URL
stringlengths
15
1.68k
text_list
listlengths
1
199
image_list
listlengths
1
199
metadata
stringlengths
1.19k
3.08k
http://www.ccsenet.org/journal/index.php/ijsp/article/view/0/40417
[ "### A Bivariate Index for Visually Measuring Marginal Inhomogeneity in Square Tables\n\n•  Shuji Ando\n\n#### Abstract\n\nFor square tables, the marginal homogeneity model which has a structure that the row marginal distribution is equal to the column marginal distribution was proposed. Thereafter, various extended models of marginal homogeneity have been proposed, these models can be classified into two types marginal inhomogeneity. On the other hand, various indexes which measure the degree of deviation from marginal homogeneity have been proposed. However these indexes cannot concurrently define degrees of deviation from marginal homogeneity with respect to two types marginal inhomogeneity. This paper proposes a bivariate index that can concurrently define degrees of deviation from those. The proposed bivariate index would also be utility for visually comparing degrees of deviation from marginal homogeneity in several tables using confidence regions.", null, "This work is licensed under a Creative Commons Attribution 4.0 License.\n• ISSN(Print): 1927-7032\n• ISSN(Online): 1927-7040\n• Started: 2012\n• Frequency: bimonthly\n\n### Journal Metrics\n\n• h-index (December 2019): 15\n• i10-index (December 2019): 24\n• h5-index (December 2019): N/A\n• h5-median(December 2019): N/A" ]
[ null, "data:image/png;base64,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", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83040124,"math_prob":0.47154158,"size":1704,"snap":"2020-24-2020-29","text_gpt3_token_len":425,"char_repetition_ratio":0.13058823,"word_repetition_ratio":0.036885247,"special_character_ratio":0.2112676,"punctuation_ratio":0.08300395,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9635285,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-03T15:17:59Z\",\"WARC-Record-ID\":\"<urn:uuid:c8d24417-48dc-4b0a-97ab-f24f21ea4b44>\",\"Content-Length\":\"15437\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5ee0a847-1a6a-4542-914d-db65033dacca>\",\"WARC-Concurrent-To\":\"<urn:uuid:158156ca-012e-4d52-9e86-c897133641d5>\",\"WARC-IP-Address\":\"66.155.58.71\",\"WARC-Target-URI\":\"http://www.ccsenet.org/journal/index.php/ijsp/article/view/0/40417\",\"WARC-Payload-Digest\":\"sha1:RNMVQRSIYCOEMNNGZ6LBT6FPSMSBIGNG\",\"WARC-Block-Digest\":\"sha1:MTDSU3MLUFXX64H2NAR5ZMIBHD6SZKXU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347435238.60_warc_CC-MAIN-20200603144014-20200603174014-00030.warc.gz\"}"}
https://www.teachoo.com/4444/713/Example-6---Total-revenue-received-from-sale-of-x-units/category/Examples/
[ "", null, "", null, "", null, "1. Chapter 6 Class 12 Application of Derivatives (Term 1)\n2. Serial order wise\n3. Examples\n\nTranscript\n\nExample 6 The total revenue in Rupees received from the sale of x units of a product is given by R(x) = 3x2 + 36x + 5. Find the marginal revenue, when x = 5, where by marginal revenue we mean the rate of change total revenue with respect to the number of items sold at an instant.Marginal revenue is rate of change of total revenue w. r. t the number of unit sold Let MR be marginal revenue So, MR = 𝒅𝑹/𝒅𝒙 Given, Total revenue = R (𝑥) = 3𝑥2 + 36𝑥 + 5 We need to find marginal revenue when 𝑥 = 5 i.e. MR when 𝑥 = 5 MR = 𝑑(𝑅(𝑥))/𝑑𝑥 MR = (𝑑 (3𝑥2 + 36𝑥 + 5) )/𝑑𝑥 MR = (𝑑(3𝑥2))/𝑑𝑥 + (𝑑(36𝑥))/𝑑𝑥 + (𝑑(5))/𝑑𝑥 MR = 3 (𝑑(𝑥2))/𝑑𝑥 + 36 (𝑑(𝑥))/𝑑𝑥 + 0 MR = 3 × 2𝑥 + 36 MR = 6𝑥 + 36 MR when 𝑥 = 5 MR = 6 (5) + 36 MR = 30 + 36 MR = 66 Hence, the required marginal revenue is Rs. 66", null, "" ]
[ null, "https://d1avenlh0i1xmr.cloudfront.net/bc49d502-1926-43fa-a322-85718968cf40/slide21.jpg", null, "https://d1avenlh0i1xmr.cloudfront.net/5bc0bf66-b3a9-4721-98fb-cfa5e2a1d8eb/slide22.jpg", null, "https://d1avenlh0i1xmr.cloudfront.net/faef0de7-d010-40b7-be43-681b40010d29/slide23.jpg", null, "https://delan5sxrj8jj.cloudfront.net/misc/Davneet+Singh.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7646306,"math_prob":0.99996924,"size":2168,"snap":"2021-31-2021-39","text_gpt3_token_len":773,"char_repetition_ratio":0.31423292,"word_repetition_ratio":0.13580246,"special_character_ratio":0.32380074,"punctuation_ratio":0.03194103,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999902,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,4,null,4,null,4,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-24T04:06:07Z\",\"WARC-Record-ID\":\"<urn:uuid:ce631707-17e1-4c2e-ad4d-441a264e91d6>\",\"Content-Length\":\"85862\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9e31f0e-f2a3-4c15-b48b-fe43194b0825>\",\"WARC-Concurrent-To\":\"<urn:uuid:3ca9cf57-ea04-4b42-b08f-9dfb46648f0e>\",\"WARC-IP-Address\":\"23.22.5.68\",\"WARC-Target-URI\":\"https://www.teachoo.com/4444/713/Example-6---Total-revenue-received-from-sale-of-x-units/category/Examples/\",\"WARC-Payload-Digest\":\"sha1:TRSGD43TLELC7HHNQU4VZCREHXTLVO26\",\"WARC-Block-Digest\":\"sha1:V3RWH5CR6A3XZSFIPMRRZDH7WSPBTOWW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057496.18_warc_CC-MAIN-20210924020020-20210924050020-00044.warc.gz\"}"}
https://www.geeksforgeeks.org/gate-gate-cs-2001-question-44/
[ "# GATE | GATE-CS-2001 | Question 44\n\nConsider the following program\n\n `Program` `P2  ` `    ``var` `n: int:  ` `     ``procedure` `W(``var` `x: int)  ` `     ``begin`  `         ``x=x+``1``;  ` `         ``print x;    ` `     ``end`  ` `  `     ``procedure` `D  ` `     ``begin`   `         ``var` `n: int;  ` `         ``n=``3``;  ` `         ``W(n);   ` `     ``end`  `begin` `//beginP2  ` `  ``n=``10``;  ` `  ``D;  ` `end`\n\nIf the language has dynamic scoping and parameters are passed by reference, what will be printed by the program?\n(A) 10\n(B) 11\n(C) 3\n(D) None of the above\n\nExplanation:\n\nIn static scoping or compile-time scoping the free variables (variables used in a function that are neither local variables nor parameters of that function) are referred as global variables because at compile only global variables are available.\nIn dynamic scoping or run-time scoping the free variables are referred as the variables in the most recent frame of function call stack. In the given code in the function call of procedure W the local variable x is printed i.e 4. Under dynamic scoping if x would have not been there in procedure W then we would refer to x of the function in function call stack i.e procedure D and the main function but since x is a local variable not a free variable we referred to the local variable hence 4 will be printed.\n\nThis solution is contributed by Parul Sharma.\n\nQuiz of this Question\n\nMy Personal Notes arrow_drop_up\n\nArticle Tags :\n\nBe the First to upvote.\n\nPlease write to us at [email protected] to report any issue with the above content." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7348879,"math_prob":0.8743665,"size":2050,"snap":"2019-43-2019-47","text_gpt3_token_len":620,"char_repetition_ratio":0.2453568,"word_repetition_ratio":0.25138122,"special_character_ratio":0.31268293,"punctuation_ratio":0.067010306,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96037054,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-12T23:41:25Z\",\"WARC-Record-ID\":\"<urn:uuid:a6387883-0a67-48e7-9eeb-cf8b2afd1510>\",\"Content-Length\":\"90738\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:771af67a-aa98-4062-8359-a9fa3bb86b3d>\",\"WARC-Concurrent-To\":\"<urn:uuid:9cf6bbe9-6eeb-49c7-8a8e-a317bd023454>\",\"WARC-IP-Address\":\"104.96.221.51\",\"WARC-Target-URI\":\"https://www.geeksforgeeks.org/gate-gate-cs-2001-question-44/\",\"WARC-Payload-Digest\":\"sha1:G26NB32Q6TMQTKRMDJ23YSXNXQDTSD5M\",\"WARC-Block-Digest\":\"sha1:XKR2YUCF4VL3EUQ5RIWACHLBZGFYTGLG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496665809.73_warc_CC-MAIN-20191112230002-20191113014002-00372.warc.gz\"}"}
https://stage.geogebra.org/m/kmjxvgjf
[ "# im.g.2.7.2 Proving the Angle-Side-Angle (ASQA\n\n1. Two triangles have 2 pairs of corresponding angles congruent, and the corresponding sides between those angles are given as congruent. Modify the sketch to fit that description. 2. The triangles are labeled WXY and DEF, such that angle W is congruent to angle D, angle X is congruent to angle E. You should modify the segments such that WX = DE. 3. Use a sequence of rigid motions to take triangle WXY onto triangle DEF." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8422035,"math_prob":0.91969526,"size":730,"snap":"2023-40-2023-50","text_gpt3_token_len":188,"char_repetition_ratio":0.13636364,"word_repetition_ratio":0.0,"special_character_ratio":0.23013699,"punctuation_ratio":0.18954249,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9878034,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T03:15:26Z\",\"WARC-Record-ID\":\"<urn:uuid:ee1776f0-a6a9-4186-b946-35fc5181c307>\",\"Content-Length\":\"46070\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a9f460bc-b3ad-41fc-8075-97823f618390>\",\"WARC-Concurrent-To\":\"<urn:uuid:da07675f-9f37-4508-b6ad-4118a5f4c078>\",\"WARC-IP-Address\":\"3.162.103.11\",\"WARC-Target-URI\":\"https://stage.geogebra.org/m/kmjxvgjf\",\"WARC-Payload-Digest\":\"sha1:7TRH7WPM36ATQC5YGKDHBO4JXNKWUUI5\",\"WARC-Block-Digest\":\"sha1:YHJKOAB4UQB7T7PNEX7INMFNKOMQBT6P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511053.67_warc_CC-MAIN-20231003024646-20231003054646-00154.warc.gz\"}"}
https://redmine.ruby-lang.org/issues/1408
[ "## Feature #1408", null, "", null, "### 0.1.to_r not equal to (1/10)\n\nStatus:\nClosed\nPriority:\nNormal\nTarget version:\n[ruby-core:23318]\n\nDescription\n\n=begin\n\\$ ruby -e 'p 0.1.to_r'\n(3602879701896397/36028797018963968)\n\nwhereas\n\n\\$ ruby -e 'p \"0.1\".to_r'\n(1/10)\n=end\n\nRelated issues\n\n Has duplicate Ruby master - Bug #5309: 0.6.to_r != \"0.6\".to_r Rejected 09/13/2011 Actions\n\n####", null, "Updated by phasis68 (Heesob Park)over 11 years ago\n\n=begin\n2009/4/27 Martin DeMello [email protected]:\n\nOn Sun, Apr 26, 2009 at 2:51 PM, Heesob Park [email protected] wrote:\n\n\\$ ruby -e 'p 0.1.to_r'\n(3602879701896397/36028797018963968)\n\nwhereas\n\n\\$ ruby -e 'p \"0.1\".to_r'\n(1/10)\n\ninvoked, 0.1 is already a binary float, with the implicit rounding\noff.\n\nIn theory, Float#to_r could be done through Float#to_s#to_r.\n\nRegards,\n\nPark Heesob\n\n=end\n\n####", null, "Updated by shyouhei (Shyouhei Urabe)over 11 years ago\n\n=begin\nHeesob Park wrote:\n\n2009/4/27 Martin DeMello [email protected]:\n\nOn Sun, Apr 26, 2009 at 2:51 PM, Heesob Park [email protected] wrote:\n\n\\$ ruby -e 'p 0.1.to_r'\n(3602879701896397/36028797018963968)\n\nwhereas\n\n\\$ ruby -e 'p \"0.1\".to_r'\n(1/10)\ninvoked, 0.1 is already a binary float, with the implicit rounding\noff.\n\nIn theory, Float#to_r could be done through Float#to_s#to_r.\n\n-1. That loses data.\n\n=end\n\n####", null, "Updated by rogerdpack (Roger Pack)over 11 years ago\n\n=begin\n\n-1 that loses data.\n\nTrue--however the (current) code for String#to_s attempts to determine whether the floating point number \"is the equivalent default for the rounded value\" (i.e. if it round trips).\nDo you think that using a comparisong like this (similar to what Park suggested) would be good enough for deducing the true original value? (I've thought of proposing a similar thing for BigDecimal,\n\nex: BigDecimal(0.1) => #\n\n-=r\n=end\n\n####", null, "Updated by tadf (tadayoshi funaba)over 11 years ago\n\n=begin\nto_r should provide exact conversion.\nI think ruby may provide \"rationalize\" on common lisp or scheme.\nbut not yet.\n\n=end\n\n####", null, "Updated by nobu (Nobuyoshi Nakada)over 11 years ago\n\n=begin\nHi,\n\nAt Fri, 1 May 2009 21:12:52 +0900,\nRoger Pack wrote in [ruby-core:23345]:\n\nTrue--however the (current) code for String#to_s attempts to\ndetermine whether the floating point number \"is the\nequivalent default for the rounded value\" (i.e. if it round\ntrips).\n\nIndex: rational.c\n===================================================================\n--- rational.c (revision 23433)\n+++ rational.c (working copy)\n@@ -1286,4 +1286,5 @@ integer_to_r(VALUE self)\n}\n\n+#if 0\nstatic void\nfloat_decode_internal(VALUE self, VALUE *rf, VALUE *rn)\n@@ -1299,5 +1300,4 @@ float_decode_internal(VALUE self, VALUE\n}\n\n-#if 0\nstatic VALUE\nfloat_decode(VALUE self)\n@@ -1310,11 +1310,82 @@ float_decode(VALUE self)\n#endif\n\n+#if FLT_RADIX == 2 && SIZEOF_BDIGITS * 2 * CHAR_BIT > DBL_MANT_DIG\n+# ifdef HAVE_LONG_LONG\n+# define BDIGITDBL2NUM(x) ULL2NUM(x)\n+# else\n+# define BDIGITDBL2NUM(x) ULONG2NUM(x)\n+# endif\n+#else\n+# define NEEDS_FDIV\n+static ID id_fdiv;\n+fun2(fdiv)\n+#endif\n+\n+static VALUE\n+float_r_round(double a, double f, int n)\n+{\n\n• int i, r; +#ifdef BDIGITDBL2NUM\n• BDIGIT_DBL fn = (BDIGIT_DBL)fabs(f);\n• BDIGIT_DBL d1 = (BDIGIT_DBL)1 << -n, d2 = d1;\n• BDIGIT_DBL rv = d1 % fn;\n• VALUE b, d;\n• if (rv < 10) {\n• for (i = 1, r = (int)rv; i <= r; ++i) {\n• if ((double)fn / --d2 != a) break;\n• if (fn % (d1 = d2) == 0) break;\n• }\n• }\n• else if ((rv = fn - rv) && rv < 10) {\n• for (i = 1, r = (int)rv; i <= r; ++i) {\n• if ((double)fn / ++d2 != a) break;\n• if (fn % (d1 = d2) == 0) break;\n• }\n• }\n• b = BDIGITDBL2NUM(fn);\n• d = BDIGITDBL2NUM(d1);\n• if (f < 0) b = f_negate(b); +#else\n• VALUE d2, fn, rv;\n• VALUE b = rb_dbl2big(f);\n• VALUE d = rb_big_pow(rb_uint2big(FLT_RADIX), INT2FIX(-n));\n• if (FIXNUM_P(d)) {\n• d = rb_uint2big(FIX2LONG(d));\n• }\n• d2 = d;\n• fn = f_abs(b);\n• rv = rb_big_modulo(d, fn);\n• if (FIXNUM_P(rv) && (r = FIX2LONG(rv)) < 10) {\n• for (i = 1; i <= r; ++i) {\n• d2 = f_sub(d2, INT2FIX(1));\n• if (RFLOAT_VALUE(f_fdiv(fn, d2)) != a) break;\n• if (f_mod(fn, d = d2) == INT2FIX(0)) break;\n• }\n• }\n• else if (FIXNUM_P(rv = f_sub(fn, rv)) && (r = FIX2LONG(rv)) < 10) {\n• for (i = 1; i <= r; ++i) {\n• if (RFLOAT_VALUE(f_fdiv(fn, d2)) != a) break;\n• if (f_mod(fn, d = d2) == INT2FIX(0)) break;\n• }\n• } +#endif\n• return rb_rational_new(b, d); +} + static VALUE float_to_r(VALUE self) {\n• VALUE f, n;\n• double a, f;\n• int n;\n\n• float_decode_internal(self, &f, &n);\n\n• a = RFLOAT_VALUE(self);\n\n• f = frexp(a, &n);\n\n• f = ldexp(f, DBL_MANT_DIG);\n\n• n -= DBL_MANT_DIG;\n\n• if (n <= DBL_MANT_DIG && f != 0) {\n\n• return float_r_round(a, f, n);\n\n• }\n\n}\n\n@@ -1569,4 +1640,7 @@ Init_Rational(void)\nid_to_s = rb_intern(\"to_s\");\nid_truncate = rb_intern(\"truncate\");\n+#ifdef NEEDS_FDIV\n\n• id_fdiv = rb_intern(\"fdiv\");\n+#endif\n\nml = (long)(log(DBL_MAX) / log(2.0) - 1);\n\n--\n\n=end\n\n####", null, "Updated by matz (Yukihiro Matsumoto)over 11 years ago\n\n=begin\nHi,\n\nIn message \"Re: [ruby-core:23465] Re: [Feature #1408] 0.1.to_r not equal to (1/10)\"\n\nCould you explain how this patch differs from the original?\n\n``` matz.\n```\n\n=end\n\n####", null, "Updated by nobu (Nobuyoshi Nakada)over 11 years ago\n\n=begin\nHi,\n\nAt Mon, 18 May 2009 11:15:16 +0900,\nYukihiro Matsumoto wrote in [ruby-core:23487]:\n\nCould you explain how this patch differs from the original?\n\nSearches more reduceable numerator which can round trip. Since\nit just tries the numerator only in very restricted condtion,\nbetter result may be achieved by trying also the denominator,\nin other cases. In fact, the patch works for very simple\ncases, e.g. 0.1 and (1.0/3.0), but doesn't for 0.24.\n\n--\n\n=end\n\n####", null, "Updated by yugui (Yuki Sonoda)over 11 years ago\n\n• Target version changed from 1.9.1 to 1.9.2\n\n=begin\n\n=end\n\n####", null, "Updated by marcandre (Marc-Andre Lafortune)about 11 years ago\n\n• Category set to core\n• Assignee set to matz (Yukihiro Matsumoto)\n\n=begin\n\n=end\n\n####", null, "Updated by marcandre (Marc-Andre Lafortune)about 11 years ago\n\n=begin\nSorry to be late to the party on this one.\n\nIt is important to remember that a Float is always an approximation.\n\n1.0 has to be understood as 1.0 +/- EPSILON, where the EPSILON is platform dependent. 1.0 is not more equal to 1 than to 1 + EPSILON/2. Indeed, there is no way to distinguish either when they are stored as floats.\n\nTo believe that Float#to_s loses data is wrong. If r.to_s returns \"1.2\", it implies that 1.2 is one of the values in the range of possible values for that floating number. It could have been 1.2000...0006. Or something else. There is no way to know, so #to_s chooses, wisely, to return the simplest value in the range.\n\nThere are many rationals that would be encoded as floats the same way. There is no magic way to know that the \"exact\" value was exactly 12/10 or 5404319552844595/4503599627370496, or anything in between. All have the same representation as a float. There is no reason to believe that the missing (binary) decimals that couldn't be written in space allowed where all 0. Actually, there is reason to believe that they were probably non zero, because fractions that can not be expressed with a finite number of terms in their expansion in a given base all have a recurring expansion. I.e. if the significand does not end with a whole bunch of zeros (rational has finite expansion) then it probably ends with an infinite pattern (say 011011011 in binary, or 333333 in decimal).\n\nFor any given float, there is one and only one rational with the smallest denominator that falls in the range of its possible values. It is currently given by Number#rationalize, and I really do not understand why #to_r would return anything else.\n\nI cannot see any purpose to any other fraction. Moreover, the current algorithm, which returns the middle of the range of possibilities, is platform dependent since the range of possibilities is platform dependent. That makes it even less helpful.\n\nIs there an example where one would want 0.1.to_r to be 3602879701896397/36028797018963968 ?\n\nDo we really think that 0.1.to_r to be 3602879701896397/36028797018963968 corresponds to the principle of least surprise?\nNote that I'm writing that fraction but with a different native double encoding, the fraction would be different.\n\n=end\n\n####", null, "Updated by znz (Kazuhiro NISHIYAMA)over 10 years ago\n\n• Status changed from Open to Assigned\n• Target version changed from 1.9.2 to 2.0.0\n\n=begin\n\n=end\n\n####", null, "Updated by marcandre (Marc-Andre Lafortune)over 10 years ago\n\n=begin\nWhy isn't Float#to_r simply calling Float#rationalize ?\n\n=end\n\n####", null, "Updated by mwaechter (Matthias Wächter)over 10 years ago\n\n=begin\nAm 20.09.2009 06:17, schrieb Marc-Andre Lafortune:\n\nSorry to be late to the party on this one.\n\nI’m late as well ;)\n\nIt is important to remember that a Float is always an approximation.\n\nNo. It is an approximation only for:\n\n• conversion from most decimal numbers, especially floats, and\n• calculations that drop digits.\n\nYou can do exact math in a limited range of operations, and the question\nshould be whether the approximation approach should overrule this exact\nmath range of use, especially considering that conversion back to\ndecimal could be done precisely, however, sometimes requiring a bunch\nof digits.\n\n1.0 has to be understood as 1.0 +/- EPSILON, where the EPSILON is platform\ndependent. 1.0 is not more equal to 1 than to 1 + EPSILON/2. Indeed, there\nis no way to distinguish either when they are stored as floats.\n\nIf what’s stored in the Float is your precise result, you certainly\nwould not ask for precision reduction just because it could have been\nthe result of an imprecise calculation.\n\nTo believe that Float#to_s loses data is wrong.\n\nI think there should be both a Float#to_s and Float#to_nearest_s. The\nfirst would be precise, the second would output the “shortest” decimal\nrepresentation within ±EPSILON/2.\n\nIf r.to_s returns \"1.2\", it implies that 1.2 is one of the values in the\nrange of possible values for that floating number. It could have been\n1.2000...0006. Or something else. There is no way to know, so #to_s chooses,\nwisely, to return the simplest value in the range.\n\nThis is based on the assumption that no-one would ever care about\nFloat’s precision.\n\nThere are many rationals that would be encoded as floats the same way. There\nis no magic way to know that the \"exact\" value was exactly 12/10 or\n5404319552844595/4503599627370496, or anything in between. All have the same\nrepresentation as a float. There is no reason to believe that the missing\n(binary) decimals that couldn't be written in space allowed where all 0.\nActually, there is reason to believe that they were probably non zero,\nbecause fractions that can not be expressed with a finite number of terms in\ntheir expansion in a given base all have a recurring expansion. I.e. if the\nsignificand does not end with a whole bunch of zeros (rational has finite\nexpansion) then it probably ends with an infinite pattern (say 011011011 in\nbinary, or 333333 in decimal).\n\nFor any given float, there is one and only one rational with the smallest\ndenominator that falls in the range of its possible values. It is currently\ngiven by Number#rationalize, and I really do not understand why #to_r would\nreturn anything else.\n\nI cannot see any purpose to any other fraction. Moreover, the current algorithm,\nwhich returns the middle of the range of possibilities, is platform dependent\nsince the range of possibilities is platform dependent. That makes it even less\n\nIs there an example where one would want 0.1.to_r to be\n3602879701896397/36028797018963968 ?\n\nIf the binary/Float’s representation of\n3602879701896397/36028797018963968 is the real result of the\ncalculation? How do you know?\n\nDo we really think that 0.1.to_r to be 3602879701896397/36028797018963968\ncorresponds to the principle of least surprise?\n\nFalse assumption here. Using floats for exact decimal math already\nviolates POLS. Don’t blame the messenger, i.e. the converter back to\ndecimal, the only part of the game that could always be precise.\n\nNote that I'm writing that fraction but with a different native double\nencoding, the fraction would be different.\n\nSure. Great to have different levels of precision/imprecision from the\ncomputers.\n\nAnd portability is not always the issue, otherwise there would have\nnever been different native floating point precisions.\n\n– Matthias\n\n=end\n\n####", null, "Updated by mwaechter (Matthias Wächter)over 10 years ago\n\n=begin\nHello Marc-Andre,\n\nOn 19.04.2010 00:14, Marc-Andre Lafortune wrote:\n\nI hope my dissent will not sound too harsh.\n\nNot at all.\n\nArguing that 0.1.to_r should be 3602879701896397/36028797018963968 is\nthe same as arguing that 0.1.to_s should outputs these 55 decimals.\n\nRight, that’s my point. 0.1 as a Float has a precise meaning in binary as in decimal, so Float#to_s should keep those 55 decimals. That’s why I said\nthat Float#to_nearest_s – choose a better name or an option to Fload#to_s – should be created that does »what everyone expects« to_s to do.\n\nThe same applies to Float#to_r. It should be as precise as possible, which it is currently. The function that does »what everyone expects« should be\nFloat#to_nearest_r in the same way as for the string representation.\n\nFor these reasons, the set S is of little interest to anybody.\n\nThe problem is that most people think that Floating point arithmetic is precise, which it is only for the the cases I described in my last mail.\n\nWhat is interesting is the set of real numbers. Floating numbers are\nused to represent them approximately. To add to my voice, here are a\ncouple of excerpts from the first links that come up on google\n(highlight mine):\n\n\"In computing, floating point describes a system for representing\nnumbers that would be too large or too small to be represented as\nintegers. Numbers are in general represented approximately to a\nfixed number of significant digits and scaled using an exponent.\"\nhttp://en.wikipedia.org/wiki/Floating_point\n\n\"Squeezing infinitely many real numbers into a finite number of bits\nrequires an approximate representation.... Therefore the result of a\nfloating-point calculation must often be rounded in order to fit back\ninto its finite representation. This rounding error is the\ncharacteristic feature of floating-point computation.\" source:\nhttp://docs.sun.com/source/806-3568/ncg_goldberg.html\n\nThat’s where the problem starts. Everyone thinks he can do exact math on a computer, and the only problem was the approximation of the binary\nrepresentation of a real number, characterized by ±EPSILON/2. No, the real issue is the approximation of calculations which not only accumulates\nEPSILON with each calculation, but it can shift EPSILON to any order. Think of something trivial like (1E-40+0.1-0.1) returning 0.0 vs.\n(1E-40+0.3-0.2-0.1) returning -2.7E-17. There is no real math in floats.\n\nOne can go as far as saying that availability of math-like operators and math-like precedence in a programming language supports the expectations of\nreal-number-like behavior and precision. But this is slightly off-topic, and in fact method calls for simple math are not doing any good to\nreadability. Math-like operator precedence is different and something completely unnecessary in a programming language, IMHO.\n\nNote that typing 0.1 in Ruby is a \"calculation\" which consists in\nfinding the member of S closest to 1/10.\n\nYour final question was: how do I know that the value someone is\ntalking about is 0.1 and not\n0.1000000000000000055511151231257827021181583404541015625 (or\nequivalently 3602879701896397/36028797018963968) ?\n\nI call it common sense.\n\nIt looks so obvious when we are talking about 0.1. If we talk about any other number with 80 digits, my point may become clearer.\n\nWhat do you do if it’s not 0.1 a.k.a. 0.1000000000000000055511151231257827021181583404541015625 but\n0.09999999999999997779553950749686919152736663818359375 (the result of (0.3-0.2)? What’s the difference for your argument? Now we will not get back\nthe expected nearest 0.1 anyway without applying the actually required/expected rounding constraints.\n\nIf it’s just about 0.1.to_r, i.e. converting from a decimal constant number to rational, use String#to_r.\n\nBottom line: Floats are not exact in terms of math, but they are exact in terms of computer-level implementation, implementing IEEE 754. We should\nrespect the latter and help people deal with the former.\n\n– Matthias\n\n=end\n\n####", null, "Updated by tadf (tadayoshi funaba)over 10 years ago\n\n=begin\n\nWhy isn't Float#to_r simply calling Float#rationalize ?\n\na = 0.5337486539516013\nb = 0.5337486539516012\n\na == b #=> false\n\na.to_r == a #=> true\na.rationalize == a #=> false\n\na.to_r == b #=> false\na.rationalize == b #=> true\n\nactually, flonum is restricted rational number.\nhowever, rationalize bends the value.\n\nto_r is the simplest and the cheapest way, rationalize is not so.\n\nmoreover, various languages support exact conversion (e.g. CL, Scheme, Haskell, Squeak, Python).\n\n=end\n\n####", null, "Updated by mrkn (Kenta Murata)over 10 years ago\n\n=begin\nFloat#rationalize is added again at r27503.\n\nOn 2010/05/06, at 7:23, Marc-Andre Lafortune wrote:\n\nMaybe a kind Japanese reader can provide the gist of [ruby-dev:41061]\nto explain why was Float#rationalize removed?\n\nI would also appreciate opinions as to why it wouldn't be a net\nimprovement if to_r used the rationalize algorithm and some other\nmethods were provided for anyone wanting the value of the\nrepresentation (e.g. Float#representation which would return [sign,\nmantissa, significand] and/or Float#representation_to_r would give the\nrational corresponding to the internal representation of that float)\n\n--\nKenta Murata\nOpenPGP FP = FA26 35D7 4F98 3498 0810 E0D5 F213 966F E9EB 0BCC\n\nE-mail: [email protected]" ]
[ null, "https://www.gravatar.com/avatar/666b4e17b4bb0e2d999037a25f65a7cb", null, "https://www.gravatar.com/avatar/6738588a11b852833edf6aec90ef6fa3", null, "https://www.gravatar.com/avatar/666b4e17b4bb0e2d999037a25f65a7cb", null, "https://www.gravatar.com/avatar/9d2f78236e45a335301ba1195026105d", null, "https://www.gravatar.com/avatar/bec38d63650c8912b6ba9b557fb953b9", null, "https://www.gravatar.com/avatar/6d5ca2abd3ce607577fe509ef4af1614", null, "https://www.gravatar.com/avatar/f1d6cc2b735bfd82c8773172da2aeab9", null, "https://www.gravatar.com/avatar/6738588a11b852833edf6aec90ef6fa3", null, "https://www.gravatar.com/avatar/f1d6cc2b735bfd82c8773172da2aeab9", null, "https://www.gravatar.com/avatar/1e7e007723cfe59320d994a7db4ab4cf", null, "https://www.gravatar.com/avatar/243d1a845bc4318650e6c505916182f2", null, "https://www.gravatar.com/avatar/243d1a845bc4318650e6c505916182f2", null, "https://www.gravatar.com/avatar/8e497efbe99e2fa051316337d03624d9", null, "https://www.gravatar.com/avatar/243d1a845bc4318650e6c505916182f2", null, "https://www.gravatar.com/avatar/150c2e7bb8354b13dee87fc5e5de09b0", null, "https://www.gravatar.com/avatar/150c2e7bb8354b13dee87fc5e5de09b0", null, "https://www.gravatar.com/avatar/6d5ca2abd3ce607577fe509ef4af1614", null, "https://www.gravatar.com/avatar/7cca11c5257fda526eeb4b1ada28f904", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84228015,"math_prob":0.92782927,"size":17953,"snap":"2020-45-2020-50","text_gpt3_token_len":5137,"char_repetition_ratio":0.10752688,"word_repetition_ratio":0.36541143,"special_character_ratio":0.3118142,"punctuation_ratio":0.14685908,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98099333,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-27T06:36:44Z\",\"WARC-Record-ID\":\"<urn:uuid:017b6d3a-841c-4d2d-b121-6dc518baaef3>\",\"Content-Length\":\"72444\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a5a90d2f-c165-4fdd-8890-4b6f9b9fb346>\",\"WARC-Concurrent-To\":\"<urn:uuid:b96c7093-0656-4568-af4f-b7bc030fe44c>\",\"WARC-IP-Address\":\"52.1.26.21\",\"WARC-Target-URI\":\"https://redmine.ruby-lang.org/issues/1408\",\"WARC-Payload-Digest\":\"sha1:KFIUNWLGKWEUGZ4XECHHQ3J7WWPBLIKZ\",\"WARC-Block-Digest\":\"sha1:LTVBWZKQCCNYZBAC67EKYUKKXZKFAVQV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107893402.83_warc_CC-MAIN-20201027052750-20201027082750-00606.warc.gz\"}"}
https://global-sci.org/intro/article_detail/getBib?article_id=12168
[ "@Article{AAMM-9-651, author = {}, title = {A Combined Discontinuous Galerkin Method for Saltwater Intrusion Problem with Splitting Mixed Procedure}, journal = {Advances in Applied Mathematics and Mechanics}, year = {2018}, volume = {9}, number = {3}, pages = {651--666}, abstract = {\n\nIn this paper, a new combined method is presented to simulate saltwater intrusion problem. A splitting positive definite mixed element method is used to solve the water head equation, and a symmetric discontinuous Galerkin (DG) finite element method is used to solve the concentration equation. The introduction of these two numerical methods not only makes the coefficient matrixes symmetric positive definite, but also does well with the discontinuous problem. The convergence of this method is considered and the optimal L 2 -norm error estimate is also derived.\n\n}, issn = {2075-1354}, doi = {https://doi.org/10.4208/aamm.2015.m1026}, url = {http://global-sci.org/intro/article_detail/aamm/12168.html} }" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87469333,"math_prob":0.9011057,"size":990,"snap":"2020-24-2020-29","text_gpt3_token_len":231,"char_repetition_ratio":0.09939148,"word_repetition_ratio":0.04411765,"special_character_ratio":0.26767677,"punctuation_ratio":0.15204678,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97149354,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-29T17:56:09Z\",\"WARC-Record-ID\":\"<urn:uuid:6e694823-2687-4ccb-85d3-a053584a23f8>\",\"Content-Length\":\"1363\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:33ad955d-557b-45f3-876a-7506aad837d3>\",\"WARC-Concurrent-To\":\"<urn:uuid:082bd300-26a2-462b-b30c-f327f3329315>\",\"WARC-IP-Address\":\"47.52.67.10\",\"WARC-Target-URI\":\"https://global-sci.org/intro/article_detail/getBib?article_id=12168\",\"WARC-Payload-Digest\":\"sha1:XDMUP6OFNXOIRHPTEMPC6ETR4ED2OCGM\",\"WARC-Block-Digest\":\"sha1:W5OE3EHYRZF75Z6WEZ7TFMSOKM5VASX4\",\"WARC-Identified-Payload-Type\":\"application/x-bibtex-text-file\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347405558.19_warc_CC-MAIN-20200529152159-20200529182159-00227.warc.gz\"}"}
https://unix.stackexchange.com/questions/264058/merge-multiple-lines-in-same-file-based-on-column-1
[ "# Merge multiple lines in same file based on column 1\n\nI'm still learning programming and I've tried many things but just cannot get the correct format. I have a tab delimited file with 17 columns and many (around 50.000) rows. The file is already sorted by first column. I want to merge rows that have the same first column (A), but all other 16 columns are different and I want to keep all the information in one row, preferably in the same column with semicolon ; as a delimiter between them. I want to keep tab as a delimiter in the output file. Thank you so much for the answers and if you could also explain the answer where I went wrong that would be even better :).\n\nI've tried so far:\n\n``````awk -F'\\t' 'NF>1{a[\\$1] = a[\\$1]\";\"\\$2}END{for(i in a){print i\"\"a[i]}}' filename.txt\n\nperl -F',' -anle 'next if /^\\$/;\\$h{\\$F} = \\$h{\\$F}.\", \".\\$F;\nEND{print \\$_,\\$h{\\$_},\"\\n\" for sort keys %h}' filename.txt\n``````\n\nFILE FORMAT (other 15 columns have the same format as column B)\n\n``````A B C\n123 fvv ggg\n123 kjf ggg\n123 ccd att\n567 abc gst\n567 abc hgt\n879 ttt tyt\n``````\n\nThe output I want (I need all 17 columns and for columns 2-16 I need the same output as in column B and C). All cases of B should be under B and all cases of C should be under C and all cases of D should be under D etc. So the output has 17 columns just like the input and instead of 50.000 rows, it now should have around 20.000, because there are many repeats for column 1 (for this particular file):\n\n``````A B C\n123 fvv;kjf;ccd ggg;ggg;att\n567 abc;abc gst;hgt\n879 ttt lll\n``````\n• `sed ':1;\\$!N;s/^\\(\\(\\S\\+\\s\\+\\).*\\)\\n\\2/\\1;/;t1;P;D' filename.txt` – Costas Feb 18 '16 at 12:44\n• This doesn't do exactly what I want. It gives output in such a way that it repeats all 16 columns in this way (but for 16): 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 and since i have for some cases 50 rows, with the same 1st row, this makes it hard to read as well as give an error due to so many columns (16 x 50 = 800 !!) . – Fluorine Feb 18 '16 at 12:55\n• Hang on, what output do you want for the multiple columns? Should all different cases of \"B\" be under \"B\"? Or should they be concatenated? Please edit your question and add a more representative example of your input and desired output so we can see how you want us to deal with the multiple columns. – terdon Feb 18 '16 at 13:23\n• Yes all cases of B should be under B and all cases of C should be under C and all cases of D should be under D etc. So the output has 17 columns just like the input and instead of 50.000 rows, it now should have around 20.000 (for this particular file). – Fluorine Feb 18 '16 at 14:48\n• If you don't mind having the values separated by commas instead of semicolons you could try with `gnu datamash` e.g. assuming `infile` is sorted by 1st column you could run `{ head -n 1; datamash -g 1 \\$(printf 'collapse %s ' {2..15}); } <infile | column -t` – don_crissti Feb 18 '16 at 15:32\n\n``````awk '{\nif(NR!=1){a[\\$1]=\\$2\";\"a[\\$1]}\nelse print \\$0}\nEND{\nn = asorti(a, b);\nfor (n in b) {\nprint b[n],a[b[n]]\n}\n}'\n``````\n\nA perl solution:\n\n``````\\$ perl -F\"\\t\" -anle 'if(\\$.==1){print; next} push @{\\$k{\\$F}},@F[1..\\$#F];\nEND{print \"\\$_\\t\" . join(\";\",@{\\$k{\\$_}}) for sort keys(%k)}' file\nA B\n123 fvv;kjf;ccd\n567 abc;abc\n879 ttt\n``````\n\nThis can work on an arbitrary number of fields. It does, however, require loading quite a few things into memory and that might be a problem if your file is large.\n\nAs for where you went wrong, we can't tell you unless you explain what actually happened but, off the top of my head, you perl attempt would fail because:\n\n• You are using `-F,` which sets the field separator to a comma when your input has tabs.\n• You are using `-l` and `print \"foo\\n\"`. The `-l` already adds a newline to each print call, so you'll have multiple, blank lines.\n• You are using `\\$h{\\$F}.\", \".\\$F;` to append, so the first time that is run and `\\$h{\\$F}` is not defined, you will add an extra `,` at the beginning of your stored value.\n• You are only looking at the second field, ignoring all others.\n\nSimilarly, your `awk` will fail because:\n\n• You are printing `foo\"\"bar` which will concatenate the output with no space between each field. You want `print foo,bar` and you also want `OFS=\"\\t\"` for tab-separated output.\n• You are only looking at the second field, ignoring all others.\n\napologies for this one-liner, but here it goes --\n\n``````awk 'BEGIN{FS=\"\\t\"} {for(i=2; i<=NF; i++) { if (!a[\\$1]) a[\\$1]=\\$1FS\\$i ;else a[\\$1]=a[\\$1]\";\"\\$i};if (\\$1 != old) b[j++] = a[old];old=\\$1 } END{for (i=0; i<j; i++) print b[i] }' 1\n\n123 fvv ;kjf;ccd\n567 abc;abc\n879 ttt\n``````\n\nPerl can do this handily, using a hash:\n\n``````#!/usr/bin/env perl\n\nuse strict;\nuse warnings;\n\nmy %stuff;\nmy @header = split ' ', <>;\n\n#read in the data to \"stuff\"\nwhile ( <> ) {\nmy ( \\$key, \\$value ) = split;\npush ( @{\\$stuff{\\$key}}, \\$value );\n}\n\nforeach my \\$key ( sort keys %stuff ) {\nprint \\$key, \"\\t\", join \";\", @{\\$stuff{\\$key}},\"\\n\";\n}\n``````\n\nOutput:\n\n``````A B\n123 fvv;kjf;ccd;\n567 abc;abc;\n879 ttt;\n``````\n\nWhere you went wrong? Honestly, I would suggest it's in trying to compress it all into a one liner. That is - in my opinion - really bad practice. At best, it promotes inscrutable code that's hard to follow.\n\nThe above could be condensed down, but it really pays to do it longhand first.\n\nIn order to support multiple columns, then you start to hit a slight bit of a nuisance with column widths.\n\nThis works, but produces output that indentation isn't neatly aligned:\n\n``````#!/usr/bin/env perl\n\nuse strict;\nuse warnings;\n\nmy %stuff;\n\nmy ( \\$id, @header ) = split ' ', <>;\n\nwhile ( <> ) {\nmy ( \\$key, @values ) = split;\nmy %row;\npush ( @{\\$stuff{\\$key}{\\$_}}, \\$row{\\$_} ) for keys %row;\n}\n\nprint join ( \"\\t\", \\$id, @header),\"\\n\";\nforeach my \\$key ( sort keys %stuff ) {\nprint join (\"\\t\", \\$key, map { join \";\", @{\\$stuff{\\$key}{\\$_}}} @header), \"\\n\";\n}\n``````\n\nOutput of:\n\n``````A B C\n123 fvv;kjf;ccd ggg;ggg;att\n567 abc;abc gst;hgt\n879 ttt tyt\n``````\n\nIf tab separation isn't suitable for your needs, you can use `sprintf` to do the formatting:\n\n``````my \\$format = '%12s';\nprint map { sprintf(\\$format, \\$_) } ( \\$id, @header),\"\\n\";\nforeach my \\$key ( sort keys %stuff ) {\nprint map { sprintf(\\$format, \\$_) } ( \\$key, map { join \";\", @{\\$stuff{\\$key}{\\$_}}} @header),\"\\n\";\n}\n``````\n\nWe make some use of `map` here, which I appreciate isn't exactly an obvious thing.\n\nWhat it does is take a list, and apply a transformation to each element. So - in the above example:\n\n``````print join (\"\\y\", map { join \";\", @\\$_ } ([1,2,3],[4,5,6],[7,8,9]) )\n``````\n\nWill generate:\n\n``````1;2;3 4;5;6 7;8;9\n``````\n\nThe `map` operation is saying 'join each subarray on ;' and then return that as a list... that we can then join with a tab. That's basically what the above is doing.\n\n• I rolled back my edit (which, ironically enough, added a one-liner and was written before your warning against them) because I noticed that your solution only works for 2 fields. The OP has multiple fields and has only included 2 as an example. – terdon Feb 18 '16 at 13:17\n• Good point - I'll amend my example. (And might try and one-liner-it, but might not :)) – Sobrique Feb 18 '16 at 13:20\n• This script gives me only column 1 and 2 and for columns 3-17 only column name, rest is empty. – Fluorine Feb 18 '16 at 14:43\n• Yes, sorry, still rejigging it with the new sample input. – Sobrique Feb 18 '16 at 14:43\n• Amended. Works with sample data now. – Sobrique Feb 18 '16 at 14:52\n``````awk '\nfunction p(n,A){\ns = n\nfor(i=2;i<=NF;i++){\ns = s \"\\t\" A[i]\nA[i] = \\$i\n}\nif(n)\nprint s\n}\nNR==1{\nprint\nnext\n}\n\\$1==n{\nfor(i=2;i<=NR;i++)\nA[i] = A[i] \";\" \\$i\nnext\n}\n{\np(n,A)\nn = \\$1\n}\nEND{\np(n,A)\n}\n' file\n``````\n\nI want to merge rows that have the same first column (A), but all other 16 columns are different and I want to keep all the information in one row\n\nYou got some fine answers, but I want to point out to you that what you've described in those 30 words is known in SQL as a join. If you import your 50,000 lines into two tables in SQLite, you get the effect you want with\n\n``````select * from R join S on r1 = s1\n``````\n\nwhere r1 and s1 are column names that you determine.\n\nThere are a lot of advantages to using SQL for something like this, especially as the join and selection criteria grow more complex. It's one of the reasons SQL was invented.\n\n• I'm fairly certain that you misunderstood the problem. In SQL parlance, the problem most resembles a GROUP BY where the aggregating functions concatenate strings. – Barefoot IO Feb 18 '16 at 23:22\n• Not a misunderstanding, just a simplification. The JOIN is the hard part (and it is a join). The concatenation is easy. It could be done in the caller, or in SQL with `SELECT r1, r2 || ';' || s2, r3 || ';' s3`, etc. – James K. Lowden Feb 18 '16 at 23:37" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86212534,"math_prob":0.8475043,"size":1731,"snap":"2019-26-2019-30","text_gpt3_token_len":548,"char_repetition_ratio":0.11580776,"word_repetition_ratio":0.0,"special_character_ratio":0.34199885,"punctuation_ratio":0.1291866,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95885414,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-22T22:44:14Z\",\"WARC-Record-ID\":\"<urn:uuid:0339670a-1b52-4060-a926-cfa08591bc5b>\",\"Content-Length\":\"182659\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d72913f4-0f4b-40d0-85e2-60c77bdcc5fd>\",\"WARC-Concurrent-To\":\"<urn:uuid:459d5d59-b6c1-4c27-b62a-35d31a58aa84>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://unix.stackexchange.com/questions/264058/merge-multiple-lines-in-same-file-based-on-column-1\",\"WARC-Payload-Digest\":\"sha1:PSSGBJL42NEEZ2H5DQSBSKULKUT2MBQT\",\"WARC-Block-Digest\":\"sha1:BXFNB4YXHO3L42WSWF3A2ESF5PHCCUVN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195528290.72_warc_CC-MAIN-20190722221756-20190723003756-00143.warc.gz\"}"}
https://exactlyhowlong.com/how-long-does-it-take-to-count-to-a-million-and-why/
[ "# How Long Does It Take To Count To A Million (And Why)?\n\n## Exact Answer: 11 Days, 13 Hours And 46 MInutes\n\nThere are only a few things that have no end meaning that they are infinite. One is the time, and the second is the number system. Time also gets denoted with the help of a number that has no possible end.\n\nIf a person were to count to a million, it would take a lot of time to reach there. The process is not only time-consuming but also quite complicated. Besides that, the longest-living person’s life would feel insufficient if the entire number system is to get counted. That includes both positive and negative numbers.\n\n## How Long Does It Take To Count To A Million?\n\nCounting might sound like an easy task only when it is about counting a hundred or maybe a thousand numbers in the correct order. But when it comes to numbers beyond a specific limit, it becomes hard to focus and complete the counting correctly.\n\nThe number has been the most creative discovery that man could ever make. The reason is that everything is either counted or measured in numbers only, whether it is time or distance. Hence knowing how to count the number becomes the foundation for a person’s learning.\n\nWhen it is counting numbers, the starting numbers are easy as they are one word. It then increases to multiple words. Considering the concept of numbers, if a person starts counting, it will take around 11 days, 13 hours, and 46 minutes to count till a million. That is keeping a standard time of one number getting counted per second.\n\nHowever, counting numbers without any break is impossible for a human. Hence, it is possible to count till a million in 11 days, 13 hours, and 46 minutes only for an artificial intelligence operated machine or computerized system,\n\nIt goes on and on if the counting gets increased substantially. This rule applies to only English numbers. Another regional way of counting numbers would take different times as the pronunciation time would be different.\n\n## Why Does It Take That Long To Count A Million?\n\nNumbers are infinite, as the number system got created in a way, where there is no end to numbers. The reason is that even the counting of all existing numbers is a task that would go on for billions of years. Maybe even more than that.\n\nThere are many reasons behind so much time getting invested in the count to a million. A few of the reasons are as follows:\n\n• The primary reason is that the number increases from one digit to a seven-digit number when a million starts. The time to pronounce the words per number also increases to seven digits. Collectively the time goes high.\n• Besides that, if a human counts the number, they would mandatorily need some essential breaks. So if all the time gets invested into counting, that would take about 89 to 90 days to count till a million. That is considering all the essential breaks get excluded.\n\nA person also needs to be focused while counting to a large number like a million. Since the number are so repetitive, it is easy to get confused. There are many studies with regards to how much it would take to count till a million.\n\nSome studies consider one number per second, while some may take the number of syllables that come in each word between one and one million into consideration. There are also a lot of other methods to know how much goes into counting to a million.\n\n## Conclusion\n\nBesides the standard timing to count numbers, if a person can count fast, the counting time would even reduce. The faster a person or a machine will count, the lesser time it will take to count to a million.\n\nConsidering the advancement of AI technologies, a human does not have to count on its own. The machine can count to a million much faster than humans without making any errors.\n\n## References\n\nSubscribe\nNotify of", null, "" ]
[ null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%2056%2056'%3E%3C/svg%3E", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9494036,"math_prob":0.9362337,"size":4353,"snap":"2022-40-2023-06","text_gpt3_token_len":956,"char_repetition_ratio":0.15267877,"word_repetition_ratio":0.020242915,"special_character_ratio":0.21525384,"punctuation_ratio":0.09490741,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96417785,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-28T17:01:15Z\",\"WARC-Record-ID\":\"<urn:uuid:242f802c-5c47-463a-ae01-157d861a1fbe>\",\"Content-Length\":\"177127\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bf0e6681-1f01-4597-995b-b7414032f3b6>\",\"WARC-Concurrent-To\":\"<urn:uuid:ba561a42-333a-4c0c-8ab4-a678957757e7>\",\"WARC-IP-Address\":\"172.67.200.218\",\"WARC-Target-URI\":\"https://exactlyhowlong.com/how-long-does-it-take-to-count-to-a-million-and-why/\",\"WARC-Payload-Digest\":\"sha1:JGXNSEDTJ7C4WF4AAFD3IGBJVL7H3AT6\",\"WARC-Block-Digest\":\"sha1:5IRZ2752ARSS36BRRNXJQTURJ7LDFSJK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335257.60_warc_CC-MAIN-20220928145118-20220928175118-00476.warc.gz\"}"}
https://dl.bukkit.org/threads/my-explosion-regen-code-has-strange-behaviour.274751/
[ "# my explosion regen code has strange behaviour\n\nDiscussion in 'Plugin Development' started by xize, Jun 1, 2014.\n\nNot open for further replies.\n1. Offline\n\n### xize\n\nHello,\n\nso I'm trying to update a very old code I made in the past in order to have more schedulers instead of one globally called scheduler.\n\nhowever while it tries to generate blocks it gives false/positives because its just skipping lots of blocks for example when ive a normal tnt explosion the scheduler runs 3 times while it should do more than 3 because more than 3 blocks where exploded. I highly suspect the Comperator is doing something weird.\n\nmy event so far:\n\nCode:java\n` @EventHandler public void onExplosion(EntityExplodeEvent e) { System.out.print(\"event has been runned.\");  for(Block block : e.blockList()) { if(block.getType() == Material.CHEST || block.getType() == Material.FURNACE || block.getType() == Material.ANVIL || block.getType() == Material.BED || block.getType() == Material.BREWING_STAND || block.getType() == Material.WOOD_DOOR || block.getType() == Material.IRON_DOOR || block.getType() == Material.TORCH || block.getType() == Material.REDSTONE_WIRE || block.getType() == Material.REDSTONE_COMPARATOR || block.getType() == Material.REDSTONE_TORCH_ON || block.getType() == Material.REDSTONE_TORCH_OFF) { e.setCancelled(true); } else if(block.getType() == Material.TNT) { //leave empty ignore tnt } else { blocks.put(block.getLocation(), block.getState().getData()); block.setType(Material.AIR); } }  System.out.print(\"regen object has been created.\");  RegenObject regen = new RegenObject(blocks);  xEssentials.getRegenList().getList.add(regen); } `\n\nmy RegenObject class where my scheduler is in:\nCode:java\n` public class RegenObject implements Runnable { //note ive also just removed the comperator here but still the same behaviour. private TreeMap<Location, MaterialData> blocks = new TreeMap<Location, MaterialData>(new Comparator<Location>() { @Override public int compare(Location o1, Location o2) { return Integer.valueOf(o1.getBlockY()).compareTo(o2.getBlockY()); } });  private BukkitTask task; public RegenObject(TreeMap<Location, MaterialData> blocks) { this.blocks = blocks; startRegen(); } /**  * @author xize  * @param starts the block regen task.  */ public void startRegen() { if(!(task instanceof BukkitTask)) { this.task = Bukkit.getScheduler().runTaskTimer(xEssentials.getPlugin(), this, 0L, 1L); } }  /**  * @author xize  * @param stops the regen task.  */ public void stopRegen() { if(task instanceof BukkitTask) { this.task.cancel(); this.task = null; } if(xEssentials.getRegenList().getList.contains(this)) { xEssentials.getRegenList().getList.remove(this); }  } @SuppressWarnings(\"deprecation\") @Override public void run() { System.out.print(\"scheduler is still running.\"); Iterator<Entry<Location, MaterialData>> it = blocks.entrySet().iterator(); if(it.hasNext()) { Map.Entry<Location, MaterialData> entry = (Map.Entry<Location, MaterialData>) it.next(); Location loc = entry.getKey(); MaterialData data = entry.getValue(); System.out.print(\"setting block!\"); loc.getBlock().setTypeIdAndData(data.getItemTypeId(), data.getData(), true); loc.getWorld().playEffect(loc, Effect.STEP_SOUND, data.getItemTypeId()); it.remove(); blocks.remove(loc); } else { System.out.print(\"its stopped regen\"); stopRegen(); } } @Override public String toString() { return \"RegenObject [blocks=\" + blocks + \", task=\" + task + \", getClass()=\" + getClass() + \", hashCode()=\" + hashCode() + \", toString()=\" + super.toString() + \"]\"; } @Override public int hashCode() { final int prime = 31; int result = 1; result = prime * result + ((blocks == null) ? 0 : blocks.hashCode()); result = prime * result + ((task == null) ? 0 : task.hashCode()); return result; } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (getClass() != obj.getClass()) return false; RegenObject other = (RegenObject) obj; if (blocks == null) { if (other.blocks != null) return false; } else if (!blocks.equals(other.blocks)) return false; if (task == null) { if (other.task != null) return false; } else if (!task.equals(other.task)) return false; return true; }} `\n\nif someone could explain me what is 'corrupting' the resulting behaviour I'm very happy thanks", null, "#1" ]
[ null, "https://dl.bukkit.org/threads/my-explosion-regen-code-has-strange-behaviour.274751/smilies/happy.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86977303,"math_prob":0.7649444,"size":273,"snap":"2020-24-2020-29","text_gpt3_token_len":69,"char_repetition_ratio":0.09293681,"word_repetition_ratio":0.5365854,"special_character_ratio":0.26373628,"punctuation_ratio":0.19607843,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95228237,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-04T17:27:57Z\",\"WARC-Record-ID\":\"<urn:uuid:e0ee1152-0e3e-4097-abea-3993375991e2>\",\"Content-Length\":\"54954\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:96125501-e532-4b3a-8ea2-fc98e3bda454>\",\"WARC-Concurrent-To\":\"<urn:uuid:9e3efbcd-1f29-4417-8d03-266c6ebb08a9>\",\"WARC-IP-Address\":\"104.19.162.33\",\"WARC-Target-URI\":\"https://dl.bukkit.org/threads/my-explosion-regen-code-has-strange-behaviour.274751/\",\"WARC-Payload-Digest\":\"sha1:KVFO6LOITIGOODSIUHBU64HD4PKZ35HJ\",\"WARC-Block-Digest\":\"sha1:N7Y4B6WOSNHBFXWMBPKBOXJS2DUA6DIZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347445880.79_warc_CC-MAIN-20200604161214-20200604191214-00132.warc.gz\"}"}
https://gis.stackexchange.com/questions/122567/generate-random-points-in-polygon-algorithm-question?noredirect=1
[ "# Generate random points in polygon. Algorithm question\n\ni created a Random Point Generator in python using the algorithm described here by @whuber. The algorithm is implemented using Shapely, PostGIS and psycopg2. To boost performance pythons multiprocessing and threading libraries are used. The source code can be found in my GitHub Repository. The code generates a total of 57.990.970 Points within 6388 Polygons in ~3517 sec on my Xeon-1231v3 with 16GB Ram.\n\n``````Procedure SimpleRandomSample(P:Polygon, N:Integer) {\nU = Sorted list of N independent uniform values between 0 and 1\nReturn SRS(P, BoundingBox(P), U)\n}\n\nProcedure SRS(P:Polygon, B:Rectangle, U:List) {\nN = Length(U)\nIf (N == 0) {Return empty list}\naP = Area(P)\nIf (aP <= 0) {\nError(\"Cannot sample degenerate polygons.\")\nReturn empty list\n}\nt = 2\nIf (aP*t < Area(B)) {\n# Cut P into pieces\nIf (Width(B) > Height(B)) {\nB1 = Left(B); B2 = Right(B)\n} Else {\nB1 = Bottom(B); B2 = Top(B)\n}\nP1 = Clip(P, B1); P2 = Clip(P, B2)\nK = Search(U, Area(P1) / aP)\nV = Concatenate( SRS(P1, B1, U[1::K]), SRS(P2, B2, U[K+1::N]) )\n} Else {\n# Sample P\nV = empty list\nmaxIter = t*N + 5*Sqrt(t*N)\nWhile(Length(V) < N and maxIter > 0) {\nDecrement maxIter\nQ = RandomPoint(B)\nIf (Q In P) {Append Q to V}\n}\nIf (Length(V) < N) {\nError(\"Too many iterations.\")\n}\n}\nReturn V\n}\n``````\n\nBut concerning the algorithm I have an open question. It mentions a `U = Sorted list of N independent uniform values between 0 and 1` which i could build using numpy.uniform(0, 1, numberOfValues). But then the algorithm will generate weird results, like one part of the polygon will not have any points in it. I work around this issue by weighting the points to be created by the recursive call using `k = int(round(n * (p1.area / polygon.area)))`.\n\nSo my question is why this List of uniform values between 0 and 1 should be used in the first place.\n\n• Bill could answer more completely, but I'd think the discrete set of intervals (randomly chosen) would force the distribution to be more complete in less time. Can you quantify these \"weird results\" you'd expect? Nov 18 '14 at 21:25\n• Well the weird result appeared once t was set so something smaller than 2. It started splitting the Polygon and basicly one part of it had no points in it. The problem was that K becomes a value between 0 and 1, but after splitting U like `U[1::K]` the max value in U might become smaller than K which forces `U[K+1::N]` to have a length of 0, thus no points are generated in this recursive call. Nov 18 '14 at 21:32\n• K is an integer between 0 and N. Nov 18 '14 at 22:09\n• Ehm stupid me, I wanted to say the area of the sub-polygon p1 divided by the whole area is something between 0-1. So Search does look in U where the index of the element is which is smaller than the result. But again if U was split before, lets say at 0.5 and the result is 0.7, K will be the last index of U, thus in p2 no points will be created. It only would make sense to search U if you recreate it every time SRS is run. But then also you would not need to pass it to the function. Just the number of points to be generated would be sufficient. Nov 18 '14 at 22:24" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8175435,"math_prob":0.9853266,"size":1949,"snap":"2021-31-2021-39","text_gpt3_token_len":575,"char_repetition_ratio":0.08534704,"word_repetition_ratio":0.05730659,"special_character_ratio":0.31246793,"punctuation_ratio":0.12713936,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9978833,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-23T18:00:37Z\",\"WARC-Record-ID\":\"<urn:uuid:60d547d5-35a0-48a4-a656-5c3b0a3c715c>\",\"Content-Length\":\"162998\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:603b6c9c-719e-49db-9e8f-5ca2e8c22a0b>\",\"WARC-Concurrent-To\":\"<urn:uuid:65f80ecd-b6dd-4ac2-bd26-ac227c2effba>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://gis.stackexchange.com/questions/122567/generate-random-points-in-polygon-algorithm-question?noredirect=1\",\"WARC-Payload-Digest\":\"sha1:D7FNR7USX5MT7Z3OHYNYJR53TEQUNQRF\",\"WARC-Block-Digest\":\"sha1:JJ6FA26ULF2LCXHRMBPOMOPUTIRYASNH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057427.71_warc_CC-MAIN-20210923165408-20210923195408-00607.warc.gz\"}"}
https://rdrr.io/cran/did/f/vignettes/pre-testing.Rmd
[ "Pre-Testing in a DiD Setup using the did Package In did: Treatment Effects with Multiple Periods and Groups\n\nknitr::opts_chunk$set( collapse = TRUE, comment = \"#>\" ) library(did) # Source the currently version of the did package (based on our Dropbox) # fldr <- here::here(\"R/\") # sapply(paste0(fldr,list.files(fldr)), source) # Source simulation designs source(here::here(\"vignettes/setup_sims.R\")) Introduction This vignette provides a discussion of how to conduct pre-tests in DiD setups using the did package • One appealing feature of many DiD applications with multiple periods is that the researcher can pre-test the parallel trends assumptions. • The idea here is simple: although one can not always test whether parallel trends itself holds, one can check if it holds in periods before treated units actually become treated. • Importantly, this is just a pre-test; it is different from an actual test. Whether or not the parallel trends assumption holds in pre-treatment periods does not actually tell you if it holds in the current period (and this is when you need it to hold!). It is certainly possible for the identifying assumptions to hold in previous periods but not hold in current periods; it is also possible for identifying assumptions to be violated in previous periods but for them to hold in current periods. That being said, we view the pre-test as a piece of evidence on the credibility of the DiD design in a particular application. • In this vignette, we demonstrate that the approach used in the did package for pre-testing may work substantially better than the more common \"event study regression\". Common Approaches to Pre-Testing in Applications By far the most common approach to pre-testing in applications is to run an event-study regression. Here, the idea is to run a regression that includes leads and lags of the treatment dummy variable such as $$Y_{it} = \\theta_t + \\eta_i + \\sum_{l=-\\mathcal{T}}^{\\mathcal{T}-1} D_{it}^l \\mu_l + v_{it}$$ where$D_{it}^l = 1$if individual$i$has been exposed to the treatment for$l$periods in period$t$, and$D_{it}^l = 0$otherwise. To be clear here, it is helpful to give some examples. Suppose individual$i$becomes treated in period 3. Then, •$D_{it}^0 = 1$when$t=3$and is equal to 0 in other time periods •$D_{it}^2 = 1$when$t=5$and is equal to 0 in other time periods •$D_{it}^{-2} = 1$when$t=1$and is equal to 0 in other time periods. And$\\mu_l$is interpreted as the effect of treatment for different lengths of exposure to the treatment. Typically,$\\mu_{-1}$is normalized to be equal to 0, and we follow that convention here. It is common to interpret estimated$\\mu_l$'s with$l < 0$as a way to pre-test the parallel trends assumption. Pitfalls with Event Study Regressions time.periods <- 4 reset.sim() bett <- betu <- rep(0, time.periods) te <- 0 set.seed(1814) Best Case Scenario for Pre-Testing First, let's start with a case where an event study regression is going to work well for pre-testing the parallel trends assumption # generate dataset with 4 time periods time.periods <- 4 # generate dynamic effects te.e <- time.periods:1 # generate data set with these parameters # (main thing: it generates a dataset that satisfies # parallel trends in all periods...including pre-treatment) data <- build_sim_dataset() head(data) The main thing to notice here: • The dynamics are common across all groups. This is the case where an event-study regression will work. Next, a bit more code #----------------------------------------------------------------------------- # modify the dataset a bit so that we can run an event study #----------------------------------------------------------------------------- # generate leads and lags of the treatment Dtl <- sapply(-(time.periods-1):(time.periods-2), function(l) { dtl <- 1*( (data$period == data$G + l) & (data$G > 0) )\ndtl\n})\nDtl <- as.data.frame(Dtl)\ncnames1 <- paste0(\"Dtmin\",(time.periods-1):1)\ncolnames(Dtl) <- c(cnames1, paste0(\"Dt\",0:(time.periods-2)))\ndata <- cbind.data.frame(data, Dtl)\nrow.names(data) <- NULL\n\n#-----------------------------------------------------------------------------\n# run the event study regression\n#-----------------------------------------------------------------------------\n\nlibrary(plm)\n\n# run event study regression\n# normalize effect to be 0 in pre-treatment period\nes <- plm(Y ~ Dtmin3 + Dtmin2 + Dt0 + Dt1 + Dt2,\ndata=data, model=\"within\", effect=\"twoways\",\nindex=c(\"id\",\"period\"))\n\nsummary(es)\n\n#-----------------------------------------------------------------------------\n# make an event study plot\n#-----------------------------------------------------------------------------\n\n# some housekeeping for making the plot\n# add 0 at event time -1\ncoefs1 <- coef(es)\nses1 <- sqrt(diag(summary(es)$vcov)) idx.pre <- 1:(time.periods-2) idx.post <- (time.periods-1):length(coefs1) coefs <- c(coefs1[idx.pre], 0, coefs1[idx.post]) ses <- c(ses1[idx.pre], 0, ses1[idx.post]) exposure <- -(time.periods-1):(time.periods-2) cmat <- data.frame(coefs=coefs, ses=ses, exposure=exposure) library(ggplot2) ggplot(data=cmat, mapping=aes(y=coefs, x=exposure)) + geom_line(linetype=\"dashed\") + geom_point() + geom_errorbar(aes(ymin=(coefs-1.96*ses), ymax=(coefs+1.96*ses)), width=0.2) + ylim(c(-2,5)) + theme_bw() You will notice that everything looks good here. The pre-test performs well (the caveat to this is that the standard errors are \"pointwise\" and would be better to have uniform confidence bands though this does not seem to be standard practice in applications). We can compare this to what happens using the did package: # estimate group-group time average treatment effects did_att_gt <- att_gt(yname=\"Y\", tname=\"period\", idname=\"id\", gname=\"G\", data=data, bstrap=FALSE, cband=FALSE) summary(did_att_gt) # plot them ggdid(did_att_gt) # aggregate them into event study plot did_es <- aggte(did_att_gt, type=\"dynamic\") # plot the event study ggdid(did_es) Overall, everything looks good using either approach. (Just to keep things fair, we report pointwise confidence intervals for group-time average treatment effects, but it is easy to get uniform confidence bands by setting the options bstrap=TRUE, cband=TRUE to the call to att_gt.) Pitfall: Selective Treatment Timing Sun and Abraham (2020) point out a major limitation of event study regressions: when there is selective treatment timing the$\\mu_l$end up being weighted averages of treatment effects across different lengths of exposures. Selective treatment timing means that individuals in different groups experience systematically different effects of participating in the treatment from individuals in other groups. For example, there would be selective treatment timing if individuals choose to be treated in earlier periods if they tend to experience larger benefits from participating in the treatment. This sort of selective treatment timing is likely to be present in many applications in economics / policy evaluation. Contrary to event study regressions, pre-tests based on group-time average treatment effects (or based on group-time average treatment effects that are aggregated into an event study plot) are still valid even in the presence of selective treatment timing. To see this in action, let's keep the same example as before, but add selective treatment timing. reset.sim() bett <- betu <- rep(0, time.periods) te <- 0 set.seed(1814) # generate dataset with 4 time periods time.periods <- 4 # generate dynamic effects te.e <- time.periods:1 # generate selective treatment timing # (*** this is what is different here ***) te.bet.ind <- time.periods:1 / (time.periods/2) # generate data set with these parameters # (main thing: it generates a dataset that satisfies # parallel trends in all periods...including pre-treatment) data <- build_sim_dataset() # run through same code as in earlier example...omitted #----------------------------------------------------------------------------- # modify the dataset a bit so that we can run an event study #----------------------------------------------------------------------------- # generate leads and lags of the treatment Dtl <- sapply(-(time.periods-1):(time.periods-2), function(l) { dtl <- 1*( (data$period == data$G + l) & (data$G > 0) )\ndtl\n})\nDtl <- as.data.frame(Dtl)\ncnames1 <- paste0(\"Dtmin\",(time.periods-1):1)\ncolnames(Dtl) <- c(cnames1, paste0(\"Dt\",0:(time.periods-2)))\ndata <- cbind.data.frame(data, Dtl)\nrow.names(data) <- NULL\n\n#-----------------------------------------------------------------------------\n# run the event study regression\n#-----------------------------------------------------------------------------\n\nlibrary(plm)\n# run event study regression\n# normalize effect to be 0 in pre-treatment period\nes <- plm(Y ~ Dtmin3 + Dtmin2 + Dt0 + Dt1 + Dt2,\ndata=data, model=\"within\", effect=\"twoways\",\nindex=c(\"id\",\"period\"))\n\nsummary(es)\n#-----------------------------------------------------------------------------\n# make an event study plot\n#-----------------------------------------------------------------------------\n\n# some housekeeping for making the plot\n# add 0 at event time -1\ncoefs1 <- coef(es)\nses1 <- sqrt(diag(summary(es)\\$vcov))\nidx.pre <- 1:(time.periods-2)\nidx.post <- (time.periods-1):length(coefs1)\ncoefs <- c(coefs1[idx.pre], 0, coefs1[idx.post])\nses <- c(ses1[idx.pre], 0, ses1[idx.post])\nexposure <- -(time.periods-1):(time.periods-2)\n\ncmat <- data.frame(coefs=coefs, ses=ses, exposure=exposure)\n# run through same code as before...omitted\n\n# new event study plot\nggplot(data=cmat, mapping=aes(y=coefs, x=exposure)) +\ngeom_line(linetype=\"dashed\") +\ngeom_point() +\ngeom_errorbar(aes(ymin=(coefs-1.96*ses), ymax=(coefs+1.96*ses)), width=0.2) +\nylim(c(-2,5)) +\ntheme_bw()\n\nIn contrast to the last case, it is clear that things have gone wrong here. Parallel trends holds in all time periods and for all groups here, but the event study regression incorrectly rejects that parallel trends holds -- this is due to the selective treatment timing.\n\nWe can compare this to what happens using the did package:\n\n# estimate group-group time average treatment effects\ndid.att.gt <- att_gt(yname=\"Y\",\ntname=\"period\",\nidnam=\"id\",\ngname=\"G\",\ndata=data\n)\nsummary(did.att.gt)\n\n# plot them\nggdid(did.att.gt)\n# aggregate them into event study plot\ndid.es <- aggte(did.att.gt, type=\"dynamic\")\n\n# plot the event study\nggdid(did.es)\n\nThis is the correct performance (up to aforementioned caveats about multiple hypothesis testing).\n\nConditional Moment Tests\n\nAnother main use case for the did package is when the parallel trends assumptions holds after conditioning on some covariates. This is likely to be important in many applications. For example, to evaluate the effect of participating in a job training program on earnings, it is likely to be important to condition on an individual's education. This would be true if (i) the distribution of education is different for individuals that participate in job training relative to those that don't (this is very likely to hold as people that participate in job training tend to have less education than those who do not), and (ii) if the path of earnings (absent participating in job training) depends on an individual's education. See Heckman, Ichimura, and Todd (1998) and Abadie (2005) for more discussion.\n\nEven when one includes covariates to estimate group-time average treatment effects, pre-tests based only on group-time average treatment effects can fail to detect some violations of the parallel trends assumption. To give an example, suppose that the only covariate is binary variable for an individual's sex. Pre-tests based on group-time average treatment effects could fail to detect violations of the conditional parallel trends assumption in cases where it is violated in one direction for men and in the other direction for women.\n\nThe did package contains an additional pre-test for the conditional parallel trends assumption in the conditional_did_pretest function.\n\n# not run (this code can be substantially slower)\nreset.sim()\nset.seed(1814)\nnt <- 1000\nnu <- 1000\ncdp <- conditional_did_pretest(\"Y\", \"period\", \"id\", \"G\", xformla=~X, data=data)\ncdp\n\nTry the did package in your browser\n\nAny scripts or data that you put into this service are public.\n\ndid documentation built on Jan. 13, 2021, 4:12 p.m." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.78267026,"math_prob":0.87015516,"size":12551,"snap":"2022-05-2022-21","text_gpt3_token_len":2961,"char_repetition_ratio":0.18610026,"word_repetition_ratio":0.28263402,"special_character_ratio":0.31750458,"punctuation_ratio":0.12971482,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99111015,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-24T06:22:34Z\",\"WARC-Record-ID\":\"<urn:uuid:d3be7103-6d6a-4fbe-a0dd-551efa6cc637>\",\"Content-Length\":\"59385\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e06f0228-7d73-444f-a416-285e24fc28bc>\",\"WARC-Concurrent-To\":\"<urn:uuid:819a7f73-9951-467a-8a90-3aeed6c62531>\",\"WARC-IP-Address\":\"51.81.83.12\",\"WARC-Target-URI\":\"https://rdrr.io/cran/did/f/vignettes/pre-testing.Rmd\",\"WARC-Payload-Digest\":\"sha1:RTHGFZD5EUR3XHBQDQWLPGW5JQEBANQN\",\"WARC-Block-Digest\":\"sha1:TZN4SPF3GAKIIKIS35KJZTEXZ7IC4P6B\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304515.74_warc_CC-MAIN-20220124054039-20220124084039-00188.warc.gz\"}"}
https://www.vadepares.cat/triangle-proofs-worksheet/
[ "# Triangle Proofs Worksheet", null, "Some of the worksheets for this concept are congruent triangles 2 column proofs, geometric proofs, , geometryh work proofs in two column form, triangle proofs s sas asa aas, using cpctc with triangle congruence, proving triangles are congruent by sas asa, assignment date period. ∠ ≅ ∠y c 1.", null, "Pythagorean Theorem Maze Worksheet Pythagorean theorem\n\n### Geometry worksheet triangle congruence proofs name:", null, "Triangle proofs worksheet. 2) why is an altitude? Triangle proofs worksheet part 1. The point that divides a segment into two congruent segments.\n\nAnswer key for 4 4 practice worksheet. Therefore, they have the same length. 1) why is the triangle isosceles?\n\nTriangle congruence proofs worksheet answers together with practical themes. Worksheet by kuta software llc 3 answers to naming angles and angle addition postulate naaaap 1 g 3. Proving triangles similar bagikan artikel ini.\n\nWhere any three points can come together to form a triangle, any three lines cannot come together to form a triangle. Triangle proofs worksheet answers along with beneficial subjects. Bd ⊥ ab, bd ⊥ de, bc dc≅ prove:\n\nGeometry triangle proofs worksheet, practice geometry proofs congruent triangles and kindergarten ending sounds worksheets are three main things we will present to you based on the post title. Worksheet 10 1 14 quiz proofs w parallel and 2 pairs of triangles no homework 10 2 x proof puzzles more practice finish proof puzzles 10 3 15 isosceles triangle proofs no homework 10 4 16 overlapping triangle proofs geometry practice sheet. About this quiz & worksheet.\n\nSum of the angles in a triangle is 180 degree worksheet. The complex mathematical theorems and proofs relating to right triangles can be easily understood with this lesson quiz and worksheet pairing that focuses on assisting. 6) cd ≅ cd s 6) reflexive property 7) δcad ≅ δcbd 7) sas\n\nWhen working with congruent triangles, remember to: Angle sum of a triangle: The ray that divides an angle into two congruent angles.\n\nSome of the worksheets for this concept are geometry work beginning proofs, geometry coordinate geometry proofs, unit 4 triangles part 1 geometry smart packet, geometry proofs and postulates work, proving triangles are congruent by sas asa, proving triangles congruent, jesuit high school mathematics department. Mcn vcb mc vc nc bc. ∆ ≅ ∆yza cab 4.\n\nThe reasons can be given information, definitions, postulates of geometry, or rules of algebra. The estimating worksheet is intended to direct you get through the estimation practice. By tips about speech creating, to developing publication collections, or even to figuring out what sort of content for.\n\nThe ray that divides an angle into two congruent angles. Wednesday, 11/14/12 or thursday, 11/15/12. Complementary and supplementary word problems worksheet.\n\nG g 28 determine the congruence of two triangles by usin g one of the five congruence techniques sss sas asa aas hl given sufficient informa tion about the sides and or angles of two congruent triangles. Proofs involving congruent triangle worksheet 2 1 given. Isosceles triangle proofs worksheet with answers.\n\nCommon potential reasons for proofs. Free geometry worksheets with visual aides model problems exploratory activities practice problems and an online component. Geometry smart packet triangle proofs sss sas asa aas student.\n\nTriangle proofs worksheet part 2. Tips for preparing congruent triangle proofs: Triangle congruence proofs worksheet answers.\n\nWhat other parts of the triangles are congruent by cpctc? Ca # cb statements reasons 1) cd bisects ab at d 1) given 2) ad # bd s 2) definition of a bisector 3) cd ⊥ ab 3) given 4) cda and cdb are right angles. 4) definition of perpendicular lines 5) <cda ≅ <cdb a 5) all right angles are congruent.\n\nCd bisects ab at d cdaab prove: There may be more than one way to solve these problems. 30 angle relationships worksheet answers.\n\nTriangle congruence proofs by my similarity and congruence unit: Start by marking the given information on your diagram (using hash marks, arcs, etc.). Congruent triangles 2 column proofs retrieved from hillgrove high school problem 10:\n\nExamine each proof and determine the missing entries. Due to the fact we want to give everything you need within a real plus trusted resource, we existing very helpful facts about numerous matters as well as topics. Explain using geometry concepts and theorems:\n\nGeometry unit 8 congruent triangles 2 column proofs sss includes areas of kite and rhombus pythagoras theorem some basic circle theorems isosceles triangles area of a triangle. From tips about language producing, to making book describes, or to figuring out what sort of lines for your own. But in order to prove this, we need some logic and theorems.\n\nWe will do problem #1 together as an example. Recall that triangles have three sides and are a construct of three points or vertices. Vertical ls theorem sas ai<jm ai<lm reasons 2.\n\nThe point that divides a segment into two congruent segments. If they are congruent fill in the congruence statement and name the reason (sss, sas, aas, asa, or hl). ∠ ≅ ∠bac dca 1.\n\nGeometry worksheet triangle congruence proofs name. Identifying geometry theorems and postulates answers c congruent ? Triangle congruence proofs worksheet | homeschooldressage.com geometry worksheet:\n\nTriangle proofs with cpctc ( quiz. To play this quiz, please finish editing it. In the mean time we talk concerning cpctc proofs worksheet, scroll the page to see particular similar pictures to give you more ideas.\n\nQuadrilateral questions worksheet 2 kidspressmagazine com quadrilaterals worksheet … this quiz is incomplete! Some of the worksheets for this concept are using cpctc with triangle congruence, name geometry unit 2 note packet triangle proofs, more triangle proofs cpctc, geometric proofs, proving triangles congruent, 4 congruence and triangles, geometry honors. If the given information contains definitions, be sure to use them as they are hints to the solution.\n\nPr and pq are radii of the circle. Worksheet will open in a new window. Having the exact same size and shape and there by having the exact same measures.\n\nMy geometry students need practice with proving triangles congruent using sss sas congruent triangles worksheet proving triangles congruent triangle worksheet a collection of congruent triangles worksheets on key concepts like congruent parts of congruent triangles … The ray that divides an angle into two congruent angles. Make sure you understand the main areas of study, like a basic definition of a.\n\nHaving the exact same size and shape and there by having the exact same measures. Belum ada komentar untuk 30 congruent triangles proofs worksheet answers A triangle with 2 sides of the same length is isosceles.\n\nBecause you should supply programs in a reputable along with reputable origin, all of us present very helpful info on different subject matter plus topics. You will receive your score and answers at the end. About this quiz & worksheet.", null, "Geometry Puzzle Worksheets Bundle Geometry Resources and", null, "Triangle Congruence Worksheet Answer Key Beautiful", null, "Isosceles and Equilateral Triangles Puzzle Worksheet", null, "Proving Triangles Congruent Worksheet Answers Congruent", null, "Classified Triangle Congruence Proofs Worksheet Triangle", null, "20 Geometric Proofs Worksheet with Answers in 2020", null, "50 Triangle Inequality theorem Worksheet in 2020", null, "Hypotenuse Leg theorem Worksheet 30 Triangle Congruence", null, "Recent Parallel Lines and Transversals Worksheet Answers", null, "Pin on Customize Design Worksheet Online", null, "Geometric Shapes Worksheet 2nd Grade 2nd Grade Geometry", null, "congruent is = like circumference is perimeter in geometry", null, "Pin on Printable Blank Worksheet Template", null, "Proving Triangles Congruent Proof Activity Geometry", null, "Due Thursday October 23 Due Thursday October 23 San Marino", null, "Pin on Professionally Designed Worksheets", null, "Relationships in Triangles INB Pages Triangle inequality", null, "Segments in Triangles Foldable Teaching geometry", null, "Readable Proving Triangles Congruent Worksheet" ]
[ null, "https://i2.wp.com/www.vadepares.cat/wp-content/uploads/2021/02/images-18045.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/13/80/1b/13801b4612d058472a7b581932b4e750.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/81/4e/26/814e26deade7b961bf5f231a905b88c4.jpg", null, "https://i1.wp.com/i.pinimg.com/originals/db/37/1e/db371e20dffa6393b2a1423263d1cb6a.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/0a/ce/dd/0aceddf0a068c7b724ff72a8303d08a3.jpg", null, "https://i1.wp.com/i.pinimg.com/736x/ec/16/f6/ec16f643ccf0f07e3dfe14d7b24c0b68--geometry-worksheets-secondary-math.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/77/35/6c/77356c70d5620fab2f0f0c27dc103af5.jpg", null, "https://i2.wp.com/i.pinimg.com/originals/e6/bb/34/e6bb34b799f1e1786fa98762829596d5.jpg", null, "https://i0.wp.com/i.pinimg.com/736x/10/58/e4/1058e46a38e7a8af74620ff56bfebb5b.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/d7/19/69/d719699b59657d612bd64c21091dbdd4.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/24/ea/12/24ea12c026a92f0f155a2a6519a09cb3.jpg", null, "https://i1.wp.com/i.pinimg.com/originals/e1/d2/82/e1d2827632ed876f5d14ad0b2f4f168e.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/27/56/63/275663ba76aad64b4ea8ff73ade9cddb.jpg", null, "https://i1.wp.com/i.pinimg.com/originals/2c/dd/ea/2cddea78d0d046c71401b0accf458361.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/f6/cd/26/f6cd26b2807cd9a7fcb8ed3407809aba.png", null, "https://i0.wp.com/i.pinimg.com/originals/2d/bb/2b/2dbb2bc554ab5ab707ea2c58110410d1.jpg", null, "https://i2.wp.com/i.pinimg.com/originals/a9/18/0f/a9180fff79728a249319bc8d9b466fbe.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/b0/1f/bf/b01fbf26766334e800aa622d595896ec.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/96/9e/17/969e17ddd35420b2d639e9be901221d4.jpg", null, "https://i0.wp.com/i.pinimg.com/originals/81/4e/26/814e26deade7b961bf5f231a905b88c4.jpg", null, "https://i2.wp.com/i.pinimg.com/originals/d4/80/1f/d4801f90224b4fd8f10feccbad88408e.jpg", null, "https://i2.wp.com/i.pinimg.com/originals/41/1e/0e/411e0eba23fe9d87ba15384c213e97eb.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8336257,"math_prob":0.9053974,"size":7941,"snap":"2021-31-2021-39","text_gpt3_token_len":1736,"char_repetition_ratio":0.22565201,"word_repetition_ratio":0.06586345,"special_character_ratio":0.19153759,"punctuation_ratio":0.09604105,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99746877,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44],"im_url_duplicate_count":[null,1,null,3,null,2,null,1,null,3,null,1,null,2,null,2,null,1,null,1,null,3,null,7,null,1,null,1,null,2,null,2,null,1,null,5,null,2,null,2,null,1,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-01T17:15:49Z\",\"WARC-Record-ID\":\"<urn:uuid:0a2218a0-8c99-4b39-97ef-748eec9f997f>\",\"Content-Length\":\"68605\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1d0b7160-8b46-4d47-86ee-168272539234>\",\"WARC-Concurrent-To\":\"<urn:uuid:9cdc5214-cd4f-455b-902d-2d791771f2d6>\",\"WARC-IP-Address\":\"104.21.76.249\",\"WARC-Target-URI\":\"https://www.vadepares.cat/triangle-proofs-worksheet/\",\"WARC-Payload-Digest\":\"sha1:NX5KFOGO7K3DFFTTCGD3KR4EUV76EFDU\",\"WARC-Block-Digest\":\"sha1:DU2YS77WKG2QMX22HUI53USM6LUE4ITW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154214.63_warc_CC-MAIN-20210801154943-20210801184943-00565.warc.gz\"}"}
http://mural.maynoothuniversity.ie/5003/
[ "Emergent Phenomena in Matrix Models\n\nKaltenbrunner, Thomas (2014) Emergent Phenomena in Matrix Models. PhD thesis, National University of Ireland Maynooth.", null, "", null, "Preview", null, "", null, "", null, "", null, "", null, "more...", null, "Add this article to your Mendeley library\n\nAbstract\n\nIn this work we perform a careful study of different matrix models and particularly the property of emergent phenomena in them. We start discussing a 2-matrix model of Yang-Mills type that exhibits an emergent topology in the strong coupling limit. We use Monte-Carlo simulations to obtain various observables that allow us to get more insight in the transition from the non-commutative regime towards the commutative, strong coupling, limit. We will continue to discuss higher dimensional Yang-Mills matrix models, focusing on the lowest dimensional case that is well defned, D = 3, and on the large-D limit. While we discuss the possibility of an emergent topology in 3 dimensions, we find that the behaviour of this type of models changes towards random matrices for large D. In the second part of the thesis we will add a Myers term to the Yang-Mills type models which extends the possible solutions to the model by fuzzy spaces. We carry out a 1-loop calculation for a general SU(d) symmetric solution to this class of models. We will then turn to a numerical study of a model that incorporates the simplest case of a fuzzy manifold, the fuzzy sphere. We will further study fuzzy CP2 which appears as a solution to the 8-dimensional Yang-Mills-Myers model. Numerical results from a Monte-Carlo simulation will be used to compare with the analytical results obtained earlier. We will further construct a slightly modified 8-dimensional model that has a fuzzy complex projective plane as the ground state in phase space. In total, we find four different phases in this model, which we will describe in detail after numerically mapping the phase diagram.\n\nItem Type: Thesis (PhD) Emergent Phenomena; Matrix Models; Faculty of Science and Engineering > Mathematical Physics 5003 IR eTheses 04 Jun 2014 11:44", null, "Item control page" ]
[ null, "http://mural.maynoothuniversity.ie/5003/1.hassmallThumbnailVersion/thesis.pdf", null, "http://mural.maynoothuniversity.ie/5003/1.haspreviewThumbnailVersion/thesis.pdf", null, "http://mural.maynoothuniversity.ie/images/icons8-Twitter-26.png", null, "http://mural.maynoothuniversity.ie/images/facebook.png", null, "http://mural.maynoothuniversity.ie/images/linkedin.png", null, "http://mural.maynoothuniversity.ie/images/googleplus.png", null, "http://mural.maynoothuniversity.ie/images/sendmail.png", null, "http://www.mendeley.com/graphics/mendeley.png", null, "http://mural.maynoothuniversity.ie/style/images/action_view.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8620342,"math_prob":0.8444881,"size":2178,"snap":"2019-26-2019-30","text_gpt3_token_len":476,"char_repetition_ratio":0.10579577,"word_repetition_ratio":0.0,"special_character_ratio":0.20615244,"punctuation_ratio":0.0964467,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9648945,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,1,null,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-18T15:32:49Z\",\"WARC-Record-ID\":\"<urn:uuid:2645e91e-df62-43f4-a91b-89cfbe32efcf>\",\"Content-Length\":\"30865\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6d45bd1f-37ea-4951-b706-11e8ada0f693>\",\"WARC-Concurrent-To\":\"<urn:uuid:143eade5-2d97-4819-9696-ac7dae1cb52a>\",\"WARC-IP-Address\":\"13.69.156.231\",\"WARC-Target-URI\":\"http://mural.maynoothuniversity.ie/5003/\",\"WARC-Payload-Digest\":\"sha1:NBF2EMZ22EXOKQJWRO24CGJL2IGUUZHL\",\"WARC-Block-Digest\":\"sha1:V6WLCQ22I3RY7H7ZS2HTJHF3O3RINIKD\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560627998755.95_warc_CC-MAIN-20190618143417-20190618165417-00311.warc.gz\"}"}
http://oeis.org/A163778
[ "The OEIS Foundation is supported by donations from users of the OEIS and by a grant from the Simons Foundation.", null, "Hints (Greetings from The On-Line Encyclopedia of Integer Sequences!)\n A163778 Odd terms in A054639. 9\n 3, 5, 9, 11, 23, 29, 33, 35, 39, 41, 51, 53, 65, 69, 81, 83, 89, 95, 99, 105, 113, 119, 131, 135, 155, 173, 179, 183, 189, 191, 209, 221, 231, 233, 239, 243, 245, 251, 261, 273, 281, 293, 299, 303, 309, 323, 329, 359, 371, 375, 393, 411, 413, 419, 429 (list; graph; refs; listen; history; text; internal format)\n OFFSET 1,1 COMMENTS Previous name was: The A_1-primes (Archimedes_1 primes). We have: (1) N is an A_1-prime iff N is odd, p=2N+1 is a prime number and only one of +2 and -2 generates Z_p^* (the multiplicative group of Z_p); (2) N is an A_1-prime iff p=2N+1 is a prime number and exactly one of the following holds: (a) N == 1 (mod 4) and +2 generates Z_p^* but -2 does not, (b) N == 3 (mod 4) and -2 generates Z_p^* but +2 does not. The A_1-primes are the odd T- or Twist-primes (the T-primes are the same as the Queneau-numbers, A054639). For the related A_0-, A^+_1- and A^-_1-primes, see A163777, A163779 and A163780. Considered as a set, the present sequence is the union of the A^+_1-primes (A163779) and the A^-_1-primes (A163780). It is also equal to the difference of A054639 and the A_0-primes (A163777). LINKS P. R. J. Asveld, Table of n, a(n) for n=1..6706. P. R. J. Asveld, Permuting operations on strings and their relation to prime numbers, Discrete Applied Mathematics 159 (2011) 1915-1932. P. R. J. Asveld, Permuting operations on strings and the distribution of their prime numbers (2011), TR-CTIT-11-24, Dept. of CS, Twente University of Technology, Enschede, The Netherlands. P. R. J. Asveld, Some Families of Permutations and Their Primes (2009), TR-CTIT-09-27, Dept. of CS, Twente University of Technology, Enschede, The Netherlands. P. R. J. Asveld, Permuting Operations on Strings-Their Permutations and Their Primes, Twente University of Technology, 2014. MATHEMATICA follow[s_, f_] := Module[{t, k}, t = f[s]; k = 1; While[t>s, k++; t = f[t]]; If[s == t, k, 0]]; okQ[n_] := n>1 && n == follow[1, Function[j, Ceiling[n/2] + (-1)^j*Ceiling[ (j-1)/2]]]; A163778 = Select[Range, okQ] (* Jean-François Alcover, Jun 07 2018, after Andrew Howroyd *) PROG (PARI) Follow(s, f)={my(t=f(s), k=1); while(t>s, k++; t=f(t)); if(s==t, k, 0)} ok(n)={n>1 && n==Follow(1, j->ceil(n/2) + (-1)^j*ceil((j-1)/2))} select(ok, [1..1000]) \\\\ Andrew Howroyd, Nov 11 2017 (PARI) ok(n)={n>1 && n%2==1 && isprime(2*n+1) && znorder(Mod(2, 2*n+1)) == if(n%4==3, n, 2*n)} select(ok, [1..1000]) \\\\ Andrew Howroyd, Nov 11 2017 CROSSREFS Cf. A054639, A163777, A163779, A163780, A294434, A294673. Sequence in context: A113488 A092917 A256220 * A328643 A160358 A319084 Adjacent sequences:  A163775 A163776 A163777 * A163779 A163780 A163781 KEYWORD nonn AUTHOR Peter R. J. Asveld, Aug 11 2009 EXTENSIONS a(33)-a(55) from Andrew Howroyd, Nov 11 2017 New name from Joerg Arndt, Mar 23 2018 STATUS approved\n\nLookup | Welcome | Wiki | Register | Music | Plot 2 | Demos | Index | Browse | More | WebCam\nContribute new seq. or comment | Format | Style Sheet | Transforms | Superseeker | Recent\nThe OEIS Community | Maintained by The OEIS Foundation Inc.\n\nLast modified August 12 17:17 EDT 2020. Contains 336439 sequences. (Running on oeis4.)" ]
[ null, "http://oeis.org/banner2021.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.66515356,"math_prob":0.94873077,"size":2885,"snap":"2020-34-2020-40","text_gpt3_token_len":1157,"char_repetition_ratio":0.10898993,"word_repetition_ratio":0.09368636,"special_character_ratio":0.4967071,"punctuation_ratio":0.24680851,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9862174,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-12T21:46:25Z\",\"WARC-Record-ID\":\"<urn:uuid:7cae849f-18be-4a0c-b781-742aa77a61b9>\",\"Content-Length\":\"21079\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:110bb15e-79bf-4db7-b829-e65722163548>\",\"WARC-Concurrent-To\":\"<urn:uuid:d2eb41f8-7123-4198-a362-bc58cb6b52ef>\",\"WARC-IP-Address\":\"104.239.138.29\",\"WARC-Target-URI\":\"http://oeis.org/A163778\",\"WARC-Payload-Digest\":\"sha1:VNNP4LEJ7Y6H6VAEZRNQP3MXF6OGPLO6\",\"WARC-Block-Digest\":\"sha1:SNHRNLORINQF2S2OMKDMNFVMHICIF2YR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738944.95_warc_CC-MAIN-20200812200445-20200812230445-00267.warc.gz\"}"}
https://www.readchemistry.com/2019/02/IR-spectroscopy-in-organic-compounds.html
[ "## Breaking News\n\n#### Infrared Spectroscopy\n\n** Infrared (IR) spectroscopy is a simple, rapid, and nondestructive instrumental technique that can give evidence for the presence of various functional groups. If you had a sample of unknown identity, among the first things you would do is obtain an infrared spectrum, along with determining its solubility in common solvents and its melting and/ or boiling point.\n\n** Infrared spectroscopy, as with all forms of spectroscopy, depends on the interaction of molecules or atoms with electromagnetic radiation.\n\n** Infrared radiation causes atoms and groups of atoms of organic compounds to vibrate with increased amplitude about the covalent bonds that connect them. (Infrared radiation is not of sufficient energy to excite electrons, as is the case when some molecules interact with visible, ultraviolet, or higher energy forms of light.)\n\n** Since the functional groups of organic molecules include specific arrangements of bonded atoms, absorption of IR radiation by an organic molecule will occur at specific frequencies characteristic of the types of bonds and atoms present in the specific functional groups of that molecule. These vibrations are quantized, and as they occur, the compounds absorb IR energy in particular regions of the IR portion of the spectrum.\n\n#### Fourier transform infrared (FTIR) spectrometer\n\n** The figure shows diagram of a Fourier transform infrared (FTIR) spectrometer.\n\n** FTIR spectrometers employ a Michelson interferometer, which splits the radiation beam from the IR source so that it reflects simultaneously from a moving mirror and a fixed mirror, leading to interference.\n\n** After the beams recombine, they pass through the sample to the detector and are recorded as a plot of time versus signal intensity, called an interferogram.\n\n** The overlapping wavelengths and the intensities of their respective absorptions are then converted to a spectrum by applying a mathematical operation called a Fourier transform.\n\n** The FTIR method eliminates the need to scan slowly over a range of wavelengths, as was the case with older types of instruments called dispersive IR spectrometers, and therefore FTIR spectra can be acquired very quickly.\n\n** The FTIR method also allows greater throughput of IR energy. The combination of these factors gives FTIR spectra strong signals as compared to background noise (i.e., a high signal to noise ratio) because radiation throughput is high and rapid scanning allows multiple spectra to be averaged in a short period of time. The result is enhancement of real signals and cancellation of random noise.\n\n** An infrared spectrometer (Fig. 1) operates by passing a beam of IR radiation through a sample and comparing the radiation transmitted through the sample with that transmitted in the absence of the sample. Any frequencies absorbed by the sample will be apparent by the difference. The spectrometer plots the results as a graph showing absorbance versus frequency or wavelength.\n\n#### Wavenumbers\n\n** The position of an absorption band (peak) in an IR spectrum is specified in units of wavenumbers (ῡ).\n\n** Wavenumbers are the reciprocal of wavelength when wavelength is expressed in centimeters (the unit is cm-1), and therefore give the number of wave cycles per centimeter. The larger the wavenumber, the higher is the frequency of the wave, and correspondingly the higher is the frequency of the bond absorption. IR absorptions are sometimes, though less commonly, reported in terms of wavelength (λ), in which case the units are micrometers (μm; old name micron, μ). Wavelength is the distance from crest to crest of a wave.\n\n** In their vibrations covalent bonds behave as if they were tiny springs connecting the atoms. When the atoms vibrate, they can do so only at certain frequencies, as if the bonds were “tuned.” Because of this, covalently bonded atoms have only particular vibrational energy levels; that is, the levels are quantized.\n\n** The excitation of a molecule from one vibrational energy level to another occurs only when the compound absorbs IR radiation of a particular energy, meaning a particular wavelength or frequency. Note that the energy (E ) of absorption is directly proportional to the frequency of radiation (ʋ) because ΔE = hʋ, and inversely proportional to the wavelength (λ) because c/λ and therefore ΔE = hc / λ\n\n** Molecules can vibrate in a variety of ways. Two atoms joined by a covalent bond can undergo a stretching vibration where the atoms move back and forth as if joined by a spring. Three atoms can also undergo a variety of stretching and bending vibrations.\n\n#### Characteristic Infrared Absorptions of Groups\n\n** The frequency of a given stretching vibration in an IR spectrum can be related to two factors. These are the masses of the bonded atoms—light atoms vibrate at higher frequencies than heavier ones—and the relative stiffness of the bond. (These factors are accounted for in Hooke’s law, a relationship you may study in introductory physics.) Triple bonds are stiffer (and vibrate at higher frequencies) than double bonds, and double bonds are stiffer (and vibrate at higher frequencies) than single bonds. We can see some of these effects in this Table:\n\n** Notice that stretching frequencies of groups involving hydrogen (a light atom) such as C-H, N-H, and O-H all occur at relatively high frequencies:\n\n** Notice, too, that triple bonds vibrate at higher frequencies than double bonds:\n\n** Not all molecular vibrations result in the absorption of IR energy. In order for a vibration to occur with the absorption of IR energy, the dipole moment of the molecule must change as the vibration occurs.\n\n** Thus, methane does not absorb IR energy for symmetric streching of the four C-H bonds; asymmetric stretching, on the other hand, does lead to an IR absorption.Symmetrical vibrations of the carbon–carbon double and triple bonds of ethene and ethyne do not result in the absorption of IR radiation, either\n\n### Solved problem\n\nThe infrared spectrum of l-hexyne shows a sharp absorption peak near 2100 cm-1 due to stretching of its triple bond. However, 3-hexyne shows no absorption in that region. Explain" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90911424,"math_prob":0.93052745,"size":7503,"snap":"2021-31-2021-39","text_gpt3_token_len":1626,"char_repetition_ratio":0.13401787,"word_repetition_ratio":0.021648627,"special_character_ratio":0.19099027,"punctuation_ratio":0.08582375,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.957968,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-23T23:49:48Z\",\"WARC-Record-ID\":\"<urn:uuid:3014b11a-5279-4e93-aa42-9efbea6db3ec>\",\"Content-Length\":\"315926\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6b966893-a2ba-44f9-b579-cd9ca3a5b825>\",\"WARC-Concurrent-To\":\"<urn:uuid:c7081492-f2d8-4e8b-ba9d-55f112b59610>\",\"WARC-IP-Address\":\"172.217.1.211\",\"WARC-Target-URI\":\"https://www.readchemistry.com/2019/02/IR-spectroscopy-in-organic-compounds.html\",\"WARC-Payload-Digest\":\"sha1:SWMHXMTGTB5GWQFBISRK4PBNM4IYF63E\",\"WARC-Block-Digest\":\"sha1:TF6GHK6G4YNIIZTGJULXJCSEC6BBJHG7\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057479.26_warc_CC-MAIN-20210923225758-20210924015758-00635.warc.gz\"}"}
https://www.lessonplanet.com/teachers/multiplying-decimals-and-mixed-numbers
[ "", null, "# Multiplying Decimals and Mixed Numbers\n\n##### This Multiplying Decimals and Mixed Numbers lesson plan also includes:\n\nStudents practice multiplying decimals and/or mixed numbers, explore the effects of multiplying decimals and mixed numbers, and practice predicting the effects of multiplying a number by a decimal or mixed number." ]
[ null, "data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.80119914,"math_prob":0.99237627,"size":2753,"snap":"2021-31-2021-39","text_gpt3_token_len":607,"char_repetition_ratio":0.13604948,"word_repetition_ratio":0.0046189376,"special_character_ratio":0.19723937,"punctuation_ratio":0.077283375,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.987845,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-27T23:29:31Z\",\"WARC-Record-ID\":\"<urn:uuid:0525b41c-be2e-4d71-bc0b-9f5e7b294e18>\",\"Content-Length\":\"101467\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8710822a-f82c-4592-9bbe-1155120724f7>\",\"WARC-Concurrent-To\":\"<urn:uuid:87677104-5829-4546-aa09-db4130c02a6c>\",\"WARC-IP-Address\":\"3.142.116.236\",\"WARC-Target-URI\":\"https://www.lessonplanet.com/teachers/multiplying-decimals-and-mixed-numbers\",\"WARC-Payload-Digest\":\"sha1:44CJQG5NRVD2MNR26ITCXZ4FAQPWQDP5\",\"WARC-Block-Digest\":\"sha1:YZJIB2U5MBJGJ7AIAIT4HEIL36R5MQCH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780058552.54_warc_CC-MAIN-20210927211955-20210928001955-00351.warc.gz\"}"}
https://docs.opencv.org/3.4.2/df/d0c/tutorial_py_fast.html
[ "", null, "OpenCV  3.4.2 Open Source Computer Vision\nFAST Algorithm for Corner Detection\n\n## Goal\n\nIn this chapter,\n\n• We will understand the basics of FAST algorithm\n• We will find corners using OpenCV functionalities for FAST algorithm.\n\n## Theory\n\nWe saw several feature detectors and many of them are really good. But when looking from a real-time application point of view, they are not fast enough. One best example would be SLAM (Simultaneous Localization and Mapping) mobile robot which have limited computational resources.\n\nAs a solution to this, FAST (Features from Accelerated Segment Test) algorithm was proposed by Edward Rosten and Tom Drummond in their paper \"Machine learning for high-speed corner detection\" in 2006 (Later revised it in 2010). A basic summary of the algorithm is presented below. Refer original paper for more details (All the images are taken from original paper).\n\n### Feature Detection using FAST\n\n1. Select a pixel $$p$$ in the image which is to be identified as an interest point or not. Let its intensity be $$I_p$$.\n2. Select appropriate threshold value $$t$$.\n3. Consider a circle of 16 pixels around the pixel under test. (See the image below)", null, "image\n4. Now the pixel $$p$$ is a corner if there exists a set of $$n$$ contiguous pixels in the circle (of 16 pixels) which are all brighter than $$I_p + t$$, or all darker than $$I_p − t$$. (Shown as white dash lines in the above image). $$n$$ was chosen to be 12.\n5. A high-speed test was proposed to exclude a large number of non-corners. This test examines only the four pixels at 1, 9, 5 and 13 (First 1 and 9 are tested if they are too brighter or darker. If so, then checks 5 and 13). If $$p$$ is a corner, then at least three of these must all be brighter than $$I_p + t$$ or darker than $$I_p − t$$. If neither of these is the case, then $$p$$ cannot be a corner. The full segment test criterion can then be applied to the passed candidates by examining all pixels in the circle. This detector in itself exhibits high performance, but there are several weaknesses:\n• It does not reject as many candidates for n < 12.\n• The choice of pixels is not optimal because its efficiency depends on ordering of the questions and distribution of corner appearances.\n• Results of high-speed tests are thrown away.\n• Multiple features are detected adjacent to one another.\n\nFirst 3 points are addressed with a machine learning approach. Last one is addressed using non-maximal suppression.\n\n### Machine Learning a Corner Detector\n\n1. Select a set of images for training (preferably from the target application domain)\n2. Run FAST algorithm in every images to find feature points.\n3. For every feature point, store the 16 pixels around it as a vector. Do it for all the images to get feature vector $$P$$.\n4. Each pixel (say $$x$$) in these 16 pixels can have one of the following three states:", null, "image\n5. Depending on these states, the feature vector $$P$$ is subdivided into 3 subsets, $$P_d$$, $$P_s$$, $$P_b$$.\n6. Define a new boolean variable, $$K_p$$, which is true if $$p$$ is a corner and false otherwise.\n7. Use the ID3 algorithm (decision tree classifier) to query each subset using the variable $$K_p$$ for the knowledge about the true class. It selects the $$x$$ which yields the most information about whether the candidate pixel is a corner, measured by the entropy of $$K_p$$.\n8. This is recursively applied to all the subsets until its entropy is zero.\n9. The decision tree so created is used for fast detection in other images.\n\n### Non-maximal Suppression\n\nDetecting multiple interest points in adjacent locations is another problem. It is solved by using Non-maximum Suppression.\n\n1. Compute a score function, $$V$$ for all the detected feature points. $$V$$ is the sum of absolute difference between $$p$$ and 16 surrounding pixels values.\n2. Consider two adjacent keypoints and compute their $$V$$ values.\n3. Discard the one with lower $$V$$ value.\n\n### Summary\n\nIt is several times faster than other existing corner detectors.\n\nBut it is not robust to high levels of noise. It is dependent on a threshold.\n\n## FAST Feature Detector in OpenCV\n\nIt is called as any other feature detector in OpenCV. If you want, you can specify the threshold, whether non-maximum suppression to be applied or not, the neighborhood to be used etc.\n\nFor the neighborhood, three flags are defined, cv.FAST_FEATURE_DETECTOR_TYPE_5_8, cv.FAST_FEATURE_DETECTOR_TYPE_7_12 and cv.FAST_FEATURE_DETECTOR_TYPE_9_16. Below is a simple code on how to detect and draw the FAST feature points.\n\nimport numpy as np\nimport cv2 as cv\nfrom matplotlib import pyplot as plt\n# Initiate FAST object with default values\nfast = cv.FastFeatureDetector_create()\n# find and draw the keypoints\nkp = fast.detect(img,None)\nimg2 = cv.drawKeypoints(img, kp, None, color=(255,0,0))\n# Print all default params\nprint( \"Threshold: {}\".format(fast.getThreshold()) )\nprint( \"nonmaxSuppression:{}\".format(fast.getNonmaxSuppression()) )\nprint( \"neighborhood: {}\".format(fast.getType()) )\nprint( \"Total Keypoints with nonmaxSuppression: {}\".format(len(kp)) )\ncv.imwrite('fast_true.png',img2)\n# Disable nonmaxSuppression\nfast.setNonmaxSuppression(0)\nkp = fast.detect(img,None)\nprint( \"Total Keypoints without nonmaxSuppression: {}\".format(len(kp)) )\nimg3 = cv.drawKeypoints(img, kp, None, color=(255,0,0))\ncv.imwrite('fast_false.png',img3)\n\nSee the results. First image shows FAST with nonmaxSuppression and second one without nonmaxSuppression:", null, "image" ]
[ null, "https://docs.opencv.org/3.4.2/opencv-logo-small.png", null, "https://docs.opencv.org/3.4.2/fast_speedtest.jpg", null, "https://docs.opencv.org/3.4.2/fast_eqns.jpg", null, "https://docs.opencv.org/3.4.2/fast_kp.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87486374,"math_prob":0.99317545,"size":5435,"snap":"2023-40-2023-50","text_gpt3_token_len":1277,"char_repetition_ratio":0.10329589,"word_repetition_ratio":0.0045454544,"special_character_ratio":0.24599816,"punctuation_ratio":0.11764706,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9956041,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-02T01:33:40Z\",\"WARC-Record-ID\":\"<urn:uuid:b0ac9f7b-00c4-4ac0-85e5-a4ec3bee675b>\",\"Content-Length\":\"14650\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:138cd8e0-bd04-4559-acfe-660d5c30e382>\",\"WARC-Concurrent-To\":\"<urn:uuid:999933de-637d-4987-9494-a2b289c51752>\",\"WARC-IP-Address\":\"64.91.246.43\",\"WARC-Target-URI\":\"https://docs.opencv.org/3.4.2/df/d0c/tutorial_py_fast.html\",\"WARC-Payload-Digest\":\"sha1:5M2ET53SU3YMDYRD2F3IZAJPJZBJPDGJ\",\"WARC-Block-Digest\":\"sha1:5V6LDLVZ5LVHXXV7Y2GSIOT37X2SFSVZ\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510942.97_warc_CC-MAIN-20231002001302-20231002031302-00374.warc.gz\"}"}
http://www.indiabix.com/aptitude/problems-on-hcf-and-lcm/
[ "# Aptitude - Problems on H.C.F and L.C.M\n\n## Why Aptitude Problems on H.C.F and L.C.M?\n\nIn this section you can learn and practice Aptitude Questions based on \"Problems on H.C.F and L.C.M\" and improve your skills in order to face the interview, competitive examination and various entrance test (CAT, GATE, GRE, MAT, Bank Exam, Railway Exam etc.) with full confidence.\n\n## Where can I get Aptitude Problems on H.C.F and L.C.M questions and answers with explanation?\n\nIndiaBIX provides you lots of fully solved Aptitude (Problems on H.C.F and L.C.M) questions and answers with Explanation. Solved examples with detailed answer description, explanation are given and it would be easy to understand. All students, freshers can download Aptitude Problems on H.C.F and L.C.M quiz questions with answers as PDF files and eBooks.\n\n## Where can I get Aptitude Problems on H.C.F and L.C.M Interview Questions and Answers (objective type, multiple choice)?\n\nHere you can find objective type Aptitude Problems on H.C.F and L.C.M questions and answers for interview and entrance examination. Multiple choice and true or false type questions are also provided.\n\n## How to solve Aptitude Problems on H.C.F and L.C.M problems?\n\nYou can easily solve all kind of Aptitude questions based on Problems on H.C.F and L.C.M by practicing the objective type exercises given below, also get shortcut methods to solve Aptitude Problems on H.C.F and L.C.M problems.\n\n### Exercise :: Problems on H.C.F and L.C.M - General Questions\n\n1.\n\nFind the greatest number that will divide 43, 91 and 183 so as to leave the same remainder in each case.\n\n A. 4 B. 7 C. 9 D. 13\n\nExplanation:\n\nRequired number = H.C.F. of (91 - 43), (183 - 91) and (183 - 43)\n\n= H.C.F. of 48, 92 and 140 = 4.\n\n2.\n\nThe H.C.F. of two numbers is 23 and the other two factors of their L.C.M. are 13 and 14. The larger of the two numbers is:\n\n A. 276 B. 299 C. 322 D. 345\n\nExplanation:\n\nClearly, the numbers are (23 x 13) and (23 x 14).", null, "Larger number = (23 x 14) = 322.\n\n3.\n\nSix bells commence tolling together and toll at intervals of 2, 4, 6, 8 10 and 12 seconds respectively. In 30 minutes, how many times do they toll together ?\n\n A. 4 B. 10 C. 15 D. 16\n\nExplanation:\n\nL.C.M. of 2, 4, 6, 8, 10, 12 is 120.\n\nSo, the bells will toll together after every 120 seconds(2 minutes).\n\n In 30 minutes, they will toll together 30 + 1 = 16 times. 2\n\n4.\n\nLet N be the greatest number that will divide 1305, 4665 and 6905, leaving the same remainder in each case. Then sum of the digits in N is:\n\n A. 4 B. 5 C. 6 D. 8\n\nExplanation:\n\nN = H.C.F. of (4665 - 1305), (6905 - 4665) and (6905 - 1305)\n\n= H.C.F. of 3360, 2240 and 5600 = 1120.\n\nSum of digits in N = ( 1 + 1 + 2 + 0 ) = 4\n\n5.\n\nThe greatest number of four digits which is divisible by 15, 25, 40 and 75 is:\n\n A. 9000 B. 9400 C. 9600 D. 9800\n\nExplanation:\n\nGreatest number of 4-digits is 9999.\n\nL.C.M. of 15, 25, 40 and 75 is 600.\n\nOn dividing 9999 by 600, the remainder is 399.", null, "Required number (9999 - 399) = 9600." ]
[ null, "http://www.indiabix.com/_files/images/aptitude/1-sym-tfr.gif", null, "http://www.indiabix.com/_files/images/aptitude/1-sym-tfr.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.78929347,"math_prob":0.9148939,"size":1542,"snap":"2021-43-2021-49","text_gpt3_token_len":531,"char_repetition_ratio":0.12808843,"word_repetition_ratio":0.082539685,"special_character_ratio":0.42801556,"punctuation_ratio":0.23325062,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99707586,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-08T09:51:04Z\",\"WARC-Record-ID\":\"<urn:uuid:dd6f68bd-1f54-4b48-b341-938056fa87ef>\",\"Content-Length\":\"35704\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7428b7a1-5ec6-41a0-8ffc-5a0d2b3bde80>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a4e2ec0-b19a-43ea-9325-5caa82e2cb0a>\",\"WARC-IP-Address\":\"35.244.11.196\",\"WARC-Target-URI\":\"http://www.indiabix.com/aptitude/problems-on-hcf-and-lcm/\",\"WARC-Payload-Digest\":\"sha1:FLFVOUHRL4Q6UUUCKMGCINETLTZFPA3R\",\"WARC-Block-Digest\":\"sha1:IZ2236TVLW4WE2HPILO7ZZROXEXUHE3Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363465.47_warc_CC-MAIN-20211208083545-20211208113545-00213.warc.gz\"}"}
https://forcoder.su/bayesian-analysis-python-introduction-2nd/
[ "# Bayesian Analysis with Python: Introduction to statistical modeling and probabilistic programming using PyMC3 and ArviZ, 2nd Edition", null, "Bayesian Analysis with Python: Introduction to statistical modeling and probabilistic programming using PyMC3 and ArviZ, 2nd Edition by Osvaldo Martin\nEnglish | 2018 | ISBN: 1789341652 | 356 Pages | True PDF, EPUB | 75 MB\n\nBayesian modeling with PyMC3 and exploratory analysis of Bayesian models with ArviZ\nThe second edition of Bayesian Analysis with Python is an introduction to the main concepts of applied Bayesian inference and its practical implementation in Python using PyMC3, a state-of-the-art probabilistic programming library, and ArviZ, a new library for exploratory analysis of Bayesian models.\nThe main concepts of Bayesian statistics are covered using a practical and computational approach. Synthetic and real data sets are used to introduce several types of models, such as generalized linear models for regression and classification, mixture models, hierarchical models, and Gaussian processes, among others.\nBy the end of the book, you will have a working knowledge of probabilistic modeling and you will be able to design and implement Bayesian models for your own data science problems. After reading the book you will be better prepared to delve into more advanced material or specialized statistical modeling if you need to.\nWhat you will learn\n\n• Build probabilistic models using the Python library PyMC3\n• Analyze probabilistic models with the help of ArviZ\n• Acquire the skills required to sanity check models and modify them if necessary\n• Understand the advantages and caveats of hierarchical models\n• Find out how different models can be used to answer different data analysis questions\n• Compare models and choose between alternative ones\n• Discover how different models are unified from a probabilistic perspective\n• Think probabilistically and benefit from the flexibility of the Bayesian framework" ]
[ null, "https://forcoder.su/wp-content/cover/bayesian-analysis-python-introduction-2nd.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8789411,"math_prob":0.82432234,"size":1719,"snap":"2020-10-2020-16","text_gpt3_token_len":334,"char_repetition_ratio":0.14635569,"word_repetition_ratio":0.0,"special_character_ratio":0.18789995,"punctuation_ratio":0.061594203,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9931862,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-21T04:16:59Z\",\"WARC-Record-ID\":\"<urn:uuid:11ca54d6-1861-4f81-b50e-62cc7b951e77>\",\"Content-Length\":\"36813\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a8cbbd46-1ad0-43f5-9027-61accfc3079a>\",\"WARC-Concurrent-To\":\"<urn:uuid:51f33e70-2b46-4d82-91d1-9609579576b7>\",\"WARC-IP-Address\":\"104.18.61.39\",\"WARC-Target-URI\":\"https://forcoder.su/bayesian-analysis-python-introduction-2nd/\",\"WARC-Payload-Digest\":\"sha1:RSVX6PUSQIKYBOSUOT7ZFGMSD3MX3THR\",\"WARC-Block-Digest\":\"sha1:XFM2OXAQDS4MMMIUO4SCEJPMGA4TSNCW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145438.12_warc_CC-MAIN-20200221014826-20200221044826-00038.warc.gz\"}"}
http://forums.wolfram.com/mathgroup/archive/1995/Oct/msg00376.html
[ "", null, "", null, "", null, "", null, "", null, "", null, "", null, "Re: Simplifying vector expressions\n\n• Subject: [mg2168] Re: [mg2140] Simplifying vector expressions\n• From: danl (Daniel Lichtblau)\n• Date: Wed, 11 Oct 1995 05:59:13 GMT\n• Approved: [email protected]\n• Distribution: local\n• Newsgroups: wri.mathgroup\n• Organization: Wolfram Research, Inc.\n• Sender: daemon at wri.com ( )\n\n```\nThe difficulty lies in the fact that Times is Listable.\n\nIn:= vec1 = { a, b, c }\nOut= {a, b, c}\n\nIn:= vec2 = (1/x) * vec1 // InputForm\nOut//InputForm= {a/x, b/x, c/x}\n\nIn:= ClearAttributes[Times, Listable]\n\nIn:= vec3 = (1/x) * vec1 // InputForm\nOut//InputForm= {a, b, c}/x\n\nYou can change this as above, but if you do not change it back prior\nto invoking any internal functions that rely on this property, be\nprepared for strange results. In particular, I'dn ot be surprised if\nSimplify got flaky, and it is not clear to me how Expand could work\nif one argument involved a List.\nA tactic that might serve your purposes is to (i) use Factor et al\nas they are (that is, with Times left as Listable), (ii) find out the\nPolynomialGCD of all elements in your list, (iii) divide through by\nthat gcd to remove it from each element (might need to apply Together\nto get the job done completely), and (iv) make Times nonListable as\nabove, and now multiply through by that gcd to restore it. Note that\nthis will pull out factors in numerators as well as denominators,\nwhich may or may not be what you want.\n\nDaniel Lichtblau\nWRI\ndanl at wri.com\n\nBegin forwarded message:\n\n>Date: Wed, 4 Oct 1995 01:57:42 -0400\n>From: shenkin at still3.chem.columbia.edu (Peter Shenkin)\n>Subject: [mg2140] Simplifying vector expressions\n>Organization: MacroModel Development Group, Chemistry, Columbia U.,\n>NY, NY\n\nConsider the following vectors:\n\nIn:= vec1 = { a, b, c }\n\nOut= {a, b, c}\n\nIn:= vec2 = (1/x) * vec1\n\na b c\nOut= {-, -, -}\nx x x\n\nI am looking for a mechanism I can apply to vec2 to put it in the\nform:\n\n1\n(-) { a, b, c }\nx\n\nor\n\n{ a, b, c }\n-----------\nx\n\nThis would be the list equivalent of Factor[], as shown by the\n\nfollowing example:\n\nIn:= expr = a/x + b/x + c/x\n\na b c\nOut= - + - + -\nx x x\n\nIn:= Factor[ expr ]\n\na + b + c\nOut= ---------\nx\n\nDoes this facility (for lists) exist in Mathematica, or in a package\nI can obtain easily? If not, can you suggest guidelines for implementing\nof algebraic functionality: Simplify[], Expand[], etc., in addition\nto Factor[].\n\nThanks,\n-P.\n\n--\n\n******** When somebody says, \"It's a matter of principle,\"...\n********\n*Peter S. Shenkin, Box 768 Havemeyer Hall, Chemistry, Columbia\nUniv.,*\n*NY, NY 10027; shenkin at columbia.edu; (212)854-5143; FAX:\n678-9039*\n************ ...it's a sure sign he wants the whole pie.\n*************\n\n```\n\n• Prev by Date: Re: A simple swap function\n• Next by Date: Comparison of overlapping numbers\n• Previous by thread: Simplifying vector expressions\n• Next by thread: Re: Simplifying vector expressions" ]
[ null, "http://forums.wolfram.com/mathgroup/images/head_mathgroup.gif", null, "http://forums.wolfram.com/mathgroup/images/head_archive.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/1.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/9.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/9.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/5.gif", null, "http://forums.wolfram.com/mathgroup/images/search_archive.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8259493,"math_prob":0.8934587,"size":2755,"snap":"2020-34-2020-40","text_gpt3_token_len":809,"char_repetition_ratio":0.090512544,"word_repetition_ratio":0.033333335,"special_character_ratio":0.338657,"punctuation_ratio":0.19392918,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9801218,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-04T23:48:05Z\",\"WARC-Record-ID\":\"<urn:uuid:258cef30-6551-42d8-a033-1b8ad37ca2bf>\",\"Content-Length\":\"46225\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8cba7f9f-ce1e-4a85-9378-4aaa60ae8fb0>\",\"WARC-Concurrent-To\":\"<urn:uuid:eab256b6-b21c-4b18-90b7-5f556d2e248c>\",\"WARC-IP-Address\":\"140.177.205.73\",\"WARC-Target-URI\":\"http://forums.wolfram.com/mathgroup/archive/1995/Oct/msg00376.html\",\"WARC-Payload-Digest\":\"sha1:67PZC3J46AVJV2STYWZW4ZQVXRYHQU2T\",\"WARC-Block-Digest\":\"sha1:CDYTCEYTC3WWBYXMYKYH4PPGN7E4WUYM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439735885.72_warc_CC-MAIN-20200804220455-20200805010455-00438.warc.gz\"}"}
http://bnyy.milanoporteeserramenti.it/logic-gates-questions-and-answers-pdf.html
