URL
stringlengths 15
1.68k
| text_list
listlengths 1
199
| image_list
listlengths 1
199
| metadata
stringlengths 1.19k
3.08k
|
---|---|---|---|
https://chemistry.stackexchange.com/questions/62028/why-cant-electrolysis-utilize-specific-ions-for-reduction-oxidation | [
"# Why can't electrolysis utilize specific ions for reduction/oxidation\n\nIn the electrolysis of water, reduction half equation is $$\\ce{2H2O + 2e- -> H2 + 2OH-}$$ with a standard $E$ value of $-0.83\\ \\mathrm V$.\n\nIf $\\ce{H+}$ is present in water, why can $$\\ce{2H+ + 2e- -> H2}$$ not occur, with potential $0\\ \\mathrm V$, which is more favourable?\n\nSee, this is pretty much the same reaction. The potential is not always exactly what they say in the reference book. It depends on concentrations. The potential of $\\ce{2H+ + 2e- -> H2}$ is $0 V$ only in standard conditions, that is, when the concentration of $\\ce{H+}$ is 1 mol/L. When it is lower, the potential is different (see Nernst equation). Indeed, $\\ce{H+}$ is present in pure water, but the concentration is quite low ($10^{-7}$ mol/L). If you plug that concentration into the Nernst equation, you'll get the same value that is listed for $\\ce{2H2O + 2e- -> H2 + 2OH-}$."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8839689,"math_prob":0.99990594,"size":273,"snap":"2020-24-2020-29","text_gpt3_token_len":101,"char_repetition_ratio":0.11524164,"word_repetition_ratio":0.0,"special_character_ratio":0.3992674,"punctuation_ratio":0.12727273,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9983676,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-30T02:51:01Z\",\"WARC-Record-ID\":\"<urn:uuid:95727d91-25f6-4ca2-9a07-ef121c9e8b88>\",\"Content-Length\":\"141977\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e5826223-a1e4-4fe5-8880-cb567df5e2f8>\",\"WARC-Concurrent-To\":\"<urn:uuid:6a547fc4-2d7c-495d-b735-62937d28acf2>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://chemistry.stackexchange.com/questions/62028/why-cant-electrolysis-utilize-specific-ions-for-reduction-oxidation\",\"WARC-Payload-Digest\":\"sha1:QFWWBJU24Z2VZSQLMDRXRNNIEROGUFLE\",\"WARC-Block-Digest\":\"sha1:R5L26A27MIK7MU32OBJCALCILV3LBLDI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347407001.36_warc_CC-MAIN-20200530005804-20200530035804-00026.warc.gz\"}"} |
https://lincolncharterschoolpa.com/monetary-management-comp/22889-financial-administration-comp-composition.html | [
"",
null,
"Assignment A\n\n1 . a.\n\nShould the games of control mechanism and treasurer be used under Of india context? Do you want to modify their functions in view of the company practice in India? Justify your opinion?\n\nAns.\n\nThe title of controller and treasurer not been implemented in India. In India, generally the official designated as financial control mechanism performs the function of chief curator. The title of finance mind is generally finance manager who is involved in the managing of company fund.\n\n1 ) b.\n\nA firm purchases a machinery to get Rs. eight, 00, 000 by making a down payment of Rs. one particular, 50, 000 and remainder in similar installments of Rs. one particular, 50, 500 for half a dozen years. Precisely what is the rate interesting to the organization? Ans.\n\nFacts\n\nCost\n\nof\n\nMachinery\n\nDeposit\n\nFinanced\n\nRepayment in\n\nsimilar\n\ninstallment\n\nTotal\n\npaid\n\ninterest\n\nRate of interest\n\nInterest rates\n\nper annum\n\nFascination cost\n\nRef\n\na\n\n365 days 0\n\n800, 000. 00\n\nb\n\nc=a-b\n\nd=6*150,\n\n500\n\n150, 1000. 00\n\n600, 000. 00\n\n900, 500. 00\n\ne=d-c\n\n250, 000. 00\n\nf=e/c\n\ng=f/6\n\n35. 46%\n\n6. 41%\n\nl\n\n21\n\n250, 000. 00\n\nPrincipal\n\ni=d-h\n\nOutstanding\n\nSeason\n\nwise j\n\ninterest rate\n\nInterest rate k\n\none particular\n\n650, 500. 00\n\n600, 000. 00\n\nYr 1\n\nYr two\n\nYr 3\n\nYr four\n\n150, 000\n\n. 00\n\na hundred and fifty, 000\n\n. 00\n\n150, 000. 150, 500. 150, 500. 150, 000.\n\n00\n\n00\n\n00\n\n00\n\n6\n\n=(250, 0\n\n00*6/21\n\n)=71, 40\n\n9\n\n78, 571.\n\n00\n\n571, 429\n\n. 00\n\neleven. 0%\n\n5\n\n=(250, zero\n\n00*5/21\n\n)=59, 52\n\nfour\n\n90, 476.\n\n00\n\n480, 952\n\n. 00\n\n10. 4%\n\n4\n\n=(250, 0\n\n00*4/21\n\n)=47, sixty one\n\n9\n\n102, 381.\n\n00\n\n378, 571.\n\n00\n\nbeing unfaithful. 9%\n\na few\n\n=(250, 0\n\n00*3/21\n\n)=35, 71\n\n5\n\n114, 286.\n\n00\n\n264, 286.\n\n00\n\n9. 4%\n\nYr a few\n\n2\n\n=(250, 0\n\n00*2/21\n\n)=23, seventy eight\n\n0\n\n126, 190.\n\n00\n\n138, 095.\n\n00\n\non the lookout for. 0%\n\nYr 6\n\n1\n\n=(250, zero\n\n00*1/21\n\n)=11, 90\n\n5\n\n138, 095.\n\n00\n\n0\n\n8. 6%\n\n2 . a.\n\nExplain the mechanism of calculating the current value of cash flows. What is annuity thanks? How can you estimate the present and future principles of an pension due? Demonstrate Ans.\n\nFunds has period value: e. g. Rs 1, 000 received today is not the same after yr\n\nPresent benefit of cash movement: It displays the value of predicted amount in current benefit. Discount level = Pumpiing rate & required charge of go back + risk free premium price Details necessary for calculating present value of money flows: Income year wise, discount level. This technique is incredibly useful for decision making.\n\nWorth of lump sum consideration today which is going\n\nComputation:\n\nLong term Value of Annuity\n\nBenefit of set investment annually – really worth\n\ntomorrow\n\nCalculation:\n\nAnnuity * Present value annuity element (PVAF)\n\nAnnuity * Future value premium factor (FVAF)\n\nPVAF = 1-[1/(1+r)^n]\n\nFVAF = [(1+r)^n]-1\n\nIllustration:\n\nModel:\n\nMr. By would like to receive Rs. you, 000/- every year for Mister. X want to grow simply by investment of Rs. 15, 000/10 years from at this point for 10 years from at this point\n\nIt is assumed lower price rate 10%, the present benefit Rate of interest @ 10%, the near future value annuity factor premium factor for 10 years 10% is 6th. 144\n\nintended for 10 years 10% is 1 . 594\n\nPresent value of annuity sama dengan 1, 500 * 6. 144 = Rs. 6th, 145/-\n\nLong term value of annuity = 10, 500 * 1 ) 594 sama dengan Rs. 12-15, 937/-\n\n”The increase in the risk-premium of all stocks, irrespective of their beta is the same when risk aversion increases” Comment with practical examples\n\nAns.\n\nThe safety beta is a function of correlation of security returns with the industry index results and the variability of the investments returns relative to the variability of index returns. Beta measures the sensitivity with the stocks with regards to broad centered market index. For instance: a beta to get 1 . 2 for a stock would suggest that this inventory is 20% riskier compared to the index and similarly beta of zero. 9 for the stock reveal 10% much less riskier than the index. Finally, a beta of 1. zero means, stock is as dangerous as the stock market index.\n\nTherefore , the given declaration is false. Expected risk premium to get stock is beta time the market risk premium. E. g. presume beta sama dengan 1 . two times, market risk premium = 10%,...\n\n## Related",
null,
"###### Essay on Marketing Prepare",
null,
"###### Marketing Project Essay",
null,
"###### Keeping Children Safe Composition",
null,
"###### Lesson Strategy Form 4 Persuasive Speech Essay",
null,
"###### But NOW I AM Not Fatigued Research Newspaper",
null,
"###### Bullying Composition",
null,
"###### Comp230 Wk 4 Vbscript Ip Mixture Research Newspaper",
null,
""
]
| [
null,
"https://lincolncharterschoolpa.com/images/pdl/images/195-kdwvnmfwiu3dkkuf0dhxgyexvgpswoc6acratcni.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/178-n5z1yd2rqp1ysdajkszye4ns22kg71jrhlpbppez.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/2248-tprtfhefx22ejc8ptrewihojo9nodhphy0hygjsh.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/2293-pv6rxuv4ugbz3cubg8tl93gf5fwsvkitgisfhovc.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/935-fuhyvwb39jl1vao9tqxeeikwpzgwdv8rewvznyub.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/357-ishbnglexg8eonfbzptus9ajbqrik9opo7ppmaso.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/1522-nltclnd6lyfejibet1nvxfggdtxnrhuufff020bp.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/89-ykdxc2a37bosplfgiugssmjbuzmiwduentsau3a5.jpeg",
null,
"https://lincolncharterschoolpa.com/images/pdl/images/133-xufhgcrr0gz3xerpc4zz2nin5lvwmqwqeepojokv.jpeg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.83858323,"math_prob":0.95566463,"size":4356,"snap":"2019-43-2019-47","text_gpt3_token_len":1325,"char_repetition_ratio":0.101792276,"word_repetition_ratio":0.007585335,"special_character_ratio":0.33976126,"punctuation_ratio":0.16493776,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95145404,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-22T22:52:06Z\",\"WARC-Record-ID\":\"<urn:uuid:97142f67-b4c6-485e-86bf-8e0ea0716c89>\",\"Content-Length\":\"69132\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9d592e51-cf32-45aa-948c-218cd22714ef>\",\"WARC-Concurrent-To\":\"<urn:uuid:f9dcf173-a55c-4e18-a4aa-78f0cf0c98a5>\",\"WARC-IP-Address\":\"104.24.114.166\",\"WARC-Target-URI\":\"https://lincolncharterschoolpa.com/monetary-management-comp/22889-financial-administration-comp-composition.html\",\"WARC-Payload-Digest\":\"sha1:4ZVMIHTBNU3E52OPRYIQ7RH4HBMPDHAR\",\"WARC-Block-Digest\":\"sha1:QSZ5CR4J45YQMG6CTX7Y7CF3KLUREUKH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496672170.93_warc_CC-MAIN-20191122222322-20191123011322-00497.warc.gz\"}"} |
https://resources.pcb.cadence.com/blog/2019-ohms-law-and-the-beginnings-of-voltage-current-and-resistance-calculations | [
"# Ohm's Law and the Beginnings of Voltage, Current, and Resistance Calculations\n\nJune 6, 2019",
null,
"No matter if you are a hobbyist, a technician, or if you are pursuing a career in design, you should start with a good understanding of what you are working with. For electronics this means working with ohm’s law. The basic principle of ohm’s law, which is the relationship between voltage, current, and resistance, is the foundation that electronic design is built on. And just as a building requires a solid foundation under it to support it, your ability to work with and utilize electricity relies on the solid foundation of ohm’s law and your understanding of it.\n\nAn ohm is the standard unit of electrical resistance, but you may be wondering where that term came from and how it all factors into ohm’s law. It all started with a German physicist and mathematician named Georg Ohm, and the term “ohm” was named after him. So where did ohm’s law originate from and what is this law? Let’s take a closer look.\n\n## Georg Ohm, the Originator of Ohm’s Law\n\nBorn in 1789, Georg Ohm started his professional life as a teacher of mathematics. He was not happy with his profession at first, however, and the different schools that he initially taught at were not the best positions either. Eventually, though he ended up teaching mathematics and physics at the Jesuit Gymnasium of Cologne. This was much more to his liking as the school had a good reputation for science education.\n\nGeorg Ohm had started experimenting with electricity which led him to publishing some papers on the subject. In 1827 he published his book; “The Galvanic Circuit Investigated Mathematically” where he gave his complete theory of electricity including the formula for what would eventually be called Ohm’s law. Unfortunately the school where he was employed did not appreciate his work causing Ohm to ultimately resign. Later he would go on to positions at other schools where his work was more widely recognized, and his discovery of the relationship between voltage, current, and resistance would become known worldwide as ohm’s law.",
null,
"Formulas used to depict Ohm’s law\n\n## What is Ohm’s Law?\n\nWhat Georg Ohm discovered and defined was how electrical voltage, current, and resistance affect each other in a circuit. A circuit is a closed loop of electricity, or charge. The components we use in a circuit will control the charge so that it will behave the way we need it to for the function of a particular circuit. To begin with the first thing we will do is to define these terms:\n\n• Voltage: In a circuit one point will have more charge than another. This difference in charge between the two points is voltage, and is measured in volts.\n\n• Current: The amount or volume of charge flowing through the circuit over a period of time. Current is measured in amperes, which is usually referred to as amps.\n\n• Resistance: Certain materials will resist the flow of electricity, and when these materials are used in a circuit they create resistance. The greater the resistance in a circuit, the less charge will flow. Resistance is measured in ohms.\n\nIt can be helpful to use the analogy of a water tank with a host connected to the bottom to better explain the relationship between voltage, current, and resistance.\n\n• The charge will be represented by the water in the tank that will flow out of the hose.\n\n• Voltage will be represented by the pressure of the water flow.\n\n• Current will be represented by the volume of water flow.\n\n• Resistance will be represented by the diameter of the hose.\n\nIf our water tank is elevated above the ground, the pressure of the water flowing out of the hose at the bottom would represent voltage while the volume of water flowing would represent current. If the diameter of the hose were to get smaller, the flow of water would be constricted resulting in less water flowing through. If the diameter of the hose were to get larger, then more water would be able to flow through. To summarize, the circuit with the higher resistance will restrict how much charge will flow through it.\n\nTo express ohm’s law in a formula where voltage equals current times resistance, you specify V = voltage in volts, I = current in amps, and R = resistance in ohms. This allows you to easily solve for each of the three elements:\n\n• V = I x R\n\n• I = V / R\n\n• R = V/ I\n\nTherefore in a 12 volt circuit that has a component with 6 ohms of resistance, we can calculate that 12 volts divided by 6 ohms of resistance will result in a current of 2 amps for our circuit. Although this is an extremely simple explanation, you can see how ohm’s law will be part of almost everything in electronics.",
null,
"PSpice is a circuit simulator that will allow you to find parameters in your design based on circuit goals\n\n## Why is Ohm’s Law Important?\n\nV=IR, or ohm's law, is the most fundamental law in electricity, and it will impact every circuit that you will work with. The efforts of Georg Ohm marked the first work in the subject of electrical theory and analysis, which is the process of finding the voltages across and the currents through all the components in a circuit.\n\nAlthough Ohm was at first confronted with a cold reception of his discovery, he persisted and eventually the importance of ohm’s law was recognized universally. It remains the most widely used of all the different rules and laws relating to electrical circuits and their behavior.\n\nAs you apply ohm’s law and other electronic principles and rules to your work, you will need analysis tools that can simulate your circuits and report back to you exactly what their behavior is. Utilizing proper SPICE tools can confirm theoretical concepts through simulation, allow you to create more complex circuit combinations before layout, as well as save an enormous amount of time from doing hand calculations.\n\nPSpice, from the Cadence design tool suite, will give you the ability to simulate your circuits in software saving you the time to build and manually test these circuits yourself. PSpice is the simulation tool of choice for users whether you are just starting out in the business or you are a seasoned engineer. You can completely recreate the circuit you have in the schematic tool of OrCAD Capture, as well, to be readily simulated with PSpice.\n\nIf you want to know more about how the simulation tools from Cadence will be the best solution for you, talk to us and our team of experts.\n\n###### Previous Article",
null,
"How to Maximize Compliance for EMC in PCB Design\n\nWhen considering how to maximize compliance for EMC in PCB design, maintain proper respect to current pathi...\n\n###### Next Article",
null,
"Beginner Tips For A Precise Analog To Digital Conversion Circuit\n\nIf you’re looking for beginner tips for a precise analog to digital conversion circuit, look no further. Wh..."
]
| [
null,
"https://content.cdntwrk.com/files/aHViPTg1NDMzJmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZjg0OTY1NDM4ODIuanBnJnZlcnNpb249MDAwMCZzaWc9NmRhNjk2NzJiOGZkYzA3YjkyOWRjMmIzMmRhYzAzZjc%253D",
null,
"https://content.cdntwrk.com/files/aHViPTg1NDMzJmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZjg0OTNlYzQxNDguanBnJnZlcnNpb249MDAwMCZzaWc9NDQ5NmYwYzYzOGEyOTRlMmY4OTBkOTM2NjhhM2I5MTE%253D",
null,
"https://content.cdntwrk.com/files/aHViPTg1NDMzJmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVjZjg0OTAzMDZhYTcuanBnJnZlcnNpb249MDAwMCZzaWc9YTZmZmZmYzZjNDE2Y2NlMzYyYTE2Yzc2NzgxM2VjOGU%253D",
null,
"https://content.cdntwrk.com/mediaproxy",
null,
"https://content.cdntwrk.com/mediaproxy",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9734958,"math_prob":0.9322604,"size":6396,"snap":"2021-43-2021-49","text_gpt3_token_len":1331,"char_repetition_ratio":0.1301627,"word_repetition_ratio":0.019642858,"special_character_ratio":0.20059413,"punctuation_ratio":0.085435316,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95950353,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T05:30:20Z\",\"WARC-Record-ID\":\"<urn:uuid:52e7ac8e-5a9d-4b25-ad1c-3ad15cd4c40f>\",\"Content-Length\":\"261688\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8ad0a756-9f7d-48be-acd2-b6d3cb4824b0>\",\"WARC-Concurrent-To\":\"<urn:uuid:38b88af2-4de6-4cc3-b6d1-8b710fab4c85>\",\"WARC-IP-Address\":\"52.60.160.16\",\"WARC-Target-URI\":\"https://resources.pcb.cadence.com/blog/2019-ohms-law-and-the-beginnings-of-voltage-current-and-resistance-calculations\",\"WARC-Payload-Digest\":\"sha1:K6BC462HH3XORVHHBVLLXCNBKMVILPSG\",\"WARC-Block-Digest\":\"sha1:2Y6HHYJ4DUYJRTYZVN5J2GYI6U36S6X5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585381.88_warc_CC-MAIN-20211021040342-20211021070342-00440.warc.gz\"}"} |
https://encyclopediaofmath.org/index.php?title=Strong_mixing_conditions&printable=yes | [
"# Strong mixing conditions\n\nThis article Strong Mixing Conditions was adapted from an original article by Richard Crane Bradley, which appeared in StatProb: The Encyclopedia Sponsored by Statistics and Probability Societies. The original article ([http://statprob.com/encyclopedia/StrongMixingConditions.html StatProb Source], Local Files: pdf | tex) is copyrighted by the author(s), the article has been donated to Encyclopedia of Mathematics, and its further issues are under Creative Commons Attribution Share-Alike License'. All pages from StatProb are contained in the Category StatProb.\n\n2010 Mathematics Subject Classification: Primary: 60G10 Secondary: 60G99 [MSN][ZBL]\n\nStrong Mixing Conditions\n\nDepartment of Mathematics, Indiana University, Bloomington, Indiana, USA\n\nThere has been much research on stochastic models that have a well defined, specific structure --- for example, Markov chains, Gaussian processes, or linear models, including ARMA (autoregressive -- moving average) models. However, it became clear in the middle of the last century that there was a need for a theory of statistical inference (e.g. central limit theory) that could be used in the analysis of time series that did not seem to \"fit\" any such specific structure but which did seem to have some \"asymptotic independence\" properties. That motivated the development of a broad theory of \"strong mixing conditions\" to handle such situations. This note is a brief description of that theory.\n\nThe field of strong mixing conditions is a vast area, and a short note such as this cannot even begin to do justice to it. Journal articles (with one exception) will not be cited; and many researchers who made important contributions to this field will not be mentioned here. All that can be done here is to give a narrow snapshot of part of the field.\n\nThe strong mixing ($\\alpha$-mixing) condition. Suppose $X := (X_k, k \\in {\\mathbf Z})$ is a sequence of random variables on a given probability space $(\\Omega, {\\cal F}, P)$. For $-\\infty \\leq j \\leq \\ell \\leq \\infty$, let ${\\cal F}_j^\\ell$ denote the $\\sigma$-field of events generated by the random variables $X_k, j \\leq k \\leq \\ell (k \\in {\\mathbf Z})$. For any two $\\sigma$-fields ${\\cal A}$ and ${\\cal B} \\subset {\\cal F}$, define the \"measure of dependence\" $$\\alpha({\\cal A}, {\\cal B}) := \\sup_{A \\in {\\cal A}, B \\in {\\cal B}} |P(A \\cap B) - P(A)P(B)|. \\tag{1}$$ For the given random sequence $X$, for any positive integer $n$, define the dependence coefficient $$\\alpha(n) = \\alpha(X,n) := \\sup_{j \\in '''Z'''} \\alpha({\\cal F}_{-\\infty}^j, {\\cal F}_{j + n}^{\\infty}). \\tag{2}$$ By a trivial argument, the sequence of numbers $(\\alpha(n), n \\in {\\mathbf N})$ is nonincreasing. The random sequence $X$ is said to be \"strongly mixing\", or \"$\\alpha$-mixing\", if $\\alpha(n) \\to 0$ as $n \\to \\infty$. This condition was introduced in 1956 by Rosenblatt [Ro1], and was used in that paper in the proof of a central limit theorem. (The phrase \"central limit theorem\" will henceforth be abbreviated CLT.)\n\nIn the case where the given sequence $X$ is strictly stationary (i.e. its distribution is invariant under a shift of the indices), eq. (2) also has the simpler form $$\\alpha(n) = \\alpha(X,n) := \\alpha({\\cal F}_{-\\infty}^0, {\\cal F}_n^{\\infty}). \\tag{3}$$ For simplicity, in the rest of this note, we shall restrict to strictly stationary sequences. (Some comments below will have obvious adaptations to nonstationary processes.)\n\nIn particular, for strictly stationary sequences, the strong mixing ($\\alpha$-mixing) condition implies Kolmogorov regularity (a trivial \"past tail\" $\\sigma$-field), which in turn implies \"mixing\" (in the ergodic-theoretic sense), which in turn implies ergodicity. (None of the converse implications holds.) For further related information, see e.g. [Br, v1, Chapter 2].\n\nComments on limit theory under $\\alpha$-mixing. Under $\\alpha$-mixing and other similar conditions (including ones reviewed below), there has been a vast development of limit theory --- for example, CLTs, weak invariance principles, laws of the iterated logarithm, almost sure invariance principles, and rates of convergence in the strong law of large numbers. For example, the CLT in [Ro1] evolved through subsequent refinements by several researchers into the following \"canonical\" form. (For its history and a generously detailed presentation of its proof, see e.g. [Br, v1, Theorems 1.19 and 10.2].)\n\nTheorem 1. Suppose $(X_k, k \\in {\\mathbf Z})$ is a strictly stationary sequence of random variables such that $EX_0 = 0$, $EX_0^2 < \\infty$, $\\sigma_n^2 := ES_n^2 \\to \\infty$ as $n \\to \\infty$, and $\\alpha(n) \\to 0$ as $n \\to \\infty$. Then the following two conditions (A) and (B) are equivalent:\n\n(A) The family of random variables $(S_n^2/\\sigma_n^2, n \\in {\\mathbf N})$ is uniformly integrable.\n\n(B) $S_n/\\sigma_n \\Rightarrow N(0,1)$ as $n \\to \\infty$.\n\nIf (the hypothesis and) these two equivalent conditions (A) and (B) hold, then $\\sigma_n^2 = n \\cdot h(n)$ for some function $h(t), t \\in (0, \\infty)$ which is slowly varying as $t \\to \\infty$.\n\nHere $S_n := X_1 + X_2 + \\dots + X_n$; and $\\Rightarrow$ denotes convergence in distribution. The assumption $ES_n^2 \\to \\infty$ is needed here in order to avoid trivial $\\alpha$-mixing (or even 1-dependent) counterexamples in which a kind of \"cancellation\" prevents the partial sums $S_n$ from \"growing\" (in probability) and becoming asymptotically normal.\n\nIn the context of Theorem 1, if one wants to obtain asymptotic normality of the partial sums (as in condition (B)) without an explicit uniform integrability assumption on the partial sums (as in condition (A)), then as an alternative, one can impose a combination of assumptions on, say, (i) the (marginal) distribution of $X_0$ and (ii) the rate of decay of the numbers $\\alpha(n)$ to 0 (the \"mixing rate\"). This involves a \"trade-off\"; the weaker one assumption is, the stronger the other has to be. One such CLT of Ibragimov in 1962 involved such a \"trade-off\" in which it is assumed that for some $\\delta > 0$, $E|X_0|^{2 + \\delta} < \\infty$ and $\\sum_{n=1}^\\infty [\\alpha(n)]^{\\delta/(2 + \\delta)} < \\infty$. Counterexamples of Davydov in 1973 (with just slightly weaker properties) showed that that result is quite sharp. However, it is not at the exact \"borderline\". From a covariance inequality of Rio in 1993 and a CLT (in fact a weak invariance principle) of Doukhan, Massart, and Rio in 1994, it became clear that the \"exact borderline\" CLTs of this kind have to involve quantiles of the (marginal) distribution of $X_0$ (rather than just moments). For a generously detailed exposition of such CLTs, see [Br, v1, Chapter 10]; and for further related results, see also Rio [Ri].\n\nUnder the hypothesis (first sentence) of Theorem 1 (with just finite second moments), there is no mixing rate, no matter how fast (short of $m$-dependence), that can insure that a CLT holds. That was shown in 1983 with two different counterexamples, one by the author and the other by Herrndorf. See [Br, v1&3, Theorem 10.25 and Chapter 31].\n\nSeveral other classic strong mixing conditions. As indicated above, the terms \"$\\alpha$-mixing\" and \"strong mixing condition\" (singular) both refer to the condition $\\alpha(n) \\to 0$. (A little caution is in order; in ergodic theory, the term \"strong mixing\" is often used to refer to the condition of \"mixing in the ergodic-theoretic sense\", which is weaker than $\\alpha$-mixing as noted earlier.) The term \"strong mixing conditions\" (plural) can reasonably be thought of as referring to all conditions that are at least as strong as (i.e. that imply) $\\alpha$-mixing. In the classical theory, five strong mixing conditions (again, plural) have emerged as the most prominent ones: $\\alpha$-mixing itself and four others that will be defined here.\n\nRecall our probability space $(\\Omega, {\\cal F}, P)$. For any two $\\sigma$-fields ${\\cal A}$ and ${\\cal B} \\subset {\\cal F}$, define the following four \"measures of dependence\": \\eqalignno{ \\phi({\\cal A}, {\\cal B}) &:= \\sup_{A \\in {\\cal A}, B \\in {\\cal B}, P(A) > 0} |P(B|A) - P(B)|; & (4) \\cr \\psi({\\cal A}, {\\cal B}) &:= \\sup_{A \\in {\\cal A}, B \\in {\\cal B}, P(A) > 0, P(B) > 0} |P(B \\cap A)/[P(A)P(B)]\\thinspace -\\thinspace 1|; & (5) \\cr \\rho({\\cal A}, {\\cal B}) &:= \\sup_{f \\in {\\cal L}^2({\\cal A}),\\thinspace g \\in {\\cal L}^2({\\cal B})} |{\\rm Corr}(f,g)|; \\quad {\\rm and} & (6) \\cr \\beta ({\\cal A}, {\\cal B}) &:= \\sup (1/2) \\sum_{i=1}^I \\sum_{j=1}^J |P(A_i \\cap B_j) - P(A_i)P(B_j)| & (7) \\cr } where the latter supremum is taken over all pairs of finite partitions $(A_1, A_2, \\dots, A_I)$ and $(B_1, B_2, \\dots, B_J)$ of $\\Omega$ such that $A_i \\in {\\cal A}$ for each $i$ and $B_j \\in {\\cal B}$ for each $j$. In (6), for a given $\\sigma$-field ${\\cal D} \\subset {\\cal F}$, the notation ${\\cal L}^2({\\cal D})$ refers to the space of (equivalence classes of) square-integrable, ${\\cal D}$-measurable random variables.\n\nNow suppose $X := (X_k, k \\in {\\mathbf Z})$ is a strictly stationary sequence of random variables on $(\\Omega, {\\cal F}, P)$. For any positive integer $n$, analogously to (3), define the dependence coefficient $$\\phi(n) = \\phi(X,n) := \\phi({\\cal F}_{-\\infty}^0, {\\cal F}_n^{\\infty}), \\tag{8}$$ and define analogously the dependence coefficients $\\psi(n)$, $\\rho(n)$, and $\\beta(n)$. Each of these four sequences of dependence coefficients is trivially nonincreasing. The (strictly stationary) sequence $X$ is said to be\n\n\"$\\phi$-mixing\" if $\\phi(n) \\to 0$ as $n \\to \\infty$;\n\n\"$\\psi$-mixing\" if $\\psi(n) \\to 0$ as $n \\to \\infty$;\n\n\"$\\rho$-mixing\" if $\\rho(n) \\to 0$ as $n \\to \\infty$; and\n\n\"absolutely regular\", or \"$\\beta$-mixing\", if $\\beta(n) \\to 0$ as $n \\to \\infty$.\n\nThe $\\phi$-mixing condition was introduced by Ibragimov in 1959 and was also studied by Cogburn in 1960. The $\\psi$-mixing condition evolved through papers of Blum, Hanson, and Koopmans in 1963 and Philipp in 1969; and (see e.g. [Io]) it was also implicitly present in earlier work of Doeblin in 1940 involving the metric theory of continued fractions. The $\\rho$-mixing condition was introduced by Kolmogorov and Rozanov 1960. (The \"maximal correlation coefficient\" $\\rho({\\cal A}, {\\cal B})$ itself was first studied by Hirschfeld in 1935 in a statistical context that had no particular connection with \"stochastic processes\".) The absolute regularity ($\\beta$-mixing) condition was introduced by Volkonskii and Rozanov in 1959, and in the ergodic theory literature it is also called the \"weak Bernoulli\" condition.