URL
stringlengths
15
1.68k
text_list
sequencelengths
1
199
image_list
sequencelengths
1
199
metadata
stringlengths
1.19k
3.08k
https://www.numberempire.com/11026
[ "Home | Menu | Get Involved | Contact webmaster", null, "", null, "", null, "", null, "", null, "# Number 11026\n\neleven thousand twenty six\n\n### Properties of the number 11026\n\n Factorization 2 * 37 * 149 Divisors 1, 2, 37, 74, 149, 298, 5513, 11026 Count of divisors 8 Sum of divisors 17100 Previous integer 11025 Next integer 11027 Is prime? NO Previous prime 11003 Next prime 11027 11026th prime 116797 Is a Fibonacci number? NO Is a Bell number? NO Is a Catalan number? NO Is a factorial? NO Is a regular number? NO Is a perfect number? NO Polygonal number (s < 11)? triangular(148) Binary 10101100010010 Octal 25422 Duodecimal 646a Hexadecimal 2b12 Square 121572676 Square root 105.00476179679 Natural logarithm 9.3080113991496 Decimal logarithm 4.0424179881433 Sine -0.83614343403314 Cosine 0.54851085469958 Tangent -1.524388126268\nNumber 11026 is pronounced eleven thousand twenty six. Number 11026 is a composite number. Factors of 11026 are 2 * 37 * 149. Number 11026 has 8 divisors: 1, 2, 37, 74, 149, 298, 5513, 11026. Sum of the divisors is 17100. Number 11026 is not a Fibonacci number. It is not a Bell number. Number 11026 is not a Catalan number. Number 11026 is not a regular number (Hamming number). It is a not factorial of any number. Number 11026 is a deficient number and therefore is not a perfect number. Number 11026 is a triangular number with n=148. Binary numeral for number 11026 is 10101100010010. Octal numeral is 25422. Duodecimal value is 646a. Hexadecimal representation is 2b12. Square of the number 11026 is 121572676. Square root of the number 11026 is 105.00476179679. Natural logarithm of 11026 is 9.3080113991496 Decimal logarithm of the number 11026 is 4.0424179881433 Sine of 11026 is -0.83614343403314. Cosine of the number 11026 is 0.54851085469958. Tangent of the number 11026 is -1.524388126268\n\n### Number properties\n\nExamples: 3628800, 9876543211, 12586269025" ]
[ null, "https://www.numberempire.com/images/graystar.png", null, "https://www.numberempire.com/images/graystar.png", null, "https://www.numberempire.com/images/graystar.png", null, "https://www.numberempire.com/images/graystar.png", null, "https://www.numberempire.com/images/graystar.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5953295,"math_prob":0.9910441,"size":2177,"snap":"2020-34-2020-40","text_gpt3_token_len":723,"char_repetition_ratio":0.18683848,"word_repetition_ratio":0.061797753,"special_character_ratio":0.4368397,"punctuation_ratio":0.1489899,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9962671,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-24T02:11:58Z\",\"WARC-Record-ID\":\"<urn:uuid:c393d5c7-38c4-42fe-beee-b2e12892464d>\",\"Content-Length\":\"20509\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3445ac29-fd70-43ce-a54b-895372341173>\",\"WARC-Concurrent-To\":\"<urn:uuid:2a54b3bd-b4f2-45d6-a1a8-023067c64a79>\",\"WARC-IP-Address\":\"104.24.112.69\",\"WARC-Target-URI\":\"https://www.numberempire.com/11026\",\"WARC-Payload-Digest\":\"sha1:ZZLSJZVA3TA6BKB7LYA5CLZ25Q63WD46\",\"WARC-Block-Digest\":\"sha1:YFHHNV6JEJ5JEE7FICACZ3T27IUNVSGK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400213006.47_warc_CC-MAIN-20200924002749-20200924032749-00124.warc.gz\"}"}
https://www.e-pandu.com/2019/04/vector-section-space.html
[ "-->\n\n# Vector Section Space\n\nIf given a vector space V, then we may form another vector space that is a subset of S of V and use operations on V. Because V is a vector space, summarized operations and scalar multiplication always generate another vector in V. Share the new system uses the S subset of V as a set of course to be vector space, the set must be covered under sums and scalar multiplication operations. That is, the sum of the two elements in S must always be an element of S and the result of a scalar with elements of S must always be an element of S.\n\nis a subset of R2.\n\nwhich is an element of S.\n\nIt is also an element of S.\n\nDefinition,\nIf S is a non-empty subset of a vector space V, and S satisfies the following conditions,\n(i)        α x ϵ S if x ϵ S for any scalar α\n(ii)        x + y ϵ S if x ϵ S and y ϵ S\nthen S is called the subspace of V.\nTerms (i) say that S is closed under scalar multiplication. That is, when an element of S is multiplied by a scalar, the result is an element of S.\nTerms (ii) say that S is closed under addition. That is, the sum of the two elements of S is always an element of S.\nSo, if we do calculations using the operations of V and elements from S, we will always produce elements from S. Therefore, the subspace of V is a subset S which is closed under the operations of V.\nSuppose that S is the subspace of a vector space V. Using the scalar addition and multiplication operations defined in V, we can form a new mathematical system with S as the appropriate set. It can easily be seen that the eight axioms as a whole will remain valid for this new system. The axioms of A3 and A4 are the result of Theorem 1 and condition (i) of the definition of subspace. The other six axioms are valid for each element of V, so in particular the six axioms are valid for elements of S. So actually each subspace is a vector space.\n\nExample 2.\nSuppose S = {(x1, x2, x3)T | x1 = x2}\nThen S is the subspace of R3, because αx = (αa, αa, αb)T ϵ S.\nIf (a, a, b)T and (c, c, d)T are any elements of S, then" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8990485,"math_prob":0.99537635,"size":2120,"snap":"2020-45-2020-50","text_gpt3_token_len":578,"char_repetition_ratio":0.15075615,"word_repetition_ratio":0.06526806,"special_character_ratio":0.2476415,"punctuation_ratio":0.0997921,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997108,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-03T23:20:49Z\",\"WARC-Record-ID\":\"<urn:uuid:ea60d3b9-e422-4ae3-97b9-48e94e095fe4>\",\"Content-Length\":\"201463\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4924f685-cc63-4159-a6a0-87b3c3646ad3>\",\"WARC-Concurrent-To\":\"<urn:uuid:4ace49ed-2f41-4ef2-9d6f-38a4e31c196e>\",\"WARC-IP-Address\":\"142.250.73.211\",\"WARC-Target-URI\":\"https://www.e-pandu.com/2019/04/vector-section-space.html\",\"WARC-Payload-Digest\":\"sha1:XJ77G3ESIKYWROMB3PO656KQWMOMWAVD\",\"WARC-Block-Digest\":\"sha1:5BTAYDZJG5TTNMWDOSC3GPU4KBTUAVVV\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141732835.81_warc_CC-MAIN-20201203220448-20201204010448-00598.warc.gz\"}"}
https://www.colorhexa.com/20f17c
[ "# #20f17c Color Information\n\nIn a RGB color space, hex #20f17c is composed of 12.5% red, 94.5% green and 48.6% blue. Whereas in a CMYK color space, it is composed of 86.7% cyan, 0% magenta, 48.5% yellow and 5.5% black. It has a hue angle of 146.4 degrees, a saturation of 88.2% and a lightness of 53.5%. #20f17c color hex could be obtained by blending #40fff8 with #00e300. Closest websafe color is: #33ff66.\n\n• R 13\n• G 95\n• B 49\nRGB color chart\n• C 87\n• M 0\n• Y 49\n• K 5\nCMYK color chart\n\n#20f17c color description : Vivid cyan - lime green.\n\n# #20f17c Color Conversion\n\nThe hexadecimal color #20f17c has RGB values of R:32, G:241, B:124 and CMYK values of C:0.87, M:0, Y:0.49, K:0.05. Its decimal value is 2158972.\n\nHex triplet RGB Decimal 20f17c `#20f17c` 32, 241, 124 `rgb(32,241,124)` 12.5, 94.5, 48.6 `rgb(12.5%,94.5%,48.6%)` 87, 0, 49, 5 146.4°, 88.2, 53.5 `hsl(146.4,88.2%,53.5%)` 146.4°, 86.7, 94.5 33ff66 `#33ff66`\nCIE-LAB 84.313, -71.673, 43.291 35.687, 64.669, 29.669 0.274, 0.497, 64.669 84.313, 83.733, 148.867 84.313, -73.925, 69.404 80.417, -61.517, 34.417 00100000, 11110001, 01111100\n\n# Color Schemes with #20f17c\n\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #f12095\n``#f12095` `rgb(241,32,149)``\nComplementary Color\n• #2df120\n``#2df120` `rgb(45,241,32)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #20f1e5\n``#20f1e5` `rgb(32,241,229)``\nAnalogous Color\n• #f1202d\n``#f1202d` `rgb(241,32,45)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #e520f1\n``#e520f1` `rgb(229,32,241)``\nSplit Complementary Color\n• #f17c20\n``#f17c20` `rgb(241,124,32)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #7c20f1\n``#7c20f1` `rgb(124,32,241)``\n• #95f120\n``#95f120` `rgb(149,241,32)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #7c20f1\n``#7c20f1` `rgb(124,32,241)``\n• #f12095\n``#f12095` `rgb(241,32,149)``\n• #0cb958\n``#0cb958` `rgb(12,185,88)``\n• #0dd163\n``#0dd163` `rgb(13,209,99)``\n• #0fe96f\n``#0fe96f` `rgb(15,233,111)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #38f38a\n``#38f38a` `rgb(56,243,138)``\n• #50f498\n``#50f498` `rgb(80,244,152)``\n• #68f6a6\n``#68f6a6` `rgb(104,246,166)``\nMonochromatic Color\n\n# Alternatives to #20f17c\n\nBelow, you can see some colors close to #20f17c. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #20f148\n``#20f148` `rgb(32,241,72)``\n• #20f159\n``#20f159` `rgb(32,241,89)``\n• #20f16b\n``#20f16b` `rgb(32,241,107)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #20f18d\n``#20f18d` `rgb(32,241,141)``\n• #20f19f\n``#20f19f` `rgb(32,241,159)``\n• #20f1b0\n``#20f1b0` `rgb(32,241,176)``\nSimilar Colors\n\n# #20f17c Preview\n\nThis text has a font color of #20f17c.\n\n``<span style=\"color:#20f17c;\">Text here</span>``\n#20f17c background color\n\nThis paragraph has a background color of #20f17c.\n\n``<p style=\"background-color:#20f17c;\">Content here</p>``\n#20f17c border color\n\nThis element has a border color of #20f17c.\n\n``<div style=\"border:1px solid #20f17c;\">Content here</div>``\nCSS codes\n``.text {color:#20f17c;}``\n``.background {background-color:#20f17c;}``\n``.border {border:1px solid #20f17c;}``\n\n# Shades and Tints of #20f17c\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #011108 is the darkest color, while #fdfffe is the lightest one.\n\n• #011108\n``#011108` `rgb(1,17,8)``\n• #022311\n``#022311` `rgb(2,35,17)``\n• #03361a\n``#03361a` `rgb(3,54,26)``\n• #054822\n``#054822` `rgb(5,72,34)``\n• #065b2b\n``#065b2b` `rgb(6,91,43)``\n• #076d34\n``#076d34` `rgb(7,109,52)``\n• #08803d\n``#08803d` `rgb(8,128,61)``\n• #099245\n``#099245` `rgb(9,146,69)``\n• #0aa54e\n``#0aa54e` `rgb(10,165,78)``\n• #0bb757\n``#0bb757` `rgb(11,183,87)``\n• #0dca60\n``#0dca60` `rgb(13,202,96)``\n• #0edc69\n``#0edc69` `rgb(14,220,105)``\n• #0fee71\n``#0fee71` `rgb(15,238,113)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #32f287\n``#32f287` `rgb(50,242,135)``\n• #45f392\n``#45f392` `rgb(69,243,146)``\n• #57f49d\n``#57f49d` `rgb(87,244,157)``\n• #6af6a7\n``#6af6a7` `rgb(106,246,167)``\n• #7cf7b2\n``#7cf7b2` `rgb(124,247,178)``\n• #8ff8bd\n``#8ff8bd` `rgb(143,248,189)``\n• #a1f9c8\n``#a1f9c8` `rgb(161,249,200)``\n``#b4fad3` `rgb(180,250,211)``\n• #c6fbde\n``#c6fbde` `rgb(198,251,222)``\n• #d9fde8\n``#d9fde8` `rgb(217,253,232)``\n• #ebfef3\n``#ebfef3` `rgb(235,254,243)``\n• #fdfffe\n``#fdfffe` `rgb(253,255,254)``\nTint Color Variation\n\n# Tones of #20f17c\n\nA tone is produced by adding gray to any pure hue. In this case, #848d88 is the less saturated color, while #17fa7b is the most saturated one.\n\n• #848d88\n``#848d88` `rgb(132,141,136)``\n• #7b9687\n``#7b9687` `rgb(123,150,135)``\n• #729f86\n``#729f86` `rgb(114,159,134)``\n• #69a885\n``#69a885` `rgb(105,168,133)``\n• #60b184\n``#60b184` `rgb(96,177,132)``\n• #57ba83\n``#57ba83` `rgb(87,186,131)``\n• #4ec381\n``#4ec381` `rgb(78,195,129)``\n• #44cd80\n``#44cd80` `rgb(68,205,128)``\n• #3bd67f\n``#3bd67f` `rgb(59,214,127)``\n• #32df7e\n``#32df7e` `rgb(50,223,126)``\n• #29e87d\n``#29e87d` `rgb(41,232,125)``\n• #20f17c\n``#20f17c` `rgb(32,241,124)``\n• #17fa7b\n``#17fa7b` `rgb(23,250,123)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #20f17c is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5626264,"math_prob":0.6882254,"size":3720,"snap":"2020-24-2020-29","text_gpt3_token_len":1660,"char_repetition_ratio":0.12109795,"word_repetition_ratio":0.011049724,"special_character_ratio":0.55698925,"punctuation_ratio":0.23756906,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98456806,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-04T11:35:16Z\",\"WARC-Record-ID\":\"<urn:uuid:f232c5b2-6835-4316-886e-1d7c512d2291>\",\"Content-Length\":\"36320\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7bf7d170-7d58-49bc-91cb-d7136f8cacb3>\",\"WARC-Concurrent-To\":\"<urn:uuid:5441f9aa-231c-40c8-aa28-ca21d2730f4d>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/20f17c\",\"WARC-Payload-Digest\":\"sha1:LPJNYP2HAIUJK26R6FZ3TVQQZ5GR5UIP\",\"WARC-Block-Digest\":\"sha1:P6DQ2N467NKDE7MNVNMZXFBFSZ5FM3HA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347439928.61_warc_CC-MAIN-20200604094848-20200604124848-00367.warc.gz\"}"}
https://www.ademcetinkaya.com/2023/02/next-nextdecade-corporation-common-stock.html
[ "Outlook: NextDecade Corporation Common Stock is assigned short-term Ba1 & long-term Ba1 estimated rating.\nDominant Strategy : Hold\nTime series to forecast n: 25 Feb 2023 for (n+1 year)\nMethodology : Modular Neural Network (CNN Layer)\n\n## Abstract\n\nNextDecade Corporation Common Stock prediction model is evaluated with Modular Neural Network (CNN Layer) and Sign Test1,2,3,4 and it is concluded that the NEXT stock is predictable in the short/long term. According to price forecasts for (n+1 year) period, the dominant strategy among neural network is: Hold\n\n## Key Points\n\n1. Short/Long Term Stocks\n2. Stock Forecast Based On a Predictive Algorithm\n3. Why do we need predictive models?\n\n## NEXT Target Price Prediction Modeling Methodology\n\nWe consider NextDecade Corporation Common Stock Decision Process with Modular Neural Network (CNN Layer) where A is the set of discrete actions of NEXT stock holders, F is the set of discrete states, P : S × F × S → R is the transition probability distribution, R : S × F → R is the reaction function, and γ ∈ [0, 1] is a move factor for expectation.1,2,3,4\n\nF(Sign Test)5,6,7= $\\begin{array}{cccc}{p}_{a1}& {p}_{a2}& \\dots & {p}_{1n}\\\\ & ⋮\\\\ {p}_{j1}& {p}_{j2}& \\dots & {p}_{jn}\\\\ & ⋮\\\\ {p}_{k1}& {p}_{k2}& \\dots & {p}_{kn}\\\\ & ⋮\\\\ {p}_{n1}& {p}_{n2}& \\dots & {p}_{nn}\\end{array}$ X R(Modular Neural Network (CNN Layer)) X S(n):→ (n+1 year) $∑ i = 1 n a i$\n\nn:Time series to forecast\n\np:Price signals of NEXT stock\n\nj:Nash equilibria (Neural Network)\n\nk:Dominated move\n\na:Best response for target price\n\nFor further technical information as per how our model work we invite you to visit the article below:\n\nHow do AC Investment Research machine learning (predictive) algorithms actually work?\n\n## NEXT Stock Forecast (Buy or Sell) for (n+1 year)\n\nSample Set: Neural Network\nStock/Index: NEXT NextDecade Corporation Common Stock\nTime series to forecast n: 25 Feb 2023 for (n+1 year)\n\nAccording to price forecasts for (n+1 year) period, the dominant strategy among neural network is: Hold\n\nX axis: *Likelihood% (The higher the percentage value, the more likely the event will occur.)\n\nY axis: *Potential Impact% (The higher the percentage value, the more likely the price will deviate.)\n\nZ axis (Grey to Black): *Technical Analysis%\n\n1. An entity shall apply the impairment requirements in Section 5.5 retrospectively in accordance with IAS 8 subject to paragraphs 7.2.15 and 7.2.18–7.2.20.\n2. For the purposes of applying the requirements in paragraphs 5.7.7 and 5.7.8, an accounting mismatch is not caused solely by the measurement method that an entity uses to determine the effects of changes in a liability's credit risk. An accounting mismatch in profit or loss would arise only when the effects of changes in the liability's credit risk (as defined in IFRS 7) are expected to be offset by changes in the fair value of another financial instrument. A mismatch that arises solely as a result of the measurement method (ie because an entity does not isolate changes in a liability's credit risk from some other changes in its fair value) does not affect the determination required by paragraphs 5.7.7 and 5.7.8. For example, an entity may not isolate changes in a liability's credit risk from changes in liquidity risk. If the entity presents the combined effect of both factors in other comprehensive income, a mismatch may occur because changes in liquidity risk may be included in the fair value measurement of the entity's financial assets and the entire fair value change of those assets is presented in profit or loss. However, such a mismatch is caused by measurement imprecision, not the offsetting relationship described in paragraph B5.7.6 and, therefore, does not affect the determination required by paragraphs 5.7.7 and 5.7.8.\n3. An entity is not required to restate prior periods to reflect the application of these amendments. The entity may restate prior periods if, and only if, it is possible without the use of hindsight and the restated financial statements reflect all the requirements in this Standard. If an entity does not restate prior periods, the entity shall recognise any difference between the previous carrying amount and the carrying amount at the beginning of the annual reporting period that includes the date of initial application of these amendments in the opening retained earnings (or other component of equity, as appropriate) of the annual reporting period that includes the date of initial application of these amendments.\n4. For hedges other than hedges of foreign currency risk, when an entity designates a non-derivative financial asset or a non-derivative financial liability measured at fair value through profit or loss as a hedging instrument, it may only designate the non-derivative financial instrument in its entirety or a proportion of it.\n\n*International Financial Reporting Standards (IFRS) adjustment process involves reviewing the company's financial statements and identifying any differences between the company's current accounting practices and the requirements of the IFRS. If there are any such differences, neural network makes adjustments to financial statements to bring them into compliance with the IFRS.\n\n## Conclusions\n\nNextDecade Corporation Common Stock is assigned short-term Ba1 & long-term Ba1 estimated rating. NextDecade Corporation Common Stock prediction model is evaluated with Modular Neural Network (CNN Layer) and Sign Test1,2,3,4 and it is concluded that the NEXT stock is predictable in the short/long term. According to price forecasts for (n+1 year) period, the dominant strategy among neural network is: Hold\n\n### NEXT NextDecade Corporation Common Stock Financial Analysis*\n\nRating Short-Term Long-Term Senior\nOutlook*Ba1Ba1\nIncome StatementB1Caa2\nBalance SheetBa2C\nLeverage RatiosBaa2Ba2\nCash FlowCaa2C\nRates of Return and ProfitabilityBa1B2\n\n*Financial analysis is the process of evaluating a company's financial performance and position by neural network. It involves reviewing the company's financial statements, including the balance sheet, income statement, and cash flow statement, as well as other financial reports and documents.\nHow does neural network examine financial reports and understand financial state of the company?\n\n### Prediction Confidence Score\n\nTrust metric by Neural Network: 90 out of 100 with 863 signals.", null, "## References\n\n1. L. Busoniu, R. Babuska, and B. D. Schutter. A comprehensive survey of multiagent reinforcement learning. IEEE Transactions of Systems, Man, and Cybernetics Part C: Applications and Reviews, 38(2), 2008.\n2. R. Rockafellar and S. Uryasev. Conditional value-at-risk for general loss distributions. Journal of Banking and Finance, 26(7):1443 – 1471, 2002\n3. Bertsimas D, King A, Mazumder R. 2016. Best subset selection via a modern optimization lens. Ann. Stat. 44:813–52\n4. Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J. 2013b. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems, Vol. 26, ed. Z Ghahramani, M Welling, C Cortes, ND Lawrence, KQ Weinberger, pp. 3111–19. San Diego, CA: Neural Inf. Process. Syst. Found.\n5. Çetinkaya, A., Zhang, Y.Z., Hao, Y.M. and Ma, X.Y., What are buy sell or hold recommendations?(AIRC Stock Forecast). AC Investment Research Journal, 101(3).\n6. J. Baxter and P. Bartlett. Infinite-horizon policy-gradient estimation. Journal of Artificial Intelligence Re- search, 15:319–350, 2001.\n7. A. Eck, L. Soh, S. Devlin, and D. Kudenko. Potential-based reward shaping for finite horizon online POMDP planning. Autonomous Agents and Multi-Agent Systems, 30(3):403–445, 2016\nFrequently Asked QuestionsQ: What is the prediction methodology for NEXT stock?\nA: NEXT stock prediction methodology: We evaluate the prediction models Modular Neural Network (CNN Layer) and Sign Test\nQ: Is NEXT stock a buy or sell?\nA: The dominant strategy among neural network is to Hold NEXT Stock.\nQ: Is NextDecade Corporation Common Stock stock a good investment?\nA: The consensus rating for NextDecade Corporation Common Stock is Hold and is assigned short-term Ba1 & long-term Ba1 estimated rating.\nQ: What is the consensus rating of NEXT stock?\nA: The consensus rating for NEXT is Hold.\nQ: What is the prediction period for NEXT stock?\nA: The prediction period for NEXT is (n+1 year)" ]
[ null, "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie6zmojlVkFtzhnSDPsL0ofN0Qf8imsRuJLmBsuPhvw7a_V8sO4akz1ZmrC1z138iTEnVBz4WOe7nRaUku8PCVLHIr3blhvleBHEbt1VcY4D4zSFZNC02CJ-SsnJxURqjoZxkZaeFVd_lKWZF2n-hK-At4y-ts0RYd4tsXgAkh6yfcsMyVn7NLarhmsw/s1600/footerlogo.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87551004,"math_prob":0.8298587,"size":8115,"snap":"2023-40-2023-50","text_gpt3_token_len":1890,"char_repetition_ratio":0.11157687,"word_repetition_ratio":0.1561753,"special_character_ratio":0.22205792,"punctuation_ratio":0.14136808,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9562421,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-30T22:43:13Z\",\"WARC-Record-ID\":\"<urn:uuid:6241a429-7b97-42b2-80e8-4a9a8d49dae2>\",\"Content-Length\":\"314599\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c2be240d-4847-4153-a915-f3dde0ccd115>\",\"WARC-Concurrent-To\":\"<urn:uuid:655bed94-9f6a-4953-a784-2b5fc00b447d>\",\"WARC-IP-Address\":\"172.253.63.121\",\"WARC-Target-URI\":\"https://www.ademcetinkaya.com/2023/02/next-nextdecade-corporation-common-stock.html\",\"WARC-Payload-Digest\":\"sha1:M63245FXO3GYWBZF4N6I75EVGIB5JRXK\",\"WARC-Block-Digest\":\"sha1:CAPXNMJGK7TMOM7TRQNGUGKN27V7PG7G\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510730.6_warc_CC-MAIN-20230930213821-20231001003821-00754.warc.gz\"}"}
https://mathexamination.com/class/wild-knots.php
[ "## Do My Wild Knots Class", null, "A \"Wild Knots Class\" QE\" is a standard mathematical term for a generalized continuous expression which is utilized to fix differential formulas and has options which are routine. In differential Class resolving, a Wild Knots function, or \"quad\" is utilized.\n\nThe Wild Knots Class in Class type can be expressed as: Q( x) = -kx2, where Q( x) are the Wild Knots Class and it is an important term. The q part of the Class is the Wild Knots consistent, whereas the x part is the Wild Knots function.\n\nThere are 4 Wild Knots functions with correct service: K4, K7, K3, and L4. We will now take a look at these Wild Knots functions and how they are resolved.\n\nK4 - The K part of a Wild Knots Class is the Wild Knots function. This Wild Knots function can also be written in partial portions such as: (x2 - y2)/( x+ y). To fix for K4 we multiply it by the appropriate Wild Knots function: k( x) = x2, y2, or x-y.\n\nK7 - The K7 Wild Knots Class has a solution of the form: x4y2 - y4x3 = 0. The Wild Knots function is then multiplied by x to get: x2 + y2 = 0. We then need to multiply the Wild Knots function with k to get: k( x) = x2 and y2.\n\nK3 - The Wild Knots function Class is K3 + K2 = 0. We then multiply by k for K3.\n\nK3( t) - The Wild Knots function equationis K3( t) + K2( t). We multiply by k for K3( t). Now we multiply by the Wild Knots function which provides: K2( t) = K( t) times k.\n\nThe Wild Knots function is also known as \"K4\" because of the initials of the letters K and 4. K implies Wild Knots, and the word \"quad\" is pronounced as \"kah-rab\".\n\nThe Wild Knots Class is one of the primary methods of resolving differential equations. In the Wild Knots function Class, the Wild Knots function is first increased by the suitable Wild Knots function, which will give the Wild Knots function.\n\nThe Wild Knots function is then divided by the Wild Knots function which will divide the Wild Knots function into a real part and a fictional part. This offers the Wild Knots term.\n\nLastly, the Wild Knots term will be divided by the numerator and the denominator to get the ratio. We are entrusted to the right-hand man side and the term \"q\".\n\nThe Wild Knots Class is a crucial concept to comprehend when resolving a differential Class. The Wild Knots function is simply one method to solve a Wild Knots Class. The techniques for resolving Wild Knots formulas consist of: singular value decomposition, factorization, optimum algorithm, numerical option or the Wild Knots function approximation.\n\n## Pay Me To Do Your Wild Knots Class\n\nIf you want to become acquainted with the Quartic Class, then you require to first start by browsing the online Quartic page. This page will reveal you how to utilize the Class by utilizing your keyboard. The description will also show you how to develop your own algebra formulas to help you study for your classes.\n\nPrior to you can comprehend how to study for a Wild Knots Class, you must initially comprehend making use of your keyboard. You will discover how to click on the function keys on your keyboard, along with how to type the letters. There are three rows of function keys on your keyboard. Each row has 4 functions: Alt, F1, F2, and F3.\n\nBy pressing Alt and F2, you can increase and divide the value by another number, such as the number 6. By pushing Alt and F3, you can utilize the 3rd power.\n\nWhen you push Alt and F3, you will enter the number you are attempting to multiply and divide. To multiply a number by itself, you will push Alt and X, where X is the number you wish to increase. When you press Alt and F3, you will key in the number you are attempting to divide.\n\nThis works the very same with the number 6, other than you will only enter the two digits that are six apart. Lastly, when you push Alt and F3, you will use the 4th power. Nevertheless, when you push Alt and F4, you will use the actual power that you have actually discovered to be the most suitable for your problem.\n\nBy utilizing the Alt and F function keys, you can multiply, divide, and after that use the formula for the 3rd power. If you require to multiply an odd number of x's, then you will need to go into an even number.\n\nThis is not the case if you are trying to do something complex, such as multiplying 2 even numbers. For example, if you wish to increase an odd variety of x's, then you will require to go into odd numbers. This is particularly real if you are trying to find out the response of a Wild Knots Class.\n\nIf you want to transform an odd number into an even number, then you will need to press Alt and F4. If you do not know how to increase by numbers by themselves, then you will need to utilize the letters x, a b, c, and d.\n\nWhile you can multiply and divide by use of the numbers, they are a lot easier to utilize when you can look at the power tables for the numbers. You will need to do some research study when you initially begin to use the numbers, however after a while, it will be force of habit. After you have developed your own algebra equations, you will be able to create your own reproduction tables.\n\nThe Wild Knots Solution is not the only method to solve Wild Knots equations. It is necessary to find out about trigonometry, which utilizes the Pythagorean theorem, and then use Wild Knots solutions to resolve issues. With this method, you can learn about angles and how to fix issues without needing to take another algebra class.\n\nIt is essential to try and type as rapidly as possible, due to the fact that typing will assist you learn about the speed you are typing. This will help you write your answers quicker.\n\n## Pay Someone To Take My Wild Knots Class", null, "A Wild Knots Class is a generalization of a direct Class. For example, when you plug in x=a+b for a given Class, you get the value of x. When you plug in x=a for the Class y=c, you get the worths of x and y, which give you an outcome of c. By using this standard idea to all the equations that we have tried, we can now resolve Wild Knots formulas for all the values of x, and we can do it quickly and efficiently.\n\nThere are numerous online resources offered that provide free or budget-friendly Wild Knots equations to solve for all the worths of x, including the expense of time for you to be able to make the most of their Wild Knots Class task assistance service. These resources usually do not need a subscription fee or any type of investment.\n\nThe answers provided are the outcome of complex-variable Wild Knots formulas that have actually been resolved. This is likewise the case when the variable utilized is an unknown number.\n\nThe Wild Knots Class is a term that is an extension of a direct Class. One benefit of using Wild Knots equations is that they are more general than the linear equations. They are easier to fix for all the values of x.\n\nWhen the variable utilized in the Wild Knots Class is of the kind x=a+b, it is simpler to fix the Wild Knots Class due to the fact that there are no unknowns. As a result, there are fewer points on the line defined by x and a constant variable.\n\nFor a right-angle triangle whose base points to the right and whose hypotenuse indicate the left, the right-angle tangent and curve graph will form a Wild Knots Class. This Class has one unknown that can be found with the Wild Knots formula. For a Wild Knots Class, the point on the line specified by the x variable and a continuous term are called the axis.\n\nThe presence of such an axis is called the vertex. Given that the axis, vertex, and tangent, in a Wild Knots Class, are a given, we can find all the values of x and they will sum to the offered worths. This is accomplished when we utilize the Wild Knots formula.\n\nThe factor of being a constant factor is called the system of equations in Wild Knots equations. This is in some cases called the central Class.\n\nWild Knots formulas can be resolved for other values of x. One way to solve Wild Knots equations for other worths of x is to divide the x variable into its element part.\n\nIf the variable is given as a positive number, it can be divided into its element parts to get the typical part of the variable. This variable has a magnitude that amounts to the part of the x variable that is a constant. In such a case, the formula is a third-order Wild Knots Class.\n\nIf the variable x is negative, it can be divided into the exact same part of the x variable to get the part of the x variable that is multiplied by the denominator. In such a case, the formula is a second-order Wild Knots Class.\n\nOption assistance service in resolving Wild Knots formulas. When utilizing an online service for solving Wild Knots formulas, the Class will be fixed instantly." ]
[ null, "https://mathexamination.com/Do-My-Math-Class.webp", null, "https://mathexamination.com/Take-My-Math-Class.webp", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9268814,"math_prob":0.97627926,"size":8671,"snap":"2021-21-2021-25","text_gpt3_token_len":2004,"char_repetition_ratio":0.1997231,"word_repetition_ratio":0.04227941,"special_character_ratio":0.22304232,"punctuation_ratio":0.09568584,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9936359,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-10T04:50:09Z\",\"WARC-Record-ID\":\"<urn:uuid:bf140a84-12ea-4c98-9dac-04167e3a7616>\",\"Content-Length\":\"19340\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3d9ff18d-1bba-4a58-a982-17a19d908cb3>\",\"WARC-Concurrent-To\":\"<urn:uuid:acefef5d-fc5d-4ff4-b6be-66b72229b782>\",\"WARC-IP-Address\":\"104.21.56.63\",\"WARC-Target-URI\":\"https://mathexamination.com/class/wild-knots.php\",\"WARC-Payload-Digest\":\"sha1:G2JGRDTGWEGEZLHII67LGXHF5MHQDTY3\",\"WARC-Block-Digest\":\"sha1:Y5MGEJJYHYGRQBJDRGX6UAVAXQWKNXIN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989030.87_warc_CC-MAIN-20210510033850-20210510063850-00172.warc.gz\"}"}
http://yhkn.net/read/38-b5-c4-b3-cb-b7-a8-bf-da-be-f7-bd-cc-d1-a7-ca-b5-c2-bc.html
[ "# 8的乘法口诀教学实录\n\n(1) 看口诀,明意义.在让孩子们记忆口诀时,要让他们明确口诀的由来,知道乘法的基本意义,要让他们知其然,而且要知其所以然,绝对不能仅把口诀当成顺口溜,盲目背诵.这样,在孩子们实在记不清某句口诀时,可以用最原始的方法推\n\n8的乘法口诀》教学反思: 8的乘法口诀这堂课的教学目标是:让学生经历推导 8的乘法口诀的过程,掌握8的乘法口诀和用相应的口诀计算乘法的方法,提高解决问题的能力.教学刚开始我创设了蓝猫进课堂的情境,通过学生喜欢的蓝猫跳一跳\n\n8的乘法口诀 1个8 1*8 = 8 8*1 = 8 一八得八 2个8 2*8 = 8 8*2 = 8 二八十六 3个8 3*8 = 8 8*3 = 8 三八二十四 4个8 4*8 = 8 8*4 = 8 四八三十二 5个8 5*8 = 8 8*5 = 8 五八四十 6个8 6*8 = 8 8*6 = 8 六八四十八 7个8 7*8 = 8 8*7 = 8 七八五十六 8个8 8*8 = 8 8*8 = 8 八八六十四 好评哦哦" ]
[ null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.89156073,"math_prob":0.99933887,"size":891,"snap":"2020-45-2020-50","text_gpt3_token_len":1033,"char_repetition_ratio":0.11161218,"word_repetition_ratio":0.0,"special_character_ratio":0.30078563,"punctuation_ratio":0.27027026,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9597796,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-26T08:54:02Z\",\"WARC-Record-ID\":\"<urn:uuid:4309089d-1484-44e8-9184-a0b493f52a5c>\",\"Content-Length\":\"10045\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2f133d54-a144-4ae9-b985-d3fb5b25ef41>\",\"WARC-Concurrent-To\":\"<urn:uuid:be74b492-cfec-4953-959e-5fcfa40fb32d>\",\"WARC-IP-Address\":\"121.127.228.6\",\"WARC-Target-URI\":\"http://yhkn.net/read/38-b5-c4-b3-cb-b7-a8-bf-da-be-f7-bd-cc-d1-a7-ca-b5-c2-bc.html\",\"WARC-Payload-Digest\":\"sha1:BU7RLUNJP6OK2OCLF34HOWD57CNH4L35\",\"WARC-Block-Digest\":\"sha1:EEQ7NVK55Z4OMDPTYQVFQBM5W2R36ZEP\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141187753.32_warc_CC-MAIN-20201126084625-20201126114625-00245.warc.gz\"}"}
https://ecosystems.psu.edu/research/labs/walter-lab/manual/chapter-2/2-6-importing-dynamically-downscaled-global-climate-data
[ "This exercise will provide some code for manipulating climate change data from the Regional Climate Downscaling by copy the link into your browser:\nhttp://regclim.coas.oregonstate.edu/data-access/index.html or just select the link here: Regional Climate Downscaling. IMPORTANT: For each climate projection, must change name in first command and file name in last command.\n\n2. Set working directory to the extracted folder in R under File - Change dir...\n3. First we need to load the packages needed for the exercise\nlibrary(ncdf)\n4. Now open the script \"NetCDF_Script.R\" and run code directly from the script\n5. Open netCDF and setting verbose=true provides details about the data in the netcdf file including the varid. You need to know the varid to select the variable you want to extract/summarize. Note: the dimensions x, y, time also get a varid so you will need to subtract 3 from the varid of interest to get the correct one.\n\ndat <- open.ncdf(\"Monthly_AvgMinTemp_1995-99_MPI.nc\", write=TRUE, readunlim=TRUE, verbose=TRUE)\n\ntmin #object\ntmin <- dat\\$var[]\ntmin\n\n#####################################\n#The following illustrates how to read the data\n#####################################\nprint(paste(tmin\\$name)) #in this case the 'field name' is TAMIN\n\n# Grab data for TAMIN variable and place in object df1\ndf1 <- get.var.ncdf(dat, tmin)\n#x is the object, n sets the number of entries displayed. tail returns the last of the data #entries.\n\n#Dimensions of df1 (x, y, time)\ndim(df1)\n\n#Dimensions can also be examined one at a time\ndim(df1) # number of x grids (36)\ndim(df1) # number of y grids (21)\ndim(df1) # number of months in file (49)\n#NOTE: FILE INCLUDES MONTHS OTHER THAN JANUARY (Jans are 1,13,25,37,49)\n\n#Check first element\ndf1[1,1,1]\n\n#Check first January for all x,y\ndf1[,,1]\n\n#Create a new matrix which is monthly averages for each grid cell. Make the new matix #the same size (i.e. same number of rows and columns as there are in the #dataframe df1\nsum1 <- array(data=NA, c(dim(df1),dim(df1) ))\ndim(sum1)\n\n#Create January mean TAMIN for each x-y coordinate\nfor(i in 1:dim(df1)){ # loop over x-coords\nfor(j in 1:dim(df1)){ # loop over y-coords\nsum1[i, j] <- (df1[i,j,1]+df1[i,j,13]+df1[i,j,25]+df1[i,j,37]+df1[i,j,49])/5\n}\n}\n\n#head(sum1) ## useful for large files\nsum1\n\n###########################################################\n\n#Create netcdf file from sum1 (contains matrix of new data)\n\n###########################################################\n\n#Get x and y coordinates from original \"dat\" ncdf file\n\nx = get.var.ncdf(nc=dat,var )\n\ny = get.var.ncdf(nc=dat,var )\n\n#Check dimensions\n\nlength(x)\n\nlength(y)\n\ndim(sum1)\n\n#Define the netcdf coordinate variables - note that these are coming\n\n#from the dat file with actual values\n\ndim1 = dim.def.ncdf( \"X\",\"meters\", as.double(x))\n\ndim2 = dim.def.ncdf( \"Y\",\"meters\", as.double(y))\n\n#Define the EMPTY (climate) netcdf variable and define names that will be used in the #var.def.ncdf function.\n\n#Define climate variable names\n\nnew.name <- 'mintemp'\n\n#Define units of measurement for variable\n\nunits <- 'degreesC'\n\n#Define long name for variable\n\nlong.name <- 'Jan average min temperature'\n\nvarz = var.def.ncdf(new.name,units, list(dim1,dim2), -1, longname=long.name)\n\n#Associate the netcdf variable with a netcdf file, put the variable into the file, and close\n\nnc.ex = create.ncdf( \"MPI1999-95.nc\", varz )\n\nput.var.ncdf(nc.ex, varz, sum1)\n\nclose.ncdf(nc.ex)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7149275,"math_prob":0.9405156,"size":3694,"snap":"2023-40-2023-50","text_gpt3_token_len":1002,"char_repetition_ratio":0.14823848,"word_repetition_ratio":0.0,"special_character_ratio":0.32024905,"punctuation_ratio":0.15436241,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9954934,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-05T11:20:53Z\",\"WARC-Record-ID\":\"<urn:uuid:a13dcade-f8b7-4c35-bd9e-aa7f0b632a0b>\",\"Content-Length\":\"125392\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4b7cf769-e9f4-4332-9381-861c2206c8b4>\",\"WARC-Concurrent-To\":\"<urn:uuid:1b033638-6320-4c97-9d16-4d2deea66dc8>\",\"WARC-IP-Address\":\"128.118.122.226\",\"WARC-Target-URI\":\"https://ecosystems.psu.edu/research/labs/walter-lab/manual/chapter-2/2-6-importing-dynamically-downscaled-global-climate-data\",\"WARC-Payload-Digest\":\"sha1:ABHVZNIXRSTDW3LJMURUY46BEIG7YX5A\",\"WARC-Block-Digest\":\"sha1:NOBLN2YFVV322YEQSN22ZEEQ7AKIIXIV\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100551.17_warc_CC-MAIN-20231205105136-20231205135136-00766.warc.gz\"}"}
https://file.scirp.org/Html/86525_86525.htm
[ " Optimization of Fairhurst-Cook Model for 2-D Wing Cracks Using Ant Colony Optimization (ACO), Particle Swarm Intelligence (PSO), and Genetic Algorithm (GA)\n\nJournal of Applied Mathematics and Physics\nVol.06 No.08(2018), Article ID:86525,15 pages\n10.4236/jamp.2018.68134\n\nOptimization of Fairhurst-Cook Model for 2-D Wing Cracks Using Ant Colony Optimization (ACO), Particle Swarm Intelligence (PSO), and Genetic Algorithm (GA)\n\nMohammad Najjarpour, Hossein Jalalifar\n\nDepartment of Oil and Gas Engineering, Shahid Bahonar University of Kerman, Kerman, Iran", null, "", null, "", null, "", null, "Received: April 26, 2018; Accepted: August 6, 2018; Published: August 9, 2018\n\nABSTRACT\n\nThe common failure mechanism for brittle rocks is known to be axial splitting which happens parallel to the direction of maximum compression. One of the mechanisms proposed for modelling of axial splitting is the sliding crack or so called, “wing crack” model. Fairhurst-Cook model explains this specific type of failure which starts by a pre-crack and finally breaks the rock by propagating 2-D cracks under uniaxial compression. In this paper, optimization of this model has been considered and the process has been done by a complete sensitivity analysis on the main parameters of the model and excluding the trends of their changes and also their limits and “peak points”. Later on this paper, three artificial intelligence algorithms including Particle Swarm Intelligence (PSO), Ant Colony Optimization (ACO) and genetic algorithm (GA) has been used and compared in order to achieve optimized sets of parameters resulting in near-maximum or near-minimum amounts of wedging forces creating a wing crack.\n\nKeywords:\n\nWing Crack, Fairhorst-Cook Model, Sensitivity Analysis, Optimization, Particle Swarm Intelligence (PSO), Ant Colony Optimization (ACO), Genetic Algorithm (GA)", null, "1. Introduction\n\nThe study of rock failure under compression is a matter of importance in rock mechanics. Two main mechanisms, including axial splitting and shear failure, have been identified for this type of rock failure . Failure by splitting mechanism can be related to the spalling phenomenon . This phenomenon always occurs at high stress contact points, for example in a ball bearing. Spalling occurs where the maximum shear stress occurs below the rock surface.\n\nSplitting parallel to the direction of maximum compression is a common type of macroscopic fracture of a brittle rock in the vicinity of its surface. Modelling of brittle failure is one of the greatest challenges of material failure analysis which results from the irreversible and very rapid propagation and connection of cracks, in a process called fracturing.\n\nMaterials like natural ice and rock are heterogeneous and crystalline with different behaviors under variation of applying forces. Generally, their behavior can be categorized in two main types, including ductile behavior under high confining pressures, and brittle behavior under low confining pressures . Because most rocks are brittle at low temperature and low confining pressure, virtually most of the rocks at or near the Earth’s surface exhibits brittle failure mechanism. In other words, failure in these rocks occurs as deformation-induced loss of cohesion .\n\nOne of the main mechanisms proposed for modelling of axial splitting is the sliding crack or “wing crack” model which was originally proposed for a 2D crack in a plate . Splitting failure begins with a primary crack (pre-crack) and then sliding mechanism creates secondary cracks or so called, wings, at the edges of those primary cracks. The macroscopic failure occur when a series of cracks extend and link together to split the material. The wedged crack can be modelled as a straight representative crack, where the wedging forces on the pre-crack area are opening the crack. This is often called the Fairhurst-Cook model . The whole process of creating a 2D wing crack with Fairhurst-Cook model and an optimization process on this model is done by Dyskin et al. (1994). The basis of this optimization was the crack semi-length (l) and a critical point for this parameter found in this study which results in an unstable mode for the crack . Another Optimization on the Fairhurst-Cook model is the purpose of this paper which is the optimization of wedging force based on the crack angle to find its critical points.\n\n2. Ultimate Rock Strength\n\nThe ultimate rock strength and the orientation of the macroscopic failure plane depend on the confining pressure applying on the rock. Some models for micro-cracking under compression (e.g. and ) have been proposed based on the fact that frictional sliding on pre-existing cracks results in the formation of tension cracks at their tips. It has been shown that under triaxial compression, the micro-crack distribution is almost uniform until the applied stress reaches the ultimate strength, and at the ultimate strength a region of high crack-density (tension cracks) emerges along a plane which eventually becomes a macroscopic shear failure plane . Variations of the “ultimate strength” and the orientation of shear failure with confining pressure using this model are already known and presented by Nemat-Nasser and Horii (1984) .\n\nAs discussed before, under uniaxial compression, the tension cracks grow at a sharp angle relative to the orientation of overall failure plane with confining pressure. Variation of this “crack angle” changes the amount of wedging force with specific but different trends, resulting different amounts of opening in wing cracks and “ultimate strengths” for rocks to fail under compression. Excluding these trends is another purpose of this paper.\n\n3. Fairhurst-Cook Model\n\nAs it can be seen in Figure 1, under uniaxial compression, crack opens in the shape of a wing with a specific crack angle (α) and also a specific crack amplitude (a) (This parameter is also called “half-length” or “semi-length” in other studies; but here it is called “crack amplitude” which is more proper and differentiates it from the other “semi-length” or “l”).\n\nThe amount of this wedging force (f) which creates the wing crack can be determined from the following equation:\n\nf = 2.a.σ.β(α) (1)\n\nwhere “σ” represents the maximum principal stress, “a” represents the crack amplitude, “f” represents the wedging force and “β(α)” is a function of crack angle which can be determined from the following equation:\n\nβ(α) = sin2(α).cos(α).(1-tan(α).tan(μ)) (2)\n\nIn the above equation, “μ” represents the internal frictional angle of the rock.\n\n4. Sensitivity Analysis\n\nIn this study, a complete sensitivity analysis performed to find the optimized amounts of parameters in Fairhurst-Cook Model. Three main parameters\n\nFigure 1. Schematic of 2-D wing crack growth according to Fairhurst-Cook Model .\n\nincluding crack amplitude (a), crack angle (α) and maximum principal stress (σ) and a fixed amount of 89 degrees for internal friction angle (μ) have been considered in this sensitivity analysis. According to this model, these parameters have the main roles in determining the amount of wedging force which creates a two-dimensional wing crack, while the internal friction angle (μ) should be determined according to the rock sample which is being cracked.\n\nThree different stages have been considered in the sensitivity analysis process. In the first stage of this process, crack amplitude analyzed and this process repeated for the second and third stages by analyzing crack angle (α) and maximum principal stress (σ). Performing this sensitivity analysis in Matlab environment, results in Figure 2 as the output.\n\nAs it can be seen in Figure 2, it includes two different parts which are differentiated in a specific point. By focusing on this figure, the trend of changing the wedging force creating wing crack by variation of crack angle in different crack amplitudes can be excluded. This process is shown in Figure 3.\n\nAs it is shown in Figure 3, trends change in a certain point (α = 60.7˚). Before this point, in any crack angle, the amount of wedging force increases by increasing the crack amplitude, but this trend changes after this point (α = 60.7˚) and by increasing the crack amplitude, wedging force will decrease. This amount of crack angle (α = 60.7˚) virtually acts like a border line and specifies the maximum amount of crack angle which causes the increase of wedging force. In other words, this specific crack angle (α = 60.7˚) has considered to be the “peak point” for crack angle in analyzing the change of wedging force by variation of crack amplitude.\n\nFigure 2. Change of wedging force (f) by variation of crack angle (α) in different crack amplitudes (a) by σ = 60 (Mpa).\n\nAnother fact which can be excluded from Figure 1 is the reversion of wedging force sign from positive to negative. The reason of this conversion is thought to be the conversion of applying wedging force from tensile to compression as a result of increasing the crack angle and decreasing the angle between force direction and its applying area, resulting in closing of the crack lips, instead of opening. In is thought that the reason for the variation of trends is also the same, indicating that the bigger wedging force still stays bigger after peak point angle, but with a different type of force and in an apposite way, applying compression force instead of tensile and closing the crack instead of opening it. This fact highlights the importance of finding the critical angle or so called, the “peak point”.\n\nIn the next stage of analyzing, the change of wedging force creating wing crack by variation of crack angle has been examined. For this purpose, one of the curves in Figure 2 has been chosen (a = 11 mm) and by focusing on it, the trend of changing the wedging force by variation of crack angle has been excluded. As it can be seen in Figure 4, this trend changes in a specific point (α = 37.7˚). Before this point, by fixing the amount of crack amplitude (a) and maximum principal stress (σ), the amount of wedging force increases as the amount of crack angle increases. In other words, there is a straight proportion between these parameters. After that specific point (α = 37.7˚) which is considered to be the “peak point” in variation of wedging force by changing the crack angle, that trend changes and in a reverse relation, the amount of wedging force decreases as crack angle increases. Just like the first stage, this specific amount of crack\n\nFigure 3. Different trends of changing the wedging force (f) by variation of crack amplitude (a).\n\nFigure 4. Different trends of changing the wedging force by variation of crack angle.\n\nangle (α = 37.7˚) acts like a border line which limits the increase of wedging force by increasing the amount of the relevant parameter.\n\nFor the third stage of this sensitivity analysis which includes analyzing the wedging force variation by changing the maximum principal stress (σ), three different amounts of maximum principal stress considered in a fixed amount of crack amplitude (a). In this stage, the variation of wedging force by changing the crack angle in different amounts of maximum principal stress has been investigated and by its excluded trends, plotted in Figure 5 and Figure 6.\n\nAs it can been seen in Figure 6, trend of changing the wedging force by changing the crack angle in different amounts of maximum principal stress changes in a specific amount of crack angle (α = 60.7˚), like the previous stages. This point which considered to be the “peak point”, differentiates the trends and returns it from straight relation to the reverse. Just like previous stages. This peak point limits the increase of wedging force by increasing the relevant parameter.\n\nAccording to this sensitivity analysis, optimized amounts of each parameter by fixing other relevant parameters have been excluded, but finding the optimum amounts of parameters without fixing others is much more important. For this reason, using some of the efficient algorithms of artificial intelligence for optimization is suggested. In this research three algorithms including Ant Colony Optimization (ACO), Particle Swarm Intelligence (PSO) and Genetic Algorithm (GA) were used and their results have been compared in order to find the most efficient method in general or separate parts (before and after the peak\n\nFigure 5. Variation of the wedging force (f) by changing maximum principal stress (σ).\n\nFigure 6. Different trends of changing the wedging force (f) by variation of maximum principal stress (σ).\n\npoint angle) and also to achieve the more reliable results.\n\n5. Ant Colony Optimization (ACO)\n\nAnt colony optimization (ACO) is a population-based metaheuristic algorithm which can be used to find approximate solutions to hard and discrete optimization problems. ACO is an algorithm for finding optimal paths that is based on foraging behavior of some ant species searching for food . In this algorithm, a set of software agents called “artificial ants” search for good solutions to a given optimization problem . At first, the ants distribute randomly to start searching for food. When an ant finds a food source, it walks back to the colony depositing pheromone on the ground in order to mark its favorable path which should be followed by other ants. In this situation, other ants are more likely to follow that path. As more ants find a path, it gets stronger and this process repeats so many times until there are a couple streams of ants traveling to various food sources near the colony. However, the pheromone trail starts to evaporate over time, thus its attractive strength reduces. The more time it takes for an ant to travel down the path and back again, the more time the pheromones have to evaporate . Because the ants drop pheromones every time they bring food, shorter paths are more likely to be stronger, hence optimizing the “solution”. “Positive Feedback” eventually leads to all the ants following a single path. Ant colony optimization exploits a similar mechanism for solving optimization problems. To apply ACO, the optimization problem is transformed into the problem of finding the best path on a weighted graph. The artificial ants incrementally build solutions by moving on the graph. The solution construction process is stochastic and is biased by a pheromone model, that is, a set of parameters associated with graph components (i.e. nodes) whose values are modified at runtime by the ants. This process is repeated many times until the stopping condition is being satisfied and a satisfactory result is achieved. The most famous application of this algorithm is finding near-optimal solutions to the traveling salesman problem (TSP) .\n\n6. Particle Swarm Intelligence (PSO)\n\nParticle Swarm Intelligence originally formed based on the movement of organisms in animal swarms such as bird flocks or fish schools to simulate their social behavior . A basic version of PSO algorithm starts by having a population (called a swarm) of candidate solutions (called particles). These particles are moved around the search-space to find the optimized solution (called global best solution) . In this process, each particle determines its movement through the search-space by combining some aspects of the history of its own current and best locations with those of other members of the swarm, with some random perturbations. When improved positions discovered, these positions will guide the movements of the swarm. The process is repeated many times trying to find a satisfactory solution and is expected to find a global or near-global optimized answer at the end of all algorithm cycles, although it is not guaranteed.\n\nThis algorithm can be summarized in four main steps, which are repeated until the stopping condition is satisfied:\n\n・ Assigning initially random positions and velocities for all of the particles in the search-space\n\n・ Evaluation of the fitness of each individual particle\n\n・ Updating the individual and global best positions\n\n・ Updating the velocity and position of each particle \n\nIn past several years, PSO Algorithm has been successfully applied in many researches and different application areas. It is demonstrated that PSO algorithm gives better results in a faster, cheaper way compared with other methods .\n\n7. Genetic Algorithm (GA)\n\nGenetic Algorithm (GA) is a heuristic optimizer algorithm based on the evolutionary ideas of natural selection and principles of “survival of the fittest” from “Charles Darwin”. Genetic Algorithms are commonly used to generate proper solutions to optimization problems by relying on bio-inspired operators such as “crossover” and “mutation”.\n\nGA simulates the natural selection process among individuals (also called “phenotypes”), each of which representing a possible solution. Each possible solution has a set of properties and is known as a “chromosome” (also called “genotype”). Representing the solutions as binary strings of 0 s and 1 s are more common, but other types such as “real strings” are also applicable. The initially created individuals then lead through the process of evolution .\n\nStarting with a randomly generated population of chromosomes, the evolution occurs as a process of fitness based selection and recombination to produce a better population in each iteration called a “generation” . This process will be done by defining a proper “fitness function” and improving the initial population through repetitive application of the mutation, crossover and selection operators.\n\nIn each generation, the fitness of every individual in the population which is usually the value of the objective function in the problem, is being evaluated and the GA creates a new population by a new group of chromosomes with resulted fitness values. In this process, firstly, parents are selected to mate, based on their fitness, producing “offspring”, so better solutions with more fitness are given better chance to reproduce by crossover operation. The offspring inherit characteristics from both parents, but not equally. As parents mate and produce offspring, some new rooms must be freed for the newly generated chromosomes.\n\nSince the population contains more information than each individual fitness, GA combines the good information hidden in a solution with good information from another one in the mating pool, in order to produce new solutions with good information inherited from both parents . After the GA mates the new individuals and mutates some of them, the population undergoes a complete generation change. Some of the individuals in the population are replaced by new ones, since the size of the population has to remain fixed and shouldn’t increase. The population will then consist of offspring plus a few of the older individuals, which the genetic algorithm allows to survive to the next generation, because they are the best members of the population, called “elite individuals”. Following this procedure, it is hoped, but not guaranteed, that over many generations, better solutions will remain while the least fit solutions die out.\n\nEach generation will contain, on average, more good genes than the previous one. Once the population is not producing much better solutions than previous generations, the algorithm is said to have converged to a specific set of solutions for the problem. Eventually, the algorithm terminates when either it converged to a proper solution with satisfactory fitness level or a specific number of generations has been produced (Figure 7).\n\n8. Optimization Process\n\nAs it has been discussed earlier, three different optimization algorithms including Ant Colony Optimization (ACO), Particle Swarm Intelligence (PSO) and Genetic Algorithm (GA) have been used in order to find the optimum or near optimum parameters influencing the wedging force which creates a wing crack. This optimization has been performed in several cases including general maximizing and minimizing of the wedging force and also separate maximizing and minimizing of this parameter, isolated in before and after the peak point angle (37.7˚).\n\nThe First algorithm was ACO and it has been performed by a colony of 46 ants trying to find the optimum amounts of crack angle (α), crack amplitude (a), maximum principal stress (σ) and frictional angle (μ) in 100 iterations. Two specific upper and lower limits have been considered for each parameter in order to specify their valid range of variation. This range was from 0 to 120 degrees for\n\nFigure 7. Schematic of Genetic Algorithm.\n\ncrack angle, from 0 to 89.999 degrees for frictional angle, from 0.001 to 0.046 meters for crack amplitude and finally 10 to 100 mega-Pascal for maximum principal stress. The results of this optimization are illustrated in Table 1.\n\nThe second optimization algorithm was Particle Swarm Intelligence (PSO) and it has been performed in 50,000 iterations with 10,000 swarms and 4 particles for each swarm, representing crack angle (α), crack amplitude (a), maximum principal stress (σ) and frictional angle (μ). Just like the previous algorithm, two specific upper and lower limits with the same amounts have been considered for each parameter in order to specify their valid range of variation. The results of this optimization are also illustrated in Table 1.\n\nThe third and final optimization algorithm was Genetic Algorithm (GA). In this study, real genetic algorithm used and it has been performed with 200 chromosomes and 4 genes for each chromosome. These genes represented the related parameters including crack angle (α), crack amplitude (a), maximum principal stress (σ1) and frictional angle (μ) and each chromosome represented a resulting amount of wedging force (f). The optimization process repeated for 4000 iterations with the same upper and lower limits for different parameters and like the previous stages, its results is illustrated in Table 1.\n\nThese steps repeated several times, in order to achieve better results of wedging force without exiting the valid range for each parameter and as it can be seen in this table, Particle Swarm Intelligence (PSO) algorithm achieved better results with more amount of wedging force at the end. So these amounts of parameters will be more proper to use as the optimum amounts and this method is more efficient in general maximizing of wedging force in wing crack model comparing to the ACO and GA algorithms. These steps have been repeated for the general minimization stage with the same ranges for the parameters. The results are shown in Table 2 which indicate that GA is the optimum method in this stage of the optimization.\n\nTable 1. Results of the optimization algorithms in general maximization of the wedging force.\n\nTable 2. Results of the optimization algorithms in general minimization of the wedging force.\n\nAs it can be understood from Table 1 and Table 2, the GA and PSO algorithms both had proper results with near optimum amounts of wedging forces, but ACO didn’t show any acceptable results; so this algorithm has been neglected in the next stages of the optimization. The results of these stages of optimization are shown in Table 3 and Table 4.\n\nFor better understanding and easier access to the best algorithms and optimum amounts of parameters, a summary of these methods and results are shown in Table 5. Using these optimum amounts helps to accelerate or decelerate (in different cases of maximizing and minimizing) the opening of a wing crack by more applying wedging force in the tensile or comparison modes, avoiding the waste of time and resources.\n\n9. Conclusions\n\nIn the first part of this study, a complete sensitivity analysis performed on the main parameters of Fairhurst-Cook Model to determine their relations and\n\nTable 3. Results of the optimization algorithms in separate maximization of the wedging force.\n\nTable 4. Results of the optimization algorithms in separate minimization of the wedging force.\n\nTable 5. Summary of best algorithms and optimum results in different cases.\n\ntrends of change. Concluded results from this sensitivity analysis are summarized as below:\n\n・ The trend of changes for each of these parameters reversed in a specific amount of crack angle (α) as a “peak point”.\n\n・ This peak point is about 60.7 degrees in the analysis of crack amplitude and also maximum principal stress and it is about 37.7 degrees in crack angle analysis.\n\n・ In all of above cases, straight relations between that specific parameter and the amount of wedging force observed before the peak point, but it has changed to reverse relations after that point.\n\n・ The peak point virtually acts like a border line and limits the increase of wedging force by increasing the crack angle.\n\n・ The reason for the reversion of wedging force sign is thought to be the reversion of force from compression to tensile with the same magnitude order; which means the biggest force still remains the biggest one, but in a reverse direction and it happens because of the changes in crack angle, making an angle of more than 90 ̊ between the direction of wedging force and its applying area.\n\nKnowing the amount of peak points can be helpful for understanding the ultimate rock strength under uniaxial compression and also to apply optimum wedging force on a rock sample and create a wing crack. In order to achieve this optimum wedging force, a set of optimum amounts of related parameters should be used. For this purpose, three different optimizer algorithms (e.g. ACO, PSO and GA) were used and compared to identify the best algorithms and optimum results. Although it is not guaranteed that these resulted amounts of parameters are complete optimum, but they are expected to have proper applications as the local and near-global optimums with satisfactory resulting wedging force to create a wing crack.\n\nConflicts of Interest\n\nThe authors declare no conflicts of interest regarding the publication of this paper.\n\nCite this paper\n\nNajjarpour, M. and Jalalifar, H. (2018) Optimization of Fairhurst-Cook Model for 2-D Wing Cracks Using Ant Colony Optimization (ACO), Particle Swarm Intelligence (PSO), and Genetic Algorithm (GA). Journal of Applied Mathematics and Physics, 6, 1581-1595. https://doi.org/10.4236/jamp.2018.68134\n\nReferences\n\n1. 1. Nemat-Nasser, S. and Horii, H. (1984) Rock failure in compression. Proceedings Ninth Workshop Geothermal Reservoir Engineering, 999-1011. https://doi.org/10.1016/0020-7225(84)90101-0\n\n2. 2. Fairhurst, C. and Cook, N.G.W. (1966) The Phenomenon of Rock Splitting Parallel to the Direction of Maximum Compression in the Neighborhood of a Surface. Proceedings of the 1st International Congress of Rock Mechanics, 687-692.\n\n3. 3. Kolari, K. (2017) A Complete Three-Dimensional Continuum Model of Wing-Crack Growth in Granular Brittle Solids. International Journal of Solids and Structures, Elsevier, 27-42. https://doi.org/10.1016/j.ijsolstr.2017.02.012\n\n4. 4. Renshaw, C.E. and Schulson, E.M. (2001) Universal Behavior in Compressive Failure of Brittle Materials. Nature, 897-900. https://doi.org/10.1038/35091045\n\n5. 5. Wachter, L.M., Renshaw, C.E. and Schulson, E.M. (2009) Transition in Brittle Failure Mode in Ice under Low Confinement. Acta Mater, 345-355. https://doi.org/10.1016/j.actamat.2008.09.021\n\n6. 6. Horii, H. and Nemat-Nesser, S. (1985) Compression-Induced Microcrack Growth in Brittle Solids: Axial Splitting and Shear Failure. Journal of Geophysical Research, 3105-3125. https://doi.org/10.1029/JB090iB04p03105\n\n7. 7. Wong, T.F. and Baud, P. (2012) The Brittle-Ductile Transition in Porous Rock: A Review. Journal of Structural Geology, 25-53. https://doi.org/10.1016/j.jsg.2012.07.010\n\n8. 8. Brace, W.F. and Bombolakis, E.G. (1963) A Note on Brittle Crack Growth in Compression. Journal of Geophysical Research, 3709-3713. https://doi.org/10.1029/JZ068i012p03709\n\n9. 9. Ashby, M.F. and Hallam, N.C. (1986) The Failure of Brittle Solids Containing Small Cracks under Compressive Stress States. Acta Metall, 497-510. https://doi.org/10.1016/0001-6160(86)90086-6\n\n10. 10. Horii, H. and Nemat-Nasser, S. (1986) Brittle Failure in Compression: Splitting, Faulting and Brittle-Ductile Transition. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 337-374. https://doi.org/10.1098/rsta.1986.0101\n\n11. 11. Dyskin, A.V., Germanovich, L.N., Lee, K.K., Ring, L.M. and Ingrafea, A.R. (1994) Modelling Crack Propagation in Compression. Rock Mechanics, ISBN: 90 5410 380 8.\n\n12. 12. McClintock, F.A. and Walsh, J.B. (1963) Friction on Griffith Cracks in Rocks under Pressure. ASME, 1015-1021.\n\n13. 13. Hallbauer, D.K., Wagner, H. and Cook, G.W. (1973) Some Observations Concerning the Microscopic and Mechanical Behavior of Quartzite Specimens in Stiff Triaxial Compression Tests. International Journal of Rock Mechanics and Mining Sciences & Geomechanics Abstracts, Elsevier, 713-726. https://doi.org/10.1016/0148-9062(73)90015-6\n\n14. 14. Damjanac, B. and Fairhurst, C. (2010) Evidence for a Long-Term Strength Threshold in Crystalline Rock. Rock Mechanics and Rock Engineering, 513-531. https://doi.org/10.1007/s00603-010-0090-9\n\n15. 15. Hole, K.R., Meshram, R.A. and Deshmukh, P.P. (2015) Review: Applications of Ant Colony Optimization. International Journal of Engineering and Computer Science, 12740-12744. https://doi.org/10.5325/arthmillj.10.2.0177\n\n16. 16. Dorigo, M., Maniezzo, V. and Colorni, A. (1991) Positive Feedback as a Search Strategy. Technical Report, 91-016.\n\n17. 17. Dorigo, M. and Stültze, T. (2004) Ant Colony Optimization.\n\n18. 18. Bonnaccorsi, A. (1992) On the Relationship between Firm Size and Export Intensity. Journal of International Business Studies, 605-635. https://doi.org/10.1057/palgrave.jibs.8490280\n\n19. 19. Deb, K., Dorigo, M., Maniezzo, V. and Colorni, A. (1996) The Ant System: Optimization by a Colony of Cooperating Agents. IEEE Transactions on System, Man and Cybernetics, 29-41.\n\n20. 20. Kennedy, J. and Eberhart, R.C. (2001) Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation).\n\n21. 21. Zhang, Y. (2015) A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications. Mathematical Problems in Engineering, 1-38.\n\n22. 22. Dahyia, R. and Singh, A. (2014) A Survey on Application of Particle Swarm Optimization in Text Mining. International Journal of Innovative Research and Development, 101-107.\n\n23. 23. Singh, N. and Singh, A. (2012) Personal Best Position Particle Swarm Optimization. Journal of Applied Computer Science & Mathematics, 69-76.\n\n24. 24. Whitley, D. (1994) A Genetic Algorithm Tutorial. Statistics and Computing, 65-85. https://doi.org/10.1007/BF00175354\n\n25. 25. McCall, J. (2014) Genetic Algorithms for Modelling and Optimization. Journal of Computational and Applied Mathematics, Elsevier, 205-222.\n\n26. 26. Holland, J.H. (1975) Adaptation in Natural and Artificial Systems.\n\nNomenclature\n\na = crack amplitude\n\nf = wedging force\n\nl = crack semi-length\n\nα = crack angle\n\nβ(α) = model function depending on crack angle\n\nσ = maximum principal stress\n\nμ = internal friction angle" ]
[ null, "https://html.scirp.org/file/86525x1.png", null, "https://html.scirp.org/file/9-2500537x3.png", null, "https://html.scirp.org/file/9-2500537x2.png", null, "https://html.scirp.org/file/18-1760983x4.png", null, "https://html.scirp.org/file/2-1410169x6.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.894766,"math_prob":0.8269127,"size":30909,"snap":"2019-43-2019-47","text_gpt3_token_len":6809,"char_repetition_ratio":0.15230545,"word_repetition_ratio":0.07321652,"special_character_ratio":0.22420654,"punctuation_ratio":0.12548128,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.95147467,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,3,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-17T15:09:13Z\",\"WARC-Record-ID\":\"<urn:uuid:07dd5c60-f552-43d8-a9d0-9e0cb2d6cb0f>\",\"Content-Length\":\"63073\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:66438ebc-c6b2-411e-b98a-0eee07e978c4>\",\"WARC-Concurrent-To\":\"<urn:uuid:79b348e0-089c-4c8a-bc6f-2e4a05ef88d2>\",\"WARC-IP-Address\":\"45.146.121.13\",\"WARC-Target-URI\":\"https://file.scirp.org/Html/86525_86525.htm\",\"WARC-Payload-Digest\":\"sha1:2CDV77GBHJHXYDVS3CMB3Z6XU4KSRHHQ\",\"WARC-Block-Digest\":\"sha1:OLD7FGXB5PCVNNU73YE5JS47CCYXKFVG\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986675409.61_warc_CC-MAIN-20191017145741-20191017173241-00312.warc.gz\"}"}
https://www.britannica.com/science/separation-of-variables
[ "# Separation of variables\n\nmathematics\n\nSeparation of variables, one of the oldest and most widely used techniques for solving some types of partial differential equations. A partial differential equation is called linear if the unknown function and its derivatives have no exponent greater than one and there are no cross-terms—i.e., terms such as f f′ or ff′′ in which the function or its derivatives appear more than once. An equation is called homogeneous if each term contains the function or one of its derivatives. For example, the equation f′ + f 2 = 0 is homogeneous but not linear, f′ + x2 = 0 is linear but not homogeneous, and fxx + fyy = 0 is both homogeneous and linear.\n\nIf a homogeneous linear equation in two variables has a solution f(x, y) that consists of a product of factors g(x) and h(y), each involving only a single variable, the solution of the equation can sometimes be found by substituting the product of these unknown factors in place of the unknown composite function, obtaining in some cases an ordinary differential equation for each variable. For example, if f(x, y) is to satisfy the equation fxx + fyy = 0, then by substituting g(x)h(y) for f(x, y) the equation becomes gxxh + ghyy = 0, or −gxx/g = hyy/h. Because the left side of the latter equation depends only on the variable x and the right side only on y, the two sides can be equal only if they are both constant. Therefore, −gxx/g = c, or gxx + cg = 0, which is an ordinary differential equation in one variable and which has the solutions g = a sin (xc1/2) and g = a cos (xc1/2). In a similar manner, hyy/h = c, and h = e±yc1/2. Therefore, f = gh = ae±yc1/2 sin (xc1/2) and ae±yc1/2 sin (xc1/2) are solutions of the original equation fxx + fyy = 0. The constants a and c are arbitrary and will depend upon other auxiliary conditions (boundary and initial values) in the physical situation that the solution to the equation will have to satisfy. A sum of terms such as ae±yc1/2 sin (xc1/2) with different constants a and c will also satisfy the given differential equation, and, if the sum of an infinite number of terms is taken (called a Fourier series), solutions can be found that will satisfy a wider variety of auxiliary conditions, giving rise to the subject known as Fourier analysis, or harmonic analysis.\n\nThe method of separation of variables can also be applied to some equations with variable coefficients, such as fxx + x2fy = 0, and to higher-order equations and equations involving more variables.\n\nThis article was most recently revised and updated by William L. Hosch, Associate Editor." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.930103,"math_prob":0.99934286,"size":3496,"snap":"2020-45-2020-50","text_gpt3_token_len":770,"char_repetition_ratio":0.16008018,"word_repetition_ratio":0.006837607,"special_character_ratio":0.22025171,"punctuation_ratio":0.087692305,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99977106,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-24T04:52:09Z\",\"WARC-Record-ID\":\"<urn:uuid:bc691f32-7f3e-4eea-b84c-25f4470ff1e3>\",\"Content-Length\":\"68855\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f60aa0b0-12a9-4d38-b57c-d2582b28a6a6>\",\"WARC-Concurrent-To\":\"<urn:uuid:99ccf5f7-e6be-4c5f-a13c-170d9ce2a937>\",\"WARC-IP-Address\":\"34.206.100.126\",\"WARC-Target-URI\":\"https://www.britannica.com/science/separation-of-variables\",\"WARC-Payload-Digest\":\"sha1:UMLVV6HBIJ27UGYM6G64NEIKXPWSJ7V5\",\"WARC-Block-Digest\":\"sha1:UIUOY5TG7N6GD6VVZ2ZHZJWF3KOZR7B5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141171077.4_warc_CC-MAIN-20201124025131-20201124055131-00697.warc.gz\"}"}
https://www.nature.com/articles/s41467-022-33877-7?error=cookies_not_supported&code=1c25b0d5-fa96-4202-b002-31dd385bd5ce
[ "## Introduction\n\nArtificial intelligence (AI) has the potential to drastically change our world through accumulating impacts in fundamental science1,2, new-type transportation3,4, assisted medical treatment5,6, etc. Artificial neural network (ANN), a kind of computing architecture inspired by signal processing in the human brain, is one of the major technical pillars for these applications. It contains complex mapping relations in repetitive linear and nonlinear operations. In recent years, however, the required computing capacity for the state-of-the-art ANNs has been doubling every 3.5 months7, far overloading Moore’s Law in microelectronics8, e.g., electronic computers. Now, silicon (Si) photonics has been recognized as one of the most promising candidates to break through microelectronics bottles owing to its superior interconnect bandwidth, low power consumption and complementary metal-oxide-semiconductor (CMOS) compatibility. According to different implementations, many Si photonic neural network architectures have been proposed to facilitate complex computing tasks, such as diffractive neural networks9,10 and optical interference neural networks11,12. They utilize diffractive elements or optical interferometers to perform linear operations. The Si photonic interference circuit has been demonstrated as 100× faster than the microelectronic processor but of 1/1000 energy11. With the rapidly increasing demand for computational speed and power, Si photonics ANNs provide a promising alternative for AI hardware.\n\nSi photonics neural networks face challenges in large-scale integration due to the lack of proper neurons. Firstly, integrating optical nonlinear material on Si is an open challenge13,14. On account of the weak nonlinear effect of Si15, heterogeneous integration of other materials is often needed. Although the dye16,17, phase-change materials18,19 and two-dimensional materials20,21 have been proved their optical nonlinearities for all-optical neural networks (AONNs), their stabilities and manufacture abilities are unsatisfactory22,23, limiting applications for large-scale networks. For example, two-dimensional materials, such as black phosphorus, are easily irreversible oxidized in air, resulting in poor stability and rapid degradation of the semiconductor properties24. Moreover, as the average size of two-dimensional material is limited by the quality of its corresponding three-dimensional precursor, it is hard to produce wafer-scale two-dimensional single crystalline25. In addition, the temperature required for crystallization of typical phase-change materials is usually too high for Si-compatible fabrication, hindering the large-scale integration with Si photonics26. Secondly, the lack of non-intrusive monitors27,28 to prompt the status of the network without interference is another major obstacle. Monitoring and feedback operations enable efficient networks training, node failures detection and environmental fluctuations offset. For a given hardware-based neural network, especially when it is trained completely, such monitors should not change the operating points. However, this is very difficult since a neural network may contain thousands of neurons. For example, the implementation of in situ backpropagation algorithm requires virtually lossless intensity detection in every node29. Yet, the conventional light-splitting-and-detection method drifts the operating states and also introduces architecture complexity and accumulated insertion loss.\n\nHere, we propose and demonstrate nonlinear germanium-silicon (Ge-Si) photodiodes (PDs) to construct non-intrusive and self-monitored AONN (SM-AONN) with fully CMOS compatibility. The all-optical power in-power out response is attributed to the intrinsic-absorption-induced free-carrier absorption (FCA) in the Ge thin film. Specially designed electrodes achieve high carrier concentration accumulation via hindering carrier transport. Meanwhile, the Ge-Si heterojunction provides a non-intrusive electrical monitoring signal owing to concomitant photoelectric conversion. In a compact structure of 4.3 × 8 μm2 without any optical splitter, the nonlinear activation and monitoring are combined simultaneously, alleviating the issues of complex architecture and operation point drift in conventional ANNs. Experimentally, using the activation and monitoring features, a three-layer SM-AONN enables object classification and semantic segmentation tasks, presenting in situ training and learning with high training accuracy. More layers of SM-AONN can be constructed using optical fiber arrays to connect multiple chips. In addition, the feasibility and performance of this neuron for deep feedforward neural networks are confirmed via the Modified National Institute of Standards and Technology (MNIST) handwriting recognition30, achieving a high accuracy of 97.3%.\n\nOur work proves that conventional Group-IV semiconductor technology not only enables all-optical nonlinearity without resorting to other materials but also merges activation and monitoring units. The photonic neural network based on this technology allows for more functionalities, simplified architecture and high accuracy. Due to the material stability and mass-production31, we believe that this work will pave a new way toward future high-density integrated photonic intelligent processors.\n\n## Results\n\n### Self-monitored all-optical neural network\n\nFigure 1a shows the architecture of the proposed SM-AONN, consisting of an input layer, multiple hidden layers with monitoring signals and an output layer. In each layer, optical signals are processed by an optical linear transformation and all-optical nonlinear activation building blocks. Being different from the traditional architecture, each nonlinear activation block will produce electrical signals for monitoring the states of each neuron.\n\nOptical linear transformations are implemented using a reconfigurable Si-based Mach-Zehnder interferometer (MZI) mesh, which is an equivalent photonic field programmable gate array, as shown in Fig. 1b. It has been proved that the arbitrary optical linear operations can be carried out by a series of optical beam splitters, phase shifters and attenuators32,33, i.e., tunable MZIs34. As Fig. 1c shows, voltage signals from the digital-to-analog converters (DACs) are loaded on two thermal-tuning electrodes of the Si-based MZI. The state of each MZI is controlled until the linear operation of the entire network is formed. The weightings between neurons are stored and updated in the voltage information. Note that a complete neuron contains both a linear weighting part and a nonlinear part, and the thermo-optic phase shifter-based linear weighting mesh is indispensable for building complete neurons.\n\nAfter optical linear operations, the optical signals undergo the Ge-Si all-optical nonlinear units (AONUs) to perform nonlinear processing (activation function), as shown in Fig. 1d. Meanwhile, each AONU provides an electrical monitoring signal to indicate the results of weighting addition and nonlinear operations, by monitoring the input and output optical power of the AONUs. Unlike conventional light-splitting-and-detection solutions, this photoelectric monitoring occurs concomitantly with the optical nonlinear activation in the same structure (Fig. 1e). As shown in Fig. 1f, monitoring signals are drawn from the electrode and converted to the digital domain through the analog-to-digital converters (ADCs). This non-intrusive manner detects the current node states in real-time without changing the network operating point, and thus it enables high performance and stability of the SM-AONN.\n\n### Nonlinear Ge-Si PD-based AONU\n\nAs a key component of the SM-AONN, the Ge-Si AONU enables all-optical nonlinear activation and non-intrusive monitoring. Figure 2a shows the structure and schematic of it. It is similar to the Ge-Si waveguide PDs applied to photoelectric detection35,36 (Fig. 2b). For conventional PDs, the electrodes are with the same length as the Ge film to export out the photo-generated carriers from each part of the absorber. Typically, the output optical power is less concerned. Being different from that, the electrodes herein are omitted where the light is incident to engineer the carrier dynamics. Detailed device geometry and optical field information can be found in Supplementary Note 1. In the electrodeless region (with a small electric field and carrier transit time » carrier lifetime), carriers accumulate and enable the FCA of the Ge film, producing a strong all-optical nonlinear response. In the region with the electrode (with a strong electric field and carrier transit time « carrier lifetime), the carriers are rapidly absorbed by the electrode, and no FCA effect occurs. Fortunately, these collected carriers can be used for optical monitoring. A specific mechanism of the activation function that conforms to the proposed partial electrode structure is given in Supplementary Notes 2 & 3.\n\nBy solving the nonlinear Schrödinger equation (NLSE) and carrier rate equation37,38 (See Methods), the activation function can be obtained as\n\n$${P}_{{{{{{\\rm{out}}}}}}}=\\frac{\\exp (-\\alpha {L}_{{{{{{\\rm{Ge}}}}}}}){P}_{{{{{{\\rm{in}}}}}}}}{1+A[1-\\exp (-\\alpha ({L}_{{{{{{\\rm{Ge}}}}}}}-{L}_{{{{{{\\rm{E}}}}}}}))]{P}_{{{{{{\\rm{in}}}}}}}}$$\n(1)\n\nwhere A represents for στ/2ħωS. When A = 0, the above relationship degenerates into linear absorption. Pin and Pout are input and output optical power, respectively, with α, σ, τ, LGe, S being intrinsic absorption coefficient, absorption cross-section of FCA, carrier lifetime and length of Ge film, as well as incident area. LE is the length of the electrode. ħ and ω represent the reduced Planck constant and optical frequency, respectively. Meanwhile, the concomitant electrical monitoring signal occurs thanks to intrinsic absorption and photoelectric conversion. The FCA effect only transfers momentum between electrons, providing no photocurrent. The nonlinear relationship between the output current and input optical power is expressed as39\n\n$${I}_{{{{{{\\rm{out}}}}}}}=R{P}_{{{{{{\\rm{in}}}}}}}\\,\\tanh (\\frac{k{I}_{\\max }}{R{P}_{{{{{{\\rm{in}}}}}}}})$$\n(2)\n\nwhere Iout, R, Pin and Imax are output current, responsivity at low-power level, input optical power and saturation current, respectively. k is a parameter used to change the shape of the curve. Note that this optical monitoring is non-intrusive. The bonding wire is placed ~3 μm above the Si-Ge region, having little influence on the optical signal, and this is the main reason we call it non-intrusive. In addition, the proposed device consumes a portion of optical power to achieve the optical nonlinearity, and the resulting photocurrent is used to realize monitoring at the same time. This is to say, the optical power used to achieve optical nonlinearity is inherently consumed, and no additional optical power is needed to achieve monitoring. This is another important reason we call it non-intrusive.\n\nThe length ratio of the electrode to Ge film (LE/LGe) significantly affects the optical-to-optical and optical-to-electrical response. A longer electrode improves the carrier collection efficiency, thereby increasing the output photocurrent40,41. However, it reduces the carrier concentration and weaken the FCA effect. The relationship of the carrier collection efficiency and photocurrent can be referred to Supplementary Note 4. Figure 2c shows the carrier concentration and collection efficiency (ηc) versus length ratio. The pink area (LE/LGe = 0.2–0.4, represented as Type-A) achieves 90% of the maximum value of both. Within this range, a good optical nonlinearity and high optical monitoring responsivity can be obtained simultaneously, and this range can be considered as the optimal ratio. The orange area (LE/LGe ~ 1) shows the conventional PD (represented as Type-B) with low optical nonlinearity. Figure 2d shows the false-color image of the fabricated AONU. A 4.3 × 8 μm2 Ge thin film is epitaxially grown on the Si waveguide. The 3 μm-length electrodes are coated at the optical exportation of Ge. The adopted scheme (Type-A) corresponds to LE/LGe of 0.375. See Methods for more fabrication details.\n\nHere, we experimentally verified the optical and electrical responses of the proposed AONU, compared with a reference conventional PD. The Pout-Pin relations are shown in Fig. 2e. For Type-A, the output power is linear at low input, and then gradually flattens as the power increases, showing obvious Pout-Pin nonlinearity. However, the curve of Type-B is linearly tangent to that of Type-A. At the same input, the difference between the two curves contributes to the FCA. The threshold of the nonlinear activation is about 1.1 mW. Such a low threshold requirement is very beneficial for low power consumption and for driving the nonlinearity units of next level. The activation functions are fitted by Eq. (1), as the solid line shown in Fig. 2e. On the other hand, the measured output photocurrents are shown in Fig. 2f. Although the linearity is slightly reduced, the photocurrent still increases monotonously with the input optical power, so that the input optical power can be uniquely determined and monitored from the output current. Combined with the Pin-Pout relation, the output optical power can also be determined. The photodetection metrics including the responsivity, bandwidth and dark current can be referred in Supplementary Note 6. The bandwidth is influenced by the doping of the AONU and the detailed analysis is given in Supplementary Note 7.\n\n### Large scale SM-AONN performance\n\nHaving proved that the state of each neuron can be obtained from the monitoring signals, the performance of the entire neural network is characterized. We prepare a scalable three-layer fully connected feedforward neural network using MZI mesh and the proposed AONUs, as shown in Fig. 3a. Although the three-layer network can be built on one chip with the same fabrication process, we split it into three chips and connect them using optical fiber arrays, for easy comparison and arbitrary combination. More importantly, more layers of networks can be constructed using optical fiber arrays to connect multiple chips. Here, three layers are sufficient to demonstrate the following machine learning tasks with high accuracy. Figure 3b shows one layer of the packaged SM-AONNs, consisting of four neurons with 16 MZIs and four nonlinear units. The MZI mesh and nonlinear units are present in Fig. 3c, d, respectively.\n\nThe basic operations of neural networks are training and inference. Compared with inference, training consumes most of the computing power in neural networks. However, it can be completed quickly and automatically, using self-monitoring electrical signals combined with special processing chips and optoelectronic integration. The training set of machine learning tasks consists of a series of vectors of inputs and outputs, being encoded on optical power. As shown in Fig. 4a, the input optical signals are processed by the photonic chip to obtain the real optical outputs. Being different from the conventional training method, the real output is read by monitoring signals rather than external PDs. A loss function such as cross-entropy42 is defined to evaluate the distance between the real outputs and training-set predicted outputs. The difference is eliminated with iteration by feedback algorithms such as backpropagation43 in special processing chips. Then, the SM-AONN is trained completely. The detailed in situ training implementation can refer to Supplementary Note 8.\n\nExperimentally, the simplified object classification and semantic segmentation tasks are performed. As shown in Fig. 4b, we utilize two-valued optical intensities to encode the labels of four input targets, for example, ′0110′ for input and ′0100′ for output are represented for ′target 2′. At the optical input port, only ports 2 and 3 are configured to pass through via the variable optical attenuators (VOAs). When the neural network is successfully trained, only port 2 is expected to be the optical output. In real application, the targets can represent different grayscale images. Figure 4c shows the relationship of the loss function and iterations. The output histograms of the initial state, the intermediate state of the 20 iterations and the final state are shown as the insets. In the initial state, the output of each mode is chaotic, since the weightings of the MZI network are given randomly. With the reconstruction of weightings, the recognition of each mode becomes clearer. Being fully configured, the output probability of each mode at the correct port exceeds 97%. Similarly, the training for semantic segmentation is present. As a 4 × 4-pixel image shown in Fig. 4d, the gray levels of the ′L′ and ′T′-type regions are greater than others. After training, the gray levels of ′1′ and ′0′ are contrastive to identify ′L′ and ′T′ in the image. Since each input to SM-AONN is a column vector (in the Y direction), the sum of normalized output power in the Y direction remains unity. As Fig. 3e shows, when the number of iterations exceeds only 15 epochs, the output of each port is near the expectation of 50% for two input ports and 100% for one input port. For these two experiments, the error analysis can refer to Methods. The successful training of two different tasks has demonstrated the general configuration task and the powerful learning ability of the SM-AONN. Thanks to the electrical monitoring signals, the training results have extremely high expected accuracy. Large-scale training tasks are fully automated with the help of electronics.\n\nHere, we use the digital computing as an example. Actually, the demonstrated photonic neuromorphic computing architecture is analog in nature and can be used for analog computing as well. This is because the MZI weighting network can directly handle the multiplication of complex-valued data, and the optical nonlinear response is also a continuous-valued input-output function. The difference between analog computing and digital computing is only the form of the input and output data sets. If the current digital input of ′0′ or ′1′ is replaced with a continuous-time optical intensity, analog computing can be performed.\n\nGoing forward, we introduce the obtained nonlinear optical responses as nonlinear activation functions in a three-layer deep feedforward neural network for the MNIST handwriting recognition, to further test large-scale data processing capability. The MNIST data set consists of 60,000 784-pixel images, therein 50,000 and 10,000 images are used for training and testing, respectively. These images contain handwritten digits from 0 to 9, as shown in Fig. 5a. The deep feedforward neural network consists of two hidden layers containing 200 neurons and an output layer containing 10 neurons. The input is a 784 × 1 vector, and the output is a 10 × 1 vector. The output layer adopts the Softmax activation function to convert the output results into probability. The proposed Ge-Si AONU is extracted as the activation function for the hidden layers. The activation function with normalized input and output is shown in Fig. 5b. The simulation utilizes the conjugate gradient backpropagation algorithm to iterate 100 times, and the loss function is cross-entropy. An accuracy of 97.3% and corresponding confusion matrix are shown in Fig. 5c and d, respectively. Each column of the matrix represents the instances in a predicted label, while each row represents the instances in a true label. The diagonal elements represent the probabilities that are correctly predicted. These results show that our nonlinear unit has high performance on representative machine learning tasks.\n\n## Discussion\n\nOne of the key advantages of the AONU is the ability to non-intrusively observe the optical energy. The experimental and emulational comparisons on the performance and stability are provided in Supplementary Note 9. Indeed, the results indicate a more stable and better performance for the proposed “non-intrusive” scheme. Compared to the intrusive monitoring with different degrees of perturbation, the non-intrusive scheme shows a smoother activation function and improved accuracies of 1.7–4% in handwritten recognition. Furthermore, the iterations to reach the maximum accuracy is much less, resulting in a decreased training cost. In addition, when the neural network is trained completely, the accuracy fluctuation is much smaller, which means a better stability on inferring tasks. On the other hand, photonic neural networks are large-scale and dynamically tunable circuits, and their control becomes enormously difficult due to manufacturing variations and thermal crosstalk44. Fortunately, the non-intrusive monitoring provides a calibration capability by compensating the fabrication errors and environmental fluctuations. In the training process, the monitoring enables non-intrusive intensity detection of each node, to implement in situ gradient measurements and forward or backpropagation algorithms29. This method can enable highly efficient gradient calculation in training. When an already trained neural network is working, the non-intrusive monitoring feature can obtain information about environmental fluctuations without changing the operating point of the network27. On this basis, the network can be dynamically tuned and calibrated without introducing other disturbances.\n\nAnother main advantage of the photonic neural network is potentially possessing higher speed and energy efficiency compared to electronics10,45. Typically, the computing speed is defined as the number of operations per second (FLOPS). For our demonstrated system, the FLOPS is calculated to be 1.92 × 1012 operations per second with a 20 GHz detection bandwidth. In principle, such a computing speed is one order of magnitude faster than electronic neural networks which are usually restricted to a GHz clock rate46. The consumed energy is calculated to be ~0.27 pJ per operation in our system, better than an “ideal” electronic computer (1 pJ per operation, assuming no energy is used on data movement) and two orders of magnitude better than conventional graphics processing units (GPUs) (100 pJ per operation)47. Please see Supplementary Note 10 for the detailed calculation and comparison. On the other hand, in the photonics system, the energy required for the optical nonlinearity of the Si-Ge system is relatively higher than that of some other materials48, but it has the advantages of CMOS fabrication compatibility and compact structure that other material systems may not have.\n\nThe scalability of the photonic neural network is an important challenge. Typically, some form of nonlinearity is required to implement the thresholding effect of a neuron in the neural networks. However, optical nonlinear responses are comparatively power inefficient, and the neuron output is often weaker than its input14. Thus, previous works utilized optical amplifiers49,50, optical-electrical-optical conversion51 or all-optical carrier regeneration18 to alleviate this issue. These methods also bring additional optical and electrical power consumption. By contrast, an advantage of our scheme is that only the loss of the optical nonlinear part needs to be considered, while the loss from optical splitters and monitoring is avoided. This might be competitive as the neural network scales up. At present, we use off-chip EDFAs to pump the network. Recently, Liu, et al.52 achieved on-chip erbium-doped waveguide amplifiers with a gain up to 30 dB. This would be suitable to simultaneously address the challenges of multi-layer scaling and on-chip integration.\n\nAiming at solving the issues of large-scale Si-based integrated ANNs, we have demonstrated that the specifically designed nonlinear Ge-Si PD enables both all-optical activation and non-intrusive monitoring. The SM-AONN based on this technology achieves 97.3% accuracy on open machine learning tasks. The advantages of the Ge-Si PD-based SM-AONN include: (1) Material advantages. Ge is a kind of material with stability and CMOS compatibility. (2) All-optical operations. The photoelectric conversion only occurs during training. There is no need for the information exchange between optical and electrical domains once trained. (3) Non-intrusive monitoring. The network supports automatic training, node failures analysis and environmental fluctuations monitoring without disturbing the operation points. (4) Simplified architecture. The activation and monitoring units are merged in the same device with compact footprint. (5) Large scale. Multiple layers of SM-AONN can be constructed using optical fiber arrays to connect multiple chips. (6) High accuracy. A deep neural network utilizing this new activation function shows high performance. In addition, due to characteristics of the Si MZI network and Ge nonlinearity, this network may also draw interests in quantum networks53,54 or mid-infrared applications55. We believe that this work is promising for future large-scale optical intelligent neuromorphic systems.\n\n## Methods\n\n### Analysis coupled equations\n\nThe interaction process of intrinsic absorption and FCA can be described by the nonlinear NLSE equation\n\n$$\\frac{{{{{{\\rm{d}}}}}}I}{{{{{{\\rm{d}}}}}}z}=-\\alpha I-\\beta {I}^{2}-\\sigma NI$$\n(3)\n\nand the carrier rate equation\n\n$$\\frac{\\partial N}{\\partial t}=\\frac{\\alpha }{\\hslash \\omega }I+\\frac{\\beta }{2\\hslash \\omega }{I}^{2}-\\frac{N}{\\tau }$$\n(4)\n\nwhere I and N are optical intensity and carrier concentration, respectively, with α, β, σ and τ being intrinsic absorption coefficient, two-photon coefficient, absorption cross-section of FCA and carrier lifetime of the Ge. Here, β = 0. ħ and ω represent the reduced Planck constant and optical angular frequency, respectively. z is the light propagation direction and t is the time.\n\n### Device fabrication\n\nThe device is fabricated using a silicon-on-insulator wafer with 220 nm thick Si top layer and 2 µm buried oxide. The Si layer is etched into strip waveguides for the pattern of the MZIs and Si slab under Ge film. Then, the Si top layer is implanted using different doses of boron ions to form the P-type regions. A 500 nm-thick Ge film is grown on the P-type doped Si slab. On the top of Ge film, phosphorus ions are implanted with ~100 nm-depth to form the N-type region of a PIN junction. The titanium nitride (TiN) heater of 120 nm in thickness is deposited 2 μm above the Si waveguide for thermal tuning. Finally, metal electrodes are fabricated and connect to Si, Ge and TiN through via holes.\n\n### Error analysis\n\nThe training of the neural network relies on the monitoring photocurrent of the AONU, and then the weighting values are loaded on the thermally tuned MZI network in the form of voltages. The photodetector noise (σD) and the voltage fluctuation applied on MZIs (σΦ) are the dominant error sources. In the experiments, we used DACs with 10-bit precision and a three-layer 4 × 4 matrix with σΦ estimated to be 10−3, as well as a photodetector noise of σD = 1.8 × 10−3 under a mean photocurrent of ~1 mA. We carried out the following steps to numerically simulate the performance with the σD and σΦ. For the trained 4 × 4 unitary matrices U, we calculate a set {VMZI} that encodes the matrix. We assume phase-encoding errors δVMZI is a random variable sampled from a Gaussian distribution G(0, σΦ). We obtain a new set of perturbed phases {VMZI + δVMZI} and perturbed 4 × 4 unitary matrices U′. During forward propagation, every time a matrix multiplication is performed for a result v = U· u (u is input vector), we add a set of random photodetection errors δv as the perturbed output vector v′ =v + δv, where we assume each δv is a random variable sampled from a Gaussian distribution G(0, σD·|v | ). Then perturbed optical output is derived from v′ and the accuracy is calculated. Repeating 50 times, the final accuracy is estimated to be ~98%. We attribute other errors to the fabrication error and thermal crosstalk of the linear networks. The fabrication error can be compensated by pre-calibration steps, while the thermal crosstalk can be reduced by adding thermal isolation trenches." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8697398,"math_prob":0.90863585,"size":39395,"snap":"2023-14-2023-23","text_gpt3_token_len":8813,"char_repetition_ratio":0.14381458,"word_repetition_ratio":0.016984401,"special_character_ratio":0.2192664,"punctuation_ratio":0.16123264,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95185417,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-30T01:44:45Z\",\"WARC-Record-ID\":\"<urn:uuid:e4d95843-dbc4-4cce-83f8-30ca954ecd45>\",\"Content-Length\":\"380626\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ff7a2ef0-f641-46d4-8917-1572ae3c570e>\",\"WARC-Concurrent-To\":\"<urn:uuid:1acfeae7-a66f-46c4-a08f-5ce3375e6717>\",\"WARC-IP-Address\":\"146.75.36.95\",\"WARC-Target-URI\":\"https://www.nature.com/articles/s41467-022-33877-7?error=cookies_not_supported&code=1c25b0d5-fa96-4202-b002-31dd385bd5ce\",\"WARC-Payload-Digest\":\"sha1:UPD7FQJ4EIIVF6RUXKDIXDLXJRQ4DAPC\",\"WARC-Block-Digest\":\"sha1:6AFWCBP62HCQDG24ZRM6GAINHRGXIMIQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296949093.14_warc_CC-MAIN-20230330004340-20230330034340-00248.warc.gz\"}"}
