URL
stringlengths 15
1.68k
| text_list
listlengths 1
199
| image_list
listlengths 1
199
| metadata
stringlengths 1.19k
3.08k
|
---|---|---|---|
http://forums.wolfram.com/mathgroup/archive/2006/Jun/msg00515.html | [
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Help: ratio of integral of f(x)^2 to square of integral of f(x)\n\n• To: mathgroup at smc.vnet.net\n• Subject: [mg67352] Help: ratio of integral of f(x)^2 to square of integral of f(x)\n• From: ronnen.levinson at gmail.com\n• Date: Mon, 19 Jun 2006 00:01:20 -0400 (EDT)\n• Sender: owner-wri-mathgroup at wolfram.com\n\n```Hi.\n\nI'm trying to determine whether the following ratio\n\nr = (b-a) Integral[ f(x)^2 dx, {x, a, b} ] /\nIntegral[ f(x) dx, {x, a, b} ]\n\nis always greater than or equal to one for 0 < f(x) <= 1. All values\nall real.\n\nI've obtained r>=1 for all tested choices of f(x), but seek guidance to"
]
| [
null,
"http://forums.wolfram.com/mathgroup/images/head_mathgroup.gif",
null,
"http://forums.wolfram.com/mathgroup/images/head_archive.gif",
null,
"http://forums.wolfram.com/mathgroup/images/numbers/2.gif",
null,
"http://forums.wolfram.com/mathgroup/images/numbers/0.gif",
null,
"http://forums.wolfram.com/mathgroup/images/numbers/0.gif",
null,
"http://forums.wolfram.com/mathgroup/images/numbers/6.gif",
null,
"http://forums.wolfram.com/mathgroup/images/search_archive.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.78020877,"math_prob":0.9920198,"size":893,"snap":"2023-40-2023-50","text_gpt3_token_len":289,"char_repetition_ratio":0.20134982,"word_repetition_ratio":0.27564102,"special_character_ratio":0.33594626,"punctuation_ratio":0.1826484,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9984848,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-30T05:33:59Z\",\"WARC-Record-ID\":\"<urn:uuid:04e29d83-5d9f-4953-9d27-db4e580a5820>\",\"Content-Length\":\"44447\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b0832958-b109-4177-9745-c0014b5c5a95>\",\"WARC-Concurrent-To\":\"<urn:uuid:ad7941ff-0f01-43de-a7ef-652ba4aea694>\",\"WARC-IP-Address\":\"140.177.205.73\",\"WARC-Target-URI\":\"http://forums.wolfram.com/mathgroup/archive/2006/Jun/msg00515.html\",\"WARC-Payload-Digest\":\"sha1:BTXKB445J25ILTVUHYKNIJW6N6DWTVWB\",\"WARC-Block-Digest\":\"sha1:Z56H44NC2E77USAXM4SIQNSSTDMSZJHR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510603.89_warc_CC-MAIN-20230930050118-20230930080118-00118.warc.gz\"}"} |
https://wellsr.com/python/python-string-operations-and-string-formatting/ | [
"## Introduction to Python String Operations and Formatting\n\nIn our previous tutorials, we used strings to supply input and output information to both the terminal and external files. This tutorial will take an in-depth look at Python strings, particularly Python string operations, and how we can format strings in output. If you follow the Python Tutorials Blog, you’re probably used to seeing the simple `print` function:\n\n``````s = 1/7\nprint(s)\n> 0.14285714285714285``````\n\nIn most settings, 17 decimals of precision would be misleading and/or unwise. Previously, we’ve used the `round` function to mathematically round these numbers to a set number of decimals:\n\n``````print(round(s, 4))\n> 0.1429``````\n\nBut what if we want to truncate this number instead? What if we want to represent this number in scientific notation? To do this without dedicated formatting, we would need to create a complex numeric function. Luckily for us, Python has a collection of string operations and formatting methods to solve this problem.\n\n## Python String Operations\n\nBefore we look at outputting strings, let’s look at a selection of Python strings methods and functions that can be used to change the string objects themselves. These methods will all take in a string and return a new string with the given Python operation performed. This is different from other languages that perform a function on the given string object as a side affect without a return value. Therefore, we will always need to “catch” the output of these functions in a new (or the existing) variable if we wish to save the results.\n\n### split Method\n\nThe `split` method is used to convert a Python string into a list of substrings, separated by a given delimiter. `split` has the format `[string].split([delimiter])`, where [delimiter] is the delimiting character (or substring of characters), and [string] is the string to be split. For example:\n\n``````s = \"The best of times.\"\nprint(s.split(\" \")) # Split with a space delimiter\n> ['The', 'best', 'of', 'times.']``````\n\nThe Python split operation is useful for splitting lines retrieved from a file with the `getline` function.\n\n### join Method\n\nThe `join` method performs the reverse of the `split` statement; it takes a list of Python strings and concatenates them together with a given delimiter. `join` has the format `[delimiter].join([list])` where [delimiter] is the delimiting character (or substring of characters), and [list] is the list of strings to be joined. Notice that the format has the opposite order of inputs as the `split` method.\n\n``````t = ['The', 'best', 'of', 'times.']\nprint(\" \".join(t)) # Joining with a space delimiter\n> The best of times.``````\n\nWhere the Python split method separates strings, the Python `join` method is the string operation to bring them back together.\n\n### count Method\n\nThe `count` method counts the number of non-overlapping instances of a substring within a given string. The `count` string operation is case sensitive and has the format `[string].count([substring])`, where [substring] is the substring to be counted, and [string] is the string from which substrings will be counted. This example will help you make more sense of that.\n\n``````s = \"It was the best of times.\"\nprint(s.count(\"t\")) # Count the number of t's in a string\n> 4``````\n\n### strip Method\n\nThe `strip` method removes all instances of a given substring from the beginning and end of a given string. `strip` has the format `[string].strip([substring])` where [substring] is the substring to be removed, and [string] is the string from which the substrings will be removed. For example, this command is useful for removing an unknown number of asterisks from a given string of currency:\n\n``````s = \"****10.00***\"\nprint(s.strip(\"*\"))\n> 10.00\ns = \"\\$****10.00\" # Note that strip does not remove internal substrings\nprint(s.strip(\"*\"))\n> \\$****10.00 # The dollar sign prevented removal of the internal asterisks``````\n\n`strip` will strip the substring from both the left and right sides of the string, but will not touch strings in the middle. It’s a string cleanup operation. `lstrip` is used to only strip characters from the left side of the string, and `rstring` will do the same for the right side of your Python strings.\n\n``````s = \"****10.00***\"\nprint(s.lstrip(\"*\"))\n> 10.00***\nprint(s.rstrip(\"*\"))\n> ****10.00``````\n\n### replace Method\n\nThe `replace` method will replace a given substring with another substring inside a given string. `replace` has the format `[string].replace([old],[new],[count])` where [string] is the string from which the substrings will be replaced, [old] is the substring to be replaced, [new] is the new substring to be inserted, and [count] is an optional specifier for the number of substrings you want to replace. The default for [count] is to replace all substrings.\n\n``````s = \"\\$****10.00\"\nprint(s.replace(\"*\", \"\")) # Substitute asterisks with nothing\n> \\$10.00\ns = \"The best of times.\"\nprint(s.replace(\"best\", \"worst\"))\n> The worst of times.``````\n\nWhere the `strip` operation is used to clean up characters from the left and right side of your string, the `replace` method can be used to remove (or replace) characters throughout your string.\n\nCan't get enough Python?\n\nPython is powerful! Show me more free Python tips\n\n### upper and lower Methods\n\nThe `upper` and `lower` methods are used to change the capitalization of letters within a given string. These methods have the format `[string].upper()` and `[string].lower()`, where [string], of course, is the string to be modified.\n\n``````s = \"It was the BEST of times!\"\nprint(s.upper())\n> IT WAS THE BEST OF TIMES!\nprint(s.lower())\n> it was the best of times!``````\n\nThese methods can be handy when requesting strings from a user that may have unknown capitalization.\n\n``````s = input(\"Continue? Input y/n: \")\n> Continue? Input y/n:\n>> N\nif (s.lower() == \"n\"): # Now the user can enter n or N.\nexit()``````\n\n### find Method\n\nThe `find` method will search a string from left to right, and return the first (lowest) index of a given substring. It’s important to remember that index counting starts at 0 on the far left of your string. The `find` Python string operation both determines if the string contains the substring, and returns its location. `find` has the format `[string].find([substring])`, where [string] is the string to be searched and [substring] is the substring to be found. The method will return -1 if the substring cannot be found. This is similar to the VBA InStr function for my VBA readers out there.\n\n``````s = \"It was the best of the times.\"\nprint(s.find(\"the\"))\n> 7``````\n\nSimilarly, `rfind` will behave the same way, but will find the last (highest) index of the given substring:\n\n``````s = \"It was the best of the times.\"\nprint(s.rfind(\"the\"))\n> 19``````\n\nIf you only need to validate that the string contains a given substring rather than return its location, the `in` statement can used to output a boolean value\n\n``````s = \"It was the best of the times.\"\nprint(\"the\" in s)\n> True``````\n\nThis is very handy when searching line by line through a file for a particular string.\n\n### center Method\n\nThe `center` method will center a string by applying a padding string on both sides to achieve a given total length. `center` has the format `[string].find([totallength],[pad])`, where [string] is the given string, [pad] is the substring you want to use for padding, and [totallength] is your desired total width of the final string. The default character for [pad] is a space.\n\nThis Python string operation is useful when you want to print headers with a standard format. Note that [totallength] is the length of the output string, including the original given string.\n\n``````s = \"Introduction\"\nprint(s.center(30, \"-\"))\n> ---------Introduction---------\nprint(t.center(30, \"-\"))\n\n## Python String Formatting\n\nNow that we’ve looked at manipulating string objects, let’s look at how to change the output of variables in print statements and file output.\n\nThere are two ways to format Python output:\n\n1. the old `%` operation, and\n2. the newer `format` method operation.\n\nThe `%` operation for formatting output was used in older releases of Python, and most legacy code and online tutorials will use this method. The `format` method is the preferred option for modern implementations of Python, and indeed some IDEs will flag the `%` method as an error, since it assumes that `%` is only used as the modulo binary operator. The `%` method can still be used in Python Version 3, but the `format` method is preferred unless you are working with older code.\n\nCan't get enough Python?\n\nPython is powerful! Show me more free Python tips\n\n### % Method\n\nThe `%` method works by inserting conversion specifiers into a string, each of which will be substituted by a proceeding variable or object. Let’s look at the details of these specifiers, then we’ll go over some examples.\n\nSpecifiers have the following format of required and optional parameters which must be inserted in the this order:\n\n1. The character `%`\n2. (Optional) Mapping key contained within parentheses: (key)\n3. (Optional) Conversion flags (see below)\n4. (Optional) Minimum field width, or how much character space must be saved for the input variable\n5. (Optional) Precision, or how many decimals are included in floating point numbers\n6. Conversion Type (presented in table below)\n\nAfter a string containing these specifiers is ended, a `%` followed by either a tuple or dictionary is used to indicate the objects to be inserted.\n\nThe following is a table of conversion types that can be used:\n\nSymbol Output Format Note Python Conversion Types \"s\" String Will convert non-string types into strings (e.g. floats and integers) \"d\" Signed (+/-) Integer Decimal \"i\" can also be used \"f\" Floating Point Decimal \"F\" can also be used \"e\" Floating Point in Scientific Notation (e.g. 1.2e10) The symbol \"E\" outputs a capital \"E\" in output (e.g. 1.2E10) \"g\" Floating Point with Variable Scientific Notation Will output a regular floating point, with scientific notation if exponent is less than -4. \"G\" will output a capital \"E\" in exponents \"%\" % Symbol Used as an escape character for literally inserting a % into a string.\n\nThere are additional conversion types available for output in hexadecimal and octal, but those are less commonly used.\n\nThe following is a set of conversion flags for specifying additional operations within the specifier:\n\nSymbol Operation Note Python Conversion Flags \"0\" Zero Padding for Numeric Values If a numeric character is less that the specified output width, \"0\"s will be used as padding \"-\" Left Align Numbers are left-aligned. Overrides \"0\" padding above \" \" (Space) Leading Decimal Space Leave a blank before positive numbers to align with negative numbers starting with a \"-\" \"+\" Force Proceeding Sign Character (+/-) Will require a sign for numeric characters, regardless of negative or positive\n\nOkay, I know we just threw a lot of information out there. Let’s take a look at an example to help clear things up. Suppose we wanted to insert a number into a string:\n\n``````n = 42\ns = \"The secret number is %d\" % n\nprint(s)\n> The secret number is 42``````\n\nLet break down the code from above. Inside of a string, we inserted the specifier `%d`. The specifier started with the required `%`, had no optional modifiers, and ended with the required conversion type `d` for a decimal output format. The string was followed by another `%`, indicating that we wish to format the string with variables, followed by a length 1 tuple of the variable we wanted to insert.\n\nWe can also use more advanced conversion types on the above example:\n\n``````n = 42\nm = -22\ns = \"The secret number is %(is)d, not %(isnot)d\" % {\"is\": n, \"isnot\": m} # Use a dictionary as input\nprint(s)\n> The secret number is 42, not -22\ns = \"The secret number is %d, not %d\" % (n, m) # Use a tuple as input\nprint(s)\n> The secret number is 42, not -22\ns = \"The secret number is %+d, not %+d\" % (n, m) # Force use of signs\nprint(s)\n> The secret number is +42, not -22\n\nn = 42.2222222222222\nm = -22.0\ns = \"The secret number is %07.2f, not %07.2f\" % (n, m) # Pad with 0's, force length of 7, with 2 decimals of precision for floating point\nprint(s)\n> The secret number is 0042.22, not -022.00\ns = \"The secret number is %.2e, not %.2E\" % (n, m) # Use 2 decimals of precision, in two types of scientific notation\nprint(s)\n> The secret number is 4.22e+01, not -2.20E+01``````\n\nFormatting Python strings can be complicated. The best way to get comfortable with all the syntax is to experiment. Create short Python program like the ones above and tinker with the `%` strings using the tables above.\n\n### format Method\n\nThe `format` method uses a method associated with strings rather than an exterior statement like the older `%` method, if that makes any sense.\n\nThe `format` method follows closer to the Python standard of object use, and is preferred for use in new programs. The `format` method uses specifiers within a Python string, followed by a method call that references what values should be replaced by those specifiers.\n\nAt first glance the `format` method can look more confusing than the `%` method, but in practice it really is more straightforward - it just has more options. The nested lists of options will be detailed below. Don’t worry. I’ll follow up with some examples.\n\nLike the `%` format method, there is a required order of symbols used in the specifier:\n\n1. Open curly brace “{“\n2. (Optional) Reference keyword (or integer for tuple of inputs)\n3. (Optional) “!” + Conversion Type. Converts the given variable into another type before formatting. Can only convert to strings with “!s” or “!r”.\n4. (Optional) “:” + Format Specifier. See below.\n5. Close curly brace “}”\n\nThe format specifier (item 4 in the list above) follows an additional set of ordering rules, which closely (but not exactly) mimic the `%` format specifiers. These specifiers must follow the given order:\n\n1. Fill Character. Default is “ “ (space)\n2. Alignment character. See table below.\n3. Sign Option. See table below.\n4. Minimum character width\n5. ”,” to specify commas as thousands separators\n6. ”.” followed by number of decimals of precision\n7. Output Type. See table below.\n\nThe following are the available alignment characters that specify how the string is aligned within the given width:\n\nSymbol Output Format Note Python Format Alignment Characters \"<\" Left Aligned Forces left alignment. Default for all classes except numerics. \">\" Right Aligned Forces right alignment. Default for numeric types. \"=\" Padding After Sign Forces padding after the sign, before a number \"^\" Center Align Forces the field to be centered\n\nThe following is a table of output types that can be used with the `format` method. Note: While there are many similarities between this table and the one for the `%` method, not all entries are identical. The default value for each of these depends on the Python class type of the referenced variable (i.e. int, float, string, etc.). If a type is omitted from the specifier, then the default for the referenced object’s class will be used.\n\nSymbol Output Format Note Python Format Output Types \"s\" String Default for strings \"d\" Signed (+/-) Integer Decimal Default for integer types \"f\" Floating Point Decimal \"F\" can also be used \"e\" Floating Point in Scientific Notation (e.g. 1.2e10) The symbol \"E\" outputs a capital \"E\" in output (e.g. 1.2E10) \"g\" General Format Will output a regular floating point, with scientific notation if exponent is less than a given precision (default is 6). \"G\" will output a capital \"E\" in exponents. Default for floats. \"%\" Percents Multiplies number by 100, and output as \"f\" format\n\nIn most cases, the `format` method follows the same convention as the `%` method, but replaces `%` specifiers with `:` and contains all references within curly braces `{}`.\n\nTo practice, let’s use the same examples we used with the `%` method, but switched to the equivalent `format` method.\n\n``````n = 42\nm = -22\ns = \"The secret number is {0}, not {1}\".format(n, m) # Simple positional reference\nprint(s)\n> The secret number is 42, not -22\ns = \"The secret number is {}, not {}\".format(n, m) # Numbers are not needed for ordered input\nprint(s)\n> The secret number is 42, not -22\ns = \"The secret number is {isthis}, not {isnot}\".format(isthis=n, isnot=m) # Reference by name (no dictionary needed)\nprint(s)\n> The secret number is 42, not -22\ns = \"The secret number is {:+}, not {:+}\".format(n, m) # Force use of signs\nprint(s)\n> The secret number is +42, not -22\n\nn = 42.2222222222222\nm = -22.0\ns = \"The secret number is {:07.2f}, not {:07.2f}\".format(n, m) # Pad with 0's, force length of 7, with 2 decimals of precision for floating point\nprint(s)\n> The secret number is 0042.22, not -022.00\ns = \"The secret number is {:.2e}, not {:.2E}\".format(n, m) # Use 2 decimals of precision, in two types of scientific notation\nprint(s)\n> The secret number is 4.22e+01, not -2.20E+01``````\n\nLooking at these examples, you can see why Python decided to switch from the `%` style to the `format` style. The syntax for the `format` statement is practically identical to the syntax for all the Python string operations we discussed at the top of this tutorial. They all follow a format like `[string].operation([arguments])`. See? Once you get familiar with the syntax, you’ll start recognizing patterns and realize Python isn’t so hard after all!\n\nCan't get enough Python?"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7693057,"math_prob":0.88537216,"size":15952,"snap":"2020-45-2020-50","text_gpt3_token_len":3816,"char_repetition_ratio":0.15218209,"word_repetition_ratio":0.13328397,"special_character_ratio":0.26028085,"punctuation_ratio":0.11463495,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9758603,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-20T23:51:25Z\",\"WARC-Record-ID\":\"<urn:uuid:8b45207e-68d7-42e5-bc9c-b56331e9d02f>\",\"Content-Length\":\"66499\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4e3c44d-9202-494a-91c2-5b7a6be54e3f>\",\"WARC-Concurrent-To\":\"<urn:uuid:ab1af48e-198c-4963-90d2-3b78f62b4ad2>\",\"WARC-IP-Address\":\"216.239.38.21\",\"WARC-Target-URI\":\"https://wellsr.com/python/python-string-operations-and-string-formatting/\",\"WARC-Payload-Digest\":\"sha1:W574EP5C6T3UBO5VAGK5LEFRSC7FF6U3\",\"WARC-Block-Digest\":\"sha1:S3YX2N3KTOGRWPENIV4PVJL5INATMA37\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107874340.10_warc_CC-MAIN-20201020221156-20201021011156-00198.warc.gz\"}"} |
https://percent-calc.com/what-is-34-of-181351 | [
"# What is 34% of 181351?\n\nA simple way to calculate percentages of X\n\n34% of 181351 is: 61659.34\n\n## Percentage of - Table for 181351\n\nPercentage ofDifference\n1% of 181351 is 1813.51179537.49\n2% of 181351 is 3627.02177723.98\n3% of 181351 is 5440.53175910.47\n4% of 181351 is 7254.04174096.96\n5% of 181351 is 9067.55172283.45\n6% of 181351 is 10881.06170469.94\n7% of 181351 is 12694.57168656.43\n8% of 181351 is 14508.08166842.92\n9% of 181351 is 16321.59165029.41\n10% of 181351 is 18135.1163215.9\n11% of 181351 is 19948.61161402.39\n12% of 181351 is 21762.12159588.88\n13% of 181351 is 23575.63157775.37\n14% of 181351 is 25389.14155961.86\n15% of 181351 is 27202.65154148.35\n16% of 181351 is 29016.16152334.84\n17% of 181351 is 30829.67150521.33\n18% of 181351 is 32643.18148707.82\n19% of 181351 is 34456.69146894.31\n20% of 181351 is 36270.2145080.8\n21% of 181351 is 38083.71143267.29\n22% of 181351 is 39897.22141453.78\n23% of 181351 is 41710.73139640.27\n24% of 181351 is 43524.24137826.76\n25% of 181351 is 45337.75136013.25\n26% of 181351 is 47151.26134199.74\n27% of 181351 is 48964.77132386.23\n28% of 181351 is 50778.28130572.72\n29% of 181351 is 52591.79128759.21\n30% of 181351 is 54405.3126945.7\n31% of 181351 is 56218.81125132.19\n32% of 181351 is 58032.32123318.68\n33% of 181351 is 59845.83121505.17\n34% of 181351 is 61659.34119691.66\n35% of 181351 is 63472.85117878.15\n36% of 181351 is 65286.36116064.64\n37% of 181351 is 67099.87114251.13\n38% of 181351 is 68913.38112437.62\n39% of 181351 is 70726.89110624.11\n40% of 181351 is 72540.4108810.6\n41% of 181351 is 74353.91106997.09\n42% of 181351 is 76167.42105183.58\n43% of 181351 is 77980.93103370.07\n44% of 181351 is 79794.44101556.56\n45% of 181351 is 81607.9599743.05\n46% of 181351 is 83421.4697929.54\n47% of 181351 is 85234.9796116.03\n48% of 181351 is 87048.4894302.52\n49% of 181351 is 88861.9992489.01\n50% of 181351 is 90675.590675.5\n51% of 181351 is 92489.0188861.99\n52% of 181351 is 94302.5287048.48\n53% of 181351 is 96116.0385234.97\n54% of 181351 is 97929.5483421.46\n55% of 181351 is 99743.0581607.95\n56% of 181351 is 101556.5679794.44\n57% of 181351 is 103370.0777980.93\n58% of 181351 is 105183.5876167.42\n59% of 181351 is 106997.0974353.91\n60% of 181351 is 108810.672540.4\n61% of 181351 is 110624.1170726.89\n62% of 181351 is 112437.6268913.38\n63% of 181351 is 114251.1367099.87\n64% of 181351 is 116064.6465286.36\n65% of 181351 is 117878.1563472.85\n66% of 181351 is 119691.6661659.34\n67% of 181351 is 121505.1759845.83\n68% of 181351 is 123318.6858032.32\n69% of 181351 is 125132.1956218.81\n70% of 181351 is 126945.754405.3\n71% of 181351 is 128759.2152591.79\n72% of 181351 is 130572.7250778.28\n73% of 181351 is 132386.2348964.77\n74% of 181351 is 134199.7447151.26\n75% of 181351 is 136013.2545337.75\n76% of 181351 is 137826.7643524.24\n77% of 181351 is 139640.2741710.73\n78% of 181351 is 141453.7839897.22\n79% of 181351 is 143267.2938083.71\n80% of 181351 is 145080.836270.2\n81% of 181351 is 146894.3134456.69\n82% of 181351 is 148707.8232643.18\n83% of 181351 is 150521.3330829.67\n84% of 181351 is 152334.8429016.16\n85% of 181351 is 154148.3527202.65\n86% of 181351 is 155961.8625389.14\n87% of 181351 is 157775.3723575.63\n88% of 181351 is 159588.8821762.12\n89% of 181351 is 161402.3919948.61\n90% of 181351 is 163215.918135.1\n91% of 181351 is 165029.4116321.59\n92% of 181351 is 166842.9214508.08\n93% of 181351 is 168656.4312694.57\n94% of 181351 is 170469.9410881.06\n95% of 181351 is 172283.459067.55\n96% of 181351 is 174096.967254.04\n97% of 181351 is 175910.475440.53\n98% of 181351 is 177723.983627.02\n99% of 181351 is 179537.491813.51\n100% of 181351 is 1813510\n\n## How calculate 34% of 181351\n\nIn the store, the product costs \\$181351, you were given a discount 34% and you want to understand how much you saved.\n\nSolution:\n\nAmount saved = Product price * Percentage Discount/ 100\n\nAmount saved = (34 * 181351) / 100\n\nAmount saved = \\$61659.34\n\nSimply put, when you buy an item for \\$181351 and the discount is 34%, you will pay \\$119691.66 and save \\$61659.34."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.84965545,"math_prob":0.9659492,"size":4170,"snap":"2022-40-2023-06","text_gpt3_token_len":2112,"char_repetition_ratio":0.3348536,"word_repetition_ratio":0.0,"special_character_ratio":0.83884895,"punctuation_ratio":0.19277108,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99995375,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-01T02:11:58Z\",\"WARC-Record-ID\":\"<urn:uuid:4dad92cf-dbd1-4a32-ae03-841bf5fbb58f>\",\"Content-Length\":\"31530\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:af4fae5a-ca75-4611-a725-ffcdda1c18c5>\",\"WARC-Concurrent-To\":\"<urn:uuid:92c2cc89-5edc-4030-bb16-b509ae5f312e>\",\"WARC-IP-Address\":\"172.67.215.178\",\"WARC-Target-URI\":\"https://percent-calc.com/what-is-34-of-181351\",\"WARC-Payload-Digest\":\"sha1:ZJMRJ32CWEI7QNDP2OZPBRNSQZKB4OGK\",\"WARC-Block-Digest\":\"sha1:HB3DZQKVIEWFZY3IP36LBMUH6KQ5RINW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499899.9_warc_CC-MAIN-20230201013650-20230201043650-00712.warc.gz\"}"} |
https://tex.stackexchange.com/questions/452597/top-alignment-using-longtable-and-multicolumn | [
"# Top alignment using longtable and multicolumn\n\nIn a largetable, I want to obtain the following:\n\n• All cells vertically aligned to the top\n• Left column is horizontally centred, Right column is flushed left\nTo be clear in the picture below:\n• Alpha should be aligned with One\n• Austria should be aligned with 1 I thought that using p instead of m should do the trick but obviously not, though there are many questions about alignment, I did not find the answer to this specific problem.\n\nObviously, long table, multicolumn and the small tabular are used here just to have a working example close to what is my actual document.",
null,
"\\documentclass[a4paper]{article}\n\\usepackage{longtable}\n\\usepackage{array}\n\\newcolumntype{C}{>{\\centering\\let\\newline\\\\\\arraybackslash\\hspace{0pt}}m{#1}}\n\\newcolumntype{L}{>{\\flushleft\\let\\newline\\\\\\arraybackslash\\hspace{0pt}}p{#1}}\n\\begin{document}\n\\begin{longtable}{| C{1cm} | C{1cm} | L{3cm} | L{3cm} |}\n\\hline\n\\multicolumn{2}{|C{2cm}|}{\n\\begin{tabular}[t]{c}\nAlpha\\\\\nBeta\\\\\nGamma\\\\\nDelta\n\\end{tabular}\n}&\n\\multicolumn{2}{L{6cm}|}{\n\\begin{tabular}[t]{c}\nOne\\\\\nTwo\n\\end{tabular}\n}\n\\\\\\hline\n\\multicolumn{2}{|C{2cm}|}{\n\\begin{tabular}[t]{c}\nAustria\\\\\nBelgium\n\\end{tabular}\n}&\n\\multicolumn{2}{L{6cm}|}{\n\\begin{tabular}[t]{c}\n1\\\\\n2\\\\\n3\n\\end{tabular}\n}\n\\\\\\hline\n\\end{longtable}\n\\end{document}\n\n• flushleft is never inteneded to be used in command form it is the \\begin{flushleft} environment and like center it adds vertical space (as you see) the analogue of \\centering is \\raggedright. also you presumably want p not m columns if you want top alignment. – David Carlisle Sep 26 '18 at 15:23\n\nThe problem is that you use \\flushleft instead of \\raggedright. \\flushleft is the begin of the environment flushleft which uses the \\trivlist macro (which is used internally in a lot of places in LaTeX), which happens to introduce some vertical offset.\n\nSo to solve your main issue, just use \\raggedright. The following does fix some more issues and implements a \\mulcol macro, which is \\multicolumn with added code to account the \\tabcolseps in the skipped columns and the vertical rules (adding it to the width). It assumes that next to every included column there are 2\\tabcolsep of space (which is the default) plus a vertical rule. It also assumes a specific pattern in the second argument, being any tokens then a group specifying a width followed by any more tokens.\n\nThe additional issues I fixed are:\n\n• suppress white spaces around the columns in the sub-tabulars using @{}c@{} or similar.\n\n• using p type column for both L and C (this is actually required to get your vertical alignment right)\n\n• use full space available in the columns put together using \\multicolumn (this is done with \\mulcol here, in general you should keep in mind that you also get the space of the stuff in between the columns). This has no big effect on the left aligned columns (you could only see it if you used the full width for the contents), but the centred ones aren't centred compared to the other columns if you forget about this.\n\nComplete code:\n\n\\documentclass[a4paper]{article}\n\\usepackage{longtable}\n\\usepackage{array}\n\\newcolumntype{C}{>{\\centering\\let\\newline\\\\\\arraybackslash}p{#1}}\n\\newcolumntype{L}{>{\\raggedright\\let\\newline\\\\\\arraybackslash}p{#1}}\n\n\\newcommand\\mulcol\n{%\n\\mulcolA{#1}#2\\endmulcolsecarg\n}\n\\newcommand\\mulcolA{}\n\\long\\def\\mulcolA#1#2#{\\mulcolB{#1}{#2}}\n\\newcommand\\mulcolB{}\n\\long\\def\\mulcolB#1#2#3#4\\endmulcolsecarg\n{%\n\\multicolumn\n{#1}\n{%\n#2%\n{%\n\\dimexpr\n#3%\n+#1\\tabcolsep+#1\\tabcolsep-2\\tabcolsep\n+#1\\arrayrulewidth-\\arrayrulewidth\n\\relax\n}%\n#4%\n}%\n}\n\\begin{document}\n\\begin{longtable}{| C{1cm} | C{1cm} | L{3cm} | L{3cm} |}\n\\hline\n\\mulcol{2}{|C{2cm}|}{\n\\begin{tabular}[t]{@{}c@{}}\nAlpha\\\\\nBeta\\\\\nGamma\\\\\nDelta\n\\end{tabular}\n}&\n\\mulcol{2}{L{6cm}|}{\n\\begin{tabular}[t]{@{}c@{}}\nOne\\\\\nTwo\n\\end{tabular}\n}\n\\\\\\hline\n\\mulcol{2}{|C{2cm}|}{\n\\begin{tabular}[t]{@{}c@{}}\nAustria\\\\\nBelgium\n\\end{tabular}\n}&\n\\mulcol{2}{L{6cm}|}{\n\\begin{tabular}[t]{@{}c@{}}\n1\\\\\n2\\\\\n3\n\\end{tabular}\n}\n\\\\\\hline\n\\end{longtable}\n\\end{document}",
null,
"• instead nesting tabular environments inside multicolumn cells i would rather use \\makecell macro from the package of the same name (it is based on tabular environment, but for its use the code is shorter).\n• since your longtable has defined four columns i suspect that the all of them is somewhere used (but not shown in your mwe):\n\nconsidering above mentioned your table can be written as follows:\n\n\\documentclass[a4paper]{article}\n\\usepackage{array, longtable, makecell}\n\\newcolumntype{C}{>{\\centering\\arraybackslash}p{#1}}\n\\newcolumntype{L}{>{\\raggedright\\arraybackslash}p{#1}}\n\n\\begin{document}\n\\begin{longtable}{| C{1cm} | C{1cm} | L{3cm} | L{3cm} |}\n\\hline\n\\multicolumn{2}{|c|}{\\makecell[tc]{\nAlpha\\\\\nBeta\\\\\nGamma\\\\\nDelta}} &\n\\multicolumn{2}{l|}{\\makecell[tl]{\nOne\\\\\nTwo}} \\\\\n\\hline\n\\multicolumn{2}{|c|}{\\makecell[tc]{\nAustria\\\\\nBelgium}} &\n\\multicolumn{2}{l|}{\\makecell[tl]{\n1\\\\\n2\\\\\n3}} \\\\\n\\hline\n1 & 2 & 3 & 4 \\\\\n\\hline\n\\end{longtable}\n\\end{document}\n\n\nwhich gives:",
null,
"spurious vertical align of cells contents is removed on the same way as Skillmon do in his answer.\n\n• \\makecell is in its core just a tabular with some code around it. Also your first column (so \\multicolumn{2}{|C{2cm}|}) is not horizontally centred as you left out the two \\tabcolsep and the vertical rule in between those two columns. Also in your picture the contents of the first column seem to wander rightwards. This wouldn't have happened if you used \\let\\newline\\\\ in the column definitions. – Skillmon likes topanswers.xyz Sep 26 '18 at 14:16"
]
| [
null,
"https://i.stack.imgur.com/ZWddN.png",
null,
"https://i.stack.imgur.com/kxFQI.png",
null,
"https://i.stack.imgur.com/maieX.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6936612,"math_prob":0.91245216,"size":1565,"snap":"2020-34-2020-40","text_gpt3_token_len":513,"char_repetition_ratio":0.12107623,"word_repetition_ratio":0.0,"special_character_ratio":0.28242812,"punctuation_ratio":0.04942966,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97253007,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-29T14:30:54Z\",\"WARC-Record-ID\":\"<urn:uuid:1572b179-32fb-4ec6-92d9-7cbc0f093435>\",\"Content-Length\":\"164664\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a2c1b631-e02d-4004-b884-6766618bef76>\",\"WARC-Concurrent-To\":\"<urn:uuid:8e56a648-6cb6-4c40-81ab-1670a7ddbfd5>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://tex.stackexchange.com/questions/452597/top-alignment-using-longtable-and-multicolumn\",\"WARC-Payload-Digest\":\"sha1:R7JXOUKT474K4AEA2JNCFK4DYDKCRP7U\",\"WARC-Block-Digest\":\"sha1:YRV7EJPE4NRSIRI7CA54FKKJZTWMBNMA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600401643509.96_warc_CC-MAIN-20200929123413-20200929153413-00304.warc.gz\"}"} |
https://s-space.snu.ac.kr/handle/10371/131272 | [
"## Browse\n\nComparison of Robustness between Linear Regression and Logistic Regression in Dichotomous Criterion\n\nCited 0 time in Web of Science Cited 0 time in Scopus\nAuthors\n김용대\nMajor\n자연과학대학 통계학과\nIssue Date\n2013-02\nPublisher\n서울대학교 대학원\nDescription\n학위논문 (석사)-- 서울대학교 대학원 : 통계학과, 2013. 2. 김용대.\nAbstract\nAs \"Big data\" has arisen, simplicity and robustness for analysis have been emphasized. Therefore, we focus on the model which is relatively simpler and more robustness against fluctuation of data.\nAccurate classifcation is one of the most important things to decide a model for decision making in practice. Logistic model is known as an accurate model to estimate the probabilities of dependent categories. However, focusing on the goal of classifcation in practical use, we assume that linear regression can be more efficient in using practical decision making. We start this study to identify the linear regression analysis is better in robustness than the logistic regression analysis.\nIn simulation, by increasing the number of independent variables, we observe the performances of each method. We try diverse data generated by different models to see the robustness of linear regression analysis. Based on the two conjectures, we analyze the prediction errors of each method. By comparing prediction errors, we conclude the linear regression analysis is the most robust method in our simulation. However, because wee only simulate the equal proportioned two classes, the further study is needed.\nLanguage\nEnglish\nURI\nhttps://hdl.handle.net/10371/131272\nFiles in This Item:\nAppears in Collections:\nCollege of Natural Sciences (자연과학대학)Dept. of Statistics (통계학과)Theses (Master's Degree_통계학과)"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8856306,"math_prob":0.8185936,"size":1901,"snap":"2022-27-2022-33","text_gpt3_token_len":505,"char_repetition_ratio":0.110173956,"word_repetition_ratio":0.006779661,"special_character_ratio":0.20462914,"punctuation_ratio":0.10443038,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9880894,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-05T19:53:28Z\",\"WARC-Record-ID\":\"<urn:uuid:9b3cfed2-9945-4428-8d54-a39a7be404bd>\",\"Content-Length\":\"21197\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d0863299-d113-4ef3-a4af-be994c34f32c>\",\"WARC-Concurrent-To\":\"<urn:uuid:d138a38b-00f8-4f0c-8fbd-75eeee02cc14>\",\"WARC-IP-Address\":\"147.46.181.99\",\"WARC-Target-URI\":\"https://s-space.snu.ac.kr/handle/10371/131272\",\"WARC-Payload-Digest\":\"sha1:U6JVMCD7TZOSH6Q4YKSZYIJPLXXZLDSK\",\"WARC-Block-Digest\":\"sha1:CDH4X4HV4E4AVVBI3SFWKNSJWD6PCDX3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104597905.85_warc_CC-MAIN-20220705174927-20220705204927-00388.warc.gz\"}"} |
https://www.lawdepartmentmanagementblog.com/a_median_of_the/ | [
"Published on:\n\n# A median of the minds: to be above average, know what mean means (and some other stats)\n\nBenchmark metrics typically come in three forms: averages, medians and weighted averages. Think of 11 law departments each pooling data on their percentage of certified paralegals. For the average, total the 11 percentages and divide by 11.\n\nFor the median, rank the 11 figures from highest to lowest and pick the middle one (or average the two middle ones if there is an even number of figures).\n\nFor the weighted average, add up all the paralegals of the 11 departments and all the certified paralegals and divide the certified total by the paralegal total.\n\nA variation sometimes seen, which avoids the anomalous outliers that can distort averages, yet draws on more of the data than the median, might be called the average of the middle. After ranking the figures, drop the top and bottom quartile (25%) and calculate the average of the middle fifty percent. So, roughly speaking, drop the top two percentages and the bottom two percentages and average the middle seven.\n\nOne other statistical descriptor is common. The range comes from subtracting the highest and lowest percentage.\n\nPosted in:\nPublished on:\nUpdated:"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8859395,"math_prob":0.9170747,"size":1083,"snap":"2023-40-2023-50","text_gpt3_token_len":223,"char_repetition_ratio":0.16126043,"word_repetition_ratio":0.0,"special_character_ratio":0.19944598,"punctuation_ratio":0.105,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9777942,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-30T12:23:11Z\",\"WARC-Record-ID\":\"<urn:uuid:beddf4df-b9fb-4bb9-afb2-d1c42f40fcc3>\",\"Content-Length\":\"52209\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b67164e3-f82e-41a3-9e82-01da1800cc44>\",\"WARC-Concurrent-To\":\"<urn:uuid:350eccdc-af0a-4474-9147-d2e42565204f>\",\"WARC-IP-Address\":\"3.162.103.8\",\"WARC-Target-URI\":\"https://www.lawdepartmentmanagementblog.com/a_median_of_the/\",\"WARC-Payload-Digest\":\"sha1:JBBL2PBHT3VXP2SFEZQQYJI3YNSHTVJC\",\"WARC-Block-Digest\":\"sha1:6GK5RH2ERG2KHQXH44LUBZUXLXHS3DD6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510676.40_warc_CC-MAIN-20230930113949-20230930143949-00769.warc.gz\"}"} |
https://collaborate.princeton.edu/en/publications/the-ugc-hardness-threshold-of-the-lsubpsub-grothendieck-problem | [
"# The UGC hardness threshold of the Lp grothendieck problem\n\nGuy Kindler, Assaf Naor, Gideon Schechtman\n\nResearch output: Contribution to journalArticle\n\n15 Scopus citations\n\n### Abstract\n\nFor p ≥ 2 we consider the problem of, given an n x n matrix A = (a ij) whose diagonal entries vanish, approximating in polynomial time the number Optp(A):= max { σi, j=1n aijxixj: (x1,....,xn) ∈ ℝn ∧ (σi=1n|x i|p)1/p≤1}.When p = 2 this is simply the problem of computing the maximum eigenvalue of A, whereas for p = ∞ (actually it suffices to take p≈ log n) it is the Grothendieck problem on the complete graph, which was shown to have a 0(log n) approximation algorithm in Nemirovski et al. [Nemirovski, A., C. Roos, T. Terlaky. 1999. On maximization of quadratic form over intersection of ellipsoids with common center. Math. Program. Ser. A 86(3) 463-473], Megretski [Megretski, A. 2001. Relaxations of quadratic programs in operator theory and system analysis. Systems, Approximation, Singular Integral Operators, and Related Topics (Bordeaux, 2000), Vol. 129. Operator Theory Advances and Applications. Birkhäuser, Basel, 365-392], Charikar and Wirth [Charikar, M., A. Wirth. 2004. Maximizing quadratic programs: Extending Grothendieck's inequality. Proc. 45th Annual Sympos. Foundations Comput. Sci., IEEE Computer Society, 54-60] and was used in the work of Charikar and Wirth noted above, to design the best known algorithm for the problem of computing the maximum correlation in correlation clustering. Thus the problem of approximating Optp(A) interpolates between the spectral (p = 2) case and the correlation clustering (p =∞ ) case. From a physics point of view this problem corresponds to computing the ground states of spin glasses in a hard-wall potential well. We design a polynomial time algorithm which, given p ≥ 2 and an n x n matrix A = (aij) with zeros on the diagonal, computes Optp(A) up to a factor p/e + 30logp. On the other hand, assuming the unique games conjecture (UGC) we show that it is NP-hard to approximate Optp(A) up to a factor smaller than p/e + 14. Hence as p --∞ the UGC-hardness threshold for computing Optp(A) is exactly (p/e)(1 + o(1)).\n\nOriginal language English (US) 267-283 17 Mathematics of Operations Research 35 2 https://doi.org/10.1287/moor.1090.0425 Published - May 1 2010 Yes\n\n### All Science Journal Classification (ASJC) codes\n\n• Mathematics(all)\n• Computer Science Applications\n• Management Science and Operations Research\n\n### Keywords\n\n• Approximation algorithms"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.787688,"math_prob":0.9044324,"size":2435,"snap":"2020-45-2020-50","text_gpt3_token_len":661,"char_repetition_ratio":0.100781575,"word_repetition_ratio":0.03133159,"special_character_ratio":0.26283368,"punctuation_ratio":0.14565217,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9937996,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-19T16:00:41Z\",\"WARC-Record-ID\":\"<urn:uuid:e754beea-6d24-4ff0-8345-54327403c228>\",\"Content-Length\":\"48826\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2d9f5fa4-dc1f-4944-81d8-7f178275fbbe>\",\"WARC-Concurrent-To\":\"<urn:uuid:0ab72b82-189a-4a93-9f3c-5f5f3efa65f3>\",\"WARC-IP-Address\":\"18.210.30.88\",\"WARC-Target-URI\":\"https://collaborate.princeton.edu/en/publications/the-ugc-hardness-threshold-of-the-lsubpsub-grothendieck-problem\",\"WARC-Payload-Digest\":\"sha1:AGZJ5HNO5CYXHQ2G27JZWAVEOFJ57NI2\",\"WARC-Block-Digest\":\"sha1:DKQWSE5S6N2HKVH6YF2BK2WHYM2UMEJ4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107863364.0_warc_CC-MAIN-20201019145901-20201019175901-00170.warc.gz\"}"} |
https://miku86.com/js-ds-queue-dequeue/ | [
"# JavaScript Data Structures: Queue: Dequeue\n\n## Intro\n\nLast time, we learned to enqueue a node to the end of the Queue.\n\nToday, we learn how to dequeue / remove a new node from the start of the Queue.\n\n## Starter Code ▶️\n\n``````class Node {\nconstructor(value) {\nthis.value = value;\nthis.next = null;\n}\n}\n\nclass Queue {\nconstructor() {\nthis.length = 0;\nthis.start = null;\nthis.end = null;\n}\n\nenqueue(value) {\nconst newNode = new Node(value);\n\nif (!this.length) {\nthis.start = newNode;\nthis.end = newNode;\n} else {\nthis.end.next = newNode;\nthis.end = newNode;\n}\n\nthis.length += 1;\nreturn newNode;\n}\n}\n``````\n\n## Thoughts 💭\n\nFirst, we should think about the constraints and possibilities:\n\nIf the Queue is empty:\n\n• we can't remove a node\n\nIf the Queue has one node:\n\n• set the current start as the node to remove\n• set the node after the start as the new start\n• set the next node of the node to remove to null\n• set the end to null\n• decrease the queue's length by 1\n• return the node to remove\n\nAll remaining cases:\n\n• set the current start as the node to remove\n• set the node after the start as the new start\n• set the next node of the node to remove to null\n• decrease the queue's length by 1\n• return the node to remove\n\nDifferences:\n\n• we only have to change the end of the queue when we start with one node, because then there is no end left, because the queue will be empty\n\n## Example\n\n``````// current queue:\nA (start) ==> B (end)\n\n// desired queue:\nB (start, end)\n``````\n\nSteps:\n\n``````// current queue:\nA (start) ==> B (end)\n\n// set the node after the start as the new start\nA ==> B (start, end)\n\n// set the next node of the node to remove to null\nA B (start, end)\n\n// desired queue:\nB (start, end)\n``````\n\n## Implementation 📝\n\n``````class Node {\nconstructor(value) {\nthis.value = value;\nthis.next = null;\n}\n}\n\nclass Queue {\nconstructor() {\nthis.length = 0;\nthis.start = null;\nthis.end = null;\n}\n\nenqueue(value) {\nconst newNode = new Node(value);\n\nif (!this.length) {\nthis.start = newNode;\nthis.end = newNode;\n} else {\nthis.end.next = newNode;\nthis.end = newNode;\n}\n\nthis.length += 1;\nreturn newNode;\n}\n\ndequeue() {\nif (!this.length) {\nreturn null;\n} else {\n// set the current start as the node to remove\nconst nodeToRemove = this.start;\n\n// set the node after the start as the new start\nthis.start = this.start.next;\n\n// set the next node of the node to remove to null\nnodeToRemove.next = null;\n\n// set the end to null, if the queue will be empty after removing\nif (this.length === 1) {\nthis.end = null;\n}\n\n// decrease the queue's length by 1\nthis.length -= 1;\n\n// return the node to remove\nreturn nodeToRemove;\n}\n}\n}\n``````\n\n## Result\n\nLet's have a look how to use the `dequeue` method and its results.\n\n``````const newQueue = new Queue();\nnewQueue.enqueue(\"new A\");\nnewQueue.enqueue(\"new B\");\n\n// queue with 2 nodes\nconsole.log(newQueue);\n// Queue {\n// length: 2,\n// start: Node { value: 'new A', next: Node { value: 'new B', next: null } },\n// end: Node { value: 'new B', next: null }\n// }\n\n// remove the start, \"new A\"\nconsole.log(newQueue.dequeue());\n// Node { value: 'new A', next: null }\n\n// 1 node should be left, \"new B\"\nconsole.log(newQueue);\n// Queue {\n// length: 1,\n// start: Node { value: 'new B', next: null },\n// end: Node { value: 'new B', next: null }\n// }\n\n// remove the start, \"new B\"\nconsole.log(newQueue.dequeue());\n// Node { value: 'new B', next: null }\n\n// queue should be empty\nconsole.log(newQueue);\n// Queue { length: 0, start: null, end: null }\n``````\n\n## Next Part ➡️\n\nWe will do a small recap of our Queue.\n\nDon't miss interesting stuff, subscribe!\n\n## Questions ❔\n\n• If we would implement the Queue by using an Array, how would we dequeue the start node?"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.65483004,"math_prob":0.8491236,"size":3619,"snap":"2021-43-2021-49","text_gpt3_token_len":976,"char_repetition_ratio":0.18063624,"word_repetition_ratio":0.44837758,"special_character_ratio":0.30947775,"punctuation_ratio":0.20505992,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99475265,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-09T12:48:14Z\",\"WARC-Record-ID\":\"<urn:uuid:9574bac8-6bcc-412a-a577-9537868f565c>\",\"Content-Length\":\"8411\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:99fc0611-3f5b-4d7b-870e-a7bdabae1389>\",\"WARC-Concurrent-To\":\"<urn:uuid:8521bb3d-8e0f-4add-9d80-7eea9d354467>\",\"WARC-IP-Address\":\"35.185.44.232\",\"WARC-Target-URI\":\"https://miku86.com/js-ds-queue-dequeue/\",\"WARC-Payload-Digest\":\"sha1:KML2RXT3L6KI7REJNNV747VDRQRKBPDM\",\"WARC-Block-Digest\":\"sha1:Y4SJTSE34KOPWKSZ43PTWBANMPPPQLD5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964364169.99_warc_CC-MAIN-20211209122503-20211209152503-00221.warc.gz\"}"} |
https://amsi.org.au/ESA_Senior_Years/SeniorTopic4/4i/4i_5errors_3.html | [
"## Errors in hypothesis testing\n\n### Large $P$-values do not prove the null hypothesis\n\n#### 50 g chocolate bars\n\nA manufacturer wishes to claim that the average weight of chocolate bars is 50 grams. In order to make a check, a random sample of 40 bars is taken and weighed; the mean is 49.5 g, and the standard deviation is 2.5 g. A test of the null hypothesis that $\\mu$, the true mean weight, is 50 g is carried out. The $P$-value is 0.21. How can we interpret this $P$-value?\n\nIs the manufacturer justified in claiming that the large $P$-value proves that the true mean weight is 50 g? Clearly not, but large $P$-values are sometimes interpreted as providing 'proof' that the null hypothesis is correct or true. The data observed are consistent with the null hypothesis, $\\mu = 50 g$, but the data are also consistent with other values of the population parameter. If, for example, the manufacturer had tested the null hypothesis that the true mean weight was 49.8, the $P$-value is 0.45. If the null hypothesis was that the true mean weight was 50.1 g, the $P$-value is 0.13. These are also relatively large $P$-values, and it would be illogical to claim that there was 'proof' that these hypotheses were also true.\n\nAgain, there is value of interpreting the $P$-value with the confidence interval; the 95% confidence interval for the true mean weight was 48.7 g to 50.3 g. The null hypothesis of interest, $\\mu = 50$ g is just one of the plausible values for the true mean that is included in the confidence interval.\n\nNext page - Errors in hypothesis testing - $P$-values do not measure the importance of a result"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.94530815,"math_prob":0.99425864,"size":1628,"snap":"2020-10-2020-16","text_gpt3_token_len":404,"char_repetition_ratio":0.17795567,"word_repetition_ratio":0.021505376,"special_character_ratio":0.26781327,"punctuation_ratio":0.11309524,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9993111,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-24T06:25:36Z\",\"WARC-Record-ID\":\"<urn:uuid:c02a4389-b698-4b5f-94a1-249061c748f6>\",\"Content-Length\":\"4129\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:58c39b18-6fe8-42b9-8052-f89a48f38273>\",\"WARC-Concurrent-To\":\"<urn:uuid:4dece36b-5b0c-4d49-8f8d-9a7931c93271>\",\"WARC-IP-Address\":\"101.0.91.74\",\"WARC-Target-URI\":\"https://amsi.org.au/ESA_Senior_Years/SeniorTopic4/4i/4i_5errors_3.html\",\"WARC-Payload-Digest\":\"sha1:WBTGR2DB7SAVYE3475MYCTMJFKCIFPTX\",\"WARC-Block-Digest\":\"sha1:HLI5GA5VPUGTZF57PVPXQFBXPZQD3PSA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145897.19_warc_CC-MAIN-20200224040929-20200224070929-00456.warc.gz\"}"} |
https://stackoverflow.com/questions/5453336/plot-correlation-matrix-into-a-graph%22 | [
"# Plot correlation matrix into a graph\n\nI have a matrix with some correlation values. Now I want to plot that in a graph that looks more or less like that:",
null,
"How can I achieve that?\n\nQuick, dirty, and in the ballpark:\n\n``````library(lattice)\n\n#Build the horizontal and vertical axis information\nhor <- c(\"214\", \"215\", \"216\", \"224\", \"211\", \"212\", \"213\", \"223\", \"226\", \"225\")\nver <- paste(\"DM1-\", hor, sep=\"\")\n\n#Build the fake correlation matrix\nnrowcol <- length(ver)\ncor <- matrix(runif(nrowcol*nrowcol, min=0.4), nrow=nrowcol, ncol=nrowcol, dimnames = list(hor, ver))\nfor (i in 1:nrowcol) cor[i,i] = 1\n\n#Build the plot\nrgb.palette <- colorRampPalette(c(\"blue\", \"yellow\"), space = \"rgb\")\nlevelplot(cor, main=\"stage 12-14 array correlation matrix\", xlab=\"\", ylab=\"\", col.regions=rgb.palette(120), cuts=100, at=seq(0,1,0.01))\n``````",
null,
"• It looks very similar to example from OP (fonts, colors, layout). Looks like original was created with lattice too. Great detailed answer, +1. – Marek Mar 28 '11 at 5:16\n• Thank you for the answer. Many people are used to correlation plots in which the diagonal containing 1-s runs from the top left to the bottom right square (see the example figure in the question), rather than from the bottom left to the top right square, as in your solution. Here's how to fix this problem: cor_reversed <- apply(cor, 2, rev); levelplot(t(cor_reversed),...) – skip Jan 11 '16 at 14:47\n• @bill_080 why copy-pasting your code wont print the correlation matrix? – Pavlos Panteliadis Jan 9 '17 at 22:09\n\nRather \"less\" look like, but worth checking (as giving more visual information):\n\nCorrelation matrix ellipses:",
null,
"Correlation matrix circles:",
null,
"Please find more examples in the corrplot vignette referenced by @assylias below.\n\n• The site seems to be defunct. Do you have any code or package description for the first plot? – bright-star Mar 25 '14 at 11:13\n• @TrevorAlexander: As far as I remember, the first plot was created by `ellipse:plotcorr`. – daroczig Mar 25 '14 at 12:57\n• I've submitted an edit for link 1 to: improving-visualisation.org/vis/id=250 which provides the same image. – russellpierce May 30 '14 at 14:33\n• Thank you @rpierce, although I see only the image there without the R source. What do I miss here? – daroczig May 30 '14 at 18:45\n• – assylias Sep 7 '15 at 12:50\n\nVery easy with lattice::levelplot:\n\n``````z <- cor(mtcars)\nrequire(lattice)\nlevelplot(z)\n``````",
null,
"The ggplot2 library can handle this with `geom_tile()`. It looks like there may have been some rescaling done in that plot above as there aren't any negative correlations, so take that into consideration with your data. Using the `mtcars` dataset:\n\n``````library(ggplot2)\nlibrary(reshape)\n\nz <- cor(mtcars)\nz.m <- melt(z)\n\nggplot(z.m, aes(X1, X2, fill = value)) + geom_tile() +\nscale_fill_gradient(low = \"blue\", high = \"yellow\")\n``````",
null,
"EDIT:\n\n``````ggplot(z.m, aes(X1, X2, fill = value)) + geom_tile() +\nscale_fill_gradient2(low = \"blue\", high = \"yellow\")\n``````",
null,
"allows to specify the colour of the midpoint and it defaults to white so may be a nice adjustment here. Other options can be found on the ggplot website here and here.\n\n• nice (+1)! Though I would add a manual-break scale (e.g: `c(-1, -0.6, -0.3, 0, 0.3, 0.6, 1)`) with `\"white\"` in the middle to let the colors reflect the symmetry of the correlation efficient. – daroczig Mar 28 '11 at 0:33\n• @Daroczig - Good point. It looks like `scale_fill_gradient2()` achieves the functionality you describe automatically. I didn't know that existed. – Chase Mar 28 '11 at 1:52\n• adding to this: `p <- ggplot(.....) + ... + ....; library(plotly); ggplotly(p)` will make it interactive – schlusie Jul 18 '16 at 15:47\n• To make the diagonal 1's go from top left to bottom right, reversal of factor levels is required for `X1` using: `z.m\\$X1 <- factor(z.m\\$X1, levels = rev(levels( z.m\\$X1 )))` – arun Nov 4 '16 at 4:19\n\nUse the corrplot package:\n\n``````library(corrplot)\ndata(mtcars)\nM <- cor(mtcars)\n## different color series\ncol1 <- colorRampPalette(c(\"#7F0000\",\"red\",\"#FF7F00\",\"yellow\",\"white\",\n\"cyan\", \"#007FFF\", \"blue\",\"#00007F\"))\ncol2 <- colorRampPalette(c(\"#67001F\", \"#B2182B\", \"#D6604D\", \"#F4A582\", \"#FDDBC7\",\n\"#FFFFFF\", \"#D1E5F0\", \"#92C5DE\", \"#4393C3\", \"#2166AC\", \"#053061\"))\ncol3 <- colorRampPalette(c(\"red\", \"white\", \"blue\"))\ncol4 <- colorRampPalette(c(\"#7F0000\",\"red\",\"#FF7F00\",\"yellow\",\"#7FFF7F\",\n\"cyan\", \"#007FFF\", \"blue\",\"#00007F\"))\nwb <- c(\"white\",\"black\")\n\n## different color scale and methods to display corr-matrix\ncorrplot(M, method=\"number\")\ncorrplot(M)\ncorrplot(M, order =\"AOE\")\n\ncorrplot(M, order=\"AOE\", col=col2(200))\n\ncorrplot(M, order=\"AOE\", col=col3(100))\ncorrplot(M, order=\"AOE\", col=col3(10))\n\ncorrplot(M, method=\"color\", col=col1(20), cl.length=21,order = \"AOE\", addCoef.col=\"grey\")\n\nif(TRUE){\n\ncorrplot(M, method=\"square\", col=col2(200),order = \"AOE\")\n\ncorrplot(M, method=\"ellipse\", col=col1(200),order = \"AOE\")\n\ncorrplot(M, method=\"pie\", order = \"AOE\")\n\n## col=wb\ncorrplot(M, col = wb, order=\"AOE\", outline=TRUE, addcolorlabel=\"no\")\n## like Chinese wiqi, suit for either on screen or white-black print.\ncorrplot(M, col = wb, bg=\"gold2\", order=\"AOE\", addcolorlabel=\"no\")\n}\n``````\n\nFor example:",
null,
"Rather elegant IMO\n\nThat type of graph is called a \"heat map\" among other terms. Once you've got your correlation matrix, plot it using one of the various tutorials out there.\n\n• I'm not sure if calling it a 'heatmap' is a fairly modern invention. It seems to make sense if you are trying to show 'hotspots' by using a red-orange-yellow colour scheme, but in general its just an image plot, or a matrix plot, or a raster plot. I'll be interested to find the oldest reference that calls it a 'heatmap'. tldr; \"[citation needed]\" – Spacedman Mar 28 '11 at 7:04\n• I think you're right that heat map isn't necessarily the earliest name for it. Wikipedia lists a 1957 paper, but I checked that paper and the term \"heat map\" appears nowhere in it (nor do the graphics look exactly like the current form). – Ari B. Friedman Mar 28 '11 at 11:48\n\nI have been working on something similar to the visualization posted by @daroczig, with code posted by @Ulrik using the `plotcorr()` function of the `ellipse` package. I like the use of ellipses to represent correlations, and the use of colors to represent negative and positive correlation. However, I wanted the eye-catching colors to stand out for correlations close to 1 and -1, not for those close to 0.\n\nI created an alternative in which white ellipses are overlaid on colored circles. Each white ellipse is sized so that the proportion of the colored circle visible behind it is equal to the squared correlation. When the correlation is near 1 and -1, the white ellipse is small, and much of the colored circle is visible. When the correlation is near 0, the white ellipse is large, and little of the colored circle is visible.\n\nThe function, `plotcor()`, is available at https://github.com/JVAdams/jvamisc/blob/master/R/plotcor.r.\n\nAn example of the resulting plot using the `mtcars` dataset is shown below.\n\n``````library(plotrix)\nlibrary(seriation)\nlibrary(MASS)\nplotcor(cor(mtcars), mar=c(0.1, 4, 4, 0.1))\n``````",
null,
"I realise that it's been a while, but new readers might be interested in `rplot()` from the `corrr` package (https://cran.rstudio.com/web/packages/corrr/index.html), which can produce the sorts of plots @daroczig mentions, but design for a data pipeline approach:\n\n``````install.packages(\"corrr\")\nlibrary(corrr)\nmtcars %>% correlate() %>% rplot()\n``````",
null,
"``````mtcars %>% correlate() %>% rearrange() %>% rplot()\n``````",
null,
"``````mtcars %>% correlate() %>% rearrange() %>% rplot(shape = 15)\n``````",
null,
"``````mtcars %>% correlate() %>% rearrange() %>% shave() %>% rplot(shape = 15)\n``````",
null,
"``````mtcars %>% correlate() %>% rearrange(absolute = FALSE) %>% rplot(shape = 15)\n``````",
null,
"The corrplot() function from corrplot R package can be also used to plot a correlogram.\n\n``````library(corrplot)\nM<-cor(mtcars) # compute correlation matrix\ncorrplot(M, method=\"circle\")\n``````\n\nseveral articles describing how to compute and visualize correlation matrix are published here:\n\nAnother solution I recently learned about is an interactive heatmap created with the qtlcharts package.\n\n``````install.packages(\"qtlcharts\")\nlibrary(qtlcharts)\niplotCorr(mat=mtcars, group=mtcars\\$cyl, reorder=TRUE)\n``````\n\nBelow is a static image of the resulting plot.",
null,
"You can see the interactive version on my blog. Hover over the heatmap to see the row, column, and cell values. Click on a cell to see a scatterplot with symbols colored by group (in this example, the number of cylinders, 4 is red, 6 is green, and 8 is blue). Hovering over the points in the scatterplot gives the name of the row (in this case the make of the car).\n\nSince I cannot comment, I have to give my 2c to the answer by daroczig as an anwser...\n\nThe ellipse scatter plot is indeed from the ellipse package and generated with:\n\n``````corr.mtcars <- cor(mtcars)\nord <- order(corr.mtcars[1,])\nxc <- corr.mtcars[ord, ord]\ncolors <- c(\"#A50F15\",\"#DE2D26\",\"#FB6A4A\",\"#FCAE91\",\"#FEE5D9\",\"white\",\n\"#EFF3FF\",\"#BDD7E7\",\"#6BAED6\",\"#3182BD\",\"#08519C\")\nplotcorr(xc, col=colors[5*xc + 6])\n``````\n\n(from the man page)\n\nThe corrplot package may also - as suggested - be useful with pretty images found here"
]
| [
null,
"https://i.stack.imgur.com/I1MUZ.jpg",
null,
"https://i.stack.imgur.com/9ydmA.jpg",
null,
"https://i.stack.imgur.com/4aCFY.png",
null,
"https://i.stack.imgur.com/2Hoq0.png",
null,
"https://i.stack.imgur.com/bLh1a.png",
null,
"https://i.stack.imgur.com/IfbRe.png",
null,
"https://i.stack.imgur.com/dpdSK.png",
null,
"https://i.stack.imgur.com/B9URo.png",
null,
"https://i.stack.imgur.com/OBDno.png",
null,
"https://i.stack.imgur.com/uRmK4.png",
null,
"https://i.stack.imgur.com/pdBM0.png",
null,
"https://i.stack.imgur.com/pdWvG.png",
null,
"https://i.stack.imgur.com/L61rI.png",
null,
"https://i.stack.imgur.com/zpgAg.png",
null,
"https://i.stack.imgur.com/hl2kw.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.74503046,"math_prob":0.9315492,"size":7719,"snap":"2019-51-2020-05","text_gpt3_token_len":2274,"char_repetition_ratio":0.14361633,"word_repetition_ratio":0.083333336,"special_character_ratio":0.31286436,"punctuation_ratio":0.18979058,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9904133,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30],"im_url_duplicate_count":[null,6,null,6,null,6,null,6,null,6,null,7,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-23T14:51:22Z\",\"WARC-Record-ID\":\"<urn:uuid:8b23204e-3477-4a93-85fd-583ca14131a0>\",\"Content-Length\":\"234038\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:37118017-058f-4019-a530-bdd5d0e3dc4e>\",\"WARC-Concurrent-To\":\"<urn:uuid:ceefe9bd-3dea-4b36-a5ac-2178dcf16969>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://stackoverflow.com/questions/5453336/plot-correlation-matrix-into-a-graph%22\",\"WARC-Payload-Digest\":\"sha1:J25HKICSAFBNNDEO7D3O6DTPMZEVSWFP\",\"WARC-Block-Digest\":\"sha1:C3IF6SJI5IVIZK25BJHF3EUOOZ6EGEDB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250610919.33_warc_CC-MAIN-20200123131001-20200123160001-00465.warc.gz\"}"} |
https://jas.shahroodut.ac.ir/article_858.html | [
"Document Type : Original Manuscript\n\nAuthor\n\nDepartment of Mathematics, Shahrekord University, P.O. Box 115, Shahrekord, Iran.\n\nAbstract\n\nLet R be a commutative ring with identity and M an R-module. In this paper, we associate a graph to M, say\nΓ(RM), such that when M=R, Γ(RM) coincide with the zero-divisor graph of R. Many well-known results by D.F. Anderson and P.S. Livingston have been generalized for Γ(RM). We Will show that Γ(RM) is connected with\ndiam Γ(RM)≤ 3 and if Γ(RM) contains a cycle, then Γ(RM)≤4. We will also show that Γ(RM)=Ø if and only if M is a\nprime module. Among other results, it is shown that for a reduced module M satisfying DCC on cyclic submodules,\ngr (Γ(RM))=∞ if and only if Γ(RM) is a star graph. Finally, we study the zero-divisor graph of free\nR-modules.\n\nKeywords"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7985491,"math_prob":0.89059216,"size":796,"snap":"2022-27-2022-33","text_gpt3_token_len":232,"char_repetition_ratio":0.109848484,"word_repetition_ratio":0.0,"special_character_ratio":0.25376883,"punctuation_ratio":0.14594595,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98896325,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-11T06:11:04Z\",\"WARC-Record-ID\":\"<urn:uuid:ffcd1fc0-2f0d-491c-aa78-6e8087dd1e45>\",\"Content-Length\":\"49446\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f0224191-c9fe-4862-bbde-8dc0c6703ecc>\",\"WARC-Concurrent-To\":\"<urn:uuid:3b3fc958-bcd6-4d10-a0c2-d31329734d56>\",\"WARC-IP-Address\":\"85.185.67.213\",\"WARC-Target-URI\":\"https://jas.shahroodut.ac.ir/article_858.html\",\"WARC-Payload-Digest\":\"sha1:GE2MAVSWFS3ABSOMT3LIJQ35RMQ57AFM\",\"WARC-Block-Digest\":\"sha1:BJXGIJAHQ5UISRSOQ6VHAOXVJ46TVQDX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571234.82_warc_CC-MAIN-20220811042804-20220811072804-00032.warc.gz\"}"} |
https://developers.arcgis.com/enterprise-sdk/api-reference/net/INetworkEdge/ | [
"# INetworkEdge Interface\n\nProvides access to members that specify the properties of this network edge element.\n\n## Members\n\nName Description",
null,
"AttributeValue Value of this network element for the given network attribute ID.",
null,
"AttributeValueAtTime Value of this network element for the given network attribute ID and local time.",
null,
"AttributeValueByName Value of this network element for the given network attribute name.",
null,
"CoveredEdgeCount Returns the number of edges covered by this edge.",
null,
"Direction Direction in which this network edge element is oriented relative to the direction of its source object.",
null,
"EID Element ID for this network element.",
null,
"ElementType Type of this network element.",
null,
"FromAzimuth Direction of travel at the from-end of the network edge element.",
null,
"HasCoveringHyperedge Indicates if the network edge element has a covering hyperedge.",
null,
"IsHyperedge Indicates if the network edge element is a hyperedge.",
null,
"OID Object ID of the object corresponding to this network element.",
null,
"PartialEdgeAttributeValue Value of this edge element along the given range for the given network attribute ID.",
null,
"PartialEdgeAttributeValueAtTime Value of this partial edge element for the given network attribute ID and local.",
null,
"PositionAlongObject Position along the source object at which the specified position along the network edge element lies.",
null,
"QueryCoveredEdge Used to iterate over the edges covered by this edge.",
null,
"QueryCoveringHyperedge Queries the covering hyperedge of the network edge element and returns its related positions along the covering hyperedge.",
null,
"QueryEdgeInOtherDirection Queries the network edge element corresponding to the reverse traversal of this network edge element.",
null,
"QueryJunctions Queries the network junction elements adjacent to this network edge element.",
null,
"QueryPositions Queries the positions along the source object at which the from-end and to-end of the network edge element lies.",
null,
"QueryTurn Queries the index'th network turn element in which this network edge element participates.",
null,
"SourceID ID of the network dataset source from which this network element was derived.",
null,
"ToAzimuth Direction of travel at the to-end of the network edge element.",
null,
"TurnCount Number of network turn elements in which this network edge element participates.",
null,
"TurnParticipationType Participation of this network edge element within a network turn element.\n\n### INetworkEdge.AttributeValue Property\n\nValue of this network element for the given network attribute ID.\n\n``````Public Function get_AttributeValue ( _\nByVal AttributeID As Integer _\n) As Object\n``````\n``````public object get_AttributeValue (\nint AttributeID\n);\n``````\n\n### INetworkEdge.AttributeValueAtTime Property\n\nValue of this network element for the given network attribute ID and local time.\n\n``````Public Function get_AttributeValueAtTime ( _\nByVal AttributeID As Integer, _\nByVal localTime As DateTime, _\nByVal timeUsage As esriNetworkTimeUsage _\n) As Object\n``````\n``````public object get_AttributeValueAtTime (\nint AttributeID,\nDateTime localTime,\nesriNetworkTimeUsage timeUsage\n);\n``````\n\n### INetworkEdge.AttributeValueByName Property\n\nValue of this network element for the given network attribute name.\n\n``````Public Function get_AttributeValueByName ( _\nByVal AttributeName As String _\n) As Object\n``````\n``````public object get_AttributeValueByName (\nstring AttributeName\n);\n``````\n\n### INetworkEdge.CoveredEdgeCount Property\n\nReturns the number of edges covered by this edge.\n\n``````Public ReadOnly Property CoveredEdgeCount As Integer\n``````\n``````public int CoveredEdgeCount {get;}\n``````\n\n### INetworkEdge.Direction Property\n\nDirection in which this network edge element is oriented relative to the direction of its source object.\n\n``````Public ReadOnly Property Direction As esriNetworkEdgeDirection\n``````\n``````public esriNetworkEdgeDirection Direction {get;}\n``````\n\n#### Remarks\n\nThe Direction property returns the direction of travel along this edge element relative to the digitized direction of the source feature. The direction of travel is either esriNEDAlongDigitized, meaning the direction of travel along the edge element is the same as the feature's direction of digitization, or esriNEDAgainstDigitized, meaning the direction of travel along the edge element is the opposite of the feature's direction of digitization.\n\n### INetworkEdge.EID Property\n\nElement ID for this network element.\n\n``````Public ReadOnly Property EID As Long\n``````\n``````public long EID {get;}\n``````\n\n### INetworkEdge.ElementType Property\n\nType of this network element.\n\n``````Public ReadOnly Property ElementType As esriNetworkElementType\n``````\n``````public esriNetworkElementType ElementType {get;}\n``````\n\n### INetworkEdge.FromAzimuth Property\n\nDirection of travel at the from-end of the network edge element.\n\n``````Public ReadOnly Property FromAzimuth As Double\n``````\n``````public double FromAzimuth {get;}\n``````\n\n#### Remarks\n\nThe FromAzimuth property indicates the direction of travel at the starting end of the edge element. For edge elements generated by an EdgeFeatureSource, the FromAzimuth and ToAzimuth values are measured clockwise in degrees relative to the positive Y-axis direction of the spatial reference of the network dataset.\n\n### INetworkEdge.HasCoveringHyperedge Property\n\nIndicates if the network edge element has a covering hyperedge.\n\n``````Public ReadOnly Property HasCoveringHyperedge As Boolean\n``````\n``````public bool HasCoveringHyperedge {get;}\n``````\n\n### INetworkEdge.IsHyperedge Property\n\nIndicates if the network edge element is a hyperedge.\n\n``````Public ReadOnly Property IsHyperedge As Boolean\n``````\n``````public bool IsHyperedge {get;}\n``````\n\n### INetworkEdge.OID Property\n\nObject ID of the object corresponding to this network element.\n\n``````Public ReadOnly Property OID As Long\n``````\n``````public long OID {get;}\n``````\n\n### INetworkEdge.PartialEdgeAttributeValue Property\n\nValue of this edge element along the given range for the given network attribute ID.\n\n``````Public Function get_PartialEdgeAttributeValue ( _\nByVal fromPosition As Double, _\nByVal toPosition As Double, _\nByVal AttributeID As Integer _\n) As Object\n``````\n``````public object get_PartialEdgeAttributeValue (\ndouble fromPosition,\ndouble toPosition,\nint AttributeID\n);\n``````\n\n### INetworkEdge.PartialEdgeAttributeValueAtTime Property\n\nValue of this partial edge element for the given network attribute ID and local.\n\n``````Public Function get_PartialEdgeAttributeValueAtTime ( _\nByVal fromPosition As Double, _\nByVal toPosition As Double, _\nByVal AttributeID As Integer, _\nByVal localTime As DateTime, _\nByVal timeUsage As esriNetworkTimeUsage _\n) As Object\n``````\n``````public object get_PartialEdgeAttributeValueAtTime (\ndouble fromPosition,\ndouble toPosition,\nint AttributeID,\nDateTime localTime,\nesriNetworkTimeUsage timeUsage\n);\n``````\n\n### INetworkEdge.PositionAlongObject Property\n\nPosition along the source object at which the specified position along the network edge element lies.\n\n``````Public Function get_PositionAlongObject ( _\nByVal positionAlongElement As Double _\n) As Double\n``````\n``````public double get_PositionAlongObject (\ndouble positionAlongElement\n);\n``````\n\n#### Remarks\n\nThe PositionAlongObject property determines, from the given positional value along the edge element, the corresponding positional value along the object from which this edge element was created. The positionAlongElement parameter and the PositionAlongObject value both range from 0.0 to 1.0.\n\nFor example, if the fromPosition and toPosition values from the QueryPositions method is 0.1 and 0.6 respectively, then the PositionAlongObject value for the positionAlongElement = 0.7 is equal to 70% of the way between 0.1 and 0.6, which is 0.45.\n\n### INetworkEdge.QueryCoveredEdge Method\n\nUsed to iterate over the edges covered by this edge.\n\n``````Public Sub QueryCoveredEdge ( _\nByVal Index As Integer, _\nByVal Edge As INetworkEdge _\n)\n``````\n``````public void QueryCoveredEdge (\nint Index,\nINetworkEdge Edge\n);\n``````\n\n### INetworkEdge.QueryCoveringHyperedge Method\n\nQueries the covering hyperedge of the network edge element and returns its related positions along the covering hyperedge.\n\n``````Public Sub QueryCoveringHyperedge ( _\nByVal Edge As INetworkEdge, _\nByRef fromPosition As Double, _\nByRef toPosition As Double _\n)\n``````\n``````public void QueryCoveringHyperedge (\nINetworkEdge Edge,\nref double fromPosition,\nref double toPosition\n);\n``````\n\n### INetworkEdge.QueryEdgeInOtherDirection Method\n\nQueries the network edge element corresponding to the reverse traversal of this network edge element.\n\n``````Public Sub QueryEdgeInOtherDirection ( _\nByVal Edge As INetworkEdge _\n)\n``````\n``````public void QueryEdgeInOtherDirection (\nINetworkEdge Edge\n);\n``````\n\n#### Remarks\n\nThe QueryEdgeInOtherDirection method retrieves the edge element in the opposite direction of travel as this edge.\n\nThis method requires an instantiated NetworkEdge object to be passed in as a parameter. You can create an empty NetworkEdge object by using the INetworkQuery::CreateNetworkElement method.\n\n### INetworkEdge.QueryJunctions Method\n\nQueries the network junction elements adjacent to this network edge element.\n\n``````Public Sub QueryJunctions ( _\nByVal FromJunction As INetworkJunction, _\nByVal ToJunction As INetworkJunction _\n)\n``````\n``````public void QueryJunctions (\nINetworkJunction FromJunction,\nINetworkJunction ToJunction\n);\n``````\n\n#### Remarks\n\nThe QueryJunctions method retrieves the junction elements at the ends of this edge element.\n\nThis method requires two instantiated NetworkJunction objects to be passed in as a parameter. You can create an empty NetworkJunction object by using the INetworkQuery::CreateNetworkElement method.\n\n### INetworkEdge.QueryPositions Method\n\nQueries the positions along the source object at which the from-end and to-end of the network edge element lies.\n\n``````Public Sub QueryPositions ( _\nByRef fromPosition As Double, _\nByRef toPosition As Double _\n)\n``````\n``````public void QueryPositions (\nref double fromPosition,\nref double toPosition\n);\n``````\n\n#### Remarks\n\nThe QueryPositions method queries the positional values along the source feature from which this edge element was created. The position values range from 0.0 to 1.0, where 0.0 is at the from-end of the feature and 1.0 is at the to-end of the feature.\n\nIf the Direction property is esriNEDAlongDigitized, then the fromPosition value will be less than or equal to the toPositionValue. If the Direction property is esriNEDAgainstDigitized, then the fromPosition value will be greater than or equal to the toPositionValue.\n\n### INetworkEdge.QueryTurn Method\n\nQueries the index'th network turn element in which this network edge element participates.\n\n``````Public Sub QueryTurn ( _\nByVal Index As Integer, _\nByVal Turn As INetworkTurn _\n)\n``````\n``````public void QueryTurn (\nint Index,\nINetworkTurn Turn\n);\n``````\n\n#### Remarks\n\nThe QueryTurn method retrieves the turn element that traverses this edge at the specified index. The index values range from 0 to (TurnCount - 1).\n\nThe QueryTurn method requires an instantiated NetworkTurn object to be passed in as a parameter. You can create an empty NetworkTurn object by using the INetworkQuery::CreateNetworkElement method.\n\n### INetworkEdge.SourceID Property\n\nID of the network dataset source from which this network element was derived.\n\n``````Public ReadOnly Property SourceID As Integer\n``````\n``````public int SourceID {get;}\n``````\n\n### INetworkEdge.ToAzimuth Property\n\nDirection of travel at the to-end of the network edge element.\n\n``````Public ReadOnly Property ToAzimuth As Double\n``````\n``````public double ToAzimuth {get;}\n``````\n\n#### Remarks\n\nThe ToAzimuth property indicates the direction of travel at the terminating end of the edge element. For edge elements generated by an EdgeFeatureSource, the FromAzimuth and ToAzimuth values are measured clockwise in degrees relative to the positive Y-axis direction of the spatial reference of the network dataset.\n\n### INetworkEdge.TurnCount Property\n\nNumber of network turn elements in which this network edge element participates.\n\n``````Public ReadOnly Property TurnCount As Integer\n``````\n``````public int TurnCount {get;}\n``````\n\n#### Remarks\n\nThe TurnCount property returns the number of turn elements that traverse this edge.\n\n### INetworkEdge.TurnParticipationType Property\n\nParticipation of this network edge element within a network turn element.\n\n``````Public ReadOnly Property TurnParticipationType As esriNetworkTurnParticipationType\n``````\n``````public esriNetworkTurnParticipationType TurnParticipationType {get;}\n``````\n\n## Classes that implement INetworkEdge\n\nClasses Description\n\n## Remarks\n\nThe INetworkEdge interface is used to access the properties of the network edge element, such as its direction of travel and azimuth values.\n\nYour browser is no longer supported. Please upgrade your browser for the best experience. See our browser deprecation post for more details."
