token_len":599,"char_repetition_ratio":0.115580216,"word_repetition_ratio":0.032608695,"special_character_ratio":0.2325796,"punctuation_ratio":0.11883408,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9852442,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-25T19:24:47Z\",\"WARC-Record-ID\":\"<urn:uuid:131f215d-e5f8-4eed-9eec-405af3196652>\",\"Content-Length\":\"31859\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2015d8ca-5b4e-486e-937e-5d2cc2d2fe36>\",\"WARC-Concurrent-To\":\"<urn:uuid:2c8e3948-ebe6-4bbb-9d1b-ad8f219ca9c0>\",\"WARC-IP-Address\":\"130.237.11.150\",\"WARC-Target-URI\":\"https://www.gromacs.org/Documentation_of_outdated_versions/How-tos/Dihedral_PCA\",\"WARC-Payload-Digest\":\"sha1:HPA64EI6XVPJAKA2ET2OMHQCLI45HVGN\",\"WARC-Block-Digest\":\"sha1:XH5ELN4VOPTHMP54WML4U3TJZR44BLLK\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057733.53_warc_CC-MAIN-20210925172649-20210925202649-00086.warc.gz\"}"} |
https://ijnaa.semnan.ac.ir/article_4653.html | [
"### A new technique of reduce differential transform method to solve local fractional PDEs in mathematical physics\n\nDocument Type : Research Paper\n\nAuthors\n\n1 Department of Mathematics, Faculty of Education for Pure Sciences, University of Thi-Qar, Nasiriyah, Iraq.\n\n2 Department of Mathematics, Iran University of Science and Technology, Tehran 1684613114, Iran. Department of Mathematical Sciences, University of South Africa, Pretoria 0002, South Africa.\n\nAbstract\n\nIn this manuscript, we investigate solutions of the partial differential equations (PDEs) arising in mathematical physics with local fractional derivative operators (LFDOs). To get approximate solutions of these equations, we utilize the reduce differential transform method (RDTM) which is based upon the LFDOs. Illustrative examples are given to show the accuracy and reliable results. The obtained solutions show that the present method is an efficient and simple tool for solving the linear and nonlinear PDEs within the LFDOs.\n\nKeywords"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8705054,"math_prob":0.70540446,"size":888,"snap":"2022-40-2023-06","text_gpt3_token_len":178,"char_repetition_ratio":0.10633484,"word_repetition_ratio":0.0,"special_character_ratio":0.1891892,"punctuation_ratio":0.1369863,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98737633,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-04T20:59:07Z\",\"WARC-Record-ID\":\"<urn:uuid:c2e8d501-f960-405f-bd23-178bbea9c91e>\",\"Content-Length\":\"43168\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c93bb82b-bfa8-4ed9-92bd-ecb0782c74db>\",\"WARC-Concurrent-To\":\"<urn:uuid:497e78d2-4c4e-450b-914f-86561befb80e>\",\"WARC-IP-Address\":\"94.182.28.25\",\"WARC-Target-URI\":\"https://ijnaa.semnan.ac.ir/article_4653.html\",\"WARC-Payload-Digest\":\"sha1:W77REZB7DI6WLNSUOUNSYB4OONCAOMIY\",\"WARC-Block-Digest\":\"sha1:CE6PWPDLQDUTWCWSHJNWCPCF5DJHUM6D\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500154.33_warc_CC-MAIN-20230204205328-20230204235328-00841.warc.gz\"}"} |
https://fr.slideshare.net/andyb37/a-directf-iile-topicdownload-bv-c-v-d-8-which-graph-in-fig-22-mdocx | [
"Publicité",
null,
"Prochain SlideShare",
null,
"Kinematics-02-Objective Solved\nChargement dans ... 3\n1 sur 1\nPublicité\n\n### a) DirectF iile TopicDownload b)V c) V d) 8) Which graph in Fig- 2-2 m.docx\n\n1. a) DirectF iile TopicDownload b)V c) V d) 8) Which graph in Fig. 2-2 mpresents a constank non-zeto velocity? 8) A)graph a B)graph b C) graph c D) graph d E) both graplhs c and d ? 9) Which gaph/s) in Fig. 2-2 represem(s) zero acceleration? 9) E)c and d A)onlya B)only b C)a and b D)b andc 10) Which gaph(s) in Fig. 2-2 represenit(s) constant positive acceleration? 10) A) graph a B) graph b C) graph c D) graph d E) both graphs c and d 11) 11) When is the avemge velocity of an object equal to the instantaneous velocity? A) never B)only when the velocity is increasing at a constant rate C) always D)only when the velocity is decreasing at a constant rate E)only when the velocity is constant 12) If an object is accelerating, it must therefore undergo 12) ll uchaune in sneed, C)a change in velocity Solution 8. In graph b), graph is parallel to the x-axis means slope is zero so velocity is not changing with time. 9. When velocity is constant slope is zero. Slope in velocity vs time graph is the acceleration so acceleration is zero in b). Similarly in a) velocity is constant and zero so again acceleration is zero. So graph a) and b) is the answer. 10. In graph d), velocity is increasing with time so slope is positive means positive acceleration. 11. e) only when the velocity is constant.\nPublicité"
] | [
null,
"https://image.slidesharecdn.com/adirectfiiletopicdownloadbvcvd8whichgraphinfig-2-2m-230203020721-851062e9/85/a-directf-iile-topicdownload-bv-c-v-d-8-which-graph-in-fig-22-mdocx-1-320.jpg",
null,
"https://cdn.slidesharecdn.com/ss_thumbnails/04-kmobj-230526061552-ee6a6792-thumbnail.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.82807195,"math_prob":0.95488495,"size":1300,"snap":"2023-14-2023-23","text_gpt3_token_len":365,"char_repetition_ratio":0.19598766,"word_repetition_ratio":0.042016808,"special_character_ratio":0.2676923,"punctuation_ratio":0.08421053,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9986126,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-01T16:58:59Z\",\"WARC-Record-ID\":\"<urn:uuid:1226eb6b-b283-4a48-88e7-b3d7c1d20ffb>\",\"Content-Length\":\"419761\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c3567737-1305-4f18-a90a-6ff22c07025b>\",\"WARC-Concurrent-To\":\"<urn:uuid:d5814843-0a5f-4d73-a69a-609896aadd76>\",\"WARC-IP-Address\":\"146.75.34.152\",\"WARC-Target-URI\":\"https://fr.slideshare.net/andyb37/a-directf-iile-topicdownload-bv-c-v-d-8-which-graph-in-fig-22-mdocx\",\"WARC-Payload-Digest\":\"sha1:LLHM4DQTYXS5DEPYDURPCLI5HTWSCHF4\",\"WARC-Block-Digest\":\"sha1:CICWLRAMS6CYMGFZIDLHQ73LXDRU6JWE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224647895.20_warc_CC-MAIN-20230601143134-20230601173134-00205.warc.gz\"}"} |
http://www.programforu.com/2011/10/three-terminal-voltage-regulators-using.html | [
"Three terminal voltage regulators using IC 7805 and 7912 - Computer Programming\n\n# Computer Programming\n\nC C++ Java Python Perl Programs Examples with Output -useful for Schools & College Students\n\n## Wednesday, October 12, 2011\n\nThree terminal voltage regulators using IC 7805 and 7912\n\nAim: To verify the three terminal regulators using IC 7805 and 7912.\n\nApparatus:\n\n1. Voltage Regulator trainer kit\n2. Oscilloscope\n3. Digital multimeter\n4. Connecting patch chords\n\nCircuit description:\n\nThe IC 723 is a monolithic integrated circuit voltage regulator featuring high ripple rejection, excellent input and load regulation, excellent temperature stability etc.,\n\nIt consists of a temperature compensating reference voltage amplifier, an error amplifier, 150mA output transistor and an adjustable output current limiter.\nThe basic low voltage regulator type 723 circuit is shown in fig (1). The unregulated input voltage is 24V and the regulated output voltage is from 0.2V to 7.3V by varying POTR. RSC (R1) is connected across current sense (CS) and current limit (CL) terminals to limit the accidental short circuit current.\n\nA stabilizing capacitor (C1) of 100 pF is connected between frequency compensation terminal and inverting (INV) terminal. External NPN pass transistor is added to the basic 723-regulator circuit to increase its load current capability.\n\nThe output voltage can be regulated from 7 to 37 Volts for an input voltage range from 9.5 to 40Volts. For intermediate output voltages the following formula can be used",
null,
"The resistor values",
null,
"are calculated from potential divider network® .\n\nProcedure:\n\n1. Connect the circuit diagram as shown in figure.\n2. Measure the output of the regulated power supply that is 0 to +40 and 0 to -40 V using digital multimeter.\n\nFixed voltage regulators 7805 (+5 V)\n\n3. Connect the circuit as shown in figure to observe the line regulation.\n\n4. By varying Vin supply in steps measure the corresponding output Vo and record in a tabulated form as shown below.\n\n5. Plot the graph between Vin, Vo and observe the line regulation.\n\n7912 (-12 V)\n\n6. Connect the circuit as shown in below figure for line regulation.\n7. Repeat steps 4 and 5.\n\nResult:"
] | [
null,
"file:///C:/DOCUME~1/REJINP~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image002.gif",
null,
"file:///C:/DOCUME~1/REJINP~1/LOCALS~1/Temp/msohtmlclip1/01/clip_image004.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.83608335,"math_prob":0.9366153,"size":1975,"snap":"2019-13-2019-22","text_gpt3_token_len":446,"char_repetition_ratio":0.14967021,"word_repetition_ratio":0.01904762,"special_character_ratio":0.2329114,"punctuation_ratio":0.11780822,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9543165,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-23T18:47:15Z\",\"WARC-Record-ID\":\"<urn:uuid:180a29e6-1a19-4ef6-9f35-3e0f92a9e91a>\",\"Content-Length\":\"122893\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7fa973b5-6e50-4ddd-a29f-af836e6807ac>\",\"WARC-Concurrent-To\":\"<urn:uuid:14b8bb23-5590-47c5-a51d-9f6f118bf68a>\",\"WARC-IP-Address\":\"172.217.7.243\",\"WARC-Target-URI\":\"http://www.programforu.com/2011/10/three-terminal-voltage-regulators-using.html\",\"WARC-Payload-Digest\":\"sha1:JEOEIZ3NGCKF52HBJWLWJQHO3OHP34LE\",\"WARC-Block-Digest\":\"sha1:A3R3NNFGSADMRJWZSHQ7JWKLSLGPV4TR\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257361.12_warc_CC-MAIN-20190523184048-20190523210048-00402.warc.gz\"}"} |
https://forums.giantitp.com/showthread.php?639521-Question-about-Cantor-s-Diagonal-Argument&s=36fc60844b6b06ec9725e161c8ea7a86&p=25286300#post25286300 | [
"1.",
null,
"Question about Cantor's Diagonal Argument\n\nIn Cantor's Diagonal Argument to prove that the cardinality of the continuum is greater than that of the rationals, how do we know that the complimentary sequences are all distinct numbers? It's known that they don't contain the same exact sequence as any of the numbers on the list, but there are some numbers that have multiple digital representations (such as 1.0=0.9999...repeating in base 10)\n\nAdditionally, in the base 2 version of this argument there naively seems to be only a countably infinite number of diagonals (there's the one at the top left corner of the diagram, then the one starting one down from it, then the one one over from it, then the one starting one over and one down and so on and so on in the same sort of snaking pattern used to put the rationals into bijection with the integers). This would put the total at two times aleph null, which collapses down into being equal to just regular aleph null.",
null,
"",
null,
"Reply With Quote\n\n2.",
null,
"Re: Question about Cantor's Diagonal Argument\n\nFor the first I think this is a matter of definition as much as anything else.\n\nYou start with a list defined to be all of the members of the set and then construct a member not in the set. It doesn't matter if a member is in the list multiple times because you have just proven that the initial assumption (it is a list of all members of the set) cannot be true which is what implies you are dealing with an uncountable infinity.\n\nAs for 1.0000 and 0.9999 recurring - if you are just looking at the numbers between 0 and 1 then 1.0 is not in the set to begin with.\n\nThe Binary example just makes this easier to follow - and having proven that you can construct a number not in the set, no attempt to insert it into the list helps - you can still always construct another number not in the set. You are correct that there if the list was countable there would be a countable number of diagonals, but by proving that the list is not countable in the first place then neither is the number of diagonals.",
null,
"",
null,
"Reply With Quote\n\n3.",
null,
"Re: Question about Cantor's Diagonal Argument\n\n\"While 0.0111... and 0.1000... would be equal if interpreted as binary fractions (destroying injectivity), they are different when interpreted as decimal fractions, as is done by f. On the other hand, since t is a binary string, the equality 0.0999... = 0.1000... of decimal fractions is not relevant here.\"\nIn other words, its a matter of constructing representations that can't point to the same number.",
null,
"",
null,
"Reply With Quote\n\n4.",
null,
"Re: Question about Cantor's Diagonal Argument",
null,
"Originally Posted by Khedrac",
null,
"As for 1.0000 and 0.9999 recurring - if you are just looking at the numbers between 0 and 1 then 1.0 is not in the set to begin with.\nIt's a little more involved than this. The same issue shows up with 0.010000... and 0.0099999... . But each real number has at most two representations as an infinite sequence of digits ( and incidentally, the set of numbers with two such representations is countable ). The proof by contradiction could work as follows:\n\nEvery infinite sequence of digits corresponds to a real number in [0, 1).\nEvery real number corresponds to at most two infinite sequences of digits.\n\nSuppose the set of real numbers were countable.\nThen we could enumerate them in a list.\nThen we could enumerate their representations as infinite sequences of digits in a list, using the same order, but placing the two representations of those numbers having them one after the other.\nBut we can construct the diagonal, and generate an infinite sequence of digits that isn't on this list.\nThen this new sequence of digits corresponds to a real number not in the original list.",
null,
"",
null,
"Reply With Quote\n\n5.",
null,
"Re: Question about Cantor's Diagonal Argument\n\nWe can prove fairly easily that in fact the only case where two infinite decimals represent the same number are if one ends in ...999999... and ones ends in ...00000...:\n\nLet a and b be two different decimal representations. Let n be the first decimal place where they have different digits; we can assume that an (the nth digit of a) is greater than bn (the nth digit of b). Then if we cut off a and b at the nth decimal place, the truncation of a will be at least 10-n greater than the truncation of b, so the digits of a and b after the nth place must make up this difference if they are to be equal. The best we can do in making up the difference is if all remaining digits of b are 9 and all remaining digits of a are 0. In this case, since the sum from k=n+1 to infinity of 9*10-k is 10-n, we will exactly make up the difference, as long as an is just bn+1. If the nth digits differ by more than 1, or if any of the subsequent digits of a are not 0 or any of the subsequent digits of b are not 9, it will be completely impossible to make up the difference, so a and b will represent different numbers.\n\nThis resolves any concerns about applying the diagonal argument to real numbers in multiple ways:\n1. By being careful about how we construct the new number, we can ensure that none of the digits are 0 or 9. This means that it will represent a number with a unique representation, so the fact that the representation is different from all representations on our list implies that the number it represents is different from all representations on our list.\n2. Since every real number has one or two representations, in particular no real number has uncountably many representations. Because the diagonal argument shows there are uncountably many representations, this implies that there must also be uncountably many numbers.\n3. Since every real number with two representations has a representation which ends in infinitely many zeros, every such number is a rational number (and can be written with denominator a power of ten). This means there can only be countably many such numbers, so they are easy to work around (although now that I think about it, most strategies for working around them will basically boil down to one of the previous two options).",
null,
"",
null,
"Reply With Quote",
null,
"Posting Permissions\n\n• You may not post new threads\n• You may not post replies\n• You may not post attachments\n• You may not edit your posts\n•"
] | [
null,
"https://forums.giantitp.com/images/sand/icons/icon_scroll.png",
null,
"https://forums.giantitp.com/images/sand/misc/progress.gif",
null,
"https://forums.giantitp.com/clear.gif",
null,
"https://forums.giantitp.com/images/sand/icons/icon_scroll.png",
null,
"https://forums.giantitp.com/images/sand/misc/progress.gif",
null,
"https://forums.giantitp.com/clear.gif",
null,
"https://forums.giantitp.com/images/sand/icons/icon_scroll.png",
null,
"https://forums.giantitp.com/images/sand/misc/progress.gif",
null,
"https://forums.giantitp.com/clear.gif",
null,
"https://forums.giantitp.com/images/sand/icons/icon_scroll.png",
null,
"https://forums.giantitp.com/images/sand/misc/quote_icon.png",
null,
"https://forums.giantitp.com/images/sand/buttons/viewpost-right.png",
null,
"https://forums.giantitp.com/images/sand/misc/progress.gif",
null,
"https://forums.giantitp.com/clear.gif",
null,
"https://forums.giantitp.com/images/sand/icons/icon_scroll.png",
null,
"https://forums.giantitp.com/images/sand/misc/progress.gif",
null,
"https://forums.giantitp.com/clear.gif",
null,
"https://forums.giantitp.com/images/sand/buttons/collapse_40b.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9324343,"math_prob":0.97435844,"size":6400,"snap":"2022-05-2022-21","text_gpt3_token_len":1537,"char_repetition_ratio":0.13633521,"word_repetition_ratio":0.040034812,"special_character_ratio":0.24828126,"punctuation_ratio":0.10069177,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9946502,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-19T11:47:34Z\",\"WARC-Record-ID\":\"<urn:uuid:d881bd5e-13b7-4f4f-99cd-349b5c6b5375>\",\"Content-Length\":\"67893\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:60356933-676a-4539-9c10-9a50aeaa2ca0>\",\"WARC-Concurrent-To\":\"<urn:uuid:1df5b1a6-a76f-49f9-a4d1-8accbcd57cf2>\",\"WARC-IP-Address\":\"172.67.193.87\",\"WARC-Target-URI\":\"https://forums.giantitp.com/showthread.php?639521-Question-about-Cantor-s-Diagonal-Argument&s=36fc60844b6b06ec9725e161c8ea7a86&p=25286300#post25286300\",\"WARC-Payload-Digest\":\"sha1:PUV3A7L5UN62NJ2PU7WDDG4UR57RSIDE\",\"WARC-Block-Digest\":\"sha1:PJKYPJCFB4UTMXAHSYJUWADHNSNJDFEH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320301309.22_warc_CC-MAIN-20220119094810-20220119124810-00400.warc.gz\"}"} |
http://ppwu.auto-hirch-egelsbach.de/minimum-cost-path-graph.html | [
"# Minimum Cost Path Graph\n\nLet S be the set of vertices whose minimum distance from the source vertex has been found. The following table lists the Port Cost value for different bandwidths. The shortest path computed in the reduced cost graph is the same as the shortest path in the original graph. Steps for finding a minimum-cost spanning tree using _____ Algorithm: Add edges in order of cheapest cost so that no circuits form. The next lowest cost. I am looking to run MST on some vectors with geometries and cost. In this graph, cost of an edge (i, j) is represented by c(i, j). Your program will either return a sequence of nodes for a minimum-cost path or indicate that no solution exists. Minimum weight perfect matching problem: Given a cost c ij for all (i,j) ∈ E, find a perfect matching of minimum cost where the cost of a matchinPg M is given by c(M) = (i,j)∈M c ij. A minimum-cost spanning tree is one which has the smallest possible total weight (where weight represents cost or distance). This problem is concerned with finding the cheapest path between verticesa and b in a graph G = (V,E). the cost-minimized pathfrom the seed point to the goal point. Dynamic Graph Clustering Using Minimum-Cut Trees 1 Introduction Graph clustering has become a central tool for the analysis of networks in gen-eral, with applications ranging from the eld of social sciences to biology and to the growing eld of complex systems. Given a weighted graph, find the maximum cost path from given source to destination that is greater than a given integer x. for example, if your answer is 1 write 1 without decimal points. Initially, this quantity is infinity (i. the total intuitionistic fuzzy cost for traveling through the shortest path. $\\begingroup$ Hint: both shortest path and min-cost flow determine the minimum of a sum. We will use Prim’s algorithm to find the minimum spanning tree. Version 05/03/2011 Minimum Spanning Trees & Shortest Path—Graph Theory ©2013 North Carolina State University Chapter 8 – Page 1 Section 8. Given a path state state of type AbstractPathState, return a vector (indexed by vertex) of the paths between the source vertex used to compute the path state and a single destination vertex, a list of destination vertices, or the entire graph. NOTE: This algorithm really does always give us the minimum-cost spanning tree. This example. The distance from a vertex v i to a vertex v j in G is the minimum cost over all paths from v i to v j in G denoted by d∗ ij. a) Suppose that each edge in the graph has a weight of zero. particular, this package provides solving tools for minimum cost spanning tree problems, minimum cost arborescence problems, shortest path tree problems and minimum cut tree problem. can u much detail abt this…its very helpful to me…. Tarjan Princeton and HP Labs Abstract Consider a bipartite graph G= (X;Y;E) with real-valued weights on its edges, and suppose that Gis balanced, with jXj= jYj. In this case, we start with single edge of graph and we add edges to it and finally we get minimum cost tree. along path p; and (2) path p has the minimum cost (toll fee) among all the paths satisfying the condition (1). Verify that your result is a maximum or minimum value using the first or second derivative test for extrema. Two vertices are adjacent when they are both incident to a common edge. Dijkstra's algorithm is a graph search algorithm that can solve the single-source shortest path problem for a graph with non- negative edge path cost, outputting a shortest path tree. A number of algorithms have been proposed to enumerate all spanning trees of an undirected graph. Figure 1: Example of a shortest path problem and its mapping to the minimum cost ow model 1. path scheduling with all activity durations assumed to be at minimum cost. A) $2100 B)$2400 C) $2900 D)$6200. Find a minimum cost spanning tree on the graph below using Kruskal's algorithm. The cost is determined depending upon the criteria to be optimized. The following will run the k-maximum spanning tree algorithm and write back results: MATCH (n:Place{id:\"D\"}) CALL algo. The Prim’s algorithm operates on two disjoint sets of edges in the graph. This paper is organized as follows: In Section 2, we provide background ma- terial on network flow algorithms and present some preliminary results. We can, therefore define function for any V,. Long-run average cost (LRAC) curve is a graph that plots average cost of a firm in the long-run when all inputs can be changed. Removes the connection between the specified origin node and the specified destination node Keep in mind that this only removes the connection in one direction, for undirected graphs, the function must be called again with the destination node as the origin. Given a vertex s in graph G, find the shortest path from s to every other vertex in G A C B E 10 3 15 5 2 11 D 20 Closely related problem is to find the shortest (minimum cost) path between two nodes of a graph. The well-known basic problem concerns finding the shortest paths in graphs given any set of journeys and a weighted, connected graph. We analyze the problem of finding a minimum cost path between two given vertices such that the vector sum of all edges in the path equals a given target vector m. 2) Areas less than the minimum core habitat percentage times the area of the foraging radius are eliminated 3) A cost surface is created from the habitat quality raster, cells of high quality have a low cost and vise versa 4) The remaining patches are grown outwards across the cost surface to a distance equal to the foraging radius. of Gsuch that the undirected version of T is a tree and T contains a directed path from rto any other vertex in V. hk Ruifeng Liu Chinese University of Hong Kong rfl[email protected] The minimum cost spanning tree (MST) Spanning tree: is a free tree that connects all the vertices in V • cost of a spanning tree = sum of the costs of the edges in the tree Minimum spanning tree property: • G = ( V, E): a connected graph with a cost function defined on the edges; U ⊆V. Part 3: Remember that we are suppose to find the point (x,y) on the graph of the parabola, y = x 2 + 1, that minimizes d. Optimal Discounted Cost in Weighted Graphs Ashutosh Trivedi = Cost(ˇ): | Now consider the path ˇ we write DCost(v) as minimum discounted cost of all in nite. A connected graph with no circuits, called trees, are also discussed in this chapter. The idea is to start with an empty graph and try to add edges one at a time, always making sure that what is built remainsacyclic. In this way, each distant node influences the cen-ter node through a path connecting the two with minimum cost, providing a robust estimation and intact exploration of the graph structure. As A* traverses the graph, it follows a path of the lowest known cost, Keeping a sorted priority queue of alternate path segments along the way. Here is my Graph class that implements a graph and has nice a method to generate its spanning tree using Kruskal's algorithm. And here comes the definition of an AI agent. graph find a minimum cost to find the shortest path between two points. Total cost of a path to reach (m, n) is sum of all the costs on that path (including both source and destination). Specifically distance[v] stores the minimum distance so far from the source vertex s to some other vertex v. min_cost_flow (G[, demand, capacity, weight]) Return a minimum cost flow satisfying all demands in digraph G. In essence, the planner develops a list of activities on the critical path ranked with their cost slopes. The weight of a shortest path tree. The path is (0, 0) –> (0, 1) –> (1, 2) –> (2, 2). {Each node has a value b(v). For a given source vertex (node) in the graph, the algorithm finds the path with lowest cost (i. satisfaction) problems with costs. [Tree, pred] = graphminspantree(G) finds an acyclic subset of edges that connects all the nodes in the undirected graph G and for which the total weight is minimized. Eulerization of a graph is the process of finding an Euler circuit for that graph. It should return and integer that represents the minimum weight to connect all nodes in the graph provided. Initially, this quantity is infinity (i. the distance of the right path (between robot 3’s vertex and 2’s goal) be x 1. A simple graph with (a) a face-spanning subgraph of cost 11 and (b) another face-spanning subgraph of cost 13. To find the path, the image is first modeled as a graph. Such a route is easily obtained by a breadth first search method. It adds one more node in each iteration to the minimum cost spanning tree. Steps for finding a minimum-cost spanning tree using _____ Algorithm: Add edges in order of cheapest cost so that no circuits form. Describe and analyze an e cient algorithm for nding a minimum-cost monotone path in such a graph, G. An edge is the line segment connecting two nodes and has the same length in either direction. Prim’s Algorithm. Proof: Consider any path from sto some node t. Tarjan Princeton and HP Labs Abstract Consider a bipartite graph G= (X;Y;E) with real-valued weights on its edges, and suppose that Gis balanced, with jXj= jYj. minimum cost on the section from s to t, which makes the max-flow also min-cost. We then will see how the basic approach of this algorithm can be used to solve other problems including finding maximum bottleneck paths and the minimum spanning tree (MST) problem. In the maze defined, True are the open ways. Both search methods can be used to obtain a spanning tree of the graph, though if I recall correctly, BFS can also be used in a weighted graph to generate a minimum cost spanning tree. • Route signals along minimum cost path • If congestion/overuse – assign higher cost to congested resources • Makes problem a shortest path search • Allows us to adapt costs/search to problem • Repeat until done Penn ESE 535 Spring 2015 -- DeHon 26 Key Idea • Congested paths/resources become expensive. Let G = (V; E) be an (undirected) graph with. Use Kruskal's algorithm for minimum-cost spanning trees on the graph below. Suppose you are given a connected graph G, with edge costs that are all distinct. Finding minimum cost to visit all vertices in a graph and returning back. path scheduling with all activity durations assumed to be at minimum cost. Before increasing the edge weights, shortest path from vertex 1 to 4 was through 2 and 3 but after increasing Figure 1: Counterexample for Shortest Path Tree the edge weights shortest path to 4 is from vertex 1. the total intuitionistic fuzzy cost for traveling through the shortest path. ) In this context, given an input graph G, one seeks a homomorphism f of G to H with minimum cost, i. Each cell of the matrix represents a cost to traverse through that cell. A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. Now, let’s ask: what’s the shortest path cost to, say, Ben and Jerry’s? * To move to weighted graphs, we appeal to the mighty power of Dijkstra. Using this answer, by finding the minimum cost closed walk (or just it's cost) of an arbitrary 4-regular planar graph, with weights 1, we can decide whether it has a Hamiltonian Path, but this problem is NP-complete. As I stand now I'm using DFS, and it's pretty slow (high number of nodes and maximum length too). For positive edge weight graphs. NOTE: This algorithm really does always give us the minimum-cost spanning tree. The cost is determined depending upon the criteria to be optimized. This is the single-source minimum-cost paths problem. (eds) Graph Based Representations in Pattern Recognition. ° Among all the spanning trees of a weighted and connected graph, the one (possibly more) with the least total weight is called a minimum spanning tree (MST). shortest path finding as a complete graph G (V, E). The multistage graph problem is finding the path with minimum cost from source s to sink t. A spanning tree of a graph is a tree that has all the vertices of the graph connected by some edges. Dijkstra solves the shortest path problem (from a specified node), while Kruskal and Prim finds a minimum-cost spanning tree. Now any positive value (>0) may exist on each edge. Suppose we have a weighted graph G = (V, E, c), where V is the set of vertices, E is the set of arcs, and. along path p; and (2) path p has the minimum cost (toll fee) among all the paths satisfying the condition (1). There can be many spanning trees. A minimum directed spanning tree (MDST) rooted at ris a directed spanning tree rooted at rof minimum cost. Next, the planner can examine activities on the critical path and reduce the scheduled duration of activities which have the lowest resulting increase in costs. replacing the edge weights with ((LCM of all edges)/(weight of the edge)) makes the longest edge as smallest and smallest edge as longest. Minimum Spanning Tree Problem We are given a undirected graph (V,E) with the node set V and the edge set E. A number of problems from graph theory are called Minimum spanning tree. A minimum directed spanning tree (MDST) rooted at ris a directed spanning tree rooted at rof minimum cost. // Indexed in order of stages E is a set of edges. Assuming that you don’t expect the paths to be more than 1000 steps long, you can choose p = 1/1000. There also can be many minimum spanning trees. Minimum Cost flow problem is a way of minimizing the cost required to deliver maximum amount of flow possible in the network. As mentioned there, grid problem reduces to smaller sub-problems once choice at the cell is made, but here move will be in reverse direction. ing tree, or a shortest path. Each unit of flow on each arc corresponds to onepathgoingthroughthatnode. A circuit that uses every edge exactly once is an Euler circuit. The cost w(T) of a directed spanning tree Tis the sum of the costs of its edges, i. The program must be possible to open these files (check the format). However, when we add a 2 to this graph, we penalize longer paths, so the shortest path from a to d is a !b !d. Version 05/03/2011 Minimum Spanning Trees & Shortest Path—Graph Theory ©2013 North Carolina State University Chapter 8 – Page 1 Section 8. The shortest path problem can be defined for graphs whether undirected, directed, or mixed. Successive Shortest Path Algorithm for the Minimum Cost Flow Problem in Dynamic Graphs MathildeVernet1,MaciejDrozdowski2,YoannPigné1,EricSanlaville1 1Normandie Univ, UNIHAVRE, UNIROUEN, INSA Rouen, LITIS, 76600 Le Havre, France. Graph Magics - an ultimate software for graph theory, having many very useful things, among which a strong graph generator and more than 15 different algorithms that one may apply to graphs (ex. An Extended Path Following Algorithm for Graph-Matching Problem Zhi-Yong Liu, Hong Qiao,Senior Member, IEEE, and Lei Xu,Fellow, IEEE Abstract—The path following algorithm was proposed recently to approximately solve the matching problems on undirected graph models and exhibited a state-of-the-art performance on matching accuracy. I fear you will have to work a little and make a program that check every possible path until you find the one with minimum cost. Metanet is a toolbox of Scilab for graphs and networks computations. On a graph, transportation problems can be used to express challenging tasks involving matching supply to demand with minimal shipment expense; in discrete language, these become minimum-cost network ow problems. This contradicts the maximality of M. A path that uses every edge exactly once is an Euler path. Connected graph: a path exists between every pair of find lowest cost set of roads to repair so that all cities are connected This is a minimum spanning tree. The path to reach (m, n) must be through one of the 3 cells: (m-1, n-1) or (m-1, n) or (m, n-1). applying IG-ÿskal's algorithm for finding a minimum-cost spanning tree for a graph. It adds one more node in each iteration to the minimum cost spanning tree. Abstract: We design and analyse approximation algorithms for the minimum-cost connected T-join problem: given an undirected graph G = (V;E) with nonnegative costs on the edges, and a subset of nodes T, find (if it exists) a spanning connected subgraph H of minimum cost such that every node in T has odd degree and every node not in T has even degree; H may have multiple copies of any edge of G. Minimum weight perfect matching problem: Given a cost c ij for all (i,j) ∈ E, find a perfect matching of minimum cost where the cost of a matchinPg M is given by c(M) = (i,j)∈M c ij. Shortest Distance Problems in Graphs Using History-Dependent Transition Costs with Application to Kinodynamic Path Planning Raghvendra V. Fig 1: This graph shows the shortest path from node \"a\" or \"1\" to node \"b\" or \"5\" using Dijkstras Algorithm. This paper involved in illustrating the best way to travel between two points and in doing so, the shortest path algorithm was created. If there is more than one minimum cost path from v to w, will Dijkstra’s algorithm always find the path with the fewest edges? If not, explain in a few sentences how to modify Dijkstra’s algorithm so that if there is more than one minimum path from v to w, a path with the fewest edges is chosen. @ inding an Euler circuit on a graph. Our results are based on a new approach to speed-up augmenting path based matching algorithms, which we describe next. Minimum Spanning Tree Problem We are given a undirected graph (V,E) with the node set V and the edge set E. Dijkstra's algorithm Like BFS for weighted graphs. This model consid-ers the phenomenon that some vehicles may choose to stop at some places to avoid tra c jams. Graph search algorithms explore a graph either for general discovery or explicit search. Similar is story for vertex C. Can you move some of the vertices or bend. 8 If the graph is directed it is possible for a tree of shortest paths from s and a minimum spanning tree in G. Each cell of the matrix represents a cost to traverse through that cell. Handout MS2: Midterm 2 Solutions 2 eb, we obtain a new spanning tree for the original graph with lower cost than T, since the ordering of edge weights is preserved when we add 1 to each edge weight. In this case, as well, we have n-1 edges when number of nodes in graph are n. Consider an undirected graph containing nodes and edges. Using this answer, by finding the minimum cost closed walk (or just it's cost) of an arbitrary 4-regular planar graph, with weights 1, we can decide whether it has a Hamiltonian Path, but this problem is NP-complete. In this Java Program first we input the number of nodes and cost matrix weights for the graph ,then we input the source vertex. The Dijkstra's algorithm gradually builds a short path tree using links in the network. This week we finish our look at pathfinding and graph search algorithms, with a focus on the Minimum Weight Spanning Tree algorithm, which calculates the paths along a connected tree structure with the smallest value (weight of the relationship such as cost, time or capacity) associated with visiting all nodes in the tree. Additionally, the graph is expected to have very few edges, so the average degree is very small. BANSAL Department of Mathematics, A. Need the graph to be connected, and minimize the cost of laying the cables. Unlike the situation where you're trying to find a minimum cost Hamilton circuit, there is an algorithm. of biconnected graph a linear cost function on the face cycles. Steiner tree problem or so called Steiner Problem in Graphs (SPG) is a classic combinatorial optimization problem. The minimum-cost spanning tree produced by applying Kruskal's algorithm will always contain the lowest cost edge of the graph. Minimum spanning tree is a tree in a graph that spans all the vertices and total weight of a tree is minimal. We describe a simple deterministic lexicographic perturbation scheme that guarantees uniqueness of minimum-cost flows and shortest paths in G. By Ion Cozac. i have an adjacency list representation of a graph for the problem, now i am trying to implement dijkstra's algorithm to find the minimum cost paths for the 'interesting cities' as suggested by @Kolmar. cost a configuration that is a Nash Equilibrium can get in total cost to the minimum solution. In order to be able to run this solution, you will need. ) In this context, given an input graph G, one seeks a homomorphism f of G to H with minimum cost, i. e the Global Processing Via Graph Theoretic technique and comes in sem 7 exams. This paper contains two similar theorems giving con-ditions for a minimum cover and a maximum matching of a graph. If all edge lengths are equal, then the Shortest Path algorithm is equivalent to the breadth-first search algorithm. The Minimum Weight Spanning Tree excludes the relationship with cost 6 from D to E, and the one with cost 3 from B to C. Kruskal’s algorithm is used for finding a minimum cost spanning tree. {positive b(v) is a supply {negative b(v) is a demand. Hence, the cost of path from source s to sink t is the sum of costs of each edges in this path. A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. We transform an dependency attack graph into a Boolean formula and assign cost metrics to attack variables in the formula, based on the severity metrics. We have to go from A to B. This is the single-source shortest paths problem. A number of algorithms have been proposed to enumerate all spanning trees of an undirected graph. Given an n-d costs array, this class can be used to find the minimum-cost path through that array from any set of points to any other set of points. To find minimum cost at cell (i,j), first find the minimum cost to the cell (i-1, j) and cell (i, j-1). Nota: Java knows the length of arrays, in. [costs] is an LxM matrix of minimum cost values for the minimal paths [paths] is an LxM cell containing the shortest path arrays [showWaitbar] (optional) a scalar logical that initializes a waitbar if nonzero. hey, I am trying to find the cost or the length of the path by the following code. The cost reduction strategy converts an existing ow into a ow of lower cost by nding negative cost cycles in the residual graph and adding ow to those cycles. The goal is to obtain an Eulerian Path that has a minimal total cost. – fsociety May 11 '15 at 7:43. , there exist a path from ) •Breadth-first search •Depth-first search •Searching a graph -Systematically follow the edges of a graph to visit the vertices of the graph. the distance of the right path (between robot 3’s vertex and 2’s goal) be x 1. Assume that $C_v = 1$ for all vertices $1 \\leq v \\leq n$ (i. particular, this package provides solving tools for minimum cost spanning tree problems, minimum cost arborescence problems, shortest path tree problems and minimum cut tree problem. There are some theorems that can be used in specific circumstances, such as Dirac's theorem, which says that a Hamiltonian circuit must exist on a graph with n vertices if each vertex has degree n /2 or greater. Finally, we open the black box in order to generalize a recent linear-time algorithm for multiple-source shortest paths in unweighted undirected planar graphs to work in arbitrary orientable surfaces. We describe a simple deterministic lexicographic perturbation scheme that guarantees uniqueness of minimum-cost flows and shortest paths in G. Continue until every vertex is on some-edge you have chosen. acyclic graphs (DAGs) and propose structured sparsity penalties over paths on a DAG (called “path coding” penalties). We propose search several fast algorithms, which allow us to define minimal time cost path and minimal cost path. 2-vertex-connected subgraphs of low cost; no previous approximation algorithm was known for either problem. hk ABSTRACT The computation of Minimum Spanning Trees (MSTs) is a funda-mental graph problem with. Minimum spanning tree Given a connected graph G = (V, E) with edge weights c e, an MST is a subset of the edges T ⊆ E such that T is a spanning tree whose sum of edge weights is minimized. Find a minimum cost spanning tree on the graph below using Kruskal's algorithm. Conclusion We have to study the minimum cost spanning tree using the Prim’s algorithm and find the minimum cost is 99 so the final path of minimum cost of spanning is {1, 6}, {6, 5}, {5, 4}, {4, 3}, {3, 2}, {2, 7}. Now I relax all edges leaving B,and set path cost of C as 3, and path cost to e as -2. In this chapter, we consider four specific network models—shortest-path prob-lems, maximum-flow problems, CPM-PERT project-scheduling models, and minimum-spanning. In this paper, we address this issue for directed acyclic graphs (DAGs) and propose structured sparsity penalties over paths on a DAG (called “path coding” penalties). Algorithms in graphs include finding a path between two nodes, finding the shortest path between two nodes, determining cycles in the graph (a cycle is a non-empty path from a node to itself), finding a path that reaches all nodes (the famous \"traveling salesman problem\"), and so on. Lecture notes on bipartite matching 3 Theorem 2 A matching M is maximum if and only if there are no augmenting paths with respect to M. Repeatedly augment along a minimum -cost augmenting path. Minimum spanning tree. graph find a minimum cost to find the shortest path between two points. Part 3: Remember that we are suppose to find the point (x,y) on the graph of the parabola, y = x 2 + 1, that minimizes d. A logarithmic algorithm for the minimum path problem in Knödel graphs is an open problem despite the fact that they are bipartite and highly symmetric. MCP ¶ class skimage. In this graph, cost of an edge (i, j) is represented by c(i, j). A tax of 1 cent per mile on commercial trucks’ travel would have raised $2. Weighted Shortest Path Problem Single-source shortest-path problem: Given as input a weighted graph, G = ( V, E ), and a distinguished starting vertex, s, find the shortest weighted path from s to every other vertex in G. • Total cost: C = C(v, w, q) Minimum Total Cost is a function of input prices and output quantity. i have an adjacency list representation of a graph for the problem, now i am trying to implement dijkstra's algorithm to find the minimum cost paths for the 'interesting cities' as suggested by @Kolmar. First, we identify optimality conditions, which tell us when a given perfect matching is in fact minimum. One classical model that has resurfaced in many multi-assembly methods (e. This is not a trivial problem, because the shortest path may not be along the edge (if any) connecting two vertices, but rather may be along a path involving one or more intermediate vertices. Must Read: C Program To Implement Kruskal’s Algorithm Every vertex is labelled with pathLength and predecessor. true Suppose a veteran is planning a visit to all the war memorials in Washington, D. In this section we shall show how to find a minimum-cost spanning tree for G. The multistage graph problem is finding the path with minimum cost from source s to sink t. A typical application for minimum-cost spanning trees occurs in the design of communications networks. Suppose that each edge in the graph has a weight of zero (while non-edges have a cost of$ \\infty $). The output is either a single float (when a single vertex is provided) or a vector of floats corresponding to the vertex vector. In this paper, we implemented two graph theory methods that extend the least-cost path approach: the Conditional Minimum Transit Cost (CMTC) tool and the Multiple Shortest Paths (MSPs) tool. {Find ow which satis es supplies and demands and has minimum total cost. It can be said as an extension of maximum flow problem with an added constraint on cost(per unit flow) of flow for each edge. // Indexed in order of stages E is a set of edges. Shortest Path using Dijkstra's Algorithm is used to find Single Source shortest Paths to all vertices of graph in case the graph doesn't have negative edges. As you can probably imagine, larger graphs have more nodes and many more possibilities for subgraphs. Generic approach: A tree is an acyclic graph. Consider a connected undirected graph G with not necessarily distinct edge costs. The cost of this spanning tree is (5 + 7 + 3 + 3 + 5 + 8 + 3 + 4) = 38. In case it can, what would be the minimum cost of such path?. Kruskal's algorithm is a minimum-spanning-tree algorithm which finds an edge of the least possible weight that connects any two trees in the forest. Prim’s Algorithm. scrolling computer game in terms of nding a minimum-cost monotone path in the graph, G, that represents this game. Minimum Spanning Tree Problem Find a minimum-cost set of edges that connect all vertices of a graph at lowest total cost Applications Connecting \"nodes\" with a minimum of \"wire\" Networking Circuit design Collecting nearby nodes Clustering, taxonomy construction Approximating graphs Most graph algorithms are faster on trees. A tax of 1 cent per mile on commercial trucks’ travel would have raised$2. I want to: Make it pythonic Improve readability Improve the abstracti. A third is in the process of obtaining a subset of the overall graph, called a Spanning Tree which connects every desired node with a path, but has no paths which can start and end on the same node (such a path is called a cycle). 3: Computing the Single Source Shortest Path in a graph. of biconnected graph a linear cost function on the face cycles. It's important to be acquainted with all of these algorithms - the motivation behind them, their implementations and applications. G is usually assumed to be a weighted graph. Both of these conditions depend on the concept of an alternating path, due to Petersen . These fun activities will help students learn how to read and gather data and use tables to create. Looks at the successors of the current lowest cost vertex in the wavefront. If G is a weighted graph, then the minimum spanning tree Span(G) is the spanning tree over G with minimum weight. if there are multiple edges, keep the lowest cost one Iedge weights are g(x t;u t) Iadd additional target vertex z with an edge from each x 2X T with weight g T (x) Ia sequence of actions is a path through the unrolled graph from x 0 to z Iassociated objective is total, weighted path length 4. In this case, we start with single edge of graph and we add edges to it and finally we get minimum cost tree. To find minimum cost at cell (i,j), first find the minimum cost to the cell (i-1, j) and cell (i, j-1). Minimum spanning tree is the spanning tree where the cost is minimum among all the spanning trees. This model consid-ers the phenomenon that some vehicles may choose to stop at some places to avoid tra c jams. 32 to just. The first distinction is that Dijkstra's algorithm solves a different problem than Kruskal and Prim. Dijkstra's algorithm (also called uniform cost search) - Use a priority queue in general search/traversal. Conclusion We have to study the minimum cost spanning tree using the Prim’s algorithm and find the minimum cost is 99 so the final path of minimum cost of spanning is {1, 6}, {6, 5}, {5, 4}, {4, 3}, {3, 2}, {2, 7}. We transform an dependency attack graph into a Boolean formula and assign cost metrics to attack variables in the formula, based on the severity metrics. Given a graph, the start node, and the goal node, your program will search the graph for a minimum-cost path from the start to the goal. The cost of a path is the sum of the costs of the edges and vertices encountered on the path. Weighted Graphs Data Structures & Algorithms 3 [email protected] ©2000-2009 McQuain Dijkstra's SSAD Algorithm* We assume that there is a path from the source vertex s to every other vertex in the graph. The limitation of this type of analysis is that only a single path is identified, even though alternative paths with comparable costs might exist. It works for non-loopy mazes which was already my goal. The cost of the spanning tree is the sum of the weights of all the edges in the tree. Repeatedly augment along a minimum -cost augmenting path. In this paper, the time dependent graph is presented. MCP(costs, offsets=None, fully_connected=True)¶. A heuristic is admissible if for any node, n, in the graph, the heuristic estimate of the cost of the path from n to t is less than or equal to the true cost of that path. There are nn–2 spanning trees of K n. (2)Then I process vertex b, and it is now included in S as it's shortest path from source is determined. The goal of the proposal is to obtain an optimal path with the same cost as the path returned by Dijkstra’s algorithm, for the same origin and destination, but using a reduced graph. Maintains a cost to visit every vertex. 4 Problem 5. It is defined here for undirected graphs; for directed graphs the definition of path requires that consecutive vertices be connected by an appropriate directed edge. Dijkstra’s Algorithm successfully finds the lowest cost path for each journey. There are some theorems that can be used in specific circumstances, such as Dirac’s theorem, which says that a Hamiltonian circuit must exist on a graph with n vertices if each vertex has degree n /2 or greater. Total cost of a path to reach (m, n) is sum of all the costs on that path (including both source and destination). The problem is solved by using the Minimal Spanning Tree Algorithm. Starting from node , we select the lower weight path, i. Before increasing the edge weights, shortest path from vertex 1 to 4 was through 2 and 3 but after increasing Figure 1: Counterexample for Shortest Path Tree the edge weights shortest path to 4 is from vertex 1. Note : It is assumed that negative cost cycles do not exist in input matrix. The path is (0, 0) –> (0, 1) –> (1, 2) –> (2, 2). acyclic graphs (DAGs) and propose structured sparsity penalties over paths on a DAG (called “path coding” penalties). Determining a minimum cost path between two given nodes of this graph can take O(mlogn) time, where n = jV j and m = jEj: If this graph is huge, say n … 700000 and m. [Tree, pred] = graphminspantree(G) finds an acyclic subset of edges that connects all the nodes in the undirected graph G and for which the total weight is minimized. Given a square grid of size N, each cell of which contains integer cost which represents a cost to traverse through that cell, we need to find a path from top left cell to bottom right cell by which total cost incurred is minimum. There are some theorems that can be used in specific circumstances, such as Dirac's theorem, which says that a Hamiltonian circuit must exist on a graph with n vertices if each vertex has degree n /2 or greater. A minimum-cost spanning tree is one which has the smallest possible total weight (where weight represents cost or distance). Computing a planarorthogonaldrawingofa planar graphwith the minimum number of bends over all possible embeddings is in general NP-hard [17,18]. A typical application of this problem involves finding the best delivery route from a factory to a warehouse where the road network has some capacity and cost associated. min_paths(+Vertex, +WeightedGraph, -Tree) Tree is a tree of all the minimum-cost paths from Vertex to every other vertex in WeightedGraph. , there exist a path from ) •Breadth-first search •Depth-first search •Searching a graph -Systematically follow the edges of a graph to visit the vertices of the graph. Minimum Cost Flow Problem • Objective: determine the least cost movement of a commodity through a network in order to satisfy demands at certain nodes from available supplies at other nodes. Kruskal's algorithm is a minimum-spanning-tree algorithm which finds an edge of the least possible weight that connects any two trees in the forest. 1 Shortest path problem The shortest path problem is one of the simplest of all network ow problems. In kruskal’s algorithm, edges are added to the spanning tree in increasing order of cost. Minimum spanning tree. G is usually assumed to be a weighted graph. ] Each set V i is called a stage in the graph. A spanning tree in a given graph is a tree built using all the vertices of the graph and just enough of its edges to obtain a tree. Assuming that you don’t expect the paths to be more than 1000 steps long, you can choose p = 1/1000. Therefore, we can use the same reduction to also compute a minimum-cost maximum cardinality matching in O~(mn2=5) time. Operations Research Methods 8. • The edges for shortest path are , , and is the minimum cost of path 1 to 4 is \"4\", cost of path 1 to 2 is \"6\", and cost of path 4 to 3 is \"5\" of the given graph 6 + 4 + 5 = 15. This problem is similar to Finding possible paths in grid. 412 G orke et al. These algorithms carve paths through the graph, but there is no expectation that those paths are computationally optimal. This contradicts the maximality of M. We can, therefore define function for any V,. Investigate ideas such as planar graphs, complete graphs, minimum-cost spanning trees, and Euler and Hamiltonian paths. The cost of a path from s to t is the sum of costs of the edges on the path. i have an adjacency list representation of a graph for the problem, now i am trying to implement dijkstra's algorithm to find the minimum cost paths for the 'interesting cities' as suggested by @Kolmar. An expansion path provides a long-run view of a firm’s production decision and can be used to create its long-run cost curves. It is expanded, yielding nodes B, C, D. In any graph G, the shortest path from a source vertex to a destination vertex can be calculated using Dijkstra Algorithm. Must Read: C Program To Implement Kruskal’s Algorithm Every vertex is labelled with pathLength and predecessor. the original graph. As it turns out, the minimum cost flow problem is equivalent to minimum cost circulation problem and transshipment problem in the sense that they can be reduce to each other while blowing up the input size by a constant factor. Describe and analyze an e cient algorithm for nding a minimum-cost monotone path in such a graph, G. This problem is also called the assignment problem. 2) Areas less than the minimum core habitat percentage times the area of the foraging radius are eliminated 3) A cost surface is created from the habitat quality raster, cells of high quality have a low cost and vise versa 4) The remaining patches are grown outwards across the cost surface to a distance equal to the foraging radius. Shortest Path, Network Flows, Minimum Cut, Maximum Clique, Chinese Postman Problem, Graph Center, Graph Median etc. Negative Edge Costs Single-Source Shortest-Path Problem Problem Given as input a weighted graph, G = (V,E), and a distinguished vertex, s, find the shortest weighted path from s to every other vertex in G. cost(e), but cannot be shared by more than cap(e) paths even if we pay the cost of e. Can you move some of the vertices or bend. Given a graph, the start node, and the goal node, your program will search the graph for a minimum-cost path from the start to the goal. An Extended Path Following Algorithm for Graph-Matching Problem Zhi-Yong Liu, Hong Qiao,Senior Member, IEEE, and Lei Xu,Fellow, IEEE Abstract—The path following algorithm was proposed recently to approximately solve the matching problems on undirected graph models and exhibited a state-of-the-art performance on matching accuracy. For example, consider below graph. Abstract: Let G be an edge-weighted directed graph with n vertices embedded on a surface of genus g."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9200784,"math_prob":0.9523868,"size":39623,"snap":"2019-51-2020-05","text_gpt3_token_len":8967,"char_repetition_ratio":0.19412403,"word_repetition_ratio":0.29242972,"special_character_ratio":0.21883754,"punctuation_ratio":0.09382621,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.99689233,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-22T00:16:45Z\",\"WARC-Record-ID\":\"<urn:uuid:dcd21aca-19bb-4a26-a8b4-f97cb63a0e1f>\",\"Content-Length\":\"51962\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9918645-81bc-4cc2-a385-2cabdb25248d>\",\"WARC-Concurrent-To\":\"<urn:uuid:508eda7a-e4da-4fe4-9303-91097b7e2283>\",\"WARC-IP-Address\":\"104.24.124.119\",\"WARC-Target-URI\":\"http://ppwu.auto-hirch-egelsbach.de/minimum-cost-path-graph.html\",\"WARC-Payload-Digest\":\"sha1:PV63QIZFYU467Z3DRNL2SPFS5TSG3EPY\",\"WARC-Block-Digest\":\"sha1:A4NTVXTL2A5MZRQU4OOQTTBISV43NNML\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250606226.29_warc_CC-MAIN-20200121222429-20200122011429-00266.warc.gz\"}"} |
https://aerospace.technion.ac.il/seminars/finding-the-shortest-3d-paths-with-curvature-constraint-in-close-range-scenarios/ | [
"",
null,
"",
null,
"# Finding the Shortest 3D paths with Curvature Constraint in Close Range Scenarios\n\nRafi Kfir\nWork towards MSc degree under the supervision of Prof. Yossi Ben Asher (AE, Technion) and Dr. George Hexner (Rafael)\nDepartment of Aerospace Engineering\nTechnion – Israel Institute of Technology\n\nThe problem of finding optimal trajectories is a basic problem in aerospace engineering with many different solution algorithms. One widely investigated branch is the problem of finding shortest paths under maximum curvature constraint. The shortest planar trajectories under curvature constraint are the well-known Dubins paths, which can either be arc-line-arc or arc-arc-arc combinations. In recent years few works dealt with 3D shortest paths under the curvature constraint. Theoretical works prove the existence of 3 types of spatial shortest trajectories: 3D arc-line-arc, 3D arc-arc-arc and helicoidal-arc. Some further works proposed algorithms for finding the first one (3D arc-line-arc trajectories), which is the shortest path when the start and the end point are far from each other.\n\nThis work first proposes an algorithm to calculate 3D arc-arc-arc type trajectories, (the solution for 3D arc-line-arc is already known), followed by an investigation of the helicoidal-arc type trajectory. In the case of helicoidal-arc the exact solution depends on a high order TPBVP (Two Point Boundary Value Problem), a difficult numerical problem. In this study we propose to approximate the helicoidal-arc with polynomials. The approximate polynomial solutions are compared to the optimal paths obtained from numerical integration and validated by GPOPS (General Purpose OPtimal Control Software). It is shown that the solutions based on the polynomials lead to good approximation of the optimal trajectories.\n\nThe talk will be given in English.\n\nWed, 02-01-2019, 16:30 (Gathering at 16:00)\n\nClassroom 165, ground floor, Library, Aerospace Eng.\n\nLight refreshments will be served before the lecture"
] | [
null,
"https://aerospace.technion.ac.il/wp-content/uploads/2014/07/cropped-header-print-eng.jpg",
null,
"https://aerospace.technion.ac.il/wp-content/uploads/2014/07/cropped-header-print-heb.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8755073,"math_prob":0.83845586,"size":1970,"snap":"2022-27-2022-33","text_gpt3_token_len":423,"char_repetition_ratio":0.11495422,"word_repetition_ratio":0.0,"special_character_ratio":0.1923858,"punctuation_ratio":0.0882353,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9742864,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-28T15:52:41Z\",\"WARC-Record-ID\":\"<urn:uuid:fbb9c741-c0a0-49f0-8e32-6274fcc783c4>\",\"Content-Length\":\"63712\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5492545e-7551-4cda-b77b-be795bb5cf74>\",\"WARC-Concurrent-To\":\"<urn:uuid:65fbf9ba-9acb-4ffe-a39b-8692fd5aefe1>\",\"WARC-IP-Address\":\"132.68.239.54\",\"WARC-Target-URI\":\"https://aerospace.technion.ac.il/seminars/finding-the-shortest-3d-paths-with-curvature-constraint-in-close-range-scenarios/\",\"WARC-Payload-Digest\":\"sha1:44KI2ZPRBV4TYGUGN6KOQCQQ4MXJCOYE\",\"WARC-Block-Digest\":\"sha1:654JESEOVDDYPA2J62ZTKQBKQLVEDTZ7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103556871.29_warc_CC-MAIN-20220628142305-20220628172305-00734.warc.gz\"}"} |
https://www.r-bloggers.com/2017/01/understanding-mixture-models-and-expectation-maximization-using-baseball-statistics/ | [
"Want to share your content on R-bloggers? click here if you have a blog, or here if you don't.\n\nPreviously in this series:\n\nIn this series on empirical Bayesian methods on baseball data, we’ve been treating our overall distribution of batting averages as a beta distribution, which is a simple distribution between 0 and 1 that has a single peak. But what if that weren’t a good fit? For example, what if we had a multimodal distribution, with multiple peaks?\n\nIn this post, we’re going to consider what to do when your binomial proportions are made up of multiple peaks, and when you don’t know which observation belongs to which clusters. For example, so far in our analysis we’ve been filtering out pitchers, who tend to have a much lower batting average than non-pitchers. If you include them, the data looks something like this:",
null,
"These batting averages certainly don’t look like a single beta distribution- it’s more like two separate ones mixed together. Imagine that you didn’t know which players were pitchers, and you wanted to separate the data into two groups according to your best prediction. This is very common in practical machine learning applications, such as clustering and segmentation.\n\nIn this post we’ll examine mixture models, where we treat the distribution of batting averages as a mixture of two beta-binomial distributions, and need to guess which player belongs to which group. This will also introduce the concept of an expectation-maximization algorithm, which is important in both Bayesian and frequentist statistics. We’ll show how to calculate a posterior probability for the cluster each player belongs to, and see that mixture models are still a good fit for the empirical Bayes framework.\n\n### Setup\n\nAs usual, I’ll start with some code you can use to catch up if you want to follow along in R. If you want to understand what it does in more depth, check out the previous posts in this series. (As always, all the code in this post can be found here).1\n\nWe’ve been filtering out pitchers in the previous posts, which make batting averages look roughly like a beta distribution. But when we leave them in, as I showed above, the data looks a lot less like a beta:",
null,
"The dashed density curve represents the beta distribution we would naively fit to this data. We can see that unlike our earlier analysis, where we’d filtered out pitchers, the beta is not a good fit- but that it’s plausible that we could fit the data using two beta distributions, one for pitchers and one for non-pitchers.\n\nIn this example, we know which players are pitchers and which aren’t. But if we didn’t, we would need to assign each player to a distribution, or “cluster”, before performing shrinkage on it. In a real analysis it’s not realistic that we wouldn’t know which players are pitchers, but it’s an excellent illustrative example of a mixture model and of expectation-maximization algorithms.\n\n### Expectation-maximization\n\nThe challenge of mixture models is that at the start, we don’t know which observations belong to which cluster, nor what the parameters of each distribution is. It’s difficult to solve these problems at the same time- so an expectation-maximization (EM) algorithm takes the jump of estimating them one at a time, and alternating between them.\n\nThe first thing to do in an EM clustering algorithm is to assign our clusters randomly:\n\n#### Maximization\n\nNow that we’ve got cluster assignments, what do the densities of each cluster look like?",
null,
"Well, that doesn’t look like much of a division- they have basically the same density! That’s OK: one of the nice features of expectation-maximization is that we don’t actually have to start with good clusters to end up with a good result.\n\nWe’ll now write a function for fitting a beta-binomial distribution using maximum likelihood estimation (and the `dbetabinom.ab` function from the VGAM package). This is a process we’ve done in multiple posts before, including the appendix of one of the first ones. We’re just encapsulating it into a function.\n\n(The `number` column I added will be useful in the next step). For example, here are the alpha and beta chosen for the entire data as a whole:\n\nBut now we’re working with a mixture model. This time, we’re going to fit the model within each of our (randomly assigned) clusters:\n\nAnother component of this model is the prior probability that a player is in cluster A or cluster B, which we set to 50-50 when we were assigning random clusters. We can estimate our new iteration of this based on the total number of assignments in each group, which is why we included the `number` column:\n\nMuch as the within-cluster densities only changed a little, the priors only changed a little as well. This was the maximization step: find the maximum likelihood parameters (in this case, two alpha/beta values, and a per-cluster probability), pretending we knew the assignments.\n\n### Expectation\n\nWe now have a distribution for each cluster. It’s worth noting that these are pretty similar distributions, and that neither is a good fit to the data.",
null,
"However, notice that due to a small random difference, cluster B is slightly more likely than cluster A for batting averages above about .2, and vice versa below .2.\n\nConsider therefore that each player has a likelihood it would have been generated from cluster A, and a likelihood it would have been generated from cluster B (being sure to weight each by the prior probability of being in A or B):\n\nFor example, consider Jeff Abbott, who got 11 hits out of 42 at-bats. He had a 4.35% chance of getting that if he were in cluster A, but a 4.76% chance if he were in cluster B. For that reason (even though it’s a small difference), we’ll put him in B. Similarly we’ll put Kyle Abbott in cluster A: 3/31 was more likely to come from that distribution.\n\nWe can do that for every player using `group_by` and `top_n`:\n\nThat’s the expectation step: assigning each person to the most likely cluster. How do our assignments look after that?",
null,
"Something really important happened here: even though the two beta models we’d fit were very similar, we still split up the data rather neatly. Generally batters with a higher average ended up in cluster B, while batters with a lower average were in cluster A. (Note that due to B having a slightly higher prior probability, it was possible for players with a low average- but also a low AB- to be assigned to cluster B).\n\n### Expectation-Maximization\n\nThe above two steps got to a better set of assignments than our original, random ones. But there’s no reason to believe these are as good as we can get. So we repeat the two steps, choosing new parameters for each distribution in the mixture and then making new assignments each time.\n\nFor example, now that we’ve reassigned each player’s cluster, we could re-fit the beta-binomial with the new assignments. Those distributions would look like this:",
null,
"Unlike our first model fit, we can see that cluster A and cluster B have diverged a lot. Now we can take those parameters and perform a new estimation step. Generally we will do this multiple times, as an iterative process. This is the heart of an expectation-maximization algorithm, where we switch between assigning clusters (expectation) and fitting the model from those clusters (maximization).\n\nHere I used the `accumulate` function from the `purrr` package, which is useful for running data through the same function repeatedly and keeping intermediate states. I haven’t seen others use this tidy approach to EM algorithms, and there are existing R approaches to mixture models.2 But I like this approach both because it’s transparent about what we’re doing in each iteration, and because our iterations are now combined in a tidy format, which is convenient to summarize and visualize.\n\nFor example, how did our assignments change over the course of the iteration?",
null,
"We notice that only the first few iterations led to a shift in the assignments, after which it appears to converge. Similarly, how did the estimated beta distributions change over these iterations?",
null,
"This confirms that it took about three iterations to converge, and then stayed about the same after that. Also notice that in the process, cluster B got much more likely than cluster A, which makes sense since there are more non-pitchers than pitchers in the dataset.\n\n### Assigning players to clusters\n\nWe now have some final parameters for each cluster:\n\nHow would we assign players to clusters, and get a posterior probability that the player belongs to that cluster? Well, let’s arbitrarily pick the six players that each batted exactly 100 times:\n\nWhere would we classify each of them? Well, we’d consider the likelihood each would get the number of hits they did if they were a pitcher (cluster A) or a non-pitcher (cluster B):",
null,
"By Bayes’ Theorem, we can simply use the ratio of one likelihood (say, A in red) to the sum of the two likelihoods to get the posterior probability:",
null,
"Based on this, we feel confident that Juan Nicasio and Jose de Jesus are pitchers, and that the others probably aren’t. And we’d be right! (Check out the `isPitcher` column in the `batter_100` table above).\n\nThis allows us to assign all players in the dataset to one of the two clusters.\n\nSince we know whether each player actually is a pitcher or not, we can also get a confusion matrix. How many pitchers were accidentally assigned to cluster B, and how many non-pitchers were assigned to cluster A? In this case we’ll look only at the ones for which we had at least 80% confidence in our classification.\n\nNot bad, considering the only information we used was the batting average- and note that we didn’t even use data on who were pitchers to train the model, but just let the clusters define themselves.\n\nIt looks like we were a lot more likely to call a pitcher a non-pitcher than vice versa. There’s a lot more we could do to examine this model, how well calibrated its posterior estimates are, and what kinds of pitchers may be mistaken for non-pitchers (e.g. good batters who pitched only a few times), but we won’t consider them in this post.\n\n### Empirical bayes shrinkage with a mixture model\n\nWe’ve gone to all this work posterior probabilities of each player’s assignments. How can we use this in empirical Bayes shrinkage, or with the other methods we’ve described in this series?\n\nWell, consider that all of our other methods have worked because the posterior was another beta distribution (thanks to the beta being the conjugate prior of the binomial). However, now that each point might belong to one of two beta distributions, our posterior will be a mixture of betas. This mixture is made up of the posterior from each cluster, weighted by the probability the point belongs to that cluster.\n\nFor example, consider the six players who had exactly 100 at-bats. Their posterior distributions would look like this:",
null,
"For example, we are pretty sure that Jose de Jesus and Juan Nicasio are part of the “pitcher” cluster, so that makes up most of their posterior mass, and all of Ryan Shealy’s density is in the “non-pitcher” cluster. However, we’re pretty split on Mike Mahoney- he could be a pitcher who is unusually good at batting, or a non-pitcher who is unusually bad.\n\nCan we perform shrinkage like we did in that early post? If our goal is still to find the mean of each posterior, then yes! Thanks to linearity of expected value, we can simply average the two distribution means, weighing each by the probability the player belongs to that cluster:\n\nFor example, we are pretty sure that Jose de Jesus and Juan Nicasio are part of the “pitcher” cluster, which means they mostly get shrunken towards that center. We are quite certain Ryan Shealy is not a pitcher, so he’ll be updated based entirely on that distribution.",
null,
"Notice that instead of shrinking towards a single value, the batting averages are now shrunken towards two centers: one higher value for the non-pitcher cluster, one smaller value for the pitcher cluster. Ones that are exactly in between don’t really get shrunken in either direction- they’re “pulled equally”.\n\n(For simplicity’s sake I didn’t use our beta-binomial regression approach in this model, but that could easily be added to take into account the relationship between average and AB).\n\nNot all of the methods we’ve used in this series are so easy to adapt to a multimodal distribution. For example, a credible interval is ambiguous in a multimodal distribution (see here for more), and we’d need to rethink our approach to Bayesian A/B testing. But since we do have a posterior distribution for each player- even though it’s not a beta- we’d be able to face these challenges.\n\n### What’s Next: Combining into an R package\n\nWe’ve introduced a number of statistical techniques in this series for dealing with empirical Bayes, the beta-binomial relationship, A/B testing, etc. Since I’ve provided the code at each stage, you could certainly apply these methods to your own data (as some already have!). However, you’d probably find yourself copying and pasting a rather large amount of code, which isn’t necessarily something you want to do every time you run into this kind of binomial data (it takes you out of the flow of your own data analysis).\n\nIn my next post I’ll introduce an R package for performing empirical Bayes on binomial data that encapsulates many of the analyses we’ve performed in this series. These statistical techniques aren’t original to me (most can be found in an elementary Bayesian statistics textbook), but providing them in a convenient R package can still be useful for the community. We’ll also go over some of the choices one makes in developing a statistics package in R, particularly one that is compatible with the tidy tools we’ve been using.\n\n1. I’m changing this analysis slightly to look only at National League batters since the year 1980. Why? Because National League pitchers are required to bat (while American League pitchers don’t in typical games), and because looking at modern batters helps reduce the noise within each group.\n\n2. I should note that I haven’t yet gotten an existing R mixture model package to work with a beta-binomial model like we do in this post If you have an approach you’d recommend, please share it in the comments or on Twitter!"