[ "# Logic Gates Questions And Answers Pdf\n\n9 BOOLEAN ANALYSIS OF LOGIC CIRCUITS 80 2. HTML MCQ Question with Answer. For the electronics circuits and signals a logic 1 will represent closed switch, a high voltage, or an “on” lamp, and a logic 0 will represent an open switch, low voltage, or an “off” lamp. Research the part numbers and datasheets of the following logic gate integrated. It has syntax and semantics. Question 12 Suppose you needed a two-input AND gate, but happened to have an unused 3-input AND gate in one of the integrated circuits (\"chips\") already in the system you were building. Philosopher(a) Scholar(a) • x, King(x) Greedy (x) Evil (x) –Variables range over individuals (domain of discourse) •Second order logic. common logic gate. I am electrical engineering, so I was asked questions about SoC architecture, how microprocessors work, semiconductor physics, about past experiences, and the brain teasers included questions to see how you approached tricky questions. If you don’t know the answer to a question, make a guess or come back to it later. The sheet presents a series of activities which focus on the AND, OR, and NOT gates. These are useful, even necessary, in some digital circuit applications. Build a register file out of (already built) registers, mutiplexers, decoders, and logic gates. Susan receives $40,000. Write two characteristics of combinational circuits. In this section you can learn and practice logic puzzles, number puzzles, word puzzles, math puzzles etc. We can classify these Logic gates into the following three categories. Please be ready to send us a copy of CAASPP, i-ready, CTY, Math Kangaroo, AMC8 scores upon request. GATE CSE, ECE, EE, ME, Civil PAst years Question with solutions, GATE Computer Science, GATE Electrical Engineering, GATE Electronics and Communication Engineering, GATE Mechanical Engineering, GATE Civil Engineering All Previous Years GATE Exams Questions and Answers with Well Organized GATE Subject/Topic and Chapterwise. Logic Gates Questions And Answers Logic Gates Questions and Answers. The output of the 74 series GATE of TTL gates is taken from a BJT in a. That is, find the four outputs for all possible input conditions. This resource includes a PowerPoint presentation that teaches about logic gates, with a worksheet designed to be used on the computers, and an online link to practically find out about logic gates. Tech, BE, ME students an interview for various positions like. Boolean Algebra specifies the relationship between Boolean variables which is used to design combinational logic circuits using Logic Gates. 13) [EASY] MOSFET – Multiple Choice Questions –Download here. The two characteristics of combinational circuits are: Cus Search powered by Engineering Interview Questions. Use a truth table to show that X = (X AND Y) OR (X AND NOT Y). These are useful, even necessary, in some digital circuit applications. Solved examples with detailed answer description, explanation are given and it would be easy to understand. Mention any one web browser. The person who has the dice and knows the game, rolls five dice and remarks almost instantly on the answer. You can see the explanation for the questions of sensation and a good user interface. Using Boolean algebra, rewrite the simplified SOP expression to use only 2-input AND and OR gates, and NOT gates (NOT gates are also known as inverters) 4. They can also be told the answer for every throw of the dice that are used in the game. For the electronics circuits and signals a logic 1 will represent closed switch, a high voltage, or an “on” lamp, and a logic 0 will represent an open switch, low voltage, or an “off” lamp. The full forms of the abbreviations TTL and CMOS in reference to logic families are a. Section 1: Logic Gates (Introduction) 3 1. Logic gates using the programmable logic controller (PLC) is the basic thing you must learn if you want to enhance your Electrical and Electronics skills. The answer is C. Digital Logic – Application and Design – John M. Answer: Logic Regression can be defined as: This is a statistical method of examining a dataset having one or more variables that are independent defining an outcome. Get Free Logic Gates Questions And Answers Objective Typethe book as a Kindle file (. Analysis and Synthesis of Synchronous Sequential Circuits. Exam Category: GATE Overflow Tests should give @arjun sir please make a separate tab for test @hareesh22 ya I have received the order Math had contained more than 13 marks few years @Mellophi Yeah both books are great and if. First four problems are basic in nature. This document is intended for guidance only. It has one output and one or more inputs. 2 NOR Gate as a Universal Gate 77 2. A NAND gate is in fact a NOT-AND gate. (iv) Underline the names of the two logic gates that should be used inside the control box. 9 BOOLEAN ANALYSIS OF LOGIC CIRCUITS 80 2. The combinational circuit has no memory element. Learn basic electronics Multiple Choice Questions and Answers (MCQs), \"uses of logic gates\" quiz questions and answers for online degree programs. Please note that all the relevant information about the GATE 2021 is available only at the official web site https://gate. The sheet presents a series of activities which focus on the AND, OR, and NOT gates. Making statements based on opinion; back them up with references or personal experience. It also includes a double sided homework sheet. • This is called Boolean logic • In a circuit schematic each logic gate is represented by a different picture, like the ones shown below. Questions (80) Explanation was long and question became somewhat rhetorical. This tests the basics of mathematical logic, and in particular logical connectives (implication, negation, etc. It must be a NAND gate 43) The value of total collector current in a CB circuit is Ic = αααα IE. All cats like fish. If output of a logic circuit should remain constant at High Voltage level (1) but it goes low then we say static1 hazard exist. Logic Gates ,Semiconductor Electronics - Get topics notes, Online test, Video lectures, Doubts and Solutions for CBSE Class 12-science on TopperLearning. Activity Draw each of the diagrams from earlier using the correct symbols Design your own logic gates and create questions for others in the class to attempt. , experimental or observational) science like physics, biology, or psychology. For the same clock situation, if the R input is at high level (logic 1) and S input is at low level (logic 0), then the SR flip – flop is said to be in RESET state and the output of the SR flip – flop is RESET to 0. We are not yet accepting applications for the Fall. Logic Gates (Introduction) The package Truth Tables and Boolean Algebra set out the basic principles of logic. 15) MOSFET & IC Basics – GATE Problems (Part – II) – Download MCQs from here. Explore the latest questions and answers in Mathematical Logic, and find Mathematical Logic experts. Answer the easy questions first, give each question a full effort, come back later to tackle more challenging questions, and when just a few minutes are remaining fill in any unanswered questions. Download Free NNPC Past Questions and Answers 2019/2020 PDF and how to pass NNPC Aptitude Test 2019. We can classify these Logic gates into the following three categories. Making statements based on opinion; back them up with references or personal experience. (a) Complete the truth tables for the two gates. There are 7 types of logic gates which are: AND gate, OR gate, XOR gate, NAND gate, NOR gate, XNOR gate and NOT gate. Name : _____ Summer 2012 P11 (Q12) (a) (i) Complete the truth table for the following logic circuit, which is made up of NAND gates: Computer-2210 (Bit Pattern) (8) abdul. What is a logic. What logic question can save the gringo's life? You probably remember the answer from the very first problem on this page, don't you :-). com GCSE PHYSICS ELECTRONIC CONTROL High Demand Questions QUESTIONSHEET 8 It is compulsory to wear seat belts when a car is moving. ” One way to view the logical conditional is to think of an obligation or contract. The logic diagrams for the full adder implemented in sum-of-products form are the following: It can also be implemented using two half adders and one OR gate (using XOR gates). Inference rules describe correct. We will suggest you adopt this strategy: Collect the meticulous study material from our website; Get acquainted with the quality content. ' Bill gates laughs again and says, 'OK, how about my daughter's name \"Jennifer Katharine gates\". The binary world of 1s and 0s alone doesn’t allow us to re-land rockets in the middle of the ocean, or deliver packages within minutes through the use of drones, or map the known physical universe and all of its wonders. What is the technical reason for the reduction to. pdf file size 205KB 15 Overview of Sensors & Actuators w/quest. Can you build a device that, logically, behaves like an or gate from only and and not gates? If so, do so (just for the case where and and or gates have only two inputs). This page is all about reasoning, reasoning question and answer, reasoning question and answer in Hindi, reasoning question and answer in English, reasoning question and answer in pdf, reasoning question and answer pdf download, reasoning online test, reasoning question and answer with solution, reasoning question and. Draw the entire ALU, adding the fewest possible gates. Each gate implements a Boolean operation, and is depicted schematically by a shape indicating the operation. Questions (80) Explanation was long and question became somewhat rhetorical. We hope the given Karnataka 2nd PUC Class 12 Computer Science Question Bank with Answers Solutions, Notes, Guide Pdf Free Download of 2nd PUC Computer Science Textbook Questions and Answers, Model Question Papers with Answers, Study Material 2020-2021 in English Medium and Kannada Medium will help you. Design different types of logic gates using CMOS inverter and analyze their transfer characteristics. Learn basic electronics Multiple Choice Questions and Answers (MCQs), \"uses of logic gates\" quiz questions and answers for online degree programs. Introduction. Define sorting. See full list on examsdaily. Table 4-1 Basic rules of Boolean algebra. So that is where I needed to start: create relay logic gates of my design. Use the available op code 11 to select the XOR operation. Question 5 Boolean algebra is a strange sort of math. logic design aim: to design digital systems using the rules of boolean algebra (floyd 4-5/4-6). It's okay to guess Since your score will not be negatively affected by getting questions wrong, be sure to answer, or guess, on each question. Make sure you understand how many questions you will have to answer and how long you have to complete the test. Many logic problems try to distract you or lead you down the wrong path. MathJax reference. One half adder and three full adder. Provide details and share your research! But avoid … Asking for help, clarification, or responding to other answers. Introduction. Sir please prepare different numbers of objective questions on diploma base competive exams only. Given here are 100 Question of Computer Basic Skills Info Practice Quiz Online Test with Answers of important questions for various General Knowledge exams and interviews preparation. 2 Remember to take your time here to fully understand the statement. pdf file size 287KB. for programmable logic controllers, many worked examples, multi-choice questions and problems are included in the book with answers to all multi-choice questions and problems given at the end of the book. we no need btech level objective based on gate level is depth in concept. Roth, Thomson Publications, 5th Edition, 2004. A are about Top 50 Networking Questions & Internet Questions to help you increase your GK for better preparations. Write any one application of computer network. (8pt) For the following circuit, complete the truth table. Explain what are the universal logic gates? Universal gate is a gate that can perform all the basic logical operations such as NAND and NOR gates. In this electrical worksheet, students answer a series of 27 open-ended questions about logic circuits. 8) What is a Logic gate? The basic gates that make up the digital system are called a logic gate. Answer: There are 3 ways to connect assertion to RTL: inline, Instantiation and Virtual Instantiation (bind). Research the part numbers and datasheets of the following logic gate integrated. Questions and answers - MCQ with explanation on Computer Science subjects like System Architecture, Introduction to Management, Math For Computer Science, DBMS, C Programming, System Analysis and Design, Data Structure and Algorithm Analysis, OOP and Java, Client Server Application Development, Data Communication and Computer Networks, OS, MIS, Software Engineering, AI, Web Technology and many. MathJax reference. Aptitude Set-2: Questions Solutions. We are not yet accepting applications for the Fall. What logic question can save the gringo's life? You probably remember the answer from the very first problem on this page, don't you :-). Programmable Logic Controller (PLC) Questions and Answers – 21. Answer: There are 3 ways to connect assertion to RTL: inline, Instantiation and Virtual Instantiation (bind). All the switches only pass signals from source to drain, incorrect wiring of the devices will result in high impedance outputs. Digital Electronics Interview Questions & Answer 2020 PDF. The simplest logic gate technically isn’t really a gate at all though some refer to it as a NOT gate. More than one answer bubbled against a question will be treated as a wrong answer. old answer completely. There was a mixture of technical Questions, behavioral questions, and brain teasers. In this electrical worksheet, students answer a series of 27 open-ended questions about logic circuits. Make sure you understand how many questions you will have to answer and how long you have to complete the test. Digital Electronics Interview Questions (Basic / Advanced) Ques11: What is a Logic gate? Ans: The basic gates that make up the digital system are called a logic gate. 111 + 111 = 3. Research the part numbers and datasheets of the following logic gate integrated circuits: Triple 3-input NOR gate Dual 4-input AND gate Single 8-input NAND gate. 1 to 9 are based on the logic gates like AND, OR, NOT, NAND & NOR etc. The term was coined by education researcher Mary Budd Rowe in her journal article, \"Wait-time and Rewards as Instructional Variables, Their Influence in Language, Logic, and Fate Control. Answer any five questions. Preparing for different types of interview questions ahead of time will help you stay calm and answer each question with precision. Rather, logic is a non-empirical science like mathematics. \" She noted that on average, teachers paused only one-and-a-half seconds after asking a question; some waited only a tenth of a second. Download PDF Free download in PDF Software Engineering Objective Type Questions and Answers or Software Engineering mcq from chapter Software Engineeing Fundamentals. All cheat sheets, round-ups, quick reference cards, quick reference guides and quick reference sheets in one page. Digital logic multiple choice questions answers can also be used by any candidate who wants to gain credits in digital logic in BS or MS computer science, Digital electronics multiple choice questions with answers can also be used by student who is pursuing degree/diploma in information technology like BSc or MSc in Information Technology or. Programmable Logic Controller (PLC) Questions and Answers – 23. Truth Tables Another way of working out the output from a logic diagram without having to construct the circuit is by using a truth table A truth table create a map of all of the. Please fill in your answer on the answer sheet provided. Let's start with an easy one - answer this. It has appeared in the volume The Examined Life: Readings from Western Philosophy from Plato to Kant, edited by Stanley Rosen, published in 2000 by Random House. Draw a logic. Click here for Webct. UPSC IAS Prelims Answer Key 2019: Here is the answer key of the UPSC Preliminary Exam 2019 GS Paper 1 with explanations. What is a record? 7. Analysis and Synthesis of Synchronous Sequential Circuits. These describe the only two states that exist in digital logic systems and will be used to represent the in and out conditions of logic gates. Electric Circuits GATE (Graduate Aptitude Test in Engineering) Entrance exams EE Electrical Engineering Electric Circuits GATE Exam EE Electrical Engineering - Objective type Online Test Questions and Answers with Solution, Explanation, Solved Problems. Sir please prepare different numbers of objective questions on diploma base competive exams only. 41) When an input electrical signal A = 10100 is applied to a NOT gate, its output signal is 01011 42) In a certain 2 – input logic gate, when A = 0, B= 0 then C = 1 and when A = 0, B = 1 then again C = 1. The Critical Thinking Company publishes PreK-12+ books and software to develop critical thinking in core subject areas. This is the seventh lesson in the 'How a Computer Works' topic. we no need btech level objective based on gate level is depth in concept. In this section you can learn and practice logic puzzles, number puzzles, word puzzles, math puzzles etc. (ii) What single logic gate has the same function as the above logic circuit?. What is a logic. More than one answer bubbled against a question will be treated as a wrong answer. The Karnaugh Map Provides a method for simplifying Boolean expressions It will produce the simplest SOP and POS expressions Works best for less than 6 variables Similar to a truth table => it maps all possibilities A Karnaugh map is an array of cells arranged in a special manner The number of cells is 2n where n = number of variables A 3-Variable Karnaugh Map:. Question 3. – If too much static electricity builds up on the gate, then the MOSFET may be damaged. Tech, BE, ME students an interview for various positions like. Preparing for different types of interview questions ahead of time will help you stay calm and answer each question with precision. Difference between combinational and sequential circuits, A combinational logic circuit is a digital logic circuit wherein the output is capable of being determined with the help of logic functions related to the current state inputs. pdf file size 42KB 14 Computers / Logic Gates with questions. 90 to get the final answer. Boolean logic represents all values as TRUE (1) or FALSE (0). Mention any one web browser. examples with detailed response description, explanation is given and it would be easy to understand. The circuit that can operate on many binary inputs to perform a particular logic function is called an electronic circuit. Go through our link having the previous year solved papers and get benefited. Also, in saying that logic is the science of reasoning, we do not mean. General science 100 Important Questions and Answers. Combinational Circuit Design with Programmable Logic Devices. i) Construct a BCD to Excess -3 code converter using full adders (8) ii) Design an 8421 to gray code converter. You can choose to pay for your order via PayPal, debit/credit cards or net banking. Here you will find a list of common important questions on html programming in MCQ quiz style with answer for competitive exams and interviews. Download Free NNPC Past Questions and Answers 2019/2020 PDF and how to pass NNPC Aptitude Test 2019. These Computer Organisation objective questions answers for online exam preparations include Flip-flop, logic gate etc. What do you think if we exercise the mind for a while with logic riddles? Test your common sense with witty logical questions with answers. with logic gates. Problems 3 & 4 are based on word statement. 8 ALTERNATE LOGIC-GATE REPRESENTATIONS 79 2. Digital logic design study guide with questions and answers about algorithmic state machine, asynchronous sequential logic, binary systems, Boolean algebra and logic gates, combinational logic, digital integrated circuits, MSI and PID components, registers counters and memory units, Boolean functions, standard graphic symbols, synchronous. Logic gates have one or two inputs that can be turned on or off, the output from the gate will vary depending on the type of logic gate. Following the completion of the payment, you will get an email or text that will confirm your order. Make sure you understand how many questions you will have to answer and how long you have to complete the test. What type of logic gate does this symbol represent. Source: Online GATE Exam Mock Test provided by IITM Aptitude Set-1: Questions Solutions. common logic gate. 1 to 9 are based on the logic gates like AND, OR, NOT, NAND & NOR etc. Programmable Logic Controller (PLC) Questions and Answers – 21. (8pt) For the following circuit, complete the truth table. Explain what is the specialty of NAND and NOR gates?. Question 5 Boolean algebra is a strange sort of math. You can also find ManyBooks' free eBooks from the genres page or recommended category. For example:. The output of the 74 series GATE of TTL gates is taken from a BJT in a. Proofs in predicate logic can be carried out in a manner similar to proofs in propositional logic (Sections 14. Please do not believe in the phishing/fake emails which are being circulated saying that IIT Madras faculty team have specially designed tests for the GATE aspirants. Questions 71 through 73 is one set of common data questions, questions 74 and 75 is another pair of common data questions. Use compile option for synthesis. Some manufacturers put an alarm into the car to remind people to fasten their seat belts. The questions asked in this NET practice paper are from various previous year papers. CE/CZ1105 Digital Logic Tutorial 2 Logic gates and Boolean algebra 1. answers to these questions and the reasoning behind the answers. examples with detailed response description, explanation is given and it would be easy to understand. Power Systems GATE (Graduate Aptitude Test in Engineering) Entrance exams EE Electrical Engineering Power Systems GATE Exam EE Electrical Engineering - Objective type Online Test Questions and Answers with Solution, Explanation, Solved Problems. ) and quantifiers. Questions and answers - MCQ with explanation on Computer Science subjects like System Architecture, Introduction to Management, Math For Computer Science, DBMS, C Programming, System Analysis and Design, Data Structure and Algorithm Analysis, OOP and Java, Client Server Application Development, Data Communication and Computer Networks, OS, MIS, Software Engineering, AI, Web Technology and many. Logical reasoning generally does not require verbal or numerical reasoning although variations exist that do. Q: Why is the VGS rating of Trench 6 automotive logic level MOSFETs limited to 10 V and can it be increased beyond 10 V? A: The VGS rating of 10 V given to Trench 6 logic level MOSFETs is driven by our <1 ppm failure. Earlier students use to consider few options after cracking gate exam such as scientist or a professor but nowadays the scenario has changed and scope has widen up. Digital logic is the application of the Boolean algebra of 0 and 1 to electronic hardware consisting of logic gates connected to form a circuit diagram. 10x01=10 1. Problems 3 & 4 are based on word statement. implement the logic diagram using electronic circuitry. write the truth table 3. Logic Gates Questions and Answers. Also, explain how an understanding of this can be helpful in troubleshooting faulted logic gates. (a) Complete the truth tables for the two gates. This GATE exam includes questions from previous year GATE papers. Note that it is not necessary to fill out the entire table of values at all possible locations in the table, but this is the best way to solve this problem. Our assignment help experts start. The binary world of 1s and 0s alone doesn’t allow us to re-land rockets in the middle of the ocean, or deliver packages within minutes through the use of drones, or map the known physical universe and all of its wonders. In this lesson, we will further look at the different types of basic logic gates with their truth table and understand what each one is designed for. Logic riddles and question with answers. 100+ Logical Reasoning Questions & Answers PDF Download Now Part 1. Both ways you will get the liar’s answer, so the opposite of it is the truth speaking person’s answer and hence the door to heaven. These puzzles are designed to test with Numerical ability, Logical thinking, Maths problem solving with sp. com has created Karnataka 2nd PUC Computer Science Question Bank with Answers Solutions, Notes, Guide Pdf Free Download of 2nd PUC Computer Science Textbook Questions and Answers, Model Question Papers with Answers, Study Material 2020-21 in English Medium and Kannada Medium are part of 2nd PUC Question Bank with Answers. In order to make a 4-bit parallel adder minimum circuitry required is_____? Ans. examples with detailed response description, explanation is given and it would be easy to understand. They construct a circuit board to help explain logic circuits. Puzzles Questions and Answers with explanation for placement, interview preparations. The two characteristics of combinational circuits are: Cus Search powered by Engineering Interview Questions. Valid logic is when the structure of logic is correct in the way of syntax and semantics rather than truth. Provide details and share your research! But avoid … Asking for help, clarification, or responding to other answers. These frequently asked sample questions on HTML are given with correct choice of answer that you can check instantly. In order to understand the theoretical basics you need to know five basic definitions. Logic Gates Questions And Answers Recognizing the artifice ways to acquire this book logic gates questions and answers is additionally useful. Predicate logic formulas without quantifiers can be verified using derivation. Jurisich, S. Modular Sequential Logic. Set theory (12 questions). Questions and answers - MCQ with explanation on Computer Science subjects like System Architecture, Introduction to Management, Math For Computer Science, DBMS, C Programming, System Analysis and Design, Data Structure and Algorithm Analysis, OOP and Java, Client Server Application Development, Data Communication and Computer Networks, OS, MIS, Software Engineering, AI, Web Technology and many. The SR flip – flops can be designed by using logic gates like NOR gates and NAND gates. 3 rd grade students have 30 minutes to answer the 48 multiple choice questions on the NNAT. We will suggest you adopt this strategy: Collect the meticulous study material from our website; Get acquainted with the quality content. An inverter is a logic gate whose output is the inverse or complement of its input. For example: // A synchronous D Flip-Flop moduledff (input logic [7:0] D, input RST_, input CLK, output logic [7:0] Q); always. it takes it takes. In the practice of electronics, a logic gate is a device which carries out a logical operation on a certain number of binary inputs and produces just one binary output. A logic gate. Question 2 What does ‘Boolean logic’ mean? Boolean logic describes the states of the inputs and outputs to the logic gates. Programmable Logic Controller (PLC) Questions and Answers – 20. These puzzles are designed to test with Numerical ability, Logical thinking, Maths problem solving with sp. The Following Section consists Multiple Choice Questions on Logic Gates. 0201 Fall 2009 ANSWERS Digital Logic Read: Sections 3. logic design aim: to design digital systems using the rules of boolean algebra (floyd 4-5/4-6). In simple terms, logic gates are the electronic circuits in a digital system. and transistors. Then, most of them are unsolved. pdf file size 42KB 14 Computers / Logic Gates with questions. Definition 4. This page contains Digital Electronics tutorial, Combinational logic, Sequential logic, Kmaps, digital numbering system, logic gate truth tables, TTL and CMOS circuits. For the electronics circuits and signals a logic 1 will represent closed switch, a high voltage, or an “on” lamp, and a logic 0 will represent an open switch, low voltage, or an “off” lamp. Brain teaser puzzles and riddles with answers for your interviews and entrance tests. If so, this section of Logic Puzzles and Riddles has been framed by us just for the people like you. Problems 5 to 9 are on Universal gates. P inputs P X X Q 1 NOT AND (b) The Fig. Also, in saying that logic is the science of reasoning, we do not mean. The past question and answers contained in this update is a detailed compilation of all NNPC aptitude questions written in the past by applicants who were applying for various positions. It's okay to guess Since your score will not be negatively affected by getting questions wrong, be sure to answer, or guess, on each question. View Tut 2 questions. The OLSAT is a test for children that measures abstract thinking and reasoning ability. Explain what is a combinational circuit? In a combinational circuit, the output depends upon present input(s) only i. is a series of transistors connected together to give one or more. Aptitude Practice Paper designed by GATECounsellor TEAM Aptitude Set-1: Questions Solutions. Answer the easy questions first, give each question a full effort, come back later to tackle more challenging questions, and when just a few minutes are remaining fill in any unanswered questions. - Use the truth tables method to determine whether the formula ’: p^:q!p^q is a logical consequence of the formula : :p. These are very important Networking Questions and Answers + Internet GK for competitive exams preparation. com GCSE PHYSICS ELECTRONIC CONTROL High Demand Questions QUESTIONSHEET 8 It is compulsory to wear seat belts when a car is moving. Download and play for free our printable logic grid puzzles (PDF). These describe the only two states that exist in digital logic systems and will be used to represent the in and out conditions of logic gates. Output signal appears only for certain combinations of input signals. GATE Previous year question papers for electronics and communication engineering is very hard to arrange. \" She noted that on average, teachers paused only one-and-a-half seconds after asking a question; some waited only a tenth of a second. 111 + 111 = 3. Solved examples with detailed answer description, explanation are given and it would be easy to understand. Hence, the Logic gates are the building blocks of any digital system. \"Digital Logic Design Multiple Choice Questions and Answers (MCQs)\" pdf to download is a revision guide with a collection of trivia quiz questions and answers pdf on topics: Algorithmic state machine, asynchronous sequential logic, binary systems, Boolean algebra and logic gates, combinational logics, digital integrated circuits, DLD. Use the correct symbols for the logic gates. LOGIC GATES Online Test - Questions and Answers,online quiz,online bits,viva,multiple choice,objective type pdf free download. Exam Questions - Logic Gates. It is intended for the general reader. And that's all the information they get. A logic system has 5 inputs. 3-6 Implementation of the given Boolean function using logic gates in both sop and pos forms. • A metal oxide insulator is placed @ the gate to obtain a high input impedance @ the gate – gate input impedance approx. Digital logic design study guide with questions and answers about algorithmic state machine, asynchronous sequential logic, binary systems, Boolean algebra and logic gates, combinational logic, digital integrated circuits, MSI and PID components, registers counters and memory units, Boolean functions, standard graphic symbols, synchronous. Operational Amplifiers Questions & Answers Electronics Q & A 1. Aptitude Set-2: Questions Solutions. CE/CZ1105 Digital Logic Tutorial 2 Logic gates and Boolean algebra 1. The relationship between the input and the output is based on a certain logic. In Section 14. Explain what is a combinational circuit? In a combinational circuit, the output depends upon present input(s) only i. The basic digital electronic circuit that has one or more inputs and single output is known as Logic gate. Every terminal in a logic gate will always be in one of the two binary states (0) or (1). What is a logic gate? 3. Answer: There are 3 ways to connect assertion to RTL: inline, Instantiation and Virtual Instantiation (bind). A + 0 = A A variable ORed with 0 is always equal to the variable. Learning Objectives 1) To be able to describe how data is stored within a computer in binary form. We'll tackle addition of numbers (which requires many gates) in a later quiz, but for now let's consider a simpler problem: We would like a machine that takes three inputs A, B, and C and returns 1 if and only if all the inputs are 1. If so, this section of Logic Puzzles and Riddles has been framed by us just for the people like you. Fundamentals of Logic Design – Charles H. (8pt) For the following circuit, complete the truth table. plc interview questions for experienced, omron plc interview questions, plc programming questions, multiple choice questions on plc pdf, plc interview questions, plc ladder logic interview questions, plc operator interview questions, PLC Ladder Logic Questions and Answers. Use MathJax to format equations. The SR flip – flops can be designed by using logic gates like NOR gates and NAND gates. Yarbrough, Thomson. This document is intended for guidance only. The Karnaugh Map Provides a method for simplifying Boolean expressions It will produce the simplest SOP and POS expressions Works best for less than 6 variables Similar to a truth table => it maps all possibilities A Karnaugh map is an array of cells arranged in a special manner The number of cells is 2n where n = number of variables A 3-Variable Karnaugh Map:. A strategy is a way of organizing available resources to achieve. Although there are extra transistors given that it uses clocks. Puzzles Questions and Answers with explanation for placement, interview preparations. You can choose to pay for your order via PayPal, debit/credit cards or net banking. file 03834 Question 10 Many types of logic gate circuits are built with more than two inputs. Hence, the Logic gates are the building blocks of any digital system. Any University student can download given B. This course is an introduction to Logic from a computational perspective. It is frankly great to train the minds of the little ones to solve funny riddles. All cheat sheets, round-ups, quick reference cards, quick reference guides and quick reference sheets in one page. Although a knowledge of calculus will enhance the understanding of PID controls, it is not required in order to learn how to properly tune a PID. (iv) Underline the names of the two logic gates that should be used inside the control box. Resistive devices reduce the signal strength which appears on the output by one level. plc interview questions for experienced, omron plc interview questions, plc programming questions, multiple choice questions on plc pdf, plc interview questions, plc ladder logic interview questions, plc operator interview questions, PLC Ladder Logic Questions and Answers. designing a logic system: 1. The GATE syllabus is so huge that, without meticulous planning, GATE preparation will go for a toss. Problems 3 & 4 are based on word statement. First four problems are basic in nature. They can also be told the answer for every throw of the dice that are used in the game. 3) This is a definition for an Analog to Digital Converter. Engineering Maths Objective type Questions Answers are also used at SSC and HSc level for Exam preparation. file 03834 Question 10 Many types of logic gate circuits are built with more than two inputs. application to logic gates. In order to make a 4-bit parallel adder minimum circuitry required is_____? Ans. Rather, logic is a non-empirical science like mathematics. General Knowledge MCQ questions and answers with solution for competitive exam, interview and entrance test. Problems 5 to 9 are on Universal gates. You don’t lose marks if you get something wrong. Following the completion of the payment, you will get an email or text that will confirm your order. Attempt a small test to analyze your preparation level. We provided the Download Links to Computer Organization Pdf Free Download- B. It has syntax and semantics. Logic gates. Table 4-1 Basic rules of Boolean algebra. In this post, you will be learned to write the programming in PLC using Logic Gates. Build a register file out of (already built) registers, mutiplexers, decoders, and logic gates. What is Tri-state logic? Three Logic Levels are used and they are High, Low, High impedance state. 3-6 Implementation of the given Boolean function using logic gates in both sop and pos forms. An inverter is a logic gate whose output is the inverse or complement of its input. Examples are available on the other pages with step-by-step explanations if you need any clarification. Combines verbal and logical elements with good examples and problems to work through. Draw a logic circuit for A + BC + D. Logic gates using the programmable logic controller (PLC) is the basic thing you must learn if you want to enhance your Electrical and Electronics skills. Based on this, logic gates are named as AND gate, OR gate, NOT gate etc. Boolean algebra and logic gates quiz questions and answers pdf, complement of function, algebric manipulation, dld standard forms, boolean functions in dld test for cisco certifications. Also, the LSAT does not penalize for wrong answer choices, so you can always pick up one or two correct answers through guessing. What is microprocessor? 2. Questions and answers - MCQ with explanation on Computer Science subjects like System Architecture, Introduction to Management, Math For Computer Science, DBMS, C Programming, System Analysis and Design, Data Structure and Algorithm Analysis, OOP and Java, Client Server Application Development, Data Communication and Computer Networks, OS, MIS, Software Engineering, AI, Web Technology and many. ECE Interview Questions with Answers On. What type of logic gate does this symbol represent. When drawing gates remember to take your time and make sure that it is. A PDF was thus. Which type of gate is this, and what does this suggest about the relationship between Boolean addition and logic circuits? Rules for Boolean addition: 0+0 = 0 0+1 = 1 1+0 = 1 1+1 = 1 file 01298 Question 6 Surveying the rules for Boolean multiplication, the 0 and 1 values seem to resemble the truth table of a very common. Once you submit the order form, you will receive a quote for your assignment. Suitable for GCSE Computer Science classes and KS3 Computing classes. And because the sovereign was an honest man he warned that one guard is a Swindlecant. Boolean Algebra & Logic Gates 2 (From GIT Book) Simple Questions on Logic Gates ; Boolean Algebra & Logic Gates (Advanced) Logic Gates Revision (Simple) Boolean algebra or Boolean logic is a calculation of truth values, developed by George Boole in the 1840s. While some aptitude tests will only focus on one type of thinking (either verbal or numerical reasoning, for example) some will have multiple sections that will test various different types of skills. When you are told to begin you will have 30 minutes to do as many questions as you can. There was a mixture of technical Questions, behavioral questions, and brain teasers. About Logical Problems Reasoning Questions. Rather, logic is a non-empirical science like mathematics. Get latest Numerical, Reasoning, Analogy & Quantitative Aptitude Online. 111 + 111 = 3. Click the dropdown menus to see the answers. Design different types of logic gates using CMOS inverter and analyze their transfer characteristics. They can also be told the answer for every throw of the dice that are used in the game. Let's consider a propositional language where A=\"Aldo passed the exam\", B=\"Bruno passed the exam\", C=\"Carlo passed the exam\". Programming Logic and Design: Chapter 3 Review Questions. Answer: There are 3 ways to connect assertion to RTL: inline, Instantiation and Virtual Instantiation (bind). This course is an introduction to Logic from a computational perspective. common logic gate. Along with the previous year question papers for JEE Main, answers keys are also available here. The person who has the dice and knows the game, rolls five dice and remarks almost instantly on the answer. Susan receives$40,000. Multiply 30 by 0. For example: // A synchronous D Flip-Flop moduledff (input logic [7:0] D, input RST_, input CLK, output logic [7:0] Q); always. It has appeared in the volume The Examined Life: Readings from Western Philosophy from Plato to Kant, edited by Stanley Rosen, published in 2000 by Random House. As the page includes Logical Problems Reasoning Questions, you need to answer the questions in the meanwhile; you can know the tips and tricks in solving those issues. Whereas a sequential logic circuit usage the logic function related to current state inputs and previous state inputs. Get Free Logic Gates Questions And Answers Objective Typethe book as a Kindle file (. A + 0 = A A variable ORed with 0 is always equal to the variable. Fully solved Multiple choice questions and answers for competitive examinations. 13) [EASY] MOSFET – Multiple Choice Questions –Download here. pdf from CE CZ1105 at Nanyang Technological University. IndianStudyHub offers many fully Coding and Decoding Questions & Answers : Logical Reasoning pdf free download questions and answers with explanations. acquire the logic gates questions and answers belong to that we provide here and check out the link. Logical Problems deals with the consistent ability to solve the problem. The beginnings of computing and logic gates starts with telephone companies in the early-mid 20th century, and telephone companies did this with relays. \"Electrostatic MCQ\" PDF covers quiz questions about electrostatics, electric field lines, electric flux, electric potential, capacitor, Coulomb’s law, Gauss law, electric and gravitational forces. All the switches only pass signals from source to drain, incorrect wiring of the devices will result in high impedance outputs. These are useful, even necessary, in some digital circuit applications. Browse through all study tools. 3 in the textbook. Build a register file out of (already built) registers, mutiplexers, decoders, and logic gates. This course is an introduction to Logic from a computational perspective. In addition to reading the questions and answers on my site, I would suggest you to check the following, on amazon, as well:. Consider each word in the question for hidden easy answers. A logic system has 5 inputs. Take the Quiz and improve your overall Engineering. With hundreds of chapter-wise questions & answers on Basic Electronics, this is the most comprehensive question bank on the entire internet. Research the part numbers and datasheets of the following logic gate integrated. Programmable Logic Controller (PLC) Questions and Answers – 23. Boolean Algebra is the mathematical foundation of digital circuits. Since we are focusing on only one gate and its expression, it is easy. Modular Sequential Logic. A logic gate. Please be sure to answer all questions as accurately and completely as possible. Most mathematicians will understand the term logic as in mathematical logic. Transmission gates are bi-directional and can be resistive or non-resistive. When you are told to begin you will have 30 minutes to do as many questions as you can. Thanks for contributing an answer to Stack Overflow! Please be sure to answer the question. Technical Articles Toyota Series - Electrical (623 Training Course) Elec01 Essential Electrical Concepts. verification of the truth tables of logic gates using TTL ICS. pdf file size 205KB 15 Overview of Sensors & Actuators w/quest. 13) [EASY] MOSFET – Multiple Choice Questions –Download here. This resource includes a PowerPoint presentation that teaches about logic gates, with a worksheet designed to be used on the computers, and an online link to practically find out about logic gates. Practice test for UGC NET Computer Science Paper. These calculations are shown in detail later in this chapter. Making statements based on opinion; back them up with references or personal experience. In the case of the OR gate, if there is no potential (i. For the first step, we write the logic expressions of individual gates. Digital logic is the application of the Boolean algebra of 0 and 1 to electronic hardware consisting of logic gates connected to form a circuit diagram. 6 LOGIC GATES 69 2. The combinational circuit has no memory element. The output of the 74 series GATE of TTL gates is taken from a BJT in a. Don't follow the first train of thought that enters your head; look at each word and see if there's a simple answer that's easy to miss. The simplest logic gate technically isn’t really a gate at all though some refer to it as a NOT gate. What is a record? 7. Logic Gates Questions And Answers Recognizing the artifice ways to acquire this book logic gates questions and answers is additionally useful. 100+ Logical Reasoning Questions & Answers PDF Download Now Part 1. Download link is provided below to ensure for the Students to download the Regulation 2017 Anna University EE8351 Digital Logic Circuits Lecture Notes, Syllabus, Part-A 2 marks with answers & Part-B 16 marks Questions with answers, Question Bank with answers, All the materials are listed below for the students to make use of it and score Good (maximum) marks with our study materials. 2 7 -8 Verification of state tables of RS, JK, T and D flip-flops using 3 NAND & nor gates. Boolean logic represents all values as TRUE (1) or FALSE (0). Introduction. Logic gates are the building blocks of a digital circuit. Logic gates quiz questions and answers pdf: \"Branch of mathematics which deals with relationships of logic variables is\" with answers for online high school courses. What type of logic gate does this symbol represent. 1 to 9 are based on the logic gates like AND, OR, NOT, NAND & NOR etc. With hundreds of chapter-wise questions & answers on Basic Electronics, this is the most comprehensive question bank on the entire internet. Digital logic design study guide with questions and answers about algorithmic state machine, asynchronous sequential logic, binary systems, Boolean algebra and logic gates, combinational logic, digital integrated circuits, MSI and PID components, registers counters and memory units, Boolean functions, standard graphic symbols, synchronous. Example Question 1. Logic Gates 4 OO Software Design and Construction 2-input Logic Gate Hierarchy It is sensible to view each of the 2-input logic gates as a specialized sub-type of a generic logic gate (a base type) which has 2 input wires and transmits its output to a single output wire. Math Logic Questions with Answers: Simple, Fun and Tricky Math Questions for Kids and Adults. What do you think if we exercise the mind for a while with logic riddles? Test your common sense with witty logical questions with answers. and dc circuits, electronic devices (including thyristors), a knowledge of basic logic gates, flip flops, and Boolean algebra, and college algebra and trigonometry. The answer is C. Making statements based on opinion; back them up with references or personal experience. Because XOR is “OR and NOT AND” we can just use the output of the existing AND and OR gates in the ALU. Although these circuits may be. It can be obtained by connecting a NOT gate in the output of an AND gate. For example: // A synchronous D Flip-Flop moduledff (input logic [7:0] D, input RST_, input CLK, output logic [7:0] Q); always. You can also find ManyBooks' free eBooks from the genres page or recommended category. Electronics Questions and Answers (20) Filter Circuits (9) Founder Speaks (3) GATE Questions and Answers (1) Integrated Circuits (7) Interview (8) JK Flip Flop (3) Logic circuits (1) Logic Gates and Boolean Algebra (10) Long Questions and Answers (3) MCQ (3) Multiple Choice Questions and Answers (57) Number System (1) Operational Amplifier (3. This page is all about reasoning, reasoning question and answer, reasoning question and answer in Hindi, reasoning question and answer in English, reasoning question and answer in pdf, reasoning question and answer pdf download, reasoning online test, reasoning question and answer with solution, reasoning question and. This quiz tests the very basics of logic gates. Electronics Questions and Answers (20) Filter Circuits (9) Founder Speaks (3) GATE Questions and Answers (1) Integrated Circuits (7) Interview (8) JK Flip Flop (3) Logic circuits (1) Logic Gates and Boolean Algebra (10) Long Questions and Answers (3) MCQ (3) Multiple Choice Questions and Answers (57) Number System (1) Operational Amplifier (3. The Hardest Logic Puzzle Ever is a logic puzzle so called by American philosopher and logician George Boolos and published in The Harvard Review of Philosophy in 1996. Hence, Socrates is mortal. Once you submit the order form, you will receive a quote for your assignment. Logic gates are the building blocks of a digital circuit. Logic Gates Questions And Answers Logic Gates Questions and Answers. Has applications in electronics (logic gates) programming (combining instructions) as well as philosophy - what a mixture!. Printable Logic Grid Puzzles. It is intended for the general reader. Logic Gates Worksheet – Truth Tables Label these basic logic gates and fill in their truth tables. For the electronics circuits and signals a logic 1 will represent closed switch, a high voltage, or an “on” lamp, and a logic 0 will represent an open switch, low voltage, or an “off” lamp. In order to understand the theoretical basics you need to know five basic definitions. Based on this, logic gates are named as AND gate, OR gate, NOT gate etc. is a series of transistors connected together to give one or more. Output signal appears only for certain combinations of input signals. UPSC IAS Prelims Answer Key 2019: Here is the answer key of the UPSC Preliminary Exam 2019 GS Paper 1 with explanations. They were produced by question setters, primarily for the benefit of the examiners. It's okay to guess Since your score will not be negatively affected by getting questions wrong, be sure to answer, or guess, on each question. Take the Quiz and improve your overall Engineering. A PDF was thus. What is associate law?. Logic gates quiz questions and answers pdf: \"Branch of mathematics which deals with relationships of logic variables is\" with answers for online high school courses. What logic question can save the gringo's life? You probably remember the answer from the very first problem on this page, don't you :-). Problems 3 & 4 are based on word statement. CMOS gates at the end of those resistive wires see slow input transitions. 111 + 111 = 3. All cheat sheets, round-ups, quick reference cards, quick reference guides and quick reference sheets in one page. Dynamic gates use NMOS or PMOS logic. Q: Why is the VGS rating of Trench 6 automotive logic level MOSFETs limited to 10 V and can it be increased beyond 10 V? A: The VGS rating of 10 V given to Trench 6 logic level MOSFETs is driven by our <1 ppm failure. ECE Interview Questions with Answers On. The output of the 74 series GATE of TTL gates is taken from a BJT in a. “If I am elected, then I will lower taxes. To learn more, see our tips on writing great. Also, in saying that logic is the science of reasoning, we do not mean. 111 + 111 = 3. One half adder and three full adder. A logic gate is also known building block of a digital circuit. Since we are focusing on only one gate and its expression, it is easy. Introduction. Logic gates are the building blocks of digital circuits. Logic gates. But when it comes to first order logic (predicate logic with quantifiers), the simplest way is to apply logical reasoning. application to logic gates. Microsoft PowerPoint - 04-Logic gates. An inverter is a logic gate whose output is the inverse or complement of its input. Which type of gate is this, and what does this suggest about the relationship between Boolean addition and logic circuits? Rules for Boolean addition: 0+0 = 0 0+1 = 1 1+0 = 1 1+1 = 1 file 01298 Question 6 Surveying the rules for Boolean multiplication, the 0 and 1 values seem to resemble the truth table of a very common. Simplification of Switching Functions. file 03834 Question 10 Many types of logic gate circuits are built with more than two inputs. CIMA P1 Past Paper Questions and Answers Below are a number of past paper questions and answers from the 2010 Syllabus that are still relevant to the CIMA P1 exam. Try These Out: https://bit. Logic gates are used to carry out logical operations on single or multiple binary inputs and give one binary output. LOGIC GATES (PRACTICE PROBLEMS) Key points and summary - First set of problems from Q. acknowledge that logic, to use the definition from Webster's Revised Unabridged Dictionary, is “the science or art of exact reasoning, or of pure and formal thought, or of the laws according to which the processes of pure thinking should be conducted”, but they fail to note that this is an. Electrical engineering interview questions touch upon a wide range of topics, ranging from your educational background to technical knowledge. The simplest logic gate technically isn’t really a gate at all though some refer to it as a NOT gate. Predicate logic formulas without quantifiers can be verified using derivation. More than a language, it has inference rules. Programmable Logic Controller (PLC) Questions and Answers – 20. Mostly, the logic gate consists of two inputs and one output. It consists of logic gates only. Michael says 'I am willing to bet you all the money you have in your wallet that I can sing a genuine song with a lady's name of your choice in it. Programming Logic and Design: Chapter 3 Review Questions. Explain what are the universal logic gates? Universal gate is a gate that can perform all the basic logical operations such as NAND and NOR gates. The high and low are normal logic levels & high impedance state is electrical open circuit conditions. Practice test for UGC NET Computer Science Paper. The sovereign let the gringo put one question to one guard. Questions (80) Explanation was long and question became somewhat rhetorical. \"Carlo is the only one passing the exam\". 8) What is a Logic gate? The basic gates that make up the digital system are called a logic gate. Logic Gates Worksheet – Truth Tables Label these basic logic gates and fill in their truth tables. Questions remain the string tool to provoke the mind to respond to issues ands discover new things. How to Answer Interviewers ask this question to gain a better understanding of your education and the challenges you faced during your time at school. acknowledge that logic, to use the definition from Webster's Revised Unabridged Dictionary, is “the science or art of exact reasoning, or of pure and formal thought, or of the laws according to which the processes of pure thinking should be conducted”, but they fail to note that this is an. 3 in the textbook. Common collector configuration [GATE 2003: 1 Mark] 21. Download and play for free our printable logic grid puzzles (PDF). Gates produce the signals 1 or 0 if input requirements are satisfied. Tech Computer Organization and Study material or you can buy B. A + 0 = A A variable ORed with 0 is always equal to the variable. Boolean Algebra & Logic Gates 2 (From GIT Book) Simple Questions on Logic Gates ; Boolean Algebra & Logic Gates (Advanced) Logic Gates Revision (Simple) Boolean algebra or Boolean logic is a calculation of truth values, developed by George Boole in the 1840s. This document is intended for guidance only. Argue the answers of funny logical questions. , experimental or observational) science like physics, biology, or psychology. Research the part numbers and datasheets of the following logic gate integrated circuits: Triple 3-input NOR gate Dual 4-input AND gate Single 8-input NAND gate. What logic question can save the gringo's life? You probably remember the answer from the very first problem on this page, don't you :-). Terms in this set (20) The selections statement if quantity > 100 then discoutRate = RATE is an example of a. These are not model answers : there may be many other good ways of answering a given exam question! The solution notes for the most recent two year’s worth of examinations are held back by the department and only made available to supervisors and other. Changes from third edition The fourth edition is a complete restructuring and updating of the third. Provide details and share your research! But avoid … Asking for help, clarification, or responding to other answers. The files are grouped by difficulty (very easy, easy and medium) and are a great activity for all ages. The logic diagrams for the full adder implemented in sum-of-products form are the following: It can also be implemented using two half adders and one OR gate (using XOR gates). In order to make a 4-bit parallel adder minimum circuitry required is_____? Ans. Question 12 Suppose you needed a two-input AND gate, but happened to have an unused 3-input AND gate in one of the integrated circuits (\"chips\") already in the system you were building. Our online logic trivia quizzes can be adapted to suit your requirements for taking some of the top logic quizzes. is part of a circuit used to turn on the parking lights of a car automatically when it is dark Explain your answer. If output of a logic circuit should remain constant at High Voltage level (1) but it goes low then we say static1 hazard exist." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9004369,"math_prob":0.7256657,"size":58693,"snap":"2020-45-2020-50","text_gpt3_token_len":12600,"char_repetition_ratio":0.16693076,"word_repetition_ratio":0.45560965,"special_character_ratio":0.20985466,"punctuation_ratio":0.110814296,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96974206,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-27T00:38:49Z\",\"WARC-Record-ID\":\"<urn:uuid:e530d168-36a7-4cc6-9c80-7cc1a33f3114>\",\"Content-Length\":\"69403\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e73a52c9-8b1e-40df-8f58-f3819c2c75b1>\",\"WARC-Concurrent-To\":\"<urn:uuid:b3bc4e22-d33e-45cc-add0-7683a604e61e>\",\"WARC-IP-Address\":\"104.18.38.199\",\"WARC-Target-URI\":\"http://bnyy.milanoporteeserramenti.it/logic-gates-questions-and-answers-pdf.html\",\"WARC-Payload-Digest\":\"sha1:XJI2JVNALLXTR54U7DOULEPWQG6EYDPB\",\"WARC-Block-Digest\":\"sha1:JZJS5S3DQGDHW64QJUBBCWV64ERSWRKQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107892710.59_warc_CC-MAIN-20201026234045-20201027024045-00191.warc.gz\"}"}
https://ericasadun.com/2017/05/15/tuple-assignments/
[ "Do you have any good examples of when it would be useful to have a tuple but be doing complicated enough stuff with them?\n\nHere are some examples I grepped out of a local folder, including some from third parties:\n\n```var (x, y) = (7.5, 7.5)\nlet (controlPoint1θ, controlPoint2θ) = (dθ / 3.0, 2.0 * dθ / 3.0)\nvar (_, sceneWidth) = boundingNode.boundingSphere\nlet (vMin, vMax) = label.boundingBox\nlet (duration, _) = cameraController?.performFlyover(toFace: mainActor.rotation) ?? (0, 0)\nstruct Point { var (x, y) : (Double, Double) }```\n\nHope that helps.\n\n# One Comment\n\n• Here’s a useful one:\n``` var a = 1 var b = 2```\n\n``` // swap (a, b) = (b, a) ```\n\n```print(a) // 2 print(b) // 1 ```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8035147,"math_prob":0.95859456,"size":649,"snap":"2023-40-2023-50","text_gpt3_token_len":212,"char_repetition_ratio":0.093023255,"word_repetition_ratio":0.0,"special_character_ratio":0.33436054,"punctuation_ratio":0.21678321,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99737316,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-01T04:39:53Z\",\"WARC-Record-ID\":\"<urn:uuid:792d6e12-a2f8-4c30-ab66-d1c19a2e44cc>\",\"Content-Length\":\"41121\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1edd1263-0f7f-45db-8084-0a5df2c5e847>\",\"WARC-Concurrent-To\":\"<urn:uuid:e205e83e-b5ba-43b8-ac20-fe1d0bdfa9f3>\",\"WARC-IP-Address\":\"34.174.22.52\",\"WARC-Target-URI\":\"https://ericasadun.com/2017/05/15/tuple-assignments/\",\"WARC-Payload-Digest\":\"sha1:6IX2YZ6T2H245BMWZABEGAR7LRIF34T2\",\"WARC-Block-Digest\":\"sha1:6CVFE745LK7YZMIH4ENLGXCZHVTH3GYL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510781.66_warc_CC-MAIN-20231001041719-20231001071719-00815.warc.gz\"}"}
https://stat.ethz.ch/R-manual/R-patched/library/base/html/duplicated.html
[ "duplicated {base} R Documentation\n\n## Determine Duplicate Elements\n\n### Description\n\n`duplicated()` determines which elements of a vector or data frame are duplicates of elements with smaller subscripts, and returns a logical vector indicating which elements (rows) are duplicates.\n\n`anyDuplicated(.)` is a “generalized” more efficient shortcut for `any(duplicated(.))`.\n\n### Usage\n\n```duplicated(x, incomparables = FALSE, ...)\n\n## Default S3 method:\nduplicated(x, incomparables = FALSE,\nfromLast = FALSE, nmax = NA, ...)\n\n## S3 method for class 'array'\nduplicated(x, incomparables = FALSE, MARGIN = 1,\nfromLast = FALSE, ...)\n\nanyDuplicated(x, incomparables = FALSE, ...)\n## Default S3 method:\nanyDuplicated(x, incomparables = FALSE,\nfromLast = FALSE, ...)\n## S3 method for class 'array'\nanyDuplicated(x, incomparables = FALSE,\nMARGIN = 1, fromLast = FALSE, ...)\n```\n\n### Arguments\n\n `x` a vector or a data frame or an array or `NULL`. `incomparables` a vector of values that cannot be compared. `FALSE` is a special value, meaning that all values can be compared, and may be the only value accepted for methods other than the default. It will be coerced internally to the same type as `x`. `fromLast` logical indicating if duplication should be considered from the reverse side, i.e., the last (or rightmost) of identical elements would correspond to `duplicated = FALSE`. `nmax` the maximum number of unique items expected (greater than one). `...` arguments for particular methods. `MARGIN` the array margin to be held fixed: see `apply`, and note that `MARGIN = 0` may be useful.\n\n### Details\n\nThese are generic functions with methods for vectors (including lists), data frames and arrays (including matrices).\n\nFor the default methods, and whenever there are equivalent method definitions for `duplicated` and `anyDuplicated`, `anyDuplicated(x, ...)` is a “generalized” shortcut for `any(duplicated(x, ...))`, in the sense that it returns the index `i` of the first duplicated entry `x[i]` if there is one, and `0` otherwise. Their behaviours may be different when at least one of `duplicated` and `anyDuplicated` has a relevant method.\n\n`duplicated(x, fromLast = TRUE)` is equivalent to but faster than `rev(duplicated(rev(x)))`.\n\nThe array method calculates for each element of the sub-array specified by `MARGIN` if the remaining dimensions are identical to those for an earlier (or later, when `fromLast = TRUE`) element (in row-major order). This would most commonly be used to find duplicated rows (the default) or columns (with `MARGIN = 2`). Note that `MARGIN = 0` returns an array of the same dimensionality attributes as `x`.\n\nMissing values (`\"NA\"`) are regarded as equal, numeric and complex ones differing from `NaN`; character strings will be compared in a “common encoding”; for details, see `match` (and `unique`) which use the same concept.\n\nValues in `incomparables` will never be marked as duplicated. This is intended to be used for a fairly small set of values and will not be efficient for a very large set.\n\nExcept for factors, logical and raw vectors the default `nmax = NA` is equivalent to `nmax = length(x)`. Since a hash table of size `8*nmax` bytes is allocated, setting `nmax` suitably can save large amounts of memory. For factors it is automatically set to the smaller of `length(x)` and the number of levels plus one (for `NA`). If `nmax` is set too small there is liable to be an error: `nmax = 1` is silently ignored.\n\nLong vectors are supported for the default method of `duplicated`, but may only be usable if `nmax` is supplied.\n\n### Value\n\n`duplicated()`: For a vector input, a logical vector of the same length as `x`. For a data frame, a logical vector with one element for each row. For a matrix or array, and when `MARGIN = 0`, a logical array with the same dimensions and dimnames.\n\n`anyDuplicated()`: an integer or real vector of length one with value the 1-based index of the first duplicate if any, otherwise `0`.\n\n### Warning\n\nUsing this for lists is potentially slow, especially if the elements are not atomic vectors (see `vector`) or differ only in their attributes. In the worst case it is O(n^2).\n\n### References\n\nBecker, R. A., Chambers, J. M. and Wilks, A. R. (1988) The New S Language. Wadsworth & Brooks/Cole.\n\n`unique`.\n\n### Examples\n\n```x <- c(9:20, 1:5, 3:7, 0:8)\n## extract unique elements\n(xu <- x[!duplicated(x)])\n## similar, same elements but different order:\n(xu2 <- x[!duplicated(x, fromLast = TRUE)])\n\n## xu == unique(x) but unique(x) is more efficient\nstopifnot(identical(xu, unique(x)),\nidentical(xu2, unique(x, fromLast = TRUE)))\n\nduplicated(iris)[140:143]\n\nduplicated(iris3, MARGIN = c(1, 3))\nanyDuplicated(iris) ## 143\n\nanyDuplicated(x)\nanyDuplicated(x, fromLast = TRUE)\n```\n\n[Package base version 3.6.0 Index]" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6998128,"math_prob":0.9530757,"size":4243,"snap":"2019-43-2019-47","text_gpt3_token_len":1103,"char_repetition_ratio":0.15923567,"word_repetition_ratio":0.042979944,"special_character_ratio":0.25524393,"punctuation_ratio":0.17220172,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9702561,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-20T22:28:51Z\",\"WARC-Record-ID\":\"<urn:uuid:5f14716b-f1c0-46a9-afdc-2250b4f525cc>\",\"Content-Length\":\"7084\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:670a259b-a0b6-4d35-a392-0841f5c955e8>\",\"WARC-Concurrent-To\":\"<urn:uuid:ea78dfa0-4421-40f6-962b-9a4d35fa7d2e>\",\"WARC-IP-Address\":\"129.132.119.195\",\"WARC-Target-URI\":\"https://stat.ethz.ch/R-manual/R-patched/library/base/html/duplicated.html\",\"WARC-Payload-Digest\":\"sha1:GJTYTPQDQQDFNG6JOB2VDTHP4NTNQ6DZ\",\"WARC-Block-Digest\":\"sha1:HTZRW46QI3TO4MX5J2WNPLP6E52IUFHM\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670635.48_warc_CC-MAIN-20191120213017-20191121001017-00092.warc.gz\"}"}
https://www.mdpi.com/1996-1073/5/9/3701/htm
[ "Next Article in Journal\nEffects of a Green Space Layout on the Outdoor Thermal Environment at the Neighborhood Level\nNext Article in Special Issue\nComprehensive Exergy Analysis of Three IGCC Power Plant Configurations with CO2 Capture\nPrevious Article in Journal\nA Revisit to the Hydrogen Desorption/Absorption Behaviors of LiAlH4/LiBH4: Effects of Catalysts\nPrevious Article in Special Issue\nAn Innovative Use of Renewable Ground Heat for Insulation in Low Exergy Building Systems\n\nEnergies 2012, 5(9), 3701-3722; https://doi.org/10.3390/en5093701\n\nArticle\nEnergy and Exergy Analysis and Optimization of Combined Heat and Power Systems. Comparison of Various Systems\nby", null, "Michel Feidt 1 and", null, "Monica Costea 2,*\n1\nLaboratoire d’Energétique et de Mécanique Théorique et Appliquée (LEMTA), Lorraine University, UMR CNRS 7563, 2 Avenue de la Forêt de Haye, 54516 Vandoeuvre-Les-Nancy Cedex, France\n2\nDepartment of Engineering Thermodynamics, Engines, Thermal and Refrigerating Equipment, University “Politehnica” of Bucharest, Splaiul Independentei 313, 060042 Bucharest, Romania\n*\nAuthor to whom correspondence should be addressed.\nReceived: 14 July 2012; in revised form: 3 September 2012 / Accepted: 19 September 2012 / Published: 24 September 2012\n\n## Abstract\n\n:\nThe paper presents a comparison of various CHP system configurations, such as Vapour Turbine, Gas Turbine, Internal Combustion Engine, External Combustion Engine (Stirling, Ericsson), when different thermodynamic criteria are considered, namely the first law efficiency and exergy efficiency. Thermodynamic optimization of these systems is performed intending to maximize the exergy, when various practical related constraints (imposed mechanical useful energy, imposed heat demand, imposed heat to power ratio) or main physical limitations (limited heat availability, maximum system temperature allowed, thermo-mechanical constraints) are taken into account. A sensitivity analysis to model parameters is given. The results have shown that the various added constraints were useful for the design allowing to precise the influence of the model main parameters on the system design. Future perspective of the work and recommendations are stated.\nKeywords:\nthermodynamics; optimization; combined heat and power systems; exergy efficiency; First Law efficiency; constraints\n\n## 1. Introduction\n\nA cogeneration plant, also called a CHP system (Combined Heat and Power Production), can operate at efficiencies greater than those achieved when heat and power are produced in separate or distinct processes. For example, efficiency values go from 35%–40% for electrical or mechanical production, to 80%–85% for the cogeneration system efficiency . The environmental issue should be also considered as an important cogeneration system advantage with respect to carbon dioxide emissions, which are mainly responsible for the greenhouse effect.\nIn the recent past, due to environmental impact considerations and energy efficient use purposes, a renewal and development of combined heat and power systems was increasing from large to small scale CHP systems, even μCHP, and for industrial or building applications [1,2,3,4,5,6,7,8,9,10,11,12,13,14]. New configurations of CHP systems were studied and among them photovoltaic/thermal (PV/T) configurations [15,16,17] or fuel cell CHP systems [2,4,14] are close to implementation in the near future. Also the fuel disposal issue was considered, mainly by various biomass availabilities [16,18,19], or gasoline and hydrogen . Analysis of the CO2 mitigation costs of large-scale biomass-fired cogeneration technologies with CO2 capture and storage was performed , showing that biomass-fired cogeneration plants based on integrated gasification combined cycle technology (CHP-BIGCC) is very energy and emission efficient and also cost competitive compared with other conversion systems. A new analytical approach based on the current models of the solid oxide fuel cell and gas turbine was elaborated , in which multiple irreversibilities existing in real hybrid systems are taken into account. The general performance characteristics of the hybrid system (irreversible solid oxide fuel cell-gas turbine) were revealed and the optimum criteria of the main performance parameters were determined. Other hybrid systems were considered , such as bi-energy technologies (gas and electricity), as a path to transfer loads from one system to another, so an absolute peak load reduction by 17% at the small scale was found. A novel conceptualisation considering the steam cycle of a combined heat and power generator thermodynamically equivalent to a conventional steam cycle generator plus an additional virtual steam cycle heat pump leads to the conclusion that the performance of CHP will tend to be significantly higher than that of real heat pumps operating at similar temperatures. It also shows that the thermodynamic performance advantages of CHP are consistent with the goal of deep, long-term decarbonisation of industrialised economies.\nBesides the particular look at specific characteristics of CHP systems, various criteria to evaluate their performances are used. Multicriteria evaluations according to weighting methodologies have been proposed recently [23,24]. Then, First and Second Law analyses of gas engines, fuel cells or hybrid solar systems [1,5,6,7,11,14] have shown that the energy-saving effect increases with the system scale because the heat to power ratio of the system decreases , or that both the main energy and exergy loss take place at the parabolic trough collector , and that the polymer exchange membrane fuel cell (PEMFC)-based CHP system, operating at atmospheric pressure and low temperature, is the most efficient system when compared to a solid oxide fuel cell (SOFC) one .\nExergy-based criteria were found to give much better guidance for system improvement [3,4,10,12], as they account better for use of energy resources. Thus, the comparison of gasoline and hydrogen fuelled spark ignition internal combustion engines yielded that the hydrogen fuelled engine had a greater proportion of its chemical exergy converted into mechanical exergy, as well as a greater exergy due to heat transfer and smaller combustion irreversibility associated with hydrogen combustion . When looking into internal combustion engine (ICE) poly-generation systems , the analysis provides high primary energy savings and low emissions suggesting that for such systems optimization should be done from an economic and environmental point of view. Finally, exergoeconomic analysis of CHP applications (engines, gas turbine) [6,8,9] or evaluation of CO2 capture and management studies [12,19] complete the overview and come to meet users’ main concerns—available energy and CO2 emission price.\nThe proposed thermodynamics approach perspective points out cold and heat cogeneration systems (CCHP), and also extends to polygeneration systems [24,25]. These concepts and methodologies could help better design, manage and integrate these systems in the future, with respect to environmental and economic concerns.\nThe present analysis focuses on the main CHP systems based on Vapour Turbine, Internal and External Combustion Engines and Gas Turbine Engines. They are modelled as thermal machines with two heat reservoirs, heat losses between the heat reservoirs, and external irreversibilities due to the heat transfer at source and sink. The First Law efficiency and exergetic efficiency criteria are used in order to evaluate the CHP performance. The optimization procedure considers several constraints, namely, imposed ratio of the useful heat to power, mechanical power load, useful heat load or energy rate consumption. The results are given in terms of maximum of the exergy rate of the useful energy delivered by the CHP system and the corresponding optimum parameter expression. The specified upper bounds (maximum maximorum) correspond to the CHP system based on External Combustion Engines.\n\n## 2. Modelling of Various CHP Systems\n\nCombined Heat and Power systems with heat delivery as by-product are considered here. Although this represents a particular case of cogeneration, various processes are possible, characterized by systems or cycles referring to different techniques . The first one developed was the CHP with vapour turbines that appears as an externally fired engine (by a boiler or a steam generator). Other kinds of external combustion engines will be considered hereafter, like Ericsson and Stirling ones. Current well developed CHP systems are composed of internal combustion engines of various sizes going from 1 kWelec to more than 1 MW for industrial or urban applications. The third main systems category used for cogeneration is based on gas turbines, and in this case post combustion could be used. Some more recent studied categories using Fuel Cells or Solar Photovoltaic arrays are also added to the previously mentioned ones.\nThe present analysis is deliberately limited to the main CHP categories, namely Vapour Turbines, External Combustion Engines, Internal Combustion Engines, and Gas Turbine Engine. All these systems are thermo-mechanical ones, each having a high temperature heat source. Generally, the heat is obtained by burning a fuel, whatever the fuel is. Mechanical and then electrical power is produced by the engine (the machine). According to the Second Law of Thermodynamics, the machine gives back heat (a part of the useful energy delivered by CHP, UE) to a cold sink, before rejecting the remaining heat to the environment at T0, the reference temperature.\nThe performances of four main engines acting as CHP systems will be compared hereafter. They are represented by the Carnot, Stirling or Ericsson, Otto or Diesel, and finally Brayton-Joule cycles . Firstly, the model is developed by means of equilibrium thermodynamics, which provides more insight into the CHP system operation by considering heat losses and other irreversibilities. Also various possible performance criteria and constraints associated to the objective function that should be optimized are used in the model and will be presented in the next sections.\n\n## 3. Criteria and Optimizations\n\nThe proposed models were developed for steady state operation assumption in order to get the upper bound of obtainable exergy rate of the useful energy delivered by the CHP system corresponding to a nominal design point. This is crucial to determine the corresponding exergetic efficiency at any rate. The two useful effects of CHP systems are the mechanical power, $W ˙$ and the useful heat transfer rate supplied to the consumer, $Q ˙ U$, both being negatives as the proposed sign convention states. In this sign convention each quantity entering the machine is positive, and each leaving quantity is negative.\nIn most cases the machines are non-adiabatic due to thermal losses to the environment. As a first attempt, lumped analysis suggests that these losses can be represented as an equivalent heat loss between the highest and lowest temperature of the system. They are summarized as $Q ˙ L$, heat transfer rate loss between the hot and cold side (positive quantity).\n\n#### 3.1. First Law Efficiency Criterion, ηICHP\n\nWhatever the engine is, the energy balance can be written as follows (see Figure 1a):\n$Q ˙ S H + W ˙ + Q ˙ S C = 0$\nwhere $Q ˙ S H$ is the heat transfer rate input, the so called energy rate consumption (EC), given by:\n$Q ˙ S H = Q ˙ H + Q ˙ L$\nand $Q ˙ S C$ is the heat transfer rate rejected to the sink, expressed as:\n$Q ˙ S C = Q ˙ C − Q ˙ L$\nwith $Q ˙ H$, $Q ˙ C$ the heat transfer rate entering, respectively leaving the converter.\nThe model assumption regarding the useful heat transfer rate provided by the engine in cogeneration mode operation corresponds to the ideal case of maximum heat transfer rate recovery that yields:\n$Q ˙ U = Q ˙ C$\nThe first law efficiency ηICHP is defined as the ratio of the usable energy rate (UE) and the energy rate consumption, EC. By combining Equations (1), (3) and (4) the first law efficiency with cogeneration is given by:", null, "The consequence is that the first law implies only a “non-adiabatic system efficiency” due to the presence of heat transfer rate loss, $Q ˙ L$, whatever the thermo-mechanical CHP system is. If the system is without losses, the limit ηICHP is one because of the ideal case of maximum heat transfer rate recovery that was considered, whatever the system is. However, one notes that if it could happen for external combustion engines (see Figure 1a,b), it is not the case of internal combustion engines (see Figure 1 c,d), due to the fact that corresponding engines are open systems and TU > T0. So, heat losses to ambient appear. These dissimilarities are due to the heat transfer particularities. Hence, useful heat could be delivered at constant temperature (TSC = TU) in cases a and b, but not for cases c and d, where finite heat source effects cannot be neglected.\nFigure 1. Equilibrium Thermodynamics of CHP thermo-mechanical engines: (a) and (b) –ECE; (c) and (d) –ICE.\nFigure 1. Equilibrium Thermodynamics of CHP thermo-mechanical engines: (a) and (b) –ECE; (c) and (d) –ICE.\nTo conclude the temperature level of the useful heat appears important. It is why exergetic criteria have to be considered in the analysis.\n\n#### 3.2. Exergetic Criterion\n\nWhatever the engine is, the exergy transfer rate of the usable energy is given by :", null, "The useful thermal exergy corresponds to the case where it is looked from the external utility side instead of the working fluid side. This remark confirms the difference between ECE and ICE, as mentioned in Section 3.1.\nThen, the difference between the machine (engine) and the system from the exergetic point of view is indicated hereafter by using two entropy balances in the case of endo-irreversible thermodynamic approach. Their expressions are as follows:\nfor the engine:", null, "", null, "where $S ˙ i$, internal entropy generation rate of the engine; $S ˙ T$, total entropy generation rate of the system including source and sink (the hypothesis is that the useful heat is finally delivered to the environment).\nUpon combining Equations (7) and (8) and calculating, the total entropy generation rate expression of the CHP system results as:", null, "The exergy rate consumed by the system is expressed as:", null, "This result confirms the fact that the heat transfer rate loss due to internal irreversibilities, $I ˙ i = T 0 S ˙ i$, have a negative impact on the exergy efficiency of the system. The exergy efficiency of the engine is slightly different from that of the system due to the fact that $E ˙ x C$ moves from the preceding expression to", null, ". The same methodology will be applied to ICE hereafter.\n\n#### 3.3. General Optimization Procedure\n\nBy considering the same hypothesis introduced in Section 2, a two heat conductances model is develop here corresponding to the one proposed by Sahin and Kodal . The model corresponds to the endoreversible case (without internal irreversibilities), and is also the basic configuration of the CHP vapour turbine system without losses. Then, by means of non-equilibrium Thermodynamics more insight in the CHP system operation is achieved by considering external heat transfer irreversibilities at source and engine contact and at engine and sink contact (Figure 2).\nThe engine entropy balance expression results as:\n$Q ˙ H T H + Q ˙ U T C = 0$\nIt is clear that energy efficiency (equal to one in the ideal case without heat loss) does not depend on TU, nor TH, TC, but the system exergy efficiency does. By combining Equations (1) - (3), (6), (7), the exergy efficiency expression becomes:", null, "Figure 2. Schematic representation of the temperature distribution in a non-equilibrium CHP Carnot system.\nFigure 2. Schematic representation of the temperature distribution in a non-equilibrium CHP Carnot system.\nIf $Q ˙ H = Q ˙ S H$ is imposed, the maximum of efficiency gives back the equilibrium case (TC = TSC = TU; TH = TSH). But the necessary finite heat transfer rate imposes through the entropy balance a constraint relating the two degrees of freedom (TC, TH).\nFor the case of linear heat transfer law considered as an example, where:\n$Q ˙ H = K H ( T S H − T H )$\n$Q ˙ C = K C ( T U − T C )$\nThe optimization with respect to TC, TH by using Lagrangian method (for details of variational calculus see [29,30]) gives:", null, "", null, "where the heat transfer conductances KH, KC are parameters associated to a given design.\nConsequently one gets from Equation (6) combined with Equations (1)–(4), and (16):", null, "Equation (17) corresponds to the endoreversible case without heat losses and shows that optimal exergy does not depend on the level of TU. Furthermore, a constrained dimension imposed to the system, namely the total heat transfer conductance, KH + KC = KT, for the case without heat losses, but with internal irreversibilities of the convertor yields for Equations (16) and (17) the following expressions:", null, "", null, "This results in a new optimum regarding the finite heat transfer conductances when the total heat transfer conductance is fixed.\nBy derivation of Equation (19) the best allocation of heat transfer conductances corresponds to:", null, "Equation (20) expresses that a maximum of the useful heat exergy is obtained at equipartition of the heat transfer conductances for the endoreversible case (without internal irreversibilities, $S ˙ i$ = 0):\n$K H * = K C * = K T 2$\nHence, the maximum exergy rate of the useful energy supplied by CHP results as:", null, "One notes that if lim TC = TU is considered (Chambadal-Novikov limit [31,32]), KC tends to infinity, $T H * = T 0 T S H$ whatever KH is. A numerical example considering TSH = 2000 K, T0 = 300 K, will get $T H *$ = 100$60$ ≈ 775 K which is closed to the common values used today. The main result is that Equation (22) is a useful upper bound for all the ECE cases.\n\n## 4. Optimization with Constraints\n\nThe use and design of a CHP system is characterized by the ratio of useful heat transfer rate to useful power, $R = Q ˙ U / W ˙$. Two other parameters can be added to this one corresponding to the two possible priorities, the mechanical power load, $W ˙ 0$, or the useful heat load, $Q ˙ U 0$. The last more significant case could be the hot source heat transfer rate limited to $Q ˙ S H 0$. These alternatives correspond to one technical added constraint that suppresses one degree of freedom for the optimization. The four previously cited cases will be considered hereafter, and new corresponding results for the Carnot endoreversible CHP system without heat losses will be given.\n\n#### 4.1. Carnot CHP System with R Imposed\n\nThe optimization of the energy efficiency of CHP from a general point of view is the same as the optimization of the engine efficiency. By considering the ratio of useful heat transfer rate to useful power in the model and after some simple calculations, it comes for the endoreversible system:\n$T C T H = R 0 1 + R 0$\nwhere R0 is the imposed value of the R ratio whatever expressions are used for the heat transfer law, and the available heat transfer rate at hot source. In the frame of equilibrium thermodynamics, Equation (23) becomes:\n$T U T S H = R 0 1 + R 0$\nOne notes that the ratio R0 is fundamentally related to the Carnot efficiency of the engine according to:\n$R 0 = 1 − 1 / η C$\nFor linear heat transfer law (KH, KC -parameters) considered in the model, the corresponding exergy rate of the useful energy supplied by CHP results by combining Equations (6), (13), (14) and (24) as:", null, "with:\n$X 0 = 1 + R 0 R 0$\nIt is easy to demonstrate that optimum optimorum of useful effect is given again by Equation (22), but R0, TU, TSH are interrelated at the optimum by:\n$1 + R 0 R 0 T U = T S H T 0$\nThis important relation means that for TSH parameter, R0 opt satisfies Equation (28) for a chosen TU or TU opt satisfies Equation (28) for an imposed R0.\nNote that Equation (26) could be enlarged when an irreversibility ratio is considered. Its expression becomes:", null, "This expression allows an optimum for a specific value of X0 relating TSH, T0 and TU, as expressed by Equations (27) and (28). This result is a new one. When imposing finite heat transfer conductances, KH + KC = KT, the conductance equipartition is found again for .\n\n#### 4.2. Carnot CHP System with $W ˙$ Imposed\n\nThe same methodology as for engine optimization is used here, but by adding the constraint $W ˙ = W ˙ 0$, an intermediate variable α appears:", null, "The optimum of $E ˙ x U$ corresponds to equipartition of heat transfer conductances previously found for an endoreversible system, and α opt satisfies the following equation that yields by combining Equations (14), (21), and (30) together with the constraint $W ˙ = W ˙ 0$ in Equation (6) and derivation with respect to TU:", null, "The equilibrium thermodynamics limit is straight forward ($W ˙ 0 = 0$), namely, the corresponding limit of the energy and exergy efficiency tends to one, for reversible and no heat losses operating regime.\nIf", null, ", an interesting limit appears:", null, "and the corresponding approximated yields:", null, "Equation (33) shows that the optimized exergy of the useful energy supplied by CHP is proportional to the imposed power $W ˙$, but amplified by the temperature ratio (TSHT0)/(TSHTU).\n\n#### 4.3. Useful Heat Transfer Rate Imposed\n\nThe heat utility is the priority in this case by its imposed value, $Q ˙ U = Q ˙ U 0$. By following the same steps as in Section 4.2, one finds that the optimum of $E ˙ x U$ corresponds to the equipartition of heat transfer conductances, and αopt becomes:", null, "The corresponding results:", null, "By derivation of Equation (35) with respect to TU, one can show that an optimum optimorum of $E ˙ x U$ exists, but it requires:", null, "Again, Equation (22) is valid for .\n\n#### 4.4. Heat Transfer Rate at the Source Imposed\n\nThe consumed heat transfer rate corresponds to the heat transfer rate input, which is now imposed, $Q ˙ S H = Q ˙ S H 0$. The optimum exergy of the useful energy supplied by CHP associated to this constraint appears for conductance equipartition, and its expression is:", null, "Here again a maximum maximorum exists and corresponds to:", null, "It always leads to the Equation (22) for .\n\n#### 4.5. Partial Conclusion\n\nThe models presented in Section 4 point out that in the presence of constraints the optimum of the useful exergy function does exist and it is given by the Equations (26), (34), and (36). The optimum of these optima [Equation (22)], results by derivation of the previously mentioned relations and it corresponds to special values of the constrained parameters. The expression of does not depend on TU, but is proportional to KT that relates it to the size of the system.\nLastly an interesting constraint to discuss is when TSH = TMAX. It was shown that is an increasing function of TSH. Actually TSH is limited at a given value imposed by the thermomechanical strength of materials, which means that one cannot increase it as much as we want. Moreover, it is known that for non-adiabatic system this limitation corresponds to the stagnation temperature. This is a current practice for solar systems and it could be also for ICE, when considering the stagnation temperature to be less or equal to the adiabatic temperature of combustion. However for a non- adiabatic system, a new optimum exists, limited by the stagnation temperature of the system .\nThese extensions will be summarized hereafter (Section 5). It has been shown that it comes out from material limitations and it is designated by TMAX.\n\n## 5. Discussion—Comparisons\n\nSome results of the model will be exemplified in Table 1 with corresponding comments given hereafter. Extensive examination of CHP configurations using thermo-equilibrium thermodynamics does not exhibit the optima for the studied systems. Moreover, first law efficiencies are not appropriate to qualify performance of these systems, so that exergetic efficiencies are recommended. Actually, First Law analysis does not provide an optima of the useful energy rate. It is not the case for exergy analysis, where the heat quality is accounted. The present study has been done for evaluating the useful exergy rate in relation with finite dimensions of the system given by heat transfer conductances to allocate, and with the maximum allowed temperature for the system.\n\n#### 5.1. Thermodynamic Optimization of Carnot CHP Systems\n\nIt was shown that when Finite Dimensions of the systems are considered, and pre-established criteria are used, optimum configurations exist, relative to temperature distribution and design variables of the system (heat transfer conductances, heat transfer rate, heat exchanger effectiveness). The Carnot cycle was chosen to show the optimization results because it is generally the reference cycle regarding steam turbines. Also, the main constraints applied to the cycle appear to move strongly the obtained optimal results. In any cases we have got the same upper bound given by Equation (19). It represents the upper bound (reference) of the exergy rate obtainable for a Carnot CHP system related to finite size through the total heat transfer conductance, KT, and maximum temperature, TSH, with regard to environment temperature, T0.\nThe proposed model includes heat losses from the system to ambiance, and also internal irreversibilities of the converter. The internal irreversibilities can be considered by two ways, (1) through entropy rate created inside the system $S ˙ i$ or (2) through an irreversibility ratio, which is the most used irreversibility representation. The Carnot CHP system extensions were reported in .\nTable 1 gives the results obtained for the Carnot adiabatic CHP system and when the irreversibility ratio I is considered, and under various proposed added constraints. These results convey to the evidence that the optimal allocation of heat transfer conductances does not depend on the added constraints. In every case, the results differ from equipartition because:", null, "The optimal temperature of the working fluid depends on the added constraint. The temperature TH opt is nondependent explicitly of TU, except when the ratio R = R0 is imposed. The objective function of the studied CHP systems is logically the exergy rate, $E ˙ x U$, of the useful energy delivered by CHP. It is composed by the sum of the useful mechanical exergy, $W ˙$, and the useful heat exergy. Its optimal value is depending on the studied case, as given in Table 1.\nThe maximum maximorum of $| E ˙ x U |$ corresponds to:", null, "One notes that this value does not depend on TU, the useful heat temperature level. The same conclusion holds, if the entropy rate method is chosen:", null, "Complementary results have been published, when the CHP system is a non adiabatic one. In that case, the maximum attainable temperature of the system, the stagnation temperature TS, is a useful quantity to be introduced. Hence, a new compromise between the heat transfer conductances and the heat losses has been defined (see for some details).\nTable 1. Carnot CHP system optimization, with added constraint, and irreversibility ratio method.\n optimum TH opt TC opt $| E ˙ x U | o p t$ Added constraint without", null, "", null, "", null, "$Q ˙ H = Q ˙ H 0$", null, "", null, "", null, "R = R0", null, "", null, "", null, "$W ˙ = W ˙ 0$*", null, "", null, "", null, "$Q ˙ U = Q ˙ U 0$*", null, "", null, "", null, "* Some details regarding the derivation of αopt expression are given in the Appendix.\n\n#### 5.2. Optimization of Other CHP Configurations\n\nAs can be seen in Figure 1, a Stirling or Ericsson engine is an externally fired CHP system. Hence, the results have great similarity with the previous examined ones (Section 4). Complementary results could be found in a recent report . Contrarily Otto (Diesel) CHP systems, as well as Joule CHP systems, are internally fired. Due to this common issue, an insight to CHP system based on gas turbine engine is given hereafter. The optimization corresponds to the constraint of TMAX, the maximum imposed temperature, as it is well known that this condition is actually the most limiting one for gas turbines, in order to preserve material properties.\nDetails of the model can be found in a recently published paper . The heat exchangers model uses the NTU-effectiveness model: the corresponding effectiveness is εR for recuperator and εU for the useful heat exchanger. For the Joule CHP system cycle illustrated in Figure 1d, the First Law has the same expression remains as for all ICE engines:\n$W ˙ + Q ˙ H + Q ˙ U + Q ˙ C = 0$\nwhere:\n$Q ˙ H = C ˙ ( T M A X − T X )$\nwhere $C ˙ = m ˙ · c p$ is the heat capacity rate of the working fluid in the cycle, and:\n$T X = ε R · T 4 + ( 1 − ε R ) · T 2$\nThe rejected heat transfer rate from the turbine is:\n$Q ˙ U + Q ˙ C = C ˙ ( T 0 − T Y )$\nwith:\n$T Y = T 4 · ( 1 − ε R ) + ε R · T 2$\nBy combining Equations (42)−(46) the mechanical power is:", null, "where T2 results from Equation (7) after some calculations:\n$T 2 = T M A X T 0 k T 4$\nand the irreversibility factor is given by:\n$k = exp [ − S ˙ i / C ˙ ]$\nBy taking into account the above expressions, Equation (6) becomes for this case:", null, "The optimum exergy rate of the useful energy supplied corresponds to the derivation of Equation (50) with respect to T2 or T4 that are related by Equation (48). One can easily get:", null, "", null, "with:", null, "", null, "The corresponding $M A X | E ˙ x U |$ is obtained from Equations (50)–(52) as:", null, "Equation (55) allows to one to determine the maximum exergy rate of the useful energy supplied depending on system parameters, namely the effectiveness of the recuperator and useful heat HEX, temperatures and the irreversibility factor.\nAll the results detailed in this section are relative to the gas turbine engine configuration where the recuperator and the useful heat HEX are connected in series at the turbine exit. Therefore, the temperatures constraint should be: TU < TY < T4, in order to ensure the optimisation solution.\nSome limit cases are interesting to note for the previously reported Joule CHP systems:\n• perfect heat recuperation given by εR = 1. It involves:", null, "The maximum exergy rate of the useful energy supplied (Equation (55)) results as:", null, "• perfect useful heat HEX provided by εU = 1. It involves:", null, "For this case Equation (55) with a = aR and b = bR provides the optimum result.\n• perfect heat exchangers: εR = 1 and εU = 1. It involves:\nand:", null, "Equation (60) constitutes an upper bound depending on the three temperatures (T0, TU, TMAX) and also considering the cycle irreversibilities by the factor k. The endoreversible operation corresponding to k = 1 is straightforward.\n• no heat recuperation: εR = 0. For this case:", null, "and Equation (55) yields:", null, "Figure 3. Evolution of the non-dimensional optimum temperature at the turbine exit, $t 4 *$, as a function of TU for TMAX variable.\nFigure 3. Evolution of the non-dimensional optimum temperature at the turbine exit, $t 4 *$, as a function of TU for TMAX variable.\nFigure 4. Evolution of $t 4 *$ as a function of tU for irreversibility factor k as variable.\nFigure 4. Evolution of $t 4 *$ as a function of tU for irreversibility factor k as variable.\nNote that a0 = bR, so one could say that Equation (57) is identical to Equation (62). Although they are formally identical, the provided optimum is different due to the variation range of TU which is greater for the present case compared to the previous one (εR = 1). Other gas turbine CHP systems were studied and these results are currently in press [36,37].\nFigure 3 and Figure 4 illustrate the influence of TU level on the optimum temperature T4 at the turbine exit, for different values of the non-dimensional maximum allowed temperature, respectively, irreversibility factor, k. Note that the main parameter of the model is the non-dimensional temperature corresponding to the useful heat temperature level, given by:\n$t U = T U T 0$\nand the non-dimensional value of the maximum allowed temperature with respect to the ambient one, is:\n$t M A X = T M A X T 0$\nSo, if the non-dimensional useful heat temperature level, tU, increases, the optimal non-dimensional temperature t4 diminishes. This decrease is more pronounced as tMAX increases (Figure 3), and remains proportional as k increases (Figure 4). Otherwise, t4 opt increases with the allowed tMAX. For example, the non-dimensional optimum temperature at the turbine exit increases twice when the non-dimensional value of the maximum allowed temperature with respect to the ambient one increases from 2 to 8. Also, t4 opt increases significantly with the internal irreversibility of the turbine that corresponds to the decrease of k (Figure 4). Hence, an almost constant growth of 0.35 is registered by t4 opt when k decreases with 0.25. These models are presently under development.\n\n## 6. Conclusions\n\nThe thermodynamics of Combined Heat and Power Systems has been reviewed, with a particular focus on the most common ones which are the thermo-mechanical systems. Two main categories were proposed:\n-\nECE, External Combustion Engine;\n-\nICE, Internal Combustion Engine;\nOptimization criteria for these systems are reviewed. The analysis confirmed that the First Law efficiency criterion is only representative of the system thermal losses (non-adiabatic operation), so it is recommended to use exergy efficiency, that takes into account the heat quality, and also qualifies the irreversibilities of the converter (engine) or of the system depending on the model used (Section 3.2). Hence, the exergy analysis is revealed by the present report to be the main tool for CHP systems study due to simultaneous consideration of work and heat by their exergy, that differs for the heat from its value.\nFurthermore, it was shown by the mathematical approach particularized for Carnot system that optimization could be performed only if the finite size of the system is considered; equilibrium thermodynamics being not able to provide optima. The finite size optima obtained are coherent with the observed ones.\nVarious significant added constraints were proposed, they being useful for the design of specific systems and allowing to precise the influence on the design of the model parameters. Upper bound of the exergy rate of the usable energy were determined by consideration of the main constraints of the CHP systems: (1) imposed heat to power ratio R0; (2) imposed useful power $W ˙ 0$ (electrical or mechanical priority), (3) imposed useful heat transfer rate $Q ˙ U 0$ (heat demand priority), and lastly (4) imposed available source heat transfer rate $Q ˙ S H 0$. The main tendencies for Carnot CHP system were presented in Table 1 proving the optima existence and showing the dependence on the model parameters of the optimum temperatures of the working gas at source and sink, and of the optimum exergy rate of the usable energy.\nThe upper bound of the exergy rate of the useful energy delivered by the Carnot CHP system was obtained [Equation (22)]. It is a very important result, as it is the equivalent of the “nice radical” of Curzon-Ahlborn approach. Also, its expression contains the total heat transfer conductance to be allocated to the system that appears as the size factor of the maximum exergy rate.\nAmong other CHP systems that have been examined, the Gas Turbine Engine-based one is considered the more representative CHP system for industrial applications. The corresponding optimum of the exergy rate of the useful energy delivered by the CHP system was derived and the upper bound was determined in the case where maximum temperature of the working gas, TMAX, is fixed. This case is the most significant for the present state of the art of Gas Turbine Engine. The expressions of the optimum exergy rate of the useful energy delivered to the consumer were presented for several limiting case, and have shown the dependence on the recuperator and useful heat exchanger effectiveness, temperatures TMAX, TU, T0, and internal irreversibilities by the internal entropy generation rate, $S ˙ i$.\nThe Gas Turbine Engine CHP system illustrates the Internal Combustion Engine CHP configuration. Thus, the present methodology could be applied to Otto or Diesel CHP configurations appropriate for small and household applications. Further extension of these models is presently under development in order to allow the comparison of different constrained cases and to offer an overview on the performance of various existing CHP systems.\n\n## Nomenclature\n\n $C ˙$ heat capacity rate [W K−1]; cp mass specific heat at constant pressure [W kg−1 K−1]; $E ˙ X$ exergy rate [W]; $m ˙$ mass flow rate of the working gas in the cycle [kg s−1]; I irreversibility ratio; K heat transfer conductance [W K−1]; NTU number of heat transfer units; $Q ˙$ heat transfer rate [W]; R ratio of useful heat transfer rate to useful power; $S ˙$ entropy rate [W K−1]; T temperature [K]; t no dimensional temperature; X temperature difference [K]; $W ˙$ mechanical power [W];\n\n## Greek symbols\n\n $ε$ heat exchanger effectiveness; $η$ efficiency; $α$ intermediate variable;\n\n## Subscripts and superscripts\n\n C related to the working fluid, at the sink; c consumed or Carnot; CHP combined heat and power system; ECE external combustion engine; ex exergetic; GT gas turbine; H related to the working fluid, at the source; i internal; ICE internal combustion engine; L loss; PV/T photovoltaic/thermal system; R recuperator; SH source; SC sink; T total; U useful; I related to first law; 0 ambient or imposed value; * optimal\n\n## Appendix\n\nThis annex gives the αopt value announced in Table 1:\nIf $W ˙ = W ˙ 0 < 0$\nαopt is the solution of the equation:\n$a α 2 − b α − c = 0$\nwith:", null, "", null, "", null, "If $Q ˙ U = Q ˙ U 0 < 0$\n$α o p t = d 1 + d$\nwith:", null, "## References\n\n1. Wakui, T.; Yokoyama, R. Optimal sizing of residential gas engine cogeneration system for power interchange operation from energy-saving viewpoint. Energy 2011, 36, 3816–3824. [Google Scholar] [CrossRef]\n2. Radulescu, M. Combined Electricity and Heat Production Systems with PEMFC or SOFC Fuel Cells and External Vapor Reforming. Ph.D. Thesis, Nancy University, Nancy, France, September 2006. [Google Scholar]\n3. Milia, D.; Sciubba, E. Exergy-based lumped simulation of complex systems: An interactive analysis tool. Energy 2006, 31, 100–111. [Google Scholar] [CrossRef]\n4. Descieux, D. Modelling and Exergetic Comparison of Cogeneration Systems. Ph.D. Thesis, Nancy University, Nancy, France, November 2007. [Google Scholar]\n5. Pehnt, M. Environmental impacts of distributed energy systems—The case of micro cogeneration. Environ. Sci. Policy 2008, 11, 25–37. [Google Scholar] [CrossRef]\n6. Abusoglu, A.; Kanoglu, M. First and second law analysis of diesel engine powered cogeneration systems. Energy Convers. Manag. 2008, 49, 2026–2031. [Google Scholar] [CrossRef]\n7. Zhai, H.; Dai, Y.J.; Wu, J.Y.; Wang, R.Z. Energy and exergy analyses on a novel hybrid solar heating, cooling and power generation system for remote areas. Appl. Energy 2009, 86, 1395–1404. [Google Scholar] [CrossRef]\n8. Abusoglu, A.; Kanoglu, M. Exergoeconomic analysis and optimization of combined heat and power production: A review. Renew. Sustain. Energy Rev. 2009, 13, 2295–2308. [Google Scholar] [CrossRef]\n9. Aussant, C.D.; Fung, A.S.; Ugursal, V.I.; Taherian, H. Residential application of internal combustion engine based cogeneration in cold climate—Canada. Energy Build. 2009, 41, 1288–1298. [Google Scholar] [CrossRef]\n10. Nieminen, J.; Dincer, I. Comparative exergy analyses of gasoline and hydrogen fuelled ICEs. Int. J. Hydrogen Energy 2010, 35, 5124–5132. [Google Scholar] [CrossRef]\n11. El-Emam, R.S.; Dincer, I. Energy and exergy analyses of a combined molten carbonate fuel cell—Gas turbine system. Int. J. Hydrogen Energy 2011, 36, 8927–8935. [Google Scholar] [CrossRef]\n12. Bingöl, E.; Kılkış, B.; Eralp, C. Exergy based performance analysis of high efficiency poly-generation systems for sustainable building applications. Energy Build. 2011, 43, 3074–3081. [Google Scholar] [CrossRef]\n13. Doluweera, G.H.; Jordaan, S.M.; Moore, M.C.; Keith, D.W.; Bergerson, J.A. Evaluating the role of cogeneration for carbon management in Alberta. Energy Policy 2011, 39, 7963–7974. [Google Scholar] [CrossRef]\n14. Barelli, L.; Bidini, G.; Gallorini, F.; Ottaviano, A. An energetic–Exergetic comparison between PEMFC and SOFC-based micro-CHP systems. Int. J. Hydrogen Energy 2011, 36, 3206–3214. [Google Scholar] [CrossRef]\n15. Ji, J.; Liu, K.; Chow, T.T.; Pei, G.; He, H. Thermal Analysis of PV/T Evaporator of A Solar Assisted Heat Pump. Int. J. Energy Res. 2007, 31, 525–545. [Google Scholar] [CrossRef]\n16. Thilak Raj, N.; Iniyan, S.; Goic, R. A review of renewable energy based cogeneration technologies. Renew. Sustain. Energy Rev. 2011, 15, 3640–3648. [Google Scholar] [CrossRef]\n17. Ibrahim, A.; Othman, M.Y.; Ruslan, M.H.; Mat, S.; Sopian, K. Recent advances in flat plate photovoltaic/thermal (PV/T) solar collectors. Renew. Sustain. Energy Rev. 2011, 15, 352–365. [Google Scholar] [CrossRef]\n18. Obernberger, I.; Carlsen, H.; Biedermann, F. State of the Art and Future Developments Regarding Small Scale Biomass CHP Systems with a Special Focus on ORC and Stirling Engine Technologies. In Proceedings of the 2003 International Nordic Bioenergy Conference, Jyväskylä, Finland, 2–5 September 2003.\n19. Uddin, S.N.; Barreto, L. Biomass-fired cogeneration systems with CO2 capture and storage. Renew. Energy 2007, 32, 1006–1019. [Google Scholar] [CrossRef]\n20. Zhang, X.; Su, S.; Chen, J.; Zhao, Y.; Brandon, N. A new analytical approach to evaluate and optimize the performance of an irreversible solid oxide fuel cell-gas turbine hybrid system. Int. J. Hydrogen Energy 2011, 36, 15304–15312. [Google Scholar] [CrossRef]\n21. Vuillecard, C.; Hubert, C.E.; Contreau, R.; Mazzenga, A.; Stabat, P.; Adnot, J. Small scale impact of gas technologies on electric load management—μCHP & hybrid heat pump. Energy 2011, 36, 2912–2923. [Google Scholar] [CrossRef]\n22. Lowe, R. Combined heat and power considered as a virtual steam cycle heat pump. Energy Policy 2011, 39, 5528–5534. [Google Scholar] [CrossRef]\n23. Wang, J.J.; Jing, Y.Y.; Zhang, C.F. Weighting Methodologies in Multicriteria Evaluations of CHP Systems. Int. J. Energy Res. 2009, 33, 1023–1039. [Google Scholar] [CrossRef]\n24. Chua, K.J.; Yang, W.M.; Wong, T.Z.; Ho, C.A. Integrating renewable energy technologies to support building trigeneration—A multi-criteria analysis. Renew. Energy 2012, 41, 358–367. [Google Scholar] [CrossRef]\n25. Rubio-Maya, C.; Uche-Marcuello, J.; Martínez-Gracia, A.; Bayod-Rújula, A.A. Design optimization of a polygeneration plant fuelled by natural gas and renewable energy sources. Appl. Energy 2011, 88, 449–457. [Google Scholar] [CrossRef]\n26. Lévy, C. Les techniques de cogénération. In Techniques de l’Ingénieur, Traité de Génie Energétique; Editions TI: Paris, France, 1996; pp. 1–24. [Google Scholar]\n27. Feidt, M. L’Integration des Systèmes Energétiques. In Energétique; Dunod: Paris, France, 2006; pp. 889–909. [Google Scholar]\n28. Sahin, B.; Kodal, A. Recent Advances in Finite Time Thermodynamics; Wu, C., Chen, L., Chen, J., Eds.; Nova Science Publishers: New York, NY, USA, 1999; pp. 289–299. [Google Scholar]\n29. Feidt, M. Optimal Thermodynamics—New Upper Bounds. Entropy 2009, 11, 529–547. [Google Scholar] [CrossRef]\n30. Feidt, M.; Lang, S. Conception optimale de systèmes combinés à génération de puissance, chaleur et froid. Entropie 2002, 242, 2–11. [Google Scholar]\n31. Chambadal, P. Les Centrales Nucléaires; Armand Colin: Paris, France, 1957; pp. 41–58. [Google Scholar]\n32. Novikov, I.I. The Efficiency of Atomic Power Stations. J. Nucl. Energy 1958, 7, 125–128. [Google Scholar]\n33. Feidt, M.; Costea, M.; Petre, C.; Petrescu, S. Optimization of Direct Carnot Cycle. Appl. Therm. Eng. 2007, 27, 829–839. [Google Scholar] [CrossRef]\n34. Samba, A. Microcogeneration: Thermodynamic Optimization and Adaptability to Different Fuels. M.Sc. Thesis, Ecole des Mines, Nancy, France, February 2010. [Google Scholar]\n35. Feidt, M.; Costea, M.; Postelnicu, V. Comparison between the Brayton Cycle with Imposed Thermal Input and Maximal Temperature Constraint. Oil Gas Sci. Technol. Rev. 2006, 61, 237–247. [Google Scholar] [CrossRef]\n36. Costea, M.; Feidt, M.; Alexandru, G.; Descieux, D. Optimization of Gas Turbine Cogeneration System for Various Heat Exchanger Configurations. Oil Gas Sci. Technol. Rev. 2012, 67, 517–535. [Google Scholar] [CrossRef]\n37. Tirca-Dragomirescu, G.; Costea, M.; Feidt, M.; McGovern, J.; Dobrovicescu, A.; Tutica, D.; Kheiri, A. Modelling and Optimization of Heat Exchangers within Gas Turbine Systems. In Proceedings of Engineering Systems Design and Analysis Conference (ESDA 2012), Nantes, France, 2–4 July 2012." ]
[ null, "https://www.mdpi.com/profiles/masked-unknown-user.png", null, "https://www.mdpi.com/profiles/masked-unknown-user.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i001.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i002.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i003.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i004.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i005.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i006.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i006.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i007.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i008.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i009.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i010.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i011.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i012.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i013.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i014.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i015.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i016.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i017.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i018.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i019.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i020.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i021.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i022.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i023.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i024.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i025.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i026.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i027.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i028.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i029.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i030.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i031.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i032.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i033.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i034.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i035.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i036.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i037.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i038.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i039.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i040.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i041.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i042.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i043.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i044.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i045.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i046.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i047.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i048.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i049.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i050.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i051.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i052.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i053.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i054.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i055.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i056.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i057.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i058.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i059.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i060.png", null, "https://www.mdpi.com/energies/energies-05-03701/article_deploy/html/images/energies-05-03701-i061.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88702476,"math_prob":0.9131855,"size":42405,"snap":"2019-43-2019-47","text_gpt3_token_len":9612,"char_repetition_ratio":0.15834533,"word_repetition_ratio":0.03480916,"special_character_ratio":0.22155406,"punctuation_ratio":0.15603197,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98882675,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128],"im_url_duplicate_count":[null,null,null,null,null,1,null,1,null,1,null,1,null,1,null,2,null,2,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-16T22:06:06Z\",\"WARC-Record-ID\":\"<urn:uuid:ab18f7c2-e3f3-4cd5-9dc7-0ff9c45a6d6a>\",\"Content-Length\":\"232032\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ee608e82-d818-4a01-ae83-a8092c4b033e>\",\"WARC-Concurrent-To\":\"<urn:uuid:612fe7d0-b765-4b0a-84b8-d1e9697c5165>\",\"WARC-IP-Address\":\"104.16.10.68\",\"WARC-Target-URI\":\"https://www.mdpi.com/1996-1073/5/9/3701/htm\",\"WARC-Payload-Digest\":\"sha1:LLPCC4KLOB225OOPUSF5LBZ2UFWCKNQW\",\"WARC-Block-Digest\":\"sha1:4FRBIQYJJ4JIDSTETMV2EEEKZRQFZ3CW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496668765.35_warc_CC-MAIN-20191116204950-20191116232950-00552.warc.gz\"}"}
http://simul.iro.umontreal.ca/latbuilder/doc/d5/d98/hightut.html
[ "Lattice Builder Manual Software Package for Constructing Rank-1 Lattices\nHigh-Level API Tutorial\n\nThis tutorial shows how to use high-level features of the Lattice Builder application programming interface (API), in the context of simulation software.\n\nSimulation software written in an arbitrary language can always make use of Lattice Builder by invoking the command-line tool with appropriate options (see the Command-Line Tutorial) and by parsing its text output to extract the generating vector from the results. This is what the Lattice Builder Web Application does. Calling an external command can be done in most programming languages.\n\nFrom software written in C++, it is also possible avoids the overhead of loading and executing an external program by directly calling functions of the Lattice Builder library instead of invoking the command-line tool. In fact, the command-line tool is just an interface to the API described in this tutorial.\n\nThe complete code of the examples in this tutorial can be found under the latbuilder/examples/tutorial/ directory.\n\nThe Parser namespace contains the tools to make calls to Lattice Builder using text arguments similar to those of the command-line tool (see Command-Line Tutorial). The Parser::Search class provides a parse() method that returns a pointer to a Task::Search instance. The arguments to parse() are all text of the same format as the command-line arguments (in the following order) to:\n\n• --construction\n• --lattice-type\n• --size\n• --dimension\n• --figure-of-merit\n• --weights\n• --filters\n• --multilevel-filters\n• --combiner\n\n# Constructing and Using Ordinary Lattice Rules\n\nThe following piece of code calls Lattice Builder to perform a fast CBC construction of an ordinary lattice rule with $$n=2^8$$ points in dimension 10 using the coordinate-uniform implementation (required by fast CBC) of the $$\\mathcal P_2$$ criterion, with product weights with $$\\gamma_j=0.1$$ for all $$j$$, using no filters:\n\nLatticePoints search()\n{\ncmd.construction = \"fast-CBC\";\ncmd.size = \"2^8\";\ncmd.dimension = \"10\";\ncmd.figure = \"CU:P2\";\ncmd.weights = std::vector<std::string>{\"product:0.1\"};\ncmd.weightsPowerScale = 1.0;\ncmd.normType = \"2\";\nauto search = cmd.parse();\nstd::cout << *search << std::endl;\nsearch->execute();\nstd::cout << \"BEST LATTICE: \" << search->bestLattice() << std::endl;\nstd::cout << \"MERIT: \" << search->bestMeritValue() << std::endl;\nconst auto& lat = search->bestLattice();\nreturn LatticePoints(lat.sizeParam().numPoints(), lat.gen());\n}\n\nThe combiner argument is set to a valid value, but it is not used. The resulting lattice definition can be retrieved with search->bestLattice(). Our function returns an instance of the virtual container LatticePoints, defined in tutorial/LatticePoints.h as:\n\n// Copyright (c) 2012 David Munger, Pierre L'Ecuyer, Université de Montréal.\n//\n// This file is part of Lattice Builder.\n//\n// Lattice Builder is free software: you can redistribute it and/or modify\n// the Free Software Foundation, either version 3 of the License, or\n// (at your option) any later version.\n//\n// Lattice Builder is distributed in the hope that it will be useful,\n// but WITHOUT ANY WARRANTY; without even the implied warranty of\n// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n// GNU General Public License for more details.\n//\n// You should have received a copy of the GNU General Public License\n// along with Lattice Builder. If not, see <http://www.gnu.org/licenses/>.\n#ifndef LATTICE_POINTS_H\n#define LATTICE_POINTS_H\n// virtual container for lattice points\nclass LatticePoints {\npublic:\n// standard container type definitions\ntypedef std::vector<double> value_type;\ntypedef size_t size_type;\nLatticePoints(size_type numPoints, std::vector<unsigned long> gen):\nm_numPoints(numPoints),\nm_intGen(std::move(gen)),\nm_gen(m_intGen.size())\n{ updateGen(); }\n// returns the number of points of the lattice rule\nsize_type numPoints() const { return m_numPoints; }\n// returns the number of points of the lattice rule\nsize_type size() const { return m_numPoints; }\n// returns the lattice dimension\nsize_type dimension() const { return m_gen.size(); }\n// returns the i-th lattice point\nvalue_type operator[](size_type i) const\n{\nstd::vector<double> point(dimension());\nfor (size_type j = 0; j < point.size(); j++) {\ndouble x = i * m_gen[j];\npoint[j] = x - int(x);\n}\nreturn point;\n}\nprivate:\nsize_type m_numPoints;\nstd::vector<unsigned long> m_intGen;\nstd::vector<double> m_gen;\nvoid updateGen()\n{\nfor (size_type j = 0; j < m_gen.size(); j++)\nm_gen[j] = double(m_intGen[j]) / m_numPoints;\n}\n};\n#endif\n\nwhich can be used to enumerate the lattice points. The following piece of code shows how it could be used by simulation software.\n\nvoid simulate(const LatticePoints& lat)\n{\nfor (size_t i = 0; i < lat.size(); i++)\nstd::cout << \"point \" << i << \":\\t\" << lat[i] << std::endl;\n}\n\nIn this example, we just print the points to standard output; in practice we would use them to integrate multidimensional functions. The complete example can be found in tutorial/ParserFastCBC.cc.\n\n# Constructing and Using Embedded Lattice Rules\n\nTo construct embedded lattices, we change the lattice type to embedded and the combiner to sum:\n\ncmd.construction = \"fast-CBC\";\ncmd.size = \"2^8\";\ncmd.dimension = \"10\";\ncmd.figure = \"CU:P2\";\ncmd.weights = std::vector<std::string>{\"product:0.1\"};\ncmd.weightsPowerScale = 1.0;\ncmd.normType = \"2\";\ncmd.multilevelFilters = std::vector<std::string>{\"norm:P2-SL10\", \"low-pass:1.0\"};\ncmd.combiner = \"sum\";\nauto search = cmd.parse();\n\nWe also add normalization and low-pass filters:\n\ncmd.multilevelFilters = std::vector<std::string>{\"norm:P2-SL10\", \"low-pass:1.0\"};\n\nAnd, our search() functions now returns an instance of EmbeddedLatticePoints instead of LatticePoints:\n\nconst auto& lat = search->bestLattice();\nreturn EmbeddedLatticePoints(lat.sizeParam().base(), lat.sizeParam().maxLevel(), lat.gen());\n\nThe virtual container EmbeddedLatticePoints is defined in tutorial/EmbeddedLatticePoints.h as:\n\n// Copyright (c) 2012 David Munger, Pierre L'Ecuyer, Université de Montréal.\n//\n// This file is part of Lattice Builder.\n//\n// Lattice Builder is free software: you can redistribute it and/or modify\n// the Free Software Foundation, either version 3 of the License, or\n// (at your option) any later version.\n//\n// Lattice Builder is distributed in the hope that it will be useful,\n// but WITHOUT ANY WARRANTY; without even the implied warranty of\n// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n// GNU General Public License for more details.\n//\n// You should have received a copy of the GNU General Public License\n// along with Lattice Builder. If not, see <http://www.gnu.org/licenses/>.\n#ifndef EMBEDDED_LATTICE_POINTS_H\n#define EMBEDDED_LATTICE_POINTS_H\n// virtual container for lattice points\nclass EmbeddedLatticePoints {\npublic:\n// standard container type definitions\ntypedef std::vector<double> value_type;\ntypedef size_t size_type;\nEmbeddedLatticePoints(size_type base, size_type maxLevel, std::vector<unsigned long> gen):\nm_base(base),\nm_maxLevel(maxLevel),\nm_intGen(std::move(gen)),\nm_gen(m_intGen.size())\n{ reset(); }\n// returns to level 0\nvoid reset() { m_level = 0; m_numPoints = 1; updateGen(); }\n// increases the level\nvoid extend() { m_level++; m_numPoints *= m_base; updateGen(); }\n// returns the base for the number of points\nsize_type base() const { return m_base; }\n// returns the maximum level number\nsize_type maxLevel() const { return m_maxLevel; }\n// returns the current level number\nsize_type level() const { return m_level; }\n// returns the total number of points on the current level\nsize_type numPoints() const { return m_numPoints; }\n// returns the number of points on the current level but not on previous\n// levels\nsize_type size() const { return numPoints() <= 1 ? numPoints() : (base() - 1) * numPoints() / base(); }\n// returns the lattice dimension\nsize_type dimension() const { return m_gen.size(); }\n// returns the i-th lattice point that lies on the current levels but not on\n// previous levels\nvalue_type operator[](size_type i) const\n{\nstd::vector<double> point(dimension());\nfor (size_type j = 0; j < point.size(); j++) {\ndouble x = map(i) * m_gen[j];\npoint[j] = x - int(x);\n}\nreturn point;\n}\nprivate:\nsize_type m_base;\nsize_type m_maxLevel;\nstd::vector<unsigned long> m_intGen;\nstd::vector<double> m_gen;\nsize_type m_numPoints;\nsize_type m_level;\nsize_type map(size_type i) const { return numPoints() <= 1 ? i : (base() + 1) * (i + 1) / base(); }\nvoid updateGen()\n{\nfor (size_type j = 0; j < m_gen.size(); j++)\nm_gen[j] = double(m_intGen[j]) / m_numPoints;\n}\n};\n#endif\n\nFinally, we modify our simulate() function to use the points level by level:\n\nvoid simulate(EmbeddedLatticePoints lat)\n{\nwhile (lat.level() <= lat.maxLevel()) {\nstd::cout << \"==> level \" << lat.level() << std::endl;\nfor (size_t i = 0; i < lat.size(); i++)\nstd::cout << \"point \" << i << \":\\t\" << lat[i] << std::endl;\nlat.extend();\n}\n}\n\nThe complete example can be found in tutorial/ParserFastCBCEmbedded.cc." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5198962,"math_prob":0.943329,"size":6779,"snap":"2023-14-2023-23","text_gpt3_token_len":1749,"char_repetition_ratio":0.14701107,"word_repetition_ratio":0.23336968,"special_character_ratio":0.2839652,"punctuation_ratio":0.22575387,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99176186,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-30T20:50:52Z\",\"WARC-Record-ID\":\"<urn:uuid:ba3d9b71-c10c-4e53-8be1-9aaca099012e>\",\"Content-Length\":\"27891\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c12432c1-2457-432e-a700-87aa51e0311a>\",\"WARC-Concurrent-To\":\"<urn:uuid:c41ed641-dd6e-49c8-b7d8-e77dff83f95c>\",\"WARC-IP-Address\":\"132.204.26.154\",\"WARC-Target-URI\":\"http://simul.iro.umontreal.ca/latbuilder/doc/d5/d98/hightut.html\",\"WARC-Payload-Digest\":\"sha1:SSRFEIGRM2SPM5FW6MEXK2D2GOFMG43P\",\"WARC-Block-Digest\":\"sha1:IP3HMX7CZ7VZOUO3FOHTHJJ3ISCKIAXU\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296949387.98_warc_CC-MAIN-20230330194843-20230330224843-00557.warc.gz\"}"}
https://www.slideserve.com/andra/quiz
[ "", null, "Download", null, "Download Presentation", null, "Quiz\n\n# Quiz\n\nDownload Presentation", null, "## Quiz\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -\n##### Presentation Transcript\n\n1. Quiz • How many significant figures are there in the number 45.07 cm? (5 points) • Express the operations correctly (5 points each) a. 34.56 cm + 3 cm = b. 34.56 cm X 3 cm =\n\n2. Dimensions, Units, Metric System, Dimensional Analysis Homework: Skim Ch. 1. Complete the handout\n\n3. I. Dimensions. Physics is a science founded on observation and measurement. Measurements are used to convey information gained about the world around us. ____________ are measurable physical properties.\n\n4. I. Dimensions. Physics is a science founded on observation and measurement. Measurements are used to convey information gained about the world around us. Dimensions are measurable physical properties.\n\n5. Here are a few examples: Length, Time, Mass, Charge, Temperature, Rate, Speed\n\n6. Dimensions are divided into two types, ____________ and ____________. Fundamental dimensions are just as their name indicates, these are the basic building blocks used to set the framework of measurements.\n\n7. Dimensions are divided into two types, fundamental and derived. Fundamental dimensions are just as their name indicates, these are the basic building blocks used to set the framework of measurements.\n\n8. We will use only three basic building blocks for the entire first semester: ______, ____, and ____. Each of these is defined in section one of the text.\n\n9. We will use only three basic building blocks for the entire first semester: length, mass, and time. Each of these is defined in section one of the text.\n\n10. Derived dimensions are made of combinations of fundamental dimensions. Here are some examples: area = (length)2,volume = (length)3\n\n11. II. Units. Units are ____________ values given to the dimensions above. Standardization is necessary; else measurements can easily become meaningless. These are three main systems used today: _____, _____, and the _______ system\n\n12. II. Units. Units are standardized values given to the dimensions above. Standardization is necessary; else measurements can easily become meaningless. These are three main systems used today: _____, _____, and the _______ system\n\n13. II. Units. Units are standardized values given to the dimensions above. Standardization is necessary; else measurements can easily become meaningless. These are three main systems used today: m k s, c g s, and the british system\n\n14. The first two are part of the metric system, a system built off of powers of 10. SI, or mks, is the current standard.\n\n15. The mks stands for _____, ________, and ______, representing length, mass, and time\n\n16. The mks stands for meter, kilogram, and second, representing length, mass, and time\n\n17. The other, older system is cgs, which stands for __________, ____, and ______.\n\n18. The other, older system is cgs, which stands for centimeter, gram, and second.\n\n19. Each of the units has the same set of multipliers, allowing each unit to be increased or decreased in amount by factors of ten. These are the multipliers that you must memorize:\n\n20. The main benefit of the metric system is that it is ______, ___________, and _____________________. Here are some examples of the usage of the prefixes:\n\n21. The main benefit of the metric system is that it is simple, easy to use, and based on powers of 10. Here are some examples of the usage of the prefixes:\n\n22. The main benefit of the metric system is that it is simple, easy to use, and based on powers of 10. Here are some examples of the usage of the prefixes: kilogram = 1000 grams millimeter = 0.001 meter decibel = 0.1 bel\n\n23. III. Dimensional Analysis: Dimensional analysis refers to the process of converting one set of units into another. Here are a few examples:\n\n24. 1. 125 mL = ? L\n\n25. 2. 155 km = ? m\n\n26. 3. 8.5 mm = ? dm\n\n27. 3. 8.5 mm = ? dm\n\n28. 3. 8.5 mm = ? dm\n\n29. 4. 0.0278 kg = ? mg\n\n30. 4. 0.0278 kg = ? mg\n\n31. 5. 0.000 008 8 mm = ? dam\n\n32. 5. 0.000 008 8 mm = ? dam\n\n33. The conversions between metric and British units are not as easy. The conversions are actually definitions, and are considered exact. Highlight these for memorizing! 1 foot = 12 inches, 1 yard = 3 feet = 36 inches, 1 mile = 5280 feet 1 inch = 2.54 cm, 1 liter = 1000 cc = 1000 cm3, 1 gallon = 4 quarts 1 day = 24 hours, 1 hour = 60 minutes = 3600 seconds 1 micron = 1 micrometer = 1 μm, The density of water = 1.000 g/cm3.\n\n34. Example #1: How many inches are in 0.00435 mile?\n\n35. Example #1: How many inches are in 0.00435 mile?\n\n36. Example #1: How many inches are in 0.00435 mile?\n\n37. Example #1: How many inches are in 0.00435 mile?\n\n38. Example #1: How many inches are in 0.00435 mile?\n\n39. Example #1: How many inches are in 0.00435 mile? Don’t forget proper significant figures!\n\n40. Example #2: How many firkins can be held in one hogshead?\n\n41. Example #2: How many firkins can be held in one hogshead?\n\n42. Example #2: How many firkins can be held in one hogshead? Since all conversions are exact, this is considered an exact computation.\n\n43. Example #3: How many meters are in one mile?\n\n44. Example #3: How many meters are in one mile?\n\n45. Example #3: How many meters are in one mile?" ]
[ null, "https://www.slideserve.com/img/player/ss_download.png", null, "https://www.slideserve.com/img/replay.png", null, "https://thumbs.slideserve.com/1_5619363.jpg", null, "https://www.slideserve.com/img/output_cBjjdt.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9170517,"math_prob":0.98735344,"size":4214,"snap":"2021-21-2021-25","text_gpt3_token_len":965,"char_repetition_ratio":0.15059382,"word_repetition_ratio":0.40198863,"special_character_ratio":0.27195063,"punctuation_ratio":0.16825776,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99287665,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-18T05:47:16Z\",\"WARC-Record-ID\":\"<urn:uuid:d2f30613-a8ef-48fc-9f8c-cf974a733268>\",\"Content-Length\":\"95530\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2dd8f2bc-275f-4ed8-978f-7ab196307515>\",\"WARC-Concurrent-To\":\"<urn:uuid:f51fee68-6af0-4f1f-8a87-44b86b5f2f06>\",\"WARC-IP-Address\":\"44.236.161.141\",\"WARC-Target-URI\":\"https://www.slideserve.com/andra/quiz\",\"WARC-Payload-Digest\":\"sha1:NVPDI6WFW4552SOXKS4QK35IICU72UZ7\",\"WARC-Block-Digest\":\"sha1:Q44DA4H3IDNXILBLIXUOFSLY3UJHDIZJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487635724.52_warc_CC-MAIN-20210618043356-20210618073356-00469.warc.gz\"}"}
https://unclecoder.com/Article/c-plus-plus/194/CPP-Program-tostudy-if-control-statement
[ "UncleCoder.com\n\nUncleCoder.com\n\nFree programming examples and instructions\n\n# CPP Program to study if control statement\n\n## CPP Program to study how to use if control statement\n\nby Krishna\n\nPosted on 27 Jun 2018 Category: c-plus-plus Views: 931\n\nCPP Program to study if control statement\n\nIn this article we will discuss about the basic CPP control structures and its implementation. Like C programming language, CPP also supports all basic control structures such as if, if..else, switch, while, do..while, for loop. So here we will discuss in detail about the ‘if control statement’. Syntax is same as the C if statement.\n\nThe if statement is implemented in two forms\n\n• Simple if statement\n``````if(true condition)\n{\nAction;\n}\n``````\n\n• if…else statement\n``````if(true condition)\n{\nAction;\n}\nelse\n{\nAction;\n}\n``````\n\nHere is a program which demonstrates the if control statement. This program calculates the largest number among the three given numbers.\n\n``````#include<iostream>\n#include<conio.h>\nusing namespace std;\nvoid main()\n{\nint num1, num2, num3;\ncout<<\"Enter the first number \";\ncin>>num1;\ncout<<\"Enter the second number: \";\ncin>>num2;\ncout<<\"Enter the third number: \";\ncin>>num3;\nif((a>b)&&(a>c))\n{\ncout<< “ largest number is”<<num1;\n}\nelse if(b>c)\n{\ncout<< “largest number is”<<num2;\n}\nelse\n{\ncout<< “largest number is”<<num3;\n}\ngetch();\n}\n``````\n\nIn the above program, the first if statement checks whether the first number is greater than the second and third number, if it is true action is executed(here, prints the largest number) and if it is false, the control goes to the if else part or else  part.\n\nC code for the above program is also available in unclecoder.com\n\nOutput for the above program is shown as:\n\nOUTPUT", null, "" ]