]
| [
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/Method.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/Method.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/Method.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/Method.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/Method.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/Method.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null,
"https://developers.arcgis.com/enterprise-sdk/api-reference/net/bitmaps/ReadOnly.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6515168,"math_prob":0.6213038,"size":12001,"snap":"2022-40-2023-06","text_gpt3_token_len":2531,"char_repetition_ratio":0.21905476,"word_repetition_ratio":0.40528905,"special_character_ratio":0.16956921,"punctuation_ratio":0.1003861,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9610509,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-27T21:37:36Z\",\"WARC-Record-ID\":\"<urn:uuid:994d5495-c71a-489a-81ac-7cb6f84a7081>\",\"Content-Length\":\"378432\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0e9d3fa4-1ce9-4ca2-b5e8-760c2c4fa574>\",\"WARC-Concurrent-To\":\"<urn:uuid:040c83b3-7e7b-43b5-be14-6141113d0ffe>\",\"WARC-IP-Address\":\"18.160.18.28\",\"WARC-Target-URI\":\"https://developers.arcgis.com/enterprise-sdk/api-reference/net/INetworkEdge/\",\"WARC-Payload-Digest\":\"sha1:F3Q2HMW7LEPOVSL7ZFATCVJE6MGQ4LFS\",\"WARC-Block-Digest\":\"sha1:6Y77SVIQEHFKWHPY5SMPQQ6G2RQ7V736\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335058.80_warc_CC-MAIN-20220927194248-20220927224248-00299.warc.gz\"}"} |
https://math.stackexchange.com/questions/tagged/regularization | [
"# Questions tagged [regularization]\n\nRegularization, in mathematics and statistics and particularly in the fields of machine learning and inverse problems, refers to a process of introducing additional information in order to solve an ill-posed problem or to prevent overfitting. (Def: http://en.wikipedia.org/wiki/Regularization_(mathematics))\n\n356 questions\nFilter by\nSorted by\nTagged with\n19 views\n\n### Penalty function $f(a, b)$ for $a, b \\in \\mathbb{R}^+$ which adds a high positive penalty only when both $a, b$ are very small\n\nI'm doing Bayesian recruitment curve fitting where my curve has two parameters $a$ and $b$. Both $a, b \\in \\mathbb{R}^+$. I have put a Truncated Normal prior on $a$ and a Half Normal prior on $b$. I'm ...\n33 views\n\n29 views\n\n### regularization and punishment method in least square fitting\n\nI have a least square problem: $$\\min \\sum_j^p| f(x_j)-y_j |^2 \\\\ \\text{where } f(x) = a x - \\sum_{i}^{n} b_i J_1(c_i x)$$ where $J_1$ is the first order Bessel function. I have to find a set ...\n73 views\n\n### Sobolev regularity required for $|\\nabla u|^2 \\in H^1(\\Omega)$\n\nWe have $n=2$ and $\\Omega=\\{x \\in \\mathbb{R}^2\\| ||x||_2<1 \\}$. I need $|\\nabla u|^2 \\in H^1(\\Omega)$. So i would choose $u \\in W^{2,4}(\\Omega)$. But since we have $n=2$ I thought that a lower ...\n1 vote\n14 views\n\n### Morozov Discrepancy for PDE-Constrained Optimization With Bound Constraints\n\n$\\textbf{Background and context}$ Let $\\beta:\\Omega\\rightarrow\\mathbb{R}$, be an unknown spatially distributed parameter (over the spatial domain $\\Omega$). Let $\\mathcal{F}$ represent a parameter-to-...\n1 vote\n34 views\n\n### Weighted sum of N images, which minimizes their TV norm\n\nI have $K$ images $I_i, i\\in{1 \\ldots K}$ of the size $M \\times N$. I wish to find weights $w_i$, s.t. $w_i \\in [0,1]$ and $\\sum_1^K w_i = 1$ so that $$|\\sum_{i=1}^{K} w_i I_i|_{TV}$$ is minimal. I ...\n85 views\n\n50 views\n\n131 views\n\n### Constant terms of asymptotic expansions of smoothed sums of all prime numbers\n\nConsider the series $$\\sum_{n=1}^\\infty n e^{-n \\varepsilon}$$ For $\\varepsilon \\leq 0$, it diverges. For $\\varepsilon > 0$, it converges and equals $$\\frac{e^\\varepsilon}{(e^\\varepsilon - 1)^2}$$ ...\n45 views\n\n### Convergence of Tikohnov regularization for convex objective\n\nI have the following question: Assume we want to minimize some convex (not strictly convex) and coercive ($f(x) \\to \\infty$ as $||x|| \\to \\infty$) function $f \\in C^2(R^n,R)$, which has possibly ...\n146 views\n\n1 vote\n112 views\n\n### Indefinite generalized Tikhonov regularization\n\nSuppose we want to choose $x$ to minimise the following (generalized) Tikhonov regularized least squares objective: $$(Ax-b)^\\top (Ax-b) + \\lambda [(x-c)^\\top W (x-c)],$$ where $W$ is symmetric, but ...\n1 vote\n132 views\n\n### Principal value integral with cosine\n\nWe are doing a practice set for an exam where we have to find the principal value of the integral $$I = P.V. \\int^\\infty_{-\\infty} \\frac{\\cos(x)}{(x-1)(x^2+1)} dx$$ Firstly, I am unsure if this ...\n300 views\n\n### Optimal Transport and Entropic Regularization\n\nWe are working with discrete optimal transport. Let $P$ be a matrix and let $H(P) =- \\sum_{i,j} P_{i,j} (\\log(P_{i,j})-1)$. Let $C$ be the cost matrix. And $\\langle C,P\\rangle$ the Frobenius inner ...\n92 views\n\n### Best optimization technique for solving overdetermined systems with a constraint\n\nI am trying to make a prediction model based on a system of linear equations: $A\\vec{x}=\\vec{b}$, where $\\vec{x}$ ($m\\times1$) is my learning parameters, $A (m\\times n)$ and $\\vec{b}$ $(m\\times1)$ are ...\n1 vote\n138 views\n\n### For $u \\in L^2([0,T])$ there exists $u_m \\in C^\\infty$ such that $u_m \\to u$ in $L^2_{loc}(]0,T[)$.\n\nI am reading Navier-Stokes Equations by Roger Temam and there is a point in a proof I do not understand. Let me explain: We have a function $u: [0,T] \\to H \\in L^2([0,T]; H)$, for $H$ some Hilbert ...\nIn A Generalization of the Cauchy Principal Value, the author presents a way to assign values for hypersingular integrals of the form $$I=\\int_a^b\\frac{f(x)\\,\\mathrm dx}{(x-u)^n},\\quad u\\in(a,b)$$ ..."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.800626,"math_prob":0.9995388,"size":5202,"snap":"2023-40-2023-50","text_gpt3_token_len":1591,"char_repetition_ratio":0.10311659,"word_repetition_ratio":0.00249066,"special_character_ratio":0.3206459,"punctuation_ratio":0.14365153,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999769,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-07T06:38:16Z\",\"WARC-Record-ID\":\"<urn:uuid:7840df0b-ee2d-4e15-99c4-10aa44715725>\",\"Content-Length\":\"347198\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a1505a20-9f3b-4293-93b8-6f5d0c7bf6b0>\",\"WARC-Concurrent-To\":\"<urn:uuid:304edc6e-1f5b-449a-ab51-7ef097a5bc61>\",\"WARC-IP-Address\":\"172.64.144.30\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/tagged/regularization\",\"WARC-Payload-Digest\":\"sha1:SY7K6BV7JGSUVJU6NTCYLWAGWX6PLGKZ\",\"WARC-Block-Digest\":\"sha1:X2JLOMWE5H4KYJA6DK5QL2ZXBCTL5FEQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100650.21_warc_CC-MAIN-20231207054219-20231207084219-00538.warc.gz\"}"} |
https://stats.stackexchange.com/questions/164209/relationship-regression-coeffecient-and-line-plot-trendline-slope | [
"Relationship: Regression Coeffecient and Line Plot Trendline Slope\n\nWhy does the slope of my line fit plot not match the coefficient of the same variable in my regression?\n\nFor one of the variables, the coefficient is positive while the line fit plots trendline is negative.\n\nUsing Excel's regression tool... The line best fit plot is for Variable D\n\n• Without a reproducible example there is no way we can tell. You need to be more specific and show at least a snipped of the data so others here can understand what went wrong. – Andy Jul 31 '15 at 22:18\n• Just added screen shots, hopefully that provides enough insight. – Derek Jul 31 '15 at 22:33\n• What is A-H here? I looks like you are looking at only two dimensions X and Y in the plot above, yet your model seems to include an intercept and coefficients A through H. – StatsStudent Jul 31 '15 at 23:27\n• @StatsStudent are you implying that you'd like to see the line fit plots for the other variables? The reason why I am including only variable D's plot is because it has the behavior that I can make the least sense of. From a purely mathematical point of view, I thought that the \"coeffecient in a regression\" is always equal to the slope of the line fit plot's trendline – Derek Aug 3 '15 at 15:50"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.95707643,"math_prob":0.8470524,"size":717,"snap":"2019-43-2019-47","text_gpt3_token_len":149,"char_repetition_ratio":0.11640954,"word_repetition_ratio":0.0,"special_character_ratio":0.20781033,"punctuation_ratio":0.08571429,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99382365,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-21T00:58:55Z\",\"WARC-Record-ID\":\"<urn:uuid:7dc17338-712c-4a9b-9918-6b18ca8bc804>\",\"Content-Length\":\"141529\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6f5db7d3-e066-4b72-af7f-742460f7a6c2>\",\"WARC-Concurrent-To\":\"<urn:uuid:14829d87-db94-4964-8d3a-44929ffd286f>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://stats.stackexchange.com/questions/164209/relationship-regression-coeffecient-and-line-plot-trendline-slope\",\"WARC-Payload-Digest\":\"sha1:IJD3CSEFRLCO2EGXH62WYEXAUS757LPB\",\"WARC-Block-Digest\":\"sha1:ABUSJEGRSAKXR7IX6ZQNB2BOZGYAJ3CM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570987750110.78_warc_CC-MAIN-20191020233245-20191021020745-00298.warc.gz\"}"} |
https://file.scirp.org/Html/9-1770575_90289.htm | [
" Analysis on Sensitivity of Power System Stability to Generator Parameters\n\nJournal of Power and Energy Engineering\nVol.07 No.01(2019), Article ID:90289,18 pages\n10.4236/jpee.2019.71009\n\nAnalysis on Sensitivity of Power System Stability to Generator Parameters\n\nXiaoming Sun\n\nDepartment of Electrical Engineering, Chongqing Water Resources and Electric Engineering College, Chongqing, China",
null,
"",
null,
"",
null,
"",
null,
"Received: December 30, 2018; Accepted: January 27, 2019; Published: January 30, 2019\n\nABSTRACT\n\nThe sensitivity of power system stability (including transient and dynamic stabilities) to generator parameters (including parameters of generator model, excitation system and power system stabilizer) is analyzed in depth by simulations. From the tables and plots of the resultant simulated data, a number of useful rules are revealed. These rules can be directly applied to the engineering checking of generator parameters. Because the complex theoretical analyses are circumvented, the checking procedure is greatly simplified, remarkably promoting the working efficiency of electrical engineers on site.\n\nKeywords:\n\nSensitivity Analysis, Power System Stability, Transient Stability, Dynamic Stability, Generator Parameters, Excitation System, Power System Stabilizer",
null,
"1. Introduction\n\nGenerators are the most important component of power system, and thus the level of power system stability is closely related to generator parameters , which include both the parameters of generator models and the parameters of excitation systems and power system stabilizers (PSS). For this, testing and checking the correctness of generator parameters and the appropriateness of generator parameters’ combinations are very important tasks of electrical engineers prior to further analysis of power system stability. In case generator parameters are mistaken or their combinations are inappropriate, it is very likely to cause decision-making errors or deviations from optimal operating points, bringing unforeseen or unfavorable outcomes. Currently, however, strictly and accurately testing and checking generator parameters are actually impractical and impossible; because in modern bulk power system the number of generators is huge, the field tests on each generator are unavoidably time and cost consuming; what’s more, generator parameters may change with time and operating conditions. Therefore, the electrical engineers at the electric power dispatching center really need a simple and practical method for testing and checking generator parameters quickly and efficiently.\n\nThe main contribution of this paper is based on the actual engineering experiences of the author. From plenty of simulation experiments, the sensitivity of power system stability (including transient stability and dynamic stability) to generator parameters is analyzed and illustrated in detail, and as a result some feasible and fast rules for testing and checking generator parameters are revealed and summarized, which can be directly adopted by the electrical engineers on site. And because the complex theoretical analyses are circumvented, the testing and checking procedure is greatly simplified so that the working efficiency of electrical engineers is greatly promoted.\n\n2. Generator Models and Parameters\n\nThe number and definitions of generator parameters are correlated with specific generator models. To ensure generality, the integral model of generator should be adopted, in which the stator consists of three-phase windings and the rotator consists of salient poles, excitation winding f, d-axis equivalent damping winding D and two q-axis equivalent damping windings g and Q. Based on the Park transform, the per-unit equations of the integral model of generator under dq0 coordinates are as follows (because the magnetic field produced by 0-axis current i0 in stator windings is 0 and has no effect on the electric characteristics of rotator , the equations related to 0-axis component are omitted):\n\n$\\left\\{\\begin{array}{l}{\\upsilon }_{\\text{d}}=-{\\psi }_{\\text{q}}-{R}_{\\text{a}}{i}_{\\text{d}}\\\\ {\\upsilon }_{\\text{q}}={\\psi }_{\\text{d}}-{R}_{\\text{a}}{i}_{\\text{q}}\\\\ {\\upsilon }_{\\text{f}}=\\text{d}{\\psi }_{\\text{f}}/\\text{d}t+{R}_{\\text{f}}{i}_{\\text{f}}\\\\ 0=\\text{d}{\\psi }_{\\text{D}}/\\text{d}t+{R}_{\\text{D}}{i}_{\\text{D}}\\\\ 0=\\text{d}{\\psi }_{\\text{g}}/\\text{d}t+{R}_{\\text{g}}{i}_{\\text{g}}\\\\ 0=\\text{d}{\\psi }_{\\text{Q}}/\\text{d}t+{R}_{\\text{Q}}{i}_{\\text{Q}}\\end{array}\\text{ }\\text{ }\\text{ }\\left\\{\\begin{array}{l}{\\psi }_{\\text{d}}=-{X}_{\\text{d}}{i}_{\\text{d}}+{X}_{\\text{ad}}{i}_{\\text{f}}+{X}_{\\text{ad}}{i}_{\\text{D}}\\\\ {\\psi }_{\\text{f}}=-{X}_{\\text{ad}}{i}_{\\text{d}}+{X}_{\\text{f}}{i}_{\\text{f}}+{X}_{\\text{ad}}{i}_{\\text{D}}\\\\ {\\psi }_{\\text{D}}=-{X}_{\\text{ad}}{i}_{\\text{d}}+{X}_{\\text{ad}}{i}_{\\text{f}}+{X}_{\\text{D}}{i}_{\\text{D}}\\\\ {\\psi }_{\\text{q}}=-{X}_{\\text{q}}{i}_{\\text{q}}+{X}_{\\text{aq}}{i}_{\\text{g}}+{X}_{\\text{aq}}{i}_{\\text{Q}}\\\\ {\\psi }_{\\text{g}}=-{X}_{\\text{aq}}{i}_{\\text{q}}+{X}_{\\text{g}}{i}_{\\text{g}}+{X}_{\\text{aq}}{i}_{\\text{Q}}\\\\ {\\psi }_{\\text{Q}}=-{X}_{\\text{aq}}{i}_{\\text{q}}+{X}_{\\text{aq}}{i}_{\\text{g}}+{X}_{\\text{Q}}{i}_{\\text{Q}}\\end{array}$ (1)\n\nwhere ${\\upsilon }_{\\text{d}}$ , ${\\upsilon }_{\\text{q}}$ and ${\\upsilon }_{\\text{f}}$ are the voltages of d-axis, q-axis and excitation wingding f; id, iq, if, iD, ig and iQ are the currents of d-axis, q-axis, excitation wingding f, equivalent damping windings D, g and Q; Ra, Rf, RD, Rg and RQ are the resistances of one-phase stator winding, excitation winding f, equivalent damping windings D, g and Q; yd, yq, yf, yD, yg and yQ are the total magnetic flux linkages of d-axis and q-axis windings, excitation winding f, equivalent damping windings D, g and Q; Xd, Xq, Xad, Xaq, Xf, XD, Xg and XQ are the synchronous reactances of d-axis and q-axis, the armature reaction reactances of d-axis and q-axis windings, the reactance of excitation winding f, the reactances of equivalent damping windings D, g and Q. And, in Equation (1) two assumptions are made: i) assume dyd/dt ≈ 0 and dyq/dt ≈ 0, that is, the electromagnetic transient process is not considered, or the aperiodic component of the stator current is considered in another way ; ii) assume the per-unit value of the electric angular velocity w ≈ 1, making the equations related to $\\upsilon$ d and $\\upsilon$ q linearized.\n\nApparently, the total magnetic flux linkages yd, yq, yf, yD, yg and yQ in Equation (1) are inconvenient or even impossible to measure in practice, and therefore some measurable variables are introduced to represent these magnetic flux linkages indirectly:\n\n$\\left\\{\\begin{array}{l}{{E}^{\\prime }}_{\\text{d}}=-{X}_{\\text{aq}}{\\psi }_{\\text{g}}/{X}_{\\text{g}}\\\\ {{E}^{\\prime }}_{\\text{q}}={X}_{\\text{ad}}{\\psi }_{\\text{f}}/{X}_{\\text{f}}\\end{array}\\text{ }\\text{ }\\text{ }\\left\\{\\begin{array}{l}{{E}^{″}}_{\\text{d}}=-{X}_{\\text{aq}}\\left({X}_{\\text{σg}}{\\psi }_{\\text{Q}}+{X}_{\\text{σQ}}{\\psi }_{\\text{g}}\\right)/\\left({X}_{\\text{Q}}{X}_{\\text{g}}-{X}_{\\text{aq}}^{2}\\right)\\\\ {{E}^{″}}_{\\text{q}}={X}_{\\text{ad}}\\left({X}_{\\text{σD}}{\\psi }_{\\text{f}}+{X}_{\\text{σf}}{\\psi }_{\\text{D}}\\right)/\\left({X}_{\\text{D}}{X}_{\\text{f}}-{X}_{\\text{ad}}^{2}\\right)\\end{array}$ (2)\n\nwhere ${{E}^{\\prime }}_{\\text{d}}$ , ${{E}^{\\prime }}_{\\text{q}}$ and ${{E}^{″}}_{\\text{d}}$ , ${{E}^{″}}_{\\text{q}}$ are the transient and subtransient electromotive forces of d-axis and q-axis; Xsf, XsD, Xsg and XsQ are the leakage reactances of excitation winding f, equivalent damping windings D, g and Q.\n\nFurther, some measurable parameters are also introduced, not only simplifying the equations but also making the equations’ physical meanings clearer:\n\n$\\left\\{\\begin{array}{l}{{T}^{\\prime }}_{\\text{d}0}={X}_{\\text{f}}/{R}_{\\text{f}}\\\\ {{T}^{\\prime }}_{\\text{q}0}={X}_{\\text{g}}/{R}_{\\text{g}}\\end{array}\\text{ }\\text{ }\\text{ }\\left\\{\\begin{array}{l}{{T}^{″}}_{\\text{d}0}=\\left({X}_{\\text{D}}-{X}_{\\text{ad}}^{2}/{X}_{\\text{f}}\\right)/{R}_{\\text{D}}\\\\ {{T}^{″}}_{\\text{q}0}=\\left({X}_{\\text{Q}}-{X}_{\\text{aq}}^{2}/{X}_{\\text{g}}\\right)/{R}_{\\text{Q}}\\end{array}$ (3)\n\nwhere ${{T}^{\\prime }}_{\\text{d}0}$ , ${{T}^{\\prime }}_{\\text{q}0}$ and ${{T}^{″}}_{\\text{d}0}$ , ${{T}^{″}}_{\\text{q}0}$ are the open circuit transient and subtransient time constants of d-axis and q-axis.\n\nBy substituting Equations (2) and (3) into Equation (1), the 6th-order practical model of generator can be derived:\n\n$\\left\\{\\begin{array}{l}\\left\\{\\begin{array}{l}{\\upsilon }_{\\text{d}}={{E}^{″}}_{\\text{d}}+{{X}^{″}}_{\\text{q}}{i}_{\\text{q}}-{R}_{\\text{a}}{i}_{\\text{d}}\\\\ {\\upsilon }_{\\text{q}}={{E}^{″}}_{\\text{q}}-{{X}^{″}}_{\\text{d}}{i}_{\\text{d}}-{R}_{\\text{a}}{i}_{\\text{q}}\\end{array}\\\\ {{T}^{\\prime }}_{\\text{d}0}\\frac{\\text{d}{{E}^{\\prime }}_{\\text{q}}}{\\text{d}t}=\\frac{{X}_{\\text{ad}}{\\upsilon }_{\\text{f}}}{{R}_{\\text{f}}}-\\frac{{X}_{\\text{d}}-{X}_{\\text{σa}}}{{{X}^{\\prime }}_{\\text{d}}-{X}_{\\text{σa}}}{{E}^{\\prime }}_{\\text{q}}+\\frac{{X}_{\\text{d}}-{{X}^{\\prime }}_{\\text{d}}}{{{X}^{\\prime }}_{\\text{d}}-{X}_{\\text{σa}}}{{E}^{″}}_{\\text{q}}-\\frac{\\left({X}_{\\text{d}}-{{X}^{\\prime }}_{\\text{d}}\\right)\\left({{X}^{″}}_{\\text{d}}-{X}_{\\text{σa}}\\right)}{{{X}^{\\prime }}_{\\text{d}}-{X}_{\\text{σa}}}{i}_{\\text{d}}\\\\ {{T}^{″}}_{\\text{d}0}\\frac{\\text{d}{{E}^{″}}_{\\text{q}}}{\\text{d}t}=\\frac{{{X}^{″}}_{\\text{d}}-{X}_{\\text{σa}}}{{{X}^{\\prime }}_{\\text{d}}-{X}_{\\text{σa}}}{{T}^{″}}_{\\text{d}0}\\frac{\\text{d}{{E}^{\\prime }}_{\\text{q}}}{\\text{d}t}-{{E}^{″}}_{\\text{q}}+{{E}^{\\prime }}_{\\text{q}}+\\left({{X}^{\\prime }}_{\\text{d}}-{{X}^{″}}_{\\text{d}}\\right){i}_{\\text{d}}\\\\ {{T}^{\\prime }}_{\\text{q0}}\\frac{\\text{d}{{E}^{\\prime }}_{\\text{d}}}{\\text{d}t}=-\\frac{{X}_{\\text{q}}-{X}_{\\text{σa}}}{{{X}^{\\prime }}_{\\text{q}}-{X}_{\\text{σa}}}{{E}^{\\prime }}_{\\text{d}}+\\frac{{X}_{\\text{q}}-{{X}^{\\prime }}_{\\text{q}}}{{{X}^{\\prime }}_{\\text{q}}-{X}_{\\text{σa}}}{{E}^{″}}_{\\text{d}}+\\frac{\\left({X}_{\\text{q}}-{{X}^{\\prime }}_{\\text{q}}\\right)\\left({{X}^{″}}_{\\text{q}}-{X}_{\\text{σa}}\\right)}{{{X}^{\\prime }}_{\\text{q}}-{X}_{\\text{σa}}}{i}_{\\text{q}}\\\\ {{T}^{″}}_{\\text{q0}}\\frac{\\text{d}{{E}^{″}}_{\\text{d}}}{\\text{d}t}=\\frac{{{X}^{″}}_{\\text{q}}-{X}_{\\text{σa}}}{{{X}^{\\prime }}_{\\text{q}}-{X}_{\\text{σa}}}{{T}^{″}}_{\\text{q0}}\\frac{\\text{d}{{E}^{\\prime }}_{\\text{d}}}{\\text{d}t}-{{E}^{″}}_{\\text{d}}+{{E}^{\\prime }}_{\\text{d}}+\\left({{X}^{\\prime }}_{\\text{q}}-{{X}^{″}}_{\\text{q}}\\right){i}_{\\text{q}}\\\\ \\frac{\\text{d}\\delta }{\\text{d}t}=\\omega -1\\end{array}$ (4)\n\nwhere Xsa, ${{X}^{\\prime }}_{\\text{d}}$ , ${{X}^{\\prime }}_{\\text{q}}$ and ${{X}^{″}}_{\\text{d}}$ , ${{X}^{″}}_{\\text{d}}$ are the leakage reactance of stator winding, the transient and subtransient reactances of d-axis and q-axis. And the 6 equations are the voltage equations of stator, excitation winding f, equivalent damping windings D, g and Q, and the motion equation of stator, successively. From Equation (4), the specific position of each generator parameter in the formula is determined clearly.\n\n3. Fast Rules for Testing and Checking Generator Parameters in Models of Different Orders\n\nBy reducing Equation (4) to different extent, i.e., neglecting a certain number of windings or introducing new assumptions, the 5th-order, 4th-order, 3rd-order and 2nd-order models of generator can be obtained , and they are not listed out in this paper for brevity. In these models, only one or two parameters have slight discrepancies, and other parameters are the same. It is because of these slight discrepancies that some evident incorrectness of generator parameters can be tested and checked rapidly in terms of the following 6 rules.\n\n1) Rules for the 6th-order model (in this model d-axis, q-axis windings, excitation winding f and equivalent damping windings D, g and Q are all considered, and it is the detailed model of solid steam turbine or non-salient pole machine): ${{T}^{\\prime }}_{\\text{q0}}>0$ , ${X}_{\\text{q}}\\ne {{X}^{\\prime }}_{\\text{q}}$ .\n\n2) Rules for the 5th-order model (in this model equivalent damping winding g is neglected, and it is the detailed model of hydraulic turbine or salient pole machine): ${{T}^{\\prime }}_{\\text{q0}}=0$ , ${X}_{\\text{q}}\\ne {{X}^{\\prime }}_{\\text{q}}$ .\n\n3) Rules for the 4th-order model (in this model only d-axis, q-axis windings, excitation winding f and equivalent damping winding g are considered, and it is suitable for describing the solid steam turbine): ${{T}^{\\prime }}_{\\text{q0}}>0$ , ${X}_{\\text{q}}\\ne {{X}^{\\prime }}_{\\text{q}}$ .\n\n4) Rules for the 3rd-order model (in this model only d-axis, q-axis windings and excitation winding f are considered, and it is suitable for describing the salient pole machine when high computational accuracy is not required): ${{T}^{\\prime }}_{\\text{q0}}=0$ , ${X}_{\\text{q}}={{X}^{\\prime }}_{\\text{q}}$ .\n\n5) Rules for the 2nd-order model (in this model it is assumed that the excitation system is so strong that it can maintain the constancy of ${{E}^{\\prime }}_{\\text{d}}$ and ${{E}^{\\prime }}_{\\text{q}}$ ): ${{T}^{\\prime }}_{\\text{d}0}$ = a very big value.\n\n6) Rules for both the salient and non-salient pole machines: ${X}_{\\text{q}}\\ne {{X}^{\\prime }}_{\\text{d}}$ .\n\nThe rules above are merely the qualitative rules, and a number of quantitative testing and checking rules (variation ranges) derived from engineering experiences are listed in Table 1. From Table 1, two complementary rules can be summarized: a) ${X}_{\\text{d}}\\ge {X}_{\\text{q}}\\ge {{X}^{\\prime }}_{\\text{q}}>{{X}^{\\prime }}_{\\text{d}}>{{X}^{″}}_{\\text{q}}\\ge {{X}^{″}}_{\\text{d}}>{X}_{\\text{σa}}$ ; b) ${T}_{\\text{J}}>{{T}^{\\prime }}_{\\text{d0}}>{{T}^{\\prime }}_{\\text{q0}}>{{T}^{″}}_{\\text{d0}}\\ge {{T}^{″}}_{\\text{q0}}$ .\n\nProvided that the generator parameters are prominently deviating from the aforementioned 6 requirements, the above 2 rules and the reference ranges of Table 1, it is justified in doubting that the parameters are incorrect, and more careful testing means should be taken. However, it is a simple and fast method to test the generator parameters and is very suitable for the preliminary test of the newly obtained parameters.\n\n4. Sensitivity of Power System Stability to Generator Parameters\n\nThe testing and checking rules of generator parameters presented in Section 3 are necessary conditions but not sufficient conditions to guarantee power system\n\nTable 1. Quantitative testing and checking rules (variation ranges) of generator parameters.\n\nstability. Whether power system can maintain stable or not depends also on generator parameters’ combinations. This section is aimed at analyzing and illustrating the sensitivity of power system stability (including transient stability and dynamic stability) to generator parameters’ combinations by plenty of simulation experiments. To make it possible for readers to reproduce the simulation results, the IEEE 9-node test system is selected as the simulation model. And the simulation experiments are carried out on one of the most famous simulation software platforms of power system, the Chinese edition BPA, i.e. PSD-BPA (Power System Department―Bonneville Power Administration) .\n\n4.1. Overview of IEEE 9-Node Test System\n\nThe geographically interconnected diagram of the IEEE 9-node test system is shown in Figure 1, which displays the power flow distribution under normal operation condition. For brevity, this subsection lists out only generator parameters in Table 2, and other detailed parameters, i.e. the steady-state and transient parameters of loads, buses, transmission lines and transformers can be found in . The units of the parameters in Table 2 are the same as those in Table 1, and because Ra ≈ 0, Ra is omitted from Table 2.\n\nBy comparing the generator parameters in Table 1 and Table 2, it can be inferred that GEN2 is a hydraulic turbine and GEN3 is a steam turbine. However, GEN1 and GEN2’s ${{X}^{″}}_{\\text{d}}$ and ${{X}^{″}}_{\\text{d}}$ (indicated by the shadings in Table 2) do not strictly comply with the variation range in Table 1, meaning that Table 1 should only be used to judge the prominent incorrectness of generator parameters but\n\nFigure 1. The geographically interconnected diagram of the IEEE 9-node test system. The units of node voltages, active power and reactive power are kV, MW and MVar, respectively; “G” denotes the output energy of generator and “L” denotes the load of station.\n\nTable 2. Generator parameters in IEEE 9-node test system.\n\nnot be obeyed inflexibly, and generator parameters’ combinations should also be taken into consideration.\n\n4.2. Sensitivity of Transient Stability of Power System to Generator Parameters\n\nFrom a good many simulation experiments, the author finds that the transient stability of power system is very sensitive to the values of ${{X}^{″}}_{\\text{d}}/{{X}^{\\prime }}_{\\text{d}}$ and ${{X}^{″}}_{\\text{q}}/{{X}^{\\prime }}_{\\text{q}}$ . If one of these two values is greater than 0.95, under large-disturbance the power angle curve of generator tends to oscillate greatly and damp slowly, or even diverges, implying generator is out of transient stability. Simulation results in Figure 2 and Figure 3 have illustrated this fact, and therefore the appropriateness of the combinations of ${{X}^{\\prime }}_{\\text{d}}$ , ${{X}^{″}}_{\\text{d}}$ , ${{X}^{\\prime }}_{\\text{q}}$ and ${{X}^{″}}_{\\text{q}}$ can be tested and checked by transient stability simulation experiments.\n\nFigure 2 shows the power angle curves of GEN3 under two different conditions, i.e. ${{X}^{″}}_{\\text{d}}/{{X}^{\\prime }}_{\\text{d}}<0.95$ and ${{X}^{″}}_{\\text{d}}/{{X}^{\\prime }}_{\\text{d}}>0.95$ , respectively. The large-disturbance set in the simulation is a three-phase permanent fault on the 220 kV transmission line\n\nFigure 2. The sensitivity of transient stability of power system to ${{X}^{″}}_{\\text{d}}/{{X}^{\\prime }}_{\\text{d}}$ .\n\nFigure 3. The sensitivity of transient stability of power system to ${{X}^{″}}_{\\text{q}}/{{X}^{\\prime }}_{\\text{q}}$ .\n\nBUS1-STATION B: at 0 s, a three-phase short-circuit fault occurs on the side of STATION B; at 0.2 s, the breakers on both sides trip to clear the fault but do not reclose. From the comparison of the power angle curves in Figure 2(a) and Figure 2(b), it is seen that the former returns to a smooth line quickly, while the latter oscillates ceaselessly and cannot damp to a straight line for a very long time.\n\nThe large-disturbance set in the simulation of Figure 3 is the same as that in Figure 2. Because the power angle curve of GEN3 with ${{X}^{″}}_{\\text{q}}/{{X}^{\\prime }}_{\\text{q}}<0.95$ is similar to Figure 2(a), the simulation of Figure 3 considers only the situation of ${{X}^{″}}_{\\text{q}}/{{X}^{\\prime }}_{\\text{q}}>0.95$ . Again, because GEN3 in this situation has been out of transient stability, the power angle curve oscillates so great that it has exceeded the drawing ranges of PSD-BPA and thus can not be displayed properly. Therefore, the power angle curve here is replaced by the system frequency curve shown in Figure 3, which is recorded by the simulation process supervisor and presents the status of power system indirectly. In Figure 3, the system frequency curve oscillates severely and has already been impossible to return to a straight line, illustrating also that GEN3 is out of transient stability.\n\n4.3. Sensitivity of Dynamic Stability of Power System to Generator Parameters\n\nThe common steps to analyze the dynamic stability of power system are as follows.\n\n1) Use the small-disturbance analysis method, i.e. the frequency-domain method, to decompose the oscillation modes, and then calculate the real part, imaginary part, frequency and damping ratio of each oscillation mode, together with the electromechanical circuit correlation ratio, the modulus and phase angle of the right eigenvector, and the participation factors of the generators participating in the oscillation.\n\n2) Use Prony method, a famous time-domain method, to analyze the active powers of some important interconnection transmission lines under large-disturbance and decompose them into a number of oscillation modes as well.\n\n3) Try to find out the oscillation modes under large-disturbance, which are consistent with those found by small-disturbance analysis. If such oscillation modes are found, it can be concluded that the analytic results in frequency domain and time domain are consistent with each other, and that the dynamic stability analysis above is valid.\n\nAccording to the foregoing steps, firstly, apply the small-disturbance analysis to the IEEE 9-node test system. From the small-disturbance analysis, 6 oscillation modes are obtained, wherein only 1 oscillation mode has an electromechanical circuit correlation ratio that is greater than 1.0, meaning that it is the dominant oscillation mode (DOM). Due to this, for brevity, the tables and figures in this subsection show only the details of this DOM. And in Tables 3-7 and Figures 4-8, the sensitivities of the frequency and damping ratio of the DOM to GEN3’s parameters ${{T}^{\\prime }}_{\\text{d0}}$ , ${{T}^{\\prime }}_{\\text{q0}}$ , ${{T}^{″}}_{\\text{d0}}$ , ${{T}^{″}}_{\\text{q0}}$ and TJ are illustrated respectively, where the variation ranges of GEN3’s parameters are conform to Table 1.\n\nTable 3 and Figure 4 show that under small disturbance, with ${{T}^{\\prime }}_{\\text{d0}}$ increasing, the frequency and damping ratio of the DOM are gradually decreasing. Table 4 and Figure 5 show that under small disturbance, with ${{T}^{\\prime }}_{\\text{q0}}$ increasing, the frequency and damping ratio of the DOM are slightly increasing; however, on the whole they are not sensitive to ${{T}^{\\prime }}_{\\text{q0}}$ . Table 5 and Figure 6 show that under small disturbance, with ${{T}^{″}}_{\\text{d0}}$ increasing, the frequency of the DOM is almost unchanged, while the damping ratio is gradually decreasing. Table 6 and Figure 7 show that under small disturbance, with ${{T}^{″}}_{\\text{q0}}$ increasing, the frequency of the DOM is slightly decreasing and not sensitive to ${{T}^{″}}_{\\text{q0}}$ on the whole, while the\n\nTable 3. The sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{d0}}$ under small disturbance.\n\nFigure 4. The curves of the sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{d0}}$ under small disturbance.\n\nTable 4. The sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{q0}}$ under small disturbance.\n\nFigure 5. The curves of the sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{q0}}$ under small disturbance.\n\nTable 5. The sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{d0}}$ under small disturbance.\n\nFigure 6. The curves of the sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{d0}}$ under small disturbance.\n\nTable 6. The sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{q0}}$ under small disturbance.\n\nFigure 7. The curves of the sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{q0}}$ under small disturbance.\n\ndamping ratio has a small tendency of increasing. Table 7 and Figure 8 show that under small disturbance, only when TJ is smaller than a specific value, e.g. 6.5s as shown in Figure 8, are the frequency and damping ratio of the DOM sensitive to TJ.\n\nTable 7. The sensitivity of DOM’s characteristics to TJ under small disturbance.\n\nFigure 8. The curves of the sensitivity of DOM’s characteristics to TJ under small disturbance.\n\nSecondly, apply the large-disturbance analysis to the IEEE 9-node test system to testify the simulation results derived from the preceding small-disturbance analysis. The large disturbance set in the simulation here is the same three-phase permanent fault on 220 kV transmission line BUS1-STATION B as the one in Subsection 4.2. And the resultant active power of the 220 kV transmission line BUS2-STATION A is analyzed by Prony method. Likewise, in Tables 8-12 and Figures 9-13, the sensitivities of the frequency and damping ratio of the DOM to GEN3’s parameters ${{T}^{\\prime }}_{\\text{d0}}$ , ${{T}^{\\prime }}_{\\text{q0}}$ , ${{T}^{″}}_{\\text{d0}}$ , ${{T}^{″}}_{\\text{q0}}$ and TJ are illustrated respectively.\n\nTable 8 and Figure 9 show that under large disturbance, with ${{T}^{\\prime }}_{\\text{d0}}$ increasing, the frequency of the DOM is gradually decreasing, while the damping ratio is first increasing and then (at about 6 s) decreasing. Table 9 and Figure 10 show that under large disturbance, with ${{T}^{\\prime }}_{\\text{q0}}$ increasing, the frequency and damping ratio of the DOM are slightly oscillating across a straight line and their mean values are almost unchanged. Table 10 and Figure 11 show that under large disturbance, with ${{T}^{″}}_{\\text{d0}}$ increasing, the frequency of the DOM is not sensitive to ${{T}^{″}}_{\\text{d0}}$ and is almost unchanged, while the damping ratio is first increasing and then (at about 0.035 s) decreasing. Table 11 and Figure 12 show that under large disturbance, with ${{T}^{″}}_{\\text{q0}}$ increasing, the frequency of the DOM is slightly decreasing, while the damping ratio has a tendency of increasing. Table 12 and Figure 13 show that under large disturbance, only when TJ is smaller than a specific value, e.g. 6.5 s as shown in Figure 13, is the frequency of the DOM sensitive to TJ, while the damping ratio is first increasing and then (at about 4.7 s) decreasing.\n\nNow, by successively comparing the simulation results obtained from the time-domain method under large disturbance with those obtained from the frequency-domain method under small disturbance, we can see that the DOM’s frequency changes with generator parameters in both the time-domain analysis\n\nTable 8. The sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{d0}}$ under large disturbance.\n\nFigure 9. The curves of the sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{d0}}$ under large disturbance.\n\nTable 9. The sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{q0}}$ under large disturbance.\n\nFigure 10. The curves of the sensitivity of DOM’s characteristics to ${{T}^{\\prime }}_{\\text{q0}}$ under large disturbance.\n\nTable 10. The sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{d0}}$ under large disturbance.\n\nFigure 11. The curves of the sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{d0}}$ under large disturbance.\n\nTable 11. The sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{q0}}$ under large disturbance.\n\nFigure 12. The curves of the sensitivity of DOM’s characteristics to ${{T}^{″}}_{\\text{q0}}$ under large disturbance.\n\nand frequency-domain analysis are consistent with each other, while the DOM’s damping ratio changes with generator parameters, except ${{T}^{\\prime }}_{\\text{q0}}$ and ${{T}^{″}}_{\\text{q0}}$ , are different from each other. It is because the frequency of an oscillation mode is determined by the inherent structural characteristic of power system, and thus is irrelevant to the operation mode and disturbance type of power system. And it is\n\nTable 12. The sensitivity of DOM’s characteristics to TJ under large disturbance.\n\nFigure 13. The curves of the sensitivity of DOM’s characteristics to TJ under large disturbance.\n\nlike the natural vibration frequency of a mechanical system. However, the damping ratio is not determined by the inherent structural characteristic of power system, and therefore it is sensitive to the operation mode and disturbance types of power system.\n\nAt the end of this section, two perspectives should be pointed out.\n\n1) The non-dominant oscillation modes’ frequency and damping ratio changes with generator parameters are similar to those of the DOM’s, and therefore the conclusions derived from the DOM are applicable to the non-dominant oscillation modes.\n\n2) If the damping ratio of certain oscillation mode is used to test and check generator parameters, the results obtained under small disturbance and large disturbance should be analyzed separately.\n\n5. Testing and Checking Excitation Systems and PSS Parameters\n\nExcept generator parameters per se, the adjustment of the parameters of excitation systems and PSS also plays an important role in ensuring the stability of generators and power system, and therefore the parameters of excitation systems and PSS are always treated as a requisite component of generator parameters. For this, this section proposes the engineering methods for testing and checking the parameters of excitation systems and PSS parameters.\n\n5.1. Testing and Checking Excitation System Parameters\n\nThe engineering method for testing and checking excitation systems parameters includes 4 steps.\n\n1) Stop the operation of the PSS of the tested generator.\n\n2) Isolate the tested generator from the electric network.\n\n3) Adjust the reference voltage of excitation system according to a specific function, e.g. step function or ramp function.\n\n4) Investigate whether the output voltage of generator is able to track the reference voltage effectively, and here the “effective track” means that the rising edge is steep, the overshoot is small and the steady area has no great oscillations.\n\nIt should be pointed out that a practical and effective way to finish step 4) is to compare the output voltage curve of the tested generator with that of a reference generator which has the correct parameters of both generator and excitation system. Here, the output voltage curve of the reference generator is named as classic curve. If the differences of the two curves are fairly small, it then can be inferred that the excitation system parameters are appropriate from the perspective of application; otherwise, it can be concluded that the excitation system parameters are inappropriate or ineffective, and should be adjusted again or measured directly from field test.\n\nFigure 14 shows the output voltage curve of GEN3 in the IEEE 9-node test system, where for comparison a classic curve is superposed on the figure. From Figure 14(a) and Figure 14(b), it is seen that the differences between the output voltage curve of GEN3 and the classic curve with different excitation system parameters are both acceptably small, meaning that the excitation system parameters\n\nFigure 14. The simulation testing and checking of excitation system parameters.\n\nof GEN3 has good robustness. It should be noted that excitation system parameters depend mainly on the dynamic amplification coefficient of its automatic voltage regulator (AVR) . In Figure 14(a), the dynamic amplification coefficient is relatively big, and it is seen that the response of the output voltage of GEN3 is fast but the overshoot is large; in Figure 14(b), the dynamic amplification coefficient is relatively small, and it is seen that the output voltage of GEN3 has no overshoot but the response is slow. Therefore, on the premise of guaranteeing stability, the dynamic amplification coefficient can be properly adjusted to meet the specific practical requirement.\n\n5.2. Testing and Checking PSS Parameters\n\nThe engineering method for testing and checking PSS parameters also includes 4 steps.\n\n1) Set up the “double machines and double lines” simulation system as shown in Figure 15(a), where GEN3’s parameters are the same as those in the IEEE 9-node test system, and other component’s parameters are labeled in the figure.\n\n2) Set a three-phase permanent fault on transformer’s high-voltage side bus: at 0 s, a three-phase short-circuit fault occurs; at 0.1 s, the breakers on both sides of the transmission lines trip to clear the fault and do not reclose.\n\n3) Switch on and off the PSS of GEN3, respectively.\n\n4) Compare the damping speeds of the oscillations of GEN3’s output power under the two conditions above. If the damping speed of the oscillation of the output power is much faster when PSS is switched on than that when PSS is switched off, it can be concluded that PSS parameters are appropriate; otherwise, PSS parameters should be readjusted.\n\nFigure 15. The simulation testing and checking of PSS parameters.\n\n6. Conclusion\n\nThis paper analyzes the sensitivity of power system stability to generator parameters, including the parameters of generator, excitation system and PSS from plenty of simulation experiments. Because the simulation processes are closely related to the engineering practice and do not involve any complex theoretical analysis, the summarized rules and conclusions are evident and practical, and thus can be directly referenced or applied by electrical engineers. Based on these rules and conclusions, some feasible methods are proposed for testing and checking generator parameters quickly, which may greatly promote the working efficiencies of electrical engineers. Although the simulation examples used in this paper is very simple, the resultant conclusions are of generality and can be easily testified by readers in their researching and working activities.\n\nAcknowledgements\n\nThis research is supported by the Science and Technology Research Project of Chongqing Educational Committee (KJ1603605) and the Natural Science Fund Project of Yongchuan District Science and Technology Committee (Ycstc, 2016nc3001).\n\nConflicts of Interest\n\nThe author declares no conflicts of interest regarding the publication of this paper.\n\nCite this paper\n\nSun, X.M. (2019) Analysis on Sensitivity of Power System Stability to Generator Parameters. Journal of Power and Energy Engineering, 7, 165-182. https://doi.org/10.4236/jpee.2019.71009\n\nReferences\n\n1. 1. Kim, D.J., Moon, Y.H., Lee, J.J., Ryu, H.S. and Kim, T.H. (2018) A New Method of Recording Generator Dynamics and Its Application to the Derivation of Synchronous Machine Parameters for Power System Stability Studies. IEEE Transactions on Energy Conversion, 33, 605-616. https://doi.org/10.1109/TEC.2017.2772234\n\n2. 2. Hasan, K.N., Preece, R. and Milanović, J. (2018) Application of Game Theoretic Approaches for Identification of Critical Parameters Affecting Power System Small-Disturbance Stability. International Journal of Electrical Power and Energy Systems, 97, 344-352. https://doi.org/10.1016/j.ijepes.2017.11.027\n\n3. 3. Izena, A., Kihara, H., Shimojo, T., Hirayama, K. and Furukawa, N. (2008) Generator Voltage Building-Up Field Test for 500 kV Transformer Energization for Black-Start Power System. IEEJ Transactions on Power and Energy, 128, 641-646. https://doi.org/10.1541/ieejpes.128.641\n\n4. 4. Hasegawa, K. and Imai, Y. (2002) Field Test of 70 MW Class Superconducting Generator. Cryogenics, 42, 191-197. https://doi.org/10.1016/S0011-2275(02)00034-6\n\n5. 5. Leonard, L.G. (2012) Power System Stability and Control. 3rd Edition, JCRC Press Inc., Taylor & Francis Group, Boca Raton.\n\n6. 6. IEEE (2007) IEEE Guide for Synchronous Generator Modeling Practices and Applications in Power System Stability Analyses. Revision of IEEE Std., 1110-1991. https://ieeexplore.ieee.org/document/1251520\n\n7. 7. Guo, Y.Z., Huang, R.M., Zhu, M. and Cai, X. (2018) Reexamination of New-Generation General Wind Turbine Models in PSD-BPA Transient Stability Simulation Program. Proceedings of the 13th IEEE Conference on Industrial Electronics and Applications, ICIEA 2018, Wuhan, 31 May-2 June 2018, 588-593. https://doi.org/10.1109/ICIEA.2018.8397784\n\n8. 8. Yan, C.Y., Wang, M. and Lu, J.J. (2013) The Contrast between the Models’ in PSD-BPA and those in PSASP. Advanced Materials Research, 614-615, 1055-1064. https://doi.org/10.4028/http://www.scientific.net/AMR.614-615.1055\n\n9. 9. Han, S., Rong, N., Sun, T. and Peng, X.J. (2013) Study on Conversion between the Common Models of PSD-BPA and PSS/E. Proceedings of 2013 IEEE 11th International Conference on Electronic Measurement and Instruments, ICEMI 2013, Harbin, 16-19 August 2013, 64-69. https://doi.org/10.1109/ICEMI.2013.6743040\n\n10. 10. Power System Department of China (2007) PSD Software Program Training Manual. https://wenku.baidu.com/view/0282520a79563c1ec5da713f.html\n\n11. 11. Yegireddy, N.K., Panda, S., Papinaidu, T. and Yadav, K.P.K. (2018) Multi-Objective Non-Dominated Sorting Genetic Algorithm-II Optimized PID Controller for Automatic Voltage Regulator Systems. Journal of Intelligent and Fuzzy Systems, 35, 4971-4975. https://doi.org/10.3233/JIFS-169781\n\n12. 12. Hoque, M.M. (2014) Design, Implementation and Performance Study of Programmable Automatic Voltage Regulator. Journal of Electrical Systems, 10, 472-483."
]
| [
null,
"https://html.scirp.org/file/9-1770575x1.png",
null,
"https://html.scirp.org/file/9-2500537x3.png",
null,
"https://html.scirp.org/file/9-2500537x2.png",
null,
"https://html.scirp.org/file/18-1760983x4.png",
null,
"https://html.scirp.org/file/2-1410169x6.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.86796343,"math_prob":0.9914802,"size":29444,"snap":"2023-14-2023-23","text_gpt3_token_len":6410,"char_repetition_ratio":0.17252038,"word_repetition_ratio":0.13731144,"special_character_ratio":0.21641082,"punctuation_ratio":0.13612375,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9984918,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,4,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-08T16:23:50Z\",\"WARC-Record-ID\":\"<urn:uuid:1dadd79a-994b-481a-a6e2-a4720238bca4>\",\"Content-Length\":\"124298\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:248edbb8-3b46-4211-839f-b90a8e4be757>\",\"WARC-Concurrent-To\":\"<urn:uuid:50dd0030-1ce3-4dd9-8bff-9b5fcb51f677>\",\"WARC-IP-Address\":\"107.191.112.46\",\"WARC-Target-URI\":\"https://file.scirp.org/Html/9-1770575_90289.htm\",\"WARC-Payload-Digest\":\"sha1:BJ52I7U5MU4VZ6LIM3OD2EMXU2JGABP2\",\"WARC-Block-Digest\":\"sha1:UHWYL4QTNO5P5L676N2OZFYNEL7OSGW5\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224655027.51_warc_CC-MAIN-20230608135911-20230608165911-00496.warc.gz\"}"} |
https://www.watchawear.com/help/tips-tutorials-tricks/40-smooth-day-rotation.html | [
"### Login to WatchAwear\n\n9\n\n#### smooth day rotation\n\nI've tried to make a smooth day rotation and here is my (quick & dirty) solution:\nphotoshop: draw a circle path and place numbers (01 - 31) [text ring layer doesn't work] - save it as an image; load it into watchmaker\n\n-- lua testscript for smooth day rotation\nstart_rotation = -3 -- in this example, our real 0 position is -3\nday_degrees = 11,86 -- degrees until next day (360/31 = 11,61)\nvar_s_daterotation = 0 -- this is our rotation\n\n-- *** we need some global vars to test ***\n-- date vars\ndd = {dd} -- day\nddim = {ddim} -- day of month\n-- hour vars\ndh24 = {dh24} -- hour\ndm = {dm} -- minute\nds = {ds} -- second\n\nfunction get_start_rotation(dd, dh, dm, ds)\nr = day_degrees * (dd - 1) -- r = start rotation\nr = r * -1 -- we rotate counterclockwise, so multiply with -1\nr = r + start_rotation\n\n-- r is now our rotation from (today, 00:00:00)\n\ndp = day_degrees / 86400 -- each second, we will rotate x percent more\ns = (dh * 3600) + (dm * 60) + ds -- our actually seconds\n\nreturn r + ((s * dp) * -1) -- give our real rotation back\nend\n\n-- *** init our rotation ***\nvar_s_daterotation = get_start_rotation(dd, dh24, dm, ds)\n\n-- *** just testing, but nessessary ***\nx = 51 -- in real, change to 1 (I've add 51 to each second & minute for testing)\n\nfunction on_second()\nds = ds + x\nif ds > 59 then\nds = 0\ndm = dm + x\nif dm > 59 then\ndm = 0\ndh24 = dh24 + 1\nif dh24 > 23 then\ndh24 = 0\ndd = dd + 1\nif dd > ddim then\ndd = 1\nddim = {ddim}\nend\nend\nend\nend\n\nvar_s_daterotation = get_start_rotation(dd, dh24, dm, ds)\nend\n\nPublished by Sabine Mayerhagen on 17 March 2017WatchMaker Tips & Tricks Posted\n\nDownload the\n'WatchAwear - Resources for WatchMaker' App",
null,
"Download The Best Watch Designing App\nfor Wear OS, and Tizen:",
null,
"No smartwatch required!!\nBest clock wallpaper for Android!",
null,
""
]
| [
null,
"https://www.watchawear.com/images/app.png",
null,
"https://www.watchawear.com/images/watchmaker-app.png",
null,
"https://www.watchawear.com/images/watchmaker-live-wallpaper-app.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6067799,"math_prob":0.98808783,"size":1521,"snap":"2021-04-2021-17","text_gpt3_token_len":504,"char_repetition_ratio":0.14106789,"word_repetition_ratio":0.012618297,"special_character_ratio":0.39250493,"punctuation_ratio":0.08058608,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9806441,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-17T12:17:04Z\",\"WARC-Record-ID\":\"<urn:uuid:5953afbd-b451-4632-9b75-9d35296f6f11>\",\"Content-Length\":\"22813\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3dc9e3f9-07c6-4f23-bec2-db51dbe00148>\",\"WARC-Concurrent-To\":\"<urn:uuid:0555cbbb-57c6-4d27-835b-f59edd60aac9>\",\"WARC-IP-Address\":\"198.12.251.148\",\"WARC-Target-URI\":\"https://www.watchawear.com/help/tips-tutorials-tricks/40-smooth-day-rotation.html\",\"WARC-Payload-Digest\":\"sha1:BYO3URGOB5BYOQH3FHO6RVTUPCAV6ILJ\",\"WARC-Block-Digest\":\"sha1:JYXL7GCAPDLOSCU7KSOCEM3GSLIOSSQY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038119532.50_warc_CC-MAIN-20210417102129-20210417132129-00144.warc.gz\"}"} |
https://fatareforms.org/3335/how-do-you-find-the-class-boundaries-in-a-frequency-distribution/ | [
"# How do you find the class boundaries in a frequency distribution?\n\nThe lower boundary of each class is calculated by subtracting half of the gap value 12=0.5 1 2 = 0.5 from the class lower limit. On the other hand, the upper boundary of each class is calculated by adding half of the gap value 12=0.5 1 2 = 0.5 to the class upper limit. Simplify the lower and upper boundaries columns.\n\nThe lower class boundary is found by subtracting 0.5 units from the lower class limit and the upper class boundary is found by adding 0.5 units to the upper class limit. The difference between the upper and lower boundaries of any class.\n\ndoes the frequency distribution appear to have a normal distribution? No, the distribution does not appear to be normal. Does the frequency distribution appear to have a normal? distribution? Explain. Yes, because the frequencies start? low, proceed to one or two high? frequencies, then decrease to a low? frequency, and the distribution is approximately symmetric.\n\nAlso, how do you find the frequency distribution?\n\nSteps to Making Your Frequency Distribution\n\n1. Step 1: Calculate the range of the data set.\n2. Step 2: Divide the range by the number of groups you want and then round up.\n3. Step 3: Use the class width to create your groups.\n4. Step 4: Find the frequency for each group.\n\nHow do you find the class frequency?\n\nCount the tally marks to determine the frequency of each class. The relative frequency of a data class is the percentage of data elements in that class. The relative frequency can be calculated using the formula fi=fn f i = f n , where f is the absolute frequency and n is the sum of all frequencies.\n\n### How do you find the class width in a frequency table?\n\nCalculating Class Width in a Frequency Distribution Table Calculate the range of the entire data set by subtracting the lowest point from the highest, Divide it by the number of classes. Round this number up (usually, to the nearest whole number).\n\n### How do you calculate upper class boundaries?\n\nThe lower boundary of each class is calculated by subtracting half of the gap value 12=0.5 1 2 = 0.5 from the class lower limit. On the other hand, the upper boundary of each class is calculated by adding half of the gap value 12=0.5 1 2 = 0.5 to the class upper limit. Simplify the lower and upper boundaries columns.\n\n### How do you find the upper class limit?\n\nTo find the upper limit of the first class, subtract one from the lower limit of the second class. Then continue to add the class width to this upper limit to find the rest of the upper limits. Find the boundaries by subtracting 0.5 units from the lower limits and adding 0.5 units from the upper limits.\n\n### What do you mean by frequency distribution?\n\nFrequency distribution is a representation, either in a graphical or tabular format, that displays the number of observations within a given interval. Frequency distributions are typically used within a statistical context.\n\n### How do you find the cumulative frequency?\n\nThe cumulative frequency is calculated by adding each frequency from a frequency distribution table to the sum of its predecessors. The last value will always be equal to the total for all observations, since all frequencies will already have been added to the previous total.\n\n### What is class mark?\n\nThe class midpoint (or class mark) is a specific point in the center of the bins (categories) in a frequency distribution table; It’s also the center of a bar in a histogram. It is defined as the average of the upper and lower class limits.\n\n### What is class boundary?\n\nClass boundary is the midpoint of the upper class limit of one class and the lower class limit of the subsequent class. Each class thus has an upper and a lower class boundary.\n\n### How do you find lower frequency and relative class limit?\n\nMidpoint = Lower class limit + Upper class limit 2 . The “relative frequency” of each class is the proportion of the data that falls in that class. It can be calculated for a data set of size n by: Relative frequency = Class frequency Sample size = f n .\n\n### What is the difference between relative frequency and cumulative frequency?\n\nWhat is the difference between relative frequency and cumulative? frequency? Relative frequency of a class is the percentage of the data that falls in that? class, while cumulative frequency of a class is the sum of the frequencies of that class and all previous classes.\n\n### How do you find upper and lower limits?\n\nAdd three times the standard deviation to the average to get the upper control limit. Subtract three times the standard deviation from the average to get the lower control limit.\n\n### What is class limits in statistics?\n\nClass limits. The lower class limit of a class is the smallest data value that can go into the class. The upper class limit of a class is the largest data value that can go into the class. Class limits have the same accuracy as the data values; the same number of decimal places as the data values."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.89243674,"math_prob":0.9811587,"size":5339,"snap":"2022-05-2022-21","text_gpt3_token_len":1134,"char_repetition_ratio":0.20431115,"word_repetition_ratio":0.18335089,"special_character_ratio":0.21408503,"punctuation_ratio":0.103415556,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99868995,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-18T06:12:21Z\",\"WARC-Record-ID\":\"<urn:uuid:aebc2840-9093-46f9-a50f-9c7c4634246f>\",\"Content-Length\":\"40694\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:75827223-96cf-4ea9-8cd1-83669bb04245>\",\"WARC-Concurrent-To\":\"<urn:uuid:30b2428c-055e-44c6-8e02-573f0eedfbf6>\",\"WARC-IP-Address\":\"104.21.2.45\",\"WARC-Target-URI\":\"https://fatareforms.org/3335/how-do-you-find-the-class-boundaries-in-a-frequency-distribution/\",\"WARC-Payload-Digest\":\"sha1:P5GFIHA2CI3PC675ITVIVQL6NRR6IX37\",\"WARC-Block-Digest\":\"sha1:YZLSYVZCYFKAI77O7CBZOE7GJ655YYSL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662521152.22_warc_CC-MAIN-20220518052503-20220518082503-00193.warc.gz\"}"} |
https://www.it.uu.se/edu/course/homepage/ai/vt05/AI-theorem.html | [
"# Theorem proving, resolution\n\nLuger: 2.3, 13, (15)\n\n## Why theorem proving in an AI course?\n\n• proving theorems is considered to require high intelligence\n• if knowledge is represented by logic, theorem proving is reasoning\n• theorem proving uses AI techniques, such as (heuristic) search\n• (study how people prove theorems. Differently!)\n\n## What is theorem proving?\n\nReasoning by theorem proving is a weak method, compared to experts systems, because it does not make use of domain knowledge. This, on the other hand, may be a strength, if no domain heuristics are available (reasoning from first principles). Theorem proving is usually limited to sound reasoning.\n\nDifferentiate between\n\n• theorem provers: fully automatic\n• proof assistants: require steps as input, take care of bookkeeping and sometimes 'easy' proofs.\nTheorem proving requires\n• a logic (syntax)\n• a set of axioms and inference rules\n• a strategy on when how to search through the possible applications of the axioms and rules\nExamples of axioms\np -> (q->p)\n(p->(q->r)) -> ((p->q) ->(p->r))\np \\/ ~p\np->(~p->q)\nNotation: I use ~ for \"not\", since it's on my keyboard.\n\nExamples of inference rules\n\n name from derive modus ponens p, p->q q modus tollens p->q, ~q ~p and elimination p/\\q p and introduction p, q p/\\q or introduction p p\\/q instantiation for all X p(X) p(a) rename for all X phi(X) for all Y phi(Y) exists-introduction p(a) exists X p(X) substitution phi(p) phi(psi) replacement p->q ~p\\/q implication assume p ... ,q p->q contradiction assume ~p ...,false p resolution p\\/phi, ~p\\/psi phi \\/ psi (special case) p, ~p\\/psi psi (more special case) p, ~p false\n\nStrategies\nforwards - start from axioms, apply rules\nbackwards - start from the theorem (in general: a set of goals), work backwards to the axioms\n\nwhen to apply which rule\n\ngeneral questions:\nare the rules correct (sound)?\nis there a proof for every logical consequence (complete)?\ncan we remove rules (redundant)?\nHaving redundant rules may allow shorter proofs, but a larger search space.\n\n## Resolution and refutation\n\nWe want to prove theory -> goal.\nThe theory is usually a set of facts and rules, that can be treated as axioms (by the rule called implication above). A theory is usually quite stable, and used to prove various goals.\n• we use contradiction, add ~goal to the axioms, and try to prove false.\n• the theory and ~goal are put in clausal form - a set (conjunction) of clauses\n[see Luger p 558-560]\n• use resolution and unification to derive false\nClauses\na clause is a universially quantified disjunction of literals\na literal is an atomic formula or its negation\nexamples of clauses: p \\/ q, p(X) \\/ q(Y), ~p(X) \\/ q(X).\nA special case is Horn-clauses: they have at most one positive (not negated) literal.\nThree subclasses:\nfacts (1 pos, 0 neg): p(a,b).\nrules (1 pos, > 0 neg): ~p \\/ ~q \\/ r - often written as: p /\\ q -> r\ngoals(0 pos): ~p \\/ ~q - if we want to prove p/\\q from the theory, we add this clause - can be written as p /\\ q -> false\n\nSkolemization (p. 559)\nHow to remove existential quantification? Use function symbols!\nExample: every person has a mother: (for all X) person(X) -> (exists Y) mother(X,Y)\nGive a name to Y: the mother of X. (for all X) person(X) -> mother(X,mother_of(X))\n\nThis allows us to define datastructures in the logic.\nExample: if X is an element and Y a list, then there is a list with head X and tail Y.\n(for all X,Y) elt(X) /\\ list(Y) -> (exists Z) list(Z) /\\ head(Z,X) /\\ tail(Z,Y)\nfirst we name Z the cons of X and Y, then we get 3 rules:\nelt(X) /\\ list(Y) -> list(cons(X,Y)).\nelt(X) /\\ list(Y) -> head(cons(X,Y), X).\nelt(X) /\\ list(Y) -> tail(cons(X,Y), Y).\n\n### Unification\n\nUnification (2.3.2) is used to perform instantiation before (during) resolution.\n\nSimple case:\nResolve list(nil) with ~elt(X) \\/ ~list(Y) \\/ list(cons(X,Y)).\nFirst we must instantiate Y to nil, then we can derive ~elt(X) \\/ list(cons(X,nil)).\n\nHard case:\nI want to prove that there is a list that has the head mother_of(john).\nSo I take as a goal its negation ~(exists X)(list(X) /\\ head(X,mother_of(john)))\nThis gives the clause ~list(X) \\/ ~head(X,mother_of(john))\nWe can resolve with ~elt(X) \\/ ~list(Y) \\/ head(cons(X,Y),X).\nProblem 1: the X's in both clauses \"accidentally\" have the same name.\nSolution 1: rename to ~elt(Z) \\/ ~list(Y) \\/ head(cons(Z,Y),Z).\nThe unifier is: {Z/mother_of(john), X/cons(mother_of(john),Y)}\nThe resolvent (resulting clause) is\n(~list(X) \\/ ~elt(Z) \\/ ~list(Y)){Z/mother_of(john), X/cons(mother_of(john),Y)} =\n~list(cons(mother_of(john),Y)) \\/ ~elt(mother_of(john)) \\/ ~list(Y)\n\nExercise: use the first list-rule and the facts elt(mother_of(john)) and list(nil)to complete the proof.\n\nUnification as rewriting\nthe algorithm maintains a set of equalities. Each time, remove an equality and apply the applicable rule.\n\n• Var1 = Var1 - nothing (just remove the equality)\n• Var1 = Expr - in all other equalities, replace Var1 by Expr, keep Var1 = Expr\nexception: if Var1 occurs in Expr, then FAIL\n• f(A1,..,An) = f(B1,..,Bn) - add {A1 = B1, .., An = Bn}\n• f(A1,..,An) = g(B1,..,Bm) - FAIL\nExample (the equality selected is underlined)"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.77942294,"math_prob":0.9807572,"size":6228,"snap":"2020-10-2020-16","text_gpt3_token_len":1811,"char_repetition_ratio":0.123071976,"word_repetition_ratio":0.005934718,"special_character_ratio":0.29174694,"punctuation_ratio":0.14771849,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9985334,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-27T22:53:36Z\",\"WARC-Record-ID\":\"<urn:uuid:c89c3be5-264a-4efb-95de-673982eea241>\",\"Content-Length\":\"9072\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4928132-8f53-4685-91db-92ce687f3bac>\",\"WARC-Concurrent-To\":\"<urn:uuid:20637e11-4c60-4787-b4dc-f2f75ed65907>\",\"WARC-IP-Address\":\"130.238.12.100\",\"WARC-Target-URI\":\"https://www.it.uu.se/edu/course/homepage/ai/vt05/AI-theorem.html\",\"WARC-Payload-Digest\":\"sha1:JKRE7HDVFHQAQCCB2L76O64HN6ZDRSCW\",\"WARC-Block-Digest\":\"sha1:BYSVMDGO6ZYA2AVPTA3ILVS43YCMQDD6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146907.86_warc_CC-MAIN-20200227221724-20200228011724-00220.warc.gz\"}"} |
https://math.stackexchange.com/questions/1332807/hermitian-matrices-with-repeated-eigenvalues-has-codimension-3 | [
"# Hermitian Matrices with Repeated Eigenvalues has Codimension 3?\n\nIt is sometimes claimed that\n\nthe space of $n\\times n$ Hermitian matrices with at least one repeated eigenvalue has codimension 3.\n\nThe proof of this in dimension two is very simple: by diagonalizing a $2\\times 2$ Hermitian matrix $H$, we easily conclude that if $H$ has the same eigenvalue twice, then $H$ must be a constant multiple of the $2\\times 2$ identity matrix, and this space has dimension 1, versus 4 for the space of $2\\times 2$ Hermitian matrices.\n\nHowever, I'm having difficulties with (what I believe to be) the standard demonstration of this in higher dimensions (provided in the paper \"On the Behaviour of Eigenvalues in Adiabatic Processes\" by Von Neumann and Wigner). From what I can tell, the demonstration (outline) goes goes as follows:\n\n1. An $n\\times n$ Hermitian matrix $H$ can be written as $UDU^*$, where $U$ is unitary and $D$ is diagonal and contains the eigenvalues, say in increasing order.\n2. The decomposition $UDU^*$ is not unique, but if we have $WDW^*$ for another unitary matrix $W$, then we can write $W=UV$, where $V$ commutes with $D$, and so one could argue we can fix $U$ and $D$, and then write $H=(UV)D(UV)^*$, where $V$ can be any unitary matrix that commutes with $D$.\n3. Thus, the number of real parameters one needs to specify the matrix $H$ would be $n^2+f-v$, where $n^2$ is the number of real parameters to specify a fixed unitary matrix $U$, $f$ is the number of parameters to specify the real eigenvalues of $D$, and $v$ is the number of parameters to specify $V$.\n4. We can show that, if $f$ is the number of eigenvalues of $H$, and $g_1,\\ldots,g_f$ are the multiplicities of the eigenvalues (i.e., $g_1+\\cdots+g_f=n$), then $v=g_1^2+g_2^2+\\cdots+g_f^2$.\n5. Therefore, if there is a repeated eigenvalue ($g_i\\geq 2$ for at least one $i$), the number of parameters will be at most $n^2-3$, hence the space of Hermitian matrices with repeated eigenvalues has codimension 3.\n\nMy problems with this are the following:\n\n• In the case of $2\\times 2$ matrices, it is clear that the space of Hermitian matrices with repeated eigenvalues is a vector space, as it consists of the multiples of the identity matrix. However, it is not at all clear to me that this is the case in higher dimensions.\n• In step 3. above, I don't understand how one just removes the parameters used to specify $V$ from the total amount of parameters. If it were argued that we have double counted some parameters and that we must now remove them, this would be fine, but it seems that we start with $n^2+f$ parameters and that we then somehow remove parameters that are completely unrelated to the previous ones.\n• Finally, I'm not sure I understand the connection between parameters and dimension. While it is true that Unitary matrices can be specified with $n^2$ numbers, we can't say that the space of Unitary matrices has dimension $n^2$ because unitary matrices do not form a linear subspace. So, I'm not sure how this business of counting parameters rigorously coincides with dimension of subspaces.\n• In the statement \"the space of $n\\times n$ Hermitian matrices with at least one repeated eigenvalue has codimension 3\", the word dimension does not refer to dimensions of linear subspaces, but instead to dimensions of (nonlinear) submanifolds and varieties. The argument you give is using fairly standard techniques to determine the dimension of this variety. Jun 24, 2015 at 14:38\n• @JimBelk Could you perhaps briefly describe how this parameter counting can be made into a rigorous determination of the codimension? Apr 3, 2016 at 20:18\n\nLet $K_n$ be the set of hermitian matrices of dimension $n$. Note that $E_n=\\{H\\in K_n|card(spectrum(H))\\leq n-1\\}$ is a REAL algebraic set and $dim(E_n)$ is the greatest dimension of its components. A component of maximal dimension is obtained by considering $F_n=\\{H\\in K_n|card(spectrum(H))= n-1\\}$. We consider the function $f:(U,D)\\in U(n)\\times DR\\rightarrow UDU^*\\in F_n$ where $DR=\\{diag((\\lambda_i)_i)|\\lambda_i\\in\\mathbb{R},\\lambda_1=\\lambda_2\\}$. The stabilizer, $R=\\{V\\in U(n)|VD=DV\\}=\\{V\\in U(n)|V=diag(T_2,\\mu_3,\\cdots,\\mu_n)\\}\\approx U(2)\\times (S_1)^{n-2}$, has real dimension $2^2+1+\\cdots+1=n+2$; thus we obtain the real dimension $dim(F_n)=dim(U(n)\\times DR)-dim(R)=n^2+(n-1)-(n+2)=n^2-3$.\nRemark. $E_n=\\{H\\in K_n|discrim(\\det(H-xI_n),x)=0\\}$. Note that $p(H)=discrim(\\det(H-xI_n),x)\\in\\mathbb{Z}[(u_{ij})_{ij}]$ where the $u_{ij}$ are the $n^2$ real parameters that define $K_n$. The previous result says that $p=0$ can be decomposed in $3$ independent real algebraic relations."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8700116,"math_prob":0.9998267,"size":3040,"snap":"2023-14-2023-23","text_gpt3_token_len":805,"char_repetition_ratio":0.14262187,"word_repetition_ratio":0.034951456,"special_character_ratio":0.2542763,"punctuation_ratio":0.09618574,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99998033,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-07T15:56:24Z\",\"WARC-Record-ID\":\"<urn:uuid:366065bb-65ee-49be-9ef6-c96642477e8f>\",\"Content-Length\":\"136560\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:092139fc-6a5e-4ec1-b35d-3d0a56fb9efe>\",\"WARC-Concurrent-To\":\"<urn:uuid:a8f90fa5-5fc1-4e54-a79d-1115ffebe091>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/1332807/hermitian-matrices-with-repeated-eigenvalues-has-codimension-3\",\"WARC-Payload-Digest\":\"sha1:HLI6NYBYQXWG3HOQ2W5ZUOI6ABHXY7BO\",\"WARC-Block-Digest\":\"sha1:HOGPXHGUA5TDFHYKZN5APVFTSUJ3JAXD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224653930.47_warc_CC-MAIN-20230607143116-20230607173116-00227.warc.gz\"}"} |
https://www.colorhexa.com/32da18 | [
"# #32da18 Color Information\n\nIn a RGB color space, hex #32da18 is composed of 19.6% red, 85.5% green and 9.4% blue. Whereas in a CMYK color space, it is composed of 77.1% cyan, 0% magenta, 89% yellow and 14.5% black. It has a hue angle of 112 degrees, a saturation of 80.2% and a lightness of 47.5%. #32da18 color hex could be obtained by blending #64ff30 with #00b500. Closest websafe color is: #33cc00.\n\n• R 20\n• G 85\n• B 9\nRGB color chart\n• C 77\n• M 0\n• Y 89\n• K 15\nCMYK color chart\n\n#32da18 color description : Vivid lime green.\n\n# #32da18 Color Conversion\n\nThe hexadecimal color #32da18 has RGB values of R:50, G:218, B:24 and CMYK values of C:0.77, M:0, Y:0.89, K:0.15. Its decimal value is 3332632.\n\nHex triplet RGB Decimal 32da18 `#32da18` 50, 218, 24 `rgb(50,218,24)` 19.6, 85.5, 9.4 `rgb(19.6%,85.5%,9.4%)` 77, 0, 89, 15 112°, 80.2, 47.5 `hsl(112,80.2%,47.5%)` 112°, 89, 85.5 33cc00 `#33cc00`\nCIE-LAB 76.609, -72.327, 71.634 26.55, 50.884, 9.286 0.306, 0.587, 50.884 76.609, 101.797, 135.276 76.609, -67.68, 91.364 71.333, -58.395, 42.215 00110010, 11011010, 00011000\n\n# Color Schemes with #32da18\n\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #c018da\n``#c018da` `rgb(192,24,218)``\nComplementary Color\n• #93da18\n``#93da18` `rgb(147,218,24)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #18da5f\n``#18da5f` `rgb(24,218,95)``\nAnalogous Color\n• #da1893\n``#da1893` `rgb(218,24,147)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #5f18da\n``#5f18da` `rgb(95,24,218)``\nSplit Complementary Color\n• #da1832\n``#da1832` `rgb(218,24,50)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #1832da\n``#1832da` `rgb(24,50,218)``\n• #dac018\n``#dac018` `rgb(218,192,24)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #1832da\n``#1832da` `rgb(24,50,218)``\n• #c018da\n``#c018da` `rgb(192,24,218)``\n• #229510\n``#229510` `rgb(34,149,16)``\n• #27ac13\n``#27ac13` `rgb(39,172,19)``\n• #2dc315\n``#2dc315` `rgb(45,195,21)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #3fe725\n``#3fe725` `rgb(63,231,37)``\n• #53e93c\n``#53e93c` `rgb(83,233,60)``\n• #67ec52\n``#67ec52` `rgb(103,236,82)``\nMonochromatic Color\n\n# Alternatives to #32da18\n\nBelow, you can see some colors close to #32da18. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #62da18\n``#62da18` `rgb(98,218,24)``\n• #52da18\n``#52da18` `rgb(82,218,24)``\n• #42da18\n``#42da18` `rgb(66,218,24)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #22da18\n``#22da18` `rgb(34,218,24)``\n• #18da1e\n``#18da1e` `rgb(24,218,30)``\n• #18da2f\n``#18da2f` `rgb(24,218,47)``\nSimilar Colors\n\n# #32da18 Preview\n\nThis text has a font color of #32da18.\n\n``<span style=\"color:#32da18;\">Text here</span>``\n#32da18 background color\n\nThis paragraph has a background color of #32da18.\n\n``<p style=\"background-color:#32da18;\">Content here</p>``\n#32da18 border color\n\nThis element has a border color of #32da18.\n\n``<div style=\"border:1px solid #32da18;\">Content here</div>``\nCSS codes\n``.text {color:#32da18;}``\n``.background {background-color:#32da18;}``\n``.border {border:1px solid #32da18;}``\n\n# Shades and Tints of #32da18\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #010601 is the darkest color, while #f5fef3 is the lightest one.\n\n• #010601\n``#010601` `rgb(1,6,1)``\n• #051803\n``#051803` `rgb(5,24,3)``\n• #092905\n``#092905` `rgb(9,41,5)``\n• #0e3b06\n``#0e3b06` `rgb(14,59,6)``\n• #124d08\n``#124d08` `rgb(18,77,8)``\n• #165e0a\n``#165e0a` `rgb(22,94,10)``\n• #1a700c\n``#1a700c` `rgb(26,112,12)``\n• #1e820e\n``#1e820e` `rgb(30,130,14)``\n• #229310\n``#229310` `rgb(34,147,16)``\n• #26a512\n``#26a512` `rgb(38,165,18)``\n• #2ab714\n``#2ab714` `rgb(42,183,20)``\n• #2ec816\n``#2ec816` `rgb(46,200,22)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #3ae61f\n``#3ae61f` `rgb(58,230,31)``\n• #49e831\n``#49e831` `rgb(73,232,49)``\n• #59ea43\n``#59ea43` `rgb(89,234,67)``\n• #69ec54\n``#69ec54` `rgb(105,236,84)``\n• #78ee66\n``#78ee66` `rgb(120,238,102)``\n• #88f078\n``#88f078` `rgb(136,240,120)``\n• #97f289\n``#97f289` `rgb(151,242,137)``\n• #a7f49b\n``#a7f49b` `rgb(167,244,155)``\n``#b6f6ad` `rgb(182,246,173)``\n• #c6f8be\n``#c6f8be` `rgb(198,248,190)``\n``#d6fad0` `rgb(214,250,208)``\n• #e5fce2\n``#e5fce2` `rgb(229,252,226)``\n• #f5fef3\n``#f5fef3` `rgb(245,254,243)``\nTint Color Variation\n\n# Tones of #32da18\n\nA tone is produced by adding gray to any pure hue. In this case, #767d75 is the less saturated color, while #24ed05 is the most saturated one.\n\n• #767d75\n``#767d75` `rgb(118,125,117)``\n• #6f866c\n``#6f866c` `rgb(111,134,108)``\n• #699062\n``#699062` `rgb(105,144,98)``\n• #629959\n``#629959` `rgb(98,153,89)``\n• #5ba250\n``#5ba250` `rgb(91,162,80)``\n• #54ab47\n``#54ab47` `rgb(84,171,71)``\n• #4db53d\n``#4db53d` `rgb(77,181,61)``\n• #46be34\n``#46be34` `rgb(70,190,52)``\n• #40c72b\n``#40c72b` `rgb(64,199,43)``\n• #39d121\n``#39d121` `rgb(57,209,33)``\n• #32da18\n``#32da18` `rgb(50,218,24)``\n• #2be30f\n``#2be30f` `rgb(43,227,15)``\n• #24ed05\n``#24ed05` `rgb(36,237,5)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #32da18 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5701744,"math_prob":0.7579417,"size":3676,"snap":"2020-34-2020-40","text_gpt3_token_len":1608,"char_repetition_ratio":0.12037037,"word_repetition_ratio":0.011090573,"special_character_ratio":0.5609358,"punctuation_ratio":0.23430493,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.985896,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-09T00:52:06Z\",\"WARC-Record-ID\":\"<urn:uuid:a26bff1c-3946-4815-8b33-9e4613d2d48e>\",\"Content-Length\":\"36258\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fdf62c46-3a47-4c52-ba7e-cf2df7f3fc32>\",\"WARC-Concurrent-To\":\"<urn:uuid:53236185-d3ad-4a7e-9f31-923853f46621>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/32da18\",\"WARC-Payload-Digest\":\"sha1:U2CBOB7Y4RX7UUTBCUJLWPZIVBUPSVYI\",\"WARC-Block-Digest\":\"sha1:3VLN6F7H6YZC4VQOYZSZUXMSX5VMMURF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738366.27_warc_CC-MAIN-20200808224308-20200809014308-00277.warc.gz\"}"} |
https://www.griddlers.net/pages/gexample2 | [
"# Griddlers Tutorial - Solving Puzzles\n\n## Example 2: Solving a Triangle Puzzle\n\nTriangle puzzles are solved in basically the same manner as a color puzzle. Triangles can be placed right beside solid-colored squares and differently rotated triangles. No background square is required between them.\n\nLet's look at this puzzle.",
null,
"Note the first row (marked with red). The first two triangles are different, therefore they can be beside each other in the puzzle. However, the 2nd and 3rd triangle are the same. They must be separated by at least one background square. The 3rd and 4th triangles are different. They can be side-by-side also. In the last row (marked with green), the triangles are the same. They must be separated by at least one background square.",
null,
"Let's begin. We can immediately fill in row 3. There are 5 squares available and the clues add up to 5.",
null,
"Fill in 3 squares of clue 4 in the fourth row using overlapping counting.",
null,
"Since the third column is complete, fill in the background color.",
null,
"Look at the triangle in the first column (circled in red). It matches this triangle clue. Therefore this triangle is the last clue and anything below it is background color.",
null,
"The first column can now be completed as there are only 2 clue blocks and 2 spaces remaining.",
null,
"Fill in the second and fifth columns in the same way.",
null,
"Fill in with background the remaining squares in the second and fifth rows since they have all the necessary blocks. Look at the remaining unplaced clues. We must place that triangle in the last empty square.",
null,
"Insert the triangle and the image is complete!"