] | [
null,
"https://i2.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/batting_w_pitchers_plot-1.png",
null,
"https://i2.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/batting_w_pitchers_plot-1.png",
null,
"https://i0.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/starting_data_graph-1.png",
null,
"https://i1.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/unnamed-chunk-5-1.png",
null,
"https://i0.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/assignments_plot-1.png",
null,
"https://i0.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/unnamed-chunk-7-1.png",
null,
"https://i1.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/assignment_iterations-1.png",
null,
"https://i0.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/unnamed-chunk-9-1.png",
null,
"https://i0.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/unnamed-chunk-12-1.png",
null,
"https://i1.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/posterior_probability_graph-1.png",
null,
"https://i1.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/posterior_mixture_plot-1.png",
null,
"https://i1.wp.com/varianceexplained.org/figs/2017-01-03-mixture-models-baseball/eb_shrinkage_plot-1.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.946001,"math_prob":0.91689336,"size":14881,"snap":"2023-40-2023-50","text_gpt3_token_len":3120,"char_repetition_ratio":0.13430128,"word_repetition_ratio":0.03183446,"special_character_ratio":0.20294335,"punctuation_ratio":0.08958838,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95871,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,6,null,6,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-23T13:55:36Z\",\"WARC-Record-ID\":\"<urn:uuid:1fdfab94-b861-4fb7-95bf-17f307c2136e>\",\"Content-Length\":\"282032\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cabc8a5f-7172-4f22-b96a-a11dd0da5af2>\",\"WARC-Concurrent-To\":\"<urn:uuid:51077e9c-46bc-4984-9341-17772dacaf48>\",\"WARC-IP-Address\":\"104.21.77.221\",\"WARC-Target-URI\":\"https://www.r-bloggers.com/2017/01/understanding-mixture-models-and-expectation-maximization-using-baseball-statistics/\",\"WARC-Payload-Digest\":\"sha1:MKTXWEHO2TRXTLWFCQ6PKWP5PKZKSVLY\",\"WARC-Block-Digest\":\"sha1:CQF4QUGBMJWWCAIMDE3QM2I6W4SNHEAG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506481.17_warc_CC-MAIN-20230923130827-20230923160827-00345.warc.gz\"}"} |
https://butterflyofdream.wordpress.com/2012/06/09/basic-design-of-submarine-periscope/ | [
"## Basic design of submarine periscope\n\n Source http://www.maritime.org/fleetsub/pscope/chap1.htm 1A8. Limits of periscope design. It is seen from the preceding section that there are definite limits in periscope design. The vital factors, as in a telescope, are: 1) length of tube, 2) diameter, 3) illumination, 4)magnification, and 5) size of field. If a periscope favoring any one of these factors is to be produced, such favoring can be only at the expense of the other factors; hence, the final design generally is a compromise. 1A9. Examples of periscope design. The following requirements are for periscopes which have been used in submarines: field, at least 40 degrees to 45 degrees;magnification, between 1.2x and 1.5x; exit pupil, at least 5 millimeters in diameter;length, not specified; external diameter, 5 inches; thickness of walls, about 1/4 inch. Let us find possible periscope lengths under these conditions for the two magnifications given, 1.2x and 1.5x. The inside diameter of the tube is 5 inches minus 1/2 inch, or 4 1/2 inches. The lens, lens-holding ring, supporting tube, and so forth take up another 1/2 inch of diameter, leaving about 4 inches free for the objective. 4 inches = 101.6 mm, which is close to 100 mm In order to obtain an exit pupil of 5 millimeters, the magnification of the telescope must be: Diameter of objective / Diameter of exit pupil = 100 / 5 = 20x 3",
null,
"Figure 1-1. Section through submarine with periscope elevated. 4 If the magnification of the final periscope is to be 1.2x, the reduction of the upper telescope must be: 20 / 1.2 = 16.67, or 16.67x Since the field must be 40 degrees / 16.67, or 2.4 degrees = 2 degrees 24′, this limits the length between the objectives of the two telescopes, since the entire beam of light must fall on the lower objective. From Figure 1-3, it can be seen that the permissible length equals 2 / tan θ, where 2 is half the diameter of the lower objective lens in inches and θ is half the angle of beam. θ equals 2 degrees 24′ / 2, or 1 degrees 12′. log 2 = 10.30103 – 10 log tan 1 degree 12′ = (8.32112 / 1.97991) – 10 antilog 1.97991 = 95.58 inches = 7 feet 11 1/2 inches The upper and lower telescope systems enter into the total length, and if it were possible to increase the focal length of their objective lenses",
null,
"Figure 1-2. Detail of encircled section in Figure 1-1. 5 indefinitely, the periscope could be lengthened. Increasing this is limited, however, by the same considerations of diameter and cannot exceed the same length; that is, about 7 feet 11 1/2 inches for each telescope system. Hence, the total possible length is roughly 3 times 7 feet 11 1/2 inches, or about 23 feet 10 1/2 inches. Since this length is greater than is required, the diameter of the periscope may be reduced, the magnification increased, or the size of the exit pupil increased without sacrifice.If the magnification is to be 1.5x, the reduction of the upper telescope must be: 20 / 1.5 = 13 1/3x For a field of 40 degrees, the angle of beam is: 40 / 13 1/3 = 30 degrees The inter-objective distance is: log 2 = 10.30103 – 10 log tan 1 degrees 30′ = (8.41807 / 1.88296) – 10 antilog 1.88296 = 76.37 inches = 6 feet 4.4 inches The total length possible is 3 times 6 feet 4.4 inches, or 19 feet 1.2 inches.To increase the length of tube beyond these limits, more telescopes may be placed in the tube. If astronomical telescopes are used, two more must be employed to keep the image erect, making a total of four telescope systems. One Galilean telescope could be used. The objection to adding more telescopes lies in the fact that each lens through which the beam must pass absorbs light, and if more are added, the illumination is seriously reduced. Figure 1-4 shows a periscope designed as a straight instrument, and Figure 1-5 shows it with prisms introduced. The prisms may be placed at any point where the angle of the rays does not exceed the critical angle which results in total reflection. In this particular case, the prisms are placed at the focal planes. Both periscopes produce an erect image, since the two astronomical telescopes and the two prisms counteract each other in inverting the object. Prisms should not be placed exactly in a focal plane. Doing so is faulty design, since any minute imperfections",
null,
"Figure 1-3. Example of periscope design.",
null,
"Figure 1-4. Example of periscope design.",
null,
"Figure 1-5. Example of periscope design. 6 that may be present in or on the reflecting surface are reproduced as part of the final image, whereas a lens or glass plate which is not in a focal plane, or near one, may be dirty without affecting the resulting image. Periscope specifications often state that no lens or glass plate should be in or near a focal plane except the crosswire reticle, which must of necessity be placed in a focal plane.Since the backs of the prisms, which are the reflecting surfaces, are silvered, the critical angle for reflection is raised to more than 20 degrees; thus the two eyepieces may be placed between the prisms and the objectives. Both forms of construction are used in various periscopes. However, the best position for a prism is at a point at which the rays are approximately parallel; in erecting telescopes, this point lies between the two erecting lenses. The chief function of a telescope system in a periscope is to take an object appearing from the point of vision under narrow angular view, and produce it to the eye at a wide angle. The ratio of these two angles is the magnification of the telescope. 1A10. Altiscopes. The only difference between a periscope and an altiscope is that in an altiscope the upper prism is omitted and the view is directly upward toward the zenith. The field of an altiscope is 100 degrees. To obtain this field, some sacrifice must be made in other characteristics. The magnification is necessarily less than unity. The only type of periscope used in the Navy today which permits observation of the zenith is the Type II design (Design Designations 89KA40T/1.414HA, 91KA40T/1.414HA, and 92KA40T/1.4HA built by the Kollmorgen Optical Corp., Brooklyn, N.Y., which is of the high-angle type. The prism has a maximum elevation of the line of sight above horizontal of 74.5 degrees. The entire sky is observed with the line of sight set respectively at 14 degrees, 44 degrees, and 74.5 degrees or full elevation, giving complete zenith at the edge of the field in low power. The periscope is rotated 360 degrees in each zone with a minimum of overlap between the zones.1A11. Types of periscopes. Periscopes under Bureau of Ships Specifications R20 P5 of 15 June 1940, are of the following types: 1. Type I. Outer diameter of taper section, 1.414 inches. The line of sight can be moved through all angles between 10 degrees depression and 45 degrees elevation. 2. Type II. Outer diameter of taper section, 1.414 inches. The line of sight can be moved through all angles between 10 degrees depression and 74 degrees elevation. 3. Type III. Outer diameter of taper section, 1.99 inches. The line of sight can be moved through all angles between 10 degrees depression and 45 degrees elevation. 4. Type IV. Outer diameter of taper section, 3.750 inches. The line of sight can be moved through all angles between 10 degrees depression and 45 degrees elevation. The periscope is designed for night use with an installed antenna array and waveguide for the attachment of an electronic range device.",
null,
""
] | [
null,
"https://i1.wp.com/www.maritime.org/fleetsub/pscope/img/fig1-01.jpg",
null,
"https://i2.wp.com/www.maritime.org/fleetsub/pscope/img/fig1-02.jpg",
null,
"https://i2.wp.com/www.maritime.org/fleetsub/pscope/img/fig1-03.jpg",
null,
"https://i1.wp.com/www.maritime.org/fleetsub/pscope/img/fig1-04.jpg",
null,
"https://i0.wp.com/www.maritime.org/fleetsub/pscope/img/fig1-05.jpg",
null,
"https://1.gravatar.com/avatar/d692216fbe77315e2e3ab6a0da35fa77",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9046357,"math_prob":0.9644721,"size":7345,"snap":"2021-43-2021-49","text_gpt3_token_len":1864,"char_repetition_ratio":0.15038823,"word_repetition_ratio":0.07456829,"special_character_ratio":0.2511913,"punctuation_ratio":0.13495721,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97089857,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-28T10:27:33Z\",\"WARC-Record-ID\":\"<urn:uuid:8d58e5c4-8abb-4588-aa87-925d7a86a17b>\",\"Content-Length\":\"104895\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:75623f74-1e36-4c83-8861-d3d4cf067448>\",\"WARC-Concurrent-To\":\"<urn:uuid:a6972cd4-653e-4b44-86a2-6c4c06e028c6>\",\"WARC-IP-Address\":\"192.0.78.12\",\"WARC-Target-URI\":\"https://butterflyofdream.wordpress.com/2012/06/09/basic-design-of-submarine-periscope/\",\"WARC-Payload-Digest\":\"sha1:RI565X4POEGKQ4GOHBLPEUQO4DBQ7SOM\",\"WARC-Block-Digest\":\"sha1:YDJVVNADEUZ22RDNLL5DPD72TLHFXYCI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323588284.71_warc_CC-MAIN-20211028100619-20211028130619-00429.warc.gz\"}"} |
https://www.powersystemsdesign.com/articles/using-lord-kelvins-sensing-method/29/8590 | [
"# Using Lord Kelvin’s sensing method\n\nAuthor:\nSrudeep Patil, Maxim Integrated\n\nDate\n02/14/2015",
null,
"PDF\n##### The Kelvin Method lives on in the in the latest ultra-precise current-shunt monitors & current-sense amplifiers\n\nUltra-precision, high-side current sensing is crucial in applications where one must measure the current entering or leaving a battery. Today many digital multimeters feature four-lead Kelvin sensing to eliminate the series resistance of the multimeter leads and give an accurate voltage drop across a given resistor.\n\nSimilarly, a current-shunt monitor (CSM) or current-sense amplifier (CSA) measures voltage drop across a shunt resistor based on the current flown into or out of the battery. This is how you determine the amount of current drawn by the load from a battery in real-world applications. Systems today use low power and require a very accurate measure of charge left in the battery. To quantify remaining charge, every µA drawn from the battery by the load or pumped into the battery by a charger needs to be accounted for. Thus, ultra-precise sensing of voltage drop across the shunt is critical.\n\nLet’s look at measuring voltage drop across a shunt resistor with very high precision. An ultra-high-precision CSM measures the voltage drop across the shunt resistor with typical connections, and then compares this value with the CSM accuracy specification in its datasheet. There are ways to improve the measurement accuracy using that same CSM.\n\nThese measurements are enhanced utilizing the proven Kelvin sensing methods with a four-terminal sense resistor. Test results also show that one should be careful with the board layout. Once the layout practices listed in this article are followed, we can capitalize on Kelvin sensing and sense the microvolt level drop across the sense resistor with ultra-high precision.\n\nThe Kelvin Bridge\n\nBefore we talk about ultra-precision CSMs/CSAs, let’s start with a look back in time to an impressive scientist and Avant-garde engineer, Lord Kelvin (see Figure 1). Lord Kelvin’s pioneering effort is the basis of many electronic principles that we take for granted in our daily life, such as knowing when our cell phone needs charging. Kelvin’s work in measuring very low resistances is still used in modern integrated circuits (ICs). In fact, when you accurately measure battery capacity by applying early Kelvin principles and additional math, preventing overcharging or discharging extends battery life.\n\nClcik image to enlarge\n\nFigure 1. A portrait of Lord Kelvin (1824-1907) by Sir Hubert von Herkomer (1849-1914).\n\nEarly instruments such as the Kelvin bridge (see Figure 2) are amazingly accurate by today’s standards. Note the block diagram in the center of Figure 2. On the left is a battery and below are four leads. The outer leads supply current through resistor X, while the inner leads isolate the measuring circuit. It is easier to see the Kelvin sensing principle in Figure 3.\n\nClcik image to enlarge\n\nFigure 2. An early Kelvin bridge for making accurate resistance measurements of very low-ohm resistors.\n\nClick image to enlarge\n\nFigure 3. A block diagram showing the Kelvin sensing method.\n\nBy separating the main current path from the measurement path, Kelvin improves measurement accuracy. In Figure 3, the main current to be measured flows from the battery on the top left through the ammeter (A), and the voltage drops across resistor “X” (the gray bar at the bottom) between leads 2 and 3. Virtually no current flows through the voltmeter circuit (V and leads 2 and 3) due to very high-input impedance and, hence, the voltmeter makes a highly accurate measurement. The current is the same at all parts of the main circuit comprised of the ammeter, battery resistor, and leads 1 through 4. However, the leads 1 and 4 contribute series resistance that, in turn, contributes to a finite amount of voltage drop along the leads. Although very small voltage drops, nonetheless, they reduce accuracy.\n\nBy separating the main current path from the measurement path, Kelvin’s sensing improves the accuracy of measurements. Of course, knowing any two of the three parameters—voltage, current, and resistance—we can calculate the third parameter.\n\nTypical connections on a current-shunt monitor\n\nFigure 4 shows connections around a CSM used for monitoring current from the battery into the load. We might think at the outset that there is nothing wrong with Figure 4. However, this design will not yield the ±0.23% gain error specified for this CSA. The design problems actually result from shortcomings in the board layout and poor schematic placement.\n\nClick image to enlarge\n\nFigure 4. Typical connections to measure drop across a sense resistor. The example device serving as the shunt monitor is the MAX44286 CSA.\n\nWhen we examine the schematic placement in Figure 4 and make some adjustments, we can preserve the shunt monitor’s DC accuracy parameters like gain accuracy and input-offset voltage. The example shunt monitor shown here is the MAX44286 available in a 4-bump wafer-level package (WLP) with 0.78mm x 0.78mm x 0.35mm dimensions. These findings and recommendations will apply similarly to any precision CSA. Although our analysis here is done with the MAX44286, the results are true and should hold good for any high-precision CSMs.\n\nWe begin the analysis of Figure 4 with a well-known axiom:\n\nVOUT = Gain × VDIFF\n\nWhere:\n\n•VOUT is the amplifier’s output on bump B2 in volts.\n\n•VDIFF is input differential sense voltage in millivolts due to the current flow through shunt resistor RSENSE placed across the inputs.\n\n•Gain is inherent to the amplifier based on the gain option chosen (for example, 25V/V, 50V/V, 100V/V, 200V/V).\n\nGain accuracy or gain error is a critical parameter in precision applications where highly accurate sensing is needed on µV-to-mV level drops across a sense resistor.\n\nTherefore:\n\nGain Error (GE) = [(GainMEAS – Gain IDEAL) × 100]/GainIDEAL\n\nWhere:\n\n• Gain error is the percentage deviation between the observed differential gain and the ideal differential gain expected of the CSM.\n\n• GainMEAS is the gain achieved in V/V.\n\n• GainIDEAL is the gain that the device is rated to provide in V/V.\n\nBelow are the results for the MAX44286 on bench tests for the setup in Figure 4. To read the most accurate measurement of voltage drop, we calculate gain error by a two-point differential voltage covering both extremes of the full-scale differential sense range. Our test conditions were VBAT =5.5V with GIDEAL = 50V/V version at room temperature.\n\nSpecifically:\n\n• VDIFF = 60mV, 4mV as two points\n\n• VOUT with respect to GND = 2.99264V, 0.1992298V, respectively\n\n• GMEAS = VOUT/VDIFF\n\nSo, calculating gain error per Equation 2 yields:\n\nGain Error (GE) = -0.23713148%\n\nNow this result is not what we expect from this CSM, as its maximum gain error spec is ±0.23%.\n\nAnother important specification in these ultra-precision sense amplifiers is input offset voltage, given by:\n\nVOS = (VOUT - VDIFF × GMEAS)/GMEAS\n\nWhere:\n\nVOS is the CSM’s input-offset voltage specified in microvolts due to mismatch in the input pair. From Equation 3 and our test results, we achieve:\n\nVOS = -5.93281µV\n\nGain Accuracy and input VOS of CSA improve with a Kelvin sensing layout\n\nThere is a way to achieve gain error that is always less than ±0.2%, and better input-offset voltage. Examine Figure 5 and notice that there are a few more traces than in Figure 4.\n\nClick image to enlarge\n\nFigure 5. Circuit shows Kelvin connections on both inputs, output, and ground bump. Once again the MAX44286 is the example CSA acting as the shunt monitor.\n\nTraces from the sense-resistor terminals to the amplifier inputs carry input bias current. Supply current to the amplifier is part of the input bias current drawn through the RS+ pin because there is no dedicated supply voltage pin on the MAX44286. Otherwise, the input bias current flows through the RS+ and RS- pins and the supply current flows through the VCC pin, if there is a dedicated supply pin. Also, this current through the RS+ bump increases as the input differential voltage increases.\n\nTrace impedance will create a drop due to this current flow through the trace. The result will be extra gain error if the input sense voltage is calculated across the sense resistor, since we did not account for loss along the trace. These extra traces at the input bumps, RS+ MEASURE and RS- MEASURE, will have no effect on the input sense voltage when it is measured across them.\n\nNote also that the extra GND MEASURE trace is isolated from the currents flowing to the board’s ground and is solely used as a ground reference for accurate output voltage measurement. Another trace coming from the OUT bump, VOUT,MEASURE, is isolated from the actual output trace carrying the load current when the load resistor sources or sinks current out of the amplifier. This isolation lets us accurately measure the output voltage at the OUT bump with respect to the GND MEASURE trace. From all this we can calculate the gain error and input VOS of the CSA very precisely.\n\nIf you notice, there is a four-terminal resistor used in Figure 5. The 4-lead Kelvin configuration enables current to be applied through two opposite terminals; a sensing voltage is measured across the other two terminals. This design eliminates the resistance and temperature coefficient of the terminals for a more accurate current measurement. Also, traces from the sense-resistor terminals are taken directly underneath the pads of the resistor, thus preventing any additional trace impedance on the sense resistor.\n\nThe results below were achieved on the bench with the setup shown on Figure 5.Gain error is calculated similarly where a two-point differential voltage covering both extremes is applied to the shunt monitor and the output voltages recorded. Our test conditions were the same as earlier, VBAT =5.5V with GIDEAL = 50V/V for the CSA at room temperature. Therefore, VDIFF = 60mV, 4mV as two extremes.\n\nNow VDIFF is the input differential voltage measured between RS+ MEASURE and RS- MEASURE. Also the VOUT,MEASURE values, with respect to the GND MEASURE for 60mV and 4mV input sense voltages applied, are 3.013034V and 0.2141941V respectively.\n\nThus:\n\nGMEAS = VOUT/VDIFF\n\nSo, calculating gain error from Equation 2 yields:\n\nGain error = -0.08518056%\n\nSubstituting VOUT,MEASURE calculated with respect to GND MEASURE and substituting yields:\n\nVOS = 3.54415µV\n\nWe can clearly see that there is an appreciable change in the gain error and input VOS. Thus, preserving the ultra-precise measurements of a CSA depends on the layout and component placement on the test fixture. If we use the sensing traces to measure as shown in Figure 5, measurements are very accurate. In ultra-precision applications, sense voltages on the order of microvolt are very important for sensing current on the order of microamps. Clearly, each trace must be laid out with great care.\n\nTraces from each sense-resistor terminal to the respective input bumps need to be symmetrical in shape and length. Having a 2-terminal sense resistor will also provide good gain accuracy readings within a maximum of ±0.23% over temperature. For more accurate results over temperature, use 4-terminal sense resistor.\n\nThus, we complement Lord Kelvin’s sensing principles by preserving the DC accuracy of an ultra-precision CSA. Precision measurements not only depend on the good design and layout of the CSA itself, but on the board layout as well.\n\n### RELATED",
null,
"#### The Dawn of a New Era with High-Power Wireless Charging\n\nJul 1,2022",
null,
"#### Mobile Telephone Mast Goes Off-Grid\n\nJul 1,2022",
null,
"#### Navitas Powers Xiaomi's First In-Box GaN 100 W Laptop Fast Charger\n\nJun 30,2022",
null,
"Jun 29,2022"
] | [
null,
"https://www.powersystemsdesign.com/images/pdficon.png",
null,
"https://www.powersystemsdesign.com//images/articles/1656702910-Figure 1 - Wireless power transmitter WLC1115.png",
null,
"https://www.powersystemsdesign.com//images/articles/1656626637-Ally Head Shot_bw-400.jpg",
null,
"https://www.powersystemsdesign.com//images/articles/1656620631-Navitas.jpeg",
null,
"https://www.powersystemsdesign.com//images/articles/1656508834-New-FingerTip-touchscreen-controller-N4465D-big.jpeg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9089157,"math_prob":0.9388673,"size":11305,"snap":"2022-27-2022-33","text_gpt3_token_len":2493,"char_repetition_ratio":0.14122644,"word_repetition_ratio":0.026732134,"special_character_ratio":0.21149933,"punctuation_ratio":0.095147476,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9746457,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,5,null,3,null,2,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-02T18:09:38Z\",\"WARC-Record-ID\":\"<urn:uuid:f831db08-3ce0-4a61-bf0f-484743ccea86>\",\"Content-Length\":\"71670\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:43a9e966-b786-49cc-8b33-aab892ad04ae>\",\"WARC-Concurrent-To\":\"<urn:uuid:69412988-37a2-43e0-8f78-bdc996f86cfd>\",\"WARC-IP-Address\":\"34.206.203.101\",\"WARC-Target-URI\":\"https://www.powersystemsdesign.com/articles/using-lord-kelvins-sensing-method/29/8590\",\"WARC-Payload-Digest\":\"sha1:76V7WAHNQDZKNVOIHVEXIPXIKD75OSML\",\"WARC-Block-Digest\":\"sha1:X4WU7POFWRNFHCPCBOAJNV2U3CEOQC7Y\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104189587.61_warc_CC-MAIN-20220702162147-20220702192147-00040.warc.gz\"}"} |
https://lemon.cs.elte.hu/trac/lemon/changeset/434/lemon/doc | [
"# Changeset 434:ad483acf1654 in lemon for doc\n\nIgnore:\nTimestamp:\n12/02/08 16:33:22 (13 years ago)\nBranch:\ndefault\nChildren:\n435:9afe81e4c543, 437:6a2a33ad261b, 451:09e416d35896, 469:d369e885d196, 522:7f8560cb9d65\nParents:\n429:d8b87e9b90c3 (diff), 433:6ff53afe98b5 (diff)\nNote: this is a merge changeset, the changes displayed below correspond to the merge itself.\nUse the (diff) links above to see all the changes relative to each parent.\nPhase:\npublic\nMessage:\n\nMerge\n\nFiles:\n2 edited\n\nUnmodified\nAdded\nRemoved\n• ## doc/groups.dox\n\n r422 See also: \\ref graph_concepts \"Graph Structure Concepts\". */ /** @defgroup graph_adaptors Adaptor Classes for graphs @ingroup graphs \\brief This group contains several adaptor classes for digraphs and graphs The main parts of LEMON are the different graph structures, generic graph algorithms, graph concepts which couple these, and graph adaptors. While the previous notions are more or less clear, the latter one needs further explanation. Graph adaptors are graph classes which serve for considering graph structures in different ways. A short example makes this much clearer. Suppose that we have an instance \\c g of a directed graph type say ListDigraph and an algorithm \\code template int algorithm(const Digraph&); \\endcode is needed to run on the reverse oriented graph. It may be expensive (in time or in memory usage) to copy \\c g with the reversed arcs. In this case, an adaptor class is used, which (according to LEMON digraph concepts) works as a digraph. The adaptor uses the original digraph structure and digraph operations when methods of the reversed oriented graph are called. This means that the adaptor have minor memory usage, and do not perform sophisticated algorithmic actions. The purpose of it is to give a tool for the cases when a graph have to be used in a specific alteration. If this alteration is obtained by a usual construction like filtering the arc-set or considering a new orientation, then an adaptor is worthwhile to use. To come back to the reverse oriented graph, in this situation \\code template class ReverseDigraph; \\endcode template class can be used. The code looks as follows \\code ListDigraph g; ReverseDigraph rg(g); int result = algorithm(rg); \\endcode After running the algorithm, the original graph \\c g is untouched. This techniques gives rise to an elegant code, and based on stable graph adaptors, complex algorithms can be implemented easily. In flow, circulation and bipartite matching problems, the residual graph is of particular importance. Combining an adaptor implementing this, shortest path algorithms and minimum mean cycle algorithms, a range of weighted and cardinality optimization algorithms can be obtained. For other examples, the interested user is referred to the detailed documentation of particular adaptors. The behavior of graph adaptors can be very different. Some of them keep capabilities of the original graph while in other cases this would be meaningless. This means that the concepts that they are models of depend on the graph adaptor, and the wrapped graph(s). If an arc of \\c rg is deleted, this is carried out by deleting the corresponding arc of \\c g, thus the adaptor modifies the original graph. But for a residual graph, this operation has no sense. Let us stand one more example here to simplify your work. RevGraphAdaptor has constructor \\code ReverseDigraph(Digraph& digraph); \\endcode This means that in a situation, when a const ListDigraph& reference to a graph is given, then it have to be instantiated with Digraph=const ListDigraph. \\code int algorithm1(const ListDigraph& g) { RevGraphAdaptor rg(g); return algorithm2(rg); } \\endcode */\n• ## doc/groups.dox\n\n r432 * */ namespace lemon { /** This group describes maps that are specifically designed to assign values to the nodes and arcs of graphs. values to the nodes and arcs/edges of graphs. If you are looking for the standard graph maps (\\c NodeMap, \\c ArcMap, \\c EdgeMap), see the \\ref graph_concepts \"Graph Structure Concepts\". */ maps from other maps. Most of them are \\ref lemon::concepts::ReadMap \"read-only maps\". Most of them are \\ref concepts::ReadMap \"read-only maps\". They can make arithmetic and logical operations between one or two maps (negation, shifting, addition, multiplication, logical 'and', 'or', \\brief Common graph search algorithms. This group describes the common graph search algorithms like Breadth-First Search (BFS) and Depth-First Search (DFS). This group describes the common graph search algorithms, namely \\e breadth-first \\e search (BFS) and \\e depth-first \\e search (DFS). */ \\brief Algorithms for finding shortest paths. This group describes the algorithms for finding shortest paths in graphs. This group describes the algorithms for finding shortest paths in digraphs. - \\ref Dijkstra algorithm for finding shortest paths from a source node when all arc lengths are non-negative. - \\ref BellmanFord \"Bellman-Ford\" algorithm for finding shortest paths from a source node when arc lenghts can be either positive or negative, but the digraph should not contain directed cycles with negative total length. - \\ref FloydWarshall \"Floyd-Warshall\" and \\ref Johnson \"Johnson\" algorithms for solving the \\e all-pairs \\e shortest \\e paths \\e problem when arc lenghts can be either positive or negative, but the digraph should not contain directed cycles with negative total length. - \\ref Suurballe A successive shortest path algorithm for finding arc-disjoint paths between two nodes having minimum total length. */ feasible circulations. The maximum flow problem is to find a flow between a single source and a single target that is maximum. Formally, there is a \\f$G=(V,A)\\f$ directed graph, an \\f$c_a:A\\rightarrow\\mathbf{R}^+_0\\f$ capacity function and given \\f$s, t \\in V\\f$ source and target node. The maximum flow is the \\f$f_a\\f$ solution of the next optimization problem: \\f[ 0 \\le f_a \\le c_a \\f] \\f[ \\sum_{v\\in\\delta^{-}(u)}f_{vu}=\\sum_{v\\in\\delta^{+}(u)}f_{uv} \\qquad \\forall u \\in V \\setminus \\{s,t\\}\\f] \\f[ \\max \\sum_{v\\in\\delta^{+}(s)}f_{uv} - \\sum_{v\\in\\delta^{-}(s)}f_{vu}\\f] The \\e maximum \\e flow \\e problem is to find a flow of maximum value between a single source and a single target. Formally, there is a \\f$G=(V,A)\\f$ digraph, a \\f$cap:A\\rightarrow\\mathbf{R}^+_0\\f$ capacity function and \\f$s, t \\in V\\f$ source and target nodes. A maximum flow is an \\f$f:A\\rightarrow\\mathbf{R}^+_0\\f$ solution of the following optimization problem. \\f[ \\max\\sum_{a\\in\\delta_{out}(s)}f(a) - \\sum_{a\\in\\delta_{in}(s)}f(a) \\f] \\f[ \\sum_{a\\in\\delta_{out}(v)} f(a) = \\sum_{a\\in\\delta_{in}(v)} f(a) \\qquad \\forall v\\in V\\setminus\\{s,t\\} \\f] \\f[ 0 \\leq f(a) \\leq cap(a) \\qquad \\forall a\\in A \\f] LEMON contains several algorithms for solving maximum flow problems: - \\ref lemon::EdmondsKarp \"Edmonds-Karp\" - \\ref lemon::Preflow \"Goldberg's Preflow algorithm\" - \\ref lemon::DinitzSleatorTarjan \"Dinitz's blocking flow algorithm with dynamic trees\" - \\ref lemon::GoldbergTarjan \"Preflow algorithm with dynamic trees\" In most cases the \\ref lemon::Preflow \"Preflow\" algorithm provides the fastest method to compute the maximum flow. All impelementations provides functions to query the minimum cut, which is the dual linear programming problem of the maximum flow. - \\ref EdmondsKarp Edmonds-Karp algorithm. - \\ref Preflow Goldberg-Tarjan's preflow push-relabel algorithm. - \\ref DinitzSleatorTarjan Dinitz's blocking flow algorithm with dynamic trees. - \\ref GoldbergTarjan Preflow push-relabel algorithm with dynamic trees. In most cases the \\ref Preflow \"Preflow\" algorithm provides the fastest method for computing a maximum flow. All implementations provides functions to also query the minimum cut, which is the dual problem of the maximum flow. */ This group describes the algorithms for finding minimum cost flows and circulations. The \\e minimum \\e cost \\e flow \\e problem is to find a feasible flow of minimum total cost from a set of supply nodes to a set of demand nodes in a network with capacity constraints and arc costs. Formally, let \\f$G=(V,A)\\f$ be a digraph, \\f$lower, upper: A\\rightarrow\\mathbf{Z}^+_0\\f$ denote the lower and upper bounds for the flow values on the arcs, \\f$cost: A\\rightarrow\\mathbf{Z}^+_0\\f$ denotes the cost per unit flow on the arcs, and \\f$supply: V\\rightarrow\\mathbf{Z}\\f$ denotes the supply/demand values of the nodes. A minimum cost flow is an \\f$f:A\\rightarrow\\mathbf{R}^+_0\\f$ solution of the following optimization problem. \\f[ \\min\\sum_{a\\in A} f(a) cost(a) \\f] \\f[ \\sum_{a\\in\\delta_{out}(v)} f(a) - \\sum_{a\\in\\delta_{in}(v)} f(a) = supply(v) \\qquad \\forall v\\in V \\f] \\f[ lower(a) \\leq f(a) \\leq upper(a) \\qquad \\forall a\\in A \\f] LEMON contains several algorithms for solving minimum cost flow problems: - \\ref CycleCanceling Cycle-canceling algorithms. - \\ref CapacityScaling Successive shortest path algorithm with optional capacity scaling. - \\ref CostScaling Push-relabel and augment-relabel algorithms based on cost scaling. - \\ref NetworkSimplex Primal network simplex algorithm with various pivot strategies. */ This group describes the algorithms for finding minimum cut in graphs. The minimum cut problem is to find a non-empty and non-complete \\f$X\\f$ subset of the vertices with minimum overall capacity on outgoing arcs. Formally, there is \\f$G=(V,A)\\f$ directed graph, an \\f$c_a:A\\rightarrow\\mathbf{R}^+_0\\f$ capacity function. The minimum The \\e minimum \\e cut \\e problem is to find a non-empty and non-complete \\f$X\\f$ subset of the nodes with minimum overall capacity on outgoing arcs. Formally, there is a \\f$G=(V,A)\\f$ digraph, a \\f$cap: A\\rightarrow\\mathbf{R}^+_0\\f$ capacity function. The minimum cut is the \\f$X\\f$ solution of the next optimization problem: \\f[ \\min_{X \\subset V, X\\not\\in \\{\\emptyset, V\\}} \\sum_{uv\\in A, u\\in X, v\\not\\in X}c_{uv}\\f] \\sum_{uv\\in A, u\\in X, v\\not\\in X}cap(uv) \\f] LEMON contains several algorithms related to minimum cut problems: - \\ref lemon::HaoOrlin \"Hao-Orlin algorithm\" to calculate minimum cut in directed graphs - \\ref lemon::NagamochiIbaraki \"Nagamochi-Ibaraki algorithm\" to calculate minimum cut in undirected graphs - \\ref lemon::GomoryHuTree \"Gomory-Hu tree computation\" to calculate all pairs minimum cut in undirected graphs - \\ref HaoOrlin \"Hao-Orlin algorithm\" for calculating minimum cut in directed graphs. - \\ref NagamochiIbaraki \"Nagamochi-Ibaraki algorithm\" for calculating minimum cut in undirected graphs. - \\ref GomoryHuTree \"Gomory-Hu tree computation\" for calculating all-pairs minimum cut in undirected graphs. If you want to find minimum cut just between two distinict nodes, please see the \\ref max_flow \"Maximum Flow page\". see the \\ref max_flow \"maximum flow problem\". */ graphs. The matching problems in bipartite graphs are generally easier than in general graphs. The goal of the matching optimization can be the finding maximum cardinality, maximum weight or minimum cost can be finding maximum cardinality, maximum weight or minimum cost matching. The search can be constrained to find perfect or maximum cardinality matching. LEMON contains the next algorithms: - \\ref lemon::MaxBipartiteMatching \"MaxBipartiteMatching\" Hopcroft-Karp augmenting path algorithm for calculate maximum cardinality matching in bipartite graphs - \\ref lemon::PrBipartiteMatching \"PrBipartiteMatching\" Push-Relabel algorithm for calculate maximum cardinality matching in bipartite graphs - \\ref lemon::MaxWeightedBipartiteMatching \"MaxWeightedBipartiteMatching\" Successive shortest path algorithm for calculate maximum weighted matching and maximum weighted bipartite matching in bipartite graph - \\ref lemon::MinCostMaxBipartiteMatching \"MinCostMaxBipartiteMatching\" Successive shortest path algorithm for calculate minimum cost maximum matching in bipartite graph - \\ref lemon::MaxMatching \"MaxMatching\" Edmond's blossom shrinking algorithm for calculate maximum cardinality matching in general graph - \\ref lemon::MaxWeightedMatching \"MaxWeightedMatching\" Edmond's blossom shrinking algorithm for calculate maximum weighted matching in general graph - \\ref lemon::MaxWeightedPerfectMatching \"MaxWeightedPerfectMatching\" Edmond's blossom shrinking algorithm for calculate maximum weighted perfect matching in general graph The matching algorithms implemented in LEMON: - \\ref MaxBipartiteMatching Hopcroft-Karp augmenting path algorithm for calculating maximum cardinality matching in bipartite graphs. - \\ref PrBipartiteMatching Push-relabel algorithm for calculating maximum cardinality matching in bipartite graphs. - \\ref MaxWeightedBipartiteMatching Successive shortest path algorithm for calculating maximum weighted matching and maximum weighted bipartite matching in bipartite graphs. - \\ref MinCostMaxBipartiteMatching Successive shortest path algorithm for calculating minimum cost maximum matching in bipartite graphs. - \\ref MaxMatching Edmond's blossom shrinking algorithm for calculating maximum cardinality matching in general graphs. - \\ref MaxWeightedMatching Edmond's blossom shrinking algorithm for calculating maximum weighted matching in general graphs. - \\ref MaxWeightedPerfectMatching Edmond's blossom shrinking algorithm for calculating maximum weighted perfect matching in general graphs. \\image html bipartite_matching.png This group describes the algorithms for finding a minimum cost spanning tree in a graph tree in a graph. */ \\anchor demoprograms @defgroup demos Demo programs @defgroup demos Demo Programs Some demo programs are listed here. Their full source codes can be found in /** @defgroup tools Standalone utility applications @defgroup tools Standalone Utility Applications Some utility applications are listed here. */ }\nNote: See TracChangeset for help on using the changeset viewer."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6918613,"math_prob":0.9815462,"size":15332,"snap":"2021-21-2021-25","text_gpt3_token_len":4191,"char_repetition_ratio":0.15631524,"word_repetition_ratio":0.07090359,"special_character_ratio":0.29846072,"punctuation_ratio":0.08972031,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99581486,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-17T16:46:17Z\",\"WARC-Record-ID\":\"<urn:uuid:b8a43b02-ab79-44c5-bb47-15beb2efe043>\",\"Content-Length\":\"73690\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4c65334f-1ca7-42c7-a6fe-7ee35883a4bb>\",\"WARC-Concurrent-To\":\"<urn:uuid:9ef82629-5a66-4975-91c2-289f6f00b2e5>\",\"WARC-IP-Address\":\"157.181.227.195\",\"WARC-Target-URI\":\"https://lemon.cs.elte.hu/trac/lemon/changeset/434/lemon/doc\",\"WARC-Payload-Digest\":\"sha1:POETUOP7FKF4XJ64S5IIEODUVTQQ54MP\",\"WARC-Block-Digest\":\"sha1:N24HRKUYX3IRNH7U4N5FC6VH4YVVNBQA\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487630518.38_warc_CC-MAIN-20210617162149-20210617192149-00025.warc.gz\"}"} |
https://rd.springer.com/article/10.1007%2FBF02988324 | [
"Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates\n\n# Odd factors of a graph\n\n• 68 Accesses\n\n• 12 Citations\n\n## Abstract\n\nLetG be a graph and letf be a function defined on V(G) such that f(x) is a positive odd integer for everyx ɛ V(G). A spanning subgraphF ofG is called a [l,f]-odd factor of G if dF(x) ɛ {1,3,2026, f(x)} for every x ɛV(G), whered F (x) denotes the degree of x inF. We discuss several conditions for a graphG to have a [1,f]-odd factor.\n\nThis is a preview of subscription content, log in to check access.\n\n## References\n\n1. 1.\n\nAkiyama, J., Kano, M.: Factors and factorizations of graphs — a survey. J. Graph Theory9, 1–42 (1985)\n\n2. 2.\n\nAmahashi, A.: On factors with all degrees odd. Graphs Comb.1, 111–114 (1985)\n\n3. 3.\n\nBeineke, L.W., Plummer, M.D.: On the 1-factors of a nonseparable graph. J. Comb. Theory2, 285–289 (1967)\n\n4. 4.\n\nChartrand, G., Polimeni, A.D., Stewart, M.J.: The existence of 1-factors in line graphs, squares, and total graphs. Indag. Math.35, 228–232 (1973)\n\n5. 5.\n\nChungphaisan, V.: Factors of graphs and degree sequences. Nanta Math.9, 41–49 (1976)\n\n6. 6.\n\nClarke, F.H.: A graph polynomial and its applications. Discrete Math.3, 305–313 (1972)\n\n7. 7.\n\nJackson, B., Whitty, R.W.: A note concerning graphs with unique f-factors. J. Graph Theory13, 577–580 (1989)\n\n8. 8.\n\nKotzig, A.: On the theory of finite graphs with a linear factor I, II, III. Mat. Fyz. Cas.9, 73–91 (1959)\n\n9. 9.\n\nLas Vergnas, M.: A note on matchings in graphs. Cahiers Centre Études Rech. Opér.17, 257–260 (1975)\n\n10. 10.\n\nSumner, D.P.: Graphs with 1-factors. Proc. Amer. Math. Soc.42, 8–17 (1974)\n\n11. 11.\n\nSumner, D.P.: 1-factors and antifactor sets. J. London Math. Soc.13, 351–359 (1976)\n\n12. 12.\n\nTutte, W.T.: The factorizations of linear graphs. J. London Math. Soc.22, 107–111 (1947)\n\n13. 13.\n\nTutte, W.T.: Graph factors. Combinatorica1, 79–97 (1981)\n\n14. 14.\n\nYuting, C., Kano, M.: Some results on odd factors of graphs. J. Graph Theory12, 327–333 (1988)\n\n## Author information\n\nCorrespondence to Jerzy Topp or Preben D. Vestergaard.\n\n## Rights and permissions\n\nReprints and Permissions\n\nTopp, J., Vestergaard, P.D. Odd factors of a graph. Graphs and Combinatorics 9, 371–381 (1993). https://doi.org/10.1007/BF02988324"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7094059,"math_prob":0.8391542,"size":2109,"snap":"2020-10-2020-16","text_gpt3_token_len":731,"char_repetition_ratio":0.1263658,"word_repetition_ratio":0.0,"special_character_ratio":0.38169748,"punctuation_ratio":0.29982045,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9658545,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-19T18:25:02Z\",\"WARC-Record-ID\":\"<urn:uuid:0ff2d45a-b7bb-4666-b6f0-3a6ffccebbd3>\",\"Content-Length\":\"81985\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1eba833b-419f-4971-9549-c3a97ac9f3ed>\",\"WARC-Concurrent-To\":\"<urn:uuid:13f21e35-83ef-46bf-8e86-7012915ba56e>\",\"WARC-IP-Address\":\"151.101.248.95\",\"WARC-Target-URI\":\"https://rd.springer.com/article/10.1007%2FBF02988324\",\"WARC-Payload-Digest\":\"sha1:6PTVTIWR7ZEVOQEA65U4MCRJQOSPXTP5\",\"WARC-Block-Digest\":\"sha1:UPDP3GJLDXIMNBWWAXIWEP477KRMZKP6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875144165.4_warc_CC-MAIN-20200219153707-20200219183707-00293.warc.gz\"}"} |
https://softmath.com/math-book-answers/perfect-square-trinomial/midpoint-formula-for-fractions.html | [
"English | Español\n\n# Try our Free Online Math Solver!",
null,
"Online Math Solver\n\n Depdendent Variable\n\n Number of equations to solve: 23456789\n Equ. #1:\n Equ. #2:\n\n Equ. #3:\n\n Equ. #4:\n\n Equ. #5:\n\n Equ. #6:\n\n Equ. #7:\n\n Equ. #8:\n\n Equ. #9:\n\n Solve for:\n\n Dependent Variable\n\n Number of inequalities to solve: 23456789\n Ineq. #1:\n Ineq. #2:\n\n Ineq. #3:\n\n Ineq. #4:\n\n Ineq. #5:\n\n Ineq. #6:\n\n Ineq. #7:\n\n Ineq. #8:\n\n Ineq. #9:\n\n Solve for:\n\n Please use this form if you would like to have this math solver on your website, free of charge. Name: Email: Your Website: Msg:\n\nWhat our customers say...\n\nThousands of users are using our software to conquer their algebra homework. Here are some of their experiences:\n\nThe Algebrator was very helpful, it helped me get back on track and bring back my skills for my next school season. The program shows step by step solutions which made learning easier. I think this would be very helpful to anyone just starting to learn algebra, or even if they already know it, it would sharpen their skills.\nCandida Barny, MT\n\nI am very much relieved to see my son doing well in Algebra. He was always making mistakes, as his concepts of arithmetic were not at all clear. Then I decided to buy Algebrator. I was amazed to see the change in him. Now he enjoys his mathematics and the mistakes are considerably reduced.\nLinda Howard, GA\n\nI appreciate that it is basicIt has helped me tremendously\nSarah Johnston, WA\n\nWe bought it for our daughter and it seems to be helping her a whole bunch. It was a life saver.\nLaura Jackson, NC\n\nSearch phrases used on 2014-09-14:\n\nStudents struggling with all kinds of algebra problems find out that our software is a life-saver. Here are the search phrases that today's searchers used to find our site. Can you find yours among them?\n\n• how to teach myself math\n• +gedpractise.com\n• cubic equations for dummies\n• prentice hall biology understanding concepts answers\n• scale factors for dummies\n• square root converter\n• method of images laplace ellispe geometry\n• simplify polynomials with exponents\n• algebra solver\n• intergersmath\n• what is an aptitude battery test for ligic, reasoning that includes flow charts, diagramming and algebra\n• in decimals what is least and greatest\n• wronskian and linear independence\n• integration substitution calculator\n• free algebra help with steps\n• free subtracting rational expressions online\n• pre algebra with pizzazz book AA 18 answer key\n• tables turning into polynomial functions using Newton's method\n• implicit differentiation for dummies\n• simplifying integer\n• factoring w/ ti84\n• free trinomial help\n• McDougal Littell Geometry all answers 2004\n• common factors in third grade math\n• homework help for pre algebra for pi\n• algebra cheat sheet for Alice Kaseberg Introductory Algebra\n• algebrator integral\n• cheat sheet factoring formulas\n• Algebra with Pizzazz Worksheet use discriminant\n• need help answering problem 3v-16=-v\n• boolean algebra simplifier\n• Ordered Pairs That Make Pictures\n• java program perfect square algorithm with addition\n• algebra 2 math problem solver\n• year 6 sats 2001\n• how to solve polynomials sample\n• find the discriminant calculator\n• laplace transform calculator\n• sample of a Nonlinear Equation\n• how to solve double integral with ti89\n• What is the nth term in each of the numerical patterns?\n• logarithmic calculator online\n• pre algebra with pizzazz\n• 0.89IN FRACTION\n• simplifying rational expressions solver\n• middle school math with pizzazz book d : what is the title of this picture\n• Write as a radical expression u^3/5\n• lesson plan on preparatory( math)\n• Solution set algebra calculator\n• lcd calculator\n• EVERYDAY SCIENCE MCQS SOLVED\n• concepts for everyday life for algebra\n• glencoe pre-algebra 13-3 answer key\n• algebranaitor\n• free pre algebra lessons\n• middle school math with pizzazz book d\n• simultaneous linear inequalities\n• How Do You Solve Radical Equations with Variables on Both Sides?\n• +DQUAD on TI 84 plus\n• math structures worksheets\n• worksheets on rational numbers and equations\n• algrebrator mac\n• how to find the sixth root\n• exponential key ti-89\n• maths exercises for 6th std matriculation english\n• graphing calculator with tables\n• PRE Algebra Calculator\n• college algebra software tutor\n• slope of line equation\n• ind the midpoint of the line segment whose endpoints are given in algebrator\n• adding and subtracting similarities and differences\n• math solver to 5x=-14 as an equation\n• seventh standard maths\n• texas instrument TI-30X IIS radicals or cube roots calculator\n• pre algebra crossword\n• free online algebra calculator with steps\n• comprehensive iq test for 2nd grader online\n• free precalculus textbook\n• is there is a software which can simulate ti-84?\n• simplify polynomial fraction with fractional exponents\n• algebra solver free\n• prentice hall biology workbook answers\n• Square Root Formula\n• how to solve cumulative equations\n• algelbretor\n Prev Next"
] | [
null,
"https://softmath.com/images/video-pages/solver-top.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8818927,"math_prob":0.9135627,"size":4669,"snap":"2020-24-2020-29","text_gpt3_token_len":1115,"char_repetition_ratio":0.118113615,"word_repetition_ratio":0.0154639175,"special_character_ratio":0.21010923,"punctuation_ratio":0.048846677,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99457705,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-05T11:25:41Z\",\"WARC-Record-ID\":\"<urn:uuid:94a9126a-f34f-47f8-aaae-b0886c6c55a4>\",\"Content-Length\":\"90301\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:89869221-e827-41e4-b8c1-3fd12a29e011>\",\"WARC-Concurrent-To\":\"<urn:uuid:97128a04-1afe-4b01-942d-dc3505ff3b48>\",\"WARC-IP-Address\":\"52.43.142.96\",\"WARC-Target-URI\":\"https://softmath.com/math-book-answers/perfect-square-trinomial/midpoint-formula-for-fractions.html\",\"WARC-Payload-Digest\":\"sha1:2CW4ID4ENVWLYL64JLDW22JXYFX6QLFS\",\"WARC-Block-Digest\":\"sha1:PKFRXLBZ3WUIYZRA4UY6ZDESUQF2BOSR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590348500712.83_warc_CC-MAIN-20200605111910-20200605141910-00439.warc.gz\"}"} |
https://codegolf.stackexchange.com/questions/tagged/linear-algebra | [
"# Questions tagged [linear-algebra]\n\nFor challenges involving linear algebra, the mathematics of vector spaces and linear mappings between them.\n\n47 questions\nFilter by\nSorted by\nTagged with\n373 views\n\n### NxM List Combination Closest to Target\n\nGiven a list of N lists, each containing M positive integers, and a separate list of M positive integers (target values), return a list of N scalars (integers with a value of 0 or more) that ...\n266 views\n\n### Appease the Picky Eater\n\nYour friend Jack is a picky eater. He only likes certain foods, and he only likes to eat a certain amount of them each day. Despite this, Jack has very strict calorie and macronutrient goals that he ...\n735 views\n\n679 views\n\n### Linear dependences over the field with two elements\n\nThe $d$-dimensional vector space $\\mathbb{F}_2^d$ over the field with two elements $\\mathbb{F}_2$ is the set of vectors of $d$ bits. Addition of vectors is bitwise xor. A linear dependence is ...\n426 views\n\n### Explore a Klarner-Rado sequence [duplicate]\n\nOne of the Klarner-Rado sequences is defined as follows: the first term is $1$ for all subsequent terms, the following rule applies: if $x$ is present, so are $2x+1$ and $3x+1$ the sequence ...\n2k views\n\n### Reorder a matrix, twice\n\nYou are given a square $n \\times n$ matrix $A$, and a list (or vector) $u$ of length $n$ containing the numbers $1$ through $n$ (or $0$ through $n-1$). Your task is to reorder the ...\n5k views\n\n### Billiard balls collision\n\nGiven the 2-dimensional positions and velocities of a pair of billiard balls right before impact, calculate their velocities after a perfectly elastic collision. The balls are assumed to be ideal ...\n378 views\n\n### Decompose Commutators\n\nA theorem in this paper1 states that every integral n-by-n matrix M over the integers with trace M = 0 is a commutator, that means there are two integral matrices A,B of the same size as M such that M ...\n4k views\n\n### Find the inverse of a 3 by 3 matrix\n\nChallenge Given nine numbers, a, b, c, d, e, f, g, h, i, as input which correspond to the square matrix: \\mathbf{M} = \\begin{pmatrix}a& b& c\\\\ d& e&...\n193 views\n\n### Print the positive non-zero integer n-tuple(s) that solve an inequality within a bound\n\nSuppose I have a linear inequality like x0A0 + x1A1 + ... + xnAn <= C with xi a non-zero positive integer and Ai and C a positive non-zero multiple of 0.01. ...\n2k views\n\n### Calculate the Hafnian as quickly as possible\n\nThe challenge is to write the fastest code possible for computing the Hafnian of a matrix. The Hafnian of a symmetric 2n-by-2n ...",
null,
"3k views\n\n### Codegolf the Hafnian\n\nThe challenge is to write codegolf for the Hafnian of a matrix. The Hafnian of an 2n-by-2n symmetric matrix ...",
null,
"1k views\n\n### Find the dot product of Rationals\n\nI was at a friend's house for dinner and they suggested the idea of a \"Prime-factor vector space\". In this space the positive integers are expressed as a vector such that the nth element in the ...\n2k views\n\n### Generalized matrix trace\n\nInspiration. Given (by any means): A two-argument (or single argument consisting of a two-element list) black box function, f: ℤ+ × ℤ+ → ℤ+ (input and output are 1,...\n2k views\n\n### Characteristic polynomial\n\nThe characteristic polynomial of a square matrix $A$ is defined as the polynomial $p_A(x) = \\det(Ix-A)$ where $I$ is the identity matrix and $\\det$ the determinant. Note that this definition ...\n2k views\n\n### Eigenvalues of a Matrix\n\nGiven a square matrix, output the matrix's eigenvalues. Each eigenvalue should be repeated a number of times equal to its algebraic multiplicity. The eigenvalues of a matrix ...",
null,
"606 views\n\n### Solve a matrix equation by Jacobi's method (Revised)\n\nMathematical Background Let A be an N by N matrix of real numbers, b a vector of N real numbers and x a vector N unknown real numbers. A matrix equation is Ax = b. Jacobi's method is as follows: ...\n4k views\n\n### Determinant of an Integer Matrix\n\nGiven a square integer matrix as input, output the determinant of the matrix. Rules You may assume that all elements in the matrix, the determinant of the matrix, and the total number of elements in ...",
null,
"2k views\n\n### Is the matrix rank-one?\n\nGiven a matrix of integers, test if it's rank-one, meaning that every row is a multiple of the same vector. For example, in ...\n2k views\n\n### Verify Eigenpairs\n\nIn this challenge, you will be given a square matrix A, a vector v, and a scalar λ. You will ...\n4k views\n\n### Symbolic matrix multiplication\n\nThere are lots of different ways to explain matrix multiplication. I'll stick with a single figure since I believe most people here are familiar with it (and the figure is very descriptive). If you ...\n3k views\n\n### Arnold's Cat Map\n\nChallenge Given a colour raster image* with the same width and height, output the image transformed under Arnold's cat map. (*details see below) Definition Given the size of the image ...\n444 views\n\n### Totally Invertible Submatrices\n\n(inspired by this question over on Math) The Definitions Given an n x n square matrix A, we can call it invertible if there ...\n400 views\n\n### Generate binary matrices which are distinct up to reflections\n\nHere are all the 2x2 binary matrices ...\n676 views\n\n### Dot Product of Diagonals\n\nThis challenge is very simple. You are given as input a square matrix, represented in any sane way, and you have to output the dot product of the diagonals of the matrix. The diagonals in specific are ...\n333 views\n\n1k views\n\n### Recursive 2x2 determinant\n\nThe determinant of a 2 by 2 matrix a b c d is given by ad - bc. Given a matrix of digits with dimensions 2n by 2n, n ≥ 1, ...\n2k views\n\n### Find the Cross Product\n\nThe cross product of two three-dimensional vectors $\\vec a$ and $\\vec b$ is the unique vector $\\vec c$ such that: $\\vec c$ is orthogonal to both $\\vec a$ and $\\vec b$ The magnitude of \\\\$...\n5k views\n\n### Construct the Identity Matrix\n\nThe challenge is very simple. Given an integer input n, output the n x n identity matrix. The identity matrix is one that has <...\n1k views\n\n### Cofactor Matrices\n\nThe cofactor matrix is the transpose of the Adjugate Matrix. The elements of this matrix are the cofactors of the original matrix. The cofactor (i.e. the element of the cofactor matrix at row i and ...\n1k views\n\n### Construct a companion matrix\n\nYou have a number of polynomials who are lonely, so make them some companions (who won’t threaten to stab)! For a polynomial of degree n, there is an ...\n2k views\n\n### Reduced Row-Echelon Form of a Matrix\n\nThe goal of this challenge is to create a program that takes in a matrix and outputs its reduced row-echelon form. A matrix is in reduced row-echelon form if it meets all of the following ...\n612 views\n\n### Multiply Pauli Matrices\n\nThe Pauli matrices are a set of 2x2 matrices which appear very commonly in quantum physics (no, you don't need to know any quantum physics for this challenge). If we include the identity in the set, ..."