\n\nFor the five measures of dependence in (1) and (4)--(7), one has the following well known inequalities: \\eqalignno{ 2\\alpha({\\cal A}, {\\cal B}) \\thinspace & \\leq \\thinspace \\beta({\\cal A}, {\\cal B}) \\thinspace \\leq \\thinspace \\phi({\\cal A}, {\\cal B}) \\thinspace \\leq \\thinspace (1/2) \\psi({\\cal A}, {\\cal B}); \\cr 4 \\alpha({\\cal A}, {\\cal B})\\thinspace &\\leq \\thinspace \\rho({\\cal A}, {\\cal B}) \\thinspace \\leq \\thinspace \\psi({\\cal A}, {\\cal B}); \\quad {\\rm and} \\cr \\rho({\\cal A}, {\\cal B}) \\thinspace &\\leq \\thinspace 2 [\\phi({\\cal A}, {\\cal B})]^{1/2} [\\phi({\\cal B}, {\\cal A})]^{1/2} \\thinspace \\leq \\thinspace 2 [\\phi({\\cal A}, {\\cal B})]^{1/2}. \\cr } For a history and proof of these inequalities, see e.g. [Br, v1, Theorem 3.11]. As a consequence of these inequalities and some well known examples, one has the following \"hierarchy\" of the five strong mixing conditions here:\n\n(i) $\\psi$-mixing implies $\\phi$-mixing.\n\n(ii) $\\phi$-mixing implies both $\\rho$-mixing and $\\beta$-mixing (absolute regularity).\n\n(iii) $\\rho$-mixing and $\\beta$-mixing each imply $\\alpha$-mixing (strong mixing).\n\n(iv) Aside from “transitivity”, there are in general no other implications between these five mixing conditions. In particular, neither of the conditions $\\rho$-mixing and $\\beta$-mixing implies the other.\n\nFor all of these mixing conditions, the “mixing rates” can be essentially arbitrary,\n\nFor all of these mixing conditions, the \"mixing rates\" can be essentially arbitrary, and in particular, arbitrarily slow. That general principle was established by Kesten and O'Brien in 1976 with several classes of examples. For further details, see e.g. [Br, v3, Chapter 26].\n\nThe various strong mixing conditions above have been used extensively in statistical inference for weakly dependent data. See e.g. [DDLLLP], [DMS], [Ro3], or [Žu].\n\nIbragimov's conjecture and related material. Suppose (as in Theorem 1) $X := (X_k, k \\in {\\mathbf Z})$ is a strictly stationary sequence of random variables such that $$EX_0 = 0, \\ EX_0^2 < \\infty, \\ {\\ \\rm and\\ } ES_n^2 \\to \\infty {\\ \\rm as\\ } n \\to \\infty. \\tag{9}$$\n\nIn the 1960s, I.A. Ibragimov conjectured that under these assumptions, if also $X$ is $\\phi$-mixing, then a CLT holds. Technically, this conjecture remains unsolved. Peligrad showed in 1985 that it holds under the stronger \"growth\" assumption $\\liminf_{n \\to \\infty} n^{-1} ES_n^2 > 0$. (See e.g. [Br, v2, Theorem 17.7].)\n\nUnder (9) and $\\rho$-mixing (which is weaker than $\\phi$-mixing), a CLT need not hold (see [Br, v3, Chapter 34] for counterexamples). However, if one also imposes either the stronger moment condition $E|X_0|^{2 + \\delta} < \\infty$ for some $\\delta > 0$, or else the \"logarithmic\" mixing rate assumption $\\sum_{n=1}^\\infty \\rho(2^n) < \\infty$, then a CLT does hold (results of Ibragimov in 1975). For further limit theory under $\\rho$-mixing, see e.g. [LL] or [Br, v1, Chapter 11].\n\nUnder (9) and an \"interlaced\" variant of the $\\rho$-mixing condition (i.e. with the two index sets allowed to be \"interlaced\" instead of just \"past\" and \"future\"), a CLT does hold. For this and related material, see e.g. [Br, v1, Sections 11.18-11.28].\n\nThere is a vast literature on central limit theory for random fields satisfying various strong mixing conditions. See e.g. [Ro3], [Žu], [Do], and [Br, v3]. In the formulation of mixing conditions for random fields --- and also \"interlaced\" mixing conditions for random sequences --- some caution is needed; see e.g. [Br, v1&3, Theorems 5.11, 5.13, 29.9, and 29.12].\n\nConnections with specific types of models. Now let us return briefly to a theme from the beginning of this write-up: the connection between strong mixing conditions and specific structures.\n\nMarkov chains. Suppose $X := (X_k, k \\in {\\mathbf Z})$ is a strictly stationary Markov chain. In the case where $X$ has finite state space and is irreducible and aperiodic, it is $\\psi$-mixing, with at least exponentially fast mixing rate. In the case where $X$ has countable (but not necessarily finite) state space and is irreducible and aperiodic, it satisfies $\\beta$-mixing, but the mixing rate can be arbitrarily slow. In the case where $X$ has (say) real (but not necessarily countable) state space, (i) Harris recurrence and \"aperiodicity\" (suitably defined) together are equivalent to $\\beta$-mixing, (ii) the \"geometric ergodicity\" condition is equivalent to $\\beta$-mixing with at least exponentially fast mixing rate, and (iii) one particular version of \"Doeblin's condition\" is equivalent to $\\phi$-mixing (and the mixing rate will then be at least exponentially fast). There exist strictly stationary, countable-state Markov chains that are $\\phi$-mixing but not \"time reversed\" $\\phi$-mixing (note the asymmetry in the definition of $\\phi({\\cal A}, {\\cal B})$ in (4)). For this and other information on strong mixing conditions for Markov chains, see e.g. [Ro2, Chapter 7], [Do], [MT], and [Br, v1&2, Chapters 7 and 21].\n\nStationary Gaussian sequences. For stationary Gaussian sequences $X := (X_k, k \\in {\\mathbf Z})$, Ibragimov and Rozanov [IR] give characterizations of various strong mixing conditions in terms of properties of spectral density functions. Here are just a couple of comments: For stationary Gaussian sequences, the $\\alpha$- and $\\rho$-mixing conditions are equivalent to each other, and the $\\phi$- and $\\psi$-mixing conditions are each equivalent to $m$-dependence. If a stationary Gaussian sequence has a continuous positive spectral density function, then it is $\\rho$-mixing. For some further closely related information on stationary Gaussian sequences, see also [Br, v1&3, Chapters 9 and 27].\n\nDynamical systems. Many dynamical systems have strong mixing properties. Certain one-dimensional \"Gibbs states\" processes are $\\psi$-mixing with at least exponentially fast mixing rate. A well known standard \"continued fraction\" process is $\\psi$-mixing with at least exponentially fast mixing rate (see [Io]). For certain stationary finite-state stochastic processes built on piecewise expanding mappings of the unit interval onto itself, the absolute regularity condition holds with at least exponentially fast mixing rate. For more detains on the mixing properties of these and other dynamical systems, see e.g. Denker [De].\n\nLinear and related processes. There is a large literature on strong mixing properties of strictly stationary linear processes (including strictly stationary ARMA processes and also \"non-causal\" linear processes and linear random fields) and also of some other related processes such as bilinear, ARCH, or GARCH models. For details on strong mixing properties of these and other related processes, see e.g. Doukhan [Do, Chapter 2].\n\nHowever, many strictly stationary linear processes fail to be $\\alpha$-mixing. A well known classic example is the strictly stationary AR(1) process (autoregressive process of order 1) $X := (X_k, k \\in {\\mathbf Z})$ of the form $X_k = (1/2)X_{k-1} + \\xi_k$ where $(\\xi_k, k \\in {\\mathbf Z})$ is a sequence of independent, identically distributed random variables, each taking the values 0 and 1 with probability 1/2 each. It has long been well known that this random sequence $X$ is not $\\alpha$-mixing. For more on this example, see e.g. [Br, v1, Example 2.15] or [Do, Section 2.3.1].\n\nFurther related developments. The AR(1) example spelled out above, together with many other examples that are not $\\alpha$-mixing but seem to have some similar \"weak dependence\" quality, have motivated the development of more general conditions of weak dependence that have the \"spirit\" of, and most of the advantages of, strong mixing conditions, but are less restrictive, i.e. applicable to a much broader class of models (including the AR(1) example above). There is a substantial development of central limit theory for strictly stationary sequences under weak dependence assumptions explicitly involving characteristic functions in connection with \"block sums\"; much of that theory is codified in [Ja]. There is a substantial development of limit theory of various kinds under weak dependence assumptions that involve covariances of certain multivariate Lipschitz functions of random variables from the \"past\" and \"future\" (in the spirit of, but much less restrictive than, say, the dependence coefficient $\\rho(n)$ defined analogously to (3) and (8)); see e.g. [DDLLLP]. There is a substantial development of limit theory under weak dependence assumptions that involve dependence coefficients similar to $\\alpha(n)$ in (3) but in which the classes of events are restricted to intersections of finitely many events of the form $\\{X_k > c\\}$ for appropriate indices $k$ and appropriate real numbers $c$; for the use of such conditions in extreme value theory, see e.g. [LLR]. In recent years, there has been a considerable development of central limit theory under \"projective\" criteria related to martingale theory (motivated by Gordin's martingale-approximation technique --- see [HH]); for details, see e.g. [Pe]. There are far too many other types of weak dependence conditions, of the general spirit of strong mixing conditions but less restrictive, to describe here; for more details, see e.g. [DDLLLP] or [Br, v1, Chapter 13].\n\nHow to Cite This Entry:\nStrong mixing conditions. Encyclopedia of Mathematics. URL: http://encyclopediaofmath.org/index.php?title=Strong_mixing_conditions&oldid=38548"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8764504,"math_prob":0.99666727,"size":22561,"snap":"2022-40-2023-06","text_gpt3_token_len":6357,"char_repetition_ratio":0.1404442,"word_repetition_ratio":0.064023495,"special_character_ratio":0.28278887,"punctuation_ratio":0.15810186,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99947685,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T14:29:28Z\",\"WARC-Record-ID\":\"<urn:uuid:51494874-0b34-41c5-aea5-1cdcb74b367b>\",\"Content-Length\":\"40828\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bc7f8c41-4c3c-4a8e-a242-9df83322e184>\",\"WARC-Concurrent-To\":\"<urn:uuid:88f320b7-c465-4ccb-afc3-2caef452ce98>\",\"WARC-IP-Address\":\"34.96.94.55\",\"WARC-Target-URI\":\"https://encyclopediaofmath.org/index.php?title=Strong_mixing_conditions&printable=yes\",\"WARC-Payload-Digest\":\"sha1:IAZ42KRLQFC2STFMQMTNJX2YF67TFHMO\",\"WARC-Block-Digest\":\"sha1:MLXH7KS2DOO7EBACDAAOECDBIOKQPEOK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500056.55_warc_CC-MAIN-20230203122526-20230203152526-00630.warc.gz\"}"} |
https://lavelle.chem.ucla.edu/forum/viewtopic.php?f=26&t=30525 | [
"## What do the coefficients/subscripts represent [ENDORSED]\n\nsylvie_1D\nPosts: 31\nJoined: Fri Apr 06, 2018 11:04 am\n\n### What do the coefficients/subscripts represent\n\nHi, so I was solving problem E29, and I was curious as to how many moles of hydrogen are there in 4H2O? Someone has told me 8 and another has told me 2.\n\nJennifer Ma 1G\nPosts: 31\nJoined: Fri Apr 06, 2018 11:03 am\n\n### Re: What do the coefficients/subscripts represent\n\nIn a single H20 molecule, there are 2 atoms of hydrogen. However, the coefficient 4 in front of the H20 means there are 4 H20 molecules. So, there are 8 total atoms of hydrogen in the 4H20 molecules (2 atoms of hydrogen per 1 H20 molecule x 4 H20 molecules = 8 atoms of hydrogen atoms).\n\nHaison Nguyen 1I\nPosts: 30\nJoined: Fri Apr 06, 2018 11:04 am\n\n### Re: What do the coefficients/subscripts represent\n\nWhen there is a coefficient in front of a molecule, you would multiply that number by the number of atoms in each element. So for H20, there are 2 hydrogen atoms and one oxygen atom. However, since there is a coefficient of 4 in front of it, you would multiply it by each element and get 8 hydrogen atoms and 4 oxygen atoms.\n\nChristina Inchuachan 1C\nPosts: 7\nJoined: Wed Nov 15, 2017 3:04 am\n\n### Re: What do the coefficients/subscripts represent\n\nCoefficients represent the number of molecules in the equation while the subscripts represent the number of atoms of the element.\n\nShione Nakahara 1F\nPosts: 31\nJoined: Fri Apr 06, 2018 11:04 am\n\n### Re: What do the coefficients/subscripts represent\n\n4 molecules of H20 has 8 atoms of hydrogen total\n\nNimrat Brar 1E\nPosts: 30\nJoined: Fri Apr 06, 2018 11:02 am\nBeen upvoted: 1 time\n\n### Re: What do the coefficients/subscripts represent\n\nCoefficients represent the amount of molecules that are part of the equation so in your example, since there are 4 molecules of H20, there would be a total of 8 hydrogen atoms.\n\nReese - Dis 1G\nPosts: 31\nJoined: Fri Sep 28, 2018 12:15 am\n\n### Re: What do the coefficients/subscripts represent\n\nThe coefficient is called the stoichiometric coefficient and it is what you can change to balance equations, but it also tells you how many moles of a molecule you have. In this example, 4 is the stoichiometric coefficient, so you would have 4 moles.\n\nChem_Mod\nPosts: 18400\nJoined: Thu Aug 04, 2011 1:53 pm\nHas upvoted: 435 times\n\n### Re: What do the coefficients/subscripts represent [ENDORSED]\n\nMost of the above answers are correct. There should be 8 moles of hydrogen because there are 4 molecules with 2 hydrogen atoms each. If we were referring to the number of moles of water, then the answer would be 4 (4 molecules of water total)."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.92562044,"math_prob":0.657847,"size":2564,"snap":"2020-24-2020-29","text_gpt3_token_len":671,"char_repetition_ratio":0.18046875,"word_repetition_ratio":0.14757709,"special_character_ratio":0.2675507,"punctuation_ratio":0.13051823,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99303716,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-29T05:34:09Z\",\"WARC-Record-ID\":\"<urn:uuid:6527a548-782b-449d-8ad7-0c69b9d98549>\",\"Content-Length\":\"66672\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8796b371-7a25-47f6-ac7c-9cc0aba4166e>\",\"WARC-Concurrent-To\":\"<urn:uuid:25c738c9-63b0-4134-af06-2187558e5813>\",\"WARC-IP-Address\":\"169.232.134.130\",\"WARC-Target-URI\":\"https://lavelle.chem.ucla.edu/forum/viewtopic.php?f=26&t=30525\",\"WARC-Payload-Digest\":\"sha1:ANE7NEZMDMJRL2ZGZSHCOECRKZQZPL4F\",\"WARC-Block-Digest\":\"sha1:QUA5PW6YCYIMBKUHL6MJOKN45N3IUOH5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347401260.16_warc_CC-MAIN-20200529023731-20200529053731-00400.warc.gz\"}"} |
https://www.jmelectronics.co.za/2014-05-19/tons-quarry-dust-convert-to-meter-cube.html | [
"## Request for Quotation\n\nYou can get the price list and a SCH representative will contact you within one business day.",
null,
"### Calculate the Cubic Yards of Stone Dust You Need\n\nStone dust, sand, and other base materials are usually sold in 0.5 cubic yard increments. So here you would round the 1.19 cubic yards to 1.5 cubic yards of sand or stone dust. It is better to have a little extra than to run short and have to pause your project to order more.\n\nGet Price",
null,
"### DIY Conversion Tables and Conversion Information DIY\n\n1.6 tonnes per cubic metre loam = 1.28 tonnes per cubic metre peat (wet) = 0.96 tonnes per cubic metre peat (dry) = 0.8 tonnes per cubic metre lump chalk = 1.2 tonnes per cubic metre sandstone = 2.32 tonnes per cubic metre Lias = 2.48 tonnes per cubic metre granite = 2.72 tonnes per cubic metre slate = 2.8 tonnes per cubic metre flint = 2.3 tonnes per cubic metre yorkstone =\n\nGet Price",
null,
"### how many cubic meters is 20 tons of granite BINQ Mining\n\nMay 24, 2008 · Best Answer two tons of stone to dust (crusher run or quarry waste) is 1.8 m3 or a cubic meter or a 2.2 tons Hope this helps. John. John. » More detailed\n\nGet Price",
null,
"[DOC]\n\n### VOLUME-TO-WEIGHT CONVERSION FACTORS\n\n) MSW, (uncompacted) One cubic yard 150-300 (225 Average) MSW, (compacted in truck) One cubic yard 500-1,000 MSW, compacted in packer truck 3.3 cubic yards 2000 (Average) C & D; Clean Fill Concrete One cubic yard 860 Asphalt Paving One cubic yard 773 Brick, Ceramic, Porcelain One cubic yard 860 Roofing One cubic yard 731 Wood One cubic yard 169\n\nGet Price",
null,
"[]\n\n### Material Weight Pounds per Cubic Yard\n\nFTruck Body Pricing & BrochuresExcelCubic_Yardage_Chart DCubic_Yardage_Chart D Rev A 6/9/2015 AGGREGATE TYPE\n\nGet Price",
null,
"### Construction Materials Vulcan Materials Company\n\nConstruction Aggregate Calculator. Enter the width, length, thickness, and product density and hit the \"Calculate\" button to calculate your estimate. If you do not know the product density, use the optional density estimator* or contact a local sales representative.\n\nGet Price",
null,
"### How Do You Convert Cubic Meters to Tons? Reference\n\nDensity in grams per milliliter is numerically equivalent to density in metric tons per cubic meter, and it is multiplied by 1.10 to convert to short tons per cubic meter. Density in pounds per cubic foot is multiplied by 0.016 to convert to metric tons per cubic meter, and it\n\nGet Price",
null,
"### Gravel Calculator how much gravel you need in tons\n\nA cubic yard of typical gravel weighs about 2830 pounds or 1.42 tons. A square yard of gravel with a depth of 2 in (~5 cm) weighs about 157 pounds (~74 kg). The gravel is assumed clean of dirt and other debris. How much does a cubic meter of gravel weigh? A cubic meter of typical gravel weighs 1,680 kilograms 1.68 tonnes.\n\nGet Price",
null,
"### How Many Tons Of Crushed Limestone In A Cubic Yard\n\nDepending on the limestone, solid rock will be in the range of 2350 to 2850 kg/m 3. Convert Tons to Cubic Yards Converting tons to cubic yards\n\nGet Price",
null,
"### Aggregates Morris and Perry Ltd\n\nQuarry owners supplying the full range aggregates and construction materials throughout Somerset, Dorset, Bath and Bristol. Bulk Orders only, competitive rates. Accept We use cookies to ensure that we give you the best experience on our website .\n\nGet Price",
null,
"### what volume of 1 ton of quarry dust Grinding Mill China\n\nA cubic yard of soil or sand mix weighs approximately 2500 lbs = about 1.25 tons. made of different sizes of aggregate rock including ¾ inch to fine dust. » Learn More. conversion meter cube to cubic feet for crusher Conversion information for all manner of materials including, lengths, volume,\n\nGet Price",
null,
"### How to Calculate Cement, Sand and Aggregate required for\n\nFrom above, if the concrete mix is 124, to get a cubic meter of concrete we require. 1.Cement = 6 bags = 300 kgs. 2.Fine Aggregate = 115/0.167 = 689 kg. 3.Coarse Aggregate = 209/0.167 = 1252 kg. 4.Water = 300/0.55 = 165 kg.\n\nGet Price",
null,
"### Cubic Yards Calculator Calculator Soup Online\n\nCalculate a Rectangle Area Calculator Use. Calculate cubic yards volume for landscape material, mulch, land fill, gravel, cement or containers. Enter dimensions in US units (inches or feet) or metric units (centimeters or meters) to calculate the cubic yards, cubic feet and cubic meters.\n\nGet Price",
null,
"[]\n\n### AIR CALCULATIONS AND CONVERSIONS GUIDE\n\nAir Calculations and Conversions Guide AWMA Iowa Chapter SULFUR DIOXIDE EMISSIONS DEFINITIONS mw PPm DSCFM mg m3 ft3 SO, P hr R F min lb density air B WO molecular weight (air = 29.95, SO, = 64) parts per million Dry cubic feet per minute at standard conditions milligrams cubic meter cubic feet sulfur dioxide pressure (usually in pounds per square inch (psi)) hour\n\nGet Price",
null,
"### Welcome to Kinsella Quarries\n\nThe conversion factor from cubic yards to tons varies depending on the type of material you are using. A general rule would be that if the material is compactible (e.g. crusher run, select fill, stone dust), you should use a factor of 1.5 tons per cubic yard.\n\nGet Price",
null,
"### Metal Converter The Calculator Site\n\nDisclaimer. Whilst every effort has been made in building this metal conversion tool, we are not to be held liable for any special, incidental, indirect or consequential damages or monetary losses of any kind arising out of or in connection with the use of the converter tools\n\nGet Price",
null,
"### Gas Volume Conversion CheCalc\n\nGas Volume Conversion to ACFM, SCFM, MMSCFD, standard cubic meter per hour (Sm3/h), Normal cubic meter per hour (Nm3/h) CheCalc Chemical engineering calculations to assist process, plant operation and maintenance engineers.\n\nGet Price",
null,
"### Cubic Meter Calculator (in,ft,yd,mm,cm,m to cubic meter)\n\nConvert from measurements in cm to cubic meters, when we measure the dimension of a carton with a ruler, the unit is centimeters, and we need calculate the cubic meters. 42 cm = 42 ÷ 100 m = 0.42 m 37 cm = 37 ÷ 100 m = 0.37 m\n\nGet Price",
null,
"### Aggregate Calculator Cloburn Europe's Premier Red\n\nUn-compacted Cloburn aggregates weigh 1.4 tonnes per cubic metre. Therefore if you wish to apply them at a 50mm depth (the normal depth for a driveway) one tonne will cover 14 square metres. Therefore if you wish to apply them at a 50mm depth (the normal depth\n\nGet Price",
null,
"[DOC]\n\n### CONVERSION OF UNITS azdeq.gov\n\nCONVERSION OF UNITS To Convert From To Multiply by 1 (MM) 1,000,000 1000000 1(M) 1,000 1000 cubic yards (cu yd) cubic feet (cu ft) 0.1111111 cubic feet (cu ft) cubic yards (cu yd) 9 gallons (gals) barrels (bbls) 0.0238095 acres square feet 43560 square feet acres 2.29568E-05 grains/cubic foot grams/cubic meter 2.28835 grams/cubic meter grains/cubic\n\nGet Price",
null,
"### t/m³ Tonne Per Cubic Meter. Conversion Chart / Density\n\nThis is a conversion chart for tonne per cubic meter (Metric System). To switch the unit simply find the one you want on the page and click it. You can also go to the universal conversion page. 2. Enter the value you want to convert (tonne per cubic meter). Then click the Convert Me button.\n\nGet Price",
null,
"### Stone Material Calculators\n\nThere is about 15 cubic feet in a ton of building stone or flagstone so divide the cubic footage by 15 to determine the quantity of stone needed in tons Example A 20' long stacked stone wall that is\n\nGet Price",
null,
"### How to Calculate Limestone Gravel Estimate Hunker\n\nCrushed limestone is a popular material used to make roads, driveways and parking areas. Figuring the amount you need for a paving project at your home is complicated by the fact that limestone is sold by the ton, but the easiest way to measure your needs is to determine how many cubic yards of\n\nGet Price",
null,
"### convert 1 ton of crusher dust to cubic meter\n\nFeb 23, 2017· CONVERT CUBIC METERS TO TONNES QUARRY STONE How to Convert Metric Tons to Cubic Meters, convert ton of crusher dust to cubic meter convert ton of\n\nGet Price",
null,
"### Convert tons to cubic yards Conversion of Measurement\n\nWe couldn't find a conversion between tons and cubic yards [incompatible types] Do a quick conversion 1 tons = cubic yards using the online calculator for metric conversions. Convert tons to cubic yards\n\nGet Price",
null,
"### What Is The Weight Of Crusher Stone Sand For Cubicmeter\n\nWeight 1 Cubic Meter Quarry Dust citycastledelhi. Weight 1 Cubic Meter Quarry Dust sand making machine, Convert Crusher Stone From weight 1 cubic meter quarry dust chart to convert cubic yard of\n\nGet Price",
null,
"### Gas Volume Conversion CheCalc\n\nGas Volume Conversion to ACFM, SCFM, MMSCFD, standard cubic meter per hour (Sm3/h), Normal cubic meter per hour (Nm3/h) CheCalc Chemical engineering calculations to assist process, plant operation and maintenance engineers.\n\nGet Price",
null,
"[]\n\n### Conversion Table\n\nConcrete, Scrap, Loose 1 cubic yard = 1,855 lbs Glass =1 cubic yard 2,160 lbs Gypsum, Dry Wall =1 cubic yard 3,834 lbs Metals =1 cubic yard 906 lbs Plastic =1 cubic yard 22.55 lbs Soil, Dry =1 cubic yard 2,025 lbs Soil, Wet =1 cubic yard 2,106 lbs Stone or Gravel 1 cubic yard = 2,632.5 lbs Rock, Loose 1 cubic yard = 2,570 lbs\n\nGet Price",
null,
"### Ton conversion calculators, tables and forumas\n\nJul 22, 2018 · Ton conversion calculators, tables and formulas to automatically convert from other weight units. Metric Conversion > Metric Converter > Weight Converter > Ton Conversion. Ton Conversion. Use the search box to find your required metric converter → iPhone & Android app Weight Ton More units.. Pounds Kilograms Ounces Stones Metric Tons (or\n\nGet Price",
null,
"### Of One cubic Meter Of Gravel Into Bags\n\nJan 26, 2018· Are you asking for the number of bags of gravel needed for one cubic meter of concrete? The unit measure usually used in proportioning the aggregates of concrete are by weights which can always be translated into volume. The unit used for cement a.\n\nGet Price"
]
| [
null,
"https://www.jmelectronics.co.za/images/imgs/321.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/108.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/345.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/172.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/240.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/35.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/245.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/213.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/331.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/212.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/110.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/22.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/330.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/25.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/377.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/87.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/175.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/262.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/84.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/294.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/4.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/311.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/69.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/332.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/153.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/160.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/168.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/88.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/362.jpg",
null,
"https://www.jmelectronics.co.za/images/imgs/395.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.77137303,"math_prob":0.97531885,"size":9530,"snap":"2020-24-2020-29","text_gpt3_token_len":2369,"char_repetition_ratio":0.18034852,"word_repetition_ratio":0.06666667,"special_character_ratio":0.24249737,"punctuation_ratio":0.09983722,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95080733,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-11T01:14:37Z\",\"WARC-Record-ID\":\"<urn:uuid:836671f6-0eaf-43b8-82a4-d85c7f4effd9>\",\"Content-Length\":\"26022\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5a061752-9425-4bce-90bc-0ffff072c8b8>\",\"WARC-Concurrent-To\":\"<urn:uuid:29ec36b4-f118-4cd1-8d02-6fc928b78ca5>\",\"WARC-IP-Address\":\"104.18.55.197\",\"WARC-Target-URI\":\"https://www.jmelectronics.co.za/2014-05-19/tons-quarry-dust-convert-to-meter-cube.html\",\"WARC-Payload-Digest\":\"sha1:FNDAC2U6FA3SE3CUZVOHQKFNLGMX52YR\",\"WARC-Block-Digest\":\"sha1:WJ6PAJKRK6NFU6TZYBV35APNVSP34UTG\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655919952.68_warc_CC-MAIN-20200711001811-20200711031811-00435.warc.gz\"}"} |
https://www.nag.com/numeric/py/nagdoc_latest/naginterfaces.library.blas.ztfsm.html | [