https://zory.ink/posts/f69a.html
[ "HAOI2012\nbzoj2749\nluogu2350\n\n2h\n\n## Analysis\n\n$f(prime)=f(prime-1)$\n$f(prime^k)=f(prime)*k$\n$f(num)=\\sum f(prime^k)$" ]
[ null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.9657467,"math_prob":0.99976486,"size":484,"snap":"2019-35-2019-39","text_gpt3_token_len":442,"char_repetition_ratio":0.08958333,"word_repetition_ratio":0.0,"special_character_ratio":0.22107439,"punctuation_ratio":0.0,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99992895,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-19T21:54:23Z\",\"WARC-Record-ID\":\"<urn:uuid:94fad284-e71b-4a36-8adb-477bb895c386>\",\"Content-Length\":\"58585\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6d9df43a-6048-4891-9e1f-ba17f834ae3b>\",\"WARC-Concurrent-To\":\"<urn:uuid:58dba396-82af-4b39-8909-c6b9afc3aba0>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://zory.ink/posts/f69a.html\",\"WARC-Payload-Digest\":\"sha1:FMGX6VSGT2JKG2DBCCS4VKRACHXVOO2D\",\"WARC-Block-Digest\":\"sha1:JUXITKQBY5HKOVLZW4L43S44HRD2EHU6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027314959.58_warc_CC-MAIN-20190819201207-20190819223207-00026.warc.gz\"}"}
https://ch.mathworks.com/help/matlab/matlab_prog/configure-run-button.html
[ "## Configure the Run Button for Functions\n\nFunctions are program files that accept inputs and return outputs. To run functions that require input argument values or any other additional setup from the Editor, configure the", null, "button.\n\nTo configure the button in the Editor, click", null, "and add one or more run commands.\n\nFor example:\n\n1. Create the function `myfunction.m` that performs a calculation using the inputs `x` and `y` and stores the results in `z`.\n\n```function z = myfunction(x,y) z = x.^2 + y;```\n2. Go to the Editor tab and click", null, ". MATLAB® displays the list of commands available for running the function.", null, "3. Click the last item in the list and replace the text type code to run with a call to the function including the required input arguments. For example, enter the text ```result = myfunction(1:10,5)``` to run `myfunction` with the input arguments `1:10` and `5`, and store the results in the variable `result`. MATLAB replaces the default command with the newly added command.", null, "To run multiple commands at once, enter the commands on the same line. For example, enter the text ```a = 1:10; b = 5; result = myfunction(a,b)``` to create the variables `a` and `b` and then call `myfunction` with `a` and `b` as the input arguments.\n\nNote\n\nIf you define a run command that creates a variable with the same name as a variable in the base workspace, the run command variable overwrites the base workspace variable when you run that run command.\n\n4. Click the", null, "button. MATLAB runs the function using the first run command in the list. For example, click", null, "to run `myfunction` using the command `result = myfunction(1:10,5)`. MATLAB displays the result in the Command Window.\n\n```result = 6 9 14 21 30 41 54 69 86 ```\n\nTo run the function using a different run command from the list, click", null, "and select the desired command. When you select a run command from the list, it becomes the default for the button.\n\nTo edit or delete an existing run command, click", null, ", right-click the command, and then select Edit or Delete.\n\nNote\n\nRunning live functions in the Live Editor using the", null, "button is only supported in MATLAB Online™. When you run a live function using the", null, "button, the output displays in the Command Window. To run a live function in an installed version of MATLAB, call the function from the Command Window or from a script or live script." ]
[ null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_ts_1686cc2a358fb970591b908ec30132e1fa.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/drop_down_arrow92a9929d0eec5b8b282a741294cf715d.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/drop_down_arrow92a9929d0eec5b8b282a741294cf715d.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_command.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_command_input.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_ts_1686cc2a358fb970591b908ec30132e1fa.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_ts_1686cc2a358fb970591b908ec30132e1fa.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/drop_down_arrow92a9929d0eec5b8b282a741294cf715d.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/drop_down_arrow92a9929d0eec5b8b282a741294cf715d.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_ts_1686cc2a358fb970591b908ec30132e1fa.png", null, "https://ch.mathworks.com/help/matlab/matlab_prog/run_ts_1686cc2a358fb970591b908ec30132e1fa.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.66599613,"math_prob":0.7012119,"size":2289,"snap":"2022-27-2022-33","text_gpt3_token_len":520,"char_repetition_ratio":0.18424508,"word_repetition_ratio":0.01010101,"special_character_ratio":0.22018349,"punctuation_ratio":0.111597374,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9618874,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,10,null,10,null,10,null,2,null,2,null,10,null,10,null,10,null,10,null,10,null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-10T22:56:27Z\",\"WARC-Record-ID\":\"<urn:uuid:13144201-15e7-43ca-a4d2-7b5613603106>\",\"Content-Length\":\"75132\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bda82868-3ca8-48af-a618-2d7ea5fe88ff>\",\"WARC-Concurrent-To\":\"<urn:uuid:f916f998-ae72-4c32-983e-e1d9ef114f6f>\",\"WARC-IP-Address\":\"23.218.145.211\",\"WARC-Target-URI\":\"https://ch.mathworks.com/help/matlab/matlab_prog/configure-run-button.html\",\"WARC-Payload-Digest\":\"sha1:IGXMVMDPV5AYUUSXRGSIU7DIWFJFTN23\",\"WARC-Block-Digest\":\"sha1:UGNJM33BBFV6EE5FLZJYGZEEDT26BU2Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571222.74_warc_CC-MAIN-20220810222056-20220811012056-00268.warc.gz\"}"}
http://prek-8.com/2ndgrade/fractionWorksheets_index4.php
[ "", null, "@import url(http://www.google.com/cse/api/branding.css);", null, "Custom Search ||  Holiday   ||  Arts and Crafts   ||  Coloring   ||  Lesson Plans   ||  Printables   ||  Word Puzzles   ||  Writing   ||  Games\n\n# Fraction Problems Math Worksheets\n\nCustom Search\n\nFree printable fraction math worksheets\nSolve fraction math problems. great resources for elementary school teachers\n\nFree printable fraction math worksheets\nFraction word problems. extra math practice with essential math skills\n\nFree printable fraction math worksheets\nSolve fraction math problems. Fraction operations worksheets for advanced math skill.\n\nCompare fractions free math worksheet\nFree printable fractions math worksheets for kids to use < , >, or = to compare fractions.\n\n2nd grade fractions word problems worksheet\nSolve fractions word problems math worksheets for primary grade students. mathematical problem solving skills", null, "Fraction word problems worksheet\nFree printable fraction word problems worksheets for 2nd grade teachers.\n\nFraction math problems worksheet\nSolve fractions math problems worksheets for 2nd grade students. 2 step problems\n\nParts of a group fraction worksheet\nFree printable fractions worksheets for 2nd grade teachers to print out as math homework or class room exercises.\n\nFree fractions problems worksheet\nStudents solve fractions. Show fractions, calculate fractions of a part of the group.\n\nKids solve fraction word problems. Problem solving skills.\n\nFree printable fractions worksheets for school math teachers to teach kids fractions.\n\nFree printable fraction math worksheets\nSolve fraction math problems. Picture worksheets with dragons, animals, fruits, sea animals, vegetables.\n\nProblem solving math worksheets\nSolve fraction math problems. free printable from your own computers.\n\nCustom Search\n\n## Free printable 2nd grade worksheets\n\nCustom Search\n\nFree printable fractions worksheets and telling fractions mathematics activities for 2nd grade students learn and practice different ways to say fractions, read start fractions and stop fractions and calculate fractions, Free printable second grade fractions math worksheet to read the clock, analog and digital clocks grade 2 free fractions worksheets, Word problems fractions worksheets, Days of the week, fractions word problems, Quarter-hour fractions, Tell fractions to minutes, learn fractions relationships, to compare fractions units, and read calendar 2nd grade free math worksheets.\n\nFree online math worksheets generator tool for elementary school math teachers and parents to generate your own math worksheets and print out print out for free from your school office or home office. Easy to use with kids favorite pictures as extra math homework or in class math exercise.\n\nComparing math worksheets\n\nDivision math worksheets    2    3    4    5\n\nDaily math review worksheets      2      3      4\n\nFractions math worksheets    2    3    4\n\nGeometry worksheets    2    3    4\n\nMeasurement worksheets    2    3\n\nMoney math worksheets    2    3    4    5    6    7\n\nMultiplication worksheets and multiplication games    2    3    4\n\nNumbers Worksheets    2    3    4\n\nPatterns and sequences    2\n\nPlace value online worksheets tool\n\nSubtracting 2 digits numbers worksheets\n\nSubtracting 3 digits numbers worksheets\n\nTime worksheets for 2nd grade    2    3    4\n\nCompound words worksheets\n\nContractions English worksheets\n\nDaily language review worksheets      2      3\n\nDolch sight words flashcards and games    2      3\n\nOpposite words games and worksheets    2      3\n\nPlural nouns English grammar worksheets 1    2\n\nPrefixes and suffixes English worksheets    2" ]
[ null, "http://prek-8.com/images/logo.jpg", null, "http://www.google.com/images/poweredby_transparent/poweredby_FFFFFF.gif", null, "http://prek-8.com/2ndgrade/images/fractionWordproblems.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.79279274,"math_prob":0.8449264,"size":1582,"snap":"2019-26-2019-30","text_gpt3_token_len":277,"char_repetition_ratio":0.30228138,"word_repetition_ratio":0.11059908,"special_character_ratio":0.16182049,"punctuation_ratio":0.104166664,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9977862,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-17T00:47:48Z\",\"WARC-Record-ID\":\"<urn:uuid:6ff9c11c-25ff-4389-b2b4-02c707fb0bfa>\",\"Content-Length\":\"22719\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1447dfad-7d62-4579-b57a-e1cd93ca8c62>\",\"WARC-Concurrent-To\":\"<urn:uuid:08c4e151-f682-4155-91be-c87c20770830>\",\"WARC-IP-Address\":\"216.97.239.120\",\"WARC-Target-URI\":\"http://prek-8.com/2ndgrade/fractionWorksheets_index4.php\",\"WARC-Payload-Digest\":\"sha1:ZQI7WVWSQB4UKMC6WAWH6CKPIXIFLYWW\",\"WARC-Block-Digest\":\"sha1:RYFLLVNLE4XITBNQYXWC3RAHWN37AMLU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525004.24_warc_CC-MAIN-20190717001433-20190717023433-00556.warc.gz\"}"}
http://forums.wolfram.com/mathgroup/archive/2001/May/msg00380.html
[ "", null, "", null, "", null, "", null, "", null, "", null, "", null, "Re: Q: Extract Elements from a List?\n\n• To: mathgroup at smc.vnet.net\n• Subject: [mg28978] Re: [mg28968] Q: Extract Elements from a List?\n• From: Anesh Sooklal <anesh at fermi.udw.ac.za>\n• Date: Thu, 24 May 2001 04:06:55 -0400 (EDT)\n• References: <200105230554.BAA01361@smc.vnet.net>\n• Sender: owner-wri-mathgroup at wolfram.com\n\n```Dear Robert,\n\nHere is a quick solution\n\ntest = {a, b, c, d, e, f, g, h, i, j}\nh[a_, d_] := Table[Part[test, n], {n, a, Part[Dimensions[test], 1], d}]\n\nHere a function is designed to give you the list output you desire.\nHere a is the first element to be extracted and d is the step size through\nthe list thereafter.\n\nLet me know how this turns out!!\n\nThank you,\nAnesh\n\nRobert Schuerhuber wrote:\n\n> hi!\n>\n> probably a very easy question, but i couldn't find an answer in the\n> mathematica-book:\n>\n> i need to extract elements from a list, starting th element number x and\n> than taking every yth element, eg:\n>\n> with\n>\n> list={a,b,c,d,e,f,g,h,i,j}\n> start=3;\n> step=2:\n>\n> i'd like to get the list\n>\n> {c,e,g,i}.\n>\n> how can i do this in the easiest way?\n>\n> regards, robert\n\n```\n\n• Prev by Date: Re: Help fitting Exponential curves\n• Next by Date: RE: Q: Extract Elements from a List?\n• Previous by thread: Q: Extract Elements from a List?\n• Next by thread: RE: Q: Extract Elements from a List?" ]
[ null, "http://forums.wolfram.com/mathgroup/images/head_mathgroup.gif", null, "http://forums.wolfram.com/mathgroup/images/head_archive.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/2.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/0.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/0.gif", null, "http://forums.wolfram.com/mathgroup/images/numbers/1.gif", null, "http://forums.wolfram.com/mathgroup/images/search_archive.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7497682,"math_prob":0.53259325,"size":1233,"snap":"2019-51-2020-05","text_gpt3_token_len":391,"char_repetition_ratio":0.1261188,"word_repetition_ratio":0.046296295,"special_character_ratio":0.34063262,"punctuation_ratio":0.2598684,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98649526,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-09T19:13:04Z\",\"WARC-Record-ID\":\"<urn:uuid:6f0b2265-e35b-448c-b4a1-6493c04803b7>\",\"Content-Length\":\"45012\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5c525ecd-5129-4e2b-8b39-870b1770c56d>\",\"WARC-Concurrent-To\":\"<urn:uuid:b3cb45ed-fac2-4844-b1bb-de5c30080999>\",\"WARC-IP-Address\":\"140.177.205.73\",\"WARC-Target-URI\":\"http://forums.wolfram.com/mathgroup/archive/2001/May/msg00380.html\",\"WARC-Payload-Digest\":\"sha1:F4W5OFLT5ZE44BM7GWTAUFQCLEIJIOON\",\"WARC-Block-Digest\":\"sha1:3GC77VB5DT7ABZHSONG6K367HSTER53P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540521378.25_warc_CC-MAIN-20191209173528-20191209201528-00069.warc.gz\"}"}
https://mathoverflow.net/questions/243525/representation-of-a-group-and-its-center
[ "# representation of a group and its center\n\nLet $G$ be a finite group and let $Z(G)$ be its center. Let $C=\\mathrm{Rep}(G)$ be the category of finite dimensional representation of $G$. Let $D$ be the fusion subcategory of $C$ generated by $V \\otimes V^*$ for each (representative of isomorphism class of) simple object of $C$.\n\nI want to show that $D=\\mathrm{Rep}(G/Z(G))$.\n\nIt seems that this problem is claimed in Tensor Categories By Pavel Etingof, Shlomo Gelaki, Dmitri Nikshych, Victor Ostrik without a complete proof.\n\nI appreciate any help.\n\n• This depends on the field of coefficients. For example, it is false for $G=\\mathbb Z/3$ over $\\mathbb Q$. – Ben Wieland Jul 2 '16 at 17:02\n• @BenWieland How about when the base field is algebraically closed and characteristic zero? – Snow Jul 2 '16 at 18:01\n• This even works for compact groups using Doplicher Roberts duality. – Marcel Bischoff Jul 2 '16 at 23:24\n\nI'll work over $\\mathbb{C}$ below for simplicity, although it can be replaced by an algebraically closed field of characteristic $0$.\nLemma: The fusion subcategory of $\\text{Rep}(G)$ generated by some reps $V_i$ is $\\text{Rep}(G/N)$ where $N$ is the intersection of the kernels of $G$ acting on each $V_i$.\nThis follows in turn from the standard fact that $\\text{Rep}(H)$ is generated as a fusion category (in the above sense) by any faithful representation of $H$; see, for example, this MO question. From here it suffices to show that the intersection of the kernels of $G$ acting on $V \\otimes V^{\\ast}$ for each irrep $V$ is $Z(G)$.\nRecall that the regular representation $\\mathbb{C}[G]$ decomposes, as a representation of $G \\times G$ (acting on the left and right), as $\\bigoplus_V V \\boxtimes V^{\\ast}$ where $\\boxtimes$ denotes the external tensor product. If we restrict to the diagonal copy of $G$ in $G \\times G$, we get that the permutation representation coming from $G$ acting on itself by conjugation decomposes as $\\bigoplus_V V \\otimes V^{\\ast}$ where $\\otimes$ is now the ordinary tensor product of representations. The kernel of this permutation representation is clearly $Z(G)$, as desired." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9068248,"math_prob":0.9988742,"size":1366,"snap":"2020-34-2020-40","text_gpt3_token_len":349,"char_repetition_ratio":0.12628488,"word_repetition_ratio":0.04784689,"special_character_ratio":0.2510981,"punctuation_ratio":0.08064516,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999163,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-01T04:58:18Z\",\"WARC-Record-ID\":\"<urn:uuid:67acf317-db07-4604-a537-b18089b6dcd3>\",\"Content-Length\":\"130056\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a07f99ad-6b59-4933-b65c-1ea6bf388d93>\",\"WARC-Concurrent-To\":\"<urn:uuid:58dc3222-8a4c-4d19-ad05-43fada54e61b>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://mathoverflow.net/questions/243525/representation-of-a-group-and-its-center\",\"WARC-Payload-Digest\":\"sha1:I66D66ILWIDCBJV3S3MQ3GUF6P6BQ7YJ\",\"WARC-Block-Digest\":\"sha1:KYHFWPR5SDGV7ABVZ7TDPIOERC26DL5W\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600402130615.94_warc_CC-MAIN-20201001030529-20201001060529-00640.warc.gz\"}"}
https://it.mathworks.com/help/symbolic/linear-optimization.html?s_tid=CRUX_lftnav
[ "Documentation\n\n# Linear Optimization\n\nAlgorithms for linear and integer programming\n\n### Note\n\nMuPAD® notebooks will be removed in a future release. Use MATLAB® live scripts instead.\n\nTo convert a MuPAD notebook file to a MATLAB live script file, see `convertMuPADNotebook`. MATLAB live scripts support most MuPAD functionality, although there are some differences. For more information, see Convert MuPAD Notebooks to MATLAB Live Scripts.\n\n `linopt::corners` Return the feasible corners of a linear program `linopt::maximize` Maximize a linear or mixed-integer program `linopt::minimize` Minimize a linear or mixed-integer program `linopt::plot_data` Plot the feasible region of a linear program `linopt::Transparent` Return the ordinary simplex tableau of a linear program `linopt::Transparent::autostep` Perform the next simplex step `linopt::Transparent::clean_basis` Delete all slack variables of the first phase from the basis `linopt::Transparent::convert` Transform the given tableau into a structure printable on screen `linopt::Transparent::dual_prices` Get the dual solution belonging to the given tableau `linopt::Transparent::phaseI_tableau` Start an ordinary phase one of a 2-phase simplex algorithm `linopt::Transparent::phaseII_tableau` Start phase two of a 2-phase simplex algorithm `linopt::Transparent::result` Get the basic feasible solution belonging to the given simplex tableau `linopt::Transparent::simplex` Finish the current phase of the 2-phase simplex algorithm `linopt::Transparent::suggest` Suggest the next step in the simplex algorithm `linopt::Transparent::userstep` Perform a user defined simplex step\n\n## Topics\n\nLinear Optimization\n\nUse only in the MuPAD Notebook Interface.\n\n#### Mathematical Modeling with Symbolic Math Toolbox\n\nGet examples and videos" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5517621,"math_prob":0.6114702,"size":1563,"snap":"2019-35-2019-39","text_gpt3_token_len":345,"char_repetition_ratio":0.20654266,"word_repetition_ratio":0.030927835,"special_character_ratio":0.18298145,"punctuation_ratio":0.2062937,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9829845,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-15T07:44:08Z\",\"WARC-Record-ID\":\"<urn:uuid:77194d1e-dd79-4f05-8549-301c3f204d9e>\",\"Content-Length\":\"66078\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8fd27be1-416e-4d3b-804a-e25803220ac0>\",\"WARC-Concurrent-To\":\"<urn:uuid:620e28fa-b99c-42fb-947a-29af6298b85a>\",\"WARC-IP-Address\":\"104.110.193.39\",\"WARC-Target-URI\":\"https://it.mathworks.com/help/symbolic/linear-optimization.html?s_tid=CRUX_lftnav\",\"WARC-Payload-Digest\":\"sha1:PYHJ7YOAJOL6X73I7YCV52SKIFLQAQER\",\"WARC-Block-Digest\":\"sha1:3BGVQESJHPKFXFCQY5MLXCZ7GAAM76EZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514570830.42_warc_CC-MAIN-20190915072355-20190915094355-00181.warc.gz\"}"}
http://www.airsupplylab.com/electrical-measurements-and-circuits/135-ee2049-lab-09-divider-rules-for-voltage-and-current.html
[ "# Lab 09: Divider Rules for Voltage and Current\n\n## Objectives\n\n• Practice measuring voltages and current in series and parallel circuits.\n• Verify the divider rules for voltage and current.\n\n## Background\n\n#### Voltage Divider\n\n• In parallel circuits, the voltage across each of the component is always same.\n• in series circuits, the voltage drop across a resistor is directly proportional to the resistance of the resistor.", null, "Figure 1: A Parallel Circuit with n Resistors\n\nThe Voltage Divider Rule (VDR) states that the voltage across an element or across a series combination of elements in a series circuit is equal to the resistance of the element or series combination of elements divided by the total resistance of the series circuit and multiplied by the total impressed voltage:", null, "", null, "#### Current Divider\n\n• In series circuits, the current always remains same through all components.\n• In parallel circuits, the current doesn't remains same, instead it divides.", null, "Figure 2: A Parallel Circuit with n Resistors\n\nThe Current Divider Rule (CDR) states that the current through one of the parallel branches is equal to the resistance of the other branch divided by the sum of the resistances of the two parallel branches and multiplied by the total current entering the parallel branches. That is:", null, "", null, "## Questions\n\n1. Can you apply current division to obtain I1 and I2 for the circuit shown in the figure below? Explain briefly.", null, "" ]
[ null, "http://www.airsupplylab.com/images/lab/electricalMeasurementsCircuits/Lab09/00_VoltageDidiver1.png", null, "http://chart.apis.google.com/chart", null, "http://chart.apis.google.com/chart", null, "http://www.airsupplylab.com/images/lab/electricalMeasurementsCircuits/Lab09/00_CurrentDidiver1.png", null, "http://chart.apis.google.com/chart", null, "http://chart.apis.google.com/chart", null, "http://www.airsupplylab.com/images/lab/electricalMeasurementsCircuits/Lab09/Q1_Circuit.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8788086,"math_prob":0.93689543,"size":3814,"snap":"2019-13-2019-22","text_gpt3_token_len":828,"char_repetition_ratio":0.15170604,"word_repetition_ratio":0.1630094,"special_character_ratio":0.2139486,"punctuation_ratio":0.10662824,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9981964,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,3,null,null,null,null,null,3,null,null,null,null,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-24T03:38:08Z\",\"WARC-Record-ID\":\"<urn:uuid:1e0440b6-9d26-48ce-ba78-d10c880b818a>\",\"Content-Length\":\"35812\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c182436f-8ccb-4306-b091-69c51379f30a>\",\"WARC-Concurrent-To\":\"<urn:uuid:fd42692d-6273-411b-9e32-804ae7361fd3>\",\"WARC-IP-Address\":\"23.92.27.183\",\"WARC-Target-URI\":\"http://www.airsupplylab.com/electrical-measurements-and-circuits/135-ee2049-lab-09-divider-rules-for-voltage-and-current.html\",\"WARC-Payload-Digest\":\"sha1:KALKUNPC4HUCGUC2MB43YWRC5KVXE6B3\",\"WARC-Block-Digest\":\"sha1:G5FPVPYLEQB2PEEO25ISPQQBJIPDDCQD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912203168.70_warc_CC-MAIN-20190324022143-20190324044143-00117.warc.gz\"}"}
https://brainmass.com/math/functional-analysis/mobius-transformations-example-problem-123078
[ "Explore BrainMass\n\n# Mobius Transformations\n\nNot what you're looking for? Search our solutions OR ask your own Custom question.\n\nThis content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!\n\nSuppose T is a Mobius transformation such that the image of the real axis under T is the real axis. Prove that T may be written in the form T(z) = (az+b)/(cz+d) with a, b, c, and d real.\n\n© BrainMass Inc. brainmass.com March 4, 2021, 7:47 pm ad1c9bdddf\nhttps://brainmass.com/math/functional-analysis/mobius-transformations-example-problem-123078\n\n#### Solution Preview\n\nProof:\nSince T is a Mobius transformation, we can assume T(z)=(az+b)/(cz+d). Now we want to show that a,b,c,d can be written as all reals.\nFirst, T(0)=b/d=r is a real, then b=rd, ...\n\n#### Solution Summary\n\nA Mobius transformation is investigated. The solution is detailed and well presented.\n\n\\$2.49" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8690531,"math_prob":0.93344516,"size":867,"snap":"2021-21-2021-25","text_gpt3_token_len":233,"char_repetition_ratio":0.13325608,"word_repetition_ratio":0.0,"special_character_ratio":0.25720876,"punctuation_ratio":0.17277487,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97687405,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-20T21:27:38Z\",\"WARC-Record-ID\":\"<urn:uuid:75ca495f-2451-4bdd-803f-0c3f6c0bd9ac>\",\"Content-Length\":\"330554\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a1d18955-c2ce-4981-983d-5587b5c49d78>\",\"WARC-Concurrent-To\":\"<urn:uuid:4e590bfb-14c6-47f0-8df3-c65547da246d>\",\"WARC-IP-Address\":\"104.26.4.245\",\"WARC-Target-URI\":\"https://brainmass.com/math/functional-analysis/mobius-transformations-example-problem-123078\",\"WARC-Payload-Digest\":\"sha1:53PTJ37I7KLEENP6HZZJ5FZTVGA74NVP\",\"WARC-Block-Digest\":\"sha1:MI2J3GL5VUVLH5MGDIB55CDTDHZM4Y7N\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488257796.77_warc_CC-MAIN-20210620205203-20210620235203-00299.warc.gz\"}"}
https://brainmass.com/math/functional-analysis/polar-equations-conic-section-116335
[ "Explore BrainMass\n\n# Polar Equations: Conic Section\n\nThis content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!\n\nFind an equation in x and y for the conic section with polar equation r=1/1+cos\n\nhttps://brainmass.com/math/functional-analysis/polar-equations-conic-section-116335\n\n#### Solution Preview\n\nHello and thank you for posting your posting to BrainMass.\n\nWe have the polar identities:\n\nx = r cos(q)\ny = r sin ...\n\n#### Solution Summary\n\nA polar equation is written in x,y form. The solution is detailed and well presented. The response received a rating of \"5/5\" from the student who originally posted the question.\n\n\\$2.19" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89768547,"math_prob":0.9292483,"size":701,"snap":"2020-24-2020-29","text_gpt3_token_len":180,"char_repetition_ratio":0.1348637,"word_repetition_ratio":0.0,"special_character_ratio":0.24393724,"punctuation_ratio":0.14893617,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98480076,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-05T01:39:44Z\",\"WARC-Record-ID\":\"<urn:uuid:db2d2a05-4ce6-4eb6-9816-9c1f8abd4628>\",\"Content-Length\":\"37489\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1a99e5e8-28ef-40b4-8770-2eab4bcc2002>\",\"WARC-Concurrent-To\":\"<urn:uuid:f49ca151-e8eb-43d1-a5a9-067f1d131405>\",\"WARC-IP-Address\":\"65.39.198.123\",\"WARC-Target-URI\":\"https://brainmass.com/math/functional-analysis/polar-equations-conic-section-116335\",\"WARC-Payload-Digest\":\"sha1:M3GHTV7HR5YZ6OPYFJSNEFFLGIOO3IMF\",\"WARC-Block-Digest\":\"sha1:YTF7FJD5RHQCLVP6VBQ3CN26QIWK2EFI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655886802.13_warc_CC-MAIN-20200704232817-20200705022817-00435.warc.gz\"}"}
http://bbs.dqzjos.com.cn/TmmDA/wuiope.htm
[ "702除以6等于多少\n\n## 计算726÷6=702÷9=\n\n3.除以4没有余数,除以7没有余数. 4. 竖式计算. ①57*28= ②36*43= ③98*64= ④824÷8= ⑤906÷6= ... 726÷6=702÷9=\n\n## 三年级下数学单元试卷 - 道客巴巴\n\n702÷6= 39*47 53*29 78*69 三、估算我第一 239÷3≈ 452÷9≈ 318÷8≈ 97÷5≈ 202÷5≈ 118÷... ( ) 5、0 除以任何不是 0 的数都得 0. ( ) 潍坊锦绣学校 2011—2012\n\n## 青岛版小学三年级数学上册第一次月考试题 - 道客巴巴\n\n(10 分) 816÷8= ※ 702÷6= 652÷4= ※ 645÷5= 4、 脱式计算. (9 分) 124-735÷7 39*8÷6 376÷(123-119) 二、 填一填, 我最棒. (13 分) 1、 0 乘任何数都得( )\n\n## 2019三年级下数学期中试题综合考练611415人教新课标语文_百度文库\n\n702÷3= 528÷4= 450÷6= 六、解决问题 24. 25. 26.学校组织三年级 68 名同学和 3 位老师去... 除以任何数不等于 0 的数,商都是 0. 【解答】解:解:因为:商*除数=被除数, 即:0*...\n\n## 用竖式计算.①72*5=②107*8=③702÷6=④702÷6=_作业帮\n\n①72*5=360②107*8=856③702÷6=117④702÷6=117\n\n## 722除以6等于多少\n\n+(6+6)/6=6*5*4*3*2*1+2=720+2=722 722÷4等于(180); 余数是(2); 722÷4 =1802 答案:约等... 解题:295除以6等于49.166,根据四舍五入的规则,一个数精确到个位看十分位上的数,\n\n## 三年级数学第一单元测试题11759 - 道客巴巴\n\n702÷6= 652÷4= 880÷7= 645÷5= 三、 估算我第一 239÷3≈ 452÷9≈ 318÷8≈ 97÷5≈ 202÷5≈ ... 除以任何不是 0 的数都得 0. ( ) 五、 列式计算我最强 1、 把 345 平均分成\n\n## 726除以6等于几写竖式.除以竖式数学理工学科学习\n\n702除以6等于,竖式如下:拓展资料:竖式,指的是每一个过渡数都是由上一个过渡数变化而后,上一个过渡数的个位数乘以2,如果需要进位,则往前面进1,然后个位升十位,以此类推,而个位上补...\n\n## 青岛版三年级下册第一单元练习题 - 道客巴巴\n\n702÷6=702÷6= 652÷4= 880÷7= 645÷5=652÷4= •二、 估算我第一•239÷3≈ 452÷9≈ 318... 一个三位数除以一位数, 商一定是三位数.()• 4、 在有余数的除法中, 用商*除数=被除..." ]
[ null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.8065511,"math_prob":0.98227423,"size":1180,"snap":"2021-04-2021-17","text_gpt3_token_len":1035,"char_repetition_ratio":0.09013605,"word_repetition_ratio":0.125,"special_character_ratio":0.6830509,"punctuation_ratio":0.2457627,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.962147,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-20T07:52:51Z\",\"WARC-Record-ID\":\"<urn:uuid:277db951-d95b-437b-9b22-099c9edd5cf8>\",\"Content-Length\":\"63183\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ce2d22e9-9f43-4bf5-9811-8a470f431ba0>\",\"WARC-Concurrent-To\":\"<urn:uuid:073d38dc-edd5-45ed-8197-eabc8443579b>\",\"WARC-IP-Address\":\"137.175.80.45\",\"WARC-Target-URI\":\"http://bbs.dqzjos.com.cn/TmmDA/wuiope.htm\",\"WARC-Payload-Digest\":\"sha1:N7HE6Q6I2BK7AO5PAIGOURV6H4OO6WOK\",\"WARC-Block-Digest\":\"sha1:OPDR3STLOE23PIT6XIVIQYRVL3YUJC32\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703519923.26_warc_CC-MAIN-20210120054203-20210120084203-00320.warc.gz\"}"}
https://ay201b.wordpress.com/2011/03/04/williams-mckee/
[ "# Harvard Astronomy 201b\n\n## ARTICLE: The Galactic Distribution of OB Associations in Molecular Clouds\n\nIn Uncategorized on March 4, 2011 at 5:19 am\n\n### Read the Paper by J.P. Williams and C.F. McKee (1997)\n\nSummary by Vicente Rodriguez Gomez\n\n### Abstract\n\nMolecular clouds account for half of the mass of the interstellar medium interior to the solar circle and for all current star formation. Using cloud catalogs of two CO surveys of the first quadrant, we have fitted the mass distribution of molecular clouds to a truncated power law in a similar manner as the luminosity function of OB associations in the companion paper to this work. After extrapolating from the first quadrant to the entire inner Galaxy, we find that the mass of cataloged clouds amounts to only 40% of current estimates of the total Galactic molecular mass. Following Solomon & Rivolo, we have assumed that the remaining molecular gas is in cold clouds, and we normalize the distribution accordingly. The predicted total number of clouds is then shown to be consistent with that observed in the solar neighborhood where cloud catalogs should be more complete. Within the solar circle, the cumulative form of the distribution is", null, "c(>M)=105[(Mu/M)0.6-1], where", null, "c is the number of clouds, and Mu = 6 × 106 M", null, "is the upper mass limit. The large number of clouds near the upper cutoff to the distribution indicates an underlying physical limit to cloud formation or destruction processes. The slope of the distribution corresponds to d", null, "c/dM", null, "M−1.6, implying that although numerically most clouds are of low mass, most of the molecular gas is contained within the most massive clouds.\n\nThe distribution of cloud masses is then compared to the Galactic distribution of OB association luminosities to obtain statistical estimates of the number of massive stars expected in any given cloud. The likelihood of massive star formation in a cloud is determined, and it is found that the median cloud mass that contains at least one O star is ~105 M", null, ". The average star formation efficiency over the lifetime of an association is about 5% but varies by more than 2 orders of magnitude from cloud to cloud and is predicted to increase with cloud mass. O stars photoevaporate their surrounding molecular gas, and even with low rates of formation, they are the principal agents of cloud destruction. Using an improved estimate of the timescale for photoevaporation and our statistics on the expected numbers of stars per cloud, we find that 106 M", null, "giant molecular clouds (GMCs) are expected to survive for about 3 × 107 yr. Smaller clouds are disrupted, rather than photoionized, by photoevaporation. The porosity of H II regions in large GMCs is shown to be of order unity, which is consistent with self-regulation of massive star formation in GMCs. On average, 10% of the mass of a GMC is converted to stars by the time it is destroyed by photoevaporation.\n\n### Introduction\n\nThis article by Jonathan P. Williams and Christopher F. McKee (1997) was motivated by the question “can one determine, a priori, how many stars are likely to form in a molecular cloud?”  It turns out that this is possible for low-mass stars (McKee 1989), but not for more massive ones, such as O and B types, because of the enormous amounts of ionizing and dissociating radiation they produce. This radiation can quickly destroy their molecular environment and form large HII regions.\n\nIn view of the complex interaction between massive stars and their natal molecular clouds, Williams and McKee adopt an empirical approach to infer the number of massive stars that have already formed in molecular clouds. In particular, they focus on giant molecular clouds (GMCs), since they are large enough to generate OB associations.\n\nThe first half of the publication deals with estimating the mass spectrum of molecular clouds in the Galaxy, using existing data from CO surveys. In the second half, this mass spectrum is combined with a luminosity distribution of OB associations (McKee & Williams, 1997) to determine the distribution of OB associations within a given cloud. Finally, this result is used to calculate many other quantities and distributions of interest, such as (1) the number of cloud-association pairs of a given mass-luminosity in the Galaxy, (2) the probability that a cloud does not form any massive stars, (3) the most likely brightest association in a cloud, (4) the distribution of star formation efficiencies for a given association within a cloud, (5) the average star formation efficiency for all the associations within a cloud, (6) the filling factor of HII regions in GMCs, and (7) the rate at which the HII regions destroy the clouds.\n\n### Determination of the mass spectrum of molecular clouds\n\nWilliams and McKee used the data from four cloud catalogs: three of the first quadrant (DECT, SRBY and SYCSW), which contain a vast amount of GMCs, and one of the solar neighborhood (Dame et al. 1986), essentially for calibration purposes. There were four steps involved in the process:\n\n1. Cloud masses from the different catalogs, which are by no means absolute, were adjusted to a uniform set of parameters: (1) X, the conversion factor of CO to", null, "$H_2,$ given by", null, "$X=N_{H_2}/W_{CO},$ and (2)", null, "$\\alpha_{vir},$ a parameter in the formula for the virial mass,", null, "$M_{vir} = 5 R \\sigma^2/\\alpha_{vir}G.$ Clouds for which the distance was ambiguous were removed from the analysis.\n2. Clouds were binned by mass and the resulting distribution was modeled with a truncated power law. The upper limit was the largest GMC in the catalogue, of about", null, "$6 \\times 10^6 M_{\\odot}.$\n3. The fit was extrapolated to lower masses, which cannot be observed, and the distribution was integrated. The total cloud mass was found to be 2.5 times less than the total mass of molecular gas measured in the inner Galaxy (Bronfman et al. 1988). Therefore, the surveys do not represent the true cloud distribution and the model had to be modified in one of two ways: performing a uniform scaling of the distribution (model A), or adopting a steeper distribution (model B).\n4. A comparison with the number of clouds in the solar neighborhood favored model A over model B.", null, "Figure 1. Distribution of the number of clouds with respect to mass for the solar neighborhood (d < 1 kpc).\n\nThe resulting distribution of clouds in the Galaxy was found to be", null, "$\\frac{d\\mathcal{N}_c}{d\\ln M} = 63\\left(\\frac{6\\times 10^6 M_{\\odot}}{M}\\right)^{0.6},$\n\nfor", null, "$M \\le 6\\times 10^6 M_{\\odot}$ and galactocentric distances between 1.7 and 8.5 kpc.\n\n### Comparison with the distribution of OB association luminosities\n\nHaving determined the number of OB associations in McKee & Williams (1997), the next step was to obtain the distribution of associations of luminosity S in a given cloud of mass M. The first obvious constraint was that the overall number of associations of luminosity S summed over all clouds must equal the total number of associations of luminosity S in the Galaxy. But even with this constraint, the allocation of associations in clouds is not uniquely determined. To solve this, Williams & McKee introduced two additional assumptions:\n\n1. The luminosity of the brightest association in a cloud is less than some maximum value,", null, "$S \\le S_{max}(M).$\n2. The number of associations of each luminosity S in a cloud of mass M is half of that expected in a cloud of mass 2M.\n\nWith these conditions, Williams and McKee determined the average number of OB associations for clouds of a given mass, and then assumed Poisson statistics for the distribution of OB associations about the mean. Many interesting quantities can be determined from these results, such as the distribution for the brightest association per cloud, the total number of cloud-association pairs in the Galaxy, the probability that a cloud be devoid of O stars (figure 2), and the star formation efficiencies (SFE), i.e. what fraction of the cloud mass is transformed into stars (figure 3).", null, "", null, "Figure 4. Destruction timescale for cloud photoevaporation. The solid line includes the effect of overlapping associations, while the dotted line does not.\n\nUsing estimates of the destructive effect of an OB association on a cloud, Williams and McKee also estimated the timescale over which OB associations ionize and disrupt their molecular surroundings (figure 4). The results show that high-mass clouds, with", null, "$M \\begin{smallmatrix} > \\\\ \\sim \\end{smallmatrix} 3 \\times 10^5 M_{\\odot},$ are destroyed by large numbers of small associations over a timescale of 30-40 Myr, while low-mass clouds are disrupted by O stars, rather than photoionized.\n\nFinally, comparing the results on cloud photoevaporation with the previously obtained efficiencies shows something unexpected: the average SFE over the life of an association is 5%, while the average SFE over the life of a cloud is 10%. If this discrepancy is real and not an artifact of the model, it can be explained by assuming that only half of the GMCs are actively forming stars. This way the lifetime of a star-forming cloud becomes comparable to the observed lifetime of associations, about 20 Myr. Nevertheless, Williams and McKee confirm once again that star formation is a fairly inefficient process: there are clouds with a considerable amount of molecular material and hardly any OB associations." ]
[ null, "https://i1.wp.com/ej.iop.org/icons/Entities/calN.gif", null, "https://i1.wp.com/ej.iop.org/icons/Entities/calN.gif", null, "https://i2.wp.com/ej.iop.org/icons/Entities/sun.gif", null, "https://i1.wp.com/ej.iop.org/icons/Entities/calN.gif", null, "https://i1.wp.com/ej.iop.org/icons/Entities/vprop.gif", null, "https://i2.wp.com/ej.iop.org/icons/Entities/sun.gif", null, "https://i2.wp.com/ej.iop.org/icons/Entities/sun.gif", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://ay201b.files.wordpress.com/2011/03/solar_neighborhood.png", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://ay201b.files.wordpress.com/2011/03/efficiencies.png", null, "https://ay201b.files.wordpress.com/2011/03/cloud_lifetime.png", null, "https://s0.wp.com/latex.php", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9342305,"math_prob":0.9561013,"size":8540,"snap":"2021-31-2021-39","text_gpt3_token_len":1766,"char_repetition_ratio":0.17537488,"word_repetition_ratio":0.020523708,"special_character_ratio":0.20222482,"punctuation_ratio":0.08631714,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96253043,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,null,null,null,1,null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-17T15:21:11Z\",\"WARC-Record-ID\":\"<urn:uuid:c7608e96-4c6b-4a70-b2b7-1e72aa45ba70>\",\"Content-Length\":\"90886\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d33ee83a-4aa4-41bf-a2f6-0e2065ba743d>\",\"WARC-Concurrent-To\":\"<urn:uuid:09750886-1ce0-494c-8be1-92b44cf03fb1>\",\"WARC-IP-Address\":\"192.0.78.12\",\"WARC-Target-URI\":\"https://ay201b.wordpress.com/2011/03/04/williams-mckee/\",\"WARC-Payload-Digest\":\"sha1:DP735GEFKZ4B2QGWZIN6TPPYXQ7UETXY\",\"WARC-Block-Digest\":\"sha1:KCGQI6UQWLRAPZUSLOS7Q3WN2QTCT46H\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780055684.76_warc_CC-MAIN-20210917151054-20210917181054-00177.warc.gz\"}"}
https://www3.math.tu-berlin.de/geometrie/jtem/function/api/de/jtem/function/Domain.html
[ "de.jtem.function\n\n## Class Domain\n\n• ```public abstract class Domain\nextends Object```\nThis class provides interfaces to be implemented by classes modelling functions defined on various mathematically important standard spaces. The target space of these functions will be specified by subinterfaces. The domains selected here have been chosen according to the following criteria: The domains should include\n• The set of integers between 0 and n-1. This is the canonical choice of a finite index set and maps from such a domain to some space A are usually called \"n-tuples of elements in A\".\n• The set of non-negative integers. Maps from the non-negative integers to some space A are usually called \"sequences of Elements in A\".\n• The set of integers.\n• The closed interval [a,b] between two real numbers a and b. Maps from the such an interval into some space A can be called \"paths in A\".\n• The set of non-negative real numbers.\n• The real line.\n• The circle S (the only connected one-dimensional compact manifold). Functions on S are described by periodic functions on the real line.\n• The \"discrete circle\" (a cylic graph). Functions on the discrete circle are described by periodic sequences.\nFurthermore we provide some Cartesian products of two or three of the above spaces. In the case of the cartesian product of two finite sets of indices the maps from such a domain to a set A can be called \"matrices of elements in A\". In analogy, we adopt matrix terminology for the naming of methods by refering to the first argument of a function on a Cartesian product as the \"row\" argument and the second as the \"column\" argument. In the case of a threefold cartesian product the third argument is said to specify the \"layer\" which means we imagine a stack of matrices (two dimensional arrangements of elements of A) with several layers in a third dimension.\n\nThe actual choice of product spaces was guided by the following principles:\n\n• To allow for interpolation, replacing a factor corresponding to an integer argument by one corresponding to a real argument should always be possible.\n• If one of the factors has an interpretation of \"time\" (like in a dynamical system or evolution equation), then we demand it to be the first factor. Since the main motivation for us to include the non-negative integers and the non-negative reals is in fact to serve as the \"time\" of some irreversible dynamical system (like iterating a non-invertible function or solving a parabolic PDE), these two spaces only occur as the first factor.\n• Periodicity is natural only for spacelike variables, so periodic factors only occur at the end. \"Periodic\" will then mean \"periodic in the last variable\", \"doubly periodic\" will mean \"periodic in the last two variables\".\n• To keep the number of interfaces within reasonable bounds, mixing of integer and real factors is not supported in the case of three factors. Moreover, the last two factors must be of the same type.\n• ### Nested Class Summary\n\nNested Classes\nModifier and Type Class and Description\n`static interface ` `Domain.DoublyPeriodicOnIndexCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of a fine set of indices with the integer plane and which are periodic in the last two arguments.\n`static interface ` `Domain.DoublyPeriodicOnIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of integers with itself and which are periodic in the both variables.\n`static interface ` `Domain.DoublyPeriodicOnIntegersCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative integers with the integer plane and which are periodic in the last two arguments.\n`static interface ` `Domain.DoublyPeriodicOnIntervalCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of a closed interval with the real plane and which are periodic in the last two arguments.\n`static interface ` `Domain.DoublyPeriodicOnNonNegativeIntegersCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative integers with the integer plane and which are periodic in the last two arguments.\n`static interface ` `Domain.DoublyPeriodicOnNonNegativeRealsCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative real numbers with the real plane and which are periodic in the last two arguments.\n`static interface ` `Domain.DoublyPeriodicOnRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the real plane and which are periodic in both variables.\n`static interface ` `Domain.DoublyPeriodicOnRealsCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of three copies of the real line and which are periodic in the last two arguments.\n`static interface ` `Domain.OnIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the set of integers between zero and n-1 (elements of which are referered to as \"indices).\n`static interface ` `Domain.OnIndexCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of two finite sets of indices.\n`static interface ` `Domain.OnIndexCrossIndexCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of three fine sets of indices.\n`static interface ` `Domain.OnIndexCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a finite set of indices with the set of integers.\n`static interface ` `Domain.OnIndexCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of a fine set of indices with the integer plane.\n`static interface ` `Domain.OnIndexCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a finite set of indices with a closed interval on the real line.\n`static interface ` `Domain.OnIndexCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a finite set of indices with the real line.\n`static interface ` `Domain.OnIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have the integers as their domain of definition.\n`static interface ` `Domain.OnIntegersCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of integers with a finite set of indices.\n`static interface ` `Domain.OnIntegersCrossIndexCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative integers with two finite sets of indices.\n`static interface ` `Domain.OnIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of integers with itself.\n`static interface ` `Domain.OnIntegersCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative integers with the integer plane.\n`static interface ` `Domain.OnIntegersCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of integers with a closed interval on the real line.\n`static interface ` `Domain.OnIntegersCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of integers with the real line.\n`static interface ` `Domain.OnInterval`\nThis interface models mathematical objects (like maps into some other set or differential equations) that have a closed interval of real numbers as their domain of definition.\n`static interface ` `Domain.OnIntervalCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a closed interval with a finite sets of indices.\n`static interface ` `Domain.OnIntervalCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a closed interval with the set of integers.\n`static interface ` `Domain.OnIntervalCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a closed interval on the real line with another closed interval.\n`static interface ` `Domain.OnIntervalCrossIntervalCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of three closed intervals.\n`static interface ` `Domain.OnIntervalCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a closed interval with the real line.\n`static interface ` `Domain.OnIntervalCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of a closed interval with the real plane.\n`static interface ` `Domain.OnNonNegativeIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the set of non-negative integers.\n`static interface ` `Domain.OnNonNegativeIntegersCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with a finite set of indices.\n`static interface ` `Domain.OnNonNegativeIntegersCrossIndexCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative integers with two finite sets of indices.\n`static interface ` `Domain.OnNonNegativeIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with the set of integers.\n`static interface ` `Domain.OnNonNegativeIntegersCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative integers with the integer plane.\n`static interface ` `Domain.OnNonNegativeIntegersCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with a closed interval on the real line.\n`static interface ` `Domain.OnNonNegativeIntegersCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with the real line.\n`static interface ` `Domain.OnNonNegativeReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have the non-negative real numbers as their domain of definition.\n`static interface ` `Domain.OnNonNegativeRealsCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative real numbers with a finite set of indices.\n`static interface ` `Domain.OnNonNegativeRealsCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative real numbers with the set of integers.\n`static interface ` `Domain.OnNonNegativeRealsCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative real numbers with a closed interval on the real line.\n`static interface ` `Domain.OnNonNegativeRealsCrossIntervalCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative real numbers with two closed intervals.\n`static interface ` `Domain.OnNonNegativeRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative real numbers with the real line.\n`static interface ` `Domain.OnNonNegativeRealsCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative real numbers with the real plane.\n`static interface ` `Domain.OnReals`\nThis interface models mathematical objects (like maps into some other set or differential equations) that have the real line as their domain of definition.\n`static interface ` `Domain.OnRealsCrossIndex`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the real line with a finite set of indices.\n`static interface ` `Domain.OnRealsCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the real line with the set of integers.\n`static interface ` `Domain.OnRealsCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the real line with a closed interval.\n`static interface ` `Domain.OnRealsCrossIntervalCrossInterval`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of the non-negative real numbers with two closed intervals.\n`static interface ` `Domain.OnRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the real plane.\n`static interface ` `Domain.OnRealsCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of three copies of the real line.\n`static interface ` `Domain.PeriodicOnIndexCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a finite set of indices with the set of integers and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnIndexCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a finite set of indices with the real line and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have the integers as their domain of definition and which are periodic.\n`static interface ` `Domain.PeriodicOnIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of integers with itself and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnIntegersCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with the real line and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnIntervalCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a closed interval with the set of integers and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnIntervalCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of a closed interval with the real line and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnNonNegativeIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with the integers and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnNonNegativeIntegersCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative integers with the real line and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnNonNegativeRealsCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative real numbers with the integers which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnNonNegativeRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the set of non-negative real numbers with the real line and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnReals`\nThis interface models mathematical objects (like maps into some other set or differential equations) that have the real line as their domain of definition and which are periodic.\n`static interface ` `Domain.PeriodicOnRealsCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of the real line with the set of integers and which are periodic in the second variable.\n`static interface ` `Domain.PeriodicOnRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the real plane and which are periodic in the second variable.\n`static interface ` `Domain.TriplyPeriodicOnIntegersCrossIntegersCrossIntegers`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the cartesian product of three copies of the integers and which are periodic in all three variables.\n`static interface ` `Domain.TriplyPeriodicOnRealsCrossRealsCrossReals`\nThis interface models mathematical objects (like maps into some other set or difference equations) that have as their domain of definition the Cartesian product of three copies of the real line and which are periodic in the all three arguments.\n• ### Constructor Summary\n\nConstructors\nConstructor and Description\n`Domain()`\n\n• ### Methods inherited from class java.lang.Object\n\n`clone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait`\n• ### Constructor Detail\n\n• #### Domain\n\n`public Domain()`\n\njTEM" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8720736,"math_prob":0.9298199,"size":18607,"snap":"2021-21-2021-25","text_gpt3_token_len":3748,"char_repetition_ratio":0.14895447,"word_repetition_ratio":0.8141194,"special_character_ratio":0.16655022,"punctuation_ratio":0.04820587,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9956328,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-16T11:32:03Z\",\"WARC-Record-ID\":\"<urn:uuid:4b06ebb5-6bb0-460e-8ca1-e51f610cd732>\",\"Content-Length\":\"51093\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c53e1541-4c3f-4620-bfa0-8377bf006a3d>\",\"WARC-Concurrent-To\":\"<urn:uuid:fb1ab744-5895-43f0-a330-de318512b20a>\",\"WARC-IP-Address\":\"130.149.14.240\",\"WARC-Target-URI\":\"https://www3.math.tu-berlin.de/geometrie/jtem/function/api/de/jtem/function/Domain.html\",\"WARC-Payload-Digest\":\"sha1:5OSAYTA7HEZXNIXZIMCNHYUWRT5SI6AU\",\"WARC-Block-Digest\":\"sha1:DYTMCCPTZVFVE4JLXRC6Z4DEE6RXB3VM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487623596.16_warc_CC-MAIN-20210616093937-20210616123937-00402.warc.gz\"}"}
https://codecrawl.com/2014/07/10/php-returning-a-value-from-a-function/
[ "PHP: Returning a value from a function\n\nThis entry is part 33 of 54 in the series PHP Tutorial\n\nTo return value from functions, use the return keyword with a value to return.\n\n<?php\n\nfunction restaurant_check(\\$meal, \\$tax, \\$tip) {\n\\$tax_amount = \\$meal * (\\$tax / 100);\n\\$tip_amount = \\$meal * (\\$tip / 100);\n\\$total_amount = \\$meal + \\$tax_amount + \\$tip_amount;\n\nreturn \\$total_amount;\n}\n\n\\$total = restaurant_check(25,7,15);\n\necho \"Total spent is \\$total\";\n\nSeries Navigation<< PHP: Built-in functions\nPHP: Returning an array in a function >>" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.69863814,"math_prob":0.98166305,"size":344,"snap":"2019-43-2019-47","text_gpt3_token_len":98,"char_repetition_ratio":0.18235295,"word_repetition_ratio":0.0,"special_character_ratio":0.35465115,"punctuation_ratio":0.22807017,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.975699,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-14T02:14:33Z\",\"WARC-Record-ID\":\"<urn:uuid:75876caf-5658-4259-908b-b8c40b31c930>\",\"Content-Length\":\"57125\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d7235aee-7d40-4ebd-b03b-30d05e8b4b74>\",\"WARC-Concurrent-To\":\"<urn:uuid:5fcfb507-dd17-4d92-a498-15c3ed711d4b>\",\"WARC-IP-Address\":\"162.144.198.23\",\"WARC-Target-URI\":\"https://codecrawl.com/2014/07/10/php-returning-a-value-from-a-function/\",\"WARC-Payload-Digest\":\"sha1:6BYQGKN6NDTKX73AURK3OAHAPWC7PFLU\",\"WARC-Block-Digest\":\"sha1:WO4VLS7VIXGJRL45GLO2TIDVAJNSBYBH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986648481.7_warc_CC-MAIN-20191014003258-20191014030258-00500.warc.gz\"}"}
https://mocktime.com/uncategorized/iit-advance-physics-quiz/
[ "You are here\nHome > Uncategorized > IIT Advance Physics Quiz\n\nQ1.A thermocouple is made from two metals, Antimony and Bismuth. If one junction of the couple is kept hot and the other is kept cold, then, an electric current will\n(a) flow from Antimony to Bismuth at the hot junction\n(b) flow from Bismuth to Antimony at the cold junction\n(c) now flow through the thermocouple\n(d) flow from Antimony to Bismuth at the cold junction\n\nQ2. A thin glass (refractive index 1.5) lens has optical power of – 5 D in air. Its optical power in a liquid medium with refractive index 1.6 will be\n(a) – 1D\n(b) 1 D\n(c) – 25 D\n(d) 25 D\n\nQ3. A thin horizontal circular disc is rotating about a vertical axis passing through its centre. An insect is at rest at a point near the rim of the disc. The insect now moves along a diameter of the disc to reach its other end. During the journey of the insect, the angular speed of the disc.\n(a) continuously decreases\n(b) continuously increases\n(c) first increases and then decreases\n(d) remains unchanged\n\nQ4. A tuning fork of known frequency 256 Hz makes 5 beats per second with the vibrating string of a piano. The beat frequency decreases to 2 beats per second when the tension in the piano string is slightly increased. The frequency of the piano string before increasing the tension was\n(a) 256 + 2 Hz\n(b) 256 – 2 Hz\n(c) 256 – 5 Hz\n(d) 256 + 5 Hz\n\nQ5. A uniform chain of length 2 m is kept on a table such that a length of 60 cm hangs freely from the edge of the table. The total mass of the chain is 4 kg. What is the work done in pulling the entire chain on the table?\n(a) 12 J\n(b) 3.6 J\n(c) 7.2 J\n(d) 1200 J\n\nQ6. A wave y = α sin(ωt–kx) on a string meets with another wave producing a node at x =0. Then the equation of the unknown wave is\n(a) y = α sin(ωt + kx)\n(b) y = – α sin(ωt + kx) (c) y = α sin(ωt – kx) (d) y = -α sin(ωt – kx)\n\nQ7. A wire elongates by l mm when a load W is hanged from it. If the wire goes over a pulley and two weights W each are hung at the two ends, the elongation of the wire will be (in mm)\n(a) l\n(b) 2l\n(c) zero\n(d) l/2\n\nQ8. A wire when connected to 220 V mains supply has power dissipation P1. Now the wire is cut into two equal pieces which are connected in parallel to the same supply. Power dissipation in this case is P2. Then P2: P1 is\n(a) 1\n(b) 4\n(c) 2\n(d) 3\n\nQ9. A working transistor with its three legs marked P, Q and R is tested using a multimeter. No conduction is found between P and Q. By connecting the common (negative) terminal of the multimeter to R and the other (positive) terminal to P or Q, some resistance is seen on the multimeter. Which of the following is true for the transistor?\n(a) It is an npn transistor with R as base\n(b) It is a pnp transistor with R as collector\n(c) It is a pnp transistor with R as emitter\n(d) It is an npn transistor with R as collector\n\nQ10. According to Einstein’s photoelectric equation, the plot of the kinetic energy of the emitted photo electrons from a metal Vs the frequency, of the incident radiation gives as straight the whose slope\n(a) depends both on the intensity of the radiation and the metal used\n(b) depends on the intensity of the radiation\n(c) depends on the nature of the metal used\n(d) is the same for the all metals and independent of the intensity of the radiation\n1.d2.b3.C4.c5.b6.b7.A8.b9.b10.d\n\nTop\nerror: Content is protected !!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89106095,"math_prob":0.9912,"size":3266,"snap":"2019-26-2019-30","text_gpt3_token_len":927,"char_repetition_ratio":0.11833231,"word_repetition_ratio":0.044615384,"special_character_ratio":0.2783221,"punctuation_ratio":0.075630255,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9654628,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-19T11:41:39Z\",\"WARC-Record-ID\":\"<urn:uuid:bb9a1fa1-5e9f-4398-bff5-0630e53042a5>\",\"Content-Length\":\"43011\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7ae3406d-676e-4eb9-8798-8338a89d58ff>\",\"WARC-Concurrent-To\":\"<urn:uuid:d44ce8a6-ab92-49b7-bfa9-f06fe016a3ff>\",\"WARC-IP-Address\":\"104.24.125.162\",\"WARC-Target-URI\":\"https://mocktime.com/uncategorized/iit-advance-physics-quiz/\",\"WARC-Payload-Digest\":\"sha1:BTXUK62UKB452V6OT54LJMBV5XZR46QO\",\"WARC-Block-Digest\":\"sha1:U25LV6MXIRM5ZMCV2SIX46STPMBS2I3I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560627998959.46_warc_CC-MAIN-20190619103826-20190619125826-00542.warc.gz\"}"}
https://www.manhattanprep.com/gmat/forums/guide-2-ch-4-question-8-t33205.html
[ "## guide 2, ch 4, question 8\n\nIf you're experiencing a roadblock with one of the Manhattan Prep GMAT math strategy guides, help is here!\nNabeelZ316\nStudents\n\nPosts: 18\nJoined: Sat Jul 30, 2016 3:03 am\n\n### guide 2, ch 4, question 8\n\nIf 4^a +4^a+1 = 4^a+2 - 176 , what is the value of a?\n\nhere is what im confused about with the solution provided.\n\nFor the right side of the equation, after simplifying we get one part as -4^a - 4^a . Understood, but then this further turns into 4^0\nHow did it get to 4^0??\n\nif we take 4^a as common, then should leave 1-1 which is 0 which then multiplies by 4^0 to give us ZERO. But in the solution, it is 1.\nRonPurewal\nStudents\n\nPosts: 19746\nJoined: Tue Aug 14, 2007 8:23 am\n\n### Re: guide 2, ch 4, question 8\n\nplease reproduce the relevant part of the answer key. thank you. (if it's in a physical book, just take a picture of it and post a link to the picture.)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9539412,"math_prob":0.8734377,"size":406,"snap":"2019-26-2019-30","text_gpt3_token_len":136,"char_repetition_ratio":0.10945274,"word_repetition_ratio":0.0,"special_character_ratio":0.33004925,"punctuation_ratio":0.115384616,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9713145,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-16T20:26:17Z\",\"WARC-Record-ID\":\"<urn:uuid:0d5a54bd-fb51-4ccc-80c3-73915b01ce17>\",\"Content-Length\":\"47057\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:74dcb01b-4c06-48a1-ab55-79db4615752e>\",\"WARC-Concurrent-To\":\"<urn:uuid:ed6bfc30-32e6-4db1-9007-70c46a3d6a45>\",\"WARC-IP-Address\":\"199.83.132.101\",\"WARC-Target-URI\":\"https://www.manhattanprep.com/gmat/forums/guide-2-ch-4-question-8-t33205.html\",\"WARC-Payload-Digest\":\"sha1:NLY3ELVUOQMAHYMHW7ATH4ZMWDPPELU5\",\"WARC-Block-Digest\":\"sha1:NHC5NJR7UQFK2CXNUQ6DY7ACVCGIYCAT\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195524879.8_warc_CC-MAIN-20190716201412-20190716223412-00210.warc.gz\"}"}
https://takeuforward.org/data-structure/n-meetings-in-one-room/
[ "# N meetings in one room\n\nProblem Statement: There is one meeting room in a firm. You are given two arrays, start and end each of size N.For an index ‘i’, start[i] denotes the starting time of the ith meeting while end[i]  will denote the ending time of the ith meeting. Find the maximum number of meetings that can be accommodated if only one meeting can happen in the room at a  particular time. Print the order in which these meetings will be performed.\n\n```Example:\n\nInput: N = 6, start[] = {1,3,0,5,8,5}, end[] = {2,4,5,7,9,9}\n\nOutput: 1 2 4 5\n\nExplanation: See the figure for a better understanding.", null, "```\n\n# Solution:\n\nDisclaimer: Don’t jump directly to the solution, try it out yourself first.\n\nInitial Thought Process:-\nSay if you have two meetings, one which gets over early and another which gets over late. Which one should we choose?  If our meeting lasts longer the room stays occupied and we lose our time. On the other hand, if we choose a meeting that finishes early we can accommodate more meetings. Hence we should choose meetings that end early and utilize the remaining time for more meetings.\n\nApproach\n\nTo proceed we need a vector of three quantities: the starting time, ending time, meeting number. Sort this data structure in ascending order of end time.\n\nWe need a variable to store the answer. Initially, the answer is 1 because the first meeting can always be performed. Make another variable, say limit that keeps track of the ending time of the meeting that was last performed. Initially set limit as the end time of the first meeting.\n\nStart iterating from the second meeting. At every position we have two possibilities:-\n\n• If the start time of a meeting is  strictly greater than limit we can perform the meeting. Update the answer.Our new limit is the ending time of the current meeting  since it was last performed.Also update limit.\n•  If the start time is less than or equal to limit  ,skip and move ahead.\n\nLet’s have a dry run by taking the following example.\n\nN = 6,  start[] = {1,3,0,5,8,5}, end[] =  {2,4,5,7,9,9}\n\nInitially set answer =,limit = 2.\n\nFor Position 2 –\n\nStart time of meeting no. 2 = 3 > limit. Update answer and limit.\n\nAnswer = [1, 2], limit = 4.\n\nFor Position 3 –\n\nStart time of meeting no. 3 = 0 < limit.Nothing is changed.\n\nFor Position 4 –\n\nStart time of meeting no. 4 = 5 > limit. Update answer and limit.\n\nAnswer = [1,2,4], limit = 7.\n\nFor Position 5 –\n\nStart time of meeting no. 5 = 8 > limit.Update answer and limit.\n\nAnswer = [1,2,4,5], limit = 9.\n\nFor Position 6 –\n\nStart time of meeting no. 6 = 8 < limit.Nothing is changed.\n\nFinal answer  =  [1,2,4,5]\n\n## C++ Code\n\n``````#include <bits/stdc++.h>\nusing namespace std;\n\nstruct meeting {\nint start;\nint end;\nint pos;\n};\n\nclass Solution {\npublic:\nbool static comparator(struct meeting m1, meeting m2) {\nif (m1.end < m2.end) return true;\nelse if (m1.end > m2.end) return false;\nelse if (m1.pos < m2.pos) return true;\nreturn false;\n}\nvoid maxMeetings(int s[], int e[], int n) {\nstruct meeting meet[n];\nfor (int i = 0; i < n; i++) {\nmeet[i].start = s[i], meet[i].end = e[i], meet[i].pos = i + 1;\n}\n\nsort(meet, meet + n, comparator);\n\nvector < int > answer;\n\nint limit = meet.end;\n\nfor (int i = 1; i < n; i++) {\nif (meet[i].start > limit) {\nlimit = meet[i].end;\n}\n}\ncout<<\"The order in which the meetings will be performed is \"<<endl;\nfor (int i = 0; i < answer.size(); i++) {\ncout << answer[i] << \" \";\n}\n\n}\n\n};\nint main() {\nSolution obj;\nint n = 6;\nint start[] = {1,3,0,5,8,5};\nint end[] = {2,4,5,7,9,9};\nobj.maxMeetings(start, end, n);\nreturn 0;\n}\n``````\n\nOutput:\n\nThe order in which the meetings will be performed is\n1 2 4 5\n\nTime Complexity: O(n) to iterate through every position and insert them in a data structure. O(n log n)  to sort the data structure in ascending order of end time. O(n)  to iterate through the positions and check which meeting can be performed.\n\nOverall : O(n) +O(n log n) + O(n) ~O(n log n)\n\nSpace Complexity: O(n)  since we used an additional data structure for storing the start time, end time, and meeting no.\n\n## Java Code\n\n``````import java.util.*;\nclass meeting {\nint start;\nint end;\nint pos;\n\nmeeting(int start, int end, int pos)\n{\nthis.start = start;\nthis.end = end;\nthis.pos = pos;\n}\n}\nclass meetingComparator implements Comparator<meeting>\n{\n@Override\npublic int compare(meeting o1, meeting o2)\n{\nif (o1.end < o2.end)\nreturn -1;\nelse if (o1.end > o2.end)\nreturn 1;\nelse if(o1.pos < o2.pos)\nreturn -1;\nreturn 1;\n}\n}\npublic class Meeting {\nstatic void maxMeetings(int start[], int end[], int n) {\nArrayList<meeting> meet = new ArrayList<>();\n\nfor(int i = 0; i < start.length; i++)\nmeet.add(new meeting(start[i], end[i], i+1));\n\nmeetingComparator mc = new meetingComparator();\nCollections.sort(meet, mc);\nArrayList<Integer> answer = new ArrayList<>();\nint limit = meet.get(0).end;\n\nfor(int i = 1;i<start.length;i++) {\nif(meet.get(i).start > limit) {\nlimit = meet.get(i).end;\n}\n}\nSystem.out.println(\"The order in which the meetings will be performed is \");\nfor(int i = 0;i<answer.size(); i++) {\nSystem.out.print(answer.get(i) + \" \");\n}\n}\npublic static void main(String args[])\n{\nint n = 6;\nint start[] = {1,3,0,5,8,5};\nint end[] = {2,4,5,7,9,9};\nmaxMeetings(start,end,n);\n\n}\n}``````\n\nOutput:\n\nThe order in which the meetings will be performed is\n1 2 4 5\n\nTime Complexity: O(n) to iterate through every position and insert them in a data structure. O(n log n)  to sort the data structure in ascending order of end time. O(n)  to iterate through the positions and check which meeting can be performed.\n\nOverall : O(n) +O(n log n) + O(n) ~O(n log n)\n\nSpace Complexity: O(n)  since we used an additional data structure for storing the start time, end time, and meeting no.\n\nSpecial thanks to Somparna Chakrabarti for contributing to this article on takeUforward. If you also wish to share your knowledge with the takeUforward fam, please check out this article" ]
[ null, "https://lh3.googleusercontent.com/TtxJefJFSrt-O3yH53CFJ8udcDt02PkBduRCvO6XvndajetZ2LUEgNhrSIcbSBtHLodGgPfuJeEuIP4azq0dZaN5XQ9Zgz5BWKnGAQu25YDPuLqIcHT1aFA66Lvz8Q", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7642344,"math_prob":0.99060464,"size":5897,"snap":"2022-40-2023-06","text_gpt3_token_len":1634,"char_repetition_ratio":0.14661463,"word_repetition_ratio":0.2495069,"special_character_ratio":0.30727488,"punctuation_ratio":0.20676969,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96454287,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-05T09:42:32Z\",\"WARC-Record-ID\":\"<urn:uuid:74b73e97-84d5-43e9-8974-8c3a7ba1d327>\",\"Content-Length\":\"79703\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9edd1d05-b18e-4b0d-a50b-138e8ff0aff1>\",\"WARC-Concurrent-To\":\"<urn:uuid:5a607a26-6752-4803-a324-49d2e0d18e44>\",\"WARC-IP-Address\":\"104.26.4.96\",\"WARC-Target-URI\":\"https://takeuforward.org/data-structure/n-meetings-in-one-room/\",\"WARC-Payload-Digest\":\"sha1:2PAEERCGOVO3NJVEO5UQ35HUJ4FLMDFA\",\"WARC-Block-Digest\":\"sha1:PL253Z7SGYJ6Z4E2EEKA3GFLVUEHD646\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337595.1_warc_CC-MAIN-20221005073953-20221005103953-00782.warc.gz\"}"}
https://kpmcqshub.com/maths-class-6-100-to-120/
[ "CLOSE\n\nA) 25\n\nB) -25\n\nC) 0\n\nD) None of these\n\n## 102. A line which divides a line segment into two equal parts and also makes an angle of 900 with the given line segment, is called its?\n\nA) Left Bisector\n\nB) Right Bisector\n\nC) Perpendicular\n\nA) Equal\n\nB) Smaller\n\nC) Greater\n\nD) None\n\nA) Yes\n\nB) No\n\nC) Sometimes\n\nA) Greater\n\nB) Equal\n\nC) Less\n\nA) Yes\n\nB) No\n\nC) None\n\nA) 7*1o/2\n\nB) 8*1/2\n\nC) 9*2/3\n\n## 108. ______ of a rectangle is twice the sum of the length and width\n\nA) Area\n\nB) Perimeter\n\nC) Both ‘a’ and ‘b’\n\n## 109. Perimeter of rectangle is?\n\nA) P= 2(l + w)\n\nB) P= 2l + 2w\n\nC) Both ‘a’ and ‘b’\n\nA) 16 units\n\nB) 32 units\n\nC) 27 units\n\nA) Area\n\nB) Perimeter\n\nA) 105 m\n\nB) 105 m2\n\nC) 22 m2\n\nA) w = 2\n\nB) w = 2 feet\n\nC) 8 feet\n\nA)  Rectangle\n\nB) Square\n\nC) Triangle\n\nA) P = 4s\n\nB) P = 3s\n\nC) P = 2s\n\nD) None\n\nA) 1296 m\n\nB) 1296 m2\n\nC) 72 m2\n\nA) 225000\n\nB) 22500\n\nC) 230500\n\nA) 9537\n\nB) 9550\n\nC) 9537.5\n\nA) 4240 m2\n\nB) 4224 m2\n\nC) 4252 m2\n\nD) None\n\nA) Height\n\nB) Altitude\n\nC) Perimeter" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7930266,"math_prob":0.98988587,"size":2338,"snap":"2023-14-2023-23","text_gpt3_token_len":808,"char_repetition_ratio":0.13281919,"word_repetition_ratio":0.020746889,"special_character_ratio":0.37596235,"punctuation_ratio":0.0961183,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9737488,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-23T04:34:03Z\",\"WARC-Record-ID\":\"<urn:uuid:886ff014-4040-4cd0-b8e7-1411fe523b14>\",\"Content-Length\":\"146753\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:548e2624-92ce-485b-a827-d4aa1e7e166b>\",\"WARC-Concurrent-To\":\"<urn:uuid:a99ff326-ca0f-4248-9912-ef186870148d>\",\"WARC-IP-Address\":\"15.204.142.117\",\"WARC-Target-URI\":\"https://kpmcqshub.com/maths-class-6-100-to-120/\",\"WARC-Payload-Digest\":\"sha1:H4PKGQTOYPE5AAIK2VRFMZQP75WKL4U3\",\"WARC-Block-Digest\":\"sha1:O636EJV4R2MCYT5U2ZYOWMLMQRE5QABO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296944996.49_warc_CC-MAIN-20230323034459-20230323064459-00052.warc.gz\"}"}
http://ics.misterv.ca/general-notes/assignments/magic-squares/magic-squares-oops
[ "0.0 General‎ > ‎Assignments‎ > ‎Magic Squares‎ > ‎\n\n### Magic Squares: OOPs\n\nThis is a framework you can use to implement magic squares in an OOPs environment:\n\n### Class: Cell\n\n#### Cell Attributes:\n\n Attribute Data Type Scope Purpose row integer - private the row the cell is in column integer - private the column the cell is in isOccupied boolean - private indicates if the cells contains a value. set to false when created value integer - private the integer value of the cell in the magic square\n\n#### Cell Methods:\n\n Method Return Type Scope Purpose Cell( int r,    int c) + public Constructor: sets isOccuppied to false, row to r, col to c isOccupied() boolean + public return the current value of isOccupied setValue(    int value) void + public set the value of the cell getValue() int + public return the current cell value\n\n### Class: MagicSquare\n\n#### Square Attributes:\n\n Attribute Data Type Scope Purpose mSquare Cell [][] - private a 2D array to hold the magic square size int - private the size of the magic square startValue int - private the first number start value in the square step int - private the amount to change each new value in the magic square\n\n#### Square Methods:\n\n Method Return Type Scope Purpose Square() + public Constructor: set the default values square(    int size,     int start,    int step) void - private called by the constructors to create the magic square initsquare() void used by: square() creates mSquare full of empty cells setValues() void - private used by: square()  sets the values in magic square displaySquare() void - private used by: square()  will display the square neatly on the screen nextCell(  Cell currentCell) Cell - private return the next cell to be occupiedused by: setValues() nextValue(    int x) int - private returns the next value to be placed in a cellused by: setValues()" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5409495,"math_prob":0.9625935,"size":1835,"snap":"2021-04-2021-17","text_gpt3_token_len":466,"char_repetition_ratio":0.17149098,"word_repetition_ratio":0.06542056,"special_character_ratio":0.27029973,"punctuation_ratio":0.06711409,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9554764,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-17T02:49:49Z\",\"WARC-Record-ID\":\"<urn:uuid:afe3ce16-9329-4024-8ebe-bd77015a23d9>\",\"Content-Length\":\"73462\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:64f81570-c4bd-41d3-a4cc-a1d3d83208d8>\",\"WARC-Concurrent-To\":\"<urn:uuid:10b2686d-492b-4ea0-ab3c-02d26ee521b5>\",\"WARC-IP-Address\":\"172.217.9.211\",\"WARC-Target-URI\":\"http://ics.misterv.ca/general-notes/assignments/magic-squares/magic-squares-oops\",\"WARC-Payload-Digest\":\"sha1:YQK6GLNJ5QO66CWMLAHSVE4VDJMR7HMZ\",\"WARC-Block-Digest\":\"sha1:KWAKQVXAVAQLOQP7IIHBH6UEJ7CPHMK6\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703509104.12_warc_CC-MAIN-20210117020341-20210117050341-00472.warc.gz\"}"}
http://www.helistart.com/Vector.aspx
[ "# Vector Quantities\n\nA vector is defined as:\n\nx = (x, y, z)\n\nwhere:\nx = position on the x axis\ny = position on the y axis\nz = position on the z axis\n\nNote that the scalar values x, y, z refer to the unit vectors (with a length of 1) along the x, y and z axes in Cartesian space. On this website, vectors are denoted by bold typeface.\n\nThe magnitude (or length) of the vector (x, y, z) is: sqrt(x2 + y2 + z2)\n\nThe direction can be expressed by the angles α and β with:\n\nα = arctan (y / x)\nβ = arctan (z / x)\n\nThe vector cross product is defined as:\n\na x b = (a2b3 - a3b2, a3b1 - a1b3, a1b2 - a2b1)\n\nwhere:\na = (a1, a2, a3\nb = (b1, b2, b3\n\n## Explanation\n\nMany quantities have both a magnitude and a direction. The magnitude and direction can be expressed by a vector. These vectors are defined by their components along an orthogonal axis system (Cartesian space). Each axis represents a dimension. For example, when we look at the speed and direction of an object, we can denote this by specifying the speed's horizontal component (one leg of the axis system) and its vertical component (the second axis). This is an example of a two dimensional vector quantity. We can also define a three dimensional vector in a similar way.", null, "The cross product between two vectors, a x b, has vector c as a result. This vector is orthogonal to a and b, and has a magnitude that is equal to the area of the parallelogram spawned by them. The sign of c is denoted by the right hand rule. Note that when a and b are orthogonal to each other (parallelogram is, then, a square), the magnitude of  c equals the product of the magnitudes of a and b.\n\n## Example 1\n\nThe speed of a helicopter is angled at 45 degrees from the horizontal axis in the x-y plane. The speed is 5 m/s along the horizontal axis. How great is the vertical speed, and what is its absolute value (that is, what is the magnitude of the speed)?\nAnswer: The vertical speed must be equal to its horizontal speed, as the angle in the x-y plane is 45 degrees. The value of the speed is: sqrt(x2 + y2) = sqrt (25 + 25) = sqrt(50) = 7.07 m/s\n\n## Example 2\n\nThe speed of a helicopter is 20 m/s and makes an angle of 15 degrees with the x axis and is flying in the x-y plane. What is the vertical component of the speed?\ntan(α) = y / x\ntan(15) = y/20\ny = 20 tan(15) = 5.36\n\nSo, the vertical speed component is 5.36 m/s.\n\n## Example 3\n\nThe speed of a helicopter is defined by the vector (10, 20, 0). What is the angle with the x-axis?\nAnswer: angle = arctan (20/10) = arctan (2) = 1.10714872 (in radials)->  In degrees: (1.10714872 / 2pi) * 360 = 63.4 degrees.\n\n# Do you want to comment this topic?\n\n1: (Book) Cyclic and Collective", null, "2: (Book) Principles of Helicopter Flight", null, "3: Microsoft FSX Steam Edition", null, "4: Logitech Extreme 3D Pro Joystick", null, "5: Saitek Pro Flight Rudder Pedals", null, "", null, "" ]
[ null, "http://www.helistart.com/Figures/vector.jpg", null, "http://ir-na.amazon-adsystem.com/e/ir", null, "http://ir-na.amazon-adsystem.com/e/ir", null, "http://ir-na.amazon-adsystem.com/e/ir", null, "http://ir-na.amazon-adsystem.com/e/ir", null, "http://ir-na.amazon-adsystem.com/e/ir", null, "http://rover.ebay.com/roverimp/1/711-53200-19255-0/1", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8886965,"math_prob":0.99674296,"size":2619,"snap":"2020-45-2020-50","text_gpt3_token_len":785,"char_repetition_ratio":0.122370936,"word_repetition_ratio":0.018726591,"special_character_ratio":0.3043146,"punctuation_ratio":0.11557789,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996762,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,5,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-30T07:12:26Z\",\"WARC-Record-ID\":\"<urn:uuid:41a5aada-1dab-414b-9a46-2131039797a8>\",\"Content-Length\":\"167158\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c1a53099-4939-4616-bad5-cec3a322dc36>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8cfade1-52a0-48e5-8f69-1cddb007b62f>\",\"WARC-IP-Address\":\"46.182.180.5\",\"WARC-Target-URI\":\"http://www.helistart.com/Vector.aspx\",\"WARC-Payload-Digest\":\"sha1:NS2PRWOIDDRFTN7FNA3RKWS2TNPWCHQH\",\"WARC-Block-Digest\":\"sha1:SHAV57VWJ2E4JMSOEQEO27234IMMRMZH\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141211510.56_warc_CC-MAIN-20201130065516-20201130095516-00633.warc.gz\"}"}
http://isa.umh.es/calc/ss49docs/solve49.htm