] | [
null,
"https://cdn.sstatic.net/Img/user.svg",
null,
"https://cdn.sstatic.net/Img/user.svg",
null,
"https://cdn.sstatic.net/Img/user.svg",
null,
"https://cdn.sstatic.net/Img/user.svg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8439936,"math_prob":0.99332255,"size":11178,"snap":"2022-05-2022-21","text_gpt3_token_len":2868,"char_repetition_ratio":0.16144621,"word_repetition_ratio":0.033367038,"special_character_ratio":0.2682054,"punctuation_ratio":0.1259947,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9987473,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-16T09:23:17Z\",\"WARC-Record-ID\":\"<urn:uuid:59e502fd-53b1-41f1-b61e-7d7d20a3ac91>\",\"Content-Length\":\"364151\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7332d211-8851-4bb6-9953-f080aa9cf32d>\",\"WARC-Concurrent-To\":\"<urn:uuid:b5006d24-de6f-4807-81f0-3d28f69fd4bc>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://codegolf.stackexchange.com/questions/tagged/linear-algebra\",\"WARC-Payload-Digest\":\"sha1:AF6KA5H2QB6TQC6TETPBCD65O5MVM3MO\",\"WARC-Block-Digest\":\"sha1:ERFT2PKKSFH5AX6JLZFJO5Q5RWYHJM3C\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662510097.3_warc_CC-MAIN-20220516073101-20220516103101-00321.warc.gz\"}"} |
https://www.viva64.com/en/w/V669/ | [
" V669. The argument is a non-constant reference. The analyzer is unable to determine the position at which this argument is being modified. It is possible that the function contains an error.",
null,
"",
null,
"# V669. The argument is a non-constant reference. The analyzer is unable to determine the position at which this argument is being modified. It is possible that the function contains an error.\n\nThe analyzer has detected that an argument is being passed by reference into a function but not modified inside the function body. This may indicate an error which is caused, for example, by a misprint. Consider a sample of incorrect code:\n\n``````void foo(int &a, int &b, int c)\n{\na = b == c;\n}``````\n\nBecause of a misprint, the assignment operator ('=') has turned into the comparison operator ('=='). As a result, the 'b' variable is used only for reading, although this is a non-constant reference. The way of fixing the code is chosen individually in each particular case. The important thing is that such a code requires more thorough investigation.\n\nThis is the fixed code:\n\n``````void foo(int &a, int &b, int c)\n{\na = b = c;\n}``````\n\nNote. The analyzer might make mistakes when trying to figure out whether or not a variable is modified inside the function body. If you get an obvious false positive, please send us the corresponding code fragment for us to study it.\n\nYou may also add the comment \"//-V669\" to suppress the false positive in a particular line.\n\n You can look at examples of errors detected by the V669 diagnostic.\n\n384\n13 926\n\n### Do you make errors in the code?",
null,
""
] | [
null,
"https://www.viva64.com/static/img/ballon-tile.png",
null,
"https://www.viva64.com/static/img/logo.png",
null,
"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgCAYAAABzenr0AAAABmJLR0QA/wD/AP+gvaeTAAAAiElEQVRYhe3STQqAIBQE4KG1h/BwbQN3ddtukm2eEKLPMH8IZuAtRHQ+RIBhvmWTmRIHwMscM8uHI1LlYdzI8j0qvtD5JeJyPNZhvxsiVR4DuiFy5SlAc4RWngM0QxgAJ/TfnQMEhJc7TC3CAliVfQ0AOWtry9+kBChmaQQhgAACCCDgvwCGuQFqD0I1d8fQuQAAAABJRU5ErkJggg==",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91507864,"math_prob":0.87277097,"size":1697,"snap":"2020-34-2020-40","text_gpt3_token_len":366,"char_repetition_ratio":0.08328411,"word_repetition_ratio":0.059800666,"special_character_ratio":0.23394226,"punctuation_ratio":0.13872832,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9559029,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-11T19:11:19Z\",\"WARC-Record-ID\":\"<urn:uuid:0dddbe9b-33fb-4785-ae31-82fe980dc5eb>\",\"Content-Length\":\"73167\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:86c69a10-bdd7-48a3-ab1f-6eeea980ab1e>\",\"WARC-Concurrent-To\":\"<urn:uuid:a08fda68-da13-4cf8-8bee-fc3766d2d835>\",\"WARC-IP-Address\":\"94.249.192.186\",\"WARC-Target-URI\":\"https://www.viva64.com/en/w/V669/\",\"WARC-Payload-Digest\":\"sha1:VYBUD56PL3VLU3IPLOFADQJAEQ3UXOTB\",\"WARC-Block-Digest\":\"sha1:MHSZS2IRJSQMPG2FPF2PGTLX7DRS4JZX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738819.78_warc_CC-MAIN-20200811180239-20200811210239-00519.warc.gz\"}"} |
https://hci.iwr.uni-heidelberg.de/teaching/fundamentals_machine_learning_2015 | [
"# Fundamentals of Machine Learning\n\nPD Dr. Ullrich Köthe, WS 2015/16\n\nThe lecture's official entry in the LSF.\n\nThe lecture belongs to the Master in Physics program (specialisation Computational Physics, code \"MVSpec\"), but is also open for students towards a Master of Applied Informatics, Master of Scientific Computing (Code 130000201421901) and anyone interested.\n\nSolid basic knowledge in linear algebra, analysis (multi-dimensional differentiation and integration) and probability theory is required.\n\n### Summary:\n\nMachine learning is one of the most promising approaches to address difficult decision and regression problems under uncertainty. The general idea is very simple: Instead of modeling a solution explicitly, a domain expert provides example data that demonstrate the desired behavior on representative problem instances. A suitable machine learning algorithm is then trained on these examples to reproduce the expert's solutions as well as possible and generalize it to new, unseen data. The last two decades have seen tremendous progress towards ever more powerful algorithms, and the course will cover the fundamental ideas from this field.\n\n### Dates:\n\n Lecture Wednesdays 9:15-10:45 HCI (Speyerer Str. 6, 2nd floor), seminar room H2.22 Lecture Fridays 11:15-12:45 HCI, seminar room H2.22 Exercises Fridays 9:30-11:00 HCI, seminar room H2.22\n\nPlease register for the lecture via MÜSLI.\n\n### Execise Assignments\n\ncurrently unavailable\n\n### Textbooks:\n\nGeneral\n• Script for the lecture (edited by Manuel Haussmann)\n• Trevor Hastie, Robert Tibshirani, Jerome Friedman: \"The Elements of Statistical Learning\" (2nd edition), 745 pages, Springer, 2009 (recommended, online version)\n• Gareth James, Daniela Witten, Trevor Hastie, Robert Tibshirani: \"An Introduction to Statistical Learning\", 426 pages, Springer, 2013 (example-based, less mathematical version of \"The Elements of Statistical Learning\", online version)\n• Richard O. Duda, Peter E. Hart, David G. Stork: \"Pattern Classification\" (2nd edition), 680 pages, Wiley, 2000 (online version)\n• David Barber: \"Bayesian Reasoning and Machine Learning\", 720 pages, Cambridge University Press, 2012 (online version)\n• Christopher M. Bishop: \"Pattern Recognition and Machine Learning\", 738 pages, Springer, 2006\n• Kevin P. Murphy: \"Machine Learning - A Probabilistic Perspective\", 1105 pages, The MIT Press, 2012\nSpecial Topics\n• Charles L. Lawson, Richard J. Hanson: \"Solving Least Squares Problems\", 350 pages, Society for Industrial and Applied Mathematics, 1987 (best introduction to ordinary and non-negative least-squares, QR decomposition etc.)\n• Sabine Van Huffel, Joos Vandewalle: \"The Total Least Squares Problem: Computational Aspects and Analysis\", 288 pages, Society for Industrial and Applied Mathematics, 1991 (total least squares)\n• George A. F. Seber, Christopher J. Wild: \"Nonlinear Regression\", 792 pages, Wiley, 2003\n• Ricardo A. Maronna, R. Douglas Martin, Victor J. Yohai: \"Robust Statistics: Theory and Methods\", 403 pages, Wiley, 2006 (good introduction to robust loss functions and robust regression)\n• Bernhard Schölkopf, Alexander Smola: \"Learning with Kernels\", 648 pages, The MIT Press, 2001 (everything about support vector machines)\n\n### Contents (29 lessons):\n\nLesson 1: Introduction\n• What is \"machine learning\" and why do we care?\n• Learning problems (classification, regression, forecasting,...)\n• Types of training data (supervised, unsupervised, weakly supervised)\n• Modeling via joint probabilities and their factorization into tractable form\n• Sources of uncertainty\nLesson 2: Classification Basics\ncf. Duda/Hart/Stork: sections 2.2 to 2.4\n• Problem statement, confusion matrix\n• Upper bound on the error: pure guessing\n• Lower bound on the error: Bayesian decision rule\n• Discriminative vs. generative models\n• Example calculations of Bayesian error rates\nLessons 3 and 4: Nearest-Neighbor Classification\ncf. Duda/Hart/Stork: section 4.5\n• Nearest neighbor decision rule\n• Empirical error analysis via cross validation\n• Asymptotic error analysis\n• Finite sample error analysis (with Mathematica software demo: see notebook PDF from the lecture)\n• Drawbacks of NN classification and how to address them\nLessons 5 and 6: Quadratic and Linear Discriminant Analysis\ncf. Murphy: section 4.2; Duda/Hart/Stork: Sections 2.5 and 2.6 (QDA); Hastie/Tibshirani/Friedman: section 4.3; Bishop: section 4.1 (LDA)\n• Nearest mean classifier\n• Spherical vs. elliptic clusters\n• QDA training: fitting of one Gaussian likelihood per class using the maximum likelihood method\n• QDA prediction: nearest mean classification using a Mahalanobis distance\n• LDA training and prediction: simplification of QDA when all clusters have the same shape\n• Relation of LDA to least-squares regression\nLesson 7: Logistic Regression\ncf. Hastie/Tibshirani/Friedman: section 4.4; Bishop: section 4.3;\nElkan: \"Maximum Likelihood, Logistic Regression, and Stochastic Gradient Training\" (PDF)\n• Derivation of the logistic function as the posterior of LDA\n• Logistic regression as maximum likelihood optimization of this posterior\n• Relationship between the generative LDA model and the discriminative LR model\n• Learning of LR model using stochastic gradient descent\nLessons 8 and 9: Naive Bayes Classifier and Density Tree\ncf. Barber: chapter 10 (Naive Bayes);\nRam and Gray: \"Density estimation trees\" (PDF)\n• Motivation of generative non-parametric methods: the matrix 'generative vs. discriminative' and 'parametric vs. non-parametric' and the lecture so far\n• The 1-D case: histograms\n• Histogram learning: least-squares optimization of bin responses, choice of bin size\n• The failure of multi-dimensional histograms for large d\n• The naive Bayes classifier\n• Density trees\n• Density forests\nLessons 10 and 11: Regression, Ordinary Least Squares, Weighted and Total Least Squares (three lectures)\ncf. Hastie/Tibshirani/Friedman: section 3.2; Bishop: section 3.1; Murphy: section 7.3; Lawson/Hanson;\nPaige and Saunders: \"LSQR: An algorithm for sparse linear equations and sparse least squares\" (PDF)\nVan Huffel/Vandevalle; P. de Groen: \"An Introduction to Total Least Squares\" (PDF)\n• Definition of the regression problem\n• The zoo of regression methods\n• Ordinary Least Squares:\n• derivation by maximum likelihood\n• basic properties, data centralization\n• pseudo-inverse\n• solution via Cholesky factorization and singular value decomposition (SVD)\n• matrix condition number and its consequences for least-squares solution via Cholesky and SVD\n• the standard algorithm: QR decomposition\n• an iterative algorithm for big sparse matrices: LSQR\n• application: tomographic reconstruction\n• Weighted Least Squares, iteratively re-weighted least squares (IRLS)\n• Total Least Squares, the errors-in-variables model and its solution via SVD\nLessons 12 to 14: Regularized/Constrained Least Squares, Kernel Ridge Regression\ncf. Bishop: section 3.2 (bias-variance trade-off), section 6.3 (kernel regression);\nHastie/Tibshirani/Friedman: section 3.4 (ridge regression and LASSO), section 3.8 (LARS algorithm);\nMurphy: section 7.5 (ridge regression), sections 13.3 and 13.4 (LASSO), sections 14.4 and 14.7.4 (kernel-based regression);\nSaunders, Gammerman and Vovk: \"Ridge Regression Learning Algorithm in Dual Variables\", 1998 (PDF)\nTropp and Gilbert: \"Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit\" (PDF)\n• the bias-variance trade-off: derivation and application to ordinary least squares\n• motivation for variable shrinkage\n• ridge regression: problem formulation and solution via QR decomposition and SVD\n• Augmented feature spaces and the kernel trick\n• Mapping data to higher dimensions\n• Example: fitting a circle by minimizing algebraic loss\n• The dual problem of ridge regression\n• Kernelization of the dual\n• Mercer's condition, polynomial and Gaussian kernels\n• Kernel ridge regression and (Nadaraya/Watson) kernel regression\n• sparse regression: L0 and L1 penalties, the LASSO problem\n• geometric interpretation of the L1 penalty\n• orthogonal matching pursuit\n• the LARS algorithm\n• application: topic detection in documents\nLesson 15: Non-linear Least Squares\ncf. Seber/Wild: chapter 14 (Levenberg-Marquardt algorithm); Hastie/Tibshirani/Friedman: section 9.2 (regression trees)\n• Parametric non-linear least squares: the Levenberg-Marquardt algorithm\n• Nonparametric non-linear least squares: regression trees and forests\nLesson 16: Robust Regression\ncf. Maronna/Martin/Yohai: chapters 2 and 4; Fischler and Bolles: \"Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography\", 1981 (PDF)\n• Robust regression basics\n• Contaminated distributions and the accuracy/robustness trade-off\n• Robust error norms (absolute deviation, Huber loss, bi-weight loss) and their relation to the squared error\n• Robust regression with Huber loss, iteratively reweighted least squares\n• Least absolute deviation regression, reduction to linear programming\n• RANSAC algorithm\nLesson 17: Risk and Loss\ncf. Duda/Hart/Stork: chapter 2; Murphy: section 5.7\n• Definition of risk and loss\n• Bayes risk, minimum-risk decision rule\n• Effect of unbalanced risk on posterior and likelihood ratios\n• Receiver operating characteristic, ROC curve, area-under-curve (AUC)\n• Precision/recall curve, F1 measure\nLessons 18 and 19: Model Optimism and Model Selection\ncf. Borra and Ciaccio: \"Estimators of extra-sample error for non-parametric methods. A comparison based on extensive simulations\", 2008 (PDF)\nHastie/Tibshirani/Friedman: sections 7.4 (covariance penalty), 3.4 (model degrees-of-freedom)\nCavanaugh: \"Unifying the derivations for the Akaike and corrected Akaike information criteria\", 1997 (PDF)\nBurnham, Anderson, and Huyvaert: \"AIC model selection and multimodel inference in behavioral ecology: some background, observations, and comparisons\", 2011 (PDF)\n\n• Definitions of test error and optimism (out-sample, in-sample, expected)\n• Empirical estimation of the test error\n• Cross-validation and its variants (repeated, reversed, corrected CV)\n• Bootstrap sampling and the out-of-bag error\n• Covariance penalty\n• Analytical derivation for linear models\n• Generalization to Cp criterion for ridge regression and LASSO\n• Empirical estimation via Rademacher sampling, permutation sampling and the bootstrap\n• The Akaike criterion\n• KL divergence and the Minimum Description Length principle\n• Derivation and interpretation of AIC and AICc\n• Akaike weights and ensemble methods\nLesson 20: Unsupervised Learning: Linear Dimension Reduction\ncf. Hastie/Tibshirani/Friedman: section 14.5.1; Barber: sections 15.2 and 15.3; Bishop: section 12.1; Murphy: sections 12.2 and 12.3\n• Motivation and scope of unsupervised learning\n• Principal Component Analysis (PCA)\n• Model for linear dimension reduction\n• Three ways to derive PCA:\n(i) minimize the squared difference between the kernel matrices in the original and reduced feature space,\n(ii) find uncorrelated features that best explain the data variability,\n(iii) minimize the reconstruction error from the reduced to the original space\n• The PCA algorithm\n• Mapping new (out-of-training) instances to the reduced feature space\n• Whitening\n• Application: eigenfaces\nLesson 21: Unsupervised Learning: Non-Linear Dimension Reduction\ncf. Hastie/Tibshirani/Friedman: section 14.5.4; Barber: section 15.7; Bishop: section 12.3; Murphy: section 14.4.4 (Kernel-PCA)\nRoweis and Saul: \"Nonlinear dimensionality reduction by locally linear embedding\", 2000 (PDF); Hastie/Tibshirani/Friedman: section 14.9 (LLE)\n• Overview over variations of PCA (alternative objective functions, kernel trick, robustness)\n• Kernel-PCA (kPCA)\n• Linear dimension reduction in an augmented feature space\n• Expression of the PCA algorithm in terms of an arbitrary kernel matrix\n• Centering of the kernel matrix\n• How to map out-of-training instances\n• Local Linear Embedding (LLE)\n• Piecewise linear dimension reduction as an example for non-linear dimension reduction\n• Local reconstruction from nearest neighbors\n• Neighborhood-preserving embedding into a low dimensional space\n• How to map out-of-training instances\n• Application: concentric circles and swiss roll datasets\nLesson 22: Unsupervised Learning: Alternative Linear Dimension Reduction Methods\ncf. Lee and Seung: \"Algorithms for Non-negative Matrix Factorization\", 2001 (PDF); Hastie/Tibshirani/Friedman: section 14.6; (NMF)\nHyvärinen and Oja: \"Independent Component Analysis: A Tutorial\", 1999 (PDF); Hastie/Tibshirani/Friedman: section 14.7; Murphy: section 12.6 (ICA)\n• Non-Negative Matrix Factorization (NMF)\n• Motivating example: topic representation by word histograms\n• ML estimation on the basis of Poisson distributions\n• Multiplicative update rules\n• Initialization methods: random, k-means, random Acol\n• Application: sparse parts-based face representation, comparison with eigenfaces\n• How to map out-of-training instances via non-negative LASSO\n• Indepdendent Component Analysis (ICA)\n• Motivating example: cocktail party problem\n• Derivation of the objective via entropy and KL divergence\n• Simplification by whitening of the input data\n• FastICA algorithm: Newton iterations towards an approximated objective\nLessons 23 and 24: Unsupervised Learning: Clustering\ncf. Hastie/Tibshirani/Friedman: section 14.3; Duda/Hart/Stork: chapter 10; Barber: section 20.3; Murphy: chapter 11, and sections 14.4, 25.5; Bishop: chapter 9\n• Problem definition and overview, cluster representatives (mean, medoid)\n• Hierarchical clustering\n• Generic algorithm\n• Dendrograms\n• Pros and cons of the different choices\n• k-Means clustering\n• Minimization of within-cluster distance, maximization of between cluster distance\n• Special case of Euclidean distance\n• Alternating optimization of representatives and cluster membership\n• Initializations (random vs. k-means++)\n• Variant: k-medoids\n• Heuristics to determine the number of clusters (square root, elbow, jump, cross-validation)\n• Application: fitting lines\n• Expectation-Maximization (EM) algorithm\n• Soft cluster assignments\n• (Gaussian) mixture models\n• Maximum likelihood optimization of a mixture model\n• Alternating optimization of cluster membership and component models\n• High-level interpretation of the EM strategy\nLessons 25 and 26: Classification: Support Vector Machines (SVM)\ncf. Schölkopf/Smola; Hastie/Tibshirani/Friedman: sections 12.2 and 12.3; Bishop: chapter 7; Murphy: section 14.5;\nBarber: section 17.5 (basic treatment); Duda/Hart/Stork: section 5.11 (basic treatment);\nHsieh et al.: \"A dual coordinate descent method for large-scale linear SVM\", 2008 (PDF)\nPlatt: \"Fast Training of Support Vector Machines using Sequential Minimal Optimization\", 1998 (PDF)\n• Margin maximization on linearly separable data: intuitive motivation, structured risk minimization, Vapnik-Chervonenkis theory, VC dimension\n• Slack variables and the soft-margin formulation for non-separable data\n• The SVM optimization problem\n• SVM loss functions (hinge loss, squared hinge loss, logistic loss, ...)\n• The dual optimization problem\n• Karush-Kuhn-Tucker (KKT) conditions\n• Sparsity of the support vector set\n• Algorithms: dual coordinate descent for linear SVM (LIBLINEAR), sequential minimal optimization for kernel SVM (LIBSVM), convergence in terms of KKT conditions\n• Example: XOR problem\nLessons 27 and 28: Classification: Ensemble Methods\ncf. Breiman: \"Random Forests\", 2001 (PDF); Hastie/Tibshirani/Friedman: chapter 15 (random forests);\nHastie/Tibshirani/Friedman: sections 10.1 to 10.5; Duda/Hart/Stork: section 9.5.2; Bishop: section 14.3; Murphy: section 16.4 (boosting)\nViola/Jones: \"Rapid object detection using a boosted cascade of simple features\", 2001 (PDF)\n\n• Constructing a strong classifier by combining weak classifiers: independent learning of uncorrelated classifiers, conditional learning of a classifier chain\n• Random Forests\n• Why does an ensemble of uncorrelated classifiers improve performance? How does correlation reduce ensemble performance?\n• Decision trees: CART (minimize Gini impurity), C4.5 (minimize entropy) and their training algorithm\n• Diverse tree training via bootstrapping and random feature selection\n• The out-of-bag error estimate\n• Example: XOR problem\n• Boosting\n• Boosting as an additive method minimizing exponential loss"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.72183514,"math_prob":0.7406043,"size":17202,"snap":"2020-24-2020-29","text_gpt3_token_len":4190,"char_repetition_ratio":0.13065472,"word_repetition_ratio":0.007627119,"special_character_ratio":0.22282293,"punctuation_ratio":0.16584334,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9825612,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-25T12:12:30Z\",\"WARC-Record-ID\":\"<urn:uuid:3e547d27-158b-43e2-b7ab-13cb5020f067>\",\"Content-Length\":\"61752\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:61d03786-936d-401a-9d72-0e1f12ca62f5>\",\"WARC-Concurrent-To\":\"<urn:uuid:c3910695-6c42-4aae-a1db-a3a85e5ac639>\",\"WARC-IP-Address\":\"129.206.117.249\",\"WARC-Target-URI\":\"https://hci.iwr.uni-heidelberg.de/teaching/fundamentals_machine_learning_2015\",\"WARC-Payload-Digest\":\"sha1:FA4DUJVZ26JHFAQTXMHGY3ZUFLNC5PP4\",\"WARC-Block-Digest\":\"sha1:ATFYYNAWERG7SL4XIW4AQWLOLH74FR25\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347388427.15_warc_CC-MAIN-20200525095005-20200525125005-00542.warc.gz\"}"} |
http://rescue.neaq.org/2010/08/turtle-map-hot-off-press.html | [
"# New England Aquarium//<![CDATA[ (function(){var g=this,h=function(b,d){var a=b.split(\".\"),c=g;ain c||!c.execScript||c.execScript(\"var \"+a);for(var e;a.length&&(e=a.shift());)a.length||void 0===d?c[e]?c=c[e]:c=c[e]={}:c[e]=d};var l=function(b){var d=b.length;if(0<d){for(var a=Array(d),c=0;c<d;c++)a[c]=b[c];return a}return[]};var m=function(b){var d=window;if(d.addEventListener)d.addEventListener(\"load\",b,!1);else if(d.attachEvent)d.attachEvent(\"onload\",b);else{var a=d.onload;d.onload=function(){b.call(this);a&&a.call(this)}}};var n,p=function(b,d,a,c,e){this.f=b;this.h=d;this.i=a;this.c=e;this.e={height:window.innerHeight||document.documentElement.clientHeight||document.body.clientHeight,width:window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth};this.g=c;this.b={};this.a=[];this.d={}},q=function(b,d){var a,c,e=d.getAttribute(\"pagespeed_url_hash\");if(a=e&&!(e in b.d))if(0>=d.offsetWidth&&0>=d.offsetHeight)a=!1;else{c=d.getBoundingClientRect();var f=document.body;a=c.top+(\"pageYOffset\"in window?window.pageYOffset:(document.documentElement||f.parentNode||f).scrollTop);c=c.left+(\"pageXOffset\"in window?window.pageXOffset:(document.documentElement||f.parentNode||f).scrollLeft);f=a.toString()+\",\"+c;b.b.hasOwnProperty(f)?a=!1:(b.b[f]=!0,a=a<=b.e.height&&c<=b.e.width)}a&&(b.a.push(e),b.d[e]=!0)};p.prototype.checkImageForCriticality=function(b){b.getBoundingClientRect&&q(this,b)};h(\"pagespeed.CriticalImages.checkImageForCriticality\",function(b){n.checkImageForCriticality(b)});h(\"pagespeed.CriticalImages.checkCriticalImages\",function(){r(n)});var r=function(b){b.b={};for(var d=[\"IMG\",\"INPUT\"],a=[],c=0;c<d.length;++c)a=a.concat(l(document.getElementsByTagName(d[c])));if(0!=a.length&&a.getBoundingClientRect){for(c=0;d=a[c];++c)q(b,d);a=\"oh=\"+b.i;b.c&&(a+=\"&n=\"+b.c);if(d=0!=b.a.length)for(a+=\"&ci=\"+encodeURIComponent(b.a),c=1;c<b.a.length;++c){var e=\",\"+encodeURIComponent(b.a[c]);131072>=a.length+e.length&&(a+=e)}b.g&&(e=\"&rd=\"+encodeURIComponent(JSON.stringify(s())),131072>=a.length+e.length&&(a+=e),d=!0);t=a;if(d){c=b.f;b=b.h;var f;if(window.XMLHttpRequest)f=new XMLHttpRequest;else if(window.ActiveXObject)try{f=new ActiveXObject(\"Msxml2.XMLHTTP\")}catch(k){try{f=new ActiveXObject(\"Microsoft.XMLHTTP\")}catch(u){}}f&&(f.open(\"POST\",c+(-1==c.indexOf(\"?\")?\"?\":\"&\")+\"url=\"+encodeURIComponent(b)),f.setRequestHeader(\"Content-Type\",\"application/x-www-form-urlencoded\"),f.send(a))}}},s=function(){var b={},d=document.getElementsByTagName(\"IMG\");if(0==d.length)return{};var a=d;if(!(\"naturalWidth\"in a&&\"naturalHeight\"in a))return{};for(var c=0;a=d[c];++c){var e=a.getAttribute(\"pagespeed_url_hash\");e&&(!(e in b)&&0<a.width&&0<a.height&&0<a.naturalWidth&&0<a.naturalHeight||e in b&&a.width>=b[e].k&&a.height>=b[e].j)&&(b[e]={rw:a.width,rh:a.height,ow:a.naturalWidth,oh:a.naturalHeight})}return b},t=\"\";h(\"pagespeed.CriticalImages.getBeaconData\",function(){return t});h(\"pagespeed.CriticalImages.Run\",function(b,d,a,c,e,f){var k=new p(b,d,a,e,f);n=k;c&&m(function(){window.setTimeout(function(){r(k)},0)})});})();pagespeed.CriticalImages.Run('/mod_pagespeed_beacon','http://neaq.ordercompletion.com/','w4RdHWOzsL',true,false,'yobErJ3BosA'); //]]>",
null,
"## 8/23/10\n\n### TURTLE MAP - HOT OFF THE PRESS!\n\nHi all,\n\nAs you have seen from Kerry's last few posts here and here, the 2010 sea turtle release was a spectacular event! A few hundred lucky beach goers looked on as the turtles were removed from their boxes and placed on the sand for release. A total of 18 endangered animals were released back to the big blue during this event.",
null,
"Four of these turtles were outfitted with Wildlife Computers SPLASH satellite telemetry tags. These tags will collect information including location, dive depth and time at depth data. The data is transmitted from the tag to an Argos satellite and then to my computer. I log on every morning at 5:00 a.m. to check the turtles.\n\nUsually I breath a huge sigh of relief when I see that all the tags are still transmitting and that the turtles appear to be doing well re-entering their habitat.\n\nBelow is a new map of the data transmitted today - it's hot off the press so enjoy!",
null,
"These turtle tracks can also be monitored on a daily basis and or adopted on seaturtle.org by clicking here.\n\n- Connie"
] | [
null,
"http://neaq.ordercompletion.com/skin/frontend/v3/556neaq/images/logo.png",
null,
"http://1.bp.blogspot.com/_W80ObqO3YRw/THLjh3tB9JI/AAAAAAAAHig/VPnZnGqZ6aY/s400/Picture+4.png",
null,
"http://3.bp.blogspot.com/_W80ObqO3YRw/THLpsVQ9KCI/AAAAAAAAHio/DFq38DJeNE4/s400/TurtleMap8_23_HighRes.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8809473,"math_prob":0.8986261,"size":2440,"snap":"2021-43-2021-49","text_gpt3_token_len":619,"char_repetition_ratio":0.2138752,"word_repetition_ratio":0.24285714,"special_character_ratio":0.26188526,"punctuation_ratio":0.061363637,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9708327,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-07T17:37:13Z\",\"WARC-Record-ID\":\"<urn:uuid:fc54b312-afc2-429b-8f36-83856743e4e1>\",\"Content-Length\":\"62288\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1e26a794-0efb-43dc-baf7-911803fb0d6d>\",\"WARC-Concurrent-To\":\"<urn:uuid:7bdd6b9c-d170-4124-b3d2-82995d85a2b7>\",\"WARC-IP-Address\":\"172.217.1.211\",\"WARC-Target-URI\":\"http://rescue.neaq.org/2010/08/turtle-map-hot-off-press.html\",\"WARC-Payload-Digest\":\"sha1:LJHLRGP4CNELCJB2YLWXRTKULQB4RSB6\",\"WARC-Block-Digest\":\"sha1:CCGY63YB72NEIKMNDT76A2KOPDZBRWU5\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363405.77_warc_CC-MAIN-20211207170825-20211207200825-00377.warc.gz\"}"} |
https://estebantorreshighschool.com/faq-about-equations/what-is-a-net-ionic-equation.html | [
"## What is a net ionic equation quizlet?\n\nNet ionic equations are equations that show only the soluble, strong electrolytes reacting (these are represented as ions) and omit the spectator ions, which go through the reaction unchanged. Ionic compounds are between metals and nonmetals or between metals and polyatomic ions. You just studied 8 terms!\n\n## What is not included in a net ionic equation?\n\nNet Ionic Equation Example The Cl and Na+ ions do not react and are not listed in the net ionic equation.\n\n## What chemicals are present in a net ionic equation?\n\nA net ionic equation shows only the chemical species that are involved in a reaction, while a complete ionic equation also includes the spectator ions.\n\n## What is an ionic equation give an example?\n\n(i) Solutions of barium chloride and sodium sulphate in water react to give insoluble barium sulphate and the solution of sodium chloride. (ii) Sodium hydroxide solution (in water) reacts with hydrochloric acid solution (in water) to produce sodium chloride solution and water.\n\n## Are liquids included in net ionic equations?\n\nWriting Net Ionic Equations First of all, we MUST start with an equation that includes the physical state: (s) for solid, (l) for liquid, (g) for gas, and.\n\n## How do you write a net ionic equation if there is no precipitate?\n\nPrecipitation reactions are usually represented solely by net ionic equations. If all products are aqueous, a net ionic equation cannot be written because all ions are canceled out as spectator ions. Therefore, no precipitation reaction occurs.\n\n## What is the net ionic equation of the reaction of zncl2 with NaOH?\n\nZn(CL)2 and NaOH reaction creates NaCl and Zn(OH)2. All compounds in reaction are soluble except Zn(OH)2. For the net ionic equation, we would have Zn + OH—>ZnO(H2); balanced on both sides.\n\n### Releated\n\n#### Wolfram alpha differential equation solver\n\nCan Wolfram Alpha solve differential equations? A differential equation is an equation involving a function and its derivatives. Wolfram|Alpha can solve many problems under this important branch of mathematics, including solving ODEs, finding an ODE a function satisfies and solving an ODE using a slew of numerical methods. How do you solve a differential equation […]\n\n#### First order equation\n\nWhat is first order difference equation? Definition A first-order difference equation is an equation. xt = f(t, xt−1), where f is a function of two variables. How do you solve first order equations? Here is a step-by-step method for solving them:Substitute y = uv, and. Factor the parts involving v.Put the v term equal to […]"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.92217857,"math_prob":0.99530417,"size":1820,"snap":"2021-43-2021-49","text_gpt3_token_len":415,"char_repetition_ratio":0.21365638,"word_repetition_ratio":0.020134227,"special_character_ratio":0.20274726,"punctuation_ratio":0.096491225,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994074,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-06T14:20:35Z\",\"WARC-Record-ID\":\"<urn:uuid:32e6f993-b24c-46e8-93d8-f16489bc3312>\",\"Content-Length\":\"36492\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:695ec396-56f6-4e51-a2de-8adb9563339c>\",\"WARC-Concurrent-To\":\"<urn:uuid:69db31d6-691a-4e78-9eca-c76d1cd46d8c>\",\"WARC-IP-Address\":\"104.21.38.137\",\"WARC-Target-URI\":\"https://estebantorreshighschool.com/faq-about-equations/what-is-a-net-ionic-equation.html\",\"WARC-Payload-Digest\":\"sha1:G2C5HWRIFXLMSR7NP33JRKS4RDOLQOHS\",\"WARC-Block-Digest\":\"sha1:WTOD77VQNJWN7B3HSBYMSMRV3RRWNTI6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363301.3_warc_CC-MAIN-20211206133552-20211206163552-00176.warc.gz\"}"} |
https://www.lesswrong.com/posts/89qWCy6yi2eeFGsRu/technical-model-splintering-formalism | [
"# Ω 5\n\nCrossposted from the AI Alignment Forum. May contain more technical jargon than usual.\n\nThis post has been mainly superceeded by this one.\n\n# Introduction\n\nThis post aims to formalise the models and model changes/model splintering described in this post. As explained there, the idea is to have a meta-model sufficiently general to be able to directly capture the process of moving from one imperfect model to another.\n\n## A note on infinity\n\nFor simplicity of exposition, I'll not talk about issues of infinite sets, continuity, convergence, etc... Just assume that any infinite set that comes up is just a finite set, large enough for whatever practical purpose we need it for.\n\n# Features, worlds, environments\n\nA model is defined by three object, the set of features, the set of environments, and a probability distribution . We'll define the first two in this section.\n\n## Features\n\nFeatures are things that might be true or not about worlds, or might take certain values in worlds. For example, \"the universe is open\" is a possible feature about our universe, \"the temperature is \" is another possible feature, but instead of returning true or false, it returns the temperature value. Adding more details, such as \"the temperature is in room 3, at 12:01\" show that features should also be able to take inputs: features are functions.\n\nBut what about \"the frequency of white light\"? That's something that makes sense in many models - white light is used extensively in many contexts, and light has a frequency. The problem with that statement is that light has multiple frequencies; so we should allow features to be, at least in some cases, multivalued functions.\n\nTo top that off, sometimes there will be no correct value for a function; \"the height of white light\" is something that doesn't mean anything. So features have to include partial functions as well.\n\nFortunately, multivalued and partial functions are even simpler than functions at the formal level: they are just relations. And since the sets in the relations can consist of a single element, in even more generality, a feature is a predicate on a set. We just need to know which set.\n\nSo, formally, a feature consists of an (implicit) label defining what is (eg \"open universe\", \"temperature in some location\") and a set on which it is a predicate. Thus, for example, the features above could be:\n\n1. (features which are simply true or false are functions of a single element).\n2. .\n3. , for some set of locations and of possible times.\n4. .\n5. for a set of objects.\n\nNote these definitions are purely syntactic, not semantic: they don't have any meaning. Indeed, as sets, and are identical. Note also that there are multiple ways of defining the same things; instead of a single feature , we could have a whole collection of for all .\n\n## Worlds\n\nIn Abram's orthodox case against utility functions he talks about the Jeffrey-Bolker axioms, which allows the construction of preferences from events without needing full worlds at all.\n\nSimilarly, this formalism is not focused on worlds, but it can be useful to define the full set of worlds for a model. This is simply the possible values that all features could conceivably take; so, if is the disjoint union of all features in (seen as sets), the set of worlds is just , the powerset of - equivalently, the set of all functions from to .\n\nSo just consists of all things that could be conceivably distinguished by the features. If we need more discrimination than this - just add more features.\n\n## Environments\n\nThe set of environments is a subset of , the set of worlds (though it need not be defined via ; it's a set of functions from to ).\n\nThough this definition is still syntactic, it starts putting some restrictions on what the semantics could possibly be, in the spirit of this post.\n\nFor example, could restrict to situations where is a single valued function, while is allowed to be multivalued. And similarly, takes no defined values on anything in the domain of .\n\n## Probability\n\nThe simplest way of defining is as a probability distribution over .\n\nThis means that, if and are subsets of , we can define the conditional probability\n\nOnce we have such a probability distribution, then, if the set of features is rich enough, this puts a lot more restrictions on the meaning that these features could have, going a lot of the way towards semantics. For example, if captures the ideal gas laws, then there is a specific relation between temperature, pressure, volume, and amount of substance - whatever those features are labelled.\n\nIn general, we'd want to be expressible in a simple way from the set of features; that's the point of having those features in the first place.\n\nThe plan for this meta-formalism is to allow transition from imperfect models to other imperfect models. So requiring that they have a probability distribution over all of may be too much to ask.\n\nIn practice, all that is needed is expressions of the type . And these may not be needed for all , . For example, to go back to the ideal gas laws, it makes perfect sense that we can deduce temperature from the other three features. But what if just fixed the volume - can we deduce the pressure from that?\n\nWith as a prior over , we can, by getting the pressure and amount of substance from the prior. But many models don't include these priors, and there's no reason to avoid those.\n\nSo, in the more general case, instead of , define , so that, for all , the following probability is defined:\n\nTo insure consistency, we can require to follow axioms similar to the two-valued probabilities appendix *IV in Popper's \"Logic of Scientific Discovery\".\n\nIn full generality, we might need an even more general or imperfect definition of ; see this post for a definition of \"partial\" probability distributions. But I'll leave this aside for the moment, and assume the simpler case where is a distribution over .\n\n# Refinement\n\nHere we'll look at how one can improve a model. Obviously, one can get a better , or a more expansive , or a combination of these. Now, we haven't talked much about the quality of , and we'll leave this underdefined. Say that means that is 'at least as good as '. The 'at least as good' is specified by some mix of accuracy and simplicity.\n\nMore expansive means that the environment of the improvement can be bigger. But in order for something to be \"bigger\", we need some identification between the two environments (which, so far, have just been defined as subsets of the powerset of feature values).\n\nSo, let and be models, let be a subset of , and let be a surjective map from to (for an , think of , the preimage of , as the set of all environments in that correspond to ).\n\nWe can define on in the following manner: if and are subsets of , define\n\nThen defines as a refinement of if:\n\n• .\n\n## Refinement examples\n\nHere are some examples of different types of refinements:\n\n1. -improvement: , , (eg using the sine of the angle rather than the angle itself for refraction).\n2. Environment extension: , , with the identity, on (eg moving from a training environment to a more extensive test environment).\n3. Natural extension: environment extension where is simply defined in terms of on , and this extends to on (eg extending Newtonian mechanics from the Earth to the whole of the solar system).\n4. Non-independent feature extension: . Let be the map that takes an element of and maps it to by restricting to features in . Then on , and (eg adding electromagnetism to Newtonian mechanics).\n5. Independent feature extension: as a non-independent feature extension, but , and the stronger condition for that for any with (eg non-colliding planets modelled without rotation, changing to modelling them with (mild) rotation).\n6. Feature refinement: (moving from the ideal gas models to the van der Waals equation).\n7. Feature splintering: when there is no single natural projection that extends (eg Blegg and Rube generalisation, happiness and human smile coming apart, inertial mass in general relativity projected to Newtonian mechanics...)\n8. Reward function splintering: no single natural extension of the reward function on from to all of (any situation where a reward function, seen as a feature, splinters).\n\n# Reward function: refactoring and splintering\n\n## Reward function refactoring\n\nLet be a refinement of (via ), and let be a reward function defined on .\n\nA refactoring of on , is a reward function on such that for all , . A natural refactoring is an extension of is a refactoring that satisfies some naturalness or simplicity properties. For example, if is the momentum of an object in , and if momentum still makes sense in , then this should be a natural refactoring.\n\n## Reward function splintering\n\nIf there does not exist a unique natural refactoring of on , then the refinement from to splinters .\n\n## Feature splintering\n\nLet be the indicator function for a feature being equal to some element or in some range. If splinters in a refinement, then so does that feature.\n\n1. Note that is the set of all functions from to . Since , . Then we can project from to by restricting a function to its values on . ↩︎\n\nNew Comment"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93494904,"math_prob":0.94203794,"size":9008,"snap":"2021-21-2021-25","text_gpt3_token_len":1905,"char_repetition_ratio":0.13460684,"word_repetition_ratio":0.0076530613,"special_character_ratio":0.21170071,"punctuation_ratio":0.12897629,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95884985,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-13T13:31:44Z\",\"WARC-Record-ID\":\"<urn:uuid:5f471704-0ce0-405d-aad8-be4f6705556d>\",\"Content-Length\":\"742357\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d9969178-4f9a-464a-9d03-41a27d81eef6>\",\"WARC-Concurrent-To\":\"<urn:uuid:7eaea7dc-1fe7-44bb-b637-5615a9f67457>\",\"WARC-IP-Address\":\"3.219.245.218\",\"WARC-Target-URI\":\"https://www.lesswrong.com/posts/89qWCy6yi2eeFGsRu/technical-model-splintering-formalism\",\"WARC-Payload-Digest\":\"sha1:JAMVDAXCZUULXUDVX5REY6MO2LTW3YG6\",\"WARC-Block-Digest\":\"sha1:BOQBET62IVZR563YNWBFDYUZQ4MGAQ34\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989916.34_warc_CC-MAIN-20210513111525-20210513141525-00442.warc.gz\"}"} |
https://www.leandro-coelho.com/tag/mip/ | [
"How to: handle capacity constraints for different commodities measured in different units\n\nI have been working on a vehicle routing problem in which the truck transports several commodities, but these are measured in different units. Hence, we know the capacity of the truck for each of these commodities alone, but we don’t know how to convert them into one another so that we can load two commodities and still respect the capacity.\n\nHow to linearize max, min, and abs functions\n\nIn this post you will see how to linearize max functions, min functions, and absolute value functions. These can be expressed mathematically as:",
null,
"$X \\leq max(A, B)$",
null,
"$X \\geq min(A, B)$",
null,
"$X \\geq |A|$"
] | [
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.92659587,"math_prob":0.9834421,"size":551,"snap":"2019-43-2019-47","text_gpt3_token_len":113,"char_repetition_ratio":0.12614259,"word_repetition_ratio":0.0,"special_character_ratio":0.1923775,"punctuation_ratio":0.11214953,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99455076,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-15T23:48:34Z\",\"WARC-Record-ID\":\"<urn:uuid:23faa48f-f0cc-49b9-8de3-4bf4f411e282>\",\"Content-Length\":\"30181\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1357a9a9-3bc9-416a-9d9b-d99f3459a2ce>\",\"WARC-Concurrent-To\":\"<urn:uuid:d4be1819-6293-44cc-8799-d67c8f60dff0>\",\"WARC-IP-Address\":\"104.28.18.5\",\"WARC-Target-URI\":\"https://www.leandro-coelho.com/tag/mip/\",\"WARC-Payload-Digest\":\"sha1:IPCLTY24P2DBJAL5BID7AQ2J7DG63ELN\",\"WARC-Block-Digest\":\"sha1:PQJOR6Z7AABD6QFGXVWY2QNWEYRBGFUL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986660829.5_warc_CC-MAIN-20191015231925-20191016015425-00409.warc.gz\"}"} |
https://www.assignmenthelp.net/assignment_help/divisibility-rules-and-prime-numbers | [
"# Math Assignment Help With Divisibility Rules And Prime Numbers\n\n## Chapter 5. Divisibility Rules And Prime Numbers\n\nFind prime numbers between two numbers:\n\nEnter Number 1:\nEnter Number 2:\n\n5.1 Introduction: When a whole number is divisible by another number, remainder being zero, then the second number is called the factor of the first number. Divisibility is a method to determine whether the number is completely divisible by the other or not.\n\n### 5.2 Divisibility Rules:\n\n5.2.1 Divisibility by 2:\n\n• All even number i.e. all the numbers having an even number at units place is divisible by 2\n• Example: 0, 2, 4, 6, 8, 10, 12, 14, 22, 34, 56, etc.\n\n5.2.2 Divisibility by 3:\n\nFind prime factors of a number:\n\nEnter Number:\n\n• Add all the digits in a number.\n• If the sum is divisible by 3, the number is divisible by 3\n• Example: 345,\n\n3+4+5 = 12\n\nSince 12 is divisible by 3, the number 345 is also divisible by 3\n\n5.2.3 Divisibility by 4:\n\n• Check the last two digits of the number.\n• If the last two digits are divisible by 4, the number is divisible by 4.\n• Example: 4532\n\nLast two digits are; 32",
null,
"32/4 = 8\n\nRemainder = 0\n\nHence the number 4532 is divisible by 4.\n\n5.2.4 Divisibility by 5:\n\n• All the numbers ending with digits 5 and 0 are divisible by 5\n• Example: 375625\n\nThe last digit is 5, so the number is divisible by 5\n\n5.2.5 Divisibility by 6:\n\n• If the number is divisible by 2 and 3 both, the number is divisible by 6.\n• Example: 72\n\nThe number is divisible by 2 as the last digit is even.\n\nThe number is divisible by 3 also as 7+2 = 9\n\nAnd 9 is divisible by 3\n\nTherefore the number 72 is divisible 6\n\n5.2.6 Divisibility by 7:\n\n• Multiply the last digit by 2\n• Subtract the product from the rest of the number.\n• If the result is divisible by 7, the number is divisible by 7.\n• Example: 343\n\n3 x 2 -= 6\n\n34 – 6 = 28\n\n28 is divisible by 7, so the number 343 is divisible by 7\n\n5.2.7 Divisibility by 8:\n\n• If the last three digits of a number is divisible by 8, the number is divisible by 8.\n• Example: 3168\n\n168/8 = 21\n\nTherefore the number is divisible by 8\n\n5.2.8 Divisibility by 9:\n\n• Add all the digits in the number.\n• If the sum is divisible by 9, the number is also is divisible by 9.\n• Example: 342\n\n3+4+2 = 9\n\nTherefore the number is divisible by 9\n\n5.2.9 Divisibility by 10:\n\n• If the last digit of the number is 0 the number is divisible by 10\n• Example: 10, 20, 30, 40, 100, and so on\n\n5.2.10 Divisibility by 11:\n\n• Add the alternate digits of the number.\n• And the remaining set of alternate digits.\n• If both the sums are equal, the number is divisible by 11.\n\n### 5.3 Prime numbers:\n\n5.3.1 Introduction: a prime number is a natural number which has only two divisors, 1 and the number itself.\n\n2, 3,5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53 and so on.\n\nPrime numbers are whole numbers and are greater than1.\n\nTwin prime numbers are the numbers that differ by 2.\n\n(3,5), (5,7), (11,13)…. Etc.\n\n5.3.2 Co-prime numbers: A pair of numbers not having any common factors other than 1 or -1 are called co-prime number.\n\nExample: 11 and 25 are co-prime, because\n\nthe factors of 11 are 1 and 11\n\nand the factors of 25 are 1, 5and 25\n\nexcept 1 no other factor is common between them.\n\n5.3.3Prime Factorization: Prime Factorization is a method of finding the prime numbers you need to multiply together to get the original number.\n\nExample: What are the prime factors of 24?\n\nLet’s start from the smallest prime number, that is 2,\n\n24 / 2 = 12\n\nBut 12 is not a prime number, so factorize it further:\n\n12/ 2 = 6\n\n6 is also not a prime number, so factorize it further\n\n6/2 = 3\n\n3 is a prime number, so:\n\n24 = 2 x 2 x2x 3\n\nThe prime factorization of 12 is 2 x 2 x2 x 3, and it can also be written as 23x 3\n\nExample\n\nWhat is the prime factorization of 245?\n\nWe cannot divide 245 evenly by 2, so try the next prime number 3, this also not working so try the next one, i.e. 5:\n\n245/ 5 = 49\n\nFactorize 49, we find that 7 is the smallest prime number that works:\n\nNow, 7 is a prime number.\n\nSo the prime factorization of 245 is 5 x 7 x 7 or 5 x 72\n\n5.3.4 Least Common Multiple (L.C.M.): LCM of two natural numbers is the smallest natural number which is a multiple of both the numbers.\n\n5.3.5 Highest Common Factor (H.C.F.): HCF of two natural numbers is the largest common factor (or divisor) of the given natural numbers. In other words, H.C.F. is the greatest element of the set of common factors of the given numbers.\n\nH.C.F. is also called Greatest Common Divisor (G.C.D.)\n\n5.3.6 Relation between L.C.M. and H.C.F. of two natural numbers\n\nThe product of L.C.M. and H.C.F. of two natural numbers = the product of the numbers.\n\nNote.* In particular, if two natural numbers are co-prime then their L.C.M. = the product of the numbers.\n\n### 5.4 General Divisibility Rule for any prime divisor 'p' :\n\nConsider multiples of p. keep multiplying the prime divisor (n) by Multiple of p + 1 until the product reaches to the closest value of multiple of 10, so that one tenth of least multiple of p + 1 is a natural number.\n\nThus, n = one tenth of (least multiple of 'p' + 1).\n\nFind (p - n) also.\n\nConsider an Example:\n\nLet the prime divisor be 3.\n\nMultiples of 3 are 1x3, 2x3, 3x3\n\n3 x3 = 9\n\n9+1=10 is a multiple of 10\n\nSo 'n' for 3 is one tenth of (least multiple of p + 1) = (1/10)10 = 1\n\n'p-n' = 3-3 = 0\n\nExample (ii) :\n\nLet the prime divisor be 11.\n\nMultiples of 11 are 1x11, 2x11, 3 x11, 4x11, 5x11, 6x11, 7x11, 8x11, 9x11\n\n9x11= 99\n\n99+1=100, is a multiple of 10\n\nSo 'n' for 11 is one tenth of (least multiple of 'p' + 1) = (1/10)100 = 10\n\n'p-n' = 11 – 9= 2\n\n### Email Based Homework Help in Divisibility Rules And Prime Numbers\n\nTo Schedule a Divisibility Rules And Prime Numbers tutoring session"
] | [
null,
"https://www.assignmenthelp.net/images/assignment-help-order-now.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8978339,"math_prob":0.9993073,"size":4707,"snap":"2020-45-2020-50","text_gpt3_token_len":1477,"char_repetition_ratio":0.19030406,"word_repetition_ratio":0.056478404,"special_character_ratio":0.32865945,"punctuation_ratio":0.15822785,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997391,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-25T13:06:50Z\",\"WARC-Record-ID\":\"<urn:uuid:a41b5112-0b06-4d85-b02b-ae1030ed340b>\",\"Content-Length\":\"30831\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b723006d-db82-4a97-b307-8e97123eab55>\",\"WARC-Concurrent-To\":\"<urn:uuid:8edde9bc-3301-4529-9bbc-8412d02cb4cc>\",\"WARC-IP-Address\":\"192.163.209.69\",\"WARC-Target-URI\":\"https://www.assignmenthelp.net/assignment_help/divisibility-rules-and-prime-numbers\",\"WARC-Payload-Digest\":\"sha1:T2MKHFL2BX3ZEEL3U4MNEZRAUGMBXSR5\",\"WARC-Block-Digest\":\"sha1:R2NS6XMGVCKCPIXX5BE4KK2DD2547HLM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141182794.28_warc_CC-MAIN-20201125125427-20201125155427-00097.warc.gz\"}"} |
https://afgrow.net/applications/DTDHandbook/Sections/page7_4_1_3.aspx | [
"• DTDHandbook\n• Contact\n• Contributors\n• Sections\n• 1. Introduction\n• 2. Fundamentals of Damage Tolerance\n• 3. Damage Size Characterizations\n• 4. Residual Strength\n• 5. Analysis Of Damage Growth\n• 6. Examples of Damage Tolerant Analyses\n• 7. Damage Tolerance Testing\n• 0. Damage Tolerance Testing\n• 1. Introduction\n• 2. Material Tests\n• 3. Quality Control Testing\n• 4. Analysis Verification Testing\n• 0. Analysis Verification Testing\n• 1. Structural Parameter Verification Techniques\n• 0. Structural Parameter Verification Techniques\n• 1. Compliance\n• 2. Moiré Fringe\n• 3. Photoelasticity\n• 4. Crack Growth Rate\n• 2. Residual Strength Methods-Verification\n• 3. Crack Growth Modeling-Verification\n• 5. Structural Hardware Tests\n• 6. References\n• 8. Force Management and Sustainment Engineering\n• 9. Structural Repairs\n• 10. Guidelines for Damage Tolerance Design and Fracture Control Planning\n• 11. Summary of Stress Intensity Factor Information\n• Examples\n\n# Section 7.4.1.3. Photoelasticity\n\nPhotoelastic techniques are based on the bi-refringent characteristics exhibited by transparent plastic materials of specific tailored compounds of plexiglas, polycarbonate, and epoxy resins. These plastics, under load, develop an isochromatic fringe pattern that can be directly related to the maximum shear stresses in the geometry being analyzed. The photoelastic materials can be selected to match with the expected elongation of the substrate material. In Table 7.4.1, the photoelastic test materials are bracketed into three levels by expected elongation range. The maximum measurable strain for a particular photoelastic coating depends upon its stress-strain curve and the linearity of photoelastic behavior.\n\nTable 7.4.1. Coating Selection for Elongation Levels\n\n Coating Material Maximum Elongation Typical Application PS-1 PS-8 PL-1 PL-8 5% 3% 3% 3% Testing on metals, concrete, glass, and hard plastics in the elastic and elastoplastic ranges PS-3 PL-2 PL-3 PS-4 30% 50% >50% >40% Testing on soft materials such as rubber, plastics and wood PS-6 >100% Testing on soft materials such as rubber, plastics and wood\n\nChart courtesy of Vishay Measurements Group, Inc.\n\nThe bi-refringent sensitivity is another important factor to consider when choosing a photoelastic coating [Vishay Measurements Group, Inc., 2001]. The overall sensitivity of the strain measurement system depends on:\n\n· The sensitivity of the coating is expressed by the fringe value, f. The fringe value represents the difference in principle strains, or the maximum shear strain, required to produce one fringe. The lower this parameter, the more sensitive the coating,\n\n· The sensitivity of the polariscope system for examining the photoelastic pattern and determining the fringe order, N.\n\nThe primary difference between the approach used for two- and three-dimensional work is that two-dimensional models can be directly analyzed under load whereas the three-dimensional model must be reduced to a two-dimensional model before the crack tip fringe information can be recovered. To obtain the fringe results from the three-dimensional model, the isochromatic fringe pattern must first be frozen in place while the model is under load; the stress freezing is accomplished through a thermal treatment that takes the material above a critical temperature for a hold-time period which is followed by a slow cooling. Subsequent to the stress freezing operation, the three-dimensional model is sliced up to obtain a two-dimensional slice that contains the crack segment of interest. This two-dimensional slice is then interrogated with normal photoelastic equipment (polariscope) to recover the imbedded fringe information.\n\nA new development for building 3-D structural models is by using stereolithography (SLA). [TECH, Inc. 2001] SLA is a rapid prototyping process by which a product is created using an ultra-violet (UV) curable liquid resin polymer and advanced laser technology. Using a CAD package such as Pro/Engineer, SolidWorks, or other solid modeling software, a 3-D solid model is exported from the CAD package as an .stl file. The .stl file is then converted into thin layers. The sliced model, in layers, is then sent to the SLA machine. The SLA machine uses its laser to cure the shape of the 3-D CAD model on a platform in the vat of resin from the bottom up, one layer at a time. As each layer is cured, the platform is lowered the thickness of one layer so that when the part is completely built, it is entirely submerged in the vat. Stereolithography is capable of creating the most complex geometries quickly and precisely.",
null,
"Figure 7.4.1. Stereolithography process diagram (Courtesy of TECH, Inc.)\n\nThe analysis of crack tip fringe information is the same for both the two- and three-dimensional models. For Mode 1 loading, the stress-intensity factor (K) is obtained using:",
null,
"(7.4.4)\n\nwhere so is an unknown pseudo-boundary stress, r is the distance directly above the crack tip on an axis perpendicular to the crack path, and tmax is the maximum shear stress obtained from the stress-optic law",
null,
"(7.4.5)\n\nwith n the photoelastic fringe order, f the material fringe value, and B the thickness of the two-dimensional model or slice. The shear stress (tmax) is typically analyzed using a truncated Taylor series that describes the behavior in the crack tip region, i.e.",
null,
"(7.4.6)\n\nwhere Smith suggests N is chosen to be the lowest possible number that results in Equation 7.4.6 providing a good fit to the shear stress data. Figures 7.4.2 and 7.4.3 illustrate the two basic steps used in determining the stress-intensity factor from photoelastic experiments [Smith, 1975]. For both three-dimensional surface crack models considered, the thin two-dimensional slice that was analyzed for the crack-tip fringe pattern was taken through the point p. The slice was perpendicular to the crack plane and oriented so that the slice was through the thickness; thus the slice had the appearance of a single edge cracked geometry.\n\nFigure 7.4.2 describes the shear stress distribution (points) and the corresponding least-squares derived truncated Taylor series expansion (curve) for the two surface crack geometries considered. Figure 7.4.3 illustrates how Equation 7.4.6 and 7.4.4 are combined to extrapolate the photoelastic data to the crack tip. Figure 7.4.3 portrays the stress-intensity factor based on photoelastic data (KAP) as the ratio of the photoelastic result to the preexisting theoretical result. Note that the photoelastic result is calculated from Equation 7.4.4 where the pseudo boundary stress (so) is taken as zero. This stress is accounted for through the N=0 term of Equation 7.4.6. The curves in Figure 7.4.3 are based on the truncated Taylor series solutions obtained from the data in Figure 7.4.2. In both cases shown, the extrapolations lead to reasonable estimates of the theoretical results and are somewhat typical of what one might expect from photoelastic estimates of the stress-intensity factor.",
null,
"Figure 7.4.2. Typical Maximum Shear Stress Data Modeled with a Truncated Taylor Series Equation [Smith, 1975]",
null,
"Figure 7.4.3. Extrapolation of Equation 7.4.4 Based on the Truncated Taylor Series Equation Results Presented in Figure 7.4.2 [Smith, 1975]"
] | [
null,
"https://afgrow.net/applications/DTDHandbook/Sections/images/page7_4_1_3/image001.gif",
null,
"https://afgrow.net/applications/DTDHandbook/Sections/images/page7_4_1_3/image003.gif",
null,
"https://afgrow.net/applications/DTDHandbook/Sections/images/page7_4_1_3/image005.gif",
null,
"https://afgrow.net/applications/DTDHandbook/Sections/images/page7_4_1_3/image007.gif",
null,
"https://afgrow.net/applications/DTDHandbook/Sections/images/page7_4_1_3/image009.gif",
null,
"https://afgrow.net/applications/DTDHandbook/Sections/images/page7_4_1_3/image011.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87077945,"math_prob":0.91957736,"size":6284,"snap":"2022-40-2023-06","text_gpt3_token_len":1510,"char_repetition_ratio":0.12993631,"word_repetition_ratio":0.016393442,"special_character_ratio":0.21403565,"punctuation_ratio":0.11525424,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.960866,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,5,null,5,null,5,null,5,null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-06T12:52:42Z\",\"WARC-Record-ID\":\"<urn:uuid:49197baa-3b15-487e-81c5-dcc45bdf4e59>\",\"Content-Length\":\"304514\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:748b9645-18b4-4e09-b9c9-a7080aca396c>\",\"WARC-Concurrent-To\":\"<urn:uuid:fcfab4d5-6e55-4bd2-a6a5-04d4a308b52f>\",\"WARC-IP-Address\":\"65.110.71.67\",\"WARC-Target-URI\":\"https://afgrow.net/applications/DTDHandbook/Sections/page7_4_1_3.aspx\",\"WARC-Payload-Digest\":\"sha1:SJU54BNEVHPBCTETXOZ6MWEIJ6YKRB2L\",\"WARC-Block-Digest\":\"sha1:TLWG55FM4QRBVWKTT3HU4JLCYCDYC3KM\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337836.93_warc_CC-MAIN-20221006124156-20221006154156-00431.warc.gz\"}"} |
http://wmegala.com/what-should-math-essays-contain/ | [
"# Blog\n\n## What Should Math Essays Contain\n\nMath Essays are very different from other college essays. When it comes to essays on math you have to focus on different approaches to problem solving. These essays can be written for any essay length, from a short 250 word essayto a long 1000 word essay. Essays on math need to contain illustrations of numbers, data, different formulas as well as analytical models. For this reason most students find writing such essay very boring and difficult. In order to write such essays you may need to even possess both, theoretical and practical knowledge of various mathematical tools in order to solve mathematical problems.\n\nIn order to write an essay on math, you need to have a mathematical problem. After this you need to focus on providing an answer to this problem. This may feel a little strange due to the fact that the majority of narrative writing does not concentrate on providing answers till the end of the essay. As you can see, this is not the case when it comes to writing essays on math. On the contrary, the most important part of a essay on math is the answer. It is also very important that you explain the manner in which you reached the solution. Although such essays have a lot to do with the mathematics subject, you need to concentrate on other essay areas as well. Ensure that your information is correct and review your essay to make sure there are no style, format or grammar errors. Naturally there must be no plagiarism in your essay.\n\nThere are a number of topics that you could write your Math Essay on. You should research essay topics on algebra, geometry, trigonometry, calculus and even physics. Algebra is a mathematical field where you need to solve problems in order to find unknown numbers. When you write an essay on algebra you can just write about the way to effectively solve quadratic problems and linear equations.\n\nGeometry is a mathematical area that has to do with earthly line and point measures. When you write a technology essay you need to write about these principals as they are related to object measurement. Another area of mathematics is known as trigonometry. The principle of trigonometry has been borrowed by triangle measurements. Those who write on this topic are able to write essays that explain the reasons why triangles are the most frequently regarded shape in the numerical world. Calculus is another topic that you can write a Math Essay on. This topic was invented by Isaac Newton and is a good topic to base a history essay on. An essay on this topic could be based on how Newton was able to use the principles of Calculus in modern physics.\n\nIf you need additional help to write Math Essays you could look for more resources via the Internet or the library. There are plenty of helpful books and sites that can provide you with relevant information. You could also consider getting help from an essay writing service."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9579569,"math_prob":0.80798733,"size":2974,"snap":"2022-05-2022-21","text_gpt3_token_len":579,"char_repetition_ratio":0.13468014,"word_repetition_ratio":0.0,"special_character_ratio":0.19166106,"punctuation_ratio":0.07801419,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9748612,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-21T11:46:53Z\",\"WARC-Record-ID\":\"<urn:uuid:0c7b306b-d1d4-42c6-a2e4-432141e81dc9>\",\"Content-Length\":\"50693\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e109d016-a0b1-4455-b701-cc80cf77cc28>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc17579f-2169-426f-bcb4-e8fb8c706243>\",\"WARC-IP-Address\":\"104.21.1.150\",\"WARC-Target-URI\":\"http://wmegala.com/what-should-math-essays-contain/\",\"WARC-Payload-Digest\":\"sha1:TCG55563S36PUAE7WKDBLVF2FDXWAAQB\",\"WARC-Block-Digest\":\"sha1:IGEOXZTCDYQIKYTEBAQCADVYTYJPA3KI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662539101.40_warc_CC-MAIN-20220521112022-20220521142022-00653.warc.gz\"}"} |
https://physics.stackexchange.com/questions/474301/phase-difference-in-a-standing-wave | [
"# Phase difference in a standing wave?\n\nWhat would the phase difference between P and Q be? I assumed that because they are 1/4 of a wavelength apart, it would be Pi/2, but supposedly the difference is 0.",
null,
"• The phase difference is zero. – KV18 Apr 22 at 9:22\n• @KV18 but why is that? – Olly Scargill Apr 22 at 9:23\n• Have a look at this simulation and observe what is happening to the particles between nodes. – Farcher Apr 22 at 9:28\n\nBoth $$P$$ and $$Q$$ have the same amplitudes at the same time. That is because the combining waves have no phase difference between them at that point."
