URL
stringlengths 15
1.68k
| text_list
sequencelengths 1
199
| image_list
sequencelengths 1
199
| metadata
stringlengths 1.19k
3.08k
|
---|---|---|---|
https://chemistry.stackexchange.com/questions/61902/is-it-possible-to-create-a-solution-with-superoxide | [
"Is it possible to create a solution with superoxide?\n\nI am not a chemist, and somehow I cannot find any material on this topic, so I decided to ask here.\n\nI am looking to create a solution with a specified amount/concentration of superoxide ($\\ce{O2^.-}$). Can you suggest some compounds that will enable me to \"isolate\" superoxide in a solution?\n\n• OK, so what you're suggesting is to mix $KO_2$ and $C_{12}H_{24}O_6$ in $(CH_3)_2SO$, then the whole thing is added to an acqueous solution, which should have $O_2^{\\bar{\\cdot}}$. Correct? – A.I. Oct 31 '16 at 16:27"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9053094,"math_prob":0.9070704,"size":291,"snap":"2019-43-2019-47","text_gpt3_token_len":71,"char_repetition_ratio":0.11149826,"word_repetition_ratio":0.0,"special_character_ratio":0.23367697,"punctuation_ratio":0.10344828,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98381037,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-23T10:07:52Z\",\"WARC-Record-ID\":\"<urn:uuid:9fe02ddc-2466-4858-b7c4-10e88932292f>\",\"Content-Length\":\"145163\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:618621be-d2ec-4621-8163-c07764603023>\",\"WARC-Concurrent-To\":\"<urn:uuid:8557976f-f479-4a41-90a1-fe7c8b318b79>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://chemistry.stackexchange.com/questions/61902/is-it-possible-to-create-a-solution-with-superoxide\",\"WARC-Payload-Digest\":\"sha1:N5AGGQODC6MPXLTQGPAZ2YRF764J6QXP\",\"WARC-Block-Digest\":\"sha1:QA7VDU74GEOT3TOX4OUTNJVW6DGTGJQP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570987833089.90_warc_CC-MAIN-20191023094558-20191023122058-00453.warc.gz\"}"} |
https://kashi.re/blog/books.html | [
"This is a list of books I plan on get/read at some point.\n\nMathematics\n\n• Discrete Mathematics with Application (S. Epp)\n• Discrete Mathematical Structures (B. Kolman, R. Busby, S. Ross))\n• Mathematical Proofs: A Transition to Advanced Mathematics (G. Chartrand, A. Polimeni, et al)\n• An Introduction to Abstract Mathematics (R. Bond, W. Keane)\n• Fearon's Pre Algebra (L. Cardine, M. Curth, et al.)\n• College Algebra (J. Kaufmann)\n• College Algebra Essentials (R. Blitzer)\n• A Graphical Approach to Algebra & Trigonometry (J. Hornsby, M. Lial, et al.)\n• Calculus 5e (J. Steward)\n• Calculus Made Easy (S. Thompson)\n• Calculus (M. Spivak)\n• A First Course in Differential Equations with Modeling Applications (D. Zill)\n• Ordinary Differential Equations With Applications (L. Andrews)\n• Elementary Linear Algebra (H. Anton)\n• Linear Algebra (S. Friedberg, A. Insel, et al.)\n• Mathematical Statistics with Applications (D. Wackeryly, W. Mendenhall, et al.)\n• A First Course in Probability (S. Ross)\n• Fundamentals of Complex Analysis (E. Saff, A. Snider)\n• Complex Variables and Applications (J. Brown, R. Churchill)\n• Analysis I (T. Tao)\n• Analysis II (T. Tao)\n• Principles of Mathematical Analysis (W. Rudin)\n• Advanced Calculus A Course in Mathematical Analysis (P. Fitzpatrick)\n• Elementary Analysis: The Theory of Calculus (K. Ross)\n• Abstract Algebra (D. Saracino)\n• Contemporary Abstract Algebra (J. Gallian)\n• Introduction to Topology (T. Gamelin, R. Greene)\n• Applied Combinatorics (A. Tucker)\n• Naive Set Theory (P. Halmos)\n• Introduction to Functional Analysis with Applications (W. Kreyszig)\n• Graph Theory (R. Gould)\n• Real Analysis (H. Royden)\n• Real and Complex Analysis (W. Rudin)\n• Foundations and Fundamental Concepts of Mathematics (H. Eves)\n\nCryptology\n\n• A First Course in Coding Theory (R. Hill)\n• Introduction to Cryptography with Coding Theory (W. Trappe, L. Washington)\n\nNotes\n\nI'm trying to find books that help with Group Theory, Ring Theory, and Field Theory. There is also a need for books about:\n\n• Functional Analysis\n• Public Key Cryptosystems\n• Cryptanalysis\n• Cryptology\n• Cryptography"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.67752457,"math_prob":0.6983379,"size":2108,"snap":"2021-31-2021-39","text_gpt3_token_len":573,"char_repetition_ratio":0.14020912,"word_repetition_ratio":0.006024096,"special_character_ratio":0.25142315,"punctuation_ratio":0.20485175,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99715644,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-26T04:22:58Z\",\"WARC-Record-ID\":\"<urn:uuid:98313c3e-2325-4ea0-a018-36e3bcde009c>\",\"Content-Length\":\"3151\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4d927de6-b00a-4e93-b68e-5e9d58120bdd>\",\"WARC-Concurrent-To\":\"<urn:uuid:95027875-ba5d-4d9f-8669-5f01cf262bbe>\",\"WARC-IP-Address\":\"50.116.47.154\",\"WARC-Target-URI\":\"https://kashi.re/blog/books.html\",\"WARC-Payload-Digest\":\"sha1:ETOK7ETXGDNZL2PAMY6W7X7DKRZBOV4E\",\"WARC-Block-Digest\":\"sha1:VLXOBIDEUTMGBINVKCUYZ5EBENW2VICI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046152000.25_warc_CC-MAIN-20210726031942-20210726061942-00496.warc.gz\"}"} |
https://encyclopedia2.thefreedictionary.com/Fermat+number | [
"# Fermat numbers\n\n(redirected from Fermat number)\nAlso found in: Wikipedia.\n\n## Fermat numbers\n\n[′fer·mä ‚nəm·bərz]\n(mathematics)\nThe numbers of the form Fn = (2(2 n )) + 1 for n = 0, 1, 2, ….\nMcGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.\nReferences in periodicals archive ?\nThe main purpose of this paper is using the elementary method to study the estimate problem of S (Fn), and give a sharper lower bound estimate for it, where Fn = [2.sup.2n] + 1 is called the Fermat number.\n152), you state, \"The first Fermat number is [2.sup.2]+1, or 5,\" and later, \"the first four Fermat numbers are prime, but [among] the rest, up to and now including the 24th, none are prime.\"\nIn a similar effort, Lenstra and Manasse also organized a massive factor-by-mail project using the Number Field Sieve in order to factor the 9th Fermat number, [2.sup.512] + 1, which as the number whose factorization was 'Most Wanted' by mathematicians.\nPapadopoulos of the University of Maryland at College Park performed a massive calculation to prove that the 24th Fermat number, which is more than 5 million digits long, is not a prime.\nIn 1990, Lenstra and a colleague used the method to factor a 155-digit Fermat number, [2.sup.m] + 1, where m = [2.sup.9] (SN: 6/23/90, p.389).\n* Two computer scientists factored a record-breaking, 155-digit Fermat number (137: 389; 138: 90).\nSystems Research Center in Palo Alto, Calif., finished factoring the tenth Fermat number, proving that this 155-digit behemoth is the product of three prime numbers.\nThey discuss topics like what prime numbers are, division and multiplication, congruences, Euler's theorem, testing for primality and factorization, Fermat numbers, perfect numbers, the Newton binomial formula, money and primes, cryptography, new numbers and functions, primes in arithmetic progression, and sequences, with examples, some proofs, and biographical notes about key mathematicians.\nHis exploration of elementary and advanced topics in classical number theory covers a range of numbers, including Fermat numbers, Mersenne primes, powerful numbers, sublime numbers, Wieferich primes, insolite numbers, Sastry numbers, and voracious numbers.\nMore recently analysis of these so-called Fermat numbers have found no other primes above [F.sub.4].\nAlong the way, the lay reader learns to appreciate how mathematicians derive such principles as Fermat numbers, the Fibonacci Series, and Godel's incompleteness theorem.\nThis capacity to exploit Fermat numbers allows the general-purpose supercomputer to surmount technical problems inherent in other machines.\nSite: Follow: Share:\nOpen / Close"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8568295,"math_prob":0.9691893,"size":2309,"snap":"2020-45-2020-50","text_gpt3_token_len":561,"char_repetition_ratio":0.1626898,"word_repetition_ratio":0.0,"special_character_ratio":0.23083586,"punctuation_ratio":0.17633928,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9912406,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-31T13:38:38Z\",\"WARC-Record-ID\":\"<urn:uuid:bb1621ce-87c9-43fa-bf3b-b474af18ded3>\",\"Content-Length\":\"42761\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aaccacc6-ddf9-4dcc-8e07-757e88bd721e>\",\"WARC-Concurrent-To\":\"<urn:uuid:ed6d3786-7ce8-4d41-af7b-35f774539c74>\",\"WARC-IP-Address\":\"85.195.124.227\",\"WARC-Target-URI\":\"https://encyclopedia2.thefreedictionary.com/Fermat+number\",\"WARC-Payload-Digest\":\"sha1:H4BZEF7C47FMLK4X7RVDMKIMWHBO2DRL\",\"WARC-Block-Digest\":\"sha1:U2CTG5N2MJEDLWZ3JGB6KJ56Y2XU2KCL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107918164.98_warc_CC-MAIN-20201031121940-20201031151940-00418.warc.gz\"}"} |
https://www.data-stats.com/maximum-value/ | [
"Question: Given a list of non-negative integers representing the value of each cell, determine the maximum amount of value you can get keeping in mind that you can’t use adjacent cells together.\n\nNow in this question, at first you might think of a greedy solution to take the largest element one by one if none of its neighbours is taken yet. But the problem with this approach is that it does not ensures a global optimal solution.\n\nFor instance, take this array\n\nInput: [1,4,6,5]\n\nIf we try to apply greedy approach here\nWe will take 6 from the array and after that our only option left is 1 so the final answer we get is 1+6=7, which we can clearly see is not the best answer because we can get 4+5=9.\n\nLet’s try to think if we can solve this problem using Dynamic Programming.\n\nFor this we need two things, first a DP state and second is base cases.\n\nLet’s take\n\n1. DP[i] = maximum amount of value we can get till position i.\n2. A[i] = value of ith cell.\n\nBase case:\n\n1. DP=0 because we haven’t used any cell yet.\n2. DP=value of first cell.\n\nTo calculate DP[i], we have two choices:\n\n1. Choose current index: In this case we can’t use the adjacent index i.e., (i-1)th index so the answer will be (DP[i-2]+A[i])\n2. Leave the current index: In this case our answer will be same as DP[i-1].\nTo get optimal solution, we will\ntake maximum of the two choices i.e., DP[i]=max(DP[i-1],DP[i-2]+A[i]).\n#include<bits/stdc++.h>\nusing namespace std;\nint main()\n{\nint n;\ncin>>n;\nvector<int> a(n+1),dp(n+1,0);\nfor(int i=1;i<=n;i++)\n{\ncin>>a[i];\n}\ndp=0;\ndp=a;\nfor(int i=2;i<=n;i++)\n{\ndp[i]=max(dp[i-1],dp[i-2]+a[i]);\n}\ncout<<dp[n]<<endl;\nreturn 0;\n}\n\nInput:\n\n5\n\n[2 ,8, 9, 8, 1]\n\nOutput:\n\n16\n\nThat’s all I have and thanks a lot for reading 😉 . Please let me know if any corrections/suggestions. Please do share and comments if you like the post. Thanks in advance…\n\nThanks Shiva Gupta for helping us to grow day by day. Shiva is expert in Data Structure and loves to solve competitive problems.\n\n$${}$$"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.81763184,"math_prob":0.9836664,"size":1982,"snap":"2022-05-2022-21","text_gpt3_token_len":555,"char_repetition_ratio":0.08746208,"word_repetition_ratio":0.0057971017,"special_character_ratio":0.29667002,"punctuation_ratio":0.13333334,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9981752,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-17T19:27:30Z\",\"WARC-Record-ID\":\"<urn:uuid:d930510a-d790-40ef-a988-1ff4e5d30d8b>\",\"Content-Length\":\"77874\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d8c4cc31-61ea-412d-97d6-4e0cb6e4a4ab>\",\"WARC-Concurrent-To\":\"<urn:uuid:5ef91bb9-3412-444e-bd77-ee7142ad7db0>\",\"WARC-IP-Address\":\"148.66.138.158\",\"WARC-Target-URI\":\"https://www.data-stats.com/maximum-value/\",\"WARC-Payload-Digest\":\"sha1:V2BS33G3FG6TXCGIQBPHOMGPEVWHFUAS\",\"WARC-Block-Digest\":\"sha1:NNWDJ7NBV4GQGRUOM6I5MOBUVOFVL6LR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320300616.11_warc_CC-MAIN-20220117182124-20220117212124-00068.warc.gz\"}"} |
https://www.exceltactics.com/calculate-net-work-hours-using-networkdays/ | [
"# How to Calculate Net Work Hours Between Two Dates",
null,
"Counting the number of hours between dates and times in Excel is normally a straightforward process. Since Excel stores dates as decimal numbers, you can just subtract the two to get your result. But when you are working with business hours, like for time sheets or hours worked, you need to take weekends and holidays into account. Excel has a function called NETWORKDAYS, but this only works with complete days. To calculate the Net Work Hours between two dates, we need to build our own formula. Here’s how…\n\n## Details of the Net Work Hours Formula\n\nA lot of assumptions have to be made about any formula that works with dates and times. Definitions of terms like work day, weekend, and holiday can vary, so this is a summary of the assumptions of this net work hours formula:\n\n• The eligible work hours in a given work day start and end at the same time each work day.\n• Weekend days do not count as work days. The weekend is defined as Saturday and Sunday of each week (look ahead to Non-Standard Weekends with NETWORKDAYS.INTL to change this).\n• Holidays, as listed, do not count as work days.\n• Partial work days at the start and end of a date period are included for their fraction of hours.\n• If the start time of the work day is later than the end time of the work day, the formula nets zero.\n• If the start date and time is later than the end date and time, the formula nets zero.\n\nThere are modifications available to the above rules later in this tutorial:\n\nIf your definition of weekend is different than above and you have Excel 2007 or newer, you can look ahead to Non-Standard Weekends with NETWORKDAYS.INTL to change this.\n\nIf you want to include all 24 hours of each work day rather than a specified range of work hours, you can look ahead to 24 Hour Net Workday Hours Variation to tally the total number of hours each work day.\n\n## Setting Up the Variables for Net Work Hours\n\nIn order to calculate the net work hours between two dates, we need to have some information to start with. Here are the variables necessary to make the net work hours formula work.\n\n\\$Start_Time – This is the time that the work day starts, as an Excel-formatted time. (e.g. 9:00AM) No date should be attached. The variable is marked with a dollar sign because you will probably want to anchor this cell reference in the formula.\n\n\\$End_Time – This is the time that the work day ends, as an Excel-formatted time. (e.g. 5:00PM) No date should be attached. The variable is marked with a dollar sign because you will probably want to anchor this cell reference in the formula.\n\nStart_Date – This is the starting date and time for your period, as an Excel-formatted date and time (e.g. 12/30/2013 11:00AM)\n\nEnd_Date – This is the ending date and time for your period, as an Excel-formatted date and time (e.g. 1/14/2014 4:00PM)\n\nHolidayList – This is a named range containing a list of days that are to be considered holidays and not counted as work days, even if they are not on the weekend. (e.g. New Year’s Day – 1/01/2013) It is usually located elsewhere on the worksheet.\n\n### Setting Up the HolidayList Named Range\n\nThe function NETWORKDAYS takes an array input called [holidays] that lists all the non-weekend days that should be excluded from the calculation. This means that we could give the function a series of dates in brackets, but they would need to be formatted in Excel date format. This means that they need to be converted using a DATE function. (See the Definitive Guide to Using Dates and Times in Excel for an explanation.) An easier approach is to build a named range.\n\nIn a separate worksheet tab, or in an un-used portion of your current spreadsheet, make a column list of the dates you want to include as holidays in Excel date-format. You can either use a DATE function to specify the year, month, and day for each, or let Excel auto-convert as you type.\n\nWhen you finish your list, select the list (and maybe a few extra cells, if you plan to add to it later). The name of the first cell in the selection appears in the name box above the spreadsheet cells…",
null,
"With your list selected, select the cell name in the name box, type in “HolidayList“, and press ENTER.",
null,
"You have now named the selected cells as an array. It can be referred to in the net work hours formula as HolidayList instead of manually entering the range, and the NETWORKDAYS function can automatically exclude those dates from calculations.\n\n## The Net Work Hours Formula\n\nHere is the formula, in all it’s glory. Replace the variable names like \\$Start_Time and HolidayList with your specific references. You can look to the sample file at the end of this post for an example of the formula in action.\n\n```=IF(OR(\\$End_Time<\\$Start_Time,End_Date<Start_Date),0,\n(NETWORKDAYS(Start_Date,End_Date,HolidayList)\n-(NETWORKDAYS(Start_Date,Start_Date,HolidayList)\n*IF(MOD(Start_Date,1)>\\$End_Time,1,\n(MAX(\\$Start_Time,MOD(Start_Date,1))-\\$Start_Time)\n/(\\$End_Time-\\$Start_Time)))\n-(NETWORKDAYS(End_Date,End_Date,HolidayList)\n*IF(MOD(End_Date,1)<\\$Start_Time,1,\n(\\$End_Time-MIN(\\$End_Time,MOD(End_Date,1)))\n/(\\$End_Time-\\$Start_Time))))\n*(\\$End_Time-\\$Start_Time)*24)```\n\nWe’ll walk through how it works in a moment, but first, let’s look at a couple of variations that can solve different versions of the net work hours problem.\n\n## Non-Standard Weekends with NETWORKDAYS.INTL\n\nIf you have Excel 2007 or newer, you can use a modified version of the NETWORKDAYS function called NETWORKDAYS.INTL to re-define what days are the “weekend” of each week. NETWORKDAYS.INTL takes an additional input called [weekend] that defines from a list which days are included in the weekend. The syntax for NETWORKDAYS and NETWORKDAYS.INTL are as follows:\n\n`=NETWORKDAYS(start_date, end_date, [holidays])`\n`=NETWORKDAYS.INTL(start_date, end_date, [weekend], [holidays])`\n\nNote the additional input [weekend]. The [weekend] input has the following input options:",
null,
"If you just enter 1, NETWORKDAYS.INTL behaves identically to NETWORKDAYS. Other options give you additional flexibility on your definition of “weekend”.\n\nFor example, if you want to define the weekend as Monday and Tuesday, the net work hours formula becomes the following:\n\n```=IF(OR(\\$End_Time<\\$Start_Time,End_Date<Start_Date),0,\n(NETWORKDAYS.INTL(Start_Date,End_Date,3,HolidayList)\n-(NETWORKDAYS.INTL(Start_Date,Start_Date,3,HolidayList)\n*IF(MOD(Start_Date,1)>\\$End_Time,1,\n(MAX(\\$Start_Time,MOD(Start_Date,1))-\\$Start_Time)\n/(\\$End_Time-\\$Start_Time)))\n-(NETWORKDAYS.INTL(End_Date,End_Date,3,HolidayList)\n*IF(MOD(End_Date,1)<\\$Start_Time,1,\n(\\$End_Time-MIN(\\$End_Time,MOD(End_Date,1)))\n/(\\$End_Time-\\$Start_Time))))\n*(\\$End_Time-\\$Start_Time)*24)```\n\nNote the change to NETWORKDAYS.INTL and the use of 3 as the input for the new [weekend] term in the function.\n\n## 24 Hour Net Workday Hours Variation\n\nThe above two versions operate on the assumption that there are defined start times and end times to each work day. Sometimes, though, we need to count all 24 hours of each eligible day. This is actually a simpler problem to solve, since we don’t need to look for ineligible hours in eligible work days. Therefore, the formula becomes:\n\n```=IF(Start_Date>End_Date,0,(NETWORKDAYS(Start_Date,End_Date,HolidayList)\n-NETWORKDAYS(Start_Date,Start_Date,HolidayList)*MOD(Start_Date,1)\n-NETWORKDAYS(End_Date,End_Date,HolidayList)*(1-MOD(End_Date,1)))*24)```\n\nIf you need to use a non-standard weekend definition, you can replace the NETWORKDAYS functions in the formula with the NETWORKDAYS.INTL as shown in the Non-Standard Weekend section above.\n\n## How the Net Work Hours Formula Works\n\nThere are a lot of moving parts to this formula, so it is useful to step through it procedurally. We’ll use an example case to walk through the logic of the formula step-by-step.\n\nFor this example, we’ll assume the following:\n\nStart_Date is December 30, 2013 at 11:00 am.\nEnd_Date is January 9, 2014 at 12:00 pm.\n\\$Start_Time is 9:00 AM.\n\\$End_Time is 5:00 PM.\nHolidayList includes only January 1, 2014 (New Years Day).\n\n### Step 1",
null,
"Check if the dates or times are impossible (i.e. the period ends before it starts). If so, return zero, otherwise, continue to step 2.\n\n### Step 2",
null,
"Add the total number of days in the date series, minus weekends and holidays.\n\n### Step 3",
null,
"Remove the greater of either the \\$Start_Time or the Start_Date time on the Start_Date day. Remove the greater of the time after the \\$End_Time or the time after the End_Date time on the End_Date day. (Not shown: If the Start_Date time starts after the \\$End_Time, subtract an entire day. If the End_Date time comes before the \\$Start_Time, subtract an entire day.)\n\n### Step 4",
null,
"For every work day between Start_Date and End_Date, count only the hours between \\$Start_Time and \\$End_Time.",
null,
"This is the outcome of the subtractions in the formula.\n\n### Step 5",
null,
"Add up the partial days in all the periods and multiply by 24 to calculate the total net work hours.",
null,
"Andrew Roberts has been solving business problems with Microsoft Excel for over a decade. Excel Tactics is dedicated to helping you master it. You can read more of his writing on his personal blog at NapkinMath.io."
] | [
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursLead.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/HolidayListNamedRange.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/HolidayListNamedRangeAfter.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkDayIntlWeekend.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursStep1.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursStep2.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursStep3.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursStep4.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursStep5.png",
null,
"https://exceltactics.com/wp-content/uploads/2014/01/NetWorkHoursStep6.png",
null,
"https://exceltactics.com/wp-content/uploads/2013/08/AndrewThumbnail.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.88486505,"math_prob":0.9324679,"size":9385,"snap":"2020-45-2020-50","text_gpt3_token_len":2324,"char_repetition_ratio":0.16469459,"word_repetition_ratio":0.09103261,"special_character_ratio":0.2374001,"punctuation_ratio":0.12385073,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98684967,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,6,null,8,null,6,null,8,null,6,null,6,null,6,null,6,null,6,null,6,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-26T09:58:13Z\",\"WARC-Record-ID\":\"<urn:uuid:18c401e7-44d4-4d37-b413-9f15afa886b4>\",\"Content-Length\":\"65097\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fd18531b-0e13-47c6-8e19-ab3b7ac413ee>\",\"WARC-Concurrent-To\":\"<urn:uuid:f07dba50-ea80-4e9a-8f36-d4fb2351302c>\",\"WARC-IP-Address\":\"104.28.8.28\",\"WARC-Target-URI\":\"https://www.exceltactics.com/calculate-net-work-hours-using-networkdays/\",\"WARC-Payload-Digest\":\"sha1:2RK4SA74U7NHVAL64ZPWXXXZ5QEVSHLC\",\"WARC-Block-Digest\":\"sha1:AAFBSVQ6NXNOL3RBHSQ2QFGX3JY5A5V5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107891203.69_warc_CC-MAIN-20201026090458-20201026120458-00325.warc.gz\"}"} |
https://open.library.ubc.ca/cIRcle/collections/ubctheses/24/items/1.0064956 | [
"# Open Collections\n\n## UBC Theses and Dissertations",
null,
"## UBC Theses and Dissertations\n\n### Design of SiGe/Si quantum-well optical modulators Tasmin, Tania 2010\n\nNotice for Google Chrome users:\nIf you are having trouble viewing or searching the PDF with Google Chrome, please download it here instead.\n\n#### Download\n\nMedia\n24-ubc_2010_fall_tasmin_tania.pdf [ 1003.66kB ]\nMetadata\nJSON: 24-1.0064956.json\nJSON-LD: 24-1.0064956-ld.json\nRDF/XML (Pretty): 24-1.0064956-rdf.xml\nRDF/JSON: 24-1.0064956-rdf.json\nTurtle: 24-1.0064956-turtle.txt\nN-Triples: 24-1.0064956-rdf-ntriples.txt\nOriginal Record: 24-1.0064956-source.json\nFull Text\n24-1.0064956-fulltext.txt\nCitation\n24-1.0064956.ris\n\n#### Full Text\n\n```Design of SiGe/Si Quantum-Well Optical Modulators by Tania Tasmin B.Sc., Bangladesh University of Engineering and Technology, 2004 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE in The Faculty of Graduate Studies (Electrical and Computer Engineering) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) August 2010 c© Tania Tasmin 2010 Abstract An electro-optic modulator containing a single SiGe/Si quantum-well has been designed for operation at λ0 = 1.55 µm. This single quantum-well modulator has a lower VpiLpi than the 3 quantum-well modulator recently designed and optimized by Maine et al. for operation at λ0 = 1.31 µm, for which the VpiLpi product was 1.8 V·cm . Both modulators are de- rived from the detailed design given for their modulator in . This sin- gle quantum-well modulator contains a Si0.8Ge0.2 quantum-well with Non- Intentionally Doped (NID) and P+ highly doped layers on either side. With no field applied, holes from the P+ layers are captured by and confined in the quantum-well and when a reverse bias is applied holes are released from the quantum well and drift to the P+ contact layer. Variations of the hole distri- bution lead to changes in the free-carrier absorption and the refractive index of each layer and subsequently to phase modulation of guided TE modes. The VpiLpi product of the single quantum-well modulator is estimated 1.09 V·cm for low voltage linear modulation and 1.208 V·cm for 0 to 1.6 V digital modulation, whereas the 3 quantum-well modulator gives a VpiLpi of 2.039 V·cm for 0 to 6 V digital modulation for operation at λ0 = 1.55 µm. Also, the optical loss in the single quantum-well (5.36 dB/cm at V = 0 V) is lower than that of the 3 quantum-well structure (5.75 dB/cm at V = 0 V). This ii Abstract single quantum-well modulator should also offer higher frequency operation than the 3 quantum-well modulator. iii Table of Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Dedication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Statement of Co-Authorship . . . . . . . . . . . . . . . . . . . . . xvi 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Optical Modulation in Si and Si-based Materials . . . . . . . 3 1.2.1 Franz-Keldysh Effect (FKE) . . . . . . . . . . . . . . 5 1.2.2 Quantum-Confined Stark Effect (QCSE) . . . . . . . 9 1.2.3 Free Carrier Absorption Effect . . . . . . . . . . . . . 10 1.3 Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect . . . . . . . . . . . . . . . . . . . . . . . . 14 iv Table of Contents 1.3.1 Mach-Zehnder Interferometer . . . . . . . . . . . . . . 19 1.3.2 Fabry-Perot Interferometer . . . . . . . . . . . . . . . 20 1.3.3 Ring Resonator . . . . . . . . . . . . . . . . . . . . . 21 1.4 Organization of the Thesis . . . . . . . . . . . . . . . . . . . 23 2 Material Choice, Device Structure, and Electrical and Op- tical Simulations . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.1 SiGe/Si Heterostructure Properties . . . . . . . . . . . . . . 28 2.1.1 Bandgaps and Band Alignments for SiGe/Si Heterostruc- ture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.1.2 Refractive Index and Absorption Coefficient . . . . . 31 2.2 Software for Electrical Simulation . . . . . . . . . . . . . . . 32 2.2.1 Basic Steps of Electrical Analysis in ATLAS . . . . . 33 2.2.2 Models Incorporated for Device Simulation . . . . . . 34 2.3 Optical Simulations . . . . . . . . . . . . . . . . . . . . . . . 38 2.3.1 Silicon-On-Insulator (SOI) Waveguides . . . . . . . . 38 2.3.2 Mode Solver for Optical Simulation . . . . . . . . . . 41 2.4 Design of the SiGe/Si Optical Modulator . . . . . . . . . . . 42 2.4.1 Device Structure . . . . . . . . . . . . . . . . . . . . 44 2.4.2 Electrical and Optical Analysis . . . . . . . . . . . . . 45 2.5 DC analysis in 3 Quantum-Well SiGe/Si Modulator . . . . . 47 2.5.1 Electrical Analysis . . . . . . . . . . . . . . . . . . . . 49 2.5.2 Calculation of Absorption Coefficient and Refractive Index . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 2.5.3 Effective Index and Optical Loss Calculation . . . . . 57 v Table of Contents 2.6 Transient Analysis . . . . . . . . . . . . . . . . . . . . . . . . 59 2.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 3 Single Quantum-Well SiGe/Si Optical Modulator . . . . . 65 3.1 DC analysis in Single Quantum-Well SiGe/Si Modulator . . 66 3.1.1 Refractive Index Change in Single SiGe/Si Quantum- Well Optical Modulator . . . . . . . . . . . . . . . . . 67 3.1.2 Effective Index and Optical Loss Calculation . . . . . 68 3.2 Transient Analysis . . . . . . . . . . . . . . . . . . . . . . . . 71 3.3 Mach-Zehnder Interferometer Performance . . . . . . . . . . 75 3.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 4 Summary, Conclusion, and Suggestions for Future Work . 80 4.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 4.2 Suggestions for Future Work . . . . . . . . . . . . . . . . . . 83 4.2.1 All-Silicon Optical Modulators . . . . . . . . . . . . . 83 4.2.2 Traveling-Wave Electrodes . . . . . . . . . . . . . . . 83 Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Appendices A Mach-Zehnder Interferometer . . . . . . . . . . . . . . . . . . 94 B Mode Solver Program . . . . . . . . . . . . . . . . . . . . . . . 98 vi List of Tables 1.1 Si electro-absorption modulators . . . . . . . . . . . . . . . . 15 1.2 Free carrier absorption based silicon modulators . . . . . . . 17 vii List of Figures 1.1 Kerr effect in c-Si, re-digitized from . . . . . . . . . . . . . 5 1.2 (a) Energy band diagram, (b) absorption spectrum in bulk semiconductor with and without the electric field. . . . . . . . 6 1.3 Field dependence of refractive index change at two wave- lengths, re-digitized from . . . . . . . . . . . . . . . . . . . 8 1.4 Quantum-well wavefunctions with and without electric field. . 9 1.5 Optical absorption of c-Si showing the influence of various concentrations of (a) free electrons (b) free holes, re-digitized from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.6 Refractive index perturbation in c-Si produced as a function of free carrier concentration at (a) λ = 1.3 µm, (b) λ = 1.55 µm, re-digitized from . . . . . . . . . . . . . . . . . . . . . 13 1.7 Schematic view of the Mach-Zehnder interferometer. Two optical Y-branch couplers are used to split and recombine the incoming light. . . . . . . . . . . . . . . . . . . . . . . . . 20 1.8 Schematic view of the Fabry-Perot cavity. . . . . . . . . . . . 21 1.9 Schematic view of the ring resonator. . . . . . . . . . . . . . . 22 viii List of Figures 2.1 Critical layer thickness of SiGe layer grown on Si as a function of the Ge mole fraction, re-digitized from . . . . . . . . . . 30 2.2 Band alignments for Si1−xGex/Si heterostructures on Si sub- strate, where χ is the electron affinity. . . . . . . . . . . . . . 32 2.3 Absorption coefficient of Si and strained SiGe, temperature is 300K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.4 The two major recombination processes in silicon are (a) SRH recombination (b) Auger recombination . . . . . . . . . . . . 35 2.5 Schematic band diagram of an abrupt heterojunction. Ef1 and Ef2 represents the electron quasi-fermi level in each semi- conductor region. JTE and JTunnel are the thermionic emis- sion and tunneling current, respectively. . . . . . . . . . . . . 37 2.6 SOI planar waveguide, the refractive indices (n) of the layers are shown for the wavelength of 1.55 µm. The z direction is taken as the direction of light propagation. . . . . . . . . . . 39 2.7 Different configurations of three dimensional waveguides (a) strip, (b) embedded strip, (c) rib (or ridge), and (d) strip- loaded waveguides. . . . . . . . . . . . . . . . . . . . . . . . . 40 2.8 Cross section of the SOI rib waveguide discussed in . . . . 41 2.9 2D Mode profile for the fundamental TE mode of the SOI rib waveguide discussed in . Each line represents an identi- cal field value (−3 dB step between lines, −45 dB minimum value). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 2.10 Schematic view of the 3 quantum-well SiGe/Si optical mod- ulator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 ix List of Figures 2.11 Hole distribution in various layers at various reverse bias volt- ages. With the increase of reverse biasing, hole deplete from the quantum-wells. Holes starts to deplete from the NID layer on the P+ side after all the quantum-wells are fully depleted i.e. after 7.5 V NID layer starts depleting. . . . . . . . . . . . 50 2.12 (a) Valence and conduction band energy profiles for the 3 quantum-well SiGe/Si structure, black lines are for V = 0 V and red lines are for V = 6 V, the dotted line shows the quasi-fermi energy level for holes (b) electric field in the 3 quantum-well SiGe/Si structure. . . . . . . . . . . . . . . . . 51 2.13 (a) Effective index variation in a single quantum-well modu- lator with and without averaging the hole concentration (b) optical loss with and without averaging the hole concentration. 53 2.14 Electron distribution in various layers at various reverse bias voltages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 2.15 Refractive index changes (∆nv = nv − n0) at λ0 = 1.55 µm and λ0 = 1.31 µm (a) in the quantum-wells with dash-dot line, dotted line, and solid line for quantum- well 1, 2, 3 re- spectively. (b) in the NID layer on the P+ side . . . . . . . . 55 2.16 Refractive index changes at λ0 = 1.55 µm in the (a) NID layers (b) δ-doped-P+ layers . . . . . . . . . . . . . . . . . . . 56 2.17 (a) Effective index variation (∆neff-v = neff-v − neff-0) of the 3 quantum-well modulator; the blue point shows the effective index variation at 6 V obtained by Marris et al. in Ref. (b) optical loss at various voltages. . . . . . . . . . . . . . . . 58 x List of Figures 2.18 Hole density distribution at various times in the 3 quantum- well modulator, only the quantum-wells and the P+ layers are shown in the figure. . . . . . . . . . . . . . . . . . . . . . . . 60 2.19 Hole density distribution with time in the 3 quantum-well modulator for (a) t = 0 ps to t = 100 ps (b) t = 100 ps to t = 200 ps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 2.20 Effective index variation with time in the 3 quantum-well modulator for 0 to 6 V variation (a) with field dependent mobility model (b) without field dependent mobility model. . 62 3.1 Schematic view of the SiGe/Si optical modulator. . . . . . . . 66 3.2 Comparison of the refractive index change in the single quantum- well structure and in the first quantum-well of the 3 quantum- well structure at λ0 = 1.55 µm. The refractive index change in the NID layers on the P+ side are shown for both the single quantum-well and the 3 quantum-well modulator. . . . . . . . 68 3.3 Comparison of the (a) effective index variation (b) slope of the effective index variation for single quantum-well and 3 quantum-well structure. . . . . . . . . . . . . . . . . . . . . . 69 3.4 Comparison of the optical loss in the single quantum-well modulator and the 3 quantum-well modulator. . . . . . . . . 70 3.5 Hole density distribution at various times in the single quantum- well modulator, only the quantum-well and the P+ layers are shown in the figure. . . . . . . . . . . . . . . . . . . . . . . . 72 xi List of Figures 3.6 Hole density distribution with time in the single quantum- well modulator for (a) t = 0 ps to t = 100 ps (b) t = 100 ps to t = 200 ps. . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 3.7 Effective index variation with time in the single quantum-well modulator for 0 to 1.6 V variation. . . . . . . . . . . . . . . . 74 3.8 Ratio of output to input intensity in a MZI, dotted line shows the slope of this curve. . . . . . . . . . . . . . . . . . . . . . 77 4.1 (a) All-Si optical modulator (vertical diode), (b) all-Si optical modulator (lateral diode). . . . . . . . . . . . . . . . . . . . . 84 A.1 Schematic view of the Mach-Zehnder interferometer. Two optical Y-branch couplers are used to split and recombine the incoming light. . . . . . . . . . . . . . . . . . . . . . . . . 95 B.1 A typical finite difference mesh for an integrated waveguide. The rib waveguide is shown by the shaded region. P, N, S, E, W, NE, NW, SE and SW are used to label, respectively, the grid point under consideration, and its nearest neighbours to the north, south, east, west, north-east, north-west, south- east, and south-west. . . . . . . . . . . . . . . . . . . . . . . . 100 xii Acknowledgements I would like to express my profound gratitude to my thesis supervisor: Dr. Nicolas A. F. Jaeger for his friendly supervision and guidance through- out the course of this research work. He was always ready to offer timely suggestions and I have learned a lot from him. Sincere and special thanks go to Dr. Lukas Chrostowski (my co-supervisor) and Dr. Nicolas Rouger for the endless discussions on problems I encountered during the course of this work. Without their support and kind guidance, I would not have made it as far as I did. I am also grateful to Dr. Guangrui Xia for her valuable discussions and assistance. I would also like to thank everybody who has contributed in one way or another to my experience at UBC: Dr. Jaeger’s graduate students, Dr. Chrostowski’s graduate students, Dr. Alina Kulpa. I would like to thank my parents Md. Shafiqul Islam and Shahjat Merina for their prayers and encouragement and also my husband Sharif Fakhruz Zaman and my sweet daughter Sharif Maymunah Zaman for their support, love, and patience. I would also like to thank my grandmother Begum Fazilatunnesa for her love and prayers at every stage my life. Above all, I give thanks to Allah, for the gift of life, with a bit of knowl- xiii Acknowledgements edge and understanding and mercy. xiv Dedication To my loving parents. xv Statement of Co-Authorship Chapter two and chapter three of this thesis will be published in SPIE Photonics North Proceedings, 2010. The authors are Tania Tasmin, Nicolas Rouger, Guangrui Xia, Lukas Chrostowski, and Nicolas A. F. Jaeger. The literature review and the modeling for this research work were done by Tania Tasmin under the supervision of Dr. Nicolas Jaeger, Dr. Lukas Chrostowski, and Dr. Guangrui Xia. Tania Tasmin did the final preparation for the manuscript of the paper after careful revision and approval by Nicolas Rouger, Guangrui Xia, Lukas Chrostowski, and Nicolas A. F. Jaeger. xvi Chapter 1 Introduction Today optical interconnects dominate long-distance communications due to their low transmission loss, high bandwidth, and immunity to interference. But, in the case of short distance communications, such as chip-to-chip and on-chip interconnects, the electrical interconnects (metal wires) still domi- nate. However, due to the dramatic increase in the number of transistors per chip and the shrinkage of the transistors, electrical interconnects encounter many problems such as RC propagation delays, signal distortion, and high power consumption. Thus with the transistors getting smaller, electrical in- terconnects have become the primary bottleneck for the improvement of the chip performance . Optical interconnects offer a promising way to allevi- ate this bottleneck. The basic advantages of the optical interconnects over the electrical interconnects are reduced delay, lower power consumption, and higher bandwidth. 1.1 Motivation The improvement of the modern technology leads a dramatic increase in the number of transistors per chip as well as the shrinkage of transistors on a microprocessor . This shrinking process results in a spectacular im- 1 1.1. Motivation provement of the device speed. On the microprocessor, metallic (electrical) interconnects are used for signalling and clocking. Local interconnects, con- sisting of very thin conductors, are used to connect various parts of multiple transistors within a functional block on the chip. Global interconnects pro- vide clock and signal distribution between different functional blocks on the chip and deliver power/ground to all of the functional blocks . With the miniaturization of transistors on the chip, the length of the local intercon- nects scale down and propagation delay for the local interconnects is not an issue. But the cross-sectional area of the global interconnects reduce without changing the length which leads to the increase of the resistance of the global interconnect and hence the increase of RC propagation delays . Other problems with electrical interconnects are the power consump- tion and the signal distortion. Thus with the transistor shrinking, electrical interconnects have become the primary bottleneck for improvement of the device performance . Optical interconnects offer a promising way to alle- viate this bottleneck. The basic advantages of the optical interconnects over the electrical interconnects are reduced RC delay, lower power consumption, and higher bandwidth, particularly for the longer distance interconnects (e.g. across the chip, between processor cores). The basic building blocks of an optical interconnect system are light sources, modulators, waveguides, and detectors. Light sources can be either directly modulated (light source is turned on/off according to an electrical signal) or it can be used with an external modulator (light coming from the light source will be coupled with an external modulator and the light intensity at the modulator output is controlled by an applied electrical signal 2 1.2. Optical Modulation in Si and Si-based Materials to the modulator). Waveguides provide a means of carrying light from the light sources to the modulators and from the modulator to the detector or other parts of the chip. Detectors are used to convert the modulated light back into electrical signal. Silicon-based materials are the best platform for the various compo- nents of on-chip optical interconnects. Due to their CMOS (Complementary Metal-Oxide-Semiconductor) compatibility, both the electronic circuit and photonic circuit can be grown monolithically on the same substrate, reduc- ing the cost . Moreover, stronger optical confinement can be obtained with SOI (Silicon-On-Insulator) waveguides due to the higher refractive in- dex contrast between Si and SiO2 as compared to those obtained with III-V based optical interconnects grown on Si substrates . Significant progress has been made to develop Si-based, on-chip, optical components and, in par- ticular, the light sources, the waveguides, and the photodetectors . The main obstacle for implementing the optical interconnect system is developing a Si-based optical modulator with low drive voltage, small size, low optical loss, and high speed. In this thesis we have designed SiGe/Si quantum-well modulators having all these properties. 1.2 Optical Modulation in Si and Si-based Materials Optical modulation is defined as the process of varying a property of light e.g., phase, frequency, polarization, or intensity according to an applied electrical signal (i.e., the process of impressing information on a light car- 3 1.2. Optical Modulation in Si and Si-based Materials rier). The optical modulators can be grouped into two major types: electro- absorption modulators and electro-optic modulators. In an electro-absorption modulator, a variation of the light intensity at the modulator output, according to the applied electric field, is obtained through the variation of the optical absorption coefficient of the waveguide material. ON/OFF states correspond to the situation of low absorption coefficient and high absorption coefficient, respectively. In an electro-optic modulator, the phase of the carrier light is varied according to the applied electric field through the variation of the refractive index of the waveguide material. An integrated interferometer is typically used to convert the re- fractive index induced phase modulation into the intensity modulation. The electro-absorption effect include the Franz-Keldysh effect and the quantum-confined Stark effect. The electro-optic effect include Pockels ef- fect, Kerr effect, and free carrier absorption effect. The Pockels effect, in which the refractive index change of a material is linearly proportional to the applied electric field, is absent in Si. The Kerr effect, in which the refractive index change is proportional to the square of the applied electric field, is very small in Si as shown in Fig. 1.1 . Hence, the Franz-Keldysh effect, the quantum-confined stark effect, and the free carrier absorption effect, which are the relevant optical modulation mechanisms in Si and Si-based materials, are described in section 1.2.1, 1.2.2, and 1.2.3, respectively. 4 1.2. Optical Modulation in Si and Si-based Materials 104 105 106 10−8 10−7 10−6 10−5 10−4 Applied field (V/cm) − ∆n Figure 1.1: Kerr effect in c-Si, re-digitized from . 1.2.1 Franz-Keldysh Effect (FKE) When a strong electric field is applied to a bulk semiconductor, the ab- sorption coefficient of the semiconductor changes according to the applied electric field. Also, with the application of the electric field, there is a tilt in the valence band and in the conduction band. At some locations, the energy difference between the conduction band and the valence band is re- duced (by dE) below the bandgap energy Eg. Photons with energy higher than Eg− dE are absorbed at these locations by exciting the electrons from the valance band to the conduction band as shown in Fig. 1.2(a). So there is an absorption tail below the bandgap energy as shown in Fig. 1.2(b). This effect is known as Franz-Keldysh effect . 5 1.2. Optical Modulation in Si and Si-based Materials E<Eg E>Eg (a) With Electric Field Without Electric Field A b s o r p t i o n C o e f f i c i e n t ( α ) Eg A b s o r p t i o n C o e f f i c i e n t ( Energy (E) Eg-dE (b) Figure 1.2: (a) Energy band diagram, (b) absorption spectrum in bulk semiconductor with and without the electric field. 6 1.2. Optical Modulation in Si and Si-based Materials The complex refractive index of a material can be written as n + ik, where n is the refractive index and k is the optical extinction coefficient. The absorption coefficient, α is related to k by k = αλ/4pi. The change in the real part of the refractive index (∆n) and in the imaginary part of the refractive index (∆α) are related by the following Kramers-Kronig relations ∆n(E) = c pi P ∫ ∞ 0 ∆α(Ē) Ē2 − E2 dĒ (1.1) ∆α(E) = − c pi P ∫ ∞ 0 ∆n(Ē) Ē2 − E2 dĒ (1.2) The absorption change with the applied electric field is obtained by ∆α(E, ξ) = α(E, ξ)− α(E, 0) (1.3) where E is the energy of the light and ξ is the applied electric field. Hence, in the Franz-Keldysh effect, the electric field involves a change in both the absorption coefficient and in the refractive index. Soref and Benett quan- tified the change in the refractive index in silicon using the electro-absorption spectrum measured by Wendland and Chester . They plotted the change in refractive index as a function of the applied electric field (Franz-Keldysh effect) at λ0 = 1.07 µm and at λ0 = 1.09 µm which are shown in Fig. 1.3. The Franz-Keldysh effect falls very significantly at the telecommunication wavelength, so this effect is not a favourable choice for the silicon electro- optic modulators. 7 1.2. Optical Modulation in Si and Si-based Materials 40 140 240 34010 −6 10−5 10−4 E (kV/cm) ∆n λ =1.07 µ m λ =1.09 µ m Figure 1.3: Field dependence of refractive index change at two wavelengths, re-digitized from . 8 1.2. Optical Modulation in Si and Si-based Materials 1.2.2 Quantum-Confined Stark Effect (QCSE) In a quantum-well, when no electric field is applied, the electron and the hole wavefunctions are symmetrical inside the well and electron-hole are coupled together by coulombic forces to form excitons. These excitons give sharp resonance peaks at the band-edge of the absorption spectrum in absence of an electric field. With the application of the electric field, the quantum-well energy decreases with respect to the center of the well and electron and hole wavefunctions shift towards the opposite sides of the quantum-well. Due to the electron and hole separation in the quantum-well, the exciton peak is lowered at the band-edge and the band-edge is shifted towards the long wavelength (red shifting) . Ec Ev Without Electric Field With Electric Field Figure 1.4: Quantum-well wavefunctions with and without electric field. Recently the discovery of strong QCSE is reported in compressively strained Ge quantum-wells with SiGe barriers . We will discuss about 9 1.2. Optical Modulation in Si and Si-based Materials this electro-absorption modulator in section 1.3. 1.2.3 Free Carrier Absorption Effect If the energy of the incident light is so small that the photons cannot transfer electrons from the valence band to the conduction band, electrons (or holes) undergo transitions within different states in the same band by absorbing the incoming light. This is known as the free carrier absorption . The free carrier absorption depends on the free carrier concentration of the material. If carriers are injected to an undoped sample, the absorption coefficient of that material increases and the refractive index decreases . If the carriers are removed from a doped sample, the opposite effect takes place. As the refractive index change depends on both the frequency of light and the plasma of free carriers, this absorption is also called as plasma dispersion effect. In classical physics, free carriers (electrons and holes) are treated as particles, and they are forced into motion by the incoming light. The dis- placement vector of the carriers, which is related to the electric field of the light, can be found by solving the equation of motion of the carriers. By putting this value of the displacement vector into the equation for dielectric permittivity, the formula for free-carrier-induced absorption change and the refractive index change are found as [12, 13] ∆α = λ2e3 4pi2c3n\u000f0 ( ∆Ne µem∗2e + ∆Nh µhm ∗2 h ) (1.4) 10 1.2. Optical Modulation in Si and Si-based Materials ∆n = λ2e2 8pi2c2n\u000f0 ( ∆Ne m∗e + ∆Nh m∗h ) (1.5) here e is the charge of an electron, \u000f0 is the free space permittivity, n is the unperturbed refractive index, ∆Ne and ∆Nh are the change of concentra- tion of free electrons and holes, respectively; m∗e and m∗e are the effective masses of electron and hole respectively and µe and µh are the mobilities of electrons and holes, respectively. However, these equations (defined as the Drude model) for free carrier absorption ignore all of the scattering process involving phonons or other impurities for conservation of momentum. Later Soref and Benett collected some experimental results [14–16] on the absorp- tion spectrum of doped silicon (which are shown in Fig. 1.5), which include all of the scattering effects on the change of free carrier absorption. From these curves they calculated the change in free carrier absorption and from the change in absorption they calculated the change in refractive index using the Kramers-Kronig relations. Then they used these results to determine the carrier-concentration dependence of the refractive index change at two specific wavelengths: λ = 1.3 and 1.55 µm, which are shown in Fig. 1.6(a) and Fig. 1.6(b), respectively. From these figures, they concluded that the free holes are more effective in perturbing the refractive index than the free electrons. They also pro- duced the following expressions, which are now used almost universally to evaluate changes due to injection or depletion of free carriers in silicon: 11 1.2. Optical Modulation in Si and Si-based Materials 0 0.4 0.8 1.2 1.6 2 2.4 2.810 0 101 102 103 104 105 Photon Energy (eV) α (cm − 1 ) undoped0.32 6 10 24 32 100× 1018 cm−3 (a) 0 0.4 0.8 1.2 1.6 2 2.4 2.810 0 101 102 103 104 105 Photon Energy (eV) α (cm − 1 ) undoped 0.5 2.8 6 12 70 100× 1018 cm−3 (b) Figure 1.5: Optical absorption of c-Si showing the influence of various concentrations of (a) free electrons (b) free holes, re-digitized from . 12 1.2. Optical Modulation in Si and Si-based Materials 1017 1018 1019 1020 10−4 10−3 10−2 10−1 ∆N (cm−3) − ∆n λ =1.3 µm Free Electrons Free Holes (a) 1017 1018 1019 1020 10−4 10−3 10−2 10−1 ∆N (cm−3) − ∆n λ =1.55 µm Free Electrons Free Holes (b) Figure 1.6: Refractive index perturbation in c-Si produced as a function of free carrier concentration at (a) λ = 1.3 µm, (b) λ = 1.55 µm, re-digitized from . 13 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect At λ0 = 1.3 µm ∆α = 5.9× 10−18∆N + 4.0× 10−18∆P (1.6) ∆n = −6.2× 10−22∆N − 6.0× 10−18∆P 0.8 (1.7) At λ0 = 1.55 µm ∆α = 8.5× 10−18∆N + 6.0× 10−18∆P (1.8) ∆n = −8.8× 10−22∆N − 8.5× 10−18∆P 0.8 (1.9) where ∆N and ∆P are, respectively, the electron and the hole concentration variations cm−3 with respect to the intrinsic carrier concentration. 1.3 Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect Table 1.1 summarized the recently reported SiGe electro-absorption mod- ulators based on FKE and QCSE. Typically electro-absorption modulators suffer from chirp which can be reduced by using electro-optic modulators as these modulators can be implemented in a Mach-Zehnder push-pull config- uration. To date, the free carrier absorption effect has been the most effective 14 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect Group Kimerling David Miller Publication Year 2008 2007 Modulation Mechanism Franz-Keldysh effect Quantum Confined Stark effect Operating Wavelength 1539− 1553 nm 1441− 1461 nm Structure Reverse biased P-I-N diode grown on a SOI substrate. The intrinsic region contains a 50 µm long, 600 nm wide and 400 nm high Si0.08Ge0.92 epitaxial layer. This layer is coupled with Si waveguides at the input and output. Reverse biased P-I- N diode grown on a Si0.1Ge0.9 buffer on a Si substrate. The intrinsic region contains 40 pairs of compres- sively strained Ge/SiGe quantum-wells (15.5 nm Ge well/33 nm Si0.16Ge0.84 barrier). Interferometric Structure - Fabry-Perot cavity Insertion Loss 3.7 dB at 1550 nm - Extinction Ratio 8 dB at 1550 nm with 7 V Peak contrast ratio 7.3 dB at 1457 nm for 0 to 10 V swing 3 dB Bandwidth 1.2 GHz - Table 1.1: Si electro-absorption modulators mechanism for varying the refractive index in silicon, which is polarization independent . Carrier injection, carrier depletion, and carrier accumula- tion are the most commonly used mechanisms that modify the free carrier concentration in Si modulators based on free carrier absorption . Three different device configurations, namely, P-Intrinsic-N (P-I-N) diodes, PN diodes or metal-oxide-semiconductors field-effect transistors (MOSFET) are used to exploit these mechanisms. In carrier-injection based modulators, free carriers are injected into the intrinsic region of a P-I-N diode by forward biasing the diode. The change 15 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect in free carriers leads to an increase in the absorption coefficient as well as a decrease in the refractive index of the device. These devices require a large forward bias current density to ensure significant carrier concentration change. Moreover, these devices have moderate response time (>> 1 ns) due to the electron-hole recombination process. In carrier-depletion based modulators, carriers are stored in the active region of a PN/P-I-N diode without an applied field, carriers are swept out of the active region by reverse biasing the diode. The change in free carrier leads to a decrease in the absorption coefficient as well as an increase in the refractive index of the device. In these modulators, only one kind of carrier (either electron or hole) is involved. Hence, no recombination process takes place and a high frequency can be expected from these devices. Moreover, current density is reduced in these devices which leads to the reduced power consumption as compared to the carrier-injection based devices. In case of the carrier- accumulation based devices, charge carriers are accumulated near the gate dielectric in a MOS capacitor when a voltage is applied to the device. Table 1.2 summarized the recently reported Si modulators based on the free carrier absorption effect. 16 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect Table 1.2: Free carrier absorption based silicon modulators Group Manipatruni Liao Liao Publication Year 2007 2005 2007 Result Type Modeling Experimental Experimental Operating Wavelength - - 1550 nm Carrier Den- sity Variation by- Injection Accumulation Depletion Modulator Structure PIN diode inte- grated with Si rib waveguide MOS capacitor integrated with Si rib waveguide PN diode inte- grated with Si rib waveguide Interferometer Ring resonator MZI with 13 mm phase shifter MZI with 5 mm phase shifter Vpi · Lpi - 3.3 V·cm 4.0 V·cm Phase shifter loss - 10 dB 7 dB 3 dB Band- width 40 Gbps RC cut-off fre- quency 10.2 GHz 20 GHz Table continued on next page 17 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect Table continued from previous page Group Marris Marris Marris Publication Year 2006 2008 2008 Result Type Experimental Experimental Modeling Operating Wavelength 1550 nm 1550 nm 1310 nm Carrier Den- sity Variation by- Depletion Depletion Depletion Modulator Structure Vertical PIN diode grown on SOI substrate, a highly doped P+ layer embedded in the intrinsic region Lateral PIN diode grown on SOI substrate, a highly doped P+ slit embedded in the intrinsic region Vertical PIN diode grown on SOI substrate, The intrinsic region con- sists of three Si0.8Ge0.2/Si quantum-well surrounded by P+ highly doped layers. Interferometer Fabry-Perot cav- ity MZI with 4 mm phase shifter phase shifter length 3 mm Vpi · Lpi 3.1 V·cm (1 V·cm by simulation) 5.0 V·cm (2 V·cm by simulation) 1.8 V·cm Phase shifter loss - 5 dB 9 dB 3 dB Band- width 90 GHz by simu- lation 10 GHz RC cut-off fre- quency 16 GHz 18 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect The change in free carrier concentration in these devices leads to the change in free carrier absorption which, in turn, changes the refractive index of the device. The phase of the light passing through the device will be changed due to the change in refractive index. This phase modulator can be converted into intensity modulator using a Mach-Zehnder interferometer structure, Fabry-Perot cavity structure, or ring resonator structure. The operating principles of these intensity modulators are described in section 1.3.1, section 1.3.2, and section 1.3.3, respectively. 1.3.1 Mach-Zehnder Interferometer An integrated Mach-Zehnder interferometer consists of an input waveguide, a splitter, two phase shifters, an output combiner, and an output waveg- uide, as illustrated in Fig. 1.7. The optical beam coming through the input waveguide is split into two optical beams by the splitter. The two optical beams travel through the two phase shifters inserted into the arms of the Mach-Zehnder interferometer, and then recombine at the output combiner. The ON state is achieved when the two optical beams arrive at the combiner in phase and interface constructively to produce a high intensity. When an electric field is applied to the phase shifters to create a relative path dif- ference between the two optical beams, the intensity is reduced. The OFF state is achieved when there is a differential phase shift of pi radians and a minimum intensity is produced at the output. The splitter (or the combiner) can be either an optical Y-branch or a 3-dB coupler. 19 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect Phase-Control Waveguide Sections Optical Y-Branch to split signal Optical Y-Branch to recombine signal O p t i c a l O u t p u t P o w e r O p t i c a l I n p u t P o w e r O p t i c a l O u t p u t P o w e r O p t i c a l I n p u t P o w e r Figure 1.7: Schematic view of the Mach-Zehnder interferometer. Two op- tical Y-branch couplers are used to split and recombine the incoming light. 1.3.2 Fabry-Perot Interferometer A Fabry-Perot cavity consists of two partially reflecting mirrors enclosing a resonator cavity as shown in Fig. 1.8. The transmission of the cavity will be maximum when the optical length of the cavity matches the resonance condition: nL = pλ/2, where n and L are, respectively, the refractive index and the length of the cavity, and p is an integer. The phase shifter is inserted into the cavity. When no bias is applied to the phase shifter, the transmission presents sharp maxima at some wavelengths. When a bias is applied to the phase shifter, the resonance condition modifies due to the change of the refractive index n, the resonance (resonant wavelengths are shifted) is shifted, and the cavity transmission at a given wavelength varies. 20 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect L Partially reflecting mirrors Reflected Light (Er) Transmitted Phase Shifter Input Light (Ei) Light (Et) Figure 1.8: Schematic view of the Fabry-Perot cavity. 1.3.3 Ring Resonator A ring resonator is based on a ring waveguide near a straight waveguide. To realize an optical modulator, the phase shifter is inserted in the ring. Light coming from the straight waveguide is coupled into the ring. The coupling of light from the straight waveguide to the ring depends on the gap between the waveguides. After propagating in the ring, light is coupled back to the straight waveguide. The transmission from the ring will be minimum 21 1.3. Silicon Modulators Based on FKE, QCSE, and Free Carrier Absorption Effect when the ring circumference matches the resonance condition: nd = pλ/2, where n and d are, respectively, the refractive index and the circumference of the ring, and p is an integer. When no bias is applied to the phase shifter integrated in the ring, the transmission presents sharp minima at some wavelengths. When a bias is applied to the phase shifter in the ring, the phase shift that is encountered by the optical mode propagating in the ring varies, and the resonance (resonant wavelengths are shifted) is shifted, and the transmission from the ring at a given wavelength varies. p+ doped Waveguide Output V n+ doped Input Ring Figure 1.9: Schematic view of the ring resonator. 22 1.4. Organization of the Thesis 1.4 Organization of the Thesis In this chapter, in order to provide some background, we have discussed various relevant optical modulation techniques in Si and the optical modu- lators based on them. At the beginning of this chapter, the Franz-Keldysh effect, the Quantum Confined Stark effect, and the free carrier absorption effect were discussed. Then, various techniques for obtaining optical mod- ulation from Si and Si-based materials using free carrier absorption effect (i.e., carrier injection, carrier depletion, and carrier accumulation) as well as a literature review of Si-based optical modulators using these techniques were presented. At the end of this chapter, the various interferometer struc- tures used to obtain intensity modulation from Si-based phase modulators were briefly discussed. In Chapter 2, Material Choice, Device Structure, and Electrical and Optical Simulations, we will describe the key components for design- ing SiGe/Si quantum-well modulators based on the free carrier depletion effect. The electrical and optical properties of Si and SiGe, which are im- portant for designing these modulators, will be discussed at the beginning of Chapter 2. The software used for the electrical simulation of these modula- tors and the models used in this simulation will be described next. Then, we discussed the mode solver program used for the optical simulation of SiGe/Si waveguide modulators. The general structure of a Si0.8Ge0.2/Si quantum- well phase modulator followed by the coupled electrical-optical analysis used to design these modulators is presented next. Using this analysis, we simu- lated a 3 quantum-well Si0.8Ge0.2/Si modulator (designed by Marris et al.) 23 1.4. Organization of the Thesis providing the most important results of the simulations. From the results of the DC analysis and the transient analysis performed on this 3 quantum-well modulator, we came to the conclusion that, a single quantum-well modu- lator may have a lower drive voltage, lower optical loss, and be capable of higher intrinsic speed than the 3 quantum-well modulator. Hence we re- moved 2 quantum-wells from the 3 quantum-well modulator and designed a single quantum-well modulator which will be described in Chapter 3. In Chapter 3, Single Quantum-Well SiGe/Si Optical Modulator, the results of the simulation on a single quantum-well Si0.8Ge0.2/Si mod- ulator, which is derived from the 3 quantum-well modulator described in Chapter 2, will be discussed. Then we will compare its performance with that of the 3 quantum-well modulator and we will find that, this single quantum-well modulator is better than the 3 quantum-well modulator in terms of the drive voltage, the optical loss, and the intrinsic speed. The performance of a Mach-Zehnder interferometer using single quantum-well phase modulators inserted into the two branches of the Mach-Zehnder in- terferometer will be described next. This chapter will conclude with the idea that, if we want to operate in a lower bias region, we can remove the quantum-wells and only the highly doped P+ layers and the NID layers are sufficient to obtain an effective index variation close to that obtained with the 3 quantum-well or single quantum-well modulator in a lower bias re- gion (V < 2 V). Removing the quantum-wells from the modulator may also increase the intrinsic speed. Chapter 4, Summary, Conclusion, and Suggestions for Future Work, will summarize our present work and will give some suggestions 24 1.4. Organization of the Thesis about the future work in this area. 25 Chapter 2 Material Choice, Device Structure, and Electrical and Optical Simulations In this chapter, we describe the key components for designing a free carrier depletion based phase modulator. The material parameters choice which ensure various critical characteristics of a free carrier depletion based phase modulator are described in section 2.1. The software used for the electrical simulation for designing these modulators is described in section 2.2. A sim- ple single mode SOI waveguide followed by the description of the mode solver used to solve for the eigen modes in these SOI waveguides are described in section 2.3. In section 2.4 the general structure of the free carrier depletion based phase modulators that we studied for operation at λ0 = 1.55 µm is described. The coupled electrical-optical analysis used to design these mod- ulators are also described in section 2.4. In the next section we describe a 3 quantum-well Si0.8Ge0.2/Si optical modulator. The results obtained using the DC analysis for the 3 quantum-well modulator is presented in section 2.5. This chapter concludes with section 2.6, which describes the transient 26 Chapter 2. Material Choice, Device Structure, and Electrical and Optical Simulations analysis performed on this 3 quantum-well Si0.8Ge0.2/Si electro-optic mod- ulator. To date, the free-carrier depletion effect has become the most commonly used approach to obtain the electro-optic effect in Si-based materials. The performance of different Si electro-optic modulators is compared in terms of the VpiLpi product (Vpi and Lpi are, respectively, the applied voltage and the corresponding length required to obtain a change in the phase at the output of the modulator of pi), the optical loss of the device, and the 3 dB bandwidth of the device. The VpiLpi product is commonly used as the figure of merit for these devices [21–25]. An efficient modulator should possess a low VpiLpi (for low drive voltage and/or small size) with low absorption losses and a high 3 dB bandwidth. Lpi can be calculated from the formula Lpi = λ0/2∆neff where, ∆neff is the effective index variation at the applied bias of Vpi. If these electro-optic modulators are inserted into two arms of a Mach-Zehnder interferometer as described in section 1.3.1, two additional performance parameters - insertion loss and extinction ratio, should be con- sidered. The insertion loss and the extinction ratio are given by the following relations, IIN , ION , IOut−max are defined as the the light input intensity, light output intensity and the maximum value of the light intensity that can be obtained at the output. IL = 10× Log(IOut−max IIN ) (2.1) ER = 10× Log( ION IOFF ) (2.2) 27 2.1. SiGe/Si Heterostructure Properties In this chapter we describe the steps for designing a free carrier depletion based phase modulator and design an efficient 3 quantum-well Si0.8Ge0.2/Si electro-optic modulator which ensures low VpiLpi product, low absorption losses, and high 3 dB bandwidth. 2.1 SiGe/Si Heterostructure Properties In section 2.1.1 the reasons for choosing the Ge mole fraction, x, of 0.2 in a Si1−xGex layer grown on a Si substrate are presented. To begin with, the bandgap requirements of the materials that will be used in a free carrier depletion based modulators are described. Then, why the thickness of the layers grown from these materials should be below a particular thickness, critical thickness, is discussed. How a Ge mole fraction of 0.2 meets both the bandgap and thickness requirements is presented next. This section con- cludes with the bandgap structure of a Si0.8Ge0.2/Si quantum-well. Section 2.1.2 describes two important properties (refractive index and absorption coefficient) of Si and SiGe. 2.1.1 Bandgaps and Band Alignments for SiGe/Si Heterostructure Si and SiGe are both indirect bandgap materials. As absorption of photons by the free carriers within the same band is the desired mechanism to change the refractive index in silicon, band-to-band absorption of the light propa- gating through the device should be avoided. This is done by keeping the indirect bandgap of both Si and SiGe above the incident photon energy (0.95 28 2.1. SiGe/Si Heterostructure Properties eV at λ0 = 1.31 µm and 0.801 eV at λ0 = 1.55 µm) . This condition is fulfilled by silicon (indirect bandgap of 1.12 eV). For a SiGe layer grown on a Si layer, the mole fraction of Ge in the SiGe layer should be chosen such that the bandgap of SiGe will be higher than the incident photon energy. When a SiGe layer is grown on a Si layer, the thickness of the SiGe layer should be below a particular thickness to avoid misfit dislocations in SiGe layers. This thickness is known as critical thickness. If a SiGe layer with a thickness below the critical thickness is grown on a Si layer to create a heterojunction device, due to the lattice mismatch between SiGe and pure Si, the SiGe films are biaxially strained . This strain has two components; the hydrostatic component and the uniaxial component. The hydrostatic component lowers the conduction band minimum and lifts the valence band maximum, as a result band gap energy will be decreased in the strained SiGe layers . The uniaxial component splits the valence band into a heavy hole band and a light hole band where light hole band becomes the topmost (lowest energy) valence band . Once the critical thickness is exceeded, these films go back to their intrinsic cubic lattice constant and misfit dislocations appear in the films. These misfit dislocations degrade the optical and electrical quality of these films. In order to avoid these misfit dislocations occuring, the thickness of the SiGe layer should be below the critical thickness. This critical thickness depends on the Ge mole fraction as shown in Fig. 2.1 . In a Si/SiGe/Si multilayer structure, in case of p pe- riods of Si (thickness dSi) and Si1−xGex layer (thickness dSiGe), the critical thickness can be evaluated by considering an equivalent structure of a single layer Si1−x′ Gex′ , whose Ge content is given by x ′ = x(dSiGe)/(dSiGe + dSi) 29 2.1. SiGe/Si Heterostructure Properties and thickness is given by p(dSiGe + dSi) . For example, if a Si/SiGe/Si multilayer structure is grown with Si thickness of dSi = 25 nm, SiGe thick- ness of dSiGe = 10 nm, and the Ge mole fraction of 0.2, the equivalent layer has a Ge fraction x ′ = 0.06. This leads to a critical thickness for such a Si/SiGe/Si multilayer structure about 125 nm as shown in Fig. 2.1. The total thickness of the Si/SiGe/Si multilayer structure (p(dSiGe + dSi)) must be below 125 nm to avoid misfit dislocations in the SiGe layers. 0 0.2 0.4 0.6 0.8 110 0 101 102 103 Ge mole fraction (x) Cr itic al T hi ck ne ss (n m) Figure 2.1: Critical layer thickness of SiGe layer grown on Si as a function of the Ge mole fraction, re-digitized from . The bandgap relation of strained Si1−xGex is given by Eg = 1.12− 0.74x. For the Ge mole fraction of 0.2 in Si1−xGex, the bandgap of SiGe will be 0.972 eV, which is above the incident light energy (0.95 eV at λ0 = 1.31 30 2.1. SiGe/Si Heterostructure Properties µm and 0.801 eV at λ0 = 1.55 µm). Thus the bandgap requirement is fulfilled. Now, for a multiple periods of SiGe/Si layers, the critical thickness depends on both the Ge mole fraction and the the thicknesses of Si and SiGe layers. We have seen that with dSi = 25 nm and dSiGe = 10 nm, if the Ge mole fraction of 0.2 is selected, the critical thickness is about 125 nm. In section 2.4, we will see that the thickness of the Si/SiGe/Si multilayer structure will be much lower than this thickness. At the heterojunction, the conduction band discontinuity is given by ∆Ec < 20 meV and the valence band discontinuity is given by 0.74x in . The band alignment of a Si0.8Ge0.2/Si heterostructure grown on a Si substrate, that we used in our simulations, is shown in Fig. 2.2. The valence band and conduction band discontinuities that we used in our simulation are quite similar to those used in . For the high valence band discontinuity, a Si0.8Ge0.2 layer sandwiched between Si layers acts as the well for holes. When no voltage is applied to this structure, holes will be confined inside the SiGe wells and, when a reverse bias voltage is applied, they will escape from the SiGe wells. Both the confinement of holes inside the quantum- wells at V = 0 V and the depletion of holes at a particular reverse voltage are important for getting larger changes of the refractive index in the SiGe layers, which will lead to higher effective index variations. 2.1.2 Refractive Index and Absorption Coefficient The refractive index of strained Si0.8Ge0.2 is given in by nSiGe(x, λ0) = nSi(λ0) + (1.16− 0.26 · λ0)× x2 (2.3) 31 2.2. Software for Electrical Simulation Eg(Si)=1.12eV Strained Eg(Si0.8Ge0.2)=0.972eV ∆Ec=χ(Si)- χ(Si0.8Ge0.2) =0.01eV ∆Ev =0.158eV Figure 2.2: Band alignments for Si1−xGex/Si heterostructures on Si sub- strate, where χ is the electron affinity. where x is the Ge mole fraction in Si1−xGex. This expression is applicable for wavelengths from 0.9 to 1.7 µm and for mole fractions less than 0.33. In our simulation, the refractive index of intrinsic Si is taken to be 3.503 and 3.475 at the wavelengths 1.31 and 1.55 µm, respectively. The absorption coefficient for the undoped Si and SiGe which can be extracted from Fig. 2.3 can be considered negligible for wavelengths of above 1.24 µm . 2.2 Software for Electrical Simulation We used the device simulator SILVACO ATLASTM for solving the pois- son and the drift-diffusion equations to predict various internal characteris- tics in our modulator under various biased conditions for DC and transient analysis. These internal characteristics include electron and hole distribu- tion, conduction band and valence band energies, electric field distribution, 32 2.2. Software for Electrical Simulation 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.410 0 101 102 103 104 Ge mole fraction (x) Ab so rp tio n Co ef fic ie nt (c m− 1 ) 1.55 µm 1.31 µm Figure 2.3: Absorption coefficient of Si and strained SiGe, temperature is 300K etc. In section 2.2.1, we describe key components we need to define in the software before simulating a structure. In section 2.2.2, the models we used in the simulations of SiGe/Si quantum-well optical modulators are described. 2.2.1 Basic Steps of Electrical Analysis in ATLAS Simulation of a device in SILVACO ATLASTM for the prediction of the in- ternal behavior follows the following procedure. At first, the user has to define the structure by defining the thickness, the material composition and the doping profile of every layer of the structure. A mesh is defined for solv- ing the various equations. The mesh is basically used to determine the nodes 33 2.2. Software for Electrical Simulation at which various equations will be solved. A good practice is to define a fine mesh in regions where the device characteristics are of particular interest (quantum-wells in our modulator). The user then defines the various mod- els for material parameters that are used in the simulation. The user then specifies the bias conditions for performing the electrical simulation. After the completion of the simulation, the device characteristics can be viewed using TONYPLOT (Graphical user interface) or these can be extracted as numerical data. 2.2.2 Models Incorporated for Device Simulation In this section, we briefly discuss the models that we used in the modeling of our SiGe/Si modulator. Details of these models are found in the ATLAS manual . 2.2.2.1 Recombination Models Shockley-Read-Hall (SRH) Recombination - Concentration depen- dent SRH model (CONSRH) is one of the recommended recombination models for Si and Si-based materials. Under the SRH recombination, re- combination of excess carriers in a heavily doped semiconductor occur in the presence of a trap, which is an energy level within the forbidden gap of the semiconductor corresponding to a crystal impurity or vacancy, which alternately captures electrons and holes, as shown in Fig. 2.4. The rate of recombination depends on the lifetime of the excess carriers. In the case of the concentration dependent SRH model, the constant carrier lifetimes of electrons and holes will be functions of the impurity concentrations. 34 2.2. Software for Electrical Simulation e- e- h+ h+ (a) (b) Figure 2.4: The two major recombination processes in silicon are (a) SRH recombination (b) Auger recombination Auger Recombination - Under Auger recombination, electrons and holes recombine by a band-to-band transition and due to the recombination, a third carrier (electron or hole) is emitted. As the Auger recombination is a 3 particle process, it is unlikely under low-level injection and therefore the SRH recombination dominates the re- combination processes . However, Auger dominates as the carrier density increases. 2.2.2.2 Mobility Models To model the mobilities of holes and electrons in Si and SiGe layers, we used concentration dependent mobility (CONMOB) and electric field dependent mobility (FLDMOB) models. The mobility of the carriers decrease with the increase of the doping con- 35 2.2. Software for Electrical Simulation centration, as the ionized impurities introduced by the dopants will enhance the scattering process. That is why we used the CONMOB model. The drift velocity of the carriers is the product of the mobility and the electric field in the direction of the current flow. The carrier velocity increases with the increase of the electric field. At high electric field, carriers that gain energy take part in a wider range of scattering process and there will be a reduction in the mobility of the carriers. Hence the velocity cannot increase much with the increase of electric field. Eventually, the velocity saturates at a constant velocity. To consider the effects of this saturation velocity, we used the FLDMOB model. We will see later in section 2.5 and 2.6 that this model does not have any effect on the internal characteristics of a device in the case of DC analysis, but it significantly affects the transient analysis. 2.2.2.3 Bandgap Narrowing Model In the presence of heavy doping (greater than 1018 cm−3), the bandgap of a semiconductor becomes doping dependent. As the doping level increases, a decrease in the bandgap separation occurs, where the conduction band is lowered by approximately the same amount as the valence band is raised. Details of this model can be found in the ATLAS manual. 2.2.2.4 Thermionic Emission and Tunneling The thermionic field emission model takes into account the thermionic emis- sion process at the abrupt heterojunction interface as well as the tunneling across the heterojunction. The band diagram of an abrupt heterojunction is 36 2.2. Software for Electrical Simulation shown in Fig. 2.5. Electron transport across the conduction band spike can be described by tunneling through the spike and thermionic emission over it [33, 34]. Ec x=0 xE JT-E JTunnel Ef2 ∆Ec Ex Ef1 Figure 2.5: Schematic band diagram of an abrupt heterojunction. Ef1 and Ef2 represents the electron quasi-fermi level in each semiconductor re- gion. JTE and JTunnel are the thermionic emission and tunneling current, respectively. In a quantum-well, suppose the barriers to the right and to the left of the well are given by Er El, respectively. A carrier of charge e and effective mass m∗ must be higher in energy than one of the barriers in order to be able to leave the well. By applying an electric field across the well, the confined carrier concentration in the quantum-well will decrease as δn(t) δt = −n0 τe (2.4) where n0 is the initial confined hole concentration and τe is escape char- acteristic time given by the thermionic and tunneling escape times 1/τe = 37 2.3. Optical Simulations 1/τth+1/τtun . The carrier population n of the well decays by thermionic emission with the time constant τth which is given by 1 τh = 1 w ( kBT 2pim∗ ) 1 2 · exp ( −Er,l − Ei − qF w 2 kBT ) (2.5) where w is the barrier width, Ei is the energy of the carrier, and F is the applied electric field to the quantum-well. If no field is applied to the quantum-well, the thermionic emission and tunneling escape time will be very large and the carriers will not decay at zero electric field. When elec- tric field is applied to the quantum-well, the thermionic emission time will decrease and the carriers can escape the quantum-well. 2.3 Optical Simulations Section 2.3.1 describes the operating principle of a simple SOI planar waveg- uide (2-dimensional waveguide). Then four possible configurations of 3- dimensional waveguides are shown. A single mode SOI rib waveguide fabri- cated by Lardenois et al. is discussed next. In section 2.3.2 we simulated the SOI rib waveguide described in with a MATLAB mode solver and found that the SOI rib waveguide is single mode with a very low leakage loss. 2.3.1 Silicon-On-Insulator (SOI) Waveguides A dielectric waveguide is formed when a high refractive index region is sur- rounded by regions of lower refractive index. Light propagating through the waveguide will be primarily confined to the high refractive index region 38 2.3. Optical Simulations due to the total internal reflection at the boundaries between the higher and lower refractive index regions . A simple SOI waveguide, shown in Fig. 2.6, consists of a silion layer (the higher refractive index material or core) sandwiched between a silica (SiO2) layer and air (the lower refractive index materials). The SiO2 layer (the lower cladding layer) should be thick enough to prevent light leaking into the silicon substrate. Buried SiO2 cladding (n=1.45) Si substrate (n=3.475) Si guiding layer (n=3.475) air (n=1.0) x y z Figure 2.6: SOI planar waveguide, the refractive indices (n) of the layers are shown for the wavelength of 1.55 µm. The z direction is taken as the direction of light propagation. The planar two-dimensional waveguide is useful for describing the the- ory of waveguides and the solution of Maxwells equations. But it confines the light only in one dimension (here the y direction in Fig. 2.6). For many 39 2.3. Optical Simulations applications, two-dimensional confinement is required. There are several configurations used for three-dimensional waveguides, schematically repre- sented in Fig. 2.7: strip (a), embedded strip (b), rib (or ridge) (c) and strip-loaded (d) waveguides. In SOI-based devices, the rib waveguide is most commonly used . n2 n1 n2 n1 n2 n1 n2 n3 n1 (a) (b) (c) (d) Figure 2.7: Different configurations of three dimensional waveguides (a) strip, (b) embedded strip, (c) rib (or ridge), and (d) strip-loaded waveguides. Lardenois et al. (in the same group of Marris-Morini) fabricated a SOI rib waveguide . The cross section of this waveguide is shown in Fig. 2.8. The buried SiO2 thickness of the SOI waveguide was 700 nm, which is large enough to prevent lightwave from leaking towards the Si substrate. The Si film thickness was 400 nm which was reduced to 380 nm during the etching process. The etched depth of this waveguide was 70 nm. The rib 40 2.3. Optical Simulations n2 n1 n0air Si SiO2 1 µm 380 nm 70 nm 700 nm Si n1 Figure 2.8: Cross section of the SOI rib waveguide discussed in . width was 1 µm, which is close to the maximum value to ensure single mode conditions . The measured propagation losses in this Si-SiO2 rib waveguide was found to be 0.4 dB/cm. We simulated this SOI rib waveguide in the MATLAB mode solver program available online [38, 39]. In the next section, The simulation results (effective index and optical loss) obtained for the SOI rib waveguide is presented. 2.3.2 Mode Solver for Optical Simulation The mode solver program that we used for the simulation of the SiGe/Si waveguide modulator is described very briefly in Appendix B. Before sim- 41 2.4. Design of the SiGe/Si Optical Modulator ulating the SiGe/Si waveguide modulator with this program, we solved the eigenmodes of the SOI rib waveguide described in section 2.3.1. We defined the refractive index and the thickness of various layers of the SOI waveg- uide; the grid spacings both in x and y directions and an initial guess for the effective index of the TE0 mode in the program. Now, as the refrac- tive index profile is symmetric about the y axis, only half of the waveguide needs to be included in the computational domain. So we defined half of the rib width in the program. Then we defined the boundary conditions which are considered for the points on the edge of the computation window as described in Appendix B. The absorbing boundary condition is used for north (upper), south (lower) and east (right) boundary and the symmetric boundary condition is used for the west (left) boundary. Then we simulated the SOI waveguide described in section 2.3.1 for operation at 1.55 µm. We found that this waveguide is single mode and the modal effective index of the fundamental mode for TE polarization was neff = 3.1193+i1.792 ·10−8. The mode profile is shown in Fig. 2.9. 2.4 Design of the SiGe/Si Optical Modulator Marris et al. designed a 3 quantum-well modulator for operation at λ0 = 1.31 µm using coupled electrical-optical simulations in Ref. . In this paper, they provided all the device parameters as well as a figure on the depletion process of the holes with the application of reverse bias voltage showing the position of all of the layers. We extracted the thicknesses of the P+ and N+ layers and the NID layers next to these P+ and N+ layers from this figure. 42 2.4. Design of the SiGe/Si Optical Modulator x y Ex (TE0 mode) Si SiO2 Si Air 0 0.5 1 1.5 2 2.50.5 1 1.5 2 2.5 −45 −40 −35 −30 −25 −20 −15 −10 −5 0 Figure 2.9: 2D Mode profile for the fundamental TE mode of the SOI rib waveguide discussed in . Each line represents an identical field value (−3 dB step between lines, −45 dB minimum value). In section 2.4.1, we describe the general structure of these modulators. The coupled electrical-optical analysis used to design these modulators is described in section 2.4.2. We performed the electrical analysis in two dif- ferent modes: DC analysis and transient analysis. We performed the DC analysis in order to investigate the electrical and optical behaviors of the de- vice with the application of various reverse bias voltages. For this analysis we varied the applied reverse voltage from 0 V to 10 V. Then we performed the transient analysis in order to investigate the frequency response of the device. For this analysis, at first a reverse bias voltage step from 0 to x V 43 2.4. Design of the SiGe/Si Optical Modulator (where x = 6 for the 3 quantum-well modulator) with a rise time of 1 fs was applied to the device and the electrical and optical behaviors of the device were observed at several times ranging from 0 to 100 ps. Then, a reverse bias voltage step from x to 0 V with a fall time of 1 fs was applied to the device and the electrical and optical behaviors of the device were observed at several times for the next 100 ps. 2.4.1 Device Structure The modulator consists of a PIN (P-Intrinsic-N) diode; the active region consists of ’k’ periodic stacks of layers (where k = 3 for the 3 quantum- well modulator). Each period consists of a 10 nm Si0.8Ge0.2 quantum-well surrounded by 10 nm Si-NID (Non-Intentionally Doped-1016 cm−3) layers and 5 nm P+ highly doped (2×1018 cm−3) layers (P+-δ-doped layers). The thickness of both of the P and N part of the PIN diode is 30 nm. The PIN diode (thickness t) is grown on a 30 nm Si-NID layer at the bottom of the PIN diode . This structure is simulated using a 700 nm SiO2 layer, which is thick enough to prevent the light leaking towards the Si substrate . For the lateral confinement of light, a rib structure is defined, simulating the partial etching of the upper layers. The dimensions of the rib structure are defined such that this modulator could be integrated with a single mode SOI rib waveguide . We discussed about this single mode SOI rib waveguide fabricated by Marris et al. in section 2.3.2. The mole fraction of Ge was chosen to be 0.2 to keep the bandgap of SiGe higher than the energy of the incident light to avoid band-to-band absorption and to maintain the total thickness below the critical thickness, as we described in section 2.1.1. 44 2.4. Design of the SiGe/Si Optical Modulator 2.4.2 Electrical and Optical Analysis With no field applied holes from the P+ layers are captured by and confined in the quantum-wells and when a reverse bias is applied holes are released from the quantum wells and drift to the 30 nm P+ contact layer. Varia- tion of the hole distribution leads to a free-carrier absorption change and a refractive index change in each layer and, subsequently, the phase modula- tion of the guided optical wave. We calculated the hole distribution in the various layers of the structure using Silvaco ATLASTM . The solution of Poisson-Fermi-Schroedinger equations is needed for the calculation of the hole density in the quantum-wells of the SiGe/Si modulator . However, it was shown by Marris et al. (in Ref. ) that, if the quantum-well is equal to or thicker than 10 nm, the hole density profile in the structure at V = 0 V obtained by solving the Poisson-Fermi-Schroedinger equations is similar to that obtained by solving the Poisson-Fermi equations. That is why we used the Poisson-Fermi solver in Silvaco ATLASTM for the cal- culation of the hole density distribution at various applied voltages. The carrier transport in bulk material and at heterojunctions is calculated, re- spectively, using the drift-diffusion expressions and thermionic emission ex- pressions [33, 34]. The models used by Marris et al. are the concentration de- pendent SRH (Shockley-Read-Hall) recombination model, the concentration dependent mobility model, the Auger model, and the Fermi-Dirac statistics model . We used these models as well as two additional models: the field dependent mobility model and the band gap narrowing model. These additional models do not affect the DC analysis, but the field dependent 45 2.4. Design of the SiGe/Si Optical Modulator mobility model affects the transient analysis as described in section 2.6. Experimental results showed that the higher reverse bias voltages lead to higher reverse leakage currents, and, therefore, higher leakage power that might create a self heating of the device which, in turn, affects the effec- tive index variation . This thermo-optical index variation becomes more significant at higher reverse bias voltages. However, as well as Marris et al., we ignored these effects in our calculations. The material parameters used for this simulation are the default parameters for Si and Si0.8Ge0.2 used in Silvaco ATLASTM . We tuned the bandgaps of these materials to be EG−Si = 1.12 eV and EG−Si0.8Ge0.2 = 0.972 eV as defined in Ref. and also the electron affinities to be χSi = 4.05 eV and χSi0.8Ge0.2 = 4.04 eV . The hole concentration obtained using the electrical simulation in Silvaco ATLASTM is averaged in each layer . As the layers are very thin, this approximation gives a refractive index profile similar to the refractive index profile obtained using the actual hole concentration profile. The absorption coefficient variation and refractive index variation in the doped Si layers with respect to undoped Si at λ0 = 1.55 µm, is calculated from the hole distribution using the following formulae ∆α = 8.5× 10−18∆N + 6.0× 10−18∆P (2.6) ∆n = −8.8× 10−22∆N − 8.5× 10−18∆P 0.8 (2.7) where ∆N and ∆P are, respectively, the electron and the hole concentration variations cm−3 with respect to the intrinsic carrier concentration of every 46 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator layer. To calculate the absorption coefficient change and the refractive index change in Si0.8Ge0.2 we used equation 2.6 and 2.7 due to the unavailability of separate equations for free carrier absorption for Si0.8Ge0.2 . The intrinsic hole concentration of Si and Si0.8Ge0.2 are, respectively, taken as 0.668× 1010 cm−3 and 10× 1010 cm−3, as defined in Silvaco ATLASTM at T = 300oK. The refractive index of undoped Si and Si0.8Ge0.2 are taken as 3.475 and 3.505, respectively, for λ0 = 1.55 µm. The absorption coefficient for undoped Si and Si0.8Ge0.2 are considered to be negligible at λ0 = 1.55 µm. The free carrier absorption as well as the refractive index of each layer are used as the input to a mode solver , which provides the effective index as well as the optical loss for TE polarized light at various voltages using a 2D semi-vectorial finite-difference approach. The optical loss can be converted into dB/cm using the formula α = 10 · log10e × 4piλ0 ×Ni dB/cm, where Ni is the imaginary part of the effective index calculated in the mode solver. 