[ null, "data:image/jpeg;base64,/9j/4AAQSkZJRgABAQEAYABgAAD/4RDuRXhpZgAATU0AKgAAAAgABAE7AAIAAAAMAAAISodpAAQAAAABAAAIVpydAAEAAAAYAAAQzuocAAcAAAgMAAAAPgAAAAAc6gAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAERldmlLcmlzaG5hAAAFkAMAAgAAABQAABCkkAQAAgAAABQAABC4kpEAAgAAAAM1OAAAkpIAAgAAAAM1OAAA6hwABwAACAwAAAiYAAAAABzqAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMjAxODowNzozMSAyMTozODoxNgAyMDE4OjA3OjMxIDIxOjM4OjE2AAAARABlAHYAaQBLAHIAaQBzAGgAbgBhAAAA/+ELHmh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8APD94cGFja2V0IGJlZ2luPSfvu78nIGlkPSdXNU0wTXBDZWhpSHpyZVN6TlRjemtjOWQnPz4NCjx4OnhtcG1ldGEgeG1sbnM6eD0iYWRvYmU6bnM6bWV0YS8iPjxyZGY6UkRGIHhtbG5zOnJkZj0iaHR0cDovL3d3dy53My5vcmcvMTk5OS8wMi8yMi1yZGYtc3ludGF4LW5zIyI+PHJkZjpEZXNjcmlwdGlvbiByZGY6YWJvdXQ9InV1aWQ6ZmFmNWJkZDUtYmEzZC0xMWRhLWFkMzEtZDMzZDc1MTgyZjFiIiB4bWxuczpkYz0iaHR0cDovL3B1cmwub3JnL2RjL2VsZW1lbnRzLzEuMS8iLz48cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0idXVpZDpmYWY1YmRkNS1iYTNkLTExZGEtYWQzMS1kMzNkNzUxODJmMWIiIHhtbG5zOnhtcD0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wLyI+PHhtcDpDcmVhdGVEYXRlPjIwMTgtMDctMzFUMjE6Mzg6MTYuNTgzPC94bXA6Q3JlYXRlRGF0ZT48L3JkZjpEZXNjcmlwdGlvbj48cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0idXVpZDpmYWY1YmRkNS1iYTNkLTExZGEtYWQzMS1kMzNkNzUxODJmMWIiIHhtbG5zOmRjPSJodHRwOi8vcHVybC5vcmcvZGMvZWxlbWVudHMvMS4xLyI+PGRjOmNyZWF0b3I+PHJkZjpTZXEgeG1sbnM6cmRmPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5LzAyLzIyLXJkZi1zeW50YXgtbnMjIj48cmRmOmxpPkRldmlLcmlzaG5hPC9yZGY6bGk+PC9yZGY6U2VxPg0KCQkJPC9kYzpjcmVhdG9yPjwvcmRmOkRlc2NyaXB0aW9uPjwvcmRmOlJERj48L3g6eG1wbWV0YT4NCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgPD94cGFja2V0IGVuZD0ndyc/Pv/bAEMABwUFBgUEBwYFBggHBwgKEQsKCQkKFQ8QDBEYFRoZGBUYFxseJyEbHSUdFxgiLiIlKCkrLCsaIC8zLyoyJyorKv/bAEMBBwgICgkKFAsLFCocGBwqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKioqKv/AABEIAKoBrgMBIgACEQEDEQH/xAAfAAABBQEBAQEBAQAAAAAAAAAAAQIDBAUGBwgJCgv/xAC1EAACAQMDAgQDBQUEBAAAAX0BAgMABBEFEiExQQYTUWEHInEUMoGRoQgjQrHBFVLR8CQzYnKCCQoWFxgZGiUmJygpKjQ1Njc4OTpDREVGR0hJSlNUVVZXWFlaY2RlZmdoaWpzdHV2d3h5eoOEhYaHiImKkpOUlZaXmJmaoqOkpaanqKmqsrO0tba3uLm6wsPExcbHyMnK0tPU1dbX2Nna4eLj5OXm5+jp6vHy8/T19vf4+fr/xAAfAQADAQEBAQEBAQEBAAAAAAAAAQIDBAUGBwgJCgv/xAC1EQACAQIEBAMEBwUEBAABAncAAQIDEQQFITEGEkFRB2FxEyIygQgUQpGhscEJIzNS8BVictEKFiQ04SXxFxgZGiYnKCkqNTY3ODk6Q0RFRkdISUpTVFVWV1hZWmNkZWZnaGlqc3R1dnd4eXqCg4SFhoeIiYqSk5SVlpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfIycrS09TV1tfY2dri4+Tl5ufo6ery8/T19vf4+fr/2gAMAwEAAhEDEQA/APPvEXiNPDUenJHpdtevdwNO73DyDbiRkCgIy8fJnnPWsP8A4WQ3/Qvab/38n/8AjlL8SQVfQs/8+Df+j5a4mgDtv+FkuOnh7Tf+/k//AMcpf+FmSf8AQv6b/wB/J/8A45XEUUAdx/ws2X/oX9N/7+T/APxyj/hZkn/Qv6b/AN/J/wD45XD0UAdv/wALLk/6F/Tf+/k//wAco/4WXJ/0L+m/9/J//jlcRRQB23/Cyn/6F/Tv+/k//wAco/4WQ/8A0L+nf9/J/wD45XE0UAdr/wALHY/8y/p3/f2f/wCOUh+IpP8AzL+nf9/Z/wD45XF0UAdkfiHn/mX9O/7+3H/xykPxAB/5l7T/APv7cf8AxyuOooA6/wD4T5T/AMy9p/8A39uP/jlJ/wAJ6h/5l7T/APv9cf8AxyuRooA63/hO0/6F7T/+/wBcf/HKP+E6j/6F7T/+/wBcf/HK5KigDrP+E5j/AOhe0/8A7/XH/wAco/4TmP8A6F7T/wDv9cf/AByuTooA6z/hOY/+he0//v8AXH/xyj/hOY/+he0//v8AXH/xyuToosB1n/Ccx/8AQvaf/wB/rj/45R/wnEX/AEL2n/8Af64/+OVydFAHWf8ACcRf9C9p/wD3+uP/AI5R/wAJxF/0L2n/APf64/8AjlcnRQB1n/CcRf8AQvaf/wB/rj/45R/wnEX/AEL2n/8Af64/+OVydFAHWf8ACcRf9C9p/wD3+uP/AI5R/wAJxF/0L2n/APf64/8AjlcnRQB1n/CcRf8AQvaf/wB/rj/45R/wnEX/AEL2n/8Af64/+OVydFAHWf8ACcRf9C9p/wD3+uP/AI5R/wAJxF/0L2n/APf64/8AjlcnRQB1n/CcRf8AQvaf/wB/rj/45R/wnEX/AEL2n/8Af64/+OVydFAHWf8ACcRf9C9p/wD3+uP/AI5Sf8JvFn/kXdP/AO/1x/8AHK5SigDsF8exKuP+Eb08/wDbaf8A+OU0+O4S2f8AhHNP/wC/1x/8crkaKVgOvPjyLGP+Ec0//v8AXH/xymf8JvD/ANC7p/8A3+uP/jlcnRRYDq/+E3h/6F3T/wDv9cf/AByj/hN4v+hd0/8A7/XH/wAcrlKKdgOr/wCE3i/6F3T/APv9cf8Axyj/AITeL/oXdP8A+/1x/wDHK5SiiwHXDx1CBj/hHNP/AO/1x/8AHKafHEJ/5l3T/wDv9cf/AByuToosB1f/AAm8P/Qu6f8A9/rj/wCOUf8ACbxf9C9p/wD3+uP/AI5XKUUWA6v/AITeL/oXdP8A+/1x/wDHKD42hP8AzLun/wDf64/+OVylFFgOpPjO3PXw5p//AH+uP/jlJ/wmNt/0Len/APf64/8AjlcvRRYD1b4n+H7vUNV0O20qDzWTTJZpCXVEjRZXLMzMQqqM9SQOnrXmuqaRfaNdLb6lB5TvGs0ZDq6SIwyrKykqyn1BI6+le4eMnOo+E7zRbX97qd7pkMtrbD78wiupHkC+rBedo5POAcGvIm07V9D8Q6Lb3d5DZXy+TLALiUEWG6QsolBBEeCfMKkcB8kZJFJbAYYhlaBp1jcxIyo0gU7VYgkAnsSFbA9j6Vp6J4Y1fxEk76RbJMtu0aSM88cQVpCVQfOwySRgAd8eorZ0jxU2h+JNZt9fS31vTdUnZNUWHBWch2PmxMMYIJLLjAOexwVu2mhrpHxM0C00HUH1TSr67tr+3aLJLRrIwzIoH3kAkBOOBnO3kBgY2o+AfEmk6PPql9p6JZQNslmS6ikCtv2EYVichuCOxznpUcHgfX7nHl2kQzZJqH7y7hT/AEds4k+Zx8vBz6cZxkV29xDfXFp8TdFijuJbqTUIri3sFVmd1NyS0iR9SCvlksB02+1a0SPBdTmW2837B4AWC7hkDARyY3eVJggqxUE4yGxkj1oA8yi8D6/NdT26WkQeC2W7cvdwqhgYZEqsX2snqykgdyKYfBmuieaN7NI1ggjuHnkuIkg8uQgIwmLbCGJwMMckH0OPU7e2uLjXLu7tLF7iyn8Dr9lsQjOsKsBsti64ZySjkHIY5OOlQ63DLeeEtY0u0jeTUW0LSMaVCpaS22SsXjVOXwoZSd2WG8ZOCKAPL/8AhEtb/tT+z/sX777N9r3eanleRt3eb5udmzH8W7GeM54p58Ga6J5o3s0jWCCO4eeS4iSDy5CAjCYtsIYnAwxyQfQ49K1j/SvCt14bg+fWpPDelhbDpKWhd5JE2n+MIQ2z7xHQGuCj8K6/Bdwxz6amqy2losz6W0zNJBHI7bVaJGWQHLByq/d3qWxkigDF1PQtS0d8ahaPGu2NxKpDxssgJQq6kqwYK2CCfut6GpNG8Palr/2n+y4opPskfnTeZcxxbEHV/nYfKO56DIzjIr0PXPFEXh7XNOsNWsku9KvdCs4NT0kgBrXaGIRM/OrJu3AOxb5uo+Uq/wAMeGo9I13xC2ht/bul3fhuea0dUc+YHbCwvtwQ5MbrgYJ2nocgAHnj+GNWTXLbSHtkW8u1R7cGeMJMrDKlJN2xgegIPJ468U9/CWtp/auLLzP7H2/bvJlSTyc567Sc4wc4ztwc4wa7bVYZZvil4Igijfz4rTTvNskUk2W1tzR4+8Aqjcd5LAEknGMaFnqmoeFp/iXqdonlXdvqVvIizR8Mr3L9Qf4WRuo7NkHoaAPM7nw5q9r5Xm2EzebZDUF8oeZi3PSRtudq+ucY70/RPDGr+IknfSLZJlt2jSRnnjiCtISqD52GSSMADvj1FegeLTqWq+OfDF94WRNLlGhW92rBwsVjFlyS7YwI1U4ORgjjBzisKzubHUPizpkfhaGZbF9StpZIoVZYpXjbLypFyY0ALkKSSqk8gHAAMifwD4ktp4opdPQGVZnDi6iZEWE4lLuG2oFJwSxHPHWsnVNIvtGult9Sg8p3jWaMh1dJEYZVlZSVZT6gkdfSvR7j7TcN8R/Da+cb+8vRdWVg2Q0oWcySMingsYwjYHLADGcV5/rel6jo8lpaas+JvsyyLbNJue2VmZgjL/Axzv2/7YJ5JoAg0vSL7WbprfTYPNdI2mkJdUSNFGWZmYhVUepIHT1o1TSL7RrpbfUoPKd41mjIdXSRGGVZWUlWU+oJHX0rp/B3+neC/FmiWn73U72K2ltbYffmEUheQL6sF52jk84Bway207V9D8Q6Lb3d5DZXy+TLALiUEWG6QsolBBEeCfMKkcB8kZJFAGGIZWgadY3MSMqNIFO1WIJAJ7EhWwPY+laeieGNX8RJO+kWyTLbtGkjPPHEFaQlUHzsMkkYAHfHqK2dI8VNofiTWbfX0t9b03VJ2TVFhwVnIdj5sTDGCCSy4wDnscFbtpoa6R8TNAtNB1B9U0q+u7a/t2iyS0ayMMyKB95AJATjgZzt5AAMbUfAPiTSdHn1S+09EsoG2SzJdRSBW37CMKxOQ3BHY5z0qODwPr9zjy7SIZsk1D95dwp/o7ZxJ8zj5eDn04zjIrt7iG+uLT4m6LFHcS3UmoRXFvYKrM7qbklpEj6kFfLJYDpt9q1okeC6nMtt5v2DwAsF3DIGAjkxu8qTBBVioJxkNjJHrQB5lF4H1+a6nt0tIg8Fst25e7hVDAwyJVYvtZPVlJA7kUw+DNdE80b2aRrBBHcPPJcRJB5chARhMW2EMTgYY5IPocep29tcXGuXd3aWL3FlP4HX7LYhGdYVYDZbF1wzklHIOQxycdKh1uGW88JaxpdpG8motoWkY0qFS0ltslYvGqcvhQyk7ssN4ycEUAeX/wDCJa3/AGp/Z/2L999m+17vNTyvI27vN83OzZj+LdjPGc8U8+DNdE80b2aRrBBHcPPJcRJB5chARhMW2EMTgYY5IPocelax/pXhW68NwfPrUnhvSwth0lLQu8kibT/GEIbZ94joDXBR+Fdfgu4Y59NTVZbS0WZ9LaZmkgjkdtqtEjLIDlg5Vfu71LYyRQBi6noWpaO+NQtHjXbG4lUh42WQEoVdSVYMFbBBP3W9DUmjeHtS1/7T/ZcUUn2SPzpvMuY4tiDq/wA7D5R3PQZGcZFeh654oi8Pa5p1hq1kl3pV7oVnBqekkANa7QxCJn51ZN24B2LfN1HylX+GPDUeka74hbQ2/t3S7vw3PNaOqOfMDthYX24IcmN1wME7T0OQADzLVNIvtGult9Sg8p3jWaMh1dJEYZVlZSVZT6gkdfSqdemeD7668X3+rT32iWl9DpeiBbK1FoZI43hIMEYY5c7jvyu7LjIOQABDo81lr+ia9f6T4ftBrtrZWccUEdulx5zeZtmmS32bBkbM4X5fX5jkA85q5qOkX2k/ZP7Qg8n7ZbJdQfOrb4nztbgnGcHg810HxCsrWy1TShBbQ2t3LpNtLfwRII9lwVO4NGMBGxtJUAdc45rvX03SjpbX8OhW95qreHdOuY7WztoQ8jSSuJpFiMbpn7mW8s4HAxmgDxarOnadeavqMFhptu9xdTttjjTqT/QAckngAEmvTGsI57XX57Twrb2XiCDT7E29gUiu5GDSYklNuE2oxTZuXywVznA3cw+DLu90z4taTBrOnaZpMtzAoljjgiRixhcISOfJkclcouzORleeQDzCniGVoGnWNzEjKjSBTtViCQCexIVsD2PpXeaHpmpwazqi6z4eiuLuSyjkKWlpbS3FluxsdbP7pz8oddoYBs5XPzTXWtf8If4tu9M1rTNOvNI1C2hS+t7SDyDOgGUmMZOYZgDkphBnnAJD0AcBZ2k+oX8FnaJ5lxcSLFEmQNzMcAZPA5Pertv4d1S61m60uG1zd2fmfaVMiqkIjzvZnJ2qox1Jx09RXTW3hu10z4n6FbaRNDrel6jLFPAWgEu63ZyriRCuNyhXyccbc/KRgdB4b02az8bfEG1g0TzESxvFiiEMijDPmOIBCPldcEAckKNpHOQDy/UtOvNI1Gew1K3e3uoG2yRv1B/qCOQRwQQRRp2nXOrajBYWKo9zO2yJHkWMM3YZYgZPQDPJwBya7PwJFb3uj+Iry5sH1nVbaC1W0twElmMe8I2xJEkBCqEGdh2jgYzT/s8kvxZ8NpF4f/si4820kmtI5Ekc4YMZHSNVER2AFl2rjG4gZoA4a8tJ9Pv57O7Ty7i3kaKVMg7WU4IyODyO1Q16THZzD4heMUm0J71vPmYMltHcXFsGlJSSO3l4lU5UNgZCsCGXPOnBo1vaXfiU3OjWOo6ra2lmbODT7ZUkmjZ8NL9mkSQRybdm9fLG3sBu3EA8jorqfFdlNfeKrGytdATSL25ggj+xieMtJI3Cs6qFWJmBXKbVx1IGa0PC2jSQaR4tiGnRXXiLT/Iit7Z4EunX99tmKxkMrYwAWwcZ6jPIBw1FemaFpl3e6zrdrq/h7T4b9NA+2RWsFrGX8+PYYnMYzsdsjdGAobI3Ic86aaLZTazdWsekWj358JR381qtmhePUE2lf3e35GOVzGAA2fmU5oA8gorrPiFZWtlqmlCC2htbuXSbaW/giQR7LgqdwaMYCNjaSoA65xzXJ0AFFFFABRRRQB6z8RdA1HxDNpH9lRwyfZNMeafzLmOLYnnSZf52HyjuegyM4yK821jQ9Q0GeCHU4Uja4gW4iKTJKrxsSFYMhIIOD3r2aGO5uru4kisnvFXwndx+WEYrI7XDbYztwcttOACCcHHSuYsdHuYtU1467pdvbrJoVxrFhYTRrIbDbMzRIMr8oBLEoMKQ2GXqAkB5zp2nXmr6jBYabbvcXU7bY406k/0AHJJ4ABJqtXseiSWmk/FDwi8MNjaLq+jQXF0wt4kDTtFKoKcfuyx2jCbQxOMHNZHh7SJYIfEdxrmhw3eupbWkttp9vBb+asbvhiIBG6I2NhbMe4A9t2SwPM6K9c0nThfeINYM3gy3ga20JLr7FJGk5a6QhoSwjVfKZwOYgE3AHK815truqWur3VvcWumw6e620cdwIcBJpVGGlCqoVN3HygY4z3NAFXTtOvNX1GCw023e4up22xxp1J/oAOSTwACTU+maHqGsQXs2nQpKtjAbi4BmRWWMAksFYgsBjnAPUeorpvhJqIsviLp0UjW6RXDOjPNGhYN5bhQrsMqSxAwpG7IHPStbwjYapp+q+KrnW9NhRx4bmklgWJY413KpRHSLb5ZZVJ2/K2Mn3oA8zor2YaRpMenTajb6HDe6tPoGnXaWlrBGWdpJGWZ44WjdBwqZIj456Fia888bqF1yHdoaaJKbSIy2wmRmZscO6oqiNiu3KbV9cDNAGRpekX2s3TW+mwea6RtNIS6okaKMszMxCqo9SQOnrUkuhanB4gGhz2jx6kZ1txA5AJdiAoyTjByMHOCCDnFdf8KoppP+Eo8nTPtudEnUfLIdzHGIvkI+/g8feO35SOc4Hg4T6j480aOWL7fvuYopI5ohODCMKwKsCNqxg/7oGRjHABi3lpPp9/PZ3aeXcW8jRSpkHaynBGRweR2qGvU9D0PHjrxxbv4fhuobKK4ubW2lstyiVZd9uq4AIVlzhFIDrxgisvQb621y/vLi08Kws6abHFcPZwQ3EqTA4+0R2rgIVY7Q6qvyg5DLk5AOJ07TrzV9RgsNNt3uLqdtscadSf6ADkk8AAk1Wr1nw68mhfGywsrtNJt0njVTLBapCZcwv5bFG+a3lbcoZF2ZJHByCfOdfs9SstVxrVtDa3csaStBFHHHsBUbQ0ceAhxglSAeckc0AZlFdh8P4Le6TxGt1a29wLbRpr2HzoEcpNEVKMCQeMk5Xow4YEcV1mq6BYXfhK+OnaTby6xe6FpV6kVtbL5hdpWWZ40UfKMBd2wAc89aAPI60NM0PUNYgvZtOhSVbGA3FwDMissYBJYKxBYDHOAeo9RXsaaHov8AwlHigjRNOnsLiTSY7PNuvl+TcERu8LLjGcsQyn7y57VZTSrOyF1NoOk29vdNo2sWaxW8O8TCC4SOLcjZ3sR1JBLE85GBQB4HRXsQ0LR7Q6vd22iJc6y+l2N22kwRo720srnz1jhkSTaAPLJDIxUNgbQRUOk6cL7xBrBm8GW8DW2hJdfYpI0nLXSENCWEar5TOBzEAm4A5XmgDyOnwwy3E8cFvG8ssjBEjRSzOxOAAB1JPat2TV01PxPpF3pVtaaJdx/Z0eclVhM6kDzyoULGvQlQMDBPOTV/SdfbSfEms+favq2sX07Qw6hptwEdXZ2DtCfLYZkzgMFBAPy4zQBzmr6RfaFqs2m6rB5F3Dt8yPerbcqGHKkjoR3qnXc/GOLy/ibfN5E0XmRwtvkPEv7tRuTgfLxt78q3PYcNQAUUUUAFFFFABRRRQBp6Fr11oF1cS2scMyXVtJa3EMykpLE4wynBDDoDkEHj60a7r11r91by3UcMKWttHa28MIISKJBhVG4lj1JySTz9KzKKACiiigAooooAKKKKACiiigAooooAKKKKANnw74lm8Ofb/s9jaXX2+2a1l+0+ZxE33lGx1xnjnrxxjnJ4d8SzeHPt/wBnsbS6+32zWsv2nzOIm+8o2OuM8c9eOMc5xqKACiiigAooooAKKKKAPSfGHh7UtffTP7Liik+yaY803mXMcWxBPLlvnYfKO56DIzjIrhtY0PUNBngh1OFI2uIFuIikySq8bEhWDISCDg969itLa4lurmSGxe8UeE7qPywjFZHa4fbGduDltpwAQTg46Vzljo9zFqmvnXdLt7dZNCuNYsLCaNZDYbZmaJBlflAJYlBhSGwy9QADznTtOvNX1GCw023e4up22xxp1J/oAOSTwACTVavY9EktNJ+KHhF4YbG0XV9GguLphbxoGnaKVQU4/dljtGE2hiehzWR4e0iWCDxHca5ocV3rqW1pLbafbwweasbvhiIBG6I2NhbMe4A9t2SAeZ0V65pOmi98QawZvBlvA1toSXX2KSNJy10hDQlhGq+UzgcxAJuAOV5rzbXdUtdXure4tdNi091to47gQ4CTSqMNKFUBU3cfKBjj3oAq6dp15q+owWGm273F1O22ONOpP9ABySeAASan0zQ9Q1iC9m06FJVsYDcXAMyKyxgElgrEFgMc4B6j1FdN8JNRFl8RtOika3jiuGdGeaNCwby3ChXYZUliBhSN2QOa1vCNhqmn6p4qudb02JHHhuaSWBYljjXcqlEdItvlsyqTt+VsZPvQB5nRXso0fSY9Om1G30OK91afQNOu0tLWGMu7SSMszxwtG6DhUyRHxz0LE15543ULrkOdDTRJTaRGW2EyMzNjh3VFURsV25TavrgZoA52ius8CQmaTU8aP/aWLYDzIYIrm4tSWG10t5DiVd2FbjIB4Ze/YQaNb2l34lNzo1jqOq2tpZmzg0+2VJJo2fDS/ZpEkEcm3ZvXyxt7AbtxAPI6K9VawjntdfntPCtvZeIINPsTb2BSK7kYNJiSU24TajFNm5fLBXOcDdzWstMu307xDNc+HtOj8Sw2Vk1rZQWscrlWkxJIbb5lVyuzcNi7cg4XdyAeZ0+GJp544UKBpGCgu4RQSccsSAB7k4FesvpempqN9HJptit1H4QTUrqE2sYMF9HhgSmP3ZwQWjACsD8ykGi60Cw+wvq+m6Vb3Wtt4dsLqGxS2V0klmZo5ZhbgYJVQpwBtBOSCaAPL9X0i+0LVZtN1WDyLuHb5ke9W25UMOVJHQjvVOuz+LP7z4kX91H81vdRwTQSrykyGFAGU9GXIIyOODUfgCC3uk8RrdWtvcC20aa9h86FHKTRFSjAkHjJOV6MOGBHFAHIUV65qugWF34Svm07SbeXWL3QtKvUitrZfMLtKyzPGij5RgLu2ADnnrWsmh6J/wAJP4oI0TTp7C4l0mOzzbjy/JuCI3eFlxjOWIZT95c9qAPHdM0PUNYgvZtOhSVbGA3FwDMissYBJYKxBYDHOAeo9RWfXviaTZ2QuptB0m3t7ptG1izWK3h3iYQXCRxbkbO9iOpIJYnnIwKxRoWj2h1e7t9ES51l9LsbttJgRHe2llc+escMiSbQB5ZIZGKhsDaGFAHjtFeuaTpovfEGsGbwZbwNbaEl19ikjSctdIQ0JYRqvlM4HMQCbgDlea4KTVk1PxPpF3pVtaaJdx/Z0ecsqwmdSB55UKFjXoSoGBgnnJoAp6V4e1LWbW7urCKI29ls+0SzXMcKR7yQuS7AckEVVv8AT5tOnWG4e3dmXcDb3Mc64yR96NiAeOmc/nXW6Xd6/LL4psbSwsfEgu51k1ARszGYpKxEkSxujMpdskqMAFc4BrP8daRY6Pqmnx2MP2WS402C4u7Pex+zTsvzR4Yll7HDEn5vTFAHM0UUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFAHpnjXw1qetTaYNMiik+yaY803mXMcWxBPLl/nYfKO56DIzjIrg9Y0PUNBngh1OFI2uIFuIikySq8bEhWDISCDg969xurSeTUriSCxe8QeFLuPygjFZHadtsZ24OW2tgAgnBx0rjbHR7mLVNfOu6Xb26yaFcaxYWE0ayGw2zM0SDK/KASxKDCkNhl6gJAec6dp15q+owWGm273F1O22ONOpP8AQAckngAEmq1ex6JJaaT8UPCLww2Nour6NBcXTC3jQNO0Uqgpx+7LHaMJtDE9Dmsjw9pEsEHiO41zQ4rvXUtrSW20+3hg81Y3fDEQCN0RsbC2Y9wB7bslgeZ0V65pOmi98QawZvBlvA1toSXX2KSNJy10hDQlhGq+UzgcxAJuAOV5rzbXdUtdXure4tdNi091to47gQ4CTSqMNKFUBU3cfKBjj3oAq6dp15q+owWGm273F1O22ONOpP8AQAckngAEmp9M0PUNYgvZtOhSVbGA3FwDMissYBJYKxBYDHOAeo9RXTfCTURZfEbTopGt44rhnRnmjQsG8twoV2GVJYgYUjdkDmtbwjYapp+qeKrnW9NiRx4bmklgWJY413KpRHSLb5bMqk7flbGT70AeZ0V7KNH0mPTptRt9DivdWn0DTrtLS1hjLu0kjLM8cLRug4VMkR8c9CxNeeeN1C65DnQ00SU2kRlthMjMzY4d1RVEbFduU2r64GaAMbTtOvNX1GCw023e4up22xxp1J/oAOSTwACTU+maHqGsQXs2nQpKtjAbi4BmRWWMAksFYgsBjnAPUeorpvhJqIsviNp0UjW8cVwzozzRoWDeW4UK7DKksQMKRuyBzWt4RsNU0/VPFVzremxI48NzSSwLEsca7lUojpFt8tmVSdvytjJ96APObO0n1C/gs7RPMuLiRYokyBuZjgDJ4HJ70XlpPp9/PZ3aeXcW8jRSpkHaynBGRweR2r0O60u3PxD8FG0023c6np9lcXsCWqtHIXyJW8rG1RsBJwABgtweas6HoWPHXje3fw/DdQ2UVxc2ttLZblEqy77dVwAQrLnCKQHXsRQB5hDE088cKFA0jBQXcIoJOOWJAA9ycCrOr6RfaFqs2m6rB5F3Dt8yPerbcqGHKkjoR3rttGNh4gsdY1fTdAt21uw0+2ihsUiWZLiVm8uW5FuFAyFKnaAVUnJBJqh8Wf3nxIv7qP5re6jgmglXlJkMKAMp6MuQRkccGgDjKK6/wBBb3SeI1urW3uBbaNNew+dCjlJoipRgSDxknK9GHDAjiut1XQLC78JXzadpNvLrF7oWlXqRW1svmF2lZZnjRR8owF3bABzz1oA8jrQ0zQ9Q1iC9m06FJVsYDcXAMyKyxgElgrEFgMc4B6j1FexJoeif8JP4oI0TTp7C4l0mOzzbjy/JuCI3eFlxjOWIZT95c9qtJpNnZC6m0HSbe3um0bWLNYreHeJhBcJHFuRs72I6kgliecjAoA8Dor2IaFo9odXu7fREudZfS7G7bSYER3tpZXPnrHDIkm0AeWSGRiobA2hhUOk6aL3xBrBm8GW8DW2hJdfYpI0nLXSENCWEar5TOBzEAm4A5XmgDyOrml6RfazdNb6bB5rpG00hLqiRooyzMzEKqj1JA6etacmrJqfifSLvSra00S7j+zo85ZVhM6kDzyoULGvQlQMDBPOTXVeHHuLnRfH1vJFb6/qU09vIYISzrdkXDb5EERVioLBsrgcjscUAeczRNBPJC5QtGxUlHDqSDjhgSCPcHBpldN460ix0fVNPjsYfsslxpsFxd2e9j9mnZfmjwxLL2OGJPzemK5mgAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKAPS/iRaXGt614bsdPVHuJ7NkiV5FjDN50mBliBk4wBnk4A5NedXlpPp9/PZ3aeXcW8jRSpkHaynBGRweR2r0zUY5rn4geBVhjeVgY3KopJCrduzHjsACSewBqGPRi/jTxvey2kt3eWVyzw6WltFJLcLLP/AKxVljk+VVKnIQ8MOQDykB5nRXsUXh2zTx/4rGnaBb32lppa6jYR/ZfNikm2o8flsOdrN5g2qQGAK4IGBh6PNZa/omvX+k+H7Qa7a2VnHFBHbpcec3mbZpkt9mwZGzOF+X1+Y5YHnNFey3uj6RY+I/F9tY6HFeXGl21jHp9jbwxtKY22mVgrxuHbLDc7KzYOMjNZMdv5niC9/wCKLW2l/suHzYoBb3lzbuT8swtSFTLfIHQIpUHdlN3IB5zp2nXmr6jBYabbvcXU7bY406k/0AHJJ4ABJqtXrPh15NC+NdhZXaaTAk8aqZYLVITLmF/LYo3zQStuUMi7Mkjg5BPnOv2epWWqY1q2itbuWNJWgiSOPYCo2ho48BGxglSAeckc0AZlFdf4Agt7pPEa3Vrb3AttGmvYfOhRyk0RUowJB4yTlejDhgRxXW6roFhd+Er5tO0m3l1i90LSr1Ira2XzC7Ssszxoo+UYC7tgA5560AeR1oaZoeoaxBezadCkq2MBuLgGZFZYwCSwViCwGOcA9R6ivYk0PRP+En8UEaJp09hcS6THZ5tx5fk3BEbvCy4xnLEMp+8ue1Wk0mzshdTaDpNvb3TaNrFmsVvDvEwguEji3I2d7EdSQSxPORgUAeB0V7ENC0a0Or3dvoiXOsvpdjdtpMCIz20srnz1jhkSTaAPLJDIxUNgFQwqHSdNF94g1gy+DLeBrbQkuvsUkaTlrpCGhLCNV8pnA5iATcAcrzQB5HU1naT6hfwWdonmXFxIsUSZA3MxwBk8Dk96u67qlrq91b3FrpsWnuttHHcCHASaVRhpQqgKm7j5QMce9WfBMDXXjnRoBapdrJdxrLC8IlVoyfnypBGAu45xxjPGM0AZN5aT6ffz2d2nl3FvI0UqZB2spwRkcHkdqhr0W00w2vjrxbar4e+0JHJKIhBaxTT2amXMbxW0nyyIfkBwvCsCGXPPOeOrGXTvEzW88NjGywRkNZQmASqVyrvCT+6kIxuTC4POOckAydL0i+1m6a302DzXSNppCXVEjRRlmZmIVVHqSB09arTRNBPJC5QtGxUlHDqSDjhgSCPcHBrufAhMvgjxfaQWKapdSLZvHYEOzTKsx3ELGwchdwJIPHGayfHWkWOj6pp8djD9lkuNNguLuz3sfs07L80eGJZexwxJ+b0xQBzNFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQB2vxGIJ0Iqcj7C//o+WuKrr/Hr74NBP/Tk//o+SuQpu19BRvbUKv6Zqq6clxHLp1jqEVwoVku4ySpByCrqVdT2OGAIPIPGKFFIZoa7rV54i1y61XUmQ3NywZti7VUAAAAegAA5yeOSTzWfRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQB1XjX/AI9dBz/z5P8A+lEtcrXW+Ok2W2gj/pyf/wBHy1yVNq2gk7q4UUUUhhRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQB1vjh99roJ/wCnJ/8A0fLXJV1XjQYtNB/68n/9KJa5Wm3cSVlYKKKKQwooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooA63xyMWugf9eT/APo+SuSrq/GzbrTQD/05P/6US1ylN7iirIKKKKQwooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooAKKKKACiiigAooooA6rxqu200Ef9OT/+lEtcrXW+Ov8Aj20H/ryf/wBKJa5Km1ZiTurhRRRSGFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFABRRRQAUUUUAFFFFAH/2Q==", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7627534,"math_prob":0.9029706,"size":1589,"snap":"2022-27-2022-33","text_gpt3_token_len":385,"char_repetition_ratio":0.15583596,"word_repetition_ratio":0.0390625,"special_character_ratio":0.25613594,"punctuation_ratio":0.14285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9764405,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-07T16:09:12Z\",\"WARC-Record-ID\":\"<urn:uuid:6ca3c659-7b52-4756-8356-2f743258009f>\",\"Content-Length\":\"93203\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:31532367-a045-4a0f-b934-a4ac7c809bf5>\",\"WARC-Concurrent-To\":\"<urn:uuid:1d2f3019-b49a-423c-9895-744e4a3218f6>\",\"WARC-IP-Address\":\"172.67.153.98\",\"WARC-Target-URI\":\"https://unclecoder.com/Article/c-plus-plus/194/CPP-Program-tostudy-if-control-statement\",\"WARC-Payload-Digest\":\"sha1:RWBYE4VUWOST57GR6W4I43U3ATUC2EIM\",\"WARC-Block-Digest\":\"sha1:TJRS5SBKGBRWOG6XIZDEOKF6K4Y6REBH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104495692.77_warc_CC-MAIN-20220707154329-20220707184329-00723.warc.gz\"}"}
https://www.nyooztrend.com/2020/10/professional-calculators-are-boon-to.html
[ "# PROFESSIONAL CALCULATORS ARE A BOON TO BUSINESS\n\nOctober 27, 2020 RAWAT 0 Comments\n\nA calculator is an electronic device that is used to perform calculations. Arithmetic calculations can be simple or complex. Nowadays there are different types of oT calculators in the market depending on the necessity of a user. There are different varieties of electronic calculator which are available in the market; these calculators are designed for special purposes.", null, "The main features of business calculators are scientific notations, floating-point notation, inbuilt functions such as logarithmic functions, trigonometric functions, exponential functions, quick access to constants such as pie and e, cursor controls and edit equation and view previous calculations, hexadecimal to binary, octal calculations, complex numbers Junction calculations, statistics and probability, Matrix calculation, equation solving, calculus, conversion of units, physical constants, calculation of simple interest, compound interest, profit and loss and much more. These inbuilt functions help to perform calculations gradually. These advanced financial calculators can calculate up to 250 to 400 steps of calculation at a time the data can also be stored in the memory which is one of the most advanced features of these calculators.\n\nThis is one of the most useful and shallow calculators as the main features of this calculator is built in direct keystrokes for swift switching of exclusive modes. It has Your-line displays allowing easy input conformation change and correction for each parameter. Easily fixed percentage method some of their digit’s bonus can be calculated easily sales and levels with the breakeven point can also be calculated with direct function keys." ]
[ null, "https://1.bp.blogspot.com/-bHw_AHfVryg/X5fhksXVvyI/AAAAAAAAXo8/3rKDYjipA-UWg7KuJ3Dly9Nby6NFvbcUwCLcBGAsYHQ/s16000/istockphoto-1168618923-170667a.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91156715,"math_prob":0.9956754,"size":2678,"snap":"2020-45-2020-50","text_gpt3_token_len":516,"char_repetition_ratio":0.17988034,"word_repetition_ratio":0.04896907,"special_character_ratio":0.1695295,"punctuation_ratio":0.10204082,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9834331,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-24T18:17:01Z\",\"WARC-Record-ID\":\"<urn:uuid:0777ffeb-e5d4-4191-b75a-b73ea36921f5>\",\"Content-Length\":\"385898\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9e52f040-7c7f-436b-8d95-f375d9cc4343>\",\"WARC-Concurrent-To\":\"<urn:uuid:99749a23-0a1d-4be9-83b0-3f07ff945785>\",\"WARC-IP-Address\":\"216.239.32.21\",\"WARC-Target-URI\":\"https://www.nyooztrend.com/2020/10/professional-calculators-are-boon-to.html\",\"WARC-Payload-Digest\":\"sha1:NTQZW2LCP4Y6AX7GRDEAV33IFLNO6BIZ\",\"WARC-Block-Digest\":\"sha1:CZ4ZQ4BOXDRV6PWQTR6DCELKHGS57C4X\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141176922.14_warc_CC-MAIN-20201124170142-20201124200142-00308.warc.gz\"}"}
https://www.webqc.org/molecularweightcalculated-190212-155.html
[ "", null, "#### Chemical Equations Balanced on 02/12/19\n\n Molecular weights calculated on 02/11/19 Molecular weights calculated on 02/13/19\nCalculate molecular weight\n 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226\nMolar mass of Mn(NO3)2 is 178.947845\nMolar mass of Ba(ClO3)2 is 304,2294\nMolar mass of LaSD4 is 179.0268771112\nMolar mass of MnCl2 is 125,844045\nMolar mass of KClO2 is 106.5501\nMolar mass of Al2O3 is 101.9612772\nMolar mass of C2H2NO2 is 72.04278\nMolar mass of Fe(NO3)3 is 241,8597\nMolar mass of C10H2O5 is 202.11988\nMolar mass of CuSO4 is 159.6086\nMolar mass of no2 is 518.20206\nMolar mass of AgSO4 is 203.9308\nMolar mass of NO2 is 46.0055\nMolar mass of Al(OH)3 is 78.0035586\nMolar mass of KOH is 56.10564\nMolar mass of f2o3 is 85.9950064\nMolar mass of CaO is 56.0774\nMolar mass of C80H68Cu2N7OP4Re is 1580.636268\nMolar mass of AgNO3 is 169.8731\nMolar mass of CO2 is 44,0095\nMolar mass of NO is 30.0061\nMolar mass of H10O5 is 90.0764\nMolar mass of C12H22O11 is 342.29648\nMolar mass of HNO3 is 63.01284\nMolar mass of fe2o3 is 159.6882\nMolar mass of Cr(PO4)2 is 241.938824\nMolar mass of C2H2 is 26,03728\nMolar mass of He(lbmol) is 4,002602\nMolar mass of He(lbmol) is 4,002602\nMolar mass of C7H8 is 92.13842\nMolar mass of H(lbmol) is 1,00794\nMolar mass of K2O is 94,196\nMolar mass of CH4 is 16.04246\nMolar mass of Mg(ClO3)2 is 191.2074\nMolar mass of KBr is 119.0023\nMolar mass of C2H2*2 is 26,03728\nMolar mass of (NH2)2CO is 60.05526\nMolar mass of k is 39.0983\nMolar mass of h2o is 18.01528\nMolar mass of K is 39.0983\nMolar mass of Cr(NO3)3 is 238.0108\nMolar mass of C7H9NO2 is 139.15186\nMolar mass of C6H6 is 78.11184\nMolar mass of KBr is 119.0023\nMolar mass of Ni3(PO4)2 is 366,022924\nMolar mass of Fe(ClO3)2 is 222.7474\nMolar mass of Fe(ClO3)2 is 222.7474\nMolar mass of Fe(ClO3)2 is 222.7474\nMolar mass of Fe(ClO3)2 is 222.7474\nMolar mass of Fe(ClO3)2 is 222.7474\n 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226\nCalculate molecular weight\n Molecular weights calculated on 02/11/19 Molecular weights calculated on 02/13/19\nMolecular masses on 02/05/19\nMolecular masses on 01/13/19\nMolecular masses on 02/12/18\nBy using this website, you signify your acceptance of Terms and Conditions and Privacy Policy.\n© 2019 webqc.org All rights reserved\n Periodic table Unit converters Chemistry tools Chemical Forum Chemistry FAQ Constants Symmetry Search Chemistry links Link to us Suggestion? Contact us Choose languageDeutschEnglishEspañolFrançaisItalianoNederlandsPolskiPortuguêsРусский中文日本語한국어 How to cite? WebQC.Org online education free homework help chemistry problems questions and answers" ]
[ null, "https://www.webqc.org/pictures/webqclogo2.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84211266,"math_prob":0.8666804,"size":1860,"snap":"2019-35-2019-39","text_gpt3_token_len":816,"char_repetition_ratio":0.3890086,"word_repetition_ratio":0.15337424,"special_character_ratio":0.4752688,"punctuation_ratio":0.112068966,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95020413,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-21T16:23:49Z\",\"WARC-Record-ID\":\"<urn:uuid:20bc7758-0176-4096-a230-64186920b48a>\",\"Content-Length\":\"50703\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c730d6c9-9431-458b-8491-7ead84219497>\",\"WARC-Concurrent-To\":\"<urn:uuid:45867899-b474-4f8e-9311-bd0a7b827f93>\",\"WARC-IP-Address\":\"104.18.55.146\",\"WARC-Target-URI\":\"https://www.webqc.org/molecularweightcalculated-190212-155.html\",\"WARC-Payload-Digest\":\"sha1:ZSIQ45JMVOFHBKBS5KUTQTCHSG3EKWF5\",\"WARC-Block-Digest\":\"sha1:JRLWTCMBXRZ7KNWDAG5QBIHKJ42P7GFP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027316075.15_warc_CC-MAIN-20190821152344-20190821174344-00393.warc.gz\"}"}
https://wpblog.wyzant.com/resources/lessons/math/geometry/triangles/angles_of_triangles/
[ "# Angle Properties of Triangles\n\nNow that we are acquainted with the classifications\nof triangles\n, we can begin our extensive study of the angles of triangles.\nIn many cases, we will have to utilize the angle theorems\nwe’ve seen to help us solve problems and proofs. However, there are some triangle\ntheorems that will be just as essential to know. This first theorem tells\nus that if we know the measures of two angles of a triangle, it is possible to determine\nthe measure of the third angle.\n\n## Triangle Angle Sum Theorem\n\nThe sum of the measures of the interior angles of a triangle is 180.", null, "The diagram above illustrates the Triangle Angle Sum Theorem.\n\nLet’s do some examples involving the Triangle Sum Theorem to help us see its utility.\n\n### Examples\n\n(1) Find the measure of ?C.", null, "Solution:\n\nAs with all problems, we must first use the facts that are given to us. Using the\ndiagram, we are given that", null, "", null, "Since our goal is to find the measure of ?C, we can use the Triangle\nAngle Sum Theorem to solve for the missing angle. So we have", null, "Using the angle measures we were given, we can substitute those values into our\nequation to get.", null, "", null, "", null, "Having ?C measure out to 26° satisfies the property\nthat the sum of the interior angles of a triangle is 180°.\n\n(2) Find the value of x in the diagram below.", null, "Solution:\n\nIn this exercise, we are given that", null, "", null, "", null, "Looking at ?RST, we see that two of three angles are given to us.\nThus, we can apply the Triangle Angle Sum Theorem to figure out the measure of the\nthird angle:", null, "", null, "", null, "", null, "Note that ?SRT is the vertical angle opposite ?QRP,\nso we can deduce that", null, "Then, by the definition of congruent angles, we have", null, "", null, "Now, we have one of three angle measures of ?QRP. Since we know that\nm?P = m?Q = x, we can use the Triangle Angle Sum Theorem as follows", null, "", null, "", null, "", null, "", null, "We have found the measure of ?P and ?Q to be 67.\n\nIn order to comprehend the next theorem, we must learn two more terms that describe\nangles. The angle formed by one side of a triangle with the extension of another\nside is called an exterior angle of the triangle.", null, "Exterior angles get their name because they lie on the outsides of triangles.\n\nThe two angles that are not adjacent, or next to, the exterior angle of the triangle\nare called remote interior angles.", null, "Now that we know what these terms mean, we are ready for a theorem that will help\nus tremendously in our proofs.\n\n## Exterior Angle Theorem\n\nThe measure of an exterior angle of a triangle is equal to the sum of the measures\nof the two remote interior angles.", null, "Adding the measures of the two remote interior angles of a triangle gives the measure\nof the exterior angle.\n\nLet’s see how the Exterior Angle Theorem can be utilized to help us find the measures\nof unknown angles in the examples below.\n\n### Examples\n\n(1) Find the measures of ?1 and ?2 in the figure below.", null, "Solution:\n\nFirst, we can solve for m?1 since we are given the measure of two\nangles of that triangle. This part of the problem is similar to the examples we\nhave already done above. Let’s begin with the statements of what we are given, which\nare:", null, "", null, "Now, we can solve for m?1 by using the Triangle Angle Sum Theorem.\nSo we have", null, "", null, "", null, "", null, "In order to solve for the measure of ?2, we will need to apply the\nExterior Angle Theorem. We know that the two remote interior angles in the figure\nare ?S and ?A. Thus, by the Exterior Angle Theorem,\nthe sum of those angles is equal to the measure of the exterior angle. We have", null, "", null, "", null, "While not always necessary, we can check our solution using our previous knowledge\nof lines. We see that ?1 and ?2 make up ray AK.\nAnd since straight lines have 180° measures, we know that the sum\nof ?1 and ?2 must be 180. Let’s check\nto make sure:", null, "", null, "So, we know we have worked this problem out correctly.\n\n(2) Find m?B.", null, "Solution:\n\nLet’s take a look at the information we have been given first. We know that", null, "", null, "", null, "Right off the bat, we can apply the Exterior Angle Theorem to help us solve the\nproblem. We have", null, "", null, "", null, "", null, "", null, "This does not answer the question, however. The question asked for m?B.\nThe variable x alone does not tell us what the measure of the angle\nis. So, we must plug x = 4 into our equation for m?B:", null, "", null, "", null, "", null, ".\n\nNow we have found that the measure of ?B is 39°.\n\nScroll to Top" ]
[ null, "https://wpblog.wyzant.com/embed/editor/256288", null, "https://wpblog.wyzant.com/embed/editor/256289", null, "https://wpblog.wyzant.com/embed/editor/256290", null, "https://wpblog.wyzant.com/embed/editor/256291", null, "https://wpblog.wyzant.com/embed/editor/256292", null, "https://wpblog.wyzant.com/embed/editor/256293", null, "https://wpblog.wyzant.com/embed/editor/256294", null, "https://wpblog.wyzant.com/embed/editor/256295", null, "https://wpblog.wyzant.com/embed/editor/256296", null, "https://wpblog.wyzant.com/embed/editor/256297", null, "https://wpblog.wyzant.com/embed/editor/256298", null, "https://wpblog.wyzant.com/embed/editor/256299", null, "https://wpblog.wyzant.com/embed/editor/256300", null, "https://wpblog.wyzant.com/embed/editor/256301", null, "https://wpblog.wyzant.com/embed/editor/256302", null, "https://wpblog.wyzant.com/embed/editor/256303", null, "https://wpblog.wyzant.com/embed/editor/256304", null, "https://wpblog.wyzant.com/embed/editor/256305", null, "https://wpblog.wyzant.com/embed/editor/256306", null, "https://wpblog.wyzant.com/embed/editor/256307", null, "https://wpblog.wyzant.com/embed/editor/256308", null, "https://wpblog.wyzant.com/embed/editor/256309", null, "https://wpblog.wyzant.com/embed/editor/256310", null, "https://wpblog.wyzant.com/embed/editor/256311", null, "https://wpblog.wyzant.com/embed/editor/256312", null, "https://wpblog.wyzant.com/embed/editor/256313", null, "https://wpblog.wyzant.com/embed/editor/256314", null, "https://wpblog.wyzant.com/embed/editor/256315", null, "https://wpblog.wyzant.com/embed/editor/256316", null, "https://wpblog.wyzant.com/embed/editor/256317", null, "https://wpblog.wyzant.com/embed/editor/256318", null, "https://wpblog.wyzant.com/embed/editor/256319", null, "https://wpblog.wyzant.com/embed/editor/256320", null, "https://wpblog.wyzant.com/embed/editor/256321", null, "https://wpblog.wyzant.com/embed/editor/256322", null, "https://wpblog.wyzant.com/embed/editor/256323", null, "https://wpblog.wyzant.com/embed/editor/256324", null, "https://wpblog.wyzant.com/embed/editor/256325", null, "https://wpblog.wyzant.com/embed/editor/256326", null, "https://wpblog.wyzant.com/embed/editor/256327", null, "https://wpblog.wyzant.com/embed/editor/256328", null, "https://wpblog.wyzant.com/embed/editor/256329", null, "https://wpblog.wyzant.com/embed/editor/256330", null, "https://wpblog.wyzant.com/embed/editor/256331", null, "https://wpblog.wyzant.com/embed/editor/256332", null, "https://wpblog.wyzant.com/embed/editor/256333", null, "https://wpblog.wyzant.com/embed/editor/256334", null, "https://wpblog.wyzant.com/embed/editor/256335", null, "https://wpblog.wyzant.com/embed/editor/256329", null, "https://wpblog.wyzant.com/embed/editor/256336", null, "https://wpblog.wyzant.com/embed/editor/256337", null, "https://wpblog.wyzant.com/embed/editor/256338", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9232942,"math_prob":0.99170595,"size":4114,"snap":"2021-43-2021-49","text_gpt3_token_len":992,"char_repetition_ratio":0.20024331,"word_repetition_ratio":0.05419355,"special_character_ratio":0.22848809,"punctuation_ratio":0.12151617,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999428,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,4,null,2,null,2,null,2,null,2,null,2,null,2,null,4,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-04T12:52:44Z\",\"WARC-Record-ID\":\"<urn:uuid:ff0f2d0e-db91-4bb9-a8e3-997a9422dd44>\",\"Content-Length\":\"356005\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d3afd3b4-7541-41e2-8447-a6c6841e37e5>\",\"WARC-Concurrent-To\":\"<urn:uuid:41d76388-2498-446a-bcc7-6a72c2e67b0b>\",\"WARC-IP-Address\":\"192.0.78.25\",\"WARC-Target-URI\":\"https://wpblog.wyzant.com/resources/lessons/math/geometry/triangles/angles_of_triangles/\",\"WARC-Payload-Digest\":\"sha1:TWN4YYJ3CIPNZZ6MYJ2W62IHIZOA3CLZ\",\"WARC-Block-Digest\":\"sha1:TRTXGEMHL3YS4GZCMHG63HXEO2OLGNLC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362992.98_warc_CC-MAIN-20211204124328-20211204154328-00015.warc.gz\"}"}
https://www.askiitians.com/rd-sharma-class-8-solutions/
[ "#### Thank you for registering.\n\nOne of our academic counsellors will contact you within 1 working day.\n\nClick to Chat\n\n1800-5470-145\n\n+91 7353221155\n\nCART 0\n\n• 0\nMY CART (5)\n\nUse Coupon: CART20 and get 20% off on all online Study Material\n\nITEM\nDETAILS\nMRP\nDISCOUNT\nFINAL PRICE\nTotal Price: Rs.\n\nThere are no items in this cart.\nContinue Shopping\n\n# RD Sharma Class 8 Solutions\n\nRD Sharma Solutions for Class 8 Maths include answers to all the exercises of RD Sharma Class 8 Maths book in a stepwise manner. RD Sharma is one of the best reference books when it comes to Maths. With this book, Class 8 students can revise Maths concepts easily and prepare themselves for their exams. Class 8 RD Sharma book includes 27 Chapters with various topics overlapping with the CBSE Class 8 Maths syllabus. This is why many teachers and students recommend this book. Students can now access RD Sharma free solutions for Class 8 Maths from the askIITians website. Our team has prepared these solutions so that the students can solve their doubts instantly.\n\nRD Sharma Class 8 Maths book includes a variety of questions that can help students strengthen their conceptual understanding. But there can be times when students are unable to get the correct answer. This halts their learning right away and they have to wait to get their doubts solved. But with online RD Sharma Class 8 Solutions by askIITians, students can continue their learning without any hindrance. They can refer to the solutions whenever they get stuck on a question and identify their mistakes. This not only saves their time but also makes learning much easier for them. askIITians provides chapter-wise solutions for RD Sharma Class 8 Maths book. Download our free RD Sharma solutions right now and start practising.\n\n## RD Sharma Solutions for Class 8 Maths All Chapters\n\nRD Sharma Class 8 Maths book includes 27 Chapters on topics like cubes, cube roots, time and work, percentage, mensuration, visualising shapes, factorisation, division of algebraic expressions and profit and loss. It also includes topics like graphs, probability, data handling, powers, rational numbers, inverse and direct variations, linear equations in one variable and compound interest. Concepts of shapes such as polygons, quadrilaterals, and special types of quadrilaterals like parallelogram, rhombus, square and trapezium are split into three different chapters for an in-depth understanding of the students.\n\nHere, you can access the free RD Sharma Solutions for Class 8 Maths book chapter-wise so that there is no confusion. We have organised the solutions for every chapter on the basis of exercises to simplify the process for you.\n\n### R.D. Sharma Class 8 Solutions\n\nChapter 1: Rational Numbers\n\nChapter 15: Understanding Shapes I Polygons\n\nChapter 2: Powers\n\nChapter 16: Understanding Shapes II Quadrilaterals\n\nChapter 3: Squares and Square Roots\n\nChapter 17: Understanding Shapes Special III Types Quadrilaterals\n\nChapter 4: Cubes and Cube Roots\n\nChapter 18: Practical Geometry\n\nChapter 5: Playing With Numbers\n\nChapter 19: Visualising Shapes\n\nChapter 6: Algebraic Expressions and Identities\n\nChapter 20: Area of Trapezium and Polygon\n\nChapter 7: Factorization\n\nChapter 21: Volumes Surface Area Cuboid Cube\n\nChapter 8: Division of Algebraic Expressions\n\nChapter 22: Surface Area and Volume of Right Circular Cylinder\n\nChapter 9: Linear Equation In One Variable\n\nChapter 23: Classification and Tabulation of Data\n\nChapter 10: Direct and Inverse Variations\n\nChapter 24: Graphical Representation of Data As Histograms\n\nChapter 11: Time and Work\n\nChapter 25: Pictorial Representation of Data As Pie Charts Or Circle Graphs\n\nChapter 12: Percentage\n\nChapter 26: Data Handling Probability\n\nChapter 13: Profit Loss Discount and Value Added Tax\n\nChapter 27: Introduction to Graphs\n\nChapter 14: Compound Interest\n\n## Why RD Sharma Solutions for Class 8 Maths are Important for Students?\n\nMaths is an important subject, especially in Class 8 and Class 9 as the topics that you learn in these classes lay the foundation for higher-level topics. Solving Maths problems enhances your analytical and critical thinking which is important for students these days as they have to appear in different entrance tests, olympiads and other competitive examinations. RD Sharma Class 8 Maths book includes a variety of questions that can help the students solidify their Maths concepts from an early stage and make this subject their strength. Here are a few reasons why RD Sharma solutions by askIITians can benefit the students:\n\n• The online RD Sharma Class 8 Solutions are created by askIITians experts for self-learning of the students. These solutions are self-explanatory so students can understand them easily without any guidance.\n• With the help of RD Sharma solutions, students can enhance their conceptual understanding of Class 8 Maths. Our experts have solved every question in a detailed stepwise manner so that students have no problems in understanding the concepts.\n• All the solutions of RD Sharma Class 8 Maths chapters are available to the students free of cost. Students can download the RD Sharma free solutions from our website and refer to them any time they want.\n• These solutions are created considering the learning curve of the students. All the solutions are verified by our experts which means there is no chance of mistakes.\n• Students can study RD Sharma solutions at their own pace and as per their learning schedule. They do not need to solve all the exercise questions all at once.\n\nRD Sharma Class 8 Solutions are a must for the students who want to score full marks in their school examination like CBSE. Along with this, students who want to participate in various competitive examinations like olympiads, quizzes, aptitude tests etc can prepare themselves with the help of RD Sharma problems. In case of any confusions, our RD Shamra solutions will be of great help!\n\nDownload RD Sharma Free Solutions for Class 8 Maths by askIITians today and start practising with full confidence!\n\n## RD Sharma Class 8 Maths Solutions FAQs\n\n#1 Is RD Sharma good for Class 8?\n\nOf course! The variety of problems in RD Sharma Class 8 Maths book allow them to strengthen their conceptual knowledge. With practice, Class 8 students can master every Math concept in their syllabus and score full marks in Maths which seems to be the toughest of all to many.\n\n#2 How many chapters are there in Class 8 RD Sharma?\n\nThere are 27 Chapters in the Class 8 RD Sharma textbook for Mathematics. These include topics like Compound Interest, Understanding Shapes – I (Polygons), Understanding Shapes – II (Quadrilaterals), Understanding Shapes – III (Special Types of Quadrilaterals), Practical Geometry (Constructions), Visualising Shapes, Mensuration – I (Area of a Trapezium and a Polygon), Mensuration – II (Volumes and Surface Areas of a Cuboid and a Cube), Mensuration – III (Surface Area and Volume of a Right Circular Cylinder), Data Handling – I (Classification and Tabulation of Data), Data Handling – II (Graphical Representation of Data as Histogram), Data Handling – III (Pictorial Representation of Data as Pie Charts or Circle Graphs) and more!\n\n#3 Can online RD Sharma Class 8 solutions help in CBSE Class 8 Maths exam?\n\nYes, RD Sharma Class 8 Maths book includes concepts from the CBSE syllabus. There are different types of problems for every topic. Practising such questions can help students prepare well for their CBSE Class 8 Maths exam.\n\n#4 From where can I find RD Sharma free solutions for Class 8 Maths?\n\nStudents can find free solutions for RD Sharma Class 8 Maths from the askIITians website. We provide chapter-wise solutions for RD Sharma. These solutions are prepared and verified by our experts.\n\n#5 What if I need additional help in understanding Class 8 Maths RD Sharma concepts?\n\nStudents who require guidance on Class 8 Maths concepts can enrol in our online coaching classes where our Maths experts teach every concept step by step in live classes. We also provide the latest study resources for Class 8 Maths including chapter notes, important formulae, worksheets, mindmaps, flashcards and more!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90065265,"math_prob":0.5928591,"size":8680,"snap":"2021-31-2021-39","text_gpt3_token_len":1858,"char_repetition_ratio":0.17646381,"word_repetition_ratio":0.04869186,"special_character_ratio":0.2077189,"punctuation_ratio":0.13240857,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95306146,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-29T14:50:44Z\",\"WARC-Record-ID\":\"<urn:uuid:791214c4-f7e1-458b-9d12-01bf9878ba84>\",\"Content-Length\":\"254794\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1c011555-f6ca-4a72-8b0d-dba2b6ce21a5>\",\"WARC-Concurrent-To\":\"<urn:uuid:ee379631-56d9-411b-9fc8-fa2c226b6c14>\",\"WARC-IP-Address\":\"3.7.36.8\",\"WARC-Target-URI\":\"https://www.askiitians.com/rd-sharma-class-8-solutions/\",\"WARC-Payload-Digest\":\"sha1:YR2RVB4IC7K7VTOHNVLOKPXFBVPOZZXM\",\"WARC-Block-Digest\":\"sha1:BGBT63BC2S67X7K47A7CNFFNGWPURESK\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153860.57_warc_CC-MAIN-20210729140649-20210729170649-00420.warc.gz\"}"}
https://zbmath.org/?q=an%3A0752.11045
[ "# zbMATH — the first resource for mathematics\n\nStark units and Kolyvagin’s “Euler systems”. (English) Zbl 0752.11045\nIn his important work on the conjecture of Birch and Swinnerton-Dyer, V. Kolyvagin [The Grothendieck Festschrift, Vol. II, Prog. Math. 87, 435-483 (1990; Zbl 0742.14017)] introduced the concept of an Euler system. Loosely speaking, an Euler system is a set of points on an algebraic group satisfying two conditions: a norm property and a congruence property. In the present paper, the author shows that the norm property implies a weak form of the congruence property that is sufficient for most applications. The proof is fairly formal, relying on the introduction of a “universal Euler system”.\nThe main importance of the result is that the units predicted to exist by Stark’s conjecture satisfy the norm condition, hence the congruence condition, so they conjecturally yield a new family of Euler systems, which can be used to study the structure of ideal class groups as in the work of F. Thaine [Ann. Math., II. Ser. 128, 1-18 (1988; Zbl 0665.12003)], the author [Invent. Math. 89, 511-526 (1987; Zbl 0628.12007)], and V. Kolyvagin.\n\n##### MSC:\n 11R27 Units and factorization 11G16 Elliptic and modular units 11R29 Class numbers, class groups, discriminants 14G05 Rational points\nFull Text:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8130566,"math_prob":0.7296139,"size":1617,"snap":"2021-31-2021-39","text_gpt3_token_len":466,"char_repetition_ratio":0.11221327,"word_repetition_ratio":0.008163265,"special_character_ratio":0.2943723,"punctuation_ratio":0.2005988,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9742465,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-26T22:40:44Z\",\"WARC-Record-ID\":\"<urn:uuid:a6cb1b56-fa17-46c5-9998-48887ddec103>\",\"Content-Length\":\"49231\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c3f70e1d-c139-4e31-a672-4995422e4ce7>\",\"WARC-Concurrent-To\":\"<urn:uuid:6d2962b2-8090-42d8-a36b-a02ae06ae7f6>\",\"WARC-IP-Address\":\"141.66.194.2\",\"WARC-Target-URI\":\"https://zbmath.org/?q=an%3A0752.11045\",\"WARC-Payload-Digest\":\"sha1:4MB2AYIMRNXBZG3T7L3SIJNTUHZ6YDY6\",\"WARC-Block-Digest\":\"sha1:4PBQI2Q5EG6MTXFXXQ5JEVRRATFFRVLA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057973.90_warc_CC-MAIN-20210926205414-20210926235414-00139.warc.gz\"}"}
https://www.colorhexa.com/06e312
[ "# #06e312 Color Information\n\nIn a RGB color space, hex #06e312 is composed of 2.4% red, 89% green and 7.1% blue. Whereas in a CMYK color space, it is composed of 97.4% cyan, 0% magenta, 92.1% yellow and 11% black. It has a hue angle of 123.3 degrees, a saturation of 94.8% and a lightness of 45.7%. #06e312 color hex could be obtained by blending #0cff24 with #00c700. Closest websafe color is: #00cc00.\n\n• R 2\n• G 89\n• B 7\nRGB color chart\n• C 97\n• M 0\n• Y 92\n• K 11\nCMYK color chart\n\n#06e312 color description : Vivid lime green.\n\n# #06e312 Color Conversion\n\nThe hexadecimal color #06e312 has RGB values of R:6, G:227, B:18 and CMYK values of C:0.97, M:0, Y:0.92, K:0.11. Its decimal value is 451346.\n\nHex triplet RGB Decimal 06e312 `#06e312` 6, 227, 18 `rgb(6,227,18)` 2.4, 89, 7.1 `rgb(2.4%,89%,7.1%)` 97, 0, 92, 11 123.3°, 94.8, 45.7 `hsl(123.3,94.8%,45.7%)` 123.3°, 97.4, 89 00cc00 `#00cc00`\nCIE-LAB 79.051, -78.396, 74.453 27.652, 55.017, 9.734 0.299, 0.595, 55.017 79.051, 108.116, 136.478 79.051, -74.456, 95.565 74.174, -63.26, 44.141 00000110, 11100011, 00010010\n\n# Color Schemes with #06e312\n\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #e306d7\n``#e306d7` `rgb(227,6,215)``\nComplementary Color\n• #69e306\n``#69e306` `rgb(105,227,6)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #06e381\n``#06e381` `rgb(6,227,129)``\nAnalogous Color\n• #e30669\n``#e30669` `rgb(227,6,105)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #8106e3\n``#8106e3` `rgb(129,6,227)``\nSplit Complementary Color\n• #e31206\n``#e31206` `rgb(227,18,6)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #1206e3\n``#1206e3` `rgb(18,6,227)``\nTriadic Color\n• #d7e306\n``#d7e306` `rgb(215,227,6)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #1206e3\n``#1206e3` `rgb(18,6,227)``\n• #e306d7\n``#e306d7` `rgb(227,6,215)``\nTetradic Color\n• #04980c\n``#04980c` `rgb(4,152,12)``\n• #05b10e\n``#05b10e` `rgb(5,177,14)``\n• #05ca10\n``#05ca10` `rgb(5,202,16)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #0af917\n``#0af917` `rgb(10,249,23)``\n• #23f92e\n``#23f92e` `rgb(35,249,46)``\n• #3cfa46\n``#3cfa46` `rgb(60,250,70)``\nMonochromatic Color\n\n# Alternatives to #06e312\n\nBelow, you can see some colors close to #06e312. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #31e306\n``#31e306` `rgb(49,227,6)``\n• #1fe306\n``#1fe306` `rgb(31,227,6)``\n• #0ce306\n``#0ce306` `rgb(12,227,6)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #06e324\n``#06e324` `rgb(6,227,36)``\n• #06e337\n``#06e337` `rgb(6,227,55)``\n• #06e349\n``#06e349` `rgb(6,227,73)``\nSimilar Colors\n\n# #06e312 Preview\n\nText with hexadecimal color #06e312\n\nThis text has a font color of #06e312.\n\n``<span style=\"color:#06e312;\">Text here</span>``\n#06e312 background color\n\nThis paragraph has a background color of #06e312.\n\n``<p style=\"background-color:#06e312;\">Content here</p>``\n#06e312 border color\n\nThis element has a border color of #06e312.\n\n``<div style=\"border:1px solid #06e312;\">Content here</div>``\nCSS codes\n``.text {color:#06e312;}``\n``.background {background-color:#06e312;}``\n``.border {border:1px solid #06e312;}``\n\n# Shades and Tints of #06e312\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #001101 is the darkest color, while #fdfffd is the lightest one.\n\n• #001101\n``#001101` `rgb(0,17,1)``\n• #012403\n``#012403` `rgb(1,36,3)``\n• #013704\n``#013704` `rgb(1,55,4)``\n• #024a06\n``#024a06` `rgb(2,74,6)``\n• #025d07\n``#025d07` `rgb(2,93,7)``\n• #037009\n``#037009` `rgb(3,112,9)``\n• #03830a\n``#03830a` `rgb(3,131,10)``\n• #04970c\n``#04970c` `rgb(4,151,12)``\n• #04aa0d\n``#04aa0d` `rgb(4,170,13)``\n• #05bd0f\n``#05bd0f` `rgb(5,189,15)``\n• #05d010\n``#05d010` `rgb(5,208,16)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\n• #07f614\n``#07f614` `rgb(7,246,20)``\nShade Color Variation\n• #17f924\n``#17f924` `rgb(23,249,36)``\n• #2af936\n``#2af936` `rgb(42,249,54)``\n• #3efa48\n``#3efa48` `rgb(62,250,72)``\n• #51fa5a\n``#51fa5a` `rgb(81,250,90)``\n• #64fb6c\n``#64fb6c` `rgb(100,251,108)``\n• #77fb7e\n``#77fb7e` `rgb(119,251,126)``\n• #8afc90\n``#8afc90` `rgb(138,252,144)``\n• #9dfca2\n``#9dfca2` `rgb(157,252,162)``\n• #b0fdb4\n``#b0fdb4` `rgb(176,253,180)``\n• #c3fdc6\n``#c3fdc6` `rgb(195,253,198)``\n• #d6fed9\n``#d6fed9` `rgb(214,254,217)``\n• #eafeeb\n``#eafeeb` `rgb(234,254,235)``\n• #fdfffd\n``#fdfffd` `rgb(253,255,253)``\nTint Color Variation\n\n# Tones of #06e312\n\nA tone is produced by adding gray to any pure hue. In this case, #727772 is the less saturated color, while #06e312 is the most saturated one.\n\n• #727772\n``#727772` `rgb(114,119,114)``\n• #69806a\n``#69806a` `rgb(105,128,106)``\n• #608962\n``#608962` `rgb(96,137,98)``\n• #57925a\n``#57925a` `rgb(87,146,90)``\n• #4e9b52\n``#4e9b52` `rgb(78,155,82)``\n• #45a44a\n``#45a44a` `rgb(69,164,74)``\n• #3cad42\n``#3cad42` `rgb(60,173,66)``\n• #33b63a\n``#33b63a` `rgb(51,182,58)``\n• #2abf32\n``#2abf32` `rgb(42,191,50)``\n• #21c82a\n``#21c82a` `rgb(33,200,42)``\n• #18d122\n``#18d122` `rgb(24,209,34)``\n• #0fda1a\n``#0fda1a` `rgb(15,218,26)``\n• #06e312\n``#06e312` `rgb(6,227,18)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #06e312 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.502236,"math_prob":0.7240383,"size":3660,"snap":"2019-35-2019-39","text_gpt3_token_len":1605,"char_repetition_ratio":0.12773523,"word_repetition_ratio":0.011090573,"special_character_ratio":0.56092894,"punctuation_ratio":0.23489933,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9908747,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-26T02:25:44Z\",\"WARC-Record-ID\":\"<urn:uuid:abfedb27-daab-4bf5-a8e2-a18203d42c18>\",\"Content-Length\":\"36216\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ceb0684f-f661-4c58-a013-442171d5ef5e>\",\"WARC-Concurrent-To\":\"<urn:uuid:ad0fc5d3-f249-4ef7-abe1-da27a004481f>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/06e312\",\"WARC-Payload-Digest\":\"sha1:6MAW44KIXZWNBGEU6IIQ57XRY5ARI5NY\",\"WARC-Block-Digest\":\"sha1:X2RBLDBUKIKW6TXBCOB2OMUYGTUVHX37\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027330962.67_warc_CC-MAIN-20190826022215-20190826044215-00207.warc.gz\"}"}
https://www.physicsforums.com/threads/expansion-of-van-der-waals-for-small-pressure.718202/
[ "# Expansion of Van der waals for small pressure\n\nGold Member\n\n## Homework Statement\n\nIn the VDW eqn of state, ##(P + a/v^2)(v-b)=RT## write Pv as a function of {P,T} and by expanding the result in powers of P or otherwise show that the first terms of a Virial expansion in powers of P for a VDW gas are given by $$Pv = RT + \\left(b - \\frac{a}{RT}\\right)P + O(P^2)$$\n\nTaylor expansion\n\n## The Attempt at a Solution\n\nI have already solved this (I think) via a method belonging in the 'otherwise' category. However, I wish to also solve it via the method outlined. The hint is that we can express y =Pv, x=P and write ##y = y(0,T) + y'(0,T)x + O(x^2)##\nThis can be rewritten as $$Pv = Pv(0,T) + \\frac{d}{dP} (Pv)|_{P=0}P + O(P^2)$$, so essentially we are expanding the VDW eqn about small pressures. The first term on the RHS I think should be RT, which makes sense, yet I don't see how it comes about from subbing P=0 into VDW. The differentiation of the second term gives $$b - a\\frac{d}{dP} \\frac{1}{v} + ab\\frac{d}{dP} \\frac{1}{v^2} = b -a \\frac{d}{dv}\\frac{1}{v}\\frac{dv}{dP} + ab\\frac{d}{dv} \\frac{1}{v^2} \\frac{dv}{dP}$$ but I am not sure how to continue from here.\nMany thanks.\n\nChestermiller\nMentor\nTry rewriting the equation as:\n\n$$Pv+\\frac{a}{v}-Pb-\\frac{ab}{v^2}=RT$$\n\nNext, reexpress this as:\n$$Pv+\\frac{aP}{Pv}-Pb-\\frac{abP^2}{(Pv)^2}=RT$$\n\nNow, for convenience, substitute Pv = x:\n\n$$x+\\frac{aP}{x}-Pb-\\frac{abP^2}{x^2}=RT$$\n\nYou know that, at P = 0, x = RT\n\nSo do your Taylor series expansion about this point. Take the derivative of the equation with respect to P, and then solve for the derivative of x with respect to P. Evaluate this derivative at P=0, x = RT.\n\nChet\n\n•", null, "1 person" ]
[ null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8642055,"math_prob":0.9992152,"size":1168,"snap":"2021-21-2021-25","text_gpt3_token_len":401,"char_repetition_ratio":0.11512028,"word_repetition_ratio":0.0,"special_character_ratio":0.33904108,"punctuation_ratio":0.064150944,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99996305,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-09T19:45:41Z\",\"WARC-Record-ID\":\"<urn:uuid:fe75fbec-7fed-4d67-a5ba-2001cadfd5eb>\",\"Content-Length\":\"65868\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aadca489-71ea-4d4c-a87c-de407baee27d>\",\"WARC-Concurrent-To\":\"<urn:uuid:ffcefe48-75e4-42a3-89c3-5ae741c0a421>\",\"WARC-IP-Address\":\"104.26.14.132\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/expansion-of-van-der-waals-for-small-pressure.718202/\",\"WARC-Payload-Digest\":\"sha1:N4PT2I5RJ2MDFMOVRZ773FAY6MEJYV5H\",\"WARC-Block-Digest\":\"sha1:2DQLBM353XVYUXYO5YR7TLOR6MM6NCRG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989012.26_warc_CC-MAIN-20210509183309-20210509213309-00391.warc.gz\"}"}
http://ntiertraining.com/training-course/machine-learning-with-apache-spark/
[ "866-526-3921 [email protected]\n\nThis course teaches machine learning at scale with the popular Apache Spark framework.\n\nNo machine learning knowledge is assumed. For each machine learning concept, we first discuss the foundations, its applicability and limitations. Then we explain the implementation and use, covering specific use cases. This is achieved through a combination of 50 percent lecture, 50 percent lab work.\n\nPlease note that this course does not include in-depth coverage of the maths/stats behind machine learning.\n\nThis course is taught using Spark and Python.\n\nAudience: This class is intended for data scientists and software engineers.\nCourse Duration: 3 Days\nPrerequisites:\n\nWe assume no previous knowledge of Machine Learning. We teach popular Machine Learning algorithms from scratch.\n\nPrior to taking this course, students should have:\n\n• A working knowledge of Apache Spark\n• A programming background\n• Familiarity with Python would be a plus, but not required\nHardware and Software Requirements:\n\nA working Spark environment will be provided for students (no software needs to be installed on student machines). Participants will need an SSH client and a browser.\n\nCourse Objectives:\n• Learn popular machine learning algorithms, their applicability and limitations\n• Practice the application of these methods in the Spark machine learning environment\n• Learn practical use cases and limitations of algorithms\nCourse Outline:\n• Section One – Machine Learning (ML) Overview\n• Machine Learning landscape\n• Machine Learning applications\n• Understanding ML algorithms and models (supervised and unsupervised)\n• Section Two – ML in Python and Spark\n• Spark ML Overview\n• Introduction to Jupyter notebooks\n• Lab – Working with Jupyter + Python + Spark\n• Lab – Spark ML utilities\n• Section Three – Machine Learning Concepts\n• Statistics Primer\n• Covariance, Correlation, Covariance Matrix\n• Errors, Residuals\n• Overfitting / Underfitting\n• Cross validation, bootstrapping\n• Confusion Matrix\n• ROC curve, Area Under Curve (AUC)\n• Lab – Basic stats\n• Section Four – Feature Engineering (FE)\n• Preparing data for ML\n• Extracting features, enhancing data\n• Data cleanup\n• Visualizing Data\n• Lab – Data cleanup\n• Lab – Visualizing data\n• Section Five – Linear regression\n• Simple Linear Regression\n• Multiple Linear Regression\n• Running LR\n• Evaluating LR model performance\n• Lab\n• Use case – House price estimates\n• Section Six – Logistic Regression\n• Understanding Logistic Regression\n• Calculating Logistic Regression\n• Evaluating model performance\n• Lab\n• Use case –Credit card application, college admissions\n• Section Seven – Classification: SVM (Supervised Vector Machines)\n• SVM concepts and theory\n• SVM with kernel\n• Lab\n• Use case – Customer churn data\n• Section Eight – Classification: Decision Trees and Random Forests\n• Theory behind trees\n• Classification and Regression Trees (CART)\n• Random Forest concepts\n• Labs\n• Use case – Predicting loan defaults, estimating election contributions\n• Section Nine – Classification: Naive Bayes\n• Theory\n• Lab\n• Use case – Spam filtering\n• Section 10 – Clustering (K-Means)\n• Theory behind K-Means\n• Running K-Means algorithm\n• Estimating the performance\n• Lab\n• Use case – Grouping cars data, grouping shopping data\n• Section 11 – Principal Component Analysis (PCA)\n• Understanding PCA concepts\n• PCA applications\n• Running a PCA algorithm\n• Evaluating results\n• Lab\n• Use case – Analyzing retail shopping data\n• Section 12 – Recommendation (Collaborative Filtering)\n• Recommender systems overview\n• Collaborative Filtering concepts\n• Lab\n• Use case – Movie recommendations, music recommendations\n• Section 13 – Final Workshop (time permitting)\n• Students will analyze a couple of datasets and run ML algorithms\n• This is done as a group exercise. Each group will present findings to the class" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.74638206,"math_prob":0.6773937,"size":3794,"snap":"2019-51-2020-05","text_gpt3_token_len":811,"char_repetition_ratio":0.13562006,"word_repetition_ratio":0.055829227,"special_character_ratio":0.20980495,"punctuation_ratio":0.062730625,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9852204,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-15T21:37:39Z\",\"WARC-Record-ID\":\"<urn:uuid:65027cbc-9cc5-4222-8cb6-35f7e83d158f>\",\"Content-Length\":\"68170\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c1de28ad-714d-4b34-b77e-17dd6fc2f6f0>\",\"WARC-Concurrent-To\":\"<urn:uuid:199f8387-a09c-470b-8308-d6fb64a10a27>\",\"WARC-IP-Address\":\"104.24.111.225\",\"WARC-Target-URI\":\"http://ntiertraining.com/training-course/machine-learning-with-apache-spark/\",\"WARC-Payload-Digest\":\"sha1:SSHAGBXGOTLUXE37XIEAP5SYUU7MBHQC\",\"WARC-Block-Digest\":\"sha1:XZVFNX36JJZGYBGRQTLSQXINJCY72IAB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575541310866.82_warc_CC-MAIN-20191215201305-20191215225305-00399.warc.gz\"}"}
http://taorith.com/unsorted/queuing-theory-examples-problems-of-power-63757621.html
[ "# Queuing theory examples problems of power", null, "Pinedo and Introduction to stochastic networks, by R. Service systems are usually classified in terms of their number of channels, or numbers of servers. Gaurav Gupta The server has an exponential service time distribution with a mean service rate of 4 customers per minute, i. Expected cost of system per hour. See our User Agreement and Privacy Policy. If you do not see its contents the file may be temporarily unavailable at the journal website or you do not have a PDF plug-in installed and enabled in your browser.\n\n• Queueing theory\n• Queueing Theory — Worked Examples and Problems (pdf) Paperity\n\n• EXAMPLES OF THE POWER OF QUEUEING THEORY.\n\n7 example, the. For an example involving power management in data centers, consider the problem. Queueing Theory — Worked Examples and Problems. Journal of the Operational Research Society, May Andrew D.\n\nYoung. we analyze the basic features of queuing theory and its applications. Keywords theatres etc., all have Queuing problems.\n\nQueues Bank is an example of unlimited queue length . Queuing is Model VIII – Power supply Model. Model IX.\nAdditional queueing theory information can be found here and here.\n\nFor two servers working at the original rate the output is as below. For this very simple queueing system there are exact formulae that give the statistics above under the assumption that the system has reached a steady state - that is that the system has been running long enough so as to settle down into some kind of equilibrium position.\n\nVideo: Queuing theory examples problems of power #40 Queuing Theory Example of (M/M/1):(Infinite/FCFS) in Hindi//O.R.\n\nWhat would be the proportion time the petrol pump is idle? Are you sure you want to Yes No.\n\n## Queueing theory", null, "DATA GRAMMAR PLURAL The next four chapters consider geometric, dynamic, integer and stochastic programming respectively. If you continue browsing the site, you agree to the use of cookies on this website. Chapter 2 considers classical optimization techniques; Chapters 3 and 4 are devoted to linear programming problems. Pankaj Gangwar Suriender Singh Prajapati Other important arrival processes are scheduled arrivals; batch arrivals; and time dependent arrival rates i.\n1.\n\nIntroduction.-The best way of opening this discussion on the Theory of Queues would use the terminology appropriate to these homely examples. Let me begin with a straightforward problem of power-series expansion.", null, "It is interesting. Queuing Theory. Ingredients of Queuing Problem: 1: Queue input Example: Imagine customers arriving at a fa- cility at times. is a jth power the infinite sum. Department of Electrical Engineering Basic concepts; Source models; Service models (demo); Single-queue systems; Priority/shared.\n\nPoisson traffic; Batch arrivals; Example applications – voice, video, file transfer.\n\n## Queueing Theory — Worked Examples and Problems (pdf) Paperity\n\npriorities; Again, to deal with the segmentation problem, we approximate as follows: For each packet: .\nIncrease in number of buses and reservation counters requires additional resources. To analyse this sub-system we need information relating to:.", null, "On an average one customer arrives 12 minutes and each customer takes 6 minutes for getting served. The first line of the output says that the results are from a formula.\n\nWhat is average time for the hob to be in the regrinding section?", null, "MASTER PASSWORD MOZILLA THUNDERBIRD How many jobs are ahead of the average set just brought in? How many more booths should be established to reduce the waiting time less than or equal to half of the present waiting time. Certainly, the student of OR or management science using this book would need a supplementary textbook on the theory the author recommends Page. Simulating for hours to reduce the overall elapsed time required and looking at just the total system cost per hour item 22 in the above outputs we have the following:. Queues form because resources are limited.Video: Queuing theory examples problems of power Queuing Theory - Single Server Infinite QueueAs before we can investigate how the system might behave with more servers. Start on.\n\n#### 5 thoughts on “Queuing theory examples problems of power”\n\n1.", null, "Zologar:\n\nServices do not occur when the queue is empty i.\n\n2.", null, "Shakara:\n\nQueuing theory deals with problems which involve queuing or waiting.\n\n3.", null, "Kajim:\n\nThe length of service by the clerk has an exponential distribution. If we choose to adopt the approximation approach we get:.\n\n4.", null, "Akinogis:\n\nIf service facilities are increased, then the question arise how much to increase?\n\n5.", null, "Tygolrajas:" ]
[ null, "http://taorith.com/media/queuing-theory-examples-problems-of-power-5.jpg", null, "http://taorith.com/media/queuing-theory-examples-problems-of-power.jpg", null, "http://taorith.com/media/queuing-theory-examples-problems-of-power-4.jpg", null, "http://taorith.com/media/queuing-theory-examples-problems-of-power-3.jpg", null, "http://taorith.com/media/queuing-theory-examples-problems-of-power-2.jpg", null, "http://1.gravatar.com/avatar/1cb1c39857f5eef49897f849251861a9", null, "http://1.gravatar.com/avatar/1cb1c39857f5eef49897f849251861a9", null, "http://1.gravatar.com/avatar/1cb1c39857f5eef49897f849251861a9", null, "http://1.gravatar.com/avatar/1cb1c39857f5eef49897f849251861a9", null, "http://1.gravatar.com/avatar/1cb1c39857f5eef49897f849251861a9", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8829008,"math_prob":0.73143995,"size":4436,"snap":"2019-51-2020-05","text_gpt3_token_len":899,"char_repetition_ratio":0.113267146,"word_repetition_ratio":0.014164306,"special_character_ratio":0.19229035,"punctuation_ratio":0.11567164,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9772309,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-10T23:15:56Z\",\"WARC-Record-ID\":\"<urn:uuid:d095be7b-139b-428c-a3dd-9247e2451cbd>\",\"Content-Length\":\"21898\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:caab2277-7273-430c-84ba-b76857c00509>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a94ea25-5026-494b-ac80-854fc20a3833>\",\"WARC-IP-Address\":\"212.32.230.212\",\"WARC-Target-URI\":\"http://taorith.com/unsorted/queuing-theory-examples-problems-of-power-63757621.html\",\"WARC-Payload-Digest\":\"sha1:PIF75UYKPWQJBXVFLRQDUOVSMEOXC2ZZ\",\"WARC-Block-Digest\":\"sha1:ZBXWOUXT34LCWNWG5R7IME7AHUCMJ6LD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540529006.88_warc_CC-MAIN-20191210205200-20191210233200-00375.warc.gz\"}"}
https://cpes.vt.edu/library/viewnugget/633
[ "LIBRARY\n\n# Equivalent Electric Circuit for a wave energy converter", null, "Fig. 1 Mechanical Diagram of WEC system including: Buoy, MMR, Mechanical Coupling, Generator, and Power Converter.\nAn equivalent circuit provides a faster and reliable way to analyze and design the wave energy converters (WECs). A WEC as a mechanical - electrical composite system which converts ocean wave energy to electrical power is shown in Fig. 1. The WEC system starts from buoy-wave interaction coupling with a rotational mechanical system, and then a mechanical motion rectifier (MMR) drives the permanent magnet synchronous generator (PMSG) which delivers energy to a power electronics converter.\n\nThrough approximation and circuit synthesis methods, wave-buoy behavior can be linearized as a RLC circuit network in Fig 2. The nonlinearity of MMR sets can be modeled as transformers and diodes. Along with a generator circuit model and power converter, a general methodology is shown to convert a multidisciplinary system into electrical components, which can be an aid to the electrical designers in the wave energy area.\n\nTwo applications will be introduced in this work. One is to apply a reliability analysis of each component. Under irregular wave conditions, a wave force is modeled as a current source that defines the input of the system in Fig. 2. Each rotational speed and torque values can be monitored real-time as voltage and current waveforms, so the maximum stress of each component can be recorded. Another is applied to optimize the systems output power. Based on an equivalent circuit, the system's output power capability can, thus be analyzed under different wave periods and gear ratio in Fig. 3.", null, "Fig. 2 Equivalent circuit of the WEC and its output waveforms under irregular wave condition.", null, "Fig. 3 Application of Equivalent Circuit for maximum output power under different wave frequency and gear ratio." ]
[ null, "https://cpes.vt.edu/modules/library/img/nuggets/2017/2017_D2.1_Fig1.JPG", null, "https://cpes.vt.edu/modules/library/img/nuggets/2017/2017_D2.1_Fig2.JPG", null, "https://cpes.vt.edu/modules/library/img/nuggets/2017/2017_D2.1_Fig3.JPG", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87821937,"math_prob":0.981422,"size":1082,"snap":"2021-43-2021-49","text_gpt3_token_len":213,"char_repetition_ratio":0.10946196,"word_repetition_ratio":0.0,"special_character_ratio":0.18299446,"punctuation_ratio":0.092307694,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98538935,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-18T13:42:53Z\",\"WARC-Record-ID\":\"<urn:uuid:744022dd-c337-4e16-a31d-55a7e0a7ab22>\",\"Content-Length\":\"80204\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d3a34aa9-72b1-42e0-834e-e98f26608b92>\",\"WARC-Concurrent-To\":\"<urn:uuid:718d3492-151f-4cc2-acaf-95e0d60bcf16>\",\"WARC-IP-Address\":\"128.173.90.245\",\"WARC-Target-URI\":\"https://cpes.vt.edu/library/viewnugget/633\",\"WARC-Payload-Digest\":\"sha1:U4K3S2SHEQTXBAY2VVCPEYMLDZDDAJ2G\",\"WARC-Block-Digest\":\"sha1:7HTIVEISZF3CGKF2TBSEHDOIDTH27FLE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585203.61_warc_CC-MAIN-20211018124412-20211018154412-00364.warc.gz\"}"}
https://www.colorhexa.com/3b4227
[ "# #3b4227 Color Information\n\nIn a RGB color space, hex #3b4227 is composed of 23.1% red, 25.9% green and 15.3% blue. Whereas in a CMYK color space, it is composed of 10.6% cyan, 0% magenta, 40.9% yellow and 74.1% black. It has a hue angle of 75.6 degrees, a saturation of 25.7% and a lightness of 20.6%. #3b4227 color hex could be obtained by blending #76844e with #000000. Closest websafe color is: #333333.\n\n• R 23\n• G 26\n• B 15\nRGB color chart\n• C 11\n• M 0\n• Y 41\n• K 74\nCMYK color chart\n\n#3b4227 color description : Very dark desaturated green.\n\n# #3b4227 Color Conversion\n\nThe hexadecimal color #3b4227 has RGB values of R:59, G:66, B:39 and CMYK values of C:0.11, M:0, Y:0.41, K:0.74. Its decimal value is 3883559.\n\nHex triplet RGB Decimal 3b4227 `#3b4227` 59, 66, 39 `rgb(59,66,39)` 23.1, 25.9, 15.3 `rgb(23.1%,25.9%,15.3%)` 11, 0, 41, 74 75.6°, 25.7, 20.6 `hsl(75.6,25.7%,20.6%)` 75.6°, 40.9, 25.9 333333 `#333333`\nCIE-LAB 26.657, -8.255, 15.498 4.118, 4.973, 2.662 0.35, 0.423, 4.973 26.657, 17.559, 118.042 26.657, -2.718, 16.596 22.3, -6.061, 8.531 00111011, 01000010, 00100111\n\n# Color Schemes with #3b4227\n\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #2e2742\n``#2e2742` `rgb(46,39,66)``\nComplementary Color\n• #423c27\n``#423c27` `rgb(66,60,39)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #2e4227\n``#2e4227` `rgb(46,66,39)``\nAnalogous Color\n• #3c2742\n``#3c2742` `rgb(60,39,66)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #272e42\n``#272e42` `rgb(39,46,66)``\nSplit Complementary Color\n• #42273b\n``#42273b` `rgb(66,39,59)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #273b42\n``#273b42` `rgb(39,59,66)``\nTriadic Color\n• #422e27\n``#422e27` `rgb(66,46,39)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #273b42\n``#273b42` `rgb(39,59,66)``\n• #2e2742\n``#2e2742` `rgb(46,39,66)``\nTetradic Color\n• #10120b\n``#10120b` `rgb(16,18,11)``\n• #1e2214\n``#1e2214` `rgb(30,34,20)``\n• #2d321e\n``#2d321e` `rgb(45,50,30)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #495230\n``#495230` `rgb(73,82,48)``\n• #58623a\n``#58623a` `rgb(88,98,58)``\n• #667243\n``#667243` `rgb(102,114,67)``\nMonochromatic Color\n\n# Alternatives to #3b4227\n\nBelow, you can see some colors close to #3b4227. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #424227\n``#424227` `rgb(66,66,39)``\n• #404227\n``#404227` `rgb(64,66,39)``\n• #3d4227\n``#3d4227` `rgb(61,66,39)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #394227\n``#394227` `rgb(57,66,39)``\n• #374227\n``#374227` `rgb(55,66,39)``\n• #344227\n``#344227` `rgb(52,66,39)``\nSimilar Colors\n\n# #3b4227 Preview\n\nText with hexadecimal color #3b4227\n\nThis text has a font color of #3b4227.\n\n``<span style=\"color:#3b4227;\">Text here</span>``\n#3b4227 background color\n\nThis paragraph has a background color of #3b4227.\n\n``<p style=\"background-color:#3b4227;\">Content here</p>``\n#3b4227 border color\n\nThis element has a border color of #3b4227.\n\n``<div style=\"border:1px solid #3b4227;\">Content here</div>``\nCSS codes\n``.text {color:#3b4227;}``\n``.background {background-color:#3b4227;}``\n``.border {border:1px solid #3b4227;}``\n\n# Shades and Tints of #3b4227\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #040403 is the darkest color, while #f9faf7 is the lightest one.\n\n• #040403\n``#040403` `rgb(4,4,3)``\n• #0f110a\n``#0f110a` `rgb(15,17,10)``\n• #1a1d11\n``#1a1d11` `rgb(26,29,17)``\n• #252918\n``#252918` `rgb(37,41,24)``\n• #303620\n``#303620` `rgb(48,54,32)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #464e2e\n``#464e2e` `rgb(70,78,46)``\n• #515b36\n``#515b36` `rgb(81,91,54)``\n• #5c673d\n``#5c673d` `rgb(92,103,61)``\n• #677344\n``#677344` `rgb(103,115,68)``\n• #72804b\n``#72804b` `rgb(114,128,75)``\n• #7d8c53\n``#7d8c53` `rgb(125,140,83)``\n• #88985a\n``#88985a` `rgb(136,152,90)``\nShade Color Variation\n• #92a363\n``#92a363` `rgb(146,163,99)``\n• #9baa6f\n``#9baa6f` `rgb(155,170,111)``\n• #a4b17c\n``#a4b17c` `rgb(164,177,124)``\n• #acb988\n``#acb988` `rgb(172,185,136)``\n• #b5c094\n``#b5c094` `rgb(181,192,148)``\n• #bdc7a1\n``#bdc7a1` `rgb(189,199,161)``\n• #c6cfad\n``#c6cfad` `rgb(198,207,173)``\n• #ced6b9\n``#ced6b9` `rgb(206,214,185)``\n• #d7ddc6\n``#d7ddc6` `rgb(215,221,198)``\n• #e0e4d2\n``#e0e4d2` `rgb(224,228,210)``\n• #e8ecde\n``#e8ecde` `rgb(232,236,222)``\n• #f1f3eb\n``#f1f3eb` `rgb(241,243,235)``\n• #f9faf7\n``#f9faf7` `rgb(249,250,247)``\nTint Color Variation\n\n# Tones of #3b4227\n\nA tone is produced by adding gray to any pure hue. In this case, #353633 is the less saturated color, while #4d6603 is the most saturated one.\n\n• #353633\n``#353633` `rgb(53,54,51)``\n• #373a2f\n``#373a2f` `rgb(55,58,47)``\n• #393e2b\n``#393e2b` `rgb(57,62,43)``\n• #3b4227\n``#3b4227` `rgb(59,66,39)``\n• #3d4623\n``#3d4623` `rgb(61,70,35)``\n• #3f4a1f\n``#3f4a1f` `rgb(63,74,31)``\n• #414e1b\n``#414e1b` `rgb(65,78,27)``\n• #435217\n``#435217` `rgb(67,82,23)``\n• #455613\n``#455613` `rgb(69,86,19)``\n• #475a0f\n``#475a0f` `rgb(71,90,15)``\n• #495e0b\n``#495e0b` `rgb(73,94,11)``\n• #4b6207\n``#4b6207` `rgb(75,98,7)``\n• #4d6603\n``#4d6603` `rgb(77,102,3)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #3b4227 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.54135025,"math_prob":0.651491,"size":3683,"snap":"2019-13-2019-22","text_gpt3_token_len":1675,"char_repetition_ratio":0.12530579,"word_repetition_ratio":0.011070111,"special_character_ratio":0.5661146,"punctuation_ratio":0.23756906,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99083585,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-24T15:38:13Z\",\"WARC-Record-ID\":\"<urn:uuid:9d3a2e37-3b77-4d50-9bf7-9f7a749ae013>\",\"Content-Length\":\"36368\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9de1dd86-28da-46bf-95a0-91a8dcd2c505>\",\"WARC-Concurrent-To\":\"<urn:uuid:bab0ed47-7f45-4336-b9ed-52886b279758>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/3b4227\",\"WARC-Payload-Digest\":\"sha1:JNQJ6TNLCCVXPAD3JM24YHOQ4QSIXLZW\",\"WARC-Block-Digest\":\"sha1:6LQKVTUE2SE5JNPLJ7KYF42UK4XU37FM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257660.45_warc_CC-MAIN-20190524144504-20190524170504-00460.warc.gz\"}"}
https://openstax.org/books/college-algebra/pages/1-3-radicals-and-rational-exponents
[ "College Algebra\n\nCollege Algebra1.3 Radicals and Rational Exponents\n\n### Learning Objectives\n\nIn this section students will:\n• Evaluate square roots.\n• Use the product rule to simplify square roots.\n• Use the quotient rule to simplify square roots.\n• Add and subtract square roots.\n• Rationalize denominators.\n• Use rational roots.\n\nA hardware store sells 16-ft ladders and 24-ft ladders. A window is located 12 feet above the ground. A ladder needs to be purchased that will reach the window from a point on the ground 5 feet from the building. To find out the length of ladder needed, we can draw a right triangle as shown in Figure 1, and use the Pythagorean Theorem.\n\nFigure 1\n$a 2 + b 2 = c 2 5 2 + 12 2 = c 2 169 = c 2 a 2 + b 2 = c 2 5 2 + 12 2 = c 2 169 = c 2$\n\nNow, we need to find out the length that, when squared, is 169, to determine which ladder to choose. In other words, we need to find a square root. In this section, we will investigate methods of finding solutions to problems such as this one.\n\n### Evaluating Square Roots\n\nWhen the square root of a number is squared, the result is the original number. Since$4 2 =16, 4 2 =16,$the square root of$16 16$is$4. 4.$The square root function is the inverse of the squaring function just as subtraction is the inverse of addition. To undo squaring, we take the square root.\n\nIn general terms, if$a a$is a positive real number, then the square root of$a a$is a number that, when multiplied by itself, gives$a. a.$The square root could be positive or negative because multiplying two negative numbers gives a positive number. The principal square root is the nonnegative number that when multiplied by itself equals$a. a.$The square root obtained using a calculator is the principal square root.\n\nThe principal square root of$a a$is written as$a . a .$The symbol is called a radical, the term under the symbol is called the radicand, and the entire expression is called a radical expression.", null, "### Principal Square Root\n\nThe principal square root of$a a$is the nonnegative number that, when multiplied by itself, equals$a. a.$It is written as a radical expression, with a symbol called a radical over the term called the radicand:$a . a .$\n\n### Q&A\n\nDoes$25 =±5? 25 =±5?$\n\nNo. Although both$5 2 5 2$and$(−5) 2 (−5) 2$are$25, 25,$the radical symbol implies only a nonnegative root, the principal square root. The principal square root of 25 is$25 =5. 25 =5.$\n\n### Example 1\n\n#### Evaluating Square Roots\n\nEvaluate each expression.\n\n1. $100 100$\n2. $16 16$\n3. $25+144 25+144$\n4. $49 − 81 49 − 81$\n\n### Q&A\n\nFor$25+144 , 25+144 ,$can we find the square roots before adding?\n\nNo.$25 + 144 =5+12=17. 25 + 144 =5+12=17.$This is not equivalent to$25+144 =13. 25+144 =13.$The order of operations requires us to add the terms in the radicand before finding the square root.\n\nTry It #1\n\nEvaluate each expression.\n\n1. $225 225$\n2. $81 81$\n3. $25−9 25−9$\n4. $36 + 121 36 + 121$\n\n### Using the Product Rule to Simplify Square Roots\n\nTo simplify a square root, we rewrite it such that there are no perfect squares in the radicand. There are several properties of square roots that allow us to simplify complicated radical expressions. The first rule we will look at is the product rule for simplifying square roots, which allows us to separate the square root of a product of two numbers into the product of two separate rational expressions. For instance, we can rewrite$15 15$as$3 ⋅ 5 . 3 ⋅ 5 .$We can also use the product rule to express the product of multiple radical expressions as a single radical expression.\n\n### The Product Rule for Simplifying Square Roots\n\nIf$a a$and$b b$are nonnegative, the square root of the product$ab ab$is equal to the product of the square roots of$a a$and$b. b.$\n\n$ab = a ⋅ b ab = a ⋅ b$\n\n### How To\n\nGiven a square root radical expression, use the product rule to simplify it.\n\n1. Factor any perfect squares from the radicand.\n3. Simplify.\n\n### Example 2\n\n#### Using the Product Rule to Simplify Square Roots\n\n1. $300 300$\n2. $162 a 5 b 4 162 a 5 b 4$\nTry It #2\n\nSimplify$50 x 2 y 3 z . 50 x 2 y 3 z .$\n\n### How To\n\nGiven the product of multiple radical expressions, use the product rule to combine them into one radical expression.\n\n1. Express the product of multiple radical expressions as a single radical expression.\n2. Simplify.\n\n### Example 3\n\n#### Using the Product Rule to Simplify the Product of Multiple Square Roots\n\n$12 ⋅ 3 12 ⋅ 3$\n\nTry It #3\n\nSimplify$50x ⋅ 2x 50x ⋅ 2x$assuming$x>0. x>0.$\n\n### Using the Quotient Rule to Simplify Square Roots\n\nJust as we can rewrite the square root of a product as a product of square roots, so too can we rewrite the square root of a quotient as a quotient of square roots, using the quotient rule for simplifying square roots. It can be helpful to separate the numerator and denominator of a fraction under a radical so that we can take their square roots separately. We can rewrite$5 2 5 2$as$5 2 . 5 2 .$\n\n### The Quotient Rule for Simplifying Square Roots\n\nThe square root of the quotient$a b a b$is equal to the quotient of the square roots of$a a$and$b, b,$where$b≠0. b≠0.$\n\n$a b = a b a b = a b$\n\n### How To\n\nGiven a radical expression, use the quotient rule to simplify it.\n\n1. Write the radical expression as the quotient of two radical expressions.\n2. Simplify the numerator and denominator.\n\n### Example 4\n\n#### Using the Quotient Rule to Simplify Square Roots\n\n$5 36 5 36$\n\nTry It #4\n\nSimplify$2 x 2 9 y 4 . 2 x 2 9 y 4 .$\n\n### Example 5\n\n#### Using the Quotient Rule to Simplify an Expression with Two Square Roots\n\n$234 x 11 y 26 x 7 y 234 x 11 y 26 x 7 y$\n\nTry It #5\n\nSimplify$9 a 5 b 14 3 a 4 b 5 . 9 a 5 b 14 3 a 4 b 5 .$\n\n### Adding and Subtracting Square Roots\n\nWe can add or subtract radical expressions only when they have the same radicand and when they have the same radical type such as square roots. For example, the sum of$2 2$and$3 2 3 2$is$4 2 . 4 2 .$However, it is often possible to simplify radical expressions, and that may change the radicand. The radical expression$18 18$can be written with a$2 2$in the radicand, as$3 2 , 3 2 ,$so$2 + 18 = 2 +3 2 =4 2 . 2 + 18 = 2 +3 2 =4 2 .$\n\n### How To\n\nGiven a radical expression requiring addition or subtraction of square roots, solve.\n\n### Example 6\n\nAdd$5 12 +2 3 . 5 12 +2 3 .$\n\nTry It #6\n\nAdd$5 +6 20 . 5 +6 20 .$\n\n### Example 7\n\n#### Subtracting Square Roots\n\nSubtract$20 72 a 3 b 4 c −14 8 a 3 b 4 c . 20 72 a 3 b 4 c −14 8 a 3 b 4 c .$\n\nTry It #7\n\nSubtract$3 80x −4 45x . 3 80x −4 45x .$\n\n### Rationalizing Denominators\n\nWhen an expression involving square root radicals is written in simplest form, it will not contain a radical in the denominator. We can remove radicals from the denominators of fractions using a process called rationalizing the denominator.\n\nWe know that multiplying by 1 does not change the value of an expression. We use this property of multiplication to change expressions that contain radicals in the denominator. To remove radicals from the denominators of fractions, multiply by the form of 1 that will eliminate the radical.\n\nFor a denominator containing a single term, multiply by the radical in the denominator over itself. In other words, if the denominator is$b c , b c ,$multiply by$c c . c c .$\n\nFor a denominator containing the sum or difference of a rational and an irrational term, multiply the numerator and denominator by the conjugate of the denominator, which is found by changing the sign of the radical portion of the denominator. If the denominator is$a+b c , a+b c ,$then the conjugate is$a−b c . a−b c .$\n\n### How To\n\nGiven an expression with a single square root radical term in the denominator, rationalize the denominator.\n\n1. Multiply the numerator and denominator by the radical in the denominator.\n2. Simplify.\n\n### Example 8\n\n#### Rationalizing a Denominator Containing a Single Term\n\nWrite$2 3 3 10 2 3 3 10$in simplest form.\n\nTry It #8\n\nWrite$12 3 2 12 3 2$in simplest form.\n\n### How To\n\nGiven an expression with a radical term and a constant in the denominator, rationalize the denominator.\n\n1. Find the conjugate of the denominator.\n2. Multiply the numerator and denominator by the conjugate.\n3. Use the distributive property.\n4. Simplify.\n\n### Example 9\n\n#### Rationalizing a Denominator Containing Two Terms\n\nWrite$4 1+ 5 4 1+ 5$in simplest form.\n\nTry It #9\n\nWrite$7 2+ 3 7 2+ 3$in simplest form.\n\n### Using Rational Roots\n\nAlthough square roots are the most common rational roots, we can also find cube roots, 4th roots, 5th roots, and more. Just as the square root function is the inverse of the squaring function, these roots are the inverse of their respective power functions. These functions can be useful when we need to determine the number that, when raised to a certain power, gives a certain number.\n\n#### Understanding nth Roots\n\nSuppose we know that$a 3 =8. a 3 =8.$We want to find what number raised to the 3rd power is equal to 8. Since$2 3 =8, 2 3 =8,$we say that 2 is the cube root of 8.\n\nThe nth root of$a a$is a number that, when raised to the nth power, gives$a. a.$For example,$−3 −3$is the 5th root of$−243 −243$because$(−3) 5 =−243. (−3) 5 =−243.$If$a a$is a real number with at least one nth root, then the principal nth root of$a a$is the number with the same sign as$a a$that, when raised to the nth power, equals$a. a.$\n\nThe principal nth root of$a a$is written as$a n , a n ,$where$n n$is a positive integer greater than or equal to 2. In the radical expression,$n n$is called the index of the radical.\n\n### Principal $nn$th Root\n\nIf$a a$is a real number with at least one nth root, then the principal nth root of$a, a,$written as$a n , a n ,$is the number with the same sign as$a a$that, when raised to the nth power, equals$a. a.$The index of the radical is$n. n.$\n\n### Example 10\n\n#### Simplifying nth Roots\n\nSimplify each of the following:\n\n1. $−32 5 −32 5$\n2. $4 4 ⋅ 1,024 4 4 4 ⋅ 1,024 4$\n3. $− 8 x 6 125 3 − 8 x 6 125 3$\n4. $8 3 4 − 48 4 8 3 4 − 48 4$\n\n### Try It #10\n\nSimplify.\n\n1. $−216 3 −216 3$\n2. $3 80 4 5 4 3 80 4 5 4$\n3. $6 9,000 3 +7 576 3 6 9,000 3 +7 576 3$\n\n#### Using Rational Exponents\n\nRadical expressions can also be written without using the radical symbol. We can use rational (fractional) exponents. The index must be a positive integer. If the index$n n$is even, then$a a$cannot be negative.\n\n$a 1 n = a n a 1 n = a n$\n\nWe can also have rational exponents with numerators other than 1. In these cases, the exponent must be a fraction in lowest terms. We raise the base to a power and take an nth root. The numerator tells us the power and the denominator tells us the root.\n\n$a m n = ( a n ) m = a m n a m n = ( a n ) m = a m n$\n\nAll of the properties of exponents that we learned for integer exponents also hold for rational exponents.\n\n### Rational Exponents\n\nRational exponents are another way to express principal nth roots. The general form for converting between a radical expression with a radical symbol and one with a rational exponent is\n\n$a m n = ( a n ) m = a m n a m n = ( a n ) m = a m n$\n\n### How To\n\nGiven an expression with a rational exponent, write the expression as a radical.\n\n1. Determine the power by looking at the numerator of the exponent.\n2. Determine the root by looking at the denominator of the exponent.\n3. Using the base as the radicand, raise the radicand to the power and use the root as the index.\n\n### Example 11\n\n#### Writing Rational Exponents as Radicals\n\nWrite$343 2 3 343 2 3$as a radical. Simplify.\n\n### Try It #11\n\nWrite$9 5 2 9 5 2$as a radical. Simplify.\n\n### Example 12\n\n#### Writing Radicals as Rational Exponents\n\nWrite$4 a 2 7 4 a 2 7$using a rational exponent.\n\n### Try It #12\n\nWrite$x (5y) 9 x (5y) 9$using a rational exponent.\n\n### Example 13\n\n#### Simplifying Rational Exponents\n\nSimplify:\n\n1. $5( 2 x 3 4 )( 3 x 1 5 ) 5( 2 x 3 4 )( 3 x 1 5 )$\n2. $( 16 9 ) − 1 2 ( 16 9 ) − 1 2$\n\n### Try It #13\n\nSimplify$( 8x ) 1 3 ( 14 x 6 5 ). ( 8x ) 1 3 ( 14 x 6 5 ).$\n\n### Media\n\nAccess these online resources for additional instruction and practice with radicals and rational exponents.\n\n### 1.3 Section Exercises\n\n#### Verbal\n\n1.\n\nWhat does it mean when a radical does not have an index? Is the expression equal to the radicand? Explain.\n\n2.\n\nWhere would radicals come in the order of operations? Explain why.\n\n3.\n\nEvery number will have two square roots. What is the principal square root?\n\n4.\n\nCan a radical with a negative radicand have a real square root? Why or why not?\n\n#### Numeric\n\nFor the following exercises, simplify each expression.\n\n5.\n\n$256 256$\n\n6.\n\n$256 256$\n\n7.\n\n$4( 9+16 ) 4( 9+16 )$\n\n8.\n\n$289 − 121 289 − 121$\n\n9.\n\n$196 196$\n\n10.\n\n$1 1$\n\n11.\n\n$98 98$\n\n12.\n\n$27 64 27 64$\n\n13.\n\n$81 5 81 5$\n\n14.\n\n$800 800$\n\n15.\n\n$169 + 144 169 + 144$\n\n16.\n\n$8 50 8 50$\n\n17.\n\n$18 162 18 162$\n\n18.\n\n$192 192$\n\n19.\n\n$14 6 −6 24 14 6 −6 24$\n\n20.\n\n$15 5 +7 45 15 5 +7 45$\n\n21.\n\n$150 150$\n\n22.\n\n$96 100 96 100$\n\n23.\n\n$( 42 )( 30 ) ( 42 )( 30 )$\n\n24.\n\n$12 3 −4 75 12 3 −4 75$\n\n25.\n\n$4 225 4 225$\n\n26.\n\n$405 324 405 324$\n\n27.\n\n$360 361 360 361$\n\n28.\n\n$5 1+ 3 5 1+ 3$\n\n29.\n\n$8 1− 17 8 1− 17$\n\n30.\n\n$16 4 16 4$\n\n31.\n\n$128 3 +3 2 3 128 3 +3 2 3$\n\n32.\n\n$−32 243 5 −32 243 5$\n\n33.\n\n$15 125 4 5 4 15 125 4 5 4$\n\n34.\n\n$3 −432 3 + 16 3 3 −432 3 + 16 3$\n\n#### Algebraic\n\nFor the following exercises, simplify each expression.\n\n35.\n\n$400 x 4 400 x 4$\n\n36.\n\n$4 y 2 4 y 2$\n\n37.\n\n$49p 49p$\n\n38.\n\n$( 144 p 2 q 6 ) 1 2 ( 144 p 2 q 6 ) 1 2$\n\n39.\n\n$m 5 2 289 m 5 2 289$\n\n40.\n\n$9 3 m 2 + 27 9 3 m 2 + 27$\n\n41.\n\n$3 a b 2 −b a 3 a b 2 −b a$\n\n42.\n\n$4 2n 16 n 4 4 2n 16 n 4$\n\n43.\n\n$225 x 3 49x 225 x 3 49x$\n\n44.\n\n$3 44z + 99z 3 44z + 99z$\n\n45.\n\n$50 y 8 50 y 8$\n\n46.\n\n$490b c 2 490b c 2$\n\n47.\n\n$32 14d 32 14d$\n\n48.\n\n$q 3 2 63p q 3 2 63p$\n\n49.\n\n$8 1− 3x 8 1− 3x$\n\n50.\n\n$20 121 d 4 20 121 d 4$\n\n51.\n\n$w 3 2 32 − w 3 2 50 w 3 2 32 − w 3 2 50$\n\n52.\n\n$108 x 4 + 27 x 4 108 x 4 + 27 x 4$\n\n53.\n\n$12x 2+2 3 12x 2+2 3$\n\n54.\n\n$147 k 3 147 k 3$\n\n55.\n\n$125 n 10 125 n 10$\n\n56.\n\n$42q 36 q 3 42q 36 q 3$\n\n57.\n\n$81m 361 m 2 81m 361 m 2$\n\n58.\n\n$72c −2 2c 72c −2 2c$\n\n59.\n\n$144 324 d 2 144 324 d 2$\n\n60.\n\n$24 x 6 3 + 81 x 6 3 24 x 6 3 + 81 x 6 3$\n\n61.\n\n$162 x 6 16 x 4 4 162 x 6 16 x 4 4$\n\n62.\n\n$64y 3 64y 3$\n\n63.\n\n$128 z 3 3 − −16 z 3 3 128 z 3 3 − −16 z 3 3$\n\n64.\n\n$1,024 c 10 5 1,024 c 10 5$\n\n#### Real-World Applications\n\n65.\n\nA guy wire for a suspension bridge runs from the ground diagonally to the top of the closest pylon to make a triangle. We can use the Pythagorean Theorem to find the length of guy wire needed. The square of the distance between the wire on the ground and the pylon on the ground is 90,000 feet. The square of the height of the pylon is 160,000 feet. So the length of the guy wire can be found by evaluating$90,000+160,000 . 90,000+160,000 .$What is the length of the guy wire?\n\n66.\n\nA car accelerates at a rate ofwhere t is the time in seconds after the car moves from rest. Simplify the expression.\n\n#### Extensions\n\nFor the following exercises, simplify each expression.\n\n67.\n\n$8 − 16 4− 2 − 2 1 2 8 − 16 4− 2 − 2 1 2$\n\n68.\n\n$4 3 2 − 16 3 2 8 1 3 4 3 2 − 16 3 2 8 1 3$\n\n69.\n\n$m n 3 a 2 c −3 ⋅ a −7 n −2 m 2 c 4 m n 3 a 2 c −3 ⋅ a −7 n −2 m 2 c 4$\n\n70.\n\n$a a− c a a− c$\n\n71.\n\n$x 64y +4 y 128y x 64y +4 y 128y$\n\n72.\n\n$( 250 x 2 100 b 3 )( 7 b 125x ) ( 250 x 2 100 b 3 )( 7 b 125x )$\n\n73.\n\n$64 3 + 256 4 64 + 256 64 3 + 256 4 64 + 256$" ]
[ null, "https://openstax.org/resources/461131596b00446489b1c74e97b32bf1dfee7a7b", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8644621,"math_prob":0.99962723,"size":12067,"snap":"2020-10-2020-16","text_gpt3_token_len":2617,"char_repetition_ratio":0.21371135,"word_repetition_ratio":0.10313901,"special_character_ratio":0.1927571,"punctuation_ratio":0.09376422,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999734,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-10T05:54:50Z\",\"WARC-Record-ID\":\"<urn:uuid:c480c1da-8e12-4e97-89ca-10c9dc5ae00b>\",\"Content-Length\":\"383256\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:729aa3e9-a4db-4dc8-a6ba-ae3989e7bea0>\",\"WARC-Concurrent-To\":\"<urn:uuid:7946c37f-f525-450f-9d1f-327c2a7fee2e>\",\"WARC-IP-Address\":\"13.249.39.18\",\"WARC-Target-URI\":\"https://openstax.org/books/college-algebra/pages/1-3-radicals-and-rational-exponents\",\"WARC-Payload-Digest\":\"sha1:RUMX34PBRTYE2D3GTZZFPGLP2ELRLOE3\",\"WARC-Block-Digest\":\"sha1:WBEPS2S5CFZALDBOGS4LGV3MPA6IQFLK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371886991.92_warc_CC-MAIN-20200410043735-20200410074235-00245.warc.gz\"}"}
https://www.dasjs.com/rxjs-crash-course-do-and-filter-operator/
[ "# RxJS Crash Course – do and filter Operator\n\n0\n\n### .do Operator\n\nThe next operator we’re going to look at is do operator. This will allow us to execute code without affecting the underlying observable. So, we create observable of a couple of strings, and then we’ll print out their names as they first appear.\n\nThen we’ll transform them to uppercase and then we’ll print them again. When we actually run this code you can see that it gives us a glimpse into the observable data at any given point in time.\n\nExample of .do() function\n\nSo here we see the value and the upper case value.\n\n### .filter() operator\n\nNow let’s take a look at filter this does pretty much what you’d expect. You give it a condition and only values meeting that condition make it through.  So, here we have an observable of a bunch of positive and negative numbers and we’ll filter it to only show the positive numbers.\n\nSo, the only value is greater than or equal to zero will be displayed and we reload the page and we only see the positive numbers.\n\nExample of .filter function\n\nIf we flip greater than to less than then we get only the negative numbers displayed using this same example.\n\n### .first() operator\n\nI’m going to show you the first and last operator the first operator will just take the very first element from the observable.\nIn this case, the first element is negative three so that’s what we see here on the screen.\n\n### .last() operator\n\nWe can also do the inverse of this with the last operator and negative two is the last element so we’ll see it updated to negative two.\n\nSee you at next session of the lecture.\n\n0" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88117814,"math_prob":0.9297561,"size":1531,"snap":"2021-31-2021-39","text_gpt3_token_len":323,"char_repetition_ratio":0.13228552,"word_repetition_ratio":0.0,"special_character_ratio":0.21162638,"punctuation_ratio":0.08201893,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9681633,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-24T21:55:44Z\",\"WARC-Record-ID\":\"<urn:uuid:b77df818-5b5e-4cc4-9796-4f46e2091237>\",\"Content-Length\":\"87287\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d7bba82c-b45f-432c-9ccf-af7364677511>\",\"WARC-Concurrent-To\":\"<urn:uuid:07becac7-87b9-43bb-9c42-2381fb457913>\",\"WARC-IP-Address\":\"104.21.72.251\",\"WARC-Target-URI\":\"https://www.dasjs.com/rxjs-crash-course-do-and-filter-operator/\",\"WARC-Payload-Digest\":\"sha1:7X6TP7D4YYGIMKZZQUGPDRFAOG7BDVKD\",\"WARC-Block-Digest\":\"sha1:FEEVZYWSQ5AIJPC5LGHN7FMPL2YJTN3Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057580.39_warc_CC-MAIN-20210924201616-20210924231616-00044.warc.gz\"}"}
https://scirp.org/journal/paperinformation.aspx?paperid=63237
[ "Category Theoretic Properties of the A. Rényi and C. Tsallis Entropies\n\nThe problem of embedding the Tsallis, Rényi and generalized Rényi entropies in the framework of category theory and their axiomatic foundation is studied. To this end, we construct a special category MES related to measured spaces. We prove that both of the Rényi and Tsallis entropies can be imbedded in the formalism of category theory by proving that the same basic partition functional that appears in their definitions, as well as in the associated Lebesgue space norms, has good algebraic compatibility properties. We prove that this functional is both additive and multiplicative with respect to the direct product and the disjoint sum (the coproduct) in the category MES, so it is a natural candidate for the measure of information or uncertainty. We prove that the category MES can be extended to monoidal category, both with respect to the direct product as well as to the coproduct. The basic axioms of the original Rényi entropy theory are generalized and reformulated in the framework of category MES and we prove that these axioms foresee the existence of an universal exponent having the same values for all the objects of the category MES. In addition, this universal exponent is the parameter, which appears in the definition of the Tsallis and Rényi entropies. It is proved that in a similar manner, the partition functional that appears in the definition of the Generalized Rényi entropy is a multiplicative functional with respect to direct product and additive with respect to the disjoint sum, but its symmetry group is reduced compared to the case of classical Rényi entropy.\n\nShare and Cite:\n\nSteinbrecher, G. , Sonnino, A. and Sonnino, G. (2016) Category Theoretic Properties of the A. Rényi and C. Tsallis Entropies. Journal of Modern Physics, 7, 251-266. doi: 10.4236/jmp.2016.72025.\n\nReceived 9 December 2015; accepted 26 January 2016; published 29 January 2016", null, "1. Introduction\n\nBecause the measure of information is a basic scientific concept, in this work we develop a formalism in the framework of the category theory for the study of generalized entropies. The category theory is the branch of mathematics that plays a central role in the logical foundation and synthesis of the whole contemporary mathematics. In particular, the category theory allows avoiding the paradoxes of the classical set theory. Category theory has application in informatics . In order to highlight the natural structures related to generalized entropies, we use the central concepts of the modern mathematics.\n\nThe paper is organized as follows. In the Section 2, Subsection 2.1, we define a special category related to measurable spaces (referred to as MES), enabling the introduction an associated basic functional zp (see the forthcoming Section for his exact definition). Both the Tsallis and Rényi entropies, as well as the distance in lp spaces, may be expressed in terms of this functional. In the Subsection 2.2, we define the direct product of the objects in MES and we prove that the functional zp satisfies a compatibility relation with respect to this product i.e., it is multiplicative. This multiplicative property is equivalent to the additivity of the Rényi entropy. In the Subsection 2.3, we define the disjoint sum (or the coproduct) of the objects in MES, and we prove that the functional zp satisfies a compatibility relation with respect to coproduct i.e., it is additive. Note that this property is equivalent to one of the postulates characterizing the Rényi entropy. The proofs that both product and coproduct possess a universal property and that the direct product and coproduct can also be defined for morphisms of the category MES, can be found in the Subsection 2.4. In the Subsection 2.5 we show that, by extending the category MES with the introduction of the unit object and the null object, the category MES becomes to a monoidal category.\n\nSection 3 deals with the axiomatic characterization of the functional zp. We demonstrate that there exists a universal exponent p (the same for all the objects of the category) that characterizes completely the functional zp (hence, also the Tsallis or Rényi entropies) up to an arbitrary multiplicative factor. In Section 4, it is proven that the main properties of the Rényi entropy, which are used in the axiomatic and category theoretic formulation, can be reformulated in order to be generalized to the case of the generalized Rényi entropy (GRE). The symmetry properties of GRE are studied in Subsection 4.1. Appendix 1 shows that the Rényi divergence can be expressed in terms of the Rényi entropy. The proof of the universality (with respect to all the objects of the category MES) of the exponent defining the Rényi or Tsallis entropies can be found in Appendix 2. In Appendix 3 some algebraic results related to the symmetry of GRE are proved.\n\n2. The Category-theoretic properties Related to Rényi and Tsallis Entropies\n\n2.1. Definitions\n\nOur definitions include as a particular case the original definition of the generalized entropies and . Our basic construction that will play the role of the object of the category MES is derived from the well known concept of measurable space . Guided by statistical ideas, in order to take into account the negligible sets we specify also an sub-ideal of the σ-algebra of measurable sets. The objects of the category MES consist of triplets", null, "with X denoting the phase space (for instance, it is a symplectic manifold in the case of statistical physics or, in the case of elementary probability models, finite or denumerable set) and", null, "is the σ-algebra generated by a family of subsets of X, respectively. We also denote with", null, "an ideal of the σ-algebra", null, "having the meaning of negligible sets. Let us now postulate the completeness property. From", null, "and", null, "results", null, ". The morphisms of the category MES with the source", null, "and range", null, "are the measurable maps Φ from x to y, which are nonsingular, i.e. such that", null, ". From the completeness property results the ideal property, i.e. if", null, "and", null, "then", null, ". Note that it is possible that", null, "contains only the empty set (as, for example, in the case of atomic spaces).\n\nRemark 1 At first sight it would be more natural to consider the objects as measure space triplet", null, "containing the measure, and the morphisms as the measure preserving transformations. However, in this case we cannot define direct product or coproduct having universal property.\n\nWe denote with, or with, the cone with all σ-finite positive measures over that are compatible with (i.e., iff for all we have). For a given and, we denote with the Banach space () or the Fréchet space () of functions that are measurable modulo and have\n\nfinite norm (pseudo norm, respectively): more precisely,. In the sequel, we shall denote\n\n(1)\n\nfor some non-negative density. The generalized entropies are defined for probability density functions (PDF) satisfying the conditions\n\n(2)\n\n(3)\n\nwhere and. The probability can be represented by PDF as follows\n\n(4)\n\n(5)\n\nIn this framework, for a given measurable space and measure, the classical Boltzmann-Gibbs-Shannon entropy functional is given by\n\n(6)\n\nwhich in the case of discrete distribution, X a denumerable set, the counting measure, give the popular form\n\n(7)\n\nFor a given measurable space, the generalizations of the A. Rényi and C. Tsallis entropies, involves the functional given by Equation (1). The functional is related to the norm of\n\nthe density ρ in the Banach space for , and to the pseudo-norm for , through the obvious relations\n\n(8)\n\n(9)\n\nThese relations give the geometrical interpretation of the generalized entropies (for further information Refs to ).\n\nRemark 2 The study of the generalized entropies helps us to better understand the classical entropy. For, the functional is the classical Lp norm, and for the functional is the exotic Lp-norm . For the Lp spaces are reflexive, the Maxent problem is equivalent to the minimal Lp distance problem with restrictions , or to the minimal. For, the Lp spaces has, in general, trivial duals, the Maxent problem is equivalent to the maximal Lp distance or the maximal (see ). The case, which corresponds to the classical Shannon entropy, is just the border point between two radically different functional-analytic properties.\n\nThe corresponding generalized entropy, proposed by A. Rényi , and the entropy, , proposed by C. Tsallis , are given by\n\n(10)\n\n(11)\n\nConsider now a measure space with σ-finite measure n, and let us denote with, two probability densities:\n\nNote that the Rényi divergence \n\n(12)\n\nis related to the Rényi entropies (see Appendix 1). Note that when x is a finite or denumerable set, if we denote with the probabilities of element, the measure is the counting measure on the space x (equal to the number of elements in a subset), and the family of null sets then, from the previous Equstions (1), (10), (11) we get the original definitions from Ref. \n\n(13)\n\n(14)\n\n(15)\n\nRemark that, in this particular case, , as well as, are Lesche stable . Note that, from Equations (6), (10) and (11), results\n\n(16)\n\n2.2. Direct Product of Measurable spaces and the multiplicative Property of Zp[MX, μX, ρX]\n\nIn the framework of the our formalism, the multiplicative property is the counterpart of the Postulate 4 in the Rényi theory . In the following we overload the tensor product notation “”; its meaning results from the nature of the operand. Denote the direct product of two measurable spaces and by, defined as follows\n\n(17)\n\nHere is the Cartesian product of the phase spaces X and Y, while the σ-algebra is the smallest σ-algebra such that it contains all of the elements of the Cartesian product. The null set ideal is generated by the family. Note that if and then their direct product satisfies the condition (we denote it also by the same symbol). The measure acting on is defined by extension by denu- merable additivity, starting from the product subsets:\n\n(18)\n\n(19)\n\nConsider now the measures, , and the densities and. The following function is also denoted with the same symbol\n\n(20)\n\nwith\n\n(21)\n\n(22)\n\nWe have the following basic proposition\n\nProposition 3 Let, are normalized PDF\n\n(23)\n\nThen we have\n\n(24)\n\n(25)\n\nThe validity of this statement follows directly from the definitions of the direct product, the Rényi entropy and the functional zp.\n\n2.3. Coproduct of measurable spaces and theadditivity of the Functional Zp[MX, μX, ρX]\n\nLet us study now the property encoded in the Postulate 5’ related to the Rényi entropy theory (Ref. ), trans- cribed in the measure theoretic and category language and re -expressed in the term of the functional . Also in this case, we overload the notation, for the disjoint sum from the set theory. Its precise meaning will be clear from the nature of the operands. In the following we investigate the functorial properties, related to Postulate 5’, of the functional, in analogy to Proposition 3. To this end we introduce the following\n\nDefinition 4 The coproduct of measurable spaces and will be denoted by and have the following structure\n\n(26)\n\nHere, is the disjoint sum of the sets x and y, and is the smallest σ-algebra that contains all of the sets of the form, with and, respectively. Moreover, the new null set ideal is the smallest σ-algebra generated by the family with and. Let the measures, and the weights, and. The measure acts on the σ-algebra and it is defined uniquely as the continuation by denumer- able additivity from the property\n\n(27)\n\n(28)\n\nLet and . We define the function as follows\n\nWe restrict our definition of coproduct to finite terms. An example of (denumerable infinite) coproduct is the grand canonical ensemble.\n\nRemark 5 If and are probability measures, then the measure is a probability measure if .\n\nFrom the previous definition of the direct sum and the functional the following obvious proposition results\n\nProposition 6 The reformulation of the Postulate 5’ (Ref. ) reads: the functional is additive with respect to the direct sum of measurable spaces\n\n(29)\n\n2.4. Universal Properties of the direct product and Direct Sum in the category of Measurable spaces\n\nIn the following we prove that the basic binary operations on measurable spaces, the direct product and the direct sum, defined in the previous section, have universality properties in the category of measurable spaces MES.\n\nConsider the direct product of measurable spaces and . Observe that the canonical projections, , are measurable and induce the morphisms and between the objects of MES. We have the following\n\nProposition 7 In the category MES the applications, , which are naturally induced by canonical projections and, are morphisms.\n\nProof. The measurability of is direct consequence of the fact that the canonical projection maps are measurable, in fact the measurability of the canonical projections is an alternative definition of the product of σ algebras. The nonsingularity property results from. ■\n\nFrom the previous Proposition 7 results immediately the following Theorem\n\nTheorem 8 In the category MES, the direct product has the universal property. Let. and measurable spaces that are objects of the category MES, such that there exists morphisms and. Then there exists an unique morphism such that\n\n(30)\n\n(31)\n\nwhere, are the morphism defined in Proposition 7.\n\nProof. The morphism θ is induced by the application defined as . and it is unique. In order to prove that θ is a morphism we have to prove that t is measurable and it is nonsingular. To prove that is measurable, we recall that it is sufficient to prove that, for all, , we have the property, a property resulting from the measurability of and. Note that to prove the inclusion, it is sufficient to demonstrate for the generating subsets (which follows from the nonsingularity of and) that this is the consequence of the nonsingularity of. ■\n\nIn conclusion the direct product operation has the natural functorial property, so the multiplicative property Equation (24) of the functional appears as an algebraic compatibility property. By simple reversal of the arrows, we are lead to the corresponding universality property of the coproduct in the category MES. We have the following obvious proposition\n\nProposition 9 In the category MES, consider the objects,. The applications and, induced naturally by the canonical injections, , are morphism in the category MES.\n\nProof. The injections, are measurable. Suppose that, with, (see Definition 4). Then, , , so and are nonsingular, which completes the proof that, are morphisms in the category mes. ■\n\nBy reversing the arrows, in analogy to the Theorem 8, we obtain the following result.\n\nTheorem 10 In the category mes the direct sum of the objects has the following universality property. Let denote with, and measurable spaces that are objects of the category mes, such that there exists morphisms and. Then, there exists an unique morphism such that\n\nwhere, are the morphisms defined in Proposition 9.\n\nProof. The morphism is induced by the map defined as follows. If then, and in the case, then. The measurability of the map g results from the measurability of and. The inclusion results from the nonsingularity of and.\n\nIn conclusion, the direct sum operation has natural category theoretic properties. Hence, the additivity property Equation (29) of the functional is not an artificial construction.\n\n2.5. The Monoidal Categories associated to product and Coproduct\n\nWe recall the following\n\nProposition 11 Let be a category such that for all objects exists their direct product, having the universal property. Then, there exists a covariant functor F from the product category to, , defined as follows. For the object of, where are objects of, we have\n\nFor the pair of morphisms with, , from the category there exists an unique morphism w in the category, uniquely fixed by the conditions\n\nWe denoted with, the projections from, , and are the projections from,. The map has the functorial property.\n\nLet and. Then,\n\nIf in the category we have an unit object, then is a monoidal category.\n\nSimilarly, by duality arguments, we have the following result for the direct sum (coproduct)\n\nProposition 12 Let be a category such that for all objects a, B from exists their direct sum, having the universal property. Then, there exists a covariant functor G from the product category defined as follows. For the object (A,b) of, where a, B are objects of we have\n\nFor the pair of morphisms, with and, from the category there exists an unique morphism w in the category, uniquely fixed by the conditions\n\nWe denoted with, the canonical injections from, , and with, the injections from,. The association has the func- torial property. Let and then,\n\nIf in the category we have a null object then, is a monoidal category with respect to direct sum.\n\nWe emphasize that, despite the fact that the construction of the direct sum is dual to the direct product, from the previous proposition (12) the functor G is a covariant functor. In the category mes we have an unit object as well as the null object. The unit object is denoted with, where 1 is the one point set , is the trivial σ-algebra consisting in the one point set 1, , and, respectively. The (more or less for- mal) null object, with respect to the direct sum, is the object generated by the empty set. So we have the following\n\nConclusion 13 The category MES is a monoidal category both with respect to the product and the coproduct.\n\n3. Axioms\n\nWe expose another approach, based on category theory, to the problem of the naturalness of the choice of the family of functions used in the definition of the entropy . We prove that this problem may be treated if we take into account the additivity and the multiplicative properties of the functional. We mention that a possible candidate for the generalization of the symmetry Postulate 1 is the requirement of invariance of the generalized entropy under measure preserving transformations. Recall that the group generated by finite permu- tations is the maximal measure preserving group with respect to the counting measure. The problem is that there are plenty of measures such that the measure preserving group is trivial (for instance, the atomic measure for 2 element set with). To avoid this problem, we observe that Postulate 1 and Postulate 5’ in the original Rényi theory can be generalized as follows. For a given measurable function on the mea- sured space and, let us define\n\n(32)\n\nNote that is invariant under measure preserving transformations. In addition\n\n(33)\n\nThen, the Postulate 1 (the symmetry property) and Postulate 5’ (the additivity property expressed in Propo- sition 6) can be generalized as follows. Postulate 1 & Postulate 5’\n\n(34)\n\n(35)\n\nfor some Borel measurable function with\n\n(36)\n\nThe last requirement result by considering the case when the support of is concentrated on a proper subset of x and by using Equation (29). The generalization of the Postulate 2 (the continuity property) is straightforward. Be continuos and, we get\n\n(37)\n\nIn our settings, the analog of the Postulate 4 (the additivity property) is the multiplicative property given by Equation (24) and Proposition 3. By using Equations (24), (34), (36) and (37), and by continuity of the functions, , for all, we obtain the following functional equation (valid almost every- where)\n\n(38)\n\nBy arguments similar to the proof of the uniqueness, from Theorem 2 ), we get Equation (33) (for details see Appendix 2): there exists an universal family of functions, independent of X, parametrized by the positive parameter p such that\n\n(39)\n\n(40)\n\n(41)\n\n4. The Generalized Rényi Entropy (GRE)\n\nRemark that all of the definitions of the classical, Rényi, Tsallis entropies contains only set theoretic and mea- sure theoretic concepts, no supposition on the auxiliary algebraic or differentiable structure associated to the measure space are assumed, so their definitions can be used t, continuos or discrete distributions. In the case of discrete measured space the classical definitions of the entropies Equations (7), (13)-(15) are invariant under the permutation group of the elements of the discrete set. This invariance encodes the assumption of complete apriory lack of information about the physical system, this absolute ignorance is lifted by the specification of the probability density function. On the other hand, consider the case when the measure space has the product structure\n\n(42)\n\nsuch that\n\n(43)\n\n(44)\n\n(45)\n\nSuppose that the probability measure on is given by\n\n(46)\n\nThe GRE’s associated are \n\n(47)\n\n(48)\n\n(49)\n\nWe remark that in the definitions Equation (48), the role of the variables can be inverted. The range of entropy parameters is given by\n\nIn the limit case, we obtain the Shannon entropy. We remark that in the definitions Equation (48), the role of the variables can be inverted. In the following we study the compatibility of the GRE with the axioms that define the classical Rényi entropy.\n\n4.1. Symmetry Properties of GRE\n\nIn order to prove that in the case of the GRE the symmetry group is reduced to some subgroup, we consider only a special case: the spaces are finite sets, denoted as, , the measures, are the counting measures and denote the corresponding probabilities. We have\n\n(50)\n\nWe use the array notation In this case, the Rényi entropy is\n\n(51)\n\nIt is invariant under the transformation (see Lemma 16)\n\n(52)\n\n(53)\n\nwhere the transformation is an arbitrary permutation of the finite index set with Na elements:. In this case, the permutation group plays the role of the measure preserving transformations. The corresponding GRE’s according to Equations (47)-(49) are the following\n\n(54)\n\n(55)\n\n(56)\n\nSuppose we are in general case, when the indices i, a has completely different physical interpretation. Its is clear that the measure of information of such a system cannot be invariant under the permutation group with elements. It is expected to be invariant only on the separate permutation from the group related to index i and permutation of, related to the index a, more exactly the invariance group is expected to contain a proper subgroup of, generated by and. So we are interested to find some subgroups of transformations such that for all we have\n\n(57)\n\n(58)\n\nSimilarly we are interested to find the subgroup which consists of the transformations such that\n\n(59)\n\n(60)\n\nBy using the Corollary 17, we obtain the following conclusion concerning the symmetry group of GRE, com- pared to the symmetry group of the classical Rényi or Tsallis entropies.\n\nProposition 14 The symmetry group of the GRE is reduced from the full permutation group to the subset of transformations of the form\n\n(61)\n\nwhere is a permutation of the and for each fixed each of the map is the permutation of the set. Similarly for the map, we have (Equation (60)) if and only if it is the form\n\n(62)\n\nwhere the map is a permutation of the set and for each fixed the map is a permutation of the set. The subgroup which consists of all that leave invariant both of the entropies and\n\n(63)\n\n(64)\n\n(65)\n\nis the direct product and iff\n\n(66)\n\nwhere is a permutation of and is a permutation of\n\nIn conclusion, in this particular case, the symmetry group associated to GRE’s is reduced to the direct product of the transformations that separately preserves the measure respectively, in accord with the different physical interpretation of the variables x and y. The proof for the more subtle general case will be the subject of following studies.\n\n4.2. The Additivity of GRE, Multiplicative property of\n\nAccording to Equations (42)-(49), the additivity of the GRE is equivalent to the multiplicative property of the functionals. In analogy to the properties from Equations (24), (25) we have a perfect correspondence with the classical case . Consider the case when the measured spaces, measures, densities entering in the definition of the GRE from Equations (42)-(46) are decomposed as follows\n\nUnder these assumptions and with the notations Equations (47) and (49), we have the following functorial property with respect to the direct product:\n\n4.3. Additivity of the functionals withrespect to the direct sum\n\nIt is possible to extend, partially, the additivity property from Proposition 6. Consider the measured space defined in Equations (42)-(46) and suppose that the space X and the related objects has the following decom- position in direct sum, similar to the Definition 4\n\n(67)\n\nWe define the measure\n\n(68)\n\nsimilar to Equations (27), (28), with and from the densities de- fined in the and defined in the, we define the density\n\n(69)\n\nsimilar to Definition 4\n\n(70)\n\n(71)\n\nUnder previous conditions Equations (67)-(71), we have the following additivity result:\n\n(72)\n\nWe obtain a similar result for the functional if we consider a decomposition. The Equation (72) is the equivalent of the Postulate 5’ from the case of the classical Rényi entropy. At this stage we remark another anisotropy effect: the different mathematical properties related to the “outer integral over X” and the “inner integral over Y” in the definition Equation (48).\n\n5. Summary and Conclusions\n\nWe proved that the most natural setting for treating the axiomatic approach to the study of definitions of measures of information or uncertainty, is the formalism of measure spaces and of the category theory. The Rényi divergence can be reduced to the Rényi entropy in our measure theoretic formalism. Category theory was invented for the most difficult, apparently contradictory aspects of the foundation of mathematics. In this respect, we introduced a category of measurable spaces MES. We proved that in the category MES existed the direct product and the direct sum, having universal properties. We proved that the functional de- fined in Equation (1), which appeared in the definition of both Rényi and Tsallis entropies, had algebraic com- patibility properties with respect to direct product and direct sum, as shown in Equations (24) and (29).\n\nThe main conclusions may be summarized as follows:\n\n1) The natural measure of the quantity of information is the family of functionals given by Equation (1), (defined in the Fréchet space for, and in the Banach space for), and the classical Shannon entropy by Equation (6);\n\n2)The category MES is the natural framework for treating the problems related to the measure of the infor- mation, in particular in reformulating the Rényi axioms;\n\n3) The category MES is a monoidal category with respect to direct product and coproduct and the functional has natural compatibility properties with respect to the product (it is multiplicative) and the coproduct (it is additive);\n\n4) Up to a multiplicative constant, it is possible to recover the exact form of the functional defining the generalized entropies from a system of axioms that generalize the ones adopted by Rényi .\n\n5) The GRE has similar additivity property with respect to the direct product de- composition of the spaces X, Y.\n\n6) The symmetry group of is reduced to a combination of the symmetry group related to the measured spaces and that is a proper subgroup of the full measure preserving group of that is the symmetry group of the classical Rényi entropy.\n\n7) The Postulate 5'’of the classical Rényi entropy appears in the case of GRE as the additivity property of the functional with respect to direct sum decomposition of the space X. This asymmetry with respect to space Y is a new manifestation of the anisotropy.\n\nAcknowledgements\n\nThe authors are grateful to Prof. M. Van Schoor and Dr D. Van Eester from Royal Military School, Brussels. György Steinbrecher is grateful to Prof. C. P. Niculescu from Mathematics Department, University of Craiova, Romania, and S. Barasch for discussions on category theory. Giorgio Sonnino is also grateful to Prof. P. Nar- done and Dr. P. Peeters of the Université Libre de Bruxelles (ULB) for useful discussions and suggestions.\n\nAppendix\n\nA1. Rényi Divergence and entropy\n\nSuppose to have a measurable space with a finite or σ-finite measure μ and a normalized PDF, i.e.. Only in this subsection we adopt the following definitions\n\n(73)\n\n(74)\n\nConsider now a measurable space with σ-finite measure n. We also denote with, two probability densities, satisfying the condition\n\n(75)\n\n(76)\n\nAccording to the Equations (73, 74, 76) and normalization Equation (75), we get\n\n(77)\n\nA2. Solution of the functional Equation Equation (38)\n\nUsing Equation (35) with, we note that we can use the double logarithmic scale by performing the following change of variables\n\n(78)\n\n(79)\n\n(80)\n\n(81)\n\nIn the particular case from Equation (81), we obtain\n\n(82)\n\nFrom Equations (81), (82) results\n\n(83)\n\nWe select in Equation (83)\n\n(84)\n\nand the following equation results\n\n(85)\n\nRemark t hat putting in Equation (84) we obtain an identity, so is a free parameter . Observe that Equation (85) admits the particular constant solution\n\n(86)\n\nThe general solution of corresponding homogenous equation\n\n(87)\n\nmay be found by using again the continuity of the function (See also I.3.1, page 8, we do not use here the differentiability of), i.e.,\n\n(88)\n\nHere is a constant, that, at this stage, still depends on the object XY of the category mes. In the con- tinuation we prove that the constant is “universal”, it is the same for all of the objects of the category mes.\n\nThe general solution of the Equation (85) reads\n\n(89)\n\nand similarly we have for all of the object of the category mes\n\n(90)\n\n(91)\n\nBy using Equations (81), (89), (90), (91), we get the universal linear slope p\n\nand, by Equations (78)-(80), up to undetermined multiplicative constants, , we find Equations (39)-(41).\n\nA3. Some Algebraic Result\n\nLemma 16 Let positive numbers. If for all we have\n\n(92)\n\nwhere then there exists a permutation of the set, such that\n\n(93)\n\nProof. We proceed by induction. For clear, suppose that the Lemma is valid for and suppose, ad absurdum that. Taking the limit in Equation (92) we find a con- tradiction, so which completes the induction step. ■\n\nBy using the previous Lemma 16 in two successive steps, with respectively, we find the following\n\nCorollary 17 Suppose that for all we have\n\n(94)\n\nwhere, with and, the permutation group of na elements is indexed by the pair. Then\n\n(95)\n\nwhere the map is a permutation of the set and for each fixed each of the maps are permutations of the set.\n\nConflicts of Interest\n\nThe authors declare no conflicts of interest.\n\n Shannon, C.E. (1948) Bell System Technical Journal, 27, 379-423, 623-656. http://dx.doi.org/10.1002/j.1538-7305.1948.tb01338.x Rényi, A. (1960) On Measures of Information and Entropy. Proceedings of the 4th Berkeley Symposium on Mathematics, Statistics and Probability, 20 June-30 July 1960, Volume I, University of California Press, Berkeley and Los Angeles, 547-561. Fadeev, D.K. (1957) Zum Begriff der Entropie einer endlichen Wahrscheinlichkeitsschernas. (Arbeiten zur Informationstheorie I, Berlin, Deutscher Verlag der Wissenschaften). Feinstein, A. (1958) Foundations of Information Theory. McGraw-Hill, New York. Tsallis, C. (1988) Journal of Statistical Physics, 52, 479-487. http://dx.doi.org/10.1007/BF01016429 Tsallis, C., Mendes, R.S. and Plastino, A.R. (1998) Physica, A261, 534-554. http://dx.doi.org/10.1016/S0378-4371(98)00437-3 Tsallis, C. (2009) Introduction to Nonextensive Statistical Mechanics: Approaching a Complex World. Springer, Berlin. Gell-Mann, M. and Tsallis, C. (2004) Nonextensive Entropy—Interdisciplinary Applications. Oxford University Press, Oxford. Steinbrecher, G. and Weyssow, B. (1999) Physical Review Letters, 92, 12503. Rhodes, T.L., et al. (1999) Physics Letters A, 253, 181-186. http://dx.doi.org/10.1016/S0375-9601(99)00034-1 Steinbrecher, G., Garbet, X. and Weyssow, B. (2010) Large Time Behavior in Random Multiplicative Processes. e-Print arXiv:1007.0952v1 Maszczyk, T. and Duch, X. (2008) Lecture Notes in Computer Science, 5097, 643-651.http://dx.doi.org/10.1007/978-3-540-69731-2_62 van Erven, T. and Harremoës, P. (2014) Rényi Divergence and Kullback-Leibler Divergence. arXiv:1206.2459v2 [hep-ph] Sonnino, G. and Steinbrecher, G. (2014) Physical Review E, 89, Article ID: 062106.http://dx.doi.org/10.1103/PhysRevE.89.062106 Bucur, I.A. (1968) Introduction to the Theory of Categories and Functors. Wiley, London. Mac Lane, S. (1997) Categories for the Working Mathematician. Second Edition, Springer, New York. Pierce, B.C. (1991) Basic Category Theory for Computer Scientists. MIT Press, Cambridge and London. Rudin, W. (1987) Real and Complex Analysis. Third Edition, McGraw Hill Inc., New York. Reed, M. and Simon, B. (1980) Methods of Modern Mathematical Physics. Academic Press, New York. Luschgy, H. and Pagès, G. (2008) Electronic Communication in Probability, 13, 422-434.http://dx.doi.org/10.1214/ECP.v13-1397 Lesche, B. (1982) Journal of Statistical Physics, 27, 419-422. http://dx.doi.org/10.1007/BF01008947 Dunford, N. and Schwartz, J.T. (1957) Linear Operators Part I: General Theory. J. Wiley & Sons, New York.", null, "" ]
[ null, "https://html.scirp.org/file/6-7502569x5.png", null, "https://html.scirp.org/file/6-7502569x6.png", null, "https://html.scirp.org/file/6-7502569x7.png", null, "https://html.scirp.org/file/6-7502569x8.png", null, "https://html.scirp.org/file/6-7502569x9.png", null, "https://html.scirp.org/file/6-7502569x10.png", null, "https://html.scirp.org/file/6-7502569x11.png", null, "https://html.scirp.org/file/6-7502569x12.png", null, "https://html.scirp.org/file/6-7502569x13.png", null, "https://html.scirp.org/file/6-7502569x14.png", null, "https://html.scirp.org/file/6-7502569x15.png", null, "https://html.scirp.org/file/6-7502569x16.png", null, "https://html.scirp.org/file/6-7502569x17.png", null, "https://html.scirp.org/file/6-7502569x18.png", null, "https://html.scirp.org/file/6-7502569x19.png", null, "https://html.scirp.org/file/6-7502569x20.png", null, "https://scirp.org/Images/ccby.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90828323,"math_prob":0.954186,"size":28517,"snap":"2020-45-2020-50","text_gpt3_token_len":6467,"char_repetition_ratio":0.19159682,"word_repetition_ratio":0.051767677,"special_character_ratio":0.2243574,"punctuation_ratio":0.10516432,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99227124,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34],"im_url_duplicate_count":[null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-30T18:21:31Z\",\"WARC-Record-ID\":\"<urn:uuid:03fba3c2-f7ef-491d-9cb7-b5988db5d3d9>\",\"Content-Length\":\"152271\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ef1b34c7-15fb-4474-b15e-461de01a6e75>\",\"WARC-Concurrent-To\":\"<urn:uuid:7304a23a-0427-43c2-b28a-e7bad450736a>\",\"WARC-IP-Address\":\"128.14.148.26\",\"WARC-Target-URI\":\"https://scirp.org/journal/paperinformation.aspx?paperid=63237\",\"WARC-Payload-Digest\":\"sha1:J7IGBZTL7WVZCVABW4SROHVUGIZWMLPS\",\"WARC-Block-Digest\":\"sha1:T7WID7ZDBU2QORSHNINTA5ONYCUXSBNE\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141216897.58_warc_CC-MAIN-20201130161537-20201130191537-00178.warc.gz\"}"}
https://www.broughton.bucks.sch.uk/year-4-2/
[ "# Year 4\n\n• Count in multiples of 6, 7, 9, 25 and 1000\n• Find 1000 more or less than a given number\n• Count backwards through zero to include negative numbers\n• Recognise the place value of each digit in a four-digit number (thousands, hundreds, tens, and ones, TH H, T, O)\n• Order and compare numbers beyond 1000\n• Round any number to the nearest 10, 100 or 1000\n• Recall multiplication and division facts for multiplication tables up to 12 × 12\n• Convert between different units of measure (for example, kilometre to metre; hour to minute)\n• Estimate, compare and calculate different measures, including money in pounds and pence\nTop" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8621932,"math_prob":0.98728776,"size":637,"snap":"2023-14-2023-23","text_gpt3_token_len":164,"char_repetition_ratio":0.112164296,"word_repetition_ratio":0.0,"special_character_ratio":0.27315542,"punctuation_ratio":0.11666667,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96311104,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-27T04:57:35Z\",\"WARC-Record-ID\":\"<urn:uuid:98ec9527-a4a0-48f0-b14f-25d2b8c58143>\",\"Content-Length\":\"37924\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:19e8c40d-a733-415e-992c-b2a41cde97ee>\",\"WARC-Concurrent-To\":\"<urn:uuid:09aaf7fc-56b8-4455-9aa5-36d54285a489>\",\"WARC-IP-Address\":\"35.244.207.122\",\"WARC-Target-URI\":\"https://www.broughton.bucks.sch.uk/year-4-2/\",\"WARC-Payload-Digest\":\"sha1:VLBWJGTU3TEVGDJEFEQHRMJFOG5JOJIE\",\"WARC-Block-Digest\":\"sha1:QTTYDCESKQLLUF2EXDCXHRXGJHFIPS2Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296946637.95_warc_CC-MAIN-20230327025922-20230327055922-00562.warc.gz\"}"}
https://www.exceldemy.com/tag/hour-function/