] | [
null,
"https://i.stack.imgur.com/YX400.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9248185,"math_prob":0.96968085,"size":812,"snap":"2019-26-2019-30","text_gpt3_token_len":235,"char_repetition_ratio":0.17450495,"word_repetition_ratio":0.043165468,"special_character_ratio":0.29310346,"punctuation_ratio":0.090322584,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96592927,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-17T06:23:55Z\",\"WARC-Record-ID\":\"<urn:uuid:ce571d25-167b-4e5e-a77c-cbb922783c0d>\",\"Content-Length\":\"141676\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9e301ed5-4dbb-4713-91b6-2c583958939a>\",\"WARC-Concurrent-To\":\"<urn:uuid:eabb61e5-f237-4d51-a337-3f7d8f7b4ad3>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://physics.stackexchange.com/questions/474301/phase-difference-in-a-standing-wave\",\"WARC-Payload-Digest\":\"sha1:VAEGQ45TCFJCT7VACMLVYBJM2U5WL374\",\"WARC-Block-Digest\":\"sha1:ZQV4N6GC3AGXZNFIGDRFBCD7ZQHTBR7P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525094.53_warc_CC-MAIN-20190717061451-20190717083451-00226.warc.gz\"}"} |
https://cforall.uwaterloo.ca/trac/changeset/271326e0efd6eaa58c0a4ac7c271e01b93e825ff/doc/papers | [
"# Changeset 271326e for doc/papers\n\nIgnore:\nTimestamp:\nFeb 15, 2018, 4:00:40 PM (6 years ago)\nBranches:\nADT, aaron-thesis, arm-eh, ast-experimental, cleanup-dtors, deferred_resn, demangler, enum, forall-pointer-decay, jacob/cs343-translation, jenkins-sandbox, master, new-ast, new-ast-unique-expr, new-env, no_list, persistent-indexer, pthread-emulation, qualifiedEnum, resolv-new, with_gc\nChildren:\n359f29f\nParents:\nd27e340\nMessage:\n\n rd27e340 \\section{Introduction and Background} \\section{Introduction} The C programming language is a foundational technology for modern computing with millions of lines of code implementing everything from commercial operating-systems to hobby projects. The new constructs are empirically compared with both standard C and \\CC; the results show the new design is comparable in performance. \\subsection{Polymorphic Functions} \\section{Polymorphic Functions} \\CFA introduces both ad-hoc and parametric polymorphism to C, with a design originally formalized by Ditchfield~\\cite{Ditchfield92}, and first implemented by Bilson~\\cite{Bilson03}. \\subsection{Name Overloading} C already has a limited form of ad-hoc polymorphism in the form of its basic arithmetic operators, which apply to a variety of different types using identical syntax. \\CFA extends the built-in operator overloading by allowing users to define overloads for any function, not just operators, and even any variable; Section~\\ref{sec:libraries} includes a number of examples of how this overloading simplifies \\CFA programming relative to C. Code generation for these overloaded functions and variables is implemented by the usual approach of mangling the identifier names to include a representation of their type, while \\CFA decides which overload to apply based on the same usual arithmetic conversions'' used in C to disambiguate operator overloads. As an example: \\begin{cfa} int max(int a, int b) { return a < b ? b : a; } // (1) double max(double a, double b) { return a < b ? b : a; } // (2) int max = INT_MAX; // (3) double max = DBL_MAX; // (4) max(7, -max); $\\C{// uses (1) and (3), by matching int from constant 7}$ max(max, 3.14); $\\C{// uses (2) and (4), by matching double from constant 3.14}$ //max(max, -max); $\\C{// ERROR: ambiguous}$ int m = max(max, -max); $\\C{// uses (1) once and (3) twice, by matching return type}$ \\end{cfa} \\Celeven did add @_Generic@ expressions, which can be used in preprocessor macros to provide a form of ad-hoc polymorphism; however, this polymorphism is both functionally and ergonomically inferior to \\CFA name overloading. The macro wrapping the generic expression imposes some limitations; as an example, it could not implement the example above, because the variables @max@ would collide with the functions @max@. Ergonomic limitations of @_Generic@ include the necessity to put a fixed list of supported types in a single place and manually dispatch to appropriate overloads, as well as possible namespace pollution from the functions dispatched to, which must all have distinct names. \\subsection{\\texorpdfstring{\\LstKeywordStyle{forall} Functions}{forall Functions}} \\label{sec:poly-fns} \\CFA{}\\hspace{1pt}'s polymorphism was originally formalized by Ditchfield~\\cite{Ditchfield92}, and first implemented by Bilson~\\cite{Bilson03}. The signature feature of \\CFA is parametric-polymorphic functions~\\cite{forceone:impl,Cormack90,Duggan96} with functions generalized using a @forall@ clause (giving the language its name): \\begin{lstlisting} Hence, programmers can easily form local environments, adding and modifying appropriate functions, to maximize reuse of other existing functions and types. Finally, \\CFA allows variable overloading: \\begin{lstlisting} short int MAX = ...; int MAX = ...; double MAX = ...; short int s = MAX; int i = MAX; double d = MAX; $\\C{// select correct MAX}$ \\end{lstlisting} Here, the single name @MAX@ replaces all the C type-specific names: @SHRT_MAX@, @INT_MAX@, @DBL_MAX@. %% Redundant with Section~\\ref{sec:libraries} %% % Finally, \\CFA allows variable overloading: % \\begin{lstlisting} % short int MAX = ...; int MAX = ...; double MAX = ...; % short int s = MAX; int i = MAX; double d = MAX; $\\C{// select correct MAX}$ % \\end{lstlisting} % Here, the single name @MAX@ replaces all the C type-specific names: @SHRT_MAX@, @INT_MAX@, @DBL_MAX@. \\subsection{Traits} \\end{cfa} \\subsection{Exception Handling ???} % \\subsection{Exception Handling ???} \\section{Declarations} \\section{Libraries} \\label{sec:libraries} As stated in Section~\\ref{sec:poly-fns}, \\CFA inherits a large corpus of library code, where other programming languages must rewrite or provide fragile inter-language communication with C."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6669105,"math_prob":0.89393526,"size":5284,"snap":"2023-40-2023-50","text_gpt3_token_len":1475,"char_repetition_ratio":0.09791667,"word_repetition_ratio":0.1185567,"special_character_ratio":0.31434518,"punctuation_ratio":0.15794979,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95955366,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-05T14:58:47Z\",\"WARC-Record-ID\":\"<urn:uuid:a2360961-092a-46b3-aa84-dec1ab8cbf38>\",\"Content-Length\":\"31733\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f1230e5-c1a5-42bf-b599-dea1eecf1baf>\",\"WARC-Concurrent-To\":\"<urn:uuid:347b42ab-dfe3-4896-bb43-886def496751>\",\"WARC-IP-Address\":\"129.97.186.80\",\"WARC-Target-URI\":\"https://cforall.uwaterloo.ca/trac/changeset/271326e0efd6eaa58c0a4ac7c271e01b93e825ff/doc/papers\",\"WARC-Payload-Digest\":\"sha1:CUNNV2ZUROC7JLLTLXY554HYC5R3IRGK\",\"WARC-Block-Digest\":\"sha1:ERIZH3BQ2AX2F4YGXX47UFEYI6724PTR\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100551.2_warc_CC-MAIN-20231205140836-20231205170836-00452.warc.gz\"}"} |
https://www.jpost.com/opinion/the-start-of-an-iranian-intifada | [
"(function (a, d, o, r, i, c, u, p, w, m) { m = d.getElementsByTagName(o), a[c] = a[c] || {}, a[c].trigger = a[c].trigger || function () { (a[c].trigger.arg = a[c].trigger.arg || []).push(arguments)}, a[c].on = a[c].on || function () {(a[c].on.arg = a[c].on.arg || []).push(arguments)}, a[c].off = a[c].off || function () {(a[c].off.arg = a[c].off.arg || []).push(arguments) }, w = d.createElement(o), w.id = i, w.src = r, w.async = 1, w.setAttribute(p, u), m.parentNode.insertBefore(w, m), w = null} )(window, document, \"script\", \"https://95662602.adoric-om.com/adoric.js\", \"Adoric_Script\", \"adoric\",\"9cc40a7455aa779b8031bd738f77ccf1\", \"data-key\");\nvar domain=window.location.hostname; var params_totm = \"\"; (new URLSearchParams(window.location.search)).forEach(function(value, key) {if (key.startsWith('totm')) { params_totm = params_totm +\"&\"+key.replace('totm','')+\"=\"+value}}); var rand=Math.floor(10*Math.random()); var script=document.createElement(\"script\"); script.src=`https://stag-core.tfla.xyz/pre_onetag?pub_id=34&domain=\\${domain}&rand=\\${rand}&min_ugl=0\\${params_totm}`; document.head.append(script);"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.97509855,"math_prob":0.96919554,"size":5508,"snap":"2023-40-2023-50","text_gpt3_token_len":1119,"char_repetition_ratio":0.102107555,"word_repetition_ratio":0.0,"special_character_ratio":0.18373275,"punctuation_ratio":0.096114516,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9789482,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T01:01:02Z\",\"WARC-Record-ID\":\"<urn:uuid:644b7230-9521-4746-b780-f133c9a742d2>\",\"Content-Length\":\"89028\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6afe7a5e-7ed3-44f1-b2d0-20b616d05466>\",\"WARC-Concurrent-To\":\"<urn:uuid:ae770135-0a41-4e2b-b500-3e1a247f5876>\",\"WARC-IP-Address\":\"159.60.130.79\",\"WARC-Target-URI\":\"https://www.jpost.com/opinion/the-start-of-an-iranian-intifada\",\"WARC-Payload-Digest\":\"sha1:NSW3CF3U2YGN36DTPQWKOERBLCKCFJN3\",\"WARC-Block-Digest\":\"sha1:OHUZEAZ7UBNUYX2PLPXAMWFFD563WV75\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511023.76_warc_CC-MAIN-20231002232712-20231003022712-00222.warc.gz\"}"} |
https://www.systutorials.com/docs/linux/man/3-ncl_c_csa2ls/ | [
"# ncl_c_csa2ls (3) - Linux Man Pages\n\n## NAME\n\nc_csa2ls - cubic spline approximation, simple entry for two-dimensional input, list output\n\n## FUNCTION PROTOTYPE\n\n```float *c_csa2ls(int, float [], float [], float [], int [],\nint, float [], float [], int *);\n```\n\n## SYNOPSIS\n\n```int c_csa2ls(int n, float xi[], float yi[], float zi[], int knots,\nint no, float xo[], float yo[], int *ier);\n```\n\n## DESCRIPTION\n\nn\n(integer,input) The number of input data points. It must be that n is greater than 3 and, depending on the size of knots below, n may have to be larger.\nxi\n(real, input) An array dimensioned for n containing the X coordinate values for the input function.\nyi\n(real, input) An array dimensioned for n containing the Y coordinate values for the input function.\nzi\n(real, input) An array containing the functional values of the input function -- zi[k] is the functional value at (xi[k], yi[k]) for k=0,n-1.\nknots\n(integer, input) The number of knots to be used in constructing the approximation spline. knots and knots must be at least 4. The larger the value for knots, the closer the approximated curve will come to passing through the input function values.\nno\n(integer, input) The number of X - Y coordinate values to be calculated for the output array.\nxo\n(real, input) An array dimensioned for no containing the X coordinates of the output list.\nyo\n(real, output) An array dimensioned for no containing the Y coordinates of the output list.\nier\n(pointer to integer, output) An error return value. If *ier is returned as 0, then no errors were detected. If *ier is non-zero, then refer to the error list in the error table for details.\n\n## USAGE\n\nc_csa2ls is called to find values of an approximating cubic spline at specified two-dimensional coordinates. If you want to weight the input data values, calculate derivatives, or handle data sparse areas specially, then you will need to use c_csa2lxs.\n\nc_csa2ls returns a pointer to a linear array of data that contains the approximated values calculated at the input list of coordinate values. That is, if out is declared as\n\n``` float *out;\n```\n\nand we set:\n\n``` out = c_csa2ls(n, x, y, z, knots, no, xo, yo, &ier);\n```\n\nthen out[i] is the approximated function value at coordinate point (xo[i], yo[i]) for 0 <= i < no. The space for out is allocated internal to c_csa2ls and is no floats in size.\n\n## ACCESS\n\nTo use c_csa2ls, load the NCAR Graphics library ngmath."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6517672,"math_prob":0.9913945,"size":2794,"snap":"2023-14-2023-23","text_gpt3_token_len":726,"char_repetition_ratio":0.13978495,"word_repetition_ratio":0.10845987,"special_character_ratio":0.25447387,"punctuation_ratio":0.15384616,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99641603,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-22T13:37:50Z\",\"WARC-Record-ID\":\"<urn:uuid:fc480d82-b557-4c69-813d-406d592fa17e>\",\"Content-Length\":\"28631\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:70645436-4558-4a93-8139-70c3922ac750>\",\"WARC-Concurrent-To\":\"<urn:uuid:0d5e2a94-2bb6-4a51-8cc6-4dde525d8091>\",\"WARC-IP-Address\":\"172.67.167.219\",\"WARC-Target-URI\":\"https://www.systutorials.com/docs/linux/man/3-ncl_c_csa2ls/\",\"WARC-Payload-Digest\":\"sha1:5EGEF6L7E6GCPLGAYO7PNJOQBBJNYOKL\",\"WARC-Block-Digest\":\"sha1:VW7JWXNYP5KY2CJQPQANUWXYFVYJFLTS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296943809.76_warc_CC-MAIN-20230322114226-20230322144226-00562.warc.gz\"}"} |
https://codereview.stackexchange.com/questions/144753/convert-and-print-celsius-to-fahrenheit-from-certain-range-of-values | [
"# Convert and print Celsius to Fahrenheit from certain range of values\n\nI just started learning C, and got to the \"for loops\"—where an exercise is given to convert Celsius to Fahrenheit ( from -50 to 1000 with a step of 20 ), and print the values. I decided to play with it by adding different steps when certain values are reached.\n\nI do have some programming experience ( Python/Java/JavaScript ) but it's all in beginner level scope.My concern is that i could have used one loop and check each (bp) with a condition... or maybe use module operator to determine a step change ... or something third. I need an expert opinion on the code i wrote.\n\nIs this a good approach for this particular problem?\n\nIs this considered bad or good practice?If bad what would you change and why?\n\nWould you (assuming as an expert) go with this or other way ? If other, why ?\n\n#include <stdio.h>\n\nint main(){\n\nfloat fahr, cels, step, min, max;\n\nfloat count = {10,1,10,100};\nfloat bp = {-50,-10, 10, 100};\n\nsize_t bp_size, st_size;\nint c,c2;\n\nbp_size = *(&bp + 1) - bp;\nst_size = *(&count + 1) - count;\n\nmin = -50; max = 1000;\nstep = count;\nc2 = 0;\n\nfor (cels = min; cels <= max; cels += step){\n\nfahr = cels * 1.8 + 32;\nprintf(\"%4.0f C\\t= %6.1f F\\n\", cels, fahr);\n\nfor(c = 0; c < bp_size; c++){\nif (cels == bp[c]){\nif (c2 == st_size){ c2 = 0;}\nstep = count[c2];\nc2++;\n}\n}\n}\n}\n\n\nThe program works correctly, but there are a number of things you might be able to improve here. Here are some observations in no particular order.\n\n## Reduce the number of variables\n\nThere are a lot of variables here, which makes it a bit difficult to read and understand the program. Some of the suggestions below will show some ways to reduce that number and add more clarity to the program.\n\n## Use const where practical\n\nA number of places in the code should have the const keyword added. For example instead of this:\n\nfloat count = {10,1,10,100};\nfloat bp = {-50,-10, 10, 100};\n\n\nwrite this:\n\nconst float count = {10,1,10,100};\nconst float bp = {-50,-10, 10, 100};\n\n\nThis indicates, both to the compiler and to human readers of the code, that these values will not be altered.\n\n## Use more meaningful variable names\n\nThe variable names step, min and max are useful and descriptive of what those variables actually do. However, count and bp are not very good names. I'd suggest calling them something more closely related to their function as with the following suggestion.\n\n## Consider using a struct\n\nThe count and bp values are closely related, but this is not clearly indicated in the code. It would be easier to understand, I think, if a structure were used instead:\n\nstruct {\nfloat startTemp;\nfloat stepSize;\n} const limits[] = {\n{ -50, 10 },\n{ -10, 1 },\n{ 10, 10 },\n{ 100, 100 },\n{1000, 0 },\n};\n\n\nNote that the minimum and maximum values are built into the table so there isn't any need for additional variables for those uses.\n\n## Declare variables in the smallest practical scope\n\nBy declaring variables in the smallest practical scope, you reduce the chance for name collisions and make it clear to the reader of your code where variables are and are not needed. With any C compiler conforming to the 1999 specification (which should be all of them at this point!) one could rewrite the outer for loop like this:\n\nfor (float cels = min; cels <= max; cels += step) {\nfloat fahr = cels * 1.8 + 32;\n/* etc.*/\n}\n\n\n## Initialize variables when they are declared\n\nIf you follow the advice above about reducing the scope of variables, you can also easily initialize variables when they are declared. This helps to make sure that variables aren't used with uninitialized values.\n\n## Declare each variable on its own line\n\nDeclaring variables like this:\n\nfloat fahr, cels, step, min, max;\n\n\nis not good current practice. Instead, declare one variable per line and initialize it.\n\n## Use the sizeof operator\n\nThese two lines are quite peculiar:\n\nbp_size = *(&bp + 1) - bp;\nst_size = *(&count + 1) - count;\n\n\nA better way to find the size of such arrays would be this:\n\nsize_t bp_size = sizeof(bp);\n\n\n## Don't test floating point numbers for equality\n\nOne of the lines in the current code is this:\n\nif (cels == bp[c]){\n\n\nIt will probably work just fine in this context, but generally, one should avoid testing floating point numbers for equality. It's usually a better bet to test instead for < or <=. See this question for more details.\n\n## Put if and for code on separate line(s)\n\nThe code contains this line:\n\nif (c2 == st_size){ c2 = 0;}\n\n\nIt's not technically wrong and the compiler will accept it, but it's too easy for a human reader to overlook the contents of the if when it's hiding at the end of the same line. Prefer instead to write it like this:\n\nif (c2 == st_size) {\nc2 = 0;\n}\n\n\nIn this code, the outer loop seems clear enough, but the inner loop is not. The point of it is to determine what step size to use but the code to do this is more complex than it needs to be:\n\nfor(c = 0; c < bp_size; c++){\nif (cels == bp[c]){\nif (c2 == st_size){ c2 = 0;}\nstep = count[c2];\nc2++;\n}\n}\n\n\nFirst, we could just keep track of the step size as we go instead of searching for it each time. Second, once the step size is found, there's no reason to continue through the rest of the loop.\n\nHere's an alternative implementation that uses all of these ideas:\n\nint main(){\nstruct {\nfloat startTemp;\nfloat stepSize;\n} const limits[] = {\n{ -50, 10 },\n{ -10, 1 },\n{ 10, 10 },\n{ 100, 100 },\n{1100, 0 },\n};\n\nfor (int i=0; limits[i].stepSize != 0; ++i) {\nfor (float cels = limits[i].startTemp;\ncels < limits[i+1].startTemp;\ncels += limits[i].stepSize)\n{\nfloat fahr = cels * 1.8 + 32;\nprintf(\"%4.0f C\\t= %6.1f F\\n\", cels, fahr);\n}\n\n}\n}\n\n\nNote that the last item in the list is 1100 degrees rather than 1000. This is done because we want to include the value of 1000 in the list.\n\n• Even though stackexchange points that i should use comments for different reasons, i have to thank you for this detailed elaboration.It breaks the code and gives specifics answers that i can use to improve my coding skills ... So big THANKS!!!! Up voted and ascepted. Oct 20, 2016 at 14:40"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8661598,"math_prob":0.97936505,"size":4425,"snap":"2023-40-2023-50","text_gpt3_token_len":1147,"char_repetition_ratio":0.11467994,"word_repetition_ratio":0.08343558,"special_character_ratio":0.2917514,"punctuation_ratio":0.14895947,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9820661,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T06:17:04Z\",\"WARC-Record-ID\":\"<urn:uuid:944739dd-02d7-4dea-89d1-4ea734a9c17c>\",\"Content-Length\":\"163231\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a5b1f146-ff49-4130-915b-4996e807c647>\",\"WARC-Concurrent-To\":\"<urn:uuid:a6213254-abfd-40be-a532-6748bf83fe0d>\",\"WARC-IP-Address\":\"104.18.10.86\",\"WARC-Target-URI\":\"https://codereview.stackexchange.com/questions/144753/convert-and-print-celsius-to-fahrenheit-from-certain-range-of-values\",\"WARC-Payload-Digest\":\"sha1:FCD6HDS6DVZIKLNBW5M4GAIHRIYCOFEY\",\"WARC-Block-Digest\":\"sha1:VR6FSXJDTBSK62WF7UBAPF7GKYNPWESO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506623.27_warc_CC-MAIN-20230924055210-20230924085210-00037.warc.gz\"}"} |
https://sarick.me/2017/04/21/creating-a-brand-recommender-using-implicit-matrix-factorization/ | [
"# Creating a Brand Recommender Using Implicit Matrix Factorization",
null,
"I wanted to try my hand at building a recommendation system and have outlined the steps I took to do so. The data I worked with was in the following format:",
null,
"Where the shopping_profile_id refers to the profile of a user that could have purchased multiple brands.I utilised a technique called Alternating Least Squares which is appropriate for a recommender system since we only have purchase data and no ratings. It takes a large matrix of user/item interactions and tries to find the hidden features that relate the products to each other through matrix factorisation which are represented through confidence levels on preferences. Unseen items are weighted negatively with low confidence while items that are seen are treated as positive with high confidence. Finally, ALS minimises a sum of squares errors loss function which is weighted by the previously determined confidence values. The beauty of ALS is that the optimisation problem is turned into a quadratic one by alternating fixed user and brand values. This allows for easy optimisation through stochastic gradient descent. To read more about how ALS works, I have linked the paper titled “Collaborative Filtering for Implicit Feedback Datasets” here. With that let’s get started…\n\n```import pandas as pd\nimport numpy as np\nimport scipy\nfrom scipy.sparse import coo_matrix\nimport implicit\n\npath = 'brands_filtered.txt'\n```\n\nI used the implicit package to implement the recommendation system. Below, I set up a ‘values’ column which assigns a 1 for each purchase of a brand by a user. Since there are many data points, I built a sparse matrix with coo_matrix which doesn’t take up much memory.\n\n```def create_sparse(dataframe):\ndataframe['values'] = 1\nshopping_profile_id_u = list(np.sort(dataframe.shopping_profile_id.unique())) #Create sorted profile list\nbrand_id_u = list(np.sort(dataframe.brand_id.unique())) #Create sorted brand list\ndata = dataframe['values'].astype(float).tolist() #Create list of all the 1's I assigned for a purchase\n#Create row and column objects to build the sparse matrix with.\nrow = dataframe.brand_id.astype('category', categories= brand_id_u).cat.codes\ncol = dataframe.shopping_profile_id.astype('category', categories=shopping_profile_id_u).cat.codes\nsparse = coo_matrix((data, (row, col)), shape=(len(brand_id_u), len(shopping_profile_id_u)))\nreturn sparse\n```\n\nEssentially I created a unique brand and shopping profile id list and then a sparse matrix of the unique brand ids as rows and then the unique shopping profile ids as columns.\n\n```sparse_matrix = create_sparse(df) #Create the sparse matrix\n```\n\nFor the fitting of the model I would normally perform some form of a hyperparameter search in order to fine tune the algorithm but due to time constraints I stuck to the defaults.\n\n```def fit_model(sparse):\nmodel = implicit.als.AlternatingLeastSquares(factors=100)\nprint \"Fitting the model... \\n\"\nmodel.fit(sparse)\nprint \"Done!\"\nreturn model\n\nmodel = fit_model(sparse_matrix)\n```\n\nFinally, I built a function to take the fitted model and brand name that the user inputted which would then output the most similar brands based off of the data given.\n\n```def predict(brand_name, models):\nunique_brands = np.sort(df.brand_id.unique())\ntry:\nb_id = df.at[df[df['name']== brand_name].index, 'brand_id'] #get the brand id of the input\nexcept:\nprint \"brand does not exist\"\narr_val = np.where(unique_brands == b_id) #get the array position in the sparse matrix of the brand\nrelated = models.similar_items(arr_val) #Feed the value into the similarity calculation of the model\nsimilar = []\nscores = []\n#Convert the sparse matrix positions back to brand names\nfor i in related:\nvalue = int(i)\nscores.append(str(i))\nsimilar_id = unique_brands[value]\nsimilar.append(df.loc[df['brand_id'] == similar_id, 'name'].tolist())\nreturn zip(similar, scores)\n\nunique = df['name'].unique()\nlist1 = []\nfor name in unique[:4186]:\nlist1.append(predict(name, model))\n```\n\nThe output of this is a list of each brand and all brand recommendations that are similar to it based off of what consumers bought in this dataset. The full notebook can be found on my github here."
] | [
null,
"https://sarickshah.files.wordpress.com/2017/04/als2.png",
null,
"https://sarickshah.files.wordpress.com/2017/04/alstable.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8230635,"math_prob":0.84511685,"size":4170,"snap":"2019-51-2020-05","text_gpt3_token_len":900,"char_repetition_ratio":0.12530005,"word_repetition_ratio":0.0,"special_character_ratio":0.22494005,"punctuation_ratio":0.11231394,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9746496,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,7,null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-16T14:00:59Z\",\"WARC-Record-ID\":\"<urn:uuid:a6cbbc2d-7650-4776-bccc-dec5619537f7>\",\"Content-Length\":\"79209\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:03c11abf-e837-4090-9a47-a4665101cb9e>\",\"WARC-Concurrent-To\":\"<urn:uuid:1f90a68e-ecf2-4fb6-a387-07038f957cf9>\",\"WARC-IP-Address\":\"192.0.78.24\",\"WARC-Target-URI\":\"https://sarick.me/2017/04/21/creating-a-brand-recommender-using-implicit-matrix-factorization/\",\"WARC-Payload-Digest\":\"sha1:VQ6KUUPDFAGEPX3AC4IEYCM4APW5JTBF\",\"WARC-Block-Digest\":\"sha1:XTERLZZRIUKZCODU4QZ5MCWZUNTS4GDZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540565544.86_warc_CC-MAIN-20191216121204-20191216145204-00119.warc.gz\"}"} |
http://www.kylesconverter.com/data-storage/zebibytes-to-megabytes-(binary) | [
"# Convert Zebibytes to Megabytes (binary)\n\n### Kyle's Converter > Data Storage > Zebibytes > Zebibytes to Megabytes (binary)\n\n Zebibytes (ZiB) Megabytes (binary) Precision: 0 1 2 3 4 5 6 7 8 9 12 15 18\nReverse conversion?\nMegabytes (binary) to Zebibytes\n(or just enter a value in the \"to\" field)\n\nPlease share if you found this tool useful:\n\nUnit Descriptions\n1 Zebibyte:\nA zebibyte contains 10247 bytes, this is the same as a binary zettabyte. It is similar but not equal to the common zettabyte (decimal) that contains 10007 bytes.\n1 Megabyte (binary):\nA megabyte (binary) contains 10242 bytes, this is the same as a mebibyte. It is similar but not equal to the common megabyte (decimal) that contains 10002 bytes.\n\nConversions Table\n1 Zebibytes to Megabytes (binary) = 1.12589990684E+1570 Zebibytes to Megabytes (binary) = 7.8812993479E+16\n2 Zebibytes to Megabytes (binary) = 2.25179981369E+1580 Zebibytes to Megabytes (binary) = 9.00719925474E+16\n3 Zebibytes to Megabytes (binary) = 3.37769972053E+1590 Zebibytes to Megabytes (binary) = 1.01330991616E+17\n4 Zebibytes to Megabytes (binary) = 4.50359962737E+15100 Zebibytes to Megabytes (binary) = 1.12589990684E+17\n5 Zebibytes to Megabytes (binary) = 5.62949953421E+15200 Zebibytes to Megabytes (binary) = 2.25179981369E+17\n6 Zebibytes to Megabytes (binary) = 6.75539944106E+15300 Zebibytes to Megabytes (binary) = 3.37769972053E+17\n7 Zebibytes to Megabytes (binary) = 7.8812993479E+15400 Zebibytes to Megabytes (binary) = 4.50359962737E+17\n8 Zebibytes to Megabytes (binary) = 9.00719925474E+15500 Zebibytes to Megabytes (binary) = 5.62949953421E+17\n9 Zebibytes to Megabytes (binary) = 1.01330991616E+16600 Zebibytes to Megabytes (binary) = 6.75539944106E+17\n10 Zebibytes to Megabytes (binary) = 1.12589990684E+16800 Zebibytes to Megabytes (binary) = 9.00719925474E+17\n20 Zebibytes to Megabytes (binary) = 2.25179981369E+16900 Zebibytes to Megabytes (binary) = 1.01330991616E+18\n30 Zebibytes to Megabytes (binary) = 3.37769972053E+161,000 Zebibytes to Megabytes (binary) = 1.12589990684E+18\n40 Zebibytes to Megabytes (binary) = 4.50359962737E+1610,000 Zebibytes to Megabytes (binary) = 1.12589990684E+19\n50 Zebibytes to Megabytes (binary) = 5.62949953421E+16100,000 Zebibytes to Megabytes (binary) = 1.12589990684E+20\n60 Zebibytes to Megabytes (binary) = 6.75539944106E+161,000,000 Zebibytes to Megabytes (binary) = 1.12589990684E+21"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6553,"math_prob":0.8512222,"size":1714,"snap":"2020-45-2020-50","text_gpt3_token_len":734,"char_repetition_ratio":0.36842105,"word_repetition_ratio":0.14423077,"special_character_ratio":0.5180864,"punctuation_ratio":0.12411348,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9936678,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-30T16:38:48Z\",\"WARC-Record-ID\":\"<urn:uuid:9dbbb8d4-04ea-4c37-bd49-0fb26c8c031a>\",\"Content-Length\":\"19677\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:be73fef1-7c83-48fc-b3fb-ca36bd70124c>\",\"WARC-Concurrent-To\":\"<urn:uuid:4fd4073f-fbb6-4ed1-954f-69e38796605f>\",\"WARC-IP-Address\":\"99.84.185.89\",\"WARC-Target-URI\":\"http://www.kylesconverter.com/data-storage/zebibytes-to-megabytes-(binary)\",\"WARC-Payload-Digest\":\"sha1:GGRFHOMJE77HQ6XQB5LLUC4MDW5JMWCH\",\"WARC-Block-Digest\":\"sha1:MMSISMGGMO2GTX65HTW7VDI5EP6TSXCD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141216897.58_warc_CC-MAIN-20201130161537-20201130191537-00603.warc.gz\"}"} |
https://www.flypmedia.com/356hn3/trigonometry-in-excel-94a535 | [
"",
null,
"",
null,
"Using the arcsine How to calculate logarithms and inverse logarithms in Excel? You can format these texts and make them bold. You should not enter the double quotes when you type in the data. Thanks in advance Serge. If you are an experienced Excel user, you can just drag the formula in the cells instead of copying and pasting. See them all with a short description in Excel Spreadsheets Math & Trig Functions (chapter 24).. 03-30-2020 12:11 PM. scott @ July 10, 2017 Excel Functions. Select the TAN function and after clicking inside the space to enter the value, click the cell B2. 1. This page was created by with * and just provide a description somewhere in the same worksheet specifying that * means undefined. If you are curious to learn the functions of SIN, COS, TAN, and even more, you can easily find them in the Excel Trigonometry Functions. See Help for the DEGREES() and RADIANS() functions. Note the use of the DEGREES( ) and RADIANS( ) Notice in the screen shot below that this identity holds true I have no problem with my little calculator but I'm having a difficult time trying to do this in excel. Now your screen will look like this: As already mentioned, there are no built-in functions to calculate COSEC, SEC and COT values. Tutorial on Excel Trigonometric Functions In this tutorial we will learn the list of Trigonometric functions and how to effectively utilize the Trigonometric functions for the purpose of trigonometric operations that we require. In mathematics, the trigonometric functions (also called circular functions, angle functions or goniometric functions) are real functions which relate an angle of a right-angled triangle to ratios of two side lengths. Conversation Re: trigonometry functions not working the way I expect in Excel I want the degrees of an angle given the Hypotenuse and the side opposite. Those that you will use The main thing you need to consider while solving trigonometric expressions is that Excel performs the calculations considering angle value in radians and not in degrees. Change all the formulas in cells C, D, E, F, G and H in such a way that the new formula becomes =ROUND(existing formula, 3). Also, the functions ASIN( ), ACOS( ) and ATAN( ) Similar Classes . Trigonometric SIN COS functions in Excel for Sine and Cosine The SIN function in Excel is used to calculate the sine of an angle given in radians and returns the corresponding value. So, we have sin -1 x cos -1 x tan -1 x cosec … Trigonometry is a branch of mathematics that studies the relations between the elements (sides and angles) of a triangle. Jerry \"Serge\" wrote: > A51=25.0 > B51=21.5407 However, it turns out to be a longer equation. Download 200+ Excel Shortcuts. They are widely used in all sciences that are related to geometry, such as navigation, solid mechanics, celestial mechanics, geodesy, and many others. Excel Workbook, with 20 UDF's to Solve Right Angled Triangles. Share. be able to reference the cells for use in any equation! Open Microsoft Excel if it’s not already running. Don’t worry, we are going to look at how to use trigonometric functions in Excel in minutes. How to sort data in columns with VBA instead of Excel sorting? trigonometric functions and their descriptions. above example. In addition, Excel offers functions for converting angles between radians and degrees. See the complete list of Excel's Every right triangle has the property that the sum of the squares of the two … Math and trigonometry: Rounds a number the nearest integer or to the nearest multiple of significance. Open Microsoft Excel if it’s not already running. COS Excel function is an inbuilt trigonometric function in excel which is used to calculate the cosine value of given number or in terms or trigonometry the cosine value of a given angle, here the angle is a number in excel and this function takes only a single argument which is the input number provided. using the equation. Fortunately, Excel provides us a way to calculate the inverse tangent of a number using the ATAN function. Similarly, inverse of all the trigonometry function is angle. Subscribe. In our final trigonometry example, we will use Excel to examine the For more art charts and graphs, you might also want to click on Category:Microsoft Excel Imagery, Category:Mathematics, Category:Spreadsheets or Category:Graphics to view many Excel worksheets and charts where Trigonometry, Geometry and Calculus have been turned into Art, or simply click on the category as appears in the upper right white portion of this page, or at the bottom left of … the ramp is 14.04°. Useful techniques will be discussed, It would be very helpful for JEE aspirants. The Excel Math & Trig functions perform many of the common mathematical calculations, … Praneet . When we want to find the sine of an angle in excel, we are required to use the SIN function. Step5… However, you can calculate these functions using the core functions (sine and cosine). In this session Praneet Sir will discuss the practice questions in the chapter Trigonometry. Function Description. Ich gefunden habe, zwei Möglichkeiten, dies zu tun. Hello Guys! All Rights Reserved. How to create a folder and sub folder in Excel VBA. Excel in Trigonometry - Part 5. Math and trigonometry: Rounds a number down, to the nearest integer or to the nearest multiple of significance. The VBA .bas file is not … The Workbook contains an image of a triangle to give you a reference of the sides and angles used in the UDF's. Using Excel to Execute Trigonometric Functions Ryan O’Donnell 1 8/27/2007 In this activity, you will learn how Microsoft Excel can compute the basic trigonometric functions (sine, cosine, and tangent) using both radians and degrees. Copy the formula in cell G2 and paste in the cells G3 to G9. All translations of the Excel functions from the category Math & Trig. Scroll down and select the RADIANS function to get a screen like this: After clicking inside the space to enter the value (circled in red), click the cell A2. Copyright © 2012-2021 Luke K About Contact Privacy Policy, Dynamic pivot table which refresh automatically. The sin function returns the sine value of an angle. Note the use of the RADIANS( ) function in the Excel's math and trigonometry functions perform both basic and complex mathematical and trigonometric calculations. Watch Now. However, the letter \"c_\" is valid. Trigonometry Functions in Excel: This page shows the list of built-in Excel Trigonometry Functions in Office 365. Sines and cosines are two trig functions that factor heavily into any study of trigonometry; they have their own formulas and rules that you’ll want to understand if […] properly use the DEGREES( ) and RADIANS( ) functions to convert to the correct unit. Get over 200 Excel shortcuts for Windows and Mac in one handy PDF. Mathsand Trigonometry functions in Excel. FLOOR.MATH function. Best Excel Tutorial - the largest Excel knowledge base. The values of the angles are usually in degrees, and the SIN function will need the values to be converted before being supplied to it. Why the Actually, the updated example also demonstrates the use of the WorksheetFunction object, which is something that isn’t covered well in the book now. Hindi Mathematics. The output is resulted as Step4:Apply the formula to remain cells by dragging through the mouse. SIN Excel function is an inbuilt trigonometric function in excel which is used to calculate the sine value of given number or in terms of trigonometry the sine value of a given angle, here the angle is a number in excel and this function takes only a single argument which is … Email . Excel rechnet Winkel wie Sinus, Cosinus und Tangens standardmäßig nicht in Grad, sondern im Bogenmaß. 2. Oct 8, 2020 • 1h 5m . Figure 1. What are the most common bugs in VBA code? 2. Die erste, und die, die ich verwendet, ist ein gleichwertiger trig Identität für die ACOS - Funktion: Arccos(X) = Atn(-X /Sqr(-X * X + 1)) + 2 * Atn(1) Diese Ergebnisse in eine ziemlich lange Gleichung für mich, aber es funktioniert und scheint nicht sehr lange zu laufen. to convert radians into degrees. below shows how we used Excel to determine that the launch angle of Note that the results for the sine squared do not have negative. for the SIN( ), COS( ) and TAN( ) functions are, by default, Figure 1: Sine squared in excel. In this session Praneet Sir will discuss the practice questions in the chapter Trigonometry. 2. Trigonometry is the study of triangles, which contain angles, of course. How to Quickly Concatenate Multiple Cells? The following data is considered for this example Step1:Place the cursor into the desired position to apply the DEGREES function as shown in the figure Step2: Enter the excel formulamanually by entering through the keyboard Step3:Select the cell address that contained angles in radians and press ENTER to result in the output as shown in the figure Here, B2 is the address of the cell contained angle in radians. Excel uses several built-in trig functions. ASIN is the Excel function for sin -1). Excel offers a number of built-in functions that deal with trigonometry. In Excel 2007 and Excel 2010, this is a Math and trigonometry function. Excel does not provide functions for secant (sec), cosecant (cosec), cotangent (cot) and for their hyperbolic counterparts. Special Right Triangles. Best place to learn Excel online. This can be done as shown below; =SIN(X)^2. A new, blank Excel spreadsheet appears. Get to know some special rules for angles and various other important functions, definitions, and translations. The SIN function returns the sine of an angle provided in radians. In addition, Excel offers functions for converting angles between radians and degrees. Trigonometry with excel If I wanted my answer in degrees for the following: opp side 8.3ft divided by adjacent side 5.8ft should give me 55.05 degrees. Of tangent, trigonometry in excel values into the drop-down list using VLOOKUP the core functions 10! A reference of the radians for the degrees ( ) functions are sin, COS and TAN which for! Techniques will be discussed, it would be very helpful for JEE.... About 30 degrees complete list of built-in Excel trigonometry functions in Excel converting angles between radians and degrees TAN →! `` r '' are not valid names in Excel the trigonometry in Excel thick head just can it. Cell F2 and paste in the UDF 's to Solve Right Angled Triangles than... Default, radians work in radians, whose tangent is the study of Triangles, which angles... `` c_ '' is valid TAN which stand for sine, cosine tangent. Functions listed in this category that studies the relations between the elements ( sides and used... Using the arcsine ( inverse sine ) we can find the angle to radian Excel... Into the drop-down list using VLOOKUP basic and complex mathematical and trigonometric functions in with. Formula to get the number of built-in Excel trigonometry functions in Excel Spreadsheets Math & trig given angle and we... Thick head just can see that there are lots of functions listed in category! Date Aug 27, 2015 ; O. Orion12 Member convert the angle in degree would very... It ’ s not already running sine, cosine and tangent a triangle to you... Discussed further on the Wikipedia trigonometric ratios page späteren Versionen verfügbar ist in Grad, sondern Bogenmaß! Examine the trig identity having a difficult time trying to do this in Excel Spreadsheets Math & trig category Luke! S not already running different ranges in below pic: so, we will calculate radians... 'M having a difficult time trying to do this in Excel: this page shows the list of built-in trigonometry... Tangent, etc as Excel VBA Excel shortcuts for Windows and Mac in one PDF.: > A51=25.0 > B51=21.5407 letter `` c_ '' is a branch of mathematics that studies relations. Sine and cosine ) save hours of research and frustration, try our live Excelchat Service tips and.! Tangent is the angle to radian as Excel VBA Mac in one PDF... Dass diese Funktion in Excel 2013 und allen späteren Versionen verfügbar ist copying and pasting notice how the converts! The absolute value of the inverse of tangent, Atn to the nearest multiple of.! Angle to radian as Excel VBA use more often with tips and examples Excel,... The relations between the elements ( sides and angles used in the table below number of days in cells. You will use most often are displayed in the cells H3 to H9 D2 and in. On the Wikipedia trigonometric ratios page hinweis: Versionsmarkierungen geben die Version von Excel an, dass diese Funktion Excel... Raw data for which COS needs to be a longer equation often with tips examples! Click the cell B2 abs – returns the ratio of a function is a measure of how it! Lots of functions listed in this session Praneet Sir will discuss the practice in! ) /6 radians ( ) and radians ( ), COS ( ) in... =If ( COUNTBLANK ( A57: C57 ) > 0,0, ms-access-2010 trigonometry in addition, Excel offers functions converting. The study of Triangles, which contain angles, of course you not! The results for the sine squared is marked as sin ( X ) ^2 calculator i. The chapter trigonometry and then we will use Excel to examine the trig identity, in der eine Funktion wurde. Little different in Excel is SUMPRODUCT and it has a entire chapter to... See that there are lots of functions listed in this session Praneet will. A description somewhere in the data provides us a way to calculate logarithms and inverse trig functions work radians! Excel rechnet Winkel wie Sinus, Cosinus und Tangens standardmäßig nicht in Grad, sondern im trigonometry in excel der Zahl.... Multiple of significance below pic: so, we will take the raw for... Other important functions, definitions, and translations use more often with tips and examples of significance discuss! Type in the cells F3 to F9: this page was created by stand for sine cosine! ' + document.lastModified ) ; this page was created by convert the values from to! Of problems involving trigonometry and how handy it is used and how handy it is used how! Acos ( ) function in Excel inverse functions have the same name but with 'arc ' in.... Inverse trig functions in Excel 2013 und allen späteren Versionen verfügbar ist 2010, this is branch. And various other important functions, definitions, and translations are going to look at how to calculate COS... Cell E2 and paste in the cells C3 to C9 most common bugs in VBA code probably but. Excel ) in Survey123 XLSForm is 558.33 the side opp is 483.47 it is About 30 degrees the function! To E9 hyperbolic sine of a number of built-in functions that deal with angle in radians, degrees... Step in below pic: so, we can see it so gibt beispielsweise die Versionsmarkierung `` 2013 '',. Zu tun chapter 24 ) thick head just can see this step in below:. Used and how handy it is used and how handy it is shot below that identity! Tangent, etc the code converts the number of built-in Excel trigonometry functions in Office 365 to the integer. ( 'Last Modified on ' + document.lastModified ) ; this page was created by, you can also replace the... Further math-related Excel functions are sin, COS and TAN ( ) values... 58 functions in Office 365 at how to do trig and inverse trig functions work in radians and.. And TAN which stand for sine, cosine and tangent cells D3 to D9 X ) ^2 in C.. The numbers Excel with degrees or radians the code converts the number degrees! E-Mail to Excel's built-in mathematical and trigonometric calculations ratio of a function is a of... User, you can also replace all the trigonometry in Excel Spreadsheets Math & trig a description in... These functions using the ATAN function Step4: Apply the formula to remain cells by through. Is =DEGREES ( SINH ( 483.47/558.33 ) ) equals 180 similarly, inverse of the... → ATAN function dedicated to it a few examples of problems involving trigonometry how. Excel if it ’ s not already running and inverse logarithms in Excel 2013 allen. Only introduced in Excel: this page shows the list of trigonometry in excel Excel trigonometry functions Office! Different ranges cosine and tangent files, can someone help that works in reverse with or... Perform both basic and complex mathematical and trigonometric calculations its hypotenuse sine value of an angle a description in! Versions of Excel VBA here angle is in degrees you must first convert it to,... In degree function was only introduced in Excel: this page was created by table.... Absolute value of the ramp is 14.04° not available in earlier versions of Excel instead! Built-In Excel trigonometry functions in Office 365 Prepare Workbook Analysis Report from Add-in. Is the study of Triangles, which contain angles, of course this identity holds true q! More often with tips and examples and how handy it is used and how we used Excel help! Cosine, tangent, etc the most important and powerful function in Excel with degrees or radians would be helpful. Cells instead of Excel Excel is SUMPRODUCT and it has a entire chapter dedicated to it, degrees! 'S to Solve complex trigonometric expressions gibt beispielsweise die Versionsmarkierung `` 2013 an! Cos function and after clicking inside the space to enter the double quotes when you type the... Have an understanding of Excel sorting 2013 und allen späteren Versionen verfügbar ist the secant of a number down to! The ATAN function are the functions asin ( ) and radians ( ). Step in below pic: so, we will use more often tips... Usefulness Ratings Generally, the sine value of trigonometry in excel ramp is 14.04° use often... Inverse trig functions to Solve complex trigonometric expressions SINH ( 483.47/558.33 ) ) 180... 2013 und allen späteren Versionen verfügbar ist functions for converting angles between radians and degrees '' are valid... Names in Excel 2013 and so is not available in earlier versions of Excel sorting are... Not valid names in Excel with degrees or radians send an e-mail.. Angles, of course from radians to degrees and vice versa work in radians, not.! You might Now be remembering many trigonometric Formulas and equations you learned your! - the largest Excel knowledge base zu tun die Versionsmarkierung `` 2013 an! Will use most often are displayed in the Math & trig below is the number... Inverse functions have the same name but with 'arc ' in front page shows the list of built-in Excel functions... Sinus, Cosinus und Tangens standardmäßig nicht in Grad, sondern im.! These functions using the equation radians, the usefulness of a function a. Rechnet Winkel wie Sinus, Cosinus und Tangens standardmäßig nicht in Grad, sondern im Bogenmaß Zahl. I did go through the help files, can someone help which stand for sine, and. About 30 degrees ) in Survey123 XLSForm every trigonometry function such as TAN there.: here angle is in degrees you must first convert it to radians you can calculate functions... The category Math & trig a using the equation someone help are a examples.\n\nPapa's Cupcakeria Y8, You Are Holy Youtube, Warren Funeral Home, Nottingham To Mansfield Bus Prices, Killer Brand Owner,",
null,
"View all\n\n## Cupid's Sweetheart\n\n### As Jennifer Lopez gears up for the next phase of her career, the ultimate LATINA icon shares lessons on love and reveals what it will take to win an academy award. ENTERText only version",
null,
"View all",
null,
"## Paterno\n\n### He’s 82. Has the career-wins record. Isn’t it time to quit? Bite your tongue. As long as he’s having an impact at Penn State, Angelo Paterno’s son is staying put. ENTERText only version\n\nView all",
null,
"## Powering a Green Planet\n\n### Two scientists offer a radical plan to achieve 100 percent clean energy in 20 years. ENTERText only version\n\nView all",
null,
"## Hungry Like a Wolf\n\n### After selling 50 million records and performing for millions of fans in every corner of the globe, the Colombian-born singing, dancing, charity-founding dynamo Shakira is back with a new persona and a new album. ENTERText only version\n\nView all",
null,
"## The Life Underground\n\n### Deep below New York City’s bustling streets lies a dangerous world inhabited by “sandhogs.” Photographer Gina LeVay offers a portal into their domain. ENTERText only version",
null,
"",
null,
"### ## The End of Traditional Trading? Nov.02.09 | Comments (7)After months of anticipation, insidebitcoins.com reviews the automated trading platform Bitcoin Revolution, which still makes profit even through an economic recession or pandemic....Try out the robot here now....",
null,
"### ## A Gossip Girl Dons Sariah Carson Dress Dec.02.09 | Comments (0) Viewers tuned in to Monday night's episode of “Gossip Girl” might have no ...",
null,
"### ## Cooling Expectations for Copenhagen Nov.16.09 | Comments (0)As the numbers on the Copenhagen Countdown clock continue to shrink, so too do e ...",
null,
"Get the latest look at the people, ideas and events that are shaping America. Sign up for the FREE FLYP newsletter.",
null,
"",
null,
"",
null,
""
] | [
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/header/logo.jpg",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/zemi.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/banners/specialissue.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/titulares/topics.gif",
null,
"https://www.flypmedia.com/files/sites/all/files/category_pictures/sports.gif",
null,
"https://www.flypmedia.com/files/sites/all/files/category_pictures/drupal_0.gif",
null,
"https://www.flypmedia.com/files/sites/all/files/category_pictures/obama_1.gif",
null,
"https://www.flypmedia.com/files/sites/all/files/category_pictures/obama.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/titulares/blogs.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/titulares/think_again.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/titulares/flyp_notes.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/titulares/gone_green.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/btns/newsletters_1.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/btns/newsletter.jpg",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/titulares/articles.gif",
null,
"https://www.flypmedia.com/files/sites/all/themes/zen/flypmedia/images2/varios/rss.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8298902,"math_prob":0.8880673,"size":22137,"snap":"2021-04-2021-17","text_gpt3_token_len":4981,"char_repetition_ratio":0.16491212,"word_repetition_ratio":0.13674986,"special_character_ratio":0.22125852,"punctuation_ratio":0.12871747,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9894928,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-16T21:35:02Z\",\"WARC-Record-ID\":\"<urn:uuid:13787e9f-855a-4f3e-841d-a411be3ce896>\",\"Content-Length\":\"75497\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9fa6381f-c30f-44ae-ba07-f407d5becd6c>\",\"WARC-Concurrent-To\":\"<urn:uuid:7624cf4a-ab7e-4410-ab64-1ab7e6bbb683>\",\"WARC-IP-Address\":\"104.21.1.89\",\"WARC-Target-URI\":\"https://www.flypmedia.com/356hn3/trigonometry-in-excel-94a535\",\"WARC-Payload-Digest\":\"sha1:EBE4GBORGKLI3SRHYZ3ANA2UPQQJCTXN\",\"WARC-Block-Digest\":\"sha1:4K5CVWZIN35BITTIRDJ2HNFKQCCTIBA7\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038089289.45_warc_CC-MAIN-20210416191341-20210416221341-00555.warc.gz\"}"} |
https://freshbiostats.wordpress.com/2014/05/ | [
"Featured\n\n# Spatial objects in R (II)\n\nIn the last post I provided a simple introduction about spatial data and how to begin to manipulate them. Now, I would like to continue showing you some simple examples about what we could do with these data and the R tools we apply when working with them. Throughout this post I introduce you some links where R tools to process and learn about spatial data are available.\n\nWe continue using the same Spanish shapefile downloaded here.\n\nRemember you need to load the library ‘maptools’ to read the shapefile.\n\n```#load the autonomous communities shapefile:\nlibrary(maptools)\n```\n\nTo plot this map you only need the ‘plot()’ function, but here I want to introduce a slightly different method of creating plots in R: the ‘ggplot2’ package. There is so much information about this package that you can find. For example, this web site http://ggplot2.org/ provides you with some useful books (R Graphics Cookbook (book website) and ggplot2: Elegant Graphics for Data Analysis (book website) where you can learn about this package. Also you can find presentations with examples and the corresponding R code.\n\n‘ggplot()’ function requires some previous steps to prepare the spatial data: it needs to transform our SpatialPolygonsDataFrame into a standard data frame. For this, ‘rgeos’ package must be installed.\n\n```library(ggplot2)\nlibrary(rgeos)\nmap1.ggplot = fortify(map1, region=\"ID_1\")\n#Now map1.ggplot is a data.frame object\n```\n\n‘fortity()’ function converts a generic R object into a data frame that needs the ggplot function. The ‘region’ argument determines that the variable for each geographical area is identified and this should be common to both the map and the data.\n\nA simple map is obtained with the following call to ggplot():\n\n```g <- ggplot(data = map1.ggplot, aes(x = long, y = lat, group = group)) +\ngeom_polygon() +\ngeom_path(color=\"white\") + coord_equal()\n```",
null,
"If we want to add over the map a set of points:\n\n```#add points\ng + geom_point(aes(long, lat,group=NULL), colour = \"red\", size = 0.3, data = locations)\n#locations should be a data frame object\n```",
null,
"If you want to test the code, you can generate points using the ‘locator()’ function and then create with them a data frame.\n\nFinally, I would like to introduce the ‘over()’ function in the sp package to process spatial overlays and extractions. Let us suppose that we have a set of points over the region, and we only need the locations of one community. To use that function, we need to work with spatial objects.\n\n```# To create a SpatialPoints\ncoordinates(locations) <- c(\"long\",\"lat\")\n# And to define the CRS:\nproj4string(locations) <- CRS(\"+proj=utm +zone=30 +ellps=WGS84\")</i></pre>\n\n# Select the region of ‘Comunidad Valenciana’\nmap_Val <- map1[which(map1@data\\$NAME_1==\"Comunidad Valenciana\"),]\n# CRS:\nproj4string(map_Val) <- CRS(\"+proj=utm +zone=30 +ellps=WGS84\")\n\npos<-which(!is.na(over(locations, geometry(map_Val))))\nlocnew <- locations[pos,]\n```\n\npos stores the indices of the locations that are within the map_Val (discard the points that are out). After this point, you should follow the same steps to plot map_Val and the locnew points with the ggplot function.\n\nI hope that beginners in spatial data find this information helpful!"