"# naginterfaces.library.blas.ztfsm¶\n\nnaginterfaces.library.blas.ztfsm(transr, side, uplo, trans, diag, alpha, a, b)[source]\n\nztfsm performs one of the matrix-matrix operations\n\nwhere is a complex triangular matrix stored in Rectangular Full Packed (RFP) format, is an complex matrix, and is a complex scalar. denotes or equivalently .\n\nNo test for singularity or near-singularity of is included in this function. Such tests must be performed before calling this function.\n\nFor full information please refer to the NAG Library document for f06wp\n\nhttps://www.nag.com/numeric/nl/nagdoc_28.7/flhtml/f06/f06wpf.html\n\nParameters\ntransrstr, length 1\n\nSpecifies whether the normal RFP representation of or its conjugate transpose is stored.\n\nThe matrix is stored in normal RFP format.\n\nThe conjugate transpose of the RFP representation of the matrix is stored.\n\nsidestr, length 1\n\nSpecifies whether is operated on from the left or the right, or similarly whether (or its transpose) appears to the left or right of the solution matrix in the linear system to be solved.\n\nis pre-multiplied from the left. The system to be solved has the form or .\n\nis post-multiplied from the right. The system to be solved has the form or .\n\nuplostr, length 1\n\nSpecifies whether is upper or lower triangular.\n\nis upper triangular.\n\nis lower triangular.\n\ntransstr, length 1\n\nSpecifies whether the operation involves or , i.e., whether or not is transpose conjugated in the linear system to be solved.\n\nThe operation involves , i.e., is not transpose conjugated.\n\nThe operation involves , i.e., is transpose conjugated.\n\ndiagstr, length 1\n\nSpecifies whether has nonunit or unit diagonal elements.\n\nThe diagonal elements of are stored explicitly.\n\nThe diagonal elements of are assumed to be , the corresponding elements of are not referenced.\n\nalphacomplex\n\nThe scalar .\n\nacomplex, array-like, shape\n\nNote: the required length for this argument is determined as follows: if : ; if : ; otherwise: .\n\n, the triangular matrix if or the triangular matrix if , stored in RFP format (as specified by ). The storage format is described in detail in the F07 Introduction. If , is not referenced.\n\nbcomplex, array-like, shape\n\nThe matrix .\n\nIf , need not be set.\n\nReturns\nbcomplex, ndarray, shape\n\nThe updated matrix , or similarly the solution matrix .\n\nRaises\nNagValueError\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: or .\n\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: or .\n\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: or .\n\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: or .\n\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: or .\n\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: .\n\n(errno )\n\nOn entry, error in parameter .\n\nConstraint: .\n\nNotes\n\nNo equivalent traditional C interface for this routine exists in the NAG Library.\n\nztfsm solves (for ) a triangular linear system of one of the forms\n\nwhere is a complex triangular matrix stored in RFP format, , are complex matrices, and is a complex scalar. The RFP storage format is described in the F07 Introduction.\n\nReferences\n\nGustavson, F G, Waśniewski, J, Dongarra, J J and Langou, J, 2010, Rectangular full packed format for Cholesky’s algorithm: factorization, solution, and inversion, ACM Trans. Math. Software (37, 2)"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.72203463,"math_prob":0.86082965,"size":3269,"snap":"2022-40-2023-06","text_gpt3_token_len":788,"char_repetition_ratio":0.11393568,"word_repetition_ratio":0.21747212,"special_character_ratio":0.23493423,"punctuation_ratio":0.2112676,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9644476,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-30T14:13:31Z\",\"WARC-Record-ID\":\"<urn:uuid:109c94f4-a002-4e01-b7b0-b2eb6038e97e>\",\"Content-Length\":\"126246\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0d3e0eb0-9772-47a4-a4cd-d1ba81e9b08c>\",\"WARC-Concurrent-To\":\"<urn:uuid:f5d4b3af-1d93-4d5b-beb0-0f53b3dae381>\",\"WARC-IP-Address\":\"78.129.168.4\",\"WARC-Target-URI\":\"https://www.nag.com/numeric/py/nagdoc_latest/naginterfaces.library.blas.ztfsm.html\",\"WARC-Payload-Digest\":\"sha1:BPZU3PEFLJJDLU3RGRT5U3WYUL5LGH27\",\"WARC-Block-Digest\":\"sha1:N2T2UXSKUD6V5WJ66RNPNHCLSM7ALOWC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499819.32_warc_CC-MAIN-20230130133622-20230130163622-00400.warc.gz\"}"} |
https://codereview.stackexchange.com/questions/106833/treat-undef-in-perls-operator-as-inf-instead-of-0 | [
"# Treat undef in Perl's <=> operator as +inf instead of 0\n\nI have to sort some numbers with Perl. But some of the numbers are undefined. Perl's compare operator <=> treats undef as -inf 0. The result is, that the undefined numbers are at the beginning:\n\nperl -MData::Dumper -e 'print Dumper(sort {$a <=>$b} 3, undef, 2, 1);'\n$VAR1 = undef;$VAR2 = 1;\n$VAR3 = 2;$VAR4 = 3;\n\n\nI want them to occur at the end, because they represent new items, which should be added at the end. This means I am looking for a way to change the way Perl treats undef. In my case undef should be treated as +inf instead of -inf 0. I came up with the following expression.\n\n($a <=>$b) * ((defined $a)*2-1) * ((defined$b)*2-1)\n\n\nIs it always correct or did I miss anything?\n\nAnd is there an easier way to achieve the same?\n\nIn fact, Perl treats undef as 0 in numeric contexts, and warns about that (why there's no -w in your one-liner?). You can use the defined-or operator to handle it:\n\nsort { ($a // 'Inf') <=> ($b // 'Inf') } 3, undef, 2, 1\n\n\nYou need Perl v5.10+ for it to work, in older versions, you have to be more verbose:\n\n(defined $a ?$a : 'Inf')\n\n• I have Perl 5.8.4 here and using defined in the conditional operator has no effect on the sort order. Perl seems to understand 'Inf' but treats it as zero: pastebin.com/VAAP4dMw – ceving Oct 7 '15 at 15:16\n• @ceving: You must have mis-coded it. It should look like sort { ( defined $a ?$a : 'Inf' ) <=> ( defined $b ?$b : 'Inf' ) } 3, undef, 2, 1 – Borodin Nov 29 '15 at 22:17\n\n$a <=>$b will warn under warnings when one or both of variables is undef.\n\nThus, you can use short circuiting with || (high precedence OR operator), which will compare them only when both variables are defined (first two expressions evaluate to false),\n\nsort { !defined($a)*1 || !defined($b)*-1 || $a <=>$b }\n\n\noutput\n\n$VAR1 = 1;$VAR2 = 2;\n$VAR3 = 3;$VAR4 = undef;\n\n• I think the result must be 0, if both are undefined. – ceving Oct 8 '15 at 7:30\n• @ceving you can my ($da,$db) = map {defined} $a,$b; ($da ||$db)*1 && (!$da*1 || !$db)*-1 || $a <=>$b) for correctness, but sort result will not change. – mpapec Oct 8 '15 at 7:59"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.92965883,"math_prob":0.97547036,"size":736,"snap":"2020-24-2020-29","text_gpt3_token_len":219,"char_repetition_ratio":0.12431694,"word_repetition_ratio":0.0,"special_character_ratio":0.3152174,"punctuation_ratio":0.1411043,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9841439,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-12T13:21:19Z\",\"WARC-Record-ID\":\"<urn:uuid:d1ef6e0d-9f74-4c51-b9c6-966b0934658b>\",\"Content-Length\":\"156138\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2e029dcc-219b-4daa-a42a-c096777e4aaf>\",\"WARC-Concurrent-To\":\"<urn:uuid:f933030f-f084-4908-8c9b-95ff6c3acfd2>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://codereview.stackexchange.com/questions/106833/treat-undef-in-perls-operator-as-inf-instead-of-0\",\"WARC-Payload-Digest\":\"sha1:FQCVZ77TMNM5AV4BAUF7NKZCUYPUF3PX\",\"WARC-Block-Digest\":\"sha1:2Y4AKIF473C7WZOGD5FBERDOIK3XGZ5F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593657138718.61_warc_CC-MAIN-20200712113546-20200712143546-00510.warc.gz\"}"} |
https://spaces.ac.cn/tag/%E6%A0%B9%E5%BC%8F/ | [
"$$ax^4+bx^3+cx^2+dx+e=0(a!=0)$$"
]
| [
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.9834447,"math_prob":1.00001,"size":257,"snap":"2021-04-2021-17","text_gpt3_token_len":258,"char_repetition_ratio":0.0,"word_repetition_ratio":0.0,"special_character_ratio":0.21011673,"punctuation_ratio":0.11764706,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95579416,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-23T08:40:31Z\",\"WARC-Record-ID\":\"<urn:uuid:50b58795-bcc6-41f2-ae19-1c36b7c8fb6d>\",\"Content-Length\":\"37401\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2effb91f-aaf4-4502-bb18-2974f274267b>\",\"WARC-Concurrent-To\":\"<urn:uuid:3b75473b-cc64-4acf-8556-74c175f3f31c>\",\"WARC-IP-Address\":\"39.108.122.106\",\"WARC-Target-URI\":\"https://spaces.ac.cn/tag/%E6%A0%B9%E5%BC%8F/\",\"WARC-Payload-Digest\":\"sha1:4KWLO5KMTR4TFIRGBRTW7U5KWNEFVH5I\",\"WARC-Block-Digest\":\"sha1:O5CRV2PCLHXZ5K6WGTQICWKF5KOPGQT3\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618039568689.89_warc_CC-MAIN-20210423070953-20210423100953-00205.warc.gz\"}"} |
https://www.math.uwaterloo.ca/~cswamy/tutte/sp09/ben.html | [
"Friday, August 14, 2009\n3:30 pm, MC 5158\n\n## Ben Reichardt School of Computer Science, University of Waterloo\n\nSpan programs and quantum query complexity\n\nThe general adversary bound is a lower bound on the number of input queries required for a quantum algorithm to evaluate a boolean function. We show that this lower bound is in fact tight, up to a logarithmic factor. The proof is based on span programs. It implies that span programs are an (almost) equivalent computational model to quantum query algorithms.\nOne of the consequences is that almost-optimal quantum algorithms can always be designed based on span programs. This is worthwhile because span programs have useful properties, such as composing easily. We apply this to the formula-evaluation problem. For example, evaluating an AND-OR formula is similar to the question of whether white or black has a winning strategy in chess. We give an optimal quantum algorithm for evaluating almost-balanced formulas over any finite boolean gate set. For example, the formula's gate set may be taken to be all functions {0,1}^k -> {0,1} with k <= 1000. Another consequence is a simpler semi-definite program for quantum query complexity."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8760416,"math_prob":0.9886502,"size":1040,"snap":"2023-40-2023-50","text_gpt3_token_len":224,"char_repetition_ratio":0.118725866,"word_repetition_ratio":0.0,"special_character_ratio":0.20192307,"punctuation_ratio":0.08947369,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9727705,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T19:31:53Z\",\"WARC-Record-ID\":\"<urn:uuid:ce76b54d-6f85-41ec-9a69-7aac354f9c89>\",\"Content-Length\":\"3247\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dd06b6c6-7ce6-479a-a444-c89c1bb5d487>\",\"WARC-Concurrent-To\":\"<urn:uuid:072b4981-2fe0-484e-8a63-b14e660f1edc>\",\"WARC-IP-Address\":\"129.97.206.16\",\"WARC-Target-URI\":\"https://www.math.uwaterloo.ca/~cswamy/tutte/sp09/ben.html\",\"WARC-Payload-Digest\":\"sha1:IYY7RSY2JX3KZ23SLWBHV3JXRZMPWALF\",\"WARC-Block-Digest\":\"sha1:MJDTLALRNAY76LLN5YN6LZS6WRPYDJ7T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506669.30_warc_CC-MAIN-20230924191454-20230924221454-00703.warc.gz\"}"} |
https://lsanomaly.readthedocs.io/en/latest/ | [
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"lsanomaly is a flexible, fast, probabilistic method for calculating outlier scores on test data, given training examples of inliers. Out of the box it works well with scikit-learn packages. See the features section for why you might chose this model over other options.\n\n# Features¶\n\n• Compatible with scikit-learn package modules\n• Probabilistic outlier detection model\n• Robust classifier when given multiple inlier classes\n• Easy to install and get started\n\n# Installation¶\n\nThe best way to install lsanomaly is to:\n\n```pip install lsanomaly\n```\n\nAn alternative is to download the source code and\n\n```python setup.py install\n```\n\nTests can be run from setup if pytest is installed:\n\n```python setup.py test\n```\n\n# Usage¶\n\nFor those familiar with scikit-learn the interface will be familiar, in fact lsanomaly was built to be compatible with sklearn modules where applicable. Here is basic usage of lsanomaly to get started quick as possible.\n\nConfiguring the Model\n\nLSAD provides reasonable default parameters when given an empty init or it can be passed values for rho and sigma. The value rho controls sensitivity to outliers and sigma determines the ‘smoothness’ of the boundary. These values can be tuned to improve your results using lsanomaly.\n\n```from lsanomaly import LSAnomaly\n\n# At train time lsanomaly calculates parameters rho and sigma\nlsanomaly = LSAnomaly()\n# or\nlsanomaly = LSAnomaly(sigma=3, rho=0.1, seed=42)\n```\n\nTraining the Model\n\nAfter the model is configured the training data can be fit.\n\n```import numpy as np\nlsanomaly = LSAnomaly(sigma=3, rho=0.1, seed=42)\nlsanomaly.fit(np.array([,,,,,]))\n```\n\nMaking Predictions\n\nNow that the data is fit, we will probably want to try and predict on some data not in the training set.\n\n```>>> lsanomaly.predict(np.array([]))\n[0.0]\n>>> lsanomaly.predict_proba(np.array([]))\narray([[ 0.7231233, 0.2768767]])\n```\n\n# Documentation¶\n\nFull documentation can be built using Sphinx.\n\n# Examples¶\n\nSee notebooks/ for sample applications.\n\n# Reference¶\n\nJ.A. Quinn, M. Sugiyama. A least-squares approach to anomaly detection in static and sequential data. Pattern Recognition Letters 40:36-40, 2014.\n\n[pdf]\n\n# Least Squares Anomaly Detection API¶\n\n## Least Squares Anomaly Detection¶\n\nclass `lsanomaly._lsanomaly.``LSAnomaly`(n_kernels_max=500, kernel_pos=None, sigma=None, rho=None, gamma=None, seed=None)\n`decision_function`(X)\n\nGenerate an inlier score for each test data example.\n\nArgs\nX (numpy.ndarray): Test data, of dimension N times d (rows are examples, columns are data dimensions)\nReturns:\nnumpy.ndarray: A vector of length N, where each element contains an inlier score in the range 0-1 (outliers have values close to zero, inliers have values close to one).\n`fit`(X, y=None, k=5)\n\nFit the inlier model given training data. This function attempts to choose reasonable defaults for parameters sigma and rho if none are specified, which could then be adjusted to improve performance.\n\nArgs:\n\nX (numpy.ndarray): Examples of inlier data, of dimension N times d (rows are examples, columns are data dimensions)\n\ny (numpy.ndarray): If the inliers have multiple classes, then y contains the class assignments as a vector of length N. If this is specified then the model will attempt to assign test data to one of the inlier classes or to the outlier class.\n\nk (int): Number of nearest neighbors to use in the KNN kernel length scale heuristic.\n\nReturns:\nself\n`get_params`(deep=True)\n\nNot implemented.\n\nArgs:\ndeep (bool):\n\nReturns:\n\n`predict`(X)\n\nAssign classes to test data.\n\nArgs:\nX (numpy.ndarray): Test data, of dimension N times d (rows are examples, columns are data dimensions)\nReturns:\n\nnumpy.ndarray:\n\nA vector of length N containing assigned classes. If no inlier classes were specified during training, then 0 denotes an inlier and 1 denotes an outlier. If multiple inlier classes were specified, then each element of y_predicted is either one of those inlier classes, or an outlier class (denoted by the maximum inlier class ID plus 1).\n\n`predict_proba`(X)\n\nCalculate posterior probabilities of each inlier class and the outlier class for test data.\n\nArgs\nX (numpy.ndarray): Test data, of dimension N times d (rows are examples, columns are data dimensions)\nReturns\nnumpy.ndarray: An array of dimension N times n_inlier_classes+1, containing the probabilities of each row of X being one of the inlier classes, or the outlier class (last column).\n`predict_sequence`(X, A, pi, inference='smoothing')\n\nCalculate class probabilities for a sequence of data.\n\nArgs\n\nX (numpy.ndarray): Test data, of dimension N times d (rows are time frames, columns are data dimensions)\n\nA (numpy.ndarray):: Class transition matrix, where A[i,j] contains p(y_t=j|y_{t-1}=i)\n\npi (numpy.ndarray): vector of initial class probabilities\n\ninference (str) : ‘smoothing’ or ‘filtering’.\n\nReturns\nnumpy.ndarray: An array of dimension N times n_inlier_classes+1, containing the probabilities of each row of X being one of the inlier classes, or the outlier class (last column).\n`score`(X, y)\n\nCalculate accuracy score, needed because of bug in metrics.accuracy_score when comparing list with numpy array.\n\n`set_params`(**params)\n\nNot implemented.\n\nArgs:\n**params (dict):\n\n## Kernel Length Scale Approximation¶\n\n`lsanomaly.lengthscale_approx.``median_kneighbour_distance`(X, k=5, seed=None)\n\nCalculate the median distance between a set of random data points and their kth nearest neighbours. This is a heuristic for setting the kernel length scale.\n\nArgs:\nX (numpy.ndarray): Data points k (int): Number of neighbors to use seed (int): random number seed\nReturns:\nfloat: Kernel length scale estimate\nRaises:\nValueError: If the number of requested neighbors k is less than the number of observations in X.\n`lsanomaly.lengthscale_approx.``pair_distance_centile`(X, centile, max_pairs=5000, seed=None)\n\nCalculate centiles of distances between random pairs in a data-set. This an alternative to the median kNN distance for setting the kernel length scale.\n\nArgs:\nX (numpy.ndarray): Data observations centile (int): distance centile max_pairs (int): maximum number of pairs to consider seed (int): random number seed\nReturns:\nfloat: length scale estimate\n\n# Evaluating LSAnomaly¶\n\nScripts for evaluating lsanomaly against other methods is provided in J Quinn’s software https://cit.mak.ac.ug/staff/jquinn/software/lsanomaly.html. Owing to changes in APIs and availability of some test data, that code has been refactored and expanded.\n\nThere are three commandline applications that will be download the test data, perform a 5-fold cross-validation and, produce a LaTeX document summarizing the results. Each of the three applications has a main method that can be used for further automation.\n\nThe following datasets are configured for download (see evaluate/eval_params.yml) from https://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/.\n\n• australian\n• breast-cancer\n• cod-rna\n• colon-cancer.bz2\n• diabetes\n• dna.scale\n• glass.scale\n• heart\n• ionosphere_scale\n• letter.scale\n• leu.bz2\n• mnist.bz2\n• mushrooms\n• pendigits\n• satimage.scale\n• sonar_scale\n\nThose with an extension of .bz2 will be inflated. The compressed version is retained.\n\n## Downloading Test Data¶\n\ndownload.py\n\nA commandline utility to retrieve test data from https://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/ for use in evaluating LSAnamoly.\n\nusage: download.py [-h] –params YML_PARAMS –data-dir DATA_DIR\n[–sc-url SC_URL] [–mc-url MC_URL]\n\nRetrieve datasets for LsAnomaly evaluation. By default, data is retrieved from https://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/\n\nArguments\n\n -h, --help show this help message and exit --params YML_PARAMS, -p YML_PARAMS YAML file with evaluation parameters --data-dir DATA_DIR, -d DATA_DIR directory to store retrieved data sets --sc-url SC_URL optional: single class test data URL; default: https:/ /www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/binary/ --mc-url MC_URL optional: Multi-class test data URL; default: https:// www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/multiclass/\n`lsanomaly.evaluate.download.``main`(param_file, sc_url, mc_url, data_fp)\n\nThe main show. Tries to retrieve and store all the configured data-sets.\n\nArgs:\n\nparam_file (str): .yml File containing the evaluation parameters\n\nsc_url (str): single class data set URL\n\nmc_url (str): multiclass data set URL\n\ndata_fp (str): Directory where the datasets will be written\n\nRaises:\nValueError: If data_fp is not a valid directory.\n`lsanomaly.evaluate.download.``unzip_write`(file_path)\n\nReads and inflates a .bz2 file and writes it back. The compressed file is retrained. Used internally.\n\nArgs:\nfile_path (str): file to inflate\nRaises:\nFileNotFoundError\n`lsanomaly.evaluate.download.``write_contents`(file_path, get_request)\n\nWrites the contents of the get request to the specified file path.\n\nArgs:\n\nfile_path (str): file path\n\nget_request (requests.Response): response object\n\nRaises:\nIOError\n`lsanomaly.evaluate.download.``get_request`(dataset, file_path, sc_url, mc_url)\n\nRetrieve dataset trying first at sc_url and failing that, at mc_url. If a data set cannot be retrieved, it is skipped. The contents to file_path with the data set name as the file name.\n\nArgs:\n\ndataset (str): Dataset name as referenced in https://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/\n\nfile_path (str): Directory where dataset will be written.\n\nsc_url (str): single class data set URL\n\nmc_url (str): multiclass data set URL\n\n## Evaluating the Test Data¶\n\nrun_eval.py\n\nLeast squares anomaly evaluation on static data. After running experiments, use generate_latex.py to create a table of results.\n\nThis is a refactored and updated version of the script in evaluate_lsanomaly.zip (see https://cit.mak.ac.ug/staff/jquinn/software/lsanomaly.html).\n\nusage: run_eval.py [-h] –data-dir DATA_DIR –output-json JSON_FILE\n\nPerform evaluation of LSAnomaly on downloaded data-sets. 5-fold cross validation is performed.\n\nArguments\n\n -h, --help show this help message and exit --data-dir DATA_DIR, -d DATA_DIR directory of stored data-sets in libsvm format --params YML_PARAMS, -p YML_PARAMS YAML file with evaluation parameters --output-json JSON_FILE, -o JSON_FILE path and file name of the results\n`lsanomaly.evaluate.run_eval.``evaluate`(X_train, y_train, X_test, y_test, outlier_class, method_name, current_method_aucs, sigma, rho=0.1, nu=0.5)\n\nEvaluation for a method and data set. Calculates the AUC for a single evaluation fold.\n\nArgs:\n\nX_train (numpy.ndarray): independent training variables\n\ny_train (numpy.ndarray): training labels\n\nX_test (numpy.ndarray): independent test variables\n\ny_test (numpy.ndarray): test labels\n\noutlier_class (int): index of the outlier class\n\nmethod_name (str): method being run\n\ncurrent_method_aucs (list): input to the results dictionary\n\nsigma (float): kernel lengthscale for LSAD and OCSVM\n\nrho (float): smoothness parameter for LSAD\n\nnu (float): OCSVM parameter - see scikit-learn documentation\n\nRaises:\nValueError: if a NaN is encountered in the AUC calculation.\n`lsanomaly.evaluate.run_eval.``gen_data`(data_sets)\n\nGenerator to deliver independent, dependent variables and the name of the data set.\n\nArgs:\ndata_sets (list): data sets read from the data directory\nReturns:\nnumpy.ndarray, numpy.ndarray, str: X, y, name\n`lsanomaly.evaluate.run_eval.``gen_dataset`(data_dir)\n\nGenerator for the test data file paths. All test files must be capable of being loaded by load_svmlight_file(). Files with extensions .bz2, .csv are ignored. Any file beginning with . is also ignored.\n\nThis walks the directory tree starting at data_dir, therefore all subdirectories will be read.\n\nArgs:\ndata_dir (str): Fully qualified path to the data directory\nReturns:\nlist: svmlight formatted data sets in data_dir\n`lsanomaly.evaluate.run_eval.``main`(data_dir, json_out, param_file, n_splits=5, rho=0.1, nu=0.5)\n\nThe main show. Loop through all the data-sets and methods running a 5-fold stratified cross validation. The results are saved to the specified json_out file for further processing.\n\nArgs:\n\ndata_dir (str): directory holding the downloaded data sets\n\njson_out (str): path and filename to store the evaluation results\n\nparam_file (str): YAML file with evaluation parameters\n\nn_splits (int): number of folds in the cross-validation.\n\n## Create a Results Table in LaTeX¶\n\ngenerate_latex.py\n\nA commandline application to create a latex table summarising the results of LSAnomaly static data experiments. This is a refactored version of the script in evaluate_lsanomaly.zip (see https://cit.mak.ac.ug/staff/jquinn/software/lsanomaly.html).\n\nusage\n\ngenerate_latex.py [-h] –input-json JSON_FILE –latex-output LATEX_FILE\n\nCreate a LaTeX document with a table of results\n\nArguments\n\n -h, --help show this help message and exit --input-json JSON_FILE, -i JSON_FILE path and file name of the results --latex-output LATEX_FILE, -o LATEX_FILE path and file name of the LaTeX file\n`lsanomaly.evaluate.generate_latex.``results_table`(json_results)\n\nBuild the LaTeX table.\n\nArgs:\njson_results (dict): results from run_eval\nReturns:\nstr: LaTeX table\n`lsanomaly.evaluate.generate_latex.``main`(input_json, output_latex)\n\nRead the JSON results file; generate the table in LaTeX; wrap the results table in a simple LaTeX document and write it to output_latex\n\nArgs:\n\ninput_json (str): file of the JSON-serialized results\n\noutput_latex (str): file where the LaTeX document will be written\n\n# License¶\n\nThe MIT License (MIT)\n\nCopyright (c) 2016 John Quinn\n\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE."
]
| [
null,
"https://lsanomaly.readthedocs.io/en/latest/_images/logo.png",
null,
"https://img.shields.io/pypi/v/lsanomaly.svg",
null,
"https://img.shields.io/badge/language-python-blue.svg",
null,
"https://img.shields.io/badge/license-MIT-7f7f7f.svg",
null,
"https://img.shields.io/badge/docs-100%25-brightgreen.svg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6440331,"math_prob":0.6082173,"size":14443,"snap":"2021-21-2021-25","text_gpt3_token_len":3505,"char_repetition_ratio":0.12113027,"word_repetition_ratio":0.110516064,"special_character_ratio":0.2281382,"punctuation_ratio":0.17258309,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9632186,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-25T06:00:47Z\",\"WARC-Record-ID\":\"<urn:uuid:fee6819e-b81a-4fbe-aee8-ac583d01832e>\",\"Content-Length\":\"44205\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bb8904e0-c299-4ea9-9915-74cfd3eeedb9>\",\"WARC-Concurrent-To\":\"<urn:uuid:87042e05-71d2-418b-9b75-9d9b76cd65bc>\",\"WARC-IP-Address\":\"104.17.33.82\",\"WARC-Target-URI\":\"https://lsanomaly.readthedocs.io/en/latest/\",\"WARC-Payload-Digest\":\"sha1:RIYTAEA63E3YOM7MJVMNFYNPWDXOJQFG\",\"WARC-Block-Digest\":\"sha1:JR6YF3W44LQCSAZUSAHG5BUBIAH7HXAV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487622113.11_warc_CC-MAIN-20210625054501-20210625084501-00113.warc.gz\"}"} |
https://f4bien.blogspot.com/2009/ | [
"## Friday, May 1, 2009\n\n### Spherical geometry optimisations",
null,
"I am currently working on recoding proper classes for managing spherical geometry primitives in Stellarium. One of the most used primitive is the so called spherical cap showed in the figure. A spherical cap (sometimes called half space) is a disk-like region of the sphere defined by a direction unit vector n and an aperture angle ⍺.\n\nThe most common operation that we want to perform on a spherical cap is to check if a point A of the sphere lies inside the cap. This is pretty easy to do by checking whether the dot product n·OA is smaller than cos(⍺).\n\nThe C++ code below implements this. Note that to avoid computing a CPU expensive cosine each time we perform the contains operation, we pre-compute cos(⍺) and store it as a class member d.\n\nclass SphericalCap\n{\nbool contains(const Vec3d &v) const {return (v*n>=d);}\nVec3d n;\ndouble d;\n};\n\nAnother useful operation we want to perform often is to check whether two spherical caps with direction vectors n1 and n2 and aperture ⍺1 and ⍺2 intersect. The straightforward implementation is to compute the angle θ between n1 and n2 and check whether it is smaller than ⍺1 + ⍺2.\n\nbool intersects(const SphericalCap& other) const\n{\nconst double theta = n.angle(other.n);\nreturn theta < acos(d) + acos(other.d);\n}\n\nUnfortunately, because we store only the cosine of ⍺1 and ⍺2, this solution involves 2 calls to the acos function, plus 1 call to the angle() function which itself involves 1 acos and 1 sqrt. Needless to say that it's not lightning fast..\n\nAfter some thoughts I finally came up with a solution involving only basic arithmetics:\n\nFirst, in the case ⍺1+⍺2 >= 180°, (i.e. if d1+d2<=0) the 2 caps necessarily intersect so we don't need to think further. Let's now treat the other cases:\n\nThe 2 caps intersect only and only if:\n\nθ <= ⍺1+⍺2 (1)\n\nBecause both members of (1) are < 180° (the angle θ between n1 and n2 can obviously not be > 180°), we can transform (1) into:\n\ncos (θ) >= cos(⍺1+⍺2)\n\nwhich with basic trigo can be transformed into:\n\nL <= sin ⍺1 sin ⍺2 , with L = cos ⍺1 cos ⍺2 - cos θ (2)\n\nIn our case L is known and given by d1*d2-n1·n2. Because ⍺1 and ⍺2 are bounded between 0° and 180°, sin ⍺1 sin ⍺2 is bounded between 0 and 1. Therefore if L<=0, (2) is verified and the 2 caps intersect. Similarily, if L>1, (2) is not verified and the 2 caps don't intersect. In the last case where 0<L<=1 we can transform (2) into:\n\nL² <= sin²⍺1 sin²⍺2\n\nwhich with basic trigo formulae can be transformed into:\n\nL² <= (1-cos²⍺1)(1-cos²⍺2) (3)\n\nIn our case cos²⍺1 and cos²⍺2 are know and given by d1² and d2² so we can easily check that (3) is verified or not.\n\nWe thus have a solution to each cases, and none of them involve any CPU expensive operation!! In C++ code, this reasoning translates into:\n\nbool intersects(const SphericalCap& other) const\n{\nconst double L = d*other.d - n*other.n;\nreturn d+other.d<=0. || L<=0. || (L<=1. && L*L <= (1.-d*d)*(1.-other.d*other.d));\n}\n\n### First post!\n\nEt hop!\nI finally open a blog. In this blog I will post whatever I feel like writing, but I guess the main subjects will be technical about my project Stellarium.\nActually the idea of creating a blog was suggested by a friend after I proudly explained to him how I optimized a small spherical geometry method in Stellarium.. So I guess with topic will be my first real post."