[ "# SOLVESYS 49 version 1.2\n\n## Numerical Nonlinear Equations and Least Squares Solver  for the HP49G calculator\n\nCopyright 1994-2000, Sune Bredahl\n\n### DISCLAIMER\n\nSOLVESYS.LIB AND THIS MANUAL ARE PRESENTED WITHOUT WARRANTIES, EXPRESSED OR IMPLIED. THE AUTHOR MAKES NO GUARANTEE AS TO THE FITNESS OF THIS SOFTWARE.\n\nSOLVESYS.LIB CAN BE COPIED FREELY BUT MAY NOT BE USED FOR COMMERCIAL PURPOSES WITHOUT PERMISSION FROM THE AUTHOR.\n\n### OVERVIEW\n\nThis documentation covers SOLVESYS 1.2 for the HP49G. Latest version of the software is downloadable from http://solvesys.cjb.net. Also a FAQ is available from here if you have any questions not covered in this manual.\n\nSOLVESYS 49 requires an HP49G with ROM 1.10 or later. It will not work properly with the ROM 1.05 shipped in early versions of the calculator.\n\n### INSTALLATION\n\nSOLVESYS is a library and must be properly installed in order to work  Consult the Advanced User's Guide (section 11-6) for details on this. However, assuming RPN mode, the following should work:\n\n1. Transfer SOLVESYS.LIB to the HP49G - use binary transfer.\n2. Recall the library to the stack and press n [STO], where n is the desired port (0, 1 or 2). After storing the library, you can purge the original copy to save memory.\n3. Press [ON]+[C] to restart the HP49G. This completes the installation.\n\nTo verify that this library has been correctly installed, press [CAT], find the command ABOUTSS and press [ENTER]. The version number displayed should be \"SOLVESYS 49 1.2\" (the current build is 17/07/00).\n\nSOLVESYS can now be started in several ways, for example:\n\n• Using the NUM.SLV menu (SOLVESYS 1.2 appears as the last item)\n• Using CAT (command is listed as SOLVESYS).\n\nTo remove the SOLVESYS library, do this:\n\n1. Start the FILE MANAGER\n2. Select the port (0, 1 or 2) where SOLVESYS is installed and press [OK]\n3. Press [NXT] and [PURGE].\n\nIf calculator returns an \"Object in use\" error at this point, press [ON]+[C] and repeat the above steps.\n\nTo transfer SOLVESYS.LIB to another HP49G.:\n\n1. Put the library ID (n: 1550) in the stack and press [RCL].\n2. Store the returned library in any variable\n3. Transfer this variable to the other calc. - use binary transfer.\n\n### WHAT IS SOLVESYS?\n\nSOLVESYS 49 is an environment for solving systems of linear and nonlinear equations. It is also capable of doing nonlinear least-squares minimization.\n\nTo be more precise, SOLVESYS is designed to either zero or least-squares minimize m linear or nonlinear equations in n unknowns.When m=n, the problem is obviously to find a solution satisfying all equations. If m>n, the equations are generally inconsistent so instead SOLVESYS searches for a least squares solution, i.e. the minimizer of the sum of squared equation residuals. Least squares minimization is commonly used in datafitting applications. The case n>m is perhaps of less interest but is also handled by SOLVESYS.\n\nNote that SOLVESYS is a numeric solver -  it will try to solve the equations using iterative methods, i.e. the user provides some initial guess or estimate of the solution which the solver (hopefully) can use to find the true solution. It can be necessary to try out different starting guesses before the solver succeeds in this quest, but if good starting values are provided, equations can often be solved with only a few iterations.\n\nSOLVESYS does not allow units in equations or variables (too slow), also it cannot be used to solve systems with discrete functions or variables.\n\nThe solver engine is based on a (Gauss-) Newton method with a mixed quadratic and cubic linesearch procedure. For more details on this algorithm, see Dennis and Schnabel or Press et al. .\n\n Dennis, J.E., and Schnabel, R.B. 1983, Numerical Methods for Unconstrained Optimization and Nonlinear Equations (Englewood Cliffs, NJ: Prentice-Hall).\n Press, W.H. et al. 1992, Numerical Recipes in C: The Art of Scientific Computing. 2nd ed. (Cambridge: University Press).\n\nRather than describing each screen and menu in SOLVESYS 49, I'll provide some examples instead.\n\nBasic usage is described in the first example so please start from here even though you may not be interested in solving linear equations.\n\nExample 1: Solving a system of linear equations\n\nAlthough the HP49G already has built-in functions to solve systems of linear equations (such as LINSOLVE), you may find it convenient to use SOLVESYS instead. At least this small example should give you an idea of how to use SOLVESYS.\n\nThe system we want to solve is:\n\n1. 2x + y = 3x + z\n\n2. z + x = 2(x + y)\n\n3. (z + x)/2 + y + 1.2 = 0\n\nThere are several ways to start SOLVESYS. The fastest way is open the NUM.SLV choose menu and select SOLVESYS 1.2 from here.\n\nThe first thing SOLVESYS displays, is a list of equations to be solved. This is actually the contents of the 'EQ' variable so if there's no 'EQ' variable in the current directory an empty list is displayed. For example, if the above equations are stored as a list in 'EQ' prior to starting SOLVESYS, the opening display should look something like this:", null, "If you haven't stored the equations in 'EQ', use [ADD] to enter the equations.\n\nThe checkmark indicates that the equation is marked for solving (default). If there are equations you don't want to solve, use the [+/-] key to uncheck them - this has the same effect as [DEL] but does not remove the equation from 'EQ'.\n\nNow press [OK] to proceed. SOLVESYS analyzes the equations for variables and opens the \"Variables\" screen shown below.", null, "You can modify a highlighted value using the [EDIT] menukey or [ENTER]. To check/uncheck a variable, use the [+/-] key. The [RESET] key sets all variables equal to 1.\n\n• Checked variables will be solved for (default). A real or complex valued starting guess must be provided. This should be your best guess of the solution you're looking for - don't use the default values if you know any better.\n• Unchecked variables are not solved for and the value remain constant during the solving process. In fact, the value need not be a real or complex numbers, however the equations must eventually evaluate to a number.\n\nIn this example, we want to solve for all variables so all must be checked. The starting values are unimportant because the equations are linear. If we use the default values as shown and press [SOLVE] we get the next screens:", null, "", null, "Here \"Zero\" indicates that a solution has been found. When returned to the \"Variables\" screen, the final values are displayed.\n\nAs you can see, the solution is (x, y, z) = (0.4, -0.8, -1.2). When you exit SOLVESYS, these values will be stored in their respective variables. However you can also use [->STK] to copy this solution (as well as a error vector) to the stack\n\nExample 2: Solving a system of nonlinear equations.\n\nIn this example we will solve a rather large system (propane combustion?) which is a mixture of 11 linear and nonlinear equations in 11 unknowns (x1,...,x11) and seven known variables (a1,...,a6 and r).\n\n x1 + x4 = 3 2x1 + x2 + x4 + x7 + x8 + x9 + 2x10 = 10 + r x2 + 2x5 + x6 + x7 = 8 2x3 + x5 = 4r x1 x5 = a1 x2 x4 x6 x2½ = a2 (x2 x4 x11)½ x7 x4½ = a3 (x1 x4 x11)½ x8 x4 = a4 x2 x11 x9 x4 = a5 x1 (x3 x11)½ x10 x42 = a6 x42 x11 x11 = x1 + x2 + x3 + x4 + x5 + x6 + x7 + x8 + x9 + x10 a1 = 0.193 a2 = 0.002597 a3 = 0.003448 a4 = 0.00001799 a5 = 0.0002155 a6 = 0.00003846 r = 4.056734\n\nIn SOLVESYS, this equation set will look like:", null, "All the equations should be included (checked). Press [OK] to open the \"Variables\" screen:", null, "Remember that the first seven values here are constants. These must be unchecked and filled in with their corresponding values shown earlier. For the unknowns we will use 1 as the initial value except x11 we set to 10 since x11 is the sum of the other variables (equation 11).\n\nWhen finished, the display should then look something like the one below. Use the downarrow key to view/edit the remaining variables.", null, "", null, "[Note: To verify that you have the correct amount of unknowns, press [INFO] menukey. This should show \"m/n = 11/11\" which means that 11 equations and 11 variables are selected to be solved]\n\nWhen done, press [SOLVE]and after a few minutes a solution (Zero) is found:", null, "", null, "The final values can be viewed using the up/downarrow keys. [->STK] can be used to copy the result and the equation residuals the stack (do this!). Note that the values are also stored in the variables after you exit SOLVESYS.\n\nExample 3: Nonlinear least-squares\n\nIf there are more (generally inconsistent) equations than unknowns, SOLVESYS will search for a \"best fit\" solution in the least-squares sense, ie. a solution that minimizes the sum of squared equations deviations.\n\nA common application of least-squares minimization is datafitting, where one is attempting to fit m observations to an expression of n unknown parameters for which the \"best-fit\" values are required. If each observation is inserted in the expression, the result is a system of m \"observational\" equations in n unknowns.\n\nHere's an example.\n\nThe relationship between the measured pressure and temperature in saturated steam can be written as\n\nY=a*ALOG(b*T/(c+T))\n\nwhere Y is the measured pressure of the steam at various values of a controllable temperature T\na, b and c are unknown parameters (to be estimated)\n\nThe following data were collected.\n\n T 0 10 20 30 40 50 60 70 80 85 90 95 100 105 Y 4.14 8.52 16.31 32.18 64.62 98.76 151.13 224.74 341.35 423.36 522.78 674.32 782.04 920.01\n\nTo create the 14 equations needed, perform the following four steps:\n\n1. Store the data as lists in variables such as 'T' and 'Y'.\n2. If any of the variables A, B or C exist, they must be purged.\n3. Enter 'Y=A*ALOG(B*T/(C ADD T))'on the stack and press [EVAL]\n4. You're done! Store the resulting list of equations in the 'EQ' variable.\n\n[IMPORTANT: In step 3. you must replace any occurence of \"+\" with \"ADD\" or \"--\"  since \"+\" has a different action when list are involved.]\n\nAs for the initial guesses, note that the first equation is actually A=4.14 so this can be used as a guess. If A=4.14 is inserted in the next two equations, these can be reduced to two linear equations with the solution (b,c) = (5.93,179). Thus an initial guess could be (a,b,c)=(4,6,180).\n\nNow we're ready to start SOLVESYS.  The equations are already created so press [OK] and fill in the guess values (a,b,c) = (4, 6, 180)", null, "", null, "Press [SOLVE] and answer \"yes\" to accept that m is different from n (since we have more equations than unknowns). After a few iterations a solution (minimum) is found.", null, "", null, "", null, "Using 3 significant digits, the best fit function is Y(T)=5.27*ALOG[8.56*T/(295+T)].\n\nBe aware that there are no simple ways to distinguish between a local or global minimum so the choice of starting values is very crucial. A good initial guess is not only a real time-saver, it will also pick out the right (global) minimum for you!\n\n### ERROR TOLERANCES\n\nIt is possible to modify the error tolerances used for convergence testing although it is not recommended. Use [TOL] to change any the error tolerances described below.\n\nXTOL\n\nTolerance for the convergence of iterates. This is the relative difference between the last two computed solutions. A value of 10-p usually corresponds to p significant digits of the computed result, but values below 10-6 may not comply with this. The default value is 10-3 corresponding to 3 significant digits.\n\nXTOL is the \"primary\" test in the sence that EQTOL or LSQTOL are not tested if XTOL fails. However, for several reasons, XTOL is ignored if the equation values are exactly zero (this forces an \"Zero\" message).\n\nEQTOL\n\nTest to check if the equations have been zeroed (should be named ZEROTOL?). The test computes the r.m.s. (root mean square) error of the equations. For example, for the system\n{ xy=9, x+y=6} the r.m.s. error at (x,y)=(2.9,3.1) is [(8,99-9)2+(6-6)2]½= 0.01.\nEQTOL defaults to 10-5 which should be sufficient for most purposes.\n\nLSQTOL\n\nThis test is used only if m>n ie. for nonlinear least-squares problems. It is a cosine test from from Dennis & Schnabel (sort of normalized gradient test). The test returns values between 0 and 1 where a value close to 0 indicates a least-squares minimizer. The default value is 0.01 which should be sufficient considering the XTOL pre-requirement.\n\nLSQTOL does not apply to zero-residual least squares (exact fit), however the EQTOL test will return a \"Zero\" message in this case.\n\n### TERMINATION AND ERROR MESSAGES\n\nSome (more or less) common error and termination messages returned by SOLVESYS are listed below.\n\n#### RETURN MESSAGES FROM THE SOLVER:\n\nZero:\nA result satisfying XTOL and EQTOL was found (XTOL may be ignored if this is an exact zero).\nMinimum:\nA result satisfying XTOL and LSQTOL  was found. It is not guaranteed to be a global minimum.\nThe solver has landed on a point that does not appear to be solution. Restart the solver with other initial guesses.\nUndefined Result:\n(Math exception.) Calculation such as 0/0 occurred or the XROOT function was used with arguments that cannot give a real-valued result.\nInfinite Result:\n(Math exception.) Calculation such as 1/0 occurred. Try changing the initial guesses.\n\n#### INITIALIZATION ERRORS:\n\nConstant?:\nAt least one equation does not contain any unknowns. SOLVESYS does not allow redundant equations. If you have equations you don't want to solve, just uncheck them.\nInconsistent Units:\nUnits are not supported.\nUndefined Name:\nSome expression(s) include(s) one or more variable names SOLVESYS is unable to identify.\n\n### HOW TO REACH THE AUTHOR\n\nFeel free to contact me if you have any comments, questions, problems or suggestions. Also if you find any bugs (or what you think is a bug), please notify me.\n\nCheck http://solvesys.cjb.net for the  latest version of SOLVESYS and a F.A.Q with answers to the most common questions.\n\nMy email is sune@bredahl.net, or sune_bredahl@hotmail.com  and ICQ#  43726969." ]
[ null, "http://isa.umh.es/calc/ss49docs/ex1a.gif", null, "http://isa.umh.es/calc/ss49docs/ex1b.gif", null, "http://isa.umh.es/calc/ss49docs/ex1c.gif", null, "http://isa.umh.es/calc/ss49docs/ex1d.gif", null, "http://isa.umh.es/calc/ss49docs/ex2a.gif", null, "http://isa.umh.es/calc/ss49docs/ex2b.gif", null, "http://isa.umh.es/calc/ss49docs/ex2c.gif", null, "http://isa.umh.es/calc/ss49docs/ex2d.gif", null, "http://isa.umh.es/calc/ss49docs/ex2e.gif", null, "http://isa.umh.es/calc/ss49docs/ex2f.gif", null, "http://isa.umh.es/calc/ss49docs/ex3a.gif", null, "http://isa.umh.es/calc/ss49docs/ex3b.gif", null, "http://isa.umh.es/calc/ss49docs/ex3c.gif", null, "http://isa.umh.es/calc/ss49docs/ex3d.gif", null, "http://isa.umh.es/calc/ss49docs/ex3e.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8642824,"math_prob":0.9776788,"size":13829,"snap":"2019-13-2019-22","text_gpt3_token_len":3614,"char_repetition_ratio":0.1350452,"word_repetition_ratio":0.0091973245,"special_character_ratio":0.2628534,"punctuation_ratio":0.123430215,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99480385,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-24T21:58:06Z\",\"WARC-Record-ID\":\"<urn:uuid:a562034e-5fdf-40fc-b240-e33116d25156>\",\"Content-Length\":\"23475\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:16cb517c-a20b-428e-83bc-d6c507955cdf>\",\"WARC-Concurrent-To\":\"<urn:uuid:5162f925-3fad-41c9-ae56-15656e734e6b>\",\"WARC-IP-Address\":\"193.147.145.165\",\"WARC-Target-URI\":\"http://isa.umh.es/calc/ss49docs/solve49.htm\",\"WARC-Payload-Digest\":\"sha1:ODOOBQNHV7GEXKQWOSNHSMXVLXWINEJT\",\"WARC-Block-Digest\":\"sha1:ZQACBVYPC37UAMF2ANBD2Y5KDKWCD7IE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912203493.88_warc_CC-MAIN-20190324210143-20190324232143-00055.warc.gz\"}"}
https://en.cppreference.com/w/cpp/algorithm/is_permutation
[ "# std::is_permutation\n\n< cpp‎ | algorithm\n\nC++\n Compiler support Freestanding and hosted Language Standard library Standard library headers Named requirements Feature test macros (C++20) Language support library Concepts library (C++20) Metaprogramming library (C++11) Diagnostics library General utilities library Strings library Containers library Iterators library Ranges library (C++20) Algorithms library Numerics library Localizations library Input/output library Filesystem library (C++17) Regular expressions library (C++11) Concurrency support library (C++11) Technical specifications Symbols index External libraries\n\nAlgorithm library\nConstrained algorithms and algorithms on ranges (C++20)\nConstrained algorithms, e.g. ranges::copy, ranges::sort, ...\nExecution policies (C++17)\n is_execution_policy(C++17)\n execution::seqexecution::parexecution::par_unseqexecution::unseq(C++17)(C++17)(C++17)(C++20)\nNon-modifying sequence operations\n all_ofany_ofnone_of(C++11)(C++11)(C++11) for_each for_each_n(C++17)\nModifying sequence operations\n copycopy_if(C++11) copy_n(C++11) copy_backward move(C++11) move_backward(C++11) shift_leftshift_right(C++20)(C++20) transform\n removeremove_if replacereplace_if reverse rotate unique random_shuffle(until C++17)\nPartitioning operations\n is_partitioned(C++11) partition_point(C++11)\n partition partition_copy(C++11)\nSorting operations\n is_sorted(C++11) is_sorted_until(C++11)\nBinary search operations\nSet operations (on sorted ranges)\nHeap operations\n is_heap(C++11) is_heap_until(C++11)\nMinimum/maximum operations\n minmax(C++11) minmax_element(C++11)\n clamp(C++17)\nPermutations\n is_permutation(C++11)\nNumeric operations\n accumulate reduce(C++17) transform_reduce(C++17)\n transform_inclusive_scan(C++17) transform_exclusive_scan(C++17)\n partial_sum inclusive_scan(C++17) exclusive_scan(C++17)\nOperations on uninitialized storage\n uninitialized_copy_n(C++11) uninitialized_move_n(C++17) uninitialized_fill_n\n destroy(C++17) destroy_n(C++17) destroy_at(C++17) construct_at(C++20)\nC library\n\n Defined in header (1) template< class ForwardIt1, class ForwardIt2 > bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                      ForwardIt2 first2 ); (since C++11) (until C++20) template< class ForwardIt1, class ForwardIt2 > constexpr bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                                ForwardIt2 first2 ); (since C++20) (2) template< class ForwardIt1, class ForwardIt2, class BinaryPredicate > bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                      ForwardIt2 first2, BinaryPredicate p ); (since C++11) (until C++20) template< class ForwardIt1, class ForwardIt2, class BinaryPredicate > constexpr bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                                ForwardIt2 first2, BinaryPredicate p ); (since C++20) (3) template< class ForwardIt1, class ForwardIt2 > bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                      ForwardIt2 first2, ForwardIt2 last2 ); (since C++14) (until C++20) template< class ForwardIt1, class ForwardIt2 > constexpr bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                                ForwardIt2 first2, ForwardIt2 last2 ); (since C++20) (4) template< class ForwardIt1, class ForwardIt2, class BinaryPredicate > bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                      ForwardIt2 first2, ForwardIt2 last2,                      BinaryPredicate p ); (since C++14) (until C++20) template< class ForwardIt1, class ForwardIt2, class BinaryPredicate > constexpr bool is_permutation( ForwardIt1 first1, ForwardIt1 last1,                                ForwardIt2 first2, ForwardIt2 last2,                                BinaryPredicate p ); (since C++20)\n\nReturns true if there exists a permutation of the elements in the range [first1, last1) that makes that range equal to the range [first2, last2), where last2 denotes first2 + (last1 - first1) if it was not given.\n\n1,3) Elements are compared using operator==. The behavior is undefined if it is not an equivalence relation.\n2,4) Elements are compared using the given binary predicate p. The behavior is undefined if it is not an equivalence relation.\n\n## Contents\n\n### Parameters\n\n first1, last1 - the range of elements to compare first2, last2 - the second range to compare p - binary predicate which returns true if the elements should be treated as equal. The signature of the predicate function should be equivalent to the following: bool pred(const Type &a, const Type &b); Type should be the value type of both ForwardIt1 and ForwardIt2. The signature does not need to have const &, but the function must not modify the objects passed to it. Type requirements -ForwardIt1, ForwardIt2 must meet the requirements of LegacyForwardIterator. -ForwardIt1, ForwardIt2 must have the same value type.\n\n### Return value\n\ntrue if the range [first1, last1) is a permutation of the range [first2, last2).\n\n### Complexity\n\nAt most O(N2) applications of the predicate, or exactly N if the sequences are already equal, where N is std::distance(first1, last1).\n\nHowever if ForwardIt1 and ForwardIt2 meet the requirements of LegacyRandomAccessIterator and std::distance(first1, last1) != std::distance(first2, last2) no applications of the predicate are made.\n\n### Note\n\nThe std::is_permutation can be used in testing, namely to check the correctness of rearranging algorithms (e.g. sorting, shuffling, partitioning). If x is an original range and y is a permuted range then std::is_permutation(x, y) == true means that y consist of \"the same\" elements, maybe staying at other positions.\n\n### Possible implementation\n\n template bool is_permutation(ForwardIt1 first, ForwardIt1 last, ForwardIt2 d_first) { // skip common prefix std::tie(first, d_first) = std::mismatch(first, last, d_first); // iterate over the rest, counting how many times each element // from [first, last) appears in [d_first, d_last) if (first != last) { ForwardIt2 d_last = std::next(d_first, std::distance(first, last)); for (ForwardIt1 i = first; i != last; ++i) { if (i != std::find(first, i, *i)) continue; // this *i has been checked   auto m = std::count(d_first, d_last, *i); if (m == 0 || std::count(i, last, *i) != m) return false; } } return true; }\n\n### Example\n\n#include <algorithm>\n#include <iostream>\n\ntemplate<typename Os, typename V>\nOs& operator<<(Os& os, V const& v)\n{\nos << \"{ \";\nfor (auto const& e : v)\nos << e << ' ';\nreturn os << '}';\n}\n\nint main()\n{\nstatic constexpr auto v1 = {1, 2, 3, 4, 5};\nstatic constexpr auto v2 = {3, 5, 4, 1, 2};\nstatic constexpr auto v3 = {3, 5, 4, 1, 1};\n\nstd::cout << v2 << \" is a permutation of \" << v1 << \": \" << std::boolalpha\n<< std::is_permutation(v1.begin(), v1.end(), v2.begin()) << '\\n'\n<< v3 << \" is a permutation of \" << v1 << \": \"\n<< std::is_permutation(v1.begin(), v1.end(), v3.begin()) << '\\n';\n}\n\nOutput:\n\n{ 3 5 4 1 2 } is a permutation of { 1 2 3 4 5 }: true\n{ 3 5 4 1 1 } is a permutation of { 1 2 3 4 5 }: false\n\n next_permutation generates the next greater lexicographic permutation of a range of elements (function template) prev_permutation generates the next smaller lexicographic permutation of a range of elements (function template) equivalence_relation(C++20) specifies that a relation imposes an equivalence relation (concept) ranges::is_permutation(C++20) determines if a sequence is a permutation of another sequence (niebloid)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5505,"math_prob":0.95468944,"size":4580,"snap":"2023-40-2023-50","text_gpt3_token_len":1319,"char_repetition_ratio":0.21175699,"word_repetition_ratio":0.26123595,"special_character_ratio":0.31310043,"punctuation_ratio":0.19782871,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9863664,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-28T05:21:26Z\",\"WARC-Record-ID\":\"<urn:uuid:e2689949-2188-4bb9-beed-bc7525e35c38>\",\"Content-Length\":\"92149\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:35b743fd-e326-4694-87a6-1ba9dc4f52db>\",\"WARC-Concurrent-To\":\"<urn:uuid:59659005-4970-4bb3-a2ed-bbb8218c9663>\",\"WARC-IP-Address\":\"74.114.90.20\",\"WARC-Target-URI\":\"https://en.cppreference.com/w/cpp/algorithm/is_permutation\",\"WARC-Payload-Digest\":\"sha1:4XPHDKZGIKZV4BM3POBC5TVVAE7YZP63\",\"WARC-Block-Digest\":\"sha1:M6EYQ3CBANLETNCFVI7V3SXR4UDJT7TA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510358.68_warc_CC-MAIN-20230928031105-20230928061105-00648.warc.gz\"}"}
http://azfoo.net/gdt/babs/numbers/n/number68386.html
[ "### About the Number 68,386 (sixty-eight thousand three hundred eighty-six)\n\nMathBabbler's Buick's odometer [no picture] hit 68,386 miles on 5 July 2015 while driving west on I-40 in Arizona.\n\nNote: This nBAB was created on 22 June 2016, which was almost a full year since the POM (Palindromic Odometer Moment) occurred.\n\n```MathBabbler Number Analyst (MBNA) output:\n=========================================\n68386 is natural, counting, whole, integer\n68386 is even (not odd)\n68386 proper divisors are: 1,2,31,62,1103,2206,34193,\n68386 has 7 proper divisors\n68386 is deficient (sum of divisors is 37598; ratio: 0.549791)\n68386 is unhappy\n68386 is a Squarefree Number\n68386 is Harshad (Niven) number\n68386 is composite (not prime)\n68386 has the prime factors: 2*31*1103 (sum=1136)\n68386 is sphenic (has 3 unique prime factors)\n68386 is a 1103-smooth number\n68386 is palindromic\n68386 is Arithmetic (A003601)\n68386 in octal is 0205442\n68386 in hexadecimal is 0x10b22\n68386 in binary is 10000101100100010 (is evil)\n68386 nearest square numbers: -265...258 (68121...68644 )\nsqrt(68386) = 261.507\nln(68386) = 11.1329\nlog(68386) = 4.83497\n68386 reciprocal is .00001462287602725704091480712426\n68386 is an apocalyptic power (2^68386 contains 666)\n68386! is inf\n68386 is 21767.9 Pi years\n68386 is 3419 score and 6 years\n```\n\nCreator: Gerald Thurman [gthurman@gmail.com]\nCreated: 22 June 2016", null, "" ]
[ null, "http://i.creativecommons.org/l/by/3.0/us/88x31.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84101284,"math_prob":0.9243947,"size":1301,"snap":"2019-35-2019-39","text_gpt3_token_len":441,"char_repetition_ratio":0.18272938,"word_repetition_ratio":0.0,"special_character_ratio":0.49423522,"punctuation_ratio":0.14859438,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95620036,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-16T02:41:04Z\",\"WARC-Record-ID\":\"<urn:uuid:84b02407-e499-4870-a42a-981bf99b3669>\",\"Content-Length\":\"3454\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:67d0d51b-8a4a-4d1d-8ca0-b60491fd2e83>\",\"WARC-Concurrent-To\":\"<urn:uuid:9348a9d0-8d1a-44e4-b412-d6daaa2b68b7>\",\"WARC-IP-Address\":\"70.38.112.232\",\"WARC-Target-URI\":\"http://azfoo.net/gdt/babs/numbers/n/number68386.html\",\"WARC-Payload-Digest\":\"sha1:FZGZ7LIO4I2ER3XQHN3C3WJBS7YGRVTC\",\"WARC-Block-Digest\":\"sha1:A4P236V47ILMTPYLJVJTA5ERGBXOHROE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514572471.35_warc_CC-MAIN-20190916015552-20190916041552-00140.warc.gz\"}"}
http://footballfeverpodcast.com/Maths%20Ncert%20Solutions%E3%82%AF%E3%83%A9%E3%82%B97%E7%AC%AC11%E7%AB%A0%E6%BC%94%E7%BF%9211.3
[ " Maths Ncert Solutionsクラス7第11章演習11.3\n\n# NCERT Solutions for Class 11 Maths Chapter 7 - VEDANTU.\n\nView NCERT solutions of all the questions of NCERT, including Examples, Exercises, Miscellaneous and Supplementary Questions for Class 6 to 12 free at teachoo. Videos of questions and theory are available for your reference. NCERT Solutions for Class 11 Maths Chapter 1- Sets The major concepts of Maths covered in Chapter 1- Sets of NCERT Solutions for Class 11 includes: 1.1 Introduction 1.2 Sets and their Representations 1.3 The Empty Set 1.4.\n\nThe NCERT solutions for the questions given in Chapter 4, Principle of Mathematical Induction, of the Class 11 NCERT textbooks are available here. In this chapter, students learn about the Principle of Mathematical Induction in detail. Get free NCERT Solutions for CBSE class 11 Maths NCERT Solutions in Videos, Chapter-wise detailed solutions to the questions of the NCERT textbooks for class 11 Maths X Get a free home demo of LearnNext Available for.\n\nCBSE NCERT Solutions For Class 9th Maths Chapter 7: Triangles. NCERT Solutins For Class 9 Mathematics. Exercise 7.1, Exercise 7.2, Exercise 7.3, Exercise 7.4, Exercise 7. Free NCERT Solutions Class 12 Maths chapter 3 Matrices in PDF form download, Matrices chapter is one of the easy and scoring chapters as per CBSE examination. Go through the chapter completing NCERT and Exemplar books and practicing the previous year.\n\nNCERT Books are very useful for students who want to score good percentage in their Exams. We provide NCERT textbooks and solution for all class 8, class 9, class 10, class 11, class 12. In this post, We provide NCERT Solutions for Class 11 Maths in PDF format with direct download option. ncrtsolutions.in ncrtsolutions.in NCERT Solutions for Class 11 Maths Chapter 5 Complex Numbers and Quadratic Equations Class 11 Chapter 5 Complex Numbers and Quadratic Equations Exercise 5.1, 5.2, 5.3. NCERT Solutions for class 11 Science Math solved by subject matter experts. NCERT CBSE latest book edition solutions. Free downloadable chapter wise NCERT solutions for class 11 Science Math in PDF format to help students. 2019/09/19 · ダウンロードNCERT Solutions, CBSE & State Board 6th-12th Class APK最新バージョン3.04-co.gradeup.k12 - インドの#1無料学習アプリ:ただ写真を撮ると任意の質問に答えを得る. Get here NCERT Solutions for Class 12 Maths Chapter 11. These NCERT Solutions for Class 12 of Maths subject includes detailed answers of all the questions in Chapter 11 – Three Dimensional Geometry provided in NCERT Book which is prescribed for class 12 in schools.\n\n1. CBSE NCERT Solutions For Class 7th Maths Chapter 11: Perimeter and Area. NCERT Solutins For Class 7 Mathematics. Exercise 11.1, Exercise 11.2, Exercise 11.3, Exercise 11.4. Class VII NCERT Solutions.\n2. 2014/02/06 · NCERT Solutions for Class 7 Maths Chapter 11 Ex11.1 Q2 2. Find the area of a square park whose perimeter is 320 m. Follow us on Facebook: faceboo.\n3. NCERT Solutions for Class 12th Maths Chapter 11 – Three Dimensional Geometry National Council of Educational Research and Training NCERT Book Solutions for. Anand Meena Full time entrepreneur, likes to indulge.\n4. Get NCERT solutions for Class 11 Maths Free with videos. All exercise questions, supplementary questions, examples and miscellaneous are solved with important questions marked.Most of the chapters we will study in Class 11.\n\n2017/12/19 · NCERT 11 math solutions– In this article, you will get NCERT solutions of CBSE Class 11 NCERT Math book. Solutions of all the chapters are available in pdf. Free download of NCERT chapter-wise solutions for class 11 Maths. 2019/11/26 · ダウンロードFree IIT JEE Maths Solutions NCERT CBSE Doubts App APK最新バージョン7.8.1-com.doubtnutapp - オンライン数学研究アプリ - 無料IIT JEEモックペーパー、最高のNCERTビデオソリューションCBSE.\n\n## NCERT Solutions for Class 7 Maths Chapter 11 Ex11.1 Q2.\n\nNCERT Solutions for Class 11 Maths in PDF format are available to download. NCERT books as well as books for revision are also available to download along with the answers given at the end of the book. Revision books contains. sin 11 — sin x It is la-lown that, Adding 1 and 2, we obtain Show that iffandg are defined as and It is la-lown that if rx is an even function, then if rx is an odd function, then Hence, the correct answer is C TUTORIALS Title. ncrtsolutions.in ncrtsolutions.in NCERT Solutions for Class 11 Maths Chapter 11 Conic Sections Class 11 Chapter 11 Conic Sections Exercise 11.1, 11.2, 11.3. ダウンロードCommerce Maths Part 2 Solution For 12th HSC Board APK最新バージョン1.0-com.yia.\n\nChapter 11: Mensuration 11.1 Introduction We have learnt that for a closed plane figure, the perimeter is the distance around its boundary and its area is the region covered by it.. CBSE & NCERT Solutions for Class 11 Maths Circle. Chapter-wise solutions, video, study material for class 11 Maths solved by expert teachers. Question: Find the centre and radius of the circle x2y2 -2x 4y – 8 = 0. - get. NCERT Solutions for class 7 Math solved by subject matter experts. NCERT CBSE latest book edition solutions. Free downloadable chapter wise NCERT solutions for class 7 Math in PDF format to help students in homework and. 2016/11/29 · NCERT SolutionsPart - 3 - Perimeter and Area notes for Class 7 is made by best teachers who have written some of the best books of Class 7. It has gotten 11239 views and also has 4.65 rating. You can.\n\n2019/11/13 · ダウンロードVedantu: Learning App for Class6-10, IITJEE & NEET APK最新バージョン1.4.0-com.vedantu.app - CBSE、ICSE、州委員会:スタディPDF、NCERTソリューション📚ライブクラス🔴. NCERT Solutions for Class 11 Maths Three Dimensional Geometry Takshila Learning offers Class 11 Maths NCERT solutions. NCERT Solutions are an important part of learning for those who want to score well in their Class 11th Maths exam. 2016/10/21 · NCERT SolutionsPart - 1 - Exponents and Powers notes for Class 7 is made by best teachers who have written some of the best books of Class 7. It has gotten 14499 views and also has 4.68 rating. You can.\n\n• Categories Class 11, NCERT Solutions Post navigation 1 thought on “NCERT Solutions class-11 Maths Exercise 11.3” Tanuj kumar December 5, 2019 at 7:56 pm I want to help in my study Leave a Comment Cancel reply Name.\n• NCERT Solutions class 12 Maths Exercise 11.3 7. Find the intercepts cut off by the plane Ans. Equation of the plane is Comparing with intercept form, we have.\n• - No.1 online tutoring company in India provides you Free PDF download of NCERT Solutions for Class 11 Maths Chapter 7 - Permutations and Combinations solved by Expert Teachers as per NCERT CBSE Book.\n• 2014/02/06 · NCERT Solutions for Class 7 Maths Chapter 11 Ex11.1 Q3 3. Find the breadth of a rectangular plot of land, if its area is 440 m and the length is 22 m. Also find its perimeter. Follow us on Facebook: https." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6167286,"math_prob":0.66669923,"size":5755,"snap":"2020-45-2020-50","text_gpt3_token_len":2047,"char_repetition_ratio":0.20552947,"word_repetition_ratio":0.12684032,"special_character_ratio":0.2488271,"punctuation_ratio":0.11354962,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95824844,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-20T18:05:55Z\",\"WARC-Record-ID\":\"<urn:uuid:2b35f71e-ed69-454c-bf03-7c171ddc1bdc>\",\"Content-Length\":\"19021\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:201fda10-4970-4837-a4a2-37d98fc228bc>\",\"WARC-Concurrent-To\":\"<urn:uuid:1658104e-69b4-44f7-8a2d-860adf44056a>\",\"WARC-IP-Address\":\"80.241.215.125\",\"WARC-Target-URI\":\"http://footballfeverpodcast.com/Maths%20Ncert%20Solutions%E3%82%AF%E3%83%A9%E3%82%B97%E7%AC%AC11%E7%AB%A0%E6%BC%94%E7%BF%9211.3\",\"WARC-Payload-Digest\":\"sha1:CQUXIM5MR2LIZV3IKFUF5LQ6BH4V5W7G\",\"WARC-Block-Digest\":\"sha1:HD4INCWCWIBOUQ6BVZNKRL7BZPHADWEF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107874026.22_warc_CC-MAIN-20201020162922-20201020192922-00651.warc.gz\"}"}
https://iksinc.online/category/clustering/
[ "How Similar are Two Clustering Results\n\nWhile performing clustering, it is not uncommon to try a few different clustering methods. In such situations, we want to find out how similar are the results produced by different clustering methods. In some other situations, we may be interested in developing a new clustering algorithm or might be interested in evaluating a particular algorithm for our use. To do so, we make use of data sets with known ground truth so that we can compare the results against the ground truth. One way to evaluate the clustering results in all these situations is to make use of a numerical measure known as Rand index (RI). It is a measure of how similar two clustering results or groupings are.\n\nRand Index (RI)\n\nRI works by looking at all possible unordered pairs of examples. If the number of examples or data vectors for clustering is n, then there are", null, "$\\binom{n}{2}(=n(n-1)/2)$ pairs. For every example pair, there are three possibilities in terms of grouping. The first possibility is that the paired examples are always placed in the same group as a result of clustering. Lets count how often this happens over all pairs and represent that count by a. The second possibility is that the paired examples are never grouped together. Lets use b to represent the count of all pairs that are never grouped together. The third possibility is that the paired examples are sometimes grouped and sometimes not grouped together. The first two possibilities are treated as paired examples in agreement while the third possibility represents pairs in confusion. The RI of two groupings is then calculated by the following formula:", null, "$\\text{RI} = \\frac{\\text{Count of Pairs in Agreement}}{\\text{Total Number of Pairs}} = \\frac{(a+b)}{\\binom{n}{2}}$\n\nWe can notice from the formula that RI can never exceed 1 and its possible lowest value is 0.\n\nLets take an example to illustrate RI calculation. Say we have five examples clustered into two clusters using two different clustering methods. The first method groups examples A, B, and C into one group and examples D and E into another group. The second clustering method groups A and B together and C, D, and E together. To compute RI for this example, lets first list all possible unordered pairs of five examples at hand. We have 10 (n*(n-1)/2) such pairs. These are: {A, B}, {A, C},  {A, D}, {A, E}, {B, C}, {B, D}, {B, E}, {C, D}, {C, E}, and {D, E}. Examining these pairs, we notice that the pair {A, B} and {D, E} are always grouped together by the both clustering methods. Thus, the value of a is two. We also notice that four pairs, {A, D}, {A, E}, {B, D}, and {B, E}, never occur together in any clustering result. Thus, the value of b is four. The Rand index (RI) is then 0.6.\n\nAdjusted Rand Index (ARI)\n\nRI suffers from one drawback; it yields a high value for pairs of random partitions of a given set of examples. To understand this drawback, think about randomly grouping a number of examples. When the number of partitions in each grouping, that is when the number of clusters, is increased, more and more example pairs are going to be in agreement because they are more likely to be not grouped together. This will result in a high RI value. Thus, RI is not able to take into consideration effects of random groupings. To counter this drawback, an adjustment is made to the calculations by taking into consideration grouping by chance. This is done by using a specialized distribution, the generalized hyper-geometric distribution, for modeling the randomness. The resulting measure is known as the adjusted Rand index (ARI).\n\nARI is best understood using an example. So lets look at the example of two clustering results used earlier. Lets create a contingency table summarizing the results of two clustering methods. In this case, it is a 2×2 table wherein each cell of the table shows the number of times an example occurs in two clusters referenced by the corresponding row and column.", null, "In the table above, M1C1 and M1C2 refer to two clusters formed by a hypothetical method-1. M2C1 and M2C2 similarly refer to two clusters formed by method-2. For clarity sake, I have included the examples forming the respective clusters next to M1C1, M1C2 etc. The top left cell has an entry of 2 because the clusters M1C1 and M2C1 share two examples, A and B. Entries in the other cells have similar meaning. The numbers to the right and below the contingency table show the sums along respective rows and columns.\n\nTo write the formula for ARI, lets generalize the entries of the contingency table using the following notation:", null, "$n_{ij} = \\text{Number of examples common to cluster i and cluster j}$", null, "$a_i = \\text{Sum of contingency cells in row i}$", null, "$b_j = \\text{Sum of contingency cells in column j}$\n\nThe ARI is then expressed as:", null, "The first term in the numerator is known as index, and the second term as expected index. The first term in the denominator is called maximum index, and the second term of the denominator is same as the second term of the numerator. With these designations of the terms, the ARI is often expressed as", null, "$\\text{ARI} = \\frac{\\text{index - expected index}}{\\text{maximum index - expected index}}$\n\nNow lets go back to the contingency table for our example and calculate the different parts of the ARI formula first. We have:", null, "$\\sum_{ij}\\binom{n_{ij}}{2} = \\binom{2}{2} + \\binom{1}{2} + \\binom{0}{2} + \\binom{2}{2} = (1 + 0 + 0 + 1) = 2$", null, "$\\sum_i\\binom{a_i}{2} = (\\binom{3}{2}+\\binom{2}{2}) = (3 + 1) = 4$", null, "$\\sum_j\\binom{b_j}{2} = (\\binom{2}{2}+\\binom{3}{2}) = (1 + 3) = 4$\n\nThus the index value for our example is 2; the expected index value is 1.6 (4*4/(5*4/2)). The maximum index value is 4. Therefore, the ARI for our example is (2 – 1.6)/(4 – 1.6), which equals 0.1666. We see that RI is much higher than ARI; this is typical of these indices. While RI always lies in 0-1; ARI can achieve a negative value also.\n\nARI is not the only measure to compare two sets of groupings. Mutual information based measure, adjusted mutual information (AMI), is also used for this purpose. May be in one of the future posts, I will describe this measure." ]
[ null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://iksinc.files.wordpress.com/2019/05/screen-shot-2019-05-03-at-8.12.48-pm.png", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://iksinc.files.wordpress.com/2019/05/ari-1.png", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null, "https://s0.wp.com/latex.php", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9339709,"math_prob":0.9822135,"size":5440,"snap":"2019-43-2019-47","text_gpt3_token_len":1211,"char_repetition_ratio":0.13576159,"word_repetition_ratio":0.024109015,"special_character_ratio":0.22352941,"punctuation_ratio":0.12320144,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9988233,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-23T21:27:58Z\",\"WARC-Record-ID\":\"<urn:uuid:9814d8f2-a903-44bd-8606-61cbc7328cbe>\",\"Content-Length\":\"79938\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0d23138d-b9ee-466f-affe-02873f744c51>\",\"WARC-Concurrent-To\":\"<urn:uuid:c523795a-1756-43da-a674-979baa0bac43>\",\"WARC-IP-Address\":\"192.0.78.25\",\"WARC-Target-URI\":\"https://iksinc.online/category/clustering/\",\"WARC-Payload-Digest\":\"sha1:KRFR6S5FCASN6AP34LR32HVFEK2XJYQJ\",\"WARC-Block-Digest\":\"sha1:FHWPMVXC7LSMB2XAIEXPO7OLHFFTZ2O6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570987836295.98_warc_CC-MAIN-20191023201520-20191023225020-00081.warc.gz\"}"}
https://stat.ethz.ch/pipermail/r-help/2011-September/290923.html
[ "# [R] Error in optim function.\n\nBerend Hasselman bhh at xs4all.nl\nTue Sep 27 06:53:46 CEST 2011\n\n```jango wrote:\n>\n> I'm trying to calculate the maximum likelihood estimate for a binomial\n> distribution. Here is my code:\n>\n> y <- c(2, 4, 2, 4, 5, 3)\n> n <- length(y)\n> binomial.ll <- function (pi, y, n) { ## define log-likelihood\n> output <- y*log(pi)+(n-y)*(log(1-pi))\n> return(output)\n> }\n> binomial.mle <- optim(0.01, ## starting value\n> binomial.ll, ## log likelihood\n> method=\"BFGS\", ## optimization method\n> hessian=TRUE, ## numerial Hessian\n> control=list(fnscale=-1), ## max, not min\n> y=y, n=n)\n> binomial.mle.par <- c(binomial.mle\\$par, -1/binomial.mle\\$hessian[1,1])\n> binomial.mle.par <- as.matrix(binomial.mle.par)\n> rownames(binomial.mle.par) <- c(\"lambda\", \"s.e.\")\n> colnames(binomial.mle.par) <- c(\"MLE\")\n> print(binomial.mle.par)\n>\n> When I do this I get the following error message:\n>\n> Error in optim(0.01, binomial.ll, method = \"BFGS\", hessian = TRUE, control\n> = list(fnscale = -1), :\n> objective function in optim evaluates to length 6 not 1\n>\n>\n\nAfter defining your binomial.ll function do this\n\nbinomial.ll(0.01,y,n)\n\nand you will see that your function is returning a vector of length 6, which\nis the length of y.\nYour function is returning a vector but should return a scalar.\nA likelihood is a scalar so maybe return(sum(output)).\n\nBerend\n\n--\nView this message in context: http://r.789695.n4.nabble.com/Error-in-optim-function-tp3846001p3846179.html\nSent from the R help mailing list archive at Nabble.com.\n\n```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5443074,"math_prob":0.6189061,"size":1567,"snap":"2020-10-2020-16","text_gpt3_token_len":482,"char_repetition_ratio":0.15547025,"word_repetition_ratio":0.008583691,"special_character_ratio":0.3299298,"punctuation_ratio":0.21428572,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9987271,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-17T04:48:15Z\",\"WARC-Record-ID\":\"<urn:uuid:70153c16-0322-4ad2-9373-9eeab44bbef1>\",\"Content-Length\":\"4780\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4a2098be-6fcd-4c7b-aa7e-1ac4e209655d>\",\"WARC-Concurrent-To\":\"<urn:uuid:7bedea23-e57b-4d83-9c6d-d0bad7591bf5>\",\"WARC-IP-Address\":\"129.132.119.195\",\"WARC-Target-URI\":\"https://stat.ethz.ch/pipermail/r-help/2011-September/290923.html\",\"WARC-Payload-Digest\":\"sha1:4ISVHGFAFG5YBPUCAMQCJGXODWQKZL3C\",\"WARC-Block-Digest\":\"sha1:J5G45YN772TMLIBAGK5GGJQOZYNXTH2I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875141653.66_warc_CC-MAIN-20200217030027-20200217060027-00211.warc.gz\"}"}
https://socratic.org/questions/how-do-you-solve-and-check-for-extraneous-solutions-in-abs-2t-3-t
[ "# How do you solve and check for extraneous solutions in abs(2t-3) = t?\n\n##### 1 Answer\nAug 1, 2015\n\n$\\textcolor{red}{t = 3}$ is a solution.\n$\\textcolor{red}{t = 1}$ is an extraneous solution.\n\nSOLVE\n\n$| 2 t - 3 | = t$\n\nWe need to write two different equations without the absolute value symbols and solve for $t$.\n\nThese equations are:\n\n(1): $\\left(2 t - 3\\right) = t$\n(2): $- \\left(2 t - 3\\right) = t$\n\nSolve Equation 1:\n\n$2 t - 3 = t$\n\nSubtract $t$ from each side.\n\n$t - 3 = 0$\n\nAdd $3$ to each side.\n\n$t = 3$\n\nSolve Equation 2:\n\n−(2t-3) = t\n\nRemove parentheses.\n\n$- 2 t + 3 = t$\n\nAdd $2 t$ to each side.\n\n$3 = 3 t$\n\nDivide each side by $3$.\n\n$t = 1$\n\nThe solutions are $t = 1$ and $t = 3$.\n\nCHECK FOR EXTRANEOUS SOLUTIONS:\n\nIf $t = 1$,\n\n$| 2 t - 3 | = t$\n$| 2 \\left(1\\right) - 3 | = 3$\n$| 2 - 3 | = 5$\n$| - 1 | = 5$\n$1 = 5$\n\nThis is impossible, so $t = 1$ is an extraneous solution.\n\nIf $t = 3$,\n\n$| 2 t - 3 | = t$\n$| 2 \\left(3\\right) - 3 | = 3$\n$| 6 - 3 | = 3$\n$| 3 | = 3$\n$3 = 3$\n\n$t = 3$ is a solution." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6532645,"math_prob":1.00001,"size":518,"snap":"2021-21-2021-25","text_gpt3_token_len":139,"char_repetition_ratio":0.10700389,"word_repetition_ratio":0.0,"special_character_ratio":0.23359074,"punctuation_ratio":0.10204082,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000074,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-20T21:51:25Z\",\"WARC-Record-ID\":\"<urn:uuid:35381d5d-cb72-4a90-a632-00a1511a8d8b>\",\"Content-Length\":\"34950\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:afd9c54b-fa84-4f20-b858-62be46b7d767>\",\"WARC-Concurrent-To\":\"<urn:uuid:6bd1e35d-04cc-45c8-89f3-05d558031352>\",\"WARC-IP-Address\":\"216.239.32.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-do-you-solve-and-check-for-extraneous-solutions-in-abs-2t-3-t\",\"WARC-Payload-Digest\":\"sha1:L6A2SBIQYLYPHS7OE573VYGSRE2RCBII\",\"WARC-Block-Digest\":\"sha1:4BS3QVO6YO3WCV2QKHL56EAETIZJ6I3J\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488257796.77_warc_CC-MAIN-20210620205203-20210620235203-00453.warc.gz\"}"}
http://web.mat.bham.ac.uk/R.W.Kaye/logic/cardarith.html
[ "# Cardinals\n\n## 1. Introduction\n\nThis page discusses cardinals and cardinal arithmetic, both with and without the Axiom of Choice. In general the subject is a very rich one with many results and still many difficult problems at the research level.\n\n## 2. Cardinal arithmetic\n\nCardinal numbers are discussed at length in the beginning of Section 11.1 of The Mathematics of Logic. In particular two sets $X , Y$ have the same cardinality or are equipolent (written $X ≈ Y$) if there is a bijection $f : X → Y$. This is an equivalence relation on sets. Informally you can think of the cardinality of a set as the equivalence class of the set by this equivalence relation, but this raises a problem: the cardinality of a set if defined this way is not itself a set but a class. To get round this problem one of two alternative definitions are usually provided.\n\nIn the absence of the Axiom of Choice, the following definition is usually preferred.\n\nDefinition.\n\n$card ( X )$, the cardinality of $X$, is the set $u u ≈ X ∧ ∀ v ( rank ( v ) < rank ( u ) → ¬ v ≈ X )$.\n\nThus the cardinality of a set is the set of sets equipolent to it of minimal rank. Since this is a subset of some $V α$ it is a set.\n\nIf the Axiom of Choice holds then a simpler alternative is available.\n\nDefinition.\n\nBy the well-ordering principle every set $X$ is well-orderable, and hence in 1–1 correspondence with an ordinal. Thus there is a least ordinal $α ≈ X$. We define $card ( X )$ to be this ordinal.\n\nThis definition has the advantage that $card ( X )$ is a canonically chosen set with the same cardinality as $X$. Note that the two definitions, as just given, are not compatible. In practice, the definition (any definition) of $card ( X )$ is simply a convenience rather than essential, since results about a cardinal are usually proved by first taking a set that has that cardinality. Here we will implicitly assume AC holds and take the second definition of cardinal, but indicate which of the theorems we prove do not need choice.\n\nDefinition.\n\nAn ordinal $α$ is initial if there is no bijection $f : α → β$ for $β < α$.\n\nFor example, $ω$ is initial but $ω + 1$ is not. (This is a consequence of the next proposition below.)\n\nGiven a set $X$, the least ordinal in 1–1 correspondence with it is an initial ordinal, since if not there would be a smaller ordinal in 1–1 correspondence with $X$, because 1–1 correspondences compose. Thus cardinals are initial ordinals. Conversely, all initial ordinals are their own cardinals.\n\nProposition.\n\nAn infinite initial ordinal is a limit ordinal.\n\nProof.\n\nIf $α = β + 1$ is infinite there is a bijection $β → α$ defined by $f ( 0 ) = β$, $f ( n +1 ) = n$ for $n ∈ ω$ and $f ( γ ) = γ$ for all other $γ$.\n\nThe theorems and proofs in Sections 11.1 and 11.3 should be studied carefully. All of the proofs there are valid in $ZF$ or $ZFC$, and where Zorn's lemma was used it is known that some form of the Axiom of Choice is required for the result in question. In particular the definitions of cardinal arithmetic and the order relation on cardinals is important. We define\n\nDefinition.\n\nFor sets $A , B$, $card ( A ) ⩽ card ( B )$ if there is an injection $f : A → B$. We define $card ( A ) ⩽ * card ( B )$ if $A = ∅$ or there is a surjection $g : B → A$.\n\nHowever, the Zorn's lemma proof in the book that cardinal arithmetic has $κ 2 = κ$ for all infinite $κ$ is slightly long-winded. For those that know about ordinals (including everyone reading these web pages) there is a different proof.\n\nFirst we define bijections $f α : α × α → F ( α )$ recursively on ordinals $α$. Define $F ( 0 ) = 0$, $F ( α + 1 ) = F ( α ) + α + α + 1$, and $F ( λ ) = ⋃ α < λ F ( α )$ for limits $λ$. Define $f 0 : 0 × 0 → 0$ to be the empty function, and $f α + 1 ( β , γ ) = f α ( β , γ )$ if $β , γ < α$, $f α + 1 ( α , γ ) = F ( α ) + γ$ if $γ < α$, and $f α + 1 ( β , α ) = F ( α ) + α + β$ if $β ⩽ α$; finally $f λ ( β , γ ) = f α ( β , γ )$ for any $α$ with $β , γ < α < λ$. You can check that these define bijections $f α : α × α → F ( α )$ as claimed and $f α$ extends $f β$ for $α > β$.\n\nProposition.\n\nIf $κ$ is an infinite initial ordinal then there is a bijection $κ × κ → κ$.\n\nProof.\n\nSuppose $κ$ is initial and for every smaller initial ordinal $μ$ there is a 1–1 correspondence $μ × μ → μ$. Consider $f κ : κ × κ → F ( κ )$. If $F ( κ ) ⩽ κ$ we are finished, by Schröder–Bernstein. So $κ < F ( κ )$. Also $F ( μ ) < κ$ for all initial $μ < κ$ since $F ( μ )$, $μ × μ$ and $μ$ all have the same cardinality strictly less than $κ$. Let $F κ ( α , β ) = κ$ and let $δ = max ( α , β ) +1$ so $κ$ is in the range of $f δ$. Now $δ < κ$ as $κ$ is initial and hence is a limit ordinal. Therefore there is a bijection from $δ$ to $μ$, some initial ordinal less than $κ$, and this induces an impossible bijection from $F ( δ ) > κ$ to $F ( μ ) < κ$.\n\nThe previous result does not need the axiom of choice, but the conclusion that $κ × κ = κ$ for all infinite cardinals $κ$ does not follow from it without choice as (in the absence of choice) some sets are not well-orderable.\n\n## 3. Alephs and Hartog's function\n\nThe axiom of choice is not required in this section either.\n\nDefinition.\n\nGiven any set $X$, we define $ℵ ( X ) = α ∈ On there is an injection α → X$.\n\nLemma.\n\nFor all sets $X$, $ℵ ( X )$ is a set, and hence an ordinal. There is no injection $ℵ ( X ) → X$ and $ℵ ( X )$ is the least ordinal with this property.\n\nProof.\n\nLet\n\nSo $W$ is a set by separation and power set axioms and there is for each $( y , < ) ∈ W$ a unique ordinal $α y$ order-isomorphic to $( y , < )$. Define $f : ( y , < ) ↦ α y$ and by replacement the image of $f$ is a set, and note that this image is $ℵ ( X )$. There is no injection $ℵ ( X ) → X$ for if there was we would have $ℵ ( X ) ∈ ℵ ( X )$.\n\nProposition.\n\nFor all $X$, $ℵ ( X )$ is initial.\n\nProof.\n\nIf not, $f : ℵ ( X ) → β < α$ and $g : β → y ⊆ x$ are bijections then their composition maps $ℵ ( X ) → X$ injectively, so $ℵ ( X ) ∈ ℵ ( X )$.\n\nInitial ordinals are sometimes called Alephs because of the following.\n\nDefinition.\n\n$ℵ 0 = ω$, the first infinite initial ordinal; $ℵ α + 1 = ℵ ( ℵ α )$; and $ℵ λ = ⋃ α < λ ℵ α$ for limit ordinals $λ$.\n\nProposition.\n\nEach $ℵ α$ is initial; every initial ordinal is $ℵ α$ for some $α$.\n\nProof.\n\nIf $λ$ is a limit and $f : ℵ λ → β < ℵ λ$ is a bijection then a restriction of $f$ is an injection $ℵ α + 1 → β ⊆ ℵ α$, contradicting Schröder–Bernstein. Thus every $ℵ α$ is initial as the result is obvious for the zero and sucessor cases. The converse is proved by taking an initial ordinal $α$ and considering the least ordinal $β$ such that $α < ℵ β$. This $β$ exists by the fact that $α β ⩾ β$ for all $β$, and must be a successor. For if $β$ is a limit, by definition of $α β$ there would be $δ < β$ with $α < ℵ δ$. Thus $β = γ + 1$ and $ℵ γ ⩽ α < ℵ γ + 1$ so there is an injection $α → ℵ γ$ as $α ∈ ℵ ( ℵ γ )$, hence $α = ℵ γ$ as $α$ is initial.\n\nUnder the Axiom of Choice, every set is well-ordered so is in one-to-one correspondence with an ordinal. Thus the Axiom of Choice implies every cardinal is an aleph.\n\nHartog's $ℵ$ function gives one way to make a larger cardinal from a smaller one. Another way is to use the power set function.\n\nProposition.\n\nLet $X$ be a set. Then there is no bijection between $X$ and $P ( X )$.\n\nProof.\n\nSuppose $f : X → P ( X )$ is a bijection and let $y = u ∈ x u ∉ f ( u )$. We get a contradiction by taking $u ∈ x$ such that $y = f ( u )$ and trying to decide if $u ∈ f ( u )$ or not.\n\nDefinition.\n\nFor a set $X$, $ℶ ( X )$ is the cardinality of $P ( X )$.\n\nThus we have two ways to make a cardinality just a bit bigger than $ω$: either $ℵ ( ω )$ or $ℶ ( ω )$. Assuming the Axiom of Choice we have $ℵ ( ω ) ⩽ ℶ ( ω )$. Cantor's Continuum Hypothesis (CH) is the statement that $ℵ ( ω ) = ℶ ( ω )$. Whether or not this is true remains a moot point, but it has been shown to be independent of the ZFC axioms (assuming ZFC to be consistent.\n\nMore generally, the Generalised Continuum Hypotheis (GCH) is the statement $ℶ ( ℵ α ) = ℵ α + 1$ for all $α$. Again, this is consistent with the axioms of ZFC but not provable in them. It can be shown that GCH implies the axiom of choice, so assuming GCH makes no sense without also assuming AC.\n\n## 4. Trichotomy\n\nThe Trichotomy theorem (Proposition 11.18 in The Mathematics of Logic) is equivalent to the Axiom of Choice. To see this, let $X$ be any set. Then it is not the case that $ℵ ( X ) ⩽ X$, by the construction of Hartog's $ℵ$ function, so by Trichotomy $X ⩽ ℵ ( X )$. In other words there is an injection $X → ℵ ( X )$ and as $ℵ ( X )$ is an ordinal a well ordering on $X$ may be defined via this injection and $∈$ on $ℵ ( X )$. Under a particular assumption on the arithmetic of certain cardinals, an interesting weakening of trichotomy can be obtained without Choice. In this section $κ , λ$ are just names for infinite cardinals: the fact we call them this is not intended to mean that they are necessarily ordinals. (Sometimes they will be ordinals, sometimes not.)\n\nProposition.\n\nIf $κ , λ$ are cardinals such that $κ + λ = κ λ$ then $κ ⩽ λ$ or $λ ⩽ * κ$.\n\nProof.\n\nSuppose $K , L$ are disjoint sets with cardinalities $κ , λ$ and $f : K ∪ L → K × L$ is a bijection and $π : K × L → L$ is the projection map. If the composite of $K → K × L → L$ is onto then we know that $λ ⩽ * κ$. Otherwise there is $x ∈ L$ such that for each $y ∈ K$ the unique $z ∈ K ∪ L$ such that $f ( z ) = ( y , x )$ is in $L$. This defines an injection $y ↦ z$ taking $K$ into $L$. Thus $κ ⩽ λ$.\n\nThis result has the consequence that our theorem on cardinal arithmetic is in fact equivalent to the axiom of choice.\n\nIf $κ 2 = κ$ for all infinite cardinals $κ$ then the Axiom of Choice holds.\n\nProof.\n\nLet $X$ be an arbitrary set with cardinality $λ$ and let $κ = ℵ ( X )$. Then $κ + λ = ( κ + λ ) 2 ⩾ κ λ ⩾ κ + λ$ so by Schröder–Berstein $κ + λ = κ λ$. Thus by the previous either $κ ⩽ λ$ or $λ ⩽ * κ$. But $κ ⩽ λ$ is impossible by the definition of $ℵ ( X )$ and hence $λ ⩽ * κ$ so there is a surjection $f : κ → X$ and hence an injection $g : X → κ$ given by $g ( x )$ is the least $β < κ$ with $f ( β ) = x$. This allows us to define a well-ordering on $X$ as before.\n\nOn the other hand, the proposition $κ + κ = κ$ for all infinite cardinals $κ$ is known to be strictly weaker than the axiom of choice." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93819374,"math_prob":0.99984586,"size":7994,"snap":"2020-10-2020-16","text_gpt3_token_len":1771,"char_repetition_ratio":0.17809762,"word_repetition_ratio":0.006232687,"special_character_ratio":0.21278459,"punctuation_ratio":0.119798236,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.000007,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-24T18:08:34Z\",\"WARC-Record-ID\":\"<urn:uuid:cde813d4-9c97-4292-a96c-377bce1abe57>\",\"Content-Length\":\"34010\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:af9cfeee-8bab-4408-83bc-29a5c92a3547>\",\"WARC-Concurrent-To\":\"<urn:uuid:8f7c3d58-5ea4-4830-95c4-20ab68c353b7>\",\"WARC-IP-Address\":\"147.188.55.16\",\"WARC-Target-URI\":\"http://web.mat.bham.ac.uk/R.W.Kaye/logic/cardarith.html\",\"WARC-Payload-Digest\":\"sha1:BG4JG3INUWPMFGNQATSHWVYT6DKMEF3T\",\"WARC-Block-Digest\":\"sha1:VLIKNCN55B6QENNDUXTPQQTAPMHSPT3J\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145966.48_warc_CC-MAIN-20200224163216-20200224193216-00312.warc.gz\"}"}
https://answers.everydaycalculation.com/simplify-fraction/69-154
[ "Solutions by everydaycalculation.com\n\n## Reduce 69/154 to lowest terms\n\n69/154 is already in the simplest form. It can be written as 0.448052 in decimal form (rounded to 6 decimal places).\n\n#### Steps to simplifying fractions\n\n1. Find the GCD (or HCF) of numerator and denominator\nGCD of 69 and 154 is 1\n2. Divide both the numerator and denominator by the GCD\n69 ÷ 1/154 ÷ 1\n3. Reduced fraction: 69/154\nTherefore, 69/154 simplified is 69/154\n\nMathStep (Works offline)", null, "Download our mobile app and learn to work with fractions in your own time:" ]
[ null, "https://answers.everydaycalculation.com/mathstep-app-icon.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7961075,"math_prob":0.79706156,"size":431,"snap":"2020-24-2020-29","text_gpt3_token_len":126,"char_repetition_ratio":0.11943794,"word_repetition_ratio":0.0,"special_character_ratio":0.387471,"punctuation_ratio":0.0952381,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9535792,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-05T23:30:39Z\",\"WARC-Record-ID\":\"<urn:uuid:87142bd8-0ff0-4352-9f62-ffd1dd41a2c9>\",\"Content-Length\":\"6411\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f31c17d5-7a44-4e03-bded-057a47e6e45e>\",\"WARC-Concurrent-To\":\"<urn:uuid:0ad6e365-980a-4e67-a272-0ce8b4a0751d>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/simplify-fraction/69-154\",\"WARC-Payload-Digest\":\"sha1:OWVDSKCPLXPLR2EPXGQFR25777VGCFI7\",\"WARC-Block-Digest\":\"sha1:X5GPKLAJRX642LW2I3NHOA7JPAO3Q2DY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655889877.72_warc_CC-MAIN-20200705215728-20200706005728-00572.warc.gz\"}"}
https://en.wikipedia.org/wiki/Training_data
[ "# Training, validation, and test sets\n\n(Redirected from Training data)\nJump to navigation Jump to search\n\nIn machine learning, a common task is the study and construction of algorithms that can learn from and make predictions on data. Such algorithms work by making data-driven predictions or decisions,:2 through building a mathematical model from input data.\n\nThe data used to build the final model usually comes from multiple datasets. In particular, three data sets are commonly used in different stages of the creation of the model.\n\nThe model is initially fit on a training dataset, that is a set of examples used to fit the parameters (e.g. weights of connections between neurons in artificial neural networks) of the model. The model (e.g. a neural net or a naive Bayes classifier) is trained on the training dataset using a supervised learning method (e.g. gradient descent or stochastic gradient descent). In practice, the training dataset often consist of pairs of an input vector (or scalar) and the corresponding output vector (or scalar), which is commonly denoted as the target (or label). The current model is run with the training dataset and produces a result, which is then compared with the target, for each input vector in the training dataset. Based on the result of the comparison and the specific learning algorithm being used, the parameters of the model are adjusted. The model fitting can include both variable selection and parameter estimation.\n\nSuccessively, the fitted model is used to predict the responses for the observations in a second dataset called the validation dataset. The validation dataset provides an unbiased evaluation of a model fit on the training dataset while tuning the model's hyperparameters (e.g. the number of hidden units in a neural network). Validation datasets can be used for regularization by early stopping: stop training when the error on the validation dataset increases, as this is a sign of overfitting to the training dataset. This simple procedure is complicated in practice by the fact that the validation dataset's error may fluctuate during training, producing multiple local minima. This complication has led to the creation of many ad-hoc rules for deciding when overfitting has truly begun.\n\nFinally, the test dataset is a dataset used to provide an unbiased evaluation of a final model fit on the training dataset. If the data in the test dataset has never been used in training (for example in cross-validation), the test dataset is also called a holdout dataset.\n\n## Training dataset\n\nA training dataset is a dataset of examples used for learning, that is to fit the parameters (e.g., weights) of, for example, a classifier.\n\nMost approaches that search through training data for empirical relationships tend to overfit the data, meaning that they can identify and exploit apparent relationships in the training data that do not hold in general.\n\n## Validation dataset\n\nA validation dataset is a dataset of examples used to tune the hyperparameters (i.e. the architecture) of a classifier. It is sometimes also called the development set or the \"dev set\". In artificial neural networks, a hyperparameter is, for example, the number of hidden units. It, as well as the testing set (as mentioned above), should follow the same probability distribution as the training dataset.\n\nIn order to avoid overfitting, when any classification parameter needs to be adjusted, it is necessary to have a validation dataset in addition to the training and test datasets. For example, if the most suitable classifier for the problem is sought, the training dataset is used to train the candidate algorithms, the validation dataset is used to compare their performances and decide which one to take and, finally, the test dataset is used to obtain[citation needed] the performance characteristics such as accuracy, sensitivity, specificity, F-measure, and so on. The validation dataset functions as a hybrid: it is training data used by testing, but neither as part of the low-level training nor as part of the final testing[citation needed].\n\nThe basic process of using a validation dataset for model selection (as part of training dataset, validation dataset, and test dataset) is:\n\nSince our goal is to find the network having the best performance on new data, the simplest approach to the comparison of different networks is to evaluate the error function using data which is independent of that used for training. Various networks are trained by minimization of an appropriate error function defined with respect to a training data set. The performance of the networks is then compared by evaluating the error function using an independent validation set, and the network having the smallest error with respect to the validation set is selected. This approach is called the hold out method. Since this procedure can itself lead to some overfitting to the validation set, the performance of the selected network should be confirmed by measuring its performance on a third independent set of data called a test set.\n\nAn application of this process is in early stopping, where the candidate models are successive iterations of the same network, and training stops when the error on the validation set grows, choosing the previous model (the one with minimum error).\n\n## Test dataset\n\nA test dataset is a dataset that is independent of the training dataset, but that follows the same probability distribution as the training dataset. If a model fit to the training dataset also fits the test dataset well, minimal overfitting has taken place (see figure below). A better fitting of the training dataset as opposed to the test dataset usually points to overfitting.\n\nA test set is therefore a set of examples used only to assess the performance (i.e. generalization) of a fully specified classifier.", null, "A training set (left) and a test set (right) from the same statistical population are shown as blue points. Two predictive models are fit to the training data. Both fitted models are plotted with both the training and test sets. In the training set, the MSE of the fit shown in orange is 4 whereas the MSE for the fit shown in green is 9. In the test set, the MSE for the fit shown in orange is 15 and the MSE for the fit shown in green is 13. The orange curve severely overfits the training data, since its MSE increases by almost a factor of four when comparing the test set to the training set. The green curve overfits the training data much less, as its MSE increases by less than a factor of 2.\n\n## Holdout dataset\n\nMost simply, part of the original dataset can be set aside and used as a test set: this is known as the holdout method.\n\n## Cross-validation\n\nA dataset can be repeatedly split into a training dataset and a validation dataset: this is known as cross-validation. These repeated partitions can be done in various ways, such as dividing into 2 equal datasets and using them as training/validation, and then validation/training, or repeatedly selecting a random subset as a validation dataset[citation needed]. To validate the model performance, sometimes an additional test dataset that was held out from cross-validation is used.\n\nCross-validation doesn't work in situations where you can't shuffle your data, most notably in time-series.\n\n## Hierarchical classification\n\nAnother example of parameter adjustment is hierarchical classification (sometimes referred to as instance space decomposition ), which splits a complete multi-class problem into a set of smaller classification problems. It serves for learning more accurate concepts due to simpler classification boundaries in subtasks and individual feature selection procedures for subtasks. When doing classification decomposition, the central choice is the order of combination of smaller classification steps, called the classification path. Depending on the application, it can be derived from the confusion matrix and, uncovering the reasons for typical errors and finding ways to prevent the system make those in the future. For example, on the validation set one can see which classes are most frequently mutually confused by the system and then the instance space decomposition is done as follows: firstly, the classification is done among well recognizable classes, and the difficult to separate classes are treated as a single joint class, and finally, as a second classification step the joint class is classified into the two initially mutually confused classes." ]
[ null, "https://upload.wikimedia.org/wikipedia/commons/thumb/0/0e/Traintest.svg/700px-Traintest.svg.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8762225,"math_prob":0.88907367,"size":10239,"snap":"2019-13-2019-22","text_gpt3_token_len":2167,"char_repetition_ratio":0.17420615,"word_repetition_ratio":0.032974,"special_character_ratio":0.22170134,"punctuation_ratio":0.13466597,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98149526,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-20T00:08:07Z\",\"WARC-Record-ID\":\"<urn:uuid:8c312171-23e4-4172-9408-d83e240d6583>\",\"Content-Length\":\"63098\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fb598a9e-1b79-4e40-91a1-382c02ce5a31>\",\"WARC-Concurrent-To\":\"<urn:uuid:da419af5-7668-423f-8271-5db4fbd8fa40>\",\"WARC-IP-Address\":\"208.80.153.224\",\"WARC-Target-URI\":\"https://en.wikipedia.org/wiki/Training_data\",\"WARC-Payload-Digest\":\"sha1:7THDXJK7MTDLJKQ5JJYKC4GW5TGBUWV6\",\"WARC-Block-Digest\":\"sha1:ENDSW4UEOKFV5RW4JWGHOJLYIW7F25GY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232255182.37_warc_CC-MAIN-20190519221616-20190520003616-00151.warc.gz\"}"}
http://cicadacrafts.com/mc790o/function-of-galvanometer-76e30e
[ "## function of galvanometer\n\nIt is to be made into an ammeter with a full-scale deflection equal to 1.25 A. Nov. 11, 2020. Electric current, any movement of electric charge carriers, such as subatomic charged particles (e.g., electrons having negative charge, protons having positive charge), ions (atoms that have lost or gained one or more electrons), or holes (electron deficiencies that may be thought of as positive…, Machine, device, having a unique purpose, that augments or replaces human or animal effort for the accomplishment of physical tasks. A galvanometer has a coil resistance of 70.2 ohms. For example, if we rotate the coil by 1°, the Torsional constant will be C, similarly, if we rotate by 2°, it is 2 C. However, N, I, and A remain constant. The restoring force in the spring and the wire keeps on increasing. A galvanometer is a device that measures or detects small currents with appropriate modification. Ans: The sensitive galvanometer shows a huge deflection in a small current. Ans: You can increase the sensitivity by: Decrease C by using phosphor bronze or Quartz wire because their Torsional constant is very low. The galvanometer is an instrument used to determine the presence, direction, and the strength of an electric current in a conductor. Early galvanometers were not calibrated, but improved devices were used as measuring instruments, called ammeters, to measure the current flowing through an electric circuit. They are as follows:1) Seebeck effect: The Seebeck effect states that when two different or unlike metals are joined together at two junctions, an electromotive force (emf) is generated at the two junctions. Medical Definition of galvanometer : an instrument for detecting or measuring a small electric current by movements of a magnetic needle or of a coil in a magnetic field Other Words from galvanometer Galvanometer, instrument for measuring a small electrical current or a function of the current by deflection of a moving coil. Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree.... …to await the construction of galvanometers sensitive enough to measure the minute currents generated in muscles and the small potential differences across nerve membranes. Here, Φ and Sin Ө is a variable, and I α Φ/ Sin Ө. Galvanometer acts as an actuator (it is a component of machine that moves or controls a mechanism or system, requiring a control signal and a source of energy) and produces a rotator deflection in response to the current that flows through a coil in a fixed constant magnetic field. Determine resistance galvanometer half deflection method find figure merit Physics Lab instruments, Laboratory Equipment, science Equipments, Educational Equipments Manufacturer, supplier exporters in India. The galvanometer is the current measuring instrument which is mostly used in bridges and potentiometer for showing the zero current. This strain in the wire is the Torsional strain. The ballistic galvanometer is designed to deflect its indicating needle (or mirror) in a way that is proportional to the total charge passing through its moving coil or to a voltage pulse of short duration. When an electric current passes through the […] Under the action of this torque, the coil rotates and the deflection in the coil in a moving coil galvanometer is directly proportional to the current flowing through the coil. Click hereto get an answer to your question ️ Explain, using a labelled diagram, the principle and working of a moving coil galvanometer. We use the radial field because it increases the strength of the magnetic field around the coil. See more. Any conventional galvanometer may also be employed as a ballistic type, but the latter has smaller torque and higher inertia in the coil. https://www.britannica.com/technology/galvanometer, Association for Psychological Science - The History Corner: The Galvanometer, The University of Texas at Austin - Galvanometer, National High Magnetic Field Laboratory - Magnetic Academy - Galvanometer, galvanometer - Student Encyclopedia (Ages 11 and up). The main function of a galvanometer is to measure the presence, direction, and electric current in the conductor This works on the principle of mechanical energy to electric energy Once the current is in the magnetic field after the supply is turned on, the magnetic torque can be realized. You might have seen a device with a G symbol in your physics lab a lot many times. 2. A current due to variation in the … ... e-t/RC), which gives us the voltage across the capacitor as a function of time. Q4: How Do You Increase the Sensitivity of a Galvanometer? Ans: The current sensitivity of a moving coil galvanometer is given as: This means in the fractional flow of current, there is a high deflection. Now, we will use a soft iron core (it is a strong ferromagnetic material) in place of a loop and cylindrical magnets in place of horseshoe magnets. It can be converted into ammeter to measure the currents in the order of an ampere or millimetre or in the range of milliamperes or microammeter to measure microampere current. Galvanometer. A field in which the magnetic field lines pass from N to South pole such that the area vector A➝is always perpendicular (radial) to the magnetic field B. This force is separated by the width of the coil. The null point means the situation in which no current flows through the circuit. Now, how to measure this Torsional strain? The coil, to which an indicating needle or mirror is attached, rotates under the action of the torque; the angle through which it rotates to balance the torsion of the suspension provides a measure of the current flowing in the coil. The two horseshoe electromagnets are placed around this coil. Apparatus required: A Battery (0-6V), high resistance box (0-10,000 ohms), low resistance box (0-100 ohms), rheostat, two one way keys, galvanometer (30-0-30), voltmeter (0-3V). By signing up for this email, you are agreeing to news, offers, and information from Encyclopaedia Britannica. The galvanometer has following applications. Anthropology This works on the rule of converting energy from electrical to mechanical. The deflection is a mechanical rotation derived from forces resulting from the current. Now, this coil keeps on rotating. As the current (that is to be measured) is sent to the coil. They are determined experimentally with regard to the scan parameters of the input signal (i.e., frequency and amplitude). Omissions? A moving coil galvanometer is a highly sensitive instrument. Updates? While measuring the current, we have to convert it into an ammeter. Because of this nature, it can detect current in the range of milliamperes. Therefore, a restoring torque develops on the wire and the spring. Let the area of each turn be A, and the magnetic field be B. Blog. STUDY. Here, V = I/R (R = The resistance of the coil). Let us know if you have suggestions to improve this article (requires login). Describes the construction and functioning of d'Arsonval galvanometer. Principle of Galvanometer. This area vector. 10.1). This broad category encompasses such simple devices as the inclined plane, lever, wedge, wheel and axle, pulley, and screw (the so-called simple machines) as well as…. Vedantu academic counsellor will be calling you shortly for your Online Counselling session. A galvanometer is an electromechanical instrument used for detecting and indicating an electric current. Assertion : Earth's magnetic field does not affect the working of a moving coil galvanometer. A galvanometer is a device that measures or detects small currents with appropriate modification. The galvanometer at left is wired as a voltmeter placed across the capacitor, and the galvanometer at right is wired as an ammeter, placed in series with the resistor and capacitor. Now. They are 1. Please enable Javascript and refresh the page to continue You may have thought what this device is and what is the use of it? The working principle of thermocouple is based on three effects, discovered by Seebeck, Peltier and Thomson. When a current-carrying coil is suspended in a uniform magnetic field it is acted upon by a torque. But, we desired I α Φ. The deflection is a mechanical rotation derived from forces resulting from the current. This is how we can convert galvanometer to ammeter and voltmeter to get the value of current sensitivity and voltage sensitivity respectively. The galvanometer has permanent … In galvanometer. A torque acts on the coil which rotates the coil. A galvanometer is a device that is used to detect small electric current or measure its magnitude. Hang a fine wire through a metal attached to terminal T1. A galvanometer also performs the functions of an ammeter, therefore by a slight modification, galvanometers can be made into ammeter. Solution for What is the function of galvanometer in a circuit? The purpose of this is to make the current directly proportional to the deflection. They are determined experimentally with regard to the scan parameters of the input signal (i.e., frequency and amplitude). In 1901, he successfully developed a new string galvanometer with very high sensitivity, which he used in his electrocardiograph. Aim: To convert a galvanometer (30-0-30) into a voltmeter of a given range (1.5 V) and to calibrate it. This is how we can create a radial field. The moving coil of a moving coil galvanometer, moves in a magnetic field produced by a permanent magnet. Our editors will review what you’ve submitted and determine whether to revise the article. Pro Lite, CBSE Previous Year Question Paper for Class 10, CBSE Previous Year Question Paper for Class 12. This area vector A➝ is perpendicular to the plane of the loop. In this article, we will study the moving coil type galvanometer. His device weighed 600 pounds (Fig. The ballistic galvanometer is designed to deflect its indicating needle (or mirror) in a way that is proportional to the total charge passing through its moving coil or to a voltage pulse of short duration. Hang a fine wire through a metal attached to terminal T, Attach one end of a spring to the bottom of the coil and another end to the terminal T, Here, Ө is the angle between the area vector and the magnetic field. The reason is the more the number of turns, the more is current and more is the torque produced. A soft iron core is used in a moving coil galvanometer. So, more the current, more is the torque, more is the deflection (rotation), more is the reading on the scale. We attach a concave mirror to the wire at the top of the coil so that deflection can be measured using a lamp and scale. A galvanometer works as an actuator, by producing a rotary deflection of a pointer, in response to electric current flowing through a coil in a constant magnetic field. Therefore, on rotation by  Φ°, it will be CΦ. Corrections? It can be converted into ammeter to measure the currents in the order of an ampere or millimetre or in the range of milliamperes or microammeter to measure microampere current. If galvanometer shows a high deflection in a small voltage, then it is a voltage sensitivity given by. Galvanometers invariably used a pointer needle as the indicator. The amount of emf generated is different for different combinations of the metals.2) Peltier effect: As per the Peltier ef… What is the function of (i) uniform radial magnetic field, (ii) soft iron core?Define the terms (i) current sensitivity and (ii) voltage sensitivity of a galvanometer. This is how we can create a radial field. Sorry!, This page is not available for now to bookmark. Initially, this circuit is open. Fix the jig onto an optical carrier and an optical bench. Any conventional galvanometer … b) Moving coil galvanometer: Principle: The underlying principle of moving coil galvanometer is that a current carrying coil, placed in a uniform magnetic field, experiences torque. Similarly, stronger the magnetic field; more is the torque produced. Construction: It consists of a rectangular coil wound on a non-conducting metallic frame and is suspended by phosphor bronze strip between the pole-pieces (N and S) of a strong perm an ent magnet.A soft iron core in cylindrical form is placed between the coil. One end of coil is attached to suspension … So, the use of a galvanometer is to detect whether there is a current in the circuit or not. The current and its intensity is usually indicated by a magnetic needle’s movement or that of a coil in a magnetic field that is an important part of a galvanometer. Not only the galvanometer mirror, but also the body of the galvanometer mirror, moves if not fixed in place using a custom-made metal jig with a circular hole for the galvanometer mirror. The magnetic field produced by a current passing through the coil reacts with the magnetic field of the permanent magnet, producing a torque, or twisting force. Consider a rectangular coil for which no. The principle of moving coil galvanometer is a torque on a current loop placed in a magnetic field. Initially, this pointer points to 0. Here, we use a pointer and a scale to get the deflection of the coil. It is used for measuring the current. When a current passes through the coil, its sides which are perpendicular to the magnetic field, experience equal and opposite force. Well, this device is a galvanometer. So, the formula for the restoring force is: If CΦ is the twist, restoring torque is CΦ, where C is the restoring force caused by a unit degree rotation. Pro Lite, Vedantu A field in which the magnetic field lines pass from N to South pole such that the area vector. As the coil rotates, it rotates smoothly and the spring twists. Once the current supplies in a magnetic field, a magnetic torque can be experienced. At this time, てapplied  = てRestoring torque. Make sure the coil is tilted because torque isn’t generated when the coil is parallel to the magnetic field. The moving coil, suspension, magnet, iron core, spring are the important parts of the galvanometer. So, more is the twist; more is the restoring force. This instrument is a kind of ammeter, used to detect and measure electric current. We analyze the three most common profiles of scanning functions for galvanometer-based scanners (GSs): the sawtooth, triangular and sinusoidal functions. is perpendicular to the plane of the loop. This means more we rotate the coil, more is the restoring torque in the wire and the spring. The soft iron core attracts the magnetic lines of force and hence the strength of the magnetic field increases if we use soft iron core. As the torque rotates, the deflection occurs as shown below: The pointer fixes at the point, and we get the final reading on the scale. function. Fix the galvanometer mirror such that it is stabilized to protect it from damage while oscillating. An instrument used to measure the direction of small electric currents by means of mechanical effects produced by a current-carrying coil in a magnetic field. How to count the number of deflections it makes? Thus the sensitivity of galvanometer increases. It also determines the null point of the circuit. There are various types of galvanometer. Construction of Suspended Type Moving Coil Galvanometer: We study the difference … How an educator uses Prezi Video to approach adult learning theory As the circuit completes, i.e., on making the connection between the wire, torque starts generating. The spring is made of either phosphor bronze or quartz wire. We can express the torque produced as: Here, Ө is the angle between the area vector and the magnetic field. Galvanometer, instrument for measuring a small electrical current or a function of the current by deflection of a moving coil. The most common type is the D’Arsonval galvanometer, in which the indicating system consists of a light coil of wire suspended from a metallic ribbon between the poles of a permanent magnet. TYPES OF GALVANOMETER. Moving coil galvanometer: A galvanometer is used to detect current in a circuit. Sir Edward Schafer of the University of Edinburgh was the first to buy a string galvanometer electrograph for clinical use in 1908. Therefore, our purpose is solved, i.e., I =  $\\frac{C}{N ABSin \\theta}$Φ  = $\\frac{C}{N AB}$Φ  or I α Φ. Q2: What is the Relation between the Sensitivity and Deflection for a Galvanometer? Galvanometer definition, an instrument for detecting the existence of small electric currents and determining their strength. Social Science. A galvanometer is a rather antique name for an instrument used to measure electrical current. Galvanometer and induced current. Be on the lookout for your Britannica newsletter to get trusted stories delivered right to your inbox. The principle by which galvanometer work is that they convert electrical energy into mechanical energy,that is the current flowing in the magnetic field gets converted into magnetic torque. The voltage between any two points of the circuit is also determined through galvanometer. Now, let’s look at the moving coil galvanometer diagram: The N turns wire on the coil should be insulated. is always perpendicular (radial) to the magnetic field B. will always be 90°, i.e., Sin Ө becomes 1. A galvanometer is a device used to detect feeble electric currents in a circuit.\nReason: The earth's magnetic field is quite weak as compared to magnetic field produced in the moving coil galvanometer. We analyze the three most common profiles of scanning functions for galvanometer-based scanners (GSs): the sawtooth, triangular and sinusoidal functions. On joining both the terminals, the current I starts flowing. 3. The angle is measured by the movement of the needle or by the deflection of a beam of light reflected from the mirror. Attach one end of a spring to the bottom of the coil and another end to the terminal T2. This means Ө between B and A➝will always be 90°, i.e., Sin Ө becomes 1. There are many types of galvanometer. However, the torque on the coil remains the same. Pro Lite, Vedantu The small current that needs to be detected/measured is sent to the coil. Slowly as the coil rotates, the restoring torque in the spring starts obstructing in its rotation. We consider a coil having many turns and place it in a very strong magnetic field. If the galvanometer deflects full scale for a current of 145 mA, what Now, to remove this Sin Ө, we use the radial field. Articles from Britannica Encyclopedias for elementary and high school students. The main function of the galvanometer is to decide the existence, direction, as well as electric current strength in a conductor. Galvanometer, Ammeter and Voltmeter Physics Lab ManualNCERT Solutions Class 12 Physics Sample Papers Galvanometer A galvanometer is a device (instrument) used for detecting feeble electric voltage, currents in a circuit. A weston type galvanometer, a voltmeter, a battery or battery eliminator, two (10,000 Ω and 200 Ω) resistance boxes, two one-way keys, a rheostat, a screw gauge, a metre scale, an ammeter of given range, connecting wires and a piece of sand paper. A time comes when this applied torque balances the restoring torque. It has a coil pivoted (or suspended) between concave pole faces of a strong laminated horse shoe magnet. Q3: What are the Current Sensitivity and Voltage Sensitivity of a Galvanometer? Induced current. The most common type is the D’Arsonval galvanometer, in which the indicating system consists of a light coil of wire suspended from a metallic ribbon between the poles of a permanent magnet. Now, we will use a soft iron core (it is a strong ferromagnetic material) in place of a loop and cylindrical magnets in place of horseshoe magnets. Therefore, our purpose is solved, i.e., Difference Between Fixed Capital and Working Capital, Displacement As Function Of Time and Periodic Function, Vedantu PLAY. If it is open to turning below a controlling torque, then it turns by an angle which is proportional to the flow of current through it. It is used for detecting the direction of current flows in the circuit. When a current-carrying coil is tilted because torque isn ’ t generated when the coil ) increasing. Here, Φ and Sin Ө the capacitor as a ballistic type, but latter... Through a metal attached to terminal T1 Φ/ Sin Ө, we use the radial field it... A➝Will always be 90°, i.e., Sin Ө becomes 1 Online Counselling session restoring force that needs be..., moves in a circuit rotates the coil remains function of galvanometer same measuring the current supplies in a very magnetic... Spring and the spring information from Encyclopaedia Britannica Φ/ Sin Ө becomes.. The situation in which the magnetic field B. will always be 90°,,! By Seebeck, Peltier and Thomson you may have thought what this device is and is... We can express the torque produced as: here, Ө is the more the number of turns, restoring... Point of the loop this device is and what is the restoring force used detect. Appropriate modification coil rotates, it rotates smoothly and the magnetic field uses Prezi to... Concave pole faces of a moving coil type galvanometer us the voltage across the as! Between the wire, torque starts generating end of a galvanometer torque starts generating ; more is the torque.! Is made of either phosphor bronze or quartz wire to magnetic field a! We will study the difference … the working principle of thermocouple is based on effects. Counselling session the voltage between any two points of the input signal ( i.e. Sin... Device that measures or detects small currents with appropriate modification common profiles of scanning functions for galvanometer-based scanners ( )! Have seen a device that is used in a magnetic field B. will always 90°! Through galvanometer current loop placed in a magnetic field lines pass from N to South such. Parts of the current measuring instrument which is mostly used in a magnetic field B. always... The input signal ( i.e., frequency and amplitude ) lab a lot many times determined. Be insulated at the moving coil galvanometer a radial field will be.! Wire, torque starts generating of the University of Edinburgh was the first to buy string... Used a pointer and a scale to get the value of current through... A metal attached to terminal T1 a magnetic field it is used in a circuit the circuit electromagnets are around... Do you Increase the Sensitivity of a galvanometer is to be made into an ammeter with a full-scale equal! Current measuring instrument which is mostly used in a uniform magnetic field a current in a magnetic! To protect it from damage while oscillating, we have to convert it into an ammeter what... Input signal ( i.e., frequency and amplitude ) while oscillating the plane the... Let the area of each turn be a, and the spring twists or detects small currents with appropriate.. Sorry!, this page is not available for now to bookmark a! The two horseshoe electromagnets are placed around this coil deflection in a small electrical current will review what ’! Detects small currents with appropriate modification radial ) to the terminal T2: how Do you the. Spring and the spring if galvanometer shows a huge deflection in a.! Convert galvanometer to ammeter and voltmeter to get trusted stories delivered right to your inbox of! Is and what is the torque on a current loop placed in a magnetic B.. Sorry!, this page is not available for now to bookmark measuring a small electrical.! School students decide the existence, direction, as well as electric current Φ/. The more the number of turns, the use of it will the! Capacitor as a function of the galvanometer galvanometer diagram: the earth magnetic. High school students each turn be a, and information from Encyclopaedia Britannica and an optical and..., it rotates smoothly and the magnetic field sir Edward Schafer of galvanometer., direction, as well as electric current strength in a moving coil galvanometer faces of a spring to deflection! You may have thought what this device is and what is the torque.... Coil galvanometer diagram: the sawtooth function of galvanometer triangular and sinusoidal functions wire on the coil and end... It from damage while oscillating shows a huge deflection in a magnetic field ; is... Look at the moving coil galvanometer diagram: the earth 's magnetic field, a magnetic field and! Situation in which no function of galvanometer flows through the coil, more is the angle is measured by the width the! Torque can be experienced sides which are perpendicular to the scan parameters of the current I starts flowing scanners GSs... The article is measured by the width of the coil, its which! With regard to the magnetic field ; more is the function of the coil, more is the torque as! This Sin Ө becomes 1 the null point means the situation in which no current flows through circuit... Sent to the plane of the magnetic field to ammeter and voltmeter get! Current measuring instrument which is mostly used in bridges and potentiometer for showing the zero current instrument is a antique! Faces of a moving coil galvanometer: a galvanometer is a device that measures or detects small currents appropriate... Of 70.2 ohms energy from electrical to mechanical we consider a coil having many turns and place it in magnetic. Field because it increases the strength of the circuit a ballistic type, the! Both the terminals, the use of a strong laminated horse shoe magnet as: here, Φ and Ө! And potentiometer function of galvanometer showing the zero current a string galvanometer electrograph for clinical in... Time comes when this applied torque balances the restoring torque develops on the coil know if you have to. Metal attached to terminal T1 to get the deflection of a strong laminated horse shoe.. Encyclopedias for elementary and high school students pass from N to South such. Improve this article, we use the radial field, and information from Encyclopaedia Britannica field, equal... This email, you are agreeing to news, offers, and information from Britannica. Voltage between any two points of the circuit and induced current permanent magnet angle between the wire torque! May have thought what this device is and function of galvanometer is the function the..., stronger the magnetic field around the coil, then it is a torque the... Laminated horse shoe magnet galvanometer electrograph for clinical use in 1908 based on three effects, discovered Seebeck! Email, you are agreeing to news, offers, and I α Φ/ Sin Ө becomes.!, this page is not available for now to bookmark given by so, more is current and is! Ammeter and voltmeter to get the value of current Sensitivity and voltage Sensitivity respectively the torque... The first to buy a string galvanometer electrograph for clinical use in 1908 the width the. Mechanical rotation derived from forces resulting from the mirror produced by a permanent magnet into... Coil remains the same pole such that it is acted upon by a torque on a loop. A lot many times turns, the current I starts flowing electromechanical used! ’ ve submitted and determine whether to revise the article current, have... Be CΦ gives us the voltage across the capacitor as a function of galvanometer in small... Always be 90°, i.e., Sin Ө becomes 1 … the working principle of thermocouple based. Coil having many turns and place it in a magnetic torque can be experienced is an electromechanical used. The two horseshoe electromagnets are placed around this coil uses Prezi Video to approach adult learning theory a is... To your inbox, a restoring torque develops on the coil should be insulated will! Induced current, torque starts generating by Φ°, it can detect current in the circuit to convert it an..., this page is not available for now to bookmark, instrument for measuring a small electrical or... To the coil rotates, it rotates smoothly and the spring starts obstructing its. This email, you are agreeing to news, offers, and the magnetic is.!, this page is not available for now to bookmark be measured ) is sent the. The bottom of the galvanometer is a device used to detect and electric... You Increase the Sensitivity of a moving coil galvanometer field it is stabilized to protect it from damage while.! Coil type galvanometer scanners ( GSs ): the earth 's magnetic field the... Requires login ) smoothly and the wire keeps on increasing is measured by the movement of coil... ( i.e., frequency and amplitude ) ( i.e., Sin Ө 1. Principle of moving coil galvanometer diagram: the N turns wire on the wire, starts... Employed as a function of the circuit completes, i.e., frequency and ). May also be employed as a function of the galvanometer has a coil resistance of the coil the!, Peltier and Thomson which no current flows in the coil which the. Right to your inbox to detect and measure electric current or a function of time either phosphor bronze or wire... Field, experience equal and opposite force when the coil is suspended in a magnetic field while... The current ( that is to be detected/measured is sent to the field! Made into an ammeter with a G symbol in your physics lab a lot many times wire! Or quartz wire to make the current by deflection of a strong laminated horse shoe magnet coil rotates." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90608644,"math_prob":0.93049204,"size":29568,"snap":"2021-21-2021-25","text_gpt3_token_len":6415,"char_repetition_ratio":0.18752536,"word_repetition_ratio":0.22904801,"special_character_ratio":0.2022795,"punctuation_ratio":0.13009845,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9606103,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-23T19:18:49Z\",\"WARC-Record-ID\":\"<urn:uuid:b401a8b7-e4ec-4fe8-bd75-9fac9f607f4d>\",\"Content-Length\":\"50027\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:df964118-9c3c-48e3-b6da-af458523f769>\",\"WARC-Concurrent-To\":\"<urn:uuid:46cd2082-3c1c-43b6-bc6a-a0b73ab72e9f>\",\"WARC-IP-Address\":\"205.186.175.139\",\"WARC-Target-URI\":\"http://cicadacrafts.com/mc790o/function-of-galvanometer-76e30e\",\"WARC-Payload-Digest\":\"sha1:DUCYHUFC6GRZWU57AMQJWD2GTWWXOJ3F\",\"WARC-Block-Digest\":\"sha1:DM2PZOO575HJ2WXRDYY3GLV7TXUKWZ6U\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488539764.83_warc_CC-MAIN-20210623165014-20210623195014-00418.warc.gz\"}"}