]
| [
null,
"https://www.griddlers.net/images/ex2_1.gif",
null,
"https://www.griddlers.net/images/ex2_2.gif",
null,
"https://www.griddlers.net/images/ex2_3.gif",
null,
"https://www.griddlers.net/images/ex2_4.gif",
null,
"https://www.griddlers.net/images/ex2_5.gif",
null,
"https://www.griddlers.net/images/ex2_6.gif",
null,
"https://www.griddlers.net/images/ex2_7.gif",
null,
"https://www.griddlers.net/images/ex2_8.gif",
null,
"https://www.griddlers.net/images/ex2_9.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.93640375,"math_prob":0.92612696,"size":1581,"snap":"2023-14-2023-23","text_gpt3_token_len":348,"char_repetition_ratio":0.15852885,"word_repetition_ratio":0.07434944,"special_character_ratio":0.21252371,"punctuation_ratio":0.10130719,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9584491,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-05T18:24:08Z\",\"WARC-Record-ID\":\"<urn:uuid:834ac18c-cea0-4bf3-8a88-cc976ac5a565>\",\"Content-Length\":\"44388\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c52568aa-4ed4-40a3-9a09-428f51aba4f5>\",\"WARC-Concurrent-To\":\"<urn:uuid:a76ae877-65e6-4c6c-86b2-a2389df38268>\",\"WARC-IP-Address\":\"207.180.236.117\",\"WARC-Target-URI\":\"https://www.griddlers.net/pages/gexample2\",\"WARC-Payload-Digest\":\"sha1:5SVE2HL76NWI6BWRKGRAMN4NCN7QYL66\",\"WARC-Block-Digest\":\"sha1:A536SY47JNLCKVRZWNVWG7N3OWH2EDQA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224652149.61_warc_CC-MAIN-20230605153700-20230605183700-00757.warc.gz\"}"} |
https://www.wisdomjobs.com/e-university/financial-management-tutorial-289/applications-of-the-general-dividend-valuation-model-6600.html | [
"# Applications of the General Dividend Valuation Model - Financial Management\n\n## The Generalized Dividend Valuation Model\n\nThe general dividend valuation model can be simplified if a firm’s dividend payments over time are expected to follow one of several different patterns, including zero growth, constant growth, and nonconstant growth.\n\nZero Growth Dividend Valuation Model\n\nIf a firm’s future dividend payments are expected to remain constant forever, then Dt in Equation, the general dividend valuation model, can be replaced by a constant value D to yield the following:",
null,
"This equation represents the value of a perpetuity and is analogous to those used for valuing a perpetual bond and a preferred stock developed in the previous chapter. It can be simplified to obtain\n\nP0 = D/ke\n\nThis model is valid only when a firm’s dividend payments are expected to remain constant forever. Although few common stocks strictly satisfy these conditions, the model can still be used to approximate the value of a stock for which dividend payments are expected to remain constant for a relatively long period into the future. To illustrate the zero growth dividend valuation model, assume that the Mountaineer Railroad common stock pays an annual dividend of $1.50 per share, which is expected to remain constant for the foreseeable future.What is the value of the stock to an investor who requires a 12 percent rate of return? Substituting$1.50 for D and 12 percent (0.12) for ke in Equation yields the following:\n\nP0 = $1.50/0.12 =$12.50\n\nRelationship Between Financial Decisions and Shareholder Wealth",
null,
"Dividend Growth Patterns\n\nConstant Growth Dividend Valuation Model\n\nIf a firm’s future dividend payments per share are expected to grow at a constant rate, g, per period forever, then the dividend at any future time period t can be forecast as follows:\n\nDt = D0(1 + g)t\n\nwhere D0 is the dividend in the current period (t = 0). The expected dividend in period 1 is D1 = D0(1 + g)1, the expected dividend in period 2 is D2 = D0(1 + g)2, and so on. The constant-growth curve in Figure illustrates such a dividend pattern.\n\nSubstituting Equation for Dt in the general dividend valuation model (Equation ) yields the following:",
null,
"Assuming that the required rate of return, ke, is greater than the dividend growth rate,17 g, Equation can be transformed algebraically to obtain the following simplified common stock valuation model:\n\nP0 = D1/(ke-g)\n\nNote that in the constant growth valuation model, the dividend value in the numerator is D1, that is, the dividend expected to be received one year from now. The model assumes that D0, the current dividend, has just been paid and does not enter the (forward -looking) valuation process.\nThe constant growth valuation model assumes that a firm’s earnings, dividends and stock price are expected to grow at a constant rate, g, into the future. Hence, to apply this model to a specific common stock, it is necessary to estimate the expected future growth rate, g. Considerable research evidence indicates that (1) the most accurate estimates of future growth are those provided by security analysts, and (2) consensus analyst forecasts of growth are an excellent proxy for growth expectations of investors. Sources of analyst growth rate forecasts include\n\n1. Value Line Investment Survey. Value Line reports, even though they represent only one analyst’s forecast for each company, are readily available at most public and university libraries and have been shown to be reasonably accurate and closely related to investor expectations.\n2. Zacks Earnings Estimates. It provides summaries of long-term (five years) and shortterm earnings growth expectations from more than 2,100 analysts covering more than 3,500 companies. Forecasts from Zacks are available through the Internet.\n3. Thomson Financial/First Call. This service is similar to that of Zacks and can be accessed through the Internet.\n\nThe constant growth dividend valuation model can be used to illustrate the two forms of returns an investor can expect to receive from holding a common stock. Solving Equation for ke yields the following:\n\nke = (D1/P0)+g\n\nThe investor’s required rate of return is equal to the expected dividend yield, D1/P0, plus the price appreciation yield, g—the expected increase in dividends and, ultimately, in the price of the stock.\n\nTo illustrate the application of the constant growth valuation model, consider Eaton Corporation. Dividends for Eaton are expected to be $1.76 per share next year. According to estimates from Value Line and First Call, earnings and dividends are expected to grow at about 6.5 percent annually. To determine the value of a share of this stock to an investor who requires a 12 percent rate of return, substituting$1.76 for D1, 6.5 percent(0.065) for g, and 12 percent(0.12) for ke in Equation 8.12 yields the following value for a share of Eaton’s common stock:\n\nP0 = $1.76/(0.12-0.065) =$32.00\n\nThus, the investor’s 12 percent required return consists of a 5.5 percent dividend yield (D1/P0 = $1.76/$32.00) plus a growth return of 6.5 percent annually.\n\nNonconstant Growth Dividend Valuation Model\n\nMany firms experience growth rates in sales, earnings, and dividends that are not constant. Typically, many firms experience a period of above -normal growth as they exploit new technologies, new markets, or both; this generally occurs relatively early in a firm’s life cycle. Following this period of rapid growth, earnings and dividends tend to stabilize or grow at a more normal rate comparable to the overall average rate of growth in the economy. The reduction in the growth rate occurs as the firm reaches maturity and has fewer sizable growth opportunities. The upper curve in Figure illustrates a nonconstant growth pattern.\n\nENTREPRENEURIAL ISSUES\n\nValuation of Closely Held Firms\n\nThe ownership of many small firms is closely held. An active market for shares of closely held companies normally does not exist. As a result ,entrepreneurs occasionally need to have the value of their enterprises estimated by independent appraisers.The reasons for these valuations include mergers and acquisitions, divestitures and liquidations, initial public offerings, estate and gift tax returns, leveraged buyouts, recapitalizations, employee stock ownership plans, divorce settlements, estate valuation, and various other litigation matters.\n\nThe principles of valuation developed in this chapter and applied to large publicly traded firms also apply to the valuation of small firms. Small firm valuation poses several unique challenges.When valuing the shares of a closely held corporation, many factors are considered, including the nature and history of the business, the general economic outlook and the condition and outlook of the firm’s industry, earnings capacity, dividend paying capacity, the book value of the company, the company’s financial condition, whether the shares represent a majority or minority (less than 50 percent) interest, and whether the stock is voting or nonvoting.\n\nSpecifically, however, in valuing a company that sells products and services, earnings capacity is usually the most important factor to be considered. Typically, the company as a whole is valued by determining a normal earnings level and multiplying that figure by an appropriate price —earnings multiple.This approach is known as the “capitalization of earnings” approach and results in a “going concern value.” If the shares represent a minority interest in the corporation, a discount is taken for the lack of marketability of these shares.\n\nDetermination of Normal Earnings\n\nThe determination of an average, or “normal,” earnings figure usually involves either a simple average or some type of weighted average of roughly the last five years of operations. For example, if the earnings of the company have been growing, some type of weighted average figure that places greater emphasis on more recent results is often used.\n\nIn some cases, the reported earnings of the company may not be an appropriate figure for valuation purposes. For example, suppose a portion of the salary paid to the president (and principal stockholder) really constitutes dividends paid as salary to avoid the payment of income taxes. In this situation, it is appropriate to adjust the reported earnings to account for these dividends.\n\nDetermination of an Appropriate Price–Earnings Multiple\n\nThe next step in the valuation process is to determine an appropriate rate at which to capitalize the normal earnings level.This is equivalent to multiplying the earnings by a price –earnings multiple. Had there been recent armslength transactions in the stock, the price –earnings multiple would be known and observable in the financial marketplace. However, this situation rarely exists for closely held corporations.As a consequence, the analyst must examine the price–earnings multiple for widely held companies in the same industry as the firm being valued in an attempt to find firms that are similar to the firm of interest.The price –earnings multiple for these comparable firms is used to capitalize the normal earnings level.\n\nMinority Interest Discount\n\nThe owner of a minority interest in a closely held corporation has an investment that lacks control and often marketability.There is usually either no market for the shares or the only buyer is either the other owners or the corporation itself. In addition, the owner of minority interest shares generally receives little, if any, dividends. The minority interest shareholder lacks control and is not able to change his or her inferior position.As a result of these problems, it is a widely practiced and accepted principle of valuation that the value of minority interest shares should be discounted.\n\nThe usual procedure in valuing minority interest shares is to value the corporation as a whole. Next, this value is divided by the number of shares outstanding to obtain a per-share value. Finally, a discount is applied to this per-share value to obtain the minority interest share value.These discounts have ranged from a low of 6 percent to more than 50 percent.\n\nIn conclusion, the basic valuation concepts are the same for small and large firms. However, the lack of marketability of shares for many small firms and the problem of minority interest positions pose special problems for the analyst.\n\nNonconstant growth models can also be applied to the valuation of firms that are experiencing temporary periods of poor performance, after which a normal pattern of growth is expected to emerge. (The lower nonconstant growth line in Figure illustrates this type of pattern.) For example, during 1992 IBM paid a dividend of $1.21 per share. This dividend was cut to$0.40 in 1993 and $0.25 in 1994. As IBM’s restructuring efforts progressed, earnings and dividend growth resumed. Dividends in 2000 grew to$0.51. Value Line projects year 2004 dividends of $0.70 per share and$1.25 per share by 2007. An investor attempting to value IBM’s stock at the beginning of 1993 should have reflected the declining, then increasing pattern of dividend growth for the firm.\n\nThere is no single model or equation that can be applied when nonconstant growth is anticipated. In general the value of a stock that is expected to experience a nonconstant growth rate pattern of dividends is equal to the present value of expected yearly dividends during the period of nonconstant growth plus the present value of the expected stock price at the end of the nonconstant growth period, or: Present value of expected Present value of the expected\n\nP0= dividends during period + stock price at the end of the of nonconstant growth nonconstant growth period\n\nThe stock price at the end of a nonconstant growth rate period can be estimated in a number of ways:\n\n1. Security analysts such as Value Line provide an estimated (five -year) future price range for the stocks they follow.\n2. Value Line, Zacks, and Thomson Financial/First Call all provide earnings growth rate estimates for five years into the future. These growth rate estimates can be used to derive earnings per share (EPS) forecasts for five years in the future. The EPS forecasts can be multiplied by the expected price -to-earnings (P/E) multiple, estimated by looking at current P/E multiples for similar firms, to get an expected price in five years.\n3. At the end of the period of nonconstant growth, an estimate of the value of the stock can be derived by applying the constant growth rate valuation model. For example, consider a firm expected to experience dividend growth at a nonconstant rate for m periods. Beginning in period m + 1, dividends are expected to grow at rate g2 forever. The value of the stock, Pm, at the end of period m is equal to\nPm = (Dm + 1)/(ke – g2)\n\nTo demonstrate how this model works, suppose an investor expects the earnings and common stock dividends of HILO Electronics to grow at a rate of 12 percent per annum for the next five years. Following the period of above -normal growth, dividends are expected to grow at the slower rate of 6 percent for the foreseeable future. The firm currently pays a dividend, D0, of $2 per share.What is the value of HILO common stock to an investor who requires a 15 percent rate of return? Value of HILO Electronics Common Stock",
null,
"Table illustrates the step -by -step solution to this problem. First, compute the sum of the present values of the dividends received during the nonconstant growth period (years 1 through 5 in this problem). This equals$9.25. Second, use the constant growth model to determine the value of HILO common stock at the end of year 5; P5 equals $41.56. Next, determine the present value of P5, which is$20.66. Finally, add the present value of the dividends received during the first five years ($9.25) to the present value of P5 ($20.66) to obtain the total value of the common stock of \\$29.91 per share. A timeline showing the expected cash flows from the purchase of HILO common stock is given in Figure.",
null,
"Financial Management Topics"
]
| [
null,
"https://www.wisdomjobs.com/tutorials/zero-growth-dividend-valuation-model.png",
null,
"https://www.wisdomjobs.com/tutorials/relationship-between-financial-decisions-and-shareholder-wealth.png",
null,
"https://www.wisdomjobs.com/tutorials/constant-growth-dividend-valuation-model.png",
null,
"https://www.wisdomjobs.com/tutorials/value-of-hilo-electronics-common-stock.png",
null,
"https://www.wisdomjobs.com/tutorials/cash-flows-from-hilo-electronics-common-stock.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9074488,"math_prob":0.9589133,"size":14034,"snap":"2019-13-2019-22","text_gpt3_token_len":2833,"char_repetition_ratio":0.15773343,"word_repetition_ratio":0.039251484,"special_character_ratio":0.1975203,"punctuation_ratio":0.09338678,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9805348,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-22T03:17:17Z\",\"WARC-Record-ID\":\"<urn:uuid:53dfb711-c535-4ff2-8837-6f0650c0bd14>\",\"Content-Length\":\"324843\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2c8e4362-108f-4a39-9130-acd7718a33f5>\",\"WARC-Concurrent-To\":\"<urn:uuid:e2ad81aa-335e-44eb-9e91-69b3fa04b586>\",\"WARC-IP-Address\":\"139.59.43.240\",\"WARC-Target-URI\":\"https://www.wisdomjobs.com/e-university/financial-management-tutorial-289/applications-of-the-general-dividend-valuation-model-6600.html\",\"WARC-Payload-Digest\":\"sha1:A6ZODUMVR25BOHO4NMF7EG6P4LHC2JTV\",\"WARC-Block-Digest\":\"sha1:7LR7Q2M477EF2OW4LGBXFUBOVNSB23AR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232256724.28_warc_CC-MAIN-20190522022933-20190522044933-00472.warc.gz\"}"} |
http://mathcentral.uregina.ca/QQ/database/QQ.09.04/kate1.html | [
"",
null,
"Quandaries and Queries Two circles, C1 and C2, touch each other externally; and the line l is a common tangent. The line m is parallel to l and touches the two circls C1 and C3. The three circles are mutually tangent. If the radius of C2 is 9 and if the radius of C3 is 4, what is the radius of C1? Hi Kate, I drew a diagram and labeled some points. P, R and T are the centers of the circles. PQ and ST are parallel to the common tangent lines m and l.",
null,
"I then redrew part of the diagram, larger so that I can include some dimensions. I let r be the radius of C1.",
null,
"Since PQ and ST are parallel to the tangent lines. PQR and RST are right triangles and hence Pythagoras' Theorem can be used to find the lengths of PQ ans ST. Now draw a line trough T, parallel to SQ and meeting PQ at W.",
null,
"PWT is a right triangle and hence Pythagoras' Theorem applied to this triangle gives a quadratic you can solve for r. This is one configuration for the circles you describe in your problem but there is at least one other configuration. Chris Go to Math Central"
]
| [
null,
"http://mathcentral.uregina.ca/QQ/database/QQ.09.04/MCIcon.gif",
null,
"http://mathcentral.uregina.ca/QQ/database/QQ.09.04/kate1.1.gif",
null,
"http://mathcentral.uregina.ca/QQ/database/QQ.09.04/kate1.2.gif",
null,
"http://mathcentral.uregina.ca/QQ/database/QQ.09.04/kate1.3.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9269815,"math_prob":0.93845344,"size":1033,"snap":"2020-24-2020-29","text_gpt3_token_len":259,"char_repetition_ratio":0.1292517,"word_repetition_ratio":0.029268293,"special_character_ratio":0.23814134,"punctuation_ratio":0.0969163,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9985044,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-07T03:33:49Z\",\"WARC-Record-ID\":\"<urn:uuid:539573c1-7c09-4b19-8341-996ce1c34d02>\",\"Content-Length\":\"3877\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7e3bc5b6-fe06-4327-bffa-4e5255db37ac>\",\"WARC-Concurrent-To\":\"<urn:uuid:d2853ab4-7a77-4a67-b802-bb396427425b>\",\"WARC-IP-Address\":\"142.3.156.43\",\"WARC-Target-URI\":\"http://mathcentral.uregina.ca/QQ/database/QQ.09.04/kate1.html\",\"WARC-Payload-Digest\":\"sha1:E66T35MTXKUAZMEWI35BL2YNHRETNREM\",\"WARC-Block-Digest\":\"sha1:CQXXEWEWDSMVNPF5URBNKQHKDUXW3JSU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655891640.22_warc_CC-MAIN-20200707013816-20200707043816-00024.warc.gz\"}"} |
https://www.colorhexa.com/00e192 | [
"# #00e192 Color Information\n\nIn a RGB color space, hex #00e192 is composed of 0% red, 88.2% green and 57.3% blue. Whereas in a CMYK color space, it is composed of 100% cyan, 0% magenta, 35.1% yellow and 11.8% black. It has a hue angle of 158.9 degrees, a saturation of 100% and a lightness of 44.1%. #00e192 color hex could be obtained by blending #00ffff with #00c325. Closest websafe color is: #00cc99.\n\n• R 0\n• G 88\n• B 57\nRGB color chart\n• C 100\n• M 0\n• Y 35\n• K 12\nCMYK color chart\n\n#00e192 color description : Pure (or mostly pure) cyan - lime green.\n\n# #00e192 Color Conversion\n\nThe hexadecimal color #00e192 has RGB values of R:0, G:225, B:146 and CMYK values of C:1, M:0, Y:0.35, K:0.12. Its decimal value is 57746.\n\nHex triplet RGB Decimal 00e192 `#00e192` 0, 225, 146 `rgb(0,225,146)` 0, 88.2, 57.3 `rgb(0%,88.2%,57.3%)` 100, 0, 35, 12 158.9°, 100, 44.1 `hsl(158.9,100%,44.1%)` 158.9°, 100, 88.2 00cc99 `#00cc99`\nCIE-LAB 79.57, -63.701, 26.103 32.111, 55.922, 36.294 0.258, 0.45, 55.922 79.57, 68.841, 157.717 79.57, -69.048, 46.885 74.781, -54.219, 23.571 00000000, 11100001, 10010010\n\n# Color Schemes with #00e192\n\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #e1004f\n``#e1004f` `rgb(225,0,79)``\nComplementary Color\n• #00e122\n``#00e122` `rgb(0,225,34)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #00c0e1\n``#00c0e1` `rgb(0,192,225)``\nAnalogous Color\n• #e12200\n``#e12200` `rgb(225,34,0)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #e100c0\n``#e100c0` `rgb(225,0,192)``\nSplit Complementary Color\n• #e19200\n``#e19200` `rgb(225,146,0)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #9200e1\n``#9200e1` `rgb(146,0,225)``\n• #4fe100\n``#4fe100` `rgb(79,225,0)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #9200e1\n``#9200e1` `rgb(146,0,225)``\n• #e1004f\n``#e1004f` `rgb(225,0,79)``\n• #009560\n``#009560` `rgb(0,149,96)``\n• #00ae71\n``#00ae71` `rgb(0,174,113)``\n• #00c881\n``#00c881` `rgb(0,200,129)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #00fba3\n``#00fba3` `rgb(0,251,163)``\n``#15ffad` `rgb(21,255,173)``\n• #2fffb6\n``#2fffb6` `rgb(47,255,182)``\nMonochromatic Color\n\n# Alternatives to #00e192\n\nBelow, you can see some colors close to #00e192. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #00e15a\n``#00e15a` `rgb(0,225,90)``\n• #00e16d\n``#00e16d` `rgb(0,225,109)``\n• #00e17f\n``#00e17f` `rgb(0,225,127)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #00e1a5\n``#00e1a5` `rgb(0,225,165)``\n• #00e1b8\n``#00e1b8` `rgb(0,225,184)``\n• #00e1ca\n``#00e1ca` `rgb(0,225,202)``\nSimilar Colors\n\n# #00e192 Preview\n\nThis text has a font color of #00e192.\n\n``<span style=\"color:#00e192;\">Text here</span>``\n#00e192 background color\n\nThis paragraph has a background color of #00e192.\n\n``<p style=\"background-color:#00e192;\">Content here</p>``\n#00e192 border color\n\nThis element has a border color of #00e192.\n\n``<div style=\"border:1px solid #00e192;\">Content here</div>``\nCSS codes\n``.text {color:#00e192;}``\n``.background {background-color:#00e192;}``\n``.border {border:1px solid #00e192;}``\n\n# Shades and Tints of #00e192\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #000906 is the darkest color, while #f5fffb is the lightest one.\n\n• #000906\n``#000906` `rgb(0,9,6)``\n• #001d13\n``#001d13` `rgb(0,29,19)``\n• #00301f\n``#00301f` `rgb(0,48,31)``\n• #00442c\n``#00442c` `rgb(0,68,44)``\n• #005839\n``#005839` `rgb(0,88,57)``\n• #006b46\n``#006b46` `rgb(0,107,70)``\n• #007f52\n``#007f52` `rgb(0,127,82)``\n• #00935f\n``#00935f` `rgb(0,147,95)``\n• #00a66c\n``#00a66c` `rgb(0,166,108)``\n• #00ba79\n``#00ba79` `rgb(0,186,121)``\n• #00cd85\n``#00cd85` `rgb(0,205,133)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\n• #00f59f\n``#00f59f` `rgb(0,245,159)``\n• #09ffa9\n``#09ffa9` `rgb(9,255,169)``\n• #1dffb0\n``#1dffb0` `rgb(29,255,176)``\n• #30ffb6\n``#30ffb6` `rgb(48,255,182)``\n• #44ffbd\n``#44ffbd` `rgb(68,255,189)``\n• #58ffc4\n``#58ffc4` `rgb(88,255,196)``\n• #6bffcb\n``#6bffcb` `rgb(107,255,203)``\n• #7fffd2\n``#7fffd2` `rgb(127,255,210)``\n• #93ffd9\n``#93ffd9` `rgb(147,255,217)``\n• #a6ffe0\n``#a6ffe0` `rgb(166,255,224)``\n• #baffe7\n``#baffe7` `rgb(186,255,231)``\n• #cdffee\n``#cdffee` `rgb(205,255,238)``\n• #e1fff4\n``#e1fff4` `rgb(225,255,244)``\n• #f5fffb\n``#f5fffb` `rgb(245,255,251)``\nTint Color Variation\n\n# Tones of #00e192\n\nA tone is produced by adding gray to any pure hue. In this case, #687973 is the less saturated color, while #00e192 is the most saturated one.\n\n• #687973\n``#687973` `rgb(104,121,115)``\n• #5f8276\n``#5f8276` `rgb(95,130,118)``\n• #578a78\n``#578a78` `rgb(87,138,120)``\n• #4e937b\n``#4e937b` `rgb(78,147,123)``\n• #459c7d\n``#459c7d` `rgb(69,156,125)``\n• #3da480\n``#3da480` `rgb(61,164,128)``\n``#34ad83` `rgb(52,173,131)``\n• #2bb685\n``#2bb685` `rgb(43,182,133)``\n• #23be88\n``#23be88` `rgb(35,190,136)``\n• #1ac78a\n``#1ac78a` `rgb(26,199,138)``\n• #11d08d\n``#11d08d` `rgb(17,208,141)``\n• #09d88f\n``#09d88f` `rgb(9,216,143)``\n• #00e192\n``#00e192` `rgb(0,225,146)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #00e192 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.511334,"math_prob":0.8402999,"size":3704,"snap":"2019-51-2020-05","text_gpt3_token_len":1599,"char_repetition_ratio":0.13378379,"word_repetition_ratio":0.010989011,"special_character_ratio":0.5572354,"punctuation_ratio":0.23146068,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99201447,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-28T04:20:44Z\",\"WARC-Record-ID\":\"<urn:uuid:45a7d582-b7df-4e49-8780-2fb80f5b932f>\",\"Content-Length\":\"36276\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6101a2e9-fad1-42c5-a223-de910f2db6ba>\",\"WARC-Concurrent-To\":\"<urn:uuid:8f027f1b-e95f-4882-9533-5adf01732241>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/00e192\",\"WARC-Payload-Digest\":\"sha1:F5GFHEVIGVOGKXFOTVH3SP6FDLTVA3ZU\",\"WARC-Block-Digest\":\"sha1:7FIESRYETSBIWPX57BOATIUNLPU6OGLV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251773463.72_warc_CC-MAIN-20200128030221-20200128060221-00287.warc.gz\"}"} |
https://essay.ua-referat.com/Ratio_Of_Charge_To_Mass_For_The | [
"",
null,
"# Ratio Of Charge To Mass For The\n\nскачати\n\nRatio Of Charge To Mass For The Electron Essay, Research Paper\n\nIntroduction: The object of this lab was to determine the measure of the ratio of an electron to its mass. This is done by accelerating a stream of electrons through a measured potential difference. The stream of electrons moves through a uniform magnetic field. It is perpendicular to the velocity of the electrons. The path of the electrons is circular because of this fact. The ratio of e/m can be found by the relationships between the measured accelerating potential difference, the diameter of the circular path described by the electron, and the magnetic flux density.\n\nTheory: British scientist Sir J.J. Thompson (1856-1940) first discovered that the electron was a discrete particle of electricity. From his discoveries came the accepted value for e/m which is 1.75890*10^11 coulombs/kg. With this information we could then accurately determine the mass of the electron.\n\nThe force F acting upon a charge that is moving with a velocity v perpendicular to the magnetic field B is\n\nThis force is centripetal. These forces cause the electron to move in a circular path. The centrifugal force of reaction of the electron is equal in magnitude to the force on the electron by the magnetic field. Therefore the following equation is valid for this experiment. R is the radius of the path of the electrons.\n\nThrough a potential difference, the kinetic energy acquired by the falling electron is:\n\nFrom these last two equations, we can make a third equation involving all of the variables.\n\nWith this apparatus for this experiment, we can determine values for V, B, and r. With these values we can determine the ratio for e/m. The current in these two Hemholtz coils produces a magnetic field which bends the beam. Since the coils are vertical, the beam is horizontal. This is because the beam and the magnetic field are perpendicular. In the experiment, since the distance between the coils is equal of the radius of both of the coils, a nearly uniform magnetic field is produced at the midway point. The currents in the coils must yield fields of the coils that are in the same direction as their common axis.\n\nAt a central point, the magnitude of the flux density B is:\n\nN is the number of turns per coil. In this experiment N=129. I is the current in the coils. This is always changing. R is the coil radius. For the experiment R=10.75 is the permeablilty of free space. =4 *10^-7 weber/amp*m . Later we will come to find that when the specified units are used, e/m is expressed in coulombs/kilogram.\n\nData: Connect the apparatus as shown in the following diagram. The electron stream should have a diameter of about 2mm.\n\nSet the rheostat for high resistance close to the circuit field coils and then vary the current to (3-5) amp until the electron beam bends into a complete semicircle. Arrange the plate potential so that the accelerating potential difference can very and change the field current until the beam falls on the marked circles. The plate potential, the field current, and the radius of the described circle were recorded as follows.\n\nBecause these values for e/m were so different than the predicted value of e/m (1.75890*10^11 coulombs/kg) the experiment was run a second time, but with a higher voltage and current. The data was recorded as follows:\n\nConclusion: From this data, and use of the working equation for e/m, it can be concluded that our experiment was consistent, but off from the given value of e/m by a fairly constant amount. This can be caused by several sources of error. One might be that we did not take the magnetic field of the earth into account. Another could be a magnetic field created by a nearby object. Still a third source of error might have been that we could not determine which ring on the plate that the electron beam curve actually hit. This experiment does show that given a Magnetic field, a V, an I, and an R, we can calculate e/m and compare this value to our given value for e/m.\n\nSpecial Thanks to Dr. Tarvin and the Samford University Department of Physics for direction and extreme patience with this project\n\nДодати в блог або на сайт\n\nЦей текст може містити помилки.\n\nA Free essays | Essay\n\nRelated works:\nThe Golden Ratio\nDetermining The Ratio Of Circumference To Diameter\nThe Charge\nElectric Charge\nDulce Et Decorum Est Vs. The Charge\nComparing Dulce Et Decorum Est The Charge\nMass 2\nMass\nMass Spectrometer"
]
| [
null,
"https://essay.ua-referat.com/ua-referat.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9390837,"math_prob":0.9764974,"size":4126,"snap":"2020-24-2020-29","text_gpt3_token_len":866,"char_repetition_ratio":0.15041243,"word_repetition_ratio":0.0,"special_character_ratio":0.20940378,"punctuation_ratio":0.09547123,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9962194,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-26T09:02:38Z\",\"WARC-Record-ID\":\"<urn:uuid:cdbbfd6d-ec5b-496f-b29f-cfccb8a10eef>\",\"Content-Length\":\"19823\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:51b2364c-c662-4faf-b0cd-bd3d6c38ff5f>\",\"WARC-Concurrent-To\":\"<urn:uuid:828eab01-07e8-4bb8-88a8-96414f111ede>\",\"WARC-IP-Address\":\"176.9.102.205\",\"WARC-Target-URI\":\"https://essay.ua-referat.com/Ratio_Of_Charge_To_Mass_For_The\",\"WARC-Payload-Digest\":\"sha1:K7LZZBPIBIVP4LHT633CYN3IVBCF3NGI\",\"WARC-Block-Digest\":\"sha1:UX7HF2Z424K2AB67TZWLMCTFMQSLJKRG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347390755.1_warc_CC-MAIN-20200526081547-20200526111547-00492.warc.gz\"}"} |
https://socratic.org/questions/590cd8797c014915525a4c01 | [
"# Question a4c01\n\nMay 5, 2017\n\n$1.7 \\cdot {10}^{3} \\text{ppm}$\n\n#### Explanation:\n\nThe thing to remember about a mixture's concentration in parts per million, or ppm, is that it is supposed to tell you the number of parts of a given component of the mixture present for every\n\n${10}^{6} = 1 , 000 , 000$\n\nparts of mixture. In your case, you know that the sample has a total mass of $\\text{70 g}$. This sample is said to contain $\\text{0.119 g}$ of iron.\n\nYour goal here is to figure out how many grams of iron you would get for ${10}^{6}$ $\\text{g}$ of sample by using its known composition.\n\n10^6 color(red)(cancel(color(black)(\"g sample\"))) * \"0.119 g Fe\"/(70color(red)(cancel(color(black)(\"g sample\")))) = 1.7 * 10^3# $\\text{g Fe}$\n\nThis means that the sample's concentration in parts per million is equal to\n\n$\\textcolor{\\mathrm{da} r k g r e e n}{\\underline{\\textcolor{b l a c k}{\\text{concentration Fe\" = 1.7 * 10^3color(white)(.)\"ppm}}}}$\n\nI'll leave the answer rounded to two sig figs, but keep in mind that you only have one significant figure for the mass of the sample."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9010058,"math_prob":0.9964203,"size":886,"snap":"2023-14-2023-23","text_gpt3_token_len":241,"char_repetition_ratio":0.117913835,"word_repetition_ratio":0.0,"special_character_ratio":0.29119638,"punctuation_ratio":0.07386363,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9972782,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-28T00:15:44Z\",\"WARC-Record-ID\":\"<urn:uuid:1561b4ec-c3c3-4cda-aebc-1568d52e3b49>\",\"Content-Length\":\"34944\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0a7245e7-ecea-4a66-99b0-19079ead7b2d>\",\"WARC-Concurrent-To\":\"<urn:uuid:f88ce3cb-d984-4d81-8f63-bb38d15f0718>\",\"WARC-IP-Address\":\"216.239.36.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/590cd8797c014915525a4c01\",\"WARC-Payload-Digest\":\"sha1:GKQI4ISBUJBZK2DC2LYJ7OE3JZZOX334\",\"WARC-Block-Digest\":\"sha1:QNSK55QOVGIOBH347EM37UHPU7DNJHXS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296948708.2_warc_CC-MAIN-20230327220742-20230328010742-00335.warc.gz\"}"} |
http://dotnumerics.com/NumericalLibraries/LinearAlgebra/CSharpCodeFiles/dggqrf.aspx | [
"",
null,
"",
null,
"` 1: #region Translated by Jose Antonio De Santiago-Castillo.`\n` 2: `\n` 3: //Translated by Jose Antonio De Santiago-Castillo. `\n` 4: //E-mail:[email protected]`\n` 5: //Web: www.DotNumerics.com`\n` 6: //`\n` 7: //Fortran to C# Translation.`\n` 8: //Translated by:`\n` 9: //F2CSharp Version 0.71 (November 10, 2009)`\n` 10: //Code Optimizations: None`\n` 11: //`\n` 12: #endregion`\n` 13: `\n` 14: using System;`\n` 15: using DotNumerics.FortranLibrary;`\n` 16: `\n` 17: namespace DotNumerics.CSLapack`\n` 18: {`\n` 19: /// <summary>`\n` 20: /// -- LAPACK routine (version 3.1) --`\n` 21: /// Univ. of Tennessee, Univ. of California Berkeley and NAG Ltd..`\n` 22: /// November 2006`\n` 23: /// Purpose`\n` 24: /// =======`\n` 25: /// `\n` 26: /// DGGQRF computes a generalized QR factorization of an N-by-M matrix A`\n` 27: /// and an N-by-P matrix B:`\n` 28: /// `\n` 29: /// A = Q*R, B = Q*T*Z,`\n` 30: /// `\n` 31: /// where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal`\n` 32: /// matrix, and R and T assume one of the forms:`\n` 33: /// `\n` 34: /// if N .GE. M, R = ( R11 ) M , or if N .LT. M, R = ( R11 R12 ) N,`\n` 35: /// ( 0 ) N-M N M-N`\n` 36: /// M`\n` 37: /// `\n` 38: /// where R11 is upper triangular, and`\n` 39: /// `\n` 40: /// if N .LE. P, T = ( 0 T12 ) N, or if N .GT. P, T = ( T11 ) N-P,`\n` 41: /// P-N N ( T21 ) P`\n` 42: /// P`\n` 43: /// `\n` 44: /// where T12 or T21 is upper triangular.`\n` 45: /// `\n` 46: /// In particular, if B is square and nonsingular, the GQR factorization`\n` 47: /// of A and B implicitly gives the QR factorization of inv(B)*A:`\n` 48: /// `\n` 49: /// inv(B)*A = Z'*(inv(T)*R)`\n` 50: /// `\n` 51: /// where inv(B) denotes the inverse of the matrix B, and Z' denotes the`\n` 52: /// transpose of the matrix Z.`\n` 53: /// `\n` 54: ///</summary>`\n` 55: public class DGGQRF`\n` 56: {`\n` 57: `\n` 58: `\n` 59: #region Dependencies`\n` 60: `\n` 61: DGEQRF _dgeqrf; DGERQF _dgerqf; DORMQR _dormqr; XERBLA _xerbla; ILAENV _ilaenv; `\n` 62: `\n` 63: #endregion`\n` 64: `\n` 65: `\n` 66: #region Fields`\n` 67: `\n` 68: bool LQUERY = false; int LOPT = 0; int LWKOPT = 0; int NB = 0; int NB1 = 0; int NB2 = 0; int NB3 = 0; `\n` 69: `\n` 70: #endregion`\n` 71: `\n` 72: public DGGQRF(DGEQRF dgeqrf, DGERQF dgerqf, DORMQR dormqr, XERBLA xerbla, ILAENV ilaenv)`\n` 73: {`\n` 74: `\n` 75: `\n` 76: #region Set Dependencies`\n` 77: `\n` 78: this._dgeqrf = dgeqrf; this._dgerqf = dgerqf; this._dormqr = dormqr; this._xerbla = xerbla; this._ilaenv = ilaenv; `\n` 79: `\n` 80: #endregion`\n` 81: `\n` 82: }`\n` 83: `\n` 84: public DGGQRF()`\n` 85: {`\n` 86: `\n` 87: `\n` 88: #region Dependencies (Initialization)`\n` 89: `\n` 90: LSAME lsame = new LSAME();`\n` 91: XERBLA xerbla = new XERBLA();`\n` 92: DLAMC3 dlamc3 = new DLAMC3();`\n` 93: DLAPY2 dlapy2 = new DLAPY2();`\n` 94: DNRM2 dnrm2 = new DNRM2();`\n` 95: DSCAL dscal = new DSCAL();`\n` 96: DCOPY dcopy = new DCOPY();`\n` 97: IEEECK ieeeck = new IEEECK();`\n` 98: IPARMQ iparmq = new IPARMQ();`\n` 99: DGEMV dgemv = new DGEMV(lsame, xerbla);`\n` 100: DGER dger = new DGER(xerbla);`\n` 101: DLARF dlarf = new DLARF(dgemv, dger, lsame);`\n` 102: DLAMC1 dlamc1 = new DLAMC1(dlamc3);`\n` 103: DLAMC4 dlamc4 = new DLAMC4(dlamc3);`\n` 104: DLAMC5 dlamc5 = new DLAMC5(dlamc3);`\n` 105: DLAMC2 dlamc2 = new DLAMC2(dlamc3, dlamc1, dlamc4, dlamc5);`\n` 106: DLAMCH dlamch = new DLAMCH(lsame, dlamc2);`\n` 107: DLARFG dlarfg = new DLARFG(dlamch, dlapy2, dnrm2, dscal);`\n` 108: DGEQR2 dgeqr2 = new DGEQR2(dlarf, dlarfg, xerbla);`\n` 109: DGEMM dgemm = new DGEMM(lsame, xerbla);`\n` 110: DTRMM dtrmm = new DTRMM(lsame, xerbla);`\n` 111: DLARFB dlarfb = new DLARFB(lsame, dcopy, dgemm, dtrmm);`\n` 112: DTRMV dtrmv = new DTRMV(lsame, xerbla);`\n` 113: DLARFT dlarft = new DLARFT(dgemv, dtrmv, lsame);`\n` 114: ILAENV ilaenv = new ILAENV(ieeeck, iparmq);`\n` 115: DGEQRF dgeqrf = new DGEQRF(dgeqr2, dlarfb, dlarft, xerbla, ilaenv);`\n` 116: DGERQ2 dgerq2 = new DGERQ2(dlarf, dlarfg, xerbla);`\n` 117: DGERQF dgerqf = new DGERQF(dgerq2, dlarfb, dlarft, xerbla, ilaenv);`\n` 118: DORM2R dorm2r = new DORM2R(lsame, dlarf, xerbla);`\n` 119: DORMQR dormqr = new DORMQR(lsame, ilaenv, dlarfb, dlarft, dorm2r, xerbla);`\n` 120: `\n` 121: #endregion`\n` 122: `\n` 123: `\n` 124: #region Set Dependencies`\n` 125: `\n` 126: this._dgeqrf = dgeqrf; this._dgerqf = dgerqf; this._dormqr = dormqr; this._xerbla = xerbla; this._ilaenv = ilaenv; `\n` 127: `\n` 128: #endregion`\n` 129: `\n` 130: }`\n` 131: /// <summary>`\n` 132: /// Purpose`\n` 133: /// =======`\n` 134: /// `\n` 135: /// DGGQRF computes a generalized QR factorization of an N-by-M matrix A`\n` 136: /// and an N-by-P matrix B:`\n` 137: /// `\n` 138: /// A = Q*R, B = Q*T*Z,`\n` 139: /// `\n` 140: /// where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal`\n` 141: /// matrix, and R and T assume one of the forms:`\n` 142: /// `\n` 143: /// if N .GE. M, R = ( R11 ) M , or if N .LT. M, R = ( R11 R12 ) N,`\n` 144: /// ( 0 ) N-M N M-N`\n` 145: /// M`\n` 146: /// `\n` 147: /// where R11 is upper triangular, and`\n` 148: /// `\n` 149: /// if N .LE. P, T = ( 0 T12 ) N, or if N .GT. P, T = ( T11 ) N-P,`\n` 150: /// P-N N ( T21 ) P`\n` 151: /// P`\n` 152: /// `\n` 153: /// where T12 or T21 is upper triangular.`\n` 154: /// `\n` 155: /// In particular, if B is square and nonsingular, the GQR factorization`\n` 156: /// of A and B implicitly gives the QR factorization of inv(B)*A:`\n` 157: /// `\n` 158: /// inv(B)*A = Z'*(inv(T)*R)`\n` 159: /// `\n` 160: /// where inv(B) denotes the inverse of the matrix B, and Z' denotes the`\n` 161: /// transpose of the matrix Z.`\n` 162: /// `\n` 163: ///</summary>`\n` 164: /// <param name=\"N\">`\n` 165: /// (input) INTEGER`\n` 166: /// The number of rows of the matrices A and B. N .GE. 0.`\n` 167: ///</param>`\n` 168: /// <param name=\"M\">`\n` 169: /// (input) INTEGER`\n` 170: /// The number of columns of the matrix A. M .GE. 0.`\n` 171: ///</param>`\n` 172: /// <param name=\"P\">`\n` 173: /// (input) INTEGER`\n` 174: /// The number of columns of the matrix B. P .GE. 0.`\n` 175: ///</param>`\n` 176: /// <param name=\"A\">`\n` 177: /// = Q*R, B = Q*T*Z,`\n` 178: ///</param>`\n` 179: /// <param name=\"LDA\">`\n` 180: /// (input) INTEGER`\n` 181: /// The leading dimension of the array A. LDA .GE. max(1,N).`\n` 182: ///</param>`\n` 183: /// <param name=\"TAUA\">`\n` 184: /// (output) DOUBLE PRECISION array, dimension (min(N,M))`\n` 185: /// The scalar factors of the elementary reflectors which`\n` 186: /// represent the orthogonal matrix Q (see Further Details).`\n` 187: ///</param>`\n` 188: /// <param name=\"B\">`\n` 189: /// (input/output) DOUBLE PRECISION array, dimension (LDB,P)`\n` 190: /// On entry, the N-by-P matrix B.`\n` 191: /// On exit, if N .LE. P, the upper triangle of the subarray`\n` 192: /// B(1:N,P-N+1:P) contains the N-by-N upper triangular matrix T;`\n` 193: /// if N .GT. P, the elements on and above the (N-P)-th subdiagonal`\n` 194: /// contain the N-by-P upper trapezoidal matrix T; the remaining`\n` 195: /// elements, with the array TAUB, represent the orthogonal`\n` 196: /// matrix Z as a product of elementary reflectors (see Further`\n` 197: /// Details).`\n` 198: ///</param>`\n` 199: /// <param name=\"LDB\">`\n` 200: /// (input) INTEGER`\n` 201: /// The leading dimension of the array B. LDB .GE. max(1,N).`\n` 202: ///</param>`\n` 203: /// <param name=\"TAUB\">`\n` 204: /// (output) DOUBLE PRECISION array, dimension (min(N,P))`\n` 205: /// The scalar factors of the elementary reflectors which`\n` 206: /// represent the orthogonal matrix Z (see Further Details).`\n` 207: ///</param>`\n` 208: /// <param name=\"WORK\">`\n` 209: /// (workspace/output) DOUBLE PRECISION array, dimension (MAX(1,LWORK))`\n` 210: /// On exit, if INFO = 0, WORK(1) returns the optimal LWORK.`\n` 211: ///</param>`\n` 212: /// <param name=\"LWORK\">`\n` 213: /// (input) INTEGER`\n` 214: /// The dimension of the array WORK. LWORK .GE. max(1,N,M,P).`\n` 215: /// For optimum performance LWORK .GE. max(N,M,P)*max(NB1,NB2,NB3),`\n` 216: /// where NB1 is the optimal blocksize for the QR factorization`\n` 217: /// of an N-by-M matrix, NB2 is the optimal blocksize for the`\n` 218: /// RQ factorization of an N-by-P matrix, and NB3 is the optimal`\n` 219: /// blocksize for a call of DORMQR.`\n` 220: /// `\n` 221: /// If LWORK = -1, then a workspace query is assumed; the routine`\n` 222: /// only calculates the optimal size of the WORK array, returns`\n` 223: /// this value as the first entry of the WORK array, and no error`\n` 224: /// message related to LWORK is issued by XERBLA.`\n` 225: ///</param>`\n` 226: /// <param name=\"INFO\">`\n` 227: /// (output) INTEGER`\n` 228: /// = 0: successful exit`\n` 229: /// .LT. 0: if INFO = -i, the i-th argument had an illegal value.`\n` 230: ///</param>`\n` 231: public void Run(int N, int M, int P, ref double[] A, int offset_a, int LDA, ref double[] TAUA, int offset_taua`\n` 232: , ref double[] B, int offset_b, int LDB, ref double[] TAUB, int offset_taub, ref double[] WORK, int offset_work, int LWORK, ref int INFO)`\n` 233: {`\n` 234: `\n` 235: #region Array Index Correction`\n` 236: `\n` 237: int o_a = -1 - LDA + offset_a; int o_taua = -1 + offset_taua; int o_b = -1 - LDB + offset_b; `\n` 238: int o_taub = -1 + offset_taub; int o_work = -1 + offset_work; `\n` 239: `\n` 240: #endregion`\n` 241: `\n` 242: `\n` 243: #region Prolog`\n` 244: `\n` 245: // *`\n` 246: // * -- LAPACK routine (version 3.1) --`\n` 247: // * Univ. of Tennessee, Univ. of California Berkeley and NAG Ltd..`\n` 248: // * November 2006`\n` 249: // *`\n` 250: // * .. Scalar Arguments ..`\n` 251: // * ..`\n` 252: // * .. Array Arguments ..`\n` 253: // * ..`\n` 254: // *`\n` 255: // * Purpose`\n` 256: // * =======`\n` 257: // *`\n` 258: // * DGGQRF computes a generalized QR factorization of an N-by-M matrix A`\n` 259: // * and an N-by-P matrix B:`\n` 260: // *`\n` 261: // * A = Q*R, B = Q*T*Z,`\n` 262: // *`\n` 263: // * where Q is an N-by-N orthogonal matrix, Z is a P-by-P orthogonal`\n` 264: // * matrix, and R and T assume one of the forms:`\n` 265: // *`\n` 266: // * if N >= M, R = ( R11 ) M , or if N < M, R = ( R11 R12 ) N,`\n` 267: // * ( 0 ) N-M N M-N`\n` 268: // * M`\n` 269: // *`\n` 270: // * where R11 is upper triangular, and`\n` 271: // *`\n` 272: // * if N <= P, T = ( 0 T12 ) N, or if N > P, T = ( T11 ) N-P,`\n` 273: // * P-N N ( T21 ) P`\n` 274: // * P`\n` 275: // *`\n` 276: // * where T12 or T21 is upper triangular.`\n` 277: // *`\n` 278: // * In particular, if B is square and nonsingular, the GQR factorization`\n` 279: // * of A and B implicitly gives the QR factorization of inv(B)*A:`\n` 280: // *`\n` 281: // * inv(B)*A = Z'*(inv(T)*R)`\n` 282: // *`\n` 283: // * where inv(B) denotes the inverse of the matrix B, and Z' denotes the`\n` 284: // * transpose of the matrix Z.`\n` 285: // *`\n` 286: // * Arguments`\n` 287: // * =========`\n` 288: // *`\n` 289: // * N (input) INTEGER`\n` 290: // * The number of rows of the matrices A and B. N >= 0.`\n` 291: // *`\n` 292: // * M (input) INTEGER`\n` 293: // * The number of columns of the matrix A. M >= 0.`\n` 294: // *`\n` 295: // * P (input) INTEGER`\n` 296: // * The number of columns of the matrix B. P >= 0.`\n` 297: // *`\n` 298: // * A (input/output) DOUBLE PRECISION array, dimension (LDA,M)`\n` 299: // * On entry, the N-by-M matrix A.`\n` 300: // * On exit, the elements on and above the diagonal of the array`\n` 301: // * contain the min(N,M)-by-M upper trapezoidal matrix R (R is`\n` 302: // * upper triangular if N >= M); the elements below the diagonal,`\n` 303: // * with the array TAUA, represent the orthogonal matrix Q as a`\n` 304: // * product of min(N,M) elementary reflectors (see Further`\n` 305: // * Details).`\n` 306: // *`\n` 307: // * LDA (input) INTEGER`\n` 308: // * The leading dimension of the array A. LDA >= max(1,N).`\n` 309: // *`\n` 310: // * TAUA (output) DOUBLE PRECISION array, dimension (min(N,M))`\n` 311: // * The scalar factors of the elementary reflectors which`\n` 312: // * represent the orthogonal matrix Q (see Further Details).`\n` 313: // *`\n` 314: // * B (input/output) DOUBLE PRECISION array, dimension (LDB,P)`\n` 315: // * On entry, the N-by-P matrix B.`\n` 316: // * On exit, if N <= P, the upper triangle of the subarray`\n` 317: // * B(1:N,P-N+1:P) contains the N-by-N upper triangular matrix T;`\n` 318: // * if N > P, the elements on and above the (N-P)-th subdiagonal`\n` 319: // * contain the N-by-P upper trapezoidal matrix T; the remaining`\n` 320: // * elements, with the array TAUB, represent the orthogonal`\n` 321: // * matrix Z as a product of elementary reflectors (see Further`\n` 322: // * Details).`\n` 323: // *`\n` 324: // * LDB (input) INTEGER`\n` 325: // * The leading dimension of the array B. LDB >= max(1,N).`\n` 326: // *`\n` 327: // * TAUB (output) DOUBLE PRECISION array, dimension (min(N,P))`\n` 328: // * The scalar factors of the elementary reflectors which`\n` 329: // * represent the orthogonal matrix Z (see Further Details).`\n` 330: // *`\n` 331: // * WORK (workspace/output) DOUBLE PRECISION array, dimension (MAX(1,LWORK))`\n` 332: // * On exit, if INFO = 0, WORK(1) returns the optimal LWORK.`\n` 333: // *`\n` 334: // * LWORK (input) INTEGER`\n` 335: // * The dimension of the array WORK. LWORK >= max(1,N,M,P).`\n` 336: // * For optimum performance LWORK >= max(N,M,P)*max(NB1,NB2,NB3),`\n` 337: // * where NB1 is the optimal blocksize for the QR factorization`\n` 338: // * of an N-by-M matrix, NB2 is the optimal blocksize for the`\n` 339: // * RQ factorization of an N-by-P matrix, and NB3 is the optimal`\n` 340: // * blocksize for a call of DORMQR.`\n` 341: // *`\n` 342: // * If LWORK = -1, then a workspace query is assumed; the routine`\n` 343: // * only calculates the optimal size of the WORK array, returns`\n` 344: // * this value as the first entry of the WORK array, and no error`\n` 345: // * message related to LWORK is issued by XERBLA.`\n` 346: // *`\n` 347: // * INFO (output) INTEGER`\n` 348: // * = 0: successful exit`\n` 349: // * < 0: if INFO = -i, the i-th argument had an illegal value.`\n` 350: // *`\n` 351: // * Further Details`\n` 352: // * ===============`\n` 353: // *`\n` 354: // * The matrix Q is represented as a product of elementary reflectors`\n` 355: // *`\n` 356: // * Q = H(1) H(2) . . . H(k), where k = min(n,m).`\n` 357: // *`\n` 358: // * Each H(i) has the form`\n` 359: // *`\n` 360: // * H(i) = I - taua * v * v'`\n` 361: // *`\n` 362: // * where taua is a real scalar, and v is a real vector with`\n` 363: // * v(1:i-1) = 0 and v(i) = 1; v(i+1:n) is stored on exit in A(i+1:n,i),`\n` 364: // * and taua in TAUA(i).`\n` 365: // * To form Q explicitly, use LAPACK subroutine DORGQR.`\n` 366: // * To use Q to update another matrix, use LAPACK subroutine DORMQR.`\n` 367: // *`\n` 368: // * The matrix Z is represented as a product of elementary reflectors`\n` 369: // *`\n` 370: // * Z = H(1) H(2) . . . H(k), where k = min(n,p).`\n` 371: // *`\n` 372: // * Each H(i) has the form`\n` 373: // *`\n` 374: // * H(i) = I - taub * v * v'`\n` 375: // *`\n` 376: // * where taub is a real scalar, and v is a real vector with`\n` 377: // * v(p-k+i+1:p) = 0 and v(p-k+i) = 1; v(1:p-k+i-1) is stored on exit in`\n` 378: // * B(n-k+i,1:p-k+i-1), and taub in TAUB(i).`\n` 379: // * To form Z explicitly, use LAPACK subroutine DORGRQ.`\n` 380: // * To use Z to update another matrix, use LAPACK subroutine DORMRQ.`\n` 381: // *`\n` 382: // * =====================================================================`\n` 383: // *`\n` 384: // * .. Local Scalars ..`\n` 385: // * ..`\n` 386: // * .. External Subroutines ..`\n` 387: // * ..`\n` 388: // * .. External Functions ..`\n` 389: // * ..`\n` 390: // * .. Intrinsic Functions ..`\n` 391: // INTRINSIC INT, MAX, MIN;`\n` 392: // * ..`\n` 393: // * .. Executable Statements ..`\n` 394: // *`\n` 395: // * Test the input parameters`\n` 396: // *`\n` 397: `\n` 398: #endregion`\n` 399: `\n` 400: `\n` 401: #region Body`\n` 402: `\n` 403: INFO = 0;`\n` 404: NB1 = this._ilaenv.Run(1, \"DGEQRF\", \" \", N, M, - 1, - 1);`\n` 405: NB2 = this._ilaenv.Run(1, \"DGERQF\", \" \", N, P, - 1, - 1);`\n` 406: NB3 = this._ilaenv.Run(1, \"DORMQR\", \" \", N, M, P, - 1);`\n` 407: NB = Math.Max(NB1, Math.Max(NB2, NB3));`\n` 408: LWKOPT = Math.Max(N, Math.Max(M, P)) * NB;`\n` 409: WORK[1 + o_work] = LWKOPT;`\n` 410: LQUERY = (LWORK == - 1);`\n` 411: if (N < 0)`\n` 412: {`\n` 413: INFO = - 1;`\n` 414: }`\n` 415: else`\n` 416: {`\n` 417: if (M < 0)`\n` 418: {`\n` 419: INFO = - 2;`\n` 420: }`\n` 421: else`\n` 422: {`\n` 423: if (P < 0)`\n` 424: {`\n` 425: INFO = - 3;`\n` 426: }`\n` 427: else`\n` 428: {`\n` 429: if (LDA < Math.Max(1, N))`\n` 430: {`\n` 431: INFO = - 5;`\n` 432: }`\n` 433: else`\n` 434: {`\n` 435: if (LDB < Math.Max(1, N))`\n` 436: {`\n` 437: INFO = - 8;`\n` 438: }`\n` 439: else`\n` 440: {`\n` 441: if (LWORK < Math.Max(1, Math.Max(N, Math.Max(M, P))) && !LQUERY)`\n` 442: {`\n` 443: INFO = - 11;`\n` 444: }`\n` 445: }`\n` 446: }`\n` 447: }`\n` 448: }`\n` 449: }`\n` 450: if (INFO != 0)`\n` 451: {`\n` 452: this._xerbla.Run(\"DGGQRF\", - INFO);`\n` 453: return;`\n` 454: }`\n` 455: else`\n` 456: {`\n` 457: if (LQUERY)`\n` 458: {`\n` 459: return;`\n` 460: }`\n` 461: }`\n` 462: // *`\n` 463: // * QR factorization of N-by-M matrix A: A = Q*R`\n` 464: // *`\n` 465: this._dgeqrf.Run(N, M, ref A, offset_a, LDA, ref TAUA, offset_taua, ref WORK, offset_work`\n` 466: , LWORK, ref INFO);`\n` 467: LOPT = (int)WORK[1 + o_work];`\n` 468: // *`\n` 469: // * Update B := Q'*B.`\n` 470: // *`\n` 471: this._dormqr.Run(\"Left\", \"Transpose\", N, P, Math.Min(N, M), ref A, offset_a`\n` 472: , LDA, TAUA, offset_taua, ref B, offset_b, LDB, ref WORK, offset_work, LWORK`\n` 473: , ref INFO);`\n` 474: LOPT = Math.Max(LOPT, Convert.ToInt32(Math.Truncate(WORK[1 + o_work])));`\n` 475: // *`\n` 476: // * RQ factorization of N-by-P matrix B: B = T*Z.`\n` 477: // *`\n` 478: this._dgerqf.Run(N, P, ref B, offset_b, LDB, ref TAUB, offset_taub, ref WORK, offset_work`\n` 479: , LWORK, ref INFO);`\n` 480: WORK[1 + o_work] = Math.Max(LOPT, Convert.ToInt32(Math.Truncate(WORK[1 + o_work])));`\n` 481: // *`\n` 482: return;`\n` 483: // *`\n` 484: // * End of DGGQRF`\n` 485: // *`\n` 486: `\n` 487: #endregion`\n` 488: `\n` 489: }`\n` 490: }`\n` 491: }`"
]
| [
null,
"http://dotnumerics.com/WebResource.axd",
null,
"http://dotnumerics.com/WebResource.axd",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5025309,"math_prob":0.99014914,"size":16311,"snap":"2023-40-2023-50","text_gpt3_token_len":5668,"char_repetition_ratio":0.1588275,"word_repetition_ratio":0.23084322,"special_character_ratio":0.47857276,"punctuation_ratio":0.2848501,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99892604,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T10:04:02Z\",\"WARC-Record-ID\":\"<urn:uuid:b1865ce4-cba6-4303-875e-ea5a630c871e>\",\"Content-Length\":\"69683\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0816c1d4-acd5-4eb7-a8ed-4326b7ff431a>\",\"WARC-Concurrent-To\":\"<urn:uuid:8f9e032c-fdbf-43e7-841f-e0321aad0b15>\",\"WARC-IP-Address\":\"45.58.159.42\",\"WARC-Target-URI\":\"http://dotnumerics.com/NumericalLibraries/LinearAlgebra/CSharpCodeFiles/dggqrf.aspx\",\"WARC-Payload-Digest\":\"sha1:GHFVIO775SBJDOPSBOPRTSB6TKKX6ORZ\",\"WARC-Block-Digest\":\"sha1:D56CLLPJSX4XEGQ6ARC5I4YWPOR4D5YL\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100739.50_warc_CC-MAIN-20231208081124-20231208111124-00219.warc.gz\"}"} |
https://answers.everydaycalculation.com/multiply-fractions/15-9-times-21-70 | [
"Solutions by everydaycalculation.com\n\n## Multiply 15/9 with 21/70\n\n1st number: 1 6/9, 2nd number: 21/70\n\nThis multiplication involving fractions can also be rephrased as \"What is 15/9 of 21/70?\"\n\n15/9 × 21/70 is 1/2.\n\n#### Steps for multiplying fractions\n\n1. Simply multiply the numerators and denominators separately:\n2. 15/9 × 21/70 = 15 × 21/9 × 70 = 315/630\n3. After reducing the fraction, the answer is 1/2\n\nMathStep (Works offline)",
null,
"Download our mobile app and learn to work with fractions in your own time:\nAndroid and iPhone/ iPad\n\n×"
]
| [
null,
"https://answers.everydaycalculation.com/mathstep-app-icon.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.89403224,"math_prob":0.9656605,"size":447,"snap":"2022-40-2023-06","text_gpt3_token_len":175,"char_repetition_ratio":0.16478555,"word_repetition_ratio":0.0,"special_character_ratio":0.4541387,"punctuation_ratio":0.08571429,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9680753,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-27T01:26:04Z\",\"WARC-Record-ID\":\"<urn:uuid:0a2609b4-3149-4500-87f0-ea6b03ac2901>\",\"Content-Length\":\"7223\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9b689599-34b4-4630-ae72-6ec3fbc91e78>\",\"WARC-Concurrent-To\":\"<urn:uuid:02a4c926-4e5d-4a1c-a254-88619ac3df0d>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/multiply-fractions/15-9-times-21-70\",\"WARC-Payload-Digest\":\"sha1:2URLPMYOHH7A5A6SZZWA4ZUJ3MHPBSHX\",\"WARC-Block-Digest\":\"sha1:BKBZETLXUKQWNYIHJK3CHDIISRRMWNVX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334974.57_warc_CC-MAIN-20220927002241-20220927032241-00781.warc.gz\"}"} |
https://www.classcentral.com/course/youtube-calculus-2-full-length-videos-53097 | [
"Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.\n\n# Calculus 2\n\n## Syllabus\n\nCalculus 2 Lecture 6.1: The Natural Log Function.\nCalculus 2 Lecture 6.2: Derivatives of Inverse Functions.\nCalculus 2 Lecture 6.3: Derivatives and Integrals of Exponential Functions.\nCalculus 2 Lecture 6.4: Derivatives and Integrals of General Exponential Functions.\nCalculus 2 Lecture 6.5: Calculus of Inverse Trigonometric Functions.\nCalculus 2 Lecture 6.6: A Discussion of Hyperbolic Functions.\nCalculus 2 Lecture 6.7: Evaluating Limits of Indeterminate Forms.\nCalculus 2 Lecture 7.1: Integration By Parts.\nCalculus 2 Lecture 7.2: Techniques For Trigonometric Integrals.\nCalculus 2 Lecture 7.3: Integrals By Trigonometric Substitution.\nCalculus 2 Lecture 7.4: Integration By Partial Fractions.\nCalculus 2 Lecture 7.6: Improper Integrals.\nCalculus 2 Lecture 8.1: Solving First Order Differential Equations By Separation of Variables.\nCalculus 2 Lecture 9.1: Convergence and Divergence of Sequences.\nCalculus 2 Lecture 9.2: Series, Geometric Series, Harmonic Series, and Divergence Test.\nCalculus 2 Lecture 9.3: Using the Integral Test for Convergence/Divergence of Series, P-Series.\nCalculus 2 Lecture 9.4: The Comparison Test for Series and The Limit Comparison Test.\nCalculus 2 Lecture 9.5: Showing Convergence With the Alternating Series Test, Finding Error of Sums.\nCalculus 2 Lecture 9.6: Absolute Convergence, Ratio Test and Root Test For Series.\nCalculus 2 Lecture 9.7: Power Series, Calculus of Power Series, Ratio Test for Int. of Convergence.\nCalculus 2 Lecture 9.8: Representation of Functions by Taylor Series and Maclauren Series.\nCalculus 2 Lecture 9.9: Approximation of Functions by Taylor Polynomials.\nCalculus 2 Lecture 10.2: Introduction to Parametric Equations.\nCalculus 2 Lecture 10.3: Calculus of Parametric Equations.\nCalculus 2 Lecture 10.4: Using Polar Coordinates and Polar Equations.\nCalculus 2 Lecture 10.5: Calculus of Polar Equations.\nNumerical Integration With Trapezoidal and Simpson's Rule.\n\n### Taught by\n\nProfessor Leonard\n\n## Reviews\n\nStart your review of Calculus 2\n\n###",
null,
"Never Stop Learning!\n\nGet personalized course recommendations, track subjects and courses with reminders, and more."
]
| [
null,
"https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Fsignup-illus-mobile.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.60302764,"math_prob":0.98485625,"size":1985,"snap":"2021-43-2021-49","text_gpt3_token_len":547,"char_repetition_ratio":0.30893487,"word_repetition_ratio":0.014545455,"special_character_ratio":0.2277078,"punctuation_ratio":0.22278482,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9911575,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-23T01:39:17Z\",\"WARC-Record-ID\":\"<urn:uuid:9b6d75b9-9d76-4475-9ef1-fdb920e61a49>\",\"Content-Length\":\"581916\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6e5f5616-5c11-4ef2-9c91-36a3a6b36721>\",\"WARC-Concurrent-To\":\"<urn:uuid:7288bac0-4a1a-40b4-acc7-05227e455af7>\",\"WARC-IP-Address\":\"34.68.4.21\",\"WARC-Target-URI\":\"https://www.classcentral.com/course/youtube-calculus-2-full-length-videos-53097\",\"WARC-Payload-Digest\":\"sha1:ZCITBIYPPTTDPUXQZD4Y7YGVUVNVY2DW\",\"WARC-Block-Digest\":\"sha1:QMGGZYU7LW7MJIH4MH5MTHAJSSIFU5XU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585537.28_warc_CC-MAIN-20211023002852-20211023032852-00220.warc.gz\"}"} |
https://studylib.net/doc/10916513/sharp-l--estimates-for-the-wave-equation-on-heisenberg-ty.. | [
"# SHARP L -ESTIMATES FOR THE WAVE EQUATION ON HEISENBERG TYPE GROUPS",
null,
"```SHARP Lp -ESTIMATES FOR THE WAVE EQUATION\nON HEISENBERG TYPE GROUPS\nLECTURE NOTES ORLEANS, APRIL 2008\nHTTP://ANALYSIS.MATH.UNI-KIEL.DE/MUELLER/\nDETLEF MÜLLER\nAbstract. In these lectures, which are based on recent joint work\nwith A. Seeger , I shall present sharp analogues of classical estimates by Peral and Miyachi for solutions of the standard wave\nequation on Euclidean space in the context of the wave equation\nassociated to the sub-Laplacian on a Heisenberg type group. Some\nrelated questions, such as spectral multipliers for the sub-Laplacian\nor Strichartz-estimates, will be briefly addressed. Our results improve on earlier joint work of mine with E.M. Stein. The new\nmore clearly the connections of the problem with the underlying\nsub-Riemannian geometry.\nDate: April 8, 2008.\n1\n2\nDETLEF MÜLLER\nContents\n1. Introduction\n2\n1.1. Connections with spectral multipliers and further facts\n7\n2. The sub-Riemannian geometry of a Heisenberg type group\n10\n3. The Schrödinger and the wave propagators on a Heisenberg\ntype group\n14\n3.1. Twisted convolution and the metaplectic group\n16\n3.2. A subordination formula\n18\n4. Estimation of Aλ,k,l,± if k ≥ 1\n22\n√\n5. Estimation of (1 + L)−(d−1)/4 ei\nL\nδ\n25\n5.1. Anisotropic re-scaling for k fixed\n27\n6. L2 -estimates for components of the wave propagator\n27\n7. Estimation for p = 1\n28\n8. Proof of Theorem 1.1\n31\n9. Appendix: The Fourier transform on a group of Heisenberg\ntype\n34\nReferences\n38\n1. Introduction\nLet\ng = g1 ⊕ g2 ,\nwith dim g1 = 2m and dim g2 = n, be a Lie algebra of Heisenberg type,\nwhere\n[g, g] ⊂ g2 ⊂ z(g) ,\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n3\nz(g) being the center of g. This means that g is endowed with an inner\nproduct h , i such that g1 and g2 or orthogonal subspaces and the\nfollowing holds true:\nIf we define for µ ∈ g∗2 \\ {0} the skew form ωµ on g1 by\nωµ (V, W ) := µ [V, W ] ,\nthen there is a unique skew-symmetric linear endomorphism Jµ of g1\nsuch that\nωµ (V, W ) = hµ, [V, W ]i = hJµ (V ), W i\n(here, we also used the natural identification of g∗2 with g2 via the inner\nproduct). Then\nJµ2 = −|µ|2 I\n(1.1)\nfor every µ ∈ g∗2 \\ {0}.\nNote that this implies in particular that [g1 , g1 ] = g2 .\nAs the corresponding connected, simply connected Heisenberg type\nLie group G we shall then choose the linear manifold g, endowed with\nthe Baker-Campbell-Hausdorff product\n(V1 , U1 ) (V2 , U2 ) := (V1 + V2 , U1 + U2 + 12 [V1 , V2 ])\nand identity element e = 0.\nNote that the nilpotent part in the Iwasawa decomposition of a simple Lie group of real rank one is always of Heisenberg type or Euclidean.\nAs usual, we shall identify X ∈ g with the corresponding leftinvariant vector field on G given by the Lie-derivative\nXf (g) :=\nd\nf (g exp(tX))|t=0 ,\ndt\nwhere exp : g → G denotes the exponential mapping, which agrees\nwith the identity mapping in our case.\nLet us next fix an orthonormal basis X1 , . . . , X2m of g1 , and let us\ndefine the non-elliptic sub-Laplacian\nL := −\n2m\nX\nj=1\nXj2\n4\nDETLEF MÜLLER\non G. Since the vector fields Xj together with their commutators span\nthe tangent space to G at every point, L is still hypoelliptic and provides an example of a non-elliptic “sum of squares operator ” in the\nsense of Hörmander (). Moreover, L takes over in many respects of\nanalysis on G the role which the Laplacian plays on Euclidean space.\nTo simplify the notation, we shall also fix an orthonormal basis\nU1 , . . . , Un of g2 , and shall in the sequel identify g = g1 + g2 and G\nwith R2m × Rn by means of the basis X1 , . . . , X2m , U1 , . . . , Un of g.\nThen our inner product\non g will agree with the canonical Euclidean\nP\n2m+n\nproduct z · w = 2m+n\nz\n, and Jµ will be identified with\nj wj on R\nj=1\na skew-symmetric 2m × 2m matrix. Moreover, the Lebesgue measure\ndx du on R2m+n is a bi-invariant Haar measure on G. By\nd := 2m + n\nwe shall denote the topological dimension of G. We also introduce the\nautomorphic dilations\nδr (x, u) := (rx, r 2 u),\nr > 0,\non G, and the Koranyi norm\nk(x, u)kK := (|x|4 + |4u|2)1/4 .\nNotice that this is a homogeneous norm with respect to the dilations δr ,\nand that L is homogeneous of degree 2 with respect to these dilations.\nMoreover, if we denote the corresponding balls by\nQr (x, u) := {(y, v) ∈ G : k(y, v)−1(x, u)kK < r}, (x, u) ∈ G, r > 0,\nthen the volume |Qr (x, u)| is given by\nwhere\n|Qr (x, u)| = |Q1 (0, 0)| r D ,\nD := 2m + 2n\nis the homogeneous dimension of G. We shall also have to work with\nthe Euclidean balls\nBr (x, u) := {(y, v) ∈ G : |(y − x, v − u)| < r}, (x, u) ∈ G, r > 0,\nwith respect to the Euclidean norm\n|(x, u)| := (|x|2 + |u|2)1/2 .\nIn the special case n = 1 we may assume that Jµ = µJ, µ ∈ R, where\n0\nIm\nJ :=\n−Im 0\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n5\nThis is the case of the Heisenberg group Hm , which is R2m ×R, endowed\nwith the product\n(z, u) · (z ′ , u′) = (z + z ′ , u + u′ + 21 hJz, z ′ i).\nA basis of the Lie algebra hm of Hm is then given by X1 , . . . , X2m , U,\n∂\nis central.\nwhere U := ∂u\nConsider the following Cauchy problem for the wave equation on\nG × R associated to L:\n∂2u\n∂u (1.2)\n−\n(−L)u\n=\n0,\nu\n=\nf,\n= g,\n∂t2\n∂t t=0\nt=0\nwhere t ∈ R denotes time.\nThe solution to this problem is formally given by\n!\n√\n√\nsin(t L)\n√\ng (x) + (cos(t L)f )(x),\nu(x, t) =\nL\n(x, t) ∈ G × R.\nIn fact, the above expression for u makes perfect sense at least for\nf, g ∈ L2 (G), if one defines the functions of L involved by the spectral\ntheorem (noticeR that L is essentially selfadjoint on C0∞ (G) ) as\n∞\nfollows: If L = 0 s dEs denotes the spectral resolution of L on L2 (G),\nthen every Borel function m on R+ gives rise to a (possibly unbounded)\noperator\nZ\n∞\nm(L) :=\nm(s) dEs\n0\non L2 (G). Let us also note that if m is a bounded spectral multiplier, then, by left–invariance and the Schwartz kernel theorem, it is\neasy\nto see that m(L) is a convolution operator m(L)f = f ∗ Km =\nR\nf (y)Km(y −1·) dy, where a priori the convolution kernel Km is a tem-\nG\npered distribution. We also write Km = m(L)δ.\nIf one decides to measure smoothness properties of the solution\nu(x, t) for fixed time t in terms of Sobolev norms of the form\nkf kLpα := k(1 + L)α/2 f kLp ,\none is √naturally led√to study the mapping properties of operators such\nsin(t L)\neit L\n√\nas (1+L)\nas operators on Lp (G) into itself.\nα/2 or\nL(1+L)α/2\n6\nDETLEF MÜLLER\nFor the classical wave equation on Euclidian space, sharp estimates\nfor the corresponding operators have been established by Peral and\nMiyachi .\n√\nd\n−α/2 it −∆\nIn particular, if ∆ denotes the Laplacian\non\ne\nR , then (1−∆)\n1 1\np\nd\nis bounded on L (R ), if α ≥ (d − 1) p − 2 , for 1 < p < ∞. Moreover,\n(d−1)/2\n(1 − ∆)− 2\ninto L1 (Rd ).\n√\neit\n−∆\nis bounded from the real Hardy space H 1 (Rd )\nLocal analogues of these results hold true for solutions to strictly\nhyperbolic differential equations (see e.g. ,, ).\nIndeed, as has been shown in and , the estimates in and\n locally hold true more generally for large classes of Fourier integral operators, and solutions to strictly hyperbolic equations can be\nexpressed in terms of such operators.\nThe problem in studying the wave equation associated to the subLaplacian on the Heisenberg group is the lack of strict hyperbolicity,\nsince L is degenerate-elliptic, and classical Fourier integral operator\ntechnics do not seem to be available any more. However, as we shall\nsee, it is still possible to represent solutions to (1.2) as infinite sums of\nFourier integral operators with degenerate phases and amplitudes.\nInteresting information about solutions to (1.2) have been obtained\nby Nachman . Among other things, Nachman showed that the\nwave operator on Hm admits a fundamental solution supported in a\n“forward light cone”, whose singularities lie along the cone Γ formed\nby the characteristics through the origin. Moreover, he computed the\nasymptotic behaviour of the fundamental solution as one approaches\na generic singular point on Γ. His method does, however, not provide\nuniform estimates on these singularities, so that it cannot be used to\nprove Lp -estimates for solutions to (1.2). What his results do reveal,\nhowever, is that Γ is by far more complex for Hm than the corresponding cone in the Euclidian case. This is related to the underlying, more\ncomplex sub-Riemannian geometry, which we shall briefly discuss.\nNevertheless, the following theorem is true, which improves on earlier\nwork in on the Heisenberg group, by also including the endpoint\nregularity, and which is a direct analogue of the results by Peral and\nMiyachi in the Euclidean setting.\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n7\n√\ni L\ne\np\nTheorem 1.1. (1+L)\nα/2 extends to a bounded operator on L (G), for\n.\n1 < p < ∞, when α ≥ (d − 1)| p1 − 12 |, and for p = 1, if α > d−1\n2\nThe proof will be based on some “Hardy space type result” for the\nendpoint p = 1, which will become evident later. The main difference compared to the Euclidean setting seems, however, that there is\nnot just one single Hardy space, but a whole sequence of local Hardy\nspaces associated with the problem, whose definitions are based on\nsome interesting interplay between two different homogeneities, namely\nthose coming from the isotropic dilations of the underlying Euclidean\nstructure of G and the one coming from the non-isotropic automorphic\ndilations on G (compare Remark 7.3).\nRemark 1.2. The same result holds for\ntors (1 + L)−α/2 (respectively\n√ −(α−1) (1 + L)\n(respectively (1 + L)\n).\n√\nsin\n√\nL\n, or with the fac√\n) replaced by (1 + L)−α ,\nL(1+L)\n−(α−1)/2\nα−1\n2\nNotice that the restriction to time t = 1 in our theorem is inessential,\nsince L is homogeneous of degree 2 with respect to the automorphic\ndilations (z, t) 7→ (rz, r 2 t), r > 0.\n1.1. Connections with spectral multipliers and further facts\nabout the wave equation. If m is a bounded spectral multiplier,\nthen clearly the operator m(L) is bounded on L2 (G). An important\nquestion is then under which additional conditions on the spectral multiplier m the operator m(L) extends from L2 ∩Lp (M) to an Lp -bounded\noperator, for a given p 6= 2. If so, m is called an Lp -multiplier for L.\nFix a non-trivial cut-off function χ ∈ C0∞ (R) supported in the interval [1, 2], and define for α > 0\nkmksloc,α := sup kχ m(r·)kH α ,\nr>0\nwhere H α = H α (R) denotes the classical Sobolev-space of order α.\nThus, kmksloc,α < ∞, if m is locally in H α , uniformly on every scale.\nNotice also that, up to equivalence, k·ksloc,α is independent of the choice\nof the cut-off function χ. Then the following analogue of the classical\nMihlin-Hörmander multiplier theorem holds true (see M. Christ ,\nand also Mauceri-Meda ):\n8\nDETLEF MÜLLER\nTheorem 1.3. If G is a stratified Lie group of homogeneous dimension\nD, and if kmksloc,α < ∞ for some α > D/2, then m(L) is bounded on\nLp (G) for 1 < p < ∞, and of weak type (1,1).\nObserve that, in comparizon to the classical case G = Rd , the homogeneous dimension D takes over the role of the Euclidian dimension\nd. Because of this fact, which is an outgrowth of the homogeneity of\nL with respect to the automorphic dilations, the condition α > D/2\nin Theorem 1.3 appeared natural and was expected to be sharp for\na while. The following result, which was found in joint work with\nE.M. Stein , and independently also by W. Hebisch a bit later,\ncame therefore as a surprise:\nTheorem 1.4. For the sub-Laplacian L on a Heisenberg type group G,\nthe statement in Theorem 1.3 remains valid under the weaker condition\nα > d/2 instead of α > D/2.\nTheorem 1.1 can be used to give a new, short proof of this (sharp)\nmultiplier theorem, based on the following simple Subordination Principle, respectively variants of it:\n√\ni L\ne\nProposition 1.5. Assume that (1+L)\nα/2 extends to a bounded operator\n1\non L (G), and let β > α + 1/2. Then there is a constant C > 0, such\nthat for any multiplier ϕ ∈ H β (R) supported in [1, 2], the corresponding\nconvolution kernel Kϕ = ϕ(L)δ is in L1 (G), and\nkKϕ kL1 (G) ≤ CkϕkH β (R) .\nProof. Observe first that (1 + L)−ε δ ∈ L1 (G) for any ε > 0. This\nfollows from the formula\nZ ∞\nZ ∞\n1\n1\n−ε\nε−1 −t(1+L)\n(1 + L) δ =\nt e\nδ dt =\ntε−1 e−t pt dt\nΓ(ε) 0\nΓ(ε) 0\nand the fact that the heat kernel pt := e−tL δ is a probability measure\non G. Write\n√\nϕ(s) = ψ( s)(1 + s)−γ , with γ > α/2,\nand put g := (1 + L)−γ δ ∈ L1 (G). Then ||ψ||H β ≃ ||ϕ||H β , and\nZ ∞\n√\n√\n√\n−γ\nψ̂(t)eit L g dt.\nKϕ = ψ( L)((1 + L) δ) = ψ( L)g = c\n−∞\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n9\nAnd, our assumption in combination with some easy multiplier estimates (cf. ) and the homogeneity of L yields\n√\nkeit\nL\ngk1 . k(1 + t2 L)α/2 gk1 . k(1 + t2 )α/2 (1 + L)α/2 gk1,\nhence\nkKϕ k1 .\nZ\n∞\n−∞\n|ψ̂(t)|(1 + |t|)α k(1 + L)α/2 gk1dt.\nBut, (1 + L)α/2 g = (1 + L)α/2−γ δ ∈ L1 , hence, by Hölder’s inequality\nand Plancherel’s theorem,\nZ ∞\n1/2 Z ∞\n1/2\nβ 2\nkKϕ ||1 .\n|ψ̂(t)(1+|t|) | dt\n·\n(1+|t|)2(α−β) dt\n. kψkH β .\n−∞\n−∞\nQ.E.D.\n+ 12 = d2 in this subordination prinIndeed, we may choose β > d−1\n2\nciple. This is just the required regularity of the multiplier in Theorem\n1.4, and one can in fact deduce this theorem from Theorem 1.1 by\nmeans of a refinement of the above subordination principle and standard arguments from Calderón-Zygmund theory.\nIn contrast to the close analogy between the wave equation on G and\non Euclidean space expressed in Theorem 1.1, there are other aspects\nwhere the solutions behave quite differently compared to the classical\nsetting.\nOne instance of this is the “almost” failure of dispersive estimates\nfor solutions to (1.2) on Heisenberg groups. Indeed, in , Bahouri,\nGérard and Xu prove that solutions to (1.2) on Hm with sufficiently\nsmooth initial data in L1 satisfy\nku(t)k∞ ≤ C|t|−1/2 ,\nand that the exponent −1/2 is optimal, whereas for the Laplacian on\nRd a dispersive estimate holds with exponent −(d − 1)/2. Correspondingly, the Strichartz estimates proven in are much weaker than the\nEuclidean analogues would suggest.\nA related result is the “almost” failure of (spectral) restriction theorems for Hm proven in .\n10\nDETLEF MÜLLER\n2. The sub-Riemannian geometry of a Heisenberg type\ngroup\nLet M be a smooth manifold, and let D ⊂ T M be a smooth distribution, i.e., a smooth subbundel of T M. A sub-Riemannian structure\n(D, g) on M is given by a smooth distribution D and a Riemannian metric g on D. For p ∈ M and X, Y ∈ D(p) we write hX, Y ig := gp (X, Y )\n1/2\nand kXk = hX, Xig . M, endowed with such a structure, is called a\nsub-Riemannian manifold.\nAn absolutely continuous curve γ : [0, T ] → M in M is then called\nhorizontal, if\nd\nγ̇(t) = γ(t) ∈ D(γ(t))\ndt\nfor almost every t ∈ [0, T ]. As in Riemannian geometry, the length of a\nhorizontal curve γ is then defined by\nZ T\nL(γ) :=\nkγ̇(t)kg dt.\n0\nThe Carnot–Carathéodory distance (or sub-Riemannian distance) on\n(M, D, g) is then defined by\ndCC (p, q) := inf{L(γ) : γ is a horinzontal curve joining p with q},\np, q ∈ M, where we use the convention that inf ∅ := ∞.\nWe shall here be interested in the special situation where D =\nspan {X1 , . . . , Xk }, and where X1 , . . . , Xk are smooth vector fields on\nM which form an orthonormal system with respect to g at every point.\nThen a curve γ is horizontal iff there are functions aj (t) such that γ̇(t) =\n1/2\nRT P\nPk\n2\na\n(t)X\n(γ(t))\nfor\na.e.\nt\n∈\n[0,\nT\n],\nand\nL(γ)\n=\na\n(t)\ndt.\nj\nj\nj\nj=1\nj\n0\nMoreover, if these vector fields are bracket generating, i.e., if they\nsatisfy Hörmander’s condition, then by the Chow-Rashevskii theorem\ndCC (p, q) < ∞ for every p, q ∈ M, and dCC is a metric on M that\ninduces the topology of M.\nLet us now consider the sub-Riemannian structure on a group G of\nHeisenberg type, where D = span {X1 , . . . , X2m }. Here, the Carnot–\nCarathéodory distance is left-invariant, i.e.,\ndCC (x, y) = kx−1 ykCC ,\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n11\nwhere kxkCC := dCC (0, x) is again a homogeneous norm on G. Observe\nthat there exists a constant C ≥ 1 such that\nC −1 kxkCC ≤ kxkK ≤ CkxkCC ,\n(2.1)\nsince any two homogeneous norms are equivalent . In analogy with\nwave equations on Riemannian manifolds, one expects that singularities\nof solutions propagate along “geodesics” of the underlying geometry.\nHowever, it turns out that the notion of geodesic of a sub-Riemannian\nmanifold is not as clear as one might expect. The perhaps best approach to the problem of determining length minimizing curves in this\ncontext is by means of control theory, as it is outlined in the article\n by Liu and Sussman, which I warmly recommend.\nOne type of geodesic can be constructed following classical geometrical optics ideas:\nIf x ∈ M, we endow the dual space D(x)∗ with the dual metric gx∗\nto gx on D(x) ⊂ T ∗ M. This allows to define the length of a cotangent\nvector (x, ξ) ∈ T ∗ M as kξkg := kξ|D(x)kgx∗ . The function H : T ∗ M → R\ngiven by\nH(x, ξ) := 21 kξk2g\nis called the Hamiltonian of the sub-Riemannian manifold M. Observe\nthat this is, apart from the factor 21 , just the principal symbol of the\nassociated sub-Laplacian. Since T ∗ M is a symplectic manifold\nin a\nP\ncanonical way with respect to the symplectic form ωM := j dξj ∧ dxj\n(in canonical coordinates), we may associate to H the Hamiltonian vector field H, i.e., ωM (X, H) = dH(X) for every X ∈ T M. The integral\ncurves (x(t), ξ(t)) of H are called bicharacteristics. They satisfy the\nHamilton-Jacobi equations\nẋ(t) =\n∂H\n(x(t), ξ(t)),\n∂ξ\n∂H\nξ˙ = −\n(x(t), ξ(t)),\n∂x\nand H is constant along every bicharacteristic. A normal geodesic of\nthe sub-Riemannian manifold M will then be the space projection x(t)\nof a bicharacteristic (x(t), ξ(t)) along which the Hamiltonian H does\nnot vanish. This notion is in accordance with the idea that the wave\nfront set of a solution to our wave equation should evolve along the\nbicharacteristics of the wave equation.\nIt is known that every length minimizing curve in a sub-Riemannian\nmanifold M is either such a normal geodesic, or an “abnormal geodesic” . I won’t give a definition of the latter ones here, since\n12\nDETLEF MÜLLER\nit is known that groups of Heisenberg type (and more generally,\nMetivier groups) do not admit non-trivial abnormal geodesics.\nHowever, it should be warned here that in general abnormal geodesics\ndo exist, even in nilpotent Lie groups (see for an example of a group\nof step 4, and for an example of step 2). This fact has been ignored\nin some cases in the literature, which had led to some confusion.\nOn a Heisenberg type group G, one easily finds that the Hamiltonian\nis given by\nH = 12 |ξ − 21 Jµ x|2 ,\nif we write coordinates for T ∗ G as ((x, u), (ξ, µ)) ∈ (R2m ×Rn )×(R2m ×\nRn ). The Hamilton-Jacobi equations are then given by\n∂H\n∂H\n,\nu̇ =\n∂ξ\n∂µ\n∂H\n∂H\nξ˙ = −\n,\nµ̇ = −\n.\n∂x\n∂u\nBy left-invariance, it suffices to condsider bicharacteristics starting at\nthe origin, i.e., x(0) = 0, u(0) = 0. We also put η := ξ − 12 Jµ x. Then\nH = 12 hη, ηi, so that |η| is constant along the bicharacteristic. Also\nµ = const., and\nẋ =\nẋ = η, ξ˙ = − 21 Jµ η\nη̇ = ξ˙ − 12 Jµ ẋ = −Jµ η,\nhence\nη(t) = e−tJµ α,\nif we put ξ(0) = η(0) := α. This implies x(t) =\nJµ2 = −|µ|2 I, we have\n(2.2)\n1−e−tJµ\nα,\nJµ\nand since\nsin( 2t |µ|) − t Jµ\ne 2 α.\nx(t) = 2\n|µ|\nFor simplicity, let us now assume that n = 1, i.e., that we are dealing\nwith a Heisenberg group. Then Jµ = µJ, with µ ∈ R, and we have\nsin( 2t |µ|) −tJµ\nt\nhe\nα, Je− 2 Jµ αi\nu̇ =\n=−\n|µ|\nt\nsin( 2 |µ|)\nt\nhα, Je 2 Jµ αi.\n= −\n|µ|\nhη, − 21 Jxi\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n13\nt\nLooking at the Taylor series of e 2 Jµ and using the fact that J is skew\nand satisfies J 2 = −I, this yields\nµ\nt\nu̇ =\n|α|2 sin2 ( |µ|),\n2\n|µ|\n2\nif µ 6= 0. Consequently,\n(\nsin( 2t |µ|) cos( 2t |µ|)\n) |α|2 |µ|µ2 ,\n( 2t −\n|µ|\n(2.3)\nu(t) =\n0, if µ = 0.\nif µ 6= 0\nThe same formula remains valid on an arbitrary Heisenberg type group\n. Observe that the curve γ(t) := (x(t), u(t)) is a normal geodesic\niff α 6=P\n0, and it has constant speed kγ̇kg = |ẋ(t)| = |η| = |α|, since\nγ̇(t) = j ẋj (t)Xj (γ(t)).\nDenote by Σ1 the set of endpoints of all geodesics of length 1 (see\nfigure 1). These endpoints are given by (2.2),(2.3), with t = 1, where\nα can be chosen arbitrarily within the unit sphere in R2m and µ in Rn .\nTherefore,\n(2.4)\nsin s s − sin s cos s Σ1 = {(x, u) ∈ G : |x| = , 4|u| = for some s ∈ R.}\n2\ns\ns\nWe then expect that Σ1 is exactly the singular support of any of the\nwave propagators\n√\n√\n√\nsin(t L)\n√\nδ, cos(t L)δ or eit L δ,\nL\nfor time t = 1, and this turns out to be true.\nSingular support of a wave emenating from a single point in the Heisenberg group\nFigure 1. Σ1\n14\nDETLEF MÜLLER\nThe “outer hull” of the set Σ1 is just the unit sphere with respect to\nthe Carnot-Carathéodory distance.\nLet us finally mention the well-known fact that solutions to our wave\nequation have finite propagation speed (see , or for an elementary√proof for Lie groups), i.e., if Pt denotes any of the wave propagators\n√\nsin(t L)\n√\nL)δ, then, for t ≥ 0,\nδ,\ncos(t\nL\n(2.5)\nsupp Pt ⊂ {(x, u) ∈ G : k(x, u)kCC ≤ t}\n3. The Schrödinger and the wave propagators on a\nHeisenberg type group\nOne principal problem in proving estimates for solutions to wave\nequations consists in finding sufficiently explicit expressions for the\nassociated wave propagators. For strictly hyperbolic equations, such\nexpressions can be given by means of Fourier integral operators, at least\nlocally in space and time. These technics, however, do not apply to\nwave equations associated to non-elliptic Laplacians, and no sufficiently\nexplicit expressions for the wave propagators are known to date in these\nmore general situations, except for the case of Heisenberg type groups\nand a few related examples. What allows us to give such expressions\non Heisenberg type groups is the existence of explicit formulas for the\nSchrödinger propagators eitL δ on these groups.\nThere are several possible approaches to these formulas. One would\nconsist in appealing to the Gaveau-Hulanicki formula , for the\nheat kernels e−tL δ, which can be derived by means of representation\ntheory and Mehler’s formula, and then trying to apply physicists approach and replacing time t by complex time −it.\nWe shall here sketch another approach, which is more far-reaching\nand has turned out to be useful also in the study of questions of solvability of general second order left-invariant differential operators on\n2-step nilpotent Lie groups (see , also for further references to this\ntopic).\nLet G be a group of Heisenberg type as before. Given f ∈ L1 (G) and\nµ ∈ g∗2 = R2m , we define the partial Fourier transform f µ of f along\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\nthe center by\nµ\nf (x) :=\nZ\nRn\n15\nf (x, u)e−2πiµ·u du (x ∈ R2m ).\nMoreover, if we define the µ–twisted convolution of two suitable functions ϕ and ψ on g1 = R2m by\nZ\n(ϕ ∗µ ψ)(x) :=\nϕ(x − y)ψ(y)e−iπωµ(x,y) dy,\nR2m\nthen\n(f ∗ g)µ = f µ ∗µ g µ ,\nwhere f ∗ g denotes the convolution product of the two functions f, g ∈\nL1 (G). Accordingly, the vector fields Xj are transformed into the µtwisted first order differential operators Xjµ such that (Xj f )µ = Xjµ f µ ,\nand the sub-Laplacian is transformed into the µ-twisted Laplacian Lµ ,\ni.e.,\n2m\nX\n(Lf )µ = Lµ f µ = −\n(Xjµ )2\nj=1\n(say for f ∈ S(G)). An easy computation shows that explicitly\nXjµ =\n∂\n+ iπωµ (x, Xj ).\n∂xj\nWhat turns out to be important for us is that the one-parameter\nµ\nSchrödinger group eitL , t ∈ R, generated by Lµ can be computed\nexplicitly:\nProposition 3.1. For f ∈ S(G),\nµ\neitL f = f ∗µ γtµ ,\nt ∈ R,\nwhere γtµ ∈ S ′ (R2m ) is a tempered distribution given by the imaginary\nGaussian\nm\nπ\n|µ|\n2\nµ\n−m\nγt (x) = 2\ne−i 2 |µ| cot(2πt|µ|)|x| ,\n(sin(2πt|µ|)\nwhenever sin(2πt|µ|) 6= 0. Moreover, by well-known formulas for the\ninverse Fourier transform of a generalized Gaussian , its Fourier\ntransform is\n2π\n1\ntan(2πt|µ|)|ξ|2\ni |µ|\nµ\nγc\ne\nt (ξ) =\n(cos(2πt|µ|))m\nwhenever cos(2πt|µ|) 6= 0.\n16\nDETLEF MÜLLER\n3.1. Twisted convolution and the metaplectic group. It is not\ndifficult to reduce the proof of Proposition 3.1 to the case of the Heisenberg group G = Hm , which we shall consider now. For any real, symmetric matrix A := (ajk )j,k=1,...,2m let us put\n(3.1)\nS := −AJ,\n0\nIm\nis as in the definition of the product in Hm .\n−Im 0\nIt is easy to see that the mapping A 7→ S is a vector space isomorphism\nof the space of all real, symmetric 2m×2m matrices onto the Lie algebra\nwhere J :=\nsp(m, R) := {S : tSJ + JS = 0}.\nLet us define\n∆S :=\n2m\nX\najk Xj Xk ,\nj,k=1\nS ∈ sp(m, R),\nwhere A is related to S by (3.1). Then one verifies easily that for any\nS1 , S2 ∈ sp(m, R), we have\n(3.2)\n[∆S1 , ∆S2 ] = −2U∆[S1 ,S2 ] ,\nwhere U denotes again the central basis element of hm . Applying a\npartial Fourier transform along the (here one-dimensional) center, this\nleads to the following commutation relations among the µ-twisted convolution operators ∆µS :\n[∆µS1 , ∆µS2 ] = −4πiµ ∆µ[S1 ,S2 ] .\nSince ∆µS is formally self-adjoint, this means that the mapping\n(3.3)\nS 7→\ni\n∆µ\n4πµ S\nis a representation of sp(m, R) by (formally) skew-adjoint operators on\nL2 (R2m ).\nLet us consider the case µ = 1 (it is not difficult to reduce considerations to this case). In this case, we just speak of the twisted convolution,\nand write ϕ × ψ in place of ϕ ∗1 ψ.