[ "Disclosure: This post may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.\n\nHOUR Function\n\n### How to Create Analog Clock in Excel (with Easy Steps)\n\nToday we will show how to create an Analog Clock in Excel. Analog Clocks are clocks that contain hour, minute and second hands and give time in a ...\n\n### How to Make a Running Clock in Excel (2 Easy Ways)\n\nUndoubtedly, while working in Excel, we may need a timer that displays the time within the worksheet. Sounds complex, right? Wrong! In this article, ...\n\n### How to Subtract Time and Convert to Number in Excel\n\nWhile working in Microsoft Excel sometimes we need to subtract time and convert it to number so that we can calculate the time difference. But it ...\n\n### How to Add and Subtract Time in Excel (3 Suitable Examples)\n\nOne of the very popular uses of Excel is to calculate time and time differences. We may need to add or subtract time in Excel for a schedule or use ...\n\n### Man Hours Calculation in Excel (6 Useful Methods)\n\nIf you are looking for man hours calculation in Excel, then you are in the right place. In every working sector, the company or the organization ...\n\n### Salary Deduction Formula in Excel for Late Coming (with Example)\n\nThere are some quick steps to calculate salary deduction for creating a late coming formula in Excel. This article will walk you through each and ...\n\n### How to Calculate Hours from Date and Time in Excel\n\nSometimes we need to calculate the hour  between 2 times from different or the same date. It's quite simple to do in Excel. We can find the hour ...\n\n### How to Convert Hours to Minutes in Excel (3 Easy Ways)\n\nLooking for ways to know how to convert hours to minutes in Excel? We can convert hours to minutes by going through some easy steps. Here, you will ...\n\n### Convert Time to Minutes in Excel (5 Suitable Methods)\n\nHour, minute, and second are the units of time. In different situations, we show time with the combination of these units. Such as HH:MM:SS, HH: MM, ...\n\n### How to Convert Time to Seconds in Excel (3 Easy Methods)\n\nMicrosoft Excel is a powerful software. We can perform numerous operations on our datasets using excel tools and features. There are many default ...\n\n### How to Convert Time to Decimal in Excel (3 Quick Ways)\n\nExcel is of great use when it comes to thinking about time calculations. At times, you get your dataset in 24-hour time format, but you need the data ...\n\n### How to Convert Time to Hours in Excel (3 Easy Methods)\n\nSometimes. working in Excel, you may face the importance of Converting Decimal Time to Hours in Excel. But, converting Decimal Time to Hours in Excel ...\n\n### How to Convert Hours and Minutes to Minutes in Excel\n\nExcel is the most widely used tool for dealing with massive datasets. We can perform myriads of tasks of multiple dimensions in Excel. In this ...\n\n### Adding Hours and Minutes in Excel (4 Suitable Methods)\n\nIf you are looking for adding Hours and Minutes in Excel then you have come to the right place. Here, in this article I will demonstrate how to use ...\n\n### How to Convert Minutes to Seconds in Excel (2 Quick Ways)\n\nLooking for ways to know how to convert minutes to seconds in Excel? We can convert minutes to seconds in Excel by going through some easy steps. You ...", null, "" ]
[ null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20160%2050'%3E%3C/svg%3E", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90922856,"math_prob":0.8233884,"size":3122,"snap":"2022-40-2023-06","text_gpt3_token_len":671,"char_repetition_ratio":0.18024375,"word_repetition_ratio":0.066086955,"special_character_ratio":0.22966048,"punctuation_ratio":0.13824885,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9817729,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T22:47:41Z\",\"WARC-Record-ID\":\"<urn:uuid:01bb3f01-838c-4e5c-861e-3b0c947f6133>\",\"Content-Length\":\"188168\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:506d5c01-9b7c-407d-aacc-20d9c2c12107>\",\"WARC-Concurrent-To\":\"<urn:uuid:e6ca2ff5-2f8a-47ee-9eda-228b5d4c2ae0>\",\"WARC-IP-Address\":\"104.21.11.251\",\"WARC-Target-URI\":\"https://www.exceldemy.com/tag/hour-function/\",\"WARC-Payload-Digest\":\"sha1:XZDXYTBOW46QFJJYFZAAAPNLB3UUFUBH\",\"WARC-Block-Digest\":\"sha1:AKVDZ3K7TUYU5EXETJ3N2CXMNGP67WLZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500076.87_warc_CC-MAIN-20230203221113-20230204011113-00690.warc.gz\"}"}
https://loveperfectchange.com/the-5-core-numbers-in-numerology-chart-and-how-to-calculate-them/
[ "# The 5 Core Numbers In Numerology Chart and How To Calculate Them\n\nHave you ever wondered what your name really means? Or what the numbers in your birth date can tell about yourself and your future? If so, then numerology just might be for you.\n\nNumerology studies the vibrational frequencies of numbers and their impact on our lives. By understanding the vibrations of numbers, we can gain insight into our own lives, personalities, and destiny.\n\nThere are five core numbers in numerology that provide insight into different aspects of our lives. These five numbers are:\n\n• Life Path Number\n• Expression Number\n• Soul Urge Number\n• Birthday Number\n• Personality Number\n\nIn this blog post, we’ll look at each of these five numbers and show you how to calculate them using an online numerology calculator or certain formulas.\n\nBy the end, you’ll better understand what each number represents and what it can tell you about yourself.\n\n## Life Path Number\n\nThe Life Path number is considered the most important number in numerology. It represents who you are and provides insight into your talents, abilities, and challenges.\n\nCalculating your Life Path number is easy: simply add up all the digits in your birth date until you arrive at a single-digit number between 1 and 9.\n\nFor example, if your birthday is July 3rd, 1994, you would calculate it as follows: 7 + 3 + 1 + 9 + 4 = 24; 2 + 4 = 6. Therefore, your Life Path number would be 6.\n\n## Expression Number\n\nThe Expression number reveals your talents, skills, and abilities. It’s based on the letters in your full birth name (first, middle, last).\n\nTo calculate your Expression number, you must convert each letter of your name to a number using the following guide:  A=1 B=2 C=3 D=4 E=5 F=6 G=7 H=8 I=9 J=1 K=2 L=3 M=4 N=5 O=6 P=7 Q=8 R=9 S=1 T=2 U=V WXYZ = 3 4 5 6 7 8 9.\n\nSo if your name is Jane Doe Smith, it would break down like this: JANE = 1+1+5+5 = 12; DOE = 4+6+5 = 15; SMITH = 1+4+9+2+8 = 24; 12 + 15 + 24 = 51; 5 + 1 = 6. Therefore, your Expression number would be 6.\n\n## Soul Urge Number\n\nThe Soul Urge is also known as your motivation or heart’s desire number. It’s based on the vowels in your name, and it reveals what motivates you and what you’re longing for in life. This number can give you insight into your relationships, career, and overall life path.\n\nTo calculate your soul urge number, simply write down the vowels in your name (excluding Y). Then, add up the numbers associated with each vowel sound.\n\nFor example, A = 1, E = 5, I = 9, O = 6, U = 3. So, if your name is Emily, your calculation would be 5 + 9 + 3 = 17. To get your final soul urge number, simply reduce 17 down to a single digit by adding 1 + 7 = 8. Therefore, Emily’s soul urge number would be 8.\n\n## Birthday Number\n\nThe Birthday number reveals insight into how others see you and what kind of impression you make on them.\n\nTo calculate this number, simply add up all the digits in your birth date until you arrive at a single digit between 1 and 9.\n\nSo if your birthday is July 3rd, 1994,you would calculate it as follows: 7 + 3 + 1 + 9 + 4 = 24; 2 + 4 = 6. Therefore, your Birthday number would be 6.\n\n## Personality Number\n\nThe Personality number gives an indication of how well you cope with day-to-day life experiences. It is based on the consonants ( all letters except a, e, i, o, u )in only the first name given to an individual at birth.\n\nTo calculate your personality number, simply add up the consonants in your name and reduce the total to a single digit.\n\nSo if an individual was given only the first name Jane at birth, it would break down like this: JANE = 1 + 5 = 6. Therefore, the Personality number for Jane would be 6.\n\n### Final Thoughts\n\nNow that we’ve gone over how to calculate each of the five core numbers in numerology, you should have a better understanding of what they represent and how they can provide insight into different aspects of yourself.\n\nIf calculating them manually seems a daunting task, you can always use an online numerology calculator.\n\nUsing a numerology calculator is easy! All you need is your birth date and full name. Once you have that information, simply input it into the calculator and hit the “calculate” button. The calculator will do the rest of the work for you and deliver your results in just a few moments.\n\nA numerology calculator is a simple yet powerful tool that can be used to calculate your core numbers and gain valuable insights into your life. If you are curious about what your numbers mean or are seeking guidance on which path to take, consult your numerology chart. Visit a numerology site for your numerology reading today!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89686686,"math_prob":0.9863062,"size":4530,"snap":"2023-40-2023-50","text_gpt3_token_len":1139,"char_repetition_ratio":0.15355723,"word_repetition_ratio":0.0900474,"special_character_ratio":0.2558499,"punctuation_ratio":0.11146162,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99065423,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T21:13:34Z\",\"WARC-Record-ID\":\"<urn:uuid:c80e84a8-197d-48d3-aed5-29caeab69455>\",\"Content-Length\":\"86017\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b85f7c45-9a59-4183-a959-fa0f72bc7d48>\",\"WARC-Concurrent-To\":\"<urn:uuid:179f9f5e-ea86-4ab5-ac85-0ffb8b9848a6>\",\"WARC-IP-Address\":\"141.193.213.10\",\"WARC-Target-URI\":\"https://loveperfectchange.com/the-5-core-numbers-in-numerology-chart-and-how-to-calculate-them/\",\"WARC-Payload-Digest\":\"sha1:USC3MOROKTWKOQ3PS6BYVCHFI45Z3KDE\",\"WARC-Block-Digest\":\"sha1:E7MFLFKY265DV6G474SU4MMNBCQBTP6Z\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506669.30_warc_CC-MAIN-20230924191454-20230924221454-00284.warc.gz\"}"}
https://www.webcodegeeks.com/ruby/using-genetic-algorithms-ruby/
[ "Home » Ruby » Using Genetic Algorithms in Ruby", null, "Jesus is a Ruby developer who likes to help other developers improve their Ruby skills & fill-in the gaps in their education.\n\n# Using Genetic Algorithms in Ruby\n\nDid you know that there’s a way to use the power of natural selection to solve programming challenges? With genetic algorithms (GA), you can solve optimization problems using the same concepts that you find in nature:\n\n• Reproduction\n• Survival of the fittest\n\nSo what’s an optimization problem? It’s when you want to find not just a valid solution but the solution that will give you the best results.\n\nFor example, if you have a backpack that only fits a certain amount of stuff and you want to maximize the amount of stuff you can bring, then you could use a genetic algorithm to find the best solution. This is also known as *the knapsack problem*.\n\nThe genetic algorithm is not the only way to solve this kind of problem, but it’s an interesting one because it’s modeled after real-world behavior. So let’s learn how they work and how you can implement your own using Ruby.\n\n## The Initial Population\n\nThe first thing you need in a genetic algorithm is the initial population. This is just a pool of potential solutions that are initially generated at random. A population is made of chromosomes.\n\nHere’s a key point: Every chromosome represents a potential solution to the problem.\n\nA chromosome can encode a solution in different ways; one is to use a binary string, a string composed of 0s and 1s. Here’s part of the `Chromosome` class:\n\n```class Chromosome\nSIZE = 10\n\ndef initialize(value)\n@value = Array.new(SIZE) { [\"0\", \"1\"].sample }\nend\nend```\n\nWith `Array.new(size)`, you can create a prefilled array with the results from the block, which in this case is a random number between 0 and 1.\n\nThis is what a chromosome looks like:\n\n`\"0010010101\"`\n\nWe use a 1 to represent an item inside the backpack and a 0 to represent an item that is not in the backpack.\n\nNow that we have a chromosome, we can generate the initial population:\n\n`population = 100.times { Chromosome.new }`\n\n## Survival of The Fittest\n\nIn this step, we want to select the strongest chromosomes (potential solutions) from our population and use them to create the next generation.\n\nThere are two components to this:\n\n• The fitness function\n• The selection algorithm\n\nThe fitness function is used to ‘score’ every chromosome to see how close it is to the optimal solution. This of course depends on the problem we are trying to solve. For the backpack problem, we could use a fitness function that returns a higher score for every item that we are able to fit in.\n\nHere is an example:\n\n```CAPACITY = 20\n\ndef fitness\nweights = [2, 3, 6, 7, 5, 9, 4]\nvalues = [6, 5, 8, 9, 6, 7, 3]\n\nw = weights\n.map\n.with_index { |w, idx| value[idx].to_i * w }\n.inject(:+)\n\nv = values\n.map\n.with_index { |v, idx| value[idx].to_i * v }\n.inject(:+)\n\nw > CAPACITY ? 0 : v\nend```\n\nFirst, we calculate the total weight of the items to see if we have gone over capacity. Then if we go over capacity, we are going to return a fitness of 0 because this solution is invalid. Otherwise we are going to return the total value of the items that we were able to fit in, because that’s what we are optimizing for.\n\nFor example, with the chromosome `\"0010011\"` and the values and weights given above, we have the items `[6, 9, 4]` inside our backpack, for a total weight of `19`. Since that is within capacity, we are going to return the total value for these items, which is `8 + 7 + 3 = 18`.\n\nThat becomes the fitness score for this particular chromosome.\n\n## Selection Algorithm\n\nNow let’s go over the selection algorithm. This decides which two chromosomes to evolve at any given time.\n\nThere are different ways to implement a selection algorithm, like the roulette wheel selection algorithm and the group selection algorithm.\n\nOr we can simply pick two random chromosomes. I found this to be good enough as long as you apply elitism, which is to keep the best fit chromosomes after every generation.\n\nHere’s the code:\n\n```def select(population)\npopulation.sample(2)\nend```\n\nNext we will learn how we can evolve the selected chromosomes so we can create the next generation and get closer to the optimal solution.\n\n## Genetic Algorithm Evolution\n\nTo evolve our selected chromosomes, we can apply two operations: crossover and mutation.\n\n### Crossover\n\nIn the crossover operation, you cross two chromosomes at some random point to generate two new chromosomes, which will form part of the next generation.\n\nHere’s the crossover method:\n\n```def crossover(selection, index, chromosome)\ncr1 = selection[0...index] + selection[index..-1]\ncr2 = selection[0...index] + selection[index..-1]\n\n[chromosome.new(cr1), chromosome.new(cr2)]\nend```\n\nWe don’t always apply this crossover operation because we want some of the current population to carry over.\n\n### Mutation\n\nThe other evolutionary operation we can perform is mutation. Mutation is only applied with a small probability because we don’t want to drift off too much from the current solution.\n\nThe purpose of mutation is to avoid getting stuck with a local minima solution.\n\nImplementation:\n\n```def mutate(probability_of_mutation)\n@value = value.map { |ch| rand < probability_of_mutation ? invert(ch) : ch }\nend\n\ndef invert(binary)\nbinary == \"0\" ? \"1\" : \"0\"\nend```\n\nNow that we have all the components, we can make them work together.\n\n## The Run Method\n\nThis method generates the initial population and contains the main loop of the algorithm. It will also find the best-fit solution and return it at the end. It looks something like this:\n\n```def run\n# initial population\npopulation = Array.new(100) { Chromosome.new }\n\ncurrent_generation = population\nnext_generation = []\n\niterations.times {\n(population.size / 2).times {\n# selection\nselection = crossover(select(current_generation), rand(0..Chromosome::SIZE), chromosome)\n\n# mutation\nselection.mutate(p_mutation)\nselection.mutate(p_mutation)\n}\n\ncurrent_generation = next_generation\nnext_generation = []\n}\n\ncurrent_generation.max_by { |ch| ch.fitness }\nend```\n\nThis `run` method is defined inside the `GeneticAlgorithm` class, which we can use like this:\n\n```ga = GeneticAlgorithm.new\nputs ga.run(Chromosome, 0.2, 0.01, 100)```\n\nThe first argument is the chromosome class we are going to use, the second argument is the crossover rate, the third is the argument mutation rate, and the last argument is the number of generations.\n\n## How Do You Know That You Got The Best Solution?\n\nLong story short, you can’t know for sure. What you can do is run a good amount of iterations and trust that the result is either the optimal solution or very close to the optimal solution.\n\nAnother option is to keep track of the best-fit chromosome and stop if it doesn’t improve after a certain number of iterations.\n\n## Conclusion\n\nIn this article, you learned that genetic algorithms are used to solve optimization problems. You also learned how they work and what components they’re made of (initial population, selection, and evolution). You can find the finished project on GitHub.\n\nIf you found this article interesting, do us a favor and share this post with as many people as you can so they can enjoy it, too\n\n Published on Web Code Geeks with permission by Jesus Castello, partner at our WCG program. See the original article here: Using Genetic Algorithms in RubyOpinions expressed by Web Code Geeks contributors are their own.", null, "", null, "(0 rating, 0 votes)\nYou need to be a registered member to rate this.\nStart the discussion Views Tweet it!\nDo you want to know how to develop your skillset to become a Web Rockstar?\nSubscribe to our newsletter to start Rocking right now!\nTo get you started we give you our best selling eBooks for FREE!\n1. Building web apps with Node.js\n2. HTML5 Programming Cookbook\n3. CSS Programming Cookbook\n4. AngularJS Programming Cookbook\n5. jQuery Programming Cookbook\n6. Bootstrap Programming Cookbook\nand many more ....", null, "", null, "" ]
[ null, "https://gravatar.com/avatar/e62d53b4c9354b256fd15271ae66e7df", null, "https://www.webcodegeeks.com/wp-content/plugins/wp-postratings/images/thumbs/rating_1_off.png", null, "https://www.webcodegeeks.com/wp-content/plugins/wp-postratings/images/thumbs/rating_2_off.png", null, "https://www.webcodegeeks.com/wp-content/uploads/2015/10/free_books_5.png", null, "https://www.webcodegeeks.com/wp-content/litespeed/avatar/02aec09dea6d4e18c458ed3c1d1b61a1.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87366605,"math_prob":0.93474853,"size":7163,"snap":"2020-24-2020-29","text_gpt3_token_len":1626,"char_repetition_ratio":0.15365274,"word_repetition_ratio":0.009205021,"special_character_ratio":0.23398018,"punctuation_ratio":0.12680115,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97956246,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-12T04:09:36Z\",\"WARC-Record-ID\":\"<urn:uuid:f14d643a-b100-4542-81c5-86173801cd61>\",\"Content-Length\":\"148633\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3fd4de20-feb1-4ae5-b029-edb031aaeb08>\",\"WARC-Concurrent-To\":\"<urn:uuid:83a3336b-4b4b-4e81-a902-c381719c6abf>\",\"WARC-IP-Address\":\"172.67.214.229\",\"WARC-Target-URI\":\"https://www.webcodegeeks.com/ruby/using-genetic-algorithms-ruby/\",\"WARC-Payload-Digest\":\"sha1:HDEXADXIFN3NLZUUECF6WBTAWZOKRO57\",\"WARC-Block-Digest\":\"sha1:XQCT65AYLRADXZDZ6P3VK76WD55XR6VG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593657129517.82_warc_CC-MAIN-20200712015556-20200712045556-00279.warc.gz\"}"}
https://help.runn.io/en/articles/2826857-project-insights
[ "Runn provides forecasts of key insights for each of your projects in time (hours) and financials (revenue and project costs). Examples include:\n\n• Project budget\n\n• Project revenue\n\n• Project people costs\n\n• Gross project profits\n\n• Margin (%)\n\nThe insights forecasts are for the entire project.\n\nNote: The insights shown are based on your inputs. Runn assumes that you will bill all hours you have assigned/logged on this project. E.g. if you schedule a person for 10h per day but that person's capacity is 8h per day, Runn will use the 10h in your forecasts and that you will bill the 10h.\n\n## Time Insights\n\n Forecast Description Project Budget The project budget you have set for the project in terms of hours. Total Billable Hours The sum of hours that are scheduled or logged on billable assignments. Over / Under Budget The number of hours that you are expected to go over or under budget. Completed Hours The number of billable hours that have been scheduled/logged before today. Completed (%) The percentage of total billable hours that have been completed.= Completed Hours / Total Billable Hours * 100\n\n## Financial Insights\n\n Forecast Description Project Budget The project budget you have set for the project. Project Revenue The revenue you are expected to earn on a project. It's the sum of the assigned/logged hours for each person and placeholder on the project, multiplied by their respective charge out rates.For Time and Material projects, Runn calculates Project Revenue from your project's Total Billable Hours and the project rates you have set for each role.For Fixed-Price projects, Budget (\\$) will equal Project Revenue (\\$). Over / Under Budget The \\$ amount that you are expected to go over or under budget. T&M Benchmark (fixed price projects only) How much revenue you could earn if the project is charged as Time and Materials and you bill for every hour that is scheduled/logged on the project.For fixed-price projects, Runn calculates it from your project's Total Billable Hours and the project rates you have set for each role. Project People Costs The sum of all labor expenses you are expected to incur on the project.Runn calculates Project People Costs (\\$) from the Total Billable Hours and the cost to the business you have set for each person in their contract.If you have placeholders scheduled, the internal role cost rate is used, unless you have set a custom cost for them. Project Gross Profit The money you will earn from the project after subtracting any people/placeholder costs from your project revenue. = Project Revenue (\\$) - Project People Costs (\\$) Margin (%) The percentage of revenue that exceeds your project people costs.= Project Profit (\\$) / Project Revenue (\\$) * 100\n\n## Example\n\nIn the example below, we had 3 people scheduled on a project to work 80 billable hours each. The project is completed.\n\n• Their cost is \\$60 each (See employment contracts for how to set and manage a person's cost rate)\n\n• Their project charge out rate is \\$150 (See rate cards to set and manage charge out rates)\n\nNote that for simplicity's sake, this example uses the same cost and role charge-out rate for each person on the project. In reality, these figures will likely be different.\n\n### Time Insights:", null, "Project Budget\n\n= budgeted hours\n\n= 80h * 3\n\n= 240h\n\nTotal Billable Hours\n\n= scheduled billable hours\n\n= 80h * 3\n\n= 240h\n\nOn Budget\n\n= project budget - total billable hours\n\n= 240h - 240h\n\n= 0h\n\nCompleted Hours\n\n= no. of billable hours scheduled/logged before today\n\n= 240h\n\nCompleted\n\n= completed hours / total billable hours * 100\n\n= 240 / 240 *100\n\n= 100%\n\nFinancial Insights:", null, "Project Budget\n\nIn this example, the budget uses the rate and hours assigned.\n\n= (budgeted hours * charge out rate) * 3 people\n= (80h * \\$150) * 3\n= \\$36,000\n\n### Project Revenue\n\n= (assigned hours for period * charge out rate) * 3 people\n= (80h * \\$150) * 3\n= \\$36,000\n\nOn Budget\n\n= project budget - project revenue\n\n= \\$36,000 - \\$36,000\n\n= \\$0\n\n### Project People Costs\n\n= (assigned hours for period * cost rate) * 3 people\n= (80h * \\$60) * 3\n= \\$14,400\n\n### Project Gross Profit\n\n= Project Revenue - Project People Costs\n= \\$36,000 - \\$14,400\n= \\$21,600\n\n### Margin\n\n= (Project Gross Profit / Project Revenue) * 100\n= (\\$21,6000 / \\$36,000) * 100\n= 60%\n\nStill have questions? We're happy to help!" ]
[ null, "https://downloads.intercomcdn.com/i/o/392197198/157eb1b83e5b6a2ca0f7fe1e/image.png", null, "https://downloads.intercomcdn.com/i/o/392197257/fc9b9cba0842d3001b73c125/image.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8934881,"math_prob":0.6410904,"size":4106,"snap":"2022-40-2023-06","text_gpt3_token_len":995,"char_repetition_ratio":0.17357387,"word_repetition_ratio":0.13769124,"special_character_ratio":0.26229906,"punctuation_ratio":0.07649513,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9535294,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-05T09:37:24Z\",\"WARC-Record-ID\":\"<urn:uuid:167dbf8c-6bf9-4c02-9344-5649d9c8a2f9>\",\"Content-Length\":\"23176\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8dab76da-3be1-4aba-b371-0b77d48837d7>\",\"WARC-Concurrent-To\":\"<urn:uuid:cb91f638-fb64-4f9d-822f-e159fd282b49>\",\"WARC-IP-Address\":\"172.67.14.226\",\"WARC-Target-URI\":\"https://help.runn.io/en/articles/2826857-project-insights\",\"WARC-Payload-Digest\":\"sha1:ZTQKDFIH36DIHD5VNDD53VMURXBWMMXG\",\"WARC-Block-Digest\":\"sha1:ISASUD6RFTA2KGG4X2Z43XTXWBDYA7X6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337595.1_warc_CC-MAIN-20221005073953-20221005103953-00563.warc.gz\"}"}
http://trac.sasview.org/changeset/f4ae8c46b94ae66b74ad2c8cfe09975d2caa7227/sasmodels
[ "Changeset f4ae8c4 in sasmodels\n\nIgnore:\nTimestamp:\nMar 26, 2018 11:05:02 AM (4 years ago)\nBranches:\nmaster, core_shell_microgels, magnetic_model, ticket-1257-vesicle-product, ticket_1156, ticket_1265_superball, ticket_822_more_unit_tests\nChildren:\nd86f0fc\nParents:\ned5b109\nMessage:\n\ndoc: remove extra indentation on dispersion distribution descriptions\n\nFile:\n1 edited\n\nLegend:\n\nUnmodified\n red5b109 The Uniform Distribution is defined as .. math:: f(x) = \\frac{1}{\\text{Norm}} \\begin{cases} 1 & \\text{for } |x - \\bar x| \\leq \\sigma \\\\ 0 & \\text{for } |x - \\bar x| > \\sigma \\end{cases} where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution, $\\sigma$ is the half-width, and *Norm* is a normalization factor which is determined during the numerical calculation. The polydispersity in sasmodels is given by .. math:: \\text{PD} = \\sigma / \\bar x .. figure:: pd_uniform.jpg Uniform distribution. .. math:: f(x) = \\frac{1}{\\text{Norm}} \\begin{cases} 1 & \\text{for } |x - \\bar x| \\leq \\sigma \\\\ 0 & \\text{for } |x - \\bar x| > \\sigma \\end{cases} where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution, $\\sigma$ is the half-width, and *Norm* is a normalization factor which is determined during the numerical calculation. The polydispersity in sasmodels is given by .. math:: \\text{PD} = \\sigma / \\bar x .. figure:: pd_uniform.jpg Uniform distribution. The value $N_\\sigma$ is ignored for this distribution. The Rectangular Distribution is defined as .. math:: f(x) = \\frac{1}{\\text{Norm}} \\begin{cases} 1 & \\text{for } |x - \\bar x| \\leq w \\\\ 0 & \\text{for } |x - \\bar x| > w \\end{cases} where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution, $w$ is the half-width, and *Norm* is a normalization factor which is determined during the numerical calculation. Note that the standard deviation and the half width $w$ are different! The standard deviation is .. math:: \\sigma = w / \\sqrt{3} whilst the polydispersity in sasmodels is given by .. math:: \\text{PD} = \\sigma / \\bar x .. figure:: pd_rectangular.jpg Rectangular distribution. .. note:: The Rectangular Distribution is deprecated in favour of the Uniform Distribution above and is described here for backwards compatibility with earlier versions of SasView only. .. math:: f(x) = \\frac{1}{\\text{Norm}} \\begin{cases} 1 & \\text{for } |x - \\bar x| \\leq w \\\\ 0 & \\text{for } |x - \\bar x| > w \\end{cases} where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution, $w$ is the half-width, and *Norm* is a normalization factor which is determined during the numerical calculation. Note that the standard deviation and the half width $w$ are different! The standard deviation is .. math:: \\sigma = w / \\sqrt{3} whilst the polydispersity in sasmodels is given by .. math:: \\text{PD} = \\sigma / \\bar x .. figure:: pd_rectangular.jpg Rectangular distribution. .. note:: The Rectangular Distribution is deprecated in favour of the Uniform Distribution above and is described here for backwards compatibility with earlier versions of SasView only. .. ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ The Gaussian Distribution is defined as .. math:: f(x) = \\frac{1}{\\text{Norm}} \\exp\\left(-\\frac{(x - \\bar x)^2}{2\\sigma^2}\\right) where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution and *Norm* is a normalization factor which is determined during the numerical calculation. The polydispersity in sasmodels is given by .. math:: \\text{PD} = \\sigma / \\bar x .. figure:: pd_gaussian.jpg Normal distribution. .. math:: f(x) = \\frac{1}{\\text{Norm}} \\exp\\left(-\\frac{(x - \\bar x)^2}{2\\sigma^2}\\right) where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution and *Norm* is a normalization factor which is determined during the numerical calculation. The polydispersity in sasmodels is given by .. math:: \\text{PD} = \\sigma / \\bar x .. figure:: pd_gaussian.jpg Normal distribution. .. ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ The Boltzmann Distribution is defined as .. math:: f(x) = \\frac{1}{\\text{Norm}} \\exp\\left(-\\frac{ | x - \\bar x | }{\\sigma}\\right) where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution and *Norm* is a normalization factor which is determined during the numerical calculation. The width is defined as .. math:: \\sigma=\\frac{k T}{E} which is the inverse Boltzmann factor, where $k$ is the Boltzmann constant, $T$ the temperature in Kelvin and $E$ a characteristic energy per particle. .. figure:: pd_boltzmann.jpg Boltzmann distribution. .. math:: f(x) = \\frac{1}{\\text{Norm}} \\exp\\left(-\\frac{ | x - \\bar x | }{\\sigma}\\right) where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution and *Norm* is a normalization factor which is determined during the numerical calculation. The width is defined as .. math:: \\sigma=\\frac{k T}{E} which is the inverse Boltzmann factor, where $k$ is the Boltzmann constant, $T$ the temperature in Kelvin and $E$ a characteristic energy per particle. .. figure:: pd_boltzmann.jpg Boltzmann distribution. .. ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ The Lognormal Distribution is defined as .. math:: f(x) = \\frac{1}{\\text{Norm}}\\frac{1}{x\\sigma} \\exp\\left(-\\frac{1}{2} \\bigg(\\frac{\\ln(x) - \\mu}{\\sigma}\\bigg)^2\\right) where *Norm* is a normalization factor which will be determined during the numerical calculation, $\\mu=\\ln(x_\\text{med})$ and $x_\\text{med}$ is the *median* value of the *lognormal* distribution, but $\\sigma$ is a parameter describing the width of the underlying *normal* distribution. $x_\\text{med}$ will be the value given for the respective size parameter in sasmodels, for example, *radius=60*. The polydispersity in sasmodels is given by .. math:: \\text{PD} = p = \\sigma / x_\\text{med} The mean value of the distribution is given by $\\bar x = \\exp(\\mu+ p^2/2)$ and the peak value by $\\max x = \\exp(\\mu - p^2)$. The variance (the square of the standard deviation) of the *lognormal* distribution is given by .. math:: \\nu = [\\exp({\\sigma}^2) - 1] \\exp({2\\mu + \\sigma^2}) Note that larger values of PD might need a larger number of points and $N_\\sigma$. .. figure:: pd_lognormal.jpg Lognormal distribution. .. math:: f(x) = \\frac{1}{\\text{Norm}}\\frac{1}{x\\sigma} \\exp\\left(-\\frac{1}{2} \\bigg(\\frac{\\ln(x) - \\mu}{\\sigma}\\bigg)^2\\right) where *Norm* is a normalization factor which will be determined during the numerical calculation, $\\mu=\\ln(x_\\text{med})$ and $x_\\text{med}$ is the *median* value of the *lognormal* distribution, but $\\sigma$ is a parameter describing the width of the underlying *normal* distribution. $x_\\text{med}$ will be the value given for the respective size parameter in sasmodels, for example, *radius=60*. The polydispersity in sasmodels is given by .. math:: \\text{PD} = p = \\sigma / x_\\text{med} The mean value of the distribution is given by $\\bar x = \\exp(\\mu+ p^2/2)$ and the peak value by $\\max x = \\exp(\\mu - p^2)$. The variance (the square of the standard deviation) of the *lognormal* distribution is given by .. math:: \\nu = [\\exp({\\sigma}^2) - 1] \\exp({2\\mu + \\sigma^2}) Note that larger values of PD might need a larger number of points and $N_\\sigma$. .. figure:: pd_lognormal.jpg Lognormal distribution. For further information on the Lognormal distribution see: The Schulz distribution is defined as .. math:: f(x) = \\frac{1}{\\text{Norm}} (z+1)^{z+1}(x/\\bar x)^z \\frac{\\exp[-(z+1)x/\\bar x]}{\\bar x\\Gamma(z+1)} where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution, *Norm* is a normalization factor which is determined during the numerical calculation, and $z$ is a measure of the width of the distribution such that .. math:: z = (1-p^2) / p^2 where $p$ is the polydispersity in sasmodels given by .. math:: PD = p = \\sigma / \\bar x and $\\sigma$ is the RMS deviation from $\\bar x$. Note that larger values of PD might need a larger number of points and $N_\\sigma$. For example, for PD=0.7 with radius=60 |Ang|, at least Npts>=160 and Nsigmas>=15 are required. .. figure:: pd_schulz.jpg Schulz distribution. .. math:: f(x) = \\frac{1}{\\text{Norm}} (z+1)^{z+1}(x/\\bar x)^z \\frac{\\exp[-(z+1)x/\\bar x]}{\\bar x\\Gamma(z+1)} where $\\bar x$ ($x_\\text{mean}$ in the figure) is the mean of the distribution, *Norm* is a normalization factor which is determined during the numerical calculation, and $z$ is a measure of the width of the distribution such that .. math:: z = (1-p^2) / p^2 where $p$ is the polydispersity in sasmodels given by .. math:: PD = p = \\sigma / \\bar x and $\\sigma$ is the RMS deviation from $\\bar x$. Note that larger values of PD might need a larger number of points and $N_\\sigma$. For example, for PD=0.7 with radius=60 |Ang|, at least Npts>=160 and Nsigmas>=15 are required. .. figure:: pd_schulz.jpg Schulz distribution. For further information on the Schulz distribution see: where $\\nu$ is the variance of the distribution and $\\bar x$ is the mean value of x. value of $x$. For more information see:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.51199365,"math_prob":0.9998295,"size":6532,"snap":"2022-05-2022-21","text_gpt3_token_len":2247,"char_repetition_ratio":0.1764706,"word_repetition_ratio":0.1268116,"special_character_ratio":0.43845683,"punctuation_ratio":0.12165264,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000011,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-19T01:59:07Z\",\"WARC-Record-ID\":\"<urn:uuid:a4e8b821-a938-4211-8e02-843ec2cf03a4>\",\"Content-Length\":\"68737\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:55eb28dd-2dc4-45b4-b5d6-8233f60d20fd>\",\"WARC-Concurrent-To\":\"<urn:uuid:f8751e80-efd1-4537-86e3-f758ae3e19a5>\",\"WARC-IP-Address\":\"160.36.200.68\",\"WARC-Target-URI\":\"http://trac.sasview.org/changeset/f4ae8c46b94ae66b74ad2c8cfe09975d2caa7227/sasmodels\",\"WARC-Payload-Digest\":\"sha1:NB3I3RM333DGQREM3RZSON3NFFRPI42O\",\"WARC-Block-Digest\":\"sha1:LBH3KZMP4DLHME7YLXUZJL7T2NYQZN42\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320301217.83_warc_CC-MAIN-20220119003144-20220119033144-00539.warc.gz\"}"}
https://mechanicaldesign.asmedigitalcollection.asme.org/heattransfer/article/129/9/1303/467641/Closure-to-Discussion-of-Second-Law-Analysis-of
[ "I would like to thank M. M. Awad for the time he spent and appreciate his consideration in reading and carefully reviewing the paper, Sahin, A. Z., 1998, “Second Law Analysis of Laminar Viscous Flow Through a Duct Subjected to Constant Wall Temperature” ASME J. Heat Transfer, 120(1), pp. 76–83.\n\nObviously, the term $(1−e−4Stλ)$ in Eq. (10) was supposed to be $(1−e−4Stλ)−1$. Unfortunately, this error was propagated in the rest of the paper in Eqs. (14), (17), (20), (22) and in p. 81. Perhaps this is the only major concern about the paper.\n\nAs for the range of $τ$ in Table 1, the choice was $0.0≤τ≤0.2$ and it is not an error. The reason for this choice is to make sure that all the temperatures in the flow domain remain within the range of temperatures $293K≤T≤373K$, within which the viscosity model parameters $a$, $b$, $B$, and $n$ given in Table 1 are valid (especially for the case of glycerol).\n\nThe values of $T0$ in Tables 2$b$ and 3$b$ are in K; however, $(°C)$ in the labels are typing errors.\n\nIn the paper, Sahin, A. Z., 1998, “A Second Law Comparison for Optimum Shape of Duct Subjected to Constant Wall Temperature and Laminar Flow,” Heat and Mass Transfer /Wärme-und Stoffübertragung, 33(5-6), pp. 425–430, the fluid was assumed to be fully developed laminar as it enters the duct in all types of geometry. Therefore, the comments made regarding the thermal entry length are not relevant." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9412559,"math_prob":0.9680868,"size":1319,"snap":"2023-14-2023-23","text_gpt3_token_len":340,"char_repetition_ratio":0.10874525,"word_repetition_ratio":0.025751073,"special_character_ratio":0.2661107,"punctuation_ratio":0.16783217,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9639458,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-08T03:11:07Z\",\"WARC-Record-ID\":\"<urn:uuid:dcf841ab-20de-4f27-8427-59f21f0294a2>\",\"Content-Length\":\"123954\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:488b3e89-a35b-4a14-aa70-4c9b4da6ef1d>\",\"WARC-Concurrent-To\":\"<urn:uuid:3d2e7f38-9332-4d1d-8a5f-24e7a99907d3>\",\"WARC-IP-Address\":\"52.179.114.94\",\"WARC-Target-URI\":\"https://mechanicaldesign.asmedigitalcollection.asme.org/heattransfer/article/129/9/1303/467641/Closure-to-Discussion-of-Second-Law-Analysis-of\",\"WARC-Payload-Digest\":\"sha1:X4KJ4PLRU7NDV4WXTZJWDCKWQMK2GCBN\",\"WARC-Block-Digest\":\"sha1:PIE4LI22UKUMYMCL5L26KHBKYUKIAYNH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224654031.92_warc_CC-MAIN-20230608003500-20230608033500-00624.warc.gz\"}"}
https://mcqsadda.online/best-work-energy-and-power-mcqs/
[ "# Best Work Energy And Power Mcqs\n\nContents\n\n5/5 - (1 vote)\n\nWelcome to our guide on “Best Work, Energy, and Power MCQs”! If you’re a student or professional seeking to improve your understanding of work, energy, and power concepts, then you’ve come to the right place. In this guide, we’ve compiled some of the best multiple-choice questions (MCQs) on work, energy, and power, which will not only test your knowledge but also help you sharpen your problem-solving skills.\n\n### Check Best Work Energy And Power Mcqs\n\nOur MCQs cover a range of topics, from basic concepts such as work and power to more advanced topics such as conservation of energy and the efficiency of machines. By going through these MCQs, you’ll be able to identify your strengths and weaknesses in the subject, which will allow you to focus on areas that require more attention.\n\nAdditionally, these MCQs can serve as a valuable resource for anyone preparing for competitive exams or interviews that test their knowledge of work, energy, and power. With our comprehensive collection of MCQs, you’ll be well-equipped to tackle any question related to this topic. So, without further ado, let’s dive in and explore the world of work, energy, and power through our Best Work, Energy, and Power MCQs\n\n#### 76 best Mcqs on Work Energy And Power\n\nMechanics Mass, Motion, Force, Acceleration,  Momentum, Work, Power, Energy\n\nQ1. Which of the following is not a vector quantity?\n\n(a) Displacement\n\n(b) Velocity\n\n(c) Force\n\n(d) Volume\n\n(d) Volume\n\nQ2. Which of the following is a vector quantity ?\n\n(a) Time\n\n(b) Speed\n\n(c) Displacement\n\n(d) Distance\n\n(c) Displacement\n\nQ3. Which one of the following is a vector quantity ?\n\n(a) Momentum\n\n(b) Pressure\n\n(c) Energy\n\n(d) Work\n\n(a) Momentum\n\nQ4. Force is the product of ­\n\n(a) Mass and velocity\n\n(b) Mass and acceleration\n\n(c) Weight and velocity\n\n(d) Weight and acceleration\n\n(b) Mass and acceleration\n\nQ5. The energy of wind is ­\n\n(a) Only potential\n\n(b) Only kinetic\n\n(c) Electrical\n\n(d) Potential and kinetic both\n\n(b) Only kinetic\n\nQ6. What is the difference between mass and weight?\n\n(a) Mass is a measure of the amount of matter in an object, while weight is a measure of the force of gravity acting on an object\n\n(b) Mass is a measure of the volume of an object, while weight is a measure of the density of an object\n\n(c) Mass and weight are interchangeable terms\n\n(d) Mass is a measure of the force of gravity acting on an object, while weight is a measure of the amount of matter in an object\n\n(a) Mass is a measure of the amount of matter in an object, while weight is a measure of the force of gravity acting on an object\n\nQ7. Which law states that the force acting on an object is equal to its mass times its acceleration?\n\n(a) Newton’s First Law of Motion\n\n(b) Newton’s Second Law of Motion\n\n(c) Newton’s Third Law of Motion\n\n(d) Law of Universal Gravitation\n\n(b) Newton’s Second Law of Motion\n\nQ8. Which of the following is an example of a force that can act on an object to change its motion?\n\n(a) Gravity\n\n(b) Inertia\n\n(c) Mass\n\n(d) Volume\n\n(a) Gravity\n\nQ9. Which of the following is true about the conservation of mass?\n\n(a) Mass can be created but not destroyed\n\n(b) Mass can be destroyed but not created\n\n(c) Mass can neither be created nor destroyed\n\n(d) Mass is always conserved unless acted upon by an external force\n\n(c) Mass can neither be created nor destroyed\n\nQ10. Which of the following is a characteristic of an object with a large mass?\n\n(a) It is difficult to accelerate\n\n(b) It has a small amount of matter\n\n(c) It has a low density\n\n(d) It is small in size\n\n(a) It is difficult to accelerate\n\nQ11. Which of the following devices is used to measure the mass of an object?\n\n(a) Thermometer\n\n(b) Ruler\n\n(c) Balance\n\n(d) Clock\n\n(c) Balance\n\nQ12. Which of the following is an example of a force that can act on an object to change its mass?\n\n(a) Friction\n\n(b) Inertia\n\n(c) Velocity\n\n(d) Pressure\n\n(a) Friction\n\nQ13. What is the SI unit of speed?\n\n(a) Metres per second\n\n(b) Kilometres per hour\n\n(c) Miles per hour\n\n(d) Feet per second\n\n(a) Metres per second\n\nQ14. Which of the following is a measure of the rate of change of velocity?\n\n(a) Speed\n\n(b) Acceleration\n\n(c) Distance\n\n(d) Time\n\n(b) Acceleration\n\nQ15. Which of the following is an example of a non-uniform motion?\n\n(a) A car moving at a constant speed on a straight road\n\n(b) A ball thrown in the air\n\n(c) A pendulum swinging back and forth\n\n(d) A train moving at a constant speed on a straight track\n\n(b) A ball thrown in the air\n\nQ16. Which of the following is a measure of the distance travelled by an object in a given time?\n\n(a) Speed\n\n(b) Acceleration\n\n(c) Velocity\n\n(d)  Displacement\n\n(a) Speed\n\nQ17. Which of the following is an example of circular motion?\n\n(a) A car moving in a straight line\n\n(b) A roller coaster going up and down a hill\n\n(c) A merry-go-round spinning around a central point\n\n(d) A bird flying in the sky\n\nA merry-go-round spinning around a central point\n\nQ18. Which law states that for every action, there is an equal and opposite reaction?\n\n(a) Newton’s First Law of Motion\n\n(b) Newton’s Second Law of Motion\n\n(c) Newton’s Third Law of Motion\n\n(d) Law of Universal Gravitation\n\n(c) Newton’s Third Law of Motion\n\nQ19. Which of the following is a conservative force?\n\n(a) Frictional Force\n\n(b) Gravity\n\n(c) Electric Force\n\n(d) Magnetic Force\n\n(c) Watt\n\nQ20. What is the SI unit of force?\n\n(a) Joule\n\n(b) Watt\n\n(c) Newton\n\n(d) Meter\n\n(c) Newton\n\nQ21. Which of the following statements is true about work done by a force?\n\n(a) It depends on the distance moved by the object only\n\n(b) It depends on the force applied to the object only\n\n(c) It depends on both the force applied to the object and the distance moved by the object\n\n(d) It is always negative\n\n(c) It depends on both the force applied to the object and the distance moved by the object\n\nQ22. What is the force that arises between two objects due to their charges called?\n\n(a) Centripetal force\n\n(b) Gravitational force\n\n(c) Magnetic force\n\n(d) Electrostatic force\n\n(d) Electrostatic force\n\nQ23. Which of the following is not a fundamental force in nature?\n\n(a) Strong nuclear force\n\n(b) Weak nuclear force\n\n(c) Gravitational force\n\n(d) Magnetic force\n\n(d) Magnetic force\n\nQ24. Which of the following statements is true about force?\n\n(a) Force always causes motion\n\n(b) Force always causes an increase in velocity\n\n(c) Force can cause a change in velocity or direction of motion\n\n(d) Force can only act in the direction of motion\n\n(c) Force can cause a change in velocity or direction of motion\n\nQ25. Which of the following is the formula for acceleration?\n\n(a) a = v^2 / r\n\n(b) a = F / m\n\n(c) a = Δv / Δt\n\n(d) a = W / m\n\n(c) a = Δv / Δt\n\nQ26. Which of the following statements is true about acceleration?\n\n(a) It is the rate of change of velocity\n\n(b) It is the rate of change of position\n\n(c) It is the rate of change of time\n\n(d) It is the rate of change of speed\n\n(a) It is the rate of change of velocity\n\nQ27. Which of the following units is used to measure acceleration?\n\n(a) Joule\n\n(b) Newton\n\n(c) Watt\n\n(d) Meter per second squared\n\n(d) Meter per second squared\n\nQ28. What is the acceleration of an object that is moving with a constant velocity?\n\n(a) Zero\n\n(b) Positive\n\n(c) Negative\n\n(d) Cannot be determined\n\n(a) Zero\n\nQ29. What is the acceleration due to gravity at the surface of the Earth?\n\n(a) 9.8 m/s^2\n\n(b) 1 m/s^2\n\n(c) 5 m/s^2\n\n(d) 0.98 m/s^2\n\n(a) 9.8 m/s^2\n\nQ30. What is the acceleration of an object thrown vertically upwards at its highest point?\n\n(a) Zero\n\n(b) Positive\n\n(c) Negative\n\n(d) Cannot be determined\n\n(a) Zero\n\nQ31. Which of the following is an example of negative acceleration?\n\n(a) A car accelerating from 0 to 60 mph in 6 seconds\n\n(b) A car braking to a stop from 60 mph in 6 seconds\n\n(c) A car moving at a constant speed of 60 mph\n\n(d) A car turning left at a constant speed of 60 mph\n\n(b) A car braking to a stop from 60 mph in 6 seconds\n\nQ32. What is the relationship between force and acceleration?\n\n(a) Directly proportional\n\n(b) Inversely proportional\n\n(c) They are unrelated\n\n(d) Cannot be determined\n\n(a) Directly proportional\n\nQ33. Which of the following is true about uniform acceleration?\n\n(a) It is acceleration due to gravity\n\n(b) It is variable acceleration\n\n(c) It is constant acceleration\n\n(d) It is acceleration in a straight line\n\n(c) It is constant acceleration\n\nQ34. Which of the following statements is true about angular acceleration?\n\n(a) It is the rate of change of angular velocity\n\n(b) It is the rate of change of linear velocity\n\n(c) It is the rate of change of displacement\n\n(d) It is the rate of change of time\n\n(a) It is the rate of change of angular velocity\n\nQ35. Which of the following is an example of a vector quantity?\n\n(a) Mass\n\n(b) Momentum\n\n(c) Temperature\n\n(d) Time\n\n(b) Momentum\n\nDiscover a curated collection of the finest books for competitive exams available now for purchase online, and enrich your knowledge with captivating insights and inspiring masterpieces.\n\nQ36. Which of the following best describes the relationship between momentum and velocity?\n\n(a) Momentum is proportional to velocity\n\n(b) Momentum is inversely proportional to velocity\n\n(c) Momentum and velocity are independent of each other\n\n(d) Momentum is equal to velocity squared\n\n(a) Momentum is proportional to velocity\n\nQ37. Which of the following is the SI unit of momentum?\n\n(a) Joule\n\n(b) Newton\n\n(c) Metre per second\n\n(d) Kilogram metre per second\n\n(d) Kilogram metre per second\n\nQ38. Which of the following factors affect the momentum of an object?\n\n(a) Velocity\n\n(b) Mass\n\n(c) Both a and b\n\n(d) Neither a nor b\n\n(c) Both a and b\n\nQ39. Which of the following best defines momentum?\n\n(a) A measure of an object’s resistance to motion\n\n(b) A measure of an object’s tendency to remain at rest\n\n(c) A measure of an object’s tendency to continue moving in a straight line at a constant speed\n\n(d) A measure of an object’s potential energy\n\n(c) A measure of an object’s tendency to continue moving in a straight line at a constant speed\n\nQ40. Which of the following is the unit of work?\n\n(A) Newton\n\n(B) Joule\n\n(C) Watt\n\n(D) Pascal\n\n(B) Joule\n\nQ41. Which of the following is the formula for work done?\n\n(A) W = mgh\n\n(B) W = Fd\n\n(C) W = Pt\n\n(D) W = QV\n\n(B) W = Fd\n\nQ42. Which of the following is the formula for power?\n\n(A) P = Fd\n\n(B) P = W/t\n\n(C) P = QV\n\n(D) P = mg\n\n(B) P = W/t\n\nQ43. Which of the following is an example of potential energy?\n\n(A) A moving car\n\n(B) A stretched spring\n\n(C) A person running\n\n(D) A light bulb\n\n(B) A stretched spring\n\nQ44. Which of the following is the formula for kinetic energy?\n\n(A) KE = mgh\n\n(B) KE = QV\n\n(C) KE = Pt\n\n(D) KE = 1/2mv^2\n\n(D) KE = 1/2mv^2\n\nQ45. Which of the following is an example of work being done on an object?\n\n(A) A ball rolling down a hill\n\n(B) A person holding a book\n\n(C) A car driving on a flat road\n\n(D) None of the above\n\n(B) A person holding a book\n\nQ46. Which of the following is an example of a simple machine?\n\n(A) A car engine\n\n(B) A screwdriver\n\n(C) A computer mouse\n\n(D) A telephone\n\n(B) A screwdriver\n\nQ47. Which of the following is the formula for potential energy?\n\n(A) PE = mgh\n\n(B) PE = 1/2mv^2\n\n(C) PE = W/t\n\n(D) PE = QV\n\n(A) PE = mgh\n\nQ48. Which of the following is an example of kinetic energy?\n\n(A) A stretched rubber band\n\n(B) A stationary ball on a hill\n\n(C) A swinging pendulum\n\n(D) A compressed spring\n\n(C) A swinging pendulum\n\nQ49. Which of the following is the formula for work done?\n\nA) Work = force x distance\n\nB) Work = mass x acceleration\n\nC) Work = power x time\n\nD) Work = velocity x momentum\n\nA) Work = force x distance\n\nQ50. Which of the following is an example of elastic potential energy?\n\nA) A compressed spring\n\nB) A lifted weight\n\nC) A charged battery\n\nD) A spinning top\n\nA) A compressed spring\n\nQ51. Which of the following is the definition of power?\n\n(a) The ability to influence or control others\n\n(b) The ability to exert force\n\n(c) The ability to do work\n\n(d) The ability to generate electricity\n\n(c) The ability to do work\n\nQ52. Which unit is used to measure power?\n\na) Joule\n\nb) Watt\n\nc) Newton\n\nd) Meter\n\nb) Watt\n\nQ53. Which of the following is an example of electrical power?\n\na) A person lifting a weight\n\nb) A car moving uphill\n\nc) A light bulb emitting light\n\nd) A ball rolling down a hill\n\nc) A light bulb emitting light\n\nQ54. Which of the following factors affects power consumption?\n\na) Voltage\n\nb) Current\n\nc) Resistance\n\nd) All of the above\n\nd) All of the above\n\nQ55. What is the formula for calculating power?\n\na) Power = Voltage x Current\n\nb) Power = Current x Resistance\n\nc) Power = Force x Distance\n\nd) Power = Energy / Time\n\na) Power = Voltage x Current\n\nQ56. What is the difference between AC and DC power?\n\na) AC power is used in cars, while DC power is used in homes\n\nb) AC power fluctuates between positive and negative values, while DC power is constant\n\nc) AC power is more powerful than DC power\n\nd) DC power is used for small devices, while AC power is used for larger devices\n\nb) AC power fluctuates between positive and negative values, while DC power is constant\n\nQ57. Which of the following is an example of mechanical power?\n\na) A battery-powered flashlight\n\nb) A car engine\n\nc) A microwave oven\n\nd) A laptop computer\n\nb) A car engine\n\nQ58. What is the relationship between power and time?\n\na) Power is directly proportional to time\n\nb) Power is inversely proportional to time\n\nc) Power is not related to time\n\nd) Power increases exponentially with time\n\na) Power is directly proportional to time\n\nQ59. What is the difference between power and energy?\n\na) Power is the rate at which energy is used or produced\n\nb) Power is the amount of energy stored in a system\n\nc) Power and energy are interchangeable terms\n\nd) Power is the ability to do work, while energy is the capacity to do work\n\na) Power is the rate at which energy is used or produced\n\nQ60. What is the SI unit of power?\n\na) Newton\n\nb) Joule\n\nc) Watt\n\nd) Ampere\n\nc) Watt\n\nQ61. Which of the following is an example of thermal power?\n\na) A wind turbine generating electricity\n\nb) A hydroelectric dam generating electricity\n\nc) A coal-fired power plant generating electricity\n\nd) A battery powering a device\n\nc) A coal-fired power plant generating electricity\n\nQ62. Which of the following is an example of renewable power?\n\na) Fossil fuels\n\nb) Nuclear power\n\nc) Solar power\n\nd) Gasoline\n\nc) Solar power\n\nQ63. What is the main disadvantage of using nuclear power?\n\na) High cost of production\n\nb) Limited availability of fuel\n\nc) Risk of accidents and radiation exposure\n\nd) Environmental pollution\n\nc) Risk of accidents and radiation exposure\n\nQ64. Which of the following is an example of a smart grid technology?\n\na) A system for measuring the amount of energy used by each appliance in a home\n\nb) A system for automatically turning off lights when a room is empty\n\nc) A system for automatically adjusting the temperature of a building based on occupancy\n\nd) All of the above\n\nd) All of the above\n\nQ65. What is the unit of energy?\n\na) Joule\n\nb) Watt\n\nc) Newton\n\nd) Meter\n\na) Joule\n\nQ66. Which form of energy is produced by the sun?\n\na) Kinetic energy\n\nb) Thermal energy\n\nc) Potential energy\n\nd) Nuclear energy\n\nb) Thermal energy\n\nQ67. What is the law of conservation of energy?\n\na) Energy cannot be created nor destroyed\n\nb) Energy can only be created, not destroyed\n\nc) Energy can only be destroyed, not created\n\nd) Energy can be created and destroyed\n\na) Energy cannot be created nor destroyed\n\nQ68. Which type of energy is produced by burning fossil fuels?\n\na) Solar energy\n\nb) Wind energy\n\nc) Geothermal energy\n\nd) Chemical energy\n\nd) Chemical energy\n\nQ69. Which type of energy is produced by moving electrons?\n\na) Nuclear energy\n\nb) Electrical energy\n\nc) Thermal energy\n\nd) Mechanical energy\n\nb) Electrical energy\n\nQ70. What is the process of converting light energy into chemical energy called?\n\na) Photosynthesis\n\nb) Cellular respiration\n\nc) Fermentation\n\nd) Combustion\n\na) Photosynthesis\n\nQ71. Which type of energy is produced by the movement of molecules?\n\na) Kinetic energy\n\nb) Potential energy\n\nc) Mechanical energy\n\nd) Nuclear energy\n\na) Kinetic energy\n\nQ72. What is the energy of motion called?\n\na) Kinetic energy\n\nb) Potential energy\n\nc) Mechanical energy\n\nd) Nuclear energy\n\na) Kinetic energy\n\nQ73. Which type of energy is stored in an object due to its position or configuration?\n\na) Kinetic energy\n\nb) Potential energy\n\nc) Mechanical energy\n\nd) Nuclear energy\n\nb) Potential energy\n\nQ74. Which type of energy is produced by the splitting of atoms?\n\na) Nuclear energy\n\nb) Thermal energy\n\nc) Electrical energy\n\nd) Mechanical energy\n\na) Nuclear energy\n\nQ75. What is the primary source of geothermal energy?\n\na) The sun\n\nb) The Earth’s core\n\nc) Fossil fuels\n\nd) Water\n\nb) The Earth’s core\n\nQ76. Which type of energy is stored in the bonds between atoms and molecules?\n\na) Kinetic energy\n\nb) Thermal energy\n\nc) Chemical energy\n\nd) Nuclear energy\n\nc) Chemical energy\n\n### What is work in physics?\n\nAnswer: In physics, work is defined as the transfer of energy that occurs when a force is applied to an object, causing it to move in the direction of the force. Work is directly proportional to the force applied and the displacement of the object in the direction of the force. The formula for calculating work is W = F * d * cosθ, where W represents work, F is the applied force, d is the displacement, and θ is the angle between the force and displacement vectors.\n\n### Is work done only when an object moves?\n\nAnswer: No, work can be done even when an object does not move. Work is defined as the transfer of energy, and it depends on the force applied and the displacement in the direction of the force. If a force is applied to an object, but the object does not move, or if the force and displacement are perpendicular to each other, then no work is done. However, if the force and displacement are in the same direction, work is still done, regardless of whether the object moves or not.\n\n### What is energy?\n\nAnswer: Energy is a fundamental concept in physics that describes the ability of a system to do work or cause a change. It is a scalar quantity and is measured in joules (J). Energy exists in various forms, such as kinetic energy (energy of motion), potential energy (stored energy), thermal energy (heat), chemical energy, electrical energy, and many others. According to the law of conservation of energy, energy cannot be created or destroyed, but it can be converted from one form to another.\n\n### What is the difference between kinetic energy and potential energy?\n\nAnswer: Kinetic energy and potential energy are two common forms of energy.\n\nKinetic energy is the energy possessed by an object due to its motion. It depends on the mass of the object and its velocity. The formula for kinetic energy is KE = 0.5 * m * v^2, where KE represents kinetic energy, m is the mass of the object, and v is its velocity.\nPotential energy is the energy stored in an object due to its position or condition. There are different types of potential energy, such as gravitational potential energy, elastic potential energy, and chemical potential energy. The formula for gravitational potential energy is PE = m * g * h, where PE represents potential energy, m is the mass, g is the acceleration due to gravity, and h is the height or vertical position of the object.\n\n### What is power?\n\nAnswer: Power is the rate at which work is done or energy is transferred or transformed. It measures how quickly or efficiently energy is utilized or transformed. Power is a scalar quantity and is measured in watts (W). It can be calculated using the formula P = W/t, where P represents power, W is the amount of work done or energy transferred, and t is the time taken.\n\n### What is the difference between power and energy?\n\nAnswer: Power and energy are related concepts but have distinct meanings:\nEnergy refers to the total amount of work done or the total amount of energy transferred or transformed. It is a scalar quantity and is measured in joules (J).\n\nPower, on the other hand, represents the rate at which work is done or energy is transferred or transformed. It measures how quickly or efficiently energy is utilized. Power is the amount of energy per unit time and is measured in watts (W). In other words, power tells us how much energy is used or transformed per unit of time." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8831917,"math_prob":0.97097135,"size":17755,"snap":"2023-40-2023-50","text_gpt3_token_len":4398,"char_repetition_ratio":0.1913695,"word_repetition_ratio":0.17329633,"special_character_ratio":0.24252324,"punctuation_ratio":0.07938758,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9986627,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-07T13:55:09Z\",\"WARC-Record-ID\":\"<urn:uuid:1efd2e74-ab4a-487c-b47e-4331903b9a91>\",\"Content-Length\":\"181839\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7c559f8f-8eee-4eb9-8d18-c1e31fa294a5>\",\"WARC-Concurrent-To\":\"<urn:uuid:1ad6af52-1fba-4937-a536-7623fdc24cf6>\",\"WARC-IP-Address\":\"101.53.148.7\",\"WARC-Target-URI\":\"https://mcqsadda.online/best-work-energy-and-power-mcqs/\",\"WARC-Payload-Digest\":\"sha1:YQYYJ5B2TTRVVSHIUCFIQUDUU2TOT6PE\",\"WARC-Block-Digest\":\"sha1:56J5L2W7MQTZZQXJHA5I45R5QWJKDU4I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100674.56_warc_CC-MAIN-20231207121942-20231207151942-00037.warc.gz\"}"}
https://stats.stackexchange.com/questions/384204/goodness-of-fit-by-hosmer-lemeshow-test-and-roc-curve-for-logistic-regression-no
[ "# Goodness of fit by Hosmer-Lemeshow test and ROC Curve for Logistic Regression not accompanying results conclusions\n\nI am trying to perform Logistic regression on the sample data set. After its modeling, I tried to check its goodness of fit using the Hosmer Lemeshow test and found the p-value < 0.05, which tells that the model is not a good fit. On, the contrary, when I plotted the ROC Curve for it(another way to check the fitness of model), the curve covered approx 80-90% of the area, which refers the model is suitably fit.\n\nPlease find the used dataset named \"Urine Analysis Data\" in the link: mytestdata\n\nIn the Model 1: I cleaned the dataset to remove rows containing NA values, then modeled the dataset and implemented hoslem.test and to draw ROC Curve.\n\nIn the Model 2: I tried further cleaning of dataset by removing the independent variables that are not of much significance, then modeled the dataset and implemented hoslem.test and to draw ROC Curve. But, the result dint changed.\n\nHere is the code:\n\nUrinedata <- read.csv(\"UrineForLogisticRegression.csv\", stringsAsFactors = F)\nsummary(Urinedata)\ncolSums(is.na(Urinedata))\nUrinedata$Calcium.Oxalate <- as.factor(Urinedata$Calcium.Oxalate)\nstr(Urinedata)\n\n##### Model 1 #####\n#Training by Model 1:\nCleaned_data <- Urinedata[complete.cases(Urinedata),]\ncolSums(is.na(Cleaned_data))\ncolnames(Cleaned_data)\n\nmodel1 <- glm(Calcium.Oxalate~gravity+ph+osmo+cond+urea+calc, data = Cleaned_data ,family = binomial)\nsummary(model1)\n\n#Testing goodness of fit of model using Hoslem Test:\ninstall.packages(\"ResourceSelection\")\nlibrary(ResourceSelection)\nhoslem.test(Cleaned_data$Calcium.Oxalate, fitted(model1), g=10) #Conclusion: The p-value is ,much less than 0.05, hence, model not a good fit. # Predicting same dataset values using Model1 now: install.packages(\"ROCR\") library(ROCR) predictedCalciumOxalate <- predict(model1, Cleaned_data, type = \"response\") test_output <- cbind(testdata,predictedCalciumOxalate) #Plotting ROC graph for data, if area more, then good fit: length(fitted(model2))==length(more_clean_data$Calcium.Oxalate)\npreds <- prediction(as.numeric(predictedCalciumOxalate), as.numeric(Cleaned_data$Calcium.Oxalate)) perf <- performance(preds,\"tpr\",\"fpr\") plot(perf) #####I also tried Model 2##### #Model 2 is determined by doing more cleansing on data more_clean_data <- Cleaned_data[,c(1,6,7)] colSums(is.na(more_clean_data)) colnames(more_clean_data) model2 <- glm(Calcium.Oxalate~urea*calc, data = more_clean_data, family = \"binomial\") summary(model2) hoslem.test(more_clean_data$Calcium.Oxalate, fitted(model2))\n#Hoslem test giving same result as model1 , thus dint proceeded with Model2 further.\n\n\nI am expecting that if Hosmer lemeshow test is telling the model is not a good fit, then ROC curve should also have reflected the same. I am new to R. Please correct if am wrong somewhere in the above statement conceptually.\n\n## migrated from stackoverflow.comDec 22 '18 at 16:15\n\nThis question came from our site for professional and enthusiast programmers.\n\n• Hosmer–Lemeshow test provides information about calibration while ROC curve is more about discrimination. Additionally, cut-off values depend on the context of the study. i.e. an AUC of 80-90% is not necessarily an indicator of good fit. The Cross-Validated community would better address and explain this question. – Ozan147 Dec 22 '18 at 5:36\n• – kjetil b halvorsen Dec 22 '18 at 22:21" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.67320716,"math_prob":0.92261714,"size":2778,"snap":"2019-35-2019-39","text_gpt3_token_len":750,"char_repetition_ratio":0.13554434,"word_repetition_ratio":0.057971016,"special_character_ratio":0.23362131,"punctuation_ratio":0.15959597,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9709773,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-26T09:37:40Z\",\"WARC-Record-ID\":\"<urn:uuid:2a966728-20b2-4cdf-81b7-767d7addb23f>\",\"Content-Length\":\"131847\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5b5b4aac-354f-4d63-861a-5f52ae4400a2>\",\"WARC-Concurrent-To\":\"<urn:uuid:fe521a0d-63e2-42d1-830b-51ae9075ab3b>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://stats.stackexchange.com/questions/384204/goodness-of-fit-by-hosmer-lemeshow-test-and-roc-curve-for-logistic-regression-no\",\"WARC-Payload-Digest\":\"sha1:4Y5N6VFLJR3RFALIAZLLN5X2WM3FPYUD\",\"WARC-Block-Digest\":\"sha1:T6MCRWNOVSHWV7DLSYQBRN7GXURGHDFU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027331485.43_warc_CC-MAIN-20190826085356-20190826111356-00371.warc.gz\"}"}
https://dropdoc.ru/doc/1209250/jp2002078069
[ "### JP2002078069\n\n```Patent Translate\nNotice\nThis translation is machine-generated. It cannot be guaranteed that it is intelligible, accurate,\ncomplete, reliable or fit for specific purposes. Critical decisions, such as commercially relevant or\nfinancial decisions, should not be based on machine-translation output.\nDESCRIPTION JP2002078069\n\nBACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to\ncharacteristics inherent to a speaker by correcting the sound pressure from the speaker observed\nat one listening point in an arbitrary sound field and the phase / frequency characteristics to\ndesired characteristics. The present invention relates to an acoustic characteristic correction\ndevice that prevents the deterioration of sound quality due to the characteristic inherent to the\nsound field and enables high-quality reproduction of sound signals such as voice and musical\nsound at the listening point.\n\n2. Description of the Related Art A prior art (Japanese Patent Application No. 10-059703) will be\ndescribed with reference to FIG. The initial value of the transfer function C (z) of the convolver 1\nis zero. The input signal s (ω) (ω: discrete frequency) is processed by the delay unit 11 and the\nconvolver 1 connected in parallel to this, and is sent to the speaker 2 and the reference signal\ngeneration filter 4 as the signal x (ω). It is input. The output signal y (ω) of the microphone 3 is\ninput to a second delay unit 12 having the same delay time as the first delay unit 11 and an\nadaptive filter 6 connected in parallel thereto. The adaptive filter 6 also receives the noise u (ω)\n(¦ u (ω) ¦ 2 << ¦ y (ω) ¦ 2) supplied from the noise generator 9. The adaptive filter 6 generates a\nreplica c (ω) of the output signal d (ω) of the reference signal generation filter 4 from the output\nr (ω) of the second delay unit 12.\n08-05-2019\n1\n\nThe transfer functions of the delay units 11 and 12 are zm (m: discrete time), the transfer\nfunction between the speaker 2 and the microphone 3 is z-tG (z), and the transfer function of the\nreference signal generation filter 4 is Assuming that z− (m + t) R (z), the transfer function H (z)\nof the adaptive filter 6 can be expressed as error power ωω ¦ e (ω) ¦ 2 = Σω ¦ d (ω) −c (ω)\nIt converges to the next value by the algorithm which makes \"minimization of ¦ 2\" as the teaching\nprinciple. H (z) ≒ -z-m + z- (m + t) R (z) / z-tG (z) =-z-m + z-mR (z) / G (z) (1) this transfer function\nH ( By setting z) to the convolver 1, the output signal y (ω) of the microphone 3 is controlled as\nfollows.\n\nY (ω) = f [z-tG (z)] x (ω) = f [z-tG (z)] f [Z-m + C (z)] s (ω) = f [z-tG (Z) {z-m + H (z)}] s (ω) = f [z-(t +\nm) R (z)] s (ω) (2) where f [·]: discrete Fourier transform The output signal y (ω) is a signal\nobtained by correcting the input signal s (ω) to the desired amplitude and phase / frequency\ncharacteristics given to the reference signal generation filter 4.\n\nIn order to simplify and clarify the explanation, only the input signal s (ω0) corresponding to the\nfrequency ω0 is considered, and this input signal changes as follows with time k Assume that\nk ≦ k1: s (ω0) ≠ 0k1 <k ≦ k2: s (ω0) = 0 k2 <k: s (ω0) ≠ 0 (a) k ≦ k1 As described above, the\nadaptive filter 6 corresponding to the frequency ω0 The transfer function H (.omega.0) (= C\n(.omega.0), C (.omega.0): transfer function of the convolver 1 corresponding to the frequency\n.omega.0) converges to the optimal value shown in equation (1). Let this value be HOPT ≠ 0. (B)\nWhen k1 <k ≦ k2, the output signal d (ω0) of the reference signal generation filter 4, the output\nsignal y (ω0) of the microphone 3, and the output signal r (ω0) of the second delay unit 12 are\nall zero. Become. To minimize ¦ e (ω0) ¦ 2 = ¦ d (ω0) −C (ω0) ¦ 2, that is, ¦ e (ω0) ¦ 2 = ¦ 0− (0\n+ u (ω0) H (ω0)) ¦ 2. Since the convolution noise u (ω0) is nonzero, the transfer function H\n(ω0) of the adaptive filter 6 converges to zero. (C) When k2 <k, the transfer function H (ω0) of\nthe adaptive filter 6 converges again to the optimum value HOPT as in the case of (a).\n\n08-05-2019\n2\nThat is, in the prior art, when the input signal s (ω0) fluctuates and becomes zero repeatedly, the\ntransfer function H (ω0) of the adaptive filter 6 which corrects the input signal s (ω0) to a\ndesired characteristic according to the fluctuation. ) (= C (ω0)) swings between the optimum\nvalue HOPT and zero, and s (ω0) can not be continuously corrected to the desired characteristic.\nAn object of the present invention is to provide an acoustic characteristic correction device\ncapable of continuously correcting s (ω0) to a desired amplitude and phase / frequency\ncharacteristics regardless of the fluctuation of s (ω0) as described above. is there.\n\nSUMMARY OF THE INVENTION In order to achieve the above object, according to the present\ninvention as set forth in claim 1, a second convolver having the same transfer function as\nconvolver 1 is obtained by removing the conventional second delay 12. , And only the output side\nis connected in parallel with the adaptive filter 6, and an antiphase signal of the pseudo noise\ngenerated by the noise generating unit 7 is input to the second convolver. Further, the noise\ngeneration unit 7 analyzes the reference signal d (ω), identifies a frequency ω0 (ω0 is not\nlimited to one) at which this signal becomes zero, and generates pseudo noise u (ω0) of this\nfrequency. . For this frequency ω0 where the input signal becomes zero and hence the reference\nsignal becomes zero, the error power ¦ e (ω0) ¦ 2 = ¦ H (ω0) u (ω0) −C (ω0) u (ω0) The\ntransfer function H (ω0) of the adaptive filter 6 is constrained to the optimum value C (ω0)\nwhich has already been set in the second convolver, by an algorithm based on the principle of\nminimization of ¦ 2 . Also, the conventional first delay unit 11 becomes unnecessary.\n\nBEST MODE FOR CARRYING OUT THE INVENTION FIG. 1 shows an embodiment of an acoustic\ncharacteristic correction device proposed in claim 1 of the present invention. The parts\ncorresponding to those in FIG. 2 are given the same reference numerals. The input signal s (ω) is\nsupplied to the speaker 2 and the reference signal generation filter 4 only through the convolver\n1. Further, a convolver 5 having the same transfer function as the convolver 1 is provided, and\nthe output of the convolver 5 is added to the output of the adaptive filter 6 to be a replica c (ω).\nThe pseudo noise u (ω) from the noise generator 7 is input to the convolver 5 through the phase\ninverter 10. In the noise generation unit 7, the noise n (ω) from the pseudo noise generator 9 is\ngiven a weight α (ω) by the multiplier 8, and pseudo noise u (ω) = α (ω) · n (ω) It is output.\n08-05-2019\n3\n\nThe initial value of the transfer function C (z) of the convolvers 1 and 5 is the m sample delay zm. The input signal s (ω) is processed by the convolver 1 and is input to the speaker 2 and the\nreference signal generation filter 4 as a signal x (ω). A desired characteristic z− (t + m) R (z)\ndelayed by t + m samples is set as the transfer characteristic of the reference signal generation\nfilter 4. This delay is to stably converge the transfer function H (z) of the adaptive filter 6. The\noutput signal y (ω) of the microphone 3 is added to the pseudo noise u (ω) generated by the\nnoise generator 7 and input to the adaptive filter 6. The pseudo noise u (ω) becomes an\nantiphase signal in the phase inverter 10 and is input to the second convolver 5. The noise\ngeneration unit 7 analyzes the output d (ω) of the reference signal generation filter 4 by the\nfrequency weight calculation unit 13, calculates an appropriate frequency weight α (ω)\naccording to the result, and generates the pseudo noise generator 9. The noise n (ω) is\nmultiplied by the frequency weight α (ω) by the multiplier 8 to obtain the next pseudo noise u\n(ω) = α (ω) n (ω). The noise n (ω) is assumed to have approximately constant intensity over all\nfrequencies. The frequency weight α (ω) is given, for example, as follows.\n\nWhen .vertline.d (.omega.0) .vertline.2 / .SIGMA..omega..vertline.d (.omega.).\nVertline.2.ltoreq..beta., .Alpha. (. Omega.0) = 1 (3a) .vertline.d (.omega.0) .vertline.2 /\n.sigma..omega..vertline.d (.omega.). Vertline.2 When β>, 0 <α (ω0) << 1 (3b) where ¦ n (ω) ¦ 2\n≒ ¦ y (ω) ¦ 2 (ω ≠ ω0) β: positive constant (eg, 10− 4) The transfer function H (z) of the\nadaptive filter 6 is derived from an algorithm based on the teaching principle of error power\nωω ¦ e (ω) ¦ 2 = Σω ¦ d (ω) −c (ω) ¦ 2 minimization . Desired. When this algorithm\nconverges, the transfer functions C (z) of convolvers 1 and 5 are replaced by H (z). Hereinafter,\nthe input signal is changed in the same manner as described in the section \"Problems to be\nsolved by the invention\", that is, the input signal s (ω0) corresponding to the frequency ω0 is\nconsidered, and the problems of the prior art are solved. Make sure. The input signal s (ω0)\nchanges as follows with time k.\n\nK ≦ k1: s (ω0) ≠ 0k1 <k ≦ k2: s (ω0) = 0 k2 <k: s (ω0) ≠ 0 (a) k ≦ k1 In a state where the\nequation (3b) is satisfied Transfer function H (ω0) (= C (ω0), C (ω0): convolver 1 and adaptive\nfilter 6 corresponding to frequency ω0, such that ¦ u (ω0) ¦ 2 << ¦ y (ω0) ¦ 2. The transfer\n08-05-2019\n4\nfunction of 5 converges to the optimum value f [Z−mR (z) / G (z)] (ω = ω0). Let this value be\nHOPT ≠ 0. (B) When k1 <k ≦ k2, the output signal d (ω0) of the reference signal generation\nfilter 4 and the output signal y (ω0) of the microphone 3 become zero. In addition, pseudo noise\nu (ω 0) of sufficient size is generated in the noise generating unit 7 in a state satisfying equation\n(3a), as described in the section Means for Solving the Problems . The transfer function H\n(ω0) is constrained to C (ω0) = HOPT by minimization of ω0) ¦ 2 = ¦ H (ω0) u (ω0) −C (ω0) u\n(ω0) ¦ 2. (C) When k2 <k, equation (3b) is satisfied, and the transfer function H (ω0) converges\nto HOPT ≠ 0 as in (a) k ≦ k1, but H (() Since ω0) = C (ω0) is already HOPT, H (ω0) remains at\nthe optimum value HOPT as long as the transfer function z-tG (z) between the speaker 2 and the\nmicrophone 3 does not change.\n\nThat is, according to the present invention, s (ω0) can be continuously corrected to the desired\namplitude and phase / frequency characteristics regardless of the variation of s (ω0) as\ndescribed above.\n\nAs described above, according to the present invention, the first convolver having an\nappropriate transfer function is used to generate the speaker input signal, and the same transfer\nfunction as the first convolver is used. Repeating a series of processing setting the transfer\nfunction to the convolver by obtaining a transfer function for correcting the sound signal\ncharacteristic to be reproduced to the speaker to a desired characteristic by an adaptive filter\nwhose output side is connected in parallel to the convolver Therefore, even in the case of\nreproducing a signal in which a supplied frequency component fluctuates with time, such as\nvoice or musical sound, the characteristics (sound pressure, phase, and frequency) of the speaker\nreproduction sound observed at one listening point in the sound field The characteristic) can\ncontinue to be corrected to the desired characteristic.\n\nBrief description of the drawings\n\n1 is a block diagram showing the configuration of the acoustic characteristic correction device\naccording to an embodiment of the present invention.\n\n08-05-2019\n5\n2 is a block diagram for explaining the prior art.\n08-05-2019\n6\n```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87750703,"math_prob":0.9812926,"size":11639,"snap":"2021-21-2021-25","text_gpt3_token_len":3169,"char_repetition_ratio":0.17722389,"word_repetition_ratio":0.18066636,"special_character_ratio":0.27914768,"punctuation_ratio":0.08827405,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99394906,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-13T14:42:44Z\",\"WARC-Record-ID\":\"<urn:uuid:9448ced3-3b77-4d5e-b1f8-559a5be70524>\",\"Content-Length\":\"35228\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ae53638c-601c-4141-afce-0880e4c3e330>\",\"WARC-Concurrent-To\":\"<urn:uuid:dda41b90-4fc8-4fe0-a277-8928655da173>\",\"WARC-IP-Address\":\"104.21.1.10\",\"WARC-Target-URI\":\"https://dropdoc.ru/doc/1209250/jp2002078069\",\"WARC-Payload-Digest\":\"sha1:MH4KXIIREQOAW6SJJX6IYF7XVTQBYZBP\",\"WARC-Block-Digest\":\"sha1:NMSEY6JEYDC5FCRBIYG7UO76UYYSDFJO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989814.35_warc_CC-MAIN-20210513142421-20210513172421-00162.warc.gz\"}"}
https://www.nagwa.com/en/videos/324108128018/
[ "# Lesson Video: Arithmetic Series Mathematics\n\nIn this video, we will learn how to calculate the sum of the terms in an arithmetic sequence with a definite number of terms.\n\n16:09\n\n### Video Transcript\n\nIn this video, we will learn how to calculate the sum of the terms in an arithmetic sequence with a definite number of terms. We will begin by recalling what we mean by an arithmetic sequence and arithmetic series.\n\nThe list of numbers written in a definite order is called a sequence. In an arithmetic sequence, the difference between one term and the next is a constant. This is known as the common difference and is denoted by the letter 𝑑. The first term of an arithmetic sequence 𝑎 sub one is usually just written as 𝑎. The second term 𝑎 sub two will therefore be equal to 𝑎 plus 𝑑. To get to the third term, we will need to add 𝑑 again, so 𝑎 sub three is equal to 𝑎 plus 𝑑 plus 𝑑. This can be simplified to 𝑎 plus two 𝑑. This pattern continues so that the fourth term is 𝑎 plus three 𝑑, the fifth term 𝑎 plus four 𝑑, and so on.\n\nWe notice that the second term has one 𝑑. The third term has two 𝑑’s. The fourth term would have three 𝑑’s and so on. This means that the 𝑛th term would have 𝑛 minus one 𝑑’s. This leads us to the formula for the general term of an arithmetic sequence 𝑎 sub 𝑛 is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑. When dealing with a finite sequence, as in this video, we can denote the last term as 𝑙. The sum of terms of an arithmetic sequence is called an arithmetic series. This means that an arithmetic series would be written in the form 𝑎 plus 𝑎 plus 𝑑 plus 𝑎 plus two 𝑑 and so on all the way up to 𝑎 plus 𝑛 minus one multiplied by 𝑑.\n\nWe will now use this information to prove two formulae to calculate the sum of the first 𝑛 terms of an arithmetic sequence.\n\nFind an expression for the sum of an arithmetic sequence whose first term is 𝑎 and whose common difference is 𝑑.\n\nWe are told in the question that the first term of our arithmetic sequence is 𝑎 and the common difference is 𝑑. We are trying to find an expression for the sum of the first 𝑛 terms which we will write as 𝑆 sub 𝑛. This will be equal to the first term 𝑎 plus the second term 𝑎 plus 𝑑 and so on. We know that the 𝑛th term of any arithmetic sequence is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑. This means that the penultimate term is equal to 𝑎 plus 𝑛 minus two multiplied by 𝑑. We will call this equation one.\n\nWe will then reverse the order of this sum, which we can do as addition is commutative. This gives us 𝑆 sub 𝑛 is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑 plus 𝑎 plus 𝑛 minus two multiplied by 𝑑 and so on and finally plus 𝑎 plus 𝑑 plus 𝑎. We will call this equation two. Adding equation one and equation two gives us two multiplied by 𝑆 sub 𝑛 on the left-hand side. On the right-hand side, we will add each pair of terms. Adding the first pair, we see that 𝑎 plus 𝑎 is equal to two 𝑎. So we have two 𝑎 plus 𝑛 minus one multiplied by 𝑑.\n\nThe second pair of terms have the same sum as 𝑎 plus 𝑎 is equal to two 𝑎 and 𝑑 plus 𝑛 minus two 𝑑 is equal to 𝑛 minus one 𝑑. In fact, this will be true for each of the pairs in our equations. Each pair of terms will sum to give us two 𝑎 plus 𝑛 minus one multiplied by 𝑑. We have 𝑛 of these terms, so we can rewrite the right-hand side as 𝑛 multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑. Dividing both sides of our equation by two gives us 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑. This is an expression for the sum of an arithmetic sequence whose first term is 𝑎 and whose common difference is 𝑑.\n\nWe will now look at an alternative formula for the sum of an arithmetic sequence.\n\nWrite an expression for the sum of the first 𝑛 terms of an arithmetic sequence with first term 𝑎 and last term 𝑙.\n\nWe know that the sum of the first 𝑛 terms of an arithmetic sequence can be calculated using the formula 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑, where 𝑛 is the number of terms, 𝑎 is the first term, and 𝑑 is the common difference. We also know that the 𝑛th term 𝑎 sub 𝑛 is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑. We are told in this question that 𝑙 is the last term. Therefore, 𝑙 is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑. Since 𝑎 plus 𝑎 is equal to two 𝑎, we can rewrite our formula for 𝑆 sub 𝑛 as 𝑛 over two multiplied by 𝑎 plus 𝑎 plus 𝑛 minus one multiplied by 𝑑.\n\nWe know that the second part inside the brackets 𝑎 plus 𝑛 minus one multiplied by 𝑑 is equal to 𝑙. The sum of the first 𝑛 terms of an arithmetic sequence with first term 𝑎 and last term 𝑙 is therefore equal to 𝑛 over two multiplied by 𝑎 plus 𝑙.\n\nWe will now briefly summarize the formulae we will use for the remainder of this video. The 𝑛th term 𝑎 sub 𝑛 is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑. The sum of the first 𝑛 terms written 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑. As we’re dealing with finite sequences, there will be a last term 𝑙. This will be equal to 𝑎 sub 𝑛. Therefore, 𝑆 sub 𝑛 is also equal to 𝑛 over two multiplied by 𝑎 plus 𝑙. We will now use these formulae to solve problems involving finite arithmetic sequences.\n\nFind the sum of the first 10 terms of the arithmetic sequence whose first term is five and common difference is eight.\n\nWe are told that the first term, denoted by the letter 𝑎, is equal to five. The common difference 𝑑 of our arithmetic sequence is equal to eight. As we need to calculate the sum of the first 10 terms, 𝑛 is equal to 10. We know that the sum of the first 𝑛 terms of an arithmetic sequence, denoted 𝑆 sub 𝑛, is equal to 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑. Substituting in our values of 𝑎, 𝑑, and 𝑛, we can calculate 𝑆 sub 10. This is equal to 10 divided by two multiplied by two multiplied by five plus 10 minus one multiplied by eight. Two multiplied by five is equal to 10, and 10 minus one multiplied by eight is equal to 72. Multiplying 82 by five gives us 410.\n\nThe sum of the first 10 terms of the arithmetic sequence whose first term is five and common difference is eight is 410.\n\nWe will now look at a similar question where our terms are negative.\n\nFind the sum of the terms of the 11-term arithmetic sequence whose first term is negative 92 and last term is negative 102.\n\nThe first term 𝑎 of our arithmetic sequence is equal to negative 92, and the last term 𝑙 is equal to negative 102. We are also told there are 11 terms in the sequence. Therefore, 𝑛 is equal to 11. We could use this information to calculate the common difference 𝑑. However, in this question, it is not required. We can calculate the sum of the first 𝑛 terms using the formula 𝑛 over two multiplied by 𝑎 plus 𝑙. Substituting in our values, we see that 𝑆 sub 11 is equal to 11 over two multiplied by negative 92 plus negative 102. 11 divided by two is equal to 5.5, and negative 92 plus negative 102 is equal to negative 194. Multiplying these two values gives us negative 1067.\n\nThe sum of the 11 terms in the arithmetic sequence whose first term is negative 92 and last term is negative 102 is negative 1067.\n\nIn our next question, we need to find the sum of the first 10 terms of an arithmetic sequence given the 𝑛th term.\n\nFind the sum of the first 10 terms of the sequence 𝑎 sub 𝑛, where 𝑎 sub 𝑛 is equal to two 𝑛 plus four.\n\nThere are a few ways of approaching this problem. One way would be to calculate the first and last terms of the sequence. As there are 10 terms, these are denoted by 𝑎 sub one and 𝑎 sub 10. The first term will be equal to two multiplied by one plus four. This is equal to six. The tenth term 𝑎 sub 10 is equal to two multiplied by 10 plus four. This is equal to 24. We can now use the formula 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by 𝑎 plus 𝑙, where 𝑎 is equal to six, the first term, and 𝑙 is equal to 24, the 10th or last term. 𝑆 sub 10 is equal to 10 over two multiplied by six plus 24. This simplifies to five multiplied by 30, giving us an answer for the sum of the first 10 terms of the sequence of 150.\n\nAn alternative method would be to have recognized our sequence is linear. Therefore, the common difference 𝑑 is equal to two, the coefficient of 𝑛. If 𝑎 sub 𝑛 is equal to two 𝑛 plus four, our sequence is six, eight, 10, and so on. We could then use the formula that 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑. Substituting in our values here gives us 𝑆 sub 10 is equal to 10 over two multiplied by two multiplied by six plus 10 minus one multiplied by two. This simplifies to five multiplied by 12 plus 18, which once again is equal to five multiplied by 30, which gives us an answer of 150.\n\nWe will now look at one final question.\n\nFind, in terms of 𝑛, the sum of the arithmetic sequence nine, 10, 11, and so on up to 𝑛 plus eight.\n\nThere are two formulas that we can use to calculate the sum of an arithmetic sequence. Firstly, 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by 𝑎 plus 𝑙, where 𝑎 is the first term and 𝑙 is the last term of the sequence. Secondly, 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑. Once again, 𝑎 is the first term and 𝑑 is the common difference of the sequence. We can see that the first term 𝑎 is equal to nine and the last term 𝑙 is 𝑛 plus eight. 𝑆 sub 𝑛 is therefore equal to 𝑛 over two multiplied by nine plus 𝑛 plus eight. Collecting like terms inside the parentheses gives us 𝑛 over two multiplied by 𝑛 plus 17. This is the expression, in terms of 𝑛, for the sum of the arithmetic sequence.\n\nIf we chose to use the other formula, we can see from the sequence that the common difference is equal to one. Substituting in our values of 𝑎 and 𝑑 gives us 𝑆 sub 𝑛 is equal to 𝑛 over two multiplied by two multiplied by nine plus 𝑛 minus one multiplied by one. The expression inside the brackets simplifies to 18 plus 𝑛 minus one. 18 minus one is equal to 17. Therefore, the expression, once again, is 𝑛 over two multiplied by 𝑛 plus 17. This is the sum of the arithmetic sequence nine, 10, 11, and so on all the way up to 𝑛 plus eight.\n\nWe will now summarize the key points from this video. We saw in this video that an arithmetic sequence has first term 𝑎, last term 𝑙, and common difference 𝑑. The 𝑛th term of an arithmetic sequence 𝑎 sub 𝑛 is equal to 𝑎 plus 𝑛 minus one multiplied by 𝑑. When dealing with a finite arithmetic sequence, this will also be equal to the last term 𝑙. The sum of the terms of an arithmetic sequence is called an arithmetic series. We can calculate this sum denoted 𝑆 sub 𝑛 using one of two formulae, either 𝑛 over two multiplied by two 𝑎 plus 𝑛 minus one multiplied by 𝑑 or 𝑛 over two multiplied by 𝑎 plus 𝑙. The formula that we choose will depend on the information given in a particular question.\n\nNagwa uses cookies to ensure you get the best experience on our website. Learn more about our Privacy Policy." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9419064,"math_prob":0.9985724,"size":10591,"snap":"2021-04-2021-17","text_gpt3_token_len":3176,"char_repetition_ratio":0.23991688,"word_repetition_ratio":0.31235644,"special_character_ratio":0.2385044,"punctuation_ratio":0.08060453,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99998987,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-17T08:16:17Z\",\"WARC-Record-ID\":\"<urn:uuid:2993bbf6-b9e1-42b4-abfa-f56512b31419>\",\"Content-Length\":\"44579\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:299e1bba-2ce8-4395-9b4d-8690af325dde>\",\"WARC-Concurrent-To\":\"<urn:uuid:9a9f4f4e-91fa-42cd-874b-daa17647b7e9>\",\"WARC-IP-Address\":\"50.17.65.202\",\"WARC-Target-URI\":\"https://www.nagwa.com/en/videos/324108128018/\",\"WARC-Payload-Digest\":\"sha1:2ZWKFUVTR5SG7LCV23ZAQSQAQ6OLICLF\",\"WARC-Block-Digest\":\"sha1:QJG23D2F3RZUA7YK7NEZL43N7PSISTFQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038118762.49_warc_CC-MAIN-20210417071833-20210417101833-00373.warc.gz\"}"}
https://stat.ethz.ch/pipermail/r-help/2016-October/442356.html
[ "# [R] bquote in list to be used with do.plot()\n\nDavid Winsemius dwinsemius at comcast.net\nSun Oct 9 05:13:45 CEST 2016\n\n```> On Oct 8, 2016, at 9:50 AM, Marc Girondot via R-help <r-help at r-project.org> wrote:\n>\n> Dear members,\n>\n> Has someone have a solution to include a bquote() statement in a list to be used with do.call() ?\n>\n> Here is an exemple:\n> scaleY <- 10000\n> plot(x=1, y=1, ylab=bquote(.(format(scaleY), scientific=FALSE)^\"-1\"))\n>\n> Like that, it works.\n>\n> Now he same in a list:\n> L <- list(x=1, y=1, ylab=bquote(.(format(scaleY), scientific=FALSE)^\"-1\"))\n> do.call(plot, L)\n> Error in \"10000\"^\"-1\" : argument non numérique pour un opérateur binaire\n>\n> It produces an error.\n>\n> Any solution?\n>\n> (I tries also with substitute() and expression() but I fail also)\n\nTry this:\n\nL <- list(x=1, y=1, ylab=as.expression(bquote(.(format(scaleY), scientific=FALSE)^\"-1\")))\ndo.call(plot, L)\n\n`bquote` actually doesn't return an object with mode expression but rather of mode call, so sometimes as.expression is needed to coerce the result. The `expression` function isn't really designed to do that.\n\n>\n> Thanks\n>\n> Marc\n>\n> ______________________________________________\n> R-help at r-project.org mailing list -- To UNSUBSCRIBE and more, see\n> https://stat.ethz.ch/mailman/listinfo/r-help" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6541714,"math_prob":0.6301158,"size":1516,"snap":"2020-10-2020-16","text_gpt3_token_len":437,"char_repetition_ratio":0.11970899,"word_repetition_ratio":0.008928572,"special_character_ratio":0.33575198,"punctuation_ratio":0.18506494,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9736856,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-28T03:07:00Z\",\"WARC-Record-ID\":\"<urn:uuid:c54d9dc1-ec69-46c8-b93b-6442054e53c5>\",\"Content-Length\":\"4888\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8d615a51-940c-4d0c-9572-8b0766b1f101>\",\"WARC-Concurrent-To\":\"<urn:uuid:9c029d5e-e36d-4a19-956f-d73e9ecffead>\",\"WARC-IP-Address\":\"129.132.119.195\",\"WARC-Target-URI\":\"https://stat.ethz.ch/pipermail/r-help/2016-October/442356.html\",\"WARC-Payload-Digest\":\"sha1:PHVVQEECTLHUQ7DYVTMX4BHKYFFGOMED\",\"WARC-Block-Digest\":\"sha1:YOGYIAEJHHJ4CT3XMDYJZOTXKPODMQ7C\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146940.95_warc_CC-MAIN-20200228012313-20200228042313-00022.warc.gz\"}"}
https://math.stackexchange.com/questions/3305549/root-test-and-lim-sup
[ "# Root test and $\\lim\\sup$\n\nI see how to define $$\\lim \\sup x_n$$ for a sequence $$(x_n)$$ in $$\\mathbb{R}$$ which is bounded above: as a limit of a decreasing sequence $$(\\sup_{k \\geq n} x_k)$$ of real numbers. Since the extended real line $$\\overline{\\mathbb{R}}$$ is not even a metric space, the only way I see to define $$\\lim\\sup x_n$$ for sequences $$(x_n)$$ which are not bounded above is as $$\\sup E$$ where $$E$$ is the set of all cluster points of $$(x_n)$$ or, equivalently, the set of limits of all convergent subsequences of $$(x_n)$$, but this seems to be useless in way that it is hard to compute: even if we prove that if concides with $$\\lim_{n\\to\\infty} \\sup_{k\\geq n} x_k$$ in case when $$(x_n)$$ is bounded above, we wouldn't have the computational machinery of the theory of limits in case where it is not bounded, so it wouldn't be useful in applications such as the root test.\n\nThe root test is supposed to claim that\n\nFor a series $$\\sum x_k$$ in a Banach space $$(E,||\\cdot||)$$, setting $$\\alpha = \\lim\\sup\\sqrt[k]{||x_k||}$$, $$\\alpha < 1$$ implies that $$\\sum x_k$$ converges absolutely, while $$\\alpha > 1$$ implies that $$\\sum x_k$$ diverges.\n\nTo define $$\\lim\\sup\\sqrt[k]{||x_k||}$$ rigorously and to be able to use the computational machinery of the theory of limits, can we restrict the criterion to series $$\\sum x_k$$ such that the sequence $$(||x_k||)$$ is bounded above? After all, it being not bounded means that it diverges, hence, in particular, it doesn't converge to $$0$$, hence $$\\sum x_k$$ diverges a priori.\n\nHowever, I have doubts that setting such constraints as $$(||x_k||)$$ being bounded above reduces the usefullness of a root test. Is there another way, or should it be fine?\n\nThe superior limit of a sequence $$(x_n)_{n\\in\\mathbb N}$$ which is not bounded above can simply be defined as $$\\infty$$. It will still be the supremum (in $$\\overline{\\mathbb R}$$) of all cluster points.\nAnd it is not hard to to turn $$\\overline{\\mathbb R}$$ into a metric space. You consider the bijection$$\\begin{array}{rccc}f\\colon&\\overline{\\mathbb R}&\\longrightarrow&[-1,1]\\\\&x&\\mapsto&\\begin{cases}\\frac x{1+\\lvert x\\rvert}&\\text{ if }x\\in(-1,1)\\\\\\pm1&\\text{ if }x=\\pm\\infty\\end{cases}\\end{array}$$and you define the distance $$d$$ in $$\\overline{\\mathbb R}$$ by $$d(x,y)=\\bigl\\lvert f(x)-f(y)\\bigr\\rvert$$.\nFinally, yes, if $$\\bigl(\\lVert x_n\\rVert\\bigr)_{n\\in\\mathbb N}$$ is unbounded, then you can just say that the series $$\\sum_{n=1}^\\infty x_n$$ diverges and that's it." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9043462,"math_prob":0.99999607,"size":1644,"snap":"2020-34-2020-40","text_gpt3_token_len":455,"char_repetition_ratio":0.115243904,"word_repetition_ratio":0.02909091,"special_character_ratio":0.28892943,"punctuation_ratio":0.083850935,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000079,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-26T02:55:19Z\",\"WARC-Record-ID\":\"<urn:uuid:1981edb7-21da-4f31-b8e6-6b5ad5aab065>\",\"Content-Length\":\"147488\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2867f911-37d5-4731-a6f6-46e76184a98c>\",\"WARC-Concurrent-To\":\"<urn:uuid:860f1533-a478-4236-82ce-fbac394d8c48>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/3305549/root-test-and-lim-sup\",\"WARC-Payload-Digest\":\"sha1:Y4SPZSRRQBRFXY553JIMBTMUEKRHEBRS\",\"WARC-Block-Digest\":\"sha1:IZUMLP2Z7PERH2HU57TDCD3LCFWMFLAJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400232211.54_warc_CC-MAIN-20200926004805-20200926034805-00360.warc.gz\"}"}
https://www.packtpub.com/big-data-and-business-intelligence/julia-data-science
[ "Learn Apply statistical models in Julia for data-driven decisions Understanding the process of data munging and data preparation using Julia Explore techniques to visualize data using Julia and D3 based packages Using Julia to create self-learning systems using cutting edge machine learning algorithms Create supervised and unsupervised machine learning systems using Julia. Also, explore ensemble models Build a recommendation engine in Julia Dive into Julia’s deep learning framework and build a system using Mocha.jl Julia is a fast and high performing language that's perfectly suited to data science with a mature package ecosystem and is now feature complete. It is a good tool for a data science practitioner. There was a famous post at Harvard Business Review that Data Scientist is the sexiest job of the 21st century. (https://hbr.org/2012/10/data-scientist-the-sexiest-job-of-the-21st-century). This book will help you get familiarised with Julia's rich ecosystem, which is continuously evolving, allowing you to stay on top of your game. This book contains the essentials of data science and gives a high-level overview of advanced statistics and techniques. You will dive in and will work on generating insights by performing inferential statistics, and will reveal hidden patterns and trends using data mining. This has the practical coverage of statistics and machine learning. You will develop knowledge to build statistical models and machine learning systems in Julia with attractive visualizations. You will then delve into the world of Deep learning in Julia and will understand the framework, Mocha.jl with which you can create artificial neural networks and implement deep learning. This book addresses the challenges of real-world data science problems, including data cleaning, data preparation, inferential statistics, statistical modeling, building high-performance machine learning systems and creating effective visualizations using Julia. An in-depth exploration of Julia's growing ecosystem of packages Work with the most powerful open-source libraries for deep learning, data wrangling, and data visualization Learn about deep learning using Mocha.jl and give speed and high performance to data analysis on large data sets 346 10 hours 22 minutes 9781785289699 29 Sep 2016\n Julia is different Setting up the environment Using REPL Using Jupyter Notebook Package management Parallel computation using Julia Julia's key feature – multiple dispatch Facilitating language interoperability Summary References\n What is data munging? What is a DataFrame? Summary References\n Sampling Inferring column types Basic statistical summaries Scalar statistics Measures of variation Scatter matrix and covariance Computing deviations Rankings Counting functions Histograms Correlation analysis Summary References\n Installation Understanding the sampling distribution Understanding the normal distribution Type hierarchy in Distributions.jl Univariate distributions Truncated distributions Understanding multivariate distributions Understanding matrixvariate distributions Distribution fitting Confidence interval Understanding z-score Understanding the significance of the P-value Summary References\n Difference between using and importall Pyplot for Julia Unicode plots Visualizing using Vega Data visualization using Gadfly Summary References\n What is machine learning? Machine learning – the process Understanding decision trees Supervised learning using Naïve Bayes Summary References\n Understanding clustering K-means clustering Summary References\n What is ensemble learning? Random forests Implementation in Julia Why is ensemble learning superior? Summary References\n What is forecasting? What is TimeSeries? Implementation in Julia Summary References\n What is a recommendation system? Association rule mining Content-based filtering Collaborative filtering Building a movie recommender system Summary" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8917396,"math_prob":0.40312707,"size":1608,"snap":"2020-24-2020-29","text_gpt3_token_len":317,"char_repetition_ratio":0.11658354,"word_repetition_ratio":0.0,"special_character_ratio":0.2033582,"punctuation_ratio":0.08455882,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9601342,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-04T00:27:02Z\",\"WARC-Record-ID\":\"<urn:uuid:cebe7170-b92a-4401-99f0-0945ba5a0e16>\",\"Content-Length\":\"309433\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4aeaa6e8-7bc8-4d96-a7ba-cadcd419d893>\",\"WARC-Concurrent-To\":\"<urn:uuid:d56cd0b3-a6c2-4f85-8a48-773e0c8aa21d>\",\"WARC-IP-Address\":\"104.22.1.175\",\"WARC-Target-URI\":\"https://www.packtpub.com/big-data-and-business-intelligence/julia-data-science\",\"WARC-Payload-Digest\":\"sha1:E23BM2MQSXRP5BNRS5DJMFW462VSJKVQ\",\"WARC-Block-Digest\":\"sha1:7UOZJP46Y7ZEL2D5575VR2D3XTCO7AC2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655883439.15_warc_CC-MAIN-20200703215640-20200704005640-00409.warc.gz\"}"}
https://grasswiki.osgeo.org/w/index.php?title=Convert_points_to_lines&oldid=14618
[ "# Convert points to lines\n\nJump to: navigation, search\n\nQ: Is there a way to construct a vector line(s) map connecting selected points?\n\nA: There are two possibilities:\n\n### Converting points map into lines map\n\nYou can use v.in.lines for that. The input can be generated with v.out.ascii.\n\nSpearfish example:\n\n``` v.out.ascii archsites fs=, where=\"cat=1 or cat= 3\"\n593493,4914730,1\n589860,4922000,3\n\n# so:\nv.out.ascii archsites fs=, where=\"cat=1 or cat= 3\" | cut -d',' -f1,2 | \\\nv.in.lines in=- out=myline fs=,\nv.category in=myline out=line_with_cat option=add\n```\n\n### Converting CSV points file into lines map\n\nSuppose you have a CSV file \"mypoints.csv\" containing three point-pairs to be connected (start point coordinates, end point coordinates):\n\n``` east1,north1,east2,north2\n593493,4914730,589860,4922000\n590400,4922820,593549,4925500\n600375,4925235,606635,4920773\n```\n\nWe can convert these three point pairs into three lines:\n\n``` cat mypoints.csv | grep -v \"north1\" | awk -F',' '{printf \"%f,%f\\n%f,%f\\nNaN,NaN\\n\",\\$1, \\$2 ,\\$3 ,\\$4}' > mypoints_formatted.csv\nv.in.lines in=mypoints_formatted.csv out=mylines fs=,\nv.category in=mylines out=lines_with_cat option=add\n```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.57529885,"math_prob":0.9204954,"size":1115,"snap":"2021-21-2021-25","text_gpt3_token_len":340,"char_repetition_ratio":0.112511255,"word_repetition_ratio":0.04347826,"special_character_ratio":0.35336322,"punctuation_ratio":0.22957198,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96991813,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-16T08:13:13Z\",\"WARC-Record-ID\":\"<urn:uuid:e866485d-e301-45dd-b114-da70b1910735>\",\"Content-Length\":\"17261\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4e9dbc20-4f26-4339-aedf-e40a8d540cb5>\",\"WARC-Concurrent-To\":\"<urn:uuid:9701d104-2b9f-42f2-b056-1ceb90c5a22d>\",\"WARC-IP-Address\":\"140.211.15.3\",\"WARC-Target-URI\":\"https://grasswiki.osgeo.org/w/index.php?title=Convert_points_to_lines&oldid=14618\",\"WARC-Payload-Digest\":\"sha1:J67RCV6IMPUOZCBYWKSMSSHQU22PECIC\",\"WARC-Block-Digest\":\"sha1:5L4SIOKIFQBTQX2PLXNCPWX7EY5EETU6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487622234.42_warc_CC-MAIN-20210616063154-20210616093154-00160.warc.gz\"}"}
https://www.gatecseit.in/data-structure-questions-and-answers-stack-using-queues/
[ "# Data Structure Questions and Answers-Stack using Queues\n\n## Data Structure Questions and Answers-Stack using Queues\n\n Question 1\nTo implement a stack using queue(with only enqueue and dequeue operations), how many queues will you need?\n A 1 B 2 C 3 D 4\nQuestion 1 Explanation:\nEither the push or the pop has to be a costly operation, and the costlier operation requires two queues.\n\n Question 2\nMaking the push operation costly, select the code snippet which implements the same.(let q1 and q2 be two queues)\n A public void push(int x) { if(empty()) { q1.offer(x); } else{ if(q1.size()>0 B public void push(int x) { if(empty()) { q1.offer(x); } else { if(q1.size()>0 C public void push(int x) { if(empty()) { q1.offer(x); } else { if(q1.size()>0 D None of the mentioned\nQuestion 2 Explanation:\nStack follows LIFO principle, hence a new item added must be the first one to exit, but queue follows FIFO principle, so when a new item is entered into the queue, it will be at the rear end of the queue. If the queue is initially empty, then just add the new element, otherwise add the new element to the second queue and dequeue all the elements from the second queue and enqueue it to the first one, in this way, the new element added will be always in front of the queue. Since two queues are needed to realize this push operation, it is considered to be costlier.\n\n Question 3\nMaking the push operation costly, select the code snippet which implements the pop operation.\n A public void pop() { if(q1.size()>0) { q2.poll(); } else if(q2.size()public void pop() { if(q1.size()>0) { q1.poll(); } else if(q2.size()> C public void pop() { q1.poll(); q2.poll(); } D None of the mentioned\nQuestion 3 Explanation:\nAs the push operation is costly, it is evident that the required item is in the front of the queue, so just dequeue the element from the queue.\n\n Question 4\nSelect the code snippet which returns the top of the stack.\n A public int top() { if(q1.size()>0) { return q1.poll(); } else if(q2.size() B public int top() { if(q1.size()==0) { return q1.peek(); } else if(q2.size C public int top() { if(q1.size()>0) { return q1.peek(); } else if(q2.size() D None of the mentioned\n A public boolean empty() { return q2.isEmpty(); } B public boolean empty() { return q1.isEmpty() || q2.isEmpty(); } C public boolean empty() { return q1.isEmpty(); } D public boolean empty() { return q1.isEmpty() & q2.isEmpty(); }" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6583139,"math_prob":0.87445086,"size":2716,"snap":"2020-45-2020-50","text_gpt3_token_len":667,"char_repetition_ratio":0.15929204,"word_repetition_ratio":0.1431718,"special_character_ratio":0.27466863,"punctuation_ratio":0.14003591,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9740686,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-24T01:08:33Z\",\"WARC-Record-ID\":\"<urn:uuid:0751d4bf-b7a3-4517-8e7f-71b174dc7f01>\",\"Content-Length\":\"66570\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9d7e4dcf-303b-4ad0-ab2d-4a04dfd0890f>\",\"WARC-Concurrent-To\":\"<urn:uuid:4f95e8e5-7607-41a1-ad7c-dfda357aabd2>\",\"WARC-IP-Address\":\"104.28.20.13\",\"WARC-Target-URI\":\"https://www.gatecseit.in/data-structure-questions-and-answers-stack-using-queues/\",\"WARC-Payload-Digest\":\"sha1:J3E7JIVWV5BT6EKN3XS7B3CESMYOOVJH\",\"WARC-Block-Digest\":\"sha1:2LCHFFQFUE7KURA3YXO5IFLV5POTQFGR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141169606.2_warc_CC-MAIN-20201124000351-20201124030351-00046.warc.gz\"}"}
https://www.oreilly.com/content/using-tensorflow-to-generate-images-with-pixelrnns/
[ "# Using TensorFlow to generate images with PixelRNNs\n\nGenerate new images and fix old ones using neural networks.\n\nSeptember 6, 2017", null, "Montage (source: Mary-Lynn on Flickr)\n\nPixel Recurrent Neural Networks (PixelRNNs) combine a number of techniques to generate natural-looking images using neural networks. PixelRNNs model the distribution of image data sets using several new techniques, including a novel spatial LSTM cell, and sequentially infer the pixels in an image to (a) generate novel images or (b) predict unseen pixels to complete an occluded image.", null, "Figure 1. Images produced by a PixelRNN model trained on the 32×32 ImageNet data set. Source: “Pixel Recurrent Neural Networks,” used with permission.\n\nThe images in Figure 1 were produced by a PixelRNN model trained on the 32×32 ImageNet data set. In this article, we will create a PixelRNN to generate images from the MNIST data set. You can follow along in the article, or check out our Jupyter Notebook.\n\n## Learn faster. Dig deeper. See farther.\n\nJoin the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.\n\nBefore we get started, you’ll need to install TensorFlow (TF) for Python. Check the instructions, but for most people, it should be as easy as running:\n\npip install tensorflow\n\nIf you haven’t had a chance to work with TF before, we recommend the O’Reilly article, Hello, TensorFlow! Building and training your first TensorFlow model.\n\n## Generative image models and prior work\n\nWe mentioned earlier that the PixelRNN is a generative model. A generative model attempts to model the joint probability distribution of the data we feed in. In the context of PixelRNN, this basically means we want to model all of the possible realistic images as compactly as possible. Doing so would allow us to generate novel images from this distribution. Modeling the distribution of natural images is a landmark problem in machine learning. Several other neural network architectures have attempted to achieve this task, including Generative Adversarial Networks (A. Redford, et. al.), Variational Autoencoders (Y. Pu, et. al.), and spatial LSTM networks (L. Theis, et. al).\n\n## PixelRNN generative model\n\nTo model the distribution of images, PixelRNNs make the following assumption about pixel intensities: the intensity value of a pixel is dependent on all pixels traversed before it. The image is traversed left-to-right and top-to-bottom along the image.", null, "Figure 2. The intensity value of a pixel is dependent on all pixels traversed before it—the image is traversed left-to-right and top-to-bottom along the image. Source: “Pixel Recurrent Neural Networks,” used with permission.\n\nIn an $$nxn$$ image, we have that the intensity for pixel $$x_i$$ is conditioned on all preceding pixels: $$x_j, 0 \\lt j \\gt i$$, or in other terms:\n\n$$x_i \\sim p(x_i | x_1, x_2, \\cdots, x_{i-1})$$\n\nWe calculate the joint probability of an image x by multiplying all conditional probabilities of the image togther, as so:\n\n$$p(x) = \\prod_{i=1}^{n^2} p(x_i | x_1, \\cdots, x_{i-1})$$\n\nWe learn these conditional probabilities through a series of special convolutions that capture this context around a given pixel.\n\n## Diagonal BiLSTMs and convolutions\n\nLSTM cells used by the main variant of PixelRNNs capture this conditional dependency across dozens or hundreds of pixels. In the paper by Google DeepMind, the authors implement a novel spatial bi-directional LSTM cell, the Diagonal BiLSTM, to capture the desired spatial context of a pixel.", null, "Figure 3. The Diagonal BiLSTM captures the desired spatial context of a pixel. Source: “Pixel Recurrent Neural Networks,” used with permission.\n\nTo aid in capturing context before the first layer of the network, we mask the input image so that for a given pixel $$x_i$$ we are predicting, we set the values of all pixels yet to be traversed, $$x_j, j \\ge i,$$ to 0, to prevent them from contributing to the overall prediction. In subsequent LSTM layers, we perform a similar mask, but no longer set $$x_i$$ to 0 in the mask. We then skew the image, so that each row is offset by one from the row above it, as shown above. We can then perform a series of k x 1 convolutions on the skewed image using the Diagonal BiLSTM cells.\n\nThis enables us to efficiently capture the preceding pixels in the image to predict the upcoming one. LSTM cells also capture a potentially unbounded dependency range between pixels in their receptive field. However, this comes at a high computational cost, as the LSTM requires “unrolling” a layer many steps into the future. This begs the question: can we do something more efficient?\n\n## A faster method—computing many features at once\n\nA faster alternative architecture involves replacing the LSTM cell with a series of convolutions to capture a large, but bounded receptive field. This allows us to compute the features contained within the receptive field at once, and avoids the computational cost of sequentially computing each cell’s hidden state.\n\nWe can implement the convolution operation like so, performing the masks as needed (access the notebook for this article here):\n\ndef conv2d(\ninputs,\nnum_outputs,\nkernel_shape, # [kernel_height, kernel_width]\nmask_type, # None, \"A\" or \"B\",\nstrides=[1, 1], # [column_wise_stride, row_wise_stride]\nactivation_fn=None,\nweights_initializer=tf.contrib.layers.xavier_initializer(),\nweights_regularizer=None,\nbiases_initializer=tf.zeros_initializer,\nbiases_regularizer=None,\nscope=\"conv2d\"):\nwith tf.variable_scope(scope):\nbatch_size, height, width, channel = inputs.get_shape().as_list()\nkernel_h, kernel_w = kernel_shape\nstride_h, stride_w = strides\n\ncenter_h = kernel_h // 2\ncenter_w = kernel_w // 2\n\n\nHere, we use the Xavier weights initialization scheme (X. Glorot and Y. Bengio) to create the convolution kernel.\n\n weights_shape = [kernel_h, kernel_w, channel, num_outputs]\nweights = tf.get_variable(\"weights\", weights_shape,\ntf.float32, weights_initializer, weights_regularizer)\n\n\nNext, we apply the mask to the image to restrict the focus of the kernel to the current context.\n\n if mask_type is not None:\n(kernel_h, kernel_w, channel, num_outputs), dtype=np.float32)\n\nmask[center_h, center_w+1: ,: ,:] = 0.\nmask[center_h+1:, :, :, :] = 0.\n\n\n\nFinally, we apply the convolution to the image and apply an optional activation function like ReLU.\n\n outputs = tf.nn.conv2d(inputs,\n\nif biases_initializer != None:\nbiases = tf.get_variable(\"biases\", [num_outputs,],\ntf.float32, biases_initializer, biases_regularizer)\n\nif activation_fn:\noutputs = activation_fn(outputs, name='outputs_with_fn')\nreturn outputs\n\n\n## Generating images with MNIST\n\nFor this article, we will train our PixelRNN on the MNIST data set. Then, we’ll draw from the\n\nPixelRNNs model to generate handwritten digits that don’t appear in our data set. You can download the data set here—however, if you use the load_data() function from utils.py, you won’t have to worry about this. We’ll also demonstrate the PixelRNNs ability to complete a partially occluded image by predicting the rest of the pixels.\n\n### Features of the network\n\nIn place of Diagonal BiLSTM layers, we use the convolutions described earlier.\n\nIn addition to the convolutional layers, PixelRNNs also makes use of residual connections (He, et. al.). Residual connections effectively copy the output from early layers in the network and concatenate this with the output of a deeper layer. This helps preserve information learned earlier in the model. For the convolutional layers in our model, these residual connections look something like this:\n\nThe residual connections allow our model to increase in depth and still gain accuracy, while simultaneously making the model easier to optimize.\n\nThe final layer applies a sigmoid activation function on the input. This layer outputs a value between 0 and 1 that is the resulting normalized pixel intensity.\n\nWith this in mind, the final architecture looks like this:", null, "Figure 5. TensorFlow graph of our layers, generated using TensorBoard. Credit: Phillip Kuznetsov and Noah Golmant.\n\nUsing this architecture and the convolution operations described above, we can construct the network.\n\ndef pixelRNN(height, width, channel, params):\n\"\"\"\nArgs\nheight, width, channel - the dimensions of the input\nparams the hyperparameters of the network\n\"\"\"\ninput_shape = [None, height, width, channel]\ninputs = tf.placeholder(tf.float32, input_shape)\n\n\nHere we apply a 7×7 convolution to the image while applying the initial A mask that removes the self-connection to the pixel being predicted.\n\n # input of main recurrent layers\nscope = \"conv_inputs\"\nconv_inputs = conv2d(inputs, params.hidden_dims, [7, 7], \"A\", scope=scope)\n\n\nNext, we construct a series of 1×1 convolutions to apply to the image.\n\n # main recurrent layers\nlast_hid = conv_inputs\nfor idx in xrange(params.recurrent_length):\nscope = 'CONV%d' % idx\nlast_hid = conv2d(last_hid, 3, [1, 1], \"B\", scope=scope)\nprint(\"Building %s\" % scope)\n\n\nThen, we construct another series of 1×1 convolutions using ReLU activation.\n\n # output recurrent layers\nfor idx in xrange(params.out_recurrent_length):\nscope = 'CONV_OUT%d' % idx\nlast_hid = tf.nn.relu(conv2d(last_hid, params.out_hidden_dims, [1, 1], \"B\", scope=scope))\nprint(\"Building %s\" % scope)\n\n\nFinally, we apply one final convolution layer with a sigmoid activation to produce a series of pixel predictions for the image.\n\n conv2d_out_logits = conv2d(last_hid, 1, [1, 1], \"B\", scope='conv2d_out_logits')\noutput = tf.nn.sigmoid(conv2d_out_logits)\nreturn inputs, output, conv2d_out_logits\ninputs, output, conv2d_out_logits = pixelRNN(height, width, channel, p)\n\n\n## Training procedure\n\nTo train the network, we supply mini-batches of binarized images and predict each pixel in parallel using our network. We minimize the cross entropy between our predictions and the binary pixel values of the images. We optimize this objective using an RMSProp optimizer with a learning rate of 0.001, selected using grid search. The Google DeepMind paper lists RMSProp optimization as the empirically most effective optimizer through all experiments. In practice, we find that clipping the gradients helps stabilize learning. We use a batch size of 100 and 16 hidden units for each convolution.\n\nLet’s optimize the network we constructed above using this procedure:\n\nloss = tf.reduce_mean(tf.nn.sigmoid_cross_entropy_with_logits(conv2d_out_logits, inputs, name='loss'))\n\noptimizer = tf.train.RMSPropOptimizer(p.learning_rate)\n\n\n\n## Generation and occlusion completion\n\nAfter training the network, we can use the resulting model to generate sample images using the generative model we’ve described. We can also infer the remaining pixel values in a partially occluded image to complete it. The code to do so is fairly simple:\n\ndef predict(sess, images, inputs, output):\nreturn sess.run(output, {inputs: images})\n\ndef generate(sess, height, width, inputs, output):\nsamples = np.zeros((100, height, width, 1), dtype='float32')\n\nfor i in range(height):\nfor j in range(width):\nnext_sample = binarize(predict(sess, samples, inputs, output))\nsamples[:, i, j] = next_sample[:, i, j]\n\nreturn samples\n\ndef generate_occlusions(sess, height, width, inputs, output):\nsamples = occlude(images, height, width)\nstarting_position = [0,height//2]\nfor i in range(starting_position, height):\nfor j in range(starting_position, width):\nnext_sample = binarize(predict(sess, samples, inputs, output))\nsamples[:, i, j] = next_sample[:, i, j]\nreturn samples\n\n\nWe can complete occluded images by using the same generative procedure, only modifying the starting point.", null, "Figure 6. Results on generating occluded images. The first panel shows the digits prior to the occlusion. The second panel demonstrates what an occluded image looks like. The third panel demonstrates the neural network’s best guesses for what the rest of the occluded image should look like. Credit: Phillip Kuznetsov and Noah Golmant.\n\nAs you can see, the algorithm can successfully finish an occluded image. Clearly, there are some discrepancies in the generated numbers and the original numbers. For example, the 7 in the top left becomes a 9 in the generated image. However, these mistakes are not unreasonable—the curve that remains after the occlusion could arbitrarily belong to several different handwritten digits.\n\n## Next steps\n\nThe PixelRNN framework provides a useful architecture for generating modeling. Although we implement a single color channel version for MNIST, Google DeepMind’s original paper discusses a slightly more sophisticated architecture that can deal with multi-channel color images. This system can model more complex data sets like CIFAR10 and ImageNet. The TensorFlow Magenta team has an excellent review that explains the mathematics behind this algorithm at a higher level than the paper.\n\nWhat we’ve shown here is a benchmark with a very simple data set using a relatively fast model that can learn the distribution of MNIST images. Next steps might include extending this model to work with images composed of multiple color channels, like CIFAR10.\n\nAnother option is to implement the original Diagonal BiLSTM cell in place of the faster convolutions. This implementation is much more computationally expensive—even on a state-of-the-art GPU. We found in practice that the convolution-based architecture ran approximately 20x faster than the Diagonal BiLSTM one.\n\nFurther work on the convolution-based architecture, PixelCNN, can be found in the paper Conditional Image Generation with PixelCNN Decoders. OpenAI recently went a step further and open sourced a repo that implements a computationally faster version of the above paper using several significant architecture improvements.\n\nDon’t forget to check out our notebook and repo to play around with this code yourself! As a note, if you don’t own a GPU, you can rent one from AWS for cheap. Phillip wrote a guide on how to start an AWS EC2 instance for deep learning—including how to set up a Jupyter Notebook server.\n\nThis post is a collaboration between O’Reilly and TensorFlow. See our statement of editorial independence.\n\nPost topics: Artificial Intelligence" ]
[ null, "https://www.oreilly.com/content/wp-content/uploads/sites/2/2019/06/131160735_0d6facc552_o_crop-962877ce83d043974be9fe251d9da102.jpg", null, "https://www.oreilly.com/content/wp-content/uploads/sites/2/2019/06/Figure_1_2-020a9804a3a0cc9bc7dc646fdaed63c7.png", null, "https://www.oreilly.com/content/wp-content/uploads/sites/2/2019/06/Figure_2-ff5858df0d35b39b7c9ba1b8b5e016c9.png", null, "https://www.oreilly.com/content/wp-content/uploads/sites/2/2019/06/Figure_3-21568bdb1b3c3b34efa9eb747c00c03d.png", null, "https://www.oreilly.com/content/wp-content/uploads/sites/2/2019/06/Figure_5-70326ff67c061b0ca9df05d887ac752c.png", null, "https://www.oreilly.com/content/wp-content/uploads/sites/2/2019/06/Figure_6-a8b84d391f7aa635f17359ff1f979898.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.81440735,"math_prob":0.9420363,"size":13431,"snap":"2022-05-2022-21","text_gpt3_token_len":3012,"char_repetition_ratio":0.11849259,"word_repetition_ratio":0.013408974,"special_character_ratio":0.2231405,"punctuation_ratio":0.1609996,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9903373,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,4,null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-24T16:15:42Z\",\"WARC-Record-ID\":\"<urn:uuid:270ca0f3-6aed-4fa8-93d6-6d70704a2430>\",\"Content-Length\":\"53778\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:31a29478-6aa7-4033-a29c-df1a75f1a4ff>\",\"WARC-Concurrent-To\":\"<urn:uuid:3115601e-6614-4e88-adfd-03db77c8051b>\",\"WARC-IP-Address\":\"23.78.200.188\",\"WARC-Target-URI\":\"https://www.oreilly.com/content/using-tensorflow-to-generate-images-with-pixelrnns/\",\"WARC-Payload-Digest\":\"sha1:PTZEJR5RTIPWHUPD2UXYO3OG3NF2GOMW\",\"WARC-Block-Digest\":\"sha1:ILCZ5CJ2DGB266ETLO3OBB6EEHUT73HY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662573053.67_warc_CC-MAIN-20220524142617-20220524172617-00470.warc.gz\"}"}
https://math.stackexchange.com/questions/2347303/equilateral-triangle-iff-relationship
[ "# Equilateral triangle iff relationship [duplicate]\n\nShow that the triangle in the complex plane whose vertices are $z_1,z_2,z_3$ is equilateral if and only if $z_1^2 + z_2^2 + z_3^2 = z_1 z_2 + z_2 z_3 + z_1 z_3$.\n\nI showed the forward implication, that if those vertices formed an equilateral triangle, it implied the equality. I'm not sure how I would prove the reverse implication.\n\n## marked as duplicate by dxiv, Daniel W. Farlow, Trevor Gunn, Lord Shark the Unknown, jvdhooftJul 6 '17 at 6:08\n\n• $$\\dfrac{z_2-z_1}{z_3-z_2}=e^{i\\pi/3}$$ – lab bhattacharjee Jul 5 '17 at 13:31\n• I don't think it does, since it relies on the fact that $z_3 - z_2$ is a rotation of $z_2 - z_1$ by $\\frac{\\pi}{3}$ radians, to reverse the implication, I'd have to prove that $z_3 - z_2$ is a rotation of $z_2 - z_1$ by $\\frac{\\pi}{3}$ radians (which assumes the equilateral triangle fact). – Twenty-six colours Jul 7 '17 at 11:06\nHint. The equality is equivalent to $(z_1-z_2)^2+(z_2-z_3)^2+(z_3-z_1)^2=0$. Let $u=z_1-z_2$, $v=z_2 - z_3$, then $u^2+v^2+(u-v)^2=0$. Now we may view this as a quadratic equation in $u/v$ and solve it easily." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9273023,"math_prob":0.9999721,"size":373,"snap":"2019-26-2019-30","text_gpt3_token_len":111,"char_repetition_ratio":0.11382114,"word_repetition_ratio":0.0,"special_character_ratio":0.30294907,"punctuation_ratio":0.10810811,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999198,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-17T18:32:55Z\",\"WARC-Record-ID\":\"<urn:uuid:28e3a927-1606-4b6f-8d3b-c249e01ed882>\",\"Content-Length\":\"126747\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b2c8e5d4-9ca7-40a7-9548-be0c6e370645>\",\"WARC-Concurrent-To\":\"<urn:uuid:0881424e-3b81-4abb-b0e8-a15209eb7eac>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/2347303/equilateral-triangle-iff-relationship\",\"WARC-Payload-Digest\":\"sha1:PN5ZRQ532W67XR7WUBOAMAINQLJE7JZQ\",\"WARC-Block-Digest\":\"sha1:KMZJ2M3UPCE4MLYVFCCO43EIP3B42PMD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525374.43_warc_CC-MAIN-20190717181736-20190717203736-00165.warc.gz\"}"}
https://priceplus.savingadvice.com/2020/12/19/wow-this-year-has-been-something_221794/