2.5 DC analysis in 3 Quantum-Well SiGe/Si Modulator A schematic diagram of the 3 quantum-well SiGe/Si modulator is shown in Fig. 2.10. We re-analyzed this structure for operation at λ0 = 1.31 µm. For a V = 0 V to V = 6 V variation Marris et al. obtained the effective index 47 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 1 µm 70 nm 3 5 0 n m X=0 QW1 QW2 QW3 Si Substrate 700 nm SiO2 30 nm Si NID 30 nm Si P+ 1018 cm-3 120 nm Si NID 10 nm Si NID 5 nm Si P+ 2×1018 cm-3 10 nm Si0.8Ge0.2 QW 60 nm Si NID 30 nm Si N+ 1018 cm-3 Figure 2.10: Schematic view of the 3 quantum-well SiGe/Si optical modu- lator. variation of 1.7 · 10−4. For a V = 0 V to V = 6 V variation, we obtained an effective index variation of 1.65·10−4. Our result (effective index variation at V = 6 V) was consistent with their result. We, then, repeated the analysis for this structure for the wavelength of λ0 = 1.55 µm, which gives a much lower VpiLpi compared to the VpiLpi obtained for the wavelength of λ0 = 1.31 µm, the reasons will be discussed in section 2.5.2. In section 2.5.1, various device internal characteristics such as the elec- tron and hole distribution, conduction band and valence band energies, elec- tric field distribution, etc., of the 3 quantum-well SiGe/Si optical modulator under various reverse bias voltages are discussed. Then, in section 2.5.2 we describe the absorption coefficient and the refractive index calculations using the hole distribution in various layers of the 3 quantum-well structure. The 48 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator absorption coefficient as well as the refractive index of each layer are used as an input in the mode solver we discussed in section 2.3.2, which provides the effective index as well as the optical loss. The effective index and optical loss calculation for the fundamental TE mode for operation at 1.31 and 1.55 µm using the mode solver program are presented in section 2.5.3. This section concludes with a comparison of the important performance characteristics (effective index variation and optical loss) for 1.31 and 1.55 µm. 2.5.1 Electrical Analysis For the DC analysis, we applied reverse bias voltages ranging from 0 V to 10 V to this modulator. The hole distribution in the structure is calculated using Silvaco ATLASTM at each applied reverse bias voltage. The hole concentrations for the 3 quantum-well structure at several specific voltages are shown in Fig. 2.11. With no field applied, holes from the P+ layers are captured by and confined in the quantum-wells and when a reverse bias is applied, holes are released from the quantum wells and drift to the 30 nm P+ contact layer. The band profiles and the electric field profiles in the structure at V = 0 V and at V = 6 V are shown respectively in Fig. 2.12(a) and Fig. 2.12(b). It can be seen that at V = 6 V, the valence band in the first two quantum- wells are fully bent and only partially bent in the 3rd quantum-well. In other words, the first two quantum-wells are fully depleted and the 3rd quantum- well is almost depleted for V = 6 V. Fig. 2.12(b) shows that inside the quantum-wells, the slope of the electric field is positive at V = 0 V due to the confinement of holes. With the application of a reverse bias, holes are 49 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 0.05 0.1 0.15 0.2 0.25 0.3 0.3510 0 105 1010 1015 1020 x (µm) H ol e Co nc en tra tio n (cm − 3 ) P+ NID Q W 3 QW 2 QW 1 NID N+ V= 0V V= 2V V= 4V V= 6V V= 10V Figure 2.11: Hole distribution in various layers at various reverse bias volt- ages. With the increase of reverse biasing, hole deplete from the quantum- wells. Holes starts to deplete from the NID layer on the P+ side after all the quantum-wells are fully depleted i.e. after 7.5 V NID layer starts depleting. 50 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35−8 −6 −4 −2 0 2 x(µm) Ba nd P ro file (e V) P+ NID Q W 3 QW 2 QW 1 NID N+ (a) 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35−6 −5 −4 −3 −2 −1 0 1 2 x 10 5 x(µm) El ec tri c Fi el d (V /cm ) P+ NID Q W 3 QW 2 QW 1 NID N+ V=0V V=6V (b) Figure 2.12: (a) Valence and conduction band energy profiles for the 3 quantum-well SiGe/Si structure, black lines are for V = 0 V and red lines are for V = 6 V, the dotted line shows the quasi-fermi energy level for holes (b) electric field in the 3 quantum-well SiGe/Si structure. 51 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator removed from the quantum-wells and the electric field is almost flat inside the quantum-wells at V = 6 V. 2.5.2 Calculation of Absorption Coefficient and Refractive Index The hole concentration is averaged in each layer at each applied voltage . As the layers are very thin, this approximation gives an effective index variation with applied reverse bias similar to the effective index variation obtained using the actual hole concentration profile as shown in Fig. 2.13. The absorption coefficient variation and refractive index variation in the doped Si layers with respect to undoped Si at λ0 = 1.55 µm is calculated from the hole distribution using equations 2.6 and 2.7. In our calculations, we considered only the hole concentration change in the various layers, as the electron concentration is negligible with respect to the hole concentration except in the N+ layer, where the electron concentra- tion is relatively high as shown in Fig 2.14. For this N+ layer, the refractive index and the absorption coefficient at V = 0 V is calculated from both ∆N and ∆P (∆N is considered as the doping density of this layer). Fig. 2.15(a) shows that the refractive index changes in the quantum- wells are much higher at λ0 = 1.55 µm than at λ0 = 1.31 µm which implies a higher effective index variation at λ0 = 1.55 µm than at λ0 = 1.31 µm. Fig. 2.15(a) shows that the refractive index change saturates with a satura- tion value of 1.6×10−3, 1.95×10−3, and 2.1×10−3 at 2.1 V, 4.3 V, and 7.5 V, respectively, in quantum-wells 1, 2, and 3, which indicates the quantum wells are depleted. Also, Fig. 2.15 (a) shows that the onset of the change 52 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 1 2 3 4 5 6 7 8 9 100 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 x 10 −4 Applied voltage (V) Ef fe ct ive in de x va ria tio n (∆n e ff) With approximation Without approximation (a) 0 1 2 3 4 5 6 7 8 9 100 1 2 3 4 5 6 Applied voltage (V) O pt ica l lo ss α (dB /cm ) With approximation Without approximation (b) Figure 2.13: (a) Effective index variation in a single quantum-well modula- tor with and without averaging the hole concentration (b) optical loss with and without averaging the hole concentration. 53 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 0.05 0.1 0.15 0.2 0.25 0.3 0.3510 0 105 1010 1015 1020 x (µm) El ec tro n Co nc en tra tio n (cm − 3 ) P+ NID Q W 3 QW 2 QW 1 NID N+ V= 0V V= 2V V= 4V V= 6V Figure 2.14: Electron distribution in various layers at various reverse bias voltages 54 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 1 2 3 4 5 6 7 8 9 100 0.5 1 1.5 2 2.5 x 10 −3 Applied voltage (V) R ef ra ct ive in de x ch an ge (∆ n ) in th e qu an tu m −w el ls QW3 QW2 QW1 1.55µm 1.31µm (a) 0 1 2 3 4 5 6 7 8 9 100 0.5 1 1.5 2 2.5 x 10 −4 Applied voltage (V) R ef ra ct ive in de x ch an ge (∆ n ) in th e N ID la ye r 1.55µm 1.31µm (b) Figure 2.15: Refractive index changes (∆nv = nv − n0) at λ0 = 1.55 µm and λ0 = 1.31 µm (a) in the quantum-wells with dash-dot line, dotted line, and solid line for quantum- well 1, 2, 3 respectively. (b) in the NID layer on the P+ side 55 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 1 2 3 4 5 6 7 8 9 100 0.5 1 x 10−4 Applied voltage (V) R ef ra ct ive in de x ch an ge in th e N ID la ye rs in b et we en th e qu an tu m −w el ls NID−1 NID−3 NID−5 NID−2 NID−4 NID−6 (a) 0 1 2 3 4 5 6 7 8 9 100 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 x 10−3 Applied voltage (V) R ef ra ct ive in de x ch an ge in th e δ− do pe d− P+ la ye rs Delta−1 Delta−2 Delta−3 Delta−4 (b) Figure 2.16: Refractive index changes at λ0 = 1.55 µm in the (a) NID layers (b) δ-doped-P+ layers 56 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator in refractive index in each of the quantum-wells occurs near the saturation value of the preceding quantum-well. After the depletion of all 3 quantum-wells, the NID layer on the P+ side starts depleting as well. Fig. 2.15(b) shows the refractive index changes in the NID layer on the P+ side. The refractive index changes in the other layers (NID layers in between the quantum-wells and the P+-δ-doped layers) are very small as shown in Fig. 2.16. 2.5.3 Effective Index and Optical Loss Calculation The free carrier absorption as well as the refractive index of each layer are used as the input to a mode solver , which provides the effective index as well as the optical loss for TE polarized light at various voltages. The effective index variation curve for the 3 quantum-well structure is shown in Fig. 2.17(a). When the bias is lower than 7.5 V the effective index variation in the modulator is mainly caused by the refractive index change in the quantum-wells. Above 7.5 V, the refractive index changes in all of the quantum-wells become constant. However, above V=7.5 V the contribution from the NID layer on the P+ side to the effective index variation becomes significant. In other words, after the depletion of all of the quantum-wells, the quantum-well modulator turns into a NID-layer modulator. The two most important performance parameters obtained for this mod- ulator are the effective index variation and optical loss which are found to be around 2.28 × 10−4 and 3.13 dB/cm at V = 6 V for the wavelength of λ0 = 1.55 µm as shown in Fig. 2.17(a) and Fig. 2.17(b), respectively. To evaluate the modulation efficiency of the phase modulator, a figure of merit 57 2.5. DC analysis in 3 Quantum-Well SiGe/Si Modulator 0 1 2 3 4 5 6 7 8 9 100 0.5 1 1.5 2 2.5 3 3.5 4 x 10 −4 Applied voltage (V) Ef fe ct ive in de x va ria tio n (∆n e ff) 1.55µm 1.31µm (a) 0 1 2 3 4 5 6 7 8 9 100 1 2 3 4 5 6 Applied voltage (V) O pt ica l lo ss α (dB /cm ) 1.55µm 1.31µm (b) Figure 2.17: (a) Effective index variation (∆neff-v = neff-v − neff-0) of the 3 quantum-well modulator; the blue point shows the effective index variation at 6 V obtained by Marris et al. in Ref. (b) optical loss at various voltages. 58 2.6. Transient Analysis can be defined as the VpiLpi product, where Vpi and Lpi are, respectively, the applied voltage and the length required to obtain a pi phase shift of the guided wave. Lpi can be calculated from the formula Lpi = λ0/2∆neff where, ∆neff is the effective index variation at the applied bias of Vpi. The effective index variation of 2.28× 10−4 at V = 6 V leads to a VpiLpi of 2.039 V·cm (Lpi = 0.349 cm) for the 3 quantum-well structure defined in for λ0 = 1.55 µm, which is much lower than the VpiLpi of 2.37 V·cm obtained for λ0 = 1.31 µm predicted by our analysis, at V = 6 V. The optical loss is slightly higher at λ0 = 1.55 µm as compared to that at λ0 = 1.31 µm, which is consistent with the experimental results . 2.6 Transient Analysis Transient analysis is performed to evaluate the response time of the 3 quantum- well modulator λ0 = 1.55 µm using thermionic emission, tunneling, and field dependent mobility model. Marris et al. did not use the field dependent mo- bility model while doing the transient simulations . But we found that, in case of transient analysis, the field dependent mobility significantly af- fects the transient response. The drift velocity of the carriers is the product of the mobility and the electric field in the direction of the current flow. The carrier velocity will increase with the increase of the electric field but at high electric fields, it will begin to saturate due to the reduction of the effective mobility. Hence, without using the field dependent mobility model, the response would be much faster than when using this model and the modulation speed will be overestimated. 59 2.6. Transient Analysis 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=0 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=2 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=20 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=30 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=40 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=60 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=80 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=100 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=102 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=110 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=120 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=130 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=140 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=160 ps QW 3 QW 2 QW 1 0.12 0.16 0.2 0.24 0.280 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=200 ps QW 3 QW 2 QW 1 Figure 2.18: Hole density distribution at various times in the 3 quantum- well modulator, only the quantum-wells and the P+ layers are shown in the figure. 60 2.6. Transient Analysis 0 10 20 30 40 50 60 70 80 90 1000 2 4 6 8 10 12 x 10 17 Time (ps) Av er ag e Ho le C on ce nt ra tio n in th e qu an tu m −w el ls QW1 QW2 QW3 (a) 100 120 140 160 180 2000 0.5 1 1.5 2 x 10 18 Time (ps) Av er ag e Ho le C on ce nt ra tio n in th e qu an tu m −w el ls QW3 QW2 QW1 (b) Figure 2.19: Hole density distribution with time in the 3 quantum-well modulator for (a) t = 0 ps to t = 100 ps (b) t = 100 ps to t = 200 ps. 61 2.6. Transient Analysis 0 20 40 60 80 100 120 140 160 180 2000 0.5 1 1.5 2 2.5 x 10 −4 Time(ps) Ef fe ct ive in de x va ria tio n (∆n e ff) (a) 0 20 40 60 80 100 120 140 160 180 2000 0.5 1 1.5 2 2.5 x 10 −4 Time(ps) Ef fe ct ive in de x va ria tio n (∆n e ff) (b) Figure 2.20: Effective index variation with time in the 3 quantum-well modulator for 0 to 6 V variation (a) with field dependent mobility model (b) without field dependent mobility model. 62 2.6. Transient Analysis At first a reverse bias voltage step from 0 to 6 V, with a rise time of 1 fs, is applied to the device. The hole density distributions in the case of 3 quantum-well modulator obtained at several specific times during depleting the quantum-wells, are plotted in Fig. 2.18. The holes are initially confined in the three quantum-wells at t = 0. As time increases, initially the holes do not escape from the quantum-wells, they simply distribute themselves along the left side of each quantum-well. By t = 36 ps and t = 80 ps the 1st and the 2nd quantum-wells are depleted, respectively. By t = 100 ps, only a few holes are left in the 3rd quantum-well. Fig. 2.19(a) shows that the quantum-wells are depleting sequentially in time as described in Ref. . After 100 ps, the applied voltage returned to zero with a fall time 1 fs. The hole density distributions obtained at several specific times, during which the holes are returning to the quantum-wells, are plotted in Fig. 2.18. Fig. 2.19(b) shows that at t = 150 ps, the average hole distribution became constant in the 3rd and 2nd quantum-well. The hole density distribution in the 1st quantum-well becomes constant after t = 180 ps. In case of transient analysis, the field dependent mobility has significant effects on the effective index variation. The effective index variation curves with time with and without the FLDMOB are shown in Fig. 2.20(a) and Fig. 2.20(b) respectively. The initial sharp increase of effective index varia- tion is due to the hole density change of the NID layer as the quantum-wells are not depleted initially. 63 2.7. Conclusion 2.7 Conclusion In this chapter we found that, in the 3 quantum-well SiGe/Si structure, the quantum-wells deplete sequentially both with time and voltage. During the DC analysis, from Fig. 2.15(a), we found that the quantum-well 1, 2, and 3 are depleted at 2.1 V, 4.3 V, and 7.5 V, respectively. This figure also showed that below 1.5 V, the effective index variation ∆neff is mainly caused by the refractive index change in the first quantum-well. The onset of the change in the refractive index in the second quantum-well occurs after the refractive index change in the first quantum-well approaches the saturation value. If we want to operate in a low bias region (below 1.5 V), only one quantum-well may be sufficient to have the same effective index variation as we obtained in the 3 quantum-well structure. Again, during the transient analysis, from Fig. 2.19(a), we found that by t = 36 ps and t = 80 ps the 1st and the 2nd quantum-wells are depleted, respectively. By t = 100 ps, only a few holes are left in the 3rd quantum- well. If we can get rid of the last 2 quantum-wells, the hole depletion process from the quantum-well could be done by t = 36 ps. Hence we removed 2 quantum-wells in the 3 quantum-well modulator and designed a single quantum-well modulator which will be discussed in the next chapter. 64 Chapter 3 Single Quantum-Well SiGe/Si Optical Modulator In the 3 quantum-well structure, we found that when the voltage is lower than V = 1.5 V, the effective index variation ∆neff is mainly caused by the refractive index change in the first quantum-well. The onset of the change in the refractive index in the second quantum-well occurs after the refractive index change in the first quantum-well approaches the saturation value. This implies that only one quantum-well may be needed to obtain the same effective index variation as is obtained in the 3 quantum-well structure for voltages below about V = 1.5 V. This single quantum-well structure can give the additional benefit of higher intrinsic speed over the 3 quantum-well modulator as we concluded from the results of the transient analysis of the 3 quantum-well modulator in chapter 2. Therefore we designed a single quantum-well modulator keeping the thicknesses and doping levels constant for all of the layers (i.e., 2 QW layer stacks are removed). The results obtained using the DC analysis for the single quantum-well modulator are described in section 3.1. The transient response for this mod- ulator is described in section 3.2. The single quantum-well phase modulator 65 3.1. DC analysis in Single Quantum-Well SiGe/Si Modulator can be converted into an intensity modulator by inserting it into each of the arms of a Mach-Zehnder interferometer and by applying a bias voltage to each of the arms as described in section 1.3.1. The performance of such a Mach-Zehnder Interferometer is described in section 3.3. 3.1 DC analysis in Single Quantum-Well SiGe/Si Modulator A schematic diagram of the single quantum-well SiGe/Si modulator is shown in Fig. 3.1. 1 µm 70 nm 2 8 0 n m X=0 QW Si Substrate 700 nm SiO2 30 nm Si NID 30 nm Si P+ 1018 cm-3 120 nm Si NID 10 nm Si NID 5 nm Si P+ 2×1018 cm-3 10 nm Si0.8Ge0.2 QW 60 nm Si NID 30 nm Si N+ 1018 cm-3 Figure 3.1: Schematic view of the SiGe/Si optical modulator. For the DC analysis, we applied reverse bias voltages ranging from 0 V to 10 V to this modulator. The hole distribution in the structure is calculated using Silvaco ATLASTM at each applied reverse bias voltage. In section 66 3.1. DC analysis in Single Quantum-Well SiGe/Si Modulator 3.1.1 we present the results of the refractive index calculations using the hole distribution in various layers of the single quantum-well modulator. The effective index and optical loss for the fundamental TE mode for operation at 1.55 µm are presented in section 3.1.2. Section 3.1.2 concludes with a comparison of the important performance characteristics (effective index variation, optical loss, and VpiLpi) for 3 quantum-well and single quantum- well modulator. 3.1.1 Refractive Index Change in Single SiGe/Si Quantum-Well Optical Modulator The refractive index change in the single quantum-well saturates at about 2 V as shown in Fig. 3.2. The single quantum-well structure changes from a quantum-well modulator into a NID-layer modulator at this voltage due to the significant contribution of the refractive index change of the NID layer on the P+ side as shown in Fig. 3.2. 67 3.1. DC analysis in Single Quantum-Well SiGe/Si Modulator 0 1 2 3 4 5 6 7 8 9 100 0.4 0.8 1.2 1.6 2 x 10 −3 Applied voltage (V) R ef ra ct ive in de x ch an ge (∆ n ) 3QW modulator (∆n in QW1) 1QW modulator (∆n in QW) 3QW modulator (∆n in NID) 1QW modulator (∆n in NID) Figure 3.2: Comparison of the refractive index change in the single quantum-well structure and in the first quantum-well of the 3 quantum- well structure at λ0 = 1.55 µm. The refractive index change in the NID layers on the P+ side are shown for both the single quantum-well and the 3 quantum-well modulator. 3.1.2 Effective Index and Optical Loss Calculation The effective index variation curves and their slopes are shown in Fig. 3.3. Fig. 3.3(a) illustrates that below 2 V the effective index variation in the single quantum-well structure is slightly higher than that in the 3 quantum- well structure. Above 2 V, and considering only the refractive index changes in the quantum-wells, the effective index variation in the single quantum- well structure becomes smaller than that in the 3 quantum-well structure as shown by the dotted line in Fig. 3.3(a). However, due to the onset of the refractive index change in the NID layer on the P+ side, the single quantum- 68 3.1. DC analysis in Single Quantum-Well SiGe/Si Modulator 0 1 2 3 4 5 6 7 8 9 100 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 x 10 −4 Applied voltage (V) Ef fe ct ive in de x va ria tio n (∆n e ff) 3QW modulator 1QW modulator 3QW modulator (QW contribution) 1QW modulator (QW contribution) (a) 0 1 2 3 4 5 6 7 8 9 100 1 2 3 4 5 6 7 8 x 10 −5 Applied voltage (V) Sl op e of Ef fe ct ive in de x va ria tio n (V− 1 ) 3QW modulator 1QW modulator (b) Figure 3.3: Comparison of the (a) effective index variation (b) slope of the effective index variation for single quantum-well and 3 quantum-well structure. 69 3.1. DC analysis in Single Quantum-Well SiGe/Si Modulator well structure shows significantly higher effective index variation than the 3 quantum-well structure until the cross-over point at about 6.5 V. Above 6.5 V, the 3 quantum-well modulator turns into a NID-layer modulator and the effective index variation in the 3 quantum-well structure becomes greater than that in the single quantum-well structure due to the combined effects of the refractive index changes in the quantum-wells and the NID layer. The optical loss in the single quantum-well structure is lower than that of the 3 quantum-well structure due to the removal of the two quantum-wells as well as the other doped layers. The optical losses for both of the structures are shown in Fig. 3.4. 0 1 2 3 4 5 6 7 8 9 100 1 2 3 4 5 6 Applied voltage (V) O pt ica l lo ss α (dB /cm ) 3QW modulator 1QW modulator Figure 3.4: Comparison of the optical loss in the single quantum-well mod- ulator and the 3 quantum-well modulator. The highest slope of the effective index variation (0.71 × 10−4 V−1) for the single quantum-well modulator occurs at about 1.6 V, as shown 70 3.2. Transient Analysis in Fig. 3.3(b). At this voltage, the effective index variation with respect to 0 V is 1.02 × 10−4 . If we desire a Vpi of 1.6 V for digital signal modula- tion, the VpiLpi of this modulator will be 1.208 V·cm (Lpi = 0.759 cm) which is much lower as compared to the VpiLpi of the 3 quantum-well structure (2.039 V·cm) previously defined. For low voltage modulation, we can apply a voltage between 1.4 V and 1.8 V (i.e., ±0.2 V about 1.6 V). Hence, if we desire a Vpi of 0.4 V, for low voltage modulation, the VpiLpi of this modulator will be 1.09 V·cm, which is also lower than the VpiLpi of the 3 quantum-well modulator. The 3 quantum-well modulator that we studied in chapter 2 was optimized by Marris et al. to get the best performance in terms of the effective index variation and the optical loss by studying the influence of the thicknesses and doping levels of various layers in the structure. But we have not yet optimized the single quantum-well modulator. If we do the optimization of the single quantum-well modulator by doing such studies, it may give even lower VpiLpi than that of the 3 quantum-well modulator. 3.2 Transient Analysis In the case of the single quantum-well modulator, at first, a reverse bias voltage step from 0 to 1.6 V, with a rise time of 1 fs, is applied to the device. The hole density distributions obtained at several specific times, are plotted in Fig. 3.5. Most of the holes are initially confined in the quantum-well at t = 0. Most of the holes are removed from the quantum-well by t = 36 ps. By t = 100 ps, only a few holes are left in the quantum-well as shown in Fig. 3.6(a). 71 3.2. Transient Analysis 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=0 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=2 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=20 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=30 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=40 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=60 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=80 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=100 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=102 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=110 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=120 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=130 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=140 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=160 ps QW 1 0.12 0.16 0.20 1 2 3 4 5 6 7 8 x 10 18 x (µm) H ol e Co nc en tra tio n (cm − 3 ) t=200 ps QW 1 Figure 3.5: Hole density distribution at various times in the single quantum- well modulator, only the quantum-well and the P+ layers are shown in the figure. 72 3.2. Transient Analysis 0 10 20 30 40 50 60 70 80 90 1000 2 4 6 8 10 x 10 17 Time (ps) Av er ag e Ho le C on ce nt ra tio n in th e qu an tu m −w el l (a) 100 120 140 160 180 2000 2 4 6 8 10 x 10 17 Time (ps) Av er ag e Ho le C on ce nt ra tio n in th e qu an tu m −w el l (b) Figure 3.6: Hole density distribution with time in the single quantum-well modulator for (a) t = 0 ps to t = 100 ps (b) t = 100 ps to t = 200 ps. 73 3.2. Transient Analysis 0 20 40 60 80 100 120 140 160 180 2000 0.5 1 1.5 2 x 10 −4 Time(ps) Ef fe ct ive in de x va ria tio n (∆n e ff) Figure 3.7: Effective index variation with time in the single quantum-well modulator for 0 to 1.6 V variation. 74 3.3. Mach-Zehnder Interferometer Performance Hence, we can say that the hole depletion process is much faster in the case of the single quantum-well modulator than in the case of the 3 quantum-well modulator. After 100 ps, the applied voltage returns to zero with a fall time 1 fs. Fig. 3.6(b) shows that at t = 140 ps, the average hole distribution becomes constant in the quantum-well. The effective index variation curve for the single quantum-well modulator is shown in Fig. 3.7. From this figure we can conclude that the transient response of the electro-optic effect in the single quantum-well modulator will be faster than that in the 3 quantum-well modulator. For the 3 quantum-well modulator the rise time (the time required for the effective index variation to increase from 10% to 90% of the maximum value) and the fall time (the time required for the effective index variation to decrease from 90% to 10% of the maximum value) are found to be around 26.6 ps and 21 ps, respectively. In case of the single quantum-well modulator these are found to be around 3.02 ps and 2.25 ps, respectively. Due to decrease of the time constants, the single quantum-well modulator will give higher intrinsic speed than the 3 quantum-well modulator. 3.3 Mach-Zehnder Interferometer Performance The single quantum-well phase modulator can be converted into an inten- sity modulator by inserting it into each of the arms of the Mach-Zehnder interferometer and by applying a bias voltage to each of the arms as we described in section 1.3.1. Both the effective index variation (∆neff related to the modification of the propagation constants ∆β) and the absorption 75 3.3. Mach-Zehnder Interferometer Performance variation (∆α) of the light beams, which are functions of the applied volt- age to the phase shifters, will have effects on the output intensity of the Mach-Zehnder interferometer. Assuming identical waveguides, and assum- ing an ideal splitter and combiner, the Mach-Zehnder intensity transmission is given by (see appendix A): Iout Iin (V ) = 1 4 [ e−α1(V )L1 + e−α2(V )L2 + 2 · e−α1L1/2+α2L2/2 · cos (β2(V )L2 − β1(V )L1) ] (3.1) where L1 and L2 are the lengths of phase shifter 1 and phase shifter 2, respectively; β1 and β2 are the propagation constants of the light beams propagating through the phase shifters, and α1 and α2 are the propagation losses of the phase shifters. Assuming reverse bias are applied to both of the arms, β1 = β0 + ∆β1 (3.2) β2 = β0 + ∆β2 (3.3) α1 = α0 −∆α1 (3.4) α2 = α0 −∆α2 (3.5) The length of the two phase shifters are taken to be L1 = 0.5 cm and L2 = 0.7 cm respectively. The voltage applied to the 0.5 cm branch is varied (modulating arm/arm 1) and the voltage at the 0.7 cm branch is fixed at 8.2 V (reference arm/arm 2) to get the minimum intensity at the OFF state. 76 3.3. Mach-Zehnder Interferometer Performance Both the loss and phase components are taken into account to calculate the output transmission. 0 1 2 3 4 5 6 7 8 9 100 0.2 0.4 0.6 0.8 1 Bias Voltage (V) I ou t / I in −0.6 −0.3 0 0.3 0.6 0.9 d(I o u t / I in ) / dV Figure 3.8: Ratio of output to input intensity in a MZI, dotted line shows the slope of this curve. The ratio of output to input intensity as well as its slope as a function of the voltage on arm 1 are given in Fig. 3.8. At Varm1 = 1.5V the slope of the Iout/Iin curve is very high (−0.43 V−1). We can bias the modulating arm at this voltage and then apply a small-signal to this arm so that the output intensity will be varied in a small range. By doing this, the modulator will operate only in the quantum-well-modulation region rather than using the NID-layer-modulation. 77 3.4. Conclusion 3.4 Conclusion In this chapter the performance of a single quantum-well modulator is dis- cussed. During the DC analysis, from Fig. 3.3(a), we found that below 2 V the effective index variation in the single quantum-well structure is slightly higher than that in the 3 quantum-well structure. Fig. 3.3(b) shows that The highest slope of the effective index variation for the single quantum-well modulator occurs at about 1.6 V. We found that, if we desire a Vpi below this voltage, it gives lower VpiLpi as compared to the VpiLpi of the 3 quantum-well modulator for both digital signal modulation and low voltage modulation. Again, during the transient analysis, from Fig. 3.5, we found that most of the holes are removed from the quantum-well by t = 36 ps. We concluded from this figure that the hole depletion process is much faster in the case of the single quantum-well modulator than in the case of the 3 quantum- well modulator. The rise time and the fall time of the single quantum-well modulator, which we calculated from Fig. 3.7, were found to be around 3.02 ps and 2.25 ps, respectively, which are lower than that of the 3 quantum- well modulator. The performance of a Mach-Zehnder interferometer using single quantum-well phase modulators inserted into the two branches of the Mach-Zehnder interferometer were described next. We can conclude with the idea that, if we want to operate in a lower bias region, we can remove the quantum-wells and only the highly doped P+ layers and the NID layers may be sufficient to obtain an effective index variation close to that obtained with the 3 quantum-well or single quantum- well modulator in a lower bias region (V < 2 V). Removing the quantum- 78 3.4. Conclusion wells from the modulator may also increase the intrinsic speed. 79 Chapter 4 Summary, Conclusion, and Suggestions for Future Work 4.1 Summary In this thesis we described the electrical and optical analysis required for designing SiGe/Si quantum-well optical modulators. Then we studied the performance of a 3 quantum-well modulator based on this analysis. Then we designed a single quantum-well modulator which has lower VpiLpi product, lower absorption losses, and higher intrinsic speed than the 3 quantum-well modulator. In Chapter 2, Material Choice, Device Structure, and Electrical and Optical Simulations, we described the key components for designing SiGe/Si quantum-well modulators based on the free carrier depletion effect. The electrical and optical properties of Si and SiGe, which are important for designing these modulators were discussed at the beginning of Chapter 2. The software used for the electrical simulation of these modulators and the models used in this simulation was described next. Then, we discussed the mode solver program used for the optical simulation of SiGe/Si waveguide 80 4.1. Summary modulators. The general structure of a Si0.8Ge0.2/Si quantum-well phase modulator followed by the coupled electrical-optical analysis used to design these modulators was presented next. Using this analysis, we simulated a 3 quantum-well Si0.8Ge0.2/Si modulator (designed by Marris et al.) providing the most important results of the simulations. The two most important performance parameters obtained for this modulator are the VpiLpi product and the optical loss which are found to be around 2.039 V·cm for 0 to 6 V digital modulation and 5.75 dB/cm at V = 0 V for the wavelength of λ0 = 1.55 µm. During the DC analysis, we found that below 1.5 V, the effective index variation ∆neff is mainly caused by the refractive index change in the first quantum-well. The onset of the change in the refractive index in the second quantum-well occurs after the refractive index change in the first quantum-well approaches the saturation value. If we want to operate in a low bias region (below 1.5 V), only one quantum-well may be sufficient to have the same effective index variation as we obtained in the 3 quantum-well structure. Again, during the transient analysis, we found that by t = 36 ps and t = 80 ps the 1st and the 2nd quantum-wells are depleted, respectively. By t = 100 ps, only a few holes are left in the 3rd quantum- well. If we can get rid of the last 2 quantum-wells, the hole depletion process from the quantum-well could be done by t = 36 ps. From the results of the DC analysis and the transient analysis performed on this 3 quantum-well modulator, we came to the conclusion that, a single quantum-well modulator may have a lower drive voltage, lower optical loss, and be capable of higher intrinsic speed than the 3 quantum-well modulator. Hence we removed 2 quantum-wells from the 3 quantum-well modulator and designed a single 81 4.1. Summary quantum-well modulator which was described in Chapter 3. In Chapter 3, Single Quantum-Well SiGe/Si Optical Modulator, the results of the simulation on a single quantum-well Si0.8Ge0.2/Si mod- ulator, which is derived from the 3 quantum-well modulator described in Chapter 2, was discussed. Then we compared its performance with that of the 3 quantum-well modulator and we found that, this single quantum-well modulator is better than the 3 quantum-well modulator in terms of the drive voltage, the optical loss, and the intrinsic speed. The VpiLpi product of the single quantum-well modulator is estimated 1.09 V·cm for low voltage linear modulation and 1.208 V·cm for 0 to 1.6 V digital modulation, whereas the 3 quantum-well modulator gives a VpiLpi of 2.039 V·cm for 0 to 6 V digital modulation for operation at λ0 = 1.55 µm. Also, the optical loss in the single quantum-well (5.36 dB/cm at V = 0 V) is lower than that of the 3 quantum-well structure (5.75 dB/cm at V = 0 V). From the transient analysis of the electro-optic effect, we calculated the rise time and the fall time of both of the modulators. The rise time and the fall time of the single quantum-well modulator are found to be around 3.02 ps and 2.25 ps, re- spectively, whereas for the 3 quantum-well modulator these are found to be around 26.6 ps and 21 ps, respectively. The performance of a Mach-Zehnder interferometer using single quantum-well phase modulators inserted into the two branches of the Mach-Zehnder interferometer was described next. This chapter concluded with the idea that, if we want to operate in a lower bias region, we can remove the quantum-wells and only the highly doped P+ layers and the NID layers are sufficient to obtain an effective index varia- tion close to that obtained with the 3 quantum-well or single quantum-well 82 4.2. Suggestions for Future Work modulator in a lower bias region (V < 2 V). Removing the quantum-wells from the modulator may also increase the intrinsic speed. 4.2 Suggestions for Future Work 4.2.1 All-Silicon Optical Modulators We want to simulate all-Si optical modulators and optimize those struc- tures for getting lower VpiLpi, lower optical loss, and higher intrinsic speed. Currently we have two structures which we want to simulate in future. The 1st device will consist of a P-I-N (P-Intrinsic-N) diode; the active region will consist of a 30 nm Si-NID layer surrounded by two 5 nm P+ highly doped (2 × 1018 cm−3) layers. The PIN diode will be placed on a 30 nm Si-NID layer at the bottom of the PIN diode. This structure will be simulated using a 2 µm SiO2 layer. The 2nd device will consist of a P-I-P-I-N diode laterally grown on a 2 µm SiO2 layer. A 200 nm wide P layer, with a doping concentration of 1017 cm−3, will be inserted into the intrinsic region of the P-I-N diode, giving the P-I-P-I-N structure. This P layer will be surrounded by two NID layers. We expect that these devices can provide lower VpiLpi, lower optical loss, and higher intrinsic speed than those of the SiGe/Si quantum-well modula- tors. 4.2.2 Traveling-Wave Electrodes In the case of the lumped electrodes, the speed of operation is limited by the RC time constants of the electrodes. Hence, we intend to investigate pos- 83 4.2. Suggestions for Future Work 1 µm 70 nm 2 8 0 n m 30 nm Si P+ 1018 cm-3 120 nm Si NID 30 nm Si NID 5 nm Si P+ 2×1018 cm-3 60 nm Si NID 30 nm Si N+ 1018 cm-3 X=0 Si Substrate 2 µm SiO2 30 nm Si NID (a) 400 nm 4 0 0 n m \u0001\u0002\u0003\u0004\u0005 \u0001\u0002\u0003\u0006\u0007\b \u0001\u0002\u0003\u0006\u0005 \u0001\u0002\u0003\u0004\u0005\u0003\n\u000e\u000f \u0001\u0002\u0003\u0006\u0007\b 200 nm200 nm Si Substrate 2 µm SiO2 (b) Figure 4.1: (a) All-Si optical modulator (vertical diode), (b) all-Si optical modulator (lateral diode). 84 4.2. Suggestions for Future Work sible improvement using slow-wave electrodes which remove this RC time constant dependency. The RF signal will be launched onto coplanar slow wave electrodes and co-propagate with the optical signal. The slow-wave electrodes will be designed using the EM simulation software SONNET with the goal of impedance matching, reducing the microwave-light velocity mis- match, and reducing the microwave loss. 85 Bibliography G. Chen, H. Chen, M. Haurylau, N. A. Nelson, D. H. Al- bonesi, P. M. Fauchet, and E. G. Friedman, “Predictions of CMOS compatible on-chip optical interconnect,” Integration, the VLSI Journal, vol. 40, no. 4, pp. 434–446, Jul. 2007. [Online]. Available: http://www.sciencedirect.com/science/article/ B6V1M-4MBTTVP-1/2/5701724f0d0cddc93f80bed02ecaa42e “Itrs2007.” [Online]. Available: http://www.itrs.net/Links/2007ITRS/ ExecSum2007.pdf L. Zheng and H. Tenhunen, “Wires as interconnects,” in Interconnect- Centric Design for Advanced SoC and NoC, 2005, pp. 25–54. [Online]. Available: http://dx.doi.org/10.1007/1-4020-7836-6 2 Y.-H. Kuo, “Germanium-silicon electroabsorption modulators,” Ph.D. dissertation, Stanford University, 2006. B. Jalali, S. Yegnanarayanan, T. Yoon, T. Yoshimoto, I. Rendina, and F. Coppinger, “Advances in silicon-on-insulator optoelectronics,” Se- lected Topics in Quantum Electronics, IEEE Journal of, vol. 4, no. 6, pp. 938–947, 1998. 86 Bibliography V. K. Yang, M. E. Groenert, G. Taraschi, C. W. Leitz, A. J. Pitera, M. T. Currie, Z. Cheng, and E. A. Fitzgerald, “Monolithic integration of III-V optical interconnects on si using SiGe virtual substrates,” Journal of Materials Science: Materials in Electronics, vol. 13, no. 7, pp. 377–380, Jul. 2002. [Online]. Available: http://dx.doi.org/10.1023/A:1016006824115 R. Soref and B. Bennett, “Electrooptical effects in silicon,” Quantum Electronics, IEEE Journal of, vol. 23, no. 1, pp. 123–129, 1987. P. H. Wendland and M. Chester, “Electric field effects on indirect optical transitions in silicon,” Physical Review, vol. 140, no. 4A, p. A1384, Nov. 1965, copyright (C) 2010 The American Physical Society; Please report any problems to prola@aps.org. [Online]. Available: http://link.aps.org/abstract/PR/v140/pA1384 J. Roth, O. Fidaner, R. Schaevitz, Y. Kuo, T. Kamins, J. Harris, and D. Miller, “Optical modulator on silicon employing germanium quan- tum wells,” Opt. Express, vol. 15, no. 9, pp. 5851–5859, 2007. V. I. Fistul’, Heavily doped semiconductors [by] Victor I. Fistul’., 418th ed., ser. English. (New York): Plenum Press, 1969. [Online]. Available: http://openlibrary.org/b/OL18665358M/Heavily doped semiconductors by Victor I. Fistul%27. N. Dagli, High-speed photonic devices., CRC Press, 2007. L. K. C. Lam, “A silicon guided-wave optical modulator using free- car- 87 Bibliography rier dispersion effect and radiation loss mechanism,” Ph.D. dissertation, University of Washington, 1997. E. Garmire and A. Kost, Nonlinear Optics in Semiconductors II., Aca- demic Press, Nov. 1998. W. Spitzer and H. Y. Fan, “Infrared absorption in n-Type silicon,” Physical Review, vol. 108, no. 2, p. 268, Oct. 1957, copyright (C) 2010 The American Physical Society; Please report any problems to prola@aps.org. [Online]. Available: http://link.aps.org/abstract/PR/ v108/p268 W. C. Dash and R. Newman, “Intrinsic optical absorption in Single-Crystal germanium and silicon at 77K and 300K,” Physical Review, vol. 99, no. 4, p. 1151, 1955, copyright (C) 2010 The American Physical Society; Please report any problems to prola@aps.org. [Online]. Available: http://link.aps.org/abstract/PR/v99/p1151 P. E. Schmid, “Optical absorption in heavily doped silicon,” Phys. Rev. B, vol. 23, no. 10, pp. 5531–5536, May 1981. J. Liu, M. Beals, A. Pomerene, S. Bernardis, R. Sun, J. Cheng, L. C. Kimerling, and J. Michel, “Waveguide-integrated, ultralow-energy GeSi electro-absorption modulators,” Nat Photon, vol. 2, no. 7, pp. 433–437, Jul. 2008. [Online]. Available: http://dx.doi.org/10.1038/ nphoton.2008.99 L. Chao, “Silicon-based optical microresonator devices : polygonal mi- 88 Bibliography crodisk channel filters and electro-optic modulators/switches,” Ph.D. dissertation, Hong Kong University of Science and Technology, 2007. S. Bernardis, “Sige electro-absorption modulators for applications at 1550 nm,” Master’s thesis, Massachusetts Institute of Technology, 2008. S. Manipatruni, Q. Xu, B. Schmidt, J. Shakya, and M. Lipson, “High speed carrier injection 18 Gb/s silicon micro-ring electro-optic modula- tor,” Proc. of the IEEE Lasers and Electro-Optics Society, pp. 537–538. L. Liao, D. Samara-Rubio, M. Morse, A. Liu, D. Hodge, D. Rubin, U. Keil, and T. Franck, “High speed silicon Mach-Zehnder modulator,” Optics Express, vol. 13, no. 8, pp. 3129–3135, Apr. 2005. [Online]. Available: http://www.opticsexpress.org/abstract.cfm?URI= oe-13-8-3129 A. Liu, L. Liao, D. Rubin, H. Nguyen, B. Ciftcioglu, Y. Chetrit, N. Izhaky, and M. Paniccia, “High-speed optical modulation based on carrier depletion in a silicon waveguide,” Optics Express, vol. 15, no. 2, pp. 660–668, 2007. [Online]. Available: http: //www.opticsexpress.org/abstract.cfm?URI=oe-15-2-660 D. Marris-Morini, X. L. Roux, D. Pascal, L. Vivien, E. Cassan, J. M. Fdli, J. F. Damlencourt, D. Bouville, J. Palomo, and S. Laval, “High speed all-silicon optical modulator,” Journal of Luminescence, vol. 121, no. 2, pp. 387–390, Dec. 2006. [Online]. Available: http://www.sciencedirect.com/science/article/ B6TJH-4M1DB93-3/2/9ab0549731ed07f9913a750bc9a2d64f 89 Bibliography D. Marris-Morini, L. Vivien, J. M. Fdli, E. Cassan, P. Lyan, and S. Laval, “Low loss and high speed silicon optical modulator based on a lateral carrier depletion structure,” Optics Express, vol. 16, no. 1, pp. 334–339, 2008. [Online]. Available: http: //www.opticsexpress.org/abstract.cfm?URI=oe-16-1-334 S. Maine, D. M. Morini, L. Vivien, E. Cassan, and S. Laval, “Design optimization of a SiGe/Si Quantum-Well optical modulator,” Journal of Lightwave Technology, vol. 26, no. 6, pp. 678–684, Mar. 2008. [Online]. Available: http://jlt.osa.org/abstract.cfm?URI=JLT-26-6-678 D. Marris, E. Cassan, L. Vivien, D. Pascal, A. Koster, and S. Laval, “Design of a modulation-doped SiGe/Si optical modulator integrated in a submicrometer silicon-on-insulator waveguide,” Optical Engineering, vol. 44, no. 8, pp. 084 001–6, 2005. [Online]. Available: http://link.aip.org/link/?JOE/44/084001/1 E. Cassan, S. Laval, D. Marris, M. Rouvire, L. Vivien, M. Halbwax, A. Lupu, and D. Pascal, “Active SiGe devices for optical interconnects,” in Optical Interconnects, 2006, pp. 125–159. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-28912-8 6 S. Rihani, “SiGe strain tuning platforms: Material properties and ad- vantages offered to the Si-based technology,” IBS Journal of Science, vol. 2, no. 1, pp. 18–23, 2007. J. C. G. de Sande, A. Rodriguez, and T. Rodriguez, “Spectroscopic ellipsometry determination of the refractive index of strained si[sub 90 Bibliography 1 - x]Ge[sub x] layers in the near-infrared wavelength range (0.9–1.7 mu m),” Applied Physics Letters, vol. 67, no. 23, pp. 3402–3404, Dec. 1995. [Online]. Available: http://link.aip.org/link/?APL/67/3402/1 Properties of silicon germanium and SiGe:Carbon, ser. En- glish. (London): INSPEC, Institution of Electrical Engineers, 2000. [Online]. Available: http://openlibrary.org/b/OL22324731M/ Properties of silicon germanium and SiGe Carbon “Silvaco Atlas software.” [Online]. Available: http://www.silvaco.com/ products/device simulation/atlas.html P. Waldron, “Optimization of plasma dispersion modulators in silicon- on-insulator,” Ph.D. dissertation, McMaster University, 2005. M. Grupen, K. Hess, and G. Song, “Simulation of transport over het- erojunctions,” in Proc. 4th International Conf. Simul. Semicon. Dev. Process, vol. 4, pp. 303–311. K. Horio and H. Yanai, “Numerical modeling of heterojunctions includ- ing the thermionicemission mechanism at the heterojunction interface,” IEEE Transactions on Electron Devices, vol. 37, no. 4, pp. 1093–1098, 1990. A. Vonsovici and L. Vescan, “Modulation doped SiGe-Si MQW for low- voltage high-speed modulators at 1.3 m,” Selected Topics in Quantum Electronics, IEEE Journal of, vol. 4, no. 6, pp. 1011–1019, 1998. S. Lardenois, D. Pascal, L. Vivien, E. Cassan, S. Laval, R. Orobtchouk, 91 Bibliography M. Heitzmann, N. Bouzaida, and L. Mollard, “Low-loss submicrometer silicon-on-insulator rib waveguides and corner mirrors,” Optics Letters, vol. 28, no. 13, pp. 1150–1152, Jul. 2003. [Online]. Available: http://ol.osa.org/abstract.cfm?URI=ol-28-13-1150 A. Yariv and P. Yeh, Photonics: Optical Electronics in Modern Com- munications, 6th ed. Oxford University Press, USA, 2006. A. Fallahkhair, K. S. Li, and T. E. Murphy, “Vector finite difference modesolver for anisotropic dielectric waveguides,” Journal of Lightwave Technology, vol. 26, no. 11, pp. 1423–1431, Jun. 2008. [Online]. Available: http://jlt.osa.org/abstract.cfm?URI=JLT-26-11-1423 “Mode solver.” [Online]. Available: http://www.photonics.umd.edu/ software/wgmodes/ D. Marris, E. Cassan, and L. Vivien, “Response time analysis of SiGe/Si modulation-doped multiple-quantum-well structures for optical modulation,” Journal of Applied Physics, vol. 96, no. 11, pp. 6109–6112, Dec. 2004. [Online]. Available: http://link.aip.org/link/ ?JAP/96/6109/1 I. Tan, G. L. Snider, L. D. Chang, and E. L. Hu, “A self-consistent solution of Schro?dingerCPoisson equations using a nonuniform mesh,” Journal of Applied Physics, vol. 68, no. 8, p. 4071, 1990. [Online]. Available: http://link.aip.org/link/JAPIAU/v68/i8/p4071/s1&Agg= doi 92 A. Lupu, D. Marris, D. Pascal, J. Cercus, A. Cordat, V. L. Thanh, and S. Laval, “Experimental evidence for index modulation by carrier depletion in SiGe/Si multiple quantum well structures,” Applied Physics Letters, vol. 85, no. 6, pp. 887–889, 2004. [Online]. Available: http://link.aip.org/link/?APL/85/887/1 “SiGe properties.” [Online]. Available: http://www.virginiasemi.com/ pdf/generalpropertiesSi62002.pdf A. Cordat, S. Lardenois, V. L. Thanh, and A. Koster, “SiGe/Si multiquantum well structure for light modulation,” Materials Science and Engineering B, vol. 89, no. 1-3, pp. 66–69, Feb. 2002. [Online]. Available: http://www.sciencedirect.com/science/article/ B6TXF-44YVPGS-G/2/267924d9f1f6ca50a49a33269efe277b T. E. Murphy, “Design, fabrication and measurement of integrated bragg grating optical filters,” Ph.D. dissertation, Massachusetts Insti- tute of Technology, 2001. 93 Appendix A Mach-Zehnder Interferometer An integrated Mach-Zehnder interferometer consists of an input waveguide, a splitter, two phase shifters, an output combiner, and an output waveguide, as illustrated in Fig. A.1. The optical beam coming through the input waveguide is split into two optical beams by the splitter. The two optical beams travel through the two phase shifters inserted into the arms of the Mach-Zehnder interferometer, and then recombine at the output combiner. Assuming the waveguide Y-branch splitter at the input of the interfer- ometer divides the wave evenly, the intensities in arm 1 and arm 2 of the interferometer will be the same. Suppose, the electric fields in arm 1 and arm 2 of the interferometer as E1 and E2 respectively. Eout = E1 + E2√ 2 (A.1) Suppose k1 and k2, are the complex wavenumbers in arm 1 and arm 2, respectively, which can be expressed by 94 Appendix A. Mach-Zehnder Interferometer Phase-Control Waveguide Sections Optical Y-Branch to split signal Optical Y-Branch to recombine signal O p t i c a l O u t p u t P o w e r O p t i c a l I n p u t P o w e r O p t i c a l O u t p u t P o w e r O p t i c a l I n p u t P o w e r Figure A.1: Schematic view of the Mach-Zehnder interferometer. Two optical Y-branch couplers are used to split and recombine the incoming light. k1 = β1 + iα1 = β0 + ∆β1 + i ( α0 −∆α1 2 ) (A.2) k2 = β2 + iα2 = β0 + ∆β2 + i ( α0 −∆α2 2 ) (A.3) where β0 and α0 is the propagation constant and the optical power ab- sorption coefficient of light in both of the arms without the application of voltage. ∆β1 and ∆α1 are the changes of propagation constant and absorp- tion coefficient, respectively, in arm 1. ∆β2 and ∆α2 are those changes in 95 Appendix A. Mach-Zehnder Interferometer arm 2. Eout = E√ 2 · ei(k1z1−ωt) + E√ 2 · ei(k2z2−ωt) (A.4) Eout = E√ 2 · ei(β1z1−ωt) · e−α1z1/2 + E√ 2 · ei(β2z2−ωt) · e−α2z2/2 (A.5) Pout = Eout · E∗out (A.6) Pout = E2 2 · [ ei(β1z1−ωt) · e−α1z1/2 + ei(β2z2−ωt) · e−α2z2/2 ] · [ e−i(β1z1−ωt) · e−α1z1/2 + e−i(β2z2−ωt) · e−α2z2/2 ] (A.7) Pin = Pin−1 + Pin−2 = E2 + E2 = 2 · E2 (A.8) So, Pout = Pin 4 · [ ei(β1z1−ωt) · e−α1z1/2 + ei(β2z2−ωt) · e−α2z2/2 ] · [ e−i(β1z1−ωt) · e−α1z1/2 + e−i(β2z2−ωt) · e−α2z2/2 ] (A.9) Pout = Pin 4 · [ ei(β1z1−ωt) · e−α1z1/2 + ei(β2z2−ωt) · e−α2z2/2 ] · [ e−i(β1z1−ωt) · e−α1z1/2 + e−i(β2z2−ωt) · e−α2z2/2 ] (A.10) 96 Appendix A. Mach-Zehnder Interferometer Pout = Pin 4 · [ e−α1z1 + e−α2z2 + ei(β2z2−β1z1) · e−α1z1/2+α2z2/2 + ei(β1z1−β2z2) · e−α1z1/2+α2z2/2 ] (A.11) Pout Pin = 1 4 [ e−α1z1 + e−α2z2 + 2 · e−α1z1/2+α2z2/2 · cos (β2z2 − β1z1) ] (A.12) Iout Iin (V ) = 1 4 [ e−α1(V )z1 + e−α2(V )z2 + 2 · e−α1z1/2+α2z2/2 · cos (β2(V )z2 − β1(V )z1) ] (A.13) 97 Appendix B Mode Solver Program The description of the mode solver used to solve for the eigen modes in the SOI waveguides is described in detail in [38, 45]. In this appendix, we will describe the mode solver very briefly. The full-vector eigen value equation which describes the modes of prop- agation for an integrated waveguide is given by- ∥∥∥∥∥∥∥ Pxx Pxy Pyx Pyy ∥∥∥∥∥∥∥ ∥∥∥∥∥∥∥ ex ey ∥∥∥∥∥∥∥ = β2 ∥∥∥∥∥∥∥ ex ey ∥∥∥∥∥∥∥ (B.1) where Pxx...Pyy are differential operators defined as- Pxxex = δ δx [ 1 n2 δ(n2ex) δx ] + δ2ex δy2 + n2k2ex (B.2) Pyyey = δ δy [ 1 n2 δ(n2ey) δy ] + δ2ey δx2 + n2k2ey (B.3) Pxyey = δ δx [ 1 n2 δn2ey δy ] − δ 2ey δxδy (B.4) Pyxex = δ δy [ 1 n2 δn2ex δx ] − δ 2ex δyδx (B.5) where n and β, respectively, denote the refractive index of the layers in 98 Appendix B. Mode Solver Program the waveguide and the propagation constant of the eigen mode. The two transverse electric field components, ex and ey, are the eigenfunctions, and the corresponding eigenvalue is β2. The four remaining field components ez, hx, hy, and hz are derived from these two transverse components by applying Maxwell’s equations. The two transverse field components ex and ey are coupled, i.e. these cannot be solved separately by two separate eigen value equations. Because of this coupling, the eigenmodes of an optical waveguide are usually not purely TE or TM modes, and they are often referred to as hybrid modes . However, in our simulations, we assumed that one of the two transverse field components is larger than the other, and we used the semivectorial finite difference method which neglects the smaller field component and solves the eigenvalue equations for the remaining field component by neglecting Pxy, Pyx and either Pxx or Pyy in the full vector finite difference method which is described in . For example, if we want to solve for ex, The eigen value equation is reduced to the semivectorial eigen value equation which is Pxxex = β2ex (B.6)( δ2 δx2 + δ2 δy2 + n2(x, y)k2 ) ex = β2ex (B.7) The ridge waveguide is broken up into small rectangular cells or pixels of size ∆x×∆y. In each cell, refractive index is constant and the discontinuities in the refractive index may occur at the boundaries of the pixel. This is illustrated in Fig. B.1. For every grid point located at the center of each 99 Appendix B. Mode Solver Program cell, the partial differential equation is translated into a finite difference equation. Suppose for the point P, Equation B.7 will be turned into the difference equation : y x ∆x ∆y PW E N SSW NW NE SE Figure B.1: A typical finite difference mesh for an integrated waveguide. The rib waveguide is shown by the shaded region. P, N, S, E, W, NE, NW, SE and SW are used to label, respectively, the grid point under considera- tion, and its nearest neighbours to the north, south, east, west, north-east, north-west, south-east, and south-west. φW (∆x)2 + φE (∆x)2 + φN (∆y)2 + φS (∆y)2 + ( n2Pk 2 − 2 (∆x)2 − 2 (∆y)2 ) φP = β2φP (B.8) where φP is the field sample at the grid point P and φN , φS , φE , φW are the field samples at the grid points immediately north, south, east, and west of the point under consideration, P. Thus the eigen function ex in equation B.7 is replaced by samples of field located at discrete grid points and the 100 Appendix B. Mode Solver Program operator Pxx can be represented by the following diagram which illustrates the coefficients we have to multiply with each of the sample points adjacent to a particular grid point. 0 1 (∆y)2 0 1 (∆x)2 n2Pk 2 − 2 (∆x)2 − 2 (∆y)2 1 (∆x)2 0 1 (∆y)2 0 If we apply equation B.8 for each grid point in the computational win- dow, we obtain an M number of eigenvalue equations, where M is the total number of the grid points. After constructing the sets of eigen value equa- tions, boundary conditions will be considered for points which lie on the edge of the computation window. There can be three boundary conditions: absorbing, symmetric, and antisymmetric. By ”absorbing”, we mean that the field is assumed to be zero at grid points immediately outside a certain boundary of the computation window. By ”symmetric” (or ”antisymmet- ric”), we mean that the field is assumed to be symmetric (or ”antisymmet- ric”) at grid points immediately outside a certain boundary of the compu- tation window. The modifications of the Pxx operator at the boundaries according to different boundary conditions are discussed in detail in . 101```\n\n#### Cite\n\nCitation Scheme:\n\nCitations by CSL (citeproc-js)\n\n#### Embed\n\nCustomize your widget with the following options, then copy and paste the code below into the HTML of your page to embed this item in your website.\n``` ```\n<div id=\"ubcOpenCollectionsWidgetDisplay\">\n<script id=\"ubcOpenCollectionsWidget\"\nsrc=\"{[{embed.src}]}\"\ndata-item=\"{[{embed.item}]}\"\ndata-collection=\"{[{embed.collection}]}\"\ndata-metadata=\"{[{embed.showMetadata}]}\"\ndata-width=\"{[{embed.width}]}\"\ndata-media=\"{[{embed.selectedMedia}]}\"\nasync >\n</script>\n</div>\n```\n```",
null,
"Our image viewer uses the IIIF 2.0 standard. To load this item in other compatible viewers, use this url:\n`https://iiif.library.ubc.ca/presentation/dsp.24.1-0064956/manifest`"
] | [
null,
"https://open.library.ubc.ca/img/featured/icon-ubctheses.svg",
null,
"https://open.library.ubc.ca/img/iiif-logo.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8231318,"math_prob":0.9775857,"size":133561,"snap":"2021-04-2021-17","text_gpt3_token_len":39299,"char_repetition_ratio":0.2073347,"word_repetition_ratio":0.3551258,"special_character_ratio":0.29490644,"punctuation_ratio":0.17463857,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96166295,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-15T10:54:09Z\",\"WARC-Record-ID\":\"<urn:uuid:951d7c5e-581d-4606-b53d-9e3f83c6a54e>\",\"Content-Length\":\"370927\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8860d0a2-725e-48b5-a27a-e8c665831ddb>\",\"WARC-Concurrent-To\":\"<urn:uuid:d7d54394-eb2d-41e1-8463-014436107e56>\",\"WARC-IP-Address\":\"142.103.96.89\",\"WARC-Target-URI\":\"https://open.library.ubc.ca/cIRcle/collections/ubctheses/24/items/1.0064956\",\"WARC-Payload-Digest\":\"sha1:EANZQHHFF3M6ASZWPLVNPFWPJVV5YIXC\",\"WARC-Block-Digest\":\"sha1:HMNNZUDGD2XTHJFDTFOEPQ6UEDWLMNOA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038084765.46_warc_CC-MAIN-20210415095505-20210415125505-00051.warc.gz\"}"} |
https://pro.arcgis.com/en/pro-app/help/analysis/geoprocessing/modelbuilder/inline-variable-substitution.htm | [
"# Inline variable substitution\n\nIn ModelBuilder, the value or dataset path of a variable can be substituted for another variable by enclosing the substituting variable name in percent signs (%VariableName%). Substituting variables in this manner is called inline variable substitution.\n\nFor example, if you have a variable Name with a value of Wilson, you can construct a dataset path as C:\\Data\\Output.gdb\\Clipped_%Name% and the path will be resolved as C:\\Data\\Output.gdb\\Clipped_Wilson.\n\nYou can perform inline variable substitution using any model variables or system variables.\n\n• Model variables—Any variable in a model.\n• System variable—ModelBuilder provides a built-in system variable, n, that can be used in iteration workflows. %n% is the iteration number in the model.\n\n## Model variable substitution\n\nIn the model illustrated below, a workspace variable, Data Workspace, has a value of C:\\Data.gdb. This workspace location is substituted as an inline variable in the Project tool parameters by enclosing the variable name in percent symbols. At run time, the actual variable value, C:\\Data.gdb, is substituted for %Data Workspace%.\n\n### With iterators\n\nThe use of model variable substitution is especially important when working with ModelBuilder iterators. When the iterator Iterate Feature Classes runs, it creates an output variable for both the path and name of each feature class in a workspace. The value in the Name variable can be used to construct the path to the output Projected Feature Class. When the tool executes, %Name% is replaced with the name of the feature class.\n\n### User input to a model tool\n\nModel variable substitution can help you pass values entered by a user directly into a tool inside your model. For example, in the model illustrated below, Parcel ID is a model parameter that is specified when the model tool is run from the Geoprocessing pane. This variable is used in the Expression parameter of the Select Layer By Attribute tool as \"Parcel\" = '%Parcel ID%'. When the tool runs, %Parcel ID% in the expression is replaced with the parcel ID (9 in the case below), and only those parcels with an ID of 9 are selected.\n\n##### Note:\nThe Parcel ID variable in this example is a string. inline variables that are strings need to be enclosed within quotation marks ('%string variable%') in an expression. inline variables that are numbers do not require quotation marks\n\n### Used with Calculate Value\n\nCalculate Value is a powerful ModelBuilder utility that allows you to calculate a value based on any Python expression and use that value in your model. You can use model variable substitution to pass values from model variables into the Calculate Value Python expression, or use the output variable name that stores the calculated value in another tool in your model.\n\nThe model below contains two numeric variables: Number of Residents and Waste Per Person Per Year. These variables are used in the Calculate Value tool expression by enclosing them in percent symbols. When the Calculate Value tool runs, the variable names will be substituted with their values and multiplied together to calculate Total Waste Per Year.\n\n## System variable substitution\n\nModelBuilder provides a built-in system variable that can be used in iteration workflows. This variable, %n%, refers to the current model iteration (the first iteration is zero) when a model contains an iterator.\n\nFor example, the For iterator is used to iterate a model four times. The output of the Buffer tool is used as feedback into the tool as input. The model iterates and creates a new output at each iteration. %n% is used in the output name of Buffer to give the output of each iteration a new name."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.80780977,"math_prob":0.9209546,"size":3637,"snap":"2019-13-2019-22","text_gpt3_token_len":726,"char_repetition_ratio":0.17946601,"word_repetition_ratio":0.010238908,"special_character_ratio":0.19384108,"punctuation_ratio":0.09388971,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9781642,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-22T09:20:28Z\",\"WARC-Record-ID\":\"<urn:uuid:3a69d3ba-884e-45ca-9520-087fec417091>\",\"Content-Length\":\"28306\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3dd10b8d-0b3c-4912-bb91-e2f4ee46f430>\",\"WARC-Concurrent-To\":\"<urn:uuid:71060f89-431b-47ec-8b82-83c1863e0516>\",\"WARC-IP-Address\":\"198.102.61.235\",\"WARC-Target-URI\":\"https://pro.arcgis.com/en/pro-app/help/analysis/geoprocessing/modelbuilder/inline-variable-substitution.htm\",\"WARC-Payload-Digest\":\"sha1:QTCQMIIGFDZO6MQPQP3YFDQJNOXEYZG3\",\"WARC-Block-Digest\":\"sha1:TOKYZ5LW2HTQHYBYBZ73S5RAWHN5QVSK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202640.37_warc_CC-MAIN-20190322074800-20190322100800-00034.warc.gz\"}"} |
https://intellipaat.com/community/32658/how-to-convert-a-column-or-row-matrix-to-a-diagonal-matrix-in-python | [
"2 views\nin Python\n\nI have a row vector A, A = [a1 a2 a3 ..... an] and I would like to create a diagonal matrix, B = diag(a1, a2, a3, ....., an) with the elements of this row vector. How can this be done in Python?\n\nUPDATE\n\nThis is the code to illustrate the problem:\n\nimport numpy as np\n\na = np.matrix([1,2,3,4])\n\nd = np.diag(a)\n\nprint (d)\n\nthe output of this code is , but my desired output is:\n\n[[1 0 0 0]\n\n[0 2 0 0]\n\n[0 0 3 0]\n\n[0 0 0 4]]\n\nby (40.4k points)\n\nYou can try using diag method like this:\n\nimport numpy as np\n\na = np.array([1,2,3,4])\n\nd = np.diag(a)\n\n# or simpler: d = np.diag([1,2,3,4])\n\nprint(d)\n\nResults in:\n\n[[1 0 0 0]\n\n[0 2 0 0]\n\n[0 0 3 0]\n\n[0 0 0 4]]\n\nIf you have a row vector, you can do this:\n\na = np.array([[1, 2, 3, 4]])\n\nd = np.diag(a)\n\nResults in:\n\n[[1 0 0 0]\n\n[0 2 0 0]\n\n[0 0 3 0]\n\n[0 0 0 4]]\n\nFor the given matrix in the question:\n\nimport numpy as np\n\na = np.matrix([1,2,3,4])\n\nd = np.diag(a.A1)\n\nprint (d)\n\nThe result is again:\n\n[[1 0 0 0]\n\n[0 2 0 0]\n\n[0 0 3 0]\n\n[0 0 0 4]]\n\nIf you wish to learn more about Python, visit the Python tutorial and Python course by Intellipaat.\n\nby (106k points)\n\nTo convert a column or row matrix into a diagonal you can use diagflat:\n\nimport numpy\n\na = np.matrix([1,2,3,4])\n\nd = np.diagflat(a)\n\nprint (d)"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.843749,"math_prob":0.9994572,"size":414,"snap":"2022-40-2023-06","text_gpt3_token_len":151,"char_repetition_ratio":0.107317075,"word_repetition_ratio":0.0,"special_character_ratio":0.41545895,"punctuation_ratio":0.21666667,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99754834,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-26T06:42:03Z\",\"WARC-Record-ID\":\"<urn:uuid:92da2cae-c475-4d86-b5c4-bf49cc4e98ad>\",\"Content-Length\":\"92581\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:46bb29e7-dd88-4e6d-b862-7516529c129d>\",\"WARC-Concurrent-To\":\"<urn:uuid:e0386cb6-2c37-4449-a215-e09b2b197dfd>\",\"WARC-IP-Address\":\"104.18.26.176\",\"WARC-Target-URI\":\"https://intellipaat.com/community/32658/how-to-convert-a-column-or-row-matrix-to-a-diagonal-matrix-in-python\",\"WARC-Payload-Digest\":\"sha1:LEXCOHMHCJECJCR3DHXMVDRKWYLSE66B\",\"WARC-Block-Digest\":\"sha1:EFULIX2LWBAHNOPYG4PQGEYPK6TK3OCD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334802.16_warc_CC-MAIN-20220926051040-20220926081040-00205.warc.gz\"}"} |
https://answers.everydaycalculation.com/subtract-fractions/3-4-minus-5-7 | [
"Solutions by everydaycalculation.com\n\n## Subtract 5/7 from 3/4\n\n3/4 - 5/7 is 1/28.\n\n#### Steps for subtracting fractions\n\n1. Find the least common denominator or LCM of the two denominators:\nLCM of 4 and 7 is 28\n\nNext, find the equivalent fraction of both fractional numbers with denominator 28\n2. For the 1st fraction, since 4 × 7 = 28,\n3/4 = 3 × 7/4 × 7 = 21/28\n3. Likewise, for the 2nd fraction, since 7 × 4 = 28,\n5/7 = 5 × 4/7 × 4 = 20/28\n4. Subtract the two like fractions:\n21/28 - 20/28 = 21 - 20/28 = 1/28\n\nMathStep (Works offline)",
null,
"Download our mobile app and learn to work with fractions in your own time:"
] | [
null,
"https://answers.everydaycalculation.com/mathstep-app-icon.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7196393,"math_prob":0.9928272,"size":356,"snap":"2023-14-2023-23","text_gpt3_token_len":185,"char_repetition_ratio":0.22443181,"word_repetition_ratio":0.0,"special_character_ratio":0.53932583,"punctuation_ratio":0.048076924,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9990221,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-07T21:52:55Z\",\"WARC-Record-ID\":\"<urn:uuid:0f2c8433-8c94-48a9-b86f-fca9de83bae8>\",\"Content-Length\":\"8468\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d635869c-1a80-43e1-ba3f-4d5f7ba22a22>\",\"WARC-Concurrent-To\":\"<urn:uuid:fcf63ff1-66cf-439e-b4d2-94a8a337d3cb>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/subtract-fractions/3-4-minus-5-7\",\"WARC-Payload-Digest\":\"sha1:H357MPD43A42TWNVARST6MX2YEWTUEBB\",\"WARC-Block-Digest\":\"sha1:J3MF525B3ERHRG4VGSDJ4NMODQU5LJAV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224654016.91_warc_CC-MAIN-20230607211505-20230608001505-00661.warc.gz\"}"} |
https://www.myclassbook.org/2017/03/heterodyne-wave-analyzer.html | [
"",
null,
"# Heterodyne Wave Analyzer\n\n## Heterodyne Wave Analyzer:\n\n### Introduction:\n\nAnalysis of the waveform means determination of the values of amplitude, frequency and sometime phase angle of the harmonic components.\n\nA wave analyser is an instrument designed to measure relative amplitude of signal frequency components in a complex waveform .basically a wave instruments acts as a frequency selective voltmeter which is tuned to the frequency of one signal while rejecting all other signal components.\n\nIt is well known that any periodic waveform can be represented as the sum of a d.c. component and a series of sinusoidal harmonics. Analysis of a waveform consists of determination of the values of amplitude, frequency, and sometime phase angle of the harmonic components. Graphical and mathematical methods may be used for the purpose but these methods are quite laborious. The analysis of a complex waveform can be done by electrical means using a band pass filter network to single out the various harmonic components. Networks of these types pass a narrow band of frequency and provide a high degree of attenuation to all other frequencies.\n\nA wave analyzer, in fact, is an instrument designed to measure relative amplitudes of single frequency components in a complex waveform. Basically, the instrument acts as a frequency selective voltmeter which is used to the frequency of one signal while rejecting all other signal components. The desired frequency is selected by a frequency calibrated dial to the point of maximum amplitude. The amplitude is indicated either by a suitable voltmeter or CRO.\n\nThis instrument is used in the MHz range. The input signal to be analysed is heterodyned to a higher IF by an internal local oscillator. Tuning the local oscillator shifts various signal frequency components into the pass band of the IF amplifier. The output of the IF amplifier is rectified and is applied to the metering circuit. The instrument using the heterodyning principle is called a heterodyning tuned voltmeter.\n\nThe block schematic of the wave analyser using the heterodyning principle is shown in fig. above. The operating frequency range of this instrument is from 10 kHz to 18 MHz in 18 overlapping bands selected by the frequency range control of the local oscillator. The bandwidth is controlled by an active filter and can be selected at 200, 1000, and 3000 Hz.\n\n### Applications of Wave Analyzers:\n\nWave analyzers have very important applications in the following fields:\n\n1) Electrical measurements\n\n2) Sound measurements and\n\n3) Vibration measurements.\n\nThe wave analyzers are applied industrially in the field of reduction of sound and vibrations generated by rotating electrical machines and apparatus. The source of noise and vibrations is first identified by wave analyzers before it can be reduced or eliminated. A fine spectrum analysis with the wave analyzer shows various discrete frequencies and resonances that can be related to the motion of machines. Once, these sources of sound and vibrations are detected with the help of wave analyzers, ways and means can be found to eliminate them."
] | [
null,
"https://4.bp.blogspot.com/-b3N8Xz8TzlE/WzHHducCTtI/AAAAAAAACLQ/t0Qb1XiaYbgqGLde7fU9VoEzn38tUtseACK4BGAYYCw/s728/ad728.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90248954,"math_prob":0.922695,"size":3348,"snap":"2023-40-2023-50","text_gpt3_token_len":640,"char_repetition_ratio":0.13875598,"word_repetition_ratio":0.08598131,"special_character_ratio":0.18189964,"punctuation_ratio":0.08163265,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9518846,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T16:54:47Z\",\"WARC-Record-ID\":\"<urn:uuid:5ac96970-a823-4cf9-89c1-414cd4f8e6ca>\",\"Content-Length\":\"258496\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2cdbc4a7-766c-4ba0-a2f3-7f38bdba3f9d>\",\"WARC-Concurrent-To\":\"<urn:uuid:ce45ad5e-a754-4b6d-bee1-381d30232666>\",\"WARC-IP-Address\":\"172.253.63.121\",\"WARC-Target-URI\":\"https://www.myclassbook.org/2017/03/heterodyne-wave-analyzer.html\",\"WARC-Payload-Digest\":\"sha1:DDHIZFFOTTQ7SE6KNIHRVPVUSDTBDLHP\",\"WARC-Block-Digest\":\"sha1:Z4W6DX2NORQQ2XCXUG3VDW7JXBZLATNM\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100762.64_warc_CC-MAIN-20231208144732-20231208174732-00569.warc.gz\"}"} |
https://www.colorhexa.com/165e59 | [
"# #165e59 Color Information\n\nIn a RGB color space, hex #165e59 is composed of 8.6% red, 36.9% green and 34.9% blue. Whereas in a CMYK color space, it is composed of 76.6% cyan, 0% magenta, 5.3% yellow and 63.1% black. It has a hue angle of 175.8 degrees, a saturation of 62.1% and a lightness of 22.7%. #165e59 color hex could be obtained by blending #2cbcb2 with #000000. Closest websafe color is: #006666.\n\n• R 9\n• G 37\n• B 35\nRGB color chart\n• C 77\n• M 0\n• Y 5\n• K 63\nCMYK color chart\n\n#165e59 color description : Very dark cyan.\n\n# #165e59 Color Conversion\n\nThe hexadecimal color #165e59 has RGB values of R:22, G:94, B:89 and CMYK values of C:0.77, M:0, Y:0.05, K:0.63. Its decimal value is 1465945.\n\nHex triplet RGB Decimal 165e59 `#165e59` 22, 94, 89 `rgb(22,94,89)` 8.6, 36.9, 34.9 `rgb(8.6%,36.9%,34.9%)` 77, 0, 5, 63 175.8°, 62.1, 22.7 `hsl(175.8,62.1%,22.7%)` 175.8°, 76.6, 36.9 006666 `#006666`\nCIE-LAB 35.785, -22.628, -3.423 6.136, 8.897, 10.844 0.237, 0.344, 8.897 35.785, 22.886, 188.603 35.785, -25.696, -1.459 29.827, -15.476, -0.677 00010110, 01011110, 01011001\n\n# Color Schemes with #165e59\n\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #5e161b\n``#5e161b` `rgb(94,22,27)``\nComplementary Color\n• #165e35\n``#165e35` `rgb(22,94,53)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #163f5e\n``#163f5e` `rgb(22,63,94)``\nAnalogous Color\n• #5e3516\n``#5e3516` `rgb(94,53,22)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #5e163f\n``#5e163f` `rgb(94,22,63)``\nSplit Complementary Color\n• #5e5916\n``#5e5916` `rgb(94,89,22)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #59165e\n``#59165e` `rgb(89,22,94)``\nTriadic Color\n• #1b5e16\n``#1b5e16` `rgb(27,94,22)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #59165e\n``#59165e` `rgb(89,22,94)``\n• #5e161b\n``#5e161b` `rgb(94,22,27)``\nTetradic Color\n• #07201e\n``#07201e` `rgb(7,32,30)``\n• #0c3532\n``#0c3532` `rgb(12,53,50)``\n• #114945\n``#114945` `rgb(17,73,69)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #1b736d\n``#1b736d` `rgb(27,115,109)``\n• #208780\n``#208780` `rgb(32,135,128)``\n• #259c94\n``#259c94` `rgb(37,156,148)``\nMonochromatic Color\n\n# Alternatives to #165e59\n\nBelow, you can see some colors close to #165e59. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #165e47\n``#165e47` `rgb(22,94,71)``\n• #165e4d\n``#165e4d` `rgb(22,94,77)``\n• #165e53\n``#165e53` `rgb(22,94,83)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #165d5e\n``#165d5e` `rgb(22,93,94)``\n• #16575e\n``#16575e` `rgb(22,87,94)``\n• #16515e\n``#16515e` `rgb(22,81,94)``\nSimilar Colors\n\n# #165e59 Preview\n\nText with hexadecimal color #165e59\n\nThis text has a font color of #165e59.\n\n``<span style=\"color:#165e59;\">Text here</span>``\n#165e59 background color\n\nThis paragraph has a background color of #165e59.\n\n``<p style=\"background-color:#165e59;\">Content here</p>``\n#165e59 border color\n\nThis element has a border color of #165e59.\n\n``<div style=\"border:1px solid #165e59;\">Content here</div>``\nCSS codes\n``.text {color:#165e59;}``\n``.background {background-color:#165e59;}``\n``.border {border:1px solid #165e59;}``\n\n# Shades and Tints of #165e59\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #030f0e is the darkest color, while #feffff is the lightest one.\n\n• #030f0e\n``#030f0e` `rgb(3,15,14)``\n• #071e1d\n``#071e1d` `rgb(7,30,29)``\n• #0b2e2c\n``#0b2e2c` `rgb(11,46,44)``\n• #0f3e3b\n``#0f3e3b` `rgb(15,62,59)``\n• #124e4a\n``#124e4a` `rgb(18,78,74)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #1a6e68\n``#1a6e68` `rgb(26,110,104)``\n• #1d7e77\n``#1d7e77` `rgb(29,126,119)``\n• #218e86\n``#218e86` `rgb(33,142,134)``\n• #259e95\n``#259e95` `rgb(37,158,149)``\n• #29ada4\n``#29ada4` `rgb(41,173,164)``\n• #2cbdb3\n``#2cbdb3` `rgb(44,189,179)``\n• #30cdc2\n``#30cdc2` `rgb(48,205,194)``\nShade Color Variation\n• #3fd2c8\n``#3fd2c8` `rgb(63,210,200)``\n• #4fd6cc\n``#4fd6cc` `rgb(79,214,204)``\n• #5fd9d1\n``#5fd9d1` `rgb(95,217,209)``\n• #6fddd6\n``#6fddd6` `rgb(111,221,214)``\n• #7ee1da\n``#7ee1da` `rgb(126,225,218)``\n• #8ee5df\n``#8ee5df` `rgb(142,229,223)``\n• #9ee8e3\n``#9ee8e3` `rgb(158,232,227)``\n• #aeece8\n``#aeece8` `rgb(174,236,232)``\n• #bef0ec\n``#bef0ec` `rgb(190,240,236)``\n• #cef4f1\n``#cef4f1` `rgb(206,244,241)``\n• #def7f5\n``#def7f5` `rgb(222,247,245)``\n• #eefbfa\n``#eefbfa` `rgb(238,251,250)``\n• #feffff\n``#feffff` `rgb(254,255,255)``\nTint Color Variation\n\n# Tones of #165e59\n\nA tone is produced by adding gray to any pure hue. In this case, #3a3a3a is the less saturated color, while #047068 is the most saturated one.\n\n• #3a3a3a\n``#3a3a3a` `rgb(58,58,58)``\n• #353f3e\n``#353f3e` `rgb(53,63,62)``\n• #314342\n``#314342` `rgb(49,67,66)``\n• #2c4846\n``#2c4846` `rgb(44,72,70)``\n• #284c4a\n``#284c4a` `rgb(40,76,74)``\n• #23514d\n``#23514d` `rgb(35,81,77)``\n• #1f5551\n``#1f5551` `rgb(31,85,81)``\n• #1a5a55\n``#1a5a55` `rgb(26,90,85)``\n• #165e59\n``#165e59` `rgb(22,94,89)``\n• #12625d\n``#12625d` `rgb(18,98,93)``\n• #0d6761\n``#0d6761` `rgb(13,103,97)``\n• #096b65\n``#096b65` `rgb(9,107,101)``\n• #047068\n``#047068` `rgb(4,112,104)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #165e59 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.560358,"math_prob":0.7014496,"size":3683,"snap":"2021-21-2021-25","text_gpt3_token_len":1664,"char_repetition_ratio":0.1255776,"word_repetition_ratio":0.011090573,"special_character_ratio":0.5544393,"punctuation_ratio":0.23783186,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99242556,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-22T08:28:14Z\",\"WARC-Record-ID\":\"<urn:uuid:aabf5695-0e00-4001-a025-842059fa6141>\",\"Content-Length\":\"36234\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d87a145a-d376-48d6-849a-28089efd1d8f>\",\"WARC-Concurrent-To\":\"<urn:uuid:6d737b9c-62cf-4ad1-ba19-fc8df7963ca7>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/165e59\",\"WARC-Payload-Digest\":\"sha1:L34KMZTFETUHH2WZUHVATDPBWP5LL3C2\",\"WARC-Block-Digest\":\"sha1:H2ZHBUD6IMX6HKVRZT5TITDKSQGG2R76\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488512243.88_warc_CC-MAIN-20210622063335-20210622093335-00051.warc.gz\"}"} |
https://kr.mathworks.com/matlabcentral/cody/problems/42258-calculate-square-and-cube-of-number/solutions/1643379 | [
"Cody\n\n# Problem 42258. Calculate square and cube of number\n\nSolution 1643379\n\nSubmitted on 12 Oct 2018 by amirhosein alimohammadi\nThis solution is locked. To view this solution, you need to provide a solution of the same size or smaller.\n\n### Test Suite\n\nTest Status Code Input and Output\n1 Pass\nx = 1; y = 1; assert(isequal(cube(x),y))\n\n2 Pass\nx = 2; y = 8; assert(isequal(cube(x),y))"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.53428483,"math_prob":0.98891735,"size":305,"snap":"2020-10-2020-16","text_gpt3_token_len":101,"char_repetition_ratio":0.14617941,"word_repetition_ratio":0.0,"special_character_ratio":0.35737705,"punctuation_ratio":0.109375,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98177737,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-20T10:35:45Z\",\"WARC-Record-ID\":\"<urn:uuid:3c9782e8-f97d-484c-bce6-c4cb782fcc01>\",\"Content-Length\":\"72697\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b855d337-f544-4bdf-bc2e-98aaba22c649>\",\"WARC-Concurrent-To\":\"<urn:uuid:6197d24a-edf8-4e50-a526-b8e0f9a014cd>\",\"WARC-IP-Address\":\"104.110.193.39\",\"WARC-Target-URI\":\"https://kr.mathworks.com/matlabcentral/cody/problems/42258-calculate-square-and-cube-of-number/solutions/1643379\",\"WARC-Payload-Digest\":\"sha1:WYZKXO3GQQXP5OECIS5LR7GCAKRXTZXS\",\"WARC-Block-Digest\":\"sha1:AIDOKQ667PK3YE4VWABQCZPSEKM7UCXY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875144722.77_warc_CC-MAIN-20200220100914-20200220130914-00400.warc.gz\"}"} |
https://answers.yahoo.com/question/index?qid=20191112230100AAsxnBN | [
"# Which compound contains chlorine (Cl) with an oxidation number of +3 A) Cl2O B) Cl2O3 C) ClO2?\n\nRelevance\n• O has an oxidation number of -2 and the total molecule has to equal zero if it is not charged. If it is charged the molecule has to equal the charge.\n\na)\n\nCl2O:\n\n2*Cl -2 = 0\n\n2*Cl = 2\n\nCl = 1\n\nthat's not the one\n\nb)\n\nCl2O3:2*Cl -3*2 = 0\n\n2*Cl -6 = 0\n\n2*Cl = 6\n\nCl = 3\n\nlooks right\n\nc)\n\nClO2:\n\n2*Cl -2*2 = 0\n\n2*Cl -4 = 0\n\n2*Cl = 4\n\nCl = 2\n\nalso not 3, so b) is the best answer.\n\n• B) Cl2O3 ."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.84233373,"math_prob":0.99894637,"size":642,"snap":"2019-51-2020-05","text_gpt3_token_len":244,"char_repetition_ratio":0.14263323,"word_repetition_ratio":0.0,"special_character_ratio":0.36915886,"punctuation_ratio":0.07534247,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9890704,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-07T13:42:38Z\",\"WARC-Record-ID\":\"<urn:uuid:ef16e51d-459f-4fce-8689-65d5a6e57c6f>\",\"Content-Length\":\"78489\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fc0f7880-7c28-4daa-baff-b705994d0066>\",\"WARC-Concurrent-To\":\"<urn:uuid:1398a6f1-2063-469c-9bfc-512433ca4134>\",\"WARC-IP-Address\":\"69.147.92.11\",\"WARC-Target-URI\":\"https://answers.yahoo.com/question/index?qid=20191112230100AAsxnBN\",\"WARC-Payload-Digest\":\"sha1:73HWEXME6FAFBRBMSC2C3ZIRAIW5RUNP\",\"WARC-Block-Digest\":\"sha1:PSGCWH24YARSJL7R5JSRMPQFFEOZLKA7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540499439.6_warc_CC-MAIN-20191207132817-20191207160817-00490.warc.gz\"}"} |
https://tools.carboncollective.co/compound-interest/11058-at-12-percent-in-16-years/ | [
"# What is the compound interest on $11058 at 12% over 16 years? If you want to invest$11,058 over 16 years, and you expect it will earn 12.00% in annual interest, your investment will have grown to become $67,789.89. If you're on this page, you probably already know what compound interest is and how a sum of money can grow at a faster rate each year, as the interest is added to the original principal amount and recalculated for each period. The actual rate that$11,058 compounds at is dependent on the frequency of the compounding periods. In this article, to keep things simple, we are using an annual compounding period of 16 years, but it could be monthly, weekly, daily, or even continuously compounding.\n\nThe formula for calculating compound interest is:\n\n$$A = P(1 + \\dfrac{r}{n})^{nt}$$\n\n• A is the amount of money after the compounding periods\n• P is the principal amount\n• r is the annual interest rate\n• n is the number of compounding periods per year\n• t is the number of years\n\nWe can now input the variables for the formula to confirm that it does work as expected and calculates the correct amount of compound interest.\n\nFor this formula, we need to convert the rate, 12.00% into a decimal, which would be 0.12.\n\n$$A = 11058(1 + \\dfrac{ 0.12 }{1})^{ 16}$$\n\nAs you can see, we are ignoring the n when calculating this to the power of 16 because our example is for annual compounding, or one period per year, so 16 × 1 = 16.\n\n## How the compound interest on $11,058 grows over time The interest from previous periods is added to the principal amount, and this grows the sum a rate that always accelerating. The table below shows how the amount increases over the 16 years it is compounding: Start Balance Interest End Balance 1$11,058.00 $1,326.96$12,384.96\n2 $12,384.96$1,486.20 $13,871.16 3$13,871.16 $1,664.54$15,535.69\n4 $15,535.69$1,864.28 $17,399.98 5$17,399.98 $2,088.00$19,487.97\n6 $19,487.97$2,338.56 $21,826.53 7$21,826.53 $2,619.18$24,445.72\n8 $24,445.72$2,933.49 $27,379.20 9$27,379.20 $3,285.50$30,664.70\n10 $30,664.70$3,679.76 $34,344.47 11$34,344.47 $4,121.34$38,465.81\n12 $38,465.81$4,615.90 $43,081.70 13$43,081.70 $5,169.80$48,251.51\n14 $48,251.51$5,790.18 $54,041.69 15$54,041.69 $6,485.00$60,526.69\n16 $60,526.69$7,263.20 $67,789.89 We can also display this data on a chart to show you how the compounding increases with each compounding period. As you can see if you view the compounding chart for$11,058 at 12.00% over a long enough period of time, the rate at which it grows increases over time as the interest is added to the balance and new interest calculated from that figure.\n\n## How long would it take to double $11,058 at 12% interest? Another commonly asked question about compounding interest would be to calculate how long it would take to double your investment of$11,058 assuming an interest rate of 12.00%.\n\nWe can calculate this very approximately using the Rule of 72.\n\nThe formula for this is very simple:\n\n$$Years = \\dfrac{72}{Interest\\: Rate}$$\n\nBy dividing 72 by the interest rate given, we can calculate the rough number of years it would take to double the money. Let's add our rate to the formula and calculate this:\n\n$$Years = \\dfrac{72}{ 12 } = 6$$\n\nUsing this, we know that any amount we invest at 12.00% would double itself in approximately 6 years. So $11,058 would be worth$22,116 in ~6 years.\n\nWe can also calculate the exact length of time it will take to double an amount at 12.00% using a slightly more complex formula:\n\n$$Years = \\dfrac{log(2)}{log(1 + 0.12)} = 6.12\\; years$$\n\nHere, we use the decimal format of the interest rate, and use the logarithm math function to calculate the exact value.\n\nAs you can see, the exact calculation is very close to the Rule of 72 calculation, which is much easier to remember.\n\nHopefully, this article has helped you to understand the compound interest you might achieve from investing \\$11,058 at 12.00% over a 16 year investment period."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93024355,"math_prob":0.9989636,"size":3955,"snap":"2022-40-2023-06","text_gpt3_token_len":1210,"char_repetition_ratio":0.14325488,"word_repetition_ratio":0.015267176,"special_character_ratio":0.38432363,"punctuation_ratio":0.1799787,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999093,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-07T05:04:15Z\",\"WARC-Record-ID\":\"<urn:uuid:170d26aa-bd39-43cd-97fe-b20ff6eef711>\",\"Content-Length\":\"27145\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e4847820-1b01-4c3b-aede-e9327b844864>\",\"WARC-Concurrent-To\":\"<urn:uuid:db6b7170-5684-4cbe-9c31-3e7f07a79edb>\",\"WARC-IP-Address\":\"138.197.3.89\",\"WARC-Target-URI\":\"https://tools.carboncollective.co/compound-interest/11058-at-12-percent-in-16-years/\",\"WARC-Payload-Digest\":\"sha1:6QHOQBWRXOO3HKBKMN6LFVYLUSGWKE7P\",\"WARC-Block-Digest\":\"sha1:WL3O4B4P4MX5BFCIQHQ6ORBOG4WR6YU5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337971.74_warc_CC-MAIN-20221007045521-20221007075521-00515.warc.gz\"}"} |
https://www.vrcbuzz.com/tag/binomial-distribution-using-r/ | [
"## Binomial distribution probabilities using R\n\nBinomial distribution probabilities using R In this tutorial, you will learn about how to use dbinom(), pbinom(), qbinom() and rbinom() functions in R programming language to compute the individual probabilities, cumulative probabilities, quantiles and how to generate random sample from Binomial distribution. Before we discuss R functions for binomial distribution, let us see what is …"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.74735487,"math_prob":0.9673844,"size":432,"snap":"2023-14-2023-23","text_gpt3_token_len":84,"char_repetition_ratio":0.16121495,"word_repetition_ratio":0.03508772,"special_character_ratio":0.17592593,"punctuation_ratio":0.104477614,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994747,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-02T14:55:29Z\",\"WARC-Record-ID\":\"<urn:uuid:b9d017ab-2017-47c0-9dec-47f1d1ef5640>\",\"Content-Length\":\"80312\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cabd7f6e-470e-4464-9242-2e3d974ac026>\",\"WARC-Concurrent-To\":\"<urn:uuid:cbeb8795-60eb-417b-8ece-6742139b5515>\",\"WARC-IP-Address\":\"50.16.223.119\",\"WARC-Target-URI\":\"https://www.vrcbuzz.com/tag/binomial-distribution-using-r/\",\"WARC-Payload-Digest\":\"sha1:ANC3F7BKKTZMIO7WI5MPG4VDAITHEDCA\",\"WARC-Block-Digest\":\"sha1:WJRAD5VOEZ7GMN4YPSFJKNZA7QXNBQAE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224648695.4_warc_CC-MAIN-20230602140602-20230602170602-00015.warc.gz\"}"} |
https://chem.libretexts.org/Bookshelves/Inorganic_Chemistry/Supplemental_Modules_and_Websites_(Inorganic_Chemistry)/Crystal_Field_Theory/Tetrahedral_vs._Square_Planar_Complexes | [
"# Tetrahedral vs. Square Planar Complexes\n\nLearning Objectives\n\n• Discuss the d-orbital degeneracy of square planar and tetrahedral metal complexes.\n\n## Tetrahedral Geometry\n\nTetrahedral geometry is a bit harder to visualize than square planar geometry. Tetrahedral geometry is analogous to a pyramid, where each of corners of the pyramid corresponds to a ligand, and the central molecule is in the middle of the pyramid. This geometry also has a coordination number of 4 because it has 4 ligands bound to it. Finally, the bond angle between the ligands is 109.5o. An example of the tetrahedral molecule $$\\ce{CH4}$$, or methane.\n\nIn a tetrahedral complex, $$Δ_t$$ is relatively small even with strong-field ligands as there are fewer ligands to bond with. It is rare for the $$Δ_t$$ of tetrahedral complexes to exceed the pairing energy. Usually, electrons will move up to the higher energy orbitals rather than pair. Because of this, most tetrahedral complexes are high spin.\n\n## Square Planar Complexes\n\nIn square planar molecular geometry, a central atom is surrounded by constituent atoms, which form the corners of a square on the same plane. The geometry is prevalent for transition metal complexes with d8 configuration. This includes Rh(I), Ir(I), Pd(II), Pt(II), and Au(III). Notable examples include the anticancer drugs cisplatin ($$\\ce{PtCl2(NH3)2}$$).\n\nA square planar complex also has a coordination number of 4. The structure of the complex differs from tetrahedral because the ligands form a simple square on the x and y axes. Because of this, the crystal field splitting is also different (Figure $$\\PageIndex{1}$$). Since there are no ligands along the z-axis in a square planar complex, the repulsion of electrons in the $$d_{xz}$$, $$d_{yz}$$, and the $$d_{z^2}$$ orbitals are considerably lower than that of the octahedral complex (the $$d_{z^2}$$ orbital is slightly higher in energy to the \"doughnut\" that lies on the x,y axis). The $$d_{x^2-y^2}$$ orbital has the most energy, followed by the $$d_{xy}$$ orbital, which is followed by the remaining orbtails (although $$d_{z^2}$$ has slightly more energy than the $$d_{xz}$$ and $$d_{yz}$$ orbital). This pattern of orbital splitting remains constant throughout all geometries. Whichever orbitals come in direct contact with the ligand fields will have higher energies than orbitals that slide past the ligand field and have more of indirect contact with the ligand fields. So when confused about which geometry leads to which splitting, think about the way the ligand fields interact with the electron orbitals of the central atom.",
null,
"Figure $$\\PageIndex{1}$$: In square planar complexes Δ will almost always be large, even with a weak-field ligand. Electrons tend to be paired rather than unpaired because paring energy is usually much less than Δ. Therefore, square planar complexes are usually low spin. (CC BY-SA; Ümit Kaya)\n\nIn square planar complexes $$Δ$$ will almost always be large (Figure $$\\PageIndex{1}$$), even with a weak-field ligand. Electrons tend to be paired rather than unpaired because paring energy is usually much less than $$Δ$$. Therefore, square planar complexes are usually low spin.\n\nAdvanced: $$\\ce{[PdCl4]^{2-}}$$ is square planar and $$\\ce{[NiCl4]^{2-}}$$ is tetrahedral\n\nThe molecule $$\\ce{[PdCl4]^{2−}}$$ is diamagnetic, which indicates a square planar geometry as all eight d-electrons are paired in the lower-energy orbitals. However, $$\\ce{[NiCl4]^{2−}}$$ is also d8 but has two unpaired electrons, indicating a tetrahedral geometry. Why is $$\\ce{[PdCl4]^{2−}}$$ square planar if $$\\ce{Cl^{-}}$$ is not a strong-field ligand?\n\nSolution\n\nThe geometry of the complex changes going from $$\\ce{[NiCl4]^{2−}}$$ to $$\\ce{[PdCl4]^{2−}}$$. Clearly this cannot be due to any change in the ligand since it is the same in both cases. It is the other factor, the metal, that leads to the difference.\n\nConsider the splitting of the d-orbitals in a generic d8 complex. If it were to adopt a square planar geometry, the electrons will be stabilized (with respect to a tetrahedral complex) as they are placed in orbitals of lower energy. However, this comes at a cost: two of the electrons, which were originally unpaired in the tetrahedral structure, are now paired in the square-planer structure:",
null,
"We can label these two factors as $$ΔE$$ (stabilization derived from occupation of lower-energy orbitals) and $$P$$ (spin pairing energy) respectively. One can see that:\n\n• If $$ΔE>P$$, then the complex will be square planar\n• If $$ΔE<P$$, then the complex will be tetrahedral.\n\nThis is analogous to deciding whether an octahedral complex adopts a high- or low-spin configuration; where the crystal field splitting parameter $$Δ_o$$ $$ΔE$$ does above. Unfortunately, unlike $$Δ_o$$ in octahedral complexes, there is no simple graphical way to represent $$ΔE$$ on the diagram above since multiple orbitals are changed in energy between the two geometries.\n\nInterpreting the origin of metal-dependent stabilization energies can be tricky. However, we know experimentally that $$\\ce{Pd^{2+}}$$ has a larger splitting of the d-orbitals and hence a larger $$\\Delta E$$ than $$\\ce{Ni^{2+}}$$ (moreover $$P$$ is also smaller).\n\nPractically all 4d and 5d d8 $$\\ce{ML4}$$ complexes adopt a square planar geometry, irrespective if the ligands are strong-field ligand or not. Other examples of such square planar complexes are $$\\ce{[PtCl4]^{2−}}$$ and $$\\ce{[AuCl4]^{-}}$$.\n\n## Summary\n\n• In tetrahedral molecular geometry, a central atom is located at the center of four substituents, which form the corners of a tetrahedron.\n• Tetrahedral geometry is common for complexes where the metal has d0 or d10electron configuration.\n• The CFT diagram for tetrahedral complexes has dx2−y2 and dzorbitals equally low in energy because they are between the ligand axis and experience little repulsion.\n• In square planar molecular geometry, a central atom is surrounded by constituent atoms, which form the corners of a square on the same plane.\n• The square planar geometry is prevalent for transition metal complexes with dconfiguration.\n• The CFT diagram for square planar complexes can be derived from octahedral complexes yet the dx2-y2 level is the most destabilized and is left unfilled."