\nIn , R. Howe has proved for this case that the map (3.3) can\nbe exponentiated to a unitary representation of the metaplectic group\nMp (m, R), a two-fold covering of the symplectic group Sp(m, R). The\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n17\ngroup Mp (m, R) can in fact be represented by twisted convolution operators of the form f 7→ f × γ, where the γ’s are suitable measures\nwhich, generically, are multiples of purely imaginary Gaussians\neA (z) := e−iπ\ntz·A·z\n,\nwith real, symmetric 2m × 2m matrices A. In particular, one has\nt\n1\nei 4π ∆S f = f × γt,S ,\n(3.4)\nt ∈ R.\nThe distributions γt,S have been determined explicitly in . To\nindicate how this can be accomplished, let us argue on a completely\nformal basis:\nIf eA , eB are two Gaussians as before such that det(A + B) 6= 0, one\ncomputes that\neA × eB = [det(A + B)]−1/2 eA−(A−J/2)(A+B)−1 (A+J/2) ,\nwhere a suitable determination of the root has to be chosen. Choosing\nA = 21 JS1 , B = 21 JS2 , with S1 , S2 ∈ sp(m, R), and assuming that S1\nand S2 commute, one finds that\ne 1 JS1 × e 1 JS2 = 2n (det(S1 + S2 ))−1/2 e 1 J[S1 S2 +I)(S1 +S2 )−1 ] .\n2\n2\n2\nThis reminds of the addition law for the hyperbolic cotangent, namely\ncoth x coth y + 1\n.\ncoth x + coth y\nWe are thus led to define, for non-singular S,\n1\n(3.5)\nA(t) := J coth(tS/2),\n2\nwhich is well-defined at least for |t| > 0 small.\ncoth(x + y) =\nThen\neA(t1 ) × eA(t2 ) = 2n (det(A(t1 ) + A(t2 )))−1/2 eA(t1 +t2 ) .\nAnd, from\nsinh(x + y)\n,\nsinh x sinh y\nwe obtain (ignoring again the determination of roots)\ncoth x + coth y =\n[det sinh((t1 + t2 )S/2)]1/2 [det(A(t1 ) + A(t2 ))]−1/2\n= [det sinh(t1 S/2)]1/2 [det sinh(t2 S/2)]1/2 .\n18\nDETLEF MÜLLER\nTogether this shows that\n(3.6)\nγt,S := 2−n [det sinh(tS/2)]−1/2 eA(t)\nforms a (local) 1-parameter group under twisted convolution, and it is\nnot hard to check that its infinitesimal generator is 4πi ∆1S .\nFinally, if we choose S := J, so that A = −I and ∆S = L, we\nobtain Proposition 3.1, at least for |µ| = 1; the general case follows by\na scaling argument.\nRemark 3.2. It is important to note that Howe’s construction of the\nmetaplectic group by means of twisted convolution operators can be extended to the so-called oscillator semigroup. If we denote by sp+ (C, m)\nthe cone of all elements S ∈ sp(C, m) such that the associated complex, symmetric matrix A = SJ has positive semi-definite real part,\nthen\naccordingly explicit formulas for the one-parameter semigroups\nt∆µ\nS\ne , t ≥ 0, have been derived in .\n3.2. A subordination formula. Fix a bump function χ0 ∈ C0∞ (R)\nsupported in the interval [1/2, 2]. If a ∈ S ν is a symbol of order ν ∈ R\non T ∗ R = R2 , i.e., if\n|∂sα ∂σβ a(s, σ)| ≤ Cα,β (1 + |σ|)ν−β ,\n(s, σ) ∈ R2 ,\nfor every α, β ∈ N, then we say that a is supported over the subset\nI ⊂ R if supp a(·, σ) ⊂ I for every σ ∈ R.\nProposition 3.3. There exist a symbol a0 ∈ S 0 supported over the\ninterval [1/16, 4] and a Schwartz function ρ ∈ S(R2 ) such that, for\nx ≥ 0,\n√x √\ntx it x\ne\nχ0\n= ρ\n, λt\nλ\nλZ\n√\nλt\nts\n+\n(3.7)\nλt a0 (s, λt) ei 4s ei λ x ds,\nfor every λ ≥ 1 and t > 0 such that λt ≥ 1.\nProof. This can easily be obtained by the method of stationary phase.\nµ\nThe explicit formulas in Proposition 3.1 for eitL in combination\nwith Proposition 3.3 allow√ us to describe spectrally localized parts of\nthe wave propagators e±it L δ. Of course, there is no loss of generality\nin assuming that t ≥ 0 and that the sign in the exponent is positive.\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n19\nMoreover, since L is homogeneous of degree 1 with respect to the automorphic dilations δr , we may reduce ourselves to considering the case\nwhere t = 1.\nLet us recall here that it is well-known that if ψ ∈ S(R), then the\nconvolution kernel ψ(L)δ will also be a Schwartz function (on G), whose\nL1 (G)-norm will be controlled by some Schwartz norm on S(R) (see,\n; also for a connection with finite propagation speed).\nProposition 3.4. Let χ0 ∈ C0∞ (R) be a bump function supported in\nthe interval [1/2, 2], and assume that λ ≥ 1. Then there exist Schwartz\nfunctions ψλ ∈ S(G) and Kλ ∈ S(G) such that\n√L √\nχ0\nei L δ = ψλ + Kλ ,\n(3.8)\nλ\nand so that the following hold true:\n(i) For every N ∈ N there is constant CN ≥ 0 so that\n||ψλ ||1 ≤ CN λ−N\nfor every λ ≥ 1.\n(ii) The partial Fourier transform Kλµ ∈ S(R2m ), (µ 6= 0), of Kλ is\ngiven by an oscillatory integral of the form\n√ Z\nλ\nµ\nµ\n, ϕi dt, ϕ ∈ S(R2m ),\nhKλ , ϕi = λ a0 (t, λ) ei 4t hγt/λ\nwhere a0 ∈ S 0 is a symbol of order 0 supported over the interval\n[1/16, 4] and where γtµ is given by Proposition 3.1.\nProof. Apart from (i), all the claims follow easily from the subordination\nformula (3.7) in Proposition 3.3, the spectral resolution\nR\nL = R+ s dEs and Fubini’s theorem in combination with Proposition\n3.1.\nTo prove (i), notice that we may choose ψλ := ρ Lλ , λ δ, with a\nSchwartz\nρ ∈ S(R2 ). In particular, every Schwartz norm of\nfunction\nx 7→ ρ λx , λ decays like = O(λ−N ) for every N ∈ N. By the previous remark, it is then also clear\nthat\nthe convolution kernel ψλ of the\nspectral multiplier operator ρ Lλ , λ will satisfy the estimates in (i).\n20\nDETLEF MÜLLER\nIn view of this proposition, it will in the sequel suffice to estimate\nthe convolution operators defined by the kernels Kλ . Moreover, for\nsimplicity, we may and shall assume that\n√ Z\nλ\nµ\nµ\n(3.9)\nhKλ , ϕi = λ χ0 (t) ei 4t hγt/λ\n, ϕi dt, ϕ ∈ S(R2m ),\nwhere χ0 ∈ C0∞ (R) is supported in the interval [1/16, 4]. Indeed, this\nwill be justified since our estimates will only depend on some C k -norm\nof χ0 .\n, 3π\n] and\nη0 ∈ C0∞ (R) such that supp η0 ⊂ [− 3π\n8\n8\nPWe next choose\nπ\nη\n(s\n+\nk\n)\n=\n1\nfor\nevery\ns\n∈\nR,\nand\nput\n0\nk∈Z\n2\nZ\nλ\nµ\nµ\n1/2\n, ϕi dt,\nχ0 (t) η0 (2πt|µ|/λ − kπ) ei 4t hγt/λ\nhAλ,k , ϕi := λ\nZ\nλ\nµ\nµ\n1/2\n, ϕi dt.\nχ0 (t) η0 (2πt|µ|/λ − kπ − π2 ) ei 4t hγt/λ\nhBλ,k , ϕi := λ\nBy Aλ,k and Bλ,k we shall denote the tempered distributions defined\non G whose partial Fourier transforms along the center are given by\nµ\nAµλ,k and Bλ,k\n, respectively. Then\n(3.10)\nKλ =\n∞\nX\n(Aλ,k + Bλ,k )\nk=0\nin the sense of distributions.\nFor the sake of this exposition, we shall restrict ourselves to considering the Aλ,k . Since\nµ\nµ\nhγt/λ\n, ϕi = hγd\nb\nt/λ , ϕi,\nµ\nµ\nwhere γd\nt/λ is given by Proposition 3.1, it is clear that Aλ,k is a wellµ\ndefined tempered distribution. However, since the integral kernel γt/λ\nhas a singularity in t where 2πt|µ|/λ = kπ if k 6= 0, we shall here perform a priori a dyadic decomposition with respect to t. More precisely,\nif k ≥ 1, let us fix another bump\nχ1 ∈ C0∞ (R) supported in\nP∞ function\nthe interval [1/2, 2] so that l=0 χ1 (2l s) = 1 for every s ∈]0, 3π\n], and\n8\ndecompose the distribution Aµλ,k as\n(3.11)\nhAµλ,k , ϕi\n=\n∞\nX\nl=0\n(hAµλ,k,l,+, ϕi + hAµλ,k,l,−, ϕi),\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n21\nwhere Aλ,k,l,± is defined to be the smooth function\nR\nAµλ,k,l,±(x) := λ1/2 χ0 (t)χ1 ± 2l (2πt|µ|/λ − kπ) η0 (2πt|µ|/λ − kπ)\nm λ\nπ\n2\n|µ|\n2−m (sin(2πt|µ|/λ)\nei 4t 2−m e−i 2 |µ| cot(2πt|µ|/λ)|x| dt\nBy Fourier inversion in the central variable u, we have\nZ\nAλ,k,l,± (x, u) =\nAµλ,k,l,± (x)e2πiu·µ dµ,\nRn \\{0}\nIn the integration w.r. to µ, we introduce polar coordinates µ =\nrω, r > 0, ω ∈ S n−1 . Then dµ = r n−1 dσn−1 (ω), where dσn−1 denotes\nthe surface measure on the sphere S n−1 . It is well-known by the\nmethod of stationary phase that\nZ\neiu·ω dσn−1 (ω) = ei|u| a+ (|u|) + e−2πi|u| a− (|u|), u ∈ Rn ,\nS n−1\nwhere a+ , a− ∈ S −(n−1)/2 are symbols of order −(n − 1)/2.\nSince the integral defining Aµλ,k,l,± is absolutely convergent in t, applying this and suitable changes of coordinates, we then find that\n(3.12)\nAλ,k,l,± (x, u) = Aλ,k,l,±,a+ (x, |u|) + Aλ,k,l,±,a− (x, −|u|),\nwhere for any symbol a ∈ S −(n−1)/2 the function Aλ,k,l,±,a(x, v) on R2m ×\nR is given by\nRR\nAλ,k,l,±,a(x, v) = λm+n+1/2\nχ(t) χ1 ± 2l (s − kπ) η(s − kπ)sm+n−1\n1\nsin(s)−m eiλts( s −cot(s)|x|\n2 +4v)\na(λst4|v|) dtds.\nSince k ≥ 1, this can be re-written in the form\nR R t χ1 (±2l s)\nAλ,k,l,±,a(x, v) = λm+n+1/2 k m+n−1\nχ s/k+π sinm (s) η(s)\n(3.13)\niλkt\ne\n1\n−cot(s)|x|2 +4v\ns+kπ\na(λkt4|v|) dsdt,\nwhere the functions χ and η have similar properties as χ1 and η0 .\nA similar expressions can be given for k = 0.\n22\nDETLEF MÜLLER\n4. Estimation of Aλ,k,l,± if k ≥ 1\nWe next need to establish estimates for the kernels Aλ,k,l,±, into which\nthe kernels Aλ,k decompose, and their derivatives. In some regions, the\nestimates that can be obtained for these kernels will be useful only if\nλ & k. However, this problem can be fixed in an easy way, and we\nshall not go into details here but prefer to give a somewhat simplified\naccount of the actual estimates that we can obtain, for the sake of\nclarity of exposition.\nWe shall only consider Aλ,k,l,+,a, since Aλ,k,l,−,a, can be estimated very\nmuch in the same way. Let us use the short-hand notation Fl (x, v) :=\nAλ,k,l,+,a(x, v), so that, by (3.13), for k ≥ 1 we have\nZ Z t\nm+n+1/2 m+n−1 (m−1)l\nχ −l −1\nFl (x, v) = λ\nk\n2\nχ(l) (r)\n2 k r+π\niλkt ψ(2−l r)+4v\nη(2−l r)e\na(λkt4|v|) drdt,\nwhere the function ψ(s) is given by\n1\n− |x|2 cot(s),\nψ(s) :=\ns + kπ\nand where\nχ1 (r)\nχ(l) (r) := l\n(2 sin(2−l r))m\nis again supported where r ∼ 1. Moreover, if 2−l r ∈ supp η and k ≥ 1,\nthen |2−l r| ≤ 3π\n≤ kπ\n, so that\n8\n2\n1\n∼ k −1\n+ kπ\nfor every k ≥ 1, l ≥ 0 (the case of the negative sign will actually become\nrelevant for the Aλ,k,l,−,a only.)\n±2−l r\nNotice that all derivatives of χ(l) (r) are uniformly bounded in l. We\ncan therefore re-write\nFl (x, v) = λm+n+1/2 k m+n−1 2(m−1)l\nZ Z\niλkt ψ(2−l r)+4v\n(4.1)\n·\nχk,l (r, t)e\na(λkt4|v|) drdt,\nwhere χk,l (r, t) is a smooth function supported where\nr ∼ 1, t ∼ 1,\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n23\nsuch that\n|∂rα ∂tβ χk,l (r, t)| ≤ Cα,β for every α, β ∈ N,\n(4.2)\nuniformly in k and l.\nSince\n(4.3)\n1\n+ |x|2 sin(s)−2 ,\n(s + kπ)2\n2\nψ ′′ (s) =\n− 2|x|2 cos(s) sin(s)−3 ,\n(s + kπ)3\nψ ′ (s) = −\nwe see that the critical points s = sc of ψ are given by the equation\nsin(sc ) = ±|x|(sc + kπ), hence those of ψ(2−l ·) by r = 2l sc . If r is\nsupposed to lie in our domain of integration, then |x| ∼ 2−l k −1 . For\nsuch x, there is then in fact exactly one critical point sc = sc,k (|x|) ∼ 2−l\nsufficiently close to our domain of integration, given by\nsin(sc ) = |x|(sc + kπ).\n(4.4)\nFor later use, let us also put\nγk (|x|) := ψ(sc,k (|x|)) =\n1\n− |x|2 cot(sc,k (|x|)).\nsc,k (|x|) + kπ\nObserve that, by (4.4), this can be re-written as\n(4.5)\nγk (|x|) =\nsk (|x|) − sin sk (|x|) cos sk (|x|)\n,\nsk (|x|)2\nif we put sk (|x|) := sc,k (|x|) + kπ.\nAssume that λ & 2l k.\nIn this case, one gains from the r-integration in Fl , which we perform\nfirst. To this end, recall that ψ(s) has now a unique critical point\nsc = sc,k (|x|) ∼ 2−l if |x| ∼ 2−l k −1 .\nWe may thus apply the method of stationary phase to the integration in r. Noticing that the critical point of the phase ψl is given by\n2l sc,k (|x|), one eventually finds that\nFl (x, v) = λ\nm+n+1/2 m+n−1 (m−1)l\nk\n2\nZ\nχ(t)a(λkt4|v|)\niλkt ψ(sc,k (|x|))+4v\nb(k 2 22l |x|2 , λk −1 2−l t)e\ndrdt,\n24\nDETLEF MÜLLER\nwhere χ(t) is again a smooth cut-off function supported where t ∼ 1,\nand where b ∈ S −1/2 is a symbol of order −1/2 on T ∗ R, which may in\nfact depend also on k and l, but which lie in a bounded set of S −1/2\nwith respect to the natural Fréchet topology on S −1/2 .\nConsequently,\nAλ,k,l,+,a(x, ±|u|) = λ\n(4.6)\nm+n+1/2 m+n−1 (m−1)l\nk\n2\nZ\nχ(t)a(λkt4|u|)\niλkt γk (|x|)±4|u|\nb(k 2 22l |x|2 , λk −1 2−l t)e\ndt,\nwhere γk (|x|) := ψ(sc,k (|x|)) is explicitly given by (4.5).\nNow, integrations by parts in (4.6) easily yield that, for every N ∈ N,\n1\n1\n|Aλ,k,l,+,a(x, ±|u|)| ≤ CN λm+n k m+n− 2 2(m− 2 )l\n−N\nn−1\n(4.7)\n.\n·(1 + λk|u|)− 2 1 + λk|γk (|x|) ± 4|u||\nThe actual details of these arguments are more involved, and a complete estimate of Aλ,k,l,+,a requires a careful case analysis and domain\ndecompositions.\nRemarks 4.1. (a) Observe that (4.7) shows that the singularities of\nAλ,k,l,+(x, u) are located where |u| = γk (|x|). In view of (4.4) and (4.5),\nthese are thus located where the pair of norms (|x|, 4|u|) lies on the\npiece of the parametric curve\nsin s s − sin s cos s γ : s 7→ , ,\ns\ns2\ncorresponding to the range of parameters where s − kπ ∼ 2−l .\nThis corresponds exactly to the set Σ1 , in view of (2.4).\n(b) Analogous estimates and results hold true for Aλ,k,l,− (x, u). Here,\nwe have sc (|x|) < 0, and the singularities correspond to the range of\nparameters where s − kπ ∼ −2−l .\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n25\n1/k\n1/(k+1)\n1/k\nFigure 2. curve γ\n√\n5. Estimation of (1 + L)−(d−1)/4 ei\nLet us put\n1 1\nα(p) := (d − 1) − ,\np 2\nL\nδ\n1 ≤ p < ∞.\n√\nWe need to estimate (1 + L)−α(p)/2 ei L δ on Lp (G) in Theorem 1.1.\nBy means of a dyadic decomposition, this can easily be reduced to\nestimating the operator\n∞\n√L √\nX\n−α(p)j\nei L ,\n(5.1)\n2\nχ̃\nj\n2\nj=0\nfor a suitable cut-off function χ̃ supported in [1/16, 4]. In view of (3.10),\nthis means that we have to estimate the convolution operators on Lp (G)\ngiven by the integral kernels\np,±\nEk,J\n(x, u)\n:=\nJ X\n∞\nX\n2−α(p)j A2j ,k,l,±(x, u)\nj=0 l=0\nand the corresponding kernels, with Aλ,k,l,± replaced by Bλ,k,l,±. These\nkernels will converge, in the sense of distributions, to distributions Ekp,±\nas J → ∞, and we shall have to show that the estimates sum in k.\n26\nDETLEF MÜLLER\nOur estimates will follow from some rather elementary estimate for\nthe case p = 2, and a deeper estimate for p = 1 on a suitable local\nHardy space h1k , whose definition will depend on k, by means of complex\ninterpolation. The corresponding interpolation argument is standard\n(cf. ,).\nLet’s here concentrate on the case p = 1, and the kernels\n+\nEk,J\n:=\n1,+\nEk,J\n=\nJ X\n∞\nX\n2−\n(d−1)\nj\n2\nA2j ,k,l,+.\nj=0 l=0\nWhat can be proved in the end for these kernels is a result, which,\n±\nProposition 5.1. Let k ≥ 1. There exist kernel functions Kλ,k,l\n∈\nl\n1\nS(G), for λ ≥ 2 k, and Rk,J ∈ L (G) so that\n(5.2)\n+\nEk,J\n=\n∞\nX\nJ\nX\n(K2+j ,k,l + K2−j ,k,l) + Rk,J ,\nl=0 j=l+log2 k\nand such that the following hold true:\n±\n(a) The kernel Kλ,k,l\nis supported in the set\n{(x, u) ∈ G : |x| ∼ 2−l k −1 and λk|u| & 1},\nand can be estimated, for every α ∈ N2m , β ∈ Nn , by\nn+1\n(5.3)\n1\n1\n±\n|∂xα ∂uβ Kλ,k,l\n(x, u)| ≤ CN,α,β λ|α| (λk)|β| λ 2 k m+n− 2 2(m− 2 )l\n−N\nn−1\n(1 + λk|u|)− 2 1 + λk|γk (|x|) ± 4|u||\n,\nfor every N ∈ N, with constants CN,α,β which independent of\nλ, k and l, and where γk (|x|) is given by (4.5). In particular,\n(5.4)\n1\n±\nk∂xα ∂uβ Kλ,k,l\nk1 . λ|α| (λk)|β| (2l k)−m− 2 .\n(b) The sequence {Rk,J }J converges for J → ∞ in L1 (G) towards\na function Rk ∈ L1 (G), and\n(5.5)\n1\nkRk k1 ≤ Ck −m− 2 ,\nwith a constant C not depending on k.\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n27\n5.1. Anisotropic re-scaling for k fixed. Let k ≥ 1, and denote by\nF̃ (x, u) := k −D F (k −1 x, k −2 u)\nthe L1 -norm preserving scaling of a function F on G by δk−1 . Let us\nalso put\nk\n−Γk (v) := k 2 γk (k −1 v) − .\nπ\nWe can then make the interesting observation that, by (5.3), (5.4), the\n±\n]\nnon-isotropically re-scaled kernels K\nare supported in the set\nλ,k,l\n{(x, u) ∈ G : |x| ∼ 2−l and\nλ\n|u| & 1},\nk\nand satisfy the isotropic estimates\nλ |α|+|β| n+1\n1\n1\nα β ]\n±\n|∂x ∂u Kλ,k,l (x, u)| ≤ CN,α,β\nλ 2 k −(m+n+ 2 ) 2(m− 2 )l\nk\n−N\nλ k\nλ\n− n−1\n2\n(5.6)\n1 + − Γk (|x|) ± 4|u|\n(1 + |u|)\nk\nk π\nand\nλ |α|+|β|\n1\n±\n]\n(5.7)\nk∂xα ∂uβ K\nk\n.\n(2l k)−m− 2 .\n1\nλ,k,l\nk\nMoreover, one easily verifies that\n1\np\n−2\n−1\n2\n.\n(5.8)\nΓk (v) = π arcsin(πv) + π v 1 − (πv) + O\nk\n6. L2 -estimates for components of the wave propagator\nDenote by Aλ,k,l,± the convolution operator\nAλ,k,l,±f := f ∗ Aλ,k,l,±\non L2 (G). It follows from Proposition 3.1 that\nR\nAµλ,k,l,± = λ1/2\nχ0 (t)χ1 (±2l (2πt|µ|/λ − kπ)) η0 (2πt|µ|/λ − kπ)\nλ\nµ\nei 4t eit/λ L dt δ.\nComparing with (9.13) and (9.12) in the Appendix, which obtained by\nmeans of Plancherel’s formula on G, we then find that the operator\nnorm of Aλ,k,l,± on L2 (G) is given by\n(6.1)\nkAλ,k,l,±k = λ1/2 sup{|αλ,k,l,±(ν, q)| : ν ≥ 0, q ∈ N},\n28\nDETLEF MÜLLER\nwhere\nαλ,k,l,±(ν, q)\nZ\nν\nλ\n:=\nχ0 (t)χ1 (±2l (t λν − kπ)) η0 (t λν − kπ)ei{ 4t +t λ (m+2q)} dt.\nThe method of stationary phase then implies that\nkAλ,k,l,±k ≤ C,\nuniformly in λ, k and l. By the same method, we also get, for any α ≥ 0,\n∞ X\nX\n2−αj A2j ,k,l,±k ≤ C 2−αj0 ,\n(6.2)\nk\nl=0 j≥j0\nuniformly in l and j0 .\n7. Estimation for p = 1\nWe introduce a non-standard atomic local Hardy space h1 on G as\nfollows:\nAn atom centered at the origin is an L2 -function a supported in a\nEuclidean ball Br (0) of radius r ≤ 1 satisfying the normalizing condition\n(7.1)\nkak2 ≤ r −d/2\nand, if r < 1, in addition the moment condition\nZ\n(7.2)\na(x) dx = 0.\nG\nNotice that in particular kak1 . 1. An atom centered at z ∈ G is\nthe left-translate by z of an atom centered at the origin. The local\nHardy space h1 (G) consists of all L1 -functions which admit an atomic\ndecomposition\nX\n(7.3)\nf=\nλj aj ,\nj\nP\nwith atoms aj and coefficients λj such that j |λj | < ∞. We define the\nP\nnorm kf kh1 as the infimum of the sums j |λj | < ∞ over all possible\natomic decompositions (7.3) of f.\nIn comparison, let us denote by h1E := h1 (R2m × Rn ) the classical\nEuclidean local Hardy space introduced by Goldberg . Since atoms\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n29\nin this space which are supported in a ball of radius r ≥ 1 need not\nsatisfy (7.2), such atoms can be decomposed into atoms supported in\nballs of radius 1, so that one can give the same atomic definition for\nh1E as for h1 , only with the non-commutative group translation in G\nreplaced by Euclidean translation.\nConsider the cylindrical sets Z(y) := {(x, u) ∈ G : |x − y| ≤ 10}, for\ny ∈ R2m . Note the following easy, but important observations:\nLemma 7.1. a) Any atom a supported in Z(0) is indeed also a Euclidean atom in h1E (possibly up to a fixed factor depending only on G),\nand vice versa.\nb) If HE1 := H 1 (R2m × Rn ) denote the classical Euclidean Hardy\nspace, and if η ∈ C0∞ (R2m ), then multiplication with η ⊗ 1 maps HE1\ncontinuously into h1E .\nb) is known for compactly supported smooth multipliers, and the\nproof carries over easily.\nSince G can be covered by sets Z(yj ) with bounded overlap, if we\nchoose a suitable ε-separated set of points {yj }j for a suitable constant\nε > 0, one can use a) and b) in combination with classical arguments\n to show that our non-standard Hardy space h1 (G) interpolates with\nL2 (G) by the complex method.\nWe shall not do this here, but indicate the main idea in the interpolation argument explained later.\nProposition 7.2. There is a constant C > 0, such that\nfor every f ∈ h1 (G).\n1,±\n−m\nkf ∗ Eg\nkf kh1\nk k1 ≤ Ck\nProof. We again consider only Ek1,+ = Ek+ . In view of the atomic\ndecomposition of f and because of left-invariance, one can show that\nit suffices to assume that f = a is an atom centered at the origin and\nsupported in a ball Br (0). We shall also assume that r < 1, so that a\nhas vanishing integral, since the case r = 1 is somewhat easier. In view\nof Proposition 5.1, we have to understand in particular the functions\n±\n^\na∗K\n.\n2j ,k,l\n30\nDETLEF MÜLLER\nTo simplify the argument a bit, assume that n = 1, so that |u| = ±u.\n±\n]\nLet’s also assume that we consider the part of K\nwhere u > 0, and\nλ,k,l\n±\n]\nthat K\nλ,k,l were not only essentially, but actually supported in the set\nwhere\nk\nk\n− Γk (|x|) + 4u| ≤ .\nπ\nλ\nTranslating these kernels along the center by πk , in view of (5.6) we can\nthen make the (slightly oversimplified) assumption that\nk\n±\n−l\n1\n]\nu\n−\nΓ\n(|x|)\n(7.4) supp K\n⊂\n{(x,\nu)\n∈\nG\n:\n|x|\n∼\n2\nand\n≤ },\nλ,k,l\n4 k\nλ\nand that\nλ |α|+|β|\n1\n1\n±\n]\n(7.5)\n|∂xα ∂uβ K\n(x,\nu)|\n≤\nC\nλ k −(m+n+ 2 ) 2(m− 2 )l\nN,α,β\nλ,k,l\nk\nDefine for ρ > 0 the set\n1\nΩρ := {(x, u) ∈ G : |x| . 1 and u − 4 Γk (|x|) ≤ Cρ}\nwhere C is a sufficiently large constant, and choose j0 so that\nk2−j0 = r.\nObrserve that with this choice of j0\nXX\n±\n^\nK\n) ⊂ Ωr ,\n(7.6)\nsupp a ∗ (\n2j ,k,l\nj≥j0\nl\nsince supp a ⊂ Br (0). We therefore split\nEk1,± = Ek,r + Fk,r ,\nwhere\nEk,r :=\nFk,r :=\nP∞ P\nl=0\nP∞\nl=0\nj≥j0\nP\nj<j0\n2−α(1)j A2j ,k,l,±,\n2−α(1)j A2j ,k,l,± .\ng\nWe estimate a ∗ E\nk,r separately on the set Ωr and it’s complement. By\nHölder’s inequality and (6.2), we get\n(d−1)\n1/2\ng\nka ∗ E\nkak2 2−α(1)j0 . r 1/2 r −(m+1/2) 2− 2 j0 ≤ k −m .\nk,r kL1 (Ωr ) . |Ωr |\nP P\n±\n^\ng\nMoreover, since by Proposition 5.1 Ek,r = l j≥j0 K\n2j ,k,l +Rk,r , where\n1\nkRk,r k1 . k −m− 2 , we obtain from (7.6) that\n1\n−m−\ng\ng\n2,\nka ∗ E\nk,r kL1 (G\\Ωr ) ≤ ka ∗ Rk,r kL1 (G) . k\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n31\nso that\n−m\ng\nka ∗ E\n.\nk,r k1 . k\n(7.7)\ng\ng\nConsider next a∗ F\nk,r . Again, by Proposition 5.1, we can write Fk,r =\n1\nP P\n−m−\n±\n′\n^\n′\ng\n2 . And, for j < j0 , we\nl\nj<j0 K2j ,k,l + Rk,r , where kRk,r k1 . k\nhave, by (7.4),\nX\n±\n^\nK\n) ⊂ Ω −j .\nsupp a ∗ (\nk2\n2j ,k,l\nl\nR\nMoreover, making use of the cancellation a dx = 0 and (7.5) in es±\n^\ntimating the convolution product a ∗ K\n, we gain a factor of order\nO( k2r−j ) compared to (5.7) and obtain\nka ∗\nX\nl\n±\n^\nK\n2j ,k,l k1 .\nSumming in j, this gives\n(7.8)\n∞\nX\nl=0\n2j ,k,l\n1\n1\nr\nr\n(2l k)−m− 2 . 2j k −m− 2\n−j\nk2\nk\n−m− 12\ng\n.\nka ∗ F\nk,r k1 . k\nThe estimates (7.7) and (7.8) imply the proposition.\nRemark 7.3. Let us denote by h1k (G) the re-scaled local Hardy space\nconsisting of all function\nf (x, u) := k D f˜(kx, k 2 u), f˜ ∈ h1 (G).\nThen Proposition 7.1 can be re-stated as\nkf ∗ Ek1,± k1 ≤ Ck −m kf kh1k\nfor every f ∈ h1k (G). Thus, h1k (G) is a natural space associated with\nthe k-th piece Ek1,± of the wave propagator whose definition depends\non the parameter k.\n8. Proof of Theorem 1.1\nObserve that by (6.2) convolution with the kernel\n∞ X\n∞\nX\n2,±\nEk :=\nA2j ,k,l,±\nj=0 l=0\nis bounded on L2 (G), and\n(8.1)\nkf ∗ Ek2,± k2 ≤ Ckf k2 ,\n32\nDETLEF MÜLLER\nwhere C is independent of k. Consider now the analytic family of operators\n∞ X\n∞\nX\n2−αj A^\n0 ≤ Re α ≤ (d−1)\nTα : f 7→ f ∗\n.\n2j ,k,l,± ,\n2\nj=0 l=0\nBy ignoring some error terms, we may assume that all A^\n2j ,k,l,± are\nsupported in Z(0) (even a smaller cylindrical set). This implies that if\nf is supported in a cylindrical set Z(y), then Tα f is supported in the\n“cylindrical double” 2Z(y) := {(x, u) ∈ G : |x − y| ≤ 20}, for every\ny ∈ R2m , which allows to reduce to functions f supported in a set Z(y),\nand we may even assume y = 0, by translation invariance.\nChoosing a suitable cut-off function η ∈ C0∞ (R2m ) so that η ⊗ 1\nlocalizes to Z(0), we therefore consider the localized operators\nTα0 f := Tα ((η ⊗ 1)f ).\n0\nBy Lemma 7.1 and Proposition 7.3, T d−1\n: HE1 → L1 continuously, and\n2\nsince the proof of Proposition 7.3 remains valid for T d−1 +iβ , we have\n2\n0\nkT d−1 +iβ f k1 ≤ Ck\n−m\n2\nkf kHE1\n∀β ∈ R.\nSimilarly, by (8.1), we have\nkTiβ0 f k2 ≤ Ckf k2\n∀β ∈ R.\nWe can thus apply the complex interpolation result by C. Fefferman\nand Stein in to obtain\n2\n0\nkTα(p)\nf kp ≤ Ck −( p −1)m kf kp ,\n1 < p ≤ 2.\nIn view of the afore-mentioned support property of the convolution\nkernels involved, this immediately implies\nα(p),±\nkf ∗ Ek\n2\nkp ≤ Ck −( p −1)m kf kp ,\n1 < p ≤ 2.\nIf m ≥ 2, these estimates sum in k for p sufficiently close to 1, so that\n(8.2)\n√\nk(1 + L)−α(p)/2 ei\nL\nf kp ≤ Ckf kp\nfor these p. Interpolating these estimates with the corresponding trivial\nestimate for p = 2 we then obtain Theorem 1.1 for 1 < p ≤ 2, and the\ncase p > 2 follows by duality.\nFor m = 1, the result can be obtained by means of a minor refinement\nof the arguments.\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n33\nThe L1 -estimate in Theorem 1.1 follows a lot more easily from Propod−1\nsition 5.1, since for α > d−1\nwe have an additional factor λ−(α− 2 )\n2\nin the corresponding estimate (5.4), so that the corresponding norms\nkK2±j ,k,l k1 simply sum in j, k and l.\n34\nDETLEF MÜLLER\n9. Appendix: The Fourier transform on a group of\nHeisenberg type\nLet us first briefly recall some facts about the unitary representation\ntheory of a Heisenberg type group G (compare ,). For the convenience of the reader, we shall show how this representation theory\ncan easily be reduced to the well-known case of the Heisenberg group\nHm = R2m × R. In slightly modified notation, the product in Hm is\ngiven by\n1\n(z, t) · (z ′ , t′ ) = (z + z ′ , t + t′ + ω(z, z ′ )),\n2\nwhere ω denotes the canonical symplectic form\n0 −Im\n(9.1)\nω(z, w) := hJz, wi,\nJ :=\n,\nIm\n0\non R2m . Let us split coordinates z = (x, y) ∈ Rm × Rm in R2m , and\nconsider the associated natural basis of left-invariant vector fields\n∂\n∂\n∂\n∂\n∂\nX̃j :=\n− 12 yj , Ỹj :=\n+ 12 xj , j = 1, . . . , m, and T := ,\n∂xj\n∂t\n∂yj\n∂t\n∂t\nof the Lie algebra of Hm .\nFor τ ∈ R× := R \\ {0}, the Schrödinger representation ρτ of Hm acts\non the Hilbert space L2 (Rm ) as follows:\n1\n[ρτ (x, y, t)h](ξ) := e2πiτ (t+y·ξ+ 2 y·x) h(ξ + x),\nh ∈ L2 (Rm ).\nThis is an irreducible, unitary representation, and every irreducible\nunitary representation of Hm which acts non-trivially on the center is\nin fact unitarily equivalent to exactly one of these, by the Stone-von\nNeumann theorem (a good reference to these and related results is for\nNext, if π is any unitary representation, say, of a Heisenberg type\ngroup G, we denote by\nZ\nπ(f ) :=\nf (g)π(g) dg, f ∈ L1 (G),\nG\nthe associated representation of the group algebra L1 (G). Going back\nto the Heisenberg group,\nR if f ∈ S(Hm ), then it is well-known and\neasily seen that ρτ (f ) = R2m f −τ (z)ρτ (z, 0) dz is a trace class operator\non L2 (Rm ), and its trace is given by\nZ\n−m\nf (0, 0, t)e2πiτ t dt = |τ |−m f −τ (0, 0),\n(9.2)\ntr(ρτ (f )) = |τ |\nR\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n35\nfor every τ ∈ R× .\nFrom these facts, it is easy to derive the Plancherel formula for our\nHeisenberg type group G. Given µ ∈ g∗2 = Rn , µ 6= 0, consider the\nmatrix Jµ introduced in Section 3. If |µ| = 1, then Jµ2 = −I, because\nof (1.1). In particular, Jµ has only eigenvalues ±i, and since it is\northogonal, it is easy to see that there exists an orthonormal basis\nXµ,1 , . . . , Xµ,m , Yµ,1, . . . , Yµ,m\nof g1 = R2m which is symplectic with respect to the form ωµ , i.e., ωµ\nis represented by the standard symplectic matrix J in (9.1).\nThis means that, for every µ ∈ Rn \\ {0}, there is an orthogonal\nµ ∈ O(2m, R) such that\nmatrix Rµ = R |µ|\n(9.3)\nJµ = |µ|Rµ J tRµ .\nNotice also that tRµ = Rµ−1 , and that condition (9.3) is in fact equivalent to G being of Heisenberg type.\nWe remark that (9.3) easily implies that the subalgebra L1r (G) of\nL1 (G), consisting of all radial functions f (x, u) in the sense that they\ndepend only on |x| and u, is commutative. This fact is well-known and\neasy to prove for Heisenberg groups (,). And, by means of (9.3),\none easily checks that\n(ϕ ∗µ ψ) ◦ Rµ = (ϕ ◦ Rµ ) ×|µ| (ψ ◦ Rµ )\nfor all functions ϕ, ψ ∈ L1 (R2m ). Therefore, if f, g ∈ L1r (G), then f µ ◦\nRµ , g µ ◦Rµ are radial on R2m , and thus f µ ◦Rµ ×|µ| g µ ◦Rµ = g µ ◦Rµ ×|µ|\nf µ ◦ Rµ , which is again radial. Consequently, f µ ∗µ g µ = g µ ∗µ f µ , for\nevery µ, and thus\n(9.4)\nf ∗g = g∗f\nfor every f, g ∈ L1r (G).\nThe following lemma is easy to check and establishes a useful link\nbetween representations of G and those of Hm .\nLemma 9.1. The mapping αµ : G → Hm , given by\nαµ (z, u) := ( tRµ z, µ·u\n),\n|µ|\n(z, u) ∈ R2m × Rn ,\nis an epimorphism of Lie groups. In particular, G/ ker αµ is isomorphic\nto Hm , where ker αµ = µ⊥ is just the orthogonal complement of µ in\nthe center Rn of G.\n36\nDETLEF MÜLLER\nGiven µ ∈ Rn \\ {0}, we can now define an irreducible unitary representation πµ of G on L2 (Rm ) by simply putting\nπµ := ρ|µ| ◦ αµ .\nObserve that then πµ (0, u) = e2πiµ·u I. In fact, any irreducible representation of G with central character e2πiµ·u factors through the kernel of\nαµ and hence, by the Stone-von Neumann theorem, must be equivalent\nto πµ .\nOne then computes that, for f ∈ S(G),\nZ\nπµ (f ) =\nf −µ (Rµ z)ρ|µ| (z, 0) dz,\nR2m\nso that the trace formula (9.2) yields the analogous trace formula\ntr πµ (f ) = |µ|−m f −µ (0)\nn\nRon G. The Fourier minversion formula in R then leads to f (0, 0) =\ntr πµ (f ) |µ| dµ. When applied to δg−1 ∗ f, we arrive at the\nµ∈Rn \\{0}\nFourier inversion formula\nZ\n(9.5)\nf (g) =\ntr (πµ (g)∗πµ (f )) |µ|m dµ, g ∈ G.\nµ∈Rn \\{0}\nApplying this to f ∗ ∗ f at g = 0, where f ∗ (g) := f (g −1), we obtain the\nPlancherel formula\nZ\n2\n(9.6)\nkf k2 =\nkπµ (f )k2HS |µ|m dµ,\nµ∈Rn \\{0}\nwhere kT k2HS = tr (T ∗ T ) denotes the Hilbert-Schmidt norm.\nLet us next consider the group Fourier transform of our sub-Laplacian\nL on G.\nWe first observe that dαµ (X) = tRµ X for every X ∈ g1 = R2m , if\nwe view, for the time being, elements of the Lie algebra as tangential\nvectors at the identity element. Moreover, by (9.3), we see that\nt\nRµ Xµ,1 , . . . , tRµ Xµ,m , tRµ Yµ,1 , . . . , tRµ Yµ,m\nforms a symplectic basis with respect to the canonical symplectic form\nω on R2m . We may thus assume without loss of generality that this\nbasis agrees with our basis X̃1 , . . . , X̃m , Ỹ1 , . . . , Ỹm of R2m , so that\ndαµ (Xµ,j ) = X̃j , dαµ (Yµ,j ) = Ỹj ,\nj = 1, . . . , m.\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n37\nBy our construction of the representation πµ , we thus obtain for the\nderived representation dπµ of g that\n(9.7)\ndπµ (Xµ,j ) = dρ|µ| (X̃j ), dπµ (Yµ,j ) = dρ|µ| (Ỹj ),\nj = 1, . . . , m.\nLet us define the sub-Laplacians Lµ on G and L̃ on Hm by\nLµ := −\nm\nX\n2\n(Xµ,j\n+\n2\nYµ,j\n),\nj=1\nm\nX\nL̃ := −\n(X̃j2 + Ỹj2 ),\nj=1\nwhere from now on we consider elements of the Lie algebra again as\nleft-invariant differential operators. Then, by (9.6),\ndπµ (Lµ ) = dρ|µ| (L̃).\nMoreover, since the basis Xµ,1 , . . . , Xµ,m , Yµ,1 , . . . , Yµ,m and our original\nbases X1 , . . . , X2m of g1 are both orthonormal bases, it is easy to verify\nthat the distributions Lδ0 and Lµ δ0 do agree. Since Af = f ∗ (Aδ0 )\nfor every left-invariant differential operator A, we thus have L = Lµ ,\nhence\n(9.8)\ndπµ (L) = dρ|µ| (L̃).\nBut, it is well-known that dρ|µ| (L̃) = ∆ξ −(2π|µ|)2|ξ|2 is just a re-scaled\nHermite operator, and an orthonormal basis of L2 (Rm ) is given by the\ntensor products\n|µ|\n|µ|\nh|µ|\nα := hα1 ⊗ · · · ⊗ hαm ,\nα ∈ Nm ,\nwhere hµk (x) := (2π|µ|)1/4hk ((2π|µ|)1/2 x). Here,\ndk −x2\ne\ndxk\ndenotes the L2 -normalized Hermite function of order k on R. Consequently,\nhk (x) = ck (−1)k ex\n(9.9)\n2 /2\n|µ|\ndπµ (L)h|µ|\nα = 2π|µ|(m + 2|α|)hα ,\nIt is also easy to see that\n(9.10)\ndπµ (Uj ) = 2πiµj I,\nα ∈ Nm .\nj = 1, . . . , n.\nNow, the operators L, −iU1 , . . . , −iUn form a commuting set of selfadjoint operators, with joint core S(G), so that they admit a joint\nspectral resolution, and we can thus give meaning to expressions like\nϕ(L, −iU1 , . . . , −iUn ) for each continuous function ϕ defined on the\ncorresponding joint spectrum. For simplicity of notation we write\nU := (−iU1 , . . . , −iUn ).\n38\nDETLEF MÜLLER\nIf ϕ is bounded, then ϕ(L, U) is a bounded, left invariant operator on\nL2 (G), so that it is a convolution operator\nϕ(L, U)f = f ∗ Kϕ ,\nf ∈ S(G),\nwith a convolution kernel Kϕ ∈ S ′ (G) which will also be denoted by\nϕ(L, U)δ. Moreover, if ϕ ∈ S(R × Rn ), then ϕ(L, U)δ ∈ S(G) (compare , ). Since functional calculus is compatible with unitary\nrepresentation theory, we obtain in this case from (9.9), (9.10) that\n(9.11)\n|µ|\nπµ (ϕ(L, U)δ)h|µ|\nα = ϕ(2π|µ|(m + 2|α|), 2πµ)hα\n(this identity in combination with the Fourier inversion formula could\nin fact be taken as the definition of ϕ(L, U)δ). In particular, the\nPlancherel theorem implies then that the operator norm on L2 (G) is\ngiven by\n(9.12)\nkϕ(L, U)k = sup{|ϕ(|µ|(m + 2q), µ)| : µ ∈ Rn , q ∈ N}.\nFinally, observe that\n(9.13)\nKφµ = ϕ(Lµ , 2πµ)δ;\nthis follows for instance by applying the unitary representation induced\nfrom the character e2πiµ·u on the center of G to Kϕ .\nReferences\n Hajer Bahouri, Patrick Gérard, and Chao-Jiang Xu. Espaces de Besov et estimations de Strichartz généralisées sur le groupe de Heisenberg. J. Anal. Math.,\n82:93–118, 2000.\n R. Michael Beals. Lp boundedness of Fourier integral operators. Mem. Amer.\nMath. Soc., 38(264):viii+57, 1982.\n Michael Christ. Lp bounds for spectral multipliers on nilpotent groups. Trans.\nAmer. Math. Soc., 328(1):73–81, 1991.\n Y. Colin de Verdière and M. Frisch. Régularité lipschitzienne et solutions de\nl’équation des ondes sur une variété riemannienne compacte. Ann. Sci. École\nNorm. Sup. (4), 9(4):539–565, 1976.\n Ewa Damek and Fulvio Ricci. Harmonic analysis on solvable extensions of\nH-type groups. J. Geom. Anal., 2(3):213–248, 1992.\n C. Fefferman and E. M. Stein. H p spaces of several variables. Acta Math.,\n129(3-4):137–193, 1972.\n G. B. Folland and Elias M. Stein. Hardy spaces on homogeneous groups, volume 28 of Mathematical Notes. Princeton University Press, Princeton, N.J.,\n1982.\n Gerald B. Folland. Harmonic analysis in phase space, volume 122 of Annals of\nMathematics Studies. Princeton University Press, Princeton, NJ, 1989.\nTHE WAVE EQUATION ON GROUPS OF HEISENBERG TYPE\n39\n Bernard Gaveau. Principe de moindre action, propagation de la chaleur et\nestimées sous elliptiques sur certains groupes nilpotents. Acta Math., 139(12):95–153, 1977.\n David Goldberg. A local version of real Hardy spaces. Duke Math. J., 46(1):27–\n42, 1979.\n Chr. Golé and R. Karidi. A note on Carnot geodesics in nilpotent Lie groups.\nJ. Dynam. Control Systems, 1(4):535–549, 1995.\n Waldemar Hebisch. Multiplier theorem on generalized Heisenberg groups. Colloq. Math., 65(2):231–239, 1993.\n Lars Hörmander. Hypoelliptic second order differential equations. Acta Math.,\n119:147–171, 1967.\n Lars Hörmander. The analysis of linear partial differential operators. I, volume\n256 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]. Springer-Verlag, Berlin, 1983. Distribution\ntheory and Fourier analysis.\n Roger Howe. The oscillator semigroup. In The mathematical heritage of Hermann Weyl (Durham, NC, 1987), volume 48 of Proc. Sympos. Pure Math.,\npages 61–132. Amer. Math. Soc., Providence, RI, 1988.\n A. Hulanicki. The distribution of energy in the Brownian motion in the Gaussian field and analytic-hypoellipticity of certain subelliptic operators on the\nHeisenberg group. Studia Math., 56(2):165–173, 1976.\n Andrzej Hulanicki. A functional calculus for Rockland operators on nilpotent\nLie groups. Studia Math., 78(3):253–266, 1984.\n Wensheng Liu and Héctor J. Sussman. Shortest paths for sub-Riemannian\nmetrics on rank-two distributions. Mem. Amer. Math. Soc., 118(564):x+104,\n1995.\n Giancarlo Mauceri and Stefano Meda. Vector-valued multipliers on stratified\ngroups. Rev. Mat. Iberoamericana, 6(3-4):141–154, 1990.\n Richard Melrose. Propagation for the wave group of a positive subelliptic\nsecond-order differential operator. In Hyperbolic equations and related topics\n(Katata/Kyoto, 1984), pages 181–192. Academic Press, Boston, MA, 1986.\n Akihiko Miyachi. On some estimates for the wave equation in Lp and H p . J.\nFac. Sci. Univ. Tokyo Sect. IA Math., 27(2):331–354, 1980.\n D. Müller and F. Ricci. Analysis of second order differential operators on\nHeisenberg groups. I. Invent. Math., 101(3):545–582, 1990.\n D. Müller and A. Seeger. Sharp Lp -estimates for the wave equation on Heisenberg type groups. in preparation, 2008.\n D. Müller and E. M. Stein. On spectral multipliers for Heisenberg and related\ngroups. J. Math. Pures Appl. (9), 73(4):413–440, 1994.\n Detlef Müller. A restriction theorem for the Heisenberg group. Ann. of Math.\n(2), 131(3):567–587, 1990.\n Detlef Müller. Analysis of invariant PDO’s on the Heisenberg group.\nLecture notes ICMS-Instructional conference, Edinburgh, April 1999,\nhttp://analysis.math.uni-kiel.de/mueller/, 1999.\n Detlef Müller. Marcinkiewicz multipliers and multi-parameter structure on\nHeisenberg groups. Lecture notes of a minicorso at Padova, June 2004,\nhttp://analysis.math.uni-kiel.de/mueller/, 2004.\n40\nDETLEF MÜLLER\n Detlef Müller. Local solvability of linear differential operators with double characteristics. II. Sufficient conditions for left-invariant differential operators of\norder two on the Heisenberg group. J. Reine Angew. Math., 607:1–46, 2007.\n Detlef Müller, Fulvio Ricci, and Elias M. Stein. Marcinkiewicz multipliers\nand multi-parameter structure on Heisenberg (-type) groups. I. Invent. Math.,\n119(2):199–233, 1995.\n Detlef Müller, Fulvio Ricci, and Elias M. Stein. Marcinkiewicz multipliers\nand multi-parameter structure on Heisenberg (-type) groups. II. Math. Z.,\n221(2):267–291, 1996.\n Detlef Müller and Elias M. Stein. Lp -estimates for the wave equation on the\nHeisenberg group. Rev. Mat. Iberoamericana, 15(2):297–334, 1999.\n Adrian I. Nachman. The wave equation on the Heisenberg group. Comm. Partial Differential Equations, 7(6):675–714, 1982.\n Edward Nelson and W. Forrest Stinespring. Representation of elliptic operators\nin an enveloping algebra. Amer. J. Math., 81:547–560, 1959.\n Martin Paulat. Sub-Riemannian geometry and heat kernel estimates. Dissertation, C.A.University Kiel, 2008.\n Juan C. Peral. Lp estimates for the wave equation. J. Funct. Anal., 36(1):114–\n145, 1980.\n Fulvio Ricci. Harmonic analysis on generalized Heisenberg groups. unpublished\npreprint.\n Andreas Seeger, Christopher D. Sogge, and Elias M. Stein. Regularity properties of Fourier integral operators. Ann. of Math. (2), 134(2):231–251, 1991.\nD. Müller, Mathematisches Seminar, C.A.-Universität Kiel, LudewigMeyn-Str.4, D-24098 Kiel, Germany"
]
| [
null,
"https://s2.studylib.net/store/data/010916513_1-1cd38b438237763de2ce0e78a255c362.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8189958,"math_prob":0.99134636,"size":62400,"snap":"2020-10-2020-16","text_gpt3_token_len":21880,"char_repetition_ratio":0.12045644,"word_repetition_ratio":0.049160767,"special_character_ratio":0.3423077,"punctuation_ratio":0.15772913,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9983257,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-25T22:08:16Z\",\"WARC-Record-ID\":\"<urn:uuid:541603d4-3af6-44d1-95d9-ed3f8203a5a7>\",\"Content-Length\":\"131680\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:54908f04-14cc-4623-ab32-0a376e4b87a8>\",\"WARC-Concurrent-To\":\"<urn:uuid:b7a038f5-c792-43f1-93e0-017fef084a54>\",\"WARC-IP-Address\":\"104.24.124.188\",\"WARC-Target-URI\":\"https://studylib.net/doc/10916513/sharp-l--estimates-for-the-wave-equation-on-heisenberg-ty..\",\"WARC-Payload-Digest\":\"sha1:BHQJTRXQWO632T26MJGCEYVGJQMN4XFJ\",\"WARC-Block-Digest\":\"sha1:Z7RNFKVE43GTWFT6M7I2SIIJUQQ4T333\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146160.21_warc_CC-MAIN-20200225202625-20200225232625-00296.warc.gz\"}"} |
https://terraria.fandom.com/zh/wiki/%E6%B0%B8%E5%A4%9C%E5%88%83 | [
"•",
null,
"",
null,
"",
null,
"类型 \\l!--\\n --\\g\\{\\{#vardefine:_typepage\\!\\{\\{#or:\\{\\{l10n\\!item_infobox\\!typepage:@@@@\\}\\}\\!\\{\\{tr\\!\\{\\{ucfirst:@@@@\\}\\}\\!link\\ey\\}\\}\\}\\}\\}\\}\\l!--\\_\\n --\\g\\{\\{#vardefine:_typetext\\!\\{\\{#or:\\{\\{l10n\\!item_infobox\\!type:@@@@\\}\\}\\!\\{\\{tr\\!\\{\\{ucfirst:@@@@\\}\\}\\}\\}\\}\\}\\}\\}\\l!--\\_\\n --\\g\\{\\{nowrap\\!class\\etag\\!\\{\\{ifexists\\!\\{\\{#var:_typepage\\}\\}\\!\\(\\(\\{\\{#var:_typepage\\}\\}\\!\\{\\{#var:_typetext\\}\\}\\)\\)\\!\\{\\{#var:_typetext\\}\\}\\}\\}\\}\\}\\l!--\\n --\\g\\l!--\\n --\\g\\{\\{#vardefine:_typepage\\!\\{\\{#or:\\{\\{l10n\\!item_infobox\\!typepage:@@@@\\}\\}\\!\\{\\{tr\\!\\{\\{ucfirst:@@@@\\}\\}\\!link\\ey\\}\\}\\}\\}\\}\\}\\l!--\\_\\n --\\g\\{\\{#vardefine:_typetext\\!\\{\\{#or:\\{\\{l10n\\!item_infobox\\!type:@@@@\\}\\}\\!\\{\\{tr\\!\\{\\{ucfirst:@@@@\\}\\}\\}\\}\\}\\}\\}\\}\\l!--\\_\\n --\\g\\{\\{nowrap\\!class\\etag\\!\\{\\{ifexists\\!\\{\\{#var:_typepage\\}\\}\\!\\(\\(\\{\\{#var:_typepage\\}\\}\\!\\{\\{#var:_typetext\\}\\}\\)\\)\\!\\{\\{#var:_typetext\\}\\}\\}\\}\\}\\}\\l!--\\n --\\g 42 (近战) 4.5(普通击退力) 4% 21(快速度) / 27(普通速度)",
null,
"4 需要 1 份\n\n使用 \\{\\{#lstmap:\\$soundfiles\\$\\!,\\!%%%%\\!\\l!--\\_print\\_sounds\\n --\\g\\lspan\\_style\\e\"margin-left:2px;\"\\g\\{\\{sound\\!\\!\\{\\{trim\\!%%%%\\}\\}\\}\\}\\l/span\\g\\l!--\\n --\\g\\!\\}\\}\n\n!!Error: (请输入有效的值。参见Template:Modifier。)\n\n## 制作\n\ntotal: 2 row(s)\n\n### 制作树\n\n × 20(",
null,
"+",
null,
") × 60( 地狱 ) × 30 40 (",
null,
"",
null,
") × 30 40 (",
null,
"",
null,
") × 12 × 12 15 (",
null,
"",
null,
")",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"(",
null,
") × 10 × 10",
null,
"/",
null,
"",
null,
"/",
null,
"",
null,
"/",
null,
"",
null,
"/",
null,
"或",
null,
"/",
null,
"total: 2 row(s)\n\n## 备注\n\n• 因为永夜刃需要来自地牢村正,因此它只在骷髅王被打败之后才可获得。\n• 在中,几乎总是会在地牢守卫生成的深度以上生成一个锁住的金箱,并且其中总会有一把村正。因此,有可能在打败骷髅王之前就得到永夜刃。\n\n## 花絮\n\n• 1.1 更新以前,永夜刃是游戏中最强大的剑,尽管此地位现在已被推翻了。尽管如此,它仍然是最强的困难模式之前的剑。\\{\\{comma/item\\!\\l!--\\n --\\g\\{\\{#var:_s_bi_start\\}\\}\\l!--\\_bold/italic\\_opening\\_tags\\n --\\g\\{\\{@@@@\\_version\\!\\{\\{#var:_s_mode\\}\\}\\!short\\e\\{\\{#var:_s_short\\}\\}\\!nl\\e\\{\\{#var:_s_nl\\}\\}\\!small\\e\\{\\{#var:_s_small\\}\\}\\}\\}\\l!--\\n --\\g\\{\\{#var:_s_bi_end\\}\\}\\l!--\\_bold/italic\\_closing\\_tags\\n --\\g\\}\\}上除外,在其中晶光刃在困难模式之前已经可用。\n• 永夜刃是唯一一种在祭坛上制作又不是 Boss 召唤物品的物品。\n• 用于制作它的四把剑各自代表了困难模式之前的一种主要的困难生物群落:草剑代表的是丛林,村正是地牢,炽焰巨剑是地狱,魔光剑/血腥屠刀代表的是邪恶生物群落\n• 永夜刃在现实中也有相应的玩具,由 Jazwares 制造。\n• 它在《地牢守护者 2》中作为 Phantom's Edge 出现。\n• 无论用的是哪个制作配方,因为永夜刃散发出来的颗粒的关系,它都像是腐化主题的剑。\n• 此剑的微粒包括了制作此剑所用的全部剑:村正(正十字)、炽焰巨剑(斜十字)、草剑(小泡泡)、和魔光剑/血腥屠刀(大泡泡)。\n\n## 历史\n\n• 电脑版 1.4.1\n• 使用时间由 27 降低至 21。\n• 现在能自动挥舞了。\n• 主机版 1.02\n• 现在用于原版永夜刃的制作。\n• 血腥屠刀现在可以用来在制作配方中替代魔光剑。\n• 出售价值由 54 提升至 18\n• 主机正式版:伴随着电脑版 1.0.6 的相应外观和机制引入。\n• 移动版 1.2.11212\n• 现在用于原版永夜刃的制作。\n• 血腥屠刀现在可以用来在制作配方中替代魔光剑。\n• 出售价值由 54 提升至 18\n• 移动正式版:伴随着电脑版 1.0.6 的相应外观和机制引入。\n• 3DS正式版:和机制、配方、外观一道由电脑版 1.2 引入。\n\n## 参考\n\n1. Terraria-Based Toys Now Available! 2014 年 10 月 30 日"
]
| [
null,
"https://static.wikia.nocookie.net/terraria_gamepedia/images/9/98/Night%27s_Edge.png/revision/latest",
null,
"https://static.wikia.nocookie.net/terraria_gamepedia/images/c/ca/Night%27s_Edge_%28old%29.png/revision/latest",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null,
"data:image/gif;base64,R0lGODlhAQABAIABAAAAAP///yH5BAEAAAEALAAAAAABAAEAQAICTAEAOw%3D%3D",
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.52381647,"math_prob":0.9910934,"size":4679,"snap":"2022-27-2022-33","text_gpt3_token_len":3109,"char_repetition_ratio":0.26395723,"word_repetition_ratio":0.12612613,"special_character_ratio":0.49369523,"punctuation_ratio":0.25925925,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.983442,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56],"im_url_duplicate_count":[null,1,null,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-06T03:18:13Z\",\"WARC-Record-ID\":\"<urn:uuid:5753fcb3-55c1-47d1-8dce-c78f77aada2f>\",\"Content-Length\":\"555636\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c3a51a8d-914d-4de3-b856-3b2c7539e300>\",\"WARC-Concurrent-To\":\"<urn:uuid:623f1c3c-23bf-4243-a810-867726ed67a4>\",\"WARC-IP-Address\":\"151.101.0.194\",\"WARC-Target-URI\":\"https://terraria.fandom.com/zh/wiki/%E6%B0%B8%E5%A4%9C%E5%88%83\",\"WARC-Payload-Digest\":\"sha1:3QNVXHZ4IUHZA67QTNKOVSCSTL55UW33\",\"WARC-Block-Digest\":\"sha1:B3IGCKM2XYLZOJUGS2F47AGYFRHERMVN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104660626.98_warc_CC-MAIN-20220706030209-20220706060209-00731.warc.gz\"}"} |
https://resources.altium.com/p/s-parameter-measurements-and-errors-power-integrity | [
"# S-Parameter Measurements and Errors in Power Integrity",
null,
"Zachariah Peterson\n| Created: February 11, 2021 | Updated: February 12, 2021",
null,
"No matter where you look, it seems S-parameters never go away! They are mandatory tools for understanding some systems, such as an interconnect or antenna, while other network parameters can sometimes give a better conceptual understanding of electrical behavior. These parameters are normally reserved for signal integrity among electronics engineers, but if you look hard enough, you’ll find that S-parameters are also used for power integrity. This should make sense intuitively simply from a power flow perspective: Kurokawa’s original formulation of S-parameters was in terms of power carried by a signal, so why not use this for power integrity?\n\nIn PDN design, particularly for high speed digital components, we care about designing to a low PDN impedance. Low PDN impedance leads to low voltage disturbances measured between power rails for a given transient current draw. Network parameters can be used to characterize the PDN and determine its impedance, but the use of S-parameters requires the use of the appropriate reference (port) impedance for an accurate PDN impedance calculation. Let’s look at exactly how errors in S-parameter measurements propagate into Z-parameter measurements in a simple case to gain some intuition, then I’ll discuss general N-port PDNs and how errors in the S-parameter matrix create errors in the impedance matrix.\n\n## S-Parameters and Power Integrity\n\nWhen measuring S-parameters, every measurement will be bandlimited and discretely sampled. This leads to errors in the measurement that are unavoidable. In other words, the S-parameters you measure are not the true S-parameters, leading to problems with causality. Since S-parameters can be used to calculate other network parameters (including Z-parameters), how does the S-parameter error influence the Z-parameter error? Let’s look at this for a 2-port PDN, then an N-port PDN.\n\n### Errors in 2-Port PDNs with Large S11\n\nFirst, let’s look at errors in a 2-port PDN as this is an easy problem we can solve to get some insight. To get started, we can use a basic conversion to relate the S-parameters in our PDN back to the Z-parameters, then calculate the Z-parameters in the presence of some error.\n\nIn the following equation, I’ve defined my PDN self-impedance in terms of an S-parameter matrix for the PDN in the presence of 2 errors. The e term is my S11/S22 error, and the f term is my S21/S12 error. Assuming reciprocity holds (Sij = Sji), we have:\n\nJust to focus on the critical aspects of self-impedance, let's assume the PDN is reciprocal and lossless. In this case, the S-parameters are S21 = S12 = 0 and S11 = S22, and the above equation reduces to the familiar conversion between S11 and self-impedance. We can get a good approximation on the Z11 error if we take the difference between the high and low error as defined above, and by setting and squared error terms to zero (i.e., e2 << e). This gives the following simple expression for errors in the PDN impedance due to measurement errors in S11:",
null,
"Self-impedance in terms of S-parameter error for the special case of a lossless reciprocal PDN.\n\nIn this example, let’s suppose that S11 = -0.9 in our hypothetical lossless reciprocal PDN. In this case, a 1% error in my S-parameter measurement translates into a 10.5% error in Z11. That’s a 10-fold amplification in error!\n\nThat may seem like a major mistake, but it matches with remarks from other experts in this area. In particular, note the remark on page 8 of this study from Keysight, where a 1-2% error in S-parameter measurements leads to a PDN impedance measurement of 300 to 400 mOhms. Just for a sanity check, let’s bring this back into our example. When the true impedance is ~10 mOhms and the standard VNA port impedance of 50 Ohms is used, we have S11 = -0.9996 and Z11 measurement error of 250%. Such large impedance mismatches at the input port are highly undesirable when we’re trying to use S-parameters to determine PDN impedance.\n\n### Errors in 2-Port PDNs with Small S11\n\nNow let’s suppose my reference impedance is brought much closer to my PDN impedance so that S11 = 0.1 with up to 1% error. The error in the Z11 is now only 2.02%. When we have very close matching to the true PDN impedance, we have a reduction in error in the calculated Z11 value. As it turns out, the critical S11 value in this example where your PDN impedance error will perfectly match your S-parameter measurement error is S11 = 0.268.\n\nThis should show how a large impedance mismatch amplifies S-parameter error measurements when calculating the impedance parameters for a 2-port PDN. Note that this is frequency dependent, but the process applies at each frequency measurement; you might have very accurate impedance at some frequencies, and your results might be very inaccurate at others. This can then be extended to N-port networks using the general S-to-Z-parameter conversion.\n\n### Errors in N-Port PDNs\n\nN-port problems are much more difficult to deal with analytically; this requires using the general Z-parameter matrix for an N-port network (including self-impedances and transfer impedances). In general, you’ll need to perform the same process as detailed above, but with a general S-to-Z-parameter conversion matrix for an N-port network:\n\nThis takes a ton of algebra just to derive an expression relating S-parameter errors to Z-parameter errors. Therefore, this problem of solving such a matrix for a set of S-parameter measurements and port impedances is best solved with Matlab or Mathematica. The point here is, the error is going to be inversely proportional to products of squared (1 - S) terms. Therefore, we’re going to have a situation where an N output port PDN will need to have its reference impedance approximately reduced by a factor N to ensure the error will be low.\n\n## What Reference Impedance Should be Used?\n\nFrom the above discussion, it seems you would want as small of an impedance mismatch as possible if you were using a VNA to measure the S-parameters for an N-port PDN, and then use these measurements to determine the impedance matrix. This would then give you the smallest possible error magnitude in your Z-parameters for a given S-parameter measurement error. Since the PDN impedance is at mOhm levels, your reference impedance should also be around mOhm levels, not at the 50 Ohm level normally set in commercial VNAs.\n\nFinally, if you apply renormalization to drop down the S-parameter reference to be closer to the PDN impedance (maybe down to 50 mOhms), the error term also propagates nonlinearly because normalization involves an S-parameter multiplication operation. In other words, there may be some S-parameter values squared, which may amplify the error in the Z-parameter values you calculate. I’ll leave this up to the reader, just apply the following equation and calculate the Z-parameter values with the processes I’ve described above.",
null,
""
]
| [
null,
"https://resources.altium.com/sites/default/files/styles/medium/public/user_pictures/headshot-small-350.jpg",
null,
"https://resources.altium.com/sites/default/files/styles/max_width_1300/public/blogs/S-Parameter%20Measurements%20and%20Errors%20in%20Power%20Integrity-72453.jpg",
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null,
"https://resources.altium.com/sites/default/files/styles/medium/public/user_pictures/headshot-small-350.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.875579,"math_prob":0.92160994,"size":7474,"snap":"2022-05-2022-21","text_gpt3_token_len":1628,"char_repetition_ratio":0.17443106,"word_repetition_ratio":0.0016353229,"special_character_ratio":0.21019535,"punctuation_ratio":0.08391608,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99126637,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,3,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-23T07:49:55Z\",\"WARC-Record-ID\":\"<urn:uuid:3b253488-a79a-45d0-836c-e5d23c3905e3>\",\"Content-Length\":\"72127\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9e2e293f-4c75-4a60-ab60-4c4293138ce1>\",\"WARC-Concurrent-To\":\"<urn:uuid:da05045d-2559-4e83-8664-1cb1fc67d8fa>\",\"WARC-IP-Address\":\"54.158.179.14\",\"WARC-Target-URI\":\"https://resources.altium.com/p/s-parameter-measurements-and-errors-power-integrity\",\"WARC-Payload-Digest\":\"sha1:KMHCRRBBPRTABP3E6CXBVEYCMCQQBKMB\",\"WARC-Block-Digest\":\"sha1:YGJZR2YNIIOVDZF736SBNZBDBDOKFPBW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662556725.76_warc_CC-MAIN-20220523071517-20220523101517-00231.warc.gz\"}"} |
http://www.nutils.org/en/v3.1/library/numeric/ | [
"# Numeric¶\n\nThe numeric module provides methods that are lacking from the numpy module.\n\nnutils.numeric.overlapping(arr, axis=-1, n=2)[source]\n\nreinterpret data with overlaps\n\nnutils.numeric.normdim(ndim, n)[source]\n\ncheck bounds and make positive\n\nnutils.numeric.get(arr, axis, item)[source]\n\ntake single item from array axis\n\nnutils.numeric.contract(A, B, axis=-1)[source]\nnutils.numeric.dot(A, B, axis=-1)[source]\n\nTransform axis of A by contraction with first axis of B and inserting remaining axes. Note: with default axis=-1 this leads to multiplication of vectors and matrices following linear algebra conventions.\n\nnutils.numeric.meshgrid(*args)[source]\n\nmulti-dimensional meshgrid generalisation\n\nnutils.numeric.normalize(A, axis=-1)[source]\n\ndevide by normal\n\nnutils.numeric.diagonalize(arg, axis=-1, newaxis=-1)[source]\n\ninsert newaxis, place axis on diagonal of axis and newaxis\n\nnutils.numeric.ix(args)[source]\n\nversion of numpy.ix_() that allows for scalars\n\nnutils.numeric.ext(A)[source]\n\nExterior For array of shape (n,n-1) return n-vector ex such that ex.array = 0 and det(arr;ex) = ex.ex\n\nclass nutils.numeric.const[source]"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.67438537,"math_prob":0.81410056,"size":681,"snap":"2021-43-2021-49","text_gpt3_token_len":183,"char_repetition_ratio":0.14771049,"word_repetition_ratio":0.0,"special_character_ratio":0.24229075,"punctuation_ratio":0.16296296,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970185,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-07T14:20:12Z\",\"WARC-Record-ID\":\"<urn:uuid:8d7389ed-6509-4a44-89d2-0963b56cebfe>\",\"Content-Length\":\"16492\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5eda3710-39e2-44ef-854f-3f5bc4448412>\",\"WARC-Concurrent-To\":\"<urn:uuid:33df818e-7f8c-4e3d-8d1c-0b18f14c83a6>\",\"WARC-IP-Address\":\"104.17.33.82\",\"WARC-Target-URI\":\"http://www.nutils.org/en/v3.1/library/numeric/\",\"WARC-Payload-Digest\":\"sha1:TJBGUMYVUND5XT34QOARJ5UEQI5EBSIG\",\"WARC-Block-Digest\":\"sha1:GGBPZEDI3Q37AVULZKVF2ILP2AIPZPVA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363400.19_warc_CC-MAIN-20211207140255-20211207170255-00589.warc.gz\"}"} |
https://www.paddlepaddle.org.cn/documentation/docs/zh/beginners_guide/basics/label_semantic_roles/index.html | [
"# 语义角色标注¶\n\n## 说明¶\n\n1. 本教程可支持在 CPU/GPU 环境下运行\n\n2. Docker镜像支持的CUDA/cuDNN版本\n\n如果使用了Docker运行Book,请注意:这里所提供的默认镜像的GPU环境为 CUDA 8/cuDNN 5,对于NVIDIA Tesla V100等要求CUDA 9的 GPU,使用该镜像可能会运行失败;\n\n3. 文档和脚本中代码的一致性问题\n\n请注意:为使本文更加易读易用,我们拆分、调整了train.py的代码并放入本文。本文中代码与train.py的运行结果一致,可直接运行train.py进行验证。\n\n## 背景介绍¶",
null,
"1. 构建一棵句法分析树,例如,图1是对上面例子进行依存句法分析得到的一棵句法树。\n2. 从句法树上识别出给定谓词的候选论元。\n3. 候选论元剪除;一个句子中的候选论元可能很多,候选论元剪除就是从大量的候选项中剪除那些最不可能成为论元的候选项。\n4. 论元识别:这个过程是从上一步剪除之后的候选中判断哪些是真正的论元,通常当做一个二分类问题来解决。\n5. 对第4步的结果,通过多分类得到论元的语义角色标签。可以看到,句法分析是基础,并且后续步骤常常会构造的一些人工特征,这些特征往往也来自句法分析。",
null,
"",
null,
"## 模型概览¶\n\n### 栈式循环神经网络(Stacked Recurrent Neural Network)¶",
null,
"### 双向循环神经网络(Bidirectional Recurrent Neural Network)¶",
null,
"### 条件随机场 (Conditional Random Field)¶\n\nCRF是一种概率化结构模型,可以看作是一个概率无向图模型,结点表示随机变量,边表示随机变量之间的概率依赖关系。简单来讲,CRF学习条件概率$P(X|Y)$,其中 $X = (x_1, x_2, ... , x_n)$ 是输入序列,$Y = (y_1, y_2, ... , y_n)$ 是标记序列;解码过程是给定 $X$序列求解令$P(Y|X)$最大的$Y$序列,即$Y^* = \\mbox{arg max}_{Y} P(Y | X)$。",
null,
"",
null,
"",
null,
"$\\omega$是特征函数对应的权值,是CRF模型要学习的参数。训练时,对于给定的输入序列和对应的标记序列集合$D = \\left[(X_1, Y_1), (X_2 , Y_2) , ... , (X_N, Y_N)\\right]$ ,通过正则化的极大似然估计,求解如下优化目标:",
null,
"### 深度双向LSTM(DB-LSTM)SRL模型¶\n\n1. 构造输入;\n• 输入1是谓词,输入2是句子\n• 将输入1扩展成和输入2一样长的序列,用one-hot方式表示;\n1. one-hot方式的谓词序列和句子序列通过词表,转换为实向量表示的词向量序列;\n2. 将步骤2中的2个词向量序列作为双向LSTM的输入,学习输入序列的特征表示;\n3. CRF以步骤3中模型学习到的特征为输入,以标记序列为监督信号,实现序列标注;\n\n• 谓词上下文:上面的方法中,只用到了谓词的词向量表达谓词相关的所有信息,这种方法始终是非常弱的,特别是如果谓词在句子中出现多次,有可能引起一定的歧义。从经验出发,谓词前后若干个词的一个小片段,能够提供更丰富的信息,帮助消解歧义。于是,我们把这样的经验也添加到模型中,为每个谓词同时抽取一个“谓词上下文” 片段,也就是从这个谓词前后各取$n$个词构成的一个窗口片段;\n• 谓词上下文区域标记:为句子中的每一个词引入一个0-1二值变量,表示它们是否在“谓词上下文”片段中;\n\n1. 构造输入\n• 输入1是句子序列,输入2是谓词序列,输入3是谓词上下文,从句子中抽取这个谓词前后各$n$个词,构成谓词上下文,用one-hot方式表示,输入4是谓词上下文区域标记,标记了句子中每一个词是否在谓词上下文中;\n• 将输入2~3均扩展为和输入1一样长的序列;\n1. 输入1~4均通过词表取词向量转换为实向量表示的词向量序列;其中输入1、3共享同一个词表,输入2和4各自独有词表;\n2. 第2步的4个词向量序列作为双向LSTM模型的输入;LSTM模型学习输入序列的特征表示,得到新的特性表示序列;\n3. CRF以第3步中LSTM学习到的特征为输入,以标记序列为监督信号,完成序列标注;",
null,
"## 数据介绍¶\n\nconll05st-release/\n└── test.wsj\n├── props # 标注结果\n└── words # 输入文本序列\n\n\n1. 将文本序列和标记序列其合并到一条记录中;\n2. 一个句子如果含有$n$个谓词,这个句子会被处理$n$次,变成$n$条独立的训练样本,每个样本一个不同的谓词;\n3. 抽取谓词上下文和构造谓词上下文区域标记;\n4. 构造以BIO法表示的标记;\n5. 依据词典获取词对应的整数索引。\n\nA set n't been set . × 0 B-A1\nrecord set n't been set . × 0 I-A1\ndate set n't been set . × 0 I-A1\nhas set n't been set . × 0 O\nn't set n't been set . × 1 B-AM-NEG\nbeen set n't been set . × 1 O\nset set n't been set . × 1 B-V\n. set n't been set . × 1 O\n\nword_dict 输入句子的词典,共计44068个词\nlabel_dict 标记的词典,共计106个标记\npredicate_dict 谓词的词典,共计3162个词\nemb 一个训练好的词表,32维\n\nfrom __future__ import print_function\n\nimport math, os\nimport numpy as np\nimport six\nimport time\n\nwith_gpu = os.getenv('WITH_GPU', '0') != '0'\n\nword_dict, verb_dict, label_dict = conll05.get_dict()\nword_dict_len = len(word_dict)\nlabel_dict_len = len(label_dict)\npred_dict_len = len(verb_dict)\n\nprint('word_dict_len: ', word_dict_len)\nprint('label_dict_len: ', label_dict_len)\nprint('pred_dict_len: ', pred_dict_len)\n\n\n## 模型配置说明¶\n\n• 定义输入数据维度及模型超参数。\nmark_dict_len = 2 # 谓上下文区域标志的维度,是一个0-1 2值特征,因此维度为2\nword_dim = 32 # 词向量维度\nmark_dim = 5 # 谓词上下文区域通过词表被映射为一个实向量,这个是相邻的维度\nhidden_dim = 512 # LSTM隐层向量的维度 : 512 / 4\ndepth = 8 # 栈式LSTM的深度\nmix_hidden_lr = 1e-3 # linear_chain_crf层的基础学习率\n\nIS_SPARSE = True # 是否以稀疏方式更新embedding\nPASS_NUM = 10 # 训练轮数\nBATCH_SIZE = 10 # batch size 大小\n\nembedding_name = 'emb'\n\n\n• 如上文提到,我们用基于英文维基百科训练好的词向量来初始化序列输入、谓词上下文总共6个特征的embedding层参数,在训练中不更新。\n# 这里加载PaddlePaddle保存的二进制参数\nwith open(file_name, 'rb') as f:\nreturn np.fromfile(f, dtype=np.float32).reshape(h, w)\n\n\n## 训练模型¶\n\n• 我们根据网络拓扑结构和模型参数来进行训练,在构造时还需指定优化方法,这里使用最基本的SGD方法(momentum设置为0),同时设定了学习率、正则等。\n\nuse_cuda = False #在cpu上执行训练\nsave_dirname = \"label_semantic_roles.inference.model\" #训练得到的模型参数保存在文件中\nis_local = True\n\n\n### 数据输入层定义¶\n\n# 句子序列\nword = fluid.data(\nname='word_data', shape=[None, 1], dtype='int64', lod_level=1)\n\n# 谓词\npredicate = fluid.data(\nname='verb_data', shape=[None, 1], dtype='int64', lod_level=1)\n\n# 谓词上下文5个特征\nctx_n2 = fluid.data(\nname='ctx_n2_data', shape=[None, 1], dtype='int64', lod_level=1)\nctx_n1 = fluid.data(\nname='ctx_n1_data', shape=[None, 1], dtype='int64', lod_level=1)\nctx_0 = fluid.data(\nname='ctx_0_data', shape=[None, 1], dtype='int64', lod_level=1)\nctx_p1 = fluid.data(\nname='ctx_p1_data', shape=[None, 1], dtype='int64', lod_level=1)\nctx_p2 = fluid.data(\nname='ctx_p2_data', shape=[None, 1], dtype='int64', lod_level=1)\n\n# 谓词上下区域标志\nmark = fluid.data(\nname='mark_data', shape=[None, 1], dtype='int64', lod_level=1)\n\n\n### 定义网络结构¶\n\n#预训练谓词和谓词上下区域标志\npredicate_embedding = fluid.embedding(\ninput=predicate,\nsize=[pred_dict_len, word_dim],\ndtype='float32',\nis_sparse=IS_SPARSE,\nparam_attr='vemb')\n\nmark_embedding = fluid.embedding(\ninput=mark,\nsize=[mark_dict_len, mark_dim],\ndtype='float32',\nis_sparse=IS_SPARSE)\n\n#句子序列和谓词上下文5个特征并预训练\nword_input = [word, ctx_n2, ctx_n1, ctx_0, ctx_p1, ctx_p2]\n# 因词向量是预训练好的,这里不再训练embedding表,\n# 参数属性trainable设置成False阻止了embedding表在训练过程中被更新\nemb_layers = [\nfluid.embedding(\nsize=[word_dict_len, word_dim],\ninput=x,\nparam_attr=fluid.ParamAttr(\nname=embedding_name, trainable=False)) for x in word_input\n]\n#加入谓词和谓词上下区域标志的预训练结果\nemb_layers.append(predicate_embedding)\nemb_layers.append(mark_embedding)\n\n\n# 共有8个LSTM单元被训练,每个单元的方向为从左到右或从右到左,\n# 由参数is_reverse确定\n# 第一层栈结构\nhidden_0_layers = [\nfluid.layers.fc(input=emb, size=hidden_dim, act='tanh')\nfor emb in emb_layers\n]\n\nhidden_0 = fluid.layers.sums(input=hidden_0_layers)\n\nlstm_0 = fluid.layers.dynamic_lstm(\ninput=hidden_0,\nsize=hidden_dim,\ncandidate_activation='relu',\ngate_activation='sigmoid',\ncell_activation='sigmoid')\n\n# 用直连的边来堆叠L-LSTM、R-LSTM\ninput_tmp = [hidden_0, lstm_0]\n\n# 其余的栈结构\nfor i in range(1, depth):\nmix_hidden = fluid.layers.sums(input=[\nfluid.layers.fc(input=input_tmp, size=hidden_dim, act='tanh'),\nfluid.layers.fc(input=input_tmp, size=hidden_dim, act='tanh')\n])\n\nlstm = fluid.layers.dynamic_lstm(\ninput=mix_hidden,\nsize=hidden_dim,\ncandidate_activation='relu',\ngate_activation='sigmoid',\ncell_activation='sigmoid',\nis_reverse=((i % 2) == 1))\n\ninput_tmp = [mix_hidden, lstm]\n\n# 取最后一个栈式LSTM的输出和这个LSTM单元的输入到隐层映射,\n# 经过一个全连接层映射到标记字典的维度,来学习 CRF 的状态特征\nfeature_out = fluid.layers.sums(input=[\nfluid.layers.fc(input=input_tmp, size=label_dict_len, act='tanh'),\nfluid.layers.fc(input=input_tmp, size=label_dict_len, act='tanh')\n])\n\n# 标注序列\ntarget = fluid.data(\nname='target', shape=[None, 1], dtype='int64', lod_level=1)\n\n# 学习 CRF 的转移特征\ncrf_cost = fluid.layers.linear_chain_crf(\ninput=feature_out,\nlabel=target,\nparam_attr=fluid.ParamAttr(\nname='crfw', learning_rate=mix_hidden_lr))\n\navg_cost = fluid.layers.mean(crf_cost)\n\n# 使用最基本的SGD优化方法(momentum设置为0)\nsgd_optimizer = fluid.optimizer.SGD(\nlearning_rate=fluid.layers.exponential_decay(\nlearning_rate=0.01,\ndecay_steps=100000,\ndecay_rate=0.5,\nstaircase=True))\n\nsgd_optimizer.minimize(avg_cost)\n\n\ncrf_decode = fluid.layers.crf_decoding(\ninput=feature_out, param_attr=fluid.ParamAttr(name='crfw'))\n\nbatch_size=BATCH_SIZE)\n\nplace = fluid.CUDAPlace(0) if use_cuda else fluid.CPUPlace()\n\n\nfeeder = fluid.DataFeeder(\nfeed_list=[\nword, ctx_n2, ctx_n1, ctx_0, ctx_p1, ctx_p2, predicate, mark, target\n],\nplace=place)\nexe = fluid.Executor(place)\n\n\nmain_program = fluid.default_main_program()\n\nexe.run(fluid.default_startup_program())\nembedding_param = fluid.global_scope().find_var(\nembedding_name).get_tensor()\nembedding_param.set(\nplace)\n\nstart_time = time.time()\nbatch_id = 0\nfor pass_id in six.moves.xrange(PASS_NUM):\nfor data in train_data():\ncost = exe.run(main_program,\nfeed=feeder.feed(data),\nfetch_list=[avg_cost])\ncost = cost\n\nif batch_id % 10 == 0:\nprint(\"avg_cost: \" + str(cost))\nif batch_id != 0:\nprint(\"second per batch: \" + str((time.time(\n) - start_time) / batch_id))\n# Set the threshold low to speed up the CI test\nif float(cost) < 60.0:\nif save_dirname is not None:\nfluid.io.save_inference_model(save_dirname, [\n'word_data', 'verb_data', 'ctx_n2_data',\n'ctx_n1_data', 'ctx_0_data', 'ctx_p1_data',\n'ctx_p2_data', 'mark_data'\n], [feature_out], exe)\nbreak\n\nbatch_id = batch_id + 1\n\n\n## 应用模型¶\n\nuse_cuda = False #在cpu上进行预测\nsave_dirname = \"label_semantic_roles.inference.model\" #调用训练好的模型进行预测\n\nplace = fluid.CUDAPlace(0) if use_cuda else fluid.CPUPlace()\nexe = fluid.Executor(place)\n\n\nlod = [[3, 4, 2]]\nbase_shape = \n\n# 构造假数据作为输入,整数随机数的范围是[low, high]\nword = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=word_dict_len - 1)\npred = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=pred_dict_len - 1)\nctx_n2 = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=word_dict_len - 1)\nctx_n1 = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=word_dict_len - 1)\nctx_0 = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=word_dict_len - 1)\nctx_p1 = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=word_dict_len - 1)\nctx_p2 = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=word_dict_len - 1)\nmark = fluid.create_random_int_lodtensor(\nlod, base_shape, place, low=0, high=mark_dict_len - 1)\n\n\n[inference_program, feed_target_names,\n\n\nassert feed_target_names == 'word_data'\nassert feed_target_names == 'verb_data'\nassert feed_target_names == 'ctx_n2_data'\nassert feed_target_names == 'ctx_n1_data'\nassert feed_target_names == 'ctx_0_data'\nassert feed_target_names == 'ctx_p1_data'\nassert feed_target_names == 'ctx_p2_data'\nassert feed_target_names == 'mark_data'\n\n\nresults = exe.run(inference_program,\nfeed={\nfeed_target_names: word,\nfeed_target_names: pred,\nfeed_target_names: ctx_n2,\nfeed_target_names: ctx_n1,\nfeed_target_names: ctx_0,\nfeed_target_names: ctx_p1,\nfeed_target_names: ctx_p2,\nfeed_target_names: mark\n},\nfetch_list=fetch_targets,\nreturn_numpy=False)\n\n\nprint(results.lod())\nnp_data = np.array(results)\nprint(\"Inference Shape: \", np_data.shape)\n\n\n## 参考文献¶\n\n1. Sun W, Sui Z, Wang M, et al. Chinese semantic role labeling with shallow parsing[C]//Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 3-Volume 3. Association for Computational Linguistics, 2009: 1475-1483.\n2. Pascanu R, Gulcehre C, Cho K, et al. How to construct deep recurrent neural networks[J]. arXiv preprint arXiv:1312.6026, 2013.\n3. Cho K, Van Merriënboer B, Gulcehre C, et al. Learning phrase representations using RNN encoder-decoder for statistical machine translation[J]. arXiv preprint arXiv:1406.1078, 2014.\n4. Bahdanau D, Cho K, Bengio Y. Neural machine translation by jointly learning to align and translate[J]. arXiv preprint arXiv:1409.0473, 2014.\n5. Lafferty J, McCallum A, Pereira F. Conditional random fields: Probabilistic models for segmenting and labeling sequence data[C]//Proceedings of the eighteenth international conference on machine learning, ICML. 2001, 1: 282-289.\n6. 李航. 统计学习方法[J]. 清华大学出版社, 北京, 2012.\n7. Marcus M P, Marcinkiewicz M A, Santorini B. Building a large annotated corpus of English: The Penn Treebank[J]. Computational linguistics, 1993, 19(2): 313-330.\n8. Palmer M, Gildea D, Kingsbury P. The proposition bank: An annotated corpus of semantic roles[J]. Computational linguistics, 2005, 31(1): 71-106.\n9. Carreras X, Màrquez L. Introduction to the CoNLL-2005 shared task: Semantic role labeling[C]//Proceedings of the Ninth Conference on Computational Natural Language Learning. Association for Computational Linguistics, 2005: 152-164.\n10. Zhou J, Xu W. End-to-end learning of semantic role labeling using recurrent neural networks[C]//Proceedings of the Annual Meeting of the Association for Computational Linguistics. 2015.",
null,
""
]
| [
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/Eqn1.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/dependency_parsing.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/bio_example.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/stacked_lstm.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/bidirectional_stacked_lstm.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/linear_chain_crf.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/Eqn2.gif",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/Eqn3.gif",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/Eqn4.png",
null,
"https://githubraw.cdn.bcebos.com/PaddlePaddle/book/develop/07.label_semantic_roles/image/db_lstm_network.png",
null,
"https://paddlepaddleimage.cdn.bcebos.com/bookimage/camo.png",
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.6934632,"math_prob":0.95232785,"size":17784,"snap":"2020-10-2020-16","text_gpt3_token_len":10603,"char_repetition_ratio":0.1003937,"word_repetition_ratio":0.05496183,"special_character_ratio":0.25179937,"punctuation_ratio":0.17972536,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98295295,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,5,null,10,null,10,null,10,null,10,null,10,null,5,null,5,null,5,null,10,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-17T08:01:46Z\",\"WARC-Record-ID\":\"<urn:uuid:7d93af28-6c45-4a51-9261-89a516404534>\",\"Content-Length\":\"177515\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7cf4ecb9-1c9a-4910-bfdd-b2e9619f12a1>\",\"WARC-Concurrent-To\":\"<urn:uuid:fb2e97bd-c763-462e-89cd-f23ed72ee819>\",\"WARC-IP-Address\":\"180.76.58.84\",\"WARC-Target-URI\":\"https://www.paddlepaddle.org.cn/documentation/docs/zh/beginners_guide/basics/label_semantic_roles/index.html\",\"WARC-Payload-Digest\":\"sha1:YCTDJLFGYLZDUS26RAF6JPLSW4BFPMTN\",\"WARC-Block-Digest\":\"sha1:UNKCMNOXOTIVKQWAV3E5Q3Y2GH57B6ZR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875141749.3_warc_CC-MAIN-20200217055517-20200217085517-00503.warc.gz\"}"} |
http://documentation.statsoft.com/STATISTICAHelp.aspx?path=sepath/Sepath/Dialogs/AnalysisParameters | [
"",
null,
"Analysis Parameters\n\nClick the Set parameters button on the Advanced tab of the Structural Equation Modeling Startup Panel to display the Analysis Parameters dialog box. Note that you can also access this dialog box by clicking the Parameters button on the Path Construction Tool or the Set Parameters button on the Model tab of the Monte Carlo Analysis dialog box.\n\nData to analyze. Use the options under Data to analyze to select which type of data to analyze. For standard path analyses or structural equation models, you choose either Covariances or Correlations, for models specifying intercepts, or structured means, you must specify the Moments option.\n\nCovariances. Select the Covariances option button to analyze the covariance matrix of the input variables, regardless of what kind of data are input. So, for example, if you input a correlation matrix file with standard deviations, STATISTICA will calculate the covariance matrix and analyze it. If your input file is a covariance matrix file, STATISTICA will analyze it directly. If your file contains raw data, STATISTICA will analyze it and calculate the covariance matrix for you. See also, Covariance Matrices vs. Correlation Matrices for information on how STATISTICA analyzes these two types of matrices.\n\nCorrelations. Select the Correlations option button to calculate the correlation matrix from the input data and analyze it. STATISTICA analyzes the correlation matrix correctly, using constrained estimation theory developed by Michael Browne (see Browne, 1982; Mels, 1989; Browne & Mels, 1992), and implemented first in the computer program RAMONA. As a result, STATISTICA gives the correct standard errors, estimates, and test statistics when a correlation matrix is analyzed directly. When combined with the Standardization - New option STATISTICA can estimate a completely standardized path model, where all variables are standardized to have unit variance, and standard errors can be estimated as well.\n\nMoments. Select the Moments option button to analyze the augmented product-moment matrix instead of the covariance matrix. This option is selected if you are analyzing models involving intercepts or structured means. STATISTICA will also add, to the input variable list, an additional variable called CONSTANT that always takes on the value 1. CONSTANT is a dummy variable used to represent means in structured means models, i.e., those with an intercept variable.\n\nOutput options. Use the options in the Output options frame for preliminary control over the appearance of your output. You can preselect the number of decimal places to be printed in report editor, and you can select whether or not to print estimated standard errors for model coefficients.\n\nNo. of decimal places. Enter a number between 1 and 6 in the No. of decimal places field. The number is number of decimal places displayed by default in the results spreadsheets.\n\nStandard errors. Select the Standard errors check box to display estimated standard errors for all parameters in the PATH1 text output, and Model Summary Spreadsheet. Note that if OLS estimation is performed, or the \"old\" standardization method is employed, standard errors will not be available.\n\nConvergence criteria. Use the options in the Convergence criteria frame to adjust constants that can directly affect when the program decides convergence has occurred during iteration. The default values produce desirable results for a wide variety of problems, and you will seldom need to adjust these criteria.\n\nMax. residual cosine. Enter a value for the maximum residual cosine in the Max. residual cosine field. This criterion becomes small when parameter values have stabilized. You can alter this criterion in the input field. The default value of .0001 works well across a wide variety of situations. For a technical definition of this criterion and a discussion of its merits, see the discussion of Unconstrained Minimization Techniques.\n\nRelative funct. change. Enter a value for the relative function change in the Relative funct. change field. This criterion becomes small when the discrepancy function being minimized (see the section on Statistical Estimation Theory for a discussion) is no longer changing. On occasion, especially when boundary cases are encountered, it will not be possible for the program to iterate to a point where a local or global minimum is obtained. In that case, the Maximum Residual Cosine criterion may not fall below, but the discrepancy function will not change. At that point, this criterion will stop iteration. In general, it should be kept very low, or it may cause iteration to terminate prematurely. For a technical definition of the criterion see the discussion of Unconstrained Minimization Techniques.\n\nDiscrepancy function. Use the options in the Discrepancy function frame to specify which discrepancy function or functions will be minimized to yield parameter estimates. Consult the section on Statistical Estimation for an in-depth discussion of these methods.\n\nMaximum Likelihood (ML). Select the Maximum Likelihood (ML) button to perform Maximum Wishart Likelihood estimation if Correlations or Covariances are analyzed, and Maximum Normal Likelihood estimation if Moments are analyzed.\n\nGeneralized Least Squares (GLS). Select the Generalized Least Squares (GLS) button to perform Generalized Least Squares estimation.\n\nGLS --> ML. Select the GLS--> ML (GLS followed by ML) option button to perform five iterations using the Generalized Least Squares estimation procedure followed by Maximum Likelihood Estimation. If selected, this option disregards the current settings in the Maximum No. of Iterations field.\n\nOrdinary Least Squares (OLS). Select the Ordinary Least Squares (OLS) option button to perform Ordinary Least Squares estimation.\n\nADFG. Select the ADFG option button to perform Asymptotically Distribution Free (Gramian) estimation, which does not require the assumption of multivariate normality. In this variant, the weight matrix is guaranteed to be Gramian. As a preliminary to ADFG estimation, STATISTICA performs GLS estimation.\n\nADFU. Select the Asymptotically Distribution Free Unbiased (ADFU) option button to perform Asymptotically Distribution Free (Unbiased) estimation, which does not require the assumption of multivariate normality. In this variant, the weight matrix is an unbiased estimate of the true weight matrix. However, this estimated matrix may not be Gramian (i.e., invertible) in all cases. If it is not, STATISTICA gives an error message. At that point, you should restart the estimation using the ADFG option. As a preliminary to ADFU estimation, STATISTICA performs GLS estimation.\n\nGlobal iteration parameters. Use the options under Global iteration parameters to enter parameters that control the basic iterative process. For a technical description of the iteration process, see Unconstrained Minimization Techniques.\n\nMaximum no. of iterations. Enter the maximum number of iterations allowed in the Maximum no. of iterations field. The default number is 30. When this number of iterations is reached, the iterative process will automatically terminate, and a message will be issued to indicate that the maximum number of iterations was exceeded. Minimum is zero (in which case the discrepancy function and estimated covariance matrix will be computed, and control will be returned to the user), maximum is 1000.\n\nMaximum step length. Enter the maximum length of the step vector that will be allowed in the Maximum step length field. See Unconstrained Minimization Techniques for a discussion of this parameter. See the Solving Iteration Problems for suggestions on how to use this parameter to solve some problems encountered during iteration.\n\nSteepest descent iterations. Enter a number of steepest descent iterations to proceed the standard iterations in the Steepest descent iterations field. See Solving Iteration Problems for suggestions on how to use this parameter to solve some problems encountered during iteration.\n\nStep tolerance. Enter a tolerance value in the Step tolerance field. STATISTICA uses this value for when a parameter is temporarily eliminated from the iterative process. The tolerance value is basically one minus the squared multiple correlation of a parameter with the other parameters. If a parameter becomes highly redundant with other parameters during iteration, the approximate Hessian employed during Gauss-Newton iteration becomes unstable. This parameter controls when a parameter is temporarily removed from the iterative process. Very low values of this parameter mean that a parameter will never be removed. This can cause iteration to \"blow up\" if the approximate Hessian becomes nearly singular. High Values mean that parameters will not be varied while they are moderately correlated with other parameters. This can cause iteration to fail if parameters are fairly highly correlated at the solution point. Change this parameter seldom, and in small increments. The default value seems to work well on a wide range of problems.\n\nInitial values. Use the options in the Initial values frame to select the method employed to find initial values for free parameters. The default method uses .5 for all free parameters, except variances and covariances (or correlations) of manifest exogenous variables. These parameters are initialized at the values obtained from the sample data.\n\nDefault. Select the Default option button to use .5 for all free parameters, except variances and covariances (or correlations) of manifest exogenous variables. These parameters are initialized at the values obtained from the sample data.\n\nAutomatic. Select the Automatic option button to obtain the initial values via a method that is a minor adaptation of the technique described by McDonald and Hartmann (1992).\n\nStandardization. Use the options under Standardization to choose to generate either a standardized solution (where latent variables all have unit variance) by one of two methods, or an unstandardized solution.\n\nNote that the New and Old options will cause the program to compute standardized solutions based on the (standardized) endogenous latent variables (this is the common practice in most programs of this kind); if your model does not contain latent endogenous variables (e.g., only contains manifest exogenous variables), these methods of standardization may not be appropriate, and you may want to use a correlation matrix as input instead, and choose the New method to obtain estimates that are standardized in the manifest exogenous variables. See also, New Method for Standardizing Endogenous Latent Variables in the Technical Aspects of SEPATH section for additional details.\n\nNew. Check the New option button to estimate a standardized solution via constrained estimation. This approach produces a solution where all latent variables, both independent and dependent, have variances of 1. Unlike the old method, however, standard errors are available with this option. Combining this option with the Data to Analyze - Correlations option (see above) allows one to estimate a completely standardized path model, where all variables, manifest and latent, have unit variances, and standard errors can be estimated for all parameters.\n\nOld. Check the Old option button to estimate a standardized solution using older methods. Older programs generate a standardized solution after iteration is complete, then perform a calculation after the fact to transform the solution to a standardized form. This method gets a solution faster than the New option described above, because it does not need to use constrained estimation. However, standard errors cannot be computed.\n\nNone. Check the None option button to calculate an unstandardized solution.\n\nManifest exogenous. Use the options under Manifest exogenous to account for exogenous manifest variables. Most models do not have manifest variables that are exogenous. If a model does have such variables, their variances and covariances must be accounted for. In most cases (but not all), the variances and covariances estimated under one of the standard estimation techniques will be identical to the observed variances and covariances, and consequently these parameters are not of much interpretive interest. STATISTICA provides two approaches to calculating these parameters automatically and keeping them out of view (the Fixed and Free options below) and also allows them to be declared explicitly.\n\nFree. Check the Free option button to treat the variances and covariances among the manifest exogenous variables as free parameters and add them to the model, although their values are not shown. Start values are the observed variances and covariances. If you select this option and attempt (in the PATH1 input) to specify the variance or covariance of a manifest exogenous variable, you will generate an error message.\n\nFixed. Check the Fixed option button to treat the variances and covariances for manifest exogenous variables as fixed (at the value of the observed variances and covariances) during iteration. After iteration, they are treated as if they were free parameters. This approach eliminates, in the case of several manifest exogenous variables, the addition of a number of extra free parameters, which can slow down iteration and make it less reliable. The user should take the output obtained by this approach, and resubmit it using the Free option described below to guarantee correct estimates. If you select this option and attempt (in the PATH1 input) to specify the variance or covariance of a manifest exogenous variable, you will generate an error message.\n\nUser. Check the User option button if you want to specify the variances and covariances of all manifest exogenous variables, using standard PATH1 syntax.\n\nLine search method. Use the options under Line search method to choose a basic line search method. Once the step direction has been chosen, the minimization problem is basically reduced from a problem in n unknowns to a problem in 1 unknown, i.e., the length of the step. There are three methods for choosing the length of the step. Their technical aspects are discussed in the section on Unconstrained Minimization Techniques.\n\nCubic interpolation. Check the Cubic interpolation option button to use cubic interpolation, a method that is reasonably fast and rather robust. It works well in the vast majority of circumstances.\n\nGolden section. Check the Golden section option button to use golden section, a method that tries to solve the one dimensional minimization problem exactly on each iteration. It often converges in slightly fewer iterations than cubic interpolation, but takes longer, because it requires more function evaluations on each iteration.\n\nSimple stephalving. Check the Simple stephalving option button to use simple stephalving. Although this is the fastest method, it will fail to converge for a fair number of problems that the other two, more sophisticated methods succeed on.\n\nLine search parameters. Use the options under Line search parameters to choose numerical parameters that control the performance of the line search method you have chosen. Only a subset of the parameters are relevant to each line search method. Only relevant parameters will be enabled for the currently selected line search method.\n\nMax. no. of stephalves. Enter a value in the Max. no. of stephalves field to set the maximum number of stephalves allowed on a single iteration if the Simple Stephalving line search method is used.\n\nStephalve fraction. Enter a value in the Stephalve fraction field to set the fraction the current step is multiplied by when Simple Stephalving is used as the line search method.\n\nCubic LS alpha. Enter a value in the Cubic LS alpha field to control how large a reduction in the discrepancy function has to be made before a step is considered acceptable when the Cubic Interpolation line search method is used. The default value, .0001, allows virtually any improvement to be considered acceptable.\n\nGolden search tau. Enter a value in the Golden search aau field to control how wide a range to which the Golden Section line search is limited.\n\nGolden srch precision. Enter a value in the Golden srch precision field to control the precision of estimation in a Golden Section line search."