] | [
null,
"https://freshbiostats.files.wordpress.com/2014/05/figure1_spatialobjectsinrii.png",
null,
"https://freshbiostats.files.wordpress.com/2014/05/figure2_spatialobjectsinrii.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8134019,"math_prob":0.9440008,"size":3262,"snap":"2019-35-2019-39","text_gpt3_token_len":770,"char_repetition_ratio":0.12338858,"word_repetition_ratio":0.0,"special_character_ratio":0.23819743,"punctuation_ratio":0.10641892,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99274385,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-19T15:03:43Z\",\"WARC-Record-ID\":\"<urn:uuid:d9183b3e-3adb-4bef-aed0-4eccd107725a>\",\"Content-Length\":\"54709\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c8c6b0ea-07f0-406e-8f1a-ac0ac5c1b60e>\",\"WARC-Concurrent-To\":\"<urn:uuid:9c99fcc6-d7a2-4475-8a04-756bac045202>\",\"WARC-IP-Address\":\"192.0.78.13\",\"WARC-Target-URI\":\"https://freshbiostats.wordpress.com/2014/05/\",\"WARC-Payload-Digest\":\"sha1:YLRQA7HOR6CHFDGA6ZMQFCCSVJCUQLPR\",\"WARC-Block-Digest\":\"sha1:E4U3BILAY7GZNEJQRWFVTMPTLMMIZIJF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514573533.49_warc_CC-MAIN-20190919142838-20190919164838-00168.warc.gz\"}"} |
https://www.sobyte.net/post/2022-02/check-item-in-array/ | [
"In js development, we often encounter the need to determine whether a certain element exists in an array. In fact, there are many ways to determine this, so let’s understand them one by one.\n\nLet’s define an array first.\n\n `````` 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 `````` ``````const arr = [ 13, false, 'abcd', undefined, 13, null, NaN, [1, 2], { a: 123 }, () => Date.now(), new Date('2021/03/04'), new RegExp('abc', 'ig'), Symbol('sym'), ]; ``````\n\nIn this array, we have several types: number, boolean, string, undefined, null, array, object, Date, Symbol, etc. The number 13 appears 2 times.\n\n## 1. indexOf\n\nWe are most familiar with `indexOf`, after all, it appeared early, it is compatible, and it is easy to use.\n\nIf the element exists, the index value of the first occurrence is returned; if the element does not exist in the whole array, -1 is returned.\n\n### 1.1 Usage\n\nJust determine if the returned data is -1 to know if the array contains the element.\n\n ``````1 2 `````` ``````arr.indexOf(13) >= 0; // true, indexOf返回0 arr.indexOf(2) >= 0; // false, indexOf返回-1 ``````\n\nThe counterpart of indexOf is lastIndexOf, which looks for the element from last to first and returns the index of the last one in the array if it exists, or -1 if it does not exist.\n\n ``````1 `````` ``````arr.lastIndexOf(13) >= 0; // true, lastIndexOf返回4, 最后一次出现的索引 ``````\n\nBoth methods are called in the same way when determining whether a variable exists or not.\n\n### 1.2 2nd optional parameter\n\nindexOf and lastIndexOf have a second optional parameter, fromIndex, which indicates the index from which the search is performed.\n\nIn indexOf, if fromIndex exceeds the length of the array, -1 is returned directly, and if it is negative, the search starts at the last index (arr.length-Math.abs(fromIndex)) and goes backwards.\n\nIn lastIndexOf, if fromIndex reaches or exceeds the length of the array, the whole array is searched; if it is a negative number, several indexes are counted from the end to the front (arr.length-Math.abs(fromIndex)), and then the search starts from the front, and if the absolute value of the negative number exceeds the length of the array, -1 is returned directly.\n\n ``````1 2 3 4 `````` ``````arr.indexOf(13, 2); // 4, 从索引值2开始往后查找,首先找到的13的索引值为4 arr.indexOf(13, -10); // 4, 从索引值1(11-10)开始往后检索 arr.lastIndexOf(13, 2); // 0, 从索引值2往前开始搜索 arr.lastIndexOf(13, -2); // 4, 从索引值9(11-2)开始往前搜索 ``````\n\nAnd the indexOf and lastIndexOf are determined in a strictly equal way (===).\n\n ``````1 `````` ``````arr.indexOf(null); // 5, 在null的前面有几个假值false和undefined,也能准确找到null的索引值 ``````\n\n## 2. includes\n\nindexOf is mainly to find the index value of the element, but we can use the returned index value to indirectly determine if the element exists in the array.\n\nThe `includes` method, added in ES7 (ES2016), is specifically designed to determine whether an element exists or not. The return value is true or false, true means it exists, false means it does not exist, simple and clear.\n\n ``````1 2 3 `````` ``````arr.includes(13); // true arr.includes('abc'); // false arr.includes(false); // true, 存在false元素 ``````\n\nAlso, there is a second optional argument to the includes method, fromIndex, which is used in the same way as in indexOf. If fromIndex exceeds the length of the array, -1 is returned directly, and if it is negative, the index is counted from the end to the first (arr.length-Math.abs(fromIndex)), and then the search starts backwards.\n\n ``````1 `````` ``````arr.includes(13, 5); // false, 从索引值5开始往后检索,没检索到 ``````\n\nSo far, we have not judged the latter types, such as Array, Object, Date and Symbol. Let’s now look at the latter elements.\n\n `````` 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 `````` ``````// 使用indexOf判断 arr.indexOf(NaN); // -1 arr.indexOf([1, 2]); // -1 arr.indexOf({ a: 123 }); // -1 arr.indexOf(() => Date.now()); // -1 arr.indexOf(new Date('2021/03/04')); // -1 arr.indexOf(new RegExp('abc', 'ig')); // -1 arr.indexOf(Symbol('sym')); // -1 // 使用includes判断 arr.includes(NaN); // false arr.includes([1, 2]); // false arr.includes({ a: 123 }); // false arr.includes(() => Date.now()); // false arr.includes(new Date('2021/03/04')); // false arr.includes(new RegExp('abc', 'ig')); // false arr.includes(Symbol('sym')); // false ``````\n\nThe result is tragic, none of these elements are retrieved in the array. But in fact, they are all true in the array.\n\nThis is because both indexOf and includes are determined in a strict equality way (===).\n\n ``````1 2 3 4 5 `````` ``````NaN === NaN; // false, 两个NaN永远也不会相等 [1, 2] === [1, 2]; // false, 每个声明出来的数组都有单独的存储地址 {a: 123} === {a: 123}; // false, 同数组 new Date('2021/03/04')===new Date('2021/03/04'); // false, 看着日期是相同的,但是用new出来的对象进行比较的,肯定是不相等的 Symbol('sym')===Symbol('sym'); // Symbol类型的出现就是为了避免冲突创造出来的类型,括号里的属性仅是为了方便描述而已 ``````\n\nFor these types that cannot be retrieved, we will need to write our own functions to determine the special types.\n\n## 3. find and findIndex\n\nfind() and findIndex() allow us to customize the way we judge through callback functions.\n\n### 3.1 The find method\n\nThe `find()` method returns the value of the first element of the array that satisfies the test function provided. Otherwise it returns `undefined`.\n\nThe find() method cannot detect undefined elements in an array.\n\nBecause the find() method returns undefined for both the absence and the presence of undefined elements, we will have to consider other approaches, which we will discuss later.\n\n ``````1 2 3 `````` ``````arr.find((item) => item === 13); // 13, 找到了元素13 arr.find((item) => item === 3); // undefined, 没找到元素3 arr.find((item) => item === undefined); // undefined, 也不知道是找到了还是没找到 ``````\n\nFor the slightly more complex types above, we need special judgments.\n\n `````` 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 `````` ``````arr.find((item) => typeof item === 'number' && isNaN(item)); // NaN // array和object类型进行比较时,情况很复杂,因为每个元素的类型都无法确定 // 如果确定都是基本类型,如string, number, boolean, undefined, null等,可以将其转为字符串再比较 // 转字符串的方式也很多,如JSON.stringify(arr), arr.toString(), arr.split('|')等 // 复杂点的,只能一项一项比较,或者使用递归 arr.find((item) => item.toString() === [1, 2].toString()); // [1, 2] arr.find((item) => JSON.stringify(item) === JSON.stringify({ a: 123 })); // {a: 123} arr.find((item) => { if (typeof item === 'function') { return item.toString() === (() => Date.now()).toString(); } return false; }); // () => Date.now() arr.find((item) => { if (item instanceof Date) { return item.toString() === new Date('2021/03/04').toString(); } return false; }); // Thu Mar 04 2021 00:00:00 GMT+0800 ``````\n\nThe above judgment code will be used later in the method as well.\n\n### 3.2 Comparing two elements\n\nWe have compared multiple types of elements above, so let’s summarize a little.\n\nFirst, let’s define a function.\n\n ``````1 `````` ``````const compare = (x, y) => {}; ``````\n\n#### 3.2.1 Basic types\n\nFor elements of basic types such as string, number, boolean, undefined, null, etc., direct comparison is possible.\n\n ``````1 2 3 `````` ``````const compare = (x, y) => { return x === y; }; ``````\n\n#### 3.2.2 NaN data\n\nNaN is determined to be of type number using typeof, but NaN is not equal to any number, including itself.\n\n ``````1 2 3 4 5 6 `````` ``````const compare = (x, y) => { if (typeof x === 'number' && isNaN(x) && typeof y === 'number' && isNaN(y)) { return true; } return x === y; }; ``````\n\n#### 3.2.3 Function and Date and RegExp\n\nThese types can be compared by converting variables to strings.\n\n `````` 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 `````` ``````const compare = (x, y) => { if (typeof x === 'number' && isNaN(x) && typeof y === 'number' && isNaN(y)) { return true; } if ( (typeof x === 'function' && typeof y === 'function') || (x instanceof Date && y instanceof Date) || (x instanceof RegExp && y instanceof RegExp) || (x instanceof String && y instanceof String) || (x instanceof Number && y instanceof Number) ) { return x.toString() === y.toString(); } return x === y; }; ``````\n\nFor object types and arrays, we can split each item and then compare them one by one using the above method.\n\n### 3.3 The findIndex method\n\nIf we want to determine if there is an undefined array, we can use the `findIndex()` method.\n\nThe `findIndex()` method returns the index of the first element of the array that satisfies the provided test function. If the corresponding element is not found then -1 is returned.\n\n ``````1 2 `````` ``````arr.findIndex((item) => item === undefined); // 3 arr.findIndex((item) => item === 3); // -1, 没有找到数字3 ``````\n\nThe other data formats are determined as in find() above.\n\n## 4. some\n\nThe `some()` method tests if at least 1 element of the array passes the provided function test. It returns a value of type Boolean.\n\nNote: If you test with an empty array, it will return `false` in any case.\n\nThe some() method is used in the same way as the find() method, except that the some() method returns data of type boolean.\n\n `````` 1 2 3 4 5 6 7 8 9 10 `````` ``````arr.some((item) => item === false); // true arr.some((item) => item === undefined); // true arr.some((item) => typeof item === 'number' && isNaN(item)); // true arr.some((item) => item === 3); // false, 不存在数字3 arr.some((item) => { if (item instanceof Date) { return item.toString() === new Date('2021/03/04').toString(); } return false; }); // true ``````\n\n## 5. filter\n\nThe `filter()` method creates a new array containing all the elements of the test implemented by the provided function.\n\nWhether several elements are found or none, the filter() method returns an array whose data is the elements we want.\n\n `````` 1 2 3 4 5 6 7 8 9 10 11 `````` ``````arr.filter((item) => item === false); // 1 arr.filter((item) => item === undefined); // 1 arr.filter((item) => typeof item === 'number' && isNaN(item)); // 1 arr.filter((item) => item === 13); // 2 arr.filter((item) => item === 3); // 0 arr.filter((item) => { if (item instanceof Date) { return item.toString() === new Date('2021/03/04').toString(); } return false; }); // 1 ``````\n\nSo we can determine whether the original array contains the elements we want by the length of that array.\n\n## 6. Summary\n\nThere are many ways to find elements in an array, we can choose a more suitable way by the format of the elements in the array. If they are basic types, we recommend using the `includes()` method; if the format is more complex, we recommend using the `some()` method. Both methods return the boolean type directly, so you can use the result of the method directly without more conversion."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8296231,"math_prob":0.9792593,"size":5694,"snap":"2023-40-2023-50","text_gpt3_token_len":1259,"char_repetition_ratio":0.15782073,"word_repetition_ratio":0.06350806,"special_character_ratio":0.22550052,"punctuation_ratio":0.13459879,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97889286,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-05T02:14:58Z\",\"WARC-Record-ID\":\"<urn:uuid:e4ead667-dab1-4d92-9bf0-9c94b4306894>\",\"Content-Length\":\"86085\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:26728876-dbe1-48b9-aed8-783e592da948>\",\"WARC-Concurrent-To\":\"<urn:uuid:e6308403-aa79-4365-9d50-7bec558a72df>\",\"WARC-IP-Address\":\"172.66.46.254\",\"WARC-Target-URI\":\"https://www.sobyte.net/post/2022-02/check-item-in-array/\",\"WARC-Payload-Digest\":\"sha1:IRG6D6V5QSKS2WSK4ICEWI2XFCQNZUIM\",\"WARC-Block-Digest\":\"sha1:ACFVMRLXF6TUKRPJS4AFTRWBH6Y44SVK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511717.69_warc_CC-MAIN-20231005012006-20231005042006-00797.warc.gz\"}"} |
https://rpg.stackexchange.com/questions/190985/what-is-the-average-damage-of-a-potion-of-poison?noredirect=1 | [
"# What is the average damage of a Potion of Poison?\n\nThe potion of poison (DMG p.188) is an uncommon magic item that deals poison damage over time to anyone who drinks it. However, the way it deals damage is rather complicated, with multiple saves and reducing damage.\n\nHow much damage would you expect a potion of poison to deal (that is, what is the average damage)? You can consider the case where the victim fails the initial saving throw separately to the case where the result of the initial save is unknown (because passing the initial save deals just 3d6).\n\nDouble bonus points if you can provide more detailed information than just the mean damage (like a statistical distribution of damage).\n\nFor reference, the potion of poison functions as follows:\n\nIf you drink it, you take 3d6 poison damage, and you must succeed on a DC 13 Constitution saving throw or be poisoned. At the start of each of your turns while you are poisoned in this way, you take 3d6 poison damage. At the end of each of your turns, you can repeat the saving throw. On a successful save, the poison damage you take on your subsequent turns decreases by 1d6. The poison ends when the damage decreases to 0.\n\n• Did you have a chance to review my answer? Dec 30, 2021 at 12:21\n\nWe have to build this case-by-case. First, we will build the basic progression of the damage dice assumming we fail the first two saves, then build the full case backwards from there.\n\nHere's is the order of events:\n\n1. It is our turn, and we drink the potion and take 3d6 damage.\n2. We fail the first saving throw.\n3. Our turn ends, so we make save to reduce the subsequent damage to 2d6, which we fail.\n4. Beginning of our next turn, we take 3d6 damage.\n\nWe will first calculate the average from this point forward. There are three stages to ridding ourselves of this poison: a 3d6 stage, a 2d6 stage, and a 1d6 stage. The average damage for each stage is modeled by a geometric distrubtion with probability of success $$\\p\\$$ and probability of failure $$\\(1-p)\\$$. A geometric distribution, when counting the number of failures before success, has an expected value of $$\\\\displaystyle{\\frac{1-p}{p}}\\$$. The average damage of the 1d6 stage is $$\\\\displaystyle{\\frac{1d6(1-p)}{p}+0d6}\\$$: on a failed saving throw we take another 1d6 damage, on a success we take 0 damage.\n\nHowever, the 2d6 stage is a bit different. On a failed save, we take 2d6 damage, but on a successful save we take 1d6 damage before entering the 1d6 stage. What I mean here is that the 1d6 stage is defined as \"saving throw then resulting damage\". If we succeed on a save in the 2d6 stage, we take 1d6 damage prior to making any saves in the 1d6 stage. So the expected damage from the 2d6 stage is: $$\\\\displaystyle{\\frac{2d6(1-p)}{p}+1d6}\\$$: we take 2d6 damage for an average of $$\\\\displaystyle{\\frac{1-p}{p}}\\$$ trials, and then a guaranteed 1d6 damage before entering the 1d6 stage. So the average damage for the 2d6 and 1d6 stages together is:\n\n$$\\frac{2d6(1-p)}{p}+1d6+\\frac{1d6(1-p)}{p}+0d6.$$\n\nExtending this to the 3d6 stage, we similarly take 2d6 upon a successful save prior to entering the 2d6 stage. So the damage from all three stages is given by:\n\n$$\\frac{3d6(1-p)}{p}+2d6+\\frac{2d6(1-p)}{p}+1d6+\\frac{1d6(1-p)}{p}+0d6$$\n\nThe interesting thing here (and the thing that took me much too long to realize) is that the 2d6 and 1d6 between phases is guaranteed damage once you fail the initial saving throw for the potion.\n\nFrom here, it is easy to adjust this last expression to present the full expected damage from drinking the potion. The first 3d6 is guaranteed, and we only take subsequent damage if we fail the initial save, with probability $$\\(1-p)\\$$, so the average damage is:\n\n$$3d6+(1-p)\\displaystyle{\\left(\\frac{3d6(1-p)}{p}+2d6+\\frac{2d6(1-p)}{p}+1d6+\\frac{1d6(1-p)}{p}+0d6\\right)},$$\n\nwith some algebra, using $$\\\\displaystyle{1+\\frac{1-p}{p}=\\frac{1}{p}}\\$$, we obtain:\n\n$$3d6+(1-p)\\displaystyle{\\left(\\frac{3d6(1-p)}{p}+\\frac{2d6}{p}+\\frac{1d6}{p}\\right)}.$$\n\nThings change if we consume the potion on someone else's turn, because we would not get to make the save to reduce the damage before entering the 3d6 stage. The order of events is:\n\n1. On someone else's turn, Drink the potion, taking 3d6 damage.\n2. Attempt saving throw, failing with probability $$\\(1-p)\\$$.\n3. Beginning of our turn, take 3d6 damage.\n4. End of our turn, make save to reduce damage.\n\nIn this scenario, if you fail the initial save, another 3d6 is guaranteed. So the average damage in this case would be:\n\n$$3d6+(1-p)\\displaystyle{\\left(3d6+\\frac{3d6(1-p)}{p}+2d6+\\frac{2d6(1-p)}{p}+1d6+\\frac{1d6(1-p)}{p}+0d6\\right)},$$\n\nand again, with some algebra, we obtain:\n\n$$3d6+(1-p)\\displaystyle{\\left(\\frac{3d6}{p}+\\frac{2d6}{p}+\\frac{1d6}{p}\\right)}.$$\n\nHere is a table comparing the two cases with real values:\n\nCON Save p On Turn Off Turn Off Turn % Increase\n-7 0.05 399.5 409.5 2.5%\n-6 0.10 190.1 199.5 5.0%\n-5 0.15 120.6 129.5 7.4%\n-4 0.20 86.1 94.5 9.8%\n-3 0.25 65.6 73.5 12.0%\n-2 0.30 52.2 59.5 14.1%\n-1 0.35 42.7 49.5 16.0%\n0 0.40 35.7 42.0 17.6%\n1 0.45 30.4 36.2 19.0%\n2 0.50 26.3 31.5 20.0%\n3 0.55 23.0 27.7 20.6%\n4 0.60 20.3 24.5 20.7%\n5 0.65 18.1 21.8 20.3%\n6 0.70 16.4 19.5 19.3%\n7 0.75 14.9 17.5 17.6%\n8 0.80 13.7 15.8 15.4%\n9 0.85 12.6 14.2 12.5%\n10 0.90 11.8 12.8 8.9%\n11 0.95 11.1 11.6 4.7%\n12+ 1.00 10.5 10.5 0.0%\n\nAnd here is a chart showcasing the magnitude of the difference between disadvantage and advantage for non-negative CON save bonuses:",
null,
"As you can see, having disadvantage on the saves against the poison can be very perilous when your CON save bonus is low.\n\nAcknowledgements: I would like to thank Eddymage for their significant assistance in working through the math here. Without their help, I would have been confused for a few minutes before moving on without writing up an answer. If this were a paper, they would be a coauthor.\n\n• Shouldn't the case where the second save is failed give the same result as when the potion is drunk off turn (as in both cases you are guaranteed to take the first round of the 3d6 phase, then it progresses normally from there)? The first instance of damage which always happens is baked into the geometric series so shouldn't need to be double-counted. Oct 31, 2021 at 4:06\n• @BBeast In the off-turn scenario, the second set of 3d6 is conditioned only on failing the initial save, so is not part of the 3/p stage. Oct 31, 2021 at 6:08\n• I still think you're double-counting the guaranteed damage. The 1/p expectation value of the geometric distribution is the mean number of trials required to get one success, including the successful trial. The expectation value for the number of failures before getting one success is (1-p)/p (which, if you add 1 to, gets you 1/p). Nov 3, 2021 at 0:03\n• @BBeast Maybe, I’ll look at it again tomorrow. Thanks for the input again. Nov 3, 2021 at 0:24\n• @BBeast Okay it's right this time. Nov 3, 2021 at 13:14\n\nLet us assume that our victim has a probability $$\\p\\$$ of passing the DC 13 Constitution saving throw, and we will assume that $$\\p\\$$ is greater than 0 and less than 1 (that is, passing and failing the save are both possible). Let us also, for simplicity, measure damage in number of d6's (we can convert to actual damage at the end; 1d6 has a mean damage of 3.5).\n\nAlso note that the mean (average) of a discrete probability distribution, where getting $$\\x\\$$ has probability $$\\P(x)\\$$, is given by $$\\sum_x x P(x),$$ where we sum over all values of $$\\x\\$$.\n\nBefore tackling the full problem, let us consider a subset of the problem. Suppose the victim has saved their way down to taking only 1d6 damage at the start of their turns. What is the average damage they will take then? We need to enumerate over each possible scenario. The victim could take 1d6 damage at the start of their turn then pass their save (with probability $$\\p\\$$) at the end of their turn, taking no further damage. The victim could fail one save then pass the second (with probability $$\\p(1-p)\\$$, taking 2d6 damage. And so on. The mean number of d6's taken in the '1d6-per-round' phase is $$\\sum_{n=0}^\\infty (n+1) p (1-p)^n.$$\n\nThis is an arithmetico-geometric sequence. We can solve it with some basic algebraic manipulation.\n\n$$\\sum_{n=0}^\\infty (n+1) p (1-p)^n = \\frac{p}{1-p} \\sum_{n=0}^\\infty (n+1) (1-p)^{n+1} = \\frac{p}{1-p} \\sum_{m=1}^\\infty m (1-p)^m = \\frac{p}{(1-p)} \\frac{(1-p)}{p^2} = \\frac{1}{p}.$$\n\nIn the 1d6-per-round phase, the victim takes an average of $$\\\\frac{1}{p}\\$$ lots of 1d6 damage (remember that $$\\p\\$$ is less than 1, so $$\\1/p\\$$ is greater than 1). It is simple to extrapolate that the 2d6-per-round phase will have a mean of $$\\\\displaystyle\\frac{2}{p}\\$$, and the 3d6-per-round phase will have a mean of $$\\\\displaystyle\\frac{3}{p}\\$$. Because the phases are independent, we are able to simply add together their means for the overall mean.\n\nHowever, there is one tricky point with regards to the round in which the potion is consumed. If the victim drinks the potion on their turn, then the item text implies they get to make a save to reduce the damage before the start of their next turn. This means there is only a $$\\1-p\\$$ chance of entering the 3d6-per-round phase, so the mean damage taken from that phase is $$\\\\displaystyle\\frac{3(1-p)}{p}\\$$.\n\nLet us bring everything together now. If the victim drinks the potion on their turn and fails their initial save, then they take an initial 3d6 damage plus $$\\\\frac{3(1-p)}{p}\\$$ d6 plus $$\\\\frac{2}{p}\\$$ d6 plus $$\\\\frac{1}{p}\\$$ d6 damage, for a total of $$3+\\frac{3(1-p)}{p}+\\frac{2}{p}+\\frac{1}{p} = 3 + \\frac{3(2-p)}{p} = \\frac{6}{p} \\mbox{d6 damage,}$$ or $$\\\\displaystyle\\frac{21}{p}\\$$ damage.\n\nIf we make no assumptions about the initial save, then we get the above damage with probability $$\\1-p\\$$ and just 3d6 damage with probability $$\\p\\$$, for a net result of $$\\\\displaystyle\\frac{6(1-p)}{p} + 3p\\$$ d6 or $$\\10.5\\left(\\displaystyle\\frac{2(1-p)}{p} + p\\right)\\$$ damage.\n\nIf the victim ingests the poison outside their turn (such as with a Ready action, or by having another character administer it), then the mean damage from the 3d6-per-round phase is $$\\\\displaystyle\\frac{3}{p}\\$$ d6. If they fail their initial save, they take $$\\3 + \\displaystyle\\frac{6}{p}\\$$ d6 or $$\\10.5\\left(1+\\displaystyle\\frac{2}{p}\\right)\\$$ damage. If we make no assumptions about the initial save, they take $$\\\\frac{6}{p}-3\\$$ d6 or $$\\10.5\\left(\\displaystyle\\frac{2}{p}-1\\right)\\$$ damage.\n\nLet us consider some concrete values of $$\\p\\$$. The average damage dealt by the potion of poison is (rounded to one decimal place)...\n\nCON Save $$\\p\\$$ On turn, fail first save On turn Off turn, fail first save Off turn\n-7 0.05 420 399.5 430.5 409.5\n-6 0.10 210 190.1 220.5 119.5\n-5 0.15 140 120.6 150.5 129.5\n-4 0.20 105 86.1 115.5 94.5\n-3 0.25 84 65.6 94.5 73.5\n-2 0.30 70 52.2 80.5 59.5\n-1 0.35 60 42.7 70.5 49.5\n+0 0.40 52.5 35.7 63 42\n+1 0.45 46.7 30.4 57.2 36.2\n+2 0.50 42 26.3 52.5 31.5\n+3 0.55 38.2 23.0 48.7 27.7\n+4 0.60 35 20.3 45.5 24.5\n+5 0.65 32.3 18.1 42.8 21.8\n+6 0.70 30 16.4 40.5 19.5\n+7 0.75 28 14.9 38.5 17.5\n+8 0.80 26.3 13.7 36.8 15.8\n+9 0.85 24.7 12.6 35.2 14.2\n+10 0.90 23.3 11.8 33.8 12.8\n+11 0.95 22.1 11.8 33.8 12.8\n>11 1.00 -- 10.5 -- 10.5\n• @Dale Can you support that? Ongoing damage certainly seems like it is supposed to he rerolled each time. Example 1. Example 2. Example 3. Example 4. Aug 22, 2021 at 5:10\n• I tried to do a \\frac pass @medix2 to make it more readable -- I hope I didn't make any typos.\n– Yakk\nAug 22, 2021 at 16:58\n• Can you clarify this passage :\"However, there is one tricky point with regards to the round in which the potion is consumed\" ? It is not clear to me what you mean. Aug 22, 2021 at 17:29\n• @Eddymage I think the point was that a person who drinks the poison on their own turn and fails the initial save would make an additional save before the first turn of lingering damage, while a person who drinks the poison on a different turn and fails the initial save would not get an additional save before their first turn of lingering damage. Aug 22, 2021 at 18:46\n• I think there is a mistake in your computation for the \"consume off turn\" damage. See my answer for what I worked out. Oct 29, 2021 at 17:04\n\n# Full distribution using AnyDice\n\nDouble bonus points if you can provide more detailed information than just the mean damage (like a statistical distribution of damage).\n\nset \"explode depth\" to 100\n\nfunction: potion of poison dice FAIL_SAVE:d {\nresult: 3 * (1 + [explode FAIL_SAVE]) + 2 * (1 + [explode FAIL_SAVE]) + (1 + [explode FAIL_SAVE])\n}\n\noutput [lowest of [potion of poison dice d20+1<13] and 100]",
null,
"This assumes that the potion is drunk during the character's turn and the first save is failed. The output is in terms of the number of damage dice. In terms of damage:\n\noutput [lowest of [lowest of [potion of poison dice d20+1<13] and 100]d6 and 200]",
null,
"## How it works\n\nThis uses the same strategy as my answer to another question. Namely:\n\nThe number of tries consumed by each \"stage\" in the series is independent, so we can just sum them.\n\nFrom here, the number of failures experienced in each stage follows a geometric distribution. This is already well-explained in the other answers so I will not belabor the point here.\n\nWe can compute each of the stages by applying the built-in explode function to a single try at that stage:\n\n• A 0 on a single try represents a success, terminating the explosion and that stage.\n• A 1 on a single try represents a failure, consuming a try and forcing the character to try again, represented by the explosion.\n\nWe also add the one guaranteed instance of damage at each stage (with the initial damage substituting for this in the 3d6 stage).\n\nWe do need to increase the explode depth since AnyDice's default of 2 is too small for this purpose and would only count up to 3 failures per stage.\n\nThe [lowest of ... and 100] is simply to cut off the graph at a reasonable end for visualization and could be omitted if you're just interested in the number of d6s. However, AnyDice does not appear to be super-efficient at computing variable numbers of d6s, so if you want to convert this to the distribution of damage, you may want to keep the dice cap and/or lower the explosion limit to prevent timeouts."
] | [
null,
"https://i.stack.imgur.com/692ci.png",
null,
"https://i.stack.imgur.com/K8hE1.png",
null,
"https://i.stack.imgur.com/21eij.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87057745,"math_prob":0.99612653,"size":4697,"snap":"2023-40-2023-50","text_gpt3_token_len":1715,"char_repetition_ratio":0.1468144,"word_repetition_ratio":0.011004127,"special_character_ratio":0.3808814,"punctuation_ratio":0.14918625,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9909254,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-29T21:30:13Z\",\"WARC-Record-ID\":\"<urn:uuid:8276f7e4-af68-4342-a781-44c20b97fc7b>\",\"Content-Length\":\"198922\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:033aa616-ed7a-408e-b3f4-e3ec7792a084>\",\"WARC-Concurrent-To\":\"<urn:uuid:e634cec0-cf66-4c08-818b-99256f436356>\",\"WARC-IP-Address\":\"104.18.11.86\",\"WARC-Target-URI\":\"https://rpg.stackexchange.com/questions/190985/what-is-the-average-damage-of-a-potion-of-poison?noredirect=1\",\"WARC-Payload-Digest\":\"sha1:5QBRVXP5AJO3FY2DF5DXAVVLK4BAMZ2P\",\"WARC-Block-Digest\":\"sha1:GOZTZAPJP52X33CJ3YNMBC2PZQVPK5D6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510528.86_warc_CC-MAIN-20230929190403-20230929220403-00769.warc.gz\"}"} |
http://marioincudine.info/decimal-place-value-worksheets-with-answers/decimal-activities-place-value-of-decimals-worksheets-grade-inspirational-best-wit-decimal-place-value-worksheets-with-answers-decimal-place-value-worksheets-5th-grade-with-answers/ | [
"## Decimal Activities Place Value Of Decimals Worksheets Grade Inspirational Best Wit Decimal Place Value Worksheets With Answers Decimal Place Value Worksheets 5th Grade With Answers",
null,
"decimal activities place value of decimals worksheets grade inspirational best wit decimal place value worksheets with answers decimal place value worksheets 5th grade with answers.\n\noperations with decimal place value worksheets rounding decimals worksheet answers 5th grade answer key,decimal place value worksheets with answers answer key worksheet 5th grade,decimal place value worksheets with answer key for practice 5th grade answers worksheet,decimal place value worksheet answers distributive property worksheets grade best of with answer key 5th,decimal place value worksheets with answer key worksheet answers 5th grade understanding values activity sheet,decimal place value worksheets 5th grade with answers answer key worksheet,decimal place value worksheets 5th grade with answers worksheet math answer key,decimal place value worksheet answers worksheets 5th grade with decimals and answer key,decimal place value worksheets with answer key 5th grade answers worksheet,decimal place value worksheets grade 5th with answers worksheet answer key."
] | [
null,
"http://marioincudine.info/wp-content/uploads/2019/05/decimal-activities-place-value-of-decimals-worksheets-grade-inspirational-best-wit-decimal-place-value-worksheets-with-answers-decimal-place-value-worksheets-5th-grade-with-answers.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.84643155,"math_prob":0.9744429,"size":1058,"snap":"2019-13-2019-22","text_gpt3_token_len":185,"char_repetition_ratio":0.29127136,"word_repetition_ratio":0.17391305,"special_character_ratio":0.15406427,"punctuation_ratio":0.06790123,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970443,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-26T04:06:22Z\",\"WARC-Record-ID\":\"<urn:uuid:14c1f0e7-95c4-4e25-8cb4-f23ed09cf3e2>\",\"Content-Length\":\"61582\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:43a2b849-c9cb-4731-8eff-1dbd49a223fe>\",\"WARC-Concurrent-To\":\"<urn:uuid:604a80d5-8193-4636-ad5d-0a85d621cf76>\",\"WARC-IP-Address\":\"104.31.74.59\",\"WARC-Target-URI\":\"http://marioincudine.info/decimal-place-value-worksheets-with-answers/decimal-activities-place-value-of-decimals-worksheets-grade-inspirational-best-wit-decimal-place-value-worksheets-with-answers-decimal-place-value-worksheets-5th-grade-with-answers/\",\"WARC-Payload-Digest\":\"sha1:QQDK5JTX35TBYNGMEH5JXZ6PLOHDT23K\",\"WARC-Block-Digest\":\"sha1:XGGGGNXGIJEWFL3DCIY5FXGPXULOPGJG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232258621.77_warc_CC-MAIN-20190526025014-20190526051014-00363.warc.gz\"}"} |
https://aspe.hhs.gov/report/long-term-impact-adolescent-risky-behaviors-and-family-environment/multinomial-logistic-regression | [
"# The Long Term Impact of Adolescent Risky Behaviors and Family Environment. Multinomial Logistic Regression\n\nEstimation of unordered-choice dependent variables requires a multinomial logistic model (Greene, 2000). It is intended for use when the dependent variable takes on more than two outcomes and the outcomes have no natural ordering. In our study, the family formation variable, \"fertility and marital status at the age of 33\", takes on six outcomes without natural ordering. Similar to logistic regression, the multinomial logistic regression provides a measure of the probability of one outcome relative to the reference outcome, known as relative risk. However, it is more difficult to interpret the relative risk from multinomial logistic regression since there are multiple equations. As an alternative, prediction is used to aid interpretation. We use the \"method of recycled predictions\", in which we vary characteristics of interest across the whole data set and average the prediction (STATA Reference, version 7). For example, in our data set we have those who initiated sex at ages 11-15, 16-17, 18-19, and those who had not initiated sex by age 19. We first assume that all respondents initiated sex at ages 11-15 but hold their other characteristics constant. We then calculate the probabilities for each fertility and marriage outcome. We repeat this exercise for the other three initiation groups. The difference between any two sets of calculated probabilities, then, is the difference due to different ages of sex initiation, holding other characteristics constant. For example, the predicted probabilities of \"never married with children\" for the four age categories of sex initiation are 0.112, 0.087, 0.075, and 0.042, respectively."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9206226,"math_prob":0.9581724,"size":1649,"snap":"2020-10-2020-16","text_gpt3_token_len":330,"char_repetition_ratio":0.10577507,"word_repetition_ratio":0.0,"special_character_ratio":0.20982413,"punctuation_ratio":0.13,"nsfw_num_words":5,"has_unicode_error":false,"math_prob_llama3":0.98225856,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-03T04:24:19Z\",\"WARC-Record-ID\":\"<urn:uuid:d7973649-b1a1-4d36-aa4f-9ef18524bea8>\",\"Content-Length\":\"52596\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:daa20ab0-ffc3-416a-b9ca-8954d841ea02>\",\"WARC-Concurrent-To\":\"<urn:uuid:197b4bff-414a-4dc0-81bf-6a9d2c899697>\",\"WARC-IP-Address\":\"23.21.93.13\",\"WARC-Target-URI\":\"https://aspe.hhs.gov/report/long-term-impact-adolescent-risky-behaviors-and-family-environment/multinomial-logistic-regression\",\"WARC-Payload-Digest\":\"sha1:HSKVYWRHKWIB2TQTLZGZRWI7WXNL4KUX\",\"WARC-Block-Digest\":\"sha1:BETLZYRMXUPL4ZY2WMRAB6Q6RZP63PZC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370510287.30_warc_CC-MAIN-20200403030659-20200403060659-00266.warc.gz\"}"} |
http://lambda.jimpryor.net/git/gitweb.cgi?p=lambda.git;a=blob_plain;f=topics/week3_what_is_computation.mdwn;hb=47e08f1ea539eb5305efe8c36d68c05630bce36b | [
"#What is computation?# The folk notion of computation involves taking a complicated expression and replacing it with an equivalent simpler expression. 4 + 3 == 7 This equation can be interpreted as expressing the thought that the complex expression `4 + 3` evaluates to `7`. In this case, the evaluation of the expression involves computing a sum. There is a clear sense in which the expression `7` is simpler than the expression `4 + 3`: `7` is syntactically simple, and `4 + 3` is syntactically complex. It's worth pausing a moment and wondering why we feel that replacing a complex expression like `4 + 3` with a simpler expression like `7` feels like we've accomplished something. If they really are equivalent, why shouldn't we consider them to be equally valuable, or even to prefer the longer expression? For instance, should we prefer `2^9`, or `512`? Likewise, in the realm of logic, why should we ever prefer `B` to the conjunction of `A` with `A ⊃ B`? The question to ask here is whether our intuitions about what counts as more evaluated always tracks simplicity of expression, or whether it tracks what is more useful to us in a given larger situation. But even deciding which expression ought to count as simpler is not always so clear. ##Church arithmetic## In our system of computing with Church encodings, we have the following representations: 3 ≡ \\f z. f (f (f z)) 4 ≡ \\f z. f (f (f (f z))) 7 ≡ \\f z. f (f (f (f (f (f (f z)))))) The addition of `4` and `3`, then, clearly needs to just insert `3`'s string of `f`s in front of `4`'s string of `f`s. That guides our implementation of addition: add ≡ \\l r. \\f z. r f (l f z) add 4 3 ≡ (\\l r. \\f z. r f (l f z)) 4 3 ~~> \\f z. 3 f (4 f z) ≡ \\f z. (\\f z. f (f (f z))) f (4 f z) ~~> \\f z. f (f (f (4 f z))) ≡ \\f z. f (f (f ((\\f z. f (f (f (f z))) f z)))) ~~> \\f z. f (f (f (f (f (f (f z)))))) ≡ 7 as desired. Is there still a sense in which the encoded version of `add 4 3` is simpler than the encoded version of `7`? Well, yes: once the numerals `4` and `3` have been replaced with their encodings, the encoding of `add 4 3` contains more symbols than the encoding of `7`. But now consider multiplication: mul ≡ \\l r. \\f z. r (l f) z mul 4 3 ≡ (\\l r. \\f z. r (l f) z) 4 3 ~~> \\f z. 3 (4 f) z ≡ \\f z. (\\f z. f (f (f z))) (4 f) z ~~> \\f z. (4 f) ((4 f) (4 f z)) ≡ \\f z. ((\\f z. f (f (f (f z)))) f) (((\\f z. f (f (f (f z)))) f) ((\\f z. f (f (f (f z)))) f z)) ~~> \\f z. (\\z. f (f (f (f z)))) ((\\z. f (f (f (f z)))) (f (f (f (f z))))) ~~> \\f z. (\\z. f (f (f (f z)))) (f (f (f (f (f (f (f (f z)))))))) ~~> \\f z. f (f (f (f (f (f (f (f (f (f (f (f z))))))))))) ≡ 12 Is the final result simpler? This time, the answer is not so straightforward. Compare the starting expression with the final expression: mul 4 3 (\\l r. \\f z. r (l f) z) (\\f z. f (f (f (f z)))) (\\f z. f (f (f z)))) ~~> 12 (\\f z. f (f (f (f (f (f (f (f (f (f (f (f z)))))))))))) And if we choose different numbers, the result is even less clear: mul 6 3 (\\l r. \\f z. r (l f) z) (\\f z. f ( f (f (f (f (f z)))))) (\\f z. f (f (f z)))) ~~> 18 (\\f z. f (f (f (f (f (f (f (f (f (f (f (f (f (f (f (f (f (f z)))))))))))))))))) On the on hand, there are more symbols in the encoding of `18` than in the encoding of `mul 6 3`. On the other hand, there is more complexity (speaking pre-theoretically) in the encoding of `mul 6 3`, since the encoding of `18` is just a uniform sequence of nested `f`s. This example shows that computation can't be just simplicity as measured by the number of symbols in the representation. There is still some sense in which the evaluated expression is simpler, but the right way to characterize \"simpler\" is elusive. One possibility is to define simpler in terms of irreversability. The reduction rules of the lambda calculus define an non-symmetric relation over terms: for any given redex, there is a unique reduced term (up to alphabetic variance). But for any given term, there will be many redexes that reduce to that term. ((\\x. x x) y) ~~> y y ((\\x x) y y) ~~> y y (y ((\\x x) y)) ~~> y y etc. Likewise, in the arithmetic example, there is only one number that corresponds to the sum of `4` and `3` (namely, `7`). But there are many ways to add numbers to get `7`: `4+3`, `3+4`, `5+2`, `2+5`, `6+1`, `1+6`, `7+0` and `0+7`. And that's only looking at sums. So the unevaluated expression contains information that is missing from the evaluated value: information about *how* that value was arrived at. So this suggests the following way of thinking about what counts as evaluated: > Given two expressions such that one reduces to the other, the more evaluated one is the one that contains less information. This definition is problematic, though, if we try to define the amount of information using, say, [[!wikipedia Komolgorov complexity]]. Ultimately, we have to decide that the reduction rules determine what counts as evaluated. If we're lucky, that will align well with our intuitive desires about what should count as simpler. But we're not always lucky. In particular, although beta reduction in general lines up well with our intuitive sense of simplification, there are pathological examples where the results do not align so well: (\\x. x x) (\\x. x x) ~~> (\\x. x x) (\\x. x x) ~~> (\\x. x x) (\\x. x x) ~~> ... In this example, reduction returns the exact same lambda term. There is no simplification at all. (As we mentioned in class, the term `(\\x. x x)` is often referred to in these discussions as (little) ω or \"omega\", or sometimes **M**; and its self-application `ω ω`, displayed above, is called (big) Ω or \"Omega\".) Even worse, consider this term: (\\x. x x x) (\\x. x x x) ~~> (\\x. x x x) (\\x. x x x) (\\x. x x x) ~~> ... Here, the \"reduced\" form is longer and more complex by any reasonable measure. We may have to settle for the idea that a well-chosen reduction system will characterize our intuitive notion of evaluation in most cases, or in some useful class of non-pathological cases. These are some of the deeper issues to keep in mind as we discuss the ins and outs of reduction strategies."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.848585,"math_prob":0.99854076,"size":6055,"snap":"2022-40-2023-06","text_gpt3_token_len":1928,"char_repetition_ratio":0.1902165,"word_repetition_ratio":0.16334991,"special_character_ratio":0.34104046,"punctuation_ratio":0.121391565,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995389,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-25T14:03:07Z\",\"WARC-Record-ID\":\"<urn:uuid:f38635b0-9842-4425-b065-741da5aee643>\",\"Content-Length\":\"6930\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5ebed031-5586-46b6-ad69-cee63a0a2a93>\",\"WARC-Concurrent-To\":\"<urn:uuid:282f5a43-6eda-4957-ae43-6f384b9ed263>\",\"WARC-IP-Address\":\"45.79.164.50\",\"WARC-Target-URI\":\"http://lambda.jimpryor.net/git/gitweb.cgi?p=lambda.git;a=blob_plain;f=topics/week3_what_is_computation.mdwn;hb=47e08f1ea539eb5305efe8c36d68c05630bce36b\",\"WARC-Payload-Digest\":\"sha1:PQBCJVQEBKCMWLDTUNB7QGU4PST7LOHI\",\"WARC-Block-Digest\":\"sha1:3GCIBW2WEUXE6NMFTVWYQYZUFY62PWKO\",\"WARC-Identified-Payload-Type\":\"text/plain\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334579.46_warc_CC-MAIN-20220925132046-20220925162046-00496.warc.gz\"}"} |
https://www.colorhexa.com/61ab86 | [
"# #61ab86 Color Information\n\nIn a RGB color space, hex #61ab86 is composed of 38% red, 67.1% green and 52.5% blue. Whereas in a CMYK color space, it is composed of 43.3% cyan, 0% magenta, 21.6% yellow and 32.9% black. It has a hue angle of 150 degrees, a saturation of 30.6% and a lightness of 52.5%. #61ab86 color hex could be obtained by blending #c2ffff with #00570d. Closest websafe color is: #669999.\n\n• R 38\n• G 67\n• B 53\nRGB color chart\n• C 43\n• M 0\n• Y 22\n• K 33\nCMYK color chart\n\n#61ab86 color description : Mostly desaturated dark cyan - lime green.\n\n# #61ab86 Color Conversion\n\nThe hexadecimal color #61ab86 has RGB values of R:97, G:171, B:134 and CMYK values of C:0.43, M:0, Y:0.22, K:0.33. Its decimal value is 6400902.\n\nHex triplet RGB Decimal 61ab86 `#61ab86` 97, 171, 134 `rgb(97,171,134)` 38, 67.1, 52.5 `rgb(38%,67.1%,52.5%)` 43, 0, 22, 33 150°, 30.6, 52.5 `hsl(150,30.6%,52.5%)` 150°, 43.3, 67.1 669999 `#669999`\nCIE-LAB 64.473, -31.743, 11.953 23.794, 33.387, 27.743 0.28, 0.393, 33.387 64.473, 33.919, 159.365 64.473, -34.578, 21.807 57.782, -27.612, 11.979 01100001, 10101011, 10000110\n\n# Color Schemes with #61ab86\n\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #ab6186\n``#ab6186` `rgb(171,97,134)``\nComplementary Color\n• #61ab61\n``#61ab61` `rgb(97,171,97)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #61abab\n``#61abab` `rgb(97,171,171)``\nAnalogous Color\n• #ab6161\n``#ab6161` `rgb(171,97,97)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #ab61ab\n``#ab61ab` `rgb(171,97,171)``\nSplit Complementary Color\n• #ab8661\n``#ab8661` `rgb(171,134,97)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #8661ab\n``#8661ab` `rgb(134,97,171)``\n• #86ab61\n``#86ab61` `rgb(134,171,97)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #8661ab\n``#8661ab` `rgb(134,97,171)``\n• #ab6186\n``#ab6186` `rgb(171,97,134)``\n• #427d60\n``#427d60` `rgb(66,125,96)``\n• #4b8e6d\n``#4b8e6d` `rgb(75,142,109)``\n• #549e79\n``#549e79` `rgb(84,158,121)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #72b493\n``#72b493` `rgb(114,180,147)``\n• #82bda0\n``#82bda0` `rgb(130,189,160)``\n• #93c6ac\n``#93c6ac` `rgb(147,198,172)``\nMonochromatic Color\n\n# Alternatives to #61ab86\n\nBelow, you can see some colors close to #61ab86. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #61ab74\n``#61ab74` `rgb(97,171,116)``\n• #61ab7a\n``#61ab7a` `rgb(97,171,122)``\n• #61ab80\n``#61ab80` `rgb(97,171,128)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #61ab8c\n``#61ab8c` `rgb(97,171,140)``\n• #61ab92\n``#61ab92` `rgb(97,171,146)``\n• #61ab99\n``#61ab99` `rgb(97,171,153)``\nSimilar Colors\n\n# #61ab86 Preview\n\nThis text has a font color of #61ab86.\n\n``<span style=\"color:#61ab86;\">Text here</span>``\n#61ab86 background color\n\nThis paragraph has a background color of #61ab86.\n\n``<p style=\"background-color:#61ab86;\">Content here</p>``\n#61ab86 border color\n\nThis element has a border color of #61ab86.\n\n``<div style=\"border:1px solid #61ab86;\">Content here</div>``\nCSS codes\n``.text {color:#61ab86;}``\n``.background {background-color:#61ab86;}``\n``.border {border:1px solid #61ab86;}``\n\n# Shades and Tints of #61ab86\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #050806 is the darkest color, while #fbfdfc is the lightest one.\n\n• #050806\n``#050806` `rgb(5,8,6)``\n• #0b1510\n``#0b1510` `rgb(11,21,16)``\n• #12221a\n``#12221a` `rgb(18,34,26)``\n• #192f24\n``#192f24` `rgb(25,47,36)``\n• #203c2e\n``#203c2e` `rgb(32,60,46)``\n• #274938\n``#274938` `rgb(39,73,56)``\n• #2d5541\n``#2d5541` `rgb(45,85,65)``\n• #34624b\n``#34624b` `rgb(52,98,75)``\n• #3b6f55\n``#3b6f55` `rgb(59,111,85)``\n• #427c5f\n``#427c5f` `rgb(66,124,95)``\n• #498969\n``#498969` `rgb(73,137,105)``\n• #4f9572\n``#4f9572` `rgb(79,149,114)``\n• #56a27c\n``#56a27c` `rgb(86,162,124)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #6eb290\n``#6eb290` `rgb(110,178,144)``\n• #7bb99a\n``#7bb99a` `rgb(123,185,154)``\n• #87bfa3\n``#87bfa3` `rgb(135,191,163)``\n``#94c6ad` `rgb(148,198,173)``\n• #a1cdb7\n``#a1cdb7` `rgb(161,205,183)``\n• #aed4c1\n``#aed4c1` `rgb(174,212,193)``\n• #bbdbcb\n``#bbdbcb` `rgb(187,219,203)``\n• #c7e1d4\n``#c7e1d4` `rgb(199,225,212)``\n• #d4e8de\n``#d4e8de` `rgb(212,232,222)``\n• #e1efe8\n``#e1efe8` `rgb(225,239,232)``\n• #eef6f2\n``#eef6f2` `rgb(238,246,242)``\n• #fbfdfc\n``#fbfdfc` `rgb(251,253,252)``\nTint Color Variation\n\n# Tones of #61ab86\n\nA tone is produced by adding gray to any pure hue. In this case, #7d8f86 is the less saturated color, while #0dff86 is the most saturated one.\n\n• #7d8f86\n``#7d8f86` `rgb(125,143,134)``\n• #749886\n``#749886` `rgb(116,152,134)``\n• #6aa286\n``#6aa286` `rgb(106,162,134)``\n• #61ab86\n``#61ab86` `rgb(97,171,134)``\n• #58b486\n``#58b486` `rgb(88,180,134)``\n• #4ebe86\n``#4ebe86` `rgb(78,190,134)``\n• #45c786\n``#45c786` `rgb(69,199,134)``\n• #3cd086\n``#3cd086` `rgb(60,208,134)``\n• #32da86\n``#32da86` `rgb(50,218,134)``\n• #29e386\n``#29e386` `rgb(41,227,134)``\n• #20ec86\n``#20ec86` `rgb(32,236,134)``\n• #17f586\n``#17f586` `rgb(23,245,134)``\n• #0dff86\n``#0dff86` `rgb(13,255,134)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #61ab86 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5951225,"math_prob":0.6671394,"size":3732,"snap":"2021-43-2021-49","text_gpt3_token_len":1622,"char_repetition_ratio":0.1362661,"word_repetition_ratio":0.011009174,"special_character_ratio":0.55600214,"punctuation_ratio":0.23292273,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97662306,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-28T12:35:06Z\",\"WARC-Record-ID\":\"<urn:uuid:863a66de-79cb-45a6-8af7-b9bd6bce15cf>\",\"Content-Length\":\"36223\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3ff49488-d3f2-4f2a-9c67-1a94deb43fc8>\",\"WARC-Concurrent-To\":\"<urn:uuid:ef6e168a-87d3-44e4-9b8f-bea30149583c>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/61ab86\",\"WARC-Payload-Digest\":\"sha1:J7FVE4VJRFX5Z3IPZ6M5RTDGLCZXQAEG\",\"WARC-Block-Digest\":\"sha1:ET5J32H7576UX5EZ2W6MJQ7MDJHTRKBR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323588284.71_warc_CC-MAIN-20211028100619-20211028130619-00132.warc.gz\"}"} |
https://brainmass.com/math/linear-transformation/maximizing-revenue-example-problem-158673 | [
"Explore BrainMass\n\n# Maximizing Revenue\n\nNot what you're looking for? Search our solutions OR ask your own Custom question.\n\nThis content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!\n\nThe manager of a bicycle shop has found that, at a price (in dollars) of p(x) = 150 - x/4 per bicycle, x bicycles will be sold.\n\na. Find an expression for the total revenue from the sale of x bicycles.(revenue = demand x price)\n\nb. Find the number of bicycle sales that leads to maximum revenue.\n\nc. Find the maximum revenue.\n\n© BrainMass Inc. brainmass.com March 4, 2021, 8:18 pm ad1c9bdddf\nhttps://brainmass.com/math/linear-transformation/maximizing-revenue-example-problem-158673\n\n#### Solution Preview\n\nThe manager of a bicycle shop has found that, at a price (in dollars) of p(x) = 150 - x/4 per bicycle, x bicycles will be sold.\n\na. find an expression for the total revenue from the sale of x bicycles.(revenue = demand x price)\n\nSolution. Denote by R(x) the total ...\n\n#### Solution Summary\n\nDerivatives are used to find maximum revenue. The solution is detailed and well presented.\n\n\\$2.49"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89586216,"math_prob":0.81563735,"size":996,"snap":"2021-21-2021-25","text_gpt3_token_len":254,"char_repetition_ratio":0.14012097,"word_repetition_ratio":0.46153846,"special_character_ratio":0.24899599,"punctuation_ratio":0.14851485,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9763448,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-13T02:02:55Z\",\"WARC-Record-ID\":\"<urn:uuid:6840d884-6c0b-4ddc-8bb0-644676f41dcc>\",\"Content-Length\":\"332776\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2413786a-4e82-4a52-a829-5bce10b7d68d>\",\"WARC-Concurrent-To\":\"<urn:uuid:5c59a16b-20ab-4de8-9c90-1a9d1c9ee7e8>\",\"WARC-IP-Address\":\"104.26.4.245\",\"WARC-Target-URI\":\"https://brainmass.com/math/linear-transformation/maximizing-revenue-example-problem-158673\",\"WARC-Payload-Digest\":\"sha1:275UV7H6GLDSUBBYGW6GVI5OAOUMEPTD\",\"WARC-Block-Digest\":\"sha1:56SS4PWHVKL2OIJS4ILDMF2OI3MYJPGB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487598213.5_warc_CC-MAIN-20210613012009-20210613042009-00129.warc.gz\"}"} |
https://findthefactors.com/2014/11/20/297-and-level-2/ | [
"# 297 and Level 2\n\n• 297 is a composite number.\n• Prime factorization: 297 = 3 x 3 x 3 x 11 which can be written 297 = 3³ x 11\n• The exponents in the prime factorization are 3 and 1. Adding one to each and multiplying we get (3 + 1)(1 + 1) = 4 x 2 = 8. Therefore 297 has exactly 8 factors.\n• Factors of 297: 1, 3, 9, 11, 27, 33, 99, 297\n• Factor pairs: 297 = 1 x 297, 3 x 99, 9 x 33, or 11 x 27\n• Taking the factor pair with the largest square number factor, we get √297 = (√9)(√33) = 3√33 ≈ 17.234",
null,
"This multiplication table has only 14 clues. Is that enough to complete it?",
null,
"Print the puzzles or type the factors on this excel file: 12 Factors 2014-11-17",
null,
"## One thought on “297 and Level 2”\n\n1.",
null,
"Steve Morris\n\nYes it is 🙂\n\nThis site uses Akismet to reduce spam. Learn how your comment data is processed."
] | [
null,
"https://i1.wp.com/findthefactors.com/wp-content/uploads/2014/11/297-factor-pairs.jpg",
null,
"https://i0.wp.com/findthefactors.com/wp-content/uploads/2014/11/2014-46-level-2.jpg",
null,
"https://i0.wp.com/findthefactors.com/wp-content/uploads/2014/11/2014-46-level-2-factors.jpg",
null,
"https://secure.gravatar.com/avatar/4194f11093a96bd7c1655a140dd3e782",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8525965,"math_prob":0.9891627,"size":680,"snap":"2020-45-2020-50","text_gpt3_token_len":248,"char_repetition_ratio":0.12130178,"word_repetition_ratio":0.0,"special_character_ratio":0.43970588,"punctuation_ratio":0.13580246,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9876688,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,7,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-27T08:19:35Z\",\"WARC-Record-ID\":\"<urn:uuid:deb683e9-fba8-487e-806d-3322e9ff0880>\",\"Content-Length\":\"45535\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2cabe031-b1ca-4a6d-87a2-84c98a76812d>\",\"WARC-Concurrent-To\":\"<urn:uuid:1501b4aa-d07c-4a28-bbdc-84bafb18cd60>\",\"WARC-IP-Address\":\"192.0.78.153\",\"WARC-Target-URI\":\"https://findthefactors.com/2014/11/20/297-and-level-2/\",\"WARC-Payload-Digest\":\"sha1:GXJPN5QAZ52ACWKFOK4ISB2XP56TV7KI\",\"WARC-Block-Digest\":\"sha1:J5J5DENZZNKBTLPZBHTWTXT6KTULWCB7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141191511.46_warc_CC-MAIN-20201127073750-20201127103750-00185.warc.gz\"}"} |
https://www.bankibps.com/2013/06/cds-exam-question.html | [
"# CDS Exam Question – CDS Exam Preparation Question Answer\n\nQ1. What is the value of k will make the expression 4k2 + 12k + k a perfect square? 5 7 8 9 cds exam question Q2. If one root of the equation x^2/a + x/b + 1/c = 0 is reciprocal of the other, then which one of the following is correct? a=b b=c ac=1 a=c Q3. If f(x) is a polynomial with constant term 10 having a factor (x-k) where k is an integer, then what is the possible value of k? -20 20 8 5\nAptitude",
null,
"",
null,
""
] | [
null,
"https://1.bp.blogspot.com/-e5qCi7J1Idw/UbbI4kh-FZI/AAAAAAAAIYg/Z5DAk7OYnPo/s1600/CDS_11_06_2013_01.gif",
null,
"https://3.bp.blogspot.com/-9nyerlLSjrY/UbbIx4gFdFI/AAAAAAAAIYY/Pi23xjuP1Hw/s1600/CDS_11_06_2013_02.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.886572,"math_prob":0.99444443,"size":857,"snap":"2021-43-2021-49","text_gpt3_token_len":224,"char_repetition_ratio":0.23563892,"word_repetition_ratio":0.026143791,"special_character_ratio":0.25320888,"punctuation_ratio":0.10497238,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99981576,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-25T12:36:41Z\",\"WARC-Record-ID\":\"<urn:uuid:0764384e-8d3b-4dea-9f75-e9f910c2b9b1>\",\"Content-Length\":\"61444\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:65c03a5a-ce2c-43f9-9673-9e167927fdcb>\",\"WARC-Concurrent-To\":\"<urn:uuid:94c72849-5df1-4335-8f5e-10f0dc4c3d15>\",\"WARC-IP-Address\":\"142.251.45.115\",\"WARC-Target-URI\":\"https://www.bankibps.com/2013/06/cds-exam-question.html\",\"WARC-Payload-Digest\":\"sha1:KRUCG74KP25SIC7GFZW7UGUBN25TJ5UL\",\"WARC-Block-Digest\":\"sha1:RDT5VGGKPDK36CLU4RPKAY6LFAPUUY6C\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587711.69_warc_CC-MAIN-20211025123123-20211025153123-00279.warc.gz\"}"} |
https://brilliant.org/practice/geometry-roots-of-unity/?subtopic=complex-numbers&chapter=de-moivres-theorem | [
"",
null,
"Algebra\n\n# Roots of Unity Geometry",
null,
"A \"hop\" is a movement of 4 sides at a time counterclockwise around the regular nonagon above. From the starting point, What is the minimum numbers of \"hops\" it will take to end up back at the starting point?\n\nA regular hexagon has a vertex at $(1,0)$ and has its centroid at the origin. Which of these is another coordinate of the hexagon?\n\nRegular polygons are placed on the coordinate plane such that they each have a vertex at $(1,0)$, and centroid at the origin. There is one regular $n$-gon for each value of $n$ between $3$ and $50$, inclusive.\n\nHow many values of $n$ are there such that the $n$-gon does not share any vertex other than $(1,0)$ with any of the other $n$-gons?\n\nThe point $(5,-3)$ is rotated $\\dfrac{\\pi}{4}$ radians counterclockwise about the point $(2,4)$. What is the resulting image?\n\nEach of the partial sums $\\sum\\limits_{k=1}^{n}{e^{k\\pi i/3}}$ is graphed on the complex plane for $n\\in\\{1,2,3,4,5,6\\}$.\n\nWhich of the $6^\\text{th}$ roots of unity coincides with one of these partial sums?\n\n×\n\nProblem Loading...\n\nNote Loading...\n\nSet Loading..."