] | [
null,
"https://chem.libretexts.org/@api/deki/files/346366/sp-01.svg",
null,
"https://chem.libretexts.org/@api/deki/files/370959/Chem507f09sqvstet2.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90844285,"math_prob":0.9973359,"size":6064,"snap":"2021-31-2021-39","text_gpt3_token_len":1540,"char_repetition_ratio":0.16716172,"word_repetition_ratio":0.073913045,"special_character_ratio":0.24093008,"punctuation_ratio":0.090064995,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99870294,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,5,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-20T02:28:47Z\",\"WARC-Record-ID\":\"<urn:uuid:f6e61d27-5f3b-45b4-a166-395c4637a527>\",\"Content-Length\":\"102814\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f211a2a9-2f97-4801-9400-9d96d3e72233>\",\"WARC-Concurrent-To\":\"<urn:uuid:3b97059a-adb6-4b88-9a74-784ad65e3581>\",\"WARC-IP-Address\":\"99.86.230.108\",\"WARC-Target-URI\":\"https://chem.libretexts.org/Bookshelves/Inorganic_Chemistry/Supplemental_Modules_and_Websites_(Inorganic_Chemistry)/Crystal_Field_Theory/Tetrahedral_vs._Square_Planar_Complexes\",\"WARC-Payload-Digest\":\"sha1:CMTXRKNHPMFS5RIQLCUST3CXJ3W4THO2\",\"WARC-Block-Digest\":\"sha1:TENH6QWRIBS2CLV4XTCQMPFWTVUU4OTB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780056974.30_warc_CC-MAIN-20210920010331-20210920040331-00541.warc.gz\"}"} |
https://math.stackexchange.com/questions/3546034/how-to-prove-frac-a-sqrta23b23c2-frac-b-sqrt3a2b23c2-frac | [
"# How to prove $\\frac a{\\sqrt{a^2+3b^2+3c^2}}+\\frac b{\\sqrt{3a^2+b^2+3c^2}}+\\frac{c}{\\sqrt{3a^2+3b^2+c^2}}\\le\\frac3{\\sqrt7}$ when $a,b,c>0$\n\nI want to prove that for $$a,b,c>0$$ we have\n\n$$\\sum_{cyc} \\frac a{\\sqrt{a^2+3b^2+3c^2}}= \\frac a{\\sqrt{a^2+3b^2+3c^2}}+\\frac{b}{\\sqrt{3a^2+b^2+3c^2}}+\\frac{c}{\\sqrt{3a^2+3b^2+c^2}}\\le\\frac3{\\sqrt7}.$$\n\nMy first attempt: By Cauchy-Schwarz we have $$\\left(\\sum_{cyc} \\frac a{\\sqrt{a^2+3b^2+3c^2}}\\right)^2\\le3\\sum_{cyc}\\frac{a^2}{a^2+3b^2+3c^2}$$ so we only need to prove that the right-hand side is always less than $$\\frac{9}{7}$$, but this is false. Failed\n\nSecond attempt: By Cauchy-Schwarz\n\n$$\\sum_{cyc} \\frac a{\\sqrt{a^2+3b^2+3c^2}}=\\sum_{cyc} \\frac 1{\\sqrt{1+3\\frac{b^2}{a^2}+3\\frac{c^2}{a^2}}}\\le\\sum_{cyc} \\frac{\\sqrt 7}{1+3\\frac{b}{a}+3\\frac{c}a}$$\n\nso it remains to prove that $$\\sum_{cyc} \\frac{a}{1+3b+3c}\\le\\frac37$$ but this is wrong for example for $$a=1,b=1,c=2$$. Failed\n\nThird attempt: Let $$S=3(a^2+b^2+c^2)$$. We need to prove $$\\sum_{cyc} \\frac{a}{\\sqrt{S-2a^2}}\\le \\frac37.$$ But $$x\\mapsto \\frac{x}{\\sqrt{S -2x^2}}$$ is convex so Jensen has the wrong direction...\n\n## 4 Answers\n\nJust an observation, the equality is achieved not only for $$a=b=c$$, but also for $$(a^2 \\colon b^2 \\colon c^2) = (8\\colon 1\\colon 1)$$\n\n$$\\bf{Added:}$$\n\nDefine $$x=\\frac{a^2}{a^2 + 3 b^2 + 3 c^2},\\ y=\\frac{b^2}{b^2 + 3 a^2 + 3 c^2},\\ z=\\frac{c^2}{c^2 + 3 a^2 + 3 b^2}$$\n\nOne checks (say by direct calculation) that $$28 x y z + 8(x y + x z + y z )+ x+y+z-1=0$$\n\nSo it is enough to show that the maximum of the function $$\\sqrt{x}+\\sqrt{y}+\\sqrt{z}$$ on the part of the above surface in the first octant is $$\\frac{3}{\\sqrt{7}}$$. The Lagrange multiplier system $$28 x y z + 8(x y + x z + y z )+ x+y+z-1=0\\\\ t - x( 28 y z + 8 (y+z) + 1)^2 =0\\\\ t - y( 28 x z + 8 (x+z) + 1)^2 =0\\\\ t - z( 28 x y + 8 (x+y) + 1)^2 =0$$\n\nis in fact not that hard to solve, if we use Groebner bases. First, by elimination we get the equation in $$t$$:\n\n$$72313663744 t^7 - 207058475232 t^6 - 212349914280 t^5 + 806857109604 t^4 + 125825565483 t^3 - 784526490225 t^2=0$$ which factor nicely as $$t^2 (1372 t - 2025) (343 t - 729) (56 t + 81) (2744 t^2 - 1944 t - 6561)=0$$\n\nNow one considers each of the possible positive values of $$t$$ and solves the system in $$x$$, $$y$$, $$z$$.\n\nCase 1. $$343 t - 729=0$$. We get $$x=y=z=\\frac{1}{7}$$\n\nCase 2. $$1372 t - 2025=0$$. We get the solution $$x=\\frac{4}{7}$$, $$y=z=\\frac{1}{28}$$ and the cyclic permutation of it.\n\nCase 3. $$t = \\frac{81(6 + 19\\sqrt{2})}{1372}$$\n\nWe get $$x=\\frac{-2 + 3 \\sqrt{2}}{7}$$, $$y=z = \\frac{-2 + 3 \\sqrt{2}}{28}$$ and the circular permutations.\n\nCase 4. $$t=0$$ gives negative solutions, so we discard it\n\nThe inequality now follows, in the cases 1, 2, the functions takes the maximum value $$\\frac{3}{\\sqrt{7}}$$, in case 3 the value is smaller.\n\nWe need to prove that: $$\\sum_{cyc}\\sqrt{\\frac{a}{a+3b+3c}}\\leq\\frac{3}{\\sqrt7},$$ where $$a$$, $$b$$ and $$c$$ are positive numbers.\n\nIndeed, by C-S $$\\left(\\sum_{cyc}\\sqrt{\\frac{a}{a+3b+3c}}\\right)^2\\leq\\sum_{cyc}\\frac{a}{(a+3b+3c)(17a+2b+2c)}\\sum_{cyc}(17a+2b+2c).$$ Thus, it's enough to prove that: $$\\sum_{cyc}\\frac{a}{(a+3b+3c)(17a+2b+2c)}\\leq\\frac{3}{49(a+b+c)}.$$ Now, let $$a+b+c=3u$$, $$ab+ac+bc=3v^2$$ and $$abc=w^3$$.\n\nThus, we need to prove that: $$\\sum_{cyc}\\frac{a}{(9u-2a)(6u+15a)}\\leq\\frac{1}{49u}$$ or $$49u\\sum_{cyc}a(9u-2b)(9u-2c)(2u+5b)(2u+5c)\\leq3\\prod_{cyc}((9u-2a)(2u+5a)).$$ We'll prove that the last inequality is true even for any reals $$a$$, $$b$$ and $$c$$.\n\nIndeed, since $$\\sum\\limits_{cyc}a(9u-2b)(9u-2c)(2u+5b)(2u+5c)$$ is a fifth degree polynomial,\n\nthe last inequality is equivalent to $$f(w^3)\\geq0,$$ where $$f(w^3)=-3000w^6+A(u,v^2)w^3+B(u,v^2).$$ But $$f$$ is a concave function.\n\nThus, $$f$$ gets a minimal value for an extreme value of $$w^3$$, which happens for equality case of two variables.\n\nSince the last inequality is an even degree, homogeneous and symmetrical, it's enough to assume $$b=c=1,$$ which gives $$\\frac{a}{(a+6)(17a+4)}+\\frac{2}{(3a+4)(2a+19)}\\leq\\frac{3}{49(a+2)}$$ or $$(a-1)^2(a-8)^2\\geq0$$ and we are done!\n\n• Can I ask: when you use Cauchy-Schwarz, do you look for $x,y,z$ such that: $$\\frac{7a}{(a+3b+3c)(xa+yb+zc)^2}=\\frac{7b}{(b+3a+3c)(xb+ya+zc)^2}=\\frac{7c}{(c+3a+3b)(xc+ya+zb)^2}$$ for both equality cases? – LHF Feb 23 '20 at 15:28\n• @Atticus Yes, of course. Because our vectors should be parallel. – Michael Rozenberg Feb 23 '20 at 15:33\n\nAlternative proof:\n\nLet $$x, y, z > 0$$ such that $$\\frac{7a^2}{a^2 + 3b^2 + 3c^2} = x^2, \\ \\frac{7b^2}{b^2 + 3c^2 + 3a^2} = y^2, \\ \\frac{7c^2}{c^2 + 3a^2 + 3b^2} = z^2$$. It is not hard to obtain $$F(x, y, z) = 4 x^2 y^2 z^2+8 x^2 y^2+8 x^2 z^2+8 y^2 z^2+7 x^2+7 y^2+7 z^2-49 = 0.$$\n\nIt suffices to prove that if $$x, y, z > 0$$ and $$F(x,y,z) = 0$$, then $$x+y+z \\le 3$$. It suffices to prove that if $$x, y, z > 0$$ and $$x + y + z > 3$$, then $$F(x, y, z) > 0$$. Note that $$F(\\alpha x, \\alpha y, \\alpha z) > F(x, y, z)$$ for any $$\\alpha > 1$$ and $$x, y, z > 0$$. Thus, it suffices to prove that if $$x, y, z > 0$$ and $$x+y+z = 3$$, then $$F(x, y, z) \\ge 0$$.\n\nWe use pqr method. Let $$p = x + y + z = 3$$, $$q = xy + yz + zx$$ and $$r = xyz$$. From $$p^2 \\ge 3q$$, we have $$q \\le 3$$. Let $$q = 3(1-u^2)$$ for $$0 \\le u\\le 1$$. We have \\begin{align} (x-y)^2(y-z)^2(z-x)^2 &= -4p^3r+p^2q^2+18pqr-4q^3-27r^2\\\\ & = 108u^6 - 27(3u^2+r-1)^2 \\end{align} which results in $$108u^6 - 27(3u^2+r-1)^2 \\ge 0$$ and hence $$r \\le (2u+1)(1-u)^2 \\le 3$$. Thus, we have \\begin{align} F(x, y, z) &= 7p^2-16pr+8q^2+4r^2-14q-49 \\\\ &= 4(6-r)^2+72u^4-102u^2-100\\\\ &\\ge 4(6 - (2u+1)(1-u)^2)^2 + 72u^4-102u^2-100\\\\ &= 2u^2(2u^2-4u+9)(2u-1)^2\\\\ &\\ge 0. \\end{align} We are done.\n\nWe need to prove that:\n\n$$\\sqrt{\\frac{a}{a+3b+3c}}+\\sqrt{\\frac{b}{b+3c+3a}}+\\sqrt{\\frac{c}{c+3a+3b}}\\leq\\frac{3}{\\sqrt7}$$\n\nLet's normalize with $$a+b+c=3$$. Then the inequality is equivalent with:\n\n$$\\sqrt{\\frac{a}{9-2a}}+\\sqrt{\\frac{b}{9-2b}}+\\sqrt{\\frac{c}{9-2c}}\\leq \\frac{3}{\\sqrt{2}}$$\n\nWithout loss of generality suppose that $$a\\le b\\le c$$. Then we have $$a+b\\leq 2$$ and we will prove:\n\n$$\\sqrt{\\frac{a}{9-2a}}+\\sqrt{\\frac{b}{9-2b}} \\leq \\sqrt{\\frac{2(a+b)}{9-a-b}}$$\n\nSquaring twice, this is equivalent with:\n\n$$\\frac{(a-b)^2[729+81(a+b)^2-486(a+b)-16ab(a+b)]}{(9-2a)^2(9-2b)^2(9-a-b)^2}\\geq 0$$\n\nWe have $$16ab(a+b)\\leq 16(a+b)$$ and\n\n$$729+81x^2-502x\\geq 0, \\text{ when }x \\leq 2$$\n\nIt remains to prove that:\n\n$$\\sqrt{\\frac{14(3-c)}{6+c}}+\\sqrt{\\frac{7c}{9-2c}}\\leq 3$$\n\nSquaring twice this is equivalent with:\n\n$$\\frac{81(c-1)^2 (12 - 5 c)^2}{(9 - 2 c)^2 (6 + c)^2}\\geq 0$$\n\nwhich gives the two equality cases."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5731804,"math_prob":1.0000099,"size":970,"snap":"2021-04-2021-17","text_gpt3_token_len":469,"char_repetition_ratio":0.20393375,"word_repetition_ratio":0.0,"special_character_ratio":0.44536084,"punctuation_ratio":0.06504065,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000098,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-15T23:41:31Z\",\"WARC-Record-ID\":\"<urn:uuid:efa03519-b4f6-4c34-b77b-a408ad77ef00>\",\"Content-Length\":\"200820\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4517a5b2-2583-469a-b113-291aafc15025>\",\"WARC-Concurrent-To\":\"<urn:uuid:cb26e3ff-4491-4e97-b60e-03070783291b>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/3546034/how-to-prove-frac-a-sqrta23b23c2-frac-b-sqrt3a2b23c2-frac\",\"WARC-Payload-Digest\":\"sha1:JHIGES2Z6JCEW4BNB6RLK5QFD34IX3V5\",\"WARC-Block-Digest\":\"sha1:DWX3YYDWO2HYMFHP4V76AMYA7QXRPQZV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038088264.43_warc_CC-MAIN-20210415222106-20210416012106-00176.warc.gz\"}"} |
https://www.elitenicheresearch.com/search/body-mass-index-calculator-for-adults | [
"Keyword Analysis & Research: body mass index calculator for adults\n\nKeyword Research: People who searched body mass index calculator for adults also searched\n\nHow do you figure out your body mass index?\n\nTo use the body mass index calculator to find your BMI, Enter your current weight. (kilograms or pounds) Fill in your height (feet and inches or just inches) Press ‘Calculate’. You now have your basic Body Mass Index calculation. Furthermore you will see how YOU compare to others in the general population that are the same age and sex as you.\n\nHow do you calculate mass body index?\n\nTo calculate your body mass index (BMI), start by measuring your height in meters and then squaring it. Then, divide your weight in kilograms by your height in meters squared to find your BMI. If you're using imperial measurements, start by measuring your height in inches and then squaring it.\n\nWhat is body mass index used to calculate?\n\nBody Mass Index (BMI) is a person’s weight in kilograms divided by the square of height in meters. A high BMI can be an indicator of high body fatness. BMI can be used to screen for weight categories that may lead to health problems but it is not diagnostic of the body fatness or health of an individual. Calculate Your BMI.\n\nHow to calculate body mass index properly?\n\nBody Mass Index Calculator - Moose and Doc Enter your current weight. (kilograms or pounds) Fill in your height (feet and inches or just inches) Press 'Calculate'."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7972041,"math_prob":0.9341664,"size":1769,"snap":"2022-05-2022-21","text_gpt3_token_len":475,"char_repetition_ratio":0.16147308,"word_repetition_ratio":0.124590166,"special_character_ratio":0.30977952,"punctuation_ratio":0.105405405,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9542505,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-27T19:42:01Z\",\"WARC-Record-ID\":\"<urn:uuid:2dd3ffd5-fd0a-42c8-8395-25a6a2b37914>\",\"Content-Length\":\"111424\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9717eb95-faf6-413c-9b22-60aed8369bf4>\",\"WARC-Concurrent-To\":\"<urn:uuid:4e33c8cd-91e8-404a-8d8c-5e21f9ffccfa>\",\"WARC-IP-Address\":\"172.67.180.160\",\"WARC-Target-URI\":\"https://www.elitenicheresearch.com/search/body-mass-index-calculator-for-adults\",\"WARC-Payload-Digest\":\"sha1:ND3SLBKNOH2TSGTNU3UA7EPPD3EJ4C4Q\",\"WARC-Block-Digest\":\"sha1:NRXZWTBF3YY4CUHBFUXS6CBI7UQLYORK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320305288.57_warc_CC-MAIN-20220127193303-20220127223303-00256.warc.gz\"}"} |
https://algebra-net.com/intermediate-algebra-class-notes.html | [
"Try the Free Math Solver or Scroll down to Resources!\n\n Depdendent Variable\n\n Number of equations to solve: 23456789\n Equ. #1:\n Equ. #2:\n\n Equ. #3:\n\n Equ. #4:\n\n Equ. #5:\n\n Equ. #6:\n\n Equ. #7:\n\n Equ. #8:\n\n Equ. #9:\n\n Solve for:\n\n Dependent Variable\n\n Number of inequalities to solve: 23456789\n Ineq. #1:\n Ineq. #2:\n\n Ineq. #3:\n\n Ineq. #4:\n\n Ineq. #5:\n\n Ineq. #6:\n\n Ineq. #7:\n\n Ineq. #8:\n\n Ineq. #9:\n\n Solve for:\n\n Please use this form if you would like to have this math solver on your website, free of charge. Name: Email: Your Website: Msg:\n\n# Intermediate Algebra Class Notes\n\nWhat you need to do this week (after attending the first class):\n\nA. Look over Class Notes for 01/14/07 and 01/16/07 (online links found in the\nright-hand pane of the homepage).\n\nB. Read the following three (3) webpages (online links found in the left-hand\npane of the homepage):\n\n1. Course Syllabus\n2. Course Schedule\n3. Course Info & Policies (covered by Quiz #01* on Wed., Jan.23rd)\n\n* This first quiz consists of ten multiple-choice and True-False questions. All\nsubsequent quizzes will cover math problems selectively picked from the most\nrecent HomeWork exercises, and will be given without any prior notice.\n\nI. Sets -\n\nA. Symbols:",
null,
"B. Number Sets (p.8) - See Figure 1.2\n1. N = {1, 2, 3, ...}\n2. W = {0, 1, 2, 3, ...}\n3.",
null,
"= {..., -3, -2, -1, 0, 1, 2, 3, ...}\nN, W &",
null,
"are all in “roster” notation",
null,
"= {x | x is a terminating or a repeating decimal}\n5. J = {x | x is a non-terminating, non-repeating decimal}\n6.",
null,
"= {x | x is a decimal}",
null,
"Q, J &",
null,
"are all in “set-builder” notation\n\nII. Examples (pp.10-12): Exercises #34,68,14,80\n\npp.10-12 / Exercises #1-97 (every other odd)\n\nI. Absolute Value (p.15):\nl x l = distance from zero (on a number line)\n\nII. Opposites:\n\nA. - (-a) = a\nB. a – (-b) = a + b\n\nIII. Division involving Zero:\n\nA. 0 ÷ a = 0\ne.g., 0 ÷ 7 = 0 (since 0 = 7 × 0)\nB. a ÷ 0 is “undefined”\ne.g., 7 ÷ 0 = ? (requires 7 = 0 × ?)\nnote: no such number exists, i.e., undefined\n\nIV. Distributive Property (pp.21-22):\n\na(b ± c) = ab ± ac\n\nV. Examples (pp.24-25): Exercises #8,46,90,100,\n122"
] | [
null,
"https://algebra-net.com/articles_imgs/5880/interm7.jpg",
null,
"https://algebra-net.com/articles_imgs/5880/interm8.gif",
null,
"https://algebra-net.com/articles_imgs/5880/interm8.gif",
null,
"https://algebra-net.com/articles_imgs/5880/interm9.jpg",
null,
"https://algebra-net.com/articles_imgs/5880/interm10.gif",
null,
"https://algebra-net.com/articles_imgs/5880/interm11.gif",
null,
"https://algebra-net.com/articles_imgs/5880/interm10.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8106464,"math_prob":0.9653646,"size":1611,"snap":"2020-24-2020-29","text_gpt3_token_len":565,"char_repetition_ratio":0.077162415,"word_repetition_ratio":0.026143791,"special_character_ratio":0.40099317,"punctuation_ratio":0.24694377,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9847642,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,3,null,6,null,6,null,3,null,6,null,3,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-08T06:01:43Z\",\"WARC-Record-ID\":\"<urn:uuid:f346c40a-8bef-4842-9229-59fbf210df00>\",\"Content-Length\":\"81366\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f7bada0c-61b7-4b3d-86ae-6aa81d758723>\",\"WARC-Concurrent-To\":\"<urn:uuid:d01bf664-dc91-4812-8ce2-20de2af2ba11>\",\"WARC-IP-Address\":\"54.197.228.212\",\"WARC-Target-URI\":\"https://algebra-net.com/intermediate-algebra-class-notes.html\",\"WARC-Payload-Digest\":\"sha1:YXUQUBHP3ETUVMSCEIYEQLJAEACM34HV\",\"WARC-Block-Digest\":\"sha1:HUQOV3FKLP3V73W6SWUHMBJQLCKCPMT5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655896374.33_warc_CC-MAIN-20200708031342-20200708061342-00098.warc.gz\"}"} |
https://www.betadvisor.com/en/freetipsters/baseball.html | [
"",
null,
"Just trust a free tipster and start to dream. Free\n\n111 Free Tipster(s) Found\n\nOrder by\n\n1st of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n2nd of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n3rd of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n4th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n5th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n6th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n7th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n8th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n9th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n10th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n11th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n12th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n13th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n14th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n15th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n16th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n17th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n18th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n19th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n20th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n21st of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n22nd of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n23rd of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n24th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n25th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n26th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n27th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n28th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n29th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n30th of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n31st of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit\n\n32nd of 111\n\nCalculate how much you can earn\n\n0,00\n\npotential profit"
] | [
null,
"https://www.facebook.com/tr",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8346199,"math_prob":0.9986145,"size":4221,"snap":"2021-31-2021-39","text_gpt3_token_len":1345,"char_repetition_ratio":0.19136827,"word_repetition_ratio":0.63793105,"special_character_ratio":0.36271027,"punctuation_ratio":0.10289017,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99984884,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-24T02:43:10Z\",\"WARC-Record-ID\":\"<urn:uuid:eafee807-6856-478b-8c1b-97d06c494c48>\",\"Content-Length\":\"592635\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:90f5a63b-441e-4983-9b31-67919c499a20>\",\"WARC-Concurrent-To\":\"<urn:uuid:6874af0f-4822-43c0-9fcc-f739a9df9a42>\",\"WARC-IP-Address\":\"54.36.250.129\",\"WARC-Target-URI\":\"https://www.betadvisor.com/en/freetipsters/baseball.html\",\"WARC-Payload-Digest\":\"sha1:L3NIQD2HSIOKBIA5M62M7DU2JMYIFROB\",\"WARC-Block-Digest\":\"sha1:2HQITNXEK4JB6HUCMXPM7Z2ZR3GBJLKB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057496.18_warc_CC-MAIN-20210924020020-20210924050020-00704.warc.gz\"}"} |
https://hackage.haskell.org/package/data-category-0.3.1.1/docs/src/Data-Category-Discrete.html | [
"```{-# LANGUAGE TypeFamilies, TypeOperators, GADTs, RankNTypes, ScopedTypeVariables, FlexibleContexts, FlexibleInstances, UndecidableInstances #-}\n-----------------------------------------------------------------------------\n-- |\n-- Module : Data.Category.Discrete\n-- Copyright : (c) Sjoerd Visscher 2010\n--\n-- Maintainer : sjoerd@w3future.com\n-- Stability : experimental\n-- Portability : non-portable\n--\n-- Discrete n, the category with n objects, and as the only arrows their identities.\n-----------------------------------------------------------------------------\nmodule Data.Category.Discrete (\n\n-- * Discrete Categories\nDiscrete(..)\n, Z, S\n, Void\n, Unit\n, Pair\n\n-- * Functors\n, Next(..)\n, DiscreteDiagram(..)\n\n-- * Natural Transformations\n, voidNat\n\n) where\n\nimport Prelude hiding ((.), id, Functor, product)\n\nimport Data.Category\nimport Data.Category.Functor\nimport Data.Category.NaturalTransformation\n\ndata Z\ndata S n\n\n-- | The arrows in Discrete n, a finite set of identity arrows.\ndata Discrete :: * -> * -> * -> * where\nZ :: Discrete (S n) Z Z\nS :: Discrete n a a -> Discrete (S n) (S a) (S a)\n\nmagicZ :: Discrete Z a b -> x\nmagicZ x = x `seq` error \"we never get this far\"\n\n-- | @Discrete Z@ is the discrete category with no objects.\ninstance Category (Discrete Z) where\n\nsrc = magicZ\ntgt = magicZ\n\na . b = magicZ (a `seq` b)\n\n-- | @Discrete (S n)@ is the discrete category with one object more than @Discrete n@.\ninstance Category (Discrete n) => Category (Discrete (S n)) where\n\nsrc Z = Z\nsrc (S a) = S \\$ src a\n\ntgt Z = Z\ntgt (S a) = S \\$ tgt a\n\nZ . Z = Z\nS a . S b = S (a . b)\n_ . _ = error \"Other combinations should not type-check.\"\n\n-- | @Void@ is the empty category.\ntype Void = Discrete Z\n-- | @Unit@ is the discrete category with one object.\ntype Unit = Discrete (S Z)\n-- | @Pair@ is the discrete category with two objects.\ntype Pair = Discrete (S (S Z))\n\ntype family PredDiscrete (c :: * -> * -> *) :: * -> * -> *\ntype instance PredDiscrete (Discrete (S n)) = Discrete n\n\ndata Next :: * -> * where\nNext :: (Functor f, Dom f ~ Discrete (S n)) => f -> Next f\n\ntype instance Dom (Next f) = PredDiscrete (Dom f)\ntype instance Cod (Next f) = Cod f\ntype instance Next f :% a = f :% S a\n\ninstance (Functor f, Category (PredDiscrete (Dom f))) => Functor (Next f) where\nNext f % Z = f % S Z\nNext f % (S a) = f % S (S a)\n\ninfixr 7 :::\n\n-- | The functor from @Discrete n@ to @(~>)@, a diagram of @n@ objects in @(~>)@.\ndata DiscreteDiagram :: (* -> * -> *) -> * -> * -> * where\nNil :: DiscreteDiagram (~>) Z ()\n(:::) :: Obj (~>) x -> DiscreteDiagram (~>) n xs -> DiscreteDiagram (~>) (S n) (x, xs)\n\ntype instance Dom (DiscreteDiagram (~>) n xs) = Discrete n\ntype instance Cod (DiscreteDiagram (~>) n xs) = (~>)\ntype instance DiscreteDiagram (~>) (S n) (x, xs) :% Z = x\ntype instance DiscreteDiagram (~>) (S n) (x, xs) :% (S a) = DiscreteDiagram (~>) n xs :% a\n\ninstance (Category (~>))\n=> Functor (DiscreteDiagram (~>) Z ()) where\nNil % f = magicZ f\n\ninstance (Category (~>), Category (Discrete n), Functor (DiscreteDiagram (~>) n xs))\n=> Functor (DiscreteDiagram (~>) (S n) (x, xs)) where\n(x ::: _) % Z = x\n(_ ::: xs) % S n = xs % n\n\nvoidNat :: (Functor f, Functor g, Category d, Dom f ~ Void, Dom g ~ Void, Cod f ~ d, Cod g ~ d)\n=> f -> g -> Nat Void d f g\nvoidNat f g = Nat f g magicZ\n```"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5471581,"math_prob":0.96769595,"size":2197,"snap":"2021-43-2021-49","text_gpt3_token_len":738,"char_repetition_ratio":0.23073415,"word_repetition_ratio":0.056962024,"special_character_ratio":0.39736003,"punctuation_ratio":0.19907407,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99986076,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-28T06:13:55Z\",\"WARC-Record-ID\":\"<urn:uuid:a4b9e686-a3e6-440f-aa6b-29369e863c3a>\",\"Content-Length\":\"28272\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:199ee09b-a480-46d9-b5ad-e7c8f23c8eaa>\",\"WARC-Concurrent-To\":\"<urn:uuid:0e70b5ea-e876-4592-95f5-bb197b0cd93a>\",\"WARC-IP-Address\":\"199.232.64.68\",\"WARC-Target-URI\":\"https://hackage.haskell.org/package/data-category-0.3.1.1/docs/src/Data-Category-Discrete.html\",\"WARC-Payload-Digest\":\"sha1:6NI45VZ5BD4E5344VO526DW43O7JWNT3\",\"WARC-Block-Digest\":\"sha1:4ESHIF7AZREJKOGHDBRKUIAZ6HGFJUM2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323588257.34_warc_CC-MAIN-20211028034828-20211028064828-00195.warc.gz\"}"} |
https://lbs-to-kg.appspot.com/12.9-lbs-to-kg.html | [
"Pounds To Kg\n\n# 12.9 lbs to kg12.9 Pounds to Kilograms\n\nlbs\n=\nkg\n\n## How to convert 12.9 pounds to kilograms?\n\n 12.9 lbs * 0.45359237 kg = 5.851341573 kg 1 lbs\nA common question is How many pound in 12.9 kilogram? And the answer is 28.4396318218 lbs in 12.9 kg. Likewise the question how many kilogram in 12.9 pound has the answer of 5.851341573 kg in 12.9 lbs.\n\n## How much are 12.9 pounds in kilograms?\n\n12.9 pounds equal 5.851341573 kilograms (12.9lbs = 5.851341573kg). Converting 12.9 lb to kg is easy. Simply use our calculator above, or apply the formula to change the length 12.9 lbs to kg.\n\n## Convert 12.9 lbs to common mass\n\nUnitMass\nMicrogram5851341573.0 µg\nMilligram5851341.573 mg\nGram5851.341573 g\nOunce206.4 oz\nPound12.9 lbs\nKilogram5.851341573 kg\nStone0.9214285714 st\nUS ton0.00645 ton\nTonne0.0058513416 t\nImperial ton0.0057589286 Long tons\n\n## What is 12.9 pounds in kg?\n\nTo convert 12.9 lbs to kg multiply the mass in pounds by 0.45359237. The 12.9 lbs in kg formula is [kg] = 12.9 * 0.45359237. Thus, for 12.9 pounds in kilogram we get 5.851341573 kg.\n\n## 12.9 Pound Conversion Table",
null,
"## Alternative spelling\n\n12.9 lb to Kilogram, 12.9 lb in Kilogram, 12.9 Pounds to kg, 12.9 Pounds in kg, 12.9 Pound to Kilogram, 12.9 Pound in Kilogram, 12.9 Pounds to Kilograms, 12.9 Pounds in Kilograms, 12.9 Pounds to Kilogram, 12.9 Pounds in Kilogram, 12.9 Pound to kg, 12.9 Pound in kg, 12.9 lbs to kg, 12.9 lbs in kg, 12.9 lb to Kilograms, 12.9 lb in Kilograms, 12.9 lb to kg, 12.9 lb in kg"
] | [
null,
"https://lbs-to-kg.appspot.com/image/12.9.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.83897954,"math_prob":0.93610436,"size":1126,"snap":"2019-51-2020-05","text_gpt3_token_len":412,"char_repetition_ratio":0.26024956,"word_repetition_ratio":0.009803922,"special_character_ratio":0.43161634,"punctuation_ratio":0.23125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9654094,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-07T11:43:55Z\",\"WARC-Record-ID\":\"<urn:uuid:aacc6c72-c34b-4ab6-8f3d-11a9e465543e>\",\"Content-Length\":\"28391\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ec36027d-c591-4583-8424-7d4b0ff920f7>\",\"WARC-Concurrent-To\":\"<urn:uuid:626e56e4-6bef-4376-bc42-8efbbd91d1c6>\",\"WARC-IP-Address\":\"172.217.13.84\",\"WARC-Target-URI\":\"https://lbs-to-kg.appspot.com/12.9-lbs-to-kg.html\",\"WARC-Payload-Digest\":\"sha1:ANKWO3TDCO3RWPRVPVJGM2WWZTZMOFC5\",\"WARC-Block-Digest\":\"sha1:TEEZLZ7SEKUYLC34BVIEK3WHMWT7I7K3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540499389.15_warc_CC-MAIN-20191207105754-20191207133754-00451.warc.gz\"}"} |
https://calendariu.com/images/math-worksheet-for-kindergarten-shapes.html | [
"# Images/math Worksheet For Kindergarten Shapes\n\nIf you are looking for Images/math Worksheet For Kindergarten Shapes you've come to the right place. We have 17 images about Images/math Worksheet For Kindergarten Shapes including images, pictures, photos, wallpapers, and more. In these page, we also have variety of images available. Such as png, jpg, animated gifs, pic art, logo, black and white, transparent, etc.",
null,
"",
null,
"900 x 1273 · jpeg\n\nfun math worksheets students images math",
null,
"235 x 183 · jpeg\n\nteaching math shapes images math classroom",
null,
"236 x 177 · jpeg\n\ngeometry images math geometry kindergarten",
null,
"1172 x 1308 · jpeg",
null,
"236 x 314 · jpeg\n\narea perimeter word problems freebie images",
null,
"1700 x 2200 · jpeg\n\nst grade geometry worksheets students geometry",
null,
"1275 x 1650 · png\n\npng pixels images math",
null,
"224 x 320 · jpeg\n\nyear puzzles images math facts math kids",
null,
"3300 x 2550 · png\n\nmath fidget spinners printable worksheet practice",
null,
"236 x 177 · jpeg\n\nmath patterns images math patterns math",
null,
"1000 x 1294 · gif\n\ngeometry piece rectangle clipart math clipground",
null,
"236 x 305 · jpeg\n\nmath worksheets images math worksheets math",
null,
"370 x 479 · jpeg\n\nmultiplication math riddle",
null,
"236 x 305 · jpeg\n\nmath shapes images math shapes math",
null,
"236 x 353 · jpeg\n\npattern topic early years images math",
null,
"735 x 456 · jpeg\n\npin bekesi edina montessori images math",
null,
"687 x 884 · jpeg"
] | [
null,
"https://tse1.mm.bing.net/th",
null,
"https://tse2.mm.bing.net/th",
null,
"https://tse4.mm.bing.net/th",
null,
"https://tse4.mm.bing.net/th",
null,
"https://tse1.mm.bing.net/th",
null,
"https://tse1.mm.bing.net/th",
null,
"https://tse2.mm.bing.net/th",
null,
"https://tse4.mm.bing.net/th",
null,
"https://tse4.mm.bing.net/th",
null,
"https://tse4.mm.bing.net/th",
null,
"https://tse2.mm.bing.net/th",
null,
"https://tse3.mm.bing.net/th",
null,
"https://tse1.mm.bing.net/th",
null,
"https://tse1.mm.bing.net/th",
null,
"https://tse2.mm.bing.net/th",
null,
"https://tse3.mm.bing.net/th",
null,
"https://tse1.mm.bing.net/th",
null,
"https://tse3.mm.bing.net/th",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.720364,"math_prob":0.88615584,"size":1464,"snap":"2020-45-2020-50","text_gpt3_token_len":299,"char_repetition_ratio":0.19931507,"word_repetition_ratio":0.019323671,"special_character_ratio":0.17486338,"punctuation_ratio":0.10245901,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9601888,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-25T01:39:40Z\",\"WARC-Record-ID\":\"<urn:uuid:3f8121c1-b17c-47c7-b7fd-2e313c2a9ef3>\",\"Content-Length\":\"37477\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4a70ef6d-9b72-471d-a273-533d6b26ee3e>\",\"WARC-Concurrent-To\":\"<urn:uuid:528397d8-35bf-4815-a430-739503f934d6>\",\"WARC-IP-Address\":\"198.252.98.90\",\"WARC-Target-URI\":\"https://calendariu.com/images/math-worksheet-for-kindergarten-shapes.html\",\"WARC-Payload-Digest\":\"sha1:FIOPEVHKBG2Q6GKTMJJWWGIQZOCFUBFE\",\"WARC-Block-Digest\":\"sha1:OIWDV5D35GJRZ7HI5OWGF3QFPVAUTGP7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141180636.17_warc_CC-MAIN-20201125012933-20201125042933-00131.warc.gz\"}"} |
https://id.scribd.com/document/364957094/cpp-functions-pdf | [
"Anda di halaman 1dari 12\n\n# Q.\n\n## 1 Let f be a real valued function such that\n\n2002\nf (x) + 2 f = 3x\nx\nfor all x > 0. The value of f (2), is\n(A) 1000 (B) 2000 (C) 3000 (D) 4000\n\nQ.2 The number k is such that tan arc tan(2) arc tan(20k ) = k. The sum of all possible values of k is\n19 21 1\n(A) (B) (C) 0 (D)\n40 40 5\nx for 0 x 1\nLet f 1 x 1 for x 1 and f 2 x f 1 x for all x\nQ.3\n0 otherwise\nf3 x f 2 x for all x\nf4 x f 3 x for all x\nWhich of the following is necessarily true?\n(A) f 4 x f 1 x for all x (B) f 1 x f3 x for all x\n(C) f 2 x f 4 x for all x (D) f 1 x f3 x 0 for all x\n\n## Q.4 Domain of definition of the function f x log 10 3x 2 9 x 1\n\n1 cos 1 1 x is\n(A) [0, 1] (B) [1, 2] (C) (0, 2) (D) (0, 1)\n\n12 5\nQ.5 If Sin , cos , 0 2 . Consider the following statements.\n13 13\n1 5 1 12 12\nI. cos II. sin III. sin 1\n13 13 13\n1 12 12\nIV. tan V. tan 1\n5 5\nthen which of the folloing statements are true ?\n(A) I, II and IV only (B) III and V only (C) I and III only (D) I, III and V only\n\nQ.6 Which one of the following depicts the graph of an odd function?\n\n(A) (B)\n\n(C) (D)\n\n2\n1 3\nQ.7 The sum tan 2 is equal to\nn 1 n n 1\n3\n(A) cot 1 2 (B) cot 1 3 (C) (D) tan 1 2\n4 2 2\n\n1 1 1\nQ.8 The value of tan tan 2A tan cot A tan 1 cot 3 A for 0 A / 4 is\n2\n(A) 4 tan 1 1 (B) 2 tan 1\n2 (C) 0 (D) None\n\n8 8 4 4\nQ.9 Given f x and g x then g(x) is\n1 x 1 x f sin x f cos x\n(A) periodic with period / 2 (B) periodic with period\n(C) periodic with period 2 (D) aperiodic\n\n## Q.10 sin 1 cos sin 1 x and cos 1 sin cos 1 x , then :\n\n(A) tan cot (B) tan cot (C) tan tan (D) tan tan\n\nsin x cos x\nQ.11 The period of the function f x sin x cos x\n(A) /2 (B) /4 (C) (D) 2\n\n1\n1 1 a 1 1 a\nQ.12 The value of tan sin tan sin , where (0 < a < b), is\n4 2 b 4 2 b\nb a b2 a 2 b2 a 2\n(A) (B) (C) (D)\n2a 2b 2b 2a\n\nQ.13 The sides of a triangle are 9, 12, 15. The area of the triangle formed by its income, centroid and orthocentre, is\n(A) 2 (B) 3 (C) 3/2 (D) 5\n\n1\nQ.14 f x sin 23 x cos 22 x and g x tan 1 x , then the number of values of x in interval\n1\n2\n10 , 20 satisfying the equation f x sgn g x , is\n(A) 6 (B) 10 (C) 15 (D) 20\n\n## Q.15 Number of solutions of the equation 2 cot 1 2 cos 1 3 / 5 cos ec 1x is\n\n(A) 0 (B) 1 (C) 2 (D) more than 2\n\nx l nx\nQ.16 f x and g x . Then identify the CORRECT statement\nl nx x\n1 1\n(A) g x and f(x) are identical functions (B) and g(x) are identical functions\nf x\n1\n(C) f x . g x 1 x 0 (D) f x . g x 1 x 0\n\n3\n1 x 1 x\nQ.17 The number of solutions of the equation tan tanh tan 1 x is\n3 2\n(A) 3 (B) 2 (C) 1 (D) 0\nQ.18 Let f (x) = sin2x + cos4x + 2 and g (x) = cos (cos x) + cos (sin x). Also let period of f (x) and g (x) be\nT1 and T2 respectively then\n(A) T1 = 2T2 (B) 2T1 = T2 (C) T1 = T2 (D) T1 = 4T2\n1 2x 2 1\nQ.19 Which of the following is the solution set of the equation 2 cos1(x) = cot ?\n2x 1 x 2\n(A) (0, 1) (B) (1, 1) {0} (C) (1, 0) (D) [1, 1]\nx x\nQ.20 Let f x e e sgn x and g x e e sgn x , x R where { x }and [ ] denotes the fractional part and\nintegral part functions respectively. Also h (x) l n f(x) l n g(x) then for all real x, h (x) is\n(A) an odd function (B) an even function\n(C) neither an odd nor an even function (D) both odd as well as even function\n\n## Q.21 Find the range of the function f x cot 1 x sec 1\n\ncos es 1 x.\n3 3 5 3\n(A) , (B) , ! ,\n2 2 2 4 4 2\n3 3\n(C) , ! , (D) , ! ,\n2 2 2 2\nQ.22 Which of the following function is surjective but not injective\n(A) f : R \" R f x x 4 2 x 3 x 2 1 (B) f : R \" R f x x3 x 1\n(C) f : R \" R f x 1 x2 (D) f : R \" R f x x 3 2x 2 x 1\n\n1 1 7 2\nQ.23 cos cos sin is equal to\n2 5 5\n23 23 3 17\n(A) (B) (C) (D)\n20 20 20 20\n2\nQ.24 Let f x ;g x cos x and h x x 3 then tha range of the composite function fogoh, is\nx 1\n(A) R (B) R {0} (C) 1, (D) R {1}\n\n1 x2\nQ.25 There exists a positive real number x satisfying cos tan x 1\nx. The value of cos 2 is\n2 4\n(A) (B) (C) (D)\n10 5 5 5\nmin( x , y )\nQ.26 If f ( x , y) max ( x , y) and g ( x , y) max( x , y) min( x , y), then\n3\nf g 1, , g ( 4, 1.75) equals\n2\n(A) - 0.5 (B) 0.5 (C) 1 (D) 1.5\n1 1 1 1 1 2\nQ.27 The number of solutions of the equation tan tan tan is\n2x 1 4x 1 x2\n(A) 0 (B) 1 (C) 2 (D) 3\n\n4\nQ.28 If the solution set for f (x) < 3 is (0, ) and the solution set for f (x) > 2 is ( , 5), then the true solution\nset for f ( x ) 2 # f (x) + 6, is\n(A) ( , + ) (B) ( , 0] (C) [0, 5] (D) ( , 0] ! [5, )\n1\nQ.29 The range of the value of p for which the equation sin cos cos(tan 1 x ) p has a solution is :\n\n1 1 1\n(A) , (B) 0, 1 (C) ,1 (D) 1, 1\n2 2 2\n\n## 1, x # 1 . Then the set S\n\n2\nQ.30 Let f x x 1 x : f ( x ) f 1 ( x ) is\n\n3 i 3 3 i 3\n(A) 0, 1, 2\n,\n2 (B) 0,1, 1\n\n## (C) 0, 1 (D) empty\n\nIf x 1 2 \\$x y 3\n2 2\nQ.31 y 2 is a parabola, then \\$\n1 3 1\n(A) 1 (B) (C) (D)\n2 2 4\nQ.32 2 cot cot 1 (3) cot 1 (7) cot 1 (13) cot 1 (21) has the value equal to\n(A) 1 (B) 2 (C) 3 (D) 4\n\n## Q.33 The graph of the function y = g (x) is shown.\n\n1\nThe number of solutions of the equation g ( x ) 1 , is\n2\n(A) 4 (B) 5\n(C) 6 (D) 8\nx rx\nQ.34 Let f x and let g x . Let S be the set off all real numbers r such that\n1 x 1 x\nf g(x) g f (x) for infinitely many real number x. The number of elements in set S is\n(A) 1 (B) (C) 3 (D) 5\n1\nQ.35 Number of natural solution(s) of the equation sin sin x cos 1 cos x in 0,5 is\n(A) 2 (B) 3 (C) 4 (D) infinite\n1 1\nQ.36 Range of the function f ( x ) tan [x ] [ x ] 2 x is\nx2\nwhere [*] is the greatest integer function.\n1 1 1 1\n(A) , (B) ! 2, (C) ,2 (D) ,2\n4 4 4 4\nQ.37 The set of values of ox, satisfying the equation tan 2 sin 1 x 1 is\n\n2 2\n(A) [ 1,1] (B) ,\n2 2\n\n2 2 2 2\n(C) 1,1 , (D) [ 1,1] ,\n2 2 2 2\n5\n0 if x is irrational 0 if x is irrational\nQ.38 Let f ( x ) and g ( x )\nx if x is rational x if x is rational\nThen the function (f - g) x is\n(A) odd (B) even (C) neither odd nor even (D) odd as well as even\n\n1 2 1 1 1 x2\nQ.39 The solution set of the equation sin 1 x cos x cot sin 1 x\nx\n\n## Q.40 The period of the function cos 2 x cos 2 x is :\n\n(A) (B) 2 (C) 2 (D) none of these\n1\nQ.41 The value of the angle tan tan 650 2 tan 40 0 in degrees is equal to\n(A) 20 0 (B) 20 0 (C) 250 (D) 40 0\n{x}\nQ.42 Range of the function f ( x ) where {x} denotes the fractional part function is\n1 {x}\n\n1 1 1\n(A) 0,1 (B) 0, (C) 0, (D) 0,\n2 2 2\nQ.43 Consider the function g (x) defined as\n2008 2007\ng(x ) x ( 2 1)\n1 ( x 1) ( x 2 1) ( x 4 1)....... x 2 1 1.\nthe value of g (2) equals\n(A) 1 (B) 2 2008 1 (C) 2 2008 (D) 2\nQ.44 The range of the function, f (x) (1 sec -1x) (1 cos 1x) is\n\n## (A) , (B) , 0 ! 4, (C) 1, (1 )2 (D) [0, (1 )2 ]\n\nQ.45 Which of the following is true for a real valued function y = f (x), defined on [-a, a]?\n(A) f (x) can be expressed as a sum or a difference of two even function.\n(B) f (x) can be expressed as a sum or a difference of two odd function.\n(C) f (x) can be expressed as a sum or a difference of an odd and an even function.\n(D) f (x) can never be expressed as a sum or a difference of an odd and an even function.\nQ.46 Which of the following represents an odd function?\n\n(1 e x ) 2\n(A) f ( x ) (B) g ( x ) sec 1 (sec x )\nex\n(C) h ( x ) cos (cos 1 x ) (D) k ( x ) cot 1 (cot x )\n\n1 1 x 1 x 3\nQ.47 Let f be a real valued function defined by f x sin cos . Then domain of f(x) is\n3 5\ngiven by :\n(A) 4, 4 (B) 0, 4 (C) 3, 3 (D) 5, 5\n\n6\nQ.48 Given the graphs of the two functions, y = f(x) & y = g(x). In the adjacent\nfigure from point A on the graph of the function y = f(x) corresponding\nto the given value of the independent variable (say x0), a straight line is\ndrawn parallel to the X-axis to intersect the bisector of the first and the third y=g(x)\nquadrants at point B . From the point B a straight line parallel to the Y-axis\nis drawn to intersect the graph of the function y = g(x) at C. Again a straight\ny-f(x)\nline is drawn from the point C parallel to the X-axis, to intersect the line NN%\nat D . If the straight line NN% is parallel to Y-axis, then the co-ordinates\nof the point D are\n(A) f(x0), g(f(x0)) (B) x0, g(x0) (C) x0, g(f(x0)) (D) f(x0), f(g (x0))\n1\nQ.49 If x and x 1 y 1 2 the the radian measue of cot 1`\nx cot 1 y is\n2\n3\n(A) (B) (C) (D)\n2 3 4 4\nQ.50 Given f (x) is a polynomial function of x, satisfying f(x) . f(y) = f(x) + f(y) + f(xy) - 2 and that f (2) = 5.\nthen f (3) is equal to\n(A) 10 (B) 24 (C) 15 (D) none\nQ.51 Let cos 1 x cos 1 2 x cos 1 3x . If x satisfies the cubic ax 3 bx 2 ` cs 1 0, then (a + b + c)\nhas the value equal to\n(A) 24 (B) 25 (C) 26 (D) 27\n\nxx if x 1\nQ.52 Let f ( x ) [1 x ] [1 x ] if 1 x 1\nxx if x #1\n\n## where [x] denotes the greatest integer function then F(x) is\n\n(A) even (B) odd\n(C) neither odd nor even (D) even as well as odd\narc cot x\nQ.53 The domain of the function f x , where [x] denotes the greatest integer not greater than\nx 2 [x 2 ]\nx, is :\n(A) R (B) R - {0}\n\n## (C) R & n : n 1 ! {0} (D) R {n : n 1}\n\n1 2 1 1 1\nQ.54 If tan tan , then which one of the following can not be equal to\n2 1 2\n\n1 1 1 1\n(A) 2 tan (B) cot 2 cot 3\n2\n\n1 1 1\n(C) tan 1 2 tan 1 3 (D) tan 3 sin\n5\n\n7\nQ.55 The range of the function, f ( x ) cot 1 log 0.5 x 4 2 x 2 3 is :\n\n3 3 3\n(A) 0, (B) 0, (C) , (D) ,\n4 4 2 4\n\n1 1 1 1\nQ.56 The value of cos cos 6 2 cos 6 2 equals\n4 4\n\n1 3 1\n(A) (B) (C) (D) 0\n2 2 2\nQ.57 If f x ay, x- ay axy then f x, y is equal to :\n\nx2 y2 x2 y2\n(A) (B) (C) 4 xy (D) none\n4 4\nQ.58 If f (x) px q and f f f (x) 8x 21, where p and q are real number, then p + q equals\n(A) 3 (B) 5 (C) 7 (D) 11\nQ.59 The value of x satisfying the equation sin(tan 1 x ) cos cot 1 ( x 1) is\n1 1\n(A) (B) (C) 2 1 (D) no finite value\n2 2\nQ.60 If f ( x ) 2 tan 3x 5 1 cos 6x ; g ( x ) is a function having the same period as that of f(x), then which\nof the following can be g(x).\n(A) (sec 2 3 x cosec 2 3 x) tan 2 3 x (B) 2 sin 3x 3 cos 3x\n\n## (C) 2 1 cos 2 3 x cosec 3 x (D) 3 cosec 3 x 2 tan 3 x\n\nQ.61 Let f (x) max . sin t : 0 t x\ng( x ) min . sin t : 0 t x\nand h ( x ) f (x ) g ( x )\nwhere [ ] denotes greatest integer function, then the range of h(x) is\n(A) {0, 1} (B) {1, 2} (C) {0, 1, 2} (D) {-3, -2, -1, 0, 1, 2, 3}\n\n[COMPREHENSION TYPE]\nParagraph for question nos. 62 to 64\nConsider a function y = f (x) satisfying the equation tan-1y = tan-1x + C where y = 1 when x = 0.\n\n## Q.62 The domain of the explicit form of the function is\n\n(A) ,1 (B) R { 1,1} (C) ( 1,1) (D) 0,\nQ.63 Range of the function is\n(A) R { 1} (B) 1, (C) 1, (D) ,1\nQ.64 For the function y = f (x) which one of the following does not hold good ?\n(A) f (x) is injective (B) f (x) is neither odd nor even\nx 1\n(C) f (x) is aperiodic (D) explicit form of f (x) is\nx 1\n8\nParagraph for question nos. 65 to 68\nLet f ( x ) x 2x 1 2\nx R. Let f : , a \" b, , where a is the largest real number for which\nf (x) is bijective.\nQ.65 The value of (a + b) is equal to\n(A) - 2 (B) - 1 (C) 0 (D) 1\nQ.66 Let f : R \" R , g ( x ) f (x ) 3x 1, then the least value of function y g x is\n(A) - 9/4 (B) - 5/4 (C) - 2 (D) - 1\nQ.67 Let f : a , \" b, , then f ( x ) is given by\n1\n\n## (A) 1 x 2 (B) 1 x 3 (C) 1 x 2 (D) 1 x 3\n\nQ.68 Let f : R \" R , then range of values of k for which equation f x k has 4 distinct real roots is\n(A) (- 2, - 1) (B) (- 2, 0) (C) (- 1, 0) (D) (0, 1)\n[MULTIPLE OBJECTIVE TYPE]\nQ.69 Which of the following function (s) is/are Transcendental ?\n2 sin 3x\n(A) f ( x ) 5 sin x (B) f ( x ) 2\nx 2x 1\n(C) f ( x ) x2 2x 1 (D) f ( x ) x 2 3 . 2x\nQ.70 sin 1 sin 3 sin 1 sin 4 sin 1 sin 5 when simplified reduces to\n(A) an irrational number (B) a rational number\n(C) an even prime (D) a negative integer\nQ.71 The functions which are aperiodic are :\n(A) y = [x + 1] (B) y = sin x 2 (C) y = sin2 x (D) y = sin-1 x\nwhere [x] denotes greatest integer function\nQ.72 Which of the following pairs of functions are identical ?\n1\n(A) f ( x ) e n sec\nand g ( x ) sec 1 x (B) f x tan tan 1 x and g ( x ) cot cot1 x\n(C) f ( x ) sgn ( x ) and g ( x ) sgn(sgn( x )) (D) f ( x ) cot 2 x . cos 2 x and g ( x ) cot 2 x cos 2 x\nQ.73 Which of the functions defined below are one-one function(s) ?\n(A) f ( x ) x 1 , x # 1 (B) g ( x ) x 1 / x ( x 0)\n(C) h ( x ) x2 4 x 5, ( x 0) (D) f ( x ) e x , x # 0\n1 1 14\nQ.74 The value of cos 2 cos cos is :\n5\n7 2 3\n(A) cos (B) sin (C) cos (D) cos\n5 10 5 5\n1 1 1\nQ.75 If cos x cos y cos z , then\n2 2 2\n(A) x y z 2xyz 1\n(B) 2 sin x sin 1 y sin 1 z\n1\ncos 1 x cos 1 y cos 1 z\n(C) xy + yz + zx = x + y + z - 1\n1 1 1\n(D) x y z #6\nx y z\nQ.76 Which of the following functions are homogeneous ?\n(A) x sin y y sin x (B) x e y / x y e x / y (C) x 2 xy (D) arc sin xy\n\n9\n1\nQ.77 Let tan f (x) cos 1 x then which of the following do/does not hold good ?\n(A) Domain of f(x) is [-1, 1] (B) Range of f(x) is ( , )\n(C) f (x) is bounded (D) f(x) is odd\nQ.78 Suppose f (x) = ax + b and g (x) = bx + a, where a and b are positive integers. If f g (50) g f (50) 28\nthen the product (ab) can have the value equal to\n(A) 12 (B) 48 (C) 180 (D) 210\nQ.79 Which of the following function(s) have the same domain and range ?\n1\n(A) f ( x ) 1 x2 (B) g ( x ) (C) h ( x ) x (D) l ( x ) 4 x\nx\nQ.80 2 tan tan 1 ( x ) tan 1 ( x 3 ) where x R { 1,1}is equal to\n\nl 2x\n(A) (B) tan 2 tan 1 x\n1 x2\n(C) tan cot 1 ( x ) cot 1 ( x ) (D) tan 2 cot 1 x\nQ.81 Which pair(s) of function(s) is/are equal ?\n1 x2 2x\n(A) f ( x ) cos( 2 tan 1 x ) ; g ( x ) (B) f ( x ) ; g( x ) sin 2 cot 1 x\n1 x2 1 x2\n1\n(D) f ( x ) x a , a 0; g (x ) a x , a\n1\nn (sgn cot x) n [1 { x }]\n(C) f ( x ) e ; g( x) e 0\nwhere {x} and [x] denotes the fractional part and integral part functions.\nQ.82 Which of the following function(s) would represent a non singular mapping.\nf\n(A) f : R \" R f (x) x Sgn x where Sgn denotes Signum function\n(B) g : R \" R g (x) x 3/ 5\n(C) h : R \" R h(x) x4 3 x2 1\n\n3 x2 7 x 6\n(D) k : R \" R k (x)\nx x2 2\nQ.83 Let x1 , x 2 , x 3 , x 4 be four non zero numbers satisfying the equation\n\n1 a 1 b 1 c 1 d\ntan tan tan tan\nx x x x 2\n4\n\n(A) xi a b c d\ni 1\n\n4\n1\n(B) 0\ni 1 xi\n4\n\n(C) 'x\ni 1\ni abcd\n\n(D) x1 x 2 x3 x2 x3 x4 x3 x4 x1 x 4 x1 x 2 abcd\nQ.84 If the function f(x) = ax + b has its own inverse then the ordered pair (a, b) can be\n(A) (1, 0) (B) (-1, 0) (C) (-1, 1) (D) (1, 1)\n\n10\nQ.85 Let y (sin x sin 2x sin 3x ) 2 (cos x cos 2 x cos 3x ) 2 then which of the following is correct ?\n\ndy 3 5\n(A) when x is 2 (B) value of y when x is\ndx 2 5 2\n\n1 2 3\n(C) value of y when x is (D) y simplifies to (1 2 cos x ) in [0, ]\n12 2\nQ.86 Which of the following trigonometric equation(s) has/have no solution x R?\n\n2 x 2 1\n(A) 2 cos sin x x2 (B) sin 4 x 2 sin 2 x 1 0\n2 x2\n(C) cos e x 5x 5 x\n(D) sin 2 x [1 sin 2 x ] [1 cos 2 x ]\nwhere [ ] denotes greatest integer function.\n[MATCH THE COLUMN]\nQ.87 Column-I Column-II\nx\n(A) The period of the function f ( x ) sin cos cos(sin x ) equals k (P) 2\n2\nthen k is equal to\n(B) The integral value(s) in the domain of definition of the function, (Q) 3\nf\n3x 2 7 x 8\nf ( x ) arc cos\n1 x2\nwhere [*] denotes the greatest integer functin, is\n(C) Let f ( x ) sin [a ] x. If f is periodic with fundamental period , then (R) 4\nthe possible integral vlaue(s) of a is/are\n(where [ ] denotes the greatest integer function)\n2\n(D) If the values of x satisfying the equation x 5[ x ] 6 0, then integral (S) 5\nvalue of x, is/are\n(where [ ] denotes the greatest integer function)\n\n## Q.88 Column-I Column-II\n\nn n\nC2\n(A) Lim\nn\" n equals (P) 0\nn 1 2\n\n## (B) Let the roots of f(x) = 0 are 2, 3, 5, 7 and 9 (Q) 1\n\nand the roots of g(x) = 0 are -1, 3, 5, 7 and 8.\nf x\nNumber of solutions of the euqation = 0 is\ngx\n\nsin 3 x cos 3 x\n(C) Let y where 0 x , (R) 3/2\ncos x sin x 2\nthen the minimum value of y is\n(D) A circle passes through vertex D of the square ABCD, and is tangent (S) 2\nto the sides AB and BC. If AB = 1, the radius of the circle can be\nexpressed as p q 2 , then p + q has the value equal to\n11\nQ.89 Column-I Column-II\n3 3\n(A) sin x cos 3 x cos x sin 3 x, 0 x 2 , is (P) , ! , ! ,\n4 4 4 4\n3\n(B) 4 sin 2 x 8 sin x 0, 0 x 2 , is (Q) ,2 ! {0}\n2\n\n## (C) tanx 1 and x [ , ] , is (R) 0,\n\n4\n5\n(D) cos x sin x # 1 and 0 x 2 (S) ,\n6 6\n\nx\nQ.90 Let : f : R \" , , f (x) x 2 3ax b, g ( x ) sin 1\n( R ).\n4\nColumn-I Column-II\n(A) The possible integral values of a for which f(x) is many one in (P) - 2\ninterval [-3, 5] is/are\n(B) Let a = - 1 and gof(x) is defined for x [ 1,1] then possible (Q) - 1\nintegral values of b can be\n(C) Let a 2, 8 the value(s) of which f(x) is surjective is/are (R) 0\n(D) If a = 1, b = 2, then integers in the range of fog(x) is/are (S) 1\nQ.91 Column-I Column-II\n1 0\n(A) cot tan( 37 ) (P) 1430\n(B) cos cos( 2330 )\n1\n(Q) 127 0\n1 1 1 3\n(C) sin cos (R)\n2 9 4\n1 1 2\n(D) cos arc cos (S)\n2 8 3\n\n1 x 1\nQ.92 Let f (x) xand g(x) .\nx x 2\nMatch the composite function given in Column-I with their respective domains given in Column-II.\nColumn-I Column-II\n(A) fog (P) R - {-2, -5/3}\n(B) gof (Q) R - {-1, 0}\n(C) fof (R) R - {0}\n(D) gog (S) R - {-2, -1}\nQ.93 Column-I Column-II\n1 1 1\n(A) f (x) sin sin 2 x cosec (cosec 2 x) tan(tan 2 x) (P) odd function\n1\n(B) g (x) sin {x}, where {x} denotes fractional part function (Q) injective mapping\n2\n(C) h (x) cosec 1 (sgn x) (R) range contian two\ninteger only\n(D) k ( x ) cos 1 ( sin x cos x ) (S) aperiodic\n[SUJBECTIVE]\n\n## Q.94 Find the value of x satisfying the equation,\n\n1\nlog10 5 cot 1 x 1 log10 2 cot 1 x 3 log10 5 1.\n2\nQ.95 Let the straight line L : tan(cot 1 2) x y 4 be rotated through an angle cot -1 3 about the point\nM(0, - 4) in anticlockwise sense. After rotation the line become tangent to the circle which lies in\n4th quadrant and also touches coordinate axes. Find the sum of radii of all possible circles.\n\nETOOS Academy Pvt. Ltd. : F-106, Road No. 2, Indraprastha Industrial Area, End of Evergreen Motors 13\n(Mahindra Showroom), BSNL Office Lane, Jhalawar Road, Kota, Rajasthan (324005)"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.68491596,"math_prob":0.9999316,"size":11147,"snap":"2019-35-2019-39","text_gpt3_token_len":4929,"char_repetition_ratio":0.16090819,"word_repetition_ratio":0.03893924,"special_character_ratio":0.47008163,"punctuation_ratio":0.086556755,"nsfw_num_words":2,"has_unicode_error":false,"math_prob_llama3":0.99950373,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-23T15:43:37Z\",\"WARC-Record-ID\":\"<urn:uuid:d1fef164-771e-4f02-acbe-9249a2a03d24>\",\"Content-Length\":\"368966\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dd6a3e1b-4ecc-4290-b2c5-5e12479eaef6>\",\"WARC-Concurrent-To\":\"<urn:uuid:5ad42046-c6b1-447d-af5f-ef5265c508e8>\",\"WARC-IP-Address\":\"151.101.250.152\",\"WARC-Target-URI\":\"https://id.scribd.com/document/364957094/cpp-functions-pdf\",\"WARC-Payload-Digest\":\"sha1:FNJF646VQNJMAEAVZBFATMVZ4GALRRJE\",\"WARC-Block-Digest\":\"sha1:K7ACVQOT6DVJUMGSMQJ56M6R3UG2N2ZU\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514577363.98_warc_CC-MAIN-20190923150847-20190923172847-00164.warc.gz\"}"} |
http://mathandmultimedia.com/tag/log-2/ | [
"## Proof that log 2 is an irrational number\n\nBefore doing the proof, let us recall two things: (1) rational numbers are numbers that can be expressed as",
null,
"$\\frac{a}{b}$ where",
null,
"$a$ and",
null,
"$b$ are integers, and",
null,
"$b$ not equal to",
null,
"$0$; and (2) for any positive real number",
null,
"$y$, its logarithm to base",
null,
"$10$ is defined to be a number",
null,
"$x$ such that",
null,
"$10^x = y$. In proving the statement, we use proof by contradiction.\n\nTheorem: log 2 is irrational\n\nProof:\n\nAssuming that log 2 is a rational number. Then it can be expressed as",
null,
"$\\frac{a}{b}$ with",
null,
"$a$ and",
null,
"$b$ are positive integers (Why?). Then, the equation is equivalent to",
null,
"$2 = 10^{\\frac{a}{b}}$. Raising both sides of the equation to",
null,
"$b$, we have",
null,
"$2^b = 10^a$. This implies that",
null,
"$2^b = 2^a5^a$. Notice that this equation cannot hold (by the Fundamental Theorem of Arithmetic) because",
null,
"$2^b$ is an integer that is not divisible by 5 for any",
null,
"$b$, while",
null,
"$2^a5^a$ is divisible by 5. This means that log 2 cannot be expressed as",
null,
"$\\frac{a}{b}$ and is therefore irrational which is what we want to show."
] | [
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null,
"http://s0.wp.com/latex.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.966963,"math_prob":1.0000033,"size":869,"snap":"2023-40-2023-50","text_gpt3_token_len":196,"char_repetition_ratio":0.13410404,"word_repetition_ratio":0.0,"special_character_ratio":0.2301496,"punctuation_ratio":0.118644066,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000091,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-29T06:05:06Z\",\"WARC-Record-ID\":\"<urn:uuid:055b86b0-46bf-4d5a-95a2-e40e46786d04>\",\"Content-Length\":\"50757\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7802cff8-06ab-4ff9-acda-088660d24d5f>\",\"WARC-Concurrent-To\":\"<urn:uuid:92182da4-7a4a-48a4-9e11-ebcb6688ac45>\",\"WARC-IP-Address\":\"166.62.28.131\",\"WARC-Target-URI\":\"http://mathandmultimedia.com/tag/log-2/\",\"WARC-Payload-Digest\":\"sha1:JLLWZ4EVNCX6GFQ5U6TOI7MNUESH34LW\",\"WARC-Block-Digest\":\"sha1:DSAKYJBUJALN5GPD6344EJBECIGQ5QQ5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510498.88_warc_CC-MAIN-20230929054611-20230929084611-00418.warc.gz\"}"} |
https://www.mathclasstutor.com/2020/08/computer-graphics-in-mathematics.html | [
"# Computer graphics in mathematics 2D graphics.\n\nThe main reason graphical objects are described by a collection of straight line segments is that the standard transformation in computer graphics map line segment on to other line segments.\nComputer aided design (CAD)is an integral part of many engineering process such as the aircraft design process described .\nmost interactive computer software for business and industry makes use of computer graphics in the screen display and for other functions such as a graphical display a of data desktop publishing and slide production for commercial and educational presentations. Consequently anyone studying a computer language invariably spends time learning how to use at least two dimensional (2D) graphics.\nThe basic mathematics used to manipulate and display a graphical image such as a wire frame model of an airplane.sex and image consists of a number of coins, connecting lines for cobs, and information about how to fill in close regions bounded by the lines and COD lines of approximated by short straight linecode lines of approximated by short straight line segments and it is defined mathematically by a list of points. Among the simplest 2D graphics symbol are letters used for labels on the screen. Some letters are stored as right frame of objects other that have COD portions are stored with additional mathematical formula for the cal formula for the curves.\n\n## Composite transformation\n\nThe moment of of a figure on a computer screen off and requires two or more basic transformation.the composition of 6 transformations corresponds to matrix multiplication when homogenous coordinates are used.\n\n### 3D computer graphics\n\nthree dimensional graphics, a biologist can examine or simulated protein molecules and search for active sites that might accept of drug molecule.the biologist can rotates and translate and experimental drug and attempt to attach it to the protein.this ability to visualise Pro X shall chemical reaction is visual to modern drop and Cancer research.\nHomogenous 3D coordinates\nWe say that (x,y,z1) homogenous coordinates for the point(x,y,z) in R^3.\nIn general (X,Y,Z,H) are homogenous coordinates for(x,y,z) ifH will not equal zero\nX=X/H\ny=Y/H\nz=Z/H."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9034762,"math_prob":0.94816685,"size":2236,"snap":"2020-45-2020-50","text_gpt3_token_len":424,"char_repetition_ratio":0.114247315,"word_repetition_ratio":0.011661808,"special_character_ratio":0.17978533,"punctuation_ratio":0.07052897,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9518926,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-25T18:43:21Z\",\"WARC-Record-ID\":\"<urn:uuid:991e06e6-90a5-4229-99cc-37e0c907aae1>\",\"Content-Length\":\"260131\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:139781e8-d880-406b-9601-7f6cc9ea60ff>\",\"WARC-Concurrent-To\":\"<urn:uuid:73d699cd-0ab2-42d8-b900-9ac4482f081f>\",\"WARC-IP-Address\":\"172.217.12.243\",\"WARC-Target-URI\":\"https://www.mathclasstutor.com/2020/08/computer-graphics-in-mathematics.html\",\"WARC-Payload-Digest\":\"sha1:2PUKQDNP3AVMVXW2DI2PKFT4ZWAG64EN\",\"WARC-Block-Digest\":\"sha1:CWO4P2ENZVGKF3MCXHYVGKB4CMI4LAE7\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107889651.52_warc_CC-MAIN-20201025183844-20201025213844-00696.warc.gz\"}"} |
https://vulcanhammer.info/2018/04/24/analyzing-sheet-pile-walls-with-spw-2006-part-ii-cantilever-walls/ | [
"# Analyzing Sheet Pile Walls with SPW 2006: Part II, Cantilever Walls\n\nIn our last post, we introduced the SPW 2006 sheet piling software, intended for educational purposes. The software can be downloaded here. In this installment we’ll look at its application to cantilever walls, i.e., those walls with no additional support other than the soil itself. These are used in temporary works. The file for this can be found with the software.\n\nThe problem is this one, taken from the BSC Piling Handbook, Fourth Edition (1984).",
null,
"This is a fairly simple problem except that it has two different soil layers and properties. We’ll use the active and passive earth pressure coefficient values given in the example, although these can easily be computed from equations given in Verruijt or DM 7.\n\nBased on this, the left side soil profile after input looks like this:",
null,
"And the right side:",
null,
"We note the following:\n\n• The difference between the two is the first layer on the left side, as we would expect.\n• We have a uniform surcharge",
null,
"$q$ which is carried from the top downwards. It’s possible to vary that surcharge with depth; however, the program has no method of automatically computing variations in surcharge loading due to surface loads such as line and strip loads. Also, note that the surcharge is only on the right side. You have to manually check to make sure this is so; it is rare that there will be a surcharge on the left side.\n• The water table level is shown in all layers.\n• The passive earth pressure coefficients have been reduced by a factor of 1.5. There is more than one way to include a factor of safety for earth pressure; these methods are discussed in Sheet Pile Design by Pile Buck.\n• The Kn (“neutral” or “at-rest” earth pressure coefficient) has been computed using Jaky’s Equation, discussed here.\n• The stroke is probably the “stickiest wicket” in terms of soil properties. There are several ways of computing this, depending upon the amount of information on the soil you have at hand. Probably the simplest way to do this is to use a chart such as appears in DM 7, which is reproduced below.",
null,
"Selecting the proper case from the table at the bottom, the stroke can be computed as follows:",
null,
"$D_w = H\\left( \\frac{Y}{H}^* \\right)$\n\nIt is possible to be very precise with this calculation. For example, one could estimate the penetration below the dredge line",
null,
"$D$ to use as a value of",
null,
"$H$, but this becomes very tedious during the iteration process. It’s also possible (and probably better) to use the different values of passive ratios on the left side vs. active ones on the right, since these pressures predominate on their respective sides. Neither of these was used in the example, although the latter option is probably the more realistic one.\n\nIn any case the soil profile looks like this:",
null,
"The correspondence of the sections with the original problem is easily seen.\n\nNow we select a sheeting length and a profile. We’ll select a length of 10 m (you will need to iterate from a short length, perhaps 6m and go upwards until you get a result that does not produce an error.) We’ll also start by assuming Profile #1 (Hoesch 95.) Running this yields the following beam diagrams:",
null,
"The maximum moment is around 235 kN-m/m. But is this section suitable for this level of moment? The simplest way is to compute the maximum moment the sheeting section is capable of, and this can be done using the equation",
null,
"$M_{max} = \\frac{\\sigma_{max}\\left[EI \\right]}{Eh}$\n\nHere",
null,
"$\\sigma_{max}$ is the maximum allowable bending stress,",
null,
"$E$ is the modulus of elasticity, and",
null,
"$h$ is the distance from the neutral axis to the extreme fiber of the sheet (see previous post for a discussion of this.) The sheeting database is reproduced below:",
null,
"Assuming that the sheeting is made of ASTM A572 Fr. 50 with an allowable stress of 220 MPa, for Hoesch 95 the maximum moment is as follows:",
null,
"$M_{max} = \\frac{(220)(1000)(14863.6)}{(210)(1000000)(.19)} = 82 \\frac{kN-m}{m}$\n\nObviously this is too light of a section for the moment level. This indicates that the EI of an acceptable section should be",
null,
"$\\frac{235}{82} = 2.9$ times the current one, or about AZ13-700. As an exercise this should be checked. This ratio method is indicative and not absolute; since the program uses soil-structure interaction, the stiffness of the sheets affects the moment distribution, as is the case in actual application.\n\nThe solution printout is here.\n\nIn the next post, we will consider the case of an anchored wall.\n\n## 2 thoughts on “Analyzing Sheet Pile Walls with SPW 2006: Part II, Cantilever Walls”\n\nThis site uses Akismet to reduce spam. Learn how your comment data is processed."
] | [
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/bsc-cantilever-problem.png",
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/screenshot_20180424_112011.png",
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/screenshot_20180424_112143.png",
null,
"https://s0.wp.com/latex.php",
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/dm7-figure-1.png",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/screenshot_20180424_114529.png",
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/screenshot_20180424_114958.png",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://vulcanhammerinfo.files.wordpress.com/2018/04/screenshot_20180423_155516.png",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93722904,"math_prob":0.95598555,"size":4260,"snap":"2019-51-2020-05","text_gpt3_token_len":920,"char_repetition_ratio":0.1031485,"word_repetition_ratio":0.0,"special_character_ratio":0.21384977,"punctuation_ratio":0.10011919,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98963493,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34],"im_url_duplicate_count":[null,5,null,5,null,5,null,null,null,5,null,null,null,null,null,null,null,5,null,5,null,null,null,null,null,null,null,null,null,5,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-07T11:12:51Z\",\"WARC-Record-ID\":\"<urn:uuid:e8a57f85-f253-44bd-bd6f-29f62fe62159>\",\"Content-Length\":\"148332\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:49e93d57-73ca-4300-b841-5d4444c055be>\",\"WARC-Concurrent-To\":\"<urn:uuid:5fd18520-56c0-4e3c-b24a-7e270a96a6c8>\",\"WARC-IP-Address\":\"192.0.78.25\",\"WARC-Target-URI\":\"https://vulcanhammer.info/2018/04/24/analyzing-sheet-pile-walls-with-spw-2006-part-ii-cantilever-walls/\",\"WARC-Payload-Digest\":\"sha1:OD65BMCN3WGJYGEB5VNBYUFBZNQPZUA6\",\"WARC-Block-Digest\":\"sha1:QO4M7QC47GXS7EOF6ZP64SPFSIZPADHP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540499389.15_warc_CC-MAIN-20191207105754-20191207133754-00335.warc.gz\"}"} |
http://newton.cam.ac.uk/event/ascw01/timetable | [
"skip to content\n\n# Timetable (ASCW01)\n\n## Challenges in optimal recovery and hyperbolic cross approximation\n\nMonday 18th February 2019 to Friday 22nd February 2019\n\n 09:00 to 09:25 Registration 09:25 to 09:35 Welcome from Christie Marr (INI Deputy Director) 09:40 to 10:15 Henryk Wozniakowski (Columbia University); (University of Warsaw)Exponential tractability of weighted tensor product problems INI 1",
null,
"",
null,
"10:20 to 11:00 Morning Coffee 11:00 to 11:35 Aicke Hinrichs (Johannes Kepler Universität)Random sections of ellipsoids and the power of random information We study the circumradius of the intersection of an $m$-dimensional ellipsoid~$\\mathcal E$ with half axes $\\sigma_1\\geq\\dots\\geq \\sigma_m$ with random subspaces of codimension $n$. We find that, under certain assumptions on $\\sigma$, this random radius $\\mathcal{R}_n=\\mathcal{R}_n(\\sigma)$ is of the same order as the minimal such radius $\\sigma_{n+1}$ with high probability. In other situations $\\mathcal{R}_n$ is close to the maximum~$\\sigma_1$. The random variable $\\mathcal{R}_n$ naturally corresponds to the worst-case error of the best algorithm based on random information for $L_2$-approximation of functions from a compactly embedded Hilbert space $H$ with unit ball $\\mathcal E$. In particular, $\\sigma_k$ is the $k$th largest singular value of the embedding $H\\hookrightarrow L_2$. In this formulation, one can also consider the case $m=\\infty$, and we prove that random information behaves very differently depending on whether $\\sigma \\in \\ell_2$ or not. For $\\sigma \\notin \\ell_2$ random information is completely useless. For $\\sigma \\in \\ell_2$ the expected radius of random information tends to zero at least at rate $o(1/\\sqrt{n})$ as $n\\to\\infty$. In the proofs we use a comparison result for Gaussian processes a la Gordon, exponential estimates for sums of chi-squared random variables, and estimates for the extreme singular values of (structured) Gaussian random matrices. This is joint work with David Krieg, Erich Novak, Joscha Prochno and Mario Ullrich. INI 1",
null,
"",
null,
"11:40 to 12:15 Yuri Malykhin (Steklov Mathematical Institute, Russian Academy of Sciences); (Moscow State University)On some lower bounds for Kolmogorov widths INI 1",
null,
"",
null,
"12:20 to 13:40 Lunch at Churchill College 13:40 to 14:15 Jan Vybiral (Charles University, Prague)Approximation of Ridge Functions and Sparse Additive Models The approximation of smooth multivariate functions is known to suffer the curse of dimension. We discuss approximation of structured multivariate functions, which take the form of a ridge, their sum, or of the so-called sparse additive models. We give also results about optimality of such algorithms. INI 1",
null,
"",
null,
"14:20 to 14:55 Alexander Litvak (University of Alberta)Order statistics and Mallat--Zeitouni problem Let $X$ be an $n$-dimensional random centered Gaussian vector with independent but not necessarily identically distributed coordinates and let $T$ be an orthogonal transformation of $\\mathbb{R}^n$. We show that the random vector $Y=T(X)$ satisfies $$\\mathbb{E} \\sum \\limits_{j=1}^k j\\mbox{-}\\min _{i\\leq n}{X_{i}}^2 \\leq C \\mathbb{E} \\sum\\limits_{j=1}^k j\\mbox{-}\\min _{i\\leq n}{Y_{i}}^2$$ for all $k\\leq n$, where $j\\mbox{-}\\min$'' denotes the $j$-th smallest component of the corresponding vector and $C>0$ is a universal constant. This resolves (up to a multiplicative constant) an old question of S.Mallat and O.Zeitouni regarding optimality of the Karhunen--Lo\\eve basis for the nonlinear reconstruction. We also show some relations for order statistics of random vectors (not only Gaussian), which are of independent interest. This is a joint work with Konstantin Tikhomirov. INI 1",
null,
"",
null,
"15:00 to 15:30 Afternoon Tea 15:30 to 16:05 Mario Ullrich (Johannes Kepler Universität)Construction of high-dimensional point sets with small dispersion Based on deep results from coding theory, we present an deterministic algorithm that contructs a point set with dispersion at most $\\eps$ in dimension $d$ of size $poly(1/\\eps)*\\log(d)$, which is optimal with respect to the dependence on $d$. The running time of the algorithms is, although super-exponential in $1/\\eps$, only polynomial in $d$. INI 1 16:10 to 16:45 Dicussion INI 1 17:00 to 18:00 Welcome Wine Reception at INI\n 09:00 to 09:35 Winfried Sickel (Friedrich-Schiller-Universität Jena)The Haar System and Smoothness Spaces built on Morrey Spaces For some Nikol'skij-Besov spaces $B^s_{p,q}$ the orthonormal Haar system can be used as an unconditional Schauder basis. Nowadays necessary and sufficient conditions with respect to $p,q$ and $s$ are known for this property. In recent years in a number of papers some modifications of Nikol'skij-Besov spaces based on Morrey spaces have been investigated. In my talk I will concentrate on a version called Besov-type spaces and denoted by $B^{s,\\tau}_{p,q}$. It will be my aim to discuss some necessary and some sufficient conditions on the parameters $p,q,s,\\tau$ such that one can characterize these classes by means of the Haar system. This is joined work with Dachun Yang and Wen Yuan (Beijing Normal University). INI 1",
null,
"",
null,
"09:40 to 10:15 Dachun Yang (Beijing Normal University)Ball Average Characterizations of Function Spaces It is well known that function spaces play an important role in the study on various problems from analysis. In this talk, we present pointwise and ball average characterizations of function spaces including Sobolev spaces, Besov spaces and Triebel-Lizorkin spaces on the Euclidean spaces. These characterizations have the advantages so that they can be used as the definitions of these function spaces on metric measure spaces. Some open questions are also presented in this talk. INI 1",
null,
"",
null,
"10:20 to 11:00 Morning Coffee 11:00 to 11:35 Wen Yuan (Beijing Normal University)Embedding and continuity envelopes of Besov-type spaces In this talk, we discuss about the sharp embedding properties between Besov-type spaces and Triebel-Lizorkin-type and present some related necessary and sufficient conditions for these embedding. The corresponding continuity envelopes are also worked out. INI 1",
null,
"",
null,
"11:40 to 12:15 Bin Han (University of Alberta); (University of Alberta)Directional Framelets with Low Redundancy and Directional Quasi-tight Framelets Edge singularities are ubiquitous and hold key information for many high-dimensional problems. Consequently, directional representation systems are required to effectively capture edge singularities for high-dimensional problems. However, the increased angular resolution often significantly increases the redundancy rates of a directional system. High redundancy rates lead to expensive computational costs and large storage requirement, which hinder the usefulness of such directional systems for problems in moderately high dimensions such as video processing. In this talk, we attack this problem by using directional tensor product complex tight framelets with mixed sampling factors. Such introduced directional system has good directionality with a very low redundancy rate $\\frac{3^d-1}{2^d-1}$, e.g., the redundancy rates are $2$, $2\\frac{2}{3}$, $3\\frac{5}{7}$, $5\\frac{1}{3}$ and $7\\frac{25}{31}$ for dimension $d=1,\\ldots,5$. Our numerical experiments on image/video denoising and inpainting show that the performance of our proposed directional system with low redundancy rate is comparable or better than several state-of-the-art methods which have much higher redundancy rates. In the second part, we shall discuss our recent developments of directional quasi-tight framelets in high dimensions. This is a joint work with Chenzhe Diao, Zhenpeng Zhao and Xiaosheng Zhuang. INI 1",
null,
"",
null,
"12:20 to 13:40 Lunch at Churchill College 13:40 to 14:15 Clayton Webster (University of Tennessee); (Oak Ridge National Laboratory)Polynomial approximation via compressed sensing of high-dimensional functions on lower sets This talk will focus on compressed sensing approaches to sparse polynomial approximation of complex functions in high dimensions. Of particular interest is the parameterized PDE setting, where the target function is smooth, characterized by a rapidly decaying orthonormal expansion, whose most important terms are captured by a lower (or downward closed) set. By exploiting this fact, we will present and analyze several procedures for exactly reconstructing a set of (jointly) sparse vectors, from incomplete measurements. These include novel weighted $\\ell_1$ minimization, improved iterative hard thresholding, mixed convex relaxations, as well as nonconvex penalties. Theoretical recovery guarantees will also be presented based on improved bounds for the restricted isometry property, as well as unified null space properties that encompass all currently proposed nonconvex minimizations. Numerical examples are provided to support the theoretical results and demonstrate the computational efficiency of the described compressed sensing methods. INI 1",
null,
"14:20 to 14:55 Oscar Dominguez (Universidad Complutense de Madrid)Characterizations of Besov spaces in terms of K-functionals Besov spaces occur naturally in many fields of analysis. In this talk, we discuss various characterizations of Besov spaces in terms of different K-functionals. For instance, we present descriptions via oscillations, Bianchini-type norms and approximation methods. This is a joint work with S. Tikhonov (Barcelona). INI 1 15:00 to 15:30 Afternoon Tea 15:30 to 16:05 Wenrui Ye (The University of International Business and Economics - Beijing)Local restriction theorem and maximal Bochner-Riesz operator for the Dunkl transforms In this talk, I will mainly describe joint work with Dr. Feng Dai on the critical index for the almost everywhere convergence of the Bochner-Riesz means in weighted Lp-spaces with p=1 or p>2. Our results under the case p>2 are in full analogy with the classical result of M. Christ on estimates of the maximal Bochner-Riesz means of Fourier integrals and the classical result of A. Carbery, José L. Rubio De Francia and L. Vega on a.e. convergence of Fourier integrals. Besides, I will also introduce several new results that are related to our main results, including: (i) local restriction theorem for the Dunkl transform which is significantly stronger than the global one, but more difficult to prove; (ii) the weighted Littlewood Paley inequality with Ap-weights in the Dunkl non-commutative setting; (iii) sharp local point-wise estimates of several important kernel functions. INI 1",
null,
"",
null,
"16:10 to 16:45 Discussion INI 1\n 09:00 to 09:35 Holger Rauhut (RWTH Aachen University)Recovery of functions of many variables via compressive sensing The talk will report on the use of compressive sensing for the recovery of functions of many variables from sample values. We will cover trigonometric expansions as well as expansions in tensorized orthogonal polynomial systems and provide convergence rates in terms of the number of samples which avoid the curse of dimensionality. The technique can be used for the numerical solution of parametric operator equations. INI 1",
null,
"09:40 to 10:15 Dũng Dinh (Vietnam National University)Dimension-dependence error estimates for sampling recovery on Smolyak grids We investigate dimension-dependence estimates of the approximation error for linear algorithms of sampling recovery on Smolyak grids parametrized by $m$, of periodic $d$-variate functions from the space with Lipschitz-H\\\"older mixed smoothness $\\alpha > 0$. For the subsets of the unit ball in this space of functions with homogeneous condition and of functions depending on $\\nu$ active variables ($1 \\le \\nu \\le d$), respectively, we prove some upper bounds and lower bounds (for $\\alpha \\le 2$) of the error of the optimal sampling recovery on Smolyak grids, explicit in $d$, $\\nu$, $m$ when $d$ and $m$ may be large. This is a joint work with Mai Xuan Thao, Hong Duc University, Thanh Hoa, Vietnam. INI 1",
null,
"10:20 to 11:00 Morning Coffee 11:00 to 11:35 Martin Buhmann (Justus-Liebig-Universität Gießen)Recent Results on Rational Approximation and Interpolation with Completely and Multiply Monotone Radial Basis Functions We will report on new results about approximations to continuous functions of multiple variables. We shall use either approximation with interpolation or approximation by rational functions. For these kinds of approximations, radial basis functions are particularly attractive, as they provide regular, positive definite or conditionally positive definite approximations, independent of the spatial dimension and independent the distribution of the data points we wish to work with. These interpolants have very many applications for example in solving nonlinear partial differential equations by collocation. In this talk, we classify radial basis and other functions that are useful for such scattered data interpolation or for rational approximations from vector spaces spanned by translates of those basis functions (kernels); for this we study in particular multiply and/or completely monotone functions. We collect special properties of such monotone functions, generalise them and find larger classes than the well known monotone functions for multivariate interpolation. Furthermore, we discuss efficient ways to compute rational approximations using the same type of kernels. INI 1 11:40 to 12:15 Lutz Kaemmerer (Technische Universität Chemnitz)Multiple Rank-1 Lattices as Sampling Schemes for Approximation The approximation of functions using sampling values along single rank-1 lattices leads to convergence rates of the approximation errors that are far away from optimal ones in spaces of dominating mixed smoothness. A recently published idea that uses sampling values along several rank-1 lattices in order to reconstruct multivariate trigonometric polynomials accompanied by fast methods for the construction of these sampling schemes as well as available fast Fourier transform algorithms motivates investigations on the approximation properties of the arising sampling operators applied on functions of specific smoothness, in particular functions of dominating mixed smoothness which naturally leads to hyperbolic cross approximations. INI 1",
null,
"12:20 to 13:40 Lunch at Churchill College 13:40 to 18:00 Free afternoon 19:30 to 22:00 Formal Dinner at Emmanuel College (Old Library) LOCATIONEmmanuel CollegeHow to get thereMENU Starters Butternut Squash Veloute with Pumpkin Seed Oil (V) Main course Supreme of Chicken, Parsley Risotto, Crispy Chorizo Roasted Artichoke, Parsley Risotto, Crispy Kale (V) Selection of vegetables Dessert Crème Brulee Coffee and MintsDRESS CODESmart casual",
null,
"09:00 to 09:35 Thomas Kuehn (Universität Leipzig)Preasymptotic estimates for approximation of multivariate periodic Sobolev functions Approximation of Sobolev functions is a topic with a long history and many applications in different branches of mathematics. The asymptotic order as $n\\to\\infty$ of the approximation numbers $a_n$ is well-known for embeddings of isotropic Sobolev spaces and also for Sobolev spaces of dominating mixed smoothness. However, if the dimension $d$ of the underlying domain is very high, one has to wait exponentially long until the asymptotic rate becomes visible. Hence, for computational issues this rate is useless, what really matters is the preasymptotic range, say $n\\le 2^d$. In the talk I will first give a short overview over this relatively new field. Then I will present some new preasymptotic estimates for $L_2$-approximation of periodic Sobolev functions, which improve the previously known results. I will discuss the cases of isotropic and dominating mixed smoothness, and also $C^\\infty$-functions of Gevrey type. Clearly, on all these spaces there are many equivalent norms. It is an interesting effect that - in contrast to the asymptotic rates - the preasymptotic behaviour strongly depends on the chosen norm. INI 1",
null,
"09:40 to 10:15 Konstantin Ryutin Best m-term approximation of the \"step-function\" and related problems The main point of the talk is the problem of approximation of the step-function by $m$-term trigonometric polynomials and some closely related problems: the approximate rank of a specific triangular matrix, the Kolmogorov width of BV functions. This problem has its origins in approximation theory (best sparse approximation and Kolmogorov widths) as well as in computer science (approximate rank of a matrix). There are different approaches and techniques: $\\gamma_2$--norm, random approximations, orthomassivity of a set.... I plan to show what can be achieved by these techniques. INI 1",
null,
"10:20 to 11:00 Morning Coffee 11:00 to 11:35 Michael Gnewuch (Christian-Albrechts-Universität zu Kiel)Explicit error bounds for randomized Smolyak algorithms and an application to infinite-dimensional integration Smolyak's method, also known as hyperbolic cross approximation or sparse grid method, is a powerful %black box tool to tackle multivariate tensor product problems just with the help of efficient algorithms for the corresponding univariate problem. We provide upper and lower error bounds for randomized Smolyak algorithms with fully explicit dependence on the number of variables and the number of information evaluations used. The error criteria we consider are the worst-case root mean square error (the typical error criterion for randomized algorithms, often referred to as randomized error'') and the root mean square worst-case error (often referred to as worst-case error''). Randomized Smolyak algorithms can be used as building blocks for efficient methods, such as multilevel algorithms, multivariate decomposition methods or dimension-wise quadrature methods, to tackle successfully high-dimensional or even infinite-dimensional problems. As an example, we provide a very general and sharp result on infinite-dimensional integration on weighted reproducing kernel Hilbert spaces and illustrate it for the special case of weighted Korobov spaces. We explain how this result can be extended, e.g., to spaces of functions whose smooth dependence on successive variables increases (`spaces of increasing smoothness'') and to the problem of L_2-approximation (function recovery). INI 1",
null,
"11:40 to 12:15 Heping Wang (Capital Normal University)Monte Carlo methods for $L_q$ approximation on periodic Sobolev spaces with mixed smoothness In this talk we consider multivariate approximation of compact embeddings of periodic Sobolev spaces of dominating mixed smoothness into the $L_q,\\ 2< q\\leq \\infty$ space by linear Monte Carlo methods that use arbitrary linear information. We construct linear Monte Carlo methods and obtain explicit-in-dimension upper estimates. These estimates catch up with the rate of convergence. INI 1",
null,
"12:20 to 13:40 Lunch at Churchill College 13:40 to 14:15 Robert J. Kunsch (Universität Osnabrück)Optimal Confidence for Monte Carlo Integration of Smooth Functions We study the complexity $n(\\varepsilon,\\delta)$ of approximating the integral of smooth functions at absolute precision $\\varepsilon > 0$ with confidence level $1 - \\delta \\in (0,1)$ using function evaluations as information within randomized algorithms. Methods that achieve optimal rates in terms of the root mean square error (RMSE) are not always optimal in terms of error at confidence, usually we need some non-linearity in order to suppress outliers. Besides, there are numerical problems which can be solved in terms of error at confidence but no algorithm can guarantee a finite RMSE, see . Hence, the new error criterion seems to be more general than the classical RMSE. The sharp order for multivariate functions from classical isotropic Sobolev spaces $W_p^r([0,1]^d)$ can be achieved via control variates, as long as the space is embedded in the space of continuous functions $C([0,1]^d)$. It turns out that the integrability index $p$ has an effect on the influence of the uncertainty $\\delta$ to the complexity, with the limiting case $p = 1$ where deterministic methods cannot be improved by randomization. In general, higher smoothness reduces the effort we need to take in order to increase the confidence level. Determining the complexity $n(\\varepsilon,\\delta)$ is much more challenging for mixed smoothness spaces $\\mathbf{W}_p^r([0,1]^d)$. While optimal rates are known for the classical RMSE (as long as $\\mathbf{W}_p^r([0,1]^d)$ is embedded in $L_2([0,1]^d)$), see , basic modifications of the corresponding algorithms fail to match the theoretical lower bounds for approximating the integral with prescribed confidence. Joint work with Daniel Rudolf R.J. Kunsch, E. Novak, D. Rudolf. Solvable integration problems and optimal sample size selection. To appear in Journal of Complexity. M. Ullrich. A Monte Carlo method for integration of multivariate smooth functions. SIAM Journal on Numerical Analysis, 55(3):1188-1200, 2017. INI 1",
null,
"14:20 to 14:55 Markus Weimar (Ruhr-Universität Bochum)Optimal recovery using wavelet trees This talk is concerned with the approximation of embeddings between Besov-type spaces defined on bounded multidimensional domains or (patchwise smooth) manifolds. We compare the quality of approximations of three different strategies based on wavelet expansions. For this purpose, sharp rates of convergence corresponding to classical uniform refinement, best $N$-term, and best $N$-term tree approximation will be presented. In particular, we will see that whenever the embedding of interest is compact, greedy tree approximation schemes are as powerful as abstract best $N$-term approximation and that (for a large range of parameters) they can outperform uniform schemes based on a priori fixed (hence non-adaptively chosen) subspaces. This observation justifies the usage of adaptive non-linear algorithms in computational practice, e.g., for the approximate solution of boundary integral equations arising from physical applications. If time permits, implications for the related concept of approximation spaces associated to the three approximation strategies will be discussed. INI 1",
null,
"15:00 to 15:30 Afternoon Tea 15:30 to 16:05 Discussion INI 1 16:10 to 16:45 Discussion INI 1\n 09:00 to 09:35 Jürgen Prestin (Universität zu Lübeck)Shift-invariant Spaces of Multivariate Periodic Functions One of the underlying ideas of multiresolution and wavelet analysis consists in the investigation of shift-invariant function spaces. In this talk one-dimensional shift-invariant spaces of periodic functions are generalized to multivariate shift-invariant spaces on non-tensor product patterns. These patterns are generated from a regular integer matrix. The decomposition of these spaces into shift-invariant subspaces can be discussed by the properties of these matrices. For these spaces we study different bases and their time-frequency localization. Of particular interest are multivariate orthogonal Dirichlet and de la Valle\\'e Poussin kernels and the respective wavelets. This approach also leads to an adaptive multiresolution. Finally, with these methods we construct shearlets and show how we can detect jump discontinuities of given cartoon-like functions. INI 1 09:40 to 10:15 Bastian Bohn (Universität Bonn)Least squares regression on sparse grids In this talk, we first recapitulate the framework of least squares regression on certain sparse grid and hyperbolic cross spaces. The underlying numerical problem can be solved quite efficiently with state-of-the-art algorithms. Analyzing its stability and convergence properties, we can derive the optimal coupling between the number of necessary data samples and the degrees of freedom in the ansatz space.Our analysis is based on the assumption that the least-squares solution employs some kind of Sobolev regularity of dominating mixed smoothness, which is seldomly encountered for real-world applications. Therefore, we present possible extensions of the basic sparse grid least squares algorithm by introducing suitable a-priori data transformations in the second part of the talk. These are tailored such that the resulting transformed problem suits the sparse grid structure.Co-authors: Michael Griebel (University of Bonn), Jens Oettershagen (University of Bonn), Christian Rieger (University of Bonn) INI 1",
null,
"10:20 to 11:00 Morning Coffee 11:00 to 11:35 Song Li (Zhejiang University); (Zhejiang University)Some Sparse Recovery Methods in Compressed Sensing In this talk, I shall investigate some sparse recovery methods in Compressed Sensing. In particular, I will focus on RIP approach and D-RIP approach. As a result, we confirmed a conjecture on RIP, which is related to Terence. Tao and Jean. Bourgain's works in this fields. Then, I will also investigate the relations between our works and statistics. INI 1",
null,
"11:40 to 12:15 tba INI 1 12:20 to 13:40 Lunch buffet at the INI 13:40 to 16:45 Discussion INI 1"
] | [
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/modules/file/icons/application-pdf.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null,
"http://newton.cam.ac.uk/files/theme/icons/film-24x24.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8493978,"math_prob":0.97235703,"size":24922,"snap":"2019-13-2019-22","text_gpt3_token_len":5719,"char_repetition_ratio":0.14030018,"word_repetition_ratio":0.046622,"special_character_ratio":0.21555252,"punctuation_ratio":0.095337026,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99014175,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-20T07:05:20Z\",\"WARC-Record-ID\":\"<urn:uuid:e1326308-0c6a-4b7e-b6d0-9b76dd208d9f>\",\"Content-Length\":\"115083\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5b6ae1db-b547-4209-b319-244787006cdf>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8f3ac09-457b-41ac-8b62-cd82e589a2f0>\",\"WARC-IP-Address\":\"131.111.145.79\",\"WARC-Target-URI\":\"http://newton.cam.ac.uk/event/ascw01/timetable\",\"WARC-Payload-Digest\":\"sha1:MQBKCSNGAYOMOGOCUYQ3E3SU5Z6NXUMX\",\"WARC-Block-Digest\":\"sha1:DZF5BJTQN4GFT3JAXDDNJPOGLQ4GVTKT\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232255773.51_warc_CC-MAIN-20190520061847-20190520083847-00436.warc.gz\"}"} |
https://math.stackexchange.com/questions/1181509/undamped-spring-mass-system | [
"# Undamped spring mass system\n\nI have this study guide for an upcoming test for DE class I'm trying to figure out.\n\nA mass of 400 grams stretches a spring by 5 centimeters.\n(a) Find the spring constant k, the angular frequency ω, as well as the period T and frequency f of free undamped motion for this spring-mass system.\n(b) Find the general solution of the DE for the free spring-mass system.\n(c) Suppose that an exterior force of F(t) = 27sin(13t) Newtons\n\nacts on the spring-mass system. Find the equation of motion of the system if the mass initially is at rest in its equilibrium position.\n\nI know K is 784 (or do I need to convert to 5 centimeters to 0.05 meters?) and w is sqrt(k/m), but I'm not sure what I need to find T and F. I can find the general solution, but then I have no clue on what to do with part c.\n\n## 2 Answers\n\nYou don't need to convert because your units of mass are grams, so you are using CGS system of units. For a: $\\omega=2 \\pi/T$ For c: You have to add the new force to Newton's law.\n\nbefore you can set the equation you need $k,$ the spring constant. we will do all this in metric system. $k = \\frac{5/100}{400 \\times 9.8/1000} = 0.0127\\,N/m, \\omega^2 = \\frac{k}{m} = (0.1785)^2sec^{-2}, T = \\frac{2\\pi}{\\omega} = 35.185 \\, sec$\n\nequation of motion is $$m\\frac{d^2x}{dt^2} + kx = 0 \\to \\frac{d^2x}{dt^2} + \\omega^2 x = 0 \\text{ where x is deviation from equilibrium.}$$ the general solution is $$x = A\\cos(\\omega t - \\phi).$$\n\nthe equation of motion for a forced system is $$m\\frac{d^2x}{dt^2} + kx = 27 \\sin 13 t \\to \\frac{d^2x}{dt^2} + \\omega^2 x = \\frac{27 \\sin 13 t}m = 67.5 \\sin 13 t.$$\n\n• Is k not = mg/s, as opposed to your s/(mg)? – user3032755 Mar 9 '15 at 1:06\n• @user3032755, the unit of $kx$ that is $unit \\,of\\, k \\times m = Newton$ – abel Mar 9 '15 at 1:07\n• In your calculations you have the units of $k$ be $\\text{m/N}$. The answer should be 1 over that number – Dylan Mar 10 '15 at 2:41"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.92416155,"math_prob":0.99954987,"size":788,"snap":"2019-35-2019-39","text_gpt3_token_len":207,"char_repetition_ratio":0.12117347,"word_repetition_ratio":0.0,"special_character_ratio":0.25888324,"punctuation_ratio":0.07954545,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999794,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-18T19:20:00Z\",\"WARC-Record-ID\":\"<urn:uuid:56432a31-db08-494f-a522-f25fce41794e>\",\"Content-Length\":\"143837\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5f97ee91-10d7-43e7-a895-84bd89e91b14>\",\"WARC-Concurrent-To\":\"<urn:uuid:57157cc4-dd0c-4fb3-8588-02735d771a9b>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/1181509/undamped-spring-mass-system\",\"WARC-Payload-Digest\":\"sha1:GOLSBF5OTRFGUIMD7IZ3IBWHKGGDENP6\",\"WARC-Block-Digest\":\"sha1:Y7YJ7YF7SEYOAVOXV2WFQJ42ARV7INPH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027313996.39_warc_CC-MAIN-20190818185421-20190818211421-00042.warc.gz\"}"} |
https://www.varsitytutors.com/sat_ii_math_ii-help/equations-based-on-word-problems | [
"# SAT II Math II : Equations Based on Word Problems\n\n## Example Questions\n\n### Example Question #1 : Single Variable Algebra\n\nWhich of the following phrases can be written as the algebraic expression",
null,
"?\n\nThe absolute value of the difference of eight and a number\n\nThe absolute value of the product of negative eight and a number\n\nThe absolute value of the difference of a number and eight\n\nEight subtracted from the absolute value of a number\n\nEight decreased by the absolute value of a number\n\nThe absolute value of the difference of eight and a number\n\nExplanation:",
null,
"is the absolute value of",
null,
", which is the difference of eight and a number. Therefore,",
null,
"is \"the absolute value of the difference of eight and a number.\"\n\n### Example Question #1 : Equations Based On Word Problems\n\nWhich of the following phrases can be written as the algebraic expression",
null,
"?\n\nThe opposite of a number decreased by seven\n\nSeven decreased by the absolute value of a number\n\nSeven decreased by the opposite of a number\n\nThe absolute value of the difference of seven and a number\n\nThe opposite of the difference of seven and a number\n\nSeven decreased by the opposite of a number\n\nExplanation:",
null,
"is seven decreased by",
null,
", which is the opposite of a number; therefore,",
null,
"is \"seven decreased by the opposite of a number.\"\n\n### Example Question #1 : Single Variable Algebra\n\nWhich of the following phrases can be represented by the algebraic expression",
null,
"?\n\nOne divided into the difference of nine and a number\n\nNine decreased by the multiplicative inverse of a number\n\nThe multiplicative inverse of the difference of nine and a number\n\nThe multiplicative inverse of the difference of a number and nine\n\nNine less than by the multiplicative inverse of a number\n\nThe multiplicative inverse of the difference of nine and a number\n\nExplanation:",
null,
"is the multiplicative inverse of",
null,
", which is the difference of nine and a number. Therefore,",
null,
"is \"the multiplicative inverse of the difference of nine and a number\".\n\n### Example Question #1 : Equations Based On Word Problems\n\nWhich of the following phrases can be represented by the algebraic expression",
null,
"Ten less than three times the square root of a number\n\nThe cube root of the difference of a number and ten\n\nTen decreased by three times the square root of a number\n\nTen decreased by the cube root of a number\n\nTen less than the cube root of a number\n\nTen less than the cube root of a number\n\nExplanation:",
null,
"is ten less than",
null,
", which is the cube root of a number; therefore,",
null,
"is \"ten less than the cube root of a number\".\n\n### Example Question #1 : Single Variable Algebra\n\nWhich of the following phrases can be represented by the algebraic expression",
null,
"Twenty less than the square root of a number\n\nNegative twenty multiplied by the square root of a number\n\nTwenty decreased by the square root of a number\n\nThe square root of the difference of twenty and a number\n\nThe square root of the difference of a number and twenty\n\nTwenty decreased by the square root of a number\n\nExplanation:",
null,
"is twenty decreased by",
null,
", which is the square root of a number, so",
null,
"is \"twenty decreased by the square root of a number\".\n\n### Example Question #1 : Equations Based On Word Problems\n\nAdult tickets to the zoo sell for",
null,
"; child tickets sell for",
null,
". On a given day, the zoo sold",
null,
"tickets and raised",
null,
"in admissions. How many adult tickets were sold?",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Explanation:\n\nLet",
null,
"be the number of adult tickets sold. Then the number of child tickets sold is",
null,
".\n\nThe amount of money raised from adult tickets is",
null,
"; the amount of money raised from child tickets is",
null,
". The sum of these money amounts is",
null,
", so the amount of money raised can be defined by the following equation:",
null,
"To find the number of adult tickets sold, solve for",
null,
":",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"adult tickets were sold.\n\n### Example Question #1 : Single Variable Algebra\n\nSarah sells lemonade at the concession stands. She charges fifty cents per cup of lemonade, and twenty five cents for refills. What is the equation that represents the total that she will make from the lemonade stand using the variables cups",
null,
"and refills",
null,
"?",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Explanation:\n\nSarah charges fifty cents per cup of lemonade:",
null,
"Sarah charges twenty five cents for refills:",
null,
"Set up the equation by adding the totals.\n\nThe answer is:",
null,
"### All SAT II Math II Resources",
null,
""
] | [
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210995/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210996/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210997/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210998/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210976/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210977/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210978/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/210979/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/215651/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/215652/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/215653/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/215654/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219283/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219284/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219285/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219286/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219165/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219166/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219167/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/219168/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704844/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704845/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704846/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704847/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704842/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704839/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704840/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704843/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704841/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704839/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/131360/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704848/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/131361/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704849/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/131362/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704850/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/131363/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704851/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704852/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704853/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704854/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704855/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704856/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/704857/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010707/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010708/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010670/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010672/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010669/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010671/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010668/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010668/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010709/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010710/gif.latex",
null,
"https://vt-vtwa-assets.varsitytutors.com/vt-vtwa/uploads/formula_image/image/1010711/gif.latex",
null,
"https://vt-vtwa-app-assets.varsitytutors.com/assets/problems/og_image_practice_problems-9cd7cd1b01009043c4576617bc620d0d5f9d58294f59b6d6556fd8365f7440cf.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.92360693,"math_prob":0.98380023,"size":4036,"snap":"2019-51-2020-05","text_gpt3_token_len":839,"char_repetition_ratio":0.19940476,"word_repetition_ratio":0.45316803,"special_character_ratio":0.19920714,"punctuation_ratio":0.06728232,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994858,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,6,null,3,null,3,null,3,null,6,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,6,null,6,null,3,null,3,null,3,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-10T04:31:48Z\",\"WARC-Record-ID\":\"<urn:uuid:10c9fab5-5421-45c8-b743-c05aa19fa49c>\",\"Content-Length\":\"196554\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:14026f6d-8da7-408c-aa76-40c32bc9dce3>\",\"WARC-Concurrent-To\":\"<urn:uuid:19821386-c02d-40bf-9590-78e130005215>\",\"WARC-IP-Address\":\"13.249.44.44\",\"WARC-Target-URI\":\"https://www.varsitytutors.com/sat_ii_math_ii-help/equations-based-on-word-problems\",\"WARC-Payload-Digest\":\"sha1:B5SLKXRRV2U5ZVHWRSZJ5XRMD3G2U7LQ\",\"WARC-Block-Digest\":\"sha1:IFSA32JTOYOOTZULJ5TPU4TXZAURLEG7\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540525821.56_warc_CC-MAIN-20191210041836-20191210065836-00447.warc.gz\"}"} |
https://space.stackexchange.com/questions/35231/propagating-satellites-without-tle-in-python?noredirect=1 | [
"# Propagating satellites without TLE in python\n\nI know how to propagate satellites in python using ephem module (that uses TLE data). However, I am not sure how I would do the same for my own set of orbital parameters (i.e, without TLE data) in python.\n\nThanks.\n\n• Maybe you should somehow emulate real TLE data for the library? – peterh - Reinstate Monica Apr 2 '19 at 6:35\n• TLE is essentially Euler angles plus a couple non-essential parameters formatted into a rigidly defined text representation. If your orbital parameters are Euler angles, you should be able to turn them into TLE trivially. If you use a state vector (position+velocity), it gets a bit trickier. – SF. Apr 2 '19 at 6:58\n\nnote: Alas, PyEphem is deprecated, so to plot from TLE's use Skyfield, written/maintained by the same person as PyEphem. I show an example here.\n\n## Step 1: Convert your orbital parameters to a state vector\n\nA state vector is a 6 dimensional vector which is the combination of a position vector $$\\mathbf{x}$$ and a velocity vector $$\\mathbf{v}$$. In a deterministic system like a simple two-body orbit calculation, it's all you need to determine mathematically the orbit and how the body will move at any given time afterward.\n\nThis answer explains how to do this and contains a python script.\n\nand I think you can learn a lot from poliastro at http://docs.poliastro.space/en/latest/\n\nChoose the method that you are most comfortable with.\n\n## Step 2: Roll your own orbit propagator:\n\nI took the plotting from here and added a simple Python integration of an initial state vector from here or here or even here. I've only added the Earth's spherically symmetric force, if you want to add the effects due to oblateness for better accuracy, it's shown in two of those linked scripts. Look for the $$J_2$$ term.\n\nThe equation of motions are:\n\n$$\\dot{\\mathbf{x}} = \\mathbf{v}$$\n\n$$\\ddot{\\mathbf{x}} = - \\frac{\\mathbf{GM}}{x^2} \\mathbf{\\hat{x}} = -GM \\frac{\\mathbf{x}}{x^3}$$\n\nand those are scripted in the function deriv(X, t) which is independent of time. This is called by the integrator scipy.integrate.odeint. It uses variable step sizes internally, then re-interpolates to user-specified time points.\n\nOutput:\n\nperiod 6307.12290204 seconds or 105.118715034 minutes\ninclination 57.0 degrees\ninitial position [ 7378.137 0. 0. ] km\ninitial velocity [ 0. 4003.17019194 6164.34152276] m/s\ninitial speed 7350.13455625 m/s",
null,
"def makecubelimits(axis, centers=None, hw=None):\nlims = ax.get_xlim(), ax.get_ylim(), ax.get_zlim()\nif centers == None:\ncenters = [0.5*sum(pair) for pair in lims]\n\nif hw == None:\nwidths = [pair - pair for pair in lims]\nhw = 0.5*max(widths)\nax.set_xlim(centers-hw, centers+hw)\nax.set_ylim(centers-hw, centers+hw)\nax.set_zlim(centers-hw, centers+hw)\nprint(\"hw was None so set to:\", hw)\nelse:\ntry:\nhwx, hwy, hwz = hw\nprint(\"ok hw requested: \", hwx, hwy, hwz)\n\nax.set_xlim(centers-hwx, centers+hwx)\nax.set_ylim(centers-hwy, centers+hwy)\nax.set_zlim(centers-hwz, centers+hwz)\nexcept:\nprint(\"nope hw requested: \", hw)\nax.set_xlim(centers-hw, centers+hw)\nax.set_ylim(centers-hw, centers+hw)\nax.set_zlim(centers-hw, centers+hw)\n\nreturn centers, hw\n\ndef deriv(X, t):\nx, v = X.reshape(2, -1)\nacc = -GMe * x * ((x**2).sum())**-1.5\nreturn np.hstack((v, acc))\n\nimport numpy as np\nimport matplotlib.pyplot as plt\nfrom scipy.integrate import odeint as ODEint\nfrom mpl_toolkits.mplot3d import Axes3D\n\nhalfpi, pi, twopi = [f*np.pi for f in (0.5, 1, 2)]\n\nkm = 0.001\nGMe = 3.986E+14 # m^3/s^2\nRe = 6378137. # meters\nalt = 1E+06 # meters\na = Re + alt\nT = twopi * np.sqrt(a**3/GMe)\n\nv0 = np.sqrt(GMe/a)\nincdegs = 57.\n\ncinc, sinc = [f(inc) for f in (np.cos, np.sin)]\n\nX0 = np.array([Re+alt, 0, 0] + [0, cinc*v0, sinc*v0])\n\nprint 'period {} seconds or {} minutes'.format(T, T/60.)\nprint 'inclination {} degrees'.format(incdegs)\nprint 'initial position {} km'.format(km * X0[:3])\nprint 'initial velocity {} m/s'.format(X0[3:])\nprint 'initial speed {} m/s'.format(v0)\n\ntimes = np.linspace(0, T, 201)\n\nanswer, info = ODEint(deriv, X0, times, full_output=True)\n\ntheta = np.linspace(0, twopi, 201)\ncth, sth, zth = [f(theta) for f in (np.cos, np.sin, np.zeros_like)]\nlon0 = Re*np.vstack((cth, zth, sth))\nlons = []\nfor phi in rads*np.arange(0, 180, 15):\ncph, sph = [f(phi) for f in (np.cos, np.sin)]\nlon = np.vstack((lon0*cph - lon0*sph,\nlon0*cph + lon0*sph,\nlon0) )\nlons.append(lon)\n\nlat0 = Re*np.vstack((cth, sth, zth))\nlats = []\nfor phi in rads*np.arange(-75, 90, 15):\ncph, sph = [f(phi) for f in (np.cos, np.sin)]\nlat = Re*np.vstack((cth*cph, sth*cph, zth+sph))\nlats.append(lat)\n\nif True:\nfig = plt.figure(figsize=[10, 8]) # [12, 10]\n\nax = fig.add_subplot(1, 1, 1, projection='3d')\n\nax.plot(km*x, km*y, km*z)\nfor x, y, z in lons:\nax.plot(km*x, km*y, km*z, '-k')\nfor x, y, z in lats:\nax.plot(km*x, km*y, km*z, '-k')\n\ncenters, hw = makecubelimits(ax)\n\nprint(\"centers are: \", centers)\nprint(\"hw is: \", hw)\n\nplt.show()\n\n• Disclaimer: poliastro author Two minor details: matplotlib 3D capabilities are not enough to properly plot orbits (as can be seen in your image), so I recommend using Plotly instead (poliastro can do it). Also, OrbitalPy is unmaintained (last commit 2015) whereas poliastro is still active. – astrojuanlu Apr 2 '19 at 15:12\n• @astrojuanlu please feel free to add another answer, or to edit this one. Thanks! – uhoh Apr 2 '19 at 15:14"
] | [
null,
"https://i.stack.imgur.com/iX2d6.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6854763,"math_prob":0.9868253,"size":4920,"snap":"2020-10-2020-16","text_gpt3_token_len":1624,"char_repetition_ratio":0.098657444,"word_repetition_ratio":0.12551723,"special_character_ratio":0.33699188,"punctuation_ratio":0.20070733,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9986274,"pos_list":[0,1,2],"im_url_duplicate_count":[null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-25T09:57:10Z\",\"WARC-Record-ID\":\"<urn:uuid:cb0e4c3a-1e25-442a-8090-0b1ea9eedf46>\",\"Content-Length\":\"151949\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e10c3fb5-ddf2-4d87-a70c-765c5db12bb0>\",\"WARC-Concurrent-To\":\"<urn:uuid:1651fcbd-583f-4701-b931-5b70a1a13d46>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://space.stackexchange.com/questions/35231/propagating-satellites-without-tle-in-python?noredirect=1\",\"WARC-Payload-Digest\":\"sha1:T55RHNL4YXE7S6GD67JKK6KZZJE4HOON\",\"WARC-Block-Digest\":\"sha1:ALVCRGSFV3Q2DHT7T4V5ADY2QEFRDECM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146064.76_warc_CC-MAIN-20200225080028-20200225110028-00227.warc.gz\"}"} |
https://blog.robofied.com/identity-function/ | [
"",
null,
"# Identity Function\n\nAn Identity Function or a Linear Function in which the output remains the same as the input.",
null,
"x: an input data point",
null,
"Range:",
null,
"``````#Identity Fucntion\ndef Identity(x):\n'''\nParameters:\nx (real number) input data point\nReturns:\nx\n'''\nreturn x ``````\n\nUse cases:\n\nUsed to build simple neural architectures.\n\nPros:\n\nLess computational power.\n\nIdeal for model interpretability.\n\nCons:\n\nSince it is a linear function, the neural network model can’t find complex or non-linear patterns in the data. Even when the network is stacked up with multiple layers of neurons, the network will still be a linear model.\n\n## Share\n\n### Sigmoid Activation Function\n\nA Sigmoid Function is also known as the Logistic Function or Squashing Function. It is"
] | [
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.68948656,"math_prob":0.9377839,"size":579,"snap":"2020-45-2020-50","text_gpt3_token_len":127,"char_repetition_ratio":0.1252174,"word_repetition_ratio":0.0,"special_character_ratio":0.21416235,"punctuation_ratio":0.13913043,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.979519,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-24T11:45:18Z\",\"WARC-Record-ID\":\"<urn:uuid:f13ea892-9c9e-4a7e-884d-563e00e51f82>\",\"Content-Length\":\"65175\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aade2d19-39e2-46eb-b79f-3b7f5f507182>\",\"WARC-Concurrent-To\":\"<urn:uuid:0173df4a-8e58-4144-b8f1-35538252a9c5>\",\"WARC-IP-Address\":\"104.28.19.125\",\"WARC-Target-URI\":\"https://blog.robofied.com/identity-function/\",\"WARC-Payload-Digest\":\"sha1:6NESZYH2W3TD5RTRF6EIRTUNBI4WS3GQ\",\"WARC-Block-Digest\":\"sha1:46DHOCIXOKR6DYZYUVPPDRWQXLRKUQJY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141176256.21_warc_CC-MAIN-20201124111924-20201124141924-00028.warc.gz\"}"} |
https://www.askiitians.com/forums/Modern-Physics/18/27632/charges.htm | [
"",
null,
"×",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"#### Thank you for registering.\n\nOne of our academic counsellors will contact you within 1 working day.\n\nClick to Chat\n\n1800-1023-196\n\n+91-120-4616500\n\nCART 0\n\n• 0\n\nMY CART (5)\n\nUse Coupon: CART20 and get 20% off on all online Study Material\n\nITEM\nDETAILS\nMRP\nDISCOUNT\nFINAL PRICE\nTotal Price: Rs.\n\nThere are no items in this cart.\nContinue Shopping\n```\nIf 3 different but eqeul charges are forming an equilateral triangle, then where inside the triangle the potential would be 0 and why????? Pls explain!!!!!!!\n\n```\n9 years ago\n\n```\t\t\t\t\t\t\thi,\npotential due to three chrges at a point is= -kq/r1-kq/r2-kq/r3.\nthus potential=-kq(1/r1+1/r2+1/r3)\nif potential has to be zero then that point should be at infinity ( r1r2r3 should be at infinity)\nplzz approve if you like the answer\n```\n9 years ago\n```\t\t\t\t\t\t\tdear shiven , first u draw the figure according to these steps\n1)draw a equilateral triangle ABC such that its base AB is on x axis , center of base is at origin...third vertice (C) is on y axis ...\n2)y axis divides the base in two halves , AO ,BO ...\n3) consider any point P(0,y) on y axis then\n4) place -q , -q at A,B & q at C...\nnow , potential at P will be\nV = k(-q)/AP + K-(q)/BP + kq/PC .......1\nAO = BO = a/2\nPC = asin60 - y = [aroot3/2 - y] ........2\nAP = BP = [y^2 + a^2/4]^1/2 ......3 ( by pythagorus theorem)\nfor potential to become 0 , eq 1 = 0 so\nq/AP + q/BP = q/PC\n2/AP = 1/PC\nAP = 2pC .........4\nputting values of AP,PC from eq 2 & 3 we get a quadratic expression\n3y^2 - (4root3a)y + 11a^2/4 = 0\n\nfrom here Y = a[4root3 +(-) root15]/6\n= a[ 4root3 - root15]/6 or [4root3 + root15]/6 ( not acceptable coz this point lies ouside)\n\ntherefore the only point is Y = a[4root3-root15]/6\n\nthis is the required point where potential will be zero ...\n```\n9 years ago\nThink You Can Provide A Better Answer ?\n\n## Other Related Questions on Modern Physics\n\nView all Questions »",
null,
"",
null,
"### Course Features\n\n• 101 Video Lectures\n• Revision Notes\n• Previous Year Papers\n• Mind Map\n• Study Planner\n• NCERT Solutions\n• Discussion Forum\n• Test paper with Video Solution",
null,
"",
null,
"### Course Features\n\n• 110 Video Lectures\n• Revision Notes\n• Test paper with Video Solution\n• Mind Map\n• Study Planner\n• NCERT Solutions\n• Discussion Forum\n• Previous Year Exam Questions"
] | [
null,
"https://www.askiitians.com/resources/images/badge.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/user.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/envelope.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/phone-receiver.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/reading.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/reading.png",
null,
"https://files.askiitians.com/static/ecom/cms/bottom/physics-12.png",
null,
"https://www.askiitians.com/Resources/images/youtube_placeholder.jpg",
null,
"https://files.askiitians.com/static/ecom/cms/right/physics-11.jpg",
null,
"https://www.askiitians.com/Resources/images/youtube_placeholder.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7947042,"math_prob":0.9806863,"size":3089,"snap":"2020-45-2020-50","text_gpt3_token_len":1034,"char_repetition_ratio":0.11345219,"word_repetition_ratio":0.822335,"special_character_ratio":0.3629006,"punctuation_ratio":0.18364611,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96313536,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-24T18:24:19Z\",\"WARC-Record-ID\":\"<urn:uuid:f2418d0a-a92a-435f-87de-90f29907dd0b>\",\"Content-Length\":\"229593\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b5647b75-27e3-44bd-b71d-0bb7b11cb353>\",\"WARC-Concurrent-To\":\"<urn:uuid:99efc9b2-01d4-4db5-b535-00da5a13bdcb>\",\"WARC-IP-Address\":\"3.7.36.8\",\"WARC-Target-URI\":\"https://www.askiitians.com/forums/Modern-Physics/18/27632/charges.htm\",\"WARC-Payload-Digest\":\"sha1:MM2P4XDK4BSMKUFFAX77GSE4QW5AZBBR\",\"WARC-Block-Digest\":\"sha1:ACKRL7FVE5T6D3E4X5JQZ5CE3NKQN6EZ\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107884322.44_warc_CC-MAIN-20201024164841-20201024194841-00065.warc.gz\"}"} |
http://bartleylawoffice.com/recommendations/what-are-the-3-forms-of-ohms-law.html | [
"# What are the 3 forms of ohm’s law?\n\n## What are the three forms of Ohms law?\n\nThere are basically three types of Ohm’s law formulas or equations.\n\nThey are;\n\n• I = V / R.\n• V = IR.\n• R = V / R.\n\n## What is the correct form of Ohm’s law?\n\nOhm’s law states that the voltage or potential difference between two points is directly proportional to the current or electricity passing through the resistance, and directly proportional to the resistance of the circuit. The formula for Ohm’s law is V=IR.\n\n## What are the three ways to write the Ohm’s law formula?\n\nOhm’s law can be expressed as an equation three ways:\n\n• I (current) = V/R.\n• V = IR.\n• R = V/I.\n\n## What is Ohm’s law in physics?\n\nOhm’s Law is a formula used to calculate the relationship between voltage, current and resistance in an electrical circuit. To students of electronics, Ohm’s Law (E = IR) is as fundamentally important as Einstein’s Relativity equation (E = mc²) is to physicists. E = I x R.\n\n## What is Watt’s law?\n\nWatt’s Law: States the relationships between power (watts), current (amps) and voltage. Watts = Volts x Amps.\n\n## What do you mean by 1 ohm?\n\nThe ohm is defined as an electrical resistance between two points of a conductor when a constant potential difference of one volt, applied to these points, produces in the conductor a current of one ampere, the conductor not being the seat of any electromotive force.\n\n## How do I calculate resistance?\n\nThe resistance R in ohms (Ω) is equal to the voltage V in volts (V) divided by the current I in amps (A): Since the current is set by the values of the voltage and resistance, the Ohm’s law formula can show that if you increase the voltage, the current will also increase.\n\nYou might be interested: What is the law on drones\n\n## What is the formula for current?\n\nCurrent is usually denoted by the symbol I. Ohm’s law relates the current flowing through a conductor to the voltage V and resistance R; that is, V = IR. An alternative statement of Ohm’s law is I = V/R.\n\n## What is the basic principle of Ohm’s law?\n\nOhm’s Law states that the current flowing in a circuit is directly proportional to the applied potential difference and inversely proportional to the resistance in the circuit. In other words by doubling the voltage across a circuit the current will also double.\n\n## How do you explain ohms?\n\nOhm defines the unit of resistance of “1 Ohm” as the resistance between two points in a conductor where the application of 1 volt will push 1 ampere, or 6.241×10^18 electrons. This value is usually represented in schematics with the greek letter “Ω”, which is called omega, and pronounced “ohm”.\n\n## What is Ohm’s law easy definition?\n\nOhm’s law. [ ōmz ] A law relating the voltage difference between two points, the electric current flowing between them, and the resistance of the path of the current. Mathematically, the law states that V = IR, where V is the voltage difference, I is the current in amperes, and R is the resistance in ohms.\n\n## How do I calculate power?\n\nPower is a measure of the amount of work that can be done in a given amount of time. Power equals work (J) divided by time (s). The SI unit for power is the watt (W), which equals 1 joule of work per second (J/s)."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9407692,"math_prob":0.99599075,"size":3082,"snap":"2023-40-2023-50","text_gpt3_token_len":740,"char_repetition_ratio":0.16504224,"word_repetition_ratio":0.014234875,"special_character_ratio":0.23556133,"punctuation_ratio":0.10534591,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998741,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-02T06:11:05Z\",\"WARC-Record-ID\":\"<urn:uuid:476bcf44-2738-4548-a1b5-b7dd99187650>\",\"Content-Length\":\"65691\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:380827c7-1ecb-4222-8a39-402abf9c384c>\",\"WARC-Concurrent-To\":\"<urn:uuid:fa8144a5-13ba-490a-848b-f66ce3729db8>\",\"WARC-IP-Address\":\"172.67.157.116\",\"WARC-Target-URI\":\"http://bartleylawoffice.com/recommendations/what-are-the-3-forms-of-ohms-law.html\",\"WARC-Payload-Digest\":\"sha1:AJ4OWB6B6RNAAOB3QJK32ZP4ASBTRRCX\",\"WARC-Block-Digest\":\"sha1:GNHQFLHXBKHNFFYXZGVI7KRSRNYJZWKR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100327.70_warc_CC-MAIN-20231202042052-20231202072052-00504.warc.gz\"}"} |
https://px.01ny.cn/m/h_812d/ | [
"",
null,
"",
null,
"•",
null,
"首页\n•",
null,
"培训机构",
null,
"",
null,
"",
null,
"### 高三物理辅导优学选课平台\n\n612家高三物理辅导机构,243门高三物理辅导课程 ,百余名资深的教育顾问助您轻松选学校\n\n• 城市\n• 高三物理辅导\n• 小学辅导\n• 小升初\n• 初中辅导\n• 中考辅导\n• 高中辅导\n• 高考辅导\n• 艺考生文化课\n• 一对一辅导\n• 国际学校\n• 高考复读\n• 托管班\n• 暑假辅导\n• 特色辅导\n• 小班辅导\n• 自主招生辅导\n• 寒假辅导\n• 军考辅导\n• 学前教育\n• 春季高考\n• 中考体育辅导\n• 一年级辅导\n• 二年级辅导\n• 三年级辅导\n• 五年级辅导\n• 四年级辅导\n• 六年级辅导\n• 初一辅导\n• 初二辅导\n• 初三辅导\n• 高一辅导\n• 高二辅导\n• 高三辅导\n• 全托学校\n• 在线一对一\n• 高考志愿填报\n• 中考复读\n• 一年级语文辅导\n• 一年级数学辅导\n• 一年级英语辅导\n• 二年级语文辅导\n• 二年级数学辅导\n• 二年级英语辅导\n• 三年级语文辅导\n• 三年级数学辅导\n• 三年级英语辅导\n• 五年级语文辅导\n• 五年级数学辅导\n• 五年级英语辅导\n• 四年级语文辅导\n• 四年级数学辅导\n• 四年级英语辅导\n• 六年级语文辅导\n• 六年级数学辅导\n• 六年级英语辅导\n• 初一语文辅导\n• 初一数学辅导\n• 初一英语辅导\n• 初一科学辅导\n• 初一生物辅导\n• 初一地理辅导\n• 初二语文辅导\n• 初二数学辅导\n• 初二英语辅导\n• 初二物理辅导\n• 初二科学辅导\n• 初二生物辅导\n• 初二地理辅导\n• 初三语文辅导\n• 初三数学辅导\n• 初三英语辅导\n• 初三物理辅导\n• 初三化学辅导\n• 高一数学辅导\n• 高一语文辅导\n• 高一英语辅导\n• 高一物理辅导\n• 高一化学辅导\n• 高一生物辅导\n• 高一地理辅导\n• 高一政治辅导\n• 高一历史辅导\n• 高二语文辅导\n• 高二数学辅导\n• 高二英语辅导\n• 高二物理辅导\n• 高二化学辅导\n• 高二生物辅导\n• 高二政治辅导\n• 高二历史辅导\n• 高二地理辅导\n• 高三数学辅导\n• 高三语文辅导\n• 高三英语辅导\n• 高三物理辅导\n• 高三化学辅导\n• 高三生物辅导\n• 高三政治辅导\n• 高三历史辅导\n• 高三地理辅导\n• 北京\n• 天津\n• 河北\n• 陕西\n• 辽宁\n• 吉林\n• 黑龙江\n• 山东\n• 上海\n• 江苏\n• 浙江\n• 安徽\n• 福建\n• 江西\n• 河南\n• 湖北\n• 湖南\n• 广东\n• 重庆\n• 四川\n\n### 最新机构",
null,
"40门课程 人气数:0",
null,
"25门课程 人气数:0",
null,
"85门课程 人气数:0",
null,
"45门课程 人气数:0",
null,
"6门课程 人气数:0",
null,
"36门课程 人气数:0\n\n### 飙升榜\n\n• 机构\n• 课程\n• 动态\n• 专题",
null,
"1",
null,
"2",
null,
"3",
null,
"4",
null,
"5",
null,
"6\n\n• 热门城市\n• 小贴士"
] | [
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_lcbdh.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_cb_logo.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_cb_sy.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_cb_pxjg.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_logo.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_rsearch.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_csjh_banner.png",
null,
"https://px.01ny.cn/upimages/8B/4F/44/69/6AAD203A.jpeg",
null,
"https://px.01ny.cn/upimages/2E/6E/D9/9E/E6DC0D6E.jpeg",
null,
"https://px.01ny.cn/upimages/CF/F3/29/69/1DBF2181.jpeg",
null,
"https://px.01ny.cn/upimages/4E/2B/B3/E9/6944C227.jpeg",
null,
"https://px.01ny.cn/upimages/0C/8E/61/45/A4908611.jpeg",
null,
"https://px.01ny.cn/upimages/1E/71/84/42/97D2A02A.jpeg",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_phb_1.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_phb_2.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_phb_3.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_phb_more.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_phb_more.png",
null,
"https://px.01ny.cn/statics/wap/images/nyw_h5_phb_more.png",
null
] | {"ft_lang_label":"__label__zh","ft_lang_prob":0.9496258,"math_prob":0.40463108,"size":190,"snap":"2020-24-2020-29","text_gpt3_token_len":196,"char_repetition_ratio":0.20967741,"word_repetition_ratio":0.0,"special_character_ratio":0.25789472,"punctuation_ratio":0.13793103,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96233654,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,10,null,8,null,null,null,null,null,null,null,10,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-31T15:54:53Z\",\"WARC-Record-ID\":\"<urn:uuid:40afe6fa-c985-4974-87be-3152a03002ca>\",\"Content-Length\":\"49515\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:244cea1b-a942-43a7-b0d5-bb74e62f6380>\",\"WARC-Concurrent-To\":\"<urn:uuid:837fad7d-1dd4-41dd-bbfb-d139ae898617>\",\"WARC-IP-Address\":\"121.207.229.189\",\"WARC-Target-URI\":\"https://px.01ny.cn/m/h_812d/\",\"WARC-Payload-Digest\":\"sha1:PEBMFENWMKPSUZ2J32HRJJ7TQPD2HAXH\",\"WARC-Block-Digest\":\"sha1:ONEMEBGUHRZMF556RWIGDQRNNFTKQB6S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347413551.52_warc_CC-MAIN-20200531151414-20200531181414-00507.warc.gz\"}"} |
http://xelerus.de/index.php?s=functions&function=16 | [
"Functions Documentation",
null,
"",
null,
"Name divide Syntax (divide x y) -> z Argument List x: The dividend of the two numbers. y: The divisor of the two numbers. Returns z: The result of the two numbers divided with everything after the decimal point dropped. Category math Description Returns the result of the two numbers divided and dropping everything after the decimal point. Example `(divide 5 3)` This will return a 1. `(divide 5 2)` This will return a 2. `(divide 5 (add 1 1))` This will also return a 2. Comment Basic math function. If you hear the term integer division this is what that is referring too."