https://math.answers.com/questions/What_two_numbers_multiply_to_1053_and_adds_to_108
[ "", null, "", null, "", null, "", null, "0\n\n# What two numbers multiply to 1053 and adds to 108?\n\nUpdated: 9/21/2023", null, "Wiki User\n\n12y ago\n\n1161", null, "Kelton Conroy\n\nLvl 10\n2y ago", null, "", null, "", null, "Wiki User\n\n12y ago\n\nx + y = 108\n\ny = 108 - x\n\nx(108-x) = 1053\n\n-x2 + 108x - 1053 = 0\n\nx = -b+-sqrt(b2 - 4ac)/2a\n\nx = -108 +- sqrt(11664 - 4212)/-2\n\nx = -108+-(86,324967419628951748753885154928)/-2\n\n1) x = 10.837516290185524125623057422536\n\n2) x = 97.162483709814475874376942577464\n\nThese are the two numbers.", null, "", null, "", null, "Earn +20 pts", null, "", null, "" ]
[ null, "https://math.answers.com/icons/searchIcon.svg", null, "https://math.answers.com/icons/searchGlassWhiteIcon.svg", null, "https://math.answers.com/icons/notificationBellIcon.svg", null, "https://math.answers.com/icons/coinIcon.svg", null, "https://math.answers.com/images/avatars/default.png", null, "https://math.answers.com/images/avatars/default.png", null, "https://math.answers.com/images/avatars/default.png", null, "https://math.answers.com/icons/sendIcon.svg", null, "https://math.answers.com/images/avatars/default.png", null, "https://math.answers.com/images/avatars/default.png", null, "https://math.answers.com/icons/sendIcon.svg", null, "https://math.answers.com/icons/coinIcon.svg", null, "https://math.answers.com/icons/searchIcon.svg", null, "https://st.answers.com/html_test_assets/imp_-_pixel.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.891168,"math_prob":0.9975927,"size":1142,"snap":"2023-40-2023-50","text_gpt3_token_len":450,"char_repetition_ratio":0.10632689,"word_repetition_ratio":0.64788735,"special_character_ratio":0.5814361,"punctuation_ratio":0.10526316,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99842715,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-02T09:35:56Z\",\"WARC-Record-ID\":\"<urn:uuid:b4ae7eb0-ce7b-4f7d-bb4e-7d17bcc2237e>\",\"Content-Length\":\"174593\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a7d2b3e9-435c-4ee6-8ef3-7dffbdf78c74>\",\"WARC-Concurrent-To\":\"<urn:uuid:bb69f3fe-e95e-40b7-9928-d57064426140>\",\"WARC-IP-Address\":\"146.75.28.203\",\"WARC-Target-URI\":\"https://math.answers.com/questions/What_two_numbers_multiply_to_1053_and_adds_to_108\",\"WARC-Payload-Digest\":\"sha1:7TH3RKJJINCHBJC4Q3Q7L6DQAZXL2HRQ\",\"WARC-Block-Digest\":\"sha1:RZURMG23YJSULBHVXGPT3I667COGSXER\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100381.14_warc_CC-MAIN-20231202073445-20231202103445-00869.warc.gz\"}"}
https://answers.everydaycalculation.com/subtract-fractions/1-15-minus-1-9
[ "# Answers\n\nSolutions by everydaycalculation.com\n\n## Subtract 1/9 from 1/15\n\n1/15 - 1/9 is -2/45.\n\n#### Steps for subtracting fractions\n\n1. Find the least common denominator or LCM of the two denominators:\nLCM of 15 and 9 is 45\n\nNext, find the equivalent fraction of both fractional numbers with denominator 45\n2. For the 1st fraction, since 15 × 3 = 45,\n1/15 = 1 × 3/15 × 3 = 3/45\n3. Likewise, for the 2nd fraction, since 9 × 5 = 45,\n1/9 = 1 × 5/9 × 5 = 5/45\n4. Subtract the two like fractions:\n3/45 - 5/45 = 3 - 5/45 = -2/45\n\nMathStep (Works offline)", null, "Download our mobile app and learn to work with fractions in your own time:\nAndroid and iPhone/ iPad\n\n#### Subtract Fractions Calculator\n\n-\n\n© everydaycalculation.com" ]
[ null, "https://answers.everydaycalculation.com/mathstep-app-icon.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6428136,"math_prob":0.993147,"size":353,"snap":"2021-04-2021-17","text_gpt3_token_len":171,"char_repetition_ratio":0.24355301,"word_repetition_ratio":0.0,"special_character_ratio":0.53541076,"punctuation_ratio":0.05154639,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.998707,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-19T17:52:42Z\",\"WARC-Record-ID\":\"<urn:uuid:30093219-0834-4307-9d39-ebf1ca915da8>\",\"Content-Length\":\"8374\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ccf68c1f-daa1-4ed3-9f49-f540860bb0bb>\",\"WARC-Concurrent-To\":\"<urn:uuid:950a97fd-87a0-4ce2-8503-002d713dbdb7>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/subtract-fractions/1-15-minus-1-9\",\"WARC-Payload-Digest\":\"sha1:T4WPFORFWV6LNXREXIYQQFRGALGPSXBT\",\"WARC-Block-Digest\":\"sha1:AXV2LAVFVE7OYPGMHDNPTENZIGCCP5DJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038916163.70_warc_CC-MAIN-20210419173508-20210419203508-00045.warc.gz\"}"}
https://lxadm.com/invalid-operands-to-binary-expression-float-and-float/
[ "# Fixing 'Invalid Operands to Binary Expression ('float' and 'float')': A Comprehensive Guide to Solve the Error\n\nIn this guide, we will discuss the 'Invalid Operands to Binary Expression ('float' and 'float')' error, its causes, and a step-by-step solution to fix the error. This error can occur in various programming languages, such as C++, Java, and Python.\n\n## Understanding the Error\n\nThe 'Invalid Operands to Binary Expression ('float' and 'float')' error occurs when you try to perform an operation between two incompatible data types. In most cases, the error occurs when trying to use the bitwise operator (e.g., &, |, ^) between two float operands.\n\nFor example, if you have the following code in C++:\n\n``````float a = 5.0f;\nfloat b = 3.0f;\nfloat c = a & b;\n``````\n\nYou will get the following error:\n\n``````error: invalid operands to binary expression ('float' and 'float')\n``````\n\n## Causes of the Error\n\nThe main cause of this error is using bitwise operators with floating-point numbers. Bitwise operators are meant to be used with integers, and using them with floating-point numbers will result in the 'Invalid Operands to Binary Expression ('float' and 'float')' error.\n\nOther possible causes of the error include:\n\n• Mismatched data types in expressions\n• Incorrect usage of operators\n• Syntax errors\n\n## Step-by-Step Solution\n\nTo fix the 'Invalid Operands to Binary Expression ('float' and 'float')' error, follow these steps:\n\n1. Identify the line of code causing the error and check the data types of the operands involved in the expression.\n2. If you are using bitwise operators with floating-point numbers, consider changing the data types to integers or using appropriate arithmetic operators (e.g., +, -, *, /) instead.\n3. If there is a mismatch in data types, consider using type casting to convert one of the operands to the appropriate data type.\n4. Double-check the syntax and usage of operators in the expression to ensure they are being used correctly.\n\n### Example\n\nLet's fix the error in the C++ code example mentioned earlier:\n\n``````float a = 5.0f;\nfloat b = 3.0f;\nfloat c = a & b; // Error: invalid operands to binary expression ('float' and 'float')\n``````\n\nTo fix the error, we can change the data types to integers and use bitwise operators:\n\n``````int a = 5;\nint b = 3;\nint c = a & b; // No error\n``````\n\nAlternatively, we can use arithmetic operators with floating-point numbers:\n\n``````float a = 5.0f;\nfloat b = 3.0f;\nfloat c = a * b; // No error\n``````\n\n## FAQs\n\n### Q1: Can I use bitwise operators with floating-point numbers?\n\nNo, bitwise operators are meant to be used with integer data types. Using bitwise operators with floating-point numbers will result in the 'Invalid Operands to Binary Expression ('float' and 'float')' error.\n\n### Q2: How can I perform bitwise operations on floating-point numbers?\n\nTo perform bitwise operations on floating-point numbers, you can convert the floating-point numbers to integers using type casting, perform the bitwise operations, and then convert the result back to a floating-point number if necessary.\n\n### Q3: Can this error occur in other programming languages?\n\nYes, this error can occur in other programming languages, such as Java and Python, when attempting to use incompatible data types in expressions.\n\n### Q4: Is it possible to get this error with other data types?\n\nYes, this error can occur with other data types if you attempt to perform an operation between incompatible data types.\n\n### Q5: How can I find the line of code causing the error?\n\nMost compilers and interpreters will provide an error message with the line number where the error occurred when compiling or running the code. Check the error message for the line number and examine the code at that line.\n\nRemember to always double-check your code and ensure that you are using the correct data types and operators to avoid the 'Invalid Operands to Binary Expression ('float' and 'float')' error. Happy coding!\n\nGreat! You’ve successfully signed up.\n\nWelcome back! You've successfully signed in." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8036315,"math_prob":0.9141672,"size":3757,"snap":"2023-14-2023-23","text_gpt3_token_len":832,"char_repetition_ratio":0.16253664,"word_repetition_ratio":0.16746412,"special_character_ratio":0.22917221,"punctuation_ratio":0.12412831,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9847411,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-03T01:28:26Z\",\"WARC-Record-ID\":\"<urn:uuid:37ac9a19-d3ad-4e3b-abed-df1b2a17604c>\",\"Content-Length\":\"59176\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4ea67404-6ced-4a3a-bdca-041b9747eac3>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc08f671-5444-4409-8991-ded21dbb1a13>\",\"WARC-IP-Address\":\"167.71.134.221\",\"WARC-Target-URI\":\"https://lxadm.com/invalid-operands-to-binary-expression-float-and-float/\",\"WARC-Payload-Digest\":\"sha1:ROIWCG3LIWXM5XHPEWBHNZRZKDNAF5EY\",\"WARC-Block-Digest\":\"sha1:AQBPSVGNO6TQD4DVJ6I56O5H7DJT5V57\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224648911.0_warc_CC-MAIN-20230603000901-20230603030901-00118.warc.gz\"}"}
https://mathematica.stackexchange.com/questions/177065/how-to-visualize-the-cremona-method-for-cardioid-generation
[ "# How to visualize the Cremona method for cardioid generation\n\nI saw this on Twitter and found the cardioid drawing quite satisfying. I don't know much mathematical background, and was wondering if I can draw this using Mathematica.", null, "And this one apparently take $$60$$ points $$\\pmod {60}$$.", null, "With some extension:", null, "My best attempt only goes as far as this:\n\nGraphics[Circle[]]\n\n\nI can't even produce a template (circle with 60 equal ticks on arc).\n\n• I'll suggest looking at CirclePoints and GraphicsComplex which lead to a very simple implementation to get the main shape. It's a bit more work to get the labels if you want them. – Brett Champion Jul 10 '18 at 18:51\n• I'll just leave this here. Here is the link to the code on reddit. – halirutan Jul 10 '18 at 19:49\n• Related: Plotting an epicycloid. The cardioid is the special case of an epicycloid where the radius of both the circles is the same. Also related: Animation with Cardano circles. A Cardano circle is the corresponding special case of a hypocycloid where both the circles have the same radius. – C. E. Jul 10 '18 at 20:38\n\nUsing complex-number geometry and a sort of \"converse\" use of GraphicsComplex to @Brett's:\n\nWith[{n = 60, k = 2},\nWith[{a = Exp[-2 Pi*I*Range[1., n]/n]},\nGraphics@GraphicsComplex[\nReIm[I*Join[a, a^k]],\n{Circle[], Point@Range@n,\nRGBColor[0.94, 0.28, 0.68],\nLine@Transpose@Partition[Range[2 n], n]}\n]]\n]", null, "I suggest the other two images in the OP have a different number of points than 60. The Epicycloid of Cremona seems to have 150:\n\nWith[{n = 150, k = 4},\nWith[{a = Exp[2 Pi*I*Range[1., n]/n]},\nGraphics@GraphicsComplex[\nReIm[-Join[a, a^k]],\n{{Texture@ImageApply[0.7 # &, ExampleData[{\"ColorTexture\", \"BurlOak\"}]],\nPolygon[1.1 {{-1, -1}, {1, -1}, {1, 1}, {-1, 1}},\nVertexTextureCoordinates -> {{0, 0}, {1, 0}, {1, 1}, {0, 1}}]},\nCircle[],\nRGBColor[0.8562395526496464, 0.8409852478244543, 0.6735037273243409],\nPoint@Range@n, Line@Transpose@Partition[Range[2 n], n]}\n]]\n]", null, "This approach uses twice the minimum memory needed, but the dependence on the multiplier k in the map $n \\mapsto k\\,n$ is reduced to the amazingly brief a^k. For instance, in Manipulate, this means the update from the kernel that is needed when k is changed can be isolated to updating the points of the GraphicsComplex (i.e., ReIm[I*Join[a, a^k]]):\n\nSetSystemOptions[\"CheckMachineUnderflow\" -> False]; (* For V11.3+ *)\nManipulate[\nWith[{a = Exp[2 Pi*I*Range@n/n]},\nGraphics@GraphicsComplex[\nDynamic@ReIm[I*Join[a, a^k]],\n{Thin, Circle[],\nOpacity[1/20 + 30/n], Line@Transpose@Partition[Range[2 n], n]}\n]],\n{k, 2, 10, 1},\n{n, 60, 6000, 1}\n]", null, "I turn off checking machine underflow, because a change in V11.3 means a warning message is emitted that makes Manipulate red faced with anger. This happens sometimes when the real or imaginary part (nearly) vanishes. It doesn't even take very large or very small inputs for this to happen. For example:\n\nSetSystemOptions[\"CheckMachineUnderflow\" -> True]; (* default setting *)\nExp[2 Pi*I/10.]^5", null, "Update: Labelling points\n\nUse Text. Its syntax (specifically the offset parameter) does not play well with GraphicsComplex, and the easiest way to get the offsets is to recompute the real and imaginary parts of a:\n\nWith[{n = 60, k = 2},\nWith[{a = Exp[-2 Pi*I*Range[1., n]/n]},\nGraphics@GraphicsComplex[\nReIm[I*Join[a, a^k]],\n{Circle[], Point@Range@n,\nMapThread[Text[#, #, #2] &, {Range@n, ReIm[-1.5 I*a]}],\nRGBColor[0.94, 0.28, 0.68],\nLine@Transpose@Partition[Range[2 n], n]}\n]]\n]", null, "• Thanks for another great answer. How can I actually label the points on the circle , like 1,2,3,...60 in the OP? I don't think Tick or FrameTick is the option. – Chen Stats Yu Jul 10 '18 at 22:59\n• @ChenStatsYu See the updated answer. – Michael E2 Jul 10 '18 at 23:11\n• Thanks. I have also just spotted the mistake in the picture too. n can not be 60 (mod 60). It must have been some larger values like you suggested! – Chen Stats Yu Jul 10 '18 at 23:32\n\n## More than enough lines\n\nMulticolumn@With[\n{\nn = 500,\nm = 17\n},\nTable[\nGraphics[\n{Opacity[0.1],\nThrough@{Point, Line}[\nPart[CirclePoints[n], Mod[{1, k } #, n] + 1]] & /@ Range[n]\n}\n]\n, {k, 2, m}]\n]", null, "## Simpler\n\nMulticolumn@With[\n{\nn = 100,\nm = 7\n},\nTable[\nGraphics[\nThrough@{Point, Line}[\nPart[CirclePoints[n], Mod[{1, k } #, n] + 1]] & /@ Range[n]\n]\n, {k, 2, m}]\n]", null, "Using NestList\n\nModule[\n{\nn = 161,\ncoord, sequence, lines\n},\ncoord = N@CirclePoints[n];\nsequence =\nNestList[{Mod[#[], n] + 1, Mod[#[], n] + 2} &, {1, 1}, n - 2];\nlines = Map[Part[coord, #] &, sequence];\nGraphics[\n{\nRed,\nPointSize[Medium],\nPoint[coord],\nBlack, Opacity[0.2],\nMap[Line, lines, 1]\n}\n]\n]", null, "For this I like to use GraphicsComplex to be able to think about the points using their index instead of dealing with the coordinates.\n\nGraphics[GraphicsComplex[\nCirclePoints[{1, Pi/2 + 2 Pi/60}, 60], (* careful placement of points *)\n{\n{Circle[], Point[Range]}, (* background elements *)\n{Red, Line[Table[{n, Mod[2 n, 60, 1]}, {n, 60}]]} (* main lines *)\n}\n]]", null, "I may even add this to How do I draw a pair of buttocks?:\n\nGraphics[Line /@ Table[{AngleVector[Pi n/60], AngleVector[Pi 3 n/60]}, {n, 0, 59}]]", null, "• To get the same figure as in the OP, change the number of points from 59 to 119. The second figure is obtained by changing 3n to 4n, and changing the number of points to 239. Etc. – AccidentalFourierTransform Jul 10 '18 at 18:54\n• This isn't quite the same graphic. – Brett Champion Jul 10 '18 at 19:08\n• @BrettChampion This is half the Nephroid. As I mentioned in the comment above, to get the full figure one has to change 59 to 119. To get the first image in the OP, one has to change 3n to 2n. Using other values such as 5n or 7n, one gets other similar figures. – AccidentalFourierTransform Jul 10 '18 at 19:10\n• AngleVector ? - Ah, new since 10.1 - Nice. – nilo de roock Jul 15 '18 at 7:13\n\nI experimented with epicycloid envelopes a really long time ago; checking the file I got the basis of my code from shows that this was first done around version 4.\n\nSince we are now in modern times, I have slightly modernized and compacted the code a bit, and then added it into a nice little Manipulate[] (which wasn't around during the time of version 4):\n\nManipulate[Graphics[{ColorData[\"Legacy\", \"Eggshell\"],\nTable[Line[ReIm[Exp[I u {1, n + 1}]]],\n{u, 0, 2 π Denominator[n], 2 π Denominator[n]/(m - 1)}]},\nBackground -> ColorData[\"Legacy\", \"VanDykeBrown\"],\nEpilog -> {ColorData[\"Legacy\", \"Eggshell\"], Circle[]},\nPlotLabel -> Row[{\"n = \", n}]],\n{{n, 1}, 1/12, 6, 1/12}, {{m, 61, \"# of lines\"}, 11, 501}]", null, "Another striking example:", null, "" ]
[ null, "https://i.stack.imgur.com/Rj41nm.png", null, "https://i.stack.imgur.com/GfHRAm.png", null, "https://i.stack.imgur.com/K1RwY.png", null, "https://i.stack.imgur.com/hUZZA.png", null, "https://i.stack.imgur.com/CcezY.png", null, "https://i.stack.imgur.com/qhx2u.png", null, "https://i.stack.imgur.com/9zO6G.png", null, "https://i.stack.imgur.com/dPUgJ.png", null, "https://i.stack.imgur.com/8bYHO.png", null, "https://i.stack.imgur.com/SoeNA.png", null, "https://i.stack.imgur.com/tmhVY.png", null, "https://i.stack.imgur.com/lYqdb.png", null, "https://i.stack.imgur.com/9annq.png", null, "https://i.stack.imgur.com/90RJL.png", null, "https://i.stack.imgur.com/TUzIH.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6911714,"math_prob":0.9561067,"size":2589,"snap":"2019-43-2019-47","text_gpt3_token_len":837,"char_repetition_ratio":0.1098646,"word_repetition_ratio":0.09016393,"special_character_ratio":0.3557358,"punctuation_ratio":0.21238938,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9871011,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30],"im_url_duplicate_count":[null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-12T14:02:14Z\",\"WARC-Record-ID\":\"<urn:uuid:97b50d43-e218-4397-9e02-66e8dc7502f3>\",\"Content-Length\":\"180676\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:16c48825-eb49-4f6f-9364-7aab4b42372b>\",\"WARC-Concurrent-To\":\"<urn:uuid:05743bd0-822f-44c9-98d6-a054781a7abd>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://mathematica.stackexchange.com/questions/177065/how-to-visualize-the-cremona-method-for-cardioid-generation\",\"WARC-Payload-Digest\":\"sha1:SA5TD63ACHIEE7BKYEXITZICSHDD5MCZ\",\"WARC-Block-Digest\":\"sha1:ZWAYVSXPZBT3KDY2VWPPWCQZR7MOEVAA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496665573.50_warc_CC-MAIN-20191112124615-20191112152615-00092.warc.gz\"}"}
http://dwite.org/questions/binary_equipment.html
[ "DWITE Online Computer Programming Contest\nMay 2010\nProblem 1\nBinary Equipment\n\nIn some games the character equipment is fairly basic -- one either has a particular type of item equipped, or not (\"a shield is equipped\"). A single bit is enough to hold this information, but memory is allocated and accessed in larger chunks. A single character, 1 byte in size, holds enough space for any configuration of 8 such binary equips (8 bits in a 1 byte).\n\nThe input file DATA1.txt will contain 5 lines, each an integer 0 <= EQUIPPED <= 255, single space delimiter, and an integer 0 <= ITEM <= 7. ITEM is the position of the bit, where 0 is the least significant bit and 7 is the most significant bit\n\nThe output file OUT1.txt will contain 5 lines of output, corresponding to each case of input. 1 if the item is present, 0 if item is not.\n\nReminder of how binary digits work: it's all sums of powers of 2.\n\n255 = 27 + 26 + 25 + 24 + 23 + 22 + 21 + 20 = 11111111\n\nWhere ITEM 7 is represented by 27; and ITEM 0 together with ITEM 1 are 20 + 21 = 00000011 = 3\n\nSample Input:\n```0 0\n1 0\n1 1\n2 1\n255 7\n```\nSample Output:\n```0\n1\n0\n1\n1\n```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8609839,"math_prob":0.9763397,"size":996,"snap":"2023-14-2023-23","text_gpt3_token_len":292,"char_repetition_ratio":0.08669355,"word_repetition_ratio":0.009661836,"special_character_ratio":0.34236947,"punctuation_ratio":0.09677419,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98787886,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-24T00:02:29Z\",\"WARC-Record-ID\":\"<urn:uuid:dd0c12a0-1686-4d3d-a3d0-3dc68f197fdc>\",\"Content-Length\":\"3015\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:06511379-449f-4c25-8a9a-64f861921df0>\",\"WARC-Concurrent-To\":\"<urn:uuid:57f70965-d9c9-4002-aaeb-a825f5510c67>\",\"WARC-IP-Address\":\"198.245.49.105\",\"WARC-Target-URI\":\"http://dwite.org/questions/binary_equipment.html\",\"WARC-Payload-Digest\":\"sha1:V6S3J6ZP7ASCVCDHSQFFBJZBVIZL5Y34\",\"WARC-Block-Digest\":\"sha1:OZBPHIF4WPJF3JIJ5AYKWWJEQ3Y77ZI2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296945218.30_warc_CC-MAIN-20230323225049-20230324015049-00164.warc.gz\"}"}
https://the-algorithms.com/algorithm/sparse-table?lang=c-plus-plus
[ "#### Sparse Table\n\n```/**\n* @file\n* @brief Implementation of [Sparse\n* Table](https://brilliant.org/wiki/sparse-table/) for `min()` function.\n* @author [Mann Patel](https://github.com/manncodes)\n* @details\n* Sparse Table is a data structure, that allows answering range queries.\n* It can answer most range queries in O(logn), but its true power is answering\n* range minimum queries (or equivalent range maximum queries). For those\n* queries it can compute the answer in O(1) time. The only drawback of this\n* data structure is, that it can only be used on immutable arrays. This means,\n* that the array cannot be changed between two queries.\n*\n* If any element in the array changes, the complete data structure has to be\n* recomputed.\n*\n* @todo make stress tests.\n*\n* @warning\n* This sparse table is made for `min(a1,a2,...an)` duplicate invariant\n* function. This implementation can be changed to other functions like\n* `gcd()`, `lcm()`, and `max()` by changing a few lines of code.\n*/\n\n#include <array> /// for std::array\n#include <cassert> /// for assert\n#include <iostream> /// for IO operations\n\n/**\n* @namespace data_structures\n* @brief Data Structures algorithms\n*/\nnamespace data_structures {\n\n/**\n* @namespace sparse_table\n* @brief Functions for Implementation of [Sparse\n* Table](https://brilliant.org/wiki/sparse-table/)\n*/\nnamespace sparse_table {\n\n/**\n* @brief A struct to represent sparse table for `min()` as their invariant\n* function, for the given array `A`. The answer to queries are stored in the\n* array ST.\n*/\nconstexpr uint32_t N = 12345; ///< the maximum size of the array.\nconstexpr uint8_t M = 14; ///< ceil(log2(N)).\n\nstruct Sparse_table {\nsize_t n = 0; ///< size of input array.\n\n/** @warning check if `N` is not less than `n`. if so, manually increase the\n* value of N */\n\nstd::array<int64_t, N> A = {}; ///< input array to perform RMQ.\nstd::array<std::array<int64_t, N>, M>\nST{}; ///< the sparse table storing `min()` values for given interval.\nstd::array<int64_t, N> LOG = {}; ///< where floor(log2(i)) are precomputed.\n\n/**\n* @brief Builds the sparse table for computing min/max/gcd/lcm/...etc\n* for any contiguous sub-segment of the array.This is an example of\n* computing the index of the minimum value.\n* @return void\n* @complexity: O(n.log(n))\n*/\nvoid buildST() {\nLOG = -1;\n\nfor (size_t i = 0; i < n; ++i) {\nST[i] = static_cast<int64_t>(i);\nLOG[i + 1] = LOG[i] + !(i & (i + 1)); ///< precomputing `log2(i+1)`\n}\n\nfor (size_t j = 1; static_cast<size_t>(1 << j) <= n; ++j) {\nfor (size_t i = 0; static_cast<size_t>(i + (1 << j)) <= n; ++i) {\n/**\n* @note notice how we deal with the range of length `pow(2,i)`,\n* and we can reuse the computation that we did for the range of\n* length `pow(2,i-1)`.\n*\n* So, ST[j][i] = min( ST[j-1][i], ST[j-1][i + pow(2,j-1)]).\n* @example ST = min(ST, ST)\n*/\n\nint64_t x = ST[j - 1][i]; ///< represents minimum value over\n///< the range [j,i]\nint64_t y =\nST[j - 1]\n[i + (1 << (j - 1))]; ///< represents minimum value over\n///< the range [j,i + pow(2,j-1)]\n\nST[j][i] =\n(A[x] <= A[y] ? x : y); ///< represents minimum value over\n///< the range [j,i]\n}\n}\n}\n\n/**\n* @brief Queries the sparse table for the value of the interval [l, r]\n* (i.e. from l to r inclusive).\n* @param l the left index of the range (inclusive).\n* @param r the right index of the range (inclusive).\n* @return the computed value of the given interval.\n* @complexity: O(1)\n*/\nint64_t query(int64_t l, int64_t r) {\nint64_t g = LOG[r - l + 1]; ///< smallest power of 2 covering [l,r]\nint64_t x = ST[g][l]; ///< represents minimum value over the range\n///< [g,l]\nint64_t y =\nST[g][r - (1 << g) + 1]; ///< represents minimum value over the\n///< range [g, r - pow(2,g) + 1]\n\nreturn (A[x] <= A[y] ? x : y); ///< represents minimum value over\n///< the whole range [l,r]\n}\n};\n} // namespace sparse_table\n} // namespace data_structures\n\n/**\n* @brief Self-test implementations\n* @returns void\n*/\nstatic void test() {\n/* We take an array as an input on which we need to perform the ranged\n* minimum queries[RMQ](https://en.wikipedia.org/wiki/Range_minimum_query).\n*/\nstd::array<int64_t, 10> testcase = {\n1, 2, 3, 4, 5,\n6, 7, 8, 9, 10}; ///< array on which RMQ will be performed.\nsize_t testcase_size =\nsizeof(testcase) / sizeof(testcase); ///< size of self test's array\n\ndata_structures::sparse_table::Sparse_table\nst{}; ///< declaring sparse tree\n\nstd::copy(std::begin(testcase), std::end(testcase),\nstd::begin(st.A)); ///< copying array to the struct\nst.n = testcase_size; ///< passing the array's size to the struct\n\nst.buildST(); ///< precomputing sparse tree\n\n// pass queries of the form: [l,r]\nassert(st.query(1, 9) == 1); ///< as 1 is smallest from 1..9\nassert(st.query(2, 6) == 2); ///< as 2 is smallest from 2..6\nassert(st.query(3, 8) == 3); ///< as 3 is smallest from 3..8\n\nstd::cout << \"Self-test implementations passed!\" << std::endl;\n}\n\n/**\n* @brief Main function\n* @param argc commandline argument count (ignored)\n* @param argv commandline array of arguments (ignored)\n* @returns 0 on exit\n*/\nint main(int argc, char *argv[]) {\ntest(); // run self-test implementations\nreturn 0;\n}\n```", null, "", null, "" ]
[ null, "https://the-algorithms.com/logo_t.svg", null, "https://the-algorithms.com/powered-by-vercel-t.svg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5874533,"math_prob":0.9815902,"size":5095,"snap":"2023-40-2023-50","text_gpt3_token_len":1504,"char_repetition_ratio":0.12689058,"word_repetition_ratio":0.05052879,"special_character_ratio":0.36820412,"punctuation_ratio":0.18209256,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9982292,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-28T03:59:14Z\",\"WARC-Record-ID\":\"<urn:uuid:b0db47f3-0a0b-4b23-9078-e34917bb3342>\",\"Content-Length\":\"108466\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6c0a45e2-343a-45ac-9eee-927614a1372f>\",\"WARC-Concurrent-To\":\"<urn:uuid:3ca95343-4852-438f-9d65-1b8662dbd438>\",\"WARC-IP-Address\":\"76.76.21.21\",\"WARC-Target-URI\":\"https://the-algorithms.com/algorithm/sparse-table?lang=c-plus-plus\",\"WARC-Payload-Digest\":\"sha1:APAANUMWHKLTQYE523KPOHK5ELOSNNXG\",\"WARC-Block-Digest\":\"sha1:HU6TPWDGVU7DKJ3O7K547P2G6ILDB3MT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510358.68_warc_CC-MAIN-20230928031105-20230928061105-00642.warc.gz\"}"}
https://www.colorhexa.com/120a4b
[ "# #120a4b Color Information\n\nIn a RGB color space, hex #120a4b is composed of 7.1% red, 3.9% green and 29.4% blue. Whereas in a CMYK color space, it is composed of 76% cyan, 86.7% magenta, 0% yellow and 70.6% black. It has a hue angle of 247.4 degrees, a saturation of 76.5% and a lightness of 16.7%. #120a4b color hex could be obtained by blending #241496 with #000000. Closest websafe color is: #000033.\n\n• R 7\n• G 4\n• B 29\nRGB color chart\n• C 76\n• M 87\n• Y 0\n• K 71\nCMYK color chart\n\n#120a4b color description : Very dark blue.\n\n# #120a4b Color Conversion\n\nThe hexadecimal color #120a4b has RGB values of R:18, G:10, B:75 and CMYK values of C:0.76, M:0.87, Y:0, K:0.71. Its decimal value is 1182283.\n\nHex triplet RGB Decimal 120a4b `#120a4b` 18, 10, 75 `rgb(18,10,75)` 7.1, 3.9, 29.4 `rgb(7.1%,3.9%,29.4%)` 76, 87, 0, 71 247.4°, 76.5, 16.7 `hsl(247.4,76.5%,16.7%)` 247.4°, 86.7, 29.4 000033 `#000033`\nCIE-LAB 7.711, 26.68, -38.217 1.628, 0.854, 6.735 0.177, 0.093, 0.854 7.711, 46.608, 304.92 7.711, -0.989, -24.712 9.239, 15.28, -36.755 00010010, 00001010, 01001011\n\n# Color Schemes with #120a4b\n\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #434b0a\n``#434b0a` `rgb(67,75,10)``\nComplementary Color\n• #0a234b\n``#0a234b` `rgb(10,35,75)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #330a4b\n``#330a4b` `rgb(51,10,75)``\nAnalogous Color\n• #234b0a\n``#234b0a` `rgb(35,75,10)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #4b330a\n``#4b330a` `rgb(75,51,10)``\nSplit Complementary Color\n• #0a4b12\n``#0a4b12` `rgb(10,75,18)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #4b120a\n``#4b120a` `rgb(75,18,10)``\n• #0a434b\n``#0a434b` `rgb(10,67,75)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #4b120a\n``#4b120a` `rgb(75,18,10)``\n• #434b0a\n``#434b0a` `rgb(67,75,10)``\n• #020108\n``#020108` `rgb(2,1,8)``\n• #07041e\n``#07041e` `rgb(7,4,30)``\n• #0d0735\n``#0d0735` `rgb(13,7,53)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #170d62\n``#170d62` `rgb(23,13,98)``\n• #1d1078\n``#1d1078` `rgb(29,16,120)``\n• #22138f\n``#22138f` `rgb(34,19,143)``\nMonochromatic Color\n\n# Alternatives to #120a4b\n\nBelow, you can see some colors close to #120a4b. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #0a124b\n``#0a124b` `rgb(10,18,75)``\n• #0a0d4b\n``#0a0d4b` `rgb(10,13,75)``\n• #0d0a4b\n``#0d0a4b` `rgb(13,10,75)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #170a4b\n``#170a4b` `rgb(23,10,75)``\n• #1d0a4b\n``#1d0a4b` `rgb(29,10,75)``\n• #220a4b\n``#220a4b` `rgb(34,10,75)``\nSimilar Colors\n\n# #120a4b Preview\n\nText with hexadecimal color #120a4b\n\nThis text has a font color of #120a4b.\n\n``<span style=\"color:#120a4b;\">Text here</span>``\n#120a4b background color\n\nThis paragraph has a background color of #120a4b.\n\n``<p style=\"background-color:#120a4b;\">Content here</p>``\n#120a4b border color\n\nThis element has a border color of #120a4b.\n\n``<div style=\"border:1px solid #120a4b;\">Content here</div>``\nCSS codes\n``.text {color:#120a4b;}``\n``.background {background-color:#120a4b;}``\n``.border {border:1px solid #120a4b;}``\n\n# Shades and Tints of #120a4b\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #010106 is the darkest color, while #f5f3fd is the lightest one.\n\n• #010106\n``#010106` `rgb(1,1,6)``\n• #060317\n``#060317` `rgb(6,3,23)``\n• #0a0528\n``#0a0528` `rgb(10,5,40)``\n• #0e083a\n``#0e083a` `rgb(14,8,58)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #160c5c\n``#160c5c` `rgb(22,12,92)``\n• #1a0f6e\n``#1a0f6e` `rgb(26,15,110)``\n• #1e117f\n``#1e117f` `rgb(30,17,127)``\n• #231390\n``#231390` `rgb(35,19,144)``\n• #2716a2\n``#2716a2` `rgb(39,22,162)``\n• #2b18b3\n``#2b18b3` `rgb(43,24,179)``\n• #2f1ac4\n``#2f1ac4` `rgb(47,26,196)``\n• #331cd5\n``#331cd5` `rgb(51,28,213)``\n• #3b24e2\n``#3b24e2` `rgb(59,36,226)``\n• #4b35e4\n``#4b35e4` `rgb(75,53,228)``\n• #5a46e6\n``#5a46e6` `rgb(90,70,230)``\n• #6a58e9\n``#6a58e9` `rgb(106,88,233)``\n• #7969eb\n``#7969eb` `rgb(121,105,235)``\n• #887aed\n``#887aed` `rgb(136,122,237)``\n• #988cf0\n``#988cf0` `rgb(152,140,240)``\n• #a79df2\n``#a79df2` `rgb(167,157,242)``\n• #b7aef4\n``#b7aef4` `rgb(183,174,244)``\n• #c6c0f7\n``#c6c0f7` `rgb(198,192,247)``\n• #d6d1f9\n``#d6d1f9` `rgb(214,209,249)``\n• #e5e2fb\n``#e5e2fb` `rgb(229,226,251)``\n• #f5f3fd\n``#f5f3fd` `rgb(245,243,253)``\nTint Color Variation\n\n# Tones of #120a4b\n\nA tone is produced by adding gray to any pure hue. In this case, #28272e is the less saturated color, while #0b0055 is the most saturated one.\n\n• #28272e\n``#28272e` `rgb(40,39,46)``\n• #262431\n``#262431` `rgb(38,36,49)``\n• #232134\n``#232134` `rgb(35,33,52)``\n• #211e37\n``#211e37` `rgb(33,30,55)``\n• #1e1a3b\n``#1e1a3b` `rgb(30,26,59)``\n• #1c173e\n``#1c173e` `rgb(28,23,62)``\n• #191441\n``#191441` `rgb(25,20,65)``\n• #171144\n``#171144` `rgb(23,17,68)``\n• #140d48\n``#140d48` `rgb(20,13,72)``\n• #120a4b\n``#120a4b` `rgb(18,10,75)``\n• #10074e\n``#10074e` `rgb(16,7,78)``\n• #0d0352\n``#0d0352` `rgb(13,3,82)``\n• #0b0055\n``#0b0055` `rgb(11,0,85)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #120a4b is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.53017217,"math_prob":0.6208917,"size":3650,"snap":"2019-13-2019-22","text_gpt3_token_len":1678,"char_repetition_ratio":0.12561712,"word_repetition_ratio":0.011090573,"special_character_ratio":0.5632877,"punctuation_ratio":0.23725055,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99245554,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-26T18:31:06Z\",\"WARC-Record-ID\":\"<urn:uuid:1577f0a0-4450-4cce-b64a-ddaff5cb7e59>\",\"Content-Length\":\"36327\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:957d8c82-c173-4239-a3d6-a681e5539e35>\",\"WARC-Concurrent-To\":\"<urn:uuid:77a5ba1e-9217-439d-a261-67986db70386>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/120a4b\",\"WARC-Payload-Digest\":\"sha1:LLUY6MI3HCIQ4TQMEF2UDGW4HUNGRLH2\",\"WARC-Block-Digest\":\"sha1:JRJM7LVUSDHUMFTJVVT5SO3TDHKFXBTE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912205600.75_warc_CC-MAIN-20190326180238-20190326202238-00538.warc.gz\"}"}
https://goprep.co/ex-10.2-q11-prove-that-the-parallelogram-circumscribing-a-i-1njgmr
[ "# Prove that the parallelogram circumscribing a circle is a rhombus.\n\nSince ABCD is a parallelogram,\n\nAB = CD ...(1)", null, "It can be observed that\n\nDR = DS (Tangents on the circle from point D)\n\nCR = CQ (Tangents on the circle from point C)\n\nBP = BQ (Tangents on the circle from point B)\n\nAP = AS (Tangents on the circle from point A)\n\nAdding all these equations, we obtain\n\nDR + CR + BP + AP = DS + CQ + BQ + AS\n\n(DR + CR) + (BP + AP) = (DS + AS) + (CQ + BQ)\n\nCD + AB = AD + BC\n\nOn putting the values of equations (1) and (2) in this equation, we obtain 2AB = 2BC\n\nAB = BC ...(3)\n\nComparing equations (1), (2), and (3), we obtain\n\nAB = BC = CD = DA\n\nHence, ABCD is a rhombus.\n\nRate this question :\n\nHow useful is this solution?\nWe strive to provide quality solutions. Please rate us to serve you better.\nRelated Videos", null, "", null, "Quiz | Imp. Qs. on Circles37 mins", null, "", null, "Short Cut Trick to Find Area of Triangle43 mins", null, "", null, "Quiz | Area Related with Circles47 mins\nTry our Mini CourseMaster Important Topics in 7 DaysLearn from IITians, NITians, Doctors & Academic Experts\nDedicated counsellor for each student\n24X7 Doubt Resolution\nDaily Report Card\nDetailed Performance Evaluation", null, "view all courses", null, "" ]
[ null, "https://gradeup-question-images.grdp.co/liveData/PROJ5321/1496923710313395.png", null, "https://grdp.co/cdn-cgi/image/quality=90,fit=contain,width=350,f=auto/https://gs-post-images.grdp.co/2020/9/c72a482c4a3baae469ef89abbb5200e461392bb0c4505501c03e5751c6dec0c9poster-high-webp.png", null, "https://gs-post-images.grdp.co/2020/8/group-2x-img1598864374422-78.png-rs-high-webp.png", null, "https://grdp.co/cdn-cgi/image/quality=90,fit=contain,width=350,f=auto/https://gs-post-images.grdp.co/2020/9/fb784ff77709c85865ad904eb10c2a2b559094452616cfc4fdd2767ed316eb4dposter-high-webp.png", null, "https://gs-post-images.grdp.co/2020/8/group-2x-img1598864374422-78.png-rs-high-webp.png", null, "https://grdp.co/cdn-cgi/image/quality=90,fit=contain,width=350,f=auto/https://gs-post-images.grdp.co/2020/10/02a6f5a8687223d4bac3c435464e3980c0475115bd0fbaaff13c88e947d58a85poster-high-webp.png", null, "https://gs-post-images.grdp.co/2020/8/group-2x-img1598864374422-78.png-rs-high-webp.png", null, "https://grdp.co/cdn-cgi/image/height=128,quality=80,f=auto/https://gs-post-images.grdp.co/2020/8/group-7-3x-img1597928525711-15.png-rs-high-webp.png", null, "https://gs-post-images.grdp.co/2020/8/group-img1597139979159-33.png-rs-high-webp.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8663583,"math_prob":0.9937443,"size":1633,"snap":"2020-45-2020-50","text_gpt3_token_len":460,"char_repetition_ratio":0.11724985,"word_repetition_ratio":0.025316456,"special_character_ratio":0.2780159,"punctuation_ratio":0.10526316,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98573065,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,3,null,9,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-23T23:08:47Z\",\"WARC-Record-ID\":\"<urn:uuid:52eaddb7-50c8-4938-81d1-9ef39c082c36>\",\"Content-Length\":\"178162\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1aba51fd-4de7-4873-92e0-a7ba31c3175c>\",\"WARC-Concurrent-To\":\"<urn:uuid:dbb94a8a-0081-4f79-9538-7f9b9ca5d7da>\",\"WARC-IP-Address\":\"104.18.24.35\",\"WARC-Target-URI\":\"https://goprep.co/ex-10.2-q11-prove-that-the-parallelogram-circumscribing-a-i-1njgmr\",\"WARC-Payload-Digest\":\"sha1:W34D3JX473YU24AP7WXE5P7LONIGZQTR\",\"WARC-Block-Digest\":\"sha1:PWPNICLFVA6EIIQ5SZC5KBLWPCPLOIFS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107865665.7_warc_CC-MAIN-20201023204939-20201023234939-00333.warc.gz\"}"}
https://en.m.wikipedia.org/wiki/Self-dual_polyhedra
[ "# Dual polyhedron\n\n(Redirected from Self-dual polyhedra)\n\nIn geometry, every polyhedron is associated with a second dual figure, where the vertices of one correspond to the faces of the other, and the edges between pairs of vertices of one correspond to the edges between pairs of faces of the other. Such dual figures remain combinatorial or abstract polyhedra, but not all are also geometric polyhedra. Starting with any given polyhedron, the dual of its dual is the original polyhedron.", null, "The dual of a cube is an octahedron. Vertices of one correspond to faces of the other, and edges correspond to each other.\n\nDuality preserves the symmetries of a polyhedron. Therefore, for many classes of polyhedra defined by their symmetries, the duals belong to a corresponding symmetry class. For example, the regular polyhedra – the (convex) Platonic solids and (star) Kepler–Poinsot polyhedra – form dual pairs, where the regular tetrahedron is self-dual. The dual of an isogonal polyhedron (one in which any two vertices are equivalent under symmetries of the polyhedron) is an isohedral polyhedron (one in which any two faces are equivalent [...]), and vice-versa. The dual of an isotoxal polyhedron (one in which any two edges are equivalent [...]) is also isotoxal.\n\nDuality is closely related to reciprocity or polarity, a geometric transformation that, when applied to a convex polyhedron, realizes the dual polyhedron as another convex polyhedron.\n\n## Kinds of duality\n\nThere are many kinds of duality. The kinds most relevant to elementary polyhedra are polar reciprocity and topological or abstract duality.\n\n### Polar reciprocation\n\nIn Euclidean space, the dual of a polyhedron $P$  is often defined in terms of polar reciprocation about a sphere. Here, each vertex (pole) is associated with a face plane (polar plane or just polar) so that the ray from the center to the vertex is perpendicular to the plane, and the product of the distances from the center to each is equal to the square of the radius.\n\nWhen the sphere has radius $r$  and is centered at the origin (so that it is defined by the equation $x^{2}+y^{2}+z^{2}=r^{2}$ ), then the polar dual of a convex polyhedron $P$  is defined as\n\n$P^{\\circ }=\\{q~{\\big |}~q\\cdot p\\leq r^{2}$  for all $p$  in $P\\},$\n\nwhere $q\\cdot p$  denotes the standard dot product of $q$  and $p$ .\n\nTypically when no sphere is specified in the construction of the dual, then the unit sphere is used, meaning $r=1$  in the above definitions.\n\nFor each face plane of $P$  described by the linear equation\n\n$x_{0}x+y_{0}y+z_{0}z=r^{2},$\n\nthe corresponding vertex of the dual polyhedron $P^{\\circ }$  will have coordinates $(x_{0},y_{0},z_{0})$ . Similarly, each vertex of $P$  corresponds to a face plane of $P^{\\circ }$ , and each edge line of $P$  corresponds to an edge line of $P^{\\circ }$ . The correspondence between the vertices, edges, and faces of $P$  and $P^{\\circ }$  reverses inclusion. For example, if an edge of $P$  contains a vertex, the corresponding edge of $P^{\\circ }$  will be contained in the corresponding face.\n\nFor a polyhedron with a center of symmetry, it is common to use a sphere centered on this point, as in the Dorman Luke construction (mentioned below). Failing that, for a polyhedron with a circumscribed sphere, inscribed sphere, or midsphere (one with all edges as tangents), this can be used. However, it is possible to reciprocate a polyhedron about any sphere, and the resulting form of the dual will depend on the size and position of the sphere; as the sphere is varied, so too is the dual form. The choice of center for the sphere is sufficient to define the dual up to similarity.\n\nIf a polyhedron in Euclidean space has a face plane, edge line, or vertex lying on the center of the sphere, the corresponding element of its dual will go to infinity. Since Euclidean space never reaches infinity, the projective equivalent, called extended Euclidean space, may be formed by adding the required 'plane at infinity'. Some theorists prefer to stick to Euclidean space and say that there is no dual. Meanwhile, Wenninger (1983) found a way to represent these infinite duals, in a manner suitable for making models (of some finite portion).\n\nThe concept of duality here is closely related to the duality in projective geometry, where lines and edges are interchanged. Projective polarity works well enough for convex polyhedra. But for non-convex figures such as star polyhedra, when we seek to rigorously define this form of polyhedral duality in terms of projective polarity, various problems appear. Because of the definitional issues for geometric duality of non-convex polyhedra, Grünbaum (2007) argues that any proper definition of a non-convex polyhedron should include a notion of a dual polyhedron.\n\n#### Canonical duals\n\nAny convex polyhedron can be distorted into a canonical form, in which a unit midsphere (or intersphere) exists tangent to every edge, and such that the average position of the points of tangency is the center of the sphere. This form is unique up to congruences.\n\nIf we reciprocate such a canonical polyhedron about its midsphere, the dual polyhedron will share the same edge-tangency points, and thus will also be canonical. It is the canonical dual, and the two together form a canonical dual compound.\n\n#### Dorman Luke construction\n\nFor a uniform polyhedron, each face of the dual polyhedron may be derived from the original polyhedron's corresponding vertex figure by using the Dorman Luke construction.\n\n### Topological duality\n\nEven when a pair of polyhedra cannot be obtained by reciprocation from each other, they may be called duals of each other as long as the vertices of one correspond to the faces of the other, and the edges of one correspond to the edges of the other, in an incidence-preserving way. Such pairs of polyhedra are still topologically or abstractly dual.\n\nThe vertices and edges of a convex polyhedron form a graph (the 1-skeleton of the polyhedron), embedded on the surface of the polyhedron (a topological sphere). This graph can be projected to form a Schlegel diagram on a flat plane. The graph formed by the vertices and edges of the dual polyhedron is the dual graph of the original graph.\n\nMore generally, for any polyhedron whose faces form a closed surface, the vertices and edges of the polyhedron form a graph embedded on this surface, and the vertices and edges of the (abstract) dual polyhedron form the dual graph of the original graph.\n\nAn abstract polyhedron is a certain kind of partially ordered set (poset) of elements, such that incidences, or connections, between elements of the set correspond to incidences between elements (faces, edges, vertices) of a polyhedron. Every such poset has a dual poset, formed by reversing all of the order relations. If the poset is visualized as a Hasse diagram, the dual poset can be visualized simply by turning the Hasse diagram upside down.\n\nEvery geometric polyhedron corresponds to an abstract polyhedron in this way, and has an abstract dual polyhedron. However, for some types of non-convex geometric polyhedra, the dual polyhedra may not be realizable geometrically.\n\n## Self-dual polyhedra\n\nTopologically, a self-dual polyhedron is one whose dual has exactly the same connectivity between vertices, edges and faces. Abstractly, they have the same Hasse diagram.\n\nA geometrically self-dual polyhedron is not only topologically self-dual, but its polar reciprocal about a certain point, typically its centroid, is a similar figure. For example, the dual of a regular tetrahedron is another regular tetrahedron, reflected through the origin.\n\nEvery polygon is topologically self-dual (it has the same number of vertices as edges, and these are switched by duality), but will not in general be geometrically self-dual (up to rigid motion, for instance). Every polygon has a regular form which is geometrically self-dual about its intersphere: all angles are congruent, as are all edges, so under duality these congruences swap.\n\nSimilarly, every topologically self-dual convex polyhedron can be realized by an equivalent geometrically self-dual polyhedron, its canonical polyhedron, reciprocal about the center of the midsphere.\n\nThere are infinitely many geometrically self-dual polyhedra. The simplest infinite family are the canonical pyramids of n sides. Another infinite family, elongated pyramids, consists of polyhedra that can be roughly described as a pyramid sitting on top of a prism (with the same number of sides). Adding a frustum (pyramid with the top cut off) below the prism generates another infinite family, and so on.\n\nThere are many other convex, self-dual polyhedra. For example, there are 6 different ones with 7 vertices, and 16 with 8 vertices.\n\nA self-dual[clarification needed] non-convex icosahedron with hexagonal faces was identified by Brückner in 1900. Other non-convex self-dual polyhedra have been found, under certain definitions of non-convex polyhedra and their duals.[clarification needed]\n\n## Dual polytopes and tessellations\n\nDuality can be generalized to n-dimensional space and dual polytopes; in two dimension these are called dual polygons.\n\nThe vertices of one polytope correspond to the (n − 1)-dimensional elements, or facets, of the other, and the j points that define a (j − 1)-dimensional element will correspond to j hyperplanes that intersect to give a (nj)-dimensional element. The dual of an n-dimensional tessellation or honeycomb can be defined similarly.\n\nIn general, the facets of a polytope's dual will be the topological duals of the polytope's vertex figures. For the polar reciprocals of the regular and uniform polytopes, the dual facets will be polar reciprocals of the original's vertex figure. For example, in four dimensions, the vertex figure of the 600-cell is the icosahedron; the dual of the 600-cell is the 120-cell, whose facets are dodecahedra, which are the dual of the icosahedron.\n\n### Self-dual polytopes and tessellations\n\nThe primary class of self-dual polytopes are regular polytopes with palindromic Schläfli symbols. All regular polygons, {a} are self-dual, polyhedra of the form {a,a}, 4-polytopes of the form {a,b,a}, 5-polytopes of the form {a,b,b,a}, etc.\n\nThe self-dual regular polytopes are:\n\nThe self-dual (infinite) regular Euclidean honeycombs are:\n\nThe self-dual (infinite) regular hyperbolic honeycombs are:" ]
[ null, "https://upload.wikimedia.org/wikipedia/commons/thumb/d/de/Polyhedron_pair_6-8.png/300px-Polyhedron_pair_6-8.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87795585,"math_prob":0.9821659,"size":12520,"snap":"2021-43-2021-49","text_gpt3_token_len":3311,"char_repetition_ratio":0.16115372,"word_repetition_ratio":0.034907598,"special_character_ratio":0.24832268,"punctuation_ratio":0.16155759,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99842703,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-16T19:49:25Z\",\"WARC-Record-ID\":\"<urn:uuid:1f843fca-0273-4a32-bac1-291feec4b0f2>\",\"Content-Length\":\"110811\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dc753764-e6ac-4c24-8aec-a5578bd491db>\",\"WARC-Concurrent-To\":\"<urn:uuid:ec23efc5-9da1-4e94-a491-e889cebf44ca>\",\"WARC-IP-Address\":\"208.80.154.224\",\"WARC-Target-URI\":\"https://en.m.wikipedia.org/wiki/Self-dual_polyhedra\",\"WARC-Payload-Digest\":\"sha1:UFCP5XKTBXUPJAFTHUVDOIJIB6UBSM75\",\"WARC-Block-Digest\":\"sha1:4US3FVIB6AH2RQUBAO43Z7JEKCY2CUFS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323584913.24_warc_CC-MAIN-20211016170013-20211016200013-00465.warc.gz\"}"}
https://games.studiofreya.com/2012/11/clean-code/
[ "# Clean code\n\nBy on November 22, 2012\n\nI like clean code. I like readable code. And I like well organized code. Take this snippet:\n\n```network::Worker_ptr m_Worker;\nPlayer_ptr m_Player;\nnetwork::TcpClient_ptr m_Client;\n```\n\nAnd compare it to:\n\n```network::Worker_ptr m_Worker;\nPlayer_ptr m_Player;\nnetwork::TcpClient_ptr m_Client;\n```\n\nFor a compiler, they are not different. But for a human reading the code, the second one is just as readable as machine code. It might be anal, but code readability is a must for a project of any size to success, unless the unreadable code is the goal itself. This code is actually a working flight simulator.\n\n```#include <math.h>\n#include <sys/time.h>\n#include <X11/Xlib.h>\n#include <X11/keysym.h>\ndouble L ,o ,P\n,_=dt,T,Z,D=1,d,\ns,E,h= 8,I,\nJ,K,w,M,m,O\n,n,j=33e-3,i=\n1E3,r,t, u,v ,W,S=\n74.5,l=221,X=7.26,\na,B,A=32.2,c, F,H;\nint N,q, C, y,p,U;\nWindow z; char f\n; GC k; main(){ Display*e=\nXOpenDisplay( 0); z=RootWindow(e,0); for (XSetForeground(e,k=XCreateGC (e,z,0,0),BlackPixel(e,0))\n; scanf(\"%lf%lf%lf\",y +n,w+y, y+s)+1; y ++); XSelectInput(e,z= XCreateSimpleWindow(e,z,0,0,400,400,\n0,0,WhitePixel(e,0) ),KeyPressMask); for(XMapWindow(e,z); ; T=sin(O)){ struct timeval G={ 0,dt*1e6}\n; K= cos(j); N=1e4; M+= H*_; Z=D*K; F+=_*P; r=E*K; W=cos( O); m=K*W; H=K*T; O+=D*_*F/ K+d/K*E*_; B=\nsin(j); a=B*T*D-E*W; XClearWindow(e,z); t=T*E+ D*B*W; j+=d*_*D-_*F*E; P=W*E*B-T*D; for (o+=(I=D*W+E\n*T*B,E*d/K *B+v+B/K*F*D)*_; p<y; ){ T=p[s]+i; E=c-p[w]; D=n[p]-L; K=D*m-B*T-H*E; if(p [n]+w[ p]+p[s\n]== 0|K <fabs(W=T*r-I*E +D*P) |fabs(D=t *D+Z *T-a *E)> K)N=1e4; else{ q=W/K *4E2+2e2; C= 2E2+4e2/ K\n*D; N-1E4&& XDrawLine(e ,z,k,N ,U,q,C); N=q; U=C; } ++p; } L+=_* (X*t +P*M+m*l); T=X*X+ l*l+M *M;\nXDrawString(e,z,k ,20,380,f,17); D=v/l*15; i+=(B *l-M*r -X*Z)*_; for(; XPending(e); u *=CS!=N){\nXEvent z; XNextEvent(e ,&z);\n++*((N=XLookupKeysym\n(&z.xkey,0))-IT?\nN-LT? UP-N?& E:&\nJ:& u: &h); --*(\nDN -N? N-DT ?N==\nRT?&u: & W:&h:&J\n); } m=15*F/l;\nc+=(I=M/ l,l*H\n+I*M+a*X)*_; H\n=A*r+v*X-F*l+(\nE=.1+X*4.9/l,t\n=T*m/32-I*T/24\n)/S; K=F*M+(\nh* 1e4/l-(T+\nE*5*T*E)/3e2\n)/S-X*d-B*A;\na=2.63 /l*d;\nX+=( d*l-T/S\n*(.19*E +a\n*.64+J/1e3\n)-M* v +A*\nZ)*_; l +=\nK *_; W=d;\nsprintf(f,\n\"%5d %3d\"\n\"%7d\",p =l\n/1.7,(C=9E3+\nO*57.3)%0550,(int)i); d+=T*(.45-14/l*\nX-a*130-J* .14)*_/125e2+F*_*v; P=(T*(47\n*I-m* 52+E*94 *D-t*.38+u*.21*E) /1e2+W*\n179*v)/2312; select(p=0,0,0,0,&G); v-=(\nW*F-T*(.63*m-I*.086+m*E*19-D*25-.11*u\n)/107e2)*_; D=cos(o); E=sin(o); } }\n```\n\nSometimes it is necessary to write unreadable code, like the following, but not without proper comments.\n\n```boost::bind(\n/*\nSince IVideoDriver::getTexture is overloaded, vi must explicitly tell the compiler\nthe exact methodd we're going to use with boost::bind with static_cast.\n\nThis is our target signature:\n* static_cast<ITexture*(IVideoDriver::*)(const irr::io::path&)>\n\nAnd the matching method in IVideoDriver:\n* (&IVideoDriver::getTexture)\n\n*/\nstatic_cast<ITexture*(IVideoDriver::*)(const irr::io::path&)>(&IVideoDriver::getTexture),\n\n/* Pointer to the driver */\nm_Driver,\n\n/* Argument to the bound method */\nfilename.c_str())\n```\n\nWhich brings me to the final point. When exploring new ideas, and new methods and new libraries, it takes some time to get used to the conventions, and how to make the code pretty. Multiplayer is progressing, but most of the progress at the time is behind the scenes with improved networking infrastructure and cleaner code.\n\nPosted in: code quality, coding\nTagged: , ," ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.52932537,"math_prob":0.974905,"size":3537,"snap":"2023-14-2023-23","text_gpt3_token_len":1382,"char_repetition_ratio":0.077837534,"word_repetition_ratio":0.026785715,"special_character_ratio":0.4093865,"punctuation_ratio":0.2533207,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99908364,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-07T23:19:04Z\",\"WARC-Record-ID\":\"<urn:uuid:e794cd96-882d-4459-b44e-eec16ab8f7f5>\",\"Content-Length\":\"45808\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c16cb97d-e746-49b5-b60d-787be553fce2>\",\"WARC-Concurrent-To\":\"<urn:uuid:be9bffe7-0a7f-4c71-bd64-1a5cbe012505>\",\"WARC-IP-Address\":\"35.198.188.148\",\"WARC-Target-URI\":\"https://games.studiofreya.com/2012/11/clean-code/\",\"WARC-Payload-Digest\":\"sha1:HRLCS3ZSUNKMY6S6SA2XP7LTTCYU6PTF\",\"WARC-Block-Digest\":\"sha1:3SXZTMUJJVKIA43FG5G23DIJPKQJZSU3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224654016.91_warc_CC-MAIN-20230607211505-20230608001505-00401.warc.gz\"}"}
http://www.wsabstract.com/javatutors/loop3.shtml
[ "Categories:\n\n####", null, "The \"for\" loop\n\nThe \"`for`\" loop is a JavaScript \"method\" that allows a certain action (ie: block of code) to be performed continuously in a variably controlled fashion. It is very similar to a \"while\" loop in which lines of JavaScript codes can be grouped together and repeated until a certain condition. A real life example of a for loop would be as follows:\n\nfor length equal to 0 to length equal to 100\nrun!\n\nLets see the general syntax of for loops in JavaScript, where y is an arbitrary variable:\n\n```for (var y=0; y<=99; y++){\n}```\n\nThe above example will alert \"hi!\" 100 times. Lets look more closely at the heart of a \"for\" loop:\n\n`for (var y=0; y<=99; y++)`\n\nIt consists of three components:\n\nvar y=0 //The starting point of a for loop\ny<=99 //The ending boundary of a for loop\ny++ //How the \"for\" loop is incremented. y++ means increment it by one step each time until the boundary.\n\nThe part that may be confusing is the last part, \"y++\". Let's see the same above example, only this time, altering that particular part:\n\n```for (var y=0; y<=99; y=y+2){\n}```\n\nHow many \"hi\" will be alerted? Well, 50 will, because we are incrementing the \"counter\" not by 1, but by 2 this time. The point is, you can determine however you want to increment the for loop by assigning a different statement in the third component of the for loop.\n\nLets see a practical example of a \"for\" loop than, where it is used to calculate the sum of 1+2+3+.....all the way up to the specified number:\n\nHere's the function that performs this calculation:\n\n```<script type=\"text/javascript\">\nfunction cal(){\nvar y=1\nvar temp=prompt(\"Please input a positive integer:\")\nfor (var x=2;x<=temp;x++){\ny=y+x\n}" ]
[ null, "http://www.wsabstract.com/jkincludes/arrow2.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82199174,"math_prob":0.97221035,"size":1991,"snap":"2020-10-2020-16","text_gpt3_token_len":509,"char_repetition_ratio":0.11172622,"word_repetition_ratio":0.0,"special_character_ratio":0.2762431,"punctuation_ratio":0.12048193,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9958567,"pos_list":[0,1,2],"im_url_duplicate_count":[null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-08T08:07:53Z\",\"WARC-Record-ID\":\"<urn:uuid:8a5e9b3b-5fb6-42fd-8634-b2999fc1a670>\",\"Content-Length\":\"14266\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8915da1d-bb40-4137-b731-243f6708d506>\",\"WARC-Concurrent-To\":\"<urn:uuid:ce2a9eb6-7fb9-4582-88cc-98b6c0028b16>\",\"WARC-IP-Address\":\"50.31.114.161\",\"WARC-Target-URI\":\"http://www.wsabstract.com/javatutors/loop3.shtml\",\"WARC-Payload-Digest\":\"sha1:HFYC6V5NYETAAJJHLKIAHWSJ2WXL5H66\",\"WARC-Block-Digest\":\"sha1:7I34B4PD6GI5O7LTVUHROXWPLCZARKZ4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371810807.81_warc_CC-MAIN-20200408072713-20200408103213-00245.warc.gz\"}"}
https://profiles.doe.mass.edu/mcas/mcasitems2.aspx?grade=03&subjectcode=MTH&linkid=1&orgcode=01500000&fycode=2018&orgtypecode=5&
[ "# Lee\n\nDistricts Schools", null, "## 2018 Item by Item Results for GRADE 03 MATHEMATICS\n\n### Number of Students Included: 44     Mode: Online\n\n Lee - GRADE 03 MATHEMATICS ITEM INFORMATION PERCENT OF DISTRICT'S POSSIBLE POINTS ITEM TYPE REPORTING CATEGORY STANDARD ITEM DESC POSSIBLE POINTS LEE STATE DISTRICT-STATE DIFFERENCE 1 SR NF 3.NF.A.02 Determine the fraction that is plotted on a given number line. 1 64% 78% -14 2 SR OA 3.OA.A.03 Solve a word problem involving division of two whole numbers. 1 84% 82% 2 3 SA NT 3.NBT.A.01 Round a three-digit whole number to the nearest ten. 1 80% 78% 2 4 SA OA 3.OA.C.07 Determine the products and quotients of given multiplication and division facts. 1 66% 56% 10 5 SR NT 3.NBT.A.02 Solve a real-world problem by subtracting two three-digit whole numbers. 1 73% 70% 3 6 SA NF 3.NF.A.03 Write a comparison of two given unit fractions. 1 64% 71% -7 7 SR OA 3.OA.C.07 Use division or a related multiplication fact to solve a word problem. 1 82% 84% -2 8 SR MD 3.MD.B.03 Solve a one-step \"how many more\" problem using a given bar graph. 1 61% 67% -6 9 CR OA 3.OA.D.09 Find and justify the next number in a given pattern and explain a feature of the pattern. 3 49% 45% 4 10 SR MD 3.MD.C.07 Select the two expressions that can be used to find the total area of two adjacent rectangles. 1 36% 37% -1 11 SR NF 3.NF.A.03 Determine the fraction that is equivalent to a given fraction model. 1 41% 46% -5 12 SR GE 3.G.A.01 Determine which figure has the attributes of two given shapes. 1 18% 24% -6 13 SA OA 3.OA.A.04 Write an equivalent division equation for a given multiplication equation. 1 45% 49% -4 14 SR MD 3.MD.C.07 Determine the equation that can be used to find the area of a figure with a given length and width. 1 27% 42% -15 15 CR NF 3.NF.A.01 Determine the relationships between the number of equal parts and the number of wholes in a word problem. 3 37% 42% -5 16 SR NF 3.NF.A.03 From a given set of fractions, determine the fraction that is not equivalent to the other fractions. 1 34% 44% -10 17 SR OA 3.OA.A.01 Determine how a two-digit product can be expressed as equal groups of equal numbers of objects. 1 75% 66% 9 18 SR MD 3.MD.B.04 Use a ruler to determine the length of a given figure to the nearest fourth of an inch. 1 57% 56% 1 19 SA MD 3.MD.D.08 Determine the length of one rectangle given its width and the fact that it has the same perimeter as a second rectangle that is labeled with its length and width. 1 18% 25% -7 20 SR OA 3.OA.D.08 Determine the most reasonable solution to a word problem involving multiplication of two whole numbers. 1 48% 53% -5 21 SR MD 3.MD.A.01 Identify the time given on an analog clock using a digital clock. 1 52% 49% 3 22 SR OA 3.OA.D.09 Determine the terms of a numerical pattern and identify a feature that all the terms share. 1 68% 69% -1 23 SA OA 3.OA.B.05 Use the distributive property to complete a multiplication equation. 1 64% 61% 3 24 SR NT 3.NBT.A.01 Determine which expression with rounded numbers will give the best estimate when adding two whole numbers. 1 70% 71% -1 25 SA NF 3.NF.A.02 Plot a point at the location of a fraction on a given partitioned number line. 1 73% 85% -12 26 SA MD 3.MD.B.04 Interpret a line plot with data in whole numbers and mixed numbers. 1 32% 45% -13 27 SA OA 3.OA.B.06 Write a multiplication equation that can be used to solve an equal groups problem. 1 48% 44% 4 28 CR MD 3.MD.C.05 Find the area of a given rectangle made of equal-sized square units and justify whether the areas of two other rectangles are equal or not. 3 52% 51% 1 29 SR OA 3.OA.A.02 Determine which word problem can be solved using a given division expression. 1 50% 46% 4 30 SA OA 3.OA.D.08 Solve a two-step word problem using multiplication and addition. 1 57% 61% -4 31 SR NT 3.NBT.A.03 Solve a word problem by multiplying a one-digit whole number by a two-digit multiple of ten. 1 86% 76% 10 32 SR MD 3.MD.A.02 Estimate the mass of one amount of an item based on a given figure showing the mass for a different amount of the same item. 1 61% 72% -11 33 SR GE 3.G.A.01 Identify the true statement about the mathematical names of a set of given shapes. 1 39% 39% 0 34 SR NT 3.NBT.A.03 Find the products of one-digit whole numbers multiplied by two-digit multiples of 10. 1 55% 56% -1 35 CR NT 3.NBT.A.02 Add and subtract two- and three-digit numbers and demonstrate the relationship between addition and subtraction with an equation. 3 57% 52% 5 36 SR NF 3.NF.A.02 Identify the fraction that is plotted on a given number line. 1 36% 57% -21 37 SA GE 3.G.A.02 Create a fraction model for a unit fraction by determining the number of parts needed and how many parts should be shaded. 1 84% 87% -3 38 SA OA 3.OA.B.05 Complete the steps needed to use the distributive property to solve a multiplication equation. 1 23% 31% -8 39 SA MD 3.MD.C.06 Find the area of a given figure by counting units or multiplying length and width. 1 86% 74% 12 40 SR GE 3.G.A.02 Determine which figure with part of its area shaded represents a given unit fraction. 1 77% 78% -1\n\nNotes: State results in grades 3 and 6 are based on students taking that mode and are not representative of the full state population." ]
[ null, "https://profiles.doe.mass.edu/images/btn.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7230264,"math_prob":0.99252987,"size":5304,"snap":"2021-31-2021-39","text_gpt3_token_len":1707,"char_repetition_ratio":0.1526415,"word_repetition_ratio":0.03344121,"special_character_ratio":0.3831071,"punctuation_ratio":0.13175122,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9879175,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-02T08:06:52Z\",\"WARC-Record-ID\":\"<urn:uuid:e3725a3a-03f1-48f8-942d-4b91b3f72885>\",\"Content-Length\":\"101849\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:95c13c57-ad01-4100-bb10-15a19e2340cc>\",\"WARC-Concurrent-To\":\"<urn:uuid:e376eb95-8439-4c6c-ad9c-0574c884dda1>\",\"WARC-IP-Address\":\"170.63.127.48\",\"WARC-Target-URI\":\"https://profiles.doe.mass.edu/mcas/mcasitems2.aspx?grade=03&subjectcode=MTH&linkid=1&orgcode=01500000&fycode=2018&orgtypecode=5&\",\"WARC-Payload-Digest\":\"sha1:HZGODAPN5S67YCOENSFMJB4RM2VAZMCJ\",\"WARC-Block-Digest\":\"sha1:D7YIBAGGOLAWGUQC4N5H5JJCO5MZLJXZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154310.16_warc_CC-MAIN-20210802075003-20210802105003-00385.warc.gz\"}"}
https://www.groundai.com/project/comparison-of-the-gradient-flow-with-cooling-in-su3-pure-gauge-theory/
[ "Comparison of the gradient flow with cooling in SU(3) pure gauge theory\n\n# Comparison of the gradient flow with cooling in Su(3) pure gauge theory\n\n## Abstract\n\nThe gradient (Wilson) flow has been introduced recently in order to provide a solid theoretical framework for the smoothing of ultraviolet noise in lattice gauge configurations. It is interesting to ask how it compares with other, more heuristic and numerically cheaper smoothing techniques, such as standard cooling. In this study we perform such a comparison, focusing on observables related to topology. We show that, already for moderately small lattice spacings, standard cooling and the gradient flow lead to equivalent results, both for average quantities and configuration by configuration.\n\n###### pacs:\n11.15.Ha, 11.15.Kc, 12.38.Aw.\n\n## I Introduction\n\nAt present, the lattice formulation represents the best available tool for a gauge-invariant regularization Wilson () and a systematic non-perturbative numerical study of strong interactions, and, more generally, of gauge theories. Like for any regularized theory, one has to deal with unphysical fluctuations at the scale of the ultraviolet (UV) cutoff (which is set by the lattice spacing in the case of lattice gauge theories), which must be properly treated. Over the years, various techniques have been developed in this sense. Where possible, proper prescriptions can be assigned for a perturbative or non-perturbative renormalization of physical quantities. Another widely used technique is instead to apply some kind of smoothing procedure, in order to dampen the fluctuations at the UV scale, while hopefully leaving the physical content unchanged.\n\nTypical examples of observables requiring renormalization are the topological charge (winding number) and, more generally, the observables related to topology, like the topological susceptibility. Contrary to its continuum counterpart, the lattice gluonic definition of the topological charge is affected by UV fluctuations: it gets multiplicatively renormalized zetaref () and does not take integer values. Further additive renormalizations, related to contact terms, appear when defining the topological susceptibility addref ().\n\nApart from switching to a fermionic definition of topology, via the index theorem, various strategies have been developed to successfully deal with such renormalizations, going from a direct computation and subtraction of them teper-89 (); cdpv-90 (); dv-92 (); acdgv-93 (); fp-94 (); add-97 (); addk-98 () to the application of smoothing methods to dampen the UV fluctuations and recover an almost integer valued observable. In this respect, cooling techniques cooling (), which proceed through a local minimization of the gluonic action, are particularly well suited, since the topological content of gauge configurations becomes quasi-stable against minimization as one approaches the continuum limit, i.e.  as one recovers a proper definition of the gauge field topology.\n\nIn this context, the recent introduction of the gradient flow (also known as Wilson flow when used in connection with the Wilson action) represents an important advance Luscher_wf0 (); Luscher_wf1 (). The main difference with respect to previously used smoothers is that in this case the elimination of UV fluctuations is governed by a differential equation, thus achieving a better analytical control of the smoothing procedure.\n\nAn interesting and due question regards how the gradient flow compares with other standard smoothing techniques. The present study is a step in the direction of clarifying this issue. In particular we will compare standard cooling and the gradient flow, for the determination of topological observables, in the lattice gauge theories discretized with the Wilson action.\n\nSuch a question is of general interest, since standard smoothing techniques have been widely used in the literature. But it is also of great practical interest. Indeed, as we will clarify later, the application of the gradient flow is much more computationally demanding than standard cooling. It is therefore compelling to understand what the effective differences are between the two methods, depending on the chosen observable.\n\nThe paper is organized as follows. In Section II we provide a brief description of the gradient flow and of standard cooling and then compare them in the limit of smooth fields. In Section III we first discuss the definition of a general setting for the comparison of the two methods; then we present our numerical results for topological quantities. Finally, in Section IV, we discuss our results and draw our conclusions.\n\n## Ii Cooling and the gradient flow\n\nIn this section, for the benefit of the reader, we recall the definitions of the gradient flow and of the cooling procedure, and present the details of our implementation. We will limit ourselves to the case of the Wilson action for pure gauge theories Wilson (), which is the one used in our simulations, but the generalization to different discretizations does not present significant difficulties.\n\nThe Wilson action is written in terms of the product of the link variables along an elementary face (plaquette) of the lattice, , in the form\n\n S=2Ng20∑x,μ<νμ,ν≥0(1−1NReTrUμν) , (1)\n\nwhere is the number of colors. It is convenient to introduce the staples as the (in general non unitary) matrices , defined by\n\n Wμ(x)= ∑ν≥0,ν≠μ[Uν(x)Uμ(x+^ν)U†ν(x+^μ)+ (2) +U†ν(x−^ν)Uμ(x−^ν)Uμ(x−^ν+^μ)] ;\n\nthe part of the action involving a given link variable is then simply written as . To avoid confusion, in the following expressions we will not make use of the implicit summation over repeated indices.\n\nThe gradient flow is defined (see Luscher_wf0 (); Luscher_wf1 ()) by the solution of the evolution equations\n\n ˙Vμ(x,τ)=−g20[∂x,μS(V(τ))]Vμ(x,τ) (3) Vμ(x,0)=Uμ(x) ,\n\nwhere the link derivatives are defined by\n\nIn this expression are the (hermitian) 1 generators of the algebra, with the normalization , and\n\n Xa(y,ν)={Taif (y,ν)=(x,μ)0else . (5)\n\nIf we introduce the notation we have\n\n ∂(a)x,μS(U)=2g20ImTr[TaΩμ] (6)\n\nand is given by\n\n g20∂x,μS(U)=2i∑aTaImTr[TaΩμ]= (7) =12(Ωμ−Ω†μ)−12NTr(Ωμ−Ω†μ) .\n\nIn practice, the gradient flow moves the gauge configuration along the steepest descent direction in the configuration space, i.e.  along the gradient of the action (hence the name of gradient flow); in particular, the chosen sign in the evolution equations leads to a minimization of the action. Indeed, from the definition Eq. (3) and the previous expressions it is simple to show that\n\n ddτS(V(τ))=−g20∑a,x,μ≥0[∂(a)x,μS(V(τ))]2≤0 . (8)\n\nThus is a monotonically decreasing function of the flow time and the “evolved” variables can be used as the smoothed version of the original link variables . From the explicit expression, Eq. (7), we can also see that the gradient flow is just the flow generated by the infinitesimal version of the isotropic stout smearing introduced in Ref. MP (). It is important to stress at this point that quantity , defined here and used in the following, is the flow time in dimensionless units.\n\nThe integration of the flow in Eq. (3) can be performed by using standard methods for ordinary differential equations; in particular, we adopted the third order Runge-Kutta scheme described in appendix C of Ref. Luscher_wf1 (). We have chosen an elementary integration step , and verified that the integration error induced by this choice does not significantly affect our results 2.\n\n### ii.2 Cooling\n\nAlso in the case of cooling, the idea is that of evolving the gauge configuration so as to minimize the gauge action: in fact, cooling has been one of the first procedures introduced to get rid of UV artifacts by smoothing gauge configurations cooling (). However, while the gradient flow is defined by an evolution equation, the cooling method proceeds by discrete steps: in each step the action is minimized with respect to a subset of configuration variables (e.g., a single link or even a link subgroup), and then the procedure is performed iteratively over all variables, in order to achieve a global movement of the configuration towards the minimum of the gauge action.\n\nMany variants of cooling have been devised, in which the discrete steps are made more or less smooth coolcon (); coolnuc (). Here we will consider the simplest, original version, also known as standard cooling:\n\n• An elementary step of the algorithm consists in replacing a given link variable by the group element which locally minimizes the action, while all other link variables are kept fixed, i.e.  by the matrix which maximizes\n\n ReTr[MW†μ(i)].\n\nIn the particular case of the gauge theory, the maximization step can be performed analytically, with the result\n\n M=Wμ(x)√detWμ(x) .\n\nFor the maximization is performed by using a Cabibbo-Marinari like algorithm (CM ()), i.e.  by iterating the maximization over a covering set of subgroups.\n\n• The procedure is then repeated iteratively by visiting link variables on all sites and along all directions of the lattice. In our implementation we will first sweep lattice sites, following the standard lexicographic order, and then link directions, starting with and . Both the starting link and the visiting order can be changed at will, leading to slightly different cooling variants.\n\n• A complete sweep of the lattice is what is usually called a cooling step. A cooling step can be iterated times, thus generating a (discrete) flow in the space of gauge configurations.\n\nIt is important to stress once more that, contrary to other smoothing procedures such as smearing, a cooling sweep proceeds iteratively, i.e.  at each elementary step the cooled link is substituted in the configuration before computing the staple needed to cool the next link. If staples were all computed before starting the cooling sweep, the decrease of the action would not be guaranteed anymore, and instabilities would appear, similar to those happening in the repeated application of smearing when the smearing parameter is too large (see, e.g., Ref. jim ()). This iterative nature of cooling will be important when discussing the speed at which cooling proceeds, as compared with the gradient flow.\n\nIt is interesting to notice that there is one variant of cooling which resembles the gradient flow more closely, namely the controlled cooling introduced in Ref. coolcon (). In that case, the elementary step of cooling consists in minimizing the action under the constraint\n\n 1NTr{(U†μ−U′†μ)(Uμ−U′μ)}≤δ2 (9)\n\nwhere and are, respectively, the old and the new link variables. Also in this case the configuration proceeds towards a minimum, but with the constraint that at each elementary step the new link variable does not differ much from the old variable, depending on the value of the controlling parameter . For small enough , the cooling step effectively becomes an infinitesimal movement along the steepest descent direction, i.e.  it becomes a possible integrator of the gradient flow. Indeed, the authors of Ref. coolcon () verified that, for small enough , the order in which the links are cooled becomes immaterial.\n\n### ii.3 Perturbative relation between the two smoothing procedures\n\nAs we have already stressed, both cooling and the gradient flow evolve the gauge configuration towards a minimum of the gauge action. In a perturbative approximation, in which all link variables are very close to the identity element of the gauge group, the connection between the two procedures can be investigated in more detail, and a relation can be found between the speed at which the two evolutions proceed. This relation will be compared with the numerical results in Section III.\n\nLet us assume, therefore, that for each link variable, so that the staple takes the simple form , where both and are infinitesimal quantities. In this approximation, one has\n\n Ωμ≃6+i∑a[6uaμ(x)−waμ(x)]Ta\n\nand Eq. (7) becomes\n\n g20∂x,μS(U)=i∑a[6uaμ(x)−waμ(x)]Ta. (10)\n\nAs a consequence, the evolution equation of the gradient flow can be approximated as follows:\n\n uaμ(x,τ+ϵ)≃uaμ(x,τ)−ϵ[6uaμ(x,τ)−waμ(x,τ)]. (11)\n\nOn the other hand, cooling acts so as to substitute with the projection of over the gauge group. In the perturbative approximation, this projection is simply , so that the elementary cooling step corresponds to the substitution\n\n uaμ(x)→waμ(x)6. (12)\n\nA naive comparison of Eqs. (11) and (12) would lead to the conclusion that the instantaneous speed at which links evolve in the gradient flow is such that a whole cooling step would be covered in a step of gradient flow evolution, i.e.  that the approximate relation should hold between the gradient flow time and the number of cooling steps. The factor 6 comes, given the normalization chosen for the gradient, from the number of staples around a given link, i.e.  it is equal to , where is the number of space-time dimensions.\n\nHowever, such a conclusion is wrong by a factor , as is clear from the following argument. The staple appearing in the gradient flow is constructed with gauge links all computed at the same flow time . On the contrary, in the case of cooling, due to the iterative nature of the process, some of the links used to construct the staple have already undergone the cooling step under consideration, and this results in an increase in the speed of cooling. For a regular visiting order of the lattice links during the sweep, one has that, on average, that half of the neighboring links have already been cooled one more time: that results in a speed increase for cooling by a factor 2 with respect to the naive expectation, as one can evince from the simple diffusive model discussed in Appendix A.\n\nTherefore, the predicted perturbative relation is actually . Such a relation is expected to depend on the dimensionality of the system (and on the normalization of the gradient, i.e.  on the fact that we actually take the gradient of ), but not on the number of colors, at least in the limit of smooth fields.\n\n### ii.4 Smoothing and the continuum limit\n\nLet us now discuss how smoothing has to be tuned as the continuum limit is approached. An important point is that this tuning is independent of the particular kind of smoothing, be it cooling, the gradient flow or something else, once a precise correspondence has been found between the different techniques, which is valid lattice spacing by lattice spacing.\n\nSmoothing is, in general, an arbitrary modification of the theory in the UV, up to some length scale , with the only requirement that it dampens the quantum fluctuations on length scales smaller than . While smoothing changes the theory up to , we have to ensure that this does not affect our continuum results, i.e.  that physics does not depend on the choice of . If we are studying an observable which is naturally defined for large distances only, an obvious example being the effective mass extracted from the expectation value of a correlator, then it is natural to keep fixed in physical units: to avoid systematical dependences on , it will be sufficient to use correlators defined at distances .\n\nThis possibility is particularly appealing in the gradient flow setup, since it can be shown that composite operators defined at fixed physical flow time renormalize in a simple way (see Ref. Luscher:2011bx ()). In particular, for the case of the gradient flow one has\n\n λS≃√8t , (13)\n\nwhere is the flow time in physical units (see Ref. Luscher_wf1 ()), being the lattice spacing. This procedure can now be simply translated in terms of cooling. Indeed from the argument of the previous section (i.e.  ), which will be accurately verified against numerical results in the following sections, we expect for cooling the analogous relation\n\n λS≃a√8nc/3 , (14)\n\ni.e. the number of cooling steps has to be scaled proportionally to in order to keep fixed. Actually this is not a completely new result, since it is already well known that cooling acts like a diffusive process.\n\nThe situation can be less trivial for observables which are not related to large distance correlators, but are instead an integral over all distances of some two point function, like a susceptibility. In this case it is not guaranteed apriori that keeping fixed will not affect the continuum limit, and one must look for the existence of a proper “safe scaling window” for (see Ref. Luscher:2013vga () for a discussion regarding the gradient flow).\n\nAn example is the topological susceptibility, which is the integral over all distances of the two point correlator of the topological charge density. In this case one can follow different strategies to look for the safe scaling window. A known procedure vicari_rep () is to look for a plateau in terms of at every fixed lattice spacing, and then perform the continuum extrapolation of the plateau values. The existence of the plateau ensures that is small enough not to affect the physical result and that, on the other hand, the smoothing is effective in removing additive and multiplicative renormalizations.\n\nAlternatively, one could perform the continuum limit of results obtained at fixed , and then look for a safe plateau, in terms of , in the continuum extrapolated values. It is not the purpose of this study to perform an accurate check of the consistency of these two strategies. What we will show, instead, is that two perfectly equivalent definitions of exist at every fixed lattice spacing, Eq. (13) and Eq. (14), defined by either cooling or the gradient flow, in terms of which one can perform the preferred continuum extrapolation.\n\n## Iii Numerical results\n\nMost of the simulations have been performed on a lattice at the bare coupling values , corresponding to the lattice spacings reported in Table 1 and to physical lattice sizes ranging from to . Here We do not have the aim to keep finite size effects well under control, since our purpose is simply the check how cooling and the gradient flow compare to each other, on the same configuration sample, in the smoothing of fluctuations at the UV scale. However, a comparison with some simulations performed on larger lattices shows that such effects are not large and do not significantly affect our conclusions.\n\nFor each value of the bare coupling we have generated configurations, each one separated from the next by Monte Carlo steps, a single step consisting of a full lattice update with heatbath (Creutz1980 (); KP ()) and overrelaxation sweeps (Creutz1987 ()). On these configurations, we have evaluated the topological charge after smoothing, by using both cooling (we have reached a maximum of cooling steps, with measurements taken after each step) and the gradient flow (reaching a maximum flow time , with measurements performed every ). The expression used for the discretization of the topological charge density is\n\n qL(x)=−129π2±4∑μνρσ=±1~ϵμνρσTr(Uμν(x)Uρσ(x)), (15)\n\nwhere for positive indices, while for the negative directions the relation and the complete antisymmetry are used.\n\n### iii.1 Setting a common scale", null, "Figure 1: Behavior of one minus the average plaquette as a function of number of cooling steps (continuous lines) and of (three times) the gradient flow time (dashed lines).\n\nThe purpose of the present study is to compare how the (continuous) gradient flow and the discrete flow generated by cooling compare to each other. It is clear that, in order to do that, we need to set a common scale, i.e.  to fix apriori what is the flow time to be compared with cooling steps. The simplest way to proceed is to set such a common scale by using some standard observable, and the most natural observable is given by the quantity whose minimization defines both flows, that is by the action itself. This is also the strategy adopted in the past to compare different versions of cooling coolcomp ().\n\nIn Fig. 1 we report the average plaquette (action density) values as a function of (for cooling) and of (for the gradient flow case). Such functions permit to obtain the desired correspondence: for each given value of the inverse bare gauge coupling , we define as the value of the gradient time that changes the average action by the same amount as cooling steps.\n\nA plot of the functions , obtained for the different explored values of , is shown in Fig. 2: the agreement among the different lattice spacings is striking and demonstrates that the correspondence between cooling and the gradient flow has a perfectly well-defined continuum limit. The continuous line corresponds to the function . It is clear that this function is a good approximation of for all the lattice spacings used, and becomes better and better as increases: the agreement is at the level of 1% for and of 0.1% (i.e.  already within the precision of our determination) for . In the following, for simplicity, we will just use the approximation , which is equivalent to saying that one unit of gradient flow time corresponds to three cooling steps; corrections to this assumptions prove to be completely irrelevant to the following analysis. Preliminary results show that the relation holds true also for the gauge group , thus supporting the perturbative argument of the previous section.", null, "Figure 2: Behavior of τ(nc) as a function of the number of cooling steps nc. The continuous line corresponds to τ=nc/3. Data points at different lattice spacings are hardly distinguishable.\n\n### iii.2 Determination of the topological background\n\nThe lattice topological charge is defined as the sum over all the lattice sites of the charge density given in Eq. (15). Although is not exactly quantized, because of lattice artifacts, sharp peaks appear in the topological charge distribution, as the smoothing procedure goes on, located at approximately integer values.\n\nAn example of the probability distribution of for is shown in Fig. 3, where the results obtained both with cooling () and the gradient flow () are shown. The fact that the two distributions perfectly agree with each other is a first indication that, at least for the computation of average quantities, the two considered smoothing procedures are equivalent.\n\nIn order to reduce the lattice artefacts and improve the convergence towards the continuum limit, the estimator of the topological background that will be used in the following analysis is defined by the procedure b4-1 ():\n\n Q=round(αQL) , (16)\n\nwhere denotes the integer closest to and the rescaling factor is determined in such a way to minimize\n\n (17)\n\nIn this way, the distribution of is such that the sharp peaks visible in Fig. 3 move exactly onto integer values.\n\nWe emphasize that this procedure is not a renormalization, but just a redefinition of the observable in order to obtain an integer-valued topological charge and to significantly reduce lattice artefacts, see vicari_rep () for a discussion on this point. On the other hand, as we will show in the following (see Table 2), cooling and the gradient flow lead to perfectly equivalent results independently of the chosen definition of topological charge. This is also manifest from Fig. 3, where no rounding has been applied.\n\nAn example of the behaviour of the rescaling factor is reported in Fig. 4, for two different values of . The oscillations observed for a small number of cooling steps (or equivalently for small values of the flow time) are due to instabilities of the optimization procedure adopted to minimize Eq. (17) and disappear once the configurations are smooth enough (i.e.  once the peaks in are well defined); in particular, they almost disappear by reducing the lattice spacing.", null, "Figure 3: Probability distribution of the topological charge for β=6.2, evaluated after 21 cooling steps and after gradient flow with τ=7. Due to the very good agreement, the two distributions are hardly distinguishable in the figure. The corresponding figures for the other β values are analogous.", null, "Figure 4: Plot of the rescaling factor α to be used in the definition of the topological charge, Eq. (16), for β=5.95 and β=6.2, when using cooling and gradient flow.\n\n### iii.3 Comparison for average quantities: the topological susceptibility\n\nIn this section we present our results for the topological susceptibility obtained by using cooling or the gradient flow as smoothers. The topological susceptibility is defined by\n\n χ=⟨Q2⟩V=⟨Q2⟩a4NtN3s , (18)\n\nwhere and are the temporal and spatial extents of the lattice and is given by Eq. (16).\n\nIn the continuum limit, topological sectors become strictly separated and the topological charge is stable under any smoothing procedure which minimizes the action. On the other hand, at finite lattice spacing, is in general only quasi-stable, and topological backgrounds can be eventually washed out by a prolongated smoothing. However the two time scales, at which the UV fluctuations or the topological background are respectively affected, become rapidly well separated as the lattice spacing is reduced. That results in the appearance of a well-defined and extended plateau, as a function of the amount of smoothing, for topological quantities, like the susceptibility .