]
| [
null,
"https://4.bp.blogspot.com/_JaQP_ymPNbo/Sfsj3nP4MCI/AAAAAAAACg0/dTVCtckWO10/s200/sphericalCap.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8970636,"math_prob":0.96931535,"size":3714,"snap":"2022-27-2022-33","text_gpt3_token_len":1032,"char_repetition_ratio":0.09299191,"word_repetition_ratio":0.2122571,"special_character_ratio":0.27113625,"punctuation_ratio":0.1049936,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9888171,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-17T22:20:56Z\",\"WARC-Record-ID\":\"<urn:uuid:67e269f4-0f9b-4b66-a85f-5fc892b6020f>\",\"Content-Length\":\"54902\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d7183f15-d380-4ef6-8889-87f971356f39>\",\"WARC-Concurrent-To\":\"<urn:uuid:f99ee55b-611d-4fd0-b6d2-b93a4be685d3>\",\"WARC-IP-Address\":\"142.251.16.132\",\"WARC-Target-URI\":\"https://f4bien.blogspot.com/2009/\",\"WARC-Payload-Digest\":\"sha1:DCTV36IQS52S2CYIBDEMRYSRDDKEGVEY\",\"WARC-Block-Digest\":\"sha1:ZVHNLC677L3Z7CHLGBMHJI5VQMP5EWZQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882573118.26_warc_CC-MAIN-20220817213446-20220818003446-00432.warc.gz\"}"} |
https://ww2.mathworks.cn/help/phased/ref/phitheta2azelpat.html | [
"# phitheta2azelpat\n\nConvert radiation pattern from phi-theta coordinates to azimuth-elevation coordinates\n\n## Syntax\n\n``pat_azel = phitheta2azelpat(pat_phitheta,phi,theta)``\n``pat_azel = phitheta2azelpat(pat_phitheta,phi,theta,az,el)``\n``pat_azel = phitheta2azelpat(___,'RotateZ2X',rotpatax)``\n``````[pat_azel,az_pat,el_pat] = phitheta2azelpat(___)``````\n\n## Description\n\nexample\n\n````pat_azel = phitheta2azelpat(pat_phitheta,phi,theta)` converts the antenna radiation pattern, `pat_phitheta`, from phi and theta coordinates to the pattern `pat_azel` in azimuth and elevation coordinates. `phi` and `theta` are the phi and theta coordinates at which `pat_phitheta` values are defined. The `pat_azel` matrix covers azimuth values from –180 to 180 degrees and elevation values from –90 to 90 degrees in one degree increments. The function interpolates the `pat_phitheta` matrix to estimate the response of the antenna in a given direction.```\n\nexample\n\n````pat_azel = phitheta2azelpat(pat_phitheta,phi,theta,az,el)` uses vectors `az` and `el` to specify the grid at which to sample `pat_azel`. To avoid interpolation errors, `az` should cover the range [–180, 180] and `el` should cover the range [–90, 90].```\n\nexample\n\n````pat_azel = phitheta2azelpat(___,'RotateZ2X',rotpatax)` also specifies `rotpatax` to indicate the boresight direction of the pattern: x-axis or z-axis.```\n\nexample\n\n``````[pat_azel,az_pat,el_pat] = phitheta2azelpat(___)``` also returns vectors `az_pat` and `el_pat` containing the azimuth and elevation angles at which `pat_azel` is sampled.```\n\n## Examples\n\ncollapse all\n\nConvert a radiation pattern to azimuth/elevation form, with the azimuth and elevation angles spaced 1° apart.\n\nDefine the pattern in terms of φ and θ.\n\n```phi = 0:360; theta = 0:180; pat_phitheta = mag2db(repmat(cosd(theta)',1,numel(phi)));```\n\nConvert the pattern to azimuth/elevation space.\n\n`pat_azel = phitheta2azelpat(pat_phitheta,phi,theta);`\n\nConvert a radiation pattern from theta/phi coordinates to azimuth/elevation coordinates, with azimuth and elevation angles spaced ${1}^{\\circ }$ apart.\n\nDefine the pattern in terms of phi, $\\varphi$, and theta, $\\theta$, coordinates.\n\n```phi = 0:360; theta = 0:180; pat_phitheta = mag2db(repmat(cosd(theta)',1,numel(phi)));```\n\nConvert the pattern to azimuth/elevation coordinates. Get the azimuth and elevation angles for use in plotting.\n\n`[pat_azel,az,el] = phitheta2azelpat(pat_phitheta,phi,theta);`\n\n```H = surf(az,el,pat_azel); H.LineStyle = 'none'; xlabel('Azimuth (degrees)'); ylabel('Elevation (degrees)'); zlabel('Pattern');```",
null,
"Convert a radiation pattern to the azimuth-elevation coordinates from alternative phi-theta coordinates, with the phi and theta angles spaced one degree apart.\n\nCreate a simple radiation pattern in terms of phi and theta. Add an offset to the pattern to suppress taking the logarithm of zero in mag2db.\n\n```phi = 0:360; theta = 0:180; pat_phitheta = mag2db(10*sind(theta').^2*cosd(phi).^4 + 1); imagesc(phi,theta,pat_phitheta) xlabel('Phi (deg)') ylabel('Theta (deg)') colorbar```",
null,
"```[pat_azel,az_pat,el_pat] = phitheta2azelpat(pat_phitheta,phi,theta,'RotateZ2X',false); imagesc(az_pat,el_pat,pat_azel) xlabel('Azimuth (deg)') ylabel('Elevation (deg)') colorbar```",
null,
"Convert a radiation pattern from phi/theta coordinates to azimuth/elevation coordinates, with the azimuth and elevation angles spaced ${5}^{\\circ }$ apart.\n\nDefine the pattern in terms of phi and theta.\n\n```phi = 0:360; theta = 0:180; pat_phitheta = mag2db(repmat(cosd(theta)',1,numel(phi)));```\n\nDefine the set of azimuth and elevation angles at which to sample the pattern. Then, convert the pattern.\n\n```az = -180:5:180; el = -90:5:90; pat_azel = phitheta2azelpat(pat_phitheta,phi,theta,az,el);```\n\n```H = surf(az,el,pat_azel); H.LineStyle = 'none'; xlabel('Azimuth (degrees)'); ylabel('Elevation (degrees)'); zlabel('Pattern');```",
null,
"## Input Arguments\n\ncollapse all\n\nAntenna radiation pattern in phi-theta coordinates, specified as a real-valued Q-by-P matrix. `pat_phitheta` contains the magnitude pattern. P is the length of the `phi` vector, and Q is the length of the `theta` vector. Units are in dB.\n\nData Types: `double`\n\nPhi angles at which `pat_phitheta` is sampled, specified as a vector of real-valued length-P vector. Phi angles lie between 0 and 360, inclusive. Units are in degrees.\n\nData Types: `double`\n\nTheta angles at which `pat_phitheta` is sampled, specified as a vector of real-valued length-Q vector. Theta angles lie between 0 and 180, inclusive. Units are in degrees.\n\nData Types: `double`\n\nAzimuth angles at which `pat_azel` samples the pattern, specified as a vector of real-valued length-L vector. Azimuth angles lie between –180 and 180, inclusive. Units are in degrees.\n\nData Types: `double`\n\nElevation angles at which `pat_azel` samples the pattern, specified as a real-valued length-M vector. Elevation angle lie between –90 and 90, inclusive. Units are in degrees.\n\nData Types: `double`\n\nPattern boresight direction selector, specified as `true` or `false`.\n\n• If `rotpatax` is `true`, the pattern boresight is along the x-axis. In this case, the z-axis of phi-theta space is aligned with the x-axis of azimuth and elevation space. The phi angle is defined from the y-axis to the z-axis and the theta angle is defined from the x-axis toward the yz-plane. (See Phi and Theta Angles).\n\n• If `rotpatax` is `false`, the phi angle is defined from the x-axis to the y-axis and the theta angle is defined from the z-axis toward the xy-plane. (See Alternative Definition of Phi and Theta).\n\nData Types: `logical`\n\n## Output Arguments\n\ncollapse all\n\nAntenna radiation pattern in azimuth-elevation coordinates, returned as a real-valued M-by-L matrix. `pat_azel` represents the magnitude pattern. L is the length of the `az_pat` vector, and M is the length of the `el_pat` vector. Units are in dB.\n\nAzimuth angles at which the `pat_azel` output pattern is sampled, returned as a real-valued length-L vector. Units are in degrees.\n\nElevation angles at which the `pat_azel` output pattern is sampled, returned as a real-valued length-M vector. Units are in degrees.\n\ncollapse all\n\n### Azimuth and Elevation Angles\n\nThe azimuth angle of a vector is the angle between the x-axis and the orthogonal projection of the vector onto the xy plane. The angle is positive in going from the x axis toward the y axis. Azimuth angles lie between –180 and 180 degrees. The elevation angle is the angle between the vector and its orthogonal projection onto the xy-plane. The angle is positive when going toward the positive z-axis from the xy plane. By default, the boresight direction of an element or array is aligned with the positive x-axis. The boresight direction is the direction of the main lobe of an element or array.\n\n### Note\n\nThe elevation angle is sometimes defined in the literature as the angle a vector makes with the positive z-axis. The MATLAB® and Phased Array System Toolbox™ products do not use this definition.\n\nThis figure illustrates the azimuth angle and elevation angle for a vector shown as a green solid line.",
null,
"### Phi and Theta Angles\n\nThe phi angle (φ) is the angle from the positive y-axis to the vector’s orthogonal projection onto the yz plane. The angle is positive toward the positive z-axis. The phi angle is between 0 and 360 degrees. The theta angle (θ) is the angle from the x-axis to the vector itself. The angle is positive toward the yz plane. The theta angle is between 0 and 180 degrees.\n\nThe figure illustrates phi and theta for a vector that appears as a green solid line.",
null,
"The coordinate transformations between φ/θ and az/el are described by the following equations\n\n`$\\begin{array}{l}\\mathrm{sin}el=\\mathrm{sin}\\varphi \\mathrm{sin}\\theta \\\\ \\mathrm{tan}az=\\mathrm{cos}\\varphi \\mathrm{tan}\\theta \\\\ \\mathrm{cos}\\theta =\\mathrm{cos}el\\mathrm{cos}az\\\\ \\mathrm{tan}\\varphi =\\mathrm{tan}el/\\mathrm{sin}az\\end{array}$`\n\n### Alternative Definition of Phi and Theta\n\nThe phi angle (φ) is the angle from the positive x-axis to the vector’s orthogonal projection onto the xy plane. The angle is positive toward the positive y-axis. The phi angle is between 0 and 360 degrees. The theta angle (θ) is the angle from the z-axis to the vector itself. The angle is positive toward the xy plane. The theta angle is between 0 and 180 degrees.\n\nThe figure illustrates φ and θ for a vector that appears as a green solid line.",
null,
"`$\\begin{array}{l}\\varphi =az\\\\ \\theta =90-el\\\\ az=\\varphi \\\\ el=90-\\theta \\end{array}$`"
]
| [
null,
"https://ww2.mathworks.cn/help/examples/phased/win64/PlotConvertedRadiationPattern1Example_01.png",
null,
"https://ww2.mathworks.cn/help/examples/phased/win64/ConvertRadiationPatternFromAltPhiThetaCoordinatesToAzelExample_01.png",
null,
"https://ww2.mathworks.cn/help/examples/phased/win64/ConvertRadiationPatternFromAltPhiThetaCoordinatesToAzelExample_02.png",
null,
"https://ww2.mathworks.cn/help/examples/phased/win64/ConvertRadiationPatternUsingSpecificAzimuthElevatioExample_01.png",
null,
"https://ww2.mathworks.cn/help/phased/ref/lobes.azel02573280e2ae1a2c6d47a352ed6aedc0.png",
null,
"https://ww2.mathworks.cn/help/phased/ref/lobes.phitheta.png",
null,
"https://ww2.mathworks.cn/help/phased/ref/lobes.phitheta_hfss.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5870737,"math_prob":0.98291284,"size":704,"snap":"2020-24-2020-29","text_gpt3_token_len":179,"char_repetition_ratio":0.17142858,"word_repetition_ratio":0.0,"special_character_ratio":0.19176136,"punctuation_ratio":0.08571429,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9982988,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,null,null,null,null,8,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-02T22:52:09Z\",\"WARC-Record-ID\":\"<urn:uuid:6f685681-e7fe-4e2e-a088-0e2c7fc50808>\",\"Content-Length\":\"119736\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4257b089-9283-43be-8a9c-976986322e96>\",\"WARC-Concurrent-To\":\"<urn:uuid:0abff138-7a6a-4e0f-ae8b-971e2e5a7d2c>\",\"WARC-IP-Address\":\"23.67.106.179\",\"WARC-Target-URI\":\"https://ww2.mathworks.cn/help/phased/ref/phitheta2azelpat.html\",\"WARC-Payload-Digest\":\"sha1:7YE2AETCN4PQBQ5X7PZ5IMDTNQEB7THX\",\"WARC-Block-Digest\":\"sha1:3AEWUX6RMCUDMMOL5B2FCX4SFCY4UO6C\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655880243.25_warc_CC-MAIN-20200702205206-20200702235206-00595.warc.gz\"}"} |
https://ask.learncbse.in/t/calculate-the-median-and-upper-quartile-of-the-following-frequency-distribution/15129 | [
"",
null,
"# Calculate the median and upper quartile of the following frequency distribution\n\nCalculate the median and upper quartile of the following frequency distribution",
null,
"",
null,
""
]
| [
null,
"https://ask.learncbse.in/images/discourse-logo-sketch.png",
null,
"https://ask.learncbse.in/uploads/db3785/original/2X/7/7717920c1d2a131d6ad8b5bb5dfe3e78addf598b.png",
null,
"https://ask.learncbse.in/uploads/db3785/original/2X/c/c7cf4fd2b0b164bd8849a8b35e37456d542ed571.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.87452567,"math_prob":0.8948148,"size":298,"snap":"2022-27-2022-33","text_gpt3_token_len":87,"char_repetition_ratio":0.0952381,"word_repetition_ratio":0.35,"special_character_ratio":0.26174498,"punctuation_ratio":0.12962963,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9779101,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-12T14:14:15Z\",\"WARC-Record-ID\":\"<urn:uuid:b35b01e5-1cb0-4969-82db-19d3d7f4c38f>\",\"Content-Length\":\"13090\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:67984ea9-2d4f-455a-8f86-c65db1d84d4a>\",\"WARC-Concurrent-To\":\"<urn:uuid:e9f4d674-db11-4a6c-b39a-0284899284d5>\",\"WARC-IP-Address\":\"46.165.252.193\",\"WARC-Target-URI\":\"https://ask.learncbse.in/t/calculate-the-median-and-upper-quartile-of-the-following-frequency-distribution/15129\",\"WARC-Payload-Digest\":\"sha1:YBP6NWFC5IRTDEZUII5LT3P4VYQOKH7G\",\"WARC-Block-Digest\":\"sha1:YJBUGGF3SWNAG3L227IJ7CHAAJCH2AF2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571719.48_warc_CC-MAIN-20220812140019-20220812170019-00216.warc.gz\"}"} |
https://metanumbers.com/10064050 | [
"10064050 (number)\n\n10,064,050 (ten million sixty-four thousand fifty) is an even eight-digits composite number following 10064049 and preceding 10064051. In scientific notation, it is written as 1.006405 × 107. The sum of its digits is 16. It has a total of 4 prime factors and 12 positive divisors. There are 4,025,600 positive integers (up to 10064050) that are relatively prime to 10064050.\n\nBasic properties\n\n• Is Prime? No\n• Number parity Even\n• Number length 8\n• Sum of Digits 16\n• Digital Root 7\n\nName\n\nShort name 10 million 64 thousand 50 ten million sixty-four thousand fifty\n\nNotation\n\nScientific notation 1.006405 × 107 10.06405 × 106\n\nPrime Factorization of 10064050\n\nPrime Factorization 2 × 52 × 201281\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 3 Total number of distinct prime factors Ω(n) 4 Total number of prime factors rad(n) 2012810 Product of the distinct prime numbers λ(n) 1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 0 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 10,064,050 is 2 × 52 × 201281. Since it has a total of 4 prime factors, 10,064,050 is a composite number.\n\nDivisors of 10064050\n\n12 divisors\n\n Even divisors 6 6 6 0\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 12 Total number of the positive divisors of n σ(n) 1.87192e+07 Sum of all the positive divisors of n s(n) 8.65518e+06 Sum of the proper positive divisors of n A(n) 1.55994e+06 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 3172.39 Returns the nth root of the product of n divisors H(n) 6.45158 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 10,064,050 can be divided by 12 positive divisors (out of which 6 are even, and 6 are odd). The sum of these divisors (counting 10,064,050) is 18,719,226, the average is 155,993,5.5.\n\nOther Arithmetic Functions (n = 10064050)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 4025600 Total number of positive integers not greater than n that are coprime to n λ(n) 201280 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 667462 Total number of primes less than or equal to n r2(n) 24 The number of ways n can be represented as the sum of 2 squares\n\nThere are 4,025,600 positive integers (less than 10,064,050) that are coprime with 10,064,050. And there are approximately 667,462 prime numbers less than or equal to 10,064,050.\n\nDivisibility of 10064050\n\n m n mod m 2 3 4 5 6 7 8 9 0 1 2 0 4 3 2 7\n\nThe number 10,064,050 is divisible by 2 and 5.\n\n• Deficient\n\n• Polite\n\nBase conversion (10064050)\n\nBase System Value\n2 Binary 100110011001000010110010\n3 Ternary 200221022021121\n4 Quaternary 212121002302\n5 Quinary 10034022200\n6 Senary 555412454\n8 Octal 46310262\n10 Decimal 10064050\n12 Duodecimal 345412a\n20 Vigesimal 32i02a\n36 Base36 5zpgy\n\nBasic calculations (n = 10064050)\n\nMultiplication\n\nn×y\n n×2 20128100 30192150 40256200 50320250\n\nDivision\n\nn÷y\n n÷2 5.03202e+06 3.35468e+06 2.51601e+06 2.01281e+06\n\nExponentiation\n\nny\n n2 101285102402500 1019338334833880125000 10258671968684911272006250000 103243787626443381287034500312500000\n\nNth Root\n\ny√n\n 2√n 3172.39 215.902 56.324 25.151\n\n10064050 as geometric shapes\n\nCircle\n\n Diameter 2.01281e+07 6.32343e+07 3.18197e+14\n\nSphere\n\n Volume 4.26979e+21 1.27279e+15 6.32343e+07\n\nSquare\n\nLength = n\n Perimeter 4.02562e+07 1.01285e+14 1.42327e+07\n\nCube\n\nLength = n\n Surface area 6.07711e+14 1.01934e+21 1.74314e+07\n\nEquilateral Triangle\n\nLength = n\n Perimeter 3.01922e+07 4.38577e+13 8.71572e+06\n\nTriangular Pyramid\n\nLength = n\n Surface area 1.75431e+14 1.2013e+20 8.21726e+06"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.60917175,"math_prob":0.9957009,"size":4741,"snap":"2022-05-2022-21","text_gpt3_token_len":1709,"char_repetition_ratio":0.123495884,"word_repetition_ratio":0.0254491,"special_character_ratio":0.48386416,"punctuation_ratio":0.09158416,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99904406,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-27T20:27:16Z\",\"WARC-Record-ID\":\"<urn:uuid:2134ad76-29df-4d6b-b85f-03c1caa9af89>\",\"Content-Length\":\"39486\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:82f74cbe-0706-40e0-9d15-7fffbe20584b>\",\"WARC-Concurrent-To\":\"<urn:uuid:b9d992f0-b933-4e52-bbe6-61e057e040ed>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/10064050\",\"WARC-Payload-Digest\":\"sha1:UCYHC2I3CUL3JJH5O7ZLEGRN7EA7G6U5\",\"WARC-Block-Digest\":\"sha1:2EHUWK5UXEZCKLON7IMPEF2C4JLTML5K\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320305288.57_warc_CC-MAIN-20220127193303-20220127223303-00563.warc.gz\"}"} |
https://rickyhan.com/jekyll/update/2019/12/22/how-to-simulate-market-microstructure.html | [
"",
null,
"Recently, I worked on market microstructure simulation to backtest a HFT strategy. In this post, I will show you how to build a simple but effective simulator. Hope you find it helpful.\n\n# Goal\n\nIn the past, I worked on strategies whose inputs are based on OHLC candles, but developing microstructure based strategies requires microstructure level simulation: post LOs to historical orderbook states, replay subsequent events and get execution info.\n\n# The first simulator: Poisson Process\n\nAvellaneda-Stoikov’s model of orderflow intensity is used to estimate probability of execution. It doesn’t simulate microstructure but works for backtests. The model is based on market dynamics and requires 2 parameters that can be estimated using tick data.\n\nThe idea is: arrival rate of MOs matching posted depth $$\\delta$$ at time $$t$$ iis modeled by a Poisson Process with intensity\n\n\\begin{align} \\lambda(t, \\delta) &= \\alpha(t) P(\\Delta p > \\delta) \\\\ &= \\alpha(t) e^{-\\mu \\delta} \\end{align}\n\nwhere $$\\alpha(t)$$ is the current fill probability at best price, the arrival rate of MO at time $$t$$ and $$P(\\Delta p > \\delta)$$ is probability that the size of the MO would be greater than the size of all LOs of price less than $$\\delta$$ combined. To see how it is derived you need to look at bottom left of page 220.\n\nNote: the parameters $$\\alpha(t)$$ and $$\\mu$$ are estimated for each of 10 minute segments in backtest period.\n\nThe binary $$x \\in [fill, no fill]$$ is sampled from a Bernoulli distribution: $$B(\\lambda(t, \\delta)\\Delta)$$ where $$\\Delta$$ is the strategy-dependent maximum time interval before cancellation.\n\nIt’s very fast to compute - it takes ~20 seconds to backtest a month’s data using 32 threads on a Threadripper 1950X. However, some LOs had questionable fills in some scenarios I visualized. So I decided to build a real orderbook microstructure simulator.\n\n# The second simulator: SimBook\n\nI implemented a market simulator called SimBook based on a flowchart from Robert Almgren’s slides which was very helpful(thank you!).",
null,
"The idea is to build an orderbook matching engine that follows a set of pessimistic exchange matching rules.",
null,
"Since I couldn’t find the original paper “Combining historical data with a market simulator for testing algorithmic trading” (presumably because it was a term paper for a course hence never published), it was hard to understand some of the rationale behind these design decisions but it was mostly self-explanatory.\n\nFor my implementation, I relaxed some assumptions but they don’t affect realism too much. For example, simulated orders are allowed to establish new price levels as long as they are worse than bba. I also implemented some heuristics for maximum order size and latency restrictions which makes it slightly more realistic.\n\nI was able to achieve great results with this approach. Here are some example executions from my backtests:",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"The downside of this approach is: market impact not being taken into account. At this time, my strategies are dumb so I don’t need more sophisticated simulators just yet.\n\n# The third simulation: Queue-Reactive Model\n\nThis one I did not implement but explored in depth. I got inspired to develop a signal that uses Kalman filter to estimate the implicit spread. I will explain this in a separate blog post."
]
| [
null,
"https://rickyhan.com/static/market-simulation/0-86.jpg",
null,
"https://rickyhan.com/static/market-simulation/almgren.png",
null,
"https://rickyhan.com/static/market-simulation/rules.png",
null,
"https://rickyhan.com/static/market-simulation/0-38.jpg",
null,
"https://rickyhan.com/static/market-simulation/0-42.jpg",
null,
"https://rickyhan.com/static/market-simulation/0-51.jpg",
null,
"https://rickyhan.com/static/market-simulation/2-21.jpg",
null,
"https://rickyhan.com/static/market-simulation/2-62.jpg",
null,
"https://rickyhan.com/static/market-simulation/2-66.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8954692,"math_prob":0.94697183,"size":3763,"snap":"2021-31-2021-39","text_gpt3_token_len":861,"char_repetition_ratio":0.09364193,"word_repetition_ratio":0.0,"special_character_ratio":0.21844274,"punctuation_ratio":0.107038125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9925886,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,4,null,4,null,4,null,4,null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-26T17:54:04Z\",\"WARC-Record-ID\":\"<urn:uuid:3fcc1f61-f7e3-4b2c-a5ee-5ace2c6beb0c>\",\"Content-Length\":\"9146\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e05ec87d-d6f8-4da9-87a5-a363e266d5ac>\",\"WARC-Concurrent-To\":\"<urn:uuid:c8a11fff-96c3-4197-95b2-37abba15c2d0>\",\"WARC-IP-Address\":\"185.199.108.153\",\"WARC-Target-URI\":\"https://rickyhan.com/jekyll/update/2019/12/22/how-to-simulate-market-microstructure.html\",\"WARC-Payload-Digest\":\"sha1:DYMTFCSL75MFOCP3QDKZW2RCI3Z37XUV\",\"WARC-Block-Digest\":\"sha1:SMTHVWC4GC4CCX3RRU4MEFXHWRHWPIV7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057913.34_warc_CC-MAIN-20210926175051-20210926205051-00406.warc.gz\"}"} |
https://socratic.org/questions/how-do-you-simplify-2-1-3-3-1-2 | [
"# How do you simplify 2*-1^3 - 3* -1 * 2 ?\n\nJun 17, 2015\n\nUsing PEMDAS\n\n$2 \\cdot - {1}^{3} - 3 \\cdot - 1 \\cdot 2$\n\n#### Explanation:\n\n$2 \\cdot - {1}^{3} - 3 \\cdot - 1 \\cdot 2$\n\nFirst put parentheses around negative number constants to avoid confusion of their minus signs with subtraction signs.\n\nThen use PEMDAS to provide operator precedence rules:\n\nParentheses\nExponents\nMultiplication & Division\n\nWhen precedence is otherwise equal, work left to right.\n\n$2 \\cdot {\\left(- 1\\right)}^{3} - 3 \\cdot \\left(- 1\\right) \\cdot 2$\n\n$2 \\cdot \\textcolor{red}{{\\left(- 1\\right)}^{3}} - 3 \\cdot \\left(- 1\\right) \\cdot 2$\n\n$= \\textcolor{red}{2 \\cdot \\left(- 1\\right)} - 3 \\cdot \\left(- 1\\right) \\cdot 2$\n\n$= \\left(- 2\\right) - \\textcolor{red}{3 \\cdot \\left(- 1\\right)} \\cdot 2$\n\n$= \\left(- 2\\right) - \\textcolor{red}{\\left(- 3\\right) \\cdot 2}$\n\n$= \\textcolor{red}{\\left(- 2\\right) - \\left(- 6\\right)}$\n\n$= 4$"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.67051345,"math_prob":0.99977237,"size":504,"snap":"2021-43-2021-49","text_gpt3_token_len":116,"char_repetition_ratio":0.086,"word_repetition_ratio":0.0,"special_character_ratio":0.22222222,"punctuation_ratio":0.084337346,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9947142,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-01T00:28:33Z\",\"WARC-Record-ID\":\"<urn:uuid:bd1ca82c-2a75-4234-a801-75262e021e9a>\",\"Content-Length\":\"33390\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:695b0023-24ae-4e68-871a-680e1690c23b>\",\"WARC-Concurrent-To\":\"<urn:uuid:7b9128df-5fab-43fb-9aec-74948c333640>\",\"WARC-IP-Address\":\"216.239.36.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-do-you-simplify-2-1-3-3-1-2\",\"WARC-Payload-Digest\":\"sha1:HUDJ62M2XDKXJZDEESLTMYGM2FGQAHO5\",\"WARC-Block-Digest\":\"sha1:6VL2HOQIIV3SCKGSY2AQCY2V7KTKE2IC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964359082.76_warc_CC-MAIN-20211130232232-20211201022232-00039.warc.gz\"}"} |
https://rlc.vlinder.ca/blog/2014/10/writing-a-brainf-interpreter-in-vhdl/ | [