] | [
null,
"http://xelerus.de/images/icons/view.png",
null,
"http://xelerus.de/images/icons/edit_data.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6410635,"math_prob":0.97880447,"size":614,"snap":"2020-45-2020-50","text_gpt3_token_len":155,"char_repetition_ratio":0.1557377,"word_repetition_ratio":0.03809524,"special_character_ratio":0.26058632,"punctuation_ratio":0.102564104,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9986628,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-22T05:40:37Z\",\"WARC-Record-ID\":\"<urn:uuid:0c91194d-04f7-4513-9de7-ad2ae722dde9>\",\"Content-Length\":\"9568\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:26532607-1f22-44ea-83c6-fec3b4ef069d>\",\"WARC-Concurrent-To\":\"<urn:uuid:49056844-7695-4efc-950f-3b0946abd1c4>\",\"WARC-IP-Address\":\"109.237.132.20\",\"WARC-Target-URI\":\"http://xelerus.de/index.php?s=functions&function=16\",\"WARC-Payload-Digest\":\"sha1:7U2GPX6RLOCJZISN4RNHVLM6PNZ6JIGI\",\"WARC-Block-Digest\":\"sha1:WUQGOL3MGQNBHMKJIW7GN2VRMFGGYND5\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107878921.41_warc_CC-MAIN-20201022053410-20201022083410-00009.warc.gz\"}"} |
http://ahay.org/blog/2008/08/03/extending-python-interface/ | [
"Work is under way on extending the Python interface to Madagascar. With new tools, you should be able to use an interactive Python session rather than a Unix shell to run Madagascar modules. Here are some examples:\n\nimport m8r as sf\nimport numpy, pylab\n\nf = sf.spike(n1=1000,k1=300)\n\n# sf.spike is an operator\n# f is an RSF file object\n\nf.attr()\n\n# Inspect the file with sfattr\n\nb = sf.bandpass(fhi=2,phase=1)[f]\n\n# Now f is filtered through sfbandpass\n\nc = sf.spike(n1=1000,k1=300).bandpass(fhi=2,phase=1)\n\n# c is equivalent to b but created with a pipe\n\n# g is a Vplot file object\n\ng.show()\n\n# Display it on the screen\n\nd = b - c\n\n# Elementary arithmetic operations on files are defined\n\ng = g + d.wiggle(wanttitle=False)\n\n# So are operations on plots\n\ng.show()\n\n# This shows a movie\n\npylab.show(pylab.plot(b))\nc = numpy.clip(b,0,0.01)\n\n# RSF file objects can be passed to pylab or numpy\n\nc.attr()\ns = c[300:310]\n\nprint s\n\n# Taking a slice outputs a numpy array\n\nc = sf.clip(clip=0.01)[b]\nc.attr()\n\n# Alternatively, apply sfclip\n\n\nFor doing reproducible research, one can also use the new syntax inside SConstruct files, as follows:\n\nfrom rsf.proj import *\nimport m8r as sf\n\nFlow('filter',None,sf.spike(n1=1000,k1=300).bandpass(fhi=2,phase=1))",
null,
""
] | [
null,
"http://ahay.org/blog/wp-content/uploads/2015/08/sage1.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7056257,"math_prob":0.9442298,"size":1533,"snap":"2020-24-2020-29","text_gpt3_token_len":453,"char_repetition_ratio":0.086330935,"word_repetition_ratio":0.0,"special_character_ratio":0.2941944,"punctuation_ratio":0.14285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99713224,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-29T16:47:17Z\",\"WARC-Record-ID\":\"<urn:uuid:7af87ded-3b21-493d-a694-206b13430ea6>\",\"Content-Length\":\"47059\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:473f1f95-474d-44bb-a942-350424f1a980>\",\"WARC-Concurrent-To\":\"<urn:uuid:eb335210-8f7d-4ac7-83cc-8c27bc911734>\",\"WARC-IP-Address\":\"66.33.210.126\",\"WARC-Target-URI\":\"http://ahay.org/blog/2008/08/03/extending-python-interface/\",\"WARC-Payload-Digest\":\"sha1:VPAOW2UVOSR6A3MUHJICMVVMHIW6X7C3\",\"WARC-Block-Digest\":\"sha1:MWKGHLSY5BINGYVJVFESNLHWXPJJCST2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347405558.19_warc_CC-MAIN-20200529152159-20200529182159-00064.warc.gz\"}"} |
http://en.communpedia.org/Transformation_problem | [
"#### Transformation problem\n\nHome » Marxist theory » Transformation problem\nThe transformation problem is a problem in classical and Marxian economics. It appears in the work of Ricardo where he notes a difficulty in equating values, as given by his labour theory of value (LTV), to prices – the problem there being that given reasonable assumptions about competition, differences in the proportion of labour to non-labour costs between industries will skew the value-price relation between industries. This kink in the LTV lay unresolved by Ricardo and his immediate successors\n\nIn somewhat more detail, the problem is that, according to the LTV, the value of an industry’s output is proportional to the labour that the industry uses; but equalisation of the profit rate by competition demands that the price of its output be proportional to the labour and non-labour capital that it uses (since the rate of profit, π = [profit]/[all costs].) So an industry with a high proportion of non-labour costs (a `capital-intensive’ industry) for example, must either sell its output above value or have a subnormal profit rate. Non-labour capital costs apparently drive a wedge between value and price. Hence the LTV and profit-rate equalisation are apparently in conflict.\n\nAttention to the transformation problem greatly intensified after the publication of volume III of Marx’s Capital in 1894 because chapter nine of that book contained what was taken by some to be a solution to the Ricardian problem. Marx held that in economy-wide aggregate, price equals value, but that in particular sectors or industries output might sell at above or below value. Specifically, in `capital intensive’ industries, it would sell at above value and in labour-intensive industries it would sell at below value. Importantly, he saw this as amounting to a transfer of surplus value from the labour-intensive to the `capital intensive’ sector; the labour-intensive sector does nor `realise’ all of the surplus value that it produces, while the `capital-intensive’ sector realises not only all of the surplus value it produces, but the unrealised portion from the labour intensive sector as well.\n\nAnti-Marxists, noteably Böhm-Bawerk, quickly pounced on perceived flaws in Marx’s analysis, characterising it as a failed defence of the unworkable LTV, and contending furthermore that the entire structure of Marxian economic theory could not stand because it incorporated the LTV as a premise. The Marxian defence to this lay in two directions. One accepted the general conceptual framework of the Böhm-Bawerk-type criticisms, but provided solutions to the transformation problem that were mathematical improvements over Marx’s. This has resulted in solutions that are, arguably, adequate, although so far none meet all of the restrictive conditions that might ideally be applied. The other line of defence was to challenge Böhm-Bawerk’s conceptual framework, claiming that he had not understood what Marx was trying to do in Chapter IX of Capital III. This line holds that Marx’s purpose there was not to provide a theory of price determination at all, but to investigate the post-production distribution of surplus value throughout the economy – an investigation made important by the fact that this distribution tends to obscure, or mystify, the original creation of surplus value by labour during the production process. This investigation is seen to occupy much of Capital III; in Chapter IX, proponents of this line contend, price shifts are considered by Marx only as one means by which surplus-value transfers might be accomplished. Viewed in this light, the value-price transformation is of merely auxilliary significance to the over-all economic theory, and any sketchiness in Marx’s mathematics of the value-price transformation cannot be considered to strike at fundamentals. This line of defence is associated with a Hegelian-dialectical reading of Marx which sees Capital volume I as presenting concepts such as value and surplus value at a very abstract level that employs particular examples only as representatives of society-wide aggregate behaviour, whereas Capital volume III is at a more concrete level of analysis where some particulars are introduced – the important ones for this discussion being different industrial sectors and differing proportions between labour and non-labour capital – and the effects of these particulars in modifying, or imposing further ‘determinations’ on, the abstract principles is considered. Regarding the LTV, it is argued that although in Capital volume I Marx sometimes, à la Ricardo, equated prices with labour times, this was only done as a simplifying assumption at the most abstract level, and, as the later volumes make clear, he did not think that real prices are determined only by labour times, not even on long-term average: in short, Marx did not hold a Ricardian-type LTV.\n\nA more recent criticism of Marx, noteably by Joan Robinson and Sraffians such as Ian Steedman (1977), is that although it is possible to adequately compute prices using the Marxian transformation-problem method, that method is needlessly roundabout because it is possible to go directly from specifications of physical quantities to prices by using, eg., the mathematical techniques of Sraffa, without going through the intermediate step of considering values at all. On this view, value is an ‘unneccessary detour’, a redundant concept that would be best forgotten about. This of course would leave a large body of Marxian discourse looking rather pointless. Against this it is argued that, although the concept may not be needed for the determination of price, it remains useful for understanding other dynamics of capitalism, for linking quantitative economics to considerations of how humans expend their life energies, and for linking economics to ethics.\n\nA still different hue is cast on the debate by Goregnani (1991), who believes there is an epidemic among readers of Marx, including most of the partisans on both sides of the debate just mentioned, which consists in their thinking that the concept of value was given a prominent place by Marx because of its sociological and philosophical implcations. Goregnani says that on the contrary, Marx employed the concept of value because of its importance to a technical issue in classical economics. At that time the technique of simultaneous linear equations, to say nothing of Sraffa’s methods, had not yet arrived in economics, and thus the result established by them that the wage and the rate of profit are not independent but that, other things being equal, a rise in one will result in a fall in the other, was not well recognised. Adam Smith’s method of adding up factor costs to obtain price, for example, treated them as being independent. Ricardo, and then more firmly Marx, introduced value as a means of demonstrating their interdependent, antagonistic, relation.\n\n 1 Ricardian problem 2 Bortkiewicz-Sweezy solution 3 Makoto Itoh solution 4 Notes 5 Further reading 5.1 On paper 5.2 Free on the internet\n\n## Ricardian problem\n\nCompetitive assumptions:\n\n1. Assume that competition for investment causes the rate of profit to be the same in all industries.\n2. Assume that labour mobility causes the hourly wage to be the same in all industries.\n\nPrice of production of commodity:\n\n```p = c + W + s Where: p = price of production of commodity\nc = non-labour costs of capitalist\nw = wage costs of capitalist\ns = gross profit\n```\n\nRate of profit:\n\n``` s\nπ = ------- = same in all industries\nc + w\n```\n\nCombinig above formulae:\n\n```p = (c + w)(1 + π)\np = (c + w)(k1) where: k1 is a constant = 1 + π\n\nResult A:\n\np = k1·c + k1·w\n---------------\n```\n\nBut, by labour theory of value,\nvalue-added is proportional to time worked,\nand by assumption of equal hourly wage,\ntime worked is proportional to wage, so:\n\n```n α w where: n = value added\nn = k2·w w = wage\nk2 = a constant\n```\n\nValue of commodity:\n\n```v = c + n\n\nResult B:\n\nv = c + k2·w\n------------\n```\n\nComparing results A and B we see that price (p) and value (v) are given by different formulae that are incommensurable except in very particular cases (such as k1 = k2 = 1 or c = 0). In the realistic case of positive profit, k1 and k2 will both be greater than one, which will cause prices to be relatively high, compared to values, in industries with relatively high non-labour costs, and prices will be relatively low in labour-intensive industries.\n\nThis result is at variance with the simple assumption, used elsewhere by Ricardo, that values are related to prices by a simple proportionality constant that is the same in all industries. The discrepancy was noted by Ricardo but he did not offer a solution.\n\n## Bortkiewicz-Sweezy solution\n\nStarted by L. von Bortkiewicz (1868-1931) and revived by Paul Sweezy in his The Theory of Capitalist Development (1942). Their contribution is to convert the cost prices (ci + vi) in each department i from values, which is the form Marx left them in, to prices. They do this by introducing three unknowns, x, y, z which designate the ratio of price of production to value of output, in each of the three departments I, II, III respectively. This leads to a system of three equations:\n\nI c1x + v1y + r(c1x + v1y) = (c1 + c2 + c3)x\n\nII c2x + v2y + r(c2x + v2y) = (v1 + v2 + v3)y\n\nIII c3x + v3y + r(c3x + v3y) = (s1 + s2 + s3)z\n\nNote: c is constant capital; v, variable capital; s, surplus value; r, rate of profit.\n\nThere are three equations but four unknowns (x, y, z, r). To obtain a solution the theorists set z = 1. For convenience the following notations are introduced:\n\nσ = 1 + r\n\nf = c/v\n\ng = (c + v + s)\n\nExpressed using these notations the solution is:\n\nσ = ( -(f2g1 + g2) + [(f2g1 + g2)2 + 4(f1 – f2)g1g2]1/2 ) / 2(f1 – f2)\n\nSweezy gave the following numerical example:\n\nValue calculation\nDepartment of production Constant capital (ci) Variable capital (Vi) Surplus-value (si) Value of products (ai)\nI. Producers goods 225 90 60 375\nII. Necessary consumer goods 100 120 80 300\nIII. Luxury consumer goods 50 90 60 200\nTotal 375 300 200 875\n\nGiven the above numbers, it can be calculated that, σ = 5/4, r = 25 percent, x = 32/25, y = 16/15. From this is calculated the prices (as distinguished from the values) of each item in each department:\n\nPrice calculation\nDepartment of production Constant capital (cix) Variable capital (viy) Profit (pi) Price of product (Pi)\nI. Producers goods 288 96 96 480\nII. Necessary consumer goods 128 128 64 320\nIII. Luxury consumer goods 64 96 40 200\nTotal 480 320 200 1000\n\nSource: information is as reprised in Makoto Itoh, The Basic Theory of Capital (1988), pp 211-213.\n\n## Makoto Itoh solution\n\nMakoto Itoh has adressed some problems still remaining after the Bortkiewicz-Sweezy solution (and the debates following it) by making careful and explicit distinction between the form of value, which is exchangeability, or `the request of commodities to be exchanged’, and the substance of value, which is embodied labour time. This results in careful separation of the value and price domains.\n\nItoh gives a numerical example consisting of three tables of numbers (rather than Bortkiewicz-Sweezy’s two). His first table is the same as in the Bortkiewicz-Sweezy (B-S) example, using the same numbers, except that he is very explicit – leaves no ambiguity – that the units in the table are labour time (millions of hours), not, say, a monetary or quasi-monetary unit; and he labels the table `substance of value produced (ai)’. His second table is like the B-S second table, except Itoh chooses a value of z = 1/2 rather than 1, so that all numbers in this table are exactly half those in the B-S second table. He is explicit that the units in this table are money (millions of dollars); and he labels the table `prices of production (Pi)’.\n\nThe big difference between Itoh, on one hand, and Bortkiewicz and many other commentators on the other, is this: They see the failure of a B-S type of solution to satisfy Marx’s agregation conditions, namely, that the sum of the values equals the sum of the prices, and the sum of the surplus-values equals the sum of the profits, to indicate more or less serious flaws in Marx’s theory. Itoh, however, regards the non-satisfaction of those conditions as entirely unremarkable, unproblematic, and in fact to be expected, since value and surplus-value are in one domain, and price and profit are in another domain which is only determined in a rather elastic way by the first. What Marx was getting at with his agregation conditions, but failed to spell out clearly enough because he himself was somewhat lax domain-wise, not always maintaining clear separation, is, according to Itoh revealed in a third table which can be constructed, that shows the substance of value acquired in each of the three departments.\n\nSubstance of value acquired (a’i)\nDepartment of production ci vi s’i a’i\nI 225 90 96 411\nII 100 120 64 284\nIII 50 90 40 180\nTotals 375 300 200 875\n\nNote that the table is in the value domain; the units are millions of hours. The ci and vi numbers are the same in this table as in table 1, which they must be since they are technologically determined. The surplus values (s’i), however, are different, since they are the surplus values acquired, or realized, by the capitalists in each department, not, as in table 1, the surplus-values produced. The values-of-products acquired (realized), being the sum a’i = ci + vi + s’i, are also different than in table 1. But now look at the bottom row, the totals. They are the same as in table 1 all the way across: c, v, s’ and a’. Here, says Itoh, is the agregate invariance that Marx sensed. It is not that the sum of the values is the same as the sum of the prices, but that the sum of the values produced is the same as the sum of the values acquired; and it isn’t that total surplus-value is the same as total profit, but that the total surplus-value in production is the same as the total surplus-value acquired."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9085779,"math_prob":0.9605085,"size":17314,"snap":"2019-13-2019-22","text_gpt3_token_len":4168,"char_repetition_ratio":0.12368573,"word_repetition_ratio":0.024244554,"special_character_ratio":0.24540834,"punctuation_ratio":0.12648582,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9687207,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-22T18:56:31Z\",\"WARC-Record-ID\":\"<urn:uuid:ea08c71c-a82e-4ded-a38d-653268ccfac3>\",\"Content-Length\":\"48784\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7ad1d6e5-d612-40d2-9855-239925473120>\",\"WARC-Concurrent-To\":\"<urn:uuid:b67df58d-fb92-422a-ba93-761d7e88c16b>\",\"WARC-IP-Address\":\"172.96.191.122\",\"WARC-Target-URI\":\"http://en.communpedia.org/Transformation_problem\",\"WARC-Payload-Digest\":\"sha1:AAVNBQRQQKTENX4WV5ID64UFWYA4EHUV\",\"WARC-Block-Digest\":\"sha1:ZQIXAZTEJPMGKVT5JYLDVLMTO64DPMLO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202688.89_warc_CC-MAIN-20190322180106-20190322202106-00468.warc.gz\"}"} |
https://www.enhan.eu/how-to-in-fp-3-collectfirst/ | [
"# 3/n - How do I in FP... trying several input for the same function\n\nIn the previous entry of this series, I wrote about error recovery in a functional way. But sometimes, we want to try several inputs until we retrieve (optionally) a result. This is the case if you have a function which compute a location from a string (think geo-search), and which optionally returns a result, if a place matched. We may try this function on several input strings and only care in the first result. In this article, we will see how to do this in a functional way.\n\n## Problem setup\n\nGiven a function `def computeLocation(str: String): Option[Location]` which tries to infer a location from a string and a list of input strings sorted by order of relevance (meaning that the first element may result in a more interesting location than the second and so on), let's retrieve the location (optionally). To sum it up:\n\n``````// The computeLocation function:\ndef computeLocation(s: String): Option[Location] = // the implementation\n\n// this call may generate a long List\nval inputs: List[String] = createInputsFromForm(aForm)\n``````\n\nHow implement `val result: Option[Location] = ???` ?\n\n## From scratch\n\nThe first solution is to call the `computeLocation` function for every string in the input list:\n\n``````inputs.flatMap(computeLocation).headOption\n``````\n\nThis solution is the most simple ever. Let's break it into pieces to analyze it.\nLet's start from the end. As we care only about the first meaningful result (which may not exist), we call `headOption`.\nNow, back to the beginning of the line, we are calling `flatMap` on a `List`. The proper signature of `flatMap` in Scala standard library is slightly different from the one we are used to:\n\n``````def flatMap[B](f: A => IterableOnce[B]): List[B] = //...\n``````\n\nIn the standard library, `flatMap` expects a function producing an `IterableOnce`. Fortunately `Option` implements this trait. The definition commonly used for `flatMap` is more like this one:\n\n``````// Given that F is a type with one parameter\ndef flatMap[A, B](fa: F[A])(f: A => F[B]): F[B]\n\n// For List this results in:\ndef flatMap[A, B](fa: List[A])(f: A => List[B]): List[B]\n``````\n\nIn the standard library, the trick with `IterableOnce` spares us from writing something like:\n\n``````inputs\n.flatMap{ s =>\ncomputeLocation(s).map(l => List(l)).getOrElse(Nil)\n}\n``````\n\nIn this code, we are manually transforming an `Option` into a `List`.\n\nWhat's wrong with this implementation ? If you provide a dummy implementation for both `computeLocation` and `createInputsFromForm`, you will see that `computeLocation` is called for every single item in the list. If we consider that computing the location is a costly operation, it is sad to waste resource computing, while we only care about the first meaningful answer. How to make the `flatMap` sequence stop when we hit a result or the end of the list ?\n\n## Recursion by hand\n\nIf we break our problem in terms of imperative programming, we will easily come up with a `while` statement (in pseudo code):\n\n``````while no result and list has elements left\nresult = computeLocation with next element in the list\ndone\n``````\n\nLet's encode this with recursion:\n\n``````@scala.annotation.tailrec\ndef recur(next: List[String]): Option[Location] = {\nnext match {\ncase Nil => None\nif (r.isDefined) r else recur(tail)\n}\n}\nrecur(inputs)\n``````\n\nWhat we do is just manually traverse the list recursively until `computeLocation` gives a meaningful result. This is strictly the same as the imperative `while` version, but in FP, we like to look further. We could for instance abstract over the `computeLocation` and take as an extra parameter the function returning an `Option`:\n\n``````@scala.annotation.tailrec\ndef recur(next: List[String],\nf: String => Option[Location]): Option[Location] = {\nnext match {\ncase Nil => None\nif (r.isDefined) r else recur(tail, f)\n}\n}\nrecur(inputs, computeLocation)\n``````\n\nLooking at this code, do we really have to deal with `String` and `Location` ? We do not use any of the properties of these types in `recur`. Let's make them parameters.\n\n``````@scala.annotation.tailrec\ndef recur[A, B](next: List[A], f: A => Option[B]): Option[B] = {\nnext match {\ncase Nil => None\nif (r.isDefined) r else recur(tail, f)\n}\n}\nrecur(inputs, computeLocation)\n``````\n\nFollowing this reasoning we could go even further and add some mechanism to also deal with something else than `Option` and `List`. In fact, cats has such functions to hide recursion from you. It is called `tailRecM` but as it deserves an entire post for itself, I won't talk about it here.\n\n## Back with the Scala standard library...\n\nIn the standard library, we can also find the `collectFirst` function which, well do pretty much what we need !\n\n``````inputs.collectFirst { str =>\ncomputeLocation(str) match {\ncase Some(r) => r\n}\n}\n``````\n\nWell, the careful reader would have noticed that the function we pass to `collectFirst` is not total: it does not produce an output for every input.\n\nAs `computeLocation` is total, then it is a bit sad to write a non-total version of it... The standard library also provides a function to transform a total function returning `Option` to a partial one: `def unlift[T, R](f: T => Option[R]): PartialFunction[T, R]`. So we can now write:\n\n``````inputs.collectFirst(Function.unlift(computeLocation))\n``````\n\nIf you are using cats, you will find `collectFirstSome` which will make this possible:\n\n``````inputs.collectFistSome(computeLocation)\n``````\n\n## What if `computeLocation` perform other effects ?\n\nLet's change the problem a bit now. What if the `computeLocation` function performs some network calls, or read a database to find a result ? These things are known to fail at one point or another. How to deal with that ?\n\nWithout adding too much complexity, let's consider that `computeLocation` has a more expressive output: `Either[Throwable, Option[Location]]`. This type means that `computeLocation` may fail with a `Throwable` or give a result if it was able to compute one (the absence of result being completely normal). The complete signature is now:\n\n``````def computeLocation(rawStr: String): Either[Throwable, Option[Location]]\n``````\n\nAs you can see, the `Option` result is now boxed into `Either`. This makes both `collectFirst` and `collectFirstSome` impossible to use, as the type do not match now. In FP, this kind of boxing appears frequently, so that authors of functional libraries like cats already wrote functions to deal with this. In cats, you will often see functions whose name ends with a capital `M`. In our case, it is easy to find `collectFirstSomeM` which has this signature:\n\n``````def collectFirstSomeM[G[_], B](f: A => G[Option[B]])\n(implicit F: Foldable[F], G: Monad[G]): G[Option[B]]\n``````\n\nAs you can see, this definition is abstract. Note that this function is part of a class parametrized on `F`, where `F` is itself a type with a \"hole\" : `F[_]`. In our example, this `F` will be `Either[Throwable,_]` (ie `Either` with only one type parameter applied). To make it easier, here is a version (pseudo scala) where abstract types are replaced with the one we use in our example (without the implicit part):\n\n``````def collectFirstSomeM[Either[Throwable,_], Location](f: String => IO[Option[Location]]): Either[Throwable,Option[Location]]\n``````\n\nLook how `computeLocation` has exactly the expected signature for the `f` parameter ! What about the implicits parameters now ? In this case, we can read the definition as: \"the `collectFirstSomeM` method is available if and only if for the `F` type we can implement the trait `Foldable` and for the `G` type the `Monad` trait\". In our case, with `List` and `Either` it is already done for us in cats so we can do:\n\n``````import cats.implicits._\nval inputs: List[String] = computeInputs(param)\nval result: Either[Throwable, Option[Location]] = inputs.collectFirstSomeM(computeLocation)\n``````\n\nYet, if you write a simple sample for this, like :\n\n``````\ndef computeLocation(rawStr: String): Either[Throwable, Option[Location]] = {\nprintln(s\"Computing with \\$rawStr\") // to see something\n// Fake implementation\nif (rawStr.length == 1) Left(new IllegalStateException(\"wrong state\"))\nelse if (rawStr.length % 4 == 0) Right(Some(Location(2.0, 4.0, \"Plop\")))\nelse Right(None)\n}\n\nval inputs = List(\"a\", \"impair?\", \"plop\", \"other\")\n\nimport cats.implicits._\nprintln(\ninputs.collectFirstSomeM(computeLocation)\n)\n``````\n\nYou will notice that the output will be:\n\n``````Computing with a\nLeft(java.lang.IllegalStateException: wrong state)\n``````\n\nThe execution is stopping as soon as a `Left` is returned ! This is perfectly normal as `Either` is a fail fast structure. And the requirement for `Monad` should have caught our attention: `Monad` express sequence, the next operation using the result of the previous one as input parameter.\nSo, as the caller of `computeLocation` in our situation, we have two options:\n\n• consider a `Left` as a blocker, and indeed, keep it,\n• try to recover from it by composing `computeLocation` with a function handling the situation with care.\n\nHere is an example of the second choice, being ignoring errors (you probably don't want to do that, and perform a selective recovery, composing with things we saw earlier):\n\n``````inputs.collectFirstSomeM(\ns => computeLocation(s).recoverWith(_ => Either.right(None))\n)\n``````\n\n## Conclusion\n\nIn this article, we saw how to deal with something simple: calling a function for elements in a list and keeping the first meaningful result (if any). Even if it was simple, what I would like to highlight is how this solution is composable. Every type in the design models an intent:\n\n• `Option` models that the result may be irrelevant or present\n• `Either` models that a computation may fail\n• `Foldable` express that we want to build a single value from an initial structure (in our case, we fold the list to a single result)\n• `Monad` express that we compute in sequence: indeed, there is no parallelism involved in our solution, we try the input strings one after the other.\n\nYet, the work here is not over. Next time, we will see how we can adapt this example to make it less \"sequential\"."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8393933,"math_prob":0.8939502,"size":9855,"snap":"2023-40-2023-50","text_gpt3_token_len":2278,"char_repetition_ratio":0.14780225,"word_repetition_ratio":0.04256671,"special_character_ratio":0.22688991,"punctuation_ratio":0.13833158,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9767943,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-29T08:32:06Z\",\"WARC-Record-ID\":\"<urn:uuid:2da44d48-29d4-4c94-a844-8914bd142b47>\",\"Content-Length\":\"33955\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9418c709-a682-4ff6-b361-c0d519d73ef1>\",\"WARC-Concurrent-To\":\"<urn:uuid:6a8766d0-7807-45b5-bfb1-362e33af7edc>\",\"WARC-IP-Address\":\"146.75.35.7\",\"WARC-Target-URI\":\"https://www.enhan.eu/how-to-in-fp-3-collectfirst/\",\"WARC-Payload-Digest\":\"sha1:PPYSKOYDRWUAQCNAVSFMT7EDENPVZNYM\",\"WARC-Block-Digest\":\"sha1:4ZRBZLPDIRNVQEM6ZZUNW5BYGDJGPLDQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100057.69_warc_CC-MAIN-20231129073519-20231129103519-00533.warc.gz\"}"} |
https://cs.stackexchange.com/questions/28264/generating-a-set-of-minimal-length-strings-that-together-invoke-every-producti | [
"# Generating a set of minimal-length strings that, together, invoke every production of a context free language\n\nProblem (tl;dr)\n\nGiven a context free grammar, $G$, find a set of strings that take $G$ through every production it has at least once.\n\nHow and how fast can it be done?\n\nBackground\n\nI'm working on a compiler whose parser is implemented with a tool similar to Yacc+Antlr. I've written up most of the parser code, and I'd like to generate some code of the object language that invokes every production of the grammar at least once so that I can feed it to the parser and make sure that nothing is wrong.\n\nIn the interest of good testing, what I'd really like is one, short test file that has a particular production \"under test\" -- so, for each production rule, I want to generate a minimal string that takes the parser from the start state, through the production being tested, to a set of terminals.\n\nPossible solutions\n\nI imagine there is an elegant solution using graph theory, but I'm not quite sure what it is. I would like to just use Dijkstra's algorithm to find shortest paths through some appropriate structure, but I think that a string is parsed by a context free grammar in a tree structure rather than a path, so I don't know how to make that work.\n\nI think there might be a clever way to pose it as a network flow problem. Something like this: take a graph that has a vertex for every symbol (terminal and nonterminal) and a vertex for every production. If a nonterminal has a production, add a directed edge from the nonterminal to the production. If a production produces a symbol, add a directed edge from the production to the symbol. Add a source with some capacity $c$ and attach it to the vertex corresponding to the start symbol. Add a sink with infinite capacity and attach it to each terminal.\n\nIf a nonterminal has an in-arc with a capacity $k$, add an arc from the nonterminal to each of its productions with capacity $k$. If a production has an in-arc with capacity $k$ and it has an out-arc to $n$ nonterminals, add an arc with capacity $\\frac k n$ from the production to each nonterminal.\n\nThen run some maximum flow algorithm on the network and let the productions \"trickle down\" from the start symbol to the terminals. You should end up with a flow $c$ coming out of your source, and you can return all of the terminals you hit with a nonzero flow as your result string. Then you end up with something like $O(n^3)$ time complexity for each run, where $n$ is the sum of the number of terminals and nonterminals in your grammar -- not too bad.\n\nHowever, I'm still not really sure what this graph looks like: I think that it needs to be infinite and I'm not sure if you can find the maximum flow of an infinite flow network. Past that, I'm not sure how to \"remove\" a production from consideration so that I'm guaranteed to get a new one for each test run.\n\nI Googled and I couldn't find anything. Is there a nice solution to this problem?\n\n• Can the input grammar be ambiguous? If so, does a string count for all productions in all derivations? Can we assume that the grammar is reduced, i.e. contains not \"dead end\" rules (every rules is reachable from the start symbol and has a right side that can derive to a word)? – Raphael Jul 8 '14 at 0:59\n• @Raphael The particular grammar that I'm working with is ambiguous in a few minor places but that can be ignored for simplicity if necessary. I'd rather an ambiguous string not count for all of its possible derivations, because my aim is to force the parser to hit every code branch, but as I say that I realize it might not be possible. The grammar is reduced. – Patrick Collins Jul 8 '14 at 1:30\n• Try it backward. Build a set of rule where the right-hand-side (RHS) is a terminal strings (that includes the empty word, which is an empty string of terminals). Then look at all remaining rules successively, to see if one has a RHS that can be derived into a terminal string with the rules in your set ... and try to finish this yourself. Two remarks though: I am very surprised you programmed a parser \"similar to Yacc+Antlr\" with such a limited knowledge of context-free grammars. Second point is that I doubt your test is enough: rules may interact in the parsing process. – babou Jul 8 '14 at 7:53\n• Definitely, code-coverage is known to be a very rough testing strategy. What's more, you have a programming language with ambiguous syntax? Oh dear. – Raphael Jul 8 '14 at 8:51\n• @Raphael Ambiguous grammar for a programming language does not bother me. I have been advocating them for many years. The USA Defence has been using one for some 30 years. But, the technology depends on how ambiguous, and on how ambiguity is to be dealt with. If the technology is to be Yacc+Antlr like, then the parser behaves as if the language was unambiguous: if forces a choice. Other technologies may keep the ambiguity. But I am still bothered by the fact it all requires a level of understanding that does not seem to be present in the question. – babou Jul 8 '14 at 9:16\n\n# In a nutshell\n\nNot knowing enough the literature, I worked out a solution which is presented in the next section, together with a proof for the hardest part. Once I knew what was needed, I could search the literature for the right ideas. Here is a quick presentation of the algorithm, based on the literature, which is essentially the same I developed.\n\nThe first thing to do is to find a size-minimal terminal string $\\sigma(U)$ for every non-terminal $U$ of the grammar. This can be done by using Knuth's extension to conc-or graphs (also known as CF grammars) and and-or graphs of Dijkstra's shortest path algorithm. Example B in Knuth's paper does what is needed, almost.\n\nActually, Knuth computes only the length of these terminal strings, but it is quite easy to modify his algorithm to actually compute one such terminal string $\\sigma(U)$ for each non-terminal $U$ (as I do it in my own version below). We also define $\\sigma(a)=a$ for every terminal $a$, and we extend $\\sigma$ as usual into a string homomorphism.\n\nThen we consider a directed graph where non-terminals are the nodes, and there is an arc $(U,V)$ iff there is a rule $U\\rightarrow \\alpha V\\beta$. If several such rules can produce the same arc $(U,V)$, we keep one such that the length $|\\sigma(\\alpha\\beta)|$ is minimal. The arc is labeled with that rule, and that minimal length $|\\sigma(\\alpha\\beta)|$ becomes the weight of the arc.\n\nFinally, using Dijkstra's shortest path algorithm, we compute the shortest path from the initial non-terminal $S$ to each non-terminal of the grammar. Given the shortest path for a non-terminal $U$, the rule labels on the arcs may be used to get a derivation $S\\overset{*}{\\Longrightarrow}\\alpha U \\beta$. Then, to every rule of the form $U\\rightarrow\\gamma$ in the grammar, we associate the size-minimal terminal string $\\sigma(\\alpha\\gamma\\beta)$ which can be derived using that rule.\n\nTo achieve low complexity, both Dijkstra's algorithm and Knuth's extension are implemented with heaps, AKA priority queues. This gives for Dijkstra's algorithm a complexity of $O(n\\log n +t)$, and for Knuth's algorithm a complexity $O(m \\log n +t)$, where there are $m$ grammar rules and $n$ non-terminals, and $t$ is the total length of all rules. The whole is dominated by the complexity of Knuth's algorithm since $m\\geq n$.\n\nWhat follows is my own work, before I produced the short answer above.\n\n# Deriving the solution from the useless symbols elimination algorithm.\n\nThere are several aspects to this algorithm. For better intuition I chose to present it in three successive versions that introduce progressively more features. The first version does not answer the question, but is a standard algorithm for useless symbols elimination that suggests a solution. The second version answers the question without the minimality constraint, The third version gives an answer to the question, satisfying thye minimality constraint. This third solution is then improved by using an adaptation to and-or graphs of Dijkstra's shortest path algorithm.\n\nThe end result is a very simple algorithm, that avoids reconsidering computations already done. But it is less intuitive and does require a proof.\n\nThis answer only tries to answer the question as made precise by the OP's comment: \"for each production rule, I want to generate a minimal string that takes the parser from the start state, through the production being tested, to a set of terminals.\" Hence I only try to get a set of strings such that for each rule, there is a string in the set that is one of the size-minimal strings of the language having a derivation using the rule.\n\nIt must be however noted that the fact that a string \"invokes\" a rule, that is has a derivation using that rule, does not necessarily means that the rule will be considered by a parser that work with ambiguous grammars and resolves ambiguities arbitrarily. Handling such a situation would probably require more precise knowledge of the parser, and might well be a more complex question.\n\n## The basic algorithm\n\nTo solve this question, one can start with the classical algorithm for useless symbols removal in context-free grammars. It is in section 4.4, pp 88-89, of Hopcroft & Ullman, 1979 edition. But the presentation here may be a bit different.\n\nThe algorithm aims precisely at proving the existence of such a covering as requested by the OP, and consists in two parts:\n\n• lemma 4.1 of H&U, page 88: removal of all unproductive non-terminals. This is done by trying find for each terminal a terminal string it can derive on. A simple way to explain it is as follow: You create a set $Prod$ od productive symbols, which you initialize with all terminals. Then for each rule, not yet processed, that has all its right-hand-side (RHS) symbols in $Prod$, you add the left-hand-side (LHS) non-terminal to the set $Prod$, and you remove all rules with the same LHS non-terminal from the set of rules to be processed. You iterate the process until there is no rule left with all its RHS symbols in $Prod$. The remaining non-terminals, not in $Prod$ at the end of this process, are non-productive: they cannot be derived into a terminal string, and can thus be removed from the grammar.\n\n• lemma 4.2 of H&U, page 89: removal of all unreachable symbols. This is done by the classical node reachability in directed graphs, by considering non-terminals as nodes and having an arc $(U,V)$ iff there is a rule $U\\rightarrow \\alpha$ such that $V$ occurs in $\\alpha$. You create a set $Reach$ of reachable symbols which is initialized with only the initial symbol $S$. Then, for every non-terminal symbol $U$ in $Reach$ or later added to it, and for every rule $U\\rightarrow \\alpha$, you add to $Reach$ all the symbols in $\\alpha$. When all non-terminals in $Reach$ have been thus processed, all symbols (terminal or non-terminals) that are not included in $Reach$ cannot appear in a string derived from the initial symbol, and are therefore useless. Thus they can be removed from the grammar.\n\nThese two basic algorithms are useful to simplify the raw results of some grammar construction techniques, such as used for the intersection of a context-free language and a regular set. In particular, this is useful in cleaning up the results of general CF parsers.\n\nUseless non-terminal symbols removal is necessary in the context of solving the question asked, as the rules using them cannot be \"invoked\" (i.e. used in its derivation) by any string of the language.\n\n## Building a set of string that invoke every rule\n\n(We are not looking yet for minimal strings.)\n\nNow answering specifically the question, one must indeed remove all useless symbols, whether unreachable symbols or unproductive non-terminal symbols, a well as useless rules having such useless non-terminals as LHS. They have no chance of being ever invoked usefully while parsing a terminal string (though some may well waste the processing time of a parser when they are not removed; which ones may waste time depends on the parser technology).\n\nWe now consider, for each (useful) rule, the production of a terminal string that invokes it, i.e. that may be generated by using this rule. This is essentially what is done by these two algorithms above, though they do not keep the information, as they are satisfied with proving the existence of these strings to ensure that non-terminals are both reachable and productive.\n\nWe modify the first algorithm (lemma 4.1) by keeping with each non-terminal $U$ in the set $Prod$ a terminal string $\\sigma(U)$ it derives on: $U\\overset{*}{\\Longrightarrow}\\sigma(U)$. For every terminal we define the $\\sigma$ as the identity mapping. When $U$ is added to the set $Prod$ because a rule $U\\rightarrow\\gamma$ has all its RHS symbols in $Prod$, then we define $\\sigma(U)=\\sigma(\\gamma)$, extending $\\sigma$ as a homomorphism on strings, and we remove all $U$-rules, that is all rules with $U$ as LHS.\n\nWe modify the second algorithm (lemma 4.2) by keeping with each non-terminal symbol $U$ added to $Reach$ the path used to reach it from the intial symbol $S$, which gives the successive rules to get a derivation $S\\overset{*}{\\Longrightarrow}\\alpha U \\beta$.\n\nThen, for each rule $U\\rightarrow\\gamma$ in the grammar, we produce a terminal string that \"invokes\" this rule as follows. We take from the result of the second algorithm the derivation $S\\overset{*}{\\Longrightarrow}\\alpha U \\beta$. Then we apply the rule to get the string $\\alpha \\gamma \\beta$. A terminal string \"invoking\" the rule $U\\rightarrow\\gamma$ is $\\sigma(\\alpha \\gamma \\beta)$\n\n## Building a set of minimal strings that \"invoke\" every rule\n\nWe ignore the issue of eliminating useless symbols, which can be a by-product of these modified algorithms.\n\nBuilding a set of minimal strings relies on first getting a minimal derived string for each non-terminal. This is done by further modifying the first algorithm (lemma 4.1). First we remove from the set of rules to be processed all recursive rules (i.e. with a LHS symbol occurring in the RHS string). It is obvious that none of these rules can derive to a shorter terminal string than the non-recursive rules with the same LHS. And there must be at least one non-recursive rule if the LHS is not a useless non-terminal (because non-productive).\n\nThen we procede as before to build the set $Prod$ of productive symbols, associating with each synbol $U$ a terminal string, which we note $\\sigma(U)$. The string $\\sigma(U)$ is produced as before by application of the rule $U\\rightarrow\\gamma$, substituting each non-terminal $V$ occurring in $\\gamma$ with $\\sigma(V)$. So far, it was necessary to apply this to only one rule with a given non-terminal $U$ as its LHS, the first that would have all its RHS non-terminals in $Prod$, and then ignore the others, because any such derived string would do. But we are now looking for a minimal derived string. Hence, for a non-terminal $U$, this has to be done for all rules with $U$ as LHS. But we keep only one terminal string $\\sigma(U)$, replacing the current one by the newly found one, whenever the new one is smaller.\n\nFurthermore, whenever the string $\\sigma(U)$ is replaced by a smaller one, all rules with an occurrence of $U$ in the RHS that had been already processed have to be put back in the set of rules to be processed, since change allows deriving their RHS on a shorter string. So doing this will call for more iterations, but will eventually end since none of these strings ever gets much shorter than the empty string.\n\nAt the end of this first algorithm, the string $\\sigma(U)$ is one of the smallest strings that can be derived from $U$. There may be others.\n\nNow we also have to modify the second algorithm to get, for every non-terminal $U$, (one of) the shortest string containing U as the only non-terminal. To do this, we keep the same directed graph with non-terminals as nodes, and having an arc $(U,V)$ iff there is a rule $U\\rightarrow \\alpha V \\beta$. But now we put weights on the arcs, to compute the minimum length of the terminal context that has to be associated with reachable non-terminals. The weight associated with the arc $(U,V)$ above is the length $|\\sigma(\\alpha\\beta)|$, where the mapping $\\sigma$ is extended to terminals as the identity, and then extended again as a string homomorphism. It is the length of (one of) the shortest terminal strings that can be derived from the string $\\alpha\\beta$. Note that $V$ is removed in this calculation. HOwever, when there are several occurences of $V$ in the RHS, only one must be removed. There may be several possible $(U,V)$ arcs, with different weights, if there are several rules with $U$ as LHS and $V$ in the RHS. In such a case, only (one of) the lighter such arc is kept.\n\nIn this graph, we no longer look just for reachability of nodes from $S$, but for the shortest weighted path that reaches every node from the initial symbol $S$. This can be done with Dijkstra's algorithm.\n\nGiven the shortest path for a non-terminal $U$, we read it as before as a sequence of rules, from which we get a dérivation $S\\overset{*}{\\Longrightarrow}\\alpha U \\beta$. Then to every rule of the form $U\\rightarrow\\gamma$ in the grammar, we produce a minimal terminal string that \"invokes\" this rule as $\\sigma(\\alpha\\gamma\\beta)$\n\nRemark: The same minimal string may probably be used for several rules. But the fact that one of the strings uses a rule $\\rho$ in its derivation does not necessarily mean it is a minimal string for that rule $\\rho$, as it may have been found for another rule, while a shorter one can be found for $\\rho$. It may be possible to increase the likelyhood that the same minimal string will be found for several rules by using some priority policy whenever there is flexibility. But is it worth the trouble?\n\n## A faster algorithm for minimal terminal string deriving from a non-terminal\n\nBuilding the function $\\sigma$ such that $\\sigma(U)$ is a minimal terminal string deriving from $U$ is done above with a rather naive technique that requires iteratively reconsidering work already done when a new smaller derived string is found for some non-terminal. This is wasteful, even if the process will clearly terminate.\n\nWe propose here a more efficient algorithm, that is, in essence, an adaptation to the CF grammar graph of an extension of Dijkstra's shortest path algorithm to and-or graphs, with a proper definition of the path-concept for an and-or graph. This variant of the algorithm probably exists in the literature (assuming it is correct), but I have been unable to find it in the resources I can access. Hence I am describing it in more details, together with a proof.\n\nAs previously, we first remove from the set of rules to be processed all recursive rules (i.e. rules with a LHS symbol occurring in the RHS string). It is obvious that none of these recursive rules can derive to a shorter terminal string than the non-recursive rules with the same LHS. And, for a LHS $U$ there must be at least one non-recursive $U$-rule if the symbol $U$ is not a useless non-terminal (because non-productive). This is not strictly necessary, but reduces the number of rules to be considered later.\n\nThen we procede as before to build the set $Prod$ of productive symbols, associating with each synbol $X$ a terminal string, which we note $\\sigma(X)$, which is a size-minimal terminal string derivable from $X$ (in the previous algorithm, that was true only after termination).The set $Prod$ is initialized with all terminal symbols, and for each terminal symbol $a$, we define $\\sigma(a)=a$.\n\nThen we consider every rule $U\\rightarrow\\gamma$ such that all RHS symbols are in $Prod$, and we choose one such that $\\sigma(\\gamma)$ is size-minimal. Then we add $U$ to $Prod$, with $\\sigma(U)=\\sigma(\\gamma)$, and remove all $U$-rules. We iterate until all productives terminals have been entered in $Prod$. Any non-terminal $U$, once entered in $Prod$, never has to be considered again to change $\\sigma(U)$ for a smaller string.\n\nProof:\n\nThe previous algorithms were more or less intuitively obvious. This one is a bit trickier, because of the and-or character of the graph, and a proof seems more necessary. All we need is actually the following lemma, which establishes the correctness of the algorithm when applied to the last iteration.\n\nLemma: After each iteration of the algorithm, $\\sigma(X)$ is a size-minimal terminal string derivable from $X$, for all $X$ in $Prod$.\n\nThe base step is obvious, since this is true by definition for all terminals in $Prod$ when it is initialized.\n\nThen, assuming it is true after some non-terminals have been added to $Prod$, let $U\\rightarrow\\gamma$ be the rule chosen to add a new non-terminal to $Prod$. We know that this rule is chosen because $\\gamma\\in{Prod}^*$ and $\\sigma(\\gamma)$ is size-minimal over all RHS of all rules with a RHS in ${Prod}^*$. Then $U$ is added to $Prod$, and we have only to prove that $\\sigma(\\gamma)$ is a size-minimal terminal string derivable from $U$.\n\nThis is obviously the case for all derivations beginning with the rule $U\\rightarrow\\gamma$, since by induction hypothesis, application of mapping $\\sigma$ is such that all non-terminals in $\\sigma$ are substituted with size-minimal terminal strings deriving from them. Hence no other derivation can produce a shorter terminal string.\n\nWe thus consider only derivations starting with another $U$-rule $U\\rightarrow\\beta$, such that $\\beta\\overset{*}{\\Longrightarrow}w\\in\\Sigma^*$, where $\\Sigma$ is the set of terminal symbols.\n\nIf $\\beta\\in{Prod}^*$, then a minimal string it can derive on is $\\sigma(\\beta)$. But, since we chose the rule $U\\rightarrow\\gamma$, it must be that $|\\sigma(\\beta)|\\geq|\\sigma(\\gamma)|$. So the rule $U\\rightarrow\\beta$ does not derive on a smaller terminal substring.\n\nThe last case to consider is when $\\beta\\notin{Prod}^*$, and we then consider a derivation $\\beta\\overset{*}{\\Longrightarrow}w\\in\\Sigma^*$. If that derivation involves only non-trminals in $Prod$, then $\\beta\\in{Prod}^*$, which is a case we have already seen. Hence we consider only derivations that have steps using a rule with its LHS not in $Prod$. Let $V\\rightarrow\\alpha$ be such a rule, such that $\\alpha\\in{Prod}^*$.There must be at least one such rule since they are partially ordered by derivation order, and $w\\in{Prod}^*$.\n\nThus we have $U\\Longrightarrow\\beta\\overset{*}{\\Longrightarrow}\\mu V\\nu$. We know that $\\mu$ and $\\nu$ derive on a string of size at least 0, and since no $V$-rule with a RHS in ${Prod}^*$ was chosen, they derive on terminal strings of length at least equal to $|\\sigma(\\gamma)|$. Hence, with the rule $U\\rightarrow\\beta$, $U$ derives on a terminal string of length at least equal to $|\\sigma(\\gamma)|$. $\\blacksquare$\n\n• looks plausible but suggest it needs to be converted at least to pseudocode. also it seems plausible the problem or near variants has been studied in the literature somewhere... – vzn Jul 16 '14 at 2:19\n• @vzn I doubt this problem has been published, because I do not see an application that does require this minimality. The useless symbols elimination algorithm is a classical technique, found probably in all textbooks on CF languages. And, as I said, it has some applications in general CF parsing. I never heard of pushing it further for producing test sentences. I chose to try explain its derivation, rather than give pseudo code. As it is the answer is already very long. Maybe in a second answer, if that is acceptable on the site ... as the text is becoming too long to handle. – babou Jul 16 '14 at 21:47\n• @vzn What could be in the literature is the extension of Dijkstra's shortest path algorithm to and-or graphs. Unfortunately, I do not have access to resources for finding out. I could write it up in a simplified form, without the CF grammar stuff. But then, I do not think it is a big deal. But it does gives the right hints to implement with low complexity. – babou Jul 16 '14 at 21:58\n• minimization & \"coverings\" are common considerations in the theoretical literature. further thought, maybe a normal form either Greibach or Chomsky could be key to understanding it better (there is some connection there also with removing unproductive terminals/nonreachable symbols). think this is worthwhile question for tcs.se, may ask it at some pt there & cite this one (afaik migrations tend to lose comments.) – vzn Jul 16 '14 at 22:37\n• @vzn I doubt Greibach or Chomsky normal form will bring any light. This is grammar dependent more than language dependent. Changing the grammar changes the problem. Actually, I first thought it was a homework dump. The minimality requirement does give it some interest, as finding a good algorithm was less obvious, especially my last version. I wrote the proof because I could not convinced myself any other way that it actually works. It is somehow less intuitive that the straight Dijkstra's algorithm from which I derived it. – babou Jul 16 '14 at 23:12\n\n## A simple solution\n\nIf you don't care too much about the number of strings, there is an easy solution. Basically, for each production, we will generate a string that covers that production.\n\nHow do we do that? It's a straightforward worklist algorithm. Suppose we want to cover the production $A ::= BCx$. Basically, we do breadth-first search starting from the start non-terminal $S$ to find a derivation that includes the non-terminal $A$ on the right hand side: initially, all non-terminals are unmarked, and the set of reachable non-terminals is $\\{S\\}$; in each iteration, we pick one unmarked reachable non-terminal, say $X$, and for each production with $X$ on the left-hand side, we add all the non-terminals on the right to the set of reachable terminals, then we mark $X$. Repeat until this process finds that $A$ is reachable. When it does, by backtracing, you obtain a derivation of the form $S \\to \\cdots A \\cdots$. You can extend this to a derivation of the form $S \\to \\cdots A \\cdots \\to \\cdots BCx \\cdots$.\n\nNext, we need to complete the derivation, by picking some way to complete it to be all non-terminals. This is also easy. For each non-terminal, we find the shortest string that is in the language generated by that non-terminals. This can be obtained by a worklist iteration. Let $\\ell(A)$ denote the length of the shortest string we've found so far in the language generated by $A$. Initially, we set $\\ell(A)=\\infty$ for all non-terminals $A$, unless there is a production $A ::= xyz$ where all the symbols on the right-hand side are terminals; in that case, we set $\\ell(A)$ accordingly (e.g., $\\ell(A)=3$ if the production tells us that $xyz$ is in $L(A)$). Now we iteratively look for a way to find a shorter string. If you have a production like $A ::= xBCy$, you know that $\\ell(A) \\le 2 + \\ell(B) + \\ell(C)$; so any time you find a new shorter string in $L(B)$ or $L(C)$ (i.e., any time you update $\\ell(B)$ or $\\ell(C)$ to be smaller), you can check whether this gives you a new shorter string in $L(A)$, and if so, reduce the value of $\\ell(A)$... which may in turn cause other cascading changes. Keep applying all cascading changes until no further changes are triggered. At that point, you have reached a fixed point, and by backtracing, for each non-terminal you know the shortest string (of terminals) that can be derived from that non-terminal.\n\nNow, given your derivation of the form $S \\to \\cdots BCx \\cdots$, find a way to complete the derivation: replace each non-terminal in $\\cdots BCx \\cdots$ with the shortest string (of terminals) that can be derived from it.\n\nThis gives you a string (of terminals) that covers the production $A ::= BCx$. Do this once for each production, until all of them are covered.\n\nThe number of strings is equal to the number of productions. The running time is quadratic: the process is linear-time for each production. (You could probably reduce it to be a linear-time algorithm in total, but I suspect this will be good enough in practice.)\n\n## Optimizations\n\nIf you want to reduce the number of strings, you might notice that each string will typically cover many productions, so a subset of these strings will probably suffice.\n\nThere are many ways you could reduce the number of strings. One simple one is to use the standard greedy approximation algorithm for set cover. Start by generating all of the strings as above, one for each production, and count how many productions each string covers. Keep the string that covers the most productions; that one you definitely want, so add it to your set of keepers. Now some of the productions are covered by this keeper, so we don't need any new strings that cover them again. Thus, you should update your set of counts for each strings: for string $s$, count the number of productions that are covered by $s$ but aren't covered by any keeper. Pick the string that has the largest number, add it to your set of keepers, and update the counts again. Repeat until all productions have been covered. This will likely give you a significantly smaller set of strings that cover all productions in your grammar."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8938298,"math_prob":0.9819963,"size":17722,"snap":"2019-35-2019-39","text_gpt3_token_len":4323,"char_repetition_ratio":0.16486059,"word_repetition_ratio":0.07585729,"special_character_ratio":0.22954519,"punctuation_ratio":0.09191713,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99735785,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-23T01:11:16Z\",\"WARC-Record-ID\":\"<urn:uuid:e5903e9c-0bf4-4636-9dfc-b04231752656>\",\"Content-Length\":\"182158\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:057f76b4-117a-4228-9a36-47872ad7c5a1>\",\"WARC-Concurrent-To\":\"<urn:uuid:8cc08ce4-a1e9-4c2b-bcd1-6311f94a614c>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://cs.stackexchange.com/questions/28264/generating-a-set-of-minimal-length-strings-that-together-invoke-every-producti\",\"WARC-Payload-Digest\":\"sha1:OQLJ7HEG6MXJ2KK3XKN3VTEMKVYDE7F5\",\"WARC-Block-Digest\":\"sha1:6VYZCOZJF3EBEPL7LMXIDJCRBZYFCPUS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514575844.94_warc_CC-MAIN-20190923002147-20190923024147-00136.warc.gz\"}"} |
https://www.meritnation.com/ask-answer/question/explain-cyclotron-in-a-more-elaborate-way/electric-charges-and-fields/5480141 | [
"# explain cyclotron in a more elaborate way\n\nThe working of a cyclotron is based on the fact that the frequency of revolution of charged particle is not dependent on the energy.",
null,
"• Particle moves inside the two semi-circular disc-like metal containers D 1 and D 2 called Dees.\n\n• When the particle moves from one Dee to another, it is acted upon by electric field.\n\n• Electric field changes sign alternately. Therefore, the particle is accelerated by the electric field, which increases the energy of the particle.\n\n• The increase in energy increases the radius of the circular path.\n\nHence, the path is a spiral one.\n\n• Time period of revolution is",
null,
"This frequency is called the cyclotron frequency.\n\nThe working principle of a cyclotron involves the use of an electric field to accelerate charge particles across the gap between two D shaped magnetic field regions. The magnetic field is perpendicular to the paths of the charged particles makes them follow circular paths within two Dees. An alternating voltage accelerates the charged particles each time they cross the Dees. The radius of each particle’s path increases with its speed, so the accelerated particles spiral toward the outer wall of the cyclotron.\n\n• 31\nWhat are you looking for?"
] | [
null,
"https://img-nm.mnimgs.com/img/study_content/lp/1/12/4/248/906/1784/1972/3-6-09_LP_Sravana_Phy_1.12.4.4.1.2_vand_SS_html_5dddfa7b.png",
null,
"https://img-nm.mnimgs.com/img/study_content/lp/1/12/4/248/906/1784/1972/3-6-09_LP_Sravana_Phy_1.12.4.4.1.2_vand_SS_html_35d1eca5.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9139259,"math_prob":0.9268327,"size":1195,"snap":"2021-04-2021-17","text_gpt3_token_len":232,"char_repetition_ratio":0.15113351,"word_repetition_ratio":0.0,"special_character_ratio":0.18158996,"punctuation_ratio":0.0787037,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9589937,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-23T12:39:46Z\",\"WARC-Record-ID\":\"<urn:uuid:690b6f8a-b7aa-491e-b4bb-701a8bbb717b>\",\"Content-Length\":\"37653\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3accd9ff-b1cd-4337-aff3-b1ac0e11a728>\",\"WARC-Concurrent-To\":\"<urn:uuid:9999510a-1cc1-40db-a107-c14feb50e3d1>\",\"WARC-IP-Address\":\"23.62.230.68\",\"WARC-Target-URI\":\"https://www.meritnation.com/ask-answer/question/explain-cyclotron-in-a-more-elaborate-way/electric-charges-and-fields/5480141\",\"WARC-Payload-Digest\":\"sha1:OMVS6O7W7MUJJHPPW3JLAX4YBCL6FWMH\",\"WARC-Block-Digest\":\"sha1:DW6NHHVSMKELXP2SGWPSEWJZ3ELPG3CZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618039617701.99_warc_CC-MAIN-20210423101141-20210423131141-00146.warc.gz\"}"} |
https://www.dmitry-ponomarev.com/ | [
"Dr. Dmitry Ponomarev",
null,
"Finding eigenvalues as solution of asymptotical characteristic equation",
null,
"Scaling for an NLS model of laser beam propagation in a photopolymer",
null,
"Obstacle (2 black circles) identification: red curve is the last iteration",
null,
"Cauchy problem for Laplace equation with \"interior measurements\"",
null,
"My analytical triumph for magnetization estimation in the set-up of EAPS lab, MIT",
null,
"",
null,
"An attack on the spectral problem for the truncated Poisson operator\n\nI am an applied mathematician primarily interested in real-life problems whose treatment requires analysis of a model / justification of the approximation or those that can be effectively tackled with analytical tools such as asymptotic methods or closed-form solution reducibility.\n\nI enjoy learning new things while working on diverse subjects analyzing a problem, devising a constructive solution approach and verifying / implementing it numerically. The topics I have previously worked on include:\n\n• wave propagation in porous media (fluid / solid inclusion scattering for Biot elastodynamics equations);\n• nonlinear PDEs (analysis of one NLS model for laser beams in photopolymers; Darboux transformation);\n• approximation theory (approximation of square-integrable functions by traces of analytic functions with certain properties such as pointwise constraints);\n• integral equations and optimal bases construction (spectral theory for compact one-dimensional self-adjoint integral operators with convolution kernels);\n• inverse magnetization problem (analytical estimation of net magnetization moment components from partial measurements of magnetic field);\n• inverse obstacle problem (determining domain geometry for transient wave equation from partial Dirichlet+Neumann data).\n\nAt the present time, I am a postdoctoral researcher (project assistant) at Insitute of Analysis and Scientific Computing, TU Wien, Austria.\nTogether with Anton Arnold, we are working on development and investigation of hybrid asymptotic-numerical methods aimed at efficient treatment of high-frequency problems for wave equations, in particular, using long-time behaviour analysis for time-domain problems with variable coefficients.\n\nYou can contact me by email: dmvpon@gmail.com / dmitry.ponomarev@asc.tuwien.ac.at, or find me at:\nOffice DA 06 L14, Institute of Analysis & Scientific Computing, Vienna University of Technology, Wiedner Hauptstrasse 8, Vienna, Austria."
] | [
null,
"https://www.dmitry-ponomarev.com/images/res_highlight1.png",
null,
"https://www.dmitry-ponomarev.com/images/res_highlight2.png",
null,
"https://www.dmitry-ponomarev.com/images/res_highlight3.png",
null,
"https://www.dmitry-ponomarev.com/images/res_highlight4.png",
null,
"https://www.dmitry-ponomarev.com/images/res_highlight5.png",
null,
"https://www.dmitry-ponomarev.com/images/work_at_home.jpg",
null,
"https://www.dmitry-ponomarev.com/images/whiteboard.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8348255,"math_prob":0.8112257,"size":1955,"snap":"2022-05-2022-21","text_gpt3_token_len":372,"char_repetition_ratio":0.09841107,"word_repetition_ratio":0.0,"special_character_ratio":0.1713555,"punctuation_ratio":0.11,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9625008,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-22T00:16:01Z\",\"WARC-Record-ID\":\"<urn:uuid:431e50f4-bb44-466d-80e5-4caf1018f840>\",\"Content-Length\":\"11185\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:db3e1f1a-81fd-44e9-9fc1-f8083a56187e>\",\"WARC-Concurrent-To\":\"<urn:uuid:18d143e6-a2bc-48de-b42e-fc7986573dce>\",\"WARC-IP-Address\":\"198.54.116.114\",\"WARC-Target-URI\":\"https://www.dmitry-ponomarev.com/\",\"WARC-Payload-Digest\":\"sha1:TBTW4JY6IJ74HTMNE2JM37FXCQXQFQZQ\",\"WARC-Block-Digest\":\"sha1:2GGIZZZ3BPUE7BRU5N5KMXKWK7LMZVPK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320303717.35_warc_CC-MAIN-20220121222643-20220122012643-00040.warc.gz\"}"} |
https://ask.extension.org/questions/259756 | [
"# Fire Science\n\nAsked July 6, 2015, 7:54 PM EDT\n\nCalculate the TPL due to Friction and Elevation Pressure in 200' of 2\" hose flowing 200 gpm's when the hoseline is operating at the tip of a 50' hill?\n\nProvidence County Rhode Island\n\n## 1 Response\n\nTotal Pressure Loss is the sum of friction loss and elevation change. The elevation change is usually in feet or meters. If it is feet, the conversion to PSI is 2.31 feet equals 1 PSI.\n\nThere are a couple of formulas that use diameter and length of pipe, along with flow rate to calculate friction loss in a pipe. The trick is finding the right friction coefficient/constant for the pipe material for the equation you are using. There a several on-line websites that help you calculate the friction loss. It is important to look over the explanation of the formulas so that if you use one of the sites calculators, you have an idea what is going on with it.\n\nThe first formula is The Darcy-Weisbach formula.\n\nThe other that is less accurate is Hazen-Williams Equation.\n\nEach of these formulas have tables of piping material and the appropriate friction constant.\n\nIf you Google Friction loss in a fire hose. you find there is a calculator.\nFire Hose Friction Loss Calculator I am not sure which formula it uses. If this is a homework assignment, using this calculator may not get you the credit you want.\n\ngodd luck."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9228154,"math_prob":0.9731516,"size":1316,"snap":"2020-34-2020-40","text_gpt3_token_len":290,"char_repetition_ratio":0.13795732,"word_repetition_ratio":0.0,"special_character_ratio":0.20972644,"punctuation_ratio":0.08076923,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99397933,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-13T12:22:35Z\",\"WARC-Record-ID\":\"<urn:uuid:08ef47b6-e281-423a-b769-465b144fc3d7>\",\"Content-Length\":\"19333\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:54286f54-55d7-4079-90f2-c4cd465bddfb>\",\"WARC-Concurrent-To\":\"<urn:uuid:b48f561a-3a9f-4a88-9b35-6946878def7d>\",\"WARC-IP-Address\":\"52.10.26.123\",\"WARC-Target-URI\":\"https://ask.extension.org/questions/259756\",\"WARC-Payload-Digest\":\"sha1:KQI7U6FTQA2TEILS6YDJGXOZZK3KLGFS\",\"WARC-Block-Digest\":\"sha1:KMT7HT2ECUCJBYRLKEYCVDY6WUBWKZXT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738982.70_warc_CC-MAIN-20200813103121-20200813133121-00467.warc.gz\"}"} |
https://researchers.mq.edu.au/en/publications/new-access-to-homodinuclear-half-sandwich-vinylidenemanganese-com | [
"Koushik Venkatesan, Thomas Fox, Helmut W. Schmalle, Heinz Berke*\n\n*Corresponding author for this work\n\nResearch output: Contribution to journalArticle\n\n29 Citations (Scopus)\n\n### Abstract\n\nThe d6 low-spin Mn1 half-sandwich dinuclear complexes of the type [{Mn(MeC5H4)(R2PCH 2CH2PR2)=C=C(SnMe3)}2{X}] (X = {μ-1,4-C6H4}, R = Me, 2a; X = {μ-1,4-C 6H4}, R = Et, 2b; X = {μ-1,3-C6H 4}, R = Me, 3a; X = {μ-1,3-C6H4}, R = Et, 3b; X = {μ-4,4-C6H4-C6H4}, R = Me, 4a; X = {μ-4,4-C6H4-C6H4), R = Et, 4b; X = {μ-1,4-C4H2S}, R = Me, 5a, X = {μ-1,4-C4H2S}, R = Et, 5b) were obtained by the treatment of [Mn(C5H4Me) (η6- cycloheptatriene)] with 0.5 equiv. of the corresponding acetylene Me 3Sn-C≡C-X-C≡C-SnMe3 (X = {μ-1,4-C 6H4), {μ-1,3-C6H4}, {μ-4,4-C6H4-C6H4}, {μ-1,4-C4H2S}) and R2PCH2CH 2PR2 (R = Me, Et) at 50 °C for 12 h to yield the corresponding dinuclear complexes in very good yields. These dinuclear tin-substituted vinylidene complexes were further treated with an excess of MeOH to give the corresponding dinuclear parent vinylidene complexes of the type [{Mn(MeC5H4)(R2PCH2CH 2PR2)=C=C(H)}2{X}] (X = (μ-1,4-C 6H4), R = Me, 6a; X = {μ-1,4-C6H 4), R = Et, 6b; X = {μ-1,3-C6H4}, R = Me, 7a; X = {μ-1,3-C6H4}, R = Et, 7b; X = {μ-4,4-C 6H4-C6H4), R = Me, 8a; X = {μ-4,4-C6H4-C6H4), R = Et, 8b). All dinuclear compounds were characterised by NMR and IR spectroscopy and elemental analysis. X-ray diffraction studies were performed on complexes 2b, 3a, 4a and 6a.\n\nOriginal language English 901-909 9 European Journal of Inorganic Chemistry 5 https://doi.org/10.1002/ejic.200400686 Published - 4 Mar 2005 Yes"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.81010056,"math_prob":0.9575425,"size":1609,"snap":"2020-45-2020-50","text_gpt3_token_len":717,"char_repetition_ratio":0.18068536,"word_repetition_ratio":0.04296875,"special_character_ratio":0.40957117,"punctuation_ratio":0.18324608,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9592369,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-24T13:15:57Z\",\"WARC-Record-ID\":\"<urn:uuid:0315489d-c1df-4d79-94ff-613de8e44373>\",\"Content-Length\":\"47817\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1eaf1b30-f05d-4c5b-8136-bdf7a946208a>\",\"WARC-Concurrent-To\":\"<urn:uuid:393c1b1b-86e6-4aed-a4c0-4ebd03edef65>\",\"WARC-IP-Address\":\"18.139.148.124\",\"WARC-Target-URI\":\"https://researchers.mq.edu.au/en/publications/new-access-to-homodinuclear-half-sandwich-vinylidenemanganese-com\",\"WARC-Payload-Digest\":\"sha1:KNXQK7KJIQQ2422HGYDI2SNLHIS3UBAV\",\"WARC-Block-Digest\":\"sha1:YDV3LFCAPPCHLRIHR63DKUYVOWNKH2OY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107882581.13_warc_CC-MAIN-20201024110118-20201024140118-00189.warc.gz\"}"} |
http://www.readbag.com/cambridge-resources-0521493455-8864-chapter-3 | [
"`Solutions to Problems in Chapter 3: Geometrical Optics[Figure and equation numbers in the answers are preceded by "iii" so as to avoid confusion with figure and equation numbers in the text.] 3.1 The foci of a mirror in the form of an ellipsoid of revolution are conjugate points (Problem 2.5). What is the magnification produced, in terms of the eccentricity of the ellipsoid? (Tricky) In fact, the image formed from a finite object is so severely aberrated that its magnification can not be defined. If we consider the system as a symmetrical one (rays passing through the region around A in Fig. iii.1), then its magnification is clearly unity. If we consider the region around B as an approximately spherical mirror, then the magnification is (1 + e)/(1 - e), where e (a2 - b2 )1/2 /a is the eccentricity of the ellipsoid; similarly, the region around C gives (1 - e)/(1 + e).Fig. iii.1. Imaging by an ellipsoid of revolution.1\f2Geometrical OpticsFig. iii.2. Periscope design. The rays designated by full lines enter and leave parallel to the axis, and those designated by broken lines are at 30 to the axis.3.2 In order to use a microscope to observe an inaccessible specimen, one can introduce a relay lens between the specimen and the objective, so that the microscope looks at a real image of the specimen. Draw a ray diagram of the system, and find the influence of the relay lens on the exit pupil and the field of view. For ray-tracing we represent the eyepiece by a single lens. The full NA of the objective will only be used if the relay lens subtends a cone of rays at least as steep as the objective can accept. This is of course difficult to achieve if the objective has high NA, and so the relay lens becomes the aperture stop of the system and reduces its effective NA. Its image in the combination of objective and eyepiece is now the exit pupil. Since the relay lens is outside the focus of the objective, a real image of it is formed between the objective and the eyepiece, and then the exit pupil is further away from the eyepiece than in the original microscope. The field of view is limited by the eyepiece, and is unaffected by the relay lens according to Gaussian optics. In practice, it is difficult to find long focal length lenses of good enough quality not to degrade the performance of a well-designed objective at off-axis points, and so the relay lens generally reduces both the resolution and the usable field of view of the microscope. 3.3 Design a periscope having a length of 2 m and a tube diameter of 0.1 m. The field of view must be a cone of semi-angle 30 . The periscope needs several relay and field lenses. Use paraxial optics only. We neglect the mirrors at the two ends (Fig. iii.2). All the light entering the tube must leave through the other end, so these are entrance and exit\fGeometrical Optics3pupils. There has to be a lens at the entrance to permit all the light up to 30 to enter. Its focal length, which we shall call 2f , is determined by the requirement that a marginal ray at the edge of the angular field of view focusses within the tube; this gives 2f 8 cm. The focal plane is the place for a field lens, of focal length f , which creates an intermediate pupil of diameter equal to the entrance pupil. In the plane of this pupil we put a relay lens, also of focal length f , and so on. For the given dimensions, and 2f = 8 cm, the total number of lenses is 26; the figure shows the principle for a shorter periscope. 3.4 A Galilean telescope has an objective lens with a long positive focal length and an eyepiece with a short negative focal length.1. What is the distance between the two lenses, when the telescope is focussed on infinity and the image appears at infinity? 2. Is the image upright or inverted? 3. Where is the exit pupil? 4. What determines the field of view in this type of telescope? 5. Why are Galilean telescopes rarely used except as toys?(a) The distance between the lenses is the algebraic sum of the focal lengths (see Fig. 3.10), which is shorter than the focal length of the objective lens. (b) The image is upright. (c) The exit pupil, being the image of the objective lens in the (diverging) eyepiece, is between the two lenses. (d) The field of view is determined by the size of the objective lens, since the eye can not be placed at the exit pupil. (e) Galilean telescopes are rarely used because their field of view is limited, and also because a reticle or cross-hairs can not be placed at the intermediate image position, which is behind the observer's eye. However, a Galilean telescope is shorter than an astronomical telescope using the same objective, and the image is upright. 3.5 Two converging lenses are separated by a distance a little greater than the sum of their focal lengths. Show that this combination produces a real image of a distant source, but that the focal length is negative! How can you explain this surprising fact physically? We have to locate the principal planes of the combination. When we do this, we find that H is to the right of F2 , which explains why the focal length is negative; see Fig. iii.3.\f4Geometrical OpticsFig. iii.3. Two converging lenses have a negative focal length.3.6 A compound lens consists of two positive thin lenses L1 and L2 , with focal lengths 90 mm and 30 mm and apertures 60 mm and 20 mm respectively. L1 L2 = 50 mm. Between the lenses, in the plane 30 mm from L1 there is an axial aperture with diameter 10 mm. Where is the aperture stop, for a given axial object 120 mm in front of L1 ? Find also the positions of the entrance and exit pupils. The axial aperture is the aperture stop. The entrance pupil is 45 mm to the right of L1 and the exit pupil 60 mm to the left of L2 . They are both virtual images of the aperture. 3.7 The following is a useful method of finding the refractive index of a transparent material in the form of a parallel-sided plate with thickness d. A microscope is focussed on an object. The plate is inserted between the object and the microscope objective, and the microscope is re-focussed. The distance that the microscope moves in refocussing is measured. Find the relationship between this distance, the refractive index and d. Estimate the accuracy of the method. For Gaussian optics, the displacement is x = (1 - n-1 )d. For large apertures, spherical aberration becomes significant. As in problem 2.6 the depth of focus is given by x = 2f 2 /D2 , where D is the diameter of the lens, from which the accuracy of determining n can be deduced. 3.8 A planar object is imaged by a thin lens. The object lies in a plane which is not normal to the optical axis of the lens. Show that the image lies in a plane which is also inclined to the optical axis, and that the object and image planes intersect in the plane of the lens. This is called the Scheimpflug construction, and is important in the design of cameras for architectural and aerial photography. Show that the image of a rectangular object is distorted into a trapezoidal shape. We will solve this algebraically. For a thin lens, v -1 - u-1 = f -1 . Now\fGeometrical Optics5Fig. iii.4. Scheimpflug construction.we define the object position in terms of its height h1 as u = u0 + h1 , and the corresponding image position will be v = v0 + h2 , where the object and image intersect the axis at u0 and v0 and their planes are tilted at and to the axis (Fig. iii.4). Using the small-angle approximation, we have:1 1 1 1 1 = - = - f v u v0 (1 + h2 /v0 ) u0 (1 + h1 /u0 ) 1 h2 1 h1 (1 - )- (1 - ) v0 v0 u0 u0 h2 h1 1 = - 2 + 2 . f v0 u0 (iii.1) (iii.2) (iii.3)Thush1 h2 = 2 . 2 v0 u0 (iii.4)Now h2 /h1 = v0 /u0 from which (iii.4) gives / = v0 /u0 . Remembering that v0 and u0 have opposite signs, this means that the object and image planes intersect in the plane of the lens. 3.9 Within the limitations of Gaussian optics, is it possible to replace a glass sphere of any refractive index by a single thin lens ? If the thin lens is symmetrical and made of glass with the same refractive index as the sphere, what are its radii of curvature? The matrix for a glass sphere with radius R and refractive index n is\f6Geometrical OpticsFig. iii.5. Retro-reflection (a) by an eye, (b) by a glass sphere. The latter is obtained for non-paraxial rays if 2 < n < 2.a cb d=2/n - 1 -2(n - 1)/Rn2R/n 2/n - 1(iii.5)Then, we find that the distance from the first vertex to the first principal plane is (a - 1)/c = R and that from the second vertex to the second principal plane is (1 - d)/c) = -R. Thus, the two principal planes coincide and lie in the diametrical plane of the sphere, z = 0. As a result, the sphere can be replaced by a single thin lens. For a biconvex lens with radii ±R0 the value of c = -1/f = 2(1 - n)/R0 and equating this to c in (iii.5) we find that R0 = nR. 3.10 Why do eyes reflect incident light back in the direction of the source (the "red eye" phenomenon in flash photography)? How are "cat's eye" reflectors on roads and road signs constructed? Fig. iii.5(a) shows the rays trace for parallel light incident on an eye. The light is focussed onto the retina. Any reflected light returns parallel to the incident direction and therefore appears as a bright source. This is called a "retro-reflector". The colour red indicated that the retinal cells reflect more red light than other colours; for cats, the relevant colour is green. "Cat's eye" reflectors on the road are an approximation to this situation. For a sphere of glass, the front surface acts as a lens with a lot of spherical aberration. Paraxial incident rays focus onto the back surface when the refractive index n = 2, but rays further from the axis focus closer to the front and are not retro-reflected. When 2 < n < 2 rays at some distance from the axis (i.e. angle of incidence ^ between 0 and i i 90 ) are retro-relected. From Fig. iii.5(b) you can see that ^ has to satisfy n sin(^/2) = sin ^, which is satisfied by an annulus of the incident light; i i enough to give retro-reflection of part of the incident light. For example, for n = 1.51, retro-reflection occurs for rays at ^ = 80 (shown emphasized i in the figure).\fGeometrical Optics7Fig. iii.6. Relationship between focal length and f-number, and the separation between the zoom lens components.3.11 A zoom lens consists of two lenses, with focal lengths 100 mm and -20 mm respectively. Plot a graph showing the effective focal length and f -number of the combination, as a function of the distance between the two lenses. From (3.52) we see that for two lenses with focal lengths f1 and f2 separated by l,-c = 1 1 1 l = + - . feff f1 f2 f1 f2 (iii.6)Fig. iii.6 shows the focal length calculated from (iii.6). We assume the positive lens to be the aperture stop and take its diameter as, say, 20 mm. The f -number is inversely proportional to the angle made at the focus by an edge ray from infinity going through the aperture stop. It is therefore given here by f /20, its value is shown on the right hand scale. 3.12 A glass shell with refractive index 1.5 has equal radii of curvature on both sides ( one is convex, the other concave). The radii are both 100 mm and the thickness is 1.5 mm. (a) Without carrying out any calculation, decide whether the shell acts as a lens with positive or negative optical power. (b) Find its focal length and principal planes. (a) See Fig. iii.7. A ray entering parallel to the axis will be refracted towards it, and therefore meets the second surface when it is closer to the axis. It is therefore deflected back by a smaller angle. It is useful to look at the prism formed by the relevant tangent planes at the points of intersection (shown by broken lines) to see the ray deviation, which is always in the direction of the base of the prism. The lens therefore has\f8Geometrical OpticsFig. iii.7. Ray trace for a glass shell with equal radii of curvature on both sides.positive power. (b) The focal length is 40 m and H1 and H2 are 200 mm to the left of the two vertices, respectively. 3.13 The glass shell of the previous problem now has two concentric surfaces, the outer one having radius 100mm. Answer the same questions about the new shell. (a) A ray entering parallel to the axis is refracted towards it. It now meets the second surface at a point where normal is at a larger angle (use the prism construction again) and therefore is refracted back at a larger angle than the incident; thus the shell behaves as a divergent lens. (b) The focal length is -19.7 m and the principal planes coincide at distance 100 mm to the right of the first surface. Like the sphere (problem 3.9) the system is equivalent to a single thin lens at its centre. 3.14 Write a computer program based on the Gaussian matrices to find the cardinal points of any paraxial optical system defined by coaxial spherical interfaces between regions of given refractive indices, and/or thin lenses. Use it to check the results of problems 3.4-3.6. A sample program is descibed in the software section of the web-site. 3.15 Show that in a symmetrical imaging system with unit paraxial magnification the distortion must be zero. Each light ray through the system is reversible. On the one hand, the distortion must double if we go back from the image through the lens to the object. On the other hand, the reversal must eliminate the distortion. Thus it must be zero. 3.16 Design a lens of the type shown in Fig. 3.26(b) with n = 2 and f = . What is m when O is at the aplanatic point? Explain physically why the lens magnifies, even though its effective focal length is infinite.\fGeometrical Optics9Fig. iii.8. Ray trace for an aplanatic lens, imaging O to I. The ray in the lower half shows why the system is afocal.A lens with r1 = -0.5, t = 1, r2 = -1 will have f = and the aplanatic point of the second surface is at the centre of the first one (Fig. iii.8. The lens has its principal planes at . The magnification M = (v - vp )/(u - up ) can then be finite. To avoid infinities, consider the case where r2 is replaced by -0.999 in the above lens. Then f = 499.5 and H1 and H2 are at +250 and +500 with respect to their vertices. Since the object is at -0.5 and the image at -3, the magnification is approximately 2. Actually, imaging by an afocal system is quite common; consider a simple telescope, Fig. 3.10(a), looking at an object at a finite distance. The image, which can be real or virtual, is also at a finite distance. 3.17 An observer sees a object through a thick glass window. Design a paraxial optical system which can be placed before the window so that the observer sees the object in its actual position, as if the window were not there. (This problem was posed as a challenge to optical designers by the journal "Applied Optics" some decades ago, but is quite easily solved using matrix optics when you decide exactly what you require of the principal points.) We define two planes outside the thick window, on opposite sides, separated by distance d. Then, if the complete system including the window is between these planes, and it does nothing, then the matrix between these planes must be the translation matrix in air:1 0 d 1 (iii.7)Clearly the system is afocal (feff ), and every entering ray exits along the same line as it enters. One symmetrical system which satisfies this requirement is shown in Fig. iii.9(a), consisting of three lenses. Two rays are shown, one inclined to the axis and one parallel to it. Then, the central\f10Geometrical OpticsFig. iii.9. Cancelling the effect of a thick window: (a) Principle using a three-lens system; (b) Distributing the components symmetrically on both sides.Fig. iii.10. A symmetrical system with H1 to the right of H2 .diverging lens can be thickened sufficiently to include the window (Fig. iii.9(b)). Practically, one would build two identical units each consisting of a converging lens and a plano-concave lens; then the plane surfaces would be place in contact with the two sides of the window. 3.18 Can you find a thin lens combination which has positive effective focal length but has the principal point H1 to the right of H2 ? One way to do this is to design a symmetrical zoom lens. Then, since H2 is to the left of the system, by symmetry, H1 must be to its right. Fig. iii.10 is an example.\fGeometrical Optics11Fig. iii.11. Ray diagram for a slide projector.3.19 A slide projector has a powerful lamp, a condenser lens, a slideholder and an imaging lens. Draw a ray diagram for rays forming an image of a point on the slide on a distant screen, and determine where are the entrance and exit pupils of this system. The ray diagram and pupils are shown in Fig. iii.11 3.20 Discuss the ray optics involved in the formation of a rainbow (both first and second orders) by refraction and reflection of sunlight by spherical water drops. There are also "supernumerary bows", which occur next to the blue edge of the rainbow, when the raindrops are uniform in size. These can be explained by interference. If the water drops were replaced by an assembly of ZnS spheres (n = 2.32), at what angles would the rainbows appear, and how many would there be? [n.b. This problem can not be solved analytically, but needs numerical calculations.] With the help of Chapter 5, explain why light from the rainbow is polarized. The general topic of the rainbow is too complicated to do more than summarize it here, and the reader is referred to "The Rainbow Bridge", R. L. Lee and A. B. Fraser, Penn. State University Press (2001). When the deviation of an incident ray, expressed as a function of the angle of incidence (i.e. impact parameter) has a minimum, a stronly reflected ray is seen. Because the refractive index is a function of wavelength, this angle varies with the colour and a rainbow is seen, of order m which is the number of internal reflections suffered by the ray. For water, n = 1.33, the rays with m = 1 and m = 2 have minima, and are reflected opposite the sum (/2 < < 3/2). However, it follows from the arguments in problem 3.10 above that when n > 2 the picture of first and second-order bows turns out to change dramatically and the results are shown in Fig. iii.13(b) suggesting that the 3rd and 4th order rainbows would be opposite the Sun.\f12Geometrical OpticsFig. iii.12. Formation of rainbows: (a) Ray diagram for a ray with impact parameter b; (b) deviation as a function of angle of incidence for n = 2.32. The minima represent rainbows. Deviations between 1-3, 5-7 ...×/2 (shaded) are opposite the sun.A ray parallel to the optical axis is incident on a spherical drop of radius R with refractive index n at distance b from the axis. This defines the ray's angle of incidence at the drop surface as ^ = sin-1 (b/R). Then i Snell's law gives the angle of refraction r . From Fig. ??(a) it is easy to see ^ that after m reflections at the drop-air interface, the angle of deviation of the exiting ray ism (^) = 2(^ - r ) + m( - 2^) i i ^ r = m + 2^ - 2(m + 1)^. i r (iii.8) (iii.9)The rainbow arises when this function has an extreme value. For n = 1.33 (water), there are extreme values for all m > 0. For a rainbow to be visible, it has to be sought opposite to the sun, implying /2 < < 3/2, 5/2 < < 7/2 etc. Plotting out the values of (iii.9) numerically for 0 < ^ < /2 i o gives visible water rainbows at 138 = (180 - 42) and 230 = (180 + 50)o for m = 1 and 2 respectively, giving bows at 42o and 50o respectively. The colours arise because these angles are dependent on n. The next visible rainbow is for m = 5 at (540 - 49)o . However, the intensity of a rainbow is determined the mth power of the reflection coefficient at an air-water interface. This is typically a few percent (it depends on ^ and i the polarization) and therefore even the second order rainbow is difficult to see, let alone the fifth order one. Looking at the reflection coefficient (see §5.4) it is clear that the angles ^ are closer to the Brewster angle (49o for water) than to normal incidence, i and so the polarization is reflected much better than the . Thus the rainbow is quite strongly polarized tangentially with respect to the anti-\fGeometrical Optics13Fig. iii.13. Aplanatic spheres used as a solar collector.Sun point. Supernumerary bows occur because, at an angle close to the extremum, there are two rays at different b which have the same deviation. These can interfere, the path difference depending on and R. If R is well-defined, the resultant interference oscillations in the intensity as a function of are visible. When the refractive index is n = 2.32, the third and fourth orders have extrema in the region 5/2 < < 7/2 at 486o = (540 + 54)o and 621o = (630 - 9)o (Fig. ??(b)). The reflection coefficient is rather larger for this refractive index, so but the bows are still quite strongly polarized. 3.21 The aplanatic surfaces of a sphere are spherical, and therefore the edges of a circular source can be imaged with no aberrations using a spherical immersion lens. Discuss how this remark could be developed into a design for an ideal solar concentrator, with the addition of a single lens (as in the microscope objective in §3.8). How could you overcome the problem of chromatic dispersion in this system? Fig. iii.13 shows a cross-section of a glass sphere with the two conjugate aplanatic spheres. Now the Sun is imaged by a collector lens so that the edges of the image lie on the outer aplanatic sphere, and then the edges of the aplanatic image within the sphere have no spherical aberration; thus a solar cell can be tailored to this image with minimum losses. This system is very efficient, particularly because the solar cell is "immersed" in the sphere. This idea can be used to improve the efficiency of an electronic camera, when an aplanatic microlens is attached to each pixel. A problem is that the solar cell or pixels have to be round in order to use it\f14Geometrical Opticsmost efficiently. Chromatic dispersion could be addressed by designing a suitable doublet for the first (conventional) lens.\f`\n\n14 pages\n\n#### Report File (DMCA)\n\nOur content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:\n\nReport this file as copyright or inappropriate\n\n563412"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9273871,"math_prob":0.9829579,"size":22346,"snap":"2020-10-2020-16","text_gpt3_token_len":5582,"char_repetition_ratio":0.14470504,"word_repetition_ratio":0.015957447,"special_character_ratio":0.25073838,"punctuation_ratio":0.11409682,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9895469,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-23T10:55:34Z\",\"WARC-Record-ID\":\"<urn:uuid:6616ac9b-3091-443d-9333-5449f6241bf5>\",\"Content-Length\":\"30798\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cbd29ae1-d7b2-4c3b-a21d-392d4ffecaf1>\",\"WARC-Concurrent-To\":\"<urn:uuid:511c7e58-ba4d-4d70-babd-802ff6d29dae>\",\"WARC-IP-Address\":\"104.18.49.46\",\"WARC-Target-URI\":\"http://www.readbag.com/cambridge-resources-0521493455-8864-chapter-3\",\"WARC-Payload-Digest\":\"sha1:PVGGLCZGTYGQDHOQ5F5YQDLTV3GJVI6I\",\"WARC-Block-Digest\":\"sha1:7BAB4GLMBZQF7LUZERWDQQFPEFXWYRXA\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145767.72_warc_CC-MAIN-20200223093317-20200223123317-00136.warc.gz\"}"} |
https://thispointer.com/python-different-ways-to-iterate-over-a-list-in-reverse-order/ | [
"Python : Different ways to Iterate over a List in Reverse Order\n\nIn this article we will discuss different ways to Iterate over a python list in reverse order.\n\nSuppose we have a python list of strings i.e.\n\n# List of string\nwordList = ['hi', 'hello', 'this', 'that', 'is', 'of']\n\nNow we want to iterate over this list in reverse order( from end to start ) i.e.\nof\nis\nthat\nthis\nhello\nhi\n\nWe don’t want to change the order in existing list, just want to iterate in reverse. Now let’s see how to do this using different techniques,\n\nIterate over the list in reverse using while loop\n\nGet the size of list and using random and use random access operator [] to access elements in reverse i.e. from (size-1) to 0.\n\n'''\nIterate over the list in reverse using while loop\n'''\n# Point i to the last element in list\ni = len(wordList) - 1\n\n# Iterate till 1st element and keep on decrementing i\nwhile i >= 0 :\nprint(wordList[i])\ni -= 1\n\nIterate over the list in reverse using for loop and range()\n\nSuppose if wordList had n elements then,\n\nrange( len(wordList) - 1, -1, -1)\n\nWill return list of numbers from n to 1\n\nFor example, wordList had 5 elements then above specified range() function will return,\n\n4, 3, 2 , 1, 0\n\nNow use that range() function in for loop and use random access operator [] to access elements in reverse i.e.\n\n'''\nIterate over the list using for loop and range()\n'''\nfor i in range( len(wordList) - 1, -1, -1) :\nprint(wordList[i])\n\nIterate over the list using for loop and reversed()\n\nreversed(wordList)\n\nreversed() function returns an iterator to accesses the given list in the reverse order.\n\nLet’s iterate over that reversed sequence using for loop i.e.\n\n'''\nIterate over the list using for loop and reversed()\n'''\nfor i in reversed(wordList) :\nprint(i)\n\nIt will print the wordList in reversed order.\n\nIterate over the list using List Comprehension and [::-1]\n\nwordList[::-1]\n\nIt will create a temporary revesed list\n\nLet’s use this in List comprehension to iterating over the list in reverse i.e.\n\n'''\nIterate over the list using List Comprehension and [::-1]\n'''\n[print (i) for i in wordList[::-1]]\n\nIterate over the list using List Comprehension and reversed()\n\n'''\nIterate over the list using List Comprehension and [::-1]\n'''\n[print (i) for i in reversed(wordList)]\n\nComplete example is as follows,\n\"\"\"\nDifferent ways to Iterate over a list in reverse Order\n\"\"\"\n\ndef main():\n\n# List of string\nwordList = ['hi', 'hello', 'this', 'that', 'is', 'of']\n\n#print the List\nprint(wordList)\n\n'''\nIterate over the list in reverse using while loop\n'''\n# Point i to the last element in list\ni = len(wordList) - 1\n\n# Iterate till 1st element and keep on decrementing i\nwhile i >= 0 :\nprint(wordList[i])\ni -= 1\n\nprint(\"*************\")\n\n'''\nIterate over the list using for loop and range()\n'''\nfor i in range( len(wordList) - 1, -1, -1) :\nprint(wordList[i])\n\nprint(\"*************\")\n\n'''\nIterate over the list using for loop and reversed()\n'''\nfor i in reversed(wordList) :\nprint(i)\n\nprint(\"*************\")\n\n'''\nIterate over the list using List Comprehension and [::-1]\n'''\n[print (i) for i in wordList[::-1]]\n\nprint(\"*************\")\n\n'''\nIterate over the list using List Comprehension and [::-1]\n'''\n[print (i) for i in reversed(wordList)]\n\nif __name__ == \"__main__\":\nmain()\n\nOutput:\n['hi', 'hello', 'this', 'that', 'is', 'of']\nof\nis\nthat\nthis\nhello\nhi\n*************\nof\nis\nthat\nthis\nhello\nhi\n*************\nof\nis\nthat\nthis\nhello\nhi\n*************\nof\nis\nthat\nthis\nhello\nhi\n*************\nof\nis\nthat\nthis\nhello\nhi"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.69337565,"math_prob":0.43931502,"size":3431,"snap":"2022-05-2022-21","text_gpt3_token_len":873,"char_repetition_ratio":0.21680771,"word_repetition_ratio":0.50592214,"special_character_ratio":0.3194404,"punctuation_ratio":0.109445274,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9622636,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-23T22:23:47Z\",\"WARC-Record-ID\":\"<urn:uuid:f1792918-fbf6-44e5-8579-13113e2089aa>\",\"Content-Length\":\"220535\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4a93f88e-83e7-4414-833b-6a49afda8b48>\",\"WARC-Concurrent-To\":\"<urn:uuid:b54104f6-39ff-4f10-9088-030a21969f5a>\",\"WARC-IP-Address\":\"104.21.34.30\",\"WARC-Target-URI\":\"https://thispointer.com/python-different-ways-to-iterate-over-a-list-in-reverse-order/\",\"WARC-Payload-Digest\":\"sha1:6F6JSEIWBAGEZOB66RQFFQGKW74DIB7P\",\"WARC-Block-Digest\":\"sha1:27ZALJJCDXF4K2MTBELH7NSYORFFVYZH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304309.59_warc_CC-MAIN-20220123202547-20220123232547-00262.warc.gz\"}"} |
https://antimatter.ie/category/introductory-physics/ | [
"# Category Archives: Introductory physics\n\n## Back to school\n\nIt was back to college this week, a welcome change after some intense research over the hols. I like the start of the second semester, there’s always a great atmosphere around the college with the students back and the restaurants, shops and canteens back open. The students seem in good form too, no doubt enjoying a fresh start with a new set of modules (also, they haven’t yet received their exam results!).\n\nThis semester, I will teach my usual introductory module on the atomic hypothesis and early particle physics to second-years. As always, I’m fascinated by the way the concept of the atom emerged from different roots and different branches of science: from philosophical considerations in ancient Greece to considerations of chemistry in the 18th century, from the study of chemical reactions in the 19th century to considerations of statistical mechanics around the turn of the century. Not to mention a brilliant young patent clerk who became obsessed with the idea of showing that atoms really exist, culminating in his famous paper on Brownian motion. But did you know that Einstein suggested at least three different ways of measuring Avogadro’s constant? And each method contributed significantly to establishing the reality of atoms.",
null,
"In 1908, the French physicist Jean Perrin demonstrated that the motion of particles suspended in a liquid behaved as predicted by Einstein’s formula, derived from considerations of statistical mechanics, giving strong support for the atomic hypothesis.\n\nOne change this semester is that I will also be involved in delivering a new module, Introduction to Modern Physics, to first-years. The first quantum revolution, the second quantum revolution, some relativity, some cosmology and all that. Yet more prep of course, but ideal for anyone with an interest in the history of 20th century science. How many academics get to teach interesting courses like this? At conferences, I often tell colleagues that my historical research comes from my teaching, but few believe me!\n\nUpdate\n\nThen of course, there’s also the module Revolutions in Science, a course I teach on Mondays at University College Dublin; it’s all go this semester!\n\n## Introductory physics: the photoelectric effect\n\nOne of the last lectures in an introductory physics course is usually a description of the photoelectric effect. This is because the effect is a beautiful manifestation of one of the astonishing discoveries of modern physics; that light, known to behave as an electromagnetic wave, can in some circumstances behave as a stream of discrete particles.\n\nThe first hint of this dual nature of light arose from Planck’s study of blackbody radiation in 1900 (see post on radiation). Planck found that he could only predict the observed spectrum of radiation from a hot body if it was assumed that the radiation was transferred between the body and the walls of a container in tiny, discrete packets or quanta of energy, each quantum having an amount of energy given by E = hf ; here f is the frequency of the radiation and h is a fundamental constant of nature (extremely small) that became known as Planck’s constant.\n\nThis assumption was regarded as something of a puzzling mathematical trick until a young Einstein suggested in a famous paper that it was the light itself (as opposed to some transfer process) that was quantized i.e. the blackbody spectrum could be described by assuming that light was behaving like a stream of extremely small, discrete bundles of energy, each of energy E = hf. This was a bold assumption as the wave properties of light were well established, but Einstein backed up the idea by showing it explained several other puzzling phenomena, not least the photoelectric effect.\n\nThe photoelectric effect was a well-known phenomenon whereby light incident on a metal could cause electrons to be released by the metal (measurable as an electric current). A great puzzle was that the effect ocurred only for light above a certain frequency, characteristic of the metal under investigation; this result was completely inexplicable in terms of the familiar wave theory of light.",
null,
"Light of a certain frequency incident on a metal causes a current to flow\n\nEinstein showed that the photoelectric effect could be easily explained if the incoming light was behaving as a stream of discrete packets (or photons) of energy. Invoking the conservation of energy, he predicted that the maximum kinetic energy (K.E.) of electrons liberated from the metal would be given by\n\nK.E.e = hf – W0\n\nwhere each incoming photon of light has an energy of hf and W0 is the binding energy (or work function) of the metal. Clearly, electrons could be released from the metal only if the incoming light was of a frequency such that hf > W0 , irrespective of the intensity of the radiation! Could it be that simple? The experimentalist Phillipe Lenard disliked Einstein’s idea intensely and set about disproving it in a series of experiments; years of careful experimentation showed that Einstein’s theory was exactly right in its predictions (see here for more details).",
null,
"Experimental measurement of the photoelectric effect: no electrons are emitted below the cut-off frequency\n\nThe explanation of the photoelectric effect was a significant breakthrough in physics as it represented the first unequivocal evidence of duality; the phenomenon whereby light can behave as a wave in some situations and as a stream of particles (or quanta of energy) in others. This duality formed a cornerstone of the new quantum theory and was later found to be a universal truth of the microworld – entities known as ‘particles’ such as electrons and even atoms were in turn found to exhibit wave behaviour. Indeed, the quantum equation E = hf is as important in modern physics as E = mc2 and it was for his explanation for the photoelectric effect (not for special or general relativity) that Einstein was awarded the 1921 Nobel Prize in physics.\n\nHistorical note\n\nPhilosophers and journalists often claim that ‘Einstein disliked quantum theory’. It should be clear from the above that Einstein was one of the major pioneers of quantum physics; his view of quanta of light was far ahead of its time and was at first strongly resisted by the scientific establishment (including Planck). What Einstein disliked was a later interpretation of quantum theory known as the Copenhagen interpretation, a view of the quantum world that is still debated today.\n\nExcercise\n\nIf light of wavelength 780 nm is incident on sodium metal (work function of 3.6 x 10-19 J), calculate the maximum kinetic energy of emerging electrons. (Hint: recall that wavelength and frequency are related by c = fλ and note that h = 6.6 x 10-34 Js )\n\n1 Comment\n\nFiled under Introductory physics\n\n## Introductory physics: the lens\n\nA spectacular application of the phenomenon of refraction (see previous post) is the lens. Just as a focusing mirror is used to obtain an image of a distant object (see post on mirrors), a lens is used to focus light by refraction. The difference is that the light is transmitted through a lens – it is refracted once entering the lens and again as it passes out again. Lenses are cut from parabolic surfaces in such a way that distant rays are brought to a focus at the focal point.\n\nAs with mirrors, there are two types of lenses, depending on the curvature of cut: a convex lens causes parallel rays of light to converge to a real focus, while a concave lens cause the light to appear to diverge from a virtual focus.",
null,
"As with mirrors, the position of an image will depend on the distance of the object from the lens (but the image of a distant object will of course be at the focal point of the lens). Amazingly, the same equation applies: for an object a distance u from a lens of focal length f, the location v of the image can be found from the relation\n\n1/u1/v = 1/f\n\n(Note that for a distant object u = and hence v = f ). The magnification m of the image can be calcuated from the equation m = –v/u, as before.\n\nApplications\n\nLenses are used extensively in everyday life. The most common example is of course spectacles. No one knows when spectacles were first invented (12th century?), but they have been used throughout the ages to improve defective human eyesight.\n\nTypically, spectacle lenses are concave (diverging) lenses are made from glass or plastic. This is because the most common eyesight defect is myopia (shortsightedness), a condition where the natural lens of the eye focuses too strongly i.e. an image is formed short of the retina. A diverging lens of the right strength placed in front of the eye will cause the image to be projected back on the retina as normal.",
null,
"Concave (diverging) lens used to correct myopia\n\nIn the case of hyperopia (the longsightedness that occurs commonly in older people), the eye muscles are weakened and an image is formed beyond the retina; this is corrected by placing a convex (converging) lens in front of the eye in order to strengthen it i.e. shorten the focal length of the eye’s natural lens.",
null,
"Converging lens used to correct longsightedness\n\nA modern application is the contact lens: this operates on the same principle as above, but the lens is made of a soft fabric that can be worn directly on the pupil. A third option nowadays is laser surgery; in this case the focal length of the eye’s natural lens is adjusted directly (and permanently) by laser treatment.\n\nLenses and science\n\nLenses played a pivotal role in the development of science. In the 17th century, advances in lens technology led directly to the invention of the microscope, a device that revolutionized our view of the world of the very small: and to the development of the telescope, an invention that revolutionized our view of the solar system and ultimately the entire universe.\n\nExercises\n\n1. If an object 5 cm high is placed 30 cm in front of a convex (converging) lens of focal length 20 cm, calculate the position and height of the image. Is the image real or virtual?\n\n2. As a shortsighted person ages, can the onset of longsightedness cancel myopia?\n\nFiled under Introductory physics, Teaching\n\n## Introductory physics: refraction\n\nLight can be refracted as well as reflected: in refraction, light is transmitted, but changes direction as it passes from one medium to another. This familiar phenomenon occurs because light has different velocities in different media. The behaviour can be explained using wave theory but luckily the main results can be described using simple geometrical optics.",
null,
"The tube appears bent because of the refraction of light\n\nIt can be shown that when a ray passes from one medium (1) to another (2) that is denser, the ray of light is bent towards the normal to the interface – and when a ray passes from a medium to a less optically dense one the ray is bent away from the normal. More quantitatively, the angle of incidence i (the angle between an incident ray and the normal) and the angle of refraction r (the angle between the refracted ray and the normal) are related by the simple equation\n\nsin i/sin r = n2/n1\n\nwhere n is a property of a medium known as its refractive index (related to the velocity of light in the medium)",
null,
"Sell’s law: sin i/sinr = n2/n1\n\nNote the reversibility of light: if a ray bends closer to the normal upon entering water, it bends further from the normal upon leaving it i.e. all the diagrams work in either direction.\n\nSome typical values for the index of refraction are:\n\n Substance n Air 1.00 Water 1.33 Glass 1.50± Plastic 1.40± Diamond 2.42\n\nApparent depth\n\nOne consequence of refraction is the phenomenon of apparent depth; essentially, this means that a pool of water is deeper than it appears. From the simple diagram below, you can see why (remember the observer sees the image as the intersection of the two diverging beams).",
null,
"The apparent depth is always shallower than the real thing, so perhaps it should be renamed apparent shallowness! It is just as well nature works this way round – if water was shallower than it appears, children would crack their heads every time they dived into a swimming pool.\n\nTotal Internal Reflection\n\nA curious phenomenon can occur when light travels from a dense medium to a less dense one. Since a ray of light is bent away from the normal as it enters a less dense medium, it follows that at some critical angle of incidence, the refracted ray can be 90 degrees to the normal, i.e. travel along the boundary between the media. Further, rays at angles of incidence larger than the critical angle will not transmitted at all, but reflected back into the first medium. This phenomen is known as total internal reflection; the phenomenon is exploited heavily in telecommunications, where waves are transmitted undiminished over large distances in optical fibres.",
null,
"TIR: at large angles of incidence, the light is simply reflected back into the medium\n\nPROBLEMS\n\n1. If a ray of light enters water from air at an angle of incidence of 60o, calculate the angle of refraction from the table above.\n\n2. If a person looking down vertically into a pond sees a fish apparently 18 cm below the surface, calculate the actual depth of the fish in the pond.\n\nFiled under Introductory physics\n\n## Introductory physics: focusing mirrors\n\nFocusing mirrors are mirrors cut from a parabola of reflecting material; the parabola is fabricated in such a way that distant rays will be bent through a single point i.e. the focus of the mirror. In fact, there are two types of curved mirrors; converging mirrors made from parabolas that are concave in shape , and diverging mirrors that are made from parabolas that are convex. In either case, the focal length of the mirror is half the radius of the sphere from which it is cut.\n\nFrom the diagram below, you can see that in the case of a converging (concave) mirror, parallel rays are focused down to an image at the focal point (this is the point of such a mirror). In this type of mirror the rays reflected by the mirror actually pass through F and it is therefore a real focus.",
null,
"Converging (concave) mirror\n\nBy contrast, parallel rays appear to come from a focal point behind the mirror in the case of a diverging mirror. i.e. the focus is virtual.",
null,
"Diverging (convex) mirror\n\nThere is a simple set of rules to follow when finding the position of an image in curved mirrors:\n\n1. Rays parallel to principal axis are reflected through the principal focus\n\n2. Rays through the principal focus are reflected parallel to the principal axis\n\n3. Rays passing through the centre of curvature are reflected back along their own path\n\nThese rules are not mysterious but smply a result of how the mirrors are fabricated.",
null,
"In the diagram above, note that the object is close to the converging mirror, but outside of the focal length. Using the first 2 rules above, the intersection of the reflected rays gives the position of the image. You can see the image is inverted and diminished.",
null,
"Image tracing in a diverging mirror\n\nMore quantiatively, for any object a distance u from the mirror of focal length f, the location v of the image can be found from the ‘mirror’ equation\n\n1/u + 1/v = 1/f\n\nNote that there are only 2 variables in this equation since f is fixed for a given mirror. Typically, one uses the formula to find the location of the image of an object a given distance from the lens. One can also calculate the height of the image; this is because the magnification m of the mirror is given by the equation\n\nm = –v/u\n\nNote: in using both the above formulae, we use the convention that any distance that is real object is taken as a positive.\n\nCorrection\n\nActually, focusing mirrors are cut from parabolic surfaces, not spherical ones – I forgot this. See comment below by Norman.\n\nProblems\n\n1. An astronomer is observing a distant star with a reflecting telescope: use the mirror formula above to calculate where the photographic plate should be positioned. What kind of magnification can one expect?\n\n2. If an object 5 cm high is placed 40 cm in front of a converging mirror of focal length 20 cm, calculate the position and height of the image. Is the image real or virtual?\n\nFiled under Introductory physics\n\n## Introductory physics: reflection\n\nAs we saw in a previous post, visible light is simply one portion of the electromagnetic spectrum i.e. visible light consists of electromagnetic waves of a certain frequency travelling at a speed of 3 x 108 m/s (recall also that light can exhibit properties of both waves and particles, a property referred to as quantum wave–particle duality.)\n\nThe macroscopic properties of light had been studied for many years before its quantum properties were known. Such properties include transmission, reflection and refraction; the study of these phenomena is known as geometrical optics.\n\nFor example, it was realised centuries ago that light travels in straight lines (unlike sound): this can be demonstrated by placing a few pieces of cardboard with pinholes in their centres in a line. On placing a light source in front of A, the light will only be transmitted if the three pinholes are in a straight line.",
null,
"The light can be seen by the observer if and only if the holes are in a straight line\n\nUsing one pinhole, one can form an image of a distant object as shown below: this is the basis of the famous camera obscura.",
null,
"Rays of light can be convergent, divergent, or parallel. Rays emerging from a source diverge (think of a child’s drawing of the sun); on the other hand, rays arriving at an observer from a distance arrive parallel. Most useful of all, it was soon realised that a good image of an object could be got by causing incoming rays to converge using optical instruments – more on this later.\n\nReflection\n\nWhen light falls on a smooth highly polished surface it is reflected i.e. turned back on its path. A piece of polished metal, or indeed any shiny object makes a good reflector. [One reflecting material that is very much in the news at the moment is ice. The arctic is currently experiencing a global warming more pronounced than anywhere else in the world; this is thought to be caused by the fact that, as the polar ice cap gradually melts to water, it causes a reduction in the reflection of sunlight (water does not relect heat and light very well). This in turn causes further warming, an effect known as a positive feedback loop].\n\nIn reflection, a ray of light emerges at the same angle it went in (technically we say the angle of incidence equals the angle of reflection, where both angles are measured relative to the normal to the surface at the point of contact); this makes reflection images rather easy to draw (see below).",
null,
"Plane Mirror\n\nGlass mirrors have a thin layer of silvering deposited on the back of the glass which is protected. An IMAGE is produced in the mirror. The location of the image is got by simply the intersection of the reflected rays. A few trials soon show that the image in a plane mirror is always\n\n– the same size as the object and the same way up\n\n– as far behind the mirror as the object is in front\n\n– laterally inverted\n\n– virtual\n\nVirtual images are images which are formed in locations where light does not actually reach. Light does not actually pass through the location on the other side of the mirror; it only appears to an observer as though the light is coming from this location. (The opposite is a real image; a real image can be focused on a screen, whereas a virtual image can not). In the case of the plane mirror the image is virtual because the rays APPEAR to be diverging from a point behind the mirror.",
null,
"The reflected rays form a diverging beam which APPEAR to come from A’\n\n1 Comment\n\nFiled under Introductory physics\n\n## Introductory physics: resistivity\n\nWe have seen that if a voltage V is applied to a device, the current I that flows is limited by the resistance R of the device according to I = V/R. Hence a material with high resistance will pass little current (insulator), while a material with low resistance will pass a large current (conductor).\n\nIn order to make a meaningful comparison of the resistances of different materials, we need to allow for the fact that resistance depends on how much of the material is present. Hence, we define the resitivity ρ of a material as its resistance per unit length L and cross-sectional area A e.g.\n\nρ = RA/L\n\nNote that resistivity is a fundamental property of a material, like density. The room-temperature resistivites of some common conductors and insulators are listed below (just click on the table to see it properly)",
null,
"What is most noticeable is that the resisitivities shown vary over a huge range, from 10+17 Ωm for quartz to 10-8 Ωm for silver. Amongst solids, metals like silver have by far the lowest resistivities i.e. are the best electrical conductors – this is because the atoms of a metal have many electrons that are somewhat shielded from the nucleus and relatively free to move around. Hence, if a voltage is applied to a metal you have a steady supply of extremely light, charged particles to carry the current from one end to the other. Quartz, on the other hand, is an extremely good insulator because the electrons are tightly bound to individual atoms and there are almost no free charge carriers available for the conduction of electricity.\n\nIn between the conductors and insulators on the table lies a very interesting type of material called a semiconductor: these are materials that are normally insulators, but whose resistivity can be dramatically altered by the addition of impurities (doping). Semiconducting materials are extremely important in the manufacture of electronic devices and circuits and lie at the heart of the microelectronic revolution.\n\n***************************************************************************\n\nHow is resisitivity measured in the lab? First, you measure the resistance of a material by monitoring the current through it as a function of applied voltage (see previous post). Then you measure the length and cross-sectional area of the material and calculate its resistivity from the formula above.",
null,
"The slope of the graph V/I gives the resistance and a measurement of length and cross-sectional area is then used to calculate the resistivity\n\nNote\n\nThe inverse of resistivity is conductivity, measured in (Ωm)-1. Many tables list the conductivity of materials rather than the resistivity.\n\nFiled under Introductory physics\n\n## Introductory physics: circuits\n\nElectrical devices (TVs, stereos etc.) are connected to a voltage supply by an electrical circuit. The only difficult thing about circuits is that devices can be connected either in series or in parallel.\n\nIf connected in series, the same current runs through each device since there is no alternative path. However, the voltage across each device is different: from V = IR, the largest voltage drop will be across the largest resistance (just as the largest energy drop occurs across the largest waterfall in a river). As you might expect, the total resistance (or load) of the circuit is the sum of the individual resistances.",
null,
"On the other hand, electrical devices can also be connected in parallel. In this case, each device is connected directly to the terminals of the voltage source and hence experiences the same voltage. Here, there will be a different current through each device since I = V/R. A counter-intuitive aspect of parallel circuits is that the total resistance of the circuit is lowered as you add in more devices (the physical reason is that you are increasing the number of alternate paths the current can take).",
null,
"Parallel circuit: each device is connected directly to the battery terminals\n\nWhich is more useful? Household electrical devices are connected in parallel because it is easier (for the manufacturer) if every device sees the same voltage and it also turns out to be more efficient from the point of view of power consumption.\n\nA more complicated type of circuit is the combination circuit: here some resistors are connected in series, others in parallel. In order to calculate the current through a given device, the trick is to replace any resistors in parallel with the equivalent resistance in series and analyse the resulting series circuit.",
null,
"Combination circuit\n\nProblem\n\nAssuming a resistance of 100 Ohms for each of the resistors in the combination circuit above, calculate the current through each if a voltage of 12 V is applied.\n\nFiled under Introductory physics, Teaching\n\n## Introductory physics: the relation between voltage and current\n\nWe have established that voltage is simply energy per unit charge (see last post). What then is current and how does it relate to voltage?\n\nElectric current is a flow of charge, just as a river current is a flow of water. By definition, an electric current I is the amount of charge q flowing per second, hence I = q/t . Current is measured in Colombs per second (also called Amperes, see below). However, we noted last day that the charge on the electron is only a tiny fraction of a Coulomb – hence a current of 1 Coulomb per second corresponds to an awful lot of electrons running around. (How many?)",
null,
"The lamp lights because the current goes through it to complete the circuit\n\nSince charge will only flow if there is a voltage difference between the terminals of a circuit (last day), you might expect that there is a simple relation between voltage and current. In fact, the German scientist Georg Ohm was the first to discover that there is a linear relationship between the two in many materials. Ohm’s law states that the current I passing through a material connected to an energy source V is given by the equation I = V/R. Here, R is the constant of proportionality and is called electrical resistance and you can see why from the equation: a material with a very large value of R will pass almost no current (electrical insulator), while another material with very small R will yield a large current for the same voltage (good electrical conductor).",
null,
"Many materials have a linear relation between voltage and current – the slope of the graph is the material’s resistance\n\nNotes\n\n1. Ohm’s law is a bit of a misnomer – it is not a universal law of physics but simply a property of some materials (many materials have a nonlinear response to voltage, including your cat)\n\n2. Current can be considered a fundamental physical quantity in its own right and indeed the ampere is defined as a fundmental unit (see here). However, it’s much better to define it in terms of electric charge, since this is more fundamental.\n\n3. Some unfortunate people quote Ohm’s law as V = IR and play silly games with triangles. In my opinion, I = V/R conveys the physics of the situation much more clearly.\n\n4. It seems from Ohm’s law that a material with zero resistance could pass infinite current! No such materials are known, but some materials have extremely low resistance at very low temperatures – known as superconductors. A good application of superconductivity can be found at the Large Hadron Collider, where protons are guided around the ring by magnets made of superconducting material: this reduces power consumption enormously but the snag is that the experiments have to be done at at extremely low temperatures.\n\nFiled under Introductory physics\n\n## Introductory physics: voltage\n\nWhat exactly is voltage? If you ask an engineer, she will probably tell you that voltage drives electric current. And so it does – but what is it? What is its nature? ‘Some sort of energy‘, you might expect. And so it is, although the technical answer is that voltage is electric potential energy per unit charge.\n\nIn physics, energy is simply the capacity to do work. Potential energy is the expression we use to convey the fact that an object can have energy simply due to its position or configuration; a stretched rubber band will do work if released (snap back), as will a compressed spring (spring out), or a brick held aloft (fall on someone’s toe). Indeed, students usually encounter potential energy first in the latter context; any object lifted to a height in the earth’s gravitational field acquires potential energy equal to the amount of work done to get it to that point. Plus, if you remove the restraint holding it in place, the object will fall and do precisely this amount of work on the ground as it lands (all of its original potential energy is converted to kinetic energy). So you can think of potential energy as work waiting to happen.",
null,
"A lifted object has potential energy because work was done to get it there; this energy is converted back to work if it is released\n\nLast week, we saw that any electric charge sets up an electric field which will repel like charges and attract unlike ones. Hence it takes work to bring a test charge into the field of a like charge so if we do this we give it electric potential energy ( if you remove the restraint, the charge will rush away). The amount of work done and hence the potential energy acquired will depend on the size of the charge you bring up, so we define instead the electric potential energy per unit charge, also known as the potential. To be strictly correct, potential should be measured relative to something, so physicists talk of potential difference, defined as the difference in potential between the point in question and zero field. Since energy is measured in joules, potential is measured in joules per coulomb or volts and hence potential also became known as voltage. So voltage, potential and potential difference are all the same thing.\n\nIn a battery, a potential difference is maintained between the terminals. Charge cannot flow from one terminal to the other because they are not connected. However, if a conducting path between the terminals is provided (by connecting them by wire), a current will flow in the circuit.",
null,
"A battery and circuit (tnote that the direction of current is defined as the direction +ve charge would move for historical reasons)\n\nMore\n\nSince voltage is defined as energy per unit charge, it should be obvious that the product of voltage and charge is energy (or work) i.e. W = qV. Thus if a charge of 1 Coulomb is moved through a potential difference of 1volt, 1 joule of work is done.\n\nHowever, the charge on a single electron is not 1 Coulomb, but a minute 1.6E-16 Coulombs. Hence in the world of particle physics, one typically deals in tiny, tiny amounts of energy. For convenience, we define the unit electron-volt (eV) as the work that is done when a single electron moves through a potential difference of 1 volt.\n\nQuestion\n\nHow many eVs there are in 1 Joule of energy? The maximum energy achievable at the Large Hadron Collider (LHC) in Switzerland is 14 TeV – show that this corresponds to only 2.2 microjoules of energy. (Note that although this is a small amount of energy, the energy density is enormous because the cross-sectional area of the colliding particle beams is extremely small)."