[ "User Real IP - 52.205.167.104\n```Array\n(\n => Array\n(\n => 182.68.68.92\n)\n\n => Array\n(\n => 101.0.41.201\n)\n\n => Array\n(\n => 43.225.98.123\n)\n\n => Array\n(\n => 2.58.194.139\n)\n\n => Array\n(\n => 46.119.197.104\n)\n\n => Array\n(\n => 45.249.8.93\n)\n\n => Array\n(\n => 103.12.135.72\n)\n\n => Array\n(\n => 157.35.243.216\n)\n\n => Array\n(\n => 209.107.214.176\n)\n\n => Array\n(\n => 5.181.233.166\n)\n\n => Array\n(\n => 106.201.10.100\n)\n\n => Array\n(\n => 36.90.55.39\n)\n\n => Array\n(\n => 119.154.138.47\n)\n\n => Array\n(\n => 51.91.31.157\n)\n\n => Array\n(\n => 182.182.65.216\n)\n\n => Array\n(\n => 157.35.252.63\n)\n\n => Array\n(\n => 14.142.34.163\n)\n\n => Array\n(\n => 178.62.43.135\n)\n\n => Array\n(\n => 43.248.152.148\n)\n\n => Array\n(\n => 222.252.104.114\n)\n\n => Array\n(\n => 209.107.214.168\n)\n\n => Array\n(\n => 103.99.199.250\n)\n\n => Array\n(\n => 178.62.72.160\n)\n\n => Array\n(\n => 27.6.1.170\n)\n\n => Array\n(\n => 182.69.249.219\n)\n\n => Array\n(\n => 110.93.228.86\n)\n\n => Array\n(\n => 72.255.1.98\n)\n\n => Array\n(\n => 182.73.111.98\n)\n\n => Array\n(\n => 45.116.117.11\n)\n\n => Array\n(\n => 122.15.78.189\n)\n\n => Array\n(\n => 14.167.188.234\n)\n\n => Array\n(\n => 223.190.4.202\n)\n\n => Array\n(\n => 202.173.125.19\n)\n\n => Array\n(\n => 103.255.5.32\n)\n\n => Array\n(\n => 39.37.145.103\n)\n\n => Array\n(\n => 140.213.26.249\n)\n\n => Array\n(\n => 45.118.166.85\n)\n\n => Array\n(\n => 102.166.138.255\n)\n\n => Array\n(\n => 77.111.246.234\n)\n\n => Array\n(\n => 45.63.6.196\n)\n\n => Array\n(\n => 103.250.147.115\n)\n\n => Array\n(\n => 223.185.30.99\n)\n\n => Array\n(\n => 103.122.168.108\n)\n\n => Array\n(\n => 123.136.203.21\n)\n\n => Array\n(\n => 171.229.243.63\n)\n\n => Array\n(\n => 153.149.98.149\n)\n\n => Array\n(\n => 223.238.93.15\n)\n\n => Array\n(\n => 178.62.113.166\n)\n\n => Array\n(\n => 101.162.0.153\n)\n\n => Array\n(\n => 121.200.62.114\n)\n\n => Array\n(\n => 14.248.77.252\n)\n\n => Array\n(\n => 95.142.117.29\n)\n\n => Array\n(\n => 150.129.60.107\n)\n\n => Array\n(\n => 94.205.243.22\n)\n\n => Array\n(\n => 115.42.71.143\n)\n\n => Array\n(\n => 117.217.195.59\n)\n\n => Array\n(\n => 182.77.112.56\n)\n\n => Array\n(\n => 182.77.112.108\n)\n\n => Array\n(\n => 41.80.69.10\n)\n\n => Array\n(\n => 117.5.222.121\n)\n\n => Array\n(\n => 103.11.0.38\n)\n\n => Array\n(\n => 202.173.127.140\n)\n\n => Array\n(\n => 49.249.249.50\n)\n\n => Array\n(\n => 116.72.198.211\n)\n\n => Array\n(\n => 223.230.54.53\n)\n\n => Array\n(\n => 102.69.228.74\n)\n\n => Array\n(\n => 39.37.251.89\n)\n\n => Array\n(\n => 39.53.246.141\n)\n\n => Array\n(\n => 39.57.182.72\n)\n\n => Array\n(\n => 209.58.130.210\n)\n\n => Array\n(\n => 104.131.75.86\n)\n\n => Array\n(\n => 106.212.131.255\n)\n\n => Array\n(\n => 106.212.132.127\n)\n\n => Array\n(\n => 223.190.4.60\n)\n\n => Array\n(\n => 103.252.116.252\n)\n\n => Array\n(\n => 103.76.55.182\n)\n\n => Array\n(\n => 45.118.166.70\n)\n\n => Array\n(\n => 103.93.174.215\n)\n\n => Array\n(\n => 5.62.62.142\n)\n\n => Array\n(\n => 182.179.158.156\n)\n\n => Array\n(\n => 39.57.255.12\n)\n\n => Array\n(\n => 39.37.178.37\n)\n\n => Array\n(\n => 182.180.165.211\n)\n\n => Array\n(\n => 119.153.135.17\n)\n\n => Array\n(\n => 72.255.15.244\n)\n\n => Array\n(\n => 139.180.166.181\n)\n\n => Array\n(\n => 70.119.147.111\n)\n\n => Array\n(\n => 106.210.40.83\n)\n\n => Array\n(\n => 14.190.70.91\n)\n\n => Array\n(\n => 202.125.156.82\n)\n\n => Array\n(\n => 115.42.68.38\n)\n\n => Array\n(\n => 102.167.13.108\n)\n\n => Array\n(\n => 117.217.192.130\n)\n\n => Array\n(\n => 205.185.223.156\n)\n\n => Array\n(\n => 171.224.180.29\n)\n\n => Array\n(\n => 45.127.45.68\n)\n\n => Array\n(\n => 195.206.183.232\n)\n\n => Array\n(\n => 49.32.52.115\n)\n\n => Array\n(\n => 49.207.49.223\n)\n\n => Array\n(\n => 45.63.29.61\n)\n\n => Array\n(\n => 103.245.193.214\n)\n\n => Array\n(\n => 39.40.236.69\n)\n\n => Array\n(\n => 62.80.162.111\n)\n\n => Array\n(\n => 45.116.232.56\n)\n\n => Array\n(\n => 45.118.166.91\n)\n\n => Array\n(\n => 180.92.230.234\n)\n\n => Array\n(\n => 157.40.57.160\n)\n\n => Array\n(\n => 110.38.38.130\n)\n\n => Array\n(\n => 72.255.57.183\n)\n\n => Array\n(\n => 182.68.81.85\n)\n\n => Array\n(\n => 39.57.202.122\n)\n\n => Array\n(\n => 119.152.154.36\n)\n\n => Array\n(\n => 5.62.62.141\n)\n\n => Array\n(\n => 119.155.54.232\n)\n\n => Array\n(\n => 39.37.141.22\n)\n\n => Array\n(\n => 183.87.12.225\n)\n\n => Array\n(\n => 107.170.127.117\n)\n\n => Array\n(\n => 125.63.124.49\n)\n\n => Array\n(\n => 39.42.191.3\n)\n\n => Array\n(\n => 116.74.24.72\n)\n\n => Array\n(\n => 46.101.89.227\n)\n\n => Array\n(\n => 202.173.125.247\n)\n\n => Array\n(\n => 39.42.184.254\n)\n\n => Array\n(\n => 115.186.165.132\n)\n\n => Array\n(\n => 39.57.206.126\n)\n\n => Array\n(\n => 103.245.13.145\n)\n\n => Array\n(\n => 202.175.246.43\n)\n\n => Array\n(\n => 192.140.152.150\n)\n\n => Array\n(\n => 202.88.250.103\n)\n\n => Array\n(\n => 103.248.94.207\n)\n\n => Array\n(\n => 77.73.66.101\n)\n\n => Array\n(\n => 104.131.66.8\n)\n\n => Array\n(\n => 113.186.161.97\n)\n\n => Array\n(\n => 222.254.5.7\n)\n\n => Array\n(\n => 223.233.67.247\n)\n\n => Array\n(\n => 171.249.116.146\n)\n\n => Array\n(\n => 47.30.209.71\n)\n\n => Array\n(\n => 202.134.13.130\n)\n\n => Array\n(\n => 27.6.135.7\n)\n\n => Array\n(\n => 107.170.186.79\n)\n\n => Array\n(\n => 103.212.89.171\n)\n\n => Array\n(\n => 117.197.9.77\n)\n\n => Array\n(\n => 122.176.206.233\n)\n\n => Array\n(\n => 192.227.253.222\n)\n\n => Array\n(\n => 182.188.224.119\n)\n\n => Array\n(\n => 14.248.70.74\n)\n\n => Array\n(\n => 42.118.219.169\n)\n\n => Array\n(\n => 110.39.146.170\n)\n\n => Array\n(\n => 119.160.66.143\n)\n\n => Array\n(\n => 103.248.95.130\n)\n\n => Array\n(\n => 27.63.152.208\n)\n\n => Array\n(\n => 49.207.114.96\n)\n\n => Array\n(\n => 102.166.23.214\n)\n\n => Array\n(\n => 175.107.254.73\n)\n\n => Array\n(\n => 103.10.227.214\n)\n\n => Array\n(\n => 202.143.115.89\n)\n\n => Array\n(\n => 110.93.227.187\n)\n\n => Array\n(\n => 103.140.31.60\n)\n\n => Array\n(\n => 110.37.231.46\n)\n\n => Array\n(\n => 39.36.99.238\n)\n\n => Array\n(\n => 157.37.140.26\n)\n\n => Array\n(\n => 43.246.202.226\n)\n\n => Array\n(\n => 137.97.8.143\n)\n\n => Array\n(\n => 182.65.52.242\n)\n\n => Array\n(\n => 115.42.69.62\n)\n\n => Array\n(\n => 14.143.254.58\n)\n\n => Array\n(\n => 223.179.143.236\n)\n\n => Array\n(\n => 223.179.143.249\n)\n\n => Array\n(\n => 103.143.7.54\n)\n\n => Array\n(\n => 223.179.139.106\n)\n\n => Array\n(\n => 39.40.219.90\n)\n\n => Array\n(\n => 45.115.141.231\n)\n\n => Array\n(\n => 120.29.100.33\n)\n\n => Array\n(\n => 112.196.132.5\n)\n\n => Array\n(\n => 202.163.123.153\n)\n\n => Array\n(\n => 5.62.58.146\n)\n\n => Array\n(\n => 39.53.216.113\n)\n\n => Array\n(\n => 42.111.160.73\n)\n\n => Array\n(\n => 107.182.231.213\n)\n\n => Array\n(\n => 119.82.94.120\n)\n\n => Array\n(\n => 178.62.34.82\n)\n\n => Array\n(\n => 203.122.6.18\n)\n\n => Array\n(\n => 157.42.38.251\n)\n\n => Array\n(\n => 45.112.68.222\n)\n\n => Array\n(\n => 49.206.212.122\n)\n\n => Array\n(\n => 104.236.70.228\n)\n\n => Array\n(\n => 42.111.34.243\n)\n\n => Array\n(\n => 84.241.19.186\n)\n\n => Array\n(\n => 89.187.180.207\n)\n\n => Array\n(\n => 104.243.212.118\n)\n\n => Array\n(\n => 104.236.55.136\n)\n\n => Array\n(\n => 106.201.16.163\n)\n\n => Array\n(\n => 46.101.40.25\n)\n\n => Array\n(\n => 45.118.166.94\n)\n\n => Array\n(\n => 49.36.128.102\n)\n\n => Array\n(\n => 14.142.193.58\n)\n\n => Array\n(\n => 212.79.124.176\n)\n\n => Array\n(\n => 45.32.191.194\n)\n\n => Array\n(\n => 105.112.107.46\n)\n\n => Array\n(\n => 106.201.14.8\n)\n\n => Array\n(\n => 110.93.240.65\n)\n\n => Array\n(\n => 27.96.95.177\n)\n\n => Array\n(\n => 45.41.134.35\n)\n\n => Array\n(\n => 180.151.13.110\n)\n\n => Array\n(\n => 101.53.242.89\n)\n\n => Array\n(\n => 115.186.3.110\n)\n\n => Array\n(\n => 171.49.185.242\n)\n\n => Array\n(\n => 115.42.70.24\n)\n\n => Array\n(\n => 45.128.188.43\n)\n\n => Array\n(\n => 103.140.129.63\n)\n\n => Array\n(\n => 101.50.113.147\n)\n\n => Array\n(\n => 103.66.73.30\n)\n\n => Array\n(\n => 117.247.193.169\n)\n\n => Array\n(\n => 120.29.100.94\n)\n\n => Array\n(\n => 42.109.154.39\n)\n\n => Array\n(\n => 122.173.155.150\n)\n\n => Array\n(\n => 45.115.104.53\n)\n\n => Array\n(\n => 116.74.29.84\n)\n\n => Array\n(\n => 101.50.125.34\n)\n\n => Array\n(\n => 45.118.166.80\n)\n\n => Array\n(\n => 91.236.184.27\n)\n\n => Array\n(\n => 113.167.185.120\n)\n\n => Array\n(\n => 27.97.66.222\n)\n\n => Array\n(\n => 43.247.41.117\n)\n\n => Array\n(\n => 23.229.16.227\n)\n\n => Array\n(\n => 14.248.79.209\n)\n\n => Array\n(\n => 117.5.194.26\n)\n\n => Array\n(\n => 117.217.205.41\n)\n\n => Array\n(\n => 114.79.169.99\n)\n\n => Array\n(\n => 103.55.60.97\n)\n\n => Array\n(\n => 182.75.89.210\n)\n\n => Array\n(\n => 77.73.66.109\n)\n\n => Array\n(\n => 182.77.126.139\n)\n\n => Array\n(\n => 14.248.77.166\n)\n\n => Array\n(\n => 157.35.224.133\n)\n\n => Array\n(\n => 183.83.38.27\n)\n\n => Array\n(\n => 182.68.4.77\n)\n\n => Array\n(\n => 122.177.130.234\n)\n\n => Array\n(\n => 103.24.99.99\n)\n\n => Array\n(\n => 103.91.127.66\n)\n\n => Array\n(\n => 41.90.34.240\n)\n\n => Array\n(\n => 49.205.77.102\n)\n\n => Array\n(\n => 103.248.94.142\n)\n\n => Array\n(\n => 104.143.92.170\n)\n\n => Array\n(\n => 219.91.157.114\n)\n\n => Array\n(\n => 223.190.88.22\n)\n\n => Array\n(\n => 223.190.86.232\n)\n\n => Array\n(\n => 39.41.172.80\n)\n\n => Array\n(\n => 124.107.206.5\n)\n\n => Array\n(\n => 139.167.180.224\n)\n\n => Array\n(\n => 93.76.64.248\n)\n\n => Array\n(\n => 65.216.227.119\n)\n\n => Array\n(\n => 223.190.119.141\n)\n\n => Array\n(\n => 110.93.237.179\n)\n\n => Array\n(\n => 41.90.7.85\n)\n\n => Array\n(\n => 103.100.6.26\n)\n\n => Array\n(\n => 104.140.83.13\n)\n\n => Array\n(\n => 223.190.119.133\n)\n\n => Array\n(\n => 119.152.150.87\n)\n\n => Array\n(\n => 103.125.130.147\n)\n\n => Array\n(\n => 27.6.5.52\n)\n\n => Array\n(\n => 103.98.188.26\n)\n\n => Array\n(\n => 39.35.121.81\n)\n\n => Array\n(\n => 74.119.146.182\n)\n\n => Array\n(\n => 5.181.233.162\n)\n\n => Array\n(\n => 157.39.18.60\n)\n\n => Array\n(\n => 1.187.252.25\n)\n\n => Array\n(\n => 39.42.145.59\n)\n\n => Array\n(\n => 39.35.39.198\n)\n\n => Array\n(\n => 49.36.128.214\n)\n\n => Array\n(\n => 182.190.20.56\n)\n\n => Array\n(\n => 122.180.249.189\n)\n\n => Array\n(\n => 117.217.203.107\n)\n\n => Array\n(\n => 103.70.82.241\n)\n\n => Array\n(\n => 45.118.166.68\n)\n\n => Array\n(\n => 122.180.168.39\n)\n\n => Array\n(\n => 149.28.67.254\n)\n\n => Array\n(\n => 223.233.73.8\n)\n\n => Array\n(\n => 122.167.140.0\n)\n\n => Array\n(\n => 95.158.51.55\n)\n\n => Array\n(\n => 27.96.95.134\n)\n\n => Array\n(\n => 49.206.214.53\n)\n\n => Array\n(\n => 212.103.49.92\n)\n\n => Array\n(\n => 122.177.115.101\n)\n\n => Array\n(\n => 171.50.187.124\n)\n\n => Array\n(\n => 122.164.55.107\n)\n\n => Array\n(\n => 98.114.217.204\n)\n\n => Array\n(\n => 106.215.10.54\n)\n\n => Array\n(\n => 115.42.68.28\n)\n\n => Array\n(\n => 104.194.220.87\n)\n\n => Array\n(\n => 103.137.84.170\n)\n\n => Array\n(\n => 61.16.142.110\n)\n\n => Array\n(\n => 212.103.49.85\n)\n\n => Array\n(\n => 39.53.248.162\n)\n\n => Array\n(\n => 203.122.40.214\n)\n\n => Array\n(\n => 117.217.198.72\n)\n\n => Array\n(\n => 115.186.191.203\n)\n\n => Array\n(\n => 120.29.100.199\n)\n\n => Array\n(\n => 45.151.237.24\n)\n\n => Array\n(\n => 223.190.125.232\n)\n\n => Array\n(\n => 41.80.151.17\n)\n\n => Array\n(\n => 23.111.188.5\n)\n\n => Array\n(\n => 223.190.125.216\n)\n\n => Array\n(\n => 103.217.133.119\n)\n\n => Array\n(\n => 103.198.173.132\n)\n\n => Array\n(\n => 47.31.155.89\n)\n\n => Array\n(\n => 223.190.20.253\n)\n\n => Array\n(\n => 104.131.92.125\n)\n\n => Array\n(\n => 223.190.19.152\n)\n\n => Array\n(\n => 103.245.193.191\n)\n\n => Array\n(\n => 106.215.58.255\n)\n\n => Array\n(\n => 119.82.83.238\n)\n\n => Array\n(\n => 106.212.128.138\n)\n\n => Array\n(\n => 139.167.237.36\n)\n\n => Array\n(\n => 222.124.40.250\n)\n\n => Array\n(\n => 134.56.185.169\n)\n\n => Array\n(\n => 54.255.226.31\n)\n\n => Array\n(\n => 137.97.162.31\n)\n\n => Array\n(\n => 95.185.21.191\n)\n\n => Array\n(\n => 171.61.168.151\n)\n\n => Array\n(\n => 137.97.184.4\n)\n\n => Array\n(\n => 106.203.151.202\n)\n\n => Array\n(\n => 39.37.137.0\n)\n\n => Array\n(\n => 45.118.166.66\n)\n\n => Array\n(\n => 14.248.105.100\n)\n\n => Array\n(\n => 106.215.61.185\n)\n\n => Array\n(\n => 202.83.57.179\n)\n\n => Array\n(\n => 89.187.182.176\n)\n\n => Array\n(\n => 49.249.232.198\n)\n\n => Array\n(\n => 132.154.95.236\n)\n\n => Array\n(\n => 223.233.83.230\n)\n\n => Array\n(\n => 183.83.153.14\n)\n\n => Array\n(\n => 125.63.72.210\n)\n\n => Array\n(\n => 207.174.202.11\n)\n\n => Array\n(\n => 119.95.88.59\n)\n\n => Array\n(\n => 122.170.14.150\n)\n\n => Array\n(\n => 45.118.166.75\n)\n\n => Array\n(\n => 103.12.135.37\n)\n\n => Array\n(\n => 49.207.120.225\n)\n\n => Array\n(\n => 182.64.195.207\n)\n\n => Array\n(\n => 103.99.37.16\n)\n\n => Array\n(\n => 46.150.104.221\n)\n\n => Array\n(\n => 104.236.195.147\n)\n\n => Array\n(\n => 103.104.192.43\n)\n\n => Array\n(\n => 24.242.159.118\n)\n\n => Array\n(\n => 39.42.179.143\n)\n\n => Array\n(\n => 111.93.58.131\n)\n\n => Array\n(\n => 193.176.84.127\n)\n\n => Array\n(\n => 209.58.142.218\n)\n\n => Array\n(\n => 69.243.152.129\n)\n\n => Array\n(\n => 117.97.131.249\n)\n\n => Array\n(\n => 103.230.180.89\n)\n\n => Array\n(\n => 106.212.170.192\n)\n\n => Array\n(\n => 171.224.180.95\n)\n\n => Array\n(\n => 158.222.11.87\n)\n\n => Array\n(\n => 119.155.60.246\n)\n\n => Array\n(\n => 41.90.43.129\n)\n\n => Array\n(\n => 185.183.104.170\n)\n\n => Array\n(\n => 14.248.67.65\n)\n\n => Array\n(\n => 117.217.205.82\n)\n\n => Array\n(\n => 111.88.7.209\n)\n\n => Array\n(\n => 49.36.132.244\n)\n\n => Array\n(\n => 171.48.40.2\n)\n\n => Array\n(\n => 119.81.105.2\n)\n\n => Array\n(\n => 49.36.128.114\n)\n\n => Array\n(\n => 213.200.31.93\n)\n\n => Array\n(\n => 2.50.15.110\n)\n\n => Array\n(\n => 120.29.104.67\n)\n\n => Array\n(\n => 223.225.32.221\n)\n\n => Array\n(\n => 14.248.67.195\n)\n\n => Array\n(\n => 119.155.36.13\n)\n\n => Array\n(\n => 101.50.95.104\n)\n\n => Array\n(\n => 104.236.205.233\n)\n\n => Array\n(\n => 122.164.36.150\n)\n\n => Array\n(\n => 157.45.93.209\n)\n\n => Array\n(\n => 182.77.118.100\n)\n\n => Array\n(\n => 182.74.134.218\n)\n\n => Array\n(\n => 183.82.128.146\n)\n\n => Array\n(\n => 112.196.170.234\n)\n\n => Array\n(\n => 122.173.230.178\n)\n\n => Array\n(\n => 122.164.71.199\n)\n\n => Array\n(\n => 51.79.19.31\n)\n\n => Array\n(\n => 58.65.222.20\n)\n\n => Array\n(\n => 103.27.203.97\n)\n\n => Array\n(\n => 111.88.7.242\n)\n\n => Array\n(\n => 14.171.232.77\n)\n\n => Array\n(\n => 46.101.22.182\n)\n\n => Array\n(\n => 103.94.219.19\n)\n\n => Array\n(\n => 139.190.83.30\n)\n\n => Array\n(\n => 223.190.27.184\n)\n\n => Array\n(\n => 182.185.183.34\n)\n\n => Array\n(\n => 91.74.181.242\n)\n\n => Array\n(\n => 222.252.107.14\n)\n\n => Array\n(\n => 137.97.8.28\n)\n\n => Array\n(\n => 46.101.16.229\n)\n\n => Array\n(\n => 122.53.254.229\n)\n\n => Array\n(\n => 106.201.17.180\n)\n\n => Array\n(\n => 123.24.170.129\n)\n\n => Array\n(\n => 182.185.180.79\n)\n\n => Array\n(\n => 223.190.17.4\n)\n\n => Array\n(\n => 213.108.105.1\n)\n\n => Array\n(\n => 171.22.76.9\n)\n\n => Array\n(\n => 202.66.178.164\n)\n\n => Array\n(\n => 178.62.97.171\n)\n\n => Array\n(\n => 167.179.110.209\n)\n\n => Array\n(\n => 223.230.147.172\n)\n\n => Array\n(\n => 76.218.195.160\n)\n\n => Array\n(\n => 14.189.186.178\n)\n\n => Array\n(\n => 157.41.45.143\n)\n\n => Array\n(\n => 223.238.22.53\n)\n\n => Array\n(\n => 111.88.7.244\n)\n\n => Array\n(\n => 5.62.57.19\n)\n\n => Array\n(\n => 106.201.25.216\n)\n\n => Array\n(\n => 117.217.205.33\n)\n\n => Array\n(\n => 111.88.7.215\n)\n\n => Array\n(\n => 106.201.13.77\n)\n\n => Array\n(\n => 50.7.93.29\n)\n\n => Array\n(\n => 123.201.70.112\n)\n\n => Array\n(\n => 39.42.108.226\n)\n\n => Array\n(\n => 27.5.198.29\n)\n\n => Array\n(\n => 223.238.85.187\n)\n\n => Array\n(\n => 171.49.176.32\n)\n\n => Array\n(\n => 14.248.79.242\n)\n\n => Array\n(\n => 46.219.211.183\n)\n\n => Array\n(\n => 185.244.212.251\n)\n\n => Array\n(\n => 14.102.84.126\n)\n\n => Array\n(\n => 106.212.191.52\n)\n\n => Array\n(\n => 154.72.153.203\n)\n\n => Array\n(\n => 14.175.82.64\n)\n\n => Array\n(\n => 141.105.139.131\n)\n\n => Array\n(\n => 182.156.103.98\n)\n\n => Array\n(\n => 117.217.204.75\n)\n\n => Array\n(\n => 104.140.83.115\n)\n\n => Array\n(\n => 119.152.62.8\n)\n\n => Array\n(\n => 45.125.247.94\n)\n\n => Array\n(\n => 137.97.37.252\n)\n\n => Array\n(\n => 117.217.204.73\n)\n\n => Array\n(\n => 14.248.79.133\n)\n\n => Array\n(\n => 39.37.152.52\n)\n\n => Array\n(\n => 103.55.60.54\n)\n\n => Array\n(\n => 102.166.183.88\n)\n\n => Array\n(\n => 5.62.60.162\n)\n\n => Array\n(\n => 5.62.60.163\n)\n\n => Array\n(\n => 160.202.38.131\n)\n\n => Array\n(\n => 106.215.20.253\n)\n\n => Array\n(\n => 39.37.160.54\n)\n\n => Array\n(\n => 119.152.59.186\n)\n\n => Array\n(\n => 183.82.0.164\n)\n\n => Array\n(\n => 41.90.54.87\n)\n\n => Array\n(\n => 157.36.85.158\n)\n\n => Array\n(\n => 110.37.229.162\n)\n\n => Array\n(\n => 203.99.180.148\n)\n\n => Array\n(\n => 117.97.132.91\n)\n\n => Array\n(\n => 171.61.147.105\n)\n\n => Array\n(\n => 14.98.147.214\n)\n\n => Array\n(\n => 209.234.253.191\n)\n\n => Array\n(\n => 92.38.148.60\n)\n\n => Array\n(\n => 178.128.104.139\n)\n\n => Array\n(\n => 212.154.0.176\n)\n\n => Array\n(\n => 103.41.24.141\n)\n\n => Array\n(\n => 2.58.194.132\n)\n\n => Array\n(\n => 180.190.78.169\n)\n\n => Array\n(\n => 106.215.45.182\n)\n\n => Array\n(\n => 125.63.100.222\n)\n\n => Array\n(\n => 110.54.247.17\n)\n\n => Array\n(\n => 103.26.85.105\n)\n\n => Array\n(\n => 39.42.147.3\n)\n\n => Array\n(\n => 137.97.51.41\n)\n\n => Array\n(\n => 71.202.72.27\n)\n\n => Array\n(\n => 119.155.35.10\n)\n\n => Array\n(\n => 202.47.43.120\n)\n\n => Array\n(\n => 183.83.64.101\n)\n\n => Array\n(\n => 182.68.106.141\n)\n\n => Array\n(\n => 171.61.187.87\n)\n\n => Array\n(\n => 178.162.198.118\n)\n\n => Array\n(\n => 115.97.151.218\n)\n\n => Array\n(\n => 196.207.184.210\n)\n\n => Array\n(\n => 198.16.70.51\n)\n\n => Array\n(\n => 41.60.237.33\n)\n\n => Array\n(\n => 47.11.86.26\n)\n\n => Array\n(\n => 117.217.201.183\n)\n\n => Array\n(\n => 203.192.241.79\n)\n\n => Array\n(\n => 122.165.119.85\n)\n\n => Array\n(\n => 23.227.142.218\n)\n\n => Array\n(\n => 178.128.104.221\n)\n\n => Array\n(\n => 14.192.54.163\n)\n\n => Array\n(\n => 139.5.253.218\n)\n\n => Array\n(\n => 117.230.140.127\n)\n\n => Array\n(\n => 195.114.149.199\n)\n\n => Array\n(\n => 14.239.180.220\n)\n\n => Array\n(\n => 103.62.155.94\n)\n\n => Array\n(\n => 118.71.97.14\n)\n\n => Array\n(\n => 137.97.55.163\n)\n\n => Array\n(\n => 202.47.49.198\n)\n\n => Array\n(\n => 171.61.177.85\n)\n\n => Array\n(\n => 137.97.190.224\n)\n\n => Array\n(\n => 117.230.34.142\n)\n\n => Array\n(\n => 103.41.32.5\n)\n\n => Array\n(\n => 203.90.82.237\n)\n\n => Array\n(\n => 125.63.124.238\n)\n\n => Array\n(\n => 103.232.128.78\n)\n\n => Array\n(\n => 106.197.14.227\n)\n\n => Array\n(\n => 81.17.242.244\n)\n\n => Array\n(\n => 81.19.210.179\n)\n\n => Array\n(\n => 103.134.94.98\n)\n\n => Array\n(\n => 110.38.0.86\n)\n\n => Array\n(\n => 103.10.224.195\n)\n\n => Array\n(\n => 45.118.166.89\n)\n\n => Array\n(\n => 115.186.186.68\n)\n\n => Array\n(\n => 138.197.129.237\n)\n\n => Array\n(\n => 14.247.162.52\n)\n\n => Array\n(\n => 103.255.4.5\n)\n\n => Array\n(\n => 14.167.188.254\n)\n\n => Array\n(\n => 5.62.59.54\n)\n\n => Array\n(\n => 27.122.14.80\n)\n\n => Array\n(\n => 39.53.240.21\n)\n\n => Array\n(\n => 39.53.241.243\n)\n\n => Array\n(\n => 117.230.130.161\n)\n\n => Array\n(\n => 118.71.191.149\n)\n\n => Array\n(\n => 5.188.95.54\n)\n\n => Array\n(\n => 66.45.250.27\n)\n\n => Array\n(\n => 106.215.6.175\n)\n\n => Array\n(\n => 27.122.14.86\n)\n\n => Array\n(\n => 103.255.4.51\n)\n\n => Array\n(\n => 101.50.93.119\n)\n\n => Array\n(\n => 137.97.183.51\n)\n\n => Array\n(\n => 117.217.204.185\n)\n\n => Array\n(\n => 95.104.106.82\n)\n\n => Array\n(\n => 5.62.56.211\n)\n\n => Array\n(\n => 103.104.181.214\n)\n\n => Array\n(\n => 36.72.214.243\n)\n\n => Array\n(\n => 5.62.62.219\n)\n\n => Array\n(\n => 110.36.202.4\n)\n\n => Array\n(\n => 103.255.4.253\n)\n\n => Array\n(\n => 110.172.138.61\n)\n\n => Array\n(\n => 159.203.24.195\n)\n\n => Array\n(\n => 13.229.88.42\n)\n\n => Array\n(\n => 59.153.235.20\n)\n\n => Array\n(\n => 171.236.169.32\n)\n\n => Array\n(\n => 14.231.85.206\n)\n\n => Array\n(\n => 119.152.54.103\n)\n\n => Array\n(\n => 103.80.117.202\n)\n\n => Array\n(\n => 223.179.157.75\n)\n\n => Array\n(\n => 122.173.68.249\n)\n\n => Array\n(\n => 188.163.72.113\n)\n\n => Array\n(\n => 119.155.20.164\n)\n\n => Array\n(\n => 103.121.43.68\n)\n\n => Array\n(\n => 5.62.58.6\n)\n\n => Array\n(\n => 203.122.40.154\n)\n\n => Array\n(\n => 222.254.96.203\n)\n\n => Array\n(\n => 103.83.148.167\n)\n\n => Array\n(\n => 103.87.251.226\n)\n\n => Array\n(\n => 123.24.129.24\n)\n\n => Array\n(\n => 137.97.83.8\n)\n\n => Array\n(\n => 223.225.33.132\n)\n\n => Array\n(\n => 128.76.175.190\n)\n\n => Array\n(\n => 195.85.219.32\n)\n\n => Array\n(\n => 139.167.102.93\n)\n\n => Array\n(\n => 49.15.198.253\n)\n\n => Array\n(\n => 45.152.183.172\n)\n\n => Array\n(\n => 42.106.180.136\n)\n\n => Array\n(\n => 95.142.120.9\n)\n\n => Array\n(\n => 139.167.236.4\n)\n\n => Array\n(\n => 159.65.72.167\n)\n\n => Array\n(\n => 49.15.89.2\n)\n\n => Array\n(\n => 42.201.161.195\n)\n\n => Array\n(\n => 27.97.210.38\n)\n\n => Array\n(\n => 171.241.45.19\n)\n\n => Array\n(\n => 42.108.2.18\n)\n\n => Array\n(\n => 171.236.40.68\n)\n\n => Array\n(\n => 110.93.82.102\n)\n\n => Array\n(\n => 43.225.24.186\n)\n\n => Array\n(\n => 117.230.189.119\n)\n\n => Array\n(\n => 124.123.147.187\n)\n\n => Array\n(\n => 216.151.184.250\n)\n\n => Array\n(\n => 49.15.133.16\n)\n\n => Array\n(\n => 49.15.220.74\n)\n\n => Array\n(\n => 157.37.221.246\n)\n\n => Array\n(\n => 176.124.233.112\n)\n\n => Array\n(\n => 118.71.167.40\n)\n\n => Array\n(\n => 182.185.213.161\n)\n\n => Array\n(\n => 47.31.79.248\n)\n\n => Array\n(\n => 223.179.238.192\n)\n\n => Array\n(\n => 79.110.128.219\n)\n\n => Array\n(\n => 106.210.42.111\n)\n\n => Array\n(\n => 47.247.214.229\n)\n\n => Array\n(\n => 193.0.220.108\n)\n\n => Array\n(\n => 1.39.206.254\n)\n\n => Array\n(\n => 123.201.77.38\n)\n\n => Array\n(\n => 115.178.207.21\n)\n\n => Array\n(\n => 37.111.202.92\n)\n\n => Array\n(\n => 49.14.179.243\n)\n\n => Array\n(\n => 117.230.145.171\n)\n\n => Array\n(\n => 171.229.242.96\n)\n\n => Array\n(\n => 27.59.174.209\n)\n\n => Array\n(\n => 1.38.202.211\n)\n\n => Array\n(\n => 157.37.128.46\n)\n\n => Array\n(\n => 49.15.94.80\n)\n\n => Array\n(\n => 123.25.46.147\n)\n\n => Array\n(\n => 117.230.170.185\n)\n\n => Array\n(\n => 5.62.16.19\n)\n\n => Array\n(\n => 103.18.22.25\n)\n\n => Array\n(\n => 103.46.200.132\n)\n\n => Array\n(\n => 27.97.165.126\n)\n\n => Array\n(\n => 117.230.54.241\n)\n\n => Array\n(\n => 27.97.209.76\n)\n\n => Array\n(\n => 47.31.182.109\n)\n\n => Array\n(\n => 47.30.223.221\n)\n\n => Array\n(\n => 103.31.94.82\n)\n\n => Array\n(\n => 103.211.14.45\n)\n\n => Array\n(\n => 171.49.233.58\n)\n\n => Array\n(\n => 65.49.126.95\n)\n\n => Array\n(\n => 69.255.101.170\n)\n\n => Array\n(\n => 27.56.224.67\n)\n\n => Array\n(\n => 117.230.146.86\n)\n\n => Array\n(\n => 27.59.154.52\n)\n\n => Array\n(\n => 132.154.114.10\n)\n\n => Array\n(\n => 182.186.77.60\n)\n\n => Array\n(\n => 117.230.136.74\n)\n\n => Array\n(\n => 43.251.94.253\n)\n\n => Array\n(\n => 103.79.168.225\n)\n\n => Array\n(\n => 117.230.56.51\n)\n\n => Array\n(\n => 27.97.187.45\n)\n\n => Array\n(\n => 137.97.190.61\n)\n\n => Array\n(\n => 193.0.220.26\n)\n\n => Array\n(\n => 49.36.137.62\n)\n\n => Array\n(\n => 47.30.189.248\n)\n\n => Array\n(\n => 109.169.23.84\n)\n\n => Array\n(\n => 111.119.185.46\n)\n\n => Array\n(\n => 103.83.148.246\n)\n\n => Array\n(\n => 157.32.119.138\n)\n\n => Array\n(\n => 5.62.41.53\n)\n\n => Array\n(\n => 47.8.243.236\n)\n\n => Array\n(\n => 112.79.158.69\n)\n\n => Array\n(\n => 180.92.148.218\n)\n\n => Array\n(\n => 157.36.162.154\n)\n\n => Array\n(\n => 39.46.114.47\n)\n\n => Array\n(\n => 117.230.173.250\n)\n\n => Array\n(\n => 117.230.155.188\n)\n\n => Array\n(\n => 193.0.220.17\n)\n\n => Array\n(\n => 117.230.171.166\n)\n\n => Array\n(\n => 49.34.59.228\n)\n\n => Array\n(\n => 111.88.197.247\n)\n\n => Array\n(\n => 47.31.156.112\n)\n\n => Array\n(\n => 137.97.64.180\n)\n\n => Array\n(\n => 14.244.227.18\n)\n\n => Array\n(\n => 113.167.158.8\n)\n\n => Array\n(\n => 39.37.175.189\n)\n\n => Array\n(\n => 139.167.211.8\n)\n\n => Array\n(\n => 73.120.85.235\n)\n\n => Array\n(\n => 104.236.195.72\n)\n\n => Array\n(\n => 27.97.190.71\n)\n\n => Array\n(\n => 79.46.170.222\n)\n\n => Array\n(\n => 102.185.244.207\n)\n\n => Array\n(\n => 37.111.136.30\n)\n\n => Array\n(\n => 50.7.93.28\n)\n\n => Array\n(\n => 110.54.251.43\n)\n\n => Array\n(\n => 49.36.143.40\n)\n\n => Array\n(\n => 103.130.112.185\n)\n\n => Array\n(\n => 37.111.139.202\n)\n\n => Array\n(\n => 49.36.139.108\n)\n\n => Array\n(\n => 37.111.136.179\n)\n\n => Array\n(\n => 123.17.165.77\n)\n\n => Array\n(\n => 49.207.143.206\n)\n\n => Array\n(\n => 39.53.80.149\n)\n\n => Array\n(\n => 223.188.71.214\n)\n\n => Array\n(\n => 1.39.222.233\n)\n\n => Array\n(\n => 117.230.9.85\n)\n\n => Array\n(\n => 103.251.245.216\n)\n\n => Array\n(\n => 122.169.133.145\n)\n\n => Array\n(\n => 43.250.165.57\n)\n\n => Array\n(\n => 39.44.13.235\n)\n\n => Array\n(\n => 157.47.181.2\n)\n\n => Array\n(\n => 27.56.203.50\n)\n\n => Array\n(\n => 191.96.97.58\n)\n\n => Array\n(\n => 111.88.107.172\n)\n\n => Array\n(\n => 113.193.198.136\n)\n\n => Array\n(\n => 117.230.172.175\n)\n\n => Array\n(\n => 191.96.182.239\n)\n\n => Array\n(\n => 2.58.46.28\n)\n\n => Array\n(\n => 183.83.253.87\n)\n\n => Array\n(\n => 49.15.139.242\n)\n\n => Array\n(\n => 42.107.220.236\n)\n\n => Array\n(\n => 14.192.53.196\n)\n\n => Array\n(\n => 42.119.212.202\n)\n\n => Array\n(\n => 192.158.234.45\n)\n\n => Array\n(\n => 49.149.102.192\n)\n\n => Array\n(\n => 47.8.170.17\n)\n\n => Array\n(\n => 117.197.13.247\n)\n\n => Array\n(\n => 116.74.34.44\n)\n\n => Array\n(\n => 103.79.249.163\n)\n\n => Array\n(\n => 182.189.95.70\n)\n\n => Array\n(\n => 137.59.218.118\n)\n\n => Array\n(\n => 103.79.170.243\n)\n\n => Array\n(\n => 39.40.54.25\n)\n\n => Array\n(\n => 119.155.40.170\n)\n\n => Array\n(\n => 1.39.212.157\n)\n\n => Array\n(\n => 70.127.59.89\n)\n\n => Array\n(\n => 14.171.22.58\n)\n\n => Array\n(\n => 194.44.167.141\n)\n\n => Array\n(\n => 111.88.179.154\n)\n\n => Array\n(\n => 117.230.140.232\n)\n\n => Array\n(\n => 137.97.96.128\n)\n\n => Array\n(\n => 198.16.66.123\n)\n\n => Array\n(\n => 106.198.44.193\n)\n\n => Array\n(\n => 119.153.45.75\n)\n\n => Array\n(\n => 49.15.242.208\n)\n\n => Array\n(\n => 119.155.241.20\n)\n\n => Array\n(\n => 106.223.109.155\n)\n\n => Array\n(\n => 119.160.119.245\n)\n\n => Array\n(\n => 106.215.81.160\n)\n\n => Array\n(\n => 1.39.192.211\n)\n\n => Array\n(\n => 223.230.35.208\n)\n\n => Array\n(\n => 39.59.4.158\n)\n\n => Array\n(\n => 43.231.57.234\n)\n\n => Array\n(\n => 60.254.78.193\n)\n\n => Array\n(\n => 122.170.224.87\n)\n\n => Array\n(\n => 117.230.22.141\n)\n\n => Array\n(\n => 119.152.107.211\n)\n\n => Array\n(\n => 103.87.192.206\n)\n\n => Array\n(\n => 39.45.244.47\n)\n\n => Array\n(\n => 50.72.141.94\n)\n\n => Array\n(\n => 39.40.6.128\n)\n\n => Array\n(\n => 39.45.180.186\n)\n\n => Array\n(\n => 49.207.131.233\n)\n\n => Array\n(\n => 139.59.69.142\n)\n\n => Array\n(\n => 111.119.187.29\n)\n\n => Array\n(\n => 119.153.40.69\n)\n\n => Array\n(\n => 49.36.133.64\n)\n\n => Array\n(\n => 103.255.4.249\n)\n\n => Array\n(\n => 198.144.154.15\n)\n\n => Array\n(\n => 1.22.46.172\n)\n\n => Array\n(\n => 103.255.5.46\n)\n\n => Array\n(\n => 27.56.195.188\n)\n\n => Array\n(\n => 203.101.167.53\n)\n\n => Array\n(\n => 117.230.62.195\n)\n\n => Array\n(\n => 103.240.194.186\n)\n\n => Array\n(\n => 107.170.166.118\n)\n\n => Array\n(\n => 101.53.245.80\n)\n\n => Array\n(\n => 157.43.13.208\n)\n\n => Array\n(\n => 137.97.100.77\n)\n\n => Array\n(\n => 47.31.150.208\n)\n\n => Array\n(\n => 137.59.222.65\n)\n\n => Array\n(\n => 103.85.127.250\n)\n\n => Array\n(\n => 103.214.119.32\n)\n\n => Array\n(\n => 182.255.49.52\n)\n\n => Array\n(\n => 103.75.247.72\n)\n\n => Array\n(\n => 103.85.125.250\n)\n\n => Array\n(\n => 183.83.253.167\n)\n\n => Array\n(\n => 1.39.222.111\n)\n\n => Array\n(\n => 111.119.185.9\n)\n\n => Array\n(\n => 111.119.187.10\n)\n\n => Array\n(\n => 39.37.147.144\n)\n\n => Array\n(\n => 103.200.198.183\n)\n\n => Array\n(\n => 1.39.222.18\n)\n\n => Array\n(\n => 198.8.80.103\n)\n\n => Array\n(\n => 42.108.1.243\n)\n\n => Array\n(\n => 111.119.187.16\n)\n\n => Array\n(\n => 39.40.241.8\n)\n\n => Array\n(\n => 122.169.150.158\n)\n\n => Array\n(\n => 39.40.215.119\n)\n\n => Array\n(\n => 103.255.5.77\n)\n\n => Array\n(\n => 157.38.108.196\n)\n\n => Array\n(\n => 103.255.4.67\n)\n\n => Array\n(\n => 5.62.60.62\n)\n\n => Array\n(\n => 39.37.146.202\n)\n\n => Array\n(\n => 110.138.6.221\n)\n\n => Array\n(\n => 49.36.143.88\n)\n\n => Array\n(\n => 37.1.215.39\n)\n\n => Array\n(\n => 27.106.59.190\n)\n\n => Array\n(\n => 139.167.139.41\n)\n\n => Array\n(\n => 114.142.166.179\n)\n\n => Array\n(\n => 223.225.240.112\n)\n\n => Array\n(\n => 103.255.5.36\n)\n\n => Array\n(\n => 175.136.1.48\n)\n\n => Array\n(\n => 103.82.80.166\n)\n\n => Array\n(\n => 182.185.196.126\n)\n\n => Array\n(\n => 157.43.45.76\n)\n\n => Array\n(\n => 119.152.132.49\n)\n\n => Array\n(\n => 5.62.62.162\n)\n\n => Array\n(\n => 103.255.4.39\n)\n\n => Array\n(\n => 202.5.144.153\n)\n\n => Array\n(\n => 1.39.223.210\n)\n\n => Array\n(\n => 92.38.176.154\n)\n\n => Array\n(\n => 117.230.186.142\n)\n\n => Array\n(\n => 183.83.39.123\n)\n\n => Array\n(\n => 182.185.156.76\n)\n\n => Array\n(\n => 104.236.74.212\n)\n\n => Array\n(\n => 107.170.145.187\n)\n\n => Array\n(\n => 117.102.7.98\n)\n\n => Array\n(\n => 137.59.220.0\n)\n\n => Array\n(\n => 157.47.222.14\n)\n\n => Array\n(\n => 47.15.206.82\n)\n\n => Array\n(\n => 117.230.159.99\n)\n\n => Array\n(\n => 117.230.175.151\n)\n\n => Array\n(\n => 157.50.97.18\n)\n\n => Array\n(\n => 117.230.47.164\n)\n\n => Array\n(\n => 77.111.244.34\n)\n\n => Array\n(\n => 139.167.189.131\n)\n\n => Array\n(\n => 1.39.204.103\n)\n\n => Array\n(\n => 117.230.58.0\n)\n\n => Array\n(\n => 182.185.226.66\n)\n\n => Array\n(\n => 115.42.70.119\n)\n\n => Array\n(\n => 171.48.114.134\n)\n\n => Array\n(\n => 144.34.218.75\n)\n\n => Array\n(\n => 199.58.164.135\n)\n\n => Array\n(\n => 101.53.228.151\n)\n\n => Array\n(\n => 117.230.50.57\n)\n\n => Array\n(\n => 223.225.138.84\n)\n\n => Array\n(\n => 110.225.67.65\n)\n\n => Array\n(\n => 47.15.200.39\n)\n\n => Array\n(\n => 39.42.20.127\n)\n\n => Array\n(\n => 117.97.241.81\n)\n\n => Array\n(\n => 111.119.185.11\n)\n\n => Array\n(\n => 103.100.5.94\n)\n\n => Array\n(\n => 103.25.137.69\n)\n\n => Array\n(\n => 47.15.197.159\n)\n\n => Array\n(\n => 223.188.176.122\n)\n\n => Array\n(\n => 27.4.175.80\n)\n\n => Array\n(\n => 181.215.43.82\n)\n\n => Array\n(\n => 27.56.228.157\n)\n\n => Array\n(\n => 117.230.19.19\n)\n\n => Array\n(\n => 47.15.208.71\n)\n\n => Array\n(\n => 119.155.21.176\n)\n\n => Array\n(\n => 47.15.234.202\n)\n\n => Array\n(\n => 117.230.144.135\n)\n\n => Array\n(\n => 112.79.139.199\n)\n\n => Array\n(\n => 116.75.246.41\n)\n\n => Array\n(\n => 117.230.177.126\n)\n\n => Array\n(\n => 212.103.48.134\n)\n\n => Array\n(\n => 102.69.228.78\n)\n\n => Array\n(\n => 117.230.37.118\n)\n\n => Array\n(\n => 175.143.61.75\n)\n\n => Array\n(\n => 139.167.56.138\n)\n\n => Array\n(\n => 58.145.189.250\n)\n\n => Array\n(\n => 103.255.5.65\n)\n\n => Array\n(\n => 39.37.153.182\n)\n\n => Array\n(\n => 157.43.85.106\n)\n\n => Array\n(\n => 185.209.178.77\n)\n\n => Array\n(\n => 1.39.212.45\n)\n\n => Array\n(\n => 103.72.7.16\n)\n\n => Array\n(\n => 117.97.185.244\n)\n\n => Array\n(\n => 117.230.59.106\n)\n\n => Array\n(\n => 137.97.121.103\n)\n\n => Array\n(\n => 103.82.123.215\n)\n\n => Array\n(\n => 103.68.217.248\n)\n\n => Array\n(\n => 157.39.27.175\n)\n\n => Array\n(\n => 47.31.100.249\n)\n\n => Array\n(\n => 14.171.232.139\n)\n\n => Array\n(\n => 103.31.93.208\n)\n\n => Array\n(\n => 117.230.56.77\n)\n\n => Array\n(\n => 124.182.25.124\n)\n\n => Array\n(\n => 106.66.191.242\n)\n\n => Array\n(\n => 175.107.237.25\n)\n\n => Array\n(\n => 119.155.1.27\n)\n\n => Array\n(\n => 72.255.6.24\n)\n\n => Array\n(\n => 192.140.152.223\n)\n\n => Array\n(\n => 212.103.48.136\n)\n\n => Array\n(\n => 39.45.134.56\n)\n\n => Array\n(\n => 139.167.173.30\n)\n\n => Array\n(\n => 117.230.63.87\n)\n\n => Array\n(\n => 182.189.95.203\n)\n\n => Array\n(\n => 49.204.183.248\n)\n\n => Array\n(\n => 47.31.125.188\n)\n\n => Array\n(\n => 103.252.171.13\n)\n\n => Array\n(\n => 112.198.74.36\n)\n\n => Array\n(\n => 27.109.113.152\n)\n\n => Array\n(\n => 42.112.233.44\n)\n\n => Array\n(\n => 47.31.68.193\n)\n\n => Array\n(\n => 103.252.171.134\n)\n\n => Array\n(\n => 77.123.32.114\n)\n\n => Array\n(\n => 1.38.189.66\n)\n\n => Array\n(\n => 39.37.181.108\n)\n\n => Array\n(\n => 42.106.44.61\n)\n\n => Array\n(\n => 157.36.8.39\n)\n\n => Array\n(\n => 223.238.41.53\n)\n\n => Array\n(\n => 202.89.77.10\n)\n\n => Array\n(\n => 117.230.150.68\n)\n\n => Array\n(\n => 175.176.87.60\n)\n\n => Array\n(\n => 137.97.117.87\n)\n\n => Array\n(\n => 132.154.123.11\n)\n\n => Array\n(\n => 45.113.124.141\n)\n\n => Array\n(\n => 103.87.56.203\n)\n\n => Array\n(\n => 159.89.171.156\n)\n\n => Array\n(\n => 119.155.53.88\n)\n\n => Array\n(\n => 222.252.107.215\n)\n\n => Array\n(\n => 132.154.75.238\n)\n\n => Array\n(\n => 122.183.41.168\n)\n\n => Array\n(\n => 42.106.254.158\n)\n\n => Array\n(\n => 103.252.171.37\n)\n\n => Array\n(\n => 202.59.13.180\n)\n\n => Array\n(\n => 37.111.139.137\n)\n\n => Array\n(\n => 39.42.93.25\n)\n\n => Array\n(\n => 118.70.177.156\n)\n\n => Array\n(\n => 117.230.148.64\n)\n\n => Array\n(\n => 39.42.15.194\n)\n\n => Array\n(\n => 137.97.176.86\n)\n\n => Array\n(\n => 106.210.102.113\n)\n\n => Array\n(\n => 39.59.84.236\n)\n\n => Array\n(\n => 49.206.187.177\n)\n\n => Array\n(\n => 117.230.133.11\n)\n\n => Array\n(\n => 42.106.253.173\n)\n\n => Array\n(\n => 178.62.102.23\n)\n\n => Array\n(\n => 111.92.76.175\n)\n\n => Array\n(\n => 132.154.86.45\n)\n\n => Array\n(\n => 117.230.128.39\n)\n\n => Array\n(\n => 117.230.53.165\n)\n\n => Array\n(\n => 49.37.200.171\n)\n\n => Array\n(\n => 104.236.213.230\n)\n\n => Array\n(\n => 103.140.30.81\n)\n\n => Array\n(\n => 59.103.104.117\n)\n\n => Array\n(\n => 65.49.126.79\n)\n\n => Array\n(\n => 202.59.12.251\n)\n\n => Array\n(\n => 37.111.136.17\n)\n\n => Array\n(\n => 163.53.85.67\n)\n\n => Array\n(\n => 123.16.240.73\n)\n\n => Array\n(\n => 103.211.14.183\n)\n\n => Array\n(\n => 103.248.93.211\n)\n\n => Array\n(\n => 116.74.59.127\n)\n\n => Array\n(\n => 137.97.169.254\n)\n\n => Array\n(\n => 113.177.79.100\n)\n\n => Array\n(\n => 74.82.60.187\n)\n\n => Array\n(\n => 117.230.157.66\n)\n\n => Array\n(\n => 169.149.194.241\n)\n\n => Array\n(\n => 117.230.156.11\n)\n\n => Array\n(\n => 202.59.12.157\n)\n\n => Array\n(\n => 42.106.181.25\n)\n\n => Array\n(\n => 202.59.13.78\n)\n\n => Array\n(\n => 39.37.153.32\n)\n\n => Array\n(\n => 177.188.216.175\n)\n\n => Array\n(\n => 222.252.53.165\n)\n\n => Array\n(\n => 37.139.23.89\n)\n\n => Array\n(\n => 117.230.139.150\n)\n\n => Array\n(\n => 104.131.176.234\n)\n\n => Array\n(\n => 42.106.181.117\n)\n\n => Array\n(\n => 117.230.180.94\n)\n\n => Array\n(\n => 180.190.171.5\n)\n\n => Array\n(\n => 150.129.165.185\n)\n\n => Array\n(\n => 51.15.0.150\n)\n\n => Array\n(\n => 42.111.4.84\n)\n\n => Array\n(\n => 74.82.60.116\n)\n\n => Array\n(\n => 137.97.121.165\n)\n\n => Array\n(\n => 64.62.187.194\n)\n\n => Array\n(\n => 137.97.106.162\n)\n\n => Array\n(\n => 137.97.92.46\n)\n\n => Array\n(\n => 137.97.170.25\n)\n\n => Array\n(\n => 103.104.192.100\n)\n\n => Array\n(\n => 185.246.211.34\n)\n\n => Array\n(\n => 119.160.96.78\n)\n\n => Array\n(\n => 212.103.48.152\n)\n\n => Array\n(\n => 183.83.153.90\n)\n\n => Array\n(\n => 117.248.150.41\n)\n\n => Array\n(\n => 185.240.246.180\n)\n\n => Array\n(\n => 162.253.131.125\n)\n\n => Array\n(\n => 117.230.153.217\n)\n\n => Array\n(\n => 117.230.169.1\n)\n\n => Array\n(\n => 49.15.138.247\n)\n\n => Array\n(\n => 117.230.37.110\n)\n\n => Array\n(\n => 14.167.188.75\n)\n\n => Array\n(\n => 169.149.239.93\n)\n\n => Array\n(\n => 103.216.176.91\n)\n\n => Array\n(\n => 117.230.12.126\n)\n\n => Array\n(\n => 184.75.209.110\n)\n\n => Array\n(\n => 117.230.6.60\n)\n\n => Array\n(\n => 117.230.135.132\n)\n\n => Array\n(\n => 31.179.29.109\n)\n\n => Array\n(\n => 74.121.188.186\n)\n\n => Array\n(\n => 117.230.35.5\n)\n\n => Array\n(\n => 111.92.74.239\n)\n\n => Array\n(\n => 104.245.144.236\n)\n\n => Array\n(\n => 39.50.22.100\n)\n\n => Array\n(\n => 47.31.190.23\n)\n\n => Array\n(\n => 157.44.73.187\n)\n\n => Array\n(\n => 117.230.8.91\n)\n\n => Array\n(\n => 157.32.18.2\n)\n\n => Array\n(\n => 111.119.187.43\n)\n\n => Array\n(\n => 203.101.185.246\n)\n\n => Array\n(\n => 5.62.34.22\n)\n\n => Array\n(\n => 122.8.143.76\n)\n\n => Array\n(\n => 115.186.2.187\n)\n\n => Array\n(\n => 202.142.110.89\n)\n\n => Array\n(\n => 157.50.61.254\n)\n\n => Array\n(\n => 223.182.211.185\n)\n\n => Array\n(\n => 103.85.125.210\n)\n\n => Array\n(\n => 103.217.133.147\n)\n\n => Array\n(\n => 103.60.196.217\n)\n\n => Array\n(\n => 157.44.238.6\n)\n\n => Array\n(\n => 117.196.225.68\n)\n\n => Array\n(\n => 104.254.92.52\n)\n\n => Array\n(\n => 39.42.46.72\n)\n\n => Array\n(\n => 221.132.119.36\n)\n\n => Array\n(\n => 111.92.77.47\n)\n\n => Array\n(\n => 223.225.19.152\n)\n\n => Array\n(\n => 159.89.121.217\n)\n\n => Array\n(\n => 39.53.221.205\n)\n\n => Array\n(\n => 193.34.217.28\n)\n\n => Array\n(\n => 139.167.206.36\n)\n\n => Array\n(\n => 96.40.10.7\n)\n\n => Array\n(\n => 124.29.198.123\n)\n\n => Array\n(\n => 117.196.226.1\n)\n\n => Array\n(\n => 106.200.85.135\n)\n\n => Array\n(\n => 106.223.180.28\n)\n\n => Array\n(\n => 103.49.232.110\n)\n\n => Array\n(\n => 139.167.208.50\n)\n\n => Array\n(\n => 139.167.201.102\n)\n\n => Array\n(\n => 14.244.224.237\n)\n\n => Array\n(\n => 103.140.31.187\n)\n\n => Array\n(\n => 49.36.134.136\n)\n\n => Array\n(\n => 160.16.61.75\n)\n\n => Array\n(\n => 103.18.22.228\n)\n\n => Array\n(\n => 47.9.74.121\n)\n\n => Array\n(\n => 47.30.216.159\n)\n\n => Array\n(\n => 117.248.150.78\n)\n\n => Array\n(\n => 5.62.34.17\n)\n\n => Array\n(\n => 139.167.247.181\n)\n\n => Array\n(\n => 193.176.84.29\n)\n\n => Array\n(\n => 103.195.201.121\n)\n\n => Array\n(\n => 89.187.175.115\n)\n\n => Array\n(\n => 137.97.81.251\n)\n\n => Array\n(\n => 157.51.147.62\n)\n\n => Array\n(\n => 103.104.192.42\n)\n\n => Array\n(\n => 14.171.235.26\n)\n\n => Array\n(\n => 178.62.89.121\n)\n\n => Array\n(\n => 119.155.4.164\n)\n\n => Array\n(\n => 43.250.241.89\n)\n\n => Array\n(\n => 103.31.100.80\n)\n\n => Array\n(\n => 119.155.7.44\n)\n\n => Array\n(\n => 106.200.73.114\n)\n\n => Array\n(\n => 77.111.246.18\n)\n\n => Array\n(\n => 157.39.99.247\n)\n\n => Array\n(\n => 103.77.42.132\n)\n\n => Array\n(\n => 74.115.214.133\n)\n\n => Array\n(\n => 117.230.49.224\n)\n\n => Array\n(\n => 39.50.108.238\n)\n\n => Array\n(\n => 47.30.221.45\n)\n\n => Array\n(\n => 95.133.164.235\n)\n\n => Array\n(\n => 212.103.48.141\n)\n\n => Array\n(\n => 104.194.218.147\n)\n\n => Array\n(\n => 106.200.88.241\n)\n\n => Array\n(\n => 182.189.212.211\n)\n\n => Array\n(\n => 39.50.142.129\n)\n\n => Array\n(\n => 77.234.43.133\n)\n\n => Array\n(\n => 49.15.192.58\n)\n\n => Array\n(\n => 119.153.37.55\n)\n\n => Array\n(\n => 27.56.156.128\n)\n\n => Array\n(\n => 168.211.4.33\n)\n\n => Array\n(\n => 203.81.236.239\n)\n\n => Array\n(\n => 157.51.149.61\n)\n\n => Array\n(\n => 117.230.45.255\n)\n\n => Array\n(\n => 39.42.106.169\n)\n\n => Array\n(\n => 27.71.89.76\n)\n\n => Array\n(\n => 123.27.109.167\n)\n\n => Array\n(\n => 106.202.21.91\n)\n\n => Array\n(\n => 103.85.125.206\n)\n\n => Array\n(\n => 122.173.250.229\n)\n\n => Array\n(\n => 106.210.102.77\n)\n\n => Array\n(\n => 134.209.47.156\n)\n\n => Array\n(\n => 45.127.232.12\n)\n\n => Array\n(\n => 45.134.224.11\n)\n\n => Array\n(\n => 27.71.89.122\n)\n\n => Array\n(\n => 157.38.105.117\n)\n\n => Array\n(\n => 191.96.73.215\n)\n\n => Array\n(\n => 171.241.92.31\n)\n\n => Array\n(\n => 49.149.104.235\n)\n\n => Array\n(\n => 104.229.247.252\n)\n\n => Array\n(\n => 111.92.78.42\n)\n\n => Array\n(\n => 47.31.88.183\n)\n\n => Array\n(\n => 171.61.203.234\n)\n\n => Array\n(\n => 183.83.226.192\n)\n\n => Array\n(\n => 119.157.107.45\n)\n\n => Array\n(\n => 91.202.163.205\n)\n\n => Array\n(\n => 157.43.62.108\n)\n\n => Array\n(\n => 182.68.248.92\n)\n\n => Array\n(\n => 157.32.251.234\n)\n\n => Array\n(\n => 110.225.196.188\n)\n\n => Array\n(\n => 27.71.89.98\n)\n\n => Array\n(\n => 175.176.87.3\n)\n\n => Array\n(\n => 103.55.90.208\n)\n\n => Array\n(\n => 47.31.41.163\n)\n\n => Array\n(\n => 223.182.195.5\n)\n\n => Array\n(\n => 122.52.101.166\n)\n\n => Array\n(\n => 103.207.82.154\n)\n\n => Array\n(\n => 171.224.178.84\n)\n\n => Array\n(\n => 110.225.235.187\n)\n\n => Array\n(\n => 119.160.97.248\n)\n\n => Array\n(\n => 116.90.101.121\n)\n\n => Array\n(\n => 182.255.48.154\n)\n\n => Array\n(\n => 180.149.221.140\n)\n\n => Array\n(\n => 194.44.79.13\n)\n\n => Array\n(\n => 47.247.18.3\n)\n\n => Array\n(\n => 27.56.242.95\n)\n\n => Array\n(\n => 41.60.236.83\n)\n\n => Array\n(\n => 122.164.162.7\n)\n\n => Array\n(\n => 71.136.154.5\n)\n\n => Array\n(\n => 132.154.119.122\n)\n\n => Array\n(\n => 110.225.80.135\n)\n\n => Array\n(\n => 84.17.61.143\n)\n\n => Array\n(\n => 119.160.102.244\n)\n\n => Array\n(\n => 47.31.27.44\n)\n\n => Array\n(\n => 27.71.89.160\n)\n\n => Array\n(\n => 107.175.38.101\n)\n\n => Array\n(\n => 195.211.150.152\n)\n\n => Array\n(\n => 157.35.250.255\n)\n\n => Array\n(\n => 111.119.187.53\n)\n\n => Array\n(\n => 119.152.97.213\n)\n\n => Array\n(\n => 180.92.143.145\n)\n\n => Array\n(\n => 72.255.61.46\n)\n\n => Array\n(\n => 47.8.183.6\n)\n\n => Array\n(\n => 92.38.148.53\n)\n\n => Array\n(\n => 122.173.194.72\n)\n\n => Array\n(\n => 183.83.226.97\n)\n\n => Array\n(\n => 122.173.73.231\n)\n\n => Array\n(\n => 119.160.101.101\n)\n\n => Array\n(\n => 93.177.75.174\n)\n\n => Array\n(\n => 115.97.196.70\n)\n\n => Array\n(\n => 111.119.187.35\n)\n\n => Array\n(\n => 103.226.226.154\n)\n\n => Array\n(\n => 103.244.172.73\n)\n\n => Array\n(\n => 119.155.61.222\n)\n\n => Array\n(\n => 157.37.184.92\n)\n\n => Array\n(\n => 119.160.103.204\n)\n\n => Array\n(\n => 175.176.87.21\n)\n\n => Array\n(\n => 185.51.228.246\n)\n\n => Array\n(\n => 103.250.164.255\n)\n\n => Array\n(\n => 122.181.194.16\n)\n\n => Array\n(\n => 157.37.230.232\n)\n\n => Array\n(\n => 103.105.236.6\n)\n\n => Array\n(\n => 111.88.128.174\n)\n\n => Array\n(\n => 37.111.139.82\n)\n\n => Array\n(\n => 39.34.133.52\n)\n\n => Array\n(\n => 113.177.79.80\n)\n\n => Array\n(\n => 180.183.71.184\n)\n\n => Array\n(\n => 116.72.218.255\n)\n\n => Array\n(\n => 119.160.117.26\n)\n\n => Array\n(\n => 158.222.0.252\n)\n\n => Array\n(\n => 23.227.142.146\n)\n\n => Array\n(\n => 122.162.152.152\n)\n\n => Array\n(\n => 103.255.149.106\n)\n\n => Array\n(\n => 104.236.53.155\n)\n\n => Array\n(\n => 119.160.119.155\n)\n\n => Array\n(\n => 175.107.214.244\n)\n\n => Array\n(\n => 102.7.116.7\n)\n\n => Array\n(\n => 111.88.91.132\n)\n\n => Array\n(\n => 119.157.248.108\n)\n\n => Array\n(\n => 222.252.36.107\n)\n\n => Array\n(\n => 157.46.209.227\n)\n\n => Array\n(\n => 39.40.54.1\n)\n\n => Array\n(\n => 223.225.19.254\n)\n\n => Array\n(\n => 154.72.150.8\n)\n\n => Array\n(\n => 107.181.177.130\n)\n\n => Array\n(\n => 101.50.75.31\n)\n\n => Array\n(\n => 84.17.58.69\n)\n\n => Array\n(\n => 178.62.5.157\n)\n\n => Array\n(\n => 112.206.175.147\n)\n\n => Array\n(\n => 137.97.113.137\n)\n\n => Array\n(\n => 103.53.44.154\n)\n\n => Array\n(\n => 180.92.143.129\n)\n\n => Array\n(\n => 14.231.223.7\n)\n\n => Array\n(\n => 167.88.63.201\n)\n\n => Array\n(\n => 103.140.204.8\n)\n\n => Array\n(\n => 221.121.135.108\n)\n\n => Array\n(\n => 119.160.97.129\n)\n\n => Array\n(\n => 27.5.168.249\n)\n\n => Array\n(\n => 119.160.102.191\n)\n\n => Array\n(\n => 122.162.219.12\n)\n\n => Array\n(\n => 157.50.141.122\n)\n\n => Array\n(\n => 43.245.8.17\n)\n\n => Array\n(\n => 113.181.198.179\n)\n\n => Array\n(\n => 47.30.221.59\n)\n\n => Array\n(\n => 110.38.29.246\n)\n\n => Array\n(\n => 14.192.140.199\n)\n\n => Array\n(\n => 24.68.10.106\n)\n\n => Array\n(\n => 47.30.209.179\n)\n\n => Array\n(\n => 106.223.123.21\n)\n\n => Array\n(\n => 103.224.48.30\n)\n\n => Array\n(\n => 104.131.19.173\n)\n\n => Array\n(\n => 119.157.100.206\n)\n\n => Array\n(\n => 103.10.226.73\n)\n\n => Array\n(\n => 162.208.51.163\n)\n\n => Array\n(\n => 47.30.221.227\n)\n\n => Array\n(\n => 119.160.116.210\n)\n\n => Array\n(\n => 198.16.78.43\n)\n\n => Array\n(\n => 39.44.201.151\n)\n\n => Array\n(\n => 71.63.181.84\n)\n\n => Array\n(\n => 14.142.192.218\n)\n\n => Array\n(\n => 39.34.147.178\n)\n\n => Array\n(\n => 111.92.75.25\n)\n\n => Array\n(\n => 45.135.239.58\n)\n\n => Array\n(\n => 14.232.235.1\n)\n\n => Array\n(\n => 49.144.100.155\n)\n\n => Array\n(\n => 62.182.99.33\n)\n\n => Array\n(\n => 104.243.212.187\n)\n\n => Array\n(\n => 59.97.132.214\n)\n\n => Array\n(\n => 47.9.15.179\n)\n\n => Array\n(\n => 39.44.103.186\n)\n\n => Array\n(\n => 183.83.241.132\n)\n\n => Array\n(\n => 103.41.24.180\n)\n\n => Array\n(\n => 104.238.46.39\n)\n\n => Array\n(\n => 103.79.170.78\n)\n\n => Array\n(\n => 59.103.138.81\n)\n\n => Array\n(\n => 106.198.191.146\n)\n\n => Array\n(\n => 106.198.255.122\n)\n\n => Array\n(\n => 47.31.46.37\n)\n\n => Array\n(\n => 109.169.23.76\n)\n\n => Array\n(\n => 103.143.7.55\n)\n\n => Array\n(\n => 49.207.114.52\n)\n\n => Array\n(\n => 198.54.106.250\n)\n\n => Array\n(\n => 39.50.64.18\n)\n\n => Array\n(\n => 222.252.48.132\n)\n\n => Array\n(\n => 42.201.186.53\n)\n\n => Array\n(\n => 115.97.198.95\n)\n\n => Array\n(\n => 93.76.134.244\n)\n\n => Array\n(\n => 122.173.15.189\n)\n\n => Array\n(\n => 39.62.38.29\n)\n\n => Array\n(\n => 103.201.145.254\n)\n\n => Array\n(\n => 111.119.187.23\n)\n\n => Array\n(\n => 157.50.66.33\n)\n\n => Array\n(\n => 157.49.68.163\n)\n\n => Array\n(\n => 103.85.125.215\n)\n\n => Array\n(\n => 103.255.4.16\n)\n\n => Array\n(\n => 223.181.246.206\n)\n\n => Array\n(\n => 39.40.109.226\n)\n\n => Array\n(\n => 43.225.70.157\n)\n\n => Array\n(\n => 103.211.18.168\n)\n\n => Array\n(\n => 137.59.221.60\n)\n\n => Array\n(\n => 103.81.214.63\n)\n\n => Array\n(\n => 39.35.163.2\n)\n\n => Array\n(\n => 106.205.124.39\n)\n\n => Array\n(\n => 209.99.165.216\n)\n\n => Array\n(\n => 103.75.247.187\n)\n\n => Array\n(\n => 157.46.217.41\n)\n\n => Array\n(\n => 75.186.73.80\n)\n\n => Array\n(\n => 212.103.48.153\n)\n\n => Array\n(\n => 47.31.61.167\n)\n\n => Array\n(\n => 119.152.145.131\n)\n\n => Array\n(\n => 171.76.177.244\n)\n\n => Array\n(\n => 103.135.78.50\n)\n\n => Array\n(\n => 103.79.170.75\n)\n\n => Array\n(\n => 105.160.22.74\n)\n\n => Array\n(\n => 47.31.20.153\n)\n\n => Array\n(\n => 42.107.204.65\n)\n\n => Array\n(\n => 49.207.131.35\n)\n\n => Array\n(\n => 92.38.148.61\n)\n\n => Array\n(\n => 183.83.255.206\n)\n\n => Array\n(\n => 107.181.177.131\n)\n\n => Array\n(\n => 39.40.220.157\n)\n\n => Array\n(\n => 39.41.133.176\n)\n\n => Array\n(\n => 103.81.214.61\n)\n\n => Array\n(\n => 223.235.108.46\n)\n\n => Array\n(\n => 171.241.52.118\n)\n\n => Array\n(\n => 39.57.138.47\n)\n\n => Array\n(\n => 106.204.196.172\n)\n\n => Array\n(\n => 39.53.228.40\n)\n\n => Array\n(\n => 185.242.5.99\n)\n\n => Array\n(\n => 103.255.5.96\n)\n\n => Array\n(\n => 157.46.212.120\n)\n\n => Array\n(\n => 107.181.177.138\n)\n\n => Array\n(\n => 47.30.193.65\n)\n\n => Array\n(\n => 39.37.178.33\n)\n\n => Array\n(\n => 157.46.173.29\n)\n\n => Array\n(\n => 39.57.238.211\n)\n\n => Array\n(\n => 157.37.245.113\n)\n\n => Array\n(\n => 47.30.201.138\n)\n\n => Array\n(\n => 106.204.193.108\n)\n\n => Array\n(\n => 212.103.50.212\n)\n\n => Array\n(\n => 58.65.221.187\n)\n\n => Array\n(\n => 178.62.92.29\n)\n\n => Array\n(\n => 111.92.77.166\n)\n\n => Array\n(\n => 47.30.223.158\n)\n\n => Array\n(\n => 103.224.54.83\n)\n\n => Array\n(\n => 119.153.43.22\n)\n\n => Array\n(\n => 223.181.126.251\n)\n\n => Array\n(\n => 39.42.175.202\n)\n\n => Array\n(\n => 103.224.54.190\n)\n\n => Array\n(\n => 49.36.141.210\n)\n\n => Array\n(\n => 5.62.63.218\n)\n\n => Array\n(\n => 39.59.9.18\n)\n\n => Array\n(\n => 111.88.86.45\n)\n\n => Array\n(\n => 178.54.139.5\n)\n\n => Array\n(\n => 116.68.105.241\n)\n\n => Array\n(\n => 119.160.96.187\n)\n\n => Array\n(\n => 182.189.192.103\n)\n\n => Array\n(\n => 119.160.96.143\n)\n\n => Array\n(\n => 110.225.89.98\n)\n\n => Array\n(\n => 169.149.195.134\n)\n\n => Array\n(\n => 103.238.104.54\n)\n\n => Array\n(\n => 47.30.208.142\n)\n\n => Array\n(\n => 157.46.179.209\n)\n\n => Array\n(\n => 223.235.38.119\n)\n\n => Array\n(\n => 42.106.180.165\n)\n\n => Array\n(\n => 154.122.240.239\n)\n\n => Array\n(\n => 106.223.104.191\n)\n\n => Array\n(\n => 111.93.110.218\n)\n\n => Array\n(\n => 182.183.161.171\n)\n\n => Array\n(\n => 157.44.184.211\n)\n\n => Array\n(\n => 157.50.185.193\n)\n\n => Array\n(\n => 117.230.19.194\n)\n\n => Array\n(\n => 162.243.246.160\n)\n\n => Array\n(\n => 106.223.143.53\n)\n\n => Array\n(\n => 39.59.41.15\n)\n\n => Array\n(\n => 106.210.65.42\n)\n\n => Array\n(\n => 180.243.144.208\n)\n\n => Array\n(\n => 116.68.105.22\n)\n\n => Array\n(\n => 115.42.70.46\n)\n\n => Array\n(\n => 99.72.192.148\n)\n\n => Array\n(\n => 182.183.182.48\n)\n\n => Array\n(\n => 171.48.58.97\n)\n\n => Array\n(\n => 37.120.131.188\n)\n\n => Array\n(\n => 117.99.167.177\n)\n\n => Array\n(\n => 111.92.76.210\n)\n\n => Array\n(\n => 14.192.144.245\n)\n\n => Array\n(\n => 169.149.242.87\n)\n\n => Array\n(\n => 47.30.198.149\n)\n\n => Array\n(\n => 59.103.57.140\n)\n\n => Array\n(\n => 117.230.161.168\n)\n\n => Array\n(\n => 110.225.88.173\n)\n\n => Array\n(\n => 169.149.246.95\n)\n\n => Array\n(\n => 42.106.180.52\n)\n\n => Array\n(\n => 14.231.160.157\n)\n\n => Array\n(\n => 123.27.109.47\n)\n\n => Array\n(\n => 157.46.130.54\n)\n\n => Array\n(\n => 39.42.73.194\n)\n\n => Array\n(\n => 117.230.18.147\n)\n\n => Array\n(\n => 27.59.231.98\n)\n\n => Array\n(\n => 125.209.78.227\n)\n\n => Array\n(\n => 157.34.80.145\n)\n\n => Array\n(\n => 42.201.251.86\n)\n\n => Array\n(\n => 117.230.129.158\n)\n\n => Array\n(\n => 103.82.80.103\n)\n\n => Array\n(\n => 47.9.171.228\n)\n\n => Array\n(\n => 117.230.24.92\n)\n\n => Array\n(\n => 103.129.143.119\n)\n\n => Array\n(\n => 39.40.213.45\n)\n\n => Array\n(\n => 178.92.188.214\n)\n\n => Array\n(\n => 110.235.232.191\n)\n\n => Array\n(\n => 5.62.34.18\n)\n\n => Array\n(\n => 47.30.212.134\n)\n\n => Array\n(\n => 157.42.34.196\n)\n\n => Array\n(\n => 157.32.169.9\n)\n\n => Array\n(\n => 103.255.4.11\n)\n\n => Array\n(\n => 117.230.13.69\n)\n\n => Array\n(\n => 117.230.58.97\n)\n\n => Array\n(\n => 92.52.138.39\n)\n\n => Array\n(\n => 221.132.119.63\n)\n\n => Array\n(\n => 117.97.167.188\n)\n\n => Array\n(\n => 119.153.56.58\n)\n\n => Array\n(\n => 105.50.22.150\n)\n\n => Array\n(\n => 115.42.68.126\n)\n\n => Array\n(\n => 182.189.223.159\n)\n\n => Array\n(\n => 39.59.36.90\n)\n\n => Array\n(\n => 111.92.76.114\n)\n\n => Array\n(\n => 157.47.226.163\n)\n\n => Array\n(\n => 202.47.44.37\n)\n\n => Array\n(\n => 106.51.234.172\n)\n\n => Array\n(\n => 103.101.88.166\n)\n\n => Array\n(\n => 27.6.246.146\n)\n\n => Array\n(\n => 103.255.5.83\n)\n\n => Array\n(\n => 103.98.210.185\n)\n\n => Array\n(\n => 122.173.114.134\n)\n\n => Array\n(\n => 122.173.77.248\n)\n\n => Array\n(\n => 5.62.41.172\n)\n\n => Array\n(\n => 180.178.181.17\n)\n\n => Array\n(\n => 37.120.133.224\n)\n\n => Array\n(\n => 45.131.5.156\n)\n\n => Array\n(\n => 110.39.100.110\n)\n\n => Array\n(\n => 176.110.38.185\n)\n\n => Array\n(\n => 36.255.41.64\n)\n\n => Array\n(\n => 103.104.192.15\n)\n\n => Array\n(\n => 43.245.131.195\n)\n\n => Array\n(\n => 14.248.111.185\n)\n\n => Array\n(\n => 122.173.217.133\n)\n\n => Array\n(\n => 106.223.90.245\n)\n\n => Array\n(\n => 119.153.56.80\n)\n\n => Array\n(\n => 103.7.60.172\n)\n\n => Array\n(\n => 157.46.184.233\n)\n\n => Array\n(\n => 182.190.31.95\n)\n\n => Array\n(\n => 109.87.189.122\n)\n\n => Array\n(\n => 91.74.25.100\n)\n\n => Array\n(\n => 182.185.224.144\n)\n\n => Array\n(\n => 106.223.91.221\n)\n\n => Array\n(\n => 182.190.223.40\n)\n\n => Array\n(\n => 2.58.194.134\n)\n\n => Array\n(\n => 196.246.225.236\n)\n\n => Array\n(\n => 106.223.90.173\n)\n\n => Array\n(\n => 23.239.16.54\n)\n\n => Array\n(\n => 157.46.65.225\n)\n\n => Array\n(\n => 115.186.130.14\n)\n\n => Array\n(\n => 103.85.125.157\n)\n\n => Array\n(\n => 14.248.103.6\n)\n\n => Array\n(\n => 123.24.169.247\n)\n\n => Array\n(\n => 103.130.108.153\n)\n\n => Array\n(\n => 115.42.67.21\n)\n\n => Array\n(\n => 202.166.171.190\n)\n\n => Array\n(\n => 39.37.169.104\n)\n\n => Array\n(\n => 103.82.80.59\n)\n\n => Array\n(\n => 175.107.208.58\n)\n\n => Array\n(\n => 203.192.238.247\n)\n\n => Array\n(\n => 103.217.178.150\n)\n\n => Array\n(\n => 103.66.214.173\n)\n\n => Array\n(\n => 110.93.236.174\n)\n\n => Array\n(\n => 143.189.242.64\n)\n\n => Array\n(\n => 77.111.245.12\n)\n\n => Array\n(\n => 145.239.2.231\n)\n\n => Array\n(\n => 115.186.190.38\n)\n\n => Array\n(\n => 109.169.23.67\n)\n\n => Array\n(\n => 198.16.70.29\n)\n\n => Array\n(\n => 111.92.76.186\n)\n\n => Array\n(\n => 115.42.69.34\n)\n\n => Array\n(\n => 73.61.100.95\n)\n\n => Array\n(\n => 103.129.142.31\n)\n\n => Array\n(\n => 103.255.5.53\n)\n\n => Array\n(\n => 103.76.55.2\n)\n\n => Array\n(\n => 47.9.141.138\n)\n\n => Array\n(\n => 103.55.89.234\n)\n\n => Array\n(\n => 103.223.13.53\n)\n\n => Array\n(\n => 175.158.50.203\n)\n\n => Array\n(\n => 103.255.5.90\n)\n\n => Array\n(\n => 106.223.100.138\n)\n\n => Array\n(\n => 39.37.143.193\n)\n\n => Array\n(\n => 206.189.133.131\n)\n\n => Array\n(\n => 43.224.0.233\n)\n\n => Array\n(\n => 115.186.132.106\n)\n\n => Array\n(\n => 31.43.21.159\n)\n\n => Array\n(\n => 119.155.56.131\n)\n\n => Array\n(\n => 103.82.80.138\n)\n\n => Array\n(\n => 24.87.128.119\n)\n\n => Array\n(\n => 106.210.103.163\n)\n\n => Array\n(\n => 103.82.80.90\n)\n\n => Array\n(\n => 157.46.186.45\n)\n\n => Array\n(\n => 157.44.155.238\n)\n\n => Array\n(\n => 103.119.199.2\n)\n\n => Array\n(\n => 27.97.169.205\n)\n\n => Array\n(\n => 157.46.174.89\n)\n\n => Array\n(\n => 43.250.58.220\n)\n\n => Array\n(\n => 76.189.186.64\n)\n\n => Array\n(\n => 103.255.5.57\n)\n\n => Array\n(\n => 171.61.196.136\n)\n\n => Array\n(\n => 202.47.40.88\n)\n\n => Array\n(\n => 97.118.94.116\n)\n\n => Array\n(\n => 157.44.124.157\n)\n\n => Array\n(\n => 95.142.120.13\n)\n\n => Array\n(\n => 42.201.229.151\n)\n\n => Array\n(\n => 157.46.178.95\n)\n\n => Array\n(\n => 169.149.215.192\n)\n\n => Array\n(\n => 42.111.19.48\n)\n\n => Array\n(\n => 1.38.52.18\n)\n\n => Array\n(\n => 145.239.91.241\n)\n\n => Array\n(\n => 47.31.78.191\n)\n\n => Array\n(\n => 103.77.42.60\n)\n\n => Array\n(\n => 157.46.107.144\n)\n\n => Array\n(\n => 157.46.125.124\n)\n\n => Array\n(\n => 110.225.218.108\n)\n\n => Array\n(\n => 106.51.77.185\n)\n\n => Array\n(\n => 123.24.161.207\n)\n\n => Array\n(\n => 106.210.108.22\n)\n\n => Array\n(\n => 42.111.10.14\n)\n\n => Array\n(\n => 223.29.231.175\n)\n\n => Array\n(\n => 27.56.152.132\n)\n\n => Array\n(\n => 119.155.31.100\n)\n\n => Array\n(\n => 122.173.172.127\n)\n\n => Array\n(\n => 103.77.42.64\n)\n\n => Array\n(\n => 157.44.164.106\n)\n\n => Array\n(\n => 14.181.53.38\n)\n\n => Array\n(\n => 115.42.67.64\n)\n\n => Array\n(\n => 47.31.33.140\n)\n\n => Array\n(\n => 103.15.60.234\n)\n\n => Array\n(\n => 182.64.219.181\n)\n\n => Array\n(\n => 103.44.51.6\n)\n\n => Array\n(\n => 116.74.25.157\n)\n\n => Array\n(\n => 116.71.2.128\n)\n\n => Array\n(\n => 157.32.185.239\n)\n\n => Array\n(\n => 47.31.25.79\n)\n\n => Array\n(\n => 178.62.85.75\n)\n\n => Array\n(\n => 180.178.190.39\n)\n\n => Array\n(\n => 39.48.52.179\n)\n\n => Array\n(\n => 106.193.11.240\n)\n\n => Array\n(\n => 103.82.80.226\n)\n\n => Array\n(\n => 49.206.126.30\n)\n\n => Array\n(\n => 157.245.191.173\n)\n\n => Array\n(\n => 49.205.84.237\n)\n\n => Array\n(\n => 47.8.181.232\n)\n\n => Array\n(\n => 182.66.2.92\n)\n\n => Array\n(\n => 49.34.137.220\n)\n\n => Array\n(\n => 209.205.217.125\n)\n\n => Array\n(\n => 192.64.5.73\n)\n\n => Array\n(\n => 27.63.166.108\n)\n\n => Array\n(\n => 120.29.96.211\n)\n\n => Array\n(\n => 182.186.112.135\n)\n\n => Array\n(\n => 45.118.165.151\n)\n\n => Array\n(\n => 47.8.228.12\n)\n\n => Array\n(\n => 106.215.3.162\n)\n\n => Array\n(\n => 111.92.72.66\n)\n\n => Array\n(\n => 169.145.2.9\n)\n\n => Array\n(\n => 106.207.205.100\n)\n\n => Array\n(\n => 223.181.8.12\n)\n\n => Array\n(\n => 157.48.149.78\n)\n\n => Array\n(\n => 103.206.138.116\n)\n\n => Array\n(\n => 39.53.119.22\n)\n\n => Array\n(\n => 157.33.232.106\n)\n\n => Array\n(\n => 49.37.205.139\n)\n\n => Array\n(\n => 115.42.68.3\n)\n\n => Array\n(\n => 93.72.182.251\n)\n\n => Array\n(\n => 202.142.166.22\n)\n\n => Array\n(\n => 157.119.81.111\n)\n\n => Array\n(\n => 182.186.116.155\n)\n\n => Array\n(\n => 157.37.171.37\n)\n\n => Array\n(\n => 117.206.164.48\n)\n\n => Array\n(\n => 49.36.52.63\n)\n\n => Array\n(\n => 203.175.72.112\n)\n\n => Array\n(\n => 171.61.132.193\n)\n\n => Array\n(\n => 111.119.187.44\n)\n\n => Array\n(\n => 39.37.165.216\n)\n\n => Array\n(\n => 103.86.109.58\n)\n\n => Array\n(\n => 39.59.2.86\n)\n\n => Array\n(\n => 111.119.187.28\n)\n\n => Array\n(\n => 106.201.9.10\n)\n\n => Array\n(\n => 49.35.25.106\n)\n\n => Array\n(\n => 157.49.239.103\n)\n\n => Array\n(\n => 157.49.237.198\n)\n\n => Array\n(\n => 14.248.64.121\n)\n\n => Array\n(\n => 117.102.7.214\n)\n\n => Array\n(\n => 120.29.91.246\n)\n\n => Array\n(\n => 103.7.79.41\n)\n\n => Array\n(\n => 132.154.99.209\n)\n\n => Array\n(\n => 212.36.27.245\n)\n\n => Array\n(\n => 157.44.154.9\n)\n\n => Array\n(\n => 47.31.56.44\n)\n\n => Array\n(\n => 192.142.199.136\n)\n\n => Array\n(\n => 171.61.159.49\n)\n\n => Array\n(\n => 119.160.116.151\n)\n\n => Array\n(\n => 103.98.63.39\n)\n\n => Array\n(\n => 41.60.233.216\n)\n\n => Array\n(\n => 49.36.75.212\n)\n\n => Array\n(\n => 223.188.60.20\n)\n\n => Array\n(\n => 103.98.63.50\n)\n\n => Array\n(\n => 178.162.198.21\n)\n\n => Array\n(\n => 157.46.209.35\n)\n\n => Array\n(\n => 119.155.32.151\n)\n\n => Array\n(\n => 102.185.58.161\n)\n\n => Array\n(\n => 59.96.89.231\n)\n\n => Array\n(\n => 119.155.255.198\n)\n\n => Array\n(\n => 42.107.204.57\n)\n\n => Array\n(\n => 42.106.181.74\n)\n\n => Array\n(\n => 157.46.219.186\n)\n\n => Array\n(\n => 115.42.71.49\n)\n\n => Array\n(\n => 157.46.209.131\n)\n\n => Array\n(\n => 220.81.15.94\n)\n\n => Array\n(\n => 111.119.187.24\n)\n\n => Array\n(\n => 49.37.195.185\n)\n\n => Array\n(\n => 42.106.181.85\n)\n\n => Array\n(\n => 43.249.225.134\n)\n\n => Array\n(\n => 117.206.165.151\n)\n\n => Array\n(\n => 119.153.48.250\n)\n\n => Array\n(\n => 27.4.172.162\n)\n\n => Array\n(\n => 117.20.29.51\n)\n\n => Array\n(\n => 103.98.63.135\n)\n\n => Array\n(\n => 117.7.218.229\n)\n\n => Array\n(\n => 157.49.233.105\n)\n\n => Array\n(\n => 39.53.151.199\n)\n\n => Array\n(\n => 101.255.118.33\n)\n\n => Array\n(\n => 41.141.246.9\n)\n\n => Array\n(\n => 221.132.113.78\n)\n\n => Array\n(\n => 119.160.116.202\n)\n\n => Array\n(\n => 117.237.193.244\n)\n\n => Array\n(\n => 157.41.110.145\n)\n\n => Array\n(\n => 103.98.63.5\n)\n\n => Array\n(\n => 103.125.129.58\n)\n\n => Array\n(\n => 183.83.254.66\n)\n\n => Array\n(\n => 45.135.236.160\n)\n\n => Array\n(\n => 198.199.87.124\n)\n\n => Array\n(\n => 193.176.86.41\n)\n\n => Array\n(\n => 115.97.142.98\n)\n\n => Array\n(\n => 222.252.38.198\n)\n\n => Array\n(\n => 110.93.237.49\n)\n\n => Array\n(\n => 103.224.48.122\n)\n\n => Array\n(\n => 110.38.28.130\n)\n\n => Array\n(\n => 106.211.238.154\n)\n\n => Array\n(\n => 111.88.41.73\n)\n\n => Array\n(\n => 119.155.13.143\n)\n\n => Array\n(\n => 103.213.111.60\n)\n\n => Array\n(\n => 202.0.103.42\n)\n\n => Array\n(\n => 157.48.144.33\n)\n\n => Array\n(\n => 111.119.187.62\n)\n\n => Array\n(\n => 103.87.212.71\n)\n\n => Array\n(\n => 157.37.177.20\n)\n\n => Array\n(\n => 223.233.71.92\n)\n\n => Array\n(\n => 116.213.32.107\n)\n\n => Array\n(\n => 104.248.173.151\n)\n\n => Array\n(\n => 14.181.102.222\n)\n\n => Array\n(\n => 103.10.224.252\n)\n\n => Array\n(\n => 175.158.50.57\n)\n\n => Array\n(\n => 165.22.122.199\n)\n\n => Array\n(\n => 23.106.56.12\n)\n\n => Array\n(\n => 203.122.10.146\n)\n\n => Array\n(\n => 37.111.136.138\n)\n\n => Array\n(\n => 103.87.193.66\n)\n\n => Array\n(\n => 39.59.122.246\n)\n\n => Array\n(\n => 111.119.183.63\n)\n\n => Array\n(\n => 157.46.72.102\n)\n\n => Array\n(\n => 185.132.133.82\n)\n\n => Array\n(\n => 118.103.230.148\n)\n\n => Array\n(\n => 5.62.39.45\n)\n\n => Array\n(\n => 119.152.144.134\n)\n\n => Array\n(\n => 172.105.117.102\n)\n\n => Array\n(\n => 122.254.70.212\n)\n\n => Array\n(\n => 102.185.128.97\n)\n\n => Array\n(\n => 182.69.249.11\n)\n\n => Array\n(\n => 105.163.134.167\n)\n\n => Array\n(\n => 111.119.187.38\n)\n\n => Array\n(\n => 103.46.195.93\n)\n\n => Array\n(\n => 106.204.161.156\n)\n\n => Array\n(\n => 122.176.2.175\n)\n\n => Array\n(\n => 117.99.162.31\n)\n\n => Array\n(\n => 106.212.241.242\n)\n\n => Array\n(\n => 42.107.196.149\n)\n\n => Array\n(\n => 212.90.60.57\n)\n\n => Array\n(\n => 175.107.237.12\n)\n\n => Array\n(\n => 157.46.119.152\n)\n\n => Array\n(\n => 157.34.81.12\n)\n\n => Array\n(\n => 162.243.1.22\n)\n\n => Array\n(\n => 110.37.222.178\n)\n\n => Array\n(\n => 103.46.195.68\n)\n\n => Array\n(\n => 119.160.116.81\n)\n\n => Array\n(\n => 138.197.131.28\n)\n\n => Array\n(\n => 103.88.218.124\n)\n\n => Array\n(\n => 192.241.172.113\n)\n\n => Array\n(\n => 110.39.174.106\n)\n\n => Array\n(\n => 111.88.48.17\n)\n\n => Array\n(\n => 42.108.160.218\n)\n\n => Array\n(\n => 117.102.0.16\n)\n\n => Array\n(\n => 157.46.125.235\n)\n\n => Array\n(\n => 14.190.242.251\n)\n\n => Array\n(\n => 47.31.184.64\n)\n\n => Array\n(\n => 49.205.84.157\n)\n\n => Array\n(\n => 122.162.115.247\n)\n\n => Array\n(\n => 41.202.219.74\n)\n\n => Array\n(\n => 106.215.9.67\n)\n\n => Array\n(\n => 103.87.56.208\n)\n\n => Array\n(\n => 103.46.194.147\n)\n\n => Array\n(\n => 116.90.98.81\n)\n\n => Array\n(\n => 115.42.71.213\n)\n\n => Array\n(\n => 39.49.35.192\n)\n\n => Array\n(\n => 41.202.219.65\n)\n\n => Array\n(\n => 131.212.249.93\n)\n\n => Array\n(\n => 49.205.16.251\n)\n\n => Array\n(\n => 39.34.147.250\n)\n\n => Array\n(\n => 183.83.210.185\n)\n\n => Array\n(\n => 49.37.194.215\n)\n\n => Array\n(\n => 103.46.194.108\n)\n\n => Array\n(\n => 89.36.219.233\n)\n\n => Array\n(\n => 119.152.105.178\n)\n\n => Array\n(\n => 202.47.45.125\n)\n\n => Array\n(\n => 156.146.59.27\n)\n\n => Array\n(\n => 132.154.21.156\n)\n\n => Array\n(\n => 157.44.35.31\n)\n\n => Array\n(\n => 41.80.118.124\n)\n\n => Array\n(\n => 47.31.159.198\n)\n\n => Array\n(\n => 103.209.223.140\n)\n\n => Array\n(\n => 157.46.130.138\n)\n\n => Array\n(\n => 49.37.199.246\n)\n\n => Array\n(\n => 111.88.242.10\n)\n\n => Array\n(\n => 43.241.145.110\n)\n\n => Array\n(\n => 124.153.16.30\n)\n\n => Array\n(\n => 27.5.22.173\n)\n\n => Array\n(\n => 111.88.191.173\n)\n\n => Array\n(\n => 41.60.236.200\n)\n\n => Array\n(\n => 115.42.67.146\n)\n\n => Array\n(\n => 150.242.173.7\n)\n\n => Array\n(\n => 14.248.71.23\n)\n\n => Array\n(\n => 111.119.187.4\n)\n\n => Array\n(\n => 124.29.212.118\n)\n\n => Array\n(\n => 51.68.205.163\n)\n\n => Array\n(\n => 182.184.107.63\n)\n\n => Array\n(\n => 106.211.253.87\n)\n\n => Array\n(\n => 223.190.89.5\n)\n\n => Array\n(\n => 183.83.212.63\n)\n\n => Array\n(\n => 129.205.113.227\n)\n\n => Array\n(\n => 106.210.40.141\n)\n\n => Array\n(\n => 91.202.163.169\n)\n\n => Array\n(\n => 76.105.191.89\n)\n\n => Array\n(\n => 171.51.244.160\n)\n\n => Array\n(\n => 37.139.188.92\n)\n\n => Array\n(\n => 23.106.56.37\n)\n\n => Array\n(\n => 157.44.175.180\n)\n\n => Array\n(\n => 122.2.122.97\n)\n\n => Array\n(\n => 103.87.192.194\n)\n\n => Array\n(\n => 192.154.253.6\n)\n\n => Array\n(\n => 77.243.191.19\n)\n\n => Array\n(\n => 122.254.70.46\n)\n\n => Array\n(\n => 154.76.233.73\n)\n\n => Array\n(\n => 195.181.167.150\n)\n\n => Array\n(\n => 209.209.228.5\n)\n\n => Array\n(\n => 203.192.212.115\n)\n\n => Array\n(\n => 221.132.118.179\n)\n\n => Array\n(\n => 117.208.210.204\n)\n\n => Array\n(\n => 120.29.90.126\n)\n\n => Array\n(\n => 36.77.239.190\n)\n\n => Array\n(\n => 157.37.137.127\n)\n\n => Array\n(\n => 39.40.243.6\n)\n\n => Array\n(\n => 182.182.41.201\n)\n\n => Array\n(\n => 39.59.32.46\n)\n\n => Array\n(\n => 111.119.183.36\n)\n\n => Array\n(\n => 103.83.147.61\n)\n\n => Array\n(\n => 103.82.80.85\n)\n\n => Array\n(\n => 103.46.194.161\n)\n\n => Array\n(\n => 101.50.105.38\n)\n\n => Array\n(\n => 111.119.183.58\n)\n\n => Array\n(\n => 47.9.234.51\n)\n\n => Array\n(\n => 120.29.86.157\n)\n\n => Array\n(\n => 175.158.50.70\n)\n\n => Array\n(\n => 112.196.163.235\n)\n\n => Array\n(\n => 139.167.161.85\n)\n\n => Array\n(\n => 106.207.39.181\n)\n\n => Array\n(\n => 103.77.42.159\n)\n\n => Array\n(\n => 185.56.138.220\n)\n\n => Array\n(\n => 119.155.33.205\n)\n\n => Array\n(\n => 157.42.117.124\n)\n\n => Array\n(\n => 103.117.202.202\n)\n\n => Array\n(\n => 220.253.101.109\n)\n\n => Array\n(\n => 49.37.7.247\n)\n\n => Array\n(\n => 119.160.65.27\n)\n\n => Array\n(\n => 114.122.21.151\n)\n\n => Array\n(\n => 157.44.141.83\n)\n\n => Array\n(\n => 103.131.9.7\n)\n\n => Array\n(\n => 125.99.222.21\n)\n\n => Array\n(\n => 103.238.104.206\n)\n\n => Array\n(\n => 110.93.227.100\n)\n\n => Array\n(\n => 49.14.119.114\n)\n\n => Array\n(\n => 115.186.189.82\n)\n\n => Array\n(\n => 106.201.194.2\n)\n\n => Array\n(\n => 106.204.227.28\n)\n\n => Array\n(\n => 47.31.206.13\n)\n\n => Array\n(\n => 39.42.144.109\n)\n\n => Array\n(\n => 14.253.254.90\n)\n\n => Array\n(\n => 157.44.142.118\n)\n\n => Array\n(\n => 192.142.176.21\n)\n\n => Array\n(\n => 103.217.178.225\n)\n\n => Array\n(\n => 106.78.78.16\n)\n\n => Array\n(\n => 167.71.63.184\n)\n\n => Array\n(\n => 207.244.71.82\n)\n\n => Array\n(\n => 71.105.25.145\n)\n\n => Array\n(\n => 39.51.250.30\n)\n\n => Array\n(\n => 157.41.120.160\n)\n\n => Array\n(\n => 39.37.137.81\n)\n\n => Array\n(\n => 41.80.237.27\n)\n\n => Array\n(\n => 111.119.187.50\n)\n\n => Array\n(\n => 49.145.224.252\n)\n\n => Array\n(\n => 106.197.28.106\n)\n\n => Array\n(\n => 103.217.178.240\n)\n\n => Array\n(\n => 27.97.182.237\n)\n\n => Array\n(\n => 106.211.253.72\n)\n\n => Array\n(\n => 119.152.154.172\n)\n\n => Array\n(\n => 103.255.151.148\n)\n\n => Array\n(\n => 154.157.80.12\n)\n\n => Array\n(\n => 156.146.59.28\n)\n\n => Array\n(\n => 171.61.211.64\n)\n\n => Array\n(\n => 27.76.59.22\n)\n\n => Array\n(\n => 167.99.92.124\n)\n\n => Array\n(\n => 132.154.94.51\n)\n\n => Array\n(\n => 111.119.183.38\n)\n\n => Array\n(\n => 115.42.70.169\n)\n\n => Array\n(\n => 109.169.23.83\n)\n\n => Array\n(\n => 157.46.213.64\n)\n\n => Array\n(\n => 39.37.179.171\n)\n\n => Array\n(\n => 14.232.233.32\n)\n\n => Array\n(\n => 157.49.226.13\n)\n\n => Array\n(\n => 185.209.178.78\n)\n\n => Array\n(\n => 222.252.46.230\n)\n\n => Array\n(\n => 139.5.255.168\n)\n\n => Array\n(\n => 202.8.118.12\n)\n\n => Array\n(\n => 39.53.205.63\n)\n\n => Array\n(\n => 157.37.167.227\n)\n\n => Array\n(\n => 157.49.237.121\n)\n\n => Array\n(\n => 208.89.99.6\n)\n\n => Array\n(\n => 111.119.187.33\n)\n\n => Array\n(\n => 39.37.132.101\n)\n\n => Array\n(\n => 72.255.61.15\n)\n\n => Array\n(\n => 157.41.69.126\n)\n\n => Array\n(\n => 27.6.193.15\n)\n\n => Array\n(\n => 157.41.104.8\n)\n\n => Array\n(\n => 157.41.97.162\n)\n\n => Array\n(\n => 95.136.91.67\n)\n\n => Array\n(\n => 110.93.209.138\n)\n\n => Array\n(\n => 119.152.154.82\n)\n\n => Array\n(\n => 111.88.239.223\n)\n\n => Array\n(\n => 157.230.62.100\n)\n\n => Array\n(\n => 37.111.136.167\n)\n\n => Array\n(\n => 139.167.162.65\n)\n\n => Array\n(\n => 120.29.72.72\n)\n\n => Array\n(\n => 39.42.169.69\n)\n\n => Array\n(\n => 157.49.247.12\n)\n\n => Array\n(\n => 43.231.58.221\n)\n\n => Array\n(\n => 111.88.229.18\n)\n\n => Array\n(\n => 171.79.185.198\n)\n\n => Array\n(\n => 169.149.193.102\n)\n\n => Array\n(\n => 207.244.89.162\n)\n\n => Array\n(\n => 27.4.217.129\n)\n\n => Array\n(\n => 91.236.184.12\n)\n\n => Array\n(\n => 14.192.154.150\n)\n\n => Array\n(\n => 167.172.55.253\n)\n\n => Array\n(\n => 103.77.42.192\n)\n\n => Array\n(\n => 39.59.122.140\n)\n\n => Array\n(\n => 41.80.84.46\n)\n\n => Array\n(\n => 202.47.52.115\n)\n\n => Array\n(\n => 222.252.43.47\n)\n\n => Array\n(\n => 119.155.37.250\n)\n\n => Array\n(\n => 157.41.18.88\n)\n\n => Array\n(\n => 39.42.8.59\n)\n\n => Array\n(\n => 39.45.162.110\n)\n\n => Array\n(\n => 111.88.237.25\n)\n\n => Array\n(\n => 103.76.211.168\n)\n\n => Array\n(\n => 178.137.114.165\n)\n\n => Array\n(\n => 43.225.74.146\n)\n\n => Array\n(\n => 157.42.25.26\n)\n\n => Array\n(\n => 137.59.146.63\n)\n\n => Array\n(\n => 119.160.117.190\n)\n\n => Array\n(\n => 1.186.181.133\n)\n\n => Array\n(\n => 39.42.145.94\n)\n\n => Array\n(\n => 203.175.73.96\n)\n\n => Array\n(\n => 39.37.160.14\n)\n\n => Array\n(\n => 157.39.123.250\n)\n\n => Array\n(\n => 95.135.57.82\n)\n\n => Array\n(\n => 162.210.194.35\n)\n\n => Array\n(\n => 39.42.153.135\n)\n\n => Array\n(\n => 118.103.230.106\n)\n\n => Array\n(\n => 108.61.39.115\n)\n\n => Array\n(\n => 102.7.108.45\n)\n\n => Array\n(\n => 183.83.138.134\n)\n\n => Array\n(\n => 115.186.70.223\n)\n\n => Array\n(\n => 157.34.17.139\n)\n\n => Array\n(\n => 122.166.158.231\n)\n\n => Array\n(\n => 43.227.135.90\n)\n\n => Array\n(\n => 182.68.46.180\n)\n\n => Array\n(\n => 223.225.28.138\n)\n\n => Array\n(\n => 103.77.42.220\n)\n\n => Array\n(\n => 192.241.219.13\n)\n\n => Array\n(\n => 103.82.80.113\n)\n\n => Array\n(\n => 42.111.243.151\n)\n\n => Array\n(\n => 171.79.189.247\n)\n\n => Array\n(\n => 157.32.132.102\n)\n\n => Array\n(\n => 103.130.105.243\n)\n\n => Array\n(\n => 117.223.98.120\n)\n\n => Array\n(\n => 106.215.197.187\n)\n\n => Array\n(\n => 182.190.194.179\n)\n\n => Array\n(\n => 223.225.29.42\n)\n\n => Array\n(\n => 117.222.94.151\n)\n\n => Array\n(\n => 182.185.199.104\n)\n\n => Array\n(\n => 49.36.145.77\n)\n\n => Array\n(\n => 103.82.80.73\n)\n\n => Array\n(\n => 103.77.16.13\n)\n\n => Array\n(\n => 221.132.118.86\n)\n\n => Array\n(\n => 202.47.45.77\n)\n\n => Array\n(\n => 202.8.118.116\n)\n\n => Array\n(\n => 42.106.180.185\n)\n\n => Array\n(\n => 203.122.8.234\n)\n\n => Array\n(\n => 88.230.104.245\n)\n\n => Array\n(\n => 103.131.9.33\n)\n\n => Array\n(\n => 117.207.209.60\n)\n\n => Array\n(\n => 42.111.253.227\n)\n\n => Array\n(\n => 23.106.56.54\n)\n\n => Array\n(\n => 122.178.143.181\n)\n\n => Array\n(\n => 111.88.180.5\n)\n\n => Array\n(\n => 174.55.224.161\n)\n\n => Array\n(\n => 49.205.87.100\n)\n\n => Array\n(\n => 49.34.183.118\n)\n\n => Array\n(\n => 124.155.255.154\n)\n\n => Array\n(\n => 106.212.135.200\n)\n\n => Array\n(\n => 139.99.159.11\n)\n\n => Array\n(\n => 45.135.229.8\n)\n\n => Array\n(\n => 88.230.106.85\n)\n\n => Array\n(\n => 91.153.145.221\n)\n\n => Array\n(\n => 103.95.83.33\n)\n\n => Array\n(\n => 122.178.116.76\n)\n\n => Array\n(\n => 103.135.78.14\n)\n\n => Array\n(\n => 111.88.233.206\n)\n\n => Array\n(\n => 192.140.153.210\n)\n\n => Array\n(\n => 202.8.118.69\n)\n\n => Array\n(\n => 103.83.130.81\n)\n\n => Array\n(\n => 182.190.213.143\n)\n\n => Array\n(\n => 198.16.74.204\n)\n\n => Array\n(\n => 101.128.117.248\n)\n\n => Array\n(\n => 103.108.5.147\n)\n\n => Array\n(\n => 157.32.130.158\n)\n\n => Array\n(\n => 103.244.172.93\n)\n\n => Array\n(\n => 47.30.140.126\n)\n\n => Array\n(\n => 223.188.40.124\n)\n\n => Array\n(\n => 157.44.191.102\n)\n\n => Array\n(\n => 41.60.237.62\n)\n\n => Array\n(\n => 47.31.228.161\n)\n\n => Array\n(\n => 137.59.217.188\n)\n\n => Array\n(\n => 39.53.220.237\n)\n\n => Array\n(\n => 45.127.45.199\n)\n\n => Array\n(\n => 14.190.71.19\n)\n\n => Array\n(\n => 47.18.205.54\n)\n\n => Array\n(\n => 110.93.240.11\n)\n\n => Array\n(\n => 134.209.29.111\n)\n\n => Array\n(\n => 49.36.175.104\n)\n\n => Array\n(\n => 203.192.230.61\n)\n\n => Array\n(\n => 176.10.125.115\n)\n\n => Array\n(\n => 182.18.206.17\n)\n\n => Array\n(\n => 103.87.194.102\n)\n\n => Array\n(\n => 171.79.123.106\n)\n\n => Array\n(\n => 45.116.233.35\n)\n\n => Array\n(\n => 223.190.57.225\n)\n\n => Array\n(\n => 114.125.6.158\n)\n\n => Array\n(\n => 223.179.138.176\n)\n\n => Array\n(\n => 111.119.183.61\n)\n\n => Array\n(\n => 202.8.118.43\n)\n\n => Array\n(\n => 157.51.175.216\n)\n\n => Array\n(\n => 41.60.238.100\n)\n\n => Array\n(\n => 117.207.210.199\n)\n\n => Array\n(\n => 111.119.183.26\n)\n\n => Array\n(\n => 103.252.226.12\n)\n\n => Array\n(\n => 103.221.208.82\n)\n\n => Array\n(\n => 103.82.80.228\n)\n\n => Array\n(\n => 111.119.187.39\n)\n\n => Array\n(\n => 157.51.161.199\n)\n\n => Array\n(\n => 59.96.88.246\n)\n\n => Array\n(\n => 27.4.181.183\n)\n\n => Array\n(\n => 43.225.98.124\n)\n\n => Array\n(\n => 157.51.113.74\n)\n\n => Array\n(\n => 207.244.89.161\n)\n\n => Array\n(\n => 49.37.184.82\n)\n\n => Array\n(\n => 111.119.183.4\n)\n\n => Array\n(\n => 39.42.130.147\n)\n\n => Array\n(\n => 103.152.101.2\n)\n\n => Array\n(\n => 111.119.183.2\n)\n\n => Array\n(\n => 157.51.171.149\n)\n\n => Array\n(\n => 103.82.80.245\n)\n\n => Array\n(\n => 175.107.207.133\n)\n\n => Array\n(\n => 103.204.169.158\n)\n\n => Array\n(\n => 157.51.181.12\n)\n\n => Array\n(\n => 195.158.193.212\n)\n\n => Array\n(\n => 204.14.73.85\n)\n\n => Array\n(\n => 39.59.59.31\n)\n\n => Array\n(\n => 45.148.11.82\n)\n\n => Array\n(\n => 157.46.117.250\n)\n\n => Array\n(\n => 157.46.127.170\n)\n\n => Array\n(\n => 77.247.181.165\n)\n\n => Array\n(\n => 111.119.183.54\n)\n\n => Array\n(\n => 41.60.232.183\n)\n\n => Array\n(\n => 157.42.206.174\n)\n\n => Array\n(\n => 196.53.10.246\n)\n\n => Array\n(\n => 27.97.186.131\n)\n\n => Array\n(\n => 103.73.101.134\n)\n\n => Array\n(\n => 111.119.183.35\n)\n\n => Array\n(\n => 202.8.118.111\n)\n\n => Array\n(\n => 103.75.246.207\n)\n\n => Array\n(\n => 47.8.94.225\n)\n\n => Array\n(\n => 106.202.40.83\n)\n\n => Array\n(\n => 117.102.2.0\n)\n\n => Array\n(\n => 156.146.59.11\n)\n\n => Array\n(\n => 223.190.115.125\n)\n\n => Array\n(\n => 169.149.212.232\n)\n\n => Array\n(\n => 39.45.150.127\n)\n\n => Array\n(\n => 45.63.10.204\n)\n\n => Array\n(\n => 27.57.86.46\n)\n\n => Array\n(\n => 103.127.20.138\n)\n\n => Array\n(\n => 223.190.27.26\n)\n\n => Array\n(\n => 49.15.248.78\n)\n\n => Array\n(\n => 130.105.135.103\n)\n\n => Array\n(\n => 47.31.3.239\n)\n\n => Array\n(\n => 185.66.71.8\n)\n\n => Array\n(\n => 103.226.226.198\n)\n\n => Array\n(\n => 39.34.134.16\n)\n\n => Array\n(\n => 95.158.53.120\n)\n\n => Array\n(\n => 45.9.249.246\n)\n\n => Array\n(\n => 223.235.162.157\n)\n\n => Array\n(\n => 37.111.139.23\n)\n\n => Array\n(\n => 49.37.153.47\n)\n\n => Array\n(\n => 103.242.60.205\n)\n\n => Array\n(\n => 185.66.68.18\n)\n\n => Array\n(\n => 162.221.202.138\n)\n\n => Array\n(\n => 202.63.195.29\n)\n\n => Array\n(\n => 112.198.75.226\n)\n\n => Array\n(\n => 46.200.69.233\n)\n\n => Array\n(\n => 103.135.78.30\n)\n\n => Array\n(\n => 119.152.226.9\n)\n\n => Array\n(\n => 167.172.242.50\n)\n\n => Array\n(\n => 49.36.151.31\n)\n\n => Array\n(\n => 111.88.237.156\n)\n\n => Array\n(\n => 103.215.168.1\n)\n\n => Array\n(\n => 107.181.177.137\n)\n\n => Array\n(\n => 157.119.186.202\n)\n\n => Array\n(\n => 37.111.139.106\n)\n\n => Array\n(\n => 182.180.152.198\n)\n\n => Array\n(\n => 43.248.153.72\n)\n\n => Array\n(\n => 64.188.20.84\n)\n\n => Array\n(\n => 103.92.214.11\n)\n\n => Array\n(\n => 182.182.14.148\n)\n\n => Array\n(\n => 116.75.154.119\n)\n\n => Array\n(\n => 37.228.235.94\n)\n\n => Array\n(\n => 197.210.55.43\n)\n\n => Array\n(\n => 45.118.165.153\n)\n\n => Array\n(\n => 122.176.32.27\n)\n\n => Array\n(\n => 106.215.161.20\n)\n\n => Array\n(\n => 152.32.113.58\n)\n\n => Array\n(\n => 111.125.106.132\n)\n\n => Array\n(\n => 212.102.40.72\n)\n\n => Array\n(\n => 2.58.194.140\n)\n\n => Array\n(\n => 122.174.68.115\n)\n\n => Array\n(\n => 117.241.66.56\n)\n\n => Array\n(\n => 71.94.172.140\n)\n\n => Array\n(\n => 103.209.228.139\n)\n\n => Array\n(\n => 43.242.177.140\n)\n\n => Array\n(\n => 38.91.101.66\n)\n\n => Array\n(\n => 103.82.80.67\n)\n\n => Array\n(\n => 117.248.62.138\n)\n\n => Array\n(\n => 103.81.215.51\n)\n\n => Array\n(\n => 103.253.174.4\n)\n\n => Array\n(\n => 202.142.110.111\n)\n\n => Array\n(\n => 162.216.142.1\n)\n\n => Array\n(\n => 58.186.7.252\n)\n\n => Array\n(\n => 113.203.247.66\n)\n\n => Array\n(\n => 111.88.50.63\n)\n\n => Array\n(\n => 182.182.94.227\n)\n\n => Array\n(\n => 49.15.232.50\n)\n\n => Array\n(\n => 182.189.76.225\n)\n\n => Array\n(\n => 139.99.159.14\n)\n\n => Array\n(\n => 163.172.159.235\n)\n\n => Array\n(\n => 157.36.235.241\n)\n\n => Array\n(\n => 111.119.187.3\n)\n\n => Array\n(\n => 103.100.4.61\n)\n\n => Array\n(\n => 192.142.130.88\n)\n\n => Array\n(\n => 43.242.176.114\n)\n\n => Array\n(\n => 180.178.156.165\n)\n\n => Array\n(\n => 182.189.236.77\n)\n\n => Array\n(\n => 49.34.197.239\n)\n\n => Array\n(\n => 157.36.107.107\n)\n\n => Array\n(\n => 103.209.85.175\n)\n\n => Array\n(\n => 203.139.63.83\n)\n\n => Array\n(\n => 43.242.177.161\n)\n\n => Array\n(\n => 182.182.77.138\n)\n\n => Array\n(\n => 114.124.168.117\n)\n\n => Array\n(\n => 124.253.79.191\n)\n\n => Array\n(\n => 192.142.168.235\n)\n\n => Array\n(\n => 14.232.235.111\n)\n\n => Array\n(\n => 152.57.124.214\n)\n\n => Array\n(\n => 123.24.172.48\n)\n\n => Array\n(\n => 43.242.176.87\n)\n\n => Array\n(\n => 43.242.176.101\n)\n\n => Array\n(\n => 49.156.84.110\n)\n\n => Array\n(\n => 58.65.222.6\n)\n\n => Array\n(\n => 157.32.189.112\n)\n\n => Array\n(\n => 47.31.155.87\n)\n\n => Array\n(\n => 39.53.244.182\n)\n\n => Array\n(\n => 39.33.221.76\n)\n\n => Array\n(\n => 161.35.130.245\n)\n\n => Array\n(\n => 152.32.113.137\n)\n\n => Array\n(\n => 192.142.187.220\n)\n\n => Array\n(\n => 185.54.228.123\n)\n\n => Array\n(\n => 103.233.87.221\n)\n\n => Array\n(\n => 223.236.200.224\n)\n\n => Array\n(\n => 27.97.189.170\n)\n\n => Array\n(\n => 103.82.80.212\n)\n\n => Array\n(\n => 43.242.176.37\n)\n\n => Array\n(\n => 49.36.144.94\n)\n\n => Array\n(\n => 180.251.62.185\n)\n\n => Array\n(\n => 39.50.243.227\n)\n\n => Array\n(\n => 124.253.20.21\n)\n\n => Array\n(\n => 41.60.233.31\n)\n\n => Array\n(\n => 103.81.215.57\n)\n\n => Array\n(\n => 185.91.120.16\n)\n\n => Array\n(\n => 182.190.107.163\n)\n\n => Array\n(\n => 222.252.61.68\n)\n\n => Array\n(\n => 109.169.23.78\n)\n\n => Array\n(\n => 39.50.151.222\n)\n\n => Array\n(\n => 43.242.176.86\n)\n\n => Array\n(\n => 178.162.222.161\n)\n\n => Array\n(\n => 37.111.139.158\n)\n\n => Array\n(\n => 39.57.224.97\n)\n\n => Array\n(\n => 39.57.157.194\n)\n\n => Array\n(\n => 111.119.183.48\n)\n\n => Array\n(\n => 180.190.171.129\n)\n\n => Array\n(\n => 39.52.174.177\n)\n\n => Array\n(\n => 43.242.176.103\n)\n\n => Array\n(\n => 124.253.83.14\n)\n\n => Array\n(\n => 182.189.116.245\n)\n\n => Array\n(\n => 157.36.178.213\n)\n\n => Array\n(\n => 45.250.65.119\n)\n\n => Array\n(\n => 103.209.86.6\n)\n\n => Array\n(\n => 43.242.176.80\n)\n\n => Array\n(\n => 137.59.147.2\n)\n\n => Array\n(\n => 117.222.95.23\n)\n\n => Array\n(\n => 124.253.81.10\n)\n\n => Array\n(\n => 43.242.177.21\n)\n\n => Array\n(\n => 182.189.224.186\n)\n\n => Array\n(\n => 39.52.178.142\n)\n\n => Array\n(\n => 106.214.29.176\n)\n\n => Array\n(\n => 111.88.145.107\n)\n\n => Array\n(\n => 49.36.142.67\n)\n\n => Array\n(\n => 202.142.65.50\n)\n\n => Array\n(\n => 1.22.186.76\n)\n\n => Array\n(\n => 103.131.8.225\n)\n\n => Array\n(\n => 39.53.212.111\n)\n\n => Array\n(\n => 103.82.80.149\n)\n\n => Array\n(\n => 43.242.176.12\n)\n\n => Array\n(\n => 103.109.13.189\n)\n\n => Array\n(\n => 124.253.206.202\n)\n\n => Array\n(\n => 117.195.115.85\n)\n\n => Array\n(\n => 49.36.245.229\n)\n\n => Array\n(\n => 42.118.8.100\n)\n\n => Array\n(\n => 1.22.73.17\n)\n\n => Array\n(\n => 157.36.166.131\n)\n\n => Array\n(\n => 182.182.38.223\n)\n\n => Array\n(\n => 49.14.150.21\n)\n\n => Array\n(\n => 43.242.176.89\n)\n\n => Array\n(\n => 157.46.185.69\n)\n\n => Array\n(\n => 103.31.92.150\n)\n\n => Array\n(\n => 59.96.90.94\n)\n\n => Array\n(\n => 49.156.111.64\n)\n\n => Array\n(\n => 103.75.244.16\n)\n\n => Array\n(\n => 54.37.18.139\n)\n\n => Array\n(\n => 27.255.173.50\n)\n\n => Array\n(\n => 84.202.161.120\n)\n\n => Array\n(\n => 27.3.224.180\n)\n\n => Array\n(\n => 39.44.14.192\n)\n\n => Array\n(\n => 37.120.133.201\n)\n\n => Array\n(\n => 109.251.143.236\n)\n\n => Array\n(\n => 23.80.97.111\n)\n\n => Array\n(\n => 43.242.176.9\n)\n\n => Array\n(\n => 14.248.107.50\n)\n\n => Array\n(\n => 182.189.221.114\n)\n\n => Array\n(\n => 103.253.173.74\n)\n\n => Array\n(\n => 27.97.177.45\n)\n\n => Array\n(\n => 49.14.98.9\n)\n\n => Array\n(\n => 163.53.85.169\n)\n\n => Array\n(\n => 39.59.90.168\n)\n\n => Array\n(\n => 111.88.202.253\n)\n\n => Array\n(\n => 111.119.178.155\n)\n\n => Array\n(\n => 171.76.163.75\n)\n\n => Array\n(\n => 202.5.154.23\n)\n\n => Array\n(\n => 119.160.65.164\n)\n\n => Array\n(\n => 14.253.253.190\n)\n\n => Array\n(\n => 117.206.167.25\n)\n\n => Array\n(\n => 61.2.183.186\n)\n\n => Array\n(\n => 103.100.4.83\n)\n\n => Array\n(\n => 124.253.71.126\n)\n\n => Array\n(\n => 182.189.49.217\n)\n\n => Array\n(\n => 103.196.160.41\n)\n\n => Array\n(\n => 23.106.56.35\n)\n\n => Array\n(\n => 110.38.12.70\n)\n\n => Array\n(\n => 154.157.199.239\n)\n\n => Array\n(\n => 14.231.163.113\n)\n\n => Array\n(\n => 103.69.27.232\n)\n\n => Array\n(\n => 175.107.220.192\n)\n\n => Array\n(\n => 43.231.58.173\n)\n\n => Array\n(\n => 138.128.91.215\n)\n\n => Array\n(\n => 103.233.86.1\n)\n\n => Array\n(\n => 182.187.67.111\n)\n\n => Array\n(\n => 49.156.71.31\n)\n\n => Array\n(\n => 27.255.174.125\n)\n\n => Array\n(\n => 195.24.220.35\n)\n\n => Array\n(\n => 120.29.98.28\n)\n\n => Array\n(\n => 41.202.219.255\n)\n\n => Array\n(\n => 103.88.3.243\n)\n\n => Array\n(\n => 111.125.106.75\n)\n\n => Array\n(\n => 106.76.71.74\n)\n\n => Array\n(\n => 112.201.138.85\n)\n\n => Array\n(\n => 110.137.101.229\n)\n\n => Array\n(\n => 43.242.177.96\n)\n\n => Array\n(\n => 39.36.198.196\n)\n\n => Array\n(\n => 27.255.181.140\n)\n\n => Array\n(\n => 194.99.104.58\n)\n\n => Array\n(\n => 78.129.139.109\n)\n\n => Array\n(\n => 47.247.185.67\n)\n\n => Array\n(\n => 27.63.37.90\n)\n\n => Array\n(\n => 103.211.54.1\n)\n\n => Array\n(\n => 94.202.167.139\n)\n\n => Array\n(\n => 111.119.183.3\n)\n\n => Array\n(\n => 124.253.194.1\n)\n\n => Array\n(\n => 192.142.188.115\n)\n\n => Array\n(\n => 39.44.137.107\n)\n\n => Array\n(\n => 43.251.191.25\n)\n\n => Array\n(\n => 103.140.30.114\n)\n\n => Array\n(\n => 117.5.194.159\n)\n\n => Array\n(\n => 109.169.23.79\n)\n\n => Array\n(\n => 122.178.127.170\n)\n\n => Array\n(\n => 45.118.165.156\n)\n\n => Array\n(\n => 39.48.199.148\n)\n\n => Array\n(\n => 182.64.138.32\n)\n\n => Array\n(\n => 37.73.129.186\n)\n\n => Array\n(\n => 182.186.110.35\n)\n\n => Array\n(\n => 43.242.177.24\n)\n\n => Array\n(\n => 119.155.23.112\n)\n\n => Array\n(\n => 84.16.238.119\n)\n\n => Array\n(\n => 41.202.219.252\n)\n\n => Array\n(\n => 43.242.176.119\n)\n\n => Array\n(\n => 111.119.187.6\n)\n\n => Array\n(\n => 95.12.200.188\n)\n\n => Array\n(\n => 139.28.219.138\n)\n\n => Array\n(\n => 89.163.247.130\n)\n\n => Array\n(\n => 122.173.103.88\n)\n\n => Array\n(\n => 103.248.87.10\n)\n\n => Array\n(\n => 23.106.249.36\n)\n\n => Array\n(\n => 124.253.94.125\n)\n\n => Array\n(\n => 39.53.244.147\n)\n\n => Array\n(\n => 193.109.85.11\n)\n\n => Array\n(\n => 43.242.176.71\n)\n\n => Array\n(\n => 43.242.177.58\n)\n\n => Array\n(\n => 47.31.6.139\n)\n\n => Array\n(\n => 39.59.34.67\n)\n\n => Array\n(\n => 43.242.176.58\n)\n\n => Array\n(\n => 103.107.198.198\n)\n\n => Array\n(\n => 147.135.11.113\n)\n\n => Array\n(\n => 27.7.212.112\n)\n\n => Array\n(\n => 43.242.177.1\n)\n\n => Array\n(\n => 175.107.227.27\n)\n\n => Array\n(\n => 103.103.43.254\n)\n\n => Array\n(\n => 49.15.221.10\n)\n\n => Array\n(\n => 43.242.177.43\n)\n\n => Array\n(\n => 36.85.59.11\n)\n\n => Array\n(\n => 124.253.204.50\n)\n\n => Array\n(\n => 5.181.233.54\n)\n\n => Array\n(\n => 43.242.177.154\n)\n\n => Array\n(\n => 103.84.37.169\n)\n\n => Array\n(\n => 222.252.54.108\n)\n\n => Array\n(\n => 14.162.160.254\n)\n\n => Array\n(\n => 178.151.218.45\n)\n\n => Array\n(\n => 110.137.101.93\n)\n\n => Array\n(\n => 122.162.212.59\n)\n\n => Array\n(\n => 81.12.118.162\n)\n\n => Array\n(\n => 171.76.186.148\n)\n\n => Array\n(\n => 182.69.253.77\n)\n\n => Array\n(\n => 111.119.183.43\n)\n\n => Array\n(\n => 49.149.74.226\n)\n\n => Array\n(\n => 43.242.177.63\n)\n\n => Array\n(\n => 14.99.243.54\n)\n\n => Array\n(\n => 110.137.100.25\n)\n\n => Array\n(\n => 116.107.25.163\n)\n\n => Array\n(\n => 49.36.71.141\n)\n\n => Array\n(\n => 182.180.117.219\n)\n\n => Array\n(\n => 150.242.172.194\n)\n\n => Array\n(\n => 49.156.111.40\n)\n\n => Array\n(\n => 49.15.208.115\n)\n\n => Array\n(\n => 103.209.87.219\n)\n\n => Array\n(\n => 43.242.176.56\n)\n\n => Array\n(\n => 103.132.187.100\n)\n\n => Array\n(\n => 49.156.96.120\n)\n\n => Array\n(\n => 192.142.176.171\n)\n\n => Array\n(\n => 51.91.18.131\n)\n\n => Array\n(\n => 103.83.144.121\n)\n\n => Array\n(\n => 1.39.75.72\n)\n\n => Array\n(\n => 14.231.172.177\n)\n\n => Array\n(\n => 94.232.213.159\n)\n\n => Array\n(\n => 103.228.158.38\n)\n\n => Array\n(\n => 43.242.177.100\n)\n\n => Array\n(\n => 171.76.149.130\n)\n\n => Array\n(\n => 113.183.26.59\n)\n\n => Array\n(\n => 182.74.232.166\n)\n\n => Array\n(\n => 47.31.205.211\n)\n\n => Array\n(\n => 106.211.253.70\n)\n\n => Array\n(\n => 39.51.233.214\n)\n\n => Array\n(\n => 182.70.249.161\n)\n\n => Array\n(\n => 222.252.40.196\n)\n\n => Array\n(\n => 49.37.6.29\n)\n\n => Array\n(\n => 119.155.33.170\n)\n\n => Array\n(\n => 43.242.177.79\n)\n\n => Array\n(\n => 111.119.183.62\n)\n\n => Array\n(\n => 137.59.226.97\n)\n\n => Array\n(\n => 42.111.18.121\n)\n\n => Array\n(\n => 223.190.46.91\n)\n\n => Array\n(\n => 45.118.165.159\n)\n\n => Array\n(\n => 110.136.60.44\n)\n\n => Array\n(\n => 43.242.176.57\n)\n\n => Array\n(\n => 117.212.58.0\n)\n\n => Array\n(\n => 49.37.7.66\n)\n\n => Array\n(\n => 39.52.174.33\n)\n\n => Array\n(\n => 150.242.172.55\n)\n\n => Array\n(\n => 103.94.111.236\n)\n\n => Array\n(\n => 106.215.239.184\n)\n\n => Array\n(\n => 101.128.117.75\n)\n\n => Array\n(\n => 162.210.194.10\n)\n\n => Array\n(\n => 136.158.31.132\n)\n\n => Array\n(\n => 39.51.245.69\n)\n\n => Array\n(\n => 39.42.149.159\n)\n\n => Array\n(\n => 51.77.108.159\n)\n\n => Array\n(\n => 45.127.247.250\n)\n\n => Array\n(\n => 122.172.78.22\n)\n\n => Array\n(\n => 117.220.208.38\n)\n\n => Array\n(\n => 112.201.138.95\n)\n\n => Array\n(\n => 49.145.105.113\n)\n\n => Array\n(\n => 110.93.247.12\n)\n\n => Array\n(\n => 39.52.150.32\n)\n\n => Array\n(\n => 122.161.89.41\n)\n\n => Array\n(\n => 39.52.176.49\n)\n\n => Array\n(\n => 157.33.12.154\n)\n\n => Array\n(\n => 73.111.248.162\n)\n\n => Array\n(\n => 112.204.167.67\n)\n\n => Array\n(\n => 107.150.30.182\n)\n\n => Array\n(\n => 115.99.222.229\n)\n\n => Array\n(\n => 180.190.195.96\n)\n\n => Array\n(\n => 157.44.57.255\n)\n\n => Array\n(\n => 39.37.9.167\n)\n\n => Array\n(\n => 39.49.48.33\n)\n\n => Array\n(\n => 157.44.218.118\n)\n\n => Array\n(\n => 103.211.54.253\n)\n\n => Array\n(\n => 43.242.177.81\n)\n\n => Array\n(\n => 103.111.224.227\n)\n\n => Array\n(\n => 223.176.48.237\n)\n\n => Array\n(\n => 124.253.87.117\n)\n\n => Array\n(\n => 124.29.247.14\n)\n\n => Array\n(\n => 182.189.232.32\n)\n\n => Array\n(\n => 111.68.97.206\n)\n\n => Array\n(\n => 103.117.15.70\n)\n\n => Array\n(\n => 182.18.236.101\n)\n\n => Array\n(\n => 43.242.177.60\n)\n\n => Array\n(\n => 180.190.7.178\n)\n\n => Array\n(\n => 112.201.142.95\n)\n\n => Array\n(\n => 122.178.255.123\n)\n\n => Array\n(\n => 49.36.240.103\n)\n\n => Array\n(\n => 210.56.16.13\n)\n\n => Array\n(\n => 103.91.123.219\n)\n\n => Array\n(\n => 39.52.155.252\n)\n\n => Array\n(\n => 192.142.207.230\n)\n\n => Array\n(\n => 188.163.82.179\n)\n\n => Array\n(\n => 182.189.9.196\n)\n\n => Array\n(\n => 175.107.221.51\n)\n\n => Array\n(\n => 39.53.221.200\n)\n\n => Array\n(\n => 27.255.190.59\n)\n\n => Array\n(\n => 183.83.212.118\n)\n\n => Array\n(\n => 45.118.165.143\n)\n\n => Array\n(\n => 182.189.124.35\n)\n\n => Array\n(\n => 203.101.186.1\n)\n\n => Array\n(\n => 49.36.246.25\n)\n\n => Array\n(\n => 39.42.186.234\n)\n\n => Array\n(\n => 103.82.80.14\n)\n\n => Array\n(\n => 210.18.182.42\n)\n\n => Array\n(\n => 42.111.13.81\n)\n\n => Array\n(\n => 46.200.69.240\n)\n\n => Array\n(\n => 103.209.87.213\n)\n\n => Array\n(\n => 103.31.95.95\n)\n\n => Array\n(\n => 180.190.174.25\n)\n\n => Array\n(\n => 103.77.0.128\n)\n\n => Array\n(\n => 49.34.103.82\n)\n\n => Array\n(\n => 39.48.196.22\n)\n\n => Array\n(\n => 192.142.166.20\n)\n\n => Array\n(\n => 202.142.110.186\n)\n\n => Array\n(\n => 122.163.135.95\n)\n\n => Array\n(\n => 183.83.255.225\n)\n\n => Array\n(\n => 157.45.46.10\n)\n\n => Array\n(\n => 182.189.4.77\n)\n\n => Array\n(\n => 49.145.104.71\n)\n\n => Array\n(\n => 103.143.7.34\n)\n\n => Array\n(\n => 61.2.180.15\n)\n\n => Array\n(\n => 103.81.215.61\n)\n\n => Array\n(\n => 115.42.71.122\n)\n\n => Array\n(\n => 124.253.73.20\n)\n\n => Array\n(\n => 49.33.210.169\n)\n\n => Array\n(\n => 78.159.101.115\n)\n\n => Array\n(\n => 42.111.17.221\n)\n\n => Array\n(\n => 43.242.178.67\n)\n\n => Array\n(\n => 36.68.138.36\n)\n\n => Array\n(\n => 103.195.201.51\n)\n\n => Array\n(\n => 79.141.162.81\n)\n\n => Array\n(\n => 202.8.118.239\n)\n\n => Array\n(\n => 103.139.128.161\n)\n\n => Array\n(\n => 207.244.71.84\n)\n\n => Array\n(\n => 124.253.184.45\n)\n\n => Array\n(\n => 111.125.106.124\n)\n\n => Array\n(\n => 111.125.105.139\n)\n\n => Array\n(\n => 39.59.94.233\n)\n\n => Array\n(\n => 112.211.60.168\n)\n\n => Array\n(\n => 103.117.14.72\n)\n\n => Array\n(\n => 111.119.183.56\n)\n\n => Array\n(\n => 47.31.53.228\n)\n\n => Array\n(\n => 124.253.186.8\n)\n\n => Array\n(\n => 183.83.213.214\n)\n\n => Array\n(\n => 103.106.239.70\n)\n\n => Array\n(\n => 182.182.92.81\n)\n\n => Array\n(\n => 14.162.167.98\n)\n\n => Array\n(\n => 112.211.11.107\n)\n\n => Array\n(\n => 77.111.246.20\n)\n\n => Array\n(\n => 49.156.86.182\n)\n\n => Array\n(\n => 47.29.122.112\n)\n\n => Array\n(\n => 125.99.74.42\n)\n\n => Array\n(\n => 124.123.169.24\n)\n\n => Array\n(\n => 106.202.105.128\n)\n\n => Array\n(\n => 103.244.173.14\n)\n\n => Array\n(\n => 103.98.63.104\n)\n\n => Array\n(\n => 180.245.6.60\n)\n\n => Array\n(\n => 49.149.96.14\n)\n\n => Array\n(\n => 14.177.120.169\n)\n\n => Array\n(\n => 192.135.90.145\n)\n\n => Array\n(\n => 223.190.18.218\n)\n\n => Array\n(\n => 171.61.190.2\n)\n\n => Array\n(\n => 58.65.220.219\n)\n\n => Array\n(\n => 122.177.29.87\n)\n\n => Array\n(\n => 223.236.175.203\n)\n\n => Array\n(\n => 39.53.237.106\n)\n\n => Array\n(\n => 1.186.114.83\n)\n\n => Array\n(\n => 43.230.66.153\n)\n\n => Array\n(\n => 27.96.94.247\n)\n\n => Array\n(\n => 39.52.176.185\n)\n\n => Array\n(\n => 59.94.147.62\n)\n\n => Array\n(\n => 119.160.117.10\n)\n\n => Array\n(\n => 43.241.146.105\n)\n\n => Array\n(\n => 39.59.87.75\n)\n\n => Array\n(\n => 119.160.118.203\n)\n\n => Array\n(\n => 39.52.161.76\n)\n\n => Array\n(\n => 202.168.84.189\n)\n\n => Array\n(\n => 103.215.168.2\n)\n\n => Array\n(\n => 39.42.146.160\n)\n\n => Array\n(\n => 182.182.30.246\n)\n\n => Array\n(\n => 122.173.212.133\n)\n\n => Array\n(\n => 39.51.238.44\n)\n\n => Array\n(\n => 183.83.252.51\n)\n\n => Array\n(\n => 202.142.168.86\n)\n\n => Array\n(\n => 39.40.198.209\n)\n\n => Array\n(\n => 192.135.90.151\n)\n\n => Array\n(\n => 72.255.41.174\n)\n\n => Array\n(\n => 137.97.92.124\n)\n\n => Array\n(\n => 182.185.159.155\n)\n\n => Array\n(\n => 157.44.133.131\n)\n\n => Array\n(\n => 39.51.230.253\n)\n\n => Array\n(\n => 103.70.87.200\n)\n\n => Array\n(\n => 103.117.15.82\n)\n\n => Array\n(\n => 103.217.244.69\n)\n\n => Array\n(\n => 157.34.76.185\n)\n\n => Array\n(\n => 39.52.130.163\n)\n\n => Array\n(\n => 182.181.41.39\n)\n\n => Array\n(\n => 49.37.212.226\n)\n\n => Array\n(\n => 119.160.117.100\n)\n\n => Array\n(\n => 103.209.87.43\n)\n\n => Array\n(\n => 180.190.195.45\n)\n\n => Array\n(\n => 122.160.57.230\n)\n\n => Array\n(\n => 203.192.213.81\n)\n\n => Array\n(\n => 182.181.63.91\n)\n\n => Array\n(\n => 157.44.184.5\n)\n\n => Array\n(\n => 27.97.213.128\n)\n\n => Array\n(\n => 122.55.252.145\n)\n\n => Array\n(\n => 103.117.15.92\n)\n\n => Array\n(\n => 42.201.251.179\n)\n\n => Array\n(\n => 122.186.84.53\n)\n\n => Array\n(\n => 119.157.75.242\n)\n\n => Array\n(\n => 39.42.163.6\n)\n\n => Array\n(\n => 14.99.246.78\n)\n\n => Array\n(\n => 103.209.87.227\n)\n\n => Array\n(\n => 182.68.215.31\n)\n\n => Array\n(\n => 45.118.165.140\n)\n\n => Array\n(\n => 207.244.71.81\n)\n\n => Array\n(\n => 27.97.162.57\n)\n\n => Array\n(\n => 103.113.106.98\n)\n\n => Array\n(\n => 95.135.44.103\n)\n\n => Array\n(\n => 125.209.114.238\n)\n\n => Array\n(\n => 77.123.14.176\n)\n\n => Array\n(\n => 110.36.202.169\n)\n\n => Array\n(\n => 124.253.205.230\n)\n\n => Array\n(\n => 106.215.72.117\n)\n\n => Array\n(\n => 116.72.226.35\n)\n\n => Array\n(\n => 137.97.103.141\n)\n\n => Array\n(\n => 112.79.212.161\n)\n\n => Array\n(\n => 103.209.85.150\n)\n\n => Array\n(\n => 103.159.127.6\n)\n\n => Array\n(\n => 43.239.205.66\n)\n\n => Array\n(\n => 143.244.51.152\n)\n\n => Array\n(\n => 182.64.15.3\n)\n\n => Array\n(\n => 182.185.207.146\n)\n\n => Array\n(\n => 45.118.165.155\n)\n\n => Array\n(\n => 115.160.241.214\n)\n\n => Array\n(\n => 47.31.230.68\n)\n\n => Array\n(\n => 49.15.84.145\n)\n\n => Array\n(\n => 39.51.239.206\n)\n\n => Array\n(\n => 103.149.154.212\n)\n\n => Array\n(\n => 43.239.207.155\n)\n\n => Array\n(\n => 182.182.30.181\n)\n\n => Array\n(\n => 157.37.198.16\n)\n\n => Array\n(\n => 162.239.24.60\n)\n\n => Array\n(\n => 106.212.101.97\n)\n\n => Array\n(\n => 124.253.97.44\n)\n\n => Array\n(\n => 106.214.95.176\n)\n\n => Array\n(\n => 102.69.228.114\n)\n\n => Array\n(\n => 116.74.58.221\n)\n\n => Array\n(\n => 162.210.194.38\n)\n\n => Array\n(\n => 39.52.162.121\n)\n\n => Array\n(\n => 103.216.143.255\n)\n\n => Array\n(\n => 103.49.155.134\n)\n\n => Array\n(\n => 182.191.119.236\n)\n\n => Array\n(\n => 111.88.213.172\n)\n\n => Array\n(\n => 43.239.207.207\n)\n\n => Array\n(\n => 140.213.35.143\n)\n\n => Array\n(\n => 154.72.153.215\n)\n\n => Array\n(\n => 122.170.47.36\n)\n\n => Array\n(\n => 51.158.111.163\n)\n\n => Array\n(\n => 203.122.10.150\n)\n\n => Array\n(\n => 47.31.176.111\n)\n\n => Array\n(\n => 103.75.246.34\n)\n\n => Array\n(\n => 103.244.178.45\n)\n\n => Array\n(\n => 182.185.138.0\n)\n\n => Array\n(\n => 183.83.254.224\n)\n\n => Array\n(\n => 49.36.246.145\n)\n\n => Array\n(\n => 202.47.60.85\n)\n\n => Array\n(\n => 180.190.163.160\n)\n\n => Array\n(\n => 27.255.187.221\n)\n\n => Array\n(\n => 14.248.94.2\n)\n\n => Array\n(\n => 185.233.17.187\n)\n\n => Array\n(\n => 139.5.254.227\n)\n\n => Array\n(\n => 103.149.160.66\n)\n\n => Array\n(\n => 122.168.235.47\n)\n\n => Array\n(\n => 45.113.248.224\n)\n\n => Array\n(\n => 110.54.170.142\n)\n\n => Array\n(\n => 223.235.226.55\n)\n\n => Array\n(\n => 157.32.19.235\n)\n\n => Array\n(\n => 49.15.221.114\n)\n\n => Array\n(\n => 27.97.166.163\n)\n\n => Array\n(\n => 223.233.99.5\n)\n\n => Array\n(\n => 49.33.203.53\n)\n\n => Array\n(\n => 27.56.214.41\n)\n\n => Array\n(\n => 103.138.51.3\n)\n\n => Array\n(\n => 111.119.183.21\n)\n\n => Array\n(\n => 47.15.138.233\n)\n\n => Array\n(\n => 202.63.213.184\n)\n\n => Array\n(\n => 49.36.158.94\n)\n\n => Array\n(\n => 27.97.186.179\n)\n\n => Array\n(\n => 27.97.214.69\n)\n\n => Array\n(\n => 203.128.18.163\n)\n\n => Array\n(\n => 106.207.235.63\n)\n\n => Array\n(\n => 116.107.220.231\n)\n\n => Array\n(\n => 223.226.169.249\n)\n\n => Array\n(\n => 106.201.24.6\n)\n\n => Array\n(\n => 49.15.89.7\n)\n\n => Array\n(\n => 49.15.142.20\n)\n\n => Array\n(\n => 223.177.24.85\n)\n\n => Array\n(\n => 37.156.17.37\n)\n\n => Array\n(\n => 102.129.224.2\n)\n\n => Array\n(\n => 49.15.85.221\n)\n\n => Array\n(\n => 106.76.208.153\n)\n\n => Array\n(\n => 61.2.47.71\n)\n\n => Array\n(\n => 27.97.178.79\n)\n\n => Array\n(\n => 39.34.143.196\n)\n\n => Array\n(\n => 103.10.227.158\n)\n\n => Array\n(\n => 117.220.210.159\n)\n\n => Array\n(\n => 182.189.28.11\n)\n\n => Array\n(\n => 122.185.38.170\n)\n\n => Array\n(\n => 112.196.132.115\n)\n\n => Array\n(\n => 187.156.137.83\n)\n\n => Array\n(\n => 203.122.3.88\n)\n\n => Array\n(\n => 51.68.142.45\n)\n\n => Array\n(\n => 124.253.217.55\n)\n\n => Array\n(\n => 103.152.41.2\n)\n\n => Array\n(\n => 157.37.154.219\n)\n\n => Array\n(\n => 39.45.32.77\n)\n\n => Array\n(\n => 182.182.22.221\n)\n\n => Array\n(\n => 157.43.205.117\n)\n\n => Array\n(\n => 202.142.123.58\n)\n\n => Array\n(\n => 43.239.207.121\n)\n\n => Array\n(\n => 49.206.122.113\n)\n\n => Array\n(\n => 106.193.199.203\n)\n\n => Array\n(\n => 103.67.157.251\n)\n\n => Array\n(\n => 49.34.97.81\n)\n\n => Array\n(\n => 49.156.92.130\n)\n\n => Array\n(\n => 203.160.179.210\n)\n\n => Array\n(\n => 106.215.33.244\n)\n\n => Array\n(\n => 191.101.148.41\n)\n\n => Array\n(\n => 203.90.94.94\n)\n\n => Array\n(\n => 105.129.205.134\n)\n\n => Array\n(\n => 106.215.45.165\n)\n\n => Array\n(\n => 112.196.132.15\n)\n\n => Array\n(\n => 39.59.64.174\n)\n\n => Array\n(\n => 124.253.155.116\n)\n\n => Array\n(\n => 94.179.192.204\n)\n\n => Array\n(\n => 110.38.29.245\n)\n\n => Array\n(\n => 124.29.209.78\n)\n\n => Array\n(\n => 103.75.245.240\n)\n\n => Array\n(\n => 49.36.159.170\n)\n\n => Array\n(\n => 223.190.18.160\n)\n\n => Array\n(\n => 124.253.113.226\n)\n\n => Array\n(\n => 14.180.77.240\n)\n\n => Array\n(\n => 106.215.76.24\n)\n\n => Array\n(\n => 106.210.155.153\n)\n\n => Array\n(\n => 111.119.187.42\n)\n\n => Array\n(\n => 146.196.32.106\n)\n\n => Array\n(\n => 122.162.22.27\n)\n\n => Array\n(\n => 49.145.59.252\n)\n\n => Array\n(\n => 95.47.247.92\n)\n\n => Array\n(\n => 103.99.218.50\n)\n\n => Array\n(\n => 157.37.192.88\n)\n\n => Array\n(\n => 82.102.31.242\n)\n\n => Array\n(\n => 157.46.220.64\n)\n\n => Array\n(\n => 180.151.107.52\n)\n\n => Array\n(\n => 203.81.240.75\n)\n\n => Array\n(\n => 122.167.213.130\n)\n\n => Array\n(\n => 103.227.70.164\n)\n\n => Array\n(\n => 106.215.81.169\n)\n\n => Array\n(\n => 157.46.214.170\n)\n\n => Array\n(\n => 103.69.27.163\n)\n\n => Array\n(\n => 124.253.23.213\n)\n\n => Array\n(\n => 157.37.167.174\n)\n\n => Array\n(\n => 1.39.204.67\n)\n\n => Array\n(\n => 112.196.132.51\n)\n\n => Array\n(\n => 119.152.61.222\n)\n\n => Array\n(\n => 47.31.36.174\n)\n\n => Array\n(\n => 47.31.152.174\n)\n\n => Array\n(\n => 49.34.18.105\n)\n\n => Array\n(\n => 157.37.170.101\n)\n\n => Array\n(\n => 118.209.241.234\n)\n\n => Array\n(\n => 103.67.19.9\n)\n\n => Array\n(\n => 182.189.14.154\n)\n\n => Array\n(\n => 45.127.233.232\n)\n\n => Array\n(\n => 27.96.94.91\n)\n\n => Array\n(\n => 183.83.214.250\n)\n\n => Array\n(\n => 47.31.27.140\n)\n\n => Array\n(\n => 47.31.129.199\n)\n\n => Array\n(\n => 157.44.156.111\n)\n\n => Array\n(\n => 42.110.163.2\n)\n\n => Array\n(\n => 124.253.64.210\n)\n\n => Array\n(\n => 49.36.167.54\n)\n\n => Array\n(\n => 27.63.135.145\n)\n\n => Array\n(\n => 157.35.254.63\n)\n\n => Array\n(\n => 39.45.18.182\n)\n\n => Array\n(\n => 197.210.85.102\n)\n\n => Array\n(\n => 112.196.132.90\n)\n\n => Array\n(\n => 59.152.97.84\n)\n\n => Array\n(\n => 43.242.178.7\n)\n\n => Array\n(\n => 47.31.40.70\n)\n\n => Array\n(\n => 202.134.10.136\n)\n\n => Array\n(\n => 132.154.241.43\n)\n\n => Array\n(\n => 185.209.179.240\n)\n\n => Array\n(\n => 202.47.50.28\n)\n\n => Array\n(\n => 182.186.1.29\n)\n\n => Array\n(\n => 124.253.114.229\n)\n\n => Array\n(\n => 49.32.210.126\n)\n\n => Array\n(\n => 43.242.178.122\n)\n\n => Array\n(\n => 42.111.28.52\n)\n\n => Array\n(\n => 23.227.141.44\n)\n\n => Array\n(\n => 23.227.141.156\n)\n\n => Array\n(\n => 103.253.173.79\n)\n\n => Array\n(\n => 116.75.231.74\n)\n\n => Array\n(\n => 106.76.78.196\n)\n\n => Array\n(\n => 116.75.197.68\n)\n\n => Array\n(\n => 42.108.172.131\n)\n\n => Array\n(\n => 157.38.27.199\n)\n\n => Array\n(\n => 103.70.86.205\n)\n\n => Array\n(\n => 119.152.63.239\n)\n\n => Array\n(\n => 103.233.116.94\n)\n\n => Array\n(\n => 111.119.188.17\n)\n\n => Array\n(\n => 103.196.160.156\n)\n\n => Array\n(\n => 27.97.208.40\n)\n\n => Array\n(\n => 188.163.7.136\n)\n\n => Array\n(\n => 49.15.202.205\n)\n\n => Array\n(\n => 124.253.201.111\n)\n\n => Array\n(\n => 182.190.213.246\n)\n\n => Array\n(\n => 5.154.174.10\n)\n\n => Array\n(\n => 103.21.185.16\n)\n\n => Array\n(\n => 112.196.132.67\n)\n\n => Array\n(\n => 49.15.194.230\n)\n\n => Array\n(\n => 103.118.34.103\n)\n\n => Array\n(\n => 49.15.201.92\n)\n\n => Array\n(\n => 42.111.13.238\n)\n\n => Array\n(\n => 203.192.213.137\n)\n\n => Array\n(\n => 45.115.190.82\n)\n\n => Array\n(\n => 78.26.130.102\n)\n\n => Array\n(\n => 49.15.85.202\n)\n\n => Array\n(\n => 106.76.193.33\n)\n\n => Array\n(\n => 103.70.41.30\n)\n\n => Array\n(\n => 103.82.78.254\n)\n\n => Array\n(\n => 110.38.35.90\n)\n\n => Array\n(\n => 181.214.107.27\n)\n\n => Array\n(\n => 27.110.183.162\n)\n\n => Array\n(\n => 94.225.230.215\n)\n\n => Array\n(\n => 27.97.185.58\n)\n\n => Array\n(\n => 49.146.196.124\n)\n\n => Array\n(\n => 119.157.76.144\n)\n\n => Array\n(\n => 103.99.218.34\n)\n\n => Array\n(\n => 185.32.221.247\n)\n\n => Array\n(\n => 27.97.161.12\n)\n\n => Array\n(\n => 27.62.144.214\n)\n\n => Array\n(\n => 124.253.90.151\n)\n\n => Array\n(\n => 49.36.135.69\n)\n\n => Array\n(\n => 39.40.217.106\n)\n\n => Array\n(\n => 119.152.235.136\n)\n\n => Array\n(\n => 103.91.103.226\n)\n\n => Array\n(\n => 117.222.226.93\n)\n\n => Array\n(\n => 182.190.24.126\n)\n\n => Array\n(\n => 27.97.223.179\n)\n\n => Array\n(\n => 202.137.115.11\n)\n\n => Array\n(\n => 43.242.178.130\n)\n\n => Array\n(\n => 182.189.125.232\n)\n\n => Array\n(\n => 182.190.202.87\n)\n\n => Array\n(\n => 124.253.102.193\n)\n\n => Array\n(\n => 103.75.247.73\n)\n\n => Array\n(\n => 122.177.100.97\n)\n\n => Array\n(\n => 47.31.192.254\n)\n\n => Array\n(\n => 49.149.73.185\n)\n\n => Array\n(\n => 39.57.147.197\n)\n\n => Array\n(\n => 103.110.147.52\n)\n\n => Array\n(\n => 124.253.106.255\n)\n\n => Array\n(\n => 152.57.116.136\n)\n\n => Array\n(\n => 110.38.35.102\n)\n\n => Array\n(\n => 182.18.206.127\n)\n\n => Array\n(\n => 103.133.59.246\n)\n\n => Array\n(\n => 27.97.189.139\n)\n\n => Array\n(\n => 179.61.245.54\n)\n\n => Array\n(\n => 103.240.233.176\n)\n\n => Array\n(\n => 111.88.124.196\n)\n\n => Array\n(\n => 49.146.215.3\n)\n\n => Array\n(\n => 110.39.10.246\n)\n\n => Array\n(\n => 27.5.42.135\n)\n\n => Array\n(\n => 27.97.177.251\n)\n\n => Array\n(\n => 93.177.75.254\n)\n\n => Array\n(\n => 43.242.177.3\n)\n\n => Array\n(\n => 112.196.132.97\n)\n\n => Array\n(\n => 116.75.242.188\n)\n\n => Array\n(\n => 202.8.118.101\n)\n\n => Array\n(\n => 49.36.65.43\n)\n\n => Array\n(\n => 157.37.146.220\n)\n\n => Array\n(\n => 157.37.143.235\n)\n\n => Array\n(\n => 157.38.94.34\n)\n\n => Array\n(\n => 49.36.131.1\n)\n\n => Array\n(\n => 132.154.92.97\n)\n\n => Array\n(\n => 132.154.123.115\n)\n\n => Array\n(\n => 49.15.197.222\n)\n\n => Array\n(\n => 124.253.198.72\n)\n\n => Array\n(\n => 27.97.217.95\n)\n\n => Array\n(\n => 47.31.194.65\n)\n\n => Array\n(\n => 197.156.190.156\n)\n\n => Array\n(\n => 197.156.190.230\n)\n\n => Array\n(\n => 103.62.152.250\n)\n\n => Array\n(\n => 103.152.212.126\n)\n\n => Array\n(\n => 185.233.18.177\n)\n\n => Array\n(\n => 116.75.63.83\n)\n\n => Array\n(\n => 157.38.56.125\n)\n\n => Array\n(\n => 119.157.107.195\n)\n\n => Array\n(\n => 103.87.50.73\n)\n\n => Array\n(\n => 95.142.120.141\n)\n\n => Array\n(\n => 154.13.1.221\n)\n\n => Array\n(\n => 103.147.87.79\n)\n\n => Array\n(\n => 39.53.173.186\n)\n\n => Array\n(\n => 195.114.145.107\n)\n\n => Array\n(\n => 157.33.201.185\n)\n\n => Array\n(\n => 195.85.219.36\n)\n\n => Array\n(\n => 105.161.67.127\n)\n\n => Array\n(\n => 110.225.87.77\n)\n\n => Array\n(\n => 103.95.167.236\n)\n\n => Array\n(\n => 89.187.162.213\n)\n\n => Array\n(\n => 27.255.189.50\n)\n\n => Array\n(\n => 115.96.77.54\n)\n\n => Array\n(\n => 223.182.220.223\n)\n\n => Array\n(\n => 157.47.206.192\n)\n\n => Array\n(\n => 182.186.110.226\n)\n\n => Array\n(\n => 39.53.243.237\n)\n\n => Array\n(\n => 39.40.228.58\n)\n\n => Array\n(\n => 157.38.60.9\n)\n\n => Array\n(\n => 106.198.244.189\n)\n\n => Array\n(\n => 124.253.51.164\n)\n\n => Array\n(\n => 49.147.113.58\n)\n\n => Array\n(\n => 14.231.196.229\n)\n\n => Array\n(\n => 103.81.214.152\n)\n\n => Array\n(\n => 117.222.220.60\n)\n\n => Array\n(\n => 83.142.111.213\n)\n\n => Array\n(\n => 14.224.77.147\n)\n\n => Array\n(\n => 110.235.236.95\n)\n\n => Array\n(\n => 103.26.83.30\n)\n\n => Array\n(\n => 106.206.191.82\n)\n\n => Array\n(\n => 103.49.117.135\n)\n\n => Array\n(\n => 202.47.39.9\n)\n\n => Array\n(\n => 180.178.145.205\n)\n\n => Array\n(\n => 43.251.93.119\n)\n\n => Array\n(\n => 27.6.212.182\n)\n\n => Array\n(\n => 39.42.156.20\n)\n\n => Array\n(\n => 47.31.141.195\n)\n\n => Array\n(\n => 157.37.146.73\n)\n\n => Array\n(\n => 49.15.93.155\n)\n\n => Array\n(\n => 162.210.194.37\n)\n\n => Array\n(\n => 223.188.160.236\n)\n\n => Array\n(\n => 47.9.90.158\n)\n\n => Array\n(\n => 49.15.85.224\n)\n\n => Array\n(\n => 49.15.93.134\n)\n\n => Array\n(\n => 107.179.244.94\n)\n\n => Array\n(\n => 182.190.203.90\n)\n\n => Array\n(\n => 185.192.69.203\n)\n\n => Array\n(\n => 185.17.27.99\n)\n\n => Array\n(\n => 119.160.116.182\n)\n\n => Array\n(\n => 203.99.177.25\n)\n\n => Array\n(\n => 162.228.207.248\n)\n\n => Array\n(\n => 47.31.245.69\n)\n\n => Array\n(\n => 49.15.210.159\n)\n\n => Array\n(\n => 42.111.2.112\n)\n\n => Array\n(\n => 223.186.116.79\n)\n\n => Array\n(\n => 103.225.176.143\n)\n\n => Array\n(\n => 45.115.190.49\n)\n\n => Array\n(\n => 115.42.71.105\n)\n\n => Array\n(\n => 157.51.11.157\n)\n\n => Array\n(\n => 14.175.56.186\n)\n\n => Array\n(\n => 59.153.16.7\n)\n\n => Array\n(\n => 106.202.84.144\n)\n\n => Array\n(\n => 27.6.242.91\n)\n\n => Array\n(\n => 47.11.112.107\n)\n\n => Array\n(\n => 106.207.54.187\n)\n\n => Array\n(\n => 124.253.196.121\n)\n\n => Array\n(\n => 51.79.161.244\n)\n\n => Array\n(\n => 103.41.24.100\n)\n\n => Array\n(\n => 195.66.79.32\n)\n\n => Array\n(\n => 117.196.127.42\n)\n\n => Array\n(\n => 103.75.247.197\n)\n\n => Array\n(\n => 89.187.162.107\n)\n\n => Array\n(\n => 223.238.154.49\n)\n\n => Array\n(\n => 117.223.99.139\n)\n\n => Array\n(\n => 103.87.59.134\n)\n\n => Array\n(\n => 124.253.212.30\n)\n\n => Array\n(\n => 202.47.62.55\n)\n\n => Array\n(\n => 47.31.219.128\n)\n\n => Array\n(\n => 49.14.121.72\n)\n\n => Array\n(\n => 124.253.212.189\n)\n\n => Array\n(\n => 103.244.179.24\n)\n\n => Array\n(\n => 182.190.213.92\n)\n\n => Array\n(\n => 43.242.178.51\n)\n\n => Array\n(\n => 180.92.138.54\n)\n\n => Array\n(\n => 111.119.187.26\n)\n\n => Array\n(\n => 49.156.111.31\n)\n\n => Array\n(\n => 27.63.108.183\n)\n\n => Array\n(\n => 27.58.184.79\n)\n\n => Array\n(\n => 39.40.225.130\n)\n\n => Array\n(\n => 157.38.5.178\n)\n\n => Array\n(\n => 103.112.55.44\n)\n\n => Array\n(\n => 119.160.100.247\n)\n\n => Array\n(\n => 39.53.101.15\n)\n\n => Array\n(\n => 47.31.207.117\n)\n\n => Array\n(\n => 112.196.158.155\n)\n\n => Array\n(\n => 94.204.247.123\n)\n\n => Array\n(\n => 103.118.76.38\n)\n\n => Array\n(\n => 124.29.212.208\n)\n\n => Array\n(\n => 124.253.196.250\n)\n\n => Array\n(\n => 118.70.182.242\n)\n\n => Array\n(\n => 157.38.78.67\n)\n\n => Array\n(\n => 103.99.218.33\n)\n\n => Array\n(\n => 137.59.220.191\n)\n\n => Array\n(\n => 47.31.139.182\n)\n\n => Array\n(\n => 182.179.136.36\n)\n\n => Array\n(\n => 106.203.73.130\n)\n\n => Array\n(\n => 193.29.107.188\n)\n\n => Array\n(\n => 81.96.92.111\n)\n\n => Array\n(\n => 110.93.203.185\n)\n\n => Array\n(\n => 103.163.248.128\n)\n\n => Array\n(\n => 43.229.166.135\n)\n\n => Array\n(\n => 43.230.106.175\n)\n\n => Array\n(\n => 202.47.62.54\n)\n\n => Array\n(\n => 39.37.181.46\n)\n\n => Array\n(\n => 49.15.204.204\n)\n\n => Array\n(\n => 122.163.237.110\n)\n\n => Array\n(\n => 45.249.8.92\n)\n\n => Array\n(\n => 27.34.50.159\n)\n\n => Array\n(\n => 39.42.171.27\n)\n\n => Array\n(\n => 124.253.101.195\n)\n\n => Array\n(\n => 188.166.145.20\n)\n\n => Array\n(\n => 103.83.145.220\n)\n\n => Array\n(\n => 39.40.96.137\n)\n\n => Array\n(\n => 157.37.185.196\n)\n\n => Array\n(\n => 103.115.124.32\n)\n\n => Array\n(\n => 72.255.48.85\n)\n\n => Array\n(\n => 124.253.74.46\n)\n\n => Array\n(\n => 60.243.225.5\n)\n\n => Array\n(\n => 103.58.152.194\n)\n\n => Array\n(\n => 14.248.71.63\n)\n\n => Array\n(\n => 152.57.214.137\n)\n\n => Array\n(\n => 103.166.58.14\n)\n\n => Array\n(\n => 14.248.71.103\n)\n\n => Array\n(\n => 49.156.103.124\n)\n\n => Array\n(\n => 103.99.218.56\n)\n\n => Array\n(\n => 27.97.177.246\n)\n\n => Array\n(\n => 152.57.94.84\n)\n\n => Array\n(\n => 111.119.187.60\n)\n\n => Array\n(\n => 119.160.99.11\n)\n\n => Array\n(\n => 117.203.11.220\n)\n\n => Array\n(\n => 114.31.131.67\n)\n\n => Array\n(\n => 47.31.253.95\n)\n\n => Array\n(\n => 83.139.184.178\n)\n\n => Array\n(\n => 125.57.9.72\n)\n\n => Array\n(\n => 185.233.16.53\n)\n\n => Array\n(\n => 49.36.180.197\n)\n\n => Array\n(\n => 95.142.119.27\n)\n\n => Array\n(\n => 223.225.70.77\n)\n\n => Array\n(\n => 47.15.222.200\n)\n\n => Array\n(\n => 47.15.218.231\n)\n\n => Array\n(\n => 111.119.187.34\n)\n\n => Array\n(\n => 157.37.198.81\n)\n\n => Array\n(\n => 43.242.177.92\n)\n\n => Array\n(\n => 122.161.68.214\n)\n\n => Array\n(\n => 47.31.145.92\n)\n\n => Array\n(\n => 27.7.196.201\n)\n\n => Array\n(\n => 39.42.172.183\n)\n\n => Array\n(\n => 49.15.129.162\n)\n\n => Array\n(\n => 49.15.206.110\n)\n\n => Array\n(\n => 39.57.141.45\n)\n\n => Array\n(\n => 171.229.175.90\n)\n\n => Array\n(\n => 119.160.68.200\n)\n\n => Array\n(\n => 193.176.84.214\n)\n\n => Array\n(\n => 43.242.177.77\n)\n\n => Array\n(\n => 137.59.220.95\n)\n\n => Array\n(\n => 122.177.118.209\n)\n\n => Array\n(\n => 103.92.214.27\n)\n\n => Array\n(\n => 178.62.10.228\n)\n\n => Array\n(\n => 103.81.214.91\n)\n\n => Array\n(\n => 156.146.33.68\n)\n\n => Array\n(\n => 42.118.116.60\n)\n\n => Array\n(\n => 183.87.122.190\n)\n\n => Array\n(\n => 157.37.159.162\n)\n\n => Array\n(\n => 59.153.16.9\n)\n\n => Array\n(\n => 223.185.43.241\n)\n\n => Array\n(\n => 103.81.214.153\n)\n\n => Array\n(\n => 47.31.143.169\n)\n\n => Array\n(\n => 112.196.158.250\n)\n\n => Array\n(\n => 156.146.36.110\n)\n\n => Array\n(\n => 27.255.34.80\n)\n\n => Array\n(\n => 49.205.77.19\n)\n\n => Array\n(\n => 95.142.120.20\n)\n\n => Array\n(\n => 171.49.195.53\n)\n\n => Array\n(\n => 39.37.152.132\n)\n\n => Array\n(\n => 103.121.204.237\n)\n\n => Array\n(\n => 43.242.176.153\n)\n\n => Array\n(\n => 43.242.176.120\n)\n\n => Array\n(\n => 122.161.66.120\n)\n\n => Array\n(\n => 182.70.140.223\n)\n\n => Array\n(\n => 103.201.135.226\n)\n\n => Array\n(\n => 202.47.44.135\n)\n\n => Array\n(\n => 182.179.172.27\n)\n\n => Array\n(\n => 185.22.173.86\n)\n\n => Array\n(\n => 67.205.148.219\n)\n\n => Array\n(\n => 27.58.183.140\n)\n\n => Array\n(\n => 39.42.118.163\n)\n\n => Array\n(\n => 117.5.204.59\n)\n\n => Array\n(\n => 223.182.193.163\n)\n\n => Array\n(\n => 157.37.184.33\n)\n\n => Array\n(\n => 110.37.218.92\n)\n\n => Array\n(\n => 106.215.8.67\n)\n\n => Array\n(\n => 39.42.94.179\n)\n\n => Array\n(\n => 106.51.25.124\n)\n\n => Array\n(\n => 157.42.25.212\n)\n\n => Array\n(\n => 43.247.40.170\n)\n\n => Array\n(\n => 101.50.108.111\n)\n\n => Array\n(\n => 117.102.48.152\n)\n\n => Array\n(\n => 95.142.120.48\n)\n\n => Array\n(\n => 183.81.121.160\n)\n\n => Array\n(\n => 42.111.21.195\n)\n\n => Array\n(\n => 50.7.142.180\n)\n\n => Array\n(\n => 223.130.28.33\n)\n\n => Array\n(\n => 107.161.86.141\n)\n\n => Array\n(\n => 117.203.249.159\n)\n\n => Array\n(\n => 110.225.192.64\n)\n\n => Array\n(\n => 157.37.152.168\n)\n\n => Array\n(\n => 110.39.2.202\n)\n\n => Array\n(\n => 23.106.56.52\n)\n\n => Array\n(\n => 59.150.87.85\n)\n\n => Array\n(\n => 122.162.175.128\n)\n\n => Array\n(\n => 39.40.63.182\n)\n\n => Array\n(\n => 182.190.108.76\n)\n\n => Array\n(\n => 49.36.44.216\n)\n\n => Array\n(\n => 73.105.5.185\n)\n\n => Array\n(\n => 157.33.67.204\n)\n\n => Array\n(\n => 157.37.164.171\n)\n\n => Array\n(\n => 192.119.160.21\n)\n\n => Array\n(\n => 156.146.59.29\n)\n\n => Array\n(\n => 182.190.97.213\n)\n\n => Array\n(\n => 39.53.196.168\n)\n\n => Array\n(\n => 112.196.132.93\n)\n\n => Array\n(\n => 182.189.7.18\n)\n\n => Array\n(\n => 101.53.232.117\n)\n\n => Array\n(\n => 43.242.178.105\n)\n\n => Array\n(\n => 49.145.233.44\n)\n\n => Array\n(\n => 5.107.214.18\n)\n\n => Array\n(\n => 139.5.242.124\n)\n\n => Array\n(\n => 47.29.244.80\n)\n\n => Array\n(\n => 43.242.178.180\n)\n\n => Array\n(\n => 194.110.84.171\n)\n\n => Array\n(\n => 103.68.217.99\n)\n\n => Array\n(\n => 182.182.27.59\n)\n\n => Array\n(\n => 119.152.139.146\n)\n\n => Array\n(\n => 39.37.131.1\n)\n\n => Array\n(\n => 106.210.99.47\n)\n\n => Array\n(\n => 103.225.176.68\n)\n\n => Array\n(\n => 42.111.23.67\n)\n\n => Array\n(\n => 223.225.37.57\n)\n\n => Array\n(\n => 114.79.1.247\n)\n\n => Array\n(\n => 157.42.28.39\n)\n\n => Array\n(\n => 47.15.13.68\n)\n\n => Array\n(\n => 223.230.151.59\n)\n\n => Array\n(\n => 115.186.7.112\n)\n\n => Array\n(\n => 111.92.78.33\n)\n\n => Array\n(\n => 119.160.117.249\n)\n\n => Array\n(\n => 103.150.209.45\n)\n\n => Array\n(\n => 182.189.22.170\n)\n\n => Array\n(\n => 49.144.108.82\n)\n\n => Array\n(\n => 39.49.75.65\n)\n\n => Array\n(\n => 39.52.205.223\n)\n\n => Array\n(\n => 49.48.247.53\n)\n\n => Array\n(\n => 5.149.250.222\n)\n\n => Array\n(\n => 47.15.187.153\n)\n\n => Array\n(\n => 103.70.86.101\n)\n\n => Array\n(\n => 112.196.158.138\n)\n\n => Array\n(\n => 156.241.242.139\n)\n\n => Array\n(\n => 157.33.205.213\n)\n\n => Array\n(\n => 39.53.206.247\n)\n\n => Array\n(\n => 157.45.83.132\n)\n\n => Array\n(\n => 49.36.220.138\n)\n\n => Array\n(\n => 202.47.47.118\n)\n\n => Array\n(\n => 182.185.233.224\n)\n\n => Array\n(\n => 182.189.30.99\n)\n\n => Array\n(\n => 223.233.68.178\n)\n\n => Array\n(\n => 161.35.139.87\n)\n\n => Array\n(\n => 121.46.65.124\n)\n\n => Array\n(\n => 5.195.154.87\n)\n\n => Array\n(\n => 103.46.236.71\n)\n\n => Array\n(\n => 195.114.147.119\n)\n\n => Array\n(\n => 195.85.219.35\n)\n\n => Array\n(\n => 111.119.183.34\n)\n\n => Array\n(\n => 39.34.158.41\n)\n\n => Array\n(\n => 180.178.148.13\n)\n\n => Array\n(\n => 122.161.66.166\n)\n\n => Array\n(\n => 185.233.18.1\n)\n\n => Array\n(\n => 146.196.34.119\n)\n\n => Array\n(\n => 27.6.253.159\n)\n\n => Array\n(\n => 198.8.92.156\n)\n\n => Array\n(\n => 106.206.179.160\n)\n\n => Array\n(\n => 202.164.133.53\n)\n\n => Array\n(\n => 112.196.141.214\n)\n\n => Array\n(\n => 95.135.15.148\n)\n\n => Array\n(\n => 111.92.119.165\n)\n\n => Array\n(\n => 84.17.34.18\n)\n\n => Array\n(\n => 49.36.232.117\n)\n\n => Array\n(\n => 122.180.235.92\n)\n\n => Array\n(\n => 89.187.163.177\n)\n\n => Array\n(\n => 103.217.238.38\n)\n\n => Array\n(\n => 103.163.248.115\n)\n\n => Array\n(\n => 156.146.59.10\n)\n\n => Array\n(\n => 223.233.68.183\n)\n\n => Array\n(\n => 103.12.198.92\n)\n\n => Array\n(\n => 42.111.9.221\n)\n\n => Array\n(\n => 111.92.77.242\n)\n\n => Array\n(\n => 192.142.128.26\n)\n\n => Array\n(\n => 182.69.195.139\n)\n\n => Array\n(\n => 103.209.83.110\n)\n\n => Array\n(\n => 207.244.71.80\n)\n\n => Array\n(\n => 41.140.106.29\n)\n\n => Array\n(\n => 45.118.167.65\n)\n\n => Array\n(\n => 45.118.167.70\n)\n\n => Array\n(\n => 157.37.159.180\n)\n\n => Array\n(\n => 103.217.178.194\n)\n\n => Array\n(\n => 27.255.165.94\n)\n\n => Array\n(\n => 45.133.7.42\n)\n\n => Array\n(\n => 43.230.65.168\n)\n\n => Array\n(\n => 39.53.196.221\n)\n\n => Array\n(\n => 42.111.17.83\n)\n\n => Array\n(\n => 110.39.12.34\n)\n\n => Array\n(\n => 45.118.158.169\n)\n\n => Array\n(\n => 202.142.110.165\n)\n\n => Array\n(\n => 106.201.13.212\n)\n\n => Array\n(\n => 103.211.14.94\n)\n\n => Array\n(\n => 160.202.37.105\n)\n\n => Array\n(\n => 103.99.199.34\n)\n\n => Array\n(\n => 183.83.45.104\n)\n\n => Array\n(\n => 49.36.233.107\n)\n\n => Array\n(\n => 182.68.21.51\n)\n\n => Array\n(\n => 110.227.93.182\n)\n\n => Array\n(\n => 180.178.144.251\n)\n\n => Array\n(\n => 129.0.102.0\n)\n\n => Array\n(\n => 124.253.105.176\n)\n\n => Array\n(\n => 105.156.139.225\n)\n\n => Array\n(\n => 208.117.87.154\n)\n\n => Array\n(\n => 138.68.185.17\n)\n\n => Array\n(\n => 43.247.41.207\n)\n\n => Array\n(\n => 49.156.106.105\n)\n\n => Array\n(\n => 223.238.197.124\n)\n\n => Array\n(\n => 202.47.39.96\n)\n\n => Array\n(\n => 223.226.131.80\n)\n\n => Array\n(\n => 122.161.48.139\n)\n\n => Array\n(\n => 106.201.144.12\n)\n\n => Array\n(\n => 122.178.223.244\n)\n\n => Array\n(\n => 195.181.164.65\n)\n\n => Array\n(\n => 106.195.12.187\n)\n\n => Array\n(\n => 124.253.48.48\n)\n\n => Array\n(\n => 103.140.30.214\n)\n\n => Array\n(\n => 180.178.147.132\n)\n\n => Array\n(\n => 138.197.139.130\n)\n\n => Array\n(\n => 5.254.2.138\n)\n\n => Array\n(\n => 183.81.93.25\n)\n\n => Array\n(\n => 182.70.39.254\n)\n\n => Array\n(\n => 106.223.87.131\n)\n\n => Array\n(\n => 106.203.91.114\n)\n\n => Array\n(\n => 196.70.137.128\n)\n\n => Array\n(\n => 150.242.62.167\n)\n\n => Array\n(\n => 184.170.243.198\n)\n\n => Array\n(\n => 59.89.30.66\n)\n\n => Array\n(\n => 49.156.112.201\n)\n\n => Array\n(\n => 124.29.212.168\n)\n\n => Array\n(\n => 103.204.170.238\n)\n\n => Array\n(\n => 124.253.116.81\n)\n\n => Array\n(\n => 41.248.102.107\n)\n\n => Array\n(\n => 119.160.100.51\n)\n\n => Array\n(\n => 5.254.40.91\n)\n\n => Array\n(\n => 103.149.154.25\n)\n\n => Array\n(\n => 103.70.41.28\n)\n\n => Array\n(\n => 103.151.234.42\n)\n\n => Array\n(\n => 39.37.142.107\n)\n\n => Array\n(\n => 27.255.186.115\n)\n\n => Array\n(\n => 49.15.193.151\n)\n\n => Array\n(\n => 103.201.146.115\n)\n\n => Array\n(\n => 223.228.177.70\n)\n\n => Array\n(\n => 182.179.141.37\n)\n\n => Array\n(\n => 110.172.131.126\n)\n\n => Array\n(\n => 45.116.232.0\n)\n\n => Array\n(\n => 193.37.32.206\n)\n\n => Array\n(\n => 119.152.62.246\n)\n\n => Array\n(\n => 180.178.148.228\n)\n\n => Array\n(\n => 195.114.145.120\n)\n\n => Array\n(\n => 122.160.49.194\n)\n\n => Array\n(\n => 103.240.237.17\n)\n\n => Array\n(\n => 103.75.245.238\n)\n\n => Array\n(\n => 124.253.215.148\n)\n\n => Array\n(\n => 45.118.165.146\n)\n\n => Array\n(\n => 103.75.244.111\n)\n\n => Array\n(\n => 223.185.7.42\n)\n\n => Array\n(\n => 139.5.240.165\n)\n\n => Array\n(\n => 45.251.117.204\n)\n\n => Array\n(\n => 132.154.71.227\n)\n\n => Array\n(\n => 178.92.100.97\n)\n\n => Array\n(\n => 49.48.248.42\n)\n\n => Array\n(\n => 182.190.109.252\n)\n\n => Array\n(\n => 43.231.57.209\n)\n\n => Array\n(\n => 39.37.185.133\n)\n\n => Array\n(\n => 123.17.79.174\n)\n\n => Array\n(\n => 180.178.146.215\n)\n\n => Array\n(\n => 41.248.83.40\n)\n\n => Array\n(\n => 103.255.4.79\n)\n\n => Array\n(\n => 103.39.119.233\n)\n\n => Array\n(\n => 85.203.44.24\n)\n\n => Array\n(\n => 93.74.18.246\n)\n\n => Array\n(\n => 95.142.120.51\n)\n\n => Array\n(\n => 202.47.42.57\n)\n\n => Array\n(\n => 41.202.219.253\n)\n\n => Array\n(\n => 154.28.188.182\n)\n\n => Array\n(\n => 14.163.178.106\n)\n\n => Array\n(\n => 118.185.57.226\n)\n\n => Array\n(\n => 49.15.141.102\n)\n\n => Array\n(\n => 182.189.86.47\n)\n\n => Array\n(\n => 111.88.68.79\n)\n\n => Array\n(\n => 156.146.59.8\n)\n\n => Array\n(\n => 119.152.62.82\n)\n\n => Array\n(\n => 49.207.128.103\n)\n\n => Array\n(\n => 203.212.30.234\n)\n\n => Array\n(\n => 41.202.219.254\n)\n\n => Array\n(\n => 103.46.203.10\n)\n\n => Array\n(\n => 112.79.141.15\n)\n\n => Array\n(\n => 103.68.218.75\n)\n\n => Array\n(\n => 49.35.130.14\n)\n\n => Array\n(\n => 172.247.129.90\n)\n\n => Array\n(\n => 116.90.74.214\n)\n\n => Array\n(\n => 180.178.142.242\n)\n\n => Array\n(\n => 111.119.183.59\n)\n\n => Array\n(\n => 117.5.103.189\n)\n\n => Array\n(\n => 203.110.93.146\n)\n\n => Array\n(\n => 188.163.97.86\n)\n\n => Array\n(\n => 124.253.90.47\n)\n\n => Array\n(\n => 139.167.249.160\n)\n\n => Array\n(\n => 103.226.206.55\n)\n\n => Array\n(\n => 154.28.188.191\n)\n\n => Array\n(\n => 182.190.197.205\n)\n\n => Array\n(\n => 111.119.183.33\n)\n\n => Array\n(\n => 14.253.254.64\n)\n\n => Array\n(\n => 117.237.197.246\n)\n\n => Array\n(\n => 172.105.53.82\n)\n\n => Array\n(\n => 124.253.207.164\n)\n\n => Array\n(\n => 103.255.4.33\n)\n\n => Array\n(\n => 27.63.131.206\n)\n\n => Array\n(\n => 103.118.170.99\n)\n\n => Array\n(\n => 111.119.183.55\n)\n\n => Array\n(\n => 14.182.101.109\n)\n\n => Array\n(\n => 175.107.223.199\n)\n\n => Array\n(\n => 39.57.168.94\n)\n\n => Array\n(\n => 122.182.213.139\n)\n\n => Array\n(\n => 112.79.214.237\n)\n\n => Array\n(\n => 27.6.252.22\n)\n\n => Array\n(\n => 89.163.212.83\n)\n\n => Array\n(\n => 182.189.23.1\n)\n\n => Array\n(\n => 49.15.222.253\n)\n\n => Array\n(\n => 125.63.97.110\n)\n\n => Array\n(\n => 223.233.65.159\n)\n\n => Array\n(\n => 139.99.159.18\n)\n\n => Array\n(\n => 45.118.165.137\n)\n\n => Array\n(\n => 39.52.2.167\n)\n\n => Array\n(\n => 39.57.141.24\n)\n\n => Array\n(\n => 27.5.32.145\n)\n\n => Array\n(\n => 49.36.212.33\n)\n\n => Array\n(\n => 157.33.218.32\n)\n\n => Array\n(\n => 116.71.4.122\n)\n\n => Array\n(\n => 110.93.244.176\n)\n\n => Array\n(\n => 154.73.203.156\n)\n\n => Array\n(\n => 136.158.30.235\n)\n\n => Array\n(\n => 122.161.53.72\n)\n\n => Array\n(\n => 106.203.203.156\n)\n\n => Array\n(\n => 45.133.7.22\n)\n\n => Array\n(\n => 27.255.180.69\n)\n\n => Array\n(\n => 94.46.244.3\n)\n\n => Array\n(\n => 43.242.178.157\n)\n\n => Array\n(\n => 171.79.189.215\n)\n\n => Array\n(\n => 37.117.141.89\n)\n\n => Array\n(\n => 196.92.32.64\n)\n\n => Array\n(\n => 154.73.203.157\n)\n\n => Array\n(\n => 183.83.176.14\n)\n\n => Array\n(\n => 106.215.84.145\n)\n\n => Array\n(\n => 95.142.120.12\n)\n\n => Array\n(\n => 190.232.110.94\n)\n\n => Array\n(\n => 179.6.194.47\n)\n\n => Array\n(\n => 103.62.155.172\n)\n\n => Array\n(\n => 39.34.156.177\n)\n\n => Array\n(\n => 122.161.49.120\n)\n\n => Array\n(\n => 103.58.155.253\n)\n\n => Array\n(\n => 175.107.226.20\n)\n\n => Array\n(\n => 206.81.28.165\n)\n\n => Array\n(\n => 49.36.216.36\n)\n\n => Array\n(\n => 104.223.95.178\n)\n\n => Array\n(\n => 122.177.69.35\n)\n\n => Array\n(\n => 39.57.163.107\n)\n\n => Array\n(\n => 122.161.53.35\n)\n\n => Array\n(\n => 182.190.102.13\n)\n\n => Array\n(\n => 122.161.68.95\n)\n\n => Array\n(\n => 154.73.203.147\n)\n\n => Array\n(\n => 122.173.125.2\n)\n\n => Array\n(\n => 117.96.140.189\n)\n\n => Array\n(\n => 106.200.244.10\n)\n\n => Array\n(\n => 110.36.202.5\n)\n\n => Array\n(\n => 124.253.51.144\n)\n\n => Array\n(\n => 176.100.1.145\n)\n\n => Array\n(\n => 156.146.59.20\n)\n\n => Array\n(\n => 122.176.100.151\n)\n\n => Array\n(\n => 185.217.117.237\n)\n\n => Array\n(\n => 49.37.223.97\n)\n\n => Array\n(\n => 101.50.108.80\n)\n\n => Array\n(\n => 124.253.155.88\n)\n\n => Array\n(\n => 39.40.208.96\n)\n\n => Array\n(\n => 122.167.151.154\n)\n\n => Array\n(\n => 172.98.89.13\n)\n\n => Array\n(\n => 103.91.52.6\n)\n\n => Array\n(\n => 106.203.84.5\n)\n\n => Array\n(\n => 117.216.221.34\n)\n\n => Array\n(\n => 154.73.203.131\n)\n\n => Array\n(\n => 223.182.210.117\n)\n\n => Array\n(\n => 49.36.185.208\n)\n\n => Array\n(\n => 111.119.183.30\n)\n\n => Array\n(\n => 39.42.107.13\n)\n\n => Array\n(\n => 39.40.15.174\n)\n\n => Array\n(\n => 1.38.244.65\n)\n\n => Array\n(\n => 49.156.75.252\n)\n\n => Array\n(\n => 122.161.51.99\n)\n\n => Array\n(\n => 27.73.78.57\n)\n\n => Array\n(\n => 49.48.228.70\n)\n\n => Array\n(\n => 111.119.183.18\n)\n\n => Array\n(\n => 116.204.252.218\n)\n\n => Array\n(\n => 73.173.40.248\n)\n\n => Array\n(\n => 223.130.28.81\n)\n\n => Array\n(\n => 202.83.58.81\n)\n\n => Array\n(\n => 45.116.233.31\n)\n\n => Array\n(\n => 111.119.183.1\n)\n\n => Array\n(\n => 45.133.7.66\n)\n\n => Array\n(\n => 39.48.204.174\n)\n\n => Array\n(\n => 37.19.213.30\n)\n\n => Array\n(\n => 111.119.183.22\n)\n\n => Array\n(\n => 122.177.74.19\n)\n\n => Array\n(\n => 124.253.80.59\n)\n\n => Array\n(\n => 111.119.183.60\n)\n\n => Array\n(\n => 157.39.106.191\n)\n\n => Array\n(\n => 157.47.86.121\n)\n\n => Array\n(\n => 47.31.159.100\n)\n\n => Array\n(\n => 106.214.85.144\n)\n\n => Array\n(\n => 182.189.22.197\n)\n\n => Array\n(\n => 111.119.183.51\n)\n\n => Array\n(\n => 202.47.35.57\n)\n\n => Array\n(\n => 42.108.33.220\n)\n\n => Array\n(\n => 180.178.146.158\n)\n\n => Array\n(\n => 124.253.184.239\n)\n\n => Array\n(\n => 103.165.20.8\n)\n\n => Array\n(\n => 94.178.239.156\n)\n\n => Array\n(\n => 72.255.41.142\n)\n\n => Array\n(\n => 116.90.107.102\n)\n\n => Array\n(\n => 39.36.164.250\n)\n\n => Array\n(\n => 124.253.195.172\n)\n\n => Array\n(\n => 203.142.218.149\n)\n\n => Array\n(\n => 157.43.165.180\n)\n\n => Array\n(\n => 39.40.242.57\n)\n\n => Array\n(\n => 103.92.43.150\n)\n\n => Array\n(\n => 39.42.133.202\n)\n\n => Array\n(\n => 119.160.66.11\n)\n\n => Array\n(\n => 138.68.3.7\n)\n\n => Array\n(\n => 210.56.125.226\n)\n\n => Array\n(\n => 157.50.4.249\n)\n\n => Array\n(\n => 124.253.81.162\n)\n\n => Array\n(\n => 103.240.235.141\n)\n\n => Array\n(\n => 132.154.128.20\n)\n\n => Array\n(\n => 49.156.115.37\n)\n\n => Array\n(\n => 45.133.7.48\n)\n\n => Array\n(\n => 122.161.49.137\n)\n\n => Array\n(\n => 202.47.46.31\n)\n\n => Array\n(\n => 192.140.145.148\n)\n\n => Array\n(\n => 202.14.123.10\n)\n\n => Array\n(\n => 122.161.53.98\n)\n\n => Array\n(\n => 124.253.114.113\n)\n\n => Array\n(\n => 103.227.70.34\n)\n\n => Array\n(\n => 223.228.175.227\n)\n\n => Array\n(\n => 157.39.119.110\n)\n\n => Array\n(\n => 180.188.224.231\n)\n\n => Array\n(\n => 132.154.188.85\n)\n\n => Array\n(\n => 197.210.227.207\n)\n\n => Array\n(\n => 103.217.123.177\n)\n\n => Array\n(\n => 124.253.85.31\n)\n\n => Array\n(\n => 123.201.105.97\n)\n\n => Array\n(\n => 39.57.190.37\n)\n\n => Array\n(\n => 202.63.205.248\n)\n\n => Array\n(\n => 122.161.51.100\n)\n\n => Array\n(\n => 39.37.163.97\n)\n\n => Array\n(\n => 43.231.57.173\n)\n\n => Array\n(\n => 223.225.135.169\n)\n\n => Array\n(\n => 119.160.71.136\n)\n\n => Array\n(\n => 122.165.114.93\n)\n\n => Array\n(\n => 47.11.77.102\n)\n\n => Array\n(\n => 49.149.107.198\n)\n\n => Array\n(\n => 192.111.134.206\n)\n\n => Array\n(\n => 182.64.102.43\n)\n\n => Array\n(\n => 124.253.184.111\n)\n\n => Array\n(\n => 171.237.97.228\n)\n\n => Array\n(\n => 117.237.237.101\n)\n\n => Array\n(\n => 49.36.33.19\n)\n\n => Array\n(\n => 103.31.101.241\n)\n\n => Array\n(\n => 129.0.207.203\n)\n\n => Array\n(\n => 157.39.122.155\n)\n\n => Array\n(\n => 197.210.85.120\n)\n\n => Array\n(\n => 124.253.219.201\n)\n\n => Array\n(\n => 152.57.75.92\n)\n\n => Array\n(\n => 169.149.195.121\n)\n\n => Array\n(\n => 198.16.76.27\n)\n\n => Array\n(\n => 157.43.192.188\n)\n\n => Array\n(\n => 119.155.244.221\n)\n\n => Array\n(\n => 39.51.242.216\n)\n\n => Array\n(\n => 39.57.180.158\n)\n\n => Array\n(\n => 134.202.32.5\n)\n\n => Array\n(\n => 122.176.139.205\n)\n\n => Array\n(\n => 151.243.50.9\n)\n\n => Array\n(\n => 39.52.99.161\n)\n\n => Array\n(\n => 136.144.33.95\n)\n\n => Array\n(\n => 157.37.205.216\n)\n\n => Array\n(\n => 217.138.220.134\n)\n\n => Array\n(\n => 41.140.106.65\n)\n\n => Array\n(\n => 39.37.253.126\n)\n\n => Array\n(\n => 103.243.44.240\n)\n\n => Array\n(\n => 157.46.169.29\n)\n\n => Array\n(\n => 92.119.177.122\n)\n\n => Array\n(\n => 196.240.60.21\n)\n\n => Array\n(\n => 122.161.6.246\n)\n\n => Array\n(\n => 117.202.162.46\n)\n\n => Array\n(\n => 205.164.137.120\n)\n\n => Array\n(\n => 171.237.79.241\n)\n\n => Array\n(\n => 198.16.76.28\n)\n\n => Array\n(\n => 103.100.4.151\n)\n\n => Array\n(\n => 178.239.162.236\n)\n\n => Array\n(\n => 106.197.31.240\n)\n\n => Array\n(\n => 122.168.179.251\n)\n\n => Array\n(\n => 39.37.167.126\n)\n\n => Array\n(\n => 171.48.8.115\n)\n\n => Array\n(\n => 157.44.152.14\n)\n\n => Array\n(\n => 103.77.43.219\n)\n\n => Array\n(\n => 122.161.49.38\n)\n\n => Array\n(\n => 122.161.52.83\n)\n\n => Array\n(\n => 122.173.108.210\n)\n\n => Array\n(\n => 60.254.109.92\n)\n\n => Array\n(\n => 103.57.85.75\n)\n\n => Array\n(\n => 106.0.58.36\n)\n\n => Array\n(\n => 122.161.49.212\n)\n\n => Array\n(\n => 27.255.182.159\n)\n\n => Array\n(\n => 116.75.230.159\n)\n\n => Array\n(\n => 122.173.152.133\n)\n\n => Array\n(\n => 129.0.79.247\n)\n\n => Array\n(\n => 223.228.163.44\n)\n\n => Array\n(\n => 103.168.78.82\n)\n\n => Array\n(\n => 39.59.67.124\n)\n\n => Array\n(\n => 182.69.19.120\n)\n\n => Array\n(\n => 196.202.236.195\n)\n\n => Array\n(\n => 137.59.225.206\n)\n\n => Array\n(\n => 143.110.209.194\n)\n\n => Array\n(\n => 117.201.233.91\n)\n\n => Array\n(\n => 37.120.150.107\n)\n\n => Array\n(\n => 58.65.222.10\n)\n\n => Array\n(\n => 202.47.43.86\n)\n\n => Array\n(\n => 106.206.223.234\n)\n\n => Array\n(\n => 5.195.153.158\n)\n\n => Array\n(\n => 223.227.127.243\n)\n\n => Array\n(\n => 103.165.12.222\n)\n\n => Array\n(\n => 49.36.185.189\n)\n\n => Array\n(\n => 59.96.92.57\n)\n\n => Array\n(\n => 203.194.104.235\n)\n\n => Array\n(\n => 122.177.72.33\n)\n\n => Array\n(\n => 106.213.126.40\n)\n\n => Array\n(\n => 45.127.232.69\n)\n\n => Array\n(\n => 156.146.59.39\n)\n\n => Array\n(\n => 103.21.184.11\n)\n\n => Array\n(\n => 106.212.47.59\n)\n\n => Array\n(\n => 182.179.137.235\n)\n\n => Array\n(\n => 49.36.178.154\n)\n\n => Array\n(\n => 171.48.7.128\n)\n\n => Array\n(\n => 119.160.57.96\n)\n\n => Array\n(\n => 197.210.79.92\n)\n\n => Array\n(\n => 36.255.45.87\n)\n\n => Array\n(\n => 47.31.219.47\n)\n\n => Array\n(\n => 122.161.51.160\n)\n\n => Array\n(\n => 103.217.123.129\n)\n\n => Array\n(\n => 59.153.16.12\n)\n\n => Array\n(\n => 103.92.43.226\n)\n\n => Array\n(\n => 47.31.139.139\n)\n\n => Array\n(\n => 210.2.140.18\n)\n\n => Array\n(\n => 106.210.33.219\n)\n\n => Array\n(\n => 175.107.203.34\n)\n\n => Array\n(\n => 146.196.32.144\n)\n\n => Array\n(\n => 103.12.133.121\n)\n\n => Array\n(\n => 103.59.208.182\n)\n\n => Array\n(\n => 157.37.190.232\n)\n\n => Array\n(\n => 106.195.35.201\n)\n\n => Array\n(\n => 27.122.14.83\n)\n\n => Array\n(\n => 194.193.44.5\n)\n\n => Array\n(\n => 5.62.43.245\n)\n\n => Array\n(\n => 103.53.80.50\n)\n\n => Array\n(\n => 47.29.142.233\n)\n\n => Array\n(\n => 154.6.20.63\n)\n\n => Array\n(\n => 173.245.203.128\n)\n\n => Array\n(\n => 103.77.43.231\n)\n\n => Array\n(\n => 5.107.166.235\n)\n\n => Array\n(\n => 106.212.44.123\n)\n\n => Array\n(\n => 157.41.60.93\n)\n\n => Array\n(\n => 27.58.179.79\n)\n\n => Array\n(\n => 157.37.167.144\n)\n\n => Array\n(\n => 119.160.57.115\n)\n\n => Array\n(\n => 122.161.53.224\n)\n\n => Array\n(\n => 49.36.233.51\n)\n\n => Array\n(\n => 101.0.32.8\n)\n\n => Array\n(\n => 119.160.103.158\n)\n\n => Array\n(\n => 122.177.79.115\n)\n\n => Array\n(\n => 107.181.166.27\n)\n\n => Array\n(\n => 183.6.0.125\n)\n\n => Array\n(\n => 49.36.186.0\n)\n\n => Array\n(\n => 202.181.5.4\n)\n\n => Array\n(\n => 45.118.165.144\n)\n\n => Array\n(\n => 171.96.157.133\n)\n\n => Array\n(\n => 222.252.51.163\n)\n\n => Array\n(\n => 103.81.215.162\n)\n\n => Array\n(\n => 110.225.93.208\n)\n\n => Array\n(\n => 122.161.48.200\n)\n\n => Array\n(\n => 119.63.138.173\n)\n\n => Array\n(\n => 202.83.58.208\n)\n\n => Array\n(\n => 122.161.53.101\n)\n\n => Array\n(\n => 137.97.95.21\n)\n\n => Array\n(\n => 112.204.167.123\n)\n\n => Array\n(\n => 122.180.21.151\n)\n\n => Array\n(\n => 103.120.44.108\n)\n\n => Array\n(\n => 49.37.220.174\n)\n\n => Array\n(\n => 1.55.255.124\n)\n\n => Array\n(\n => 23.227.140.173\n)\n\n => Array\n(\n => 43.248.153.110\n)\n\n => Array\n(\n => 106.214.93.101\n)\n\n => Array\n(\n => 103.83.149.36\n)\n\n => Array\n(\n => 103.217.123.57\n)\n\n => Array\n(\n => 193.9.113.119\n)\n\n => Array\n(\n => 14.182.57.204\n)\n\n => Array\n(\n => 117.201.231.0\n)\n\n => Array\n(\n => 14.99.198.186\n)\n\n => Array\n(\n => 36.255.44.204\n)\n\n => Array\n(\n => 103.160.236.42\n)\n\n => Array\n(\n => 31.202.16.116\n)\n\n => Array\n(\n => 223.239.49.201\n)\n\n => Array\n(\n => 122.161.102.149\n)\n\n => Array\n(\n => 117.196.123.184\n)\n\n => Array\n(\n => 49.205.112.105\n)\n\n => Array\n(\n => 103.244.176.201\n)\n\n => Array\n(\n => 95.216.15.219\n)\n\n => Array\n(\n => 103.107.196.174\n)\n\n => Array\n(\n => 203.190.34.65\n)\n\n => Array\n(\n => 23.227.140.182\n)\n\n => Array\n(\n => 171.79.74.74\n)\n\n => Array\n(\n => 106.206.223.244\n)\n\n => Array\n(\n => 180.151.28.140\n)\n\n => Array\n(\n => 165.225.124.114\n)\n\n => Array\n(\n => 106.206.223.252\n)\n\n => Array\n(\n => 39.62.23.38\n)\n\n => Array\n(\n => 112.211.252.33\n)\n\n => Array\n(\n => 146.70.66.242\n)\n\n => Array\n(\n => 222.252.51.38\n)\n\n => Array\n(\n => 122.162.151.223\n)\n\n => Array\n(\n => 180.178.154.100\n)\n\n => Array\n(\n => 180.94.33.94\n)\n\n => Array\n(\n => 205.164.130.82\n)\n\n => Array\n(\n => 117.196.114.167\n)\n\n => Array\n(\n => 43.224.0.189\n)\n\n => Array\n(\n => 154.6.20.59\n)\n\n => Array\n(\n => 122.161.131.67\n)\n\n => Array\n(\n => 70.68.68.159\n)\n\n => Array\n(\n => 103.125.130.200\n)\n\n => Array\n(\n => 43.242.176.147\n)\n\n => Array\n(\n => 129.0.102.29\n)\n\n => Array\n(\n => 182.64.180.32\n)\n\n => Array\n(\n => 110.93.250.196\n)\n\n => Array\n(\n => 139.135.57.197\n)\n\n => Array\n(\n => 157.33.219.2\n)\n\n => Array\n(\n => 205.253.123.239\n)\n\n => Array\n(\n => 122.177.66.119\n)\n\n => Array\n(\n => 182.64.105.252\n)\n\n => Array\n(\n => 14.97.111.154\n)\n\n => Array\n(\n => 146.196.35.35\n)\n\n => Array\n(\n => 103.167.162.205\n)\n\n => Array\n(\n => 37.111.130.245\n)\n\n => Array\n(\n => 49.228.51.196\n)\n\n => Array\n(\n => 157.39.148.205\n)\n\n => Array\n(\n => 129.0.102.28\n)\n\n => Array\n(\n => 103.82.191.229\n)\n\n => Array\n(\n => 194.104.23.140\n)\n\n => Array\n(\n => 49.205.193.252\n)\n\n => Array\n(\n => 222.252.33.119\n)\n\n => Array\n(\n => 173.255.132.114\n)\n\n => Array\n(\n => 182.64.148.162\n)\n\n => Array\n(\n => 175.176.87.8\n)\n\n => Array\n(\n => 5.62.57.6\n)\n\n => Array\n(\n => 119.160.96.229\n)\n\n => Array\n(\n => 49.205.180.226\n)\n\n => Array\n(\n => 95.142.120.59\n)\n\n => Array\n(\n => 183.82.116.204\n)\n\n => Array\n(\n => 202.89.69.186\n)\n\n => Array\n(\n => 39.48.165.36\n)\n\n => Array\n(\n => 192.140.149.81\n)\n\n => Array\n(\n => 198.16.70.28\n)\n\n => Array\n(\n => 103.25.250.236\n)\n\n => Array\n(\n => 106.76.202.244\n)\n\n => Array\n(\n => 47.8.8.165\n)\n\n => Array\n(\n => 202.5.145.213\n)\n\n => Array\n(\n => 106.212.188.243\n)\n\n => Array\n(\n => 106.215.89.2\n)\n\n => Array\n(\n => 119.82.83.148\n)\n\n => Array\n(\n => 123.24.164.245\n)\n\n => Array\n(\n => 187.67.51.106\n)\n\n => Array\n(\n => 117.196.119.95\n)\n\n => Array\n(\n => 95.142.120.66\n)\n\n => Array\n(\n => 156.146.59.35\n)\n\n => Array\n(\n => 49.205.213.148\n)\n\n => Array\n(\n => 111.223.27.206\n)\n\n => Array\n(\n => 49.205.212.86\n)\n\n => Array\n(\n => 103.77.42.103\n)\n\n => Array\n(\n => 110.227.62.25\n)\n\n => Array\n(\n => 122.179.54.140\n)\n\n => Array\n(\n => 157.39.239.81\n)\n\n => Array\n(\n => 138.128.27.234\n)\n\n => Array\n(\n => 103.244.176.194\n)\n\n => Array\n(\n => 130.105.10.127\n)\n\n => Array\n(\n => 103.116.250.191\n)\n\n => Array\n(\n => 122.180.186.6\n)\n\n => Array\n(\n => 101.53.228.52\n)\n\n => Array\n(\n => 39.57.138.90\n)\n\n => Array\n(\n => 197.156.137.165\n)\n\n => Array\n(\n => 49.37.155.78\n)\n\n => Array\n(\n => 39.59.81.32\n)\n\n => Array\n(\n => 45.127.44.78\n)\n\n => Array\n(\n => 103.58.155.83\n)\n\n => Array\n(\n => 175.107.220.20\n)\n\n => Array\n(\n => 14.255.9.197\n)\n\n => Array\n(\n => 103.55.63.146\n)\n\n => Array\n(\n => 49.205.138.81\n)\n\n => Array\n(\n => 45.35.222.243\n)\n\n => Array\n(\n => 203.190.34.57\n)\n\n => Array\n(\n => 205.253.121.11\n)\n\n => Array\n(\n => 154.72.171.177\n)\n\n => Array\n(\n => 39.52.203.37\n)\n\n => Array\n(\n => 122.161.52.2\n)\n\n => Array\n(\n => 82.145.41.170\n)\n\n => Array\n(\n => 103.217.123.33\n)\n\n => Array\n(\n => 103.150.238.100\n)\n\n => Array\n(\n => 125.99.11.182\n)\n\n => Array\n(\n => 103.217.178.70\n)\n\n => Array\n(\n => 197.210.227.95\n)\n\n => Array\n(\n => 116.75.212.153\n)\n\n => Array\n(\n => 212.102.42.202\n)\n\n => Array\n(\n => 49.34.177.147\n)\n\n => Array\n(\n => 173.242.123.110\n)\n\n => Array\n(\n => 49.36.35.254\n)\n\n => Array\n(\n => 202.47.59.82\n)\n\n => Array\n(\n => 157.42.197.119\n)\n\n => Array\n(\n => 103.99.196.250\n)\n\n => Array\n(\n => 119.155.228.244\n)\n\n => Array\n(\n => 130.105.160.170\n)\n\n => Array\n(\n => 78.132.235.189\n)\n\n => Array\n(\n => 202.142.186.114\n)\n\n => Array\n(\n => 115.99.156.136\n)\n\n => Array\n(\n => 14.162.166.254\n)\n\n => Array\n(\n => 157.39.133.205\n)\n\n => Array\n(\n => 103.196.139.157\n)\n\n => Array\n(\n => 139.99.159.20\n)\n\n => Array\n(\n => 175.176.87.42\n)\n\n => Array\n(\n => 103.46.202.244\n)\n\n => Array\n(\n => 175.176.87.16\n)\n\n => Array\n(\n => 49.156.85.55\n)\n\n => Array\n(\n => 157.39.101.65\n)\n\n)\n```\nWow! This year has been something!: PRICEPLUS's Personal Finance Blog\n Layout: Blue and Brown (Default) Author's Creation\n Home > Wow! This year has been something!\n\n# Wow! This year has been something!\n\nDecember 19th, 2020 at 05:01 am\n\nMy DD's weddng was put off and has been rescheduled. I had to front all the money. I hope this Covid 19 madness is over by then. After 12 years the mini van was gettting long in the tooth. We got a new vehicle. We were saving since we bought the last one. I hate being in debt. I am old school and don't feel comfortable leasing.\nRetirement is almost upon me. Where did the time go? I am still frugal as ever. Still living below my means.\n\nIf I had it to do all over again I would buy less \"things\". Clutter is a curse. You look around and wonder why you purchased the things you did. Less is indeed more.\n\nI still live by two pithy aphorisms, \"Out of debt, out of danger\" and \"Use it up, wear it out, make do, do without\".\n\n1. Dido Says:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.98734146,"math_prob":0.9994584,"size":1720,"snap":"2021-43-2021-49","text_gpt3_token_len":472,"char_repetition_ratio":0.082167834,"word_repetition_ratio":0.8352941,"special_character_ratio":0.27790698,"punctuation_ratio":0.13131313,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99976367,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-11-26T23:40:50Z\",\"WARC-Record-ID\":\"<urn:uuid:37310ade-e2cd-41ca-b078-6f3dcb2e202e>\",\"Content-Length\":\"313138\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b80c4f75-7575-416a-a563-180042c8f428>\",\"WARC-Concurrent-To\":\"<urn:uuid:1641aea7-7ac5-4c0b-b423-7f157255f3e8>\",\"WARC-IP-Address\":\"173.231.200.26\",\"WARC-Target-URI\":\"https://priceplus.savingadvice.com/2020/12/19/wow-this-year-has-been-something_221794/\",\"WARC-Payload-Digest\":\"sha1:GPDIPDFUADLVOGPD7JLTYV2QDDSI47ZX\",\"WARC-Block-Digest\":\"sha1:CYDF72HJ7PAPLL4DCOPJMI73FOURNJFK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964358074.14_warc_CC-MAIN-20211126224056-20211127014056-00263.warc.gz\"}"}