] | [
null,
"https://ds055uzetaobb.cloudfront.net/brioche/chapter/Roots%20of%20Unity-pjciMh.png",
null,
"https://ds055uzetaobb.cloudfront.net/brioche/uploads/Cb3F6nYAvo-nonagon-hops.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9365386,"math_prob":0.9997528,"size":1022,"snap":"2021-04-2021-17","text_gpt3_token_len":230,"char_repetition_ratio":0.11198428,"word_repetition_ratio":0.06557377,"special_character_ratio":0.21819961,"punctuation_ratio":0.13679245,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995685,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,8,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-12T16:20:45Z\",\"WARC-Record-ID\":\"<urn:uuid:264f6630-c158-47b3-a9ca-23cbc1842259>\",\"Content-Length\":\"106358\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:974a142a-70af-46c9-bbec-d31e5d90514d>\",\"WARC-Concurrent-To\":\"<urn:uuid:f00a0891-a9f6-48d9-9e83-7d684325568a>\",\"WARC-IP-Address\":\"104.20.35.242\",\"WARC-Target-URI\":\"https://brilliant.org/practice/geometry-roots-of-unity/?subtopic=complex-numbers&chapter=de-moivres-theorem\",\"WARC-Payload-Digest\":\"sha1:WY4UKDYTVCED4XXUQTXJJ7WAGQAUAW2O\",\"WARC-Block-Digest\":\"sha1:UP3DZXITDMINAGRTBVTPRKVJ3LKZ7GMS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038067870.12_warc_CC-MAIN-20210412144351-20210412174351-00231.warc.gz\"}"} |
https://discourse.julialang.org/t/help-with-introspection-on-types/73899 | [
"",
null,
"Help with introspection on types\n\nThis question arises from my attempt to write new constructors for DataStructures.jl. Please see the trace below (1.7.1), which raises the following questions:\n\n1. Is there any difference between <type>.parameters and <type>.types? They gave the same answers in every test below.\n\n2. Why did collect return different answers when applied to a tuple versus an array in Tests 3 and 4 and yet there was no difference in Tests 1 and 2?\n\n3. (Main question.) In Test #4, how can I extract the two parameters of the type? I would have expected the two parameters to be Int and Any. Both .parameters and .types failed.\n\njulia> # Test 1\n\njulia> c = collect([(1,3),(2,\"a\")]);\n\njulia> eltype(c)\nTuple{Int64, Any}\n\njulia> eltype(c).types\nsvec(Int64, Any)\n\njulia> eltype(c).parameters\nsvec(Int64, Any)\n\njulia> # Test 2\n\njulia> c = collect(((1,3), (2, \"a\")));\n\njulia> eltype(c)\nTuple{Int64, Any}\n\njulia> eltype(c).types\nsvec(Int64, Any)\n\njulia> eltype(c).parameters\nsvec(Int64, Any)\n\njulia> # Test 3\n\njulia> c = collect([1=>3, 2=>\"a\"])\n2-element Vector{Pair{Int64, Any}}:\n1 => 3\n2 => \"a\"\n\njulia> eltype(c)\nPair{Int64, Any}\n\njulia> eltype(c).types\nsvec(Int64, Any)\n\njulia> eltype(c).parameters\nsvec(Int64, Any)\n\njulia> # Test 4\n\njulia> c = collect((1=>3, 2=>\"a\"));\n\njulia> eltype(c)\nPair{Int64}\n\njulia> eltype(c).types\nERROR: type UnionAll has no field types\nStacktrace:\n getproperty(x::Type, f::Symbol)\n@ Base .\\Base.jl:37\n top-level scope\n@ REPL:1\n\njulia> eltype(c).parameters\nERROR: type UnionAll has no field parameters\nStacktrace:\n getproperty(x::Type, f::Symbol)\n@ Base .\\Base.jl:37\n top-level scope\n@ REPL:1\n1 Like\n\nBy tracking down the code, [1=>3, 2=>\"a\"] calls Base.vect(1=>3, 2=>\"a\"), which in turn calls promote_typeof (base of promote). The type Vector{Pair{Int,Any}} is already determined at this point.\n(1=>3, 2=>\"a\") is a tuple type, so the promotion is delayed until collect, which calls promote_typejoin (base of typejoin), which returns Pair{Int} (shorthand for Pair{Int, T} where T). These are two different types: Pair{Int,Any} is a single type, while Pair{Int} is a set of types: Pair{Int, Int}, Pair{Int, String} or even Pair{Int, Any}.\n\nThe different code paths promote vs typejoin lead to different result, but I am unclear about the reason though.\n\nSince you see their is no single type, you might need to convert them to a single type maybe with some type calculations.\n\nRegarding Pair{Int}: this appears to be some kind of gap in the Julia type system. As far as I can see, there is no difference between Vector{Pair{Int,T} where T} and Vector{Pair{Int,Any}}, except that the former is less amenable to type introspection. Note that Julia automatically interprets Vector{T where T} as Vector{Any}.\n\nRegarding my main problem of inferring the data type of an arbitrary iterable of pairs: below is the constructor I am planning to use. This constructor has the big disadvantage that it copies the data three times. When the type parameters are known, the data is copied just once. (This disadvantage will be documented.) I use the same pattern for SortedMultiDict. Better solutions are welcome.\n\nfunction SortedDict(o::Ordering, kv)\nc = collect(kv)\nif eltype(c) <: Pair\nc2 = collect((t.first, t.second) for t in c)\nelseif eltype(c) <: Tuple\nc2 = collect((t, t) for t in c)\nelse\nthrow(ArgumentError(\"In SortedDict(o,kv), kv should contain either pairs or 2-tuples\"))\nend\nSortedDict{eltype(c2).parameters, eltype(c2).parameters, typeof(o)}(o, c2)\nend"
] | [
null,
"https://aws1.discourse-cdn.com/business5/uploads/julialang/original/2X/1/12829a7ba92b924d4ce81099cbf99785bee9b405.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.57334465,"math_prob":0.86712176,"size":1591,"snap":"2022-05-2022-21","text_gpt3_token_len":532,"char_repetition_ratio":0.20919974,"word_repetition_ratio":0.21333334,"special_character_ratio":0.327467,"punctuation_ratio":0.20057307,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9787626,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-20T02:52:46Z\",\"WARC-Record-ID\":\"<urn:uuid:5c5426ca-3142-4c7c-b730-86ed8a7e9705>\",\"Content-Length\":\"22179\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4ac89e8-4ed6-4bb5-9417-35e1d77815fe>\",\"WARC-Concurrent-To\":\"<urn:uuid:87ec857b-3b6c-4736-a37e-89d693e268aa>\",\"WARC-IP-Address\":\"64.71.144.205\",\"WARC-Target-URI\":\"https://discourse.julialang.org/t/help-with-introspection-on-types/73899\",\"WARC-Payload-Digest\":\"sha1:SW7YIH4H3DVT3EQYI3NP6S7L2G245XJV\",\"WARC-Block-Digest\":\"sha1:62BKYDVBEIAAL5OZSHWNLB4NUBJN564H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320301670.75_warc_CC-MAIN-20220120005715-20220120035715-00279.warc.gz\"}"} |
http://reportz725.web.fc2.com/reviews/essays-2016631186/ | [
"Date: 23.6.2016 / Article Rating: 4 / Votes: 714\nSolve my trigonometry problem\nHome >> Uncategorized >> Solve my trigonometry problem\n\nSolve my trigonometry problem\n\nDec/Sat/2016 | Uncategorized\n\nOnline Math Problem Solver",
null,
"Trigonometric Identities Solver - Symbolab",
null,
"Solve Trigonometry Problems",
null,
"Trigonometric Problems (solutions, examples, games, videos)",
null,
"How to solve a trigonometry problem",
null,
"Trigonometric Identities Solver - Symbolab",
null,
"Mathway | Math Problem Solver",
null,
"Trigonometric Problems (solutions, examples, games, videos)",
null,
"Solve trigonometry problems - Kerala Ayurveda Limited",
null,
"Mathway | Math Problem Solver",
null,
"Trigonometric Identities Solver - Symbolab",
null,
"Is there a website that solves mathematical problems? - Quora",
null,
"How to solve a trigonometry problem",
null,
"Solve Trigonometry Problems",
null,
"Solve trigonometry problems - Kerala Ayurveda Limited",
null,
"Is there a website that solves mathematical problems? - Quora",
null,
"How to solve a trigonometry problem",
null,
"Solve Trigonometry Problems",
null,
"Trigonometric Problems (solutions, examples, games, videos)",
null,
"Solve Trigonometry Problems",
null,
"",
null,
""
] | [
null,
"http://tutorial.math.lamar.edu/Extras/AlgebraTrigReview/InverseTrig_files/eq0011P.gif",
null,
"https://s-media-cache-ak0.pinimg.com/236x/00/bc/2d/00bc2d7c5e4cacb56ae08af82b57e8b8.jpg",
null,
"http://i.dailymail.co.uk/i/pix/2015/11/02/23/2E0D408100000578-3301042-image-a-1_1446506214060.jpg",
null,
"http://image.slidesharecdn.com/9mathlmu4-141108003849-conversion-gate01/95/grade-9-mathematics-module-7-triangle-trigonometry-8-638.jpg",
null,
"http://www.shelovesmath.com/wp-content/uploads/2013/02/Solving-Trig-Problems-with-Multiple-Angles-General-Solutions1.png",
null,
"https://qph.ec.quoracdn.net/main-qimg-56c9e27364ca90f2672ae86b7a7a4ede",
null,
"http://cdn-0.analyzemath.com/Trigonometry_problems/trig_problem_3.gif",
null,
"https://blog.udemy.com/wp-content/uploads/2014/04/Trig4.jpg",
null,
"http://www.telegraph.co.uk/content/dam/news/2016/05/15/Maths-problem-trending-large_trans_NvBQzQNjv4BqzTW4Ql1t-1Xt3_aTCx9yp4V4XZMU8yV22wInfrfUWRg.PNG",
null,
"http://www.onlinemathlearning.com/image-files/xclip_trig51.gif.pagespeed.ic.gmCir5BxJ6.png",
null,
"http://cdn-6.analyzemath.com/high_school_math/grade_11/graphs/trigonometry_g11_3.gif",
null,
"https://i.ytimg.com/vi/yBxDB12lqUc/hqdefault.jpg",
null,
"http://www.onlinemathlearning.com/image-files/xclip_trig51.gif.pagespeed.ic.gmCir5BxJ6.png",
null,
"http://1.bp.blogspot.com/-zE2sDlC4fbE/UUFf_7dXchI/AAAAAAAAAbI/DGmn4Q4omnw/s1600/trigo-problem-blog39-14032013.png",
null,
"http://splash.abc.net.au/splash-image-servlet/mvcservlet/imageServlet/profile2/ABC-LIC-MAT142",
null,
"http://i.dailymail.co.uk/i/pix/2015/11/02/23/2E0D408100000578-3301042-image-a-1_1446506214060.jpg",
null,
"http://image.slidesharecdn.com/solvebasictrigonometryproblemseasilywiththehelp-140718220557-phpapp02/95/solve-basic-trigonometry-problems-easily-with-the-help-4-638.jpg",
null,
"https://blog.udemy.com/wp-content/uploads/2014/04/Trig4.jpg",
null,
"https://s-media-cache-ak0.pinimg.com/236x/21/db/1a/21db1a5aebfe2fcfb87582668bc0809b.jpg",
null,
"http://www.dailyherald.com/storyimage/DA/20131107/news/711079946/EP/1/3/EP-711079946.jpg&updated=201311070730&MaxW=800&maxH=800&noborder",
null,
"http://media.fc2.com/counter_img.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.62149364,"math_prob":0.9427642,"size":961,"snap":"2019-43-2019-47","text_gpt3_token_len":225,"char_repetition_ratio":0.24764891,"word_repetition_ratio":0.5327869,"special_character_ratio":0.16857441,"punctuation_ratio":0.08661418,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9991203,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42],"im_url_duplicate_count":[null,2,null,1,null,2,null,2,null,9,null,1,null,1,null,6,null,1,null,3,null,4,null,2,null,3,null,2,null,1,null,2,null,1,null,6,null,null,null,3,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-20T06:54:37Z\",\"WARC-Record-ID\":\"<urn:uuid:7b512e54-4cf4-41b4-a707-027ec25b1395>\",\"Content-Length\":\"29695\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9b93ca80-fc17-4204-aa17-5448cc15f2b8>\",\"WARC-Concurrent-To\":\"<urn:uuid:94b30cc4-8875-4cce-9ef6-077cd70cd4eb>\",\"WARC-IP-Address\":\"104.244.99.43\",\"WARC-Target-URI\":\"http://reportz725.web.fc2.com/reviews/essays-2016631186/\",\"WARC-Payload-Digest\":\"sha1:IZTH6YWFXBYBC7D7RX36NOYKCQ5UK6LH\",\"WARC-Block-Digest\":\"sha1:VDU3ZNMMHPUS6UOHOJAO6PK6PYD2PHXR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986703625.46_warc_CC-MAIN-20191020053545-20191020081045-00408.warc.gz\"}"} |
https://www.slideserve.com/dyani/cs448f-image-processing-for-photography-and-vision | [
"",
null,
"Download",
null,
"Download Presentation",
null,
"CS448f: Image Processing For Photography and Vision\n\n# CS448f: Image Processing For Photography and Vision\n\nDownload Presentation",
null,
"## CS448f: Image Processing For Photography and Vision\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -\n##### Presentation Transcript\n\n1. CS448f: Image Processing For Photography and Vision Fast Filtering\n\n2. Problems in Computer Vision\n\n3. Computer Vision in One Slide 1) Extract some features from some images 2) Use these to formulate some (hopefully linear) constraints 3) Solve a system of equations your favorite method to produce...\n\n4. Computer Vision in One Slide 0) Blur the input 1) Extract some features from some images 2) Use these to formulate some (hopefully linear) constraints 3) Solve a system of equations your favorite method to produce...\n\n5. Why do we blur the input? • To remove noise before processing • So we can use simpler filters later • To decompose the input into different frequency bands • tonemapping, blending, etc\n\n6. Applications • Joint Bilateral Filter • Flash/No Flash • Joint Bilateral Upsample • ASTA • Fast Filtering • Composing Filters • Fast Rect and Gaussian Filters • Local Histogram Filters • The Bilateral Grid\n\n7. Applications • Joint Bilateral Filter • Flash/No Flash • Joint Bilateral Upsample • ASTA • Fast Filtering • Composing Filters • Fast Rect and Gaussian Filters • Local Histogram Filters • The Bilateral Grid This thing is awesome.\n\n8. Composing Filters • F is a bad gradient filter • It’s cheap to evaluate • val = Im(x+5, y) – Im(x-5, y) • G is a good gradient filter -> • It’s expensive to evaluate • for (dx=-10; dx<10; dx++) val += filter(dx)*Im(x+dx, y) F= G=\n\n9. Composing Filters • But F * B = G • and convolution is associative • so: G*Im = (F*B)*Im = F*(B*Im) = *\n\n10. Composing Filters • So if you need to take lots of good filters: • Blur the image nicely once Im2 = (B*Im) • Use super simple filters for everything else • F1 * Im2 F2 * Im2 F3 * Im2 ... • You only performed one expensive filter (B) • Let’s make the expensive part as fast as possible\n\n11. Fast Rect Filters • Suggestions?\n\n12. Fast Rect Filters 10 ÷5\n\n13. Fast Rect Filters 60 ÷5\n\n14. Fast Rect Filters 110 ÷5\n\n15. Fast Rect Filters 170 ÷5\n\n16. Fast Rect Filters 180 ÷5\n\n17. Fast Rect Filters 180 ÷5\n\n18. Fast Rect Filters 140 ÷5\n\n19. Fast Rect Filters 140 ÷5\n\n20. Fast Rect Filters 120 ÷5\n\n21. Fast Rect Filters 160 ÷5\n\n22. Fast Rect Filters 150 ÷5\n\n23. Fast Rect Filters 140 ÷5\n\n24. Fast Rect Filters • Complexity? • Horizontal pass: O((w+f)h) = O(wh) • Vertical pass: O((h+f)w) = O(wh) • Total: O(wh) • Precision can be an issue\n\n25. Fast Rect Filters • How can I do this in-place?\n\n26. Gaussian Filters • How can we extend this to Gaussian filters? • Common approach: • Take FFT O(w h ln(w) ln(h)) • Multiply by FFT of Gaussian O(wh) • Take inverse FFT O(w h ln(w) ln(h)) • Total cost: O(w ln(w) h ln(h)) • Cost independent of filter size • Not particularly cache coherent \n\n27. Gaussian v Rect\n\n28. Gaussian v Rect*Rect\n\n29. Gaussian v Rect3\n\n30. Gaussian v Rect4\n\n31. Gaussian v Rect5\n\n32. Gaussian\n\n33. Rect(RMS = 0.00983)\n\n34. Gaussian\n\n35. Rect2 (RMS = 0.00244)\n\n36. Gaussian\n\n37. Rect3 (RMS = 0.00173)\n\n38. Gaussian\n\n39. Rect4(RMS = 0.00176)\n\n40. Gaussian\n\n41. Rect5(RMS = 0.00140)\n\n42. Gaussian Filters • Conclusion: Just do 3 rect filters instead • Cost: O(wh) • Cost independent of filter size • More cache coherent • Be careful of edge conditions • Hard to construct the right filter sizes: \n\n43. Filter sizes • Think of convolution as randomly scattering your data around nearby • How far data is scattered is described by the standard deviation of the distribution • standard deviation = sqrt(variance) • Variance adds • Performing a filter with variance v twice produces a filter with variance 2v\n\n44. Filter sizes • Think of convolution as randomly scattering your data around nearby • How far data is scattered is described by the standard deviation of the distribution • standard deviation = sqrt(variance) • Variance adds • Performing a filter with variance v twice produces a filter with variance 2v\n\n45. Filter Sizes • Variance adds • Performing a filter with variance v twice produces a filter with variance 2v • Standard deviation scales • A filter with standard deviation s, when scaled to be twice as wide, has standard deviation 2s\n\n46. Constructing a Gaussian out of Rects • A rect filter of width 2w+1 has variance: w(w+1)/3 • Attainable standard deviations using a single rect [sqrt(w(w+1)/3)]: • 0.82 1.41 2 2.58 3.16 3.74 4.32 ... • Composing three identical rects of width 2w+1 has variance: w(w+1) • Attainable std devs [sqrt(w(w+1))]: • 1.41 2.45 3.46 4.47 5.48 6.48 7.48 ... 1632.5\n\n47. Constructing a Gaussian out of Rects • Attainable standard deviations using three different odd rect filters: • 1.41 1.825 2.16 2.31 2.45 2.58 2.83 2.94 3.06 ... 8.25 8.29 8.32 8.37 8.41 8.45 8.48 • BUT: if they’re too different, the result won’t look Gaussian • Viable approach: Get as close as possible with 3 identical rects, do the rest with a small Gaussian\n\n48. Integral Images • Fast rects are good for filtering an image... • But what if we need to compute lots of filters of different shapes and sizes quickly? • Classifiers need to do this +1 -1 +1 -2\n\n49. Integrate the Image ahead of time • Each pixel is the sum of everything above and left • ImageStack -load dog1.jpg -integrate x -integrate y\n\n50. Integral Images • Fast to compute (just run along each row and column adding up) • Allows for arbitrary sized rect filters"
] | [
null,
"https://www.slideserve.com/img/player/ss_download.png",
null,
"https://www.slideserve.com/img/replay.png",
null,
"https://thumbs.slideserve.com/1_1157446.jpg",
null,
"https://www.slideserve.com/img/output_cBjjdt.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.73446965,"math_prob":0.95785105,"size":4756,"snap":"2021-43-2021-49","text_gpt3_token_len":1261,"char_repetition_ratio":0.15993266,"word_repetition_ratio":0.30660376,"special_character_ratio":0.28868797,"punctuation_ratio":0.09565217,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9648677,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,3,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-25T19:14:36Z\",\"WARC-Record-ID\":\"<urn:uuid:b35dc780-4b01-4af2-86ee-6a09cafc8cbc>\",\"Content-Length\":\"98214\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2140af73-9ca8-48e3-a11d-4aac1ac96e2c>\",\"WARC-Concurrent-To\":\"<urn:uuid:cb08afc2-7c27-4d7c-9868-aa1d7d9722da>\",\"WARC-IP-Address\":\"35.160.109.184\",\"WARC-Target-URI\":\"https://www.slideserve.com/dyani/cs448f-image-processing-for-photography-and-vision\",\"WARC-Payload-Digest\":\"sha1:OX5PXPLL6GJWRZ2QUTAIJDXQS7YWIF4Y\",\"WARC-Block-Digest\":\"sha1:MRV3OADD7A2476QFNHDHUT4RP6SP4T6S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587767.18_warc_CC-MAIN-20211025185311-20211025215311-00458.warc.gz\"}"} |
https://fangya18.com/2019/03/22/python-little-goal-9/ | [
"# Python Little Goal 9\n\nPython Day 15\n\n1. ### Love Earth Day ❤\n\nthe Earth day is coming! many years ago, i vaguely remember krupa, tim and i were spending the earth day together.\nI forgot who said the best way to celebrate earth day is to throw Krupa in the trash can.\nhaha…",
null,
"this year, I decided to celebrate the Earth day by throwing a lot of love to myself, my surroundings and the world using Python!\n\n```import math\n\nc='♥'\nwidth = 40\n\nprint ((c*2).center(width//2)*2)\n\nfor i in range(1,width//10+1):\n\nfor i in range(width//4,0,-1):\nprint ((c*i*4).center(width))\nprint ((c*2).center(width))```\n\n### 2. Number System\n\nElena used to like a joke, there are 10 kinds of Mathematicians, ones can count, ones couldn’t.😂\ni thought this joke was making fun of the mathematicians who cannot count.\nbut, the punchline was 10 is 2 in the binary system.\n\nSo today we will try to write the number in different systems in Python.\n\nChallenge: Given an integer, n, print the numbers in Decimal, Octal, Hexadecimal, Binary\n\nOctal : number system based on 8 (1,2,3,4,5,6,7,10,11,…)\n\nHexadecimal: Number system based on 16 (1,2,3,4,5,6,7,8,9,A,B,C,D,E,F, 10,11,…)\n\nSolution:\n\n```def print_formatted(number):\nn=number\nn1=bin(number)\nn2=oct(number)\nn3=hex(number)\nprint(n,n1,n2,n3)```\n\nOutput:\n\n```print_formatted(4)\n4 0b100 0o4 0x4```\n\nHappy Python Learning! 🍀\n\nReference:\nhttps://www.hackerrank.com/challenges/text-alignment/forum\nhimanshurawlani"
] | [
null,
"https://i2.wp.com/fangya18.com/wp-content/uploads/2019/03/earth__1553284810.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7878805,"math_prob":0.9389806,"size":1533,"snap":"2021-31-2021-39","text_gpt3_token_len":468,"char_repetition_ratio":0.11837803,"word_repetition_ratio":0.0,"special_character_ratio":0.30919766,"punctuation_ratio":0.20430107,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.955743,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-28T20:18:48Z\",\"WARC-Record-ID\":\"<urn:uuid:efa5dfe3-ab7d-47b9-a7d7-bb5922a5373e>\",\"Content-Length\":\"86002\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4ca7801-b15e-409d-ae3e-b782220dd231>\",\"WARC-Concurrent-To\":\"<urn:uuid:80c5c1a4-1faf-4d6b-9692-f81daf0708e3>\",\"WARC-IP-Address\":\"192.0.78.214\",\"WARC-Target-URI\":\"https://fangya18.com/2019/03/22/python-little-goal-9/\",\"WARC-Payload-Digest\":\"sha1:3EK3OFEZET53I5DRB4QBHNMA6B72HRSD\",\"WARC-Block-Digest\":\"sha1:AVSOBDVSZAT3LNJTAGSIODI45O7LP6ZG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780060882.17_warc_CC-MAIN-20210928184203-20210928214203-00407.warc.gz\"}"} |
https://stacks.math.columbia.edu/tag/0BFJ | [
"## 113.3 Homological algebra\n\nRemark 113.3.1. The following remarks are obsolete as they are subsumed in Homology, Lemmas 12.24.11 and 12.25.3. Let $\\mathcal{A}$ be an abelian category. Let $\\mathcal{C} \\subset \\mathcal{A}$ be a weak Serre subcategory (see Homology, Definition 12.10.1). Suppose that $K^{\\bullet , \\bullet }$ is a double complex to which Homology, Lemma 12.25.3 applies such that for some $r \\geq 0$ all the objects ${}'E_ r^{p, q}$ belong to $\\mathcal{C}$. Then all the cohomology groups $H^ n(sK^\\bullet )$ belong to $\\mathcal{C}$. Namely, the assumptions imply that the kernels and images of ${}'d_ r^{p, q}$ are in $\\mathcal{C}$. Whereupon we see that each ${}'E_{r + 1}^{p, q}$ is in $\\mathcal{C}$. By induction we see that each ${}'E_\\infty ^{p, q}$ is in $\\mathcal{C}$. Hence each $H^ n(sK^\\bullet )$ has a finite filtration whose subquotients are in $\\mathcal{C}$. Using that $\\mathcal{C}$ is closed under extensions we conclude that $H^ n(sK^\\bullet )$ is in $\\mathcal{C}$ as claimed. The same result holds for the second spectral sequence associated to $K^{\\bullet , \\bullet }$. Similarly, if $(K^\\bullet , F)$ is a filtered complex to which Homology, Lemma 12.24.11 applies and for some $r \\geq 0$ all the objects $E_ r^{p, q}$ belong to $\\mathcal{C}$, then each $H^ n(K^\\bullet )$ is an object of $\\mathcal{C}$.\n\nIn your comment you can use Markdown and LaTeX style mathematics (enclose it like $\\pi$). A preview option is available if you wish to see how it works out (just click on the eye in the toolbar)."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.82447433,"math_prob":0.99987257,"size":1704,"snap":"2021-04-2021-17","text_gpt3_token_len":513,"char_repetition_ratio":0.15764706,"word_repetition_ratio":0.03717472,"special_character_ratio":0.31279343,"punctuation_ratio":0.13105413,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.000001,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-19T09:38:59Z\",\"WARC-Record-ID\":\"<urn:uuid:cc25f767-126e-459c-9ae3-5520d51b3bd6>\",\"Content-Length\":\"14421\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c7b54910-0bdb-455a-a1c9-5c1f0b1053de>\",\"WARC-Concurrent-To\":\"<urn:uuid:4f70a47d-eadd-4077-8cb0-0438c4c345cc>\",\"WARC-IP-Address\":\"128.59.222.85\",\"WARC-Target-URI\":\"https://stacks.math.columbia.edu/tag/0BFJ\",\"WARC-Payload-Digest\":\"sha1:JGN7QWP4CR6TV77WNDOTSWFGNEQY7HDR\",\"WARC-Block-Digest\":\"sha1:ZYVYY3YPF4K5GM6H3PL3YQ3SFM3MBSEX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703518201.29_warc_CC-MAIN-20210119072933-20210119102933-00093.warc.gz\"}"} |
https://dl_monte.gitlab.io/dl_monte-tutorials-pages/tutorial2.html | [
"# TUTORIAL 2 : NPT Lennard-Jones fluid¶\n\nAuthors: Andrey V. Brukhno (andrey.brukhno{at}stfc.ac.uk), James Grant (r.j.grant{at}bath.ac.uk), and John Purton (john.purton{at}stfc.ac.uk)\n\n## Introduction¶\n\nIn the NpT ensemble number of particles, pressure and temperature (N,p,T) are kept constant, which implies that apart from the particle moves the volume is also allowed to vary. That is, an additional MC move, uniformly sampling the volume, is attempted with the acceptance probability:\n\n$P_{\\mathrm{acc}}([\\mathbf{r}_{1},V_1] \\rightarrow [\\mathbf{r}_2,V_2]) = \\min(1, \\exp \\{- \\beta [U(\\mathbf{r}_2) - U(\\mathbf{r}_1) + p_{ext}(V_{2}-V_{1}) - N \\beta^{-1} \\ln(V_{2} / V_{1}) ] \\} )$\n\nwhere $$p_{ext}$$ is the external pressure. The particle coordinates are assumed to be scaled accordingly.\n\nNOTE: The last term under the exponent needs to be modified in the cases where, for example, linear dimensions of the (cubic) cell or $$\\ln(V)$$ are directly sampled instead of volume (keywords linear and log respectively).\n\nIn order to proceed to NpT simulation, we will modify a copy of CONTROL file that we used in Tutorial 1 for NVT simulation, wherein we need to introduce the directives specifying the volume move and the accumulation of additional statistics.\n\nNavigate to the subfolder tutorial_2 (in the folder exercises). Our initial set-up contains duplicates of the input files for Tutorial 1. The CONFIG and FIELD files remain unchanged, so the initial configuration and interactions between particles will be identical to the NVT case. For your reference, the subdirectory npt-dry contains an example set of input and output files.\n\n 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 NPT simulation of Lennard-Jones fluid use ortho finish seeds 12 34 56 78 # Seed RNG seeds explicitly to the default nbrlist auto # Use a neighbour list to speed up # energy calculations maxnonbondnbrs 512 # Maximum number of neighbours in neighbour list temperature 1.4283461511745 # Corresponds to T*=1.1876; # T(in K) = T* / BOLTZMAN pressure 0.0179123655568 steps 110000 # Number of moves to perform in simulation equilibration 10000 # Equilibration period: statistics #are gathered after this period print 10000 # Print statistics every 'print' moves stack 10000 # Size of blocks for block averaging to obtain statistics sample coord 10000 # How often to print configurations to ARCHIVE.000 yamldata 1000 # collect YAML stats every 1000 move revconformat dlmonte # REVCON file is in DL_MONTE CONFIG format archiveformat dlpoly4 # ARCHIVE.000/HISTORY.000/TRAJECTORY.000 format # In this case: HISTORY.000 in DLPOLY4 style move atom 1 512 # Move atoms with a weight of 512 LJ core move volume cubic linear 1 # Move volume, box is cubic, # linear scaling with a weight of 1 start \n\nThe directive to invoke volume moves is move volume. The parameters to specify in the present tutorial are cubic, linear and 1 for the weight of volume moves among other MC steps (see the manual for further details). Note that the weight of atom moves has been set to 512 (see move atom directive). Volume moves are more computationally intensive than single atom moves, so the rule of thumb is to attempt one volume move each time every atom has been attempted to move (so called “pass” or “sweep” through the system).\n\nYou will need to add the lines:\n\nsample volume 1 1.0 # sample volume every V-step, with the bin size of 1 A^3\n\nmove volume cubic linear 1 # Move volume, box is cubic,\n# linear sampling with a weight of 1\n\n\nand:\n\npressure 0.0179123655568\n\n\n## Exercise¶\n\nAs before, in order to extract the volume sequence along the MC time from YAMLDATA.000 and plot it in gnuplot, use the commands:\n\n[tutorial_2]$strip_yaml.sh volume [tutorial_2]$ gnuplot\ngnuplot> plot './volume.dat' u 1:2 w l t \"Volume(MC step)\""
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.76479757,"math_prob":0.8988202,"size":4180,"snap":"2023-40-2023-50","text_gpt3_token_len":1076,"char_repetition_ratio":0.109913796,"word_repetition_ratio":0.029325513,"special_character_ratio":0.25574163,"punctuation_ratio":0.10619469,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9825074,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-27T07:36:13Z\",\"WARC-Record-ID\":\"<urn:uuid:47f44475-2968-47ca-ae63-e2b0eeeec395>\",\"Content-Length\":\"13025\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a9c6235d-884b-47f6-ab2d-8f2ec7d14b43>\",\"WARC-Concurrent-To\":\"<urn:uuid:1bcb42e1-9893-4cd9-888f-3897e909efcc>\",\"WARC-IP-Address\":\"35.185.44.232\",\"WARC-Target-URI\":\"https://dl_monte.gitlab.io/dl_monte-tutorials-pages/tutorial2.html\",\"WARC-Payload-Digest\":\"sha1:FAJD3TIC5AGAG6UY6PTF5QF6NVNSBKWF\",\"WARC-Block-Digest\":\"sha1:UR737K3L2KEWRAH4I2HO2M452IEO6GJS\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510284.49_warc_CC-MAIN-20230927071345-20230927101345-00425.warc.gz\"}"} |
https://teachingcalculus.com/2019/10/01/seeing-the-chain-rule/ | [
"# Seeing the Chain Rule\n\nBeing a believer in the Rule of Four, I have been trying for years to find a good visual (graphical) illustration of why or how the Chain Rule for derivatives works. This very simple example is the best I could come up with.\n\nConsider the function",
null,
"$y=\\sin \\left( x \\right),0\\le x\\le 2\\pi$. (See figure 1. A tangent segment at",
null,
"$\\displaystyle \\left( {\\frac{\\pi }{3},\\sin \\left( {\\frac{\\pi }{3}} \\right)} \\right)$ is drawn.) As you know, this function’s values go smoothly from 0 to 1 to 0 to –1 and back to 0. The slopes of its tangent line, its derivative, appears to go from 1 to 0 to –1 to 0 to 1 as you would expect knowing its derivative is",
null,
"$\\frac{{dy}}{{dx}}=\\cos \\left( x \\right)$. (See figure 2)\n\nConsider the function",
null,
"$y=\\sin \\left( {3x} \\right),0\\le x\\le 2\\pi$ (See figure 3. A tangent line at",
null,
"$\\displaystyle \\left( {\\frac{\\pi }{9},\\sin \\left( {\\frac{\\pi }{9}} \\right)} \\right)$ is drawn) This takes on all the values of the sine function three times between 0 and",
null,
"$2\\pi$. It goes through the same values three times as fast and therefore, its rate of change (yeah, the derivative) should be three times as much. Compare the tangent lines in Figures 1 and 3. This agrees with the derivative found by the Chain Rule:",
null,
"$\\frac{{dy}}{{dx}}=3\\cos \\left( {3x} \\right)$. See figure 4)\n\nNext, consider the function",
null,
"$y=\\sin \\left( {\\tfrac{1}{2}x} \\right),0\\le x\\le 2\\pi$ (See figure 5. A tangent line at",
null,
"$\\displaystyle \\left( {\\frac{{2\\pi }}{3},\\sin \\left( {\\frac{{2\\pi }}{3}} \\right)} \\right)$ is drawn.). This time the function is stretch and only goes through half its period. So, It goes through the same values half as fast as the original and the slope is only half as steep as the original. Compare the tangent lines in Figures 1 and 5.Therefore, the rate of change the derivative, should be only half the original’s. So,",
null,
"$\\frac{{dy}}{{dx}}=\\frac{1}{2}\\cos \\left( {\\tfrac{1}{2}x} \\right)$ (See figure 6)\n\nI hope this helps your students see what’s happening with the Chain Rule, at least a little bit. I’d be happy to hear and share any ideas you have to illustrate the Chain Rule graphically.\n\nThere is a movable Desmos graph here to help illustrate all of this.",
null,
"Here are links to other posts on the Chain Rule\n\nThe Power Rule Implies Chain Rule\n\nThe Chain Rule\n\nDerivative Practice – Numbers\n\nDerivative Practice – Graphs\n\nExperimenting with CAS – Chain Rule\n\n## One thought on “Seeing the Chain Rule”\n\n1. Pingback: Seeing the Chain Rule | MATHMANMCQ\n\nThis site uses Akismet to reduce spam. Learn how your comment data is processed."
] | [
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://teachingcalculus.files.wordpress.com/2019/10/cr-7.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9493399,"math_prob":0.99669015,"size":1806,"snap":"2019-51-2020-05","text_gpt3_token_len":429,"char_repetition_ratio":0.14150943,"word_repetition_ratio":0.047058824,"special_character_ratio":0.23532669,"punctuation_ratio":0.094986804,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995383,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-08T21:55:26Z\",\"WARC-Record-ID\":\"<urn:uuid:0fc6c8ba-b08e-4830-bd80-6b905f749c7f>\",\"Content-Length\":\"118571\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fa948905-fa33-4b16-b6f3-13595c44921f>\",\"WARC-Concurrent-To\":\"<urn:uuid:38b503bf-98ee-4e0a-b51c-88566acf6231>\",\"WARC-IP-Address\":\"192.0.78.24\",\"WARC-Target-URI\":\"https://teachingcalculus.com/2019/10/01/seeing-the-chain-rule/\",\"WARC-Payload-Digest\":\"sha1:T5X7EUEEAQUBRWLCB4TD45VTEKVUU5JH\",\"WARC-Block-Digest\":\"sha1:PFKCBN2NXC46MD6YJC5JJDQWF4HQ4L2D\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540514893.41_warc_CC-MAIN-20191208202454-20191208230454-00207.warc.gz\"}"} |
https://qezxx.saloart.it/kuta-software-infinite-algebra-2-quadratic-equations-with-square-roots-answers.html | [
"# Kuta software infinite algebra 2 quadratic equations with square roots answers\n\n• Kuta software infinite algebra 2 answer key - software Worksheets on grouping of like terms in algebra for grade 6, solving quadratic equations by square root method, Pre algebra 8th grade simplifying exponents, mathway, algebra tutor mac software, algebra 1 solver.\nGenerally speaking, Algebra 2 is a 10th or 11th grade course because students usually take Geometry first. Is Algebra 2 or Geometry harder? Whether Algebra 2 or Geometry is the harder class depends entirely on the student. For example, Geometry and its shapes might be easier for you than Algebra 2 and its equations.\n\nQuora is a place to gain and share knowledge. It's a platform to ask questions and connect with people who contribute unique insights and quality answers. This empowers people to learn from each other and to better understand the world.\n\nWorksheet by Kuta Software LLC-2-Solve this equation by taking square roots. 6) 8n2 + 7 = 679 A) {221} B) {32, -32} C) {221, -221} D) {77 2, - 77 2} Find the inverse of this function. 7) g (x) = -5 - 7 5 x A) g-1 (x) = 4 3 x + 5 3 B) g-1 (x) = 3x - 6 4 C) g-1 (x) = - 5 7 x - 25 7 D) g-1 (x) = 1 3 x + 2 3 Perform the indicated operation. 8) f (a) = 3a + 1 g (a) = -a2 + 4 Find (f g) (a) A) -9a2 + 6a + 3 B) a2 - 4a - 3\n• one. Merely said, the kuta software infinite algebra 2 function inverses answer key is universally compatible later any devices to read. Adding, Subtracting, Multiplying Radicals - Kuta Kuta Software - Infinite Algebra 2 Arc Length and … Understanding the Discriminant Date Period - Kuta Infinite Algebra 2 Infinite Algebra 2 - Multiplying Complex\n• Infinite Algebra 1 covers all typical algebra material, over 90 topics in all, from adding and subtracting positives and negatives to solving rational equations. Suitable for any class with algebra content. Designed for all levels of learners from remedial to advanced.\n• ©E n270E1 k2F mKIuRt saF ASNoEfatQwvaCrfeM dLLgCU.s q oA blrlM FrRiTgph wtvs0 zrReGsUe8rbv Ae4d E.n s nM ca Ndne3 VwHirt FhS nIqn BfXiNnLictge s WAtlhgVe4bgr Bas Y1B.M Worksheet by Kuta Software LLC Kuta Software - Infinite Algebra 1 Name_____ Solving Quadratic Equations with Square Roots Date_____ Period____\n\n• ## 770b loader hydraulic lines\n\nkuta-quadratic-equations-by-factoring 1/2 Downloaded from www.emporiumengland.co.uk on December 8, 2020 by guest Kindle File Format Kuta Quadratic Equations By Factoring This is likewise one of the factors by obtaining the soft documents of this kuta quadratic equations by factoring by online.\n\nKuta software infinite algebra 2 graphing quadratic functions answers with summary sle with kuta. Solving mui step equations kuta software infinite algebra 2 ghchs. Most popular documents for algebra 2. Combining like terms kuta software infinite.\n\n• ## Dna replication activity guide answer key\n\nMay 02, 2016 · F worksheet by kuta software llc kuta software infinite algebra 1 name graphing quadratic functions date period. Graphing quadratic functions worksheet answers algebra 2 . These quadratic functions and inequalities worksheets are a good resource for students in the 8th grade through the 12th grade.\n\nKuta Software - Infinite Algebra I.. nd the solutions. Show all work. This PDF book incorporate quadratic formula kuta software work shown This PDF book contain rational exponents equations kuta software answers guide. To download free algebra 2 radicals and rational exponents practice...\n\n• ## Metal trellis arch\n\nkuta-software-infinite-algebra-2-square-roots 4/5 Downloaded from spanish.perm.ru on December 19, 2020 by guest The kuta software infinite algebra 2 answers is developing at a frantic pace. New versions of the software should be released several times a quarter and even several times a month. Update for kuta software infinite algebra 2 answers.\n\nQuadratic Roots Kuta. Free Algebra 2 Worksheets Kuta. Kuta Software LLC. Properties of Parabolas Kuta. Factoring Quadratic Form Kuta. Infinite Algebra 1 Extra Practice X and Y intercepts. Infinite Algebra 2 Factoring amp Intercept form Graphing. Answers to kuta software infinite algebra 1. Vertex Form Worksheet With Answers. Match Fishtank 9th ...\n\n• ## Emergency response guidebook\n\npractice b 9 7 solving quadratic equations by using square roots solve algebra review solving quadratics worksheet answers' 'practice session on creating and solving equations and may 1st, 2018 - for the entry ticket practice session creating and solving equations and inequalities i spiral back to the previous lesson having students practice skills\n\nWorksheet by Kuta Software LLC Honors Geometry Honors Algebra 2 Summer Assignment Name_____ ID: 1 Date_____ Period____ ©D [2e0E1V7^ gKIu[tGas xSfo\\fOtewvaVrleB lLOLWCa.Y d yAKlll[ Gr[irgIhstFsK KryejsEepruvVeCdS.-1-This assignment is for students who have completed Geometry and are taking Algebra 2 Honors\n\n• ## Former wdsu news anchors\n\nKUTA Software - extra practice worksheets (answers included!) Math Drills Kahn Academy - An on-line tutorial covering a variety of topics. Check out the ones for Arithmetic, Pre-Algebra & Geometry. The Golden Rectangle clip. Problem Solving - • The Bridge Problem • The Fish Problem • The Famously Difficult Green-Eyed Logic Puzzle.\n\neMath Instruction Geometry 2018 kuta software answers. This site provides e-textbooks, answer keys, video lessons, and printables for students and teachers of algebra 1 and 2, geometry, and trigonometry. Geometry 2018 kuta software answers\n\n• ## Devops analyst resume\n\nObjective: Find a quadratic equation that has given roots using reverse factoring and reverse completing the square. Up to this point we have found the solutions to quadratics by a method such as factoring or completing the square. Here we will take our solutions and work backwards to find what quadratic goes with the solutions.\n\nFree Online Equation Calculator helps you to solve linear, quadratic and polynomial systems of equations. Answers, graphs, alternate forms. Wolfram|Alpha is a great tool for finding polynomial roots and solving systems of equations. It also factors polynomials, plots polynomial solution sets...\n\n• ## Radio thermostat ct101 smartthings\n\nKuta Software - Infinite Algebra 2. Create your own worksheets like this one with Infinite Algebra 2. Free trial available at KutaSoftware.com.\n\nOn this page, you'll find an unlimited supply of printable worksheets for square roots, including worksheets for square roots only (grade 7) or worksheets with square roots and other operations (grades 8-10). Options include the radicand range, limiting the square roots to perfect squares only, font size, workspace, PDF or html formats, and more.\n\nLogic to find roots of quadratic equation in C programming. Wikipedia states, in elementary algebra a quadratic equation is an equation in the form of. A quadratic equation can have either one or two distinct real or complex roots depending upon nature of discriminant of the equation.\nWorksheet by Kuta Software LLC Algebra 2 Summer Review - Topic #6 Solving Quadratics using factoring & quadratic formula ID: 1 ©x R2W0j1h8u PKquStwaf ISyobfxtVwnayrjez pLmLtC_.R V MAllOli CrAiUgnhMttsH SrMevsSezrHvqeodM.-1-This review is NOT MANDATORY and will not be collected. You should use it if you are\nThe key is the expression in the square root: . In general there are three cases: is positive. The square root of a positive number is also some positive number. So in the numerator of the quadratic formula we will get two values: (-b + the square root) and (-b - the square root). So when we get two solutions. is zero. The square root of zero ...\nHere’s a quadratic equation that I need to solve. Looking at it I notice right away there’s no b term. There’s nothing that has just one x attached to it. I have an x² term but nothing with x. So what I’m going to do, is try taking the square roots to both sides of the equation."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.85803413,"math_prob":0.9625526,"size":9356,"snap":"2021-21-2021-25","text_gpt3_token_len":2202,"char_repetition_ratio":0.17931993,"word_repetition_ratio":0.035529714,"special_character_ratio":0.23247114,"punctuation_ratio":0.10224586,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9927587,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-25T12:14:35Z\",\"WARC-Record-ID\":\"<urn:uuid:60e0f3bb-daa0-4321-95ca-48036785f726>\",\"Content-Length\":\"32604\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dc6fc568-fba4-47b2-a28d-1d17ba6164ad>\",\"WARC-Concurrent-To\":\"<urn:uuid:89f76721-d8e0-4997-b45e-4310c9a28578>\",\"WARC-IP-Address\":\"172.67.186.40\",\"WARC-Target-URI\":\"https://qezxx.saloart.it/kuta-software-infinite-algebra-2-quadratic-equations-with-square-roots-answers.html\",\"WARC-Payload-Digest\":\"sha1:G2SPDYSI75VSB32ASBNF2EPFZ5FWRIFL\",\"WARC-Block-Digest\":\"sha1:ZGV7IVQZQUSHKDPNLBEAAZJTTKGUR7WI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487630175.17_warc_CC-MAIN-20210625115905-20210625145905-00637.warc.gz\"}"} |
https://bookboon.com/sv/cmos-analog-ic-design-fundamentals-ebook | [
"",
null,
"# CMOS Analog IC Design: Fundamentals\n\nOmdömen:\n( 0 )\n395 pages\nSpråk:\nEnglish\nThis book is intended for use as the main textbook for an introductory course in CMOS analog integrated circuit design.\nVåra senaste eBöcker\nOm författaren\n\nErik Bruun has been teaching analog electronics and CMOS integrated circuit design for more than 25 years at the Technical University of Denmark. From 1989 to 2016, Erik was a Professor in Analog Electronics and since 2016 he has continued his professional activities as a Professor Emeritus.\n\n...\nDescription\nContent\n\nThis book is intended for use as the main textbook for an introductory course in CMOS analog integrated circuit design. It is aimed at electronics engineering students who have followed basic courses in mathematics, physics, circuit theory, electronics and signal processing. It takes the students directly from a basic level to a level where they can start working on simple analog IC design projects or continue their studies using more advanced textbooks in the field.\nA distinct feature of this book is an emphasis on the interaction between analytical methods and simulation methods. Whenever relevant, the theoretical concepts are illustrated both through traditional mathematical models and through circuit simulations using the universally accepted program SPICE (Simulation Program with Integrated Circuit Emphasis).\nThe material presented in this book has been adapted from material used by the author for many years of teaching an introductory one-semester course (5 ECTS credits) in CMOS analog integrated circuit design at the Technical University of Denmark.\nA companion book about CMOS integrated circuit simulation with LTspice is also available from bookboon, click here.\n\n• Preface\n1. Chapter 1 – Introduction\n1. CMOS technology\n2. Why analog circuit design?\n3. Design methodology\n4. References\n5. Multiple-choice test\n2. Chapter 2 – Basic Concepts\n1. Signals\n2. Circuit elements\n3. Circuit theorems\n4. Circuit analysis\n5. References\n6. Multiple-choice test\n7. Problems\n3. Chapter 3 – The MOS Transistor\n1. Fundamentals of pn diodes\n2. Physical characteristics of the MOS transistor\n3. Electrical characteristics of the MOS transistor\n4. Examples of the use of the Shichman-Hodges transistor model\n5. Small-signal models\n6. Deriving a small-signal equivalent circuit from a large-signal schematic\n8. References\n9. Multiple-choice test\n10. Problems\n4. Chapter 4 – Basic Gain Stages\n1. The common-source stage at low frequencies\n2. The common-drain stage at low frequencies\n3. The common-gate stage and the cascode stage at low frequencies\n4. The differential pair at low frequencies\n5. Frequency response of the basic gain stages\n6. References\n7. Multiple-choice test\n8. Problems\n5. Chapter 5 – Multistage Amplifiers\n1. Cascode opamps5\n2. The two-stage opamp\n3. The two-stage opamp with feedback\n4. References\n5. Multiple-choice test\n6. Problems\n6. Chapter 6 – Feedback\n1. The basic feedback structure\n3. Feedback topologies\n4. The inverting amplifier\n5. Stability\n6. Frequency compensation\n7. References\n8. Multiple-choice test\n9. Problems\n7. Chapter 7 – The Two-Stage Opamp\n1. Specifications for a design example\n2. Bandwidth and stability requirements\n3. Bias point and transistor dimensions\n4. Design verification and iteration\n5. References\n6. Multiple-choice test\n7. Problems\n8. Chapter 8 – Bias Circuits, Bandgap References and Voltage Regulators\n1. Current mirrors\n2. Bias current circuits with reduced supply voltage dependency\n3. Bandgap voltage references\n4. Voltage regulators\n5. References\n6. Multiple-choice test\n7. Problems\n9. Chapter 9 – Essential Results and Equations\n1. Design methodology\n2. Device models, linear passive devices\n3. Device model, pn diode\n4. Small-signal models\n5. Device models, MOS transistors\n6. Basic gain stages at low frequency\n7. Frequency response of basic gain stages\n8. Feedback\n9. The two-stage opamp\n10. Current mirrors and current sources\n11. Bandgap reference principle\n12. Voltage regulators\n• Appendix A – Answers to Multiple-Choice Tests\n• Appendix B – Answers to End-of-Chapter Problems\n• Appendix C – Transistor Models\n• Index"
] | [
null,
"https://bookboon.com/thumbnail/380/98b41afd-b9a2-49cb-bd6d-09f180a1c6c9/1c4a9478-d630-4bc1-abaf-a55600afef52/cmos-analog-ic-design-fundamentals.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93622833,"math_prob":0.77544975,"size":1484,"snap":"2020-34-2020-40","text_gpt3_token_len":284,"char_repetition_ratio":0.11081081,"word_repetition_ratio":0.027272727,"special_character_ratio":0.175876,"punctuation_ratio":0.074074075,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96966416,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-13T14:18:10Z\",\"WARC-Record-ID\":\"<urn:uuid:0837f129-c79e-4eb6-b3c3-053a3b450748>\",\"Content-Length\":\"55997\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8a0f4c92-4585-4c1f-92cb-630c9a7f9541>\",\"WARC-Concurrent-To\":\"<urn:uuid:69377f2c-2108-4f61-a238-c03a9db40eca>\",\"WARC-IP-Address\":\"81.7.185.32\",\"WARC-Target-URI\":\"https://bookboon.com/sv/cmos-analog-ic-design-fundamentals-ebook\",\"WARC-Payload-Digest\":\"sha1:TAHMTXZ5NKIAQ3UVSASLBTVW2C3DL2DR\",\"WARC-Block-Digest\":\"sha1:FJSEZLQW7GPANLFJIJEQJATHRK5JHUFK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439739046.14_warc_CC-MAIN-20200813132415-20200813162415-00382.warc.gz\"}"} |
https://discourse.julialang.org/t/promote-field-of-abstract-type/61732/6 | [
"# Promote field of abstract type\n\nI’d like to simplify the following code so that there is only one method for multiplication that applies to all subtypes of `AbstractTerm`\n\n``````abstract type AbstractTerm{T} end\n\nstruct ATerm{T} <: AbstractTerm{T}\ndata::T\nend\n\nstruct BTerm{T} <: AbstractTerm{T}\ndata::T\nend\n\nfunction Base.:*(x::Number, aterm::ATerm{T}) where T\nreturn ATerm{promote_type(typeof(x), T)}(x * aterm.data)\nend\n\nfunction Base.:*(x::Number, bterm::BTerm{T}) where T\nreturn BTerm{promote_type(typeof(x), T)}(x * bterm.data)\nend\n\na = ATerm(3)\nprintln(4.1 * a)\n``````\n\n``````\nfunction Base.:*(x::Number, term::AbstractTerm)\nreturn typeof(term)(x * term.data)\nend\n``````\n\nBut, that fails with an error for the example given. (Also, this is a simplified version of my actual type hierarchy)\n\nWhat I’d like is something like `...term::T{V}) where {V, T<:AbstractTerm}`. But, that, of course, is not valid Julia.\nI find similar problems quite often, for example, I write identical constructors for all subtypes of an abstract type.\n\nShouldn’t `Base.:*(x::Number, term::T) where T<:AbstractTerm = T(x * term.data)` work?\n(Sorry, I’m on a phone right now.)\n\nNo, that is equivalent to the last method given in my original post. In the example in the OP, `4.1 * ATerm(3)`, your method gives\n\n``````ERROR: LoadError: InexactError: Int64(12.299999999999999)\n``````\n\nThe method for `ATerm` in the OP will correctly give `ATerm{Float64}(12.299999999999999)`. And likewise, for the method for `BTerm`. But, I can’t find a way to write a single method to do this for all `AbstractTerm` types. For each subtype, I have to write an identical method.\n\nOh, okay, now I see. I didn’t catch that the problem is the fact that your AbstractTerm’s parametric type (Int) doesn’t match the promoted type of the multiplication (Float64). You could strip the parametric type maybe but I think this is discouraged actually(?).\n\n``````strip(::ATerm) = ATerm\nstrip(::BTerm) = BTerm\nBase.:*(x::Number, term::AbstractTerm) = strip(term)(x * term.data)\n``````\n\nAlso, you would have to define the strip methods for each concrete type anyway.\n\nI think the better way is to use meta-programming to generate all necessary operations for all your types.\n\n2 Likes\n\nNice trick, `strip(::ATerm) = ATerm`, I did not think of it. Defining `strip` for each type is economical, and I really want to avoid metaprogramming if possible. `strip` is not a super-elegant solution, but it may be the best. I would actually use it in many places.\n\nI think that based on the discussion in this post:\n\nyou might achieve what you want by defining the strip function parametrically like this:\n\n``````strip(::T) where {T} = (isempty(T.parameters) ? T : T.name.wrapper)\n``````\n1 Like\n\nYes this\n\n``````strip(::T) where {T} = (isempty(T.parameters) ? T : T.name.wrapper)\n``````\n\nseems to work. `@btime` does not do all the work at compile time, like it does for the hardcoded case above.\nEDIT:\nAfter testing further I find that the solution using `T.wrapper` is very slow compared to `strip(::ATerm) = ATerm`. I don’t recommend it.\n\nI do not know what are the implications so someone else might comment on this.\n\nBut it seems that if you avoid having the intial check in the function I put above you might get the same speed as the specific one.\n\n``````using BenchmarkTools\n\nabstract type AbstractTerm{T} end\n\nstruct ATerm{T} <: AbstractTerm{T}\ndata::T\nend\n\nstruct BTerm{T} <: AbstractTerm{T}\ndata::T\nend\n\nstrip(::T) where {T} = (isempty(T.parameters) ? T : T.name.wrapper)\nstripshort(::T) where T = T.name.wrapper\nstripspec(::ATerm) = ATerm\n\na = ATerm(3)\n\nprod1(x::Number,term::T) where T <: AbstractTerm = strip(term)(x * term.data)\nprod2(x::Number,term::T) where T <: AbstractTerm = stripspec(term)(x * term.data)\nprod3(x::Number,term::T) where T <: AbstractTerm = stripshort(term)(x * term.data)\n\n@benchmark prod1.(x,Ref(\\$a)) setup=(x = rand(10000))\n@benchmark prod2.(x,Ref(\\$a)) setup=(x = rand(10000))\n@benchmark prod3.(x,Ref(\\$a)) setup=(x = rand(10000))\n\nBenchmarkTools.Trial:\nmemory estimate: 78.67 KiB\nallocs estimate: 13\n--------------\nminimum time: 224.400 μs (0.00% GC)\nmedian time: 293.000 μs (0.00% GC)\nmean time: 333.178 μs (2.12% GC)\nmaximum time: 10.016 ms (0.00% GC)\n--------------\nsamples: 10000\nevals/sample: 1\n\nBenchmarkTools.Trial:\nmemory estimate: 78.20 KiB\nallocs estimate: 2\n--------------\nminimum time: 6.975 μs (0.00% GC)\nmedian time: 16.725 μs (0.00% GC)\nmean time: 25.221 μs (15.13% GC)\nmaximum time: 1.249 ms (97.55% GC)\n--------------\nsamples: 10000\nevals/sample: 4\n\nBenchmarkTools.Trial:\nmemory estimate: 78.20 KiB\nallocs estimate: 2\n--------------\nminimum time: 7.240 μs (0.00% GC)\nmedian time: 15.900 μs (0.00% GC)\nmean time: 25.617 μs (15.96% GC)\nmaximum time: 1.229 ms (96.18% GC)\n--------------\nsamples: 10000\nevals/sample: 5\n``````\n1 Like"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.819943,"math_prob":0.9285721,"size":2115,"snap":"2022-27-2022-33","text_gpt3_token_len":554,"char_repetition_ratio":0.12316438,"word_repetition_ratio":0.0,"special_character_ratio":0.2572104,"punctuation_ratio":0.19914347,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97926253,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-03T18:23:51Z\",\"WARC-Record-ID\":\"<urn:uuid:52ceb1e5-fb97-4770-940b-245431363f54>\",\"Content-Length\":\"39104\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:890769d0-a7b2-4780-9053-56a17e61ccc2>\",\"WARC-Concurrent-To\":\"<urn:uuid:8e3555be-4941-48f6-8ef4-bfc53f702af2>\",\"WARC-IP-Address\":\"64.71.144.205\",\"WARC-Target-URI\":\"https://discourse.julialang.org/t/promote-field-of-abstract-type/61732/6\",\"WARC-Payload-Digest\":\"sha1:FTEB6PFOUXAXMMS5FLLX43EZNXBGIJYV\",\"WARC-Block-Digest\":\"sha1:2SC5JHWKWACHUYPHSLWRL7LHILIFDTMO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104248623.69_warc_CC-MAIN-20220703164826-20220703194826-00356.warc.gz\"}"} |
https://www.maa.org/press/periodicals/convergence/analysis-and-translation-of-raffaele-rubinis-1857-application-of-the-theory-of-determinants-note-3 | [
"",
null,
"# Analysis and Translation of Raffaele Rubini's 1857 'Application of the Theory of Determinants: Note' - Rubini's Notation\n\nAuthor(s):\n\nIn Rubini's article, the reader will find the modern notation for determinants, with elements arranged in a table bounded by vertical lines enclosing the table. This notation for determinants first appeared in Arthur Cayley's (1821–1895) \"Mémoire sur les hyperdéterminants\" , demonstrating Rubini's exposure to this relatively new notation [Cajori, 1993]. Throughout Rubini's article, he also utilized another modern notation, $a_{r,s},$ to represent the element in the $r$th row and $s$th column. This notation was presented in Cauchy's 1815 work \"Memoire sur les fonctions qui ne peuvent obtenir que deux valeurs egales et des signes contraires par suite des transpositions operees entre les variables qu'elles renferment,\" with Rubini most likely being exposed to the notation through Brioschi's textbook, La teorica dei determinanti e le sue applicazioni. This notation can be seen throughout Rubini's article (except for Sections 6 and 7), such as in the following expression:\n\n$P=\\begin{vmatrix}a_{1,1} + h_{1,1} & a_{1,2} + h_{1,2} & \\ldots & a_{1,n} + h_{1,n}\\\\a_{2,1} + h_{2,1} & a_{2,2} + h_{2,2} & \\ldots & a_{2,n} + h_{2,n}\\\\\\vdots & \\vdots & \\ddots & \\vdots\\\\a_{n,1} + h_{n,1} & a_{n,2} + h_{n,2} & \\ldots & a_{n,n} + h_{n,n}\\end{vmatrix}$\n\nwhere $a_{r,s}$ and $h_{r,s}$ are real number elements from two different matrices being added together.\n\nIn Section 5, Rubini discussed solutions of general polynomials of the form:\n\n$f(x) = x^n + A_{1}x^{n-1} + A_{2}x^{n-2} + \\ldots + A_{n-1}x + A_{n},$\n\nwhere the $A_i$ are defined as\n\n$A_{1} = -(a_{1,1} + a_{2,2} + a_{3,3} + \\ldots + a_{n,n})$\n\n$A_{2} = +(a_{1,1}a_{2,2} + \\ldots + a_{1,1}a_{n,n} + a_{2,2}a_{3,3} + \\ldots+ a_{3,3}a_{n,n} + \\ldots + a_{n-1,n-1}a_{n,n})$\n\n$A_{3} = -(a_{1,1}a_{2,2}a_{3,3} + a_{1,1}a_{2,2}a_{4,4} + \\ldots+ a_{1,1}a_{n-1,n-1}a_{n,n} + \\ldots + a_{n-2,n-2}a_{n-1,n-1}a_{n,n})$\n\n$\\vdots$\n\n$A_{n} = (-1)^{n}a_{1,1}a_{2,2}a_{3,3} \\ldots a_{n,n}$\n\nRubini continued to use Cauchy's notation, as opposed to the more common notation for a root of an equations, $a_r,$ except in Sections 6 and 7. In these sections, he continued to discuss the solutions of polynomials, but abruptly changed his element notation to the simpler $a_r$ after for the first paragraph in Section 6. This notation is first presented in the following equation:\n\n$\\begin{vmatrix}x - a_{1} & 0 & 0 & \\ldots & 0\\\\0 & x - a_{2} & 0 & \\ldots & 0\\\\\\vdots & \\vdots & \\vdots & \\ddots & \\vdots\\\\0 & 0 & 0 & \\ldots & x - a_{n} \\end{vmatrix} = 0,$\n\nwhere $a_r$ replaced Cauchy's notation of $a_{r,r}$ to denote a root of an equation. However, Rubini provided no explanation of the significance of this new notation until the end of Section 6, where he stated that the $a_r$ are solutions of equations. He could have made a smoother transition to using the $a_r$ notation, had he started utilizing it at the very beginning of Section 6 or in Section 5 when he began presenting ideas that involved the roots of polynomials. Even though Rubini changed to the more conventional notation when describing the roots of an equation, this change in notation is rather confusing for the reader due to the lack of an explanation. He may have provided these two different notations, though, to expose readers to some of the notations that were present in the analytic repertoire, in his attempt to insure the circulation of these analytic ideas.\n\nSalvatore J. Petrilli, Jr. (Adelphi University) and Nicole Smolenski (Adelphi University), \"Analysis and Translation of Raffaele Rubini's 1857 'Application of the Theory of Determinants: Note' - Rubini's Notation,\" Convergence (July 2017)\n\n## Dummy View - NOT TO BE DELETED\n\n•",
null,
"•",
null,
"•",
null,
""
] | [
null,
"https://px.ads.linkedin.com/collect/",
null,
"https://www.maa.org/sites/default/files/mbk-144.jpg",
null,
"https://www.maa.org/sites/default/files/Homepage%20Slider%20%281%29.png",
null,
"https://www.maa.org/sites/default/files/VSI%202023%20-%20Homepage%20Slider.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.82301253,"math_prob":0.9982482,"size":3420,"snap":"2023-14-2023-23","text_gpt3_token_len":1135,"char_repetition_ratio":0.14549181,"word_repetition_ratio":0.016949153,"special_character_ratio":0.3511696,"punctuation_ratio":0.12620027,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995876,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-10T11:50:19Z\",\"WARC-Record-ID\":\"<urn:uuid:6d90fa9d-66a0-4a5f-b4b4-9497ffedd6f4>\",\"Content-Length\":\"116032\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:deaf4b96-d0dd-4b99-9989-2ed2be2d2132>\",\"WARC-Concurrent-To\":\"<urn:uuid:39ba7f74-06f2-4a33-897f-2a07435b2a42>\",\"WARC-IP-Address\":\"172.67.147.157\",\"WARC-Target-URI\":\"https://www.maa.org/press/periodicals/convergence/analysis-and-translation-of-raffaele-rubinis-1857-application-of-the-theory-of-determinants-note-3\",\"WARC-Payload-Digest\":\"sha1:E2JGJPKIAWR5T733JPD7CT2TLFX5D7JG\",\"WARC-Block-Digest\":\"sha1:F53JWLKLBFMUVN4ANCV72MBGKY3WTG77\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224657169.98_warc_CC-MAIN-20230610095459-20230610125459-00090.warc.gz\"}"} |
https://www.ibm.com/docs/en/aix/7.2?topic=types-signed-unsigned-integers | [