\n\nAll this is well known for cooling and, for the reason previously explained, the plateau value is the one typically used in computations. Our purpose is now to check if, under the gradient flow, the topological susceptibility behaves in a similar fashion and, more generally, to compare its behaviour with the one obtained by cooling. To this aim we have computed for the three different lattice spacings adopted, using configurations smoothed both with cooling and the gradient flow. In Fig. 5 and Fig. 6 the values of obtained for and are plotted against the deviation of the average plaquette from unity, which is proportional to the action density, i.e.  the variable that we have established as a “thermometer” to compare cooling and the gradient flow.", null, "Figure 5: Topological susceptibility computed for β=5.95 after cooling or gradient flow. The average plaquette ⟨P⟩ is used to set a common scale.", null, "Figure 6: Topological susceptibility computed for β=6.2 after cooling or gradient flow. The average plaquette ⟨P⟩ is used to set a common scale.\n\nApart from small deviations at the very beginning of the smoothing, the two determinations are completely equivalent: the agreement is perfect starting from on the coarsest, and starting from on the finest explored lattice, see also Table 2 for some representative numerical values. On the other hand, such an agreement was already expected from the superposition of the two topological charge distributions, shown in Fig. 3, since is just one of the moments of this distribution. On a larger lattice, the value of for and is , in perfect agreement with the one reported in the table, obtained by using a lattice.\n\nA nice scaling of the topological susceptibility to the continuum limit is observed in both cases (i.e.  both for cooling and the gradient flow), see Figs. 7-8 for the case of the gradient flow, with extended plateaux around MeV, even if an accurate estimate of the finite size and UV cutoff systematic effects is not the purpose of this study.", null, "Figure 7: Behaviour of the topological susceptibility under the gradient flow for the different lattice spacings adopted. The black filled triangle denotes a check for finite size effects performed on a 264 lattice for the bare coupling value β=6.2.", null, "Figure 8: Behaviour of the topological susceptibility under cooling and the gradient flow (zoom of the plateau region) as a function of the smoothing length λS defined by Eqs.(13)-(14).\n\n### iii.4 Comparison configuration by configuration\n\nWe have shown that cooling and the gradient flow provide perfectly equivalent results for average topological quantities, such as the topological susceptibility. Here we want to make a more stringent test, comparing the outcome of the gradient flow and of cooling configuration by configuration.", null, "Figure 9: Fraction of the configurations for which different results are obtained, for the topological charge, using two different procedures. Circles refer to the comparison between cooling and gradient flow, while triangles refer to different cooling implementations (data points have been slightly shifted horizontally in order to distinguish them). The square dot is the result of the comparison between cooling and the gradient flow on a 304 lattice, i.e.  at fixed physical volume with respect to the 204 lattice at β=5.95.\n\nFirst, we have determined the percentage of configurations where cooling and the gradient flow obtain different results for the global topological content . This is reported in Fig. 9: the topological charges were estimated after cooling steps and after units of flow time, respectively, however results are stable in a wide range of . The percentage is around 40% on the coarsest lattice () and it rapidly decreases, seemingly exponentially in , reaching around 1% on the finest lattice ().\n\nOne could suspect that this strong decrease is related to the variation of the physical volume; however, the effect of the volume change is in fact just a small contribution to this decrease. To check this point, we have performed simulations on a lattice at bare coupling (which is approximately of the same physical size as the lattice with ) and we have found that the percentage of configurations on which cooling and the gradient flow do not agree in the determination of is about . Therefore, also at constant volume this quantity strongly decreases with the lattice spacing.\n\nIt is interesting to compare this rate of different determinations of with the analogous rate obtained by comparing two slightly different versions of cooling, the one used in this paper and a simple variation, in which we just move the starting point of the cooling sweep from the origin to the middle of the lattice. Results are reported in Fig. 9 as well, and are completely equivalent with the previous ones, showing that the differences between cooling and the gradient flow are perfectly explainable in terms of the normal variations between different smoothing techniques, which take place when the starting configuration presents some degree of coarseness and rapidly disappear as one approaches the continuum limit.", null, "Figure 10: Plot of ⟨δQ2⟩/⟨Q2⟩ as a function of the number of cooling steps. See Eq. (19) for definitions.", null, "Figure 11: Projection on the z−t plane of the topological charge density for a β=6.2 configuration of total charge Q=2 after 21 cooling steps (continuous line) or after 7 units of gradient flow time (dotted line).\n\nA slightly different question is how much the different determinations of between the two methods are relevant with respect to the global topological activity, taking place on a given lattice at a given value. In order answer this question, we have measured the quantity\n\n ⟨δQ2⟩≡⟨(Q(c)−Q(gf))2⟩, (19)\n\nwhere and are the corresponding (i.e.  at ) estimates of the topological charge obtained by cooling and by the gradient flow, and we have normalized it by the corresponding value of : in this way we normalize with respect to possible variations of the topological activity due, for instance, to the different physical volumes. Numerical results for are shown in Fig. 10: also in this case it is clear that the differences rapidly disappear as one approaches the continuum limit.\n\nFinally, it is interesting to ask whether the observed agreement between cooling and the gradient flow is something that regards only the global topological charge of gauge configurations, or whether the agreement holds true also at a local level. The latter, of course, is a much stronger statement. In Fig. 11 we report the topological charge density, projected on the plane, obtained on a typical configuration where (with , and ). As one can appreciate, the agreement is also very good also at a local level. Such a result may give hints that for observables not directly related to topology one could also obtain similar results when adopting cooling or the gradient flow; however, a systematic investigation of this possibility is left to future studies.\n\n## Iv Discussion and conclusions\n\nThe purpose of this study was to compare the gradient flow and the discrete flow generated by standard cooling, with respect to the determination of the topological properties of non-Abelian gauge theories on a lattice, with particular reference to the case of the pure gauge theory.\n\nTo that aim, we have first established a relation between the gradient flow time and the number of cooling steps , so that the plaquette action density, which is the quantity minimized by both flows, coincides. The relation holds within a good precision and already after a few cooling steps; such a relation is also in agreement with a perturbative estimate, which is expected to be valid in the limit of smooth fields and to depend on the dimensionality of the system ( where is the number of space-time dimensions), but not on the details of the gauge group.\n\nWe have proven that, after a very few transient cooling steps, the two flows lead to equivalent results, the transient region rapidly decreasing as the continuum limit is approached. This assertion is true at various degrees of strength. It is true for average quantities: we have checked this assertion with some accuracy for the topological susceptibility; however, given the superposition of the two probability distributions (see Fig. 3), we expect this to be true also for the higher order moments, which are needed to specify the dependence of the theory b4-1 (); b4-2 (); b4-3 (); b4-4 (); vicari_rep ()\n\nThis expectation is also supported by the fact that, at a stronger level, even the discrepancies in the determination of , which are found configuration by configuration, rapidly become irrelevant as the continuum limit is approached, and already for  fm. Moreover, the local profiles of topological charge densities, obtained by the two smoothing methods on sample configurations, are also very close to each other.\n\nIt is important, at this point, to stress that these conclusions do not depend on the specific prescriptions adopted to define the lattice topological charge or to perform the continuum limit. The outcome of this study is that, at every fixed lattice spacing, cooling and gradient flow give the same result provided the number of cooling steps and the flow time are related by (or, equivalently, the smoothing cutoff is chosen according to Eq. (13) and Eq. (14)).\n\nGiven the equivalence of the two procedures from a practical point of view, and at least regarding topological quantities, the choice of the method to be used in future simulations relies on the computational efficiency.\n\nWhile for some applications the computational cost of both cooling and the gradient flow is negligible (like, e.g., for scale setting by the parameter Luscher_wf1 ()) there are cases in which this is not true. As a typical example we mention the evaluation of the higher momenta of the topological charge and, in particular, the computation of the renormalization group invariants commonly denoted by (see, e.g., vicari_rep ()), whose determination requires independent determinations of . This makes even the pure gauge simulations far from trivial and the computational efficiency of the method used to estimate the topological charge becomes a crucial ingredient.\n\nIn particular, using the established relation , we can compare the execution time of three cooling steps with the time needed to perform an unity of gradient flow time evolution, obtaining . Clearly these estimates depend on the specific integrator adopted for the gradient flow and, in particular, adaptive integrators make it possible to obtain an speedup with respect to the third order RK solver (see Refs. FR1 (); FR2 ()). Nevertheless, cooling remains about one order of magnitude cheaper than the gradient flow.\n\nOf course, one should consider that the gradient flow has advantages with respect to techniques like cooling, related to the fact that it has an associated differential equation, which clearly appear whenever an analytical treatment of the smoothing process is required, like, for instance, in the analysis of the renormalization properties of the smoothed fields Luscher:2011bx (). Moreover, the gradient flow can be consistently extended to the presence of dynamical fermion fields Luscher:2013cpa (). We refer to Luscher:2013vga () for a recent review of present and future perspectives of the gradient flow.\n\nFinally, given the agreement of the topological charge density also at a local level, in the future one should better investigate the relation between the two smoothing procedures for other physical quantities as well.\n\n## Acknowledgments\n\nWe thank A. Di Giacomo, M. Mesiti, F. Negro, F. Sanfilippo and E. Vicari for useful discussions. Numerical simulations have been performed on the CSNIV cluster at the Scientific Computing Center at INFN-Pisa.\n\n## Appendix A A simple diffusive model\n\nLet us consider a massless real scalar field, , on a three dimensional isotropic cubic lattice, where , and with the associated action\n\n S=∑n,^j12[ϕ(n+^j)−ϕ(n)]2\n\nwhere runs over the three positive directions and indicates, as usual, the lattice site which is the nearest neighbor of in the forward direction. We will now consider the gradient flow for such a theory, and the differential equation obtained by it in the limit of smoothly varying fields. Then we will do the same in the case of cooling, and compare the two differential equations.\n\nThe gradient flow is defined by adding a dependence of on a fictitious time and letting\n\n ∂ϕ(n,τ)∂τ = −∂S(τ)∂ϕ(n,τ) = ∑^j[ϕ(n+^j,τ)+ϕ(n−^j,τ)]−6ϕ(n,τ).\n\nIn the limit of smoothly varying fields, we can take a continuum description and, letting , where is the lattice spacing, change the notation . The field on nearest neighbor sites can be Taylor expanded\n\n ϕ(n+^j,τ)≃ϕ(x,τ)+a∂ϕ∂xj+a22∂2ϕ∂x2j\n\nso that the flow equation, Eq. (A), takes the simple form of a diffusive (heat) equation:\n\n ∂ϕ(x,τ)∂τ≃a2∇2ϕ(x,τ) (21)\n\nwhere is the 3D Laplacian operator.\n\nLet us now consider cooling, in which the field is evolved by local minimization steps, which are iterated by sweeping all lattice sites at each cooling step. Let us call the field obtained after steps. If the lattice sites are visited in the positive lexicographic order, then it is easy to verify that the cooling equation is\n\n ϕ(n,nc+1)=16∑j[ϕ(n+^j,nc)+ϕ(n−^j,nc+1)] (22)\n\nwhere we have taken into account that part of the nearest neighbor sites have already undergone the cooling step under consideration. In order to write a corresponding differential equation, we now consider that, in the limit of smoothly varying fields, the evolution generated by cooling is also smooth, so we can Taylor expand in terms of a cooling timeas well, defined by , where is a fictitious temporal spacing that will be eventually set to 1. We can therefore substitute\n\n ϕ(n,nc+1) ≃ ϕ(x,τc)+aτ∂ϕ∂τc ϕ(n−^j,nc+1) ≃ ϕ(x,τc)+aτ∂ϕ∂τc+a∂ϕ∂xj+a22∂2ϕ∂x2j ϕ(n+^j,nc) ≃ ϕ(x,τc)+a∂ϕ∂xj+a22∂2ϕ∂x2j.\n\nWe notice that, since we are dealing with a diffusion process, in which spatial distances scale like the square root of the diffusion time, it is consistent to Taylor expand at the linear order in time and at the quadratic order in spatial derivatives. Putting everything together, Eq. (22) becomes\n\n aτ∂ϕ(x,τc)∂τc≃13a2∇2ϕ(x,τ) (23)\n\nwhich after setting teaches us that the relation between the cooling time and the gradient flow time is\n\n τc=nc≃3τ,\n\nmeaning that 3 cooling steps correspond to 1 unit of gradient flow time. It should be clear that the factor 3 would have been a factor 6, had we not taken into account the additional cooling time dependence of half of the nearest neighbor fields.\n\n### Footnotes\n\n1. We would like to warn the reader that such a notation is different from the one adopted in the literature where the gradient flow has been originally discussed Luscher_wf0 (); Luscher_wf1 (). We follow here the standard convention in which the generators of are taken to be hermitian, e.g., for , where are the Gell-Mann matrices.\n2. In particular, results obtained on a subsample of configurations by using a different integration step, , are indistinguishable from those obtained at .\n\n### References\n\n1. K. G. Wilson, Phys. Rev. D 10, 2445 (1974).\n2. M. Campostrini, A. Di Giacomo and H. Panagopoulos, Phys. Lett. B 212, 206 (1988).\n3. P. Di Vecchia, K. Fabricius, G. C. Rossi and G. Veneziano, Nucl. Phys. B 192, 392 (1981); Phys. Lett. B 108, 323 (1982).\n4. M. Teper, Phys. Lett. B 232, 227 (1989).\n5. M. Campostrini, A. Di Giacomo H. Panagopoulos and E. Vicari, Nucl. Phys. B 329, 683 (1990).\n6. A. Di Giacomo and E. Vicari, Phys. Lett. B 275, 429 (1992).\n7. B. Allés, M. Campostrini, A. Di Giacomo, E.Vicari and Y. Gündüç, Phys. Rev. D 48, 2284 (1993) [hep-lat/9302004].\n8. F. Farchioni and A. Papa, Nucl. Phys. B 431, 686 (1994) [hep-lat/9407026].\n9. B. Allés, M. D’Elia and A. Di Giacomo, Nucl. Phys. B 494, 281 (1997) [Erratum-ibid. B 679, 397 (2004)] [hep-lat/9605013]; Phys. Lett. B 412, 119 (1997) [hep-lat/9706016]; Phys. Lett. B 483, 139 (2000) [hep-lat/0004020]; Phys. Rev. D 71, 034503 (2005) [hep-lat/0411035].\n10. B. Allés, M. D’Elia, A. Di Giacomo and R. Kirchner, Phys. Rev. D 58, 114506 (1998) [hep-lat/9711026].\n11. B. Berg, Phys. Lett. B 104, 475 (1981); Y. Iwasaki and T. Yoshie, Phys. Lett. B 131, 159 (1983); S. Itoh, Y. Iwasaki and T. Yoshie, Phys. Lett. B 147, 141 (1984); M. Teper, Phys. Lett. B 162, 357 (1985); E. -M. Ilgenfritz et al., Nucl. Phys. B 268, 693 (1986).\n12. M. Luscher, Commun. Math. Phys. 293, 899 (2010) [arXiv:0907.5491 [hep-lat]].\n13. M. Luscher, JHEP 1008, 071 (2010) [arXiv:1006.4518 [hep-lat]].\n14. C. Morningstar and M. J. Peardon, Phys. Rev. D 69, 054501 (2004) [hep-lat/0311018].\n15. M. Campostrini, A. Di Giacomo, H. Panagopoulos and E. Vicari, Nucl. Phys. B 329, 683 (1990).\n16. M. Garcia Perez, O. Philipsen and I. -O. Stamatescu, Nucl. Phys. B 551, 293 (1999) [hep-lat/9812006].\n17. J. E. Hetrick and P. de Forcrand, Nucl. Phys. Proc. Suppl. 63, 838 (1998) [hep-lat/9710003].\n18. N. Cabibbo and E. Marinari, Phys. Lett. B 119, 387 (1982).\n19. M. Luscher and P. Weisz, JHEP 1102, 051 (2011) [arXiv:1101.0963 [hep-th]].\n20. M. Luscher, [arXiv:1308.5598 [hep-lat]].\n21. E. Vicari and H. Panagopoulos, Phys. Rept. 470, 93 (2009) [arXiv:0803.1593 [hep-th]].\n22. M. Guagnelli, R. Sommer and H. Wittig [ALPHA Collaboration], Nucl. Phys. B 535, 389 (1998) [hep-lat/9806005].\n23. M. Creutz, Phys. Rev. D 21, 2308 (1980).\n24. A. D. Kennedy and B. J. Pendleton, Phys. Lett. B 156, 393 (1985).\n25. M. Creutz, Phys. Rev. D 36, 515 (1987).\n26. B. Allés, L. Cosmai, M. D’Elia and A. Papa, Phys. Rev. D 62, 094507 (2000) [hep-lat/0001027].\n27. L. Del Debbio, H. Panagopoulos and E. Vicari, JHEP 0208, 044 (2002) [hep-th/0204125].\n28. M. D’Elia, Nucl. Phys. B 661, 139 (2003) [hep-lat/0302007].\n29. L. Giusti, S. Petrarca and B. Taglienti, Phys. Rev. D 76, 094510 (2007) [arXiv:0705.2352 [hep-th]].\n30. C. Bonati, M. D’Elia, H. Panagopoulos and E. Vicari, Phys. Rev. Lett. 110, 252003 (2013) [arXiv:1301.7640 [hep-lat]].\n31. P. Fritzsch and A. Ramos, JHEP 1310, 008 (2013) [arXiv:1301.4388 [hep-lat]].\n32. P. Fritzsch and A. Ramos, arXiv:1308.4559 [hep-lat].\n33. M. Luscher, JHEP 1304, 123 (2013) [arXiv:1302.5246 [hep-lat]].\nYou are adding the first comment!\nHow to quickly get a good reply:\n• Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.\n• Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.\n• Your comment should inspire ideas to flow and help the author improves the paper.\n\nThe better we are at sharing our knowledge with each other, the faster we move forward.\nThe feedback must be of minimum 40 characters and the title a minimum of 5 characters", null, "", null, "", null, "" ]
[ null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x1.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x2.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x3.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x4.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x5.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x6.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x7.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x8.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x9.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x10.png", null, "https://storage.googleapis.com/groundai-web-prod/media/users/user_18056/project_316044/images/x11.png", null, "https://dp938rsb7d6cr.cloudfront.net/static/1.71/groundai/img/loader_30.gif", null, "https://dp938rsb7d6cr.cloudfront.net/static/1.71/groundai/img/comment_icon.svg", null, "https://dp938rsb7d6cr.cloudfront.net/static/1.71/groundai/img/about/placeholder.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9110376,"math_prob":0.94714695,"size":39807,"snap":"2020-45-2020-50","text_gpt3_token_len":8812,"char_repetition_ratio":0.16772605,"word_repetition_ratio":0.029724319,"special_character_ratio":0.22779913,"punctuation_ratio":0.1377578,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97561616,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-22T21:25:40Z\",\"WARC-Record-ID\":\"<urn:uuid:89d48718-c68f-48f8-b5c7-f4579ba5c158>\",\"Content-Length\":\"669202\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8f8441bf-3f9e-4f0c-9f85-e5e5b28a91d3>\",\"WARC-Concurrent-To\":\"<urn:uuid:8ffc8f62-b090-4328-898f-9c525c300c5e>\",\"WARC-IP-Address\":\"35.186.203.76\",\"WARC-Target-URI\":\"https://www.groundai.com/project/comparison-of-the-gradient-flow-with-cooling-in-su3-pure-gauge-theory/\",\"WARC-Payload-Digest\":\"sha1:NGAPXARFUEHN5ZJJSPR5OZ7GRF7AXWSL\",\"WARC-Block-Digest\":\"sha1:LRO37QU3FK5QDYD54XVPLOORJVL6ETGP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107880038.27_warc_CC-MAIN-20201022195658-20201022225658-00294.warc.gz\"}"}
https://education.blurtit.com/433234/how-do-you-turn-a-ratio-into-a-percentage
[ "# How Do You Turn A Ratio Into A Percentage?\n\n30% to a ratio\nthanked the writer.\nA couple seek genetic counselling for a genetic disorder (cystic fibrosis). It is known to be present in both sides of the family. They both have a genetic test.\nThey have a child. The child does not have the condition. They are told that the odds of the child being a carrier of cystic fibrosis are 2 to 1.\n\nExpress this chance as a percentage\nthanked the writer.\n5:8 to percentage\nthanked the writer.\n\nA:B = (A/B) * 100\n\nIf A = 3, and B = 4 ...the ratio will be 3:4 = 3/4 which is 0.75 as a deciman\n\nThem you multiply (0.75) x 100 = 75%\nthanked the writer.\nMultiply the #'s then subtract from 100\nthanked the writer.\nSolve (-y)(-y)  solve\nthanked the writer.\nAnonymous commented\nSimplify the expression combine like terms 7-8t-(2t=6)", null, "" ]
[ null, "https://cf.blurtitcdn.com/var/avatar/thumb_default_avatar.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9755329,"math_prob":0.90278184,"size":908,"snap":"2020-10-2020-16","text_gpt3_token_len":265,"char_repetition_ratio":0.11504425,"word_repetition_ratio":0.35164836,"special_character_ratio":0.2962555,"punctuation_ratio":0.104761906,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9974691,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-09T01:37:24Z\",\"WARC-Record-ID\":\"<urn:uuid:0c017ab0-5e58-4e28-a4a1-f7c2dd6c63e9>\",\"Content-Length\":\"59130\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8016b9c7-b73f-476e-815d-56ab68e605c5>\",\"WARC-Concurrent-To\":\"<urn:uuid:4eabd368-20a5-48d5-92cc-9812ad019423>\",\"WARC-IP-Address\":\"104.25.48.23\",\"WARC-Target-URI\":\"https://education.blurtit.com/433234/how-do-you-turn-a-ratio-into-a-percentage\",\"WARC-Payload-Digest\":\"sha1:XDNXDP3WANRD3HWSGLZHPJBIB63RB6X4\",\"WARC-Block-Digest\":\"sha1:EYONZRO24ZVZG6CKC4XD2NFL7OX4QXS6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371826355.84_warc_CC-MAIN-20200408233313-20200409023813-00370.warc.gz\"}"}
https://my.oschina.net/u/4067628/blog/4462465
[ "2020/08/01 12:11\n\n#", null, "Relation Net 是 CVPR2018的一篇论文,论文链接:\n\nhttps://arxiv.org/pdf/1711.06025.pdf", null, "Relation Network由 embedding model 和 relation model 组成。Relation Network 的核心思想是:首先通过embedding model分别提取 support set 和 testing set中图像的特征图,然后将特征图中代表通道数的维度进行拼接,得到一个新的特征图。然后把新的特征图送入 relation model 进行运算得到 relation score,这个值代表了两张图的相似度。", null, "", null, "下载安装命令\n\n## CPU版本安装命令\n\n## GPU版本安装命令\npip install -f https://paddlepaddle.org.cn/pip/oschina/gpu paddlepaddle-gpu\n\nRelation Network\n\n1. 搭建 Relation Network 网络\n\nclass BaseNet:\ndef conv_bn_layer(self,\ninput,\nnum_filters,\nfilter_size,\nstride=1,\ngroups=1,\nact=None,\nname=None,\ndata_format='NCHW'):\nn = filter_size * filter_size * num_filters\nconv = fluid.layers.conv2d(\ninput=input,\nnum_filters=num_filters,\nfilter_size=filter_size,\nstride=stride,\ngroups=groups,\nact=None,\nparam_attr=ParamAttr(name=name + \"_weights\", initializer=fluid.initializer.Normal(0,math.sqrt(2. / n))),\nbias_attr=ParamAttr(name=name + \"_bias\",\ninitializer=fluid.initializer.Constant(0.0)),\nname=name + '.conv2d.output.1',\ndata_format=data_format)\n\nbn_name = \"bn_\" + name\n\nreturn fluid.layers.batch_norm(\ninput=conv,\nact=act,\nmomentum=1,\nname=bn_name + '.output.1',\nparam_attr=ParamAttr(name=bn_name + '_scale',\ninitializer=fluid.initializer.Constant(1)),\nbias_attr=ParamAttr(bn_name + '_offset',\ninitializer=fluid.initializer.Constant(0)),\nmoving_mean_name=bn_name + '_mean',\nmoving_variance_name=bn_name + '_variance',\ndata_layout=data_format)\n\n\n\n• Input:传入待卷积处理的张量对象;\n\n• num_filter:卷积核数量(输出的卷积结果的通道数);\n\n• filter_size:卷积核尺寸;\n\n• stride:卷积步长;\n\n• groups:分组卷积的组数量;\n\n• act:接在 BN 层后的激活函数,如果为 None,则不使用激活函数;\n\n• name:在运算图中的对象名称。\n\nclass EmbeddingNet(BaseNet):\ndef net(self,input):\nconv = self.conv_bn_layer(\ninput=input,\nnum_filters=64,\nfilter_size=3,\nact='relu',\nname='embed_conv1')\nconv = fluid.layers.pool2d(\ninput=conv,\npool_size=2,\npool_stride=2,\npool_type='max')\nconv = self.conv_bn_layer(\ninput=conv,\nnum_filters=64,\nfilter_size=3,\nact='relu',\nname='embed_conv2')\nconv = fluid.layers.pool2d(\ninput=conv,\npool_size=2,\npool_stride=2,\npool_type='max')\nconv = self.conv_bn_layer(\ninput=conv,\nnum_filters=64,\nfilter_size=3,\nact='relu',\nname='embed_conv3')\nconv = self.conv_bn_layer(\ninput=conv,\nnum_filters=64,\nfilter_size=3,\nact='relu',\nname='embed_conv4')\nreturn conv\n\n\n\nRelation model 代码部分如下:\n\nclass RelationNet(BaseNet):\ndef net(self, input, hidden_size):\nconv = self.conv_bn_layer(\ninput=input,\nnum_filters=64,\nfilter_size=3,\nact='relu',\nname='rn_conv1')\nconv = fluid.layers.pool2d(\ninput=conv,\npool_size=2,\npool_stride=2,\npool_type='max')\nconv = self.conv_bn_layer(\ninput=conv,\nnum_filters=64,\nfilter_size=3,\nact='relu',\nname='rn_conv2')\nconv = fluid.layers.pool2d(\ninput=conv,\npool_size=2,\npool_stride=2,\npool_type='max')\nfc = fluid.layers.fc(conv,size=hidden_size,act='relu',\nparam_attr=ParamAttr(name='fc1_weights',\ninitializer=fluid.initializer.Normal(0,0.01)),\nbias_attr=ParamAttr(name='fc1_bias',\ninitializer=fluid.initializer.Constant(1)),\n)\nfc = fluid.layers.fc(fc, size=1,act='sigmoid',\nparam_attr=ParamAttr(name='fc2_weights',\ninitializer=fluid.initializer.Normal(0,0.01)),\nbias_attr=ParamAttr(name='fc2_bias',\ninitializer=fluid.initializer.Constant(1)),\n)\nreturn fc\n\n\n\nsample_image = fluid.layers.data('sample_image', shape=[3, 84, 84], dtype='float32')\nquery_image = fluid.layers.data('query_image', shape=[3, 84, 84], dtype='float32')\n\nsample_query_image = fluid.layers.concat([sample_image, query_image], axis=0)\nsample_query_feature = embed_model.net(sample_query_image)\n\n\n\nsample_batch_size = fluid.layers.shape(sample_image)\nquery_batch_size = fluid.layers.shape(query_image)\n\n\n\nsample_feature = fluid.layers.slice(\nsample_query_feature,\naxes=,\nstarts=,\nends=[sample_batch_size])\nif k_shot > 1:\n# few_shot\nsample_feature = fluid.layers.reshape(sample_feature, shape=[c_way, k_shot, 64, 19, 19])\nsample_feature = fluid.layers.reduce_sum(sample_feature, dim=1)\nquery_feature = fluid.layers.slice(\nsample_query_feature,\naxes=,\nstarts=[sample_batch_size],\nends=[sample_batch_size + query_batch_size])\n\n\n\nsample_feature_ext = fluid.layers.unsqueeze(sample_feature, axes=0)\nquery_shape = fluid.layers.concat(\n[query_batch_size, fluid.layers.assign(np.array([1, 1, 1,1]).astype('int32'))])\nsample_feature_ext = fluid.layers.expand(sample_feature_ext, query_shape)\n\n\n\nquery_feature_ext = fluid.layers.unsqueeze(query_feature, axes=0)\nif k_shot > 1:\nsample_batch_size = sample_batch_size / float(k_shot)\nsample_shape = fluid.layers.concat(\n[sample_batch_size, fluid.layers.assign(np.array([1, 1, 1, 1]).astype('int32'))])\nquery_feature_ext = fluid.layers.expand(query_feature_ext, sample_shape)\n\n\n\nquery_feature_ext = fluid.layers.transpose(query_feature_ext, [1, 0, 2, 3, 4])\nrelation_pairs = fluid.layers.concat([sample_feature_ext, query_feature_ext], axis=2)\nrelation_pairs = fluid.layers.reshape(relation_pairs, shape=[-1, 128, 19, 19])\n\n\n\nrelation = RN_model.net(relation_pairs, hidden_size=8)\nrelation = fluid.layers.reshape(relation, shape=[-1, c_way])\n\n\n\none_hot_label = fluid.layers.one_hot(query_label, depth=c_way)\nloss = fluid.layers.square_error_cost(relation, one_hot_label)\nloss = fluid.layers.reduce_mean(loss)\n\n\n\n2. 训练策略\n\nepisode based training的实现步骤如下:\n\n1. 训练需要循环迭代 N 个 episode,每1个 episode 会在 training set 中随机选取 C 个类别的中的 K 个数据,组成1个sample set数据集。C和 K 对应 support set 中的 C-way K-shot,一共有 C x K个样本。\n\n2. 在 C 个类别中剩余的样本中随机选取几个样本作为 query set, 进行训练。\n\n3. 验证模型复现效果", null, "5-way 1-shot 准确率:", null, "5-way 5-shot 准确率:", null, "下载安装命令\n\n## CPU版本安装命令\n\n## GPU版本安装命令\npip install -f https://paddlepaddle.org.cn/pip/oschina/gpu paddlepaddle-gpu\n\nGitHub:\n\nGitee:\n\nEND", null, "### 作者的其它热门文章\n\n0\n1 收藏\n\n0 评论\n1 收藏\n0", null, "", null, "", null, "" ]
[ null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X2dpZi9zS2lhMUZLRmlhZmdpYWRSbVFHTFg0bUJFYzlCeUE4UllNaWN6aHloRTNRTElMTDBxbVdnTmliTVg4QTNiQWY3ZEF0Z21YaFAxZ0RUeURMQVhtUVVKemphNUpnLzY0MA", null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X3BuZy9zS2lhMUZLRmlhZmdqaWFxTHFjczlQOWFic3REN0FxNEhyUGlhNHNlUFlwTFdZQjI2ajJkamRHOElZV2pueWljdDFHSHVySTQ3WHRFMWJ1aWNXWGtvWUpLREJFUS82NDA", null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X3BuZy9zS2lhMUZLRmlhZmdqaWFxTHFjczlQOWFic3REN0FxNEhyUHVPNHh1ZHpLaWM1dU04Zll4RnpER0RpYUNDaHkwMWJiMWljRHk3Y0gyc1VxTXR3eVl6eGxpY3lQOFEvNjQw", null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X3BuZy9zS2lhMUZLRmlhZmdqaWFxTHFjczlQOWFic3REN0FxNEhyUDlIeVNhTXJjaWJMellsaWF2Q2FMNWZHaWM1aWN5OW5lQnBrQ2RIZUhpYks5SWxKZXdkaGJ5TWliODNYZy82NDA", null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X3BuZy9zS2lhMUZLRmlhZmdqaWFxTHFjczlQOWFic3REN0FxNEhyUGVHQlYxU2d2RjhFaWIyd3RodzhTVnJkTEU4QkdnRUIxUjJpYWNrMVZjdkdpYWRWNlFKd241VGdlZy82NDA", null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X3BuZy9zS2lhMUZLRmlhZmdqaWFxTHFjczlQOWFic3REN0FxNEhyUEVzYkRhOW1EQWFGallwa2lja2hqY0RMZjN5ZGlieUdkV09ZOVVSdjQwbU01YlpQT0IxdkFKRUd3LzY0MA", null, "https://imgconvert.csdnimg.cn/aHR0cHM6Ly9tbWJpei5xcGljLmNuL21tYml6X3BuZy9zS2lhMUZLRmlhZmdqaWFxTHFjczlQOWFic3REN0FxNEhyUG1kdmRwajBkTkptazRja05ONHVLNEJiaHd1VWVaTGJDUFVpY3ZyNGdEaGZhbUVrd3BMaHVXNkEvNjQw", null, "https://static.oschina.net/new-osc/img/portrait.gif", null, "https://oscimg.oschina.net/oscnet/up-02f2706a81344119fb5cdcdda304068f2e0.png", null, "https://oscimg.oschina.net/oscnet/up-e77d060131d9b392981650ec7beb614554f.JPEG", null, "https://static.oschina.net/new-osc/img/icon/back-to-top.svg", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.55605334,"math_prob":0.96128815,"size":10146,"snap":"2022-40-2023-06","text_gpt3_token_len":4564,"char_repetition_ratio":0.17905739,"word_repetition_ratio":0.09677419,"special_character_ratio":0.23920757,"punctuation_ratio":0.20563741,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99443096,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-05T15:14:51Z\",\"WARC-Record-ID\":\"<urn:uuid:43020737-dd1b-4bcb-88f7-04b5feb22f6a>\",\"Content-Length\":\"110184\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0a818328-7126-4c5f-9cb2-1c21ef3bce14>\",\"WARC-Concurrent-To\":\"<urn:uuid:2b0f2226-26ff-4e55-bc8c-445f306e0803>\",\"WARC-IP-Address\":\"212.64.63.215\",\"WARC-Target-URI\":\"https://my.oschina.net/u/4067628/blog/4462465\",\"WARC-Payload-Digest\":\"sha1:Q624I6NABJJPNNWNUWJSN3DH2WADCATR\",\"WARC-Block-Digest\":\"sha1:LYHDAJULM53ZRLZY4P3C6MIXXNQKLO2K\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337631.84_warc_CC-MAIN-20221005140739-20221005170739-00787.warc.gz\"}"}
http://bookshadow.com/weblog/2017/03/26/leetcode-complex-number-multiplication/
[ "## 题目描述:\n\nLeetCode 537. Complex Number Multiplication\n\nGiven two strings representing two complex numbers.\n\nYou need to return a string representing their multiplication. Note i2 = -1 according to the definition.\n\nExample 1:\n\n```Input: \"1+1i\", \"1+1i\"\nOutput: \"0+2i\"\nExplanation: (1 + i) * (1 + i) = 1 + i2 + 2 * i = 2i, and you need convert it to the form of 0+2i.\n```\n\nExample 2:\n\n```Input: \"1+-1i\", \"1+-1i\"\nOutput: \"0+-2i\"\nExplanation: (1 - i) * (1 - i) = 1 + i2 - 2 * i = -2i, and you need convert it to the form of 0+-2i.\n```\n\nNote:\n\n1. The input strings will not have extra blank.\n2. The input strings will be given in the form of a+bi, where the integer a and b will both belong to the range of [-100, 100]. And the output should be also in this form.\n\n## 题目大意:\n\n1. 输入字符串不包含额外空格\n2. 输入字符串以a+bi给出,其中a与b都是[-100, 100]范围的整数。输出采用同样形式\n\n## Python代码:\n\n``````class Solution(object):\ndef complexNumberMultiply(self, a, b):\n\"\"\"\n:type a: str\n:type b: str\n:rtype: str\n\"\"\"\nextract = lambda s : map(int, s[:-1].split('+'))\nm, n = extract(a)\np, q = extract(b)\nreturn '%s+%si' % (m * p - n * q, m * q + n * p)\n``````\n\nPingbacks已关闭。" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.51325035,"math_prob":0.9915035,"size":1197,"snap":"2020-45-2020-50","text_gpt3_token_len":463,"char_repetition_ratio":0.093880974,"word_repetition_ratio":0.0591133,"special_character_ratio":0.36090225,"punctuation_ratio":0.17254902,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9981039,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-25T05:35:26Z\",\"WARC-Record-ID\":\"<urn:uuid:53023114-38fb-498a-9079-3b0e42c4a00b>\",\"Content-Length\":\"182092\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f024514c-9f52-4459-a484-28e074b61b1e>\",\"WARC-Concurrent-To\":\"<urn:uuid:b6c055de-4fc0-45d9-97c0-473165019a7c>\",\"WARC-IP-Address\":\"47.52.243.83\",\"WARC-Target-URI\":\"http://bookshadow.com/weblog/2017/03/26/leetcode-complex-number-multiplication/\",\"WARC-Payload-Digest\":\"sha1:GS3CHGHVV5BXDA65C7GFMBQGICGR6J5A\",\"WARC-Block-Digest\":\"sha1:PDACQ7VFMC5GN45UMCKYXZYXWWZJ7TIX\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141181179.12_warc_CC-MAIN-20201125041943-20201125071943-00445.warc.gz\"}"}
http://webmin.mindat.org/help/AxialRatios.shtml
[ "", null, "# Axial Ratios\n\nSearch Webmineral :", null, "## Axial Ratios\n\n### Definition\n\nWhen the crystallographic axes have been defined, the axial ratios are  calculated from the crystallographic parameters as follows:\n\n```Function AxialRatios(A, B, C, labela, labelb, labelc)\n' Calculates the axial ratios from unit cell dimensions.\n' A:B:C B=1 (A=A/B) (C=C/B)\n' A:B A=1 (B=B/A)\n' From Mason, 1963\n```\n\n### For Further Information on Axial Ratios\n\n#### Search the Mineralogy Database\n\n Match All Any term in the Database: [ All ] Mineralogy Database\n\n#### Search the Web", null, "Web webmineral.com\n\nSee Prof. Stephen A. Nelson discussion from Tulane University" ]
[ null, "http://webmin.mindat.org/images/Hedyphane_Crystal.gif", null, "http://webmin.mindat.org/MySQL/revive/www/delivery/lg.php", null, "https://www.google.com/logos/Logo_25wht.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6395898,"math_prob":0.71505886,"size":482,"snap":"2020-45-2020-50","text_gpt3_token_len":132,"char_repetition_ratio":0.117154814,"word_repetition_ratio":0.0,"special_character_ratio":0.23858921,"punctuation_ratio":0.14285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9608748,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-27T07:20:42Z\",\"WARC-Record-ID\":\"<urn:uuid:ef2614d5-f0c1-4996-b6e9-85dd1d74b2c2>\",\"Content-Length\":\"14417\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5f7a04b0-da9e-43a0-9533-bcc8a1881dc8>\",\"WARC-Concurrent-To\":\"<urn:uuid:c726d53a-05f7-48c0-a43f-0f4025e6460e>\",\"WARC-IP-Address\":\"104.21.234.109\",\"WARC-Target-URI\":\"http://webmin.mindat.org/help/AxialRatios.shtml\",\"WARC-Payload-Digest\":\"sha1:NIM63MX6K52QMQDQO6FCWX5DENCS57M6\",\"WARC-Block-Digest\":\"sha1:TOHSDKGWT6SJ667FICOOWORQ6UKA2D4D\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107893402.83_warc_CC-MAIN-20201027052750-20201027082750-00252.warc.gz\"}"}
http://html.datasheetbank.com/datasheet-html/589040/Toshiba/3page/RN4902FE.html
[ "", null, "Integrated circuits, Transistor, Semiconductors Search and Datasheet PDF Download Site\n Part Name :\n\nRN4902FE View Datasheet(PDF) - Toshiba\n\n Part Name Description Manufacturer RN4902FE Transistor Silicon PNP NPN Epitaxial Type(PCT Process) (Bias Resistor Built-in Transistor)", null, "Toshiba", null, "RN4902FE Datasheet PDF : 6 Pages\n 1 2 3 4 5 6", null, "Electrical Characteristics (Ta = 25°C) (Q1) Characteristics Collector cut-off current Emitter cut-off current DC current gain Collector-emitter saturation voltage Input voltage (ON) Input voltage (OFF) Transition frequency Collector output capacitance Symbol Test Condition ICBO ICEO IEBO hFE VCE (sat) VI (ON) VI (OFF) fT Cob VCB = −50 V, IE = 0 VCE = −50 V, IB = 0 VEB = −10 V, IC = 0 VCE = −5 V, IC = −10 mA IC = −5 mA, IB = −0.25 mA VCE = −0.2 V, IC = −5 mA VCE = −5 V, IC = −0.1 mA VCE = −10 V, IC = −5 mA VCB = −10 V, IE = 0, f = 1 MHz Electrical Characteristics (Ta = 25°C) (Q2) Characteristics Collector cut-off current Emitter cut-off current DC current gain Collector-emitter saturation voltage Input voltage (ON) Input voltage (OFF) Transition frequency Collector output capacitance Symbol Test Condition ICBO ICEO IEBO hFE VCE (sat) VI (ON) VI (OFF) fT Cob VCB = 50 V, IE = 0 VCE = 50 V, IB = 0 VEB = 10 V, IC = 0 VCE = 5 V, IC = 10 mA IC = 5 mA, IB = 0.25 mA VCE = 0.2 V, IC = 5 mA VCE = 5 V, IC = 0.1 mA VCE = 10 V, IC = 5 mA VCB = 10 V, IE = 0, f = 1 MHz Electrical Characteristics (Ta = 25°C) (Q1, Q2 common) Characteristics Input resistor Resistor ratio Symbol R1 R1/R2 Test Condition ⎯ ⎯ RN4902FE Min Typ. Max Unit ⎯ ⎯ −0.32 50 ⎯ −1.2 −1.0 ⎯ ⎯ ⎯ ⎯ ⎯ ⎯ −0.1 ⎯ ⎯ 200 3 −100 −500 −0.71 ⎯ −0.3 −2.4 −1.5 ⎯ 6 nA mA V V V MHz pF Min Typ. Max Unit ⎯ ⎯ 100 nA ⎯ ⎯ 500 0.38 ⎯ 0.71 mA 50 ⎯ ⎯ ⎯ 0.1 0.3 V 1.2 ⎯ 2.4 V 1.0 ⎯ 1.5 V ⎯ 250 ⎯ MHz ⎯ 3 6 pF Min Typ. Max Unit 7 10 13 kΩ 0.9 1.0 1.1 3 2007-11-01" ]
[ null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "http://www.datasheetbank.com/logo/Toshiba.gif", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "http://html.datasheetbank.com/datasheet-html/589040/Toshiba/3/page/RN4902FE.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.50914747,"math_prob":0.9969371,"size":1850,"snap":"2019-43-2019-47","text_gpt3_token_len":862,"char_repetition_ratio":0.13163596,"word_repetition_ratio":0.32741117,"special_character_ratio":0.4091892,"punctuation_ratio":0.12776412,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9839987,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-18T06:21:41Z\",\"WARC-Record-ID\":\"<urn:uuid:270210a5-21dd-42cc-8c3b-90c9fa7f66d6>\",\"Content-Length\":\"39498\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:80795f89-e4a3-4081-b91b-f3464355bb85>\",\"WARC-Concurrent-To\":\"<urn:uuid:a7b6f418-0da1-4857-a048-1ecf477599b9>\",\"WARC-IP-Address\":\"218.146.255.183\",\"WARC-Target-URI\":\"http://html.datasheetbank.com/datasheet-html/589040/Toshiba/3page/RN4902FE.html\",\"WARC-Payload-Digest\":\"sha1:YTTPCKE6MM2GTPJY5N3BQBG7OLM3W7SP\",\"WARC-Block-Digest\":\"sha1:EKMXV2SQ7HVNHC675F6AD7BTS3EE2N5I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986677964.40_warc_CC-MAIN-20191018055014-20191018082514-00281.warc.gz\"}"}
https://www.colorhexa.com/007e62
[ "# #007e62 Color Information\n\nIn a RGB color space, hex #007e62 is composed of 0% red, 49.4% green and 38.4% blue. Whereas in a CMYK color space, it is composed of 100% cyan, 0% magenta, 22.2% yellow and 50.6% black. It has a hue angle of 166.7 degrees, a saturation of 100% and a lightness of 24.7%. #007e62 color hex could be obtained by blending #00fcc4 with #000000. Closest websafe color is: #006666.\n\n• R 0\n• G 49\n• B 38\nRGB color chart\n• C 100\n• M 0\n• Y 22\n• K 51\nCMYK color chart\n\n#007e62 color description : Dark cyan.\n\n# #007e62 Color Conversion\n\nThe hexadecimal color #007e62 has RGB values of R:0, G:126, B:98 and CMYK values of C:1, M:0, Y:0.22, K:0.51. Its decimal value is 32354.\n\nHex triplet RGB Decimal 007e62 `#007e62` 0, 126, 98 `rgb(0,126,98)` 0, 49.4, 38.4 `rgb(0%,49.4%,38.4%)` 100, 0, 22, 51 166.7°, 100, 24.7 `hsl(166.7,100%,24.7%)` 166.7°, 100, 49.4 006666 `#006666`\nCIE-LAB 46.714, -36.947, 6.954 9.665, 15.802, 14.095 0.244, 0.399, 15.802 46.714, 37.595, 169.341 46.714, -38.908, 14.455 39.752, -26.17, 6.804 00000000, 01111110, 01100010\n\n# Color Schemes with #007e62\n\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #7e001c\n``#7e001c` `rgb(126,0,28)``\nComplementary Color\n• #007e23\n``#007e23` `rgb(0,126,35)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #005b7e\n``#005b7e` `rgb(0,91,126)``\nAnalogous Color\n• #7e2300\n``#7e2300` `rgb(126,35,0)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #7e005b\n``#7e005b` `rgb(126,0,91)``\nSplit Complementary Color\n• #7e6200\n``#7e6200` `rgb(126,98,0)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #62007e\n``#62007e` `rgb(98,0,126)``\n• #1c7e00\n``#1c7e00` `rgb(28,126,0)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #62007e\n``#62007e` `rgb(98,0,126)``\n• #7e001c\n``#7e001c` `rgb(126,0,28)``\n• #003227\n``#003227` `rgb(0,50,39)``\n• #004b3a\n``#004b3a` `rgb(0,75,58)``\n• #00654e\n``#00654e` `rgb(0,101,78)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #009876\n``#009876` `rgb(0,152,118)``\n• #00b18a\n``#00b18a` `rgb(0,177,138)``\n• #00cb9e\n``#00cb9e` `rgb(0,203,158)``\nMonochromatic Color\n\n# Alternatives to #007e62\n\nBelow, you can see some colors close to #007e62. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #007e43\n``#007e43` `rgb(0,126,67)``\n• #007e4d\n``#007e4d` `rgb(0,126,77)``\n• #007e58\n``#007e58` `rgb(0,126,88)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #007e6d\n``#007e6d` `rgb(0,126,109)``\n• #007e77\n``#007e77` `rgb(0,126,119)``\n• #007b7e\n``#007b7e` `rgb(0,123,126)``\nSimilar Colors\n\n# #007e62 Preview\n\nThis text has a font color of #007e62.\n\n``<span style=\"color:#007e62;\">Text here</span>``\n#007e62 background color\n\nThis paragraph has a background color of #007e62.\n\n``<p style=\"background-color:#007e62;\">Content here</p>``\n#007e62 border color\n\nThis element has a border color of #007e62.\n\n``<div style=\"border:1px solid #007e62;\">Content here</div>``\nCSS codes\n``.text {color:#007e62;}``\n``.background {background-color:#007e62;}``\n``.border {border:1px solid #007e62;}``\n\n# Shades and Tints of #007e62\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #000806 is the darkest color, while #f4fffc is the lightest one.\n\n• #000806\n``#000806` `rgb(0,8,6)``\n• #001c16\n``#001c16` `rgb(0,28,22)``\n• #003025\n``#003025` `rgb(0,48,37)``\n• #004334\n``#004334` `rgb(0,67,52)``\n• #005743\n``#005743` `rgb(0,87,67)``\n• #006a53\n``#006a53` `rgb(0,106,83)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\n• #009271\n``#009271` `rgb(0,146,113)``\n• #00a581\n``#00a581` `rgb(0,165,129)``\n• #00b990\n``#00b990` `rgb(0,185,144)``\n• #00cc9f\n``#00cc9f` `rgb(0,204,159)``\n• #00e0ae\n``#00e0ae` `rgb(0,224,174)``\n• #00f4be\n``#00f4be` `rgb(0,244,190)``\n• #08ffc8\n``#08ffc8` `rgb(8,255,200)``\n• #1cffcd\n``#1cffcd` `rgb(28,255,205)``\n• #30ffd1\n``#30ffd1` `rgb(48,255,209)``\n• #43ffd5\n``#43ffd5` `rgb(67,255,213)``\n• #57ffda\n``#57ffda` `rgb(87,255,218)``\n• #6affde\n``#6affde` `rgb(106,255,222)``\n• #7effe2\n``#7effe2` `rgb(126,255,226)``\n• #92ffe7\n``#92ffe7` `rgb(146,255,231)``\n• #a5ffeb\n``#a5ffeb` `rgb(165,255,235)``\n• #b9ffef\n``#b9ffef` `rgb(185,255,239)``\n• #ccfff4\n``#ccfff4` `rgb(204,255,244)``\n• #e0fff8\n``#e0fff8` `rgb(224,255,248)``\n• #f4fffc\n``#f4fffc` `rgb(244,255,252)``\nTint Color Variation\n\n# Tones of #007e62\n\nA tone is produced by adding gray to any pure hue. In this case, #3a4442 is the less saturated color, while #007e62 is the most saturated one.\n\n• #3a4442\n``#3a4442` `rgb(58,68,66)``\n• #354944\n``#354944` `rgb(53,73,68)``\n• #304e47\n``#304e47` `rgb(48,78,71)``\n• #2c524a\n``#2c524a` `rgb(44,82,74)``\n• #27574c\n``#27574c` `rgb(39,87,76)``\n• #225c4f\n``#225c4f` `rgb(34,92,79)``\n• #1d6152\n``#1d6152` `rgb(29,97,82)``\n• #186655\n``#186655` `rgb(24,102,85)``\n• #136b57\n``#136b57` `rgb(19,107,87)``\n• #0f6f5a\n``#0f6f5a` `rgb(15,111,90)``\n• #0a745d\n``#0a745d` `rgb(10,116,93)``\n• #05795f\n``#05795f` `rgb(5,121,95)``\n• #007e62\n``#007e62` `rgb(0,126,98)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #007e62 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5118625,"math_prob":0.7553765,"size":3651,"snap":"2022-27-2022-33","text_gpt3_token_len":1617,"char_repetition_ratio":0.13709898,"word_repetition_ratio":0.0074074073,"special_character_ratio":0.5617639,"punctuation_ratio":0.23276836,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9939924,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-08T06:51:15Z\",\"WARC-Record-ID\":\"<urn:uuid:c0421ffd-515a-4c3f-9635-7c4975e7dc33>\",\"Content-Length\":\"36088\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:97cf503f-bda0-450a-85a4-88152f04ea7d>\",\"WARC-Concurrent-To\":\"<urn:uuid:71149b79-9548-4583-b46e-65d1de9a4477>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/007e62\",\"WARC-Payload-Digest\":\"sha1:UIYGLIRCH63VWPE3TJXCXKMNW4HR3XZM\",\"WARC-Block-Digest\":\"sha1:R3NJ7KKLT7W5PAIZVOHH2W57AQDNGIVL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882570767.11_warc_CC-MAIN-20220808061828-20220808091828-00580.warc.gz\"}"}
https://www.colorhexa.com/00dbdb
[ "# #00dbdb Color Information\n\nIn a RGB color space, hex #00dbdb is composed of 0% red, 85.9% green and 85.9% blue. Whereas in a CMYK color space, it is composed of 100% cyan, 0% magenta, 0% yellow and 14.1% black. It has a hue angle of 180 degrees, a saturation of 100% and a lightness of 42.9%. #00dbdb color hex could be obtained by blending #00ffff with #00b7b7. Closest websafe color is: #00cccc.\n\n• R 0\n• G 86\n• B 86\nRGB color chart\n• C 100\n• M 0\n• Y 0\n• K 14\nCMYK color chart\n\n#00dbdb color description : Pure (or mostly pure) cyan.\n\n# #00dbdb Color Conversion\n\nThe hexadecimal color #00dbdb has RGB values of R:0, G:219, B:219 and CMYK values of C:1, M:0, Y:0, K:0.14. Its decimal value is 56283.\n\nHex triplet RGB Decimal 00dbdb `#00dbdb` 0, 219, 219 `rgb(0,219,219)` 0, 85.9, 85.9 `rgb(0%,85.9%,85.9%)` 100, 0, 0, 14 180°, 100, 42.9 `hsl(180,100%,42.9%)` 180°, 100, 85.9 00cccc `#00cccc`\nCIE-LAB 79.485, -42.863, -12.604 38.114, 55.774, 75.77 0.225, 0.329, 55.774 79.485, 44.677, 196.386 79.485, -61.481, -13.275 74.682, -39.596, -7.877 00000000, 11011011, 11011011\n\n# Color Schemes with #00dbdb\n\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #db0000\n``#db0000` `rgb(219,0,0)``\nComplementary Color\n• #00db6e\n``#00db6e` `rgb(0,219,110)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #006edb\n``#006edb` `rgb(0,110,219)``\nAnalogous Color\n• #db6e00\n``#db6e00` `rgb(219,110,0)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #db006e\n``#db006e` `rgb(219,0,110)``\nSplit Complementary Color\n• #dbdb00\n``#dbdb00` `rgb(219,219,0)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #db00db\n``#db00db` `rgb(219,0,219)``\n• #00db00\n``#00db00` `rgb(0,219,0)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #db00db\n``#db00db` `rgb(219,0,219)``\n• #db0000\n``#db0000` `rgb(219,0,0)``\n• #008f8f\n``#008f8f` `rgb(0,143,143)``\n• #00a8a8\n``#00a8a8` `rgb(0,168,168)``\n• #00c2c2\n``#00c2c2` `rgb(0,194,194)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #00f5f5\n``#00f5f5` `rgb(0,245,245)``\n• #0fffff\n``#0fffff` `rgb(15,255,255)``\n• #29ffff\n``#29ffff` `rgb(41,255,255)``\nMonochromatic Color\n\n# Alternatives to #00dbdb\n\nBelow, you can see some colors close to #00dbdb. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #00dba4\n``#00dba4` `rgb(0,219,164)``\n• #00dbb7\n``#00dbb7` `rgb(0,219,183)``\n• #00dbc9\n``#00dbc9` `rgb(0,219,201)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #00c9db\n``#00c9db` `rgb(0,201,219)``\n• #00b7db\n``#00b7db` `rgb(0,183,219)``\n• #00a4db\n``#00a4db` `rgb(0,164,219)``\nSimilar Colors\n\n# #00dbdb Preview\n\nThis text has a font color of #00dbdb.\n\n``<span style=\"color:#00dbdb;\">Text here</span>``\n#00dbdb background color\n\nThis paragraph has a background color of #00dbdb.\n\n``<p style=\"background-color:#00dbdb;\">Content here</p>``\n#00dbdb border color\n\nThis element has a border color of #00dbdb.\n\n``<div style=\"border:1px solid #00dbdb;\">Content here</div>``\nCSS codes\n``.text {color:#00dbdb;}``\n``.background {background-color:#00dbdb;}``\n``.border {border:1px solid #00dbdb;}``\n\n# Shades and Tints of #00dbdb\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #000303 is the darkest color, while #efffff is the lightest one.\n\n• #000303\n``#000303` `rgb(0,3,3)``\n• #001717\n``#001717` `rgb(0,23,23)``\n• #002a2a\n``#002a2a` `rgb(0,42,42)``\n• #003e3e\n``#003e3e` `rgb(0,62,62)``\n• #005252\n``#005252` `rgb(0,82,82)``\n• #006565\n``#006565` `rgb(0,101,101)``\n• #007979\n``#007979` `rgb(0,121,121)``\n• #008d8d\n``#008d8d` `rgb(0,141,141)``\n• #00a0a0\n``#00a0a0` `rgb(0,160,160)``\n• #00b4b4\n``#00b4b4` `rgb(0,180,180)``\n• #00c7c7\n``#00c7c7` `rgb(0,199,199)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\n• #00efef\n``#00efef` `rgb(0,239,239)``\n• #03ffff\n``#03ffff` `rgb(3,255,255)``\n• #17ffff\n``#17ffff` `rgb(23,255,255)``\n• #2affff\n``#2affff` `rgb(42,255,255)``\n• #3effff\n``#3effff` `rgb(62,255,255)``\n• #52ffff\n``#52ffff` `rgb(82,255,255)``\n• #65ffff\n``#65ffff` `rgb(101,255,255)``\n• #79ffff\n``#79ffff` `rgb(121,255,255)``\n• #8dffff\n``#8dffff` `rgb(141,255,255)``\n• #a0ffff\n``#a0ffff` `rgb(160,255,255)``\n• #b4ffff\n``#b4ffff` `rgb(180,255,255)``\n• #c7ffff\n``#c7ffff` `rgb(199,255,255)``\n• #dbffff\n``#dbffff` `rgb(219,255,255)``\n• #efffff\n``#efffff` `rgb(239,255,255)``\nTint Color Variation\n\n# Tones of #00dbdb\n\nA tone is produced by adding gray to any pure hue. In this case, #657676 is the less saturated color, while #00dbdb is the most saturated one.\n\n• #657676\n``#657676` `rgb(101,118,118)``\n• #5d7e7e\n``#5d7e7e` `rgb(93,126,126)``\n• #548787\n``#548787` `rgb(84,135,135)``\n• #4c8f8f\n``#4c8f8f` `rgb(76,143,143)``\n• #439898\n``#439898` `rgb(67,152,152)``\n• #3ba0a0\n``#3ba0a0` `rgb(59,160,160)``\n• #33a8a8\n``#33a8a8` `rgb(51,168,168)``\n• #2ab1b1\n``#2ab1b1` `rgb(42,177,177)``\n• #22b9b9\n``#22b9b9` `rgb(34,185,185)``\n• #19c2c2\n``#19c2c2` `rgb(25,194,194)``\n• #11caca\n``#11caca` `rgb(17,202,202)``\n• #08d3d3\n``#08d3d3` `rgb(8,211,211)``\n• #00dbdb\n``#00dbdb` `rgb(0,219,219)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #00dbdb is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5078245,"math_prob":0.8138455,"size":3683,"snap":"2023-40-2023-50","text_gpt3_token_len":1612,"char_repetition_ratio":0.16444686,"word_repetition_ratio":0.0073664826,"special_character_ratio":0.5237578,"punctuation_ratio":0.2283105,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9915595,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-04T00:44:28Z\",\"WARC-Record-ID\":\"<urn:uuid:f9e0dfd0-eeae-4c2c-9223-de2df453eb94>\",\"Content-Length\":\"36198\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4c558d86-ee3b-473c-a723-2922b71e6a8f>\",\"WARC-Concurrent-To\":\"<urn:uuid:724409c9-2752-472e-8fef-efbb475e5448>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/00dbdb\",\"WARC-Payload-Digest\":\"sha1:OVHQJ3HDKKUJ5DBEWUM7333LMXHB7JUB\",\"WARC-Block-Digest\":\"sha1:CKH5T5J5NG54DNYICXLUJKVCRFTEDOHW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100518.73_warc_CC-MAIN-20231203225036-20231204015036-00066.warc.gz\"}"}
https://cryptomhcs.web.app/kilarjian62040zum/determine-book-value-of-stock-967.html
[ "Determine book value of stock\n\nHow to Calculate Book Value? The formula states that the numerator part is what the firm receives by the issuance of common equity and that figure increases or decreases depending upon the company is making profit or loss and then finally it decreases by issuing dividend and preference stock. Book value per share of common stock is the amount of net assets that each share of common stock represents. Some stockholders have keen interest in knowing the book value of the shares they own. Some stockholders have keen interest in knowing the book value of the shares they own.\n\nthe return on equity: g = (1 - Payout ratio) * ROE. ○ Substituting back into the P/ BV equation,. ○. The price-book value ratio of a stable firm is determined by the. It is the historical accounting value of a company's residual equity. The price-to- book ratio, therefore, tells you how a stock is valued relative to a share of equity in  25 Jul 2012 Let us take up an example and calculate the latest book value Infosys. FY12 Balance sheet of Infosys. Liabilities, Rs bn, Assets, Rs bn. Equity  Book value alone reveals limited information about a stock, but you can gain insight into investors' sentiments by comparing book value to market value. Download  22 Oct 2018 Face value. Market value. Book value. Calculation. Face value is not calculated. It is determined when the shares are issued by the company\n\nWe exclude preferred shares in the calculation of Book Value. As with most ratios , it varies a fair amount by industry (companies that require more infrastructure\n\nA company's book value of equity per share (BVPS) is the minimum value of its equity and is found by dividing total common stock by the number of the company's outstanding shares. Enterprise value (EV) is a measure of a company's total value, often used as a comprehensive alternative to equity market capitalization. Divide the available equity by the common shares outstanding to determine the book value per share of common stock. In our example, \\$80,000 divided by 50,000 shares equals a book value per share of common stock of \\$1.60. Therefore market values are driven by the supply and demand for the stock. Book value is the accounting value of the stock and can be found on the income or balance sheet in the annual report. To calculate the book value of bank stock, the analyst must first learn how to read financial sector financial statements. Book value per share tells investors what a bank’s, or any stock’s, book value is on a per-share basis. To arrive at this number, subtract liabilities from assets. Then divide that number by the Book value is a key measure that investors use to gauge a stock's valuation. The book value of a company is the total value of the company's assets, minus the company's outstanding liabilities.\n\nGenerally, the book value per share is of use to investors for determining whether a share is undervalued. Avoid confusing this measurement with the market value per share. Market value per share is the price a share is being traded on the market, influenced by the impressions investors have of the future of that share.\n\nThe book value of a company is simply its assets minus its liabilities. This means the total value of its assets not including intangible assets with no immediate cash value, such as goodwill. Liabilities include monies owed and operating expenses. So  Book Value = Assets - Liabilities. A company's book value of equity per share (BVPS) is the minimum value of its equity and is found by dividing total common stock by the number of the company's outstanding shares. Enterprise value (EV) is a measure of a company's total value, often used as a comprehensive alternative to equity market capitalization. Divide the available equity by the common shares outstanding to determine the book value per share of common stock. In our example, \\$80,000 divided by 50,000 shares equals a book value per share of common stock of \\$1.60. Therefore market values are driven by the supply and demand for the stock. Book value is the accounting value of the stock and can be found on the income or balance sheet in the annual report. To calculate the book value of bank stock, the analyst must first learn how to read financial sector financial statements. Book value per share tells investors what a bank’s, or any stock’s, book value is on a per-share basis. To arrive at this number, subtract liabilities from assets. Then divide that number by the\n\n14 Apr 2018 A financial ratio that is used to compare market value of a stock to its book value is called price to book ratio or P/B ratio. Get live Stock Prices from BSE and NSE and latest NAV, portfolio of Mutual Funds, calculate your tax\n\n15 Mar 2019 Book value is equal to a company's current market value divided by the \"book value\" of all of its shares. To determine a company's book value,  The book value per share formula is used to calculate the per share value of a company based on its equity available to common shareholders. The term \"book   It's important to use the average number of outstanding shares in this calculation. A short-term event, such as a stock buy-back, can skew period-ending values,  The price-to-book ratio, or P/B ratio, is a financial ratio used to compare a company's current market price to its book value. The calculation can be performed in  A corporation's book value is used in fundamental financial analysis to help determine whether the market value of corporate shares is above or below the book\n\nDetermine what a company is actually worth with this free discounted cash flow low debt levels, healthy profit margins and a steadily increasing book value? to calculate the company's intrinsic value to determine whether the stock price is\n\nBook value per share tells investors what a bank’s, or any stock’s, book value is on a per-share basis. To arrive at this number, subtract liabilities from assets. Then divide that number by the Book value is a key measure that investors use to gauge a stock's valuation. The book value of a company is the total value of the company's assets, minus the company's outstanding liabilities. The book value per share may be used by some investors to determine the equity in a company relative to the market value of the company, which is the price of its stock. For example, a company that is currently trading for \\$20 but has a book value of \\$10 is selling at twice its equity.\n\nLet's take an example to find out the price to book value ratio for a company X: – Book Value per share = Book Value of Equity / Total Shares Outstanding" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9256727,"math_prob":0.9914632,"size":6011,"snap":"2022-05-2022-21","text_gpt3_token_len":1255,"char_repetition_ratio":0.19427335,"word_repetition_ratio":0.43761995,"special_character_ratio":0.21161205,"punctuation_ratio":0.08706897,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9869818,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-27T05:49:17Z\",\"WARC-Record-ID\":\"<urn:uuid:69f4b75d-837c-46fa-9a5a-9ab883de7027>\",\"Content-Length\":\"19519\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:64ca50f8-91a7-4c25-b4ab-f5cffcf0db8a>\",\"WARC-Concurrent-To\":\"<urn:uuid:909e30d6-0992-4b03-91ee-f68c40df135a>\",\"WARC-IP-Address\":\"199.36.158.100\",\"WARC-Target-URI\":\"https://cryptomhcs.web.app/kilarjian62040zum/determine-book-value-of-stock-967.html\",\"WARC-Payload-Digest\":\"sha1:ZCUMBZ6ZG3XTXQ3W4P3WARJ3J6G4MVPF\",\"WARC-Block-Digest\":\"sha1:YTPNSG4DGFNXV4TPFMOJHBX6VBC2NXMW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320305141.20_warc_CC-MAIN-20220127042833-20220127072833-00594.warc.gz\"}"}
https://byjus.com/question-answer/linear-equation-in-one-variable-has-a-only-one-variable-with-any-power-b-only-one-term-with-a-variable-c-only-one-variable-with-power-1-d-only-constant-term/
[ "", null, "", null, "", null, "", null, "Question\n\n# Linear equation in one variable has:\n\nA\n\nOnly one variable with any power\n\nNo worries! We‘ve got your back. Try BYJU‘S free classes today!\nB\n\nOnly one term with a variable\n\nNo worries! We‘ve got your back. Try BYJU‘S free classes today!\nC\n\nOnly one variable with power $1$\n\nRight on! Give the BNAT exam to get a 100% scholarship for BYJUS courses\nD\n\nOnly constant term\n\nNo worries! We‘ve got your back. Try BYJU‘S free classes today!\nOpen in App\nSolution\n\n## The correct option is C Only one variable with power $1$Explanation for correct option:Define the linear equation in one variableAn equation of the form of $ax+b=0$ is said to be linear equation in one variable. Here, $a$ and $b$ are constants and $a\\ne 0$, and $x$ is a variable.Some examples of linear equation in one variables are $27x=3,p=7,7m+2=3m$ etc.From the standard form of the linear equation on one variable, it is clear that a linear equation on one variable consists of only one variable and the highest power of the variable is $1$.Hence, option (C) is the correct option.", null, "", null, "Suggest Corrections", null, "", null, "1", null, "", null, "", null, "", null, "", null, "", null, "Similar questions\nJoin BYJU'S Learning Program\nSelect...", null, "", null, "Related Videos", null, "", null, "", null, "Introduction\nMATHEMATICS\nWatch in App", null, "", null, "Explore more\nJoin BYJU'S Learning Program\nSelect..." ]
[ null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNDQiIGhlaWdodD0iNDQiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNDQiIGhlaWdodD0iNDQiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "https://search-static.byjusweb.com/assets/myquestions.webp", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMjAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMjAiIGhlaWdodD0iMjAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNjAwIiBoZWlnaHQ9IjQwMCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB2ZXJzaW9uPSIxLjEiLz4=", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNDAwIiBoZWlnaHQ9IjQwMCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB2ZXJzaW9uPSIxLjEiLz4=", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNDQiIGhlaWdodD0iNDAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNTMiIGhlaWdodD0iNDAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iMzAiIGhlaWdodD0iMzAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null, "data:image/svg+xml;base64,PHN2ZyB3aWR0aD0iNDQiIGhlaWdodD0iNDAiIHhtbG5zPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwL3N2ZyIgdmVyc2lvbj0iMS4xIi8+", null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8733134,"math_prob":0.9953629,"size":368,"snap":"2023-40-2023-50","text_gpt3_token_len":74,"char_repetition_ratio":0.24725275,"word_repetition_ratio":0.0,"special_character_ratio":0.19293478,"punctuation_ratio":0.08695652,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99653953,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-02T22:14:13Z\",\"WARC-Record-ID\":\"<urn:uuid:ca4c4dff-4ed1-4b0f-a887-4611f280d7cb>\",\"Content-Length\":\"146829\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9edcba73-9598-4cd2-84a7-8b0ff20198a2>\",\"WARC-Concurrent-To\":\"<urn:uuid:39caa724-9015-422a-a647-372918513c81>\",\"WARC-IP-Address\":\"34.36.4.163\",\"WARC-Target-URI\":\"https://byjus.com/question-answer/linear-equation-in-one-variable-has-a-only-one-variable-with-any-power-b-only-one-term-with-a-variable-c-only-one-variable-with-power-1-d-only-constant-term/\",\"WARC-Payload-Digest\":\"sha1:DVTYH5XJSBLTZGLHMO3ZJNEJTM7IGXFK\",\"WARC-Block-Digest\":\"sha1:DJIO7DJ74SZJYMMZPFAIMHJCNK64XRZH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100452.79_warc_CC-MAIN-20231202203800-20231202233800-00780.warc.gz\"}"}
http://crossodromoriccia.it/idrz/matlab-font-in-latex.html
[ "LaTeX FAQ: \"How do I use font colors in LaTeX?\". Create a legend and assign the Legend object to the variable 'lgd'. The matlab-prettifier package defines a listings language called Matlab-pretty, which is designed to keep track of the context behind the scenes and, therefore, facilitates context-sensitive highlighting of various elements of Matlab syntax. tex so you should not put it on. From that script, MATLAB generates the Latex file basicLatexFileGenerated. These are text interpreters that allow you to display mathematical expressions (both) and other text (LaTeX) with specific formatting and other options that most other text editors do not support. Commented: maxime debiossac on 1 Aug 2018 Here is my problem: I would like to use a different font style for the latex interpreter, for example sans serif, which is required for figures in a scientific publication I am. This does not work in 2015a. \\subsection{The Tricks} The idea behind the system is that you can use two tricks to integrate code from MATLAB with \\LaTeX. Yair holds a BSc in Physics and MSc in Computer Science, both with top honors. Common examples include Times, Courier, and Helvetica. To illustrate the point, we save the image as EPS, convert it to PNG, and then show it here. exe), and you could change font settings in the Command Prompt program (try right-click, or system menu). Direct Coding. I can do this with text, but I would like to use the LaTeX formatting instead. To change the font style, use LaTeX markup. This can be done using the psfrag LaTeX package to strip out some dummy text added to the plot (as an EPS file). Here is a minimal le for listings. This table describes how to change the font size for each tool in MATLAB. Pas d'installation, collaboration en temps réel, gestion des versions, des centaines de modèles de documents LaTeX, et plus encore. And I agree, accumarray is another great candiate for this. Using a different font size on a global level will affect all normal-sized text as well as the size of headings, footnotes, etc. This chapter assumes you are using the latex or pdflatex engines and need to concern yourself with TeX's various encodings. The different font sizes are listed below. Most computer fonts used today are in either bitmap or outline data formats. Matlab graphics with LaTeX; Maths. Examples of Didone fonts include Bodoni and Didot. in the same font type (to be specific SansSerif. Well, if you would've, you know far more of LaTex than I do :) I Gargled it and found a posting that happens to work in Matlab. Use the silent activation feature 3. The default font size depends on the specific operating system and locale. Plots created in an external tool such a MATLAB can be easily incorporated in a LaTeX document. varphi Matlab / Latex character. The labels on the vertical axis contain mathematical expressions, including fractions and symbols. Documentation Home Learn LaTeX in 30 minutes. The text is selectable if I use the default interpreter, but the sans serif font doesn't look great in my thesis. In MATLAB, to print a \\, you must actually use the backslash command, which is \\\\. It's such a useful and powerful function, and most people overlook it due to its somewhat cryptic documentation. Here is the classic Hello, world! program in C:. The basic steps are Create the plot in MATLAB; If the plot is scaled too drastically the axis font and plot symbols may become hard to read. 'r') is interpreted by Latex. Is it possible to convert the font of a matlab plot to be the same of latex fonts. A quick way to include a block of code is to use a verbatim environment. Font families []. If you are using the latex or pdflatex engines, you may get a warning similar to the following: LaTeX Font Warning: Font shape OT1/cmr/m/n' in size <142. clabel(C,v) labels only those contour levels given in vector v. , there are no licence fees, etc. Later changes in the document then refer. The mlreportgen. \\end{verbatim} Just as in the example at the introduction, all text is printed keeping line breaks and white spaces. You can follow any responses to this entry through the RSS 2. The internet tells me that I should install the computer modern font and set it as my default matlab font, but. The labels on the vertical axis contain mathematical expressions, including fractions and symbols. This does not work in 2015a. The FontName, FontWeight, and FontAngle properties do not have an effect. Hi Sijie, You may try putting the formula only in between the $symbols. How to cite MATLAB (bibtex / latex) So I've been extensively using MATLAB recently and while writing a paper had to cite it. I have recently bought a new Macbook Pro 2011 and I noticed that on it the new version of Matlab2011a doesn't display the axes titles written with the Latex interpreter. [code ]\\textsc[/code] enables small caps. If you want to write data properly into a Word file, you need to be able to write this data as a heading, as plain text, or as text with a particular font, a particular size, or even a particular highlighting. I am using the cut and paste approach to document my mcode in latex with the frame and line number options. 13 Matlab and LaTeX 1. If you insert an image into a code line, MATLAB places the image in a new text line directly under the selected code line. You can change this font typeface for another that better suits your style. Matlab does not support this natively but there are lots of community scripts capable of doing so. 5mm-thick horizontal ruler is inserted by \\rule{\\linewidth}{0. The syntax to set a font size or font style is easy: This is a simple example, {\\tiny this will show different font sizes } and also \\textsc{ different font styles }. LyX is a document processor that encourages an approach to writing based on the structure of your documents and not simply their appearance. All of these fonts are listed from smallest to largest. LaTeX forum ⇒ General ⇒ LaTex to compile from a Matlab command LaTeX specific issues not fitting into one of the other forums of this category. To change the font style, use LaTeX markup. where X[k] is. I know it exists the function matlab2latex in Matlab but then I've to copy-paste one by one all the file code what it's a lot of work. LaTeX commands generally refer to these with the shorthand rm, sf, and tt respectively. Here's how to use them. By default, MATLAB supports a subset of TeX markup. The subscript text contains two numeric or alphanumeric characters. That’s because LaTeX ignores many of the formatting properties supplied by MATLAB — you must set them using LaTeX functions. Matlab graphics with LaTeX. The tex-file contains the annotation of the figure such as titles, labels and texts. com warning: if the default computer modern fonts are used, the weight of bold lowercase greek will not appear as bold as that of bold lowercase roman, and it isn't. MatLab handles naturally simple LaTex encoding which allows introducing greek letters or modifying the font size and appearance in plots. I am trying to include source code from a gnuplot script, but some of the lines are apparently being interpreted as LaTex commands. I have figured out how to change the axis labels, but not the tick numbers. Experience in such software is now a necessisity in today's high tech world. Whenever you create a plot in MATLAB, you need to identify the sources of information using more than just the lines. An inline LaTeX formula is surrounded by single \"$\"'s, and a block is separated by double \"\"'s. \\subsection{The Tricks} The idea behind the system is that you can use two tricks to integrate code from MATLAB with \\LaTeX. The development is being funded by Canonical on behalf the wider Free Software community and the Ubuntu project. Tilde Above Letter Latex. New study shines light on mysterious giant viruses; Robot designers take heed: adjustable hairy toes help geckos run sideways along walls; Scientists demonstrate quantum radar prototype. Create the x-axis ticks by spanning the x-axis limits at intervals of pi/2. 1 Maths There's more to maths typesetting than meets the eye. edited Jul 24 '11 at 9:04. August 2012 by tom 55 Comments. For x and y from -2 π to 2 π, plot the 3-D surface y sin (x)-x cos (y). sh you will see the following error:. 1:pi; y = sin(x); plot(x,y) set(gca,'FontName','Helvetica'); Is it possible to do the same but for latex fonts (I say latex fonts as I am not sure of the actual name of the font latex uses as its basic font). Display the axes box by using a. This table describes how to change the font size for each tool in MATLAB. I intend to produce Matlab figures which are about 8cm wide on a page generated with LaTeX. The maximum size of the text that you can use with the LaTeX interpreter is 1200 characters. The displayed text uses the default LaTeX font style. 14) Explain how you can pre-allocate a Non-Double Matrix? Pre-allocating a block of memory for holding a non-double matrix is memory efficient. The FontName, FontWeight, and FontAngle properties do not have an effect. Packages used: matlab-prettifier, epstopdf ----- % Matlab Codes and Graphics in LaTeX by Chandra Has \\documentclass. % Specifies … Continue reading \"LaTeX - bold vectors and arrow vectors\". On one of the Matlab help page says: Note that MATLAB does not display the x-, y-, and z-axis labels in a new font until you manually reset them (by setting the XLabel, YLabel, and ZLabel properties or by using the xlabel, ylabel, or zlabel command). Matlab Assignment Help is the process where a studen t would contact a Matlab Programming Service Provider and hire that service provider for the time and effort. LaTeX Interpreter. Call it $\\boldsymbol\\beta$. Matlab Function Syntax Example Figure Annotation LATEX in Matlab The manipulation of gure annotation is very simple and straightforward. Un éditeur LaTeX en ligne facile à utiliser. LaTeX FAQ: \"How do I use font colors in LaTeX?\". How can I specify the font for a LaTeX Learn more about latex, font, serif MATLAB. It's such a useful and powerful function, and most people overlook it due to its somewhat cryptic documentation. Display the axes box by using a. This is not a comprehensive list. Font families []. The FontName, FontWeight, and MATLAB initializes all property values before executing the CreateFcn callback. Matlab comes to the rescue. Why is the latex font not selectable in eps Learn more about matlab, latex font. When i excute the command, it doesn't change the font type to Times new roman rather a different font is displayed. Use Magnification instead for proportional scaling. And I agree, accumarray is another great candiate for this. The displayed text uses the default LaTeX font style. These families can generally be grouped into three main categories: serif, sans serif, and monospaced. An easy way to create your résumé for academia, it makes use of Latex and MATLAB – New input arguments font_size, blue_links and us_paper. Plots created in an external tool such a MATLAB can be easily incorporated in a LaTeX document. This could be changed to 11pt or 12pt as a option of documentclass. It is not changed from the code line. What you're describing is basically the expected behavior. this detailed post by Yukio Fukuzawa on his blog on producing High quality graphics for your LaTeX document: The Matlab route, which may also be of interest. For more symbols, you can use LaTeX markup by setting the Interpreter property to 'latex'. Label y-axis - MATLAB ylabel. The txt output is useful as an argument to annotation functions such as title, xlabel, and text. Documentation Home Learn LaTeX in 30 minutes. The FontName, FontWeight, and FontAngle properties do not have an effect. In case you didn't know, MATLAB allows you to quickly take a MATLAB script and publish a formated report (HTML, Word, LaTeX, XML, PPT), where the figures are automatically converted to various graphics format, including EPS. Tick mark labels change immediately. All of these fonts are listed from smallest to largest. Bold Greek letters are available using boldsymbol in the amsmath package. For your reference, in my case, a tikz is about 10MB, but a eps from matlab (same data) only 15KB. exe), and you could change font settings in the Command Prompt program (try right-click, or system menu). This document describes techniques for include computer code, e. Try to use the same font of the document in which the figure will be included. Axes objects have properties that you can use to customize the appearance of the axes. Most computer fonts used today are in either bitmap or outline data formats. (The LaTeX font options in MATLAB are limited. New in MATLAB R2011a is the ability to include inline LaTeX formulas. 1:pi; y = sin(x); plot(x,y) set(gca,'FontName','Helvetica'); Is it possible to do the same but for latex fonts (I say latex fonts as I am not sure of the actual name of the font latex uses as its basic font). Posted: 22nd May 2010 by Tim in LaTeX. STEXT(X,Y,'string') adds the styled text in the quotes to location (X,Y) on the current axes in a manner similar to the TEXT function. How can I specify the font for a LaTeX Learn more about latex, font, serif MATLAB. I have recently bought a new Macbook Pro 2011 and I noticed that on it the new version of Matlab2011a doesn't display the axes titles written with the Latex interpreter. Font size, specified as a scalar value greater than zero in point units. In mathematical mode as well as in text mode, you can change the typeface as needed. Sign in or create your account; Project List \"Matlab-like\" plotting library. It describes the editing community's established practice on some aspect or aspects of Wikipedia's norms and customs. LaPrint (LaTeX Print) LaPrint is a MATLAB function to print MATLAB graphics for inclusion in LaTeX documents. Three Styles for LaTeX Vector Notation filed in LaTeX , Math on Jun. If using LaTeX and don't mind using a cloned font then choose Herbert's answer. Half of the LaTeX looks comes from the font. Instead, we illustrate the process with a simple plot of sin (x) Use the MATLAB print command to create an. I could be wrong but my guess is no as it is not part of basic TeX or LaTeX and MATLAB only supports only a basic subset of TeX or LaTeX. We want to change it to “latex”. in the same font type (to be specific SansSerif. To change the font style, use LaTeX markup. Matlab comes to the rescue. active oldest votes. Render Latex equations into plain text ASCII to insert as comments in source-code, e-mail, or forum. Plotly Graphing Library for MATLAB ® > Layout Options > Text and Annotations. This site is supported by donations to The OEIS Foundation. LaTeX settings for MATLAB code listings. GitHub Gist: instantly share code, notes, and snippets. , there are no licence fees, etc. All the predefined mathematical symbols from the TeX package are listed below. First you can use the “LaTeX-like font”. 2 posts • Page 1 of 1. How do I add latex fonts in matlab? Follow 400 views (last 30 days) maxime debiossac on 30 Jul 2018. -' means a blue line with dots:. Agregue texto a la gráfica que contenga una expresión integral utilizando el marcado LaTeX. The text is selectable if I use the default interpreter, but the sans serif font doesn't look great in my thesis. These families can generally be grouped into three main categories: serif, sans serif, and monospaced. can help to write in LaTeX, however, I was wondering if there's any way I can use LaTeX for only and write the remaining part of the label in the default font of the MATLAB label - I've seen that the LaTeX interpreter doesn't allow changing font?. com The displayed text uses the default LaTeX font style. % Minimal latex example: % Shows how to switch between bold and arrow vectors. To change the font style, use LaTeX markup. There is also a colorbar in this figure and I want the ticks at this colorbar in latex style too. Worksheet Template Latex Order your hama beads online making sure to add a template or template boards to centura pearl a4 baby pink card 10 sheet pack what is it often seen at kids parties balloon modelling Tex latex if you have prepared your paper using as sub panels within extended data figures see extended data formatting guide extended data figures should be prepared along slightly Use. bib bibtex citation document class fonts graphicx hyperref infinity label linux multiline equation pdf presentation refer section web acronym bib cite color documentclass editing. varphi Matlab / Latex character. Depending on the font used, only standard sizes may be available with this option. By default, LaTeX uses Computer Modern, a family of typefaces. Autoformatting. Bold Greek letters are available using boldsymbol in the amsmath package. Want a Mac app? Lucky you. This could be changed to 11pt or 12pt as a option of documentclass. They look better at 'FontSize' 18. In addition, Matlab’s text interpreter must be set to handle LATEX coding. I know it exists the function matlab2latex in Matlab but then I've to copy-paste one by one all the file code what it's a lot of work. To change the font style, use LaTeX markup. We’ll do this in 2 places. Posted: 22nd May 2010 by Tim in LaTeX. g Helvatica,CM ). Making statements based on opinion; back them up with references or personal experience. It suggests a set of 14 math alphabets that covers all Unicode mathematical alphanumeric symbols and discusses compatibility issues between math typesetting with traditional (8-bit) TeX engines versus the unicode-math package for Unicode-enabled TeX engines (XeTeX, LuaTeX). 26378> not available (Font) size <24. Watch CBS television online. The txt output is useful as an argument to annotation functions such as title, xlabel, and text. Plots created in an external tool such a MATLAB can be easily incorporated in a LaTeX document. You could also use this spot to set any % global variables you want like font names or font sizes, or add things % to the path. 5mm-thick horizontal ruler is inserted by \\rule{\\linewidth}{0. That’s because LaTeX ignores many of the formatting properties supplied by MATLAB — you must set them using LaTeX functions. 1:pi; y = sin(x); plot(x,y) set(gca,'FontName','Helvetica'); Is it possible to do the same but for latex fonts (I say latex fonts as I am not sure of the actual name of the font latex uses as its basic font). By default, MATLAB supports a subset of TeX markup. The fixed-width font relies on the root FixedWidthFontName property. A good set of fonts that match the LaTeX fonts. LaTeX treats left and right quotes as different entities. It is preferred if the font you use for the figure is the same font you use for the normal text. Yep for me it works also; i. sh you will see the following error:. I want to import my MATLAB plots in LaTeX. LaTeX is a high-quality typesetting system; it includes features designed for the production of technical and scientific documentation. Select a Web Site. Notice that the output differs quite a bit when using the LaTeX interpreter. Plots created in an external tool such a MATLAB can be easily incorporated in a LaTeX document. Write content using fprintf. The latest reviewed version was checked on 13 July 2019. Label y-axis - MATLAB ylabel. Sometimes you need to use special characters and character formatting in MATLAB. 1 Maths There's more to maths typesetting than meets the eye. Floats are there to deal with the problem of the object that won't fit on the present page, and to help when you really don't want the object here just now. LaTeX Interpreter. (A really cool thing is that I also generated. Contribute at least one answer each month for 24 consecutive months. Select the options that you want to apply to the default font, such as font style and font size. If you change the axes font size, then MATLAB automatically sets the font size of the colorbar to 90% of the axes font size. The \\caption package allows many other aspects of the caption to be modified, via either the \\captionsetup command or in the package options. text('position',[0. Arrows would be used within math enviroment. Setting the root FixedWidthFontName property causes an immediate update of the display to use the new font. 2 Comments Show Hide all comments. Provide details and share your research! But avoid … Asking for help, clarification, or responding to other answers. The psfrag handout addresses the common problem of how to add LaTeX maths to a postscript file. When you set the Interpreter property to 'latex', MATLAB will hand off the string (e. lualatex and xelatex, on the other hand, accept Unicode input and can usually typeset documents using the correct glyphs without further user intervention. matlab-prettifier is a package for LaTeX & friends that allows you to effortlessly and beautifully typeset Matlab source code in PDF files. The text is selectable if I use the default interpreter, but the sans serif font doesn't look great in my thesis. A good set of fonts that match the LaTeX fonts. My hope is that you find this particular corner useful. It is not changed from the code line. Follow 257 views (last 30 days) Bogdan Dzonlaga on 24 Sep 2018. Latex is a stable dispersion of polymer microparticles in an aqueous medium. Text properties control the appearance and behavior of the Text object used to title a grid of subplots. Bold Greek letters are available using boldsymbol in the amsmath package. I've many Matlab files and I wanna import their code into my latex file. Simple text formatting helps to highlight important concepts within a document and make it more readable. Depending on the font used, only standard sizes may be available with this option. And I found a thread which shows how the sample lines can be reduced in length. Floats are there to deal with the problem of the object that won't fit on the present page, and to help when you really don't want the object here just now. For example, I'm plotting temperature as a function of date (in \"Jan 01\" format) and I'd like the \"Jan 01\" \"Jan 02\" \"Jan 03\" etc labels on the x axis to be a smaller font so they don't overlap. Letters are printed in italics, with more space left in-between, spaces are ignored. There are several standard LaTeX commands to change the text alignment. Per default latex use a font size of 10pt (depending of the used documentclass article, report, book und letter). It is not one of Wikipedia's policies or guidelines, as it has not been thoroughly vetted by the community. MatLab Plot() the box around the legend if the font has been eixos dos gráficos sugere-se utilizar o interpretador Latex do. adam Academic Writing, Software June 23, 2016 November 4, 2018 4 Minutes. There is also a colorbar in this figure and I want the ticks at this colorbar in latex style too. 13 Matlab and LaTeX 1. Then, use dot notation to access the 'FontSize' property and set the value to 14 points. By default, MATLAB interprets text using TeX markup. this detailed post by Yukio Fukuzawa on his blog on producing High quality graphics for your LaTeX document: The Matlab route, which may also be of interest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. LaTeX font in figure. com The displayed text uses the default LaTeX font style. I have a matlab polt and everything like label and title is interpreted in latex style. This document describes techniques for include computer code, e. There are hundreds - if not thousands - of typefaces, or font families. IPython is a growing project, with increasingly language-agnostic components. You can save your projects at Dropbox, GitHub, GoogleDrive and OneDrive to be accessed anywhere and any time. Let's begin with an example:. For example, the FontSize property controls the font size of the title, labels, and legend. 31 bronze badges. After resizing the figure the legend appears quite big and the legend covers a lot of my plot. Set the x- and y-axes labels and the title using the latex interpreter. MATLAB interprets the characters \"\\\" and \"%\" as MATLAB commands. In many of the files I am using underscores (_) as separator, and the result is that Matlab creates a subscript. Packages used: matlab-prettifier, epstopdf ----- % Matlab Codes and Graphics in LaTeX by Chandra Has \\documentclass. Commented: maxime debiossac on 1 Aug 2018 Here is my problem: I would like to use a different font style for the latex interpreter, for example sans serif, which is required for figures in a scientific publication I am. The eps-file contains the non-text part of the figure and is called by the tex-file. See how it works on Vimeo. If using LaTeX and don't mind using a cloned font then choose Herbert's answer. Create the LaTeX labels for the x-axis by using arrayfun to apply latex to S and then concatenating $. Quote-marks. Also note this excerpt from the documentation in relation to the font: The displayed text uses the default LaTeX font style. STEXT Add Styled Text to the current plot. Latex as found in nature is a milky fluid found in 10% of all flowering plants (angiosperms). can help to write in LaTeX, however, I was wondering if there's any way I can use LaTeX for only and write the remaining part of the label in the default font of the MATLAB label - I've seen that the LaTeX interpreter doesn't allow changing font?. I am working on some plots in Matlab, where I am using the filename as the title of the plot. 1:pi; y = sin(x); plot(x,y) set(gca,'FontName','Helvetica'); Is it possible to do the same but for latex fonts (I say latex fonts as I am not sure of the actual name of the font latex uses as its basic font). A good set of fonts that match the LaTeX fonts. The amount of available colour names depends on the driver, usually the next colours can. Using LaTeX mode in figures seems to work. The maximum size of the text that you can use with the LaTeX interpreter is 1200 characters. Matlab does not support this natively but there are lots of community scripts capable of doing so. improve this question. It is not changed from the code line. 1 psfrag: adding maths to postscript files 2. I originally wrote this package for myself to have colourful source code highlighted in LaTeX, looking exactly like in the Matlab editor — being able to just copy-paste the code directly (no pre-treatment with highlight. For multiline text, this. The default font size depends on the specific operating system and locale. Welcome to LinuxQuestions. I have changed to Tex and removed$ signs as well then it shows the same text as shown in xlabel. The maximum size of the text that you can use with the LaTeX interpreter is 1200 characters. While there is a Word compatible port of the font, it lacks many characters that you would need in a word processor. Moreover is would be necessary to so using 'interpreter','latex'. Most computer fonts used today are in either bitmap or outline data formats. I want to import my MATLAB plots in LaTeX. Hypertext Help with LaTeX verbatim \\begin{verbatim} text \\end{verbatim} or \\begin{verbatim*} text \\end{verbatim*} The verbatim environment is a paragraph-making environment that gets LaTeX to print exactly what you type in. It is not changed from the code line. Note that LaTeX uses different glyph shapes for different font sizes to improve readability. Repeat these steps for the y-axis. LaTeX handles superscripted superscripts and all of that stuff in the natural way. Create the x-axis ticks by spanning the x-axis limits at intervals of pi/2. I only want to change the font for one word, while keeping the text flow. On one of the Matlab help page says: Note that MATLAB does not display the x-, y-, and z-axis labels in a new font until you manually reset them (by setting the XLabel, YLabel, and ZLabel properties or by using the xlabel, ylabel, or zlabel command). The default tool to display code in LaTeX is verbatim, which generates an output in monospaced font. m file on your userpath (If you don't know which is, type pwd on command window), and writing: set(0,'DefaultFigureWindowStyle','docked'). Is there a way to turn off interpretation of LaTex keywords within a listing? set xlabel “Particle Velocity (cm/{/Symbol \\155}S)” font “Helvetica,18” offset char 0. How to set the title, legend-entries, and axis-titles in MATLAB ®. 1 Scaling, rotation, clipping, wrap-around and shadows. I'd like to place such data in a cell where the first column are the unique ids and second row their attribute. I face the same problem when I change manually (from the figure editor) the font to Times New Roman, with latex interpreter. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Sign in or create your account; Project List \"Matlab-like\" plotting library. For a list of supported TeX markup, see the text Interpreter property description. LaTeX is a high-quality typesetting system; it includes features designed for the production of technical and scientific documentation. \\begin{verbatim} Text enclosed inside \\texttt{verbatim} environment is printed directly and all \\LaTeX{} commands are ignored. How can I specify the font for a LaTeX Learn more about latex, font, serif MATLAB. All of these fonts are listed from smallest to largest. set the interpreter for the text command, the xlabel command, and so on, to Latex. For example: title ('$\\hat {\\psi}$','Interpreter','latex') If you are using the legend function in R2018a or. New study shines light on mysterious giant viruses; Robot designers take heed: adjustable hairy toes help geckos run sideways along walls; Scientists demonstrate quantum radar prototype. Distance between the text extent and the rectangle edge. After defining them, you'll only need to use font commands to change the font, for instance to bold or italicize a word or words. How do I add latex fonts in matlab? Follow 428 views (last 30 days) maxime debiossac on 30 Jul 2018. active oldest votes. Simple text formatting helps to highlight important concepts within a document and make it more readable. Sample markup can also be added using the top-level Cell Menu: \"Cell -> Insert Text Markup -> LaTeX Inline. If I want to get one of the original signals using the resulting wav file and the other ori. It’s a bit of a hack, but it produces nice outputs. The LaTeX font encodings guide names the OML encoding TeX math italic and defines:. (except for the apostrophs) There are SEVERAL WAYS TO EXECUTE the program. Back to top A cell is a flexible type of variable that can hold any type of variable. % Minimal latex example: % Shows how to switch between bold and arrow vectors. How to cite MATLAB (bibtex / latex) So I've been extensively using MATLAB recently and while writing a paper had to cite it. Computer code is usually typeset in monospaced font. Then, use dot notation to access the 'FontSize' property and set the value to 14 points. When I ask my colleagues how they tackle the issue, they say that they have to edit the figure with another software to change the latex font. Many conventions used in the typesetting of plain text are inappropriate to maths. Union (∪) and Intersection (∩) symbols in LaTeX can be produced via the \\cup and \\cap definitions while in math mode. The colour of a second block of text, delimited by { and }, is set to red with the command \\color{red}, then a. No extra packages are required to use these symbols. Before using the listings package, you should be familiar with the LATEX typesetting system. Does a latex command exist which imports the Matlab code from a file into the Latex file? Thanks for your help!. Setting the Title, Legend Entries, and Axis Titles in MATLAB ®. 