https://www.geogebra.org/m/cpkeqyw9
[ "# Properties of Rectangles, Rhombuses and Squares\n\nIn this activity, you will use what you have learned about parallelograms to discover properties about rectangles, rhombuses (rhombi), and squares. As you complete this activity, fill in the blanks on notes on the list of properties for each quadrilateral.\nA rectangle is a parallelogram with 4 right angles.\nRectangles also have properties that not all parallelograms possess. Let's discover these additional properties.\n\nMeasure the diagonals in the rectangle below by selecting the measurement tool (the button with \"cm\" and an arrow), then click on each endpoint of the segment you are measuring. The length will appear. What did you discover about diagonals AD and FB? Also, move one of the vertices to change the rectangle (Select the move tool first. The one with the white arrow). Does this change what you discovered? Finish the following sentence on your notes: The diagonals of a rectangle are __________________________.\n\n## Applet #1 RECTANGLE\n\nNow, let's explore rhombuses. A rhombus is a parallelgram with 4 congruent sides.\nRhombuses also have properties that not all parallelograms possess. Let's discover these additional properties.\n\nIn the rhombus below, measure the angles AHB, BHG, EHG, and AHE (Select the angle tool, then click on the points in order of the name of the angle.) What did you discover? Move one of the vertices to see if your findings remain the same for all rhombuses. Finish the following sentence on your notes: The diagonals of a rhombus are __________________________ to each other.\n\n## Applet #3 RHOMBUS\n\nUsing the rhombus applet above, measure angles ABH, GBH, GEH, and AEH. What did you discover about these angles? Manipulate the rhombus to see if your findings hold for all rhombuses.\n\nSo what does one diagonal do to a pair of opposite angles in a rhombus?\n\nDoes the other diagonal do the same thing?\n\nSo what do the diagonals of a rhombus do to both pair of opposite angles in a rhombus? Finish the following sentence on your notes: Each diagonal of a rhombus __________________________ opposite angles of the rhombus.\n\nFinally, a square is a parallelogram, rhombus, and a rectangle.\n\nSince a square possesses all the properties of a parallelogram, rectangle, and rhombus, Finish the following sentence on your notes: The diagonals of a square are __________________________. The diagonals of a square are __________________________ to each other. Each diagonal of a square __________________________ opposite angles of the square." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8624324,"math_prob":0.88798875,"size":1876,"snap":"2020-34-2020-40","text_gpt3_token_len":421,"char_repetition_ratio":0.21794872,"word_repetition_ratio":0.14473684,"special_character_ratio":0.2771855,"punctuation_ratio":0.12320917,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98905784,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-11T19:52:51Z\",\"WARC-Record-ID\":\"<urn:uuid:bb01cf71-7191-41be-81cd-7e96b004cce6>\",\"Content-Length\":\"51808\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3879874a-ca51-44ee-ab52-25824dbc6ae6>\",\"WARC-Concurrent-To\":\"<urn:uuid:102bc402-cc36-4997-9e5c-6f29496eb72a>\",\"WARC-IP-Address\":\"52.85.144.94\",\"WARC-Target-URI\":\"https://www.geogebra.org/m/cpkeqyw9\",\"WARC-Payload-Digest\":\"sha1:762YTIXUI7JBP6OOKP7ZRIDXGLCP5TLA\",\"WARC-Block-Digest\":\"sha1:CMUJPVVDKTMRD7NF66YYH5T77WZIB2YI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738819.78_warc_CC-MAIN-20200811180239-20200811210239-00035.warc.gz\"}"}
https://www.scirp.org/journal/paperinformation.aspx?paperid=66160
[ "Numerical Study of Natural Convection in Square Cavity with Inner Bodies Using Finite Element Method\n\nA numerical study of heat transfer problem by natural convection of a fluid inside a square cavity with two inner bodies is presented. This subject is of great interest in the engineering area, mainly in applications involving development of heat exchangers and cooling or heating systems of bodies by natural convection mechanism. Two cases have been studied. The inner bodies are square in case 1 and circular in case 2. In both cases, the bodies are solid and thermally conductive, the cavity lower and upper horizontal surfaces are isothermal with high temperature Th and low temperature Tc, respectively. Both vertical surfaces are adiabatic. A FORTRAN code using Finite Element Method (FEM) is developed to simulate the problem and solve the governing equations. The distributions of stream function, ψ, dimensionless temperature, θ, and vorticity, ω, are determined. Heat transfer is evaluated by analyzing the behavior of the average Nusselt number. The Grashof number and thermal diffusivity ratio are considered in range from 2 × 104 to 105 and from 0.1 to 100, respectively. The fluid is air with Prandtl number fixed in 0.733.\n\nKEYWORDS\n\nCite this paper\n\nPinto, R. , Guimarães, P. and Menon, G. (2016) Numerical Study of Natural Convection in Square Cavity with Inner Bodies Using Finite Element Method. Open Journal of Fluid Dynamics, 6, 75-87. doi: 10.4236/ojfd.2016.62007.\n\nReceived 28 March 2016; accepted 26 April 2016; published 29 April 2016", null, "1. Introduction\n\nThe natural convection study in cavities with inner bodies has been of great interest nowadays due to several engineering applications. It can be useful for heat exchangers companies, electronic components cooling, heating or cooling of food products, chemical process equipment, environment control systems and others. The advance- ment in knowledge of computational in fluid dynamics (CFD) capability has contributed for more sophisticated equipment development with highest performance levels .\n\nA numerical study of natural convection inside a square cavity with inner bodies is presented in this paper. A FORTRAN algorithm code has been developed to solve the governing equations using the finite element method (FEM). The unstructured mesh developed has triangular elements and the fluid flow is laminar, two-dimensional, in transient or steady regime. FEM is chosen for this study due to its capacity in solving governing equations for complex geometries domain with efficiency and easiness of use, which is considered a great advantage of this method.\n\n2. Problem Description\n\nThis paper aims with conjugate heat transfer study. Heat transfer by natural convection occurs in fluid air domain, Wf, and conduction in solid domain, Ws, in a square cavity with inner bodies of thermal conductivity Ks. The bottom wall is held at the uniform high temperature Th and the top wall in uniform low temperature Tc. The initial condition is assumed with fluid and bodies kept in average temperature", null, ". The dimensionless schematic of the problem is shown in Figure 1 for both cases.\n\n(a) (b)\n\nFigure 1. Dimensionless schematical cavities for both cases; (a) case 1 with square inner bodies, (b) case 2 with circular inner bodies.\n\n3. Mathematical Formulation and Boundary Conditions\n\nThe finite element method is applied to solve the conservation equations for both fluid and solid domain. The air flow of this study is taken as two-dimensional, laminar, incompressible and under unsteady regime. The physical properties for fluid and solid are constant with exception of density in the body term of momentum equation for fluid and the Boussinesq approximation is invoked for fluid properties to relate density changes to temperature changes. There is not internal heat generation in the system. The governing equations for mass, momentum and energy are defined in dimensionless form. The dimensionless variables used in equations are introduced as follow:", null, "(1)\n\nThe governing equations for fluid domain are defined in dimensionless form as follow:", null, "(2)", null, "(3)", null, "(4)", null, "(5)\n\nwhere Prandtl and Grashof numbers are defined by:", null, ";", null, "(6)\n\nFor solid domain the energy equation is:", null, "(7)\n\nwhere D is thermal diffusivity ratio of solid to fluid defined by:", null, "(8)\n\nand thermal diffusivities are:", null, ";", null, "(9)\n\nThe terms y, q and w are introduced in this formulation resulting in partial differential equations (PDE) valid for fluid and solid domain written as:", null, "(10)", null, "(11)\n\n(12)\n\nDetailed mathematical procedure to achieve these PDE is described in .\n\nFor Equations (10) to (12) are considered:\n\n(13)\n\n(14)\n\nThe initial and boundary conditions for Equations (10) to (12) in dimensionless form are given as:\n\na) For\n\n(15)\n\nb) For\n\n(16)\n\n(17)\n\n(18)\n\n(19)\n\n(20)\n\n(21)\n\nFor Equations (16) to (21) S1, S2, S3 and S4 are surfaces of boundary in domain Ω (see Figure 1).\n\nThe average and local Nusselt number are defined by following relations, respectively:\n\n(22)\n\n(23)\n\nwhere S can be S1 or S2 surface.\n\nAll the symbols and alphabetical letters used in the above equations are defined in the nomenclature chart.\n\n4. Numerical Procedure\n\nThe numerical solution of PDE is obtained by FEM approach using Galerkin method . The results of the computational code are validated by comparison with results found in literature given in Table 1. The cavity used for code validation is a standard square cavity presented in dimensional and dimensionless forms with boundary conditions shown in Figure 2.\n\nTable 1 presents the results comparison for average Nusselt number in cold surface, Nuc, with fixed Grashof and Prandtl numbers. Table 2 presents similar comparison but with some different values for Grashof number keeping fixed Prandtl number.\n\nTable 1. Average Nusselt number in cold surface, Nuc, for Gr = 20000 and Pr = 0.733.\n\nFigure 2. Schematical square cavity for computational code test: (a) dimensional form, (b) dimensionless form.\n\nTable 2. Average Nusselt number in cold surface, Nuc, for Pr = 0.733 and a number of Gr.\n\nAccording with deviation values for both tables it is noted that they are higher in Table 1 but in general, the results can be considered acceptable for code validation.\n\nFigure 3 shows the result for grid independence study for both cases 1 and 2. The average Nusselt number at cold surface for steady state, Nuc, versus grid elements number, NE, is presented. Three different non-uniform grid systems are examined for each case. Four values for Grashof number are considered (Gr = 2 × 104 to 105) and diffusivity ratio, D, and Prandtl number, Pr, are kept in 10 and 0.733 respectively.\n\nRegarding case 1, the numbers of elements for examined grids are: 2546, 4056 and 4674. For low Grashof number 2 × 104 the average Nusselt number convergence is observed for all set of grids but for higher Grashof numbers the convergence occur for grids more refined with 4056 and 4674 elements. Considering only these two more refined grids, the maximum difference in Nusselt number values is 0.367% for all Grashof number range.\n\nDifferent situation is observed for case 2, where convergence occur in practically all set of grids, independent of Grashof number. The numbers of elements for examined grids are: 1464, 2190 and 3508. In the same way, if considered only two more refined grids, the maximum difference in Nusselt number values is 0.778% for all Grashof number range.\n\nIn both cases, for the rest of calculation in this study, the non-uniform grid with 4674 and 3508 elements were chosen for case 1 and case 2, respectively, for better accuracy in the results.\n\n5. Results and Discussion\n\nThe numerical solution was performed in transient and steady regime. The results of heat transfer by natural convection for both cases are showed in follow items. The Prandtl number is fixed in 0.733 for every numerical\n\nFigure 3. Average Nusselt number at cold surface, Nuc, versus grid elements number, NE: (a) case 1 and (b) case 2.\n\nsolution presented in this study.\n\nFigure 4 presents the average Nusselt number at cold surface, Nuc, versus Grashof number, Gr. The influence of parameter diffusivity ratio, D, is analyzed for four distinct values: 0.1, 1, 10 and 100. The result is presented for steady state regime and in this situation, the average Nusselt number at cold surface is equal the average Nusselt number at hot surface. For both cases is noted that for a specific Grashof number, increasing the value of D increases the average Nusselt number. For smaller values of D (0.1 and 1) the difference in average Nusselt number is more expressive than for higher values of D (10 and 100). For a fixed value of Grashof, the results have no significant variation with utilization of high values of D. Analyzing in Figure 4 the Grashof number influence for both cases, as expected, increasing Grashof number increases the average Nusselt number. The increasing in Grashof number results in higher velocities in fluid flow and more efficient heat exchange between fluid and cavity surface. Consequently, this situation improves the conductive heat transfer coefficient and increase average Nusselt number at cavity surface.\n\nThere is a good approximation in Nusselt values for case 1 and case 2, except for Gr = 5 × 104 where the difference is more notable with little advantage for case 2. These values approximation show that the difference in solid bodies geometry (square and circular) has no significant influence in final results for average Nusselt number, according with the cavity configuration (size and bodies position) and thermal parameters involved in this study.\n\nFigure 5 presents the average Nusselt number at cold surface, Nuc, versus dimensionless time, τ. The average Nusselt number behavior with the time is presented for Grashof numbers 2 × 104, 5 × 104, 7.5 × 104 and 105 with D kept in value 10. The average Nusselt number is higher at initial dimensionless time due to high temperature gradients between fluid and cold surface. It decreases drastically in the beginning and following reach the steady regime.\n\nIn case 1, for Gr = 2 × 104 and τ > 1 the average Nusselt number tends to stabilization and steady regime. For Gr = 50 × 104 the average Nusselt number presents a stabilization in time 1 to 6, increases the value in time 6 to 8 and finally reach the steady regime. This increase observed between time 6 and 8 is due to the modification in fluid flow pattern, which presents four convective cells and change to two big ones. This situation occurs in a minor time value for higher Grashof numbers (5 × 104 and 105). This fluid flow behavior is illustrated with more detail in Figure 9 and Figure 10.\n\nThe main differences between results for case 1 and 2 in Figure 5 are: 1) case 2 presents result for average Nusselt number practically equal case 1 for Grashof number 2 × 104 but they are greater for Grashof number 5 × 104 to 105 and 2) in despite of the general behavior of average Nusselt number for case 2 is similar of case 1, the transition in fluid flow pattern from four to two convective cells occur in different values of t.\n\nAt fixed value of Grashof number equal 7.5 × 104, Figure 6 presents the average Nusselt number at cold surface, Nuc, versus dimensionless time, τ. The average Nusselt number behavior with the time is presented for diffusivity ratio values 0.1, 1, 10 and 100. For both cases 1 and 2 the curves stabilization is noted in time around 4.5, following to steady regime. It is noted that increase in D values do not represent expressive changes in behavior of average Nusselt number with time. Comparing Figure 5 and Figure 6, it is noted in steady regime that\n\nFigure 4. Average Nusselt number at cold surface, Nuc, versus Grashof number, Gr: (a) case 1 and (b) case 2.\n\nFigure 5. Average Nusselt number at cold surface, Nuc, versus dimensionless time, τ: (a) case 1 and (b) case 2.\n\nFigure 6. Average Nusselt number at cold surface, Nuc, versus dimensionless time, τ: (a) case 1 and (b) case 2.\n\naverage Nusselt number is more affected by Grashof number variation than by diffusivities ratio variation.\n\nThe distribution of dimensionless temperature, q, and stream function, Y, in steady regime, is shown in Figure 7. Three values of Grashof number (2 × 104, 5 × 104 and 105) are considered and D value is fixed in 10. For low\n\nFigure 7. Distribution of dimensionless temperature, q, and stream function, y, for case 1 in steady regime.\n\nGrashof number 2 × 104, there are four convective cells with low values of Y, indicating that the fluid has low velocity and small recirculations, which cause small deformations in the temperature field. As can be seen, the isotherms lines are almost horizontal lines, indicating characteristic situation of pure conduction. On the other hand, for Grashof numbers 5 × 104 and 105 there are two major convective cells, with the cell situated on right side rotating in clockwise direction and the cell on left side rotating in counterclockwise direction. The higher the Grashof number, there are higher speeds and higher fluid flow recirculation resulting in greater deformation in temperature field and thus higher heat transfer hate.\n\nFor Figure 8 the considerations are the same made for Figure 7. However, it appears in case 2 greater fluid recirculation in comparison with case 1, resulting in a higher heat exchange, as evidenced by the slightly greater results of average Nusselt number for this case. This fluid recirculation is higher in case 2 due to circular geometry of inner bodies, that is more favorable for fluid recirculation between the cylinders and walls than for case 2, with square bodies.\n\nFigure 8. Distribution of dimensionless temperature, q, and stream function, y, for case 2 in steady regime.\n\nDifferent of the Figure 7 and Figure 8 where only steady regime is shown for different values of Grashof number, the Figure 9 and Figure 10 present the distribution of dimensionless temperature, q, and stream function, Y, in function of dimensionless time, τ, for case 1 and for case 2, respectively. For these analysis are considered Gr = 105 and D = 10. The main purpose of these figures is to show the evolution in time of the temperature field and the structures of fluid flow field. It is observed in these figures a stabilization of the velocity field and fluid temperature from the dimensionless time τ = 5 where steady regime is reached. For τ = 0.5 there is the formation of eight convective cells. In the time interval 0.5 to 1.2, the four cells formed between the bodies reduce their size and intensity. Following the top two cells become more intense and reduce the effects on the two cells below. In the steady regime there are pratically two predominant major cells and two small recir- culations in the cavity top.\n\n6. Conclusions\n\nThis study numerically investigated the heat transfer problem by natural convection in a square cavity with two\n\nFigure 9. Distribution of dimensionless temperature, q, and stream function, y, in dimensionless time, τ, for case 1.\n\nFigure 10. Distribution of dimensionless temperature, q, and stream function, y, in dimensionless time, τ, for case 2.\n\ninner bodies. Two cases have been studied: one of them with square inner bodies (case 1) and the other with circular inner bodies (case 2). For both cases, the bodies are solid and thermally conductive and the cavity lower and upper horizontal surfaces are isothermal with high temperature Th and Tc, respectively. Both vertical surfaces are adiabatic. A FORTRAN code using FEM is developed to solve the governing equations. The fluid is air with Prandtl number fixed in 0.733.\n\nThe results show for both cases that increasing the value of diffusivity ratio, D, increases the average Nusselt number. This difference in average Nusselt number is more expressive for variation in low values of D (0.1 to 1) than for variation in higher values of D (10 and 100).\n\nThe Grashof number has significative influence in both cases. Increasing Grashof number increases the average Nusselt number. The increasing in Grashof number results in higher velocities in fluid flow and more efficient heat exchange between fluid and cavity surface, resulting in higher average Nusselt numbers. It is noted in steady regime that average Nusselt number is more affected by Grashof number variation than by diffusivities ratio variation.\n\nIn despite of the results for average Nusselt number is near similar for both cases, it is noted that case 2 has a little advantage due its bodies with circular geometry. This circular condition is more favorable for fluid recirculation between the cylinders and walls than for fluid recirculation in case 1, with square bodies.\n\nThe distribution of dimensionless temperature, q, and stream function, Y, in function of dimensionless time, τ, are presented for both cases in this study. The parameters used are Gr = 105 and D = 10. The evolution in time of the temperature field and the structures of fluid flow field are presented. The results show that in dimensionless time τ = 5 pratically steady regime is stablished with two predominant major cells, one on cavity left side and other on right side. The cell on left presents recirculation on counterclowise direction and the cell on right side presents recirculation on clockwise direction.\n\nAcknowledgements\n\nThe authors thank FAPEMIG for its financial support.\n\nConflicts of Interest\n\nThe authors declare no conflicts of interest.\n\n Maliska, C.R. (2014) Transferência de Calor e Mecânica dos Fluidos Computacional. 2nd Edition, LTC—Livros Técnicos e Científicos Editora Ltda, Rio de Janeiro. Valencia, A. and Frederick, R.L. (1989) Heat Transfer in Square Cavities with Partially Active Vertical Walls. International Journal of Heat and Mass Transfer, 32, 1567-1574.http://dx.doi.org/10.1016/0017-9310(89)90078-1 Ghaddar, N.K. (1992) Natural Convection Heat Transfer between a Uniformly Heated Cylindrical Element and Its Rectangular Enclosure. International Journal of Heat and Mass Transfer, 35, 2327-2334.http://dx.doi.org/10.1016/0017-9310(92)90075-4 Kurokawa, F.Y., Zaparoli, E.L. and Andrade, C.R. (2005) Conjugate Natural Convection Applied to the Electronic Component Cooling. Proceedings of the 18th International Congress of Mechanical Engineering, Ouro Preto, 6-11 November 2005, 1-8. Jaikrishna, C.R., Rathan, R.B., Aswatha and Seetharamu, K.N. (2010) Effect of Discrete Heat Sources on Natural Convection in a Square Cavity. Proceedings of the 37th National & 4th International Conference on Fluid Mechanics and Fluid Power, Chennai, 16-18 December, 1-10. Saravanan, S. and Sivaraj, C. (2011) Natural Convection in an Enclosure with a Localized Nonuniform Heat Source on the Bottom Wall. International Journal of Heat and Mass Transfer, 54, 2820-2828.http://dx.doi.org/10.1016/j.ijheatmasstransfer.2011.02.058 Goldstein, R.J., et al. (2010) Heat Transfer—A Review of 2004 Literature. International Journal of Heat and Mass Transfer, 53, 4343-4396. http://dx.doi.org/10.1016/j.ijheatmasstransfer.2010.05.004 Goldstein, R.J., et al. (2010) Heat Transfer—A Review of 2005 Literature. International Journal of Heat and Mass Transfer, 53, 4397-4447. http://dx.doi.org/10.1016/j.ijheatmasstransfer.2010.05.005 Siddique, M., Khaled, A.R.A., Abdulhafiz, N.I. and Boukhary, A.Y. (2010) Recent Advances in Heat Transfer Enhancements: A Review Report. International Journal of Chemical Engineering, 2010, 1-28.http://dx.doi.org/10.1155/2010/106461 Pinto, R.J. (2007) Análise Numérica da Convecção Natural em Cavidade Quadrada com Corpos Internos Utilizando o Método de Elementos Finitos. M.S. Thesis, Federal University of Itajubá, Itajubá. Segerlind, L.J. (1984) Applied Finite Element Analysis. 2nd Edition, John Wiley & Sons Inc., New York. Menon, G.J. (1984) Convecção Natural no Interior de Coletores Solares Concentradores de Parábolas Compostas. Ph. D. Thesis, Technological Institute of Aeronautics, São José dos Campos. Ozoe, H., Yamamoto, K., Sayama, H. and Churchill, S.W. (1974) Natural Circulation in an Inclined Rectangular Channel Heated on One Side and Cooled on the Opposing Side. International Journal of Heat and Mass Transfer, 17, 1209-1217.http://dx.doi.org/10.1016/0017-9310(74)90121-5 Tabarrok, B. and Lin, R.C. (1977) Finite Element Analysis of Free Convection Flows. International Journal of Heat and Mass Transfer, 20, 945-952.http://dx.doi.org/10.1016/0017-9310(77)90065-5 Figueredo, J.R., Ganzarolli, M.M. and Almeida, P.I.F. (1986) Convecção Natural em Cavidades Retangulares – Solução Numérica. II Congresso Latino-Americano de Transferência de Calor e Matéria, São Paulo, 5-10 October 1986, 62-73. Wong, H.H. and Raithby, G.D. (1979) Improved Finite-Difference Methods Based on a Critical Evaluation of the Approximation Errors. Numerical Heat Transfer, 2, 139-163.http://dx.doi.org/10.1080/10407787908913404 Souza, J.J. (2006) Simulação Numérica da Transferência de Calor por Convecção Forçada, Natural e Mista numa Cavidade Retangular. M. S. Thesis, Federal University of Itajubá, Itajubá. Brito, R.F. (1999) Simulação Numérica da Transferência de Calor e do Escoamento de Fluidos. M. S. Thesis, Federal University of Itajubá, Itajubá.", null, "" ]
[ null, "https://html.scirp.org/file/1-2320278x5.png", null, "https://html.scirp.org/file/1-2320278x6.png", null, "https://html.scirp.org/file/1-2320278x8.png", null, "https://html.scirp.org/file/1-2320278x9.png", null, "https://html.scirp.org/file/1-2320278x10.png", null, "https://html.scirp.org/file/1-2320278x11.png", null, "https://html.scirp.org/file/1-2320278x12.png", null, "https://html.scirp.org/file/1-2320278x13.png", null, "https://html.scirp.org/file/1-2320278x14.png", null, "https://html.scirp.org/file/1-2320278x15.png", null, "https://html.scirp.org/file/1-2320278x16.png", null, "https://html.scirp.org/file/1-2320278x17.png", null, "https://html.scirp.org/file/1-2320278x18.png", null, "https://html.scirp.org/file/1-2320278x19.png", null, "https://html.scirp.org/file/1-2320278x20.png", null, "https://www.scirp.org/Images/ccby.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8935244,"math_prob":0.95470357,"size":15864,"snap":"2020-10-2020-16","text_gpt3_token_len":3623,"char_repetition_ratio":0.16765447,"word_repetition_ratio":0.13862514,"special_character_ratio":0.22188602,"punctuation_ratio":0.111487634,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98076254,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-26T11:41:07Z\",\"WARC-Record-ID\":\"<urn:uuid:531ffad8-1efb-48e3-9c83-2996b53f2b9c>\",\"Content-Length\":\"107676\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bb169e5c-644d-4f6d-9a71-7c4ed46d1ce7>\",\"WARC-Concurrent-To\":\"<urn:uuid:0b7a3d71-1d69-48e0-bdc6-8d58380978f8>\",\"WARC-IP-Address\":\"104.149.186.66\",\"WARC-Target-URI\":\"https://www.scirp.org/journal/paperinformation.aspx?paperid=66160\",\"WARC-Payload-Digest\":\"sha1:DGQIAEPTK5DRIFGSGTU7S3XFCBQFPBMJ\",\"WARC-Block-Digest\":\"sha1:U5OCIMUNQO3AWACPWC7CUXXY5GPXH2TN\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146341.16_warc_CC-MAIN-20200226084902-20200226114902-00301.warc.gz\"}"}
https://www.colorhexa.com/430136
[ "# #430136 Color Information\n\nIn a RGB color space, hex #430136 is composed of 26.3% red, 0.4% green and 21.2% blue. Whereas in a CMYK color space, it is composed of 0% cyan, 98.5% magenta, 19.4% yellow and 73.7% black. It has a hue angle of 311.8 degrees, a saturation of 97.1% and a lightness of 13.3%. #430136 color hex could be obtained by blending #86026c with #000000. Closest websafe color is: #330033.\n\n• R 26\n• G 0\n• B 21\nRGB color chart\n• C 0\n• M 99\n• Y 19\n• K 74\nCMYK color chart\n\n#430136 color description : Very dark magenta.\n\n# #430136 Color Conversion\n\nThe hexadecimal color #430136 has RGB values of R:67, G:1, B:54 and CMYK values of C:0, M:0.99, Y:0.19, K:0.74. Its decimal value is 4391222.\n\nHex triplet RGB Decimal 430136 `#430136` 67, 1, 54 `rgb(67,1,54)` 26.3, 0.4, 21.2 `rgb(26.3%,0.4%,21.2%)` 0, 99, 19, 74 311.8°, 97.1, 13.3 `hsl(311.8,97.1%,13.3%)` 311.8°, 98.5, 26.3 330033 `#330033`\nCIE-LAB 12.491, 35.06, -15.178 2.991, 1.482, 3.618 0.37, 0.183, 1.482 12.491, 38.205, 336.591 12.491, 21.742, -16.02 12.172, 22.567, -9.104 01000011, 00000001, 00110110\n\n# Color Schemes with #430136\n\n• #430136\n``#430136` `rgb(67,1,54)``\n• #01430e\n``#01430e` `rgb(1,67,14)``\nComplementary Color\n• #2f0143\n``#2f0143` `rgb(47,1,67)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #430115\n``#430115` `rgb(67,1,21)``\nAnalogous Color\n• #01432f\n``#01432f` `rgb(1,67,47)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #154301\n``#154301` `rgb(21,67,1)``\nSplit Complementary Color\n• #013643\n``#013643` `rgb(1,54,67)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #364301\n``#364301` `rgb(54,67,1)``\n• #0e0143\n``#0e0143` `rgb(14,1,67)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #364301\n``#364301` `rgb(54,67,1)``\n• #01430e\n``#01430e` `rgb(1,67,14)``\n• #000000\n``#000000` `rgb(0,0,0)``\n• #11000e\n``#11000e` `rgb(17,0,14)``\n• #2a0122\n``#2a0122` `rgb(42,1,34)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #5c014a\n``#5c014a` `rgb(92,1,74)``\n• #75025f\n``#75025f` `rgb(117,2,95)``\n• #8e0273\n``#8e0273` `rgb(142,2,115)``\nMonochromatic Color\n\n# Alternatives to #430136\n\nBelow, you can see some colors close to #430136. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #3f0143\n``#3f0143` `rgb(63,1,67)``\n• #430141\n``#430141` `rgb(67,1,65)``\n• #43013c\n``#43013c` `rgb(67,1,60)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #430131\n``#430131` `rgb(67,1,49)``\n• #43012b\n``#43012b` `rgb(67,1,43)``\n• #430126\n``#430126` `rgb(67,1,38)``\nSimilar Colors\n\n# #430136 Preview\n\nThis text has a font color of #430136.\n\n``<span style=\"color:#430136;\">Text here</span>``\n#430136 background color\n\nThis paragraph has a background color of #430136.\n\n``<p style=\"background-color:#430136;\">Content here</p>``\n#430136 border color\n\nThis element has a border color of #430136.\n\n``<div style=\"border:1px solid #430136;\">Content here</div>``\nCSS codes\n``.text {color:#430136;}``\n``.background {background-color:#430136;}``\n``.border {border:1px solid #430136;}``\n\n# Shades and Tints of #430136\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #090007 is the darkest color, while #fff5fd is the lightest one.\n\n• #090007\n``#090007` `rgb(9,0,7)``\n• #1c0017\n``#1c0017` `rgb(28,0,23)``\n• #300126\n``#300126` `rgb(48,1,38)``\n• #430136\n``#430136` `rgb(67,1,54)``\n• #560146\n``#560146` `rgb(86,1,70)``\n• #6a0255\n``#6a0255` `rgb(106,2,85)``\n• #7d0265\n``#7d0265` `rgb(125,2,101)``\n• #900274\n``#900274` `rgb(144,2,116)``\n• #a40284\n``#a40284` `rgb(164,2,132)``\n• #b70393\n``#b70393` `rgb(183,3,147)``\n• #ca03a3\n``#ca03a3` `rgb(202,3,163)``\n• #de03b3\n``#de03b3` `rgb(222,3,179)``\n• #f104c2\n``#f104c2` `rgb(241,4,194)``\n• #fb0dcc\n``#fb0dcc` `rgb(251,13,204)``\n• #fc20d0\n``#fc20d0` `rgb(252,32,208)``\n• #fc33d4\n``#fc33d4` `rgb(252,51,212)``\n• #fc47d9\n``#fc47d9` `rgb(252,71,217)``\n``#fd5add` `rgb(253,90,221)``\n• #fd6de1\n``#fd6de1` `rgb(253,109,225)``\n• #fd81e5\n``#fd81e5` `rgb(253,129,229)``\n• #fd94e9\n``#fd94e9` `rgb(253,148,233)``\n• #fea7ed\n``#fea7ed` `rgb(254,167,237)``\n• #febbf1\n``#febbf1` `rgb(254,187,241)``\n• #fecef5\n``#fecef5` `rgb(254,206,245)``\n• #ffe1f9\n``#ffe1f9` `rgb(255,225,249)``\n• #fff5fd\n``#fff5fd` `rgb(255,245,253)``\nTint Color Variation\n\n# Tones of #430136\n\nA tone is produced by adding gray to any pure hue. In this case, #242023 is the less saturated color, while #430136 is the most saturated one.\n\n• #242023\n``#242023` `rgb(36,32,35)``\n• #261e25\n``#261e25` `rgb(38,30,37)``\n• #291b26\n``#291b26` `rgb(41,27,38)``\n• #2b1928\n``#2b1928` `rgb(43,25,40)``\n• #2e1629\n``#2e1629` `rgb(46,22,41)``\n• #31132b\n``#31132b` `rgb(49,19,43)``\n• #33112c\n``#33112c` `rgb(51,17,44)``\n• #360e2e\n``#360e2e` `rgb(54,14,46)``\n• #390b30\n``#390b30` `rgb(57,11,48)``\n• #3b0931\n``#3b0931` `rgb(59,9,49)``\n• #3e0633\n``#3e0633` `rgb(62,6,51)``\n• #400434\n``#400434` `rgb(64,4,52)``\n• #430136\n``#430136` `rgb(67,1,54)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #430136 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.50900674,"math_prob":0.7780652,"size":3660,"snap":"2021-31-2021-39","text_gpt3_token_len":1587,"char_repetition_ratio":0.12910284,"word_repetition_ratio":0.011090573,"special_character_ratio":0.5724044,"punctuation_ratio":0.23783186,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99386454,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-03T18:46:31Z\",\"WARC-Record-ID\":\"<urn:uuid:ea36bc3b-8858-44ca-b85a-23880381cb25>\",\"Content-Length\":\"36064\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d4e3ae3c-71f8-4f1b-8e23-3baf6e621f16>\",\"WARC-Concurrent-To\":\"<urn:uuid:982cf750-0e2f-402c-b327-b0313c389295>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/430136\",\"WARC-Payload-Digest\":\"sha1:OOD4S7S7YSDKANQGEMGL3ETGQOVWUC6H\",\"WARC-Block-Digest\":\"sha1:GW4O3ICYKV6IIQQI64UZKX2GZPTDDDU4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154466.61_warc_CC-MAIN-20210803155731-20210803185731-00029.warc.gz\"}"}
https://www.boost.org/doc/libs/1_62_0/libs/multiprecision/doc/html/boost_multiprecision/tut/ints/cpp_int.html
[ "#", null, "Boost C++ Libraries\n\n...one of the most highly regarded and expertly designed C++ library projects in the world.\n\n#### cpp_int\n\n`#include <boost/multiprecision/cpp_int.hpp>`\n\n```namespace boost{ namespace multiprecision{\n\ntypedef unspecified-type limb_type;\n\nenum cpp_integer_type { signed_magnitude, unsigned_magnitude };\nenum cpp_int_check_type { checked, unchecked };\n\ntemplate <unsigned MinBits = 0,\nunsigned MaxBits = 0,\ncpp_integer_type SignType = signed_magnitude,\ncpp_int_check_type Checked = unchecked,\nclass Allocator = std::allocator<limb_type> >\nclass cpp_int_backend;\n//\n// Expression templates default to et_off if there is no allocator:\n//\ntemplate <unsigned MinBits, unsigned MaxBits, cpp_integer_type SignType, cpp_int_check_type Checked>\nstruct expression_template_default<cpp_int_backend<MinBits, MaxBits, SignType, Checked, void> >\n{ static const expression_template_option value = et_off; };\n\ntypedef number<cpp_int_backend<> > cpp_int; // arbitrary precision integer\ntypedef number<cpp_rational_backend> cpp_rational; // arbitrary precision rational number\n\n// Fixed precision unsigned types:\ntypedef number<cpp_int_backend<128, 128, unsigned_magnitude, unchecked, void> > uint128_t;\ntypedef number<cpp_int_backend<256, 256, unsigned_magnitude, unchecked, void> > uint256_t;\ntypedef number<cpp_int_backend<512, 512, unsigned_magnitude, unchecked, void> > uint512_t;\ntypedef number<cpp_int_backend<1024, 1024, unsigned_magnitude, unchecked, void> > uint1024_t;\n\n// Fixed precision signed types:\ntypedef number<cpp_int_backend<128, 128, signed_magnitude, unchecked, void> > int128_t;\ntypedef number<cpp_int_backend<256, 256, signed_magnitude, unchecked, void> > int256_t;\ntypedef number<cpp_int_backend<512, 512, signed_magnitude, unchecked, void> > int512_t;\ntypedef number<cpp_int_backend<1024, 1024, signed_magnitude, unchecked, void> > int1024_t;\n\n// Over again, but with checking enabled this time:\ntypedef number<cpp_int_backend<0, 0, signed_magnitude, checked> > checked_cpp_int;\ntypedef rational_adaptor<cpp_int_backend<0, 0, signed_magnitude, checked> > checked_cpp_rational_backend;\ntypedef number<cpp_rational_backend> checked_cpp_rational;\n\n// Checked fixed precision unsigned types:\ntypedef number<cpp_int_backend<128, 128, unsigned_magnitude, checked, void> > checked_uint128_t;\ntypedef number<cpp_int_backend<256, 256, unsigned_magnitude, checked, void> > checked_uint256_t;\ntypedef number<cpp_int_backend<512, 512, unsigned_magnitude, checked, void> > checked_uint512_t;\ntypedef number<cpp_int_backend<1024, 1024, unsigned_magnitude, checked, void> > checked_uint1024_t;\n\n// Fixed precision signed types:\ntypedef number<cpp_int_backend<128, 128, signed_magnitude, checked, void> > checked_int128_t;\ntypedef number<cpp_int_backend<256, 256, signed_magnitude, checked, void> > checked_int256_t;\ntypedef number<cpp_int_backend<512, 512, signed_magnitude, checked, void> > checked_int512_t;\ntypedef number<cpp_int_backend<1024, 1024, signed_magnitude, checked, void> > checked_int1024_t;\n\n}} // namespaces\n```\n\nThe `cpp_int_backend` type is normally used via one of the convenience typedefs given above.\n\nThis back-end is the \"Swiss Army Knife\" of integer types as it can represent both fixed and arbitrary precision integer types, and both signed and unsigned types. There are five template arguments:\n\nMinBits\n\nDetermines the number of Bits to store directly within the object before resorting to dynamic memory allocation. When zero, this field is determined automatically based on how many bits can be stored in union with the dynamic storage header: setting a larger value may improve performance as larger integer values will be stored internally before memory allocation is required.\n\nMaxBits\n\nDetermines the maximum number of bits to be stored in the type: resulting in a fixed precision type. When this value is the same as MinBits, then the Allocator parameter is ignored, as no dynamic memory allocation will ever be performed: in this situation the Allocator parameter should be set to type `void`. Note that this parameter should not be used simply to prevent large memory allocations, not only is that role better performed by the allocator, but fixed precision integers have a tendency to allocate all of MaxBits of storage more often than one would expect.\n\nSignType\n\nDetermines whether the resulting type is signed or not. Note that for arbitrary precision types this parameter must be `signed_magnitude`. For fixed precision types then this type may be either `signed_magnitude` or `unsigned_magnitude`.\n\nChecked\n\nThis parameter has two values: `checked` or `unchecked`. See below.\n\nAllocator\n\nThe allocator to use for dynamic memory allocation, or type `void` if MaxBits == MinBits.\n\nWhen the template parameter Checked is set to `checked` then the result is a checked-integer, checked and unchecked integers have the following properties:\n\nCondition\n\nChecked-Integer\n\nUnchecked-Integer\n\nNumeric overflow in fixed precision arithmetic\n\nThrows a `std::overflow_error`.\n\nPerforms arithmetic modulo 2MaxBits\n\nConstructing an integer from a value that can not be represented in the target type\n\nThrows a `std::range_error`.\n\nConverts the value modulo 2MaxBits, signed to unsigned conversions extract the last MaxBits bits of the 2's complement representation of the input value.\n\nUnsigned subtraction yielding a negative value.\n\nThrows a `std::range_error`.\n\nYields the value that would result from treating the unsigned type as a 2's complement signed type.\n\nAttempting a bitwise operation on a negative value.\n\nThrows a `std::range_error`\n\nYields the value, but not the bit pattern, that would result from performing the operation on a 2's complement integer type.\n\nThings you should know when using this type:\n\n• Default constructed `cpp_int_backend`s have the value zero.\n• Division by zero results in a `std::overflow_error` being thrown.\n• Construction from a string that contains invalid non-numeric characters results in a `std::runtime_error` being thrown.\n• Since the precision of `cpp_int_backend` is necessarily limited when the allocator parameter is void, care should be taken to avoid numeric overflow when using this type unless you actually want modulo-arithmetic behavior.\n• The type uses a sign-magnitude representation internally, so type `int128_t` has 128-bits of precision plus an extra sign bit. In this respect the behaviour of these types differs from built-in 2's complement types. In might be tempting to use a 127-bit type instead, and indeed this does work, but behaviour is still slightly different from a 2's complement built-in type as the min and max values are identical (apart from the sign), where as they differ by one for a true 2's complement type. That said it should be noted that there's no requirement for built-in types to be 2's complement either - it's simply that this is the most common format by far.\n• Attempting to print negative values as either an Octal or Hexadecimal string results in a `std::runtime_error` being thrown, this is a direct consequence of the sign-magnitude representation.\n• The fixed precision types `[checked_][u]intXXX_t` have expression template support turned off - it seems to make little difference to the performance of these types either way - so we may as well have the faster compile times by turning the feature off.\n• Unsigned types support subtraction - the result is \"as if\" a 2's complement operation had been performed as long as they are not checked-integers (see above). In other words they behave pretty much as a built in integer type would in this situation. So for example if we were using `uint128_t` then `uint128_t(1)-4` would result in the value `0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFD` of type `uint128_t`. However, had this operation been performed on `checked_uint128_t` then a `std::range_error` would have been thrown.\n• Unary negation of unsigned types results in a compiler error (static assertion).\n• This backend supports rvalue-references and is move-aware, making instantiations of `number` on this backend move aware.\n• When used at fixed precision, the size of this type is always one machine word larger than you would expect for an N-bit integer: the extra word stores both the sign, and how many machine words in the integer are actually in use. The latter is an optimisation for larger fixed precision integers, so that a 1024-bit integer has almost the same performance characteristics as a 128-bit integer, rather than being 4 times slower for addition and 16 times slower for multiplication (assuming the values involved would always fit in 128 bits). Typically this means you can use an integer type wide enough for the \"worst case scenario\" with only minor performance degradation even if most of the time the arithmetic could in fact be done with a narrower type.\n• When used at fixed precision and MaxBits is smaller than the number of bits in the largest native integer type, then internally `cpp_int_backend` switches to a \"trivial\" implementation where it is just a thin wrapper around a single integer. Note that it will still be slightly slower than a bare native integer, as it emulates a signed-magnitude representation rather than simply using the platforms native sign representation: this ensures there is no step change in behavior as a cpp_int grows in size.\n• Fixed precision `cpp_int`'s have some support for `constexpr` values and user-defined literals, see here for the full description. For example `0xfffff_cppi1024` specifies a 1024-bit integer with the value 0xffff. This can be used to generate compile time constants that are too large to fit into any built in number type.\n• You can import/export the raw bits of a cpp_int to and from external storage via the `import_bits` and `export_bits` functions. More information is in the section on import/export.\n###### Example:\n```#include <boost/multiprecision/cpp_int.hpp>\n#include <iostream>\n\nint main()\n{\nusing namespace boost::multiprecision;\n\nint128_t v = 1;\n\n// Do some fixed precision arithmetic:\nfor(unsigned i = 1; i <= 20; ++i)\nv *= i;\n\nstd::cout << v << std::endl; // prints 20!\n\n// Repeat at arbitrary precision:\ncpp_int u = 1;\nfor(unsigned i = 1; i <= 100; ++i)\nu *= i;\n\nstd::cout << u << std::endl; // prints 100!\n\nreturn 0;\n}\n```" ]
[ null, "https://www.boost.org/gfx/space.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.64920765,"math_prob":0.8790805,"size":8337,"snap":"2022-05-2022-21","text_gpt3_token_len":1943,"char_repetition_ratio":0.19728789,"word_repetition_ratio":0.026455026,"special_character_ratio":0.23941466,"punctuation_ratio":0.16605437,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97571397,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-17T01:47:07Z\",\"WARC-Record-ID\":\"<urn:uuid:d5be3d00-0ecf-4be7-9311-281288b49111>\",\"Content-Length\":\"40022\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e4d192a4-f8f4-4e7e-b4a4-07f66c41a29b>\",\"WARC-Concurrent-To\":\"<urn:uuid:02cd3d92-10ef-4a7d-9b67-297719a7c3bd>\",\"WARC-IP-Address\":\"146.20.110.251\",\"WARC-Target-URI\":\"https://www.boost.org/doc/libs/1_62_0/libs/multiprecision/doc/html/boost_multiprecision/tut/ints/cpp_int.html\",\"WARC-Payload-Digest\":\"sha1:EATEYK3CW2RZIFY34NJ564S3NNI4CAKG\",\"WARC-Block-Digest\":\"sha1:IMMT37LFO5BW4M4U6DTJYY3234REVPBL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662515466.5_warc_CC-MAIN-20220516235937-20220517025937-00388.warc.gz\"}"}
https://dcitech.com/slides/slide/ezwire1616-datasheet-145
[ "#### EZwire1616 Datasheet\n\nEZwire1616 Datasheet\n\n#### Share on Social Networks\n\nUse permanent link to share in social media\n\n#### Share with a friend\n\n3. Wiring Procedure All of the terminals are on a 3-level quick connect, sp ring cage terminal block. They are (from top to bottom level): 1- Signal 2- Supply Voltage (either 5V or 24V) 3- 0V common. Terminal Wiring Details Wiring the I/O is highly simplified with the quick- connect spring-cage terminals from Phoenix Contact. There are no time consuming screws to handle. T he wiring technician simply needs to perform the following steps: 1. Insert a flathead screwdriver (1/8\" wide by 1/2\" long tip) into the spring-cage release hole with some pressure 2. Tilt the screwdriver up to act as a lever, wh ich will open the associated terminal and allow for the wire to be inserted. 3. Insert the wire in the open terminal. 4. Once the wire is in place, the screwdriver can be lowered and removed from the actuation hole. The wire is now securely held in place with an exce llent electrical contact. Each of these steps are illustrated below. Terminal Wiring Step 1 www.triplc.com EZWire PLC Product Data Sheet\n\n4. Terminal Wiring Step 2 Terminal Wiring Step 3 Terminal Wiring Step 4 Compatible TRi Accessories for EZWire 1616 : - Graphic Touchscreen HMI : MT8050iE (4.3\"), MT6070iE (7\"), - Graphic HMI with 18 Btn Keypad : FP4030MR (3.1\"), monochrome, variable color - I/O Expansion : Exp4040, EXP2424, Exp1616R (16 Opto-i solated Digital Inouts, 16 Relay Outputs) - Auto485 : RS232 to RS485 converter - Analog Expansion : I-7000 series Analog I/O Expansion Modules - USB-RS232 Interface : for connection to USB port on PC - Din Rail Mounting : Din-Kit-2 www.triplc.com EZWire PLC Product Data Sheet\n\n1. E Z W i r e 1 6 1 6 P L C 12-30-2014 EZWire-series : EZ Wire system I/Os, Ethernet, Modbus TCP/IP , Stepper Motor Drive, + Analog I/O, RS232, RS485, iTRiLOGI Ladder+Basic, Floating Point E th e rn e t R S 2 3 2 ( F e m a le , D C E ) R S 4 8 5 R S 2 3 2 ( M a le , D TE ) P o w e r In (1 2 - 2 4 V ) B a c k -U p B a tt e ry F ie ld -r e a d y 3 -L e v e l Q u ic k -C o n n e c t T e rm in a ls 3 .9 0 0 \" H o le s d ia . 0 .1 2 5 \" M o u n t i n g H o le m o u n ti n g l o c a ti o n s f o r d ir e c t p a n e l m o u n t 3 .9 0 0 \" 4 .2 0 0 \" www.triplc.com Product Data Sheet EZWire1616 PLC APPLICATIONS INCLUDE : - Machinery Automation - Test Process Automation - Material Handling Automation - Packaging Automation - Food & Beverage Production - Pharmaceutical Dispensing - Water Treatment - HVAC Management - In-V ehicle/Vessel Controls P r o d u c t D e s c r i p t i o n T h e E Z W i r e 1 6 1 6 P L C i s a f i r s t o f i t s k i n d i n t h e P L C m a r k e t w i t h i n t e g r a t e d , f i e l d w i r i n g r e a d y I / O t e r m i n a l s . A s e v e r y d i g i t a l a n d a n a l o g I / O p o i n t i s p r o v i d e d w i t h i t s o w n p o w e r ( + 2 4 V o r + 5 V ) a n d 0 V o n a 3 - l e v e l s c r e w l e s s t e r m i n a l , e v e r y s e n s o r a n d a c t u a t o r i n t h e c o n t r o l s y s t e m c a n b e w i r e d d i r e c t l y t o t h e P L C w i t h o u t t h e n e e d f o r a d d i t i o n a l s c r e w t e r m i n a l b l o c k s a n d w i r e - h a r n e s s e s . T h i s d e s i g n s a v e s s y s t e m s i n t e g r a t o r s a n d m a c h i n e O E M s v a l u a b l e t i m e , m a t e r i a l c o s t , c o n t r o l p a n e l s p a c e a n d d r e a d e d w i r i n g e r r o r r e c o v e r y e f f o r t d u r i n g i n s t a l l a t i o n . T h e P L C i s a c o m p a c t 3 - b o a r d a r r a n g e m e n t d e s i g n e d t o t a k e a d v a n t a g e o f T R i 's t o p o f t h e l i n e P L C f e a t u r e s a n d y e t a l l o w s f o r s e n s i b l e m a i n t e n a n c e a n d e a s y r e p l a c e m e n t o f f a u l t y s u b - b o a r d w h e r e n e c e s s a r y . B y s e p a r a t i n g t h e c o n t r o l a n d t e r m i n a l b o a r d s , a f a i l e d c o n t r o l b o a r d , t h o u g h r a r e , c a n b e e a s i l y r e p l a c e d w i t h o u t u n d o i n g a n y e x i s t i n g w i r i n g i n t h e c o n t r o l p a n e l . S i t t i n g a t 4 1 / 2 \" x 8 1 / 8 \" a n d 1 1 / 2 \" t a l l , t h e c o m p a c t E Z W i r e 1 6 1 6 p r o v i d e s u s e f u l e x t r a r o o m i n t h e c o n t r o l p a n e l b o x f o r o t h e r c o m p o n e n t s a n d l i d - s i d e d e v i c e s ( s u c h a s H M I ) , a n d f o r e a s i e r i n s t a l l a t i o n a n d m a i n t e n a n c e a c c e s s . B e i n g a n e w e r m o d e l i n t r o d u c e d i n e a r l y 2 0 1 5 , t h e E Z W i r e 1 6 1 6 i n c o r p o r a t e s m a n y l e a d i n g e d g e a n d t i m e - t e s t e d f e a t u r e s o f T R i 's w e l l - e s t a b l i s h e d S u p e r P L C s e r i e s , i n p a r t i c u l a r , t h e h i g h - e n d F - s e r i e s P L C s . I t i s e q u i p p e d w i t h 3 2 D i g i t a l I / O s ( 1 6 i n , 1 6 o u t ) a n d 1 2 A n a l o g I / O s ( 8 i n , 4 o u t ) , w i t h e x p a n d a b i l i t y o f u p t o 1 2 8 D / I a n d 1 2 8 D / O . O u t p u t s w i l l a l s o s u p p o r t u p t o 4 x P W M a n d u p t o 3 x S t e p p e r M o t o r C o n t r o l . R e a l - t i m e c l o c k a n d b a t t e r y b a c k u p a r e s t a n d a r d f e a t u r e s o n t h i s P L C . S e r i a l c o m m u n i c a t i o n i s e n a b l e d t h r o u g h 2 x R S 2 3 2 a n d 1 x R S 4 8 5 p o r t s s u p p o r t i n g N a t i v e A S C I I H o s t L i n k C o m m a n d s , M O D B U S R T U , M O D B U S A S C I I a n d O M R O N C 2 0 H o s t l i n k C o m m a n d s . C o n t i n u i n g t h e t r a d i t i o n o f b r o a d n e t w o r k c o n n e c t i v i t y f o r a l l T R i P L C s s i n c e 2 0 0 1 , E t h e r n e t i s b u i l t - i n f o r d i r e c t c o n n e c t i o n t o L A N o r I n t e r n e t f o r p u r p o s e o f p r o g r a m m i n g , m o n i t o r i n g a n d r e m o t e c o n t r o l . S u p p o r t i n g M O D B U S / T C P S e r v e r a n d M O D B U S / T C P C l i e n t , T R i P L C s r e a d i l y w o r k i n m u l t i - b r a n d c o n t r o l s y s t e m e n v i r o n m e n t s . P r o g r a m m i n g o f t h e E Z W i r e 1 6 1 6 i s w i t h t h e p o w e r f u l i T R i L O G I s o f t w a r e w h i c h h a s b e e n d o w n l o a d e d m o r e t h a n h a l f a m i l l i o n t i m e s b y u s e r s o n l i n e f o r e d u c a t i o n , t r a i n i n g a n d e v a l u a t i o n . A d d i t i o n a l l y , f l o a t i n g p o i n t m a t h c o m p u t a t i o n h a s b e e n f u l l y e n a b l e d i n t h e E Z W i r e 1 6 1 6 .\n\n2. 64 PLC Environmental Specs (Temperature and Vibration) Absolute Max. Rating 1 FRAM : 12-30-2014 Digital Outputs 30V Analog Channels (0 to 5V) 10V - Acceleration = + 4.0g A# to Z#, 2 FP to FP (32-bit floating point variables) Memory Storage - Program 23.5K words (16-bit) of program memory stored in flash memory. 1 FRAM - 6K bytes additional non-volatile memory for integers and string storage Supported Protocols : Native ASCII Host Link Commands (programming/monitoring) - RS232 / RS485 - 25Hz to 100Hz - Amplitude = +1. 10% - 90% Rel. Humidity, non condensing Electrical Noise IEC801-4 (Fast transient) Vibration resistance IEC 68-2-6/1980 Vibration 1.6mm - 2KV to power supply, 50 microsecond pulse 50 microsecond pulse width. width, 1 min. 1KV to I/O by capacitive coupling, 30V Digital Inputs 30V Power Supply Input Programming Lang. / Env. iTRiLOGI Version 7 (Ladder Logic +Floating Point BASIC ) Operating Humidity Resistance 8.2\"(L) x 4.5\"(W) x 1.5\"(H) / 0.9 lb (0.408 kg) I/O Expansion (Digital) Expandable to 128 D/I and 128 D/O using EXP4040, EXP2424 and EXP1616R. Dimensions / Weight Operating Temperature - Operation -20 to +85 deg C (-4 to 185 deg F) All 16 outputs are 24V, Max 4A npn, Continuous Output Current 1A, Driver Type : N-Channel power MOSFET with low r DS = 0.05 Ω - Flash File System 1740K bytes Flash Drive. Data Logging, storage of user's webpages or applet. Access by FTP 1 (on a two-pin screw terminals) - Ethernet 1 RJ45 - RS485 Features and Specs Operating Voltage Input 12 to 24V DC (jumper not required) Digital Inputs 16 (24V npn) with LED indicators. Each input on 3-level quick connect terminal block that provides signal input, +24V & 0V EZWire1616 PLC PWM (current) - 4 x PWM 4A @24VDC (continuous frequencies, 0.1% duty cycle resolution) Encoder Inputs - 3 x 32-bit High Speed Counter (quadrature: 2 D/Is per channel) Interrupts - 10 x user-defined interrupt (latency < 0.5ms, +ve or –ve edge triggered) Digital Outputs 16 (24V npn) with LED Indicators Each output on 3-level quick connect terminal block that provides signal, +24V & 0V Stepper Motor Control - 3 x stepper motor control pulse/direction outputs (2 D/Os per stepper output), or 3 x unipolar stepper motor DRIVER outputs (4 D/Os per stepper driver). Analog I/Os - Input Interface 8 ch, 12 bit, 0-5V. May interface to 0-10V or 4-20mA inputs. Each Analog Input on 3-level quick connect terminal block that provides signal input, +5V & 0V 8 + 4 . - Output Interface 4 ch, 12 bit, 0-20mA Current. (Can be converted to 0-5V or 0-10V) Each Analog output on 3-level quick connect terminal block that provides signal output, +24V & 0V Processing I/O Scan time = 0.5ms (can be interrupted by input interrupts), Program Scan time = 2us per step High-Speed Counter 6 x pulse frequency, period and width measurement - may be used with pulse measurement, therefore allowing both position speed measurement from each channel. Counters Internal Relays / Timers 512 internal relays, 64 timers (any one or all can be configured as “HighSpeed” timers) Sequencers 8 with 32 steps (step# 0 - # 31) Real-Time Clock Real Time Clock and Calendar (Year, Day, Month, Hours, Min, Sec, day-of-week) - Lithium CR1632 battery-backed (runs up to 3 years without ext.l power or 10 years if powered off only 1/3 of the time) - Real Time Clock can be updated with Atomic clock data from NIST timer server if PLC is connected to the Internet PID Built-in 16 channels PID Computation Engine (Proportional, Integral, Derviative digital control) with Floating-point param eters Connection Ports - RS232 2 (DB9 female connector , DCE x 1. DB9 male connector, DTE x 1) - Support both Modbus/TCP Server (5 simult. connections ) and Modbus/TCP Client - Direct connection to LAN or Internet for programming, monitoring and Remote Control - Digital I/O Expansion 1 (IDC 10-pin) Communicatons - Ethernet - Extremely easy Peer-to-peer (or machine-to-machine) PLC communication. - Event-driven Emailing. Create and save data file on a networked PC's hard disk - TCP socket connection to any Server IP address:port number for data upload/download - FTP upload of PLC's created data files to external FTP servers - Excel spreadsheet Data Logging using TRi-ExcelLink software - Data A to Z (32-bit Integer) , A\\$ to Z\\$ (ASCII strings) 2 DM to DM (16-bit integer array) MODBUS RTU, MODBUS ASCII, OMRON C20H Host Link Commands Default COM speed 38,400 bps, may be set from 1200 to 115.2K & 230.4K bps State-of-The-Art, Ferro Magnetic RAM. No battery required. Unlimited read/write cycles 2 DM[ ] & FP[ ]: DM-DM and FP-FP are stored in FRAM and are therefore non-volatile. CE Conformance MC Directive 89/336/EEC as amended by 92/31/EEC, 93/68/EEC and93/97/EEC RoHS Compliance RoHS2 Directive 2011/65/EU www.triplc.com Product Data Sheet\n\n#### Views\n\n• 2824 Total Views\n• 1914 Website Views\n• 910 Embedded Views\n\n#### Actions\n\n• 0 Social Shares\n• 0 Likes\n• 0 Dislikes" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5263676,"math_prob":0.9819541,"size":11341,"snap":"2021-43-2021-49","text_gpt3_token_len":4234,"char_repetition_ratio":0.11837347,"word_repetition_ratio":0.1511976,"special_character_ratio":0.38867825,"punctuation_ratio":0.054472476,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9868958,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-28T07:24:42Z\",\"WARC-Record-ID\":\"<urn:uuid:6a68cd54-96ba-430d-bd7c-545609c7975d>\",\"Content-Length\":\"69377\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d4e2c1f0-ef4e-4599-8e19-8e9cea1e7d7e>\",\"WARC-Concurrent-To\":\"<urn:uuid:182b1c68-0418-4dbb-b2f6-b203c0b82596>\",\"WARC-IP-Address\":\"144.217.72.103\",\"WARC-Target-URI\":\"https://dcitech.com/slides/slide/ezwire1616-datasheet-145\",\"WARC-Payload-Digest\":\"sha1:ZGC4LJRKJHN2HT3FMWKOJ2S65XDLX4EL\",\"WARC-Block-Digest\":\"sha1:TAPUAD5W4Q466MOEGDVYVOJZWOEEPPCP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323588282.80_warc_CC-MAIN-20211028065732-20211028095732-00400.warc.gz\"}"}
https://www.daily24trend.com/?p=1217
[ "Tuesday , 28 June 2022\n\n# CROCHET GRANNY SQUARE WITH LEAVES\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\nHi dear friends !!! Today we will teach you how to create quick and easy granny square with leaves. It can be used to make a blanket, can be perfect for making pillows and other covers and can be done easily. Also can be used as a separate composition like a coaster.  This adorable square will definitely brighten up your home interior and add extra charm to any corner of your adobe.\n\nYou can optionally choose and combine colors. This lovely square has a very exclusive design and makes the best effect.  It is not difficult and we hope you will easily master it, with help of excellent instruction.\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\nAs always, Before you go I want to ask you if you value this work and you liked the knitting course, share it with all your friends on social networks and share it in their crochet groups so that all the little spiders in the world will benefit from it. crochet art !\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\nIf like me you’re always looking for patterns, Well I am here to take the frustration out of searching for your next pattern. The crochet community has grown last years and many designers are setting up their own websites and hosting their own patterns. I like to find and show you these independent designers and bring their fabulous projects to you. Please always visit and thank the individual designers for their generosity.\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\n​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​\n\nVideo tutorial" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9499318,"math_prob":0.9631442,"size":1296,"snap":"2022-27-2022-33","text_gpt3_token_len":254,"char_repetition_ratio":0.108359136,"word_repetition_ratio":0.0,"special_character_ratio":0.19675925,"punctuation_ratio":0.08267716,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.958825,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-30T04:51:21Z\",\"WARC-Record-ID\":\"<urn:uuid:7ed2773a-68ea-4d67-a5bf-65135ad62222>\",\"Content-Length\":\"48243\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:16f51b74-c895-409b-a9fd-dcff37f19711>\",\"WARC-Concurrent-To\":\"<urn:uuid:80a544c2-30c5-48db-b4fd-9b02bd87eb6e>\",\"WARC-IP-Address\":\"198.54.120.8\",\"WARC-Target-URI\":\"https://www.daily24trend.com/?p=1217\",\"WARC-Payload-Digest\":\"sha1:W7PB4345V3NYA5S6JUA2NXUWYU34OTRC\",\"WARC-Block-Digest\":\"sha1:VK3MIQSB7OVR2KTWFZS2IVE537IB6KIC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103661137.41_warc_CC-MAIN-20220630031950-20220630061950-00480.warc.gz\"}"}
https://scholarworks.utep.edu/dissertations/AAI29324236/
[ "# A Computationally Efficient Wald Test in M-Estimation\n\n#### Abstract\n\nUnder the maximum likelihood framework, three asymptotic overall tests have been well developed in generalized linear models (GLM) for testing the single null hypothesis H0 : θ = θ0, namely, the Wald test, Likelihood Ratio Test (LRT) and Score test also known as the Lagrange Multiplier test (LM). Modified versions of Wald, LR and LM tests can also be found for testing the significance of a portion of the parameter θ, i.e., if θ = (θT1, θT2 )T it is of interest to test H0 : θ2 = 0. However, with the constant increase of dimensionality in data, the three tests becomes unfeasible to compute. The computational cost one has to pay seems to be unrealistic and difficult or even untractable. The approach taken in this document to deal with this issue follows the profile likelihood framework which consists of partitioning the p-dimensional parameter vector θ into two parameter vectors θ1 and θ2 of dimension q and p − q, respectively, estimate θ1 under H0, say θ1, and use θ1 to estimate θ2. With this approach, one could reduce considerably the execution time when estimating a big number of parameters in the model without losing the asymptotic properties and the power of the traditional tests. Also, one could test the null hypothesis even if the dimension of θ is moderately bigger than the sample size n as long as both q and p − q are smaller than n.\n\nStatistics\n\n#### Recommended Citation\n\nUrenda Castañeda, Denisse, \"A Computationally Efficient Wald Test in M-Estimation\" (2022). ETD Collection for University of Texas, El Paso. AAI29324236.\nhttps://scholarworks.utep.edu/dissertations/AAI29324236\n\nCOinS" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8827557,"math_prob":0.8439511,"size":1678,"snap":"2022-40-2023-06","text_gpt3_token_len":400,"char_repetition_ratio":0.10095579,"word_repetition_ratio":0.007434944,"special_character_ratio":0.2181168,"punctuation_ratio":0.115755625,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97076744,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-01T12:10:35Z\",\"WARC-Record-ID\":\"<urn:uuid:0ee7bd7a-6878-4d82-8d2f-a1b30c9966b2>\",\"Content-Length\":\"31910\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:53cb03f8-5717-455e-917d-48fea045eea3>\",\"WARC-Concurrent-To\":\"<urn:uuid:2ddd46a2-5887-42e5-941e-b3785365402a>\",\"WARC-IP-Address\":\"50.18.241.247\",\"WARC-Target-URI\":\"https://scholarworks.utep.edu/dissertations/AAI29324236/\",\"WARC-Payload-Digest\":\"sha1:3UTWIYPROOIH2UM7WDAS22N7EV4ADNCL\",\"WARC-Block-Digest\":\"sha1:Y7F4KVQYVPPZ5MY2P3HQNA5W2AIYIYHN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499934.48_warc_CC-MAIN-20230201112816-20230201142816-00745.warc.gz\"}"}
http://www.ebooklibrary.org/articles/eng/Sum_rule_in_differentiation
[ "", null, "#jsDisabledContent { display:none; } My Account |  Register |  Help", null, "Flag as Inappropriate", null, "This article will be permanently flagged as inappropriate and made unaccessible to everyone. Are you certain this article is inappropriate?          Excessive Violence          Sexual Content          Political / Social Email this Article Email Address:\n\n# Sum rule in differentiation\n\nArticle Id: WHEBN0000147955\nReproduction Date:\n\n Title: Sum rule in differentiation", null, "Author: World Heritage Encyclopedia Language: English Subject: Collection: Publisher: World Heritage Encyclopedia Publication Date:\n\n### Sum rule in differentiation\n\nIn calculus, the sum rule in differentiation is a method of finding the derivative of a function that is the sum of two other functions for which derivatives exist. This is a part of the linearity of differentiation. The sum rule in integration follows from it. The rule itself is a direct consequence of differentiation from first principles.\n\nThe sum rule tells us that for two functions u and v:\n\n\\frac{d}{dx}(u + v)=\\frac{du}{dx}+\\frac{dv}{dx}\n\nThis rule also applies to subtraction and to additions and subtractions of more than two functions\n\n\\frac{d}{dx}(u + v + w + \\dots)=\\frac{du}{dx}+\\frac{dv}{dx}+\\frac{dw}{dx}+\\cdots\n\n## Proof\n\n### Simple Proof\n\nLet h(x) = f(x) + g(x), and suppose that f and g are each differentiable at x. We want to prove that h is differentiable at x and that its derivative h'(x) is given by f'(x)+g'(x).\n\nh'(x) = \\lim_{a\\to 0} \\frac{h(x+a)-h(x)}{a}\n\n= \\lim_{a\\to 0} \\frac{a}\n= \\lim_{a\\to 0} \\frac{f(x+a)-f(x)+g(x+a)-g(x)}{a}\n= \\lim_{a\\to 0} \\frac{f(x+a)-f(x)}{a} + \\lim_{a\\to 0} \\frac{g(x+a)-g(x)}{a}\n= f'(x)+g'(x).\n\n### More Complicated Proof\n\nLet y be a function given by the sum of two functions u and v, such that:\n\ny = u + v \\,\n\nNow let y, u and v be increased by small increases Δy, Δu and Δv respectively. Hence:\n\ny + \\Delta{y} = (u + \\Delta{u}) + (v + \\Delta{v}) = u + v + \\Delta{u} + \\Delta{v} = y + \\Delta{u} + \\Delta{v}. \\,\n\nSo:\n\n\\Delta{y} = \\Delta{u} + \\Delta{v}. \\,\n\nNow divide throughout by Δx:\n\n\\frac{\\Delta{y}}{\\Delta{x}} = \\frac{\\Delta{u}}{\\Delta{x}} + \\frac{\\Delta{v}}{\\Delta{x}}.\n\nLet Δx tend to 0:\n\n\\frac{dy}{dx} = \\frac{du}{dx} + \\frac{dv}{dx}.\n\nNow recall that y = u + v, giving the sum rule in differentiation:\n\n\\frac{d}{dx}\\left(u + v\\right) = \\frac{du}{dx} + \\frac{dv}{dx} .\n\nThe rule can be extended to subtraction, as follows:\n\n\\frac{d}{dx}\\left(u - v\\right) = \\frac{d}{dx}\\left(u + (-v)\\right) = \\frac{du}{dx} + \\frac{d}{dx}\\left(-v\\right).\n\nNow use the special case of the constant factor rule in differentiation with k=−1 to obtain:\n\n\\frac{d}{dx}\\left(u - v\\right) = \\frac{du}{dx} + \\left(-\\frac{dv}{dx}\\right) = \\frac{du}{dx} - \\frac{dv}{dx}.\n\nTherefore, the sum rule can be extended so it \"accepts\" addition and subtraction as follows:\n\n\\frac{d}{dx}\\left(u \\pm v\\right) = \\frac{du}{dx} \\pm \\frac{dv}{dx}.\n\nThe sum rule in differentiation can be used as part of the derivation for both the sum rule in integration and linearity of differentiation.\n\n## Generalization to finite sums\n\nConsider a set of functions f1, f2,..., fn. Then\n\n\\frac{d}{dx} \\left(\\sum_{1 \\le i \\le n} f_i(x)\\right) = \\frac{d}{dx}\\left(f_1(x) + f_2(x) + \\cdots + f_n(x)\\right) = \\frac{d}{dx}f_1(x) + \\frac{d}{dx}f_2(x) + \\cdots + \\frac{d}{dx}f_n(x)\n\nso\n\n\\frac{d}{dx} \\left(\\sum_{1 \\le i \\le n} f_i(x)\\right) = \\sum_{1 \\le i \\le n} \\left(\\frac{d}{dx}f_i(x)\\right) .\n\nIn other words, the derivative of any finite sum of functions is the sum of the derivatives of those functions.\n\nThis follows easily by induction; we have just proven this to be true for n = 2. Assume it is true for all n < k, then define\n\ng(x)=\\sum_{i=1}^{k-1} f_i(x).\n\nThen\n\n\\sum_{i=1}^k f_i(x)=g(x)+f_k(x)\n\nand it follows from the proof above that\n\n\\frac{d}{dx} \\left(\\sum_{i=1}^k f_i(x)\\right) = \\frac{d}{dx}g(x)+\\frac{d}{dx}f_k(x).\n\nBy the inductive hypothesis,\n\n\\frac{d}{dx}g(x)=\\frac{d}{dx} \\left(\\sum_{i=1}^{k-1} f_i(x)\\right)=\\sum_{i=1}^{k-1} \\frac{d}{dx}f_i(x)\n\nso\n\n\\frac{d}{dx} \\left(\\sum_{i=1}^k f_i(x) \\right) = \\sum_{i=1}^{k-1} \\frac{d}{dx}f_i(x) + \\frac{d}{dx}f_k(x)=\\sum_{i=1}^k \\frac{d}{dx}f_i(x)\n\nwhich ends the proof of the sum rule of differentiation.\n\nNote this does not automatically extend to infinite sums. An intuitive reason for why things can go wrong is that there is more than one limit involved (specifically, one for the sum and one in the definition of the derivative). Uniform convergence deals with these sorts of issues.\n\nCopyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,\na 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department." ]
[ null, "http://read.images.worldlibrary.org/App_Themes/wel-mem/images/logo.jpg", null, "http://read.images.worldlibrary.org/images/SmallBook.gif", null, "http://www.ebooklibrary.org/images/delete.jpg", null, "http://www.ebooklibrary.org/App_Themes/default/images/icon_new_window.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7760113,"math_prob":0.99951816,"size":5221,"snap":"2021-04-2021-17","text_gpt3_token_len":1664,"char_repetition_ratio":0.1658041,"word_repetition_ratio":0.017994858,"special_character_ratio":0.31928748,"punctuation_ratio":0.100646354,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000074,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-19T14:54:13Z\",\"WARC-Record-ID\":\"<urn:uuid:8782eb9a-e39b-4e95-bfaa-46feb7a97d91>\",\"Content-Length\":\"106177\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b38c6ebc-f65c-49d9-88fc-c723d9fa3d08>\",\"WARC-Concurrent-To\":\"<urn:uuid:00a4d5c7-b464-41a7-b524-3ff62901b985>\",\"WARC-IP-Address\":\"72.235.245.98\",\"WARC-Target-URI\":\"http://www.ebooklibrary.org/articles/eng/Sum_rule_in_differentiation\",\"WARC-Payload-Digest\":\"sha1:QB4ZLOB3DXE42A2UHLMKU3B6PR3DSU4R\",\"WARC-Block-Digest\":\"sha1:F3JGOZZNP2WEHC5BLODV6IFSNZFFUFOY\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038887646.69_warc_CC-MAIN-20210419142428-20210419172428-00411.warc.gz\"}"}
https://www.codesansar.com/computer-basics/algorithms.htm
[ "# Algorithms (Characteristics, Guidelines & Advantages)\n\n## Algorithm Introduction\n\nAn algorithm is an effective step-by-step procedure for solving a problem in a finite number of steps. In other words, it is a finite set of well-defined instructions or step-by-step description of the procedure written in human readable language for solving a given problem. An algorithm itself is division of a problem into small steps which are ordered in sequence and easily understandable. Algorithms are very important to the way computers process information, because a computer program is basically an algorithm that tells computer what specific tasks to perform in what specific order to accomplish a specific task. The same problem can be solved with different methods. So, for solving the same problem, different algorithms can be designed. In these algorithms, number of steps, time and efforts may vary more or less.\n\n## Characteristics of an Algorithm\n\nAn algorithm must possess following characteristics :\n\n1. Finiteness: An algorithm should have finite number of steps and it should end after a finite time.\n2. Input: An algorithm may have many inputs or no inputs at all.\n3. Output: It should result at least one output.\n4. Definiteness: Each step must be clear, well-defined and precise. There should be no any ambiguity.\n5. Effectiveness: Each step must be simple and should take a finite amount of time.\n\n## Guidelines for Developing an Algorithm\n\nFollowing guidelines must be followed while developing an algorithm :\n\n1. An algorithm will be enclosed by START (or BEGIN) and STOP (or END).\n2. To accept data from user, generally used statements are INPUT, READ, GET or OBTAIN.\n3. To display result or any message, generally used statements are PRINT, DISPLAY, or WRITE.\n4. Generally, COMPUTE or CALCULATE is used while describing mathematical expressions and based on situation relevant operators can be used.\n\n## Example of an Algorithm\n\nAlgorithm : Calculation of Simple Interest\n\n```Step 1: Start\nStep 2: Read principle (P), time (T) and rate (R)\nStep 3: Calculate I = P*T*R/100\nStep 4: Print I as Interest\nStep 5: Stop\n```\n\nDesigning an algorithm has following advantages :\n\n1. Effective Communication: Since algorithm is written in English like language, it is simple to understand step-by-step solution of the problems.\n2. Easy Debugging: Well-designed algorithm makes debugging easy so that we can identify logical error in the program.\n3. Easy ann Efficient Coding: An algorithm acts as a blueprint of a program and helps during program development.\n4. Independent of Programming Language: An algorithm is independent of programming languages and can be easily coded using any high level language." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9008105,"math_prob":0.8764275,"size":2932,"snap":"2021-31-2021-39","text_gpt3_token_len":573,"char_repetition_ratio":0.13217214,"word_repetition_ratio":0.0043572984,"special_character_ratio":0.19440655,"punctuation_ratio":0.115234375,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9881379,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-04T12:12:38Z\",\"WARC-Record-ID\":\"<urn:uuid:a3ecdfb1-21c0-4e2c-9eba-71af5772f65c>\",\"Content-Length\":\"22027\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2791997e-bd4e-4533-a35c-a7f22d8ed0d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:62f1df1b-2eff-44d6-bdb0-58dd26c7ecac>\",\"WARC-IP-Address\":\"167.99.160.99\",\"WARC-Target-URI\":\"https://www.codesansar.com/computer-basics/algorithms.htm\",\"WARC-Payload-Digest\":\"sha1:Q7G4SGGL7NZCIVZ467JD2KZH5JSWXTBH\",\"WARC-Block-Digest\":\"sha1:SKZTBFB32GDVEOPM5LUBVZ2T4XJYQYSF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154805.72_warc_CC-MAIN-20210804111738-20210804141738-00035.warc.gz\"}"}
https://asmedigitalcollection.asme.org/OMAE/proceedings-abstract/OMAE2013/55416/V007T08A052/270733
[ "Vortex-induced vibration is an important phenomenon for offshore engineering. For applications like the piping in the deep water oil exploration projects, the mass ratios can be of order of one . Hence, there is a practical need to understand the effects of low mass ratio on vortex-induced vibrations to enhance design safety. The main purpose of this study is to numerically explore the two degrees of freedom (transverse and streamwise) responses of vortex-induced vibrations of a cylinder at low Reynolds number for the limiting case of zero mass ratio and zero damping. We aim to characterize the responses. In particular, we focus on determining the maximum amplitude values. It is a continuation from the work of Etienne and Pelletier who studied such behaviors at very low Reynolds number (Re < 50) .\n\nWe investigate the responses in the following parameter space: Reynolds number (75 ≤ Re ≤ 175), reduced velocity (5.0 ≤ Ur ≤ 11.0) and mass ratio (m* = {0, 0.1, 1}) with a fully coupled fluid-structure interaction numerical model based on the finite element method.\n\nOur results are generally in accordance with those from previous works for the displacement trajectories, force phase diagram, and the trends in frequency response and oscillation amplitude. The maximum transverse amplitude is found to be around 0.9 in the studied parameter space. In particular, with zero mass ratio, the maximum transverse amplitude starts to occur at values of reduced velocity higher than 6.5 for Reynolds number larger than 150. This is in contrast to the results of Etienne and Pelletier who found that the maximum transverse amplitude always occurs at the reduced velocity of 6.5 for Reynolds number less than 50. Furthermore, with zero mass ratio, the maximum transverse amplitude increases when the Reynolds number increases. This behavior differs from what was suggested by Williamson and Govardhan for a cylinder oscillating only in the transverse direction at Reynolds numbers in the range of 85 to 200. They found that the Reynolds number has no influence on the maximum transverse amplitude.\n\nWe do not notice any response branching in this parameter space. However, the results in the present work clearly consist of two distinct characteristics. This indicates that the investigated mass ratio values encompass the critical mass ratio; whose value is estimated to be around 0.1 to 0.2.\n\nThis content is only available via PDF." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8889698,"math_prob":0.9420946,"size":2406,"snap":"2021-43-2021-49","text_gpt3_token_len":491,"char_repetition_ratio":0.13405496,"word_repetition_ratio":0.020942409,"special_character_ratio":0.20656691,"punctuation_ratio":0.09468822,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95902133,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-03T11:22:59Z\",\"WARC-Record-ID\":\"<urn:uuid:6f4970ae-7a99-49a1-a657-40b6a4b73c5e>\",\"Content-Length\":\"95260\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:20b90078-31ec-49ea-ac8d-00bc4c67b157>\",\"WARC-Concurrent-To\":\"<urn:uuid:26bfa569-7c8d-4171-9912-ca233ea53b02>\",\"WARC-IP-Address\":\"52.179.114.94\",\"WARC-Target-URI\":\"https://asmedigitalcollection.asme.org/OMAE/proceedings-abstract/OMAE2013/55416/V007T08A052/270733\",\"WARC-Payload-Digest\":\"sha1:SOYRAIVRXG4B474D7WLN6IDI6N4S4N6M\",\"WARC-Block-Digest\":\"sha1:6UJSCPNIZYOS4HMFULYCD6O7IDFHTGCY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362619.23_warc_CC-MAIN-20211203091120-20211203121120-00552.warc.gz\"}"}
https://winter.group.shef.ac.uk/chemdex/node/79484
[ "# [Cl(OH)(O)₃]\n\nFormula Unicode styled:\n[Cl(OH)(O)₃]\nCompound name(s):\nPerchloric acid\nCentral atom:\nCharge on formula unit (QN):\n0\nAttached groups:\nCompound type:\nValence Number (VN) = 𝘹 + 2𝘻 :\nCoordination Number (CN, sum of attached group denticities):\nOxidation Number (ON) (Roman numerals):\nElectron Number (EN) = 𝘮 + 𝘹 +2𝘭:\nBond number (BN) = 𝘹 + 𝘭 + 𝘻:\n2\n[MLXZ]𝘲 class:\n[MX2]\nMLXZ class (ENC, equivalent neutral class):\nMX2\nSummary of calculated classifications:\nO«V2C1O-IIE8B2Z0L0X2»\n𝘥-electron configuration = 𝘮 – VN:\n𝘥-electron configuration = 𝘮 – ON:\n𝘥-electron configuration = 𝘮 – VN – 𝘲 from [MLXZ]𝘲:\nAttached atoms:\nCl1\nPhase:\nInChIKey (see www.inchi-trust.org):\nLFUJZWMBIHCMOE-UHFFFAOYSA-N\nHill formula:\nH1Cl1O4\nFormula Unicode generic:\n[Cl(OH)(O)₃]\nIsotope pattern:\nTesting\nElement percentages:\nTesting" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.62539536,"math_prob":0.97581524,"size":890,"snap":"2023-40-2023-50","text_gpt3_token_len":323,"char_repetition_ratio":0.11286682,"word_repetition_ratio":0.023622047,"special_character_ratio":0.27078652,"punctuation_ratio":0.19161677,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96026653,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-10T23:06:29Z\",\"WARC-Record-ID\":\"<urn:uuid:88afee0b-9f06-4590-8bfc-d780871c65ac>\",\"Content-Length\":\"21150\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bfe9e1ac-d4d2-465e-b9b4-b678c714d777>\",\"WARC-Concurrent-To\":\"<urn:uuid:2d04ca92-289d-49c4-96cf-cbd67da18443>\",\"WARC-IP-Address\":\"143.167.1.3\",\"WARC-Target-URI\":\"https://winter.group.shef.ac.uk/chemdex/node/79484\",\"WARC-Payload-Digest\":\"sha1:DZN4CO7ROPQBWVRFTGT6ZQCBDPACYN5L\",\"WARC-Block-Digest\":\"sha1:XVA776OXM4GV4VA4COW2LY3X3Z4ON5EH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679102697.89_warc_CC-MAIN-20231210221943-20231211011943-00635.warc.gz\"}"}
https://se.mathworks.com/matlabcentral/answers/483799-how-to-regrid-the-netcdf-data-in-order-to-achieve-smaller-greater-spatial-resolution
[ "# How to Regrid the netcdf data in order to achieve smaller/greater spatial resolution?\n\n90 views (last 30 days)\nBehzad Navidi on 6 Oct 2019\nCommented: Behzad Navidi on 7 Oct 2019\nI have a netcdf file with 0.5*0.5 degree (Lat*Lon) grided resolution for precipitation from 1982-2015 in all around the globe. now I want to interpolate (regrid) this file to 0.25*0.25 degree without changing the time. In fact I want to interpolate the precipitation data in 0.25*0.25 lat and lon.\nBest Regards,\n\nChad Greene on 7 Oct 2019\nThis is pretty straightforward: Just use interp2.\nWhen reading the data from the NetCDF file you might need to rotate and flip the grid to get the orientation right, but then let longitude act as the x variable and let latitude act as the y variable.\nYou can create the quarter-degree grid in one step with cdtgrid like this:\n[lati,loni] = cdtgrid(1/4);\nor you can create it manually by\n[loni,lati] = meshgrid(min(lon):1/4max(lon),max(lat):-1/4:min(lat));\nThen use interp2 like\nzi = interp2(lon,lat,z,loni,lati);\nHope that helps.\n\n#### 1 Comment\n\nBehzad Navidi on 7 Oct 2019\nThank you for your answer. I do wath you say and I faced this error. do you have any idea?\nmy script is:\nclc\nclear\nformat compact\nclose all\nfilename='precip.mon.total.v2018.nc';\nncdisp(filename)\nlat=double(lat);\nlon=double(lon);\nprecip=double(precip);\nt=double(t);\nindex=find(precip==-9.969209968386869e+36);\nprecip(index)=nan;\n[lati,loni] = cdtgrid(1/4);\nzi = interp2(lon,lat,precip,loni,lati);\ncommand window show:\nSource:\nFormat:\nnetcdf4_classic\nGlobal Attributes:\nOriginal_Source = 'http://www.dwd.de/en/FundE/Klima/KLIS/int/GPCC/GPCC.htm\nReference = 'Users of the data sets are kindly requested to give feed back and to refer to GPCC publications on this webpage: http://www.dwd.de/bvbw/appmanager/bvbw/dwdwwwDesktop/?_nfpb=true&_pageLabel=_dwdwww_klima_umwelt_datenzentren_wzn&T12404518261141645246564gsbDocumentPath=Content%2FOeffentlichkeit%2FKU%2FKU4%2FKU42%2Fteaser__product__access.html&_state=maximized&_windowLabel=T12404518261141645246564&lastPageLabel=_dwdwww_klima_umwelt_datenzentren_wzn'\nConventions = 'CF 1.0'\ndataset_title = 'Global Precipitation Climatology Centre (GPCC)'\nReferences = 'https://www.esrl.noaa.gov/psd/data/gridded/data.gpcc.html'\ntitle = 'GPCC Full Data Reanalysis Version 2018 0.5x0.5 Monthly Total'\nhistory = 'Created 09/2018 based on V2018 data obtained via ftp'\ndata_modified = '2019-03-12'\n_NCProperties = 'version=2,netcdf=4.6.3,hdf5=1.10.5'\nDimensions:\nlat = 360\nlon = 720\nnbnds = 2\ntime = 1512 (UNLIMITED)\nVariables:\nlat\nSize: 360x1\nDimensions: lat\nDatatype: single\nAttributes:\nlong_name = 'Latitude'\nunits = 'degrees_north'\nstandard_name = 'latitude'\naxis = 'Y'\ncoordinate_defines = 'point'\nactual_range = [89.75 -89.75]\nlon\nSize: 720x1\nDimensions: lon\nDatatype: single\nAttributes:\nlong_name = 'Longitude'\nunits = 'degrees_east'\nstandard_name = 'longitude'\nactual_range = [0.25 359.75]\naxis = 'X'\ncoordinate_defines = 'point'\ntime\nSize: 1512x1\nDimensions: time\nDatatype: double\nAttributes:\nlong_name = 'Time'\nunits = 'days since 1800-1-1 00:00:00'\ndelta_t = '0000-01-00 00:00:00'\navg_period = '0000-01-00 00:00:00'\nstandard_name = 'time'\naxis = 'T'\ncoordinate_defines = 'start'\nactual_range = [33237 79227]\nprecip\nSize: 720x360x1512\nDimensions: lon,lat,time\nDatatype: single\nAttributes:\nmissing_value = -9.969209968386869e+36\nunits = 'mm'\nvar_desc = 'Precipitation'\nlevel_desc = 'Surface'\nparent_stat = 'Observations'\nlong_name = 'GPCC Monthly total of precipitation'\nvalid_range = [0 8000]\nstatistic = 'Total'\nlevel = 'Surface'\nactual_range = [0 4552.4302]\ndataset = 'GPCC Precipitation 0.5degree V2018 Full Reanalysis'\nError using .'\nTranspose on ND array is not defined. Use PERMUTE instead.\nError in interp2 (line 122)\nV = V.';\nError in test100 (line 23)\nzi = interp2(lon,lat,precip,loni,lati);" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9059836,"math_prob":0.8474599,"size":440,"snap":"2020-24-2020-29","text_gpt3_token_len":122,"char_repetition_ratio":0.09633028,"word_repetition_ratio":0.0,"special_character_ratio":0.27727273,"punctuation_ratio":0.13,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95583385,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-02T06:02:43Z\",\"WARC-Record-ID\":\"<urn:uuid:423fc36b-ce03-48f7-9949-c2fbafe53e62>\",\"Content-Length\":\"124184\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:71c05fc4-186f-42f8-81c8-7517b80759c3>\",\"WARC-Concurrent-To\":\"<urn:uuid:4e410b5b-6cdb-489a-9b22-8148a1616919>\",\"WARC-IP-Address\":\"23.66.56.59\",\"WARC-Target-URI\":\"https://se.mathworks.com/matlabcentral/answers/483799-how-to-regrid-the-netcdf-data-in-order-to-achieve-smaller-greater-spatial-resolution\",\"WARC-Payload-Digest\":\"sha1:SCEWJBC5CIXEPIE2TX3AMH3PVTJUUJIC\",\"WARC-Block-Digest\":\"sha1:6MRDNNA4DHSBGJLZFWDCNZDACWOVRG7G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655878519.27_warc_CC-MAIN-20200702045758-20200702075758-00543.warc.gz\"}"}
https://lmkjs.com/article/detail?id=53
[ "# 一 设计模式\n\n## 1.1 工厂模式\n\n``````class Man {\nconstructor(name) {\nthis.name = name\n}\n}\n}\n\nclass Factory {\nstatic create(name) {\nreturn new Man(name)\n}\n}\n\n• 当然工厂模式并不仅仅是用来 `new` 出实例。\n• 可以想象一个场景。假设有一份很复杂的代码需要用户去调用,但是用户并不关心这些复杂的代码,只需要你提供给我一个接口去调用,用户只负责传递需要的参数,至于这些参数怎么使用,内部有什么逻辑是不关心的,只需要你最后返回我一个实例。这个构造过程就是工厂。\n• 工厂起到的作用就是隐藏了创建实例的复杂度,只需要提供一个接口,简单清晰。\n• `Vue` 源码中,你也可以看到工厂模式的使用,比如创建异步组件\n``````export function createComponent (\nCtor: Class<Component> | Function | Object | void,\ndata: ?VNodeData,\ncontext: Component,\nchildren: ?Array<VNode>,\ntag?: string\n): VNode | Array<VNode> | void {\n\n// 逻辑处理...\n\nconst vnode = new VNode(\n`vue-component-\\${Ctor.cid}\\${name ? `-\\${name}` : ''}`,\ndata, undefined, undefined, undefined, context,\n{ Ctor, propsData, listeners, tag, children },\nasyncFactory\n)\n\nreturn vnode\n}``````\n\n## 1.2 单例模式\n\n• 单例模式很常用,比如全局缓存、全局状态管理等等这些只需要一个对象,就可以使用单例模式。\n• 单例模式的核心就是保证全局只有一个对象可以访问。因为 `JS` 是门无类的语言,所以别的语言实现单例的方式并不能套入 `JS` 中,我们只需要用一个变量确保实例只创建一次就行,以下是如何实现单例模式的例子\n``````class Singleton {\nconstructor() {}\n}\n\nSingleton.getInstance = (function() {\nlet instance\nreturn function() {\nif (!instance) {\ninstance = new Singleton()\n}\nreturn instance\n}\n})()\n\nlet s1 = Singleton.getInstance()\nlet s2 = Singleton.getInstance()\nconsole.log(s1 === s2) // true``````\n\n`Vuex` 源码中,你也可以看到单例模式的使用,虽然它的实现方式不大一样,通过一个外部变量来控制只安装一次 `Vuex`\n\n``````let Vue // bind on install\n\nexport function install (_Vue) {\nif (Vue && _Vue === Vue) {\n// 如果发现 Vue 有值,就不重新创建实例了\nreturn\n}\nVue = _Vue\napplyMixin(Vue)\n}``````\n\n## 1.3 适配器模式\n\n• 适配器用来解决两个接口不兼容的情况,不需要改变已有的接口,通过包装一层的方式实现两个接口的正常协作。\n• 以下是如何实现适配器模式的例子\n``````class Plug {\ngetName() {\nreturn '港版插头'\n}\n}\n\nclass Target {\nconstructor() {\nthis.plug = new Plug()\n}\ngetName() {\nreturn this.plug.getName() + ' 适配器转二脚插头'\n}\n}\n\nlet target = new Target()\ntarget.getName() // 港版插头 适配器转二脚插头``````\n\n`Vue` 中,我们其实经常使用到适配器模式。比如父组件传递给子组件一个时间戳属性,组件内部需要将时间戳转为正常的日期显示,一般会使用 `computed` 来做转换这件事情,这个过程就使用到了适配器模式\n\n## 1.4 装饰模式\n\n• 装饰模式不需要改变已有的接口,作用是给对象添加功能。就像我们经常需要给手机戴个保护套防摔一样,不改变手机自身,给手机添加了保护套提供防摔功能。\n• 以下是如何实现装饰模式的例子,使用了 ES7 中的装饰器语法\n``````function readonly(target, key, descriptor) {\ndescriptor.writable = false\nreturn descriptor\n}\n\nclass Test {\nname = 'yck'\n}\n\nlet t = new Test()\n\nt.yck = '111' // 不可修改``````\n\n`React` 中,装饰模式其实随处可见\n\n``````import { connect } from 'react-redux'\nclass MyComponent extends React.Component {\n// ...\n}\nexport default connect(mapStateToProps)(MyComponent)``````\n\n## 1.5 代理模式\n\n• 代理是为了控制对对象的访问,不让外部直接访问到对象。在现实生活中,也有很多代理的场景。比如你需要买一件国外的产品,这时候你可以通过代购来购买产品。\n• 在实际代码中其实代理的场景很多,也就不举框架中的例子了,比如事件代理就用到了代理模式\n``````<ul id=\"ul\">\n<li>1</li>\n<li>2</li>\n<li>3</li>\n<li>4</li>\n<li>5</li>\n</ul>\n<script>\nlet ul = document.querySelector('#ul')\nconsole.log(event.target);\n})\n</script>``````\n\n## 1.6 发布-订阅模式\n\n• 发布-订阅模式也叫做观察者模式。通过一对一或者一对多的依赖关系,当对象发生改变时,订阅方都会收到通知。在现实生活中,也有很多类似场景,比如我需要在购物网站上购买一个产品,但是发现该产品目前处于缺货状态,这时候我可以点击有货通知的按钮,让网站在产品有货的时候通过短信通知我。\n• 在实际代码中其实发布-订阅模式也很常见,比如我们点击一个按钮触发了点击事件就是使用了该模式\n``````<ul id=\"ul\"></ul>\n<script>\nlet ul = document.querySelector('#ul')\nconsole.log(event.target);\n})\n</script>``````\n\n`Vue` 中,如何实现响应式也是使用了该模式。对于需要实现响应式的对象来说,在 `get` 的时候会进行依赖收集,当改变了对象的属性时,就会触发派发更新。\n\n## 1.7 外观模式\n\n• 外观模式提供了一个接口,隐藏了内部的逻辑,更加方便外部调用。\n• 个例子来说,我们现在需要实现一个兼容多种浏览器的添加事件方法\n``````function addEvent(elm, evType, fn, useCapture) {\nreturn true\n} else if (elm.attachEvent) {\nvar r = elm.attachEvent(\"on\" + evType, fn)\nreturn r\n} else {\nelm[\"on\" + evType] = fn\n}\n}``````\n\n# 二 常见数据结构\n\n## 2.1 时间复杂度\n\n• 通常使用最差的时间复杂度来衡量一个算法的好坏。\n• 常数时间 `O(1)` 代表这个操作和数据量没关系,是一个固定时间的操作,比如说四则运算。\n• 对于一个算法来说,可能会计算出操作次数为 `aN + 1``N` 代表数据量。那么该算法的时间复杂度就是 `O(N)`。因为我们在计算时间复杂度的时候,数据量通常是非常大的,这时候低阶项和常数项可以忽略不计。\n• 当然可能会出现两个算法都是 `O(N)` 的时间复杂度,那么对比两个算法的好坏就要通过对比低阶项和常数项了\n\n## 2.2 栈\n\n• 栈是一个线性结构,在计算机中是一个相当常见的数据结构。\n• 栈的特点是只能在某一端添加或删除数据,遵循先进后出的原则", null, "``````class Stack {\nconstructor() {\nthis.stack = []\n}\npush(item) {\nthis.stack.push(item)\n}\npop() {\nthis.stack.pop()\n}\npeek() {\nreturn this.stack[this.getCount() - 1]\n}\ngetCount() {\nreturn this.stack.length\n}\nisEmpty() {\nreturn this.getCount() === 0\n}\n}``````\n\n## 2.3 应用\n\n``````var isValid = function (s) {\nlet map = {\n'(': -1,\n')': 1,\n'[': -2,\n']': 2,\n'{': -3,\n'}': 3\n}\nlet stack = []\nfor (let i = 0; i < s.length; i++) {\nif (map[s[i]] < 0) {\nstack.push(s[i])\n} else {\nlet last = stack.pop()\nif (map[last] + map[s[i]] != 0) return false\n}\n}\nif (stack.length > 0) return false\nreturn true\n};``````\n\n## 2.4 队列", null, "``````class Queue {\nconstructor() {\nthis.queue = []\n}\nenQueue(item) {\nthis.queue.push(item)\n}\ndeQueue() {\nreturn this.queue.shift()\n}\nreturn this.queue\n}\ngetLength() {\nreturn this.queue.length\n}\nisEmpty() {\nreturn this.getLength() === 0\n}\n}``````\n\n``````class SqQueue {\nconstructor(length) {\nthis.queue = new Array(length + 1)\n// 队头\nthis.first = 0\n// 队尾\nthis.last = 0\n// 当前队列大小\nthis.size = 0\n}\nenQueue(item) {\n// 判断队尾 + 1 是否为队头\n// 如果是就代表需要扩容数组\n// % this.queue.length 是为了防止数组越界\nif (this.first === (this.last + 1) % this.queue.length) {\nthis.resize(this.getLength() * 2 + 1)\n}\nthis.queue[this.last] = item\nthis.size++\nthis.last = (this.last + 1) % this.queue.length\n}\ndeQueue() {\nif (this.isEmpty()) {\nthrow Error('Queue is empty')\n}\nlet r = this.queue[this.first]\nthis.queue[this.first] = null\nthis.first = (this.first + 1) % this.queue.length\nthis.size--\n// 判断当前队列大小是否过小\n// 为了保证不浪费空间,在队列空间等于总长度四分之一时\n// 且不为 2 时缩小总长度为当前的一半\nif (this.size === this.getLength() / 4 && this.getLength() / 2 !== 0) {\nthis.resize(this.getLength() / 2)\n}\nreturn r\n}\nif (this.isEmpty()) {\nthrow Error('Queue is empty')\n}\nreturn this.queue[this.first]\n}\ngetLength() {\nreturn this.queue.length - 1\n}\nisEmpty() {\nreturn this.first === this.last\n}\nresize(length) {\nlet q = new Array(length)\nfor (let i = 0; i < length; i++) {\nq[i] = this.queue[(i + this.first) % this.queue.length]\n}\nthis.queue = q\nthis.first = 0\nthis.last = this.size\n}\n}``````\n\n## 2.5 链表", null, "``````class Node {\nconstructor(v, next) {\nthis.value = v\nthis.next = next\n}\n}\nconstructor() {\n// 链表长度\nthis.size = 0\n// 虚拟头部\nthis.dummyNode = new Node(null, null)\n}\nif (index === currentIndex) return header\nreturn this.find(header.next, index, currentIndex + 1)\n}\nthis.checkIndex(index)\n// 当往链表末尾插入时,prev.next 为空\n// 其他情况时,因为要插入节点,所以插入的节点\n// 的 next 应该是 prev.next\n// 然后设置 prev.next 为插入的节点\nlet prev = this.find(this.dummyNode, index, 0)\nprev.next = new Node(v, prev.next)\nthis.size++\nreturn prev.next\n}\ninsertNode(v, index) {\n}\n}\n}\nremoveNode(index, isLast) {\nthis.checkIndex(index)\nindex = isLast ? index - 1 : index\nlet prev = this.find(this.dummyNode, index, 0)\nlet node = prev.next\nprev.next = node.next\nnode.next = null\nthis.size--\nreturn node\n}\nremoveFirstNode() {\nreturn this.removeNode(0)\n}\nremoveLastNode() {\nreturn this.removeNode(this.size, true)\n}\ncheckIndex(index) {\nif (index < 0 || index > this.size) throw Error('Index error')\n}\ngetNode(index) {\nthis.checkIndex(index)\nif (this.isEmpty()) return\nreturn this.find(this.dummyNode, index, 0).next\n}\nisEmpty() {\nreturn this.size === 0\n}\ngetSize() {\nreturn this.size\n}\n}``````\n\n## 2.6 树\n\n• 树拥有很多种结构,二叉树是树中最常用的结构,同时也是一个天然的递归结构。\n• 二叉树拥有一个根节点,每个节点至多拥有两个子节点,分别为:左节点和右节点。树的最底部节点称之为叶节点,当一颗树的叶数量数量为满时,该树可以称之为满二叉树。", null, "• 二分搜索树也是二叉树,拥有二叉树的特性。但是区别在于二分搜索树每个节点的值都比他的左子树的值大,比右子树的值小。\n• 这种存储方式很适合于数据搜索。如下图所示,当需要查找 6 的时候,因为需要查找的值比根节点的值大,所以只需要在根节点的右子树上寻找,大大提高了搜索效率。", null, "``````class Node {\nconstructor(value) {\nthis.value = value\nthis.left = null\nthis.right = null\n}\n}\nclass BST {\nconstructor() {\nthis.root = null\nthis.size = 0\n}\ngetSize() {\nreturn this.size\n}\nisEmpty() {\nreturn this.size === 0\n}\n}\n// 添加节点时,需要比较添加的节点值和当前\n// 节点值的大小\nif (!node) {\nthis.size++\nreturn new Node(v)\n}\nif (node.value > v) {\n} else if (node.value < v) {\n}\nreturn node\n}\n}``````\n• 以上是最基本的二分搜索树实现,接下来实现树的遍历。\n• 对于树的遍历来说,有三种遍历方法,分别是先序遍历、中序遍历、后序遍历。三种遍历的区别在于何时访问节点。在遍历树的过程中,每个节点都会遍历三次,分别是遍历到自己,遍历左子树和遍历右子树。如果需要实现先序遍历,那么只需要第一次遍历到节点时进行操作即可。\n``````// 先序遍历可用于打印树的结构\n// 先序遍历先访问根节点,然后访问左节点,最后访问右节点。\npreTraversal() {\nthis._pre(this.root)\n}\n_pre(node) {\nif (node) {\nconsole.log(node.value)\nthis._pre(node.left)\nthis._pre(node.right)\n}\n}\n// 中序遍历可用于排序\n// 对于 BST 来说,中序遍历可以实现一次遍历就\n// 得到有序的值\n// 中序遍历表示先访问左节点,然后访问根节点,最后访问右节点。\nmidTraversal() {\nthis._mid(this.root)\n}\n_mid(node) {\nif (node) {\nthis._mid(node.left)\nconsole.log(node.value)\nthis._mid(node.right)\n}\n}\n// 后序遍历可用于先操作子节点\n// 再操作父节点的场景\n// 后序遍历表示先访问左节点,然后访问右节点,最后访问根节点。\nbackTraversal() {\nthis._back(this.root)\n}\n_back(node) {\nif (node) {\nthis._back(node.left)\nthis._back(node.right)\nconsole.log(node.value)\n}\n}``````\n\n``````breadthTraversal() {\nif (!this.root) return null\nlet q = new Queue()\n// 将根节点入队\nq.enQueue(this.root)\n// 循环判断队列是否为空,为空\n// 代表树遍历完毕\nwhile (!q.isEmpty()) {\n// 将队首出队,判断是否有左右子树\n// 有的话,就先左后右入队\nlet n = q.deQueue()\nconsole.log(n.value)\nif (n.left) q.enQueue(n.left)\nif (n.right) q.enQueue(n.right)\n}\n}``````\n\n``````getMin() {\nreturn this._getMin(this.root).value\n}\n_getMin(node) {\nif (!node.left) return node\nreturn this._getMin(node.left)\n}\ngetMax() {\nreturn this._getMax(this.root).value\n}\n_getMax(node) {\nif (!node.right) return node\nreturn this._getMin(node.right)\n}``````\n\n``````floor(v) {\nlet node = this._floor(this.root, v)\nreturn node ? node.value : null\n}\n_floor(node, v) {\nif (!node) return null\nif (node.value === v) return v\n// 如果当前节点值还比需要的值大,就继续递归\nif (node.value > v) {\nreturn this._floor(node.left, v)\n}\n// 判断当前节点是否拥有右子树\nlet right = this._floor(node.right, v)\nif (right) return right\nreturn node\n}``````\n\n``````class Node {\nconstructor(value) {\nthis.value = value\nthis.left = null\nthis.right = null\n// 修改代码\nthis.size = 1\n}\n}\n// 新增代码\n_getSize(node) {\nreturn node ? node.size : 0\n}\nif (!node) {\nreturn new Node(v)\n}\nif (node.value > v) {\n// 修改代码\nnode.size++\n} else if (node.value < v) {\n// 修改代码\nnode.size++\n}\nreturn node\n}\nselect(k) {\nlet node = this._select(this.root, k)\nreturn node ? node.value : null\n}\n_select(node, k) {\nif (!node) return null\n// 先获取左子树下有几个节点\nlet size = node.left ? node.left.size : 0\n// 判断 size 是否大于 k\n// 如果大于 k,代表所需要的节点在左节点\nif (size > k) return this._select(node.left, k)\n// 如果小于 k,代表所需要的节点在右节点\n// 注意这里需要重新计算 k,减去根节点除了右子树的节点数量\nif (size < k) return this._select(node.right, k - size - 1)\nreturn node\n}``````\n\n• 需要删除的节点没有子树\n• 需要删除的节点只有一条子树\n• 需要删除的节点有左右两条树\n\n``````delectMin() {\nthis.root = this._delectMin(this.root)\nconsole.log(this.root)\n}\n_delectMin(node) {\n// 一直递归左子树\n// 如果左子树为空,就判断节点是否拥有右子树\n// 有右子树的话就把需要删除的节点替换为右子树\nif ((node != null) & !node.left) return node.right\nnode.left = this._delectMin(node.left)\n// 最后需要重新维护下节点的 `size`\nnode.size = this._getSize(node.left) + this._getSize(node.right) + 1\nreturn node\n}``````\n• 最后讲解的就是如何删除任意节点了。对于这个操作,T.Hibbard 在 1962 年提出了解决这个难题的办法,也就是如何解决第三种情况。\n• 当遇到这种情况时,需要取出当前节点的后继节点(也就是当前节点右子树的最小节点)来替换需要删除的节点。然后将需要删除节点的左子树赋值给后继结点,右子树删除后继结点后赋值给他。\n• 你如果对于这个解决办法有疑问的话,可以这样考虑。因为二分搜索树的特性,父节点一定比所有左子节点大,比所有右子节点小。那么当需要删除父节点时,势必需要拿出一个比父节点大的节点来替换父节点。这个节点肯定不存在于左子树,必然存在于右子树。然后又需要保持父节点都是比右子节点小的,那么就可以取出右子树中最小的那个节点来替换父节点。\n``````delect(v) {\nthis.root = this._delect(this.root, v)\n}\n_delect(node, v) {\nif (!node) return null\n// 寻找的节点比当前节点小,去左子树找\nif (node.value < v) {\nnode.right = this._delect(node.right, v)\n} else if (node.value > v) {\n// 寻找的节点比当前节点大,去右子树找\nnode.left = this._delect(node.left, v)\n} else {\n// 进入这个条件说明已经找到节点\n// 先判断节点是否拥有拥有左右子树中的一个\n// 是的话,将子树返回出去,这里和 `_delectMin` 的操作一样\nif (!node.left) return node.right\nif (!node.right) return node.left\n// 进入这里,代表节点拥有左右子树\n// 先取出当前节点的后继结点,也就是取当前节点右子树的最小值\nlet min = this._getMin(node.right)\n// 取出最小值后,删除最小值\n// 然后把删除节点后的子树赋值给最小值节点\nmin.right = this._delectMin(node.right)\n// 左子树不动\nmin.left = node.left\nnode = min\n}\n// 维护 size\nnode.size = this._getSize(node.left) + this._getSize(node.right) + 1\nreturn node\n}``````\n\n## 2.7 AVL 树\n\nAVL 树改进了二分搜索树,在 AVL 树中任意节点的左右子树的高度差都不大于 1,这样保证了时间复杂度是严格的 O(logN)。基于此,对 AVL 树增加或删除节点时可能需要旋转树来达到高度的平衡。\n\n• 因为 `AVL` 树是改进了二分搜索树,所以部分代码是于二分搜索树重复的,对于重复内容不作再次解析。\n• 对于 AVL 树来说,添加节点会有四种情况", null, "• 对于左左情况来说,新增加的节点位于节点 `2` 的左侧,这时树已经不平衡,需要旋转。因为搜索树的特性,节点比左节点大,比右节点小,所以旋转以后也要实现这个特性。\n• 旋转之前:`new < 2 < C < 3 < B < 5 < A`,右旋之后节点 `3` 为根节点,这时候需要将节点 3 的右节点加到节点 5 的左边,最后还需要更新节点的高度。\n• 对于右右情况来说,相反于左左情况,所以不再赘述。\n• 对于左右情况来说,新增加的节点位于节点 4 的右侧。对于这种情况,需要通过两次旋转来达到目的。\n• 首先对节点的左节点左旋,这时树满足左左的情况,再对节点进行一次右旋就可以达到目的。\n``````class Node {\nconstructor(value) {\nthis.value = value\nthis.left = null\nthis.right = null\nthis.height = 1\n}\n}\n\nclass AVL {\nconstructor() {\nthis.root = null\n}\n}\nif (!node) {\nreturn new Node(v)\n}\nif (node.value > v) {\n} else if (node.value < v) {\n} else {\nnode.value = v\n}\nnode.height =\n1 + Math.max(this._getHeight(node.left), this._getHeight(node.right))\nlet factor = this._getBalanceFactor(node)\n// 当需要右旋时,根节点的左树一定比右树高度高\nif (factor > 1 && this._getBalanceFactor(node.left) >= 0) {\nreturn this._rightRotate(node)\n}\n// 当需要左旋时,根节点的左树一定比右树高度矮\nif (factor < -1 && this._getBalanceFactor(node.right) <= 0) {\nreturn this._leftRotate(node)\n}\n// 左右情况\n// 节点的左树比右树高,且节点的左树的右树比节点的左树的左树高\nif (factor > 1 && this._getBalanceFactor(node.left) < 0) {\nnode.left = this._leftRotate(node.left)\nreturn this._rightRotate(node)\n}\n// 右左情况\n// 节点的左树比右树矮,且节点的右树的右树比节点的右树的左树矮\nif (factor < -1 && this._getBalanceFactor(node.right) > 0) {\nnode.right = this._rightRotate(node.right)\nreturn this._leftRotate(node)\n}\n\nreturn node\n}\n_getHeight(node) {\nif (!node) return 0\nreturn node.height\n}\n_getBalanceFactor(node) {\nreturn this._getHeight(node.left) - this._getHeight(node.right)\n}\n// 节点右旋\n// 5 2\n// / \\ / \\\n// 2 6 ==> 1 5\n// / \\ / / \\\n// 1 3 new 3 6\n// /\n// new\n_rightRotate(node) {\n// 旋转后新根节点\nlet newRoot = node.left\n// 需要移动的节点\nlet moveNode = newRoot.right\n// 节点 2 的右节点改为节点 5\nnewRoot.right = node\n// 节点 5 左节点改为节点 3\nnode.left = moveNode\n// 更新树的高度\nnode.height =\n1 + Math.max(this._getHeight(node.left), this._getHeight(node.right))\nnewRoot.height =\n1 +\nMath.max(this._getHeight(newRoot.left), this._getHeight(newRoot.right))\n\nreturn newRoot\n}\n// 节点左旋\n// 4 6\n// / \\ / \\\n// 2 6 ==> 4 7\n// / \\ / \\ \\\n// 5 7 2 5 new\n// \\\n// new\n_leftRotate(node) {\n// 旋转后新根节点\nlet newRoot = node.right\n// 需要移动的节点\nlet moveNode = newRoot.left\n// 节点 6 的左节点改为节点 4\nnewRoot.left = node\n// 节点 4 右节点改为节点 5\nnode.right = moveNode\n// 更新树的高度\nnode.height =\n1 + Math.max(this._getHeight(node.left), this._getHeight(node.right))\nnewRoot.height =\n1 +\nMath.max(this._getHeight(newRoot.left), this._getHeight(newRoot.right))\n\nreturn newRoot\n}\n}``````\n\n## 2.8 Trie\n\n• 在计算机科学,trie,又称前缀树或字典树,是一种有序树,用于保存关联数组,其中的键通常是字符串。\n\n• 根节点代表空字符串,每个节点都有 N(假如搜索英文字符,就有 26 条) 条链接,每条链接代表一个字符\n• 节点不存储字符,只有路径才存储,这点和其他的树结构不同\n• 从根节点开始到任意一个节点,将沿途经过的字符连接起来就是该节点对应的字符串", null, "``````class TrieNode {\nconstructor() {\n// 代表每个字符经过节点的次数\nthis.path = 0\n// 代表到该节点的字符串有几个\nthis.end = 0\n// 链接\nthis.next = new Array(26).fill(null)\n}\n}\nclass Trie {\nconstructor() {\n// 根节点,代表空字符\nthis.root = new TrieNode()\n}\n// 插入字符串\ninsert(str) {\nif (!str) return\nlet node = this.root\nfor (let i = 0; i < str.length; i++) {\n// 获得字符先对应的索引\nlet index = str[i].charCodeAt() - 'a'.charCodeAt()\n// 如果索引对应没有值,就创建\nif (!node.next[index]) {\nnode.next[index] = new TrieNode()\n}\nnode.path += 1\nnode = node.next[index]\n}\nnode.end += 1\n}\n// 搜索字符串出现的次数\nsearch(str) {\nif (!str) return\nlet node = this.root\nfor (let i = 0; i < str.length; i++) {\nlet index = str[i].charCodeAt() - 'a'.charCodeAt()\n// 如果索引对应没有值,代表没有需要搜素的字符串\nif (!node.next[index]) {\nreturn 0\n}\nnode = node.next[index]\n}\nreturn node.end\n}\n// 删除字符串\ndelete(str) {\nif (!this.search(str)) return\nlet node = this.root\nfor (let i = 0; i < str.length; i++) {\nlet index = str[i].charCodeAt() - 'a'.charCodeAt()\n// 如果索引对应的节点的 Path 为 0,代表经过该节点的字符串\n// 已经一个,直接删除即可\nif (--node.next[index].path == 0) {\nnode.next[index] = null\nreturn\n}\nnode = node.next[index]\n}\nnode.end -= 1\n}\n}``````\n\n## 2.9 并查集\n\n• 并查集是一种特殊的树结构,用于处理一些不交集的合并及查询问题。该结构中每个节点都有一个父节点,如果只有当前一个节点,那么该节点的父节点指向自己。\n\n• `Find`:确定元素属于哪一个子集。它可以被用来确定两个元素是否属于同一子集。\n• `Union`:将两个子集合并成同一个集合。", null, "``````class DisjointSet {\n// 初始化样本\nconstructor(count) {\n// 初始化时,每个节点的父节点都是自己\nthis.parent = new Array(count)\n// 用于记录树的深度,优化搜索复杂度\nthis.rank = new Array(count)\nfor (let i = 0; i < count; i++) {\nthis.parent[i] = i\nthis.rank[i] = 1\n}\n}\nfind(p) {\n// 寻找当前节点的父节点是否为自己,不是的话表示还没找到\n// 开始进行路径压缩优化\n// 假设当前节点父节点为 A\n// 将当前节点挂载到 A 节点的父节点上,达到压缩深度的目的\nwhile (p != this.parent[p]) {\nthis.parent[p] = this.parent[this.parent[p]]\np = this.parent[p]\n}\nreturn p\n}\nisConnected(p, q) {\nreturn this.find(p) === this.find(q)\n}\n// 合并\nunion(p, q) {\n// 找到两个数字的父节点\nlet i = this.find(p)\nlet j = this.find(q)\nif (i === j) return\n// 判断两棵树的深度,深度小的加到深度大的树下面\n// 如果两棵树深度相等,那就无所谓怎么加\nif (this.rank[i] < this.rank[j]) {\nthis.parent[i] = j\n} else if (this.rank[i] > this.rank[j]) {\nthis.parent[j] = i\n} else {\nthis.parent[i] = j\nthis.rank[j] += 1\n}\n}\n}``````\n\n## 2.10 堆\n\n• 堆通常是一个可以被看做一棵树的数组对象。\n\n1. 任意节点小于(或大于)它的所有子节点\n2. 堆总是一棵完全树。即除了最底层,其他层的节点都被元素填满,且最底层从左到右填入。\n• 将根节点最大的堆叫做最大堆或大根堆,根节点最小的堆叫做最小堆或小根堆。\n• 优先队列也完全可以用堆来实现,操作是一模一样的。\n\n• 堆的每个节点的左边子节点索引是 `i * 2 + 1`,右边是 `i * 2 + 2`,父节点是 `(i - 1) /2`\n• 堆有两个核心的操作,分别是 `shiftUp``shiftDown` 。前者用于添加元素,后者用于删除根节点。\n• `shiftUp` 的核心思路是一路将节点与父节点对比大小,如果比父节点大,就和父节点交换位置。\n• `shiftDown` 的核心思路是先将根节点和末尾交换位置,然后移除末尾元素。接下来循环判断父节点和两个子节点的大小,如果子节点大,就把最大的子节点和父节点交换。", null, "``````class MaxHeap {\nconstructor() {\nthis.heap = []\n}\nsize() {\nreturn this.heap.length\n}\nempty() {\nreturn this.size() == 0\n}\nthis.heap.push(item)\nthis._shiftUp(this.size() - 1)\n}\nremoveMax() {\nthis._shiftDown(0)\n}\ngetParentIndex(k) {\nreturn parseInt((k - 1) / 2)\n}\ngetLeftIndex(k) {\nreturn k * 2 + 1\n}\n_shiftUp(k) {\n// 如果当前节点比父节点大,就交换\nwhile (this.heap[k] > this.heap[this.getParentIndex(k)]) {\nthis._swap(k, this.getParentIndex(k))\n// 将索引变成父节点\nk = this.getParentIndex(k)\n}\n}\n_shiftDown(k) {\n// 交换首位并删除末尾\nthis._swap(k, this.size() - 1)\nthis.heap.splice(this.size() - 1, 1)\n// 判断节点是否有左孩子,因为二叉堆的特性,有右必有左\nwhile (this.getLeftIndex(k) < this.size()) {\nlet j = this.getLeftIndex(k)\n// 判断是否有右孩子,并且右孩子是否大于左孩子\nif (j + 1 < this.size() && this.heap[j + 1] > this.heap[j]) j++\n// 判断父节点是否已经比子节点都大\nif (this.heap[k] >= this.heap[j]) break\nthis._swap(k, j)\nk = j\n}\n}\n_swap(left, right) {\nlet rightValue = this.heap[right]\nthis.heap[right] = this.heap[left]\nthis.heap[left] = rightValue\n}\n}``````\n\n# 三 常考算法题解析\n\n## 3.1 位运算\n\n• 在进入正题之前,我们先来学习一下位运算的内容。因为位运算在算法中很有用,速度可以比四则运算快很多。\n• 在学习位运算之前应该知道十进制如何转二进制,二进制如何转十进制。这里说明下简单的计算方式\n1. 十进制 `33` 可以看成是 `32 + 1` ,并且 `33` 应该是六位二进制的(因为 `33` 近似 `32`,而 `32``2` 的五次方,所以是六位),那么 十进制 `33` 就是 `100001` ,只要是 `2` 的次方,那么就是 `1`否则都为 `0`\n2. 那么二进制 `100001` 同理,首位是 `2^5` ,末位是 `2^0` ,相加得出 `33`\n\n1. 左移 <<\n\n``10 << 1 // -> 20``\n\n2. 算数右移 >>\n\n``10 >> 1 // -> 5``\n\n``13 >> 1 // -> 6``\n\n3. 按位操作\n\n3.1 按位与\n\n``````8 & 7 // -> 0\n// 1000 & 0111 -> 0000 -> 0``````\n\n3.2 按位或\n\n``````8 | 7 // -> 15\n// 1000 | 0111 -> 1111 -> 15``````\n\n3.3 按位异或\n\n``````8 ^ 7 // -> 15\n8 ^ 8 // -> 0\n// 1000 ^ 0111 -> 1111 -> 15\n// 1000 ^ 1000 -> 0000 -> 0``````\n• 从以上代码中可以发现按位异或就是不进位加法\n• 面试题:两个数不使用四则运算得出和\n\n``````function sum(a, b) {\nif (a == 0) return b\nif (b == 0) return a\nlet newA = a ^ b\nlet newB = (a & b) << 1\nreturn sum(newA, newB)\n}``````\n\n## 3.2 排序\n\n``````function checkArray(array) {\nif (!array) return\n}\nfunction swap(array, left, right) {\nlet rightValue = array[right]\narray[right] = array[left]\narray[left] = rightValue\n}``````\n\n### 3.2.1 冒泡排序", null, "``````function bubble(array) {\ncheckArray(array);\nfor (let i = array.length - 1; i > 0; i--) {\n// 从 0 到 `length - 1` 遍历\nfor (let j = 0; j < i; j++) {\nif (array[j] > array[j + 1]) swap(array, j, j + 1)\n}\n}\nreturn array;\n}``````\n\n### 3.2.2 插入排序", null, "``````function insertion(array) {\ncheckArray(array);\nfor (let i = 1; i < array.length; i++) {\nfor (let j = i - 1; j >= 0 && array[j] > array[j + 1]; j--)\nswap(array, j, j + 1);\n}\nreturn array;\n}``````\n\n### 3.2.3 选择排序", null, "``````function selection(array) {\ncheckArray(array);\nfor (let i = 0; i < array.length - 1; i++) {\nlet minIndex = i;\nfor (let j = i + 1; j < array.length; j++) {\nminIndex = array[j] < array[minIndex] ? j : minIndex;\n}\nswap(array, i, minIndex);\n}\nreturn array;\n}``````\n\n### 3.2.4 归并排序", null, "``````function sort(array) {\ncheckArray(array);\nmergeSort(array, 0, array.length - 1);\nreturn array;\n}\n\nfunction mergeSort(array, left, right) {\n// 左右索引相同说明已经只有一个数\nif (left === right) return;\n// 等同于 `left + (right - left) / 2`\n// 相比 `(left + right) / 2` 来说更加安全,不会溢出\n// 使用位运算是因为位运算比四则运算快\nlet mid = parseInt(left + ((right - left) >> 1));\nmergeSort(array, left, mid);\nmergeSort(array, mid + 1, right);\n\nlet help = [];\nlet i = 0;\nlet p1 = left;\nlet p2 = mid + 1;\nwhile (p1 <= mid && p2 <= right) {\nhelp[i++] = array[p1] < array[p2] ? array[p1++] : array[p2++];\n}\nwhile (p1 <= mid) {\nhelp[i++] = array[p1++];\n}\nwhile (p2 <= right) {\nhelp[i++] = array[p2++];\n}\nfor (let i = 0; i < help.length; i++) {\narray[left + i] = help[i];\n}\nreturn array;\n}``````\n\n``````mergeSort(data, 0, 6) // mid = 3\nmergeSort(data, 0, 3) // mid = 1\nmergeSort(data, 0, 1) // mid = 0\nmergeSort(data, 0, 0) // 遇到终止,回退到上一步\nmergeSort(data, 1, 1) // 遇到终止,回退到上一步\n// 排序 p1 = 0, p2 = mid + 1 = 1\n// 回退到 `mergeSort(data, 0, 3)` 执行下一个递归\nmergeSort(2, 3) // mid = 2\nmergeSort(3, 3) // 遇到终止,回退到上一步\n// 排序 p1 = 2, p2 = mid + 1 = 3\n// 回退到 `mergeSort(data, 0, 3)` 执行合并逻辑\n// 排序 p1 = 0, p2 = mid + 1 = 2\n// 执行完毕回退\n// 左边数组排序完毕,右边也是如上轨迹``````\n\n### 3.2.5 快排", null, "``````function sort(array) {\ncheckArray(array);\nquickSort(array, 0, array.length - 1);\nreturn array;\n}\n\nfunction quickSort(array, left, right) {\nif (left < right) {\nswap(array, , right)\n// 随机取值,然后和末尾交换,这样做比固定取一个位置的复杂度略低\nlet indexs = part(array, parseInt(Math.random() * (right - left + 1)) + left, right);\nquickSort(array, left, indexs);\nquickSort(array, indexs + 1, right);\n}\n}\nfunction part(array, left, right) {\nlet less = left - 1;\nlet more = right;\nwhile (left < more) {\nif (array[left] < array[right]) {\n// 当前值比基准值小,`less` 和 `left` 都加一\n++less;\n++left;\n} else if (array[left] > array[right]) {\n// 当前值比基准值大,将当前值和右边的值交换\n// 并且不改变 `left`,因为当前换过来的值还没有判断过大小\nswap(array, --more, left);\n} else {\n// 和基准值相同,只移动下标\nleft++;\n}\n}\n// 将基准值和比基准值大的第一个值交换位置\n// 这样数组就变成 `[比基准值小, 基准值, 比基准值大]`\nswap(array, right, more);\nreturn [less, more];\n}``````\n\nSort Colors:该题目来自 LeetCode,题目需要我们将 `[2,0,2,1,1,0]`排序成 `[0,0,1,1,2,2]` ,这个问题就可以使用三路快排的思想。\n\n``````var sortColors = function(nums) {\nlet left = -1;\nlet right = nums.length;\nlet i = 0;\n// 下标如果遇到 right,说明已经排序完成\nwhile (i < right) {\nif (nums[i] == 0) {\nswap(nums, i++, ++left);\n} else if (nums[i] == 1) {\ni++;\n} else {\nswap(nums, i, --right);\n}\n}\n};\n``````\n\nKth Largest Element in an Array:该题目来自 LeetCode,题目需要找出数组中第 K 大的元素,这问题也可以使用快排的思路。并且因为是找出第 K 大元素,所以在分离数组的过程中,可以找出需要的元素在哪边,然后只需要排序相应的一边数组就好。\n\n``````var findKthLargest = function(nums, k) {\nlet l = 0\nlet r = nums.length - 1\n// 得出第 K 大元素的索引位置\nk = nums.length - k\nwhile (l < r) {\n// 分离数组后获得比基准树大的第一个元素索引\nlet index = part(nums, l, r)\n// 判断该索引和 k 的大小\nif (index < k) {\nl = index + 1\n} else if (index > k) {\nr = index - 1\n} else {\nbreak\n}\n}\nreturn nums[k]\n};\nfunction part(array, left, right) {\nlet less = left - 1;\nlet more = right;\nwhile (left < more) {\nif (array[left] < array[right]) {\n++less;\n++left;\n} else if (array[left] > array[right]) {\nswap(array, --more, left);\n} else {\nleft++;\n}\n}\nswap(array, right, more);\nreturn more;\n}``````\n\n### 3.2.6 堆排序\n\n• 大根堆是某个节点的所有子节点的值都比他小\n• 小根堆是某个节点的所有子节点的值都比他大\n\n1. 首先遍历数组,判断该节点的父节点是否比他小,如果小就交换位置并继续判断,直到他的父节点比他大\n2. 重新以上操作 `1`,直到数组首位是最大值\n3. 然后将首位和末尾交换位置并将数组长度减一,表示数组末尾已是最大值,不需要再比较大小\n4. 对比左右节点哪个大,然后记住大的节点的索引并且和父节点对比大小,如果子节点大就交换位置\n5. 重复以上操作 `3 - 4` 直到整个数组都是大根堆。", null, "``````function heap(array) {\ncheckArray(array);\n// 将最大值交换到首位\nfor (let i = 0; i < array.length; i++) {\nheapInsert(array, i);\n}\nlet size = array.length;\n// 交换首位和末尾\nswap(array, 0, --size);\nwhile (size > 0) {\nheapify(array, 0, size);\nswap(array, 0, --size);\n}\nreturn array;\n}\n\nfunction heapInsert(array, index) {\n// 如果当前节点比父节点大,就交换\nwhile (array[index] > array[parseInt((index - 1) / 2)]) {\nswap(array, index, parseInt((index - 1) / 2));\n// 将索引变成父节点\nindex = parseInt((index - 1) / 2);\n}\n}\nfunction heapify(array, index, size) {\nlet left = index * 2 + 1;\nwhile (left < size) {\n// 判断左右节点大小\nlet largest =\nleft + 1 < size && array[left] < array[left + 1] ? left + 1 : left;\n// 判断子节点和父节点大小\nlargest = array[index] < array[largest] ? largest : index;\nif (largest === index) break;\nswap(array, index, largest);\nindex = largest;\nleft = index * 2 + 1;\n}\n}``````\n• 以上代码实现了小根堆,如果需要实现大根堆,只需要把节点对比反一下就好。\n• 该算法的复杂度是 `O(logN)`\n\n## 3.3 链表\n\n``````var reverseList = function(head) {\n// 判断下变量边界问题\n// 初始设置为空,因为第一个节点反转后就是尾部,尾部节点指向 null\nlet pre = null\nlet next\n// 判断当前节点是否为空\n// 不为空就先获取当前节点的下一节点\n// 然后把当前节点的 next 设为上一个节点\n// 然后把 current 设为下一个节点,pre 设为当前节点\nwhile(current) {\nnext = current.next\ncurrent.next = pre\npre = current\ncurrent = next\n}\nreturn pre\n};``````\n\n## 3.4 树\n\n• 先序遍历表示先访问根节点,然后访问左节点,最后访问右节点。\n• 中序遍历表示先访问左节点,然后访问根节点,最后访问右节点。\n• 后序遍历表示先访问左节点,然后访问右节点,最后访问根节点。\n\n``````function TreeNode(val) {\nthis.val = val;\nthis.left = this.right = null;\n}\nvar traversal = function(root) {\nif (root) {\n// 先序\nconsole.log(root);\ntraversal(root.left);\n// 中序\n// console.log(root);\ntraversal(root.right);\n// 后序\n// console.log(root);\n}\n};``````\n\n``````function pre(root) {\nif (root) {\nlet stack = [];\n// 先将根节点 push\nstack.push(root);\n// 判断栈中是否为空\nwhile (stack.length > 0) {\n// 弹出栈顶元素\nroot = stack.pop();\nconsole.log(root);\n// 因为先序遍历是先左后右,栈是先进后出结构\n// 所以先 push 右边再 push 左边\nif (root.right) {\nstack.push(root.right);\n}\nif (root.left) {\nstack.push(root.left);\n}\n}\n}\n}``````\n\n``````function mid(root) {\nif (root) {\nlet stack = [];\n// 中序遍历是先左再根最后右\n// 所以首先应该先把最左边节点遍历到底依次 push 进栈\n// 当左边没有节点时,就打印栈顶元素,然后寻找右节点\n// 对于最左边的叶节点来说,可以把它看成是两个 null 节点的父节点\n// 左边打印不出东西就把父节点拿出来打印,然后再看右节点\nwhile (stack.length > 0 || root) {\nif (root) {\nstack.push(root);\nroot = root.left;\n} else {\nroot = stack.pop();\nconsole.log(root);\nroot = root.right;\n}\n}\n}\n}``````\n\n``````function pos(root) {\nif (root) {\nlet stack1 = [];\nlet stack2 = [];\n// 后序遍历是先左再右最后根\n// 所以对于一个栈来说,应该先 push 根节点\n// 然后 push 右节点,最后 push 左节点\nstack1.push(root);\nwhile (stack1.length > 0) {\nroot = stack1.pop();\nstack2.push(root);\nif (root.left) {\nstack1.push(root.left);\n}\nif (root.right) {\nstack1.push(root.right);\n}\n}\nwhile (stack2.length > 0) {\nconsole.log(s2.pop());\n}\n}\n}``````", null, "1. 如果选取的节点的左节点不为空,就找该左节点最右的节点。对于节点 1 来说,他有左节点 `2` ,那么节点 `2` 的最右节点就是 `5`\n2. 如果左节点为空,且目标节点是父节点的右节点,那么前驱节点为父节点。对于节点 5 来说,没有左节点,且是节点 `2` 的右节点,所以节点 `2` 是前驱节点\n3. 如果左节点为空,且目标节点是父节点的左节点,向上寻找到第一个是父节点的右节点的节点。对于节点 `6` 来说,没有左节点,且是节点 `3` 的左节点,所以向上寻找到节点 `1` ,发现节点 `3` 是节点 `1` 的右节点,所以节点 `1` 是节点 `6` 的前驱节点\n\n``````function predecessor(node) {\nif (!node) return\n// 结论 1\nif (node.left) {\nreturn getRight(node.left)\n} else {\nlet parent = node.parent\n// 结论 2 3 的判断\nwhile(parent && parent.right === node) {\nnode = parent\nparent = node.parent\n}\nreturn parent\n}\n}\nfunction getRight(node) {\nif (!node) return\nnode = node.right\nwhile(node) node = node.right\nreturn node\n}``````\n\n• 对于节点 2 来说,他的后继节点就是 5 ,按照中序遍历原则,可以得出以下结论\n1. 如果有右节点,就找到该右节点的最左节点。对于节点 1 来说,他有右节点 3 ,那么节点 3 的最左节点就是 6\n2. 如果没有右节点,就向上遍历直到找到一个节点是父节点的左节点。对于节点 5 来说,没有右节点,就向上寻找到节点 2 ,该节点是父节点 1 的左节点,所以节点 1 是后继节点\n\n``````function successor(node) {\nif (!node) return\n// 结论 1\nif (node.right) {\nreturn getLeft(node.right)\n} else {\n// 结论 2\nlet parent = node.parent\n// 判断 parent 为空\nwhile(parent && parent.left === node) {\nnode = parent\nparent = node.parent\n}\nreturn parent\n}\n}\nfunction getLeft(node) {\nif (!node) return\nnode = node.left\nwhile(node) node = node.left\nreturn node\n}``````\n\n``````var maxDepth = function(root) {\nif (!root) return 0\nreturn Math.max(maxDepth(root.left), maxDepth(root.right)) + 1\n};``````\n\n## 3.5 动态规划\n\n• 动态规划背后的基本思想非常简单。就是将一个问题拆分为子问题,一般来说这些子问题都是非常相似的,那么我们可以通过只解决一次每个子问题来达到减少计算量的目的。\n• 一旦得出每个子问题的解,就存储该结果以便下次使用。\n\n``0,1,1,2,3,5,8,13,21,34,55,89....``\n\n``````function fib(n) {\nif (n < 2 && n >= 0) return n\nreturn fib(n - 1) + fib(n - 2)\n}\nfib(10)``````\n\n• 自底向上分解子问题\n• 通过变量存储已经计算过的解\n\n• 斐波那契数列从 `0``1` 开始,那么这就是这个子问题的最底层\n• 通过数组来存储每一位所对应的斐波那契数列的值\n``````function fib(n) {\nlet array = new Array(n + 1).fill(null)\narray = 0\narray = 1\nfor (let i = 2; i <= n; i++) {\narray[i] = array[i - 1] + array[i - 2]\n}\nreturn array[n]\n}\nfib(10)``````\n\n0 - 1背包问题\n\n1 3\n2 7\n3 12\n• 对于一个总容量为 5 的背包来说,我们可以放入重量 2 和 3 的物品来达到背包内的物品总价值最高。\n• 对于这个问题来说,子问题就两个,分别是放物品和不放物品,可以通过以下表格来理解子问题\n\n1 0 3 3 3 3 3\n2 0 3 7 10 10 10\n3 0 3 7 12 15 19\n\n• 当容量少于 3 时,只取上一行对应的数据,因为当前容量不能容纳物品 3\n• 当容量 为 3 时,考虑两种情况,分别为放入物品 3 和不放物品 3\n• 不放物品 3 的情况下,总价值为 10\n• 放入物品 3 的情况下,总价值为 12,所以应该放入物品 3\n• 当容量 为 4 时,考虑两种情况,分别为放入物品 3 和不放物品 3\n• 不放物品 3 的情况下,总价值为 10\n• 放入物品 3 的情况下,和放入物品 1 的价值相加,得出总价值为 15,所以应该放入物品 3\n• 当容量 为 5 时,考虑两种情况,分别为放入物品 3 和不放物品 3\n• 不放物品 3 的情况下,总价值为 10\n• 放入物品 3 的情况下,和放入物品 2 的价值相加,得出总价值为 19,所以应该放入物品 3\n\n``````/**\n* @param {*} w 物品重量\n* @param {*} v 物品价值\n* @param {*} C 总容量\n* @returns\n*/\nfunction knapsack(w, v, C) {\nlet length = w.length\nif (length === 0) return 0\n\n// 对照表格,生成的二维数组,第一维代表物品,第二维代表背包剩余容量\n// 第二维中的元素代表背包物品总价值\nlet array = new Array(length).fill(new Array(C + 1).fill(null))\n\n// 完成底部子问题的解\nfor (let i = 0; i <= C; i++) {\n// 对照表格第一行, array 代表物品 1\n// i 代表剩余总容量\n// 当剩余总容量大于物品 1 的重量时,记录下背包物品总价值,否则价值为 0\narray[i] = i >= w ? v : 0\n}\n\n// 自底向上开始解决子问题,从物品 2 开始\nfor (let i = 1; i < length; i++) {\nfor (let j = 0; j <= C; j++) {\n// 这里求解子问题,分别为不放当前物品和放当前物品\n// 先求不放当前物品的背包总价值,这里的值也就是对应表格中上一行对应的值\narray[i][j] = array[i - 1][j]\n// 判断当前剩余容量是否可以放入当前物品\nif (j >= w[i]) {\n// 可以放入的话,就比大小\n// 放入当前物品和不放入当前物品,哪个背包总价值大\narray[i][j] = Math.max(array[i][j], v[i] + array[i - 1][j - w[i]])\n}\n}\n}\nreturn array[length - 1][C]\n}``````\n\n``0, 3, 4, 17, 2, 8, 6, 10``\n\n``````function lis(n) {\nif (n.length === 0) return 0\n// 创建一个和参数相同大小的数组,并填充值为 1\nlet array = new Array(n.length).fill(1)\n// 从索引 1 开始遍历,因为数组已经所有都填充为 1 了\nfor (let i = 1; i < n.length; i++) {\n// 从索引 0 遍历到 i\n// 判断索引 i 上的值是否大于之前的值\nfor (let j = 0; j < i; j++) {\nif (n[i] > n[j]) {\narray[i] = Math.max(array[i], 1 + array[j])\n}\n}\n}\nlet res = 1\nfor (let i = 0; i < array.length; i++) {\nres = Math.max(res, array[i])\n}\nreturn res\n}``````\n\n0 条评论" ]
[ null, "https://user-gold-cdn.xitu.io/2018/5/20/1637b785d2d68735", null, "https://user-gold-cdn.xitu.io/2018/5/20/1637cba2a6155793", null, "https://user-gold-cdn.xitu.io/2018/5/22/16388487759b1152", null, "https://user-gold-cdn.xitu.io/2018/5/22/163884f74c9f4e4d", null, "https://user-gold-cdn.xitu.io/2018/5/22/1638850ba7458208", null, "https://user-gold-cdn.xitu.io/2018/6/23/1642cc145a0cfb26", null, "https://user-gold-cdn.xitu.io/2018/6/9/163e1d2f6cec3348", null, "https://user-gold-cdn.xitu.io/2018/6/9/163e45b56fd25172", null, "https://user-gold-cdn.xitu.io/2018/6/15/164009e58a5a21f8", null, "https://user-gold-cdn.xitu.io/2018/4/12/162b895b452b306c", null, "https://user-gold-cdn.xitu.io/2018/4/12/162b895c7e59dcd1", null, "https://user-gold-cdn.xitu.io/2018/4/13/162bc8ea14567e2e", null, "https://user-gold-cdn.xitu.io/2018/4/13/162be13c7e30bd86", null, "https://user-gold-cdn.xitu.io/2018/4/16/162cd23e69ca9ea3", null, "https://user-gold-cdn.xitu.io/2018/4/17/162d2a9ff258dfe1", null, "https://user-gold-cdn.xitu.io/2018/4/24/162f61ad8e8588b7", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.63894635,"math_prob":0.99143153,"size":34145,"snap":"2020-45-2020-50","text_gpt3_token_len":19312,"char_repetition_ratio":0.15456489,"word_repetition_ratio":0.13587192,"special_character_ratio":0.32364914,"punctuation_ratio":0.17612457,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99327344,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,2,null,2,null,2,null,3,null,7,null,7,null,9,null,9,null,9,null,6,null,9,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-25T10:44:33Z\",\"WARC-Record-ID\":\"<urn:uuid:6563b893-725a-47cf-a8c4-266699fae752>\",\"Content-Length\":\"221217\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:95f35ede-df57-4454-9a3f-48d0ca753134>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a6b5194-0165-42c7-af8e-13dc9397f371>\",\"WARC-IP-Address\":\"39.98.252.5\",\"WARC-Target-URI\":\"https://lmkjs.com/article/detail?id=53\",\"WARC-Payload-Digest\":\"sha1:6EQKZJWNF2LWC7SYMNVUZ42LWFSNDK74\",\"WARC-Block-Digest\":\"sha1:22YPP4SZHB4CBIJHZKH7VFLKYWEEJHWX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141182776.11_warc_CC-MAIN-20201125100409-20201125130409-00484.warc.gz\"}"}
https://feyncalc.github.io/FeynCalcBook/ref/Calc.html
[ "FEYN CALC SYMBOL\n\n# Calc", null, "performs several basic simplifications. Calc[exp] is the same as DotSimplify[DiracSimplify[Contract[DiracSimplify[Explicit[ SUNSimplify[Trick[exp], ExplicitFalse] ]]]]].\n\n## ExamplesExamplesopen allclose all\n\n### Examples\n\nThis calculates", null, "in 4 dimensions and", null, "in D dimensions.\n In:=\n Out=", null, "This simplifies", null, "In:=\n Out=", null, "In:=\n Out=", null, "In:=\n Out=", null, "In:=\n Out=", null, "In:=\n Out=", null, "" ]
[ null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/1.png", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/2.png", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/CellNone_4.png", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/O_1.gif", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/5.png", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/O_2.gif", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/O_3.gif", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/O_4.gif", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/O_5.gif", null, "https://feyncalc.github.io/FeynCalcBook/ref/Files/Calc/O_6.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.753312,"math_prob":0.9991658,"size":361,"snap":"2019-13-2019-22","text_gpt3_token_len":104,"char_repetition_ratio":0.20168068,"word_repetition_ratio":0.6923077,"special_character_ratio":0.18559557,"punctuation_ratio":0.125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9963794,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-26T23:25:07Z\",\"WARC-Record-ID\":\"<urn:uuid:14ca578b-ac59-4bfc-bdba-def78799e3d9>\",\"Content-Length\":\"9519\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f847350a-c913-4a50-be6f-523eb16e80de>\",\"WARC-Concurrent-To\":\"<urn:uuid:3a214691-3225-4df3-ada5-ae357820be20>\",\"WARC-IP-Address\":\"185.199.108.153\",\"WARC-Target-URI\":\"https://feyncalc.github.io/FeynCalcBook/ref/Calc.html\",\"WARC-Payload-Digest\":\"sha1:JIXD5WHN2BYWH34GQQQJMHI6KUQATSRW\",\"WARC-Block-Digest\":\"sha1:RCV5UL2R766UZB7GLYPIT37FPEEMEJ6O\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912206677.94_warc_CC-MAIN-20190326220507-20190327002507-00046.warc.gz\"}"}
https://www.colorhexa.com/37d7c3
[ "# #37d7c3 Color Information\n\nIn a RGB color space, hex #37d7c3 is composed of 21.6% red, 84.3% green and 76.5% blue. Whereas in a CMYK color space, it is composed of 74.4% cyan, 0% magenta, 9.3% yellow and 15.7% black. It has a hue angle of 172.5 degrees, a saturation of 66.7% and a lightness of 52.9%. #37d7c3 color hex could be obtained by blending #6effff with #00af87. Closest websafe color is: #33cccc.\n\n• R 22\n• G 84\n• B 76\nRGB color chart\n• C 74\n• M 0\n• Y 9\n• K 16\nCMYK color chart\n\n#37d7c3 color description : Moderate cyan.\n\n# #37d7c3 Color Conversion\n\nThe hexadecimal color #37d7c3 has RGB values of R:55, G:215, B:195 and CMYK values of C:0.74, M:0, Y:0.09, K:0.16. Its decimal value is 3659715.\n\nHex triplet RGB Decimal 37d7c3 `#37d7c3` 55, 215, 195 `rgb(55,215,195)` 21.6, 84.3, 76.5 `rgb(21.6%,84.3%,76.5%)` 74, 0, 9, 16 172.5°, 66.7, 52.9 `hsl(172.5,66.7%,52.9%)` 172.5°, 74.4, 84.3 33cccc `#33cccc`\nCIE-LAB 78.081, -44.689, -1.798 35.723, 53.35, 60.042 0.24, 0.358, 53.35 78.081, 44.725, 182.303 78.081, -58.072, 4.27 73.041, -40.521, 2.391 00110111, 11010111, 11000011\n\n# Color Schemes with #37d7c3\n\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #d7374b\n``#d7374b` `rgb(215,55,75)``\nComplementary Color\n• #37d773\n``#37d773` `rgb(55,215,115)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #379bd7\n``#379bd7` `rgb(55,155,215)``\nAnalogous Color\n• #d77337\n``#d77337` `rgb(215,115,55)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #d7379b\n``#d7379b` `rgb(215,55,155)``\nSplit Complementary Color\n• #d7c337\n``#d7c337` `rgb(215,195,55)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #c337d7\n``#c337d7` `rgb(195,55,215)``\n• #4bd737\n``#4bd737` `rgb(75,215,55)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #c337d7\n``#c337d7` `rgb(195,55,215)``\n• #d7374b\n``#d7374b` `rgb(215,55,75)``\n• #20a191\n``#20a191` `rgb(32,161,145)``\n• #25b7a4\n``#25b7a4` `rgb(37,183,164)``\n• #29ccb7\n``#29ccb7` `rgb(41,204,183)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #4cdbc9\n``#4cdbc9` `rgb(76,219,201)``\n• #62e0d0\n``#62e0d0` `rgb(98,224,208)``\n• #77e4d6\n``#77e4d6` `rgb(119,228,214)``\nMonochromatic Color\n\n# Alternatives to #37d7c3\n\nBelow, you can see some colors close to #37d7c3. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #37d79b\n``#37d79b` `rgb(55,215,155)``\n• #37d7a8\n``#37d7a8` `rgb(55,215,168)``\n• #37d7b6\n``#37d7b6` `rgb(55,215,182)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #37d7d0\n``#37d7d0` `rgb(55,215,208)``\n• #37d0d7\n``#37d0d7` `rgb(55,208,215)``\n• #37c3d7\n``#37c3d7` `rgb(55,195,215)``\nSimilar Colors\n\n# #37d7c3 Preview\n\nThis text has a font color of #37d7c3.\n\n``<span style=\"color:#37d7c3;\">Text here</span>``\n#37d7c3 background color\n\nThis paragraph has a background color of #37d7c3.\n\n``<p style=\"background-color:#37d7c3;\">Content here</p>``\n#37d7c3 border color\n\nThis element has a border color of #37d7c3.\n\n``<div style=\"border:1px solid #37d7c3;\">Content here</div>``\nCSS codes\n``.text {color:#37d7c3;}``\n``.background {background-color:#37d7c3;}``\n``.border {border:1px solid #37d7c3;}``\n\n# Shades and Tints of #37d7c3\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #030d0b is the darkest color, while #fbfefe is the lightest one.\n\n• #030d0b\n``#030d0b` `rgb(3,13,11)``\n• #061d1a\n``#061d1a` `rgb(6,29,26)``\n• #092d29\n``#092d29` `rgb(9,45,41)``\n• #0c3e37\n``#0c3e37` `rgb(12,62,55)``\n• #104e46\n``#104e46` `rgb(16,78,70)``\n• #135e55\n``#135e55` `rgb(19,94,85)``\n• #166f64\n``#166f64` `rgb(22,111,100)``\n• #197f72\n``#197f72` `rgb(25,127,114)``\n• #1d8f81\n``#1d8f81` `rgb(29,143,129)``\n• #20a090\n``#20a090` `rgb(32,160,144)``\n• #23b09e\n``#23b09e` `rgb(35,176,158)``\n``#26c0ad` `rgb(38,192,173)``\n``#2ad1bc` `rgb(42,209,188)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #47dac8\n``#47dac8` `rgb(71,218,200)``\n• #58decd\n``#58decd` `rgb(88,222,205)``\n• #68e1d2\n``#68e1d2` `rgb(104,225,210)``\n• #78e4d7\n``#78e4d7` `rgb(120,228,215)``\n• #89e7dc\n``#89e7dc` `rgb(137,231,220)``\n• #99ebe0\n``#99ebe0` `rgb(153,235,224)``\n• #a9eee5\n``#a9eee5` `rgb(169,238,229)``\n• #baf1ea\n``#baf1ea` `rgb(186,241,234)``\n• #caf4ef\n``#caf4ef` `rgb(202,244,239)``\n• #daf8f4\n``#daf8f4` `rgb(218,248,244)``\n• #ebfbf9\n``#ebfbf9` `rgb(235,251,249)``\n• #fbfefe\n``#fbfefe` `rgb(251,254,254)``\nTint Color Variation\n\n# Tones of #37d7c3\n\nA tone is produced by adding gray to any pure hue. In this case, #818d8c is the less saturated color, while #12fcdf is the most saturated one.\n\n• #818d8c\n``#818d8c` `rgb(129,141,140)``\n• #789693\n``#789693` `rgb(120,150,147)``\n• #6ea099\n``#6ea099` `rgb(110,160,153)``\n• #65a9a0\n``#65a9a0` `rgb(101,169,160)``\n• #5cb2a7\n``#5cb2a7` `rgb(92,178,167)``\n• #53bbae\n``#53bbae` `rgb(83,187,174)``\n• #49c5b5\n``#49c5b5` `rgb(73,197,181)``\n• #40cebc\n``#40cebc` `rgb(64,206,188)``\n• #37d7c3\n``#37d7c3` `rgb(55,215,195)``\n• #2ee0ca\n``#2ee0ca` `rgb(46,224,202)``\n• #25e9d1\n``#25e9d1` `rgb(37,233,209)``\n• #1bf3d8\n``#1bf3d8` `rgb(27,243,216)``\n• #12fcdf\n``#12fcdf` `rgb(18,252,223)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #37d7c3 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5517554,"math_prob":0.6150166,"size":3715,"snap":"2020-34-2020-40","text_gpt3_token_len":1711,"char_repetition_ratio":0.122338995,"word_repetition_ratio":0.011111111,"special_character_ratio":0.54427993,"punctuation_ratio":0.23809524,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97697973,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-20T18:16:40Z\",\"WARC-Record-ID\":\"<urn:uuid:e4045c31-7b1e-48f5-a1e2-a4afd88c78c4>\",\"Content-Length\":\"36318\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:adc1f4e5-18a6-4b02-96dd-8a19eeac33b4>\",\"WARC-Concurrent-To\":\"<urn:uuid:543d97ac-b273-4f35-bfbb-e6af48ae3564>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/37d7c3\",\"WARC-Payload-Digest\":\"sha1:5XKC5WHQ5E6AWFD6RP5NDMZGL7ZM6MIY\",\"WARC-Block-Digest\":\"sha1:XMDTQVQKQ7WH2IIZHR2MLHQ64XBBKMRT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400198287.23_warc_CC-MAIN-20200920161009-20200920191009-00065.warc.gz\"}"}