"I’ve written parsers and interpreters before, but usually in C++ or, if I was feeling like doing all of the hard work myself, in C.\n\nInterpreters usually end up looking like a state machine managed by a tight loop with a lot of machinery around to manage objects, caches and somesuch. Other times they end up being visitors on an AST in stead. In any case, once the pattern emerges and the first few design decisions have been made, the rest kinda falls into place on its own.\n\nWhen designing something in VHDL, the mindset is a bit different: VHDL is a hardware description language and as such, it is very explicit – so if I thought I had to do everything in C, there’s even more to do when using VHDL…\n\nAlmost ten years ago, I wrote the Funky interpreter (for a lispy functional language) with my daughter (who was a baby at the time) sleeping in my arms. A few years later, I had my baby boy sleeping in my arms while I was writing another interpreter for another DSL.\n\nWhile I’ve written parsers and interpreters without sleeping children in my arms, and I’ve had sleeping children in my arms without writing interpreters, there still seems to be a link between the two: at some point, singing a lullaby takes the form of writing an interpreter – this time for BrainF, in VHDL and on my iPad, with my youngest son sleeping in my arms…\n\nMy first draft had a few syntax errors and typos – I don’t have a VHDL compiler on my iPad – but the general idea was there: [aside type=”code” status=”closed”]\n\n``````-- BrainF* interpreter\n-- Version: 20140927\n-- Author: Ronald Landheer-Cieslak\n-- Copyright (c) 2014 Vlinder Software\nlibrary ieee:\nuse ieee.std_logic_1164.all;\nuse ieee.numeric_std.all;\n\nentity BrainF is\ngeneric(\nMAX_INSTRUCTION_COUNT : positive := 65536\n; MEMORY_SIZE : positive := 65536\n);\nport(\nresetN : in std_logic\n; clock : in std_logic\n\n; instruction : in std_logic_vector(7 downto 0)\n; ack_instruction : out std_logic\n; program_full : out std_logic\n\n; memory_byte : out std_logic_vector(7 downto 0)\n\n; done : out std_logic\n);\nend entity;\narchitecture behavior of BrainF is\ntype Instruction is (dot, plus, minus, advance, back_up, begin_loop, end_loop);\ntype Instructions is array(0 to (MAX_INSTRUCTION_COUNT - 1)) of Instruction;\ntype Pipeline is array(0 to 1) of Instruction;\ntype IPointer is integer range 0 to MAX_INSTRUCTION_COUNT;\ntype NestCount is integer range 0 to MAX_INSTRUCTION_COUNT - 1;\n\ntype Memory is array(0 to (MEMORY_SIZE - 1)) of std_logic_vector(7 downto 0);\ntype Pointer is integer range 0 to (MEMORY_SIZE - 1);\n\nfunction toInstruction(i : std_logic_vector(7 downto 0)) return Instruction is\nbegin\ncase i is\nwhen x\"2B\" => return plus;\nwhen x\"2D\" => return minus;\nwhen x\"3C\" => return back_up;\nwhen x\"5B\" => return begin_loop;\nwhen x\"5D\" => return end_loop;\nwhen others => return dot;\nend case;\nend toInstruction;\nfunction increment(b : std_logic_vector(7 downto 0)) return std_logic_vector(7 downto 0) is\nbegin\nif b = x\"FF\" then\nreturn x\"00\";\nelse\nreturn std_logic_vector(unsigned(b) + 1);\nend if;\nend increment;\nfunction decrement(b : std_logic_vector(7 downto 0)) return std_logic_vector(7 downto 0) is\nbegin\nif b = x\"00\" then\nreturn x\"FF\";\nelse\nreturn std_logic_vector(unsigned(b) - 1);\nend if;\nend decrement;\n\n-- produced by p_interpret\nsignal ptr : Pointer := 0;\nsignal mem : Memory := (others => (others => '0')));\nsignal stalled : std_logic := '0';\n-- produced by p_fetch\nsignal pipe : Pipeline := (others => dot);\nsignal iptr : IPointer := 0;\nsignal nest_count : NestCount := 0;\nsignal program : Instructions := (others => dot);\nsignal prev_load_instruction : std_logic := '0';\nsignal instruction_step : std_logic := '0';\nsignal iwptr : IPointer := 0;\nsignal prev_memory_byte_read_ack : std_logic := '0';\nsignal prev_read_memory : std_logic := '0';\nbegin\np_interpret : process(resetN, clock)\nbegin\nif resetN = '0' or load_instructions = '1' then\nptr <= 0;\nmem <= (others => (others => '0'));\nstalled <= '0';\nif rising_edge(clock) then\ncase pipe(0) is\nwhen dot =>\nnull;\nwhen plus =>\nmem(ptr) <= increment(mem(ptr));\nwhen minus =>\nmem(ptr) <= decrement(mem(ptr));\nif ptr = MEMORY_SIZE - 1 then\nptr <= 0;\nelse\nptr <= ptr + 1;\nend if;\nwhen back_up =>\nif ptr = 0 then\nptr <= MEMORY_SIZE - 1;\nelse\nptr <= ptr - 1;\nend if;\nwhen begin_loop =>\nif mem(ptr) = x\"00\" then\nstalled <= '1';\nelse\nstalled <= '0';\nend if;\nwhen end_loop =>\nif mem(ptr) = x\"00\" then\nstalled <= '0';\nelse\nstalled <= '1';\nend if;\nend case;\nend if;\nend if;\nend process;\n\np_fetch : process(resetN, clock)\nbegin\nif resetN = '0' or load_instructions = '1' then\npipe <= (others => dot);\niptr <= 0;\nnest_count <= 0;\ndone <= '0';\nif stalled = '1' then\nif pipe(0) = begin_loop then\ncase pipe(1) is\nwhen begin_loop =>\nnest_count <= nest_count + 1;\nwhen end_loop =>\nif nest_count = 0 then\npipe(0) <= pipe(1);\nelse\nnest_count <= nest_count - 1;\nend if;\nwhen others =>\nnull;\nend case;\nelsif pipe(0) = end_loop then\ncase pipe(1) is\nwhen end_loop =>\nnest_count <= nest_count + 1;\nwhen begin_loop =>\nif nest_count = 0 then\npipe(0) <= pipe(1);\nelse\nnest_count <= nest_count - 1;\nend if;\nwhen others =>\nnull;\nend case;\nend if;\nelse\npipe(0) <= pipe(1);\nend if;\nif iptr = MAX_INSTRUCTION_COUNT then\npipe(1) <= dot;\ndone <= '1';\nelse\npipe(1) <= program(iptr);\ndone <= '0';\nend if;\nif stalled = '1' and pipe(0) = end_loop then\nif iptr /= 0 then\niptr <= iptr - 1;\nend if;\nelse\nif iptr /= MAX_INSTRUCTION_COUNT then\niptr <= iptr + 1;\nend if;\nend if;\nend if;\nend process;\n\nbegin\nif resetN = '0' then\nprogram <= (others => dot);\ninstruction_step <= '0';\niwptr <= 0;\nprogram_full <= '0';\nelse\nif rising_edge(clock) then\nprogram <= (others => dot);\niwptr <= 0;\ninstruction_step <= '0';\nprogram_full <= '0';\nif instruction_step = '0' then\nif iwptr < MAX_INSTRUCTION_COUNT then\nprogram(iwptr) <= toInstruction(instruction);\niwptr <= iwptr + 1;\nelse\nprogram_full <= '1';\nend if;\nend if;\n\ninstruction_step <= not instruction_step and not program_full;\nelse\niwptr <= 0;\ninstruction_step <= '0';\nend if;\nend if;\nend if;\nend process;\nack_instruction <= instruction_step;\n\nvariable rptr : integer range 0 to MEMORY_SIZE := 0;\nbegin\nif resetN = '0' or read_memory = '0' then\nrptr := 0;\nmemory_byte <= (others => '0');\nelse\nif rising_edge(clock) then\nmemory_byte <= mem(0);\nrptr := 1;\nelse\nif rptr /= MEMORY_SIZE then\nmemory_byte <= mem(rptr);\nrptr := rptr + 1;\nelse\nend if;\nend if;\nend if;\nend if;\nend if;\nend if;\nend process;\nend behavior;\n``````\n\n[/aside]\n\nThere’s a `pipe` of instructions: `pipe(0)` contains the instruction currently being interpreted by the `p_interpret` process, and `pipe(1)` contains the next instruction. The `p_interpret` process interprets the opcode and works on the memory array (`mem`) at the location pointed to by its pointer (`ptr`). Two instructions manipulate the pointer (`advance` and `back_up`) and two instructions manipulate the byte being pointed at (`minus` and `plus`). The two looping instructions, `begin_loop` and `end_loop`, are mainly handled by the p_fetch process, which manipulates the instruction pointer, `iptr`, with the `p_interpreter` process indicating only whether it wants to (re-)execute the loop’s body – determined of course by the value of whatever byte `ptr` is pointing at.\n\nThe `p_fetch` process fills the pipe, shifts it, and handles the instruction pointer, `iptr` including looping logic. This turned out to be the most challenging part, because this is where you have to wrap your head around inter-process synchronization in VHDL – which isn’t new (at least not completely new) to me, but is quite different than in C++ and takes a bit of thinking when the synchronization has to go both ways between two processes.\n\nThe other two processes, `p_loadInstructions` and `p_readMemory`, are basically pumps for eight-bit-wide buses. The `p_loadInstructions` process translates from ASCII to internal instructions, but that’s just so that code is encapsulated within the component and I can use an enumeration for my instructions without exposing it.\n\nThere were a few problems with this version, other than the typos: running in a simulation, I quickly found that loops didn’t work properly: while the `p_interpret` process handled them just fine, indicating when it wanted to not execute a loop (stalling on a `begin_loop` instruction) and when it wanted to execute a loop again (stalling on an `end_loop` instruction), the `p_fetch` process had a bit of a hard time catching up: thinking some loops were nested when they weren’t, and having some instructions execute twice when they shouldn’t be.\n\nThe thing is, when a value is assigned to a signal, it isn’t immediately visible to the other processes: it only becomes visible when the current state of all the signals has propagated. That’s because in theory (and in the FPGA), everything is running in parallel, synchronous to the rising edge of the clock as it propagates through the circuit. Hence, when the `stalled` signal was set, the `p_fetch` process would only see it when it was already two instructions further down the road.\n\nThis meant I had to stall `p_fetch` before `p_interpret` told it to stall, even if `p_interpret` wasn’t going to stall it at all, unless I wanted to interpret the instruction in `pipe(0)` (which is where `p_interpret` reads it), read the memory value at the pointer or the one next to it if the instruction was a shift instruction (called `advance` and `back_up` in the code), perform the calculation if it’s a `plus` or a `minus` and then decide whether `p_interpret` was going to ask us to stall. Obviously, I wasn’t going to do that: it would involve a lot of extra code duplicating some of the functionality of the `p_interpret` process. That would be as bad a design in VHDL as it would be in any other language.\n\nIn stead, I added an `expect_stall` signal, which is set if the instruction being read into `pipe(1)` is either `begin_loop` or `end_loop`. On the next instruction, if `expect_stall` is high that means we don’t know whether `p_interpret` is going to stall yet, so we shouldn’t go any further for now. Hence, all it does when `expect_stall` is high, is pull it down again.\n\n`````` if (pipe(0) = begin_loop or pipe(0) = end_loop) and expect_stall = '1' then\nexpect_stall <= '0';\nelse\n``````\n\nThis didn’t quite solve the issue yet: when `stalled` finally became visible, the instruction pointer, `iptr` was still two instructions ahead of the location of `begin_loop` or `end_loop` instruction:\n\n``````pipe(0) | pipe(1) | next\n^^^^\niptr\n``````\n\nso if the `p_interpret` process didn’t stall, all was fine and dandy but if it did, and `pipe(0)` contained the `end_loop` instruction, `iptr` would have to be adjusted before going backward – and would have to be re-adjusted when the going backward was done. To make sure the `end_loop` instruction wasn’t seen twice - and therefore wouldn’t count itself as a nested loop, I coded the adjustment as follows:\n\n`````` if should_back_up_on_stall = '1' then\nassert iptr >= 3 report \"Stalled with an invalid instruction pointer!\" severity failure;\npipe(1) <= program(iptr - 3);\niptr <= iptr - 3;\nshould_back_up_on_stall <= '0';\nelse\n``````\n\nAs you can see, there’s a `should_back_up_on_stall` signal there. That indicates that the instruction we expected a stall for was `end_loop`. I tried fiddling a bit with a three-step pipe so I didn’t have to use a separate signal to indicate the direction I was going to go, but I ended up using this approach because it is easier to read the code – and it works!\n\nWhen it’s done looping, the `p_interpret` process drops the `stalled` signal but the instruction pointer gets re-adjusted before that’s visible:\n\n`````` elsif stalled = '1' and nest_count = 0 and pipe(0) = end_loop and pipe(1) = begin_loop and should_back_up_on_stall = '0' then\n-- we are done backing up!\npipe(0) <= pipe(1);\niptr <= iptr + 2;\ndone_skipping := True;\n``````\n\nso the `p_fetch` process counts on the `p_interpret` process to do “the right thing” – even if it’s not visible yet.\n\nRunning the code, which now looks like this: [aside status=”closed” type=”code”]\n\n``````-- BrainF* interpreter\n-- Version: 20140929\n-- Author: Ronald Landheer-Cieslak\n-- Copyright (c) 2014 Vlinder Software\nlibrary ieee;\nuse ieee.std_logic_1164.all;\nuse ieee.numeric_std.all;\n\nentity BrainF is\ngeneric(\nMAX_INSTRUCTION_COUNT : positive := 65536\n; MEMORY_SIZE : positive := 65536\n);\nport(\nresetN : in std_logic\n; clock : in std_logic\n\n; instruction_octet : in std_logic_vector(7 downto 0)\n; ack_instruction : out std_logic := '0'\n; program_full : out std_logic := '0'\n\n; memory_byte : out std_logic_vector(7 downto 0) := (others => '0')\n; memory_byte_ready : out std_logic := '0'\n\n; done : out std_logic := '0'\n);\nend entity;\narchitecture behavior of BrainF is\ntype Instruction is (dot, plus, minus, advance, back_up, begin_loop, end_loop);\ntype Instructions is array(0 to (MAX_INSTRUCTION_COUNT - 1)) of Instruction;\ntype Pipeline is array(0 to 1) of Instruction;\nsubtype IPointer is integer range 0 to MAX_INSTRUCTION_COUNT;\ntype InterpreterState is (execute_instruction, fetch_instruction);\nsubtype NestCount is integer range 0 to MAX_INSTRUCTION_COUNT - 1;\n\ntype Memory is array(0 to (MEMORY_SIZE - 1)) of std_logic_vector(7 downto 0);\nsubtype Pointer is integer range 0 to (MEMORY_SIZE - 1);\n\nfunction toInstruction(i : std_logic_vector(7 downto 0)) return Instruction is\nbegin\ncase i is\nwhen x\"2B\" => return plus;\nwhen x\"2D\" => return minus;\nwhen x\"3C\" => return back_up;\nwhen x\"5B\" => return begin_loop;\nwhen x\"5D\" => return end_loop;\nwhen others => return dot;\nend case;\nend toInstruction;\nfunction increment(b : std_logic_vector(7 downto 0)) return std_logic_vector is\nbegin\nif b = x\"FF\" then\nreturn x\"00\";\nelse\nreturn std_logic_vector(unsigned(b) + 1);\nend if;\nend increment;\nfunction decrement(b : std_logic_vector(7 downto 0)) return std_logic_vector is\nbegin\nif b = x\"00\" then\nreturn x\"FF\";\nelse\nreturn std_logic_vector(unsigned(b) - 1);\nend if;\nend decrement;\n\n-- produced by p_interpret\nsignal ptr : Pointer := 0;\nsignal mem : Memory := (others => (others => '0'));\nsignal stalled : std_logic := '0'; -- signals it's going forward in a loop. The p_fetch process will continue\n-- fetching until it finds the corresponding end-of-loop and puts that in pipe(0) at that time.\n-- produced by p_fetch\nsignal pipe : Pipeline := (others => dot);\nsignal iptr : IPointer := 0;\nsignal nest_count : NestCount := 0;\nsignal expect_stall : std_logic := '0';\nsignal should_back_up_on_stall : std_logic := '0'; -- set if we expect a stall on an end_loop instruction\nsignal program : Instructions := (others => dot);\nsignal prev_load_instructions : std_logic := '0';\nsignal instruction_step : std_logic := '0';\nsignal iwptr : IPointer := 0;\nsignal internal_program_full : std_logic := '0';\nsignal prev_memory_byte_read_ack : std_logic := '0';\nsignal prev_read_memory : std_logic := '0';\nbegin\nbegin\nif resetN = '0' or load_instructions = '1' then\nptr <= 0;\nmem <= (others => (others => '0'));\nstalled <= '0';\nif rising_edge(clock) then\ncase pipe(0) is\nwhen dot =>\nnull;\nwhen plus =>\nmem(ptr) <= increment(mem(ptr));\nwhen minus =>\nmem(ptr) <= decrement(mem(ptr));\nif ptr = MEMORY_SIZE - 1 then\nptr <= 0;\nelse\nptr <= ptr + 1;\nend if;\nwhen back_up =>\nif ptr = 0 then\nptr <= MEMORY_SIZE - 1;\nelse\nptr <= ptr - 1;\nend if;\nwhen begin_loop =>\nif mem(ptr) = x\"00\" then\nstalled <= '1';\nelse\nstalled <= '0';\nend if;\nwhen end_loop =>\nif mem(ptr) /= x\"00\" then\nstalled <= '1';\nelse\nstalled <= '0';\nend if;\nend case;\nend if;\nend if;\nend process;\n\nvariable done_skipping : boolean := False;\nbegin\nif resetN = '0' or load_instructions = '1' then\npipe <= (others => dot);\niptr <= 0;\nnest_count <= 0;\ndone <= '0';\nexpect_stall <= '0';\nshould_back_up_on_stall <= '0';\ndone_skipping := False;\nif rising_edge(clock) then\n-- if pipe(1) contains a begin_loop instruction, the p_interpret process may start stalling as soon as\n-- it sees it, which we will only know one (extra) clock cycle afterwards. In that case, we don't want\n-- to give it the next instruction unless we know it has had time to take a decision. Hence, if there's\n-- a begin_loop instruction in pipe(1) we set the expect_stall flag. If there's a begin_loop in pipe(0)\n-- and the expect_stall flag is set, we clear the flag and do nothing else. If the flag is not set, we\n-- check whether the stalled signal is raised and, if so, start searching for the end of the loop. If\n-- it's not set, we continue as normal.\n-- if pipe(1) contains an end_loop instruction, p_interpret may also stall but if it does, we need to\n-- start backing up. When pipe(1) contains an instruction, the instruction pointer (iptr) already\n-- points one past the instruction, because we're getting ready to read the next instruction into\n-- pipe(1). Hence, while we can anticipate our not stalling (and therefore load the next instruction\n-- into pipe(1) regardless) we have to make sure that if we do stall, we start by backing up the\n-- instruction pointer twice (or not count the end_loop instruction as nesting).\nif (pipe(1) = begin_loop or pipe(1) = end_loop) and stalled /= '1' and expect_stall = '0' then\nexpect_stall <= '1';\ndone_skipping := False;\nif pipe(1) = end_loop then\nshould_back_up_on_stall <= '1';\nelse\nshould_back_up_on_stall <= '0';\nend if;\nend if;\nif (pipe(0) = begin_loop or pipe(0) = end_loop) and expect_stall = '1' then\nexpect_stall <= '0';\nelse\nif stalled = '0' then\npipe(0) <= pipe(1);\nelsif stalled = '1' and nest_count = 0 and pipe(0) = begin_loop and pipe(1) = end_loop then\n-- we're done skipping over the loop!\npipe(0) <= pipe(1);\nelsif stalled = '1' and nest_count = 0 and pipe(0) = end_loop and pipe(1) = begin_loop and should_back_up_on_stall = '0' then\n-- we are done backing up!\npipe(0) <= pipe(1);\niptr <= iptr + 2;\ndone_skipping := True;\nelsif stalled = '1' and pipe(0) = pipe(1) and not done_skipping then\nnest_count <= nest_count + 1;\nelsif stalled = '1' and nest_count /= 0 and ((pipe(0) = begin_loop and pipe(1) = end_loop) or (pipe(0) = end_loop and pipe(1) = begin_loop)) then\nnest_count <= nest_count - 1;\nend if;\nif stalled = '0' or (stalled = '1' and pipe(0) = begin_loop) then\nif iptr = MAX_INSTRUCTION_COUNT then\npipe(1) <= dot;\ndone <= '1';\nelse\npipe(1) <= program(iptr);\ndone <= '0';\nend if;\nif iptr /= MAX_INSTRUCTION_COUNT then\niptr <= iptr + 1;\nend if;\nelsif not done_skipping then\nassert stalled = '1' and pipe(0) = end_loop report \"Unexpected stall!\" severity failure;\nif should_back_up_on_stall = '1' then\nassert iptr >= 3 report \"Stalled with an invalid instruction pointer!\" severity failure;\npipe(1) <= program(iptr - 3);\niptr <= iptr - 3;\nshould_back_up_on_stall <= '0';\nelse\n-- this is where we start backing up\npipe(1) <= program(iptr);\ndone <= '0';\nif iptr /= 0 then\niptr <= iptr - 1;\nend if;\nend if;\nend if;\nend if;\nend if;\nend if;\nend process;\n\nbegin\nif resetN = '0' then\nprogram <= (others => dot);\ninstruction_step <= '0';\niwptr <= 0;\ninternal_program_full <= '0';\nelse\nif rising_edge(clock) then\nprogram <= (others => dot);\niwptr <= 0;\ninstruction_step <= '0';\ninternal_program_full <= '0';\nif instruction_step = '0' then\nif iwptr < MAX_INSTRUCTION_COUNT then\nprogram(iwptr) <= toInstruction(instruction_octet);\niwptr <= iwptr + 1;\nelse\ninternal_program_full <= '1';\nend if;\nend if;\n\ninstruction_step <= not instruction_step and not internal_program_full;\nelse\niwptr <= 0;\ninstruction_step <= '0';\nend if;\nend if;\nend if;\nend process;\nack_instruction <= instruction_step;\nprogram_full <= internal_program_full;\n\nvariable rptr : integer range 0 to MEMORY_SIZE := 0;\nbegin\nif resetN = '0' or read_memory = '0' then\nrptr := 0;\nmemory_byte <= (others => '0');\nelse\nif rising_edge(clock) then\nmemory_byte <= mem(0);\nrptr := 1;\nelse\nif rptr /= MEMORY_SIZE then\nmemory_byte <= mem(rptr);\nrptr := rptr + 1;\nelse\nend if;\nend if;\nend if;\nend if;\nend if;\nend if;\nend process;\nend behavior;\n``````\n\n[/aside] requires a test bench: a chunk of code used to exercise the component that’s intended for synthesis. The test bench itself is not intended for synthesis, so it can do lots of things that you shouldn’t do in code you want to synthesize (such as `after` and `wait` statements).\n\nI tend to put assertions in code intended for synthesis as well as in the test bench, even if it has no effect when synthesized: I find they document the code as much as they help during testing, validating assumptions. I also try to write assertive test benches, so I can automate running them – say by simulating a given time so that if it hasn’t failed by then, it is unlikely (or impossible) to fail afterwards.\n\nThe test bench I wrote for this interpreter isn’t quite complete yet: it doesn’t fetch the altered memory from the interpreter to check what happened, nor does it take output from the interpreter during its runs (unlike regular BrainF, the `dot` opcode is implemented as a no-op, not as an output), but for a week-end pet project, I think it turned out pretty nice.\n\nHere’s the code for the test bench: [aside type=”code” status=”closed”]\n\n``````-- BrainF* interpreter - testbench\n-- Version: 20140929\n-- Author: Ronald Landheer-Cieslak\n-- Copyright (c) 2014 Vlinder Software\nlibrary ieee;\nuse ieee.std_logic_1164.all;\nuse ieee.numeric_std.all;\nuse work.txt_util.all;\n\nentity BrainF_tb is\nend entity;\narchitecture behavior of BrainF_tb is\nconstant INITIAL_COUNTDOWN : integer := 10;\n--constant PROGRAM : string := \"++++++++\";\n--constant PROGRAM : string := \"[.]\";\n--constant PROGRAM : string := \"-+[-+][[-+]]\";\n--constant PROGRAM : string := \"++[-][[-+]]\";\nconstant PROGRAM : string := \">+++++++++[<++++++++>-]<.>+++++++[<++++>-]<+.+++++++..+++.[-]>++++++++[<++++>-] <.>+++++++++++[<++++++++>-]<-.--------.+++.------.--------.[-]>++++++++[<++++>- ]<+.[-]++++++++++.\";\nconstant PROGRAM_TIMEOUT : Time := 138 ns;\n\ncomponent BrainF is\ngeneric(\nMAX_INSTRUCTION_COUNT : positive := 65536\n; MEMORY_SIZE : positive := 65536\n);\nport(\nresetN : in std_logic\n; clock : in std_logic\n\n; instruction_octet : in std_logic_vector(7 downto 0)\n; ack_instruction : out std_logic\n; program_full : out std_logic\n\n; memory_byte : out std_logic_vector(7 downto 0)\n\n; done : out std_logic\n);\nend component;\n\nfunction to_std_logic_vector(c : character) return std_logic_vector is\nvariable cc : integer;\nbegin\ncc := character'pos(c);\nreturn std_logic_vector(to_unsigned(cc, 8));\nend to_std_logic_vector;\n\nsignal clock : std_logic := '0';\n\nsignal load_instructions : std_logic := '0';\nsignal instruction_octet : std_logic_vector(7 downto 0) := (others => '0');\nsignal ack_instruction : std_logic := '0';\nsignal program_full : std_logic := '0';\nsignal read_memory : std_logic := '0';\nsignal memory_byte : std_logic_vector(7 downto 0) := (others => '0');\nsignal memory_byte_ready : std_logic := '0';\nsignal memory_byte_read_ack : std_logic := '0';\nsignal done : std_logic := '0';\n\nsignal tb_state : State := initial;\n\nsignal should_be_done : std_logic := '0';\n\nsignal end_of_simulation : std_logic := '0';\nbegin\ninterpreter : BrainF\nport map(\nresetN => '1'\n, clock => clock\n, instruction_octet => instruction_octet\n, ack_instruction => ack_instruction\n, program_full => program_full\n, memory_byte => memory_byte\n, done => done\n);\n-- generate the clock\nclock <= not clock after 1 ps;\n-- generate the time-out signal\nshould_be_done <= '1' after PROGRAM_TIMEOUT;\n\np_tb : process(clock)\nvariable countdown : integer := INITIAL_COUNTDOWN;\nvariable program_load_counter : integer := 0;\nbegin\nif rising_edge(clock) then\ncase tb_state is\nwhen initial =>\nassert done = '0' report \"Cannot be done in the initial state\" severity failure;\nassert program_full = '0' report \"Program cannot be initially full\" severity failure;\nassert ack_instruction = '0' report \"Cannot acknowledge an instruction I haven't given yet\" severity failure;\nassert memory_byte_ready = '0' report \"Cannot have memory ready when I haven't asked for anything yet\" severity failure;\nif countdown = 1 then\nelse\ncountdown := countdown - 1;\nend if;\nassert done = '0' report \"Cannot be done while loading the program\" severity failure;\nassert program_full = '0' report \"Program cannot be initially full\" severity failure;\nassert ack_instruction = '0' report \"Cannot acknowledge an instruction I haven't given yet\" severity failure;\nassert memory_byte_ready = '0' report \"Cannot have memory ready when I haven't asked for anything yet\" severity failure;\ninstruction_octet <= to_std_logic_vector(program(1));\nif ack_instruction = '1' then\nend if;\nelse\ntb_state <= running_program;\nend if;\nwhen running_program =>\nif should_be_done = '1' then\nassert done = '1' report \"Timeout!\" severity failure;\nend if;\nif done = '1' then\ntb_state <= success;\nend if;\nwhen success =>\nend_of_simulation <= '1';\nwhen others => null;\nend case;\nend if;\nend process;\nend behavior;\n``````\n\n[/aside] And this is what it looked like in ModelSim:",
null,
"One thing you can see clearly in the waveform is that there’s room for optimization: there’s a large amount of time where the interterpreter’s `ptr` register doesn’t move, but the interpreter seems pretty busy. This is when it’s executing these instructions: `[-]` – that is: setting the current memory cell value to 0. Doing a bit more look-ahead to detect `[-]` and replacing it with an instruction setting the current cell to 0 as a one-shot deal would probably save quite a bit of time running the “Hello world” test case.\n\nAnother thing that takes the interpreter some time is finding out that it’s done with the script: it currently fills its program memory with `dot` instructions and says it’s done when it’s reached the end of the program buffer. Filling it with `halt` instructions in stead would allow a program to halt anywhere (by inserting halt in the program), and would allow the interpreter to know it’s done a lot quicker.\n\nOther ideas are welcome. If there’s any enthusiasm, I might invest a bit more time in this project…\n\nI get comments about my coding style sometimes, both in C++ and in VHDL, so let’s get some of them out of the way:\n\n1. I like to name things for what they do – what their function is.\nThat means there are very few abbreviations in my code: I say reset rather than rst, etc. Exceptions occur when names clash: VHDL is case-insensitive (much to my chagrin) which means `Pointer` and `pointer` are the same thing. I still use `UpperCamelCase` for types, `lowerCamelCase` for functions, procedures and processes (with a `p_` prefix for processes) and `snake_style` for variables and signals, but that doesn’t mean clashes don’t occur, in which case abbreviations are the way to go.\n\n2. These two bits of code do the same thing:\n\n``````pipe(1) <= program(iptr - 3);\niptr <= iptr - 3;\n\niptr <= iptr - 3;\npipe(1) <= program(iptr - 3);\n``````\n\nbut these two do not:\n\n``````memory_byte <= mem(rptr);\nrptr := rptr + 1;\n\nrptr := rptr + 1;\nmemory_byte <= mem(rptr);\n``````\n\nYou’ll usually see me prefer the first version over the second: it’s more consistent and it’s easier to read for someone who doesn’t remember signal assignments aren’t immediate.\n\n1. I hardly ever use prefixes or suffixes for anything: in C++, I use them to denote scope; in VHDL, I sometimes suffix inputs with `I`, outputs with `O` I/Os with `IO`; but always things that have negative logic with `N`. Processes tend to get a name, and tend to have a `p_` prefix so as not to confuse them with functions. The suffixes convey important information which would otherwise not be available in the name alone – so the in, out and inout suffixes are only there if there could possibly be any confusion (although I’m tending towards using them more).\n\n2. Reset signals always use negative logic, all other signals use positive logic.\n\n3. I try not to duplicate code unless the alternative is unreadable. For example: the current version of\n\n`````` if stalled = '0' then\npipe(0) <= pipe(1);\nelsif stalled = '1' and nest_count = 0 and pipe(0) = begin_loop and pipe(1) = end_loop then\n-- we're done skipping over the loop!\npipe(0) <= pipe(1);\nelsif stalled = '1' and nest_count = 0 and pipe(0) = end_loop and pipe(1) = begin_loop and should_back_up_on_stall = '0' then\n-- we are done backing up!\npipe(0) <= pipe(1);\niptr <= iptr + 2;\ndone_skipping := True;\n``````\n\nis an exception (the assignment from `pipe(1)` to `pipe(0)` is repeated) only because the alternative was a five-line-long condition (not stalled or stalled but not nested and either beginning or ending a loop but if ending a loop then we should also be backing up otherwise we’re not really ending it…)\n\n1. I like encapsulating things in functions. Functions should be pure. Often, synthesis can get rid of them altogether because they just end up wiring things from one bit to another – but they make the code a lot easier to read.\n\n2. The same is true for enumerations: while my seven opcodes all have a name, they can be represented with just three bits, but `dot` is easier to read than `\"000\"`\n\n3. My punctuation may seem a bit strange to some, but punctuation is a bit strange: some lists are comma-separated while others are semicolon-separated and compilers tend to be finicky about where you put your commas and semicolons, so a comma-separated list that looks like `foo(a, b, c)` on a single line will expand to the following when put on multiple lines:\n\n``````foo(\na\n, b\n, c\n)\n``````\n\nThis mostly began as a way to make diffs clearer: it’s a lot less common to add things to the start of a list than it is to add things anywhere else. Inserting in a list that’s formatted like this results in a single-line diff (just a line for what’s been added) – the existing lines remain untouched.\n\nIt took some getting used to, but now I find it easier to read this way as well."