] | [
null,
"https://coraifeartaigh.files.wordpress.com/2017/01/fig-2.jpeg",
null,
"https://coraifeartaigh.files.wordpress.com/2010/04/image04.gif",
null,
"https://coraifeartaigh.files.wordpress.com/2010/04/planck_photoelectric_1.gif",
null,
"https://i0.wp.com/www.physics.uiowa.edu/~umallik/adventure/geo-optics/lenses.gif",
null,
"https://coraifeartaigh.files.wordpress.com/2010/04/500px-myopia-svg.png",
null,
"https://coraifeartaigh.files.wordpress.com/2010/04/500px-hypermetropia-svg.png",
null,
"https://i0.wp.com/www.dxfm.com/images/basic_refraction.jpg",
null,
"https://i0.wp.com/gemologyproject.com/wiki/images/thumb/6/6a/Refraction.png/250px-Refraction.png",
null,
"https://i0.wp.com/www.physics.louisville.edu/public/courses/phys111/davis/notes/lo_apparentdepth.jpg",
null,
"https://coraifeartaigh.files.wordpress.com/2010/03/pic.png",
null,
"https://i0.wp.com/www.mrzimmerman.org/OnLineQuizPage/Online%20quiz/0_quiz_point_x.jpg",
null,
"https://i0.wp.com/image.tutorvista.com/content/light-reflection/principal-focus-convex.gif",
null,
"https://i0.wp.com/home.roadrunner.com/~enloephysics/mirror1.gif",
null,
"https://i0.wp.com/home.roadrunner.com/~enloephysics/mirror3.gif",
null,
"https://i0.wp.com/galileo.phys.virginia.edu/classes/620/images/lightline.gif",
null,
"https://i0.wp.com/www.physics.uiowa.edu/~umallik/adventure/feb_10/t1.gif",
null,
"https://i0.wp.com/www.tpub.com/neets/tm/30NVM028.GIF",
null,
"https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/5/5f/Plane_mirror.png",
null,
"https://coraifeartaigh.files.wordpress.com/2010/03/resistivity1.gif",
null,
"https://coraifeartaigh.files.wordpress.com/2010/03/graph-of-voltage-vs-current-for-ohmic-resistor-axes-to-be-swapped.jpg",
null,
"https://coraifeartaigh.files.wordpress.com/2010/03/series_circuit.jpg",
null,
"https://coraifeartaigh.files.wordpress.com/2010/03/image_sci_elec002.jpg",
null,
"https://coraifeartaigh.files.wordpress.com/2010/03/sparal2.gif",
null,
"https://i0.wp.com/www.sciencelobby.com/dc-theory/images/electric-current.gif",
null,
"https://i0.wp.com/images1.wikia.nocookie.net/schools/images/8/86/Voltage_vs._Current.jpg",
null,
"https://i0.wp.com/sciencevault.net/11hscphys/84movingabout/pics/elevatedram.jpg",
null,
"https://i0.wp.com/upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Voltage_source_with_metallic_conductor.svg/700px-Voltage_source_with_metallic_conductor.svg.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.95259005,"math_prob":0.94944215,"size":2177,"snap":"2023-14-2023-23","text_gpt3_token_len":418,"char_repetition_ratio":0.08973769,"word_repetition_ratio":0.0,"special_character_ratio":0.18741387,"punctuation_ratio":0.10075567,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97534937,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54],"im_url_duplicate_count":[null,5,null,10,null,10,null,2,null,5,null,5,null,10,null,4,null,10,null,10,null,4,null,4,null,4,null,10,null,2,null,5,null,5,null,2,null,6,null,6,null,null,null,null,null,null,null,4,null,5,null,10,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-05-29T22:14:47Z\",\"WARC-Record-ID\":\"<urn:uuid:fa49406f-097e-4626-964c-6dff597bfe56>\",\"Content-Length\":\"127683\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:047a8d4a-db8a-4ed5-baf3-b9c9af17dd68>\",\"WARC-Concurrent-To\":\"<urn:uuid:50c94ae5-e724-422c-8e4b-91b60ea211ce>\",\"WARC-IP-Address\":\"192.0.78.25\",\"WARC-Target-URI\":\"https://antimatter.ie/category/introductory-physics/\",\"WARC-Payload-Digest\":\"sha1:ZV6LRABD3DXHNYHQOY4WRZP7IPXBAKWT\",\"WARC-Block-Digest\":\"sha1:LPEX3O2B34R7NCEMTBIX7Q4QEZ5ZBYG3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224644913.39_warc_CC-MAIN-20230529205037-20230529235037-00468.warc.gz\"}"} |
https://kyushu-u.pure.elsevier.com/en/publications/asymptotic-structure-of-free-product-von-neumann-algebras | [
"# Asymptotic structure of free product von Neumann algebras\n\nCyril Houdayer, Yoshimichi Ueda\n\nResearch output: Contribution to journalArticle\n\n9 Citations (Scopus)\n\n### Abstract\n\nLet (M, φ) = (M 1, φ1) ∗ (M 2, φ2) be the free product of any σ-finite von Neumann algebras endowed with any faithful normal states. We show that whenever Q C M is a von Neumann subalgebra with separable predual such that both Q and Q ∩ M 1 are the ranges of faithful normal conditional expectations and such that both the intersection Q ∩ M 1 and the central sequence algebra Q′ ∩ Mω are diffuse (e.g. Q is amenable), then Q must sit inside M 1. This result generalizes the previous results of the first named author in [Ho14] and moreover completely settles the questions of maximal amenability and maximal property Gamma of the inclusion M 1 C M in arbitrary free product von Neumann algebras.\n\nOriginal language English 489-516 28 Mathematical Proceedings of the Cambridge Philosophical Society 161 3 https://doi.org/10.1017/S0305004116000396 Published - Nov 1 2016\n\n### Fingerprint\n\nFree Product\nVon Neumann Algebra\nFaithful\nFinite Von Neumann Algebras\nQ-algebra\nAmenability\nConditional Expectation\nSubalgebra\nInclusion\nIntersection\nGeneralise\nArbitrary\nRange of data\n\n### All Science Journal Classification (ASJC) codes\n\n• Mathematics(all)\n\n### Cite this\n\nAsymptotic structure of free product von Neumann algebras. / Houdayer, Cyril; Ueda, Yoshimichi.\n\nIn: Mathematical Proceedings of the Cambridge Philosophical Society, Vol. 161, No. 3, 01.11.2016, p. 489-516.\n\nResearch output: Contribution to journalArticle\n\nHoudayer, Cyril ; Ueda, Yoshimichi. / Asymptotic structure of free product von Neumann algebras. In: Mathematical Proceedings of the Cambridge Philosophical Society. 2016 ; Vol. 161, No. 3. pp. 489-516.\n@article{2b898ef0b4aa4155988845e681d90503,\ntitle = \"Asymptotic structure of free product von Neumann algebras\",\nabstract = \"Let (M, φ) = (M 1, φ1) ∗ (M 2, φ2) be the free product of any σ-finite von Neumann algebras endowed with any faithful normal states. We show that whenever Q C M is a von Neumann subalgebra with separable predual such that both Q and Q ∩ M 1 are the ranges of faithful normal conditional expectations and such that both the intersection Q ∩ M 1 and the central sequence algebra Q′ ∩ Mω are diffuse (e.g. Q is amenable), then Q must sit inside M 1. This result generalizes the previous results of the first named author in [Ho14] and moreover completely settles the questions of maximal amenability and maximal property Gamma of the inclusion M 1 C M in arbitrary free product von Neumann algebras.\",\nauthor = \"Cyril Houdayer and Yoshimichi Ueda\",\nyear = \"2016\",\nmonth = \"11\",\nday = \"1\",\ndoi = \"10.1017/S0305004116000396\",\nlanguage = \"English\",\nvolume = \"161\",\npages = \"489--516\",\njournal = \"Mathematical Proceedings of the Cambridge Philosophical Society\",\nissn = \"0305-0041\",\npublisher = \"Cambridge University Press\",\nnumber = \"3\",\n\n}\n\nTY - JOUR\n\nT1 - Asymptotic structure of free product von Neumann algebras\n\nAU - Houdayer, Cyril\n\nAU - Ueda, Yoshimichi\n\nPY - 2016/11/1\n\nY1 - 2016/11/1\n\nN2 - Let (M, φ) = (M 1, φ1) ∗ (M 2, φ2) be the free product of any σ-finite von Neumann algebras endowed with any faithful normal states. We show that whenever Q C M is a von Neumann subalgebra with separable predual such that both Q and Q ∩ M 1 are the ranges of faithful normal conditional expectations and such that both the intersection Q ∩ M 1 and the central sequence algebra Q′ ∩ Mω are diffuse (e.g. Q is amenable), then Q must sit inside M 1. This result generalizes the previous results of the first named author in [Ho14] and moreover completely settles the questions of maximal amenability and maximal property Gamma of the inclusion M 1 C M in arbitrary free product von Neumann algebras.\n\nAB - Let (M, φ) = (M 1, φ1) ∗ (M 2, φ2) be the free product of any σ-finite von Neumann algebras endowed with any faithful normal states. We show that whenever Q C M is a von Neumann subalgebra with separable predual such that both Q and Q ∩ M 1 are the ranges of faithful normal conditional expectations and such that both the intersection Q ∩ M 1 and the central sequence algebra Q′ ∩ Mω are diffuse (e.g. Q is amenable), then Q must sit inside M 1. This result generalizes the previous results of the first named author in [Ho14] and moreover completely settles the questions of maximal amenability and maximal property Gamma of the inclusion M 1 C M in arbitrary free product von Neumann algebras.\n\nUR - http://www.scopus.com/inward/record.url?scp=84969745116&partnerID=8YFLogxK\n\nUR - http://www.scopus.com/inward/citedby.url?scp=84969745116&partnerID=8YFLogxK\n\nU2 - 10.1017/S0305004116000396\n\nDO - 10.1017/S0305004116000396\n\nM3 - Article\n\nAN - SCOPUS:84969745116\n\nVL - 161\n\nSP - 489\n\nEP - 516\n\nJO - Mathematical Proceedings of the Cambridge Philosophical Society\n\nJF - Mathematical Proceedings of the Cambridge Philosophical Society\n\nSN - 0305-0041\n\nIS - 3\n\nER -"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7255289,"math_prob":0.69463384,"size":3283,"snap":"2019-51-2020-05","text_gpt3_token_len":924,"char_repetition_ratio":0.114974074,"word_repetition_ratio":0.7281022,"special_character_ratio":0.2747487,"punctuation_ratio":0.09640523,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9567142,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-26T00:25:23Z\",\"WARC-Record-ID\":\"<urn:uuid:c91ec5b5-e6c5-499c-9e4d-3d6339af484c>\",\"Content-Length\":\"38783\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f892fd34-d3c4-4b36-b885-b508bad2c0ba>\",\"WARC-Concurrent-To\":\"<urn:uuid:8b076d15-6aef-4230-beee-b95dcb4cf541>\",\"WARC-IP-Address\":\"52.220.215.79\",\"WARC-Target-URI\":\"https://kyushu-u.pure.elsevier.com/en/publications/asymptotic-structure-of-free-product-von-neumann-algebras\",\"WARC-Payload-Digest\":\"sha1:RANVNVXMTFU4DXU7OXQETJODWDYZGQ5B\",\"WARC-Block-Digest\":\"sha1:DMKYHMP2YQ7AT5EXE62DFSSENYDA2V5E\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251681625.83_warc_CC-MAIN-20200125222506-20200126012506-00073.warc.gz\"}"} |
https://timestable.net/3-times-table | [
"Home » Times Tables » Multiplication Tables 1 to 10 » 3 Times Table – 3x Table\n\n# 3 Times Table – 3x Table\n\nDo you want to learn the multiplication table of 3? In this 3 times table we show you how. If you have been looking for table of 3 or 3 multiplication table then you are right here, too. In the first column of the 3 times table you can find the factor 3 which is multiplied by the factor b in the second column. After the equation symbol you will find the result of the multiplication called product of 3 and b. In this three times table x denotes the multiplication. Read on to learn the 3x table.\n\n## The 3 Times Table\n\nHere is the 3 times table:\n\n3 x 0 = 0\n3 x 1 = 3\n3 x 2 = 6\n3 x 3 = 9\n3 x 4 = 12\n3 x 5 = 15\n3 x 6 = 18\n3 x 7 = 21\n3 x 8 = 24\n3 x 9 = 27\n3 x 10 = 30\n\n3 times table continued:\n\n3 x 11 = 33\n3 x 12 = 36\n3 x 13 = 39\n3 x 14 = 42\n3 x 15 = 45\n3 x 16 = 48\n3 x 17 = 51\n3 x 18 = 54\n3 x 19 = 57\n3 x 20 = 60\n3 x 21 = 63\n3 x 22 = 66\n3 x 23 = 69\n3 x 24 = 72\n3 x 25 = 75\n3 x 26 = 78\n3 x 27 = 81\n3 x 28 = 84\n3 x 29 = 87\n3 x 30 = 90\n3 x 31 = 93\n3 x 32 = 96\n3 x 33 = 99\n3 x 34 = 102\n3 x 35 = 105\n3 x 36 = 108\n3 x 37 = 111\n3 x 38 = 114\n3 x 39 = 117\n3 x 40 = 120\n3 x 41 = 123\n3 x 42 = 126\n3 x 43 = 129\n3 x 44 = 132\n3 x 45 = 135\n3 x 46 = 138\n3 x 47 = 141\n3 x 48 = 144\n3 x 49 = 147\n3 x 50 = 150\n3 x 51 = 153\n3 x 52 = 156\n3 x 53 = 159\n3 x 54 = 162\n3 x 55 = 165\n3 x 56 = 168\n3 x 57 = 171\n3 x 58 = 174\n3 x 59 = 177\n3 x 60 = 180\n3 x 61 = 183\n3 x 62 = 186\n3 x 63 = 189\n3 x 64 = 192\n3 x 65 = 195\n3 x 66 = 198\n3 x 67 = 201\n3 x 68 = 204\n3 x 69 = 207\n3 x 70 = 210\n3 x 71 = 213\n3 x 72 = 216\n3 x 73 = 219\n3 x 74 = 222\n3 x 75 = 225\n3 x 76 = 228\n3 x 77 = 231\n3 x 78 = 234\n3 x 79 = 237\n3 x 80 = 240\n3 x 81 = 243\n3 x 82 = 246\n3 x 83 = 249\n3 x 84 = 252\n3 x 85 = 255\n3 x 86 = 258\n3 x 87 = 261\n3 x 88 = 264\n3 x 89 = 267\n3 x 90 = 270\n3 x 91 = 273\n3 x 92 = 276\n3 x 93 = 279\n3 x 94 = 282\n3 x 95 = 285\n3 x 96 = 288\n3 x 97 = 291\n3 x 98 = 294\n3 x 99 = 297\n3 x 100 = 300\n\nThis 3 times table is printable by clicking the button below. The three times table is also available as pdf. This ends our article about the 3 x table. If you have any questions about this three times table leave us a comment. Please share our 3 times tables with your friends and bookmark us.\n\nThanks for visiting 3 times tables on timestable.net."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6929797,"math_prob":0.99935013,"size":2183,"snap":"2021-31-2021-39","text_gpt3_token_len":1018,"char_repetition_ratio":0.21385957,"word_repetition_ratio":0.0,"special_character_ratio":0.62803483,"punctuation_ratio":0.028475711,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99999917,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-17T16:58:31Z\",\"WARC-Record-ID\":\"<urn:uuid:a6fd7ef6-3afa-42dc-97d3-463513e5dea9>\",\"Content-Length\":\"56378\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4ee4ef64-5d3a-40a7-8372-5ac6b167a9ea>\",\"WARC-Concurrent-To\":\"<urn:uuid:76f0e16e-072a-482d-ae18-9ac84eedb624>\",\"WARC-IP-Address\":\"104.21.11.171\",\"WARC-Target-URI\":\"https://timestable.net/3-times-table\",\"WARC-Payload-Digest\":\"sha1:7GHQS74VNB3IXUCKPITWALEM4DRI4BDI\",\"WARC-Block-Digest\":\"sha1:DQQTNCJD37JGM2NBE33DA2XMKNFMN3X5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780055684.76_warc_CC-MAIN-20210917151054-20210917181054-00341.warc.gz\"}"} |
https://pcdandf.com/pcdesign/index.php/editorial/menu-features/12393-signals-1802 | [
"",
null,
"",
null,
"Some engineers claim electrical current is not the flow of electrons. They are wrong.\n\nCurrent is defined as the flow of electrons.1 The classic definition of one amp of current is one coulomb of charge flowing across a cross-sectional area in one second of time. And one coulomb of charge is defined as the charge on 6.25 x 1018 electrons. It’s a little hard to pin down the actual date of the definition of current, but it is probably around the early 1800s. That was about 200 years ago.\n\nCertain engineers in our industry argue this definition is obsolete and that (electrical) current is not the flow of electrons. They argue it is actually a wave phenomenon. They point primarily to the speed of electron flow compared to the speed of the signal to prove their point. The speed of electron flow (defined as the drift velocity) is quite slow. Most of us can walk faster than that. The speed of signal flow down a conductor is at the speed of light (they say). Therefore, current can’t be the flow of electrons.\n\nHere are some of the problems with that argument:\n\n1. The word “flow” in the definition is probably a poor choice. A better word might be “movement.” As I will show, current is the movement of electrons.\n2. The word “wave” in the argument is misapplied. As I will show, the correct phenomenon is a transfer of energy.\n3. Signals down a conductor don’t travel at the speed of light. Neither the electrons, the conductive material (copper) nor the “wave” (transfer of energy) dictates the speed of the signal. Something else entirely dictates the speed of the signal, which is usually slower than the speed of light.\n\nSpoiler alert: If there is a changing (AC) signal current propagating in a conductor, there is a movement of electrons within the conductor and an electromagnetic field around the conductor, each intimately associated with the other. There is a strong, symbiotic relationship that exists between them, and it is this relationship that is important.\n\nImportant Laws\n\nBefore we start the discussion, I’d like to highlight a couple of important laws. These will help in our understanding.\n\n1. Coulomb’s Law (1785): There are two kinds of charge, positive and negative. Like charges repel, unlike attract, with force proportional to the product of their charge and inversely proportional to the square of their distance. (When two charges are very close, this coulomb force can be very strong.)\n2. Ampere’s Law (1825): An electric current is accompanied by a magnetic field whose direction is at right angles to the current flow. (Therefore, a changing current is accompanied by a changing magnetic field.)\n3. Faraday’s Law of Magnetic Induction (1831): A changing magnetic field is accompanied by a changing electric field at right angles to the change of the magnetic field.\n4. Current must flow in a closed loop. (Corollary: therefore, every signal has a return.)\n\nInside the Conductor\n\nCopper, silver and gold have the lowest resistivities of all the elements in the Periodic Table. They are known as good conductors, and they each have two very important properties in common: They are solids at room temperature and have single electrons in their outer, or valence, shells (or “bands”). Elements with single electrons in their outer shell are typically good conductors of electricity. These single electrons are not tightly held to their parent atoms. In fact, it is not always clear which atom “owns” which of these “outer” electrons. They are often (inappropriately) referred to as “free” electrons. As an electrical force (Coulomb’s Law) is applied to a conductor,2 electrons tend to “jump” from one atom to the next (FIGURE 1), displacing that atom’s electron. This constitutes the “flow” or movement of electrons.",
null,
"Figure 1. Single electrons in the outer, or valence, shell are free to move among similar atoms.\n\nThere are orders of magnitude more electrons “available” in a cross-sectional area of a copper conductor than are necessary for carrying the current. We can think of each “available” electron participating in the current flow for only a very small fraction of the time the current is flowing. Indeed, the fraction of available electrons actually involved in the current at any point in time is directly related to the heating of the conductor. That is why smaller conductors get hotter for the same current flow than do larger conductors.\n\nIf we look at any single electron in Figure 1, it moves under the applied force (Coulomb’s Law) from one location to another, transfers its energy to another electron, and then stays there (or perhaps gets deflected in a different direction) until another electron transfers its energy to it. All these individual reflections are pretty chaotic and happen in all directions. But there is a strong, overall trend in the “forward” direction as a result of the electric field caused by the external coulomb force.\n\nSo the rate at which any individual electron moves along the conductor is pretty slow. But what is happening is suggested better in FIGURE 2.",
null,
"Figure 2. Electron flow causes a shift in electrons along a conductor.\n\nWe are all familiar with this desktop toy shown in Figure 2. The falling ball at the front hits the first ball and transfers its energy to it, which then transfers energy to the second ball, and so on. The last ball in the string pops out (in the absence of friction) as far as the first ball fell. We could think of this string of balls as being very long. Even so, in the absence of friction, the last ball would pop out almost instantaneously, (almost) at the speed of light, even though the first ball is not moving very fast at all. This is a rough analogy of what happens with electrons. And the distinction is very important.\n\nCurrent “flow” is really kind of a misnomer. It does not mean an electron is flowing through the conductor from beginning to end. It does not mean “one electron in, same electron out.” Instead, it means for every electron that enters the conductor, another electron must leave the conductor. What we have is “one electron in, another electron out.” This can happen almost instantaneously, as Figure 2 suggests. (Note: If “one electron in, one electron out” were not the case, electrons would collect in the conductor or drain out of the conductor, neither of which can happen.)\n\nWhat is really happening in the conductor is a transfer of energy from one electron to another. How that happens can be interpreted different ways. It might occur because of the forces behind Coulomb’s Law. It might happen because of photons being emitted. For our purposes, it doesn’t matter how it happens. What happens is that when an electron is somehow transferred into a conductor at one end, another electron must exit the conductor at the other end, and does so at (almost) the speed of light.\n\nThis is different from a “wave.” A wave implies a flow of energy that does not involve a particle. A wave implies the energy would pass by the atoms and their electrons as it propagates along the conductor. But the transfer of energy here intimately involves particles (electrons), as the energy is discretely transferred from one particle to another.\n\nNow current can only flow in a closed loop. Consider a driver connected by a trace to a receiver, as suggested in FIGURE 3(a). No current can flow in the trace or conductor. Only when there is a return loop, as shown in Figure 3(b), can current flow.",
null,
"Figure 3. Current can only flow in a closed loop (b). No current flows in (a).\n\nA wave doesn’t necessarily require a physical conductor return loop. For example, a single wire transmitting antenna doesn’t have a physical conductor return loop (although there is a capacitive return loop, sometimes through the air). But an electrical current does require a physical return loop.\n\nConsider a hairline crack in a copper trace on a circuit board. Make the hairline crack as narrow as you want. The current will not flow across the crack, even at very high frequencies. If current were a wave, we can imagine that the wave should be able to “jump” over the crack (waves can presumably travel through the air), but we know (some of us from actual experience) that the current will not jump a physical crack. One might argue some sort of capacitive action might take place, but this argument will go nowhere. We have enough experience with capacitive self-resonant frequencies, and the very small capacitances involved, that this situation would look more like a simple circuit with a very small series capacitor than a pure conductor with a perturbation too small to be seen by a wave.\n\nOutside the Conductor\n\nWhen a current starts to flow along a conductor, by Ampere’s Law a magnetic field is generated around the conductor. This is the principle behind an electromagnet. Many of us saw an experiment in elementary or high school where a wire connecting the ends of a battery was routed near a compass. The compass needle moved! Intuitively, then, a changing current in a conductor creates a changing magnetic field around the conductor. It takes energy to create this magnetic field. Energy is power times time, and in the absence of any losses, 100% of this energy is stored in the magnetic field. If the current flow stops, the field collapses, and the energy is returned to the conductor.\n\nNow by Faraday’s Law of Magnetic Induction, a changing magnetic field creates a changing electrical field. This is the principle behind a transformer and a motor or generator.\n\nCollectively, these two fields are called the electromagnetic field. Electromagnetic fields exist around any conductor carrying an AC current (or even just a changing current). As board designers, we are aware we need to worry about the possible negative effects of these fields (EMI, crosstalk, etc.), and we make design decisions accordingly.\n\nPerhaps when people refer to current being a “wave” phenomenon, they are referring to the electromagnetic wave. But if you were following the argument above, you noted the current comes first! The current generates the electromagnetic field. If the current stops, the field generation stops, and the field collapses.3\nWe don’t get an electromagnetic field unless we have a current. The two things – the electromagnetic field and current – are intimately connected. You can’t have one without the other. So, the electromagnetic wave is not the (signal) current; the wave is generated by the (signal) current.\n\nNot only that, but the components cannot be separated. You can’t have a changing current without a changing magnetic field. You can’t have a changing magnetic field without a changing electric field. You can’t have changing fields without a changing current (at least in any practical sense).\n\nAnd further still, no one of the components can get “out in front” of the others. They all propagate down the conductor at the same speed. The electromagnet wave doesn’t travel faster than the current, and the current doesn’t travel faster than the wave. Neither component of the electromagnetic wave can get out in front of the other. They all travel at the same speed.\n\nAnd how is that speed determined for a signal in a conductor? It is not determined by the electrons. It is not determined by the copper. The speed of the signal is determined by the speed of the electromagnetic field (around the conductor) in the material itflows through (the dielectric.) If the conductor is a bare wire in air, the propagation speed will approach the speed of light, about 1.0 ft./ns. But if the conductor is surrounded by a dielectric, so that the electromagnetic field travels though the dielectric (as in the case of a stripline stackup, for example), then the propagation speed is reduced by the square root of the relative dielectric coefficient of the board material.\n\nThe Combined System\n\nSo when we send a signal current down a trace:\n\n1. There must be a continuous conductive loop for the signal current to travel in.\n2. Any charged particle (e.g., electron) “injected” in the beginning of the circuit will be accompanied by an identical charged particle leaving the circuit at the other end of the circuit.\n3. The signal current will consist of a transfer of energy among charged particles (electrons) in the conductor.\n4. An electromagnetic waveform will be generated around the conductor and will travel along the conductor.\n5. The propagation speed of the signal will be determined by the environment the electromagnetic field flows through.\n\nSo, while there is a(n electromagnetic) field around the conductor, the definition of current is the movement of electrons through the conductor, driven typically by coulomb forces. And, in good healthy synergy, we note the current flows though the conductor, while the energy flows in the electromagnetic field around the conductor. This is the symbiotic relationship that exists between the current and the electromagnetic field.\n\nNotes\n1. See sidebar for several different sources of this definition, including a quote by Nobel Prize-winning physicist Richard Feynman.\n2. Attaching a battery is one way of applying a coulomb force across a conductor.\n3. It is important to recognize that current and the generation of the electromagnetic field are “point” phenomena. That is, the current exists at a point along the conductor and may have different levels at different points. So the current at a point generates a field at a point, and then the two components travel along the path together.\n\nBibliography\n\n1. Douglas Brooks, PCB Currents: How They Flow, How They React, Prentice Hall, 2017.\n2. Douglas Brooks, Maxwell’s Equations without the Calculus, 2016, amazon.com.\n\nDouglas Brooks, Ph.D., is president of UltraCAD Design, a PCB design service bureau and author of three books, including PCB Trace and Via Currents and Temperatures: The Complete Analysis, 2nd edition (with Johannes Adam) and PCB Currents: How They Flow, How They React; This email address is being protected from spambots. You need JavaScript enabled to view it..\n\nA Sampling of Definitions\n\nA search for “definition of electric current” produces an endless number of hits. Here is a sample:\n\n• The time rate of flow of electric charge (dictionary.com/browse/electric-current)\n• An electric current is a flow of electric charge. In electric circuits this charge is often carried by moving electrons in a wire. It can also be carried by ions in an electrolyte. (en.wikipedia.org/wiki/Electric_current)\n• Electric current is defined as the rate at which charge flows through a surface (the cross section of a wire, for example). (physics.info/electric-current)\n• An ampere is a unit of measure of the rate of electron flow or current in an electrical conductor. One ampere of current represents one coulomb of electrical charge (6.24 x 10^18 charge carriers) moving past a specific point in one second.(whatis.techtarget.com/definition/ampere)\n• And from no less than Nobel Prize-winning physicist Richard Feynman:\n\nIn an atom with three protons in the nucleus exchanging photons with three electrons – a condition called a lithium atom – the third electron is further away from the nucleus than the other two (which have used up the available space), and exchanges fewer photons. This causes the electron to easily break away from its own nucleus under the influence of photons from other atoms. A large number of such atoms close together easily lose their individual third electrons to form a sea of electrons swimming around from atom to atom. This sea of electrons reacts to any small electrical force (photons), generating a current of electrons – I am describing lithium metal conducting electricity. Hydrogen and helium atoms do not lose their electrons to other atoms. They are “insulators.” (Richard P. Feynman, QED, The Strange Theory of Light and Matter, Princeton Scientific Library, 1985.)"
] | [
null,
"https://pcdandf.com/pcdesign/modules/mod_twitter_widget_slider/assets/twitter-icon.png",
null,
"https://pcdandf.com/pcdesign/modules/mod_facebookslider/assets/facebook-icon.png",
null,
"https://pcdandf.com/pcdesign/images/stories/ArticleImages/1802/ultracad1.jpg",
null,
"https://pcdandf.com/pcdesign/images/stories/ArticleImages/1802/ultracad2.jpg",
null,
"https://pcdandf.com/pcdesign/images/stories/ArticleImages/1802/ultracad3.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.94374156,"math_prob":0.95671505,"size":12636,"snap":"2022-27-2022-33","text_gpt3_token_len":2591,"char_repetition_ratio":0.17526916,"word_repetition_ratio":0.011331445,"special_character_ratio":0.200459,"punctuation_ratio":0.10008375,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95313126,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-14T16:28:10Z\",\"WARC-Record-ID\":\"<urn:uuid:40e6fc34-5e51-4478-90b5-280deb2ebd30>\",\"Content-Length\":\"75356\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:635dd638-cb77-4196-8ac7-80c61b473c44>\",\"WARC-Concurrent-To\":\"<urn:uuid:1c2a3358-5570-4ad0-b15e-e5cf9dd639f8>\",\"WARC-IP-Address\":\"64.64.222.241\",\"WARC-Target-URI\":\"https://pcdandf.com/pcdesign/index.php/editorial/menu-features/12393-signals-1802\",\"WARC-Payload-Digest\":\"sha1:JOVTNN2PWYYRNSKK2KQ2DDVHCRRMRHS3\",\"WARC-Block-Digest\":\"sha1:YPAMUWCTGRU6RQCOG64UD3ZQD7RYUKVM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882572043.2_warc_CC-MAIN-20220814143522-20220814173522-00669.warc.gz\"}"} |
https://www.physicsforums.com/threads/can-you-help-me-with-levi-civita-notation-please.871728/ | [
"# Can you help me with Levi Civita Notation, please?\n\nOP warned about not using the homework template\nI need to prove B.(Gradient . B) - B X(Gradient X B)=Del{i} [B{i}B{j} -1/2 (kroneker delta {ij} B^2]\n\nwhere I have used . as the dot product, {} as subscript. Thank you!\n\n## Answers and Replies\n\nblue_leaf77\nScience Advisor\nHomework Helper\nIf I write the left hand side using proper math symbols, is\n$$\\mathbf{B} (\\nabla \\cdot \\mathbf{B}) - \\mathbf{B} \\times (\\nabla \\times \\mathbf{B})$$\ncorrect?\n\nHi Blue_leaf77,\n\nYes that is correct! Thank you, Im sorry I typed it so poorly I am new to Physics forums.\n\nblue_leaf77\nScience Advisor\nHomework Helper\nThen the equality in the original equation does not make sense because the left side is a vector whereas the right side is a scalar.\n\nThe right is still a vector, I have Bolded the vector quantities B.\n\nThis is essentially a proof from Jackson. But I need to show it with levi Cevita notation.\n\nblue_leaf77\nScience Advisor\nHomework Helper\nThe right is still a vector, I have Bolded the vector quantities B.\nNo, it's not. For instance you have ##|\\mathbf{B}|^2## which is a scalar.\n\nI have uploaded the page from Jackson it is equation (6.119) I am trying to prove, however I must use Levi Cevita notation.\n\n#### Attachments\n\n•",
null,
"IMG_4558.JPG\n87.7 KB · Views: 365\nblue_leaf77\nScience Advisor\nHomework Helper\nI see, the left side should be ##[\\mathbf{B} (\\nabla \\cdot \\mathbf{B}) - \\mathbf{B} \\times (\\nabla \\times \\mathbf{B})]_i## which is the i-th component of the vector inside the square bracket and this is a scalar. Start by writing ##\\nabla\\cdot \\mathbf{B}## using Einstein summation notation. Anyway if you have progressed up to any point, just post it here, preferably using LaTex.\n\nnrqed\nScience Advisor\nHomework Helper\nGold Member\nI need to prove B.(Gradient . B) - B X(Gradient X B)=Del{i} [B{i}B{j} -1/2 (kroneker delta {ij} B^2]\n\nwhere I have used . as the dot product, {} as subscript. Thank you!\nYou will need to use that the i-th component of a cross product may be written as\n## (\\vec{A} \\times \\vec{B})_i = \\epsilon_{ijk} A_j B_k ##\n\nand you will need to find the expression for a triple product....hint: what is the following expression equal to?\n## \\sum_i \\epsilon_{ijk} \\epsilon_{iab} = ? ##"
] | [
null,
"https://www.physicsforums.com/data/attachments/83/83776-40285a0075020d93d621713049cf634e.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8839385,"math_prob":0.8077834,"size":291,"snap":"2021-04-2021-17","text_gpt3_token_len":92,"char_repetition_ratio":0.101045296,"word_repetition_ratio":0.3773585,"special_character_ratio":0.33333334,"punctuation_ratio":0.14705883,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99813503,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-14T22:59:17Z\",\"WARC-Record-ID\":\"<urn:uuid:6510cdec-eee1-4164-b051-db4381024d26>\",\"Content-Length\":\"99987\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:34efd74e-db89-4f9d-ac86-4a5989c59c64>\",\"WARC-Concurrent-To\":\"<urn:uuid:9835d900-1b80-4bcf-8260-2c76c0dc397d>\",\"WARC-IP-Address\":\"104.26.14.132\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/can-you-help-me-with-levi-civita-notation-please.871728/\",\"WARC-Payload-Digest\":\"sha1:4QY276CT33UFLYGNO75Y5A6H7T3CWX7B\",\"WARC-Block-Digest\":\"sha1:T65ZMP5XSDQJSPWDOIYCET36MKVJMTYU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038078900.34_warc_CC-MAIN-20210414215842-20210415005842-00098.warc.gz\"}"} |
http://ruslanledesma.com/2016/05/26/how-to-count-cycles-in-kn.html | [
"The count of cycles (simple and not simple) of length n or less for Kn is given by the following function C(n). The count consists of the count of cycles for each length 2 <= l <= n given by C(n, l). The count for a given length l consists of the count of cycles (simple and not simple) from each vertex 1 <= i <= n given by C(i, n, l).\n\nThe following OCaml program counts the number of cycles for complete graphs K2 to K20.\n\nTo run the program in Linux or OSX, install the OCaml interpreter, save the program in a file, and grant execution permission to the file. In OSX with Homebrew, when you save the program in file count-cycles.ml you install and run the program as follows.\n\n# Want to read more?\n\nI love to explain and answer questions on programming problems. I publish a new programming problem and its solution every month. Did I mention that I love to answer questions?\n\nIf you would like to get the latest problem + solution, subscribe to the newsletter or subscribe via RSS. You can also follow me on Twitter, GitHub, and LinkedIn."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9098322,"math_prob":0.8431023,"size":874,"snap":"2021-04-2021-17","text_gpt3_token_len":200,"char_repetition_ratio":0.14827587,"word_repetition_ratio":0.061728396,"special_character_ratio":0.23684211,"punctuation_ratio":0.097297296,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9621052,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-13T02:27:59Z\",\"WARC-Record-ID\":\"<urn:uuid:ec23affb-7d9a-4e05-a8dc-ad5f671586f6>\",\"Content-Length\":\"21708\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d9868643-3b9e-4e8d-8f17-1188dfd5e355>\",\"WARC-Concurrent-To\":\"<urn:uuid:7f2740d6-92b5-4d3c-9364-2913a7ffb356>\",\"WARC-IP-Address\":\"192.30.252.153\",\"WARC-Target-URI\":\"http://ruslanledesma.com/2016/05/26/how-to-count-cycles-in-kn.html\",\"WARC-Payload-Digest\":\"sha1:ZN2ZOAXHHWFSAON7HVGYS5U2YQTFP5GA\",\"WARC-Block-Digest\":\"sha1:A5E4EWPNBQKHAFKBQ3JJC2LZFAZTNOAE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038071212.27_warc_CC-MAIN-20210413000853-20210413030853-00031.warc.gz\"}"} |
https://robotics.stackexchange.com/questions/445/how-to-obtain-dense-point-clouds-from-stereo-cameras | [
"How to obtain dense point clouds from stereo cameras?\n\nI am trying to use a stereo camera for scene reconstruction, but I can usually only obtain sparse point clouds (i.e. over half the image does not have any proper depth information).\n\nI realize that stereo processing algorithms rely on the presence of texture in the images and have a few parameters that can be tweaked to obtain better results, such as the disparity range or correlation window size. As much as I tune these parameters, though, I am never able to get results that are even remotely close to what can be obtained using an active sensor such as the Kinect.\n\nThe reason why I want that is because very often point clouds corresponding to adjacent regions don't have enough overlap for me to obtain a match, so reconstruction is severely impaired.\n\nMy question to the Computer Vision experts out there is the following: what can I do to obtain denser point clouds in general (without arbitrarily modifying my office environment)?\n\n• This is a good question, but I think more details are necessary. What algorithms have you tried to compute matchings? Could you clarify what you mean by \"adjacent regions\" and \"overlap?\". – Josh Vander Hook Nov 17 '12 at 14:50\n• When I say \"adjacent regions\", I mean portions of physical space that are not equivalent but have a non-empty intersection, which I called \"overlap\". That is, the kind of regions that would generate point clouds that could be matched and stitched in an ICP algorithm. – georgebrindeiro Nov 18 '12 at 15:36\n• About the algorithm, I am still using the simplest possible solution I could find: the stereo_image_proc ROS node, which applies the global block matching algorithm available in OpenCV. I would be very interested in hearing about parameter settings that might not be directly accessible to me through the ROS node or other algorithms that are known to provide better results. – georgebrindeiro Nov 18 '12 at 15:43\n\nYou can try to skip the salient point detection, and just densely sample over the image (as grid or so) and compute a feature descriptor at every sample point. You can probably even go as far as computing a descriptor for every pixel.\n\nYou might lose scale-invariance, but I think this won't hurt too much for stereo vision as objects will be at approximately the same scale in both images.\n\nAnother approach might be to combine multiple salient point detection algorithms: corners, edges, blobs and so on. Then you have to use the same feature descriptor algorithm for all detected points, however this latter part could be somewhat tricky to implement.\n\nSo the stereo image processing algorithms I have used in the past were implemented pixel by pixel. We just used the pinhole camera model and did some old fashioned measurements with measuring tape until our depth estimations matched the real thing.\n\nThe equations for a pair of parallel cameras are:\n\n• $d =$half the distance between the cameras\n• $f =$the focal length of the cameras (assumed to be the same)\n• Coordinate Frames:\n• $x, y, z =$ coordinate frame between the cameras (i.e. the camera base frame)\n• $u_R, v_R$ camera coordinates in the right camera from the perspective of the robot (u is horizontal, v is vertical)\n• $u_L, v_L$ camera coordinates in the left camera\n• Note: the camera coordinates have their origins at the coordinate frame between the cameras (i.e. the u axes face opposite directions)\n\n$u_L = \\frac{f(x-d)}{z}$, $u_R = \\frac{f(x+d)}{z}$\n\n$zu_R = f(x+d)$, $zu_L = f(x-d)$\n\n$z(u_R - u_L) = 2df$\n\n$z = \\frac{2df}{u_R - u_L}$\n\n$y = \\frac{v_L*z + df}{f}$\n\n$x = \\frac{u_L*z + df}{f}$\n\nUsing these equations you can compute a dense stereo cloud. One for each pixel on your cameras.\n\n• Thanks for the effort, but I am familiar with stereo modeling. The problem is usually exactly that of correspondence between the (u,v) coordinates in the left and right cameras. muksie gave some ideas on how to deal with that and sylvain.joyeux pointed out a great stereo library that leads to improved results, though... – georgebrindeiro Nov 24 '12 at 4:16\n\nWhen you say, \"over half the image does not have any proper depth information\", which half ?\n\nOne issue we ran into is that if distance-to-object is of the same order of magnitude than your baseline (usually associated with very wide angle cameras), then the \"standard\" dense stereo algorithms don't work so well. We've been using the libelas library, and its developers told us that this is called \"large baseline stereo\" and is yet another problem.\n\n• When I said half the image did not have any proper depth information, I meant that out of all pixels, only about half had computed disparities (not necessarily forming one contiguous region). I am not having the same issue you mentioned with the distance-to-object/baseline ratio, but it was very interesting to hear about that library and that this can be a problem. Thanks! – georgebrindeiro Nov 18 '12 at 16:01\n• Either way, I will try libelas out since I found a ROS wrapper for it! – georgebrindeiro Nov 18 '12 at 16:04\n\nHave a look at the KITTI Stereo Benchmark leaders. This benchmark penalizes algorithms for not producing a disparity at any given point, so the top performers produce dense outputs (even if they don't have much grounds for their estimate at many points). Some methods have publicly available code that is linked, which you can try out.\n\nNote that they are not penalized for taking a long time, so many methods will take on the order of minutes per image to run and may not be suitable for your application. There have been many CNN-based methods introduced though that do very well, while still running in less than a second (on a GPU). At least one of these (CRL) has public code.\n\nIf you still don't get decent depth estimates with these on your images, then you may just be seeing the limits of what's feasible from a visible approach. There fundamentally needs to be distinctive texture in the area to be able to match points well, or you need a basis for making some strong assumptions (e.g., smoothness) in textureless regions."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9594864,"math_prob":0.94850206,"size":939,"snap":"2019-43-2019-47","text_gpt3_token_len":179,"char_repetition_ratio":0.10481283,"word_repetition_ratio":0.0,"special_character_ratio":0.19062833,"punctuation_ratio":0.07386363,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9623786,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-16T00:43:28Z\",\"WARC-Record-ID\":\"<urn:uuid:18143ea9-d9a2-42d3-8b11-827a9176d7e0>\",\"Content-Length\":\"159755\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bd354e67-0593-4013-b4e4-4c83a0a1073a>\",\"WARC-Concurrent-To\":\"<urn:uuid:4f041e9c-c304-4fe1-a0d7-a46cc3f1a18c>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://robotics.stackexchange.com/questions/445/how-to-obtain-dense-point-clouds-from-stereo-cameras\",\"WARC-Payload-Digest\":\"sha1:IKYVESEFB2SMWGCHMLDLDE53G3SULGTZ\",\"WARC-Block-Digest\":\"sha1:VL2RHUBNMJ3VJDUYCE7WX7YIINSQS4L5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986660829.5_warc_CC-MAIN-20191015231925-20191016015425-00007.warc.gz\"}"} |
https://www.colorhexa.com/0028da | [
"# #0028da Color Information\n\nIn a RGB color space, hex #0028da is composed of 0% red, 15.7% green and 85.5% blue. Whereas in a CMYK color space, it is composed of 100% cyan, 81.7% magenta, 0% yellow and 14.5% black. It has a hue angle of 229 degrees, a saturation of 100% and a lightness of 42.7%. #0028da color hex could be obtained by blending #0050ff with #0000b5. Closest websafe color is: #0033cc.\n\n• R 0\n• G 16\n• B 85\nRGB color chart\n• C 100\n• M 82\n• Y 0\n• K 15\nCMYK color chart\n\n#0028da color description : Pure (or mostly pure) blue.\n\n# #0028da Color Conversion\n\nThe hexadecimal color #0028da has RGB values of R:0, G:40, B:218 and CMYK values of C:1, M:0.82, Y:0, K:0.15. Its decimal value is 10458.\n\nHex triplet RGB Decimal 0028da `#0028da` 0, 40, 218 `rgb(0,40,218)` 0, 15.7, 85.5 `rgb(0%,15.7%,85.5%)` 100, 82, 0, 15 229°, 100, 42.7 `hsl(229,100%,42.7%)` 229°, 100, 85.5 0033cc `#0033cc`\nCIE-LAB 30.827, 58.461, -89.281 13.411, 6.578, 66.889 0.154, 0.076, 6.578 30.827, 106.718, 303.217 30.827, -10.547, -111.823 25.648, 48.45, -136.669 00000000, 00101000, 11011010\n\n# Color Schemes with #0028da\n\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #dab200\n``#dab200` `rgb(218,178,0)``\nComplementary Color\n• #0095da\n``#0095da` `rgb(0,149,218)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #4500da\n``#4500da` `rgb(69,0,218)``\nAnalogous Color\n• #95da00\n``#95da00` `rgb(149,218,0)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #da4500\n``#da4500` `rgb(218,69,0)``\nSplit Complementary Color\n• #28da00\n``#28da00` `rgb(40,218,0)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #da0028\n``#da0028` `rgb(218,0,40)``\nTriadic Color\n• #00dab2\n``#00dab2` `rgb(0,218,178)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #da0028\n``#da0028` `rgb(218,0,40)``\n• #dab200\n``#dab200` `rgb(218,178,0)``\nTetradic Color\n• #001a8e\n``#001a8e` `rgb(0,26,142)``\n• #001fa7\n``#001fa7` `rgb(0,31,167)``\n• #0023c1\n``#0023c1` `rgb(0,35,193)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #002df4\n``#002df4` `rgb(0,45,244)``\n• #0e3aff\n``#0e3aff` `rgb(14,58,255)``\n• #284fff\n``#284fff` `rgb(40,79,255)``\nMonochromatic Color\n\n# Alternatives to #0028da\n\nBelow, you can see some colors close to #0028da. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #005fda\n``#005fda` `rgb(0,95,218)``\n• #004cda\n``#004cda` `rgb(0,76,218)``\n• #003ada\n``#003ada` `rgb(0,58,218)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #0016da\n``#0016da` `rgb(0,22,218)``\n• #0004da\n``#0004da` `rgb(0,4,218)``\n• #0f00da\n``#0f00da` `rgb(15,0,218)``\nSimilar Colors\n\n# #0028da Preview\n\nText with hexadecimal color #0028da\n\nThis text has a font color of #0028da.\n\n``<span style=\"color:#0028da;\">Text here</span>``\n#0028da background color\n\nThis paragraph has a background color of #0028da.\n\n``<p style=\"background-color:#0028da;\">Content here</p>``\n#0028da border color\n\nThis element has a border color of #0028da.\n\n``<div style=\"border:1px solid #0028da;\">Content here</div>``\nCSS codes\n``.text {color:#0028da;}``\n``.background {background-color:#0028da;}``\n``.border {border:1px solid #0028da;}``\n\n# Shades and Tints of #0028da\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #000002 is the darkest color, while #eef1ff is the lightest one.\n\n• #000002\n``#000002` `rgb(0,0,2)``\n• #000416\n``#000416` `rgb(0,4,22)``\n• #000829\n``#000829` `rgb(0,8,41)``\n• #000b3d\n``#000b3d` `rgb(0,11,61)``\n• #000f51\n``#000f51` `rgb(0,15,81)``\n• #001264\n``#001264` `rgb(0,18,100)``\n• #001678\n``#001678` `rgb(0,22,120)``\n• #001a8c\n``#001a8c` `rgb(0,26,140)``\n• #001d9f\n``#001d9f` `rgb(0,29,159)``\n• #0021b3\n``#0021b3` `rgb(0,33,179)``\n• #0024c6\n``#0024c6` `rgb(0,36,198)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\n• #002cee\n``#002cee` `rgb(0,44,238)``\nShade Color Variation\n• #0231ff\n``#0231ff` `rgb(2,49,255)``\n• #1641ff\n``#1641ff` `rgb(22,65,255)``\n• #2951ff\n``#2951ff` `rgb(41,81,255)``\n• #3d61ff\n``#3d61ff` `rgb(61,97,255)``\n• #5171ff\n``#5171ff` `rgb(81,113,255)``\n• #6481ff\n``#6481ff` `rgb(100,129,255)``\n• #7891ff\n``#7891ff` `rgb(120,145,255)``\n• #8ca1ff\n``#8ca1ff` `rgb(140,161,255)``\n• #9fb1ff\n``#9fb1ff` `rgb(159,177,255)``\n• #b3c1ff\n``#b3c1ff` `rgb(179,193,255)``\n• #c6d1ff\n``#c6d1ff` `rgb(198,209,255)``\n• #dae1ff\n``#dae1ff` `rgb(218,225,255)``\n• #eef1ff\n``#eef1ff` `rgb(238,241,255)``\nTint Color Variation\n\n# Tones of #0028da\n\nA tone is produced by adding gray to any pure hue. In this case, #656875 is the less saturated color, while #0028da is the most saturated one.\n\n• #656875\n``#656875` `rgb(101,104,117)``\n• #5c627e\n``#5c627e` `rgb(92,98,126)``\n• #545d86\n``#545d86` `rgb(84,93,134)``\n• #4b588f\n``#4b588f` `rgb(75,88,143)``\n• #435297\n``#435297` `rgb(67,82,151)``\n• #3b4d9f\n``#3b4d9f` `rgb(59,77,159)``\n• #3248a8\n``#3248a8` `rgb(50,72,168)``\n• #2a43b0\n``#2a43b0` `rgb(42,67,176)``\n• #223db8\n``#223db8` `rgb(34,61,184)``\n• #1938c1\n``#1938c1` `rgb(25,56,193)``\n• #1133c9\n``#1133c9` `rgb(17,51,201)``\n• #082dd2\n``#082dd2` `rgb(8,45,210)``\n• #0028da\n``#0028da` `rgb(0,40,218)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #0028da is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5089551,"math_prob":0.81942934,"size":3662,"snap":"2021-21-2021-25","text_gpt3_token_len":1602,"char_repetition_ratio":0.15472937,"word_repetition_ratio":0.011049724,"special_character_ratio":0.55707264,"punctuation_ratio":0.22954546,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9883193,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-20T21:09:41Z\",\"WARC-Record-ID\":\"<urn:uuid:8b50b03e-0995-4141-8abf-fe5bdeca43b7>\",\"Content-Length\":\"36216\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0be6e8a3-1ea4-4bcf-a130-216d67034c28>\",\"WARC-Concurrent-To\":\"<urn:uuid:5517070e-4c61-4405-a0b7-3e6bec4eceff>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/0028da\",\"WARC-Payload-Digest\":\"sha1:INY4JGGQZ4OD62Y5M7OP2DOBELTRB5EA\",\"WARC-Block-Digest\":\"sha1:N6OMWMOUV6CYXRTHRBVNAGEIPDCBH4X7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488257796.77_warc_CC-MAIN-20210620205203-20210620235203-00093.warc.gz\"}"} |
http://www.richinstyle.com/test/boxes/blockwidth3.html | [
"Core tests\n\nThis test\n\n# RichInStyle.com tests: block widths\n\nThe following is an ancestor DIV with margin-left: 50% and background: green. Therefore its width is 50%. It contains a DIV with margin-left: -100%; margin-right: 100% and background: yellow. As a result of these, the element should be yellow in the left half, and green (and empty of content) in the right.\n\na b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z\n\nThe following is an ancestor DIV with margin-left: 50% and background: green. Therefore its width is 50%. It contains a DIV with width: 100%; margin-left: -100% and background: yellow. As a result of these, the element should be yellow in the left half, and green (and empty of content) in the right.\n\na b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z\n\nThis has padding-left: 50% on the containing block, margin-left: -100% on the inner. As a result, the content and background should be as wide as this element is, and should be red in its entirety.\n\na b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z\n\nThis has a containing DIV with background: red and margin-top: 10px. Inside it has margin-top: 30px with a blue background. Since CSS states that the collapsed margin does not form part of the content area of the DIV, it should be transparent to the color of the BODY (i.e., no red should be visible).\n\nContent\n\nThis has padding-top: 50% on the containing block and margin-top: -50% on the inner. Since they relate to the width of the containing block, they are the same and no green (the background of the containing block) should be visible above the inner DIV; however, space should be visible below it since the top margin does not affect the size of the padding of the containing DIV.\n\na b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e f g h i j k l m n o p q r s t u v w x y z"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.88084006,"math_prob":0.9897009,"size":2006,"snap":"2022-27-2022-33","text_gpt3_token_len":480,"char_repetition_ratio":0.16533467,"word_repetition_ratio":0.29545453,"special_character_ratio":0.25772682,"punctuation_ratio":0.14454976,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99118954,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-08T03:36:02Z\",\"WARC-Record-ID\":\"<urn:uuid:6d88281e-db91-4715-ac0a-89cf8dea3f08>\",\"Content-Length\":\"10645\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6a1cb299-e1e2-44ac-9b27-80a2be914d43>\",\"WARC-Concurrent-To\":\"<urn:uuid:d9d52194-93a4-452f-bb41-22c885d58fb2>\",\"WARC-IP-Address\":\"23.227.169.91\",\"WARC-Target-URI\":\"http://www.richinstyle.com/test/boxes/blockwidth3.html\",\"WARC-Payload-Digest\":\"sha1:2M2SCB6UAG5GETTTORGBFUNZKBR32BY2\",\"WARC-Block-Digest\":\"sha1:5S7ESEG2UQPPOLCMOWETCNN4ZS2UYKNY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882570765.6_warc_CC-MAIN-20220808031623-20220808061623-00094.warc.gz\"}"} |
https://talkstats.com/tags/numeric/ | [
"# numeric\n\n1. ### Logistic regression model - numeric predictors modification\n\nI am running a regression using multiple variables in order to predict a binomial outcome. Two of my variables are numeric, most are categoric. My two numeric variables are age and bmi. I have calculated an odds ratio for each of those variables (e.g. if the bmi increases with 1 point...\n2. ### [R] Changing 2 Numeric Variables to 1 Categorical Variable in R?\n\nI am a finance student and have been playing around in R the past couple of weeks (Rookie here..). QUESTION: I have two numeric variables: A and B. And I want turn these in one cathegorical variable C. C takes the following values: 1 if A and B both score top decile – or quintile of the...\n3. ### Stubborn Charachters! Need help converting CHR variable to Numeric (in R)\n\nHi, I am an \"R beginner\", still getting my bearings.... please help. I read in a csv as follows: defense <- read.csv (\"defense.csv\", header=T, stringsAsFactors=F) My issue is the dollar \"amount\" field was assigned \"character\" type, as follows: str (defense) 'data.frame': 5024 obs. of 11...\n4. ### What is the effect of categorising categorical data as numerical data?\n\nIf I'm doing a PCA and I have categorical data as well as numeric but code it all up as numeric what is the issue?\n5. ### Length of a numeric variable---already imported\n\nHi, I imported an excel file into SAS 9.3. One of my variables is INCOME. Running a proc freq, my income is listed out of order, according to the first number, so for instance, here is an example of my output (attached): Do I need to re-import the excel datasheet with some kind of...\n6. ### Unlist command drops all my column names in the first row and adopts NAs\n\nHi Everyone, I am having trouble turning my data.frame into a matrix format. Because I wanted to change my data.frame with mostly factor variables into a numeric matrix, I used the following code --> UN2010frame<-data.matrix(lapply(UN2010,as.numeric)) However when i checked the mode of..."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91950786,"math_prob":0.68249106,"size":284,"snap":"2021-31-2021-39","text_gpt3_token_len":70,"char_repetition_ratio":0.092857145,"word_repetition_ratio":0.0,"special_character_ratio":0.24647887,"punctuation_ratio":0.1764706,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99383247,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-20T14:36:31Z\",\"WARC-Record-ID\":\"<urn:uuid:5cb33645-a419-45e4-b069-feeb7f6a9bdf>\",\"Content-Length\":\"28681\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e7edead6-3ed9-4704-861e-b56f434e3eb0>\",\"WARC-Concurrent-To\":\"<urn:uuid:5baf3622-c2df-48a5-84c1-a632d60a080b>\",\"WARC-IP-Address\":\"199.167.200.62\",\"WARC-Target-URI\":\"https://talkstats.com/tags/numeric/\",\"WARC-Payload-Digest\":\"sha1:J565QOG6QC6OQ4YLVDVGKFHM3U5PJGQZ\",\"WARC-Block-Digest\":\"sha1:XD3CBUUK4JGACP75ENOH334OG4TP5XZ5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057039.7_warc_CC-MAIN-20210920131052-20210920161052-00511.warc.gz\"}"} |
https://sage-advices.com/what-shape-has-3-pairs-of-congruent-rectangular-faces/ | [
"# What shape has 3 pairs of congruent rectangular faces?\n\n## What shape has 3 pairs of congruent rectangular faces?\n\nName Definition\nCube A six-sided polyhedron that has congruent squares as faces.\nRectangular prism A polyhedron that has three pairs of congruent, rectangular, parallel faces.\nPyramid A polyhedron with a polygonal base and a collection of triangular faces that meet at a point.\n\nWhat 3D shape has 2 triangular faces and 3 rectangular faces?\n\ntriangular prism\nA triangular prism has 5 faces (2 triangular faces, 3 rectangular faces), 9 edges, 6 vertices, and slides and stacks.\n\n### What is the best name for a shape that has 2 triangular bases and 3 rectangular faces?\n\nA triangular prism has 2 triangular faces and 3 rectangular faces.\n\nWhat is the name of the solid figure?\n\nAnswer: The major types of solid shapes are: cubes, cuboids, prisms, pyramids, platonic solids, torus, cone, cylinder, and sphere.\n\n#### Which solid figure has faces?\n\nUsing Faces, Edges, and Vertices to Identify a Solid\n\nFigure Name Number of Faces Number of Vertices\ncone 1 0\ncylinder 2 0\npyramid at least 4 at least 4\nprism at least 5 at least 6\n\nWhat is a solid with a square base and triangular side faces?\n\nPyramid is a solid figure, the base of which is a triangle or square or some other polygon and its side faces are equilateral triangles that converges to a point at the top.\n\n## What are the 3D shapes called?\n\n3D shapes\n\nCube Cuboid\nSphere Square-based pyramid\nCylinder Triangular prism\nPentagonal pyramid Hexagonal prism\n\nWhat shapes make up a triangular prism?\n\nA triangular prism is a three-dimensional polyhedron, made up of two triangular faces and three rectangular faces. It has 5 faces, 9 edges, and 6 vertices. The 2 bases are in the shape of a triangle and the other 3 faces are shaped like a rectangle.\n\n### What is a solid figure?\n\nSolid figures are three-dimensional (3-D) figures that have length, height and width. The three-dimensional figure can be hollow of solid. Face: is the flat surface of a solid figure. A face of a solid figure can be a square, a rectangle, a triangle or a circle. Edge: is the line segment two faces of a solid meet.\n\nWhat is a solid shape?\n\nSolid shapes are nothing but solids that consist of 3 dimensions, namely length, breadth, and height. Solid shapes are also known as 3D shapes. These solid shapes occupy space and are found in our day-to-day life. We touch, feel, and use them.\n\n#### Is prism A solid figure?\n\nA prism is a solid figure that has two parallel congruent sides that are called bases that are connected by the lateral faces that are parallelograms. There are both rectangular and triangular prisms.\n\nWhich is a solid shape with six faces?\n\nA cube has six faces that are all rectangles, so a cube can be known as a rectangular prism. A cone is a solid figure that has a circular face on one end, called the base, and a point at the other end where the sides meet. I’m pretty sure we have all enjoyed an ice cream cone at one point in our lives.\n\n## Which is an example of a solid figure?\n\nA pyramid is a solid figure that has a polygon as its base on one end and triangular faces all meeting at a single point on the other end. Many of us have heard of the Great Pyramids of Egypt. These are a perfect example of a pyramid in the world around us.\n\nWhat are the faces and edges of 3 D solids?\n\n3-D Solids: Faces, Edges and Vertices 3-D Solid FACES EDGES VERTICES CUBE 6 12 8 RECTANGULAR PRISM 6 12 8 CYLINDER 2 0 0 CONE 1 0 0\n\n### Are there any solid shapes with no edges?\n\nNo vertex. No edges. 1 curved face [Image will be Uploaded Soon] A cylinder is known to be a solid figure that has two circular bases and one curved side. A cylinder is similar to a cone, except that rather than only one circular base and a point on the other end, there are circular bases on both ends connected by the curved side.\n\nBegin typing your search term above and press enter to search. Press ESC to cancel."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9355116,"math_prob":0.9589655,"size":4168,"snap":"2023-40-2023-50","text_gpt3_token_len":1057,"char_repetition_ratio":0.20220941,"word_repetition_ratio":0.102864586,"special_character_ratio":0.23536469,"punctuation_ratio":0.10714286,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97812974,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T23:27:37Z\",\"WARC-Record-ID\":\"<urn:uuid:746b0291-0036-40a0-9035-25ffaa79107f>\",\"Content-Length\":\"144569\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fd107f22-1bb0-4409-8974-e7c1a905ab4d>\",\"WARC-Concurrent-To\":\"<urn:uuid:8d110251-049d-4f74-b7c7-0eb49b961fdc>\",\"WARC-IP-Address\":\"172.67.174.90\",\"WARC-Target-URI\":\"https://sage-advices.com/what-shape-has-3-pairs-of-congruent-rectangular-faces/\",\"WARC-Payload-Digest\":\"sha1:VT5NDJQ7FXKMX4CULZNGWIEBHESSJJQT\",\"WARC-Block-Digest\":\"sha1:NMQHCRGVTQLWR3KFTJTK7LCGG5B4W5QE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506669.96_warc_CC-MAIN-20230924223409-20230925013409-00376.warc.gz\"}"} |
https://iq.opengenus.org/pass-array-in-function-in-c/ | [
"×\n\nSearch anything:\n\n# Pass array in function in C in multiple ways\n\n#### Software Engineering C Programming",
null,
"Reading time: 20 minutes | Coding time: 10 minutes\n\nAn array is a collection of elements of similar data type in which the memory of all the elements are allocated in sequence.\n\nAs we know there are two ways we can pass our element in a function as a parameter that are:\n\n1. pass by value.\n2. pass by reference.\n\nAnd guess what in case of array, its no different.\n\nSince an array's memory get allocated in a sequence we can just pass the array to the function without worrying about anything and by this function will receive the first address of the array and from it we can access all the elements. And this way we pass the array by its reference.\n\n## Example demonstrating passing array as reference\n\n``````#include<stdio.h>\n\nvoid exampleFunction(int arr[], int size){\nint i;\nfor(i=0;i<size;i++){\nprintf(\"%d \", arr[i]);\n}\n}\n\nint main(){\nint arr[] = {1,2,3,4,5,6,7,8,9,10};\nprintf(\"Array elements: \");\n\n// Passing the array to the function\nexampleFunction(arr, 10);\n\nreturn 0;\n}\n``````\n\n## Recieving array as a pointer variable\n\nThere's another way we can do this operation and that is receiving the parameter as a pointer variable.\n\n``````#include<stdio.h>\n\n// Receiving array as a pointer variable\nvoid exampleFunction(int* arr, int size){\nint i;\nfor(i=0;i<size;i++){\nprintf(\"%d \", arr[i]);\n}\n}\n\nint main(){\nint arr[] = {1,2,3,4,5,6,7,8,9,10};\nprintf(\"Array elements: \");\n\n// Passing the array to the function\nexampleFunction(arr, 10);\n\nreturn 0;\n}\n``````\n\n## 2D arrays\n\nIn case of 2D arrays there is one thing that we need to take care of and that is we need to pass the size of the column because when you create a 2D array, any type a, in memory what you actually create is 3 contiguous blocks of 4 similar type objects.\n\n``````a a a a\na a a a\na a a a\n``````\n\nNow the next question is, why is that so? Because, keeping with the spec and structure of the language, any type a actually expands out into any type (* a), because arrays decay into pointers.\n\nAnd in fact that also expands out into any type (* (* a)), however, you've now completely lost the size of the 2D array. So, you must help the compiler out a bit.\n\n``````#include<stdio.h>\n\nvoid exampleFunction(int arr[], int row, int col){\nint i=0;;\nint j = 2;\nfor(i=0;i<row;i++){\nfor(int j=0;j<col;j++){\nprintf(\"%d \", arr[i][j]);\n}\n}\n}\n\nint main(){\nint arr[] = {{1,2,3,4,5}, {6,7,8,9,10}};\nprintf(\"Array elements: \");\n\n// Passing the array to the function\nexampleFunction(arr, 2, 5);\n\nreturn 0;\n}\n``````\n\nTo pass array elements as a value, we can pass any specific value of the array.\n\n``````#include<stdio.h>\n\nvoid exampleFunction(int value){\nprintf(\"%d \", value);\n}\n\nint main(){\nint arr[] = {1,2,3,4,5,6,7,8,9,10};\nprintf(\"Value at 6th index: \");\n\n// Passing the array to the function\nexampleFunction(arr);\n\nreturn 0;\n}\n``````"
] | [
null,
"https://iq.opengenus.org/assets/images/tmp/binary-tree-tmp.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.75901437,"math_prob":0.98431855,"size":2776,"snap":"2023-40-2023-50","text_gpt3_token_len":799,"char_repetition_ratio":0.13672438,"word_repetition_ratio":0.16777042,"special_character_ratio":0.3324928,"punctuation_ratio":0.17764166,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98725283,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T08:55:10Z\",\"WARC-Record-ID\":\"<urn:uuid:a720dc60-5088-4b0f-a2e9-1a453f333c59>\",\"Content-Length\":\"69398\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d23d5278-b1f5-4a9e-9377-4ce9e96f9aeb>\",\"WARC-Concurrent-To\":\"<urn:uuid:1a510214-4842-4a12-9b13-80cf1f708443>\",\"WARC-IP-Address\":\"159.89.134.55\",\"WARC-Target-URI\":\"https://iq.opengenus.org/pass-array-in-function-in-c/\",\"WARC-Payload-Digest\":\"sha1:R7WKKVNJJAYC3QIB4OZ67DRVSCE7VOJQ\",\"WARC-Block-Digest\":\"sha1:UPZ2VJ3M6DMPSZGFGKFO4LOGM323S5RD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100739.50_warc_CC-MAIN-20231208081124-20231208111124-00002.warc.gz\"}"} |
https://statsidea.com/excel-methods-to-calculate-years-between-two-dates/ | [
"# Excel: Methods to Calculate Years Between Two Dates\n\nYou’ll be able to significance refer to formulation to calculate the choice of years between two dates in Excel:\n\nFormulation 1: Calculate Complete Years Between Two Dates\n\n```=INT(YEARFRAC(A2,B2))\n```\n\nFormulation 2: Calculate Fractional Years Between Two Dates\n\n```YEARFRAC(A2,B2)\n```\n\nEach formulation suppose that mobile A2 comprises the beginning age and mobile B2 comprises the tip age.\n\nRefer to examples display how one can significance each and every system in observe.\n\n## Instance 1: Calculate Complete Years Between Two Dates\n\nRefer to screenshot displays how one can calculate the choice of complete years between a listing of get started and finish dates in Excel:",
null,
"Right here’s how one can interpret the output:\n\n• There are 16 complete years between 1/4/2005 and 1/1/2022.\n• There are 15 complete years between 3/15/2007 and three/15/2022.\n• There are 14 complete years between 4/14/2008 and four/18/2022.\n\nAnd so forth.\n\n## Instance 2: Calculate Fractional Years Between Two Dates\n\nRefer to screenshot displays how one can calculate the choice of fractional years between a listing of get started and finish dates in Excel:",
null,
"Right here’s how one can interpret the output:\n\n• There are 16.992 years between 1/4/2005 and 1/1/2022.\n• There are 15 years between 3/15/2007 and three/15/2022.\n• There are 14.011 years between 4/14/2008 and four/18/2022.\n\nAnd so forth.\n\nNotice: You’ll be able to in finding your complete documentation for the YEARFRAC serve as in Excel right here.\n\n## Spare Sources\n\nRefer to tutorials provide an explanation for how one can carry out alternative habitual duties in Excel:\n\nMethods to Calculate the Choice of Months Between Dates in Excel\nMethods to Convert Year to Past and Age Structure in Excel\nMethods to Calculate Reasonable through Past in Excel"
] | [
null,
"https://www.statology.org/wp-content/uploads/2022/12/years1.jpg",
null,
"https://www.statology.org/wp-content/uploads/2022/12/years2.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.83437556,"math_prob":0.9259591,"size":1753,"snap":"2023-14-2023-23","text_gpt3_token_len":421,"char_repetition_ratio":0.1509434,"word_repetition_ratio":0.35636362,"special_character_ratio":0.25613233,"punctuation_ratio":0.077844314,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9937856,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-10T14:50:22Z\",\"WARC-Record-ID\":\"<urn:uuid:91d6571b-16ae-4ff2-bc0a-98cc87d2f493>\",\"Content-Length\":\"54733\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8fd39da8-0432-4ec8-8383-c13a635e66aa>\",\"WARC-Concurrent-To\":\"<urn:uuid:33df82ad-e649-4f28-a887-010facfdefd0>\",\"WARC-IP-Address\":\"103.157.97.104\",\"WARC-Target-URI\":\"https://statsidea.com/excel-methods-to-calculate-years-between-two-dates/\",\"WARC-Payload-Digest\":\"sha1:3C37M7H3NRZA74KWNAI2P6GOJDRFQ64K\",\"WARC-Block-Digest\":\"sha1:NWAFFZRX5WDZ4Y3DOLXKX6KERGFCT3UT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224657720.82_warc_CC-MAIN-20230610131939-20230610161939-00665.warc.gz\"}"} |
https://origin.geeksforgeeks.org/tag/python-pandas-dataframe/ | [
"Tag Archives: Python pandas-dataFrame\n\nIn this article, we are going to see how to divide a dataframe by various methods and based on various parameters using Python. To divide… Read More\nIn this article, we are going to see how to find the difference between two rows in Pandas. Pandas DataFrame is a two-dimensional data structure… Read More\nIn this article, we learn how to compare the columns in the pandas’ dataframe. Pandas is a very useful library in python, it is mainly… Read More\nIn this article, we will discuss how to convert a pandas crosstab to a stacked dataframe. A stacked DataFrame is a multi-level index with one… Read More\nColumn duplication usually occurs when the two data frames have columns with the same name and when the columns are not used in the JOIN… Read More\nIn this article, we will discuss how to sort a Pandas dataframe by both index and columns. Method 1: Sort DataFrame based on Index We… Read More\nLEFT ANTI Join is the opposite of semi-join. excluding the intersection, it returns the left table. It only returns the columns from the left table… Read More\nIn this article, we will discuss how to merge two Pandas Dataframes on Index. Method 1: Using join() This method is used to join the… Read More\nBox plot is also called a Whisker plot which provides a summary of a set of data that includes minimum, first-quartile, median, third quartile, and… Read More\nIn this article, we will discuss how to exclude columns in pandas dataframe. Let’s create a dataframe with four columns in python. Python3 # import… Read More\nIn this article, we will discuss how to use axis=0 and axis=1 in pandas using Python. Sometimes we need to do operations only on rows,… Read More\nIn this article, we will learn how to standardize the data in a Pandas Dataframe. Standardization is a very important concept in feature scaling which… Read More\nIn this article, we will discuss how to count occurrences of a specific column value in the pandas column. Dataset in use: We can count… Read More\nIn this article, how to calculate quantiles by group in Pandas using Python. There are many methods to calculate the quantile, but pandas provide groupby.quantile()… Read More\nIn this article, we will see how to calculate the rolling median in pandas. A rolling metric is usually calculated in time series data. It… Read More"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.81571966,"math_prob":0.8531355,"size":2336,"snap":"2022-05-2022-21","text_gpt3_token_len":520,"char_repetition_ratio":0.19339623,"word_repetition_ratio":0.14074074,"special_character_ratio":0.2067637,"punctuation_ratio":0.08951965,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9867705,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-20T04:16:29Z\",\"WARC-Record-ID\":\"<urn:uuid:26867151-6dfc-4a66-9e1d-dacc56b93232>\",\"Content-Length\":\"138051\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:49d20c91-5a00-4be4-8c96-4e2f4cc2705d>\",\"WARC-Concurrent-To\":\"<urn:uuid:a89c13e1-2fbd-474a-b63a-a5cea316db19>\",\"WARC-IP-Address\":\"44.228.100.190\",\"WARC-Target-URI\":\"https://origin.geeksforgeeks.org/tag/python-pandas-dataframe/\",\"WARC-Payload-Digest\":\"sha1:BCI6EXJZ5IV3CAH5WXSJSZY67UJJVTAS\",\"WARC-Block-Digest\":\"sha1:YPLBNBHF4QE2C6GEKLWNKVO3PHQTGMD2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320301720.45_warc_CC-MAIN-20220120035934-20220120065934-00016.warc.gz\"}"} |
http://www.math.toronto.edu/mathnet/falseProofs/guess12.html | [
"Navigation Panel:",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Go backward to This is the Fallacy",
null,
"Go up to 1=2: A Proof using Complex Numbers",
null,
"Go forward to This is Not the Fallacy",
null,
"Switch to text-only version (no graphics)",
null,
"Go to University of Toronto Mathematics Network Home Page\n\n# This step is not the source of the fallacy.\n\nThis step is using the identification",
null,
".\n\nStrictly speaking, this depends upon exactly what one means by the square root symbol, which really is only defined for positive numbers.\n\nHowever, there's nothing to stop one saying that, in this proof, what will be meant by the square root symbol when applied to a negative number is one of its two complex square roots, namely, the one that's a positive multiple of i. So, for example, one could say that what one means by",
null,
"is 2i, what one means by",
null,
"is 3i, etc. Once one has said that, establishing exactly what the notation means, then this part of the proof is perfectly valid.\n\nIn summary: you've found a slight mistake in the proof (the fact that it was never specified exactly what the square root symbols is supposed to mean in this context), but it's an easily correctable mistake and not the source of the fallacy.\n\nIn fact, this mistake did not originate with this step in the proof, but crept in earlier. See if you can figure out where, as well as figuring out the step where the fallacy lies!\n\nWhy don't you go back to the list of steps in the proof and see if you can identify which one is wrong, now that you know it isn't this one?\nThis page last updated: May 26, 1998\nOriginal Web Site Creator / Mathematical Content Developer: Philip Spencer\nCurrent Network Coordinator and Contact Person: Joel Chan - mathnet@math.toronto.edu\n\nNavigation Panel:",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
""
] | [
null,
"http://www.math.toronto.edu/icons/hyperlatex/previous.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/up.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/down.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/next.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/textonly.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/mathnet/icons/mathnet.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/previous.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/up.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/next.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/textonly.gif",
null,
"http://www.math.toronto.edu/mathnet/icons/mathnet.gif",
null,
"http://www.math.toronto.edu/mathnet/falseProofs/fallacies_hlimgs/image52.gif",
null,
"http://www.math.toronto.edu/mathnet/falseProofs/fallacies_hlimgs/image53.gif",
null,
"http://www.math.toronto.edu/mathnet/falseProofs/fallacies_hlimgs/image54.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/previous.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/up.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/down.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/next.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/textonly.gif",
null,
"http://www.math.toronto.edu/icons/hyperlatex/panelspace.gif",
null,
"http://www.math.toronto.edu/mathnet/icons/mathnet.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9738615,"math_prob":0.7316834,"size":1002,"snap":"2022-40-2023-06","text_gpt3_token_len":222,"char_repetition_ratio":0.13126253,"word_repetition_ratio":0.011173184,"special_character_ratio":0.21457087,"punctuation_ratio":0.120192304,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9625521,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,2,null,2,null,2,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-07T23:15:14Z\",\"WARC-Record-ID\":\"<urn:uuid:49103a5b-b119-4de9-9f79-557fbcdb3859>\",\"Content-Length\":\"5274\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6dfd0487-c4b1-48e2-8c10-99683c6b4508>\",\"WARC-Concurrent-To\":\"<urn:uuid:fccebe80-92dd-4cd9-ab89-3a1a8695584c>\",\"WARC-IP-Address\":\"128.100.68.6\",\"WARC-Target-URI\":\"http://www.math.toronto.edu/mathnet/falseProofs/guess12.html\",\"WARC-Payload-Digest\":\"sha1:NQRZOYRB5PYDWMZGA6G7EIQAHYTTV3MJ\",\"WARC-Block-Digest\":\"sha1:WDXF7NECTTAQZYFEGAMKS2YFEGQ23IAP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030338280.51_warc_CC-MAIN-20221007210452-20221008000452-00620.warc.gz\"}"} |
https://forum.ivanontech.com/t/reading-assignment-hashing/8422?page=2 | [
"",
null,
"1. Sha-256\n2. Because the amount of combinations that are allowed, and only one works.\n3 Likes\n• What is the hashing algorithm called used in Bitcoin?\nSHA256\n\n• Why is this hashing algorithm really hard (almost impossible) to brute-force?\nthere are to many possibility’s which makes it not practical\n\n1 Like\n1. SHA- 256 and SHA-512\n2. It produces an output which 256 bits long which is deterministic but very much pre-image resistant.\n2 Likes\n\n1- SHA-256\n2- Its goong to take a very long time to break\n\n2 Likes\n1. What is the hashing algorithm called used in Bitcoin?\n\nThere is SHA-256.\n\n1. Why is this hashing algorithm really hard (almost impossible) to brute-force?\n\nThere are so many inputs to try, that is almost impossible to find it. It will be worth to get more knowledge about the quantum computers and the relation between them and decrypting SHA-256.\n\n1. The hashing algorithm used in Bitcoin is proof of work.\n\n2. This application is almost impossible to brute force because the amount of time needed to make even an average of the number of guesses needed to get the correct answer in the algorithm far exceeds the life span of any human being, making it infeasible to do so.\n\n1. What is the hashing algorithm called used in Bitcoin?\nSHA-256\n\n2. Why is this hashing algorithm really hard (almost impossible) to brute-force?\nThere are so many possibilities that it would take a long time to try them all\n\n1. What is the hashing algorithm called used in Bitcoin?\nSHA-256 (Secure Hashing Algorithm 256).\n\n2. Why is this hashing algorithm really hard (almost impossible) to brute-force?\nThe amount of data is absolutely huge: In an average scenario, you need to do approximately 2^256/2 = 2^128 (340 undecillions…) computations to find the hash. So it is infeasible to find it, and thus to brute-force the system.\n\nCould someone explain to me in simple terms what is the Puzzle Friendly property?\n\nI read in in the Blockgeek article, but it is quite difficult to me to really grasp it.\n\nThanks!",
null,
"1 Like\n1. SHA-256\n2. The number of guesses is astronomically high\n\n1 sha-256\n2.cause if you change a data in a block all other previous block have to change it’s data and is impossible\n\n1.SHA-256\n2. Although it is possible to break the hashing algorithm via the brute force method, it will take a extremely long time, which it is not feasible due to the huge amount of processing power required and the size of the mathematical probability.\n\n1. SHA-256\n2. Because there are 256 bits of entropy, thus `1 / (2^256 - 1)` chance to guess correctly per attempt.\n1. The hashing algorithm that is used in Bitcoin is called ‘SHA-256’.\n2. The hashing algorithm is really hard (almost impossible) to brute-force because there is an unfathomable amount of potential inputs and outputs.\n\n1 SHA\n2 IT because it use 256 bit hash algorithm and it will take infinite time to succeed.\n\nWhat is the hashing algorithm called used in Bitcoin?\nSHA-256 (Secure Hashing Algorithm 256).\n\nWhy is this hashing algorithm really hard (almost impossible) to brute-force?\nBrute forcing the input for a SHA-256 hash would require up to 2^256 attempts to find the correct output.\n\n1. SHA 256\n\n2. To determine the original value from its hash rate would take so long that it technically would never happen. There is a huge amount of data using a 256-bit hash and that would require an average number of tries of (2^256)/2 or 2^255. An astronomical number\n\n1. SHA-256\n2. To many possibilities, not enough time.\n1. SHA-256\n2. The amount of time it would take to brute-force the correct input means that it is infeasible.\n1. sha-256\n2. it’s almost impossible to brute-force because of Pre-Image Resistance"
] | [
null,
"https://forum.ivanontech.com/uploads/default/original/2X/d/d4983b65023b72823084db6643c71bc8b4dc9818.png",
null,
"https://forum.ivanontech.com/images/emoji/twitter/slight_smile.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91966325,"math_prob":0.90974087,"size":3582,"snap":"2020-34-2020-40","text_gpt3_token_len":822,"char_repetition_ratio":0.16238122,"word_repetition_ratio":0.12520064,"special_character_ratio":0.24846454,"punctuation_ratio":0.069970846,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98667675,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-23T08:28:49Z\",\"WARC-Record-ID\":\"<urn:uuid:db2fee8a-687d-4ab8-999b-306a8a1b46ea>\",\"Content-Length\":\"54793\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d262d63b-b254-4449-befa-32aaf8e8bc2d>\",\"WARC-Concurrent-To\":\"<urn:uuid:a21e6a38-eceb-4a55-8ba2-f625cc80cc40>\",\"WARC-IP-Address\":\"3.129.104.212\",\"WARC-Target-URI\":\"https://forum.ivanontech.com/t/reading-assignment-hashing/8422?page=2\",\"WARC-Payload-Digest\":\"sha1:CORZ5NQP74DR5AXEU5HHIU62U3IICRVZ\",\"WARC-Block-Digest\":\"sha1:54THJNNOKYPDIGAAQCIIDT26ONCEHLM5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400210616.36_warc_CC-MAIN-20200923081833-20200923111833-00408.warc.gz\"}"} |
https://www.econometricsociety.org/publications/econometrica/1979/01/01/efficiency-least-squares-estimation-linear-trend-when-residuals | [
"# Efficiency of Least-Squares Estimation of Linear Trend when Residuals Are Autocorrelated\n\nhttps://doi.org/0012-9682(197901)47:1<115:EOLEOL>2.0.CO;2-3\np. 115-128\n\nJohn S. Chipman\n\nIn the regression model y\"t = @a + @bt + @e\"t is found that when the residuals @e\"t follow a first-order stationary Markoff process with zero mean and autocorrelation coefficient @r, - 1 < @r < 1, the greatest lower bound for the efficiency of the least-squares estimator of @b (relative to the Gauss-Markoff estimator) over the interval 0 @? @r < 1 is .753763. This compares with a greatest lower bound of .535898 for the relative efficiency of the Cochrane-Orcutt estimator of @b."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7197057,"math_prob":0.8717825,"size":728,"snap":"2020-45-2020-50","text_gpt3_token_len":217,"char_repetition_ratio":0.1160221,"word_repetition_ratio":0.0,"special_character_ratio":0.30357143,"punctuation_ratio":0.12837838,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9601564,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-26T21:40:01Z\",\"WARC-Record-ID\":\"<urn:uuid:8e8c0fa7-4a4d-45b6-acf1-a66fe33402ab>\",\"Content-Length\":\"49225\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a670643b-3f26-4457-a958-ccbf6dde74f7>\",\"WARC-Concurrent-To\":\"<urn:uuid:0a290d2e-722b-4ebb-b470-4e2d5cfb0e3d>\",\"WARC-IP-Address\":\"64.131.90.213\",\"WARC-Target-URI\":\"https://www.econometricsociety.org/publications/econometrica/1979/01/01/efficiency-least-squares-estimation-linear-trend-when-residuals\",\"WARC-Payload-Digest\":\"sha1:C5JC32LJMP7EJQ7UISX3Z3R7JVYANKNC\",\"WARC-Block-Digest\":\"sha1:44GRCQXPANW3Q7AF5ZWUQLPVOEXUJMWB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107892062.70_warc_CC-MAIN-20201026204531-20201026234531-00719.warc.gz\"}"} |
https://phys.libretexts.org/Courses/Joliet_Junior_College/Physics_201_-_Fall_2019v2/Book%3A_Custom_Physics_textbook_for_JJC/09%3A_Linear_Momentum_and_Collisions/9.16%3A_Collisions | [
"$$\\require{cancel}$$\n\n# 9.16: Collisions\n\n## Conservation of Energy and Momentum\n\nIn an inelastic collision the total kinetic energy after the collision is not equal to the total kinetic energy before the collision.\n\nlearning objectives\n\n• Assess the conservation of total momentum in an inelastic collision\n\nAt this point we will expand our discussion of inelastic collisions in one dimension to inelastic collisions in multiple dimensions. It is still true that the total kinetic energy after the collision is not equal to the total kinetic energy before the collision. While inelastic collisions may not conserve total kinetic energy, they do conserve total momentum.\n\nWe will consider an example problem in which one mass ($$\\mathrm{m_1}$$) slides over a frictionless surface into another initially stationary mass ($$\\mathrm{m_2}$$). Air resistance will be neglected. The following things are known:\n\n\\begin{align} \\mathrm{m_1} & \\mathrm{=0.250kg,} \\\\ \\mathrm{m_2} & \\mathrm{=0.400kg,} \\\\ \\mathrm{v_1} & \\mathrm{=2.00m/s,} \\\\ \\mathrm{v_1′}& \\mathrm{=1.50m/s,} \\\\ \\mathrm{v_2}& \\mathrm{=0m/s,} \\\\ \\mathrm{θ_1′} & \\mathrm{=45.0∘,} \\end{align}\n\nwhere $$\\mathrm{v_1}$$ is the initial velocity of the first mass, $$\\mathrm{v_1′}$$ is the final velocity of the first mass, $$\\mathrm{v_2}$$ is the initial velocity of the second mass, and $$\\mathrm{θ_1′}$$ is the angle between the velocity vector of the first mass and the x-axis.\n\nThe object is to calculate the magnitude and direction of the velocity of the second mass. After this, we will calculate whether this collision was inelastic or not.\n\nSince there are no net forces at work (frictionless surface and negligible air resistance), there must be conservation of total momentum for the two masses. Momentum is equal to the product of mass and velocity. The initially stationary mass contributes no initial momentum. The components of velocities along the x-axis have the form $$\\mathrm{v⋅\\cos θ}$$, where θ is the angle between the velocity vector of the mass of interest and the x-axis.\n\nExpressing these things mathematically:\n\n$\\mathrm{m_1v_1=m_1v_1′ \\cdot \\cos (θ_1)+m_2v‘_2 \\cdot \\cos (θ_2). (Eq. 2)}$\n\nThe components of velocities along the y-axis have the form $$\\mathrm{v \\cdot \\sin θ}$$, where θ is the angle between the velocity vector of the mass of interest and the x-axis. By applying conservation of momentum in the y-direction we find:\n\n$\\mathrm{0=m_1v_1′ \\cdot \\sin (θ_1)+m_2v‘_2 \\cdot \\sin (θ_2). (Eq. 3)}$\n\nIf we divide Eq. 3 by Eq. 2, we will find:\n\n$\\mathrm{ \\tan θ_2=\\dfrac{v_1′ \\cdot \\sin θ_1}{v_1′ \\cos θθ_1−v_1} (Eq. 4) }$\n\nEq. 4 can then be solved to find $$\\mathrm{θ_2}$$approx. 312º.\n\nNow let’ use Eq. 3 to solve for $$\\mathrm{v′_2}$$. Re-arranging Eq. 3, we find:\n\n$\\mathrm{v_2′=\\dfrac{−m_1v_1′ \\cdot \\sin θ_1}{ m_2 \\cdot \\sin θ_2.}}$\n\nAfter plugging in our known values, we find that $$\\mathrm{v_2′=0.886m/s}$$.\n\nWe can now calculate the initial and final kinetic energy of the system to see if it the same.\n\n\\begin{align} \\mathrm{Initial \\; Kinetic \\; Energy} & \\mathrm{ =\\frac{1}{2}m_1 \\cdot v_1^2+\\frac{1}{2}m_2 \\cdot v_2^2=0.5J.} \\\\ \\mathrm{Final \\; Kinetic \\; Energy} & \\mathrm{= \\frac{1}{2}m_1 \\cdot v_1′^2+\\frac{1}{2}m_2 \\cdot v_2′^2≈0.43J.} \\end{align}\n\nSince these values are not the same we know that it was an inelastic collision.",
null,
"Collision Example: This illustrates the example problem in which one mass collides into another mass that is initially stationary.\n\n## Glancing Collisions\n\nGlancing collision is a collision that takes place under a small angle, with the incident body being nearly parallel to the surface.\n\nlearning objectives\n\n• Identify necessary conditions for a “glancing collision”\n\nA collision is short duration interaction between two bodies or more than two bodies simultaneously causing change in motion of bodies involved due to internal forces acted between them during this. Collisions involve forces (there is a change in velocity ). The magnitude of the velocity difference at impact is called the closing speed. All collisions conserve momentum. What distinguishes different types of collisions is whether they also conserve kinetic energy. Line of impact – It is the line which is common normal for surfaces are closest or in contact during impact. This is the line along which internal force of collision acts during impact and Newton’s coefficient of restitution is defined only along this line.\n\nWhen dealing with an incident body that is nearly parallel to a surface, it is sometimes more useful to refer to the angle between the body and the surface, rather than that between the body and the surface normal (see ), in other words 90° minus the angle of incidence. This small angle is called a glancing angle. Collision at glancing angle is called “glancing collision”.",
null,
"Collision: Object is deflected after the collision withthe surface. The angles between the body and the surface normal areindicated as α and β. The angles between the body and the surface are $$\\mathrm{90 – α}$$ and $$\\mathrm{90 – β}$$.\n\nCollisions can either be elastic, meaning they conserve both momentum and kinetic energy, or inelastic, meaning they conserve momentum but not kinetic energy. An inelastic collision is sometimes also called a plastic collision.\n\nA “perfectly-inelastic” collision (also called a “perfectly-plastic” collision) is a limiting case of inelastic collision in which the two bodies stick together after impact.\n\nThe degree to which a collision is elastic or inelastic is quantified by the coefficient of restitution, a value that generally ranges between zero and one. A perfectly elastic collision has a coefficient of restitution of one; a perfectly-inelastic collision has a coefficient of restitution of zero.\n\n## Elastic Collisions in One Dimension\n\nAn elastic collision is a collision between two or more bodies in which kinetic energy is conserved.\n\nlearning objectives\n\n• Assess the relationship among the collision equations to derive elasticity\n\nAn elastic collision is a collision between two or more bodies in which the total kinetic energy of the bodies before the collision is equal to the total kinetic energy of the bodies after the collision. An elastic collision will not occur if kinetic energy is converted into other forms of energy. It important to understand how elastic collisions work, because atoms often undergo essentially elastic collisions when they collide. On the other hand, molecules do not undergo elastic collisions when they collide. In this atom we will review case of collision between two bodies.\n\nThe mathematics of an elastic collision is best demonstrated through an example. Consider a first particle with mass $$\\mathrm{m_1}$$ and velocity $$\\mathrm{v_{1i}}$$ and a second particle with mass $$\\mathrm{m_2}$$ and velocity $$\\mathrm{v_{2i}}$$. If these two particles collide, there must be conservation of momentum before and after the collision. If we know that this is an elastic collision, there must be conservation of kinetic energy by definition. Therefore, the velocities of particles 1 and 2 after the collision ($$\\mathrm{v_{1f}}$$ and $$\\mathrm{v_{2f}}$$ respectively) will be related to the initial velocities by:\n\n$$\\mathrm{\\frac{1}{2}m_1 \\cdot v_{1i}^2+\\frac{1}{2} m_2 \\cdot v_{2i}^2= \\frac{1}{2}m_1 \\cdot v_{1f}^2+\\frac{1}{2}m_2 \\cdot v_{2f}^2}$$ (due to conservation of kinetic energy)\n\nand\n\n$$\\mathrm{m_1 \\cdot v_{1i}+m_2 \\cdot v_{2i}=m_1 \\cdot v_{1f}+m_2 \\cdot v_{2f}}$$ (due to conservation of momentum).\n\nSince we have two equations, we are able to solve for any two unknown variables. In our case, we will solve for the final velocities of the two particles.\n\nBy grouping like terms and canceling out the ½ terms, we can rewrite our conservation of kinetic energy equation as:\n\n$\\mathrm{m_1 \\cdot (v_{1i}^2−v_{1f}^2)=m_2 \\cdot (v_{2f}^2−v_{2i}^2). (Eq.1)}$\n\nBy grouping like terms from our conservation of momentum equation we can find:\n\n$\\mathrm{m_1 \\cdot (v_{1i}−v_{1f})=m_2 \\cdot (v_{2f}−v_{2i}). (Eq. 2)}$\n\nIf we then divide Eq. 1 by Eq. 2 and perform some cancelations we will find:\n\n$\\mathrm{v_{1i}+v_{1f}=v_{2f}+v_{2i}. (Eq. 3)}$\n\nWe can solve for $$\\mathrm{v_{1f}}$$ as:\n\n$\\mathrm{v_{1f}=v_{2f}+v_{2i}−v_{1i}. (Eq. 4)}$\n\nAt this point we see that $$\\mathrm{v_{2f}}$$ is still an unknown variable. So we can fix this by plugging Eq. 4 into our initial conservation of momentum equation. Our conservation of momentum equation with Eq. 4 substituted in looks like:\n\n$\\mathrm{m_1 \\cdot v_{1i}+m_2 \\cdot v_{2i}=m_1 \\cdot (v_{2f}+v_{2i}−v_{1i})+m_2 \\cdot v_{2f}. (Eq.5)}$\n\nAfter doing a little bit of algebra on Eq. 5 we find:\n\n$\\mathrm{v_{2f}=\\dfrac{2 \\cdot m_1}{(m_2+m_1)} v_{1i}+\\dfrac{(m_2−m_1)}{(m_2+m_1)}v_{2i}. (Eq.6)}$\n\nAt this point we have successfully solved for the final velocity of the second particle. We still need to solve for the velocity of the first particle, so let us do that by plugging Eq. 6 into Eq. 4.\n\n$\\mathrm{v_{1f}=[\\dfrac{2 \\cdot m_1}{(m_2+m_1)}v_{1i}+\\dfrac{(m_2−m_1)}{(m_2+m_1)}v_{2i}]+v_{2i}−v_{1i}. (Eq. 7)}$\n\nAfter performing some algebraic manipulation of Eq. 7, we finally find:\n\n$\\mathrm{v_{1f}=\\dfrac{(m_1−m_2)}{(m_2+m_1)} v_{1i}+\\dfrac{2 \\cdot m_2}{(m_2+m_1)} v_{2i}. (Eq. 8)}$",
null,
"Elastic Collision of Two Unequal Masses: In this animation, two unequal masses collide and recoil.\n\n## Elastic Collisions in Multiple Dimensions\n\nTo solve a two dimensional elastic collision problem, decompose the velocity components of the masses along perpendicular axes.\n\nlearning objectives\n\n• Construct an equation for elastic collision\n\n### Overview\n\nAs stated previously, there is conservation of total kinetic energy before and after an elastic collision. If an elastic collision occurs in two dimensions, the colliding masses can travel side to side after the collision (not just along the same line as in a one dimensional collision). The general approach to solving a two dimensional elastic collision problem is to choose a coordinate system in which the velocity components of the masses can be decomposed along perpendicular axes.\n\nCollisions in Multiple Dimensions: A brief introduction to problem solving of collisions in two dimensions using the law of conservation of momentum.\n\nExample $$\\PageIndex{1}$$:\n\nIn this example, we consider only point masses. These are structure-less particles that cannot spin or rotate. We will consider a case in which no outside forces are acting on the system, meaning that momentum is conserved. We will consider a situation in which one particle is initially at rest. This situation is illustrated in.",
null,
"Illustration of Elastic Collision in Two Dimensions: In this illustration, we see the initial and final configurations of two masses that undergo an elastic collision in two dimensions.\n\nBy defining the x-axis to be along the direction of the incoming particle, we save ourselves time in breaking that velocity vector into its x- and y- components. Now let us consider conservation of momentum in the x direction:\n\n$\\mathrm{p_{1x}+p_{2x}=p_{1x}′+p_{2x}′ (Eq. 1)}$\n\nIn Eq. 1, the initial momentum of the incoming particle is represented by $$\\mathrm{p_{1x}}$$, the initial momentum of the stationary particle is represented by $$\\mathrm{p_{2x}}$$, the final momentum of the incoming particle is represented by $$\\mathrm{p_{1x}'}$$. and the final momentum of the initially stationary particle is represented by $$\\mathrm{p_{2x}'}$$.\n\nWe can expand Eq. 1 by taking into account that momentum is equal to the product of mass and velocity. Also, we know that $$\\mathrm{p_{2x} = 0}$$ because the initial velocity of the stationary particle is 0.\n\nThe components of velocities along the x-axis have the form $$\\mathrm{v \\cdot \\cos θ}$$, where θ is the angle between the velocity vector of the particle of interest and the x-axis.\n\nTherefore:\n\n$\\mathrm{m_1v_1=m_1v_1′ \\cdot \\cos (θ_1)+m_2v'_2 \\cdot \\cos (θ_2) (Eq. 2)}$\n\nThe components of velocities along the y-axis have the form $$\\mathrm{v \\cdot \\sin θ}$$, where θ is the angle between the velocity vector of the particle of interest (denoted in the following equations by subscript 1 or 2) and the x-axis. We can apply conservation of momentum in the y-direction in a similar way to yield:\n\n$\\mathrm{0=m_1v_1' \\cdot \\sin (θ_1)+m_2v_2' \\cdot \\sin (θ_2) (Eq. 3)}$\n\nIn finding Eq. 3, it was taken into consideration that the incoming particle had no component of velocity along the y-axis.\n\n### Solving for Two Unknowns\n\nNow we have gotten to a point where we have two equations, this means that we can solve for any two unknowns that we want. We also know that because the collision is elastic that there must be conservation of kinetic energy before and after the collision. This means that we may also write Eq. 4, which gives us three equations to solve for three unknowns:\n\n$\\mathrm{\\dfrac{1}{2}m_1 \\cdot v_1^2+\\dfrac{1}{2}m_2 \\cdot v_2^2=\\dfrac{1}{2}m_1 \\cdot v_1′^2+ \\dfrac{1}{2}m_2 \\cdot v_2′^2}$\n\nThe general approach to finding the defining equations for an n-dimensional elastic collision problem is to apply conservation of momentum in each of the n- dimensions. You can generate an additional equation by utilizing conservation of kinetic energy.\n\n## Inelastic Collisions in One Dimension\n\nCollisions may be classified as either inelastic or elastic collisions based on how energy is conserved in the collision.\n\nlearning objectives\n\n• Distinguish examples of inelastic collision from elastic collisions\n\n### Overview\n\nIn an inelastic collision the total kinetic energy after the collision is not equal to the total kinetic energy before the collision. This is in contrast to an elastic collision in which conservation of total kinetic energy applies. While inelastic collisions may not conserve total kinetic energy, they do conserve total momentum.\n\n### Collisions\n\nIf two objects collide, there are many ways that kinetic energy can be transformed into other forms of energy. For example, in the collision of macroscopic bodies, some kinetic energy is turned into vibrational energy of the constituent atoms. This causes a heating effect and results in deformation of the bodies. Another example in which kinetic energy is transformed into another form of energy is when the molecules of a gas or liquid collide. When this happens, kinetic energy is often exchanged between the molecules’ translational motion and their internal degrees of freedom.\n\nA perfectly inelastic collision happens when the maximum amount of kinetic energy in a system is lost. In such a collision, the colliding particles stick together. The kinetic energy is used on the bonding energy of the two bodies.\n\n### Sliding Block Example\n\nLet us consider an example of a two-body sliding block system. The first block slides into the second (initially stationary block). In this perfectly inelastic collision, the first block bonds completely to the second block as shown. We assume that the surface over which the blocks slide has no friction. We also assume that there is no air resistance. If the surface had friction or if there was air resistance, one would have to account for the bodies’ momentum that would be transferred to the surface and/or air.",
null,
"Inelastic Collision: In this animation, one mass collides into another initially stationary mass in a perfectly inelastic collision.\n\nWriting about the equation for conservation of momentum, one finds:\n\n$\\mathrm{m_au_a+m_bu_b=(m_a+m_b)v}$\n\nwhere mais the mass of the incoming block, ua is the velocity of the incoming block, mbis the mass of the initially stationary block, ubis the velocity of initially stationary block (0 m/s), and v is the final velocity the two body system. Solving for the final velocity,\n\n$\\mathrm{v=\\dfrac{m_au_a+m_bu_b}{m_a+m_b}.}$\n\nTaking into account that the blocks have the same mass and that the one of the blocks is initially stationary, the expression for the final velocity of the system may be defined as:\n\n$\\mathrm{v=\\dfrac{u_a}{2}.}$\n\n## Inelastic Collisions in Multiple Dimensions\n\nWhile inelastic collisions may not conserve total kinetic energy, they do conserve total momentum.\n\nlearning objectives\n\n• Relate inelastic collision multiple dimension equations to the one dimension collisions you learned earlier\n\nAt this point we will expand our discussion of inelastic collisions in one dimension to inelastic collisions in multiple dimensions. It is still true that the total kinetic energy after the collision is not equal to the total kinetic energy before the collision. While inelastic collisions may not conserve total kinetic energy, they do conserve total momentum.\n\nExample $$\\PageIndex{2}$$:\n\nExamples of Collisions\n\nWe will consider an example problem, illustrated in, in which one mass (m1m1) slides over a frictionless surface into another initially stationary mass (m2m2). Air resistance will be neglected. The following quantities are known:",
null,
"Collision Example: This illustrates the example problem in which one mass collides into another mass that is initially stationary.\n\n\\begin{align} \\mathrm{m_1} & \\mathrm{=0.250kg,} \\\\ \\mathrm{m_2} & \\mathrm{=0.400kg,} \\\\ \\mathrm{v_1} & \\mathrm{=2.00m/s,} \\\\ \\mathrm{v_1′}& \\mathrm{=1.50m/s,} \\\\ \\mathrm{v_2}& \\mathrm{=0m/s,} \\\\ \\mathrm{θ_1′} & \\mathrm{=45.0∘,} \\end{align}\n\nwhere v1v1 is the initial velocity of the first mass, v′1v1′ is the final velocity of the first mass, v2v2is the initial velocity of the second mass, and θ′1θ1′ is the angle between the velocity vector of the first mass and the x-axis.\n\nThe object is to calculate the magnitude and direction of the velocity of the second mass. After this, we will calculate whether this collision was inelastic or not.\n\nSince there are no net forces at work (frictionless surface and negligible air resistance), there must be conservation of total momentum for the two masses. Momentum is equal to the product of mass and velocity. The (initially) stationary mass contributes no initial momentum. The components of velocities along the x-axis have the form v⋅cosθv⋅cosθ, where θ is the angle between the velocity vector of the mass of interest and the x-axis.\n\nExpressing these things mathematically:\n\n$\\mathrm{m_1v_1=m_1v_1′ \\cdot \\cos (θ_1)+m_2v‘_2 \\cdot \\cos (θ_2). (Eq. 2)}$\n\nThe components of velocities along the y-axis have the form $$\\mathrm{v \\cdot \\sin θ}$$, where θ is the angle between the velocity vector of the mass of interest and the x-axis. By applying conservation of momentum in the y-direction we find:\n\n$\\mathrm{0=m_1v_1′ \\cdot \\sin (θ_1)+m_2v‘_2 \\cdot \\sin (θ_2). (Eq. 3)}$\n\nIf we divide Eq. 3 by Eq. 2, we will find:\n\n$\\mathrm{ \\tan θ_2=\\dfrac{v_1′ \\cdot \\sin θ_1}{v_1′ \\cos θθ_1−v_1} (Eq. 4) }$\n\nEq. 4 can then be solved to find $$\\mathrm{θ_2}$$approx. 312º.\n\nNow let’ use Eq. 3 to solve for $$\\mathrm{v′_2}$$. Re-arranging Eq. 3, we find:\n\n$\\mathrm{v_2′=\\dfrac{−m_1v_1′ \\cdot \\sin θ_1}{ m_2 \\cdot \\sin θ_2.}}$\n\nAfter plugging in our known values, we find that $$\\mathrm{v_2′=0.886m/s}$$.\n\nWe can now calculate the initial and final kinetic energy of the system to see if it the same.\n\n\\begin{align} \\mathrm{Initial \\; Kinetic \\; Energy} & \\mathrm{ =\\frac{1}{2}m_1 \\cdot v_1^2+\\frac{1}{2}m_2 \\cdot v_2^2=0.5J.} \\\\ \\mathrm{Final \\; Kinetic \\; Energy} & \\mathrm{= \\frac{1}{2}m_1 \\cdot v_1′^2+\\frac{1}{2}m_2 \\cdot v_2′^2≈0.43J.} \\end{align}\n\nAs these values are not the same, we know this was an inelastic collision.\n\n## Key Points\n\n• In an inelastic collision the total kinetic energy after the collision is not equal to the total kinetic energy before the collision.\n• If there are no net forces at work (collision takes place on a frictionless surface and there is negligible air resistance ), there must be conservation of total momentum for the two masses.\n• The variable θ is the angle between the velocity vector of the mass of interest and the x-axis in traditional Cartesian coordinate systems.\n• Collision is short duration interaction between two bodies or more than two bodies simultaneously causing change in motion of bodies involved due to internal forces acted between them during this.\n• Collisions can either be elastic, meaning they conserve both momentum and kinetic energy, or inelastic, meaning they conserve momentum but not kinetic energy.\n• When dealing with an incident body that is nearly parallel to a surface, it is sometimes more useful to refer to the angle between the body and the surface, rather than that between the body and the surface normal.\n• An elastic collision will not occur if kinetic energy is converted into other forms of energy.\n• While molecules do not undergo elastic collisions, atoms often undergo elastic collisions when they collide.\n• If two particles are involved in an elastic collision, the velocity of the first particle after collision can be expressed as: $$\\mathrm{v_{1f}=\\frac{(m_1−m_2)}{(m_2+m_1)}v_{1i}+ \\frac{2 \\cdot m_2}{(m_2+m_1)}v_{2i}.}$$\n• If two particles are involved in an elastic collision, the velocity of the second particle after collision can be expressed as: $$\\mathrm{v_{2f}=\\frac{2 \\cdot m_1}{(m_2+m_1)}v_{1i}+\\frac{(m_2−m_1)}{(m_2+m_1)}v_{2i}.}$$\n• If an elastic collision occurs in two dimensions, the colliding masses can travel side to side after the collision.\n• By defining the x- axis to be along the direction of the incoming particle, we can simplify the defining equations.\n• The general approach to finding the defining equations for an n-dimensional elastic collision problem is to apply conservation of momentum in each of the n- dimensions. You can generate an additional equation by utilizing conservation of kinetic energy.\n• In an inelastic collision, the total kinetic energy after the collision is not equal to the total kinetic energy before the collision.\n• While inelastic collisions may not conserve total kinetic energy, they do conserve total momentum.\n• A perfectly inelastic collision happens when the maximum amount of kinetic energy in a system is lost.\n• In an inelastic collision the total kinetic energy after the collision is not equal to the total kinetic energy before the collision.\n• If there are no net forces at work (i.e., collision takes place on a frictionless surface and there is negligible air resistance ), there must be conservation of total momentum for the two masses.\n• The variable θ is the angle between the velocity vector of the mass of interest and the x-axis in traditional Cartesian coordinate systems.\n\n## Key Terms\n\n• kinetic energy: The energy possessed by an object because of its motion, equal to one half the mass of the body times the square of its velocity.\n• momentum: (of a body in motion) the product of its mass and velocity.\n• force: A physical quantity that denotes ability to push, pull, twist or accelerate a body which is measured in a unit dimensioned in mass × distance/time² (ML/T²): SI: newton (N); CGS: dyne (dyn)\n• elastic collision: An encounter between two bodies in which the total kinetic energy of the two bodies after the encounter is equal to their total kinetic energy before the encounter. Elastic collisions occur only if there is no net conversion of kinetic energy into other forms.\n• dimension: A measure of spatial extent in a particular direction, such as height, width or breadth, or depth.\n• degrees of freedom: A degree of freedom is an independent physical parameter, often called a dimension, in the formal description of the state of a physical system. The set of all dimensions of a system is known as a phase space.\n• friction: A force that resists the relative motion or tendency to such motion of two bodies in contact."