http://eprints.maths.manchester.ac.uk/1528/
[ "# Generalized Dirichlet to Neumann operator on invariant differential forms and equivariant cohomology\n\nAl-Zamil, Qusay and Montaldi, James (2010) Generalized Dirichlet to Neumann operator on invariant differential forms and equivariant cohomology. [MIMS Preprint]", null, "There is a more recent version of this item available.", null, "PDF DNoperator1.pdf Download (140kB)\n\n## Abstract\n\nIn a recent paper, Belishev and Sharafutdinov consider a compact Riemannian manifold $M$ with boundary $\\partial M$. They define a generalized Dirichlet to Neumann (DN) operator $\\Lambda$ on all forms on the boundary and they prove that the real additive de Rham cohomology structure of the manifold in question is completely determined by $\\Lambda$. This shows that the DN map $\\Lambda$ inscribes into the list of objects of algebraic topology. In this paper, we suppose $G$ is a torus acting by isometries on $M$. Given $X$ in the Lie algebra of $G$ and the corresponding vector field $X_M$ on $M$, one defines Witten's inhomogeneous coboundary operator $d_{X_M} = d+\\iota_{X_M}$ on invariant forms on $M$. The main purpose is to adapt Belishev and Sharafutdinov's boundary data to invariant forms in terms of the operator $d_{X_M}$ and its adjoint $\\delta_{X_M}$. In other words, we define an operator $\\Lambda_{X_M}$ on invariant forms on the boundary which we call the $X_M$-DN map and using this we recover the long exact $X_M$-cohomology sequence of the topological pair $(M,\\partial M)$ from an isomorphism with the long exact sequence formed from our boundary data. We then show that $\\Lambda_{X_M}$ completely determines the free part of the relative and absolute equivariant cohomology groups of $M$ when the set of zeros of the corresponding vector field $X_M$ is equal to the fixed point set $F$ for the $G$-action. In addition, we partially determine the mixed cup product (the ring structure) of $X_M$-cohomology groups from $\\Lambda_{X_M}$. These results explain to what extent the equivariant topology of the manifold in question is determined by the $X_M$-DN map $\\Lambda_{X_M}$. Finally, we illustrate the connection between Belishev and Sharafutdinov's boundary data on $\\partial F$ and ours on $\\partial M$.\n\nItem Type: MIMS Preprint Algebraic Topology, equivariant topology, manifolds with boundary, equivariant cohomology, cup product (ring structure), group actions, Dirichlet to Neumann operator. MSC 2010, the AMS's Mathematics Subject Classification > 35 Partial differential equationsMSC 2010, the AMS's Mathematics Subject Classification > 55 Algebraic topologyMSC 2010, the AMS's Mathematics Subject Classification > 58 Global analysis, analysis on manifolds Dr James Montaldi 03 Oct 2010 08 Nov 2017 18:18 http://eprints.maths.manchester.ac.uk/id/eprint/1528\n\n### Available Versions of this Item", null, "View Item" ]
[ null, "http://eprints.maths.manchester.ac.uk/style/images/warning.png", null, "http://eprints.maths.manchester.ac.uk/style/images/fileicons/application_pdf.png", null, "http://eprints.maths.manchester.ac.uk/style/images/action_view.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8371585,"math_prob":0.987081,"size":2917,"snap":"2020-34-2020-40","text_gpt3_token_len":740,"char_repetition_ratio":0.118091315,"word_repetition_ratio":0.08373206,"special_character_ratio":0.2365444,"punctuation_ratio":0.09631147,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99847895,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-11T10:51:07Z\",\"WARC-Record-ID\":\"<urn:uuid:f5d78dc1-c4e1-4fc5-ab23-6db4946362dc>\",\"Content-Length\":\"25651\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:14b4ace9-a17f-452a-8ec1-8046044476d8>\",\"WARC-Concurrent-To\":\"<urn:uuid:a3038146-047c-498b-8971-d3f26eeaf968>\",\"WARC-IP-Address\":\"130.88.96.130\",\"WARC-Target-URI\":\"http://eprints.maths.manchester.ac.uk/1528/\",\"WARC-Payload-Digest\":\"sha1:6HQFXEJHGZ5WZTWO52WODVRMFWRHISIV\",\"WARC-Block-Digest\":\"sha1:EJUU2NFZUBST7XJFBCQHW7P42S5FG7LG\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738746.41_warc_CC-MAIN-20200811090050-20200811120050-00453.warc.gz\"}"}
http://vcad.ir/about-using-formulas-in-table-cells/
[ "About Using Formulas in Table Cells\n\n# About Using Formulas in Table Cells\n\nTable cells can contain formulas that do calculations using the values in other table\ncells.\n\nWith a table cell selected, you can insert formulas from the Table Cell contextual\nribbon as well as the shortcut menu. You can also open the In-Place Text Editor and\nenter a formula in a table cell manually.\n\n## Insert a Formula\n\nIn formulas, cells are referred to by their column letter and row number. For example,\nthe cell at top left in the table is A1. Merged cells use the number of what would\nbe the top-left cell. A range of cells is defined by the first and last cells, with\na colon between them. For example, the range A5:C10 includes cells in rows 5 through\n10 in columns A, B, and C.\n\nA formula must start with an equal sign (=). The formulas for sum, average, and count\nignore empty cells and cells that do not resolve to a numeric value. Other formulas\ndisplay an error (#) if any cell in the arithmetic expression is empty or contains\nnonnumeric data.\n\nUse the Cell option to select a cell in another table in the same drawing. When you\nhave selected the cell, the In-Place Text Editor opens so you can enter the rest of\nthe formula.\n\n## Copy a Formula\n\nWhen you copy a formula to another cell in the table, the range changes to reflect\nthe new location. For example, if the formula in A10 sums A1 through A9, when you\ncopy it to B10, the range of cells changes so that it sums B1 through B9.\n\nIf you don’t want a cell address to change when you copy and paste the formula, add\na dollar sign (\\$) to the column or row part of the address. For example, if you enter\n\\$A10, the column stays the same and the row changes. If you enter \\$A\\$10, both column\nand row stay the same.\n\n## Insert Data Automatically\n\nYou can automatically increment data in adjacent cells within a table by using the\nAutoFill grip. For example, a table with a date column can have the dates automatically\nentered by entering the first necessary date and dragging the AutoFill grip.\n\nNumbers will fill automatically by increments of 1 if one cell is selected and dragged.\nSimilarly, dates will resolve by increments of one day if only one cell is selected.\nIf two cells are manually filled with dates one week apart, the remaining cells are\nincremented by one week.\n\n" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8217828,"math_prob":0.79267746,"size":2259,"snap":"2022-40-2023-06","text_gpt3_token_len":514,"char_repetition_ratio":0.13658537,"word_repetition_ratio":0.0,"special_character_ratio":0.22000885,"punctuation_ratio":0.09677419,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97868913,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-05T23:55:21Z\",\"WARC-Record-ID\":\"<urn:uuid:286ccf0f-1858-45b0-b59a-4c07f0f8bd2c>\",\"Content-Length\":\"34437\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b719e654-d71d-4123-b880-3a6d11957f47>\",\"WARC-Concurrent-To\":\"<urn:uuid:1b8f8b82-b3bc-4351-be3e-bd312f360565>\",\"WARC-IP-Address\":\"185.55.227.148\",\"WARC-Target-URI\":\"http://vcad.ir/about-using-formulas-in-table-cells/\",\"WARC-Payload-Digest\":\"sha1:6TORIYEQKVKK6M7ULB3M3QEUFBK32A54\",\"WARC-Block-Digest\":\"sha1:3EZ2E36M7WVVFBHM4YPXXEJABINNVVFN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500294.64_warc_CC-MAIN-20230205224620-20230206014620-00119.warc.gz\"}"}
https://www.dummies.com/education/math/geometry/triangle-classification-using-sides-practice-geometry-questions/
[ "", null, "Triangle Classification Using Sides — Practice Geometry Questions - dummies\n\n# Triangle Classification Using Sides — Practice Geometry Questions\n\nYou can classify equilateral, isosceles, scalene, and right triangles based on their side measurements. The following practice questions ask you to identify a triangle using algebra.\n\n## Practice questions\n\nRefer to the triangle PER. Use the following information to calculate the length of each side of the triangle and classify the triangle as isosceles, equilateral, scalene, and/or right.", null, "1. The perimeter of", null, "is 108 units. The three sides of the triangle are represented by\n\nPE = 5x + 11\n\nER = 7x + 1\n\nRP = 8x – 4\n\nClassify this triangle.\n\n2. The perimeter of", null, "is 60 units. The three sides of the triangle are represented by\n\nPE = 2a + 8\n\nER = 2a – 6\n\nRP = 3a + 2\n\nClassify this triangle.\n\n1. Equilateral\n\nThe given perimeter means that all three sides of the triangle add up to 108:", null, "Find the length of each side of the triangle by plugging in 5 for x:", null, "Because all three sides of the triangle are equal, the triangle is equilateral.\n\n2. Scalene right\n\nThe given perimeter means that all three sides of the triangle add up to 60:", null, "Find the length of each side of the triangle by plugging in 8 for a:", null, "The three sides of the triangle are all different in length, so the triangle is scalene.\n\nBecause the three sides of the triangle satisfy the Pythagorean theorem, the triangle is also a right triangle:", null, "" ]
[ null, "https://www.facebook.com/tr", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null, "https://www.dummies.com/wp-content/plugins/lazy-load/images/1x1.trans.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84683496,"math_prob":0.99579036,"size":1768,"snap":"2019-43-2019-47","text_gpt3_token_len":412,"char_repetition_ratio":0.19897959,"word_repetition_ratio":0.20792079,"special_character_ratio":0.22171946,"punctuation_ratio":0.11782477,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999554,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-22T02:31:14Z\",\"WARC-Record-ID\":\"<urn:uuid:170d1b4f-220a-4821-b0ee-737d1db402ed>\",\"Content-Length\":\"58749\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cbca7337-81ff-4693-adb3-8f3dc3fe459a>\",\"WARC-Concurrent-To\":\"<urn:uuid:fd50db44-307e-4e5a-b347-5a459a2d0af1>\",\"WARC-IP-Address\":\"54.239.152.15\",\"WARC-Target-URI\":\"https://www.dummies.com/education/math/geometry/triangle-classification-using-sides-practice-geometry-questions/\",\"WARC-Payload-Digest\":\"sha1:IOQUFIQ4UKOTXEQK3COY4O3HMDFI2YCL\",\"WARC-Block-Digest\":\"sha1:H37JYTURA4SJRQJT3NBDMX5K6YV6V45P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496671106.83_warc_CC-MAIN-20191122014756-20191122042756-00337.warc.gz\"}"}
https://electronics.stackexchange.com/questions/37734/pull-down-resistors/37737
[ "# Pull Down Resistors\n\nIn my quest to understand electrical engineering, I have stumbled across this tutorial:\n\nI have understood the diagrams until I got to switches. I am not sure how switches work on the breadboard or the diagrams. This is the specific one I am thinking of (this is of a pull down resistor):", null, "The implementation is:", null, "Based on the diagram, what I think is happening is: Power goes to the switch, if the button is up then the circuit is not completed. If the button is pressed then the current takes the path of least resistance to pin2 because it has more pull (100ohm < 10kohm).\n\nThe way it is described in the tutorial sounds like when the button is up, the circuit is still complete, but the 10k ohm resistor pulls the power to the ground. I am not positive how or why if both the 10k ohm and 100ohm are receiving equal current, the current would get pulled to the ground through a higher resistance than is open to pin 2.\n\n• An aside: try to think of a circuit in terms of what the voltage will be at each point, rather than where the current flows. This helped my understanding when I was first learning EE. – geometrikal Aug 12 '12 at 21:32\n• I'm kind of disappointed in the quality of answers on this question. I'd suggesting watching this video by AddOhms instead.. I don't understand this concept enough to explain it but none of the answers here at the time of writing are even talking about what causes the floating state, or how either pull-up or push-down resolves the problem. – Evan Carroll Oct 16 '15 at 20:55\n• @EvanCarroll On the other hand, the question at the time of writing doesn't ask about those things that you're interested in. – Dmitry Grigoryev Aug 8 '18 at 12:11\n\nFirstly, forget the 100 Ω resistor for now. It's not required for the working of the button, it's just there as a protection in case you would make a programming error.\n\n• If the button is pressed P2 will be directly connected to +5 V, so that will be seen as a high level, being \"1\".\n• If the button is released the +5 V doesn't count anymore, there's just the 10 kΩ between the port and ground.\n\nA microcontroller's I/O pin is high impedance when used as input, meaning there flows only a small leakage current, usually much less than the 1 µA, which will be the maximum according to the datasheet. OK, lets' say it's 1 µA. Then according to Ohm's Law this will cause a voltage drop of 1 µA $\\times$ 10 kΩ = 10 mV across the resistor. So the input will be at 0.01 V. That's a low level, or a \"0\". A typical 5 V microcontroller will see any level lower than 1.5 V as low.\n\nNow the 100 Ω resistor. If you would accidentally made the pin output and set it low then pressing the button will cause a short-circuit: the microcontroller sets 0 V on the pin, and the switch +5 V on the same pin. The microcontroller doesn't like that, and the IC may be damaged. In those cases the 100 Ω resistor should limit the current to 50 mA. (Which still is a bit too much, a 1 kΩ resistor would be better.)\n\nSince there won't flow current into an input pin (apart from the low leakage) there will hardly be any voltage drop across the resistor.\n\nThe 10 kΩ is a typical value for a pull-up or pull-down. A lower value will give you even a lower voltage drop, but 10 mV or 1 mV doesn't make much difference. But there's something else: if the button is pressed there's 5 V across the resistor, so there will flow a current of 5 V/ 10 kΩ = 500 µA. That's low enough not to cause any problems, and you won't be keeping the button pressed for a long time anyway. But you may replace the button with a switch, which may be closed for a long time. Then if you would have chosen a 1 kΩ pull-down you would have 5 mA through the resistor as long as the switch is closed, and that's a bit of a waste. 10 kΩ is a good value.\n\nNote that you can turn this upside down to get a pull-up resistor, and switch to ground when the button is pressed.", null, "This will invert your logic: pressing the button will give you a \"0\" instead of a \"1\", but the working is the same: pressing the button will make the input 0 V, if you release the button the resistor will connect the input to the +5 V level (with a negligible voltage drop).\n\nThis is the way it's usually done, and microcontroller manufacturers take this into account: most microcontrollers have internal pull-up resistors, which you can activate or deactivate in software. If you use the internal pull-up you only need to connect the button to ground, that's all. (Some microcontrollers also have configurable pull-downs, but these are much less common.)\n\n• I don't think it's clear how the Push-Down method solves the problem with floating-state from this answer. – Evan Carroll Oct 16 '15 at 20:49\n\nNote that the switch is not a fancy device that takes power and creates some output signal -- instead, think of it as a wire that you're just adding or removing from the circuit by pushing the button.\n\nIf the switch is disconnected (not pressed), the only possible path for current is from P2 through both resistors to ground. Thus, the microcontroller will read a LOW.\n\nIf the switch is connected (pressed):\n\n• Current travels from the power supply through the switch\n\n• Some current travels through the 100 ohm resistor to P2. The microcontroller will read HIGH.\n\n• A small amount of current will flow through the 10 Kohm resistor to ground. This is basically wasted power.\n\nNote that the 100 ohm resistor is just there to limit the maximum current going into P2. It's normally not included on a circuit like this, because the microcontroller's P2 input is already high-impedance and will not sink much current. However, including the 100 ohm resistor is useful in case your software has a bug or a logic error that causes it to try to use P2 as an output instead. In that case, if the microcontroller is trying to drive P2 low but the switch is shorted and connecting it to high, you'd possibly damage the microcontroller pin. To be safe, the 100 ohm resistor would limit the maximum current in that case.\n\nWhen you press the button you place a logic high level (+5 V) on the input. But if you omit the resistor and the button is released, then the input pin would just be floating, which in HCMOS means that the level is undefined. That's something you don't want, so you pull the input down to ground with the resistor. The resistor is required because otherwise pushing the button would cause a short-circuit.\n\nThe input is high impedance, meaning that there will hardly flow any current through it. Zero current through the resistor means zero voltage across it (Ohm's Law), so the 0 V on one side will also be 0 V (or very near) on the input pin.\n\nThis is one way to connect a button, but you can also swap resistor and button, so that the resistor goes to +5 V and the button to ground. The logic is then inversed: pushing the button will give a low level on the input pin. This is often done, though, because most microcontrollers have pull-up resistors built-in, so that you only need the button, the external resistor can then be omitted. Note that you may have to enable the internal pull-up.\n\n• I don't think it's clear how the Push-Down method solves the problem with floating-state from this answer. – Evan Carroll Oct 16 '15 at 20:52\n\nThe 10kohm resistor is called a pull-down resistor because, when the \"green\" node (on connecting the 100ohm and 10kohm resistors) is not connected to +5V by the switch, that node is pulled to ground (assuming low current through that branch, obviously). When the switch is closed, that node gains a potential of +5V.\n\nThis is used to control the inputs of logical ICs (AND gates, OR gates, etc), since these circuits will behave erratically if there is no determinate value on their inputs (a 0 or a 1 value). If you leave the input of a logical gate floating, the output cannot be reliably determined, thus it is advisable to always apply a determined input (a 0 or a 1, again) to the gate's input. In this case, P2 would be an input to a specific logical gate, and when the switch is open, it has an input value of 0 (GND); when the switch is closed, it has an input value of 1 (+5V).\n\ncurrent takes the path of least resistance\n\nI'm not sure where does this common misconception come from, but it's indeed wrong as it directly contradicts the Ohm's law. Current takes all possible paths, inversely proportional to their resistance. If you apply 5V to a 10k resistor, 0.5mA will flow through it, regardless of how many alternative paths (low-resistance or otherwise) you provide.\n\nIncidentally, that path through 100 Ohm resistor is not necessarily \"least resistance\", since the resistor is not connected to ground. Typicall, you would connect that resistor to an MCU input with >10 MOhm impedance, effectively making the 10k resistor the path of least resistance.\n\nThe reason the pull-down resistor is required is that the microcontroller is a CMOS device and thus the input pin is ultimately the gate of a MOSFET.\n\nIf your pushbutton controlled a bulb or an LED or a relay you would not need a pull-down resistor because an open circuit would be \"off\". When the button was released the bulb would turn off because no current would flow.\n\nIf your device was a true TTL part like the original 7400 series logic chips you would not need the pulldown resistor because those inputs would be bipolar transistors and when the button was released no current would flow through the base-emitter junction and the input would be \"off\".\n\nIn contrast, the input of your microcontroller is a MOSFET gate which acts like a capacitor. When the gate voltage is high enough the input is \"on\". That happens when you push the button and current flows through the 100R resistor into the microcontroller. The gate charges up (very quickly) like a capacitor and the input becomes \"on\". Now what happens when you release the button? No more current flows. But what does that mean to the input? If there's no pull-down resistor the charge on the gate has nowhere to go. The voltage will just sit there near 5V and the input will still be \"on\". The pull-down resistor drains the gate charge so its voltage falls below the \"on\" level. That's what you want to ensure the digital input is considered \"off\".\n\nYou can experiment with this by hooking two buttons up to your input pin. Tie one to 5V and one to ground. When you push the 5V button the input will turn on. When you release it it will stay on until you push the one that is connected to GND.\n\n• In TTL it's indeed the base-emitter junction which will not conduct, but not in the way you might think: the input is the emitter of the input NPN transistor, and the transistor conducts if the input is made low. Floating is the same as high. – stevenvh Aug 13 '12 at 18:02" ]
[ null, "https://i.stack.imgur.com/QH5VS.png", null, "https://i.stack.imgur.com/khqb7.jpg", null, "https://i.stack.imgur.com/9J6sx.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9422284,"math_prob":0.80046993,"size":2865,"snap":"2021-31-2021-39","text_gpt3_token_len":720,"char_repetition_ratio":0.14225796,"word_repetition_ratio":0.0,"special_character_ratio":0.25061083,"punctuation_ratio":0.09771987,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9685312,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,6,null,6,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-25T05:49:24Z\",\"WARC-Record-ID\":\"<urn:uuid:dc9284cd-150f-40b4-a752-a1871a664506>\",\"Content-Length\":\"227905\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:df6006a5-b2db-4396-b11b-f908a2d8115a>\",\"WARC-Concurrent-To\":\"<urn:uuid:c58ee84c-709f-4818-ba68-81b6828a6675>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://electronics.stackexchange.com/questions/37734/pull-down-resistors/37737\",\"WARC-Payload-Digest\":\"sha1:LJUPIG5VTL5EMNZBDCAEZI2C73NTBPHQ\",\"WARC-Block-Digest\":\"sha1:WUMV7775WDPKLOIDTCKG6ZWAWE647GVM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046151638.93_warc_CC-MAIN-20210725045638-20210725075638-00262.warc.gz\"}"}
https://discourse.julialang.org/t/figure-layout-dimensions/66920
[ "# Figure Layout Dimensions\n\nI’m trying to find the dimensions of components of my layout programmatically. I know I can get the GridLayout of a figure (“fig”) with `fig.layout`. But if I want to return the actual physical locations of fig[2,1], I can’t find how to call that data. I’m looking for the kind of data I would put into `bbox = BBox()`?\n\nThanks.\n\nWhat are you trying to do? I don’t think there’s a convenience function to get a cell interior bbox right now, you can get the assigned boundingbox for any object via `obj.layoutobservables.suggestedbbox` I think. Although that’s internal\n\nI’m trying to get insets graphs of different dimensions to a common size and specific position inside figure. I have several of these with insets of various size, but all are basically comprised of 3 by 3 grids. So the master figure might be as below:\n\nAnd then I’m trying to inset into the lower quadrant this:\n\nAnd this:", null, "Each of these are comprised of three heat maps at fig[1,1], fig[1,2], and fig[2,2].\n\nI want to keep the dimensions of the 3x3 grids that make up each inset the same so that the inset with a 7x7 grid of 3x3s is proportional to the 3x3 grid of 3x3s (and any other inset I use). So I was hoping I could come up with the dimensions of each fig[i,j] so that I could calculate position and size to keep it proportional.\n\nHope that makes some sense.\n\nJB\n\nSo the internal 3x3s should be the same size, no matter if there are 3x3 or 7x7 of them?\n\nHow should the placement below the triangular plot look, should there be one of the lower heatmaps assemblies there, or multiple?\n\nYou can grab the `ax.scene.px_area` observable for example, that’s the rectangle of the inner area of the big plot. From that you could compute another rectangle for the lower left corner, and place the inset assembly using that as the `bbox` parameter.\n\nAs pseudocode\n\n``````r1 = big_ax.scene.px_area\nr2 = lift(r1) do r\ncompute_small_bbox(r)\nend\n\ngl = GridLayout(bbox = r2)\ngl[1, 1] = Axis(fig)\n``````\n\nThat’s just one idea, it depends on what exactly you need. Maybe a mockup plot where you highlight what the main problem is would be helpful. It seems quite possible to do what you want, but I guess this is about finding a “convenient” solution as well.\n\nYou can also just place the GridLayout in the axis cell actually, and scale it via Relative sizes.\n\n``````f = Figure()\nbigax = Axis(f[1, 1])\ngl = f[1, 1] = GridLayout(width = Relative(0.5), height = Relative(0.5), valign = :bottom, halign = :left)\n# then place stuff into gl\n``````" ]
[ null, "https://aws1.discourse-cdn.com/business5/uploads/julialang/original/3X/c/5/c5ded8dbe5c4808452b855723aca4d96fa6b8a0b.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91339475,"math_prob":0.9422938,"size":2341,"snap":"2022-05-2022-21","text_gpt3_token_len":591,"char_repetition_ratio":0.09756097,"word_repetition_ratio":0.0,"special_character_ratio":0.25117472,"punctuation_ratio":0.11,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9755511,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-16T08:23:43Z\",\"WARC-Record-ID\":\"<urn:uuid:733c4b04-1657-4f84-9fcf-f5209426e445>\",\"Content-Length\":\"29310\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1dee9e0b-da35-4c48-b8a6-e4d8cc3fe098>\",\"WARC-Concurrent-To\":\"<urn:uuid:9812e867-0878-440f-a37b-210b45321379>\",\"WARC-IP-Address\":\"64.71.144.205\",\"WARC-Target-URI\":\"https://discourse.julialang.org/t/figure-layout-dimensions/66920\",\"WARC-Payload-Digest\":\"sha1:ZUYAG4TAKWQACIBWZJ3IKNYPCVS3V333\",\"WARC-Block-Digest\":\"sha1:WPLNVU2KVIXWY632ALC4AXWTWOOESFSW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662510097.3_warc_CC-MAIN-20220516073101-20220516103101-00529.warc.gz\"}"}
https://www.omnicalculator.com/conversion/inches-to-fraction
[ "# Inches to Fraction Calculator\n\nCreated by Wojciech Sas, PhD\nReviewed by Bogna Szyk and Jack Bowater\nLast updated: Jan 03, 2023\n\nThis is the inches to fractions calculator, a simple and intuitive tool that helps you convert any decimal to fraction inches. Do you want to make a length conversion from mm to inches fraction? That's not a problem at all!\n\nAlternatively, you can also turn any fraction to inches, and then to its inch fraction, adjusting for the appropriate precision. Converting inches to fractions has never been this entertaining, has it?\n\n## How to convert decimal to fraction inches?\n\nTransforming a distance in its decimal form to its fraction inches is almost the same as converting any decimal to a regular fraction. Almost. Principally, we have to find the ratio of two numbers, the numerator, and the denominator. The only difference is that the denominator should be to the power of 2: 2, 4, 8, 16, etc.\n\nSo, how to convert a decimal to an inch fraction?\n\n• Let's take your decimal value, x;\n• Choose the precision, or in other words, the value of the denominator, d;\n• Multiply these numbers and round them to the closest whole number, n = round(d·x);\n• The resulting inch fraction is then n/d.\n\nYou can also use our ratio calculator to aid you in doing the math.\n\nAs you can see, the outcome is sometimes only an approximation of real value because of rounding. But for typical everyday measurements, it's accurate enough, especially when you choose a precision of ¹/₃₂ or higher.\n\n💡 Check our decimal to fraction calculator if you want to get the results without losing the precision!\n\n🙋 Did you know that music intervals also rely on dyadic fractions (fractions with the denominator 2ⁿ), as it concerns frequencies?\n\n## How to convert distance in mm to inches fraction?\n\nImagine you want to buy new tires for your bike, or you're preparing a spot for your new TV. You take out your ruler or meterstick and get to measuring. But it's in mm, or cm, or another metric unit your not exactly familiar with. So, is there an easy way to convert mm to inches fraction?\n\n1. If you have the length in mm, divide the result by 25.4;\n\n2. If you have the length in cm, divide the result by 2.54;\n\n3. If you have the length in m, divide the result by 0.0254;\n\n4. Then convert this decimal to fraction inches as you've learned from the previous section.\n\nYou can convert any length unit to inches, but you don't have to remember all the formulas by heart - just use our inches to fraction calculator, and choose one of the most common length units.\n\n## Fraction to inches conversion table\n\nTake a look at this table if you want to find any inch fraction between 0\" and 1\" with steps of 1⁄64\".\n\nFraction Inches\n\nDecimal Inches [\"]\n\nMillimeters [mm]\n\n1⁄64\"\n\n0.015625\n\n0.396875\n\n1⁄32\"\n\n0.03125\n\n0.79375\n\n3⁄64\"\n\n0.046875\n\n1.190625\n\n1⁄16\"\n\n0.0625\n\n1.5875\n\n5⁄64\"\n\n0.078125\n\n1.984375\n\n3⁄32\"\n\n0.09375\n\n2.38125\n\n7⁄64\"\n\n0.109375\n\n2.778125\n\n1⁄8\"\n\n0.125\n\n3.175\n\n9⁄64\"\n\n0.140625\n\n3.571875\n\n5⁄32\"\n\n0.15625\n\n3.96875\n\n11⁄64\"\n\n0.171875\n\n4.365625\n\n3⁄16\"\n\n0.1875\n\n4.7625\n\n13⁄64\"\n\n0.203125\n\n5.159375\n\n7⁄32\"\n\n0.21875\n\n5.55625\n\n15⁄64\"\n\n0.234375\n\n5.953125\n\n1⁄4\"\n\n0.25\n\n6.35\n\n17⁄64\"\n\n0.265625\n\n6.746875\n\n9⁄32\"\n\n0.28125\n\n7.14375\n\n19⁄64\"\n\n0.296875\n\n7.540625\n\n5⁄16\"\n\n0.3125\n\n7.9375\n\n21⁄64\"\n\n0.328125\n\n8.334375\n\n11⁄32\"\n\n0.34375\n\n8.73125\n\n23⁄64\"\n\n0.359375\n\n9.128125\n\n3⁄8\"\n\n0.375\n\n9.525\n\n25⁄64\"\n\n0.390625\n\n9.921875\n\n13⁄32\"\n\n0.40625\n\n10.31875\n\n27⁄64\"\n\n0.421875\n\n10.715625\n\n7⁄16\"\n\n0.4375\n\n11.1125\n\n29⁄64\"\n\n0.453125\n\n11.509375\n\n15⁄32\"\n\n0.46875\n\n11.90625\n\n31⁄64\"\n\n0.484375\n\n12.303125\n\n1⁄2\"\n\n0.5\n\n12.7\n\n33⁄64\"\n\n0.515625\n\n13.096875\n\n17⁄32\"\n\n0.53125\n\n13.49375\n\n35⁄64\"\n\n0.546875\n\n13.890625\n\n9⁄16\"\n\n0.5625\n\n14.2875\n\n37⁄64\"\n\n0.578125\n\n14.684375\n\n19⁄32\"\n\n0.59375\n\n15.08125\n\n39⁄64\"\n\n0.609375\n\n15.478125\n\n5⁄8\"\n\n0.625\n\n15.875\n\n41⁄64\"\n\n0.640625\n\n16.271875\n\n21⁄32\"\n\n0.65625\n\n16.66875\n\n43⁄64\"\n\n0.671875\n\n17.065625\n\n11⁄16\"\n\n0.6875\n\n17.4625\n\n45⁄64\"\n\n0.703125\n\n17.859375\n\n23⁄32\"\n\n0.71875\n\n18.25625\n\n47⁄64\"\n\n0.734375\n\n18.653125\n\n3⁄4\"\n\n0.75\n\n19.05\n\n49⁄64\"\n\n0.765625\n\n19.446875\n\n25⁄32\"\n\n0.78125\n\n19.84375\n\n51⁄64\"\n\n0.796875\n\n20.240625\n\n13⁄16\"\n\n0.8125\n\n20.6375\n\n53⁄64\"\n\n0.828125\n\n21.034375\n\n27⁄32\"\n\n0.84375\n\n21.43125\n\n55⁄64\"\n\n0.859375\n\n21.828125\n\n7⁄8\"\n\n0.875\n\n22.225\n\n57⁄64\"\n\n0.890625\n\n22.621875\n\n29⁄32\"\n\n0.90625\n\n23.01875\n\n59⁄64\"\n\n0.921875\n\n23.415625\n\n15⁄16\"\n\n0.9375\n\n23.8125\n\n61⁄64\"\n\n0.953125\n\n24.209375\n\n31⁄32\"\n\n0.96875\n\n24.60625\n\n63⁄64\"\n\n0.984375\n\n25.003125\n\n1\"\n\n1\n\n25.4\n\n## Let's convert inches to fraction - inches to fraction calculator in practice\n\nImagine you've bought a wooden panel, 5 meters long. You plan to cut it into six equal parts, but you have only a tape measure with the fractional inches scale. We can measure the length with precision down to ¹/₃₂\". Here is how to deal with the problem:\n\n1. Divide 5 m by 6, 5 m / 6 = ⁵/₆ m. It's the length of each part.\n\n2. Convert the measurement in mm to inches by dividing the value by 25.4 and rounding the outcome to two decimal digits (those will be our significant figures): (⁵/₆ m) / 25.4 = 32.81 in.\n\n3. Our precision is ¹/₃₂\". Multiply the value above by 32: 32.81 in × 32 = 1049.92 in.\n\n4. Round the outcome to the nearest whole number, 1050 in.\n\n5. Finally, we can convert the length from inches to fraction: ¹⁰⁵⁰/₃₂\".\n\n6. As there are countless equivalent fractions to our result (try Omni's equivalent fractions calculator for the proof), we can make our lives easier by simplifying this inch fraction. Find the least common multiple of 1050 and 32, which is 2. Divide both numerator and denominator by 2, so we get ⁵²⁵/₁₆\". As it's an improper fraction, convert it to a mixed number: 32 ¹³/₁₆\" (you can use the modulo operation to find the quotient quickly). If you want to go even further, let's extract feet from the mm to inches fraction conversion result. The result is finally: 2' 8 ¹³/₁₆\"\n\nAs you can see, you should take a few steps to obtain the outcome. You can save time by using our inches to fractions calculator, which shows the result immediately!\n\nWojciech Sas, PhD\nEnter distance (decimal or fraction)\nin\nPrecision\n1/32\nResult\nConvert to other units\nmm\nPeople also viewed…\n\n### Binary to octal\n\nUse the binary to octal converter to convert between binary and octal number systems.\n\n### Circle skirt\n\nCircle skirt calculator makes sewing circle skirts a breeze.\n\n### Humans vs vampires\n\nVampire apocalypse calculator shows what would happen if vampires were among us using the predator - prey model.\n\n### kg to stones converter\n\nUsing the kg to stones converter, you can easily find the equivalent weight in stones from the given weight in kg.", null, "" ]
[ null, "data:image/svg+xml;base64,PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48c3ZnIHdpZHRoPSI5OTk5cHgiIGhlaWdodD0iOTk5OXB4IiB2aWV3Qm94PSIwIDAgOTk5OSA5OTk5IiB2ZXJzaW9uPSIxLjEiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgeG1sbnM6eGxpbms9Imh0dHA6Ly93d3cudzMub3JnLzE5OTkveGxpbmsiPjxkZWZzPjxyYWRpYWxHcmFkaWVudCBpZD0id2hpdGUiIGN4PSI1MCUiIGN5PSI1MCUiIHI9IjUwJSIgZng9IjUwJSIgZnk9IjUwJSI+PHN0b3Agb2Zmc2V0PSIwJSIgc3R5bGU9InN0b3AtY29sb3I6cmdiKDI1NSwyNTUsMjU1KTtzdG9wLW9wYWNpdHk6MC4wMSIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOnJnYigyNTUsMjU1LDI1NSk7c3RvcC1vcGFjaXR5OjAiIC8+PC9yYWRpYWxHcmFkaWVudD48L2RlZnM+PGcgc3Ryb2tlPSJub25lIiBmaWxsPSJ1cmwoI3doaXRlKSIgZmlsbC1vcGFjaXR5PSIxIj48cmVjdCB4PSIwIiB5PSIwIiB3aWR0aD0iOTk5OSIgaGVpZ2h0PSI5OTk5Ij48L3JlY3Q+PC9nPjwvc3ZnPg==", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83525443,"math_prob":0.9667249,"size":5670,"snap":"2022-40-2023-06","text_gpt3_token_len":1954,"char_repetition_ratio":0.15990117,"word_repetition_ratio":0.009483667,"special_character_ratio":0.44074073,"punctuation_ratio":0.17042972,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98038673,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-30T08:32:49Z\",\"WARC-Record-ID\":\"<urn:uuid:13d67bf7-7757-4a66-8a72-878683931c91>\",\"Content-Length\":\"339645\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:56c50cb4-deb3-482d-80e1-85a4c546c31d>\",\"WARC-Concurrent-To\":\"<urn:uuid:39e48afa-b28f-478f-b163-08b6099aa723>\",\"WARC-IP-Address\":\"68.70.205.4\",\"WARC-Target-URI\":\"https://www.omnicalculator.com/conversion/inches-to-fraction\",\"WARC-Payload-Digest\":\"sha1:AYBUUE3B2V6C57FAIN4VCGQT6HGZHWUN\",\"WARC-Block-Digest\":\"sha1:4PYIOWHJICSLYCV32F5CD2SHISL3GZST\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499804.60_warc_CC-MAIN-20230130070411-20230130100411-00654.warc.gz\"}"}
https://www.markedbyteachers.com/gcse/maths/beyond-pythagoras-32.html
[ "• Join over 1.2 million students every month\n• Accelerate your learning by 29%\n• Unlimited access from just £6.99 per month", null, "", null, "", null, "# Beyond Pythagoras\n\nExtracts from this document...\n\nIntroduction\n\nMathematics Coursework – Beyond Pythagoras         May 2006\n\nBEYOND PYTHAGORAS\n\nMATHS COURSEWORK\n\nINTRODUCTION", null, "Pythagoras was a Greek mathematician and philosopher. He lived in 400 BC and was one of the first great mathematical thinkers. He spent most of his life in Sicily and southern Italy. He had a group of follows who went around and thought other people what he had taught them who were called the Pythagoreans.\n\nPythagoras himself is best known for proving that the Pythagorean Theorem was true. The Sumerians, two thousand years earlier, already knew that it was generally true, and they used it in their measurements, but Pythagoras proved that it would always be true. The Pythagorean Theorem says that in a right triangle, the sum of the squares of the two right-angle sides will always be the same as the square of the hypotenuse (the long side). A2 + B2 = C2\n\nPythagoras theorem can also help in real life. Here is an example:", null, "Say you were walking though a park and wanted to take a short cut. With Pythagoras’s theorem you could work out exactly how long you would have to walk though the grass, rather then talking the long route by walking on the paths.\n\nPLAN\n\nI am going to investigate the three triangles I have been given. They are all right-angled triangles, with 3 sides, all different lengths.\n\nThe three triangles satisfy the Pythagoras theorem. The theorem states that the hypotenuse side (longest side) must equal the 2 shorter sides squared.\n\nHere is the Pythagoras theorem:", null, "PYTHAGORAS = a2 + b2 = c2\n\nHere are the three triangles I have been given:\n\na)                                b)                                c)", null, "", null, "", null, "I am now going to test if three triangles I have been given:\n\nTriangle A  =    32 + 42 = C2\n9 + 16 = C\n2\n25 = C\n2\n5  = C\n\nMiddle\n\nA = the first term\n\nD = the first number in the changing sequence\n\nC = the second, continuous difference\n\nN = term\n\nI will now substitute the numbers from the sequence into the formula.\n\nTn = a + ( n – 1 ) d + ½ ( n – 1 ) ( n – 2 ) c\n\n4 + ( n – 1 ) 8 + ½ ( n – 1 ) ( n – 2 ) 4\n\n4 + 8n – 8 + 2 [n2 – 3n + 2]\n\n4 + 8n – 8 + 2n2 – 6n + 4\n\n2n2 + 2n + 0\n\nI will now test this nth term again like last time to see if it is correct. I will find out the 7th term by using the nth term I have just worked out then check it against what I have in my sequence.\n\nSo when n = 7\n\n2 x 72 + 2 x 7 + 0\n\n2 x 49 + 14\n\n98 + 14 = 112\n\nIn my sequence under the 7th term I have 112. This proves that my nth term is correct.\n\nnth term for hypotenuse side\n\nI will find out this nth term using the same formula I used finding out the middle side, as it has a second difference.\n\n5     13     25     41     61     85      113\n\\      / \\      / \\      / \\      / \\      / \\      /\n8     12     16       20    24\n28\n\\      / \\      / \\      / \\      / \\      /\n4       4       4        4\n4\n\nTn = a + ( n – 1 ) d + ½ ( n – 1 ) ( n – 2 ) c\n\n5 + ( n – 1 ) 8 + ½ ( n – 1 ) ( n – 2 ) 4\n\n5 + 8n – 8 + 2 [n2 – 3n + 2]\n\n5 + 8n – 8 + 2n2 – 6n + 4\n\n2n2 + 2n + 1\n\nI will now again test this nth term using the same method as above.\n\nSo when n = 7\n\n2 x 72 + 2 x 7 + 1\n\n2 x 49 + 14 + 1\n\n98 + 14 + 1 = 113\n\nBoth say the 7th term is 113, so it must be correct.\n\nTesting the nth terms\n\nI am now going test all the nth terms. I will do this by seeing if they comply with Pythagoras theorem.\n\nnth term for shortest side2 + nth term for middle side2 = nth term for hypotenuse side2\n\nSo: ( 2n + 1)2 + ( 2n2 + 2n )2 = (2n2 + 2n + 1)2\n\nIwill now expand the brackets for eachnth term.\n\n( 2n + 1 )2 expanded:\n\n( 2n + 1) ( 2n + 1)\n\n= 4n2 + 4n + 1\n\n( 2n2 + 2n )2 expanded:\n\n( 2n2 + 2n ) ( 2n2 + 2n )\n\n= 4n4 + 4n3 + 4n3 + 4n2\n\n= 4n4 + 8n3 + 4n2\n\n(2n2 + 2n + 1)2 expanded:\n\n(2n2 + 2n + 1) (2n2 + 2n + 1)\n\n= 4n4 + 4n3 + 2n2 + 4n3 + 4n2 + 2n +2n2 + 2n + 1\n\n= 4n4 + 8n3 + 8n2 + 4n + 1\n\nSo: 4n2 + 4n + 1 + 4n4 + 8n3 + 4n2= 4n4 + 8n3 + 8n2 + 4n + 1\n\n8n2\n\nConclusion\n\nth term is correct.\n\nnth term for hypotenuse side\n\n15   39    75    123   183    255   339\n\\      / \\      / \\      / \\      / \\      /  \\      /\n24     36    48        60    72\n84\n\\      / \\      / \\      / \\      / \\      /\n12     12      12       12\n12\n\nI will find out this nth term using the same formula I used finding out the middle side, as it has a second difference.\n\nTn = a + ( n – 1 ) d + ½ ( n – 1 ) ( n – 2 ) c\n\n15 + ( n – 1 ) 24 + ½ ( n – 1 ) ( n – 2 ) 12\n\n15 + 24n – 24+ 6 [n2 – 3n + 2]\n\n15 + 24n – 24 + 6n2 – 18n + 12\n\n6n2 + 6n + 3\n\nI will now again test this nth term using the same method as above.\n\nSo when n = 7\n\n6 x 72 + 6 x 7 + 3\n\n6 x 49 + 45\n\n294 + 45 = 339\n\nIn my sequence under the 7th term I have 336. This proves that my nth term is correct.\n\nBoth say the 7th term is 336, so it must be correct.\n\nTesting the nth terms of ‘difference of 3’\n\nI am now going test all the nth terms. I will do this by seeing if they comply with Pythagoras theorem.\n\nnth term for shortest side2 + nth term for middle side2 = nth term for hypotenuse side2\n\nSo: ( 6n + 3)2 + ( 6n2 + 6n )2 = (6n2 + 6n + 3)2\n\nIwill now expand the brackets for eachnth term.\n\n( 6n + 3 )2 expanded:\n\n( 6n + 3) ( 6n + 3)\n\n= 36n2 + 36n + 9\n\n( 6n2 +6 )2 expanded:\n\n( 6n2 + 6n ) ( 6n2 + 6n )\n\n= 36n4 + 36n3 + 36n3 + 36n2\n\n= 36n4 + 72n3 + 36n2\n\n(6n2 + 6n + 3)2 expanded:\n\n(6n2 + 6n + 3) (6n2 + 6n + 3)\n\n= 36n4 + 36n3 + 18n2 + 36n3 + 36n2 + 18n +18n2 + 18n + 9\n\n= 36n4 + 72n3 + 72n2 + 36n + 9\n\nSo:\n\n36n2 + 36n + 9 + 36n4 + 72n3 + 36n2= 36n4 + 72n3 + 72n2 + 36n + 9\n\n72n2 + 36n + 9 + 72n3 + 36n4 = 36n4 + 72n3 + 72n2 + 36n + 9\n\n36n4 + 72n3 + 72n2 + 36n + 9 = 36n4 + 72n3 + 72n2 + 36n + 9\n\nThis proves that the nth terms are all right and work with Pythagoras theorem.\n\nExtension conclusion for ‘Difference of 3’ and final conclusion\n\nComparing the 3 nth terms I can conclude that when there is a different of 2 between the middle side and the hypotenuse side the nth term is doubled from when there was a difference of 1. When there is a different of 3 between the middle side and the hypotenuse side the nth term is tripled. I predict that when there is a difference of 4 between the middle side and the hypotenuse side and nth term will be quadrupled and so on.\n\nThis student written piece of work is one of many that can be found in our GCSE Beyond Pythagoras section.\n\n## Found what you're looking for?\n\n• Start learning 29% faster today\n• 150,000+ documents available\n• Just £6.99 a month\n\nNot the one? Search for your essay title...\n• Join over 1.2 million students every month\n• Accelerate your learning by 29%\n• Unlimited access from just £6.99 per month\n\n# Related GCSE Beyond Pythagoras essays\n\n1.", null, "## Beyond Pythagoras\n\n(2x2)+1=5 It works for that one, as I can see on my table that with term 2, the side length is 5. (2x3)+1=7 It works for that one, as I can see on my table that with term 3, the side length is 7.\n\n2.", null, "## Beyond Pythagoras - I am investigating the relationships between the lengths of the three ...\n\nThis does not depend on the lengths a, b, c; only that they are the sides of a right-angled triangle. So the two blue squares are equal in area to the red square, for any right-angled triangle: a2 + b2 = c2 this makes an effective visual aid by pushing\n\n1.", null, "## Pyhtagorean Theorem\n\nSo with this knowledge, once again, you substitute a and b with their formulae. So (2n+1) �+(2n+1) = 4n�+6n+2 = 2(2n�+3n+1) = 2n(2n+3)+2 Here is how I got my formulae for sides a, b and c. a) Take the first five terms, 3, 5, 7, 9, 11.\n\n2.", null, "## Beyond Pythagoras\n\nHow can I prove I'm right? Looking for patterns in the sequence helps, for instance in this table for the small side of family 1 I noticed that you add two on every time you move up the sequence. I'll test this against what my formula predicts: From no.5 the sequence = 11, so for no.6\n\n1.", null, "## Beyond Pythagoras\n\nBy looking at the table it's obvious that the formulae for 'a' is a=2n+1 I'm now going to find the general formulae for the 'b' and 'c' value. (b+1) � = (2n+1)� + b b�+2b+1 = 4n�+4n+1+b� b�+2b-b� = 4n�+4n+1-1 2b = 4n�+4n b = 2n�+2n c = 2n�+2n+1 I\n\n2.", null, "## Pythagorean Theorem Coursework\n\nso with that knowledge, you substitute a and b with their formulae to get the formula. So (2n+1)(2n�+2n) 2 = 4n�+2n�+4n�+2n 2 =2n�+n�+2n�+n =2n�+3n�+n =n(2n�+3n+1) We also know that to get the perimeter of any shape, not just a triangle, you add up the lengths of all of the sides.\n\n1.", null, "## Beyond Pythagoras\n\nIf n=2 12 and the first term is 13 so a difference of +1 If n=3 24 and the first term is 25 so a difference of +1 Mahmoud Elsherif Beyond Pythagoras P.5 So the nth term is: 2n2+2n+1 To see if this really works, I will expand them and see if these are the real nth terms.\n\n2.", null, "## Beyond Pythagoras ...\n\nFirst I shall find the nth term of the shortest side. Sequence 3,5,7,9,11,13 First difference 2,2,2,2,2 So 2/1=2, so it's 2n. Substituting in we get for 2n If n=1 2 and the first term is 3 so a difference is +1 If n=2 4 and the first term is 5", null, "• Over 160,000 pieces\nof student written work\n• Annotated by\nexperienced teachers\n• Ideas and feedback to", null, "" ]
[ null, "https://static1.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/catalog/close-button.png", null, "https://static1.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/catalog/maths-promo.png", null, "https://static1.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/catalog/try-it-now-button.png", null, "http://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/839838/html/images/image00.png", null, "http://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/839838/html/images/image01.png", null, "http://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/839838/html/images/image04.png", null, "http://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/839838/html/images/image05.png", null, "http://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/839838/html/images/image06.png", null, "http://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/839838/html/images/image07.png", null, "https://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/825047/images/preview/img_138_1.jpg", null, "https://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/946226/images/preview/img_138_1.jpg", null, "https://static2.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/851715/images/preview/img_138_1.jpg", null, "https://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/823607/images/preview/img_138_1.jpg", null, "https://static2.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/822672/images/preview/img_138_1.jpg", null, "https://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/822051/images/preview/img_138_1.jpg", null, "https://static3.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/131529/images/preview/img_138_1.jpg", null, "https://static1.mbtfiles.co.uk/media/docs/newdocs/gcse/maths/shape_space_and_measures/beyond_pythagoras/131407/images/preview/img_138_1.jpg", null, "https://static2.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/cms/study-guides/what-is-mbt-text.png", null, "https://static2.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/cms/study-guides/what-is-mbt.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8815244,"math_prob":0.99157333,"size":6241,"snap":"2022-27-2022-33","text_gpt3_token_len":2351,"char_repetition_ratio":0.14862914,"word_repetition_ratio":0.33844104,"special_character_ratio":0.41163275,"punctuation_ratio":0.05952381,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99881697,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38],"im_url_duplicate_count":[null,null,null,null,null,null,null,2,null,2,null,2,null,2,null,2,null,2,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-19T21:07:09Z\",\"WARC-Record-ID\":\"<urn:uuid:9402eb66-d86f-4570-baf3-fec409bc0595>\",\"Content-Length\":\"91768\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:68513ed4-0f37-47b9-a82f-417fc0c75860>\",\"WARC-Concurrent-To\":\"<urn:uuid:5fec8efb-e918-4c72-95b2-98c1f917862f>\",\"WARC-IP-Address\":\"104.26.15.118\",\"WARC-Target-URI\":\"https://www.markedbyteachers.com/gcse/maths/beyond-pythagoras-32.html\",\"WARC-Payload-Digest\":\"sha1:U2AU6RRZOSSUNSNGSVVUC2WVBQU3HTRE\",\"WARC-Block-Digest\":\"sha1:FLSBRZS5Q2OBEQF54QBYDV2GDHBI63LG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882573760.75_warc_CC-MAIN-20220819191655-20220819221655-00383.warc.gz\"}"}
https://jonlabelle.com/snippets/view/markdown/use-time-zones-in-date-and-time-arithmetic-in-c
[ "Ordinarily, when you perform date and time arithmetic using `System.DateTime` or `System.DateTimeOffset` values, the result does not reflect any time zone adjustment rules. This is true even when the time zone of the date and time value is clearly identifiable (for example, when the `System.DateTime.Kind` property is set to `System.DateTimeKind.Local`). This topic shows how to perform arithmetic operations on date and time values that belong to a particular time zone. The results of the arithmetic operations will reflect the time zone’s adjustment rules.\n\n``````---\ntitle: \"Use Time Zones in Date and Time Arithmetic in C#\"\nsubtitle: date and time arithmetic operations\nauthor: Microsoft\ndate: April 9, 2017\nsource: https://docs.microsoft.com/en-us/dotnet/standard/datetime/use-time-zones-in-arithmetic\nnotoc: true\n---\n\nOrdinarily, when you perform date and time arithmetic using `System.DateTime` or\n`System.DateTimeOffset` values, the result does not reflect any time zone\nadjustment rules. This is true even when the time zone of the date and time\nvalue is clearly identifiable (for example, when the `System.DateTime.Kind`\nproperty is set to `System.DateTimeKind.Local`). This topic shows how to perform\narithmetic operations on date and time values that belong to a particular time\nzone. The results of the arithmetic operations will reflect the time zone's\n\n### To apply adjustment rules to date and time arithmetic\n\n1. Implement some method of closely coupling a date and time value with the time\nzone to which it belongs. For example, declare a structure that includes both\nthe date and time value and its time zone. The following example uses this\napproach to link a `System.DateTime` value with its time zone.\n\n```cs\n// Define a structure for DateTime values for internal use only\ninternal struct TimeWithTimeZone\n{\nTimeZoneInfo TimeZone;\nDateTime Time;\n}\n```\n\n2. Convert a time to Coordinated Universal Time (UTC) by calling either the\n`System.TimeZoneInfo.ConvertTimeToUtc` method or the\n`System.TimeZoneInfo.ConvertTime` method.\n\n3. Perform the arithmetic operation on the UTC time.\n\n4. Convert the time from UTC to the original time's associated time zone by calling the `TimeZoneInfo.ConvertTime(DateTime, TimeZoneInfo)` method.\n\n## Example\n\nThe following example adds two hours and thirty minutes to March 9, 2008, at\n1:30 A.M. Central Standard Time. The time zone's transition to daylight saving\ntime occurs thirty minutes later, at 2:00 A.M. on March 9, 2008. Because the\nexample follows the four steps listed in the previous section, it correctly\nreports the resulting time as 5:00 A.M. on March 9, 2008.\n\n```cs\nusing System;\n\npublic struct TimeZoneTime\n{\npublic TimeZoneInfo TimeZone;\npublic DateTime Time;\n\npublic TimeZoneTime(TimeZoneInfo tz, DateTime time)\n{\nif (tz == null)\nthrow new ArgumentNullException(\"The time zone cannot be a null reference.\");\n\nthis.TimeZone = tz;\nthis.Time = time;\n}\n\n{\n// Convert time to UTC\nDateTime utcTime = TimeZoneInfo.ConvertTimeToUtc(this.Time, this.TimeZone);\n// Add time interval to time\n// Convert time back to time in time zone\nreturn new TimeZoneTime(this.TimeZone, TimeZoneInfo.ConvertTime(utcTime,\nTimeZoneInfo.Utc, this.TimeZone));\n}\n}\n\npublic class TimeArithmetic\n{\npublic const string tzName = \"Central Standard Time\";\n\npublic static void Main()\n{\ntry\n{\nTimeZoneTime cstTime1, cstTime2;\n\nTimeZoneInfo cst = TimeZoneInfo.FindSystemTimeZoneById(tzName);\nDateTime time1 = new DateTime(2008, 3, 9, 1, 30, 0);\nTimeSpan twoAndAHalfHours = new TimeSpan(2, 30, 0);\n\ncstTime1 = new TimeZoneTime(cst, time1);\nConsole.WriteLine(\"{0} + {1} hours = {2}\", cstTime1.Time,\ntwoAndAHalfHours.ToString(),\ncstTime2.Time);\n}\ncatch\n{\nConsole.WriteLine(\"Unable to find {0}.\", tzName);\n}\n}\n}\n```\n\nBoth `System.DateTime` and `System.DateTimeOffset` values are disassociated from\nany time zone to which they might belong. To perform date and time arithmetic in\na way that automatically applies a time zone's adjustment rules, the time zone\nto which any date and time value belongs must be immediately identifiable. This\nmeans that a date and time and its associated time zone must be tightly coupled.\nThere are several ways to do this, which include the following:\n\n* Assume that all times used in an application belong to a particular time zone.\nAlthough appropriate in some cases, this approach offers limited flexibility\nand possibly limited portability.\n* Define a type that tightly couples a date and time with its associated time\nzone by including both as fields of the type. This approach is used in the\ncode example, which defines a structure to store the date and time and the\ntime zone in two member fields.\n\nThe example illustrates how to perform arithmetic operations on\n`System.DateTime` values so that time zone adjustment rules are applied to the\nresult. However, `System.DateTimeOffset` values can be used just as easily. The\nfollowing example illustrates how the code in the original example might be\n\n```cs\nusing System;\n\npublic struct TimeZoneTime\n{\npublic TimeZoneInfo TimeZone;\npublic DateTimeOffset Time;\n\npublic TimeZoneTime(TimeZoneInfo tz, DateTimeOffset time)\n{\nif (tz == null)\nthrow new ArgumentNullException(\"The time zone cannot be a null reference.\");\n\nthis.TimeZone = tz;\nthis.Time = time;\n}\n\n{\n// Convert time to UTC\nDateTimeOffset utcTime = TimeZoneInfo.ConvertTime(this.Time, TimeZoneInfo.Utc);\n// Add time interval to time\n// Convert time back to time in time zone\nreturn new TimeZoneTime(this.TimeZone, TimeZoneInfo.ConvertTime(utcTime, this.TimeZone));\n}\n}\n\npublic class TimeArithmetic\n{\npublic const string tzName = \"Central Standard Time\";\n\npublic static void Main()\n{\ntry\n{\nTimeZoneTime cstTime1, cstTime2;\n\nTimeZoneInfo cst = TimeZoneInfo.FindSystemTimeZoneById(tzName);\nDateTime time1 = new DateTime(2008, 3, 9, 1, 30, 0);\nTimeSpan twoAndAHalfHours = new TimeSpan(2, 30, 0);\n\ncstTime1 = new TimeZoneTime(cst,\nnew DateTimeOffset(time1, cst.GetUtcOffset(time1)));\nConsole.WriteLine(\"{0} + {1} hours = {2}\", cstTime1.Time,\ntwoAndAHalfHours.ToString(),\ncstTime2.Time);\n}\ncatch\n{\nConsole.WriteLine(\"Unable to find {0}.\", tzName);\n}\n}\n}\n```\n\nNote that if this addition is simply performed on the `System.DateTimeOffset`\nvalue without first converting it to UTC, the result reflects the correct point\nin time but its offset does not reflect that of the designated time zone for\nthat time.\n\n## Compiling the code\n\nThis example requires:\n\n* That a reference to System.Core.dll be added to the project.\n* That the `System` namespace be imported with the `using` statement (required in C# code)." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7012439,"math_prob":0.9422181,"size":7134,"snap":"2019-51-2020-05","text_gpt3_token_len":1660,"char_repetition_ratio":0.1769986,"word_repetition_ratio":0.37096775,"special_character_ratio":0.22582002,"punctuation_ratio":0.1743912,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96941864,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-06T20:21:54Z\",\"WARC-Record-ID\":\"<urn:uuid:e54dda3d-9d95-49ce-b413-64828b74fcdc>\",\"Content-Length\":\"17007\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b2ed00ac-28dc-43ce-b814-80ccd8b9cad9>\",\"WARC-Concurrent-To\":\"<urn:uuid:3392a79c-3a5c-4abc-89c4-36708fe9a31c>\",\"WARC-IP-Address\":\"45.32.199.83\",\"WARC-Target-URI\":\"https://jonlabelle.com/snippets/view/markdown/use-time-zones-in-date-and-time-arithmetic-in-c\",\"WARC-Payload-Digest\":\"sha1:FJ45FNVVARPOEO54FC24YYKDOGEYOITD\",\"WARC-Block-Digest\":\"sha1:4EUYRQ4E3DSGBLZABGKWLRSAD3QNHNAD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540490972.13_warc_CC-MAIN-20191206200121-20191206224121-00020.warc.gz\"}"}
http://stevedutch.net/symmetry/polycpd.htm
[ "# Polyhedral Compounds\n\nSteven Dutch, Professor Emeritus, Natural and Applied Sciences, University of Wisconsin - Green Bay\n\n## Uniform Polyhedra and Their Duals\n\nEach of the Platonic and Kepler-Poinsot polyhedra can be combined with its dual. There are five possibilities:\n\n• Tetrahedron with itself\n• Cube and Octahedron\n• Icosahedron and Dodecahedron\n• Great Dodecahedron and Small Stellated Dodecahedron\n• Great Icosahedron and Great Stellated Dodecahedron", null, "Stella Octangula The tetrahedron is its own dual. Two interpentrating tetrahedra make up the stella octangula, discovered by Kepler. Its vertices are the vertices ofd a cube, its edges are the face diagonals of a cube, and the solid common to both tetrahedra is an octahedron. This is also one of the regular compounds discussed below.", null, "Cube and Octahedron", null, "Icosahedron and Dodecahedron", null, "Great Dodecahedron and Great Stellated Dodecahedron\n\n## Regular Compounds\n\nIn addition to combining polyhedra and their duals, there are several regular compounds of polyhedra that result in solids with greater symmetry than the component polyhedra. These are all based on the fact that some Platonic solids can be inscribed in others. There are five possibilities of which one has already been presented:\n\n• Tetrahedra in a cube (Stella Octangula, above)\n• Cubes in a dodecahedron\n• Octahedra around an icosahedron\n• Five tetrahedra in a dodecahedron\n• Ten Tetrahedra in a dodecahedron", null, "Five Cubes in a Dodecahedron A dodecahedron contains the vertices of a cube. There are five different ways to inscribe a cube in a dodecahedron; each diagonal of a pentagon is one possible cube edge. Superposition of all five cubes results in a solid with icosahedral symmetry.", null, "Five Octahedra Around an Icosahedron The icosahedron and octahedron are duals of the dodecahedron and cube. This compound is the dual of the five-cube compound. An icosahedron contains the faces of an octahedron; there are five different ways to inscribe an icosahedron in an octahedron. Superposition of all five octahedra results in a solid with icosahedral symmetry. Since this shape results from extending the faces of an icosahedron, it is one of the stellations of the icosahedron.", null, "Five Tetrahedra in a Dodecahedron A tetrahedron can be inscribed within a cube, or obtained by extending alternate faces of an octahedron. Thus, either of the two compounds above can derive this compound of five tetrahedra. This shape lacks mirror planes and thus comes in either left- or right-handed form. Since this shape can result from extending the faces of the octahedra above, it therefore also results from extending the faces of an icosahedron and is thus one of the stellations of the icosahedron.\n\n## Other Scaled Compounds of Uniform polyhedra\n\nThere are many other interesting and attractive compounds of polyhedra. In some cases the relative sizes of the intersecting polyhedra are fixed by the intersections of vertices and edges. I refer to these as \"scaled\". Of course, compounds of identical polyhedra are scaled. In other cases the relative sizes are not fixed. I refer to those as \"nonscaled\"", null, "Crossed Dodecahedra (Iron Cross) A cube can be inscribed in a dodecahedron but a dodecahedron does not have cubic symmetry. We can inscribe a cube in two dodecahedra, rotate one of them 90 degrees, and superimpose them to get a compound with full cubic symmetry. Another way to describe this shape is to say that we rotate one of the two dodecahedra 90 degrees around one of its two-fold symmetry axes. You cannot have repeating plane patterns with five-fold symmetry, so crystals can never be true pentagonal dodecahedra. However, the mineral pyrite often crystallizes as slightly distorted dodecahedra, and sometimes two crystals interpenetrate to make the shape shown here. A crystal of pyrite with this form is sometimes called an \"iron cross\".", null, "Crossed Icosahedra We can also combine two icosahedra by rotating one 90 degrees around one of its two-fold symmetry axes and superimposing them. Eight pairs of faces are coplanar and result in skewed six-pointed stars.", null, "Three Cubes Three cubes are rotated 45 degrees around their four-fold symmetry axes, then superimposed.", null, "Four Cubes - 1 This compound rotates each of four cubes around one of its diagonal three-fold symmetry axes. The compound has full cubic symmetry but the four-fold symmetry axes do not line up with those of the component cubes", null, "Four Cubes - 2 Here three cubes are rotated around their four-fold axes, and a fourth non-rotated cube added. The faces are 8/2 polygons, usually considered degenerate polygons because their edges do not form a continuous set. 8/2 star polygons are popular decorative motifs in the Islamic world.", null, "Great Dodecahedron and Dodecahedron A compound of the great dodecahedron and a regular dodecahedron.", null, "Octahedron and Dodecahedron - 1 The cube inscribed in a dodecahedron cannot be seen from outside except for its edges, which are coplanar with the dodecahedron faces. Its dual octahedron, however, protrudes through the dodecahedron.", null, "Octahedron and Dodecahedron - 2 A slightly larger octahedron just touches the opposite vertices of the dodecahedron, so that the edges of the octahedron are completely visible.", null, "Icosahedron and Cube An icosahedron encloses an octahedron. A cube oriented with the same symmetry as the octahedron can interpenetrate the icosahedron.", null, "Icosahedron and two tetrahedra", null, "Icosahedron and single tetrahedron\n\n## Nonscaled Compounds of Uniform polyhedra\n\nThese compunds mostly show how polyhedra are related; the relative sizes of the interpenetrating polyhedra can vary within limits without affecting the symmetry of the compound.", null, "Octahedron and Icosahedron This compound illustrates how an octahedron is related to an icosahedron.\n\nCreated 5 December 1997, Last Update 7 June 1999" ]
[ null, "http://stevedutch.net/graphics-other/polyhedr/compound/2tetra.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/cuboct1.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/icosdod.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/gtisd.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/5cubes.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/5oct.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/5tetra.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/2dods.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/2icosa.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/3cubes.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/4cubes.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/4cubesa.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/dodgtdod.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/dodoct.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/dodoct1.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/iccub.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/icstoc.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/ictet.gif", null, "http://stevedutch.net/graphics-other/polyhedr/compound/icoct1.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9435801,"math_prob":0.80150265,"size":5246,"snap":"2022-40-2023-06","text_gpt3_token_len":1328,"char_repetition_ratio":0.19057612,"word_repetition_ratio":0.042424243,"special_character_ratio":0.18547465,"punctuation_ratio":0.07903403,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99248,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-27T10:32:55Z\",\"WARC-Record-ID\":\"<urn:uuid:15f5f325-5f98-4a5f-bb4a-7f6d4a44cabf>\",\"Content-Length\":\"10672\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:929f7772-99ff-4d6a-b272-721cbb875a75>\",\"WARC-Concurrent-To\":\"<urn:uuid:2618b2c5-30eb-4193-a6d5-a4cfaf1c96da>\",\"WARC-IP-Address\":\"107.180.40.143\",\"WARC-Target-URI\":\"http://stevedutch.net/symmetry/polycpd.htm\",\"WARC-Payload-Digest\":\"sha1:Y53WHG7J7VMV3WC6OYW3BNST3AUNXP45\",\"WARC-Block-Digest\":\"sha1:EIC24TFF3I3GH53NFKQ5RW2RBW6AQME6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335004.95_warc_CC-MAIN-20220927100008-20220927130008-00005.warc.gz\"}"}
https://devel.isa-afp.org/browser_info/current/AFP/JinjaDCI/Hidden.html
[ "# Theory Hidden\n\n```theory Hidden\nimports \"List-Index.List_Index\"\nbegin\n\ndefinition hidden :: \"'a list ⇒ nat ⇒ bool\" where\n\"hidden xs i ≡ i < size xs ∧ xs!i ∈ set(drop (i+1) xs)\"\n\nlemma hidden_last_index: \"x ∈ set xs ⟹ hidden (xs @ [x]) (last_index xs x)\"\nby(auto simp add: hidden_def nth_append rev_nth[symmetric]\ndest: last_index_less[OF _ le_refl])\n\nlemma hidden_inacc: \"hidden xs i ⟹ last_index xs x ≠ i\"\nby(auto simp add: hidden_def last_index_drop last_index_less_size_conv)\n\nlemma [simp]: \"hidden xs i ⟹ hidden (xs@[x]) i\"\n\nlemma fun_upds_apply:\n\"(m(xs[↦]ys)) x =\n(let xs' = take (size ys) xs\nin if x ∈ set xs' then Some(ys ! last_index xs' x) else m x)\"\nproof(induct xs arbitrary: m ys)\ncase Nil then show ?case by(simp add: Let_def)\nnext\ncase Cons show ?case\nproof(cases ys)\ncase Nil\nnext\ncase Cons': Cons\nthen show ?thesis using Cons by(simp add: Let_def last_index_Cons)\nqed\nqed\n\nlemma map_upds_apply_eq_Some:\n\"((m(xs[↦]ys)) x = Some y) =\n(let xs' = take (size ys) xs\nin if x ∈ set xs' then ys ! last_index xs' x = y else m x = Some y)\"" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5167661,"math_prob":0.98859173,"size":1337,"snap":"2023-40-2023-50","text_gpt3_token_len":436,"char_repetition_ratio":0.16129032,"word_repetition_ratio":0.11111111,"special_character_ratio":0.31488407,"punctuation_ratio":0.11857708,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99885285,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T01:12:46Z\",\"WARC-Record-ID\":\"<urn:uuid:c8048aa7-f8e4-424d-9abf-838188521794>\",\"Content-Length\":\"28107\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:108491b3-6eb6-47e6-82c0-f99fff6ddee2>\",\"WARC-Concurrent-To\":\"<urn:uuid:39e02b05-d85d-48f7-9056-e05d0248e336>\",\"WARC-IP-Address\":\"131.159.47.3\",\"WARC-Target-URI\":\"https://devel.isa-afp.org/browser_info/current/AFP/JinjaDCI/Hidden.html\",\"WARC-Payload-Digest\":\"sha1:5TA36NQE764LCQYEWTDNEK5ZUZBNTRQK\",\"WARC-Block-Digest\":\"sha1:DIUGEPE2CL7GKO33JFLJNQTRDGWCRPBN\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506539.13_warc_CC-MAIN-20230923231031-20230924021031-00622.warc.gz\"}"}
https://rd.springer.com/chapter/10.1007%2F978-3-030-04651-4_8
[ "# Relaxation and Matrix Randomized Rounding for the Maximum Spectral Subgraph Problem\n\nConference paper\nPart of the Lecture Notes in Computer Science book series (LNCS, volume 11346)\n\n## Abstract\n\nModifying the topology of a network to mitigate the spread of an epidemic with epidemiological constant $$\\lambda$$ amounts to the NP-hard problem of finding a partial subgraph with maximum number of edges and spectral radius bounded above by $$\\lambda$$. A software-defined network (SDN) capable of real-time topology reconfiguration can then use an algorithm for finding such subgraph to quickly remove spreading malware threats without deploying specific security countermeasures.\n\nIn this paper, we propose a novel randomized approximation algorithm based on the relaxation and rounding framework that achieves a $$O(\\log n)$$ approximation in the case of finding a subgraph with spectral radius bounded by $$\\lambda \\in (\\log n, \\lambda _1(G))$$ where $$\\lambda _1(G)$$ is the spectral radius of the input graph and n its number of nodes. We combine this algorithm with a maximum matching algorithm to obtain a $$O(\\log ^2 n)$$ approximation algorithm for all values of $$\\lambda$$. We also describe how the mathematical programming formulation we give has several advantages over previous approaches which attempted at finding a subgraph with minimum spectral radius given an edge removal budget.\n\n## Keywords\n\nApproximation algorithm Relaxation and rounding Semidefinite programming Spectral graph theory Random graphs\n\n## References\n\n1. 1.\nBhatia, R.: Matrix Analysis, vol. 169. Springer, Heidelberg (2013).\n2. 2.\nChakrabarti, D., Wang, Y., Wang, C., Leskovec, J., Faloutsos, C.: Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 10(4), 1 (2008)\n3. 3.\nChung, F., Radcliffe, M.: On the spectra of general random graphs. Electron. J. Comb. 18(1), 215 (2011)\n4. 4.\nGanesh, A., Massoulié, L., Towsley, D.: The effect of network topology on the spread of epidemics. In: Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), vol. 2, pp. 1455–1466 (2005)Google Scholar\n5. 5.\nGhosh, A., Boyd, S.: Growing well-connected graphs. In: Proceedings of the IEEE Conference on Decision and Control (CDC 2006), pp. 6605–6611. IEEE (2006)Google Scholar\n6. 6.\nGoemans, M.X., Williamson, D.P.: Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. J. ACM (JACM) 42(6), 1115–1145 (1995)\n7. 7.\nKolla, A., Makarychev, Y., Saberi, A., Teng, S-H.: Subgraph sparsification and nearly optimal ultrasparsifiers. In: Proceedings of the ACM Symposium on Theory of Computing (STOC 2010), pp. 57–66. ACM (2010)Google Scholar\n8. 8.\nLasserre, J.B.: Global optimization with polynomials and the problem of moments. SIAM J. Optim. 11(3), 796–817 (2001)\n9. 9.\nLe, C.M., Levina, E., Vershynin, R.: Concentration and regularization of random graphs. Random Struct. Algorithms 51(3), 538–561 (2017)\n10. 10.\nMehdi, S.A., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 161–180. Springer, Heidelberg (2011).\n11. 11.\nMosk-Aoyama, D.: Maximum algebraic connectivity augmentation is NP-hard. Oper. Res. Lett. 36(6), 677–679 (2008)\n12. 12.\nMotwani, R., Raghavan, P.: Randomized Algorithms. Chapman & Hall/CRC, Boca Raton (2010)\n13. 13.\nNie, J.: Polynomial matrix inequality and semidefinite representation. Math. Oper. Res. 36(3), 398–415 (2011)\n14. 14.\nPan, V.Y., Chen, Z.Q.: The complexity of the matrix eigenproblem. In: Proceedings of the ACM Symposium on Theory of Computing (STOC 1999), pp. 507–516 (1999)Google Scholar\n15. 15.\nParrilo, P.A.: Semidefinite programming relaxations for semialgebraic problems. Math. Program. 96(2), 293–320 (2003)\n16. 16.\nAditya Prakash, B., Chakrabarti, D., Faloutsos, M., Valler, N., Faloutsos, C.: Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the IEEE International Conference on Data Mining (ICDM 2011), pp. 537–546 (2011)Google Scholar\n17. 17.\nRaghavan, P., Tompson, C.D.: Randomized rounding: a technique for provably good algorithms and algorithmic proofs. Combinatorica 7(4), 365–374 (1987)\n18. 18.\nRaghavendra, P.: Optimal algorithms and inapproximability results for every CSP? In: Proceedings of the ACM Symposium on Theory of Computing (STOC 2008), pp. 245–254. ACM (2008)Google Scholar\n19. 19.\nSaha, S., Adiga, A., Aditya Prakash, B., Vullikanti, A.K.S.: Approximation algorithms for reducing the spectral radius to control epidemic spread. In: Proceedings of the SIAM International Conference on Data Mining (SDM 2015), pp. 568–576 (2015)\n20. 20.\nShin, S., Gu, G.: CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: how to provide security monitoring as a service in clouds?). In: Proceedings of the IEEE International Conference on Network Protocols (ICNP 2012), pp. 1–6. IEEE (2012)Google Scholar\n21. 21.\nStevanović, D.: Resolution of AutoGraphiX conjectures relating the index and matching number of graphs. Linear Algebra Appl. 8(433), 1674–1677 (2010)\n22. 22.\nTropp, J.A., et al.: An introduction to matrix concentration inequalities. Found. Trends® Mach. Learn. 8(1–2), 1–230 (2015)\n23. 23.\nvan Handel, R.: Structured random matrices. In: Carlen, E., Madiman, M., Werner, E.M. (eds.) Convexity and Concentration. TIVMA, vol. 161, pp. 107–156. Springer, New York (2017).\n24. 24.\nVan Mieghem, P.: Graph Spectra for Complex Networks. Cambridge University Press, Cambridge (2010)\n25. 25.\nVan Mieghem, P., Omic, J., Kooij, R.: Virus spread in networks. IEEE/ACM Trans. Netw. (TON) 17(1), 1–14 (2009)\n26. 26.\nVan Mieghem, P., et al.: Decreasing the spectral radius of a graph by link removals. Phys. Rev. E 84(1), 016101 (2011)\n27. 27.\nWang, G., Ng, T.S., Shaikh, A.: Programming your network at run-time for big data applications. In: Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN 2012), pp. 103–108. ACM (2012)Google Scholar\n28. 28.\nWang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: an eigenvalue viewpoint. In: Proceedings of the International Symposium on Reliable Distributed Systems (SRDS 2003), pp. 25–34. IEEE (2003)Google Scholar\n29. 29.\nZhang, Y., Adiga, A., Vullikanti, A., Aditya Prakash, B.: Controlling propagation at group scale on networks. In: Proceedings of the International Conference on Data Mining (ICDM 2015), pp. 619–628 (2015)Google Scholar\n\n© Springer Nature Switzerland AG 2018\n\n## Authors and Affiliations\n\n• Cristina Bazgan\n• 1\n• Paul Beaujean\n• 1\n• 2\nEmail author\n• Éric Gourdin\n• 2\n1. 1.Université Paris-Dauphine, Université PSL, CNRS, LAMSADEParisFrance\n2. 2.Orange LabsChâtillonFrance" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5613042,"math_prob":0.8604298,"size":7047,"snap":"2019-13-2019-22","text_gpt3_token_len":1995,"char_repetition_ratio":0.15163992,"word_repetition_ratio":0.0416222,"special_character_ratio":0.2964382,"punctuation_ratio":0.2840678,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9794435,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-26T18:55:16Z\",\"WARC-Record-ID\":\"<urn:uuid:95301354-a4c8-4205-a9bd-2b7a09a933ad>\",\"Content-Length\":\"96099\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9cde1b66-55e6-4d43-a0f8-423c489f169e>\",\"WARC-Concurrent-To\":\"<urn:uuid:87a323dc-3098-47b8-b68d-06a15cc81e27>\",\"WARC-IP-Address\":\"151.101.248.95\",\"WARC-Target-URI\":\"https://rd.springer.com/chapter/10.1007%2F978-3-030-04651-4_8\",\"WARC-Payload-Digest\":\"sha1:R5FBEGLBTYQ5MPYFCT3PCWTO7F7HZBDY\",\"WARC-Block-Digest\":\"sha1:HJGJKH2V3ZN4ZIA7BAY3M3KXTQGREVDE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912205600.75_warc_CC-MAIN-20190326180238-20190326202238-00165.warc.gz\"}"}
https://www.britannica.com/topic/stationary-distribution
[ "# Stationary distribution\n\nprobability theory\n\n### stochastic processes\n\n•", null, "…to a distribution, called the stationary distribution, that does not depend on the starting value X(0) = x. Moreover, with probability 1, the proportion of time the process spends in any subset of its state space converges to the stationary probability of that set; and, if X(0) is given the…", null, "" ]
[ null, "data:image/svg+xml,%3Csvg xmlns='http://www.w3.org/2000/svg' viewBox='0 0 10.86111111111111 1'%3E%3C/svg%3E", null, "https://cdn.britannica.com/marketing/thistle-white.svg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9001701,"math_prob":0.9687624,"size":410,"snap":"2019-13-2019-22","text_gpt3_token_len":91,"char_repetition_ratio":0.13793103,"word_repetition_ratio":0.0,"special_character_ratio":0.20731707,"punctuation_ratio":0.118421055,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97993356,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-23T05:20:49Z\",\"WARC-Record-ID\":\"<urn:uuid:e719c6fb-ccc1-43b8-8d75-bcbe14de0734>\",\"Content-Length\":\"47808\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b04eb0b3-42e7-4079-966d-87541f27f851>\",\"WARC-Concurrent-To\":\"<urn:uuid:a1a9c140-0c8a-4229-b03d-a51b0dbb46ab>\",\"WARC-IP-Address\":\"38.69.47.80\",\"WARC-Target-URI\":\"https://www.britannica.com/topic/stationary-distribution\",\"WARC-Payload-Digest\":\"sha1:IXQCIRQOGYXIJ3N2LDWUOZ4F7MBFBLTM\",\"WARC-Block-Digest\":\"sha1:KPGFJBIU7JK6C4J2B6KX5Y2FQMTODJ4O\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202723.74_warc_CC-MAIN-20190323040640-20190323062640-00313.warc.gz\"}"}
https://dawnarc.com/2018/10/matharithmetic-formula-tutorials-collections/
[ "Calcuate distance from foot of perpendicular to line\nhttps://math.stackexchange.com/questions/33868/foot-of-perpendicular-to-line\n\nHow do you find the distance from a point to a plane?\nhttps://math.stackexchange.com/questions/88392/how-do-you-find-the-distance-from-a-point-to-a-plane\n\nHow to find the equation of a plane using three non-collinear points\nhttps://www.maplesoft.com/support/help/maple/view.aspx?path=MathApps%2FEquationofaPlane3Points\n\nFind the equation of the plane knowing that it passes through 3 points\nhttps://math.stackexchange.com/questions/1156983/find-the-equation-of-the-plane-knowing-that-it-passes-through-3-points\n\nFind plane by normal and instance point + distance between origin and plane\nhttps://math.stackexchange.com/questions/752252/find-plane-by-normal-and-instance-point-distance-between-origin-and-plane\n\n### Linear Algebra\n\n##### Fourier\n\nFourier Transform\n\n##### Mandelbrot\n\nTimes Tables, Mandelbrot and the Heart of Mathematics" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6430232,"math_prob":0.70918256,"size":1471,"snap":"2019-26-2019-30","text_gpt3_token_len":394,"char_repetition_ratio":0.14383094,"word_repetition_ratio":0.0,"special_character_ratio":0.20598233,"punctuation_ratio":0.16342412,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99458873,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-23T07:28:27Z\",\"WARC-Record-ID\":\"<urn:uuid:c2966bd7-5250-4645-94d4-e89791b6f801>\",\"Content-Length\":\"25498\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:77ddeb66-90b5-49bb-868a-7e179f0c4a5e>\",\"WARC-Concurrent-To\":\"<urn:uuid:948b0918-693e-49ce-9443-66d62422b13b>\",\"WARC-IP-Address\":\"185.199.109.153\",\"WARC-Target-URI\":\"https://dawnarc.com/2018/10/matharithmetic-formula-tutorials-collections/\",\"WARC-Payload-Digest\":\"sha1:6RUOROFZGF6DESJ6KGWIIKTDUO4XXBNG\",\"WARC-Block-Digest\":\"sha1:FB47ZU4S7D2HLOQVBJUYGO5ZKMHTY5OX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195529007.88_warc_CC-MAIN-20190723064353-20190723090353-00240.warc.gz\"}"}
https://scientiapotentiaest.blog/2019/10/14/the-uncertainty-principle/
[ "### The uncertainty principle", null, "It’s bad because the premise of the joke (the uncertainty principle) applies to quantum particles, and does not observably affect macro-sized objects (like people).\n\nThe uncertainty principle in its most simplified form is this: the position and momentum of a particle cannot be measured at the same time. So the more accurately you try and measure its momentum (think of the speed that the particle’s travelling at), the less accurately you know where the particle actually is. Or if you know exactly where it is, you will have absolutely no idea how fast it is travelling.\n\nThis weird and unusual principle arises because every quantum particle is not just a particle, and also displays characteristics of a wave and has a wave function. This means that the “particle” is spread out over a space and doesn’t necessarily have a defined location, and its location is given as a probability of finding it between two points. This means that really we have no idea where it might be between those defined points.\n\nOne way of making its position more clear is by constructing a wave function modelling many waves. This gives a far more precise description of the position, but the introduction of multiple waves gives a huge variety in the possible momentum of the particle/wave.\n\nThe limit to what we can measure is modelled by this equation:\n\nΔp*Δ≥ h/4π\n\nWhat it means is that the error in measuring the momentum (Δp = mass * velocity of particle) multiplied by the error in measuring the position (Δx), cannot be less than Planck’s constant divided by 4π (Planck’s constant is another term that frequently comes up in quantum mechanics).\n\nPreviously to Heisenberg, people had assumed that the exact position and momentum of an object could be measured at any time. This was a very reasonable conclusion, because the uncertainty principle does not apply to large and visible objects, only to the absolute tiniest of tiny. The reason for this is clear: the momentum of the object is dependent on its mass, so the error in momentum is always far higher than the theoretical limit. But on a subatomic scale, with an electron weighing only 9.1 * 10^-31 kg, the uncertainty of measurement becomes very relevant." ]
[ null, "https://scientiapotentiaest433226524.files.wordpress.com/2019/10/ba0d53c1793643ddcd50cb837564aa2a.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9134205,"math_prob":0.9524236,"size":2740,"snap":"2019-51-2020-05","text_gpt3_token_len":607,"char_repetition_ratio":0.118421055,"word_repetition_ratio":0.005249344,"special_character_ratio":0.19635037,"punctuation_ratio":0.094736844,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9721672,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-05T17:25:59Z\",\"WARC-Record-ID\":\"<urn:uuid:2c2818f9-e0e1-43bd-a697-01ab5b29956e>\",\"Content-Length\":\"121506\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0a9392c9-aaf7-4572-b72a-2e8750d81d0d>\",\"WARC-Concurrent-To\":\"<urn:uuid:f731fc64-d893-4208-b86a-043abe81c64d>\",\"WARC-IP-Address\":\"192.0.78.25\",\"WARC-Target-URI\":\"https://scientiapotentiaest.blog/2019/10/14/the-uncertainty-principle/\",\"WARC-Payload-Digest\":\"sha1:FLM6S46ZHJ27R2E6JJYDP263WDNFKZMA\",\"WARC-Block-Digest\":\"sha1:47XU53CILLOK3UCEAOCBWO7HG5OLYQTF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540481281.1_warc_CC-MAIN-20191205164243-20191205192243-00550.warc.gz\"}"}
http://equimount.com/Bhagavan%20Medical%20Biochemistry%202001/136
[ "section 6.6\nMechanisms of Enzyme Action\n105\nIndinavir\nNelfinavir\nF IG U R E 6 -1 4\nScatchard plot of ligand-receptor interaction.\nRitonavir\nStructures of HIV protease inhibitors. NHtBu denotes an amino-tertiary\nbutyl and Ph denotes a phenyl group.\nThe total number of receptor binding sites, [TR], is equal to\nthe sum of the unbound receptor sites, [R], and the bound\nreceptor sites, [LR], Therefore,\n[R] = [TR] - [LR]\n(\n6\n.\n1 0\n)\nSubstituting for [R] in Equation (\n6\n.\n8\n) yields\nY\n1\nLRJ\na\n[L] ([TR] —\n[LR])\n(\n6\n.\n1 1\n)\nwhich on rearrangement gives\n[LR]\ni— ± = tfa([TR]-[LR])\n[.LJ\n(\n6\n.\n1 2\n)\nwhere\n[LR]\nconcentration of bound ligand\n[L]\nconcentration of unbound ligand\nA plot of [LR]/[L] versus [LR] yields a straight line and\nis known as a\nScatchard plot\n(Figure 6-14). The slope\nof the line gives the value\n(—Ka),\nwhile the intersection\nof the line with the abscissa yields the value for the to-\ntal number of sites [TR], Comparing this relationship to\nthe Michaelis-Menten analysis of enzyme kinetics shows\nthat 1\n/ Ka\n(where 50% of the sites are occupied) is equiva-\nlent to\nKm\nand the maximum concentration (or number) of\nbound ligand sites is equivalent to Vmax • The Scatchard plot\nis similar to the Eadie-Hofstee plot (Figure 6-5), but the\naxes are reversed. These principles have been applied in\nthe assay of ligands in human biological fluids by the use\nof either specific receptor proteins (radioreceptor assay)\nor specific binding proteins, namely, antibodies (radioim-\nmunoassay (RIA)). In these assays, the unlabeled ligand\n(the quantity of which is to be determined) competes with a\npredetermined amount of added radioactive ligand to bind\na limited amount of specific receptor protein. This step\nis followed by separation of protein-bound ligand from\nthe unbound (free) ligand and measurement of radioac-\ntivity of each fraction. Separation of the protein-bound\nligand from the free ligand is accomplished by protein\nprecipitation, adsorption of the free form, chromatogra-\nphy, or electrophoresis. Under standard conditions of time\nand temperature, the amount of radioactivity found in the\nprotein-bound ligand fraction is inversely proportional to\nthe concentration of unlabeled ligand and the amount of\nradioactivity found in the unbound (free) ligand fraction is\ndirectly proportional to unlabeled ligand concentrations.\nThis procedure has been widely used for the assay of hor-\nmones, vitamins, drugs, and other compounds. Since the\nconcentrations of hormones in body fluids are very low\n(10\n- 8\nto 10\n12\nM), assay sensitivity is increased by lig-\nands with high specific radioactivity.\n6.6 Mechanisms of Enzyme Action\nThe mechanism of a reaction catalyzed by an enzyme\nis a detailed description of the chemical interactions oc-\ncurring among the substrates, enzymes, and cofactors." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83975124,"math_prob":0.86817837,"size":2805,"snap":"2019-13-2019-22","text_gpt3_token_len":768,"char_repetition_ratio":0.12602642,"word_repetition_ratio":0.01735358,"special_character_ratio":0.23172906,"punctuation_ratio":0.08565737,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9510487,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-19T03:28:54Z\",\"WARC-Record-ID\":\"<urn:uuid:b63e45df-b99a-48a7-a900-3cfe00944d31>\",\"Content-Length\":\"28214\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1ed04c30-4abb-4ae7-a677-639a7b9d3f9c>\",\"WARC-Concurrent-To\":\"<urn:uuid:72ce2b3f-bafc-4011-b18e-0933b0e59b0d>\",\"WARC-IP-Address\":\"104.24.127.112\",\"WARC-Target-URI\":\"http://equimount.com/Bhagavan%20Medical%20Biochemistry%202001/136\",\"WARC-Payload-Digest\":\"sha1:GKEMO5AGP46CJ46H7KMBLDDNKHEXQJRG\",\"WARC-Block-Digest\":\"sha1:KIQN5ONDLN7PQSLQXP2JZ2GN3OQJUTH6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912201885.28_warc_CC-MAIN-20190319032352-20190319054352-00056.warc.gz\"}"}
https://tolstoy.newcastle.edu.au/R/help/05/12/17909.html
[ "# Re: [R] Wilcoxon Mann-Whitney Rank Sum Test in R\n\nFrom: P Ehlers <ehlers_at_math.ucalgary.ca>\nDate: Wed 21 Dec 2005 - 10:20:52 EST\n\nPeter Dalgaard wrote:\n> Bob Green <[email protected]> writes:\n>\n>\n\n```>>An earlier post had posed the question: \"Does anybody know what is relation\n>>between 'T' value calculated by 'wilcox_test' function (coin package) and\n>>more common 'W' value?\"\n>>\n>>I found the question interesting and ran the commands in R and SPSS. The W\n>>reported by R did not seem to correspond to either Mann-Whitney U,\n>>Wilcoxon W or the Z which I have more commonly used. Correction for ties\n>>may have affected my results.\n>>\n>>Can anyone else explain what the reported W is and the relation to the\n>>reported T?\n```\n\n>\n>\n> Well, it's open source... You could just go check.\n>\n> W is the sum of the ranks in the first group, minus the minimum value\n> it can attain, namely sum(1:n1) == n1*(n1+1)/2. In the tied cases, the\n> actual minimum could be larger.\n>\n> The T would seem to be asymptotically normal\n>\n>\n```>>wilcox_test(pd ~ age, data = water_transfer,distribution=\"asymp\")\n```\n\n>\n>\n> Asymptotic Wilcoxon Mann-Whitney Rank Sum Test\n>\n> data: pd by groups 12-26 Weeks, At term\n> T = -1.2247, p-value = 0.2207\n> alternative hypothesis: true mu is not equal to 0\n>\n>\n```>>pnorm(-1.2247)*2\n```\n\n>\n> 0.2206883\n>\n> so a good guess at its definition is that it is obtained from W or one\n> of the others by subtracting the mean and dividing with the SD.\n>\n\nPeter Ehlers\nUniversity of Calgary\n\[email protected] mailing list" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93313366,"math_prob":0.58329105,"size":873,"snap":"2020-10-2020-16","text_gpt3_token_len":236,"char_repetition_ratio":0.088607594,"word_repetition_ratio":0.0,"special_character_ratio":0.28407788,"punctuation_ratio":0.15517241,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9638913,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-04T19:09:24Z\",\"WARC-Record-ID\":\"<urn:uuid:130d041c-e2e8-4e03-b6ab-1fa219925af5>\",\"Content-Length\":\"9254\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5ae51180-2dee-4856-85dc-df5055ba8a81>\",\"WARC-Concurrent-To\":\"<urn:uuid:e4711165-ca2d-42a9-a332-dc179b7a3cd5>\",\"WARC-IP-Address\":\"13.249.44.2\",\"WARC-Target-URI\":\"https://tolstoy.newcastle.edu.au/R/help/05/12/17909.html\",\"WARC-Payload-Digest\":\"sha1:DZXTMSIOSSXXRE2Y433SAGRT75VHLMMT\",\"WARC-Block-Digest\":\"sha1:ZLWK545XITP7OCSU2OI6JO4KFZLHOXVI\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370524604.46_warc_CC-MAIN-20200404165658-20200404195658-00535.warc.gz\"}"}
https://community.cesium.com/t/how-to-add-x-meter-north-and-east/11326/2
[ "# How to add x meter north and east\n\nHi,\n\nI have a simple question,\nI have a Cartesian 3 point at X, Y, Z coordinate.\nI would like to create a new point at 100 meter on north, East from that starting point.\n\nI was looking at Cartesian3.add, but this depend on the point on earth, but I don’t understand exactly how to make it every where on earth.\n\nthanks\n\nI think you might find the discussion here helpful: Finding a point on the surface at a given distance. There’s an example there where you start with a point on the surface and a direction, and you get a new point X meters away in that direction.\n\n1 Like\n\nTHank you Omar, but I already made a function to create a point in a direction, the problem is I don’t know how to get the north/south/east/west direction at a given point on earth to compute the direction.\n\nbut this exemple might have some cool info so I will study it, thanks\n\nI found this" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.910745,"math_prob":0.80304295,"size":276,"snap":"2022-27-2022-33","text_gpt3_token_len":64,"char_repetition_ratio":0.11764706,"word_repetition_ratio":0.0,"special_character_ratio":0.21376811,"punctuation_ratio":0.06666667,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.969005,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-30T16:11:18Z\",\"WARC-Record-ID\":\"<urn:uuid:ea6fdc62-9bbe-4d6e-8352-b20dd8ae53ef>\",\"Content-Length\":\"24330\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d15856ee-99ab-48e3-9dff-bf50eca0ec3b>\",\"WARC-Concurrent-To\":\"<urn:uuid:22f1601c-edc6-4926-aad4-bc30316a0875>\",\"WARC-IP-Address\":\"64.71.144.209\",\"WARC-Target-URI\":\"https://community.cesium.com/t/how-to-add-x-meter-north-and-east/11326/2\",\"WARC-Payload-Digest\":\"sha1:QUPKP7D4YAE3HZ3JL4JCJ6KWFH4ECZCS\",\"WARC-Block-Digest\":\"sha1:FLLKUP47YRV3JGLU4SNSHN64PBB3JCQ6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103850139.45_warc_CC-MAIN-20220630153307-20220630183307-00398.warc.gz\"}"}
https://cstheory.stackexchange.com/questions/27715/characterizing-the-set-of-problems-solvable-via-network-flow/27722
[ "# Characterizing the set of problems solvable via network flow\n\nWhat are some ways to prove that a certain problem cannot be solved using Network Flow (NF)?\n\nOne way is to prove the problem is NP-hard. But NF has substantial structure -- is there some symmetry or invariant that all solutions must satisfy in order to be solvable with NF?\n\nI'm interested in any necessary or sufficient conditions that a problem should satisfy in order to be solvable using NF.\n\n• It's problematic to define \"solvability by NF\".\n– R B\nDec 5 '14 at 7:03\n• It depends strongly on what kind of preprocessing (reductions) you allow. If you allowed preprocessing to take arbitrarily long, then any problem could be solved using a flow, simply by solving the problem and then outputting a trivial flow that has the desired answer. Under logspace reductions, maximum flow is a $P$-complete, so any problem in $P$ can be solved \"efficiently\" using network flow. Dec 5 '14 at 16:40\n• @TomvanderZanden I think that could be an answer. Dec 5 '14 at 17:48\n\nUnder log-space reductions, network flow is $P$-complete so any problem in $P$ can be solved \"efficiently\" using a network flow." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92759216,"math_prob":0.965707,"size":394,"snap":"2021-43-2021-49","text_gpt3_token_len":79,"char_repetition_ratio":0.12051282,"word_repetition_ratio":0.060606062,"special_character_ratio":0.20050761,"punctuation_ratio":0.054054055,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99015695,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-17T04:18:48Z\",\"WARC-Record-ID\":\"<urn:uuid:ea1a318e-27c9-43fc-8562-b292d20ffafe>\",\"Content-Length\":\"165252\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7a02e74f-514d-476c-82f6-24d00b628344>\",\"WARC-Concurrent-To\":\"<urn:uuid:5f3cc558-2576-47d7-8b24-90ff9254c9cd>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://cstheory.stackexchange.com/questions/27715/characterizing-the-set-of-problems-solvable-via-network-flow/27722\",\"WARC-Payload-Digest\":\"sha1:M6VPBTEWGEZJ434ZMIDBQ5AVL7BUJJFT\",\"WARC-Block-Digest\":\"sha1:XHHZPNPMRL5K26XLY36S32DVS6AFXI2J\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585120.89_warc_CC-MAIN-20211017021554-20211017051554-00674.warc.gz\"}"}
https://stats.stackexchange.com/questions/212695/is-the-matrix-coeff-from-matlabs-pca-the-same-as-the-left-singular-vectors-of-t
[ "# Is the matrix coeff from MATLAB's pca the same as the left singular vectors of the centered data?\n\nConsider the SVD of a centered data matrix:\n\n$$X_{centered} = U \\Sigma V^T$$\n\nwhere a column of $X_{centered}$ is:\n\n$$X_{centered} = x^{(i)} - \\frac{1}{N} \\sum^N_{n=1} x^{(n)}$$\n\nis the matrix $U$ the same as the matrix coeff that the function pca uses?\n\nI could have sworn that they were the same until I wrote the following code:\n\nclear;clc;\n%% data\nD = 3\nN = 5\nX = rand(D, N);\n%X = magic(N); %% <------ uncomment this line for disaster\n%% process data\nx_mean = mean(X, 2); %% computes the mean of the data x_mean = sum(x^(i))\nX_centered = X - repmat(x_mean, [1,N]);\n%% PCA\n[coeff, score, latent, ~, ~, mu] = pca(X'); % coeff = U\n[U, S, V] = svd(X_centered); % coeff = U\n%% Reconstruct data\n% if U = coeff then the following should be an identity I (since U is orthonormal)\nU * U'\ncoeff * coeff'\n% if U = coeff then they should be able to perfectly reconstruct the data\nX_tilde_U = U * U'*X\nX_tilde_coeff = coeff*coeff'*X\n\n\nbut then if one uncomments X = magic(N); and uses magic as the data matrix instead of random vectors, then we get different results from coeff and U. Meaning that either:\n\n1. They are not the same (i.e. either I have a misunderstanding that the left singular vectors of the centered data is not the principal components)\n\nOR\n\n1. the matrix magic has some special properties that makes the pca in matlab be broken.\n• Charlie, here is a hint: with X=magic() you have $N$ points in $N$ dimensions. This can only give you 4 PCs and that's what you get with pca(). But svd() returns 5 axes, 5th being arbitrary. Unless you use svd() with 'econ' parameter. (CC to @usεr11852) – amoeba says Reinstate Monica May 15 '16 at 19:12\n• @amoeba, I think you want to say using svds with k smaller than $N$. For a square matrix, the econ option won't change anything. Anyway to put this question to sleep: CharlieParker, check your V, coeff are the right singular vectors. – usεr11852 says Reinstate Monic May 15 '16 at 19:34\n• @usεr11852: You are quite right, econ won't change anything in this case, I withdraw the last sentence of my previous comment. Thanks! But you are wrong about right singular vectors: again, X here is DxN, so PCA eigenvectors are left singular vectors. Specifically, coeff is 4 first columns of U. – amoeba says Reinstate Monica May 15 '16 at 19:36\n• @amoeba... Bloody arbitrary transpositions, of course you are right. Servers me well not taking the time to read the question fully. Anyway, CP should know what is going on by now based on the comments. – usεr11852 says Reinstate Monic May 15 '16 at 19:39\n• @Charlie The rank of any matrix that has $D\\ge N$ decreases by one when it is centered. This has nothing to do with your matrix being \"magic\" :-) – amoeba says Reinstate Monica May 15 '16 at 20:40\n\nJust to close this: What takes place is that the fifth axis is arbitrary given the dimensions of the sample ($5 \\times 5$) generated by magic after that sample is centred (ie. the rank(X_centered) is 4). This is not due to the magic row-/col-sum property of magic squares but rather to their square nature. pca is intelligent enough to detect this rank-deficiency so it just returns four axes. If one replaces the line: [U, S, V] = svd(X_centered); with [U, S, V] = svds(X_centered,4); the same results will be obtained by both procedures.\n• I'm still a bit confused, it seems that the issue is that the rank of magic decreases by 1 when its centered (which intuitively makes sense since they all add to the same number) but amoeba seems to imply that its an issue that the dimension of the data is $D \\geq N$ at least the number of data set points. Which one is it? – Charlie Parker May 15 '16 at 20:38\n• @Charlie, It's the same thing. If your data matrix has $D\\ge N$ then its rank will decrease by 1 after centering. If, on the other hand, $D<N$, then the rank will stay the same (equal to $D$). Centering effectively eliminates one data point. Whether it decreases the rank or not, depends on whether rank is limited by the number of dimensions or the number of data points. – amoeba says Reinstate Monica May 15 '16 at 20:42" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8842488,"math_prob":0.9918952,"size":2196,"snap":"2019-51-2020-05","text_gpt3_token_len":642,"char_repetition_ratio":0.1040146,"word_repetition_ratio":0.040920716,"special_character_ratio":0.30555555,"punctuation_ratio":0.125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9985008,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-23T04:21:22Z\",\"WARC-Record-ID\":\"<urn:uuid:3a227b3e-f9c2-454e-b28c-65a87892b844>\",\"Content-Length\":\"150412\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:924c0f75-771d-472a-ad18-4d60c52c91e6>\",\"WARC-Concurrent-To\":\"<urn:uuid:82c08a86-9f68-4175-8c57-b2a0bf5d6401>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://stats.stackexchange.com/questions/212695/is-the-matrix-coeff-from-matlabs-pca-the-same-as-the-left-singular-vectors-of-t\",\"WARC-Payload-Digest\":\"sha1:NTAA6KG4QVJD3VKSBW7GIT2RN3GQJYLH\",\"WARC-Block-Digest\":\"sha1:HLOG4QCRE3SGT2DBICTUM7W3WEDDV26H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250608295.52_warc_CC-MAIN-20200123041345-20200123070345-00177.warc.gz\"}"}
http://ugrad.stat.ubc.ca/R/library/mgcv/html/anova.gam.html
[ "anova.gam {mgcv} R Documentation\n\n## Hypothesis tests related to GAM fits\n\n### Description\n\nPerforms hypothesis tests relating to one or more fitted `gam` objects. For a single fitted `gam` object, Wald tests of the significance of each parametric and smooth term are performed. Otherwise the fitted models are compared using an analysis of deviance table. The tests are usually approximate, unless the models are un-penalized.\n\n### Usage\n\n```anova.gam(object, ..., dispersion = NULL, test = NULL)\nprint.anova.gam(x, digits = max(3, getOption(\"digits\") - 3),...)\n```\n\n### Arguments\n\n `object,...` fitted model objects of class `gam` as produced by `gam()`. `x` an `anova.gam` object produced by a single model call to `anova.gam()`. `dispersion` a value for the dispersion parameter: not normally used. `test` what sort of test to perform for a multi-model call. One of `\"Chisq\"`, `\"F\"` or `\"Cp\"`. `digits` number of digits to use when printing output.\n\n### Details\n\nIf more than one fitted model is provided than `anova.glm` is used. If only one model is provided then the significance of each model term is assessed using Wald tests: see `summary.gam` for details of the actual computations. In the latter case `print.anova.gam` is used as the printing method.\n\nP-values are usually reliable if the smoothing parameters are known, or the model is unpenalized. If smoothing parameters have been estimated then the p-values are typically somewhat too low. i.e. terms that appear `not significant' really are not, while terms that are significant, may in fact be non-significant if the p-value is close to whatever significance level you are choosing to operate at. This occurs because the uncertainty associated with the smoothing parameters is neglected in the calculations of the distributions under the null, which tends to lead to underdispersion in these distributions, and in turn to p-value estimates that are too low. (In simulations where the null is correct, I have seen p-values that are as low as half of what they should be.)\n\nIf it is important to have p-values that are as accurate as possible, then, at least in the single model case, it is probably advisable to perform tests using unpenalized smooths (i.e. `s(...,fx=TRUE)`) with the basis dimension, `k`, left at what would have been used with penalization. Such tests are not as powerful, of course, but the p-values are more accurate. Whether or not extra accuracy is required will usually depend on whether or not hypothesis testing is a key objective of the analysis.\n\n### Value\n\nIn the multi-model case `anova.gam` produces output identical to `anova.glm`, which it in fact uses.\nIn the single model case an object of class `anova.gam` is produced, which is in fact an object returned from `summary.gam`.\n`print.anova.gam` simply produces tabulated output.\n\n### WARNING\n\nP-values may be under-estimates, as a result of ignoring smoothing parameter uncertainty.\n\n### Author(s)\n\nSimon N. Wood [email protected] with substantial improvements by Henric Nilsson.\n\n`gam`, `predict.gam`, `gam.check`, `summary.gam`\n\n### Examples\n\n```library(mgcv)\nset.seed(0)\nn<-200\nsig<-2\nx0 <- rep(1:4,50)\nx1 <- runif(n, 0, 1)\nx2 <- runif(n, 0, 1)\nx3 <- runif(n, 0, 1)\ny <- 2 * x0\ny <- y + exp(2 * x1)\ny <- y + 0.2 * x2^11 * (10 * (1 - x2))^6 + 10 * (10 * x2)^3 * (1 - x2)^10\ne <- rnorm(n, 0, sig)\ny <- y + e\nx0<-as.factor(x0)\nb<-gam(y~x0+s(x1)+s(x2)+s(x3))\nanova(b)\nb1<-gam(y~x0+s(x1)+s(x2))\nanova(b,b1,test=\"F\")\n```\n\n[Package mgcv version 1.3-12 Index]" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8189588,"math_prob":0.95576096,"size":3273,"snap":"2019-13-2019-22","text_gpt3_token_len":885,"char_repetition_ratio":0.1085959,"word_repetition_ratio":0.0,"special_character_ratio":0.26672778,"punctuation_ratio":0.15948276,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9943404,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-25T02:09:32Z\",\"WARC-Record-ID\":\"<urn:uuid:9a4e7a35-2226-4f5b-9476-a1709bd74766>\",\"Content-Length\":\"5285\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d87d85a9-0306-4608-ac86-eeee4b5bde3e>\",\"WARC-Concurrent-To\":\"<urn:uuid:5bcdc101-e4f0-4203-adc5-db198b02bb01>\",\"WARC-IP-Address\":\"142.103.132.7\",\"WARC-Target-URI\":\"http://ugrad.stat.ubc.ca/R/library/mgcv/html/anova.gam.html\",\"WARC-Payload-Digest\":\"sha1:UF7VIR4GNHVJVKAFPGPMXBKMSPKCPNO4\",\"WARC-Block-Digest\":\"sha1:AAPTDWDVWFT67O6BCNE25PQFZU57EV2O\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912203547.62_warc_CC-MAIN-20190325010547-20190325032547-00037.warc.gz\"}"}
https://anyessayhelp.com/what-is-the-x-intercept-for-the-equation-5x-2y-4-mathematics-assignment-help/
[ "# What is the x-intercept for the equation 5x-2y=-4 Mathematics Assignment Help\n\nWhat is the x-intercept for the equation 5x-2y=-4 Mathematics Assignment Help. What is the x-intercept for the equation 5x-2y=-4 Mathematics Assignment Help.\n\nWhat is the x-intercept for the equation 5x-2y=-4\n\n (-4/5, 0) (2, 0) (4/5, 0) (–2, 0)\n\n 10 There are 52 bla\nThere are 52 blades of grass in 2in^2 of lawn. There are 580 blades of grass in 8in^2 of the same lawn. Which equation models the y blades of grass found in x in^2of lawn?\n\na y=88x+124\nb y=-88x-124\nc y=-88x+124\nd y=88x-124\n\nWhat is the value of the function f(x)=3(4-x)when x = 7?\n\n a 9 b –21 c –9 d 33\n\nWhat is the x-intercept for the equation 5x-2y=-4 Mathematics Assignment Help[supanova_question]\n\n## Which sentence would make the best first sentence to a personal narrative? Writing Assignment Help\n\nI had to give a speech in front of the whole school and was very nervous.\n\n[supanova_question]\n\n## Which of the following is the correct equation for the trend line in the scatter Mathematics Assignment Help\n\nWhich of the following is the correct equation for the trend line in the scatter plot?\n\na. y = 2/5x – 2\n\nb. y = –x + 5\n\nc. y = 5x – 1\n\nd. y = 5x + 5\n\n Identify the function in which y varies directly with x.\n\na. x = 5y\n\nb. x = 5y – 5\n\nc. x = 5y +5\n\nd. y = 5x\n\nWhich equation is represented by the graph?\n\na. y = |x – 2| – 1\n\nb. y =  |x – 2| +1\n\nc. y = |x + 2| +1\n\nd. y = x + 2| – 1\n\n[supanova_question]\n\n## Which ordered pair is the vertex of y = |x| +4 ? Mathematics Assignment Help\n\n Which ordered pair is the vertex of y = |x| +4 ?a. (0, 4)b. (0, –4)c. (–4, 0)d. (4, 0) The cost of producing 4 metal units is \\$204.80. The cost of producing 8 units is \\$209.60. What will it cost to produce 14 units?a. \\$214.40b. \\$219.20c. \\$216.80d. \\$218.00 What is the value of the function f(x) = 2x – 5 when x = 22?a. 105b. 49c. 17d. 39 Which equation represents a horizontal line?a. y = 2b. y = x + 1c. x = y + 2 d. x = 2\n\n[supanova_question]\n\n## Graph the inequality y ≤ |x+2|. Which point is NOT part of the solution? Mathematics Assignment Help\n\nGraph the inequality y ≤ |x+2|. Which point is NOT part of the solution?\n\na. (–1, 2)\n\nb. (0, 0)\n\nc. (1, 2)\n\nd. (–1, –2)\n\nWhich ordered pair could you remove from the relation {(–1, 0), (1, 3), (2, 2), (2, 3), (3, 1)} so that it becomes a function?\n\na. (1, 3) or (3, 1)\n\nb. (1, 3) or (2, 3)\n\nc. (2, 2) or (2, 3)\n\nd. (2, 3) or (3, 1)\n\nWhat is the slope for the equation  –  1/2x – y = 3/4?\n\na.1/2\n\nb.3/4\n\nc.-  3/4\n\nd.-  1/2\n\nGraph the inequality y ≥ 2 |x – 1| – 2.Which point is part of the solution?\n\na.(3,0)\n\nb.(0, –3)\n\nc.(–1,0)\n\nd.(1, 0)\n\n[supanova_question]\n\n[supanova_question]\n\n## how much wrapping paper is needed to cover the larger box? Mathematics Assignment Help\n\nA gift shop uses two sizes of boxes for presents. These boxes have exactly the same shape. The smaller box is\n\nlong, and the larger box is\n\nlong. If\n\nof wrapping paper is needed to cover the smaller box, how much wrapping paper is needed to cover the larger box?\n\nhow much wrapping paper is needed to cover the larger box? Mathematics Assignment Help[supanova_question]\n\n2NO2  2NO + O2obeys the rate law:\n\nrate = 1.4 x 10-2[NO2]2 at 500 K .\nWhat would be the rate constant at 333 K if the activation energy is 80. kJ/mol?\nThis is a second order reaction, giving k the units of M-1S-1 This will not change with the change in temperature\n\n[supanova_question]\n\n A(g) + B(g) “> C(g)\n\nThe rate law for the above reaction is:\n\n-d[A]/dt = k[A][B]\n\nThe rate constant is 2.84×10-3 L mol-1 s-1 at 335.0°C and 3.48×10-2 L mol-1 s-1 at 528.0°C.\n\nUse the Arrhenius equation\n\nk = Ae-Ea/RT\n\nto:\n\nCalculate Ea for this reaction.\n\n[supanova_question]\n\nSubstance A undergoes a reaction which follows a second order rate law:\n\n [A]t = 1 1/[A]0 + kt\n\nwith a rate constant of 3.56×10-1 M-1hr-1. The initial concentration of the reactant A is 0.24 M. Calculate the concentration of A after 25.0 hr.\n\n[supanova_question]\n\n## economics help confused Economics Assignment Help\n\n<span style='font-family:\"Arial\",\"sans-serif\";\nmso-fareast-font-family:Arial’>1.\nTwo college students went to\nGuadalajara, Mexico, on their spring breaks. One took the vacation in 2002,\nwhile the other went in 2006. Each student had \\$500 to spend. In 2002, the\nexchange rate of MXN/USD (Mexican pesos to U.S. dollars) was 9. In 2006, the\nexchange rate was 11. A hotel room in Guadalajara cost 200 pesos per night in\n2002 and 220 pesos in 2006. If each student spent five nights in a hotel, which\nstudent had more pesos left over? Exactly how many did that student have?\n\n[supanova_question]\n\nhttps://anyessayhelp.com/\n\nWhich equation is represented by the graph?\n\na. y = |x – 2| – 1\n\nb. y =  |x – 2| +1\n\nc. y = |x + 2| +1\n\nd. y = x + 2| – 1\n\n[supanova_question]" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87626046,"math_prob":0.995001,"size":4329,"snap":"2022-40-2023-06","text_gpt3_token_len":1408,"char_repetition_ratio":0.13710983,"word_repetition_ratio":0.23173803,"special_character_ratio":0.33633634,"punctuation_ratio":0.15071283,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9990964,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-28T06:01:23Z\",\"WARC-Record-ID\":\"<urn:uuid:41e15283-2dee-4498-925f-e1b41d2feca4>\",\"Content-Length\":\"117586\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b4a6454b-c57c-4064-8262-cde8f2e98139>\",\"WARC-Concurrent-To\":\"<urn:uuid:d2df9199-e41b-450d-874c-4c2929f0456d>\",\"WARC-IP-Address\":\"162.0.215.179\",\"WARC-Target-URI\":\"https://anyessayhelp.com/what-is-the-x-intercept-for-the-equation-5x-2y-4-mathematics-assignment-help/\",\"WARC-Payload-Digest\":\"sha1:XCOUVOGMVBRHRW45XOYMZCAWXKG5CBHW\",\"WARC-Block-Digest\":\"sha1:QWDOOY4TPFQOBALGFEHYC7N27S52IKDD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335124.77_warc_CC-MAIN-20220928051515-20220928081515-00203.warc.gz\"}"}
https://learn.careers360.com/ncert/question-without-actually-calculating-the-cubes-find-the-value-of-the-following-ii-28-to-the-power-3-plus-minus-15-to-the-power-3-plus-minus-13-to-the-power-3/
[ "# 14.(ii) Without actually calculating the cubes, find the value of the following:       (ii)\n\nR Riya\n\nGiven is\n\nWe know that\n\nIf      then ,\n\nHere,\n\nTherefore,\n\nTherefore, value of    is\n\nExams\nArticles\nQuestions" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.703573,"math_prob":0.84676266,"size":255,"snap":"2020-10-2020-16","text_gpt3_token_len":64,"char_repetition_ratio":0.18326694,"word_repetition_ratio":0.4878049,"special_character_ratio":0.23921569,"punctuation_ratio":0.2,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9983774,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-06T03:21:42Z\",\"WARC-Record-ID\":\"<urn:uuid:4a6a7e7f-7335-4e6a-942a-ad6738446977>\",\"Content-Length\":\"761879\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:881c3739-daf8-47e7-8eeb-fc0b34594920>\",\"WARC-Concurrent-To\":\"<urn:uuid:5ac99878-968f-4eea-9605-c00cfa4e9a5d>\",\"WARC-IP-Address\":\"13.127.75.213\",\"WARC-Target-URI\":\"https://learn.careers360.com/ncert/question-without-actually-calculating-the-cubes-find-the-value-of-the-following-ii-28-to-the-power-3-plus-minus-15-to-the-power-3-plus-minus-13-to-the-power-3/\",\"WARC-Payload-Digest\":\"sha1:IBE6752SEJKDAFHEZK6V6NUWZD7GAA7X\",\"WARC-Block-Digest\":\"sha1:BFKOYRCKGCIU3QMB7HBXOBLW5VUI33DJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371612531.68_warc_CC-MAIN-20200406004220-20200406034720-00034.warc.gz\"}"}
https://www.researchgate.net/publication/265401319_Some_quotients_on_a_Bck-algebra_generated_by_a_fuzzy_set
[ "ArticlePDF Available\n\n# Some quotients on a Bck-algebra generated by a fuzzy set\n\nAuthors:\n\n## Abstract\n\nFirst we show that the cosets of a fuzzy idea µ in a BCK-algebra X form another BCK-algebra X µ (called the fuzzy quotient BCK-algebra of X by µ). Also we show that X µ is a fuzzy partition of X, and prove several some isomorphism theorems. Moreover we prove that if the associated fuzzy similarity relation of a fuzzy partition P of a commutative BCK-algebra is compatible, then P is a fuzzy quotient BCK-algebra. Finally we define the notion of a coset of a fuzzy ideal and an element of a BCK-algebra and prove related theorems.\nIranian Journal of Fuzzy Systems Vol. 1, No. 2, (2004) pp. 69-84 69\nSOME QUOTIENTS ON A BCK-ALGEBRA GENERATED BY A\nFUZZY SET\nAbstract. First we show that the cosets of a fuzzy idea µin a BCK-algebra\nXform another BCK-algebra X\nµ(called the fuzzy quotient BCK-algebra of\nXby µ). Also we show that X\nµis a fuzzy partition of X, and prove several\nsome isomorphism theorems. Moreover we prove that if the associated fuzzy\nsimilarity relation of a fuzzy partition Pof a commutative BCK-algebra is\ncompatible, then Pis a fuzzy quotient BCK-algebra. Finally we define the\nnotion of a coset of a fuzzy ideal and an element of a BCK-algebra and prove\nrelated theorems.\n1. Introduction\nIn 1966, the notion of a BCK-algebra was introduced by Y. Imai and K. Iseki\n. Zadeh in 1965 introduced the notion of fuzzy subset of a nonempty set A\nas a function from Ato [0,1]. Ougen Xi extended these ideas to BCK-algebra .\nIn this paper the notions of fuzzy quotient BCK-algebra induced by fuzzy ideals,\nand the concept of a quotient algebra of a BCK-algebra, generated by a fuzzy ideal\nand an element are defined and then related theorems are proved.\n2. Preliminaries\nDefinition 2.1. [3, 6] (a) A BCK-algebra is a nonempty set Xwith a binary\noperation ”*” and a constant 0 satisfying the following axioms:\n(i) ((xy)(xz)) (zy) = 0\n(ii) (x(xy)) y= 0\n(iii)xx= 0\n(iv)xy= 0 and yx= 0 imply that x=y\n(v) 0 x= 0 ,forall x, y , z X·\n(b) A nonempty set Aof a BCK-algebra is said to be an ideal of Xif the following\nconditions hold:\n(i) 0 A\n(ii)xX , y xAimply that yA , forall yX\n(c) A BCK-algebra Xis said to be commutative if x(xy) = y(yx), for all\nx, y X.x(xy) is denoted by xy\nReceived: June 2003; Accepted: November 2003\nKey words and Phrases: Fuzzy similarity relations, Fuzzy partitions, Fuzzy quotient, Fuzzy\nideal, cosets, quotient algebra.\nArchive of SID\nwww.SID.ir\n70 A. Hasankhani and H. Saadat\nLemma 2.2. Let Xbe a BCK-algebra. Then,\n(i)x0 = x , xX\n(ii) [(y1x)(y2x)] (y1y2) = 0 ,x, y1, y2X\n(iii) (xy)z= (xz)y , x, y, z X\n(iv) (xy)x= 0 x, y X\n(v) (xy)x= (xy)y , x, y X\nDefinition 2.3. [9, 13] (i) For r[0,1] fuzzy point xris defined to be fuzzy subset\nof Xsuch that\nxr(y) = rif y=x\n0 if y6=x\n(ii) If µ,ηare two fuzzy subsets of X. Then\nµηµ(x)η(x),xX\nDefinition 2.4. A fuzzy sunset µof a BCK-algebra Xis a fuzzy ideal if it\nsatisfies\n(i)µ(0) = 1 ,xX\n(ii)µ(x)min{µ(xy), µ(y)},x, y X\nLemma 2.5. Let Xbe a BCK-algebra and µa fuzzy ideal of X. Then\n(i)µ(xy)min{µ(xz), µ(y)(zy)},x, y, z X\n(ii)if xy= 0 then µ(x)µ(y),x, y X·\nDefinition 2.6. Let µbe a fuzzy subset of Xand α[0,1]. Then by a level subset\nµαof µwe mean the set {xX:µ(x)α}.\nDefinition 2.7. Let Xand Ybe two sets, and fa function of Xinto Y. Let µ\nand ηbe fuzzy subsets of Xand Y, respectively. Then f(µ) the image of µunder\nf, is a fuzzy subset of Y:\nf(µ)(y) = (sup\nf(x)=y\nµ(x) if f1(y)6= Φ\n0 if f1(y) = Φ ,\nfor all yY,f1(η) the pre-image of ηunder f, is a fuzzy subset of Xsuch that\nf1(η)(x) = η(f(x)) ,xX·\nLemma 2.8. (i)Let µbe a fuzzy ideal of BCK-algebra X. For all α[0,1],\nif µα6= Φ, then µαis an ideal of X.\n(ii)Let f:XX0be an epimorphism of BCK-algebra and µ0a fuzzy ideal of X0.\nThen f1(µ0)is a fuzzy ideal of X.\nDefinition 2.9. Let Xbe a nonempty set and Ra fuzzy subset of X×X.\nThen Ris called a fuzzy similarity relation on Xif\n(i)R(x, x) = 1 ,xX\n(ii)R(x, y) = R(y, x)\n(iii)R(x, z)min{R(x, y), R(y, z)} ·\nArchive of SID\nwww.SID.ir\nSome Quotients on a BCK-algebra Generated by a Fuzzy set 71\nDefinition 2.10. [8, 10, 12] A fuzzy partition of a set Xis a subset Pof [0,1]X\nwhose members satisfy the following conditions:\n(i) Every NPis normalized; i.e.N(x) = 1, for at least one NX;\n(ii) For each xX, there is exactly one NPwith N(x) = 1;\n(iii) If M, N Pand, x, y Xare such that M(x) = N(y) = 1, Then\nM(y) = N(x) = sup{min{M(z), N (z)}:zX} ·\nGiven a fuzzy partition Pof Xand element xX, we denote the unique element\nof Pwith value 1 at xby [x]p. It is called the fuzzy similarity class of x.\nLemma 2.11. [10, 12] A canonical one-to-one correspondence between fuzzy par-\ntition and fuzzy similarity relations is defined by sending a fuzzy partition Pof X\nto its fuzzy similarity relation RP[0,1]X×X, where for all x, y X, we have\nRP(x, y) = [x]P(y).\nThe inverse correspondence is defined by sending a fuzzy similarity relation R\non Xto its fuzzy partition PR[0,1]Xgiven by PR={Rhxi:xX}, where\nRhxiis the fuzzy subset of Xdefined for all yXby Rhxi(y) = R(x, y).\nLemma 2.12. Let Rbe a fuzzy similarity relation on X, and a, b X. Then\nRhai=Rhbi ⇔ R(a, b) = 1 ·\nDefinition 2.13. Let Xand X0be general sets, f:XX0a function, and µ\na fuzzy subset of X, If f(x) = f(y) implies that µ(x) = µ(y), then µis called\nf-invariant.\nTheorem 2.14. Let Abe an ideal of X. The relation Aon Xis defined by\nxAyxyA , y xA·\ni)The relation Ais an equivalence relation.\nii)Let Cxbe the equivalence class of xand X\nA={Cx:xX}.\nThen (X\nA, o, Co), is a BCK-algebra where Cxocy=Cxy,x, y X.\nDefinition 2.15. A BCK-algebra Xis called bounded if there is an element 1\nof Xsuch that x1 = 0 for all xX.\nLemma 2.16. Let Xbe a bounded and commutative BCK-algebra then\n(i) (xy)z=x(yz)for all x, y, z X\n(ii)x1 = 1 x=x\nDefinition 2.17. A fuzzy ideal µof a BCK-algebra Xis said to be prime if:\nµ(xy) = µ(x) or µ(xy) = µ(y),for all x, y X·\n3. Fuzzy cosets\nFrom now on, Xis a BCK-algebra and µis a fuzzy ideal of X.\nArchive of SID\nwww.SID.ir\n72 A. Hasankhani and H. Saadat\nDefinition 3.1. Let xX. Then the fuzzy subset µxwhich is defined by\nµx(y) = min{µ(xy), µ(yx)}\nis called a fuzzy coset of µ. The set of all fuzzy cosets of µis denoted by X\nµ.\nLemma 3.2. Let µbe a fuzzy relation on Xwhich is defined by\nµ(x, y) = µx(y),x, y X·\nThen µis a fuzzy similarity relation on X.\nProof. Clearly the conditions (i) and (ii) of Definition 2.9 hold. Now by Lemma\n2.5 (i), for all x, y, z X,\nµ(xz)min{µ(xy), µ(yz)}, µ(zx)min{µ(zy), µ(yx)}\nTherefore the condition (iii) of Definition 2.9 holds.\nRemark 3.3. Clearly µhxi=µx,xX.\nLemma 3.4. Let x, y1, y2Xand µy1=µy2. Then\nµxy1=µxy2, µy1x=µy2x\nProof. Since µy1=µy2, then by Lemma 2.12, we get that µ(y1y2) = µ(y2y1) = 1.\nOn the other hand, from Definition 2.1 (a) (i) and Lemma 2.5 (ii) we obtain that:\nµ((xy1)(xy2)) µ(y2y1)·\nThus µ((xy1)(xy2)) = 1. Similarly µ((xy2)(xy1)) = 1.\nConsequently µ(xy1, xy2) = 1 and hence by Remark 3.3 and Lemma 2.12 we have\nµxy1=µxy2. Similarly, by Lemma 2.2 (ii) we can show that µy1x=µy2x.\nLemma 3.5. Let x, y, x0, y0X, µx=µx0and µy=µy0. Then µxy=µx0y0.\nProof. By Lemma 3.4 µxy=µx0yand µx0y=µx0y0. Therefore µxy=µx0y0.\nTheorem 3.6. (X\nµ, O, µ0)is a BCK-algebra where\nO:X\nµ×X\nµX\nµ\n(µx, µy)7→ µxy·\nProof. The proof follows from Lemma 3.5.\nTheorem 3.7. X\nµis a fuzzy partition of X.\nProof. The proof follows from Lemmas 3.2 and 2.11.\nTheorem 3.8. There exists an ideal Kof X\nµsuch that\n(X\nµ)\nK'X\nµα\nfor all α[0,1].\nArchive of SID\nwww.SID.ir\nSome Quotients on a BCK-algebra Generated by a Fuzzy set 73\nProof. Let α[0,1]. By Lemma 2.8 (i), µαis an ideal of X. Define ϕ:X\nµX\nµα\nby ϕ(µx) = Cxfor all xX. If µx=µy, then by Lemma 2.12 µ(x, y) = 1 and\nhence µ(xy) = µ(yx) = 1 α, which implies that xyµαand yxµα.\nhence Cx=Cy. Thus ϕis well-defined. Clearly ϕis an epimorphism. Now let\nK=Kerϕ. The theorem is proved.\nDefinition 3.9. By µ, we mean the set {xX:µ(x)=1}. Clearly µis an\nideal of X.\nTheorem 3.10. X\nµ'X\nµ.\nProof. It is enough to show that the epimorphism ϕ, defined in the proof of theorem\n3.8, is one-to-one. To do this, Let Cx, CyX\nµbe such that Cx=Cyfor x, y X.\nThen xyµand yxµ. In other words, µ(xy) = µ(yx) = 1 and hence\nby Remark 3.3 and Lemmas 2.12 and 3.2, µx=µy.\nTheorem 3.11. Let fbe a BCK-homomorphism from Xonto X0and µan f-\ninvariant fuzzy ideal of Xsuch that µKerf . Then X\nµ'X0.\nProof. Define g:X\nµX0by g(µx) = f(x). By Lemmas 2.12 and 3.2, we have for\nall x, x0X\nµx=µx0xx0, x0xµxx0, x0xKerf f(x) = f(x0)\nTherefore gis well-defined. Clearly gis an epimorphism.\nNow let µxKerg. Then f(x) = f(0) = 0. Since µis f-invariant, hence µ(x) =\nµ(0). From Definition 2.1 (a) (v) and Lemma 2.2 (i) we obtain that µ(x0) =\nµ(0 x) = µ(0) = 1.\nHence, µ(x, 0) = 1, which implies that µx=µ0, by Lemma 2.12. Thus Kerg =\n{µ0}, and hence gis one-to-one.\nTheorem 3.12. Let fbe a BCK-homomorphism from Xonto X0and µ=Kerf .\nThen X\nµ'X0·\nProof. Since X\nKerf 'X0, we conclude that X\nµ'X0. Also by theorem 3.10\nX\nµ'X\nµ. Thus X\nµ\n=X0.\nLemma 3.13. Let Qµ:XX\nµbe a function defined by Qµ(x) = µx. Then\n(i) 0 Qµis an epimorphism\n(ii)if µ=χ{0}, then Qµis an isomorphism. in other words,\nX'X\nµ\nArchive of SID\nwww.SID.ir\n74 A. Hasankhani and H. Saadat\nProof. (i) The proof is easy.\n(ii) If µx=µy, for x, y X, then µ(xy) = µ(yx) = 1. Thus xy=yx= 0.\nHence x=y, therefore Qµis one-to-one.\nTheorem 3.14. Let fbe a BCK-homomorphism from Xinto X0,µa fuzzy ideal\nof Xand µ0a fuzzy ideal of X0such f(µ)µ0. Then there is a homomorphism\nof BCK-algebras f:X\nµX0\nµ0such that fQµ=Qµ0f. In another words, the\nfollowing diagram is commutative.\nXf\nX0\nQµQµ0\nX\nµ\nfX0\nµ0\nProof. Define f:X\nµX0\nµ0by f(µx) = µ0\nf(x). At first we show that fis well-\ndefined. To do this let µx1=µx2. Then by Lemma 2.12 µ(x1, x2) = 1, and hence\nµ(x1x2) = µ(x2x1) = 1. Now we have\nµ0(f(x1)f(x2)) = µ0(f(x1x2))\n=f1(µ0)(x1x2)\nµ(x1x2),since f(µ)µ0\n= 1 ·\nSimilarly µ0(f(x2)f(x1)) = 1, thus µ0\nf(x1)=µ0\nf(x2)by Lemma 2.12. It is easily\nseen that fis a homomorphism and fQµ=Qµ0f.\nTheorem 3.15. (Isomorphism theorem) Let f:XX0be an epimorphism of\nBCK-algebras, and µ0a fuzzy ideal of X0. Then\nX\nf1(µ0)'X0\nµ0·\nProof. By Lemma 2.8 (ii), µ=f1(µ0) is a fuzzy ideal of X. Since fis onto, then\nf(µ) = f(f1(µ0)) = µ0·\nBy Theorem 3.14, the mapping fis a homomorphism. Clearly fis onto. To\nshow that fis one-to-one, suppose that µaKerf , for aXthen we have\nµ0\n0=f(µa) = µ0\nf(a)it follows that µ0(f(a)0) = 1. In other words µ0(f(a)) = 1.\nHence µ(a0) = µ(a) = (f1(µ0))(a) = µ0(f(a)) = 1. On the other hand 1 =\nµ(0) = µ(0 a). Consequently µa=µ0. This completes the proof.\nCorollary 3.16. (Homomorphism Theorem). Let f:XX0be an epimorphism\nof BCK-algebras. Then X\nf1(χ{0})'X0.\nProof. The proof follows from Theorem 3.15 and Lemma 3.13 (ii).\nArchive of SID\nwww.SID.ir\nSome Quotients on a BCK-algebra Generated by a Fuzzy set 75\nDefinition 3.17. A fuzzy similarity relation Ron Xis said to be compatible if for\neach x, y, z Xwe have:\nR(xz, y z)R(x, y) and R(zx, z y)R(x, y)\nTheorem 3.18. Let Rbe a compatible fuzzy similarity on X. Then Rh0iis a fuzzy\nideal of X.\nProof. Clearly Rh0i(0) = 1. Now let x, y Xwe have\nRh0i(x) = R(0, x)min{R(0, x y), R(xy , x)},by Definition 2.9·(iii)\n= min{R(0, x y), R(xy , x 0)}by Lemma 2.2(i)\nmin{R(0, x y), R(y , 0)}by Definition 3.17\n= min{Rh0i(xy), Rh0i(y)} ·\nTheorem 3.19. Let Xbe a commulative BCK-algebra, Pa fuzzy partition of X\nsuch that its fuzzy similarity RP(see Lemma 2.11) is compatible. Then X\nRPh0i=P.\nProof. For simplicity of notation, we will denote RPh0iby η. At first we show that\nPX\nη. To do this, let MP. Then by Definition 2.10 (i) there exists xX\nsuch that M(x) = 1. On the other hand, for all yX, [y]P(y) = 1. Thus by\nDefinition 2.1- (iii) and 3.17 we have:\nM(y) = [y]P(x) = RP(x, y) = RP(y, x)RP(yy , x y) = RP(0, x y),\nand also\nM(y) = Rp(x, y)Rp(xx, y x) = RP(0, y x)·\nTherefore\n(1) M(y)ηx(y),yX·\nOn the other hand we obtain that\nηx(y)RP(0, x y)RP(x0, x (xy)) = RP(x, x (xy))\nand\nηx(y)RP(0, y x)RP(y0, y (yx)) = RP(y, y (yx)) ·\nSince Xis commutative, it follows that\nηx(y)min{RP(x, x y), RP(xy, y)} ≤ RP(x, y)\nHence\n(2) ηx(y)RP(x, y) = [y]P(x) = M(y),yX·\nFrom (1) and (2) we obtain that\nM=ηx,xX·\nThus\n(3) PX\nη·\nArchive of SID\nwww.SID.ir\n76 A. Hasankhani and H. Saadat\nNow let ηxX\nη. Then by Definition 2.10 (ii), there exists NPsuch that\nN(x) = 1. As we have proved, N=ηx, which implies that\n(4) X\nηP·\nNow the proof follows from (3) and (4).\n4. Cosets of a BCK-algebra generated by a fuzzy ideal and an element\nDefinition 4.1. Let aX. We define the relation ”a” on Xas follows.\nxayµ(xy)µ(a), µ(yx)µ(a) for all x, y X\nTheorem 4.2. xayis an equivalence relation on X.\nProof. By Definition 2.1 and 2.4 (i), ”a” is reflexive and clearly ”a” is symmetric.\nNow we prove that ”a” is transitive. To do this let x, y, z X,xayand yaz.\nThen we have\nµ((xz)(xy)) min{µ(((xz)(xy)) (yz)), µ(yz)}\nby Definition 2.4(ii)\n= min{µ(0), µ(yz)},by Definition 2.1(i)\n=µ(yz),by Definition 2.1(i)\nµ(a),since yaz·.\nHence:\nµ(xz)min{µ((xz)(xy)), µ(xy)}\n= min{µ(0), µ(a)},since xay\nTherefor\nµ(xz)µ(a)·\nSimilarly by Lemma 2.2 (ii), we can show that\nµ(zx)µ(a)·\nHence xaz.\nDefinition 4.3. Let aX. For xX, the equivalence class of xwith respect to\na” is denoted by Cx(a, µ) and it is called the coset of xin Xand generated by\naand µ.\nRemark 4.4. The set of all cosets generated by aand µis denoted by CX(a, µ).\nCorollary 4.5. CX(a, µ)is a partition for X.\nProposition 4.6. Let a, x X. Then aCx(a, µ)if and only if\nCx(a, µ) = C0(a, µ)·\nArchive of SID\nwww.SID.ir\nSome Quotients on a BCK-algebra Generated by a Fuzzy set 77\nProof. Let Cx(a, µ) = C0(a, µ). By Definition 2.1 (iv) and Lemma 2.2. (i) it follows\nthat aC0(a, µ). Hence aCx(a, µ). Conversely, let aCx(a, µ). Then we have\nµ(x0) = µ(x)min{µ(xa), µ(a)} ≥ µ(a)·\nOn the other hand\nµ(0 x) = µ(0) µ(a)·\nHence 0 ax, therefore C0(a, µ) = Cx(a, µ).\nProposition 4.7. For all x, y, a X,xy, y xC0(a, µ)if and only if\nCx(a, µ) = Cy(a, µ)·\nProof. The proof follows from Definition 2.1 (iii) and Lemma 2.2. (i).\nProposition 4.8. yCx(0, µ)implies that µ(x) = µ(y).\nProof. The proof follows from Lemma 2.5 (ii), and Definition 2.4 (ii).\nProposition 4.9. For aX,C0(a, µ)is a subalgebra and an ideal of X.\nProof. Let x, y C0(a, µ). Then by Lemma 2.2 (iv) and 2.5 (ii) we have µ(xy)\nµ(x)µ(a) and µ(yx)µ(y)µ(a). Since\nµ((xy)0) = µ(xy), µ((yx)0) = µ(yx),\nhence xyC0(a, µ). Therefore C0(a, µ) is a subalgebra of X. From Definition\n2.5 and some calculation we get that, C0(a, µ) is an ideal of X.\nLemma 4.10. For all x, a, b X,\n(i) Cx(ab, µ)Cx(a, µ)Cx(b, µ),\n(ii) if µis a fuzzy prime ideal of X, then Cx(ab, µ) = Cx(a, µ)Cx(b, µ).\nProof. (i) From Lemma 2.2. (v) and 2.5 (ii) we can prove (i).\n(ii) follows from Definition 2.17.\nTheorem 4.11. Let Xbe a bounded, commutative BCK-algebra, µa fuzzy prime\nideal of X,xX, and Cx(X, µ) = {Cx(a, µ) : aX}. Define the operation ”.”\nOn Cx(X, µ)as follows: Cx(a, µ)·Cx(b, µ) = Cx(ab, µ). Then (Cx(X, µ),·)is a\nmonoid.\nProof. The proof follows from Lemmas 4.10 (ii) and 2.16 (ii).\nLemma 4.12. Let a, y1, y2Xand y1ay2. Then\nxy1axy2and y1xay2x , for all xX·\nProof. Since y1ay2, we have µ(y1y2)µ(a) and µ(y2y1)µ(a). On the\nother hand by Definition 2.1 (i) we get that\n((xy1)(xy2)) (y2y1) = 0 ·\nHence from Definition 2.4.\nµ((xy1)(xy2)) min{µ[((xy1)(xy2)) (y2y1)], µ(y2y1)}\nmin{µ(0), µ(a)},since y1ay2=µ(a)\n=µ(a)·\nArchive of SID\nwww.SID.ir\n78 A. Hasankhani and H. Saadat\nSimilarly we have µ((xy2)(xy1)) µ(a). Consequently\nxy1axy2\nSimilarly from Lemma 2.2 (ii) we get that y1xay2x.\nLemma 4.13. Let aX, We define :CX(a, µ)×CX(a, µ)CX(a, µ)as\nfollows\nCx(a, µ)Cy(a, µ) = Cxy(a, µ),x, y X·\nThen is an operation on CX(a, µ).\nProof. Let Cx1(a, µ) = Cx2(a, µ) and Cy1(a, µ) = Cy2(a, µ). Then x1ax2and\ny1ay2. Hence by Lemma 4.12 we have x1y1ax2y2. ALso y1ay2implies\nthat x1y1ax1y2. Therefore from Theorem 4.2 we have x1y1ax2y2. In\nother words Cx1y1(a, µ) = Cx2y2(a, µ).\nTheorem 4.14. Let aX. Then (CX(a, µ), C0(a, µ),)is a BCK-algebra called\nthe quotient algebra generated by µand a.\nProof. Clearly the axioms (i),(ii),(iii),(v) of Definition 2.1 hold. Now let\nCx(a, µ)Cy(a, µ) = Cy(a, µ)Cx(a, µ) = C0(a, µ)\nThen\nCxy(a, µ) = C0(a, µ) = Cyx(a, µ)·\nHence by proposition 4.7 we have:\nCx(a, µ) = Cy(a, µ)·\nTheorem 4.15. Let f:XX0be an epimorphism of BCK-algebras and µbe\nf-invariant and µµ(a)Kerf , for aX. Then Cx(a, µ)'X0.\nProof. Define ψ:CX(a, µ)X0by, ψ(Cx(a, µ)) = f(x), for all xX.\nLet Cx(a, µ) = Cy(a, µ), where x, y X. Then xy , y xµµ(a)Kerf .\nHence f(x) = f(y). In other words ψis well defined. Clearly ψis an epimorphism.\nNow let f(x) = f(y), for x, y X. Then f(xy) = f(yx) = f(0).\nSince µis f-invariant, we have\nµ(xy) = µ(0) µ(a), µ(yx) = µ(0) µ(a)·\nTherefore Cx(a, µ) = Cy(a, µ), which implies that ψis one-to-one.\nReferences\n A Hasankhani, F-Spectrum of a BCK-algebra, J. Fuzzy Math. Vol. 8, No. 1(2000), 1-11.\n C.S. Hoo, Fuzzy ideal of BCI and MV-algebra, Fuzzy sets and Systems 62 (1994), 111-114.\n Y. Imai, K. Iseki, On axiom systems of propositional calculi, XIV. Proc. Jopan Academy, 42\n(1966), 19-22.\n K. Iseki, On ideals in BCK-algebra, Math. Seminar Notes, 3(1975), Kobe University.\n K. Iseki, Some properties of BCK-algebra, 2 (1975), xxxv, these notes.\n K. Iseki, S.Tanaka, Ideal theory ob BCK-algebra, Math. Japonica, 21 (1976), 351-366.\n K. Iseki, S. Tanaka, An introduction to the theory of BCK-algrba, Math. Japonica, 23 (1978),\n1-26.\nArchive of SID\nwww.SID.ir\nSome Quotients on a BCK-algebra Generated by a Fuzzy set 79\n V. Hohle, Quotients with respect to similarity relations, Fuzzy sets and systems 27 (1988),\n31-44.\n W.J. Liu, Fuzzy invariant subgroups and fuzzy ideals, Fuzzy sets and Systems 8(1982), 133-\n139.\n S. Ovchinnikov, Similarity relations, fuzzy partitions, and fuzzy ordering, Fuzzy sets and\nsystem, 40 (1991), 107-126.\n O. Xi, Fuzzy BCK-algebra, Math. Japonica, 36 (1991), 935-942.\n L.A. Zadeh, Similarity relations and fuzzy ordering, Inform. Sci. 3(1971), 177-200.\n L.A. Zadeh, Fuzzy sets, Information and control, 8(1965), 338-353.\nA. Hasankhani, Department of Mathematics, Shahid Bahonar University of Kerman,\nKerman, Iran" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.68897074,"math_prob":0.99919456,"size":18277,"snap":"2023-14-2023-23","text_gpt3_token_len":8611,"char_repetition_ratio":0.15202758,"word_repetition_ratio":0.044163063,"special_character_ratio":0.3676205,"punctuation_ratio":0.18238261,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99995685,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-04-02T02:05:28Z\",\"WARC-Record-ID\":\"<urn:uuid:7d7afe69-7937-4bca-84f3-539040005faa>\",\"Content-Length\":\"604684\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ec486b47-477e-409d-a532-a0a93be5e6de>\",\"WARC-Concurrent-To\":\"<urn:uuid:2b425365-fefc-4bc2-a90d-8237d631851e>\",\"WARC-IP-Address\":\"104.17.32.105\",\"WARC-Target-URI\":\"https://www.researchgate.net/publication/265401319_Some_quotients_on_a_Bck-algebra_generated_by_a_fuzzy_set\",\"WARC-Payload-Digest\":\"sha1:SALWTPLN4S2XYMTOA4DJPXNZT3KOZFWZ\",\"WARC-Block-Digest\":\"sha1:N3XIUW4Z7HXDDLZ3Z35QY6CS65GG53K7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296950373.88_warc_CC-MAIN-20230402012805-20230402042805-00043.warc.gz\"}"}