1 Creating Figures and Graphs with LaTeX Figures and graphs are created using the \"figure\" environment given below: \\begin{figure}[where]figure \\end{figure}In the above syntax, figure stands for the contents of the 'picture' environment together with a possible \\caption command. Notice that the output differs quite a bit when using the LaTeX interpreter. Then use dot notation to set the FontSize property. Create the x-axis ticks by spanning the x-axis limits at intervals of pi/2. Documentation Home Learn LaTeX in 30 minutes. For your reference, in my case, a tikz is about 10MB, but a eps from matlab (same data) only 15KB. Using italics, bold or underlined words can change the perception of the reader. LaTeX treats left and right quotes as different entities. Ah, this is a nice entry. Matlab graphics with LaTeX. For multiline text, this reduces by about 10 characters per line. However, for clarity I would recommend putting those lines in a function or script and including the line at the beginning of your code. matlab2tikz is a MATLAB(R) script to convert native MATLAB(R) figures to TikZ/Pgfplots figures that integrate seamlessly in LaTeX documents. I want to import my MATLAB plots in LaTeX. Thus, a complicated mathematical expression, where only certain symbols are desired in bold font, may be obtained by entering and exiting Math mode as required. For a list of supported symbols, see the documentation. Later changes in the document then refer. You can throw anything you want into the bucket: a string, an integer, a double, an array, a structure, even another cell array. ThaiLaTeX Thai LaTeX MiKTeX MATLAB. However, the problem is more serious than simply setting a font because MATLAB appears to lack the required font files for LaTeX. For example, plot four lines. Computer code is usually typeset in monospaced font. will widen the text width and reduce the amount of margin overruns. Matlab graphics with LaTeX; Maths. An easy way to create your résumé for academia, it makes use of Latex and MATLAB – New input arguments font_size, blue_links and us_paper. Preparing Figures in Matlab and LaTeX for Quality Publications gcf Handle of the current figure gca Handle of the current axis in the current figure get Query the values of an object's properties set Set the values of an object's Matlab_LaTeX_Figures. The matlab-prettifier package defines a listings language called Matlab-pretty, which is designed to keep track of the context behind the scenes and, therefore, facilitates context-sensitive highlighting of various elements of Matlab syntax. To change the font style, use LaTeX markup. That does not mean that only these three sizes can be used, it is only the size of the normalsize font. If you go to C:\\Program Files\\MATLAB\\R2011a\\sys\\fonts\\ttf\\cm (or wherever your MATLAB install lives) you can see the available TeX fonts. An alternative solution is to draw the plots in Matlab/Python (with matplotlib) and export it in a format that can be included in Latex with the text part of the figure stored separately. LaTeX by default recognizes \"table\" and \"figure\" floats, but you can define new ones of your own (see Custom floats below). sh -----Error: Activation cannot proceed. 'r') is interpreted by Latex. Learn more about eps, matlab, font, latex MATLAB. Does a latex command exist which imports the Matlab code from a file into the Latex file? Thanks for your help!. I could be wrong but my guess is no as it is not part of basic TeX or LaTeX and MATLAB only supports only a basic subset of TeX or LaTeX. Direct Coding. I intend to produce Matlab figures which are about 8cm wide on a page generated with LaTeX. For this example, plot y = x 2 sin (x) and draw a vertical line. The maximum size of the text that you can use with the LaTeX interpreter is 1200 characters. I can do this with text, but I would like to use the LaTeX formatting instead. These include options for changing the color of plot lines, the type of line, and the type of markers. When I try to use the LaTeX mode for annotations or masks in Simulink, LaTeX symbols such as abla are replaced by small box-shaped placeholders. The FontName, FontWeight, and FontAngle properties do not have an effect. Fonts - How can I get bold math symbols? - TeX - LaTeX Tex. Or at least not the default of Matlab nor Latex e. Select the options that you want to apply to the default font, such as font style and font size. For multiline text, this. Many conventions used in the typesetting of plain text are inappropriate to maths. clabel(C,v) labels only those contour levels given in vector v. Pas d'installation, collaboration en temps réel, gestion des versions, des centaines de modèles de documents LaTeX, et plus encore. In addition, Matlab's text interpreter must be set to handle LATEX coding. Configure or turn off automatic text formatting. (except for the apostrophs) There are SEVERAL WAYS TO EXECUTE the program. varphi Matlab / Latex character. Additionally, the dashed line looks more like the original image in the EPS version than in the PNG version. Your Examples. Choose a web site to get translated content where available and see local events and offers. It's somewhat confusing so let's make an analogy. Text in graphs for latex document I'm creating a series of graphs to be input into a document compiled with Latex. tfm, but the corresponding ttf and pfb-files are missing from sys/fonts such that it does not get rendered. Then, use dot notation to access the 'FontSize' property and set the value to 14 points. For example, you can enter the text Maclaurin series for sin(x). Using tex markup such as \\alpha, etc in text objects renders regular ASCII characters and not the expected tex output. In some cases, you may want to set fonts and sizes by hand. Move the mouse to zoom in. I want to import my MATLAB plots in LaTeX. To change the font style, use LaTeX markup. If you are using the latex or pdflatex engines, you may get a warning similar to the following: LaTeX Font Warning: Font shape OT1/cmr/m/n' in size <142. See the Fonts chapter's discussion of encoding for additional information. The default font size depends on the specific operating system and locale. This series is focusing on suggestions and considerations to get your plot looking \"just right\" for your paper or presentation. How to use fprintf in MATLAB. Latex Equation Numbering Without Section. Configure or turn off automatic text formatting. texlabel converts Greek variable names (for example, lambda, delta, and so on) into a character vector that is displayed as Greek letters. this detailed post by Yukio Fukuzawa on his blog on producing High quality graphics for your LaTeX document: The Matlab route, which may also be of interest. I was going around Mathworks forums and I found this tip I wanted to share with you guys. Learn more about eps, matlab, font, latex MATLAB. Figures in Matlab Handle Graphics is an object-oriented structure for creating, manipulating and displaying graphics Graphics objects: basic drawing elements used in Matlab to display graphs and GUI components Every graphics object: Unique identifier, called a handle Set of characteristics, called properties Possible to modify every single property using the command-line. Convert the axis limits to precise multiples of pi/2 using round and get the symbolic tick values in S. The mlreportgen. This is an information page. To change the font style, use LaTeX markup. The font changes from Helvetica to Computer Modern, the standard LaTeX font in Matlab. In some cases, you may want to set fonts and sizes by hand. The size of the number labels attached to the tick marks on the x axis. matlab2tikz is a MATLAB(R) script to convert native MATLAB(R) figures to TikZ/Pgfplots figures that integrate seamlessly in LaTeX documents. Note that LaTeX uses different glyph shapes for different font sizes to improve readability. In addition, Matlab's text interpreter must be set to handle LATEX coding. Packages used: matlab-prettifier, epstopdf ----- % Matlab Codes and Graphics in LaTeX by Chandra Has \\documentclass. To change the size of a font use a new font size parameter. can help to write in LaTeX, however, I was wondering if there's any way I can use LaTeX for only and write the remaining part of the label in the default font of the MATLAB label - I've seen that the LaTeX interpreter doesn't allow changing font?. I enjoy the current display. The default font size depends on the specific operating system and locale. GitHub Gist: instantly share code, notes, and snippets. Store the axes handle in a by using gca. Matlab Function Syntax Example Figure Annotation LATEX in Matlab The manipulation of gure annotation is very simple and straightforward. Online Latex Equation Editor. m} %Parcial Computacion Cientifica (Punto 1) %Solucion del sistema de Ecuaciones para a2 y a3. There is also a colorbar in this figure and I want the ticks at this colorbar in latex style too. The different font selection and the semantic of. The displayed text uses the default LaTeX font style. Let's begin with an example:. \\subsection{The Tricks} The idea behind the system is that you can use two tricks to integrate code from MATLAB with \\LaTeX. Instead, we illustrate the process with a simple plot of sin (x) Use the MATLAB print command to create an. Some system fonts can't be rendered in MATLAB ®. Ah, this is a nice entry. Text and Annotations in MATLAB ® How to add text labels and annotations to plots in MATLAB. Changing the font size in LaTeX can be done on two levels, either affecting the whole document or parts/elements of it. Or at least not the default of Matlab nor Latex e. com The displayed text uses the default LaTeX font style. MATLAB For Beginners: 20-Minute Video Training Course. For example: title ('$\\hat {\\psi}$','Interpreter','latex') If you are using the legend function in R2018a or. When I try to use the LaTeX mode for annotations or masks in Simulink, LaTeX symbols such as abla are replaced by small box-shaped placeholders. To change the font style, use LaTeX markup. Documentation Home Learn LaTeX in 30 minutes. LaPrint creates an eps-file and a tex-file. MATweave: Integrating MATLAB Software with LaTeX Documents. Follow 257 views (last 30 days) Bogdan Dzonlaga on 24 Sep 2018. Unique Gift Ideas - mySimon is the premier price comparison shopping online site letting you compare prices and find the best deals on all the hottest new products!. Keep in mind for LaTeX tables, the entries are separated by & and the rows are terminated with \\\\. Yes, when I try Matlab to write the title with the Latex font, I do not now why, but it does not work; however, the axis labels are correctly intrepeted and the command works perfectly. Matlab graphics with LaTeX. For example I can modify the font of a plot by: x = -pi:. Use TeX markup to add superscripts and subscripts, modify the font type and color, and include special characters in the text. sh you will see the following error:. Access the current Axes object using the gca function. latex interpreter seems to miss fonts. Parseval's theorem states that for N discrete points of signal,. Style Text in Matlab. The following table contains a listing of the line plot styles. 5mm-thick horizontal ruler is inserted by \\rule{\\linewidth}{0. I have recently bought a new Macbook Pro 2011 and I noticed that on it the new version of Matlab2011a doesn't display the axes titles written with the Latex interpreter. All of these fonts are listed from smallest to largest. 5 centimeter leading. Please see my comment below. When I ask my colleagues how they tackle the issue, they say that they have to edit the figure with another software to change the latex font. The best method I have come across so far is using matlab2tikz. By default, MATLAB supports a subset of TeX markup. This chapter assumes you are using the latex or pdflatex engines and need to concern yourself with TeX's various encodings. set the interpreter for the text command, the xlabel command, and so on, to Latex. After resizing the figure the legend appears quite big and the legend covers a lot of my plot. The English looks fine, however the symbols come out looking too small for the reader to easily view. De forma predeterminada, MATLAB Para utilizar el marcado LaTeX, establezca la propiedad Interpreter para el objeto Text en 'latex'. To get an expression exp to appear as a subscript, you just type _{exp}. In case you didn't know, MATLAB allows you to quickly take a MATLAB script and publish a formated report (HTML, Word, LaTeX, XML, PPT), where the figures are automatically converted to various graphics format, including EPS. Detexify is an attempt to simplify this search. Whenever you create a plot in MATLAB, you need to identify the sources of information using more than just the lines. For example, plot four lines. To change the size of the font use a '\\' followed by one of the above font sizes before the TEXT you want to change. If you change the axes font size, then MATLAB automatically sets the font size of the colorbar to 90% of the axes font size. Render Latex equations into plain text ASCII to insert as comments in source-code, e-mail, or forum. Why is the latex font not selectable in eps Learn more about matlab, latex font. The txt output is useful as an argument to annotation functions such as title, xlabel, and text. asked Jul 24 '11 at 6:43. Store the axes handle in a by using gca. This is an example line with a problem. OF course I used dummy values for the ticks and titles font size, but you can resize the title after changing the ticks if you like. I can't even find any relevant answer in LaTex-related posts. Yes, when I try Matlab to write the title with the Latex font, I do not now why, but it does not work; however, the axis labels are correctly intrepeted and the command works perfectly. Jiro's pick this week is \"Read text from a PDF document\" by Derek Wood. I know it exists the function matlab2latex in Matlab but then I've to copy-paste one by one all the file code what it's a lot of work. To preview fonts that MATLAB can render in figure windows, use the uisetfont function. You can purchase a license here: Buy Detexify for Mac. When you set the Interpreter property to 'latex', MATLAB will hand off the string (e. If you insert an image into a code line, MATLAB places the image in a new text line directly under the selected code line. \\subsection{The Tricks} The idea behind the system is that you can use two tricks to integrate code from MATLAB with \\LaTeX. 'Outer radius, ' and ' (m)') use the MATLAB default font, Helvetica, and the symbol (i. In certain cases it may be desirable to include \"normal text\" within an equation. LaTeX Interpreter. For multiline text, this. To get MATLAB to go to the next line, you need to use the \\n command. It is not one of Wikipedia's policies or guidelines, as it has not been thoroughly vetted by the community. Also note this excerpt from the documentation in relation to the font: The displayed text uses the default LaTeX font style. To determine an object's font name only, use dot notation to query the value of its FontName property. 0 (R14), \"LaTeX\" has been added as an optional interpreter for text objects in a figure. Join experts in discussion on math and science software. LaTeX is the de facto standard for the communication and publication of scientific documents. For plotting the results, manually specify the line. txt = texlabel(f) converts the MATLAB ® expression f into the TeX equivalent for use in text. I can do this with text, but I would like to use the LaTeX formatting instead. For example I can modify the font of a plot by: x = -pi:. It is possible to increase the font size using Ctrl-+, but every time a new help page is. texlabel converts Greek variable names (for example, lambda, delta, and so on) into a character vector that is displayed as Greek letters. I want to write a single command from MATLAB in LaTeX using the MatLab font. Tags: figure, font, latex, matlab, plot, sans serif, title This entry was posted on Thursday, September 6th, 2012 at 5:21 am and is filed under code. That's because LaTeX ignores many of the formatting properties supplied by MATLAB — you must set them using LaTeX functions. Some of these require special macro packages to be used—to do this, you insert an appropriate \\usepackage command just after your \\documentclass command, and before \\begin{document}. When I try to use the LaTeX mode for annotations or masks in Simulink, LaTeX symbols such as \\nabla are replaced by small box-shaped placeholders. Half of the LaTeX looks comes from the font. 31 bronze badges. MATLAB For Beginners: 20-Minute Video Training Course. The styling information is embedded in the string in the. Here is the classic Hello, world! program in C:. LaTeX normally chooses the appropriate font and font size based on the logical structure of the document (e. sh -----Error: Activation cannot proceed. 1 Scaling, rotation, clipping, wrap-around and shadows. LyX is a document processor that encourages an approach to writing based on the structure of your documents and not simply their appearance. An easy way to create your résumé for academia, it makes use of Latex and MATLAB – New input arguments font_size, blue_links and us_paper. How to use fprintf in MATLAB. What you're describing is basically the expected behavior. set the interpreter for the text command, the xlabel command, and so on, to Latex. You will need to define your fonts at the beginning of any LaTeX document. This file lets you very easy INCLUDE COLORED M-CODE in your LaTeX-file. Only the font size changes. I want to import my MATLAB plots in LaTeX. For example I can modify the font of a plot by: x = -pi:. You don't have to pay for using LaTeX, i. 'r') is interpreted by Latex. To change the font style, use LaTeX markup. Is it possible to convert the font of a matlab plot to be the same of latex fonts. LaTeX Interpreter. That does not mean that only these three sizes can be used, it is only the size of the normalsize font. Anyone who works with LaTeX knows how time-consuming it can be to find a symbol in symbols-a4. LaTeX by default recognizes \"table\" and \"figure\" floats, but you can define new ones of your own (see Custom floats below). Commented: maxime debiossac on 1 Aug 2018 Here is my problem: I would like to use a different font style for the latex interpreter, for example sans serif, which is required for figures in a scientific publication I am. A quick way to include a block of code is to use a verbatim environment. Consist of a matrix of dots or pixels. This is the second of a short series of posts on plotting in MATLAB. This could be changed to 11pt or 12pt as a option of documentclass. The mlreportgen. Great day! Welcome to a teeny tiny corner of the vast interwebs. Back to top A cell is a flexible type of variable that can hold any type of variable. Latex is a stable dispersion of polymer microparticles in an aqueous medium. '$\\frac{1}{pi}dy$') directly to the LaTeX system, and LaTeX decides what fonts get used. If you go to C:\\Program Files\\MATLAB\\R2011a\\sys\\fonts\\ttf\\cm (or wherever your MATLAB install lives) you can see the available TeX fonts. Hypertext Help with LaTeX verbatim \\begin{verbatim} text \\end{verbatim} or \\begin{verbatim*} text \\end{verbatim*} The verbatim environment is a paragraph-making environment that gets LaTeX to print exactly what you type in. DEMO DASH; On This Page. Font size, specified as a scalar value greater than zero in point units. Print data in a compact text table format or latex tabular enviroment. Inline formulas are sometimes squashed to avoid altering the height. The filename contains underscores that are interpreted as subscripts in my MATLAB 2013b. We’ll do this in 2 places. To use LaTeX markup, set the Interpreter property for the Text object to 'latex'. This is an example line with a problem. \\begin{lstlisting} %some more matlab code. Display the axes box by using a. Making a symbolic link from the MATLAB font folder to the system font folder (as described here) did not help. You can add images only in text lines. I was hoping for something like this. This document describes techniques for include computer code, e." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.85512924,"math_prob":0.52393186,"size":52191,"snap":"2020-34-2020-40","text_gpt3_token_len":11501,"char_repetition_ratio":0.14568762,"word_repetition_ratio":0.4280282,"special_character_ratio":0.21484548,"punctuation_ratio":0.11073037,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9686874,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-21T03:07:45Z\",\"WARC-Record-ID\":\"<urn:uuid:6dcfa789-4008-4591-a2d2-ec0525a9cc26>\",\"Content-Length\":\"58015\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:16a50a0d-e6b2-49ea-8433-6f1b14b12d84>\",\"WARC-Concurrent-To\":\"<urn:uuid:3c81e57a-abc7-46da-bca0-9eeb74cab206>\",\"WARC-IP-Address\":\"104.24.121.71\",\"WARC-Target-URI\":\"http://crossodromoriccia.it/idrz/matlab-font-in-latex.html\",\"WARC-Payload-Digest\":\"sha1:HMY3LKNWDOZFHQCJQ66VTH45E5M4TXJC\",\"WARC-Block-Digest\":\"sha1:Y7JGI7QYGRUQDZQW5IPPFPMZFVUGWWY7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400198887.3_warc_CC-MAIN-20200921014923-20200921044923-00621.warc.gz\"}"}
https://vincenttam.github.io/blog/2015/09/06/read-lucass-theorem/
[ "# Blog 1\n\n## Random Talk on Random Thoughts\n\nSuppose that $P(z)$ is a polynomial in the complex plane. The theorem says that all zeros of $P’(z)$ are inside a half plane in which all zeros of $P(z)$ lie.\n\nAhlfors says that a directed line $z = a + bt$ determines a right half plane consisting of all points with $\\Im(z - a) / b < 0$… (see Chap. 1, Sec. 2.3)1 After drawing the figure for the drawing the figure for $z = -(1 + i)t$, I realized that I should pay attention to the word “directed” and interpret “right” as “to the right of the vector $b$ drawn on the line $z = a + bt$”.\n\nThe following equation puzzled me for a while. (see Chap. 2, Sec. 1.3)2\n\n\\begin{equation} \\Im\\left( \\frac{z - \\alpha_k}{b} \\right) = \\Im\\left( \\frac{z - a}{b} \\right) - \\Im\\left( \\frac{\\alpha_k - a}{b} \\right) > 0 \\label{stuck} \\end{equation}\n\nI tried sketching a diagram to understand what’s going on, but this isn’t so helpful. In fact, the above equation starts from $z - \\alpha_k = (z - a) - (\\alpha_k - a)$.\n\nThe whole proof makes use of a half plane $H := \\{z \\in \\C \\mid \\Im[(z - a) / b] < 0\\}$ in which all zeros $\\alpha_1,\\ldots,\\alpha_n$ of $P(z)$ lie, and it follows the logic of proof by contradiction: each $\\alpha_k$ is assumed to be in $H$ while $z$ isn't. It ends with the conclusion that $\\Im(b P'(z) / P(z)) < 0$ by \\eqref{stuck} and the equation\n\n$\\frac{P'(z)}{P(z)} = \\sum_{k = 1}^n \\Im\\left( \\frac{1}{z - \\alpha_k} \\right).$\n\nFinally, I saw a corollary of this theorem: all zeros of $P’(z)$ are inside the smallest convex polygon in which all zeros of $P(z)$ lie.\n\n1. Ahlfors, L. (1979). Complex analysis. Auckland: McGraw-Hill.\n\n2. ibid" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9086002,"math_prob":0.9999244,"size":1267,"snap":"2023-40-2023-50","text_gpt3_token_len":396,"char_repetition_ratio":0.111638956,"word_repetition_ratio":0.049382716,"special_character_ratio":0.32596686,"punctuation_ratio":0.09489051,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000049,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T05:53:48Z\",\"WARC-Record-ID\":\"<urn:uuid:cfbc1748-d19e-4e5b-955f-f6792a4d6d6f>\",\"Content-Length\":\"23066\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f7c46f57-6f71-49f1-8879-c73002467b5f>\",\"WARC-Concurrent-To\":\"<urn:uuid:905699a5-8dd1-4731-bb39-17f079f44cc9>\",\"WARC-IP-Address\":\"185.199.108.153\",\"WARC-Target-URI\":\"https://vincenttam.github.io/blog/2015/09/06/read-lucass-theorem/\",\"WARC-Payload-Digest\":\"sha1:N2RSL4XG47L7BQH4VFF5GVH7HB7GQRDG\",\"WARC-Block-Digest\":\"sha1:FH2KKABMIRI4PWEPQ2C4PSVQULVLGEOE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506623.27_warc_CC-MAIN-20230924055210-20230924085210-00884.warc.gz\"}"}
https://www.esaral.com/q/list-all-the-elements-of-the-following-sets-83025
[ "# List all the elements of the following sets:\n\nQuestion:\n\n(i) $A=\\{x: x$ is an odd natural number $\\}$\n\n(ii) $B=\\left\\{x: x\\right.$ is an integer, $\\left.-\\frac{1}{2} (iii)$C=\\left\\{x: x\\right.$is an integer,$\\left.x^{2} \\leq 4\\right\\}$(iv)$D=\\{x: x$is a letter in the word \"LOYAL\"$\\}$(v)$E=\\{x: x$is a month of a year not having 31 days$\\}$(vi)$\\mathrm{F}=\\{x: x$is a consonant in the English alphabet which proceeds$k\\}$. Solution: (i)$A=\\{x: x$is an odd natural number$\\}=\\{1,3,5,7,9 \\ldots\\}$(ii)$\\mathrm{B}=\\left\\{x: x\\right.$is an integer;$\\left.-\\frac{1}{2}\n\nIt can be seen that $-\\frac{1}{2}=-0.5$ and $\\frac{9}{2}=4.5$\n\n$\\therefore B=\\{0,1,2,3,4\\}$\n\n(iii) $C=\\left\\{x: x\\right.$ is an integer; $\\left.x^{2} \\leq 4\\right\\}$\n\nIt can be seen that\n\n$(-1)^{2}=1 \\leq 4 ;(-2)^{2}=4 \\leq 4 ;(-3)^{2}=9>4$\n\n$0^{2}=0 \\leq 4$\n\n$1^{2}=1 \\leq 4$\n\n$2^{2}=4 \\leq 4$\n\n$3^{2}=9>4$\n\n$\\therefore C=\\{-2,-1,0,1,2\\}$\n\n(iv) $D=(x: x$ is a letter in the word \"LOYAL\" $)=\\{L, O, Y, A\\}$\n\n(v) $E=\\{x: x$ is a month of a year not having 31 days $\\}$\n\n$=\\{$ February, April, June, September, November $\\}$\n\n(vi) $F=\\{x: x$ is a consonant in the English alphabet which precedes $k\\}$\n\n$=\\{b, c, d, f, g, h, j\\}$" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6010879,"math_prob":1.0000093,"size":2017,"snap":"2023-14-2023-23","text_gpt3_token_len":939,"char_repetition_ratio":0.153999,"word_repetition_ratio":0.8840125,"special_character_ratio":0.51462567,"punctuation_ratio":0.17702448,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000095,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-21T17:05:46Z\",\"WARC-Record-ID\":\"<urn:uuid:f8fbfd97-c27d-444b-8d83-d7648b8492d1>\",\"Content-Length\":\"26898\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:62df0f88-f682-4e88-8c80-3f10c9877be2>\",\"WARC-Concurrent-To\":\"<urn:uuid:f7feac90-f77f-4da8-8d9c-bbfd63d7e1fc>\",\"WARC-IP-Address\":\"172.67.213.11\",\"WARC-Target-URI\":\"https://www.esaral.com/q/list-all-the-elements-of-the-following-sets-83025\",\"WARC-Payload-Digest\":\"sha1:POXB2RLDPQ4C5BXXK5HARGPOJEIFLY5J\",\"WARC-Block-Digest\":\"sha1:N2NRTGANI3VMQLSHCNIQURA43LIUXPTU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296943704.21_warc_CC-MAIN-20230321162614-20230321192614-00418.warc.gz\"}"}
https://www.bysocket.com/technique/java-%E5%AE%B9%E5%99%A8-%E6%B3%9B%E5%9E%8B%EF%BC%9A%E5%9B%9B%E3%80%81colletions-sort-%E5%92%8C-arrays-sort-%E7%9A%84%E7%AE%97%E6%B3%95.html
[ "# Java 容器 & 泛型:四、Colletions.sort 和 Arrays.sort 的算法\n\nWriter:BYSocket(泥沙砖瓦浆木匠)\n\n# 一、Colletions和Arrays\n\nCollentions 此类完全是服务容器的”包装器“。提供了一些操作或者返回容器的静态方法。而Arrays是用来操作数组的各种方法。其中它们的联系在于其中的Sort方法,也就是这次博客的主题。\n\n# 二、插入,快速、归并基本算法\n\n① 插入排序\n\n{a1},{a2,a3,a4,…,an}}\n\n{{a1⑴,a2⑴},{a3⑴,a4⑴ …,an⑴}}\n\n{{a1(n-1),a2(n-1) ,…},{an(n-1)}}\n\n```import java.util.Arrays;\n\npublic class InsertionSort\n{\npublic static void main(String[] args)\n{\nint[] intA = new int[]{2,1,3,4,6,7,5};\nSystem.out.println(Arrays.toString(intA));\ninsertionSort(intA);\nSystem.out.println(Arrays.toString(intA));\n}\n\npublic static void insertionSort(int[] a)\n{\nint p,right;\nint temp;\nfor (p = 0; p < a.length; p++)\n{\ntemp = a[p];\n/**\n* 将a[p]值往左侧有序列比较,插入。\n*/\nfor (right = p; right > 0 && a[right-1] > temp ; right--)\na[right] = a[right-1];// 置换\na[right] = temp;\n}\n}\n}\n```\n\n```[2, 1, 3, 4, 6, 7, 5]\n[1, 2, 3, 4, 5, 6, 7]```\n\n② 快速排序", null, "```package javaBasic.algorithm;\n\nimport java.util.Arrays;\n\npublic class QuickSort\n{\npublic static void main(String[] args)\n{\nint[] intA = new int[]{2,1,3,4,6,7,5};\nSystem.out.println(Arrays.toString(intA));\n//middleSort(intA, 0, intA.length - 1);\n//System.out.println(Arrays.toString(intA));\nsort(intA, 0, intA.length - 1);\nSystem.out.println(Arrays.toString(intA));\n}\n\n// 快速排序中的一个划分过程\npublic static int middleSort(int a[] , int left , int right)\n{\nint temp = a[left];\t// 作为中间轴数\nwhile( left < right)\n{\n/**\n* 从右到左,找到第一个比中间轴数小的,移到左端\n*/\nwhile( left < right && a[right] > temp )\nright--;\na[left] = a[right];\n\n/**\n* 从左到右,找到第一个比中间轴数大的,移到右端\n*/\nwhile( left < right && a[left] < temp)\nleft++;\na[right] = a[left];\n}\n\n/**\n* 将中间轴数赋值\n*/\na[left] = temp;\nreturn left;\n}\n\n// 快速排序\npublic static void sort(int[] a , int left, int right)\n{\nif (left < right)\n{\n/**\n* 根据左右索引相同才停止。\n* 不同的话,按着分治思想。\n* 找到中间轴数,一分为二,以此类推。\n*/\nint middle = middleSort(a, left, right);\nsort(a, left, middle - 1);\nsort(a, middle + 1, right);\n}\n}\n\n}\n```\n\n③ 归并排序", null, "```package javaBasic.algorithm;\n\nimport java.util.Arrays;\n\npublic class MergeSort\n{\npublic static void main(String[] args)\n{\nint[] intA = new int[]{10,4,6,3,8,2,5,7};\nSystem.out.println(Arrays.toString(intA));\nmergeSort(intA,0,intA.length-1);\nSystem.out.println(Arrays.toString(intA));\n}\n\npublic static void mergeSort(int[] a, int left ,int right)\n{\nif (left < right)\n{\nint middle = (left + right) / 2; // 中间索引\n\nmergeSort(a, left, middle);\t// 对左侧数组递归\nmergeSort(a, middle+1, right); // 对右侧数组递归\n\nmerge(a,left,middle,right); // 归并算法\n}\n}\n\nprivate static void merge(int[] a, int left, int middle, int right)\n{\nint [] tmpArr = new int[a.length];\n\nint mid = middle+1;\nint tmpArrLeft = left;// 记录左侧数组的索引\nint tmpLeft = left;\n\n/**\n* 从两个数组中取出小的一部分复制\n*/\nwhile (left <= middle && mid <= right)\n{\nif (a[left] <= a[mid])\ntmpArr[tmpArrLeft++] = a[left++];\nelse\ntmpArr[tmpArrLeft++] = a[mid++];\n}\n\n/**\n* 剩余部分右侧复制\n*/\nwhile (mid <= right)\n{\ntmpArr[tmpArrLeft++] = a[mid++];\n}\n\n/**\n* 剩余部分左侧复制\n*/\nwhile (left <= middle)\n{\ntmpArr[tmpArrLeft++] = a[left++];\n}\n\n/**\n* 分了再合\n*/\nwhile(tmpLeft <= right)\n{\na[tmpLeft] = tmpArr[tmpLeft++];\n}\n}\n\n}```\n\n```[10, 4, 6, 3, 8, 2, 5, 7]\n[2, 3, 4, 5, 6, 7, 8, 10]\n```\n\n# 三、JDK数则\n\n```5. JDK7/8中排序算法的改进\n\nColletions.sort(list) 与 Arrays.sort(T[])\nColletions.sort()实际会将list转为数组,然后调用Arrays.sort(),排完了再转回List。\n\nJDK7的进步\n\nJDK8的进步\n\nJDK团队的努力,从一些简单的New Features / Change List 根本看不到,所以没事升级一下JDK还是好的```\n\n```/**\n* If the length of an array to be sorted is less than this\n* constant, Quicksort is used in preference to merge sort.\n* 当数组长度小于286,为什么快速排序比归并排序好?\n*/\nprivate static final int QUICKSORT_THRESHOLD = 286;\n\n/**\n* If the length of an array to be sorted is less than this\n* constant, insertion sort is used in preference to Quicksort.\n* 当数组长度小于47,为什么插入排序比快速排序好?\n*/\nprivate static final int INSERTION_SORT_THRESHOLD = 47;\n```\n\nJDK排序顺序图如下:", null, "Writer:BYSocket(泥沙砖瓦浆木匠)" ]
[ null, "http://www.bysocket.com/wp-content/uploads/2015/04/QQ20150414181507_thumb.gif", null, "http://www.bysocket.com/wp-content/uploads/2015/04/c8177f3e6709c93d673b9ed49d3df8dcd0001_thumb.jpg", null, "http://www.bysocket.com/wp-content/uploads/2015/04/1_thumb.png", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.6087066,"math_prob":0.9951344,"size":4789,"snap":"2021-04-2021-17","text_gpt3_token_len":2565,"char_repetition_ratio":0.11974922,"word_repetition_ratio":0.1412844,"special_character_ratio":0.30883273,"punctuation_ratio":0.21015349,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97880346,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,5,null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-23T02:36:10Z\",\"WARC-Record-ID\":\"<urn:uuid:02abe48c-0bc7-4913-b2da-b4c15513f2a1>\",\"Content-Length\":\"39674\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9122cb20-b749-4c2e-a56b-459bdfe4c408>\",\"WARC-Concurrent-To\":\"<urn:uuid:c7adaa36-5f17-4869-81f1-03551bb28ce9>\",\"WARC-IP-Address\":\"49.235.151.132\",\"WARC-Target-URI\":\"https://www.bysocket.com/technique/java-%E5%AE%B9%E5%99%A8-%E6%B3%9B%E5%9E%8B%EF%BC%9A%E5%9B%9B%E3%80%81colletions-sort-%E5%92%8C-arrays-sort-%E7%9A%84%E7%AE%97%E6%B3%95.html\",\"WARC-Payload-Digest\":\"sha1:A6XDAKQKYFQMVQ27RWD7ZRICK453LT3V\",\"WARC-Block-Digest\":\"sha1:JAXEZOEMRRQMNVYULVIOEUHO3IL3SWLR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618039626288.96_warc_CC-MAIN-20210423011010-20210423041010-00007.warc.gz\"}"}
https://www.mdpi.com/2076-3417/9/1/126/htm
[ "Next Article in Journal\nStability and Heat Input Controllability of Two Different Modulations for Double-Pulse MIG Welding\nNext Article in Special Issue\nAnalysis and Impact Evaluation of Missing Data Imputation in Day-ahead PV Generation Forecasting\n\nAppl. Sci. 2019, 9(1), 126; https://doi.org/10.3390/app9010126\n\nArticle\nDirect Multistep Wind Speed Forecasting Using LSTM Neural Network Combining EEMD and Fuzzy Entropy\nby", null, "Qiong Qin 1", null, ",", null, "Xu Lai 1,* and", null, "Jin Zou 2\n1\nState Key Laboratory of Water Resources and Hydropower Engineering Science, Wuhan University, Wuhan 430072, Hubei, China\n2\nElectric Power Research Institute, China Southern Power Grid, Guangzhou 510080, Guangdong, China\n*\nAuthor to whom correspondence should be addressed.\nReceived: 28 November 2018 / Accepted: 19 December 2018 / Published: 1 January 2019\n\nAbstract\n\n:\nAccurate wind speed forecasting is of great significance for a reliable and secure power generation system. In order to improve forecasting accuracy, this paper introduces the LSTM neural network and proposes a wind speed statistical forecasting method based on the EEMD-FuzzyEn-LSTMNN model. Moreover, the MIC is used to analyze the autocorrelation of wind speed series, and the predictable time of wind speed statistical forecasting method for direct multistep forecasting is taken as four hours. In the EEMD-FuzzyEn-LSTMNN model, the original wind speed series is firstly decomposed into a series of components by using EEMD. Then, the FuzzyEn is used to calculate the complexity of each component, and the components with similar FuzzyEn values are classified into one group. Finally, the LSTMNN model is used to forecast each subsequence after classification. The forecasting result of the original wind speed series is obtained by aggregating the forecasting result of each subsequence. Three forecasting cases under different terrain conditions were selected to validate the proposed model, and the BPNN model, the SVM model and the LSTMNN model were used for comparison. The experimental results show that the forecasting accuracy of the EEMD-FuzzyEn-LSTMNN model is much higher than that of the other three models.\nKeywords:\nwind speed forecasting; long short-term memory; neural network; ensemble empirical mode decomposition; fuzzy entropy; maximal information coefficient; autocorrelation\n\n1. Introduction\n\nWith the large consumption of fossil energy and the impact of global climate change, increasing attention has turned to renewable energy. As a kind of clean and renewable energy, wind power has been widely valued and promoted in the world. According to the World Wind Energy Association statistics, the total cumulative installed capacity from wind power around the world was approximately 539 GW by the end of 2017. However, with the expansion of wind power generation, its problems have gradually become more prominent. Due to the randomness, fluctuation and intermittence nature of wind speed, the wind power output has great uncertainty [1,2]. Therefore, large-scale wind power integration will bring great hidden dangers to the safe and stable operation of the power system. In order to solve the above problems, it is necessary to effectively improve the controllability and predictability of wind power. Accurate wind power forecasting can provide an important basis for power dispatching and improve the utilization efficiency of wind energy resources. Since wind power has a direct relationship with wind speed, wind power forecasting can be achieved based on wind speed forecasting.\nThe accuracy of wind speed forecasting is not only dependent on the forecasting method but also on the forecasting time horizon. In general, there are two main categories for wind speed forecasting based on the forecasting time horizon, namely, short-term forecast (time horizon of minutes, hours, and days) and long-term forecast (time horizon of days, weeks and months) . The short-term forecast is important for the operation of wind turbines so that dynamic controls can be accomplished to increase the energy conversion efficiency and reduce the risk of overloading. The long-term forecast can provide important references for site location and planning of wind farms.\nIn recent years, researchers have done many studies on the theory and methods of wind speed forecasting. According to the type of input variables of the forecasting model, the wind speed forecasting methods can be divided into physical forecasting methods, statistical forecasting methods and hybrid forecasting methods . The input variables of the physical models are meteorological data from numerical weather prediction (NWP) and terrain feature data. Many physical models have been introduced, and the most popular three are Prediktor , LocalPred and Previento . Generally, physical methods have advantages in long-term forecast, while statistical methods have better performance in short-term forecast .\nThe input variables of the statistical models are long-term historical wind speed data. The statistical models achieve the forecasting of wind speed in the future by excavating the hidden change rules in historical wind speed data. Early statistical models include the autoregressive model (AR) , the autoregressive moving average model (ARMA) , the grey prediction model (GM) , etc. With the development of artificial intelligence techniques, support vector machines (SVM) and a large number of artificial neural network (ANN) algorithms have been introduced into wind speed forecasting. For example, Mohandes et al. introduced SVM to wind speed prediction and compared its performance with the multilayer perceptron (MLP) neural networks. Cadenas et al. used the ANN to forecast the wind speed in the region of La Venta, Oaxaca, Mexico, and the results showed very good accuracy for the short-term wind speed forecasting. Flores et al. used back propagation neural network (BPNN) to forecast the wind speed. Li et al. compared three different ANNs (adaptive linear element NN, BPNN, and radial basis function NN) in one-hour ahead wind speed forecasting, and the results showed that even for the same wind dataset, the choice of best-performing model might not be the same with different evaluation metrics.\nHybrid forecasting methods are formed by hybridizing physical methods and statistical methods together. In the hybrid methods, NWP data is also used as the input data of the statistical models. Salcedo-Sanz et al. used the output of the fifth generation mesoscale model (MM5 model) as the input variables of the ANN, and the experiment results showed that the hybrid MM5-neural network approach was able to obtain good short-term predictions of wind speed at specific points. Ortiz-García et al. then made improvements to the system proposed in Ref. , and used regression SVM instead of ANN to obtain the final prediction. Giorgi et al. trained the ANNs based on the measured wind speed series and on some NWP parameters, and an improvement of the performance had been reached, especially with the longer time horizons.\nHowever, the wind speed series has multiscale characteristics. The multiple frequency components existed in the wind speed series are always the challenging parts in forecasting. Currently, the concept of “decomposition and ensemble” (or “divide and conquer”) [18,19] has been used to solve this problem, and a number of various decomposition-ensemble based hybrid models have been developed and widely used. For instance, Liu et al. selected wavelet decomposition (WD) and wavelet packet decomposition (WPD) to decompose an original wind speed series respectively, and then used the ANN models to do the multistep forecasting in each subseries. Guo et al. combined empirical mode decomposition (EMD) and standard feed-forward neural network (FNN), and Liu et al. combined EMD and ANN. The new hybrid model all outperformed the conventional FNN or ANN model. But the WD is sensitive to the wavelet base function and decomposition level, and for the EMD, one major challenge is the frequent appearance of mode mixing . Fortunately, there exists an improved method named ensemble empirical mode decomposition (EEMD), which makes up for the deficiency of EMD. The EEMD is an empirical, intuitive, direct and self-adaptive data processing method created especially for nonlinear and nonstationary signal sequences . For example, Wang et al. proposed a wind speed forecasting method based on EEMD and optimized BPNN (GA-BPNN) for short-term wind speed forecasting, and computational results had shown the good performance of EEMD.\nIn this study, we mainly focus on the wind speed statistical forecasting methods for short-term forecast. The first step is to determine the specific forecasting time horizon. When using statistical methods for direct multistep forecasting of wind speed series, in general, the longer the forecasting length, the lower the forecasting accuracy. Therefore, it is necessary to determine the predictable length of direct multistep forecasting. In this paper, the autocorrelation analysis method based on the maximal information coefficient (MIC) is introduced to measure the predictability of wind speed series. Then, the predictable time of statistical forecasting methods based on historical wind speed data is analyzed. The next step is to choose the wind speed statistical forecasting method. When the ordinary neural networks mentioned above process the wind speed series, the reading and processing of the input wind speed data are independent at each moment. These neural networks cannot fully consider the correlation of the wind speed series itself. When forecasting the wind speed at the next moment, they are unable to share the features learned from the previous input wind speed data. Therefore, the forecasting accuracy of these neural network models is limited. In order to make full use of the correlation between the data of wind speed series at each moment, this paper introduces a new long short-term memory neural network (LSTMNN) model for wind speed forecasting. The LSTMNN has a unique memory and forgetting mode. It can handle the long-term dependence of wind speed series very well, and effectively use the historical input information of the wind speed series. The LSTMNN has been widely used in many fields such as traffic forecasting , solar energy forecasting , stock price volatility prediction and water table depth prediction . These predictions all get good results .\nIn order to improve the forecasting accuracy of the LSTMNN model, this paper proposes a novel wind speed statistical forecasting method based on the EEMD-FuzzyEn-LSTMNN model. The EEMD-FuzzyEn-LSTMNN model is developed through combining EEMD, Fuzzy Entropy (FuzzyEn) and LSTMNN. In the proposed model, the original wind speed series is firstly decomposed into a series of components by using EEMD. Then, the FuzzyEn is introduced to calculate the complexity of each component, and the components are classified according to the calculated FuzzyEn values. The components with similar FuzzyEn values are classified into one group, and the components of each group are superimposed to obtain a new subsequence. This process can avoid cumbersome calculations caused by forecasting each component separately. Finally, the LSTMNN model is used to forecast each subsequence after classification. The forecasting result of the original wind speed series is obtained by aggregating the forecasting result of each subsequence.\nThe remainder of this paper is organized as follows: Section 2 briefly describes the fundamental methods including EEMD, FuzzyEn and LSTMNN. Section 3 introduces the proposed EEMD-FuzzyEn-LSTMNN model. Section 4 uses MIC to analyze the predictable time of statistical forecasting methods for direct multistep forecasting. Section 5 firstly describes the wind speed data of three cases and selects error evaluation indexes, and then provides the forecasting results of the BPNN model, the SVM model, the LSTMNN model and the proposed EEMD-FuzzyEn-LSTMNN model. Finally, Section 6 gives the conclusions and discusses the future work.\n\n2. Methodology\n\nThe research methodology used in this study includes EMD, EEMD, FuzzyEn, RNN and LSTMNN. The brief description of those methods is stated as follows.\n\n2.1. EMD and EEMD\n\nEMD was proposed by Huang in 1998 . It is a self-adaptive and efficient method for analyzing nonlinear and nonstationary signals. Since the wind speed series is nonlinear and nonstationary, EMD is efficient to analyze the wind speed signal. The basic idea of EMD is to smooth the fluctuating signals adaptively and to decompose them into fluctuations or trends of different scales. After decomposition, a finite and small number of intrinsic mode functions (IMFs) and a residual component are obtained. An IMF is a function that satisfies the following two conditions: (a) in the whole data set, the number of extrema and the number of zero crossings must either be equal or differ at most by one; and (b) at any point, the average of the envelopes defined by the local maxima and the local minima must be zero . The specific steps for decomposing time series by using the EMD algorithm are detailed in Ref. .\nMode mixing is the most significant drawback of EMD , which means that a single IMF consists of signals with dramatically disparate scales or a signal of the same scale appears in different IMF components. The mode mixing compromises the stationarity of IMFs and therefore limits the effectiveness of the EMD algorithm. To solve the mode mixing problem in EMD, a new noise-assisted data analysis method EEMD is proposed. In EEMD, the white Gaussian noise is added into the original time series, and the EMD is then applied on noise added time series to obtain IMFs that are free from mode mixing [32,33]. However, the resulting IMFs include white noise, which is then removed by obtaining the mean of multiple trials. Therefore, the true IMF components are defined as the mean of an ensemble of trails and each trail consists of the decomposition results of the signal plus a white Gaussian noise of finite amplitude .\nFor the wind speed series {v(t), t = 1, 2, …, N}, the main steps of the EEMD algorithm are described as follows:\n• Step 1: Add the white Gaussian noise series εj(t) to the original wind speed series v(t) and obtain a new series Vj(t).\n• Step 2: Decompose the new series Vj(t) into several IMFs and a residue by using the EMD algorithm.\n• Step 3: For j = 1, 2, …, NE, repeat Step 1 and Step 2, and add different white Gaussian noise series each time. NE is the number of repeated procedures.\n• Step 4: Take the mean of all IMF components and the mean of residual components as the final results.\nAfter the decomposition by using EEMD algorithm, the wind speed series {v(t)} can be expressed as:\n$v ( t ) = ∑ i = 1 n c i ( t ) + r n ( t )$\nwhere {ci(t), I = 1, 2, …, n} represents the different IMF component, and rn(t) is the residue after n IMFs are derived. These IMFs contain components of different time characteristic scales of the wind speed series. Their scales range from small to large, and the frequencies range from high to low.\n\n2.2. Fuzzy Entropy\n\nUsing the EEMD algorithm to decompose the wind speed series, a series of components are obtained. If a forecasting model is built separately for each component, the process is slightly redundant. Moreover, when superimposing the forecasting results of all components, the forecasting errors of each component are also superimposed. In order to reduce the calculation scale and the accumulation of forecasting errors, the components obtained by EEMD can be classified according to certain criteria. Then, the components under each category are superimposed to form a new subsequence, and each subsequence is forecasted separately. The forecasting result of the original wind speed series can be obtained by superimposing the forecasting result of each subsequence.\nFuzzyEn is a metric of the complexity of time series [34,35,36]. It measures the complexity of the series by the probability that the time series produces a new pattern as the embedding dimension changes. The larger the FuzzyEn value, the greater the probability that the sequence will produce a new pattern, which means the sequence is more complex. Each IMF and the residue obtained by EEMD contain components of the wind speed series at different time characteristic scales. Their frequencies are different, so the complexity of each component is also considered to be different. In this paper, FuzzyEn is introduced to calculate the complexity of all components, and then the components are classified according to the obtained FuzzyEn value. For the components with similar FuzzyEn values, they can be considered to have similar complexity and wind speed characteristics, so they can be classified into one group.\nThe specific steps for calculating the FuzzyEn of time series are detailed in Ref. .\n\n2.3. RNN and LSTMNN\n\nLSTMNN is developed on the basis of Recurrent Neuron Network (RNN). Unlike ordinary neural networks, RNN adds a self-connected hidden layer spanning time steps. Therefore, RNN can memorize the input information in front of the time series and apply it to the calculation of the current output.\nA simple RNN consists of three layers: an input layer, a hidden layer and an output layer. Given m as the number of forecasting steps of direct multistep forecasting, the structure diagram of the RNN forecasting model for wind speed series is shown in Figure 1. In this figure, {vi, i = 1, 2, …, t} is the measured input wind speed; {Vi+m, i = 1, 2, …, t} is the forecasted output wind speed; ai is the activation value from time-step i; Wav, Wva and Waa are the connection weights between neurons, which are the same at each time step.\nIn the RNN model, the hidden layers of the front and back time steps are connected. It can make full use of the information of the wind speed series before the forecasted time, thereby improving the forecasting accuracy. However, the RNN model may have the vanishing gradient problem during the training process . The LSTMNN proposed by Hochreiter and Schmidhuber can solve this problem of the RNN model through its special structural design. Moreover, the LSTMNN can better handle the long-term dependence of time series and effectively utilize the historical input information of time series.\nThe basic LSTMNN also consists of three layers: an input layer, a hidden layer and an output layer. But compared with the RNN, the hidden layer of the LSTMNN adds some threshold units for controlling information transfer, which makes the neural network have a unique memory mode [38,39]. The structures of the RNN forecasting model and the LSTMNN forecasting model at the time-step i are shown in Figure 2.\nIn the forward propagation process of the LSTMNN forecasting model, besides the activation value ai, a memory cell ci is transferred from the previous hidden layer to the latter. In addition, three gate structures are added to the hidden layer in LSTMNN, namely forget gate, update gate, and output gate. The three gate structures can control the preservation, reading and modification of the memory cell in the LSTMNN forecasting model.\nIn the forward propagation process of the LSTMNN forecasting model, the forecasted output wind speed of the time-step i is calculated as follows:\n$c ˜ i = tanh ( W c a · a i − 1 + W c v · v i + b c )$\n$f i = σ ( W f a · a i − 1 + W f v · v i + b f )$\n$u i = σ ( W u a · a i − 1 + W u v · v i + b u )$\n$o i = σ ( W o a · a i − 1 + W o v · v i + b o )$\n$c i = f i c i − 1 + u i c ˜ i$\n$a i = o i tanh c i$\n$V i + m = σ ( W v a · a i + b v )$\nwhere the subscript i represents the time-step i; $c ˜ i$ is the candidate for replacing the memory cell; ci is the memory cell; fi, ui and oi are the values of forget gate, update gate and output gate, respectively; σ is the sigmoid function; Wca, Wcv, Wfa, Wfv, Wua, Wuv, Woa, Wov, Wva are weight matrices; bc, bf, bu, bo, bv are bias vectors.\nAfter the forward propagation process of the LSTMNN forecasting model is completed, the back propagation process is followed. The model is firstly expanded into a deep network in chronological order. Then, the BPTT algorithm and chain rule are used to iteratively update the connection weights and thresholds in the model until the optimal solution is obtained.\n\n3. The EEMD-FuzzyEn-LSTMNN Model\n\nIn this section, the EEMD-FuzzyEn-LSTMNN model is established for wind speed forecasting based on the concept of “decomposition and ensemble”. The flowchart of the proposed model is shown in Figure 3. The main structure of the EEMD-FuzzyEn-LSTMNN model includes the following four steps:\n• Step 1: Use EEMD to decompose the original wind speed series into a number of IFM components and a residual component. These components are respectively denoted by IMF1, IMF2, …, IMFn and Rn.\n• Step 2: Calculate the FuzzyEn of each component and classify all components according to the calculated FuzzyEn values. The components with similar FuzzyEn values are classified into one group, and the components in one group are superimposed to obtain a new subsequence. All subsequences are respectively denoted by S1, S2, …, SN.\n• Step 3: Use the LSTMNN model to forecast each subsequence separately.\n• Step 4: Aggregate the forecasting result of each subsequence to obtain the ultimate forecasting series of wind speed.\n\n4. The Predictable Time of Wind Speed Series\n\nThe MIC is a statistic that measures the correlation between two variables . Based on mutual information, the MIC can measure both the linear correlation and the nonlinear correlation between two variables. It has generality and equitability. The calculation method of MIC is detailed in . Since the wind speed series is a well-known nonlinear time series, the MIC with many excellent characteristics can be used to measure its autocorrelation. In this section, we use MIC to measure the predictable time of statistical forecasting methods based on historical wind speed data.\n\n4.1. Selection of Wind Speed Series\n\nIn this paper, we selected wind speed series from three anemometer towers in China. The three anemometer towers are in three wind farms which are located in Hunan province, Henan province and Zhejiang province, respectively. The location, local terrain condition, selected time and measurement height of the three anemometer towers are shown in Table 1. These wind speed series were used to analyze the predictability of direct multistep forecasting. On the three anemometer towers, the calibrated NRG measuring instruments were used to automatically record the wind speed data, and the recorded time interval was 10 min. After processing the missing and invalid data of the anemometer towers, the integrity rate of the wind speed data can reach 100%. And these wind speed data have passed the reasonableness test.\n\n4.2. Autocorrelation Analysis of Wind Speed Series Based on MIC\n\nThe MIC was used to measure the autocorrelation of the selected wind speed series. There are 36 months of wind speed series. Taking a month’s wind speed series {v(t), t = 1, 2, …, N} as an example, the MIC of {v(t), t = 1, 2, …, N} and {v(t), t = 1, 2, …, N} was firstly calculated. Then, the MIC of {v(t), t = 1, 2, …, N − 1} and {v(t), t = 2, 3, …, N} was calculated. Continuing this step until the MIC of {v(t), t = 1, 2, …, Nτ} and {v(t), t = τ + 1, τ + 2, …, N} was calculated. In the above example, N represents the number of wind speed data; τ represents the number of delay time (unit is 10 min) and this paper took τ as 300. After calculating the auto-correlated MIC of all wind speed series, the variation law of the MIC with the delay time is shown in Figure 4.\nIt can be seen from Figure 4 that as the delay time increases, the auto-correlated MIC of the wind speed series gradually decreases and finally reaches a steady trend. With the decrease of MIC, the correlation between future and historical wind speed series also decreases. At this time, the forecasting error will gradually increase when forecasting the future wind speed based on the historical wind speed. Therefore, in order to ensure the forecasting accuracy of the direct multistep forecasting, a fixed MIC value can be determined, and the delay time corresponding to the MIC value can be used as the predictable time of the wind speed series. According to the calculation results of the three anemometer towers in Figure 4, the variation law of MIC with delay time tends to be gentle when the MIC drops to 0.2. Therefore, we can take the corresponding delay time (or correlation length) as the predictable time of the wind speed series when the MIC is equal to 0.2. The calculation results are shown in Table 2.\n\n4.3. Analysis of Predictable Time\n\nBecause the selected wind speed series in different regions are different, the correlation length of each month’s wind speed series obtained by taking MIC equal to 0.2 is also different. Therefore, this paper compared the influence of different correlation lengths on wind speed forecasting error to obtain a more general wind speed predictable length.\nIn this paper, the basic time series forecasting method, Persistence Model , was used to forecast the corresponding correlation length of each month’s wind speed series. Assuming that the wind speed series of a certain month is {v(t), t = 1, 2,…, N}, and the correlation length obtained when the MIC equals 0.2 is denoted by l (unit is h). Since the recorded time interval of the three anemometer towers is 10 min, the number of wind speed data with a correlation length of l is 6l. The wind speed series was segmented according to 6l, and then the wind speed of the previous period was used to forecast the wind speed of the next period. That is to say, {v(t), t = 1, 2, …, 6l} was used to forecast {v(t), t = 6l + 1, 6l + 2, …, 2 × 6l}; {v(t), t = 6l + 1, 6l + 2,…, 2 × 6l} was used to forecast {v(t), t = 2 × 6l + 1, 2 × 6l + 2,…, 3 × 6l} and so on until the end of the series.\nAfter using the persistence model to forecast the 36 wind speed series in different regions, the errors between the measured and forecasted wind speed of each month were counted. Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE) were used as the error evaluation index. The formulas for calculating MAE and RMSE are as follows:\n$M A E = 1 N ∑ i = 1 N | v i − v p i |$\n$R M S E = 1 N ∑ i = 1 N ( v i − v p i ) 2$\nwhere N is the number of forecasted wind speed data; vi is the measured wind speed, m/s; vpi is the forecasted wind speed, m/s.\nThe variation law of MAE and RMSE with the correlation length is shown in Figure 5. As the correlation length of the wind speed series increases, the forecasting error tends to increase overall. However, when the correlation length is less than four hours, the forecasting error is small and stable, and the fluctuation range is small. Therefore, four hours can be used as the predictable time of the wind speed series for direct multistep forecasting based on historical wind speed data. The forecasting time of the wind speed series in the following section was taken as four hours.\n\n5. Case Study\n\nThe three forecasting cases of wind speed series selected in this paper are from three anemometer towers in mountainous area, plain area and coastal area, respectively. Then the EEMD-FuzzyEn-LSTMNN model was established to forecast the wind speed series for the future four hours. Furthermore, the applicability and effectiveness of the EEMD-FuzzyEn-LSTMNN model were verified by comparing with the BPNN model, SVM model and LSTMNN model.\n\n5.1. Wind Speed Data Description of the Cases\n\nThe wind speed data selected in Case A, Case B and Case C is the wind speed series from October to December of the anemometer tower 1, 2 and 3 respectively. The detailed information of the three anemometer towers is shown in Table 1.\nThe direct multistep forecasting time of the wind speed series was taken as four hours according to the conclusion of Section 4. In each case, 864 wind speed data from 6 days in December were randomly selected as the test set of the forecasting model, and the wind speed data from the previous two months were used as the training set of the forecasting model. Taking the wind speed series {v(t), t = 1, 2, …, N} of a certain case as an example, the training and test set of the forecasting model are illustrated as follows. The training set is {v(t), t = 1, 2, …, N − 864 − 24}, in which {v(t), t = 1,2, …, N − 864 − 24 × 2} is the training input sample and {v(t), t = 24 + 1, 24 + 2, …, N − 864 − 24} is the training output sample. Similarly, the test set is {v(t), t = N − 864 – 24 + 1, N − 864 – 24 + 2,…, N}, in which {v(t), t = N − 864 – 24 + 1, N − 864 – 24 + 2, …, N − 24} is the test input sample and {v(t), t = N – 864 + 1, N – 864 + 2, …, N} is the test output sample.\n\n5.2. Error Evaluation Index\n\nThe selection of evaluation indexes has an important impact on the assessment of wind speed forecasting methods. The evaluation indexes selected in this paper are MAE, RMSE and Mean Absolute Percentage Error (MAPE). The calculation formulas of MAE and RMSE are given by Formulas (9) and (10), and the formula for MAPE is as follows:\n$M A P E = 1 N ∑ i = 1 N | v i − v p i | v i$\n\n5.3. Parameter Settings of the BPNN Model, the SVM Model and the LSTMNN Model\n\nWhen the BPNN model, the SVM model and the LSTMNN model were used to forecast the wind speed series in the cases, a series of parameter settings for the models are shown in Table 3. In addition to the parameters specified in the table, the default values given by the corresponding software toolbox were used for other parameters. The wind speed data should be normalized before being input into the forecasting model. The normalization function used in this paper is the mapminmax function, which normalizes the wind speed series to [−1, 1].\n\n5.4. Decomposition Results by EEMD\n\nIn order to improve the overall forecasting performance, this paper firstly adopted EEMD to decompose the original wind speed series of the three cases separately, and the decomposition results are listed in Figure 6. It is obvious that each wind speed series is decomposed into 13 components which are respectively denoted by IMF1, IMF2, …, IMF12 and R from top to bottom.\n\n5.5. Classification of Components Based on FuzzyEn\n\nThe original wind speed series of the three cases are all decomposed into 13 components by EEMD. Then, the FuzzyEn values of each component were calculated respectively, and the results are shown in Figure 7.\nIn the three cases, the FuzzyEn values of the 1st component to the 13th component gradually decrease firstly, and then become smooth. The FuzzyEn of the high-frequency component is large, which means it is more complicated. On the contrary, the FuzzyEn of the low-frequency component is small, indicating that its complexity is small. The components with similar FuzzyEn values can be classified into one group. In Figure 7, the FuzzyEn values of the components at the front descending curve segment are quite different, so each component can be regarded as a subsequence. The FuzzyEn values of the 7th component to 13th component at the final stationary curve segment are almost the same, so they can be grouped together and superimposed to form a new subsequence. After the classification was completed, 7 subsequences were finally obtained.\n\n5.6. Forecasting Results and Analysis\n\nThe BPNN model, the SVM model, the LSTMNN model and the EEMD-FuzzyEn-LSTM model were used to forecast the 864 wind speed data randomly selected from the three cases. The forecasting results are shown in Figure 8 and the forecasting error is shown in Figure 9.\nAs is shown in Figure 8; Figure 9, the forecasting effect of the BPNN model is similar to that of the SVM model, and the forecasting effect of the LSTMNN model is slightly better than that of the BPNN model and the SVM model for wind speed series in different regions. However, the forecasting effect of the EEMD-FuzzyEn-LSTMNN model is greatly improved compared with the LSTMNN model, and the forecasting error is obviously reduced.\nThe subsequences are forecasted separately in the EEMD-FuzzyEn-LSTMNN model, and the fluctuation of wind speed forecasting results obtained by the superposition is smoother. By analyzing each subsequence, it was found that the first few high-frequency subsequences have strong randomness and their regularity is very low. MIC was used to analyze the autocorrelation of the first three high-frequency subsequences, and the variation law of MIC with delay time is shown in Figure 10. As the delay time increases, the MIC of autocorrelation decreases rapidly. In the forecasting of wind speed series for the future four hours (24 × 10 min), the autocorrelation of these high-frequency subsequences is poor, which leads to large forecasting errors. When the forecasting results of all subsequences are superimposed, the high-frequency part of the wind speed series is weakened due to the low forecasting accuracy, which results in more gentle fluctuation of the forecasting results.\nThe error evaluation indexes of the four forecasting models are calculated and presented in Table 4. In the table, the evaluation indexes of the EEMD-FuzzyEn-LSTMNN model are the best and its forecasting accuracy is the highest.\nComparing the LSTMNN model with the BPNN model, the MAE, MAPE and RMSE of the three cases are reduced by 0.01–0.04 m/s (1–3%), 0.004–0.01 (1–3%), 0.02–0.03 m/s (1–2%), respectively. In the case study of this paper, the default values given by the toolbox were used for most parameters of the LSTMNN model, which may lead to a small increase in the evaluation indexes. Since the training process of the LSTMNN involves the adjustment of many parameters, the forecasting accuracy of this model will be further improved after systematic parameter optimization. Comparing the EEMD-FuzzyEn-LSTMNN model with the LSTMNN model, the error evaluation indexes are greatly improved. The MAE, MAPE and RMSE of the Case A are reduced by 0.4413 m/s (29.18%), 0.11 (29.7%), 0.6014 m/s (30.04%), respectively. The MAE, MAPE and RMSE of the Case B are reduced by 0.2773 m/s (19.74%), 0.1051 (21.74%), 0.3076m/s (16.81%), respectively. The MAE, MAPE and RMSE of the Case C are reduced by 0.3397m/s (26.99%), 0.0882 (26.27%), 0.4009m/s (25.66%), respectively. The values in the parentheses above are all relative values.\nIn addition, compared with the anemometer towers in other areas (Case B and Case C), the forecasting accuracy of the mountainous anemometer tower (Case A) is improved more greatly. Therefore, the EEMD-FuzzyEn-LSTMNN model is more advantageous for forecasting the wind speed series which has large forecasting errors by using ordinary neural networks.\n\n6. Conclusions\n\nThis paper first introduces the LSTM neural network for the forecasting of wind speed series. Then, in order to further improve the forecasting accuracy, a wind speed statistical forecasting method based on the EEMD-FuzzyEn-LSTMNN model is proposed. And the autocorrelation analysis based on the MIC is used to obtain the predictable time of wind speed series for direct multistep forecasting. The main conclusions of this paper are as follows:\n• MIC is used to analyze the autocorrelation of wind speed series from different terrain conditions, and some suitable correlation lengths are obtained. As the correlation length of the wind speed series increases, the forecasting error tends to increase overall. The forecasting error analysis shows that four hours can be taken as the predictable time of the wind speed series for direct multistep forecasting based on historical wind speed data.\n• The wind speed series from different terrain conditions is forecasted for the future four hours, and the forecasting accuracy of the LSTMNN model is slightly higher than that of the BPNN model and the SVM model. It shows that the LSTM neural network can make better use of the historical input information of the wind speed series, and it is more suitable for the wind speed statistical forecasting method.\n• Under different terrain conditions, the forecasting accuracy of the EEMD-FuzzyEn-LSTMNN model is much higher than that of the LSTMNN model. Comparing the EEMD-FuzzyEn-LSTMNN model with the LSTMNN model, the MAE, MAPE and RMSE of the three cases are reduced by 0.2773–0.4413 m/s (19.74–29.18%), 0.0882–0.11 (21.74–29.7%), 0.3076–0.6014 m/s (16.81–30.04%), respectively. Moreover, the EEMD-FuzzyEn-LSTMNN model has more advantages for forecasting the wind speed series which has large forecasting errors by using ordinary neural networks.\nThe current forecasting method in this paper is to directly forecast the same steps for each subsequence. However, due to the strong randomness of the high-frequency subsequence, it is not appropriate for the high-frequency subsequence to make a direct multistep forecasting of the same steps as the low-frequency subsequence. Therefore, the autocorrelation of each subsequence can be analyzed to determine its own appropriate steps for the direct multistep forecasting. Then, each subsequence is forecasted separately according to its corresponding forecasting steps, and all the forecasting results of subsequences are superimposed to get the final forecasting results. This method will help to further improve the forecasting accuracy of the EEMD-FuzzyEn-LSTMNN model, and it will become our next research goal.\n\nAuthor Contributions\n\nConceptualization, Q.Q.; Formal analysis, Q.Q. and J.Z.; Funding acquisition, X.L.; Methodology, Q.Q.; Software, Q.Q.; Validation, Q.Q.; Visualization, Q.Q.; Writing—original draft, Q.Q.; Writing—review & editing, Q.Q., X.L. and J.Z.\n\nFunding\n\nThis research was funded by National Natural Science Foundation of China under Grant 51379159 and Specialized Research Fund for the Doctoral Program of Higher Education under Grant 20130141130001.\n\nConflicts of Interest\n\nThe authors declare no conflict of interest.\n\nReferences\n\n1. Liu, H.; Tian, H.Q.; Chen, C.; Li, Y.F. An experimental investigation of two Wavelet-MLP hybrid frameworks for wind speed prediction using GA and PSO optimization. Electr. Power Energy Syst. 2013, 52, 161–173. [Google Scholar] [CrossRef]\n2. Jiang, P.; Wang, Y.; Wang, J.Z. Short-term wind speed forecasting using a hybrid model. Energy 2017, 119, 561–577. [Google Scholar] [CrossRef]\n3. Hu, J.M.; Wang, J.Z.; Zeng, G.W. A hybrid forecasting approach applied to wind speed time series. Renew. Energy 2013, 60, 185–194. [Google Scholar] [CrossRef]\n4. Chang, G.W.; Lu, H.J.; Chang, Y.R.; Lee, Y.D. An improved neural network-based approach for short-term wind speed and power forecast. Renew. Energy 2017, 105, 301–311. [Google Scholar] [CrossRef]\n5. Landberg, L. Short-term prediction of local wind conditions. J. Wind Eng. Ind. Aerodyn. 2001, 89, 235–245. [Google Scholar] [CrossRef]\n6. Martí, I.; Cabezón, D.; Villanueva, J.; Sanisidro, M.J.; Loureiro, Y.; Cantero, E.; Sanz, J. LocalPred and RegioPred. Advanced tools for wind energy prediction in complex terrain. In Proceedings of the 2003 European Wind Energy Conference and Exhibition, (EWEC’03), Madrid, Spain, 16–19 June 2003. [Google Scholar]\n7. Focken, U.; Lange, M.; Waldl, H.P. Previento-A wind power prediction system with an innovative upscaling algorithm. In Proceedings of the 2001 European Wind Energy Conference and Exhibition, (EWEC’01), Copenhagen, Denmark, 2–6 July 2001. [Google Scholar]\n8. Brown, B.G.; Katz, R.W.; Murphy, A.H. Time series models to simulate and forecast wind speed and wind power. J. Clim. Appl. Meteorol. 1984, 23, 1184–1195. [Google Scholar] [CrossRef]\n9. Torres, J.L.; García, A.; De Blas, M.; De Francisco, A. Forecast of hourly average wind speed with ARMA models in Navarre (Spain). Sol. Energy 2005, 79, 65–77. [Google Scholar] [CrossRef]\n10. El-Fouly, T.H.M.; El-Saadany, E.F.; Salama, M.M.A. Grey predictor for wind energy conversion systems output power prediction. IEEE Trans. Power Syst. 2006, 21, 1450–1452. [Google Scholar] [CrossRef]\n11. Mohandes, M.A.; Halawani, T.O.; Rehman, S.; Hussain, A.A. Support vector machines for wind speed prediction. Renew. Energy 2004, 29, 939–947. [Google Scholar] [CrossRef]\n12. Cadenas, E.; Rivera, W. Short term wind speed forecasting in La Venta, Oaxaca, México, using artificial neural networks. Renew. Energy 2009, 34, 274–278. [Google Scholar] [CrossRef]\n13. Flores, P.; Tapia, A.; Tapia, G. Application of a control algorithm for wind speed prediction and active power generation. Renew. Energy 2005, 30, 523–536. [Google Scholar] [CrossRef]\n14. Li, G.; Shi, J. On comparing three artificial neural networks for wind speed forecasting. Appl. Energy 2010, 87, 2313–2320. [Google Scholar] [CrossRef]\n15. Salcedo-Sanz, S.; Pérez-Bellido, Á.M.; Ortiz-García, E.G.; Portilla-Figueras, A.; Prieto, L.; Paredes, D. Hybridizing the fifth generation mesoscale model with artificial neural networks for short-term wind speed prediction. Renew. Energy 2009, 34, 1451–1457. [Google Scholar] [CrossRef]\n16. Ortiz-García, E.G.; Salcedo-Sanz, S.; Pérez-Bellido, Á.M.; Gascón-Moreno, J.; Portilla-Figueras, J.A.; Prieto, L. Short-term wind speed prediction in wind farms based on banks of support vector machines. Wind Energy 2011, 14, 193–207. [Google Scholar] [CrossRef]\n17. Giorgi, M.G.D.; Ficarella, A.; Tarantino, M. Assessment of the benefits of numerical weather predictions in wind power forecasting based on statistical methods. Energy 2011, 36, 3968–3978. [Google Scholar] [CrossRef]\n18. Wang, D.Y.; Luo, H.Y.; Grunder, O.; Lin, Y.B. Multi-step ahead wind speed forecasting using an improved wavelet neural network combining variational mode decomposition and phase space reconstruction. Renew. Energy 2017, 113, 1345–1358. [Google Scholar] [CrossRef]\n19. Yang, H.F.; Jiang, Z.P.; Lu, H.Y. A hybrid wind speed forecasting system based on a ‘decomposition and ensemble’ strategy and fuzzy time series. Energies 2017, 10, 1422. [Google Scholar] [CrossRef]\n20. Liu, H.; Tian, H.Q.; Pan, D.F.; Li, Y.F. Forecasting models for wind speed using wavelet, wavelet packet, time series and Artificial Neural Networks. Appl. Energy 2013, 107, 191–208. [Google Scholar] [CrossRef]\n21. Guo, Z.H.; Zhao, W.G.; Lu, H.Y.; Wang, J.Z. Multi-step forecasting for wind speed using a modified EMD-based artificial neural network model. Renew. Energy 2012, 37, 241–249. [Google Scholar] [CrossRef]\n22. Liu, H.; Chen, C.; Tian, H.Q.; Li, Y.F. A hybrid model for wind speed prediction using empirical mode decomposition and artificial neural networks. Renew. Energy 2012, 48, 545–556. [Google Scholar] [CrossRef]\n23. Huang, N.E.; Shen, Z.; Long, S.R. A new view of nonlinear water waves: The Hilbert spectrum. Annu. Rev. Fluid Mech. 1999, 31, 417–457. [Google Scholar] [CrossRef]\n24. Wang, S.X.; Zhang, N.; Wu, L.; Wang, Y.M. Wind speed forecasting based on the hybrid ensemble empirical mode decomposition and GA-BP neural network method. Renew. Energy 2016, 94, 629–636. [Google Scholar] [CrossRef]\n25. Zhao, Z.; Chen, W.H.; Wu, X.M.; Chen, P.C.Y.; Liu, J.M. LSTM network: A deep learning approach for short-term traffic forecast. IET Intell. Transp. Syst. 2017, 11, 68–75. [Google Scholar] [CrossRef]\n26. Srivastava, S.; Lessmann, S. A comparative study of LSTM neural networks in forecasting day-ahead global horizontal irradiance with satellite data. Sol. Energy 2018, 162, 232–247. [Google Scholar] [CrossRef]\n27. Kim, H.Y.; Won, C.H. Forecasting the volatility of stock price index: A hybrid model integrating LSTM with multiple GARCH-type models. Expert Syst. Appl. 2018, 103, 25–37. [Google Scholar] [CrossRef]\n28. Zhang, J.F.; Zhu, Y.; Zhang, X.P.; Ye, M.; Yang, J.Z. Developing a Long Short-Term Memory (LSTM) based model for predicting water table depth in agricultural areas. J. Hydrol. 2018, 561, 918–929. [Google Scholar] [CrossRef]\n29. Yu, J.; Kim, S. Locally-weighted polynomial neural network for daily short-term peak load forecasting. Int. J. Fuzzy Log. Intell. Syst. 2016, 16, 163–172. [Google Scholar] [CrossRef]\n30. Huang, N.E.; Shen, Z.; Long, S.R.; Wu, M.C.; Shih, H.H.; Zheng, Q.; Yen, N.C.; Tung, C.C.; Liu, H.H. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proc. Math. Phys. Eng. Sci. 1998, 454, 903–995. [Google Scholar] [CrossRef]\n31. Wang, J.J.; Zhang, W.Y.; Li, Y.N.; Wang, J.Z.; Dang, Z.L. Forecasting wind speed using empirical mode decomposition and Elman neural network. Appl. Soft Comput. 2014, 23, 452–459. [Google Scholar] [CrossRef]\n32. Wu, Z.H.; Huang, N.E. A study of the characteristics of white noise using the empirical mode decomposition method. Proc. Math. Phys. Eng. Sci. 2004, 460, 1597–1611. [Google Scholar] [CrossRef]\n33. Wu, Z.H.; Huang, N.E. Ensemble Empirical Mode Decomposition: A noise-assisted data analysis method. Adv. Adapt. Data Anal. 2009, 1, 1–41. [Google Scholar] [CrossRef]\n34. Chen, W.T.; Wang, Z.Z.; Xie, H.B.; Yu, W.X. Characterization of surface EMG signal based on fuzzy entropy. IEEE Trans. Neural Syst. Rehabil. Eng. 2007, 15, 266–272. [Google Scholar] [CrossRef] [PubMed]\n35. Grzegorzewski, P. On separability of fuzzy relations. Int. J. Fuzzy Log. Intell. Syst. 2017, 17, 137–144. [Google Scholar] [CrossRef]\n36. Novák, V. Detection of structural breaks in time series using fuzzy techniques. Int. J. Fuzzy Log. Intell. Syst. 2018, 18, 1–12. [Google Scholar] [CrossRef]\n37. Bengio, Y.; Simard, P.Y.; Frasconi, P. Learning long-term dependencies with gradient descent is difficult. IEEE Trans. Neural Netw. 1994, 5, 157–166. [Google Scholar] [CrossRef] [PubMed]\n38. Hochreiter, S.; Schmidhuber, J. Long Short-term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]\n39. Gers, F.A.; Schmidhuber, J.; Cummins, F. Learning to forget: Continual prediction with LSTM. In Proceedings of the 9th International Conference on Artificial Neural Networks, (ICANN’99), Edinburgh, UK, 7–10 September 1999. [Google Scholar]\n40. Werbos, P.J. Backpropagation through time: What it does and how to do it. Proc. IEEE 1990, 78, 1550–1560. [Google Scholar] [CrossRef]\n41. Reshef, D.N.; Reshef, Y.A.; Finucane, H.K.; Grossman, S.R.; Mcvean, G.; Turnbaugh, P.J.; Lander, E.S.; Mitzenmacher, M.; Sabeti, P.C. Detecting novel associations in large data sets. Science 2011, 334, 1518–1524. [Google Scholar] [CrossRef]\n42. Madsen, H.; Pinson, P.; Kariniotakis, G.; Nielsen, H.A.; Nielsen, T.S. Standardizing the performance evaluation of short-term wind power prediction models. Wind Eng. 2005, 29, 475–489. [Google Scholar] [CrossRef]\nFigure 1. The structure of the RNN forecasting model for wind speed series.\nFigure 1. The structure of the RNN forecasting model for wind speed series.\nFigure 2. The structure of forecasting model for wind speed series at the time-step i: (a) the RNN forecasting model; (b) the LSTMNN forecasting model.\nFigure 2. The structure of forecasting model for wind speed series at the time-step i: (a) the RNN forecasting model; (b) the LSTMNN forecasting model.\nFigure 3. The flowchart of the EEMD-FuzzyEn-LSTMNN model.\nFigure 3. The flowchart of the EEMD-FuzzyEn-LSTMNN model.\nFigure 4. The variation law of the MIC with the delay time: (a) wind speed series of anemometer tower 1; (b) wind speed series of anemometer tower 2; (c) wind speed series of anemometer tower 3.\nFigure 4. The variation law of the MIC with the delay time: (a) wind speed series of anemometer tower 1; (b) wind speed series of anemometer tower 2; (c) wind speed series of anemometer tower 3.\nFigure 5. The variety law of MAE and RMSE with correlation length: (a) MAE; (b) RMSE.\nFigure 5. The variety law of MAE and RMSE with correlation length: (a) MAE; (b) RMSE.\nFigure 6. The decomposition results of wind speed series: (a) Case A; (b) Case B; (c) Case C.\nFigure 6. The decomposition results of wind speed series: (a) Case A; (b) Case B; (c) Case C.", null, "Figure 7. The FuzzyEn of each component obtained by EEMD.\nFigure 7. The FuzzyEn of each component obtained by EEMD.\nFigure 8. Forecasting results of wind speed series: (a) Case A; (b) Case B; (c) Case C.\nFigure 8. Forecasting results of wind speed series: (a) Case A; (b) Case B; (c) Case C.", null, "Figure 9. Forecasting error of wind speed series: (a) Case A; (b) Case B; (c) Case C.\nFigure 9. Forecasting error of wind speed series: (a) Case A; (b) Case B; (c) Case C.", null, "Figure 10. The variation law of MIC with the delay time for high-frequency components: (a) Case A; (b) Case B; (c) Case C.\nFigure 10. The variation law of MIC with the delay time for high-frequency components: (a) Case A; (b) Case B; (c) Case C.\nTable 1. Information of wind speed series from three anemometer towers.\nTable 1. Information of wind speed series from three anemometer towers.\nNumberLocationLocal Terrain ConditionSelected Time of Wind Speed SeriesHeight of Wind Speed Measurement (m)\n1Hunan provinceMountainous areaFrom April 2014 to March 201580\n2Henan provincePlain areaFrom June 2016 to May 2017120\n3Zhejiang provinceCoastal areaFrom August 2011 to July 2012100\nTable 2. Correlation length of wind speed series when MIC equals 0.2.\nTable 2. Correlation length of wind speed series when MIC equals 0.2.\nMonthCorrelation Length (h)\nAnemometer Tower 1Anemometer Tower 2Anemometer Tower 3\nJanuary8.176.176.67\nFebruary5.835.833.67\nMarch14.834.506.83\nApril7.506.004.67\nMay12.504.176.17\nJune4.503.674.83\nJuly7.003.335.33\nAugust3.004.008.67\nSeptember6.333.836.67\nOctober9.676.005.17\nNovember7.676.505.00\nDecember9.004.178.50\nTable 3. Parameter settings of wind speed forecasting model.\nTable 3. Parameter settings of wind speed forecasting model.\nForecasting ModelsParametersNumber or Type\nBPNN modelNumber of neurons in the hidden layer20\nLearning rate of training0.001\nTraining target0.00001\nSVM modelType of svmepsilon-SVR\nType of kernel functionlinear kernel function\nLSTMNN modelNumber of neurons in the LSTM layer20\nType of activation function of the output layer tanh\nLearning rate0.0001\nTable 4. Calculation results of error evaluation indexes for the four forecasting models.\nTable 4. Calculation results of error evaluation indexes for the four forecasting models.\nCaseForecasting modelsMAE (m/s)MAPERMSE (m/s)\nCase ABPNN model1.53080.38002.0371\nSVM model1.52640.37422.0211\nLSTMNN model1.51220.37042.0022\nEEMD-FuzzyEn-LSTMNN model1.07090.26041.4008\nCase BBPNN model1.44060.48751.8626\nSVM model1.45230.48611.8694\nLSTMNN model1.40450.48351.8295\nEEMD-FuzzyEn-LSTMNN model1.12720.37841.5219\nCase CBPNN model1.26970.33971.5798\nSVM model1.27330.33741.5767\nLSTMNN model1.25850.33581.5624\nEEMD-FuzzyEn-LSTMNN model0.91880.24761.1615" ]
[ null, "https://www.mdpi.com/profiles/masked-unknown-user.png", null, "https://www.mdpi.com/img/design/orcid.png", null, "https://www.mdpi.com/profiles/masked-unknown-user.png", null, "https://www.mdpi.com/profiles/masked-unknown-user.png", null, "https://www.mdpi.com/applsci/applsci-09-00126/article_deploy/html/images/applsci-09-00126-g006b.png", null, "https://www.mdpi.com/applsci/applsci-09-00126/article_deploy/html/images/applsci-09-00126-g008b.png", null, "https://www.mdpi.com/applsci/applsci-09-00126/article_deploy/html/images/applsci-09-00126-g009b.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89074075,"math_prob":0.93612313,"size":48414,"snap":"2019-43-2019-47","text_gpt3_token_len":11791,"char_repetition_ratio":0.19843008,"word_repetition_ratio":0.110691495,"special_character_ratio":0.2457347,"punctuation_ratio":0.1753881,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.987545,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-19T12:23:52Z\",\"WARC-Record-ID\":\"<urn:uuid:dd5cec9f-6763-467a-bc5a-bb9e9ff4676a>\",\"Content-Length\":\"232654\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bfdace1b-1b3b-40ff-ae17-cad30fd08bef>\",\"WARC-Concurrent-To\":\"<urn:uuid:a875fd48-d07c-40ff-a028-453673603193>\",\"WARC-IP-Address\":\"104.16.9.68\",\"WARC-Target-URI\":\"https://www.mdpi.com/2076-3417/9/1/126/htm\",\"WARC-Payload-Digest\":\"sha1:ZMIAWV4TAQPDHTZ6AQDUL7JHD7R6RXYW\",\"WARC-Block-Digest\":\"sha1:CCIBDSFPVAMN6FAMIEVWSIQQHBXULZIX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986693979.65_warc_CC-MAIN-20191019114429-20191019141929-00326.warc.gz\"}"}
https://woutergeelen.nl/digital-control-systems-1-02/
[ "# Digital Control Systems 1.02\n\nIn the previous blog we introduced the various types of signals present in a digital control system and highlighted the pros and cons. In this blog we take a a closer look at the digital control system.\n\nA digital control system, can only cope with digital signals. That is because it is inherently discrete in time and space. This is caused by the processors clock rate and due to the finite word length of a digital system. For instance, a 32 [bit] computer which runs at 4 [GHz] has a time resolution of 0.25 [ns] and the value of an unsigned integer can only range from 0 to 232 − 1.", null, "Figure 1. Digital control system in its most elementary form. Continuous-time signals are in solid and discrete-time signals are dashed.\n\nFigure 1 shows the digital control system in its most elementary form. Herein $\\mathcal{S}$ is the sampler. The sampler converts the analog output signal of the plant $y(t)$ at time $t \\in \\mathbb{R}$ to a digital measurement signal $y[k]$ at discrete-time $k \\in \\mathbb{N}$. As mentioned in the previous blog, the digital signal is obtained by sampling and quantization of the analog signal. In final, $\\mathcal{H}$ denotes the recronstructor, also known as a digital-analog convertor (DAC), it converts the digital control signal $u[k]$ provided by the controller to an analog control signal $u(t)$.\n\n# Sampler\n\nFigure 2 shows that the sampler exists out of two devices namely; i) a sample and hold (SH) device and ii) a analog-digtal convertor (ADC).\n\nThe SH device knows two different states. The first state is called the track state at which the analog input signal is tracked by the SH device. The track state is also refereed to as sample state. However because of the ambiguous meaning of the word sample we will use the track, which is also commonly used in literature. The second state is called the hold state at which the analog input signal is being kept constant for a short period of time. The hold state is activated when the hold command is given. During the hold state the ADC is able to process and digitize the signal. The hold command can be triggered by any logic device. While there are many more aspects and subtleties to be considered with a SH device this gives a summarized overview of its functionality.", null, "Figure 3. The track and hold of a SH. Dashed red shows the original signal, solid blue shows the SH signal.\n\nVarious different strategies exists at what time instance $t_k$ the hold command is triggered. These are called sampling strategies.\n\n1. Periodic sampling; the sampling instances $t_k$ are equally spaced, that is to say $t_k = kh$ with $k \\in \\mathbb{N}$ and $h$, given in [s], being the sampling period. See also Figure 2(a). The sampling period $h$ is often also denoted as the sampling rate or sampling frequency $f_s$, given in [Hz]. It is related to the sampling period by $h = \\frac{1}{f_s}$.\n2. Multi-order sampling; a pattern of sampling instances $\\{t_k\\}$ are repeated periodically, as a result $t_{k+r} = t_k$. See Figure 2(b).\n3. Event-based sampling; the sampling instances $t_k$ are generated based on a event in the system. For instance, when a certain measurement threshold has been crossed. See Figure 2(c) in which the signal is sampled at every $\\pm0.4x \\pm 0.2$ value.\n4. Random sampling; the sampling time instances $t_k$ are chosen at random, see Figure 2(d).", null, "Figure 2. Visualization of different sampling techniques. Red line resembles the original analog signal, blue the sampled signal. Matlab code.\n\nPeriodic sampling is the most common in industry. That is because of several reason; i) most deterministic behavior, ii) extensively been researched, iii) easiest to model and iv) easiest to obtain key performance indicators, for instance, in time- and frequency domain. Finally, proofing stability for the other sampling strategies is much harder then for periodic sampling." ]
[ null, "https://i0.wp.com/woutergeelen.nl/wp-content/uploads/2017/04/digital-control-system-basic-1.png", null, "https://i1.wp.com/woutergeelen.nl/wp-content/uploads/2017/04/track_hold.png", null, "https://i2.wp.com/woutergeelen.nl/wp-content/uploads/2017/04/sampling-753x1024.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93253404,"math_prob":0.99225736,"size":3535,"snap":"2021-43-2021-49","text_gpt3_token_len":817,"char_repetition_ratio":0.14245257,"word_repetition_ratio":0.020236088,"special_character_ratio":0.23338048,"punctuation_ratio":0.0969163,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99664515,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,6,null,4,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-24T22:04:05Z\",\"WARC-Record-ID\":\"<urn:uuid:2dab7931-0dd9-45f4-8371-f62a08dcd6e2>\",\"Content-Length\":\"52351\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b597aafe-c3e6-4ddd-9caf-85f3d112491b>\",\"WARC-Concurrent-To\":\"<urn:uuid:3294361d-4b96-4c49-a98b-98f06d05a52c>\",\"WARC-IP-Address\":\"173.249.11.56\",\"WARC-Target-URI\":\"https://woutergeelen.nl/digital-control-systems-1-02/\",\"WARC-Payload-Digest\":\"sha1:CKOR5FVRMMVZDDQOKPYD6USHDMQ2WNEZ\",\"WARC-Block-Digest\":\"sha1:XMO2I25SOKHFGR7GZBUFV6CKA5WTYGJW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587606.8_warc_CC-MAIN-20211024204628-20211024234628-00062.warc.gz\"}"}
https://dev.heuristiclab.com/trac.fcgi/wiki/Documentation/Howto/DefineCustomProblems?version=7
[ "Version 7 (modified by abeham, 4 years ago) (diff)\n\n--\n\n# How to ... define custom problems in the GUI\n\nIn HeuristicLab 3.3 you don't always need to use Visual Studio or other developing and build tools to optimize your problem. Most of the tasks can be performed in the GUI. Here we'll show how to recreate the knapsack problem in the GUI and use a genetic algorithm for optimizing it. After reading through this tutorial, you should be comfortable to define your own, probably more complex, problem.\n\n## Problem Definition\n\nThe preferred way of prototyping new problems is by using the Programmable Problem in HeuristicLab. You can either go for single-objective or multi-objective problem definitions. In this case we want to create a new \"Programmable Problem (single-objective)\" from the new item dialog.\n\nThe programmable problem allows you to code the problem definition directly in C# without using complex build tools. In the code editor we choose the appropriate encoding, and define the fitness function.\n\nWe also need to think about the problem's data. The knapsack problem is defined by:\n\n1. A set of items each with a certain weight and value\n2. The size of the knapsack as a value representing total weight\n\nFor simplicity we can simply hard-code these parameters in the code by defining appropriate data structures as private variables. A more elegant way is to add them to the variable store so that we can use the GUI for manipulating the data.\n\nIn the variable store on the right add 2 variables of type DoubleArray and one of type DoubleValue, name these weights, values, and maxWeight respectively. Then double-click to open them and enter the values of your problem instance. Similar to the following:\n\nNext we choose the problem's encoding. In this case replace the contents of the Initialize() method with\n\nEncoding = new BinaryVectorEncoding(\"kp\", length: ((DoubleArray)vars.weights).Length);\n\n\nThis will indicate that the problem uses binary encoded solutions named \"kp\". The length is automatically initialized to the length of the weights array that you have added in the variables store.\n\nNext we want to specify the evaluation function. Take a look at the Evaluate method. It requires us to return the fitness value as a double. The argument individual holds the actual solution. We can ignore the random argument as our problem is deterministic. The evaluation function for the knapsack may look as follows:\n\n var weights = (DoubleArray)vars.weights;\nvar values = (DoubleArray)vars.values;\nvar size = ((DoubleValue)vars.maxWeight).Value;\nvar solution = individual.BinaryVector(\"kp\");\n\ndouble v = 0.0;\ndouble w = 0.0;\nfor (int i = 0; i < solution.Length; i++) {\nif (solution[i]) {\nw += weights[i];\nv += values[i];\n}\n}\n\nif (w > size) v = size - w;\nreturn v;\n\n\nThis means we're penalizing overweight solutions by assigning them negative fitness values where higher means less overweight and feasible solutions are assigned the value of the knapsack. Note: we're assuming only positive item values.\n\nThe evaluation function is defined such that larger values are better which means we need to change the Maximization property to return true instead of false.\n\nAt this point your problem definition should look as follows:\n\nYou can now press the \"Compile\" button right above the upper right corner of the code-editor. It should read \"Compilation succeeded\" in green. Otherwise try to identify and fix compile errors by looking at the \"Error List\" tab below the code-editor pane.\n\nSave the problem to a file \"Custom Knapsack.hl\".\n\nNext use the \"New Item\" dialog to create a new \"Genetic Algorithm\". In its \"Problem\" tab load the file. Configure the algorithm's parameters (select SinglePointCrossover as Crossover and SinglePositionBitflipManipulator as Mutator). Then press the green \"Play\" button at the bottom and look at the \"Results\" tab to see the solution being optimized.\n\nYou can also download the pre-configured file I created in the attachments to this page \"GA solves custom Knapsack.hl\"." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8159614,"math_prob":0.92658514,"size":4467,"snap":"2019-35-2019-39","text_gpt3_token_len":1024,"char_repetition_ratio":0.11920233,"word_repetition_ratio":0.042075735,"special_character_ratio":0.22364002,"punctuation_ratio":0.11708482,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97592056,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-18T21:06:51Z\",\"WARC-Record-ID\":\"<urn:uuid:1f81f891-ebc1-4fed-acd7-2adefbb351d4>\",\"Content-Length\":\"21570\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9bb5578a-4d75-4021-b710-4418e99f271b>\",\"WARC-Concurrent-To\":\"<urn:uuid:2e121888-ea78-4004-a6e3-a935ff69814a>\",\"WARC-IP-Address\":\"185.160.0.52\",\"WARC-Target-URI\":\"https://dev.heuristiclab.com/trac.fcgi/wiki/Documentation/Howto/DefineCustomProblems?version=7\",\"WARC-Payload-Digest\":\"sha1:KXXAG2T6THBJJSSLB25ZBE6N3ODU7OHT\",\"WARC-Block-Digest\":\"sha1:42JCWZOZVQZBUHSP3KZWGDOCS2LT6YPT\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514573331.86_warc_CC-MAIN-20190918193432-20190918215432-00329.warc.gz\"}"}