] | [
null,
"https://phys.libretexts.org/@api/deki/files/11744/figure-09-06-03a.jpeg",
null,
"https://phys.libretexts.org/@api/deki/files/11745/deflection.png",
null,
"https://phys.libretexts.org/@api/deki/files/11746/elastischer-sto-c3-9f3.gif",
null,
"https://phys.libretexts.org/@api/deki/files/11747/figure-09-06-02a.jpeg",
null,
"https://phys.libretexts.org/@api/deki/files/11748/inelastischer-sto-c3-9f.gif",
null,
"https://phys.libretexts.org/@api/deki/files/11744/figure-09-06-03a.jpeg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.81766415,"math_prob":0.9975156,"size":32192,"snap":"2021-43-2021-49","text_gpt3_token_len":8402,"char_repetition_ratio":0.1797875,"word_repetition_ratio":0.5041657,"special_character_ratio":0.25164637,"punctuation_ratio":0.15996058,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995401,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-20T04:46:35Z\",\"WARC-Record-ID\":\"<urn:uuid:a14cc66e-d517-45b3-ae1d-641ca89965d1>\",\"Content-Length\":\"157256\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ce25df04-1ef3-4225-b637-1506d46400f7>\",\"WARC-Concurrent-To\":\"<urn:uuid:e79e66ab-4cd8-4e1e-82b0-fc7be0763998>\",\"WARC-IP-Address\":\"13.249.38.111\",\"WARC-Target-URI\":\"https://phys.libretexts.org/Courses/Joliet_Junior_College/Physics_201_-_Fall_2019v2/Book%3A_Custom_Physics_textbook_for_JJC/09%3A_Linear_Momentum_and_Collisions/9.16%3A_Collisions\",\"WARC-Payload-Digest\":\"sha1:NXAXROV7DJHYACVJXORFO6YPJ63I3NLV\",\"WARC-Block-Digest\":\"sha1:Y33W3IE4SBQQBTMHI75YF6KWFL3RK7TG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585302.56_warc_CC-MAIN-20211020024111-20211020054111-00300.warc.gz\"}"} |
https://www.physicsforums.com/threads/a-test-for-a-superluminal-neutrino.1007824/ | [
"# A test for a superluminal neutrino?\n\n• I\nSummary:\nAn interplanetary test.\nThe neutrino has been puzzling since its proposal and its experimental confirmation.\nThere have been experimental anomalies with it for every experiment designed to test it.\n\nOne fact that might be quite key is that measurements of the mass-square of the neutrino has consistently shown it to have a negative mass-square:\n\nWhy is the square of the neutrino mass negative?\nIn arXiv:hep-ph/0009291 this is explained by giving the example of:\n\nm2 = -2.5 +- 3.3eV2.\n\n\"The negative value of the neutrino mass-square simply means:\"\n\nE2/c2 -p2 = m2c2 < 0,\n\nhttps://physics.stackexchange.com/questions/578556/why-is-the-square-of-the-neutrino-mass-negative\n\nThis has led to speculation the neutrino may be a tachyon. Another unusual fact about it is that its cross section gets larger at higher energies and smaller at lower energies. And with a tachyon, in contrast to a bradyon, higher energy means it is going slower, and lower energies means it going faster. This would explain why it would be harder to interact with at the lower energies.\n\nHowever, with the unfortunate mistake at the OPERA experiment where is was offered a superluminal neutrino to explain an experimental anomaly, any such claim needs to have overwhelming support to confirm it.\n\nI was thinking of having the neutrino travel through the Earth and be detected on the other side. However, even at the speed of light the travel time would be quite short and given the difficulty of detecting the neutrino it would be difficult to get the timing accurate enough to make sure the detection was above background.\n\nThen I wanted a longer travel time. Could we have an accelerator generated neutrino pulse be aimed at the Moon or Mars or Venus, and look for the neutrinos scattered back to be captured here on Earth? Because of the low cross-section it would have to be an extremely dense beam to have enough particles to bounce back to be detectable.\n\nRobert Clark\n\n•",
null,
"weirdoguy and PeroK\n\nStaff Emeritus\nThis is a misconception built on other misconceptions.\n\nFrom your last thread, it's clear that - at best - you think we know no more than we did two decades ago. A good starting point might be to catch up before deciding you know how to do neutrino experiments better than the neutrino experimenters.\n\n•",
null,
"russ_watters, vanhees71, ohwilleke and 2 others\nphinds\nGold Member\nSummary:: An interplanetary test.\n\nThe neutrino has been puzzling since its proposal and its experimental confirmation.\nThere have been experimental anomalies with it for every experiment designed to test it.\nAs @Vanadium 50 pointed out, you REALLY need to do a lot more reading to avoid making incorrect statements..\n\n•",
null,
"vanhees71 and RobertGC\nohwilleke\nGold Member\nWhy is the square of the neutrino mass negative?\nIn arXiv:hep-ph/0009291 this is explained by giving the example of:\n\nm2 = -2.5 +- 3.3eV2.\n\n\"The negative value of the neutrino mass-square simply means:\"\n\nE2/c2 -p2 = m2c2 < 0,\n\nhttps://physics.stackexchange.com/questions/578556/why-is-the-square-of-the-neutrino-mass-negative\nYour post is based upon a false premise rooted in a misunderstanding of a somewhat confusing form of notation that does not have the physical implications that you suggest.\n\nThe article you cite to doesn't mean what your post suggests that it does.\n\nThe result cited is simply a consequence of providing a result in the form of a Gaussian uncertainty (i.e. an uncertainty described in a manner that implicitly assumes that the uncertainty is distributed in a \"normal' distribution) in circumstances that are strictly beyond the scope of applicability of Gaussian probability and statistics stated in that form, because we are sure that this isn't the true shape of the probability distribution.\n\nWe know that the true probability distribution is almost surely non-Gaussian (i.e. not distributed in the shape of a \"normal\" probability curve), because the experimental data strongly suggests that the probability distribution of the underlying quantity being measured is heavily concentrated on the lower floor of the probability distribution, even if it is a little bit lazy to do so. The physicists do this because they are trying to shoehorn their results into the format of a normal probability distribution because it is their custom and habit to do so.\n\nIf the authors wanted to be really rigorous and mathematically pedantic in their report of their results, they would have reported the probability in a manner consistent with a lower bound of zero for the neutrino mass, because the experimental methods used do not have, and do not purport to have, a way to identify a true imaginary neutrino mass, or superluminal neutrino.\n\nIn other words, their experimental result (considered in isolation without joint analysis with other experimental data, and rounding to avoid the impression of spurious accuracy) is consistent with:\n\n* a roughly 74% probability that the neutrino mass is between 0.0 and 0.05 eV/c2 (i.e. the minimum possible mass value that is indistinguishable from zero by this experiment given its limited precision, as distinguished from its accuracy);\n* a roughly 10% probability (i.e. distinguishable from zero with the precision of the experiment but less than one sigma higher than expected) that the neutrino mass is between 0.05 eV/c2 and 0.9 eV/c2;\n* a roughly 13.5% probability (i.e. more than one sigma but less than two sigma higher than expected) that the neutrino mass is between 0.9 eV/c2 and 2.0 eV/c2; and\n* a roughly 2.5% probability (i.e. more than two sigma higher than expected) that the neutrino mass is more than 2.0 eV/c2.\nObviously, these percentages are rounded. These rough estimates also ignore some small correction factors that imply that the 74% figure is actually slightly low, and the 10% figure is actually slightly high. If I did the mathematics with full rigor, the percentages, rounded to the closest full percentage point, would be closer to 75% and 9%.\n\nThese inaccuracies are still smaller than the inaccuracies associated with assuming a Gaussian distribution, rather than fitting the data to a more reasonable probability distribution with a zero bound.\n\nBut, ultimately, as long as the trained scientists are aware that their results are being reported in a slightly unrigorous manner so that they don't try to use the results inappropriately in a manner beyond the range of applicability, and so long as everyone reports their results in a manner consistent with this Gaussian error convention, everything works out. Physicists can still make apples to apples comparisons can be made between the results of different experiments, and this isn't a serious problem.\n\nWe know from other lines of evidence (mostly cosmology corroborated by neutrino oscillation data and a certain amount of physics intuition) that the true value of the smallest neutrino mass eigenstate is realistically probably less than 0.012 eV/c2, and quite likely less than 0.001 eV/c2, which is a value indistinguishable from zero in the experimental results cited.\n\nSo, it makes sense that the probability distribution of possible neutrino masses consistent with the experimental result should be concentrated near the floor of that distribution. Indeed, this result is just what we would expect for a reality as we think it is likely to be, reported in this somewhat quirky method preferred by physicists.\n\nBut, a concentration of probabilities near a lower bound in an experiment like this one would imply, contrary to the implied statement made by citing the result in this fashion, that the distribution of uncertainty in probability given the experimental data is not distributions in a Gaussian \"normal\" distribution, and is instead concentrated at the lower tail of the distribution. So, taken overly literally, the results would suggest and absurd result which is inconsistent with what the experiment actually determined.\n\nIf the probability distribution of the neutrino mass that the experimental results suggest were Gaussian, it would look like:",
null,
"But, in fact, the neutrino mass probability distribution implied by these experimental results has a very high peak near zero and goes steadily downward towards the right as the neutrino mass values implied by the experiment get larger.\n\nThe real probability distribution of the neutrino mass implied by this experiment looks closer to the green line in the image below, only even more steeply peaked near zero (with the red line peaking at a z= -0.65 value on the z score normalized image below):",
null,
"Notwithstanding this contradiction, it is customary for physicists to refrain from using that level of rigor, and to instead express their experimentally results in the somewhat inartful manner quoted in your original post in this thread.\n\nRather than having any profound meaning, it is simply a matter of a somewhat sloppy notation convention that the physicists have adopted on a widespread basis, because it is convenient and saves a lot of tedious rote statistical analysis that adds little of substance of the basic conclusion.\n\nThis convention of using a Gaussian error format to report values to which a continuous Gaussian probability distribution doesn't apply is widespread in physics, both in other aspects of neutrino physics and in other subfields of physics.\n\nAnother Example Of This Form Of Mathematically Non-Rigorous Gaussian Notation\n\nSimilarly, for example, the experimental evidence regarding the number of active Standard Model neutrinos is quoted by the Particle Data Group as 2.996 ± 0.007, even though the quantity described is inherently defined such that it must be either zero or a positive integer.\n\nThis simply means that the best fit value of the number of active Standard Model neutrino types to the experimental results is exactly three, that experimental result is closer to exactly three than a researcher would expect from random chance, although not dramatically so, that the probability that there are two or fewer such types is more than 142 standard deviations away from the best fit value if the experimental uncertainty has been accurately approximated, and that the probability that there are four or more such types is more than 143 standard deviations away from the best fit value if the experimental uncertainty has been accurately approximated.\n\nThus, the experimental results is consistent with the theoretically predicted value and may overstate the magnitude of the systemic error in the experiment somewhat, and the probability that the experimental results observed could be other than exactly three consistent with the experimental data collected is so negligibly small that it is essentially indistinguishable from zero.\n\nLast edited:\n•",
null,
"russ_watters and vanhees71\nmfb\nMentor\nThe first post is so full of misconceptions and wrong statements that this thread doesn't have a chance to go anywhere useful.\n\n•",
null,
""
] | [
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"https://www.physicsforums.com/attachments/1633566328911-png.290305/",
null,
"https://www.physicsforums.com/attachments/1633566514121-png.290306/",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.94906837,"math_prob":0.9016782,"size":3795,"snap":"2021-43-2021-49","text_gpt3_token_len":839,"char_repetition_ratio":0.12714323,"word_repetition_ratio":0.95345104,"special_character_ratio":0.21291173,"punctuation_ratio":0.087016575,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9858903,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,2,null,2,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-04T22:03:19Z\",\"WARC-Record-ID\":\"<urn:uuid:dfbee28e-0b49-4d34-b3a8-7deee0727fcb>\",\"Content-Length\":\"90013\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9ccad40-2861-4d80-8f12-bbdcdc7624b8>\",\"WARC-Concurrent-To\":\"<urn:uuid:2a431bf6-75b2-4fbc-82b2-0aa54793907a>\",\"WARC-IP-Address\":\"104.26.15.132\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/a-test-for-a-superluminal-neutrino.1007824/\",\"WARC-Payload-Digest\":\"sha1:DJY3PKZNHXTMND6QXB446OWP5AQIBE4Q\",\"WARC-Block-Digest\":\"sha1:QTZD7IRRXOLHMULXRABNUHU2P5H5RNXZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363125.46_warc_CC-MAIN-20211204215252-20211205005252-00118.warc.gz\"}"} |
http://manpages.ubuntu.com/manpages/precise/man3/slabad.3lapack.html | [
"Provided by: liblapack-doc_3.3.1-1_all",
null,
"#### NAME\n\n``` LAPACK-3 - takes a input the values computed by SLAMCH for underflow and overflow, and\nreturns the square root of each of these values if the log of LARGE is sufficiently large\n\n```\n\n#### SYNOPSIS\n\n``` SUBROUTINE SLABAD( SMALL, LARGE )\n\nREAL LARGE, SMALL\n\n```\n\n#### PURPOSE\n\n``` SLABAD takes as input the values computed by SLAMCH for underflow and overflow, and\nreturns the square root of each of these values if the log of LARGE is sufficiently large.\nThis subroutine is intended to\nidentify machines with a large exponent range, such as the Crays, and\nredefine the underflow and overflow limits to be the square roots of\nthe values computed by SLAMCH. This subroutine is needed because\nSLAMCH does not compensate for poor arithmetic in the upper half of\nthe exponent range, as is found on a Cray.\n\n```\n\n#### ARGUMENTS\n\n``` SMALL (input/output) REAL\nOn entry, the underflow threshold as computed by SLAMCH.\nOn exit, if LOG10(LARGE) is sufficiently large, the square\nroot of SMALL, otherwise unchanged.\n\nLARGE (input/output) REAL\nOn entry, the overflow threshold as computed by SLAMCH.\nOn exit, if LOG10(LARGE) is sufficiently large, the square\nroot of LARGE, otherwise unchanged.\n\nLAPACK auxiliary routine (version 3.2) April 2011 SLABAD(3lapack)\n```"
] | [
null,
"http://manpages.ubuntu.com/img/bug.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8625113,"math_prob":0.918062,"size":1241,"snap":"2019-43-2019-47","text_gpt3_token_len":305,"char_repetition_ratio":0.1293452,"word_repetition_ratio":0.371134,"special_character_ratio":0.21031426,"punctuation_ratio":0.11158799,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95501584,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-18T00:44:07Z\",\"WARC-Record-ID\":\"<urn:uuid:860ebabf-33f2-458b-a057-7a86ebd4b51d>\",\"Content-Length\":\"6155\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1284382a-757c-4714-af1e-432403ce1ff5>\",\"WARC-Concurrent-To\":\"<urn:uuid:f9fc2512-20ec-4894-ab04-5e9ca8b50cbf>\",\"WARC-IP-Address\":\"91.189.95.15\",\"WARC-Target-URI\":\"http://manpages.ubuntu.com/manpages/precise/man3/slabad.3lapack.html\",\"WARC-Payload-Digest\":\"sha1:3WZ3UZ53BW64HSEYHVR2GV2KN664SXU2\",\"WARC-Block-Digest\":\"sha1:SASSTPUC45IH6BUDPFFTTNRNNOSH6CB2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496669422.96_warc_CC-MAIN-20191118002911-20191118030911-00346.warc.gz\"}"} |
https://arxiv.org/abs/1510.03764 | [
"hep-ex\n\n# Title:Search for anomalous couplings in the $Wtb$ vertex from the measurement of double differential angular decay rates of single top quarks produced in the $t$-channel with the ATLAS detector\n\nAbstract: The electroweak production and subsequent decay of single top quarks is determined by the properties of the $Wtb$ vertex. This vertex can be described by the complex parameters of an effective Lagrangian. An analysis of angular distributions of the decay products of single top quarks produced in the $t$-channel constrains these parameters simultaneously. The analysis described in this paper uses 4.6 fb$^{-1}$ of proton-proton collision data at $\\sqrt{s}$ = 7 TeV collected with the ATLAS detector at the LHC.Two parameters are measured simultaneously in this analysis. The fraction $f_1$ of decays containing transversely polarised $W$ bosons is measured to be $0.37 \\pm 0.07$ (stat.$\\oplus$syst.). The phase $\\delta_{-}$ between amplitudes for transversely and longitudinally polarised $W$ bosons recoiling against left-handed $b$-quarks is measured to be $-0.14\\pi \\pm 0.036\\pi$ (stat.$\\oplus$syst.).The correlation in the measurement of these parameters is $0.15$. These values result in two-dimensional limits at the 95% confidence level on the ratio of the complex coupling parameters $g_\\mathrm{R}$ and $V_\\mathrm{L}$, yielding Re [$g_\\mathrm{R}/V_\\mathrm{L}$] $\\in [-0.36,0.10]$ and Im [$g_\\mathrm{R}/V_\\mathrm{L}$] $\\in [-0.17,0.23]$ with a correlation of 0.11. The results are in good agreement with the predictions of the Standard Model.\n Comments: 26 pages plus author list + cover pages (42 pages total), 8 figures, 2 tables, submitted to JHEP, All figures including auxiliary figures are available at this https URL Subjects: High Energy Physics - Experiment (hep-ex) Journal reference: JHEP 04 (2016) 023 DOI: 10.1007/JHEP04(2016)023 Report number: CERN-PH-EP-2015-236 Cite as: arXiv:1510.03764 [hep-ex] (or arXiv:1510.03764v2 [hep-ex] for this version)\n\n## Submission history\n\nFrom: Atlas Publications [view email]\n[v1] Tue, 13 Oct 2015 16:25:21 UTC (822 KB)\n[v2] Mon, 11 Apr 2016 14:37:28 UTC (821 KB)"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.75721055,"math_prob":0.97140276,"size":1869,"snap":"2019-26-2019-30","text_gpt3_token_len":510,"char_repetition_ratio":0.10348526,"word_repetition_ratio":0.03041825,"special_character_ratio":0.2814339,"punctuation_ratio":0.115492955,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9795205,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-21T03:17:13Z\",\"WARC-Record-ID\":\"<urn:uuid:1098adc1-d5c3-4fef-ac5a-369a347a9a3d>\",\"Content-Length\":\"20569\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c544c145-08b2-4b05-8127-daf026d8ed89>\",\"WARC-Concurrent-To\":\"<urn:uuid:701eaad8-66ac-4d77-ba79-191992ed3f7e>\",\"WARC-IP-Address\":\"128.84.21.199\",\"WARC-Target-URI\":\"https://arxiv.org/abs/1510.03764\",\"WARC-Payload-Digest\":\"sha1:H2L3RWGLDILBFG7O4JVGKDM4PUXVI7JH\",\"WARC-Block-Digest\":\"sha1:XRRWXH25RAJM5F3ZD22YJOWVQ5G76L4A\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195526818.17_warc_CC-MAIN-20190721020230-20190721042230-00201.warc.gz\"}"} |
https://www.hashrateindex.com/blog/energy-consumption-to-hashrate | [
"Published: 2019-12-14\n\n## Energy Consumption (kWh) to Hashrate (PH/s) Guide for Bitcoin Mining\n\nIf you had a 3MW facility could you host 1,000 Bitmain Antminer T17+’s, and how much PH/second would that give you in hashing power?\n\nSurprisingly, its not always the easiest to formulate in your head. So we put together a guide to help you through the process.\n\n### Breaking Down Watts -> kWh -> J/TH -> Hashrate\n\n#### Wattage (W)\n\nA watt is a unit of power.\n\nPower is a measure of the rate at which energy flows. Watts are a similar measurement to kilometers-per-hour as they indicate how fast electrons are travelling. One watt is equivalent to electricity flowing at a rate of one joule per second in the metric system.\n\nSometimes total watts are also referenced as Consumption or Reference** **Power on Wall on platforms that are selling ASICs.\n\n#### KiloWatt-Hour (kWh)\n\nkWh is a measure of energy (Involves Power &Time).\n\nEnergy is defined as the capacity to do work, such as hashing (mining). If you run a 3,000-watt Antminer T17+ for one hour, you’ve used 3,000 watt-hours, or 3.0 kWh. In other words, 3.0 kWh is the amount of energy you need to run a T17+ for an hour.\n\nUsually the ASICs specs come with a +/- 10% and seem to get overclocked their reported energy consumption pretty easily. So if a T17+ says it consumes 3.0 it will likely go considerably higher. For simplicity lets assume no overclocking.",
null,
"Specs from the Bitmain Antminer S17+ Released Dec 2019Almost every time you hear a miner talking about their cost they are referencing the electricity cost for a kWh. So if they say “I have 4 cent power” what they mean is they pay the electricity company (or hosting facility) 4 cents USD per kWh.\n\nOn a per month basis that would be:\n\n(\\$0.04 USD per kWh) x (24 hours/day) x (30.42 day/month ) = ~\\$30 of cost per month per kWhSo to get the price of hosting a T17+ for a month just multiply its kWh (3.0) by that total (\\$30) to get \\$90 USD/Month\n\n#### MegaWatt (MW)\n\nThe term megawatt is usually used by a farm or colocation operator to describe how large their mining operations are.\n\nA 1 MegaWatt farm, running at 100% capacity generates 1,000,000 watts of power per hour (or 1,000 kW/h). So the plant produces 365 x 24 x 1 MegaWatt hours of total power a year.\n\nHowever a 100% load factor is not feasible for an operation as the breakers and wires can’t usually take a continuous load. Around 80% capacity factor is more realistic.\n\nSo a 1MW farm can power up to 800kWh. If each S17+ is 3kWh then the farm can host 267 machines.",
null,
"2.5MW Transformer Being Placed Outside a Farm#### Hashing Power\n\nA hash is the output of a hash function. Hash rate is the speed at which a computer is completing an operation in the cryptocurrency’s code. Hashrate is measured in hashes per second. A higher hashrate increases a miner’s opportunity of finding the next block and receiving the block reward.\n\nIf you join a PPS pool, your payout (i.e. Revenue) is dependant on your hashrate.\n\nA terahash (TH) is equal to one trillion (1,000,000,000,000) hashes per second.\n\n#### Miner Efficiency\n\nNow is when things get a bit thicker so put on your math hat.\n\nThe efficiency of an ASIC is one of the most important specs when considering a purchase. It is essentially how many shares (revenue) can the machine produce per unit of energy (cost). So this should give you a rough sense of profitability differences when comparing ASICs\n\nThe T17+ has a reference power efficiency on wall of 44.0 J/TH (at @25°C). And if you remember our watt calculation from above 1 Watt = 1 Joule per second.\n\nSo to get to kWh per TH, the calculation for a T17+ is:\n\n[44 Joules / (60 seconds x 60 minutes)] / (1000 Watts/kW) = 0.000012222 kWh / TH.So at an electricity price of \\$0.04 kWH (referenced above) a miner would be paying \\$0.0000004889 a TH.\n\nAnd as a proof, if you multiply that cost by the stated TH/s of the ASIC (73) and by seconds in a month (60 x 60 x 24 x 30.42) and by the kWh of the machine (3.0) you should get back to the monthly hosting cost.\n\n\\$0.0000004889 a TH x (73TH/s) x (60 x 60 x 24 x 30.42) / (3.0kWh) = \\$30#### Conclusion\n\nSo a 1MW farm can power 267 machines, each machine produce 73TH/s which will contribute a total of ~20PH.\n\n#### Hash Rate Calculations:\n\n• 1 kilo hash per second is one thousand (1,000) hashes per second\n• 1 mega hash per second is one million (1,000,000) hashes per second.\n• 1 giga hash per second is one billion (1,000,000,000) hashes per second.\n• 1 tera hash per second is one trillion (1,000,000,000,000) hashes per second.\n• 1 peta hash per second is one quadrillion (1,000,000,000,000,000) hashes per second.\n• 1 exa hash per second is one quintillion (1,000,000,000,000,000,000) hashes per second.\n\n#### Power Calculations:\n\n• 1 kilowatt is one thousand (1,000) watts\n• 1 megawatt is one million (1,000,000) watts\n• 1 gigawatt is one billion (1,000,000,000) watts",
null,
"Ethan Vera\nCFO & Cofounder at Luxor Mining\n\n## .css-txu928{color:var(--theme-ui-colors-white,#fff);}Hashrate Update\n\nGet the latest on hashrate and Bitcoin mining, in your inbox every other week. No spam. Unsubscribe anytime."
] | [
null,
"https://www.hashrateindex.com/static/blog/1*39pwymkfnDCBX_gpsaD_-Q.png",
null,
"https://www.hashrateindex.com/static/blog/1*F-_-nBRFC6juV7o1bx_Qdg.jpeg",
null,
"https://hashrateindex.b-cdn.net/_next/static/chunks/images/ethan-7472db658967f14f53b0e142191d2ec1.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9226041,"math_prob":0.9770717,"size":3973,"snap":"2021-21-2021-25","text_gpt3_token_len":1052,"char_repetition_ratio":0.0866717,"word_repetition_ratio":0.0137551585,"special_character_ratio":0.28467155,"punctuation_ratio":0.094228506,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.976008,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,2,null,2,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-17T05:45:48Z\",\"WARC-Record-ID\":\"<urn:uuid:0be01923-bf3a-421c-9400-e5472c7c2459>\",\"Content-Length\":\"71548\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:09023529-0c03-4f18-b6b2-1d12f4a92bfa>\",\"WARC-Concurrent-To\":\"<urn:uuid:41b755e1-7220-4233-a2c1-ec9130f241da>\",\"WARC-IP-Address\":\"49.12.125.81\",\"WARC-Target-URI\":\"https://www.hashrateindex.com/blog/energy-consumption-to-hashrate\",\"WARC-Payload-Digest\":\"sha1:GYVUQEHDTY2ZVAOEXM337I52XJBJA4UB\",\"WARC-Block-Digest\":\"sha1:C4L6QLSEHZDWV4SZJINKVBDMCIURUWG6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487629209.28_warc_CC-MAIN-20210617041347-20210617071347-00215.warc.gz\"}"} |
http://www.mahome.in/ezcche/viewtopic.php?77ff12=quantum-hall-conductance-problem | [
"Black Shoulder Bag Zara, Down East Spas For Sale, Can In Asl, Munich Foreigners Office Contact, What Did Johnny Appleseed Look Like, Benson County Az, Metal Cactus Yard Art Wholesale, \" /> Black Shoulder Bag Zara, Down East Spas For Sale, Can In Asl, Munich Foreigners Office Contact, What Did Johnny Appleseed Look Like, Benson County Az, Metal Cactus Yard Art Wholesale, \" />\n\n# quantum hall conductance problem\n\nin cases where configuration space is multiply connected. 2. We assume that the chemical potential is in between two Landau levels at positive energies, shown by the dashed line in Fig. ... From the current formula, we find the quantized Hall conductance. In this paper we take into account the lattice, and perform an exact diagonalization of the Landau problem on the hexagonal lattice. Prior work assumed that this behavior, which explains the global properties of quantum Hall conductance, also explains the properties present at a local level. For an \"ideal\" quantum point contact Neigenvalues are equal to 1 and all others are equal to 0. multiple connectivity can be motivated, to some extent, by the average of the Hall conductance. The fractional quantum Hall effect is a variation of the classical Hall effect that occurs when a metal is exposed to a magnetic field. For every popular list of unsolved problems, there are scholars and students dreaming of -- and working towards -- solving the puzzles they contain. In Spyridon Michalakis (T-4/CNLS LANL) The Quantum Hall Conductance: A rigorous proof of quantization August 17th, 2010 13 / 26. By performing a Lorentz boost, we obtain Hall’s conductivity in the case of crossed electric and magnetic fields. 21. In the wacky world of topology, a donut can be stretched until it becomes a coffee cup. Then my question: It's as if somehow electrons themselves were being split up into smaller particles, each carrying a fraction of the electron's charge,\" the news release notes. Conductance quantization and quantum Hall effect Seminar ADVISER: Professor Anton Ramˇsak Ljubljana, 2004. problem of the two length scales in the problem, the magnetic length and the lattice spacing. \"The Hall conductance, it turns out, is equal to the number of times that path winds around the topological features of the mathematical shape describing the quantum Hall system,\" Michalakis noted. The effect is measured with very high precision (of the order of 10−8) and allows The researchers now understand why the Hall conductance is an integer multiple and why impurities don't prevent the conductance from occurring. Pichard eds., North Holland (1995). instructive to look at the tional quantum Hall phase with n = 5/2 in gallium arsenide samples is non-Abelian. free, but in general it does not. By this technique the quantization of the conductance is made explicit, but it is not obvious that the result is insensitive to boundary conditions. Possible origins of Nightingale and M.den Nijs, Phys. \"In this effect, changes in the magnetic field result in changes in what is known as Hall conductance that vary in steps of whole-number multiples of a constant,\" the Nobel Prize website notes. A Brief History, 1879-1984 2 II. decided to study the Hall conductance under extreme conditions -- those involving even lower temperatures and higher strength magnetic fields -- \"the Hall conductance was quantized in fractional multiples of what had been previously observed. , Magneto-oscillatory Conductance in Silicon Surfaces, Phys. As the gate voltage defining the constriction is made less negative, the width of the point contact increases continuously, but the number of propagating modes at the Fermi level increases stepwise. Quantum anomalous Hall effect has been observed in magnetically doped topological insulators. the averaging. J. Bellissard A. van Elst and H. Shultz-Baldes. In the years following von Klitzing's experiment, when researchers decided to study the Hall conductance under extreme conditions -- those involving even lower temperatures and higher strength magnetic fields -- \"the Hall conductance was quantized in fractional multiples of what had been previously observed. For the lattice fermions, the Hall conductance of the system is expressed in terms of two different topological invariants. Abstract The purpose of this seminar is to present the phenomena of conductance quan-tization and of the quantum Hall effect. Spiros Michalakis and Matthew Hastings solve a lingering mathematical physics problem with implications for quantum physics as a whole. associated with the ground state of the quantum Hamiltonian. the quantum Hall e ect when the problem was posed in 1999. This framework applies to a rather general class of quantum Schrodinger Hamiltonians, including … This is a sequel to Ref. from the one particle Schrodinger Hamiltonian of the system. The theorem and the proof Outline of proof - II"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91260433,"math_prob":0.93995017,"size":4896,"snap":"2021-04-2021-17","text_gpt3_token_len":1057,"char_repetition_ratio":0.13491414,"word_repetition_ratio":0.14766839,"special_character_ratio":0.19669117,"punctuation_ratio":0.11111111,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9527524,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-21T03:54:29Z\",\"WARC-Record-ID\":\"<urn:uuid:8a7f197d-ddcc-4812-b14c-2a38ff16b98a>\",\"Content-Length\":\"126540\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a719d3e1-11c0-404e-a537-808e4520d4cc>\",\"WARC-Concurrent-To\":\"<urn:uuid:3ac0caba-4b56-40a9-83bf-c28e169e0680>\",\"WARC-IP-Address\":\"182.18.134.62\",\"WARC-Target-URI\":\"http://www.mahome.in/ezcche/viewtopic.php?77ff12=quantum-hall-conductance-problem\",\"WARC-Payload-Digest\":\"sha1:JZUVDRDN2TCJ67LXKC4LYKRWE7Z5HFCK\",\"WARC-Block-Digest\":\"sha1:AFVQCBJOTO6NQ7DY7FR2MNIJPR7VSIYM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618039508673.81_warc_CC-MAIN-20210421035139-20210421065139-00334.warc.gz\"}"} |
https://www.scoopwhoop.com/news/hyderabad-mathematician-dr-eswaran-solves-reimann-hypothesis-161-year-old-mathematics-problem/?ref=page_event | [
"Dr. Kumar Eswaran, a Hyderabad-based physicist, has appartently found a solution to the 161-year-old Riemann’s mathematical problem. The famous Riemann hypothesis is considered to be one of the seven unsolved mathematical problems.\n\nIt was declared a millennium problem in 2000, by the Clay Mathematics Institute of Cambridge, with a reward of \\$1 million for anyone who solves it. Riemann Hypothesis was first posited by Bernhard Riemann in 1859.\n\nRiemann Hypothesis fundamentally helps to count prime numbers and provides a method to generate large random numbers. In simple words, it deals with understanding the distribution of prime numbers. The Riemann Hypothesis originated from the work of well-known mathematician Carl Friedrich Gauss in the 19th century.\n\nKumar Eswaran, a mathematician from Sreenidhi Institute of Science and Technology, Hyderabad, placed the research title as “The final and exhaustive proof of the Riemann Hypothesis from first principles” five years ago on the internet"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9606072,"math_prob":0.66742367,"size":1765,"snap":"2022-40-2023-06","text_gpt3_token_len":377,"char_repetition_ratio":0.12152186,"word_repetition_ratio":0.00729927,"special_character_ratio":0.19886686,"punctuation_ratio":0.10031348,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9834361,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-01T21:35:54Z\",\"WARC-Record-ID\":\"<urn:uuid:18648985-9eec-4bc1-87c3-c11e7ed22d44>\",\"Content-Length\":\"86153\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c3f72d0f-6b4e-44d8-9c7e-96ff02da4932>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8546c65-aae5-47e3-a811-8a1b3ae89dbf>\",\"WARC-IP-Address\":\"192.0.66.58\",\"WARC-Target-URI\":\"https://www.scoopwhoop.com/news/hyderabad-mathematician-dr-eswaran-solves-reimann-hypothesis-161-year-old-mathematics-problem/?ref=page_event\",\"WARC-Payload-Digest\":\"sha1:UOZ2LL3PHJWRFPQNMTVPHTEADFBBCUYR\",\"WARC-Block-Digest\":\"sha1:HUHVN4AONVOSMLQN6GTK426L5NWAZDKF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030336921.76_warc_CC-MAIN-20221001195125-20221001225125-00334.warc.gz\"}"} |
https://www.kaysonseducation.co.in/questions/p-span-sty_1695 | [
"## Question\n\n### Solution\n\nCorrect option is",
null,
"We have observed that this function has a property that if A, B, C and D are four real number such that A + B = C + D.\n\nThen f (A) + f (B) = f (C) + f (D)\n\nNow + 2 – (+ 1) = x + 1 – x\n\n#### SIMILAR QUESTIONS\n\nQ1\n\nThe domain of definition of the function y (x) given by the equation",
null,
"Q2\n\nRange of",
null,
"Q3\n\nThe period of",
null,
"is\n\nQ4\n\nIf (x) and g(x) be periodic and non-periodic function respectively, then f(g(x)) is\n\nQ5\n\nLet (x) and g(x) be bijective function where :{a, b, c, d}",
null,
"{1, 2, 3, 4}and g:{3, 4, 5, 6}",
null,
"{w, x, y, z) respectively. The number of elements in the range set of g(f (x)) is\n\nQ6\n\nThe polynomial p(x) is such that for any polynomial q(x) we have p(q(x) = q(p(x). Then p(x) is\n\nQ7\n\nIf",
null,
"denotes greatest integer function, then\n\nQ8",
null,
"Infinite set, then period of the function cannot be\n\nQ9\n\nIf a polynomial of degree n satisfies",
null,
"then (x) is\n\nQ10\n\nIn the given figure find the domain, co-domain and range."
] | [
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2119.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2025.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2041.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2061.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2075.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2075.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2089.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2101.png",
null,
"http://kaysonseducation.co.in/Question/IIT/Mathematics/Differential%20calculus/Fundamentals%20and%20functions/Fundamentals%20and%20functions_files/image2109.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7887905,"math_prob":0.99936765,"size":881,"snap":"2021-43-2021-49","text_gpt3_token_len":288,"char_repetition_ratio":0.12314709,"word_repetition_ratio":0.011111111,"special_character_ratio":0.32122588,"punctuation_ratio":0.112676054,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999783,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,1,null,8,null,8,null,8,null,null,null,null,null,10,null,10,null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-02T03:51:28Z\",\"WARC-Record-ID\":\"<urn:uuid:07183eb2-bc5d-4146-aca6-b7f66c0950e6>\",\"Content-Length\":\"42445\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5045db31-e1a2-40b4-b84c-d9466fa47a55>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8c9512f-254a-4b39-afcb-2b3ef1cfb5c9>\",\"WARC-IP-Address\":\"172.67.175.73\",\"WARC-Target-URI\":\"https://www.kaysonseducation.co.in/questions/p-span-sty_1695\",\"WARC-Payload-Digest\":\"sha1:3KBSWUJKUHJ2N3R7G6SMG6JDW73GCE3E\",\"WARC-Block-Digest\":\"sha1:QBZLTK4B3LPCTULXVSPGDNAMHQUE473P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964361064.69_warc_CC-MAIN-20211202024322-20211202054322-00193.warc.gz\"}"} |
http://export.arxiv.org/abs/1305.0078 | [
"math.AP\n\nTitle: Gradient bounds for p-harmonic systems with vanishing neumann data in a convex domain\n\nAbstract: Let $\\ti \\Om$ be a bounded convex domain in Euclidean $n$ space, $\\hat x \\in \\ar \\ti \\Om,$ and $r > 0.$ Let $\\ti u = (\\ti u^1, \\ti u^2, \\dots, \\ti u^N)$ be a weak solution to $\\nabla \\cdot \\left (|\\nabla \\ti u |^{p-2} \\nabla \\ti u \\right) = 0 \\mbox{in} \\ti \\Om \\cap B (\\hat x, 4 r) \\mbox{with} |\\nabla \\ti u|^{p-2} \\, \\ti u_\\nu = 0 \\mbox{on} \\ar \\ti \\Om \\cap B (\\hat x, 4 r).$ We show that sub solution type arguments for certain uniformly elliptic systems can be used to deduce that $| \\nabla \\ti u |$ is bounded in $\\ti \\Om \\cap B (\\hat x, r)$ with constants depending only on $n, p, N.$ and $\\frac{r^n}{| \\ti \\Om \\cap B (\\hat x, r) |}.$ Our argument replaces an argument based on level sets in recent important work of [CM], [CM1], [GS], [M], [M1], involving similar problems.\n Subjects: Analysis of PDEs (math.AP) Cite as: arXiv:1305.0078 [math.AP] (or arXiv:1305.0078v1 [math.AP] for this version)\n\nSubmission history\n\nFrom: Agnid Banerjee [view email]\n[v1] Wed, 1 May 2013 03:27:41 GMT (12kb)\n\nLink back to: arXiv, form interface, contact."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6413725,"math_prob":0.99535143,"size":1181,"snap":"2019-43-2019-47","text_gpt3_token_len":419,"char_repetition_ratio":0.1248938,"word_repetition_ratio":0.04524887,"special_character_ratio":0.3657917,"punctuation_ratio":0.13944224,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9973644,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-15T23:55:14Z\",\"WARC-Record-ID\":\"<urn:uuid:9d078fa2-0621-43a0-b289-ac66da233f0b>\",\"Content-Length\":\"13005\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:39d762d8-5346-496a-96fd-4b3ee65df7c4>\",\"WARC-Concurrent-To\":\"<urn:uuid:1cb9e4e7-93f9-4c9a-8551-c0f496a2be1a>\",\"WARC-IP-Address\":\"128.84.21.203\",\"WARC-Target-URI\":\"http://export.arxiv.org/abs/1305.0078\",\"WARC-Payload-Digest\":\"sha1:ZDU4OMLIJWYIU5QNDY4KFWRT7AZYIGQU\",\"WARC-Block-Digest\":\"sha1:6MAUYQLE5T43327IUZSO5PURE2VBB5PK\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986660829.5_warc_CC-MAIN-20191015231925-20191016015425-00493.warc.gz\"}"} |
https://socratic.org/questions/how-do-you-simplify-5cd-9 | [
"How do you simplify 5cd^-9?\n\nJul 27, 2016\n\n$\\frac{5 c}{d} ^ 9$\n\nExplanation:\n\nWhat I believe you mean is to express using only positive exponents.\nTo do this use the $\\textcolor{b l u e}{\\text{law of exponents}}$\n\n$\\textcolor{\\mathmr{and} a n \\ge}{\\text{Reminder}} \\textcolor{red}{| \\overline{\\underline{\\textcolor{w h i t e}{\\frac{a}{a}} \\textcolor{b l a c k}{{a}^{-} m \\Leftrightarrow \\frac{1}{a} ^ m} \\textcolor{w h i t e}{\\frac{a}{a}} |}}}$\n\nThe expression may now be written.\n\n$5 c {d}^{-} 9 = \\frac{5}{1} \\times \\frac{c}{1} \\times \\frac{1}{d} ^ 9 = \\frac{5 \\times c \\times 1}{1 \\times 1 \\times {d}^{9}} = \\frac{5 c}{d} ^ 9$"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6204294,"math_prob":0.9998326,"size":512,"snap":"2022-05-2022-21","text_gpt3_token_len":168,"char_repetition_ratio":0.1003937,"word_repetition_ratio":0.0,"special_character_ratio":0.30273438,"punctuation_ratio":0.05050505,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99994326,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-21T06:12:09Z\",\"WARC-Record-ID\":\"<urn:uuid:1ce4affd-5cc2-4a2c-98aa-ef2f5783b86d>\",\"Content-Length\":\"32754\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:40fd2209-f188-4dc9-94a6-8981051728cd>\",\"WARC-Concurrent-To\":\"<urn:uuid:aaaaf230-eeab-4bb7-8340-ab409874a89a>\",\"WARC-IP-Address\":\"216.239.32.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-do-you-simplify-5cd-9\",\"WARC-Payload-Digest\":\"sha1:CB6R2E63LBWNRFYBV7XZETGMIVBWJ2HN\",\"WARC-Block-Digest\":\"sha1:SIKRVUXWPJG57ORAMYN4566MGSSIROKX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320302723.60_warc_CC-MAIN-20220121040956-20220121070956-00670.warc.gz\"}"} |
https://forum.arduino.cc/index.php?amp;topic=617211.msg4182525 | [
"Go Down\n\nTopic: Open project Arduino general eeprom R/W (Read 2891 times)previous topic - next topic\n\nCvik_Dasa",
null,
"May 22, 2019, 08:25 amLast Edit: May 22, 2019, 08:27 am by Cvik_Dasa\nHello there",
null,
"Im working on a project based on arduino and I would like to get you involved in it.\n\nWhat I'm trying to do is an arduino reader and writer for spi, i2c and parallel eeproms. When I finish this project I will make it fully open source and I will share it with all of you so because of that I want to hear your opinion what should be done, what to consider as option in software, code look up to see if I missed something and so on.\n\nSo far I came up with this:",
null,
"I already started writing code for SPI and I figure out it will be hard to make it as simple as possible but still easy to adopt to any eeprom. So here I have a question about ready bit in status register. Many of manufacturers calls them RDY but winbond calls it BUSY instead so how give a clue to user when searching the datasheet what to look for?\n\nIn the attachment is visual basic code for windows side app and here is an arduino part:\n\nCode: [Select]\n#include <SPI.h>\nint CS;\nint CSPinAL = 0;\nint SO;\nint SOPinAL = 0;\nint WP;\nint WPPinAL = 0;\nint SI;\nint SIPinAL = 0;\nint SCLK;\nint SCKPinAL = 0;\nint HOLD;\nint HOLDPinAL = 0;\nint Addressbitlength = 0;\nint HighestAddressBit = 0;\nint DataBit = 0;\nint WRDIint = 0;\nint RDRSint = 0;\nint WRSRint = 0;\nint READint = 0;\nint WRITEint = 0;\nint WRENint = 0;\nint WEN = 0;\nint RDY = 0;\nint WENAL = 0;\nint RDYAL = 0;\n\nString Serial_Data;\nint Protocol;\n\nvoid setup() {\nSerial.begin(115200);\nSerial.setTimeout(5);\n\ndo {//Used to send board info\n\nif(Serial.available()){\n}\nif (Serial_Data == \"B\"){\nSerial.print(\"Nano\");\nSerial_Data = \"\";\nbreak;\n}\n} while (1 == 1);\n\ndo {\n\nif(Serial.available()){\n}\nif (Serial_Data == \"2\"){\nSerial.print(\"SPI\");\nSerial_Data = \"\";\nProtocol = 3;\nbreak;\n}\n} while (1 == 1);\n\nif (Protocol == 3){\nint CSPin = 0;\n\ndo { //CS pin setup\nif(Serial.available()){\nCSPin = Serial.parseInt();\n}\nif (CSPin != 0){\nCS = CSPin;\nSerial.print(CSPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //CS pin active low or high\nif(Serial.available()){\nCSPinAL = Serial.parseInt();\n}\nif (CSPinAL != 0){//cs pin active low\nSerial.print(CSPinAL);\nbreak;\n}\n} while (1 == 1);\n\nint SOPin = 0;\n\ndo { //SO pin setup\nif(Serial.available()){\nSOPin = Serial.parseInt();\n}\nif (SOPin != 0){\nSO = SOPin;\nSerial.print(SOPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //SO pin active low or high\nif(Serial.available()){\nSOPinAL = Serial.parseInt();\n}\nif (SOPinAL != 0){//so pin active low\nSerial.print(SOPinAL);\nbreak;\n}\n} while (1 == 1);\n\nint WPPin = 0;\n\ndo { //WP pin setup\nif(Serial.available()){\nWPPin = Serial.parseInt();\n}\nif (WPPin != 0){\nWP = WPPin;\nSerial.print(WPPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //WP pin active low or high\nif(Serial.available()){\nWPPinAL = Serial.parseInt();\n}\nif (WPPinAL != 0){//WP pin active low\nSerial.print(WPPinAL);\nbreak;\n}\n} while (1 == 1);\n\nint SIPin = 0;\n\ndo { //SI pin setup\nif(Serial.available()){\nSIPin = Serial.parseInt();\n}\nif (SIPin != 0){\nSI = SIPin;\nSerial.print(SIPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //SI pin active low or high\nif(Serial.available()){\nSIPinAL = Serial.parseInt();\n}\nif (SIPinAL != 0){//SI pin active low\nSerial.print(SIPinAL);\nbreak;\n}\n} while (1 == 1);\n\nint SCKPin = 0;\n\ndo { //SCK pin setup\nif(Serial.available()){\nSCKPin = Serial.parseInt();\n}\nif (SCKPin != 0){\nSCLK = SCKPin;\nSerial.print(SCKPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //SCK pin active low or high\nif(Serial.available()){\nSCKPinAL = Serial.parseInt();\n}\nif (SCKPinAL != 0){//SCK pin active low\nSerial.print(SCKPinAL);\nbreak;\n}\n} while (1 == 1);\n\nint HOLDPin = 0;\n\ndo { //HOLD pin setup\nif(Serial.available()){\nHOLDPin = Serial.parseInt();\n}\nif (HOLDPin != 0){\nHOLD = HOLDPin;\nSerial.print(HOLDPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //HOLD pin active low or high\nif(Serial.available()){\nHOLDPinAL = Serial.parseInt();\n}\nif (HOLDPinAL != 0){//HOLD pin active low\nSerial.print(HOLDPinAL);\nbreak;\n}\n} while (1 == 1);\n\ndo { //Address bit length\nif(Serial.available()){\n}\nif (Addressbitlength != 0){//Address bit length isnot 0\nbreak;\n}\n} while (1 == 1);\n\nif(Serial.available()){\n}\nbreak;\n}\n} while (1 == 1);\n\ndo { //DataBitLenth\nif(Serial.available()){\nDataBit = Serial.parseInt();\n}\nif (DataBit != 0){//DataBit lenth isnot 0\nSerial.print(DataBit);\nbreak;\n}\n} while (1 == 1);\n\ndo { //WRDIint WRDI as integer\nif(Serial.available()){\nWRDIint = Serial.parseInt();\n}\nif (WRDIint != 0){//WRDIint as integer > 0\nSerial.print(WRDIint);\nbreak;\n}\n} while (1 == 1);\n\ndo { //RDRSint RDRS as integer\nif(Serial.available()){\nRDRSint = Serial.parseInt();\n}\nif (RDRSint != 0){//RDRSint as integer > 0\nSerial.print(RDRSint);\nbreak;\n}\n} while (1 == 1);\n\ndo { //WRSRint WRSR as integer\nif(Serial.available()){\nWRSRint = Serial.parseInt();\n}\nif (WRSRint != 0){//WRSRint as integer > 0\nSerial.print(WRSRint);\nbreak;\n}\n} while (1 == 1);\n\nif(Serial.available()){\n}\nif (READint != 0){//READint as integer > 0\nbreak;\n}\n} while (1 == 1);\n\ndo { //WRITEint WRITE as integer\nif(Serial.available()){\nWRITEint = Serial.parseInt();\n}\nif (WRITEint != 0){//WRITEint as integer > 0\nSerial.print(WRITEint);\nbreak;\n}\n} while (1 == 1);\n\ndo { //WRENint WREN as integer\nif(Serial.available()){\nWRENint = Serial.parseInt();\n}\nif (WRENint != 0){//WRENint as integer > 0\nSerial.print(WRENint);\nbreak;\n}\n} while (1 == 1);\n\ndo {//Status register setup\n\nSerial_Data = \"\";\nif(Serial.available()){\n}\n\nif (Serial_Data == \"E\"){\nSerial.print(Serial_Data);\nSerial_Data = \"\";\nint WENr = 0;\n\ndo { //WEN register setup\nif(Serial.available()){\nWENr = Serial.parseInt();\n}\nif (WENr != 0){\nWEN = WENr;\nSerial.print(WENr);\nbreak;\n}\n} while (1 == 1);\n\ndo { //WEN bit active low or high\nif(Serial.available()){\nWENAL = Serial.parseInt();\n}\nif (WENAL != 0){//WEN bit active low\nSerial.print(WENAL);\nbreak;\n}\n} while (1 == 1);\n}\n\nif (Serial_Data == \"W\"){\nSerial.print(Serial_Data);\nSerial_Data = \"\";\nint RDYr = 0;\n\ndo { //RDY register setup\nif(Serial.available()){\nRDYr = Serial.parseInt();\n}\nif (RDYr != 0){\nRDY = RDYr;\nSerial.print(RDYr);\nbreak;\n}\n} while (1 == 1);\n\ndo { //RDY bit active low or high\nif(Serial.available()){\nRDYAL = Serial.parseInt();\n}\nif (RDYAL != 0){//RDY bit active low\nSerial.print(RDYAL);\nbreak;\n}\n} while (1 == 1);\n}\n\n} while (Serial_Data != \"Z\");\n\nSerial.print(Serial_Data);\nSerial_Data = \"\";\n\npinMode(13, OUTPUT);\ndigitalWrite(13,HIGH);\n\ndelay(1000);\n\n}\n\n}\n\nvoid loop() {\n\n}\n\nAnd that's it for now I work every day on it so Im sorry it is not too well commented and there are some mess in code but that's just for now. When I will have time i will clean it up a bit.\n\nLooking for your suggestions, support or how ever you can help",
null,
"Cvik_Dasa",
null,
"#1\nMay 25, 2019, 12:23 amLast Edit: May 25, 2019, 12:29 am by Cvik_Dasa\nHello there... seems like Im hitting the wall",
null,
"Cant figure out what is the problem so can someone please assist trying to find out solution?\n\nSo when I send cs pin number from pc to arduino I get correct replay from arduino. then it goes cs pin active low or high over serial and sure enough arduino replay received data to pc and stores that information i variable.\n\nnext data going over serial is write protect pin number and for example I send as string number 3 and arduino replays back number 3 to pc. Then pc sends active low or high for write protect pin and instead receiving number 1 or 2 from arduino Im getting \"pin number + active low or high\" like 31 or if i define wp pin as 4 as replay I got 41 or 42.\n\nI tried to send integer and string value over serial and Im getting the same results.\n\nvb.net\nCode: [Select]\n'DEFINE CS PIN\n\nSerialPort1.Write(CS_pin_num)\nTimerValue = 0\n\n' send pin number to use\nDo\nMagic_Byte = CStr(CS_pin_num)\n\nIf Com_port_received_text = Magic_Byte Then 'Wait until data is received from arduino\n\nExit Do\nEnd If\n\nIf TimerValue = 20 Then\n\nMessageBox.Show(\"Arduino didn't awknoledge sent data packet.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nEnd If\n\nApplication.DoEvents()\nLoop\n\n'CS PIN ACTIVE LOW OR HIGH\nTimerValue = 0\n\nIf CheckBox1.Checked = True Then\nMagic_Byte = \"1\"\nSerialPort1.Write(1) 'CSPin = active low\n\nElse\nMagic_Byte = \"2\"\nSerialPort1.Write(2) 'CSPin = active high\n\nEnd If\n\nDo\nIf Com_port_received_text = Magic_Byte Then\n\nExit Do\nEnd If\n\nIf TimerValue = 20 Then\n\nMessageBox.Show(\"Arduino didn't awknoledge sent data packet.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nEnd If\n\nApplication.DoEvents()\nLoop\n\n'DEFINE WP PIN\n\nSerialPort1.Write(WP_pin_num)\nTimerValue = 0\n\n' send pin number to use\nDo\nMagic_Byte = CStr(WP_pin_num)\nIf Not Com_port_received_text = Magic_Byte Then\n\nExit Do\nEnd If\n\nIf TimerValue = 20 Then\n\nMessageBox.Show(\"Arduino didn't awknoledge sent data packet.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nEnd If\n\nApplication.DoEvents()\nLoop\n\n'WP PIN ACTIVE LOW OR HIGH\n\nTimerValue = 0\n\nIf CheckBox4.Checked = True Then\nMagic_Byte = \"1\"\nSerialPort1.Write(1) 'WPPin = active low\n\nElse\nMagic_Byte = \"2\"\nSerialPort1.Write(2) 'WPPin = active high\n\nEnd If\n'SerialPort1.DiscardOutBuffer() does not help\nDo\n'Application.DoEvents()\nIf Com_port_received_text = Magic_Byte Then\n\nExit Do\nEnd If\n\nIf TimerValue = 400 Then\n\nMessageBox.Show(\"Arduino didn't awknoledge sent data packet.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nEnd If\n' If Com_port_received_text = \"31\" Then 'Does not work\n' Com_port_received_text = \"\" 'Does not work\n' End If 'Does not work\nApplication.DoEvents()\nLoop\n\nArduino:\nCode: [Select]\nint CSPin = 0;\ndo { //CS pin setup\nif(Serial.available()){\nCSPin = Serial.parseInt();\n}\nif (CSPin != 0){\nCS = CSPin;\nSerial.print(CSPin);\nbreak;\n}\n} while (1 == 1);\n\ndo { //CS pin active low or high\nif(Serial.available()){\nCSPinAL = Serial.parseInt();\n}\nif (CSPinAL != 0){//cs pin active low\nSerial.print(CSPinAL);\nbreak;\n}\n} while (1 == 1);\n\nint WPPin = 0;\ndo { //WP pin setup\nif(Serial.available()){\nWPPin = Serial.parseInt();\n}\nif (WPPin != 0){\nWP = WPPin;\nSerial.print(WPPin);\nbreak;\n}\n} while (1 == 1);\n//Serial.print(\"\"); ' does not help\n//Serial.flush();\n\ndo { //WP pin active low or high\nif(Serial.available()){\nWPPinAL = Serial.parseInt();\n}\nif (WPPinAL != 0){//WP pin active low\n\nSerial.print(WPPinAL);\nbreak;\n}\n} while (1 == 1);\n\nif (WPPinAL == 1){// used to see if arduino gets correct information from serial\npinMode(13, OUTPUT);\n\ndigitalWrite(13, HIGH);\n}\n\ndo {\ndelay(1);\n} while (1 == 1);\n\nCvik_Dasa",
null,
"#2\nMay 25, 2019, 02:06 pm",
null,
"Ive find out that sometimes fails on cs in too. seems like it have something to do with the serial buffer ? not really sure whats wrong but I think I will send whole bunch of configuration data as one string and on arduino receive it as char array... should work. Im just not shure what is going to happen when I start receiving eeprom data over the serial. I might encounter same problem again :/\n\nCvik_Dasa",
null,
"#3\nMay 28, 2019, 01:04 amLast Edit: May 28, 2019, 01:34 am by Cvik_Dasa\nI managed to solve the issue by sending everything as string to the arduino, as backup if that wont work i was planing to send all configuration as one big string and then separate characters on arduino but luckily this worked out",
null,
"Code: [Select]\nPrivate Sub Send_SPI_Config()\n\nDim Analog_pin_Used As Boolean = 0\n\n'Add cfg to array\nDim cfgArray As New ArrayList\n\n'OPEN SPI PROTOCOL\n\ncfgArray.Add(\"2\") 'defines SPI protocol\n\n'DEFINE CS PIN\n\nPinStatus(TextBox10.Text)\n\nIf Analog_pin_Used = True Then\n\nError_occurred = 0\n\nIf Error_occurred = True Then\nGoTo end_sub\nEnd If\nElse\n\ncfgArray.Add(Magic_Byte) ' cs pin number\nEnd If\n\n'CS PIN ACTIVE LOW OR HIGH\n\nIf CheckBox1.Checked = True Then\ncfgArray.Add(\"1\") 'CSPin = active low\n\nElse\n'CSPin = active high\n\nEnd If\n\nAnalog_pin_Used = False\n\n'DEFINE SO PIN\n\nPinStatus(TextBox17.Text)\n\nIf Analog_pin_Used = True Then\n\nError_occurred = 0\n\nIf Error_occurred = True Then\nGoTo end_sub\nEnd If\nElse\n\ncfgArray.Add(Magic_Byte) ' so pin number\nEnd If\n\nAnalog_pin_Used = False\n\n'DEFINE WP PIN\n\nPinStatus(TextBox18.Text)\n\nIf Analog_pin_Used = True Then\n\nError_occurred = 0\n\nIf Error_occurred = True Then\nGoTo end_sub\nEnd If\nElse\n\ncfgArray.Add(Magic_Byte) ' wp pin number\nEnd If\n\n'WP PIN ACTIVE LOW OR HIGH\n\nIf CheckBox4.Checked = True Then\ncfgArray.Add(\"1\") 'WPPin = active low\n\nElse\n'WPPin = active high\n\nEnd If\n\nAnalog_pin_Used = False\n\n'DEFINE SI PIN\n\nPinStatus(TextBox19.Text)\n\nIf Analog_pin_Used = True Then\n\nError_occurred = 0\n\nIf Error_occurred = True Then\nGoTo end_sub\nEnd If\nElse\n\ncfgArray.Add(Magic_Byte) ' si pin number\nEnd If\n\nAnalog_pin_Used = False\n\n'DEFINE SCK PIN\n\nPinStatus(TextBox21.Text)\n\nIf Analog_pin_Used = True Then\n\nError_occurred = 0\n\nIf Error_occurred = True Then\nGoTo end_sub\nEnd If\nElse\n\ncfgArray.Add(Magic_Byte) ' sck pin number\nEnd If\n\nAnalog_pin_Used = False\n\n'DEFINE HOLD PIN\n\nPinStatus(TextBox22.Text)\n\nIf Analog_pin_Used = True Then\n\nError_occurred = 0\n\nIf Error_occurred = True Then\nGoTo end_sub\nEnd If\nElse\n\ncfgArray.Add(Magic_Byte) ' hold pin number\nEnd If\n\n'HOLD PIN ACTIVE LOW OR HIGH\n\nIf CheckBox7.Checked = True Then\ncfgArray.Add(\"1\") 'hold Pin = active low\n\nElse\n'hold Pin = active high\n\nEnd If\n\nIf Not IsNumeric(TextBox26.Text) Or String.IsNullOrWhiteSpace(TextBox26.Text) Then\n\nMessageBox.Show(\"Address length is incorrect.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd If\n\nTry\n\nIf Convert.ToInt32(TextBox26.Text) < Convert.ToInt32(TextBox27.Text) Then\nMessageBox.Show(\"Address length is incorrect.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nEnd If\nCatch ex As Exception\n\nMessageBox.Show(\"Address length is incorrect.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd Try\n\nMagic_Byte = TextBox26.Text\nDim Magic_integer = Convert.ToInt32(Magic_Byte)\nMagic_integer = Magic_integer / 8\n\nIf Magic_integer < 1 Or Magic_integer > 4 Then\nMessageBox.Show(\"Address length is incorrect.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nElseIf Magic_integer > 0.99 And Magic_integer < 2 Then\n\nElseIf Magic_integer > 1.99 And Magic_integer < 3 Then\n\nElseIf Magic_integer > 2.99 And Magic_integer < 4 Then\n\nEnd If\n\nIf Not IsNumeric(TextBox27.Text) Or String.IsNullOrWhiteSpace(TextBox27.Text) Then\n\nMessageBox.Show(\"Highest Address seems incorrect incorrect.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd If\n\n'Send WRDI instruction\n\nIf Regex.IsMatch(TextBox14.Text, \"^[0-1 ]+\\$\") Then\n\nElse\nMessageBox.Show(\"WRDI op code must be binary number.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd If\n\nIf Regex.IsMatch(TextBox11.Text, \"^[0-1 ]+\\$\") Then\n\nElse\nMessageBox.Show(\"Read op code must be binary number.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd If\n\n'Send WRITE instruction\n\nIf Regex.IsMatch(TextBox12.Text, \"^[0-1 ]+\\$\") Then\n\nElse\nMessageBox.Show(\"Write op code must be binary number.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd If\n\n'Send WREN instruction\n\nIf Regex.IsMatch(TextBox13.Text, \"^[0-1 ]+\\$\") Then\n\nElse\nMessageBox.Show(\"Read op code must be binary number.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\nEnd If\n\n'transfer from array arduino\nMagic_Byte = \"\"\n\nFor Each Data As String In cfgArray\n\nTimerValue = 0\nSerialPort1.Write(Data)\n\nDo\nIf Com_port_received_text = Data Then\n\nExit Do\nEnd If\n\nIf TimerValue = 20 Then\n\nMessageBox.Show(\"Arduino didn't awknoledge sent data packet.\", \"Invald request\", MessageBoxButtons.OK, MessageBoxIcon.Exclamation)\nError_occurred = 1\nGoTo end_sub\n\nEnd If\n\nApplication.DoEvents()\nLoop\nError_occurred = 0\n\nNext\n\ncfgArray.Clear()\n\nend_sub:\nReturn\n\nEnd Sub\n\nWith this modification and with only one function added I managed to shrink code length by almost 500 lines, so it looks nicer and more organized now\n\nFor application to be as versatile as possible I will communicate with eeprom by shiftout and shiftin functions so that you can use any pin you want.\n\nAt the moment I implemented nano, mega and due in code, any suggestions for any other board?\n\nIve figure out that I will need to change GUI a bit because there is no need for SCK active low or high same as data in and out and I will remove opcode for read and write status register same as read status bits. I designed it with only basic knowledge about spi communication so as I learn I will edit GUI accordingly\n\nCant wait tomorrow to see what next issue will be\n\nCvik_Dasa",
null,
"#4\nMay 29, 2019, 02:04 amLast Edit: May 29, 2019, 02:13 am by Cvik_Dasa\nSome update... Well I made it, it seems like Im on the right track but there is still whole bunch of things to do.\n\nAnyway after wasting 3+ hours on debugging why I cant't get any replay from eeprom Ive figure out that I declared miso and mosi on arduino as output pins. Imagine my face after figuring out what mistake I did",
null,
"anyway so far so good",
null,
"",
null,
"",
null,
"Ive read BIOS eeprom (4MB) W25X40 and data don't have scene by looking at it with hex editor... Have no idea what decoding I should use to get something useful out of it.\n\nI saved just part of code... maybe that part was post screen image, have no idea but I might consider to implement ability to save code as binary it should be easier to decode it that way.\n\nAmmm yea reading whole eeprom took 2 minutes for arduino not that bad if you ask me but application have some issues when writing to the grid view and reading from grid view to save data file.\n\nSo complete read from eeprom took 2min eeprom>arduino>app then app took about 30s to convert raw data to hex and then storing it to grid view took 10 minutes. There must be better way to do it but for now it is ok it works I will do fine tuning at the end",
null,
"in the attachmet is visual studio code and here is arduino part:\nCode: [Select]\nint protocol = -1;\nint cs_pin= -1;\nint cs_al= -1;\nint so_pin= -1;\nint wp_pin= -1;\nint wp_al= -1;\nint si_pin= -1;\nint sck= -1;\nint hold= -1;\nint hold_al= -1;\nlong actual_length= -1;\nint wrdiR= -1;\nint writeR= -1;\nint wrenR= -1;\nbyte Lowest = 0;\nbyte Middle = 0;\nbyte Highest = 0;\nlong i = 0;\n\nvoid setup() {\nSerial.begin(115200);\nchar incomingByte;\ndo{\n\ndelay(5);\n\nwhile (Serial.available()>0) {\n\n}\nSerial.print(\"Nano\");\n\n}\nelse if(readString != \"\"){\n\nif (protocol == -1){\nSerial.print(protocol);\n\n}\n\nif ((protocol == 2) && (readString != \"\"))\n{\nif (cs_pin == -1){\nSerial.print(cs_pin);\n\n}\n\nelse if ((cs_pin != -1) && (cs_al == -1)&& (readString != \"\")){\nSerial.print(cs_al);\n\n}\nelse if ((cs_al != -1) && (so_pin == -1)&& (readString != \"\")){\nSerial.print(so_pin);\n\n}\nelse if ((so_pin != -1) && (wp_pin == -1)&& (readString != \"\")){\nSerial.print(wp_pin);\n\n}\nelse if ((wp_pin != -1) && (wp_al == -1)&& (readString != \"\")){\nSerial.print(wp_al);\n\n}\nelse if ((wp_al != -1) && (si_pin == -1)&& (readString != \"\")){\nSerial.print(si_pin);\n\n}\nelse if ((si_pin != -1) && (sck == -1)&& (readString != \"\")){\nSerial.print(sck);\n\n}\nelse if ((sck != -1) && (hold == -1)&& (readString != \"\")){\nSerial.print(hold);\n\n}\nelse if ((hold != -1) && (hold_al == -1)&& (readString != \"\")){\nSerial.print(hold_al);\n\n}\nelse if ((hold_al != -1) && (address_length == -1)&& (readString != \"\")){\n\n}\nelse if ((address_length != -1) && (actual_length == -1)&& (readString != \"\")){\nSerial.print(actual_length);\n\n}\nelse if ((actual_length != -1) && (wrdiR == -1)&& (readString != \"\")){\nSerial.print(wrdiR);\n\n}\nelse if ((wrdiR != -1) && (readR == -1)&& (readString != \"\")){\n\n}\nelse if ((readR != -1) && (writeR == -1)&& (readString != \"\")){\nSerial.print(writeR);\n\n}\nelse if ((writeR != -1) && (wrenR == -1)&& (readString != \"\")){\nSerial.print(wrenR);\n\n}\n\n}\n\n}\n\n}while (wrenR == -1);\n\nif (protocol == 2){\n//si_pin = 11;\npinMode(cs_pin,OUTPUT);\npinMode(so_pin,INPUT);\npinMode(wp_pin,OUTPUT);\npinMode(si_pin,OUTPUT);\npinMode(sck,OUTPUT);\npinMode(hold,OUTPUT);\n\nif (cs_al == 1){digitalWrite(cs_pin,HIGH);}\nelse{digitalWrite(cs_pin,LOW);}\nif (wp_al == 1){digitalWrite(wp_pin,HIGH);}\nelse{digitalWrite(wp_pin,LOW);}\nif (hold_al == 1){digitalWrite(hold,HIGH);}\nelse{digitalWrite(hold,LOW);}\n\ndo{\ndelay(5);\nwhile (Serial.available()>0) {\n\n}\n{\nSerial.print(\"1\");\n\nif (cs_al == 1){digitalWrite(cs_pin,LOW);}\nelse{digitalWrite(cs_pin,HIGH);}\nif (wp_al == 1){digitalWrite(wp_pin,LOW);}\nelse{digitalWrite(wp_pin,HIGH);}\ndelay(5);\n//actual_length = 1024;//Length(actual_length);\n\nshiftOut(si_pin, sck, MSBFIRST, 3);\nshiftOut(si_pin, sck, MSBFIRST, 0);\nshiftOut(si_pin, sck, MSBFIRST, 0);\nSerial.print(shiftIn(so_pin, sck, MSBFIRST));\ndo{\n\nString var = \"h\";\nbyte ii = shiftIn(so_pin, sck, MSBFIRST);\nSerial.print(var + ii);\n// Serial.println();\ni++;\n\n} while(i != address_length);\n\n}\n} while(readString != \"\");\n}\n\n//pinmode setup\npinMode(13, OUTPUT);\ndigitalWrite(13, HIGH);\n}\n\nvoid loop() {\ndelay(100);\nSerial.print(\"X\");\n}\n\nCvik_Dasa",
null,
"#5\nJun 01, 2019, 02:02 amLast Edit: Jun 01, 2019, 02:08 am by Cvik_Dasa\nUpdate ... I decided to save file as binary instead of plain hex text I also added prompt window which asks when memory is greater than 512kb if you would like to show data in grid view because I was unable to speed up populating process and it takes to much time to show data in grid view if eeprom memory is greater than 512kb.\n\nI got it slightly faster but it still takes to much time so now you have an option",
null,
"Im facing now another problem, somehow im getting to much of bytes from eeprom, I cant get it how. Im trying to debug it but cant find cause. I think that serial communication is to blame..\n\nWrite and read from file returns exact value of bytes so it is not issue in reading and writing the file",
null,
"I was looking what arduino and eeprom talks about and didn't find problems there so it seems that windows application makes all this trouble.\n\nHere is arduino and visual studio part of code used to communicate to each other",
null,
"From image above it is clear that arduino understood how many bytes should read otherwise it would trigger an error message \"Arduino didn't acknowledge sent data packet\" and indeed arduino reads epprom exact number of times, verified by analyzer.\n\nNow I see that I misspelled \"acknowledge\" in code :/\n\nHere is an image of reading the same memory with the same settings",
null,
"I would understand if they lose some packets while communicating but adding \"some\" random number of reads extra. I don't get it\n\nHere is visual basic code fully commented \"this part is used to receive bytes from arduino\"\n\nCode: [Select]\nDim Magic_Byte As String = \"\" 'not part of this code\nCom_port_received_text = \"\" 'if anithing has been sent over serial get rid of it\n\nDim DataArray As New ArrayList 'everything sent from arduino goes to this array\nDim i As String = \"\" 'not part of this code\nDo\n\nIf Not Com_port_received_text = \"\" Then 'if something was received\n\n'SaveArray(0) = \"7h90h17h49h73h96h84h136h86h153h9\"\n'I can get only one byte over serial but I need to add\n'delay(2); to slow down arduino transmission, vb app\n'can handle this string without slowing arduino down\n\nCom_port_received_text = \"\" 'clear variable\nEnd If\nApplication.DoEvents() 'cant monitor serial protocol while\n'executing do loop without this\nLoop Until Com_port_received_text = \"X\" 'When arduino sends X it means that transmission\n'is done\n\nDim newarray As New ArrayList 'here I will save actual data received from serial\n\nFor Each Data As String In SaveArray 'Loop trough SaveArray until end, first pass will\n'hold '\"7h90h17h49h73h96h84h136h86h153h9\"\n\nDim parts1() As String = Split(Data, \"h\") 'Data will hold \"7h90h17h49h73h96h84h136h86h153h9\" and\n'parts1()is an array and it will be same string but\n'without h character like part1(0)= 7, part1(1) = 90\n'and so on\n\nFor Each Part As String In parts1 'goes trough part1 array and gets string out of it\nnewarray.Add(Part) 'stores that string to new array, it will look same\n'as in parts1() array but this array can handle\n'strings, integers, longs and is easier to handle\n'data in it\nNext\nNext\nSaveArray.Clear() 'Empty SaveArray \" for later use\"\n\nFor Each Part As String In newarray 'read newarray which already holds wrong number of\n'bytes\nIf Not Part = \"\" Then 'used to avoid exception throw\n\nSaveArray.Add((Convert.ToInt16(Part))) 'this array is used to write binary file\nDataArray.Add(Hex(Convert.ToInt32(Part))) 'and this one is used to populate grid view\n\nEnd If\nNext\n\nHere is arduino part\n\nCode: [Select]\nshiftOut(si_pin, sck, MSBFIRST, readR); //Start comminucation from eeprom (readR) = read opcode\nshiftOut(si_pin, sck, MSBFIRST, 0); //send first 8 bytes of address\nshiftOut(si_pin, sck, MSBFIRST, 0); //send second 8 bytes of address\nSerial.print(shiftIn(so_pin, sck, MSBFIRST)); //Read 0x000000 addres of eeprom and send it over serial\n\nSerial.print(\"h\"); //Send h over serial to know where to split the string\n//in visual basic\n\ndo{\n\nString var = \"h\";\nbyte ii = shiftIn(so_pin, sck, MSBFIRST); //receive second address from eeprom\n\nSerial.print(ii); //send it over serial\n\nSerial.print(\"h\"); //Send h over serial to know where to split the string\n\nii = '\\0'; // I was thinking that maybe ii buffer hold some data\n//and I get extra data sent over serial so I tried to\n//flush ii buffer with '\\0' .. . but no help at all\n\n} while(i != address_length); //loop until end of eeprom in this case 0x5ffff\n\nHope that someone can find out what I'm missing here.\n\nI tried also slowing down communication between arduino and computer but didn't get any improvement, also if i read only until 0x1ff or 0xfff everything works fine. it smells like I declared some variable as wrong type but I triple checked that and didn't find any problems there.\n\nCvik_Dasa",
null,
"#6\nJun 02, 2019, 09:04 pmLast Edit: Jun 02, 2019, 09:07 pm by Cvik_Dasa\nOk so far so god... well not exactly I managed to get this thing to work but It is not clear exactly what's happening.\n\nBy the way I tried everything adding delays in various parts of code, increase/ reduce baud rate, no success...\n\nI decided to monitor serial communication between arduino and pc and saw many weird thing happening so to keep it simple I decided to synchronize transmission between arduino and pc.\n\nsynchronization is done this way. Arduino reads eeprom 10 times and then replays 10 bytes to pc. Pc responds with ack and arduino continues reading next 10 bytes form eeprom and so on.\n\nHere is the result",
null,
"For some reason windows side app cant keep up receiving information and processing them.\n\nwithout any logical explanation for this issue I decided to increase sync rate",
null,
"and it worked, Im getting what I expect but if you look at the timing at the beginning of reading process application freezes for some reason.\n\nThis time arudino reads 9 bytes from eeprom and then sends them over serial. Not sure what is the difference 10 bytes shouldn't be enough to overflow arduino or vb.net serial.\n\nAny way Im happy to see that encoding is ok. In this part of dump I can see motherboard type... gigabyte GA-M56S-S3 ... at least something works as it should",
null,
"",
null,
"With sync I lost speed so it is something I will deal with... cant really figure out what Im doing wrong and I dont get any support from here and this is the best I can do. maybe later I will try to solve speed issue.\n\nAt the moment im still fighting with to many bytes received even with sync but only if i read eeprom over 0x1fff so this first needs to be fixed.\n\nCvik_Dasa",
null,
"#7\nJun 10, 2019, 09:40 am\nTook me a while to solve this one",
null,
"After some time I decided to write complete receive part of code from the beginning and it solved my problem with double sync but this time instead of sending one byte as sync I'm sending complete last received string to arduino for comparison.\nIf transmitted and received data are not the same it will replay last transmitted data. It keeps data integrity if something goes wrong.\n\nI did try to increase the speed of reading data from eeprom by reading more than 8-9 bites before sending them over serial but it failed almost immediately so I thought it cant be computer side problem because I did define SerialPort1.ReadBufferSize = 2000000... Should be enough right?\n\nSo I used Due instead of nano and tried to read eeprom again, it failed again as before so what next?\nI started to suspect that maybe arduino serial library causes the problem and decided to rewrite complete code for STM32F446 with atollic studio and HAL drivers and still I got the same result.\n\nAfter quite a bit of time spent on vb net looking for patterns in the data when it fails I find out that serial receives everything from arduino but it only saves around 30 characters in variable and it triggers serial receive event twice so I should read it twice and keep the data like so.\n\nCode: [Select]\n'serial handler\nPublic Sub ReceivedText(ByVal [text] As String)\n\nIf Me.TextBox1.InvokeRequired Then\n\nMe.BeginInvoke(x, New Object() {(text)})\n\nElseIf Not text = \"\" Then\n\nIf Com_port_received_text = \"\" Then\nElse\nCom_port_received_text1 = text 'Read the rest of data\nEnd If\n\nEnd If\ntext = \"\"\n\nEnd Sub\n\nAnd it work as it should so now I can read more than 8 bytes from eeprom and send them over serial.\nAs sweet spot I decide to read 16 bytes in total it seems like I'm getting the best results when comparing how long it takes to read complete eeprom.\n\nAlso I was careful to write code without delays while receiving the data and I'm receiveing data on another thread so basically I did everything I could to get this thing to go as fast as possible. And results are not so great. max transmission rate is 1kB/s.\n\nany way here is edited transmit/receive code\n\nCode: [Select]\ndo {\n\nfor (int vv = 0; vv < 16; vv++) {\n\nii = shiftIn(so_pin, sck, MSBFIRST);\n\nii = '\\0';\n\nif (i >= address_length - 1) {\nvv = 16;\n}\ni++;\n}\n\nResend:\n\nchar buff[readString.length() + 1];\nString readString1 = \"\";\nwhile (!Serial.available());\n\nif (Serial.available()) {\n\nint length = Serial.readBytes(buff, sizeof(buff) - 1);\nbuff[length] = 0;\nString str(buff);\n}\n\ndelay(500);\nSerial.print(\"NOK\");\nSerial.flush();\ndelay(500);\ngoto Resend;\n}\n\nif (i == address_length) {\n\nSerial.print(\"X\");\n}\n\nif (i >= address_length) {\nbreak;\n}\n\n} while (i != address_length);\n\ndelay(100);\nSerial.print(\"X\");\n\nI didn't bother commenting arduino code, I'm sorry\n\nCode: [Select]\n'read data from eeprom\n\nDim DataArray As New ArrayList\nDim ReceivedBits As Integer = 0\n\nRetry:\nSerialPort1.DiscardOutBuffer() 'Empty output and input buffer of serial\nCom_port_received_text1 = \"\" 'Empty vars where serial receive will store data\n\nDo\n\nIf Not Com_port_received_text = \"\" Then 'if something was received\nIf Not Com_port_received_text.Contains(\"NOK\") Then 'and it does not contain \"NOK\"\n\nDim iCnt As Integer = 0\nFor Each character As Char In Com_port_received_text\nIf character = \"h\" Then iCnt += 1 'Get number of h characters received from serial\nNext 'used to count number of bits received from serial\n\nTimerValue = 0\nIf Not iCnt = 16 And ReceivedBits + 16 <= ReadAddress_Count Then 'if there is less than 16bits received\n\nDo 'wait the rest of the data to be received from serial\nIf TimerValue = 10 Then\nGoTo NoResponse 'if nothing was received in 1second then exit loop\nEnd If\nApplication.DoEvents()\nLoop While Com_port_received_text1 = \"\"\n\nEnd If\n\nSerialPort1.Write(Com_port_received_text) 'replay received bits to arduino for verification\nReceivedBits = ReceivedBits + 16 ' count how many bits was received\n\nElse\n\nDataArray.RemoveAt(DataArray.Count - 1) 'if arduino says we got wrong data remove it from array\nThreading.Thread.Sleep(5) 'wait some time for arduino to prepare and send again last bits\nGoTo Retry 'go to the begining to get last bits again\nEnd If\n\nElse\nNoResponse:\nTimerValue = 0\nDo\nIf Com_port_received_text1.Contains(\"NOK\") Then 'if arduino replays with NOK\nEnd If\nIf TimerValue > 100 Then 'if arduino stucks after 10 seconds\nSerialPort1.Write(\"1\") 'write something to get arduino going\nGoTo Retry\nEnd If\nApplication.DoEvents() 'Be there until arduino responds\nLoop While Com_port_received_text1 = \"\" And Com_port_received_text = \"\"\nEnd If\n\nApplication.DoEvents()\nLoop Until Com_port_received_text = \"X\" 'indicates the end of transmission\n\nHere you can see how arduino and pc handles errors",
null,
"Arduino serial = RXD, pc serial = TXD\n\nit is not visible on the image but computer didn't respond received data and arduino waits for respond. After 10s computer realizes that arduino waits for respond and it sends random bite.\nThen arduino send NOK because random bite is not what was sent last time and arduino replays last bytes, then communication keeps going. on the image you can see that error occurred twice.\n\nAt the moment sometimes I'm getting one byte more than I should over serial. By looking at number of positive clock cycles it is clear that arduino sometimes clocks out 8 clocks extra but it happens only if I read more than 100k addresses. Im still fighting with this issue..\n\nIt is close to impossible to track with logic analyzer what causes this problem I made simple progress bar to show number of addresses readed. So if it is a glitch in software or hardware I should be able to see on what address it stuck therefore knowing address I can easily compare data between bin file and logic analyzer.\n\nthis is how it looks",
null,
"Cvik_Dasa",
null,
"#8\nJun 12, 2019, 07:46 am\nHello there, Im back. This time I have some great news, receiving data from eeprom seems to be fail proof.\n\nAt least it seems to be. I did some minor code changes and managed to solve all the problems. In fact im done with part of code used to read from eeprom.\n\nI've tried to mess around with arduino's tx and rx lines while they communicate and I wasn't able to get them to fail. In fact you can disconnect tx and rx lines from pc and when you connect them back arduino will synchronize with pc and continue with transmission.\n\nIve tried to read more than 30 times 4Mb eeprom and it never failed but as last line of defense if it does it is smart enough to pop up error message letting you know that something went wrong.\n\nI'm gonna take some time to clean vb code a bit because it looks like a mess and after that I will continue with coding\n\nGo Up"
] | [
null,
"https://forum.arduino.cc/Themes/default/images/post/clip.png",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley.gif",
null,
"http://i68.tinypic.com/2wlzvxf.png",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley-twist.png",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley-sad.png",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley-confuse.png",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley.gif",
null,
"https://forum.arduino.cc/Themes/default/images/post/clip.png",
null,
"https://forum.arduino.cc/Smileys/arduino/rolleyes.gif",
null,
"https://i.postimg.cc/TY3zD8TS/Untitled.png",
null,
"https://i.postimg.cc/LsxfhZDG/Untitled1.png",
null,
"https://i.postimg.cc/JzP5vhv7/Untitled11.png",
null,
"https://forum.arduino.cc/Smileys/arduino/wink.gif",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null,
"https://forum.arduino.cc/Smileys/arduino/wink.gif",
null,
"http://oi66.tinypic.com/vpb97k.jpg",
null,
"http://oi68.tinypic.com/121ba55.jpg",
null,
"http://oi65.tinypic.com/6sgo03.jpg",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null,
"http://oi63.tinypic.com/29prc5t.jpg",
null,
"http://oi65.tinypic.com/1q00pe.jpg",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley-roll-sweat.png",
null,
"http://oi63.tinypic.com/732oax.jpg",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null,
"https://forum.arduino.cc/Smileys/arduino/smiley-confuse.png",
null,
"http://oi67.tinypic.com/2i6zb10.jpg",
null,
"http://oi66.tinypic.com/oicf3p.jpg",
null,
"https://forum.arduino.cc/Themes/default/images/post/xx.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89078254,"math_prob":0.7821191,"size":6332,"snap":"2019-43-2019-47","text_gpt3_token_len":1517,"char_repetition_ratio":0.1641909,"word_repetition_ratio":0.007827789,"special_character_ratio":0.24384081,"punctuation_ratio":0.08663595,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9734314,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62],"im_url_duplicate_count":[null,null,null,null,null,5,null,5,null,null,null,5,null,null,null,null,null,null,null,null,null,null,null,null,null,5,null,5,null,5,null,null,null,null,null,null,null,5,null,5,null,5,null,null,null,5,null,5,null,8,null,5,null,null,null,null,null,5,null,5,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-15T12:44:29Z\",\"WARC-Record-ID\":\"<urn:uuid:b67048cb-aac3-43a7-9f2d-4e9d36700c74>\",\"Content-Length\":\"127005\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:525d8189-a3c8-451f-83bb-3de3b15b3f55>\",\"WARC-Concurrent-To\":\"<urn:uuid:a33bde92-8cbd-4b62-9608-c770266bcfeb>\",\"WARC-IP-Address\":\"104.20.190.47\",\"WARC-Target-URI\":\"https://forum.arduino.cc/index.php?amp;topic=617211.msg4182525\",\"WARC-Payload-Digest\":\"sha1:CA5BVJEHLKXTTORHOYU2CCIJN2NPSV3L\",\"WARC-Block-Digest\":\"sha1:BILWW2YM7GGROKAAAYXMX6NP4SEQ66WL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986658566.9_warc_CC-MAIN-20191015104838-20191015132338-00276.warc.gz\"}"} |
https://stackoverflow.com/questions/43366842/different-encryption-results-using-c-sharp-and-cryptojs | [
"# Different encryption results using C# and CryptoJS\n\nI encrypt some data using AES in a server application, which is written in C#. I use a predefined key (32 bytes) and IV (16 bytes), for instance...\n\n``````Key: 81fe1681..6a451c1c\nIV: e83c..ae76\n``````\n\nThis is my C# code I use to encrypt the data:\n\n``````async Task<byte[]> Encrypt(string privateKey, string pin, byte[] data)\n{\nusing (var sha = SHA256.Create())\n{\nbyte[] keyHash = sha.ComputeHash(Encoding.UTF8.GetBytes(\\$\"{privateKey}\"));\nbyte[] pinHash = sha.ComputeHash(Encoding.UTF8.GetBytes(\\$\"{pin}\"));\nusing (Aes aes = Aes.Create())\n{\nbyte[] key = keyHash.Slice(0, aes.Key.Length);\nbyte[] iv = pinHash.Slice(0, aes.IV.Length);\nusing (ICryptoTransform transform = aes.CreateEncryptor(key, iv))\nusing (var stream = new MemoryStream())\nusing (var cryptStream = new CryptoStream(stream, transform, CryptoStreamMode.Write))\n{\nawait cryptStream.WriteAsync(data, 0, data.Length);\nawait cryptStream.FlushAsync();\n\nreturn stream.ToArray();\n}\n}\n}\n}\n``````\n\nThe encrypted result data looks like...\n\n``````534c..28f5\n``````\n\nNow, I want to decrypt the data in a client application using CryptoJS. I use the exact same key and IV information, but decryption seems to fail... at least the decrypted result is always empty.\n\nSo, I encrypted the data on the client (of course same key and IV) and in result the ciphered text is different; more precisely it is identical but has more data at the end...\n\n``````534c..28f5bbd5..ac0e\n``````\n\nWhat is this additional data at the end that I don´t get if I encrypt the data on the server?\n\nIf I decrypt the ciphered text that has been encrypted on the client, the decryption works. Just to mention it, mode and padding are default on both server and client, which is `CBC` and `Pkcs7`; keysize should be `256`. This is the code I use to decrypt the data that has been ciphered by the server:\n\n``````let keyHash: WordArray = CryptoJS.SHA256(CryptoJS.enc.Utf8.parse(privateKey));\nlet key: WordArray = CryptoJS.lib.WordArray.create(keyHash.words.slice(0, 8), 32);\n\nlet pinHash: WordArray = CryptoJS.SHA256(CryptoJS.enc.Utf8.parse(pin));\nlet iv: WordArray = CryptoJS.lib.WordArray.create(pinHash.words.slice(0, 4), 16);\n\nlet cfg: CryptoJS.lib.IBlockCipherCfg = { iv: iv };\nlet paramsData: CryptoJS.lib.CipherParamsData = {\nciphertext: cipherBuffer\n};\n\nlet decrypted: WordArray = CryptoJS.AES.decrypt(paramsData, key, cfg);\n``````\n\nFor the write there was a problem with the flushing of the blocks. The `FlushFinalBlock()` is distinct from the `Flush()` (or from the `FlushAsync()`). You have to do them both, or simply dispose the `CryptoStream`. This will solve the fact that the code wasn't writing the last block of data.\n\n``````async static Task<byte[]> Encrypt(string privateKey, string pin, byte[] data)\n{\nusing (var sha = SHA256.Create())\n{\nbyte[] keyHash = sha.ComputeHash(Encoding.UTF8.GetBytes(\\$\"{privateKey}\"));\nbyte[] pinHash = sha.ComputeHash(Encoding.UTF8.GetBytes(\\$\"{pin}\"));\nusing (Aes aes = Aes.Create())\n{\nbyte[] key = keyHash.Slice(0, aes.Key.Length);\nbyte[] iv = pinHash.Slice(0, aes.IV.Length);\n\nTrace.WriteLine(\\$\"Key length: { key.Length }, iv length: { iv.Length }, block mode: { aes.Mode }, padding: { aes.Padding }\");\n\nusing (var stream = new MemoryStream())\nusing (ICryptoTransform transform = aes.CreateEncryptor(key, iv))\n{\nusing (var cryptStream = new CryptoStream(stream, transform, CryptoStreamMode.Write))\n{\nawait cryptStream.WriteAsync(data, 0, data.Length);\n}\n\nreturn stream.ToArray();\n}\n}\n}\n}\n``````\n\nThe typescript code seems to be able to decrypt it.\n\nWorking fiddle: https://jsfiddle.net/uj58twrr/3/\n\n• Thanks. That fixed the problem. – Matze Apr 12 '17 at 11:56"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.69035053,"math_prob":0.9026298,"size":2273,"snap":"2020-45-2020-50","text_gpt3_token_len":593,"char_repetition_ratio":0.13530189,"word_repetition_ratio":0.0,"special_character_ratio":0.27276728,"punctuation_ratio":0.25779626,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98019356,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-30T22:48:34Z\",\"WARC-Record-ID\":\"<urn:uuid:e107bcae-d1a8-47fa-a75e-e5a1e4069a70>\",\"Content-Length\":\"151540\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6e3e6905-9417-45f1-9df0-14ff910db794>\",\"WARC-Concurrent-To\":\"<urn:uuid:bd6e37ec-b655-4489-9f95-33fcaeedfe9a>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://stackoverflow.com/questions/43366842/different-encryption-results-using-c-sharp-and-cryptojs\",\"WARC-Payload-Digest\":\"sha1:RUMA3WFTX2LCAARGOR7TXTONZCQGPTGW\",\"WARC-Block-Digest\":\"sha1:YWEOWGEUASTQ5YQGI5H6P4PWUWUPNDLT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107911792.65_warc_CC-MAIN-20201030212708-20201031002708-00426.warc.gz\"}"} |
http://www.quhasa.com/96263--Two-boats-start-at-the-same-instant-to-cross-a-river-W-metre-wide--The-faster-boat | [
" Two boats start at the same instant to cross a river W metre wide. The faster boat reachesthe other bank and returns back immediately. What are the distances travelled by them when they meet, where the speeds of these boats are b_1& b_2?",
null,
"",
null,
"",
null,
"",
null,
"Two boats start at the same instant to cross a river W metre wide. The faster boat reachesthe other bank and returns back immediately. What are the distances travelled by them when they meet, where the speeds of these boats are b_1& b_2?\n\n1)2W/((b_1+b_2 ) ),2W/((b_1-b_2 ) )\n\n2)2W/((b_1+b_2 ) ) b_1 and 2W/((b_1+b_2 ) ) b_2\n\n3)W/((b_(1+) b_2 ) ) b_1,W/((b_1+b_2 ) ) b_2\n\n4)data insufficient\n\n• : 61\n• : 0\n\n2W/((b_1+b_2 ) ) b_1 and 2W/((b_1+b_2 ) ) b_2"
] | [
null,
"http://www.quhasa.com/images/240x60xgkhindi.png.pagespeed.ic.NDkvIoCnee.png",
null,
"http://www.quhasa.com/images/gkenglishmar.png.pagespeed.ce.nONy0GKwRU.png",
null,
"http://www.quhasa.com/images/240x60xsscmar.png.pagespeed.ic.cwxQP-eal8.png",
null,
"http://www.quhasa.com/images/240x60xUPPSC.png.pagespeed.ic.IIIzJpUrAj.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8500945,"math_prob":0.99088323,"size":1087,"snap":"2019-51-2020-05","text_gpt3_token_len":332,"char_repetition_ratio":0.13111727,"word_repetition_ratio":0.039800994,"special_character_ratio":0.3127875,"punctuation_ratio":0.07826087,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9641807,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-25T06:13:05Z\",\"WARC-Record-ID\":\"<urn:uuid:aa0b8953-6b97-48ee-a071-8c6ce6ba8990>\",\"Content-Length\":\"58303\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5d7d270e-5b58-4cc6-a523-5a2a9caef7d4>\",\"WARC-Concurrent-To\":\"<urn:uuid:ef462cd3-ba88-4d60-8fd9-7e69d22c6056>\",\"WARC-IP-Address\":\"13.232.150.52\",\"WARC-Target-URI\":\"http://www.quhasa.com/96263--Two-boats-start-at-the-same-instant-to-cross-a-river-W-metre-wide--The-faster-boat\",\"WARC-Payload-Digest\":\"sha1:BI3A2BA7PZWD2XPXR4NAS3JWLNHPKTOU\",\"WARC-Block-Digest\":\"sha1:7N5J45VJAO3XO72NABTTVU776WF6MB4L\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251669967.70_warc_CC-MAIN-20200125041318-20200125070318-00241.warc.gz\"}"} |