]
| [
null,
"http://documentation.statsoft.com/STATISTICAHelp/sepath/Images/M_SEM.GIF",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7579328,"math_prob":0.9220952,"size":16337,"snap":"2019-26-2019-30","text_gpt3_token_len":3400,"char_repetition_ratio":0.15692157,"word_repetition_ratio":0.09061876,"special_character_ratio":0.17849055,"punctuation_ratio":0.10573158,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9602031,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-24T09:05:33Z\",\"WARC-Record-ID\":\"<urn:uuid:2365a3b6-2809-4ebc-b002-ccba34ada4e4>\",\"Content-Length\":\"77653\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e6c4fc73-d02a-45f6-bd5f-03cf3cbe7e85>\",\"WARC-Concurrent-To\":\"<urn:uuid:23f8d0bb-474a-4794-9884-97eb048fcc6f>\",\"WARC-IP-Address\":\"99.157.40.5\",\"WARC-Target-URI\":\"http://documentation.statsoft.com/STATISTICAHelp.aspx?path=sepath/Sepath/Dialogs/AnalysisParameters\",\"WARC-Payload-Digest\":\"sha1:BLUYUAPKXGVCMQNCOZDCU6ZPYQQDTIKX\",\"WARC-Block-Digest\":\"sha1:XACU2XUY27VFONSAJHQW6A7NVV5DVP3X\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560627999298.86_warc_CC-MAIN-20190624084256-20190624110256-00016.warc.gz\"}"} |
https://www.questaal.org/tutorial/lmf/bandedge/ | [
"# Extremal points and effective mass\n\nThis tutorial demonstrates how to find extremal points (maxima, minima, and saddle points) in the Brillouin zone, and calculate effective masses using the band-edge utility. LDA silicon was chosen for simplicity, though it is a trivial example as its extremal points are found on high-symmetry lines. band-edge is particularly useful when searching for multiple extremal points, and/or points distinct from those of high symmetry.\n\nAt the end of this tutorial the band-edge manual documents its usage in more detail.\n\n### Preliminaries\n\nThis tutorial uses a number of Questaal executables and scripts, e.g. band-edge, blm, lmfa, lmf, pfit, fmain, plbnds, and fplot. They are assumed to be in your path.\n\n### Tutorial\n\n#### Self-consistent density and energy bands\n\nThe starting point is a self-consistent LDA density, you may want to review the DFT tutorial for silicon. Cut and paste the following lines into file init.si:\n\nLATTICE\nALAT=10.26\nPLAT= 0.00000000 0.50000000 0.50000000\n0.50000000 0.00000000 0.50000000\n0.50000000 0.50000000 0.00000000\n# pos means cartesian coordinates, units of alat\nSITE\nATOM=Si POS= 0.00000000 0.00000000 0.00000000\nATOM=Si POS= 0.25000000 0.25000000 0.25000000\n\n\nRun the following command to obtain a self-consistent density:\n\n$blm --express si --nk=4 --gmax=5$ cp actrl.si ctrl.si\n$lmfa si$ cp basp0.si basp.si\n$lmf si It will be helpful to have a band structure to refer to when finding the extremal points, you may want to review the silicon band plotting tutorial. Create a symmetry file syml.si joining L, Γ, X, W, and Γ again. lmchk si --syml~n=41~lbl=LGXWG~q=.5,.5,.5,0,0,0,1,0,0,1,.5,0,0,0,0 Generate the energy bands (file bnds.si) $ lmf si --rs=1,0 -vnit=1 --band~fn=syml\n\n\nThe following two commands will plot and display the bands:\n\n$echo -6,6,10,15 | plbnds -fplot -ef=0 -scl=13.6 -lbl=L,G,X,W,G bnds.si$ fplot -f plot.plbnds && gs fplot.ps\n\n\nTake a look at the band structure plot. The valence band maximum falls at the $\\Gamma$ point while the conduction band minimum lies between $\\Gamma$ and X, at about 0.85 of the distance to X.\n\n#### Find the conduction band effective mass\n\nWe will now use the band-edge script to accurately locate the position of the conduction band minimum and to calculate the effective mass. This is done in three steps. First do a rough search by ‘floating’ to a point near the minimum. Next, do a more refined search by carrying out a minimization until the gradient is negligibly small. Lastly, you calculate the effective mass around this point.\n\n##### 1. Float to low-energy point\n\nband-edge script has a ‘float’ option that is useful for doing a quick search to find a low-energy (or high-energy) region of k-space. You specify a starting point, then the script creates a cluster of points around it and checks what is the lowest-energy point. It then uses the lowest-energy point as the next central point, creates a new set of points around it and again moves to the lowest-energy one. This process is repeated until the central point is the lowest-energy point.\n\nLet’s pick a random point (0.1,0.2,0.3) and let band-edge float downhill. Run the following command:\n\n$band-edge -floatmn -maxit=20 -r=0.1 -band=5 -q0=0.1,0.2,0.3 si ‘−floatmn’ tells band-edge to seek a minimum-energy point (see additional exercises for a maximum-energy point example). ‘−maxit’ switch limits the number iterations (number of times a set of points is created) in case convergence is not reach before then, ‘−r=’ sets a range that defines how far from the centre the points are generated, ‘−band’ is for the band considered (here conduction band is 5 since 4 electrons and spin degenerate) and lastly −q0 is the starting k-point. To see what switches band-edge has, invoke it without any arguments, or see documentation below. You should get an output similar to the following: check that \"lmf si\" reads input file without error ... ok start iteration 1 of 20 lmf si --band~lst=5~box=0.1,n=12+o,q0=0.1,0.2,0.3 > out.lmf qnow, E : 0.100000 0.200000 0.300000 0.3728323 gradient : -0.154879 0.182604 -0.061755 0.247276 q* : 0.160109 0.113958 0.240887 use : 0.027639 0.147427 0.344721 ... start iteration 8 of 20 lmf si --band~lst=5~box=0.1,n=12+o,q0=-0.017083,0.009789,0.834163 > out.lmf qnow, E : -0.017083 0.009789 0.834163 0.2202239 gradient : -0.045667 0.028215 -0.015231 0.055799 q* : -0.004562 0.001050 0.845041 cluster center is extremal point ... exiting loop q @ minimum gradient : -0.017083 0.009789 0.834163 Final estimate for q : -0.017083 0.009789 0.834163 Take a look at the first line beginning with lmf. band-edge tells you what command it uses for the energy of each point in the cluster around your starting point. In each iteration qnow gives the current central k-point and its energy in Rydbergs. ‘use’ prints the lowest-energy k-point in the cluster of points around the middle point; this will then be used as the central point in the next iteration. The cluster of 13 k-points and their energies are printed to bnds.si. Take a look and you will see that (-0.017083,0.009789,0.834163) is indeed the lowest-energy point in the cluster. As the iterations proceed, note that the energies at qnow are going down as we float to a low-energy region. After 8 iterations, the following is printed: ‘cluster center is extremal point … exiting loop’. The central q-point is the lowest-energy point and the float routine is finished. ##### 2. Gradient minimization Starting from the low-energy point we floated to, the next step is to do a more refined search using a gradient minimization approach. band-edge creates a new cluster of points, does a quadratic fit and then traces the gradients to a minimum point. Run the following command: $ band-edge -edge2 -maxit=20 -r=.04 -band=5 -gtol=.0001 -q0=\"-0.017083 0.009789 0.834163\" si\n\n\n‘edge2’ part specifies what gradient minimization algorithm to use. All the switches are explained in the documentation below\n\nThe output is similar to before but now we will pay attention to the gradient line which prints the x, y and z gradient components and the last column gives the magnitude. Note how the gradient magnitude is decreasing with each step until it falls below the specified tolerance (gtol). At this point, the gradients minimization is converged and the following is printed ‘gradient converged to tolerance gtol = .0001’. It found the minimum gradient to be (0,0,0.846).\n\n##### 3. Calculate effective mass\n\nNow that we have accurately determined the conduction band minimum, we can calculate the effective mass. This is done by fitting a quadratic form to a set of points around the conduction band minimum. Run the following command:\n\n\\$ band-edge -mass -alat=10.26 --bin -r=.0005,.001,.002,.003 -band=5 -q0=0,0,0.846 si\n\n\nmass tells band-edge to estimate the effective mass tensor. alat is the lattice constant (found in various places such as the lmf output, init or site file). The lattice constant is needed to convert to atomic units since the code reports k-points in units of $2\\pi/\\mathrm{alat}$. r gives the radii of the four clusters of points around the central point; each radius has 32 points (points and faces of an icosohedron). The extra points improve the accuracy of the quadratic fitting.\n\nThe last line of the output prints the three effective mass components in atomic units. So for silicon, the effective mass is anisotropic with lighter masses in two directions and a heavier effective mass in the third direction.\n\n 0.918580 0.185604 0.185532\n\n\nThe masses are fairly close to experimental values for Si.\n\nTo see the principal axes (eigenvectors of the mass tensor) do the following:\n\necho princ | pfit 2 bndsa.si\n\n\nThe three columns below eval are the three principal axes (eigenvectors of the quadratic form). In this case they are just the Cartesian axes.\n\n### The band-edge manual\n\nband-edge is shell script that calls lmf (or any Questaal executable that can generate energy bands through the --band switch.\n\nIts purpose is to find band extrema and it operates in four distinct modes. All modes start from a reference q point, and compute energy bands in a cluster of points around the reference. One band in particular is selected out. The cluster of points are arranged in some regular polyhedron with 12, 20, or 32 points in a shell. You specify the radius of the polyhedron (or radii of multiple shells if desired). Energy bands are generated by invoking lmf or similar code with the --band switch, which is invoked in a special-purpose box mode that makes bands for clusters of q points centered around a reference.\n\nThe four modes are:\n\n1. (-floatmx or -floatmn) Update the current q point by indentifying whichever point in the cluster has the maximum value (-floatmx) or minimum value (-floatmn). If the central point is the extremal point, band-edge exits. Otherwise, the extremal point becomes the new central point and the cycle is repeated.\n2. (-edge) The selected energy band at a given cluster of points is subject to a least-squares fit and the gradient in q extracted. The q point and gradient are fed to a Broyden minimization algorithm built into the fmin utility. fmin returns a new estimate for the extremal point. The process is iterated until the gradient falls below a specified tolerance.\n3. (-edge2) The selected energy band at a given cluster of points is fit to a quadratic polynomial in qx, qy, qz and the extremal point is estimated from the extremal point of the parabola. This new point becomes the reference point; the process is iterated until the gradient falls below a specified tolerance.\n4. (-mass) The selected energy band at a given cluster of points is fit to a quadratic polynomial. The normal matrix is diagonalized; its eigenvalues are the tensor effective masses and eigenvectors are the principal axes of the mass tensor.\n\nUsage : band-edge switches ext\n\next is the extension in ctrl.ext, the input file the band code uses to generate $E_n(\\mathbf{q})$. By default band-edge uses lmf (but see -cmd below).\n\nChoose between one of the following modes :\n\n• -edge\nSeek extremal q by calculating $\\nabla_q E_n$ and minimizing it using a Broyden algorithm\n\n• -edge2 | -edge2=fac\nSeek extremal q using 1st and 2nd derivatives of $\\nabla_q E_n$, from a polynomial fit to $E_n$ on the cluster.\nCalculates qnew = (1-fac)*qold + fac*qmin where qmin is extremal point estimated from quadratic form.\nfac is used if it is specified; otherwise fac=1. Independently of fac, the change in q might be limited by dqmx (below)\n\n• -floatmx\nUpdate reference q with largest $E_n$ in cluster. Iterate until the reference point (cluster center) is the maximum point.\n\n• -floatmn\nUpdate reference q with smallest $E_n$ in cluster. Iterate until the reference point (cluster center) is the minimum point.\n\n• -mass\nFit bands around q0 to estimate effective mass tensor.\n\nRequired switches:\n\n• -q0=#,#,#\nStarting value of reference q\n\n• -band=n\nSpecify band index n to optimize\n\n• -r=#[,#2,#3,…]\n\n• -alat=a\nLattice constant a (a.u.). It is not needed except in the calculation of effective mass (required there because q has units 2πa).\n\nOptional switches:\n\n• -h | --h | --help\nshow this message\n\n• -cmd=strn\nuse strn in place of default command to generate bands, e.g.\ncmd=\"mpirun -n 16 lmf\"\nDefault cmd is lmf.\n\n• -n=12 | -n=20 | -n=32\nSpecify number of points in shell of radius r\n\n• -dqmx=#\nMaximum allowed change n any component of q for one iteration\n\n• -gtol=#\nConvergence tolerance in the gradient (applies to -edge and -edge2)\n\n• –maxit=#\nMaximum number of iterations to attempt\n\n• –spin1\nreplace --band with -band~spin1\n\n• –spin2\nreplace --band with -band~spin2\n\n• –noexec\nShow what cmd will be executed, without executing it\n\n• –bin’ Tell the bands maker to write bands in binary format\n\nAlthough we know the valence band maximum for silicon is at the $\\Gamma$ point, we will use it as an example for finding a maximum point. Try starting from the point (0.1,0.1,0.1). In the float step, change the floatmn (for minimum) to floatmx (for maximum) and change the band number to 4 (for valence band). Notice the energies are going up. Now do a gradient minimization from the point you floated to, remember to change the band number to 4. The valence band maximum is in a flatter region so try using a smaller excursion radius, say 0.001. Then calculate the effective mass. Your values should be around (-0.34, -0.56, -0.88). The negative signs indicate a maximum point, a saddle point would have at least one positive sign."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7998922,"math_prob":0.988384,"size":13057,"snap":"2021-43-2021-49","text_gpt3_token_len":3559,"char_repetition_ratio":0.14042749,"word_repetition_ratio":0.06132303,"special_character_ratio":0.28329632,"punctuation_ratio":0.15037327,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9961853,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-26T21:25:23Z\",\"WARC-Record-ID\":\"<urn:uuid:c0338c28-42f7-4f99-ad96-dd49211fed9a>\",\"Content-Length\":\"47801\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b32ec373-e5b6-49ec-9bad-24c35b8e67a5>\",\"WARC-Concurrent-To\":\"<urn:uuid:646ab34b-e3bb-4b70-97c4-589ff15919d0>\",\"WARC-IP-Address\":\"173.212.228.104\",\"WARC-Target-URI\":\"https://www.questaal.org/tutorial/lmf/bandedge/\",\"WARC-Payload-Digest\":\"sha1:3MWEQ3UOZZSHWRBM2ZUG5DH4TIMQTFWL\",\"WARC-Block-Digest\":\"sha1:U5XWD56BCF7NZGHI5AUTLF5UEOTKVLG6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587926.9_warc_CC-MAIN-20211026200738-20211026230738-00682.warc.gz\"}"} |
http://www.baojianyuan.cn/gs/69zz83/ | [
"# 面相极贵的男人",
null,
"2021-12-01\n\n### 什么面相的男人注定富贵?",
null,
"=x1^3-x2^3\n\n=(x1-x2)(x1^2+x2^2+x1x2)\n\n=(x1-x2)[(x1+x2/2)^2+3(x2^2)/4]\n\n∵ x1<x2\n\n∴ x1-x2<0 ,(x1+x2/2)^2+3(x2^2)/4>0\n\n∴ (x1-x2)[(x1+x2/2)^2+3(x2^2)/4]<0\n\n∴ y2-y1<0\n\n### 日月角骨很明显的人面相\n\n1、性平的食物一年四季都可食用。\n2、性温的食物除夏季适当少食用外,其它季节都可食用。\n3、性凉的食物夏季可经常食用,其它季节如要食用须配合性温的食物一起吃。\n4、性寒的食物尽量少吃,如要食用必须加辣椒、花椒、生姜等性温热的食物一起吃。\n\n### 日后注定富贵男人面相有哪些特点\n\n• 1.宿世缘分是什么\n• 2.属马人2021年运势运程每月运程男\n• 3.老黄历姓名测吉凶查询\n• 4.辟邪神兽的本领\n• 5.女性打喷嚏吉凶\n• 6.算命说感情不顺晚婚\n• 7.六爻六爻\n• 8.五行属木有什么字最好取名"
]
| [
null,
"http://www.baojianyuan.cn/pic/w40xrs1e4aw.jpg",
null,
"https://iknow-pic.cdn.bcebos.com/bba1cd11728b47103479e6e3cfcec3fdfc03234e",
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.94877845,"math_prob":0.9959005,"size":5358,"snap":"2021-43-2021-49","text_gpt3_token_len":7323,"char_repetition_ratio":0.046507284,"word_repetition_ratio":0.0,"special_character_ratio":0.24710713,"punctuation_ratio":0.02929293,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96603364,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-01T09:31:21Z\",\"WARC-Record-ID\":\"<urn:uuid:36654790-8886-4110-998f-fabc286a0a8a>\",\"Content-Length\":\"24279\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a93c4759-7ffa-4a4c-9317-a839622fb8eb>\",\"WARC-Concurrent-To\":\"<urn:uuid:0509c4d3-76af-4cb6-86c1-2265679e5a73>\",\"WARC-IP-Address\":\"103.86.47.220\",\"WARC-Target-URI\":\"http://www.baojianyuan.cn/gs/69zz83/\",\"WARC-Payload-Digest\":\"sha1:NF7KP2A6L2GSNAIRHPDAPQ2OYSZMSJC4\",\"WARC-Block-Digest\":\"sha1:K6U2GOVYGIUZCCQA762YUTJNGGFC52G7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964359976.94_warc_CC-MAIN-20211201083001-20211201113001-00353.warc.gz\"}"} |
https://discusstest.codechef.com/t/maze_shortest-path/1698 | [
"",
null,
"# maze_shortest path\n\nhttp://www.codechef.com/BTFR2013/problems/NITA07\n\nHow to solve this??\n\n1 Like\n\nBfs can be used to solve it.\n\n1 Like\n\nI didn’t solve this one yet, but it seems as simple shortest path problem, so simply use one of the well known algorithm f.e.:\n\n2 Likes\n\nthanks!!!\n\n1 Like\n\nthanks!!!\n\n@hariprasath\n\nThis is a very known problem called as Rat in a Maze.\n\nYou can use BFS or Backtracking to solve this problem.\n\n@betlista i think you do not need to use Dijkstra algorithm for this problem.\n\n3 Likes\n\ny dijkstra??\n\n1 Like\n\nthis function can solve the question recursive and easy",
null,
"int minCost(int cost[][C],int m, int n)\n{\nif (n < 0 || m < 0)\nreturn INT_MAX;\nelse if (m == 0 && n == 0)\nreturn cost[m][n];\nelse\nreturn cost[m][n] + min( minCost(cost,m-1, n-1),\nminCost(cost,m-1, n),\nminCost(cost,m, n-1) );\n}\n\n5 Likes\n//"
]
| [
null,
"https://s3.amazonaws.com/discoursestaging/original/2X/4/45bf0c3f75fc1a2cdf5d9042041a80fa6dd3106b.png",
null,
"https://discusstest.codechef.com/images/emoji/apple/slight_smile.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7886716,"math_prob":0.90124094,"size":795,"snap":"2021-31-2021-39","text_gpt3_token_len":238,"char_repetition_ratio":0.13400759,"word_repetition_ratio":0.015748031,"special_character_ratio":0.30943397,"punctuation_ratio":0.20833333,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98931015,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-25T05:42:42Z\",\"WARC-Record-ID\":\"<urn:uuid:3d8867e8-da65-41c2-a135-6cbd01698b8b>\",\"Content-Length\":\"25342\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ace1c348-7d42-4320-9fea-999600841a23>\",\"WARC-Concurrent-To\":\"<urn:uuid:03aa1b6a-6c7b-4399-8592-c1f5ee1431ff>\",\"WARC-IP-Address\":\"54.165.214.21\",\"WARC-Target-URI\":\"https://discusstest.codechef.com/t/maze_shortest-path/1698\",\"WARC-Payload-Digest\":\"sha1:6BOIWWHS5TNWBZ5BTIX2NI575SJ2T3RR\",\"WARC-Block-Digest\":\"sha1:ZM4PC4FE3INT2VFIJOBVLUJK53YY5V7S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046151638.93_warc_CC-MAIN-20210725045638-20210725075638-00707.warc.gz\"}"} |
https://studylib.net/doc/11133721/homework-%23-1--due-10-feb-%3D-1-magnitude-leads-to | [
"# Homework # 1, due 10 Feb = 1 magnitude leads to",
null,
"```Homework # 1, due 10 Feb\n1. Show that an extinction of Aλ = 1 magnitude leads to\na flux Fλ decrease to 40% of its original value.\n2. Assuming dust grains are 0.1µ m in radius, that the\ngas density in the ISM is nH = 1 cm−3, and the number density of dust grains is nd = 10−12 cm−3 and\nuniformly distribued, find the column density NH of\nhydrogen to be expected along a line of sight in which\na source is observed to have an extinction AV = 1 magnitude. What is the mean free path of light along this\nline of sight? What is the distance to the source?\n3. Assume a star cluster has 200 F5 stars at the main\nsequence turnoff and 20 K0III giant stars. Determine\nthe quantities MV and B − V for each type of star\nsingly and also for the cluster. Suppose the cluster is\nat a distance of 2 kpc. What is mV for the cluster?\n4. In a galaxy at a distance of d Mpc, what would be\nmB⊙? In this galaxy, what length does 1 arcsec correspond to? If the surface brightness of this galaxy is\nIB = 27 mag arsec−2, show that the brightness of this\ngalaxy is equivalent to 0.99 LB⊙ pc−2. Why doesn’t\nthis quantity depend on the distance?\n```"
]
| [
null,
"https://s2.studylib.net/store/data/011133721_1-5c2c55095584e5f868918db54b294c7c-768x994.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9326764,"math_prob":0.9703055,"size":1117,"snap":"2021-31-2021-39","text_gpt3_token_len":305,"char_repetition_ratio":0.10961366,"word_repetition_ratio":0.009049774,"special_character_ratio":0.2676813,"punctuation_ratio":0.0996016,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9830845,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-20T16:49:04Z\",\"WARC-Record-ID\":\"<urn:uuid:fe037eb4-d4cd-43ca-afe2-c4c16d2a0584>\",\"Content-Length\":\"48313\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ccac37cb-08e8-46e5-94f6-dcfa6fd85956>\",\"WARC-Concurrent-To\":\"<urn:uuid:933fa405-111c-400b-b8c3-67a0bb05c768>\",\"WARC-IP-Address\":\"104.21.72.58\",\"WARC-Target-URI\":\"https://studylib.net/doc/11133721/homework-%23-1--due-10-feb-%3D-1-magnitude-leads-to\",\"WARC-Payload-Digest\":\"sha1:BW7TJDAXTIG4P2QDILWONDHOI4WP22U3\",\"WARC-Block-Digest\":\"sha1:RKDMJXSBVWAK4HEWBNCDIZM3OC6SO3YP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057083.64_warc_CC-MAIN-20210920161518-20210920191518-00324.warc.gz\"}"} |
https://jp.maplesoft.com/support/help/Maple/view.aspx?path=LinearAlgebra/Modular/IntegerDeterminant | [
"",
null,
"IntegerDeterminant - Maple Help\n\nLinearAlgebra[Modular]\n\n IntegerDeterminant\n determinant of an integer matrix using modular methods",
null,
"Calling Sequence IntegerDeterminant(M)",
null,
"Parameters\n\n M - Square Matrix with integer entries",
null,
"Description\n\n • The IntegerDeterminant function computes the determinant of the integer matrix M. This is a programmer level function, it does not perform argument checking. Thus, argument checking must be handled external to this function.\n • Note: The IntegerDeterminant command uses a probabilistic approach that achieves great gains for structured systems. Information on controlling the probabilistic behavior can be found in EnvProbabilistic.\n • This function is used by the Determinant function in the LinearAlgebra package when a Matrix is determined to contain only integer entries.\n • This command is part of the LinearAlgebra[Modular] package, so it can be used in the form IntegerDeterminant(..) only after executing the command with(LinearAlgebra[Modular]). However, it can always be used in the form LinearAlgebra[Modular][IntegerDeterminant](..).",
null,
"Examples\n\nA 3x3 matrix\n\n > $\\mathrm{with}\\left(\\mathrm{LinearAlgebra}\\left[\\mathrm{Modular}\\right]\\right):$\n > $M≔\\mathrm{Matrix}\\left(\\left[\\left[2,1,3\\right],\\left[4,3,1\\right],\\left[-2,1,-3\\right]\\right]\\right)$\n ${M}{≔}\\left[\\begin{array}{ccc}{2}& {1}& {3}\\\\ {4}& {3}& {1}\\\\ {-2}& {1}& {-3}\\end{array}\\right]$ (1)\n > $\\mathrm{IntegerDeterminant}\\left(M\\right)$\n ${20}$ (2)\n\nA 100x100 matrix\n\n > $M≔\\mathrm{LinearAlgebra}\\left[\\mathrm{RandomMatrix}\\right]\\left(100\\right):$\n > $\\mathrm{tt}≔\\mathrm{time}\\left(\\right):$\n > $\\mathrm{IntegerDeterminant}\\left(M\\right)$\n ${38562295347802366242417909657285032281105091485000162871067163275296273582728190925949289361981964881806516849833008824879568403928373759144147382030798909099402726531205056808283212790472544339698767179236612577117605985054960334148934541347201762137455}$ (3)\n > $\\mathrm{time}\\left(\\right)-\\mathrm{tt}$\n ${0.042}$ (4)"
]
| [
null,
"https://bat.bing.com/action/0",
null,
"https://jp.maplesoft.com/support/help/Maple/arrow_down.gif",
null,
"https://jp.maplesoft.com/support/help/Maple/arrow_down.gif",
null,
"https://jp.maplesoft.com/support/help/Maple/arrow_down.gif",
null,
"https://jp.maplesoft.com/support/help/Maple/arrow_down.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6001329,"math_prob":0.9944781,"size":1645,"snap":"2022-05-2022-21","text_gpt3_token_len":435,"char_repetition_ratio":0.1773309,"word_repetition_ratio":0.011976048,"special_character_ratio":0.31610942,"punctuation_ratio":0.13043478,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9984615,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-28T14:53:25Z\",\"WARC-Record-ID\":\"<urn:uuid:0f449728-a2c0-490b-9344-b12815b464d0>\",\"Content-Length\":\"165808\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7ba7860f-d625-4be0-b21d-73f17cb7182e>\",\"WARC-Concurrent-To\":\"<urn:uuid:3bb9de13-81d3-4d70-a4e1-e3190193d5f3>\",\"WARC-IP-Address\":\"199.71.183.28\",\"WARC-Target-URI\":\"https://jp.maplesoft.com/support/help/Maple/view.aspx?path=LinearAlgebra/Modular/IntegerDeterminant\",\"WARC-Payload-Digest\":\"sha1:6VYGPX32B7A4ZUPQX5FEPMXLD7LSZQUY\",\"WARC-Block-Digest\":\"sha1:U6SN4SOQTI456BE6DS7NYCUATWJNG7FI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652663016853.88_warc_CC-MAIN-20220528123744-20220528153744-00465.warc.gz\"}"} |
https://micans.org/mcl/man/mcxrand.html | [
"16 May 2014 mcxrand 14-137\n\n1.\n2.\n3.\n4.\n5.\n\n## NAME\n\nmcxrand — random shuffling, removal, addition, and perturbation of edges of graphs\n\n## SYNOPSIS\n\nmcxrand [options]\n\nmcxrand -gen K -add N -new-g-mean f # random graph on K nodes, N edges mcxrand -imx <name> -remove N -add N # remove then add edges mcxrand -imx <name> -shuffle N # shuffle N edge pairs mcxrand -imx <name> -noise-radius f # add noise to add weights\nmcxrand -pa N/m # preferential attachment generation\n\n## DESCRIPTION\n\nThis utility is a recent addition to the mcl suite and the schemes explained below will likely be evolved, simplified, and extended with future releases.\n\nThe --shuffle, -gen and -pa options can be deemend stable and robust. The options that determine edge weight perturbation and generation are likely to be subject to revision in the future.\n\nThe input graph/matrix, if specified with the -imx option, has to be in mcl matrix/graph format. You can use label input instead by preprocessing the label input with mcxload, i.e.\n\nmcxload -abc <label-file> | mcxrand [options]\n\nRefer to mcxio for a description of these two input formats. By default mcxrand reads from STDIN. Change this with the -imx option.\n\nmcxrand can randomly remove and add edges to a graph, or add gaussian noise to the edge weights of a graph. It can also shuffle edge pairs while preserving the degree sequence of the graph. In removal mode (-remove <num>) and in addition mode (-add <num>) mcxrand enforces arc symmetry by only working with edges w(i,j) where i < j and symmetrifying the result and adding any loops that were present in the input graph just before the output stage.\n\nIn perturbation mode (-noise-radius, with no other mode specified) the input can be any graph.\n\nShuffle mode (-shuffle <num>) requires an undirected graph but will only fail when it picks an arc for which the arc in the reverse direction is not present. This means it may or may not fail on directed input depending on the random choices. It does not check equality of the two arc weights and randomly picks one to represent the edge weight.\n\nEdge removal, edge creation, and edge perturbation are applied in this order if both are specified. Edge shuffling presently cannot be combined with one of the previous modes.\n\nA random graph can be generated with -gen k, which specifies the number of nodes the graph should have. It is equivalent with pasing (the file name of) an empty graph of the same dimensions as the argument to -imx.\n\nWhen adding (i.e. creating) edges, the default is to use the uniform distribution for new edge weights ranging in some interval. The default interval is [0,1] and can be modified using the -edge-min min and -edge-max max options. A Gaussian edge weight distribution can be obtained by specifying -new-g-mean num. The standard deviation is by default 1.0 and can be altered with -new-g-sdev num. Currently the edge weigths are generated within the interval [mean-radius, mean+radius] where radius is specified with -new-g-radius. They are further selected to lie within the interval [L,R] if and only if -new-g-min L and -new-g-max R have been specified.\n\nFor both uniform and Gaussian edge creation the edge weights can be skewed towards either side of the distribution with -skew c. Skewing is applied by mapping the edge weights to the interval [0,1], applying the function x^c, and remapping the resulting number. For values c<1 this skews the edge weights towards the right bound and for values c>1 this skews the edge weights towards the left bound. This is a rather crude approach that will likely be changed in the future.\n\nEdge weights can be perturbed by specifying -noise-radius radius. This sets the maximum perturbation allowed. Noise is generated with a standard deviation that is by default set to 0.5 and can be altered using -noise-sdev num. Values are generated in the interval [-fac*sdev, fac*sdev] where fac is set with -noise-range fac. This interval is mapped to the interval [-radius, radius] before the resulting value is added to the actual edge weight. This becomes the new value. If an interval [L,R] is explicitly specified using -edge-min L and -edge-max R then the new value will be accepted only if it lies within the interval, otherwise the edge will not be perturbed.\n\n## OPTIONS\n\n-imx <fname> (input matrix)\n\nThe file name for input. STDIN is assumed if neither -imx nor -gen num is specified.\n\n-o <fname> (output matrix to <fname>)\n\nThe file to write the transformed matrix to.\n\n--write-binary (write output in binary format)\n\nWrite the output matrix in native binary format.\n\n-shuffle <num> (shuffle edge pair <num> times)\n\nShuffle edge pair <num> times. An edge shuffle acts on two randomly chosen edges edges w(a,b) and w(c,d) where all the nodes must be different. If either none of the edges in w(a,c), w(b,d) or none of the edges in w(a,d), w(b,c) exists the original two edges are removed and is replaced by an edge pair for which both edges did not exist before.\n\n-icl <fname> (shuffle nodes preserving cluster sizes)\n\nUse this option to generate a random clustering with the exact same cluster size distribution as the input clustering.\n\n-pa <N>/<m> (preferential attachment)\n\nThis generates a random graph using preferential attachment. In this model new nodes are sequentially added to a graph. Each new node is connected with <m> of the existing nodes (including nodes previously added), where the likelihood of picking an existing node is proportional to the edge degree of that node. During construction multiple edges between two nodes are allowed (each with weight one), and these are collapsed by adding their weights before output.\n\n-remove <num> (remove <num> edges)\n\nRemove this many edges from the input graph."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.85847974,"math_prob":0.9271745,"size":5701,"snap":"2022-27-2022-33","text_gpt3_token_len":1289,"char_repetition_ratio":0.13393013,"word_repetition_ratio":0.008492569,"special_character_ratio":0.22311875,"punctuation_ratio":0.08874657,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9801614,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-13T21:47:03Z\",\"WARC-Record-ID\":\"<urn:uuid:3409d9a7-a616-4c4c-9702-4b17d44bcde3>\",\"Content-Length\":\"15985\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1a71a6cc-7c37-4ff3-9864-c1ddc307f064>\",\"WARC-Concurrent-To\":\"<urn:uuid:d2376954-e7f9-44ee-90be-6e755d3addfe>\",\"WARC-IP-Address\":\"46.235.227.111\",\"WARC-Target-URI\":\"https://micans.org/mcl/man/mcxrand.html\",\"WARC-Payload-Digest\":\"sha1:XQXQKLKK64SZPP7PMO3FH4DCOYBVXDWJ\",\"WARC-Block-Digest\":\"sha1:BHBWUOL2DII4KRLUBCZYBUIPYWFACXEY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571987.60_warc_CC-MAIN-20220813202507-20220813232507-00170.warc.gz\"}"} |
https://kaboom.ninja/en/cpp/lesson-5 | [
"# Pointers to fuctions\n\nAnalyse all * in the code below:\n\n``````\n#include <iostream>\n\nint give2()\n{\nreturn 2;\n}\n\nint main()\n{\nint fun0; // int variable\nint *fun1; // pointer to int variable\n\nint *fun2(); // header of a function, which returns a pointer to int variable\n\nint (*fun3)(); // pointer to a function, which returns int\nint *(*fun4)(); // pointer to a function, which returns a pointer to int\n\nfun3 = &give2;\nstd::cout << fun3() << std::endl;\n\n}``````\n\nWrite a function lucky(), wchich returns one (1/6 chance) or second (5/6 chance) function.\n\nGoal of the first one is to display \"Lose\", the second \"Win\".\n\nCall a function returned by lucky().\n\nWrite a method, which will calculate an integral of any given function.\n\nCreate 3 different functions and use as arguments.\n\nWarning: we will use distinct integral.\n\nPass a lambda expression as an argument to method, which will call the given function with a parameter.\n\n``````\n#include <iostream>\n\nvoid x_100(bool (*fun)(int)) {\nstd::cout << fun(100) << std::endl;\n}\n\nint main()\n{\nx_100([](int a) { return a % 2 == 0; });\n}``````"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6607733,"math_prob":0.99235314,"size":1250,"snap":"2019-51-2020-05","text_gpt3_token_len":317,"char_repetition_ratio":0.14526485,"word_repetition_ratio":0.07511737,"special_character_ratio":0.3016,"punctuation_ratio":0.15767635,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97843134,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-07T12:02:51Z\",\"WARC-Record-ID\":\"<urn:uuid:faac5b41-8578-4a2f-883a-5b2218a1e429>\",\"Content-Length\":\"4874\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a7b70f2a-19bb-483a-b17e-e0099685a41e>\",\"WARC-Concurrent-To\":\"<urn:uuid:27f34484-2475-41f5-8041-6f78a26012b2>\",\"WARC-IP-Address\":\"51.105.135.90\",\"WARC-Target-URI\":\"https://kaboom.ninja/en/cpp/lesson-5\",\"WARC-Payload-Digest\":\"sha1:AU65MWSHWOPLXUIV3YZXFTJREO2XO25I\",\"WARC-Block-Digest\":\"sha1:IWWNVIOHK2NYCW7KMYWVF2OGMYKGOQZ6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540499389.15_warc_CC-MAIN-20191207105754-20191207133754-00544.warc.gz\"}"} |
https://code.snipcademy.com/challenges/problems/check-all-chars-unique-in-string | [
"Check if all chars in a string are unique\n\nQuestion: Write a function that determines if each characters in a String appear no more than once.\n\nRelated Tags:\n\nQuestions\n\n• What type of encoding is used?\n• How long, on average are the strings we are checking?\n\nThere are three main types of encoding - UTF and ASCII.\n\nUnicode is used by almost all operating systems to define the internal text coding system. Unicode assigns each character a unique number (its code point). One of the mapping methods used is UTF. UTF-8 takes a minimum of 8 bits and a maximum of 32 bits per character. This means there are 1,111,998 possible characters.\n\nASCII is more limited towards English language, and has 128 possible characters. Each char is assigned a code point from 0 to 127.\n\nLet's assume ASCII for simplicity.\n\n1) Using a boolean array\n\nIf our string is much longer than 128 characters long, we can use a boolean array of size 128. Each character encountered in our string we will flag as true for that index. If we encounter an array cell that is already set to true, then this means that the character has already appeared, so we return false. This way, the maximum number iterations will be 128.\n\nAlgorithm Pseudocode\n\n1. If the length of the string is greater than the number of possible characters, then return false.\n2. Set up an array with size however large the encoding set is.\n3. For each character encountered, convert it to its code point and check its value in the array at that index.\n4. If it's set to false, set it to true.\n5. If it's true, that means we have already encountered it. Thus, return false.\n\nComplexity\n\nThe time complexity is O(n), but the space complexity is O(k) where k is the size of number of characters the encoding may generate.\n\nImplementation in Java\n\nstatic boolean isUniqueArray(String str) {\n\n// string can't be longer than num encoding chars\nif (str.length() > NUMBER_OF_CHARS) {\nreturn false;\n}\n\nboolean[] array = new boolean[NUMBER_OF_CHARS];\nint curr;\n\nfor (int i = 0; i < str.length(); i++) {\ncurr = (int) str.charAt(i);\n\nif (array[curr]) {\nreturn false;\n} else {\narray[curr] = true;\n}\n}\n\nreturn true;\n}\n\n2) Using a bag or set\n\nIf the string is much shorter than the amount of characters in the character encoding, it would be good to use a bag or set. This way, the number of iterations is kept, at most, the length of the String.\n\nAlgorithm Pseudocode\n\nHere's the algorithm pseudocode:\n\n1. Iterate through the String, selecting each character c.\n2. Check if c is in our set. If not, insert. If it is, return false.\n\nComplexity\n\nThe time complexity remains the same as above O(n), but the space complexity is lowered to O(l), where l is the length of our string.\n\nImplementation in Java\n\nstatic boolean isUniqueSet(String str) {\n\n// string can't be longer than num encoding chars\nif (str.length() > NUMBER_OF_CHARS) {\nreturn false;\n}\n\nHashSet<Character> charSet = new HashSet<>();\n\nCharacter c;\n\nfor (int i = 0; i < str.length(); i++) {\nc = str.charAt(i);\nif (charSet.contains(c)) {\nreturn false;\n} else {\n}\n}\n\nreturn true;\n}\n\n3) Checking each character\n\nIn case you aren't allowed to use additional space, we can implement an algorithm that compares each character to all other characters in the array. We can do this easily with two for-loops.\n\nComplexity\n\nAlthough this approach takes quadratic time (O(n2)), there is no extra auxillary space needed.\n\nImplementation in Java\n\nstatic boolean isUniqueCheck(String str) {\n\n// string can't be longer than num encoding chars\nif (str.length() > NUMBER_OF_CHARS) {\nreturn false;\n}\n\nchar c;\n\nfor (int i = 0; i < str.length(); i++) {\n\nc = str.charAt(i);\n\nfor (int j = i+1; j < str.length(); j++) {\nif (c == str.charAt(j))\nreturn false;\n}\n\n}\n\nreturn true;\n}\n\n4) Sorting\n\nYou may also sort the array, then see if any character repeats itself. Depending on the algorithm used to sort, you may or may not use auxillary space.\n\nComplexity\n\nThe time and space complexity depends on the algorithm, but we can bring the time complexity down to O(n log n) and space down to O(1).\n\nImplementation in Java\n\nstatic boolean isUniqueSort(String str) {\n\n// string can't be longer than num encoding chars\nif (str.length() > NUMBER_OF_CHARS) {\nreturn false;\n}\n\nchar[] charArray = str.toCharArray();\n\nArrays.sort(charArray);\n\nfor (int i = 0; i < charArray.length - 1; i++) {\nif (charArray[i] == charArray[i+1])\nreturn false;\n}\n\nreturn true;\n}\n\nCame up with a better solution or have a question? Comment below!\n\nNext Challenge:"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7556583,"math_prob":0.96828157,"size":3607,"snap":"2019-43-2019-47","text_gpt3_token_len":873,"char_repetition_ratio":0.13294476,"word_repetition_ratio":0.16051364,"special_character_ratio":0.2700305,"punctuation_ratio":0.14763232,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9906796,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-16T09:49:46Z\",\"WARC-Record-ID\":\"<urn:uuid:be92bb00-0c9d-44ef-92f9-3491fb8fb371>\",\"Content-Length\":\"19276\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:91d1e8ce-9155-45e3-8d02-5a5e47116533>\",\"WARC-Concurrent-To\":\"<urn:uuid:071c4a4d-b698-48b0-9e17-a72041161b10>\",\"WARC-IP-Address\":\"45.55.200.87\",\"WARC-Target-URI\":\"https://code.snipcademy.com/challenges/problems/check-all-chars-unique-in-string\",\"WARC-Payload-Digest\":\"sha1:QYSIGOGAILQJCUP3WD7FEPK2ESC44PHO\",\"WARC-Block-Digest\":\"sha1:MCSDVDUISCKJUZZXPY5VRZWVGOQ2NR2U\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986666959.47_warc_CC-MAIN-20191016090425-20191016113925-00216.warc.gz\"}"} |
https://en.smath.com/wiki/(X(1)S(bxfotzd03pcc4n0pwouermha))/History.aspx?Page=Examples&Revision=00057 | [
"# Page History: Examples\n\nCompare Page Revisions\n\n « Older Revision - Back to Page History - Newer Revision »\n\n### Page Revision: 2010/03/08 03:51\n\nHere's your chance to show off! You need to zip them up if you want to save them on this server, as it won't let you upload .sm files.\n\n# Engineering\n\n• Non-linear deflection of a flexible cantilever pdf zip\n• Batch chemical reactor pdf zip\n• Lateral force developed by a tire, using an early Pacejka model. pdf zip\n• CEE Fluid Mechanics Test 1 (G.Urroz): | Prob 1 pdf zip | Prob 2 pdf zip | Prob 3 pdf zip |\n• CEE Fluid Mechanics Test 2 (G.Urroz) pdf zip\n• CEE Fluid Mechanics Test 3 (G.Urroz) pdf zip\n• Dynamics (G.Urroz) Test 1: pdf zip | Test 2: pdf zip | Test 3: pdf zip\n• NASA's Atmospheric Model (SI Units) pdf zip\n• Using an electromagnetic shaker to drive a single degree of freedom system pdf zip\n• Simple Estimates of a single prop, naturally aspirated, aircraft's performance pdf zip\n\n# Numerical methods\n\n• Newton-Raphson method for solving equations (G. Urroz) pdf zip\n• Nonlinear system of algebraic equations, Broyden's method pdf zip\n• Lagrange interpolation polynomials pdf zip\n• Newton interpolation polynomials (forward finite difference) pdf zip\n• Newton interpolation polynomials (backward finite difference) pdf zip\n• Data fitting (single independent var., linear on parameters) pdf zip\n• Data fitting (multiple, linear on parameters) pdf zip\n• Simpson integration with Richardson extrapolation pdf zip\n• Gauss-Legendre integration method pdf zip\n• Second order linear ODE - finite difference method pdf zip\n• Runge-Kutta 4th-order for single 1st-order ODE (G. Urroz) pdf zip\n• Runge-Kutta 4th-order for systems of ODEs (G. Urroz) pdf zip\n• Runge-Kutta 4th-order for single 2nd-order ODE (G. Urroz) pdf zip\n• Runge-Kutta 5th-order adaptive - also \"Batch chemical reactor\" (see \"Engineering\", above) pdf zip\n\n# Statistics\n\nScrewTurn Wiki version 2.0.37. Some of the icons created by FamFamFam."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.72007376,"math_prob":0.6882415,"size":1810,"snap":"2020-10-2020-16","text_gpt3_token_len":487,"char_repetition_ratio":0.18881506,"word_repetition_ratio":0.12080537,"special_character_ratio":0.24309392,"punctuation_ratio":0.08805031,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.961838,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-24T23:56:25Z\",\"WARC-Record-ID\":\"<urn:uuid:7ee61f2c-c5db-497a-a076-b704f024249b>\",\"Content-Length\":\"46645\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a74c7c67-2fcb-4683-9fa8-5450ff454037>\",\"WARC-Concurrent-To\":\"<urn:uuid:65cda1b4-618e-46a1-a6b5-c4aea818ab1a>\",\"WARC-IP-Address\":\"93.191.60.124\",\"WARC-Target-URI\":\"https://en.smath.com/wiki/(X(1)S(bxfotzd03pcc4n0pwouermha))/History.aspx?Page=Examples&Revision=00057\",\"WARC-Payload-Digest\":\"sha1:ZR3MLCCAWSSV7UOSQL6JC3MHMHGBYU4V\",\"WARC-Block-Digest\":\"sha1:GWCU2IOYY7VMJWELVHSGPVMJXO4ZAABM\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145989.45_warc_CC-MAIN-20200224224431-20200225014431-00059.warc.gz\"}"} |
https://askfilo.com/math-question-answers/find-the-value-of-x-in-the-following-5-x-2-times-3-2x-3-135 | [
"",
null,
"The world’s only live instant tutoring platform",
null,
"Question\n\n# Find the value of x in the following:\n\n## Solutions\n\n(11)",
null,
"Given\n\nOn equating the exponents of 5 and 3 we get,\nx - 2 = 1\nx = 1 + 2\nx = 3\nAnd,\n2x - 3 = 3\n2x = 3 + 3\n2x = 6\nx = 6/2\nx = 3\nHence, the value of x = 3.",
null,
"67\n\n## 10 students asked the same question on Filo\n\nLearn from their 1-to-1 discussion with Filo tutors.\n\n5 mins",
null,
"Taught by",
null,
"Mohit Kumar\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 9626\n\nTeaches : Mathematics\n\nNotes from this class (2 pages)",
null,
"",
null,
"",
null,
"",
null,
"123",
null,
"0\n12 mins",
null,
"Taught by",
null,
"Ashutosh Niranjan\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 4175\n\nTeaches : Physics, Mathematics\n\nNotes from this class (3 pages)",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"77",
null,
"0\n2 mins",
null,
"Taught by",
null,
"Samir Singh Dasawat\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 5782\n\nTeaches : Mathematics, Physical Chemistry\n\nNotes from this class (2 pages)",
null,
"",
null,
"",
null,
"",
null,
"124",
null,
"0\n19 mins",
null,
"Taught by",
null,
"Nitish Kumar\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 4077\n\nTeaches : Mathematics\n\nNotes from this class (4 pages)",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"96",
null,
"0\n3 mins",
null,
"Taught by",
null,
"Chandramohan Meena\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 8978\n\nTeaches : Mathematics\n\nNotes from this class (3 pages)",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"84",
null,
"0\n3 mins",
null,
"Taught by",
null,
"Md Manan Alam\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 8137\n\nTeaches : Mathematics\n\nNotes from this class (2 pages)",
null,
"",
null,
"",
null,
"",
null,
"125",
null,
"0\n19 mins",
null,
"Taught by",
null,
"Shashi Kumar Gupta\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 5445\n\nTeaches : Physics, Mathematics, English\n\nNotes from this class (3 pages)",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"106",
null,
"0\n1 mins",
null,
"Taught by",
null,
"Lalit Kumar\n\nConnect instantly with this tutor\n\nTotal classes on Filo by this tutor - 24893\n\nTeaches : Mathematics",
null,
"77",
null,
"0",
null,
"Connect with 50,000+ expert tutors in 60 seconds, 24X7"
]
| [
null,
"https://askfilo.com/images/logo.svg",
null,
"https://askfilo.com/images/icons/navbar.svg",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/dropdown-arrow.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/logo-inverted.svg",
null,
"https://askfilo.com/_next/image",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/upvote.svg",
null,
"https://askfilo.com/images/icons/tutors.svg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6799604,"math_prob":0.5673457,"size":1568,"snap":"2022-40-2023-06","text_gpt3_token_len":478,"char_repetition_ratio":0.18094629,"word_repetition_ratio":0.4319066,"special_character_ratio":0.3010204,"punctuation_ratio":0.09556314,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96534985,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-27T17:59:56Z\",\"WARC-Record-ID\":\"<urn:uuid:8e90dfb3-678a-4c20-9dad-bd86399c0b7a>\",\"Content-Length\":\"213387\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0ec3b776-ac0c-407b-a745-c39048b2351b>\",\"WARC-Concurrent-To\":\"<urn:uuid:4395c598-ed3e-4948-a3a5-8b74abb8aa35>\",\"WARC-IP-Address\":\"34.117.94.82\",\"WARC-Target-URI\":\"https://askfilo.com/math-question-answers/find-the-value-of-x-in-the-following-5-x-2-times-3-2x-3-135\",\"WARC-Payload-Digest\":\"sha1:ZC4WMXOACO6RRUF6D6BSTXXJEOUE6GPX\",\"WARC-Block-Digest\":\"sha1:O2SGXDXDG6QYGWYDXENZ53LGRRK6UE26\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764495001.99_warc_CC-MAIN-20230127164242-20230127194242-00307.warc.gz\"}"} |
https://sp23.datastructur.es/materials/lectures/lec23/ | [
"Trees and Graph Traversals Guide\nAuthor: Josh Hug\n\n## Overview #\n\nTrees. A tree consists of a set of nodes and a set of edges connecting the nodes, where there is only one path between any two nodes. A tree is thus a graph with no cycles and all vertices connected.\n\nTraversals. When we iterate over a tree, we call this a “tree traversal”.\n\nLevel Order Traversal. A level-order traversal visits every item at level 0, then level 1, then level 2, and so forth.\n\nDepth First Traversals. We have three depth first traversals: Pre-order, in-order and post-order. In a pre-order traversal, we visit a node, then traverse its children. In an in-order traversal, we traverse the left child, visit a node, then traverse the right child. In a post-order traversal, we traverse both children before visiting. These are very natural to implement recursively. Pre-order and post-order generalize naturally to trees with arbtirary numbers of children. In-order only makes sense for binary trees.\n\nGraphs. A graph consists of a set of nodes and a set of edges connecting the nodes. However, unlike our tree definition, we can have more than one path between nodes. Note that all trees are graphs. In CS 61B, we can assume all graphs are simple graphs (AKA no loops or parallel edges).\n\nDepth First Traversals. DFS for graphs is similar to DFS for trees, but since there are potential cycles within our graph, we add the constraint that each vertex should be visited at most once. This can be accomplished by marking nodes as visited and only visiting a node if it had not been marked as visited already.\n\n### C level #\n\n1. Question 1 from the Fall 2014 discussion worksheet.\n\n### B level #\n\n1. Question 4 from the Fall 2014 midterm.\n\n### A level #\n\n1. Question 7 from the guerrilla section worksheet #2 from Spring 2015.\nLast built: 2023-02-02 23:58 UTC"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.91503716,"math_prob":0.8586636,"size":1782,"snap":"2022-40-2023-06","text_gpt3_token_len":399,"char_repetition_ratio":0.1383577,"word_repetition_ratio":0.06514658,"special_character_ratio":0.22502805,"punctuation_ratio":0.12569833,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9630469,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T03:08:14Z\",\"WARC-Record-ID\":\"<urn:uuid:1629ac99-40aa-4853-9b8f-3bd4cb48cb19>\",\"Content-Length\":\"7013\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b931c8a9-b068-47de-9e9c-839ff422fb26>\",\"WARC-Concurrent-To\":\"<urn:uuid:b320073b-aab1-49d9-b82d-8952c1c2d4b1>\",\"WARC-IP-Address\":\"185.199.110.153\",\"WARC-Target-URI\":\"https://sp23.datastructur.es/materials/lectures/lec23/\",\"WARC-Payload-Digest\":\"sha1:EZQ5346DRGIGYWQU2TYWKTBTWGUGSENA\",\"WARC-Block-Digest\":\"sha1:PQQFBY7M333POS53CERWN7Y62DPMR56S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500042.8_warc_CC-MAIN-20230203024018-20230203054018-00732.warc.gz\"}"} |
https://malwareforum.com/index.php/2021/02/26/creating-serendipity-with-python/news/admin/ | [
"# Creating serendipity with Python",
null,
"",
null,
"We’ve been experimenting with breaking up employees into random groups (of size 4) and setting up video hangouts between them. We’re doing this to replace the serendipitous meetings that sometimes occur around coffee machines, in lunch lines or while waiting for the printer. And also, we just want people to get to know each other.\n\nWhich lead to me writing some code. The core of which is divide n elements into groups of at least size g minimizing the size of each group. So, suppose an office has 15 employees in it then it would be divided into three groups of sizes 5, 5, 5; if an office had 16 employees it would be 4, 4, 4, 4; if it had 17 employees it would be 4, 4, 4, 5 and so on.\n\nI initially wrote the following code (in Python):\n\n`````` groups = [g] * (n//g)\n\nfor e in range(0, n % g):\ngroups[e % len(groups)] += 1\n``````\n\nThe first line creates `n//g` (`//` is integer division) entries of size `g` (for example, if `g == 4` and `n == 17` then `groups == [4, 4, 4, 4]`). The `for` loop deals with the ‘left over’ parts that don’t divide exactly into groups of size `g`. If `g == 4` and `n == 17` then there will be one left over element to add to one of the existing `[4, 4, 4, 4]` groups resulting in `[5, 4, 4, 4]`.\n\nThe `e % len(groups)` is needed because it’s possible that there are more elements left over after dividing into equal sized groups than there are entries in `groups`. For example, if `g == 4` and `n == 11` then `groups` is initially set to `[4, 4]` with three left over elements that have to be distributed into just two entries in `groups`.\n\nSo, that code works and here’s the output for various sizes of `n` (and `g == 4`):\n\n`````` 4 \n5 \n6 \n7 \n8 [4, 4]\n9 [5, 4]\n10 [5, 5]\n11 [6, 5]\n12 [4, 4, 4]\n13 [5, 4, 4]\n14 [5, 5, 4]\n15 [5, 5, 5]\n16 [4, 4, 4, 4]\n17 [5, 4, 4, 4]\n``````\n\nBut the code irritated me because I felt there must be a simple formula to work out how many elements should be in each group. After noodling on this problem I decided to do something that’s often helpful… make the problem simple and naive, or, at least, the solution simple and naive, and so I wrote this code:\n\n`````` groups = * (n//g)\n\nfor i in range(n):\ngroups[i % len(groups)] += 1\n``````\n\nThis is a really simple implementation. I don’t like it because it loops `n` times but it helps visualize something. Imagine that `g == 4` and `n == 17`. This loop ‘fills up’ each entry in `groups` like this (each square is an entry in `groups` and numbers in the squares are values of `i` for which that entry was incremented by the loop).\n\nSo groups ends up being `[5, 4, 4, 4]`. What this helps see is that the number of times `groups[i]` is incremented depends on the number of times the `for` loop ‘loops around’ on the `i`th element. And that’s something that’s easy to calculate without looping.\n\nSo this means that the code is now simply:\n\n`````` groups = [1+max(0,n-(i+1))//(n//g) for i in range(n//g)]\n``````\n\nAnd to me that is more satisfying. `n//g` is the size of `groups` which makes the loop update each entry in `groups` once. Each entry is set to `1 + max(0, n-(i+1))//(n//g).` You can think of this as follows:\n\n1. The `1` is the first element to be dropped into each entry in `groups`.\n\n2. `max(0, n-(i+1))` is the number of elements left over once you’ve placed `1` in each of the elements of `groups` up to position `i`. It’s divided by `n//g` to work out how many times the process of sharing out elements (see the naive loop above) will loop around.\n\nIf #2 there isn’t clear, consider the image above and imagine we are computing `groups` (`n == 17` and `g == 4`). We place `1` in `groups` leaving 16 elements to share out. If you naively shared them out you’d loop around four times and thus need to add 16/4 elements to `groups`making it 5.\n\nMove on to `groups` and place a `1` in it. Now there are 15 elements to share out, that’s 15/4 (which is 3 in integer division) and so you place 4 in `groups`. And so on…\n\nAnd that solution pleases me most. It succinctly creates `groups` in one shot. Of course, I might have over thought this… and others might think the other solutions are clearer or more maintainable.\n\nGo to Source of this post\nAuthor Of this post: John Graham-Cumming"
]
| [
null,
"https://blog.cloudflare.com/content/images/2021/02/Coffee-chat.png",
null,
"https://blog.cloudflare.com/content/images/2021/02/Coffee-chat.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9007262,"math_prob":0.97711086,"size":4074,"snap":"2021-04-2021-17","text_gpt3_token_len":1188,"char_repetition_ratio":0.13316953,"word_repetition_ratio":0.03325123,"special_character_ratio":0.31001472,"punctuation_ratio":0.1083691,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98343325,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-16T01:49:56Z\",\"WARC-Record-ID\":\"<urn:uuid:0fbdf81c-c1cc-4c6a-be0f-3cc81a8fe13f>\",\"Content-Length\":\"67284\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:52b2b9f2-12cc-4cf1-a81d-9ad0f10a4051>\",\"WARC-Concurrent-To\":\"<urn:uuid:f6fb56c9-53fe-44bd-95da-3cff78b4e4b6>\",\"WARC-IP-Address\":\"148.72.152.192\",\"WARC-Target-URI\":\"https://malwareforum.com/index.php/2021/02/26/creating-serendipity-with-python/news/admin/\",\"WARC-Payload-Digest\":\"sha1:DKIEC67TESHKVJSRWI7VY53EV5PFYY7I\",\"WARC-Block-Digest\":\"sha1:JY46GZMVNUORLSMZP6FNVGU25VVBXZ36\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038088471.40_warc_CC-MAIN-20210416012946-20210416042946-00408.warc.gz\"}"} |
https://studylib.net/doc/5613914/aaa-8.4 | [
"# AAA 8.4",
null,
"```AAA 8.4\nSWLT: Use Interest formulas in Installment Buying\nFixed Installment Loans\n Amount Financed:\n The amount a borrower will pay interest on\n Amount Financed = Price of Item – Down Payment\n Total Installment Price:\n The total amount of money the borrow will eventually pay\n Total Installment Price = Sum of All Payments + Down Payment\n Finance Charge:\n The Interest Charged (Money not Percentage) for borrowing\nthe amount financed.\n Finance Charge = Total Installment Price – Price of Item\nCar Loan\n Cat bought a 2-year old Santa Fe\nfor \\$12,260. Her down payment\nwas \\$3,000 and she will have to\npay \\$231.50 per month for 4\nyears.\n Find the amount financed, the\ntotal installment price, and the\nfinance charge.\n Amount Financed\n Amount Financed =\n\\$12,260 - \\$3,000\n\\$9,260\n Total Installment Price =\n48 x \\$231.50 + \\$3,000\n\\$14,112.00\n Finance Charge =\n\\$14,112.00 – \\$12,260\n\\$1,852\nMonthly Payments\n A Young couple bought \\$9,000\nworth of furniture. The down\npayment was \\$1,000. The balance\nwas financed for 3 years at 8%\nsimple Interest.\na. Find the Amount Financed\nb. Find the Finance Charge\n(Interest)\nc. Find the total Installment Price\nd. Find the Monthly Payment\na. Amount Financed:\n\\$9,000 - \\$1,000 = \\$8,000\nb. Finance Charge: Simple\nInterest Formula\nI = \\$8,000(.08)(3) = \\$1,920\nc.\nTotal Installment Price\n\\$9,000 + \\$1,920 = \\$10,920\nd. Monthly Payment\n\\$9,920 ÷ 36 = \\$275.56\nAPR\nover the life of the loan, making the actual interest rate\nhigher than what was quoted\n Because this can be confusing, lenders are required by law\nto disclose the annual percentage rate (APR) in a table for\nconsumers to be able to effectively compare loans\nFinding APR\n Step 1: Find the finance charge per \\$100 borrowed\nFinanceCharge\nx100\nAmountFinanced\n Step 2: Find the row in the table marked with the number of\npayments and move to the right until you find the amount closest to\nthe number in Step 1\n Step 3: The APR (to the nearest half percent) is at the top of the\ncorresponding column\nBurk bought a printer for \\$600, he made a \\$50 down\npayment and financed the rest for 2 years with monthly\npayments of \\$24.75\n Step 1: Find finance charge per \\$100\n Total Amount (Not Including Down Payment) = \\$24.75 x 24 = \\$594\n Amount Financed = \\$600 - \\$50 = \\$550\n Finance Charge = \\$594 - \\$550 = \\$44\n\\$44\nx100 = \\$8.00\n\\$550\n Step 2: Find row for 24 Payments and move across until you find the\nnumber closest to \\$8.00\n Step 3: Move to the top, the APR is…\n7.5%\nPaying loans off early\n Paying loans off early is one way a lender can save\nmoney\n They will avoid paying all of the entire interest,\nunearned interest\n There are two methods used to find the unearned\ninterest:\n The Actuarial Method\n The Rule of 78\nThe Actuarial Method\nkRh\nu=\n100 + h\n u = Unearned Interest\n k = Number of payments remaining, excluding the current one\n R = Monthly Payment\n h = Finance Charge per \\$100 for a loan with the same APR (Table 8-1)\nand k monthly payments\nUsing the Actuarial Method\n Burk from slide #7 decides to pay off his laser printer\nearly, on his 12th payment.\n Find the unearned interest\n Find the payoff amount\nFinding the Unearned Interest\n(Actuarial Method)\n k = 12\n(Half the original payments remain)\n R = \\$24.75\n h = \\$4.11\n (The APR is 7.5% and payments\nare 12…the intersection of those\nrows and columns on the APR\nchart is \\$4.11)\n Formula:\nu=\nkRh\n100 + h\n(12)(24.75)(4.11)\nu=\n100 + 4.11\n1, 220.67\nu=\n»\n104.11\n11.72\nFinding the payoff\n The amount remaining minus the unearned interest.\n 13 x \\$24.75 - \\$11.72\n = \\$310.03\nThe Rule of 78\nfk(k +1)\nu=\nn(n +1)\n u = Unearned Interest\n k = Number of payments remaining, excluding the current one\n f = Finance Charge\n n = Original Number of Payments\nUsing the Rule of 78\n A \\$5,000 car loan is to be\npaid off in 36 monthly\ninstallments of \\$172. The\nborrower decides to pay the\nloan off after 24 payments.\n Total Payments = \\$172 x 36\n\\$6,192\n Finance Charge =\n\\$6,192 - \\$5,000 = \\$1,192\n Substitute into the Formula\n Find the Interest saved\n Find the Payoff amount\n 12 x \\$172 - \\$139.60 =\n\\$1924.40\nfk(k +1) 1,192(12)(12 +1)\nu=\n=\nn(n +1)\n36(36 +1)\n185, 952\n=\n»\n1,332\n\\$139.60\nComputing Credit Card Finance\nCharge: Unpaid Balance Method\n Elliot had an unpaid balance of\n\\$365.75 at the beginning of the\n\\$436.50, and made a payment of\n\\$200. The interest charged on\nthe unpaid balance is 1.8% per\nmonth.\n Find the Finance Charge.\n Find the next month’s balance.\n Step 1: Find the Finance Charge on\nthe unpaid balance using the\nsimple interest formula.\n I = Prt\n = (\\$365.75)(0.018)(1)\n = \\$6.42\n Step 2: New balance = Unpaid\nbalance + Finance Charge +\nPurchases – Payments\n \\$365.75 + \\$6.42 + \\$436.50 – 200\n = \\$608.67\n```"
]
| [
null,
"https://s2.studylib.net/store/data/005613914_1-b3afb1d7a7808966326de3610083edb3.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9102047,"math_prob":0.96675706,"size":4626,"snap":"2020-24-2020-29","text_gpt3_token_len":1264,"char_repetition_ratio":0.1713544,"word_repetition_ratio":0.023952097,"special_character_ratio":0.33873758,"punctuation_ratio":0.12397541,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9799775,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-06T17:05:29Z\",\"WARC-Record-ID\":\"<urn:uuid:3d171be4-f2ee-4b0d-a280-32623e2fd837>\",\"Content-Length\":\"65212\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9e2aeea6-d99b-4e02-8505-a4f23cfd363b>\",\"WARC-Concurrent-To\":\"<urn:uuid:253cc0fe-efb3-4133-968e-122bbf8042c5>\",\"WARC-IP-Address\":\"172.67.175.240\",\"WARC-Target-URI\":\"https://studylib.net/doc/5613914/aaa-8.4\",\"WARC-Payload-Digest\":\"sha1:W4PRKN5C6DEKGAZHXCLEBBMKX3R3KYX5\",\"WARC-Block-Digest\":\"sha1:RD7MAYB74FFFNMHQ3RXEH6L2IZOZXSAC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655881763.20_warc_CC-MAIN-20200706160424-20200706190424-00129.warc.gz\"}"} |
http://www.el-j.net/what-is-a-momentum-equation-physics/ | [
" What Is a Momentum Equation Physics? | 周南デリヘル求人情報サイト「エルジェイ」\n\nTOP風俗Q&A一覧風俗Q&A\n\n# Power physics is a term that is used to describe mechanics that relates to the physical aspects of moving objects\n\nThere are a number of terms in this area of study, such as kinetic energy, potential energy, and momentum equation physics. Each of these terms relate to moving objects with which a constant force acts on the object. Here is a look at each term.\n\nKinetic Energy is the amount of work that is done in terms of the energy of an object and the effort of the effort. The resistance to the motion of an object can be measured by the way write my essay in which that object moves. The energy is transferred from the object to the work that is required to move the object. The magnitude of the work is related to the speed of the object.\n\nWhat is a Period Physics? The period is https://cals.arizona.edu/cas/comment/reply/356/525917 a period that applies to an object during its lifetime. This time is a measurement of how long it takes for a certain amount of work to be done on the object.\n\nThe Momentum Equation relates into a definition of momentum and also this concept is what is called a momentum . This equation describes how the rate which occurs in a gravitational field changes a thing. The thing must simply take into consideration the size of the rate and the level to which it is spread.\n\nWhat is a Period Physics? Period physics is the description of an object that will apply to an object’s life. It describes the moment of inertia of an object that will remain consistent for that object’s lifetime.\n\nWhat is a Period Physics? Power physics is the study of physics that involves mechanical devices and how they operate. Power physics is the study of the mechanical theory of electrical devices.\n\nWhat is a Momentum Equation? The term momentum equation describes the relationship between an object’s acceleration and its momentum. This equation provides a measurement of the overall momentum of an object.\n\nWhat’s a Period Revive? Electrical power physics will be your study of physics the way in which they operate and that involves electric apparatus. Power physics is that the study of the mechanical principle of electrical apparatus.\n\nWhat is a Momentum Equation? The term momentum equation relates to a definition of momentum and this concept is what is called a momentum equation. This equation describes how the acceleration that occurs in a given gravitational field affects an object.\n\nWhat is a Momentum Equation? The term momentum equation relates to a definition of momentum and this concept is what is called a momentum equation. This equation provides a measurement of the essay-company com overall momentum of an object.\n\nWhat’s a Period Physics? Stage physics would be the explanation of an object that would employ into the life of an object span. It refers to the moment of inertia of an object that will continue being consistent for that particular object’s lifetime.\n\nWhat is a Period Physics? Power physics is the study of physics that involves mechanical devices and how they operate. Power physics is the study of the mechanical theory of electrical devices.\n\n≫風俗Q&A一覧",
null,
""
]
| [
null,
"http://www.el-j.net/wp-content/themes/responsive_241/img/top_back.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.94214916,"math_prob":0.96739674,"size":3095,"snap":"2020-24-2020-29","text_gpt3_token_len":594,"char_repetition_ratio":0.18505338,"word_repetition_ratio":0.27809525,"special_character_ratio":0.19192246,"punctuation_ratio":0.07337884,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970766,"pos_list":[0,1,2],"im_url_duplicate_count":[null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-01T14:03:24Z\",\"WARC-Record-ID\":\"<urn:uuid:502a7f37-1a70-48ce-bfb1-4d6ae7f5f3b1>\",\"Content-Length\":\"21311\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a9f0ce65-12f5-4b04-a5eb-81ee2a0fed36>\",\"WARC-Concurrent-To\":\"<urn:uuid:7de61ca9-876b-4f24-9599-d93f6d93511e>\",\"WARC-IP-Address\":\"210.134.59.59\",\"WARC-Target-URI\":\"http://www.el-j.net/what-is-a-momentum-equation-physics/\",\"WARC-Payload-Digest\":\"sha1:MLHE6F5XCDQFZBAJ62NBV24IEHWLBHMJ\",\"WARC-Block-Digest\":\"sha1:LZ2MRTRWOBC6AXLTDX2OBQHZ5DDCKIBT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347417746.33_warc_CC-MAIN-20200601113849-20200601143849-00078.warc.gz\"}"} |
https://docs.imandra.ai/imandra-docs/notebooks/region-probabilities/ | [
"# Region Probabilities¶\n\nIn this notebook we provide an introduction to the latest Imandra Tools module, Region_probs, which includes a small probabilistic programming library that allows users reason about Imandra Modelling Language (IML) models probabilistically. In particular, users can easily create custom hierarchical statistical models defining joint distributions over inputs to their programs or functions, then sample from these models to get a probability distribution over regions, or query them with Boolean conditions. Alternatively, a dataset in the form of a CSV file can be imported and used as a set of samples. In a later notebook we'll illustrate how these tools can be used to analyse and verify the fairness of decision-making algorithms, but here we'll keep things simple and just demonstrate the basic functionalities of the module.\n\n### Setup¶\n\nWe'll begin by opening the module and installing a pretty printer that will display a decimal version of the real numbers that we'll often be using in this notebook:\n\nIn :\nopen Imandra_tools.Region_probs;;\nlet pp_approx fmt r = CCFormat.fprintf fmt \"%s\" (Real.to_string_approx r) [@@program];;\n#install_printer pp_approx;;\n\nOut:\nval pp_approx : Format.formatter -> real -> unit = <fun>\n\n\nNote that the module's interface and type signatures can be found in the docs pages.\n\n### Basic Distributions¶\n\nThe Region_probs module contains 13 of the most common discrete and continuous univariate probability distributions which can be parameterised and then used directly. In particular, we support the following distributions:\n\n• Bernoulli\n• Beta\n• Binomial\n• Categorical\n• Cauchy\n• Exponential\n• Gamma\n• Guassian\n• Laplace\n• Logistic\n• LogNormal\n• Poisson\n• Uniform\n\nEach distribution has named parameters and can take an optional argument ~constraints which truncates the distribution to within the bounds specified by the constraint list. For example, we can define a Gaussian random variable x with mean 5 and standard deviation 1.3, that is restricted to the regions [2.5, 5] and [5.8, 10.3] as:\n\nIn :\nlet x = gaussian ~mu:5. ~sigma:1.3 ~constraints:[(2.5,5.); (5.8,10.3)] [@@program]\n\nOut:\nval x : unit -> real = <fun>\n\n\nWe then sample from the distribution to get a particular value by calling x with the unit argument ():\n\nIn :\nx ();;\nx ();;\nx ();;\n\nOut:\n- : real = 6.24032854584\n- : real = 3.67742661647\n- : real = 6.16262476123\n\n\n### Building Statistical Models¶\n\nUsing the basic univariate distributions above as building blocks we can create more complex custom joint distributions over inputs by generating samples sequentially. For example, let's define a distribution over some apples in a shop. Let's consider three kinds of apple, Braeburn, Granny_Smith, and Red_Delicious which are stocked in varying proportions. We can also suppose that their weights might be normally distributed according to their kind. Let's assume that each apple stays in the shop for a week at a time and that there is a 0.4 chance that any particular apple gets bought on a particular day. Then the number of days an apple has been in the shop can be modelled by a Binomial distribution. Finally, let's say that the apples tend to turn ripe quickly after 3 days, if they're not already ripe. Thus, a joint distribution over apples can be given as follows:\n\nIn :\ntype kind = Braeburn | Granny_Smith | Red_Delicious\n\ntype apple = { kind: kind;\nmass: Q.t;\ndays_old: Z.t;\nis_ripe: bool }\n\nlet apple_dist () =\nlet k = categorical ~classes:[Braeburn; Granny_Smith; Red_Delicious] ~probs:[0.25; 0.6; 0.15] () in\nlet mean_mass = function\n| Braeburn -> 85.\n| Granny_Smith -> 80.\n| Red_Delicious -> 100. in\nlet mu = mean_mass k in\nlet m = gaussian ~mu ~sigma:5. () in\nlet d_o = binomial ~n:7 ~p:0.4 () in\nlet ripe_chance days = if days >= 3 then 0.9 else 0.4 in\nlet p = ripe_chance d_o in\nlet i_r = bernoulli ~p () in\n{kind = k; mass = m; days_old = d_o; is_ripe = i_r} [@@program];;\n\napple_dist ();;\napple_dist ();;\napple_dist ();;\n\nOut:\ntype kind = Braeburn | Granny_Smith | Red_Delicious\ntype apple = { kind : kind; mass : real; days_old : Z.t; is_ripe : bool; }\nval apple_dist : unit -> apple = <fun>\n- : apple =\n{kind = Granny_Smith; mass = 87.8541616291; days_old = 2; is_ripe = false}\n- : apple =\n{kind = Granny_Smith; mass = 76.0184249847; days_old = 5; is_ripe = true}\n- : apple =\n{kind = Granny_Smith; mass = 83.3649215818; days_old = 2; is_ripe = true}\n\n\nIn general, distributions may be defined over abitrary groups of types, as long as they are outputted as tuples, in the end. For example, we could have a distribution over a list of fruits in a bowl and a distribution over the colour of the bowl, but the final output would be a tuple (fruits, bowl_colour) of type fruit list * colour.\n\n### Estimating Region Probabilities¶\n\nThere are two ways we can estimate region probabilities: the first is to sample from a model using a custom distribution (such as the one above), and the second is to use an existing dataset of samples whose distribution we might not be able easily write down. Given one of these we create a Distribution module which can then be used to get region probabilities, estimate Boolean queries, and save/load sample data. To estimate some region probabilities, we'll first need some regions! We'll right a simple function calculating the price, in pennies, of the apple then decompose it:\n\nIn :\nlet price apple =\nlet per_gram = function\n| Braeburn -> 0.4\n| Granny_Smith -> 0.35\n| Red_Delicious -> 0.3\nin let p = (per_gram apple.kind) *. apple.mass in\nif apple.days_old >= 5 then p /. 2. else p;;\n\nlet d = Modular_decomp.top ~prune:true \"price\" [@@program];;\n\nlet regions = Modular_decomp.get_concrete_regions d [@@program];;\n\nOut:\nval price : apple -> real = <fun>\nval d : Modular_decomp_intf.decomp_ref = <abstr>\nval regions : Top_result.modular_region list =\n[{Constraints:\n[apple.kind = Braeburn && apple.days_old >= 5]\nInvariant:\n(2/5 *. apple.mass) /. 2};\n{Constraints:\n[apple.kind = Granny_Smith &&\nnot (apple.kind = Braeburn) &&\napple.days_old >= 5]\nInvariant:\n(7/20 *. apple.mass) /. 2};\n{Constraints:\n[not (apple.kind = Granny_Smith) &&\nnot (apple.kind = Braeburn) &&\napple.days_old >= 5]\nInvariant:\n(3/10 *. apple.mass) /. 2};\n{Constraints:\n[apple.kind = Braeburn && not (apple.days_old >= 5)]\nInvariant:\n2/5 *. apple.mass};\n{Constraints:\n[apple.kind = Granny_Smith &&\nnot (apple.kind = Braeburn) &&\nnot (apple.days_old >= 5)]\nInvariant:\n7/20 *. apple.mass};\n{Constraints:\n[not (apple.kind = Granny_Smith) &&\nnot (apple.kind = Braeburn) &&\nnot (apple.days_old >= 5)]\nInvariant:\n3/10 *. apple.mass}]\n\nRegions details\n\nNo group selected.\n\n• Concrete regions are numbered\n• Unnumbered regions are groups whose children share a particular constraint\n• Click on a region to view its details\n• Double click on a region to zoom in on it\n• Shift+double click to zoom out\n• Hit escape to reset back to the top\ndecomp of (price apple\nReg_idConstraintsInvariant\n5\n• not (apple.kind = Granny_Smith)\n• not (apple.kind = Braeburn)\n• not (apple.days_old >= 5)\n3/10 *. apple.mass\n4\n• apple.kind = Granny_Smith\n• not (apple.kind = Braeburn)\n• not (apple.days_old >= 5)\n7/20 *. apple.mass\n3\n• apple.kind = Braeburn\n• not (apple.days_old >= 5)\n2/5 *. apple.mass\n2\n• not (apple.kind = Granny_Smith)\n• not (apple.kind = Braeburn)\n• apple.days_old >= 5\n(3/10 *. apple.mass) /. 2\n1\n• apple.kind = Granny_Smith\n• not (apple.kind = Braeburn)\n• apple.days_old >= 5\n(7/20 *. apple.mass) /. 2\n0\n• apple.kind = Braeburn\n• apple.days_old >= 5\n(2/5 *. apple.mass) /. 2\n\nNow we're in a position to calculate the probability mass of each region given our distribution above, or a separate dataset.\n\n#### Sampling Over Regions¶\n\nLet's first use our apple_dist distribution from above to create a Distribution module:\n\nIn :\nmodule Apple_S = Distribution.From_Sampler (struct type domain = apple let dist = apple_dist end) [@@program]\n\nOut:\nmodule Apple_S :\nsig\ntype domain = apple\nval get_probs :\nTop_result.modular_region list ->\n?assuming:string ->\n?n:Z.t ->\n?d:string ->\n?step_function:(domain -> domain) ->\n?num_steps:Z.t ->\nunit -> (int, float * Top_result.modular_region) Hashtbl.t\nval query :\n(domain -> bool) ->\n?n:Z.t ->\n?d:string -> ?max_std_err:real -> ?precision:Z.t -> unit -> unit\nval save : string -> ?n:Z.t -> ?d:domain list -> unit -> unit\nval load : string -> domain list\nend\n\n\nNow we can find the probabilities using the get_probs function, which takes the regions and the following optional arguments:\n\n• n: The number of samples to be generated for calculating probabilities (only applies when using From_Sampler, default value is 10000)\n• d: The file name of the dataset of samples to be imported (only applies when using From_Data)\n• step_function: If the distribution is over the initial value of some type x and we have a function val f: x -> x that we are decomposing that acts a step in some transition system for x, then we can apply this step function to x multiple times before calculating region probabilities\n• num_steps: The number of times to apply the step function, if given\nIn :\nlet apple_probs_S = Apple_S.get_probs regions () [@@program]\n\nOut:\nval g___1 : apple -> int = <fun>\n- : unit = ()\nval apple_probs_S : (int, float * Top_result.modular_region) Hashtbl.t =\n<abstr>\n\n\nProbabilities can be printed using the print_probs function, which takes the hashtable of region probabilities outputted by get_probs and the following optional arguments:\n\n• precision: The number of decimal places that probabalities are displayed to (default is 4)\n• full_support: Whether or not to list regions that have probability 0 or not (default is false)\n• verbose: Whether or not to print out a description of the region, including constraints and the invariant, alongside the probabilities (default is false)\nIn :\nprint_probs apple_probs_S ~verbose:true\n\nOut:\nRegion Probabilities---[region]---\nIndex: 2\nProbability: 0.0134\nConstraints:\n[ apple.kind = Red_Delicious\n; apple.days_old >= 5 ]\nInvariant:\nF = (apple.mass * 3/10) / 2\n-------------\n---[region]---\nIndex: 3\nProbability: 0.2234\nConstraints:\n[ apple.kind = Braeburn\n; apple.days_old < 5 ]\nInvariant:\nF = apple.mass * 2/5\n-------------\n---[region]---\nIndex: 5\nProbability: 0.1360\nConstraints:\n[ apple.kind = Red_Delicious\n; apple.days_old < 5 ]\nInvariant:\nF = apple.mass * 3/10\n-------------\n---[region]---\nIndex: 4\nProbability: 0.5436\nConstraints:\n[ apple.kind = Granny_Smith\n; apple.days_old < 5 ]\nInvariant:\nF = apple.mass * 7/20\n-------------\n---[region]---\nIndex: 0\nProbability: 0.0244\nConstraints:\n[ apple.kind = Braeburn\n; apple.days_old >= 5 ]\nInvariant:\nF = (apple.mass * 2/5) / 2\n-------------\n---[region]---\nIndex: 1\nProbability: 0.0592\nConstraints:\n[ apple.kind = Granny_Smith\n; apple.days_old >= 5 ]\nInvariant:\nF = (apple.mass * 7/20) / 2\n-------------\n\n- : unit = ()\n\n\n#### Datasets Over Regions¶\n\nUsing a dataset to estimate probabilities is very similar to the procedure above, although as a CSV stores strings as opposed to types we need to include a couple of functions mapping each row (a list of strings) to our data type:\n\nIn :\nlet to_apple apple_string =\nlet k = match CCList.nth apple_string 0i with\n| \"bb\" -> Braeburn\n| \"gs\" -> Granny_Smith\n| \"rd\" -> Red_Delicious\n| _ -> failwith \"Apple type is not bb, gs, or rd\" in\nlet m = Q.of_string (CCList.nth apple_string 1i) in\nlet d_o = Z.of_string (CCList.nth apple_string 2i) in\nlet i_r = if CCList.nth apple_string 3i = \"1\" then true else false in\n{kind = k; mass = m; days_old = d_o; is_ripe = i_r} [@@program];;\n\nlet from_apple apple =\nlet k = match apple.kind with\n| Braeburn -> \"bb\"\n| Granny_Smith -> \"gs\"\n| Red_Delicious -> \"rd\" in\nlet m = Q.to_string apple.mass in\nlet d_o = Z.to_string apple.days_old in\nlet i_r = if apple.is_ripe then \"1\" else \"0\" in\n[k; m; d_o; i_r] [@@program];;\n\nOut:\nval to_apple : string list -> apple = <fun>\nval from_apple : apple -> string list = <fun>\n\n\nWith these two functions (and out apple type) we can define a model based on some data apple.csv and then use it just as we did with our previous model. Note that we load and save data from/into CSV files with data models, but as byte files with sampling models. Note that this final line is non-executable in this notebook, as we don't actually ahve access to the local CSV file\n\nIn :\nmodule Apple_D = Distribution.From_Data (struct\ntype domain = apple\nlet from_domain = from_apple\nlet to_domain = to_apple\nend) [@@program];;\n\nOut:\nmodule Apple_D :\nsig\ntype domain = apple\nval get_probs :\nTop_result.modular_region list ->\n?assuming:string ->\n?n:Z.t ->\n?d:string ->\n?step_function:(domain -> domain) ->\n?num_steps:Z.t ->\nunit -> (int, float * Top_result.modular_region) Hashtbl.t\nval query :\n(domain -> bool) ->\n?n:Z.t ->\n?d:string -> ?max_std_err:real -> ?precision:Z.t -> unit -> unit\nval save : string -> ?n:Z.t -> ?d:domain list -> unit -> unit\nval load : string -> domain list\nend\n\nlet apple_probs_D = Apple_D.get_probs regions ~d:\"apple.csv\" () [@@program];;\n\n### Estimating Query Probabilities¶\n\nThe last feature we'll introduce in this notebook is the query function which, given a statistical model, estimates how likely it is for a particular Boolean query to hold over an instance from that distribution. query takes in a Boolean function over the domain (representing some condition) and the following optional arguments:\n\n• n: The number of samples to be generated for calculating probabilities (only applies when using From_Sampler, default value is 10000)\n• d: The file name of the dataset of samples to be imported (only applies when using From_Data)\n• max_std_err: If estimating the probability by generating samples we can improve our estimate to within this optional bound on the standard error by taking more samples\n• precision: The number of decimal places that probabalities are displayed to (default is 4)\n\nLet's begin by writing a simple query, then calculate its probability:\n\nIn :\nlet rip_off (a : apple) = (price a) >=. 30. && not a.is_ripe\n\nOut:\nval rip_off : apple -> bool = <fun>\n\n\n#### Sampling Queries¶\n\nIn :\nApple_S.query rip_off ~n:30000 ()\n\nOut:\nProbability: 0.1196 ± 0.0019\n- : unit = ()\n\n\n#### Dataset Queries¶\n\nNote once again that as we don't have access to apple.csv from this notebook, the following code is non-executable here:\n\nApple_D.query rip_off ~d:\"apple.csv\" ()\n\n### Optional: Changing the Pseudo-Random Number Generator¶\n\nSampling in the Region_probs module relies on access to a Pseudo-Random Number Generator (PRNG) that can produce uniform samples from the range [0,1). Presently we support three PRNGs which can be changed according to the user's preferences, although in practice this should make little difference. The different PRNGs are:\n\n• RS: OCaml's standard PRNG using module Random.State\n• GSL: GNU Scientific Library's Mersenne Twister PRNG using module Gsl.Rng\n\nRS is the default option. The PRNG can be checked and changed using the get_prng and set_prng functions as follows:\n\nIn :\nget_prng ();;\nset_prng GSL\n\nOut:\nRS: OCaml's standard PRNG using module Random.State\n- : unit = ()\n- : unit = ()"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.72289807,"math_prob":0.9679283,"size":14287,"snap":"2022-40-2023-06","text_gpt3_token_len":3782,"char_repetition_ratio":0.13834628,"word_repetition_ratio":0.17906575,"special_character_ratio":0.2901939,"punctuation_ratio":0.18601134,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98959136,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-27T05:38:43Z\",\"WARC-Record-ID\":\"<urn:uuid:b4d0cf11-48a0-4222-9f88-061e56f0c945>\",\"Content-Length\":\"402383\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d714b0ce-14c5-46b0-88b6-4fbe5b0abd1a>\",\"WARC-Concurrent-To\":\"<urn:uuid:f7aa7576-21fd-46d1-86de-97169a6de312>\",\"WARC-IP-Address\":\"185.199.110.153\",\"WARC-Target-URI\":\"https://docs.imandra.ai/imandra-docs/notebooks/region-probabilities/\",\"WARC-Payload-Digest\":\"sha1:7EFHG3C34OQX44SONU7VEDLOQ2HU6LGF\",\"WARC-Block-Digest\":\"sha1:GSBDDLWXS4JCY76WQXX5MQTPV4F4WKE7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764494936.89_warc_CC-MAIN-20230127033656-20230127063656-00077.warc.gz\"}"} |
https://www-mathtutor.com/www-math-algebra/trinomials/solve-algebra-problems.html | [
"FreeAlgebra Tutorials!",
null,
"",
null,
"",
null,
"Home Elimination Using Multiplication Prime Factors Equations Involving Rational Exponents Working with Percentages and Proportions Rational Expressions Interval Notation and Graphs Simplifying Complex Fractions Dividing Whole Numbers with Long Division Solving Compound Linear Inequalities Raising a Quotient to a Power Solving Rational Equations Solving Inequalities Adding with Negative Numbers Quadratic Inequalities Dividing Monomials Using the Discriminant in Factoring Solving Equations by Factoring Subtracting Polynomials Cube Root The Quadratic Formula Multiply by the Reciprocal Relating Equations and Graphs for Quadratic Functions Multiplying a Polynomial by a Monomial Calculating Percentages Solving Systems of Equations using Substitution Comparing Fractions Solving Equations Containing Rational Expressions Factoring Polynomials Negative Rational Exponents Roots and Radicals Intercepts Given Ordered Pairs and Lines Factoring Polynomials Solving Linear Inequalities Powers Mixed Expressions and Complex Fractions Solving Equations by Multiplying or Dividing The Addition Method Finding the Equation of an Inverse Function Solving Compound Linear Inequalities Multiplying and Dividing With Square Roots Exponents and Their Properties Equations as Functions http: Factoring Trinomials Solving Quadratic Equations by Completing the Square Dividing by Decimals Lines and Equations Simplifying Complex Fractions Graphing Solution Sets for Inequalities Standard Form for the Equation of a Line Fractions Checking Division with Multiplication Elimination Using Addition and Subtraction Complex Fractions Multiplication Property of Equality Solving Proportions Using Cross Multiplication Product and Quotient of Functions Adding Quadratic Functions Conjugates Factoring Solving Compound Inequalities Operating with Complex Numbers Equivalent Fractions Changing Improper Fractions to Mixed Numbers Multiplying by a Monomial Solving Linear Equations and Inequalities Graphically Dividing Polynomials by Monomials Multiplying Cube Roots Operations with Monomials Properties of Exponents Percents Arithmetics Mixed Numbers and Improper Fractions Equations Quadratic in Form Simplifying Square Roots That Contain Whole Numbers Dividing a Polynomial by a Monomial Writing Numbers in Scientific Notation Solutions to Linear Equations in Two Variables Solving Linear Inequalities Multiplying Two Mixed Numbers with the Same Fraction Special Fractions Solving a Quadratic Inequality Parent and Family Graphs Solving Equations with a Fractional Exponent Evaluating Trigonometric Functions Solving Equations Involving Rational Expressions Polynomials Laws of Exponents Multiplying Polynomials Vertical Line Test http: Solving Inequalities with Fractions and Parentheses http: Multiplying Polynomials Fractions Solving Quadratic and Polynomial Equations Extraneous Solutions Fractions\n\nTry the Free Math Solver or Scroll down to Tutorials!\n\n Depdendent Variable\n\n Number of equations to solve: 23456789\n Equ. #1:\n Equ. #2:\n\n Equ. #3:\n\n Equ. #4:\n\n Equ. #5:\n\n Equ. #6:\n\n Equ. #7:\n\n Equ. #8:\n\n Equ. #9:\n\n Solve for:\n\n Dependent Variable\n\n Number of inequalities to solve: 23456789\n Ineq. #1:\n Ineq. #2:\n\n Ineq. #3:\n\n Ineq. #4:\n\n Ineq. #5:\n\n Ineq. #6:\n\n Ineq. #7:\n\n Ineq. #8:\n\n Ineq. #9:\n\n Solve for:\n\n Please use this form if you would like to have this math solver on your website, free of charge. Name: Email: Your Website: Msg:\n\nsolve algebra problems\nRelated topics:\nsecond order differential equation in matlab | examples of linear equations if 5k = 55 what is the value of k | simple way to learnalgebra made easy | 9th grade algebra practice free | radicaal form and square roots | finding the perfect circle for x squared-4x=4 | fraction and square root | Unlike Decimals | free math taks practice | variable expression calculator | Free Rational Expression Solver | how to write decimal as a mixed number\n\nAuthor Message\nNold 0f Dhi Lanjards",
null,
"Registered: 09.01.2004\nFrom: cheeseland",
null,
"Posted: Thursday 28th of Dec 12:45 Hello Friends , I am desperately in need of help for clearing my maths exam that is nearing. I really do not intend to resort to the guidance of private teachers and web coaching since they prove to be quite pricey . Could you recommend a perfect teaching utility that can support me with learning the principles of College Algebra. Particularly, I need help on logarithms and powers.\nAllejHat",
null,
"Registered: 16.07.2003\nFrom: Odense, Denmark",
null,
"Posted: Friday 29th of Dec 20:49 It always feels good when I hear that students are willing to put that extra punch into their studies. solve algebra problems is not a very complex subject and you can easily do some initial work yourself. As a useful tool, I would advise that you get a copy of Algebrator. This program is quite handy when doing math yourself.\nGog",
null,
"Registered: 07.11.2001\nFrom: Austin, TX",
null,
"Posted: Sunday 31st of Dec 07:54 Some teachers really don’t know how to explain that well. Luckily, there are softwares like Algebrator that makes a great substitute teacher for algebra subjects. It might even be better than a real teacher because it’s more accurate and faster !\nwinsonatol",
null,
"Registered: 03.07.2005\nFrom: St.Helens, UK",
null,
"Posted: Monday 01st of Jan 10:08 Sounds like something I need to purchase right away. Any links for buying this program over the internet?\nJot",
null,
"Registered: 07.09.2001\nFrom: Ubik",
null,
"Posted: Monday 01st of Jan 17:24 I am most apologetic. I should have included the link in my first message: http://www.www-mathtutor.com/percents.html. I don't know about a trial copy , but the legitimate owners of Algebrator, as opposed to other suppliers of imitation software , offer up a complete refund guarantee . Thus , anyone can buy the original copy, test the software program and return it if you are not content by the operation and features. Even though I believe you're gonna love this software , I am very interested in hearing from anyone if there is a feature for which the software does not function . I don't wish to recommend Algebrator for something it can't do . However the next deficiency discovered will in all probability be the first one!\nAshe",
null,
"Registered: 08.07.2001\nFrom:",
null,
"Posted: Wednesday 03rd of Jan 11:07 hypotenuse-leg similarity, radical equations and angle suplements were a nightmare for me until I found Algebrator, which is truly the best math program that I have ever come across. I have used it frequently through several algebra classes – Intermediate algebra, Pre Algebra and Remedial Algebra. Simply typing in the algebra problem and clicking on Solve, Algebrator generates step-by-step solution to the problem, and my math homework would be ready. I really recommend the program.\n All Right Reserved. Copyright 2005-2007"
]
| [
null,
"https://www-mathtutor.com/www-math-algebra/trinomials/images/list_l.jpg",
null,
"https://www-mathtutor.com/www-math-algebra/trinomials/images/list_r.jpg",
null,
"https://www-mathtutor.com/www-math-algebra/trinomials/images/arrow_1.jpg",
null,
"https://www-mathtutor.com/images/avatars/1054.gif",
null,
"https://www-mathtutor.com/images/forum/icon_minipost.gif",
null,
"https://www-mathtutor.com/images/avatars/199.jpg",
null,
"https://www-mathtutor.com/images/forum/icon_minipost.gif",
null,
"https://www-mathtutor.com/images/avatars/235.gif",
null,
"https://www-mathtutor.com/images/forum/icon_minipost.gif",
null,
"https://www-mathtutor.com/images/avatars/none.png",
null,
"https://www-mathtutor.com/images/forum/icon_minipost.gif",
null,
"https://www-mathtutor.com/images/avatars/none.png",
null,
"https://www-mathtutor.com/images/forum/icon_minipost.gif",
null,
"https://www-mathtutor.com/images/avatars/338.gif",
null,
"https://www-mathtutor.com/images/forum/icon_minipost.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.92307824,"math_prob":0.9030644,"size":3440,"snap":"2019-13-2019-22","text_gpt3_token_len":840,"char_repetition_ratio":0.10651921,"word_repetition_ratio":0.026490066,"special_character_ratio":0.2511628,"punctuation_ratio":0.12937595,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96955174,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-26T01:51:45Z\",\"WARC-Record-ID\":\"<urn:uuid:42021e88-11ae-4662-9e59-27b91d64d622>\",\"Content-Length\":\"126663\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c7e840a6-3ab1-40bf-a17c-00cc48f18f19>\",\"WARC-Concurrent-To\":\"<urn:uuid:08b827d3-1138-4225-8118-ff6b34ff4888>\",\"WARC-IP-Address\":\"54.197.228.212\",\"WARC-Target-URI\":\"https://www-mathtutor.com/www-math-algebra/trinomials/solve-algebra-problems.html\",\"WARC-Payload-Digest\":\"sha1:Y3U6KFJPIMW6RET4EQALT33DZV6RSH6T\",\"WARC-Block-Digest\":\"sha1:DQPI2AU7QBZ6XCEYHNKKYAOJSTROWFTV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912204768.52_warc_CC-MAIN-20190326014605-20190326040605-00245.warc.gz\"}"} |
https://www.mathssciencecorner.com/2019/05/maths-std-10-chapter-03.html | [
"Maths Std 10 Chapter 03 - Maths Science Corner\n\n# Maths Science Corner\n\nMath and Science for all competitive exams\n\n# Textbook Chapter\n\nOn maths science corner you can now download new NCERT 2019 Gujarati Medium Textbook Standard 10 (Class 10) Maths Chapter 03 Dwichal Surekh Samikaran (Pair of Linear Equation in Two Variables) Textbook Chapter in pdf form for your easy reference.\n\nOn Maths Science Corner you will get all the printable study material of Maths and Science Including answers of prayatn karo, Swadhyay, Chapter Notes, Unit tests, Online Quiz etc..\n\nThis material is very helpful for preparing Competitive exam like Tet 1, Tet 2, Htat, tat for secondary and Higher secondary, GPSC etc..\n\nHighlight of the chapter\n\n3.1 Introduction\n\n3.2 Pair of Linear Equations in Two variables\n\n3.3 Graphical Method of Solution of a pair of linear equations in two variables\n\n3.4 Algebraic methods of solving a a pair of linear equations in two variables\n\n3.4.1 Substitution method\n\n3.4.2 Elimination method\n\n3.4.3 Cross - multiplication method\n\n3.5 Equations reducible to a pair of linear equations in two variables\n\n3.6 Summary\n\nYou will be able to learn above topics in Chapter 03 of Maths Standard 10 (Class 10) Textbook chapter.\n\nToday Maths Science Corner is giving you the textbook Chapter 03 of Maths Standard 10 (Class 10) in pdf format for your easy reference.\n\nMaths Std 10 Chapter 03\n\nYou can get Std 6 Material from here.\n\nYou can get Std 7 Material from here.\n\nYou can get Std 8 Material from here.\n\nYou can get Std 10 Material from here.\n\n#### 1 comment:\n\n1.",
null,
""
]
| [
null,
"https://www.blogger.com/img/blogger_logo_round_35.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.75805414,"math_prob":0.58735937,"size":1211,"snap":"2022-05-2022-21","text_gpt3_token_len":305,"char_repetition_ratio":0.13338856,"word_repetition_ratio":0.11675127,"special_character_ratio":0.2328654,"punctuation_ratio":0.11297071,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970032,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-26T17:48:13Z\",\"WARC-Record-ID\":\"<urn:uuid:56b4cec2-1949-47a0-ad08-aa522f3a6ffe>\",\"Content-Length\":\"143342\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b296253a-eea7-4f2c-844e-a3e7b103ae4a>\",\"WARC-Concurrent-To\":\"<urn:uuid:281fe899-0c06-4b4e-a1be-34ea80eddb4b>\",\"WARC-IP-Address\":\"172.253.122.121\",\"WARC-Target-URI\":\"https://www.mathssciencecorner.com/2019/05/maths-std-10-chapter-03.html\",\"WARC-Payload-Digest\":\"sha1:EJWFFQ3467CQY5F2YOLBIRCQCEEO3A2I\",\"WARC-Block-Digest\":\"sha1:PVJL47PSI6UIAETB5C6T7GRTNYVUWOUP\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662619221.81_warc_CC-MAIN-20220526162749-20220526192749-00476.warc.gz\"}"} |
https://www.hackmath.net/en/math-problem/3527 | [
"# Slope\n\nFind the slope of the line: x=t and y=1+t.\n\nCorrect result:\n\nk = 1\n\n#### Solution:",
null,
"We would be pleased if you find an error in the word problem, spelling mistakes, or inaccuracies and send it to us. Thank you!\n\nShowing 1 comment:",
null,
"Math student\nThank you",
null,
"## Next similar math problems:\n\n• Perpendicular",
null,
"What is the slope of the perpendicular bisector of line segment AB if A[9,9] and B[9,-2]?\n• Angle of two lines",
null,
"There is a regular quadrangular pyramid ABCDV; | AB | = 4 cm; height v = 6 cm. Determine the angles of lines AD and BV.\n• Supplementary angles",
null,
"One of the supplementary angles are three times larger than the other. What size is larger of supplementary angles?\n• Slope",
null,
"What is the slope of a line with an inclination 6.06 rad?\n• Slope RR",
null,
"A line has a rise of 2 and a run of 11. What is the slope?\n• Rhombus MATH",
null,
"Construct a rhombus M A T H with diagonal MT=4cm, angle MAT=120°\n• Dodecagon",
null,
"Calculate the size of the smaller of the angles determined by lines A1 A4 and A2 A10 in the regular dodecagon A1A2A3. .. A12. Express the result in degrees.\n• Acute triangle",
null,
"In the acute triangle KLM, V is the intersection of its heights and X is the heel of height to the side KL. The axis of the angle XVL is parallel to the side LM and the angle MKL is 70°. What size are the KLM and KML angles?\n• Angle",
null,
"A straight line p given by the equation ?. Calculate the size of angle in degrees between line p and y-axis.\n• Clock face",
null,
"clock face is given. Numbers 10 and 5, and 3 and 8 are connected by straight lines. Calculate the size of their angles.\n• Brick wall",
null,
"Garden 70 m long and 48 m wide should surround with wall 2.1 meters high and 30 cm thick. Wall will be built on the garden ground. How many will we need bricks if to 1 m³ is required approximately 300 bricks?\n• Right angled triangle 2",
null,
"LMN is a right angled triangle with vertices at L(1,3), M(3,5) and N(6,n). Given angle LMN is 90° find n\n• Find the 10",
null,
"Find the value of t if 2tx+5y-6=0 and 5x-4y+8=0 are perpendicular, parallel, what angle does each of the lines make with the x-axis, find the angle between the lines?\n• Interior angles",
null,
"In a quadrilateral ABCD, whose vertices lie on some circle, the angle at vertex A is 58 degrees and the angle at vertex B is 134 degrees. Calculate the sizes of the remaining interior angles.\n• Cuboid diagonal",
null,
"Calculate the volume and surface area of the cuboid ABCDEFGH, which sides abc has dimensions in the ratio of 9:3:8 and if you know that the wall diagonal AC is 86 cm and angle between AC and the body diagonal AG is 25 degrees.\n• Cork and swimming",
null,
"If a person weighs 80 kg, how many kilograms of cork must take swimming belt to use it to float on water? The density of the human body is 1050kg/m3 and cork 300kg/m3. (Instructions: Let the human body and cork on a mixture that has a density of 1000kg/m3\n• Tower",
null,
"How many m2 of copper plate should be to replace roof of the tower conical shape with diameter 24 m and the angle at the vertex of the axial section is 144°?"
]
| [
null,
"https://www.hackmath.net/img/27/slope_1.png",
null,
"https://www.hackmath.net/hashover/images/avatar.png",
null,
"https://www.hackmath.net/hashover/images/avatar.png",
null,
"https://www.hackmath.net/thumb/1/t_701.jpg",
null,
"https://www.hackmath.net/thumb/7/t_8407.jpg",
null,
"https://www.hackmath.net/thumb/7/t_1607.jpg",
null,
"https://www.hackmath.net/thumb/13/t_613.jpg",
null,
"https://www.hackmath.net/thumb/62/t_1162.jpg",
null,
"https://www.hackmath.net/thumb/81/t_5181.jpg",
null,
"https://www.hackmath.net/thumb/91/t_26691.jpg",
null,
"https://www.hackmath.net/thumb/51/t_33851.jpg",
null,
"https://www.hackmath.net/thumb/34/t_1334.jpg",
null,
"https://www.hackmath.net/thumb/54/t_1854.jpg",
null,
"https://www.hackmath.net/thumb/49/t_4549.jpg",
null,
"https://www.hackmath.net/thumb/6/t_5306.jpg",
null,
"https://www.hackmath.net/thumb/31/t_8331.jpg",
null,
"https://www.hackmath.net/thumb/41/t_24041.jpg",
null,
"https://www.hackmath.net/thumb/81/t_1081.jpg",
null,
"https://www.hackmath.net/thumb/63/t_2463.jpg",
null,
"https://www.hackmath.net/thumb/89/t_889.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.88331324,"math_prob":0.98733276,"size":2918,"snap":"2020-45-2020-50","text_gpt3_token_len":794,"char_repetition_ratio":0.14172958,"word_repetition_ratio":0.0035714286,"special_character_ratio":0.26696366,"punctuation_ratio":0.09936909,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994561,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40],"im_url_duplicate_count":[null,2,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-27T15:07:07Z\",\"WARC-Record-ID\":\"<urn:uuid:ed300024-3db1-4418-94e9-f5ce0b47ce70>\",\"Content-Length\":\"36878\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:860acb48-6d6a-4142-a254-afff67e6132a>\",\"WARC-Concurrent-To\":\"<urn:uuid:75453db5-50e5-42df-acee-2bfdc90385a3>\",\"WARC-IP-Address\":\"172.67.143.236\",\"WARC-Target-URI\":\"https://www.hackmath.net/en/math-problem/3527\",\"WARC-Payload-Digest\":\"sha1:BAKWM3VQSSR25T3PGSRCN2QV7MVZ2D23\",\"WARC-Block-Digest\":\"sha1:R4OC33YMYXFY66WPBN36AOREVVWWWOTE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107894203.73_warc_CC-MAIN-20201027140911-20201027170911-00118.warc.gz\"}"} |
https://runestone.academy/runestone/books/published/pythonds/Graphs/KnightsTourAnalysis.html | [
"# 8.14. Knight’s Tour Analysis¶\n\nThere is one last interesting topic regarding the knight’s tour problem, then we will move on to the general version of the depth first search. The topic is performance. In particular, knightTour is very sensitive to the method you use to select the next vertex to visit. For example, on a five-by-five board you can produce a path in about 1.5 seconds on a reasonably fast computer. But what happens if you try an eight-by-eight board? In this case, depending on the speed of your computer, you may have to wait up to a half hour to get the results! The reason for this is that the knight’s tour problem as we have implemented it so far is an exponential algorithm of size $$O(k^N)$$, where N is the number of squares on the chess board, and k is a small constant. Figure 12 can help us visualize why this is so. The root of the tree represents the starting point of the search. From there the algorithm generates and checks each of the possible moves the knight can make. As we have noted before the number of moves possible depends on the position of the knight on the board. In the corners there are only two legal moves, on the squares adjacent to the corners there are three and in the middle of the board there are eight. Figure 13 shows the number of moves possible for each position on a board. At the next level of the tree there are once again between 2 and 8 possible next moves from the position we are currently exploring. The number of possible positions to examine corresponds to the number of nodes in the search tree.",
null,
"Figure 12: A Search Tree for the Knight’s Tour",
null,
"Figure 13: Number of Possible Moves for Each Square\n\nWe have already seen that the number of nodes in a binary tree of height N is $$2^{N+1}-1$$. For a tree with nodes that may have up to eight children instead of two the number of nodes is much larger. Because the branching factor of each node is variable, we could estimate the number of nodes using an average branching factor. The important thing to note is that this algorithm is exponential: $$k^{N+1}-1$$, where $$k$$ is the average branching factor for the board. Let’s look at how rapidly this grows! For a board that is 5x5 the tree will be 25 levels deep, or N = 24 counting the first level as level 0. The average branching factor is $$k = 3.8$$ So the number of nodes in the search tree is $$3.8^{25}-1$$ or $$3.12 \\times 10^{14}$$. For a 6x6 board, $$k = 4.4$$, there are $$1.5 \\times 10^{23}$$ nodes, and for a regular 8x8 chess board, $$k = 5.25$$, there are $$1.3 \\times 10^{46}$$. Of course, since there are multiple solutions to the problem we won’t have to explore every single node, but the fractional part of the nodes we do have to explore is just a constant multiplier which does not change the exponential nature of the problem. We will leave it as an exercise for you to see if you can express $$k$$ as a function of the board size.\n\nLuckily there is a way to speed up the eight-by-eight case so that it runs in under one second. In the listing below we show the code that speeds up the knightTour. This function (see Listing 4), called orderbyAvail will be used in place of the call to u.getConnections in the code previously shown above. The critical line in the orderByAvail function is line 10. This line ensures that we select the vertex to go next that has the fewest available moves. You might think this is really counter productive; why not select the node that has the most available moves? You can try that approach easily by running the program yourself and inserting the line resList.reverse() right after the sort.\n\nThe problem with using the vertex with the most available moves as your next vertex on the path is that it tends to have the knight visit the middle squares early on in the tour. When this happens it is easy for the knight to get stranded on one side of the board where it cannot reach unvisited squares on the other side of the board. On the other hand, visiting the squares with the fewest available moves first pushes the knight to visit the squares around the edges of the board first. This ensures that the knight will visit the hard-to-reach corners early and can use the middle squares to hop across the board only when necessary. Utilizing this kind of knowledge to speed up an algorithm is called a heuristic. Humans use heuristics every day to help make decisions, heuristic searches are often used in the field of artificial intelligence. This particular heuristic is called Warnsdorff’s algorithm, named after H. C. Warnsdorff who published his idea in 1823.\n\nListing 4\n\n 1 2 3 4 5 6 7 8 9 10 11 def orderByAvail(n): resList = [] for v in n.getConnections(): if v.getColor() == 'white': c = 0 for w in v.getConnections(): if w.getColor() == 'white': c = c + 1 resList.append((c,v)) resList.sort(key=lambda x: x) return [y for y in resList]"
]
| [
null,
"https://runestone.academy/runestone/books/published/pythonds/_images/8arrayTree.png",
null,
"https://runestone.academy/runestone/books/published/pythonds/_images/moveCount.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9119896,"math_prob":0.99293107,"size":4773,"snap":"2019-43-2019-47","text_gpt3_token_len":1160,"char_repetition_ratio":0.12413504,"word_repetition_ratio":0.010452962,"special_character_ratio":0.24575739,"punctuation_ratio":0.09054326,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98445505,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-11T22:22:54Z\",\"WARC-Record-ID\":\"<urn:uuid:dfc82c9c-4879-4afa-af14-1d76b036dd9c>\",\"Content-Length\":\"40522\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c3eee517-064e-41a0-b1a0-7917eeb07fba>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc96d305-4371-4f13-8b22-643de239cc9f>\",\"WARC-IP-Address\":\"198.211.98.70\",\"WARC-Target-URI\":\"https://runestone.academy/runestone/books/published/pythonds/Graphs/KnightsTourAnalysis.html\",\"WARC-Payload-Digest\":\"sha1:AKMFHF4N4QEM4LJXL6HBNVPXUQZXQ5RH\",\"WARC-Block-Digest\":\"sha1:JTV2XDUFCWZ7GXFDIMBEPHKDEREXSVHG\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496664439.7_warc_CC-MAIN-20191111214811-20191112002811-00021.warc.gz\"}"} |
https://chemistry.stackexchange.com/questions/21860/a-misunderstanding-about-the-energy-profile-of-reactions-with-a-catalyst-involve | [
"# A misunderstanding about the energy profile of reactions with a catalyst involved\n\nAll of us are aware of the importance of the catalysts in bio-chemistry. For a high school learner like me, catalysts ,and therefore, enzymes play a bridge-like role that connect high school bio to high school chemistry.\n\nYet, I got baffled about the two common energy profiles drawn for an anonymous reaction with a presence of a catalyst. The question may seem rudimentary, I agree, but the possible answers to my question were too technical for me to understand.\nOne of the energy profiles had several curves in the pathway for $E$, and the other one has only one curve in the pathway where the catalyst should have affected.",
null,
"",
null,
"My guess is that the first energy profile is about a net change in $E_\\mathrm{a}$ but the second one demonstrates the reality when an exothermic reaction occurs.\nNow, here are the questions:\n\n• Why are the two energy profiles different? Please be as if you're teaching thermo-chemistry to a little kid!\n• Why do those curves occur in the latter energy profile and is there a way to know how many of those curves will occur in the presence of a catalyst?\n\nImage credits: chemwiki.ucdavis.edu (page here) and wiki (page here).\n\nThe upper graph is just the most simple way to visualize the effect of a catalyst on a reaction $\\ce{S -> P}$:\n\nThe activation energy is lowered.\n\nThe activation energy for the reaction in that direction is the difference of the energies of the starting material $S$ and a transition state $TS^\\#$.\n\nSince it is the same starting marterial in the presence or absence of the catalyst, the energy of the transition state is different.\n\nCan the same transition state have two different energies - just through the remote distance magical action of a catalyst located somewhere? Probably not!\n\nIt is much more plausible that - in the absence and presence of a catalyst - two completely different (different in structure and different in energy) transition states are involved.\n\nExactly this situation is described in the second graph!\n\nThe catalyst \"reacts\" with the starting material, either by forming a covalent bond, by hydrogen bonding, etc. and thus opens a different reaction channel with different intermediates and a transition state not found in in the non-catalyzed reaction.\n\nIn the end, the same product $P$ is formed and the catalyst is regenerated, but this doesn't mean that the catalyst wasn't heavily involved in the reaction going on.\n\n1# Curve 1 is just for a simple case where it's showing the comparison between a theoretical pathway for a catalyzed and non-catalyzed reaction but it has an another significant which I will discuss in part two.\n2# How many of these curves can occur: Infinite (Theoretically) but in practical case you have to consider all types of possible elementary reaction in your model. An elementary reaction is a reaction which can occur in one step or the reactant, product and TS has well defined position on potential energy surface. For example if you have a simple ketone hydrogenation reaction, you can get an overall energy profile for gas phase reaction but on a catalytic surface there are lots of possibilities. At first the ketone and hydrogen will adsorb on the surface and then 1st hydrogen addition can occur either on C of the ketone group or on the hydrogen of the ketone group. They are intuitively main reaction pathway but there can be much more.",
null,
"In the above image I was working on LA hydrogenation and you can see there are two different pathway for the hydrogenation and there might be some other more pathway. And if you want to capture the real chemistry you have to make sure you are including all important intermediates. So your energy profile may look like this",
null,
"Here the picture becomes quite complicated with lots of elementary reaction. To determine the overall activation energy of a catalyzed reaction scientists follow two methods\nmethod-1: Energetic span theory: Given by Shaik et al. I am adding the link to that paper here, http://pubs.acs.org/doi/ipdf/10.1021/ar1000956\n\n2) Apparent activation barrier: This is an age old method. Here the sensitivity of turn over frequency (TOF) with the change of temperature is measured and defined as apparent activation barrier. $$E_a=-R\\frac{\\delta~ln(TOF)}{\\delta(\\frac{1}{T})}$$\n\nNow you can plot the first E profile with your gas phase activation energy and apparent activation energy of the catalyzed reaction.\n\nA reaction involving more than one elementary step has one or more intermediates being formed which, in turn, means there is more than one energy barrier to overcome. In other words, there is more than one transition state lying on the reaction pathway. As it is intuitive that pushing over an energy barrier or passing through a transition state peak would entail the highest energy, it becomes clear that it would be the slowest step in a reaction pathway. However, when more than one such barrier is to be crossed, it becomes important to recognize the highest barrier which will determine the rate of the reaction. This step of the reaction whose rate determines the overall rate of reaction is known as rate determining step or rate limiting step. The height of energy barrier is always measured relative to the energy of the reactant or starting material. Different possibilities have been shown in figure 6\n\nFrom the link you gave on energy profile i found this. Basically there is no \"net change\" in $E_{a}$ . In the first graph in question the curve which is at the top is the representing how the reaction proceeds without a catalyst and the one below is of the reaction with catalyst. In the second graph there are 4 intermediate reactions/transition states before the product is formed. Hence you have 4 peaks of different activation energy as shown.\n\nA catalyst basically provides alternate routes to a reaction by forming the \"transition/metastable/intermediate state at a lower energy than the original reaction. You will study later that this has to do with basic Collision theory and molecular dynamics.\n\nIn the given graphs a catalyst can make the R->P through just one route where only one transition happens (as in the graph 1) or for 4(or even more) transition states (as in the graph 2). For one set of conditions(P,T,V etc) I am guessing the number of these peaks will be unique. It is also possible that for a certain catalyst and reactant the number of peaks / intermediate states is constant."