]
| [
null,
"https://rlc.vlinder.ca/assets/2014/09/wave-300x125.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7813343,"math_prob":0.93628454,"size":32180,"snap":"2019-51-2020-05","text_gpt3_token_len":8452,"char_repetition_ratio":0.17985456,"word_repetition_ratio":0.38548884,"special_character_ratio":0.29307023,"punctuation_ratio":0.16181627,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99248946,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-18T22:47:09Z\",\"WARC-Record-ID\":\"<urn:uuid:92ec2101-9f96-4848-8659-828e08bb2e61>\",\"Content-Length\":\"55680\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:011c5823-c071-42ed-87a8-de23babcb75f>\",\"WARC-Concurrent-To\":\"<urn:uuid:aff2911f-d7fe-48c9-b01c-71ba4624275d>\",\"WARC-IP-Address\":\"185.199.110.153\",\"WARC-Target-URI\":\"https://rlc.vlinder.ca/blog/2014/10/writing-a-brainf-interpreter-in-vhdl/\",\"WARC-Payload-Digest\":\"sha1:I3SOW2GIFNNU2OW7HV7J7LV2MONYHURN\",\"WARC-Block-Digest\":\"sha1:5OGMLR2ACGVIRBOTDIHRBXGPHD7AN5MC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250593994.14_warc_CC-MAIN-20200118221909-20200119005909-00245.warc.gz\"}"} |
https://futureboy.us/fsp/colorize.fsp?f=vsop87.frink | [
"# vsop87.frink\n\n```// // Routines for parsing VSOP87 coefficient files and generating Frink code // from them (or, with small modifications, for other languages). // The output of running this program is a partial Frink program // that contains function definitions to find the coordinates of each planet. // // The full coefficients of the VSOP87 theory are available for download // from: // ftp://ftp.imcce.fr/pub/ephem/planets/vsop87/ // // From this, the series we require for use with the equations in Meeus // are the VSOP87D.xxx files, which contains the // heliocentric spherical variables referred to equinox and ecliptic of date. // // This reverses the lines in the file so that smaller coefficients are // added first, reducing numerical error. planets = [\"Mercury\", \"Venus\", \"Earth\", \"Mars\", \"Jupiter\", \"Saturn\", \"Uranus\", \"Neptune\"] for planet = planets { ext = lc[left[planet, 3]] firstline = true fullvar = undef running = undef println[\"\"\" // // \\$planet // // This function calculates the heliocentric coordinates of \\$planet // referred to the mean equinox *of the date*. You may want to convert this // to another coordinate system, such as FK5. // // arguments: // d: the date/time to be calculated for // // returns: // [L, B, R] // // Where // L is the heliocentric longitude, // B is the heliocentric latitude // R is the distance from the sun. \\${planet}HeliocentricCoordinates = {|d| tau = meeusT[d] / 10 \"\"\"] for line=lines[\"file:vsop87/VSOP87D.\\$ext\"] { if [planet, varno, varnames, exponent] = line =~ %r/VSOP87\\s+VERSION\\s+D4\\s+(\\w+)\\s+VARIABLE\\s+(\\d)\\s+\\((\\w+)\\)\\s+\\*T\\*\\*(\\d)/ { varno = parseInt[varno] varname = substrLen[varnames, varno-1, 1] firstline = true if (fullvar) println[\" \\$fullvar = \\$running;\\n\"] fullvar = varname+exponent running = \"\" // println[\"Planet: \\$planet\\tvarno: \\$varno\\tvarname: \\$varname\\texponent: \\$exponent\\tname: \\$fullvar\"] } else { A = eval[substr[line, 79, 97]] B = eval[substr[line, 97, 111]] C = eval[substr[line, 111, 132]] if length[line] != 132 println[length[line]] // Remove lines with coefficients of 0.0 if (eval[A] != 0.0) { running = \"\\$A * cos[\\$B + \\$C * tau]\" + (firstline ? \"\" : \" +\\n \") + running firstline = false } } } println[\"\"\" \\$fullvar = \\$running; L = ((L0 + L1 tau + L2 tau^2 + L3 tau^3 + L4 tau^4 + L5 tau^5) radians) mod circle B = ((B0 + B1 tau + B2 tau^2 + B3 tau^3 + B4 tau^4 + B5 tau^5) radians) mod circle R = (R0 + R1 tau + R2 tau^2 + R3 tau^3 + R4 tau^4 + R5 tau^5) au return [L, B, R] }\"\"\"] } ```\n\nThis is a program written in the programming language Frink.\nFor more information, view the Frink Documentation or see More Sample Frink Programs.\n\nAlan Eliasen was born 18659 days, 14 hours, 27 minutes ago."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.642119,"math_prob":0.84478486,"size":2770,"snap":"2020-34-2020-40","text_gpt3_token_len":865,"char_repetition_ratio":0.099060014,"word_repetition_ratio":0.017699115,"special_character_ratio":0.34079424,"punctuation_ratio":0.13765182,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970087,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-20T14:20:48Z\",\"WARC-Record-ID\":\"<urn:uuid:75da962e-d3c7-4a6d-a78b-22a0f0adad56>\",\"Content-Length\":\"9610\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cec3c7f3-f0a3-499d-9ec7-002950f2d63b>\",\"WARC-Concurrent-To\":\"<urn:uuid:d86c2c5a-95d5-4696-a1a3-b5a654a2d784>\",\"WARC-IP-Address\":\"97.118.53.111\",\"WARC-Target-URI\":\"https://futureboy.us/fsp/colorize.fsp?f=vsop87.frink\",\"WARC-Payload-Digest\":\"sha1:NNIUD5NZ53EKHAIPCCZVTCKG5QG4FXJR\",\"WARC-Block-Digest\":\"sha1:SN5IOASNDQNBGPF2TLSUPRGOI6I3DT7D\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400198213.25_warc_CC-MAIN-20200920125718-20200920155718-00529.warc.gz\"}"} |
https://www.educationquizzes.com/us/middle-school-6th-7th-and-8th-grade/math/triangles-and-angles/ | [
"",
null,
"Do you like triangles?\n\n# Triangles and Angles\n\nThis Math quiz is called 'Triangles and Angles' and it has been written by teachers to help you if you are studying the subject at middle school. Playing educational quizzes is a fabulous way to learn if you are in the 6th, 7th or 8th grade - aged 11 to 14.\n\nIt costs only \\$12.50 per month to play this quiz and over 3,500 others that help you with your school work. You can subscribe on the page at Join Us\n\nA triangle is a geometric form created by connecting three straight lines. Where each line connects or intersects you get an angle. A triangle will have three angles.\n\nAn angle is measured in degrees (°). The degree of an angle runs between 0° and 180°.\n\nBoth triangles and angles are classified into three different types: acute, right and obtuse\n\nTRIANGLES:\n\nAn acute triangle is a triangle where all three angles measure less than 90°.\nExample: Angle A is 47°, Angle B is 39°, and Angle C is 12°\n\nA right triangle is a triangle where at least one of the angles measures exactly 90°.\nExample: Angle A is 68°, Angle B is 51°, and Angle C is 90°\n\nAn obtuse triangle is a triangle where at least one of the angles measures more than 90°.\nExample: Angle A is 22°, Angle B is 138°, and Angle C is 44°\n\nANGLES:\n\nAn acute angle is an angle that measures less than 90°.\nA right angle is an angle that measures exactly 90°.\nAn obtuse angle is an angle that measures more than 90°.\n\nHow to find the missing degree of an angle in a triangle is easy. You need to subtract the known from the sum of the three angles. If Angle A is 92° and Angle B is 31° what would Angle C be? You simply start with Angle A and subtract Angle B to get Angle C as follows:\n\n92° - 31° = 61°\n\nAngle C is 61° - correct? Well, not exactly because, remember, we are measuring the degree of an angle of a triangle. The three angles of a triangle must always be equal to a total of 180° (the sum of all three angles). So we need to first add together the known angles, here it is 92° and 31° and then we subtract that answer from the total of 180° as follows:\n\n92° + 31° = 123°\n180° - 123° = 57°\n92° + 31° + 57° = 180°\nAngle C = 57°\n\n1.\nWhat type of a triangle do you have if Angle A is 28°, Angle B is 62°, and Angle C is 90°?\nRight\nAcute\nObtuse\nStraight\nWhen at least one angle measures exactly 90°, it is a right triangle. Answer (a) is correct\n2.\nIf Angle A is 68° and Angle B is 22°, what type of an angle would Angle C be?\nAcute\nRight\nStraight\nObtuse\n68° + 22° = 90°\n180° - 90° = 90°\nAngle C is 90° making it a right angle so Answer (b) is the correct answer\n3.\nIf Angle A is 49° and Angle B is 27°, what type of an angle would Angle C be?\nObtuse\nRight\nAcute\nStraight\n49° + 27° = 76°\n180° - 76° = 104°\nAngle C is 104° and because it is greater than 90° it is an obtuse. Answer (a) is the correct answer\n4.\nWhat type of triangle do you have if Angle A is 13°, Angle B is 45°, and Angle C is 122°?\nStraight\nObtuse\nRight\nAcute\nWhen at least one angle is more than 90°, it is an obtuse triangle. Answer (b) is correct\n5.\nWhat type of a triangle do you have if Angle A is 56°, Angle B is 111°, and Angle C is 13°?\nStraight\nRight\nAcute\nObtuse\nWhen at least one angle is more than 90°, it is an obtuse triangle. Answer (d) is correct\n6.\nWhat type of a triangle do you have if Angle A is 77°, Angle B is 82°, and Angle C is 21°?\nAcute\nRight\nObtuse\nStraight\nWhen all three angles are less than 90°, it is an acute triangle. Answer (a) is correct\n7.\nWhat is Angle C of a triangle if Angle A is 67° and Angle B is 59°?\n126°\n54°\n113°\n121°\n67° + 59° = 126°\n180° - 126° = 54°\n67 + 59 + 54 = 180°\nAngle C is 54° so Answer (b) is correct\n8.\nIf Angle A is 60° and Angle B is 45°, what type of an angle would Angle C be?\nStraight\nObtuse\nAcute\nRight\n60° + 45° = 105°\n180° - 105° = 75°\nAngle C is 75° and because it is less than 90° it makes it an acute angle. Answer (c) is the correct answer\n9.\nWhat is Angle C if Angle A is 33° and Angle B is 17°?\n147°\n163°\n50°\n130°\n33° + 17° = 50°\n180° - 50° = 130°\n10.\nIf Angle A is 72° and Angle B is 33°, what type of an angle would Angle C be in a triangle?\nRight\nStraight\nObtuse\nAcute\n72° + 33° = 105°\n180° - 105° = 75°\nAngle C is 75° and because it is less than 90° it is an acute angle. Answer (d) is the correct answer\nAuthor: Christine G. Broome"
]
| [
null,
"https://www.educationquizzes.com/library/America/Grade-6-Math/6-math-triangle-1.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.93857604,"math_prob":0.9920343,"size":2091,"snap":"2020-34-2020-40","text_gpt3_token_len":564,"char_repetition_ratio":0.18303785,"word_repetition_ratio":0.06746988,"special_character_ratio":0.2945959,"punctuation_ratio":0.093333334,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99987423,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-14T19:45:27Z\",\"WARC-Record-ID\":\"<urn:uuid:d6ddd0d6-6590-48e4-8b0b-20235e04594a>\",\"Content-Length\":\"39980\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a5c11cd9-2233-41e6-af26-abcd901fe034>\",\"WARC-Concurrent-To\":\"<urn:uuid:1978b02f-5ee9-4463-8df9-499fe2af6e5e>\",\"WARC-IP-Address\":\"78.137.117.241\",\"WARC-Target-URI\":\"https://www.educationquizzes.com/us/middle-school-6th-7th-and-8th-grade/math/triangles-and-angles/\",\"WARC-Payload-Digest\":\"sha1:BUKJ3UFBSZ436JGONSPVLHWYJK627GLH\",\"WARC-Block-Digest\":\"sha1:YEKZFWLUTVRQ6FWPXOD2UFZU35IMBWF4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439739370.8_warc_CC-MAIN-20200814190500-20200814220500-00252.warc.gz\"}"} |
https://kitchingroup.cheme.cmu.edu/blog/2018/11/05/Using-autograd-for-error-propagation/ | [
"## Using autograd for error propagation\n\n| categories: | tags:\n\nBack in 2013 I wrote about using the uncertainties package to propagate uncertainties. The problem setup was for finding the uncertainty in the exit concentration from a CSTR when there are uncertainties in the other parameters. In this problem we were given this information about the parameters and their uncertainties.\n\nParameter value σ\nFa0 5 0.05\nv0 10 0.1\nV 66000 100\nk 3 0.2\n\nThe exit concentration is found by solving this equation:\n\n$$0 = Fa0 - v0 * Ca - k * Ca**2 * V$$\n\nSo the question was what is Ca, and what is the uncertainty on it? Finding Ca is easy with fsolve.\n\nfrom scipy.optimize import fsolve\n\nFa0 = 5.0\nv0 = 10.0\n\nV = 66000.0\nk = 3.0\n\ndef func(Ca, v0, k, Fa0, V):\n\"Mole balance for a CSTR. Solve this equation for func(Ca)=0\"\nFa = v0 * Ca # exit molar flow of A\nra = -k * Ca**2 # rate of reaction of A L/mol/h\nreturn Fa0 - Fa + V * ra\n\nCa, = fsolve(func, 0.1 * Fa0 / v0, args=(v0, k, Fa0, V))\nCa\n\n0.0050000000000000001\n\n\n\nThe uncertainty on Ca is a little trickier. A simplified way to estimate it is:\n\n$$\\sigma_{Ca} = \\sqrt{(dCa/dv0)^2 \\sigma_{v0}^2 + (dCa/dv0)^2 \\sigma_{v0}^2 + (dCa/dFa0)^2 \\sigma_{Fa0}^2 + (dCa/dV)^2 \\sigma_{V}^2}$$\n\nWe know the σ_i for each input, we just need those partial derivatives. However, we only have the implicit function we used to solve for Ca, and I do not want to do the algebra to solve for Ca. Luckily, we previously worked out how to get these derivatives from an implicit function using autograd. We just need to loop through the arguments, get the relevant derivatives, and accumulate the product of the squared derivatives and errors. Finally, take the square root of that sum.\n\nimport autograd.numpy as np\n\n# these are the uncertainties on the inputs\ns = [None, 0.1, 0.2, 0.05, 100]\n\nS2 = 0.0\n\nfor i in range(1, 5):\ndCadarg2 = -dfdarg2(Ca, v0, k, Fa0, V) / dfdCa(Ca, v0, k, Fa0, V)\n\nCa_s = np.sqrt(S2)\nprint(f'Ca = {Ca:1.5f} +\\- {Ca_s}')\n\nCa = 0.00500 +\\- 0.00016776432898276802\n\n\n\nThat is the same uncertainty estimate the quantities package provided. One benefit here is I did not have to do the somewhat complicated wrapping procedure around fsolve that was required with uncertainties to get this. On the other hand, I did have to derive the formula and implement them. It worked fine here, since we have an implicit function and a way to get the required derivatives. It could take some work to do this with the exit concentration of a PFR, which requires an integrator. Maybe that differentiable integrator will come in handy again!"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.86549187,"math_prob":0.9948993,"size":2823,"snap":"2023-40-2023-50","text_gpt3_token_len":855,"char_repetition_ratio":0.11174175,"word_repetition_ratio":0.0,"special_character_ratio":0.3244775,"punctuation_ratio":0.1442786,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99692535,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-28T04:58:53Z\",\"WARC-Record-ID\":\"<urn:uuid:06d36176-d773-4ab9-81f5-52e9a5a04b79>\",\"Content-Length\":\"15992\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a1443d76-464b-418c-a787-fd3b0e36f5ee>\",\"WARC-Concurrent-To\":\"<urn:uuid:21a20d0b-4360-4273-b605-e952705394c2>\",\"WARC-IP-Address\":\"185.199.109.153\",\"WARC-Target-URI\":\"https://kitchingroup.cheme.cmu.edu/blog/2018/11/05/Using-autograd-for-error-propagation/\",\"WARC-Payload-Digest\":\"sha1:Z7TQCT7KYX4DSEJKQUOO7YQVCT7USJDL\",\"WARC-Block-Digest\":\"sha1:7GBTQPGKJ7B2HGCTBHI4US4IBE2FIXZ4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510358.68_warc_CC-MAIN-20230928031105-20230928061105-00582.warc.gz\"}"} |
https://www.merriam-webster.com/dictionary/Pythagorean%20theorem | [
"# Pythagorean theorem\n\nnoun\n\n## Definition of Pythagorean theorem\n\n: a theorem in geometry: the square of the length of the hypotenuse of a right triangle equals the sum of the squares of the lengths of the other two sides\n\n## First Known Use of Pythagorean theorem\n\n1743, in the meaning defined above\n\nKeep scrolling for more\n\nShare Pythagorean theorem\n\nResources for Pythagorean theorem\n\n## Statistics for Pythagorean theorem\n\nLook-up Popularity\n\nTime Traveler for Pythagorean theorem\n\n## The first known use of Pythagorean theorem was in 1743\n\nSee more words from the same year\n\nComments on Pythagorean theorem\n\nWhat made you want to look up Pythagorean theorem? Please tell us where you read or heard it (including the quote, if possible).\n\n#### WORD OF THE DAY\n\none from the Upper Peninsula of Michigan\n\nGet Word of the Day daily email!\n\n#### Test Your Vocabulary\n\nMusical Words Quiz\n\n•",
null,
"• Which word describes a musical performance marked by the absence of instrumental accompaniment?",
null,
"Test your vocabulary with our 10-question quiz!\n\nTAKE THE QUIZ",
null,
"Test Your Knowledge - and learn some interesting things along the way.\n\nTAKE THE QUIZ\nLove words? Need even more definitions?\n\nSubscribe to America's largest dictionary and get thousands more definitions and advanced search—ad free!\n\nWords at Play"
]
| [
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null,
"data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7687868,"math_prob":0.60135764,"size":1075,"snap":"2019-35-2019-39","text_gpt3_token_len":266,"char_repetition_ratio":0.12231559,"word_repetition_ratio":0.0,"special_character_ratio":0.20930232,"punctuation_ratio":0.07526882,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97362316,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-16T07:31:50Z\",\"WARC-Record-ID\":\"<urn:uuid:f011fadc-0b79-4bf2-b84a-16835701a4f3>\",\"Content-Length\":\"68032\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4851fcc3-05b5-48a2-ab1b-4a7304efdff4>\",\"WARC-Concurrent-To\":\"<urn:uuid:e2423349-a250-4264-85ca-b194e9252b67>\",\"WARC-IP-Address\":\"99.84.181.117\",\"WARC-Target-URI\":\"https://www.merriam-webster.com/dictionary/Pythagorean%20theorem\",\"WARC-Payload-Digest\":\"sha1:Y3XJBZ6SPZ4H3CDIIFEM2OKLLS4KJ6XF\",\"WARC-Block-Digest\":\"sha1:CNDAP5YZMQTTLD7KDTJ24P5YLROHBZ43\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514572491.38_warc_CC-MAIN-20190916060046-20190916082046-00445.warc.gz\"}"} |
http://cpr-mathph.blogspot.com/2012/09/11102004-joe-watkins.html | [
"Spectral zeta functions of a 1D Schrödinger problem [PDF]\n\nJoe Watkins\nWe study the spectral zeta functions associated to the radial Schr\\\"odinger problem with potential V(x)=x^{2M}+alpha x^{M-1}+(lambda^2-1/4)/x^2. Using the quantum Wronskian equation, we provide results such as closed-form evaluations for some of the second zeta functions i.e. the sum over the inverse eigenvalues squared. Also we discuss how our results can be used to derive relationships and identities involving special functions, using a particular 5F_4 hypergeometric series as an example. Our work is then extended to a class of related PT-symmetric eigenvalue problems. Using the fused quantum Wronskian we give a simple method for calculating the related spectral zeta functions. This method has a number of applications including the use of the ODE/IM correspondence to compute the (vacuum) nonlocal integrals of motion G_n which appear in an associated integrable quantum field theory.\nView original: http://arxiv.org/abs/1110.2004"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7977123,"math_prob":0.9881215,"size":1006,"snap":"2019-43-2019-47","text_gpt3_token_len":236,"char_repetition_ratio":0.10678643,"word_repetition_ratio":0.0,"special_character_ratio":0.21570577,"punctuation_ratio":0.08743169,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9931098,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-16T17:05:32Z\",\"WARC-Record-ID\":\"<urn:uuid:dfa698e7-dde1-417d-8d98-de072d8be297>\",\"Content-Length\":\"201648\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4665fa29-2eba-4673-b8fa-1dce7d147f56>\",\"WARC-Concurrent-To\":\"<urn:uuid:fe0507d0-91ce-40b9-9ea8-e02fb01a5ec0>\",\"WARC-IP-Address\":\"172.217.7.193\",\"WARC-Target-URI\":\"http://cpr-mathph.blogspot.com/2012/09/11102004-joe-watkins.html\",\"WARC-Payload-Digest\":\"sha1:35XUMBDVJ3O4CCFLUWMAEX5XCK27OZPU\",\"WARC-Block-Digest\":\"sha1:XXWT74UNVYBHREUCHXD2NNJ7HAKSQH62\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986669057.0_warc_CC-MAIN-20191016163146-20191016190646-00460.warc.gz\"}"} |
http://macoopenlife.com/properties-of-whole-numbers-worksheets/long-multiplication-worksheets-numbers-1-multiplying-and-dividing-whole-worksheet-properties-of-real-algebra/ | [
"Home > worksheet > properties of whole numbers worksheets > Long Multiplication Worksheets Numbers 1 Multiplying And Dividing Whole Worksheet Properties Of Real Algebra\n\n# Long Multiplication Worksheets Numbers 1 Multiplying And Dividing Whole Worksheet Properties Of Real Algebra",
null,
"long multiplication worksheets numbers 1 multiplying and dividing whole worksheet properties of real algebra."
]
| [
null,
"http://macoopenlife.com/wp-content/uploads/2019/07/long-multiplication-worksheets-numbers-1-multiplying-and-dividing-whole-worksheet-properties-of-real-algebra.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7176228,"math_prob":0.812931,"size":1040,"snap":"2019-26-2019-30","text_gpt3_token_len":178,"char_repetition_ratio":0.2837838,"word_repetition_ratio":0.01438849,"special_character_ratio":0.15961538,"punctuation_ratio":0.06748466,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95555717,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-19T04:20:38Z\",\"WARC-Record-ID\":\"<urn:uuid:26e271e5-30bb-4e3a-a6df-b29a3939c6f3>\",\"Content-Length\":\"41720\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:923c44c3-0b1c-4f55-bab8-9ab748b36da1>\",\"WARC-Concurrent-To\":\"<urn:uuid:8bb9c3a0-ee82-4b54-a351-2f296943cced>\",\"WARC-IP-Address\":\"104.27.187.229\",\"WARC-Target-URI\":\"http://macoopenlife.com/properties-of-whole-numbers-worksheets/long-multiplication-worksheets-numbers-1-multiplying-and-dividing-whole-worksheet-properties-of-real-algebra/\",\"WARC-Payload-Digest\":\"sha1:WDJ435MZI43YJMAE2C5B6WZFOGYPTO6N\",\"WARC-Block-Digest\":\"sha1:KKHSWYWODT6IHWOBM745OTAX5CWOTK5X\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525974.74_warc_CC-MAIN-20190719032721-20190719054721-00180.warc.gz\"}"} |
https://blog.flyingcoloursmaths.co.uk/revisiting-missing-solutions/ | [
"“You know how you’re always putting things like ‘just to keep @RealityMinus3 happy’ in your posts?”\n\n“Of course, sensei!”\n\n“Well… you remember that post about missing solutions in a trig problem?”\n\n“Ut-oh.”\n\nWhat follows is a guest post by Elizabeth A. Williams, who is @RealityMinus3 in real life.\n\nThis thing about “infinite denominators”: I solidly feel that this is not the way to think about it, and it’s not what I would encourage a new-material student to do, because “infinite denominators” are an effect (usually, perhaps always?) of dividing by zero, and the thing to do is to think about not dividing by zero.\n\nInfinity is a slippery bastard, full of contradictions. Even an army of staple guns has trouble pinning that biter down. It’s not even just one biter! Night. Mare. Also, it’s good (nay, necessary) practice in general to think about what a function will and will not allow; that, in a direct approach, should always be in the forefront of a mathematician’s mind.\n\nWhen I sit down with an equation — in its initial state — one of the first things I consider is whether there are values that the variable cannot take. For example:\n\n• even-root-taking of a negative quantity;\n• arguments of functions invalid (eg logs);\n• division by zero;\n• etc.\n\nFirst off, I note that $0 \\le x \\le 2\\pi$ which is a “because I say so” restriction rather than “mathematics says no” - an Important Distinction, I think.\n\nThis equation, $2\\tan(2x) - 2\\cot(x)=0$, has tangent and cotangent in it, so I would list the values that are disowned by these functions. I reiterate that I am going by the original equation — which was my key ((I want to say “the key” because I think this approach is the clean and rigorous way of looking at it, but I’m not sure about shouldering an announced exclusive on that without agreement from elsewhere.)) to losing and then recovering those missing solutions.\n\nRight, so,\n\nThe $\\tan(2x)$ means $x$ cannot be $\\piby 4$, $\\frac{3}{4}\\pi$, $\\frac{5}{4}\\pi$, or $\\frac{7}{4}\\pi$. Also, $\\cot(x)$ means $x$ cannot be $0$, $\\pi$, or $2\\pi$.\n\nNow to trig algebra this to its grim death… I mean, and now to solve the equation.\n\nGoing via the double angle formula, $\\tan(2x)$ converts into an expression involving $\\tan(x)$. It is at this point that we lose the possibility of $x$ being $\\piby 2$ or $\\frac{3}{2}\\pi$. Bang!\n\nBang bang! Stop to make a note about that, right here in the algebra, to go back and check these excluded values in the original equation, just to make sure.\n\nIf we stay in tangent, then $\\piby 2$ and $\\frac{3}{2}\\pi$ will not re-appear as possibilities. Onwards, and we get $x = \\piby 6, \\frac{5}{6}\\pi, \\frac{7}{6}\\pi$, and $\\frac{11}{6}\\pi$.\n\n(For interest, I said: $\\frac{2 \\tan (x)}{ 1 - \\tan^2 (x)} = \\cot(x)$ Then, because $\\cot(x) = \\frac{1}{ \\tan (x)}$, $2 \\tan^2 (x) = 1 - \\tan^2 (x)$ $3 \\tan^2 (x) = 1$ $\\tan (x) = \\pm\\frac{\\sqrt{3}}{ 3}$)\n\n(I note, out of an abundance of noting, that $1 - \\tan^2 (x)$ in the denominator of the double-angle tangent formula excludes $x$ from being $\\piby 4$ and so on in the very same way that $\\tan(2x)$’s $\\cos(2x)$ does.)\n\nCheck the missing $\\piby 2$ and $\\frac{3}{2}\\pi$ — they work — and viola (you heard me), six solutions.\n\nIf you go from plain tangents into sine and cosine though … Well. Colin. I cannot believe you allowed cosine to be a denominator without noting that this excludes $x$ from being $\\piby 2$ or $\\frac{3}{2}\\pi$. [Yes miss sorry miss - ed.] Similarly, rewriting cotangent means sine in the denominator, which leads to more excluded values.\n\nIn both cases, this should have already been picked up right at the start because tangent and cotangent domains. It’s just more obviously explicit (YOU HEARD ME) now.\n\nWhen one multiplies anything through by cosine-squared, whether it came from a denominator or not, one ought to be careful right here about whether one might be multiplying both sides by zero. Eek. In fact, I think you did implicitly multiply by zero, because cosine ends up in the numerator from this, where it ostensibly causes no domain issues at all. In effect, you’ve gone from tangent to cosine-on-top, and this forgives tangent’s restrictions.\n\nIt’s really interesting that $\\tan(2x)$ to $\\tan(x)$ lost bits, but then bumping up by cosine got them back again - but that might be another exploration beyond this post.\n\n(As an aside: note that the issue of multiplying both sides of a relation by a function rather than a hard number, or taking a function of both sides, or, or, or … is by no means simple, straightforward, novice-ranked territory.)\n\nIt’s excellent that you factor out a cosine instead of dividing both sides of the equation by cosine. That is good. You would lose the solutions again at this point if you did that. I am amused though! You’re careful to check solutions to the equation for cosine equaling zero; but it’s because of not being careful with zero earlier that got you here.\n\n### Further commentary\n\nI am horrified at “[fraction-expression = zero] This is only true when either the bottom goes to infinity (which it never does)…”. Aaaaaaaagh. No. Please. Fractions equal zero only when their numerators equal zero. If the limit of their denominators is unbounded as the variable goes to some number, the fraction as a whole might tend towards zero … but asymptotically. Mind the epsilon!\n\nAlso, it’s not as $x$ approaches $\\piby 2$ or $\\frac{3}{2}\\pi$ that the fraction is undefined: the fraction is very well defined for any of these values on the approach. It’s when $x$ equals these values that the problem arises.\n\nBut your key is right there in “meaning those values also warrant further investigation”. Bang bang!\n\nI’m not sure about your “Or does it?” section. $x$ being $\\piby 2$ works perfectly, and the emphasis here is “use the original equation”. It doesn’t sit poorly at all. I’m not sure about rewriting everything in cotangent being a fix for feeling better about the original, especially as $\\cot \\br{\\piby 2}$ equals 1, so that denominator there would be zero. [Good point, well made - ed.]"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.909233,"math_prob":0.99652237,"size":6118,"snap":"2023-40-2023-50","text_gpt3_token_len":1586,"char_repetition_ratio":0.10435067,"word_repetition_ratio":0.003842459,"special_character_ratio":0.26626348,"punctuation_ratio":0.11289031,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9956788,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-05T20:00:53Z\",\"WARC-Record-ID\":\"<urn:uuid:54a12035-2603-49fd-bf1c-44278e150879>\",\"Content-Length\":\"13194\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:29d66397-0e06-45be-a90e-7d403eb9e1ab>\",\"WARC-Concurrent-To\":\"<urn:uuid:da852209-6635-4c6b-8dd8-bbf19fc53cf2>\",\"WARC-IP-Address\":\"23.83.135.74\",\"WARC-Target-URI\":\"https://blog.flyingcoloursmaths.co.uk/revisiting-missing-solutions/\",\"WARC-Payload-Digest\":\"sha1:CKDQJCK552UTC6WSXCFVXDO34PS6SCBJ\",\"WARC-Block-Digest\":\"sha1:D6ABUN3X67YOA3F4OXBAD5ZOQVUXNDTH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100555.27_warc_CC-MAIN-20231205172745-20231205202745-00637.warc.gz\"}"} |
https://www.helpteaching.com/tests/1125272/calculating-density | [
"",
null,
"",
null,
"##### Print Instructions\n\nNOTE: Only your test content will print.\nTo preview this test, click on the File menu and select Print Preview.\n\nSee our guide on How To Change Browser Print Settings to customize headers and footers before printing.\n\nPrint Test (Only the test content will print)\n\n## Calculating Density\n\nInstructions: Perform the following density calculations.\n\n1.\nWhat is the density?\n\nMass = 44 g\nVolume = 44 mL\n1. 0 g/mL\n2. 44 g/mL\n3. 1 g/mL\n4. 11 g/mL\n\n2.\nWhat is the density?\n\nMass = 120 g\nVolume = 96 mL\n1. 1.52 g/mL\n2. 0.33 g/mL\n3. 1.20 g/mL\n4. 1.25 g/mL\n3.\nWhat is the density of a substance that has a mass of 20 g and volume of 10 mL?\n1. 0.5 g/mL\n2. 2.0 g/mL\n3. 10 g/mL\n4. 200 g/mL\n\n4.\nWhat is the density of an object that has a mass of 34 grams and a volume of 17 milliliters?\n1. 0.5 g/mL\n2. 51 g/mL\n3. 578 g/mL\n4. 2 g/mL\n5.\nWhat is the density of an object that has a mass of 92 grams and a volume of 40 milliliters?\n1. 52 g/mL\n2. 0.4 g/mL\n3. 2.3 g/mL\n4. 132 g/mL\n\n6.\nAiden found the mass of a rock to be 200 grams. He then found the volume of the rock to be 20 cubic centimeters. What is the density of the rock?\n1. .010 grams/cubic centimeter\n2. .10 grams/cubic centimeter\n3. 100 grams/cubic centimeter\n4. 10 grams/cubic centimeter\n7.\nGloria needs to find the density of a cube. Each side of the cube measures 3 cm and the mass of the cube is 12 g. What is the approximate density of the cube?\n1. $0.4 g//cm^3$\n2. $1.3 g//cm^3$\n3. $4.0 g//cm^3$\n\n8.\nStella's nephew has plastic blocks that he enjoys playing with. One of the blocks has a mass of 15 g and a volume of 5 mL. Find the density of the block.\n\n9.\nMaria's mom gave her an apple that has a mass of 90 g and a volume of 30 $\"cm\"^3$. What is the apple's density?\n\n10.\nI find a rock that has a volume of $15 cm^3$ and a mass of $45 g$. What is the density of the rock?\n\nYou need to be a HelpTeaching.com member to access free printables."