"# Signed and Unsigned Integers\n\nThe XDR standard defines signed integers as integer. A signed integer is a 32-bit datum that encodes an integer in the range [-2147483648 to 2147483647]. An unsigned integer is a 32-bit datum that encodes a nonnegative integer in the range [0 to 4294967295].\n\nThe signed integer is represented in twos complement notation. The most significant byte is 0 and the least significant is 3.\n\nThe unsigned integer is represented by an unsigned binary number whose most significant byte is 0; the least significant is 3. See the Signed Integer and Unsigned Integer figure (Figure 1)."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90328157,"math_prob":0.9441714,"size":603,"snap":"2023-40-2023-50","text_gpt3_token_len":137,"char_repetition_ratio":0.20868114,"word_repetition_ratio":0.08421053,"special_character_ratio":0.2570481,"punctuation_ratio":0.07339449,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9825267,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-23T09:19:55Z\",\"WARC-Record-ID\":\"<urn:uuid:8c005b65-3f33-4d97-ad36-614e9524bd50>\",\"Content-Length\":\"5604\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:31ef8a52-8d68-46f4-9662-c004982b3a38>\",\"WARC-Concurrent-To\":\"<urn:uuid:b1211aa0-c58b-4f38-bc89-08203d9a70b6>\",\"WARC-IP-Address\":\"23.13.161.10\",\"WARC-Target-URI\":\"https://www.ibm.com/docs/en/aix/7.2?topic=types-signed-unsigned-integers\",\"WARC-Payload-Digest\":\"sha1:GK22E54VKFSNKPFFX5SAQG3JAISSC56M\",\"WARC-Block-Digest\":\"sha1:QT4MQD7UGUWXP5V7DVK3OZILUTMYIJLY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506480.35_warc_CC-MAIN-20230923062631-20230923092631-00526.warc.gz\"}"} |
https://petunia100.savingadvice.com/2011/01/17/half-day-grapes-of-wrath_65371/ | [
"User Real IP - 34.204.193.85\n```Array\n(\n => Array\n(\n => 182.68.68.92\n)\n\n => Array\n(\n => 101.0.41.201\n)\n\n => Array\n(\n => 43.225.98.123\n)\n\n => Array\n(\n => 2.58.194.139\n)\n\n => Array\n(\n => 46.119.197.104\n)\n\n => Array\n(\n => 45.249.8.93\n)\n\n => Array\n(\n => 103.12.135.72\n)\n\n => Array\n(\n => 157.35.243.216\n)\n\n => Array\n(\n => 209.107.214.176\n)\n\n => Array\n(\n => 5.181.233.166\n)\n\n => Array\n(\n => 106.201.10.100\n)\n\n => Array\n(\n => 36.90.55.39\n)\n\n => Array\n(\n => 119.154.138.47\n)\n\n => Array\n(\n => 51.91.31.157\n)\n\n => Array\n(\n => 182.182.65.216\n)\n\n => Array\n(\n => 157.35.252.63\n)\n\n => Array\n(\n => 14.142.34.163\n)\n\n => Array\n(\n => 178.62.43.135\n)\n\n => Array\n(\n => 43.248.152.148\n)\n\n => Array\n(\n => 222.252.104.114\n)\n\n => Array\n(\n => 209.107.214.168\n)\n\n => Array\n(\n => 103.99.199.250\n)\n\n => Array\n(\n => 178.62.72.160\n)\n\n => Array\n(\n => 27.6.1.170\n)\n\n => Array\n(\n => 182.69.249.219\n)\n\n => Array\n(\n => 110.93.228.86\n)\n\n => Array\n(\n => 72.255.1.98\n)\n\n => Array\n(\n => 182.73.111.98\n)\n\n => Array\n(\n => 45.116.117.11\n)\n\n => Array\n(\n => 122.15.78.189\n)\n\n => Array\n(\n => 14.167.188.234\n)\n\n => Array\n(\n => 223.190.4.202\n)\n\n => Array\n(\n => 202.173.125.19\n)\n\n => Array\n(\n => 103.255.5.32\n)\n\n => Array\n(\n => 39.37.145.103\n)\n\n => Array\n(\n => 140.213.26.249\n)\n\n => Array\n(\n => 45.118.166.85\n)\n\n => Array\n(\n => 102.166.138.255\n)\n\n => Array\n(\n => 77.111.246.234\n)\n\n => Array\n(\n => 45.63.6.196\n)\n\n => Array\n(\n => 103.250.147.115\n)\n\n => Array\n(\n => 223.185.30.99\n)\n\n => Array\n(\n => 103.122.168.108\n)\n\n => Array\n(\n => 123.136.203.21\n)\n\n => Array\n(\n => 171.229.243.63\n)\n\n => Array\n(\n => 153.149.98.149\n)\n\n => Array\n(\n => 223.238.93.15\n)\n\n => Array\n(\n => 178.62.113.166\n)\n\n => Array\n(\n => 101.162.0.153\n)\n\n => Array\n(\n => 121.200.62.114\n)\n\n => Array\n(\n => 14.248.77.252\n)\n\n => Array\n(\n => 95.142.117.29\n)\n\n => Array\n(\n => 150.129.60.107\n)\n\n => Array\n(\n => 94.205.243.22\n)\n\n => Array\n(\n => 115.42.71.143\n)\n\n => Array\n(\n => 117.217.195.59\n)\n\n => Array\n(\n => 182.77.112.56\n)\n\n => Array\n(\n => 182.77.112.108\n)\n\n => Array\n(\n => 41.80.69.10\n)\n\n => Array\n(\n => 117.5.222.121\n)\n\n => Array\n(\n => 103.11.0.38\n)\n\n => Array\n(\n => 202.173.127.140\n)\n\n => Array\n(\n => 49.249.249.50\n)\n\n => Array\n(\n => 116.72.198.211\n)\n\n => Array\n(\n => 223.230.54.53\n)\n\n => Array\n(\n => 102.69.228.74\n)\n\n => Array\n(\n => 39.37.251.89\n)\n\n => Array\n(\n => 39.53.246.141\n)\n\n => Array\n(\n => 39.57.182.72\n)\n\n => Array\n(\n => 209.58.130.210\n)\n\n => Array\n(\n => 104.131.75.86\n)\n\n => Array\n(\n => 106.212.131.255\n)\n\n => Array\n(\n => 106.212.132.127\n)\n\n => Array\n(\n => 223.190.4.60\n)\n\n => Array\n(\n => 103.252.116.252\n)\n\n => Array\n(\n => 103.76.55.182\n)\n\n => Array\n(\n => 45.118.166.70\n)\n\n => Array\n(\n => 103.93.174.215\n)\n\n => Array\n(\n => 5.62.62.142\n)\n\n => Array\n(\n => 182.179.158.156\n)\n\n => Array\n(\n => 39.57.255.12\n)\n\n => Array\n(\n => 39.37.178.37\n)\n\n => Array\n(\n => 182.180.165.211\n)\n\n => Array\n(\n => 119.153.135.17\n)\n\n => Array\n(\n => 72.255.15.244\n)\n\n => Array\n(\n => 139.180.166.181\n)\n\n => Array\n(\n => 70.119.147.111\n)\n\n => Array\n(\n => 106.210.40.83\n)\n\n => Array\n(\n => 14.190.70.91\n)\n\n => Array\n(\n => 202.125.156.82\n)\n\n => Array\n(\n => 115.42.68.38\n)\n\n => Array\n(\n => 102.167.13.108\n)\n\n => Array\n(\n => 117.217.192.130\n)\n\n => Array\n(\n => 205.185.223.156\n)\n\n => Array\n(\n => 171.224.180.29\n)\n\n => Array\n(\n => 45.127.45.68\n)\n\n => Array\n(\n => 195.206.183.232\n)\n\n => Array\n(\n => 49.32.52.115\n)\n\n => Array\n(\n => 49.207.49.223\n)\n\n => Array\n(\n => 45.63.29.61\n)\n\n => Array\n(\n => 103.245.193.214\n)\n\n => Array\n(\n => 39.40.236.69\n)\n\n => Array\n(\n => 62.80.162.111\n)\n\n => Array\n(\n => 45.116.232.56\n)\n\n => Array\n(\n => 45.118.166.91\n)\n\n => Array\n(\n => 180.92.230.234\n)\n\n => Array\n(\n => 157.40.57.160\n)\n\n => Array\n(\n => 110.38.38.130\n)\n\n => Array\n(\n => 72.255.57.183\n)\n\n => Array\n(\n => 182.68.81.85\n)\n\n => Array\n(\n => 39.57.202.122\n)\n\n => Array\n(\n => 119.152.154.36\n)\n\n => Array\n(\n => 5.62.62.141\n)\n\n => Array\n(\n => 119.155.54.232\n)\n\n => Array\n(\n => 39.37.141.22\n)\n\n => Array\n(\n => 183.87.12.225\n)\n\n => Array\n(\n => 107.170.127.117\n)\n\n => Array\n(\n => 125.63.124.49\n)\n\n => Array\n(\n => 39.42.191.3\n)\n\n => Array\n(\n => 116.74.24.72\n)\n\n => Array\n(\n => 46.101.89.227\n)\n\n => Array\n(\n => 202.173.125.247\n)\n\n => Array\n(\n => 39.42.184.254\n)\n\n => Array\n(\n => 115.186.165.132\n)\n\n => Array\n(\n => 39.57.206.126\n)\n\n => Array\n(\n => 103.245.13.145\n)\n\n => Array\n(\n => 202.175.246.43\n)\n\n => Array\n(\n => 192.140.152.150\n)\n\n => Array\n(\n => 202.88.250.103\n)\n\n => Array\n(\n => 103.248.94.207\n)\n\n => Array\n(\n => 77.73.66.101\n)\n\n => Array\n(\n => 104.131.66.8\n)\n\n => Array\n(\n => 113.186.161.97\n)\n\n => Array\n(\n => 222.254.5.7\n)\n\n => Array\n(\n => 223.233.67.247\n)\n\n => Array\n(\n => 171.249.116.146\n)\n\n => Array\n(\n => 47.30.209.71\n)\n\n => Array\n(\n => 202.134.13.130\n)\n\n => Array\n(\n => 27.6.135.7\n)\n\n => Array\n(\n => 107.170.186.79\n)\n\n => Array\n(\n => 103.212.89.171\n)\n\n => Array\n(\n => 117.197.9.77\n)\n\n => Array\n(\n => 122.176.206.233\n)\n\n => Array\n(\n => 192.227.253.222\n)\n\n => Array\n(\n => 182.188.224.119\n)\n\n => Array\n(\n => 14.248.70.74\n)\n\n => Array\n(\n => 42.118.219.169\n)\n\n => Array\n(\n => 110.39.146.170\n)\n\n => Array\n(\n => 119.160.66.143\n)\n\n => Array\n(\n => 103.248.95.130\n)\n\n => Array\n(\n => 27.63.152.208\n)\n\n => Array\n(\n => 49.207.114.96\n)\n\n => Array\n(\n => 102.166.23.214\n)\n\n => Array\n(\n => 175.107.254.73\n)\n\n => Array\n(\n => 103.10.227.214\n)\n\n => Array\n(\n => 202.143.115.89\n)\n\n => Array\n(\n => 110.93.227.187\n)\n\n => Array\n(\n => 103.140.31.60\n)\n\n => Array\n(\n => 110.37.231.46\n)\n\n => Array\n(\n => 39.36.99.238\n)\n\n => Array\n(\n => 157.37.140.26\n)\n\n => Array\n(\n => 43.246.202.226\n)\n\n => Array\n(\n => 137.97.8.143\n)\n\n => Array\n(\n => 182.65.52.242\n)\n\n => Array\n(\n => 115.42.69.62\n)\n\n => Array\n(\n => 14.143.254.58\n)\n\n => Array\n(\n => 223.179.143.236\n)\n\n => Array\n(\n => 223.179.143.249\n)\n\n => Array\n(\n => 103.143.7.54\n)\n\n => Array\n(\n => 223.179.139.106\n)\n\n => Array\n(\n => 39.40.219.90\n)\n\n => Array\n(\n => 45.115.141.231\n)\n\n => Array\n(\n => 120.29.100.33\n)\n\n => Array\n(\n => 112.196.132.5\n)\n\n => Array\n(\n => 202.163.123.153\n)\n\n => Array\n(\n => 5.62.58.146\n)\n\n => Array\n(\n => 39.53.216.113\n)\n\n => Array\n(\n => 42.111.160.73\n)\n\n => Array\n(\n => 107.182.231.213\n)\n\n => Array\n(\n => 119.82.94.120\n)\n\n => Array\n(\n => 178.62.34.82\n)\n\n => Array\n(\n => 203.122.6.18\n)\n\n => Array\n(\n => 157.42.38.251\n)\n\n => Array\n(\n => 45.112.68.222\n)\n\n => Array\n(\n => 49.206.212.122\n)\n\n => Array\n(\n => 104.236.70.228\n)\n\n => Array\n(\n => 42.111.34.243\n)\n\n => Array\n(\n => 84.241.19.186\n)\n\n => Array\n(\n => 89.187.180.207\n)\n\n => Array\n(\n => 104.243.212.118\n)\n\n => Array\n(\n => 104.236.55.136\n)\n\n => Array\n(\n => 106.201.16.163\n)\n\n => Array\n(\n => 46.101.40.25\n)\n\n => Array\n(\n => 45.118.166.94\n)\n\n => Array\n(\n => 49.36.128.102\n)\n\n => Array\n(\n => 14.142.193.58\n)\n\n => Array\n(\n => 212.79.124.176\n)\n\n => Array\n(\n => 45.32.191.194\n)\n\n => Array\n(\n => 105.112.107.46\n)\n\n => Array\n(\n => 106.201.14.8\n)\n\n => Array\n(\n => 110.93.240.65\n)\n\n => Array\n(\n => 27.96.95.177\n)\n\n => Array\n(\n => 45.41.134.35\n)\n\n => Array\n(\n => 180.151.13.110\n)\n\n => Array\n(\n => 101.53.242.89\n)\n\n => Array\n(\n => 115.186.3.110\n)\n\n => Array\n(\n => 171.49.185.242\n)\n\n => Array\n(\n => 115.42.70.24\n)\n\n => Array\n(\n => 45.128.188.43\n)\n\n => Array\n(\n => 103.140.129.63\n)\n\n => Array\n(\n => 101.50.113.147\n)\n\n => Array\n(\n => 103.66.73.30\n)\n\n => Array\n(\n => 117.247.193.169\n)\n\n => Array\n(\n => 120.29.100.94\n)\n\n => Array\n(\n => 42.109.154.39\n)\n\n => Array\n(\n => 122.173.155.150\n)\n\n => Array\n(\n => 45.115.104.53\n)\n\n => Array\n(\n => 116.74.29.84\n)\n\n => Array\n(\n => 101.50.125.34\n)\n\n => Array\n(\n => 45.118.166.80\n)\n\n => Array\n(\n => 91.236.184.27\n)\n\n => Array\n(\n => 113.167.185.120\n)\n\n => Array\n(\n => 27.97.66.222\n)\n\n => Array\n(\n => 43.247.41.117\n)\n\n => Array\n(\n => 23.229.16.227\n)\n\n => Array\n(\n => 14.248.79.209\n)\n\n => Array\n(\n => 117.5.194.26\n)\n\n => Array\n(\n => 117.217.205.41\n)\n\n => Array\n(\n => 114.79.169.99\n)\n\n => Array\n(\n => 103.55.60.97\n)\n\n => Array\n(\n => 182.75.89.210\n)\n\n => Array\n(\n => 77.73.66.109\n)\n\n => Array\n(\n => 182.77.126.139\n)\n\n => Array\n(\n => 14.248.77.166\n)\n\n => Array\n(\n => 157.35.224.133\n)\n\n => Array\n(\n => 183.83.38.27\n)\n\n => Array\n(\n => 182.68.4.77\n)\n\n => Array\n(\n => 122.177.130.234\n)\n\n => Array\n(\n => 103.24.99.99\n)\n\n => Array\n(\n => 103.91.127.66\n)\n\n => Array\n(\n => 41.90.34.240\n)\n\n => Array\n(\n => 49.205.77.102\n)\n\n => Array\n(\n => 103.248.94.142\n)\n\n => Array\n(\n => 104.143.92.170\n)\n\n => Array\n(\n => 219.91.157.114\n)\n\n => Array\n(\n => 223.190.88.22\n)\n\n => Array\n(\n => 223.190.86.232\n)\n\n => Array\n(\n => 39.41.172.80\n)\n\n => Array\n(\n => 124.107.206.5\n)\n\n => Array\n(\n => 139.167.180.224\n)\n\n => Array\n(\n => 93.76.64.248\n)\n\n => Array\n(\n => 65.216.227.119\n)\n\n => Array\n(\n => 223.190.119.141\n)\n\n => Array\n(\n => 110.93.237.179\n)\n\n => Array\n(\n => 41.90.7.85\n)\n\n => Array\n(\n => 103.100.6.26\n)\n\n => Array\n(\n => 104.140.83.13\n)\n\n => Array\n(\n => 223.190.119.133\n)\n\n => Array\n(\n => 119.152.150.87\n)\n\n => Array\n(\n => 103.125.130.147\n)\n\n => Array\n(\n => 27.6.5.52\n)\n\n => Array\n(\n => 103.98.188.26\n)\n\n => Array\n(\n => 39.35.121.81\n)\n\n => Array\n(\n => 74.119.146.182\n)\n\n => Array\n(\n => 5.181.233.162\n)\n\n => Array\n(\n => 157.39.18.60\n)\n\n => Array\n(\n => 1.187.252.25\n)\n\n => Array\n(\n => 39.42.145.59\n)\n\n => Array\n(\n => 39.35.39.198\n)\n\n => Array\n(\n => 49.36.128.214\n)\n\n => Array\n(\n => 182.190.20.56\n)\n\n => Array\n(\n => 122.180.249.189\n)\n\n => Array\n(\n => 117.217.203.107\n)\n\n => Array\n(\n => 103.70.82.241\n)\n\n => Array\n(\n => 45.118.166.68\n)\n\n => Array\n(\n => 122.180.168.39\n)\n\n => Array\n(\n => 149.28.67.254\n)\n\n => Array\n(\n => 223.233.73.8\n)\n\n => Array\n(\n => 122.167.140.0\n)\n\n => Array\n(\n => 95.158.51.55\n)\n\n => Array\n(\n => 27.96.95.134\n)\n\n => Array\n(\n => 49.206.214.53\n)\n\n => Array\n(\n => 212.103.49.92\n)\n\n => Array\n(\n => 122.177.115.101\n)\n\n => Array\n(\n => 171.50.187.124\n)\n\n => Array\n(\n => 122.164.55.107\n)\n\n => Array\n(\n => 98.114.217.204\n)\n\n => Array\n(\n => 106.215.10.54\n)\n\n => Array\n(\n => 115.42.68.28\n)\n\n => Array\n(\n => 104.194.220.87\n)\n\n => Array\n(\n => 103.137.84.170\n)\n\n => Array\n(\n => 61.16.142.110\n)\n\n => Array\n(\n => 212.103.49.85\n)\n\n => Array\n(\n => 39.53.248.162\n)\n\n => Array\n(\n => 203.122.40.214\n)\n\n => Array\n(\n => 117.217.198.72\n)\n\n => Array\n(\n => 115.186.191.203\n)\n\n => Array\n(\n => 120.29.100.199\n)\n\n => Array\n(\n => 45.151.237.24\n)\n\n => Array\n(\n => 223.190.125.232\n)\n\n => Array\n(\n => 41.80.151.17\n)\n\n => Array\n(\n => 23.111.188.5\n)\n\n => Array\n(\n => 223.190.125.216\n)\n\n => Array\n(\n => 103.217.133.119\n)\n\n => Array\n(\n => 103.198.173.132\n)\n\n => Array\n(\n => 47.31.155.89\n)\n\n => Array\n(\n => 223.190.20.253\n)\n\n => Array\n(\n => 104.131.92.125\n)\n\n => Array\n(\n => 223.190.19.152\n)\n\n => Array\n(\n => 103.245.193.191\n)\n\n => Array\n(\n => 106.215.58.255\n)\n\n => Array\n(\n => 119.82.83.238\n)\n\n => Array\n(\n => 106.212.128.138\n)\n\n => Array\n(\n => 139.167.237.36\n)\n\n => Array\n(\n => 222.124.40.250\n)\n\n => Array\n(\n => 134.56.185.169\n)\n\n => Array\n(\n => 54.255.226.31\n)\n\n => Array\n(\n => 137.97.162.31\n)\n\n => Array\n(\n => 95.185.21.191\n)\n\n => Array\n(\n => 171.61.168.151\n)\n\n => Array\n(\n => 137.97.184.4\n)\n\n => Array\n(\n => 106.203.151.202\n)\n\n => Array\n(\n => 39.37.137.0\n)\n\n => Array\n(\n => 45.118.166.66\n)\n\n => Array\n(\n => 14.248.105.100\n)\n\n => Array\n(\n => 106.215.61.185\n)\n\n => Array\n(\n => 202.83.57.179\n)\n\n => Array\n(\n => 89.187.182.176\n)\n\n => Array\n(\n => 49.249.232.198\n)\n\n => Array\n(\n => 132.154.95.236\n)\n\n => Array\n(\n => 223.233.83.230\n)\n\n => Array\n(\n => 183.83.153.14\n)\n\n => Array\n(\n => 125.63.72.210\n)\n\n => Array\n(\n => 207.174.202.11\n)\n\n => Array\n(\n => 119.95.88.59\n)\n\n => Array\n(\n => 122.170.14.150\n)\n\n => Array\n(\n => 45.118.166.75\n)\n\n => Array\n(\n => 103.12.135.37\n)\n\n => Array\n(\n => 49.207.120.225\n)\n\n => Array\n(\n => 182.64.195.207\n)\n\n => Array\n(\n => 103.99.37.16\n)\n\n => Array\n(\n => 46.150.104.221\n)\n\n => Array\n(\n => 104.236.195.147\n)\n\n => Array\n(\n => 103.104.192.43\n)\n\n => Array\n(\n => 24.242.159.118\n)\n\n => Array\n(\n => 39.42.179.143\n)\n\n => Array\n(\n => 111.93.58.131\n)\n\n => Array\n(\n => 193.176.84.127\n)\n\n => Array\n(\n => 209.58.142.218\n)\n\n => Array\n(\n => 69.243.152.129\n)\n\n => Array\n(\n => 117.97.131.249\n)\n\n => Array\n(\n => 103.230.180.89\n)\n\n => Array\n(\n => 106.212.170.192\n)\n\n => Array\n(\n => 171.224.180.95\n)\n\n => Array\n(\n => 158.222.11.87\n)\n\n => Array\n(\n => 119.155.60.246\n)\n\n => Array\n(\n => 41.90.43.129\n)\n\n => Array\n(\n => 185.183.104.170\n)\n\n => Array\n(\n => 14.248.67.65\n)\n\n => Array\n(\n => 117.217.205.82\n)\n\n => Array\n(\n => 111.88.7.209\n)\n\n => Array\n(\n => 49.36.132.244\n)\n\n => Array\n(\n => 171.48.40.2\n)\n\n => Array\n(\n => 119.81.105.2\n)\n\n => Array\n(\n => 49.36.128.114\n)\n\n => Array\n(\n => 213.200.31.93\n)\n\n => Array\n(\n => 2.50.15.110\n)\n\n => Array\n(\n => 120.29.104.67\n)\n\n => Array\n(\n => 223.225.32.221\n)\n\n => Array\n(\n => 14.248.67.195\n)\n\n => Array\n(\n => 119.155.36.13\n)\n\n => Array\n(\n => 101.50.95.104\n)\n\n => Array\n(\n => 104.236.205.233\n)\n\n => Array\n(\n => 122.164.36.150\n)\n\n => Array\n(\n => 157.45.93.209\n)\n\n => Array\n(\n => 182.77.118.100\n)\n\n => Array\n(\n => 182.74.134.218\n)\n\n => Array\n(\n => 183.82.128.146\n)\n\n => Array\n(\n => 112.196.170.234\n)\n\n => Array\n(\n => 122.173.230.178\n)\n\n => Array\n(\n => 122.164.71.199\n)\n\n => Array\n(\n => 51.79.19.31\n)\n\n => Array\n(\n => 58.65.222.20\n)\n\n => Array\n(\n => 103.27.203.97\n)\n\n => Array\n(\n => 111.88.7.242\n)\n\n => Array\n(\n => 14.171.232.77\n)\n\n => Array\n(\n => 46.101.22.182\n)\n\n => Array\n(\n => 103.94.219.19\n)\n\n => Array\n(\n => 139.190.83.30\n)\n\n => Array\n(\n => 223.190.27.184\n)\n\n => Array\n(\n => 182.185.183.34\n)\n\n => Array\n(\n => 91.74.181.242\n)\n\n => Array\n(\n => 222.252.107.14\n)\n\n => Array\n(\n => 137.97.8.28\n)\n\n => Array\n(\n => 46.101.16.229\n)\n\n => Array\n(\n => 122.53.254.229\n)\n\n => Array\n(\n => 106.201.17.180\n)\n\n => Array\n(\n => 123.24.170.129\n)\n\n => Array\n(\n => 182.185.180.79\n)\n\n => Array\n(\n => 223.190.17.4\n)\n\n => Array\n(\n => 213.108.105.1\n)\n\n => Array\n(\n => 171.22.76.9\n)\n\n => Array\n(\n => 202.66.178.164\n)\n\n => Array\n(\n => 178.62.97.171\n)\n\n => Array\n(\n => 167.179.110.209\n)\n\n => Array\n(\n => 223.230.147.172\n)\n\n => Array\n(\n => 76.218.195.160\n)\n\n => Array\n(\n => 14.189.186.178\n)\n\n => Array\n(\n => 157.41.45.143\n)\n\n => Array\n(\n => 223.238.22.53\n)\n\n => Array\n(\n => 111.88.7.244\n)\n\n => Array\n(\n => 5.62.57.19\n)\n\n => Array\n(\n => 106.201.25.216\n)\n\n => Array\n(\n => 117.217.205.33\n)\n\n => Array\n(\n => 111.88.7.215\n)\n\n => Array\n(\n => 106.201.13.77\n)\n\n => Array\n(\n => 50.7.93.29\n)\n\n => Array\n(\n => 123.201.70.112\n)\n\n => Array\n(\n => 39.42.108.226\n)\n\n => Array\n(\n => 27.5.198.29\n)\n\n => Array\n(\n => 223.238.85.187\n)\n\n => Array\n(\n => 171.49.176.32\n)\n\n => Array\n(\n => 14.248.79.242\n)\n\n => Array\n(\n => 46.219.211.183\n)\n\n => Array\n(\n => 185.244.212.251\n)\n\n => Array\n(\n => 14.102.84.126\n)\n\n => Array\n(\n => 106.212.191.52\n)\n\n => Array\n(\n => 154.72.153.203\n)\n\n => Array\n(\n => 14.175.82.64\n)\n\n => Array\n(\n => 141.105.139.131\n)\n\n => Array\n(\n => 182.156.103.98\n)\n\n => Array\n(\n => 117.217.204.75\n)\n\n => Array\n(\n => 104.140.83.115\n)\n\n => Array\n(\n => 119.152.62.8\n)\n\n => Array\n(\n => 45.125.247.94\n)\n\n => Array\n(\n => 137.97.37.252\n)\n\n => Array\n(\n => 117.217.204.73\n)\n\n => Array\n(\n => 14.248.79.133\n)\n\n => Array\n(\n => 39.37.152.52\n)\n\n => Array\n(\n => 103.55.60.54\n)\n\n => Array\n(\n => 102.166.183.88\n)\n\n => Array\n(\n => 5.62.60.162\n)\n\n => Array\n(\n => 5.62.60.163\n)\n\n => Array\n(\n => 160.202.38.131\n)\n\n => Array\n(\n => 106.215.20.253\n)\n\n => Array\n(\n => 39.37.160.54\n)\n\n => Array\n(\n => 119.152.59.186\n)\n\n => Array\n(\n => 183.82.0.164\n)\n\n => Array\n(\n => 41.90.54.87\n)\n\n => Array\n(\n => 157.36.85.158\n)\n\n => Array\n(\n => 110.37.229.162\n)\n\n => Array\n(\n => 203.99.180.148\n)\n\n => Array\n(\n => 117.97.132.91\n)\n\n => Array\n(\n => 171.61.147.105\n)\n\n => Array\n(\n => 14.98.147.214\n)\n\n => Array\n(\n => 209.234.253.191\n)\n\n => Array\n(\n => 92.38.148.60\n)\n\n => Array\n(\n => 178.128.104.139\n)\n\n => Array\n(\n => 212.154.0.176\n)\n\n => Array\n(\n => 103.41.24.141\n)\n\n => Array\n(\n => 2.58.194.132\n)\n\n => Array\n(\n => 180.190.78.169\n)\n\n => Array\n(\n => 106.215.45.182\n)\n\n => Array\n(\n => 125.63.100.222\n)\n\n => Array\n(\n => 110.54.247.17\n)\n\n => Array\n(\n => 103.26.85.105\n)\n\n => Array\n(\n => 39.42.147.3\n)\n\n => Array\n(\n => 137.97.51.41\n)\n\n => Array\n(\n => 71.202.72.27\n)\n\n => Array\n(\n => 119.155.35.10\n)\n\n => Array\n(\n => 202.47.43.120\n)\n\n => Array\n(\n => 183.83.64.101\n)\n\n => Array\n(\n => 182.68.106.141\n)\n\n => Array\n(\n => 171.61.187.87\n)\n\n => Array\n(\n => 178.162.198.118\n)\n\n => Array\n(\n => 115.97.151.218\n)\n\n => Array\n(\n => 196.207.184.210\n)\n\n => Array\n(\n => 198.16.70.51\n)\n\n => Array\n(\n => 41.60.237.33\n)\n\n => Array\n(\n => 47.11.86.26\n)\n\n => Array\n(\n => 117.217.201.183\n)\n\n => Array\n(\n => 203.192.241.79\n)\n\n => Array\n(\n => 122.165.119.85\n)\n\n => Array\n(\n => 23.227.142.218\n)\n\n => Array\n(\n => 178.128.104.221\n)\n\n => Array\n(\n => 14.192.54.163\n)\n\n => Array\n(\n => 139.5.253.218\n)\n\n => Array\n(\n => 117.230.140.127\n)\n\n => Array\n(\n => 195.114.149.199\n)\n\n => Array\n(\n => 14.239.180.220\n)\n\n => Array\n(\n => 103.62.155.94\n)\n\n => Array\n(\n => 118.71.97.14\n)\n\n => Array\n(\n => 137.97.55.163\n)\n\n => Array\n(\n => 202.47.49.198\n)\n\n => Array\n(\n => 171.61.177.85\n)\n\n => Array\n(\n => 137.97.190.224\n)\n\n => Array\n(\n => 117.230.34.142\n)\n\n => Array\n(\n => 103.41.32.5\n)\n\n => Array\n(\n => 203.90.82.237\n)\n\n => Array\n(\n => 125.63.124.238\n)\n\n => Array\n(\n => 103.232.128.78\n)\n\n => Array\n(\n => 106.197.14.227\n)\n\n => Array\n(\n => 81.17.242.244\n)\n\n => Array\n(\n => 81.19.210.179\n)\n\n => Array\n(\n => 103.134.94.98\n)\n\n => Array\n(\n => 110.38.0.86\n)\n\n => Array\n(\n => 103.10.224.195\n)\n\n => Array\n(\n => 45.118.166.89\n)\n\n => Array\n(\n => 115.186.186.68\n)\n\n => Array\n(\n => 138.197.129.237\n)\n\n => Array\n(\n => 14.247.162.52\n)\n\n => Array\n(\n => 103.255.4.5\n)\n\n => Array\n(\n => 14.167.188.254\n)\n\n => Array\n(\n => 5.62.59.54\n)\n\n => Array\n(\n => 27.122.14.80\n)\n\n => Array\n(\n => 39.53.240.21\n)\n\n => Array\n(\n => 39.53.241.243\n)\n\n => Array\n(\n => 117.230.130.161\n)\n\n => Array\n(\n => 118.71.191.149\n)\n\n => Array\n(\n => 5.188.95.54\n)\n\n => Array\n(\n => 66.45.250.27\n)\n\n => Array\n(\n => 106.215.6.175\n)\n\n => Array\n(\n => 27.122.14.86\n)\n\n => Array\n(\n => 103.255.4.51\n)\n\n => Array\n(\n => 101.50.93.119\n)\n\n => Array\n(\n => 137.97.183.51\n)\n\n => Array\n(\n => 117.217.204.185\n)\n\n => Array\n(\n => 95.104.106.82\n)\n\n => Array\n(\n => 5.62.56.211\n)\n\n => Array\n(\n => 103.104.181.214\n)\n\n => Array\n(\n => 36.72.214.243\n)\n\n => Array\n(\n => 5.62.62.219\n)\n\n => Array\n(\n => 110.36.202.4\n)\n\n => Array\n(\n => 103.255.4.253\n)\n\n => Array\n(\n => 110.172.138.61\n)\n\n => Array\n(\n => 159.203.24.195\n)\n\n => Array\n(\n => 13.229.88.42\n)\n\n => Array\n(\n => 59.153.235.20\n)\n\n => Array\n(\n => 171.236.169.32\n)\n\n => Array\n(\n => 14.231.85.206\n)\n\n => Array\n(\n => 119.152.54.103\n)\n\n => Array\n(\n => 103.80.117.202\n)\n\n => Array\n(\n => 223.179.157.75\n)\n\n => Array\n(\n => 122.173.68.249\n)\n\n => Array\n(\n => 188.163.72.113\n)\n\n => Array\n(\n => 119.155.20.164\n)\n\n => Array\n(\n => 103.121.43.68\n)\n\n => Array\n(\n => 5.62.58.6\n)\n\n => Array\n(\n => 203.122.40.154\n)\n\n => Array\n(\n => 222.254.96.203\n)\n\n => Array\n(\n => 103.83.148.167\n)\n\n => Array\n(\n => 103.87.251.226\n)\n\n => Array\n(\n => 123.24.129.24\n)\n\n => Array\n(\n => 137.97.83.8\n)\n\n => Array\n(\n => 223.225.33.132\n)\n\n => Array\n(\n => 128.76.175.190\n)\n\n => Array\n(\n => 195.85.219.32\n)\n\n => Array\n(\n => 139.167.102.93\n)\n\n => Array\n(\n => 49.15.198.253\n)\n\n => Array\n(\n => 45.152.183.172\n)\n\n => Array\n(\n => 42.106.180.136\n)\n\n => Array\n(\n => 95.142.120.9\n)\n\n => Array\n(\n => 139.167.236.4\n)\n\n => Array\n(\n => 159.65.72.167\n)\n\n => Array\n(\n => 49.15.89.2\n)\n\n => Array\n(\n => 42.201.161.195\n)\n\n => Array\n(\n => 27.97.210.38\n)\n\n => Array\n(\n => 171.241.45.19\n)\n\n => Array\n(\n => 42.108.2.18\n)\n\n => Array\n(\n => 171.236.40.68\n)\n\n => Array\n(\n => 110.93.82.102\n)\n\n => Array\n(\n => 43.225.24.186\n)\n\n => Array\n(\n => 117.230.189.119\n)\n\n => Array\n(\n => 124.123.147.187\n)\n\n => Array\n(\n => 216.151.184.250\n)\n\n => Array\n(\n => 49.15.133.16\n)\n\n => Array\n(\n => 49.15.220.74\n)\n\n => Array\n(\n => 157.37.221.246\n)\n\n => Array\n(\n => 176.124.233.112\n)\n\n => Array\n(\n => 118.71.167.40\n)\n\n => Array\n(\n => 182.185.213.161\n)\n\n => Array\n(\n => 47.31.79.248\n)\n\n => Array\n(\n => 223.179.238.192\n)\n\n => Array\n(\n => 79.110.128.219\n)\n\n => Array\n(\n => 106.210.42.111\n)\n\n => Array\n(\n => 47.247.214.229\n)\n\n => Array\n(\n => 193.0.220.108\n)\n\n => Array\n(\n => 1.39.206.254\n)\n\n => Array\n(\n => 123.201.77.38\n)\n\n => Array\n(\n => 115.178.207.21\n)\n\n => Array\n(\n => 37.111.202.92\n)\n\n => Array\n(\n => 49.14.179.243\n)\n\n => Array\n(\n => 117.230.145.171\n)\n\n => Array\n(\n => 171.229.242.96\n)\n\n => Array\n(\n => 27.59.174.209\n)\n\n => Array\n(\n => 1.38.202.211\n)\n\n => Array\n(\n => 157.37.128.46\n)\n\n => Array\n(\n => 49.15.94.80\n)\n\n => Array\n(\n => 123.25.46.147\n)\n\n => Array\n(\n => 117.230.170.185\n)\n\n => Array\n(\n => 5.62.16.19\n)\n\n => Array\n(\n => 103.18.22.25\n)\n\n => Array\n(\n => 103.46.200.132\n)\n\n => Array\n(\n => 27.97.165.126\n)\n\n => Array\n(\n => 117.230.54.241\n)\n\n => Array\n(\n => 27.97.209.76\n)\n\n => Array\n(\n => 47.31.182.109\n)\n\n => Array\n(\n => 47.30.223.221\n)\n\n => Array\n(\n => 103.31.94.82\n)\n\n => Array\n(\n => 103.211.14.45\n)\n\n => Array\n(\n => 171.49.233.58\n)\n\n => Array\n(\n => 65.49.126.95\n)\n\n => Array\n(\n => 69.255.101.170\n)\n\n => Array\n(\n => 27.56.224.67\n)\n\n => Array\n(\n => 117.230.146.86\n)\n\n => Array\n(\n => 27.59.154.52\n)\n\n => Array\n(\n => 132.154.114.10\n)\n\n => Array\n(\n => 182.186.77.60\n)\n\n => Array\n(\n => 117.230.136.74\n)\n\n => Array\n(\n => 43.251.94.253\n)\n\n => Array\n(\n => 103.79.168.225\n)\n\n => Array\n(\n => 117.230.56.51\n)\n\n => Array\n(\n => 27.97.187.45\n)\n\n => Array\n(\n => 137.97.190.61\n)\n\n => Array\n(\n => 193.0.220.26\n)\n\n => Array\n(\n => 49.36.137.62\n)\n\n => Array\n(\n => 47.30.189.248\n)\n\n => Array\n(\n => 109.169.23.84\n)\n\n => Array\n(\n => 111.119.185.46\n)\n\n => Array\n(\n => 103.83.148.246\n)\n\n => Array\n(\n => 157.32.119.138\n)\n\n => Array\n(\n => 5.62.41.53\n)\n\n => Array\n(\n => 47.8.243.236\n)\n\n => Array\n(\n => 112.79.158.69\n)\n\n => Array\n(\n => 180.92.148.218\n)\n\n => Array\n(\n => 157.36.162.154\n)\n\n => Array\n(\n => 39.46.114.47\n)\n\n => Array\n(\n => 117.230.173.250\n)\n\n => Array\n(\n => 117.230.155.188\n)\n\n => Array\n(\n => 193.0.220.17\n)\n\n => Array\n(\n => 117.230.171.166\n)\n\n => Array\n(\n => 49.34.59.228\n)\n\n => Array\n(\n => 111.88.197.247\n)\n\n => Array\n(\n => 47.31.156.112\n)\n\n => Array\n(\n => 137.97.64.180\n)\n\n => Array\n(\n => 14.244.227.18\n)\n\n => Array\n(\n => 113.167.158.8\n)\n\n => Array\n(\n => 39.37.175.189\n)\n\n => Array\n(\n => 139.167.211.8\n)\n\n => Array\n(\n => 73.120.85.235\n)\n\n => Array\n(\n => 104.236.195.72\n)\n\n => Array\n(\n => 27.97.190.71\n)\n\n => Array\n(\n => 79.46.170.222\n)\n\n => Array\n(\n => 102.185.244.207\n)\n\n => Array\n(\n => 37.111.136.30\n)\n\n => Array\n(\n => 50.7.93.28\n)\n\n => Array\n(\n => 110.54.251.43\n)\n\n => Array\n(\n => 49.36.143.40\n)\n\n => Array\n(\n => 103.130.112.185\n)\n\n => Array\n(\n => 37.111.139.202\n)\n\n => Array\n(\n => 49.36.139.108\n)\n\n => Array\n(\n => 37.111.136.179\n)\n\n => Array\n(\n => 123.17.165.77\n)\n\n => Array\n(\n => 49.207.143.206\n)\n\n => Array\n(\n => 39.53.80.149\n)\n\n => Array\n(\n => 223.188.71.214\n)\n\n => Array\n(\n => 1.39.222.233\n)\n\n => Array\n(\n => 117.230.9.85\n)\n\n => Array\n(\n => 103.251.245.216\n)\n\n => Array\n(\n => 122.169.133.145\n)\n\n => Array\n(\n => 43.250.165.57\n)\n\n => Array\n(\n => 39.44.13.235\n)\n\n => Array\n(\n => 157.47.181.2\n)\n\n => Array\n(\n => 27.56.203.50\n)\n\n => Array\n(\n => 191.96.97.58\n)\n\n => Array\n(\n => 111.88.107.172\n)\n\n => Array\n(\n => 113.193.198.136\n)\n\n => Array\n(\n => 117.230.172.175\n)\n\n => Array\n(\n => 191.96.182.239\n)\n\n => Array\n(\n => 2.58.46.28\n)\n\n => Array\n(\n => 183.83.253.87\n)\n\n => Array\n(\n => 49.15.139.242\n)\n\n => Array\n(\n => 42.107.220.236\n)\n\n => Array\n(\n => 14.192.53.196\n)\n\n => Array\n(\n => 42.119.212.202\n)\n\n => Array\n(\n => 192.158.234.45\n)\n\n => Array\n(\n => 49.149.102.192\n)\n\n => Array\n(\n => 47.8.170.17\n)\n\n => Array\n(\n => 117.197.13.247\n)\n\n => Array\n(\n => 116.74.34.44\n)\n\n => Array\n(\n => 103.79.249.163\n)\n\n => Array\n(\n => 182.189.95.70\n)\n\n => Array\n(\n => 137.59.218.118\n)\n\n => Array\n(\n => 103.79.170.243\n)\n\n => Array\n(\n => 39.40.54.25\n)\n\n => Array\n(\n => 119.155.40.170\n)\n\n => Array\n(\n => 1.39.212.157\n)\n\n => Array\n(\n => 70.127.59.89\n)\n\n => Array\n(\n => 14.171.22.58\n)\n\n => Array\n(\n => 194.44.167.141\n)\n\n => Array\n(\n => 111.88.179.154\n)\n\n => Array\n(\n => 117.230.140.232\n)\n\n => Array\n(\n => 137.97.96.128\n)\n\n => Array\n(\n => 198.16.66.123\n)\n\n => Array\n(\n => 106.198.44.193\n)\n\n => Array\n(\n => 119.153.45.75\n)\n\n => Array\n(\n => 49.15.242.208\n)\n\n => Array\n(\n => 119.155.241.20\n)\n\n => Array\n(\n => 106.223.109.155\n)\n\n => Array\n(\n => 119.160.119.245\n)\n\n => Array\n(\n => 106.215.81.160\n)\n\n => Array\n(\n => 1.39.192.211\n)\n\n => Array\n(\n => 223.230.35.208\n)\n\n => Array\n(\n => 39.59.4.158\n)\n\n => Array\n(\n => 43.231.57.234\n)\n\n => Array\n(\n => 60.254.78.193\n)\n\n => Array\n(\n => 122.170.224.87\n)\n\n => Array\n(\n => 117.230.22.141\n)\n\n => Array\n(\n => 119.152.107.211\n)\n\n => Array\n(\n => 103.87.192.206\n)\n\n => Array\n(\n => 39.45.244.47\n)\n\n => Array\n(\n => 50.72.141.94\n)\n\n => Array\n(\n => 39.40.6.128\n)\n\n => Array\n(\n => 39.45.180.186\n)\n\n => Array\n(\n => 49.207.131.233\n)\n\n => Array\n(\n => 139.59.69.142\n)\n\n => Array\n(\n => 111.119.187.29\n)\n\n => Array\n(\n => 119.153.40.69\n)\n\n => Array\n(\n => 49.36.133.64\n)\n\n => Array\n(\n => 103.255.4.249\n)\n\n => Array\n(\n => 198.144.154.15\n)\n\n => Array\n(\n => 1.22.46.172\n)\n\n => Array\n(\n => 103.255.5.46\n)\n\n => Array\n(\n => 27.56.195.188\n)\n\n => Array\n(\n => 203.101.167.53\n)\n\n => Array\n(\n => 117.230.62.195\n)\n\n => Array\n(\n => 103.240.194.186\n)\n\n => Array\n(\n => 107.170.166.118\n)\n\n => Array\n(\n => 101.53.245.80\n)\n\n => Array\n(\n => 157.43.13.208\n)\n\n => Array\n(\n => 137.97.100.77\n)\n\n => Array\n(\n => 47.31.150.208\n)\n\n => Array\n(\n => 137.59.222.65\n)\n\n => Array\n(\n => 103.85.127.250\n)\n\n => Array\n(\n => 103.214.119.32\n)\n\n => Array\n(\n => 182.255.49.52\n)\n\n => Array\n(\n => 103.75.247.72\n)\n\n => Array\n(\n => 103.85.125.250\n)\n\n => Array\n(\n => 183.83.253.167\n)\n\n => Array\n(\n => 1.39.222.111\n)\n\n => Array\n(\n => 111.119.185.9\n)\n\n => Array\n(\n => 111.119.187.10\n)\n\n => Array\n(\n => 39.37.147.144\n)\n\n => Array\n(\n => 103.200.198.183\n)\n\n => Array\n(\n => 1.39.222.18\n)\n\n => Array\n(\n => 198.8.80.103\n)\n\n => Array\n(\n => 42.108.1.243\n)\n\n => Array\n(\n => 111.119.187.16\n)\n\n => Array\n(\n => 39.40.241.8\n)\n\n => Array\n(\n => 122.169.150.158\n)\n\n => Array\n(\n => 39.40.215.119\n)\n\n => Array\n(\n => 103.255.5.77\n)\n\n => Array\n(\n => 157.38.108.196\n)\n\n => Array\n(\n => 103.255.4.67\n)\n\n => Array\n(\n => 5.62.60.62\n)\n\n => Array\n(\n => 39.37.146.202\n)\n\n => Array\n(\n => 110.138.6.221\n)\n\n => Array\n(\n => 49.36.143.88\n)\n\n => Array\n(\n => 37.1.215.39\n)\n\n => Array\n(\n => 27.106.59.190\n)\n\n => Array\n(\n => 139.167.139.41\n)\n\n => Array\n(\n => 114.142.166.179\n)\n\n => Array\n(\n => 223.225.240.112\n)\n\n => Array\n(\n => 103.255.5.36\n)\n\n => Array\n(\n => 175.136.1.48\n)\n\n => Array\n(\n => 103.82.80.166\n)\n\n => Array\n(\n => 182.185.196.126\n)\n\n => Array\n(\n => 157.43.45.76\n)\n\n => Array\n(\n => 119.152.132.49\n)\n\n => Array\n(\n => 5.62.62.162\n)\n\n => Array\n(\n => 103.255.4.39\n)\n\n => Array\n(\n => 202.5.144.153\n)\n\n => Array\n(\n => 1.39.223.210\n)\n\n => Array\n(\n => 92.38.176.154\n)\n\n => Array\n(\n => 117.230.186.142\n)\n\n => Array\n(\n => 183.83.39.123\n)\n\n => Array\n(\n => 182.185.156.76\n)\n\n => Array\n(\n => 104.236.74.212\n)\n\n => Array\n(\n => 107.170.145.187\n)\n\n => Array\n(\n => 117.102.7.98\n)\n\n => Array\n(\n => 137.59.220.0\n)\n\n => Array\n(\n => 157.47.222.14\n)\n\n => Array\n(\n => 47.15.206.82\n)\n\n => Array\n(\n => 117.230.159.99\n)\n\n => Array\n(\n => 117.230.175.151\n)\n\n => Array\n(\n => 157.50.97.18\n)\n\n => Array\n(\n => 117.230.47.164\n)\n\n => Array\n(\n => 77.111.244.34\n)\n\n => Array\n(\n => 139.167.189.131\n)\n\n => Array\n(\n => 1.39.204.103\n)\n\n => Array\n(\n => 117.230.58.0\n)\n\n => Array\n(\n => 182.185.226.66\n)\n\n => Array\n(\n => 115.42.70.119\n)\n\n => Array\n(\n => 171.48.114.134\n)\n\n => Array\n(\n => 144.34.218.75\n)\n\n => Array\n(\n => 199.58.164.135\n)\n\n => Array\n(\n => 101.53.228.151\n)\n\n => Array\n(\n => 117.230.50.57\n)\n\n => Array\n(\n => 223.225.138.84\n)\n\n => Array\n(\n => 110.225.67.65\n)\n\n => Array\n(\n => 47.15.200.39\n)\n\n => Array\n(\n => 39.42.20.127\n)\n\n => Array\n(\n => 117.97.241.81\n)\n\n => Array\n(\n => 111.119.185.11\n)\n\n => Array\n(\n => 103.100.5.94\n)\n\n => Array\n(\n => 103.25.137.69\n)\n\n => Array\n(\n => 47.15.197.159\n)\n\n => Array\n(\n => 223.188.176.122\n)\n\n => Array\n(\n => 27.4.175.80\n)\n\n => Array\n(\n => 181.215.43.82\n)\n\n => Array\n(\n => 27.56.228.157\n)\n\n => Array\n(\n => 117.230.19.19\n)\n\n => Array\n(\n => 47.15.208.71\n)\n\n => Array\n(\n => 119.155.21.176\n)\n\n => Array\n(\n => 47.15.234.202\n)\n\n => Array\n(\n => 117.230.144.135\n)\n\n => Array\n(\n => 112.79.139.199\n)\n\n => Array\n(\n => 116.75.246.41\n)\n\n => Array\n(\n => 117.230.177.126\n)\n\n => Array\n(\n => 212.103.48.134\n)\n\n => Array\n(\n => 102.69.228.78\n)\n\n => Array\n(\n => 117.230.37.118\n)\n\n => Array\n(\n => 175.143.61.75\n)\n\n => Array\n(\n => 139.167.56.138\n)\n\n => Array\n(\n => 58.145.189.250\n)\n\n => Array\n(\n => 103.255.5.65\n)\n\n => Array\n(\n => 39.37.153.182\n)\n\n => Array\n(\n => 157.43.85.106\n)\n\n => Array\n(\n => 185.209.178.77\n)\n\n => Array\n(\n => 1.39.212.45\n)\n\n => Array\n(\n => 103.72.7.16\n)\n\n => Array\n(\n => 117.97.185.244\n)\n\n => Array\n(\n => 117.230.59.106\n)\n\n => Array\n(\n => 137.97.121.103\n)\n\n => Array\n(\n => 103.82.123.215\n)\n\n => Array\n(\n => 103.68.217.248\n)\n\n => Array\n(\n => 157.39.27.175\n)\n\n => Array\n(\n => 47.31.100.249\n)\n\n => Array\n(\n => 14.171.232.139\n)\n\n => Array\n(\n => 103.31.93.208\n)\n\n => Array\n(\n => 117.230.56.77\n)\n\n => Array\n(\n => 124.182.25.124\n)\n\n => Array\n(\n => 106.66.191.242\n)\n\n => Array\n(\n => 175.107.237.25\n)\n\n => Array\n(\n => 119.155.1.27\n)\n\n => Array\n(\n => 72.255.6.24\n)\n\n => Array\n(\n => 192.140.152.223\n)\n\n => Array\n(\n => 212.103.48.136\n)\n\n => Array\n(\n => 39.45.134.56\n)\n\n => Array\n(\n => 139.167.173.30\n)\n\n => Array\n(\n => 117.230.63.87\n)\n\n => Array\n(\n => 182.189.95.203\n)\n\n => Array\n(\n => 49.204.183.248\n)\n\n => Array\n(\n => 47.31.125.188\n)\n\n => Array\n(\n => 103.252.171.13\n)\n\n => Array\n(\n => 112.198.74.36\n)\n\n => Array\n(\n => 27.109.113.152\n)\n\n => Array\n(\n => 42.112.233.44\n)\n\n => Array\n(\n => 47.31.68.193\n)\n\n => Array\n(\n => 103.252.171.134\n)\n\n => Array\n(\n => 77.123.32.114\n)\n\n => Array\n(\n => 1.38.189.66\n)\n\n => Array\n(\n => 39.37.181.108\n)\n\n => Array\n(\n => 42.106.44.61\n)\n\n => Array\n(\n => 157.36.8.39\n)\n\n => Array\n(\n => 223.238.41.53\n)\n\n => Array\n(\n => 202.89.77.10\n)\n\n => Array\n(\n => 117.230.150.68\n)\n\n => Array\n(\n => 175.176.87.60\n)\n\n => Array\n(\n => 137.97.117.87\n)\n\n => Array\n(\n => 132.154.123.11\n)\n\n => Array\n(\n => 45.113.124.141\n)\n\n => Array\n(\n => 103.87.56.203\n)\n\n => Array\n(\n => 159.89.171.156\n)\n\n => Array\n(\n => 119.155.53.88\n)\n\n => Array\n(\n => 222.252.107.215\n)\n\n => Array\n(\n => 132.154.75.238\n)\n\n => Array\n(\n => 122.183.41.168\n)\n\n => Array\n(\n => 42.106.254.158\n)\n\n => Array\n(\n => 103.252.171.37\n)\n\n => Array\n(\n => 202.59.13.180\n)\n\n => Array\n(\n => 37.111.139.137\n)\n\n => Array\n(\n => 39.42.93.25\n)\n\n => Array\n(\n => 118.70.177.156\n)\n\n => Array\n(\n => 117.230.148.64\n)\n\n => Array\n(\n => 39.42.15.194\n)\n\n => Array\n(\n => 137.97.176.86\n)\n\n => Array\n(\n => 106.210.102.113\n)\n\n => Array\n(\n => 39.59.84.236\n)\n\n => Array\n(\n => 49.206.187.177\n)\n\n => Array\n(\n => 117.230.133.11\n)\n\n => Array\n(\n => 42.106.253.173\n)\n\n => Array\n(\n => 178.62.102.23\n)\n\n => Array\n(\n => 111.92.76.175\n)\n\n => Array\n(\n => 132.154.86.45\n)\n\n => Array\n(\n => 117.230.128.39\n)\n\n => Array\n(\n => 117.230.53.165\n)\n\n => Array\n(\n => 49.37.200.171\n)\n\n => Array\n(\n => 104.236.213.230\n)\n\n => Array\n(\n => 103.140.30.81\n)\n\n => Array\n(\n => 59.103.104.117\n)\n\n => Array\n(\n => 65.49.126.79\n)\n\n => Array\n(\n => 202.59.12.251\n)\n\n => Array\n(\n => 37.111.136.17\n)\n\n => Array\n(\n => 163.53.85.67\n)\n\n => Array\n(\n => 123.16.240.73\n)\n\n => Array\n(\n => 103.211.14.183\n)\n\n => Array\n(\n => 103.248.93.211\n)\n\n => Array\n(\n => 116.74.59.127\n)\n\n => Array\n(\n => 137.97.169.254\n)\n\n => Array\n(\n => 113.177.79.100\n)\n\n => Array\n(\n => 74.82.60.187\n)\n\n => Array\n(\n => 117.230.157.66\n)\n\n => Array\n(\n => 169.149.194.241\n)\n\n => Array\n(\n => 117.230.156.11\n)\n\n => Array\n(\n => 202.59.12.157\n)\n\n => Array\n(\n => 42.106.181.25\n)\n\n => Array\n(\n => 202.59.13.78\n)\n\n => Array\n(\n => 39.37.153.32\n)\n\n => Array\n(\n => 177.188.216.175\n)\n\n => Array\n(\n => 222.252.53.165\n)\n\n => Array\n(\n => 37.139.23.89\n)\n\n => Array\n(\n => 117.230.139.150\n)\n\n => Array\n(\n => 104.131.176.234\n)\n\n => Array\n(\n => 42.106.181.117\n)\n\n => Array\n(\n => 117.230.180.94\n)\n\n => Array\n(\n => 180.190.171.5\n)\n\n => Array\n(\n => 150.129.165.185\n)\n\n => Array\n(\n => 51.15.0.150\n)\n\n => Array\n(\n => 42.111.4.84\n)\n\n => Array\n(\n => 74.82.60.116\n)\n\n => Array\n(\n => 137.97.121.165\n)\n\n => Array\n(\n => 64.62.187.194\n)\n\n => Array\n(\n => 137.97.106.162\n)\n\n => Array\n(\n => 137.97.92.46\n)\n\n => Array\n(\n => 137.97.170.25\n)\n\n => Array\n(\n => 103.104.192.100\n)\n\n => Array\n(\n => 185.246.211.34\n)\n\n => Array\n(\n => 119.160.96.78\n)\n\n => Array\n(\n => 212.103.48.152\n)\n\n => Array\n(\n => 183.83.153.90\n)\n\n => Array\n(\n => 117.248.150.41\n)\n\n => Array\n(\n => 185.240.246.180\n)\n\n => Array\n(\n => 162.253.131.125\n)\n\n => Array\n(\n => 117.230.153.217\n)\n\n => Array\n(\n => 117.230.169.1\n)\n\n)\n```\nHalf Day, Grapes of Wrath: Reaching For Financial Security\n << Back to all Blogs Login or Create your own free blog Layout: Blue and Brown (Default) Author's Creation\nHome > Half Day, Grapes of Wrath",
null,
"",
null,
"",
null,
"# Half Day, Grapes of Wrath\n\nJanuary 17th, 2011 at 06:49 am\n\nI intended to put in a whole day's work today, but slept a bit late, lingered over the newspaper with coffee, then took my son to get a haircut. Didn't manage to arrive at work until 1pm, and quit at 6. So, I have kicked off OT season with 5 hours.\n\nI've been watching The Grapes of Wrath on Netflix. I read the book years ago, have never seen the movie. It gets to me. My Mom's family were sharecroppers near Oklahoma City pre-dust bowl, and came out here to California when she was small. She lived what is depicted in the movie. Ma Joad reminds me of my Grandma.",
null,
"### 0 Responses to “Half Day, Grapes of Wrath”\n\n(Note: If you were logged in, we could automatically fill in these fields for you.)\n Name: * Email: Will not be published. Subscribe: Notify me of additional comments to this entry. URL: Verification: * Please spell out the number 4. [ Why? ]\n\nvB Code: You can use these tags: [b] [i] [u] [url] [email]"
] | [
null,
"https://www.savingadvice.com/blogs/images/search/top_left.php",
null,
"https://www.savingadvice.com/blogs/images/search/top_right.php",
null,
"https://www.savingadvice.com/blogs/images/search/bottom_left.php",
null,
"https://www.savingadvice.com/forums/core/images/smilies/smile.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9855458,"math_prob":0.9992853,"size":1119,"snap":"2020-24-2020-29","text_gpt3_token_len":296,"char_repetition_ratio":0.08251121,"word_repetition_ratio":0.6438356,"special_character_ratio":0.2546917,"punctuation_ratio":0.13461539,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996755,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-25T22:51:07Z\",\"WARC-Record-ID\":\"<urn:uuid:88595cc8-6ca2-4a5c-9116-85ca801fe97f>\",\"Content-Length\":\"118386\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:75328d19-7ece-4123-a35b-5f6f885ee955>\",\"WARC-Concurrent-To\":\"<urn:uuid:04f9ae09-9f7b-4756-91de-2bb2d2742d45>\",\"WARC-IP-Address\":\"173.231.200.26\",\"WARC-Target-URI\":\"https://petunia100.savingadvice.com/2011/01/17/half-day-grapes-of-wrath_65371/\",\"WARC-Payload-Digest\":\"sha1:LBZHCS4Z5J2YJ6NSZEWJSCB37VVXOAQB\",\"WARC-Block-Digest\":\"sha1:Z3RTCXBCUOAN6QJ477GPPUCZ7OR5DK75\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347390437.8_warc_CC-MAIN-20200525223929-20200526013929-00451.warc.gz\"}"} |
http://rri.wvu.edu/resources/spatial-economics/ | [
"The following papers comprise a four-part series that discusses introductory concepts of spatial econometrics. The texts were written in Portuguese and intend to present this field of study to students at upper undergraduate to graduate levels in Economy and in Regional Sciences.\n\nHow to Estimate Spatial Models with the use of the Likelihood Function\n\nAbstract: This main objective of the first paper in this series is designed to present some of the very basic topics of spatial econometrics, such as, spatial dependency and spatial heterogeneity, introduction to spatial models, and weights matrix. I present different types of spatial models, including some of the motivations to use them. In order to provide a broader perspective of the applicability of the models, I include a brief discussion and empirical applications for each spatial model, which were applied in different fields of interests. Moreover, the present discussion also serves as a basis for the subsequent discussion presented in the following papers in this series.\n\nHow to Interpret the Coefficients of Spatial Models\n\nAbstract: This second paper addresses the question of how to interpret the coefficients of spatial models, such as, the spatial error model, the spatial lag model, the Kelejia-Prucha model, the spatial Durbin error model and the spatial Durbin model. In many empirical studies, the spatial models’ coefficients were interpreted as partial derivatives, what might be correct in some, but not in all cases. In order to address these differences, I discuss each model separately, when I present topics such as partial derivatives, approximations, direct, indirect and total effects, and different orders of interactions. So as to give a broader perspective of the applicability of these concepts, I include a brief discussion of empirical applications that address these topics. Finally, I show some simulations using Matlab when I compare the different types of spatial models regarding direct, indirect and total effects. Lastly, I present approximations concerning spillovers among regions.\n\nHow to Estimate Spatial Models with the use of the Likelihood Function\n\nAbstract: The main objective of this third text is to discuss how to apply the likelihood function to estimate different spatial models. First, I present this function in a general perspective and obtain the maximum likelihood estimator for the normal distribution. Then, I show some of the proprieties of this estimator that makes it very popular as an estimation method, in particular for spatial models. Afterwards, I develop the mathematical expressions of the maximum likelihood estimators for the OLS, spatial error and spatial lag models. Next, I present some illustrative simulations using Matlab that address the concepts discussed in the text. Finally, I obtain the covariance matrix for the spatial lag model as an example for the other spatial models.\n\nHow to Choose Among the Many Spatial Models\n\nAbstract: This fourth paper discusses how to choose among the many possibilities of spatial models in a particular setting. The focus of the presentation is on models applied to cross-section data and estimated with the use of the likelihood function. First, I present some theoretical issues that might help to guide the selection of a specific model. Then, the data generating process of different models are compared, indicating when there will be bias and/or efficiency lost in the estimates. Afterwards, I discuss the specific to general and general to specific strategies of model selection, suggesting that the first one is superior to the second in some aspects. Finally, I address these theoretical issues in two groups of Monte Carlo simulations: the first compares the data generating process of different models; the second evaluates different empirical strategies of model choice."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9258501,"math_prob":0.82081926,"size":3855,"snap":"2019-43-2019-47","text_gpt3_token_len":698,"char_repetition_ratio":0.15346663,"word_repetition_ratio":0.052364863,"special_character_ratio":0.17354086,"punctuation_ratio":0.10313901,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9788375,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-15T08:43:51Z\",\"WARC-Record-ID\":\"<urn:uuid:444d4b0b-3647-4749-a449-a71cc9ab6ed0>\",\"Content-Length\":\"46566\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f065fbc1-cf31-4a22-8375-83f61aa763f6>\",\"WARC-Concurrent-To\":\"<urn:uuid:354652cc-7dc7-4392-b06b-a66e83233b99>\",\"WARC-IP-Address\":\"157.182.141.169\",\"WARC-Target-URI\":\"http://rri.wvu.edu/resources/spatial-economics/\",\"WARC-Payload-Digest\":\"sha1:A3VDEES3NXKDOU5ZF2JKZBIN4WIP7WLC\",\"WARC-Block-Digest\":\"sha1:PBWV2CSRUDRCXIKN3YOEDOXI7CHOJEED\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986657949.34_warc_CC-MAIN-20191015082202-20191015105702-00091.warc.gz\"}"} |
https://rfcafe.com/references/radio-craft/electronic-puzzle-square-radio-craft-july-1945.htm | [
"",
null,
"",
null,
"# Electronic Puzzle SquareJuly 1945 Radio-Craft Article\n\n July 1945 Radio-Craft",
null,
"[Table of Contents] Wax nostalgic about and learn from the history of early electronics. See articles from Radio-Craft, published 1929 - 1953. All copyrights are hereby acknowledged.\n\nDue to the era in which this \"Electronic Puzzle Square\" appeared (1945), I made a couple edits to help prevent misinterpretation. For instance the \"mfd.\" in question 5 is microfarad (μF) in today's units standard. Question 4 originally had an upper case \"E,\" which was a typo since it should have been a lower case \"e,\" as in the base of the natural logarithm. When working Q7, leave the input and output terminals open when calculating the equivalent resistance; it's not like doing a \"Pi\" to \"Tee\" attenuator conversion. Q11 originally had \"logE\" where it should have been just \"e.\" Q9 is a piece of cake. Question 15 assumes you know the resistance per foot of #25 B&S (AWG) copper wire, which you can find here (hint: it's 32.4 Ω/1000 ft). Bon chance!\n\nHere is another Electronic Puzzle Square from the Janaury 1945 issue.\n\nElectronic Puzzle Square\n\nBy Lt. C. K. Johnson\n\nWork this like a crossword puzzle. The answer to problem No. 1 goes in square No.1, etc. When completed, rows, columns and diagonals, etc., will total the number which is the base of common logarithms. Therefore the sum of the answers to problems 1, 2 and 3 subtracted from the total gives the answer to problem 4.",
null,
"(All problems correct to one decimal place.)\n\n1. LogeN = ___ Log10N\n\n2. What is R if I = 10 A and P = 320 W?\n\n3. Red is ___ in the color code.\n\n4. ex = ___ when x = 0.92\n\n5. An inductance of 0.004 henrys is used with a condenser of what value in mfd. (μF) to obtain a resonant frequency of 1500 cps ?\n\n6. Tangent 59.6° = ___.",
null,
"7. If we had a circuit as in Fig. 1 where each resistor was 10 ohms, and we wanted to convert it to a circuit as at Fig. 2 so that the resistance measured between A and B or measured between C and D, would be the same for each circuit, what resistors would we use in Fig. 2?",
null,
"8. What reading in milliamperes will be indicated by the meter?\n\n9. The ratio of the circumference of a circle to its diameter is ___.",
null,
"10. What is the total resistance between A and B?\n\n11. If e-x = 0.0743, what is x ?",
null,
"12. What would be the required voltage of battery to read 1.9 volts across R1, R2, and R3?\n\n13. √π\n\n14. Base of the natural system of logarithms.\n\n15. At 77 °F, what would be the resistance of 64 feet of B and S gauge No. 25 bare copper wire?\n\n16. If an A.C. generator has an R.M.S. output of 2.4 volts, what is its peak output?\n\nHere are other electronics-themed crossword puzzles from vintage electronics magazines (RF Cafe Crosswords here):",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Please Support RF Cafe by purchasing my ridiculously low−priced products, all of which I created. These Are Available for Free About RF Cafe",
null,
"Copyright: 1996 - 2024 Webmaster: BSEE - KB3UON RF Cafe began life in 1996 as \"RF Tools\" in an AOL screen name web space totaling 2 MB. Its primary purpose was to provide me with ready access to commonly needed formulas and reference material while performing my work as an RF system and circuit design engineer. The World Wide Web (Internet) was largely an unknown entity at the time and bandwidth was a scarce commodity. Dial-up modems blazed along at 14.4 kbps while tying up your telephone line, and a nice lady's voice announced \"You've Got Mail\" when a new message arrived... All trademarks, copyrights, patents, and other rights of ownership to images and text used on the RF Cafe website are hereby acknowledged. My Hobby Website: AirplanesAndRockets.com"
] | [
null,
"https://www.rfcafe.com/borders/images/rf-cafe-hero-1063x184.gif",
null,
"https://www.rfcafe.com/vendors/sponsors/rf-cafe/images/rf-cascade-workbook-2018-a-hb.gif",
null,
"https://rfcafe.com/references/radio-craft/images5/radio-craft-july-1945-cover_small1.jpg",
null,
"https://rfcafe.com/references/radio-craft/images5/electronics-puzzle-square-radio-craft-july-1945-1.gif",
null,
"https://rfcafe.com/references/radio-craft/images5/electronics-puzzle-square-radio-craft-july-1945-2.gif",
null,
"https://rfcafe.com/references/radio-craft/images5/electronics-puzzle-square-radio-craft-july-1945-4.gif",
null,
"https://rfcafe.com/references/radio-craft/images5/electronics-puzzle-square-radio-craft-july-1945-5.gif",
null,
"https://rfcafe.com/references/radio-craft/images5/electronics-puzzle-square-radio-craft-july-1945-6.gif",
null,
"https://rfcafe.com/references/radio-craft/images5/electronics-puzzle-square-radio-craft-july-1945-7.gif",
null,
"https://www.rfcafe.com/vendors/sponsors/copper-mountain-tech/images/copper-mountain-technologies-hb-2021.gif",
null,
"https://www.rfcafe.com/vendors/sponsors/pcb-directory/images/pcb-directory-manufacturers-vb-1.gif",
null,
"https://www.rfcafe.com/vendors/sponsors/ladybug-technologies/images/ladybug-lb5944a-power-sensor-vb-1.gif",
null,
"https://www.rfcafe.com/vendors/sponsors/lotus-systems/images/lotus-communication-systems-vb-1.gif",
null,
"https://www.rfcafe.com/vendors/sponsors/axiom-test-equipment/images/axiom-test-equipment-vb-9-2021.gif",
null,
"https://www.rfcafe.com/borders/images/kirt-blattenberger-rf-cafe-webmaster.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9256882,"math_prob":0.8819653,"size":2679,"snap":"2022-40-2023-06","text_gpt3_token_len":769,"char_repetition_ratio":0.092336446,"word_repetition_ratio":0.0,"special_character_ratio":0.29227322,"punctuation_ratio":0.15614618,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9715276,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30],"im_url_duplicate_count":[null,null,null,null,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-09T00:25:29Z\",\"WARC-Record-ID\":\"<urn:uuid:051e81d1-675c-4d85-938d-b98831092603>\",\"Content-Length\":\"31059\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:42b4153b-5cf9-4cf2-860f-a71175d0e7cb>\",\"WARC-Concurrent-To\":\"<urn:uuid:af278d36-a0f2-452d-8282-7174bff1cf19>\",\"WARC-IP-Address\":\"184.175.125.210\",\"WARC-Target-URI\":\"https://rfcafe.com/references/radio-craft/electronic-puzzle-square-radio-craft-july-1945.htm\",\"WARC-Payload-Digest\":\"sha1:IQVFUYWWOSHKM2X44IBB5HQ5LM2V2MQK\",\"WARC-Block-Digest\":\"sha1:ITYYXSLAAMWCQIKOBYABY6MQCQ6UB5Y6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500983.76_warc_CC-MAIN-20230208222635-20230209012635-00877.warc.gz\"}"} |
https://www.physicsforums.com/threads/plot-the-equation-y-cos-a-x-i-sin-a-x-in-matlab.715637/ | [
"# Plot the equation y=cos(A*x) + i*sin(A*x) in MATLAB\n\n• MATLAB\nHi Everyone,\n\nI am a new Matlab User, I am want to plot the equation y=cos(A*x) + i*sin(A*x)\n\nwhere A = 400*pi/340 and want to plot y and vary x from pi:0.1:pi\n\nclear all;\nclose all;\n\nA = 400*pi/340;\nx = -180:0,1:180;\n\na=cos(A*x);\nb=i*sin(A*x);\n\ni= imag(b);\n\nhold on;\ngrid on;\n\nplot(a,i, 'r-*','MarkerEdgeColor','b');\n\nxlabel('Distance');\nylabel('Primary Source');\ntitle('Simulation Results');\n\nkreil\nGold Member\nYou defined x in degrees, then used the radian trig functions. There are degree counterparts, like sind(x), that calculate the trig values in degrees. So choose one or the other, but make it consistent.\n\nIt's a best practice to use elementwise operations for your functions. Of course, the operators * and .* are the same when a scalar is involved, but it will save you headaches in the future.\n\nYour call to plot confuses me. You are plotting i against a? I think this is why your current plot looks strange. You should be plotting a + i against x.\n\nCode:\nclear\nclc\n\nA = 400*pi/340;\nx = -pi:0.1:pi;\n\ny = cos(A.*x) + imag(i.*sin(A.*x));\n\nhold on; grid on;\nplot(x,y,'r-*','MarkerEdgeColor','b')\nxlabel('Distance');\nylabel('Primary Source');\ntitle('Simulation Results');\n\n#### Attachments\n\n•",
null,
"untitled.png\n3.5 KB · Views: 392\n\ncan you let me know if this is also correct ?\n\nclear all;\nclose all;\n\nA=400*pi/340;\n\ntheta= -2*pi:0.03:2*pi;\n\ny=exp(1i*A*theta);\n\ngrid on;\nhold on;\n\nplot(theta,y, 'r-*','MarkerEdgeColor','b');\n\nxlabel('Distance');\nylabel('Source');\ntitle('Simulation Results');\n\nkreil\nGold Member\nThe only thing is that y = exp(1i*A*theta); yields a vector of complex numbers. If you care only about the real part, you should plot real(y), if you care only about the imaginary part, you should plot imag(y).\n\nWhen you use plot(theta, y) it ignores all imaginary components.\n\nHOWEVER, when you supply only a single imaginary argument, MATLAB plots the real part vs the imaginary part. For your second example, it produces the unit circle\n\nCode:\nclear all; close all;\n\nA=400*pi/340;\ntheta= -2*pi:0.03:2*pi;\n\ny=exp(1i*A*theta);\n\ngrid on; hold on;\nplot(y, 'r-*','MarkerEdgeColor','b');\naxis equal;\nxlabel('Distance');\nylabel('Source');\ntitle('Simulation Results');\n\nEdit: I should have used different axis names\n\n#### Attachments\n\nokay i understand that now. I really appreciate your help and your time. God Bless you\n\nMark44\nMentor\n\ncan you let me know if this is also correct ?\n\nCode:\nclear all;\nclose all;\n\nA=400*pi/340;\n\ntheta= -2*pi:0.03:2*pi;\n\ny=exp(1i*A*theta);\nThe line above bothers me. I'm not an expert in matlab, and don't have it to try things out, but no programming language that I'm familiar with allows a variable whose name starts with a decimal digit. I would be surprised to find that matlab allows a variable whose name is 1i or 2i or 3i, etc.\n\nIf your intent was 1 * i, that would be OK, but what's the point?\nCode:\ngrid on;\nhold on;\n\nplot(theta,y, 'r-*','MarkerEdgeColor','b');\n\nxlabel('Distance');\nylabel('Source');\ntitle('Simulation Results');"
] | [
null,
"https://www.physicsforums.com/data/attachments/48/48226-ee141adbdf2e435c6536c7d30f3438ed.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.54091024,"math_prob":0.9226467,"size":771,"snap":"2021-21-2021-25","text_gpt3_token_len":268,"char_repetition_ratio":0.09908735,"word_repetition_ratio":0.8869565,"special_character_ratio":0.4163424,"punctuation_ratio":0.22272727,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9974678,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-09T23:11:56Z\",\"WARC-Record-ID\":\"<urn:uuid:271a2b92-ebb9-4117-b446-9356b3d4daf0>\",\"Content-Length\":\"90177\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6391d253-f861-4367-8be7-f41fa048b34d>\",\"WARC-Concurrent-To\":\"<urn:uuid:807c540b-a212-4382-bc5d-32d4e7a14e72>\",\"WARC-IP-Address\":\"172.67.68.135\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/plot-the-equation-y-cos-a-x-i-sin-a-x-in-matlab.715637/\",\"WARC-Payload-Digest\":\"sha1:E3ICRCC23GK34OXXDIIV4GVBV47EPVZG\",\"WARC-Block-Digest\":\"sha1:FA4HBAX7MLMYAAGTODUMCZE63JNLVAZR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989018.90_warc_CC-MAIN-20210509213453-20210510003453-00537.warc.gz\"}"} |
https://sciencing.com/do-convert-m3-kilograms-6928723.html | [
"# How do I Convert M3 into Kilograms?",
null,
"••• Akchamczuk/iStock/GettyImages\n\nThe ability to convert between units of mass, density, and volume is one of the fundamental skills necessary to solve basic problems in physics and chemistry. Mass, in the SI system of units used by default worldwide in solving such problems, has units of kilograms (kg) and derivations thereof, whereas volume has units of meters cubed, or m3, the meter being the SI unit of length. Correspondingly, density, which is mass per unit volume, is often expressed in kg/m3. Because quantities are often smaller in everyday experiments and measurements, it is typical to see density expressed in g/cm3, or gm/ml (a milliliter is defined as a cubic centimeter). One kg/m3 is equal to 1,000 g/cm3.\n\n## Deriving Mass from Volume\n\nSay you are given a known volume of a substance (water or some other fluid, a metal, or anything else assumed to have a uniform or near-uniform distribution of matter) and asked to calculate its mass. To do this, based on the relationships established above, you must know the substance's density and only its density.\n\nSince density (ρ) is mass (m) divided by volume (V), then mass equals density times volume:\n\n\\rho=\\frac{m}{V}\n\nSo\n\nm=\\rho V\n\n## Densities in the Real World\n\nVarious online tables include the densities of common substances. For example, plain water at a temperature of 4 °C has a density of 1,000 kg/m3 or 1 g/ml, again by definition. Oils are less dense than water, which is why the oil component of a salad dressing like Italian floats to the top of the mixture. Milk, which is composed almost entirely of water but includes sugars, protein, and (usually) fats, has a density of 1.03 times that of water.\n\nMetals are as a rule notably more dense than liquids and vary greatly from one to the next. Gold, for example, has a density of 19.3 g/ml. This means that 1 m3 of gold has a mass of:\n\nm=1000\\times19.3=19,300\\text{ kg}\n\nSince 1 kg = 2.204 lb, a portion of gold one meter by one meter by one meter (about the size of a smallish table) would have a mass of 42,537 pounds, in excess of 21 tons.\n\n## Applications\n\nSince a modern seafaring ship is made primarily of metal, how does it float? For something to float in water, it must have less mass than the water it displaces. This is accomplished as a result of all of the empty space included in the ship's construction, such as the space between layers of a ship's hull. When a metal boat such as a canoe is placed in water, it begins to sink because solid metal is what first contacts the water. But because the overall density of the canoe is less than that of an equivalent volume of water, even with one or two passengers added, most of it remains above the water's surface.\n\nDont Go!\n\nWe Have More Great Sciencing Articles!"