]
| [
null,
"https://i.stack.imgur.com/i333c.png",
null,
"https://i.stack.imgur.com/lHWH3.png",
null,
"https://i.stack.imgur.com/O1WW4.jpg",
null,
"https://i.stack.imgur.com/R6pTI.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.95787084,"math_prob":0.9181039,"size":1150,"snap":"2023-40-2023-50","text_gpt3_token_len":247,"char_repetition_ratio":0.12565444,"word_repetition_ratio":0.0,"special_character_ratio":0.2078261,"punctuation_ratio":0.0969163,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95005643,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-02T00:02:54Z\",\"WARC-Record-ID\":\"<urn:uuid:f033fd9c-2831-42e2-948c-c34c2294fbc7>\",\"Content-Length\":\"184320\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:19c8ab81-4127-4990-b81e-5816611bd2d0>\",\"WARC-Concurrent-To\":\"<urn:uuid:1c23014b-5e2e-4db7-b932-27b0244187e8>\",\"WARC-IP-Address\":\"172.64.144.30\",\"WARC-Target-URI\":\"https://chemistry.stackexchange.com/questions/21860/a-misunderstanding-about-the-energy-profile-of-reactions-with-a-catalyst-involve\",\"WARC-Payload-Digest\":\"sha1:OAPKNJSIW4VXRJLFFSQ22WSRIYFILOFG\",\"WARC-Block-Digest\":\"sha1:KL72M4R5W2V4COGPX3CM3RKRVOXJE62L\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100308.37_warc_CC-MAIN-20231201215122-20231202005122-00593.warc.gz\"}"} |
https://ch.mathworks.com/matlabcentral/cody/problems/42976-iteration-of-n-blank-spot/solutions/961657 | [
"Cody\n\n# Problem 42976. iteration of N blank spot\n\nSolution 961657\n\nSubmitted on 7 Sep 2016 by Jan Orwat\nThis solution is locked. To view this solution, you need to provide a solution of the same size or smaller.\n\n### Test Suite\n\nTest Status Code Input and Output\n1 Pass\nx = 1; y_correct = 2; assert(isequal(your_fcn_name(x),y_correct)) x = 5; y_correct = 32; assert(isequal(your_fcn_name(x),y_correct)) x = 8; y_correct = 256; assert(isequal(your_fcn_name(x),y_correct)) x = 11; y_correct = 2048; assert(isequal(your_fcn_name(x),y_correct)) x = 16; y_correct = 65536; assert(isequal(your_fcn_name(x),y_correct))"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.61259854,"math_prob":0.9976348,"size":703,"snap":"2020-10-2020-16","text_gpt3_token_len":216,"char_repetition_ratio":0.1788269,"word_repetition_ratio":0.0,"special_character_ratio":0.314367,"punctuation_ratio":0.1496063,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99501294,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-03-30T14:41:42Z\",\"WARC-Record-ID\":\"<urn:uuid:86eba646-39d9-404c-bd15-81571a9673bc>\",\"Content-Length\":\"71734\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f54fbee9-0527-4241-afbf-866865a1bb61>\",\"WARC-Concurrent-To\":\"<urn:uuid:020e2173-47ff-4852-ada1-02f710ab4d70>\",\"WARC-IP-Address\":\"104.110.193.39\",\"WARC-Target-URI\":\"https://ch.mathworks.com/matlabcentral/cody/problems/42976-iteration-of-n-blank-spot/solutions/961657\",\"WARC-Payload-Digest\":\"sha1:DGX4P5PSTPFCLAO4MBZ2E6SKBHSWX5XA\",\"WARC-Block-Digest\":\"sha1:BGA6VHVCW235BULHMUWY5E4FJDMPYCKO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370497042.33_warc_CC-MAIN-20200330120036-20200330150036-00538.warc.gz\"}"} |
https://www.colorhexa.com/1569d2 | [
"# #1569d2 Color Information\n\nIn a RGB color space, hex #1569d2 is composed of 8.2% red, 41.2% green and 82.4% blue. Whereas in a CMYK color space, it is composed of 90% cyan, 50% magenta, 0% yellow and 17.6% black. It has a hue angle of 213.3 degrees, a saturation of 81.8% and a lightness of 45.3%. #1569d2 color hex could be obtained by blending #2ad2ff with #0000a5. Closest websafe color is: #0066cc.\n\n• R 8\n• G 41\n• B 82\nRGB color chart\n• C 90\n• M 50\n• Y 0\n• K 18\nCMYK color chart\n\n#1569d2 color description : Strong blue.\n\n# #1569d2 Color Conversion\n\nThe hexadecimal color #1569d2 has RGB values of R:21, G:105, B:210 and CMYK values of C:0.9, M:0.5, Y:0, K:0.18. Its decimal value is 1403346.\n\nHex triplet RGB Decimal 1569d2 `#1569d2` 21, 105, 210 `rgb(21,105,210)` 8.2, 41.2, 82.4 `rgb(8.2%,41.2%,82.4%)` 90, 50, 0, 18 213.3°, 81.8, 45.3 `hsl(213.3,81.8%,45.3%)` 213.3°, 90, 82.4 0066cc `#0066cc`\nCIE-LAB 45.517, 16.506, -60.552 16.991, 14.914, 62.952 0.179, 0.157, 14.914 45.517, 62.762, 285.248 45.517, -23.445, -92.224 38.619, 10.951, -69.615 00010101, 01101001, 11010010\n\n# Color Schemes with #1569d2\n\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #d27e15\n``#d27e15` `rgb(210,126,21)``\nComplementary Color\n• #15c8d2\n``#15c8d2` `rgb(21,200,210)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #2015d2\n``#2015d2` `rgb(32,21,210)``\nAnalogous Color\n• #c8d215\n``#c8d215` `rgb(200,210,21)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #d21f15\n``#d21f15` `rgb(210,31,21)``\nSplit Complementary Color\n• #69d215\n``#69d215` `rgb(105,210,21)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #d21569\n``#d21569` `rgb(210,21,105)``\n• #15d27e\n``#15d27e` `rgb(21,210,126)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #d21569\n``#d21569` `rgb(210,21,105)``\n• #d27e15\n``#d27e15` `rgb(210,126,21)``\n• #0e468c\n``#0e468c` `rgb(14,70,140)``\n• #1052a4\n``#1052a4` `rgb(16,82,164)``\n• #135dbb\n``#135dbb` `rgb(19,93,187)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #1975e8\n``#1975e8` `rgb(25,117,232)``\n• #3083ea\n``#3083ea` `rgb(48,131,234)``\n• #4791ed\n``#4791ed` `rgb(71,145,237)``\nMonochromatic Color\n\n# Alternatives to #1569d2\n\nBelow, you can see some colors close to #1569d2. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #1598d2\n``#1598d2` `rgb(21,152,210)``\n• #1589d2\n``#1589d2` `rgb(21,137,210)``\n• #1579d2\n``#1579d2` `rgb(21,121,210)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #1559d2\n``#1559d2` `rgb(21,89,210)``\n``#154ad2` `rgb(21,74,210)``\n``#153ad2` `rgb(21,58,210)``\nSimilar Colors\n\n# #1569d2 Preview\n\nThis text has a font color of #1569d2.\n\n``<span style=\"color:#1569d2;\">Text here</span>``\n#1569d2 background color\n\nThis paragraph has a background color of #1569d2.\n\n``<p style=\"background-color:#1569d2;\">Content here</p>``\n#1569d2 border color\n\nThis element has a border color of #1569d2.\n\n``<div style=\"border:1px solid #1569d2;\">Content here</div>``\nCSS codes\n``.text {color:#1569d2;}``\n``.background {background-color:#1569d2;}``\n``.border {border:1px solid #1569d2;}``\n\n# Shades and Tints of #1569d2\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #01070e is the darkest color, while #fbfdff is the lightest one.\n\n• #01070e\n``#01070e` `rgb(1,7,14)``\n• #031020\n``#031020` `rgb(3,16,32)``\n• #051932\n``#051932` `rgb(5,25,50)``\n• #072243\n``#072243` `rgb(7,34,67)``\n• #092b55\n``#092b55` `rgb(9,43,85)``\n• #0a3467\n``#0a3467` `rgb(10,52,103)``\n• #0c3c79\n``#0c3c79` `rgb(12,60,121)``\n• #0e458b\n``#0e458b` `rgb(14,69,139)``\n• #104e9d\n``#104e9d` `rgb(16,78,157)``\n• #1157ae\n``#1157ae` `rgb(17,87,174)``\n• #1360c0\n``#1360c0` `rgb(19,96,192)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #1772e4\n``#1772e4` `rgb(23,114,228)``\n• #257ce9\n``#257ce9` `rgb(37,124,233)``\n• #3787eb\n``#3787eb` `rgb(55,135,235)``\n• #4992ed\n``#4992ed` `rgb(73,146,237)``\n• #5b9cef\n``#5b9cef` `rgb(91,156,239)``\n• #6ca7f0\n``#6ca7f0` `rgb(108,167,240)``\n• #7eb2f2\n``#7eb2f2` `rgb(126,178,242)``\n• #90bcf4\n``#90bcf4` `rgb(144,188,244)``\n• #a2c7f6\n``#a2c7f6` `rgb(162,199,246)``\n• #b4d2f7\n``#b4d2f7` `rgb(180,210,247)``\n• #c6ddf9\n``#c6ddf9` `rgb(198,221,249)``\n• #d7e7fb\n``#d7e7fb` `rgb(215,231,251)``\n• #e9f2fd\n``#e9f2fd` `rgb(233,242,253)``\n• #fbfdff\n``#fbfdff` `rgb(251,253,255)``\nTint Color Variation\n\n# Tones of #1569d2\n\nA tone is produced by adding gray to any pure hue. In this case, #6e7379 is the less saturated color, while #0367e4 is the most saturated one.\n\n• #6e7379\n``#6e7379` `rgb(110,115,121)``\n• #657282\n``#657282` `rgb(101,114,130)``\n• #5c718b\n``#5c718b` `rgb(92,113,139)``\n• #537094\n``#537094` `rgb(83,112,148)``\n• #4a6f9d\n``#4a6f9d` `rgb(74,111,157)``\n• #416ea6\n``#416ea6` `rgb(65,110,166)``\n• #396dae\n``#396dae` `rgb(57,109,174)``\n• #306cb7\n``#306cb7` `rgb(48,108,183)``\n• #276bc0\n``#276bc0` `rgb(39,107,192)``\n• #1e6ac9\n``#1e6ac9` `rgb(30,106,201)``\n• #1569d2\n``#1569d2` `rgb(21,105,210)``\n• #0c68db\n``#0c68db` `rgb(12,104,219)``\n• #0367e4\n``#0367e4` `rgb(3,103,228)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #1569d2 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.51148313,"math_prob":0.70245236,"size":3700,"snap":"2020-10-2020-16","text_gpt3_token_len":1672,"char_repetition_ratio":0.122835495,"word_repetition_ratio":0.011111111,"special_character_ratio":0.5664865,"punctuation_ratio":0.23634337,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9882037,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-23T14:55:51Z\",\"WARC-Record-ID\":\"<urn:uuid:35aceaaf-1ac2-4c57-acc4-010f7bad2b6e>\",\"Content-Length\":\"36297\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0eb83938-5908-4d9d-970e-a1d8e80266a6>\",\"WARC-Concurrent-To\":\"<urn:uuid:7b18fed6-b40f-4abe-8016-ca9e05329959>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/1569d2\",\"WARC-Payload-Digest\":\"sha1:K7O76P2N5VXS3POTIFBR72NGPV7AUEB4\",\"WARC-Block-Digest\":\"sha1:P7T6URY5WVVDVH6ABHBDQNKZI7WPDLDJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145774.75_warc_CC-MAIN-20200223123852-20200223153852-00287.warc.gz\"}"} |
https://openeuphoria.org/forum/m/137267.wc | [
"### Re: sdl2 and ffi\n\nHi\n\nThere's a rule in there somewhere isn't there.\n\nWhen the C library accepts pass by value you can pass the parameter as a sequence, eg\n\n```public constant RL_VECTOR2 = define_c_type({\nC_FLOAT, -- x // Vector x component\nC_FLOAT -- y // Vector y component\n})\n\nconstant xGetScreenToWorld2D = define_c_func( raylib, \"+GetScreenToWorld2D\", {RL_VECTOR2,RL_CAMERA2D}, RL_VECTOR2 )\n--Vector2 GetScreenToWorld2D(Vector2 position, Camera2D camera); // Get the world space position for a 2d camera screen space position\n\npublic function GetScreenToWorld2D( sequence position, sequence camera )\nreturn c_func( xGetScreenToWorld2D, {position,camera} )\nend function\n```\n\nHowever, when the C library accepts pass by reference, you must use the pointer to the structure as a parameter, eg\n\n```public constant SDL_Rect = define_c_type({\nC_INT, --x\nC_INT, --y\nC_INT, --w\nC_INT --h\n})\n\n--to illustrate the 2 ways of filling the structure\na = allocate_struct(SDL_Rect)\nb = allocate_struct(SDL_Rect, {30,70,10,10})\n\npoke4(a, {20,30,50,50} )\n\nexport constant xSDL_HasIntersection = define_c_func(sdl,\"+SDL_HasIntersection\",{SDL_Rect,SDL_Rect},C_BOOL)\n--SDL_bool SDL_HasIntersection(const SDL_Rect * A, const SDL_Rect * B);\n\npublic function SDL_HasIntersection(atom a,atom b)\n--a and b pointers to the SDL_RECT structures, already filled with values poked into the allocated memory blocks\nreturn c_func(xSDL_HasIntersection,{a,b})\nend function\n\n```\n\nDoes that look ok to add to some documentation?\n\nChris"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6233371,"math_prob":0.9365404,"size":1531,"snap":"2023-40-2023-50","text_gpt3_token_len":402,"char_repetition_ratio":0.115913555,"word_repetition_ratio":0.019607844,"special_character_ratio":0.2697583,"punctuation_ratio":0.15662651,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9641276,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-05T18:45:59Z\",\"WARC-Record-ID\":\"<urn:uuid:97a1c603-0ef4-49e1-ac9d-51780f0c7eca>\",\"Content-Length\":\"12398\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:41b770b2-f272-4fe1-9f44-6fb3a1036c1e>\",\"WARC-Concurrent-To\":\"<urn:uuid:7e8b4d73-3b4c-4441-addf-d6f8ede2c010>\",\"WARC-IP-Address\":\"23.138.32.173\",\"WARC-Target-URI\":\"https://openeuphoria.org/forum/m/137267.wc\",\"WARC-Payload-Digest\":\"sha1:72AM7XUEQQITXX6MNYAI2W5D5IUM5PYE\",\"WARC-Block-Digest\":\"sha1:EP6OAY5SLG2KT7TI7PM4HTH2KJKXUHVG\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100555.27_warc_CC-MAIN-20231205172745-20231205202745-00472.warc.gz\"}"} |
https://segmentfault.com/a/1190000022425900?utm_source=tag-newest | [
"",
null,
"# 基于 HTML5 WebGL 的 CPU 监控系统\n\n- PC",
null,
"-移动端",
null,
"Demo 中的场景是由 2D 和 3D 结合搭建而成,移动端的左上数据框部分显示的是手机陀螺仪数据,仅在移动端开启陀螺仪时显示。\n\n-判断页面打开设备",
null,
"",
null,
"``````isMobile() {\n}``````\n\n-动画原理\n\n``````ht.Default.startAnim({\nduration: 500, // 动画周期毫秒数\neasing: function (t) {}, // 动画缓动函数\naction: function (v, t) {…} // 动画过程属性变化\nfinishFunc: function () {} // 动画结束后调用的函数\n});``````\n\n-旋转 180度并抬高视角",
null,
"3D 场景中的视角是由 eye (相机位置) 和 center (目标位置) 决定的,因此视角的变化改变这两个参数即可,本 Demo 使用 HT 内置的 moveCamera 方法实现。动画采用圆的参数方程计算 eye 的 x 值和 z 值,完成 180 度的旋转。在旋转过程中半径和角度都随着 t 的变化而变化,通过 ( t – 0.5 ) * Math.PI 使得角度变化范围为 [ - Math.PI / 2, Math.PI / 2] 。圆的参数方程如下所示:",
null,
"``````// 旋转 180 度并抬高视角\nstartRotationAnimation(onFinish) {\nlet that = this;\nlet r = 849\nht.Default.startAnim({\nduration: 6000,\neasing: function (t) { return t; },\naction: function (v, t) { // 圆的参数方程 半径和角度都在变\nlet r1 = (1 - t) * r;\nlet angle = (t - 0.5) * Math.PI;\nlet x = r1 * Math.cos(angle);\nlet z = r1 * Math.sin(angle);\nlet y = 126 + (1968 - 126) * t * t * t;\nthat.g3d.moveCamera([x, y, z]);\n},\nfinishFunc: function () {\nif (!onFinish) {\nreturn;\n}\nonFinish.call(that);\n}\n});\n}``````\n\n``````ht.Default.callLater(() => { this.startCap1Animation(); }, this, null, 500);\nht.Default.callLater(() \\=> { this.startCap2Animation(); }, this, null, 1000);``````\n\n-视角切换\n\n``````// 视角切换\nstartMoveAngle3AnimationPC(onFinish) {\nlet startPos = this.g3d.getEye();\nlet endPos = [0, 728, 661];\nlet that = this;\nht.Default.startAnim({\nduration: 2000,\neasing: function (t) { return t * t; },\naction: function (v, t) {\nlet x, y, z;\nx = startPos + (endPos - startPos) * t;\ny = startPos + (endPos - startPos) * t;\nz = startPos + (endPos - startPos) * t;\nthat.g3d.moveCamera([x, y, z]);\n},\nfinishFunc: function () {…}\n});\n}``````\n\n- CPU外壳隐藏动画",
null,
"``````easing: function (t) { return t * t; },\naction: function (v, t) {\nlet val = start + (end - start) * t; // start: 起始 y 坐标;end: 终止 y 坐标\nthat.hide1.setElevation(val);\n}\nfinishFunc: function () {\nthat.hide1.s('3d.visible', false);\n}``````\n\n-芯片冒出及呼吸灯渲染",
null,
"``````action: function (v, t) {\nlet e = start1Y + (end1Y - start1Y) * t\nthat.up1.setElevation(e);\n}``````\n\n``````easing: easing.easeBothStrong,\naction: function (v, t) {\nlet val = 255 - (255 - endBlend) * t;\nval = val.toFixed(0);\nlet blend = 'rgb(' + val + ',' + val + ',' + val + ')';\nlet opacity = startOpa + (endOpa - startOpa) * t\nthat.blend.s('shape3d.blend', blend);\nthat.opacity.s('shape3d.opacity', opacity); }\n``````\n\n``````easeBothStrong: function (t) {\nreturn (t *= 2) < 1 ?\n.5 * t * t * t * t :\n.5 * (2 - (t -= 2) * t * t * t);\n}``````\n\n- PC端结束动画",
null,
"``````startAnimation() {\nsetInterval(() => { this.uvOffset = this.uvOffset + this.uvSpeed; this.line.s('top.uv.offset', [-this.uvOffset, 0]); // 线的流动\nthis.rotationAngle = this.rotationSpeed + this.rotationAngle; this.flagReflection.setRotationY(this.rotationAngle); // 点位地面旋转\n}, 16.7);\n}``````\n\nHTML5 提供了几个 DOM 事件来获得移动端方向及运动的信息,deviceorientation 提供设备的物理方向信息;devicemotion 提供设备的加速度信息。\n\n- 处理方向 (orientation) 事件\n\n``````window.addEventListener('deviceorientation', (e) => { this.onOrientationEvent(e);\n});``````\n\norientation 事件中 3 个重要值:",
null,
"``````onOrientationEvent(e) {\nlet alpha, beta, gamma, compass;\nlet compassFlag = true;\nalpha = e.alpha ? e.alpha : 0;\nbeta = e.beta ? e.beta : 0;\ngamma = e.gamma ? e.gamma : 0;\n}\n``````\n\n-处理移动 (Motion) 事件\n\n``````window.addEventListener('devicemotion', (e) => {\nthis.dataTextarea.s('2d.visible', true); this.onMotionEvent(e);\n\n});\n``````",
null,
"``````onMotionEvent(e) {\nlet MAX1 = 2;\nlet MAX2 = 5; this.acceleration = e.acceleration.x ? e.acceleration : {\nx: 0,\ny: 0,\nz: 0 }; this.accGravity = e.accelerationIncludingGravity.x ? e.accelerationIncludingGravity : {\nx: 0,\ny: 0,\nz: 0 }; this.rotationRate = e.rotationRate.alpha ? e.rotationRate : {\nalpha: 0,\nbeta: 0,\ngamma: 0 }; this.interval = e.interval;\n\n}``````\n\n##### hightopo\n\nHT for WebEverything you need to create cutting-edge 2D and 3D visualization\n\n2330 人关注\n207 篇文章"
]
| [
null,
"https://assets.segmentfault.com/v-5fc4b0b2/global/img/static/touch-icon.png",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null,
"https://cdn.segmentfault.com/v-5fc4b0fa/global/img/squares.svg",
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.7505552,"math_prob":0.98310477,"size":6004,"snap":"2020-45-2020-50","text_gpt3_token_len":3301,"char_repetition_ratio":0.11016667,"word_repetition_ratio":0.08730159,"special_character_ratio":0.28947368,"punctuation_ratio":0.23966943,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9890515,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-02T22:52:26Z\",\"WARC-Record-ID\":\"<urn:uuid:0b4d26d0-47fa-46d8-9d13-b617e623d27b>\",\"Content-Length\":\"51244\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ea20d64e-6cec-4646-9746-dbc8d5e59cfa>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8f4b48a-8acf-48e7-baaf-798e2238d1b9>\",\"WARC-IP-Address\":\"47.94.236.96\",\"WARC-Target-URI\":\"https://segmentfault.com/a/1190000022425900?utm_source=tag-newest\",\"WARC-Payload-Digest\":\"sha1:7F2DRG4XG6KQX7UEIVNBDMRBIG2A7UTH\",\"WARC-Block-Digest\":\"sha1:ORKDXYOVGST474SA2IIA3DKUEK6PO5PY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141716970.77_warc_CC-MAIN-20201202205758-20201202235758-00399.warc.gz\"}"} |
https://blender.stackexchange.com/questions/185496/how-to-unwrap-a-mesh-from-view-in-python-blender-2-8 | [
"# How to unwrap a mesh from view in python. blender 2.8\n\nHy All\n\nIm a blender noob trying to get a font texturised in blender. Thats how i plan to do it:\n\n• create the font (is a curve)\n• convert the curve to mesh\n• uv_unwrap the mesh from view (i need just plain unwrapping, since its 2d)\n• render\n\nSo far all works except the unwrap which leaves me with a horridly distorted mapping of the image.\n\nmyFontCurve = bpy.data.curves.new(type=\"FONT\",name=\"font\")\nmyFontOb = bpy.data.objects.new(\"myFontOb\",myFontCurve)\n\nmyFontOb.data.body = \"my text\"\n\n# Set Material\nmat = bpy.data.materials['Material'] #Material Nodes Settings are done in gui\n# We use nodes here...\nmat.use_nodes = True\nbackgroundfile = \"pathtoaffile.jpg\"\n\n# Assign Material to Object\nif myFontOb.data.materials:\nmyFontOb.data.materials = mat\nelse:\nmyFontOb.data.materials.append(mat)\n\nbpy.data.objects[\"myFontOb\"].uv.project_from_view(orthographic=False, correct_aspect=True, clip_to_bounds=False, scale_to_bounds=False)\n\n# Render the letter\noutput = \"path to file.jpg\"\nbpy.context.scene.render.filepath = output\nbpy.ops.render.render(write_still = True)\n\n\nMy attempt to do so with unwrap_from_view fail with \"'Object' object has no attribute 'uv'\".\n\nLike i said, im a rookie and help would be very much appreciated.\n\nIf somebody could point me in the right direction, that would be awesome.\n\nThanks you\n\nUse the mesh coords\n\nThe issue with your script is you are mixing objects and operators.\n\nHere is the autocomplete of the project from view operator in the console.\n\n>>> bpy.ops.uv.project_from_view(\nproject_from_view()\nbpy.ops.uv.project_from_view(orthographic=False, camera_bounds=True, correct_aspect=True, clip_to_bounds=False, scale_to_bounds=False)\nProject the UV vertices of the mesh as seen in current 3D view\n\n\nTrying with C.object.uv. will throw same error as in question since an object has no property uv.\n\nAt issue with operators that use the view is they are designed to be run from within that view (it has context) via a button or menu item. Using in script will often require passing an override context or other dicking around, however for this would simply write the UV directly from the mesh coordinates.\n\nTo convert the context object to a mesh\n\n>>> bpy.ops.object.convert(\nconvert()\nbpy.ops.object.convert(target='MESH', keep_original=False, angle=1.22173, thickness=5, seams=False, faces=True, offset=0.01)\nConvert selected objects to another type\n\n\nSo with a curve object as context object\n\n>>> bpy.ops.object.convert(target='MESH')\n{'FINISHED'}\n\n\neg this can be called directly after adding the font object and setting its body text.\n\nUsing the mesh coordinates\n\nThe UV operator template in Text Editor > Templates > Python > Operator UV adds a UV that is pretty much an orthogonal projection from above as it uses the x and y vertex coordinate as UV.\n\nHere I've tweaked it to normalize the U and V to 0, 1 range. To have same aspect would scale by the minimum of the X and Y range.",
null,
"import bpy\nimport bmesh\nimport numpy as np\nfrom mathutils import Matrix\n\ndef main(obj):\nme = obj.data\nbm = bmesh.new()\nbm.from_mesh(me)\n#bm = bmesh.from_edit_mesh(me)\nx, y, z = np.array([v.co for v in bm.verts]).T\nS = Matrix.Diagonal(\n( 1 / (x.max() - x.min()),\n1 / (y.max() - y.min()))\n)\nuv_layer = bm.loops.layers.uv.verify()"
]
| [
null,
"https://i.stack.imgur.com/mqn1F.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5776616,"math_prob":0.55152583,"size":1443,"snap":"2023-40-2023-50","text_gpt3_token_len":368,"char_repetition_ratio":0.13203613,"word_repetition_ratio":0.0,"special_character_ratio":0.23146223,"punctuation_ratio":0.21201414,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96176976,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-05T23:31:08Z\",\"WARC-Record-ID\":\"<urn:uuid:7d8a4bb0-0847-4e8b-8d39-ed77c0cf83c4>\",\"Content-Length\":\"147020\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4614c0f2-c582-4cb8-a270-f3035a25ffbe>\",\"WARC-Concurrent-To\":\"<urn:uuid:f302e2c8-20a2-43e2-9efe-8d0c079875ac>\",\"WARC-IP-Address\":\"104.18.43.226\",\"WARC-Target-URI\":\"https://blender.stackexchange.com/questions/185496/how-to-unwrap-a-mesh-from-view-in-python-blender-2-8\",\"WARC-Payload-Digest\":\"sha1:YRT3Q45R64PGCN4XCRVQ5KNRPH2MGQOY\",\"WARC-Block-Digest\":\"sha1:NQVXPARIJYAO4MBM7JO66DVBW4XJLVCC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100568.68_warc_CC-MAIN-20231205204654-20231205234654-00694.warc.gz\"}"} |
https://www.jiskha.com/questions/585762/find-the-exact-values-of-the-six-trig-functions-of-the-angle-750-sin-750-cos-750 | [
"# trig\n\nfind the exact values of the six trig functions of the angle.\n\n-750\n\nsin(-750)=\n\ncos(-750)=\n\ntan(-750)=\n\ncsc(-750)=\n\nsec(-750)=\n\ncot(-750)=\n\nI've tried this question over and over again and i cannot get it right. i believe -750 is in the fourth quadrant but I'm not sure. can someone solve this question for me. thanks!\n\n1. 👍 0\n2. 👎 0\n3. 👁 333\n1. oh and its in degrees.\n\n1. 👍 0\n2. 👎 0\n2. nevermind, figured it out.\n\n1. 👍 0\n2. 👎 0\n\n## Similar Questions\n\n1. ### Math\n\n1. Let (-7, 4) be a point on the terminal side of (theta). Find the exact values of sin(theta), csc(theta), and cot(theta). 2. Let (theta) be an angle in quadrant IV such that sin(theta)=-2/5. Find the exact values of sec(theta)\n\nasked by Kandee Johnson on May 15, 2011\n2. ### Penn Foster Writing Assignment Writing Skills\n\nI am trying to complete a 750 to 1000 word essay but I completely have no clue what to write about and my writing skills is a bit lacking. I am not looking for someone to write this for me, someone who can guide me to complete\n\nasked by Edy on March 24, 2010\n3. ### Math\n\nThe All-Stars softball team needs to purchase new uniform jerseys. The manager uses the inequality d≤750 to determine how much money the team can spend per jersey. Which description correctly interprets the inequality in terms\n\nasked by Arabella on December 6, 2019\n4. ### physics\n\nFour charges are placed at the four corners of a square of side 15 cm. The charges on the upper left and right corners are +3 μC and -6 μC respectively. The charges on the lower left and right corners are -2.4 μC and -9 μC\n\nasked by abdul on January 5, 2016\n5. ### Math for Steve\n\n1. Identify the part, whole, and percent in the following statement: Find 15% of 750. a. part = 750, whole = n, percent = 15 b. part = 15, whole = 750, percent = p c. part = n, whole = 750, percent = 15 d. none of these 2. Write a\n\nasked by Jman on November 6, 2012\n1. ### Algebra\n\nNatasha is planning a school celebration and wants to have live music and food for everyone who attends. She has found a band that will charge her \\$750 and a caterer whoWill provide snacked and drinks for \\$2.25 per person. If her\n\nasked by John Brown on May 26, 2016\n2. ### Precalculus\n\nI am trying to submit this homework in but i guess i'm not doing it in exact values because it is not accepting it. I know i'm supposed to be using half angle formulas but maybe the quadrants are messing me up. Please help! Find\n\nasked by J.P. on November 9, 2015\n3. ### Physics\n\nA markman fires a .22 caliber rifle horizontally at a target the bullet has a muzzle velocity with magnitude 750 ft/s. How much does the bullet drop in flight if the target is (a) 50.0 yd away and (b) 150.0 yd away? for this\n\nasked by Sarah on June 7, 2009\n\n1. Identify the part, whole, and percent in the following statement: Find 15% of 750. (1 point) part = 750, whole = n, percent = 15 part = 15, whole = 750, percent = p part = n, whole = 750, percent = 15 none of these 2. Write a\n\nasked by Delilah on November 16, 2012\n5. ### TRIG!\n\nPosted by hayden on Monday, February 23, 2009 at 4:05pm. sin^6 x + cos^6 x=1 - (3/4)sin^2 2x work on one side only! Responses Trig please help! - Reiny, Monday, February 23, 2009 at 4:27pm LS looks like the sum of cubes sin^6 x +\n\nasked by hayden on February 23, 2009\n6. ### Chemistry\n\nHelp please? 1)A sample of propane gas occupies 625 cm3 at 20.0 °C and 750 torr. What is the final volume in cubic centimeters at -80.0 °C and 750 torr? 2)If oxygen gas is collected over water at 25 °C and 775 torr, what is the\n\nasked by May on April 16, 2014"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.93530273,"math_prob":0.90499324,"size":3221,"snap":"2020-24-2020-29","text_gpt3_token_len":992,"char_repetition_ratio":0.108797014,"word_repetition_ratio":0.11838006,"special_character_ratio":0.3203974,"punctuation_ratio":0.1209564,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96098423,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-11T19:55:34Z\",\"WARC-Record-ID\":\"<urn:uuid:acd97a42-8e6a-4640-bfbc-ceb8d015c67d>\",\"Content-Length\":\"25092\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d1e466b8-bded-4d3d-b927-93e224b16f56>\",\"WARC-Concurrent-To\":\"<urn:uuid:7be7ecb6-8ec1-4e53-82e5-9482288f8fe0>\",\"WARC-IP-Address\":\"66.228.55.50\",\"WARC-Target-URI\":\"https://www.jiskha.com/questions/585762/find-the-exact-values-of-the-six-trig-functions-of-the-angle-750-sin-750-cos-750\",\"WARC-Payload-Digest\":\"sha1:JFD35LDB2Q52JKQ6JZFIACXQQZGBZD2S\",\"WARC-Block-Digest\":\"sha1:GWQ2UVG37VJYXDOTJB5VKMDRTRLMKOZO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655937797.57_warc_CC-MAIN-20200711192914-20200711222914-00383.warc.gz\"}"} |
https://www.zora.uzh.ch/id/eprint/136405/ | [
"",
null,
"# Interval routing schemes for circular-arc graphs\n\nGurski, Frank; Poullie, Patrick (2017). Interval routing schemes for circular-arc graphs. International Journal of Foundations of Computer Science, 28(1):39-60.\n\n## Abstract\n\nInterval routing is a space efficient method to realize a distributed routing function. In this paper we show that every circular-arc graph allows a shortest path strict 2-interval routing scheme, i.e., by introducing a global order on the vertices and assigning at most two (strict) intervals in this order to the ends of every edge allows to depict a routing function that implies exclusively shortest paths. Since circular-arc graphs do not allow shortest path 1-interval routing schemes in general, the result implies that the class of circular-arc graphs has strict compactness 2, which was a hitherto open question. Additionally, we show that the constructed 2-interval routing scheme is a 1-interval routing scheme with at most one additional interval assigned at each vertex and we outline an algorithm to calculate the routing scheme for circular-arc graphs in\n\n## Abstract\n\nInterval routing is a space efficient method to realize a distributed routing function. In this paper we show that every circular-arc graph allows a shortest path strict 2-interval routing scheme, i.e., by introducing a global order on the vertices and assigning at most two (strict) intervals in this order to the ends of every edge allows to depict a routing function that implies exclusively shortest paths. Since circular-arc graphs do not allow shortest path 1-interval routing schemes in general, the result implies that the class of circular-arc graphs has strict compactness 2, which was a hitherto open question. Additionally, we show that the constructed 2-interval routing scheme is a 1-interval routing scheme with at most one additional interval assigned at each vertex and we outline an algorithm to calculate the routing scheme for circular-arc graphs in\n\n## Statistics\n\n### Citations\n\nDimensions.ai Metrics"
]
| [
null,
"https://www.zora.uzh.ch/images/uzh_logo_en.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8933225,"math_prob":0.94184524,"size":878,"snap":"2020-10-2020-16","text_gpt3_token_len":173,"char_repetition_ratio":0.16018307,"word_repetition_ratio":0.0,"special_character_ratio":0.1833713,"punctuation_ratio":0.06410257,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.982588,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-02T16:50:37Z\",\"WARC-Record-ID\":\"<urn:uuid:612f4928-06bd-4fbb-8ac7-8db489561855>\",\"Content-Length\":\"47664\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0c3c6fd5-5d33-40b4-981b-e9f0d4699141>\",\"WARC-Concurrent-To\":\"<urn:uuid:73114952-1577-4e7f-93d2-defcd795b42b>\",\"WARC-IP-Address\":\"130.60.206.230\",\"WARC-Target-URI\":\"https://www.zora.uzh.ch/id/eprint/136405/\",\"WARC-Payload-Digest\":\"sha1:XNPB2CKK4RAU4ETSBVXIPGGD6EAPVBZM\",\"WARC-Block-Digest\":\"sha1:R5IMADL3AE2TNMOY2A4XQBUM5KLS7YGW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370506988.10_warc_CC-MAIN-20200402143006-20200402173006-00395.warc.gz\"}"} |
https://fractioncalculator.pro/__5%7C8_minus__10%7C1_ | [
"# 5/8 minus 10 - Subtracting Fraction\n\nUse this calculator to add, subtract, multiply and divide fractions. How to figure out subtract 10 from 5/8?\n\n### Fraction Calculator\n\nPlease, enter two fractions the select the operation:\n\n=\n\n="
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8007569,"math_prob":0.86931926,"size":253,"snap":"2021-04-2021-17","text_gpt3_token_len":63,"char_repetition_ratio":0.15662651,"word_repetition_ratio":0.7368421,"special_character_ratio":0.256917,"punctuation_ratio":0.15384616,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9992705,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-18T10:55:32Z\",\"WARC-Record-ID\":\"<urn:uuid:c851c85f-70d1-4188-b8da-c6d663c409a0>\",\"Content-Length\":\"31443\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:eae9e86e-30c9-438b-8490-503122a66b58>\",\"WARC-Concurrent-To\":\"<urn:uuid:6146d176-f79e-4452-a157-797b0b27f064>\",\"WARC-IP-Address\":\"104.21.46.178\",\"WARC-Target-URI\":\"https://fractioncalculator.pro/__5%7C8_minus__10%7C1_\",\"WARC-Payload-Digest\":\"sha1:UJP7SFKPD3KDJIN4TZUIFT6JRY2PHLHK\",\"WARC-Block-Digest\":\"sha1:SLMR4DFE6EFNLFVA7Q7C2EJ7DD2MPB4S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038476606.60_warc_CC-MAIN-20210418103545-20210418133545-00143.warc.gz\"}"} |
https://lbs-to-kg.appspot.com/417-lbs-to-kg.html | [
"Pounds To Kg\n\n# 417 lbs to kg417 Pounds to Kilograms\n\nlbs\n=\nkg\n\n## How to convert 417 pounds to kilograms?\n\n 417 lbs * 0.45359237 kg = 189.14801829 kg 1 lbs\nA common question is How many pound in 417 kilogram? And the answer is 919.327633311 lbs in 417 kg. Likewise the question how many kilogram in 417 pound has the answer of 189.14801829 kg in 417 lbs.\n\n## How much are 417 pounds in kilograms?\n\n417 pounds equal 189.14801829 kilograms (417lbs = 189.14801829kg). Converting 417 lb to kg is easy. Simply use our calculator above, or apply the formula to change the length 417 lbs to kg.\n\n## Convert 417 lbs to common mass\n\nUnitMass\nMicrogram1.8914801829e+11 µg\nMilligram189148018.29 mg\nGram189148.01829 g\nOunce6672.0 oz\nPound417.0 lbs\nKilogram189.14801829 kg\nStone29.7857142857 st\nUS ton0.2085 ton\nTonne0.1891480183 t\nImperial ton0.1861607143 Long tons\n\n## What is 417 pounds in kg?\n\nTo convert 417 lbs to kg multiply the mass in pounds by 0.45359237. The 417 lbs in kg formula is [kg] = 417 * 0.45359237. Thus, for 417 pounds in kilogram we get 189.14801829 kg.\n\n## 417 Pound Conversion Table",
null,
"## Alternative spelling\n\n417 lb to Kilogram, 417 lb in Kilogram, 417 Pounds to Kilograms, 417 Pounds in Kilograms, 417 lbs to kg, 417 lbs in kg, 417 lbs to Kilograms, 417 lbs in Kilograms, 417 Pounds to Kilogram, 417 Pounds in Kilogram, 417 Pound to Kilograms, 417 Pound in Kilograms, 417 lb to kg, 417 lb in kg, 417 Pounds to kg, 417 Pounds in kg, 417 Pound to kg, 417 Pound in kg"
]
| [
null,
"https://lbs-to-kg.appspot.com/image/417.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7684754,"math_prob":0.5605252,"size":1101,"snap":"2019-51-2020-05","text_gpt3_token_len":343,"char_repetition_ratio":0.24703738,"word_repetition_ratio":0.0,"special_character_ratio":0.4150772,"punctuation_ratio":0.15873016,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9630152,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-15T18:16:07Z\",\"WARC-Record-ID\":\"<urn:uuid:518e73d5-0fda-490d-92f9-729cfc022ccd>\",\"Content-Length\":\"28099\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9a66d641-79fe-4646-84f3-0657731586bd>\",\"WARC-Concurrent-To\":\"<urn:uuid:c000217b-d4f4-432f-aecc-dfa81c290a6c>\",\"WARC-IP-Address\":\"172.217.13.244\",\"WARC-Target-URI\":\"https://lbs-to-kg.appspot.com/417-lbs-to-kg.html\",\"WARC-Payload-Digest\":\"sha1:ODMN4UVYL7D6KJKJAN5CSOQNTVAWBHAR\",\"WARC-Block-Digest\":\"sha1:FJDN2NDXV5NVWSDDEPPWZLJJJAXJO2H6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575541309137.92_warc_CC-MAIN-20191215173718-20191215201718-00103.warc.gz\"}"} |
https://www.sanfoundry.com/javascript-mcqs-defining-invoking-functions/ | [
"# JavaScript Questions & Answers – Defining and Invoking Functions\n\n«\n»\n\nThis set of Javascript Multiple Choice Questions & Answers (MCQs) focuses on “Defining and Invoking Functions”.\n\n1. The function definitions in JavaScript begins with _____________\na) Identifier and Parentheses\nb) Return type and Identifier\nc) Return type, Function keyword, Identifier and Parentheses\nd) Identifier and Return type\n\nExplanation: The function definitions begin with the keyword function followed by an identifier that names the function and a pair of parentheses around a comma-separated list of zero or more identifiers.\n\n2. What will be the output of the following JavaScript code?\n\n```function printprops(o)\n{\nfor(var p in o)\nconsole.log(p + \": \" + o[p] + \"\\n\");\n}```\n\na) Prints the contents of each property of o\nb) Returns undefined\nc) Prints only one property\nd) Prints the address of elements\n\nExplanation: The above code snippet returns undefined.\nNote: Join free Sanfoundry classes at Telegram or Youtube\n\n3. When does the function name become optional in JavaScript?\na) When the function is defined as a looping statement\nb) When the function is defined as expressions\nc) When the function is predefined\nd) when the function is called\n\nExplanation: The function name is optional for functions defined as expressions. A function declaration statement actually declares a variable and assigns a function object to it.\nTake JavaScript Mock Tests - Chapterwise!\nStart the Test Now: Chapter 1, 2, 3, 4, 5, 6, 7, 8, 9, 10\n\n4. What is the purpose of a return statement in a function?\na) Returns the value and continues executing rest of the statements, if any\nb) Returns the value and stops the program\nc) Returns the value and stops executing the function\nd) Stops executing the function and returns the value\n\nExplanation: The return stops the execution of the function when it is encountered within the function. It returns the value to the statement where the function is called.\n\n5. What will happen if a return statement does not have an associated expression?\na) It returns the value 0\nb) It will throw an exception\nc) It returns the undefined value\nd) It will throw an error\n\nExplanation: A function without a return statement will return a default value. If the return statement does not have an associated expression then it returns an undefined value.\n\n6. A function with no return value is called ___________\na) Procedures\nb) Method\nc) Static function\nd) Dynamic function\n\nExplanation: Void functions does not return a value. Functions with no return value are sometimes called procedures.\n\n7. The function stops its execution when it encounters?\na) continue statement\nb) break statement\nc) goto statement\nd) return statement\n\nExplanation: Continue statement and break statement are used in the loops for skipping the iteration or going out of the loop. Whenever a return statement is encountered the function execution is stopped.\n\n8. Which keyword is used to define the function in javascript?\na) void\nb) int\nc) function\nd) main\n\nExplanation: A JavaScript function is defined with the function keyword, followed by a name, followed by parentheses(). Function names can contain letters, digits, underscores, and dollar signs (same rules as variables).\n\n9. Which is an equivalent code to invoke a function m of class o that expects two arguments x and y?\na) o(x,y);\nb) o.m(x) && o.m(y);\nc) m(x,y);\nd) o.m(x,y);\n\nExplanation: The two argument in a function are separated by a comma (,). The code above is an invocation expression: it includes a function expression o.m and two argument expressions, x and y.\n\n10. What will be the equivalent code of the following JavaScript code?\n\n`o.m(x,y);`\n\na) o.m(x) && o.m(y);\nb) o[“m”](x,y);\nc) o(m)[“x”,”y”];\nd) o.m(x && y);\n\nExplanation: Another way to write o.m(x,y) is o[“m”](x,y).o[“m”] will access the property of the object and parenthesis will access the function present inside it.\n\n11. What will be the output of the following JavaScript code?\n\n```function info()\n{\nint a=1;\nint b=2;\nreturn a*b;\n}\ndocument.write(info());```\n\na) 1\nb) 2\nc) 3\nd) error\n\nExplanation: document.write() is used to write the output on the console. In the above code document.write() passes a function as its argument and the function returns 2 which is printed as output.\n\n12. What will be the output of the following JavaScript code?\n\n```var arr = [7, 5, 9, 1];\nvar value = Math.max.apply(null, arr);\ndocument.writeln(value);```\n\na) 7\nb) 5\nc) 1\nd) 9\n\nExplanation: apply() is a predefined function method in javascript. The argument of apply() method contains elements of an array. It contains two values as argument which are optional as input.\n\n13. What will be the output of the following JavaScript code?\n\n```var person =\n{\nname: “Rahul”,\ngetName: function()\n{\nnreturn this.name;\n}\n}\nvar unboundName = person.getName;\nvar boundName = unboundName.bind(person);\ndocument.writeln(boundName());```\n\na) runtime error;\nb) compilation error\nc) Rahul\nd) undefined\n\nExplanation: The javascript bind() function is used to create a new function. The newly created function has its own set of keywords.\n\n14. What will be the output of the following JavaScript code?\n\n```function code(id,name)\n{\nthis.id = id;\nthis.name = name;\n}\nfunction pcode(id,name)\n{\ncode.call(this,id,name);\n}\ndocument.writeln(new pcode(101,\"vivek\").id);```\n\na) vivek\nb) 101\nc) Runtime error\nd) Compilation error\n\nExplanation: The JavaScript call() method is used to call a function containing “this” value as an argument. It returns the result of calling function.\n\n15. What will be the output of the following JavaScript code?\n\n``` var pow=new Function(\"num1\",\"num2\",\"return Math.pow(num1,num2)\");\ndocument.writeln(pow(2,3));```\n\na) 2\nb) 3\nc) 8\nd) error",
null,
""
]
| [
null,
"data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20150%20150%22%3E%3C/svg%3E",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6329722,"math_prob":0.91355705,"size":6351,"snap":"2023-14-2023-23","text_gpt3_token_len":1520,"char_repetition_ratio":0.18670239,"word_repetition_ratio":0.07526882,"special_character_ratio":0.24311133,"punctuation_ratio":0.14741036,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9717979,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-04T01:24:17Z\",\"WARC-Record-ID\":\"<urn:uuid:ab03cd31-8d0e-4f28-9ef2-c58f1ba6e54f>\",\"Content-Length\":\"154524\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:df161700-4811-48ff-9930-0be7c92babf3>\",\"WARC-Concurrent-To\":\"<urn:uuid:dc75f1cd-4ed4-45a8-94bf-9f85fa5158c8>\",\"WARC-IP-Address\":\"104.25.131.119\",\"WARC-Target-URI\":\"https://www.sanfoundry.com/javascript-mcqs-defining-invoking-functions/\",\"WARC-Payload-Digest\":\"sha1:3QARWJ3MR32CSJAGKWDCEYRAKMR3SCYC\",\"WARC-Block-Digest\":\"sha1:PXX3VXJVHHOK3B3J7IUIBEGTMO3NJLU4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224649348.41_warc_CC-MAIN-20230603233121-20230604023121-00408.warc.gz\"}"} |
https://www.homeandlearn.uk/python-find.html | [
"# Python find\n\nIf you need to know where in a string of text your search term was found then you can use the find() function in Python. For example, previously, you were asked to use slicing to turn Kenny Carney into Carney Kenny. The solution involved hard-coded values:\n\nsurname = myName[6:]\nfirstName = myName[:5]\nprint(surname + \" \" + firstName)\n\nSuppose now we asked you turn any first name and surname combination into a surname and first name answer. So, if you were called Jessica Jones and entered that at the prompt, hitting the enter key on your keyboard would turn it into Jones Jessica. Or if you were called Luke Cage, the output window would print Cage Luke. How would you go about it? You can't use hard-coded values for your slicing anymore.\n\nOne solution is to locate the position of the space in the entered name. Once you know the position of the space, you can use that information in your solution. Let's see how it's done.\n\nThe find() function looks like this:\n\nyourString.find(\"your_text\")\n\nSo you type the variable name that contains the text you want to search. After a dot, type find. The find function needs at least one thing between round brackets: what you are searching for. The find function returns a value. So you need to place it on the right of an equal sign:\n\nreturnValue = yourString.find(\"your_text\")\n\nIf your text is found in your string then find will return where it was found, as a position number. (It will only find the first occurrence of your text.) Set up the following variable to try it out:\n\nmyName = \"Jessica Jones\"\nreturnValue = myName.find(\" \")\nprint(returnValue)\n\nIn between the round brackets of find, we have typed two double quotes with a space between the two. (You can use single quotes, if you prefer.) This means find will return the first occurrence of a space in the name Jessica Jones. The position on the space will be placed in the variable we called returnValue. If find can't locate a space, it will return a value of -1. You can test for a value of -1 in an if Statement:\n\nif returnValue != -1:\n\nprint(\"Search term found\")\n\nelse:\n\nWe're using the != symbols to say \"If returnValue does not equal -1\". If it doesn't then our search term was found.\n\nIf our search term was found then we can go ahead and slice up the name:\n\nmyName = \"Jessica Jones\"\nreturnValue = myName.find(' ')\n\nif returnValue != -1:\n\nfName = myName[:returnValue]\nsName = myName[returnValue + 1:]\nprint(sName + \" \" + fName)\n\nelse:\n\nprint(\"Error\")\n\nNotice how we are doing the slicing.\n\nfName = myName[:returnValue]\nsName = myName[returnValue + 1:]\n\nThe position of the space is 7. This is the start of the space. The first name can be grabbed using 0:7, if we were hard-coding it. But the find function has produced a number for us, so we can just use the returnValue variable as the final number the slice:\n\nmyName[:returnValue]\n\nWe don't need the zero as the first number. Remember: if you miss out the start number for your slice, Python will start slicing at the first character.\n\nThe surname begins one character after the space. Python allows you to add numbers to your index numbers. We're adding 1 to whatever is inside of returnValue. After a colon, we don't need a number because Python will just grab all the characters to the end of the string.\n\nFinally, we can print out the results:\n\nprint(sName + \" \" + fName)\n\nWe use concatenation to join the surname with a space character then the first name.\n\nTry it out with an input line at the start of your code:\n\nmyName = input(\"What is your name?\")\n\nNow delete the Jessica Jones line. Here's what your code should look like:\n\nmyName = input(\"What is your name?\")\nreturnValue = myName. find(\" \")\n\nif returnValue != -1:\n\nfName = myName[:returnValue]\nsName = myName[returnValue + 1:]\nprint(sName + \" \" + fName)\n\nelse:\n\nprint(\"Error\")\n\nRun your code and enter Luke Cage when you see the prompt in the output window. Press the enter key on your keyboard and you should see Cage Luke print out.\n\nUsing the find function along with slicing can be very powerful. In the next lesson, you'll learn how to use len and count in Python. It's only a short lesson.\n\nPython len and count functions >"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8938694,"math_prob":0.86918014,"size":4135,"snap":"2022-27-2022-33","text_gpt3_token_len":956,"char_repetition_ratio":0.15177923,"word_repetition_ratio":0.07094134,"special_character_ratio":0.24087061,"punctuation_ratio":0.11771844,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96919924,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-03T14:28:38Z\",\"WARC-Record-ID\":\"<urn:uuid:2c13ee9d-f19e-4cf0-bbae-7ace9ad4ed6e>\",\"Content-Length\":\"22164\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e15c5072-e43e-45ed-acf3-97641eff6b07>\",\"WARC-Concurrent-To\":\"<urn:uuid:a5cf38d3-d5f3-4413-a396-7e721da5a39f>\",\"WARC-IP-Address\":\"62.182.20.25\",\"WARC-Target-URI\":\"https://www.homeandlearn.uk/python-find.html\",\"WARC-Payload-Digest\":\"sha1:D32QBE3RUR6EOHGCZTLGQU27CDQGXDHX\",\"WARC-Block-Digest\":\"sha1:E5LUL6AEHAADA7KRIK3PSMXJTNIQ4RHV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104244535.68_warc_CC-MAIN-20220703134535-20220703164535-00653.warc.gz\"}"} |
https://projecteuclid.org/euclid.aop/1176996665 | [
"The Annals of Probability\n\nConvexity and Conditional Expectations\n\nJ. Pfanzagl\n\nAbstract\n\nIf a $n$-dimensional function is with probability one in a convex set, the same holds true for the conditional expectation (with respect to any sub-$\\sigma$-field). An extreme point of this convex set can be assumed by the conditional expectation only if it is assumed by the original function and if this function is partially measurable with respect to the conditioning sub-$\\sigma$-field. These results are used to prove Jensen's inequality for conditional expectations of $n$-dimensional functions, and to give a condition for strict inequality.\n\nArticle information\n\nSource\nAnn. Probab., Volume 2, Number 3 (1974), 490-494.\n\nDates\nFirst available in Project Euclid: 19 April 2007\n\nPermanent link to this document\nhttps://projecteuclid.org/euclid.aop/1176996665\n\nDigital Object Identifier\ndoi:10.1214/aop/1176996665\n\nMathematical Reviews number (MathSciNet)\nMR358893\n\nZentralblatt MATH identifier\n0285.60002\n\nJSTOR"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.64314604,"math_prob":0.83364475,"size":1394,"snap":"2019-43-2019-47","text_gpt3_token_len":382,"char_repetition_ratio":0.12446043,"word_repetition_ratio":0.02259887,"special_character_ratio":0.27761838,"punctuation_ratio":0.17716536,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9815569,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-15T18:28:24Z\",\"WARC-Record-ID\":\"<urn:uuid:ce0e01d7-bf38-41e2-8fc1-745fbacfa884>\",\"Content-Length\":\"28643\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d9e9f898-efc2-46af-85b3-c18b424c3a8c>\",\"WARC-Concurrent-To\":\"<urn:uuid:6558113e-8437-450c-a30b-3a88ddec3fc4>\",\"WARC-IP-Address\":\"132.236.27.47\",\"WARC-Target-URI\":\"https://projecteuclid.org/euclid.aop/1176996665\",\"WARC-Payload-Digest\":\"sha1:GENANFSMASE6GZZFT54KMWYHKNDY62RF\",\"WARC-Block-Digest\":\"sha1:JHKVKVJSMGDXSGE46WTQ55FD4GSRQTMR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986660231.30_warc_CC-MAIN-20191015182235-20191015205735-00185.warc.gz\"}"} |
https://coursemeasurement.org.uk/gps/modelling.htm | [
"#",
null,
"Modelling of GPS accuracy for distance measuring\n\nIn the article Repeatability of Marked Way Points I have reported the spread of repeat measurements of a fixed point. The data closely fits a Rayleigh distribution with a parameter of 3.3 m. In the article on the Rayleigh distribution. I show that this is equivalent with a normal or Gaussian) spread of errors in each of the two perpendicular grid coordinates, Eastings and Northings. The standard deviation of these two normal distributions is identical and is 2.33 m. This is derived by calculating 3.3/sqrt(2).\n\nI am going to simulate the measurement with my GPS of some different configurations for a 10k race course. I have chosen only simple configurations consisting of a small number of straight lines. I will assume that these have been laid out precisely and I measure the coordinates of the corners of the courses by recording their coordinates with the GPS. I assume the East and North coordinates of each corner has errors normally distributed about the correct value with a standard deviation 2.33 m.\n\nIn order to model the effect of GPS errors on course measurements I am going to consider a series of 10 km courses made up straight line legs as follows:\n\n• Course 1: single straight line leg consisting of a start and a finish separated by 10 km.\n• Course 2: two leg course consisting a straight 5k out leg, a 180 degree turn round and a straight back leg to a finish at the start\n• Course 3: equilateral triangle with sides of 3 1/3 km.\n• Course 4: square with 2.5 km sides\n• Course 5: regular pentagon with 2 km sides\n• Course 6: a regular hexagon with sides of 1 2/3 km length\n• Course 7: regular heptagon with sides of 1 3/7 km length\n• Course 8; regular octagon with sides of 1.25 km length\n\nFor course 2 to 8 where the course start and finish are at point I have nevertheless assumed that separate measurements are needed for both the start and the finish. This will replicate how a measuring device is used on a bicycle which is ridden from start to finish with the readings taken at start and finish to determine the distance travelled along each leg.\n\n### Simulation method using a spreadsheet\n\nI have carried these simulations out on a spreadsheet.\n\nTaking Course 4, the square, as an example.\n\nI assume it is laid out as follows:\n\nEastings (m)\nNorthings (m)\nstart\n0\n0\ncorner 1\n2500\n0\ncorner 2\n2500\n2500\ncorner 3\n0\n2500\nfinish\n0\n0\n\nOn my spread sheet I then modify the coordinates by adding random errors with a standard deviation of 2.33 m. Here is an example on one modified set of locations\n\nEastings (m)\nNorthings (m)\nstart\n-0.59\n0.62\ncorner 1\n2498.35\n1.38\ncorner 2\n2505.39\n2499.88\ncorner 3\n1.9\n2506.33\nfinish\n5.07\n0.73\n\nNext on my spreadsheet using Pythagoras I calculate the distance between these modified coordinates. For the above example I get a value for the course length 10006.56 m. So for this trial my GPS would give a course length that was long by 6.56 m.\n\nI repeat the above simulation 1000 times on my spread sheet by copying the formula to different spreadsheet row. Next I calculate the standard deviation of the 1000 simulations.\n\nFor a set of 1000 simulations I get an average value of 10000.14m and a standard deviation for an individual simulation of 6.72 m\n\nI can repeat the whole set of 1000 simulations by recalculating the spread sheet. my next set gave a mean of 9999.85 m with a standard deviation of 6.27 m.\n\nRecalculating the spread sheet a number of times I noted that on average the standard deviation was about 6.6 m\n\n### Results of Simulations\n\nCourse configuration\nStandard deviation of GPS measurement\nstraight line\n3.3 m\nout & back\n5.8 m\nequilateral triangle\n6.7 m\nsquare\n6.6 m\nregular pentagon\n6.3 m\nregular hexagon\n6.1 m\nregular heptagon\n6.0 m\nregular octagon\n5.8 m\n\nFor a 10k course the SCPF is 10m. it is generally accepted that course measurers would not be more than 10m in error, when one includes all the course measurers' sources of error. The GPS would need to have an error of about 3.3m to equal the course measurers bikes. This would mean that that the GPS would need to have an error of 3 times its standard deviation which would occur rather rarely. The above table simulated standard deviations for a GPS measurement is around two times worse than would be needed to match course measurers using a calibrated bike and Jones counter.\n\n### Conclusions\n\nI have taken the a measured value for the repeatability of way points recorded on my ETREX H, and have simulated measuring a 10k course configured as a regular polygon, with straight straight legs. I have assumed that I have used the GPS to measure the location of each of the corners of the polygon. I predict an accuracy about twice as bad as is obtained by course measurers using calibrated bikes and Jones counters, i.e. An error of more than 20 m for a polygon course of length 10 km would be unlikely.\n\nIn my next article, Experimental data for the measurement of the length of the long Tow calibration course with GPS, I examine whether this prediction is born out in practice\n\nMike Sandford - 1 April 2009"
]
| [
null,
"https://coursemeasurement.org.uk/gps/gotogps.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9244055,"math_prob":0.9514245,"size":4493,"snap":"2021-31-2021-39","text_gpt3_token_len":1096,"char_repetition_ratio":0.13187793,"word_repetition_ratio":0.026699029,"special_character_ratio":0.25417316,"punctuation_ratio":0.08305275,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98457307,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-28T13:15:06Z\",\"WARC-Record-ID\":\"<urn:uuid:3617cbda-84df-4376-af8e-ed763a7338ed>\",\"Content-Length\":\"9194\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:01f9b714-4325-40d5-82a4-3b4a42e156b7>\",\"WARC-Concurrent-To\":\"<urn:uuid:679a2490-0973-4755-bdc4-6e75e13d173a>\",\"WARC-IP-Address\":\"80.82.123.116\",\"WARC-Target-URI\":\"https://coursemeasurement.org.uk/gps/modelling.htm\",\"WARC-Payload-Digest\":\"sha1:ETGQRQGJEMHXWSRYYM3OAMDJ7OGEFF2N\",\"WARC-Block-Digest\":\"sha1:GEGHFKV742UJNDVCBLE4VCDLTR2J44BK\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780060803.2_warc_CC-MAIN-20210928122846-20210928152846-00539.warc.gz\"}"} |
https://apmonitor.com/wiki/index.php/Apps/LinearStateSpace | [
"Apps\n\n## State Space Model Object",
null,
"APMonitor Objects\n Type: Object\nData: A, B, C, D, and E matrices\nInputs: Input (u)\nOutputs: States (x), Output (y)\nDescription: LTI State Space Model\nAPMonitor Usage: sys = lti\nGEKKO Usage: x,y,u = m.state_space(A,B,C,D=None)\nOther optional arguments: E=None,discrete=False,dense=False\n\n\nLinear Time Invariant (LTI) state space models are a linear representation of a dynamic system in either discrete or continuous time. Putting a model into state space form is the basis for many methods in process dynamics and control analysis. Below is the continuous time form of a model in state space form.\n\n$$E\\dot x = A x + B u$$\n\n$$y = C x + D u$$\n\nwith states x in \\mathbb{R}^n and state derivatives \\dot x = {dx}/{dt} in \\mathbb{R}^n. The notation in \\mathbb{R}^n means that x and \\dot x are in the set of real-numbered vectors of length n. The other elements are the outputs y in \\mathbb{R}^p, the inputs u in \\mathbb{R}^m, the state transition matrix A, the input matrix B, and the output matrix C. The remaining matrix D is typically zeros because the inputs do not typically affect the outputs directly. The dimensions of each matrix are shown below with m inputs, n states, and p outputs.\n\n$$A \\in \\mathbb{R}^{n \\, \\mathrm{x} \\, n}$$ $$B \\in \\mathbb{R}^{n \\, \\mathrm{x} \\, m}$$ $$C \\in \\mathbb{R}^{p \\, \\mathrm{x} \\, n}$$ $$D \\in \\mathbb{R}^{p \\, \\mathrm{x} \\, m}$$ $$E \\in \\mathbb{R}^{n \\, \\mathrm{x} \\, n}$$\n\nModel Predictive Control, or MPC, is an advanced method of process control that has been in use in the process industries such as chemical plants and oil refineries since the 1980s. Model predictive controllers rely on dynamic models of the process, most often linear empirical models obtained by system identification.\n\nThese models are typically in the finite impulse response form or linear state space form. Either model form can be converted to an APMonitor for a linear MPC upgrade. Once in APMonitor form, nonlinear elements can be added to avoid multiple model switching, gain scheduling, or other ad hoc measures commonly employed because of linear MPC restrictions.",
null,
"#### Example Model in APMonitor\n\n ! new linear time-invariant object\nModel control\nObjects\nmpc = lti\nEnd Objects\nEnd Model\n\n! Model information\n! continuous form\n! dx/dt = A * x + B * u\n! y = C * x + D * u\n!\n! dimensions\n! (nx1) = (nxn)*(nx1) + (nxm)*(mx1)\n! (px1) = (pxn)*(nx1) + (pxm)*(mx1)\n!\n! discrete form\n! x[k+1] = A * x[k] + B * u[k]\n! y[k] = C * x[k] + D * u[k]\nFile mpc.txt\nsparse, continuous ! dense/sparse, continuous/discrete\n2 ! m=number of inputs\n3 ! n=number of states\n3 ! p=number of outputs\nEnd File\n\n! A matrix (row, column, value)\nFile mpc.a.txt\n1 1 0.9\n2 2 0.1\n3 3 0.5\nEnd File\n\n! B matrix (row, column, value)\nFile mpc.b.txt\n1 1 1.0\n2 2 1.0\n3 1 0.5\n3 2 0.5\nEnd File\n\n! C matrix (row, column, value)\nFile mpc.c.txt\n1 1 0.5\n2 2 1.0\n3 3 2.0\nEnd File\n\n! D matrix (row, column, value)\nFile mpc.d.txt\n1 1 0.2\nEnd File\n\n\n#### Example Model Predictive Control in GEKKO\n\nimport numpy as np\nfrom gekko import GEKKO\n\nA = np.array([[-.003, 0.039, 0, -0.322],\n[-0.065, -0.319, 7.74, 0],\n[0.020, -0.101, -0.429, 0],\n[0, 0, 1, 0]])\n\nB = np.array([[0.01, 1, 2],\n[-0.18, -0.04, 2],\n[-1.16, 0.598, 2],\n[0, 0, 2]]\n)\n\nC = np.array([[1, 0, 0, 0],\n[0, -1, 0, 7.74]])\n\n#%% Build GEKKO State Space model\nm = GEKKO()\nx,y,u = m.state_space(A,B,C,D=None)\n\n# customize names\n# MVs\nmv0 = u\nmv1 = u\n# Feedforward\nff0 = u\n# CVs\ncv0 = y\ncv1 = y\n\nm.time = [0, 0.1, 0.2, 0.4, 1, 1.5, 2, 3, 4]\nm.options.imode = 6\nm.options.nodes = 3\n\nu.lower = -5\nu.upper = 5\nu.dcost = 1\nu.status = 1\n\nu.lower = -5\nu.upper = 5\nu.dcost = 1\nu.status = 1\n\n## CV tuning\n# tau = first order time constant for trajectories\ny.tau = 5\ny.tau = 8\n# = 1 (first order trajectory)\n# = 2 (first order traj, re-center with each cycle)\ny.tr_init = 0\ny.tr_init = 0\n# targets (dead-band needs upper and lower values)\n# SPHI = upper set point\n# SPLO = lower set point\ny.sphi= -8.5\ny.splo= -9.5\ny.sphi= 5.4\ny.splo= 4.6\n\ny.status = 1\ny.status = 1\n\n# feedforward\nu.status = 0\nu.value = np.zeros(np.size(m.time))\nu.value[3:] = 2.5\n\nm.solve() # (GUI=True)\n\n# also create a Python plot\nimport matplotlib.pyplot as plt\n\nplt.subplot(2,1,1)\nplt.plot(m.time,mv0.value,'r-',label=r'$u_0$ as MV')\nplt.plot(m.time,mv1.value,'b--',label=r'$u_1$ as MV')\nplt.plot(m.time,ff0.value,'g:',label=r'$u_2$ as feedforward')\nplt.subplot(2,1,2)\nplt.plot(m.time,cv0.value,'r-',label=r'$y_0$')\nplt.plot(m.time,cv1.value,'b--',label=r'$y_1$')\nplt.show()\n\nAlso see:"
]
| [
null,
"https://apmonitor.com/wiki/uploads/Apps/apm.png",
null,
"https://apmonitor.com/wiki/uploads/Apps/lti_step_response.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.63363695,"math_prob":0.9992083,"size":4554,"snap":"2019-51-2020-05","text_gpt3_token_len":1657,"char_repetition_ratio":0.1010989,"word_repetition_ratio":0.034974094,"special_character_ratio":0.38317963,"punctuation_ratio":0.21848014,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996772,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,9,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-11T05:02:07Z\",\"WARC-Record-ID\":\"<urn:uuid:813ea083-095d-4591-b8d7-6447a8a5fe0d>\",\"Content-Length\":\"35317\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3f5dbb92-705f-4bac-aa42-d85691080571>\",\"WARC-Concurrent-To\":\"<urn:uuid:85c73cbf-8900-4bc6-8f2e-7d080c688fb5>\",\"WARC-IP-Address\":\"128.187.56.207\",\"WARC-Target-URI\":\"https://apmonitor.com/wiki/index.php/Apps/LinearStateSpace\",\"WARC-Payload-Digest\":\"sha1:DCYUVEJJF7LOPZAOWULTKMXDYN4B57HS\",\"WARC-Block-Digest\":\"sha1:PFWST7YBYFI3LGJL7XGOX6WHL6EOMVFC\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540529955.67_warc_CC-MAIN-20191211045724-20191211073724-00438.warc.gz\"}"} |
https://stats.stackexchange.com/feeds/question/108156 | [
"Understanding Singular Value Decomposition in the context of LSI - Cross Validated most recent 30 from stats.stackexchange.com 2019-07-21T13:37:02Z https://stats.stackexchange.com/feeds/question/108156 http://www.creativecommons.org/licenses/by-sa/3.0/rdf https://stats.stackexchange.com/q/108156 9 Understanding Singular Value Decomposition in the context of LSI Zhubarb https://stats.stackexchange.com/users/28740 2014-07-16T12:31:53Z 2016-08-07T00:51:03Z <p>My question is generally on Singular Value Decomposition (SVD), and particularly on Latent Semantic Indexing (LSI).</p> <p>Say, I have $A_{word \\times document}$ that contains frequencies of 5 words for 7 documents.</p> <pre><code>A = matrix(data=c(2,0,8,6,0,3,1, 1,6,0,1,7,0,1, 5,0,7,4,0,5,6, 7,0,8,5,0,8,5, 0,10,0,0,7,0,0), ncol=7, byrow=TRUE) rownames(A) <- c('doctor','car','nurse','hospital','wheel') </code></pre> <p>I get the matrix factorization for $A$ by using SVD: $A = U \\cdot D \\cdot V^T$. </p> <pre><code>s = svd(A) D = diag(s$d) # singular value matrix S = diag(s$d^0.5 ) # diag matrix with square roots of singular values. </code></pre> <p>In <a href=\"http://www.ling.ohio-state.edu/~kbaker/pubs/Singular_Value_Decomposition_Tutorial.pdf\" rel=\"noreferrer\">1</a> and <a href=\"http://files.grouplens.org/papers/webKDD00.pdf\" rel=\"noreferrer\">2</a>, it is stated that: </p> <p>$WordSim = U \\cdot S$ gives the <strong>word similarity matrix</strong>, where the rows of $WordSim$ represent different words. </p> <p><code>WordSim = s$u %*% S</code></p> <p>$DocSim= S \\cdot V^T$gives the <strong>document similarity matrix</strong> where the columns of$DocSim$represent different documents.</p> <p><code>DocSim = S %*% t(s$v)</code></p> <p><strong>Questions:</strong></p> <ol> <li>Algebraically, why are $WordSim$ and $DocSimS$ word/document similarity matrices? Is there an intuitive explanation?</li> <li>Based on the R example given, can we make any intuitive word count / similarity observations by just looking at $WordSim$ and $DocSim$ (without using cosine similarity or correlation coefficient between rows / columns)? </li> </ol> <p><img src=\"https://i.stack.imgur.com/3KJuT.png\" alt=\"enter image description here\"></p> https://stats.stackexchange.com/questions/108156/-/228614#228614 2 Answer by Pieter for Understanding Singular Value Decomposition in the context of LSI Pieter https://stats.stackexchange.com/users/93550 2016-08-07T00:51:03Z 2016-08-07T00:51:03Z <p>Matrix factorization using SVD decomposes the input matrix into three parts:</p> <ul> <li>The left singular vectors $U$. The first column of this matrix specifies on which axis the rows of the input matrix vary the most. In your case, the first column tells you which words vary together the most. </li> <li>The singular values $D$. These are scalings. These are relative to each other. If the first value of $D$ is twice as big as the second it means that the first singular vector (in $U$ and $V^T$) explain twice as much variation as the seconds singular vector.</li> <li>The right singular vectors $V^T$. The first row of this matrix specifies on which axis the columns of the input matrix vary the most. In your case, the first row tells you which documents vary together the most. </li> </ul> <p>When words or documents <em>vary together</em> it indicates that they are similar. For example, if the word doctor occurs more often in a document, the word nurse and hospital also occur more. This is shown by the first scaled left singular vector, the first column of $WordSim$.You can validate this result by looking at the input data. Notice that when nurse does occur, hospital also occurs and when it does not occur, hospital also does not occur. </p>"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.71654814,"math_prob":0.8860861,"size":3695,"snap":"2019-26-2019-30","text_gpt3_token_len":1042,"char_repetition_ratio":0.10945543,"word_repetition_ratio":0.081318684,"special_character_ratio":0.2960758,"punctuation_ratio":0.16732542,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9932639,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-21T13:37:02Z\",\"WARC-Record-ID\":\"<urn:uuid:5ad5908c-c68a-43c5-9d8c-8342feeeca34>\",\"Content-Length\":\"7106\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:efe17dc6-3237-4af6-922a-5a6b24be65cc>\",\"WARC-Concurrent-To\":\"<urn:uuid:d05373a8-a5c1-497b-a514-34208067c02b>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://stats.stackexchange.com/feeds/question/108156\",\"WARC-Payload-Digest\":\"sha1:6POETGUTLL623C2S5JCETVUZ7UWJZTPI\",\"WARC-Block-Digest\":\"sha1:PRVLGEJMWIBBNFU7PZ7BITEOZWQN3UAR\",\"WARC-Identified-Payload-Type\":\"application/atom+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195527000.10_warc_CC-MAIN-20190721123414-20190721145414-00456.warc.gz\"}"} |
https://customessaywritingservices.net/assignment9-computer-science-homework-help/ | [
"Assignment9 | Computer Science homework help\n\nYou are required, but not limited, to turn in the following source files:\n\nAssignment9.java\n\nRequirements to get full credits in Documentation\n\n1. The assignment number, your name, student ID, lecture number/time, and a class description need to be included at the top of each file/class.\n2. A description of each method is also needed.\n3. Some additional comments inside of methods (especially for the “main” method) to explain codes that are hard to follow should be written.\n\nYou can look at the Java programs in the text book to see how comments are added to programs.\n\nNew Skills to be Applied\n\nIn addition to what has been covered in previous assignments, the use of the following items, discussed in class, will probably be needed:\n\nRecursion\nOne-dimensional arrays\n\nProgram Description\n\nAssignment #9 will be the construction of a program that reads in a sequence of integers from standard input until 0 is read, and store them in an array (including 0). This is done using iteration (choose one of for, while, or do while loop). You may assume that there will not be more than 100 numbers.\n\nThen compute the minimum number, compute the smallest even integer, count negative numbers, and compute the sum of the numbers that are divisible by 3 using recursion. Thus, you will create recursive methods findMin, computeSmallestEven, countNegativeNumbers, and computeSumOfNumbersDivisibleBy3 in Assignment9 class and they will be called by a main method.\n\nSpecifically, the following recursive methods must be implemented (These methods should not contain any loop):\n\npublic static int findMin(int[] numbers, int startIndex, int endIndex)\n\npublic static int computeSmallestEven(int[] elements, int startIndex, int endIndex)\n\npublic static int countNegativeNumbers(int[] elements, int startIndex, int endIndex)\n\npublic static int computeSumOfNumbersDivisibleBy3(int[] elements, int startIndex, int endIndex)\n\nIf these methods are implemented using a Loop or any Static Variable, points will be deducted (from the test cases) even if your program passes test cases. DO NOT use any Static Variables.\n\nThe program should output the results of those calculations to standard output. Your program will continue to read in numbers until the number 0 is entered. At this point, the calculations will be outputted in the following format:\n\nThe minimum number is 0\n\nThe smallest even integer in the sequence is 0\n\nThe count of negative integers in the sequence is 0\n\nThe sum of numbers that are divisible by 3 is 0\n\nNote that the result values will be different depending on test cases (not always 0).\n\nDo not output a prompt to query for the numbers. The number 0 is included in the sequence of numbers and should be included in all of your calculations."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8794793,"math_prob":0.9041129,"size":3160,"snap":"2022-05-2022-21","text_gpt3_token_len":651,"char_repetition_ratio":0.115652725,"word_repetition_ratio":0.039447732,"special_character_ratio":0.19810127,"punctuation_ratio":0.0979021,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96543396,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-25T19:49:05Z\",\"WARC-Record-ID\":\"<urn:uuid:ecdb3fdc-14e3-489b-8c95-8278cda36fdc>\",\"Content-Length\":\"45808\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d783af30-340c-4950-a302-50c4cc0a880d>\",\"WARC-Concurrent-To\":\"<urn:uuid:b2d02d94-ed4f-4257-972a-96169cd08fcc>\",\"WARC-IP-Address\":\"162.0.227.168\",\"WARC-Target-URI\":\"https://customessaywritingservices.net/assignment9-computer-science-homework-help/\",\"WARC-Payload-Digest\":\"sha1:AHKMXUIQICEJ66MCOXHBJYLRNBWCUVBU\",\"WARC-Block-Digest\":\"sha1:33HAOOISCUNRVXLTBKCOGGPFYAKK73HC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304872.21_warc_CC-MAIN-20220125190255-20220125220255-00681.warc.gz\"}"} |
https://scienceblogs.com/builtonfacts/2009/07/12/sunday-function-39 | [
"# Sunday Function\n\nLast week we did the sinc function. Let's do it again!\n\nThe function, to refresh our collective memory, is this:",
null,
"Now I was thinking about jumping right into some contour integration, but on actually doing it again I see that it's a little hardcore for one post so eventually when we do it we'll have to stretch it out over probably three posts. Probably it'll be a Friday-Saturday thing culminating on an official Sunday Function. But it ain't gonna be this week. This week we're going to do three ways of computing a limit. There's more, a bunch more, but we're going to just do three.\n\nAs we noted last week, we can't just plug in x = 0 to our function. If we do we're dividing by zero, which is not possible. For some reason this is a frequent point of dissent among, uh, certain varieties of amateur mathematicians. But if you're working with the plain ol' real numbers, satisfying the usual axioms, there's no consistent way to define it. On the other hand there's no reason we can't just say f(x) equals the rule above, except at the point x = 0. Which we can define to 0 or 1 or a billion or pi or whatever the heck we want. We would like for our definition to make sense and be continuous, fitting in with the rest of the function. From the graph we expect we should probably define f(0) = 1, but we'd like to prove it. Is f(x) really getting closer and closer to 1 as x gets closer and closer to 0?\n\nMethod 1: Wildly unwarranted surmise.\nThis is where we plug in numbers close to 0 and see what happens. Shall we?\n\nf(1) = 0.8414709848\nf(0.1) = 0.9983341665\nf(0.01) = 0.9999833334\nf(0.001) = 0.9999998333\nf(0.0001) = 0.9999999983\n\nWell that's suggestive if nothing else. Though we won't do it, it's true that you'll get the same numbers if you do the calculations with the negative numbers -0.01, etc so the limit appears to be the same on both sides. Rigorous it's not. So let's move on.\n\nMethod 2: Series expansion.\n\nLike all functions*, the sine function can be expressed as an infinite sum of polynomials. For now we won't pause to derive this, but this expression is true:",
null,
"We're dividing this by x, and fortunately that's just the same as multiplying by 1/x which is easy. This will give us this nice expression:",
null,
"No, no, don't let your eyes glaze over! Instead, just look at that rightmost sum after the equals. There's the number 1, and then a bunch of terms in x. But we're looking to see what happens as x goes to 0. And clearly that means all those x terms themselves go to zero, leaving behind that lonely number 1. Ladies and gentlemen, that is an honest to goodness proof.\n\nMethod 3: l'Hopital's Mathematical Hospital.\n\nEarly in the first calculus class, you'll learn that it's possible to figure out something about these kinds of problems using derivatives. Roughly speaking given two functions g and h that are both 0 at x = 0 (as ours are), then:",
null,
"In our case g(x) = sin(x) and h(x) = x. Doing the differentiation,",
null,
"Exactly the same as with methods 1 and 2.\n\nWhew! We're done for the moment. We could come up with a few more methods if we wanted, but there comes a point when the lily has been guilded to death. With that, we'll call it a day.\n\n*This statement has not been evaluated by the AMS and is not intended to prove, demonstrate, or verify any theorem.\n\nTags\nCategories\n\n### More like this\n\n##### Sunday Function\nBefore her career took an unfortunate wrong turn, a young and talented Lindsay Lohan gave us a charming and popular comedy called Mean Girls. Time has been good to the careers of some of the others involved, Tiny Fey and Rachel McAdams perhaps most notably. But the film did something that very…\n##### Sunday Function\nHere's a straightforward function of two variables, x and y: Its domain is all real x and y, with the single exception of x = y = 0, which would make the denominator 0. But we have experience with functions such as sin(x)/x, where we can find the limiting value as x approaches 0 and just make a…\n##### Sunday Function\nEdit: The previous version of this post required some fixing, as I boneheadedly mixed up the O and Ω notations. The rest of it should still be good. When you invest in stocks, bonds, mutual funds, or just about any other major investment vehicle, you'll hear a standard but important disclaimer. \"…\n##### Sunday Function\n\"So,\" Herr Schrodinger says to us, \"I'm looking for a function of x. It needs to be equal to the negative of its second derivative, up to a constant factor. When x is zero, the function itself should be zero. And when x equals L for some constant L greater than zero, the function also needs to…\n\nThere's just one small problem with the proofs: they are built on the fact that you know what the derivative of the sine is, and you can't show that in a rigorous fashion without knowing the limit... They're good ways of remembering what the limit is, but proofs they're not.\n\nBy Anders Jonsson (not verified) on 12 Jul 2009 #permalink\n\nGood point, but there's a way around it without doing the standard geometric construction. In higher math, it's not unusual to define the sine and cosine functions in terms of their power series. Since by definition sin(x) = that series, it goes without proof. The price you pay for that is that you have to work backwards and show that those power series satisfy the \"usual\" properties of the trig functions. But since we're not interested in those properties we don't have to worry about that part.\n\nSo what does it mean to say that the left hand side of an equation is equal to the right hand side? It seems a bit strange that two functions can be equal when they are defined on different sets (as when the LHS not defined at x=0 and the RHS is).\n\nBy Luke Shingles (not verified) on 12 Jul 2009 #permalink\n\nHow obvious is it really that, as x tends to zero, the series tends to zero - there are after all infinitely many terms there? I can give examples of series where the terms all go to zero but the sum does not so there must be something else working for you here.\n\nBy kiwi (not verified) on 12 Jul 2009 #permalink\n\n#3: You're right, formally the RHS isn't defined at x = 0. Fortunately we don't need it to be. We're just using it to show that the limit as x approaches zero exists and is equal to 1. Think of it as a single-point form of analytic continuation.\n\n#4: The limit of a sum is the sum of the limits, provided those limits exist. This is true even with infinite series (unless I'm badly mistaken, which has happened before). I'd love to see your example though, as my being proved wrong in this case is likely to be extremely interesting.\n\nYou should have said \"analytic functions\". Your * does not get you off the hook for \"all functions\". Not even close.\n\n@1 misses the point that the properties of sin(x) are quite distinct from those of sinc(x). You can find the derivative of sin(x) without knowing the limit of sinc(x).\n\nBTW, that question and those of the other comments can be addresses by looking at something like g(x) = sin(x)/x^2. All of the arguments above lead to the conclusion that it diverges at the origin.\n\nLuke@3: The left hand side (the sinc function) is defined at x=0. It is defined to be 1. The proof shows this definition makes sense and that sinc(x) is continuous (and infinitely differentiable) at x=0.\n\nkiwi@4: The series for sinc has limit 1. What is more remarkable about the series for sin(x) is that it converges when x is *anything*. It converges when x is 100000. It converges to zero when x is any multiple of pi.\n\nWhat a score that AMS is here in Providence. I know right where it is on Charles St. in Providence near the USPS Turnkey office (029xx)\n\nAnd a friend of mine used to do the typesetting for AMS.\n\nBy examination you have six possible \"good\" answers at x = 0: -infinity, -1, 0, 1, infinity; undefined. Anything else is a privileged answer. \"Continuous and differentiable\" suggests 1 is the boojum at the singularity. However... does any other function with a 0/0 singularity not asymptote to 1 at either side? If that, then \"undefined.\" You cannot have a valued expression whose value depends on its neighborhood. 1 + 1 = 3 does not obtain for sufficiently large values of 1.\n\n(Excluding economists set to shout \"heteroskedasticity!\" when it empirically fails. Nobel Prize/Economics are awarded for that - Milton Friedman, \"Whip Inflation Now!\" and his Boys from Chicago deligting Augusto Pinchet; Merton, Scholes, and \"Long Term Capital Investment\").\n\nMatt,\n\nHere is an example of a series whose terms all tend to 0 as x tends to zero but the sum does not ...\n\n1/(1+x) = x/(1+x)(1+2x) + x/(1+2x)(1+3x) + x/(1+3x)(1+4x) + x/(1+4x)(1+5x) + ...\n\nTo verify the sum use partial fractions.\n\nBy kiwi (not verified) on 13 Jul 2009 #permalink\n\nCCPhysicist,\n\nYou'll get no argument from me about the complete implausibility of the power series for sin, its periodicity, vanishing at multiples of pi etc. It completely blows my mind every time I contemplate it, as does the convergence of the exponential series to ever smaller values as the argument becomes bigger and bigger (negatively speaking).\n\nI will argue with you about the independence of the derivative of sin and the limit of sinc. To the contrary, I think a good case could be made that they are equivalent.\n\nBy kiwi (not verified) on 13 Jul 2009 #permalink\n\nThe derivative involves a difference in the numerator, not a single function. They are closely related, but you can obtain the derivative of sin in general without ever dealing with its value at a specific point.\n\nBy CCPhysicist (not verified) on 13 Jul 2009 #permalink\n\nKiwi, I'm afraid we might be rapidly approaching areas of real/complex analysis that are beyond my limited skill. However, I believe I see a problem with the series you propose. While both sides are defined at x = 0, it's not possible to take a limit as x -> 0 on the RHS. In particular the function blows up for every x = -1/n. Any epsilon that's picked is going to have one of those 1/n explosions inside it.\n\nOk, change x to x^2 ...\n\n1/(1+x^2) = x^2/(1+x^2)(1+2x^2) + x^2/(1+2x^2)(1+3x^2) + x^2/(1+3x^2)(1+4x^2) + x^2/(1+4x^2)(1+5x^2) + ...\n\nIn general switching the order of two limits (which is what we are doing here) works only if the convergence of one of them is uniform with respect to the other. Method 2 works in your original post because the power series for sin converges uniformly in an interval about the origin. In fact power series always converge uniformly (and absolutely) so long as you stay away from the endpoints of the interval of convergence, which is way you can get away with almost anything.\n\nCCPhysicist, I don't really understand your statement. The derivative of sin at any point x is related to the value of the limit in question by the formula\n\nD sin(x) = (lim h->0 sin(h)/h) * cos(x).\n\nIf this limit is not 1 (which is the case if you use degrees instead of radians, and in fact this is the reason we use radians!) then the derivative of sin is not cos.\n\nBy kiwi (not verified) on 14 Jul 2009 #permalink\n\nAh. That makes sense from a complex analysis standpoint. 0 is still an accumulation point, with singularities popping up along the imaginary axis. That explains the issue - the behavior at 0 is essentially pathological.\n\nTreated purely as a real function that series is even more interesting, but my real analysis sucks so for the moment I'll have to file it away in the \"cool stuff to learn later\" bin.\n\nBut that was my point: You only need the limit of sinc(h), not the value of sinc(0), and you need this to get the derivative of sin(x) at *any* point, not just at the point where you might apply the hospital rule.\n\nBy CCPhysicist (not verified) on 15 Jul 2009 #permalink\n\nYou paint the lily not gild it, you gild gold.\n\nAlso, it's gild not guild\n\nShakespeare's King John, 1595:\n\nSALISBURY:\nTherefore, to be possess'd with double pomp,\nTo guard a title that was rich before,\nTo gild refined gold, to paint the lily,\nTo throw a perfume on the violet,\nTo smooth the ice, or add another hue\nUnto the rainbow, or with taper-light\nTo seek the beauteous eye of heaven to garnish,\nIs wasteful and ridiculous excess.\n\nBy Chris' Wills (not verified) on 18 Jul 2009 #permalink\n\n\"The limit of a sum is the sum of the limits, provided those limits exist. This is true even with infinite series (unless I'm badly mistaken, which has happened before). \"\n\nDepends.\n\nIt is only true within the radius of convergence of the series, and even then it depends on what kind of convergence. There is a theorem due to Riemann that if you rearrange the terms in a conditionally convergent series, you can make it converge to any value you want, or even to not converge at all (called, oddly enough, the Riemann Series theorem). The standard example of this is the alternating harmonic series.\n\nMost series we deal with in physics converge uniformly with an infinite radius, which is convenient, and it makes us get used to thinking that infinite series can be treated more or less like numbers or real functions. However, it is worth remembering that the power series for the logarithm is conditionally convergent within a finite radius.\n\nFor your statement to apply, you need your series to be analytic. It isn't hard to cook up one that isn't. The one usually discussed is exp(-1/x^2). All its derivatives are 0 at x=0 so the Taylor series expanded around 0 is 0 for all x. The function, however, is nonzero for x not equal to 0 so it disagrees with its series representation. This issue doesn't arise in the complex plane since if the Taylor series converges is always converges to the function value.\n\nSo there are two counterexamples. The limit of each term in the series representation is zero but it does not converge to the function value. And in the Riemann example, rearranging the terms does not change their individual limits, but it does change their sum.\n\nBy Paul Camp (not verified) on 19 Jul 2009 #permalink\n\nI am a bit late to respond to this contribution but I just discovered this web site. I liked your contributions and I thought the majority of your readers did too. For the sceptics and those who are not altogether happy about the two methods given by you, I should like to propose Method 3 to evaluate f(x) = sin(X)/X as X tends to 0. Perhaps this might appeal to some of your readers.\n\nA simple drawing could have simplified the things but this would have been difficult to reproduce, therefore I explain the sketch verbally. Here it is:\n\nDraw a couple of radii inside a unit circle centred at point O, such that the radii form an angle X at the centre O. Call these radii R1 and R2 and points made on the unit circle made by the radii R1 and R2 A and B respectively. Drop a perpendicular line from A on to the radius R2. Call the point which the perpendicular line makes with the radius R2, C. Now we have a right angled triangle OAC and by definition of âsinusâ function: sin(X) = AC/OA, or sin(X) = AC as OA=1. Now again by definition of angle X in radians: X=arc (AB)/ OA or X=arc (AB). Therefore: f(X) = AC/arc(AB).\n\nNow it can easily be observed that: AC â arc (AB), as X â0. Therefore, f(X) â 1. QED.\n\nBy Ender (not verified) on 09 Feb 2010 #permalink"
]
| [
null,
"http://scienceblogs.com/builtonfacts/wp-content/blogs.dir/477/files/2012/04/i-d4bb9fe09d6b78eb832985821d8a307f-1.png",
null,
"http://scienceblogs.com/builtonfacts/wp-content/blogs.dir/477/files/2012/04/i-88516ca505d84f969b7ab15a965c3fb3-2.png",
null,
"http://scienceblogs.com/builtonfacts/wp-content/blogs.dir/477/files/2012/04/i-d18063683dcc0d42b9be45451a84d1e3-3.png",
null,
"http://scienceblogs.com/builtonfacts/wp-content/blogs.dir/477/files/2012/04/i-8d7070ce28f0af28047c7a5fb8246d53-4.png",
null,
"http://scienceblogs.com/builtonfacts/wp-content/blogs.dir/477/files/2012/04/i-bb5c2c6b0452df43a61e3974bd9b473f-5.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.95299685,"math_prob":0.9539478,"size":12955,"snap":"2019-35-2019-39","text_gpt3_token_len":3175,"char_repetition_ratio":0.11860088,"word_repetition_ratio":0.023809524,"special_character_ratio":0.24693169,"punctuation_ratio":0.107234664,"nsfw_num_words":2,"has_unicode_error":false,"math_prob_llama3":0.9821718,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-17T04:39:11Z\",\"WARC-Record-ID\":\"<urn:uuid:73316959-adfc-4019-84e4-256fc636bedd>\",\"Content-Length\":\"76878\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8629c6ad-df2d-4435-b2ac-8f0e7ef3c234>\",\"WARC-Concurrent-To\":\"<urn:uuid:e07b3887-e3b2-4961-b005-891eda5026d1>\",\"WARC-IP-Address\":\"178.128.144.187\",\"WARC-Target-URI\":\"https://scienceblogs.com/builtonfacts/2009/07/12/sunday-function-39\",\"WARC-Payload-Digest\":\"sha1:WYZLB5UB24NDGXZ2PNWWO2SQ3V5EKOFF\",\"WARC-Block-Digest\":\"sha1:IXEO4E24IWVUGKRSWSGNYX4OV4KVYQOB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514573052.26_warc_CC-MAIN-20190917040727-20190917062727-00166.warc.gz\"}"} |
https://www.ideastatica.com/support-center/equilibrium-and-supporting-member | [
"### Choose language",
null,
"# Equilibrium and supporting member\n\n$$The internal forces in each node of the frame must be in equilibrium. Especially in the case of a continuous member, we need to carefully input internal forces to all members so the equilibrium is kept in the node..Let’s check an example of a connection of a loaded beam (B1) to a continuous column (C) with Loads in equilibrium option deactivated.",
null,
"After we Calculate the project, the results are provided in the 3D scene. All performed checks are satisfactory.",
null,
"Now, we will Copy the project and activate Loads in equilibrium. The table with Unbalanced forces appears. We can input internal forces on both ends of column C and check the equilibrium of input nodal forces.",
null,
"Again, we Calculate the CON2 project and we see that the welds did not pass the code check. The reason is the correct load action in the column that we considered this time.",
null,
"$$",
null,
""
]
| [
null,
"https://assets-us-01.kc-usercontent.com:443/1ca05609-4ad1-009e-bc40-2e1230b16a75/5e96b6e5-8f0b-4778-8f96-67d8674afa4e/equlibrium_0-0.png",
null,
"https://assets-us-01.kc-usercontent.com:443/1ca05609-4ad1-009e-bc40-2e1230b16a75/5e96b6e5-8f0b-4778-8f96-67d8674afa4e/equlibrium_0-0.png",
null,
"https://assets-us-01.kc-usercontent.com:443/1ca05609-4ad1-009e-bc40-2e1230b16a75/75475b40-b52f-4533-90ae-203695f1e55d/equlibrium_1-0.png",
null,
"https://assets-us-01.kc-usercontent.com:443/1ca05609-4ad1-009e-bc40-2e1230b16a75/4fe06e73-e751-4506-8a6b-6a48f328bd1a/equlibrium_2-0.png",
null,
"https://assets-us-01.kc-usercontent.com:443/1ca05609-4ad1-009e-bc40-2e1230b16a75/257581e8-120d-4cd3-b341-8c0b862602c9/equlibrium_3-0.png",
null,
"https://assets-us-01.kc-usercontent.com:443/1ca05609-4ad1-009e-bc40-2e1230b16a75/3261d882-aff7-49c3-aef1-1562ddb3dad2/campus%20icon-min.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8944381,"math_prob":0.94009537,"size":880,"snap":"2021-43-2021-49","text_gpt3_token_len":181,"char_repetition_ratio":0.14383562,"word_repetition_ratio":0.0,"special_character_ratio":0.19886364,"punctuation_ratio":0.088757396,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9683891,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,2,null,2,null,1,null,1,null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-18T04:38:04Z\",\"WARC-Record-ID\":\"<urn:uuid:68c98d0f-4d33-4852-a37d-feef80c33778>\",\"Content-Length\":\"30063\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d6267668-2978-4de2-bb76-9331e7260da9>\",\"WARC-Concurrent-To\":\"<urn:uuid:0d220360-13b0-4fb8-bf2c-658332aee109>\",\"WARC-IP-Address\":\"51.124.97.46\",\"WARC-Target-URI\":\"https://www.ideastatica.com/support-center/equilibrium-and-supporting-member\",\"WARC-Payload-Digest\":\"sha1:YGRSMSVIX3CUTEI5JN5F3D7VMIGPJ3KD\",\"WARC-Block-Digest\":\"sha1:LITCG7AGMDOAI3PWXNUMEY5OTEKGOG75\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585196.73_warc_CC-MAIN-20211018031901-20211018061901-00320.warc.gz\"}"} |
https://tensegritywiki.com/w/index.php?title=Distance_Geometry&action=edit&section=2 | [
"# Distance Geometry\n\nJump to navigation Jump to search\n\n# Distance Geometry\n\nRead here about the relationship of tensegrity to distance geometry theories, possible a significant step towards comprehending the role of tensegrity in molecular geometry.\n\n# Overview\n\nTimothy Havel wrote:\n\nDistance geometry is the mathematical basis for a geometric theory of molecular conformation. This theory plays a role in conformational analysis analogous to that played in statistical mechanics by a hard-sphere fluid... which can in fact be regarded as the distance geometry description of a monoatomic fluid. More generally, a distance geometry description of a molecular system consists of a list of distance and chirality constraints. These are, respectively, lower and upper bounds on the distances between pairs of atoms, and the chirality of its rigid quadruples of atoms (i.e., R or S relative to some given order). The distance geometry approach is predicated on the assumption that it is possible to adequately define the set of all possible (i.e., significantly populated) conformations, or conformation space, of just about any nonrigid molecular system by means of such purely geometric constraints. By Occam’s razor, we contend that any properties of the system that can be explained by such a simple model should be explained that way.\n\nDistance geometry also plays an important role in the development of computational methods for analyzing distance geometry descriptions. The goal of these calculations is to determine the global properties of the entire conformation space, as opposed to the local properties of its individual members. This is done by deriving new geometric facts about the system from those given explicitly by the distance and chirality constraints, a process known more generally as geometric reasoning. Although numerous constraints can be derived from knowledge of the molecular formula, in many cases (e.g., globular proteins) additional noncovalent constraints are needed in order to define precisely the accessible conformation space. These must be obtained from additional experiments, and thus one of the best-known applications of distance geometry is the determination of molecular conformation from experimental data, most notably NMR spectroscopy. Other important applications include enumerating the conformation spaces of small molecules, ligand docking and pharmacophore mapping in drug design, and the homology modeling of protein structure.\n\nOne of the most significant developments in distance geometry over the last few years has been the realization that the underlying theory is actually a special case of a more general theory, known as geometric algebra. This more general theory is certain to find manifold applications in computational chemistry, not only in the analysis of simple geometric models of molecular structure, but also in more complete classical and even quantum mechanical models. \n\nGlobally rigid tensegrities... represent the 'boundaries' of the conformation space (i.e. internal configuration space) of a system of N points in a Euclidean space of arbitrarily high dimension. For this reason, and because the forces among a system of particles can be viewed as a stress in a tensegrity framework, tensegrtiy theory would seem to have a great deal to say about the classical N-body problem in mechanics.... these ideas might profitably be generalized to quantum N-body problems as well. \n\n# Links and References\n\n Distance Geometry: Theory, Algorithms, and Chemical Applications by Timothy F. Havel, Harvard Medical School, Boston, MA, USA The Role of Tensegrity in Distance Geometry by Havel, in Rigidity Theory and Applications"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9239813,"math_prob":0.954481,"size":3672,"snap":"2019-13-2019-22","text_gpt3_token_len":694,"char_repetition_ratio":0.14122137,"word_repetition_ratio":0.0036764706,"special_character_ratio":0.1764706,"punctuation_ratio":0.10828026,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9515166,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-23T04:59:51Z\",\"WARC-Record-ID\":\"<urn:uuid:ab4daefb-0f29-481a-a750-f7fc0b119d11>\",\"Content-Length\":\"25357\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3244869c-e80b-4fb6-b35c-f7b7c9764afe>\",\"WARC-Concurrent-To\":\"<urn:uuid:289e7fa2-a2a2-495b-aad9-b644389d614f>\",\"WARC-IP-Address\":\"107.191.126.23\",\"WARC-Target-URI\":\"https://tensegritywiki.com/w/index.php?title=Distance_Geometry&action=edit&section=2\",\"WARC-Payload-Digest\":\"sha1:ETGPCGXMI6L5H2HXSONPGO27C37NBK7S\",\"WARC-Block-Digest\":\"sha1:5CJLC2SG46RFXUXKCEMQFPMPQEJYP4PL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257100.22_warc_CC-MAIN-20190523043611-20190523065611-00069.warc.gz\"}"} |