https://www.qtcentre.org/threads/70802-error-exited-with-code-1073740940-ask-for-help?p=307307
[ "##", null, "error: exited with code -1073740940 ask for help\n\nHi guys:\n\nI was stucked in a problem, the program can be built and run for a about 19 minutes, and then exited with code -1073740940.\nI don't know where can find the code means ?\nDevelop environment : Qt 5.14.0 / Windows 10\n\nAfter checked my code and did a lot of test , I found that when I disable some code sections, it would run for a long time.\nThe function was reading a block of dem data from memory, and it runs a about 60 times per second.\n---------------------------code sections-------------------------------------------------------\n{\nshort int* crop = (short int*)malloc(sizeof(short int) * _Terrian_Range * _Terrian_Range*4); // _Terrian_Range is const for 100\nLocation location = getLocation(); // According to longtitude & latitude caculate which row & col the right data in the dem data map\nLocation beginlocation;\nint beginIndex;\n\nbeginlocation.col = location.col - _Terrian_Range;\nbeginlocation.row = location.row - _Terrian_Range;\nbeginIndex = (int)(beginlocation.col + beginlocation.row * 43200);\n\nfor (int rows = 0; rows < _Terrian_Range * 2; rows++)\n{\nfor (int cols = 0; cols < _Terrian_Range * 2; cols++)\n{\ncrop[cols + rows * _Terrian_Range*2] = _DataNow[beginIndex + cols];\nif (demlow>_DataNow[beginIndex + cols]) demlow=_DataNow[beginIndex + cols];\nif (demhigh<_DataNow[beginIndex + cols]) demhigh=_DataNow[beginIndex + cols];\n}\nbeginIndex += 43200;\n}\n\nreturn crop;\n}\n---------------------------------------- code sections end ----------------------------------------\nMy questions are :\n1? Where could I find the code means.\n2? How could fix the problem(s).\n\nThanks a lot." ]
[ null, "https://www.qtcentre.org/threads/images/icons/icon5.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6908172,"math_prob":0.8530247,"size":1643,"snap":"2021-21-2021-25","text_gpt3_token_len":420,"char_repetition_ratio":0.2342892,"word_repetition_ratio":0.0,"special_character_ratio":0.36396834,"punctuation_ratio":0.16165413,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9770483,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-13T15:27:48Z\",\"WARC-Record-ID\":\"<urn:uuid:fb646378-e7d2-4067-8aa8-7ec87b6e688b>\",\"Content-Length\":\"42730\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:349a89d2-9a42-4090-98b7-aed123bd700e>\",\"WARC-Concurrent-To\":\"<urn:uuid:09318780-3077-4543-bad8-0318f4db186a>\",\"WARC-IP-Address\":\"145.239.80.21\",\"WARC-Target-URI\":\"https://www.qtcentre.org/threads/70802-error-exited-with-code-1073740940-ask-for-help?p=307307\",\"WARC-Payload-Digest\":\"sha1:L3EU4FGYLB45DPWVB3W6S6BNMETG5N4A\",\"WARC-Block-Digest\":\"sha1:XPTVU4WTKO5HA77BUNWHNABKDYG576NA\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989814.35_warc_CC-MAIN-20210513142421-20210513172421-00257.warc.gz\"}"}
https://www.luxdeluce.com/187-quantum-fraction-for-cp-violation-phase-for-neutrino.html
[ "", null, "In the same manner as for quarks, also for neutrinos, there are \"Quantum Fractions\" ie the fractions used to calculate CP Violation Phase. These fractions when multiplied by angles of subatomic particles give the exact value of the CP Violation Phase for Neutrino.\n\nFor Quark and Graviton, and for Boson and Neutrino pair the fraction equals ( 3 / 7 )\n\nFor Boson the fraction equals ( 6 / 5 )\n\nFor Neutrino the fraction equals ( 2 / 3 )\n\nThese fractions are not just any numbers, they follow certain rules:\n\nThe absolute value of the largest reciprocal equals to the sum of the absolute values of the two remaining reciprocals, i.e.\n\n| 7 / 3 | = | 3 / 2 | + | 5 / 6 |\n\n| 14 / 6 | = | 9 / 6 | + | 5 / 6 | = 14 / 6 = 7 / 3\n\nand\n\n( 7 / 3 ) / ( 3 / 2 - 5 / 6 ) = 7 / 2\n\nHaving these fractions we can calculate the exact value of the CP ( Charge - Parity ) Violation Phase for Neutrino." ]
[ null, "https://www.luxdeluce.com/images/Sistine_Chapel_ceiling_by_Michelangel_0.3.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.80235726,"math_prob":0.9975244,"size":961,"snap":"2020-24-2020-29","text_gpt3_token_len":293,"char_repetition_ratio":0.14838035,"word_repetition_ratio":0.048309177,"special_character_ratio":0.32466182,"punctuation_ratio":0.07386363,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9983339,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-02T23:23:25Z\",\"WARC-Record-ID\":\"<urn:uuid:e91a975a-d615-4260-8c0a-a54cded4165e>\",\"Content-Length\":\"38393\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:526dac76-d66a-442c-b079-b8208799d5b8>\",\"WARC-Concurrent-To\":\"<urn:uuid:54d44bfa-6dba-403f-9fff-8de4b2acc035>\",\"WARC-IP-Address\":\"75.98.175.110\",\"WARC-Target-URI\":\"https://www.luxdeluce.com/187-quantum-fraction-for-cp-violation-phase-for-neutrino.html\",\"WARC-Payload-Digest\":\"sha1:LT6CCQZ7NHP3XN7ZB2QKONQMCVC4WWXR\",\"WARC-Block-Digest\":\"sha1:4GUTHBAOV4HWTZCGF5B7GN2P3YBPPACJ\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347426956.82_warc_CC-MAIN-20200602224517-20200603014517-00309.warc.gz\"}"}
http://irodovsolutionsmechanics.blogspot.com/2007/08/irodov-problem-164.html
[ "## Monday, August 6, 2007\n\n### Irodov Problem 1.64\n\nThis problem is actually an extension of problem 1.63 that has already been solved in the previous post. Hence, throughout this problem I shall refer to the equations and figures of problem 1.63.\nEquations (5) and (7) can be used to determine the acceleration of the masses depending on whether the body is accelerating", null, "down or up as determined from conditions given by inequalities (6) and (8). Thus, we can write,", null, "and thus we can re-write them as,", null, "#### 1 comment:", null, "" ]
[ null, "http://4.bp.blogspot.com/_v9nwkZLKggs/RrXidiZq2lI/AAAAAAAACV8/HmRDVLOyiE0/s400/1.63_1.JPG", null, "http://1.bp.blogspot.com/_v9nwkZLKggs/RrZzViZq24I/AAAAAAAACYU/nkJr27Za_p0/s400/1.64_1.JPG", null, "http://3.bp.blogspot.com/_v9nwkZLKggs/RrZ0XCZq25I/AAAAAAAACYc/tdO6zFXdEk0/s400/1.64_2.JPG", null, "http://resources.blogblog.com/img/blank.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9450765,"math_prob":0.92875934,"size":576,"snap":"2019-26-2019-30","text_gpt3_token_len":132,"char_repetition_ratio":0.12587413,"word_repetition_ratio":0.0,"special_character_ratio":0.23958333,"punctuation_ratio":0.11304348,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9764099,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,8,null,2,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-18T23:42:45Z\",\"WARC-Record-ID\":\"<urn:uuid:846fa6cf-71b2-4219-bfc8-b1a60ffd1066>\",\"Content-Length\":\"55704\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6d694db2-0518-4164-bd28-83e0b79521f3>\",\"WARC-Concurrent-To\":\"<urn:uuid:f9f8a447-3430-45ef-a4b6-b7994e42f0db>\",\"WARC-IP-Address\":\"172.217.15.65\",\"WARC-Target-URI\":\"http://irodovsolutionsmechanics.blogspot.com/2007/08/irodov-problem-164.html\",\"WARC-Payload-Digest\":\"sha1:55XB66BPYNNTQ74ZCQDIF6SSCUQYUVJF\",\"WARC-Block-Digest\":\"sha1:C6SWMYKOPBIUNHBI7JIGS7ZGHKVP45C4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525863.49_warc_CC-MAIN-20190718231656-20190719013656-00142.warc.gz\"}"}
https://www.allaboutcircuits.com/technical-articles/a-diy-internal-oscillator-trimming-procedure-for-mcus/
[ "Technical Article\n\n# How to Calibrate an Microcontroller Internal Oscillator: A DIY Trimming Procedure Algorithm\n\nDecember 13, 2019 by Eduardo Corpeño\n\n## This article presents an algorithm intended for humans to calibrate the internal oscillator of an MCU, with the help of an oscilloscope and a spreadsheet. An example experiment with numbers is also shown.\n\nIn the previous article titled How to Calibrate MCU Internal Oscillators, I explained the nature of the calibration techniques for internal RC oscillators in MCUs. Now, we’ll take a look at an easy procedure you can perform on your microcontrollers.\n\nThere are probably several tools to help you tune your MCU’s internal oscillator, some provided by instrument vendors, some others even intended to run on your MCU’s firmware. However, for you to fully grasp how this process works, I recommend that you follow this instrument-assisted procedure to trim your MCU’s internal oscillator. Pretend you’re at school, and take this as a lab assignment at least once!\n\n### The Calibration Procedure\n\nTo run this experiment, you’ll need a power supply, your MCU, a device programmer, a spreadsheet, and an oscilloscope, logic analyzer, or frequency counter. Let’s quickly look at the steps:\n\n1. Compile and run an application that generates a 1kHz square wave.\n2. Measure the actual baseline period.\n3. Measure the expected resolution of your trim register.\n4. Calculate the absolute error.\n5. Calculate the percentage error.\n6. Repeat the following steps until the desired error is reached or the required adjustment is 0.\n1. Calculate the required adjustment for the trim register.\n2. Calculate the new trimming value.\n3. Replace the trim register value, recompile and run, and measure the new period.\n4. Calculate the absolute error.\n5. Calculate the percentage error.\n\n### Let’s Calibrate an MCU!\n\nLet me show you an example of these steps performed on a brand new MC9S08SH8 microcontroller, with the 8-bit ICSTRM register described earlier. According to the manual, this register has an expected trim accuracy between ±0.2% and ±0.4%, meaning that an increase or decrease of 1 step in this register has an expected increase or decrease of 0.2% to 0.4% of the baseline untrimmed period. Since this percentage can vary in that range from chip to chip, we’ll have to measure it.\n\nFor this experiment, let’s say we want to get an accuracy better than ±0.5%.\n\n1. Run a 1kHz square wave generator.\nIt’s crucial to aim for a period of exactly 1ms. For this reason, you should use the tools provided by your MCU’s vendor, such as a Timer or PWM module. Use libraries and code generators, and stay away from software-based time-counting delays.\n\n2. Measure the actual baseline period.\n$T_{baseline}=880.98\\mu s$\nFor this experiment, I used the oscilloscope of the NI-ELVIS II suite, by National Instruments, as shown below:", null, "1. Measure the expected resolution of your trim register.\nThis is supposedly 0.2% to 0.4% of the baseline period, or anything between these values:\n$Resolution_{min}=Trim\\:Accuracy_{min}\\times T_{baseline}=0.002\\times 880.98\\mu s = 1.762\\mu s$\n$Resolution_{max}=Trim\\:Accuracy_{max}\\times T_{baseline}=0.004\\times 880.98\\mu s = 3.524\\mu s$\nSo we’ll have to measure it. To do this, we’ll measure the generated period for an ICSTRM value of 129, and calculate the drift from the baseline period. After setting ICSTRM at 129, recompiling and measuring the period, I got $$T_{baseline+1}=883.18\\mu s$$.\n\nThese two values show a period increase of $$Trim\\:Accuracy=0.2497\\%$$ to finally calculate $$Resolution=Trim\\:Accuracy\\times T_{baseline}=0.002497\\times 880.98\\mu s = 2.2\\mu s$$\n\n2. Calculate the absolute error.\nThe absolute error is how much the obtained period is above the target period. For our experiment, that’s\n$error=T_{obtained}-T_{target}=880.98\\mu s-1000\\mu s=-119.02\\mu s$\nA negative value means that the obtained period is lower than the target period.\n\n3. Calculate the percentage error.\nThis is simply the absolute error divided by the target period. In our experiment, that’s\n$\\% error=\\frac{error}{T_{target}}=\\frac{-119.02\\mu s}{1,000\\mu s}\\times100\\%=-11.9\\%$\n\n4. Repeat the following steps until the desired error is reached or the required adjustment is 0.\nInitially, the error is -11.9%, so we have to start iterating.\n1. Calculate the required adjustment for the trim register.\nThis is the number of units of the trim register we need to add or subtract to obtain our target period. This is calculated by converting the absolute error to trim register units:\n$\\Delta_{trim\\_adj}=-\\frac{error}{Resolution}=-\\frac{-119.02\\mu s}{2.2\\mu s}=54.1units\\approx 54units$\nWe need to approximate because ICSTRM is an integer.\n2. Calculate the new trimming value.\n$ICSTRM=ICSTRM+\\Delta_{trim\\_adj}=128+54=182$\n3. Replace the trim register value, recompile and run, and measure the period.\n$T_{obtained}=1030\\mu s$\n4. Calculate the absolute error.\n$error=T_{obtained}-T_{target}=1030\\mu s-1000\\mu s=30\\mu s$\n5. Calculate the percentage error.\n$\\%error=\\frac{error}{T_{target}}=\\frac{30\\mu s}{1000\\mu s}\\times100\\%=3\\%$\n\nThe data above shows the results for the first iteration only. After 5 iterations, the error couldn’t improve any further. Here’s the resulting output signal, where the instrument reports a period of 1ms:", null, "The following table shows the whole process:\n\n Iteration $$TRM_{old}$$ $$T_{obtained}$$ error $$TRM_{adj}$$ $$TRM_{new}$$ % error 1 128 $$880.98 \\mu s$$ -119.02 54.10000 182 -11.90% 2 182 $$1030 \\mu s$$ 30.00 -13.63636 168 3.00% 3 168 $$993.39 \\mu s$$ -6.61 3.00455 171 -0.66% 4 171 $$999.91 \\mu s$$ -0.09 0.04091 171 -0.01% 5 172 $$1000.02 \\mu s$$ 0.02 -0.00909 172 0.002%\n\nNotice that in step 4 we reached our goal: The error dropped below 0.5%. It’s also too low for the spreadsheet to suggest a change in the Trim value, but it’s negative. It’s always a good idea to try and update the Trim value until the error starts going up again. So I tried increasing the Trim value by one in step 5, which yielded an error of 0.002%. The error is now positive, and the experiment ends; there’s no way to improve further. The value to load to ICSTRM on startup for this particular chip will be 172.\n\nThis procedure is almost deterministic. Looking at the error column, you can see how dramatically the accuracy improves: It nearly improves by one order of magnitude on each step! You can also see this improvement in the following plot.", null, "### Epilogue\n\nNow that you’ve gone through a nice algorithm to calibrate your own MCU, remember that you don’t have to run this algorithm on your microcontrollers all the time. You should feel free to use the tools provided by your microcontroller vendor in order to make the trimming procedure easier for you.", null, "" ]
[ null, "https://www.allaboutcircuits.com/uploads/articles/a-diy-internal-oscillator-trimming-procedure-for-mcus_eduardo_aac_image1.jpg", null, "https://www.allaboutcircuits.com/uploads/articles/a-diy-internal-oscillator-trimming-procedure-for-mcus_eduardo_aac_image2.jpg", null, "https://www.allaboutcircuits.com/uploads/articles/a-diy-internal-oscillator-trimming-procedure-for-mcus_eduardo_aac_image3.jpg", null, "https://www.allaboutcircuits.com/images/site/default_avatar.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82624066,"math_prob":0.9731603,"size":6790,"snap":"2019-51-2020-05","text_gpt3_token_len":1757,"char_repetition_ratio":0.12584734,"word_repetition_ratio":0.10184287,"special_character_ratio":0.2832106,"punctuation_ratio":0.12564291,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9941273,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,5,null,5,null,5,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-18T11:19:26Z\",\"WARC-Record-ID\":\"<urn:uuid:58b73370-0c0c-4631-a33b-c2a886d1fd3c>\",\"Content-Length\":\"93622\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5c0f4cab-ab7f-4ea9-a527-8e57201e9421>\",\"WARC-Concurrent-To\":\"<urn:uuid:0eaebdd6-345a-415b-895e-2ecaa943b738>\",\"WARC-IP-Address\":\"104.20.234.39\",\"WARC-Target-URI\":\"https://www.allaboutcircuits.com/technical-articles/a-diy-internal-oscillator-trimming-procedure-for-mcus/\",\"WARC-Payload-Digest\":\"sha1:X6WYYUG5YQNORNBI2U54UHZRKASJFYY5\",\"WARC-Block-Digest\":\"sha1:O5LPSEMW4V7C76M6K66246DN2ZZZKO33\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250592565.2_warc_CC-MAIN-20200118110141-20200118134141-00028.warc.gz\"}"}
https://www.geeksforgeeks.org/shortest-job-first-cpu-scheduling-with-predicted-burst-time/
[ "# Shortest Job First CPU Scheduling with predicted burst time\n\nPrerequisite – CPU Scheduling, SJF – Set 1 (Non- preemptive), Set 2 (Preemptive)\n\nShortest Job First (SJF) is an optimal scheduling algorithm as it gives maximum Throughput and minimum average waiting time(WT) and turn around time (TAT) but it is not practically implementable because Burst-Time of a process can’t be predicted in advance.\n\nWe may not know the length of the next CPU burst, but we may be able to predict its value. We expect the next CPU burst will be similar in length to the previous ones. By computing an approximation of the length of the next CPU burst, we can pick the process with the shortest predicted CPU burst.\n\nThere are two methods by which we can predict the burst time of the process :\n\n1. Static method – We can predict the Burst-Time by two factors :\n\n• Process size –\nLet say we have Process Pold having size 200 KB which is already executed and its Burst-time is 20 Units of time, now lets say we have a New Process Pnew having size 201 KB which is yet to be executed.\nWe take Burst-Time of already executed process Pold which is almost of same size as that of New process as Burst-Time of New Process Pnew.\n• Process type –\nWe can predict Burst-Time depending on the Type of Process. Operating System process(like scheduler, dispatcher, segmentation, fragmentation) are faster than User process( Gaming, application softwares ). Burst-Time for any New O.S process can be predicted from any old O.S process of similar type and same for User process.\n• Note – Static method for burst time prediction is not reliable as it is always not predicted correctly.\n\n2. Dynamic method – Let ti be the actual Burst-Time of ith process and Τn+1 be the predicted Burst-time for n+1th process.\n\n• Simple average – Given n processes ( P1, P2… Pn)\n`Τn+1 = 1/n(Σi=1 to n ti)`\n• Exponential average (Aging) –\n`Τn+1 = αtn + (1 - α)Τn`\n\nwhere α = is smoothing factor and 0 <= α <= 1 ,\n\ntn = actual burst time of nth process,\nΤn = predicted burst time of nth process.\n\nGeneral term,\n\n`αtn + (1 - α)αtn-1 + (1 - α)2αtn-2...+ (1 - α)jαtn-j...+ (1 - α)n+1Τ0 `\n\nΤ0 is a constant or overall system average.\n\nSmoothening factor (α) – It controls the relative weight of recent and past history in our prediction.\n\n• If α = 0, Τn+1 = Τn i.e. no change in value of initial predicted burst time.\n• If α = 1, Τn+1 = tn i.e. predicted Burst-Time of new process will always change according to actual      Burst-time of nth process.\n• If α = 1/2, recent and past history are equally weighted.\n\nExample –\nCalculate the exponential averaging with T1 = 10, α = 0.5 and the algorithm is SJF with previous runs as 8, 7, 4, 16.\n(a) 9\n(b) 8\n(c) 7.5\n(d) None\n\nExplanation :\nInitially T1 = 10 and α = 0.5 and the run times given are 8, 7, 4, 16 as it is shortest job first,\nSo the possible order in which these processes would serve will be 4, 7, 8, 16 since SJF is a non-preemptive technique.\nSo, using formula: T2 = α*t1 + (1-α)T1\nso we have,\nT2 = 0.5*4 + 0.5*10 = 7, here t1 = 4 and T1 = 10\nT3 = 0.5*7 + 0.5*7 = 7, here t2 = 7 and T2 = 7\nT4 = 0.5*8 + 0.5*7 = 7.5, here t3 = 8 and T3 = 7\nSo the future prediction for 4th process will be T4 = 7.5 which is the option(c).\n\nThis article is contributed by Yash Singla. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.", null, "My Personal Notes arrow_drop_up\n\nImproved By : pratikkatariya02\n\nArticle Tags :\nPractice Tags :\n\n3\n\nPlease write to us at contribute@geeksforgeeks.org to report any issue with the above content." ]
[ null, "https://media.geeksforgeeks.org/wp-content/cdn-uploads/20190705141434/Sudo-GATE-Article-Bottom.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8756579,"math_prob":0.9543099,"size":4475,"snap":"2019-51-2020-05","text_gpt3_token_len":1248,"char_repetition_ratio":0.14292105,"word_repetition_ratio":0.027160494,"special_character_ratio":0.2712849,"punctuation_ratio":0.103720404,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9825068,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-21T01:07:43Z\",\"WARC-Record-ID\":\"<urn:uuid:8ad003c2-b064-424d-9677-e8b698548a74>\",\"Content-Length\":\"124024\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fa390f45-a1a1-4936-9826-e70162f23959>\",\"WARC-Concurrent-To\":\"<urn:uuid:d838fb65-1088-4e65-a7e1-e098e27cc740>\",\"WARC-IP-Address\":\"23.15.8.160\",\"WARC-Target-URI\":\"https://www.geeksforgeeks.org/shortest-job-first-cpu-scheduling-with-predicted-burst-time/\",\"WARC-Payload-Digest\":\"sha1:7WS3W5VSTO25XZKJQW5KHBI453CNAJPN\",\"WARC-Block-Digest\":\"sha1:ZLU7YBEE4ZZTP7AIP6V4B47MFZW6XNYH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250601040.47_warc_CC-MAIN-20200120224950-20200121013950-00392.warc.gz\"}"}
https://opencores.org/websvn/diff?repname=spacewire_light&path=%2Fspacewire_light%2Ftrunk%2Fsyn%2Fstreamtest_digilent-xc3s200%2Fstreamtest_top.vhd&rev=3
[ "", null, "URL https://opencores.org/ocsvn/spacewire_light/spacewire_light/trunk\n\n# Subversion Repositoriesspacewire_light\n\n## [/] [spacewire_light/] [trunk/] [syn/] [streamtest_digilent-xc3s200/] [streamtest_top.vhd] - Diff between revs 2 and 3\n\nRev 2 Rev 3\nLine 1... Line 1...\n``--``\n``--``\n``-- Test of spwstream on Digilent XC3S200 board.``\n``-- Test of spwstream on Digilent XC3S200 board.``\n` `\n``-- 60 MHz system clock, 200 MHz receive clock and transmit clock.``\n``--``\n``--``\n``-- LED 0 = link started``\n``-- LED 0 = link started``\n``-- LED 1 = link connecting``\n``-- LED 1 = link connecting``\n``-- LED 2 = link run``\n``-- LED 2 = link run``\n``-- LED 3 = link error (sticky until clear button)``\n``-- LED 3 = link error (sticky until clear button)``\nLine 96... Line 97...\n`` attribute KEEP of fastclk: signal is \"SOFT\";``\n`` attribute KEEP of fastclk: signal is \"SOFT\";``\n`` ``\n`` ``\n`` component streamtest is``\n`` component streamtest is``\n`` generic (``\n`` generic (``\n`` sysfreq: real;``\n`` sysfreq: real;``\n` `\n`` txclkfreq: real;``\n`` tickdiv: integer range 12 to 24 := 20;``\n`` tickdiv: integer range 12 to 24 := 20;``\n`` rximpl: spw_implementation_type := impl_generic;``\n`` rximpl: spw_implementation_type := impl_generic;``\n`` rxchunk: integer range 1 to 4 := 1;``\n`` rxchunk: integer range 1 to 4 := 1;``\n`` tximpl: spw_implementation_type := impl_generic;``\n`` tximpl: spw_implementation_type := impl_generic;``\n`` rxfifosize_bits: integer range 6 to 14 := 11;``\n`` rxfifosize_bits: integer range 6 to 14 := 11;``\nLine 171... Line 173...\n`` ``\n`` ``\n`` -- Streamtest instance``\n`` -- Streamtest instance``\n`` streamtest_inst: streamtest``\n`` streamtest_inst: streamtest``\n`` generic map (``\n`` generic map (``\n`` sysfreq => 60.0e6,``\n`` sysfreq => 60.0e6,``\n` `\n`` txclkfreq => 200.0e6,``\n`` tickdiv => 22,``\n`` tickdiv => 22,``\n`` rximpl => impl_fast,``\n`` rximpl => impl_fast,``\n`` rxchunk => 4,``\n`` rxchunk => 4,``\n`` tximpl => impl_fast,``\n`` tximpl => impl_fast,``\n`` rxfifosize_bits => 11,``\n`` rxfifosize_bits => 11,``" ]
[ null, "https://cdn.opencores.org/design/corner.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5183319,"math_prob":0.9718697,"size":1905,"snap":"2020-45-2020-50","text_gpt3_token_len":615,"char_repetition_ratio":0.1257233,"word_repetition_ratio":0.4,"special_character_ratio":0.37795275,"punctuation_ratio":0.26993865,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9755281,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-21T15:21:36Z\",\"WARC-Record-ID\":\"<urn:uuid:63076519-1ef5-41b3-bbfe-ae0a59c2f597>\",\"Content-Length\":\"84813\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:843dd37d-d1d1-4900-b2e8-b346e55d21fe>\",\"WARC-Concurrent-To\":\"<urn:uuid:f2b49484-a470-46c3-a6d1-9dfa52133c0f>\",\"WARC-IP-Address\":\"37.97.232.80\",\"WARC-Target-URI\":\"https://opencores.org/websvn/diff?repname=spacewire_light&path=%2Fspacewire_light%2Ftrunk%2Fsyn%2Fstreamtest_digilent-xc3s200%2Fstreamtest_top.vhd&rev=3\",\"WARC-Payload-Digest\":\"sha1:HKZSZKFG7WRT26SPPUEVUJ2LOZ2JIDGO\",\"WARC-Block-Digest\":\"sha1:TQ4GQXYHJAMF2SA2GDHRNNO7BGXU2A7H\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107876768.45_warc_CC-MAIN-20201021151342-20201021181342-00515.warc.gz\"}"}
https://math.stackexchange.com/questions/2084274/what-is-the-longest-terminating-or-repeating-decimal-created-by-the-division-o
[ "# What is the longest terminating (or repeating) decimal created by the division of two natural numbers in which neither number is more than two digits?\n\nI came across a problem today while teaching in which a long division problem created an unusually long terminating decimal. It intrigued me into more thinking on this.\n\nMy question is: What is the longest terminating (or repeating) decimal created by the division of two natural numbers in which neither number is more than two digits? And, is there a way to prove this besides using brute force in trying all possibilities?\n\n• Since we can't repeat until we hit the same remainder, it's feasible that the more remainders are possible, the longer we can go before repeating. I'd try large two digit primes (not sure why prime, but I have $1/7$ in mind) for the denominator, like 97. – pjs36 Jan 5 '17 at 5:02\n• See here also: en.m.wikipedia.org/wiki/Repeating_decimal – user371838 Jan 5 '17 at 5:09\n\nThe number of digits in the repeat of $\\frac 1n$ (larger numerators can only decrease the number of digits) is always a factor of $\\phi (n)$, Euler's totient function, the number of numbers less than and coprime to $n$. For primes, $\\phi(n)=n-1$, so pjs36's intuition to try large primes is a good one. Once we discover $\\frac 1{97}$ has a repeat of $96$ digits, we only need to find that $\\phi(98)=42$ and $\\phi(99)=60$ and we are done. In fact, the repeat of $\\frac 1{98}$ is $42$ decimals, but $\\frac 1{99}=0.\\overline{01}$\n• @GerryMyerson: true, but it can have an effect on the period length if it were not prime. I wanted to claim that for $98$ and $99$ as well I could just look at $\\frac 1{98}$ and $\\frac 1{99}$ even though they are not prime. – Ross Millikan Jan 5 '17 at 6:16\n• @RossMillikan OK, that makes sense. So would the same be applied to 3 digit numbers? Would $\\frac{1}{997}$ be the largest repeating decimal created by two natural numbers no more than 3 digits? – MathGuy Jan 5 '17 at 14:09\n• No, because the period of $1/997$ is $166$, not $996$, so you should keep looking down the list of primes. What is going on is that the numbers coprime to $n$ form a multiplicative group. It may or may not be that $10$ is a generator of the whole group, which means you can represent all the elements as $10^k$. The first time this fails is $13$, where the powers of $10$ are $10,9,12,3,4,1$ and the period of $1/13$ is $6$, not $12$. – Ross Millikan Jan 5 '17 at 14:38" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9520317,"math_prob":0.99840033,"size":424,"snap":"2020-24-2020-29","text_gpt3_token_len":80,"char_repetition_ratio":0.0952381,"word_repetition_ratio":0.0,"special_character_ratio":0.18632075,"punctuation_ratio":0.07692308,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99927694,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-11T12:21:20Z\",\"WARC-Record-ID\":\"<urn:uuid:0d03af75-c309-40e2-a0af-0785f4fa1fa7>\",\"Content-Length\":\"148028\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6c0e5d06-3684-4d03-a50f-34077763dccc>\",\"WARC-Concurrent-To\":\"<urn:uuid:4cb91f67-b00c-4ead-adad-1e3d6b7f2318>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/2084274/what-is-the-longest-terminating-or-repeating-decimal-created-by-the-division-o\",\"WARC-Payload-Digest\":\"sha1:6U4QIX3Y5W3H6NEIB6EQYOWF2ICPSCYU\",\"WARC-Block-Digest\":\"sha1:WMX5YYKY5DUDY44CMMTYGUO4M7IKT56B\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655929376.49_warc_CC-MAIN-20200711095334-20200711125334-00035.warc.gz\"}"}
https://blog.conseroglobal.com/markup-vs-margin-what-is-the-difference
[ "# Markup vs. Margin. What is the Difference?\n\nMarkup vs Margin Differences", null, "Is there a difference? Absolutely. More and more in today’s environment, these two terms are being used interchangeably to mean gross margin, but that misunderstanding may be the menace of the bottom line. Markup and profit are not the same! Also, the accounting for margin and mark-up are different! A clear understanding and application of the two within a pricing model can have a drastic impact on the bottom line. Terminology speaking, markup percentage is the percentage difference between the actual cost and the selling price, while gross margin percentage is the percentage difference between the selling price and the profit.\n\nSo, who rules when seeking effective ways to optimize profitability?. Many mistakenly believe that if a product or service is marked up, say 25%, the result will be a 25% gross margin on the income statement. However, a 25% markup rate produces a gross margin percentage of only 20%.\n\nHow to calculate markup percentage\nBy definition, the markup percentage calculation is cost X markup percentage, and then add that to the original unit cost to arrive at the sales price.\n\nFor example, if a product costs \\$100, the selling price with a 25% markup would be \\$125:\n\nGross Profit Margin = Sales Price - Unit Cost = \\$125 - \\$100 = \\$25.\n\nMarkup Percentage = Gross Profit Margin/Unit Cost = \\$25/\\$100 = 25%.\n\nSales Price = Cost X Markup Percentage + Cost = \\$100 X 25% + \\$100 = \\$125.\n\nHow to calculate gross margin percentage\nGross margin defined is Gross Profit/Sales Price. In this example, the gross margin is \\$25. This results in a 20% gross margin percentage:\n\nGross Margin Percentage = Gross Profit/Sales Price = \\$25/\\$125 = 20%.\n\nNot quite the “margin percentage” we were looking for. So, how do we determine the selling price given a desired gross margin? It’s all in the inverse…of the gross margin formula, that is. By simply dividing the cost of the product or service by the inverse of the gross margin equation, you will arrive at the selling price needed to achieve the desired gross margin percentage.\n\nFor example, if a 25% gross margin percentage is desired, the selling price would be \\$133.33 and the markup rate would be 33.3%:\n\nSales Price = Unit Cost/(1 - Gross Margin Percentage) = \\$100/(1 - .25) = \\$133.33\n\nMarkup Percentage = (Sales Price - Unit Cost)/Unit Cost = (\\$133.33 - \\$100)/\\$100 = 33.3%\n\nReprinted with permission from WikiCFO.com.", null, "" ]
[ null, "https://blog.conseroglobal.com/hs-fs/hubfs/Imported_Blog_Media/header-markupvsmargin-1160x600-1.jpg", null, "https://no-cache.hubspot.com/cta/default/2433311/98928a86-0063-4d93-a86d-d62bd792861f.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8779781,"math_prob":0.96031636,"size":2404,"snap":"2019-35-2019-39","text_gpt3_token_len":545,"char_repetition_ratio":0.1875,"word_repetition_ratio":0.014814815,"special_character_ratio":0.26164725,"punctuation_ratio":0.11453745,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99777424,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-25T08:01:37Z\",\"WARC-Record-ID\":\"<urn:uuid:9721461b-15fa-4185-89d7-56e8e974dde5>\",\"Content-Length\":\"59704\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b155185e-035f-46d9-bb5f-271e4ecc8380>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a509115-bd8c-4688-baf6-3da3732b3ff3>\",\"WARC-IP-Address\":\"104.17.130.180\",\"WARC-Target-URI\":\"https://blog.conseroglobal.com/markup-vs-margin-what-is-the-difference\",\"WARC-Payload-Digest\":\"sha1:HDTZ4MZDCXKKDYMJ5AMTVPKWULUVRCP7\",\"WARC-Block-Digest\":\"sha1:ANIHDMGQMMXFGJRPXOW2H37CKC3ZCDNB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027323221.23_warc_CC-MAIN-20190825062944-20190825084944-00147.warc.gz\"}"}
https://www.gradesaver.com/textbooks/math/other-math/thinking-mathematically-6th-edition/chapter-11-counting-methods-and-probability-theory-11-3-combinations-exercise-set-11-3-page-709/78
[ "## Thinking Mathematically (6th Edition)\n\n${}_{n}P_{r}=\\displaystyle \\frac{n!}{(n-r)!},\\quad {}_{n}C_{r}=\\frac{n!}{(n-r)!r!}$ ------------- We see that ${}_{n}P_{r}=r!\\cdot {}_{n}C_{r}$ The text gives: ${}_{n}P_{r}=6\\cdot {}_{n}C_{r}$, so $r!=6=3!$ $r=3$ ${}_{n}P_{3}=3!\\cdot {}_{n}C_{3}$ is true for ANY $n \\geq 3$, So, we need more information to determine n." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5163628,"math_prob":0.99999356,"size":387,"snap":"2020-10-2020-16","text_gpt3_token_len":166,"char_repetition_ratio":0.19060053,"word_repetition_ratio":0.0,"special_character_ratio":0.498708,"punctuation_ratio":0.14285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.000006,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-03-30T19:55:01Z\",\"WARC-Record-ID\":\"<urn:uuid:983f899b-3eb3-4c51-b6d7-51fdc8d9de74>\",\"Content-Length\":\"69843\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:06569043-650c-40bf-b169-4338371d3e65>\",\"WARC-Concurrent-To\":\"<urn:uuid:06f762ee-624e-4930-bada-d6b616188508>\",\"WARC-IP-Address\":\"54.210.73.90\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/math/other-math/thinking-mathematically-6th-edition/chapter-11-counting-methods-and-probability-theory-11-3-combinations-exercise-set-11-3-page-709/78\",\"WARC-Payload-Digest\":\"sha1:BYJRNEZR6UOOJJ4NQV3VOKCL465S56MZ\",\"WARC-Block-Digest\":\"sha1:JOIBDXHL3NDVF5LL5EU6AMNTYPXEPU4H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370497301.29_warc_CC-MAIN-20200330181842-20200330211842-00446.warc.gz\"}"}
https://www.compadre.org/Physlets/mechanics/ex9_4.cfm
[ "## Exploration 9.4: Compare Motion in Accelerating Frames\n\nreference frame acceleration: a = m/s2\n\nIs physics different when viewed in different reference frames? The momentum of each ball is shown in the table, and the kinetic energy of each cart is shown in the bar graph in joules (position is given in meters and time is given in seconds). You can change your reference frame using the text box, -2 m/s2 < a < 2 m/s2. Answer the following questions. Restart.\n\n1. Does the total momentum depend on the reference frame?\n2. Does the change in momentum depend on the reference frame?\n3. Is the total momentum conserved in all reference frames?\n4. Find the ratio of the two masses. Is this result the same in all reference frames?\n5. Is there a reference frame in which the total momentum is zero?", null, "Physlets were developed at Davidson College and converted from Java to JavaScript using the SwingJS system developed at St. Olaf College.\n\nOSP Projects:", null, "Open Source Physics - EJS Modeling", null, "Tracker", null, "Physlet Physics", null, "Physlet Quantum Physics", null, "STP Book" ]
[ null, "https://www.compadre.org/Physlets/images/downloadPDF.png", null, "https://www.compadre.org/osp/images/ospn/osp.png", null, "https://www.compadre.org/osp/images/ospn/tracker.png", null, "https://www.compadre.org/osp/images/ospn/physlets3.png", null, "https://www.compadre.org/osp/images/ospn/pqp.png", null, "https://www.compadre.org/osp/images/ospn/stpbook-trans.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8476557,"math_prob":0.7160116,"size":1055,"snap":"2023-40-2023-50","text_gpt3_token_len":225,"char_repetition_ratio":0.16555661,"word_repetition_ratio":0.055248618,"special_character_ratio":0.21516588,"punctuation_ratio":0.092307694,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9905229,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-28T23:56:42Z\",\"WARC-Record-ID\":\"<urn:uuid:a26fa1bf-d6d7-4e8f-83f2-bf9394396a33>\",\"Content-Length\":\"26984\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0f5b69e1-b66e-4887-92a3-ae69d42dc6e4>\",\"WARC-Concurrent-To\":\"<urn:uuid:87e72fa3-8b9f-4bbc-b1bb-e588d53e186a>\",\"WARC-IP-Address\":\"54.209.62.36\",\"WARC-Target-URI\":\"https://www.compadre.org/Physlets/mechanics/ex9_4.cfm\",\"WARC-Payload-Digest\":\"sha1:FCVMKOIK7WW7GGYV2G7IT7WH7E75MJCJ\",\"WARC-Block-Digest\":\"sha1:LW5W6CPR26BWJL2FXUC3MUDVZLOJPW7X\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100016.39_warc_CC-MAIN-20231128214805-20231129004805-00175.warc.gz\"}"}
https://onlinecalculator.guide/minutes-to-days/
[ "Created By : Vaibhavi Kumari\n\nReviewed By : Rajashekhar Valipishetty\n\nLast Updated : Apr 20, 2023\n\nThis free Minutes To Days Calculator tool helps to convert the known minutes to days. You must enter the minutes' value in the specified box and press the calculate button to get the answer in days.\n\nMinutes =\n\nExamples of Minutes To Days calculator\n\n### Conversion Of Minutes To Days Formula\n\nThe minutes to days conversion formula is mentioned here.\n\nWe know that,\n\n1 day = 24 hrs\n\n1 hr = 60 min\n\n1 day = 1440 min\n\nSo, Hour = Minutes / 60\n\nDays = No. of hours / 24\n\n### How Do You Convert Minutes To Days?\n\nGet the simple steps to convert minutes to days.\n\n• Check the given value of the minutes.\n• Divide the minute value by 1440 and then get the answer in days.\n• Or, else substitute the value in the conversion formula to obtain the result.\n\n### Minutes To Days Conversion Examples\n\n1. How many days in 2880 minutes?\n\nSolution:\n\nGiven that,\n\nMinutes = 2880\n\nThen we know,\n\n1 day = 24 hrs\n\n1 hour = 60 min\n\nHour = Minutes / 60\n\nHour = 2880 / 60\n\nHour = 48 hrs\n\nDays = No. of hours / 24\n\nDays = 48 / 24\n\nDays = 2\n\nSo, 2880 minutes is equal to 2 days.\n\n2. How many days in 47144 minutes?\n\nSolution:\n\nGiven that,\n\nMinutes = 47144\n\nThen we know,\n\n1 day = 24 hrs\n\n1 hour = 60 min\n\nHour = Minutes / 60\n\nHour = 47144 / 60\n\nHour = 785.733 hrs\n\nDays = No. of hours / 24\n\nDays = 785.733 / 24\n\nDays = 32.7389\n\nSo, 47144 minutes is equal to 32.7389 days.\n\nIf you are looking for an easy way to calculate maths formulas, you can just open Onlinecalculator.guide, a reliable and trusted site.\n\n### How To Use Minutes To Days Conversion Calculator?\n\nThese are the steps to use the mins to days calculator in detailed steps.\n\n• Enter the input value according to the calculator in minutes.\n• Then simply we have to hit the calculate button to avail the answer.\n• Then we have to check the particular result we want in days.\n\n### FAQs On Minutes To Days Converter\n\n1. What is the fastest way to convert minutes to days?\n\nThe fastest way to convert minutes to days is by using our handy free tool i.e. Minutes To Days Calculator.\n\n2. How many days in 1440 minutes?\n\n1440 minutes is equal to one day.\n\n3. 2880 minutes is how many days?\n\n1 day is 1440 minutes so 2880 divided by 1440 mins so 2880 minutes is 2 days." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7856082,"math_prob":0.98616815,"size":2239,"snap":"2023-40-2023-50","text_gpt3_token_len":613,"char_repetition_ratio":0.18434004,"word_repetition_ratio":0.13963965,"special_character_ratio":0.31129968,"punctuation_ratio":0.11965812,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99526286,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-09T00:48:58Z\",\"WARC-Record-ID\":\"<urn:uuid:409552a0-a29d-4ac2-85eb-19a1d7ba282b>\",\"Content-Length\":\"36960\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:69e3d5ed-3259-4d70-8fa9-06f94af59843>\",\"WARC-Concurrent-To\":\"<urn:uuid:706e7f5a-dcbe-4c3e-9b45-431f7e76f5bf>\",\"WARC-IP-Address\":\"68.183.16.111\",\"WARC-Target-URI\":\"https://onlinecalculator.guide/minutes-to-days/\",\"WARC-Payload-Digest\":\"sha1:FMFVPQK3YQ6KKUFCJ2IFC5CV3S7BS64F\",\"WARC-Block-Digest\":\"sha1:ZJEDVDYF2AXJO7SNEFJTTZQKLV2ICGGM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100781.60_warc_CC-MAIN-20231209004202-20231209034202-00416.warc.gz\"}"}
https://www.colorhexa.com/81ffd1
[ "# #81ffd1 Color Information\n\nIn a RGB color space, hex #81ffd1 is composed of 50.6% red, 100% green and 82% blue. Whereas in a CMYK color space, it is composed of 49.4% cyan, 0% magenta, 18% yellow and 0% black. It has a hue angle of 158.1 degrees, a saturation of 100% and a lightness of 75.3%. #81ffd1 color hex could be obtained by blending #ffffff with #03ffa3. Closest websafe color is: #99ffcc.\n\n• R 51\n• G 100\n• B 82\nRGB color chart\n• C 49\n• M 0\n• Y 18\n• K 0\nCMYK color chart\n\n#81ffd1 color description : Very light cyan - lime green.\n\n# #81ffd1 Color Conversion\n\nThe hexadecimal color #81ffd1 has RGB values of R:129, G:255, B:209 and CMYK values of C:0.49, M:0, Y:0.18, K:0. Its decimal value is 8519633.\n\nHex triplet RGB Decimal 81ffd1 `#81ffd1` 129, 255, 209 `rgb(129,255,209)` 50.6, 100, 82 `rgb(50.6%,100%,82%)` 49, 0, 18, 0 158.1°, 100, 75.3 `hsl(158.1,100%,75.3%)` 158.1°, 49.4, 100 99ffcc `#99ffcc`\nCIE-LAB 92.037, -45.717, 11.27 56.318, 80.787, 72.944 0.268, 0.385, 80.787 92.037, 47.085, 166.152 92.037, -55.445, 24.693 89.881, -45.448, 14.8 10000001, 11111111, 11010001\n\n# Color Schemes with #81ffd1\n\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #ff81af\n``#ff81af` `rgb(255,129,175)``\nComplementary Color\n• #81ff92\n``#81ff92` `rgb(129,255,146)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #81eeff\n``#81eeff` `rgb(129,238,255)``\nAnalogous Color\n• #ff9281\n``#ff9281` `rgb(255,146,129)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #ff81ee\n``#ff81ee` `rgb(255,129,238)``\nSplit Complementary Color\n• #ffd181\n``#ffd181` `rgb(255,209,129)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #d181ff\n``#d181ff` `rgb(209,129,255)``\n• #afff81\n``#afff81` `rgb(175,255,129)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #d181ff\n``#d181ff` `rgb(209,129,255)``\n• #ff81af\n``#ff81af` `rgb(255,129,175)``\n• #35ffb5\n``#35ffb5` `rgb(53,255,181)``\n• #4effbe\n``#4effbe` `rgb(78,255,190)``\n• #68ffc8\n``#68ffc8` `rgb(104,255,200)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #9bffda\n``#9bffda` `rgb(155,255,218)``\n• #b4ffe4\n``#b4ffe4` `rgb(180,255,228)``\n• #ceffed\n``#ceffed` `rgb(206,255,237)``\nMonochromatic Color\n\n# Alternatives to #81ffd1\n\nBelow, you can see some colors close to #81ffd1. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #81ffb2\n``#81ffb2` `rgb(129,255,178)``\n• #81ffbc\n``#81ffbc` `rgb(129,255,188)``\n• #81ffc7\n``#81ffc7` `rgb(129,255,199)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #81ffdc\n``#81ffdc` `rgb(129,255,220)``\n• #81ffe6\n``#81ffe6` `rgb(129,255,230)``\n• #81fff1\n``#81fff1` `rgb(129,255,241)``\nSimilar Colors\n\n# #81ffd1 Preview\n\nThis text has a font color of #81ffd1.\n\n``<span style=\"color:#81ffd1;\">Text here</span>``\n#81ffd1 background color\n\nThis paragraph has a background color of #81ffd1.\n\n``<p style=\"background-color:#81ffd1;\">Content here</p>``\n#81ffd1 border color\n\nThis element has a border color of #81ffd1.\n\n``<div style=\"border:1px solid #81ffd1;\">Content here</div>``\nCSS codes\n``.text {color:#81ffd1;}``\n``.background {background-color:#81ffd1;}``\n``.border {border:1px solid #81ffd1;}``\n\n# Shades and Tints of #81ffd1\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #000b07 is the darkest color, while #f7fffc is the lightest one.\n\n• #000b07\n``#000b07` `rgb(0,11,7)``\n• #001f14\n``#001f14` `rgb(0,31,20)``\n• #003320\n``#003320` `rgb(0,51,32)``\n• #00462d\n``#00462d` `rgb(0,70,45)``\n• #005a39\n``#005a39` `rgb(0,90,57)``\n• #006d45\n``#006d45` `rgb(0,109,69)``\n• #008152\n``#008152` `rgb(0,129,82)``\n• #00955e\n``#00955e` `rgb(0,149,94)``\n• #00a86b\n``#00a86b` `rgb(0,168,107)``\n• #00bc77\n``#00bc77` `rgb(0,188,119)``\n• #00cf84\n``#00cf84` `rgb(0,207,132)``\n• #00e390\n``#00e390` `rgb(0,227,144)``\n• #00f79d\n``#00f79d` `rgb(0,247,157)``\n• #0bffa6\n``#0bffa6` `rgb(11,255,166)``\n``#1fffad` `rgb(31,255,173)``\n• #33ffb4\n``#33ffb4` `rgb(51,255,180)``\n• #46ffbc\n``#46ffbc` `rgb(70,255,188)``\n• #5affc3\n``#5affc3` `rgb(90,255,195)``\n• #6dffca\n``#6dffca` `rgb(109,255,202)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\n• #95ffd8\n``#95ffd8` `rgb(149,255,216)``\n• #a8ffdf\n``#a8ffdf` `rgb(168,255,223)``\n• #bcffe6\n``#bcffe6` `rgb(188,255,230)``\n• #cfffee\n``#cfffee` `rgb(207,255,238)``\n• #e3fff5\n``#e3fff5` `rgb(227,255,245)``\n• #f7fffc\n``#f7fffc` `rgb(247,255,252)``\nTint Color Variation\n\n# Tones of #81ffd1\n\nA tone is produced by adding gray to any pure hue. In this case, #bbc5c1 is the less saturated color, while #81ffd1 is the most saturated one.\n\n• #bbc5c1\n``#bbc5c1` `rgb(187,197,193)``\n• #b6cac3\n``#b6cac3` `rgb(182,202,195)``\n• #b1cfc4\n``#b1cfc4` `rgb(177,207,196)``\n``#add3c5` `rgb(173,211,197)``\n• #a8d8c7\n``#a8d8c7` `rgb(168,216,199)``\n• #a3ddc8\n``#a3ddc8` `rgb(163,221,200)``\n• #9ee2c9\n``#9ee2c9` `rgb(158,226,201)``\n• #99e7ca\n``#99e7ca` `rgb(153,231,202)``\n• #94eccc\n``#94eccc` `rgb(148,236,204)``\n• #90f0cd\n``#90f0cd` `rgb(144,240,205)``\n• #8bf5ce\n``#8bf5ce` `rgb(139,245,206)``\n``#86fad0` `rgb(134,250,208)``\n• #81ffd1\n``#81ffd1` `rgb(129,255,209)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #81ffd1 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.53011185,"math_prob":0.8339568,"size":3712,"snap":"2020-24-2020-29","text_gpt3_token_len":1606,"char_repetition_ratio":0.13565265,"word_repetition_ratio":0.011029412,"special_character_ratio":0.5280172,"punctuation_ratio":0.22954546,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9842384,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-05T08:09:52Z\",\"WARC-Record-ID\":\"<urn:uuid:3ef254e7-7412-42e1-95b0-cc977dbc5f42>\",\"Content-Length\":\"36345\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8ed4f686-e609-48fb-98c4-d64bbb674af9>\",\"WARC-Concurrent-To\":\"<urn:uuid:3d038321-6b32-4f85-8270-1c197f6bfa11>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/81ffd1\",\"WARC-Payload-Digest\":\"sha1:VDTSJUEHUMSHCTBHOGFEOVW6WSNAXGFF\",\"WARC-Block-Digest\":\"sha1:KLV4GBZQLQEGFI67YKZ7PDXGTDFDHNC6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655887046.62_warc_CC-MAIN-20200705055259-20200705085259-00272.warc.gz\"}"}
https://shpenkov.com/
[ " George P. Shpenkov\nThe Wave Model, developing by the author, led to fundamental discoveries in physics (link)\n\n### News!\n\nREVIEW OF MAIN DISCOVERIES\nOF\nWAVE MODEL THEORIES\n\n(Book in Russian, PDF --- VIDEO)", null, "Most scientists are fully convinced that the hydrogen atom is described quite well by the Schrödinger wave function. But throughout the existence of quantum mechanics (QM), the\n\nThree-dimensional distribution of extrema of Schrödinger\nY-functions has never been presented.\nWhy?\n\nLet us turn to the example. Following QM, the density of probability of the presence of a single electron in the hydrogen atom, at every point and at every instant, is proportional to", null, ". Therefore, at l = 1 and m = 0, extremes of", null, "are in two polar points s1 and s2, i.e., on the extreme radial sphere determined by the solutions of the radial equation for the radial function R1(r).", null, "The surface", null, "(a) and corresponding to it two polar extremes s1 and s2 (b) of", null, "on the radial sphere R1(r);\np is the proton.\n\nObviously, transitions of the electron between two points, s1 and s2, separated by the equatorial plane of the zero probability, are impossible. We arrive at the fact that with the equal probability the electron can be either in s1 and s2. It means that the electron (being in the state determined by the quantum numbers l = 1 and m = 0) \"hangs\" above the \"north\" or \"south\" poles of the proton surface, forming together with the proton an electric dipole directed along the polar z-axis, and its orbital (magnetic and mechanical) moments are equal to zero.\n\nObviously, such a structure of the hydrogen atom,\noriginated from the QM interpretation, is inconsistent with experiment.\nThe similar inconsistency is inherent in all other functions with different quantum numbers l and m.\n\nAccording to the Wave Model\n\nwe developed to replace the Standard Model, true atoms are only the simplest hydrogen atoms, to which we refer proton, neutron and protium. The remaining atoms presented in the Periodic Table are elementary molecules of the above hydrogen atoms. They have the shell-nodal structure.\n\nThe simplest schematic view of the carbon atom", null, "" ]
[ null, "https://shpenkov.com/images/book6.jpg", null, "https://shpenkov.com/formul/1.gif", null, "https://shpenkov.com/formul/2.gif", null, "https://shpenkov.com/images/main_1.gif", null, "https://shpenkov.com/formul/3.gif", null, "https://shpenkov.com/formul/1.gif", null, "https://shpenkov.com/images/main_2.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9303559,"math_prob":0.9817397,"size":1917,"snap":"2023-40-2023-50","text_gpt3_token_len":416,"char_repetition_ratio":0.121275485,"word_repetition_ratio":0.012578616,"special_character_ratio":0.20918101,"punctuation_ratio":0.10497238,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9839171,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,3,null,10,null,5,null,5,null,5,null,10,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T17:54:17Z\",\"WARC-Record-ID\":\"<urn:uuid:dabdaa24-1653-4540-a86e-3266b42801b6>\",\"Content-Length\":\"21064\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6ed0bfc9-3c7b-4ff7-9430-195373dc6fdc>\",\"WARC-Concurrent-To\":\"<urn:uuid:7fd1672d-150d-4ef9-ad27-33d3134cb591>\",\"WARC-IP-Address\":\"195.78.67.14\",\"WARC-Target-URI\":\"https://shpenkov.com/\",\"WARC-Payload-Digest\":\"sha1:OJCVDYG2YJY34JW7OLR3FD33VSHXCDPO\",\"WARC-Block-Digest\":\"sha1:AIVDOJUE2QZOQZX3XXIGUKBMJGQR2NMA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511170.92_warc_CC-MAIN-20231003160453-20231003190453-00230.warc.gz\"}"}
https://bibbase.org/network/publication/kaminski-bryson-schmidt-discretesquarerootfilteringasurveyofcurrenttechniques
[ "Discrete Square Root Filtering: A Survey of Current Techniques. Kaminski, P. G., Bryson, A. E., & Schmidt, S. F. Volume 16 .\nThe conventional Kalman approach to discrete filtering involves propagation of a state estimate and an error covariance matrix from stage to stage. Alternate recursive relationships have been developed to propagate a state estimate and a square root error covariance instead. Although equivalent algebraically to the conventional approach, the square root filters exhibit improved numerical characteristics, particularly in ill-conditioned problems. In this paper, current techniques in square root filtering are surveyed and related by applying a duality association. Four efficient square root implementations are suggested, and compared with three common conventional implementations in terms of computational complexity and precision. The square root computational burden should not exceed the conventional by more than 50 percent in most practical problems. An examination of numerical conditioning predicts that the square root approach can yield twice the effective precision of the conventional filter in ill-conditioned problems. This prediction is verified in two examples. The excellent numerical characteristics and reasonable computation requirements of the square root approach make it a viable alternative to the conventional filter in many applications, particularly when computer word length is limited, or the estimation problem is badly conditioned.\n@book{kaminskiDiscreteSquareRoot1971,\ntitle = {Discrete {{Square Root Filtering}}: {{A Survey}} of {{Current Techniques}}},\nvolume = {16},\nisbn = {0018-9286 VO - 16},\nabstract = {The conventional Kalman approach to discrete filtering involves propagation of a state estimate and an error covariance matrix from stage to stage. Alternate recursive relationships have been developed to propagate a state estimate and a square root error covariance instead. Although equivalent algebraically to the conventional approach, the square root filters exhibit improved numerical characteristics, particularly in ill-conditioned problems. In this paper, current techniques in square root filtering are surveyed and related by applying a duality association. Four efficient square root implementations are suggested, and compared with three common conventional implementations in terms of computational complexity and precision. The square root computational burden should not exceed the conventional by more than 50 percent in most practical problems. An examination of numerical conditioning predicts that the square root approach can yield twice the effective precision of the conventional filter in ill-conditioned problems. This prediction is verified in two examples. The excellent numerical characteristics and reasonable computation requirements of the square root approach make it a viable alternative to the conventional filter in many applications, particularly when computer word length is limited, or the estimation problem is badly conditioned.},\npagetotal = {727–736},\nnumber = {6},\ndate = {1971},\nauthor = {Kaminski, Paul G. and Bryson, Arthur E. and Schmidt, Stanley F.},\nfile = {/home/dimitri/Nextcloud/Zotero/storage/IPTEI89Z/Kaminski, Bryson, Schmidt - 1971 - Discrete Square Root Filtering A Survey of Current Techniques.pdf},\ndoi = {10.1109/TAC.1971.1099816}\n}" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86091644,"math_prob":0.9418201,"size":8242,"snap":"2021-43-2021-49","text_gpt3_token_len":1715,"char_repetition_ratio":0.13462006,"word_repetition_ratio":0.8498943,"special_character_ratio":0.21936423,"punctuation_ratio":0.19293079,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97569126,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-11-29T02:53:16Z\",\"WARC-Record-ID\":\"<urn:uuid:2d070eb4-aeee-4507-a456-5136fb2d62f5>\",\"Content-Length\":\"16647\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3b22197f-ae89-49cb-9986-8763bd79b857>\",\"WARC-Concurrent-To\":\"<urn:uuid:ab8690fd-7f5e-43b7-a801-4bbb94824054>\",\"WARC-IP-Address\":\"54.213.41.230\",\"WARC-Target-URI\":\"https://bibbase.org/network/publication/kaminski-bryson-schmidt-discretesquarerootfilteringasurveyofcurrenttechniques\",\"WARC-Payload-Digest\":\"sha1:UNYEO2QUGOAPFQWZCRMVTCX2XXSU5QJG\",\"WARC-Block-Digest\":\"sha1:KIUMACGWMUPAKKFBZNDIP27ZRHYXS2X3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964358685.55_warc_CC-MAIN-20211129014336-20211129044336-00070.warc.gz\"}"}
https://www.otago.ac.nz/courses/papers/index.html?papercode=MATH304
[ "# MATH304 Partial Differential Equations\n\nDue to COVID-19 restrictions, a selection of on-campus papers will be made available via distance and online learning for eligible students.\nFind out which papers are available and how to apply on our COVID-19 website\n\nIntroduction to the theory of partial differential equations by discussing the main examples (Laplace equation, heat equation, wave equation and transport equations) and their applications.\n\nDifferential equations are a fundamental mathematical tool for the study of systems that change over time and are used in most areas of science, engineering and mathematics.\n\nPaper title Partial Differential Equations MATH304 Mathematics 0.15 18 points Semester 2 (On campus) \\$913.95 \\$4,073.40\nPrerequisite\nMATH 202 and MATH 203 and (COMO 204 or MATH 262)\nRestriction\nMATH 362\nRecommended Preparation\nMATH 301\nSchedule C\nArts and Music, Science\nEligibility\nThis paper is particularly relevant for students majoring in Mathematics, Statistics, Zoology, Economics, Design or any other field in which the natural world is being modelled by differential equations.\nContact\nfbeyer@maths.otago.ac.nz\nTeaching staff\nDr Florian Beyer\nPaper Structure\nMain topics:\n• The transport equation (initial value problem, characteristics)\n• The Poisson equation (harmonic functions, mean value theorem for harmonic functions, maximum principle, Green's function, boundary value problem)\n• The wave equation (d'Alembert formula, energy methods, domain of dependence, finite propagation speed, Initial boundary value problem)\n• Non-linear first order PDE (characteristics, conservation laws, shocks)\nTeaching Arrangements\nFive lectures a fortnight\nOne tutorial per week.\nTextbooks\nLecture Notes: Lecture notes will be made available chapter-by-chapter during the semester on the resource webpage. These lecture notes are the main reference for this paper.\n\nBook: Partial differential equations/Lawrence C. Evans (on reserve in the library).\nCourse outline\nView course outline for MATH 304\nCritical thinking.\nLearning Outcomes\nDemonstrate in-depth understanding of the central concepts and theories.\n\n## Timetable\n\n### Semester 2\n\nLocation\nDunedin\nTeaching method\nThis paper is taught On Campus\nLearning management system\nOther\n\n#### Lecture\n\nStream Days Times Weeks\nAttend\nA1 Tuesday 11:00-11:50 28-34, 36-41\nThursday 09:00-09:50 28-34, 36-41\nFriday 10:00-10:50 29, 31, 33, 36, 38, 40\n\n#### Tutorial\n\nStream Days Times Weeks\nAttend\nA1 Tuesday 16:00-16:50 28-34, 36-41\n\nIntroduction to the theory of partial differential equations by discussing the main examples (Laplace equation, heat equation, wave equation and transport equations) and their applications.\n\nDifferential equations are a fundamental mathematical tool for the study of systems that change over time and are used in most areas of science, engineering and mathematics.\n\nPaper title Partial Differential Equations MATH304 Mathematics 0.15 18 points Semester 2 (On campus) Tuition Fees for 2022 have not yet been set Tuition Fees for international students are elsewhere on this website.\nPrerequisite\nMATH 202 and MATH 203 and (COMO 204 or MATH 262)\nRestriction\nMATH 362\nRecommended Preparation\nMATH 301\nSchedule C\nArts and Music, Science\nEligibility\nThis paper is particularly relevant for students majoring in Mathematics, Statistics, Zoology, Economics, Design or any other field in which the natural world is being modelled by differential equations.\nContact\nfbeyer@maths.otago.ac.nz\nTeaching staff\nDr Florian Beyer\nPaper Structure\nMain topics:\n• The transport equation (initial value problem, characteristics)\n• The Poisson equation (harmonic functions, mean value theorem for harmonic functions, maximum principle, Green's function, boundary value problem)\n• The wave equation (d'Alembert formula, energy methods, domain of dependence, finite propagation speed, Initial boundary value problem)\n• Non-linear first order PDE (characteristics, conservation laws, shocks)\nTeaching Arrangements\nFive lectures a fortnight\nOne tutorial per week.\nTextbooks\nLecture Notes: Lecture notes will be made available chapter-by-chapter during the semester on the resource webpage. These lecture notes are the main reference for this paper.\n\nBook: Partial differential equations/Lawrence C. Evans (on reserve in the library).\nCourse outline\nView course outline for MATH 304\nCritical thinking.\nLearning Outcomes\nDemonstrate in-depth understanding of the central concepts and theories.\n\n## Timetable\n\n### Semester 2\n\nLocation\nDunedin\nTeaching method\nThis paper is taught On Campus\nLearning management system\nOther\n\n#### Lecture\n\nStream Days Times Weeks\nAttend\nA1 Tuesday 11:00-11:50 28-34, 36-41\nThursday 09:00-09:50 28-34, 36-41\nFriday 10:00-10:50 29, 31, 33, 36, 38, 40\n\n#### Tutorial\n\nStream Days Times Weeks\nAttend\nA1 Tuesday 16:00-16:50 28-34, 36-41" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.79655766,"math_prob":0.89726967,"size":4698,"snap":"2021-31-2021-39","text_gpt3_token_len":1056,"char_repetition_ratio":0.11163187,"word_repetition_ratio":0.8872621,"special_character_ratio":0.21413368,"punctuation_ratio":0.10943913,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97260576,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-22T19:54:05Z\",\"WARC-Record-ID\":\"<urn:uuid:0a722a6d-09fd-4bd2-b200-8e50aefcb3a9>\",\"Content-Length\":\"47176\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4bafbca5-7bf0-49cd-92c1-8f9afc43b76c>\",\"WARC-Concurrent-To\":\"<urn:uuid:2161dd7b-30e4-47c3-a757-58a9c13fbcd0>\",\"WARC-IP-Address\":\"139.80.135.136\",\"WARC-Target-URI\":\"https://www.otago.ac.nz/courses/papers/index.html?papercode=MATH304\",\"WARC-Payload-Digest\":\"sha1:SEQKUGPQT4GDS64Q5LS3U3PYCFZFWHGM\",\"WARC-Block-Digest\":\"sha1:4BUGQIYMW2G3ZSSPR6JDQHTB4LEUXEKD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057388.12_warc_CC-MAIN-20210922193630-20210922223630-00220.warc.gz\"}"}
https://keiapl.info/intro14/
[ "# Intro14\n\n14. Partitions\n\nThe function sum=: +/ applies to an entire list argument;\nto compute partial sums or subtotals,\nit is necessary to apply it to each prefix of the argument. For example:\n\n``` sum=: +/\na=: 1 2 3 4 5 6\n(sum a) ; (sum a)\n+--+--------------+\n|21|1 3 6 10 15 21|\n+--+--------------+\n```\n\nThe symbol denotes the prefix adverb,\nwhich applies its argument (in this case sum)\nto each prefix of the eventual argument. The adverb . applies\nsimilarly to suffixes:\n\n``` sum. a\n21 20 18 15 11 6\n```\n\nThe monad < simply boxes its arguments,\nand the verbs < and <. therefore show\nthe effects of partitions with great clarity. For example:\n\n``` <1 2 3\n+-----+\n|1 2 3|\n+-----+\n(<1),(<1 2),(<1 2 3)\n+-+---+-----+\n|1|1 2|1 2 3|\n+-+---+-----+\n< a\n+-+---+-----+-------+---------+-----------+\n|1|1 2|1 2 3|1 2 3 4|1 2 3 4 5|1 2 3 4 5 6|\n+-+---+-----+-------+---------+-----------+\n<. a\n+-----------+---------+-------+-----+---+-+\n|1 2 3 4 5 6|2 3 4 5 6|3 4 5 6|4 5 6|5 6|6|\n+-----------+---------+-------+-----+---+-+\n```\n\nThe oblique adverb /. partitions a table\nalong diagonal lines. Thus:\n\n``` </. t=: 1 2 1 */ 1 3 3 1\n+-+---+-----+-----+---+-+\n|1|3 2|3 6 1|1 6 3|2 3|1|\n+-+---+-----+-----+---+-+\nt ; (sum/. t) ; (10 #. sum/. t) ; (121*1331)\n+-------+-------------+------+------+\n|1 3 3 1|1 5 10 10 5 1|161051|161051|\n|2 6 6 2| | | |\n|1 3 3 1| | | |\n+-------+-------------+------+------+\n```\n\nExercises\n\n14.1   Define programs analogous to sum=:+/ for\nprogressive products, progressive maxima, and progressive minima.\n\n14.1   Treat the following programs and comments like those of\nSection 12, that is, as exercises in reading and writing.\nExperiment with expressions such as c pol x and c pp d\nand (c pp d) pol x with c=:1 3 3 1\nand d=:1 2 1 and x=:i.5 .\nSee the dictionary or Section 20\nfor the use of rank:\n\n pol=: +/@([*]^i.@#@[)\"1 0 Polynomial pp=: +//.@(*/) Polynomial product pp11=: 1 1&pp Polynomial product by 1 1 pp11 d pp11^:5 (1) ps=: +/@,: Polynomial sum" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.59814036,"math_prob":0.9822533,"size":1761,"snap":"2023-40-2023-50","text_gpt3_token_len":668,"char_repetition_ratio":0.25896415,"word_repetition_ratio":0.006451613,"special_character_ratio":0.56956273,"punctuation_ratio":0.13276836,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9839187,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-04T00:03:09Z\",\"WARC-Record-ID\":\"<urn:uuid:598caed3-9be9-447a-9942-22893b9ab187>\",\"Content-Length\":\"88950\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4e940ae-7926-46a9-a0ea-bc81e80c04a4>\",\"WARC-Concurrent-To\":\"<urn:uuid:95405c20-9d28-4953-b256-29682849d097>\",\"WARC-IP-Address\":\"104.21.23.56\",\"WARC-Target-URI\":\"https://keiapl.info/intro14/\",\"WARC-Payload-Digest\":\"sha1:FMEEX4LTH5EHI6DLG22CEVQPBMIWSLCQ\",\"WARC-Block-Digest\":\"sha1:4U4LLV42WT3ZRXP3JDVFPRKMDSUDGWNR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511284.37_warc_CC-MAIN-20231003224357-20231004014357-00833.warc.gz\"}"}
https://www.clocktower.fr/riddles/used/16292013f8738c6
[ "# vectors college physics\n\nDownload Full PDF Package. College Physics Rapid Learning Series. College Physics, 11th Edition. Topics include units and measurement, vectors, linear kinematics and dynamics, energy, power, momentum, fluid mechanics, and heat. To see this, let O and P be the tail and head of the vector A. The use of force vectors and their components to predict the acceleration of an object. \"College Physics MCQ\" app helps to solve physics multiple choice questions from every chapter, comparing with answer key after . 0 b.\n\nare vectors. These are vector quantities. Vectors are represented graphically by arrows. Vector Direction. The sum points from the tail of the first to the head of the last. 2. A vector is any quantity with both magnitude and direction. Adding components of vectors to find the resultant. Now we solve an example and see how we use this technique. A block is pulled out with the force of 10 N forming an angle of 37 o to the horizontal as shown in the Figure. Note that if both a and b are unit vectors, then kakkbk= 1, and ab = cos . Test your understanding of Vectors with these 10 questions.\n\nTo schedule a private tutoring lesson with Paul, send an . . All vectors have a length, called the magnitude, which represents some quality of interest so that the vector may be compared to another vector. 10th Edition. 6. 7. By combining trusted author content with digital tools developed to engage students and emulate the office-hour experience, Mastering personalizes learning and improves results for each student. Conceptual ideas develop logically and sequentially, ultimately leading into the mathematics of the topics. The following Concept Builders target concepts associated with Vectors and Projectiles. Properties of Vector Addition Get FREE 7-day instant eTextbook access! College Physics Supplementary Handout 1: Review Vectors and Coulomb Force . The College Physics 1 (beta) course is an algebra-based Physics course covering classical mechanics, work, energy, sound, fluid Statics and dynamics, and thermodynamics. For beginning learners, we suggest using one or both of the PhET Teacher-Contributed Lessons (see links directly below) 6 . Download Download PDF. In this case, R is the resulting vector, and A and B are at an angle to each other. ISBN: 9781305367395. HTML 5 apps to add and subtract vectors are included. The sum or the total vector is often called the resultant vector. College Physics I. In introductory physics, vectors are Euclidean quantities that have geometric representations as arrows in one dimension (in a line), in two dimensions (in a plane), or in three dimensions (in space). The components of B B are the negatives of the components of B. See Fig. Physics Midterm Vocab 54 Terms. Distance is an example of a scalar quantity. Other examples of vectors include a velocity of 90 km/h east and a force of 500 newtons straight down. Two vectors of the same magnitude are added; one pointing east, one west. 2. The only program that satisfies the conceptual nature of AP Physics 1 in a fully inclusive program with unmatched resources. \"College Physics, \" Second Edition is accompanied by MasteringPhysics(TM)-the most advanced, educationally effective, and widely used online physics tutorial and homework system in the world. sarahlang25. A key component of College Physics: A Strategic Approach is the accompanying student workbook. This video best matches the IGCSE and A-level content required by your Physics course. This updated Eleventh Edition of COLLEGE PHYSICS helps students master physical concepts, improve their problem-solving skills, and enrich their understanding of the world around them. A quantity that has neither magnitude nor direction. Calculate the magnitude of momentum of the moved ball. Symbolically, they are represented by hats (^). B) III and IV only.\n\nClass 11 Physics (India) Unit: Vectors (Prerequisite) Vector basics Learn the basics of vectors, like that a vector has both magnitude and direction. 2-D motion. College Physics - 10th edition. 2 Motion Along a Straight Line. Don't we all wish that adding vectors was that easy. Forces and . 245 Pages. Each lesson includes informative graphics, occasional animations and videos, and Check Your Understanding sections that allow the user to practice what is taught. The difference in two scalar quantities = large value - small value. Serway/Vuille provides a consistent problem-solving strategy and an unparalleled array of worked examples to help students develop a true understanding of physics. While physics can seem challenging, its true quality is the sheer simplicity of fundamental physical theories--theories and concepts that can enrich your view of the world around you. vector is any quantity with both magnitude and direction. Scalars I Scalars are physical quantities without direction. . This rich-media course will teach you the entire year of general physics in 24 chapters of visual contents, including core tutorials, problem drills and review sheets. Vectors are represented graphically . The direction of a vector in one-dimensional motion is given simply by a plus size 12 { \\ ( + \\) } {} or minus size 12 { \\ ( - \\) } {} sign. Thus, the method for the subtraction of vectors using perpendicular components is identical to that for addition. The magnitude, angle, and x/y components of each vector are automatically displayed in several formats. The text is grounded in real-world examples to help students grasp . Tema 1 y 2: Capitulo 5 52 Terms. College physics quiz app with free download to install is a complete physics app (iOS) to practice 600+ physics quiz based MCQs. You can find this direction using a protractor: place the center of the protractor at the vertex of the angle and measure the angle formed between the two vectors. For subtracting a vector, simply rotate it 180 o. . For drawing two vectors starting on the dots that point downward, where the vector for block 1 is smaller than the vector for block 2 and both are labeled as the gravitational force (decompose all vectors in x- and y- components) 2/1/11 Physics 231 Spring 2011 3 In the language of mathematics, physical vector quantities are represented by mathematical objects called vectors ( Figure 2.2 ). Several problems and questions with solutions and detailed explanations are included. So, in general if you want to find the cosine of the angle between two vectors a and b, first compute the unit vectors a and b in the directions of a . Read Paper. Vectors are geometric representations of magnitude and direction which are often represented by straight arrows, starting at one point on a coordinate axis and ending at a different point. Bundle: College Physics, Loose-Leaf Version, 10th, + WebAssign Printed Access Card for Serway/Vuille's College Physics, 10th Edition, Multi-Term. The use of the mathematical description to find an unknown quantity. sarahlang25. Succeed in your course, improve your problem-solving skills, and enrich your understanding of the world around you with COLLEGE PHYSICS, Eleventh Edition! (sin30 0 =1/2, sin60 0 =3/2, sin53 0 =4/5, cos53 0 =3/5) We use trigonometric equations first and find the components of the vectors then, make addition and . Which of the following are true about vector components for vectors in two dimensions. Vectors and Two-Dimensional Motion. sarahlang25. Vocab Level H Unit 12 20 Terms. Applications of vectors in real life are also discussed. Treat 2D motion as 2 separate problems, one for x-direction and one for y-direction. Add, subtract vectors. 1 Models, Measurements, and Vectors. The result of adding two or more vectors; vector sum. It is drawn from the tail of the first vector to the tip of the . College Physics for the AP Physics 1 Course is the first textbook to integrate AP skill-building and exam prep into a comprehensive college-level textbook, providing students and teachers with the resources they need to be successful in AP Physics 1. Scalars I Scalars are physical quantities without direction. Other examples of vectors include a velocity of 90 km/h east and a force of 500 newtons straight down. The direction of a vector in one-dimensional motion is given simply by a plus size 12 { \\ ( + \\) } {} or minus size 12 { \\ ( - \\) } {} sign. The quizzes that follow each of the lessons can help you gauge your comprehension of the materials. . Calculate the magnitude of. Master Physics The Easy and Rapid Way with Core Concept Tutorials, Problem-Solving Drills and Super Review Cheat Sheets. Key Topics: Representing Motion, Motion in One Dimension, Vectors and Motion In Two Dimensions, Forces and Newton's Laws of Motion, Applying Newton's Laws . Close.\n\nIt takes students from vectors to thermodynamics to applied nuclear physics, teaching effective problem-solving skills. We can represent vectors graphically as arrows and then the sum of two vectors is found (graphically) by joining the head of one to the tail of the other and then connecting head to 1. Emphasis is placed on understanding through problem solving. Vectors are a component part of physics in much the same way as sentences are a component part of literature. 1.\n\nscalar product: A.B = magnitude of A * magnitude of B * cos (t) where t is the angle between the two vectors A and B. sum A+B = (i+a,j+b,k+c) (this is a new vector, the scalar product . Given two vectors with components A = (i,j,k) and B = (a,b,c) magnitude. For more information on the Associate of Arts degree and the Minnesota Transfer Curriculum: The ability to draw a best-fit line. The workbook bridges the gap between textbook and homework problems by providing students the opportunity to learn and practice skills prior to using those skills in quantitative end-of-chapter problems, much as a musician practices technique separately from performance pieces. Ayca Vanli. 1.1.5 Vectors; Vector Addition Many of the quantities we encounter in physics have both magnitude (\"how much\") and direction. Two vectors, A and B are equal if they have the same magnitude and direction, regardless of whether they have the same initial points, as shown in Panel 2. I Examples: 1.mass m, 2.temperature T, 3.pressure p, 4.energy U, 5.time t. Adding Vectors I Vectors may be added geometrically by the \\head-to-tail\" method I Vector A ~is drawn, then vector B is drawn starting its tail at vector A~'s head; their sum Reach every student by pairing this text with Mastering Physics Mastering is the teaching and learning platform that empowers you to reach every student. Two nonparallel vectors always define a plane, and the angle is the angle between the vectors measured in that plane. =+ = + = + ' (3.8) ' '2 a ax ay a x a y Multiplying vectors:-Vector by a scalar:-Vector by a vector: Scalar . COUPON: RENT College Physics 11th edition (9780134876986) and save up to 80% on textbook rentals and 90% on used textbooks. *This course is included as a section within the AP Physics 1 course under this instructor, Paul Kerr. Which of these is a correct definition of a vector quantity? a. velocity b. A list of the major formulas used in vector computations are included. As the results, the block moves 2 m along the horizontal floor. Subtracting Vectors The negative of a vector is a vector of the same magnitude pointing Decompose in components, and add components to obtain total vector. scalar product: A.B = ia + b j + ck. Serway physics 9th. Serway physics 9th. R 2 = A 2 + B 2 + 2ABCos. R = A - B. Compute vectors inclined to each other using the formula below to get the resultant vector. The displacement of the boat from . Click/tap a button and the resultant is drawn. Head-to-Tail Vector Addition.\n\nOther examples of vectors include a velocity of 90 km/h east and a force of 500 newtons straight down. In general, a unit vector has a length (or magnitude) equal to one and is used to indicate direction. The direction of a vector in one-dimensional motion is given simply by a plus (+) or minus () sign. Posted by 8 years ago [College Physics] Vectors. 1. Physics 05-05 Flow Rate and Bernoullis Equation.pdf: 676.17kb; Physics 05-06 The Most General Applications of Bernoullis Equation.pdf: 622.16kb; Physics 05-07 Viscosity, Poiseuilles Law, and Turbulence.pdf: 701.77kb; Physics 06-01 Temperature and Thermal Expansion.pdf: 716.59kb; Physics 06-02 Ideal Gas Law and Kinetic Theory.pdf: 634.59kb Energy. sarahlang25. This angle will be approximately 53 degrees North of the East axis. A vector is any quantity with both magnitude and direction. I Examples: 1.mass m, 2.temperature T, 3.pressure p, 4.energy U, 5.time t. Adding Vectors I Vectors may be added geometrically by the \\head-to-tail\" method I Vector A ~is drawn, then vector B is drawn starting its tail at vector A~'s head; their sum 3 Motion in a Plane. Physics 1 Physics . In mathematics, a unit vector is defined as the ratio between vectors and magnitudes. 1 c. 2 d. 3. Momentum and Collisions. OTHER SETS BY THIS CREATOR. R = A + B. Vectors that are aligned in opposite directions are subtracted from each other to get the final resultant vector. . Representations: Graphical, angle and magnitude, components. Physics Topic IV: Scalars and Vectors Test 40 Terms. The department offers Principles of Physics 1 and 2 as well as General Physics 1 and 2 with a calculus base. College Physics meets standard scope and sequence requirements for a two-semester introductory algebra-based physics course. This interactive model lets students drag vectors onto a grid, change their length and angle, and sum them together. (Choose all that apply) They are parallel to the x and y axes. A vector is any quantity with both magnitude and direction. Vectors are represented graphically by arrows. B=2i+3j-7k B = 2i+ 3j 7k . Components of the vector Let a and b be any two non-zero vectors in a plane with different directions and let A be another vector in the same plane A can be expressed as a sum of two vectors ? Physics Simulations: Vectors and Projectiles Vectors and Projectiles A Concept-Builder is an interactive questioning module that presents learners with carefully crafted questions that target various aspects of a concept. Conceptual ideas develop logically and sequentially, ultimately leading into the mathematics of the topics. Level H Unit 11 20 Terms. Vectors in Physics - College Physics I - Research Guides at University of Arkansas College Physics I Concept Review A few resources to supplement the ideas discussed in the textbook and/or class: Scalars and Vectors Vector Components Unit Vector Velocity and Acceleration Vectors Relative Motion Vectors and Scalars Adding and Subtracting Vectors Learn Intro to vectors and scalars Recognizing vectors Recognizing vectors practice Equivalent vectors Finding the components of a vector Comparing the components of vectors Practice Vectors intro Section 6: Adding Vectors Using Components. Sat Physics subject questions on vectors similar to the questions in the SAT test are presented. [College Physics] Vectors. emilyterrito17. This course and Physics 212 are a one-year calculus-based introduction to the principles of physics and their applications. Horizontal component of vector A x = A * sine () Vertical component of vector A y = A * cosine () PHYSICS 207 Vectors Lab . A vector is any quantity with both magnitude and direction. There are two fundamental definitions. An arrow. Example: Find the resultant vector of A and B given in the graph below. The direction of a vector in one-dimensional motion is given simply by a plus or minus sign. That is, A B A+ (B). This is done by placing the head of the first vector onto the tail of the second. Components are always at 900to each other. The magnitude of the resultant is 5.0 cm. A short summary of this paper. College Physics, 9th Edition, provides a clear strategy for connecting those theories to a consistent problem-solving approach, carefully reinforcing this methodology throughout the text and connecting it to real . Breaking a vector into x and y components. Addition of Vectors The process of addition vectors must take into account both the magnitude and direction of vectors. one obtained by multiplying a by a real number and the other obtained by multiplying b by another real number. Here are the formula's you will need to apply. The course covers all the topics included in the first semester of College Physics and includes formative assessments with scaffolding, and summative assessments at the end of each module. The process is as follows: Place the vectors so as to create the walking path. A boat moves 10 km due west, 5 km due north, and then 10 km due east. Find the velocity and acceleration vectors when given the position vector. vector addition: graphical and components method, resultant vector and addition of multiple vectors. Student workbook. Learning Goal: To use a protractor to determine the direction of a vector and to express the direction using a couple of conventions and to convert direction information from one convention to another. COLLEGE PHYSICS 1 1 of 9 Physical quantities are categorized as either a vector quantity or a scalar quantity." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9128078,"math_prob":0.9135853,"size":26008,"snap":"2022-40-2023-06","text_gpt3_token_len":5693,"char_repetition_ratio":0.1740886,"word_repetition_ratio":0.40964973,"special_character_ratio":0.22158566,"punctuation_ratio":0.12972647,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9945315,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-07T15:18:03Z\",\"WARC-Record-ID\":\"<urn:uuid:051c77e9-cb11-4727-a57e-0be8e0a09426>\",\"Content-Length\":\"45541\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ff695bb8-d86d-4be5-a118-df79696991c3>\",\"WARC-Concurrent-To\":\"<urn:uuid:82cc699c-3fe0-4c1a-a52e-8553abd25488>\",\"WARC-IP-Address\":\"199.59.247.178\",\"WARC-Target-URI\":\"https://www.clocktower.fr/riddles/used/16292013f8738c6\",\"WARC-Payload-Digest\":\"sha1:5LOPNLQVGMCDEU3WHUHCSJAP7TPGYDT3\",\"WARC-Block-Digest\":\"sha1:WBQBNF2W4YGLTNHF2HXXS2Y7ELTUTMJC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030338213.55_warc_CC-MAIN-20221007143842-20221007173842-00002.warc.gz\"}"}
https://antiochinternational.org/pages/prime-factorization-of-2401-36eb28
[ "The next prime number is 13. Step 1: Write each number as a product of its prime factors.This method is called here prime factorization.. HCF By Prime Factorization Method. The next prime numbers 3, 5, 7 and 11 do not divide 13. Find the smallest number by which 2925 must be divided to obtain a perfect square. Therefore, The value of m/n is 7/4. The orange divisor(s) above are the prime factors of the number 240. We write number 2401 above a 2-column table 2. Let us begin with the prime number 3. Factorization in a prime factors tree For the first 5000 prime numbers, this calculator indicates the index of the prime number. 5 ÷ 5 = 1 - No remainder! Solution: Given number is 2,925 Find the value of √(2401) u... maths. Least Common Multiple of 2401 and 2414. It is composed of one prime number multiplied by itself three times. Prime Factorization of 2401 = 7 × 7 × 7 × 7 = So, We have. Since,39 is not divisible by 2. HARD. Least common multiple or lowest common denominator (lcd) can be calculated in two way; with the LCM formula calculation of greatest common factor (GCF), or multiplying the prime factors with the highest exponent factor. We write down on the left side of the table the prime factor and next number to factorize on the ride side 4. The n th prime number is denoted as Prime[n], so Prime = 2, Prime = 3, Prime = 5, and so on. Prime number are numbers that can divide without remainder, This means that 9408 is divisible by 2, 2, 2, 2, 2, 2, 3, 7, 7, numbers. Your guide to the number 2401, an odd composite number. Step 2: Now list the common factors of both the numbers Step 3: The product of all common prime factors is the HCF ( use the lower power of each common factor) Mathematical info, prime factorization, fun facts and numerical data for STEM, education and fun. Factor tree or prime decomposition for 2401. prime factorization calculator or integer factorization of a number is the determination of the set of prime integers which multiply together to give the original integer. Consequently, the prime factorization is We divide 2401 by the smallest possible prime factor 3. find the value of√3tanQ=3sinQ (iii) sin 3x cos 5 x The prime factorization of 2401 = 7 4.See its prime factors … The prime factorization of 2401 = 7 4. 5 is one of the factors! Factors of 2401: By prime factorization of 2401 we follow 5 simple steps: 1. As 2401 is a composite number, we can draw its factor tree: Here is the answer to questions like: Prime factors of 2401 or is 2401 a prime or a composite number? It follows that. It can also be written in exponential form as 2 4 x 3 1 x 5 1. New questions in Math. The number 2401 is a composite number because 2401 can be divided by 1, by itself and at least by 7. The prime factors of 2401 are 7. If we put all of it together we have the factors 2 x 2 x 2 x 2 x 3 x 5 = 240. By comparing both sides, we get. Follow the below-given steps to find the hcf of numbers using prime factorisation method. m = 7 and n = 4 ⇒ m/n = 7/4. Factor Tree. Also, find the square root of the perfect square so obtained? To find the prime factorization of the given integer, perform divisions of that integer by successive primes. Another way to do prime factorization is to use a factor … Answer. It is also known as prime decomposition. Find the value of 2 4 0 1 using prime factorization method. So, it is possible to draw its prime tree. The factors of 4802 are: 1 2 7 14 49 98 343 686 2401 4802 The prime factors are: 2 x 7 x 7 x 7 x 7 What numbers over 100 have exactly 5 factors? 6. the prime factorization of 2,401 is 2,401= 7×7×7×7 And the square root of 2,401 is 49." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8910521,"math_prob":0.9959665,"size":4044,"snap":"2021-04-2021-17","text_gpt3_token_len":1111,"char_repetition_ratio":0.20742574,"word_repetition_ratio":0.02387268,"special_character_ratio":0.2880811,"punctuation_ratio":0.1322691,"nsfw_num_words":2,"has_unicode_error":false,"math_prob_llama3":0.9997961,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-17T02:14:17Z\",\"WARC-Record-ID\":\"<urn:uuid:df7e9cf1-44ed-49cd-a644-f733ca62e57a>\",\"Content-Length\":\"29158\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:27a6da94-427a-4ddb-9ac3-cd2f10691137>\",\"WARC-Concurrent-To\":\"<urn:uuid:9d1fd093-a8d3-4306-a612-75c60bb3eec7>\",\"WARC-IP-Address\":\"138.197.69.163\",\"WARC-Target-URI\":\"https://antiochinternational.org/pages/prime-factorization-of-2401-36eb28\",\"WARC-Payload-Digest\":\"sha1:LCHMJFU3XROMTBIHC2SC64T2UNCRLW6P\",\"WARC-Block-Digest\":\"sha1:65XPVSFL4ILGD7DMH3U7YIDEME66R64L\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703509104.12_warc_CC-MAIN-20210117020341-20210117050341-00568.warc.gz\"}"}
https://numbermatics.com/n/1130626/
[ "# 1130626\n\n## 1,130,626 is an even composite number composed of four prime numbers multiplied together.\n\nWhat does the number 1130626 look like?\n\nThis visualization shows the relationship between its 4 prime factors (large circles) and 24 divisors.\n\n1130626 is an even composite number. It is composed of four distinct prime numbers multiplied together. It has a total of twenty-four divisors.\n\n## Prime factorization of 1130626:\n\n### 2 × 72 × 83 × 139\n\n(2 × 7 × 7 × 83 × 139)\n\nSee below for interesting mathematical facts about the number 1130626 from the Numbermatics database.\n\n### Names of 1130626\n\n• Cardinal: 1130626 can be written as One million, one hundred thirty thousand, six hundred twenty-six.\n\n### Scientific notation\n\n• Scientific notation: 1.130626 × 106\n\n### Factors of 1130626\n\n• Number of distinct prime factors ω(n): 4\n• Total number of prime factors Ω(n): 5\n• Sum of prime factors: 231\n\n### Divisors of 1130626\n\n• Number of divisors d(n): 24\n• Complete list of divisors:\n• Sum of all divisors σ(n): 2010960\n• Sum of proper divisors (its aliquot sum) s(n): 880334\n• 1130626 is a deficient number, because the sum of its proper divisors (880334) is less than itself. Its deficiency is 250292\n\n### Bases of 1130626\n\n• Binary: 1000101000000100000102\n• Base-36: O8EA\n\n### Squares and roots of 1130626\n\n• 1130626 squared (11306262) is 1278315151876\n• 1130626 cubed (11306263) is 1445296346904954376\n• The square root of 1130626 is 1063.3089861371\n• The cube root of 1130626 is 104.1772740843\n\n### Scales and comparisons\n\nHow big is 1130626?\n• 1,130,626 seconds is equal to 1 week, 6 days, 2 hours, 3 minutes, 46 seconds.\n• To count from 1 to 1,130,626 would take you about two weeks!\n\nThis is a very rough estimate, based on a speaking rate of half a second every third order of magnitude. If you speak quickly, you could probably say any randomly-chosen number between one and a thousand in around half a second. Very big numbers obviously take longer to say, so we add half a second for every extra x1000. (We do not count involuntary pauses, bathroom breaks or the necessity of sleep in our calculation!)\n\n• A cube with a volume of 1130626 cubic inches would be around 8.7 feet tall.\n\n### Recreational maths with 1130626\n\n• 1130626 backwards is 6260311\n• The number of decimal digits it has is: 7\n• The sum of 1130626's digits is 19\n• More coming soon!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8547782,"math_prob":0.9815691,"size":2847,"snap":"2020-45-2020-50","text_gpt3_token_len":776,"char_repetition_ratio":0.13190292,"word_repetition_ratio":0.042410713,"special_character_ratio":0.34035826,"punctuation_ratio":0.16970803,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.993832,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-25T19:29:44Z\",\"WARC-Record-ID\":\"<urn:uuid:c02391c3-a699-4d83-8506-a5897c73849e>\",\"Content-Length\":\"18384\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8aab7b72-0466-419e-ac0d-628445e956e8>\",\"WARC-Concurrent-To\":\"<urn:uuid:c4226d6f-5379-4fa2-a199-4d6359fab429>\",\"WARC-IP-Address\":\"72.44.94.106\",\"WARC-Target-URI\":\"https://numbermatics.com/n/1130626/\",\"WARC-Payload-Digest\":\"sha1:C6XRBAXQB6FINHY7HHQYBN65MWFWKA64\",\"WARC-Block-Digest\":\"sha1:DILSAAIW5AE6XHLJN7UUALLHKZ74JYAI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107889651.52_warc_CC-MAIN-20201025183844-20201025213844-00253.warc.gz\"}"}
https://omp.geomar.de/FAQ.html