]
| [
null,
"https://www.facebook.com/tr",
null,
"https://assets.pinterest.com/images/pidgets/pin_it_button.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.81537014,"math_prob":0.9898839,"size":1890,"snap":"2019-26-2019-30","text_gpt3_token_len":617,"char_repetition_ratio":0.18875928,"word_repetition_ratio":0.15721649,"special_character_ratio":0.35978836,"punctuation_ratio":0.10822511,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9909139,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-16T14:06:07Z\",\"WARC-Record-ID\":\"<urn:uuid:2c575cf9-648d-4ea1-b39a-c486efb0a359>\",\"Content-Length\":\"36193\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c47450d6-18f5-4bed-be82-0a8f00e57d0e>\",\"WARC-Concurrent-To\":\"<urn:uuid:a8b86581-91b4-4b43-a679-6fbce5cdc9ad>\",\"WARC-IP-Address\":\"54.243.135.1\",\"WARC-Target-URI\":\"https://www.helpteaching.com/tests/1125272/calculating-density\",\"WARC-Payload-Digest\":\"sha1:DCSMAY26HWZIXBOC5I4QLZRVDVEHO3WR\",\"WARC-Block-Digest\":\"sha1:UXYDTXITTO2HDENZ4U5MEC7FDGYEG4QY\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195524568.14_warc_CC-MAIN-20190716135748-20190716161748-00036.warc.gz\"}"} |
https://www.dml.cz/handle/10338.dmlcz/104066 | [
"# Article\n\nKeywords:\ndiffusion; Bessel operator; periodic solutions; existence; weak solution\nSummary:\nIn this paper, the existence of an $\\omega$-periodic weak solution of a parabolic equation (1.1) with the boundary conditions (1.2) and (1.3) is proved. The real functions $f(t,r),h(t),a(t)$ are assumed to be $\\omega$-periodic in $t,f\\in L_2(S,H),a,h$ such that $a'\\in L_\\infty (R), h'\\in L_\\infty (R)$ and they fulfil (3). The solution $u$ belongs to the space $L_2(S,V)\\cap L_\\infty (S,H)$, has the derivative $u'\\in L_2(S,H)$ and satisfies the equations (4.1) and (4.2). In the proof the Faedo-Galerkin method is employed.\nReferences:\n R. S. Minasjan: On one problem of the periodic heat flow in the infinite cylinder. Dokl. Akad. Nauk Arm. SSR 48 (1969). MR 0241828\n H. Triebel: Höhere Analysis. VEB Berlin 1972. Zbl 0257.47001"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.77817976,"math_prob":0.99621075,"size":773,"snap":"2022-27-2022-33","text_gpt3_token_len":250,"char_repetition_ratio":0.12353706,"word_repetition_ratio":0.0,"special_character_ratio":0.3260026,"punctuation_ratio":0.20108695,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99855244,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-10T17:56:01Z\",\"WARC-Record-ID\":\"<urn:uuid:361239aa-d61a-4eeb-8f2e-f9b9f3c35810>\",\"Content-Length\":\"13550\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:284458ab-dc22-42eb-a64f-c3dfeb9a843e>\",\"WARC-Concurrent-To\":\"<urn:uuid:28a3461c-ba00-4483-a26c-e10149309420>\",\"WARC-IP-Address\":\"147.251.6.150\",\"WARC-Target-URI\":\"https://www.dml.cz/handle/10338.dmlcz/104066\",\"WARC-Payload-Digest\":\"sha1:R7BRUMEBCJGFHWBKZJIYPJOYZYRSINSU\",\"WARC-Block-Digest\":\"sha1:33BWEDX36RWP5MVQVYLGLKVRD5QNAEQP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571198.57_warc_CC-MAIN-20220810161541-20220810191541-00198.warc.gz\"}"} |
https://or.stackexchange.com/questions/tagged/regression?tab=Votes | [
"# Questions tagged [regression]\n\nThe tag has no usage guidance.\n\n4 questions\nFilter by\nSorted by\nTagged with\n91 views\n\n### Ridge Regression lagrange duality\n\nIn every machine learning book we see that it is roughly mentioned that the ridge regression: $$p_1^* = \\min\\limits_{\\beta} \\ \\left( \\mathrm{RSS} + \\lambda\\sum_{j=1}^p \\beta_j^2 \\right)$$ is ...\n81 views\n\n### Fast solvers for LASSO-type non-convex optimization problems\n\nGiven $y \\in \\mathbb{R}^{n \\times 1}, X \\in \\mathbb{R}^{n \\times p}$, $p > n$, assume a LASSO-type optimization problem in the form of \\hat\\beta=\\underset{\\beta}{\\operatorname{argmin}}\\frac{1}{2}..."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8448975,"math_prob":0.9962266,"size":1166,"snap":"2021-21-2021-25","text_gpt3_token_len":318,"char_repetition_ratio":0.103270225,"word_repetition_ratio":0.0,"special_character_ratio":0.26415095,"punctuation_ratio":0.09569378,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99899405,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-14T01:38:08Z\",\"WARC-Record-ID\":\"<urn:uuid:6e61f10f-a110-4632-b492-ee7da615a794>\",\"Content-Length\":\"130875\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8f3d9d5b-338f-452e-8717-257876bc2795>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a44567b-c8dc-40f9-b427-1a7643ec7a41>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://or.stackexchange.com/questions/tagged/regression?tab=Votes\",\"WARC-Payload-Digest\":\"sha1:LR5RT35YMRZOQQX537YD4FGLJKQIOXSV\",\"WARC-Block-Digest\":\"sha1:M4HY3DX64ZYUJMCNLW5ZNSDIGFNOYTYX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989616.38_warc_CC-MAIN-20210513234920-20210514024920-00184.warc.gz\"}"} |
https://uvsolutionsmag.com/articles/2021/treatment-of-dependent-and-independent-variables-in-the-usepa-guidance-manuals/ | [
"# Treatment of Dependent and Independent Variables in the USEPA Guidance Manuals\n\n###### Jim Bolton, Ph.D., president, Bolton Photosciences, Inc.\n\nIn 2006, the US Environmental Protection Agency (USEPA) issued the Long Term 2 Enhanced Surface Water Treatment Rules (LT2ESWTR) (USEPA 2006) and the Ultraviolet (UV) Disinfection Guidance Manual (UVDGM) (USEPA 2006b).\n\nIn 2020, the USEPA issued an additional guidance document titled “Innovative Approaches for Validation of Ultraviolet Disinfection Reactors for Drinking Water Systems” (Innovative Approaches) (USEPA 2020). These documents serve as the basis for regulating UV disinfection treatment in drinking water treatment plants throughout the US and many other parts of the world.\n\nThe regulations are based on specifying minimum UV doses (given in the LT2ESWTR) for the inactivation of Cryptosporidium, Giardia and other viruses. The guidance manuals (UVDGM and Innovative Approaches) then specify how a UV disinfection reactor must be validated by biodosimetry to deliver the minimum UV doses.\n\nIn the “calculated dose approach,” the biodosimetry process involves challenging the UV reactor with a surrogate microorganism (usually MS2 coliphage) and determining the log inactivation [log(I) = log(N0/N), where N0 is the number of viable microorganisms in the influent and N is the number in the effluent)] for a matrix of ultraviolet transmittance (UVT) and flow rates. At the same time, a sample of the influent water is subjected to a collimated beam test where the UV dose-response curve is determined for the challenge microorganism (e.g., MS2), which consists of a series of experimental log reductions for a range of UV doses. Table 1 gives an example of the data for a typical UV dose-response curve.\n\nAt this point, one must determine the independent and dependent variables. To make this choice, one must realize that the statistics that are used to analyze a set of x, y data are based on the assumption that one set of variables is essentially error free and the other set of variables carries almost all of the experimental error.\n\nIn this case, clearly the UV dose is the most accurate. Thus it is logical to assume that the UV dose is the independent variable (usually designated as x), thus the log (I) becomes the dependent variable (usually designated as y).\n\nThe next step is to choose a fitting function for a regression analysis. In this case, it appears that a quadratic function forced through zero is best. Figure 1 shows a plot of the log (I) vs. UV dose and the fitted regression function.\n\nThe procedure for the determination of the Reduction Equivalent Dose (RED) involves calculating the log (I) from each pair of influent and effluent samples in the flow-through UV rector tests. Each log (I) then must be matched against the UV dose-response curve from the collimated beam tests (Figure 1).",
null,
"Figure 2. Regression analysis of the collimated beam data assuming log (I) is the independent variable and UV dose is the dependent variable\n\nThe UVDGM and the Innovative Approaches guidance documents each recommend the collimated beam data (Table 1) be plotted as UV dose vs. log (I) (Figure 2).\n\nThe regression equation then can be used to obtain UV doses for each log (I) from the flow-through results. However, there is a problem with this approach. As seen in Figure 2, the errors are in the log (I) variable. Thus, it is not valid to carry out a regression analysis in this manner.\n\nOne must realize there is only one valid regression analysis that will satisfy the error requirements for the selection of the independent and dependent variables. Returning to Figure 1, the unique quadratic fit equation can be rearranged from\n\nlog(I) = ax2 + bx (1a)\n\nto\n\nax2 + bx – log(I) = 0 (1b)\n\nwhere x = UV dose.\n\nThe solution to Equation 1b is\n\nAlternatively, one could compute log(I) from Equation 1 for a wide range of closely spaced x values and estimate log(I) for a given x value by linear interpolation.\n\nTo illustrate the systematic errors that are introduced by using the (incorrect) USEPA method, Table 2 shows the comparison between the two methods, that is:\n\nProper statistical method – obtain log(I) values from Equation 1c or from a table of UV doses vs. log(I)\n\nUSEPA method – plot UV dose vs. log(I), and use the new regression equation to derive UV doses (REDs) for given log(I) values\n\nNote that a negative error is conservative in that the USEPA method would underestimate the RED. The percent errors in Table 2 would carry through to the calculation of the validated UV dose.\n\nNote also that this example is a specific data set for MS2. The errors may be quite different for other data sets and other microorganisms.\n\nThe systematic errors shown in Table 2 are significant. It is true that these systematic errors are comparable to the random errors found in biodosimetry measurement, but why introduce unnecessary systematic errors arising from an erroneous method?\n\nIn conclusion, it is recommended that an addendum be added to the USEPA guidance documents to recommend changes to the method used to estimate the UV dose from collimated beam data.\n\nContact: Jim Bolton, [email protected]\n\n### References\n\nUSEPA 2006. Ultraviolet Disinfection Guidance Manual for the Final Long Term 2 Enhanced Surface Water Treatment Rule[Online]. Available: https://nepis.epa.gov/Exe/ZyPDF.cgi?Dockey=600006T3.txt.\n\nUSEPA. 2020. Innovative Approaches for Validation of Ultraviolet Disinfection Reactors for Drinking Water Systems. https://cfpub.epa.gov/si/si_public_record_report.cfm?Lab=NRMRL&direntryid=328890"
]
| [
null,
"https://uvsolutionsmag.com/wp-content/uploads/Figure-2-2021-q2-300x218.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.882345,"math_prob":0.88321334,"size":5330,"snap":"2022-27-2022-33","text_gpt3_token_len":1209,"char_repetition_ratio":0.1126549,"word_repetition_ratio":0.025974026,"special_character_ratio":0.21181989,"punctuation_ratio":0.0927835,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9777803,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-03T03:12:05Z\",\"WARC-Record-ID\":\"<urn:uuid:dc02a503-76f5-461e-ac51-9edc50c80d18>\",\"Content-Length\":\"189768\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6e791d4e-dba1-4890-b556-a286b1c9890c>\",\"WARC-Concurrent-To\":\"<urn:uuid:26b18e3d-7857-4b18-96af-231ff78c16b4>\",\"WARC-IP-Address\":\"172.67.129.170\",\"WARC-Target-URI\":\"https://uvsolutionsmag.com/articles/2021/treatment-of-dependent-and-independent-variables-in-the-usepa-guidance-manuals/\",\"WARC-Payload-Digest\":\"sha1:6WBY6PWDTBDOVNV75UBTBCS66YF77CLY\",\"WARC-Block-Digest\":\"sha1:DEGNRSMJCPMCWRHTHCTMXNTEEUZHNCNV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104209449.64_warc_CC-MAIN-20220703013155-20220703043155-00634.warc.gz\"}"} |
https://www.lmfdb.org/L/4/1/1.1/r0e4/m0.82m8.13m14.59p23.54/0 | [
"# Properties\n\n Label 4-1-1.1-r0e4-m0.82m8.13m14.59p23.54-0 Degree $4$ Conductor $1$ Sign $1$ Analytic cond. $1.07364$ Root an. cond. $1.01792$ Arithmetic no Rational no Primitive yes Self-dual no Analytic rank $0$\n\n# Related objects\n\n## Dirichlet series\n\n L(s) = 1 + (−0.679 + 0.434i)2-s + (0.572 − 0.610i)3-s + (−0.128 − 0.591i)4-s + (−0.117 − 0.0119i)5-s + (−0.124 + 0.663i)6-s + (0.953 − 0.364i)7-s + (−0.0628 − 0.263i)8-s + (−0.241 − 0.699i)9-s + (0.0850 − 0.0428i)10-s + (−0.524 − 0.247i)11-s + (−0.434 − 0.260i)12-s + (−0.317 + 0.138i)13-s + (−0.489 + 0.662i)14-s + (−0.0745 + 0.0647i)15-s + (−0.140 + 0.388i)16-s + (0.596 + 0.309i)17-s + ⋯\n\n## Functional equation\n\n\\begin{aligned}\\Lambda(s)=\\mathstrut &\\Gamma_{\\R}(s+23.5i) \\, \\Gamma_{\\R}(s-0.822i) \\, \\Gamma_{\\R}(s-8.12i) \\, \\Gamma_{\\R}(s-14.5i) \\, L(s)\\cr=\\mathstrut & \\,\\overline{\\Lambda}(1-s)\\end{aligned}\n\n## Invariants\n\n Degree: $$4$$ Conductor: $$1$$ Sign: $1$ Analytic conductor: $$1.07364$$ Root analytic conductor: $$1.01792$$ Rational: no Arithmetic: no Primitive: yes Self-dual: no Selberg data: $$(4,\\ 1,\\ (23.5430066352i, -0.822180974528i, -8.12585455838i, -14.59497110224i:\\ ),\\ 1)$$\n\n## Euler product\n\n$$L(s) = \\displaystyle\\prod_p \\ \\prod_{j=1}^{4} (1 - \\alpha_{j,p}\\, p^{-s})^{-1}$$\n\n## Imaginary part of the first few zeros on the critical line\n\n−21.37532528, −20.26415920, −18.54570547, −17.26088332, −15.43215124, −14.07956742, −11.99956019, −10.51519076, −8.97047993, −7.97719801, −4.86505332, −2.60944945, 17.83304504, 19.27632994, 21.05750458, 23.44783889, 24.38990213\n\n## Graph of the $Z$-function along the critical line",
null,
"The first positive critical zero of this L-function, at height approximately 17.833, is higher than any other L-function of conductor 1 and signature (0,0,0,0;). The first negative zero is at height approximately −2.609 and there are several other degree 4 L-functions with a larger gap between zeros."
]
| [
null,
"https://www.lmfdb.org/L/Plot/4/1/1.1/r0e4/m0.82m8.13m14.59p23.54/0",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6134929,"math_prob":0.9994444,"size":1667,"snap":"2023-14-2023-23","text_gpt3_token_len":755,"char_repetition_ratio":0.11966326,"word_repetition_ratio":0.0,"special_character_ratio":0.61127776,"punctuation_ratio":0.2652068,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994537,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-05T19:21:21Z\",\"WARC-Record-ID\":\"<urn:uuid:52d70bde-8ada-4f17-b9ae-ac5f1c246f6a>\",\"Content-Length\":\"19719\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:063e8cf6-5af6-466b-9408-43729b5599d2>\",\"WARC-Concurrent-To\":\"<urn:uuid:f03bbdae-bde1-4ad8-afd4-12d94e2a76b7>\",\"WARC-IP-Address\":\"35.241.19.59\",\"WARC-Target-URI\":\"https://www.lmfdb.org/L/4/1/1.1/r0e4/m0.82m8.13m14.59p23.54/0\",\"WARC-Payload-Digest\":\"sha1:WLP2CNQCFU2PBPE2LELVMO3MNK6D4A3P\",\"WARC-Block-Digest\":\"sha1:WM7TYQ5FS6MR5XGHVQVL7NUADG7HSIGA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224652161.52_warc_CC-MAIN-20230605185809-20230605215809-00653.warc.gz\"}"} |
https://docs.h2o.ai/h2o/latest-stable/h2o-docs/save-and-load-model.html | [
"## Binary Models¶\n\nWhen saving an H2O binary model with h2o.saveModel (R), h2o.save_model (Python), or in Flow, you will only be able to load and use that saved binary model with the same version of H2O that you used to train your model. H2O binary models are not compatible across H2O versions. If you update your H2O version, then you will need to retrain your model. For production, you can save your model as a POJO/MOJO. These artifacts are not tied to a particular version of H2O because they are just plain Java code and do not require an H2O cluster to be running.\n\n### In R and Python¶\n\nIn R and Python, you can save a model locally or to HDFS using the h2o.saveModel (R) or h2o.save_model (Python) function . This function accepts the model object and the file path. If no path is specified, then the model will be saved to the current working directory. After the model is saved, you can load it using the h2o.loadModel (R) or h2o.load_model (Python) function. You can also upload a model from a local path to your H2O cluster.\n\nNotes:\n\n• When saving a file, the owner of the file saved is the user by which H2O cluster or Python/R session was executed.\n\n• When downloading a file, the owner of the file saved is the user by which the Python/R session was executed.\n\n# build the model\nmodel <- h2o.deeplearning(params)\n\n# save the model\nmodel_path <- h2o.saveModel(object = model, path = getwd(), force = TRUE)\nprint(model_path)\n/tmp/mymodel/DeepLearning_model_R_1441838096933\n\n# upload the model that you just downloded above\n# to the H2O cluster\n\n# build the model\nmodel = H2ODeepLearningEstimator(params)\nmodel.train(params)\n\n# save the model\nmodel_path = h2o.save_model(model=model, path=\"/tmp/mymodel\", force=True)\nprint model_path\n/tmp/mymodel/DeepLearning_model_python_1441838096933\n\n# upload the model that you just downloded above\n# to the H2O cluster\n\n\nNote: When saving to HDFS, you must prepend the save directory with hdfs://. For example:\n\n# build the model\nmodel <- h2o.glm(model params)\n\n# save the model to HDFS\nhdfs_name_node <- \"node-1\"\nhdfs_tmp_dir <- \"/tmp/runit\"\nmodel_path <- sprintf(\"hdfs://%s%s\", hdfs_name_node, hdfs_tmp_dir)\nh2o.saveModel(model, path = model_path, name = \"mymodel\")\n\n# build the model\nh2o_glm = H2OGeneralizedLinearEstimator(model params)\nh2o_glm.train(training params)\n\n# save the model to HDFS\nhdfs_name_node = \"node-1\"\nhdfs_model_path = sprintf(\"hdfs://%s%s\", hdfs_name_node, hdfs_tmp_dir)\nnew_model_path = h2o.save_model(h2o_glm, \"hdfs://\" + hdfs_name_node + \"/\" + hdfs_model_path)\n\n\n### In Flow¶\n\nThe steps for saving and loading models in Flow are described in the Using Flow - H2O’s Web UI section. Specifically, refer to Exporting and Importing Models for information about exporting and importing binary models in Flow.\n\n## MOJO Models¶\n\n### Introduction¶\n\nThe MOJO import functionality provides a means to use external, pre-trained models in H2O - mainly for the purpose of scoring. Depending on each external model, metrics and other model information might be obtained as well. Currently, only selected H2O MOJOs are supported. (See the MOJO Quick Start section for information about creating MOJOs.)\n\n### Supported MOJOs¶\n\nNote: AutoML will always produce a model which has a MOJO. Though it depends on the run, you are most likely to get a Stacked Ensemble. While all models are importable, only individual models are exportable.\n\n### Saving and Importing MOJOs¶\n\nImporting a MOJO can be done from Python, R, and Flow. H2O imports the model and embraces it for the purpose of scoring. Information output about the model may be limited.\n\nNote: Your model will not produce MOJOs if you build it using interactions.\n\n#### Saving and Importing in R or Python¶\n\ndata <- h2o.importFile(path = 'training_dataset.csv')\ncols <- c(\"Some column\", \"Another column\")\noriginal_model <- h2o.glm(x = cols, y = \"response\", training_frame = data)\n\npath <- \"/path/to/model/directory\"\nmojo_destination <- h2o.save_mojo(original_model, path = path)\nimported_model <- h2o.import_mojo(mojo_destination)\n\nnew_observations <- h2o.importFile(path = 'new_observations.csv')\nh2o.predict(imported_model, new_observations)\n\ndata = h2o.import_file(path='training_dataset.csv')\noriginal_model = H2OGeneralizedLinearEstimator()\noriginal_model.train(x = [\"Some column\", \"Another column\"], y = \"response\", training_frame=data)\n\npath = '/path/to/model/directory/model.zip'\noriginal_model.save_mojo(path)\n\nimported_model = h2o.import_mojo(path)\nnew_observations = h2o.import_file(path='new_observations.csv')\npredictions = imported_model.predict(new_observations)\n\n\n#### Importing a MOJO Model in Flow¶\n\nTo import a MOJO model in Flow:\n\n1. Import or upload the MOJO as a Generic model into H2O. To do this, click on Data in the top menu and select either Import Files or Upload File.\n\n2. Retrieve the imported MOJO by clicking Models in the top menu and selecting Import MOJO Model.\n\nAlternatively, the download_mojo() and h2o.upload_mojo() R and Python functions can be used when downloading/uploading MOJOs from a client computer standing outside of an H2O cluster.\n\n# train a GBM model\nlibrary(h2o)\nh2o.init()\nfr <- as.h2o(iris)\nmy_model <- h2o.gbm(x = 1:4, y = 5, training_frame = fr)\n\n# save to the current working directory\n\n\nimport h2o\nh2o.init()\n\n# Train a GBM Model\nmodel.train(x=list(range(4)), y = \"class\", training_frame=df)\n\n\n\nIt is also possible to import a MOJO from already uploaded MOJO bytes using Generic model. Generic model is the underlying mechanism behind MOJO import. In this case, there is no need to re-upload the MOJO every time a new MOJO imported model is created. The upload can occur only once.\n\n#### Defining a Generic Model¶\n\nThe following options can be specified when using a Generic model:\n\n• model_id: Specify a custom name for the model to use as a reference.\n\n• model_key: Specify a key for the self-contained model archive.\n\n• path: Specify a path to the file with the self-contained model archive.\n\n#### Examples¶\n\ndata <- h2o.importFile(path = 'training_dataset.csv')\ncols <- c(\"Some column\", \"Another column\")\noriginal_model <- h2o.glm(x = cols, y = \"response\", training_frame = data)\n\npath <- \"/path/to/model/directory\"\n\n# Only import or upload MOJO model data, do not initialize the generic model yet\nimported_mojo_key <- h2o.importFile(mojo_destination, parse = FALSE)\n# Build the generic model later, when needed\ngeneric_model <- h2o.generic(model_key = imported_mojo_key)\n\nnew_observations <- h2o.importFile(path = 'new_observations.csv')\nh2o.predict(generic_model, new_observations)\n\ndata = h2o.import_file(path='training_dataset.csv')\noriginal_model = H2OGeneralizedLinearEstimator()\noriginal_model.train(x = [\"Some column\", \"Another column\"], y = \"response\", training_frame=data)\n\npath = '/path/to/model/directory/model.zip'"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6670309,"math_prob":0.83036613,"size":8543,"snap":"2023-40-2023-50","text_gpt3_token_len":2232,"char_repetition_ratio":0.15259399,"word_repetition_ratio":0.13628472,"special_character_ratio":0.24429357,"punctuation_ratio":0.13646056,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9871456,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-27T21:01:57Z\",\"WARC-Record-ID\":\"<urn:uuid:c26a8976-55a6-49bc-9702-b27f7c04edf5>\",\"Content-Length\":\"53881\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:56b3e506-9790-413f-be25-22a9f830f77d>\",\"WARC-Concurrent-To\":\"<urn:uuid:2fac6648-333f-4837-926a-adae92e84442>\",\"WARC-IP-Address\":\"13.248.182.153\",\"WARC-Target-URI\":\"https://docs.h2o.ai/h2o/latest-stable/h2o-docs/save-and-load-model.html\",\"WARC-Payload-Digest\":\"sha1:YILTPGAVIDNVVRYV33RYBD445MGAITVV\",\"WARC-Block-Digest\":\"sha1:FVHKIQWGGWO3WKCSLNEN4YLXQEX43UJV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510326.82_warc_CC-MAIN-20230927203115-20230927233115-00170.warc.gz\"}"} |
https://electrical4us.com/2021/01/18/what-is-magnetic-field-and-its-properties/ | [
"# Magnetic field | properties\n\n## What is a magnetic field?\n\nThe area around a magnet as far as its magnetic effect can be experienced. So it is called the magnetic field of that magnet. Or we can say that. That area where the magnet is able to influence its attraction power on some iron material. So it is called the magnetic field of that magnet.\n\n## What is the intensity of magnetic field and magnetic field?\n\nAn imaginary independent unit located at a point in an area experiences about the same force as the North Pole. It is called the intensity of the magnetic field at that point.\n\n## Magnetic force lines\n\nThe magnetic force line is the curved path. At which an independent unit can travel north pole.\n\n### Properties of magnetic force lines\n\n• The magnetic force lines exit the North Pole and enter the South Pole.\n• Two magnetic force lines never cross each other.\n• The magnetic force lines are dense.\n• The magnetic force lines resemble the elastic cord, which attempts to shrink.\n• A tangent drawn to a point of magnetic force lines represents its resultant at that point.\n\n### Properties of magnetic field lines\n\n• Magnetic field lines are continuous closed curves.\n• The closer the magnetic field lines are, the stronger the magnetic force lines.\n• The magnetic field lines never cut each other.\n• What is the unit of intensity of magnetic field?\n• The unit of intensity of the magnetic field is Newton / ampere-m (Tesla).\n\n## FAQs\n\nQ1:- What is the SI unit of intensity of magnetic field? Ans:- The SI unit of intensity of the magnetic field is Weber / m² or Tesla.\n\nQ2:- What is the dimensional formula for intensity of magnetic field?\nAns:- The dimensional formula for the intensity of the magnetic field is M¹L⁰T⁻²A⁻¹.\n\nQ3:- What is the amount of intensity of the magnetic field?\nAns:- Magnetic field intensity is a vector amount. And displaying it with B and its unit is Tesla.\n\nQ4:- What is the SI unit of magnetic force?\nAns:- The SI unit of magnetic force is (Newton × Second) / (Coulomb × Meter).\n\nQ5:- What is the SI unit of magnetic field?\nAns:- The SI unit of the magnetic field is ampere / meter.\n\nQ6:-What is the unit of magnetic induction?\nAns:- The SI unit of magnetic induction is Tesla and the CGS unit is Gauss.\n\nQ7:- What is the unit of magnetic flux?\nAns:- The SI unit of magnetic flux is Weber."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.90143883,"math_prob":0.977777,"size":2266,"snap":"2021-21-2021-25","text_gpt3_token_len":502,"char_repetition_ratio":0.27895668,"word_repetition_ratio":0.16176471,"special_character_ratio":0.2255075,"punctuation_ratio":0.11504425,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99026215,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-06T08:54:49Z\",\"WARC-Record-ID\":\"<urn:uuid:b9bee023-7731-44e4-9c36-14dd87961593>\",\"Content-Length\":\"133459\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0554b4f8-6335-4964-9a24-c8468eb30bf8>\",\"WARC-Concurrent-To\":\"<urn:uuid:933f7c53-3a92-4def-aeff-445b083806a5>\",\"WARC-IP-Address\":\"192.0.78.24\",\"WARC-Target-URI\":\"https://electrical4us.com/2021/01/18/what-is-magnetic-field-and-its-properties/\",\"WARC-Payload-Digest\":\"sha1:NZLENVL2KDGE5HRE2NDML6KVU5Q4DDRB\",\"WARC-Block-Digest\":\"sha1:CXAYBUNLZAILY43TCFD4Z6PYJ5WQ2UTW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243988753.91_warc_CC-MAIN-20210506083716-20210506113716-00329.warc.gz\"}"} |
https://www.compassinvestors.com/funds.php | [
"The Horizon™ computer model follows a 5-step process\n\n• The performance history for each investment choice is first divided into multiple time slices.\n• Next, the performance direction (up or down), degree (angle of movement) and the duration (elapsed time) in each time slice are evaluated.\n• A weighting is then applied to each time slice.\n• The sum of each of the performance time slice weightings are added together to produce the Score for the fund.\n• A Model Portfolio Allocation percentage amount is then determined for each choice based on the relative Scores of the other choices.\n•\n\nThe number of time slices, the weighting algorithms and the portfolio allocation percentages are the results of five years of extensive study by the Compass Institute.\n\nThey tested over 500,000 possible permutations of factors to come up with the correct combination that would provide the optimal results when applied to any combination of investment choices."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.90772617,"math_prob":0.9423933,"size":412,"snap":"2023-40-2023-50","text_gpt3_token_len":73,"char_repetition_ratio":0.10784314,"word_repetition_ratio":0.0,"special_character_ratio":0.18203883,"punctuation_ratio":0.057971016,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97783726,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T00:35:23Z\",\"WARC-Record-ID\":\"<urn:uuid:d01239c0-bbca-4af6-978f-4390a364aaa1>\",\"Content-Length\":\"2655\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:64cb0c53-4679-422e-8643-7f22e022b5de>\",\"WARC-Concurrent-To\":\"<urn:uuid:4962b7eb-cded-4441-9d8f-bfc646b68af4>\",\"WARC-IP-Address\":\"172.67.221.168\",\"WARC-Target-URI\":\"https://www.compassinvestors.com/funds.php\",\"WARC-Payload-Digest\":\"sha1:TOPIJKFMA2G5QO65ONN6IN67CGOR4I4Q\",\"WARC-Block-Digest\":\"sha1:C6KZGY4RUPY3ENXXWCNBGGYYWKNABA4K\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511023.76_warc_CC-MAIN-20231002232712-20231003022712-00848.warc.gz\"}"} |
https://chemistry.stackexchange.com/questions/59468/energy-comparison-between-an-atom-and-its-ion | [
"# Energy comparison between an atom and its ion\n\nIs it possible to compare energy(enthalpy or similar) between an atom and its ion, possibly in the same state(gas)?\n\nFor example, $\\ce{O}$ and $\\ce{O^+}$(intentionally cation), $\\ce{Na}$ and $\\ce{Na^+}$.\n\nAt first I though of ionization energy, but its RHS(products) has electron, so I thought it can't be used to directly compare them.\n\n• The electron is assumed to have $0$ energy... – DHMO Sep 21 '16 at 15:53\n• @user34388 How about electron's kinetic energy? – user1448742 Sep 21 '16 at 15:55\n• Assume it's zero. – Zhe Dec 21 '16 at 14:43\n• Give us some context please. There are some good answers below, but I think you are aiming for something else. As a general rule, don't compare total energies of different compounds directly. I don't think it's really clear that you want the ionization energy but rather something more dubious – AMT Jan 20 '17 at 15:34\n\nIonization energy is, exactly, a comparison of the energy of (i) a given species and (ii) that same species with one electron removed.\n\nIonization energies can be thought of as a reaction like the following, using the oxygen atom as an example:\n\n$$\\ce{O -> O+} + e^-$$\n\nWhen evaluating quantities like the ionization energy, \"external\" energies (this is my term, not an official/formal one!) like kinetic and gravitational potential energy are disregarded. Further, the reference energy is generally defined to be zero for an isolated electron at \"infinite separation\".\n\nThus, the energy of the above reaction is:\n\n$$E_\\mathrm{rxn} = \\left(E_{\\ce{O+}} + E_{e^-}\\right) - E_{\\ce O}$$\n\nBut, since the electron is taken as being in its reference state, this is simply:\n\n$$E_\\mathrm{rxn} = E_{\\ce{O+}} - E_{\\ce O} \\equiv IE$$\n\nPLEASE NOTE that the above energies are only the internal/electronic energies of the $\\ce O$ and $\\ce{O+}$ species, and not their enthalpies $\\left(H_{\\ce{O+}},\\,H_\\ce{O}\\right)$, free energies $\\left(G_{\\ce{O+}},\\,G_\\ce{O}\\right)$, etc.\n\nIf you want to compare the energy between an atom and its parent ion you basically are indeed interested in the adiabatic ionization energy of your atom (i.e., the difference in energy between the atom and ion in their lowest energy state). This is the energy needed to remove the electron away from the ion core.\n\nIt might be instructive consider the spectrum of the hydrogen atom. You might know that the energy levels of the H atom w.r.t. its ground state are given by\n\n$$E_n=E_\\text{IP}-\\frac{\\mathcal{R}}{n^2}$$ where $E_n$ is the energy of the state with principal quantum number $n$, $E_\\text{IP}$ is the adiabatic ionization energy, $\\mathcal{R}$ is the Rydberg constant. In case of hydrogen, $E_\\text{IP}=\\mathcal{R}$. The hydrogen atom thus has an infinite amount of energy levels that become more closely spaced as $n$ increases and converges on the ionization energy. This corresponds to an electron that is so far away from the proton, that the system can be considered to consist of an isolated electron and ion. For Na and O, the formula for the energies is not so simple anymore, but you'll still find that the energy levels converge on the ionization energy of the atom.\n\nAnother way to look at it is by considering an low-energy collision between an ion and an electron."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8498265,"math_prob":0.99620306,"size":1058,"snap":"2020-10-2020-16","text_gpt3_token_len":303,"char_repetition_ratio":0.13946868,"word_repetition_ratio":0.0,"special_character_ratio":0.29017013,"punctuation_ratio":0.1182266,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9983258,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-04T22:52:34Z\",\"WARC-Record-ID\":\"<urn:uuid:b0398da6-5677-40fd-8636-9fce8ad35a19>\",\"Content-Length\":\"154837\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:76a984f8-95c0-4ef8-a892-d4129289520c>\",\"WARC-Concurrent-To\":\"<urn:uuid:e124980f-0fb2-4ef8-aea1-2ad932883516>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://chemistry.stackexchange.com/questions/59468/energy-comparison-between-an-atom-and-its-ion\",\"WARC-Payload-Digest\":\"sha1:ILNFJNYOGE4QR2N2A4PNZZCUB5XYHTC3\",\"WARC-Block-Digest\":\"sha1:EXENOIVUM6EMAXFWND24U2ZCDRMCGCM6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370525223.55_warc_CC-MAIN-20200404200523-20200404230523-00147.warc.gz\"}"} |
https://www.nagwa.com/en/videos/654164923048/ | [
"# Video: Applying the Distributive Property of Multiplication over Addition\n\nComplete: 1000 × 7 = 5 thousands + _ thousands.\n\n00:53\n\n### Video Transcript\n\nComplete 1000 multiplied by seven is equal to five thousands plus blank thousands.\n\nThe calculation on the left-hand side of the equation is 1000 multiplied by seven. This is equal to 7000. We can write this in words as seven thousands. The number 7000 can be split into 5000 plus 2000. We can write this as five thousands plus two thousands. This means that the missing number in the equation is two. 1000 multiplied by seven is equal to five thousands plus two thousands."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9484452,"math_prob":0.9976286,"size":489,"snap":"2020-10-2020-16","text_gpt3_token_len":110,"char_repetition_ratio":0.17319588,"word_repetition_ratio":0.17073171,"special_character_ratio":0.24948876,"punctuation_ratio":0.08421053,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99630094,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-03-31T10:55:25Z\",\"WARC-Record-ID\":\"<urn:uuid:4c429763-e289-45fe-902d-111de1e615e4>\",\"Content-Length\":\"23495\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:94031a96-5997-432a-8cf8-215ab203de6d>\",\"WARC-Concurrent-To\":\"<urn:uuid:3de22873-f515-4d4b-bb6f-64696abc6bca>\",\"WARC-IP-Address\":\"34.196.176.227\",\"WARC-Target-URI\":\"https://www.nagwa.com/en/videos/654164923048/\",\"WARC-Payload-Digest\":\"sha1:KT5FQJNKTDU2QZLRRNAOAKM575NZIT55\",\"WARC-Block-Digest\":\"sha1:JXJJXEVYES6A7BDO5U5UZAQVW6RDJSUA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370500426.22_warc_CC-MAIN-20200331084941-20200331114941-00037.warc.gz\"}"} |
https://astrostatistics.psu.edu/datasets/R/html/base/html/crossprod.html | [
"crossprod {base} R Documentation\n\n## Matrix Crossproduct\n\n### Description\n\nGiven matrices `x` and `y` as arguments, `crossprod` returns their matrix cross-product. This is formally equivalent to, but faster than, the call `t(x) %*% y`.\n\n### Usage\n\n```crossprod(x, y = NULL)\n```\n\n### Arguments\n\n `x, y` matrices: `y = NULL` is taken to be the same matrix as `x`.\n\n### References\n\nBecker, R. A., Chambers, J. M. and Wilks, A. R. (1988) The New S Language. Wadsworth & Brooks/Cole.\n\n`%*%` and outer product `%o%`.\n```(z <- crossprod(1:4)) # = sum(1 + 2^2 + 3^2 + 4^2)"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.60901326,"math_prob":0.9449193,"size":470,"snap":"2022-27-2022-33","text_gpt3_token_len":165,"char_repetition_ratio":0.115879826,"word_repetition_ratio":0.0,"special_character_ratio":0.35531914,"punctuation_ratio":0.21296297,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9884342,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-30T04:52:41Z\",\"WARC-Record-ID\":\"<urn:uuid:024dff5a-8fca-466b-ab19-2f76f4920ef6>\",\"Content-Length\":\"1711\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:426fb2ff-bba4-4fd8-9d9b-ec1bd4b363b6>\",\"WARC-Concurrent-To\":\"<urn:uuid:249f4b6b-926b-46e1-a738-e4260cb07302>\",\"WARC-IP-Address\":\"168.62.182.234\",\"WARC-Target-URI\":\"https://astrostatistics.psu.edu/datasets/R/html/base/html/crossprod.html\",\"WARC-Payload-Digest\":\"sha1:63WWVGSPB77JPKYHJKQYGJVRVWLHGT3J\",\"WARC-Block-Digest\":\"sha1:5JWBLLGS6YZHULQ3KF6JHEVPUAYIGTEP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103661137.41_warc_CC-MAIN-20220630031950-20220630061950-00172.warc.gz\"}"} |
https://www.polytechnichub.com/electromagnetism/ | [
"# Electromagnetism\n\nA current carrying conductor or coil produces a magnetic flux or field. Thus electricity is always associated with magnetism. This is known as electromagnetism.\n\nThe magnetic effect of electric current can be studied for the following three cases.\n\n• The magnetic field of a long straight conductor.\n• The magnetic field of a solenoid.\n• The magnetic field of a toroid.\n\n### The magnetic field of a long straight conductor\n\n• A long straight conductor carrying a current of I amperes produces a circular magnetic flux of ∅ Webers around it.\n\n### The magnetic field of a solenoid.\n\n• The magnetic field of a single conductor is very small. If a coil of N turn of the conductors is wound on a bar of a magnetic material like iron., the constructions are called solenoid. it has large length and relatively small diameter. The bar inside the coil is called the core. The solenoid can produce a large magnetic field inside its core.\n• When a current I is passed through then turns of the solenoid, each turn carries a current I and produces a small flux inside the core. The direction of the flux is given by the right-hand grip rule. it is observed that all the turns produce the flux is given by the right-hand grip rule.\n• It is observed that all the turns produce the flux in the same directions in the core, the total flux enters the core at one end which becomes the south (S) pole and flux leaves the flux leaves the core.\n• The total flux enters the core at one end which becomes the south(s pole and flux leave the core from the other end which becomes the North (N) pole. Thus the solenoid behaves as a bar-electromagnet. the flux completes its circuit through the air.\n\n### The magnetic field of a toroid.\n\n• A toroidal core is formed by winding a long, thin rectangular strip of magnetic material.\n• This laminated circular ring provides minimum reluctance to the flux.\n• A magnetizing coil is uniformly wound over the complete length, of the current I.\n• Thus the toroidal is a closed solenoid, So it requires current smaller than that of a solenoid for the same flux.\n• The directions of the toroidal core flux are given by corkscrew rule or right-hand grip rule as applied to the solenoid."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9170127,"math_prob":0.97675055,"size":2237,"snap":"2022-40-2023-06","text_gpt3_token_len":489,"char_repetition_ratio":0.17017466,"word_repetition_ratio":0.1536524,"special_character_ratio":0.20607957,"punctuation_ratio":0.08196721,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97147083,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-03T20:58:05Z\",\"WARC-Record-ID\":\"<urn:uuid:7f40375f-ffa2-4a3b-8609-3622d8cdbdaa>\",\"Content-Length\":\"46826\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8424ba39-04fa-4737-b4a1-5387d0f107cc>\",\"WARC-Concurrent-To\":\"<urn:uuid:c8fd715b-0dd9-4e4b-99cd-0fdd737fb47b>\",\"WARC-IP-Address\":\"162.241.114.197\",\"WARC-Target-URI\":\"https://www.polytechnichub.com/electromagnetism/\",\"WARC-Payload-Digest\":\"sha1:U4QRFZWJIQHFX7MRSUWF5DSIL7OSCRXC\",\"WARC-Block-Digest\":\"sha1:LWIH5EE2JYOYVQX44FW5D3BMFFOSVURG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337432.78_warc_CC-MAIN-20221003200326-20221003230326-00412.warc.gz\"}"} |
https://www.plus2net.com/python/pandas-dataframe-value_counts.php | [
"# value_count(): Pandas DataFrame\n\nPandas\n\nWe will get unique values and its frequency as series.\n\n## Parameters\n\nnormalize : Default is False, If set to True then give realtive frequency ( instead of numbers ) of unique values.\nsort : Default is True, sort by frequency of unique values\nascending :Default is False, Sort in ascending order\nbins : integer or non-uniform width or interval index\ndropna: (default True) Not to include counts for NaN\n\n## Examples with Parameters\n\ncount_values() will return all unique values with number of occurrence. We have different classes in our data column CLASS1.\n``````import pandas as pd\nmy_dict={'NAME':['Ravi','Raju','Alex','Ron','King','Jack'],\n'ID':[1,2,3,4,5,6],\n'MATH':[80,40,70,70,60,30],\n'CLASS1':['Four','Three','Three','Four','Five','Three']}\nmy_data = pd.DataFrame(data=my_dict)\nprint(my_data['CLASS1'].value_counts())``````\nOutput\n``````Three 3\nFour 2\nFive 1``````\n\n## normalize\n\nBy default it is False. By making it True ( normalize=True ) instead of number of occurrence we will display relative frequencies of unique values.\n``print(my_data['CLASS1'].value_counts(normalize=True))``\nOutput\n``````Three 0.500000\nFourth 0.333333\nFive 0.166667``````\n\n## sort\n\nBy default it is True ( sort=True ). Sorting by frequency of unique values.\n``````my_data = pd.DataFrame(data=my_dict)\nprint(my_data['CLASS1'].value_counts(sort=False))``````\nOutput\n``````Five 1\nThree 3\nFour 2``````\n\n## ascending\n\nBy default ascending=False , we will set it to ascending=True\n``print(my_data['CLASS1'].value_counts(ascending=True))``\nOutput\n``````Five 1\nFour 2\nThree 3``````\n\n## bins\n\nWe can create segments using bins. Let us create fixed width bins by using integer.\n``print(my_data['MATH'].value_counts(bins=3))``\nOutput\n``````(63.333, 80.0] 3\n(29.948999999999998, 46.667] 2\n(46.667, 63.333] 1``````\nnon-uniform width bins\n``print(my_data['MATH'].value_counts(bins=[1,50,70,90]))``\nOutput\n``````\n(50.0, 70.0] 3\n(0.999, 50.0] 2\n(70.0, 90.0] 1``````\n\n## dropna\n\nDefault value is True, Don't include counts of NaN. We will set the value to False ( dropna=False ) to include NaN vlaues.\n``````import pandas as pd\nimport numpy as np\nmy_dict={'NAME':['Ravi','Raju','Alex','Ron','King','Jack'],\n'ID':[1,2,3,4,5,6],\n'MATH':[80,40,70,70,np.nan,30],\n'CLASS1':['Four','Three','Three','Four','Five','Three']}\nmy_data = pd.DataFrame(data=my_dict)\nprint(my_data['MATH'].value_counts(dropna=False))``````\nOutput\n``````70.0 2\n30.0 1\nNaN 1\n40.0 1\n80.0 1``````\nWe can set it to True ( dropna=True)\n``print(my_data['MATH'].value_counts(dropna=True))``\nOutput\n``````70.0 2\n30.0 1\n40.0 1\n80.0 1``````\n\nSubscribe to our YouTube Channel here\n\n## Subscribe\n\n* indicates required\nSubscribe to plus2net",
null,
"plus2net.com"
]
| [
null,
"https://www.plus2net.com/images/top2.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5042897,"math_prob":0.9239847,"size":2508,"snap":"2023-40-2023-50","text_gpt3_token_len":768,"char_repetition_ratio":0.12539937,"word_repetition_ratio":0.012539185,"special_character_ratio":0.34170654,"punctuation_ratio":0.2166065,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99836594,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-10T21:26:24Z\",\"WARC-Record-ID\":\"<urn:uuid:7c338cca-bf7b-41f6-babe-8c730241c059>\",\"Content-Length\":\"20305\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dd65c389-4393-4db9-bbe6-5aee2513230e>\",\"WARC-Concurrent-To\":\"<urn:uuid:55e5e114-5a1e-4781-8a53-d076014c8420>\",\"WARC-IP-Address\":\"68.178.227.154\",\"WARC-Target-URI\":\"https://www.plus2net.com/python/pandas-dataframe-value_counts.php\",\"WARC-Payload-Digest\":\"sha1:EN6Z6NFSQUGYDYG732FSPZG4EZJOPQOR\",\"WARC-Block-Digest\":\"sha1:PAR5WMOF6P3AWIJEX2YIJH7B5QTKHN2G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679102637.84_warc_CC-MAIN-20231210190744-20231210220744-00239.warc.gz\"}"} |
https://www.meritnation.com/ask-answer/question/if-the-ratio-of-the-roots-of-the-equation-x2-px-q-0-is-equal/complex-numbers-and-quadratic-equations/2892060 | [
"# if the ratio of the roots of the equation x2+px+q=0 is equal to the ratio of the roots of the equation x2+lx+m=0, prove that mp2=ql2\n\nLet α and β be the roots of equation\n\nx 2 + px + q = 0\n\nand a and b be the roots of equation\n\nx 2 + lx + m = 0\n\nThen α + β = – p, αβ = q ......(1)\n\na + b = – l, ab = m ......(2)\n\nGiven",
null,
"Adding (3) and (4), we get",
null,
"• 142\nWhat are you looking for?"