https://www.ubcmathtutor.com/thinkific-integrals-videos | [
"",
null,
"# Vancouver Math andStatistics tutor\n\n## Vancouver math tutor,langara math tutor,ubc statistics tutor, ubc calculus tutor,vancouver statistics tutor,Langara Math 1152,1174,1274 tutor,Ubc Math 180,184,100,101,104,105,152,200,217,253,215,221,255,256 tutor,Vancouver Calculus tutor.\n\n### Integral Calculus Video previews on Thinkific\n\nThese Supplementary Video tutorials on Integral Calculus are designed for University students taking UBC Math 101, UBC Math 103, UBC Math 105, SFU Math 152, Langara Math 1271 and TRU Math 1241. The goal of these Calculus 2 Video tutorials is to reinforce the theoretical understanding of integration through solving a variety of different type of examples with step by step video solutions,\nThe first few videos in every module discuss the theoretical foundation of Integration and the latter videos within each module cover the more difficult applications . Check out some of the sample videos below.\n\nThank you for contacting us. We will get back to you as soon as possible\nOops. An error occurred.\n\n### DISCLAIMER\n\nThese sample videos and the corresponding Integral Calculus video tutorials are designed as a supplementary resource only and by no means designed to teach a course on Integral Calculus. My services as a private math tutor and entrepreneur is not affiliated with any University or College in Vancouver, and I am solely responsible for the content of this website.\n\n### University Math Tutor ( 16+ Years Experience )\n\nRichard's Tutoring Service : (604)-(318)-(1970)"
]
| [
null,
"https://mediaprocessor.websimages.com/fit/1920x1920/www.ubcmathtutor.com/1383591704350-1.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8753579,"math_prob":0.8263848,"size":1738,"snap":"2022-40-2023-06","text_gpt3_token_len":390,"char_repetition_ratio":0.13956171,"word_repetition_ratio":0.13688213,"special_character_ratio":0.23705408,"punctuation_ratio":0.13554217,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.954651,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-28T11:50:18Z\",\"WARC-Record-ID\":\"<urn:uuid:b3831ad9-0a27-48ae-8806-9ec23adf9e52>\",\"Content-Length\":\"52185\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7f3637b9-a959-4c7b-90aa-c7ba36d183a6>\",\"WARC-Concurrent-To\":\"<urn:uuid:dd1f0981-3228-4ec7-876a-757d49c484dd>\",\"WARC-IP-Address\":\"104.17.25.109\",\"WARC-Target-URI\":\"https://www.ubcmathtutor.com/thinkific-integrals-videos\",\"WARC-Payload-Digest\":\"sha1:YEZJE2MR54T2RKMQKLGMLWCCZ7UBGOGH\",\"WARC-Block-Digest\":\"sha1:7YOVPI7QQICQUTRSZSVEGOI5RGZ5GM7G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335254.72_warc_CC-MAIN-20220928113848-20220928143848-00735.warc.gz\"}"} |
https://www.percentagecal.com/answer/10-is-what-percent-of-%20250 | [
"#### Solution for 10 is what percent of 250:\n\n10: 250*100 =\n\n(10*100): 250 =\n\n1000: 250 = 4\n\nNow we have: 10 is what percent of 250 = 4\n\nQuestion: 10 is what percent of 250?\n\nPercentage solution with steps:\n\nStep 1: We make the assumption that 250 is 100% since it is our output value.\n\nStep 2: We next represent the value we seek with {x}.\n\nStep 3: From step 1, it follows that {100\\%}={ 250}.\n\nStep 4: In the same vein, {x\\%}={10}.\n\nStep 5: This gives us a pair of simple equations:\n\n{100\\%}={ 250}(1).\n\n{x\\%}={10}(2).\n\nStep 6: By simply dividing equation 1 by equation 2 and taking note of the fact that both the LHS\n(left hand side) of both equations have the same unit (%); we have\n\n\\frac{100\\%}{x\\%}=\\frac{ 250}{10}\n\nStep 7: Taking the inverse (or reciprocal) of both sides yields\n\n\\frac{x\\%}{100\\%}=\\frac{10}{ 250}\n\n\\Rightarrow{x} = {4\\%}\n\nTherefore, {10} is {4\\%} of { 250}.\n\n#### Solution for 250 is what percent of 10:\n\n250:10*100 =\n\n( 250*100):10 =\n\n25000:10 = 2500\n\nNow we have: 250 is what percent of 10 = 2500\n\nQuestion: 250 is what percent of 10?\n\nPercentage solution with steps:\n\nStep 1: We make the assumption that 10 is 100% since it is our output value.\n\nStep 2: We next represent the value we seek with {x}.\n\nStep 3: From step 1, it follows that {100\\%}={10}.\n\nStep 4: In the same vein, {x\\%}={ 250}.\n\nStep 5: This gives us a pair of simple equations:\n\n{100\\%}={10}(1).\n\n{x\\%}={ 250}(2).\n\nStep 6: By simply dividing equation 1 by equation 2 and taking note of the fact that both the LHS\n(left hand side) of both equations have the same unit (%); we have\n\n\\frac{100\\%}{x\\%}=\\frac{10}{ 250}\n\nStep 7: Taking the inverse (or reciprocal) of both sides yields\n\n\\frac{x\\%}{100\\%}=\\frac{ 250}{10}\n\n\\Rightarrow{x} = {2500\\%}\n\nTherefore, { 250} is {2500\\%} of {10}.\n\nCalculation Samples"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.84356755,"math_prob":0.9996933,"size":2100,"snap":"2022-05-2022-21","text_gpt3_token_len":730,"char_repetition_ratio":0.17223282,"word_repetition_ratio":0.41602066,"special_character_ratio":0.4552381,"punctuation_ratio":0.12938596,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999949,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-19T16:04:07Z\",\"WARC-Record-ID\":\"<urn:uuid:fd97b938-7b00-4e75-9ff0-0e322d90a454>\",\"Content-Length\":\"10274\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2344567c-4ec0-4dc5-9685-0d3dbc283729>\",\"WARC-Concurrent-To\":\"<urn:uuid:9dc8e860-9c4d-44a8-985a-cc238dfe93e8>\",\"WARC-IP-Address\":\"217.23.5.136\",\"WARC-Target-URI\":\"https://www.percentagecal.com/answer/10-is-what-percent-of-%20250\",\"WARC-Payload-Digest\":\"sha1:KEPYU5L76L6666OPBICQIBL4AJSLPWON\",\"WARC-Block-Digest\":\"sha1:AZJARMDXWBQ7TCBPQMIYJ5ASSQ2SLJKE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662529538.2_warc_CC-MAIN-20220519141152-20220519171152-00294.warc.gz\"}"} |
https://www.arxiv-vanity.com/papers/hep-ph/9706304/ | [
"# Maximizing Spin Correlations in Top Quark Pair Production at the Tevatron\n\nGregory Mahlon [*] Department of Physics, University of Michigan\n500 E. University Ave., Ann Arbor, MI 48109\nStephen Parke [] Fermi National Accelerator Laboratory\nP.O. Box 500, Batavia, IL 60510\nJune 6, 1997\n###### Abstract\n\nA comparison is made between the off-diagonal and helicity spin bases for top quark pair production at the FNAL Tevatron. In the off-diagonal basis, 92% of the top quark pairs are in the spin configuration up-down plus down-up, whereas in the helicity basis only 70% are left-right plus right-left. The off-diagonal basis maximizes the spin asymmetry and hence the measured angular correlations between the decay products, which are more than twice as big in this basis as compared to the helicity basis. In addition, for the process , we give a very simple analytic expression for the matrix element squared which includes all spin correlations between the production and subsequent decay of the top quarks.\n\n###### pacs:\npreprint: Fermilab–Pub–97/185-T UM–TH–97–09 hep-ph/9706304\n\nSince the discovery of the top quark in 1995, a number of authors [4, 5, 6] have revisited the question of spin correlations in top quark pair production at the FNAL Tevatron. (References to the extensive literature of earlier works can be found in these recent papers.) With its high mass of about 175 GeV, the top quark decays before it hadronizes . Thus, the decay products of a top quark produced in a definite spin state will have characteristic angular correlations. The reason for these new studies is the realization that the number of like-spin and unlike-spin top quark pairs can be made significantly different by an appropriate choice of spin basis. Both Mahlon and Parke and Stelzer and Willenbrock discussed the spin asymmetry using the helicity basis for the Tevatron. However, the top quarks produced at the Tevatron are not ultra-relativistic; therefore, the helicity basis is probably not the optimal basis for these studies at this machine. Consequently, Ref. went on to consider the beamline basis, which is more suitable for spin studies near threshold, and found larger effects at the Tevatron in this basis. The question remained, however: what is the optimal spin basis for these correlation studies? We now have an answer to this question.\n\nRecently Parke and Shadmi studied the spin correlations for the process and showed that you can choose a spin basis in which the like spin components, up-up (UU) and down-down (DD), identically vanish. They have called this spin basis the off-diagonal basis. In a footnote these authors briefly applied this result to , which is the dominant top quark production process at the Tevatron. The purpose of this letter is to study the process in more detail, comparing the off-diagonal basis to the more traditional helicity basis. Although the type of analysis described in Ref. can also be applied to the initial state, the dominant production mechanism at the LHC, we find that no significant improvements over the helicity basis are possible at the LHC. At the Tevatron111Throughout this paper, we take the center of mass energy for the collisions to be 2.0 TeV. We use a top quark mass of 175 GeV, boson mass of 80 GeV, and employ the MRS(R1) structure functions evaluated at the scale . however, the process dominates, accounting for approximately 88% of the total cross section. Thus, we will concentrate our analytic discussions on that process. Our numerical results, however, include both the and initial states.\n\nIn this letter, we present the production density matrix for in the off-diagonal basis and contrast it with the known result for the helicity basis. Then we obtain a surprisingly simple and compact expression for the production and decay of a pair of top quarks from a quark-antiquark initial state which includes all of the correlations among the particles. We also show that the interference terms for the off-diagonal basis are substantially smaller than for the helicity basis at the Tevatron. Finally, we apply this basis to spin correlation studies at the Tevatron, where we find that in the off-diagonal basis, 92% of the pairs produced at the Tevatron have unlike spins. This represents a significant improvement over the helicity basis, in which only 70% of the pairs have unlike helicities. As a result, the correlations obtained in the off-diagonal basis are more than twice as big as those in the helicity basis.\n\nIn Fig. 1 the spatial part of the top quark momenta () and spin vectors () are given for the process in the zero momentum frame (ZMF) of the incoming quarks. What was shown in Ref. is that the spin projections of the top-antitop pair in are purely up-down and down-up if the spin vectors make an angle with respect to the beam axis. This angle is given by\n\n tanψ=β2sqtcqt1−β2s2qt, (1)\n\nwhere is the speed of the top quarks in the ZMF.222The angle is related to the angle introduced by Tsai for . Throughout this paper we use the notation and to denote the sine and cosine of the angle between the momenta of particles and in the ZMF: hence, is the cosine of the top quark scattering angle (often denoted by ). Note that near threshold the spin vectors are aligned along the beam direction and that at very high energies they are aligned along the direction of the top and antitop momenta.\n\nFor the off-diagonal basis, the production density matrix averaged over the color and spin of the incoming quarks is given by333 The phases of the non-diagonal terms of the production density matrix are dependent on many of our conventions, which we have chosen to make the phases as simple as possible. We take the 31 plane to be the scattering plane with the top quark direction the 1 axis. We use the conventions of with the spinor products singular along the minus 2 direction and for positive energy light-like vectors and .\n\n ∑Mλ¯λM∗λ′¯λ′=g4s9⎡⎢ ⎢ ⎢ ⎢⎣000002−β2s2qtβ2s2qt00β2s2qt2−β2s2qt00000⎤⎥ ⎥ ⎥ ⎥⎦. (2)\n\nThe matrix element for the production of a quark with spin and a quark with spin is , and is the strong coupling constant. The ordering of the columns and rows in (2) is (UU,UD,DU,DD). This production density matrix is very simple because in the off-diagonal basis the amplitudes with like spins, UU and DD, vanish identically. Also note that the non-diagonal terms have an explicit factor of .\n\nIn contrast, the same production density matrix in terms of the helicity basis reads \n\n ∑Mλ¯λM∗λ′¯λ′=g4s9⎡⎢ ⎢ ⎢ ⎢ ⎢ ⎢⎣s2qt/γ2−sqtcqt/γsqtcqt/γs2qt/γ2−sqtcqt/γ2−s2qts2qt−sqtcqt/γsqtcqt/γs2qt2−s2qtsqtcqt/γs2qt/γ2−sqtcqt/γsqtcqt/γs2qt/γ2⎤⎥ ⎥ ⎥ ⎥ ⎥ ⎥⎦, (3)\n\nwhere is the usual Lorentz boost factor. The columns and rows of this matrix have been ordered (RR,RL,LR,LL), with obvious notations for right and left helicities.\n\nIn the off-diagonal spin basis, the non-diagonal terms of the production density matrix are at least a factor of times smaller than for the helicity basis. For the Tevatron at 2 TeV this corresponds to a factor of typically 0.3 to 0.4. Furthermore, the terms lying on the edges of the production density matrix in the helicity basis are not very strongly suppressed compared to the diagonal terms, as is only 1.2 to 1.3 at these values of . These properties of the two matrices translate into smaller interference terms in the off-diagonal basis once the decays are included.\n\nUsing either of the above production density matrices and the corresponding decay density matrices, the total matrix element squared for the production and decay process444 We have assumed that the decays of both -bosons are leptonic. To change one or both of the -boson decays to a hadronic decay, replace the charged lepton with a down type quark and the neutrino with an up type quark. This will preserve all correlations. averaged over the initial quark’s color and spin and summed over the final colors and spins is given by\n\n ∑ |M|2= (4) g4s9T¯T{(2−β2s2qt)−(1−c¯eqcμ¯q)−β(cμ¯t+c¯et)+βcqt(c¯eq+cμ¯q)+12β2s2qt(1−c¯eμ)γ2(1−βc¯et)(1−βcμ¯t)}.\n\nThe factor comes from the decay of the top quark ():\n\n T=g4W4m2tΓ2t(m2t−2¯e⋅ν)m2t(1−^c2¯eb)+(2¯e⋅ν)(1+^c¯eb)2(2¯e⋅ν−m2W)2+(mWΓW)2, (5)\n\nwhere is the cosine of angle between and in the rest frame, is the invariant mass of the positron and neutrino, and are the masses and widths of the top quark and -boson respectively, and is the weak coupling constant. Apart from the factor , which comes from the top quark propagator, is just the matrix element squared for unpolarized top quark decay. Likewise, is from the antitop decay ():\n\n ¯T=g4W4m2tΓ2t(m2t−2μ⋅¯ν)m2t(1−^c2μ¯b)+(2μ⋅¯ν)(1+^cμ¯b)2(2μ⋅¯ν−m2W)2+(mWΓW)2, (6)\n\nwhere is the cosine of angle between and in the rest frame, and is the invariant mass of the muon and anti-neutrino. Eq. (4) agrees with the results of Kleiss and Stirling for on mass shell top quarks and massless -quarks555 Inclusion of the finite mass effects for the -quarks would result in straightforward but messy modifications to Eqs. (5) and (6). The size of these effects is typically less than 1%. independent of whether or not the -bosons are on or off mass shell.\n\nIf we did not include the spin correlations between production and decay, the total matrix element squared would be simply . Thus, all of the correlations between the production and decay of the top quarks are contained in the second term inside the braces of Eq. (4). It is noteworthy that of the six final state particles, only the directions of the two charged leptons are required in addition to the directions of the and to fully specify these correlations. For the up-down spin configuration, the preferred emission directions for the charged leptons are for the positron and for the muon: for the down-up configuration they are and (see Fig. 1). These light-like vectors make an angle with respect to the beam axis given by\n\n sinω=βsqt, (7)\n\nand their energy components are .\n\nIn the off-diagonal spin basis the interference terms (i.e. those terms in Eq. (4) coming from the non-diagonal pieces of the production density matrix) are\n\n Io=g4sT¯T9γ2(1−βc¯et)(1−βcμ¯t)β22 [(c¯et−cqtc¯eq−βs2qt)(cμ¯t−cqtcμ¯q−βs2qt)/(1−β2s2qt) (8) +(c¯et−cqtc¯eq)(cμ¯t−cqtcμ¯q)+s2qt(c¯eμ+c¯eqcμ¯q)],\n\nwhereas for the helicity basis the interference terms are\n\n Ih=g4sT¯T9γ2(1−βc¯et)(1−βcμ¯t) [(βcqt−c¯eq)(βcqt−cμ¯q) (10) −c2qt(β−c¯et)(β−cμ¯t)+12β2s2qt(c¯eμ+c¯etcμ¯t)].\n\nHere we see again that the interference terms are a factor of smaller for the off-diagonal spin basis than the helicity basis. This point may be illustrated by plotting the distribution in : for each phase space point we compute the value of the interference term and divide by the total matrix element squared at that point. Because the total matrix element squared can range from 0 (maximal destructive interference) to (maximal constructive interference), the variable must lie in the interval . The resulting differential distributions for both bases at the Tevatron is shown in Fig. 2. In the off-diagonal basis, resembles a sharp spike: in fact, 90% of the cross section comes from points where . In contrast, only about half of the cross section comes from this region in the helicity basis. To enclose 90% of the cross section in the helicity basis, we must expand the range to . Clearly, the interference terms are much less important in the off-diagonal basis than in the helicity basis. Thus, the off-diagonal basis provides a far superior description of the process at this accelerator.\n\nIn Fig. 3 we show the breakdown of the total cross section into like- and unlike-spin pairs using the off-diagonal basis versus the invariant mass for the Tevatron. We find that 92% of the pairs produced have unlike spins (UD+DU) in this basis. In contrast, only 70% of the pairs have unlike helicities.666The value of 67% unlike helicities we quoted in Ref. is based on an older set of structure functions, which contained a somewhat larger gluon component. The distributions we consider are not significantly affected by the choice of structure functions. Note that we have chosen spin combinations which are insensitive to which beam donated the quark in .\n\nTo observe the resulting correlations between the decay products of the top and the antitop, we proceed as described in Ref. . Suppose that the th decay product of the top quark is emitted at an angle with respect to the top spin axis in the top rest frame, and that the th decay product of the antitop is emitted at an angle with respect to the antitop spin axis in the antitop rest frame. We tag the top quark in a particular event as having spin up if , and as having spin down otherwise. The angular distribution of the th decay product in this situation is\n\n (11)\n\nwhere is the fractional purity of the unlike-spin component of the sample of events. The ’s (’s) are the correlation coefficients from the decay distribution of a polarized top (antitop) and take on the values , , and for the decay of a 175 GeV spin-up top quark. The ’s for spin-down top quarks have opposite sign. The correlation coefficients for a spin up (spin down) antitop are the same as for a spin down (spin up) top quark.\n\nBecause the boson has primarily hadronic decays, it is useful to have a method to probabilistically determine which of the two jets in such a decay was initiated by the down-type quark. As explained in Ref. , the jet which lies closest to the -quark direction as viewed in the rest frame is most likely the -type quark. The probability that this identification is correct is , and equals 0.61. The effective correlation coefficient for this “d”-type quark is given by , or about .\n\nSince the coefficient of governs the size of the observable correlations, it is desirable to make it as large as possible. Thus, we should choose to work in the off-diagonal basis where is instead of the helicity basis where is only . The other two factors, and depend on which top decay product is used to tag the top quark spin, and which antitop decay product angular distribution is generated. The largest correlations are clearly between the two charged leptons. For the same pair of decay products, the correlations are more than twice as large in the off-diagonal basis as in the helicity basis.\n\nIn Fig. 4 we show results of a first-pass Monte Carlo study of the correlations at the parton level without any hadronization or jet energy smearing effects included. We required all final state particles to satisfy the cuts , . Plotted in this figure are the angular distributions for various antitop decay products for samples tagged as containing spin up or spin down top quarks. In the absence of correlations, the two curves in each section of the figure would lie on top of each other. Even in the presence of the cuts, the off-diagonal basis still produces correlations more than twice as large as those in the helicity basis.\n\nOne advantage of the off-diagonal basis which is readily apparent from Fig. 4 is that the cuts affect the spin-up and spin-down samples in a symmetric manner: i.e. the two curves remain reflections of each other about the point . Consequently, there is no systematic bias introduced between the two data sets when using this basis. The same is not true in the helicity basis: our cuts are slightly more likely to exclude left-handed helicity top quarks than right-handed, and the two angular distributions acquire different shapes .\n\nIn conclusion, we have shown that the off-diagonal basis of Parke and Shadmi enjoys several advantages over the more traditional helicity basis when applied to a study of angular correlations in top quark pair production at the FNAL Tevatron. Firstly, the vanishing of the amplitude for the production of like spin top pairs from quark-antiquark annihilation leads to a total cross section consisting of 92% unlike spin pairs in the off-diagonal basis. This is significantly better than the 70% unlike helicity pairs obtained in the helicity basis. Secondly, most of the non-diagonal terms in the production density matrix vanish in the off-diagonal basis. Those non-diagonal terms which are not zero are suppressed by a factor of . No such simplicity exists in this matrix in the helicity basis. As a result, the contributions attributed to interference terms in the off-diagonal basis are far less important than those in the helicity basis. Thirdly, the larger production asymmetry of the off-diagonal basis translates into angular correlations among the and decay products which are more than double those in the helicity basis. And, finally, the kinds of experimental cuts which are typically imposed on collider data do not introduce a systematic bias between spin up and spin down top quarks in the off-diagonal basis. The same is not true in the helicity basis. These advantages make the off-diagonal basis the basis of choice for correlation studies at the Tevatron.\n\n###### Acknowledgements.\nThe Fermi National Accelerator Laboratory (FNAL) is operated by Universities Research Association, Inc., under contract DE-AC02-76CHO3000 with the U.S. Department of Energy. High energy physics research at the University of Michigan is supported in part by the U.S. Department of Energy, under contract DE-FG02-95ER40899.\n\n## References\n\n• [*] Electronic address:\n• [†] Electronic address:\n• F. Abe, et. al., Phys. Rev. Lett. 74, 2626 (1995); S. Abachi, et. al., Phys. Rev. Lett. 74, 2632 (1995).\n• G. Mahlon and S. Parke, Phys. Rev. D53, 4886 (1996).\n• T. Stelzer and S. Willenbrock, Phys. Lett. B374, 169 (1996).\n• A. Brandenburg, Phys. Lett. B388, 626 (1996); D. Chang, S.–C. Lee, and A. Sumarokov, Phys. Rev. Lett. 77, 1218 (1996); 77, 3941(E) (1996); K. Cheung, Phys. Rev. D55, 4430 (1997).\n• I. Bigi, Y. Dokshitzer, V. Khoze, J. Kühn, and P. Zerwas, Phys. Lett. 181B, 157 (1986).\n• S. Parke and Y. Shadmi, Phys. Lett. B387, 199 (1996).\n• A.J. Martin, R.G. Roberts and W.J. Stirling, Phys. Lett. B387, 419 (1996).\n• Y.S. Tsai, Phys. Rev. D51, 3172 (1995).\n• S.–C. Lee, Phys. Lett. 189B, 461 (1987).\n• R. Kleiss and W. J. Stirling, Z. Phys. C 40, 419 (1988).\n• M. Jeżabek and J.H. Kühn, Phys. Lett. B329, 317 (1994).\n\nWant to hear about new tools we're making? Sign up to our mailing list for occasional updates.\n\nIf you find a rendering bug, file an issue on GitHub. Or, have a go at fixing it yourself – the renderer is open source!\n\nFor everything else, email us at [email protected]."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9070632,"math_prob":0.9566533,"size":17132,"snap":"2021-21-2021-25","text_gpt3_token_len":4001,"char_repetition_ratio":0.19301729,"word_repetition_ratio":0.047994513,"special_character_ratio":0.22840299,"punctuation_ratio":0.115110055,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96773076,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-21T21:52:15Z\",\"WARC-Record-ID\":\"<urn:uuid:49f613a4-e846-44a2-b0b4-bf02d35ba8db>\",\"Content-Length\":\"435053\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:541a1490-feae-494a-bb35-2e3a6d96ae37>\",\"WARC-Concurrent-To\":\"<urn:uuid:24a6cbd5-ef3a-4f19-b394-12a09ca94f9d>\",\"WARC-IP-Address\":\"172.67.158.169\",\"WARC-Target-URI\":\"https://www.arxiv-vanity.com/papers/hep-ph/9706304/\",\"WARC-Payload-Digest\":\"sha1:AAUNRWRJMF6V6AWNNB6RBBAFIJCO3NT6\",\"WARC-Block-Digest\":\"sha1:3LSGQCZYWCC2X463KRKCO4EQN4LOGFMB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488504838.98_warc_CC-MAIN-20210621212241-20210622002241-00418.warc.gz\"}"} |
https://www.zbmath.org/?q=an%3A0581.47034 | [
"## Regularized function of spectral shift for the one-dimensional Schrödinger operator with slowly decreasing potential.(Russian)Zbl 0581.47034\n\nThe paper refers to the one-dimensional Schrödinger operator with slowly decreasing potential, i.e. like $$X^{-\\alpha}$$ for $$\\alpha >1/2$$. One proves that: if $$H_ 0$$ is an autoadjoint operator generated by $$- d^ 2/dx^ 2$$ under the boundary condition $$\\psi (0)=0$$ and V is the multiplication operator on real function v with $| d^ jv(x)/dx^ j| \\leq C(1+x)^{-\\alpha -j},\\quad \\alpha >1/2,\\quad j=0,1,2$ then to $$H_ 0$$ and V corresponds a function $$\\eta$$ of spectral shift which is differentiable and for which holds $$\\eta '(\\lambda)=\\pi^{-1}\\theta (\\sqrt{\\lambda})$$ if $$\\lambda >0$$, and $$=-N(\\lambda)$$ if $$\\lambda <0$$, N($$\\lambda)$$ and $$\\theta$$ ($$\\sqrt{\\lambda})$$ being defined in the proof.\nReviewer: C.Simionescu\n\n### MSC:\n\n 47F05 General theory of partial differential operators 47A10 Spectrum, resolvent\nFull Text:"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7509915,"math_prob":0.9999831,"size":1297,"snap":"2022-27-2022-33","text_gpt3_token_len":419,"char_repetition_ratio":0.10440835,"word_repetition_ratio":0.06214689,"special_character_ratio":0.34926754,"punctuation_ratio":0.16470589,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99998,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-02T23:08:20Z\",\"WARC-Record-ID\":\"<urn:uuid:12274566-4385-415b-bac2-16c99e12310b>\",\"Content-Length\":\"50476\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1d0db8c4-146c-4609-9dca-d19e70e485bd>\",\"WARC-Concurrent-To\":\"<urn:uuid:93886312-7061-4453-83b3-351a5c1a9490>\",\"WARC-IP-Address\":\"141.66.194.3\",\"WARC-Target-URI\":\"https://www.zbmath.org/?q=an%3A0581.47034\",\"WARC-Payload-Digest\":\"sha1:FDA5MPXF6OMGUUJBI52YWSERBE3PZXYK\",\"WARC-Block-Digest\":\"sha1:43A6ZTJ5KQNZLTSC7KJIDBHYJ3UAG2QF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104205534.63_warc_CC-MAIN-20220702222819-20220703012819-00763.warc.gz\"}"} |
https://mainthebest.com/sizes/f-series-paper-sizes/ | [
"# F Series Paper Sizes\n\nBy: - Last Updated: 18 October, 2020",
null,
"The F Series Paper Sizes is one of a transitional sheet sizes. It is a Hypothetic F4-based series, and it shows how this format can be generalized into an entire format series. This series includes F0, F1, F2, F3, F4, F5, F6, F7, F8, F9, F10. The size called F4 sometimes called Folio in some countries, while others sometimes also called Foolscap and Long Bond.\n\n## List of Contents:\n\nF4 paper size is common in Southeast Asia. It is a transitional size with the shorter side from ISO A4 and the longer side from British Foolscap and is sometimes known as foolscap or folio as well. In some countries, F4 paper size is 215 × 330 mm. In Indonesia it is sometimes called Folio, while in Philippines it is sometimes also called Long Bond. A sheet of F4 can be cut from a sheet of SRA4, The size is also smaller than its Swedish equivalent SIS F4 at 239 mm × 338 mm.\n\n### F0 Paper Size\n\nThe dimension of F0 Paper Sizes in mm, cm, inch:\n\n• F0 Size in mm is 841 × 1321 millimeter.\n• F0 Size in cm is 84.1 × 132.1 centimeter.\n• F0 Size in inch is 33.1 × 52 inches.\n\n### F1 Paper Size\n\nThe dimension of F1 Paper Sizes in mm, cm, inch:\n\n• F1 Size in mm is 660 × 841 millimeter.\n• F1 Size in cm is 66 × 84.1 centimeter.\n• F1 Size in inch is 26 × 33.1 inches.\n\n### F2 Paper Size\n\nThe dimension of F2 Paper Sizes in mm, cm, inch:\n\n• F2 Size in mm is 420 × 660 millimeter.\n• F2 Size in cm is 42 × 66 centimeter.\n• F2 Size in inch is 16.5 × 26 inches.\n\n### F3 Paper Size\n\nThe dimension of F3 Paper Sizes in mm, cm, inch:\n\n• F3 Size in mm is 330 × 420 millimeter.\n• F3 Size in cm is 33 × 42 centimeter.\n• F3 Size in inch is 13 × 16.5 inches.\n\n### F4 Paper Size\n\nThe dimension of F4 Paper Sizes in mm, cm, inch:\n\n• F4 Size in mm is 210 × 330 millimeter.\n• F4 Size in cm is 21 × 33 centimeter.\n• F4 Size in inch is 8.27 × 13 inches.\n\n### F5 Paper Size\n\nThe dimension of F5 Paper Sizes in mm, cm, inch:\n\n• F5 Size in mm is 165 × 210 millimeter.\n• F5 Size in cm is 16.5 × 21 centimeter.\n• F5 Size in inch is 6.5 × 8.27 inches.\n\n### F6 Paper Size\n\nThe dimension of F6 Paper Sizes in mm, cm, inch:\n\n• F6 Size in mm is 105 × 165 millimeter.\n• F6 Size in cm is 10.5 × 16.5 centimeter.\n• F6 Size in inch is 4.13 × 6.5 inches.\n\n### F7 Paper Size\n\nThe dimension of F7 Paper Sizes in mm, cm, inch:\n\n• F7 Size in mm is 82 × 105 millimeter.\n• F7 Size in cm is 8.2 × 10.5 centimeter.\n• F7 Size in inch is 3.25 × 4.13 inches.\n\n### F8 Paper Size\n\nThe dimension of F8 Paper Sizes in mm, cm, inch:\n\n• F8 Size in mm is 52 × 82 millimeter.\n• F8 Size in cm is 5.2 × 8.2 centimeter.\n• F8 Size in inch is 2.05 × 3.25 inches.\n\n### F9 Paper Size\n\nThe dimension of F9 Paper Sizes in mm, cm, inch:\n\n• F9 Size in mm is 41 × 52 millimeter.\n• F9 Size in cm is 4.1 × 5.2 centimeter.\n• F9 Size in inch is 1.61 × 2.05 inches.\n\n### F10 Paper Size\n\nThe dimension of F10 Paper Sizes in mm, cm, inch:\n\n• F10 Size in mm is 26 × 41 millimeter.\n• F10 Size in cm is 2.6 × 4.1 centimeter.\n• F10 Size in inch is 1.02 × 1.61 inches.\n\n### Table of The F Series Paper Sizes\n\nHere is a Table of The F Series Paper Sizes in unit of measurements in mm, cm, inch.\n\n F Sizes mm cm inches F0 841 × 1321 84.1 × 132.1 33.1 × 52 F1 660 × 841 66 × 84.1 26 × 33.1 F2 420 × 660 42 × 66 16.5 × 26 F3 330 × 420 33 × 42 13 × 16.5 F4 210 × 330 21 × 33 8.27 × 13 F5 165 × 210 16.5 × 21 6.5 × 8.27 F6 105 × 165 10.5 × 16.5 4.13 × 6.5 F7 82 × 105 8.2 × 10.5 3.25 × 4.13 F8 52 × 82 5.2 × 8.2 2.05 × 3.25 F9 41 × 52 4.1 × 5.2 1.61 × 2.05 F10 26 × 41 2.6 × 4.1 1.02 × 1.61"
]
| [
null,
"https://mainthebest.com/sizes/wp-content/uploads/sites/4/2019/02/tansitional-series-sizes.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8387935,"math_prob":0.9982409,"size":3447,"snap":"2020-45-2020-50","text_gpt3_token_len":1280,"char_repetition_ratio":0.2323555,"word_repetition_ratio":0.051880676,"special_character_ratio":0.4427038,"punctuation_ratio":0.17469205,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9722733,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-23T09:03:30Z\",\"WARC-Record-ID\":\"<urn:uuid:709cf5e4-2d80-44b3-a77b-424624017add>\",\"Content-Length\":\"54451\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fe60f729-d9d1-4b1f-ae87-61b560023915>\",\"WARC-Concurrent-To\":\"<urn:uuid:558d5c29-b365-4111-8b75-5f76aa94fdd0>\",\"WARC-IP-Address\":\"104.27.155.87\",\"WARC-Target-URI\":\"https://mainthebest.com/sizes/f-series-paper-sizes/\",\"WARC-Payload-Digest\":\"sha1:GCYUEIC7MTFHC4CAXK3LGR6Z4ISFVNUG\",\"WARC-Block-Digest\":\"sha1:DXCIMK2SGDUNFI2VESGVFY4KTYBVRVWX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107880878.30_warc_CC-MAIN-20201023073305-20201023103305-00608.warc.gz\"}"} |
https://www.nagwa.com/en/lessons/648165029897/ | [
"# Lesson: Deformation of Springs\n\nIn this lesson, we will learn how to use the formula F = kx to calculate the deformation of a spring, defining the spring constant as the resistance of a spring to deformation.\n\n16:25"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.91097075,"math_prob":0.9635583,"size":763,"snap":"2019-43-2019-47","text_gpt3_token_len":208,"char_repetition_ratio":0.15283267,"word_repetition_ratio":0.027210884,"special_character_ratio":0.29095674,"punctuation_ratio":0.12777779,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9724134,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-19T04:50:56Z\",\"WARC-Record-ID\":\"<urn:uuid:37adc2a0-7451-41a6-a453-2296e74129d2>\",\"Content-Length\":\"29932\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f1f549e9-7535-4dd7-baf8-a297e66e0138>\",\"WARC-Concurrent-To\":\"<urn:uuid:95840a00-4ee6-4004-8eb5-e01d38f1c2f9>\",\"WARC-IP-Address\":\"52.87.1.166\",\"WARC-Target-URI\":\"https://www.nagwa.com/en/lessons/648165029897/\",\"WARC-Payload-Digest\":\"sha1:JPQF2HDPCETEUZZHP6EW4KOK77JYG7GO\",\"WARC-Block-Digest\":\"sha1:5V5VVZJCJZ4NYM7PXP7KEK7QPSXYP5U5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670006.89_warc_CC-MAIN-20191119042928-20191119070928-00437.warc.gz\"}"} |
https://irmar.univ-rennes1.fr/seminaire/seminaire-analyse-numerique/maya-de-buhan | [
"# Convergent algorithm based on Carleman estimates for coefficient inverse problems\n\nWe are interested in an inverse problem for the wave equation. More precisely, it consists in the determination of an unknown time-independent coefficient from a single measurement of the Neumann derivative of the solution on a part of the boundary. While its uniqueness and stability properties are already well known, we propose an original reconstruction algorithm and prove its global convergence thanks to Carleman estimates for the wave operator. The numerical implementation of this strategy presents some challenges that we propose to address in this talk. Several numerical examples will illustrate the efficiency of the algorithm."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.90019363,"math_prob":0.96639955,"size":722,"snap":"2021-31-2021-39","text_gpt3_token_len":122,"char_repetition_ratio":0.11142062,"word_repetition_ratio":0.0,"special_character_ratio":0.1565097,"punctuation_ratio":0.06140351,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96564454,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-25T01:24:01Z\",\"WARC-Record-ID\":\"<urn:uuid:9a83f866-2f8f-443e-b6a1-f8c248a1b09e>\",\"Content-Length\":\"58167\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:729c204c-23b8-4961-805c-88d46d7121ea>\",\"WARC-Concurrent-To\":\"<urn:uuid:4c3e433b-b09d-462a-a695-f03ab2ace0cf>\",\"WARC-IP-Address\":\"129.20.126.134\",\"WARC-Target-URI\":\"https://irmar.univ-rennes1.fr/seminaire/seminaire-analyse-numerique/maya-de-buhan\",\"WARC-Payload-Digest\":\"sha1:G3CQ2LKUDEDXJ4RYNDWK7D7XEGNVUQRS\",\"WARC-Block-Digest\":\"sha1:ET6VPE33FAWKLF55P3HLLZJNEZ3GHYQE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057584.91_warc_CC-MAIN-20210924231621-20210925021621-00204.warc.gz\"}"} |
https://cm-to-inches.appspot.com/131-cm-to-inches.html | [
"Cm To Inches\n\n# 131 cm to in131 Centimeters to Inches\n\ncm\n=\nin\n\n## How to convert 131 centimeters to inches?\n\n 131 cm * 0.3937007874 in = 51.5748031496 in 1 cm\nA common question is How many centimeter in 131 inch? And the answer is 332.74 cm in 131 in. Likewise the question how many inch in 131 centimeter has the answer of 51.5748031496 in in 131 cm.\n\n## How much are 131 centimeters in inches?\n\n131 centimeters equal 51.5748031496 inches (131cm = 51.5748031496in). Converting 131 cm to in is easy. Simply use our calculator above, or apply the formula to change the length 131 cm to in.\n\n## Convert 131 cm to common lengths\n\nUnitLength\nNanometer1310000000.0 nm\nMicrometer1310000.0 µm\nMillimeter1310.0 mm\nCentimeter131.0 cm\nInch51.5748031496 in\nFoot4.2979002625 ft\nYard1.4326334208 yd\nMeter1.31 m\nKilometer0.00131 km\nMile0.0008139963 mi\nNautical mile0.0007073434 nmi\n\n## What is 131 centimeters in in?\n\nTo convert 131 cm to in multiply the length in centimeters by 0.3937007874. The 131 cm in in formula is [in] = 131 * 0.3937007874. Thus, for 131 centimeters in inch we get 51.5748031496 in.\n\n## 131 Centimeter Conversion Table",
null,
"## Alternative spelling\n\n131 cm to Inch, 131 cm in Inch, 131 Centimeter to in, 131 Centimeter in in, 131 Centimeters to Inches, 131 Centimeters in Inches, 131 Centimeter to Inch, 131 Centimeter in Inch, 131 cm to in, 131 cm in in, 131 Centimeter to Inches, 131 Centimeter in Inches, 131 cm to Inches, 131 cm in Inches"
]
| [
null,
"https://cm-to-inches.appspot.com/image/131.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.81177485,"math_prob":0.9451871,"size":1054,"snap":"2019-13-2019-22","text_gpt3_token_len":322,"char_repetition_ratio":0.24666667,"word_repetition_ratio":0.0,"special_character_ratio":0.40702087,"punctuation_ratio":0.15517241,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98072666,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-25T10:23:47Z\",\"WARC-Record-ID\":\"<urn:uuid:ab60e7bd-3329-4aee-a03e-f4eb6097d32f>\",\"Content-Length\":\"28617\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dcde8b4d-9703-41c9-a8b3-fe90a844fe5b>\",\"WARC-Concurrent-To\":\"<urn:uuid:db3d318d-02c1-4533-abf9-c3b13ae77c61>\",\"WARC-IP-Address\":\"172.217.15.84\",\"WARC-Target-URI\":\"https://cm-to-inches.appspot.com/131-cm-to-inches.html\",\"WARC-Payload-Digest\":\"sha1:5JFFFFWSI3TYAY3K7PQN66YWRN5OJWZD\",\"WARC-Block-Digest\":\"sha1:CCLXYBFME4MQRHWUBOZHL6YBIKHHO52O\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912203865.15_warc_CC-MAIN-20190325092147-20190325114147-00228.warc.gz\"}"} |
https://av.tib.eu/media/15956 | [
"## High dimensional statistical inference and random matrices",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Video in TIB AV-Portal: High dimensional statistical inference and random matrices\n\n Title High dimensional statistical inference and random matrices Title of Series International Congress of Mathematicians, Madrid 2006 Number of Parts 33 Author License CC Attribution 3.0 Germany:You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. Identifiers 10.5446/15956 (DOI) Publisher Release Date 2006 Language English\n\n Subject Area Mathematics Abstract Multivariate statistical analysis is concerned with observations on several variables which are thought to possess some degree of inter-dependence. Driven by problems in genetics and the social sciences, it first flowered in the earlier half of the last century. Subsequently, random matrix theory (RMT) developed, initially within physics, and more recently widely in mathematics. While some of the central objects of study in RMT are identical to those of multivariate statistics, statistical theory was slow to exploit the connection. However, with vast data collection ever more common, data sets now often have as many or more variables than the number of individuals observed. In such contexts, the techniques and results of RMT have much to offer multivariate statistics. The talk reviews some of the progress to date. Keywords canonical correlations eigenvector estimation largest eigenvalue principal components analysis random matrix theory Wishart distribution TracyWidom distribution",
null,
"Principal ideal Group action Direction (geometry) Orientation (vector space) Sheaf (mathematics) Water vapor Dimensional analysis Grothendieck topology Estimator Mathematics Many-sorted logic Different (Kate Ryan album) Thermal fluctuations Series (mathematics) Körper <Algebra> Descriptive statistics Area Process (computing) Theory of relativity Calculus of variations Moment (mathematics) Physicalism Maxima and minima Price index Variable (mathematics) Flow separation Connected space Principal component analysis Linearization Right angle Resultant Spacetime Point (geometry) Geometry Statistics Variety (linguistics) Random matrix Theory Product (business) Pauli exclusion principle Frequency Goodness of fit Cross-correlation Correspondence analysis Term (mathematics) Reduction of order Set theory Random variable Dependent and independent variables Standard deviation Eigenvalues and eigenvectors Mathematical analysis Multilateration Covariance matrix Matrix (mathematics) Cartesian coordinate system Numerical analysis Quadratic form Computer animation Doubling the cube Combinatory logic Network topology Theory of everything Table (information)\nOcean current Rotation Point (geometry) Three-dimensional space Standard deviation Eigenvalues and eigenvectors Direction (geometry) Projective plane Sampling (statistics) Variance Maxima and minima Matrix (mathematics) Variable (mathematics) Sequence Product (business) Group representation Arithmetic mean Principal component analysis Combinatory logic Modulform\nPrincipal ideal Density functional theory Multiplication sign Parameter (computer programming) Mereology Dimensional analysis Positional notation Different (Kate Ryan album) Cumulative distribution function Calculus of variations Concentric Linear regression Moment (mathematics) Sampling (statistics) Funktionalanalysis Price index Variable (mathematics) Connected space Fisher information Category of being Analysis of variance Vector space Principal component analysis Orthogonale Polynome Summierbarkeit Arithmetic progression Identical particles Resultant Classical physics Free group Statistics Canonical correlation Similarity (geometry) Dichotomy Routing Product (business) Frequency 4 (number) Degrees of freedom (physics and chemistry) Cross-correlation Population density Correspondence analysis Root Term (mathematics) Energy level Faktorenanalyse Set theory Dependent and independent variables Eigenvalues and eigenvectors Model theory Diffuser (automotive) Mathematical analysis Matrix (mathematics) Limit (category theory) Numerical analysis Computer animation Combinatory logic Local ring Spectrum (functional analysis)\nBeta function Multiplication sign 1 (number) Water vapor Parameter (computer programming) Many-sorted logic Meeting/Interview Orthogonality Analogy Circle Series (mathematics) Descriptive statistics Social class Cumulative distribution function Area Structural load Funktionalanalysis Orthogonale Polynome Phase transition Classical physics Statistics Atomic nucleus Observational study Real number Random matrix Rule of inference Theory Hypothesis Causality Correspondence analysis Natural number Energy level Metrologie Modulform Complex analysis Dependent and independent variables Eigenvalues and eigenvectors Model theory Mathematical analysis Algebraic structure Line (geometry) Empirical distribution function Cartesian coordinate system Matrix (mathematics) Computer animation Theory of everything Musical ensemble Family Statistical mechanics\nPoint (geometry) Statistics Vapor barrier Multiplication sign Parameter (computer programming) Rule of inference Theory Order of magnitude Product (business) Hypothesis Inference Population density Many-sorted logic Natural number Well-formed formula Modulform Circle Descriptive statistics Set theory Alpha (investment) Physical system Cumulative distribution function Covering space Eigenvalues and eigenvectors Concentric Model theory Sampling (statistics) Algebraic structure Funktionalanalysis Covariance matrix Variable (mathematics) Matrix (mathematics) Limit (category theory) Numerical analysis Principal component analysis Right angle Musical ensemble Asymptotic analysis Identical particles Resultant Maß <Mathematik>\nAxiom of choice Logical constant INTEGRAL Multiplication sign Direction (geometry) Range (statistics) Parameter (computer programming) Perspective (visual) Grothendieck topology Order of magnitude Group representation Thermal fluctuations Ranking Series (mathematics) Fiber (mathematics) Descriptive statistics Cumulative distribution function Covering space Area Theory of relativity Moment (mathematics) Sampling (statistics) Maxima and minima String theory Funktionalanalysis Perturbation theory Variable (mathematics) Connected space Principal component analysis Orthogonale Polynome Order (biology) Asymmetry Identical particles Resultant Point (geometry) Classical physics Geometry Statistics Finitismus Real number Event horizon Theory Hypothesis Product (business) Power (physics) Inclusion map Goodness of fit Centralizer and normalizer Latent heat Degrees of freedom (physics and chemistry) Population density Cross-correlation Natural number Well-formed formula Term (mathematics) Operator (mathematics) Extremwertstatistik Nichtlineares Gleichungssystem Symmetric matrix Set theory Condition number Complex analysis Addition Dependent and independent variables Eigenvalues and eigenvectors Forcing (mathematics) Model theory Expression Physical law Mathematical analysis Algebraic structure Line (geometry) Mortality rate Cartesian coordinate system Matrix (mathematics) Limit (category theory) Approximation Numerical analysis Computer animation Musical ensemble Table (information)\nCumulative distribution function Group action Matching (graph theory) Interior (topology) Sampling (statistics) Matrix (mathematics) Theory Mathematics Kritischer Punkt <Mathematik> Computer animation Many-sorted logic Root Hydraulic jump\nGroup action Parameter (computer programming) Mereology Group representation Estimator Many-sorted logic Orthogonality Thermal fluctuations Predictability Covering space Sampling (statistics) Perturbation theory Lattice (order) Variable (mathematics) Measurement Connected space Flow separation Category of being Arithmetic mean Principal component analysis Uniformer Raum Phase transition Right angle Heuristic Identical particles Resultant Slide rule Finitismus Student's t-test Theory Prime ideal Latent heat Kritischer Punkt <Mathematik> Term (mathematics) Energy level Boundary value problem Selectivity (electronic) Faktorenanalyse Noise (electronics) Standard deviation Matching (graph theory) Eigenvalues and eigenvectors Model theory Bound state Algebraic structure Basis <Mathematik> Matrix (mathematics) Cartesian coordinate system Limit (category theory) Sphere Numerical analysis Statistical physics Factory (trading post) Pressure Statistical mechanics\nthere is a standard preprocessing step subtract lead the means of the problem is so I will assume that's always so you subtract the that you have a means sensitive data matrix and now the that's a project for the talk resulting sample current matrix where we now sample occurrences between appears veritable by taking products summer notably the 400 observations about arriving at this Frost products matrix normalized so so now we're doing exactly the same sequence of observations almost sample matrix that With but I described for population variants up we look for combinations of the column was derived variables and look at their sample variances now but erratic form in a sample a matrix looks for the directions of maximum variance successively orthogonal the previous directions these produced sample principal components eigenvalues values and sampled principle of eigenvectors nite motorcycle taxi on days that the statisticians convention for 4 is might quality sample quality so is the conventional picture of what's happening with principal components which reduce the use sample items values vectors and ineffectual reconstructing is a rotation from the original representation where our Our 400 or any observations at each point is representative of the pointing in three-dimensional space with constructed a rotational with I With a sample eigenvectors at maximizing appearance in the in the 1st quarter and perhaps the 2nd the cops immediate we would throw away the 2nd arable and\nuse the most credible as the reduced demand summer so in our rush genetics later with 38 variables the most durable Our",
null,
""
]
| [
null,
"https://av.tib.eu/production/15956/frames/eb5845397d81e302b727bc9610fc97af.jpg",
null,
"https://av.tib.eu/production/15956/frames/445e9bcbae480da3a75cf86e552a7f03.jpg",
null,
"https://av.tib.eu/production/15956/frames/b29cfed1940e00315b78cd998b4caaa8.jpg",
null,
"https://av.tib.eu/production/15956/frames/a2995e182c45b76a0c55ddc7fbe98985.jpg",
null,
"https://av.tib.eu/production/15956/frames/a62e67aab6cc61ed303c74da4d19e4e6.jpg",
null,
"https://av.tib.eu/production/15956/frames/64dd3587602de8d9650d4f6505511822.jpg",
null,
"https://av.tib.eu/production/15956/frames/a0de11c8a7afa0759bc94c51c779c9cc.jpg",
null,
"https://av.tib.eu/production/15956/frames/108fa27a7fa5569ab6cd02e798e4cc24.jpg",
null,
"https://av.tib.eu/production/15956/frames/c594dfee98cb7fcb10032e970cdf7627.jpg",
null,
"https://av.tib.eu/production/15956/frames/faf1f422e8b713f2b1731e841b4e26eb.jpg",
null,
"https://av.tib.eu/wicket/resource/org.apache.wicket.ajax.AbstractDefaultAjaxBehavior/indicator-ver-03CE3DCC84AF110E9DA8699A841E5200.gif",
null,
"https://av.tib.eu/wicket/resource/org.apache.wicket.ajax.AbstractDefaultAjaxBehavior/indicator-ver-03CE3DCC84AF110E9DA8699A841E5200.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.94463223,"math_prob":0.904913,"size":50856,"snap":"2020-45-2020-50","text_gpt3_token_len":9974,"char_repetition_ratio":0.16068198,"word_repetition_ratio":0.009014352,"special_character_ratio":0.18031304,"punctuation_ratio":0.007619271,"nsfw_num_words":3,"has_unicode_error":false,"math_prob_llama3":0.9961735,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-05T06:05:57Z\",\"WARC-Record-ID\":\"<urn:uuid:fc5b6cec-cda7-464c-b8a6-4171429cd137>\",\"Content-Length\":\"159659\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:667c6bf7-5c06-482b-bb19-70f538854a5e>\",\"WARC-Concurrent-To\":\"<urn:uuid:48366f7f-dc8b-4e4f-b322-79b4f050fa35>\",\"WARC-IP-Address\":\"194.95.114.13\",\"WARC-Target-URI\":\"https://av.tib.eu/media/15956\",\"WARC-Payload-Digest\":\"sha1:DG6SMAKYIIT6GXOZ3TYXYL6H4QPL5X7J\",\"WARC-Block-Digest\":\"sha1:U53DXAAQMLQ7HFHNJFISS4ZJMNPOVBKH\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141746320.91_warc_CC-MAIN-20201205044004-20201205074004-00678.warc.gz\"}"} |
https://tj.home.focus.cn/gonglue/34c5774a69c7b336.html/ | [
"",
null,
"|\n\n# 阳台储物柜用什么材料好 家用阳台储物柜如何设计\n\n现在的住宅设计大多都有阳台,阳台的空间说大不大,说小不小,如果我们能很好的台的空间利用起来,那将会为我们的生活扩展许多空间,也为我们带来很多方便。在阳台摆放一个储物柜,能帮助我们合理利用阳台空间,但是由于阳台的特殊环境,在选择储物柜制作材料上要格外注意,那阳台储物柜用什么材料好呢?\n\n【阳台储物柜用什么材料好】\n\n一、阳台储物柜造型\n\n阳台储物柜的造型可谓是多种多样。阳台储物柜有最为常见的一种,就是一款独立的储物柜,放置在阳台的某角落就形成了阳台储物柜,多为长方体;而现在为了节约阳台空间,设计师们因地制宜,在阳台的侧面墙上直接做上一些隔板,就可以用来放置东西;也有的阳台储物柜是采用墙面作为储物柜的一面,再向外发展处另外三面,做成立体的阳台储物柜,也是非常节约空间的。",
null,
"二、阳台储物柜制作材料\n\n阳台制作材料的种类是非常多的,阳台制作材质可以是藤条,也就是说制成阳台藤艺储物柜,拥有别具一格的风味儿!大部分的阳台储物柜是采用实木制作的,实木这种材料是非常好配风格的,也比较利于造型;除此之外,阳台储物柜的制作材料还有人造板或者是各种密度板等等。\n\n三、阳台储物柜风格\n\n阳台储物柜的风格要视阳台的整体风格而定,这就要取决于阳台的风格与色彩。阳台储物柜的风格一般都是现代简约式的,不过特别注重装修风格的朋友在这一点上要求是比较严格的,有中式的、欧式的、地中海式的等等。不过想要采用比较国际化的设计风格,其中也对阳台空间大小是有一定要求的,阳台空间太小是做不出这样的风格的。\n\n【家用阳台储物柜如何设计】\n\n家用阳台储物柜如何设计一:\n\n阳台的装修风格是中式华丽风格的,阳台的空间很大,储物柜就最好不要选用高的立柜,会显得突兀和累赘,用高度合适的小型储物柜地柜就好;白色储物柜,上面还可摆放绿色盆栽,让阳台变成了自然宁静的小空间。",
null,
"家用阳台储物柜如何设计二:\n\n阳台空间不算太大也不算太小,刚好合适,那么就可以选择立柜,柜子顶部以靠近屋顶为宜,这样储物柜地柜的空间就比较大,能放很多东西,但占地面积却不多,也不显突兀,尽显个性时尚的现代风格。\n\n家用阳台储物柜如何设计四:\n\n阳台并不是一个开放式的阳台,这里把阳台封了起来,然后又装上了一排窗户,这样便让整个室内的空间延伸了不少,这个阳台面积并不小,因此便被利用了起来,在侧边装了一个阳台储物柜地柜,这个储物柜的外形也是很抢眼,通体白色,很光亮,而且这个柜门上有一条条整齐的横线,看起来很时尚,而且储物柜,的外边一个柜是矮柜,只有其他两个的半高,这样的阳台储物柜尺寸搭配也很有意思。\n\n【阳台储物柜尺寸】\n\n阳台是一个比较特殊的空间,首先在建筑结构上,阳台的承重就比不上其他空间,另外,如果是高层的房屋,阳台是人很容易跌落下楼的地方。如何确保阳台的安全,这是在定制阳台储物柜尺寸需要考虑到的地方之一。",
null,
"阳台储物柜尺寸应该根据你家阳台的大小和你需要放置的东西的大小来确定储物柜的尺寸。一般来说,深度60—70厘米,宽度40-70厘米已经算是很大的了。你可以根据自己的生活习惯和家里人的活动习惯,考虑阳台应该选购多大的储物柜。\n\n【阳台储物柜的样式推荐】\n\n这是一款现代感十足的阳台储物柜效果图,从图片上我们可以看到,储物柜是以镶嵌的方式装修在强的一头,柜子柜面是以柔和的乳白色为主体,配之淡蓝色的墙壁,整个色调非常和谐,在窗的下面,我们可以放上一张小小的桌子,闲暇时,可以读书看报,生活怡然自得。\n\n这张阳台储物柜效果图很自然,这种装修风格走的就是平民风,非常简单、实在。三个柜子呈阶梯状布局,柜子的柜面可以放上一些花花草草,非常美观。三个储物柜的空间不小,可以收纳阳台上所要用到的洗衣粉、毛巾、面盆之类的物件。为阳台装上这样一处储物柜,真的是既好看、又方便。",
null,
"从这张阳台效果图我们可以看到阳台储物柜的装修风格是很温暖的那种,有点点文艺气息。柜子的柜面还是以白色为主,墙面是很温暖的鹅黄色,与白色的柜面配在一起,毫无违和感。阳台储物柜效果图有很多,风格也各不相同。\n\n`声明:本文由入驻焦点开放平台的作者撰写,除焦点官方账号外,观点仅代表作者本人,不代表焦点立场错误信息举报电话: 400-099-0099,邮箱:[email protected],或点此进行意见反馈,或点此进行举报投诉。`",
null,
"A B C D E F G H J K L M N P Q R S T W X Y Z\nA - B - C - D - E\n• A\n• 鞍山\n• 安庆\n• 安阳\n• 安顺\n• 安康\n• 澳门\n• B\n• 北京\n• 保定\n• 包头\n• 巴彦淖尔\n• 本溪\n• 蚌埠\n• 亳州\n• 滨州\n• 北海\n• 百色\n• 巴中\n• 毕节\n• 保山\n• 宝鸡\n• 白银\n• 巴州\n• C\n• 承德\n• 沧州\n• 长治\n• 赤峰\n• 朝阳\n• 长春\n• 常州\n• 滁州\n• 池州\n• 长沙\n• 常德\n• 郴州\n• 潮州\n• 崇左\n• 重庆\n• 成都\n• 楚雄\n• 昌都\n• 慈溪\n• 常熟\n• D\n• 大同\n• 大连\n• 丹东\n• 大庆\n• 东营\n• 德州\n• 东莞\n• 德阳\n• 达州\n• 大理\n• 德宏\n• 定西\n• 儋州\n• 东平\n• E\n• 鄂尔多斯\n• 鄂州\n• 恩施\nF - G - H - I - J\n• F\n• 抚顺\n• 阜新\n• 阜阳\n• 福州\n• 抚州\n• 佛山\n• 防城港\n• G\n• 赣州\n• 广州\n• 桂林\n• 贵港\n• 广元\n• 广安\n• 贵阳\n• 固原\n• H\n• 邯郸\n• 衡水\n• 呼和浩特\n• 呼伦贝尔\n• 葫芦岛\n• 哈尔滨\n• 黑河\n• 淮安\n• 杭州\n• 湖州\n• 合肥\n• 淮南\n• 淮北\n• 黄山\n• 菏泽\n• 鹤壁\n• 黄石\n• 黄冈\n• 衡阳\n• 怀化\n• 惠州\n• 河源\n• 贺州\n• 河池\n• 海口\n• 红河\n• 汉中\n• 海东\n• I\n• J\n• 晋中\n• 锦州\n• 吉林\n• 鸡西\n• 佳木斯\n• 嘉兴\n• 金华\n• 景德镇\n• 九江\n• 吉安\n• 济南\n• 济宁\n• 焦作\n• 荆门\n• 荆州\n• 江门\n• 揭阳\n• 金昌\n• 酒泉\n• 嘉峪关\nK - L - M - N - P\n• K\n• 开封\n• 昆明\n• 昆山\n• L\n• 廊坊\n• 临汾\n• 辽阳\n• 连云港\n• 丽水\n• 六安\n• 龙岩\n• 莱芜\n• 临沂\n• 聊城\n• 洛阳\n• 漯河\n• 娄底\n• 柳州\n• 来宾\n• 泸州\n• 乐山\n• 六盘水\n• 丽江\n• 临沧\n• 拉萨\n• 林芝\n• 兰州\n• 陇南\n• M\n• 牡丹江\n• 马鞍山\n• 茂名\n• 梅州\n• 绵阳\n• 眉山\n• N\n• 南京\n• 南通\n• 宁波\n• 南平\n• 宁德\n• 南昌\n• 南阳\n• 南宁\n• 内江\n• 南充\n• P\n• 盘锦\n• 莆田\n• 平顶山\n• 濮阳\n• 攀枝花\n• 普洱\n• 平凉\nQ - R - S - T - W\n• Q\n• 秦皇岛\n• 齐齐哈尔\n• 衢州\n• 泉州\n• 青岛\n• 清远\n• 钦州\n• 黔南\n• 曲靖\n• 庆阳\n• R\n• 日照\n• 日喀则\n• S\n• 石家庄\n• 沈阳\n• 双鸭山\n• 绥化\n• 上海\n• 苏州\n• 宿迁\n• 绍兴\n• 宿州\n• 三明\n• 上饶\n• 三门峡\n• 商丘\n• 十堰\n• 随州\n• 邵阳\n• 韶关\n• 深圳\n• 汕头\n• 汕尾\n• 三亚\n• 三沙\n• 遂宁\n• 山南\n• 商洛\n• 石嘴山\n• T\n• 天津\n• 唐山\n• 太原\n• 通辽\n• 铁岭\n• 泰州\n• 台州\n• 铜陵\n• 泰安\n• 铜仁\n• 铜川\n• 天水\n• 天门\n• W\n• 乌海\n• 乌兰察布\n• 无锡\n• 温州\n• 芜湖\n• 潍坊\n• 威海\n• 武汉\n• 梧州\n• 渭南\n• 武威\n• 吴忠\n• 乌鲁木齐\nX - Y - Z\n• X\n• 邢台\n• 徐州\n• 宣城\n• 厦门\n• 新乡\n• 许昌\n• 信阳\n• 襄阳\n• 孝感\n• 咸宁\n• 湘潭\n• 湘西\n• 西双版纳\n• 西安\n• 咸阳\n• 西宁\n• 仙桃\n• 西昌\n• Y\n• 运城\n• 营口\n• 盐城\n• 扬州\n• 鹰潭\n• 宜春\n• 烟台\n• 宜昌\n• 岳阳\n• 益阳\n• 永州\n• 阳江\n• 云浮\n• 玉林\n• 宜宾\n• 雅安\n• 玉溪\n• 延安\n• 榆林\n• 银川\n• Z\n• 张家口\n• 镇江\n• 舟山\n• 漳州\n• 淄博\n• 枣庄\n• 郑州\n• 周口\n• 驻马店\n• 株洲\n• 张家界\n• 珠海\n• 湛江\n• 肇庆\n• 中山\n• 自贡\n• 资阳\n• 遵义\n• 昭通\n• 张掖\n• 中卫\n\n1室1厅1厨1卫1阳台\n\n1\n2\n3\n4\n5\n\n0\n1\n2\n\n1\n\n1\n\n0\n1\n2\n3",
null,
"",
null,
"",
null,
"报名成功,资料已提交审核",
null,
"A B C D E F G H J K L M N P Q R S T W X Y Z\nA - B - C - D - E\n• A\n• 鞍山\n• 安庆\n• 安阳\n• 安顺\n• 安康\n• 澳门\n• B\n• 北京\n• 保定\n• 包头\n• 巴彦淖尔\n• 本溪\n• 蚌埠\n• 亳州\n• 滨州\n• 北海\n• 百色\n• 巴中\n• 毕节\n• 保山\n• 宝鸡\n• 白银\n• 巴州\n• C\n• 承德\n• 沧州\n• 长治\n• 赤峰\n• 朝阳\n• 长春\n• 常州\n• 滁州\n• 池州\n• 长沙\n• 常德\n• 郴州\n• 潮州\n• 崇左\n• 重庆\n• 成都\n• 楚雄\n• 昌都\n• 慈溪\n• 常熟\n• D\n• 大同\n• 大连\n• 丹东\n• 大庆\n• 东营\n• 德州\n• 东莞\n• 德阳\n• 达州\n• 大理\n• 德宏\n• 定西\n• 儋州\n• 东平\n• E\n• 鄂尔多斯\n• 鄂州\n• 恩施\nF - G - H - I - J\n• F\n• 抚顺\n• 阜新\n• 阜阳\n• 福州\n• 抚州\n• 佛山\n• 防城港\n• G\n• 赣州\n• 广州\n• 桂林\n• 贵港\n• 广元\n• 广安\n• 贵阳\n• 固原\n• H\n• 邯郸\n• 衡水\n• 呼和浩特\n• 呼伦贝尔\n• 葫芦岛\n• 哈尔滨\n• 黑河\n• 淮安\n• 杭州\n• 湖州\n• 合肥\n• 淮南\n• 淮北\n• 黄山\n• 菏泽\n• 鹤壁\n• 黄石\n• 黄冈\n• 衡阳\n• 怀化\n• 惠州\n• 河源\n• 贺州\n• 河池\n• 海口\n• 红河\n• 汉中\n• 海东\n• I\n• J\n• 晋中\n• 锦州\n• 吉林\n• 鸡西\n• 佳木斯\n• 嘉兴\n• 金华\n• 景德镇\n• 九江\n• 吉安\n• 济南\n• 济宁\n• 焦作\n• 荆门\n• 荆州\n• 江门\n• 揭阳\n• 金昌\n• 酒泉\n• 嘉峪关\nK - L - M - N - P\n• K\n• 开封\n• 昆明\n• 昆山\n• L\n• 廊坊\n• 临汾\n• 辽阳\n• 连云港\n• 丽水\n• 六安\n• 龙岩\n• 莱芜\n• 临沂\n• 聊城\n• 洛阳\n• 漯河\n• 娄底\n• 柳州\n• 来宾\n• 泸州\n• 乐山\n• 六盘水\n• 丽江\n• 临沧\n• 拉萨\n• 林芝\n• 兰州\n• 陇南\n• M\n• 牡丹江\n• 马鞍山\n• 茂名\n• 梅州\n• 绵阳\n• 眉山\n• N\n• 南京\n• 南通\n• 宁波\n• 南平\n• 宁德\n• 南昌\n• 南阳\n• 南宁\n• 内江\n• 南充\n• P\n• 盘锦\n• 莆田\n• 平顶山\n• 濮阳\n• 攀枝花\n• 普洱\n• 平凉\nQ - R - S - T - W\n• Q\n• 秦皇岛\n• 齐齐哈尔\n• 衢州\n• 泉州\n• 青岛\n• 清远\n• 钦州\n• 黔南\n• 曲靖\n• 庆阳\n• R\n• 日照\n• 日喀则\n• S\n• 石家庄\n• 沈阳\n• 双鸭山\n• 绥化\n• 上海\n• 苏州\n• 宿迁\n• 绍兴\n• 宿州\n• 三明\n• 上饶\n• 三门峡\n• 商丘\n• 十堰\n• 随州\n• 邵阳\n• 韶关\n• 深圳\n• 汕头\n• 汕尾\n• 三亚\n• 三沙\n• 遂宁\n• 山南\n• 商洛\n• 石嘴山\n• T\n• 天津\n• 唐山\n• 太原\n• 通辽\n• 铁岭\n• 泰州\n• 台州\n• 铜陵\n• 泰安\n• 铜仁\n• 铜川\n• 天水\n• 天门\n• W\n• 乌海\n• 乌兰察布\n• 无锡\n• 温州\n• 芜湖\n• 潍坊\n• 威海\n• 武汉\n• 梧州\n• 渭南\n• 武威\n• 吴忠\n• 乌鲁木齐\nX - Y - Z\n• X\n• 邢台\n• 徐州\n• 宣城\n• 厦门\n• 新乡\n• 许昌\n• 信阳\n• 襄阳\n• 孝感\n• 咸宁\n• 湘潭\n• 湘西\n• 西双版纳\n• 西安\n• 咸阳\n• 西宁\n• 仙桃\n• 西昌\n• Y\n• 运城\n• 营口\n• 盐城\n• 扬州\n• 鹰潭\n• 宜春\n• 烟台\n• 宜昌\n• 岳阳\n• 益阳\n• 永州\n• 阳江\n• 云浮\n• 玉林\n• 宜宾\n• 雅安\n• 玉溪\n• 延安\n• 榆林\n• 银川\n• Z\n• 张家口\n• 镇江\n• 舟山\n• 漳州\n• 淄博\n• 枣庄\n• 郑州\n• 周口\n• 驻马店\n• 株洲\n• 张家界\n• 珠海\n• 湛江\n• 肇庆\n• 中山\n• 自贡\n• 资阳\n• 遵义\n• 昭通\n• 张掖\n• 中卫",
null,
"",
null,
"• 手机",
null,
"• 分享\n• 设计\n免费设计\n• 计算器\n装修计算器\n• 入驻\n合作入驻\n• 联系\n联系我们\n• 置顶\n返回顶部"
]
| [
null,
"https://a.gdt.qq.com/pixel",
null,
"https://t1.focus-img.cn/sh740wsh/zx/duplication/a99bdd76-ab2f-4dc4-95a8-c337cc6d2e11.JPEG",
null,
"https://t1.focus-img.cn/sh740wsh/zx/duplication/90c8d6a8-bee2-40cc-8e88-db95d8978efc.JPEG",
null,
"https://t1.focus-img.cn/sh740wsh/zx/duplication/4ff6a7ed-a8ac-475a-9747-39724b81ed84.JPEG",
null,
"https://t1.focus-img.cn/sh740wsh/zx/duplication/cc0d7c67-09ee-4b2d-adb0-d89d342349e0.JPEG",
null,
"data:image/png;base64,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",
null,
"data:image/png;base64,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",
null,
"https://tj.home.focus.cn/gonglue/34c5774a69c7b336.html/",
null,
"https://t1.focus-res.cn/front-pc/module/loupan-baoming/images/yes.png",
null,
"https://t1.focus-res.cn/front-pc/module/loupan-baoming/images/qrcode.png",
null,
"data:image/png;base64,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",
null,
"https://t.focus-res.cn/home-front/pc/img/qrcode.d7cfc15.png",
null,
"data:image/png;base64,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",
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.97798115,"math_prob":0.6919159,"size":1640,"snap":"2019-51-2020-05","text_gpt3_token_len":1933,"char_repetition_ratio":0.08374083,"word_repetition_ratio":0.0,"special_character_ratio":0.12560976,"punctuation_ratio":0.0,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99668103,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26],"im_url_duplicate_count":[null,null,null,1,null,1,null,1,null,1,null,null,null,null,null,2,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-18T03:36:39Z\",\"WARC-Record-ID\":\"<urn:uuid:46a3c755-fdda-425e-b6fc-8d70e3188bdd>\",\"Content-Length\":\"147462\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:06b90a2c-19ef-4bd9-b8f5-c6945c280eac>\",\"WARC-Concurrent-To\":\"<urn:uuid:83fc48fe-a89a-48c3-a5ba-fc1100f21b3a>\",\"WARC-IP-Address\":\"119.167.217.46\",\"WARC-Target-URI\":\"https://tj.home.focus.cn/gonglue/34c5774a69c7b336.html/\",\"WARC-Payload-Digest\":\"sha1:EXVN6H2GBJ3I7ZAO3WU7YH6INOWYAAJG\",\"WARC-Block-Digest\":\"sha1:C6UNEA4UBGYHTPW5U7BVBP3NI2EQIEF6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250591763.20_warc_CC-MAIN-20200118023429-20200118051429-00492.warc.gz\"}"} |
https://hackage-origin.haskell.org/package/pipes-4.3.4/docs/src/Pipes-Core.html | [
"```{-| The core functionality for the 'Proxy' monad transformer\n\nRead \"Pipes.Tutorial\" if you want a beginners tutorial explaining how to use\nthis library. The documentation in this module targets more advanced users\nwho want to understand the theory behind this library.\n\nThis module is not exported by default, and I recommend you use the\nunidirectional operations exported by the \"Pipes\" module if you can. You\nshould only use this module if you require advanced features like:\n\n* bidirectional communication, or:\n\n* push-based 'Pipe's.\n-}\n\n{-# LANGUAGE RankNTypes, Trustworthy #-}\n\nmodule Pipes.Core (\n-- * Proxy Monad Transformer\n-- \\$proxy\nProxy\n, runEffect\n\n-- * Categories\n-- \\$categories\n\n-- ** Respond\n-- \\$respond\n, respond\n, (/>/)\n, (//>)\n\n-- ** Request\n-- \\$request\n, request\n, (\\>\\)\n, (>\\\\)\n\n-- ** Push\n-- \\$push\n, push\n, (>~>)\n, (>>~)\n\n-- ** Pull\n-- \\$pull\n, pull\n, (>+>)\n, (+>>)\n\n-- ** Reflect\n-- \\$reflect\n, reflect\n\n-- * Concrete Type Synonyms\n, X\n, Effect\n, Producer\n, Pipe\n, Consumer\n, Client\n, Server\n\n-- * Polymorphic Type Synonyms\n, Effect'\n, Producer'\n, Consumer'\n, Client'\n, Server'\n\n-- * Flipped operators\n, (\\<\\)\n, (/</)\n, (<~<)\n, (~<<)\n, (<+<)\n, (<\\\\)\n, (//<)\n, (<<+)\n\n-- * Re-exports\n, closed\n) where\n\nimport Pipes.Internal (Proxy(..), X, closed)\n\n{- \\$proxy\nDiagrammatically, you can think of a 'Proxy' as having the following shape:\n\n@\nUpstream | Downstream\n+---------+\n| |\na' <== <== b'\n| |\na ==> ==> b\n| | |\n+----|----+\nv\nr\n@\n\nYou can connect proxies together in five different ways:\n\n* ('Pipes.>+>'): connect pull-based streams\n\n* ('Pipes.>~>'): connect push-based streams\n\n* ('Pipes.\\>\\'): chain folds\n\n* ('Pipes./>/'): chain unfolds\n\n* ('Control.Monad.>=>'): sequence proxies\n\n-}\n\n-- | Run a self-contained 'Effect', converting it back to the base monad\nrunEffect :: Monad m => Effect m r -> m r\nrunEffect = go\nwhere\ngo p = case p of\nRequest v _ -> closed v\nRespond v _ -> closed v\nM m -> m >>= go\nPure r -> return r\n{-# INLINABLE runEffect #-}\n\n{- * Keep proxy composition lower in precedence than function composition, which\nis 9 at the time of of this comment, so that users can write things like:\n\n> lift . k >+> p\n>\n> hoist f . k >+> p\n\n* Keep the priorities different so that users can mix composition operators\nlike:\n\n> up \\>\\ p />/ dn\n>\n> up >~> p >+> dn\n\n* Keep 'request' and 'respond' composition lower in precedence than 'pull'\nand 'push' composition, so that users can do:\n\n> read \\>\\ pull >+> writer\n\n* I arbitrarily choose a lower priority for downstream operators so that lazy\npull-based computations need not evaluate upstream stages unless absolutely\nnecessary.\n-}\ninfixl 3 //>\ninfixr 3 <\\\\ -- GHC will raise a parse error if either of these lines ends\ninfixr 4 />/, >\\\\ -- with '\\', which is why this comment is here\ninfixl 4 \\<\\, //<\ninfixl 5 \\>\\ -- Same thing here\ninfixr 5 /</\ninfixl 6 <<+\ninfixr 6 +>>\ninfixl 7 >+>, >>~\ninfixr 7 <+<, ~<<\ninfixl 8 <~<\ninfixr 8 >~>\n\n{- \\$categories\nA 'Control.Category.Category' is a set of components that you can connect\nwith a composition operator, ('Control.Category..'), that has an identity,\n'Control.Category.id'. The ('Control.Category..') and 'Control.Category.id'\nmust satisfy the following three 'Control.Category.Category' laws:\n\n@\n\\-\\- Left identity\n'Control.Category.id' 'Control.Category..' f = f\n\n\\-\\- Right identity\nf 'Control.Category..' 'Control.Category.id' = f\n\n\\-\\- Associativity\n(f 'Control.Category..' g) 'Control.Category..' h = f 'Control.Category..' (g 'Control.Category..' h)\n@\n\nThe 'Proxy' type sits at the intersection of five separate categories, four\nof which are named after their identity:\n\n@\nIdentity | Composition | Point-ful\n+-------------+-------------+-------------+\nrespond category | 'respond' | '/>/' | '//>' |\nrequest category | 'request' | '\\>\\' | '>\\\\' |\npush category | 'push' | '>~>' | '>>~' |\npull category | 'pull' | '>+>' | '+>>' |\nKleisli category | 'return' | 'Control.Monad.>=>' | '>>=' |\n+-------------+-------------+-------------+\n@\n\nEach composition operator has a \\\"point-ful\\\" version, analogous to how\n('>>=') is the point-ful version of ('Control.Monad.>=>'). For example,\n('//>') is the point-ful version of ('/>/'). The convention is that the\nodd character out faces the argument that is a function.\n-}\n\n{- \\$respond\nThe 'respond' category closely corresponds to the generator design pattern.\n\nThe 'respond' category obeys the category laws, where 'respond' is the\nidentity and ('/>/') is composition:\n\n@\n\\-\\- Left identity\n'respond' '/>/' f = f\n\n\\-\\- Right identity\nf '/>/' 'respond' = f\n\n\\-\\- Associativity\n(f '/>/' g) '/>/' h = f '/>/' (g '/>/' h)\n@\n\n#respond-diagram#\n\nThe following diagrams show the flow of information:\n\n@\n'respond' :: 'Monad' m\n=> a -> 'Proxy' x' x a' a m a'\n\n\\ a\n|\n+----|----+\n| | |\nx' <== \\\\ /==== a'\n| X |\nx ==> / \\\\===> a\n| | |\n+----|----+\nv\na'\n\n('/>/') :: 'Monad' m\n=> (a -> 'Proxy' x' x b' b m a')\n-> (b -> 'Proxy' x' x c' c m b')\n-> (a -> 'Proxy' x' x c' c m a')\n\n\\ a /===> b a\n| / | |\n+----|----+ / +----|----+ +----|----+\n| v | / | v | | v |\nx' <== <== b' <==\\\\ / x'<== <== c' x' <== <== c'\n| f | X | g | = | f '/>/' g |\nx ==> ==> b ===/ \\\\ x ==> ==> c x ==> ==> c'\n| | | \\\\ | | | | | |\n+----|----+ \\\\ +----|----+ +----|----+\nv \\\\ v v\na' \\\\==== b' a'\n\n('//>') :: 'Monad' m\n=> 'Proxy' x' x b' b m a'\n-> (b -> 'Proxy' x' x c' c m b')\n-> 'Proxy' x' x c' c m a'\n\n\\ /===> b\n/ |\n+---------+ / +----|----+ +---------+\n| | / | v | | |\nx' <== <== b' <==\\\\ / x'<== <== c' x' <== <== c'\n| f | X | g | = | f '//>' g |\nx ==> ==> b ===/ \\\\ x ==> ==> c x ==> ==> c'\n| | | \\\\ | | | | | |\n+----|----+ \\\\ +----|----+ +----|----+\nv \\\\ v v\na' \\\\==== b' a'\n@\n\n-}\n\n{-| Send a value of type @a@ downstream and block waiting for a reply of type\n@a'@\n\n'respond' is the identity of the respond category.\n-}\nrespond :: Monad m => a -> Proxy x' x a' a m a'\nrespond a = Respond a Pure\n{-# INLINABLE respond #-}\n\n{-| Compose two unfolds, creating a new unfold\n\n@\n(f '/>/' g) x = f x '//>' g\n@\n\n('/>/') is the composition operator of the respond category.\n-}\n(/>/)\n=> (a -> Proxy x' x b' b m a')\n-- ^\n-> (b -> Proxy x' x c' c m b')\n-- ^\n-> (a -> Proxy x' x c' c m a')\n-- ^\n(fa />/ fb) a = fa a //> fb\n{-# INLINABLE (/>/) #-}\n\n{-| @(p \\/\\/> f)@ replaces each 'respond' in @p@ with @f@.\n\nPoint-ful version of ('/>/')\n-}\n(//>)\n=> Proxy x' x b' b m a'\n-- ^\n-> (b -> Proxy x' x c' c m b')\n-- ^\n-> Proxy x' x c' c m a'\n-- ^\np0 //> fb = go p0\nwhere\ngo p = case p of\nRequest x' fx -> Request x' (\\x -> go (fx x))\nRespond b fb' -> fb b >>= \\b' -> go (fb' b')\nM m -> M (m >>= \\p' -> return (go p'))\nPure a -> Pure a\n{-# INLINE (//>) #-}\n\n{-# RULES\n\"(Request x' fx ) //> fb\" forall x' fx fb .\n(Request x' fx ) //> fb = Request x' (\\x -> fx x //> fb);\n\"(Respond b fb') //> fb\" forall b fb' fb .\n(Respond b fb') //> fb = fb b >>= \\b' -> fb' b' //> fb;\n\"(M m ) //> fb\" forall m fb .\n(M m ) //> fb = M (m >>= \\p' -> return (p' //> fb));\n\"(Pure a ) //> fb\" forall a fb .\n(Pure a ) //> fb = Pure a;\n#-}\n\n{- \\$request\nThe 'request' category closely corresponds to the iteratee design pattern.\n\nThe 'request' category obeys the category laws, where 'request' is the\nidentity and ('\\>\\') is composition:\n\n@\n-- Left identity\n'request' '\\>\\' f = f\n\n\\-\\- Right identity\nf '\\>\\' 'request' = f\n\n\\-\\- Associativity\n(f '\\>\\' g) '\\>\\' h = f '\\>\\' (g '\\>\\' h)\n@\n\n#request-diagram#\n\nThe following diagrams show the flow of information:\n\n@\n'request' :: 'Monad' m\n=> a' -> 'Proxy' a' a y' y m a\n\n\\ a'\n|\n+----|----+\n| | |\na' <=====/ <== y'\n| |\na ======\\\\ ==> y\n| | |\n+----|----+\nv\na\n\n('\\>\\') :: 'Monad' m\n=> (b' -> 'Proxy' a' a y' y m b)\n-> (c' -> 'Proxy' b' b y' y m c)\n-> (c' -> 'Proxy' a' a y' y m c)\n\n\\ b'<=====\\\\ c' c'\n| \\\\ | |\n+----|----+ \\\\ +----|----+ +----|----+\n| v | \\\\ | v | | v |\na' <== <== y' \\\\== b' <== <== y' a' <== <== y'\n| f | | g | = | f '\\>\\' g |\na ==> ==> y /=> b ==> ==> y a ==> ==> y\n| | | / | | | | | |\n+----|----+ / +----|----+ +----|----+\nv / v v\nb ======/ c c\n\n('>\\\\') :: Monad m\n=> (b' -> Proxy a' a y' y m b)\n-> Proxy b' b y' y m c\n-> Proxy a' a y' y m c\n\n\\ b'<=====\\\\\n| \\\\\n+----|----+ \\\\ +---------+ +---------+\n| v | \\\\ | | | |\na' <== <== y' \\\\== b' <== <== y' a' <== <== y'\n| f | | g | = | f '>\\\\' g |\na ==> ==> y /=> b ==> ==> y a ==> ==> y\n| | | / | | | | | |\n+----|----+ / +----|----+ +----|----+\nv / v v\nb ======/ c c\n@\n-}\n\n{-| Send a value of type @a'@ upstream and block waiting for a reply of type @a@\n\n'request' is the identity of the request category.\n-}\nrequest :: Monad m => a' -> Proxy a' a y' y m a\nrequest a' = Request a' Pure\n{-# INLINABLE request #-}\n\n{-| Compose two folds, creating a new fold\n\n@\n(f '\\>\\' g) x = f '>\\\\' g x\n@\n\n('\\>\\') is the composition operator of the request category.\n-}\n(\\>\\)\n=> (b' -> Proxy a' a y' y m b)\n-- ^\n-> (c' -> Proxy b' b y' y m c)\n-- ^\n-> (c' -> Proxy a' a y' y m c)\n-- ^\n(fb' \\>\\ fc') c' = fb' >\\\\ fc' c'\n{-# INLINABLE (\\>\\) #-}\n\n{-| @(f >\\\\\\\\ p)@ replaces each 'request' in @p@ with @f@.\n\nPoint-ful version of ('\\>\\')\n-}\n(>\\\\)\n=> (b' -> Proxy a' a y' y m b)\n-- ^\n-> Proxy b' b y' y m c\n-- ^\n-> Proxy a' a y' y m c\n-- ^\nfb' >\\\\ p0 = go p0\nwhere\ngo p = case p of\nRequest b' fb -> fb' b' >>= \\b -> go (fb b)\nRespond x fx' -> Respond x (\\x' -> go (fx' x'))\nM m -> M (m >>= \\p' -> return (go p'))\nPure a -> Pure a\n{-# INLINE (>\\\\) #-}\n\n{-# RULES\n\"fb' >\\\\ (Request b' fb )\" forall fb' b' fb .\nfb' >\\\\ (Request b' fb ) = fb' b' >>= \\b -> fb' >\\\\ fb b;\n\"fb' >\\\\ (Respond x fx')\" forall fb' x fx' .\nfb' >\\\\ (Respond x fx') = Respond x (\\x' -> fb' >\\\\ fx' x');\n\"fb' >\\\\ (M m )\" forall fb' m .\nfb' >\\\\ (M m ) = M (m >>= \\p' -> return (fb' >\\\\ p'));\n\"fb' >\\\\ (Pure a )\" forall fb' a .\nfb' >\\\\ (Pure a ) = Pure a;\n#-}\n\n{- \\$push\nThe 'push' category closely corresponds to push-based Unix pipes.\n\nThe 'push' category obeys the category laws, where 'push' is the identity\nand ('>~>') is composition:\n\n@\n\\-\\- Left identity\n'push' '>~>' f = f\n\n\\-\\- Right identity\nf '>~>' 'push' = f\n\n\\-\\- Associativity\n(f '>~>' g) '>~>' h = f '>~>' (g '>~>' h)\n@\n\nThe following diagram shows the flow of information:\n\n@\n'push' :: 'Monad' m\n=> a -> 'Proxy' a' a a' a m r\n\n\\ a\n|\n+----|----+\n| v |\na' <============ a'\n| |\na ============> a\n| | |\n+----|----+\nv\nr\n\n('>~>') :: 'Monad' m\n=> (a -> 'Proxy' a' a b' b m r)\n-> (b -> 'Proxy' b' b c' c m r)\n-> (a -> 'Proxy' a' a c' c m r)\n\n\\ a b a\n| | |\n+----|----+ +----|----+ +----|----+\n| v | | v | | v |\na' <== <== b' <== <== c' a' <== <== c'\n| f | | g | = | f '>~>' g |\na ==> ==> b ==> ==> c a ==> ==> c\n| | | | | | | | |\n+----|----+ +----|----+ +----|----+\nv v v\nr r r\n@\n\n-}\n\n{-| Forward responses followed by requests\n\n@\n'push' = 'respond' 'Control.Monad.>=>' 'request' 'Control.Monad.>=>' 'push'\n@\n\n'push' is the identity of the push category.\n-}\npush :: Monad m => a -> Proxy a' a a' a m r\npush = go\nwhere\ngo a = Respond a (\\a' -> Request a' go)\n{-# INLINABLE push #-}\n\n{-| Compose two proxies blocked while 'request'ing data, creating a new proxy\nblocked while 'request'ing data\n\n@\n(f '>~>' g) x = f x '>>~' g\n@\n\n('>~>') is the composition operator of the push category.\n-}\n(>~>)\n=> (_a -> Proxy a' a b' b m r)\n-- ^\n-> ( b -> Proxy b' b c' c m r)\n-- ^\n-> (_a -> Proxy a' a c' c m r)\n-- ^\n(fa >~> fb) a = fa a >>~ fb\n{-# INLINABLE (>~>) #-}\n\n{-| @(p >>~ f)@ pairs each 'respond' in @p@ with a 'request' in @f@.\n\nPoint-ful version of ('>~>')\n-}\n(>>~)\n=> Proxy a' a b' b m r\n-- ^\n-> (b -> Proxy b' b c' c m r)\n-- ^\n-> Proxy a' a c' c m r\n-- ^\np >>~ fb = case p of\nRequest a' fa -> Request a' (\\a -> fa a >>~ fb)\nRespond b fb' -> fb' +>> fb b\nM m -> M (m >>= \\p' -> return (p' >>~ fb))\nPure r -> Pure r\n{-# INLINE (>>~) #-}\n\n{- \\$pull\nThe 'pull' category closely corresponds to pull-based Unix pipes.\n\nThe 'pull' category obeys the category laws, where 'pull' is the identity\nand ('>+>') is composition:\n\n@\n\\-\\- Left identity\n'pull' '>+>' f = f\n\n\\-\\- Right identity\nf '>+>' 'pull' = f\n\n\\-\\- Associativity\n(f '>+>' g) '>+>' h = f '>+>' (g '>+>' h)\n@\n\n#pull-diagram#\n\nThe following diagrams show the flow of information:\n\n@\n'pull' :: 'Monad' m\n=> a' -> 'Proxy' a' a a' a m r\n\n\\ a'\n|\n+----|----+\n| v |\na' <============ a'\n| |\na ============> a\n| | |\n+----|----+\nv\nr\n\n('>+>') :: 'Monad' m\n-> (b' -> 'Proxy' a' a b' b m r)\n-> (c' -> 'Proxy' b' b c' c m r)\n-> (c' -> 'Proxy' a' a c' c m r)\n\n\\ b' c' c'\n| | |\n+----|----+ +----|----+ +----|----+\n| v | | v | | v |\na' <== <== b' <== <== c' a' <== <== c'\n| f | | g | = | f >+> g |\na ==> ==> b ==> ==> c a ==> ==> c\n| | | | | | | | |\n+----|----+ +----|----+ +----|----+\nv v v\nr r r\n@\n\n-}\n\n{-| Forward requests followed by responses:\n\n@\n'pull' = 'request' 'Control.Monad.>=>' 'respond' 'Control.Monad.>=>' 'pull'\n@\n\n'pull' is the identity of the pull category.\n-}\npull :: Monad m => a' -> Proxy a' a a' a m r\npull = go\nwhere\ngo a' = Request a' (\\a -> Respond a go)\n{-# INLINABLE pull #-}\n\n{-| Compose two proxies blocked in the middle of 'respond'ing, creating a new\nproxy blocked in the middle of 'respond'ing\n\n@\n(f '>+>' g) x = f '+>>' g x\n@\n\n('>+>') is the composition operator of the pull category.\n-}\n(>+>)\n=> ( b' -> Proxy a' a b' b m r)\n-- ^\n-> (_c' -> Proxy b' b c' c m r)\n-- ^\n-> (_c' -> Proxy a' a c' c m r)\n-- ^\n(fb' >+> fc') c' = fb' +>> fc' c'\n{-# INLINABLE (>+>) #-}\n\n{-| @(f +>> p)@ pairs each 'request' in @p@ with a 'respond' in @f@.\n\nPoint-ful version of ('>+>')\n-}\n(+>>)\n=> (b' -> Proxy a' a b' b m r)\n-- ^\n-> Proxy b' b c' c m r\n-- ^\n-> Proxy a' a c' c m r\n-- ^\nfb' +>> p = case p of\nRequest b' fb -> fb' b' >>~ fb\nRespond c fc' -> Respond c (\\c' -> fb' +>> fc' c')\nM m -> M (m >>= \\p' -> return (fb' +>> p'))\nPure r -> Pure r\n{-# INLINABLE (+>>) #-}\n\n{- \\$reflect\n@(reflect .)@ transforms each streaming category into its dual:\n\n* The request category is the dual of the respond category\n\n@\n'reflect' '.' 'respond' = 'request'\n\n'reflect' '.' (f '/>/' g) = 'reflect' '.' f '/</' 'reflect' '.' g\n@\n\n@\n'reflect' '.' 'request' = 'respond'\n\n'reflect' '.' (f '\\>\\' g) = 'reflect' '.' f '\\<\\' 'reflect' '.' g\n@\n\n* The pull category is the dual of the push category\n\n@\n'reflect' '.' 'push' = 'pull'\n\n'reflect' '.' (f '>~>' g) = 'reflect' '.' f '<+<' 'reflect' '.' g\n@\n\n@\n'reflect' '.' 'pull' = 'push'\n\n'reflect' '.' (f '>+>' g) = 'reflect' '.' f '<~<' 'reflect' '.' g\n@\n-}\n\n-- | Switch the upstream and downstream ends\nreflect :: Monad m => Proxy a' a b' b m r -> Proxy b b' a a' m r\nreflect = go\nwhere\ngo p = case p of\nRequest a' fa -> Respond a' (\\a -> go (fa a ))\nRespond b fb' -> Request b (\\b' -> go (fb' b'))\nM m -> M (m >>= \\p' -> return (go p'))\nPure r -> Pure r\n{-# INLINABLE reflect #-}\n\n{-| An effect in the base monad\n\n'Effect's neither 'Pipes.await' nor 'Pipes.yield'\n-}\ntype Effect = Proxy X () () X\n\n-- | 'Producer's can only 'Pipes.yield'\ntype Producer b = Proxy X () () b\n\n-- | 'Pipe's can both 'Pipes.await' and 'Pipes.yield'\ntype Pipe a b = Proxy () a () b\n\n-- | 'Consumer's can only 'Pipes.await'\ntype Consumer a = Proxy () a () X\n\n{-| @Client a' a@ sends requests of type @a'@ and receives responses of\ntype @a@.\n\n'Client's only 'request' and never 'respond'.\n-}\ntype Client a' a = Proxy a' a () X\n\n{-| @Server b' b@ receives requests of type @b'@ and sends responses of type\n@b@.\n\n'Server's only 'respond' and never 'request'.\n-}\ntype Server b' b = Proxy X () b' b\n\n-- | Like 'Effect', but with a polymorphic type\ntype Effect' m r = forall x' x y' y . Proxy x' x y' y m r\n\n-- | Like 'Producer', but with a polymorphic type\ntype Producer' b m r = forall x' x . Proxy x' x () b m r\n\n-- | Like 'Consumer', but with a polymorphic type\ntype Consumer' a m r = forall y' y . Proxy () a y' y m r\n\n-- | Like 'Server', but with a polymorphic type\ntype Server' b' b m r = forall x' x . Proxy x' x b' b m r\n\n-- | Like 'Client', but with a polymorphic type\ntype Client' a' a m r = forall y' y . Proxy a' a y' y m r\n\n-- | Equivalent to ('/>/') with the arguments flipped\n(\\<\\)\n=> (b -> Proxy x' x c' c m b')\n-- ^\n-> (a -> Proxy x' x b' b m a')\n-- ^\n-> (a -> Proxy x' x c' c m a')\n-- ^\np1 \\<\\ p2 = p2 />/ p1\n{-# INLINABLE (\\<\\) #-}\n\n-- | Equivalent to ('\\>\\') with the arguments flipped\n(/</)\n=> (c' -> Proxy b' b x' x m c)\n-- ^\n-> (b' -> Proxy a' a x' x m b)\n-- ^\n-> (c' -> Proxy a' a x' x m c)\n-- ^\np1 /</ p2 = p2 \\>\\ p1\n{-# INLINABLE (/</) #-}\n\n-- | Equivalent to ('>~>') with the arguments flipped\n(<~<)\n=> (b -> Proxy b' b c' c m r)\n-- ^\n-> (a -> Proxy a' a b' b m r)\n-- ^\n-> (a -> Proxy a' a c' c m r)\n-- ^\np1 <~< p2 = p2 >~> p1\n{-# INLINABLE (<~<) #-}\n\n-- | Equivalent to ('>+>') with the arguments flipped\n(<+<)\n=> (c' -> Proxy b' b c' c m r)\n-- ^\n-> (b' -> Proxy a' a b' b m r)\n-- ^\n-> (c' -> Proxy a' a c' c m r)\n-- ^\np1 <+< p2 = p2 >+> p1\n{-# INLINABLE (<+<) #-}\n\n-- | Equivalent to ('//>') with the arguments flipped\n(<\\\\)\n=> (b -> Proxy x' x c' c m b')\n-- ^\n-> Proxy x' x b' b m a'\n-- ^\n-> Proxy x' x c' c m a'\n-- ^\nf <\\\\ p = p //> f\n{-# INLINABLE (<\\\\) #-}\n\n-- | Equivalent to ('>\\\\') with the arguments flipped\n(//<)\n=> Proxy b' b y' y m c\n-- ^\n-> (b' -> Proxy a' a y' y m b)\n-- ^\n-> Proxy a' a y' y m c\n-- ^\np //< f = f >\\\\ p\n{-# INLINABLE (//<) #-}\n\n-- | Equivalent to ('>>~') with the arguments flipped\n(~<<)\n=> (b -> Proxy b' b c' c m r)\n-- ^\n-> Proxy a' a b' b m r\n-- ^\n-> Proxy a' a c' c m r\n-- ^\nk ~<< p = p >>~ k\n{-# INLINABLE (~<<) #-}\n\n-- | Equivalent to ('+>>') with the arguments flipped\n(<<+)\n=> Proxy b' b c' c m r\n-- ^\n-> (b' -> Proxy a' a b' b m r)\n-- ^\n-> Proxy a' a c' c m r\n-- ^\nk <<+ p = p +>> k\n{-# INLINABLE (<<+) #-}\n\n{-# RULES\n\"(p //> f) //> g\" forall p f g . (p //> f) //> g = p //> (\\x -> f x //> g)\n\n; \"p //> respond\" forall p . p //> respond = p\n\n; \"respond x //> f\" forall x f . respond x //> f = f x\n\n; \"f >\\\\ (g >\\\\ p)\" forall f g p . f >\\\\ (g >\\\\ p) = (\\x -> f >\\\\ g x) >\\\\ p\n\n; \"request >\\\\ p\" forall p . request >\\\\ p = p\n\n; \"f >\\\\ request x\" forall f x . f >\\\\ request x = f x\n\n; \"(p >>~ f) >>~ g\" forall p f g . (p >>~ f) >>~ g = p >>~ (\\x -> f x >>~ g)\n\n; \"p >>~ push\" forall p . p >>~ push = p\n\n; \"push x >>~ f\" forall x f . push x >>~ f = f x\n\n; \"f +>> (g +>> p)\" forall f g p . f +>> (g +>> p) = (\\x -> f +>> g x) +>> p\n\n; \"pull +>> p\" forall p . pull +>> p = p\n\n; \"f +>> pull x\" forall f x . f +>> pull x = f x\n\n#-}\n```"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5079131,"math_prob":0.9294282,"size":18068,"snap":"2022-40-2023-06","text_gpt3_token_len":6291,"char_repetition_ratio":0.16624226,"word_repetition_ratio":0.34190106,"special_character_ratio":0.5110693,"punctuation_ratio":0.095498785,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9978837,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-04T08:11:46Z\",\"WARC-Record-ID\":\"<urn:uuid:f3107f82-dc88-4dfc-bdfa-ac3fb16dc015>\",\"Content-Length\":\"97347\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:79257775-66d5-4637-b15d-700373cae224>\",\"WARC-Concurrent-To\":\"<urn:uuid:640dbe85-8825-46d0-affd-b4a31e1b1f5a>\",\"WARC-IP-Address\":\"147.75.55.189\",\"WARC-Target-URI\":\"https://hackage-origin.haskell.org/package/pipes-4.3.4/docs/src/Pipes-Core.html\",\"WARC-Payload-Digest\":\"sha1:ZIASARPQFVWYKLZAH2SZUTNU4DO44PZL\",\"WARC-Block-Digest\":\"sha1:NYM76QI6U7BZ6G6BS3CEEABRGAXK2ZHX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337480.10_warc_CC-MAIN-20221004054641-20221004084641-00002.warc.gz\"}"} |
https://www.bartleby.com/questions-and-answers/for-exercise-graph-the-equation.-x-42-y-12-4/0a659526-6c22-423d-add6-0bd6e071b5ce | [
"# For Exercise, graph the equation.(x + 4)2 + ( y − 1)2 = 4\n\nQuestion\n1 views\n\nFor Exercise, graph the equation.\n\n(x + 4)2 + ( y − 1)2 = 4\n\ncheck_circle\n\nStep 1\n\nGiven,\n\nStep 2\n\nClearly it is an equation of a circle.\n\nNow comparing the given...",
null,
"help_outlineImage Transcriptionclosecomparing with (x- h)* +(y – k)* =r² , we get h = -4, k = 1 and r² = 4=r = 2 .. centre = (h , k)=(-4,1) and radius = r = 2 %3D %3D fullscreen\n\n### Want to see the full answer?\n\nSee Solution\n\n#### Want to see this answer and more?\n\nSolutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*\n\nSee Solution\n*Response times may vary by subject and question.\nTagged in\n\n### Other",
null,
""
]
| [
null,
"https://prod-qna-question-images.s3.amazonaws.com/qna-images/answer/addd048f-bb89-4267-b54c-271529ad2bd2/50876fed-d7ec-4f77-936e-324f0ac5ff30/m62i6z.png",
null,
"https://www.bartleby.com/static/logo.svg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.87443036,"math_prob":0.99302953,"size":1662,"snap":"2019-51-2020-05","text_gpt3_token_len":485,"char_repetition_ratio":0.12062726,"word_repetition_ratio":0.07570978,"special_character_ratio":0.32430807,"punctuation_ratio":0.23150358,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9974983,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-27T16:14:38Z\",\"WARC-Record-ID\":\"<urn:uuid:8da6cbda-0f55-4373-9070-4e78363fd23c>\",\"Content-Length\":\"107333\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:689be04f-f0a8-4967-a6b8-a0e1f266be63>\",\"WARC-Concurrent-To\":\"<urn:uuid:c1dd074e-b51a-4e24-9649-4f81596abb10>\",\"WARC-IP-Address\":\"54.192.30.68\",\"WARC-Target-URI\":\"https://www.bartleby.com/questions-and-answers/for-exercise-graph-the-equation.-x-42-y-12-4/0a659526-6c22-423d-add6-0bd6e071b5ce\",\"WARC-Payload-Digest\":\"sha1:FTZKY2T3AD5V7PZWJXVOOQAOFGAUNDYU\",\"WARC-Block-Digest\":\"sha1:CQYUTJ6PVT2ZSUEVTXDMHERHDXKEVYYQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251700988.64_warc_CC-MAIN-20200127143516-20200127173516-00391.warc.gz\"}"} |
https://metanumbers.com/1027482 | [
"1027482 (number)\n\n1,027,482 (one million twenty-seven thousand four hundred eighty-two) is an even seven-digits composite number following 1027481 and preceding 1027483. In scientific notation, it is written as 1.027482 × 106. The sum of its digits is 24. It has a total of 4 prime factors and 16 positive divisors. There are 324,432 positive integers (up to 1027482) that are relatively prime to 1027482.\n\nBasic properties\n\n• Is Prime? No\n• Number parity Even\n• Number length 7\n• Sum of Digits 24\n• Digital Root 6\n\nName\n\nShort name 1 million 27 thousand 482 one million twenty-seven thousand four hundred eighty-two\n\nNotation\n\nScientific notation 1.027482 × 106 1.027482 × 106\n\nPrime Factorization of 1027482\n\nPrime Factorization 2 × 3 × 19 × 9013\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 4 Total number of distinct prime factors Ω(n) 4 Total number of prime factors rad(n) 1027482 Product of the distinct prime numbers λ(n) 1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 1 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 1,027,482 is 2 × 3 × 19 × 9013. Since it has a total of 4 prime factors, 1,027,482 is a composite number.\n\nDivisors of 1027482\n\n16 divisors\n\n Even divisors 8 8 4 4\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 16 Total number of the positive divisors of n σ(n) 2.16336e+06 Sum of all the positive divisors of n s(n) 1.13588e+06 Sum of the proper positive divisors of n A(n) 135210 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 1013.65 Returns the nth root of the product of n divisors H(n) 7.59916 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 1,027,482 can be divided by 16 positive divisors (out of which 8 are even, and 8 are odd). The sum of these divisors (counting 1,027,482) is 2,163,360, the average is 135,210.\n\nOther Arithmetic Functions (n = 1027482)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 324432 Total number of positive integers not greater than n that are coprime to n λ(n) 27036 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 80327 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 324,432 positive integers (less than 1,027,482) that are coprime with 1,027,482. And there are approximately 80,327 prime numbers less than or equal to 1,027,482.\n\nDivisibility of 1027482\n\n m n mod m 2 3 4 5 6 7 8 9 0 0 2 2 0 1 2 6\n\nThe number 1,027,482 is divisible by 2, 3 and 6.\n\n• Arithmetic\n• Abundant\n\n• Polite\n\n• Square Free\n\nBase conversion (1027482)\n\nBase System Value\n2 Binary 11111010110110011010\n3 Ternary 1221012102220\n4 Quaternary 3322312122\n5 Quinary 230334412\n6 Senary 34004510\n8 Octal 3726632\n10 Decimal 1027482\n12 Duodecimal 416736\n20 Vigesimal 688e2\n36 Base36 m0t6\n\nBasic calculations (n = 1027482)\n\nMultiplication\n\nn×y\n n×2 2054964 3082446 4109928 5137410\n\nDivision\n\nn÷y\n n÷2 513741 342494 256870 205496\n\nExponentiation\n\nny\n n2 1055719260324 1084732537036224168 1114543156619053680584976 1145173031649258513834812310432\n\nNth Root\n\ny√n\n 2√n 1013.65 100.908 31.8378 15.9351\n\n1027482 as geometric shapes\n\nCircle\n\n Diameter 2.05496e+06 6.45586e+06 3.31664e+12\n\nSphere\n\n Volume 4.54372e+18 1.32666e+13 6.45586e+06\n\nSquare\n\nLength = n\n Perimeter 4.10993e+06 1.05572e+12 1.45308e+06\n\nCube\n\nLength = n\n Surface area 6.33432e+12 1.08473e+18 1.77965e+06\n\nEquilateral Triangle\n\nLength = n\n Perimeter 3.08245e+06 4.5714e+11 889826\n\nTriangular Pyramid\n\nLength = n\n Surface area 1.82856e+12 1.27837e+17 838936\n\nCryptographic Hash Functions\n\nmd5 0f633b21f05d0bddfe13fa3f704282e0 c162e5c39a732ce89ec5ab77d3b5021487a75527 0b89164d4baf022ffb0694e824e22f76a267be345eea4693e5e7c9c595c8f982 59f9cccf1833ffee774a02b1211e2982602790ccb7fca089fd690090a0067bf4697ac8637ad9f1c2d33800da2afebe1fb9cea3a42036a660383fe2173c8d9fb3 45f8628b7a84e7381642ae63f91a672ea96d994e"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.62356496,"math_prob":0.99070525,"size":4724,"snap":"2022-05-2022-21","text_gpt3_token_len":1690,"char_repetition_ratio":0.122245766,"word_repetition_ratio":0.036549706,"special_character_ratio":0.46972904,"punctuation_ratio":0.08550186,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99706113,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-16T18:22:52Z\",\"WARC-Record-ID\":\"<urn:uuid:31178ebe-934b-41b8-b87d-72af03028922>\",\"Content-Length\":\"40071\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cc5f28e5-caf4-42ac-9f5f-f9d4a6e41a6f>\",\"WARC-Concurrent-To\":\"<urn:uuid:b0460998-e846-4778-8427-3b2f43289d76>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/1027482\",\"WARC-Payload-Digest\":\"sha1:CR7OB7EELFJLMJ62M7LELI23KEQY76LR\",\"WARC-Block-Digest\":\"sha1:GK7T3GT6Q5LGY3QUJH3WURYSD3W2SOOF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320300010.26_warc_CC-MAIN-20220116180715-20220116210715-00707.warc.gz\"}"} |
https://sbseminar.wordpress.com/2009/04/21/local-systems-the-path-groupoid-approach/ | [
"# Local systems: the path groupoid approach\n\nThis is the first of the series of posts I promised, on different ways of getting local systems.\n\nIn this section, we’ll explain the approach which leads to étale sheaves. I’ll start out by describing the analogous ideas in the topological setting; and then sketch how to make them fully algebraic.\n\nI’ve realized that I need a word for the data which I use to obtain a local system. Because I’m feeling uncreative, I’ll call it the input. Again,",
null,
"$X$ is a space of some sort on which we want to build a local system.\n\nFor any two points",
null,
"$x$ and",
null,
"$y$ in",
null,
"$X$, let",
null,
"$[x,y]$ denote the set of paths from",
null,
"$x$ to",
null,
"$y$, modulo homotopy. By concatenating paths, we get a multiplication",
null,
"$*: [x,y] \\times [y.z] \\to [x,z]$. In particular,",
null,
"$[x,x]$ is the fundamental group",
null,
"$\\pi_1(X, x)$.\n\nDefinition A.1: An A.1 input consists of a vector bundle",
null,
"$V$ on",
null,
"$X$ and, for every",
null,
"$x$ and",
null,
"$y$ in",
null,
"$X$ and every path",
null,
"$\\gamma$ from",
null,
"$x$ to",
null,
"$y$, an isomorphism",
null,
"$\\phi_{\\gamma} : V_x \\to V_y$, such that",
null,
"$\\phi_{\\gamma} \\circ \\phi_{\\gamma'} = \\phi_{\\gamma * \\gamma'}$.\n\nLet",
null,
"$\\mathcal{V}$ be an A.1 local system and let",
null,
"$U$ be an open subset of",
null,
"$X$. Define",
null,
"$\\Gamma(U,\\mathcal{V})$ to be the vector space of sections",
null,
"$\\sigma : U \\to \\mathcal{V}|_U$ such that",
null,
"$\\phi_{\\gamma}(\\sigma(u)) = \\sigma(v)$, for",
null,
"$u$ and",
null,
"$v$ are any two points of",
null,
"$U$ and",
null,
"$\\gamma$ is any path from",
null,
"$u$ to",
null,
"$v$ that stays within",
null,
"$U$. Notice that, if",
null,
"$U$ is a ball, then the dimenion of",
null,
"$\\Gamma(U,\\mathcal{V})$ is the rank of",
null,
"$\\mathcal{V}$. Also,",
null,
"$V \\supset U$ is a containment of two balls, then the restriction map",
null,
"$\\Gamma(U, \\mathcal{V}) \\to \\Gamma(V, \\mathcal{V})$ is an isomorphism.\n\nThere is a general philosophy in mathematics that a bundle can be recovered from knowing its sections over open sets. The key technical definition here is that of a sheaf.\nSo here is a definition which uses the",
null,
"$\\Gamma$‘s.\n\nDefinition A.2 An A.2 input of rank",
null,
"$n$ is the data of (1) for",
null,
"$U$ any open subset of",
null,
"$X$, a vector space",
null,
"$\\Gamma(U)$ and (2) for any inclusion",
null,
"$U \\supset V$ of open sets, a map",
null,
"$\\rho_{UV}: \\Gamma(U) \\to \\Gamma(V)$. It is required that (1)",
null,
"$(\\Gamma, \\rho)$ satisfy the axioms of a sheaf (2) whenever",
null,
"$U$ is a ball,",
null,
"$\\Gamma(U)$ is an",
null,
"$n$-dimensional vector space and (3) whenever",
null,
"$U \\supset V$ is a containment of balls,",
null,
"$\\rho_{UV}$ is an isomorphism.\n\nThis is the definition wikipedia gives for a local system.\n\nMaking this definition algebraic: To make this definition algebraic, one modifies definition A.2. Open sets are replaced by étale maps.\n\nWhen working over",
null,
"$\\mathbb{C}$, we can describe an étale map as an algebraic map",
null,
"$i: U \\to X$ such that, for any",
null,
"$u \\in U$, we have some open neighborhood",
null,
"$V$ of",
null,
"$u$ such that",
null,
"$i: V \\to i(V)$ is a homeomorphism. (Notice that this definition is local on the source; if we made the definition local on the target, we’d be defining a covering space.)\n\nThe reason to introduce étale maps is that there aren’t enough Zariski open sets to “see” the topology of",
null,
"$X$ but there are enough étale maps. For example, let",
null,
"$X$ be",
null,
"$\\mathbb{C}^*$ and let’s try to see the nontrivial cycle. We cannot find Zariski open sets",
null,
"$U_1$,",
null,
"$U_2$ and",
null,
"$U_3$ with nonempty pairwise intersections, but triplewise empty intersection. However, we can find the",
null,
"$N$-fold cover of",
null,
"$\\mathbb{C}^*$ by itself. This latter étale map let’s us see that",
null,
"$X$ has a cycle.\n\nOne has to rework the definition of a sheaf to work with maps rather than open sets. This is abstract but not difficult; the precise definition you need is that of a sheaf on a Grothendieck topology.\n\nYou’ll notice that there was no reason to work with real vector spaces here; vector spaces over a finite field would have done just as well in the topological discussion, and turn out to do much better once we shift to the fully algebraic setting. It is common to take",
null,
"$X$ to be an algebraic variety over a field of characteristic",
null,
"$p$ and",
null,
"$V$ to be a bundle of vector spaces over a field of a different characteristic",
null,
"$\\ell$. When you hear people talking about",
null,
"$\\ell$-adic methods, that’s what they are talking about.\n\nFinally, I’ll remark that there is a definition of the étale fundmental groupoid, and one could use this to mimic definition A.1. If you unfold what that definition means, however, you’ll see that you are really just working with definition A.2.\n\n## 8 thoughts on “Local systems: the path groupoid approach”\n\n1. I have put a similar comment to the following on the ncatlab.\n\nLocal systems for singular cohomology can also be seen as a special case of cohomology with coefficients in a crossed complex, and so related to homotopy classes of maps of spaces. Section 7. of the second paper below\n\n61. (with P.J. HIGGINS), “Crossed complexes and chain complexes\nwith operators”, {\\em Math. Proc. Camb. Phil. Soc.} 107 (1990)\n33-57.\n\n71. (with P.J.HIGGINS), “The classifying space of a crossed\ncomplex”, {\\em Math. Proc. Camb. Phil. Soc.} 110 (1991) 95-120.\n\nis on local systems. The first paper relates crossed complexes and chain complexes with a groupoid of operators. The second paper proves a homotopy classification theorem, and in fact gives information on function spaces. Crossed complexes can be seen as giving the first step towards nonabelian cohomology.\n\nA module M over a groupoid G gives rise to a crossed complex K(M,n;G,1) which has M in dimension n and G in dimension 1, and trivial boundaries. But the category of crossed complexes has many conveniences, for example it is monoidal closed, and so has convenient notions of homotopy and higher homotopies.\n\nhttp://www.bangor.ac.uk/r.brown/publicfull.htm\n\n2. When you redo everything for etale maps, what is the notion of ball? Affine schemes seems the most natural, but then there are pesky non-free projectives with flat connection, whose sections might not be of full dimension. Is it better to work with local schemes, or complete local schemes (the latter because of how nicely they play with the etale topology)?\n\n3. Greg,\n\nI think the correct analogue of balls is the formal neighborhoods of individual points. Of course, arguments of the form “I do everything on balls and then glue” have to be done a bit more carefully in this context, using infinitesimal information as well, so you end up having to think about flat connections on jet schemes and Harish-Chandra torsors. There’s a long discussion of this in the paper of Bezrukavnikov and Kaledin on algebraic Fedosov quantization.\n\n4. I’d like to elaborate just a bit. The notion of path translates well to the spectrum of a Henselian local ring, and one of the many equivalent formulations of the condition for a map to be formally étale (namely that deformations lift uniquely) is analogous to the uniqueness of path lifts for covering spaces. Actually, since the deformations in question don’t have to be from maps of points, it’s more like a general homotopy lifting property. Your typical affine scheme is too big to be contractible like a path [Edit: or a ball]. For example, if you puncture the affine line a couple times, it admits a lot of nontrivial local systems.\n\n5. @ David,\n\nJust a couple of typos:\n\n• In “Definition A.2” there is a $n$ when you probably meant to have a",
null,
"$n$; &\n\n• Two paragraphs below that, there’s a $u$ that should read",
null,
"$u$.\n\nOtherwise, excellent series!\n\nCheers."