https://tools.carboncollective.co/future-value/30000-in-5-years/ | [
"# Future Value of $30,000 in 5 Years Calculating the future value of$30,000 over the next 5 years allows you to see how much your principal will grow based on the compounding interest.\n\nSo if you want to save $30,000 for 5 years, you would want to know approximately how much that investment would be worth at the end of the period. To do this, we can use the future value formula below: $$FV = PV \\times (1 + r)^{n}$$ We already have two of the three required variables to calculate this: • Present Value (FV): This is the original$30,000 to be invested\n• n: This is the number of periods, which is 5 years\n\nThe final variable we need to do this calculation is r, which is the rate of return for the investment. With some investments, the interest rate might be given up front, while others could depend on performance (at which point you might want to look at a range of future values to assess whether the investment is a good option).\n\nIn the table below, we have calculated the future value (FV) of $30,000 over 5 years for expected rates of return from 2% to 30%. The table below shows the present value (PV) of$30,000 in 5 years for interest rates from 2% to 30%.\n\nAs you will see, the future value of $30,000 over 5 years can range from$33,122.42 to $111,387.90. Discount Rate Present Value Future Value 2%$30,000 $33,122.42 3%$30,000 $34,778.22 4%$30,000 $36,499.59 5%$30,000 $38,288.45 6%$30,000 $40,146.77 7%$30,000 $42,076.55 8%$30,000 $44,079.84 9%$30,000 $46,158.72 10%$30,000 $48,315.30 11%$30,000 $50,551.74 12%$30,000 $52,870.25 13%$30,000 $55,273.06 14%$30,000 $57,762.44 15%$30,000 $60,340.72 16%$30,000 $63,010.25 17%$30,000 $65,773.44 18%$30,000 $68,632.73 19%$30,000 $71,590.61 20%$30,000 $74,649.60 21%$30,000 $77,812.27 22%$30,000 $81,081.24 23%$30,000 $84,459.17 24%$30,000 $87,948.75 25%$30,000 $91,552.73 26%$30,000 $95,273.91 27%$30,000 $99,115.11 28%$30,000 $103,079.22 29%$30,000 $107,169.15 30%$30,000 \\$111,387.90\n\nThis is the most commonly used FV formula which calculates the compound interest on the new balance at the end of the period. Some investments will add interest at the beginning of the new period, while some might have continuous compounding, which again would require a slightly different formula.\n\nHopefully this article has helped you to understand how to make future value calculations yourself. You can also use our quick future value calculator for specific numbers."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8839602,"math_prob":0.99975914,"size":2498,"snap":"2022-40-2023-06","text_gpt3_token_len":846,"char_repetition_ratio":0.19927827,"word_repetition_ratio":0.025188917,"special_character_ratio":0.47718173,"punctuation_ratio":0.19773096,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9992984,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-05T05:20:38Z\",\"WARC-Record-ID\":\"<urn:uuid:ac8facbd-bf28-4295-8d2c-4dd1a9484aca>\",\"Content-Length\":\"21952\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:64bde97d-3652-416a-a5cf-65003940848a>\",\"WARC-Concurrent-To\":\"<urn:uuid:3d0ce58d-d8a8-49a3-9c06-54105064a80e>\",\"WARC-IP-Address\":\"138.197.3.89\",\"WARC-Target-URI\":\"https://tools.carboncollective.co/future-value/30000-in-5-years/\",\"WARC-Payload-Digest\":\"sha1:E45P4VAPC7W2WYRRLD2PPB4HORHMYXKY\",\"WARC-Block-Digest\":\"sha1:SRV3JDXDREKGZZ6AE5UV4UOIJPLWIYHJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337537.25_warc_CC-MAIN-20221005042446-20221005072446-00138.warc.gz\"}"} |
https://izolacja-natryskowa.pl/prix/442_1647232169_Mar/ | [
" vertical moulin calculation\nVotre emplacement:Poductsvertical moulin calculation\n\n# vertical moulin calculation\n\n•",
null,
"### Vertical and FOIL Methods for Multiplying Two Binomials\n\nAnother method that works for all polynomials is the Vertical Method. It is very much like the method you use to multiply whole numbers. Look carefully at this example of multiplying two-digit numbers. You start by multiplying 23 23 by 6 6 to get 138 138.\n\nget price\n•",
null,
"### Section 3. HYDRAULIC DESIGN A. Weirs and Orifices\n\nd. Instructions for Hydraulic Calculations Most procedures for calculating hydraulic grade line profiles are based on the Bernoulli equation. This equation can be expressed as follows: in which D = Vertical distance from invert to H.G.L So = Invert slope L\n\nget price\n•",
null,
"### Vertical CurvesVertical Curves Learn Civil Engineering\n\nAt one section of a highway an equal tangent verticalAt one section of a highway an equal tangent vertical curve must be designed to connect grades of +1.0% and 2.0%. Determine the length of curve required assuming that the SSD = 220.6m. Answer: Assume that L > SSD (general assumption), then; L m = A (SSD2/658) = 3(220.6)2 / 658= 221.9m\n\nget price\n•",
null,
"### EPA On-line Tools for Site Assessment Calculation\n\nThe vertical gradient calculator determines vertical gradients between adjacent wells. (They are assumed to be located very close together; for wells far apart use one of the horizontal gradient calculators.) It illustrates the effects of screen length on gradient calculations. These differences come about because the gradients are\n\nget price\n•",
null,
"### Example Calculations\n\nExample Calculations Appendix K includes example calculations for the Road Design Manual. The examples are numbered to correspond with the associated chapter material, as described below. • Sight Distance (Chapter 2) • Horizontal Alignment (Chapter 3) • Vertical Alignment (Chapter 4) • Roadside Safety (Chapter 9)\n\nget price\n•",
null,
"### VERTICAL CURVES\n\nEase of computation of vertical offsets, which permits easily computed curve elevations. The general equation of the parabolais y = ax2+ bx + c The slope of this curve at any point is given by the first derivative, dy/dx = 2ax + b The rate of change of\n\nget price\n•",
null,
"### Calculating Flow into Vertical Pipe Storm/Flood\n\nMar 13, 2009 RE: Calculating Flow into Vertical Pipe Drew08 (Civil/Environmental) 13 Mar 09 15:03 The weir coefficient 'C' mathematically equals: C =Fg^0.5/(1+F^2/2)^(3/2), where F is the Froude number for any given energy head 'H' and Flow 'Q' in a rectangular channel.\n\nget price\n•",
null,
"### CalcTool: Gravity-fed pipe flow calculator\n\nThis calc is mainly for pipes full with water at ambient temperature and under turbulent flow. If you know the slope rather than the pipe length and drop, then enter \"1\" in \"Length\" and enter the slope in \"Drop\". If the cunduit is not a full circular pipe, but you know the hydraulic radius, then enter (Rh×4) in \"Diameter\".\n\nget price\n•",
null,
"### Vertical Analysis Formula (Example) Financial Statement\n\nIn the vertical analysis of financial statements, the percentage is calculated by using the below formula: Vertical Analysis formula = Individual Item / Base Amount *100 Vertical analysis formula for the Income Statement and Balance Sheet are given below Vertical Analysis Formula(Income Statement) = Income Statement Item / Total Sales * 100\n\nget price\n•",
null,
"### Vertical (common-size) analysis of financial statements\n\nIn a vertical analysis the percentage is computed by using the following formula: Percentage of base = (Amount of individual item/Amount of base item) × 100 A basic vertical analysis needs an individual statement for a reporting period but comparative statements may be prepared to increase the usefulness of the analysis.\n\nget price\n•",
null,
"### Window Mullions vs. Window Muntins\n\nMuntin refers to the vertical dividers that separate glass panes in a window. Muntin applies only to the inner vertical pieces; the outer pieces that form the frame are stiles and rails. Even though muntins today are most frequently associated with windows,they can mean any kind of vertical divider, whether for windows,wood panels\n\nget price\n•",
null,
"### Ekman surface drift under the influence of waves and\n\nCurrents are calculating using a 1D vertical models, following Ekman 1905, with no horizontal variations, no stratification and steady state. 1] 1980's, Model without waves 2000's, Larger mixing, function of the wave age For fully developed waves, the mixing can be calculate directly from the wind.\n\nget price\n•",
null,
"### Assessment of Left Ventricular Ejection Fraction\n\nTo assess left ventricular ejection fraction (LVEF) accurately, cardiac magnetic resonance (CMR) can be indicated and lays on the evaluation of multiple slices of the left ventricle in short axis (CMR SAX).The objective of this study was to assess another method consisting of the evaluation of 2 long-axis slices (CMR LAX) for LVEF determination in acute myocardial infarction.\n\nget price\n•",
null,
"### ECT vs Mullen Test for box strength single, double\n\nThe ECT and Mullen Test both test for box strength. The difference between them is the type of strength measured. Top to bottom vs burst strength. In-house ISTA testing from Nelson Container can test both.\n\nget price\n•",
null,
"### The Sandy Glacier Cave Project: The Study Of Glacial\n\nto calculate an approximate ice volume, or ice mass, lost annually in that section of glacier. For example, using the dimensions of the Cerebus Moulin in Pure Imagination Cave as recorded in July 2012, the air volume of the vertical passage was 2259.6 m³. The volume calculated using the 2013 survey of this\n\nget price\n•",
null,
"### Vertical dimension of occlusion: the keys to decision\n\nvertical dimension of occlusion (VDO) is often referred to as 27 bd Jean Moulin 13555Marseille cedex 7, France. Calculation of correspondence between variation of VDO at the second molar\n\nget price\n•",
null,
"### Milling (machining) Wikipedia\n\nMilling is the process of machining using rotary cutters to remove material by advancing a cutter into a work piece. This may be done varying direction on one or several axes, cutter head speed, and pressure. Milling covers a wide variety of different operations and machines, on scales from small individual parts to large, heavy-duty gang milling operations.\n\nget price\n•",
null,
"### Aerosol vertical distribution, optical properties and dust\n\nJul 01, 2019 Vertical profil of the aerosol extinction coefficient at 532 nm derived from the ground-based and the CALIOP lidar around Ersa station for the 1st July 2012. The dust layer is located above with a vertical extension of 3 km from 1.8 km to about 4.8 km AMSL.\n\nget price\n•",
null,
"### Experimental and CFD Analysis of Non Newtonian\n\nApr 02, 2014 Yamamoto et al. , Moulin et al. . Moulin et al. studied the wall shear stress by using four types of tube geometry, i.e., straight, torus, helical and woven, and concluded that the helical geometry gives more wall shear stress. Guan and Martonen simulated by using CFD to observed the developing length of velocity patterns and\n\nget price\n•",
null,
"### Ice calving Wikipedia\n\nIce calving, also known as glacier calving or iceberg calving, is the breaking of ice chunks from the edge of a glacier. It is a form of ice ablation or ice disruption.It is the sudden release and breaking away of a mass of ice from a glacier, iceberg, ice front, ice shelf, or crevasse.The ice that breaks away can be classified as an iceberg, but may also be a growler, bergy bit, or a crevasse\n\nget price\n•",
null,
"### Gust loads on aircraft The Aeronautical Journal\n\nGust loads on aircraft Volume 123 Issue 1266. 1.0 INTRODUCTION. Aviation meteorology has been an important area in the aeronautical research field since the time of the first flight by the Wright brothers (Reference Dines 1).Meteorological conditions, such as gust (Reference Etkin 2), icing (Reference Cao, Wu, Su and Xu 3), heavy rain (Reference Cao, Wu and Xu 4), etc., have been well known\n\nget price\n•",
null,
"### Direct observations of evolving subglacial drainage\n\nOct 01, 2014 Moulin hydraulic head and associated ice velocity data plotted every 15 min over the course of the measurement periods for 2011 (a) and 2012 (b).\n\nget price\n•",
null,
"Write a polynomial function of minimum degree in standard form with real coefficients whose zeros and their multiplicities include those listed.\n\nget price\n•",
null,
"### GT Georgia Institute of Technology :: Campus Calendar\n\nFrom there, the water is often -- but not always -- directed into moulins, near-vertical shafts that connect to the bed of the ice sheet hundreds of meters below. Moulins drain large catchments of surface meltwater -- typically 10-30 km2, or ten Georgia Tech campuses -- and thus have a controlling influence on basal hydrology.\n\nget price\n•",
null,
"### Window Mullions vs. Window Muntins\n\nMuntin refers to the vertical dividers that separate glass panes in a window. Muntin applies only to the inner vertical pieces; the outer pieces that form the frame are stiles and rails. Even though muntins today are most frequently associated with windows,they can mean any kind of vertical divider, whether for windows,wood panels\n\nget price\n•",
null,
"### Ekman surface drift under the influence of waves and\n\nCurrents are calculating using a 1D vertical models, following Ekman 1905, with no horizontal variations, no stratification and steady state. 1] 1980's, Model without waves 2000's, Larger mixing, function of the wave age For fully developed waves, the mixing can be calculate directly from the wind.\n\nget price\n•",
null,
"### ECT vs Mullen Test for box strength single, double\n\nThe ECT and Mullen Test both test for box strength. The difference between them is the type of strength measured. Top to bottom vs burst strength. In-house ISTA testing from Nelson Container can test both.\n\nget price\n•",
null,
"### Vertical dimension of occlusion: the keys to decision\n\nvertical dimension of occlusion (VDO) is often referred to as 27 bd Jean Moulin 13555Marseille cedex 7, France. Calculation of correspondence between variation of VDO at the second molar\n\nget price\n•",
null,
"### Cage Crinoline Naergi's Costuming Site\n\nThe first two lines you will have to paint (either digitally or manually on your Xeroxed copy) are the waist- and bottom hem circumferences. For the waist, calculate the from the waist circumference (in this case, 85cm) the diameter with the help of your calculation of choice (website, software, manually; as\n\nget price\n•",
null,
"### Aerosol vertical distribution, optical properties and dust\n\nJul 01, 2019 Vertical profil of the aerosol extinction coefficient at 532 nm derived from the ground-based and the CALIOP lidar around Ersa station for the 1st July 2012. The dust layer is located above with a vertical extension of 3 km from 1.8 km to about 4.8 km AMSL.\n\nget price\n•",
null,
"### Gust loads on aircraft The Aeronautical Journal\n\nGust loads on aircraft Volume 123 Issue 1266. 1.0 INTRODUCTION. Aviation meteorology has been an important area in the aeronautical research field since the time of the first flight by the Wright brothers (Reference Dines 1).Meteorological conditions, such as gust (Reference Etkin 2), icing (Reference Cao, Wu, Su and Xu 3), heavy rain (Reference Cao, Wu and Xu 4), etc., have been well known\n\nget price\n•",
null,
"### Experimental and CFD Analysis of Non Newtonian\n\nApr 02, 2014 Yamamoto et al. , Moulin et al. . Moulin et al. studied the wall shear stress by using four types of tube geometry, i.e., straight, torus, helical and woven, and concluded that the helical geometry gives more wall shear stress. Guan and Martonen simulated by using CFD to observed the developing length of velocity patterns and\n\nget price\n•",
null,
"### Ice calving Wikipedia\n\nIce calving, also known as glacier calving or iceberg calving, is the breaking of ice chunks from the edge of a glacier. It is a form of ice ablation or ice disruption.It is the sudden release and breaking away of a mass of ice from a glacier, iceberg, ice front, ice shelf, or crevasse.The ice that breaks away can be classified as an iceberg, but may also be a growler, bergy bit, or a crevasse\n\nget price\n•",
null,
"1, rue du Vieux Moulin BP 10063 F 67400 ILLKIRCH GRAFFENSTADEN Cedex Phone +33 (0) 3 88 67 60 00 Fax +33 (0) 3 88 67 06 17 flender-graff\n\nget price\n•",
null,
"### Direct observations of evolving subglacial drainage\n\nOct 01, 2014 Moulin hydraulic head and associated ice velocity data plotted every 15 min over the course of the measurement periods for 2011 (a) and 2012 (b).\n\nget price\n•",
null,
"### Numerical investigation of co- and counter-propagating\n\nJun 01, 2012 Moulin and Flor used three-dimensional ray-tracing of interactions between large-scale internal waves and a Rankine-type vortex having a Gaussian vertical distribution of vertical vorticity and found relatively weak vortices caused wave refraction while relatively strong vortices trapped some waves in the rotating motion of the vortex.\n\nget price\n•",
null,
"### Eco-chemical mechanisms govern phytoplankton emissions of\n\nJun 23, 2020 Quantitative relationships between DMS, Chl-a and pH in the 100 lakes in the eastern plain of China and the global surface oceans. (a) Relationships between LogChl-a and LogDMS in the 100 lakes, with a breakpoint of DMS at Chl-a = 5.04 ± 0.45 mg m −3, slope 1 in lakes = 1.22 and slope 2 in lakes = –1.00.(b) Relationships between LogChl-a and LogDMS in ocean surface water, with a\n\nget price\n•",
null,
"### The Craziest Vertical Takeoffs Ever! The Most Incredible\n\nThe most unbelievable and amazing vertical takeoffs. Have a look at airplanes taking off at critical angle climbing steeply. DON'T FORGET TO SUBSCRIBE AND...\n\nget price"
] | [
null,
"https://izolacja-natryskowa.pl/pic/tonya/118.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/214.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/157.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/23.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/184.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/239.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/81.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/265.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/272.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/83.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/91.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/255.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/30.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/62.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/103.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/24.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/69.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/50.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/257.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/245.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/227.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/260.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/205.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/82.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/91.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/255.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/62.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/24.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/219.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/50.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/227.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/257.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/245.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/88.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/260.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/263.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/10.jpg",
null,
"https://izolacja-natryskowa.pl/pic/tonya/178.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89057827,"math_prob":0.8764515,"size":11449,"snap":"2022-27-2022-33","text_gpt3_token_len":2721,"char_repetition_ratio":0.12477064,"word_repetition_ratio":0.4639066,"special_character_ratio":0.2309372,"punctuation_ratio":0.10497238,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9597658,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,2,null,2,null,1,null,2,null,1,null,2,null,1,null,2,null,2,null,2,null,2,null,2,null,1,null,1,null,2,null,2,null,2,null,2,null,1,null,2,null,2,null,2,null,2,null,1,null,2,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-14T22:33:53Z\",\"WARC-Record-ID\":\"<urn:uuid:d0034fc1-c7ce-491e-be78-3f611162c5d0>\",\"Content-Length\":\"43186\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f9ed01ab-f638-4895-b108-6628b87995fb>\",\"WARC-Concurrent-To\":\"<urn:uuid:de5f4385-ef8c-4995-addc-322651db6d15>\",\"WARC-IP-Address\":\"172.67.206.4\",\"WARC-Target-URI\":\"https://izolacja-natryskowa.pl/prix/442_1647232169_Mar/\",\"WARC-Payload-Digest\":\"sha1:NSDNTEC6M5MYOZMVIY6EET2EGUFQWRWH\",\"WARC-Block-Digest\":\"sha1:PA5OULHEEOPF4M6BV34F7RGZQR4W45DV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882572077.62_warc_CC-MAIN-20220814204141-20220814234141-00174.warc.gz\"}"} |
https://www.litscape.com/word_analysis/outracing | [
"# outracing in Scrabble®\n\nThe word outracing is playable in Scrabble®, no blanks required. Because it is longer than 7 letters, you would have to play off an existing word or do it in several moves.\n\nOUTRACING\n(135)\n\n## Seven Letter Word Alert: (14 words)\n\nauction, carting, caution, coating, crating, curtain, orating, organic, outgain, outgrin, rainout, routing, touring, tracing\n\nOUTRACING\n(135)\nOUTRACING\n(117)\nOUTRACING\n(90)\nOUTRACING\n(78)\nOUTRACING\n(52)\nOUTRACING\n(48)\nOUTRACING\n(48)\nOUTRACING\n(48)\nOUTRACING\n(45)\nOUTRACING\n(39)\nOUTRACING\n(39)\nOUTRACING\n(39)\nOUTRACING\n(39)\nOUTRACING\n(36)\nOUTRACING\n(36)\nOUTRACING\n(32)\nOUTRACING\n(32)\nOUTRACING\n(30)\nOUTRACING\n(30)\nOUTRACING\n(30)\nOUTRACING\n(30)\nOUTRACING\n(28)\nOUTRACING\n(28)\nOUTRACING\n(28)\nOUTRACING\n(28)\nOUTRACING\n(28)\nOUTRACING\n(28)\nOUTRACING\n(26)\nOUTRACING\n(26)\nOUTRACING\n(26)\nOUTRACING\n(26)\nOUTRACING\n(26)\nOUTRACING\n(24)\nOUTRACING\n(24)\nOUTRACING\n(24)\nOUTRACING\n(20)\nOUTRACING\n(20)\nOUTRACING\n(17)\nOUTRACING\n(16)\nOUTRACING\n(16)\nOUTRACING\n(16)\nOUTRACING\n(16)\nOUTRACING\n(16)\nOUTRACING\n(15)\nOUTRACING\n(15)\nOUTRACING\n(15)\n\nOUTRACING\n(135)\nOUTRACING\n(117)\nCARTING\n(90 = 40 + 50)\nOUTRACING\n(90)\nTRACING\n(90 = 40 + 50)\nCOATING\n(90 = 40 + 50)\nCRATING\n(90 = 40 + 50)\nORGANIC\n(90 = 40 + 50)\nCRATING\n(89 = 39 + 50)\nCOATING\n(89 = 39 + 50)\nORGANIC\n(89 = 39 + 50)\nTRACING\n(89 = 39 + 50)\nCARTING\n(89 = 39 + 50)\nTRACING\n(89 = 39 + 50)\nTRACING\n(86 = 36 + 50)\nAUCTION\n(86 = 36 + 50)\nCAUTION\n(86 = 36 + 50)\nCURTAIN\n(86 = 36 + 50)\nCAUTION\n(86 = 36 + 50)\nCARTING\n(86 = 36 + 50)\nAUCTION\n(86 = 36 + 50)\nORGANIC\n(86 = 36 + 50)\nCRATING\n(86 = 36 + 50)\nCURTAIN\n(86 = 36 + 50)\nCOATING\n(86 = 36 + 50)\nCOATING\n(83 = 33 + 50)\nORGANIC\n(83 = 33 + 50)\nCRATING\n(83 = 33 + 50)\nORGANIC\n(83 = 33 + 50)\nCARTING\n(83 = 33 + 50)\nCRATING\n(83 = 33 + 50)\nCOATING\n(83 = 33 + 50)\nTRACING\n(83 = 33 + 50)\nTRACING\n(83 = 33 + 50)\nCOATING\n(83 = 33 + 50)\nTRACING\n(83 = 33 + 50)\nCARTING\n(83 = 33 + 50)\nCARTING\n(83 = 33 + 50)\nCOATING\n(83 = 33 + 50)\nTRACING\n(83 = 33 + 50)\nCARTING\n(83 = 33 + 50)\nCARTING\n(83 = 33 + 50)\nTRACING\n(83 = 33 + 50)\nCARTING\n(83 = 33 + 50)\nORGANIC\n(83 = 33 + 50)\nORGANIC\n(83 = 33 + 50)\nCRATING\n(83 = 33 + 50)\nORGANIC\n(83 = 33 + 50)\nCRATING\n(83 = 33 + 50)\nCRATING\n(83 = 33 + 50)\nCRATING\n(83 = 33 + 50)\nCOATING\n(83 = 33 + 50)\nCOATING\n(83 = 33 + 50)\nORGANIC\n(83 = 33 + 50)\nORATING\n(82 = 32 + 50)\nOUTGAIN\n(82 = 32 + 50)\nROUTING\n(82 = 32 + 50)\nTOURING\n(82 = 32 + 50)\nOUTGRIN\n(82 = 32 + 50)\nAUCTION\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nORATING\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nOUTGAIN\n(80 = 30 + 50)\nOUTGRIN\n(80 = 30 + 50)\nTOURING\n(80 = 30 + 50)\nTRACING\n(80 = 30 + 50)\nOUTGRIN\n(80 = 30 + 50)\nCARTING\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nCRATING\n(80 = 30 + 50)\nROUTING\n(80 = 30 + 50)\nORGANIC\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nOUTGAIN\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nCURTAIN\n(80 = 30 + 50)\nCAUTION\n(80 = 30 + 50)\nCOATING\n(80 = 30 + 50)\nAUCTION\n(80 = 30 + 50)\nORGANIC\n(78 = 28 + 50)\nCRATING\n(78 = 28 + 50)\nCARTING\n(78 = 28 + 50)\nORGANIC\n(78 = 28 + 50)\nRAINOUT\n(78 = 28 + 50)\nOUTRACING\n(78)\nCOATING\n(78 = 28 + 50)\nTOURING\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nTOURING\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nTOURING\n(77 = 27 + 50)\nAUCTION\n(77 = 27 + 50)\nCAUTION\n(77 = 27 + 50)\nOUTGAIN\n(77 = 27 + 50)\nOUTGAIN\n(77 = 27 + 50)\nTOURING\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nOUTGRIN\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nOUTGRIN\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nOUTGAIN\n(77 = 27 + 50)\nOUTGRIN\n(77 = 27 + 50)\nOUTGRIN\n(77 = 27 + 50)\nOUTGRIN\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nTOURING\n(77 = 27 + 50)\nOUTGRIN\n(77 = 27 + 50)\nOUTGAIN\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nOUTGAIN\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nROUTING\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nORATING\n(77 = 27 + 50)\nOUTGAIN\n(77 = 27 + 50)\nCURTAIN\n(77 = 27 + 50)\nTOURING\n(77 = 27 + 50)\nTOURING\n(77 = 27 + 50)\nCARTING\n(76 = 26 + 50)\nCOATING\n(76 = 26 + 50)\nORGANIC\n(76 = 26 + 50)\nCOATING\n(76 = 26 + 50)\nCURTAIN\n(76 = 26 + 50)\nCOATING\n(76 = 26 + 50)\nCAUTION\n(76 = 26 + 50)\nCARTING\n(76 = 26 + 50)\nCARTING\n(76 = 26 + 50)\nCRATING\n(76 = 26 + 50)\nCRATING\n(76 = 26 + 50)\nTRACING\n(76 = 26 + 50)\nORGANIC\n(76 = 26 + 50)\nORGANIC\n(76 = 26 + 50)\nCRATING\n(76 = 26 + 50)\nAUCTION\n(76 = 26 + 50)\nCARTING\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nCAUTION\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nCARTING\n(74 = 24 + 50)\nOUTGAIN\n(74 = 24 + 50)\nCURTAIN\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nCAUTION\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nORGANIC\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nORGANIC\n(74 = 24 + 50)\nORATING\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nCOATING\n(74 = 24 + 50)\nCURTAIN\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nCOATING\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nCARTING\n(74 = 24 + 50)\nTOURING\n(74 = 24 + 50)\nCOATING\n(74 = 24 + 50)\nCRATING\n(74 = 24 + 50)\nCRATING\n(74 = 24 + 50)\nRAINOUT\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nAUCTION\n(74 = 24 + 50)\nCOATING\n(74 = 24 + 50)\nCRATING\n(74 = 24 + 50)\nCARTING\n(74 = 24 + 50)\nCARTING\n(74 = 24 + 50)\nCRATING\n(74 = 24 + 50)\nORGANIC\n(74 = 24 + 50)\nCARTING\n(74 = 24 + 50)\nCRATING\n(74 = 24 + 50)\nCOATING\n(74 = 24 + 50)\nCOATING\n(74 = 24 + 50)\nORGANIC\n(74 = 24 + 50)\nCRATING\n(74 = 24 + 50)\nTRACING\n(74 = 24 + 50)\nROUTING\n(74 = 24 + 50)\nOUTGRIN\n(74 = 24 + 50)\nAUCTION\n(72 = 22 + 50)\n\n# outracing in Words With Friends™\n\nThe word outracing is playable in Words With Friends™, no blanks required. Because it is longer than 7 letters, you would have to play off an existing word or do it in several moves.\n\nOUTRACING\n(234)\n\n## Seven Letter Word Alert: (14 words)\n\nauction, carting, caution, coating, crating, curtain, orating, organic, outgain, outgrin, rainout, routing, touring, tracing\n\nOUTRACING\n(234)\nOUTRACING\n(144)\nOUTRACING\n(108)\nOUTRACING\n(84)\nOUTRACING\n(76)\nOUTRACING\n(72)\nOUTRACING\n(72)\nOUTRACING\n(72)\nOUTRACING\n(68)\nOUTRACING\n(66)\nOUTRACING\n(64)\nOUTRACING\n(64)\nOUTRACING\n(60)\nOUTRACING\n(60)\nOUTRACING\n(60)\nOUTRACING\n(48)\nOUTRACING\n(48)\nOUTRACING\n(48)\nOUTRACING\n(40)\nOUTRACING\n(40)\nOUTRACING\n(40)\nOUTRACING\n(36)\nOUTRACING\n(36)\nOUTRACING\n(36)\nOUTRACING\n(34)\nOUTRACING\n(34)\nOUTRACING\n(32)\nOUTRACING\n(32)\nOUTRACING\n(32)\nOUTRACING\n(32)\nOUTRACING\n(32)\nOUTRACING\n(32)\nOUTRACING\n(28)\nOUTRACING\n(24)\nOUTRACING\n(23)\nOUTRACING\n(23)\nOUTRACING\n(22)\nOUTRACING\n(21)\nOUTRACING\n(21)\nOUTRACING\n(21)\nOUTRACING\n(21)\nOUTRACING\n(20)\nOUTRACING\n(20)\nOUTRACING\n(20)\nOUTRACING\n(20)\nOUTRACING\n(19)\nOUTRACING\n(19)\nOUTRACING\n(19)\nOUTRACING\n(19)\nOUTRACING\n(19)\nOUTRACING\n(18)\nOUTRACING\n(18)\nOUTRACING\n(17)\n\nOUTRACING\n(234)\nOUTRACING\n(144)\nTRACING\n(110 = 75 + 35)\nORGANIC\n(110 = 75 + 35)\nOUTRACING\n(108)\nCAUTION\n(107 = 72 + 35)\nTRACING\n(104 = 69 + 35)\nCARTING\n(104 = 69 + 35)\nCRATING\n(104 = 69 + 35)\nCOATING\n(104 = 69 + 35)\nCURTAIN\n(101 = 66 + 35)\nAUCTION\n(101 = 66 + 35)\nOUTGAIN\n(98 = 63 + 35)\nTRACING\n(98 = 63 + 35)\nCOATING\n(98 = 63 + 35)\nORGANIC\n(98 = 63 + 35)\nCOATING\n(98 = 63 + 35)\nCRATING\n(98 = 63 + 35)\nTRACING\n(98 = 63 + 35)\nTRACING\n(98 = 63 + 35)\nCARTING\n(98 = 63 + 35)\nCRATING\n(98 = 63 + 35)\nOUTGRIN\n(98 = 63 + 35)\nORGANIC\n(98 = 63 + 35)\nCARTING\n(98 = 63 + 35)\nCURTAIN\n(95 = 60 + 35)\nCAUTION\n(95 = 60 + 35)\nCRATING\n(92 = 57 + 35)\nOUTGAIN\n(92 = 57 + 35)\nTOURING\n(92 = 57 + 35)\nCOATING\n(92 = 57 + 35)\nCARTING\n(92 = 57 + 35)\nROUTING\n(92 = 57 + 35)\nOUTGRIN\n(92 = 57 + 35)\nCOATING\n(92 = 57 + 35)\nCRATING\n(92 = 57 + 35)\nTRACING\n(92 = 57 + 35)\nCARTING\n(92 = 57 + 35)\nORATING\n(89 = 54 + 35)\nCAUTION\n(89 = 54 + 35)\nCURTAIN\n(89 = 54 + 35)\nAUCTION\n(89 = 54 + 35)\nCURTAIN\n(89 = 54 + 35)\nAUCTION\n(89 = 54 + 35)\nCRATING\n(87 = 52 + 35)\nORGANIC\n(87 = 52 + 35)\nCOATING\n(87 = 52 + 35)\nCARTING\n(87 = 52 + 35)\nCARTING\n(87 = 52 + 35)\nORGANIC\n(87 = 52 + 35)\nCRATING\n(87 = 52 + 35)\nTRACING\n(87 = 52 + 35)\nORGANIC\n(87 = 52 + 35)\nCRATING\n(87 = 52 + 35)\nTRACING\n(87 = 52 + 35)\nCOATING\n(87 = 52 + 35)\nCARTING\n(87 = 52 + 35)\nTRACING\n(87 = 52 + 35)\nCOATING\n(87 = 52 + 35)\nCOATING\n(86 = 51 + 35)\nTRACING\n(86 = 51 + 35)\nRAINOUT\n(86 = 51 + 35)\nTRACING\n(86 = 51 + 35)\nROUTING\n(86 = 51 + 35)\nROUTING\n(86 = 51 + 35)\nROUTING\n(86 = 51 + 35)\nTOURING\n(86 = 51 + 35)\nTOURING\n(86 = 51 + 35)\nCOATING\n(86 = 51 + 35)\nTOURING\n(86 = 51 + 35)\nORGANIC\n(86 = 51 + 35)\nOUTGRIN\n(86 = 51 + 35)\nCRATING\n(86 = 51 + 35)\nCARTING\n(86 = 51 + 35)\nCARTING\n(86 = 51 + 35)\nOUTGRIN\n(86 = 51 + 35)\nCRATING\n(86 = 51 + 35)\nOUTGRIN\n(86 = 51 + 35)\nORGANIC\n(86 = 51 + 35)\nOUTGAIN\n(86 = 51 + 35)\nOUTGAIN\n(86 = 51 + 35)\nOUTGAIN\n(86 = 51 + 35)\nOUTRACING\n(84)\nCURTAIN\n(83 = 48 + 35)\nCURTAIN\n(83 = 48 + 35)\nCAUTION\n(83 = 48 + 35)\nCURTAIN\n(83 = 48 + 35)\nORATING\n(83 = 48 + 35)\nAUCTION\n(83 = 48 + 35)\nCURTAIN\n(83 = 48 + 35)\nCURTAIN\n(83 = 48 + 35)\nAUCTION\n(83 = 48 + 35)\nCAUTION\n(83 = 48 + 35)\nCURTAIN\n(83 = 48 + 35)\nAUCTION\n(83 = 48 + 35)\nAUCTION\n(83 = 48 + 35)\nORATING\n(83 = 48 + 35)\nCAUTION\n(83 = 48 + 35)\nAUCTION\n(83 = 48 + 35)\nCAUTION\n(83 = 48 + 35)\nCAUTION\n(83 = 48 + 35)\nCAUTION\n(83 = 48 + 35)\nAUCTION\n(83 = 48 + 35)\nORGANIC\n(80 = 45 + 35)\nORGANIC\n(80 = 45 + 35)\nORGANIC\n(80 = 45 + 35)\nCARTING\n(80 = 45 + 35)\nORGANIC\n(80 = 45 + 35)\nCOATING\n(80 = 45 + 35)\nORGANIC\n(80 = 45 + 35)\nTRACING\n(80 = 45 + 35)\nCRATING\n(80 = 45 + 35)\nCARTING\n(80 = 45 + 35)\nTOURING\n(80 = 45 + 35)\nCARTING\n(80 = 45 + 35)\nTOURING\n(80 = 45 + 35)\nOUTGRIN\n(80 = 45 + 35)\nROUTING\n(80 = 45 + 35)\nROUTING\n(80 = 45 + 35)\nOUTGAIN\n(80 = 45 + 35)\nOUTGRIN\n(80 = 45 + 35)\nRAINOUT\n(80 = 45 + 35)\nOUTGRIN\n(80 = 45 + 35)\nCRATING\n(80 = 45 + 35)\nTRACING\n(80 = 45 + 35)\nCOATING\n(80 = 45 + 35)\nCRATING\n(80 = 45 + 35)\nCOATING\n(80 = 45 + 35)\nOUTGAIN\n(80 = 45 + 35)\nOUTGAIN\n(80 = 45 + 35)\nROUTING\n(79 = 44 + 35)\nOUTGRIN\n(79 = 44 + 35)\nTOURING\n(79 = 44 + 35)\nROUTING\n(79 = 44 + 35)\nOUTGAIN\n(79 = 44 + 35)\nTOURING\n(79 = 44 + 35)\nTOURING\n(79 = 44 + 35)\nOUTGRIN\n(79 = 44 + 35)\nOUTGAIN\n(79 = 44 + 35)\nROUTING\n(79 = 44 + 35)\nOUTGAIN\n(79 = 44 + 35)\nOUTGRIN\n(79 = 44 + 35)\nCRATING\n(77 = 42 + 35)\nAUCTION\n(77 = 42 + 35)\nCURTAIN\n(77 = 42 + 35)\nCAUTION\n(77 = 42 + 35)\nCAUTION\n(77 = 42 + 35)\nCAUTION\n(77 = 42 + 35)\nAUCTION\n(77 = 42 + 35)\nAUCTION\n(77 = 42 + 35)\nAUCTION\n(77 = 42 + 35)\nORATING\n(77 = 42 + 35)\nORATING\n(77 = 42 + 35)\nCURTAIN\n(77 = 42 + 35)\nCAUTION\n(77 = 42 + 35)\nORATING\n(77 = 42 + 35)\nCOATING\n(77 = 42 + 35)\nCARTING\n(77 = 42 + 35)\nORGANIC\n(77 = 42 + 35)\nCURTAIN\n(77 = 42 + 35)\nOUTRACING\n(76)\nCURTAIN\n(75 = 40 + 35)\nORATING\n(75 = 40 + 35)\nORATING\n(75 = 40 + 35)\nTRAGIC\n(75)\nORATING\n(75 = 40 + 35)\nCAUTION\n(75 = 40 + 35)\nAUCTION\n(75 = 40 + 35)\nTOURING\n(74 = 39 + 35)\nTOURING\n(74 = 39 + 35)\nTOURING\n(74 = 39 + 35)\nROUTING\n(74 = 39 + 35)\nOUTGAIN\n(74 = 39 + 35)\nROUTING\n(74 = 39 + 35)\nOUTGAIN\n(74 = 39 + 35)\nRAINOUT\n(74 = 39 + 35)\nROUTING\n(74 = 39 + 35)\nRAINOUT\n(74 = 39 + 35)\nOUTGRIN\n(74 = 39 + 35)\nOUTGRIN\n(74 = 39 + 35)\nRAINOUT\n(74 = 39 + 35)\nRAINOUT\n(74 = 39 + 35)\nRAINOUT\n(74 = 39 + 35)\nTOURING\n(74 = 39 + 35)\nROUTING\n(74 = 39 + 35)\nORGANIC\n(73 = 38 + 35)\nCARTING\n(73 = 38 + 35)\nCRATING\n(73 = 38 + 35)\nTRACING\n(73 = 38 + 35)\nCOATING\n(73 = 38 + 35)\nOUTRACING\n(72)\nOUTRACING\n(72)\nOUTRACING\n(72)\nCOUGAR\n(72)\nORATING\n(71 = 36 + 35)\nORATING\n(71 = 36 + 35)\nRAINOUT\n(71 = 36 + 35)\nORATING\n(71 = 36 + 35)\nORATING\n(71 = 36 + 35)\nRAINOUT\n(71 = 36 + 35)\n\n# Word Growth involving outracing\n\n## Shorter words in outracing\n\nout\n\nin acing racing tracing\n\n## Longer words containing outracing\n\n(No longer words found)"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8920166,"math_prob":1.0000097,"size":885,"snap":"2020-34-2020-40","text_gpt3_token_len":248,"char_repetition_ratio":0.24971624,"word_repetition_ratio":0.6451613,"special_character_ratio":0.20338982,"punctuation_ratio":0.21686748,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999254,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-21T00:44:53Z\",\"WARC-Record-ID\":\"<urn:uuid:7d6bc2b3-6629-49d3-9d8f-aba132d08c38>\",\"Content-Length\":\"161874\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dd0c8808-fdbc-4960-9c86-bf5276b8c61b>\",\"WARC-Concurrent-To\":\"<urn:uuid:9b0ad11c-1541-4b8b-83b8-d19687b3f63b>\",\"WARC-IP-Address\":\"172.67.184.45\",\"WARC-Target-URI\":\"https://www.litscape.com/word_analysis/outracing\",\"WARC-Payload-Digest\":\"sha1:IXVGF4QVIPCABDQ5ENIM72MCXGL3T2RQ\",\"WARC-Block-Digest\":\"sha1:7ZN6IGKB32A23FBOJHSBHFZS5SLWHCSL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400198868.29_warc_CC-MAIN-20200920223634-20200921013634-00376.warc.gz\"}"} |
http://www.tutorteddy.com/courses/coursera-course-mathematical-biostatistics-boot-camp1.php | [
"",
null,
"",
null,
"",
null,
"",
null,
"Like us for free solutions* Tweet",
null,
"",
null,
"",
null,
"# Coursera Course: Mathematical Biostatistics Boot Camp 1",
null,
"## University: Johns Hopkins University\n\n### Mathematical Biostatistics Classroom Session by Tutorteddy.com\n\nEven though the course from www.coursera.com provides the necessary guidance needed by the students, they will need some extra assistance outside the given course guidelines. In order to understand the lessons better a student will need some actual class sessions. These classroom sessions are provided by tutorteddy.com based on the courses of Coursera. Students can interact with professional instructors can get their queries answered and learn faster.\n\n### Coursera Course Description:\n\nThe course introduces us to the fundamentals of probability and statistical concepts that are used in the elementary data analysis. This particular course is an introductory level and is intended for the students having junior or senior college-level mathematical training that includes a practical knowledge of the calculus. A little knowledge about linear algebra and programming beforehand is an added advantage for the students, but it is not a necessity.\n\nThe knowledge of Statistics has become quite important nowadays as it provides the fundamental language of all experimental research. Biostatistics is a special field of statistics that can be applied to the biomedical sciences and research.\n\nBoth mathematical and statistical topics are included in this course to aid the students to understand biostatistics in details. After completion of the course, students will get a clear idea and good understanding about the assumptions, goals, advantages and disadvantages of probability modeling in the medical sciences. All these will help the students to approach new statistical topics and will help a lot to build a strong concept for future self learning and applications.\n\nThe following topics are included:\n\n• The fundamentals and basics of probability theory.\n\n• What are random variables?\n\n• Discrete and Continuous distributions.\n\n• Finding expectations and variances.\n\n• Idea of independence and independent events\n\n• Likelihood and basic inferences on confidence intervals.\n\n### Course Syllabus\n\nThe course emphasizes on applying core statistical concepts and methods to biostatistics and quantitative scientists.\n\n• Basics of biostatistics and fundamentals of probability distributions and the properties of them are included which helps the students to build their basic knowledge.\n\n• Inclusion of the idea of statistical likelihood.\n\n• The concepts of confidence intervals are also provided.\n\n• Students will know about the display and communication of statistical data that includes graphical representation of data and exploratory data analysis that makes use of the tools like box plots and scatter plots to display multivariate data.\n\n### Recommended Background\n\nA prerequisite for the class is to have moderate level mathematical literacy, knowledge of set theory and calculus. An idea about programming is also useful though it is not required.\n\n### Course Format\n\nLectures and homework assignments forms the basis of the course.\n\n### FAQ\n\nIs knowledge of Calculus a necessity for the course?\n\nYes",
null,
"TutorTeddy.com & Boston Predictive Analytics\n\n[ Email your Statistics or Math problems to tutor@aafter.com (camera phone photos are OK) ]\n\nBoston Office (Near MIT/Kendall 'T'):\nCambridge Innovation Center,",
null,
""
] | [
null,
"https://tutorteddy.com/images/logo1.png",
null,
"https://tutorteddy.com/images/tutorteddy-testimonial.gif",
null,
"https://seal-dallas.bbb.org/logo/sehzbum/tutorteddycom-90243630.png",
null,
"https://tutorteddy.com/images/verification_seal.gif",
null,
"https://tutorteddy.com/images/side-mau-bar-top2.jpg",
null,
"https://tutorteddy.com/images/side-mau-bar-bottom2.jpg",
null,
"https://tutorteddy.com/images/right-column-top.jpg",
null,
"https://tutorteddy.com/images/right-column-horizon-hr1.gif",
null,
"https://tutorteddy.com/images/right-column-bottom.jpg",
null,
"https://tutorteddy.com/images/logo1.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90043926,"math_prob":0.6497491,"size":3220,"snap":"2021-04-2021-17","text_gpt3_token_len":589,"char_repetition_ratio":0.13557214,"word_repetition_ratio":0.0042462847,"special_character_ratio":0.16645962,"punctuation_ratio":0.083657585,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9576477,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-22T10:19:05Z\",\"WARC-Record-ID\":\"<urn:uuid:e2e7e603-4c22-43c5-8696-abbedddb0218>\",\"Content-Length\":\"35256\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:73020cae-638b-4c3a-a31b-59a2c5c8ed4b>\",\"WARC-Concurrent-To\":\"<urn:uuid:eb53a4a4-155c-49be-83f2-db3fc172b11e>\",\"WARC-IP-Address\":\"64.182.113.215\",\"WARC-Target-URI\":\"http://www.tutorteddy.com/courses/coursera-course-mathematical-biostatistics-boot-camp1.php\",\"WARC-Payload-Digest\":\"sha1:ZTGVHH3WF5AZHLVJH7DXF527554XSCYP\",\"WARC-Block-Digest\":\"sha1:ZQ6IJQ42WKSPXROKYS6RSXDK4SH7XAG3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703529179.46_warc_CC-MAIN-20210122082356-20210122112356-00670.warc.gz\"}"} |
http://www.sciencehq.com/chemistry-worksheets/worksheet-on-order-of-reaction.html | [
"# Worksheet on Order of reaction\n\nThe sum of powers to which the concentration terms are raised in order to determine the rate of the reaction is known as order of reaction.\n\nThere are three orders of reaction:\n1. First Order Reaction\n\n2. Second Order Reaction\n\n3. Third Order of reaction\n\nQuestions:\n\n1. The rate of the reaction",
null,
"$A + B + C \\to \\text{Products}$ is given by:",
null,
"$r = \\dfrac{d[A]}{dt} = k[A]^{1/2} [B]^{1/3} [C]^{1/4}$\n\nThe order of reaction is:\n\n(a) 1\n\n(b) 3\n\n(c) 5\n\n(d) 13/12\n\n2. Which one of the following statements about the order of a reaction is true?\n\n(a) The order of a reaction can only be determined by experiment\n\n(b) The order of a reaction increases with increase in temperature\n\n(c) A second order reaction is also bimolecular t\n\n(d) the order of a reaction can be determined from the balanced equation i ( )\n\n3. The second order rate constant is usually expressed as:\n\n(a)",
null,
"$mole^{-1} \\hspace{3mm}litre^{-1} \\hspace{3mm} sec^{-1}$\n\n(b)",
null,
"$mole \\hspace{3mm}litre^{-1} \\hspace{3mm} sec^{-1}$\n\n(c)",
null,
"$mole \\hspace{3mm}litre \\hspace{3mm} sec^{-1}$\n\n(d)",
null,
"$mole^{-1} litre \\hspace{3mm}sec^{-1}$\n\n4. Which of the following is a first order reaction?\n\n(a)",
null,
"$NH_4NO_2 \\to N_2 + 2H_2O$\n\n(b)",
null,
"$2HI \\leftrightharpoons H_2 + I_2$\n\n(c)",
null,
"$2NO + O_2 \\to 2NO_2$\n\n(d)",
null,
"$2NO_2 \\to 2NO + O_2$\n\n5. The rate constant of a reaction is",
null,
"$1.2 \\times 10^{-2} mol^{-2} litre^{2} sec^{-1}$. The order of reaction is:\n\n(a) 1\n\n(b) Zero\n\n(c) 2\n\n(d) 3\n\n6. A reaction involving two different reactants:\n\n(a) Can never be a bimolecular reaction\n\n(b) Can never be a first order reaction\n\n(c) Can never be a unimolecular reaction\n\n(d) Can never be a second order reaction\n\n7. Order of a reaction is:\n\n(a) Equal to the sum of the concentration terms in the rate equation\n\n(b) Equal to the sum of the concentration terms in the stoichiometric\n\n(c) Always equal to the molecularity of the reaction\n\n(d) Equal to the sum of the powers of the concentration terms in the rate equation\n\n8. What will be the order of the reaction if doubling the concentration of a reactant increases the rate by a factor of 4 and trebling the concentration of the reactant by a factor of 9?\n\n(a) Zero order\n\n(b) First order\n\n(c) Second order\n\n(d) Third order\n\n9. The rate of reaction",
null,
"$A + B \\to \\text{Products}$ is given by the equation",
null,
"$r = k[A][B]$. If B is taken in large excess, the order of the reaction would be:\n\n(a) 0\n\n(b) 1\n\n(c) 2\n\n(d) Unpredictable\n\n10. The one which is unimolecular reaction is:\n\n(a)",
null,
"$H_2 + Cl_2 \\to 2HCl$\n\n(b)",
null,
"$H_2O_2 \\to H_2O + 1/2O_2$\n\n(c)",
null,
"$2HCl \\to H_2 + Cl$\n\n(d)",
null,
"$PCl_3 + Cl_2 \\to PCl_3$\n\n11. For a given reaction",
null,
"$t_{1/2} = 1/ka^2$. The order of theis reaction is:\n\n(a) 1\n\n(b) 3\n\n(c) 2\n\n(d) Zero\n\n12. A first order reaction is half-completed in 45 minutes. How long does it need for 99.9% of the reaction to be completed?\n\n(a) 20 hours\n\n(b) 5 hours\n\n(c)",
null,
"$7 \\dfrac{1}{2}$ hours\n\n(d) 10 hours\n\n13. For the first order reaction, half-life is 14s. The time required for the initial concentration to reduce to 1 / 8th of its value is:\n\n(a)",
null,
"$(14)^3 s$\n\n(b) 42\n\n(c) 28 s\n\n(d)",
null,
"$(14)^2 s$\n\n14. Which of the following is correct for a first order reaction?\n\n(a)",
null,
"$t_{1} \\propto 1/a$\n\n(b)",
null,
"$t_{1/2} \\propto a$\n\n(c)",
null,
"$t_{1/2} \\propto a^0$\n\n(d)",
null,
"$t_{1/2} \\propto 1/a^2$\n\n15. The rate constant for a first order reaction whose half-life is 480 sec is:\n\n(a)",
null,
"$1.44 sec^{-1}$\n\n(b)",
null,
"$1.44 \\times 10^{-3} sec^{-1}$\n\n(c)",
null,
"$0.72 \\times 10^{-3} sec^{-1}$\n\n(d)",
null,
"$2.88 \\times 10^{-3} sec^{-1}$\n\n1.(d) 2. (a) 3. (d) 4. (a) 5. (d)\n\n6. (c) 7. (d) 8. (c) 9. (b) 10. (b)\n\n11. (c) 12. (c) 13. (b) 14. (c) 15. (b)\n\nRelated posts:\n\n1. Second order Reaction A reaction is said to be the second order if...\n2. Order of Reaction The order of reaction may be defined as the sum...\n3. Third Order Reaction A reaction is said to be of third order if...\n4. Zero Order Reaction Zero Order Reaction If the rate of reaction is independent...\n5. Determination of order of Reaction There are at least four different methods to ascertain the..."
] | [
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null,
"http://s.wordpress.com/latex.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8730039,"math_prob":0.9996486,"size":3169,"snap":"2019-51-2020-05","text_gpt3_token_len":879,"char_repetition_ratio":0.23475513,"word_repetition_ratio":0.1,"special_character_ratio":0.29662353,"punctuation_ratio":0.11353712,"nsfw_num_words":2,"has_unicode_error":false,"math_prob_llama3":0.9989912,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-21T12:10:55Z\",\"WARC-Record-ID\":\"<urn:uuid:90f76c62-a0da-4570-a1e1-8a926fb53aca>\",\"Content-Length\":\"15659\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4065c8c6-bc03-4ee6-b05d-12267e7f3f5e>\",\"WARC-Concurrent-To\":\"<urn:uuid:c6af73dc-57d4-4330-b53b-b263390364de>\",\"WARC-IP-Address\":\"72.52.184.177\",\"WARC-Target-URI\":\"http://www.sciencehq.com/chemistry-worksheets/worksheet-on-order-of-reaction.html\",\"WARC-Payload-Digest\":\"sha1:SQBGCJTISV6HSHMLIKU5D2WW46TQWH4O\",\"WARC-Block-Digest\":\"sha1:DNDCLDHCYBM6FNJC6RKFUW53XRTN3Y4P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250603761.28_warc_CC-MAIN-20200121103642-20200121132642-00174.warc.gz\"}"} |
https://studyres.com/doc/464529/chapter-4.1-notes--apply-triangle-sum-properties | [
"Survey\n\n* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project\n\nDocument related concepts\nno text concepts found\nTranscript\n```Lessons 4.1 and 4.2\nTriangle Sum Properties &\nProperties of Isosceles Triangles\n-Classify triangles and find measures of their\nangles.\n- Discover the properties of Isosceles Triangles.\nHOMEWORK:\nLesson 4.1/1-9 and\n4.2/1-10\nClassification By Sides\nClassification By Angles\nClassifying Triangles\nIn classifying triangles, be as specific as possible.\nAcute,\nScalene\nObtuse,\nIsosceles\nTriangle Sum Theorem **NEW\nThe sum of the measures of the interior\nangles of a triangle is 180o.\n1\n3\n2\nm<1 + m<2 + m<3 = 180°\nProperty of triangles\nThe sum of all the angles\nequals 180º degrees.\n60º\n90º\n+\n30º\n180º\n60º\n90º\n30º\nProperty of triangles\nThe sum of all the angles\nequals 180º degrees.\n60º\n60º\n+\n60º\n180º\n60º\n60º\n60º\nWhat is the missing angle?\n70º\n70º\n+\n?\n180º\n?\n70º\n70º\n180 – 140 = 40˚\nWhat is the missing angle?\n?\n30º\n90º\n90º\n30º\n+\n?\n180º\n180 – 120 = 60˚\nWhat is the missing angle?\n?\n60º\n60º\n60º\n60º\n+\n?\n180º\n189 – 120 = 60˚\nWhat is the missing angle?\n?\n78º\n30º\n180 – 108 = 72˚\n30º\n78º\n+\n?\n180º\nFind all the angle measures\n35x\n45x\n180 = 35x + 45x + 10x\n180 = 90x\n2=x\n10x\n90°, 70°, 20°\nWhat can we find out?\non the ground at a\n75º angle. At what\nangle is the top of\nthe building?\n180 = 75 + 90 + x\n180 = 165 + x\n15˚ = x\n75\nCorollary to Triangle Sum Theorem\ncorollary\nA\nis a statement\nthat readily follows from a theorem.\nThe acute angles of a right triangle are\ncomplementary.\nm∠A + m∠B = 90o\nFind the missing angles.\nThe tiled staircase shown below forms a right triangle.\nThe measure of one acute angle in the triangle is twice the\nmeasure of the other angle.\nFind the measure of each acute angle.\nCon’t\nFind the missing angles.\nSOLUTION:\n2x + x = 90\n3x = 90\nx = 30˚\n2x = 60˚\nFind the missing angles.\n2x + (x – 6) = 90˚\n3x – 6 = 90\n3x = 96\nx = 32\n2x = 2(32) = 64˚\n(x – 6) = 32 – 6 = 26˚\nIsosceles Triangle\nat least two sides have the same length\n5m\n5m\n5m\n9 in\n9 in\n4 in\n4 miles\nProperties of an Isosceles Triangle\n Has at least 2 equal sides\n Has 2 equal angles\n Has 1 line of symmetry\nParts of an Isosceles Triangle:\nThe vertex\nangle is the\nangle between\ntwo congruent\nsides\nParts of an Isosceles Triangle:\nThe base angles\nare the angles\nopposite the\ncongruent sides\nParts of an Isosceles Triangle:\nThe base is\nthe side\nopposite the\nvertex angle\nIsosceles Triangle Conjecture\nIf a triangle is isosceles, then base angles\nare congruent.\nIf\nthen\nConverse of Isosceles Triangle Conjecture\nIf a triangle has two congruent angles,\nthen it is an isosceles triangle.\nIf\nthen\nEquilateral Triangle\nTriangle with all three sides are\ncongruent\n7 ft\n7 ft\n7 ft\nEquilateral Triangle Conjecture\nAn equilateral triangle is equiangular, and\nan equiangular triangle is equilateral.\nFind the missing angle measures.\n<68° and < a are base angles \nthey are congruent\nb\nma = 68˚\nTriangle sum to find <b\nm<b = 180 – 68 - 68\nm<b = 180 -136\nmb = 44˚\n68˚\na\nFind the missing angle measures.\n<c & <d are base angles and are congruent\nTriangle sum = 180°\n180 = 119 + c + d\n180 – 119 = c + d\n61 = c + d\nmc = 30.5˚\n<c = ½ (61) = 30.5\n<d = ½ (61) = 30.5\n119˚\nmd = 30.5˚\nc\nd\nFind the missing angle measures.\nEFG is an equilateral triangle\n<E = <F = <G\n180 /3 = 60\nE\nmE = 60˚\nmF = 60˚\nmG = 60˚\nF\nG\nFind the missing angle measures.\nFind mG.\n∆GHJ is isosceles\n<G=<J\nx + 44 = 3x\n44 = 2x\nx = 22\nThus m<G = 22 + 44 = 66°\nAnd m<J = 3(22) = 66°\nFind the missing angle measures.\nFind mN\nBase angles are =\n6y = 8y – 16\n-2y = -16\ny= 8\nThus m<N = 6(8) = 48°.\nm<P = 8(8) – 16 = 48°\nFind the missing angle measures.\nUsing Properties of Equilateral Triangles\nFind the value of x.\n∆LKM is equilateral\nm<K = m<L = m<M\n180/3 = 60°\n2x + 32 = 60\n2x = 37\nx = 18.5°\nFind the missing side measures.\nUsing Properties of Equilateral Triangles\nFind the value of y.\n∆NPO is equiangular\n∆NPO is also equilateral.\nft\n5y – 6 = 4y +12\ny – 6 = 12\ny = 18\nSide NO = 5(18) – 6 = 90ft\nft\nFind the missing angle measures.\nUsing the symbols describing shapes answer the following questions:\nb\n45o\n36o\na\nc\nd\nIsosceles triangle\nTwo angles are equal\nEquilateral triangle\nall angles are equal\nRight-angled triangle\na = 36o\nb = 180 – (2 × 36)\n= 108o\nc = 180 ÷ 3 = 60o\nd = 180 – (45 + 90)\n= 45o\nFind the missing angle measures.\nA\nA\na = 64o\nb = 180 – (2 ×64o )\n= 52o\nD\nB\nC\nB\nC Equilateral triangle\nc=d\nc + d = 180 - 72\nc + d = 108\nc = d = 54o\ne = f = g = 60o\nD\nh=i\nh + i = 180 - 90\nh + i = 90\nh = i = 45o\np = 50o\nq = 180 – (2 ×50o ) = 80o\nr = q = 80o\nTherefore :\nvertical angles are equal\ns = t = p = 50o\nFind theProperties\nmissing\nangle measures.\nof Triangles\np = q = r = 60o\n60o\na = b= c =\nd = 180 – 60 = 120o\ne + 18 = a = 60\ns = t = 180 - 43 = 68.5o\n2\nexterior angle = sum of remote interior angles\ne = 60 – 18 = 42o\nFind the missing angle measures.\nB\n1) Find the value of x\nz\n2) Find the value of y\n1) x is a base angle\n180 = x + x + 50\n130 = 2x\nx = 65°\nA\n50°\ny°\nx°\nC\n2) y & z are remote interior angles\nand base angles of an isosceles\ntriangle\nTherefore: y + z = x and y = z\ny + z = 80°\ny = 40°\nD\nFind the missing angle measures.\n1) Find the value of x\n2) Find the value of y\n1) ∆CDE is equilateral\nAll angles = 60°\nUsing Linear Pair\n<BCD = 70°\nx is the vertex angle\nx = 180 – 70 – 70\nx = 40°\nA\nB\ny\nD\nx\n70°\n50 60°\nC\n2) y is the vertex angle\ny = 180 – 100\ny = 80°\nE\nHomework"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7115071,"math_prob":0.9998296,"size":5538,"snap":"2021-21-2021-25","text_gpt3_token_len":1946,"char_repetition_ratio":0.20780629,"word_repetition_ratio":0.09869494,"special_character_ratio":0.40032503,"punctuation_ratio":0.07049608,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999962,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-11T07:29:07Z\",\"WARC-Record-ID\":\"<urn:uuid:aeeca627-a07d-4bef-a5c1-ed304a413bae>\",\"Content-Length\":\"37579\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6bd91eee-eeaf-4bf5-8522-77bb9c44d9d3>\",\"WARC-Concurrent-To\":\"<urn:uuid:d043b2c6-fb1b-447b-ac7f-c4d5eb5901d7>\",\"WARC-IP-Address\":\"172.67.151.140\",\"WARC-Target-URI\":\"https://studyres.com/doc/464529/chapter-4.1-notes--apply-triangle-sum-properties\",\"WARC-Payload-Digest\":\"sha1:NSVL7TYYAVG5XDW5CPGVGN5QF7COIY3Q\",\"WARC-Block-Digest\":\"sha1:TAPHUUUHOKL7YVKBSY3RJBMURWDPIANR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243991904.6_warc_CC-MAIN-20210511060441-20210511090441-00425.warc.gz\"}"} |
https://www.printablemultiplication.com/tag/free-printable-multiplication-chart-0-12/ | [
"## Free Printable Multiplication Chart Up To 12\n\nUnderstanding multiplication after counting, addition, and subtraction is ideal. Youngsters discover arithmetic using a organic progression. This progress of discovering arithmetic is generally the following: counting, addition, subtraction, multiplication, and finally division. This declaration leads to the question why find out arithmetic with this series?…\n\n## Printable Multiplication Chart 0-12\n\nApplying free multiplication worksheets is a superb technique to add some wide variety for your homeschooling. So long as you tend not to overload your kids with worksheets, nearly all of them get pleasure from the challenge of beating their very best time. To make…\n\n## Free Printable Multiplication Chart 0 12\n\nFree Printable Multiplication Chart 0 12 – Multiplication worksheets are an efficient technique to help kids in training their multiplication expertise. The multiplication tables that kids discover make up the standard basis where a number of other innovative and more recent ideas are explained in…\n\n## Printable Multiplication Chart Free\n\nUtilizing free multiplication worksheets is a superb strategy to add some selection to your homeschooling. Provided that you do not overload your kids with worksheets, nearly all of them get pleasure from the challenge of beating their finest time. To utilize these kinds of worksheets…\n\n## Printable Multiplication Chart Free\n\nPrintable Multiplication Chart Free – Multiplication worksheets are a highly effective strategy to support young children in exercising their multiplication expertise. The multiplication tables that kids discover make up the standard foundation where many other innovative and modern methods are taught in later steps. Multiplication…\n\n## Free Printable Multiplication\n\nFree Printable Multiplication – Multiplication worksheets are an effective approach to help young children in rehearsing their multiplication capabilities. The multiplication tables that kids discover make up the standard base which various other sophisticated and modern concepts are explained in in the future levels. Multiplication…\n\n## Free Printable Multiplication Chart\n\nFree Printable Multiplication Chart – Multiplication worksheets are a powerful strategy to support young children in training their multiplication expertise. The multiplication tables that kids find out make up the simple basis on which a number of other advanced and more modern concepts are taught…\n\n## Multiplication Chart Printable Free\n\nLearning multiplication right after counting, addition, and subtraction is perfect. Children discover arithmetic using a organic progression. This growth of understanding arithmetic is often the pursuing: counting, addition, subtraction, multiplication, and lastly division. This assertion brings about the query why discover arithmetic within this pattern?…\n\n## Multiplication Chart 0-12\n\nLearning multiplication right after counting, addition, and subtraction is ideal. Kids discover arithmetic by way of a all-natural progression. This advancement of learning arithmetic is usually the subsequent: counting, addition, subtraction, multiplication, lastly department. This statement results in the issue why understand arithmetic within this…\n\n## Free And Printable Multiplication Chart\n\nDiscovering multiplication soon after counting, addition, as well as subtraction is perfect. Youngsters discover arithmetic through a organic progression. This progress of studying arithmetic is often the following: counting, addition, subtraction, multiplication, lastly section. This assertion brings about the question why find out arithmetic with…"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91073406,"math_prob":0.7224827,"size":3615,"snap":"2022-27-2022-33","text_gpt3_token_len":617,"char_repetition_ratio":0.21074495,"word_repetition_ratio":0.24539877,"special_character_ratio":0.1604426,"punctuation_ratio":0.10036496,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9669009,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-04T09:28:43Z\",\"WARC-Record-ID\":\"<urn:uuid:5b61c650-16e8-4495-acdf-92707197c1a9>\",\"Content-Length\":\"72825\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1b178399-7787-4d44-a05b-c59d3b17d4fc>\",\"WARC-Concurrent-To\":\"<urn:uuid:f6aba045-b965-4685-aa08-b66f5a79c23a>\",\"WARC-IP-Address\":\"172.67.165.73\",\"WARC-Target-URI\":\"https://www.printablemultiplication.com/tag/free-printable-multiplication-chart-0-12/\",\"WARC-Payload-Digest\":\"sha1:N5AMTIZOEI4Y3WVCG47CZDR5CIXVY6FM\",\"WARC-Block-Digest\":\"sha1:K2XY6L5NOIJGUWIFJCZADNW2UN4RQTBM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104364750.74_warc_CC-MAIN-20220704080332-20220704110332-00087.warc.gz\"}"} |
https://rrtutors.com/site/commentsAll/like-decimals | [
"# Which of the following are like decimals?\n\na) 1.7,2.35,7.135,5.50\n\nb) 0.9,0.99,9.99,9.999\n\nc) 3.2,4.8,5.2,6.7\n\nd) 0.5,0.56,0.567,0.5678\n\n•",
null,
"September 23, 2020\n\nBefore going to write answer, firt we need to know What is Like Decimals and UnLike Decimals\n\nLike Decimals\n\nDecimals having the same number of decimal places are called like decimals i.e. decimals having the same number of digits on the right of the decimal point are known as like decimals\n\nUnlike Decimals\n\nDecimals having different number of decimals places are called Unlike decimals\n\nSo in the given above options\n\na) 1.7, 2.35, 7.135, 5.50\n\nb) 0.9, 0.99, 9.99, 9.999\n\nd) 0.5, 0.56, 0.567, 0.5678\n\nthese options having different number of decimals places\n\noption c) 3.2,4.8,5.2,6.7\n\nhaving the same number of decimals afer decimal point,\n\nso option C is like decimal\n\nWe can convert UnLike Decimals inot Like decimals like below\n\na) 1.7, 2.35, 7.135, 5.50 these are unlike decimals to convert them to Like decimals\n\n1.700\n\n2.350\n\n7.135\n\n5.500\n\nNow these are Like decimals\n\nComment"
] | [
null,
"https://image.freepik.com/free-vector/businessman-profile-cartoon_18591-58479.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.68806267,"math_prob":0.9980264,"size":956,"snap":"2023-40-2023-50","text_gpt3_token_len":347,"char_repetition_ratio":0.21638656,"word_repetition_ratio":0.06,"special_character_ratio":0.36924687,"punctuation_ratio":0.25266904,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98043,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-06T17:40:30Z\",\"WARC-Record-ID\":\"<urn:uuid:437351f2-24d2-41ec-b633-49e18e99cb60>\",\"Content-Length\":\"89839\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d3d85984-4e2b-4364-95af-32a78c2429be>\",\"WARC-Concurrent-To\":\"<urn:uuid:bf18d354-9659-454d-b9f4-8fee0cdb5bbf>\",\"WARC-IP-Address\":\"148.66.137.22\",\"WARC-Target-URI\":\"https://rrtutors.com/site/commentsAll/like-decimals\",\"WARC-Payload-Digest\":\"sha1:IEIZXV5M7JZ5NOS4CZSIKIFTRCIA7BJD\",\"WARC-Block-Digest\":\"sha1:FVDLGMJZHOJUT2PPYVXR7X7Q4FTHYCJW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100602.36_warc_CC-MAIN-20231206162528-20231206192528-00353.warc.gz\"}"} |
https://ok-em.com/function-for-iq-35 | [
"# Equation for iq\n\nIQ is short for intelligence quotient. IQ is a total score derived from a set of standardized tests or subtests designed to assess human intelligence.\n\n## Student testimonials",
null,
"The Ultimate IQ Test Guide: Popular Tests & Scales\n\nHe was also keen to multiply the result by 100, so the final equation for IQ is (mental age) / (chronological age) X 100. Indeed, an IQ of 130 sounds much cooler than an IQ of 1.3. This\n\nFast solutions\n\nLooking for a fast solution? We have you covered. Our team of experts can provide you with the answers you need, quickly and efficiently.\n\nIf you have a question, we have the answer! Our team of experts are here to help you with whatever you need.\n\nSolve algebra\n\nAlgebra can be difficult to wrap your head around, but once you understand the basics, it can be a breeze.",
null,
"",
null,
"## Intelligence quotient\n\nAverage intelligence – IQ score equation. 1. Differentiation in intelligence is occurring across the world and the average intelligence of a person has been increasing rapidly\n\n## The formula for calculation of Intelligence Quotient (IQ) is\n\nthe average IQ range for adults is between 100 and 130 What is considered a genius IQ? There is no definitive answer to this question as it depends on a person’s definition\n\n## The IQ of person is given by the formula, IQ = m / c × 100\n\n{{@N-H2TEXT@}}\n\n605 Math Teachers\n95% Satisfaction rate\n36559+ Completed orders"
] | [
null,
"https://ok-em.com/images/989b3c44d1af1c9b/jiqpbglnkfoamhecd-img-7.png",
null,
"data:image/svg+xml,%3csvg%20xmlns=%27http://www.w3.org/2000/svg%27%20version=%271.1%27%20width=%27500%27%20height=%27400%27/%3e",
null,
"https://ok-em.com/images/989b3c44d1af1c9b/beqkgcjdlnpmfaiho-ask.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.96618587,"math_prob":0.8372178,"size":1475,"snap":"2022-40-2023-06","text_gpt3_token_len":338,"char_repetition_ratio":0.09313392,"word_repetition_ratio":0.0,"special_character_ratio":0.23389831,"punctuation_ratio":0.106796116,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9725445,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,1,null,null,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-27T17:47:35Z\",\"WARC-Record-ID\":\"<urn:uuid:442554bf-b8c2-43f7-bc85-e28da37cd7a2>\",\"Content-Length\":\"17587\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e26dc451-e3b2-4a08-ac3f-a3b801d4f8ca>\",\"WARC-Concurrent-To\":\"<urn:uuid:ac007458-5886-431f-9b27-d43fa25c4c9b>\",\"WARC-IP-Address\":\"170.178.164.176\",\"WARC-Target-URI\":\"https://ok-em.com/function-for-iq-35\",\"WARC-Payload-Digest\":\"sha1:WY6DZTDH3CN7DZSVZPHCOHWOEPIA22BI\",\"WARC-Block-Digest\":\"sha1:NOMU7W6WVNIRL7CC6NROF36GUNHWFRGG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764495001.99_warc_CC-MAIN-20230127164242-20230127194242-00065.warc.gz\"}"} |
http://scholarpedia.org/article/Magnetorotational_instability | [
"# Magnetorotational instability\n\nPost-publication activity\n\nCurator: Steven A. Balbus\n\nThis article will briefly cover: theory and applications of the magnetorotational instability in astro- and geophysics, highlighting its historical role in understanding the onset of turbulence in accretion disks. Current laboratory experiments designed to reveal the instability in liquid metals will also be discussed.\n\n## Introduction\n\nGases or liquids containing mobile electrical charges are subject to the influence of a magnetic field. In addition to hydrodynamical forces such as pressure and gravity, an element of magnetized fluid also feels the Lorentz force $$\\boldsymbol J\\times\\boldsymbol B\\ ,$$ where $$\\boldsymbol J$$ is the current density and $$\\boldsymbol B$$ is the magnetic field vector. If the fluid is in a state of differential rotation about a fixed origin, this Lorentz force can be surprisingly disruptive, even if the magnetic field is very weak. In particular, if the angular velocity of rotation $$\\Omega$$ decreases with radial distance $$R\\ ,$$ the motion is unstable: a fluid element undergoing a small displacement from circular motion experiences a destabilizing force that increases at a rate which is itself proportional to the displacement. This process is known as the Magnetorotational Instability, or \"MRI\".\n\nThe MRI is important in astrophysical settings, where differentially rotating systems are very common and magnetic fields are ubiquitous. In particular, thin disks of gas are often found around forming stars or in binary star systems, where they are known as accretion disks. Accretion disks are also commonly present in the centre of galaxies, and in some cases can be extremely luminous: quasars, for example, are thought to originate from a gaseous disk surrounding a very massive black hole. Our modern understanding of the MRI arose from attempts to understand the behavior of accretion disks in the presence of magnetic fields; it is now understood that the MRI is likely to occur in a very wide variety of different systems.\n\nThe dynamics of what is now called the MRI were first studied in the 1950s by Chandrasekhar (Chandrasekhar 1953; 1961) and Velikhov (Velikhov, 1959). Although there was some follow-up work in later decades (Fricke, 1969; Acheson and Hide 1972; Acheson and Gibbons 1978), the generality and power of the instability were not fully appreciated until 1991, when Balbus & Hawley (Balbus and Hawley, 1991) gave a relatively simple elucidation and physical explanation of this important process. Since that time, the MRI has been extensively studied in many astrophysical environments.\n\n## What causes the MRI?",
null,
"Figure 1: The magnetorotational instability. Magnetic fields in a disk bind fluid elements precisely as though they were masses in orbit connected by a spring. The inner element mi orbits faster than the outer element mo, even though the former has less angular momentum. Thus, the spring causes a net transfer of angular momentum from mi to mo. This transfer is unstable, as described in the text. The inner mass continues to sink, whereas the outer mass rises farther outward. (Courtesy of H. Ji)\n\nIn a magnetized, perfectly conducting fluid, the magnetic forces behave in some very important respects as though the elements of fluid were connected with elastic bands: trying to displace such an element perpendicular to a magnetic line of force causes an attractive force proportional to the displacement, like a string under tension. Normally, such a force is restoring, a strongly stabilizing influence that would allow a type of magnetic wave to propagate. If the fluid medium is not stationary but rotating, however, attractive forces can actually be destabilizing. The MRI is a consequence of this surprising behavior.\n\nConsider, for example, two masses, mi and mo connected by a spring under tension, both masses in orbit abound a central body, Mc. In such a system, the angular velocity of circular orbits near the center is higher than the angular velocity of orbits farther from the center, but the angular momentum of the lower orbits is smaller than that of the higher orbits. If mi is allowed to orbit a little bit closer to the centre than mo, it will have a slightly higher angular velocity. The connecting spring will pull back on mi, and drag mo forward. This means that mi experiences a retarding torque, loses angular momentum, and must fall to an orbit of smaller radius, corresponding to a smaller angular momentum. mo, on the other hand, experiences a positive torque, acquires more angular momentum, and moves to a higher orbit. The spring stretches yet more, the torques become yet larger, and the motion is unstable! Because magnetic forces act like a spring under tension connecting fluid elements, the behavior of a magnetized fluid is almost exactly analogous to this simple mechanical system. This is the essence of the MRI. (See Figure 1)\n\n## A more detailed explanation\n\nTo see this unstable behavior more quantitatively, consider the equations of motion for a fluid element mass in circular motion with an angular velocity $$\\Omega\\ .$$ In general $$\\Omega$$ will be a function of the distance from the rotation axis $$R\\ ,$$ and we assume that the orbital radius is $$r=R_0\\ .$$ The centripetal force required to keep the mass in orbit is $$-R\\Omega^2(R)\\ ,$$ the minus sign indicates a direction toward the center. If this force is gravity from a point mass at the center, then the centripetal force is just $$-GM/R^2,$$ where $$G$$ is Newton's constant and $$M$$ is the central mass.\n\nLet us now consider small departures from the circular motion of the orbiting mass element caused by some perturbing force. We transform variables into a rotating frame moving with the orbiting mass element at angular velocity $$\\Omega(R_0)=\\Omega_0\\ ,$$ with origin located at the unperturbed, orbiting location of the mass element. As usual when working in a rotating frame, we need to add to the equations of motion a Coriolis force $$-2\\boldsymbol\\Omega_0\\times\\boldsymbol v$$ plus a centrifugal force $$R\\Omega_0^2\\ .$$ The velocity $$v$$ is the velocity as measured in the rotating frame. Furthermore, we restrict our attention to a small neighborhood near $$R_0\\ ,$$ say $$R_0+x\\ ,$$ with $$x$$ much smaller than $$R_0\\ .$$ Then the sum of the centrifugal and centripetal forces is\n\n$\\tag{1} R[\\Omega_0^2 - \\Omega^2(R_0+x)] \\simeq -x R{d\\Omega^2\\over dR}$\n\nto linear order in $$x\\ .$$ With our $$x$$ axis pointing radial outward from the unperturbed location of the fluid element and our $$y$$ axis pointing in the direction of increasing azimuthal angle (the direction of the unperturbed orbit), the $$x$$ and $$y$$ equations of motion for a small departure from a circular orbit $$R=R_0$$ are:\n\n$\\tag{2} \\ddot{x} - 2\\Omega_0 \\dot{y} = -x R{d\\Omega^2\\over dR} +f_x$\n\n$\\tag{3} \\ddot{y} + 2\\Omega_0 \\dot{x} =f_y$\n\nwhere $$f_x$$ and $$f_y$$ are the forces per unit mass in the $$x$$ and $$y$$ directions, and a dot indicates a time derivative (i.e., $$\\dot x$$ is the $$x$$ velocity, $$\\ddot x$$ is the $$x$$ acceleration, etc.).\n\nIn the absence of external forces, the equations of motion have solutions with the time dependence $$e^{i\\omega t}\\ ,$$ where the angular frequency $$\\omega$$ satisfies the equation\n\n$\\tag{4} \\omega^2 = 4\\Omega_0^2 + R{d\\Omega^2\\over dR}\\equiv \\kappa^2$\n\nwhere $$\\kappa^2$$ is known as the epicyclic frequency. In our solar system, for example, deviations from a sun-centered circular orbit that are familiar ellipses when viewed by an external viewer at rest, appear instead as small radial and azimuthal oscillations of the orbiting element when viewed by an observer moving with the undisturbed circular motion. These oscillations trace out a small retrograde ellipse (i.e. rotating in the opposite sense of the large circular orbit), centered on the undisturbed orbital location of the mass element.\n\nThe epicyclic frequency may equivalently be written $$(1/R^3)(dR^4\\Omega^2/dR)\\ ,$$ which shows that it is proportional to the radial derivative of the angular momentum per unit mass, or specific angular momentum. The specific angular momentum must increase outward if stable epicyclic oscillations are to exist, otherwise displacements would grow exponentially, corresponding to instability. This is a very general result known as the Rayleigh criterion (Chandrasekhar 1961) for stability. For orbits around a point mass, the specific angular momentum is proportional to $$R^{1/2}\\ ,$$ so the Rayleigh criterion is well satisfied.\n\nConsider next the solutions to the equations of motion if the mass element is subjected to an external restoring force, $$f_x=-Kx\\ ,$$ $$f_y=-Ky$$ where $$K$$ is an arbitrary constant (the \"spring constant\"). If we now seek solutions for the modal displacements in $$x$$ and $$y$$ with time dependence $$e^{i\\omega t}\\ ,$$ we find a much more complex equation for $$\\omega\\ :$$\n\n$\\tag{5} \\omega^4 - (2K+\\kappa^2)\\omega^2 +K(K+Rd\\Omega^2/dR) =0$\n\nEven though the spring exerts an attractive force, it may destabilize. For example, if the spring constant $$K$$ is sufficiently weak, the dominant balance will be between the final two terms on the left side of the equation. Then, a decreasing outward angular velocity profile will produce negative values for $$\\omega^2\\ ,$$ and both positive and negative imaginary values for $$\\omega\\ .$$ The negative imaginary root results not in oscillations, but in exponential growth of very small displacements. A weak spring therefore causes the type of instability described qualitatively at the end of the previous section. A strong spring on the other hand, will produce oscillations, as one intuitively expects.\n\n## The spring-like nature of magnetic fields\n\nTo understand the how the MRI works, we must first understand the conditions inside a perfectly conducting fluid in motion. This is often a good approximation to astrophysical gases. In the presence of a magnetic field $$\\boldsymbol B\\ ,$$ a moving conductor responds by trying to eliminate the Lorentz force on the free charges. The magnetic force acts in such a way as to locally rearrange these charges to produce an internal electric field of $$\\boldsymbol {E=-{v\\times B}}\\ .$$ In this way, the direct Lorentz force on the charges $$\\boldsymbol {E+v\\times B}$$ vanishes. (Alternatively, the electric field in the local rest frame of the moving charges vanishes.) This induced electric field can now itself induce further changes in the magnetic field $$\\boldsymbol B$$ according to Faraday's law,\n\n$\\tag{6} - \\boldsymbol {\\nabla\\times E} = {\\partial\\boldsymbol B\\over\\partial t}\\quad {\\rm or}\\quad\\boldsymbol {\\nabla\\times (v\\times B)} = {\\partial\\boldsymbol B\\over\\partial t}$\n\nAnother way to write this equation is that if in time $$\\delta t$$ the fluid makes a displacement $$\\boldsymbol \\xi = \\boldsymbol v\\delta t\\ ,$$ then the magnetic field changes by\n\n$\\tag{7} \\delta \\boldsymbol B = \\boldsymbol {\\nabla\\times (\\xi \\times B)}$\n\nThe equation of a magnetic field in a perfect conductor in motion has a special property: the combination of Faraday induction and zero Lorentz force makes the field lines behave as though they were painted, or \"frozen,\" into the fluid. In particular, if $$\\boldsymbol B$$ is initially nearly constant and $$\\xi$$ is a divergence-free displacement, then our equation reduces to\n\n$\\tag{8} \\delta \\boldsymbol B = \\boldsymbol {\\ {(B\\cdot\\nabla)\\xi}},$\n\nso that $$\\boldsymbol B$$ changes only when there is a shearing displacement along the field line.\n\nTo understand the MRI, it is sufficient to consider the case in which $$\\boldsymbol B$$ is uniform in vertical $$z$$ direction, and $$\\xi$$ varies as $$e^{ikz}\\ .$$ Then\n\n$\\tag{9} \\delta \\boldsymbol B =ikB\\boldsymbol \\xi,$\n\nwhere it is understood that the real part of this equation expresses its physical content. (If $$\\boldsymbol \\xi$$ is proportional to $$\\cos(kz)\\ ,$$ for example, then $$\\delta\\boldsymbol B$$ is proportional to $$-\\sin(kz)\\ .$$)\n\nA magnetic field exerts a force per unit volume on an electrically neutral, conducting fluid equal to $$\\boldsymbol J\\times\\boldsymbol B\\ .$$ With the help of the Biot-Savart law $$\\mu_0\\boldsymbol {J=\\nabla\\times B}\\ ,$$ this becomes\n\n$\\tag{10} \\left(\\frac{1}{\\mu_{0}}\\right)\\boldsymbol{(\\nabla\\times B)\\times B} = -\\boldsymbol{\\nabla}\\left(\\frac{B^2}{2\\mu_{0}}\\right) + \\left(\\frac{1}{\\mu_{0}}\\right)\\boldsymbol{ (B\\cdot\\nabla) B}$\n\nThe first term on the right is analogous to a pressure gradient. In our problem it may be neglected because it exerts no force in the plane of the disk, perpendicular to $$z\\ .$$ The second term acts like a magnetic tension force, analogous to a taut string. For a small disturbance $$\\delta\\boldsymbol B\\ ,$$ it exerts an acceleration given by\n\n$\\tag{11} \\left(\\frac{1}{\\mu_{0}\\rho}\\right)\\boldsymbol{(B\\cdot\\nabla)\\delta B} = \\left(\\frac{ikB\\boldsymbol {\\delta B}}{\\mu_0\\rho}\\right)= -{k^2B^2\\over\\mu_0\\rho}\\boldsymbol (\\xi)$\n\nThus, a magnetic tension force gives rise to a return force which is directly proportional to the displacement. This means that the oscillation frequency $$\\omega$$ for small displacements in the plane of rotation of a disk with a uniform magnetic field in the vertical direction satisfies an equation (\"dispersion relation\") exactly analogous to equation (5), with $$K={k^2B^2/\\mu_0\\rho}\\ :$$ $\\tag{12} \\omega^4 + [2(k^2B^2/\\mu_0\\rho)+\\kappa^2]\\omega^2 +(k^2B^2/\\mu_0\\rho) [(k^2B^2/\\mu_0\\rho)+Rd\\Omega^2/dR] =0$\n\nAs before, if $$d\\Omega^2/dR<0\\ ,$$ there is an exponentially growing root of this equation for wavenumbers $$k$$ satisfying $$(k^2B^2/\\mu_0\\rho)< - Rd\\Omega^2/dR\\ .$$ This corresponds to the MRI.\n\nNotice that the magnetic field appears in equation (12) only as the product $$kB\\ .$$ Thus, even if $$B$$ is very small, for very large wavenumbers $$k$$ this magnetic tension can be important. This is why the MRI is so sensitive to even very weak magnetic fields: their effect is amplified by multiplication by $$k\\ .$$ Moreover, it can be shown that MRI is present regardless of the magnetic field geometry, as long as the field is not too strong.\n\nIn astrophysics, one is generally interested in the case for which the disk is supported by rotation against the gravitational attraction of a central mass. A balance between the Newtonian gravitational force and the radial centripetal force immediately gives $\\tag{13} \\Omega^2 = {GM\\over R^3}$\n\nwhere $$G$$ is the Newtonian gravitational constant, $$M$$ is the central mass, and $$R$$ is radial location in the disk. Since $$Rd\\Omega^2/dR=-3\\Omega^2<0\\ ,$$ this so called Keplerian disk is unstable to the MRI. Without a weak magnetic field, the flow would be stable.\n\nFor a Keplerian disk, the maximum growth rate is $$\\gamma=3\\Omega/4\\ ,$$ which occurs at a wavenumber satisfying $$(k^2B^2/\\mu_0\\rho)=15\\Omega^2/16\\ .$$ $$\\gamma$$ is very rapid, corresponding to an amplification factor of more than 100 per rotation period.\n\nThe nonlinear development of the MRI into fully developed turbulence may be followed via large scale numerical computation. Figure 2 is a rendering of a black hole accretion disk in a turbulent state taken from a recent calculation by J. Hawley. The colors represent different density levels, with red being the largest and blue the smallest. Figure 3 is a local detail of a two-dimensional numerical study in which all flow quantities are independent of azimuth. Here, angular momentum per unit mass is plotted. Red colors indicate an angular velocity in excess of the Keplerian value, while blue colors correspond to a deficit.",
null,
"",
null,
"Figure 2: Density rendering from a three-dimensional numerical study of an accretion disk that is unstable to the magnetorotational instability. (Courtesy of J. Hawley)",
null,
"",
null,
"Figure 3: A slice in a plane of constant azimuth taken from a small scale two-dimensional of the magnetorotational instability. Colors indicate specific angular momentum, with red corresponding to above the Keplerian value, and blue below it. (Courtesy of J. Hawley)\n\n## Applications and laboratory experiments\n\nInterest in the MRI is based on the fact that it appears to give an explanation for the origin of turbulent flow in astrophysical accretion disks (Balbus and Hawley, 1991).\n\nA promising model for the compact, intense X-ray sources discovered in the 1960s was that of a neutron star or black hole drawing in (“accreting”) gas from its surroundings (Prendergast and Burbidge, 1968). Such gas always accretes with a finite amount of angular momentum relative to the central object, and so it must first form a rotating disk — it cannot accrete directly onto the object without first losing its angular momentum. But how an element of gaseous fluid managed to lose its angular momentum and spiral onto the central object was not at all obvious.\n\nOne explanation involved shear-driven turbulence (Shakura and Sunyaev, 1973). There would be significant shear in an accretion disk (gas closer to the centre rotates more rapidly than outer disk regions), and shear layers often break down into turbulent flow. The presence of shear-generated turbulence, in turn, produces the powerful torques needed to transport angular momentum from one (inner) fluid element to another (farther out).\n\nThe breakdown of shear layers into turbulence is routinely observed in flows with velocity gradients, but without systematic rotation. This is an important point, because rotation produces strongly stabilizing Coriolis forces, and this is precisely what occurs in accretion disks. As can be seen in equation (5), the K = 0 limit produces Coriolis-stabilized oscillations, not exponential growth. These oscillations are present under much more general conditions as well: a recent laboratory experiment (Ji et al., 2006) has shown stability of the flow profile expected in accretion disks under conditions in which otherwise troublesome dissipation effects are (by a standard measure know as the Reynolds number) well below one part in a million. All of this changes, however, when even a very weak magnetic field is present. The MRI produces torques that are not stabilized by Coriolis forces. Large scale numerical simulations of the MRI indicate that the rotational disk flow breaks down into turbulence (Hawley et al., 1995), with strongly enhanced angular momentum transport properties. This is just what is required for the accretion disk model to work. The formation of stars (Stone et al., 2000), the production of X-rays in neutron star and black hole systems (Blaes, 2004), and the creation of active galactic nuclei (Krolik, 1999) and gamma ray bursts (Wheeler, 2004) are all thought to involve the development of the MRI at some level.\n\nThus far, we have focused rather exclusively on the dynamical breakdown of laminar flow into turbulence triggered by a weak magnetic field, but it is also the case that the resulting highly agitated flow can act back on this same magnetic field. Embedded magnetic field lines are stretched by the turbulent flow, and it is possible that systematic field amplification could result. The process by which fluid motions are converted to magnetic field energy is known as a dynamo (Moffatt, 1978); the two best studied examples are the Earth's liquid outer core and the layers close to the surface of the Sun. Dynamo activity in these regions is thought to be responsible for maintaining the terrestrial and solar magnetic fields. In both of these cases thermal convection is likely to be the primary energy source, though in the case of the Sun differential rotation may also play an important role. Whether the MRI is an efficient dynamo process in accretion disks is currently an area of active research (Fromang and Papaloizou, 2007).\n\nThere may also be applications of the MRI outside of the classical accretion disk venue. Internal rotation in stars (Ogilvie, 2007), and even planetary dynamos (Petitdemange et al., 2008) may, under some circumstances, be vulnerable to the MRI in combination with convective instabilities. These studies are also ongoing.\n\nFinally, the MRI can, in principle, be studied in the laboratory (Ji et al., 2001), though these experiments are very difficult to implement. A typical set-up involves either concentric spherical shells or coaxial cylindrical shells. Between (and confined by) the shells, there is a conducting liquid metal such as sodium or gallium. The inner and outer shells are set in rotation at different rates, and viscous torques compel the trapped liquid metal to differentially rotate. The experiment then investigates whether the differential rotation profile is stable or not in the presence of an applied magnetic field.\n\nA claimed detection of the MRI in a spherical shell experiment (Sisan et al., 2004), in which the underlying state was itself turbulent, awaits confirmation at the time of this writing (2009). A magnetic instability that bears some similarity to the MRI can be excited if both vertical and azimuthal magnetic fields are present in the undisturbed state (Hollerbach and Rüdiger, 2005). This is sometimes referred to as the helical-MRI, (Liu et al., 2006) though its precise relation to the MRI described above has yet to be fully elucidated. Because it is less sensitive to stabilizing ohmic resistance than is the classical MRI, this helical magnetic instability is easier to excite in the laboratory, and there are indications that it may have been found (Stefani et al., 2006). The detection of the classical MRI in a hydrodynamically quiescent background state has yet to be achieved in the laboratory, however.\n\n## Bibliography\n\n• Acheson, D. J., and Hide, R. 1972, Rep. Prog. Phys., 36, 159\n• Acheson, D. J., and Gibbons, M. P. 1978, Phil. Trans. Roy. Soc. London Ser: A, 1363, 459\n• Balbus, S. A., and Hawley, J. F. 1991, Astrophys. J., 376, 214\n• Balbus, S. A., and Hawley, J. F. 1998, Rev. Mod. Phys., 70, 1\n• Blaes, O. M. 2004, in Physics Fundamentals of Luminous Accretion Disks Around Black Holes. Proc. LXXVIII of Les Houches Summer School, Chamonix, France, ed. F. Menard, G. Pelletier, V. Beskin, J. Dalibard, p. 137. Paris/Berlin: Springer\n• Chandrasekhar, S. 1953, Proc. Roy. Soc. (London) A, 216, 293\n• Chandrasekhar, S. 1961, Hydrodynamic and Hydromagnetic Instability, Oxford: Clarendon\n• Fricke, K. 1969, Astron. Astrophys., 1, 388\n• Fromang, S., and Papaloizou J. 2007, Astron. Astrophys., 476, 1113\n• Hawley, J. F., Gammie, C. F., and Balbus, S. A. 1995, Astrophys. J., 440, 742\n• Hollerbach, R., and Rüdiger, G. 2005, Phys. Rev. Lett., 95, 124501\n• Ji, H., Goodman, J., and Kageyama, A. 2001, MNRAS, 325, L1\n• Ji, H., Burin, M., Schartman E., and Goodman J., 2006, Nature 444, 343\n• Krolik, J. 1999, Active Galactic Nuclei, Princeton: Princeton Univ.\n• Liu, W., Goodman, J., Herron, I., Ji, H. 2006, Phys. Rev. E, 74, 056302\n• Moffatt, H. K. 1978, Magnetic Field Generation in Electrically Conducting Fluids. Cambridge: Cambridge Univ\n• Ogilvie G., 2007, in The Solar Tachocline. ed. D. Hughes, R. Rosner, N. Weiss, p. 299. Cambridge: Cambridge Univ.\n• Petitdemange, L., Dormy, E., and Balbus, S. A. 2008, Geophys. Res. Lett. 35, L15305\n• Prendergast, K., and Burbidge, G. R. 1968, Astrophys. J. Lett., 151, L83\n• Shakura, N., and Sunyaev, R. A. 1973, Astron. Astrophys., 24, 337\n• Sisan, D.R. et al. 2004, Phys. Rev. Letters, 93, 114502\n• Stefani, F., Gundrum, T., Gerbeth, G., Rüdiger, G., Schultz, M., Szklarski, J., & Hollerbach, R. 2006, Phys. Rev. Lett. 97, 84502\n• Stone, J. M., Gammie, C. F., Balbus, S. A., and Hawley, J. F. 2000, in Protostars and Planets IV, ed. V.Mannings, A.Boss, and S.Russell, Space Science Reviews, p. 589. Tucson: U. Arizona\n• Velikhov, E. P. 1959, J. Exp. Theor. Phys. (USSR), 36, 1398\n• Wheeler, J. C. 2004, Advances in Space Research, 34, 12, 2744\n\nInternal references\n\n• Jeff Moehlis, Kresimir Josic, Eric T. Shea-Brown (2006) Periodic orbit. Scholarpedia, 1(7):1358.\n• Philip Holmes and Eric T. Shea-Brown (2006) Stability. Scholarpedia, 1(10):1838.\n\n• Balbus, S. A. 2003, Enhanced Angular Momentum Transport in Accretion Disks, Annual Reviews of Astronomy and Astrophysics, 41, 555\n• Blaes, O. A Universe of Disks, Scientific American, October 2004, 50.\n• Frank, J., King, A., and Raine, D. 2002, Accretion Power in Astrophysics. Cambridge: Cambridge Univ."