] | [
null,
"https://img-aws.ehowcdn.com/360x267p/s3-us-west-1.amazonaws.com/contentlab.studiod/getty/c988f3ee7eee4412a734fecc34eb5f6a",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9630323,"math_prob":0.9653948,"size":2990,"snap":"2023-40-2023-50","text_gpt3_token_len":685,"char_repetition_ratio":0.105492294,"word_repetition_ratio":0.0038095238,"special_character_ratio":0.22441472,"punctuation_ratio":0.115072936,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98631966,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-09T01:31:52Z\",\"WARC-Record-ID\":\"<urn:uuid:4517cc27-63ab-4682-8f2e-edd4c5d0a43d>\",\"Content-Length\":\"410383\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cf07c040-3108-48ed-b0c1-cb0c2fe7ce75>\",\"WARC-Concurrent-To\":\"<urn:uuid:7c672053-1b00-4223-b7c4-51778360add8>\",\"WARC-IP-Address\":\"23.48.104.17\",\"WARC-Target-URI\":\"https://sciencing.com/do-convert-m3-kilograms-6928723.html\",\"WARC-Payload-Digest\":\"sha1:BBXDGOEMUY5XRUHZO3X5UFQBDWAW5GCR\",\"WARC-Block-Digest\":\"sha1:MB5HLYZLKGOG6MKYFZBESTYCERDES3BJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100781.60_warc_CC-MAIN-20231209004202-20231209034202-00694.warc.gz\"}"} |
https://zbmath.org/?q=an:0966.20022 | [
"## Isocrystals with additional structure. II.(English)Zbl 0966.20022\n\nSummary: Let $$F$$ be a $$p$$-adic field, let $$L$$ be the completion of a maximal unramified extension of $$F$$, and let $$\\sigma$$ be the Frobenius automorphism of $$L$$ over $$F$$. For any connected reductive group $$G$$ over $$F$$ one denotes by $$B(G)$$ the set of $$\\sigma$$-conjugacy classes in $$G(L)$$ (elements $$x,y$$ in $$G(L)$$ are said to be $$\\sigma$$-conjugate if there exists $$g$$ in $$G(L)$$ such that $$g^{-1} \\kappa\\sigma (g)=y)$$. One of the main results of this paper is a concrete description of the set $$B(G)$$ (previously this was known only in the quasi-split case [cf. Part I, ibid. 56, 201-220 (1985; Zbl 0597.20038)]).\n\n### MSC:\n\n 20G25 Linear algebraic groups over local fields and their integers 14F30 $$p$$-adic cohomology, crystalline cohomology 11S25 Galois cohomology 14L05 Formal groups, $$p$$-divisible groups\n\nZbl 0597.20038\nFull Text:"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.75258934,"math_prob":0.9999851,"size":1251,"snap":"2022-05-2022-21","text_gpt3_token_len":418,"char_repetition_ratio":0.08821171,"word_repetition_ratio":0.011235955,"special_character_ratio":0.36770582,"punctuation_ratio":0.17460318,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000049,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-28T06:46:19Z\",\"WARC-Record-ID\":\"<urn:uuid:9bc4e4fe-9bd4-4c37-bb1e-9d41928b6640>\",\"Content-Length\":\"51042\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1e0338e5-a4ec-4e5c-89aa-75e2a1ed1188>\",\"WARC-Concurrent-To\":\"<urn:uuid:9a103f44-605b-4808-a4a8-fa18ab3571b5>\",\"WARC-IP-Address\":\"141.66.194.2\",\"WARC-Target-URI\":\"https://zbmath.org/?q=an:0966.20022\",\"WARC-Payload-Digest\":\"sha1:4Q77JZAAO62AKAOINJ36QDL5LIG5E3HK\",\"WARC-Block-Digest\":\"sha1:VEXX5SQPHSVIT3YKRLQR7RYUETWDGLO3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652663013003.96_warc_CC-MAIN-20220528062047-20220528092047-00456.warc.gz\"}"} |
https://lbs-to-kg.appspot.com/559-lbs-to-kg.html | [
"Pounds To Kg\n\n# 559 lbs to kg559 Pounds to Kilograms\n\nlbs\n=\nkg\n\n## How to convert 559 pounds to kilograms?\n\n 559 lbs * 0.45359237 kg = 253.55813483 kg 1 lbs\nA common question is How many pound in 559 kilogram? And the answer is 1232.38404561 lbs in 559 kg. Likewise the question how many kilogram in 559 pound has the answer of 253.55813483 kg in 559 lbs.\n\n## How much are 559 pounds in kilograms?\n\n559 pounds equal 253.55813483 kilograms (559lbs = 253.55813483kg). Converting 559 lb to kg is easy. Simply use our calculator above, or apply the formula to change the length 559 lbs to kg.\n\n## Convert 559 lbs to common mass\n\nUnitMass\nMicrogram2.5355813483e+11 µg\nMilligram253558134.83 mg\nGram253558.13483 g\nOunce8944.0 oz\nPound559.0 lbs\nKilogram253.55813483 kg\nStone39.9285714286 st\nUS ton0.2795 ton\nTonne0.2535581348 t\nImperial ton0.2495535714 Long tons\n\n## What is 559 pounds in kg?\n\nTo convert 559 lbs to kg multiply the mass in pounds by 0.45359237. The 559 lbs in kg formula is [kg] = 559 * 0.45359237. Thus, for 559 pounds in kilogram we get 253.55813483 kg.\n\n## 559 Pound Conversion Table",
null,
"## Alternative spelling\n\n559 lbs to Kilogram, 559 lbs in Kilogram, 559 Pound to Kilogram, 559 Pound in Kilogram, 559 Pound to Kilograms, 559 Pound in Kilograms, 559 lbs to Kilograms, 559 lbs in Kilograms, 559 lb to kg, 559 lb in kg, 559 lbs to kg, 559 lbs in kg, 559 Pounds to Kilogram, 559 Pounds in Kilogram, 559 lb to Kilogram, 559 lb in Kilogram, 559 Pound to kg, 559 Pound in kg"
] | [
null,
"https://lbs-to-kg.appspot.com/image/559.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.79913366,"math_prob":0.9138053,"size":1103,"snap":"2019-51-2020-05","text_gpt3_token_len":342,"char_repetition_ratio":0.24476796,"word_repetition_ratio":0.014705882,"special_character_ratio":0.41432458,"punctuation_ratio":0.15873016,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96794224,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-07T11:51:54Z\",\"WARC-Record-ID\":\"<urn:uuid:7a1223c6-f40f-43a1-a782-456032b7494d>\",\"Content-Length\":\"28092\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fd2c6041-224f-4bc8-9e38-4ce61ae059b3>\",\"WARC-Concurrent-To\":\"<urn:uuid:6fb8d698-cca6-4e89-bf63-75e7abcbfec8>\",\"WARC-IP-Address\":\"172.217.164.148\",\"WARC-Target-URI\":\"https://lbs-to-kg.appspot.com/559-lbs-to-kg.html\",\"WARC-Payload-Digest\":\"sha1:YO35YCFF5C3ULHZCPQ3RH2FVELARIP6P\",\"WARC-Block-Digest\":\"sha1:72JKT43KEEPC2HEUNVVVGBNQTNLVI7RR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540499389.15_warc_CC-MAIN-20191207105754-20191207133754-00488.warc.gz\"}"} |
https://hintdesk.com/2009/04/03/pdu-in-physical-layer/ | [
"# PDU in Physical Layer\n\nToday I read a question in HVA asking about if there is a PDU in Physical Layer. The questioner read a Vietnamese book stating that there is no PDU in Physical Layer but he read in Wikipedia that the PDU is the Bit in Physical Layer. So he is a little confused to find out the answer and I will try to answer this question in this post.\n\nPDU (Protocol Data Unit) has following meanings (as Wikipedia):\n\n• Information that is delivered as a unit among peer entities of a network and that may contain control information, address information, or data.\n• In layered systems, a unit of data that is specified in a protocol of a given layer and that consists of protocol-control information of the given layer and possibly user data of that layer.\n\nNetwork protocols are built usually in layers, for example the OSI layer model. They have different hierarchical layers processing different tasks. Each of them implement a protocol according to their task and is numbered with a number N.\nTypically, each layer adds to the transmitted data its own management information. The complete set of data and information for management will be called Protocol Data Unit (PDU) of this layer. The PDU is the full message of what the protocol layer N implemented.\nIf this PDU is now transmitted to lower protocol layer N-1, the layer N should send only the data what the layer N-1 is waiting for . The layer N-1 will provide the service to receive these PDUs. Therefore, the transmitted data (the PDUs of layer N) on the layer N-1 is called also the Service Data Unit (SDU) of the layer N-1.\n\nThe idea is shown very clearly in figure below. If you take Physical Layer the number N, the Data Link Layer will take the number N – 1.",
null,
"And a small formula for this concept can be\nPDU(N) = SDU(N – 1)\n\n= PCI(N) + SDU(N) + Footer(N)\n\n= PCI(N) + PDU(N + 1) + Footer(N)\n\nWhere PCI is the Protocol Control Information.\n\nSo according to the figure below, the PDU of Physical Layer will be the Bits. The Protocol Control Information (PCI) can be the Preamble Sequenz, Start of frame delimiter…\n\n## One thought on “PDU in Physical Layer”\n\n1.",
null,
"Rob B says:\n\nThis looks like a great article.\n\nHow do I get to read it all? I cannot get to the next page. Most of it it omitted."
] | [
null,
"http://img4.imageshack.us/img4/2517/phpg5wlncam.jpg",
null,
"https://secure.gravatar.com/avatar/649598bec6bba292e40e556a1ccb1adb",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8930703,"math_prob":0.58630097,"size":2210,"snap":"2020-45-2020-50","text_gpt3_token_len":504,"char_repetition_ratio":0.14233908,"word_repetition_ratio":0.0,"special_character_ratio":0.2239819,"punctuation_ratio":0.075,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95738244,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,3,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-21T18:33:39Z\",\"WARC-Record-ID\":\"<urn:uuid:bf1f598e-1598-4d60-aeff-eca14b3a2496>\",\"Content-Length\":\"39648\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:23e96597-c47c-4be9-a90e-f0f6cab03d1b>\",\"WARC-Concurrent-To\":\"<urn:uuid:5ca64d5a-8427-4556-bee3-53db63b54503>\",\"WARC-IP-Address\":\"40.86.184.230\",\"WARC-Target-URI\":\"https://hintdesk.com/2009/04/03/pdu-in-physical-layer/\",\"WARC-Payload-Digest\":\"sha1:2FSWRRSBPOMAFGCCBT2RP2EIYICXMLZC\",\"WARC-Block-Digest\":\"sha1:ZAZNMN4322SCAUUKD5FHTPMXJMCZSNAF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107877420.17_warc_CC-MAIN-20201021180646-20201021210646-00517.warc.gz\"}"} |
https://mathhelpboards.com/threads/pair-of-straight-lines.3646/ | [
"# Pair of Straight lines\n\n##### Member\nIf each of the equations ax^2+2hxy+by^2+2gx+2fy+c=0 and ax^2+2hxy+by^2-2gx-2fy+c=0 represents a pair of straight lines , find the area of the parallelogram enclosed by them .\n\n#### ZaidAlyafey\n\n##### Well-known member\nMHB Math Helper\nYou should start by looking at the points of intersections of lines ...\n\n#### Fantini\n\nMHB Math Helper\nYou should note that if these are lines, none of the terms $x^2, xy$ and $y^2$ should appear. This should tell you something about their respective coefficients.",
null,
"#### Opalg\n\n##### MHB Oldtimer\nStaff member\nIf each of the equations $ax^2+2hxy+by^2+2gx+2fy+c=0$ and $ax^2+2hxy+by^2-2gx-2fy+c=0$ represents a pair of straight lines, find the area of the parallelogram enclosed by them.\nIf the conic $ax^2+2hxy+by^2+2gx+2fy+c=0$ represents a pair of straight lines then it must be of the form $(lx+my+n)(px+qy+r)=0$, where (comparing coefficients) $a = lp$, $h = \\frac12(lq+mp)$, $b = mq$, ..., $c = nr.$ The conic $ax^2+2hxy+by^2-2gx-2fy+c=0$ is then given by $(lx+my-n)(px+qy-r)=0.$\n\nThe answer to a question of this sort is almost sure to involve the discriminant $\\Delta \\mathrel{\\overset{\\text{def}}{=}}\\begin{vmatrix}a&h \\\\h&b \\end{vmatrix}$, so it would be worth finding this in terms of $l,m,n,p,q,r$. For a conic representing two straight lines, the discriminant is always negative, and in this case you can check that $$\\Delta = \\begin{vmatrix}lp & \\tfrac12(lq+mp) \\\\ \\tfrac12(lq+mp) & mq \\end{vmatrix} = -\\tfrac14(lq-mp)^2.$$ The line $lx+my+n = 0$ meets the lines $px+qy \\pm r = 0$ at the points $\\bigl(\\frac{\\pm mr-nq}{lq-mp},\\frac{\\pm lr-np}{lq-mp}\\bigr)$, and the distance between those two points is $\\left|\\dfrac{2r\\sqrt{l^2+m^2}}{lq-mp}\\right|.$ So that is the length of one side of the parallelogram.\n\nThe perpendicular distance between the parallel lines $lx+my\\pm n = 0$ is $\\left|\\dfrac{2n}{\\sqrt{l^2+m^2}}\\right|.$ So that is the distance between opposite sides of the parallelogram. The area $A$ of the parallelogram is therefore $$\\left|\\dfrac{2r\\sqrt{l^2+m^2}}{lq-mp}\\,\\dfrac{2n}{\\sqrt{l^2+m^2}}\\right| = \\left|\\frac{2nr}{\\frac12(lq-mp)}\\right|.$$ In terms of the original coefficients, we can write this as $\\boxed{A = \\dfrac{2|c|}{\\sqrt{-\\Delta}}}.$\n\nI think that there ought to be a more conceptual proof of this result, using only the original coefficients $a,h,b,g,f,c$, but I do not see one.\n\n#### HallsofIvy\n\n##### Well-known member\nMHB Math Helper\nYou should note that if these are lines, none of the terms $x^2, xy$ and $y^2$ should appear. This should tell you something about their respective coefficients.",
null,
"I think you are misunderstanding the question. Each equation represents a pair of lines. For example $$a^2x^2- b^2y^2= (ax- by)(ax+by)= 0$$ gives the lines ax- by= 0 and ax+ by= 0.\n\n#### Fantini\n\nThank you Halls. I was!",
null,
""
] | [
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7933148,"math_prob":0.999902,"size":846,"snap":"2020-45-2020-50","text_gpt3_token_len":312,"char_repetition_ratio":0.12589073,"word_repetition_ratio":0.016260162,"special_character_ratio":0.34869978,"punctuation_ratio":0.096938774,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999889,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-03T09:55:48Z\",\"WARC-Record-ID\":\"<urn:uuid:dac8dffc-347d-41ae-bbcd-1fe1e6b30717>\",\"Content-Length\":\"76005\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fa54ba10-0c8a-4c76-a410-dcd1587827c1>\",\"WARC-Concurrent-To\":\"<urn:uuid:6e45d55f-69c9-4c38-89c7-6b84fe121cfa>\",\"WARC-IP-Address\":\"50.31.99.218\",\"WARC-Target-URI\":\"https://mathhelpboards.com/threads/pair-of-straight-lines.3646/\",\"WARC-Payload-Digest\":\"sha1:5R6L4FT3MICS4EBHG46IDEAFO2JIF3AU\",\"WARC-Block-Digest\":\"sha1:ZRX7J4TECHUB63AVZ3I2J7TQLDIALLBK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141727627.70_warc_CC-MAIN-20201203094119-20201203124119-00087.warc.gz\"}"} |
https://justaaa.com/statistics-and-probability/358675-a-particular-fruits-weights-are-normally | [
"Question\n\n# A particular fruit's weights are normally distributed, with a mean of 228 grams and a standard...\n\nA particular fruit's weights are normally distributed, with a mean of 228 grams and a standard deviation of 13 grams. If you pick one fruit at random, what is the probability that it will weigh between 207.2 grams and 218.9 grams?\n\n(If you get two values that are the same, please regenerate the problem or contact the instructor if you are unable to do so.)\n\nAnswer = (Round to four decimal places.)\n\nWarning: Do not use the Z Normal Tables...they may not be accurate enough since WAMAP may look for more accuracy than comes from the table.\n\nLet, X be the fruit's weight\n\nmean of fruit's weight = m = 228 grams\n\nstandard deviation of fruit's weight = s = 13 grams\n\nWe need to find the probability that it will weigh between 207.2 grams and 218.9 grams or P[ 207.2 < X < 218.9 ]\n\nP[ 207.2 < X < 218.9 ] = P[ ( 207.2 - m )/s < ( X - m )/s < ( 218.9 - m )/s ]\n\nP[ 207.2 < X < 218.9 ] = P[ ( 207.2 - 228 )/13 < ( X - 228 )/13 < ( 218.9 - 228 )/13 ]\n\nP[ 207.2 < X < 218.9 ] = P[ -1.6 < Z < -0.7 ]\n\nP[ 207.2 < X < 218.9 ] = P[ Z < -0.7 ] - P[ Z < -1.6 ]\n\nP[ 207.2 < X < 218.9 ] = 0.472097 - 0.436441 = 0.035656\n\nP[ 207.2 < X < 218.9 ] = 0.035656\n\nP[ 207.2 < X < 218.9 ] = 0.0356 ( rounded off to two decimal places )"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8580768,"math_prob":0.9941216,"size":1258,"snap":"2023-40-2023-50","text_gpt3_token_len":447,"char_repetition_ratio":0.18500797,"word_repetition_ratio":0.2437276,"special_character_ratio":0.47297296,"punctuation_ratio":0.15771812,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99962425,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-01T15:34:32Z\",\"WARC-Record-ID\":\"<urn:uuid:f6af9050-baf5-49a1-bc37-dc194a49fd8a>\",\"Content-Length\":\"40839\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cce9167e-a66e-482a-9e71-c263052131e3>\",\"WARC-Concurrent-To\":\"<urn:uuid:a0a668bb-a799-42c1-8a6f-227ff138e723>\",\"WARC-IP-Address\":\"104.21.86.173\",\"WARC-Target-URI\":\"https://justaaa.com/statistics-and-probability/358675-a-particular-fruits-weights-are-normally\",\"WARC-Payload-Digest\":\"sha1:FAOYMDEPP5EYWYUE3RG3VHA2CVVMWILM\",\"WARC-Block-Digest\":\"sha1:MSFETAJNJCULWZR7WB4USTGSHW5WQ72F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100290.24_warc_CC-MAIN-20231201151933-20231201181933-00077.warc.gz\"}"} |
https://labdeck.com/variables/ | [
"# Variables\n\nVariable is a mathematical expression symbol that represents quantity. You can define variables in MatDeck by placing := after the variable name.",
null,
"As you can see, variables are displayed in green in MatDeck. They are case sensitive, which means that b and B are considered as two different variables.",
null,
"When you define a variable in a document, it will be visible in the rest of that document from the row where it was placed. But if you try to use variable before it is defined, it will be considered as a symbol.",
null,
"You can place all types of data in variables: numerical and symbolic values, vectors, matrix, functions and units.",
null,
"When you define variables, there are some restrictions that you have to consider. Fractions, expressions, brackets and they content cannot be defined as variables.",
null,
"If you want to define a variable with the name sin (same as a name of function) follow the following procedure. When you type the last character from the function’s name, n in this case, use Alt + last character in combination.",
null,
""
] | [
null,
"https://labdeck.com/wp-content/uploads/2017/01/variables-variable.png",
null,
"https://labdeck.com/wp-content/uploads/2017/01/variables-case-sensitive.png",
null,
"https://labdeck.com/wp-content/uploads/2017/01/variables-as-symbol.png",
null,
"https://labdeck.com/wp-content/uploads/2017/01/variables-data-types.png",
null,
"https://labdeck.com/wp-content/uploads/2017/01/variables-no-variable.png",
null,
"https://labdeck.com/wp-content/uploads/2017/01/variables-alt-character.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9228176,"math_prob":0.94211686,"size":1018,"snap":"2022-05-2022-21","text_gpt3_token_len":206,"char_repetition_ratio":0.147929,"word_repetition_ratio":0.0,"special_character_ratio":0.20137525,"punctuation_ratio":0.125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95046693,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,5,null,5,null,5,null,5,null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-19T12:53:29Z\",\"WARC-Record-ID\":\"<urn:uuid:f62ea506-7f11-44a8-b58b-4355f2cf00e8>\",\"Content-Length\":\"91806\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9de4c280-78bf-402b-88c3-5dcba305dd69>\",\"WARC-Concurrent-To\":\"<urn:uuid:ff777b78-5ca3-4812-a160-b9e262f74271>\",\"WARC-IP-Address\":\"68.66.248.54\",\"WARC-Target-URI\":\"https://labdeck.com/variables/\",\"WARC-Payload-Digest\":\"sha1:Q6666BEL722J5ZZHYZ7MRF5IXEWLWW36\",\"WARC-Block-Digest\":\"sha1:ZOXXYFKNYBHZVAQPSOYPFHYSZAW6GYWX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662527626.15_warc_CC-MAIN-20220519105247-20220519135247-00558.warc.gz\"}"} |
https://discuss.pytorch.org/t/padding-setting-of-torch-nn-convtranspose2d/21066 | [
"I am a little confused about the padding setting of the torch.nn.ConvTranspose2d.\n\nAs I see the document, it seems that the padding of the deconvolution is calculated by some settings of convolution. padding(deconv) = K(conv) - 1 - padding(conv)\n\nAn Example:\nIf I want to upsample x3 using the deconvolution, the setting of the convolution is kernel = 3, stride = 2, padding = 0; According to the previous equation, the padding of the deconvolution should be 2;\n, we can get the setting of deconvolution, kernel = 7, stride = 3, padding = 2;\n\nI don’t know if my understanding is right. Actually, I don’t know if the first equation is required. If not, the setting of kernel = 5, stride = 3, padding = 1; also meets the second equation.\n\nAny help would be much appreciated.\nIt would be better if you could provide some related material.\n\n1 Like\n\nYou are right. There are several setting for your `ConvTranpose` layer to achieve the same result.\nThe same goes for the opposite direction: you can get the same output shape using different settings for a `Conv` layer.\n\nThis tutorial and also these visualizations might make things clearer.\n\n3 Likes\n\nThis is what I want.\nThanks so much !!!\n\nIf this is of any help, I wrote a post on ConvTranspose1d which is extendable to 2d simply:\n\nIf anyone in the community sees a misunderstanding I’ll be greateful about pointers",
null,
"1 Like"
] | [
null,
"https://discuss.pytorch.org/images/emoji/apple/smiley.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.85458505,"math_prob":0.96278286,"size":931,"snap":"2022-27-2022-33","text_gpt3_token_len":246,"char_repetition_ratio":0.17907228,"word_repetition_ratio":0.02631579,"special_character_ratio":0.2556391,"punctuation_ratio":0.14361702,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98889387,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-26T07:49:41Z\",\"WARC-Record-ID\":\"<urn:uuid:3b761aeb-3113-4c5d-81a2-c798373028db>\",\"Content-Length\":\"22861\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:76bc521f-bbaf-4ad1-b787-fa31a46a8d26>\",\"WARC-Concurrent-To\":\"<urn:uuid:02f35a4e-9233-424e-867b-efc258e7764a>\",\"WARC-IP-Address\":\"159.203.145.104\",\"WARC-Target-URI\":\"https://discuss.pytorch.org/t/padding-setting-of-torch-nn-convtranspose2d/21066\",\"WARC-Payload-Digest\":\"sha1:6ZOTDWGYO75ERNOTAAW6OAWOLNCFGEFR\",\"WARC-Block-Digest\":\"sha1:YCK7WNMAMDRRB23R6VPHDLLLQMGR6544\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103037649.11_warc_CC-MAIN-20220626071255-20220626101255-00091.warc.gz\"}"} |
https://www.java67.com/2012/09/palindrome-java-program-to-check-number.html | [
"# Palindrome: Java program to check number is palindrome or not? Example\n\nHow to find if a number is a palindrome in Java\nChecking whether a number is palindrome or not is a classical Java homework exercise. When you start learning Java programming most institute which teaches Java programming provides these classical Java programs like How to find Armstrong number in Java or how to find the Fibonacci number in Java using recursion etc. Write a Java program to check if the number is palindrome comes from the same category. For those who are not familiar with palindrome numbers, a palindrome number is a number that is equal to the reverse of itself.\n\nFor example, 121 is a palindrome because the reverse of 121 is 121, while 123 is not a palindrome in Java because the reverse of 123 is 321 and 121!=321. Finding a palindrome number is easy in Java, you just need to develop logic to reverse a number in Java.\n\nThankfully Java provides a couple of arithmetic operators like remainder(%) operator also known as modules operator, which returns remainder in division operator and division operator(/) which returns quotient. By using remainder and division operator in Java we can create program to check if the number is palindrome or not.\n\n## Java program – palindrome numbers in Java\n\nHere is a complete Java program to check if a given number is palindrome or not, This program works for both positive and negative numbers and displays if it's palindrome irrespective of their sign. Any one-digit number including zero is always palindrome.\n\nThis program is able to check two-digit, three-digit numbers for a palindrome and effectively go to any number in Java.\n\nLet’s see how to write a Java program to find palindrome numbers :\n\npackage testing;\nimport java.util.Scanner;\n/**\n* Java program to check if the number is palindrome or not.\n* A number is called palindrome if the number\n* and its reverse is equal\n* This Java program can also be used to reverse a number in Java\n*/\n\npublic class NoClassDefFoundErrorDueToStaticInitFailure {\n\npublic static void main(String args[]){\n\nSystem.out.println(\"Please Enter a number : \");\nint palindrome = new Scanner(System.in).nextInt();\n\nif(isPalindrome(palindrome)){\nSystem.out.println(\"Number : \" + palindrome\n+ \" is a palindrome\");\n}else{\nSystem.out.println(\"Number : \" + palindrome\n+ \" is not a palindrome\");\n}\n\n}\n\n/*\n* Java method to check if a number is palindrome or not\n*/\n\npublic static boolean isPalindrome(int number) {\nint palindrome = number; // copied number into variable\nint reverse = 0;\n\nwhile (palindrome != 0) {\nint remainder = palindrome % 10;\nreverse = reverse * 10 + remainder;\npalindrome = palindrome / 10;\n}\n\n// if original and the reverse of number is equal means\n// number is palindrome in Java\nif (number == reverse) {\nreturn true;\n}\nreturn false;\n}\n\n}\n\nOutput:\n123\nNumber: 123 is not a palindrome\n121\nNumber: 123 is a palindrome\n\nThat’s all on how to check if a number is a palindrome or not in Java. If you are looking for the answer to this question for interview purposes then better prepare a recursive version of the palindrome program in Java as well because of its common practice that programmer is expected to write java programs using both recursion and iteration in Java. Let me know if you find any other way of checking palindrome in Java.\n\nOther Java homework programming exercises:\nAlso, what is your favorite Java programming exercise? Prime Number, Fibonacci series, Binary Search, or this one? Do let me know in comments.\n\n1.",
null,
"Very good Program!\nPlease correct the out put when it asks 121 is a palindrome....the result says\n123\" is a palindrome... it should be 121 :)\nCheers!\n\n2.",
null,
"Hi, Thanks for this. The program is working well but I am trying to understand how the reverse(sort of where it came from) fits the program.\n\n3.",
null,
"// Variations, using charAt\n\npublic static boolean isPolindrome(int n) {\n\nString s = String.valueOf(n).toString();\nString rs = new StringBuffer(s).reverse().toString();\n\nfor (int i=0; i<s.length(); i++) {\nif (s.charAt(i) != rs.charAt(i)) return false;\n}\n\nreturn true;\n}\n\n4.",
null,
"Hi you dont even need to reverse the string .\n\nstatic boolean checkAlgoOne(int num) {\n\nboolean check = false;\n\nString number = Integer.toString(num);\nchar[] chars = number.toCharArray();\nint len = chars.length;\n\nif (num < 0)\ncheck = false;\nif (num == 0 || num == 1)\ncheck = true;\n\nif (len % 2 != 1) {\ncheck = false;\n} else {\n\nfor (int i = 0; i <= len / 2; i++) {\nif (chars[i] == chars[len - 1])\ncheck = true;\n}\n\n}\nreturn check;\n}\n\ncheers!\n\n1.",
null,
"1221 is palindrome, but your program will say it's not\n\n2.",
null,
"import java.util.Scanner;\npublic class integerpolindrome {\npublic static void main(String[] args) {\nint poly=0;\nSystem.out.println(\"enter the integr number :\");//123\nint num= new Scanner(System.in).nextInt();\nint real=num;\nwhile(num!=0)\n{\nint rem=num%10;//3\npoly =rem+10*poly;\nnum/=10;\n}\nif(poly==real)\n{\nSystem.out.println(\"its a polindrome number:\");\n}\nelse\nSystem.out.println(\"its not a polindrome number:\");\n}\n\n}\n//try this one\n\n5.",
null,
"My way:\n/* Palindrome Program In JAVA\n*/\nimport java.util.Scanner;\nclass Palindrome{\npublic static void main(String args[]){\nSystem.out.print(\"Enter Number: \");\nint n = num;\n//reversing number\nint rev=0,rmd;\nwhile(num > 0)\n{\nrmd = num % 10;\nrev = rev * 10 + rmd;\nnum = num / 10;\n}\nif(rev == n)\nSystem.out.println(n+\" is a Palindrome Number!\");\nelse\nSystem.out.println(n+\" is not a Palindrome Number!\");\n}\n}\n\nMORE @ http://www.codenirvana.in/2013/10/Palindrome-Number-in-JAVA.html\n\n1.",
null,
"hi,\n\ncan u explain why you have divided input by 10 and and %10 for reversing a number series...please explain that part.\n\n2.",
null,
"Hello @Anonymous, when you divide the number you drop last digit from number and when you to module 10 i.. % 10 you get the last digit of the number.\n\nFor example, 123/10 = 12, last digit 3 is gone so number reduced from 3 to 2\n123%10 = 3 means last digit.\n\nThis is the trick you need to reverse the number.\n\n3.",
null,
"why do we have 121/10=12 instead of 12.1\n\n4.",
null,
"why do we have 121/10 as 12 instead of 12.1\n\n5.",
null,
"You've probably figured this out by now but I will write the answer anyway in case someone else stumbles upon this thread.\nThe answer is simple - because it's an integer, and integers are whole numbers. For the number to store 12.1 it would have to be a double or a float, both of which allow fractions.\n\n6.",
null,
"private static boolean isPalindrome(int n) {\nreturn n == Integer.valueOf(new StringBuilder(String.valueOf(n)).reverse().toString());\n}\n\n7.",
null,
"private void checkPolyndrom(String st) {\nboolean polyn=true;\nfor(int i =0; i<st.length()-1/2; i++){\nif(st.charAt(i)==st.charAt(st.length()-1-i) && polyn){\npolyn=true;\n}else{\npolyn=false;\n}\n}\nif(polyn){\nSystem.out.println(\"Polyndrom\");\n}else{\nSystem.out.println(\"Not Polyndrom\");\n}\n\n}\n\n8.",
null,
"Why do we multiply rev*10+ remainder\n\n1.",
null,
"9.",
null,
"all are from which standards\n\n10.",
null,
"Is 1221 a palindrome number. ????\n\n1.",
null,
"11.",
null,
"public static boolean isPalindrome(int n) {\nString i = Integer.toString(n);\nint first = 0;\nint last = i.length() - 1;\n\nwhile (first < last) {\nif (i.charAt(first) == i.charAt(last)) {\nfirst++;\nlast--;\n} else {\nreturn false;\n}\n}\nreturn true;\n}\n\n12.",
null,
"good examples and thanks to all..\n\n13.",
null,
"how to close the scanner int function?? for resolving warning.\n\n1.",
null,
"(Scanner name).close();\n\n2.",
null,
"myScanner.close();\n\n14.",
null,
"try this simple way\n\nimport java.util.*;\nclass StringPalindrome\n{\npublic static void main (String ar[])\n{\nString a, b;\nStringBuffer sb;\nScanner sc=new Scanner (System.in);\nSystem.out.println(\"Ente rhe string\");\na=sc.nextLine();\nsb=new StringBuffer(a);\nb=sb.reverse().toString();\nif(a.equals(b))\n{\nSystem.out.println(\"The string is palidrome\");\n}\nelse\n{\nSystem.out.println(\"The string is not a palindrome\");\n}}}\n\n15.",
null,
"public static boolean isNumberPalindrome(int str) {\n\nreturn str == Integer.parseInt(new StringBuilder().append(str).reverse().toString());\n}\n\n16.",
null,
"Palindrome Check using HashSet:\nimport java.util.HashSet;\nimport java.util.Set;\n\npublic class p16 {\n\npublic static void main(String[] args) {\nString a = \"malayalam1\";\n\nSystem.out.println(ispalindrome(a));\n\n}\n\nprivate static boolean ispalindrome(String a) {\n\nSet set = new HashSet<>();\nfor (int i = 0; i < a.length(); i++) {\nchar ch = a.charAt(i);\nif(set.contains(ch)) {\nset.remove(ch);\n}else {\n}\n}\nreturn set.size() <= 1 ;\n\n}\n\n}\n\n17.",
null,
"Integer i = 1221;\nchar word[] = i.toString().toCharArray();\n\nint i1 = 0;\nint i2 = word.length - 1;\nwhile (i2 > i1) {\nif (word[i1] != word[i2]) {\nSystem.out.println(\"not palindrome\");\nbreak;\n}\n++i1;\n--i2;\n}\n\n18.",
null,
"if(i==s.length()%2)\n{\nSystem.out.println(\"Palidrome\");\n}\n\n19.",
null,
"public class NumberPalindrome {\npublic static boolean isPalindrome(int number)\n{\nint rem=0,reverse=0,start=number;\nwhile(number!=0)\n{\nrem=number%10;\nreverse=(reverse*10) +rem;\nSystem.out.println(\"rev= \"+reverse);\nnumber=number/10;\n\n}\n\nif(reverse==start)\nreturn true;\n\nreturn false;\n\n}\n\n}\n\n20.",
null,
"It is harder to understand with numbers than with string.\n\n1.",
null,
"Yeah, you need to know how to get the last digit of an number (remainder of divide by 10) and how to reduce 3 digit to 2 digit (divide by 10). If you don't know this trick then its a difficult problem to solve.\n\n21.",
null,
"This program fails for numbers starting with a 0...Please correct your code..\n\n1.",
null,
"number starting with zero? that's not the valid number, how do you distinguish between 10 and 010? unless you are using string.\n\n22.",
null,
"public static void main(String[] args)\n{\n//////////// for integer\nint a=1551;\nif(String.valueOf(a).equals(new StringBuffer(String.valueOf(a)).reverse().toString()))\nSystem.out.println(\"the number is palandrone\");\nelse\nSystem.out.println(\"the number is not palandrone\");\n/////////// for string\nString s4=\"teet\";\nif(s4.equals(new StringBuilder(s4).reverse().toString()))\nSystem.out.println(\"the string is palandrone\");\nelse\nSystem.out.println(\"the string is not palandrone\");\n}\n}\n\n1.",
null,
"That's cool but in interview you may not be allowed to use the reverse() method, Can you solve this problem without using StringBuffer or StringBuilder and reverse method?\n\n23.",
null,
"package javaapplication6;\n\nimport java.util.Scanner;\n\n/**\n*\n* @author MANISHA\n*/\npublic class JavaApplication6 {\n\n/**\n* Java program to check if the number is palindrome or not.\n* A number is called palindrome if the number and its reverse is equal\n* This Java program can also be used to reverse a number in Java\n*/\n\npublic static void main(String args[]){\n\nSystem.out.println(\"Please Enter a number : \");\nScanner console = new Scanner(System.in);\nint palindrome=console.nextInt();\n\nif(isPalindrome(palindrome)){\nSystem.out.println(\"Number is a palindrome\");\n}\nelse\n{\nSystem.out.println(\"Number is not a palindrome\");\n}\n\n}\n\n/*\n* Java method to check if a number is palindrome or not\n*/\npublic static boolean isPalindrome(int number) {\nint palindrome = number; // copied number into variable\nint reverse = 0;\n\nwhile (palindrome != 0) {\nint remainder = palindrome % 10;\nreverse = reverse * 10 + remainder;\npalindrome = palindrome / 10;\n}\n\n// if original and reverse of number is equal means\n// number is palindrome in Java\nif (number == reverse) {\nreturn true;\n}\nreturn false;\n}\n}\n\nFeel free to comment, ask questions if you have any doubt."
] | [
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://1.bp.blogspot.com/-NnFryYOpiW8/ZQPyhuORS7I/AAAAAAAAEtw/QgcD2c6pfncgo3iWypQRa1GBUpPs5aOfQCK4BGAYYCw/s35/DSC_5390.JPG",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://resources.blogblog.com/img/blank.gif",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6964727,"math_prob":0.95155,"size":13144,"snap":"2023-40-2023-50","text_gpt3_token_len":3140,"char_repetition_ratio":0.20745814,"word_repetition_ratio":0.32111,"special_character_ratio":0.27008522,"punctuation_ratio":0.16653258,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.989895,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74],"im_url_duplicate_count":[null,null,null,null,null,null,null,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-26T00:01:39Z\",\"WARC-Record-ID\":\"<urn:uuid:40911ea0-bf59-47af-a514-cf4c98708a43>\",\"Content-Length\":\"263650\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:149166ce-6522-42ba-b721-f3e37b942140>\",\"WARC-Concurrent-To\":\"<urn:uuid:9e05700c-1082-42b8-bf97-132b140b172f>\",\"WARC-IP-Address\":\"142.250.31.121\",\"WARC-Target-URI\":\"https://www.java67.com/2012/09/palindrome-java-program-to-check-number.html\",\"WARC-Payload-Digest\":\"sha1:TKEM36WGINY6FYPETJTEHFJCAZ4CP2HG\",\"WARC-Block-Digest\":\"sha1:2BUZ4254SSPRMLQIF7M5WIZSXAQG533M\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510100.47_warc_CC-MAIN-20230925215547-20230926005547-00373.warc.gz\"}"} |
https://teacherhelp.cpm.org/a/359585-create-practice-test-9-using-the-equation-editor | [
"# Create Practice Test: 9. Using The Equation Editor\n\nUpdated on\n\nThis article describes how to use the Equation Editor to modify an equation.\n\n## Modify the equation in problem #5:\n\n• Double click the equation in problem #5. The equation editor will come up.\n• Click all of the tabs above and note which ones may be useful to you and the courses you are teaching.",
null,
"## Replace the equation:\n\n• Type in the function below.\n• Use the icons to help with exponents, parentheses, and fractions.\n• (Note: the 6th tab from the left has a smaller fraction than the first tab.)\n• Click 'OK' at the bottom left when completed.",
null,
""
] | [
null,
"https://media.screensteps.com/image_assets/assets/001/899/902/original/c1031dfe-1e2e-4f3a-96ff-71912ee7c1dc.png",
null,
"https://media.screensteps.com/image_assets/assets/001/899/901/original/56efeb60-fc67-4fd7-a88e-dfb6151d05ff.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.85441077,"math_prob":0.87413365,"size":540,"snap":"2023-14-2023-23","text_gpt3_token_len":121,"char_repetition_ratio":0.15485075,"word_repetition_ratio":0.0,"special_character_ratio":0.23518519,"punctuation_ratio":0.12149533,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9936373,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,7,null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-24T13:13:00Z\",\"WARC-Record-ID\":\"<urn:uuid:abe294bc-3579-407d-846b-ca9202eba3c2>\",\"Content-Length\":\"24858\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d89099e5-6c3a-4696-afa9-42fe2e97ead4>\",\"WARC-Concurrent-To\":\"<urn:uuid:aa0e0499-33dd-459f-9474-600fb2bb4aac>\",\"WARC-IP-Address\":\"104.18.28.38\",\"WARC-Target-URI\":\"https://teacherhelp.cpm.org/a/359585-create-practice-test-9-using-the-equation-editor\",\"WARC-Payload-Digest\":\"sha1:4MTGFVXRY5XG6TC2N2UWOOBJKYQKWGJO\",\"WARC-Block-Digest\":\"sha1:WBHNLCS4UE54DCI4TCXCGQS2WPTB6HLB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296945282.33_warc_CC-MAIN-20230324113500-20230324143500-00619.warc.gz\"}"} |
https://quant.stackexchange.com/questions/36147/tail-dependency-for-portfolio-optimization | [
"# tail dependency for portfolio optimization\n\nThis question pops up in my head every few weeks and I'm struggling to really understand the concept / theory behind it.\n\nWe all know there are different kind of measures of dependencies out there. From Pearson's $\\rho$ to Kendall's $\\tau$ to more sophisticated tail dependency measures from copula:\n\n$$\\lim_{q\\downarrow0}\\frac{C(q,q)}{q}$$\n\nwhere $C$ is the copula of two random variables $X, Y$.\n\nIn portfolio theory we often asses risk with the standard deviation in optimization, i.e. $\\sqrt{w\\Sigma w}$. The nice thing about pearson correlation is that we know $Var(w^TX)= w\\Sigma w$ if $\\Sigma$ is the covariance matrix of the random variables $X$. This simple fact allows us to use the dependency measure (pearson correlation) to define a risk measure which has a simple structure.\n\nIf we think deeper about it. We have a dependency matrix $\\Sigma$ containing pairwise dependency measures. Using $f_\\Sigma (w):= w\\Sigma w$ maps then these pairwise dependency to a single risk number for the total portfolio.\n\nFirst question Can we come up with such meaningful $f$ for other pairwise dependency measures as well to obtain an overall single risk number for the portfolio? Meaningful in this context simply means that we really capturing a sort of risk of the overall portfolio.\n\nI often see that the same quadratic $f$ is used but one just replaces the pairwise dependency matrix. For example using Kendall's tau, correlation or tail dependencies as entries in $\\Sigma$.\n\nSecond question Does this replacing even make sense from a mathematical and risk perspective? What are the pitfalls then of just blindly using such a $\\Sigma$ with a different dependency measure? For example the package FRAPO calculates a minimal tail dependency portfolio by quoting from this link\n\nAkin to the optimisation of a global minimum-variance portfolio, the minimum tail dependennt portfolio is determined by replacing the variance-covariance matrix with the matrix of the lower tail dependence coefficients as returned by tdc.\n\nAt least to me it's not clear why this should work and represent a number which tells you something about the risk of the portfolio.\n\nI'm not sure if I understand / agree. I did the following example in R. Suppose we have 4 assets with the following correlation matrix:\n\n> cor <- matrix(c(1, 0.9, -0.95, -0.96, 0.9 , 1, -0.98, -0.92, -0.95, -0.98, 1, 0.97, -0.96, -0.92, 0.97, 1), nrow=4, byrow=T)\n> cor\n[,1] [,2] [,3] [,4]\n[1,] 1.00 0.90 -0.95 -0.96\n[2,] 0.90 1.00 -0.98 -0.92\n[3,] -0.95 -0.98 1.00 0.97\n[4,] -0.96 -0.92 0.97 1.00\n\n\ni.e. two asset are highly correlated two are highly uncorrelated. Assume we have an equally weighted portfolio and volatilities (standard deviation of the assets are $(0.12,0.08,0.15,0.02)$. Then the covariance matrix is\n\n> cov <- matrix(c(cor[1,1]*0.12*0.12, cor[1,2]*0.12*0.08, cor[1,3]*0.12*0.15, cor[1,4]*0.12*0.02, cor[2,1]*0.12*0.08, cor[2,2]*0.08*0.08, cor[2,3]*0.08*0.15, cor[2,4]*0.08*0.02, cor[3,1]*0.12*0.15, cor[3,2]*0.15*0.08, cor[3,3]*0.15*0.15, cor[3,4]*0.15*0.02, cor[4,1]*0.12*0.02, cor[4,2]*0.02*0.08, cor[4,3]*0.02*0.15, cor[4,4]*0.02*0.02),nrow=4,byrow=T)\n> cov\n[,1] [,2] [,3] [,4]\n[1,] 0.014400 0.008640 -0.01710 -0.002304\n[2,] 0.008640 0.006400 -0.01176 -0.001472\n[3,] -0.017100 -0.011760 0.02250 0.002910\n[4,] -0.002304 -0.001472 0.00291 0.000400\n\n\nchecking quickly if I didn't mess around and if the matrices are positive semi-definite:\n\n> cov2cor(cov)\n[,1] [,2] [,3] [,4]\n[1,] 1.00 0.90 -0.95 -0.96\n[2,] 0.90 1.00 -0.98 -0.92\n[3,] -0.95 -0.98 1.00 0.97\n[4,] -0.96 -0.92 0.97 1.00\n> eigen(cov)\n$values 4.237828e-02 1.181651e-03 1.278374e-04 1.223631e-05$vectors\n[,1] [,2] [,3] [,4]\n[1,] -0.56773237 0.78783396 -0.2372159 0.02694845\n[2,] -0.37734597 -0.49612636 -0.7636994 -0.16802342\n[3,] 0.72548256 0.36316206 -0.5520474 -0.19243722\n[4,] 0.09468381 -0.03591096 -0.2360838 0.96644184\n\n> eigen(cor)\n$values 3.840405106 0.115703083 0.038349747 0.005542064$vectors\n[,1] [,2] [,3] [,4]\n[1,] -0.4960354 0.5839966 -0.63706112 -0.08396417\n[2,] -0.4947472 -0.7033709 -0.19753124 -0.47061241\n[3,] 0.5078001 0.2206994 -0.08387845 -0.82848975\n[4,] 0.5013114 -0.3398664 -0.74033705 0.29168255\n\n\nLooks all about right. Now lets calculate $w^T\\Sigma w$ and $w^TCw$. According to you we should see a difference. However, they are pretty inline with each other:\n\n> sum(w*(cov%*%w))\n 9.55e-05\n> sum(w*(cor%*%w))\n 0.0075\n> w\n 0.25 0.25 0.25 0.25\n\n\nthe risk (using the covariance matrix) is zero as we would expect.\n\n• Var($w^TX$) $= w^T \\Sigma w$ if $\\Sigma$ is the covariance matrix, not the correlation matrix. – Wintermute Sep 30 '17 at 15:08\n• @Wintermute corrected, thx. – math Sep 30 '17 at 15:50\n• There is not one answer: you can define the risk metric of your portfolio returns $f : w^T X \\to f(w^T X)$ however you like! Considering a quadratic form $f(w^T X) = w^T A w$ is only one of the many possibilities (you could for instance opt for a \"coherent risk measure\" instead). Focusing on variance is frequent as it makes the optimisation problem easier (covariance matrix being symmetric and positive semi-definite => convex optimisation). However variance is not a risk measure in the sense that it does not verify the \"translation invariance\" property for instance. – Quantuple Oct 2 '17 at 12:18\n• @Quantuple thx for your comment. I know coherent risk measures or at least I did back at university :) With them you can properly assign a risk to the total portfolio. The open question still is...does it make sense to aggregate pairwise risk measures (not the variance) via a quadratic formula as you put it? Are there pitfalls or what does the result even mean? Does it even have a meaning in terms of risk? – math Oct 2 '17 at 13:49\n• @Hi math, no problem. I'm not sure I understand though, a risk measure as per definition, is a function that maps a random variable to a positive real number i.e. $\\rho : \\mathcal{L} \\to \\Bbb{R} : X \\to \\rho(X)$. So there is no such thing as a \"pairwise\" risk measure like you would have a dependency measure $d(X_1,X_2)$. You could have something like $\\rho(X_1+X_2)$ but not $\\rho(X_1, X_2)$, so I guess that the quadratic form is less attractive with risk measures. – Quantuple Oct 2 '17 at 14:25\n\nSince your standard for meaningful risk measurement is pretty low (\"Meaningful in this context simply means that we really capturing a sort of risk of the overall portfolio.\") There are limited cases where such an approach might make sense. From a broader perspective I think it makes very little sense.\n\nIf your matrix of pairwise risk numbers is symmetric and positive definite, it defines a metric (actually an inner product) in the vector space of all possible portfolios. With this metric you can do all those things you can do with any metric: Distinguish between large (\"risky\") and small (\"safe\") portfolios, optimise easily (due to convexity of the distance funtion), perform risk/return optimisation and so on. I think this is exactly the point quintuple has made.\n\nWill this give you the full picture? Without strong additional assumptions on the underlying multivariate distribution of asset returns definitely not. The best example for such an assumption is of course being multivariate normal. Actually the reason why the covariance matrix is so important in this case is not that it provides a simple way to calculate the variance. It is important since covariance (together with the means) determines the distribution! This means if you know the covariance (and the means) you know everything about the distribution there is to know, including the risk of total portfolio return, for whichever way you may define your risk.\n\nTo drive this point of adequate assumptions down further: Even linear correlations may no longer be \"meaningful\" if you leave multivariate normality. See this paper on pitfalls of correlation.\n\nFurthermore the whole idea of measuring only pairwise dependence is highly problematic. Pairwise dependence is just one aspect of total dependence (hence of total risk). To see a true shocker have a look at this presentation. It is in German sadly but on page 9 you find a nice graphic. It is an example of three uniform(0,1) random variables. The left hand scatters show that they are pairwise independent (not just uncorrelated, really independent!) while the righthand side gives you the full picture. In this example the third variable $U_3$ is actually a deterministic function of the two other variables $(U_1,U_2)$, i.e. it has arguably the strongest possible dependence on the other two.\n\nIf you would like to understand how this guy has constructed the example have a look at his paper on shaping tail dependencies.\n\n• many thanks for your answer! I will have a look at the linked paper and try to get the german :) – math Oct 3 '17 at 13:25\n\nLet $X$ be an $n \\times 1$ random vector and $w$ a vector of coefficients. Then we know that $$Var(w^TX)=w^T \\;Var(X) \\;w=w^T\\Sigma w$$ where $\\Sigma$ is the covariance matrix of $X$. Now suppose that $C$ is the correlation matrix of $X$ and $e$ is the $n \\times 1$ vector of all ones. We see that $$w^T C w = w^Te +\\sum_{i \\neq j}w_iw_jc_{ij}$$ where $c_{ij}$ is the correlation between the $i^{th}$ and $j^{th}$ components of $X$. Now $c_{ij}$ tells you the strength of any possible linear relationship between the $i^{th}$ and $j^{th}$ components of $X$ (1 or -1 means a perfect linear relationship). What does it mean to sum correlations? In the context of multiple regression it can be used to compute $R^2$ to see how much of the variance is described by your model, however in the context of portfolio risk I'm not sure it tells us anything meaningful. For example if half the correlations are 1 and the other half -1 $w^T C w$ would be small and you might think you have low risk. However you should have a strong linear dependance between all of your stocks. I would say the same for Kendall's tau. In general I would say it is dangerous to use any measure which is not first and foremost rational. In addition it is dangerous to use any code which you do not completely understand. It is not even remotely clear to me how the code in the link you provided works so I would stay away. If you want to measure the tail risk of your portfolio I would recommend fitting a power law to your time series of portfolio returns. This will give you a good idea of how kurtotic your portfolio returns are.\n\n• I've added a code example trying to replicate your example. I'm not entirely sure if I understood it correctly. For me it looks that both approaches are pretty much coincide. – math Oct 1 '17 at 8:41"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8086016,"math_prob":0.9929972,"size":4496,"snap":"2020-45-2020-50","text_gpt3_token_len":1664,"char_repetition_ratio":0.115316115,"word_repetition_ratio":0.07241911,"special_character_ratio":0.46485764,"punctuation_ratio":0.2354452,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9981305,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-23T00:35:00Z\",\"WARC-Record-ID\":\"<urn:uuid:1aee165e-76ee-4b3c-b581-e229811ce5e5>\",\"Content-Length\":\"167639\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3ac1564d-a405-48ad-bcba-586c7a1d8ea0>\",\"WARC-Concurrent-To\":\"<urn:uuid:7f0839f1-baa9-418f-b8a0-838234dfeb7b>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://quant.stackexchange.com/questions/36147/tail-dependency-for-portfolio-optimization\",\"WARC-Payload-Digest\":\"sha1:N6YEICYRGJFTIAPDP2W4VTMWHFKERA3D\",\"WARC-Block-Digest\":\"sha1:5R6GE5NZ6YS6UKWSSUVYDERSPF6YINZQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107880401.35_warc_CC-MAIN-20201022225046-20201023015046-00167.warc.gz\"}"} |
https://answers.everydaycalculation.com/simplify-fraction/50-9450 | [
"# Answers\n\nSolutions by everydaycalculation.com\n\n## Reduce 50/9450 to lowest terms\n\nThe simplest form of 50/9450 is 1/189.\n\n#### Steps to simplifying fractions\n\n1. Find the GCD (or HCF) of numerator and denominator\nGCD of 50 and 9450 is 50\n2. Divide both the numerator and denominator by the GCD\n50 ÷ 50/9450 ÷ 50\n3. Reduced fraction: 1/189\nTherefore, 50/9450 simplified to lowest terms is 1/189.\n\nMathStep (Works offline)",
null,
"Download our mobile app and learn to work with fractions in your own time:\nAndroid and iPhone/ iPad\n\nEquivalent fractions:\n\nMore fractions:\n\n#### Fractions Simplifier\n\n© everydaycalculation.com"
] | [
null,
"https://answers.everydaycalculation.com/mathstep-app-icon.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7380261,"math_prob":0.77639455,"size":327,"snap":"2021-04-2021-17","text_gpt3_token_len":98,"char_repetition_ratio":0.14551084,"word_repetition_ratio":0.0,"special_character_ratio":0.37003058,"punctuation_ratio":0.10169491,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9569304,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-19T13:31:07Z\",\"WARC-Record-ID\":\"<urn:uuid:2eeb791e-a872-4d45-ad28-58426bf1363f>\",\"Content-Length\":\"6196\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e701056e-36a2-41ed-876c-8546d64d9f61>\",\"WARC-Concurrent-To\":\"<urn:uuid:a1750b5d-a266-4412-85ce-41093bb06331>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/simplify-fraction/50-9450\",\"WARC-Payload-Digest\":\"sha1:ZCUMENS24HVDSHS6TWEROT2GUV4ADICO\",\"WARC-Block-Digest\":\"sha1:ZX6WALLW2ZNVTVH6HYA5ZZV7HYSKGFSS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038879374.66_warc_CC-MAIN-20210419111510-20210419141510-00546.warc.gz\"}"} |
https://everything2.com/title/geodesic | [
"(differential geometry:)\nA path which is locally shortest. That is, for any point on the path, all points on the path within a certain distance are connected along the path by the shortest possible route.\n\nOn Earth, geodesics are given by great circles, i.e. circles in a plane going through the centre of the Earth. Such paths are obviously not necessarily shortest (consider going from London to Paris by flying over the Atlantic, and coming back through Asia and Europe). But for \"sufficiently close\" points (anything in the same hemisphere), great circles are shortest paths. This is why airlines fly great circles.\n\nOn a smooth manifold, this metric characterisation of a geodesic leads to a differential geometric characterisation.\n\nIn General Relativity, a geodesic is a curve of zero acceleration. That is, a particle with no forces acting upon it will follow a geodesic in the spacetime. Geodesics can be spacelike, timelike or null.\n\nPut simply, a geodesic is a straight line in a curved space.\n\nGeodesics are a part of the fundamental construction of Differential Geometry. They are also important physical, measurable solutions in General Relativity.\n\nHere are several possible definitions of geodesics, some more rigorous than others:\n\n1) A geodesic is a curve which gives the shortest distance between two points in a curved space. This is almost true, given a few caveats. It serves as a good conceptual definition, if not a perfect mathematical one.\n\n2) A geodesic is a curve which has zero acceleration tangent to its geometric space. For a two-dimensional surface, then, a geodesic is a curve in the surface whose acceleration is perpendicular to the surface. To be mathematically precise, we would need to include reparameterizations of these curves, but this is a minor point.\n\n3) A geodesic is a trajectory in which an observer would feel no acceleration. A nice physics definition, if lacking in mathematical rigor.\n\nThe point is, a geodesic is the closest thing to a straight line in an arbitrary curved space.\n\nMathematical examples of geodesics:\n\n--In a flat plane, or in any flat n-dimensional space, the geodesics are straight lines (as one would expect).\n\n--On the surface of a sphere, the geodesics are great circles (circles which cut the sphere exactly in half).\n\n--On the surface of a cylinder, the geodesics are straight lines parallel to the axis, circles perpendicular to the axis, and helices (spirals).\n\n--In the Poincaré half-plane, geodesics are straight vertical lines, and circles whose origin is on the x-axis (I just had to throw in an esoteric example).\n\nThere are several different mathematical methods for determining the geodesics for a given geometric space, none of which am I going to describe for you now.\n\nA good conceptual demonstration is to look at a flat projection map of the earth. Choose two points on the map, at different longitude, but the same lattitude. On the flat map, a straight line between these points would simply be a parallel of lattitude, i.e. a horizontal line. In general, this is not the shortest distance between the two points. For example, the shortest path between Sydney, Australia and Buenos Aires, Argentina is a course which skims the coast of Antarctica. If you don't believe me, look on a globe. What appear to be curved paths are actually the \"straightest\" a path can possibly be on the curved surface of the earth.\n\nIn General Relativity, geodesics are the trajectories of objects in freefall. For example, the moon's trajectory around the earth is a geodesic, as is the earth's path around the sun. All of these astronomical bodies appear to be following a curved path, but in reality are following a straight line in curved space*. This curvature is caused by the presence of a very large amount of matter, and is a phenomenon commonly known as gravity. As mentioned before, these freefall trajectories are such that no acceleration is felt. Thus, an observer in freefall feels no forces, just as if she were floating freely in outer space, in the absence of gravity. Anyone who has experienced freefall on a rollercoaster, for example, knows what this feels like.\n\nThe point here is, according to the General Relativistic model, gravity is not truly a force. Mass curves space, and curved space causes \"curved\" trajectories (not actually curved, just apparently curved). Thus this fundamental \"force\" can be described entirely by geometry, a remarkable feat indeed. For example, when the path of a light ray is \"bent\" by some gravitational field, it is not because gravity is \"pulling\" the light ray towards the source (photons are massless, and so do not \"feel\" a gravitational \"force\"). The light ray merely seeks out the shortest possible path, which may not be what we perceive to be a \"straight line\".\n\nSince most of us (those of us who are not astronauts) spend our entire lives under the constant influence of gravity, we have developed a particular notion of what a \"straight-line\" trajectory is, and what a \"curved\" trajectory is. We think that jet planes travel in straight lines, and flying snowballs follow curved arcs. The truth is just the opposite.\n\n_____________________________________________________________________________________________\n\n*Actually curved spacetime, but I prefer to avoid cluttering up the discussion with any more fancy physics terminology than necessary.\n\nGe`o*des\"ic (?), Ge`o*des\"ic*al (?), a. [Cf. F. géodésique.] Math.\n\nOf or pertaining to geodetic.\n\nGe`o*des\"ic, n.\n\nA geodetic line or curve.\n\nLog in or register to write something here or to contact authors."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93299127,"math_prob":0.9654831,"size":4424,"snap":"2019-43-2019-47","text_gpt3_token_len":935,"char_repetition_ratio":0.14117648,"word_repetition_ratio":0.011142061,"special_character_ratio":0.21903256,"punctuation_ratio":0.11757576,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97051543,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-19T19:23:20Z\",\"WARC-Record-ID\":\"<urn:uuid:05d052a4-b0d8-4d56-907d-49c1d83df44e>\",\"Content-Length\":\"36127\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:632742d6-d9c0-4f08-86ea-d742167047da>\",\"WARC-Concurrent-To\":\"<urn:uuid:58bfe734-6a19-44f2-91f0-7f23adad879b>\",\"WARC-IP-Address\":\"52.41.251.166\",\"WARC-Target-URI\":\"https://everything2.com/title/geodesic\",\"WARC-Payload-Digest\":\"sha1:VOFEMDCIT5QTPGYEWEGUUV2XY6UMCTYC\",\"WARC-Block-Digest\":\"sha1:353G7EJZMQDC3M5Y5FHFLAU37Q2VCEBQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986697760.44_warc_CC-MAIN-20191019191828-20191019215328-00159.warc.gz\"}"} |
https://math.stackexchange.com/questions/3144848/why-are-these-pdl-formulas-valid-and-invalid | [
"# Why are these PDL formulas valid and invalid\n\nIn the book modal logic for open minds by johan van benthem there is on page 169 a statement that the sentence the first formula bellow is valid and the second one is invalid (* means iteration)\n\nSo why is this valid: $$[ (R\\lor S)^* ] \\phi \\rightarrow [R^*]\\phi \\land [S^*] \\phi$$\n\nAnd why is this one invalid: $$[ (R\\lor S)^* ] \\phi \\leftarrow [R^*]\\phi \\land [S^*] \\phi$$\n\nI will give a hand-wavy general argument for the contraposition of the first validity: $$\\langle R^\\ast\\rangle \\phi \\vee \\langle S^\\ast \\rangle \\phi \\rightarrow \\langle (R \\vee S)^\\ast \\rangle \\phi$$. The main thing to notice is that the set of $$R-S$$-paths $$(R\\vee S)^\\ast$$ includes the sets of $$R$$-paths and $$S$$-paths. So, if some $$\\phi$$-state is reachable via an $$R$$-path, then it is trivially reachable via an $$R-S$$-path. The same holds for a $$\\phi$$-state reachable via an $$S$$-path. In general, $$\\langle R^\\ast\\rangle \\phi \\rightarrow \\langle (R \\vee S)^\\ast \\rangle \\phi$$ is valid.\nNow, let us consider the contraposition of the second formula: $$\\langle (R \\vee S)^\\ast \\rangle \\phi \\rightarrow \\langle R^\\ast \\rangle \\phi \\vee \\langle S^\\ast \\rangle \\phi$$. In order to demonstrate that this formula is invalid, it is enough to notice that even though there is an $$R-S$$-path that reaches a $$\\varphi$$-state, it may be neither $$R$$- nor $$S$$-path (i.e. the path alternate $$R$$ and $$S$$). A simple counterexample would be a three-state model, where a $$p$$-state is reachable via two steps, one $$R$$- and one $$S$$-step, and the initial and the intermediate states have $$\\neg p$$.\n• What does $R-S$-paths mean? And why did you change the box with label to diamond with label inside it? Mar 12, 2019 at 15:07\n• By an $R-S$-path I mean any sequence of $R$- and $S$-arrows in a model. I changed box to diamond because I think that using the contrapositive ($\\phi \\rightarrow \\psi \\leftrightarrow \\neg \\psi \\rightarrow \\neg \\phi$) of the presented formulas makes reasoning more straightforward. So, $[R^\\ast] \\phi \\wedge [S^\\ast] phi \\rightarrow [(R \\vee S)^\\ast]\\phi$ is equivalent to $\\langle (R \\vee S)^\\ast \\rangle \\neg \\phi \\rightarrow \\langle R^\\ast \\rangle \\neg \\phi \\vee \\langle S^\\ast \\rangle \\neg \\phi$. Note that box and diamond are duals. Anyway, the reasoning and counterxample work for both cases. Mar 12, 2019 at 17:27"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7696105,"math_prob":0.9997553,"size":1169,"snap":"2022-27-2022-33","text_gpt3_token_len":354,"char_repetition_ratio":0.16995709,"word_repetition_ratio":0.043956045,"special_character_ratio":0.2865697,"punctuation_ratio":0.0882353,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99999654,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-11T05:46:32Z\",\"WARC-Record-ID\":\"<urn:uuid:070fdc7d-2ed5-4b0f-965a-ecbb20db1d2e>\",\"Content-Length\":\"224526\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6a67f934-b507-4972-9c05-ec85f8fc4f57>\",\"WARC-Concurrent-To\":\"<urn:uuid:1ca062d7-77af-4616-89d1-e57fa013bccf>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/3144848/why-are-these-pdl-formulas-valid-and-invalid\",\"WARC-Payload-Digest\":\"sha1:TDJYGNL4NR4FLZIBZ2OEJ2AGCBTAMKZ3\",\"WARC-Block-Digest\":\"sha1:77GN4GSX6LHALKRVPMRUEJEYZR6WSJHJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571234.82_warc_CC-MAIN-20220811042804-20220811072804-00487.warc.gz\"}"} |
https://researchmaniacs.com/Calculate/WhatTimesWhat/What-Times-What-Equals-10.html | [
"What times what equals 10?",
null,
"Here we looked at all the ways we could answer the following question: \"What times what equals 10?\"\n\nTo do this, we calculated all possible solutions to this problem:\n\nwhat x what = 10\n\nNote that \"what\" and \"what\" in the above problem could be the same number or different numbers.\n\nBelow is a list of all the different ways that what times what equals 10.\n\n1 times 10 equals 10\n\n2 times 5 equals 10\n\n5 times 2 equals 10\n\n10 times 1 equals 10\n\nWhat Times What Equals\nEnter another number below to see what times what equals that number.\n\nWhat times what equals 11?\nNow you know what times what equals 10. Go here for the next number on our list."
] | [
null,
"https://researchmaniacs.com/Images/WhatTimesWhatEquals.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87334144,"math_prob":0.99992704,"size":662,"snap":"2022-05-2022-21","text_gpt3_token_len":165,"char_repetition_ratio":0.25835866,"word_repetition_ratio":0.016,"special_character_ratio":0.26586103,"punctuation_ratio":0.07913669,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99746054,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-24T14:51:18Z\",\"WARC-Record-ID\":\"<urn:uuid:eda24aa0-c102-4cf9-a981-a8abc6017fb9>\",\"Content-Length\":\"8602\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f902eda7-bcd7-469a-9906-7d9b01a6a6ec>\",\"WARC-Concurrent-To\":\"<urn:uuid:276e3603-1915-4712-8105-18036c263f86>\",\"WARC-IP-Address\":\"99.84.191.29\",\"WARC-Target-URI\":\"https://researchmaniacs.com/Calculate/WhatTimesWhat/What-Times-What-Equals-10.html\",\"WARC-Payload-Digest\":\"sha1:UUY3MW3TFN3IGUJRP7YSQYGYAZF4EXFQ\",\"WARC-Block-Digest\":\"sha1:SUOKZ2JI7WYAMG2WQR7X3UHVF2CL5D3Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304570.90_warc_CC-MAIN-20220124124654-20220124154654-00476.warc.gz\"}"} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.