]
| [
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9180049,"math_prob":0.99376065,"size":6514,"snap":"2023-14-2023-23","text_gpt3_token_len":1514,"char_repetition_ratio":0.1156682,"word_repetition_ratio":0.005221932,"special_character_ratio":0.22213693,"punctuation_ratio":0.12369598,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999286,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-05-30T23:10:15Z\",\"WARC-Record-ID\":\"<urn:uuid:5cc99553-6f1b-41d5-adde-125c6df699b8>\",\"Content-Length\":\"118804\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:65ebb5af-df8c-4086-a14f-341609f1c292>\",\"WARC-Concurrent-To\":\"<urn:uuid:7b4860e3-10af-414d-9ae8-08629b32d4a6>\",\"WARC-IP-Address\":\"192.0.78.12\",\"WARC-Target-URI\":\"https://sbseminar.wordpress.com/2009/04/21/local-systems-the-path-groupoid-approach/\",\"WARC-Payload-Digest\":\"sha1:YR7FUKGMTKCSBAMT652PO3X65NRC2QC6\",\"WARC-Block-Digest\":\"sha1:JOOOXV4ZYGSUC6GPRZDPMVQ6BMUOWWLJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224646181.29_warc_CC-MAIN-20230530230622-20230531020622-00344.warc.gz\"}"} |
https://bio.libretexts.org/Bookshelves/Introductory_and_General_Biology/Book%3A_General_Biology_(Boundless)/41%3A_Osmotic_Regulation_and_the_Excretory_System/41.03%3A_Osmoregulation_and_Osmotic_Balance_-_Concept_of_Osmolality_and_Milliequivalent | [
"# 41.3: Osmoregulation and Osmotic Balance - Concept of Osmolality and Milliequivalent\n\n$$\\newcommand{\\vecs}{\\overset { \\rightharpoonup} {\\mathbf{#1}} }$$ $$\\newcommand{\\vecd}{\\overset{-\\!-\\!\\rightharpoonup}{\\vphantom{a}\\smash {#1}}}$$$$\\newcommand{\\id}{\\mathrm{id}}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$ $$\\newcommand{\\kernel}{\\mathrm{null}\\,}$$ $$\\newcommand{\\range}{\\mathrm{range}\\,}$$ $$\\newcommand{\\RealPart}{\\mathrm{Re}}$$ $$\\newcommand{\\ImaginaryPart}{\\mathrm{Im}}$$ $$\\newcommand{\\Argument}{\\mathrm{Arg}}$$ $$\\newcommand{\\norm}{\\| #1 \\|}$$ $$\\newcommand{\\inner}{\\langle #1, #2 \\rangle}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$ $$\\newcommand{\\id}{\\mathrm{id}}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$ $$\\newcommand{\\kernel}{\\mathrm{null}\\,}$$ $$\\newcommand{\\range}{\\mathrm{range}\\,}$$ $$\\newcommand{\\RealPart}{\\mathrm{Re}}$$ $$\\newcommand{\\ImaginaryPart}{\\mathrm{Im}}$$ $$\\newcommand{\\Argument}{\\mathrm{Arg}}$$ $$\\newcommand{\\norm}{\\| #1 \\|}$$ $$\\newcommand{\\inner}{\\langle #1, #2 \\rangle}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$$$\\newcommand{\\AA}{\\unicode[.8,0]{x212B}}$$\n\n##### Learning Objectives\n• Describe osmolality and milliequivalent\n\n## Concept of osmolality and milliequivalent\n\nIn order to calculate osmotic pressure, it is necessary to understand how solute concentrations are measured. The unit for measuring solutes is the mole. One mole is defined as the molecular weight of the solute in grams. For example, the molecular weight of sodium chloride is 58.44; thus, one mole of sodium chloride weighs 58.44 grams. A solution’s molarity is the number of moles of solute per liter of solution. On the other hand, a solution’s molality is the number of moles of solute per kilogram of solvent. If the solvent is water, one kilogram of water is equal to one liter of water. Osmolarity is related to osmolality, but is affected by changes in water content, as well as temperature and pressure. In contrast, osmolality is unaffected by temperature and pressure.\n\nMolarity and molality represent solution concentration, but electrolyte concentrations are usually expressed in terms of milliequivalents per liter (mEq/L). The mEq/L is the ion concentration, in millimoles, multiplied by the number of electrical charges on the ion. The milliequivalent unit incorporates both the ion concentration and the charge on the ions.\n\nThus, for ions that have a charge of one, such as sodium (Na+), one milliequivalent is equal to one millimole. For ions that have a charge of two, such as calcium (Ca2+), one milliequivalent is equal to 0.5 millimoles. Another unit of electrolyte concentration is the milliosmole (mOsm), which is the number of milliequivalents of solute per kilogram of solvent. Osmoregulation maintains body fluids in a range of 280 to 300 mOsm.\n\nConcentration of solutions; part 2; moles, millimoles & milliequivalents by Professor Fink: Professor Fink reviews the use of moles, millimoles & milliquivalents in expressing concentration and dosage. Example problems are presented explaining how to prepare molar solutions and convert to percent concentration. In addition, Professor Fink explains how to convert from millimoles to milliequivalents, or convert milliequivalents back to millimoles.\n\n## Key Points\n\n• Osmotic pressure is calculated from a solution’s molarity and the charge on the ions.\n• A solution’s molarity is the number of moles of solute per liter of solution, while a solution’s molality is the number of moles of solute per kilogram of solvent.\n• Osmolarity is related to osmolality, but osmolality is unaffected by temperature and pressure.\n• Electrolyte concentrations are usually expressed in terms of milliequivalents per liter (mEq/L), which is the ion concentration, in millimoles, multiplied by the number of electrical charges on the ion.\n\n## Key Terms\n\n• osmotic pressure: the hydrostatic pressure exerted by a solution across a semipermeable membrane from a pure solvent\n• molarity: the number of moles of solute per liter of solution, giving a solution’s molar concentration\n• molality: the concentration of a substance in solution, expressed as the number of moles of solute per kilogram of solvent\n• mole: in the International System of Units, the base unit of amount of substance\n\nThis page titled 41.3: Osmoregulation and Osmotic Balance - Concept of Osmolality and Milliequivalent is shared under a CC BY-SA 4.0 license and was authored, remixed, and/or curated by Boundless."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.88969815,"math_prob":0.99808705,"size":3217,"snap":"2023-14-2023-23","text_gpt3_token_len":762,"char_repetition_ratio":0.17366947,"word_repetition_ratio":0.21556886,"special_character_ratio":0.19583462,"punctuation_ratio":0.1142355,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98940146,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-09T04:06:39Z\",\"WARC-Record-ID\":\"<urn:uuid:764f314a-c519-49de-aef0-a186901850fa>\",\"Content-Length\":\"138543\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:66f6d2e6-f81d-4218-8afe-858bca0483cf>\",\"WARC-Concurrent-To\":\"<urn:uuid:ab38023d-bad4-4ba4-9b45-66f9ee5675e5>\",\"WARC-IP-Address\":\"13.249.39.44\",\"WARC-Target-URI\":\"https://bio.libretexts.org/Bookshelves/Introductory_and_General_Biology/Book%3A_General_Biology_(Boundless)/41%3A_Osmotic_Regulation_and_the_Excretory_System/41.03%3A_Osmoregulation_and_Osmotic_Balance_-_Concept_of_Osmolality_and_Milliequivalent\",\"WARC-Payload-Digest\":\"sha1:VWNC2KU7HC2L3D76JALFDY5IGPWL75LK\",\"WARC-Block-Digest\":\"sha1:4OQ22V6XPV5O4ZDNYI6EINASHLLDJHGD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224655247.75_warc_CC-MAIN-20230609032325-20230609062325-00666.warc.gz\"}"} |
https://keisan.casio.com/exec/system/14060744929691 | [
"# Normal distribution (interval) Calculator\n\n## Calculates the two probability density functions and inner and outer cumulative distribution functions of the normal distribution and draws the chart.",
null,
"percentile x1 percentile x2 x1≦ x2 mean μ standard deviation σ σ>0 6digit10digit14digit18digit22digit26digit30digit34digit38digit42digit46digit50digit\nThe default value μ and σ shows the standard normal distribution.\n\nNormal distribution (interval)\n [1-1] /1 Disp-Num5103050100200",
null,
"",
null,
"2019/04/29 19:02 60 years old level or over / An engineer / Very /\nPurpose of use\nProbability of random motor deflection causing rubbing between rotor and stator.\nComment/Request\nGood stuff... thank you!",
null,
"",
null,
"Sending completion",
null,
"To improve this 'Normal distribution (interval) Calculator', please fill in questionnaire.\nAge\n\nOccupation\n\nUseful?\n\nPurpose of use?",
null,
""
]
| [
null,
"https://keisan.casio.com/keisan/lib/real/system/2006/14060744929691/intervalNx.gif",
null,
"https://keisan.casio.com/keisan/pc/common/img/btn_back_none.gif",
null,
"https://keisan.casio.com/keisan/pc/common/img/btn_next_none.gif",
null,
"https://keisan.casio.com/keisan/pc/common/img/btn_back_none.gif",
null,
"https://keisan.casio.com/keisan/pc/common/img/btn_next_none.gif",
null,
"https://keisan.casio.com/keisan/pc/common/img/btn_back.gif",
null,
"https://keisan.casio.com/keisan/pc/common/img/btn_send.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6784519,"math_prob":0.8971713,"size":669,"snap":"2021-43-2021-49","text_gpt3_token_len":145,"char_repetition_ratio":0.19398496,"word_repetition_ratio":0.0,"special_character_ratio":0.23617339,"punctuation_ratio":0.094339624,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9513935,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,3,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-07T03:07:24Z\",\"WARC-Record-ID\":\"<urn:uuid:9c374ae2-8b59-4605-93be-6bb6c0ea85e2>\",\"Content-Length\":\"28610\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:927c2122-4577-46d5-9ddb-d4e5d584abaf>\",\"WARC-Concurrent-To\":\"<urn:uuid:426bcffd-69f4-494a-9ce7-3574cbcc07d5>\",\"WARC-IP-Address\":\"54.95.163.145\",\"WARC-Target-URI\":\"https://keisan.casio.com/exec/system/14060744929691\",\"WARC-Payload-Digest\":\"sha1:3H3MSZBDYRZM5TOWWGWPDSYDEI5DSW5Y\",\"WARC-Block-Digest\":\"sha1:QTOXKLT2JMCPJLGZGBGFOBIKK3AHK2GF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363332.1_warc_CC-MAIN-20211207014802-20211207044802-00462.warc.gz\"}"} |
https://www.mathworks.com/help/mpc/ug/setting-targets-for-manipulated-variables.html | [
"# Setting Targets for Manipulated Variables\n\nThis example shows how to design a model predictive controller for a plant with two inputs and one output with target setpoint for a manipulated variable.\n\n### Define Plant Model\n\nThe linear plant model has two inputs and two outputs.\n\n```N1 = [3 1]; D1 = [1 2*.3 1]; N2 = [2 1]; D2 = [1 2*.5 1]; plant = ss(tf({N1,N2},{D1,D2})); A = plant.A; B = plant.B; C = plant.C; D = plant.D; x0 = [0 0 0 0]'; ```\n\n### Design MPC Controller\n\nCreate MPC controller.\n\n```Ts = 0.4; % Sample time mpcobj = mpc(plant,Ts,20,5); ```\n```-->The \"Weights.ManipulatedVariables\" property of \"mpc\" object is empty. Assuming default 0.00000. -->The \"Weights.ManipulatedVariablesRate\" property of \"mpc\" object is empty. Assuming default 0.10000. -->The \"Weights.OutputVariables\" property of \"mpc\" object is empty. Assuming default 1.00000. ```\n\nSpecify weights.\n\n```mpcobj.weights.manipulated = [0.3 0]; % weight difference MV#1 - Target#1 mpcobj.weights.manipulatedrate = [0 0]; mpcobj.weights.output = 1; ```\n\nDefine input specifications.\n\n```mpcobj.MV = struct('RateMin',{-0.5;-0.5},'RateMax',{0.5;0.5}); ```\n\nSpecify target setpoint `u = 2` for the first manipulated variable.\n\n```mpcobj.MV(1).Target=2; ```\n\nTo run this example, Simulink® is required.\n\n```if ~mpcchecktoolboxinstalled('simulink') disp('Simulink(R) is required to run this example.') return end ```\n\nSimulate.\n\n```mdl = 'mpc_utarget'; open_system(mdl) % Open Simulink(R) Model sim(mdl); % Start Simulation ```\n```-->Converting model to discrete time. -->Assuming output disturbance added to measured output channel #1 is integrated white noise. -->The \"Model.Noise\" property of the \"mpc\" object is empty. Assuming white noise on each measured output channel. ```",
null,
"",
null,
"",
null,
"```bdclose(mdl) ```"
]
| [
null,
"https://www.mathworks.com/help/examples/mpc/win64/mpcutarget_01.png",
null,
"https://www.mathworks.com/help/examples/mpc/win64/mpcutarget_02.png",
null,
"https://www.mathworks.com/help/examples/mpc/win64/mpcutarget_03.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.66660607,"math_prob":0.9829935,"size":1590,"snap":"2020-10-2020-16","text_gpt3_token_len":481,"char_repetition_ratio":0.115384616,"word_repetition_ratio":0.05909091,"special_character_ratio":0.31132075,"punctuation_ratio":0.23283581,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99613845,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-06T18:48:00Z\",\"WARC-Record-ID\":\"<urn:uuid:9fdb73d0-1f9e-421a-9dfe-a88656b31463>\",\"Content-Length\":\"71151\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aec23f3d-c5e4-4386-93c9-fcb11fb42464>\",\"WARC-Concurrent-To\":\"<urn:uuid:567e61f2-3a66-44b5-91bf-abb0b9671bc1>\",\"WARC-IP-Address\":\"184.25.198.13\",\"WARC-Target-URI\":\"https://www.mathworks.com/help/mpc/ug/setting-targets-for-manipulated-variables.html\",\"WARC-Payload-Digest\":\"sha1:35RFFAWMQ5WXZVWC2WA2WM75APIEP3QV\",\"WARC-Block-Digest\":\"sha1:5PCEPE7WDHWKVIIVGNQFMSF5YJSHHRAW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371656216.67_warc_CC-MAIN-20200406164846-20200406195346-00490.warc.gz\"}"} |
https://physics.stackexchange.com/questions/104470/where-do-our-4-macroscopic-spacetime-dimensions-reside-in-multidimensional-model | [
"# Where do our 4 macroscopic spacetime dimensions reside in multidimensional models of the universe?\n\nIn models such as M-theory with 7 'higher dimensions' plus the 4 macroscopic spacetime dimensions, where do our 4 macroscopic spacetime dimensions reside ordinally? My reason for asking is TV shows such as the 'Fabric of the Cosmos' that alludes to 'lower' dimensions in string theory. I can understand if our 4 are, say the 7th, 8th, 9th and 10th so there are dimensions lower than us but that we cannot readily detect.\n\n• I am way out of may region of expertise here, but my first reaction is that this is equivalent to asking which of the three spacial dimension we live in is \"first\", which is ill-defined. They all come into the interval in either a space-like or a time-like way $(\\Delta s)^2 = \\sum_{i \\in \\text{spacelike}}(\\Delta x_i)^2 - \\sum_{j \\in \\text{timelike}}(c \\Delta x_j)^2$ (or the other sign convention if you prefer, of course) so they are all equivalent. – dmckee --- ex-moderator kitten Mar 20 '14 at 23:59\n• @dmckee. Aren't there specific mathematical definitions of (orthogonal) dimensions that tie dimensions N and N+1 together by things like projection? So, some sort of ordering should be possible, no? And in matrix math the spaces of \"points, lines, plane\" are based on tensors of 1st, 2nd and 3rd order etc. – PlaysDice Mar 21 '14 at 0:26\n• I think what dmckee is saying is that we can't really say that $x$ is the 1st ordinal dimension or 3rd ordinal dimensions when considering 3D only, how could we possibly say anything at higher dimensions? – Kyle Kanos Mar 21 '14 at 0:28\n• @KyleKanos Thanks. (I was a bit slow in the uptake, thanks dmkee.) So is the answer that M-theory does not (and does not need to) place our macroscopic universe in a particular ordinal range of possible dimensions? – PlaysDice Mar 21 '14 at 0:39\n• My pre-post search missed this answer re compactification that looks useful – PlaysDice Mar 21 '14 at 0:43"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9164363,"math_prob":0.95739245,"size":4125,"snap":"2020-45-2020-50","text_gpt3_token_len":1018,"char_repetition_ratio":0.14923562,"word_repetition_ratio":0.029069768,"special_character_ratio":0.24824242,"punctuation_ratio":0.08226221,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98014367,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-22T15:25:40Z\",\"WARC-Record-ID\":\"<urn:uuid:8df295a0-3a2b-4fc8-b80d-c2176980a046>\",\"Content-Length\":\"154221\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:581f3a89-0cbd-47e1-b91b-bb7cec771c19>\",\"WARC-Concurrent-To\":\"<urn:uuid:e558ad59-b52a-4813-86b1-5c12e3f9ce23>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://physics.stackexchange.com/questions/104470/where-do-our-4-macroscopic-spacetime-dimensions-reside-in-multidimensional-model\",\"WARC-Payload-Digest\":\"sha1:MHMQ7C4VVWI2DMI43MYDOPXJA73NGOBJ\",\"WARC-Block-Digest\":\"sha1:UN5WJWTONVCV5TQ4AHOLBCK2UNNZTCRM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107879673.14_warc_CC-MAIN-20201022141106-20201022171106-00080.warc.gz\"}"} |
https://www.physicsforums.com/threads/height-when-a-ball-is-thrown-vertically-at-half-its-velocity.735950/#post-4647758 | [
"# Height when a ball is thrown vertically at half its velocity\n\n\n\n## Homework Statement\n\nA baseball is thrown vertically into the air with a velocity, v, and reaches a maximum height, h. At what height was the baseball with one-half its original velocity? Assume no air resistance.\n\n## Homework Equations\n\nv22 = v12 + 2ad ?\n\n## The Attempt at a Solution\n\nlet 10m/s be the original velocity\nd = $\\frac{v^{2}_{2} - v^{1}_{2}}{2g}$\nd = $\\frac{0 m/s - (10 m/s)^{2}}{2(-9.8 m/s^{2}}$\nd = 5.1\n\nat 5 m/s:\n\nd = $\\frac{0 m/s - (5 m/s)^{2}}{2(-9.8 m/s^{2}}$\nd = 1.28\n\n$\\frac{1.28}{5.1}$ = 0.25\n\nbut the answer is 0.75 of the original height. How to solve this?\n\nDick\nHomework Helper\n\n\n## Homework Statement\n\nA baseball is thrown vertically into the air with a velocity, v, and reaches a maximum height, h. At what height was the baseball with one-half its original velocity? Assume no air resistance.\n\n## Homework Equations\n\nv22 = v12 + 2ad ?\n\n## The Attempt at a Solution\n\nlet 10m/s be the original velocity\nd = $\\frac{v^{2}_{2} - v^{1}_{2}}{2g}$\nd = $\\frac{0 m/s - (10 m/s)^{2}}{2(-9.8 m/s^{2}}$\nd = 5.1\n\nat 5 m/s:\n\nd = $\\frac{0 m/s - (5 m/s)^{2}}{2(-9.8 m/s^{2}}$\nd = 1.28\n\n$\\frac{1.28}{5.1}$ = 0.25\n\nbut the answer is 0.75 of the original height. How to solve this?\n\nThe d you are calculating is the distance between the point where the velocity v=0 and the point where the velocity is v/2. The point where v=0 is at the TOP of your trajectory.\n\nI didn't fully understand what you mean\n\nNascentOxygen\nStaff Emeritus\nI didn't fully understand what you mean\nAce, in the second part are not using the correct reference level.\n\nThe question you should be answering is: if a ball is thrown vertically upwards, at what height above the ground has its velocity dropped back to half of what it initially had?\n\nLast edited:\nDick"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7884073,"math_prob":0.9987826,"size":1187,"snap":"2021-31-2021-39","text_gpt3_token_len":472,"char_repetition_ratio":0.15046492,"word_repetition_ratio":0.8102564,"special_character_ratio":0.43807918,"punctuation_ratio":0.12080537,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99987197,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-25T00:21:21Z\",\"WARC-Record-ID\":\"<urn:uuid:b2672e4a-52db-45a6-a1ad-2335da8d4cc6>\",\"Content-Length\":\"77408\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9383b621-c720-4435-92ea-f61be626f0f5>\",\"WARC-Concurrent-To\":\"<urn:uuid:a5c17bf3-be13-422b-9469-af61dd10ff4c>\",\"WARC-IP-Address\":\"104.26.15.132\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/height-when-a-ball-is-thrown-vertically-at-half-its-velocity.735950/#post-4647758\",\"WARC-Payload-Digest\":\"sha1:OV4EF2734ZWIJKF2VKZ2TDXDGXHIHPX5\",\"WARC-Block-Digest\":\"sha1:EL52YZ4ZMB4VAWGLCDIS2IRVOYRS35LA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057584.91_warc_CC-MAIN-20210924231621-20210925021621-00672.warc.gz\"}"} |
https://fdocument.org/document/bhavitha-24022011-em-maths.html | [
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"• date post\n\n14-Oct-2014\n• Category\n\n## Documents\n\n• view\n\n72\n• download\n\n0\n\nEmbed Size (px)\n\n### Transcript of Bhavitha 24.02.2011 EM Maths\n\n&&&&&&&&&W W W . S A K S H I . C O M / V I D Y A / B H A V I T H A.-= .- r.. --.-- : oe a+aaa++Connectives: 1. and 2. or 3. if... then 4. if and only if Compound Statements: 1.Disjunction 2. Conjunction 3. Conditional4. BiconditionalFunction: f:AB, 1. if for every aAthere is b B such that (a/b)fOne-one function (injection): f(x1) = f(x2) x1= x2Arithmetic progression(A.P) difference (d) is equalGeneral form of A.P a, a + d, a + 2d, ....Modulus of 'x', |x| |x| = x if x > 0 or - xif x < 0 or 0 if x = 0|x| = a solution: x=a or x= - aQuadratic equation ax2+ bx+c=0Discriminent = b24ac > 0 Roots are real, unequalSexagesimal system DegreeCentesimal system gradeCircular measure RadianConvex Set: X is convex if the line segment joining any two points P, Q in x is contained in xLinear programming problem L.P.P consists of Minimising/maximising a function f = ax+by, a, bR subject to certain constraints Circum center Concurrence point of perpendicular bisector of the sides of the Triangle.In center concurrence point of angle bisector of the Triangle.Equation of X-axis y = KEquation of Y-axis x = KSlope of X-axis 010thMATHEMATICSBITBANK SPECIAL Practice Bits Important Questions Question Trends Preparation Tips Quick Review10thMATHEMATICSBITBANK SPECIALQUICK RE'VIEW': ,r --.-- a+ ..o aa++2p or not p is example forMATHEMATICS BIT BANKSTATEMENTS, SETSSTATEMENTS1. The terms which connect two statements arecalled ________2. If the switch P is OFF we represent it by________3. The complement law using is ________4. The truth value of (32) (2=3) is _______5. The statement of the form If...... then.......is called an ________6. Acombination of one or more simple state-ments with a connective is called a _______ 7. The symbol for existential quantifier________ (June 2009), (June 2008)8. ~(p q) = ________9. The contrapositive of If a polygen is asquare then it is a rectangle is _________ 10. p, q, r are threee statements then p (q r)= (p q) (q r) is ________ law11. For all or For every is called ________quantifier.12. If p and q are switches. The combination ofp q is called _____________________13. p and q are two statements. The symbolicform of Converse of a conditional is equiv-alent to its inverse is ____________14. The statement which uses the connectiveOR is called a __________________15. The truth value of (4 7 = 20) (47=1)is ___________________16. P is the statement then ~(~(~p)) is _______17. The symbolic form of If x is not odd thenx2is odd ___________________18. p: It is raining, q: The sun is shining .Connect p,q using conjuction is ________19. Denial of a statement is called its ________20. p and q are two statements then example fortautology is ________________21. p(~p) is very simple example of a ______(June 2009)22. ~(pq) __________ (June 2009)23. Pp = p. This is ________ law. (June 2010)24. The symbol of Universal Quantifier is________ (March 2009)25. ~(pq) (~p) (~q) is _________ law.(June 2008)26. p(qr) (pr) (pr) is ______ law.(March 2008)27. The truth value of implication statement : If 3 2 = 5 then 1 0 = 0 is _________(March 2008)28. The last column of truth table contains onlyF it is called _________________29. p or not p is example for ___________30. The inverse of ~p ~q is __________SETS1. If Aand B are disjoint sets, then n(A B) =____________ (June 2009)2. If AB then AB = _______(June 2009)3. The complement of is ____________(March 2009)4. n() = _________ (March 2009)5. If A B then A B = ______(June 2008)6. If AB and BA then ______ (June 2008)7. A A' = ________ (June 2008)8. If AB and n(A) = 5, n(B) = 6 then n(AB)= _______ (March 2008)9. The set builder form of B = {1,8,27,64,125}is ________ (March 2008)10. (A B)' = ________ (March 2010)11. If A = {3,4}, B = {4,5} then n (AB) =_________12. (A B) (AC) = _________13. If Asand B are two sets then A B = _____14. If AB, n(A) = 10 and n(B) = 15 then n(A-B) = _________15. If AB = , n(AB) = 12 then n(AB) =__________16. If A, B, C are three sets A(BC) = ______17. n(AB) = 8, n(AB) = 2, n(B) = 3 thenn(A) = _________18. If A= {x; x 5, x N}, B = {2,3,6,8} thenAB = ________19. If A, B are disjoint sets n(A) = 4, n(AB) =12 then n(B) = _________20. (A B)' = A' B' is ________ law.21. A, B are two sets then x (A B) = _____22. A B and n(A) = 5, n(B) = 6 then n(AB)= _______23. The sets which are having same cardnialnumbers are called __________24. If Ahas n elements then the number of ele-ments in proper sub set is ________25. If A and B are disjoint sets then n(AB) =______________26. If n(A) = 7, n(B) = 5 then the maximumnumber of elements in AB is _________27. If AB = then BA = _____________28. If any law of quality of sets, if we inter-change and and and the resultinglaw also true, this is known as ___________29. A B' = _________30. A, B are subsets of then A B' = _____FUNCTIONS1. If f(A) = B then f : AB is a/an _________function (June 2009)2. Let f : RR be defined by f(x) = 3x+2, thenthe element of the domain of f which has 11 as image is _______________3. Range of a constant function is a _____ set.4. If f : NN is defined by f(x) = x+1, then therange of f is __________ (June 2009)5. If f(x) = xx, then f is a/an ___________function (June 2009), ( March 2008)6. If f(x) = x2 x + 6 then f(4) = ___________(March 2008)7. f(x) = x2+ 4x 12,what are the zeros of f(x)__________ (March 2008)8. f(x) = x3, g(x) = x22 for xR then (gof)(x)= ________ (March 2008)9. f(x) = x2+ 2x K and if f(2) = 8 then k=_________ (June 2007)10. f : AB is an objective and if n(A) = 4 thenn (B) = _________ (June 2007)11. If f(x) = x then the function f is _________(June 2010)12. A function is one - one and on-to then thefunction is _________ (June 2010)13. If f = {(1,2),(2,3),(3,1)} then f1(2) = _____14. If f is Identity function f(5) = ___________15. If f(x1) = f(x2) x1= x2then f is ________function.16. f : AB and f (x) = cxAthen f is ______17. If f : AB such that f (A) B then f is_________18. f = {(1,2), (2,3), (3,4)}, g = {(2,5), (3,6),(4,7)} then fog = __________19. The domain of the function is_______20. f : AB and f(x) = 2x +5 then the inverseof f is ___________21. If f(x) = then _______22. The range of constant function is ________23. If f = {(1,2), (2,3), (3,4), (4,1)} then fof =_________24. If f(x) = ax + b and f (2) = 6 then the rela-tion between a and b is _______25. f(x) = x + 2 and g (x) = 2x1 then f (1) -g(-1) = ________[ ] fo(fof ) (x) = x21x 16 K.Umamaheswara ReddySr. TeacherBeechupallyBITBANK Written byKEY1. Connectivities 2. P13. (p (~p)) f 4. True5. conditional (or) implication 6. Compoundstatement 7. ; 8. ~p q (or) p ~q 9. If apolygon is not a rectangle then it is not asquare. 10. Distributive law. 11. Universal 12.Parallel combination 13. (q p) ~(p q)14. Disjuction 15. True 16. ~p 17. x is notodd x2is odd 18. p q 19. Negation 20.p(~q) 21. contradiction 22. ~p~q 23. idem-potent law 24. 25. De morgans law 26. dis-tributive law 27. True 28. contradiction 29.Tautology 30. p q4 Marks1. Using element wise prove that A (B C)= (A B) (A C)2. Prove that A (B C) = (AB) (A C)3. Let A,B are two subsets of a Universal set show that A B = A B1= B A14. Prove that (A B)1= A1 B12 Marks1. Define implication and write truth table?2. Write the truth table (~P) (P q).3. Write the converse, inverse and contrapa-sitive of the conditional If in a triangleABC, AB > AC then C > B.4. If A B = then show that B A1= B5. Using element wise proof show that A B= AB16. If A,B are any two sets, prove that A1-B1=BA7. Show that A B = , implies A= and B= .1 Mark1. Define Tautology and contradiction?2. Write Truth table for conjunction?3. Prove that (A1)1= A4. Write contrapasitive of a conditional Iftwo triangles are congruent then they aresimilar.5. Show that P (~P) is contradiction.6. If A = {1,2,3}, B={2,3,4} then find AB.7. Write set-builder form of8. Prove that A B Afor any two sets A, B. 9. Prove that ~(~P) = P1 1 1 1 1A 1, , , , ,2 3 4 5 6 = STATEMENTS AND SETS: Important QuestionsKEY1. n(A)+n(B) 2. A 3. 4. 0 5. B 6. A = B 7. 8. 6 9. {x/x = n3, n N, n 5} 10. A' B' 11.4 12. A (B C) 13. (AB)-(AB) (or) (A-B) (B-A) 14. 0 15. 12 16. (A-B)(A-C) 17.7 18. {2,3} 19. 8 20. De Morgans law 21. xAand x B 22. 6 23. equivalent sets 24. 2n-2 25. 0 26. 5 27. B 28. Principle of duality 29.AB 30. A-BpqA B: ,r --.-- a+ ..o aa++3f : AB and B R then f is.. MATHEMATICS BIT BANKPOLYNOMIALS OVERINTEGERS26. If a function is both one-one and on-to thenthe function is _________27. f : AB is a function then B is called _____28. f : AB such that f (A) = B then f is ______29. f : AB and B R then f is ___________30. A constant function f : NN is defined byf (x) = 5 then f (15) = _______31. _____32. The range of the function f = {(a,x), (b,y),(c,z)} is ________33. The inverse of a function will be a functionagain if it is _________34. If f : x log2x then f (16) = __________35. The set builder form of R = {(1,3), (2,4), (3,5)} is ________36. f1(x) = x3, g1(x) = x1 then (fog)1=_________37. What is the zeros of the adjacent function is_________38. Number of elements in {3,5,7,9} {4,6,8}is __________39. A function f : AB is said to be ________function, if for all y B there exists x Asuch that f (x) = y.40. If f(x) = 2x, g(x) = 3x + 2 then (fog) (2) =________41. f(x) = x+1, then 3f(2)2f(3) = ________42. f = {(x,1004)/x N} then f is ________43. The condition to define gof is ________44. Let f : RR, f(x) = 6x+5 then f1(x) = ____45. If f(x) = 2x 3 the value of is ________POLYNOMIALS OVER INTEGERS1. Product of the roots of equation x2(a+b)x = c is ________2. If , are the roots of the equation 2x29x+8 = 0 then + = ________3. The line y = mx+c cuts the y-axi"
]
| [
null,
"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs=",
null,
"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs=",
null,
"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs=",
null,
"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs=",
null,
"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs=",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.708071,"math_prob":0.9997936,"size":9742,"snap":"2021-21-2021-25","text_gpt3_token_len":3516,"char_repetition_ratio":0.20476484,"word_repetition_ratio":0.01760176,"special_character_ratio":0.47115582,"punctuation_ratio":0.17773019,"nsfw_num_words":2,"has_unicode_error":false,"math_prob_llama3":0.9997309,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-17T21:02:52Z\",\"WARC-Record-ID\":\"<urn:uuid:6944d818-986b-4827-8457-eb651b5af15c>\",\"Content-Length\":\"89916\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b4ac6d71-262a-4b6e-a779-0f351bc33241>\",\"WARC-Concurrent-To\":\"<urn:uuid:f9b47181-a106-4b61-83cd-2486f85a2bac>\",\"WARC-IP-Address\":\"51.210.70.26\",\"WARC-Target-URI\":\"https://fdocument.org/document/bhavitha-24022011-em-maths.html\",\"WARC-Payload-Digest\":\"sha1:27MPUFOC7R76X4K7XHVSIJFYYWOXJ3C5\",\"WARC-Block-Digest\":\"sha1:IZJREK4VHULKY2VVFL4ECGXPSGEEDVWM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487633444.37_warc_CC-MAIN-20210617192319-20210617222319-00330.warc.gz\"}"} |
https://www.monolithicpower.com/determining-accurate-state-of-charge-with-the-mpf4279x-series-part-i | [
"# Determining Accurate State of Charge with the MPF4279x Series (Part I)",
null,
"Get valuable resources straight to your inbox - sent out once per month\n\n## Introduction\n\nWith the dramatic improvement in battery performance, applications are increasingly utilizing battery packs to provide energy. In the battery management system (BMS), designers face the challenge of accurately estimating the battery’s state-of-charge (SoC), which is the level of charge a battery has in relation to its capacity.\n\nSoC is commonly represented as a percentage between 0% and 100%. A battery is fully discharged at SoC = 0% and fully charged at SoC = 100%. SoC can help calculate the power of everyday technologies, including mobile phones, smartwatches, and electric vehicles. However, errors in estimating SoC arise due to the battery’s complex chemical characteristics.\n\nThis article is the first of a two-part series discussing SoC estimations. Part I explores the complex application of battery conditions in SoC estimation, as well one method to estimate the SoC. Part II will discuss additional methods and introduce the MPF4279x series.\n\n## Challenges of SoC Estimation\n\nIf the battery voltage drops below a certain threshold while it discharges, the battery is considered empty. A battery is considered fully charged when is it charged with a constant voltage and a current within the specific threshold. When the battery transitions from discharging to charging, the battery’s capacity can vary due to several factors.\n\nDue to the battery’s internal resistance, the charge and discharge rates are different, which results in different capacities. Batteries can be made of different materials with unique temperature state characteristics. Figure 1 shows the battery voltage under different discharge current magnitudes.",
null,
"Figure 1: Battery Capacity vs. Discharge Rate\n\nIn particular, reduced battery performance is observed at low temperatures. Figure 2 shows the battery’s capacity across a wide temperature range.",
null,
"Figure 2: Battery Capacity vs. Temperature\n\nThe battery’s life status characteristics also contribute to its capacity. Generally, battery life gradually decays during use. This decay can be largely attributed to the degradation of the positive and negative materials and the passivation of electrodes, which leads to a loss in effective lithium ions. Furthermore, the total power changes from beginning of life (BOL) to end of life (EOL). This means that it is important to consider the total capacity at BOL or the actual total capacity in the current lifecycle when calculating SoC.\n\nIn addition to the varying battery capacity, the SoC status of each cell affects the SoC estimate for the total battery pack. When multiple batteries are connected in series, the battery voltage can be unbalanced.\n\n## Introduction to SoC Algorithms\n\nThere are three key methods to calculate the SoC: the open-circuit voltage (OCV), ampere-hour integration, and voltage-current hybrid methods. The first method is discussed in this article, while the remaining methods will be discussed in Part II.\n\n## Open-Circuit Voltage (OCV) Method\n\nThe OCV method is one of the earliest battery capacity test methods based on the change between the battery’s OCV and the lithium ion concentration inside the battery. This reflects the monotonic increasing relationship between OCV and SoC.\n\nWhile the OCV method is straightforward and convenient, it does not provide high accuracy, and it can only properly estimate the SoC when the battery has been at rest for a significant time. When current flows through the battery, the voltage drop generated by the battery’s internal resistance affects the accuracy of the SoC estimate. At the same time, batteries like the lithium iron phosphate battery may have a voltage plateau. When the SoC is between 30% and 80%, the relationship between the terminal voltage and SoC is a relatively straight line, which amplifies the SoC estimation error (see Figure 3).",
null,
"Figure 3: Relationship between Lithium Battery OCV and SoC\n\nTo address these issues, designers supplemented the OCV method by incorporating the battery’s internal resistance to correct and accurately estimate OCV. As current flows through the battery, the voltage under the load is corrected by subtracting the actual measured battery-side voltage drop (from I x R) from the OCV. The estimated SoC (V) can be calculated with Equation (1).\n\n$$V = OCV - I \\times\\ R(SoC, T)$$\n\nWhere OCV is the open-circuit voltage, I is the applied current, and R is the equivalent series resistance, which depends on SoC and temperature (T). Note that in this equation, a positive current is used for discharge and a negative current is used for charge.\n\nUsing internal resistance compensation increases SoC estimation accuracy. However, the complex electrochemical properties in practical application prevent the battery voltage from immediately responding to load changes. This delay is associated with the time constant, ranging from milliseconds to thousands of seconds. The battery’s internal impedance also varies significantly under different conditions, which means an accurate SoC estimate depends on an accurate impedance estimate.\n\n## Conclusion\n\nThis article introduced the concept of SoC estimates, as well as the challenges in obtaining an accurate SoC. We also discussed one method to estimate SoC. Part II will expand on the other two methods and explain the benefits of using the MPF4279x series to accurately measure the SoC.\n\n### Did you find this interesting? Get valuable resources straight to your inbox - sent out once per month!\n\nGet technical support"
]
| [
null,
"https://media.monolithicpower.com/wysiwyg/group-16.png",
null,
"https://media.monolithicpower.com/wysiwyg/Articles/W041_Figure1.PNG",
null,
"https://media.monolithicpower.com/wysiwyg/Articles/W041_Figure2.PNG",
null,
"https://media.monolithicpower.com/wysiwyg/Articles/W041_Figure3.PNG",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9252914,"math_prob":0.9558149,"size":5657,"snap":"2022-27-2022-33","text_gpt3_token_len":1122,"char_repetition_ratio":0.15566956,"word_repetition_ratio":0.025287356,"special_character_ratio":0.19091392,"punctuation_ratio":0.09193054,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97175914,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-11T18:30:13Z\",\"WARC-Record-ID\":\"<urn:uuid:c309fa85-f526-4b6f-8b36-f6b45f7f89a4>\",\"Content-Length\":\"188907\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cf0041ea-e805-4be3-971d-c448651d718c>\",\"WARC-Concurrent-To\":\"<urn:uuid:3ff50fc3-f997-4afb-b764-27e26b862b73>\",\"WARC-IP-Address\":\"35.167.200.40\",\"WARC-Target-URI\":\"https://www.monolithicpower.com/determining-accurate-state-of-charge-with-the-mpf4279x-series-part-i\",\"WARC-Payload-Digest\":\"sha1:CNKKBX5JNHHNSPI5SGNCENP3TSIAVJOQ\",\"WARC-Block-Digest\":\"sha1:TQ7FFFOYUIMTCX6JLZDSDFWHFNXTHJSO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571483.70_warc_CC-MAIN-20220811164257-20220811194257-00417.warc.gz\"}"} |
http://board.flashkit.com/board/showthread.php?823799-Finding-remainders-and-assigning-variables | [
"",
null,
"A Flash Developer Resource Site\n\nThread: Finding remainders and assigning variables\n\n1. Finding remainders and assigning variables\n\nThis is a flash AS3 related question.\n\nFirstly let me start by saying these forums are great what a wealth of knowledge.\n\nIt is time for me to stop looking and start asking I'm afraid.\n\nI wish to take a number\n\nExample 2.1\n\nAnd end up with two variables\n\n1st variable containing the whole number and the second with the remainder.\n\nExample\n\nvar one = 2\nvar two = 0.1\n\nI have tried the following\n\nvar testnumber = 2.1\n\nvar rounded = Math.floor(testnumber);\n\ntrace(\"Rounded number\");\ntrace(rounded );\n\nvar answer = testnumber - rounded\n\nbut the remainder number comes out with 0.10000000000000009\n\nIs there any way I can make this number become 0.1?\n\nTo make matters more complicated I also wish to work with negative numbers.\n\nvar testnumber = -1.4\n\ni.e\n\nvar one = -1\nvar two = 0.4\n\nthe var testnumber could be anywhere between -10.0 and 50.0\n\nWould this work the same as above if a solution could be found?\n\nAny ideas?\n\nRegards",
null,
"",
null,
"Reply With Quote\n\n2. Never mind I figured it out. Fresh eyes and a new day helped.\n\n// POSITIVE NUMBERS\nvar testnumber = 32.1\nvar rounded = Math.floor(testnumber);\n\ntrace (\"Positive Numbers displayed and disected\");\ntrace (\" \");\ntrace (\"Starting whole number\");\ntrace(testnumber);\ntrace(\"Rounded Positive number\");\ntrace(rounded);\n\nvar answer = testnumber - rounded\ntrace (\"Number after decimal point\");\ntrace (roundeddecimal1);\ntrace (\" \");\ntrace (\" \");\n\n// NEGATIVE NUMBERS\n\nvar testnumber2 = -10.1\nvar rounded2 = Math.round(testnumber2);\n\ntrace (\"Positive Numbers displayed and disected\");\ntrace (\" \");\ntrace (\"Starting whole number\");\ntrace(testnumber2);\ntrace(\"Rounded Positive number\");\ntrace(rounded2);\nvar answer2 = testnumber2 - rounded2\ntrace (\"Number after decimal point\");\ntrace (roundeddecimal2);",
null,
"",
null,
"Reply With Quote",
null,
"Posting Permissions\n\n• You may not post new threads\n• You may not post replies\n• You may not post attachments\n• You may not edit your posts\n•\n\n » Home » Movies » Tutorials » Submissions » Board » Links » Reviews » Feedback » Gallery » Fonts » The Lounge » Sound Loops » Sound FX » About FK » Sitemap",
null,
""
]
| [
null,
"http://www.qsstats.com/dcs1isf5f00000sdd16wodyva_5u5l/njs.gif",
null,
"http://board.flashkit.com/board/images/misc/progress.gif",
null,
"http://board.flashkit.com/board/clear.gif",
null,
"http://board.flashkit.com/board/images/misc/progress.gif",
null,
"http://board.flashkit.com/board/clear.gif",
null,
"http://board.flashkit.com/board/images/buttons/collapse_40b.png",
null,
"http://www.htmlgoodies.com/imagesvr_ce/334/shortHTML5.JPG",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8453655,"math_prob":0.9777625,"size":2174,"snap":"2019-26-2019-30","text_gpt3_token_len":553,"char_repetition_ratio":0.19631337,"word_repetition_ratio":0.081871346,"special_character_ratio":0.28058878,"punctuation_ratio":0.14,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96398073,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-16T20:43:58Z\",\"WARC-Record-ID\":\"<urn:uuid:65361c1f-32a7-44d7-aba0-cb38130e1db6>\",\"Content-Length\":\"75432\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fa6f2d24-0471-4e8f-af09-d1b73a4275bf>\",\"WARC-Concurrent-To\":\"<urn:uuid:14b259d6-b48b-45af-b45b-537da01e35b8>\",\"WARC-IP-Address\":\"70.42.23.51\",\"WARC-Target-URI\":\"http://board.flashkit.com/board/showthread.php?823799-Finding-remainders-and-assigning-variables\",\"WARC-Payload-Digest\":\"sha1:2CZHIACVZRC545M7KLXICA3KUVHCUY2B\",\"WARC-Block-Digest\":\"sha1:A3UPYNTCZSHVMC6ZK33ZLKKBH2KSELT6\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560627998298.91_warc_CC-MAIN-20190616202813-20190616224813-00035.warc.gz\"}"} |
https://everynationtallahassee.com/qa/how-do-you-explain-variables-to-students.html | [
"",
null,
"# How Do You Explain Variables To Students?\n\n## What is a variable answer?\n\nAnswer: A variable is a datatype whose value can not be fixed.\n\nIt can be change based on other parameters.\n\nFor example, Let X is a variable so that its value can be anything like 1,2,3……\n\nor a,p,r, or any word.\n\nIt can not be fixed..\n\n## What are the 3 types of variables?\n\nAn experiment usually has three kinds of variables: independent, dependent, and controlled. The independent variable is the one that is changed by the scientist.\n\n## What are the 5 types of variables?\n\nThere are six common variable types:DEPENDENT VARIABLES.INDEPENDENT VARIABLES.INTERVENING VARIABLES.MODERATOR VARIABLES.CONTROL VARIABLES.EXTRANEOUS VARIABLES.\n\n## Do variables go first?\n\nThe mathematical convention (the usual way of doing things) is to write the number before the variable when multiplying numbers by variables. In other words, we write 3x, not x3. If you do write x3 people will probably know what you mean, but you probably won’t be invited back to the convention.\n\n## What do variables look like?\n\nUsually, variables are denoted by English or Greek letters or symbols such as x or θ. Examples: In the equation 10=2x, x is the variable. In the equation y+2=6, y is the variable.\n\n## What is variable explain with example?\n\nIn mathematics, a variable is a symbol or letter, such as “x” or “y,” that represents a value. … For example, a variable of the string data type may contain a value of “sample text” while a variable of the integer data type may contain a value of “11”.\n\n## How do you explain variables to students?\n\nA variable is something that can be changed. In computer programming we use variables to store information that might change and can be used later in our program. For example, in a game a variable could be the current score of the player; we would add 1 to the variable whenever the player gained a point.\n\n## How do variables work?\n\nA variable is a symbolic name for (or reference to) information. The variable’s name represents what information the variable contains. They are called variables because the represented information can change but the operations on the variable remain the same.\n\n## How do you explain what a variable is?\n\nA variable is a quantity that may change within the context of a mathematical problem or experiment. Typically, we use a single letter to represent a variable. The letters x, y, and z are common generic symbols used for variables."
]
| [
null,
"https://mc.yandex.ru/watch/69431644",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8722255,"math_prob":0.962102,"size":2373,"snap":"2021-31-2021-39","text_gpt3_token_len":516,"char_repetition_ratio":0.17644575,"word_repetition_ratio":0.015,"special_character_ratio":0.21281078,"punctuation_ratio":0.13636364,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9896509,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-27T23:05:32Z\",\"WARC-Record-ID\":\"<urn:uuid:da4f54f1-9a20-4ba4-a1cc-04a1836a0b07>\",\"Content-Length\":\"27881\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5a2584ba-df8e-49ac-9d42-a368a8f8b852>\",\"WARC-Concurrent-To\":\"<urn:uuid:89cb85e6-8530-4520-96e1-cbe6a6f4cb42>\",\"WARC-IP-Address\":\"45.130.40.25\",\"WARC-Target-URI\":\"https://everynationtallahassee.com/qa/how-do-you-explain-variables-to-students.html\",\"WARC-Payload-Digest\":\"sha1:SVDKSWPWY6DBNTM2Y5IJUC34AV335PWU\",\"WARC-Block-Digest\":\"sha1:DVJ6ETEKPTNCR6HKK6HZ3C5RF2SDMOIM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780058552.54_warc_CC-MAIN-20210927211955-20210928001955-00160.warc.gz\"}"} |
https://uta-lab.com/fr/boobs/analeigh-tipton-nude.php | [
"# Take a picture of a question and get the answer app\n\nTake a picture of a question and get the answer app can be found online or in math books. Our website can solving math problem.\n\n## The Best Take a picture of a question and get the answer app\n\nHere, we debate how Take a picture of a question and get the answer app can help students learn Algebra. Solving by square roots Solving by square roots Solving by square roots Solving by square Solving by square Solving Solving by Solving Solving Solving Solving Solvingsolving solving Equation Assume the given equation is of the form: ax^2 + bx + c = 0. Then, the solution to the equation can be found using the following steps: 1) Determine the value of a, b, and c. 2) Find the discriminant, which is equal to b^2 - 4ac. 3) If the discriminant is negative, then there are no real solutions to the equation. 4) If the discriminant is equal to zero, then there is one real solution to the equation. 5) If the discriminant is positive, then there are two real solutions to the equation. 6) Use the quadratic formula to find the value of x that solves the equation. The quadratic formula is as follows: x = (-b +/-sqrt(b^2-4ac))/2a.\n\nSimple solutions math is a method of teaching that focuses on breaking down complex problems into small, manageable steps. By breaking down problems into smaller pieces, students can better understand the concepts behind the problem and find more creative solutions. Simple solutions math also encourages students to think outside the box and approach problems from different angles. As a result, Simple solutions math can be an effective way to teach problem-solving skills. In addition, Simple solutions math can help to improve test scores and grades. Studies have shown that students who use Simple solutions math outperform those who do not use the method. As a result, Simple solutions math is an effective tool for helping students succeed in school.\n\nBasic mathematics is the study of mathematical operations and their properties. The focus of this branch of mathematics is on addition, subtraction, multiplication, and division. These operations are the foundation for all other types of math, including algebra, geometry, and trigonometry. In addition to studying how these operations work, students also learn how to solve equations and how to use basic concepts of geometry and trigonometry. Basic mathematics is an essential part of every student's education, and it provides a strong foundation for further study in math.\n\nSolving for x with fractions can be tricky, but there are a few steps that can make the process simpler. First, it is important to understand that when solving for x, the goal is to find the value of x that will make the equation true. In other words, whatever value is plugged into the equation in place of x should result in a correct answer. With this in mind, the next step is to create an equation using only fractions that has the same answer no matter what value is plugged in for x. This can be done by cross-multiplying the fractions and setting the two sides of the equation equal to each other. Once this is done, the final step is to solve for x by isolating it on one side of the equation. By following these steps, solving for x with fractions can be much less daunting.",
null,
"",
null,
""
]
| [
null,
"https://uta-lab.com/aGU6320a40fd2d67/25388788904_72d2f5ec6f_z-150x150.jpg",
null,
"https://uta-lab.com/aGU6320a40fd2d67/team_3-150x150.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9463683,"math_prob":0.99654233,"size":3374,"snap":"2022-40-2023-06","text_gpt3_token_len":712,"char_repetition_ratio":0.15163204,"word_repetition_ratio":0.14408234,"special_character_ratio":0.20420866,"punctuation_ratio":0.09647779,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996917,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-31T07:40:06Z\",\"WARC-Record-ID\":\"<urn:uuid:517c3b5d-10bb-4cce-af26-14c94f1ef56c>\",\"Content-Length\":\"18936\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:18351842-da87-4987-8485-ba294f0ab614>\",\"WARC-Concurrent-To\":\"<urn:uuid:faaa8da4-9db4-4e5c-bbce-55b036150cff>\",\"WARC-IP-Address\":\"67.21.87.16\",\"WARC-Target-URI\":\"https://uta-lab.com/fr/boobs/analeigh-tipton-nude.php\",\"WARC-Payload-Digest\":\"sha1:4GJPJRV32GOZQTCZSA26ZDRUAYKLWXD3\",\"WARC-Block-Digest\":\"sha1:KDTLKNJLM7FHCB4YBYO224K7K3JX4UQV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499845.10_warc_CC-MAIN-20230131055533-20230131085533-00876.warc.gz\"}"} |
https://testbook.com/learn/maths-speed-time-and-distance/ | [
"# Speed, Time and Distance: Concepts, Solved Examples, & Preparation Strategies\n\n0\n\nSave\n\nThe basic concept of speed, time and distance is the relation between three variables. The speed of a body is distance covered by the body per unit time. That is Speed = Distance / Time\n\nQuestions related to speed, time and distance include various categories such as straight line, relative motion, circular motion, trains, boats, clocks, races, etc.\n\nIn this article, we are going to cover the key concepts of Speed, Time and Distance along with the various types of questions, and tips and tricks. We have also added a few solved examples, which candidates will find beneficial in their exam preparation. Read the article thoroughly to clear all the doubts regarding the same.\n\nIf you’ve learned Speed, Time and Distance, you can move on to learn about Time and Work concepts here!\n\n## What is Speed, Time and Distance?\n\n### (a) Speed\n\nIt refers to the rate at which a particular distance is covered by an object in motion. The unit of speed may be m/s, km/h, m/min, km/min, or km/day.\n\n### (b) Time\n\nIt refers to an interval separating two events. The unit of time may be second (sec or s), minutes (min), hours, days etc.\n\n### (c) Distance\n\nIt refers to the extent of space between two points. The unit of distance may be metres (m), kilometres (km), centimeters (cm), inches (in) etc.\n\n## Concept of Motion\n\nIt is said that an object attains motion or movement when it changes its position with respect to any external stationary point. Speed, Time and Distance are the three variables that represent the mathematical model of motion as, s x t = d\n\n• Time is directly proportional to distance. It means that speed remains constant, if we have two vehicles moving two distances for two different time duration then the time is directly proportional to the distance.\n• Speed is directly proportional to distance. It means that time remains constant, if we have two vehicles moving two distances at two different speeds respectively.\n• Speed is inversely proportional to time. It means that distance remains constant if we have two vehicles moving at two different speeds and taking times respectively.\n\n## Types of Questions from Speed, Time and Distance\n\nThere are some specific types of questions from Speed, time and distance that usually come in exams. Some of the important types of questions from speed, time and distance are as follows.\n\n### (a) Problems related to Trains\n\nPlease note that, in the case of the train problems, the distance to be covered when crossing an object is equal to, Distance to be covered = Length of train + Length of object.\n\nRemember that, in case the object under consideration is a pole or a person or a point, we can consider them to be point objects with zero length. It means that we will not consider the lengths of these objects. However, if the object under consideration is a platform (non point object), then its length will be added to the formula of the distance to be covered.\n\n### (b) Boats and Streams\n\nIn such problems boats travel either in the direction of stream or in the opposite di- rection of stream. The direction of boat along the stream is called downstream and the direction of boat against the stream is called upstream.\n\nIf the speed of a boat in still water is u km/hr and the speed of the stream is v km/hr, then:\n\n1) Speed downstream = (u + v) km/hr\n\n2) Speed upstream = (u – v) km/hr\n\nOnce you’ve mastered Speed, Time and Distance, Also, learn more about Ratio and Proportion concepts in depth!\n\n### How to Solve Question Based on Speed, Time and Speed- Know all Tips and Tricks\n\nCandidates can find different tips and tricks from below for solving the questions related to speed, time and distance.\n\nTip # 1: Relative speed is defined as the speed of a moving body with respect to another body. The possible cases of relative motion are, same direction, when two bodies are moving in the same direction, the relative speed is the difference between their speeds and is always expressed as a positive value. On the other hand, the opposite direction is when two bodies are moving in the opposite direction, the relative speed is the sum of their speeds.\n\nTip # 2: Average speed = Total Distance / Total Time\n\nTip # 3: When train crossing a moving body,\n\nWhen a train passes a moving man/point object, the distance travelled by the train while passing it will be equal to the length of the train and relative speed will be taken as\n\n1) If both are moving in same direction then relative speed = Difference of both speeds\n\n2) If both are moving in opposite direction then relative speed = Addition of both speeds\n\nTip # 4: Train Passing a long object or platform, when a train passes a platform or a long object, the distance travelled by the train, while crossing that object will be equal to the sum of the length of the train and length of that object.\n\nTip # 5: Train passing a man or point object, when a train passes a man/object, the distance travelled by the train while passing that object, will be equal to the length of the train.\n\nWhen you’ve finished with Speed, Time and Distance, you can read about Algebraic Identities concepts in depth here!\n\n## Speed, Time and Distance Solved Sample Questions\n\nQuestion 1: The speed of three cars are in the ratio 5 : 4 : 6. The ratio between the time taken by them to travel the same distance is\n\nSolution: Ratio of time taken = ⅕ : ¼ : ⅙ = 12 : 15 : 10\n\nQuestion 2: A truck covers a distance of 1200 km in 40 hours. What is the average speed of the truck?\n\nSolution: Average speed = Total distance travelled/Total time taken\n\n⇒ Average speed = 1200/40\n\n∴ Average speed = 30 km/hr\n\nQuestion 3: A man travelled 12 km at a speed of 4 km/h and further 10 km at a speed of 5 km/hr. What was his average speed?\n\nSolution: Total time taken = Time taken at a speed of 4 km/h + Time taken at a speed of 5 km/ h\n\n⇒ 12/4 + 10/5 = 5 hours [∵ Time = Distance/Speed] Average speed = Total distance/Total time\n\n⇒ (12 + 10) /5 = 22/5 = 4.4 km/h\n\nQuestion 4: Rahul goes Delhi to Pune at a speed of 50 km/h and comes back at a speed of 75 km/h. Find his average speed of the journey.\n\nSolution: As, distance is same both cases\n\n⇒ Required average speed = (2 × 50 × 75)/(50 + 75) = 7500/125 = 60 km/hr\n\nQuestion 5: Determine the length of train A if it crosses a pole at 60km/h in 30 sec.\n\nSolution: Given, speed of the train = 60 km/h\n\n⇒ Speed = 60 × 5/18 m/s = 50/3 m/s\n\nGiven, time taken by train A to cross the pole = 30 s\n\nThe distance covered in crossing the pole will be equal to the length of the train.\n\n⇒ Distance = Speed × Time\n\n⇒ Distance = 50/3 × 30 = 500 m\n\nQuestion 6: A 150 m long train crosses a 270 m long platform in 15 sec. How much time will it take to cross a platform of 186 m?\n\nSolution: In crossing a 270 m long platform,\n\nTotal distance covered by train = 150 + 270 = 420 m\n\nSpeed of train = total distance covered/time taken = 420/15 = 28 m/sec In crossing a 186 m long platform,\n\nTotal distance covered by train = 150 + 186 = 336 m\n\n∴ Time taken by train = distance covered/speed of train = 336/28 = 12 sec.\n\nQuestion 7: Two trains are moving in the same directions at speeds of 43 km/h and 51 km/h respectively. The time taken by the faster train to cross a man sitting in the slower train is 72 seconds. What is the length (in metres) of the faster train?\n\nSolution: Given: The speed of 2 trains = 43 km/hr and 51 km/hr Relative velocity of both trains = (51 – 43) km/hr = 8 km/hr Relative velocity in m/s = 8 × (5/18) m/s\n\n⇒ Distance covered by the train in 72 sec = 8 × (5/18) × 72 = 160 Hence, the length of faster train = 160 m\n\nQuestion 8: How long will a train 100m long travelling at 72km/h take to overtake another train 200m long travelling at 54km/h in the same direction?\n\nSolution: Relative speed = 72 – 54 km/h (as both are travelling in same direction)\n\n= 18 km/hr = 18 × 10/36 m/s = 5 m/s\n\nAlso, distance covered by the train to overtake the train = 100 m + 200 m = 300 m Hence,\n\nTime taken = distance/speed = 300/5 = 60 sec\n\nQuestion 9: A boat takes 40 minutes to travel 20 km downstream. If the speed of the stream is 2.5 km/hr, how much more time will it take to return back?\n\nSolution: Time taken downstream = 40 min = 40/60 = 2/3 hrs. Downstream speed = 20/ (2/3) = 30 km/hr.\n\nAs we know, speed of stream = 1/2 × (Downstream speed – Upstream speed)\n\n⇒ Upstream speed = 30 – 2 × 2.5 = 30 – 5 = 25 km/hr.\n\nTime taken to return back = 20/25 = 0.8 hrs. = 0.8 × 60 = 48 min.\n\n∴ The boat will take = 48 – 40 = 8 min. more to return back\n\n## Exams where Speed, Time and Distance is Part of Syllabus\n\nQuestions based on Speed, Time and Distance come up often in various prestigious government exams some of them are as follows.\n\nWe hope you found this article regarding Speed, Time and Distance was informative and helpful, and please do not hesitate to contact us for any doubts or queries regarding the same. You can also download the Testbook App, which is absolutely free and start preparing for any government competitive examination by taking the mock tests before the examination to boost your preparation.\n\n## Speed, Time and Distance FAQs\n\nQ.1 What is Speed, Time and Distance?\nAns.1 Details regarding the speed, time and distance can be found above in the article. Kindly go through the article for the same.\n\nQ.2 Where can I find the important rules related to the speed, time and distance?\nAns.2 Important rules related to the speed, time and distance can be found above in the article.\n\nQ.3 How to solve the problem related to speed, time and distance?\nAns.3 Tips and tricks to solve the problems related to speed, time and distance are given above in the article. Kindly go through the article for the same.\n\nQ.4 Where I will find some of the sample questions related to speed, time and distance?\nAns.4 Various example questions along with their solutions are given above in the article. Kindly go through the article for the same.\n\nQ.5 In which exam questions from speed, time and distance come up?\nAns.5 Speed, time and distance based questions come in various government competitive examinations on a regular basis. The names of such examinations are given above in the article."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.93150175,"math_prob":0.99043006,"size":9250,"snap":"2021-21-2021-25","text_gpt3_token_len":2341,"char_repetition_ratio":0.16839714,"word_repetition_ratio":0.063817665,"special_character_ratio":0.268,"punctuation_ratio":0.10074231,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9954784,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-06T18:28:17Z\",\"WARC-Record-ID\":\"<urn:uuid:cd963513-7bc8-4531-abd2-6ed839c6f70f>\",\"Content-Length\":\"186056\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cdc0fad1-2eef-4338-8fcf-56eb701294b3>\",\"WARC-Concurrent-To\":\"<urn:uuid:c95e0dc5-5e53-4491-8dcb-d4a97f5ad35f>\",\"WARC-IP-Address\":\"104.22.45.238\",\"WARC-Target-URI\":\"https://testbook.com/learn/maths-speed-time-and-distance/\",\"WARC-Payload-Digest\":\"sha1:MOGNQIFV5MOGOQAUMO43YJM5EVWUDYMG\",\"WARC-Block-Digest\":\"sha1:KSWGQSSCM3HBOZQ2P6VK6WAYM2XMAABU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243988759.29_warc_CC-MAIN-20210506175146-20210506205146-00136.warc.gz\"}"} |
https://w3.aapm.org/meetings/2019AM/programInfo/programAbs.php?&shid%5B%5D=1514&sid=8165&aid=42131 | [
"×\n\n# Dosimetric Comparison of TMR10 and Convolution Dose Calculation Algorithms for GammaPlan Treatment Planning System\n\n## E Kendall1*, O Algan1 , Y Chen1 , S Ahmad1 , (1) University of Oklahoma Health Science Center, Oklahoma City, OK,\n\n•",
null,
"E Kendall\n\n# Presentations\n\n(Sunday, 7/14/2019)\n\nRoom: ePoster Forums\n\nPurpose: To compare the TMR10 and convolution dose calculation algorithms in order to assess whether the algorithms produce clinically significant dose differences in Gamma Knife stereotactic radiosurgery (SRS) treatments.\n\nMethods: Treatment plans were analyzed from ten patients who have undergone Gamma Knife SRS treatments with a prescribed dose of 13-22 Gy, normalized to the 50% isodose line. Patient plans were calculated using Leksell GammaPlan Version 10 treatment planning system utilizing the TMR10 and convolution dose calculation algorithms in order to create a paired data set for comparison. Plan evaluation was based on the DVH parameters of minimum, mean, maximum and integral doses. Statistical analysis was done using Student’s two-tailed t-test.\n\nResults: The ratio (R), defined as conformal/TMR10, of average integral doses calculated by the convolution dose calculation algorithm to that by the TMR10 algorithm were 0.997±0.013 for target (p=0.28), 1.048±0.189 (p=0.48) for skull, 1.005±0.049 (p=0.68) for brainstem, 0.997±0.041 (p=0.84) for optic chiasm, 0.95±0.068 (p=0.08) for left cochlea, 0.951±0.118 (p=0.26) for right cochlea, 0.993±0.082 (p=0.61) for left optic nerve, and 0.997±0.061 (p=0.88) for right optic nerve. The ratio R for minimum, mean, and maximum doses were (0.995±0.025, p=0.55; 1.001±0.015, p=0.91; 1.002±0.004, p=0.17) for target, (0.834±0.200, p=0.34; 0.782±0.214, p=0.33; 1.001±0.028, p=0.90) for skull, (1.033±0.266, p=0.32; 1.007±0.059, p=0.56; 1.004±0.027, p=0.60) for brainstem, (0.954±0.070, p=0.17; 0.997±0.040, p=0.80; 1.001±0.036, p=0.90) for optic chiasm, (0.932±0.081, p=0.05; 0.960±0.68, p=0.07; 0.975±0.7, p=0.09) for left cochlea, (0.922±0.111, p=0.04; 0.957±0.118, p=0.10; 0.952±0.126, p=0.15) for right cochlea, (0.970±0.095, p=0.15; 0.986±0.085, p=0.32; 0.998±0.064, p=0.90) for left optic nerve, and (0.985±0.067, p=0.52; 1.003±0.065, p=0.81; 1.003±0.053, p=0.72) for right optic nerve, respectively.\n\nConclusion: Both techniques achieved similar results. Overall, the differences were not statistically significant in most of the parameters that we compared. A decision was thus made to continue utilizing the TMR10 algorithm for dose calculation at our institution.\n\nKeywords\n\nTaxonomy\n\nNot Applicable / None Entered.\n\nContact Email"
]
| [
null,
"https://w3.aapm.org/meetings/2019AM/img/programInfo/silouhette-of-person-th.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8369648,"math_prob":0.9703276,"size":2347,"snap":"2023-40-2023-50","text_gpt3_token_len":845,"char_repetition_ratio":0.13700384,"word_repetition_ratio":0.04605263,"special_character_ratio":0.40775457,"punctuation_ratio":0.27160493,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97478586,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-28T11:15:33Z\",\"WARC-Record-ID\":\"<urn:uuid:47ffeb08-2286-4a63-b618-0d38f9749a80>\",\"Content-Length\":\"59953\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8cf1fe5f-0c7e-48ae-8a11-e1c98ea22a9d>\",\"WARC-Concurrent-To\":\"<urn:uuid:fe2e1f69-5f14-4c95-aa1a-926d13aa337b>\",\"WARC-IP-Address\":\"52.4.135.16\",\"WARC-Target-URI\":\"https://w3.aapm.org/meetings/2019AM/programInfo/programAbs.php?&shid%5B%5D=1514&sid=8165&aid=42131\",\"WARC-Payload-Digest\":\"sha1:WCVM4Q6ACOZTVVK3ANVE3XNA5SXY7DJ2\",\"WARC-Block-Digest\":\"sha1:CJMJETRKBJ7EWN2WB4LK2KYPGSFUKTHJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510387.77_warc_CC-MAIN-20230928095004-20230928125004-00537.warc.gz\"}"} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.