https://studyforce.com/the-egyptian-numeration-system/
[ "# The Egyptian Numeration System\n\nIn the Egyptian numeration system, numerals are formed by combining the symbols that represent various powers of ten:", null, "The value of the number is the sum of the values of the numerals.\n\nFor example, the number 325 is represented as:", null, "The order of the symbols is not important, we could also write 325 as:", null, "Let’s focus on some questions:\n\nQ1.   Convert to Indo-Arabic notation.", null, "Q2.   Convert 2,405,303 to numeral to Egyptian form.", null, "", null, "" ]
[ null, "https://studyforce.com/wp-content/uploads/2020/05/Untitled-picture-300x233.png", null, "https://studyforce.com/wp-content/uploads/2020/05/Untitled-picture-1-300x73.png", null, "https://studyforce.com/wp-content/uploads/2020/05/Untitled-picture-2-300x75.png", null, "https://studyforce.com/wp-content/uploads/2020/05/Untitled-picture-3-300x55.png", null, "https://studyforce.com/wp-content/uploads/2020/05/Untitled-300x24.png", null, "https://studyforce.com/wp-content/uploads/2020/05/Untitled-1-300x39.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8442372,"math_prob":0.9919428,"size":443,"snap":"2020-34-2020-40","text_gpt3_token_len":110,"char_repetition_ratio":0.14123006,"word_repetition_ratio":0.0,"special_character_ratio":0.25282168,"punctuation_ratio":0.18367347,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9568219,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,4,null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-08T11:32:46Z\",\"WARC-Record-ID\":\"<urn:uuid:a25a3781-96e3-44bc-b390-eae8e4fca962>\",\"Content-Length\":\"48835\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0b90fbe6-fe52-4b31-852c-ef9e16742f84>\",\"WARC-Concurrent-To\":\"<urn:uuid:9cdc819c-6c18-4b39-864e-ce57531deb0d>\",\"WARC-IP-Address\":\"54.39.48.233\",\"WARC-Target-URI\":\"https://studyforce.com/the-egyptian-numeration-system/\",\"WARC-Payload-Digest\":\"sha1:44ECVM72HGKKXTO7U7ECDXNUQLCQIV4A\",\"WARC-Block-Digest\":\"sha1:ZYGQOG2CBFIMWLJZ7VHEZ6YXLWUFUSEX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439737645.2_warc_CC-MAIN-20200808110257-20200808140257-00425.warc.gz\"}"}
https://it.scribd.com/document/455224901/Thesis-Patricia-Egger
[ "Sei sulla pagina 1di 83\n\n# Ecole Polytechnique Fédérale de\n\nLausanne\n&\nMassachussetts Institute of\nTechnology\n\nMaster thesis\n\n## Efficient computational approaches\n\nto trajectory prediction for future\nEarth-asteroid impact mitigation\n\n## Patricia Egger Under the supervision of:\n\[email protected] Prof. Marco Picasso\[email protected]\nand\nSciper No : 184951 Prof. Olivier de Weck\n\n## July 14, 2014\n\nAbstract\n\nThe problem that we will study in this thesis is that of predicting trajec-\ntories of asteroids within our solar system. This thesis is a component of a\nMIT PhD thesis that aims at determining the utility of precursor missions\nin asteroid deflection campaigns.\nThe main contributions of this thesis are (i) the retracing of the historical\ndevelopment of the equations of motion used in asteroid and planetary tra-\njectory propagation, (ii) the development of a propagator, PAT2 , through\nvalidation of the numerical integrator ode113 built-in to MATLAB with er-\nror validation against NASA’s HORIZONS system and a short discussion\non why symplectic solvers will not be considered in this context, (iii) the\nrescaling of the problem in order to reduce numerical noise and (iv) the ap-\nplication of this propagator to five asteroids with very different orbits.\nOne of the main advantages and key differences with most available prop-\nagators is that PAT2 only requires the initial conditions of the bodies (i.e.\nthe state vector y at t = 0, y0 ). In fact, there is no need to store previously\ncomputed planetary ephemerides as is the case in HORIZONS, for example.\nThis method could produce bigger numerical errors compared to the latter\nbecause the propagated planetary orbits will also include some errors. How-\never, this is a major simplification for the user and furthermore allows for\nthe study of planetary trajectory propagation as well as that for asteroids.\nThe asteroids we consider are chosen because of the differences in their or-\nbits’ characteristics, i.e. in order to observe the behavior of PAT2 relative\nto important physical parameters. Using this propagator on the notorious\nasteroid Apophis, we obtain a maximal numerical error of 500 kilometers\nafter 10 years. Results for the other asteroids studied range from 600 kilo-\nmeters to 2.5 thousand kilometers after 10 years. Runtimes range from less\nthan 7 minutes to about 28 minutes.\nAs the tradeoff between accuracy, or error, and runtime is essential in many\napplications of the N-body problem, we present some data that will help\nin choosing the optimal set-up for the propagation of an asteroid given its\nphysical parameters as well as the runtime and accuracy requirements.\n\ni\nAcknowledgements\n\nThere are a lot of people that I would like to thank for my experience\nresearching and writing this thesis. First, I would like express my very\ngreat appreciation for my two supervisors, Professor Picasso from EPFL in\nSwitzerland and Professor de Weck from MIT in the United States. They\nhave allowed me to pursue a dream that all young engineering students\nshare: that of studying in the world’s greatest school. Both of them have\nbeen very supportive of my work and helped me through some important\nobstacles. A second special thank you goes to Professor de Weck, a truly\ninspirational man and a great role model, for providing me with unimag-\ninable opportunities. I would also like to thank my student mentor, PhD\ncandidate Sung Wook Paek, for introducing me to the world of asteroids and\nhelping me in my exploration of the world of astronautics. Another thank\nyou goes to Paul Chodas for not only giving me an inside look at asteroid\nand planetary ephemerides at NASA, but also for allowing me to discover\nJPL in a front row seat.\nI would also like to extend my thanks to all the people from room 33-409\n- Andrew, David, Ioana, Koki, Margaret, Narek, Paul, Roi, Sreeja, Sydney\nand Takuto from SERG and Dani, Íñigo, Marc, Morgan and Peter from\nSAL. They made my few months at MIT that much more fun. Dani and\nMarc, thank you for taking me under your wing and Íñigo, thank you for the\nspanish lessons. On the Swiss side, I would like to acknowledge my friends\nAngelina and Charlotte for their never ending support as well as Alessandro,\nChristoph and Francesco for their invaluable help throughout my Bachelor’s\nand Master’s degrees at EPFL.\nFinally, I would like to thank my family - my mother, father, brothers and\nmy better half, who have been there for me through the highs and lows, al-\nways encouraging me to reach for the stars (or asteroids, as the case may be).\n\nii\nContents\n\n## 1 Introduction and Motivation 1\n\n2 Physical and Mathematical Background 5\n2.1 The N-body problem . . . . . . . . . . . . . . . . . . . . . . . 6\n2.1.1 Equations of motion . . . . . . . . . . . . . . . . . . . 7\n2.1.2 Hamiltonian formulations . . . . . . . . . . . . . . . . 12\n2.1.3 Derivation of the equations of motion . . . . . . . . . 13\n2.2 Numerical Integration . . . . . . . . . . . . . . . . . . . . . . 16\n2.2.1 Geometric numerical integration . . . . . . . . . . . . 16\n2.2.2 Accuracy requirements . . . . . . . . . . . . . . . . . . 17\n3 PAT2 : Propagator for Asteroid Trajectories Tool 19\n3.1 Mathematical and Physical Model . . . . . . . . . . . . . . . 20\n3.2 Rescaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22\n3.3 Numerical Integration Scheme . . . . . . . . . . . . . . . . . . 23\n3.4 Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26\n4 Benchmark comparisons 27\n4.1 Possible Candidates . . . . . . . . . . . . . . . . . . . . . . . 27\n4.2 Benchmarking Results . . . . . . . . . . . . . . . . . . . . . . 30\n5 Case Studies 31\n5.1 Apophis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33\n5.2 Icarus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47\n5.3 2007 FT3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51\n5.4 2009 VZ39 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52\n5.5 2008 FF5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57\n6 Conclusions and Future Work 61\nAppendices 66\nA JPL Visit Report 67\nB Chebyshev Polynomial Interpolation 71\nC How Asteroids Get Their Names 72\n\niii\nList of Tables\n\n## 3.1 Positions, velocities and accelerations in units of seconds and\n\nkilometers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22\n3.2 Positions, velocities and accelerations in units of sidereal years\nand hundred thousand kilometers (105 km) . . . . . . . . . . 22\n3.3 Number of function evaluations for given tolerances . . . . . . 24\n3.4 Error in the last time step for Apophis . . . . . . . . . . . . . 25\n\n## 5.1 Some of asteroid Apophis’ relevant physical data . . . . . . . 33\n\n5.2 Error in the last time step for Apophis . . . . . . . . . . . . . 35\n5.3 Error in the position of Apophis using the Newtonian equa-\ntions of motion . . . . . . . . . . . . . . . . . . . . . . . . . . 37\n5.4 Some of asteroid Icarus’ relevant physical data . . . . . . . . 47\n5.5 Error in the last time step for Icarus . . . . . . . . . . . . . . 48\n5.6 Some of asteroid 2007 FT3’s relevant physical data . . . . . . 51\n5.7 Error in the last time step for 2007 FT3 . . . . . . . . . . . . 52\n5.8 Some of asteroid 2009 VZ39’s relevant physical data . . . . . 54\n5.9 Error in the last time step for 2009 VZ39 . . . . . . . . . . . 55\n5.10 Number of observations used in the statistical fit and solution\nnumber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56\n5.11 Some of asteroid 2008 FF5’s relevant physical data . . . . . . 57\n5.12 Error in the last time step for 2008 FF5 . . . . . . . . . . . . 58\n\niv\nList of Figures\n\n## 2.2 Illustration of the ecliptic plane . . . . . . . . . . . . . . . . . 7\n\n2.3 The asteroid belt . . . . . . . . . . . . . . . . . . . . . . . . . 10\n\n## 5.2 Orbits of the asteroids considered for the case studies . . . . 32\n\n5.3 Orbit of Apophis . . . . . . . . . . . . . . . . . . . . . . . . . 34\n5.4 Error in the position of Apophis . . . . . . . . . . . . . . . . 35\n5.5 Component-wise error in the position of Apophis . . . . . . . 36\n5.6 Normalized simulated total energy . . . . . . . . . . . . . . . 38\n5.7 Ratio of the simulated potential over kinetic energy . . . . . . 39\n5.8 Normalized total energy from HORIZONS . . . . . . . . . . . 40\n5.9 Ratio of the potential over kinetic energy from HORIZONS . 41\n5.10 Error in the position of the Sun . . . . . . . . . . . . . . . . . 43\n5.11 Component-wise error in the position of the Sun . . . . . . . 43\n5.12 Error in the position of Jupiter . . . . . . . . . . . . . . . . . 44\n5.13 Component-wise error in the position of Jupiter . . . . . . . . 44\n5.14 Error in the position of Mercury . . . . . . . . . . . . . . . . 45\n5.15 Component-wise error in the position of Mercury . . . . . . . 45\n5.16 Error in the position of Venus . . . . . . . . . . . . . . . . . . 46\n5.17 Component-wise error in the position of Venus . . . . . . . . 46\n5.18 Orbit of Icarus . . . . . . . . . . . . . . . . . . . . . . . . . . 48\n5.19 Error in the position of Icarus . . . . . . . . . . . . . . . . . . 49\n5.20 Points on Icarus’ orbit with biggest and smallest errors . . . . 50\n5.21 Component-wise error in the position of Icarus . . . . . . . . 50\n5.22 Orbit of 2007 FT3 . . . . . . . . . . . . . . . . . . . . . . . . 51\n5.23 Error in the position of 2007 FT3 . . . . . . . . . . . . . . . . 53\n5.24 Component-wise error in the position of 2007 FT3 . . . . . . 53\n5.25 Orbit of 2009 VZ39 . . . . . . . . . . . . . . . . . . . . . . . . 54\n5.26 Error in the position of 2009 VZ39 . . . . . . . . . . . . . . . 55\n\nv\nLIST OF FIGURES\n\n## 5.27 Component-wise error in the position of 2009 VZ39 . . . . . . 56\n\n5.28 Orbit of 2008 FF5 . . . . . . . . . . . . . . . . . . . . . . . . 58\n5.29 Error in the position of 2008 FF5 . . . . . . . . . . . . . . . . 59\n5.30 Points on 2008 FF5’s orbit with biggest errors . . . . . . . . . 59\n5.31 Component-wise error in the position of 2008 FF5 . . . . . . 60\n\n## 6.2 Tolerance versus runtime tradeoff. . . . . . . . . . . . . . . . . . 62\n\n6.3 Tolerance versus numerical error tradeoff . . . . . . . . . . . . 62\n\nvi\nGlossary and acronyms\n\n## Aphelion: Defined as the point on a planet’s orbit where it is at\n\nmaximal distance from the Sun.\n\n## Asteroid: Also known as a minor planet, this is a large rocky body in\n\norbit around the Sun. Asteroids are believed to be ancient remnants of\nthe earliest years of the formation of our solar system. In comparison,\ncomets are a lot less dense than asteroids as they are mainly made of\nice and rock. This is why comets do not pose as much of a threat as\nasteroids: they usually do not make it past our atmosphere.\n\n## AU (Astronomical Unit): Is the mean distance between the Earth\n\nand the Sun. 1 AU = 149,597,870.700 kilometers.\n\n## Barycenter: Of a body, is its center of mass. Since the Sun makes\n\nup about 99.8% of the mass of the entire solar system , the solar\nsystem barycenter nearly coincides with that of the Sun.\n\n## Deflection mission: A technological solution for deviating the tra-\n\njectory of a potentially hazardous object so as to avoid it colliding with\nthe Earth.\n\n## ∆V : Delta V: Change is velocity (denoted V ) needed to modify a\n\nbody’s trajectory. This can be understood as the amount of effort that\nis needed to move a body from one trajectory to another.\n\n## Ecliptic, or ecliptic plane: Defined as the imaginary plane contain-\n\ning the Earth’s orbit around the Sun. The planetary bodies of our\nsolar system all lie approximately in this plane.\n\n## Ephemeris: Gives the positions of naturally occurring astronomical\n\nobjects as well as artificial satellites in the sky at a given time or times.\n\n## Hamiltonian: Mathematical formalism to describe the equations of\n\nmotion of a physical system.\n\nvii\nLIST OF FIGURES\n\n## ICRF (International Celestial Reference Frame): With its ori-\n\ngin at the solar system barycenter and \"space fixed\" axis directions, the\nICRF is meant to represent the most appropriate coordinate system\nfor expressing reference data on the positions and motions of celestial\nobjects.\n\n## NEO - respectively NEA (Near-Earth Object - resp. Near-\n\nEarth Asteroid): These are objects that have a closest approach\ndistance with the Earth’s orbit of less than 0.3 AU.\n\n## Orbital eccentricity: Of a celestial object, is a real and positive\n\nnumber, e, that determines the amount by which its orbit around the\ncenter body deviates from a perfect circle. An orbit with e = 0 is\ntherefore a circle. When 0 < e < 1, we have an ellipse, when e = 1 a\nparabola and e > 1 a hyperbola.\n\nto the Sun.\n\n## PHO - respectively PHA (Potentially Hazardous Object -\n\nresp. Potentially Hazardous Asteroid): These are NEAs whose\nMinimum Orbit Intersection Distance (MOID) with the Earth is 0.05\nAU and whose diameter is greater than 140 meters (minimum diameter\nneeded in order to penetrate the Earth’s atmosphere).\n\n## PN formalism: Post-Newtonian formalism - In situations where\n\ngravity is weak and the objects are moving slowly compared to the\nspeed of light, the theories of general relativity and that of Newton’s\ngravity lead to very similar descriptions of the motion of bodies. This\ncan be seen as taking the Newtonian description and adding successive\ncorrection terms that take into account the effects of general relativity.\nThe method for successively adding these correction terms is called the\nPN formalism.\n\n## PPN formalism (Parametrized Post-Newtonian formalism):\n\nIs a version of the PN formalism that explicitly details the parameters\nin which a general theory of gravity can differ from Newtonian gravity.\n\n## Propagator: Simulates the trajectory of one or more objects over\n\ntime given these bodies’ initial positions and velocities.\n\nState vector: Vector whose components are the positions and veloc-\nities of a given body. As the positions and velocities depend on time,\nthe state vector is time-dependent.\n\nviii\nSection 1\n\n## Introduction and Motivation\n\nFigure 1.1: Orbits of over 1000 known Potentially Hazardous Asteroids (PHAs).\nThese are over 140 meters in diameter and will pass within 7.5 million kilometers\nof Earth – about 20 times the distance to the Moon.\n† Image taken from http://apod.nasa.gov/apod/ap130812.html\n\nThe first asteroid ever discovered was Ceres in 1801 . Since then,\naround 600’000 asteroids have been discovered in our solar system. Recently,\nthese objects have become a source of scientific research due to a few events\nthat occurred in the past years. In fact, in 1908, an asteroid entered into\nthe Earth’s atmosphere and exploded in the sky above Siberia. This has\nbeen documented as the largest impact event on Earth. More recently, in\n2013, the Chelyabinsk meteor entered Earth’s atmosphere and exploded in\nair causing injuries to almost 1’500 people.\n\n1\nSECTION 1. INTRODUCTION AND MOTIVATION\n\n## Event type Diameter Fatalities Impact interval\n\nHigh alt. beak-up < 50 m 0 annual\nRegional > 140 m 50’000 5’000 years\nLarge sub-global > 300 m 500’000 25’000 years\nHigh global > 5 km > 2 billion 6 million years\nExtinction-class > 10 km 6 billion 100 million years\n\n## Table 1.1: Typical impact types, frequency and conesquences. \n\nTable 1.1 shows a summary of collision event types with their associated\nobject diameters, number of fatalities and typical impact intervals.\nIn the scientific community, it is widely believed that a large asteroid col-\nlided with our planet approximately 65 million years ago, resulting in the\nextinction of dinosaurs. It is not unreasonable to assume that if such an\nevent were to take place again, it could lead to the demise of the human\nrace. Hence, the question may not be if an event such as the one respon-\nsible for the extinction of dinosaurs will happen, but rather when it will\nhappen.\nAssuming then that we will one day be faced with an Earth-asteroid colli-\nsion, it would be prudent to have a mitigation plan, enabling us to avoid\ncatastrophic consequences and perhaps even save our species.\n\nIn view of this, PhD candidate Sung Wook Paek from MIT’s AeroAstro\ndepartment decided to focus his doctoral research on asteroid mitigation\nmissions. More specifically, he will prove the utility of precursor missions\nunder high initial uncertainties concerning potentially hazardous asteroids.\nIn fact, there is great uncertainty surrounding certain asteroid parameters\nthat greatly impact our ability to predict their trajectories. These uncer-\ntainties relate to mass, density, shape, etc. and make mitigation missions\ntricky. Because it is difficult to reduce these uncertainties with remote ob-\nservations from Earth, we can consider precursor missions whose goals are\nto obtain valuable information about the potentially hazardous body that\ncould then be used for an effective and optimized deflection process. There-\nfore, Sung Wook’s goal will first be to prove the utility of a precursor mission\nand second, he will model and optimize the details of a two-stage mitigation\ncampaign consisting of a precursor mission and a mitigation mission.\nNow, in order to simulate a mitigation mission, it is necessary to estimate fu-\nture trajectories of the potentially hazardous objects. Moreover, it is crucial\nto know whether such a deflection mission is necessary. Therefore one must\nbe able to predict an asteroid’s passage through what is called a keyhole.\n\n2\nSECTION 1. INTRODUCTION AND MOTIVATION\n\nFigure 1.2: Differences between orbits of a typical near-Earth asteroid (blue) and\na potentially hazardous asteroid, or PHA (orange). PHAs are a subset of the near-\nEarth asteroids (NEAs). They have the closest orbits to Earth’s orbit, coming\nwithin about 8 million kilometers, and they are large enough to survive passage\nthrough Earth’s atmosphere and cause damage on a regional, or greater, scale .\n† Image taken from\nhttp://www.nasa.gov/mission_pages/WISE/multimedia/gallery/neowise/pia15628.html\n\nSimply put, these are small regions in space with the interesting property\nthat a body passing through one of these results in it colliding with Earth\n(keyholes will be discussed further in Section 2.2.2). In turn, the study of\nkeyhole passages requires a precise trajectory propagator.\nThe goal of this thesis will therefore be to develop a high fidelity and fast-\nrunning orbit propagator that can be used both for determining whether or\nnot an asteroid will pass through a keyhole and for simulating a deflection\nmission. Of course, there are propagators that already exist, some of which\nare available for public use. However, some of these public propagators do\nnot make their source code available, making the available options limited\nfor use in the context of deflection missions. We will explore some of the\n\nOne of the main motivations for this thesis is to obtain an orbit prop-\nagator where the user can explicitly tradeoff accuracy versus computation\ntime. This tradeoff will be discussed in the case studies in Section 5. In fact,\ndepending on the work at hand, one might be more interested in obtaining a\nvery precise ephemeris with a long runtime whereas others might find more\nuse in a less precise ephemeris whose runtime is shorter. We want to pro-\n\n3\nSECTION 1. INTRODUCTION AND MOTIVATION\n\nvide a propagator that is easy to use and that is flexible in the equations,\nnumber of bodies, relativity theory and output and, of course, that is open\nsource. It should not be required to have advanced knowledge in aerospace\nengineering, physics or mathematics in order to use the tool. However, it\nshould be possible to modify it for those with the knowledge and interest.\nThe gap that is being addressed with this thesis is that of providing a simple\nand flexible orbit propagator that allows the user to propagate and study\nnot only an asteroid’s trajectory but also all the other bodies that are con-\nsidered in the physical model and that only requires initial conditions for\nthe bodies. Results for five asteroids are given in order to help the user in\nchosing the numerical tolerance given desired runtimes and accuracy and\nwill procvide ball park values for the errors.\n\nThis thesis will focus in particular on the asteroid Apophis. Apophis was\ndiscovered only ten years ago, in 2004, and was put in the spotlight when\ninitial observations and computations indicated a high probability (around\n2.7%) that it would collide with Earth in 2029 . We will also study four\nother asteroids from NASA’s Sentry table that lists the bodies with\npotential future Earth impact events.\n\n## The remaining part of this thesis is structured as follows. Section 2\n\nprovides an overview of the physical and mathematical models that will be\nused throughout this research. The equations of motion are described as\nwell as the variables that come into consideration. Section 3 describes some\naspects of geometric numerical integration that are relevant to the given\nproblem as well as the requirements for deflection missions. In Section 4, a\nnew propagator will be introduced along with its mathematical foundation.\nSection 5 will be dedicated to testing several different propagators on a\nbenchmark problem, specifically that of the asteroid Apophis. Using the\nresults from Section 5, the best available propagator will be selected and\nSection 6 will give a detailed analysis of two case studies using the chosen\npropagator. Finally, Section 7 will contain conclusions to the problem in\ngeneral and specific to asteroid deflection missions. Future work will be\nbriefly described.\n\n4\nSection 2\n\nBackground\n\n## Figure 2.1: Illustration of the N-body problem.\n\n† Image taken from\nhttp://www.lactamme.polytechnique.fr/images/NCOR.U1.2048.D/display.html\n\n## This section will provide an overview of the physical and mathematical\n\nformulation used to model the movement of bodies in our solar system.\nWhen considering N celestial objects (the Sun, planets, moons, et.), this is\nreferred to as the N-body problem. Simpler versions of this are the 2-body\nproblem (e.g. the Earth-Sun system) and the 3-body problem (e.g. the\nEarth-Moon-Sun system). By including more bodies into the model, i.e. by\n\n5\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## 2.1 The N-body problem\n\nThe point mass N-body problem may be stated:\n\nGiven the positions and velocities of bodies with known mass at some initial\ntime t0 , find the positions of the bodies at any other time t > t0 .\n\nThe N-body problem is chaotic . Simply put, even if the present\ndetermines the future, the approximate present does not approximately de-\ntermine the future. In terms of the N-body problem, this means that small\nperturbations in mass, trajectories or other physical properties will lead to\nenormous and unpredictable changes in the system. This is a purely physical\nphenomenon. However, chaos has a numerical counterpart called instabil-\nity. Similarly to the physical meaning, numerical instability means that by\nmodifying the input data slightly, we will obtain very different numerical re-\nsults. While instability is a negative feature of any problem, it does remove\nthe burden of attempting to identify an integrator that preserves inherent\nstability. In fact, when dealing with physically non chaotic (or stable) sys-\ntems, we try to choose a numerical scheme that will preserve the stability.\nHowever, if the physical system is chaotic to start with, there is no point in\nusing a numerically stable integration scheme.\n\n## Even though the N-body problem is unstable, a convergent expansion\n\ndoes exist for a general N as proved by Wang in 1991 . This result is far\nfrom trivial. In fact, in 1912, i.e. almost 80 years before Wang generalized\nthe result, Sundman developed a method that produced a global analytical\nsolution of the 3 body problem. Unfortunately, these expansions cannot, as\na practical matter, be applied to real problems as they require millions of\nterms to be computed even for short times. Therefore solving the N-body\nproblem requires numerical integration of the equations of motion. More-\nover, in the abstract of his paper \"The existence of global solution of the\nN-body problem\" , Wang writes:\n\n## \"The convergence of my power series is admittedly unsatisfactory, and so\n\nthe present result is of limited value for practical calculation.\"\n\n## It is noteworthy that in his proof, Wang considers bodies as point masses\n\n(as do we) but does not take into account the relativistic terms that will be\ndiscussed in 2.1.1. Furthermore, there is no mention of the uniqueness of the\nsolution, i.e. the problem is not well posed according to the mathematical\ndefinition. Considering that it took almost 80 years and a new mathematical\n\n6\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\nFigure 2.2: Illustration of the ecliptic plane. This plane is defined as the imaginary\nplane containing the Earth’s orbit around the Sun. The planetary bodies of our\nsolar system all nearly lie in this plane. Originally, the ecliptic plane was defined\nusing the path of the Sun around the Earth.\n† Image taken from http://www.herongyang.com/astrology_horoscope/ecliptic_plane\n\n## transformation in order to prove the existence of a solution to the N-body\n\nproblem with no relativistic terms, I will not attempt to extend this proof\nto the equations of motion that include these extra terms. In summary, we\ndo not actually know whether or not there is a solution to the problem that\nwe will be solving and if it does exist we do not know whether or not it is\nunique.\nWe will therefore be solving the N-body problem numerically in order to\ndetermine a given asteroid’s trajectory in space.\n\n## 2.1.1 Equations of motion\n\nOne of the physical models currently used in trajectory propagation includes\nthe mutual Newtonian gravitational accelerations and their relativistic cor-\nrections, which is a modified form of the Einstein-Infeld-Hoffmann equation.\n\n7\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## For each body i, the point mass acceleration is given by:\n\nX µj (rj − ri ) \u001a 2(β + γ) X µk 2β − 1 X µk\nr̈i = 3 1− −\nj6=i\nrij c2 r\nk6=i ik\nc2 k6=j rjk\n\u00132 \u00132\nvi vj 2(1 + γ)\n\u0012 \u0012\n+γ + (1 + γ) − ṙi · ṙj\nc c c2\n\" #2\n3 (ri − rj ) · ṙj 1\n\u001b\n− 2 3 + 2 (rj − ri ) · r̈j (2.1)\n2c rij 2c\n1 X µj\n+ 2 3 {[ri − rj ] · [(2 + 2γ)ṙi − (1 + 2γ)ṙj ]} (ṙi − ṙj )\nc j6=i rij\n(3 + 4γ) X µj r̈j\n+ ,\n2c2 j6=i rij\n\nwhere ri , ṙi and r̈i are the solar-system-barycentric position, velocity and\nacceleration vectors of body i, i.e. the positions and velocities of body i using\nthe center of mass of the solar system as the center of the reference frame.\nThis means that we are considering an inertial reference frame centered at\nthe center of mass of the solar system. The constant c is the speed of light,\nµi = Gmi , where G is the gravitational constant and mi is the mass of body\ni. Furthermore, rij = |rj − ri | is the distance between bodies i and j and\nvi = |ṙi |. Finally, β and γ are PPN parameters measuring the nonlinearity\nin superposition of gravity and the space curvature produced by unit rest\nmass, respectively. In general relativity, β = γ = 1.\nFor the rest of this paper, the word relativistic will refer to considering\nthe relativistic terms in the equations of motion. In contrast, the word\nNewtonian will be used when these terms are not included. In equation\n(2.1), the relativistic terms are written in gray. They are all the terms in c12 .\nBecause acceleration terms appear both on the right and left hand side of\nequation 2.1, this problem is implicit. In fact, if\n \nr1\n . \n .. \n \n r \n N \ny= ,\n ṙ1 \n .. \n \n . \nṙN\n\n8\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## is the state vector of the N bodies considered, then\n\n \nṙ1\n . \n .. \n \n ṙ \ny0 =  N \n \n r̈1 \n .. \n \n . \nr̈N\n\nis the vector containing velocities and accelerations and the N-body problem\ncan be formulated as\nf (t, y, y 0 ) = 0 (2.2)\nwhere we omit the time-dependency to simplify notation.\nHowever, it is possible to exploit the structure of the equations of motion\nin a more elegant manner by putting all the acceleration terms to the left\nhand side of the equality sign. We then obtain:\n\n## M (y)y 0 = f (t, y) (2.3)\n\nwhere M is called the mass matrix and depends on the state vector y.\nIn contrast to the implicit problem (2.2), an explicit problem could be writ-\nten as\ny 0 = f (t, y),\nwhich is equivalent to (2.3) when we replace f (t, y) with M −1 f (t, y). Of\ncourse, this requires an invertible mass matrix M . If the matrix is singular,\na different approach must be used. We will not be discussing this case fur-\nther in the context of this thesis.\n\n## In the context of numerical integration, explicit problems are preferred.\n\nIn fact, when dealing with an implicit problem, one must solve an implicit\nsub-problem at each time step, which is computationally expensive. For\nthis reason and for comparison purposes, we introduce slightly modified\nequations:\nX µj (rj − ri ) \u001a 2(β + γ) X µk 2β − 1 X µk\nr̈i = 3 1− −\nj6=i\nrij c2 r\nk6=i ik\nc2 k6=j rjk\n\u00132 \u00132\nvi vj 2(1 + γ)\n\u0012 \u0012\n+γ + (1 + γ) − ṙi · ṙj\nc c c2\n\" #2 \u001b\n3 (ri − rj ) · ṙj\n− 2 3 (2.4)\n2c rij\n1 X µj\n+ 2 3 {[ri − rj ] · [(2 + 2γ)ṙi − (1 + 2γ)ṙj ]} (ṙi − ṙj ),\nc j6=i rij\n\n9\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\nwhere we simply omit the two terms in (2.1) where the acceleration r̈j ap-\npears. Again, the terms in gray refer to the relativistic corrections of general\nrelativity theory. This way, the N-body problem can be re-written as:\n\ny 0 = f (t, y).\n\n## For the sake of comparison, we also introduce the Newtonian equations of\n\nmotion:\nX µj (rj − ri )\nr̈i = 3 . (2.5)\nj6=i\nrij\n\nNow, in order to obtain the positions of each body at a given time t > t0 ,\nwe need to integrate the equations of motion.\nIn what follows, the N bodies considered will be the Sun, the 8 planets,\nPluto, the Earth’s Moon along with the asteroids Ceres, Pallas, Vesta and\nthe asteroid to be studied. Ceres, Pallas and Vesta are the most massive\nasteroids in our solar system, accounting for about 46% of the total mass of\nthe asteroid belt. They are often referred to as the \"Big 3\". The asteroid\nbelt is illustrated in Figure 2.3.\n\nFigure 2.3: The asteroid belt lies in the region between Mars and Jupiter. The\nTrojan asteroids lie in Jupiter’s orbit, in two distinct regions in front of and behind\nthe planet.\n† Image taken from https://solarsystem.nasa.gov/multimedia/display.cfm?IM_ID=850\n\n## Additional forces may be included in the physical model in order to\n\nobtain more accurate numerical results. Some of these forces are:\n\n10\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## • Solar radiation pressure or SRP:\n\nThe Sun exerts electromagnetic radiation on the bodies in the solar\nsystem. This radiation is then absorbed and/or reflected by the body\nation pressure affects mostly small bodies.\n\n• Drag:\nSeveral types of drag can influence a celestial body’s trajectory. For\nexample, magnetic drag and air drag.\n\n• Solar oblateness:\nThe Sun is not exactly spherical. Hence its gravitational field is not\nentirely symmetric as it is modeled using point masses. In order to\ncorrect for this, one needs to take into account the non-sphericality of\nthe Sun. This is also valid for every one of the celestial bodies, none\nof which are perfectly spherical.\n\n• Perturbations from the 300 most massive asteroids in the asteroid belt:\nJust as the planets, Sun and moons attract bodies in space, massive\nasteroids have a gravitational pull and therefore influence the trajec-\ntories of bodies that pass at a certain distance of them.\n\n## • Perturbations from the less massive asteroids in the belt, modeled by\n\na homogeneous ring:\nThe same argument as the previous one holds for the less massive\nasteroids. However, as there is a very large number of these objects\nthat are relatively evenly spaced in the asteroid ring, we can imagine\na homogeneous asteroid ring that would account for the gravitational\npull of all these smaller asteroids combined.\n\n## • Perturbations from the 21 largest Trans-Neptunian Objects (or TNOs):\n\nA TNO is any minor planet in the solar system that orbits the Sun\nwith a greater semi-major axis than Neptune. As for the most mas-\nsive asteroids, TNOs can be taken into account for a more precise\npropagator.\n\n## • Perturbations from other, less massive, TNOs, modeled by a homoge-\n\nneous ring:\nSimilar to the less massive asteroids in the asteroid belt.\n\nEach one of these forces on its own accounts for a very weak gravitational\neffect. However, taken together they would contribute to the accuracy of\nthe numerical solution. However, for the sake of asteroid deflection missions,\nthese terms are not necessary and therefore are not included in the model.\nThey are mainly of interest when building an extremely precise planetary\nephemeris propagator.\n\n11\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## 2.1.2 Hamiltonian formulations\n\nWhen dealing with geometric numerical integration, one usually tries to\nwrite the problem at hand using the Hamiltonian formulation. This is a\nmathematical formalism describing the equations of motion of a dynamic\nsystem. Usually, the Hamiltonian H represents the total energy of the sys-\ntem at hand, i.e.\nH = T + V,\nwhere T and V represent the kinetic and potentiel energy, respectively. More\ngenerally, suppose that H(p, q) : R2d → R is a smooth function of its argu-\nments p, q ∈ Rd . Then the dynamical system t 7→ (p(t), q(t)) defined by the\nequations \n∂H(p(t),q(t))\n ṗk (t) = −\n\n ∂qk\n\n∂p k\n\n## for k = 1, . . . , d, is called a Hamiltonian system. Usually, the variables q\n\nand p refer to the generalized positions and momenta (or velocities) of the\nsystem, respectively. Therefore, we can write the traditional state vector as\ny = (p, q)T . With this, we can write the Hamiltonian equivalently as\n\nẏ = J −1 ∇H(y), with J = 0 Id \u0001\n−Id 0 .\n\n## Note that it is not always possible to find a Hamiltonian formulation for a\n\ngiven problem and as it turns out, it seems extremely complicated to find\none for the problem that we will be considering because of the relativistic\nterms included in the equations of motion. Furthermore, seeing as we want\nto be able to modify the equations of motion by adding perturbing forces to\nmodel deflection processes, it is better to not assume a Hamiltonian system,\nallowing for more flexibility in the perturbing forces.\nThe reason why this Hamiltonian is so important for geometric numerical\nintegration and therefore the reason why mathematicians and engineers use\nit whenever it is possible is because it has been found that by using this\nformalism, some very nice results are true and can be used. These results\nare linked to the notion of symplectic solvers.\nA linear map A : R2d → R2d is said to be symplectic if\n\nAT JA = J,\n\n## with J defined above. Similarly, a differentiable map g : U → R2d is said to\n\nbe symplectic if\n\u0001T\ng 0 (p, q) Jg 0 (p, q) = J ∀(p, q) ∈ U.\n\n## Symplectic maps have the property of preserving volumes. Now, if Φh (y0 ) is\n\nthe numerical flow of a one-step method (see 2.2 for more about numerical\n\n12\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\nmethods and the definition of one-step methods), i.e. y1 = Φh (y0 ), then the\nmethod is said to be symplectic if\n\n∂ΦTh ∂Φh\n(y0 )J (y0 ) = J ∀y0 .\n∂y0 ∂y0\nIt can be shown that symplectic solvers nearly preserve the Hamiltonian of a\nsystem. Hence, when the Hamiltonian represents the total energy and when\nusing a symplectic solver, the numerical total energy is preserved just as it\nis in the physical one (when conservation of energy applies). This is usually\na very attractive property.\n\n## We will not be considering symplectic solvers. In fact, the perturb-\n\ning forces that will be included in order to model the asteroid deflections\nbreak the conservation of energy and in fact traditional Lagrangian and\nHamiltonian mechanics cannot be used with non-conservative systems. Note\nthat even if a Hamiltonian were available for the N-body problem, it would\nalmost certainly not be separable, i.e. it would not be possible to write\nH = T (v) + U (r) where the kinetic energy T only depends on the velocities\nand the potential energy U only depends on the positions. As a consequence,\nit would not be possible to use an explicit method of integration, unless a\nsplitting is used. In a splitting, we write r̈ = (A + B)r where A is the\nHamiltonian part and B is whatever cannot be written in this formulation\n(this can be seen as a perturbation from a Hamiltonian system). Then we\ncan use a symplectic method on A.\n\n## 2.1.3 Derivation of the equations of motion\n\nThe equations of motion given in equation (2.1) are to be understood as a\nperturbed version of the Newtonian equations of motion shown in equation\n(2.5). The perturbations, which will often be referred to as the relativistic\nterms, account for effects from general relativity. The Newtonian, or unper-\nturbed equations come from Newton’s second law of motion F = ma and\nhis law of universal gravitation F = GM r2\nm\n. Below, we will give a short de-\nscription of how the relativistic terms came to be included in the equations\nof motion.\n\n## In 1957, Infeld suggested deriving the post-Newtonian equations for the\n\nN-body problem from the variational principle of the Theory of General\nRelativity, or GRT field equations, using the linearized mass tensor. We\nwill not give extensive details here. Instead, we refer the reader to and\n for more details.\nAs a starting point, we need the GRT field equations, also known as the\nEinstein Field Equations, or EFE. In fact, the basic idea of GRT is that\nthe properties of spacetime are determined by motion and distribution of\n\n13\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## masses and, conversely, motion and distribution of masses are determined\n\nby the field metric. The EFE equation is:\n1 8πG\nRµν − Rg µν + g µν Λ = 4 T µν , (2.6)\n2 c\nwhere Rµν is the Ricci curvature tensor, R is the scalar curvature, g µν the\nmetric tensor, Λ the cosmological constant (whose value is the energy den-\nsity of the vacuum of space), c the speed of light, G Newton’s gravitational\nconstant and T µν the stress-energy-momentum tensor. The indices µ and ν\nare the spacetime dimensions. They can each take 4 values: 0,1,2 or 3 where\n0 represents time, 1 the x variable, 2 the y variable and 3 the z variable.\nNote that the term g µν Λ is very small so it is almost always left out (it is\nonly useful when dealing with large cosmological scales).\nThese equations describe the fundamental interaction of gravitation as a\nresult of spacetime being curved by matter and energy. They are used to\ndetermine the geometry of spacetime resulting from the presence of mass-\nenergy and linear momentum. The solutions of EFE, are the components of\nthe metric tensor g µν . Exact solutions for the EFE can only be determined\nunder simplifying assumptions such as symmetry.\nThe left hand side of the EFE refers to the curvature of spacetime while the\nright hand side has to do with mass and energy. This is the basic idea of\nGRT: the properties of spacetime, i.e. the spacetime metric are governed\nby the motion and distribution of masses and, conversely, the motion and\ndistribution of masses are determined by the field metric. Hence the EFE\ncan be understood as follows:\n\nMass tells spacetime how to curve and curved spacetime tells mass how to\nmove.\n\nNow, let\n\nZ\nSg = −gRdΩ,\n\n## where dΩ = cdtd3 x. We want to compute the variation of this integral.\n\nUsing the variation of the Ricci tensor, the definition of the determinant g\nand the definition of the Christoffel symbols, it can be shown that\n1 √\nZ \u0012 \u0013\nδSg = − Rµν − Rg µν −gδg µν dΩ. (2.7)\n2\nNotice that the inside of the parenthesis coincides with the left-hand side of\nthe EFE equation (2.6). Now consider the action integral\n\nZ\nSm = ρ ∗ (c2 + Π) −gdΩ,\n\n14\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## with ρ∗ being an invariant density satisfying the equation of continuity and\n\nΠ being the potential compressional energy. Using the variation of ρ∗, we\nfind\n1 2 √\nZ\nδSm = c T µν −gδg µν dΩ (2.8)\n2\nUsing (2.6) along with (2.7) and (2.8), we see that the EFE follow from the\nvariational equation\nδ(2c−2 κSm − Sg ) = 0. (2.9)\nc4\nMultiplying (2.9) by 16πG , we can rewrite it as\nZ \" #\nc4 √ ds\nδ −gJ + c2 (1 + c−2 Π)ρ 0 dΩ = 0\n16πG dx\n\nUsing the fact that dΩ = cdtd3 x is the elementary 4-volume, Infeld and\nPlebansky show that this principle can be re-written\nZ\nδ Ldt = 0\n\nwith Z \" #\nc4 √ ds\nL=− −gJ + c2 (1 + c−2 Π)ρ 0 d3 x\n16πG dx\nto treat L as the Lagrangian of the post-Newtonian N-body problem. The\nintegral is to be understood as the sum of all the integrals taken over the\nvolumes of the bodies. After a few pages of math, one comes to the following\nresult, also known as the Einstein-Infeld-Hoffman, or EIH equation:\nX\u001a 1 1 X mi mj 1 1 1 X mi mj\n\u0014\nL= mi vi2 + G + 2 mi (vi2 )2 + G\ni\n2 2 j6=i rij c 8 4 j6=i rij\n1 1 X mi mj (mi + mj )\n\u0012 \u0013\n× 3vi2 + 3vj2 − 7vi · vj − (vi rij )(vj rij ) 2 − G2 2\nrij 4 j6=i\nrij\n1 X X 1 1 1\n\u0012 \u0013\u0015\u001b\n− G2 mi mj mk + + .\n6 j6=i k6=i,j\nrij rik rji rjk rki rkj\n\n## In 1971, Frank B. Estabrook from NASA’s Jet Propulsion Laboratory (JPL)\n\nused this Lagrangian in order to derive the conservative PPN N-body La-\n\n15\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\ngrangian :\n1X 1 X 1 + 2γ X X µi µj 2\nL= µi vi2 + 2 µi (vi2 )2 + (vi + vj2 )\n2 i 8c i 4c2 i j6=i\nrij\n\n3 + 4γ X X µi µj\n− ṙi · ṙj (2.10)\n4c2 i j6=i\nrij\n1 X X µi µ j 1 X X µ i µj\n− 2 3 {(rj − ri ) · ṙj } {(rj − ri ) · ṙi } +\n4c i j6=i rij 2 i j6=i rij\n2β − 1 X X µi µj (µi + µj ) 2β − 1 X X X µi µj µk\n− 2 − ,\n4c2 i j6=i\nrij 2c2 r r\ni j6=i k6=j ij jk\n\nThis Lagrangian will in turn yield the equations of motion given in (2.1).\n\n## 2.2 Numerical Integration\n\nIn numerical integration of dynamical systems, we look for the solution y(t)\nto problems of the form\n(\ny 0 (t) = f (t, y(t))\ny(0) = y0\n\n## with f : R × Rn → Rn and y0 ∈ Rn for some n ≥ 1. These are also known\n\nas Initial Value Problems, or IVPs because of the necessity of providing the\ninitial conditions, or initial values, y0 .\nGiven this problem and a time step h ≥ 0, the fundamental theorem of\nZ t0 +h\ny(t0 + h) = y(t0 ) + f (τ, y(τ ))dτ.\nt0\n\n## It is the integral that must be approximated numerically in order to obtain\n\nthe solution at the end time t0 + h.\nThe solution at time t given the initial conditions y0 is denoted\n\ny(t, 0, y0 ) = φt (y0 ),\n\nand is called the exact flow of the problem. Similarly, the numerical flow is\nΦh (y0 ) with h the time step.\n\n## 2.2.1 Geometric numerical integration\n\nConsidering the nature of the problem and its solution, geometric integra-\ntion is most appropriate. In fact, geometric integration deals with integra-\ntors that preserve some geometric properties of the exact solution. In fact,\n\n16\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## physical problems often have properties of conservation or symmetry. In\n\nsome cases, these properties are fundamental and therefore it is desirable to\nobtain a numerical method that preserves them. However, not all problems\nhave these inherent properties. It is therefore important to understand the\nphysics of the system modeled in order to know whether or not we want\nthe numerical scheme to preserve certain properties. Often, we look at re-\nversibility, symplecticity and conservation of first integrals. These can be\nmathematically formulated as follows:\n\n• Reversibility:\nΦ−h (Φh (y0 )) = y0 ,\ni.e. we should be able to go forward in time with a step size h and\nthen back to where we started (with a step size −h) and arrive exactly\nwhere we started.\n\n• Symplecticity:\n∂ΦTh ∂Φh\n(y0 )J (y0 ) = J ∀y0 .\n∂y0 ∂y0\nIt is difficult to give a geometric or physical explanation of this prop-\nerty without introducing manifolds and symplectic geometry. For this\nreason, we will simply say that it is a mathematical property of nu-\nmerical integrators that can be used in simple classical mechanics.\n\nI(y1 ) = I(y0 )\n\n## where y1 = Φh (y0 ) and I is a first integral of the system. First integrals\n\nd\nare characterized by the simple equation dt I(y(t)) = 0, meaning that\nI is constant along the trajectory y(t).\n\nIt turns out that the preservation of these properties makes for a favorable\nlong-term behavior.\nHowever, implementing solvers that preserve symplecticity, for example, re-\nduces the flexibility in equations of motion, as discussed in Section 2.1.2.\n\n## 2.2.2 Accuracy requirements\n\nIn the context of this thesis, it is important to introduce the concept of\nkeyholes. Keyholes are defined as specific regions in space with a very par-\nticular property. In fact, if an object were to pass through a keyhole, it\nwould eventually collide with Earth. The smallest keyholes are less than\n1 kilometer in diameter and the largest ones are about 1000 kilometers in\ndiameter. This is the reason behind the need for the high accuracy of the\npropagator stated, as stated in Section 1. If we want to know whether or\n\n17\nSECTION 2. PHYSICAL AND MATHEMATICAL BACKGROUND\n\n## not an asteroid will be passing through a keyhole, we need it’s position to be\n\nknown with an error less than 1000 kilometers (assuming a large keyhole),\nwhich is quite a small distance in astronomical terms.\nFurthermore, since we would like to be able to study slow push methods\nof deflection, the timespan of the numerical integration needs to be long\nenough (at least 10 years which is about the time necessary to complete\nslow push methods).\nWe remark that the only accuracy requirement that remains when all exter-\nnal sources of uncertainty are removed is that of the size of a keyhole. This\nmeans that, assuming no propagation or measurement errors, it should be\npossible to avoid an asteroid passing through a keyhole by deflecting it as\nmuch as the diameter of the keyhole. For example, Apophis’ 2036 keyhole\nis approximately 700 meters in size and therefore a 1 kilometer deflection\nwould move Apophis (whose diameter is about 325 meters) completely out\nof this keyhole.\n\n18\nSection 3\n\n## PAT2: Propagator for\n\nAsteroid Trajectories Tool\n\n## Figure 3.1: An intercept satellite racing toward an asteroid. Studies by Iowa\n\nState University’s Bong Wie indicate such a vehicle could blast apart asteroids\nthat threaten Earth.\n† Image taken from http://www.news.iastate.edu/news/2013/03/06/asteroiddeflection\n\n## As stated previously, we want to explore different options in terms of\n\npossible propagators.\nFor this reason, we build a new propagator, PAT2 (pronounced pat squared)\nusing MATLAB. Similarly to other propagators, PAT2 requires the user to\ninput a time span as well as initial positions and velocities of the bodies\n\n19\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\n## considered and outputs an ephemeris giving the positions (and velocities)\n\nof all these objects at any time in the specified timespan. The flow chart\nillustrating the inner working of PAT2 is shown in Figure 3.2, where the\narrows show the direction of flow between the pink ellipses representing the\ninput data, the green rectangles the processes and the purple ellipses the\noutput data. The timespan and initial conditions are necessary inputs. All\nother inputs have default values but can be easily modified, if necessary.\n\n## 3.1 Mathematical and Physical Model\n\nThe mathematical and physical foundation for PAT2 is that described in\nSection 2.1.1, with the equations of motion including all relativistic terms.\nThe bodies included in the model are the Sun, the 8 planets, Pluto, the\nMoon, the Big 3 (Ceres, Pallas and Vesta) as well as the asteroid whose\ntrajectory we would like to study. Note that the initial conditions can be\ntaken to be the positions and velocities of the barycenters of each body\nrather than the body centers (except for planet Earth because its moon is\nexplicitly included in the model). For bodies with no moons, this will not\nchange anything. However, for planets such as Jupiter, who has 50 moons or\nSaturn who has 53 moons, there will be a difference between the barycenter\nof the planet-moon system and the center of the planet. Considering these\nbarycenters instead of the body centers can somehow compensate for the\nfact that the moons are not included in the physical model. Note that if we\nconsider the barycenter of a planet-moon system, we must adapt the mass,\ni.e. if we want to model the Jupiter-moons system, we must use the total\nmass of the system which is the sum of the planet and its moons.\n\nIn contrast to most propagators out there, PAT2 only uses data for initial\nconditions and treats all bodies the same way. In fact, most of the other\nasteroid propagators available only propagate the trajectory of one single\nbody, the asteroid. The positions and velocities of all other bodies in the\nmodel are queried from a previously generated ephemeris. The reason for\ngoing with the first philosophy (of propagating all bodies rather than just the\nasteroid) is simple: in the latter situation, each time step requires a query\nfrom an ephemeris file. This requires access to such a file. Moreover, the\ncode must be modifiable in order to include perturbing forces, e.g. kinetic\nimpactors or slow push methods and therefore the equations of motion must\nbe available and they must be easy to modify.\nOf course, choosing to propagate 15 bodies instead of just 1 will make for a\nconsiderably longer runtime. However, as long as runtime stays reasonably\nshort when propagating the 15 bodies, this method is acceptable.\nNote that is it also possible to modify the PPN parameters β and γ . As a\nreminder, β and γ measure the nonlinearity in superposition of gravity and\n\n20\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\nInitialize\nmodel\n\nNumerical\nintegration\n\nOutput\n\nAsteroid Total\n\n## State Numerical Numerical\n\nvectors error energy\n\n## Planets Maximum Time t Ratio\n\nFigure 3.2: Flow chart describing the inner workings of PAT2 . The pink ellipses\nrepresent the input data, the green rectangles the processes and the purple ellipses\nthe output data. The arrows show the direction of flow. The timespan and initial\nconditions are necessary inputs. All other inputs have default values but can be\neasily modified.\n\n21\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\nMaximum Minimum\nPositions 4.8 · 109 8.1 · 103\nVelocities 3.7 · 101 2.4 · 10−4\n\nTable 3.1: Maximal and minimal (absolute) values for the positions, velocities and\naccelerations using units of seconds for time and kilometers for distances. Using\nthese values will lead to significant roundoff errors.\n\nMaximum Minimum\nPositions 4.8 · 104 8.1 · 10−2\nVelocities 1.2 · 104 7.6 · 10−2\n\nTable 3.2: Maximal and minimal (absolute) values for the positions, velocities and\naccelerations using units of sidereal years for time and hundred thousand kilometers\n(105 km) for distances. Using these values significantly reduces roundoff errors and\nenables meaningful values of tolerances.\n\n## the space curvature produced by unit rest mass, respectively. In general\n\nrelativity, β = γ = 1. Modifying these values allows exploring different\nrelativity theories.\n\n3.2 Rescaling\nOnce the user has supplied the initial conditions, PAT2 rescales the problem\nso as to avoid the unwanted effects of roundoff error and to ensure that all\nvariables are at the same scale. In fact, the N-body problem considered here\nwith its usual units of time (seconds) and distance (kilometers) is prone to\na lot of numerical noise. For example, when computing the first term of\n(2.1) which is proportional to r13 with r = O(108 ) we come below machine\nprecision and therefore introduce unnecessary numerical errors. Of course,\nthis will depend on the machine on which the simulation is run and on the\nlanguage used. With a 64 bit machine (MacBook Pro, Intel Core i5) and a 64\nbit double precision language (MATLAB R2014a), the machine precision is\n\u000f ≈ 2.2·10−16 . As a reminder, machine precision is the smallest value \u000f, such\nthat 1 + \u000f and 1 have different floating point representations. Computing\nwith values smaller than \u000f causes a lot of unwanted and avoidable errors.\nNote that a way of overcoming this issue could be to use another language,\nsuch as FORTRAN that uses 128 bit representation. However, we will chose\nto stay with MATLAB and rescale the problem.\nThe units chosen for the rescaling are sidereal years for time and hundreds\nof thousand kilometers (105 ) for distances. This way, we avoid unnecessary\nroundoff errors. Furthermore, by doing this we obtain positions, velocities\n\n22\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\n(and accelerations) that are of the same scale, which is a desirable property\nwhen assigning tolerances to the numerical method. In fact, the variables\nin this problem are of significantly different scales, as shown in Tables 3.1\nand 3.2.\n\n## 3.3 Numerical Integration Scheme\n\nNow, with the problem rescaled, PAT2 calls the MATLAB function ode113.\nThis is a built-in function aimed at solving non-stiff differential equations.\nIt is a variable step size and variable order method, with orders ranging\nfrom 1 to 13. ode113 was designed for problems with stringent error tol-\nerances and for solving computationally intensive problems. It is based on\na variable order Adams-Bashforth-Moulton (or ABM) solver. This solver is\na predictor-corrector method based with PECE (Predict-Evaluate-Correct-\nEvaluate) implementation. ABM methods are, as are all numerical inte-\ngration methods, based on the fundamental theorem of calculus. Given a\nproblem\ny 0 (t) = f (t, y(t)),\nand points t0 , t1 , . . . , tk , tk+1 , we have\nZ tk+1\ny(tk+1 ) = y(tk ) + f (τ, y(τ ))dτ, k ∈ N.\ntk\n\nABM methods use a number of previous points (tk−s , fk−s ),...,(tk−1 , fk−1 ),\n(tk , fk ) to construct the Lagrange polynomial approximation p(t, y(t)) of\nf (t, y(t)) passing through these points. Then\nZ tk+1\ny(tk+1 ) ≈ y(tk ) + p(τ, y(τ ))dτ, k ∈ N.\ntk\n\n## can easily be integrated over the interval [tk , tk+1 ] as p it is a polynomial.\n\nThis method, known as the Adams-Bashfourth method (AB), is explicit\nsince all the pairs (tk−s , fk−s ),...,(tk , fk ) are known at time tk .\n(AB) produces the predictor formula\nZ tk+1\npk+1 = yk + p(τ, y(τ ))dτ\ntk\n\nthat can be used for a rough estimate (tk+1 , pk+1 ) of (tk+1 , y(tk+1 )).\nWe can now do the same thing and construct a Lagrange polynomial approx-\nimation of f , this time using the unknown point (tk+1 , fk+1 ). This yields\nan implicit method known as the Adams-Moulton method (AM) which pro-\nduces the corrector formula. Since it is an implicit method, it requires several\niterations. The value of the corrector pk+1 is used as the initial guess for\nyk+1 . The corrector formula should give a more accurate approximation to\n\n23\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\nSolver\node45 ode113\n10−4 12’692 6’779\n\nTolerance\n10−5 16’226 8’667\n10−6 21’224 10’830\n10−7 34’544 13’179\n\n## Table 3.3: Number of function evaluations needed to obtain a certain tolerance\n\nlevel. Here, we consider the barycenter model used to propagate the positions of\nthe asteroid Apophis.\n\n## y(tk+1 ) than the predictor would because it is of higher order. Therefore,\n\nby comparing the two, predictor and corrector, we can determine if the step\nsize should be increased or decreased.\n\n## This is a multistep method because it requires the solutions at several\n\npreceding time points in order to compute the next solution. In contrast, a\none-step method only needs the previous solution in order to compute the\nnext. This is the case for Runge-Kutta methods, for example. Because ABM\nis a multistep method, it requires the knowledge of several steps before it\ncan begin. These first steps typically are taken using one-step methods such\nas Runge-Kutta.\n\nThe method presented here is not symplectic. The reason for not chos-\ning such a solver has been explained previously. Here, we remind the main\nreason of this choice. As a reminder, the ultimate goal will be to have a\npropagator that can be used in deflection missions and therefore some per-\nturbing forces will be included in the equations of motions. These perturbing\nforces will only be applied during a certain timespan, shorter than the in-\ntegration timespan. The entire concept of deflection missions is based on\nmodifying the energy of a potentially hazardous asteroid in order to change\nits trajectory, and hence we are not looking to conserve the total energy of\nthe system.\n\n## In order to evaluate ode113’s quality, we compare its results to those\n\nobtained using ode45 (which is based on a Runge-Kutta method). The idea\nis that the error is controlled in the numerical schemes through the choice of\ntolerances. Therefore, the results obtained with ode113 or ode45 (or another\nmethod) for a given tolerance should be almost the same. As a reminder, a\ntolerance of 10−3 corresponds to 0.1% error. Similarly, a tolerance of 10−6\n\n24\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\n## Error [km] Marg. improv. [km] Runtime [min]\n\n10−3 ? ? ?\n10−4 310.0709 - 8.5\nTolerance\n\n## 10−5 273.1395 36.9314 10.5\n\n10−6 272.4092 0.7303 11.3\n10−7 272.4018 0.0074 15.5\n10−8 272.4020 −2 · 10−4 20.5\n\nTable 3.4: Numerical error (in absolute value, compared to HORIZONS) in the last\ntime step. Here, we consider the asteroid Apophis during the timespan 2014-2024.\nEach error (computed against HORIZONS) is then compared to that obtained\nwith the previously assigned tolerance (one order of magnitude less), yielding the\nmarginal improvement of a smaller tolerance. The star symbol ? indicates that the\nsolver crashes given the specified tolerance.\n\n## corresponds to an error of 0.0001%. Tolerances have no unit.\n\nFor stable systems, if we control the error in each time step, we effectively\ncontrol the global error. In fact, for stable systems, the global error is\nproportional to the per-unit-step error and therefore we can control the\nglobal error by controlling the per-unit-step error. This however is not true\nwith unstable systems. In fact, when simulating an analytically unstable\nsystem, it can no longer be assumed that the global integration error is\nproportional to the per-unit-step integration error, since integration error\ncan accumulate excessively across multiple steps.\nThe difference in performance between two solvers will therefore be in how\nefficient it is, i.e. how many times it needs to evaluate the equations of\nmotion. This in turn reflects how much runtime will be needed. Table\n3.3 shows the total number of function evaluations for ode113 and ode45\ngiven certain tolerances. We first notice that for both ode45 and ode113,\na smaller tolerance requires a higher number of function evaluations, as\nexpected. Moreover, the number of function evaluations, given a certain\ntolerance, is always higher for ode45. This means that ode113 is more\nefficient in obtaining similar results. Another way to look at it, is that\nfor a given number of function evaluations, ode113 will produce a solution\ncorresponding to one obtained with ode45 with a tolerance of at least two\nto three orders of magnitude bigger.\n\n## Furthermore, we want to check that by using a smaller tolerance, we\n\nobtain better numerical results. Table 3.4 shows the numerical errors ob-\ntained in the last time step using ode113 with different tolerance levels.\n\n25\nSECTION 3. PAT2 : PROPAGATOR FOR ASTEROID\nTRAJECTORIES TOOL\n\nThe star symbol (?) that appreas in the first line of the table indicates that\nthe numerical scheme crashes given the tolerance of 10−3 . What happens is\nthat given a large tolerance, the solver produces numerical errors that are\nrelatively large. As the problem is unstable, these errors increase drastically\nand therefore it is no longer possible for the solver to achieve desired accu-\nracy without going below the allowed minimum step size. Therefore and the\nscheme stops. Besides this phenomenon, we observe that when going from\na tolerance of 10−4 to 10−5 , i.e. increasing the accuracy, there is almost\na 40 kilometer improvement on the error in the last step. We notice that\nthis improvement dampens as tolerance is decreased more, suggesting that\nthe problem with this formulation and solver has a lower bound on error.\nNote that there are different error metrics that can be considered. Here,\nwe chose to study the error in a given point (the last point). However, we\nmight be interested in comparing the \"worst\" or highest error that occurs\nduring the 10 year timespan. For the study of deflection, this metric makes\nsense because of the ultimate goal to keep the error under a 1000 kilometer\nthreshold. Another error metric could be the integral of the error over the\nentire integration. Then, by dividing by the timespan, we obtain an average\nof the error. We will not explore this metric further.\n\n3.4 Output\nOnce the integration is complete, PAT2 brings the results back to their\ninitial scales of seconds for time and kilometers for distances. If a timespan\nis specified as [t0 , t1 , . . . , tn ], then the output of the numerical integration\nwill be the state vector evaluated in these n points. Otherwise, if only an\ninitial and final time t0 and tf are specified, then the solver will return a\nstructure which can be evaluated at any time between t0 and tf . In Appendix\nA, we will briefly discuss polynomial interpolation that is used in order to\nobtain solutions at any point in the timespan and the errors that occur as\na consequence.\nSimple flags allow the user to make plots for the outputted trajectories, the\nnumerical errors and the energy.\n\n26\nSection 4\n\nBenchmark comparisons\n\nFigure 4.1: Artist’s conception of a catastrophic asteroid impact with the early\nEarth.\n† Image taken from http://solarsystem.nasa.gov/news/display.cfm?News_ID=23777\n\n## In this section, we will explore different possibilities regarding available\n\nasteroid propagators and compare the results that they produce in order to\nchoose the solution that is most appropriate for our study.\n\n## 4.1 Possible Candidates\n\nAs stated previously, there exist some ready to use propagators. Some ex-\namples are JPL’s HORIZONS, NASA’s GMAT (General Mission Analysis\n\n27\nSECTION 4. BENCHMARK COMPARISONS\n\nInitialize\nInit. state vector Timespan\nmodel\n\nNumerical\nintegration\nephemeris\nPlanetary\n\nOutput\n\nAsteroid\nstate\nvector\n\nFigure 4.2: Flow chart describing the inner workings of HORIZONS (and many\nother available propagators). The pink ellipses represent the input data, the green\nrectangles the processes, the orange cylinder the required database and the purple\nellipses the output data. The arrows show the direction of flow\n\n## Tool) or AGI’s STK (Systems Tool Kit).\n\nHORIZONS is an online solar system ephemeris computation service that\nprovides highly accurate ephemerides for solar system objects such as plan-\nets, asteroids, comets and satellites. Uncertainties in major planet ephemerides\nin HORIZONS range from 10 centimeters to over 100 kilometers.The avail-\nable timespan in HORIZONS differs from body to body, but in general\nis quite large. Using its web-interface, one can specify the body whose\nephemeris is of interest as well as the coordinate origin, the time span of\nthe ephemeris and the units to be used. Unfortunately, the source code for\nHORIZONS is proprietary and therefore it is impossible to see or modify\nit. Hence it is not possible to model defleciton mission with this tool. The\nflow chart illustrating the inner workings of HORIZONS is shown in Figure\n4.2, where the arrows show the direction of flow between the pink ellipses\nrepresent the input data, the green rectangles are the processes, the orange\ncylinder the required database and the purple ellipses the output data.\n\nGMAT is a more general tool that can be used for planning any space\nmission. It is intended for mission optimization and mission analysis. By\nmodelling the asteroid whose trajectory we want to study as a satellite, we\ncan use GMAT to propagate its trajectory given initial positions and ve-\nlocities. GMAT uses data from JPL’s ephemerides for all the other bodies\n\n28\nSECTION 4. BENCHMARK COMPARISONS\n\nconsidered in the model, i.e. it only propagates the position of the \"satel-\nlite\". This makes for a fast-running propagator. GMAT is an open-source\nsystem, allowing for a personalization of the software. GMAT has a user\ninterface that allows the user to select the desired coordinate system, initial\nconditions, time span, force model and integrator.\n\n## STK is a tool used to model complex systems such as aircrafts, missiles\n\nand satellites. It allows the user to visualize dynamic datasets in four di-\nmensions (space and time). It has a component called \"Astrogator\" that\nallows analysis in deep space. However, STK was built for missions close to\nEarth. As a consequence, its deep space capabilities are far from being its\nstrong suit. As with HORIZONS, STK does not share its source code so no\nuser modifications are possible.\n\nAs real data (positions and velocities) for solar system bodies is hard to\nobtain, we will be using HORIZONS as a reference and comparing all other\nresults from other propagators to the data generated by this system. Hence\nHORIZONS data will, from now on, be considered as the truth.\nIn order to get an idea of the quality of each propagator, including PAT2 , we\nwill compare the propagated trajectories of a given asteroid, Apophis, over\nthe 10 year time span (Januray 1st 2014 to Januray 1st 2024). Note that the\nclose approach in 2029 is not included in this timespan. We mention this\nfact because close approaches make for bigger numerical errors. In fact, a\nclose approach means a fast increase in acceleration which can be missed by\nthe numerical integration. However, if we are aware that a close approach\nwill happen during the numerical integration timespan, a tighter tolerance\ncould help in avoiding bad results. Note that this is not a property exclu-\nsive to PAT2 . In fact, any numerical results obtained with an integrator not\nspecifically designed and built with fast changes in acceleration in mind (see\nAppendix A) will suffer during close approaches. It is therefore important\nto be aware of this issue and chose the appropriate tolerances.\n\n## Again, the trajectories will all be compared to those of HORIZONS\n\nand the initial positions and velocities needed will be taken from the same\ndatabase. Note that HORIZONS is updated regularly and so initial condi-\ntions queried from this system at different times may be different. As the\nN-body problem is chaotic, these small changes in initial conditions may\nhave a big impact on the propagated trajectories.\nRealistically, only GMAT would be an actual propagator candidate for the\nstudy of deflection missions as it is the only one of the studied solutions\nwhose code is open source.\n\n29\nSECTION 4. BENCHMARK COMPARISONS\n\n## Runtime Error (last step) [km]\n\nHORIZONS instantaneous -\nGMAT a few seconds ≈ 5.4 · 106\nPAT2 8.5 min. ≈ 310\n\n## 4.2 Benchmarking Results\n\nThe results obtained for the benchmarking problem using GMAT are shown\nin Table 4.1 (section 5 provide more information on the definition of numer-\nical error). The results for STK are not shown here as obtaining meaningful\nresults seemed to be infeasible. In fact, it seems that STK uses an Earth-\ncentered coordinate system even when specified otherwise. Again, STK was\nnot built for deep space mission and therefore its use for analysis beyond\nEarth is quite tricky. As this is not a viable solution for asteroid deflection\nmissions anyway, we will not be pursuing it any further in this context. A\nsimilar remark can be made for GMAT. We believe that it is possible to\nobtain better results using this tool. However, we were not able to do so\nwithin a reasonable time frame and amount of work. In fact, in , the\nauthors claim to obtain 1500 kilometer errors with GMAT (and 8000 kilo-\nmeter errors within STK). However, with no details on the initial conditions\nused, and the precise trajectories to which the output is compared to, it is\nhard to reproduce similar results.\nAgain, if there were a close approach during the simulated timespan, the\nerrors would be bigger. As the ultimate goal is to have as small an error\nas possible, we will not be using GMAT. Instead, PAT2 will be used for the\ncase studies in Section 5.\n\n30\nSection 5\n\nCase Studies\n\nFigure 5.1: Artist’s conception shows how families of asteroids are created. Over\nthe history of our solar system, catastrophic collisions between asteroids located in\nthe belt between Mars and Jupiter have formed families of objects on similar orbits\naround the sun.\n† Image taken from http://photojournal.jpl.nasa.gov/catalog/PIA17016\n\nNow that the propagator PAT2 has been chosen, we will take a closer look\nat the results obtained using it.\nTo do so, we will be taking a closer look at five different asteroids. These are\nApophis, Icarus, 2007 FT3, 2009 VZ39 and 2008 FF5 whose orbits are shown\nin Figure 5.2. The last three of these have been picked from NASA’s Sentry\ntable which lists the bodies with potential future Earth impact events.\nNote that not all of the bodies on this list have diameters big enough for\nthem to enter Earth’s atmosphere and therefore they are not all hazardous\nto us. The asteroids mentioned above are chosen because of the differences\n\n31\nSECTION 5. CASE STUDIES\n\nFigure 5.2: Orbits of the asteroids considered for the case studies. These asteroids\nare: Apophis, Icarus, 2007 FT3, 2009 VZ39 and 2008 FF5.\n\n## in three important orbital parameters: eccentricity, inclination with respect\n\nto the ecliptic plane and size (which itself is related to mass). In fact, we\nwant to evaluate how PAT2 behaves with respect to different values in these\nparameters in order to assess if it can be used on any asteroid and if some\ntypes of asteroid parameters yield better numerical results.\nThe timespan studied here will be from January 1st 2014 to Januray 1st\n2024, corresponding to 3652 Earth days.\nNote that given the physical model and variables used in PAT2 , we are able\nto study the trajectory of any of the objects considered i.e. the Sun. the 8\nplanets, Pluto and the Big 3. However, we will focus on that of the asteroids\nbecause of the end goal of this thesis.\nIn this section as well, HORIZONS data will be considered as the truth.\nHence, from now on, the real positions and velocities will refer to those\nqueried from HORIZONS.\n\nWe suspect that bodies on orbits with small eccentricities will have bet-\nter results than those with high eccentricities, the key idea being that a\nhigh eccentricity makes for big and fast changes in acceleration along the\ntrajectories which can be missed by the numerical integrator. We might also\nsuspect that high inclinations influence the accuracy of the solution.\n\n32\nSECTION 5. CASE STUDIES\n\n## As far as numerical errors are concerned, if t0 and tf are the initial\n\nand final integration times respectively, rApo (tk ) is Apophis’ true position\n(i.e. taken from HORIZONS) at time tk and r̃Apo (tk ) is the corresponding\nnumerical solution obtained with PAT2 , then the numerical error at time tk\n(at output) is defined as\n\n## eApo (tk ) = r̃Apo (tk ) − rApo (tk ) ∈ R3 ∀ t0 ≤ tk ≤ tf .\n\nEquivalent definitions will be used for the other asteroids studied here.\n\n## It is important to note that when using an integration scheme with error\n\ncontrol, the error (in each component, not the one defined above) at each\ntime step is computed. The idea is that for stable systems, controlling\nthe local error (error at each time step), we control the global error. In\nfact, the local error is proportional to the global error for stable systems.\nHowever, this is no longer true for unstable systems. This means that if\nwe have a stable system, we can check that the global error is consistent\nwith the prescribed tolerance. This cannot be done with unstable systems.\nNevertheless, error control is still important for unstable problems as we\nknow that small errors can explode.\n\n5.1 Apophis\nAs stated previously, Apophis was put in the spotlight because of initial\nobservations and computations that indicated a high probability (around\n2.7%) that it would collide with Earth. This lead to a big number of scientific\npublications focusing on this asteroid. For this reason, Apophis will be the\nobject of our first case study.\n\n## Diam. Mass Orb. period Semi-maj. axis Inclin. Eccentr.\n\n325 m 3.9 · 1010 kg 0.89 years 0.922 AU 3.3 deg 0.191\n\n## Some of Apophis’ relevant physical data is given in Table 5.1. Note\n\nthat its diameter of 325 meters would allow Apophis to survive entering\nEarth’s atmosphere. According to Table 1.1, if a collision with Earth were to\noccur, we could expect a large sub-global event causing around 500 thousand\n\n33\nSECTION 5. CASE STUDIES\n\nFigure 5.3: Orbit of Apophis during the timespan 2014-2024 (data taken from\nHORIZONS).\n\n## fatalities. Furthermore, with a small inclination of 3.3 degrees, Apophis’\n\norbit lies almost in the plane of the ecliptic along with the rest of the planets,\nincluding Earth.\n\nApophis’ orbit is shown in Figure 5.3. We see that this orbit lies almost\nin the ecliptic plane (which coincides with the xy plane).\n\n## Apophis’ trajectories are propagated using PAT2 over a 10 year period\n\n(Januray 1st 2014-Januray 1st 2024) using an initial state vector extracted\nfrom HORIZONS. The barycentric model is used here, i.e. for bodies with\nmoons (except Earth because its moon is explicitly included in the model)\nwe will consider the barycenters of the planet-moon systems, rather than\nthe body centers.\n\nIn Table 5.2, we compare the numerical errors in the last time step given\nsuccessively decreasing tolerances along with the marginal improvements\nand associated runtimes. As explained in Section 3.3, the star symbol ?\nindicates that the solver crashes given the tolerance of 10−3 due to the in-\nherent instability of the N-body problem. Therefore, it is required to use a\ntolerance smaller than 10−3 in order to solve this problem.\nWe expect to see a decreasing numerical error and an increasing runtime as\nthe tolerance is reduced. This is a typical tradeoff between accuracy and\nruntime. In Table 5.2, we can see that by choosing a tolerance of 10−5 in-\n\n34\nSECTION 5. CASE STUDIES\n\n## Error (last step) [km] Marg. improv. [km] Runtime [min]\n\n10−3 ? ? ?\n10−4\nTolerance\n\n310.0709 - 8.5\n10−5 273.1395 36.9314 10.5\n10−6 272.4092 0.7303 11.3\n10−7 272.4018 0.0074 15.5\n10−8 272.4020 −2 · 10−4 20.5\n\nTable 5.2: Numerical error (in absolute value, compared to HORIZONS) in the last\ntime step. Here, we consider the asteroid Apophis during the timespan 2014-2024.\nEach error (computed against HORIZONS) is then compared to that obtained\nwith the previously assigned tolerance (one order of magnitude less), yielding the\nmarginal improvement of a smaller tolerance. The star symbol ? indicates that the\nsolver crashes given the specified tolerance\n\nFigure 5.4: Numerical error in the position of Apophis during the timespan 2014-\n2024. Numerical results are compared to HORIZONS data. The numerical error\nis defined as eApo = kr̃Apo − rApo k where rApo is the true position and r̃Apo is the\nnumerical position of the asteroid. When rApo − r̃Apo is negative, we inverse eApo\nso as to see the oscillatory behavior.\n\n35\nSECTION 5. CASE STUDIES\n\nFigure 5.5: Numerical error in the position of Apophis during the timespan 2014-\n2024 for each component x, y and z. Numerical results are compared to HORIZONS\ndata.\n\n## stead of 10−4 , we obtain a result that is approximately 37 kilometers closer\n\nto the real solution in the last time step. Furthermore, we see that the run-\ntime is increased from 8.5 minutes to 10.5 minutes. We also notice that the\nmarginal improvement when going from a tolerance of 10−5 to 10−6 is very\nsmall. However, the increase in runtime is not. This is a very poor tradeoff.\nGiven the results in this table, the tolerance 10−5 is preferred for Apophis\nand we will therefore use this tolerance in the study of its trajectories.\n\n## The numerical error in the position of Apophis as a function of time is\n\nshown in Figure 5.4, with time on the x axis and the error on the y axis. As\na reminder, the numerical error is defined as eApo = kr̃Apo −rApo k where rApo\nis the true position and r̃Apo is the numerical position of the asteroid. When\nr̃Apo − rApo is negative, we change the sign of eApo so as to see the oscillatory\nbehavior of the error. If we do not do this, all values of eApo are positive.\nThis oscillatory behavior suggests that there is something lacking in the\nphysical model - some additional gravitational term that is not included.\nInterestingly, other studies and comparisons of asteroid propagators yield\nsimilar oscillatory errors (e.g. ), suggesting that this is not an error\nin PAT2 ’s code but rather in the physical description of the problem or\nthe equations of motion. None of the papers that present oscillatory errors\ncomment on this phenomenon.\nA few more remarks about the error can be made here. First, the period of\n\n36\nSECTION 5. CASE STUDIES\n\n## Error (last step) [km] Marg. improv. [km] Runtime [min]\n\n10−4 1.505143·103 - 0.4\n10−5 1.499333·103\nTolerance\n\n5.8 0.5\n10−6 1.498301·103 1.03 0.5\n10−7 1.498274·103 2.7·10−2 0.7\n10−8 1.498274·103 ≈0 0.9\n\nTable 5.3: Numerical error in the position of Apophis using the Newtonian equa-\ntions of motion (2.5).\n\noscillation is equal to the orbital period of the asteroid (0.89 Earth years).\nFurthermore, the error seems to grow initially and then dampens after 10\njust as gravity pulls bodies together, it can also pull bodies apart. Therefore\nit is possible for the errors to compensate for each other as it seems to be the\ncase here. However, we note that during most of the 10 years, the amplitude\nof the error remains somewhat stable.\nFigure 5.5 illustrates the numerical error in the position of Apophis, this\ntime decomposed into the x, y and z components. We observe that the\ncontribution from the z component is significantly smaller than that for the\ntwo others. This is not a surprise as the orbit in question lies almost entirely\nin the ecliptic plane (xy plane). Moreover, we notice that the x and y error\ncontributions have similar shapes. However, the error in the x component\ndrifts upward (i.e. increases). The maximal error over the 10 year timespan\nis less than 500 kilometers which is small enough to study keyhole passages\nand deflection missions.\n\nFor the sake of comparison, and in order to evaluate the impact of the\nrelativistic terms in equation (2.1), we propagate Apophis’ trajectory using\nthe Newtonian equations of motion (2.5). The numerical errors for different\ntolerances are shown in Table 5.3 along with the marginal improvements\nand associated runtimes. By comparing these results to those of Table 5.2,\nwe notice that the relativistic equations yield more precise trajectories, as\ndesired. For example, given a tolerance of 10−4 , the Newtonian equations of\nmotion yield an error in the last time step of 1.5·103 kilometers whereas the\nrelativistic version yields an error of about 310 kilometers, which is about 5\ntimes smaller. However, the Newtonian equations, which are explicit, make\nfor significantly shorter runtimes.\n\n## An important concept in problems such as predicting orbits for celestial\n\n37\nSECTION 5. CASE STUDIES\n\nFigure 5.6: Normalized simulated total energy of each body in the model as well\nas that for the solar system as a whole. The normalization allows us to understand\nhow the total energy varies around its mean value.\n\n38\nSECTION 5. CASE STUDIES\n\nFigure 5.7: Ratio of the simulated potential over kinetic energy for each body in\nthe model as well as the solar system as a whole.\n\n39\nSECTION 5. CASE STUDIES\n\nFigure 5.8: Normalized total energy of each body in the model as well as that for\nthe solar system as a whole using data from HORIZONS. The normalization allows\nus to understand how the total energy varies around its mean value.\n\n40\nSECTION 5. CASE STUDIES\n\nFigure 5.9: Ratio of the potential over kinetic energy for each body in the model\nas well as the solar system as a whole using HORIZONS data.\n\n41\nSECTION 5. CASE STUDIES\n\nobjects is that of energy. Figure 5.6 shows the normalized total (simulated)\nenergy of each body in the model as well as that for the entire solar sys-\ntem, as a function of time. We decided to show values normalized by the\nmean so as to illustrate the variation around the mean rather than the ac-\ntual value. This is a simple post-processing exercise that can be done using\nthe outputted numerical positions and velocities. Ideally, we would like to\nsee a regular oscillation around a given value, indicating that the numerical\nmechanical energy is approximately conserved. We check this because it is\nwell known that when solving the Kepler problem using the Euler Explicit\nscheme, the trajectories spiral out (increase) while they spiral in (decrease)\nwhen using the Euler Implicit scheme. These results were the reason for\ndeveloping the Euler Symplectic method, for which the trajectories neither\nincrease nor decrease.\nFor bodies such as Saturn, Uranus, Neptune and Pluto whose orbital peri-\nods are greater than 10 years (29 years for Saturn, 84 for Uranus, 165 for\nNeptune and 247 for Pluto), a longer integration timespan could yield more\ninformation. In fact, even if Uranus’ energy seems to be decreasing over a\n10 year timespan, it may very well increase later on, once it has covered a\ngreater portion of its orbit. Hence if we are interested in studying the energy\nof the outer solar system specifically, we could use a longer time span.\nFigure 5.7 shows the ratio of potential over kinetic energy for each body\nand for the solar system as a whole. For a perfectly circular orbit, we would\nexpect this ratio to be constant in time. However, due to eccentricities of\nthe orbits, there is an exchange between potential and kinetic energy which\ntranslates to an oscillatory ratio, as seen in the figure.\n\nFor the sake of comparison, Figure 5.8 shows the normalized energy\nobtained from HORIZONS data. The same timespan is used, i.e. Januray\n1st 2014 to January 1st 2024. The desired oscillatory behavior is present for\nthe outer solar system bodies. However, it is not the case for the inner solar\nsystem bodies, which also happen to be the smaller bodies. As stated in\nAppendix A, there is more to the energy in the solar system than mechanical\nenergy. We also notice that the last four bodies (the Big3 and the Moon)\nhave relatively high variations, compared to the others. We should also note\nthat we are computing the energies for every day. By using a finer mesh, we\nwould see a more precise depiction of the evolution of the energy.\n\nAs stated previously, given the way PAT2 is designed, we have the pos-\nsibility to study the positions (and velocities) of all of the bodies considered\nin the model, not only the asteroid. Figures 5.10, 5.11, 5.12 and 5.13 il-\nlustrate the numerical errors in the positions of the Sun and Jupiter both\nin norm and component-wise. These two bodies are always very important\nwhen modelling the solar system as they are extremely massive and there-\nfore have a great influence on the other celestial bodies. The same graphs\n\n42\nSECTION 5. CASE STUDIES\n\nFigure 5.10: Numerical error in the position of the Sun during the timespan 2014-\n2024. Numerical results are compared to HORIZONS data.\n\nFigure 5.11: Numerical error in the position of the Sun during the timespan 2014-\n2024 for each component x, y and z. Numerical results are compared to HORIZONS\ndata.\n\n43\nSECTION 5. CASE STUDIES\n\nFigure 5.12: Numerical error in the position of Jupiter during the timespan 2014-\n2024. Numerical results are compared to HORIZONS data. Since Jupiter’s orbital\nperiod is greater than 10 years, we might get more information by using a longer\ntimespan.\n\nFigure 5.13: Numerical error in the position of Jupiter during the timespan 2014-\n2024 for each component x, y and z. Numerical results are compared to HORIZONS\ndata. Since Jupiter’s orbital period is greater than 10 years, we might get more\ninformation by using a longer timespan.\n\n44\nSECTION 5. CASE STUDIES\n\nFigure 5.14: Numerical error in the position of Mercury during the timespan\n2014-2024. Numerical results are compared to HORIZONS data.\n\nFigure 5.15: Numerical error in the position of Mercury during the timespan 2014-\n2024 for each component x, y and z. Numerical results are compared to HORIZONS\ndata.\n\n45\nSECTION 5. CASE STUDIES\n\nFigure 5.16: Numerical error in the position of Venus during the timespan 2014-\n2024. Numerical results are compared to HORIZONS data.\n\nFigure 5.17: Numerical error in the position of Venus during the timespan 2014-\n2024 for each component x, y and z. Numerical results are compared to HORIZONS\ndata.\n\n46\nSECTION 5. CASE STUDIES\n\ncan be made for any of the 15 bodies considered. We notice that in both\ncases, the x component of the error contributes more to the overall error\ncompared to the y and z components and this remark can be made for all\nof the bodies in the model. As we are only studying a 10 year timespan, it\nis interesting to do a similar analysis for bodies with shorter orbital periods.\nWe choose Mercury and Venus because they have the shortest orbital peri-\nods (88 days and 225 days, respectively) and therefore they orbit the Sun\na greater number of times compared to all the other bodies. Figures 5.14,\n5.15, 5.16 and 5.17, give the numerical errors of Mercury and Venus both in\nnorm and component-wise. Again, for both these bodies, the x component\nof the error dominates. We also notice a modulation of Mercury’s error,\nwhich can again be associated with the fact that gravity not only pulls but\nalso pushes and therefore some errors might compensate for each other. Fi-\nnally, Figure 5.15 is a great illustration of the instability of the problem, i.e.\nhow a small error in the state vector (after about 2500 days) can result in a\nmuch greater error for future times.\n\n5.2 Icarus\nWe will now consider the asteroid Icarus for our second case study. This\nasteroid is chosen because it has a high eccentricity (0.8369) and a high\ninclination with respect to the ecliptic plane (22.68 degrees). One of the\nmost important properties of a celestial body is its eccentricity. In terms\nof numerical integration, a high eccentricity means that there will be fast\nchanges in the acceleration during each one of its orbits. If the integrator\ndoes not catch these changes, the results can be very wrong. As a reminder,\nan orbit with eccentricity e = 0 is circular. When 0 < e < 1 we have\nan ellipse, when e = 1 a parabola and when e > 1 we have a hyperbola.\nFurthermore, Icarus’ orbit crosses that of the Earth, reinforcing the interest\nof its study.\nA similar analysis to that for Apophis will be done for Icarus using PAT2 .\n\n## Diam. Mass Orb. period Semi-maj. axis Inclin. Eccentric.\n\n1.4 km 1012 kg 1.12 years 1.078 AU 22.86 deg 0.8369\n\nTable 5.4: Some of asteroid Icarus’ relevant physical data (, ).\n\n## Some of Icarus’ relevant physical data is given in Table 5.4.\n\nIn Table 5.5, we compare the numerical errors in the last time step given\nsuccessively decreasing tolerances. Marginal improvements and runtimes are\nalso shown. Given the results in this table, the tolerance 10−9 is preferred.\n\n47\nSECTION 5. CASE STUDIES\n\n## Error (last step) [km] Marg. improv. [km] Runtime [min]\n\n10−6 9.3369 · 103 - 13.1\n10−7 8.5117 · 103\nTolerance\n\n704.2484 15.7\n10−8 269.4207 555.7565 19.7\n10−9 241.2383 28.1824 23.2\n10−10 231.1155 10.1228 27.4\n\nTable 5.5: Numerical error (in absolute value, compared to HORIZONS) in the last\ntime step. Here, we consider the asteroid Icarus during the timespan 2014-2024.\nEach error (computed against HORIZONS) is then compared to that obtained\nwith the previously assigned tolerance (one order of magnitude less), yielding the\nmarginal improvement of a smaller tolerance.\n\nFigure 5.18: Orbit of Icarus during the timespan 2014-2024 (data taken from\nHORIZONS).\n\n48\nSECTION 5. CASE STUDIES\n\nFigure 5.19: Numerical error in the position of Icarus during the timespan 2014-\n2024. Numerical results are compared to HORIZONS data.\n\n## We will therefore use a tolerance of 10−9 in the study of Icarus’ trajectories.\n\nFor the sake of comparison, we note that for Apophis, we chose a tolerance\nof 10−6 and in fact, Apophis’ orbit is less eccentric than that of Icarus (0.191\nfor Apophis vs. 0.8369 for Icarus).\n\n## The numerical error in the position of Icarus is illustrated in Figure 5.19.\n\nA few remarks can be made here. First, the error, as for Apophis, is peri-\nodic. In fact, approximately every 408 days, there is a peak in the numerical\nerror and 408 days is the orbital period of Icarus. Second, the maximal error\nadter 10 years is about 600 kilometers, which is below the target value of\n1000 kilometers.\nFigure 5.20 shows that the biggest errors (in black) happen when the as-\nteroid is at perihelion, i.e. where it is closest to the Sun. This is because\nat perihelion, the asteroid as a much greater acceleration than at any other\npoint on the orbit. Therefore, when approaching perihelion, the acceleration\nincreases quickly. Therefore the high eccentricity of this orbit is responsible\nfor the peeks in the numerical error. The points in blue in Figure 5.20 are\nthe points where the numerical error passes through the y = 0 line, i.e. when\nthe error is zero. We can see that this happens at aphelion, i.e. when the\nasteroid is farthest from the Sun, i.e. when it is moving the slowest.\nMoreover, the numerical error increases with time, as is usually the case in\nnumerical integration.\nFigure 5.21 shows the x, y and z contributions to the numerical error. We\n\n49\nSECTION 5. CASE STUDIES\n\nFigure 5.20: Points on Icarus’ orbit with biggest (in black) and smallest (in blue)\nerrors. The Sun is located at the right (invisible) focus of the ellipse, making the\nleft-most point of the ellipse the perihelion and the right-most point the aphelion.\n\nFigure 5.21: Numerical error in the position of Icarus during the timespan 2014-\n2024 for each component x, y and z. Numerical results are compared to HORIZONS\ndata.\n\n50\nSECTION 5. CASE STUDIES\n\nFigure 5.22: Orbit of 2007 FT3 during the timespan January 1st 2014 - January\n1st 2024 (data taken from HORIZONS).\n\ncan see that this time, the error in the z component contributes to the total\nerror, to the contrary of Apophis. This is to be expected as Icarus’ orbit is\ninclined with respect to the ecliptic plane.\n\nThe numerical errors for the other bodies of the solar system are similar\nto those obtained when studying the asteroid Apophis.\n\n## 5.3 2007 FT3\n\nWe will now consider the asteroid 2007 FT3 for our third case study. This\nasteroid, whose orbit is shown in Figure 5.22 is chosen because it has a high\ninclination (almost 27 degrees) with respect to the ecliptic plane and a rel-\natively small eccentricity (0.307). Hence it shares similarities with Apophis\n(w.r.t. eccentricity) and with Icarus (w.r.t. inclination). A similar analysis\nto that for Apophis will be done for 2007 FT3 using PAT2 .\n\n## Diam. Mass Orb. period Semi-maj. axis Inclin. Eccen.\n\n340 m 5.5 · 1010 kg 1.2 years 1.128 AU 26.83 deg 0.307\n\nTable 5.6: Some of asteroid 2007 FT3’s relevant physical data (, ).\n\n51\nSECTION 5. CASE STUDIES\n\n## Error (last step) [km] Marg. improv. [km] Runtime [min]\n\n10−4\nTolerance\n\n106.0741 - 8.2\n10−5 90.1473 15.9268 9\n10−6 90.6667 -0.5194 11\n\nTable 5.7: Numerical error (in absolute value, compared to HORIZONS) in the last\ntime step. Here, we consider the asteroid 2007 FT3 during the timespan 2014-2024.\nEach error (computed against HORIZONS) is then compared to that obtained\nwith the previously assigned tolerance (one order of magnitude less), yielding the\nmarginal improvement of a smaller tolerance.\n\n## Some of 2007 FT3’s relevant physical data is given in Table 5.6.\n\nIn Table 5.7, we compare the numerical errors in the last time step given\nsuccessively decreasing tolerances. Given the marginal improvements and\nruntimes shown in this table, the tolerance 10−5 is preferred. Again, for the\nsake of comparison, we note that for Apophis we chose a tolerance of 10−6\n(small eccentricity) and 10−9 for Icarus (high eccentricity). Since 2007 FT3\nhas a relatively small eccentricity, this choice of tolerance corresponds to\nour earlier hypothesis that small eccentricities will yield smaller numerical\nerrors. We will therefore use a tolerance of 10−5 in the study of 2007 FT3’s\ntrajectories.\n\nFigure 5.23 shows the numerical error in the position of asteroids 2007\nFT3 during the timespan Januray 1st 2014 to Januray 1st 2024. Similarly\nto previous cases, the error is oscillatory with a period equal to the orbital\nperiod of the body. The maximal error during the 10 year timespan is less\nthan 600 kilometers, which is acceptable for deflection mission analysis.\nFigure 5.24 shows the decomposition of the error in the 3 component x, y\nand z. This figure shows that all three of this components contribute to\nthe overall error, as expected because of the high inclination of the orbit.\nFinally, we notice that the error increases with time, which is not surprising.\n\n## 5.4 2009 VZ39\n\nFor our fourth case study, we consider the asteroid 2009 VZ39 whose orbit\nis shown in Figure 5.25. This asteroid is chosen because it has both a small\ninclination and a relatively small eccentricity. It is also the asteroid with\nthe highest number of potential impacts according to NASA’s Sentry list\n at this time. However, as this body’s diameter is well beneath the 140\nmeter threshold discussed previously, it would not survive entering Earth’s\n\n52\nSECTION 5. CASE STUDIES\n\nFigure 5.23: Numerical error in the position of 2007 FT3 during the timespan\n2014-2024. Numerical results are compared to HORIZONS data.\n\nFigure 5.24: Numerical error in the position of 2007 FT3 during the timespan\n2014-2024 for each component x, y and z. Numerical results are compared to\nHORIZONS data.\n\n53\nSECTION 5. CASE STUDIES\n\nFigure 5.25: Orbit of 2009 VZ39 during the timespan 2014-2024 (data taken from\nHORIZONS).\n\n## atmosphere and therefore is not dangerous. Nevertheless, it is of academic\n\ninterest.\nA similar analysis to that for Apophis will be done for 2009 VZ39 using\nPAT2 .\n\n## Diam. Mass Orb. period Semi-maj. axis Inclin. Eccentr.\n\n15 m 6.2 · 106 kg 1.81 years 1.4827 AU 2.52 deg 0.3824\n\nTable 5.8: Some of asteroid 2009 VZ39’s relevant physical data. It is the aster-\noid with the highest number (815) of potential impacts with Earth, according to\nNASA’s Sentry list (, ).\n\n## Some of 2009 VZ39’s relevant physical data is given in Table 5.8.\n\nIn Table 5.9, we compare the numerical errors in the last time step given\nsuccessively decreasing tolerances. Given the marginal improvements and\nruntimes shown in this table, the tolerance 10−4 is preferred. Again, this\nconfirms that asteroids with low eccentricities will have smaller numerical\nerrors compared to asteroids with high eccentricities. We will therefore use\na tolerance of 10−4 in the study of 2009 VZ39’s trajectories.\n\nFigure 5.26 shows the numerical error in the position of asteroid 2009\n\n54\nSECTION 5. CASE STUDIES\n\n## Error (last step) [km] Marg. improv. [km] Runtime [min]\n\n10−4\nTolerance\n\n223.2047 - 6.8\n10−5 226.9954 -3.7907 12\n10−6 221.1609 5.8345 11\n\nTable 5.9: Numerical error (in absolute value, compared to HORIZONS) in the last\ntime step. Here, we consider the asteroid 2009 VZ39 during the timespan 2014-2024.\nEach error (computed against HORIZONS) is then compared to that obtained\nwith the previously assigned tolerance (one order of magnitude less), yielding the\nmarginal improvement of a smaller tolerance.\n\nFigure 5.26: Numerical error in the position of 2009 VZ39 during the timespan\n2014-2024. Numerical results are compared to HORIZONS data.\n\n55\nSECTION 5. CASE STUDIES\n\nFigure 5.27: Numerical error in the position of 2009 VZ39 during the timespan\n2014-2024 for each component x, y and z. Numerical results are compared to\nHORIZONS data.\n\n## Body Number of obs. used Solution number\n\nApophis 4077 JPL 190\nIcarus 856 JPL 76\n2007 FT3 14 JPL 6\n2009 VZ39 8 JPL 8\n2008 FF5 52 JPL 14\n\nTable 5.10: Number of observations used in the statistical fit of an orbit (see\nAppendix A) and solution number for each of the five asteroids considered. The\nsolution number represents the number of time that an asteroid’s orbit has been\ncalculated (this is done every time new observations are made or when there is a\nchange in the code).\n\nVZ39 during the timespan January 1st 2014 to January 1st 2024. We notice\nthat this error looks more like that of Icarus rather than that of Apophis\nor 2007 FT3. Figure 5.27 shows the decomposition of the error into its x,\ny and z components. As for Apophis, 2009 VZ39 lies almost in the ecliptic\nand therefore the z component of the error is very small.\nThe maximal error during this 10 year period is about 2000 kilometers,\nwhich is not only above the desired maximal value of 1000 kilometers, but\nis also the highest error out of the asteroids considered so far. This is a\n\n56\nSECTION 5. CASE STUDIES\n\nsurprising result. In fact, 2009 VZ39 has a moderate eccentricity and a very\nsmall inclination and therefore we would expect better numerical results.\nOne reason for this higher than expected error could be the fact that there\nIn this table we see that only a small number of observations is used in the\nstatistical data fit of the orbit. This is most likely indicates that there are\nnot many observations or measurement of this asteroid and therefore some\nphysical parameters might have high uncertainties. Moreover, the solution\nnumber shown in this table represents the number of times a solution has\nbeen computed, either because new observations have been made or there is\na change in the code (observation processing algorithm, for example). This\nnumber should also give an idea as to how well the asteroid’s orbit is known\nand again we see that this number is small compared to that for the other\nbodies considered.\n\n## 5.5 2008 FF5\n\nFor our last case study, we consider the asteroid 2008 FF5. This asteroid is\nchosen because it has a very high eccentricity (0.965). Additionally, it has\na very big semi-major axis (almost 2.3 AU). Again, as this body’s diameter\nis well beneath the 140 meter threshold discussed previously, it would not\nsurvive entering Earth’s atmosphere and therefore is not dangerous. Never-\ntheless, it has interesting physical properties and therefore is of interest to\nus.\nA similar analysis to that for Apophis will be done for 2008 FF5 using PAT2 .\n\n## Diam. Mass Orb. period Semi-maj. axis Inclin. Eccentr..\n\n81 m 7.1 · 108 kg 3.45 years 2.283 AU 2.6 deg 0.965\n\nTable 5.11: Some of asteroid 2008 FF5’s relevant physical data (,).\n\n## Some of 2008 FF5’s relevant physical data is given in Table 5.11.\n\nIn Table 5.12, we compare the numerical errors in the last time step given\nsuccessively decreasing tolerances. Given the marginal improvements and\nruntimes, the tolerances 10−9 and 10−10 are the most interesting. We will\nshow the results of the numerical solution using 10−9 . We notice, once again,\nthat the tolerance needed in order to obtain reasonable errors is much smaller\nthan for less eccentric asteroids. However, it is important to note that\nobtaining reasonable results is possible, but smaller tolerances are needed\nand smaller tolerances translate to longer runtimes.\n\n57\nSECTION 5. CASE STUDIES\n\nFigure 5.28: Orbit of 2008 FF5 during the timespan 2014-2024 (data taken from\nHORIZONS).\n\n## Error (last step) [km] Marg. improv. [km] Runtime [min]\n\n10−6 3.8069·105 - 13.4\n10−7 4.2613·104 3.38077·105\nTolerance\n\n14.5\n10−8 2.4135·103 4.0200·104 18.3\n10−9 291.4986 2.1220·103 23.6\n10−10 41.5419 249.9567 28.6\n\nTable 5.12: Numerical error (in absolute value, compared to HORIZONS) in the\nlast time step. Here, we consider the asteroid 2008 FF5 during the timespan 2014-\n2024. Each error (computed against HORIZONS) is then compared to that ob-\ntained with the previously assigned tolerance (one order of magnitude less), yielding\nthe marginal improvement of a smaller tolerance.\n\n58\nSECTION 5. CASE STUDIES\n\nFigure 5.29: Numerical error in the position of 2008 FF5 during the timespan\n2014-2024. Numerical results are compared to HORIZONS data.\n\nFigure 5.30: Points on 2008 FF5’s orbit with biggest (in black) errors. The Sun\nis located at the right (invisible) focus of the ellipse, making the left-most point of\nthe ellipse the perihelion and the right-most point the aphelion.\n\n59\nSECTION 5. CASE STUDIES\n\nFigure 5.31: Numerical error in the position of 2008 FF5 during the timespan\n2014-2024 for each component x, y and z. Numerical results are compared to\nHORIZONS data.\n\nFigure 5.29 shows the numerical error in asteroid 2008 FF5’s position.\nThis is the only one of the asteroids that we consider that does not have an\noscillatory error. This is also the body with the longest orbital period (3.45\nyears compared to a maximal orbital period of 1.8 years for the four others).\nFigure 5.30 shows the point of maximal error (black point), which happens\nat day 1636 (about four and a half years into the timespan). In this figure,\nthe Sun is located on the right-hand side of the ellipse and therefore the\nmaximal error happens at perihelion, similarly to Icarus as shown in Figure\n5.20. Figure 5.31 shows the contribution of each component x, y and z to\nthe overall numerical error. As in previous cases, the error in z is extremely\nsmall because this body almost lies in the ecliptic.\n\n60\nSection 6\n\nWork\n\n## Figure 6.1: The center of our galaxy, the Milky Way.\n\n† Image taken from http://www.nasa.gov/multimedia/imagegallery/image_feature_649.html\n\nThe results obtained in Section 5 suggest that the propagator PAT2 can\nbe used in the study of asteroid deflection missions.\nTable 6.1 shows the eccentricity and inclination of each of the five aster-\noids considered as well as the tolerances chosen for each body, the maximal\nerrors after 10 years and the runtimes. We notice that the maximal error\nfor the 10 year timespan of Januray 1st 2014 to Januray 1st 2024 ranges\nfrom 489 kilometers (for Apophis) to 2.5 · 103 kilometers (for Icarus). Out\nof the five asteroids, three have maximal errors under the threshold of 1000\n\n61\nSECTION 6. CONCLUSIONS AND FUTURE WORK\n\n## Figure 6.3: Tolerance versus numerical error tradeoff (compared to HORIZONS).\n\n62\nSECTION 6. CONCLUSIONS AND FUTURE WORK\n\n## Apophis Icarus ’07 FT3 ’09 VZ39 ’08 FF5\n\nEccentricity 0.191 0.8369 0.307 0.3824 0.965\nInclination [deg] 3.3 22.86 26.83 2.52 2.625\nTolerance 10−6 10−9 10−5 10−4 10−9\nMax Error [km] 489.1 2.5·103 599.3 2·103 843.9\nRuntime [min] 11.3 28.5 9 6.8 23.6\n\nTable 6.1: Summary of the results obtained in Section 5. Max Error refers to the\nmaximal error over the 10 year timespan. These errors assume HORIZONS as the\ntruth. The values of the errors are rounded for simplicity.\n\nkilometers. Moreover, the tolerances chosen for the asteroids with high\neccentricities (Icarus and 2008 FF5) are significantly smaller (3 orders of\nmagnitude) than those for the other asteroids. This is not surprising as\nasteroids with eccentric orbits will have fast changes in acceleration. How-\never, we also notice the accuracy of the solution does not only depend on\neccentricity. In fact, 2009 VZ39 has a relatively low eccentricity and has a\nrelatively big error. This can be attributed to the lack of knowledge that we\nfact, 2009 VZ39 has a small number of observations and therefore it’s input\ndata (initial state and mass) contains a lot of uncertainty, which can explain\nthe inaccuracy of the numerical solution and the orbit in HORIZONS has\nonly been computed a few times which means that it is not very precise.\nFinally, a high inclination with respect to the ecliptic plane does not seem\nto have an influence on the quality of the output.\nHence, when using PAT2 for orbit estimation, we can expect to obtain the\nleast accurate solutions when the asteroid in question has a high eccentric-\nity and a small number of observations or measurements. Nevertheless, in\nother cases, the maximal error after 10 years should be smaller than 1000\nkilometers.\nFinally, we notice that the runtimes vary from less than 7 minutes (for 2009\nVZ39, for which a tolerance of 10−4 is chosen) to 28.5 minutes (for Icarus,\nfor which a tolerance of 10−9 is chosen). This is a good illustration of the\nimpact of tolerance on runtime.\n\nFigures 6.2 and 6.3 illustrate the relationships between tolerance and\nruntime, and tolerance and error, respectively. As expected, runtimes in-\ncrease with decreasing tolerances and errors decrease with decreased toler-\nances. The rate of decrease in error depends on the orbit properties. These\ntwo figures can be used when deciding what tolerance to use for a given\nasteroid with a given orbit. Furthermore, they provide information on what\n\n63\nSECTION 6. CONCLUSIONS AND FUTURE WORK\n\n## kind of errors can be expected.\n\nAs far as limitations go, we see here is that PAT2 can only be used on\nplanets and minor planets or asteroids but not active comets. The reason\nis that active comets require additional orbital parameters to account for\nthe nongravitational perturbations caused by outgassing of the cometary\nnucleus, which is not modeled here. Other than that, PAT2 is flexible and\ncan introduce more or less objects, as desired, with minimal effort.\nThe most important limitation, as mentioned previously, is related to the\nlimitation of the input data. The quality of the results for any N-body\nproblem will heavily depend on the input parameters such as the initial\nstate vector and the mass of each body. Since the problem is unstable,\neven small errors in these parameters can (and will) lead to very bad re-\nsults. For asteroids that are hard to observe, i.e. for which we have very\nfew measurements, we cannot expect good numerical results. Furthermore,\nfor applications where an extremely precise asteroid trajectory is necessary\n(for rendez-vous missions, for example), PAT2 may not be the best solution.\nHowever, for many applications, including deflection mission analysis, the\nobtained accuracy is acceptable. Finally, when studying close approaches,\nit is necessary to use smaller tolerances compared to those for periods with\nno close approaches. The errors should be expected to be higher and the\nruntimes longer.\n\n## Besides deflection mission analysis, PAT2 can be used in different con-\n\ntexts related to solar system dynamics.\nIn fact, using relativistic equations of motion and treating all bodies in the\nsystem in the same way, it is possible to study each one of their positions and\nvelocities. Therefore, PAT2 can be used to generate planetary ephemerides\nas well as asteroid ephemerides. Furthermore, the equations of motion can\nbe easily modified to include perturbing forces, i.e. to model all types of\ndeflection missions or even what if scenarios. The tool can also be used in\ncomputing initial impact probabilities.\nBy allowing the PPN parameters β and γ to be modified (they are set to 1\nin the general relativity theory), we have the possibility to study different\nrelativity theories. This is outside the scope of this project. However, it may\nbe interesting for physicists interested in alternative theories of relativity.\n\nFuture work related to the topics discussed in this thesis could include\nfurther benchmarking against NASA’s GMAT. Studying periods of close\napproach could yield important information as to the quality of each prop-\nagator. Furthermore, some more digging into why the x component of the\nnumerical error dominates should be done. In theory, for asteroids that lie\n(almost) in the ecliptic plane, the errors in x and y are expected to be similar\nas the ecliptic plane corresponds to the xy plane. A deeper analysis of the\n\n64\nSECTION 6. CONCLUSIONS AND FUTURE WORK\n\nerror for asteroid 2008 FF5 might also be interesting as it’s error was very\ndifferent compared to all the others presented.\nMoreover, further work could include implementing the numerical integra-\ntor in FORTRAN, a 128 bit language, from within MATLAB. This should\nreduce the effect of roundoff errors and could potentially be beneficial to the\noverall accuracy of the numerical solution.\nAnother path that could be explored in this context is that of develop-\nping a numerical integrator specifically built for orbit prediction, similarly\nto JPL’s DIVA (see A). This would consist in finding a way to accurately\ncapture fast changes in accelerations which would then produce very high\nquality ephemerides. We should note that DIVA was a multi-year endeavour\nat JPL. Alternatively, licenses to DIVA can be purchased.\n\n65\nAppendices\n\n66\nAppendix A\n\n## JPL Visit Report\n\nContext\nThanks to Professor Olivier de Weck and Doctor Paul Chodas, I had the\nopportunity to spend a day at NASA’s Jet Propulsion Laboratory (JPL) in\nDr. Paul Chodas is a senior scientist at JPL. He is the asteroid dynamics\nand impact probabilities guru. He is the principal architect for orbit deter-\nmination and ephemeris software used by the JPL NEO Program Office and\na co-developer of the Sentry impact monitoring system.\n\nThe goal of my visit was to discuss the work that I have done in the\ncontext of my Master thesis as well as the HORIZONS system developed\nby JPL. As HORIZONS was, and still is, a big project, there are a number\nof people working on its different aspects, such as the mathematical model,\nthe numerical integrator, the database, the updating of data, etc. I also had\nthe opportunity to have one-on-one discussions about each of these topics\nwith their respective experts.\n\nExpectations\nGoing into this incredible visit, I did not know what to expect. I had\nprepared a PowerPoint presentation describing the work I had done until\nthen as well as some questions that I would have liked to get the answers to.\nThese questions were about the equations of motion that are used to generate\nasteroid ephemerides as well as the numerical integrator and reference frame.\nthat asteroids and planets are handled differently at JPL. This means that\nthe ephemerides for planets are generated separately from those for the\nasteroids and these ephemerides are also stored separately. I therefore also\nwanted to know why this distinction was made and what is the difference\n\n67\nAPPENDIX A. JPL VISIT REPORT\n\n## in how those ephemerides are generated. Furthermore, as I had had the\n\nexperience of obtaining different positions for a given asteroid at a given\ntime with two separate queries from HORIZONS, I wanted to know more\nabout how, when and why the ephemerides are updated.\n\n## Outcome of the visit\n\nThe presentation that I gave went well. I was able to inform Paul on the\nwork I had done so far and the results that I had obtained. His first reaction\nwas to say that my results weren’t bad at all (I showed him Figures 5.4, 5.5,\n5.19 and 5.21 from the case studies in Section 5). I described the model that\nI have implemented as well as the equations of motion and the numerical\nintegrator.\n\n## Paul and I discussed Hamiltonian systems which are not implemented\n\nin either the planetary or asteroid ephemerides. Paul remarked that when\nconsidering the solar system as a whole, mechanical energy is not conserved.\nThere are a lot of other sources of energy that need to be taken into account\nfor a meaningful description of the exchange of energy.\n\nThe reason that the planets and asteroids are considered separately is\npurely historical. In fact, asteroids have only started to be discovered re-\ncently, long after trajectories of planets were being estimated. Therefore it\nwas easier to create a second database for asteroids with their own format\nrather than trying to integrate these bodies with the planets.\n\nNow, the way that the asteroid ephemerides are generated happens in a\nfew steps. First, the planetary ephemerides need to be known and therefore\npreviously computed. This is done using a numerical solver called DIVA.\nThis is a variable step size, variable order Adams method developed at JPL\nover several years. It is specifically built to be able to handle fast changes\nin accelerations, as is necessary when studying the elliptical orbits of plan-\nets. In fact, an object on an eccentric orbit will be greatly accelerated and\nperihelion. Once positions are estimated, they are fit to data using the least\nsquares method. The bodies included in the model are the Sun and the\n9 classical planets. Note that if DIVA had been developed later in time,\nPluto would most likely not have been included in the model. However, it\nwas considered a planet at that time and for this reason it was included in\nthe model. The equations of motion for the planets are the same as those\npresented in equation (2.1), i.e. including the relativistic corrections asso-\nciated with the general theory of relativity. Interestingly, they use orbital\nelements instead of Cartesian coordinates to describe the planets and aster-\noids’ ephemeris. The reason for this is that these orbital elements have a\n\n68\nAPPENDIX A. JPL VISIT REPORT\n\n## geometrical meaning. A lot of information can be obtained simply by look-\n\ning at these, which is not possible with Cartesian coordinates. However, the\norbital elements are immediately converted into Cartesian coordinates for\nthe numerical integration.\nOnce the trajectories are estimated and fit to data, they are stored in the\nform of polynomials so that it is possible to obtain the positions at any point\nin time simply by evaluating the polynomial. Appendix B briefly explains\nthe type of interpolation used.\n\nThe way that the asteroid ephemerides are generated is entirely different.\nIn fact, all the planets’ trajectories are prescribed and only the trajectory\nof the asteroid is computed (1 body problem). Because the ephemerides\nare stored as polynomials, it is easy to obtain the necessary information\nabout any planet at any time. However, before this can be done for a\nnewly discovered object, a handful of astrometric observations need to be\nmade. Then a preliminary orbit is computed using a 2-body problem (i.e.\nno perturbations from any of the planets is included). These are of course\nvery approximate, but this is ok. It allows the people who are tracking this\nobject to know where to look in the sky. Then, when observations have been\nmade over several days (thanks to the initial orbit estimation), a definitive\norbit can be computed, this time with planetary perturbations included.\nThe advantage of this method is that there is no (or minimal) error in\nthe positions of the planets and therefore the trajectories of the asteroid\ncannot be any more accurate. The only errors are related to measurements\nand numerical integration, contrarily to the method presented in Section 2\nwhere the error in the positions of the planets will increase the errors in the\npositions of the asteroid. Another advantage of this method is the reduced\ncomputation time. In fact, the problem shrinks from a 15 body problem\nto a 1 body problem and therefore there should be 15 times less variables\nand function evaluations. Moreover, the equations of motion governing the\nEarth-Moon system are extremely complicated; the tidal forces for example\nhave a big impact on the orbits. Therefore using precomputed orbits for the\nEarth and Moon should produce better results.\n\nConclusions\nThere are two major conclusions to be made here. First of all, the way to\nget the most accurate asteroid ephemerides is to use a previously generated\nplanetary ephemerides and solve a 1 body problem. This cuts down on run-\ntime tremendously.\nThe reason for the planet-asteroid separation is purely historic. However,\nafter a lot of trial and error, it was found that this separation is convenient\nfor asteroid ephemeris generating.\n\n69\nAPPENDIX A. JPL VISIT REPORT\n\n## Second, a numerical integrator necessary for solving an N-body problem\n\n(for the planets) accurately, is highly complex. Ordinary differential equa-\ntion solvers are not equipped with handling fast changes in accelerations\nthat happen with elliptical orbits. There needs to be a special handling of\nerrors for these fast changes, especially because the system is unstable.\n\nIt is important to keep in mind the context of this thesis and the goal of\nthe propagator. Even if we do not have access to an extremely high qual-\nity numerical integrator as they do at JPL, using the method of prescribed\nplanetary positions, we should still obtain as estimate of the asteroid’s tra-\njectory that is accurate enough for the study of deflection missions.\n\nFinally, a short remark can be made about the study of keyhole passages.\nIn fact, the definition of a keyhole is simply a region in space such that if an\nasteroid were to pass through the keyhole, the asteroid would collide with\nEarth. However, when studying deflection missions, the only important\nthing to know is whether or not the asteroid will collide with Earth and\ntherefore any simulation should be run until it can be determined if this will\nhappen or not (i.e. we do not stop the integration at the keyhole but at the\nimpact). In fact, the only way we can know if a point in space is part of a\nkeyhole is to start an asteroid at that point and see if it then collides with\nthe Earth. It would be interesting to determine how much ∆V is needed to\navoid a particular asteroid hitting Earth. This ∆V will grow a lot in the\nkeyhole region. Note that in these situations, we consider all bodies as point\nmasses and therefore a point-mass asteroid is either in or out of a keyhole,\nbut cannot be partly in and partly out as would be the case in reality.\n\n70\nAppendix B\n\nChebyshev Polynomial\nInterpolation\n\nIn order to minimize the interpolation error (in the norm of the maximum,\ni.e. the maximum error), we compute the roots of the Chebyshev polyno-\nmials and use them as the nodes for a Lagrangian interpolation polynomial\n(or any other interpolation polynomial of the same degree). For a general\ninterval [a, b] and a function f that is interpolated by a polynomial Pn of\ndegree n, by using\n\n\u0012 \u0013\nxi = + cos\n2 2 2(n + 1)\n\n## for i = 1, . . . , n+1, the interpolation error that occurs is bounded as follows:\n\n\u0013n+1\nb−a Bn+1\n\u0012\n|f (x) − Pn (x)| ≤ n\n,\n2 2 (n + 1)!\n\nwith Bn+1 = maxx∈[a,b] |f (n+1) (x)|. More details can be found in .\n\n71\nAppendix C\n\n## How Asteroids Get Their\n\nNames\n\nReading Section 5, some may wonder how these asteroids get their names.\nThe answer is far from obvious.\n\nFirst, we should note that asteroids are being discovered on a daily basis\nand will keep on being discovered for decades and probably more. These\nasteroids are the smaller ones, that do not pose much of a threat to Earth.\nThe larger asteroids are quite well known. In fact, we have information on\nall of these potentially dangerous asteroids.\n\n## Once an asteroid is discovered, it is given a name. The first four digits of\n\nthis name correspond to the year that the asteroid was discovered. The first\nletter after these four digits corresponds to half years. Let me explain. A\ncorresponds to the first half of January, B to the second half of January, C\nto the first half of February, and so on. The rest of the name comes from the\nfact that a great number of asteroids are being discovered and therefore we\nneed a second letter and some more numbers to distinguish all the asteroids\ndiscovered in a given half year.\nFor example, 2007 FT3 was discovered in the year 2007. More precisely, in\nthe second half of March (letter F).\n\n72\nBibliography\n\n NASA, 2006 Near-Earth Object Survey and Deflection Study. Technical\nreport, DRAFT: Pre-Decisional Material, 2006\n\n## J. Laskar, M.Gastineau Existence of collisional trajectories of Mercury,\n\nMars and Venus with the Earth. Nature, Vol 459, 2009\n\n Q. Wang, The existence of global solution of the N-body problem. Chin.\nAstron. Astrophys. 10, 1991\n\n## Victor Brumberg, On derivation of EIH (Einstein–Infeld–Hoffman)\n\nequations of motion from the linearized metric of general relativity the-\nory. Springer Science+Business Media B.V. 2007\n\n## E. Myles Standish, James G. Williams, Orbital Ephemerides of the Sun,\n\nMoon, and Planets. Chapter 8\n\n## Alan Pitz, Christopher Teubert, Bong Wie Earth-Asteroid Im-\n\npact Probability Computations of Disrupted Asteroid Fragments using\nGMAT/STK/CODES. AAS 11-408\n\n## Ernst Hairer, Christian Lubich, Gerhard Wanner, Geometric Numerical\n\nIntegration Illustrated by the Stoermer–Verlet Method. Cambridge Uni-\nversity Press, 2003, pp. 399–450\n\n## Ernst Hairer, Christian Lubich, Gerhard Wanner, Geometric Numerical\n\nIntegration: Structure-Preserving Algorithms for Ordinary Diff erential\nEquations. 2004 Springer seies in computational mathematics 2nd Edi-\ntion,\n\n## Estabrook, F. B, Derivation of Relativistic Lagrangian for n-Body\n\nEquations Containing Relativity Parameters β and γ. JPL D-18611,\nJPL Interoffice Memo (internal document) Jet Propulsion Laboratory,\n\n## François E. Cellier, Ernesto Kofman, Continuous System Simulation.\n\nSpringer US, 2006\n\n73\nBIBLIOGRAPHY\n\n## E. V. Pitjeva, High-Precision Ephemerides of Planets—EPM and De-\n\ntermination of Some Astronomical Constants. Solar System Research,\nVol. 39, No. 3, 2005, pp. 176–186. Translated from Astronomicheskii\nVestnik, Vol. 39, No. 3, 2005, pp. 202–213.\n\n## L. F. Shampine, Limiting Precision in Differential Equation Solvers.\n\nMathematics of computation, Vol. 28, No. 125, January, 1974\n\n## John H. Mathews, Kurtis K. Fink, Predictor-Corrector Methods. Nu-\n\nmerical Methods Using Matlab, 4th Edition, 2004, Section 9.6\n\n## L. F. Shampine, M. K. Reichelt, The MATLAB ode suite\n\n Florin Diacu, Solution of the n-body problem. The Mathematical Intel-\nligencer, Vol. 18, No. 3, 1996\n\n## Cellier, François E., Kofman, Ernesto, Basic Principles of Numerical\n\nIntegration. Continuous System Simulation, Chapter 2, Springer, 2006\n\n## V. A. Brumberg Essential General Relativity Theory. Institut de\n\nMecanique Celeste et de Calcul des Ephemerides, Astronomy and Celes-\ntial Mechanics Course, Lecture 3\n\n## Floating-Point Arithmetic in MATLAB. http://people.uib.no/\n\n Alan Pitz, Chritopher Teubert, Bong Wie Earth-impact probability com-\nputation of disrupted asteroid fragments using GMAT/STK/CODES.\nAAS 11-408\n\n http://earthguide.ucsd.edu/virtualmuseum/ita/08_1.shtml\n\n https://solarsystem.nasa.gov/planets/profile.cfm?Object=\nDwa_Ceres\n\n http://neo.jpl.nasa.gov/apophis\n\n http://ssd.jpl.nasa.gov/?horizons/sbdb.cgi#top\n\n http://nssdc.gsfc.nasa.gov/planetary/factsheet/\nasteroidfact.html\n\n http://neo.jpl.nasa.gov/risk/\n\n http://ssd.jpl.nasa.gov/sbdb.cgi\n\n http://www.math.wsu.edu/faculty/genz/448/lessons/l303.pdf\n\n74" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8826259,"math_prob":0.9410159,"size":69276,"snap":"2020-45-2020-50","text_gpt3_token_len":16687,"char_repetition_ratio":0.15652789,"word_repetition_ratio":0.08796127,"special_character_ratio":0.22238582,"punctuation_ratio":0.11715931,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9722129,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-22T07:37:18Z\",\"WARC-Record-ID\":\"<urn:uuid:882eb00b-d384-4215-ab9e-3634b3165864>\",\"Content-Length\":\"514447\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4fba6b99-2286-4bbf-8043-a357c6a5fbe1>\",\"WARC-Concurrent-To\":\"<urn:uuid:d17be594-1e65-4745-a2ff-e5a477db92a6>\",\"WARC-IP-Address\":\"151.101.250.152\",\"WARC-Target-URI\":\"https://it.scribd.com/document/455224901/Thesis-Patricia-Egger\",\"WARC-Payload-Digest\":\"sha1:K7YRJQTASWSZMGJMMU46HF4FTDXAD2PE\",\"WARC-Block-Digest\":\"sha1:ZMLIZ52PTEWYCFFWJ5ADASEKY3AIKZ7W\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107878921.41_warc_CC-MAIN-20201022053410-20201022083410-00414.warc.gz\"}"}