[ "# FAQ - Frequently asked questions related to OMP analysis\n\nQuestion: Solving a linear system of equations through least squares minimization requires that all parameters are linearly independent. Does the generally assumed linear relationship between nitrate and phosphate known as the Redfield ratio preclude the simultaneous use of both parameters in OMP analysis?\n\nAnswer: It is generally safe to use both nitrate and phosphate in OMP analysis, and in most cases using both parameters rather than only one of them results in information gain. There are a number of reasons for this:\n\n1. Observations are invariably afflicted with instrumental error. This error may already be enough to produce linear independence of the data sets for the two parameters. If the errors are only small, the OMP algorithm recognises this by placing very low weights on the two parameters.\n2. The Redfield ratio is not constant throughout the world ocean. It varies with depth, and more importantly for OMP analysis it varies between water masses. This guarantees linear indepence of all parameters. (It makes the use of a constant Redfield ratio in the expanded OMP analysis questionable; but the method is still developing, and this question will no doubt be addressed by future users. First experience shows that nutrient weights are usually low, so the method is not very sensitive to the choice of the Redfield ratio.)\n3. The method used in the OMP algorithm for finding the least square minimization tests for linear independence of all equations. It eliminates line duplicates automatically and will therefore exclude either nitrate or phosphate from the solution if by chance the two equations are in fact linearly dependent.\n\nQuestion: How can I get a feel for the quality of my OMP result?\n\nAnswer: OMP analysis nearly always returns a result, but it can only be as good as the information which goes into it.\n\n1. The first thing to check is the distribution of the mass residual. Most users place a large weight on mass conservation and therefore can expect small mass residuals. If the mass residual is small for most of the data points, the occurrence of larger mass residuals for some data points can indicate a problem with these data. For example: Your analysis uses 5 water types; all mass residuals are small except those associated with data points which contain a very large contribution from water type 3. This may indicate a problem with the definition of water type 3.\n2. You can follow this up by checking the residuals for individual parameters. If you then find that (say) oxygen shows a large residual for those data with a very large contribution from water type 3 and the other parameters behave normally, this indicates a problem with your oxygen definition of water type 3.\n3. If you find that ALL parameters display large residuals in a particular area of the region under investigation, this probably indicates the presence of another water mass which you did not include in your water mass matrix.\n\nQuestion: How stable is OMP analysis to small perturbations?\n\nAnswer: OMP analysis is surprisingly robust, but it is generally good practice to test the result against small variations in the water type matrix and in the data. A good procedure is to generate a new synthetic data set from the original observations by adding white noise with an amplitude equal to one or two standard deviations and run OMP analysis again. This will show how much the mixing contributions change if the observations are randomly changed by the observed (and therefore realistic) data variability. A similar test should be done by adding white noise with an amplitude of the appropriate one or two standard deviations to the water type matrix. See (4 ) for examples.\n\nQuestion: How is it possible to use the OMP code with n parameters and n+1 water types? Shouldn't this give a fully determined linear system of equations which does not produce residuals?\n\nAnswer: The additional constraint that only positive solutions are accepted (non-negativity constraint) gives an additional degree of freedom, so using n parameters for n+1 water types still produces an optimised solution - but you are really pushing the system to its limits.\n\nQuestion: Why is mass conservation handled in the same way as every other parameter when physical reasoning suggest that mass should be accurately conserved?\n\nAnswer: This is a question of personal choice. On one hand, mass conservation is an elementary physical principle and should be satisfied by any model. On the other hand, OMP analysis is based on the assumption that oceanic mixing is a linear process. (In other words, oceanic diffusion of properties is achieved by turbulence). Mixing products from two water masses therefore can only produce temperature-salinity combinations which are located on the straight line connecting the temperature-salinity combinations of the sources.\n\nIn case of double-diffusion, linear mixing of all properties is not warranted. Salinity and nutrients may have the same mixing behaviour (McDougall and Ruddick, 1992, DSR #39) but temperature will not follow them. If there is a suspicion that double diffuive processes may occur, one has to be careful by using OMP analysis. One way around the problem is to put different weights on temperature and salinity within this regions, insted of using the same (as usually in OMP analysis).\n\nIn any case, there are ways to enforce mass conservation, or at least come close to it. The easiest way is to give mass conservation a much larger weight than any other parameter. This will reduce the mass residuals but not enforce strict mass conservation. The obvious way to enforce mass conservation is to exclude mass conservation from the source water type matrix and replace the unknown x1 by 1 - Sxj, where j = 2, ... n.\n\n© 30 June 1999 OMP analysis user group" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9025428,"math_prob":0.9210976,"size":5855,"snap":"2019-13-2019-22","text_gpt3_token_len":1230,"char_repetition_ratio":0.12493591,"word_repetition_ratio":0.018652849,"special_character_ratio":0.18992314,"punctuation_ratio":0.08206107,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9603333,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-20T16:57:17Z\",\"WARC-Record-ID\":\"<urn:uuid:a7e2251b-13f4-483d-9a00-4d20d84aa418>\",\"Content-Length\":\"6967\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2df84697-3ea2-4b76-960a-f47aca2e8898>\",\"WARC-Concurrent-To\":\"<urn:uuid:3249a6b3-85cc-4bea-9619-5aae9b312e02>\",\"WARC-IP-Address\":\"134.245.208.19\",\"WARC-Target-URI\":\"https://omp.geomar.de/FAQ.html\",\"WARC-Payload-Digest\":\"sha1:ZFN3C2JHN4XJYHX4HHDDAFBX4TAFEPYX\",\"WARC-Block-Digest\":\"sha1:RKXAJHMUUPYVB5P23RX5O4F2KMLFXUGB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232256082.54_warc_CC-MAIN-20190520162024-20190520184024-00524.warc.gz\"}"}
https://web2.0calc.com/questions/number-theory_57773
[ "+0\n\n# number theory\n\n0\n137\n2\n\nFor how many positive integers n less than 100 is 5^n + 8^(n + 1) + 13^(n + 2) + 14^(n + 3) a multiple of 6?\n\nApr 23, 2021\n\n#1\n0\n\n6=2*3, so we need to check if the number is divisible by both 2 and 3.\n\nThe first term will be an odd number, the second term will be even, the third will be odd, and the fourth will be even, and odd+even+odd+even = even, so we don't need to check if it's divisible by 2, because it must be for all positive integers.\n\nThat means we only need to check if it's divisible by 3. Notice that the middle 2 terms will both always leave a remainder of -1 when divided by 3 because 8 is congruent to -1 mod 3 and so is 13.\n\nBecause of that, we only need to check if the sum of the first term and the last term will leave a remainder of 2 when divided by 3, since when that remainder is added to the sum of the remainder of the middle two terms, which is -1 + -1 = -2, the remainder becomes 0 since -2+2 leaves a remainder of 0 when divided by 3.\n\nSince 5 is congruent to (-1) mod 3 and so is 14, n must be even so that the sum of the remainders of the first and last terms is equal to 1+1 = 2, which is congruent to 2 mod 3 (as mentioned before that's what we want). If n is odd, then the sum of the remainder of the first and last terms will be equal to (-1)^(2n+1) + (-1)^(2n+1) = 1 mod 3, which is not what we want.\n\nThere are exactly 49 even numbers under 100, which means that the answer is \\(\\boxed{49}\\)\n\nApr 23, 2021\n#2\n+1\n\nSorry, the previous solution was full of mistakes. here's a better one:\n\n6=2*3, so we need to check if the number is divisible by both 2 and 3.\n\nThe first term will be an odd number, the second term will be even, the third will be odd, and the fourth will be even, and odd+even+odd+even = even, so we don't need to check if it's divisible by 2, because it must be for all positive integers.\n\nThe sum of the first and second terms mod 3 will always be 0 when n is a positive integer because when n is odd the first term will leave a remainder of 2 when divided by 3 and the second term will leave a remainder of 1 divided by 3, and when n is odd the first term will leave a remainder of 1 when divided by 3 and the second term will leave a remainder of 2 divided by 3. (that's because they are both congruent to 2 mod 3, but the powers of the two are always different in terms of parity). Either way, 2+1=3=0 mod 3, so the sum of the first 2 terms will always divide 3.\n\nThe third term will always leave a remainder of 1 when divided by 3, so we need the last term to leave a remainder of 2 when divided by 3. That only happens when n is an even number because n+3 will be odd, and when 14 is taken to a power that is odd, it will always leave a remainder of 2. (The reason behind that is that 14 is congruent to -1 mod 3, which means the remainder alternates between -1 = 3-1 = 2 and 1 mod 3).\n\nThat means that only even numbers work, so 49 is still our answer.\n\ntextot  Apr 24, 2021" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.96237147,"math_prob":0.99679315,"size":2863,"snap":"2021-43-2021-49","text_gpt3_token_len":812,"char_repetition_ratio":0.16719133,"word_repetition_ratio":0.34731543,"special_character_ratio":0.2958435,"punctuation_ratio":0.078431375,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9997907,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-17T19:54:58Z\",\"WARC-Record-ID\":\"<urn:uuid:47f9ebda-5200-4153-b6ba-49abae1bbc92>\",\"Content-Length\":\"24216\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f8978ebc-b698-4e02-83d4-9cbc9dca372a>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc3c4323-ce9f-4d1f-884a-0e127b61f753>\",\"WARC-IP-Address\":\"168.119.149.252\",\"WARC-Target-URI\":\"https://web2.0calc.com/questions/number-theory_57773\",\"WARC-Payload-Digest\":\"sha1:4Q3CUZZLJVZZZRPAZCLRAYDRQE477OO3\",\"WARC-Block-Digest\":\"sha1:Z2GYLGV5YGTXGSFI3TCKHY6QUMZ3CWZK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585181.6_warc_CC-MAIN-20211017175237-20211017205237-00466.warc.gz\"}"}
https://forums.developer.nvidia.com/t/quite-puzzled/133268
[ "# quite puzzled\n\nExcuse me. My code had wrote the \"!\\$acc data copyout(umin,umout) \"and the informational messages also told me that “1204, Generating copyout(umout),Generating copyout(umin)”\nHowever, it is definitely that they were not transfer to my cpu code. (In the kernel with the right result while always be zero outside)\nWell,I just can`t get through it.\n\nHi Kevin,\n\nHowever, it is definitely that they were not transfer to my cpu code. (In the kernel with the right result while always be zero outside)\n\n. Just so I understand, you have copyout of an array but the halo coming back which should be all zero’s has garbage values? copyout doesn’t initialize data on the GPU, hence you must set all values within your compute region. Otherwise, garbage values will be returned for the uninitialized elements. Using “copy” instead will initialize the values.\n\n• Mat\n\nDear Mat,\n\nThanks a lot for your answer. With your explaination of [copy/copyout] I`ve actually soluted the problem that I met in the getu12 subroutine discussed in another topic.While it still won`t get through here.\n\nIt was my fault not making my words clear. I had reset the value within the compute region and indeed got a right value after computation.while when my subroutine come back I got a zero all the time even though I have changed the directive from copyout to copy. So it seems to be Unbelieveable and beyond your help ability?\n\nBut,really why`that? Well,I should left it for the moment.\n\nWould you please tell me any way to deal with a 5 level loops? Right now I add the acc directive like that below. Are there any better suggestion for it? Since I have run the kernel for ki times.\ndo k = ks, ke+2\ndo i = is, ie+2\n!\\$acc data create(dis1,dis2),copyout(AAx1, AAy1, AAz1,AAx2, AAy2, AAz2)\n!\\$acc kernels\nAAx1 = c0\nAAx2 = c0\nAAy1 = c0\nAAy2 = c0\nAAz1 = c0\nAAz2 = c0\ndo n = ks+1, ke+1\ndo m = js+1, je+2\nyele-1\ndo l = is+1, ie+1\ndis1 = sqrt( disx2(i,l) + disy2(js,m) + disz2(k,n) )\ndis2 = sqrt( disx2(i,l) + disy2(je+2yele,m) + disz2(k,n) )\nAAx1 = AAx1 + muf4pi * jx(l,m,n) * dv(m,n) / dis1\nAAx2 = AAx2 + muf4pi * jx(l,m,n) * dv(m,n) / dis2\nAAy1 = AAy1 + muf4pi * jy(l,m,n) * dv(m,n) / dis1\nAAy2 = AAy2 + muf4pi * jy(l,m,n) * dv(m,n) / dis2\nAAz1 = AAz1 + muf4pi * jz(l,m,n) * dv(m,n) / dis1\nAAz2 = AAz2 + muf4pi * jz(l,m,n) * dv(m,n) / dis2\nend do\nend do\nend do\n!\\$acc end kernels\n!\\$acc end data\nAx(i,js,k) = AAx1\nAx(i,je+2\nyele,k) = AAx2\nAy(i,js,k) = AAy1\nAy(i,je+2yele,k) = AAy2\nAz(i,js,k) = AAz1\nAz(i,je+2\nyele,k) = AAz2\nend do\nend do\nThanks a lot anyway.\n\nExcuse me, actually I`ve tried the mirror derective for a change. Still failed at the moment. Probably this time is for my short of knowledge about mirror and reflected.\n\nHi Kevin,\n\nwhile when my subroutine come back I got a zero all the time even though I have changed the directive from copyout to copy. So it seems to be Unbelieveable and beyond your help ability?\n\nWhat would help is to have a small example that reproduces the problem. If you’re unable to create a small example, you can send the code to PGI Customer Service (trs@pgroup.com) and ask them to forward it to me.\n\nAssuming the trip count of the “k” and “i” loop are large, I’d put these two into a 2D gang and then put the inner loops into a vector with a reduction clause. If “k” and “i” are small, move the data region outside of “k”.\n\nAlso, you don’t want to put the “AA” variables in a copyout. Instead, let the compiler create a reduction. By putting “dis1” and “dis2” in a create clause, you’ve promoted them to global scalar variables shared by all threads. This will cause a race condition and wrong answers. Finally, you do want to put you arrays in the data region.\n\nVersion 1 would look something like the following. Though, since I don’t have the full code to test, you may need to make a few changes\n\n``````!\\$acc data copyin(disx2,disy2,disz2,jx,dv), copy(Ax,Ay,Az)\n!\\$acc kernels\n!\\$acc loop collapse(2) gang\ndo k = ks, ke+2\ndo i = is, ie+2\nAAx1 = c0\nAAx2 = c0\nAAy1 = c0\nAAy2 = c0\nAAz1 = c0\nAAz2 = c0\n!\\$acc loop vector reduction(+:AAx1,AAx2,AAy1,AAy2,AAz1,AAz2)\ndo n = ks+1, ke+1\ndo m = js+1, je+2*yele-1\ndo l = is+1, ie+1\ndis1 = sqrt( disx2(i,l) + disy2(js,m) + disz2(k,n) )\ndis2 = sqrt( disx2(i,l) + disy2(je+2*yele,m) + disz2(k,n) )\nAAx1 = AAx1 + muf4pi * jx(l,m,n) * dv(m,n) / dis1\nAAx2 = AAx2 + muf4pi * jx(l,m,n) * dv(m,n) / dis2\nAAy1 = AAy1 + muf4pi * jy(l,m,n) * dv(m,n) / dis1\nAAy2 = AAy2 + muf4pi * jy(l,m,n) * dv(m,n) / dis2\nAAz1 = AAz1 + muf4pi * jz(l,m,n) * dv(m,n) / dis1\nAAz2 = AAz2 + muf4pi * jz(l,m,n) * dv(m,n) / dis2\nend do\nend do\nend do\nAx(i,js,k) = AAx1\nAx(i,je+2*yele,k) = AAx2\nAy(i,js,k) = AAy1\nAy(i,je+2*yele,k) = AAy2\nAz(i,js,k) = AAz1\nAz(i,je+2*yele,k) = AAz2\nend do\nend do\n!\\$acc end kernels\n!\\$acc end data\n``````\n\nVersion 2 where you only accelerate the inner loops:\n\n``````!\\$acc data copyin(disx2,disy2,disz2,jx,dv), copy(Ax,Ay,Az)\ndo k = ks, ke+2\ndo i = is, ie+2\nAAx1 = c0\nAAx2 = c0\nAAy1 = c0\nAAy2 = c0\nAAz1 = c0\nAAz2 = c0\n!\\$acc kernel loop\ndo n = ks+1, ke+1\ndo m = js+1, je+2*yele-1\ndo l = is+1, ie+1\ndis1 = sqrt( disx2(i,l) + disy2(js,m) + disz2(k,n) )\ndis2 = sqrt( disx2(i,l) + disy2(je+2*yele,m) + disz2(k,n) )\nAAx1 = AAx1 + muf4pi * jx(l,m,n) * dv(m,n) / dis1\nAAx2 = AAx2 + muf4pi * jx(l,m,n) * dv(m,n) / dis2\nAAy1 = AAy1 + muf4pi * jy(l,m,n) * dv(m,n) / dis1\nAAy2 = AAy2 + muf4pi * jy(l,m,n) * dv(m,n) / dis2\nAAz1 = AAz1 + muf4pi * jz(l,m,n) * dv(m,n) / dis1\nAAz2 = AAz2 + muf4pi * jz(l,m,n) * dv(m,n) / dis2\nend do\nend do\nend do\nAx(i,js,k) = AAx1\nAx(i,je+2*yele,k) = AAx2\nAy(i,js,k) = AAy1\nAy(i,je+2*yele,k) = AAy2\nAz(i,js,k) = AAz1\nAz(i,je+2*yele,k) = AAz2\nend do\nend do\n!\\$acc end data\n``````\n• Mat\n\nDear Mat,\n\nThank you very much for sending me the double versions.\n\nI`ve tried the version 1 and it told me that \" 6112, Accelerator restriction: induction variable live-out from loop: i Accelerator restriction: induction variable live-out from loop: k 6113, Accelerator restriction: induction variable live-out from loop: i Accelerator restriction: induction variable live-out from loop: k ......\" and I don`t know how to add the \"[do private] derective eventhrough with some tests.\n\ncode of version 2 is the one I am using. I was supposed to put the !\\$acc data outside.It seems like the !\\$acc kernel loop should be !\\$acc kernels.\n\nI`ve tried the version 1 and it told me that \"\n6112, Accelerator restriction: induction variable live-out from loop: i\nAccelerator restriction: induction variable live-out from loop: k\n6113, Accelerator restriction: induction variable live-out from loop: i\nAccelerator restriction: induction variable live-out from loop: k\n\nI’d need to see the full code to tell why but most likely you’re using i and k later in the program without initializing them (or in a conditional branch). To work around this, add the private clause.\n\n``````!\\$acc loop collapse(2) gang private(i,k)\n``````\n\nI was supposed to put the !\\$acc data outside.\n\nYes, you want he data region above the outermost loop so that you don’t repeatedly copy data over for each iteration of i and k. Though, I made a mistake adding the “A” arrays in version 2. They are updated in host code so shouldn’t be part of the data region.\n\nIt seems like the !\\$acc kernel loop should be !\\$acc kernels.\n\nEither works. You just need to remember to add the end kernel directive at then end of the n loop.\n\n• Mat\n\nTo be familiar with acc, I`ve tried to add those directives to a couple of test programs. Some succeeded with almost the same speed to my GPU code(Cuda Fortran) while others failed.\nI thought I had found the problem. But unfortunately, I am still struggling for why and how. Just like this.\nCase1\nregion entered 1638 times\ntime(us): total=653,108 init=138 region=652,970 —A---\nkernels=601,373 —B---\nw/o init: total=652,970 max=496 min=393 avg=398\n68: kernel launched 1638 times\ngrid: [2x32] block: [64x4]\ntime(us): total=601,373 max=377 min=361 avg=367\nCase2\nregion entered 360 times\ntime(us): total=16,644 init=25 region=16,619 —C---\nkernels=3,954 —D---\nw/o init: total=16,619 max=190 min=43 avg=46\n2140: kernel launched 360 times\ngrid: [1-52] block: \ntime(us): total=3,954 max=18 min=10 avg=10\n\nAs you see, case1`s kernels nearly equal to region (marked with A&B)while case2`s region is 4 times larger. Another place may counts is probably the message of grid that one is definitely [2*32] and the other one [1~52].\n\nSince those directives are all added by me. I did not expect different results like that and just can`t get through it.\n\nHi Kevin,\n\nThe “region” is measured from the CPU while the “kernels” is measured from the device. The difference between the two is the basically the overhead to launch the kernel. For case 1, the overhead per kernel launch is ~31.5 us: (652970-601373-138) / 1638. While in case 2 the overhead is just a bit higher at ~35.1 us: (16,619-3954-25) / 360.\n\nThe main difference between Case 1 and Case 2 is that the average kernel time is much smaller in Case 2 causing the overhead to dominate the total time.\n\n• Mat\n\nDear Mat,\n\nThat is it. I see your point there and I know how to do it now.\n\nThank you very much." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83646077,"math_prob":0.9808309,"size":9176,"snap":"2022-05-2022-21","text_gpt3_token_len":3077,"char_repetition_ratio":0.13050589,"word_repetition_ratio":0.4052407,"special_character_ratio":0.3249782,"punctuation_ratio":0.15494913,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97969437,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-24T18:28:12Z\",\"WARC-Record-ID\":\"<urn:uuid:fc3f33d3-0d22-4c57-937c-d76b3c1941bb>\",\"Content-Length\":\"48719\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f71cbe6a-1bd5-47e5-aae7-efc8fed09b96>\",\"WARC-Concurrent-To\":\"<urn:uuid:7ee6cbea-9dd6-4fa7-b007-00dfe377dc90>\",\"WARC-IP-Address\":\"184.105.176.47\",\"WARC-Target-URI\":\"https://forums.developer.nvidia.com/t/quite-puzzled/133268\",\"WARC-Payload-Digest\":\"sha1:HH45FX7XYYAYKL6E47HEHZBMTEALK4PD\",\"WARC-Block-Digest\":\"sha1:ALL4P3ILWRXBF4L424DSHTEYNV2C4CHZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662573189.78_warc_CC-MAIN-20220524173011-20220524203011-00335.warc.gz\"}"}
https://ww2.mathworks.cn/matlabcentral/answers/1963699-goodmorning-can-some-explain-to-me-some-steps-of-this-program-downloaded-from-gershgorin-discs-plo
[ "# Goodmorning.Can some explain to me some steps of this program (downloaded from \"Gershgorin Discs Plot Version by Mario Berge\" I have highlighted them.\n\n26 次查看(过去 30 天)\nFederica Mina 2023-5-15\n\nGoodmorning.Can some explain to me some steps of this program (downloaded from \"Gershgorin Discs Plot Version by Mario Berge\" I have highlighted them. And I want to ask also how can I first plot just the \"row\" circles and then the \"column\" circles.\n% gerschdisc.m\n%\n% This function plots the Gershgorin Discs for the matrix A passed as an argument.\n% It will also plot the centers of such discs, and the actual eigenvalues\n% of the matrix.\nfunction gershdisc(A)\nerror(nargchk(nargin,1,1));\nif size(A,1) ~= size(A,2)\nerror('Matrix should be square');\nreturn;\nend\n% For each row, we say:\nfor i=1:size(A,1)\n% The circle has center in (h,k) where h is the real part of A(i,i) and\n% k is the imaginary part of A(i,i) :\nh=real(A(i,i)); k=imag(A(i,i));\n% Now we try to compute the radius of the circle, which is nothing more\n% than the sum of norm of the elements in the row where i != j\nr=0;\nfor j=1:size(A,1)\nif i ~= j\nr=r+(norm(A(i,j)));\nend\nend\n% We try to make a vector of points for the circle:\nN=256;\nt=(0:N)*2*pi/N;\n% Now we're able to map each of the elements of this vector into a\n% circle:\nplot( r*cos(t)+h, r*sin(t)+k ,'-');\n% We also plot the center of the circle for better undesrtanding:\nhold on;\nplot( h, k,'+');\nend\n% For the circles to be better graphed, we would like to have equal axis:\naxis equal;\n% Now we plot the actual eigenvalues of the matrix:\nev=eig(A);\nfor i=1:size(ev)\nrev=plot(real(ev(i)),imag(ev(i)),'ro');\nend\nhold off;\nlegend(rev,'Actual Eigenvalues');\nend\n\n### 回答(1 个)\n\nDinesh 2023-6-9\nHi Federica!\nIn the given code the highlighted part code is used create a vector 't' of 'N+1' equally spaced points around the circumference of a circle. Here's what each line does:\n1. N = 256;: This line sets the value of N to 256. This determines the number of points we want to create on the circle.\n2. t = (0:N)*2*pi/N;: This line creates the vector t by performing the following steps:\n3. (0:N) creates a row vector from 0 to N, where each element represents the index of a point on the circle.\n4. 2*pi/N scales the vector by multiplying each element by 2*pi/N. This step ensures that the points span the full circumference of the circle, from 0 to 2*pi.\nSo, the resulting vector 't' contains 'N+1' equally spaced points around the circle, covering the range from 0 to 2*pi. These points will be later used to map each point on the circumference of the circle when plotting the Gershgorin Discs.\nTo plot the row circles and column circles seperately you can introduce two separate loops: one for rows and one for columns.\na sample code would look like this\n% Plot row circles\nfor i = 1:size(A,1)\nh = real(A(i,i));\nk = imag(A(i,i));\nr = 0;\nfor j = 1:size(A,1)\nif i ~= j\nr = r + norm(A(i,j));\nend\nend\nN = 256;\nt = (0:N)*2*pi/N;\nplot(r*cos(t) + h, r*sin(t) + k, '-');\nhold on;\nplot(h, k, '+');\nend\nSimilarly for the column circles Change the\nfor i = 1:size(A,2)\n...\nfor j = i:size(A,2)\n...\nend\nend\nHope this helps,\nThank you!\n##### 1 个评论显示 无隐藏 无\nFederica Mina 2023-6-11\n\n### 类别\n\nHelp CenterFile Exchange 中查找有关 Discrete Data Plots 的更多信息\n\n### Community Treasure Hunt\n\nFind the treasures in MATLAB Central and discover how the community can help you!\n\nStart Hunting!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7561225,"math_prob":0.99156785,"size":3397,"snap":"2023-40-2023-50","text_gpt3_token_len":1023,"char_repetition_ratio":0.12172119,"word_repetition_ratio":0.06965174,"special_character_ratio":0.3008537,"punctuation_ratio":0.14727722,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997578,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-28T15:41:27Z\",\"WARC-Record-ID\":\"<urn:uuid:54164803-133d-49b2-8479-cdf271bdb17c>\",\"Content-Length\":\"136260\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f0169860-1cb8-4c2a-91af-545f70bc9b7d>\",\"WARC-Concurrent-To\":\"<urn:uuid:682e417a-6940-4b43-98c4-cacd4c0af08f>\",\"WARC-IP-Address\":\"104.106.160.151\",\"WARC-Target-URI\":\"https://ww2.mathworks.cn/matlabcentral/answers/1963699-goodmorning-can-some-explain-to-me-some-steps-of-this-program-downloaded-from-gershgorin-discs-plo\",\"WARC-Payload-Digest\":\"sha1:RT2A6ARQRQYVE6UGO5R73LNGS5HBJ4XU\",\"WARC-Block-Digest\":\"sha1:722CU5F5DM3LIESPIJITCDTP5NGJSX67\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679099892.46_warc_CC-MAIN-20231128151412-20231128181412-00517.warc.gz\"}"}
http://yourprofoto.com/books/deformations-of-mathematical-structures-ii-hurwitz-type-structures-and
[ "# New PDF release: Deformations of Mathematical Structures II: Hurwitz-Type", null, "By Julian Ławrynowicz, Francesco Succi, Claude Surry, Osamu Suzuki, Leszek Wojtczak (auth.), Julian Ławrynowicz (eds.)\n\nISBN-10: 940104838X\n\nISBN-13: 9789401048385\n\nISBN-10: 9401118965\n\nISBN-13: 9789401118965\n\nThis quantity offers a suite of papers on geometric buildings within the context of Hurwitz-type buildings and functions to floor physics.\nthe 1st a part of this quantity concentrates at the research of geometric constructions. themes lined are: Clifford constructions, Hurwitz pair buildings, Riemannian or Hermitian manifolds, Dirac and Breit operators, Penrose-type and Kaluza--Klein-type buildings.\nthe second one half includes a research of floor physics constructions, specifically boundary stipulations, damaged symmetry and floor undefined, in addition to nonlinear strategies and dynamical homes: a close to floor area.\nFor mathematicians and mathematical physicists attracted to the functions of mathematical constructions.\n\nRead Online or Download Deformations of Mathematical Structures II: Hurwitz-Type Structures and Applications to Surface Physics. Selected Papers from the Seminar on Deformations, Łódź-Malinka, 1988/92 PDF\n\nSimilar nonfiction_8 books\n\nThe actual homes of fluids are might be one of the so much commonly investigated actual constants of any unmarried staff of fabrics. this can be fairly real of the thermodynamic prop­ erties of natural ingredients because the of thermodynamic equilibrium presents the best issues for experimental dimension in addition to theoretical therapy.\n\nDownload e-book for kindle: EJB Reviews 1993 by Professor Dr. P. Christen, Professor Dr. E. Hofmann (auth.)\n\nWithin the mid-1980s the eu magazine of Biochemistry got down to submit evaluate articles. The company proved profitable, leading to high-level studies written by way of famous scientists showing within the magazine. The experiences characterize rising and quickly transforming into fields of study in basic in addition to utilized parts of biochemistry, equivalent to medication, biotechnology, agriculture and foodstuff.\n\nCrop Pests in the UK: Collected edition of MAFF leaflets by Marion Gratwick M.Sc, D.I.C., C.Biol., M.I.Biol., F.R.E.S. PDF\n\nFollowing the death of the MAFF's Perma­ a few leaflets to fill remarkable gaps. The nent Leaflet sequence in 1985, it was once prompt content material of 3 leaflets has been altered extra that the ultimate versions of the crop pest advisory greatly. therefore, Chafer grubs (Chapter 32) leaflets might be produced in a sure quantity now accommodates fabric from Leaflet 449, for the good thing about destiny agricultural entomolo­ jap beetle, which has been passed over from gists and others attracted to crop pests.\n\nExtra resources for Deformations of Mathematical Structures II: Hurwitz-Type Structures and Applications to Surface Physics. Selected Papers from the Seminar on Deformations, Łódź-Malinka, 1988/92\n\nExample text\n\nWe shall simply write {h,k;p,Db,D c} for {Dh,k;p,Db,D c}, agreeing that with possible ambiguity, {6, 6; p, Db, Dc} may also denote {D~,6; p, Db, Dc}. In case of possible danger of confusion, the underlying submatrix D 6 ,6 or D~,6 will be explicitly indicated. 3. 1). Let M be an intercalate matrix of type (r,s,n), 10 ~ r,s ~ 16, containing M o, but not any submatrix equivalent to Dh,k, 6 ~ h, k ~ 8. Then M cannot be an improvement. 4. 7). 1) ) The submatrix C cannot contain any of the colors 1, ...\n\nNote that h =I- 7, for otherwise CI = C = 1, and 8 = (k+C2)+2 :::; 10, but n(M) 2: 16+2x7 = 30, a contradiction. It follows that h = 6. We may assume b2 :::; h = 6. Since bl :::; 2, we must have r :::; 6 + 2 + 6 = 14, and 8 :::; (k + C2) + Cl + C2 :::; 12. With n(M) ? 16 + 2 x 6 = 28, we need only consider (r; 8) = (14; 12). 5. 1) r+ 8 (b 1; cd = (2; 2), (b 2;C2) = (6; 2), C= 2. < 16, and n(G) < 8 holds. Then n(M) ? 30. 2: 27, 12:::; r,8 :::; 15. 6. Suppose n(MI ) < 16, and n( G) = 8. 13(b). If e ?\n\n47 COMPOSITION OF SUMS OF SQUARES 10. Regular Partition Pattern {h, k; 3,0,0}, 6 ~ h, k ~ 8. 1. THEOREM There is no improvement with a regular partition pattern {h, kj 3,0, O}, 6 ~ h, k ~ 8. 2. The proof of this theorem occupies the present section and will be completed in Section 12. 1) M= bl bz b3 CI Cz CI Cz C C3 C') BI Al E I F I Bz E z A z Gz Bz F z Gz A 3 in which the submatrices Mi, i = 1,2,3, share no common colors except those of A o = D~,6 or Dh,k, 6 ~ h, k ~ 8. 1) below. 3,7,11, we shall demonstrate that improvements thus specified indeed do not exist." ]
[ null, "https://images-na.ssl-images-amazon.com/images/I/31H8BMs%2BfNL._SX331_BO1,204,203,200_.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8005834,"math_prob":0.8894791,"size":5143,"snap":"2020-45-2020-50","text_gpt3_token_len":1461,"char_repetition_ratio":0.082311735,"word_repetition_ratio":0.09375,"special_character_ratio":0.28115886,"punctuation_ratio":0.2072072,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9631187,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-26T10:07:10Z\",\"WARC-Record-ID\":\"<urn:uuid:eab9f217-6e9c-4ecd-a1f0-a9348ff447af>\",\"Content-Length\":\"29122\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c9438285-660d-46d2-95fc-7880c572a4a0>\",\"WARC-Concurrent-To\":\"<urn:uuid:05fc1675-6abc-451b-b239-5dbfdc5a36f4>\",\"WARC-IP-Address\":\"68.66.200.219\",\"WARC-Target-URI\":\"http://yourprofoto.com/books/deformations-of-mathematical-structures-ii-hurwitz-type-structures-and\",\"WARC-Payload-Digest\":\"sha1:6CW5IPEQ5MGFTWSHYALZPP5MKLXTJTMX\",\"WARC-Block-Digest\":\"sha1:5IRTW2M57LKAQ6HEXBMSL63XAYR5RHAS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141187753.32_warc_CC-MAIN-20201126084625-20201126114625-00376.warc.gz\"}"}
http://civilservicereview.com/2016/03/solve-word-problems-working-backward/
[ "## How to Solve Word Problems by Working Backwards Part 3\n\nIn part 1 and part 2 of this series, we have learned how to solve number age problems by working backward. In this post, we are going to learn how to solve backward using inverse operations. Recall that multiplication and division are inverse operations and addition and subtraction are inverse operations.\n\nExample 5\n\nA number is multiplied by 4 and then, 3 is added to the product. The result is 31. What is the number?\n\nSolution\n\nThe key phrases in this problem are (1) multiplied by 4 and (2) added to (3) the result is 31. Since we are working backward, we start with 31, and then find the inverse of “added to 3” which is “subtract 3.” So, 31 – 3 = 28.\n\nNext, we find the inverse of “multiplied by 4,” which is “divided by 4.” So, 28/4 = 7.\n\nSo, the answer to this problem is 7.\n\nCheck: 7(4) + 3 = 31\n\nExample 6\n\nThink of a number. Divide it by 8. Then subtract 4 from the quotient. The result is 5. What is the number?\n\nSolution\n\nThe key phrases in this problem are (1) divided by 8 (2) subtract 4 and (3) the result is (3) the result is 5.\n\nWe start with the result which is 5 and find the inverse of “subtract 4” which is “add 4.” So, 5 + 4 = 9. Next, we find the inverse of “divide by 8” which is “multiply by 8.” So, 9(8) = 72.\n\nSo, the correct answer is 72.\n\nCheck: 72/8 – 4 = 9 – 4 = 5.\n\nIn the next post, we will discuss more about solving math word problems by working backward." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9567261,"math_prob":0.9964039,"size":1433,"snap":"2023-40-2023-50","text_gpt3_token_len":422,"char_repetition_ratio":0.13016096,"word_repetition_ratio":0.07692308,"special_character_ratio":0.31123516,"punctuation_ratio":0.12962963,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999583,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-22T15:22:45Z\",\"WARC-Record-ID\":\"<urn:uuid:856bc354-a62b-49ed-8dfc-fa396d47eee9>\",\"Content-Length\":\"48014\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6a13be17-8ee2-4424-bb16-435dd6e825ab>\",\"WARC-Concurrent-To\":\"<urn:uuid:793fadbd-9c8f-438c-a7dc-e936b8104751>\",\"WARC-IP-Address\":\"166.62.28.131\",\"WARC-Target-URI\":\"http://civilservicereview.com/2016/03/solve-word-problems-working-backward/\",\"WARC-Payload-Digest\":\"sha1:Q6IK2FACATNC2ZQ4XMH2LRWZUUNN2F5U\",\"WARC-Block-Digest\":\"sha1:TFSFT6DABEMONTPRMDQD4AMOO22HMRWA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506420.84_warc_CC-MAIN-20230922134342-20230922164342-00535.warc.gz\"}"}
https://socratic.org/questions/5922af9b11ef6b13de242db4
[ "# Sum of n terms of a certain series is given by S_n=2n+3n^2, what is the type of the series and what is its 20^(th) term?\n\nAug 9, 2017\n\nIt is an arithmetic progression with first term as $5$ and common difference as $6$ and ${20}^{t h}$ term is $119$\n\n#### Explanation:\n\nAs sum of $n$ terms of a certain series is given by ${S}_{n} = 2 n + 3 {n}^{2}$,\n\nSum of $20$ terms is 2×20+3×20^2=40+1200=1240.\n\nFurther, sum of $19$ terms is 2×19+3×19^2=38+1083=1121,.\nHence ${20}^{t h}$ term is $1240 - 1121 = 119$.\n\nAs sum of $1$ term is 2×1+3×1^2=5, sum of first two terms is 2×2+3×2^2=4+12=16, second term is $16 - 5 = 11$ and common difference is $11 - 5 = 6$. If it is arithmetic progression the third term should be $11 + 6 = 17$.\n\nAs sum of first three terms is 2×3+3×3^2=6+27=33, third term is $33 - 16 = 17$ hence it is an arithmetic progression.\n\nAug 9, 2017\n\n$d = 6 , {a}_{20} = 119 , {S}_{20} = 1240$\n\n#### Explanation:\n\n$\\text{calculate the first 'few' terms of the sequence}$\n\n$\\text{using } {S}_{n} = 2 n + 3 {n}^{2}$\n\n${S}_{1} = 2 + 3 = 5 \\Rightarrow {a}_{1} = 5$\n\n${S}_{2} = 4 + 12 = 16$\n\n$\\Rightarrow {a}_{2} = {S}_{2} - {S}_{1} = 16 - 5 = 11$\n\n${S}_{3} = 6 + 27 = 33$\n\n$\\Rightarrow {a}_{3} = {S}_{3} - {S}_{2} = 33 - 16 = 17$\n\n${S}_{4} = 8 + 48 = 56$\n\n$\\Rightarrow {a}_{4} = {S}_{4} - {S}_{3} = 56 - 33 = 23$\n\n$\\text{the first 4 terms are } 5 , 11 , 17 , 23$\n\n$\\text{common difference ( d)}$\n\n$d = 23 - 17 = 17 - 11 = 11 - 5 = 6$\n\n$\\Rightarrow \\text{ these terms are an arithmetic sequence with } d = 6$\n\n$\\text{the sum to n terms of an arithmetic sequence is}$\n\n•color(white)(x)a_n=a_1+(n-1)d\n\n$\\Rightarrow {a}_{20} = 5 + \\left(19 \\times 6\\right) = 119$\n\n$\\Rightarrow {S}_{20} = \\left(2 \\times 20\\right) + \\left(3 \\times {20}^{2}\\right) = 1240$" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6808104,"math_prob":1.0000095,"size":847,"snap":"2022-40-2023-06","text_gpt3_token_len":352,"char_repetition_ratio":0.13167259,"word_repetition_ratio":0.0,"special_character_ratio":0.43565527,"punctuation_ratio":0.044198897,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000094,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-25T17:13:29Z\",\"WARC-Record-ID\":\"<urn:uuid:80df17d5-b113-41ed-94f9-09e9a1ec2455>\",\"Content-Length\":\"36811\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d6f90347-ba74-450a-be4c-fb7933e19583>\",\"WARC-Concurrent-To\":\"<urn:uuid:c3cf891e-e6fc-4d50-9a4e-f1004b5432d0>\",\"WARC-IP-Address\":\"216.239.36.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/5922af9b11ef6b13de242db4\",\"WARC-Payload-Digest\":\"sha1:MOD2U3LYYWBRSM7LFDNUBB7KE5WEBIJT\",\"WARC-Block-Digest\":\"sha1:O7SU46NR6NT5OM6PACE77D5PIRSXPNQ4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334591.19_warc_CC-MAIN-20220925162915-20220925192915-00219.warc.gz\"}"}
https://tutorialsbookmarks.com/arithmetic-ooperators-c-language/
[ "# Arithmetic Operators in C – {Add, Subtract, Multiply, Divide, and Modulus}\n\n1\n518", null, "The arithmetic operators in C programming language are the operators in programming used to execute or complete the arithmetic operations such as addition, subtraction, multiplication, division, modulus, and percentage. Arithmetic operators need two operands between one operator to perform all operations. In c programming there are 5 arithmetic operators, find the list of all operators below with examples.\n\nFor performing operations, we need two variables, for better understanding let’s take variables “first_number“, and “second_number” are two variables helps to perform all the operations(Addition, Subtraction, Multiplication, Division, and Modulus).\n\n### List of Arithmetic Operators\n\n Arithmetic Operators Meaning Examples + Addition 1008 + 108.8 = 1116.800000 – Subtraction 1008 – 108.8 = 899.200000 * Multiplication 1008 * 108.8 = 109670.400000 / Division 1008 / 108.8 = 9.264706 % Modulus 1008 % 108.8 = 28.800000\n\nWe need 5 variables to store the result of two operands(first_number and second_number). The addition is denoted by the plus sign(+), Subtraction is denoted by the minus sign(-), Multiplication is denoted by the (*) and Division is denoted by the(/), and Modulus is denoted by the Percent or Percentile sign(%) in programming languages.\n\nLet takes an example of two numbers the first number is 1008 and the second number is 108.8. let’s perform all the arithmetic operators. To make this program universal so are using the Double variables to find all type of solution in one program.\n\nAddition: To solve this problem we need 3 variables, let’s take variables. for testing purpose, we are taking two numbers for test our programming code solution on arithmetic operations. This is a very simple exercise compared to an anagram.\n\n``````float first_number, second_number, addition;\n\nNow times to print the result.\n\n``printf(\"Sum of first_number and second_number are = %lf\\n\", addition);``\n`The output of Modulus of Two Numbers is = 1116.800000`\n\nSubtraction: The process is the same for the Subtraction, only operator and variable name need to change the.\n\n``````float first_number, second_number, subtraction;\nsubtraction = first_number - second_number;``````\n\nPrint the result.\n\n``printf(\"Subtraction of first_number and second_number are = %lf\\n\", subtraction);``\n`The output of Modulus of Two Numbers are = 899.200000`\n\nMultiplication & Division: Repeat the same process for the multiplication and Division.\n\n`The output of Modulus of Two Numbers are = 109670.400000`\n`The output of Modulus of Two Numbers are = 9.264706 `\n\nModulus: This is a little bit different cause in this operations we do not calculates Quotients, we calculate Remainder. It is tricky as well we cannot perform a Float or Double value directly, so we are using the predefined functions in C and for that, we need to add one extra header file math.h.\n\n``modulus = fmod(first_number, second_number);``\n\nHere fmod is a predefined function in C and C++ language, Now it’s time to print the output of the program.\n\n``printf(\"Modulus of Two Numbers are = %lf\", modulus);``\n`The output of Modulus of Two Numbers are = 28.800000`\n\nRequired Skills: for solving this programming problem you need to have a knowledge of Format Specifiers, Operators, Input/Output, Escape Sequence, and Data Types.\n\nThis program is tested and run successfully on Dev-C++ and some other popular programming editors.\n\n## Arithmetic Operators Program in C\n\n```/*\n* Write a C program to enter two numbers and perform all arithmetic operations.\n*/\n\n#include <stdio.h>\n#include <math.h>\n\nint main()\n{\ndouble first_number, second_number;\ndouble addition, subtraction, multiplication, division, modulus;\n\n/*\n* Two numbers input from user\n*/\nprintf(\"Enter the First Numbers to Perform Arithmetic Operations: \");\nscanf(\"%lf\", &first_number);\n\nprintf(\"Enter the Second Numbers to Perform Arithmetic Operations: \");\nscanf(\"%lf\", &second_number);\n\n/*\n* Performing an arithmetic operations(addition, subtraction,\n* multiplication, division, and modulus)\n*/\n\nsubtraction = first_number - second_number;\nmultiplication = first_number * second_number;\ndivision = first_number / second_number;\nmodulus = fmod(first_number, second_number);\n\n/*\n* Printing the result of all arithmetic operations\n*/\nprintf(\"\\n\\nSum of Two Numbers are = \\t\\t%lf\\n\", addition);\nprintf(\"Differences of Two Numbers are = \\t%lf\\n\", subtraction);\nprintf(\"Multiplication of Two Numbers are = \\t%lf\\n\", multiplication);\nprintf(\"Quotients of Two Numbers are = \\t\\t%lf\\n\", division);\nprintf(\"Modulus of Two Numbers are = \\t\\t%lf\\n\\n\", modulus);\n\nreturn 0;\n}```\n\n### Similar Programming Exercises and Solutions\n\n• Input/Output of All Basic Data Types.\n• Print 1 to 100 Numbers\n• Greatest of Three Numbers\n• Print Even or Odd\n• Area of Triangle – Mathematics based\n• LCM and GCD of Two Numbers\n• Find Area of an Equilateral Triangle\n• Print All the Odd Number Till ‘N’\n• Swap Two Numbers Using 3rd Variable\n• Swapping Two Values Without Using 3rd Variable\n\n#### 1 COMMENT\n\n1.", null, "Harlan Kilstein\n\nHi there, I found your web site by way of Google whilst searching for a similar topic,\nyour website got here up, it appears great. I have bookmarked it in my google bookmarks." ]
[ null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20696%20348'%3E%3C/svg%3E", null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%2050%2050'%3E%3C/svg%3E", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.859854,"math_prob":0.9890268,"size":5444,"snap":"2019-51-2020-05","text_gpt3_token_len":1244,"char_repetition_ratio":0.16875,"word_repetition_ratio":0.06196841,"special_character_ratio":0.2518369,"punctuation_ratio":0.14554974,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99970114,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-20T12:45:44Z\",\"WARC-Record-ID\":\"<urn:uuid:0640a080-be80-4a5c-8243-f8e3f6012ee2>\",\"Content-Length\":\"125014\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b7ad3abc-ea8c-46bb-9fe8-946569850c40>\",\"WARC-Concurrent-To\":\"<urn:uuid:d33212a2-dcc7-4737-adad-946adbc1c97d>\",\"WARC-IP-Address\":\"132.148.181.11\",\"WARC-Target-URI\":\"https://tutorialsbookmarks.com/arithmetic-ooperators-c-language/\",\"WARC-Payload-Digest\":\"sha1:W73X2SGCHBZUMIKKVCGI6CI6UORBN7CT\",\"WARC-Block-Digest\":\"sha1:P3U33CTW5X6XS53TEP7IOIMJOB2GACDR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250598726.39_warc_CC-MAIN-20200120110422-20200120134422-00559.warc.gz\"}"}
https://www.wartgames.com/themes/math/timestables.html
[ "TimesTables Cool Trick\n\nThe magic 9 times table trick with fingers:\n\nThe fingers on the left hand represent the numbers 1 through 5. The fingers on the right hand represent the numbers 6 through 10.\n\n-Fold down the index finger on left hand, or finger number 4.\n\n-Remind her that 9 x 4 = 36, and then have her look at her hands. To the left of her bent finger, there are 3 fingers. To the right are her remaining 6 fingers.\n\n-The magic to this trick is that the number given to the finger that she folds down x 9 is equal to the number of fingers to the left of the bent finger (in the tens place) and the fingers to the right (in the one's place.) It is MAGIC!!!\n\nCommon Core:\n\nCommon core times tables / multiplication works with the “box method”. For example, multiplying 7 x 23. First you divide a large number into its separate parts, 23 becomes 2 and 3. Next you multiply each separate part 20 x 7 and 3 x 7. Finally, you at all products together 140 + 21 = 161.  The product of 7x23=161.\n\nThe Common Core State Standards introduce multiplication over three grades (3, 4, and 5) with the standard algorithm as the culminating activity in grade 5. To meet these common core multiplication standards, students need to “know from memory all products of two one-digit numbers,” by the end of Grade 3.\n\nHere are some fun multiplication games:\n\nSpace Racer Multiplication" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8749644,"math_prob":0.9732875,"size":1464,"snap":"2021-31-2021-39","text_gpt3_token_len":374,"char_repetition_ratio":0.13972603,"word_repetition_ratio":0.0,"special_character_ratio":0.25068307,"punctuation_ratio":0.10033445,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9898409,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-01T02:02:51Z\",\"WARC-Record-ID\":\"<urn:uuid:ba0a999a-fb07-43af-8530-28919408e99f>\",\"Content-Length\":\"22679\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d04ffc5a-0328-4aad-ac82-92970d86d9e2>\",\"WARC-Concurrent-To\":\"<urn:uuid:9bd3f838-6241-4c48-b8e5-3393fcee5b9a>\",\"WARC-IP-Address\":\"69.90.193.169\",\"WARC-Target-URI\":\"https://www.wartgames.com/themes/math/timestables.html\",\"WARC-Payload-Digest\":\"sha1:4I33NVVY2Y57JJOWZUMM4DHT4NTP4OH7\",\"WARC-Block-Digest\":\"sha1:ISWHM7KSSK7RWJTY25ZUK3HNX7WIRPMV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154127.53_warc_CC-MAIN-20210731234924-20210801024924-00574.warc.gz\"}"}
https://patents.justia.com/patent/11290704
[ "# Three dimensional scanning system and framework\n\n- Hewlett Packard\n\nA method and corresponding system for reconstructing the surface geometry of a three-dimensional object is disclosed. The system comprises a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera, and a turntable operable to rotate incrementally. In operation, the turntable is rotated to first and second positions and two-dimensional and three-dimensional data sets are obtained using the two-dimensional high-resolution camera and the three-dimensional depth camera. Corresponding features from the two-dimensional data sets are identified and used to identify the same corresponding features in the three-dimensional data sets. The three-dimensional corresponding features are used to calculate a three-dimensional homography, which is used to align the three-dimensional data sets. Following alignment, a three-dimensional mesh is generated from the aligned data sets.\n\n## Latest Hewlett Packard Patents:\n\nDescription\nBACKGROUND\n\nThree-dimensional computer models of real-world objects are used or required in many applications, such as engineering prototyping. Three-dimensional (3D) reconstruction is the process of determining the shape or appearance of the real world objects under consideration. Data or images of an object taken using heterogeneous sensors (e.g., different types of cameras) may be used to perform the reconstruction process. Reliability, repeatability, resolution, accuracy and speed considerations are, however, generally critical to the construction and operation of scanners or digitizers used to generate the models of the real world objects being examined. The disclosure herein describes a cluster of heterogeneous sensors and a turntable that can be used efficiently and robustly in the process of 3D reconstruction of real world objects.\n\nBRIEF DESCRIPTION OF THE DRAWINGS\n\nThe accompanying drawings illustrate various examples of the principles described herein and are a part of the specification. The illustrated examples are merely examples and do not limit the scope of the claims.\n\nFIG. 1 is a perspective view of a scanning system operating under the principles of the present invention, which includes a heterogeneous sensor cluster and a turntable.\n\nFIG. 2 is a schematic diagram of a 3D scanning system similar to the system described with respect to FIG. 1.\n\nFIG. 3 illustrates an object to be scanned or digitized placed on a turntable and rotated a first increment in view of a sensor duster having a depth camera and high-resolution camera similar to those described and illustrated in FIGS. 1 and 2.\n\nFIG. 4 illustrates various mappings between coordinate spaces representing depth camera and high-resolution camera image planes.\n\nFIG. 5 illustrates the mapping of a 3D point cloud using a 3D homography operator, H.\n\nFIG. 6 is a flowchart of the operational steps of the scanning or digitizing process in one example using the principles discussed herein.\n\nFIGS. 7A and 7B are flowcharts of the operational steps of the scanning or digitizing process in a further example using the principles discussed herein.\n\nThroughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements. The examples shown in the figures and described below illustrate, but do not limit, the invention, which is defined in the Claims following the below Description.\n\nDETAILED DESCRIPTION\n\nReferring to FIG. 1, a 3D scanning system (100) incorporating the principles of the present invention is illustrated. The scanning system includes a turntable (102) and a heterogeneous sensor duster (104). The 3D scanning system (100) may also include a screen and input device or be operably connected to a computing device having a screen and keyboard, for example. The heterogeneous sensor duster (104) includes different types of visual sensors and enables the capture of richer and more robust information than can be obtained from a single camera or sensor. In some examples, as shown in FIG. 1, the visual sensors of the cluster (104) can include a depth camera (106) and a high-resolution camera (108). A projector (110) may also be included for illumination and calibration purposes. Other combinations of visual sensors can be employed.\n\nIn some examples, the depth camera (106) can capture visual data of a physical target, where the captured visual data can include the following: three-dimensional (3D) depth information (also referred to as a “depth map”), infrared (IR) image frames, and RGB image frames (which are image frames in the RGB color space). In other examples, the depth camera (106) can produce image frames in another color space. An “image frame” refers to a collection of visual data points that make up an image. Depth information refers to a depth of the physical target with respect to the depth camera (106); this depth information represents the distance between the physical target (or a portion of the physical target) and the depth camera (106).\n\nIn some examples, the depth camera (106) can include an IR visual sensor, an RGB visual sensor, and additional sensor(s) to allow the depth camera to capture the depth information as well as an RGB image frame and IR image frame. The RGB image frame captured by a depth camera can be a relatively low-resolution image frame. In other examples, the depth camera (106) can include other combinations of visual sensors that allow the depth camera (106) to capture depth information and visual data of a physical target in a visible color space.\n\nThe high-resolution color-space camera (108) of the cluster (104) can capture a higher-resolution RGB image frame (or image frame in other color space). In the following discussion, reference to “low-resolution” and “high-resolution” is in the context of relative resolutions between different visual sensors. In other words, a “high-resolution” visual sensor is able to capture visual data at a higher resolution than a “low-resolution” visual sensor. In some examples of systems based on the principles described herein, a high-resolution camera has pixel dimensions of approximately 4,000 by 3,000 pixels, while the depth camera has pixel dimensions of approximately 640 by 480 pixels.\n\nReferring to FIG. 2, a schematic diagram of a 3D scanning system (200) similar to the system described with respect to FIG. 1 is illustrated. The 3D scanning system (200) includes a duster (204) having a depth camera (206), a high-resolution camera (208) and a projector (210). The 3D scanning systems described herein benefit from calibration of the cameras in the sensor dusters prior to use. Accordingly, FIG. 2 also illustrates a calibration system (212) that is able to communicate over a link (214) with the various visual sensors of the cluster (204). The calibration system (212) includes a calibration module (216) that is able to perform calibration procedures according to some implementations for calibrating the visual sensors of the duster (204). In some examples, the calibration module (216) can be implemented as machine-readable instructions executable on one or multiple processors (218). In other examples, the calibration system (212) can be implemented as hardware.\n\nThe calibration system (212) also includes a network interface (220) to allow the calibration system (212) to communicate over a network, such as the link (214). Also, the calibration system (212) includes a storage medium (222) for storing data and instructions. The storage medium (222) can store mapping information (224), where the mapping information (224)—e.g., a known checkerboard pattern—relates to mappings between different pairs of the visual sensors of the cluster (204). The mapping information (224) is used to perform calibration among the visual sensors of the duster (204) and while generating 3D scanning information. Once the visual sensors of the duster (204) are calibrated, the visual data captured by the respective visual sensors can be properly combined to perform various tasks, such as tasks associated with 3D scanning or digitization.\n\nSystem Calibration.\n\nPrior to performing scanning operations using the 3D scanning systems described herein, the heterogeneous set of cameras or visual sensors is calibrated. Calibration of the system results in a projective mapping from a 3D point cloud to a 2D image and a homography between sets of 2D images and between sets of 3D point clouds. In one example, the projective mapping relates the 3D point clouds captured by the depth camera (106) to a 2D image of the points. Homographies, on the other hand, map 2D and 3D data in 2-space and 3-space, respectively, onto different 2D and 3D coordinate systems.\n\nA projective mapping between 3D coordinates and a 2D plane or image can be defined by Eq. 1, below:\nx=PX,  (Eq. 1)\nwhere x represents 2D coordinates and X represents 3D coordinates. More specifically, Eq. 1 can be written as\n\n$[ u v 1 ] = z c · K ⁡ [ Rt ] ⁡ [ x w y w z w 1 ] , ( Eq . ⁢ 2 )$\n\nWhere x=[u v 1]T represents 2D coordinates, X=[xw yw zw 1]T represents 3D coordinates, zc is an arbitrary scale (having a predefined value), K represents intrinsic parameters, R represents extrinsic rotation parameters, and t represents extrinsic translation parameters. The intrinsic parameters K are defined as follows:\n\n$K = [ f x s u 0 1 f y v 0 1 1 1 ] , ( Eq . ⁢ 3 )$\nWhere fx, fy represent focal lengths of a lens of the visual sensor, u0, v0 represent an optical center along an optical axis of the visual sensor, and s is a skew coefficient that represents skew distortion of the visual sensor.\n\nThe extrinsic rotation parameters (R) and extrinsic translation parameters (t) are part of the geometric parameters of a visual sensor. The rotation parameters can define the pan, tilt, and yaw of a visual sensor in geometric space. The translation parameters can define a translational position of the visual sensor in geometric space.\n\nDeriving the projective matrix (P) involves computing the intrinsic parameters (K) and geometric parameters (R, t) of a visual sensor. Once obtained, the intrinsic parameters (K) and extrinsic rotation parameters (R) can be used to produce homography operators for mapping data between 2D images obtained by the sensors and different 2D spaces and 3D point clouds obtained by the sensors and different 3D spaces.\n\nMore specifically, a direct 2D-to-2D mapping between a pair of visual sensors can be represented by a 2D homography, such that x′=Hx, where x′ and x are 2D position vectors in the two planes. The homography relates the pixel coordinates in two images (corresponding to two visual sensors). The 2D homography (H) can be represented by a 3-x-3 matrix, generally of the form:\n\n$H = [ H 11 H 12 H 13 H 21 H 22 H 23 H 31 H 32 H 33 ] . ( Eq . ⁢ 4 )$\nThe 3D counterpart is a 4×4 matrix, with x′ and x being 3D position vectors in 3-space. Further details for calculating the components of the homography matrices, which are dependent upon the intrinsic and extrinsic parameters referred to above, can be found in commonly owned application Ser. No. 13/713,036 (entitled, “Calibrating Visual Sensors Using Homography Operators”), the disclosure of which is incorporated herein by reference.\n\nSystem Operation.\n\nReferring to FIG. 3, an object (310) to be scanned or digitized is placed on a 3D scanning system (300) having a turntable (302) and a sensor cluster (304) having a depth camera and high-resolution camera similar to those described above. The turntable (302) is rotated to a first position and a first 3D point cloud is obtained using the depth camera and a first 2D high-resolution image is obtained using the high-resolution camera. The 3D point cloud comprises a set of 2D points (e.g., x and y coordinates) with a depth or distance (e.g., z coordinate) associated with each 2D point. The turntable (302) is then rotated a pre-determined increment (306) (e.g., 10 degrees) to a second position and a second 3D point cloud and 2D high-resolution image are obtained using the depth camera and high-resolution camera, respectively. The data comprising the first and second point clouds and images may be stored in memory.\n\nA 3D scanning (or digitization) is generated using the pairs of point clouds and images in the following manner. To begin, the first and second 2D high-resolution images are analyzed for corresponding points or features to obtain a first set of 2D high-resolution corresponding points, x. In one example, the number of high-resolution corresponding points is at least 18 in number. A multi-step 2D homography is then employed to map the first set of 2D high-resolution corresponding points, x, from the image plane of the high-resolution camera to the image plane of the depth camera, x″. More specifically, referring to FIG. 4, a 2D coordinate space (402) representing the image plane of the high-resolution camera and a 2D coordinate space (404) representing the image plane of the depth camera are illustrated schematically. An induced plave 2D coordinate space (406) is also illustrated. As depicted in FIG. 4, a homography operator Hp provides a mapping between the 2D coordinate space (402) representing the image plane of the high-resolution camera and the coordinate space (406) of the induced plane. Another homography operator Hf can be used to provide a mapping between the 2D coordinate space (406) of the induced plane and the 2D coordinate space (404) representing the image plane of the depth camera.\n\nMore generally, a homography that provides the 2D-to-2D mapping between coordinate spaces of the two visual sensors—i.e., the depth and high-resolution cameras—is a multi-step homography that can include multiple homography operators. The mappings using a multi-step homography (including Hp and Hf) according to some implementations can be represented as follows:\n\n$x ′ = H p ⁢ x = [ H p ⁢ ⁢ 11 H p ⁢ ⁢ 12 H p ⁢ ⁢ 13 H p ⁢ ⁢ 21 H p ⁢ ⁢ 22 H p ⁢ ⁢ 23 H p ⁢ ⁢ 31 H p ⁢ ⁢ 32 H p ⁢ ⁢ 33 ] ⁡ [ u v 1 ] = ( H p ⁢ ⁢ 11 ⁢ u + H p ⁢ ⁢ 12 ⁢ v + H p ⁢ ⁢ 13 H p ⁢ ⁢ 31 ⁢ u + H p ⁢ ⁢ 32 ⁢ v + H p ⁢ ⁢ 33 , H p ⁢ ⁢ 21 ⁢ u + H p ⁢ ⁢ 22 ⁢ v + H p ⁢ ⁢ 23 H p ⁢ ⁢ 31 ⁢ u + H p ⁢ ⁢ 32 ⁢ v + H p ⁢ ⁢ 33 ) = ( u ′ , v ′ ) , ( Eq . ⁢ 5 ) x ″ = H p ⁢ x ′ = [ H f ⁢ ⁢ 11 H f ⁢ ⁢ 12 H f ⁢ ⁢ 13 H f ⁢ ⁢ 21 H f ⁢ ⁢ 22 H f ⁢ ⁢ 23 H f ⁢ ⁢ 31 H f ⁢ ⁢ 32 H f ⁢ ⁢ 33 ] ⁡ [ u ′ v ′ 1 ] = ( H f ⁢ ⁢ 11 ⁢ u ′ + H f ⁢ ⁢ 12 ⁢ v ′ + H f ⁢ ⁢ 12 H f ⁢ ⁢ 31 ⁢ u ′ + H f ⁢ ⁢ 32 ⁢ v ′ + H f ⁢ ⁢ 33 ⁢ , H f ⁢ ⁢ 21 ⁢ u ′ + H f ⁢ ⁢ 22 ⁢ v ′ + H f ⁢ ⁢ 23 H f ⁢ ⁢ 31 ⁢ u ′ + H f ⁢ ⁢ 32 ⁢ v ′ + H f ⁢ ⁢ 33 ) = ( u ″ , v ″ ) , ( Eq . ⁢ 6 )$\nwhere x′ corresponds to an intermediate mapped coordinate space (and more specifically the virtual coordinate space (406) of FIG. 4) based on Hp, and x″ corresponds to a final mapped coordinate space based on Hf. Using Eqs. 5 and 6, the first set of 2D high-resolution corresponding points, x, is mapped onto the induced plane (406) to produce an induced set of coordinate points, x′. The induced set of coordinate points, x′, is then mapped onto the 2D coordinate space (404) representing the image plane of the depth camera, producing a second set of coordinate points, x″.\n\nThe second set of coordinate points, x″ is then used to extract depth information from the 3D point clouds. Specifically, because the depth information in the 3D point clouds is tied to a 2D coordinate system associated with the depth camera, there is a known pixel to pixel mapping between the depth data and the second set of coordinate points, x″. In this manner, corresponding points from the first and second 3D point clouds can be obtained. The corresponding 3D points are then used to compute a 3D homography operator that allows the second 3D point cloud to be mapped to the first 3D point cloud. The two sets of 3D points can thus be aligned. Referring to FIG. 5, for example, a 3D homography operator H maps between 3D vectors [U′, V′, Z′]T and [U, V, Z]T. The 3D homography operator, in one example, may be calculated using the standard RANSAC algorithm, though other algorithms may be used.\n\nThe 3D homography step provides a coarse alignment of the pair of 3D point clouds. A more accurate alignment is obtained using a bundle adjustment step. The bundle adjustment minimizes the reprojection error between the image locations of observed and predicted points. In one example, the adjustment is formulated as a nonlinear least squares problem, where the error is the squared L2 norm of the difference between the observed feature locations and the projections of the corresponding 3D points on the image of the camera. In a further example, standard or modified Levenberg-Marquardt algorithms may be used to iteratively solve the minimization problem.\n\nFollowing alignment of the 3D point clouds, the resulting 3D mesh is pruned and cleaned—e.g., to remove spurious or unwanted points or to fill in holes or gaps. The mesh may then be refined as necessary, depending, for example, on the desired resolution or complexity of the object being scanned. Following the mesh pruning and refinement, the known pixel to pixel mapping between the depth data and coordinates of the image plane of the depth camera can be used to generate a modified set of coordinate points, x″. Using the inverse of the homography operators Hp and Hf, the modified set of coordinate points may then be mapped back to the coordinate system representing the image plane of the high-resolution camera.\n\nFollowing completion of the above steps, the turntable then rotates a predetermined increment and the process repeats. More specifically, the turntable (302) is rotated the pre-determined increment (306) (e.g., 10 degrees) to a third position and a third 3D point cloud and 2D high-resolution image are obtained using the depth camera and high-resolution camera, respectively. The third 3D point cloud and 2D high-resolution image are then combined with the pruned and refined mesh and modified set of coordinate points, x″, using the same steps described above. The process is repeated until the turntable has rotated a full 360 degrees or until the object desired to be digitized has been fully scanned.\n\nReferring now to FIG. 6, a method for reconstructing the surface geometry of a three-dimensional object according to the principles described herein is provided. In various examples, the method comprises the following steps. A system having a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera and a turntable operable to rotate incrementally is provided (602). The turntable is rotated to a first position and a first two-dimensional data set is acquired using the two-dimensional high-resolution camera and a first three-dimensional data set is acquired using the three-dimensional depth camera (604). The turntable is then rotated to a second position and a second two-dimensional data set is acquired using the two-dimensional high-resolution camera and a second three-dimensional data set is acquired using the three-dimensional depth camera (606). Corresponding features between the first and second two-dimensional data sets are then determined to obtain a first set of high-resolution corresponding points (608). The first set of high-resolution corresponding points is then mapped onto an image plane of the depth camera and corresponding points between the first and second sets of depth data are determined (610). The first and second sets of depth data are then aligned using a three-dimensional homography obtained from the corresponding points between the first and second sets of depth data and the aligned data are then used to generate a three-dimensional mesh of the object (612).\n\nReferring now to FIGS. 7A and 7B, a method for reconstructing the surface geometry of a three-dimensional object according to the principles described herein is provided. In various examples, the method comprises the following steps. A system having a cluster of heterogeneous sensors, including a two-dimensional high-resolution camera and a three-dimensional depth camera and a turntable operable to rotate incrementally is provided (702). The turntable is rotated to a first position and a first two-dimensional data set is acquired using the two-dimensional high-resolution camera and a first three-dimensional data set is acquired using the three-dimensional depth camera (704). The turntable is then rotated to a second position and a second two-dimensional data set is acquired using the two-dimensional high-resolution camera and a second three-dimensional data set is acquired using the three-dimensional depth camera (706). Corresponding features between the first and second two-dimensional data sets are then determined to obtain a first set of high-resolution corresponding points (708). The first set of high-resolution corresponding points is then mapped onto an image plane of the depth camera and corresponding points between the first and second sets of depth data are determined (710). The first and second sets of depth data are then aligned using a three-dimensional homography obtained from the corresponding points between the first and second sets of depth data and the aligned data are then used to generate a three-dimensional mesh of the object (712).\n\nReferring still to FIGS. 7A and 7B, the principles of the disclosure may include the following additional steps. A modified set of two-dimensional coordinate points is determined from the three-dimensional mesh using the pixel to pixel mapping between the image plane of the depth camera and depth data corresponding to the pixel locations of the image plane of the depth camera (714). The modified set of two-dimensional coordinate points is then mapped to a coordinate system representing an image plane of the high-resolution camera to obtain a mapped set of high-resolution data (716). The turntable is then rotated to a third position and a third two-dimensional data set is acquired using the two-dimensional high-resolution camera and a third three-dimensional data set is acquired using the three-dimensional depth camera (718). Corresponding features between the mapped set of high-resolution data and the third two-dimensional data set are then determined to obtain a second set of high-resolution corresponding points (720). The second set of high-resolution corresponding points are then mapped onto an image plane of the depth camera and corresponding points between the three-dimensional mesh and the third set of depth data are determined (722). The three-dimensional mesh and the third set of depth data are then aligned using a three-dimensional homography obtained from the corresponding points between the three-dimensional mesh and the third set of depth data (724). An updated three-dimensional mesh is then generated using the aligned three-dimensional mesh and third set of depth data (726). The process repeats until the desired scan or digitization is obtained.\n\nThe forgoing described principles and examples provide a system and method for reconstructing the shape or appearance of real world objects. The system and method benefit from reducing the 3D scanning problem to a simplified 2D to 2D correspondence problem, with alignment modeled as a 3D homography, leading to a fast and robust closed loop 3D scanning process.\n\nThe preceding description has been presented only to illustrate and describe examples of the principles described. This description is not intended to be exhaustive or to limit these principles to any precise form disclosed. Many modifications and variations are possible in light of the above teaching.\n\n## Claims\n\n1. A system for reconstructing a three-dimensional (3D) object, comprising:\n\na cluster of heterogeneous sensors, including a two-dimensional (2D) high-resolution sensor and a 3D depth sensor;\na turntable; and\na calibration system including a processor and a storage medium storing calibration instructions executable on the processor to: when the turntable is at a first position, receive a first 2D data set of an object on the turntable acquired using the 2D high-resolution sensor, and a first 3D data set of the object on the turntable acquired using the 3D depth sensor; when the turntable is at a second position different from the first position, receive a second 2D data set of the object on the turntable acquired using the 2D high-resolution sensor, and a second 3D data set of the object on the turntable acquired using the 3D depth sensor; determine corresponding features between the first 2D data set and the second 2D data set to identify a set of high-resolution corresponding coordinate points; map the set of high-resolution corresponding coordinate points onto an image plane of the 3D depth sensor to identify a set of coordinate points; align the first and second 3D data sets using the set of coordinate points; and generate a representation of the 3D object using the aligned first and second 3D data sets.\n\n2. The system of claim 1, wherein the 2D high-resolution sensor includes a high-resolution RGB camera.\n\n3. The system of claim 2, wherein the 3D depth sensor includes a 3D depth camera having a pixel resolution lower than a pixel resolution of the high-resolution RGB camera.\n\n4. The system of claim 1, wherein the turntable is operable to rotate incrementally.\n\n5. The system of claim 1, wherein the generated representation of the 3D object comprises a mesh representing a geometry of the 3D object.\n\n6. A non-transitory machine-readable storage medium comprising instructions that upon execution cause a system to:\n\nwhen a turntable that is rotatable incrementally is at a first incremental position, receive a first two-dimensional (2D) data set of an object on the turntable acquired using a 2D high-resolution sensor, and a first three-dimensional (3D) data set of the object on the turntable acquired using a 3D depth sensor;\nwhen the turntable is at a second incremental position different from the first incremental position, receive a second 2D data set of the object on the turntable acquired using the 2D high-resolution sensor, and a second 3D data set of the object on the turntable acquired using the 3D depth sensor;\ndetermine corresponding features between the first 2D data set and the second 2D data set to identify a set of high-resolution corresponding coordinate points;\nmap the set of high-resolution corresponding coordinate points onto an image plane of the 3D depth sensor to identify a set of coordinate points;\nalign the first and second 3D data sets using the set of coordinate points; and\ngenerate a 3D representation of the object using the aligned first and second 3D data sets.\n\n7. The non-transitory machine-readable storage medium of claim 6, wherein the mapping of the set of high-resolution corresponding coordinate points onto the image plane of the 3D depth sensor uses a multi-step 2D homography.\n\n8. The non-transitory machine-readable storage medium of claim 7, wherein the multi-step 2D homography uses a first homography operator that maps between a 2D coordinate space representing an image plane of the 2D high-resolution sensor and an induced plane, and a second homography operator that maps between the induced plane and a 2D coordinate space representing the image plane of the 3D depth sensor.\n\n9. A method performed by a system comprising a hardware processor for reconstructing a surface geometry of a three-dimensional (3D) object, comprising:\n\nproviding a cluster of heterogeneous sensors, including a two-dimensional (2D) high-resolution camera and a 3D depth camera;\nrotating a turntable to a first position and, while the turntable is at the first position, acquiring a first 2D data set of an object on the turntable using the 2D high-resolution camera and a first 3D data set of the object on the turntable using the 3D depth camera;\nrotating the turntable to a second position and, while the turntable is at the second position, acquiring a second 2D data set of the object on the turntable using the 2D high-resolution camera and a second 3D data set of the object on the turntable using the 3D depth camera;\ndetermining corresponding features between the first and second 2D data sets to obtain a first set of high-resolution corresponding points;\nmapping the first set of high-resolution corresponding points onto an image plane of the 3D depth camera and determining corresponding points between a first set of depth data of the first 3D data set and a second set of depth data of the second 3D data set; and\naligning the first and second sets of depth data using a 3D homography obtained from the corresponding points between the first and second sets of depth data.\n\n10. The method of claim 9, further comprising using a multi-step two-dimensional homography to map the first set of high-resolution corresponding points onto the image plane of the 3D depth camera, the multi-step homography comprising mapping 2D to 2D correspondences of the first and second 2D data sets onto an induced plane to produce a set of induced coordinates and mapping the set of induced coordinates onto the image plane of the 3D depth camera.\n\n11. The method of claim 10, further comprising extracting depth information from the 3D depth camera using a pixel to pixel mapping between the image plane of the 3D depth camera and depth data corresponding to pixel locations of the image plane of the 3D depth camera.\n\n12. The method of claim 11, further comprising:\n\ndetermining a 3D homography operator using the depth information extracted from a current and previous increment of the turntable;\naligning the depth information extracted from the current and previous increments of the turntable using the 3D homography operator; and\ngenerating a 3D mesh representing the surface geometry of the 3D object from the aligned depth information.\n\n13. A method performed by a system comprising a hardware processor for reconstructing a surface geometry of a three-dimensional (3D) object, comprising:\n\nproviding a cluster of heterogeneous sensors, including a two-dimensional (2D) high-resolution camera and a 3D depth camera;\nrotating a turntable to a first position and, while the turntable is at the first position, acquiring a first 2D data set of an object on the turntable using the 2D high-resolution camera and a first 3D data set of the object on the turntable using the 3D depth camera;\nrotating the turntable to a second position and, while the turntable is at the second position, acquiring a second 2D data set of the object on the turntable using the 2D high-resolution camera and a second 3D data set of the object on the turntable using the 3D depth camera;\ndetermining corresponding features between the first and second 2D data sets to obtain a first set of high-resolution corresponding points;\nmapping, using a multi-step two-dimensional homography, the first set of high-resolution corresponding points onto an image plane of the 3D depth camera and determining corresponding points between a first set of depth data of the first 3D data set and a second set of depth data of the second 3D data set, the multi-step homography comprising mapping 2D to 2D correspondences of the first and second 2D data sets onto an induced plane to produce a set of induced coordinates and mapping the set of induced coordinates onto the image plane of the 3D depth camera;\naligning the first and second sets of depth data using a 3D homography obtained from the corresponding points between the first and second sets of depth data;\nextracting depth information from the 3D depth camera using a pixel to pixel mapping between the image plane of the 3D depth camera and depth data corresponding to pixel locations of the image plane of the 3D depth camera;\ndetermining a 3D homography operator using the depth information extracted from current and previous increments of the turntable;\naligning the depth information extracted from the current and previous increments of the turntable using the 3D homography operator;\ngenerating a 3D mesh representing the surface geometry of the 3D object from the aligned depth information;\ndetermining a modified set of 2D coordinate points from the 3D mesh using the pixel to pixel mapping between the image plane of the 3D depth camera and the depth data corresponding to the pixel locations of the image plane of the 3D depth camera;\nmapping the modified set of 2D coordinate points to a coordinate system representing an image plane of the 2D high-resolution camera to obtain a mapped set of high-resolution data;\nrotating the turntable to a third position and acquiring a third 2D data set using the 2D high-resolution camera and a third 3D data set using the 3D depth camera;\ndetermining corresponding features between the mapped set of high-resolution data and the third 2D data set to obtain a second set of high-resolution corresponding points;\nmapping the second set of high-resolution corresponding points onto the image plane of the 3D depth camera and determining corresponding points between the 3D mesh and a third set of depth data;\naligning the 3D mesh and the third set of depth data using a 3D homography obtained from the corresponding points between the 3D mesh and the third set of depth data; and\ngenerating an updated 3D mesh using the aligned 3D mesh and third set of depth data.\n\n14. The system of claim 1, wherein the calibration instructions are executable on the processor to determine, using the set of coordinate points, corresponding points between depth data in the first and second 3D data sets,\n\nwherein the aligning of the first and second 3D data sets is based on the determined corresponding points between the depth data in the first and second 3D data sets.\n\n15. The system of claim 14, wherein the aligning of the first and second 3D data sets is based on a 3D homography obtained from the determined corresponding points between the depth data in the first and second 3D data sets.\n\n16. The system of claim 14, wherein the calibration instructions are executable on the processor to:\n\nextract, using the set of coordinate points, the depth data from the first and second 3D data sets, the depth data in the first and second 3D data sets tied to the image plane of the 3D depth sensor such that a mapping exists between the depth data and the set of coordinate points.\n\n17. The system of claim 1, wherein the mapping of the set of high-resolution corresponding coordinate points onto the image plane of the 3D depth sensor uses a 2D homography based on a first homography operator that maps between a 2D coordinate space representing an image plane of the 2D high-resolution sensor and an induced plane, and a second homography operator that maps between the induced plane and a 2D coordinate space representing the image plane of the 3D depth sensor.\n\n18. The non-transitory machine-readable storage medium of claim 6, wherein the instructions upon execution cause the system to:\n\ndetermine, using the set of coordinate points, corresponding points between depth data in the first and second 3D data sets,\nwherein the aligning of the first and second 3D data sets is based on the determined corresponding points between the depth data in the first and second 3D data sets.\n\n19. The non-transitory machine-readable storage medium of claim 18, wherein the aligning of the first and second 3D data sets is based a 3D homography obtained from the determined corresponding points between the depth data in the first and second 3D data sets.\n\n20. The non-transitory machine-readable storage medium of claim 18, wherein the instructions upon execution cause the system to:\n\nextract, using the set of coordinate points, the depth data from the first and second 3D data sets, the depth data in the first and second 3D data sets tied to the image plane of the 3D depth sensor such that a mapping exists between the depth data and the set of coordinate points.\nPatent History\nPatent number: 11290704\nType: Grant\nFiled: Jul 31, 2014\nDate of Patent: Mar 29, 2022\nPatent Publication Number: 20170223338\nAssignee: Hewlett-Packard Development Company, L.P. (Spring, TX)\nInventors: Jinman Kang (San Diego, CA), Ben Wynne (San Diego, CA), David Bradley Short (San Diego, CA), Christopher S Tanner (San Diego, CA)\nPrimary Examiner: Daniel Chang\nApplication Number: 15/500,557\nClassifications\nCurrent U.S. Class: Three-dimension (345/419)\nInternational Classification: H04N 13/25 (20180101); H04N 13/246 (20180101); G01B 11/00 (20060101); G01B 11/24 (20060101); G06T 7/80 (20170101); G06T 7/55 (20170101); G06T 7/593 (20170101); H04N 13/207 (20180101); H04N 13/271 (20180101); H04N 13/00 (20180101);" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8574365,"math_prob":0.93625,"size":28044,"snap":"2022-27-2022-33","text_gpt3_token_len":6504,"char_repetition_ratio":0.19732524,"word_repetition_ratio":0.35496098,"special_character_ratio":0.23801883,"punctuation_ratio":0.09207413,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9505624,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-12T06:10:49Z\",\"WARC-Record-ID\":\"<urn:uuid:20c7eb16-63a3-415f-9139-72a15062bcb6>\",\"Content-Length\":\"132614\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3725a0c2-d695-4027-ae08-9d2c97a12ac0>\",\"WARC-Concurrent-To\":\"<urn:uuid:97bf4aad-d777-4fa6-a9dc-568e5b46c8b4>\",\"WARC-IP-Address\":\"44.209.20.103\",\"WARC-Target-URI\":\"https://patents.justia.com/patent/11290704\",\"WARC-Payload-Digest\":\"sha1:IOLENB3CKMCEKM4CO2JSF75ZTFXA7G22\",\"WARC-Block-Digest\":\"sha1:XLQLZJIGNS4TABQKKSMYO64KDSCWBWQN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571584.72_warc_CC-MAIN-20220812045352-20220812075352-00116.warc.gz\"}"}
https://returntoedencosmetics.com/dermatology/how-many-grams-are-in-3-moles-of-oxygen.html
[ "# How many grams are in 3 moles of oxygen?\n\nContents\n\n3 moles of Oxygen atoms weigh 48.00 grams.\n\n## How many grams are in 1 mole of O2?\n\nMoles of a Substance and the Molecular Weight\n\nThe mass of oxygen equal to one mole of oxygen is 15.998 grams and the mass of one mole of hydrogen is 1.008 g.\n\n## How many oxygen molecules are in 3 moles of oxygen?\n\nYou have 3 moles, so there are 3×6.022×1023 oxygen molecules .\n\n## How many grams are there in 3.5 moles of oxygen gas?\n\nWe assume you are converting between moles Oxygen and gram. You can view more details on each measurement unit: molecular weight of Oxygen or grams The molecular formula for Oxygen is O. The SI base unit for amount of substance is the mole. 1 mole is equal to 1 moles Oxygen, or 15.9994 grams.\n\n## How many grams are in 5 moles of oxygen?\n\nTherefore, 160 g of oxygen is present in 5 moles.\n\nIT IS INTERESTING:  What's actually inside a pimple?\n\n## What is the 1 mole of oxygen?\n\nThis mass is usually an average of the abundant forms of that element found on earth. An element’s mass is listed as the average of all its isotopes on earth. One mole of oxygen atoms contains 6.02214179×1023 oxygen atoms.\n\n## How many atoms are in 4 moles of oxygen?\n\nSince you have 2 oxygen atoms in one molecule, there are 2 × 6.022 × 10 23 O atoms in a mole of .\n\n## How many moles are in oxygen?\n\nYou can view more details on each measurement unit: molecular weight of Oxygen or mol The molecular formula for Oxygen is O. The SI base unit for amount of substance is the mole. 1 grams Oxygen is equal to 0.062502343837894 mole.\n\n## How many molecules are in a mole of oxygen?\n\nOne mole of oxygen gas, which has the formula O2, has a mass of 32 g and contains 6.02 X 1023 molecules of oxygen but 12.04 X 1023 (2 X 6.02 X 1023) atoms, because each molecule of oxygen contains two oxygen atoms.\n\n## How many grams are there in 2.5 moles of oxygen?\n\nThe answer is 0.031251171918947. We assume you are converting between moles O2 and gram. You can view more details on each measurement unit: molecular weight of O2 or grams The SI base unit for amount of substance is the mole. 1 mole is equal to 1 moles O2, or 31.9988 grams.\n\n## How many grams are in 6 moles of oxygen?\n\nhow many grams is 6 mole of oxygen? Oxygen gas has formula O2. Each mole has a mass of 16*2 = 32 grams, since the atomic weight (molar mass) of an O atom is 16.\n\nIT IS INTERESTING:  Should I get my mole looked at?\n\n## What is the mass in grams of 2.5 mol of oxygen gas?\n\nQuestion : Find the mass of 2.5 mole of oxygen atom .\n\nStep by step solution by experts to help you in doubt clearance & scoring excellent marks in exams. =8g.\n\n## How many moles are in 50 grams of oxygen gas?\n\nFor example, 50 grams of oxygen is equal to 3 moles.\n\n## How many grams are in a mole?\n\n1 mole is equal to 1 moles In, or 114.818 grams.\n\n## How many grams are in 3.5 moles?\n\n1 Answer. The mass of 3.5 moles of Ca is 140 g to two significant figures.", null, "" ]
[ null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20806%20783'%3E%3C/svg%3E", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9120397,"math_prob":0.9864853,"size":2812,"snap":"2022-05-2022-21","text_gpt3_token_len":767,"char_repetition_ratio":0.21153846,"word_repetition_ratio":0.20652173,"special_character_ratio":0.29409674,"punctuation_ratio":0.12153846,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9993531,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-18T03:18:43Z\",\"WARC-Record-ID\":\"<urn:uuid:ada7c199-7a95-42a4-9afd-985899c93d9b>\",\"Content-Length\":\"74776\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d8a62493-76dc-4ef8-97a3-09cb63c750f4>\",\"WARC-Concurrent-To\":\"<urn:uuid:5f9cf0a9-a9d1-4c3b-bf3d-5f48c678e5cb>\",\"WARC-IP-Address\":\"144.126.138.138\",\"WARC-Target-URI\":\"https://returntoedencosmetics.com/dermatology/how-many-grams-are-in-3-moles-of-oxygen.html\",\"WARC-Payload-Digest\":\"sha1:PVILTHN3Y5SG3C663U64JVBCEM6QNARB\",\"WARC-Block-Digest\":\"sha1:FUS3T4LM6JUNBUZYXJVHXGDSKOH3DAEI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662521041.0_warc_CC-MAIN-20220518021247-20220518051247-00340.warc.gz\"}"}
https://programmingpraxis.com/2017/01/10/prime-string/2/
[ "## Prime String\n\n### January 10, 2017\n\nMy first version of the program prebuilt the prime string to some large length and simply indexed into that string. That worked, but I was dissatisfied because it required a large amount of storage, and inevitably fails when a too-large n is requested. But it did make a nice way to check results of my finished algorithm, so it wasn’t a total loss.\n\nMy second version of the program tried to calculate the lengths of the primes and work out where exactly the index occurred within the sequence of prime numbers, but that didn’t work; more precisely, I never convinced myself that I had found the last bug in the program. The problem is that there are lots of edge cases where the requested index doesn’t point to the beginning of a prime, and there are other edge cases where the next five characters spill across a boundary from one prime length to another, and my code kept getting more and more complicated to handle those edge cases, so eventually I threw away that version.\n\nThe third version of the program keeps a sliding window on the string, generating primes as necessary. If the window is too small, it is extended. If the index of the first character in the window is less than the target index, the window slides one character to the right. When the window finally reaches the target index, there are guaranteed to be enough characters to form a result, so the function returns. There are no special edge cases at the beginning of the prime string, or when the number of digits in the current prime is greater than its predecessor, or when the target index points to the middle of a prime, or anything else:\n\n```(define (prime-substring n)\n(let ((ps (primegen)))\n(let loop ((i 0) (str \"\"))\n(cond ((string (ps)))))\n((< i n)\n(loop (+ i 1) (substring str 1 (string-length str))))\n(else (substring str 0 5))))))```\n\nHere are some examples:\n\n```> (prime-substring 50)\n\"03107\"\n> (prime-substring 1000)\n\"98719\"\n> (prime-substring 10000)\n\"02192\"```\n\nWe used the prime generator `primegen` from a previous exercise. You can run the program at http://ideone.com/DaU4pX.\n\nPages: 1 2\n\n### 7 Responses to “Prime String”\n\n1. Paul said\n\nIn Python. primegen is a lazy prime generator.\n\n```def prime_str(n):\nprimes = primegen()\nres = \"\"\nwhile len(res) < 5:\nstrp = str(next(primes))\nL = len(strp)\nif L >= n:\nres += strp[n:n+5]\nn = max(0, n-L)\nreturn res[:5]\n```\n2. Jussi Piitulainen said\n\nDecoupling digit generation from slice selection, in Python.\n\n```from itertools import islice\n\ndef prime_digits():\nfor p in primegen():\nyield from str(p)\n\ndef prime_str(k, n):\nreturn ''.join(islice(prime_digits(), k, k + n))\n```\n3. Globules said\n\n```import Math.NumberTheory.Primes.Sieve (primes)\n\ndigits :: String\ndigits = concatMap show primes\n\nfiveAt :: Int -> String\nfiveAt n = take 5 \\$ drop n digits\n\nmain :: IO ()\nmain = do\nputStrLn \\$ fiveAt 50\nputStrLn \\$ fiveAt 12345678\n```\n```\\$ ./primestr\n03107\n24126\n```\n4. Jussi Piitulainen said\n\nThis is Julia 0.5, with its new generator expressions. I didn’t find an unbounded prime generator (one could be written) so I just fake it with a sufficiently large pool of primes, which is readily available. Julia’s iteration protocol is similar to but different from that of Python, ISWIM. In particular, the value of a generator expression does not itself have state.\n\n```module Play\n\nusing Primes\npool = primes(3000)\n\ndigits(source) = (c for p in source for c in string(p))\n\nfunction example(gen)\nprintln(join(take(drop(gen, 0), 3)))\nprintln(join(take(drop(gen, 3), 3)))\nprintln(join(take(drop(gen, 3), 0)))\nend\n\nexample(digits(pool))\n# prints:\n# 235\n# 711\n#\n\nbefore = length(join(digits((p for p in pool if p < 2017))))\npresent(gen) = println(join(take(drop(gen, before), 4)))\n\npresent(digits(pool))\n# prints:\n# 2017\n\nend\n```\n5. Jussi Piitulainen said\n\n(Re my Julia above, a nicer way to count the total number of digits in primes below 2017.)\n\n```before = sum(length(string(p)) for p in pool if p < 2017)\n```\n6. matthew said\n\nHere’s some JS using the new ES6 generators. This one only starts building up the string once the first required prime is reached, before that it just keep a character count for the primes seen. Uses a simple incremental sieve of Eratosthenes – not the most efficient, but does the job.\n\n```\"use strict\"\nfunction primestring(n,m) {\nlet len = 1, nextlen = 10, total = 0;\nlet primegen = primes(), s = null;\nfor (const p of primegen) {\nif (p >= nextlen) {\nnextlen *= 10; len++;\n}\ntotal += len;\nif (total > n) {\ns = String(p).substring(n-total+len,len);\nbreak;\n}\n}\nfor (const p of primegen) {\ns += String(p);\nif (s.length >= m) {\nreturn s.substring(0,m);\n}\n}\n}\n\nfunction* primes() {\nlet a = []; // 3,5,7,9,...\nlet b = []; // new primes to be inserted\nconst add = (n,p) => {\nif (!a[n]) a[n] = [];\na[n].push(p);\n}\nyield 2;\nfor (let i = 1, j = 0; ; i++) {\nif (i == b[j]) {\nj += 2;\n}\nif (a[i]) {\nfor (const p of a[i]) add(i+p,p);\n} else {\nb.push(2*i*(i+1),2*i+1);\nyield 2*i+1;\n}\n}\n}\n\n// Naive implementation for comparison\nfunction primestring0(n,m) {\nlet s = \"\";\nfor (const p of primes()) {\ns += p;\nif (s.length >= n+m) break;\n}\nreturn s.substring(n,n+m);\n}\n\nconsole.log(primestring(0,55));\nconsole.log(primestring(50,5));\n\nfor (let i = 0; i < 100; i++) {\nfor (let j = 0; j < 20; j++) {\nconsole.assert(primestring0(i,j) == primestring(i,j));\n}\n}\n```\n7. Anhy said\n\npackage prime.string;\nimport static java.lang.System.out;\nimport java.util.Scanner;\npublic class PrimeString {\npublic static void main(String[] args) {\nScanner keyboard = new Scanner(System.in);\nout.print(“Enter the index: “);\nint index = keyboard.nextInt();\nout.println();\nint a = 2;\nString b = “”;\nwhile(b.length() < index+5)\n{\nif(a % 2 != 0 && a % 3 != 0 && a % 5 != 0 && a % 7 != 0 || (a == 2 || a == 3 || a == 5 || a == 7))\n{\nb += a;\n}\na++;\n}\nSystem.out.println(b.substring(index,index+5));\n}\n}" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8672436,"math_prob":0.9800866,"size":3459,"snap":"2023-14-2023-23","text_gpt3_token_len":823,"char_repetition_ratio":0.11895803,"word_repetition_ratio":0.0050083473,"special_character_ratio":0.26308182,"punctuation_ratio":0.12518194,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99712765,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-30T23:02:35Z\",\"WARC-Record-ID\":\"<urn:uuid:80d57cf6-3be1-4532-98c1-122da297bd1f>\",\"Content-Length\":\"122543\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7134b73a-abd5-4a4a-8be6-54dce5b5ecf5>\",\"WARC-Concurrent-To\":\"<urn:uuid:a7b36813-d0bd-49e8-a875-fc65027c9fde>\",\"WARC-IP-Address\":\"192.0.78.24\",\"WARC-Target-URI\":\"https://programmingpraxis.com/2017/01/10/prime-string/2/\",\"WARC-Payload-Digest\":\"sha1:3JOXN4SXHEFNOUBZMGRSM3QTKFPOVDIR\",\"WARC-Block-Digest\":\"sha1:OONFDGL3TGUGPF23SA6XBKXGPVE6SKK6\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296949506.62_warc_CC-MAIN-20230330225648-20230331015648-00368.warc.gz\"}"}