] | [
null,
"http://scholarpedia.org/w/images/b/b6/MRISB1.jpg",
null,
"http://scholarpedia.org/w/images/thumb/c/cc/MRISB2.JPG/380px-MRISB2.JPG",
null,
"http://scholarpedia.org/w/skins/common/images/magnify-clip.png",
null,
"http://scholarpedia.org/w/images/e/e9/MRISB3.JPG",
null,
"http://scholarpedia.org/w/skins/common/images/magnify-clip.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8612623,"math_prob":0.991633,"size":23756,"snap":"2020-45-2020-50","text_gpt3_token_len":6177,"char_repetition_ratio":0.12344224,"word_repetition_ratio":0.0127786845,"special_character_ratio":0.25761914,"punctuation_ratio":0.15408252,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9968523,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,3,null,3,null,null,null,3,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-29T13:16:11Z\",\"WARC-Record-ID\":\"<urn:uuid:e9c82141-f839-46f2-87cd-eb9a4f52e630>\",\"Content-Length\":\"60106\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4e56d2c5-4148-453f-9b23-4136085128a6>\",\"WARC-Concurrent-To\":\"<urn:uuid:84ca506b-d635-4061-82b2-1c597d964e4d>\",\"WARC-IP-Address\":\"173.255.237.117\",\"WARC-Target-URI\":\"http://scholarpedia.org/article/Magnetorotational_instability\",\"WARC-Payload-Digest\":\"sha1:HFGOHUIHSFQ4DUTEAZIDOP6BMRN7PRBI\",\"WARC-Block-Digest\":\"sha1:U6A6KLCZ3SYKND4QJYDZL4FHXWWNZ6BP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141198409.43_warc_CC-MAIN-20201129123729-20201129153729-00595.warc.gz\"}"} |
https://www.bartleby.com/solution-answer/chapter-62-problem-8e-elementary-geometry-for-college-students-6th-edition/9781285195698/given-ab-and-ac-are-tangent-to-o-mbc126-find-amabmabccmacb/492ed013-757c-11e9-8385-02ee952b546e | [
"",
null,
"",
null,
"",
null,
"Chapter 6.2, Problem 8E",
null,
"### Elementary Geometry for College St...\n\n6th Edition\nDaniel C. Alexander + 1 other\nISBN: 9781285195698\n\n#### Solutions\n\nChapter\nSection",
null,
"### Elementary Geometry for College St...\n\n6th Edition\nDaniel C. Alexander + 1 other\nISBN: 9781285195698\nTextbook Problem\n1 views\n\n# Given: A B → and A C → are tangent to ⊙ O , m B C ⌢ = 126 ° Find: a) m ∠ A b) m ∠ A B C c) m ∠ A C B",
null,
"To determine\n\n(a)\n\nTo find:\n\nmA when AB and AC are tangent to O, mBC=126°.\n\nExplanation\n\nTheorem:\n\nThe measure of an angle formed when two intersecting tangents, then the measure of angle is one-half the difference of the measures of the two intercepted arc.\n\nCalculation:\n\nmA when AB and AC are tangent to O, mBC=126°\n\nmBC+mBDC=360°126°+mBDC=360°\n\nTo determine\n\n(b)\n\nTo find:\n\nmABC when AB and AC are tangent to O, mBC=126°.\n\nTo determine\n\n(c)\n\nTo find:\n\nmACB when AB and AC are tangent to O, mBC=126°.\n\n### Still sussing out bartleby?\n\nCheck out a sample textbook solution.\n\nSee a sample solution\n\n#### The Solution to Your Study Problems\n\nBartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!\n\nGet Started\n\n#### Calculate y'. 41. y=x+1(2x)5(x+3)7\n\nSingle Variable Calculus: Early Transcendentals, Volume I\n\n#### 0 1 ∞\n\nStudy Guide for Stewart's Multivariable Calculus, 8th\n\n#### A definite integral for the area of the region bounded by y = 2 − x2 and y = x2 is:\n\nStudy Guide for Stewart's Single Variable Calculus: Early Transcendentals, 8th",
null,
""
] | [
null,
"https://www.bartleby.com/static/search-icon-white.svg",
null,
"https://www.bartleby.com/static/close-grey.svg",
null,
"https://www.bartleby.com/static/solution-list.svg",
null,
"https://www.bartleby.com/isbn_cover_images/9781285195698/9781285195698_largeCoverImage.gif",
null,
"https://www.bartleby.com/isbn_cover_images/9781285195698/9781285195698_largeCoverImage.gif",
null,
"https://content.bartleby.com/tbms-images/9781337614085/Chapter-6/images/14085-6.2-8e-question-digital_image001.gif",
null,
"https://www.bartleby.com/static/logo.svg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6630062,"math_prob":0.9327731,"size":2011,"snap":"2019-51-2020-05","text_gpt3_token_len":439,"char_repetition_ratio":0.19930243,"word_repetition_ratio":0.10980392,"special_character_ratio":0.16608652,"punctuation_ratio":0.09756097,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99022627,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-09T13:41:26Z\",\"WARC-Record-ID\":\"<urn:uuid:156e3323-bfe9-4889-9d88-ee10b5793977>\",\"Content-Length\":\"476341\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:207eeeb1-bd0f-450d-adb5-61efec0edced>\",\"WARC-Concurrent-To\":\"<urn:uuid:6b3334e6-2ddf-4973-843f-308090c6bf95>\",\"WARC-IP-Address\":\"99.84.181.3\",\"WARC-Target-URI\":\"https://www.bartleby.com/solution-answer/chapter-62-problem-8e-elementary-geometry-for-college-students-6th-edition/9781285195698/given-ab-and-ac-are-tangent-to-o-mbc126-find-amabmabccmacb/492ed013-757c-11e9-8385-02ee952b546e\",\"WARC-Payload-Digest\":\"sha1:UQDK2MNN4UOSN2OSCJHSLOSD6FWWAM6J\",\"WARC-Block-Digest\":\"sha1:MWX3WWKB2NRJKOBB56N6IUIIELGCLMPN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540518882.71_warc_CC-MAIN-20191209121316-20191209145316-00497.warc.gz\"}"} |
https://stacktuts.com/how-to-concatenate-two-integers-in-python | [
"# How to concatenate two integers in python?\n\n## Introduction\n\nPython: how to concatenate two integers in Python?\n\nConcatenation is the process of joining two or more strings, or integers, together. In Python, there are several ways to concatenate integers. Below are some examples of how to concatenate integers in Python:\n\n## Method 1: Using the \"+\" operator\n\n• Step 1 - Define two integers\n``````num1 = 3\nnum2 = 5``````\n• Step 2 - Use the \"+\" operator to concatenate the two integers\n``````result = num1 + num2\nprint(result)``````\n\nOutput: 8\n\n## Method 2: Using the \"str()\" function\n\n• Step 1 - Define two integers\n``````num1 = 3\nnum2 = 5``````\n• Step 2 - Use the \"str()\" function to convert the integers to strings\n``````str_num1 = str(num1)\nstr_num2 = str(num2)``````\n• Step 3 - Use the \"+\" operator to concatenate the two strings\n``````result = str_num1 + str_num2\nprint(result)``````\n\nOutput: \"35\"\n\n## Method 3: Using the \"join()\" method\n\n• Step 1 - Define two integers\n``````num1 = 3\nnum2 = 5``````\n• Step 2 - Use the \"join()\" method to join the two integers.\n``````result = ''.join([str(num1), str(num2)])\nprint(result)``````\n\nOutput: \"35\"\n\nMethod 4 : Using Format Method\n\n• Step 1 - Define two integers\n``````num1 = 3\nnum2 = 5``````\n• Step 2 - Use the format method to concatenate the two integers\n``````result = \"{}{}\".format(num1, num2)\nprint(result)``````\n\nOutput: \"35\"\n\nNote that \"+\" operator is used to do addition of numbers in python so if you use + operator directly with two integers it will add the values together and give you the sum rather than concatenation. Therefore it is important to first convert the integers to string using str() or using any of the method above before using the \"+\" operator or any other string operation.\n\nAlso note that in python 3, it's only possible to concatenate int with str but not int with int directly. If you want to do so, you need to convert them to str first.\n\nI'd be happy to continue.\n\n## Method 5: Using the \"f-strings\" (Formatted string literals)\n\n• Step 1 - Define two integers\n``````num1 = 3\nnum2 = 5``````\n• Step 2 - Use f-strings to concatenate the two integers\n``````result = f\"{num1}{num2}\"\nprint(result)``````\n\nOutput: \"35\"\n\nF-strings are a more recent addition to Python (introduced in Python 3.6) and they allow you to embed expressions inside string literals using curly braces {}. In the above example, we used f-string and inserted variable num1 and num2 inside {} and it directly converted into string. This is a more concise and readable way to format strings.\n\n## Method 6: Using the list and ''.join()\n\n• Step 1 - Define two integers\n``````num1 = 3\nnum2 = 5``````\n• Step 2 - Create a list and put two integers inside it.\n``int_list = [num1, num2]``\n• Step 3 - Use the \"join()\" method to join the two integers.\n``````result = ''.join(map(str, int_list))\nprint(result)``````\n\nOutput: \"35\"\n\nIn this method, first we create a list and put the two integers inside it and then use map function to convert all integers of list to string. And then use join method to join the two integers.\n\nAll of these methods will result in the concatenation of the two integers as a string, but the syntax and method used will be slightly different. Whichever method you choose, it's important to first convert the integers to strings before concatenating them.\n\n## Conclusion\n\nIn conclusion, there are several ways to concatenate integers in Python. You can use the \"+\" operator along with the \"str()\" function, the \"join()\" method, or format strings. You can also use f-strings, or convert the integers to strings with a list and map function. It is important to keep in mind that in python you can only concatenate int with str and not int with int directly. you will have to first convert them to str before doing any concatenation or string operations Each method has its own advantages and disadvantages, and the best method to use will depend on the specific requirements of your project. The key takeaway is to remember to convert integers to strings before concatenating them, otherwise, you'll end up with the addition of the integers rather than concatenation.\n\n1. Python"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8083321,"math_prob":0.92744607,"size":3878,"snap":"2023-40-2023-50","text_gpt3_token_len":948,"char_repetition_ratio":0.18378937,"word_repetition_ratio":0.21014492,"special_character_ratio":0.2627643,"punctuation_ratio":0.08737864,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9911002,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-29T06:06:35Z\",\"WARC-Record-ID\":\"<urn:uuid:53a5417c-1b3b-41ad-a670-1913d7b21535>\",\"Content-Length\":\"66884\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b39939f7-a3de-4eae-ab9e-50258f56424f>\",\"WARC-Concurrent-To\":\"<urn:uuid:3f3ad5e2-7ec6-4be2-861a-36d2efa8fa3d>\",\"WARC-IP-Address\":\"172.67.179.26\",\"WARC-Target-URI\":\"https://stacktuts.com/how-to-concatenate-two-integers-in-python\",\"WARC-Payload-Digest\":\"sha1:5HUFJXZ22UWQKHJ3XIGJA2MBNN472N7O\",\"WARC-Block-Digest\":\"sha1:ETHXH2PDFA36TANT3SEXG26HEI7GESXY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100056.38_warc_CC-MAIN-20231129041834-20231129071834-00414.warc.gz\"}"} |
https://miltonfootclinic.com/bjw9tz/sandy-strallen-zytyfmd/page.php?596f7b=residual-sum-of-squares-excel | [
"So using the battery example, you get. So the Sum of Squares for the Total regression, or SST, is the sum of column L, and in cell L20 we have =SUM(L5:L19). Sum of squares … Note that L14 contains the sum of squares residual, and 16 is the degrees of freedom for the residual. A residual plot is a type of plot that displays the fitted values against the residual values for a regression model. Neben den Eigenschaften der Spezifität, des Arbeitsbereichs, der Richtigkeit und Präzision, sowie dem Bestimmen der Nachweis- und Bestimmungsgrenze (limit of detection, LOD / limit of quantification, LOQ), ist auch die Linearität der Me… Com. He earned his Bachelor of Arts in media and game development and information technology at the University of Wisconsin-Whitewater. R Statistical Package . where O4:O14 contains the matrix of raw residuals E and O19 contains MS Res. Mathematically, we can write residual as follow. It is an amount of the difference between data and an estimation model. Any help is appreciated, thanks. Select the cell in your Microsoft Excel document that you would like to use for the sum of squares function and open the “Formulas” tab. You need type in the data for the independent variable The sum of squared errors, or SSE, is a preliminary statistical calculation that leads to other data values. Daniel Hatter began writing professionally in 2008. Click “OK” to save your changes to the equation. Für die analytische Methodenvalidierung ist ein Dokument von Bedeutung, in dem mehrere Punkte einer Methode geprüft werden müssen, um sie als fit-for-purpose zu deklarieren. In general, total sum of squares = explained sum of squares + residual sum of squares. How to Create a Listbox in VB From an Excel Spreadsheet, How to Change the Currency on iWork Numbers, How to Remove Commas in Google Spreadsheets. See Example 2 in Matrix Operations for more information about extracting the diagonal elements from a square matrix. The ANOVA (analysis of variance) table splits the sum of squares into its components. The residual sum of squares $$SS_E$$ is computed as the sum of squared deviation of predicted values $$\\hat Y_i$$ with respect to the observed values $$Y_i$$. In statistics, Minimum Residual sum is the measurement of difference between data and an estimation model. Consider two population groups, where X = 1,2,3,4 and Y=4,5,6,7 , constant value α = 1, β = 2. Excel then calculates the total sum of squares, sstotal. In other words, it depicts how the variation in the dependent variable in a regression model cannot be explained by the model. Thanks. However, analysts usually use the sum of squares to calculate other measures of volatility rather than using it directly. Methods for Using Linear Regression in Excel. Do you need to find sum of squares for a pesky statistical analysis? This thread is locked. The total sum of squares measures the variation in the observed data (data used in regression modeling). The sum of squares due to regression measures how well the regression model represents the data that were used for modeling. RSS, leverage and Cook’s Distance in Excel 2016 Prerequisites. Viele übersetzte Beispielsätze mit \"residual sum of squares\" – Deutsch-Englisch Wörterbuch und Suchmaschine für Millionen von Deutsch-Übersetzungen. Die Residuenquadratsumme ist ein Güte… So, if you add an effect in your model, even if it's noise, R² will increase. Picture your residuals as a vertical line connecting your actual values to your predicted value (red traces in the plot below). See Example 2 in Matrix Operations for more information about extracting the diagonal elements from a square matrix. where . Other Sums of Squares. The residual sum of squares (RSS), also known as the sum of squared residuals (SSR) or the sum of squared errors of prediction (SSE). These are the Mean Squares, the Sum of Squares divided by their respective DF. The sum of these squared differences is called the residual sum of squares, ssresid. Hi is there a formula on excel to work out residual sum of squares of the data or another way to work it out for my data because i have 3 lots of Y values and the mean of the Y values and not sure how you work out. It measures the overall difference between your data and the values predicted by your estimation model (a “residual” is a measure of the distance from a data point to a regression line). Total SS is related to the total sum and explained sum with the following formula: For the Residual, 7256345.7 / 398 equals 18232.0244. http://www.bionicturtle.com Mathematically, we can write RSS (residual sum of squares) as follow. How Do I Get the Little Numbers by Words in Microsoft Word for Generations or Exponents? A residual sum of squares (RSS) is a statistical technique used to measure the amount of variance in a data set that is not explained by a regression model. The difference between the two is explained by the error term - ϵ. The sum of these squared differences is called the residual sum of squares, ssresid. You have the ability to input up to 30 separate numbers in the formula, and they can either be in the form of static numbers -- such as 5, 4 or 3 -- or linked cells, such as A5, B4 or C3. That is why, in this article, we will explain in more detail what this number actually means and why it is of importance. SST - Total Sum of Squares. You can follow the question or vote as helpful, but you cannot reply to this thread. Finally, I should add that it is also known as RSS or residual sum of squares. For the Regression, 817326.293 / 1 is equal to 817326.293. The ‘predicted’ value of y is provided to us by the regression equation. The regression sum of squares is 149.1600595; The residual sum of squares is 10.09994048; Linest Function Example 2. \\begin{align} R^2&=1-\\frac{\\text{sum squared regression (SSR)}}{\\text{total sum of squares (SST)}},\\\\ &=1-\\frac{\\sum({y_i}-\\hat{y_i})^2}{\\sum(y_i-\\bar{y})^2}. For small data sets, the process of calculating the residual variance by hand can be tedious. Residual as in: remaining or unexplained. How calculate sum of squares youtube. Finally, I should add that it is also known as RSS or residual sum of squares. This thread is locked. It is otherwise called as residual sum of squares(RSS), sum of squared residuals (SSR) or the sum of squared errors of prediction. As it is a percentage it will take values between $0$ and $1$. Figure 2 – Studentized residual plot for Example 1 Alan Anderson, PhD is a teacher of finance, economics, statistics, and math at Fordham and Fairfield universities as well as at Manhattanville and Purchase colleges. Note that the sum of the last two values (bottom row) is equal to the term from the equation for R, while the sum of the squares of the residuals is used in calculating S y/x (b) Regression: Excel 2003 and Excel:Mac 2004 included various additional utilities that could be added through the Tools menu. You need to get your data organized in a table, and then perform some fairly simple calculations. Excel then calculates the total sum of squares, sstotal. The Confusion between the Different Abbreviations. Click “Go\" and select the “SUMSQ” function that shows up in the list below. Related Readings. When the const argument = TRUE or is omitted, the total sum of squares is the sum of the squared differences between the … You need to get your data organized in a table, and then perform some fairly simple calculations. We now plot the studentized residuals against the predicted values of y (in cells M4:M14 of Figure 2). Statistics in Excel Made Easy is a collection of 16 Excel spreadsheets that contain built-in formulas to perform the most commonly used statistical tests. The sum of the squares for the numbers you entered are calculated and the result is displayed in the cell. Thanks for posting your question on our community. Microsoft 365 Apps or Office 365 Business. In ordinary linear (OLS) regression, the goal is to minimize the sum of squared residuals SSE. Figure 7 does that for this example in cell M14, using this formula: =L14/16. Sum of Square. The model better fits the data, when it has smaller the residual sum of squares; when it has greater the residual sum, the model poorly fits the data. For this reason, the residual sum of squares is not only of great importance in analytical method validation. You can add numbers and/or linked cells to the sum of squares equation. This calculator finds the residual sum of squares of a regression equation based on values for a predictor variable and a response variable. Although it would be tedious, we could manually adjust the two parameters and “eyeball” the curve fit until it looked good. You can follow the question or vote as helpful, but you cannot reply to this thread. The MSE can be written as the sum of the variance of the estimator and the squared bias of the estimator, providing a useful way to calculate the MSE and implying that in the case of unbiased estimators, the MSE and variance are equivalent. Based on my understanding, unfortunately, there is no such an Excel formula that could help you calculating residual sum of squares data directly. Yi is the actual observed value of the dependent variable, y-hat is the value of the dependent variable according to the regression line, as predicted by our regression model. . where O4:O14 contains the matrix of raw residuals E and O19 contains MS Res. If you need any further assistance on your requirement, please provide some more sample data to elaborate your question. Predictor Coef SE Coef T-Value P-Value; Constant: 389.19: 23.81: 16.34: 0.000: Lat-5.9776: 0.5984 -9.99: 0.000: Regression Equation. Fit-for-purpose bedeutet, dass die Methode den Zweck erfüllt, für den sie gedacht ist. Your cooperation is highly appreciated. The tutorial will teach you the ways on how to calculate the Residual sum of squares (RSS) in simple steps. The (residual) sum of squares you will often find as a number in validation reports that, at first sight, might be of no interest at all. Related Readings. Find the Residual Sum Of Square(RSS) values for the two population groups. \\end{align} The sum squared regression is the sum of the residuals squared, and the total sum of squares is the sum of the distance the data is away from the mean all squared. Hi is there a formula on excel to work out residual sum of squares of the data or another way to work it out for my data because i have 3 lots of Y values and the mean of the Y values and not sure how you work out. (^) = (^) + (^,). The sums of squares are reported in the ANOVA table, which was described in the previous module. In statistics, the residual sum of squares (RSS), also known as the sum of squared residuals (SSR) or the sum of squared errors of prediction (SSE), is the sum of the squares of residuals (deviations of predicted from actual empirical values of data). Berechnung Residual sum of squares: Office Forum-> Excel Forum-> Excel Auswertungen: zurück: Blasendiagramm: Werte darstellen weiter: Inhalt Liste in Graphik übertragen: Unbeantwortete Beiträge anzeigen : Status: Antwort: Facebook-Likes: Diese Seite Freunden empfehlen Zu Browser-Favoriten hinzufügen: Autor Nachricht; Krisi25 Gast Verfasst am: 07. Theorem 1: The best fit line for the points (x 1, y 1), …, (x n, y n) is given by. Calculating the Predicted Values. There are other types of sum of squares. RSS is the Residual Sum of Squares and K is the number of model parameters. About the Book Author. In statistics, the residual sum of squares (RSS), also known as the sum of squared residuals (SSR) or the sum of squared errors of prediction (SSE), is the sum of the squares of residuals (deviations of predicted from actual empirical values of data). This tutorial explains how to create a residual plot for a simple linear regression model in Excel. A residual plot is a type of plot that displays the fitted values against the residual values for a regression model. When you have a set of data values, it is useful to be able to find how closely related those values are. Residual sum of squares (also known as the sum of squared errors of prediction) The residual sum of squares essentially measures the variation of modeling errors. On the other hand CART in regression cases uses least squares, intuitively splits are chosen to minimize the residual sum of squares between the observation and the mean in each node. Total sums of squares = Residual (or error) sum of squares + Regression (or explained) sum of squares. There is also the cross product sum of squares, $$SS_{XX}$$, $$SS_{XY}$$ and $$SS_{YY}$$. R² is, by definition, equal to (sum of squares explained by the model)/(total sum of squares). Squares, Heteroskedasticity, Local Polynomial Regression 36-350, Data Mining 23 October 2009 Contents 1 Weighted Least Squares 1 2 Heteroskedasticity 3 2.1 Weighted Least Squares as a Solution to Heteroskedasticity . The sum of squares residual is the sum of the squared deviations of the differences between the actual Y values and the predicted Y values, from the mean of those deviations. The Confusion between the Different Abbreviations. In order to find out the “best” split, we must minimize the RSS 2.1 Intuition. In linear regression models, the total sum of squares is divided into the explained sum of squares (the variation explained by the regression model) and the residual (unexplained) sum of squares. • We are minimizing the sum of squared residuals, • called the “residual sum of squares.” We need to • minimize ∑( ()− +)2 i 0 1 y b b x i • over all possible values of b0 and b1 • a calculus problem. His writing focuses on topics in computers, Web design, software development and technology. The formula to calculate residual variance involves numerous complex calculations. Then click on the “Fx” button in the formula bar, and then enter in the additional numbers/cells. Sum of squares (sos) techniques: an introduction. But we’re smarter than that, so we’ll use the method of least squares along with Solver to automatically find the parameters that define the best fit curve much more efficiently. . Please have a try and share the result with us. This is unlikely to be exactly equal to the actual observed value of y. Using Excel Spreadsheets to Calculate Residual Variance. Given, X = 1,2,3,4 Y = 4,5,6,7 α = 1 β = 2 Solution: Substitute the given values in the formula, One of the formulas supported by Microsoft Excel is the sum of squares equation. You can imagine that if your y-axis is on a … Residual Sum of Squares (RSS) - Definition, Formula, Example. In der Statistik ist die (durch die Regression) erklärte Quadratsumme, bzw. Splits are chosen to minimize the residual sum of squares between the observation and the mean in each node. The residual sum of squares is used to help you decide if a statistical model is a good fit for your data. where. Recall that there were 49 states in the data set. Now let us go back to the initial equation: Now that we have seen how to calculate α and β (ie, either using the formulae, or using Excel), it is probably possible to say that we can ‘predict’ y if we know the value of x. How the RSS is calculated (test of FLV format). Proof of variance and bias relationship (^) = [(^ −)] = [(^ − [^] + [^] −)] = [(^ − [^]) Kolom SS (Sum of Square) atau jumlah kuadrat untuk regression diperoleh dari penjumlahan kuadrat dari prediksi variabel terikat (permintaan) dikurangi dengan nilai rata-rata permintaan dari data sebenarnya. Select the cell in your Microsoft Excel document that you would like to use for the sum of squares function and open the “Formulas” tab. share | cite | improve this question | follow | edited Apr 18 '19 at 8:41. gunes. Click on the “Insert Function” button and type “sumsq” into the “Search for a function” box. Definition 1: The best fit line is called the regression line. Data Management. Residual Sum of Squares (RSS) is defined and given by the following function: Formula It is possible to calculate the discussed measures in Excel 2016: The example discussed above is taken from a publication of Francis Anscombe . erklärte Abweichungsquadratsumme, kurz SQE für Summe der Quadrate der Erklärten Abweichungen (englisch sum of squared explained deviations, kurz SSE oder explained sum of squares, kurz ESS), Summe der Abweichungsquadrate der ^-Werte, kurz ^, bzw. Instructions: Use this residual sum of squares to compute SS_E S S E, the sum of squared deviations of predicted values from the actual observed value. Jadi secara manual kita cari dulu rata-rata permintaan dari data asli kita. Residual Error: 47: 17173: 365 : Total: 48: 53637 : Model Summary. Two proofs are given, one of which does not use calculus. When const = TRUE, or omitted, the total sum of squares is the sum of the squared differences between the actual y-values and the average of the y-values. When you have a set of data values, it is useful to be able to find how closely related those values are. This thread is locked. Calculate the Sum of Residuals Squared. Thanks for your feedback, it helps us improve the site. Iterative calculation of sum of squares. This tutorial explains how to create a residual plot for a simple linear regression model in Excel. For large data sets, the task can be exhausting. For more financial risk management videos, please visit our website! This example teaches you the methods to perform Linear Regression Analysis in Excel. For a proof of this in the multivariate ordinary least squares (OLS) case, see partitioning in the general OLS model. You can follow the question or vote as helpful, but you cannot reply to this thread. Total sum of squares wikipedia. Residuals are used to determine how accurate the given mathematical functions are, such as a line, is in representing a set of data. Get the spreadsheets here: The Residual degrees of freedom is the DF total minus the DF model, 399 – 1 is 398. i. Data Analysis. The total sum of squares (SST) equals the sum of the SSTR and the SSE. We now plot the studentized residuals against the predicted values of y (in cells M4:M14 of Figure 2). The residual sum of squares (RSS), also known as the sum of squared residuals (SSR) or the sum of squared errors of prediction (SSE). This type of plot is often used to assess whether or not a linear regression model is appropriate for a given dataset and to check for heteroscedasticity of residuals.. For example, X 23 represents the element found in the second row and third column. Published by Zach. This method minimizes the mean absolute deviation from the median within a node. The sum of squares due to regression measures how well the regression model represents the data that were used for modeling. (In the table, this is 2.3.) Die Residuenquadratsumme, Quadratsumme der Residuen, oder auch Summe der Residuenquadrate, bezeichnet in der Statistik die Summe der quadrierten (Kleinste-Quadrate-)Residuen (Abweichungen zwischen Beobachtungswerten und den vorhergesagten Werten) aller Beobachtungen. However, I've found a video that might be helpful to you: Residual variance is the sum of squares of differences between the y-value of each ordered pair (xi, yi) on the regression line and each corresponding predicted y-value, yi~. How to calculate using excel for the sum of squares | chron. Click here for the proof of Theorem 1. And by using these results, I want to calculate the residual sum of squares, $\\sum \\hat{u_i}^2$. How to Convert Imported CSV Files to PDF Files on Mac OS X. It is used as an optimality criterion in parameter selection and model selection. The advantage of this over least squares is that it is not as sensitive to outliers and provides a more robust model. The resulting formulas for the least squares estimates of the intercept and slope are ()() ()y … By using an Excel spreadsheet, you only need to enter the data points and select the correct formula. Definition: Residual sum of squares (RSS) is also known as the sum of squared residuals (SSR) or sum of squared errors (SSE) of prediction. Any help is appreciated, thanks. Use the following formula to calculate it: Residual variance = '(yi-yi~)^2 Simply enter a list of values for a predictor variable and a response variable in the boxes below, then click the “Calculate” button: Predictor values: Response values: Residual Sum of Squares (SSE): 68.7878. Type the desired numbers, such as \"5\" or \"6,\" or cell numbers, such as \"A3\" or \"C6,\" into the Number boxes and then click the “OK” button. You don't have to use numbers already in the worksheet to perform sum of squares calculations. Sum of squares. This type of plot is often used to assess whether or not a linear regression model is appropriate for a given dataset and to check for heteroscedasticity of residuals.. Kemudian masing-masing prediksi permintaan (lihat tabel residual output di bawah) dikurangi … Mort = 389 - 5.98 Lat. It becomes really confusing because some people denote it as SSR. The total sum of squares measures the variation in the observed data (data used in regression modeling). The prior section showed how to calculate the mean square residual: simply divide the sum of squares residual by the residual degrees of freedom. Hi is there a formula on excel to work out residual sum of squares of the data or another way to work it out for my data because i have 3 lots of Y values and the mean of the Y values and not sure how you work out. Those two definitions of sums of squares are fairly dense when written in English. The sum of squared errors, or SSE, is a preliminary statistical calculation that leads to other data values. Figure 2 – Studentized residual plot for Example 1 S R-sq R-sq(adj) 19.12: 68.0%: 67.3%: Coefficients. regression. For example, if instead you are interested in the squared deviations of predicted values with respect to observed values, then you should use this residual sum of squares calculator. The residual sum of squares is one of many statistical properties enjoying a renaissance in financial markets. Da zunächst Abweichungsquadrate (hier Residuenquadrate) gebildet werden und dann über alle Beobachtungen summiert wird, stellt sie eine Abweichungsquadratsumme dar. Residuals are used to determine how accurate the given mathematical functions are, such as a line, is in representing a set of data. Please leave a reply if you need more help. The least-squares method is generally used in linear regression that calculates the best fit line for observed data by minimizing the sum of squares of deviation of data points from the line. (My final goal is to get the estimate of var(ui), which is $\\frac{1}{n-2}\\sum \\hat{u_i}^2$) Can you help me calculate $\\sum \\hat{u_i}^2$? Least absolute deviations. For Ridge regression, we add a factor as follows: where λ is a tuning parameter that determines how much to penalize the OLS sum of squares. A mathematically useful approach is therefore to find the line with the property that the sum of the following squares is minimum. However, why do all the hard work of manually entering formulas for squaring up each variable and then taking the sum? To calculate the sum of squares using Microsoft Excel, you need to input a specific formula into the formula bar of the cell you’re working with. Related link: https://www.youtube.com/watch?v=zYizl1HeqSU, Disclaimer: Microsoft provides no assurances and/or warranties, implied or otherwise, and is not responsible for the information you receive from the third-party linked sites or any support related to technology.. This gives us 493.73, a match from the Data Analysis output, so in cell H25 we can bring this down with =L20. Statistical Analysis. If λ = 0, then we have the OLS model, but as λ → ∞, all the regression coefficients b j → 0. Residual as in: remaining or unexplained. Cells A2-A11, B2-B11 and C2-C11 of the spreadsheet below contain three different sets of independent variables (known x values), and cells D2-D11 of the spreadsheet contain the associated known y-values. Quick sum of squares calculator. Excel ; Theorems ; How to Calculate Residual Sum of Squares. Residual Sum of Squares (RSS) is defined and given by the following function: To do so, click on the cell displaying the result. This makes it unclear whether we are talking about the sum of squares due to regression or sum of squared residuals. Regression is a … Then click “OK.”. The standard Excel formula would require you to enter a great deal of information, such as for this article's example: =Sum((Num-1)^2, (Num-2)^2, (Num-3)^2,…..). which one is true? In statistics, the explained sum of squares (ESS), alternatively known as the model sum of squares or sum of squares due to regression (\"SSR\" – not to be confused with the residual sum of squares RSS or sum of squares of errors), is a quantity used in describing how well a model, often a regression model, represents the data being modelled. It becomes really confusing because some people denote it as SSR. Each element in this table can be represented as a variable with two indexes, one for the row and one for the column.In general, this is written as X ij.The subscript i represents the row index, and j represents the column index. TSS, RSS and ESS (Total Sum of Squares, Residual Sum of Squares and Explained Sum of Squares) Consider the diagram below. Calculate the residual variance."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.84837884,"math_prob":0.99291,"size":25634,"snap":"2021-21-2021-25","text_gpt3_token_len":5951,"char_repetition_ratio":0.20335545,"word_repetition_ratio":0.22025317,"special_character_ratio":0.22509168,"punctuation_ratio":0.11229624,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999665,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-07T11:26:27Z\",\"WARC-Record-ID\":\"<urn:uuid:50a0c887-1e1e-4940-b352-2bb4c539ad11>\",\"Content-Length\":\"54559\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5d638da3-5300-4930-978c-d7be53538e11>\",\"WARC-Concurrent-To\":\"<urn:uuid:5db209db-996f-43e3-a469-540d42767c8d>\",\"WARC-IP-Address\":\"192.249.120.98\",\"WARC-Target-URI\":\"https://miltonfootclinic.com/bjw9tz/sandy-strallen-zytyfmd/page.php?596f7b=residual-sum-of-squares-excel\",\"WARC-Payload-Digest\":\"sha1:3HT5ONSIZCU72SZOBTUHWSMSX7VAYT3X\",\"WARC-Block-Digest\":\"sha1:7D34TRXYTX56PP4AFQLNG6X56XBIBB3Z\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243988775.80_warc_CC-MAIN-20210507090724-20210507120724-00150.warc.gz\"}"} |
http://www.schoolofhardrocks.org/sohrauditorium/tag/sequences/ | [
"# More Beauty In Math\n\nIt has been a while since we shared some fun with math in Science Club. WIth nothing up our sleeves we proceed with some mathemagics. As in three earlier sessions (#1 and #2 and #3) we use the operations of multiplication and addition to build a fascinating sequence.\n\n1 x 9 + 2 = 11\n\n12 x 9 + 3 = 111\n\n123 x 9 + 4 = 1111\n\n1234 x 9 + 5 = 11111\n\n12345 x 9 + 6 = 111111\n\n123456 x 9 + 7 = 1111111\n\n1234567 x 9 + 8 = 11111111\n\n12345678 x 9 + 9 = 111111111\n\n123456789 x 9 +10 = 1111111111\n\nOn occasion one might be a lonely number but we have demonstrated methods to form phalanxes of ones which are hardly lonely.\n\nOne is the Loneliest Number\n\nMathtoid:\n\nELEVEN PLUS TWO = TWELVE PLUS ONE = 13\n\nBut did you realize that ELEVEN PLUS TWO is an anagram of TWELVE PLUS ONE\n\n# More Beauty In Math\n\nWe are going to do a little math in Science Club today – actually some mathemagics. In two previous sessions (#1 and #2) we used the operations of multiplication and addition to build some remarkable sequences. Today we shall do another.\n\nTry this:\n\n9 x 9 + 7 = 88\n98 x 9 + 6 = 888\n987 x 9 + 5 = 8888\n9876 x 9 + 4 = 88888\n98765 x 9 + 3 = 888888\n987654 x 9 + 2 = 8888888\n9876543 x 9 + 1 = 88888888\n98765432 x 9 + 0 = 888888888\n\nThere we are, You can say what you like about us but you have to admit that, at least in numbers, we are very well rounded at the School Of Hard Rocks.\n\n# More Beauty In Math\n\nThe last time we toyed with numbers, we admired the symmetric array produced by massively multiplying bunches of ones (see post 20120409). Today we operate on an ascending sequence to develope a descending pattern. Everything is really going the right way – multiplying and adding do indeed give us larger numbers each time but the digits roll off in a delightful way. Maybe the government could use this technique to make our collective debt seem less frightening.\n\n1 x 8 + 1 = 9\n12 x 8 + 2 = 98\n123 x 8 + 3 = 987\n1234 x 8 + 4 = 9876\n12345 x 8 + 5 = 98765\n123456 x 8 + 6 = 987654\n1234567 x 8 + 7 = 9876543\n12345678 x 8 + 8 = 98765432\n123456789 x 8 + 9 = 987654321"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.872824,"math_prob":0.99606514,"size":1839,"snap":"2020-24-2020-29","text_gpt3_token_len":601,"char_repetition_ratio":0.16784741,"word_repetition_ratio":0.050125312,"special_character_ratio":0.44535074,"punctuation_ratio":0.046321526,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9980492,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-15T03:57:43Z\",\"WARC-Record-ID\":\"<urn:uuid:dceda7dd-b916-4894-9c28-f34e97235e8b>\",\"Content-Length\":\"35054\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:518ebe7c-ff56-42bf-98b4-6cb948c6f308>\",\"WARC-Concurrent-To\":\"<urn:uuid:9a137072-4c20-4a04-90e8-aa8a965393a7>\",\"WARC-IP-Address\":\"205.178.145.142\",\"WARC-Target-URI\":\"http://www.schoolofhardrocks.org/sohrauditorium/tag/sequences/\",\"WARC-Payload-Digest\":\"sha1:YTTUAY5ZW5W6HSESETF5B5BBACX5WMIE\",\"WARC-Block-Digest\":\"sha1:DQVSYG7CJATPOE2ZXZ7KQZ5OKNZY5ZJC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593657155816.86_warc_CC-MAIN-20200715035109-20200715065109-00431.warc.gz\"}"} |
https://byjus.com/question-answer/rahul-found-3-pairs-of-wooden-ice-cream-sticks-in-which-the-sticks-in-each-1/ | [
"",
null,
"",
null,
"Question\n\n# Rahul found 3 pairs of wooden ice-cream sticks in which the sticks in each pair are of the same length as shown below.",
null,
"Rahul took one stick each from each pair and made a triangle. Likewise, his friend Arjun made another triangle which looked exactly same with the remaining sticks. They realized both these triangles have the same perimeter and are congruent under the ___________ criterion of congruency. SAS SSA SSS ASA\n\nSolution\n\n## The correct option is C SSS",
null,
"Since, the lengths of all the sides of triangles constructed by Rahul and Arjun are same, both the triangles are congruent using SSS congruency condition. Thus, perimeters of both the triangles are equal.",
null,
"",
null,
"Suggest corrections",
null,
"",
null,
"",
null,
""
] | [
null,
"data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNDQiIGhlaWdodD0iNDQiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"https://search-static.byjusweb.com/question-images/byjus/123674_c9ef1333830eafa2a2baca2ff4a0024a56aa703520160630-5020-d8we23.png",
null,
"https://search-static.byjusweb.com/question-images/byjus/123674_07dac478d261a3add99d093d256fcfa306b00e1a20160630-5020-c3atfk.png",
null,
"data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMzIiIGhlaWdodD0iMzIiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMjQiIGhlaWdodD0iMjQiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null,
"data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9659507,"math_prob":0.88342077,"size":631,"snap":"2021-43-2021-49","text_gpt3_token_len":144,"char_repetition_ratio":0.16586922,"word_repetition_ratio":0.0,"special_character_ratio":0.20285262,"punctuation_ratio":0.08547009,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98299,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,null,null,null,null,1,null,1,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-11-28T14:36:08Z\",\"WARC-Record-ID\":\"<urn:uuid:293e587f-17cd-4dc1-93a5-203a9f01816a>\",\"Content-Length\":\"116521\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f7411651-228e-42e5-99f0-0b6fc51fc75d>\",\"WARC-Concurrent-To\":\"<urn:uuid:26a69a47-92aa-4b20-9344-b9f606cd20ae>\",\"WARC-IP-Address\":\"162.159.130.41\",\"WARC-Target-URI\":\"https://byjus.com/question-answer/rahul-found-3-pairs-of-wooden-ice-cream-sticks-in-which-the-sticks-in-each-1/\",\"WARC-Payload-Digest\":\"sha1:CORA3QKI2PYOX6ZSNORA7U46TLJFI4RJ\",\"WARC-Block-Digest\":\"sha1:S3ZWARBY4NIZGP5C5WWLOA4L2JXDO4BK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964358560.75_warc_CC-MAIN-20211128134516-20211128164516-00089.warc.gz\"}"} |
https://physics.stackexchange.com/questions/46838/how-many-percent-of-the-visible-light-reaching-the-earth-are-from-other-stars-th | [
"# How many percent of the visible light reaching the Earth are from other stars than the Sun?\n\nHow many percent of the whole visible light reaching the Earth are from other stars than the Sun?\n\nIs it maybe 0,5 - 1% or is my guess already too much?\n\nI am interested mainly in visible light, but if you have knowledge about other parts you can drop it too ;)\n\n• As the moonless night sky is to the brightest noon-day sun. Clearly vastly smaller than 1%. Remember also that our senses seem to measure logarithmicly , so the true ratio is probably much smaller even than we sense it to be. – Pieter Geerkens Apr 18 '13 at 1:35\n\nI don't know the exact number but I want to support Johannes' claim that the percentage is way smaller by a calculation.\n\nMost of the light arguably comes from the Milky Way - especially the strip that gave name to the galaxy. The diameter of the Milky Way is 100,000-120,000 light years so the median star's distance is something like 50,000 light years away from us. That's approximately $3\\times 10^{9}$ times longer a distance than those 500 seconds for the Sun. One must square the distance ratio to get the light power ratio, about $10^{17}$, between the Sun and the typical Milky Way star. Even when $10^{-17}$ is multiplied by the number of stars in the Milky Way, about $1-4\\times 10^{11}$ stars, one gets $1-4$ parts per million of the light, also assuming that the Sun is an average-size star. My estimate is 3 orders of magnitude greater than Johannes' but it's still vastly smaller than 0.5%.\n\nJust to check, Sirius is the brightest star in the sky. It's 25 times brighter than the Sun but it's 9 light years away, which is $500,000$ times further than the Sun. Square it and divide 25 by it to get $10^{-10}$. That's the fraction of the sunlight obtained from Sirius. You see that it's much smaller than the result for the generic Milky Way stars above, so individual bright (and mostly nearby) stars are unlikely to topple the statistical estimate. The weakest point of the statistical estimate is that the Sun isn't quite the average star.\n\nOne may also check the contribution from other galaxies. There are about $2\\times 10^{11}$ galaxies in the Universe. However, even if you decide that the average distance from us is 5 billion years only, shorter than half of the age of the Universe, it's 100,000 times further than the average Milky Way star discussed above (50,000 light years). Square it to get $10^{10}$ for the ratio. If you multiply $10^{-10}$ by $10^{11}$, you actually conclude that the total light from other galaxies is about 10 times greater than the total light from the Milky Way. But that's probably an overestimate because much of the very distant galactic light is redshifted, absorbed, and the older galaxies may have a lower luminosity. At any rate, it's unlikely that they will drive us above 1/100,000 of the sunlight.\n\nFinally, instead of trying even more distant stars, let me mention that there is also the Moon in the sky. It's actually dominating or almost dominating the luminosity at night, except for the new moon or eclipses. In average, we get 1 milliwatt from the moonlight which is 1/300,000 of the Sun's 342 Watts (averaged over places, seasons, day cycles). That's about the same what I got for the total strip of stars in the Milky Way – 3 parts per million of the Sun – but my estimate of the stars was probably an overestimate and I believe the Moon is brighter than the Milky Way combined.\n\n• your answer is by factor of 50 away from the value of SpiderPig (which I think can not be wrong, since measured). What do you think could be the reason? I have some idea, but 50x... is quite a lot :) – Ilja Apr 22 '16 at 10:26\n• There are so many factors over there that I am not surprised by a factor of 50. Probably the comparison of the Sun with the average star is the greatest source of an error. Well,if you're really interested, you may want to check every individual step, there are too many of them and I don't think that too many people would be interested in the refinements of the argument. – Luboš Motl Apr 22 '16 at 19:28\n\nAccording to this site http://en.wikipedia.org/wiki/Apparent_magnitude It should be around 0.000001%. Because the \"The total integrated magnitude of the night sky as seen from Earth\" is -6.5 and the sun is -26.74. 2.512^20.24 = 125 million.\n\nThe ratio of starlight to sunlight is much, much smaller than 0.5%. A value of 0.0000001% is far more accurate.\n\n• Just to be sure, are we talking about the visible light? Becasue, when there is a night and no moon on the sky, some stars make at least a little visible light, even in the deepest night. So, to me 0.0000001% seem too little (maybe 0,01 or so but 0.0000001% seems to be too small) , but I will read your reference later. – Derfder Dec 14 '12 at 14:16\n• For this order-of-magnitude estimate it doesn't matter which part of the electromagnetic spectrum (visible or not) you consider. Stars radiate at temperatures similar to that of the sun, and hence their spectra are similar. – Johannes Dec 14 '12 at 14:19\n• @Derfder It often goes unappreciated, but human eyes have an enormous dynamic range. Give them time to adjust, and they can make due with orders of magnitude fewer photons than \"normal.\" – user10851 Dec 14 '12 at 16:27\n\nAccording to Ahad's constant = 1/300th full moon\n\nAhad's constant = (magnitude of stars) + (magnitude of milky way)\n\n= (-6.0) + (-5.1) = -6.5 mags net (1/300th of a Full Moon).\n\nIf you added up the minute amounts of light from each and every single star visible across the full, 360-degree spherical celestial sphere around you, the total flux would roughly equate to AC. It is simply the total amount of light an observer would visually experience in local interstellar space, when located away from the bright neighbourhood of our Sun.\n\n• This could use more detail, such as a brief description of Ahad's Constant and why it would work in this scenario. – JMac Oct 18 '17 at 14:33\n\nThe part of your question about the non-visible light gives quite surprising (to me at least) results! :\n\nCompare the power from the sun with the cosmic microwave background (\"CMB\"), taking both as blackbody radiators:\nThe temperatures are 2.725 and 5778 K respectively (wikipedia :))\nThe solid angle of the CMB is obviously $4\\pi$. The diameter of the sun as seen from the earth is 32' (= 32/60 degrees) according to wikipedia, which gives a solid angle of $6.8\\cdot 10^{-5}$. This would give a ratio in the angles of $5.4\\cdot 10^{-6}$.\n(To be precise, we need a factor of 1/2 more here, since the sunlight is absorbed only by half of the earth, whereas the CMB is always \"shining\". So I will use a ratio of $2.7\\cdot 10^{-6}$. Ignore the factor 1/2 if this reasoning seems too complicated)\n\nSo we get a ratio of the radiation power of $$\\frac {P_\\mathrm{sun}}{P_\\mathrm{CMB}} = \\frac {T_\\mathrm{sun}^4}{T_\\mathrm{CMB}^4} \\cdot \\frac {\\Omega_\\mathrm{sun}}{\\Omega_\\mathrm{CMB}} = 2\\cdot 10^{13} * 2.7\\cdot 10^{-6} = 54\\,\\mathrm{million}$$\n\nComparing with 125 million from SpiderPig (which is definitely the more precise answer), I get the astonishing result, that the CMB \"shines\" more than twice as powerful than all the other stars combined!\n\nPS: the reasoning for the ration of CMB to other stars has some difficulty, of course...\nThe value for the stars is derived from measurements with visible light, the other value is based on the total power of a blackbody. So the ratio is only correct if the stars have the same temperature as the sun (or more precise, if the ratio of visible power to total power is the same). Since the light of stars is less visible than the sun's (funnily, \"per definition\" :) - it's the evolutionary definition of visible!) they really produce more power than we think by looking (i.e. the 1 to 125 million of the sun). So the ratio might be (maybe much) smaller than two, but it's still astonishing..."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93960273,"math_prob":0.9825669,"size":2846,"snap":"2020-34-2020-40","text_gpt3_token_len":671,"char_repetition_ratio":0.14813511,"word_repetition_ratio":0.00811359,"special_character_ratio":0.26212227,"punctuation_ratio":0.09391304,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9848324,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-11T10:29:10Z\",\"WARC-Record-ID\":\"<urn:uuid:8b1b65d9-34a1-462e-bc7e-289521b1556e>\",\"Content-Length\":\"191606\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8cdeaf23-deae-4835-ba84-99e3608c7f01>\",\"WARC-Concurrent-To\":\"<urn:uuid:653977c9-6698-4e25-9709-f5576653422e>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://physics.stackexchange.com/questions/46838/how-many-percent-of-the-visible-light-reaching-the-earth-are-from-other-stars-th\",\"WARC-Payload-Digest\":\"sha1:A5M2MFADI2ZMBSNMBBLSUA2CH23Y2C3I\",\"WARC-Block-Digest\":\"sha1:SV7FEJV5557OU3FQPPFPPYXVLIVGA76F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738746.41_warc_CC-MAIN-20200811090050-20200811120050-00075.warc.gz\"}"} |
https://www.intechopen.com/chapters/65597 | [
"",
null,
"Open access\n\n# Introductory Chapter: Frontier Research on Integral Equations and Recent Results\n\nWritten By\n\nFrancisco Bulnes\n\nSubmitted: January 3rd, 2019 Published: February 11th, 2019\n\nDOI: 10.5772/intechopen.84197\n\nFrom the Edited Volume\n\n## Recent Advances in Integral Equations\n\nEdited by Francisco Bulnes\n\nChapter metrics overview\n\nView Full Metrics\n\n“Mathematics knows no races or geographic boundaries; for mathematics, the cultural world is one country”\n\n- David Hilbert\n\n## 1. General discussion\n\nThe themes of recent research are focused on nonlinear integral equations , the new numerical and adaptive methods of resolution of integral equations , the generalization of Fredholm integral equations of second kind, integral equations in time scales and the spectral densities [3, 4], operator theories for nonsymmetric and symmetric kernels [1, 5], extension problems to Banach algebras to kernels of integral equations [5, 6, 7], singular integral equations , special treatments to solve Fredholm integral equations of first and second kinds, nondegenerate kernels [3, 6] and symbols of integral equations , topological methods for the resolution of integral equations and representation problems of operators of integral equations.\n\nNow, well, the field of the integral equations is not finished yet, not much less with the integral equations for which the Fredholm theorem is worth [fredholm], nor with the completely continuous operators, since there exist other integral equations developed of the Hilbert theory respect to the Fredholm discussion, and studies on singular integral equations, also by Hilbert, Wiener and others . Arise numerical and approximate methods on the big vastness that give the Banach algebras, even using probabilistic measures to solve some integral equations in the ambit of distributions and stochastic process. Likewise, there arise integral equations in which the proper values are corresponded to linearly independent infinite proper functions. Such is the case, for example, of the Lalesco-Picard integral equation:\n\nωtλ+etsωsds=ft,E1\n\nin which the kernel ets is not of L2 class and gives a continuous spectra, or even, we consider nonlinear integral equations, etc., that represent the last and recent studies on integral equations after of their study considering extensions of the Banach algebras to integral operators that can define to this proposit, for example, to singular integral equations.\n\nLikewise, as special case, for their important theory, we can treat the singular integral equations of Cauchy. This theory was created almost immediately after the Fredholm theory, and their beginning is given in the “Lecons de Mécanique Céleste” by Poincaré and Fichot , and to the Hilbert works on contour and boundary problems of the analytic functions theory.\n\nA possible treatment, bringing the Cauchy ideas together with Banach algebras, is the consideration of the Calkin algebra BXKX, on a Banach space X, likewise as the operators of subalgebras of this special Banach algebra (e.g., the algebra of the bounded operators BX, and KX, the ideal of compact operators) . For example, consider the bounded operators in a Banach space with closed range and with kernel and co-kernel of finite dimension. These are called Fredholm operators and are the operators that give invertible elements of the Calkin algebra. The operators of the Calkin algebra radical are called Reisz operators and can be characterized spectrally and in terms of the dimensions of RecλITk, kerλITk, etc. Very questions on these algebras are motive of modern research. However, also the integral equations research has developed more the functional analysis, considering the function theory, integral transforms and the Kernels study in a wide form.\n\nFor other side, a general resolution method to the singular integral equations cannot be given in detail on the effective resolution of these equations, because is followed the research on a general methods to this integral equations class through certain special functions and integral transforms, which are of diverse and varied nature [5, 11]. In fact, the resolution of singular integrals considering the Hilbert transform and the Fourier transform has been in the last years strongly researched. Here we only consider the intimate relation between this singular integral equations theory with the analytic functions theory and special functions related with the regularity and completeness of the solutions required.\n\nOne of the new developments on nonlinear integral equations are followed to the Hammerstein integral equations , which is written as\n\nωt+abKtsfsωsds=0,atbE2\n\nwhere Kts and fts are given functions, while ωt is the unknown function. Hammerstein considered for Kts, a symmetric and positive Fredholm kernel. This last condition establishes that all their eigenvalues are positive. Thus, the function fts is continuous and satisfies ftsC1s+C2, where C1 and C2 are positive constants and C1 is smaller than the first eigenvalue of the kernel Kts; then, the Hammerstein integral equation has at least one continuous solution. Also are considered certain observations on the no decreasing of the function fts, on s, considering fix t, from the interval ab. The Hammerstein’s equation cannot have more than one solution. This property holds also if fts satisfies the condition\n\nfts1f(ts2)Cs1s2,E3\n\nwhere the positive constant C is smaller than the first eigenvalue of the kernel Kts. A solution of the Hammerstein equation may be constructed by the method of successive approximation. In regard to this point, many approximation methods are designed to solve these integral equations and other nonlinear integral equations. Also of interest are the recent developments on Hammerstein-Volterra integral equations:\n\nft=ωt+0tKtsfsωsds,0t1E4\n\nIn the aspect of the linear integral equations has been important the study of the Volterra integral equations on time scale, where have more importance the initial value problems with unbounded domains. Likewise, the development on the alternate form of a linear integral equation is given as:\n\nft=ωt+atBtsωσsds,tITE5\n\nwhere Bts is a kernel that comes of a Banach algebra, and ωσ, arises naturally of changing dynamics problems, for example the economic dynamics. Some aspects in their prospective can be extended to the nonlinear case.\n\nOther studies go on to develop generalizations of integral equations of Fredholm type using Weyl fractional integral operators and the kernel as product of certain generalized functions of special functions such as the H functions and the I functions. This establishes new techniques in function theory and functional analysis relating some integral transforms such as the Mellin transform .\n\nOther developments start the probabilistic methods searching the obtaining of a solution of some integral equations of the second kind and Volterra integral equation, thinking in stochastic phenomena where is necessary determine an aleatory behavior.\n\nWritten By\n\nFrancisco Bulnes\n\nSubmitted: January 3rd, 2019 Published: February 11th, 2019"
] | [
null,
"https://cdnintech.com/web/frontend/www/assets/43.55/journals/OpenAccessLock.svg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8001052,"math_prob":0.9925271,"size":5453,"snap":"2023-14-2023-23","text_gpt3_token_len":1246,"char_repetition_ratio":0.18572216,"word_repetition_ratio":0.0049875313,"special_character_ratio":0.21492757,"punctuation_ratio":0.15015641,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9950964,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-02T14:35:50Z\",\"WARC-Record-ID\":\"<urn:uuid:182f087b-0fee-44ab-9a14-7cf2d3308aba>\",\"Content-Length\":\"515810\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:74bac6b1-481d-4960-85b9-ac82927a8f23>\",\"WARC-Concurrent-To\":\"<urn:uuid:d89623d0-bd38-4924-b236-8cb17487d7ed>\",\"WARC-IP-Address\":\"35.171.73.43\",\"WARC-Target-URI\":\"https://www.intechopen.com/chapters/65597\",\"WARC-Payload-Digest\":\"sha1:MK57LNLT32JDIG7YHDXI5U6B5HLHV3SM\",\"WARC-Block-Digest\":\"sha1:LYKTS5AS56J7O2AJQ3YIKL36KAASDA74\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224648695.4_warc_CC-MAIN-20230602140602-20230602170602-00667.warc.gz\"}"} |
https://www.nmaps.net/183976 | [
"#",
null,
"## Death Note",
null,
"Hover over the thumbnail for a full-size version.\n\nAuthor the_stealthy_mastermind action author:the_stealthy_mastermind unrated 2009-10-22 2009-10-22 5 more votes required for a rating. \\$Death Note#the_stealthy_mastermind#action#000000000000000000000000111110;11110000000000001000102400000000000000010001002400000000000000:111=00024000000000000000000000024000000000000111110;111=00000000000010101000000000000000000101010;111<000000000000=0=0=010001000000000000000000100010000000000001111<010001000000000000101000:111=000000000000:111<000000000000000000000000<0000000000000000<00000100000000000000001000001111100000000000011111010000000000000000100000:0000000000000000:000000000000000000000000000011111000000000000;111=01010100000000000000100010101000000000000;111=0=0=0=0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000|5^36,42!0^108,342!0^108,354!0^108,348!0^108,360!0^108,366!0^108,372!0^108,378!0^108,384!0^108,390!0^114,342!0^120,348!0^126,354!0^114,390!0^120,384!0^126,378!0^132,372!0^138,366!0^132,360!0^150,342!0^156,342!0^162,342!0^168,342!0^150,348!0^150,354!0^150,360!0^156,360!0^162,360!0^168,360!0^150,366!0^150,378!0^150,372!0^150,384!0^150,390!0^156,390!0^162,390!0^168,390!0^180,390!0^180,384!0^180,378!0^180,372!0^180,366!0^180,360!0^180,354!0^180,348!0^180,342!0^186,342!0^192,342!0^198,342!0^204,342!0^204,348!0^204,354!0^204,360!0^204,366!0^204,372!0^204,378!0^204,384!0^204,390!0^186,366!0^192,366!0^198,366!0^216,390!0^216,384!0^216,372!0^216,378!0^216,360!0^216,366!0^216,348!0^216,354!0^216,342!0^222,342!0^222,360!0^228,354!0^228,342!0^234,348!0^222,366!0^228,372!0^234,378!0^240,384!0^246,390!0^258,390!0^258,396!0^252,402!0^258,402!0^276,414!0^276,420!0^276,426!0^276,432!0^276,438!0^276,444!0^276,450!0^276,456!0^276,462!0^282,414!0^288,414!0^294,414!0^294,420!0^294,426!0^294,432!0^288,432!0^282,432!0^306,414!0^306,420!0^306,426!0^306,432!0^306,438!0^306,450!0^306,444!0^306,462!0^306,456!0^312,462!0^318,462!0^330,462!0^330,450!0^330,456!0^330,438!0^330,444!0^330,426!0^330,432!0^330,420!0^330,414!0^336,414!0^342,414!0^348,414!0^336,432!0^342,432!0^348,432!0^336,462!0^348,462!0^342,462!0^360,462!0^360,456!0^360,450!0^360,444!0^360,438!0^360,432!0^360,426!0^360,414!0^360,420!0^366,414!0^372,414!0^378,414!0^384,414!0^384,420!0^384,426!0^384,438!0^384,432!0^384,450!0^384,444!0^384,456!0^384,462!0^366,432!0^372,432!0^378,432!0^414,414!0^396,414!0^396,420!0^396,426!0^402,414!0^408,414!0^396,432!0^402,432!0^408,432!0^414,432!0^414,438!0^414,444!0^414,450!0^414,456!0^414,462!0^408,462!0^402,462!0^396,462!0^426,414!0^432,414!0^438,414!0^444,414!0^426,420!0^426,426!0^426,432!0^426,438!0^426,444!0^426,450!0^426,456!0^426,462!0^432,462!0^438,462!0^444,462!0^432,432!0^444,432!0^438,432!0^474,414!0^474,420!0^474,426!0^474,432!0^474,438!0^474,444!0^474,450!0^474,456!0^474,462!0^480,414!0^486,414!0^492,414!0^498,414!0^498,420!0^498,432!0^498,426!0^498,438!0^498,444!0^498,456!0^498,450!0^498,462!0^480,432!0^486,432!0^492,432!0^510,414!0^516,414!0^522,414!0^528,414!0^510,420!0^510,426!0^510,438!0^510,432!0^510,450!0^510,444!0^510,462!0^510,456!0^516,462!0^522,462!0^528,462!0^540,414!0^546,414!0^552,414!0^558,414!0^540,420!0^540,426!0^540,432!0^540,438!0^540,444!0^540,450!0^540,456!0^540,462!0^546,462!0^552,462!0^558,462!0^570,414!0^570,420!0^570,426!0^570,432!0^570,444!0^570,438!0^570,456!0^570,450!0^570,462!0^576,414!0^588,414!0^582,414!0^576,432!0^582,432!0^588,432!0^576,462!0^588,462!0^582,462!0^600,414!0^600,420!0^600,426!0^600,432!0^600,438!0^600,450!0^600,444!0^600,456!0^600,462!0^606,414!0^612,414!0^618,414!0^618,420!0^618,426!0^618,432!0^612,432!0^606,432!0^630,414!0^636,414!0^642,414!0^648,414!0^654,414!0^642,420!0^642,426!0^642,432!0^642,438!0^642,444!0^642,450!0^642,456!0^642,462!0^276,504!0^276,510!0^276,516!0^276,522!0^276,528!0^276,534!0^276,540!0^276,546!0^276,552!0^282,504!0^288,510!0^294,516!0^300,510!0^306,504!0^312,504!0^312,510!0^312,516!0^312,522!0^312,528!0^312,534!0^312,540!0^312,546!0^312,552!0^324,504!0^330,510!0^336,516!0^342,522!0^342,504!0^342,510!0^342,516!0^342,528!0^342,534!0^342,540!0^342,546!0^342,552!0^378,504!0^378,510!0^378,516!0^378,522!0^378,528!0^378,534!0^378,540!0^378,546!0^378,552!0^384,552!0^390,546!0^396,540!0^402,534!0^384,504!0^390,510!0^396,516!0^402,522!0^408,528!0^420,504!0^420,510!0^420,516!0^420,522!0^420,528!0^420,540!0^420,534!0^420,546!0^420,552!0^426,552!0^432,552!0^426,504!0^432,504!0^438,504!0^438,552!0^426,522!0^432,522!0^438,522!0^450,504!0^450,NaN!0^450,540!0^450,552!0^456,504!0^462,504!0^468,504!0^474,510!0^474,504!0^474,516!0^474,522!0^474,528!0^474,534!0^474,540!0^474,546!0^474,552!0^456,522!0^462,522!0^468,522!0^486,504!0^492,504!0^504,504!0^498,504!0^510,504!0^498,510!0^498,516!0^498,522!0^498,528!0^498,540!0^498,534!0^498,546!0^498,552!0^522,504!0^522,510!0^522,516!0^522,522!0^522,528!0^522,534!0^522,540!0^522,546!0^522,552!0^528,528!0^534,528!0^540,528!0^546,528!0^546,516!0^546,522!0^546,504!0^546,510!0^546,534!0^546,540!0^546,546!0^546,552!0^564,552!9^144,480,0,0,9,3,1,0,0!9^708,540,0,0,9,3,1,-2,0!3^756,36!3^36,564!0^450,546!0^450,534!0^450,522!0^450,504!0^450,510!0^450,516!0^450,NaN!0^450,528!2^756,576,0,-2!2^36,24,0,1!11^540,228,204,84!9^72,252,0,0,23,9,1,-1,0!9^396,336,0,0,23,9,1,0,0!2^348,576,0,-2# A letter from someone to someone\n\n## Other maps by this author",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"X009- Absolute Brainiack Greece X010 - Abstract War at Grand Canyon Open Sesame X011 - Golden Eagle"
] | [
null,
"https://www.nmaps.net/static/logo.png",
null,
"http://lh5.ggpht.com/6KyuhHP49y6Hy_z2-UBN67IECBdcdKOV7abGiYOsJlUPCoATMlejP4O4PTeGt7iJmb5L6h6SVBscIbih1bSYOzsD=s132",
null,
"http://lh4.ggpht.com/D7ww3bOomENk5D5p1tL0TST7AFFQUvv1VgcvCPbCpLW52WZtbfbGapgkg-fMXO4fIBNa0nnTRCvVlL-nPQLAFmM=s132",
null,
"http://lh4.ggpht.com/WxMahWBr5CgnVFR3EeGouQ5wfkROzZ_9erhiI9E2d5oawfZumA7isBA2G6dOqSg07VO6MmbEROaCOr1-uJzrVTE=s132",
null,
"http://lh6.ggpht.com/ZJo3KKUC5j27Jw9uKv_lKw0gJytM4gsh94pp1ICrkgKk_ypd5N72pSRXJTbcDghEOtzbQsPKhWCZwXenetx5hdQ=s132",
null,
"http://lh3.ggpht.com/ub6lNwlsS5LDfGsQ3lTEGe4AQxwGCOfq7zNlVSObMI-XoRxZKpNFYoqmytjIyUqpmDTj7vmqxBZRSB1GKJlf8BQ=s132",
null,
"http://lh4.ggpht.com/bS6axy6K8iX2uXUts2AbVSwbQcBR95hH0n16gxph8W-oi1fv6iUcFZ4sviURbmNQiIYs9MhQD_Bu1ccjYMCpodTm=s132",
null,
"http://lh5.ggpht.com/MtoJs5qXvsMXWuoDMZT022gYfg0fTeaPlrU_SJ_6b6d4CWqNlT5fRG3HFLDSHteEU6iAlmBXblaPLj6eR85G8w=s132",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6260447,"math_prob":0.99950755,"size":307,"snap":"2022-27-2022-33","text_gpt3_token_len":104,"char_repetition_ratio":0.10891089,"word_repetition_ratio":0.0,"special_character_ratio":0.27687296,"punctuation_ratio":0.0625,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9693761,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,null,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-10T01:33:26Z\",\"WARC-Record-ID\":\"<urn:uuid:d848a386-6aa8-4e5c-b7f9-4a0f932b69c7>\",\"Content-Length\":\"13460\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4b44f81-07dd-4f91-b615-e7db243b43eb>\",\"WARC-Concurrent-To\":\"<urn:uuid:87e0c30e-e52d-4af1-95ca-4e2493f9e437>\",\"WARC-IP-Address\":\"142.250.188.211\",\"WARC-Target-URI\":\"https://www.nmaps.net/183976\",\"WARC-Payload-Digest\":\"sha1:JTSXE4RQ3JFYMDY6M5XDKRG74LCVDYUZ\",\"WARC-Block-Digest\":\"sha1:WVPSVYXFALI2RMDK2Z7JESW2S4IVXRKS\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571097.39_warc_CC-MAIN-20220810010059-20220810040059-00430.warc.gz\"}"} |
https://prod-eks-app-alb-1037681640.ap-south-1.elb.amazonaws.com/blog/types-of-regression-models-in-machine-learning/ | [
"Programs\n\n# 6 Types of Regression Models in Machine Learning You Should Know About\n\n## Introduction\n\nLinear regression and logistic regression are two types of regression analysis techniques that are used to solve the regression problem using machine learning. They are the most prominent techniques of regression. But, there are many types of regression analysis techniques in machine learning, and their usage varies according to the nature of the data involved.\n\nThis article will explain the different types of regression in machine learning, and under what condition each of them can be used. If you are new to machine learning, this article will surely help you in understanding the regression modeling concept.\n\n## Best Machine Learning Courses & AI Courses Online\n\n Master of Science in Machine Learning & AI from LJMU Executive Post Graduate Programme in Machine Learning & AI from IIITB Advanced Certificate Programme in Machine Learning & NLP from IIITB Advanced Certificate Programme in Machine Learning & Deep Learning from IIITB Executive Post Graduate Program in Data Science & Machine Learning from University of Maryland To Explore all our courses, visit our page below. Machine Learning Courses\n\nCheck out our IT free courses to get an edge over the competition.\n\n## What is Regression Analysis?\n\nRegression analysis is a predictive modelling technique that analyzes the relation between the target or dependent variable and independent variable in a dataset. The different types of regression analysis techniques get used when the target and independent variables show a linear or non-linear relationship between each other, and the target variable contains continuous values. The regression technique gets used mainly to determine the predictor strength, forecast trend, time series, and in case of cause & effect relation.\n\n## In-demand Machine Learning Skills\n\n Artificial Intelligence Courses Tableau Courses NLP Courses Deep Learning Courses\n\nRegression analysis is the primary technique to solve the regression problems in machine learning using data modelling. It involves determining the best fit line, which is a line that passes through all the data points in such a way that distance of the line from each data point is minimized.\n\nLearn AI & ML Courses online from the World’s top Universities – Masters, Executive Post Graduate Programs, and Advanced Certificate Program in ML & AI to fast-track your career.\n\n## Types of Regression Analysis Techniques\n\nThere are many types of regression analysis techniques, and the use of each method depends upon the number of factors. These factors include the type of target variable, shape of the regression line, and the number of independent variables.\n\nBelow are the different regression techniques:\n\n1. Linear Regression\n2. Logistic Regression\n3. Ridge Regression\n4. Lasso Regression\n5. Polynomial Regression\n6. Bayesian Linear Regression\n\nMust Read: Free deep learning course!\n\nThe different types of regression in machine learning techniques are explained below in detail:\n\n### 1. Linear Regression\n\nLinear regression is one of the most basic types of regression in machine learning. The linear regression model consists of a predictor variable and a dependent variable related linearly to each other. In case the data involves more than one independent variable, then linear regression is called multiple linear regression models.\n\nThe below-given equation is used to denote the linear regression model:\n\ny=mx+c+e\n\nwhere m is the slope of the line, c is an intercept, and e represents the error in the model.",
null,
"Source\n\nThe best fit line is determined by varying the values of m and c. The predictor error is the difference between the observed values and the predicted value. The values of m and c get selected in such a way that it gives the minimum predictor error. It is important to note that a simple linear regression model is susceptible to outliers. Therefore, it should not be used in case of big size data.\n\nThere are different types of linear regression. The two major types of linear regression are simple linear regression and multiple linear regression. Below is the formula for simple linear regression.",
null,
"• Here, y is the predicted value of the dependent variable (y) for any value of the independent variable (x)\n• β0 is the intercepted, aka the value of y when x is zero\n• β1 is the regression coefficient, meaning the expected change in y when x increases\n• x is the independent variable\n• is the estimated error in the regression\n\nSimple linear regression can be used:\n\n• To find the intensity of dependency between two variables. Such as the rate of carbon emission and global warming.\n• To find the value of the dependent variable on an explicit value of the independent variable. For example, finding the amount of increase in atmospheric temperature with a certain amount of carbon dioxide emission.\n\nIn multiple linear regression, a relationship is established between two or more independent variables and the corresponding dependent variables. Below is the equation for multiple linear regression.\n\n• Here, y is the predicted value of the dependent variable\n• β0 = Value of y when other parameters are zero\n• β1X1= The regression coefficient of the first variable\n• …= Repeating the same no matter how many variables you test\n• βnXn= Regression coefficient of the last independent variable\n• ∈ = Estimated error in the regression\n\nMultiple linear regression can be used:\n\n• To estimate how strongly two or more independent variables influence the single dependent variable. Such as how location, time, condition, and area can influence the price of a property.\n• To find the value of the dependent variables at a definite condition of all the independent variables. For example, finding the price of a property located at a certain place, with a specific area and its condition.\n\n### 2. Logistic Regression\n\nLogistic regression is one of the types of regression analysis technique, which gets used when the dependent variable is discrete. Example: 0 or 1, true or false, etc. This means the target variable can have only two values, and a sigmoid curve denotes the relation between the target variable and the independent variable.\n\nLogit function is used in Logistic Regression to measure the relationship between the target variable and independent variables. Below is the equation that denotes the logistic regression.\n\nlogit(p) = ln(p/(1-p)) = b0+b1X1+b2X2+b3X3….+bkXk\n\nwhere p is the probability of occurrence of the feature.",
null,
"Source\n\nFor selecting logistic regression, as the regression analyst technique, it should be noted, the size of data is large with the almost equal occurrence of values to come in target variables. Also, there should be no multicollinearity, which means that there should be no correlation between independent variables in the dataset.\n\n### 3. Ridge Regression",
null,
"Source\n\nThis is another one of the types of regression in machine learning which is usually used when there is a high correlation between the independent variables. This is because, in the case of multi collinear data, the least square estimates give unbiased values. But, in case the collinearity is very high, there can be some bias value. Therefore, a bias matrix is introduced in the equation of Ridge Regression. This is a powerful regression method where the model is less susceptible to overfitting.\n\nBelow is the equation used to denote the Ridge Regression, where the introduction of λ (lambda) solves the problem of multicollinearity:\n\nβ = (X^{T}X + λ*I)^{-1}X^{T}y\n\n### 4. Lasso Regression\n\nLasso Regression is one of the types of regression in machine learning that performs regularization along with feature selection. It prohibits the absolute size of the regression coefficient. As a result, the coefficient value gets nearer to zero, which does not happen in the case of Ridge Regression.\n\nDue to this, feature selection gets used in Lasso Regression, which allows selecting a set of features from the dataset to build the model. In the case of Lasso Regression, only the required features are used, and the other ones are made zero. This helps in avoiding the overfitting in the model. In case the independent variables are highly collinear, then Lasso regression picks only one variable and makes other variables to shrink to zero.",
null,
"Source\n\nBelow is the equation that represents the Lasso Regression method:\n\nN^{-1}Σ^{N}_{i=1}f(x_{i}, y_{I}, α, β)\n\n### 5. Polynomial Regression\n\nPolynomial Regression is another one of the types of regression analysis techniques in machine learning, which is the same as Multiple Linear Regression with a little modification. In Polynomial Regression, the relationship between independent and dependent variables, that is X and Y, is denoted by the n-th degree.\n\nIt is a linear model as an estimator. Least Mean Squared Method is used in Polynomial Regression also. The best fit line in Polynomial Regression that passes through all the data points is not a straight line, but a curved line, which depends upon the power of X or value of n.",
null,
"Source\n\nWhile trying to reduce the Mean Squared Error to a minimum and to get the best fit line, the model can be prone to overfitting. It is recommended to analyze the curve towards the end as the higher Polynomials can give strange results on extrapolation.\n\nBelow equation represents the Polynomial Regression:\n\nl = β0+ β0x1+ε\n\n### 6. Bayesian Linear Regression\n\nBayesian Regression is one of the types of regression in machine learning that uses the Bayes theorem to find out the value of regression coefficients. In this method of regression, the posterior distribution of the features is determined instead of finding the least-squares. Bayesian Linear Regression is like both Linear Regression and Ridge Regression but is more stable than the simple Linear Regression.",
null,
"Source\n\nPeople often wonder “what is regression in AI” or “what is regression in machine learning”. Machine learning is a subset of AI; hence, both questions have the same answer.\n\nIn the case of regression in AI, different algorithms are used make a machine learn the relationship between the provided data sets and make predictions accordingly. Hence, regression in AI is mainly used to add a level of automation to the machines.\n\nRegression AI is often used in sectors like finance and investment, where establishing a relationship between a single dependent variable and multiple independent variables is a common case. A common example of regression AI will be factors that estimate a house’s price based on its location, size, ROI, etc.\n\nRegression plays a vital role in predictive modelling and is found in many machine learning applications. Algorithms from the regressions provide different perspectives regarding the relationship between the variables and their outcomes. These set models could then be used as a guideline for fresh input data or to find missing data.\n\nAs the models are trained to understand a variety of relationships between different variables, they are often extremely helpful in predicting the portfolio performance or stocks and trends. These implementations fall under machine learning in finance.\n\nThe very common use of regression in AI includes:\n\n• Predicting a company’s sales or marketing success\n• Generating continuous outcomes like stock prices\n• Forecasting different trends or customer’s purchase behaviour\n\nHope this helped to understand what is regression in AI or what is regression in machine learning\n\n## Popular Machine Learning and Artificial Intelligence Blogs\n\n IoT: History, Present & Future Machine Learning Tutorial: Learn ML What is Algorithm? Simple & Easy Robotics Engineer Salary in India : All Roles A Day in the Life of a Machine Learning Engineer: What do they do? What is IoT (Internet of Things) Permutation vs Combination: Difference between Permutation and Combination Top 7 Trends in Artificial Intelligence & Machine Learning Machine Learning with R: Everything You Need to Know\n\n## Conclusion\n\nIn addition to the above regression methods, there are many other types of regression in machine learning, including Elastic Net Regression, JackKnife Regression, Stepwise Regression, and Ecological Regression.\n\nThese different types of regression analysis techniques can be used to build the model depending upon the kind of data available or the one that gives the maximum accuracy. You can explore these techniques more or can go through the course of supervised learning on our website.\n\nIf you’re interested to learn more about machine learning, check out IIIT-B & upGrad’s Executive PG Program in Machine Learning & AI which is designed for working professionals and offers 450+ hours of rigorous training, 30+ case studies & assignments, IIIT-B Alumni status, 5+ practical hands-on capstone projects & job assistance with top firms.\n\n### What are the different types of regression?\n\nThere are 5 types of regression ie 1. linear regression, 2. logistic regression, 3. ridge regression, 4. Lasso regression, 5. Polynomial regression are the various types of regression\n\n### What is regression? What are the types of regressions?\n\nRegression is a supervised machine learning technique which is used to predict continuous values. The ultimate goal of the regression algorithm is to plot a best-fit line or a curve between the data and linear regression, logistic regression, ridge regression, Lasso regression, Polynomial regression are types of regression.\n\n### When should I use regression analysis?\n\nRegression analysis is used when you want to predict a continuous dependent variable from a number of independent variables. If the dependent variable is dichotomous, then logistic regression should be used.",
null,
"## Lead the AI Driven Technological Revolution\n\n### Machine Learning Skills To Master",
null,
"",
null,
""
] | [
null,
"https://www.upgrad.com/blog/wp-content/uploads/2020/07/438px-Linear_regression.svg-1.png",
null,
"https://internal.upgrad.com/blog/wp-content/uploads/2020/07/screenshot-docs.google.com-2022.08.02-14_44_53-300x30.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2020/07/600px-Logistic-curve.svg-1.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2020/07/ridge_regression_geomteric-1.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2020/07/lasso-reg-coef-1.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2020/07/341px-Polyreg_scheffe.svg-1.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2020/07/0_jygl67_LoS29WOeZ-1.png",
null,
"https://prod-eks-app-alb-1037681640.ap-south-1.elb.amazonaws.com/blog/wp-content/uploads/2021/06/cke.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2022/07/Image-Free-Counselling.png",
null,
"https://www.upgrad.com/blog/wp-content/uploads/2022/07/Image-Free-Counselling.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89165306,"math_prob":0.9431895,"size":12731,"snap":"2022-27-2022-33","text_gpt3_token_len":2450,"char_repetition_ratio":0.21929756,"word_repetition_ratio":0.0559683,"special_character_ratio":0.18812348,"punctuation_ratio":0.0927004,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9990135,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,6,null,3,null,6,null,6,null,6,null,6,null,6,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-11T17:25:55Z\",\"WARC-Record-ID\":\"<urn:uuid:499e8ad7-f8b3-4e1f-804b-cf6fd8e68ab1>\",\"Content-Length\":\"420633\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aa4dbbda-ba83-4307-9467-013cf328d1b1>\",\"WARC-Concurrent-To\":\"<urn:uuid:3cfc2033-7f87-4d8a-9605-03949f10cb09>\",\"WARC-IP-Address\":\"3.7.168.202\",\"WARC-Target-URI\":\"https://prod-eks-app-alb-1037681640.ap-south-1.elb.amazonaws.com/blog/types-of-regression-models-in-machine-learning/\",\"WARC-Payload-Digest\":\"sha1:WHCPIPS3TZN5CZKO2G55UBSIWUHPPVQC\",\"WARC-Block-Digest\":\"sha1:27YNDC7OHBU6IIJYH36A2I6KCCO27NZM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571483.70_warc_CC-MAIN-20220811164257-20220811194257-00640.warc.gz\"}"} |
https://backbencher.dev/bubble-sort-using-javascript | [
"",
null,
"# Bubble Sort Using JavaScript\n\nLast updated on 20 Jan, 2023\n\nHere is the bubble sort algorithm:\n\n``````function bubbleSort(arr) {\n// Loop through all items\nfor (let i = 0; i < arr.length; i++) {\n// Loop to move one item at time to right by swaping\nfor (let j = 0; j < arr.length - 1 - i; j++) {\n// Swap positions if n is greater than n+1 value\nif (arr[j] > arr[j + 1]) {\nconst temp = arr[j];\narr[j] = arr[j + 1];\narr[j + 1] = temp;\n}\n}\n}\nreturn arr;\n}``````\n\nBig O of Bubble sort is O(n^2).\n\n--- ○ ---"
] | [
null,
"data:image/png;base64,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",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5234029,"math_prob":0.98285735,"size":415,"snap":"2023-14-2023-23","text_gpt3_token_len":139,"char_repetition_ratio":0.124087594,"word_repetition_ratio":0.0,"special_character_ratio":0.40481928,"punctuation_ratio":0.12765957,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9982233,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-03T08:29:27Z\",\"WARC-Record-ID\":\"<urn:uuid:ea92c310-c0fa-48fb-9120-c76e12764ac6>\",\"Content-Length\":\"22178\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d5cc8362-f336-4bad-ad9d-4a96e78e0bd0>\",\"WARC-Concurrent-To\":\"<urn:uuid:75d18f77-fc7d-4c3b-b3cc-ebd2a4b5ffea>\",\"WARC-IP-Address\":\"34.148.19.16\",\"WARC-Target-URI\":\"https://backbencher.dev/bubble-sort-using-javascript\",\"WARC-Payload-Digest\":\"sha1:35U36EJRCDJMUOTHUWKEPIYFVQX6CSEP\",\"WARC-Block-Digest\":\"sha1:ASGFXA3XYLPTUYKLG4JR6OIEN3L7RBYL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224649177.24_warc_CC-MAIN-20230603064842-20230603094842-00614.warc.gz\"}"} |
https://www.fishpond.com.au/Books/Stochastics-Georgii-Hans-Otto/9783110292541 | [
"COVID-19 Response at Fishpond.com.au\n\nStochastics\nBy\n\nRating\n\nProduct Description\nProduct Details\n\nHans-Otto Georgii, Ludwig-Maximilians-Universitat Munich, Germany.\n\n#### Reviews\n\n\"The textbook is based on a series of lectures taught by the author for many years at the Mathematical Institute of the University of Munich. The material of the book covers two one-semester courses in probability and mathematical statistics, respectively. All chapters are equipped with exercises of varying degrees of difficulty that help to clarify the concepts.The first part of the book is an introduction to probability theory. The material is presented using little of the measure-theoretical background but rather application-oriented examples that preserve its introductory character. Topics range from classical probability distributions to conditional distributions and limit theorems. A short introduction to Markov chains is also given.The second part of the book gives an introduction to mathematical statistics and describes main statistical procedures: parameter and interval estimation, hypothesis testing, linear regression and basics of the analysis of variance approach.The book can be used by undergraduate mathematics majors but also by science and engineering students who wish not only to apply probability and statistics but also to understand how the methods work.\"Vladimir P. Kurenok, MathSciNet",
null,
"",
null,
""
] | [
null,
"https://cdn-w.fishpond.com.au/pixel_trans.gif",
null,
"https://cdn-w.fishpond.com.au/pixel_trans.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90874606,"math_prob":0.75435287,"size":1289,"snap":"2020-24-2020-29","text_gpt3_token_len":225,"char_repetition_ratio":0.1151751,"word_repetition_ratio":0.0,"special_character_ratio":0.159038,"punctuation_ratio":0.086538464,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9943441,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-02T22:29:10Z\",\"WARC-Record-ID\":\"<urn:uuid:c81f0c6b-05e4-4320-afdc-6dbb73eeea1e>\",\"Content-Length\":\"73588\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:922e276a-7ea0-4460-8e23-7442d60b62af>\",\"WARC-Concurrent-To\":\"<urn:uuid:36a30a24-1f51-48e7-a42e-2b59cd0369f5>\",\"WARC-IP-Address\":\"54.172.43.230\",\"WARC-Target-URI\":\"https://www.fishpond.com.au/Books/Stochastics-Georgii-Hans-Otto/9783110292541\",\"WARC-Payload-Digest\":\"sha1:RZT3L3KJC6FZNVO5LH2TODKMGELBE46K\",\"WARC-Block-Digest\":\"sha1:U5NVKKNVRP55CNDOILEXWVCBTGXAHGRA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347426801.75_warc_CC-MAIN-20200602193431-20200602223431-00219.warc.gz\"}"} |
http://apo.enseeiht.fr/doku.php?id=optimal_control | [
"optimal_control\n\n# Optimal control\n\nKeywords: Geometric control, Second order conditions, Simple and Multiple shooting, Differential path following.\n\n## General description\n\nConsider a dynamical system (given by an ordinary differential equation) that one can control. Control theory deals with finding a control law such that the trajectory of the system joins an initial set with a final target. An optimal control problem includes in addition, a cost function (that is a function of state and control variables) to minimize. Hence, an optimal control problem is an optimization problem with differential constraints and boundary conditions.\n\nThe optimal solution (i.e. the optimal control and the associated trajectory) can be found as an extremal, solution of the Pontryagin Maximum Principle (a necessary condition) or by solving the Hamilton-Jacobi-Bellman equation (a sufficient condition). Sufficient second order conditions of local optimality can be derived using the PMP, computing Jacobi fields and then conjugate points.\n\nThe optimal control problem is transformed to a Boundary Value Problem (BVP) when the PMP is applied. In the smooth case one obtains a Two-Points BVP (TPBVP) while in the Bang-Bang or Bang-Singular cases (i.e. with discontinuous optimal control), one gets a Multiple-Points BVP (MPBVP) to solve. Then from the BVP, one defines the shooting method which consists in finding a zero of the shooting equations. Newton algorithm is usually used to find a zero of the nonlinear shooting function, which implies two main difficulties: i) computing the Jacobian of the shooting function and ii) finding an initial guess for the shooting method.\n\n• i) The Jacobian is computed rigorously using the variational equations combined with Automatic Differentiation.\n• ii) In the smooth case, the initial guess must only be a good enough approximation of the solution. In the discontinuous case, the regularized approximation must also reveal the optimal structure (i.e. the sequence of bang and singular arcs, see Figs. 2 and 4). Homotopy method can be used to transform the problem into a simpler one and then to retrieve the solution of the original problem by continuation. Besides, in the discontinuous case, we need a proper regularization technique.",
null,
"The geometric, algorithmic and numerical tools we develop are based on the PMP. To make a close and detailed analysis of optimal control problems, any open-source software we distribute (see Softwares tab) includes indirect methods:\n\n• Shoot: it is a fortran package for solving Two Points Boundary Value Problems by the shooting method. The Jacobian of the shooting function is computed rigorously using variational equations. The problems can be Bang-Bang with many discontinuities.\n• Cotcot: it is a Matlab package designed to compute extremals in the case of smooth Hamiltonian systems, and to obtain the associated conjugate points with respect to the performance index of the underlying optimal control problem.\n• Hampath: it combines Shoot package with Cotcot code, with additional features such as an homotopy method (based on a differential path following algorithm). This software is made to solve optimal control problems with smooth, Bang-Bang or Bang-Singular optimal controls, but also to study Hamiltonian flows.\n\n## Applications:\n\n### Orbital transfer\n\nOne of the main application is the orbital transfer of satellites with low thrust. The two-body and the circular restricted three-body problems have been studied so far. The cost function can be the transfer time or the fuel consumption which leads in the second case to Bang-Bang optimal control. The methods developed by the team have led to the complete resolution of the problem without any a priori knowledge on the optimal structure, in particular without any knowledge on the number of discontinuities (which can be extremely large in the case of low thrust).",
null,
"",
null,
"Figure 2 (from J.-B. Caillau, O. Cots & J. Gergaud, Differential continuation for regular optimal control problems, Optim. Methods Softw., 27 (2012), no 2, 177-196).\n\n(left) Minimum fuel consumption problem (λ = 1) in two-body control, norm of the controls. The norm of the three-dimensional control versus longitude (the final longitude is fixed whereas the final time is free) is displayed for λ close to 0, λ = 0.6, and λ close to 1. For λ = 0, the minimum time problem is solved and |u| = 1 everywhere. Conversely, for λ close to 1, the switching structure has been captured and almost-switches between 0 and 1 are observed on the norm.\n\n(right) Minimum fuel consumption problem (λ = 1) in two-body control, optimal trajectory. The trajectory (in blue) around the Earth is displayed for λ = 0.999, in three dimensions (upper subplot), (q1,q2) and (q2,q3)-projections (lower subplots). The red arrows indicate the control in the three-dimensional view. The action of the control is clearly located around the apogees and the last two perigees.\n\n### Quantum control\n\nThe contrast problem in medical imaging by Nuclear Magnetic Resonance is another main activity of the team. The contrast problem is modeled by pairs of Bloch equations. The control which is a magnetic RF-field is applied to distinguish two different substances. This is done by maximizing the image contrast between the two samples. An interesting case is to distinguish oxygenated blood and deoxygenated blood in the circulatory system (see Fig 3). The introduction of optimal control theory has given great improvements. We first have proved that the optimal solutions are made of bang and singular arcs and we have obtained sub-optimal synthesis (depending on parameters) for which we can certify how far the solutions are from the global solution.",
null,
"Figure 3 (from B. Bonnard & O. Cots, Geometric numerical methods and results in the control imaging problem in nuclear magnetic resonance, Math. Models Methods Appl. Sci., 24 (2014), no. 1, 187-212). Experimental results: The inner circle shape sample mimics the deoxygenated blood, where T1 = 1.3s and T2 = 50ms; the outside moon shape sample corresponds to the oxygenated blood, where T1 = 1.3s and T2 = 200ms.",
null,
"",
null,
"",
null,
"Figure 4 (from B. Bonnard & O. Cots, Geometric numerical methods and results in the control imaging problem in nuclear magnetic resonance, Math. Models Methods Appl. Sci., 24 (2014), no. 1, 187-212). Contrast problem in the blood case, solution BSBSBS with contrast 0.484 for a transfer time tf = 1.5 × min tf. Trajectories for spin 1 (i.e. deoxygenated blood) and spin 2 (i.e. oxygenated blood) in the (y, z)-plane are portrayed in the first two subgraphs. The corresponding control is drawn in the rightmost subgraph."
] | [
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null,
"http://apo.enseeiht.fr/lib/exe/fetch.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8950891,"math_prob":0.9580099,"size":5138,"snap":"2020-45-2020-50","text_gpt3_token_len":1150,"char_repetition_ratio":0.13809896,"word_repetition_ratio":0.08812729,"special_character_ratio":0.21954067,"punctuation_ratio":0.123958334,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98663104,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-29T04:44:43Z\",\"WARC-Record-ID\":\"<urn:uuid:06374219-c73b-42e7-bec1-a6fd99db9163>\",\"Content-Length\":\"18075\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ea108307-b100-4042-8a5c-6be376fb029b>\",\"WARC-Concurrent-To\":\"<urn:uuid:a1498dcc-91ef-4b3d-ac26-0e765d4006d9>\",\"WARC-IP-Address\":\"147.127.176.144\",\"WARC-Target-URI\":\"http://apo.enseeiht.fr/doku.php?id=optimal_control\",\"WARC-Payload-Digest\":\"sha1:QW5ZKCSRXFZJKR7RHUR4XEBOGRWMVFGX\",\"WARC-Block-Digest\":\"sha1:K3PDX5R3CV4MZK32YLREOIRTXPK6DYCY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107902745.75_warc_CC-MAIN-20201029040021-20201029070021-00335.warc.gz\"}"} |
https://studyrocket.co.uk/revision/gcse-mathematics-edexcel/geometry-and-measures/circles | [
"# Circles\n\n## Parts of a circle\n\nYou will need to make sure you can identify all aspects of a circle.\n\nLet’s start with some key lines that make elements of a circle.",
null,
"The radius is always half the diameter.\n\nThe diameter goes across the circle, through the middle of the circle.\n\nA chord it is a line that touches the circumference at two points but does not cross the middle of the circle.\n\nA __tangent __ to the circle touches the circle at only one point.\n\nThe __circumference __of the circle (it’s like the perimeter of the circle).\n\nA secant is a line that intersects the circle in two different points.",
null,
"An arc this is part of the circumference.\n\nA sector it is part of the circle enclosed by two radius or by two points on the circumference.\n\nAn area not enclosed by two radii is called a segment.\n\nWhat is the name for the area of a circle between the circumference and two radii?\nSector\nWhat is half the diameter?\nRadius\nWhat touches a circle at one point?\nTangent"
] | [
null,
"https://studyrocket.co.uk/assets/img/assumeJPG/lndmKDFNM1u52_nhP79PrBSLLlN8Xy0ouWE5vO0zq7sUZ-_EuStZmgmZsvQ3t0tjxu8CHuM_rnkxjoc8E3AxpwzH266T8AkcFqYsmVTJdGelC7kzgbbAO_8kmz5OwQDoXcqnW-Tl.jpg",
null,
"https://studyrocket.co.uk/assets/img/assumeJPG/vIvyn4oSO5T7uWJ2dzyYyeGtJzwpB_2neUAjHTDH7CxOtZn7sXItViWO4RlZyWX2s1Vv0IPR-7Mm2M9GBrplvELVahbqBScn9LH7X3Pm_hbbnOeaUruxFZ67Vr0VtznW6xBI3SlC.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8720569,"math_prob":0.95774204,"size":968,"snap":"2021-21-2021-25","text_gpt3_token_len":219,"char_repetition_ratio":0.20746888,"word_repetition_ratio":0.022099448,"special_character_ratio":0.22417356,"punctuation_ratio":0.07653061,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9854884,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-18T18:44:53Z\",\"WARC-Record-ID\":\"<urn:uuid:01b8c331-2208-4a6c-a30c-98d80b4e549c>\",\"Content-Length\":\"22040\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8344686d-9412-4454-95b7-e95c83ba0d07>\",\"WARC-Concurrent-To\":\"<urn:uuid:dd794c51-d21f-4b36-9025-da02d3e6a567>\",\"WARC-IP-Address\":\"172.67.133.116\",\"WARC-Target-URI\":\"https://studyrocket.co.uk/revision/gcse-mathematics-edexcel/geometry-and-measures/circles\",\"WARC-Payload-Digest\":\"sha1:YVUQAQ52GWJTPGO2STWFUMDHF3FVAHXT\",\"WARC-Block-Digest\":\"sha1:LQCMKIRHZ3RNIY5GD4GVTHZ7RTVFFI34\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487640324.35_warc_CC-MAIN-20210618165643-20210618195643-00521.warc.gz\"}"} |
https://www.siyavula.com/read/maths/grade-11/number-patterns/03-number-patterns-02 | [
"We think you are located in South Africa. Is this correct?",
null,
"1. Study the dotted-tile pattern shown and answer the following questions.\n1. Complete the fourth pattern in the diagram.\n2. Complete the table below:\n\n pattern number $$\\text{1}$$ $$\\text{2}$$ $$\\text{3}$$ $$\\text{4}$$ $$\\text{5}$$ $$\\text{20}$$ $$n$$ dotted tiles $$\\text{1}$$ $$\\text{3}$$ $$\\text{5}$$ difference ($$d$$) $$-$$ $$\\text{2}$$\n3. What do you notice about the change in number of dotted tiles?\n4. Describe the pattern in words: “The number of dotted tiles...”.\n5. Write the general term: $$T_n = \\ldots$$\n6. Give the mathematical name for this kind of pattern.\n7. A pattern has $$\\text{819}$$ dotted tiles. Determine the value of $$n$$.\n2. Now study the number of blank tiles (tiles without dots) and answer the following questions:\n1. Complete the table below:\n\n pattern number $$\\text{1}$$ $$\\text{2}$$ $$\\text{3}$$ $$\\text{4}$$ $$\\text{5}$$ $$\\text{10}$$ blank tiles $$\\text{3}$$ $$\\text{6}$$ $$\\text{11}$$ first difference $$-$$ $$\\text{3}$$ second difference $$-$$ $$-$$\n2. What do you notice about the change in the number of blank tiles?\n3. Describe the pattern in words: “The number of blank tiles...”.\n4. Write the general term: $$T_n = \\ldots$$\n5. Give the mathematical name for this kind of pattern.\n6. A pattern has $$\\text{227}$$ blank tiles. Determine the value of $$n$$.\n7. A pattern has $$\\text{79}$$ dotted tiles. Determine the number of blank tiles.\n\nA quadratic sequence is a sequence of numbers in which the second difference between any two consecutive terms is constant.\n\nConsider the following example: $$1; 2; 4; 7; 11; \\ldots$$\n\nThe first difference is calculated by finding the difference between consecutive terms:",
null,
"The second difference is obtained by taking the difference between consecutive first differences:",
null,
"We notice that the second differences are all equal to $$\\text{1}$$. Any sequence that has a common second difference is a quadratic sequence.\n\nIt is important to note that the first differences of a quadratic sequence form a sequence. This sequence has a constant difference between consecutive terms. In other words, a linear sequence results from taking the first differences of a quadratic sequence.\n\nGeneral case\n\nIf the sequence is quadratic, the $$n^{\\text{th}}$$ term is of the form $${T}_{n}=a{n}^{2}+bn+c$$.",
null,
"In each case, the common second difference is a $$2a$$.\n\n# Do you need more Practice?\n\nExercise 3.2\n\nDetermine the second difference between the terms for the following sequences:\n\n$$5; 20; 45; 80; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 15; 25; 35 \\\\ \\text{Second difference: } &= 10 \\end{align*}\n\n$$6; 11; 18; 27; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 5; 7; 9 \\\\ \\text{Second difference: } &= 2 \\end{align*}\n\n$$1; 4; 9; 16; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 3; 5; 7 \\\\ \\text{Second difference: } &= 2 \\end{align*}\n\n$$3; 0; -5; -12; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= -3; -5; -7 \\\\ \\text{Second difference: } &= -2 \\end{align*}\n\n$$1; 3; 7; 13; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 2; 4; 6 \\\\ \\text{Second difference: } &= 2 \\end{align*}\n\n$$0; -6; -16; -30; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &=-6; -10; -14 \\\\ \\text{Second difference: } &= -4 \\end{align*}\n\n$$-1; 2; 9; 20; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 3; 7; 11 \\\\ \\text{Second difference: } &= 4 \\end{align*}\n\n$$1; -3; -9; -17; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= -4; -6; -8 \\\\ \\text{Second difference: } &= -2 \\end{align*}\n\n$$3a+1; 12a+1; 27a+1; 48a+1 \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 9a; 15a; 21a \\\\ \\text{Second difference: } &= 6a \\end{align*}\n\n$$2; 10; 24; 44; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 8; 14; 20 \\\\ \\text{Second difference: } &= 6 \\end{align*}\n\n$$t-2; 4t-1; 9t; 16t+1; \\ldots$$\n\n\\begin{align*} \\text{First differences: } &= 3t + 1; 5t +1; 7t + 1 \\\\ \\text{Second difference: } &= 2t \\end{align*}\n\nComplete the sequence by filling in the missing term:\n\n$$11; 21; 35; \\ldots; 75$$",
null,
"$$20; \\ldots; 42; 56; 72$$",
null,
"$$\\ldots; 37; 65; 101$$",
null,
"$$3; \\ldots; -13; -27; -45$$",
null,
"$$24; 35; 48; \\ldots; 80$$",
null,
"$$\\ldots; 11; 26; 47$$",
null,
"Use the general term to generate the first four terms in each sequence:\n\n$$T_n = n^2+3n-1$$\n\n$$3;9;17;27$$\n\n$$T_n = -n^2-5$$\n\n$$-6;-9;-14;-21$$\n\n$$T_n = 3n^2-2n$$\n\n$$1;8;21;40$$\n\n$$T_n = -2n^2+n+1$$\n\n$$0;-5;-14;-27$$\n\n## Worked example 2: Quadratic sequences\n\nWrite down the next two terms and determine an equation for the $$n^{\\text{th}}$$ term of the sequence $$\\text{5}$$; $$\\text{12}$$; $$\\text{23}$$; $$\\text{38}$$; $$\\ldots$$\n\n### Find the first differences between the terms",
null,
"### Find the second differences between the terms",
null,
"So there is a common second difference of $$\\text{4}$$. We can therefore conclude that this is a quadratic sequence of the form $$T_n = an^2 + bn + c$$.\n\nContinuing the sequence, the next first differences will be:",
null,
"### Finding the next two terms in the sequence\n\nThe next two terms will be:",
null,
"So the sequence will be: $$\\text{5}$$; $$\\text{12}$$; $$\\text{23}$$; $$\\text{38}$$; $$\\text{57}$$; $$\\text{80}$$; $$\\ldots$$\n\n### Determine the general term for the sequence\n\nTo find the values of $$a$$, $$b$$ and $$c$$ for $$T_n = an^2 + bn + c$$ we look at the first $$\\text{3}$$ terms in the sequence:\n\n\\begin{align*} n=1: T_1 &= a + b + c \\\\ n=2: T_2 &= 4a + 2b + c \\\\ n=3: T_3 &= 9a + 3b + c \\end{align*}\n\nWe solve a set of simultaneous equations to determine the values of $$a$$, $$b$$ and $$c$$\n\nWe know that $$T_1 = 5$$, $$T_2 = 12$$ and $$T_3 = 23$$\n\n\\begin{align*} a + b + c &= 5 \\\\ 4a + 2b + c &= 12 \\\\ 9a + 3b + c &= 23 \\end{align*}\\begin{align*} T_2 - T_1 &= 4a + 2b + c - (a + b + c) \\\\ 12 - 5 &= 4a + 2b + c - a - b - c \\\\ 7 &= 3a + b \\qquad \\ldots (1) \\end{align*}\\begin{align*} T_3 - T_2 &= 9a + 3b + c - (4a + 2b + c) \\\\ 23 - 12 &= 9a + 3b + c - 4a - 2b - c \\\\ 11 &= 5a + b \\qquad \\ldots (2) \\end{align*}\\begin{align*} (2)-(1) &= 5a + b - (3a + b) \\\\ 11 - 7 &= 5a + b - 3a - b \\\\ 4 &= 2a \\\\ \\therefore a &= 2 \\end{align*}\\begin{align*} \\text{Using equation } (1): \\quad 3(2) + b &= 7 \\\\ \\therefore b &= 1 \\\\ \\text{And using } \\quad a + b + c &= 5 \\\\ 2 + 1 + c &= 5 \\\\ \\therefore c &= 1 \\end{align*}\n\n### Write the general term for the sequence\n\n$T_n = 2n^2 + n + 2$\n\n## Worked example 3: Plotting a graph of terms in a sequence\n\nConsider the following sequence:\n\n$3; 6; 10; 15; 21; \\ldots$\n\n1. Determine the general term ($$T_n$$) for the sequence.\n2. Is this a linear or a quadratic sequence?\n3. Plot a graph of $$T_n$$ vs $$n$$.\n\n### Determine the first and second differences",
null,
"We see that the first differences are not constant and form the sequence $${3; 4; 5; \\ldots}$$ and that there is a common second difference of $$\\text{1}$$. Therefore the sequence is quadratic and has a general term of the form $$T_n = an^2 + bn + c$$.\n\n### Determine the general term $$T_n$$\n\nTo find the values of $$a$$, $$b$$ and $$c$$ for $$T_n = an^2 + bn + c$$ we look at the first $$\\text{3}$$ terms in the sequence:\n\n\\begin{align*} n=1: T_1 &= a + b + c \\\\ n=2: T_2 &= 4a + 2b + c \\\\ n=3: T_3 &= 9a + 3b + c \\end{align*}\n\nWe solve this set of simultaneous equations to determine the values of $$a$$, $$b$$ and $$c$$. We know that $$T_1 = 3$$, $$T_2 = 6$$ and $$T_3 = 10$$.\n\n\\begin{align*} a + b + c &= 3 \\\\ 4a + 2b + c &= 6 \\\\ 9a + 3b + c &= 10 \\end{align*}\\begin{align*} T_2 - T_1 &= 4a + 2b + c - (a + b + c) \\\\ 6 - 3 &= 4a + 2b + c - a - b - c \\\\ 3 &= 3a + b \\qquad \\ldots (1) \\end{align*}\\begin{align*} T_3 - T_2 &= 9a + 3b + c - (4a + 2b + c) \\\\ 10 - 6 &= 9a + 3b + c - 4a - 2b - c \\\\ 4 &= 5a + b \\qquad \\ldots (2) \\end{align*}\\begin{align*} (2)-(1) &= 5a + b - (3a + b) \\\\ 4 - 3 &= 5a + b - 3a - b \\\\ 1 &= 2a \\\\ \\therefore a &= \\frac{1}{2} \\end{align*}\\begin{align*} \\text{Using equation }(1): \\quad 3\\left(\\frac{1}{2}\\right) + b &= 3 \\\\ \\therefore b &= \\frac{3}{2} \\\\ \\text{And using } \\quad a + b + c &= 3 \\\\ \\frac{1}{2} + \\frac{3}{2} + c &= 3 \\\\ \\therefore c &= 1 \\end{align*}\n\nTherefore the general term for the sequence is $$T_n = \\frac{1}{2}n^2 + \\frac{3}{2}n + 1$$.\n\n### Plot a graph of $$T_n$$ vs $$n$$\n\nUse the general term for the sequence, $$T_n = \\frac{1}{2}n^2 + \\frac{3}{2}n + 1$$, to complete the table.\n\n $$n$$ $$\\text{1}$$ $$\\text{2}$$ $$\\text{3}$$ $$\\text{4}$$ $$\\text{5}$$ $$\\text{6}$$ $$\\text{7}$$ $$\\text{8}$$ $$\\text{9}$$ $$\\text{10}$$ $$T_n$$ $$\\text{3}$$ $$\\text{6}$$ $$\\text{10}$$ $$\\text{15}$$ $$\\text{21}$$ $$\\text{28}$$ $$\\text{36}$$ $$\\text{45}$$ $$\\text{55}$$ $$\\text{66}$$\n\nUse the table to plot the graph:",
null,
"In this case it would not be accurate to join these points, since $$n$$ indicates the position of a term in a sequence and can therefore only be a positive integer. We can, however, see that the plot of the points lies in the shape of a parabola.\n\n## Worked example 4: Olympic Games soccer event\n\nIn the first stage of the soccer event at the Olympic Games, there are teams from four different countries in each group. Each country in a group must play every other country in the group once.\n\n1. How many matches will be played in each group in the first stage of the event?\n2. How many matches would be played if there are $$\\text{5}$$ teams in each group?\n3. How many matches would be played if there are $$\\text{6}$$ teams in each group?\n4. Determine the general formula of the sequence.\n\n### Determine the number of matches played if there are $$\\text{4}$$ teams in a group\n\nLet the teams from four different countries be $$A$$, $$B$$, $$C$$ and $$D$$.\n\n teams in a group matches played $$A$$ $$AB, AC, AD$$ $$B$$ $$BC, BD$$ $$C$$ $$CD$$ $$D$$ $$\\text{4}$$ $$3+2+1=6$$\n\n$$AB$$ means that team $$A$$ plays team $$B$$ and $$BA$$ would be the same match as $$AB$$. So if there are four different teams in a group, each group plays $$\\text{6}$$ matches.\n\n### Determine the number of matches played if there are $$\\text{5}$$ teams in a group\n\nLet the teams from five different countries be $$A, B, C, D$$ and $$E$$.\n\n teams in a group matches played $$A$$ $$AB, AC, AD, AE$$ $$B$$ $$BC, BD, BE$$ $$C$$ $$CD, CE$$ $$D$$ $$DE$$ $$E$$ $$\\text{5}$$ $$4+3+2+1=10$$\n\nSo if there are five different teams in a group, each group plays $$\\text{10}$$ matches.\n\n### Determine the number of matches played if there are $$\\text{6}$$ teams in a group\n\nLet the teams from six different countries be $$A, B, C, D, E$$ and $$F$$.\n\n teams in a group matches to be played $$A$$ $$AB, AC, AD, AE, AF$$ $$B$$ $$BC, BD, BE, BF$$ $$C$$ $$CD, CE, CF$$ $$D$$ $$DE, DF$$ $$E$$ $$EF$$ $$F$$ $$\\text{5}$$ $$5+4+3+2+1=15$$\n\nSo if there are six different teams in a group, each group plays $$\\text{15}$$ matches.\n\nWe continue to increase the number of teams in a group and find that a group of $$\\text{7}$$ teams plays $$\\text{21}$$ matches and a group of $$\\text{8}$$ teams plays $$\\text{28}$$ matches.\n\n### Consider the sequence\n\nWe examine the sequence to determine if it is linear or quadratic:",
null,
"We see that the first differences are not constant and that there is a common second difference of $$\\text{1}$$. Therefore the sequence is quadratic and has a general term of the form $$T_n = an^2 + bn + c$$.\n\n### Determine the general term $$T_n$$\n\nTo find the values of $$a$$, $$b$$ and $$c$$ for $$T_n = an^2 + bn + c$$ we look at the first $$\\text{3}$$ terms in the sequence:\n\n\\begin{align*} n=1: T_1 &= a + b + c \\\\ n=2: T_2 &= 4a + 2b + c \\\\ n=3: T_3 &= 9a + 3b + c \\end{align*}\n\nWe solve a set of simultaneous equations to determine the values of $$a$$, $$b$$ and $$c$$. We know that $$T_1 = 6$$, $$T_2 = 10$$ and $$T_3 = 15$$\n\n\\begin{align*} a + b + c &= 6 \\\\ 4a + 2b + c &= 10 \\\\ 9a + 3b + c &= 15 \\end{align*}\\begin{align*} T_2 - T_1 &= 4a + 2b + c - (a + b + c) \\\\ 10 - 6 &= 4a + 2b + c - a - b - c \\\\ 4 &= 3a + b \\qquad \\ldots (1) \\end{align*}\\begin{align*} T_3 - T_2 &= 9a + 3b + c - (4a + 2b + c) \\\\ 15- 10 &= 9a + 3b + c - 4a - 2b - c \\\\ 5 &= 5a + b \\qquad \\ldots (2) \\end{align*}\\begin{align*} (2)-(1) &= 5a + b - (3a + b) \\\\ 5-4 &= 5a + b - 3a - b \\\\ 1 &= 2a \\\\ \\therefore a &= \\frac{1}{2} \\end{align*}\\begin{align*} \\text{Using equation } (1): \\quad 3\\left(\\frac{1}{2}\\right) + b &= 4 \\\\ \\therefore b &= \\frac{5}{2} \\\\ \\text{And using } a + b + c &= 6 \\\\ \\frac{1}{2} + \\frac{5}{2} + c &= 6 \\\\ \\therefore c &= 3 \\end{align*}\n\nTherefore the general term for the sequence is $$T_n = \\frac{1}{2}n^2 + \\frac{5}{2}n + 3$$.\n\n# Do you need more Practice?\n\nExercise 3.3\n\nCalculate the common second difference for each of the following quadratic sequences:\n\n$$3; \\; 6; \\; 10; \\; 21; \\; ...$$\n\n\\begin{align*} \\text{First differences: } &= 3;4;5;6 \\\\ \\text{Second difference: } &= 1 \\end{align*}\n\n$$4; \\; 9; \\; 16; \\; 25; \\; ...$$\n\n\\begin{align*} \\text{First differences: } &= 5;7;9;11 \\\\ \\text{Second difference: } &= 2 \\end{align*}\n\n$$7; \\; 17; \\; 31; \\; 49; \\; ...$$\n\n\\begin{align*} \\text{First differences: } &= 10;14;18;22 \\\\ \\text{Second difference: } &= 4 \\end{align*}\n\n$$2; \\; 10; \\; 26; \\; 50; \\; 82 ...$$\n\n\\begin{align*} \\text{First differences: } &= 8;16;24;32 \\\\ \\text{Second difference: } &= 8 \\end{align*}\n\n$$31; \\; 30; \\; 27; \\; 22; \\; 15; \\; ...$$\n\n\\begin{align*} \\text{First differences: } &= -1;-3;-5;-7 \\\\ \\text{Second difference: } &= -2 \\end{align*}\n\nFind the first five terms of the quadratic sequence defined by: $$T_n = 5n^2 + 3n + 4$$.\n\n\\begin{align*} T_n &= 5n^2 + 3n + 4 \\\\ T_1 &= 5(1)^2 + 3(1) + 4 \\\\ &= 12 \\\\ T_2 &= 5(2)^2 + 3(2) + 4 \\\\ &= 30 \\\\ T_3 &= 5(3)^2 + 3(3) + 4 \\\\ &= 58 \\\\ T_4 &= 5(4)^2 + 3(4) + 4 \\\\ &= 96 \\\\ T_5 &= 5(5)^2 + 3(5) + 4 \\\\ &= 144 \\end{align*} $$12;30;58;96;144$$\n\nGiven $$T_n = 4n^2 + 5n + 10$$, find $$T_9$$.\n\n\\begin{align*} T_n &= 4n^2 + 5n + 10 \\\\ T_9 &= 4(9)^2 + 5(9) + 10 \\\\ &= 379 \\end{align*}\n\nGiven $$T_n = 2n^2$$, for which value of $$n$$ does $$T_n = 32$$?\n\n\\begin{align*} T_n &= 2n^2 \\\\ 32 &= 2n^2 \\\\ 16 &= n^2 \\\\ 4 &= n \\end{align*}\n\nWrite down the next two terms of the quadratic sequence: $$16; 27; 42; 61; \\ldots$$",
null,
"Find the general formula for the quadratic sequence above.\n\n\\begin{align*} T_n &= an^2 +bn +c \\\\ T_1 &= a +b +c \\\\ T_2 &= 4n^2 +2n +c \\\\ T_3 &= 9n^2 +3n +c \\end{align*} \\begin{align*} \\therefore a + b+ c &= 16 \\\\ \\therefore c &= 16 - a - b \\\\ 4a + 2b + c &= 27 \\\\ 4a + 2b + (16 - a - b) &= 27 \\\\ 3a + b &= 11 \\\\ \\text{And } 9a + 3b + c &= 42 \\\\ \\therefore 9a + 3b + (16 - a - b) &= 42 \\\\ 8a + 2b = 26 \\\\ 4a + b = 13 \\\\ \\therefore b &= 13 -4a \\end{align*} \\begin{align*} \\therefore 3a + b &= 11 \\\\ 3a + (13 - 4a) &= 11 \\\\ -a &= -2 \\\\ \\therefore a &= 2 \\\\ b &= 13 -4(2) \\\\ \\therefore b &= 5 \\\\ \\text{And } c &= 16 - a - b \\\\ \\therefore c &= 16 - 2 -5 \\\\ &= 9 \\\\ \\therefore T_n &= 2n^2 + 5n + 9 \\end{align*}"
] | [
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/9459246caa09c04052d4f1488bae66c6.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/369331f2c8b99f87548b28d55f2f8b87.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/4c9c557260c31b1a8a71216d2f2191a0.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/fca294165d1573fb7dd0ec2b4b5ad1f0.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/dc4ba84d075a518eb89ae4b379b45901.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/2137e49750a3d9f0c104008d8972786e.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/57582293f214c23eb31c5acca9db382e.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/a0c78e54463f07fca0fd2a3512c6c7f5.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/b071e51c1a4f6b012e021af4ef45e1f4.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/ba2348f51492634700b3680f011bd23a.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/ca2a63a45a0c122cafe122e9b40ad6f1.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/6d76536a891f6d2eb3e43206c4aaf853.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/5598ed05026bdaa713ea656c4a63d7ea.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/283d2bfe3eefee5f1c3704984a2ceb6d.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/f1fe1e167d8734f2079713024d80bdfd.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/057c484322d29fefb8ca7275a193a746.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/0bd593869404e85aefa95a6e7974bf87.png",
null,
"https://www.siyavula.com/read/maths/grade-11/number-patterns/images/398ce03d336a3d78fcc86e2799b33ed6.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7839502,"math_prob":1.0000091,"size":11774,"snap":"2020-24-2020-29","text_gpt3_token_len":4373,"char_repetition_ratio":0.17790994,"word_repetition_ratio":0.37235996,"special_character_ratio":0.4440292,"punctuation_ratio":0.12918255,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999975,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-15T04:34:55Z\",\"WARC-Record-ID\":\"<urn:uuid:00832d66-14f0-44a5-a29e-99bbaba17cef>\",\"Content-Length\":\"57794\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7f1d1d14-d42d-4cc0-a948-e8770f63b7c1>\",\"WARC-Concurrent-To\":\"<urn:uuid:f3bd4312-0884-4d37-80e2-a934b06727c6>\",\"WARC-IP-Address\":\"197.221.50.110\",\"WARC-Target-URI\":\"https://www.siyavula.com/read/maths/grade-11/number-patterns/03-number-patterns-02\",\"WARC-Payload-Digest\":\"sha1:ULZDD7DQYTMLKR6VTIZJENOO4XAR55UW\",\"WARC-Block-Digest\":\"sha1:G3E45R2SVLVOIDOE32RG67XFCEC6YJKA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593657155816.86_warc_CC-MAIN-20200715035109-20200715065109-00299.warc.gz\"}"} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.