]
| [
null,
"https://s3mn.mnimgs.com/img/shared/discuss_editlive/3021597/2012_08_30_12_06_54/mathmlequation8454853439848153133.png",
null,
"https://s3mn.mnimgs.com/img/shared/discuss_editlive/3021597/2012_08_30_12_06_54/mathmlequation8545310085517299857.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7941827,"math_prob":1.0000098,"size":338,"snap":"2020-34-2020-40","text_gpt3_token_len":128,"char_repetition_ratio":0.2035928,"word_repetition_ratio":0.19277108,"special_character_ratio":0.4289941,"punctuation_ratio":0.16666667,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999958,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,5,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-04T11:39:17Z\",\"WARC-Record-ID\":\"<urn:uuid:6330c706-f5f6-4e3c-b17c-dfc48345a63c>\",\"Content-Length\":\"60354\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:91d6b5e8-1dd3-4f84-a64e-ff227688060c>\",\"WARC-Concurrent-To\":\"<urn:uuid:23b46653-b3c6-4210-96f5-77d70287478c>\",\"WARC-IP-Address\":\"23.38.103.8\",\"WARC-Target-URI\":\"https://www.meritnation.com/ask-answer/question/if-the-ratio-of-the-roots-of-the-equation-x2-px-q-0-is-equal/complex-numbers-and-quadratic-equations/2892060\",\"WARC-Payload-Digest\":\"sha1:VKQSG5ZLYLJ6ECATJIQPZZOXK5WK4LJ5\",\"WARC-Block-Digest\":\"sha1:7KZR35CAKA4XGKF2EY4HCQIHK2U7FRBW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439735867.93_warc_CC-MAIN-20200804102630-20200804132630-00111.warc.gz\"}"} |
https://cs.stackexchange.com/questions/120168/creating-a-pda-for-the-language-l-am-bn-m-neq-n | [
"# Creating a PDA for the language L = {$a^{m}$ $b^{n}$ : m $\\neq$ n}\n\nI didn‘t find a DPDA for the language L = {$$a^{m}$$ $$b^{n}$$ : m $$\\neq$$ n}, so I guess an NPDA is the only option.\n\nNPDA are not very intuitive to me. The only solution I found online is:",
null,
"I don‘t really understand how it works and also I‘m not allowed to use final states. The only way an input is accepted is by emptying the Stack (how we do it at my university)."
]
| [
null,
"https://i.stack.imgur.com/CAQ69.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9335348,"math_prob":0.9908329,"size":380,"snap":"2020-24-2020-29","text_gpt3_token_len":106,"char_repetition_ratio":0.06648936,"word_repetition_ratio":0.0,"special_character_ratio":0.27631578,"punctuation_ratio":0.09090909,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99661,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-04T23:50:11Z\",\"WARC-Record-ID\":\"<urn:uuid:815380ce-f6a8-401f-86d7-80775c3f929b>\",\"Content-Length\":\"141705\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:df53bd45-03cd-4959-b2ec-112079e37a8d>\",\"WARC-Concurrent-To\":\"<urn:uuid:ab26b9ad-d2d6-44b0-a9fa-0199e9c93fbb>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://cs.stackexchange.com/questions/120168/creating-a-pda-for-the-language-l-am-bn-m-neq-n\",\"WARC-Payload-Digest\":\"sha1:VGVIB472PGY66NKEGDEFYPXR5V5F3QRO\",\"WARC-Block-Digest\":\"sha1:23HIEEH3NQLXTE2AV2YQVQUCI45C3BVU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655886802.13_warc_CC-MAIN-20200704232817-20200705022817-00163.warc.gz\"}"} |
https://www.bartleby.com/questions-and-answers/40.-two-balls-with-masses-m-and-m-are-connected-by-rigid-rod-of-length-l-and-negligible-mass-as-show/041ec283-a81a-4cf3-8630-049efa9ab087 | [
"",
null,
"",
null,
"40. Two balls with masses M and m are connected byrigid rod of length L and negligible mass as shown inFigure P10.40. For an axis perpendicular to the rod(a) show that the system has the minimum momentof inertia when the axis passes through the center ofmass. (b) Show that this moment of inertia is Г-, L2where umM/(m+ M)Figure P10.40\n\nQuestion",
null,
"help_outlineImage Transcriptionclose40. Two balls with masses M and m are connected by rigid rod of length L and negligible mass as shown in Figure P10.40. For an axis perpendicular to the rod (a) show that the system has the minimum moment of inertia when the axis passes through the center of mass. (b) Show that this moment of inertia is Г-, L2 where umM/(m+ M) Figure P10.40 fullscreen\nStep 1\n\na)\n\nMoment of Inertia for mass M is,\n\nStep 2\n\nTotal moment of Inertia is,\n\nStep 3\n\nDifferentiate the above equation w...\n\nWant to see the full answer?\n\nSee Solution\n\nWant to see this answer and more?\n\nOur solutions are written by experts, many with advanced degrees, and available 24/7\n\nSee Solution\nTagged in\n\nCentre of Mass and Centre of Gravity",
null,
""
]
| [
null,
"https://www.bartleby.com/static/search-icon-white.svg",
null,
"https://www.bartleby.com/static/close-grey.svg",
null,
"https://prod-qna-question-images.s3.amazonaws.com/question/75ed199e-3e9a-47b8-aa3d-b2a3e5537015/041ec283-a81a-4cf3-8630-049efa9ab087/256l4hq.jpeg",
null,
"https://www.bartleby.com/static/logo.svg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9138498,"math_prob":0.957694,"size":1435,"snap":"2019-43-2019-47","text_gpt3_token_len":373,"char_repetition_ratio":0.10971349,"word_repetition_ratio":0.0,"special_character_ratio":0.27456447,"punctuation_ratio":0.21306819,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98790306,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-14T15:24:06Z\",\"WARC-Record-ID\":\"<urn:uuid:8691e616-2948-4e1d-9b39-51731abab0b2>\",\"Content-Length\":\"103057\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:755809d7-fe1b-4180-97a6-3d72d2c3bbc2>\",\"WARC-Concurrent-To\":\"<urn:uuid:a1ee522d-cda2-4d41-93b1-0444f17ac2c8>\",\"WARC-IP-Address\":\"99.84.104.122\",\"WARC-Target-URI\":\"https://www.bartleby.com/questions-and-answers/40.-two-balls-with-masses-m-and-m-are-connected-by-rigid-rod-of-length-l-and-negligible-mass-as-show/041ec283-a81a-4cf3-8630-049efa9ab087\",\"WARC-Payload-Digest\":\"sha1:RTINOIISGJQC7RX6KOA5E6QL4F3LMSLO\",\"WARC-Block-Digest\":\"sha1:BHTKZWZZLVD65U73DHWQ363FWWIWX5A4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986653876.31_warc_CC-MAIN-20191014150930-20191014174430-00145.warc.gz\"}"} |
http://mathandmultimedia.com/2011/07/14/nine-point-circle/ | [
"# The Marvels of the Nine-Point Circle\n\nLet us examine some important points related to a triangle. Use GeoGebra or any geometry software to follow the construction below.\n\n1.) Construct triangle TUV.\n2.) Construct the midpoint of each side.\n3.) Construct the three altitudes. What do you observe? The intersection of the altitudes is called the orthocenter.\n4.) Construct the three midpoints between the orthocenter and the three vertices. What do you observe about the nine points?\n\nAfter finishing the steps above, your figure should at look like Figure 1. For the sake of discussion, we color the points. The red points are the midpoints of each side, the green points are the ‘foot’ of each altitude, and the cyan points are the midpoints of the orthocenter and and the vertices.",
null,
"From the figure above, we observe two things: first, the altitudes seem to meet at a point; and second, it seems that the 9 points form a circle (can you verify this by construction?).\n\nUsing GeoGebra, we can verify if the nine points mentioned above lie on a circle. To do this, just select the Circle through Three Points tool, and then click any three of the nine points.\n\nAs we can see, the nine points are indeed on a circle . The circle is what we call the nine-point circle.\n\nWe find other interesting points on the circle.\n\n5.) We construct a circumcircle –– a circle passing through vertices of the triangle and find its circumcenter (the center of the circumcircle). What can you say about the orthocenter, the center of the nine-point circle, and the circumcenter?",
null,
"6.) We draw the medians — the segments that connect the three vertices to the midpoint of each side. What do you observe?\n7.) We construct the centroid — the intersection of the medians.What do you observe?\n\nIt seems that the median, centroid, orthocenter, and the center of the nine-point circle seem to lie on a straight line (verify using the line or the segment tool). Yes, in fact, they lie on a single line. This line is called the Euler line in honor of Leonard Euler.\nThere are still many interesting facts about the Nine-point circle and here are some to name a few:\n• The center of the nine-point circle is the midpoint of the orthocenter and the circumcenter.\n• The radius of the circumcircle is twice that of the nine-point circle\n• The incircle of a triangle is always inscribled to its nine-point circle."
]
| [
null,
"http://mathandmultimedia.com/wp-content/uploads/2011/07/nine-point-circle-1.png",
null,
"http://mathandmultimedia.com/wp-content/uploads/2011/07/nine-point-circle-3.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.883394,"math_prob":0.96077925,"size":2001,"snap":"2021-31-2021-39","text_gpt3_token_len":444,"char_repetition_ratio":0.18728092,"word_repetition_ratio":0.011661808,"special_character_ratio":0.21489255,"punctuation_ratio":0.12373737,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99439746,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-17T06:51:58Z\",\"WARC-Record-ID\":\"<urn:uuid:bff49ed7-f363-4cdf-8854-a593693fcf8a>\",\"Content-Length\":\"47807\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:98b5f021-1aa3-4cca-bbce-8458978a973a>\",\"WARC-Concurrent-To\":\"<urn:uuid:83861fa2-f8dd-40d2-85f2-1baf25b4928f>\",\"WARC-IP-Address\":\"166.62.28.131\",\"WARC-Target-URI\":\"http://mathandmultimedia.com/2011/07/14/nine-point-circle/\",\"WARC-Payload-Digest\":\"sha1:IIW5QRAWSXGJXUEEWDOSFHY3Q6M2M6GC\",\"WARC-Block-Digest\":\"sha1:GZ5HC42S5YPK4RS5R6KCIYVS34EGHOYF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780055601.25_warc_CC-MAIN-20210917055515-20210917085515-00681.warc.gz\"}"} |
https://metanumbers.com/9942 | [
"# 9942 (number)\n\n9,942 (nine thousand nine hundred forty-two) is an even four-digits composite number following 9941 and preceding 9943. In scientific notation, it is written as 9.942 × 103. The sum of its digits is 24. It has a total of 3 prime factors and 8 positive divisors. There are 3,312 positive integers (up to 9942) that are relatively prime to 9942.\n\n## Basic properties\n\n• Is Prime? No\n• Number parity Even\n• Number length 4\n• Sum of Digits 24\n• Digital Root 6\n\n## Name\n\nShort name 9 thousand 942 nine thousand nine hundred forty-two\n\n## Notation\n\nScientific notation 9.942 × 103 9.942 × 103\n\n## Prime Factorization of 9942\n\nPrime Factorization 2 × 3 × 1657\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 3 Total number of distinct prime factors Ω(n) 3 Total number of prime factors rad(n) 9942 Product of the distinct prime numbers λ(n) -1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) -1 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 9,942 is 2 × 3 × 1657. Since it has a total of 3 prime factors, 9,942 is a composite number.\n\n## Divisors of 9942\n\n1, 2, 3, 6, 1657, 3314, 4971, 9942\n\n8 divisors\n\n Even divisors 4 4 2 2\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 8 Total number of the positive divisors of n σ(n) 19896 Sum of all the positive divisors of n s(n) 9954 Sum of the proper positive divisors of n A(n) 2487 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 99.7096 Returns the nth root of the product of n divisors H(n) 3.99759 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 9,942 can be divided by 8 positive divisors (out of which 4 are even, and 4 are odd). The sum of these divisors (counting 9,942) is 19,896, the average is 2,487.\n\n## Other Arithmetic Functions (n = 9942)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 3312 Total number of positive integers not greater than n that are coprime to n λ(n) 1656 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 1224 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 3,312 positive integers (less than 9,942) that are coprime with 9,942. And there are approximately 1,224 prime numbers less than or equal to 9,942.\n\n## Divisibility of 9942\n\n m n mod m 2 3 4 5 6 7 8 9 0 0 2 2 0 2 6 6\n\nThe number 9,942 is divisible by 2, 3 and 6.\n\n• Arithmetic\n• Abundant\n\n• Polite\n\n• Square Free\n\n• Sphenic\n\n## Base conversion (9942)\n\nBase System Value\n2 Binary 10011011010110\n3 Ternary 111122020\n4 Quaternary 2123112\n5 Quinary 304232\n6 Senary 114010\n8 Octal 23326\n10 Decimal 9942\n12 Duodecimal 5906\n20 Vigesimal 14h2\n36 Base36 7o6\n\n## Basic calculations (n = 9942)\n\n### Multiplication\n\nn×y\n n×2 19884 29826 39768 49710\n\n### Division\n\nn÷y\n n÷2 4971 3314 2485.5 1988.4\n\n### Exponentiation\n\nny\n n2 98843364 982700724888 9770010606836496 97133445453168443232\n\n### Nth Root\n\ny√n\n 2√n 99.7096 21.5026 9.98547 6.30224\n\n## 9942 as geometric shapes\n\n### Circle\n\n Diameter 19884 62467.4 3.10526e+08\n\n### Sphere\n\n Volume 4.11633e+12 1.2421e+09 62467.4\n\n### Square\n\nLength = n\n Perimeter 39768 9.88434e+07 14060.1\n\n### Cube\n\nLength = n\n Surface area 5.9306e+08 9.82701e+11 17220\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 29826 4.28004e+07 8610.02\n\n### Triangular Pyramid\n\nLength = n\n Surface area 1.71202e+08 1.15812e+11 8117.61\n\n## Cryptographic Hash Functions\n\nmd5 154aa6866aefb6f8d0b722621fa71e83 bb11ba07225f4b8621bbfbf40a34e6a3e73e5b20 c6d75a1953366cdcc94191f6ff4db255e467e0c8a532b17484fee1172ee8031f 9824bf9f9ce71787a316a78849a5871b635e089613f32c7128503fc43daa01b915a22d035d360c7e9645f2b1b84497433692313ef90f1d9127055530322dce08 8455743e59c0584e320b13aa7a679abfc769fd40"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6151923,"math_prob":0.9797518,"size":4468,"snap":"2021-43-2021-49","text_gpt3_token_len":1601,"char_repetition_ratio":0.11827957,"word_repetition_ratio":0.028023599,"special_character_ratio":0.44919428,"punctuation_ratio":0.07692308,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9963345,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T20:06:09Z\",\"WARC-Record-ID\":\"<urn:uuid:99e583cf-4e34-4115-84ca-1c074050a14b>\",\"Content-Length\":\"39932\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c173821a-c8d5-4358-bb6b-144f8227ff65>\",\"WARC-Concurrent-To\":\"<urn:uuid:b8774eea-4f20-4d68-ba0b-7d7ae770607b>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/9942\",\"WARC-Payload-Digest\":\"sha1:YEYZ3Y65SGBS7D53VC3X5GRQ2HXNNOTZ\",\"WARC-Block-Digest\":\"sha1:VN2WYPYE2I7S4TXV47FWWOI3ASQGOKRW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585441.99_warc_CC-MAIN-20211021195527-20211021225527-00373.warc.gz\"}"} |
https://bigpi.vc/printable-educational-board-game-for-math-ponder-up/ | [
"Select Page",
null,
"Developing math skills is a continuous process for all young students. Therefore, it shouldn’t stop when they are not in the classroom.\n\nPonder Up Board Game will help your children practice comparisons of numbers and quantities in a fun and engaging way from the ease of their home with their family.\n\nWelcome to the math pond where the little frog character helps you choose the correct answer for each question. There are two bubbles at the top of the page that contain numbers and/or quantities and/or shapes and/or math operations that need to be compared.\n\n#### Game 1: Greater and Lesser",
null,
"Which is more? Use the game board on page 4 and dots that you cut out to go on top of the dots on the image.\n\nFor young children, keep it simple with numbers up to 5. For example, place three dots in the left circle and 1 in the right circle. Place the instructions “find the greater” in the space under the three frogs. Then, ask them to place the frog on the right answer.\n\nIf you cut the numerals from Math Operations, you have the greater sign cut out which you can have your child place in the green board between the two circles once they figure out which is the greater number or quantity. You can place the correct numeral under each of the circles.\n\nContinue working with greater than and the sign with other number combinations. Turn the greater than sign pointing to the lesser and demonstrate how this works when the number on the left is less than the number or amount on the right.\n\n#### Game 2: Odd or Even",
null,
"In this game, you place dots or numerals in the circles. Make one circle an odd number and one circle an even number. Take the instructions “Find the Even” or “Find the Odd” and place it under the three frogs. Then ask your kids to place the frog on the correct answer.\n\n#### Game 3: Ten more than the number",
null,
"This is good for first graders. Place one number in a circle and then place a number that has 10 more in the other circle. Start with teens for kindergarten and first graders. So for example, one circle could hold 7 and the other 17. Choose the direction that says: “Choose which is 10 more than _” and place it under the three frogs. Have your child put a frog on the correct number.\n\n#### Game 4: One hundred more than the number",
null,
"Use this game with second graders. Place a number that is 100 more than a number you chose and place each in the circles. Add the instruction: “Choose which is 100 more than __”\nHave your child come up with the same problems for you.\n\n#### Game 5: Shapes and angles",
null,
"Using the cut out shapes, choose two to compare that have more angles or vertices or “corners”. You can choose a triangle and a square. Or a triangle and a pentagon. (Make sure your child understands what an angle is before you quiz them.) Use the “Which Shape has more vertices” instruction to place under the three frogs. Then give them the frog to place on the right answer.\n\n#### Here are the various goals for the Ponder Up game by grade level:\n\nPre-kindergarten Math\n\nIdentify whether the number of objects in one group is more, less, greater than, fewer, and/or equal to the number of objects in another group, e.g., by using matching and counting strategies (up to 5 objects).\n\nKindergarten Math\n\n• Identify whether the number of objects in one group is greater than, less than, or equal to the number of objects in another group, e.g., by using matching and counting strategies.\n• Compare two numbers between 1 and 10 presented as written numerals.\n• Compare numbers. Identify whether the number of objects in one group is greater than, less than, or equal to the number of objects in another group, e.g., by using matching and counting strategies. (Include groups with up to ten objects.)\nCompare two sets and identify the set that is less than the other set, up to 10.\n• Identify whether the number of objects in one group is greater than, less than, or equal to the number of objects in another group, e.g., by using matching and counting strategies.\n• Identify the smaller or larger number given two numbers between 0 and 10\n• Identify and describe shapes.\n• Describe objects in the environment using names of shapes, and describe the relative positions of these objects using terms such as above, below, beside, in front of, behind, and next to.\n• Correctly name shapes regardless of their orientations or overall size.\n• Analyze, compare, create, and compose shapes.\n• Analyze and compare two- and three-dimensional shapes, in different sizes and orientations, using informal language to describe their similarities, differences, parts (e.g., number of sides and vertices/”corners”) and other attributes (e.g., having sides of equal length).\n• Identify a group of fewer than 10 objects as odd or even.\n\n• Compare two two-digit numbers based on meanings of the tens and ones digits, recording the results of comparisons with the symbols >, =, and <.\n• Understand place value. Compare two two-digit numbers based on meanings of the tens and ones digits, recording the results of comparisons with the symbols >, =, and <.\n• Given a two-digit number, mentally find 10 more or 10 less than the number, without having to count; explain the reasoning used.\n• Using base ten blocks, find 10 more or 10 less of a given two-digit number (e.g., what is 10 more than 20? What is 10 less than 30?)\n• Compare two-digit numbers up to 31 using representations and numbers (e.g., identify more 10s, less 10s, more 1s, fewer 1s, larger number, smaller number)\n• Use place value understanding and properties of operations to add and subtract. Given a two-digit number, mentally find 10 more or 10 less than the number, without having to count; explain the reasoning used.\n\n• Determine whether a group of objects (up to 20) has an odd or even number of members, e.g., by pairing objects or counting them by 2s; write an equation to express an even number as a sum of two equal addends.\n• Compare two three-digit numbers based on meanings of the hundreds, tens, and ones digits, using >, =, and < symbols to record the results of comparisons.\n• Reason with shapes and their attributes. Recognize and draw shapes having specified attributes, such as a given number of angles or a given number of equal faces. Identify triangles, quadrilaterals, pentagons, hexagons, and cubes. (Sizes are compared directly or visually, not compared by measuring.)\n• Analyze and compare two- and three-dimensional shapes, in different sizes and orientations, using informal language to describe their similarities, differences, parts (e.g., number of sides and vertices/”corners”) and other attributes (e.g., having sides of equal length).\n• Use place value understanding and properties of operations to add and subtract.\n• Mentally add 10 or 100 to a given number 100-900, and mentally subtract 10 or 100 from a given number 100-900. (e.g., What is 100 more than 500? What is 100 fewer than 700?)\n• Mentally add or subtract 10 from a given set from the tens family (e.g., What is 10 more than 50? What is 10 fewer than70?)\n• Work with equal groups of objects to gain foundations for multiplication. Determine whether a group of objects (up to 20) has an odd or even number of members, e.g., by pairing objects or counting them by 2s; write an equation to express an even number as a sum of two equal addends.\n\n• Read and write multi-digit whole numbers using base-ten numerals, number names, and expanded form. Compare two multi-digit numbers based on meanings of the digits in each place, using >, =, and < symbols to record the results of comparisons.\n• Understand place value. Compare two three-digit numbers based on meanings of the hundreds, tens, and ones digits, using >, =, and < symbols to record the results of comparisons.\n• Compare three-digit numbers using representations and numbers (e.g., identify more hundreds, less hundreds, more tens, less tens, more ones, less ones, larger number, smaller number)\n• Generalize place value understanding for multi-digit whole numbers. Read and write multi-digit whole numbers using base-ten numerals, number names, and expanded form. Compare two multi-digit numbers based on meanings of the digits in each place, using >, =, and < symbols to record the results of comparisons. (Grade 4 expectations in this domain are limited to whole numbers less than or equal to 1,000,000.)\n\nFollow up activities to do at home:\n\n• Arrange objects in even numbers. Sorting laundry socks is a great fun way to count by twos. Make songs out of counting by 2s and counting by 3s. Count by 5s and count by 10s.\n• Go on a shape hunt in the house! How many rectangles can you find? Each window that has panes can be counted. Every drawer and cabinet can count. Make it into a game where family members predict how many rectangles there are in the house.\n• Check out the pantry. Are there circles where there are cans? Are there rectangles where there are cereal boxes? Are there triangles in the tortilla chips? Are there circles in the cookies? Make tallies of what you find. You can then make a graph comparing the amount of each shape in the house.\n• Use the symbols ” >, =, and <” to make real world comparisons. So when you lay out cereal or goldfish, make “equations” with real world objects and use the symbols.\n• Get a clean jar and fill it with beans or goldfish or cereal. Then have your child record guesses from all family members as to how many are inside. You can get in touch with extended family like grandparents on a videocall and include them in the contest! When everyone has their guesses recorded, open the jar and have your child arrange the contents in piles of ten. Then count by tens to see how many are there and add in the ones. You can have them combine the tens into hundreds piles. If you have a good jar you might have a couple hundred of the contents and it would be a really fun learning experience with real world manipulatives.\n• Go outdoors and find branches to compare. Count the leaves on each and see which is greater and which is lesser.\nIf you have a fence, count the fence posts. Compare sides and see which is lesser/greater.\n• If you live in a neighborhood with stoops, compare the number of steps in each stoop. Make a graph or map of the block and make greater/lesser comparisons.\n• Count toys or possessions to make comparisons. Compare the number of magic markers to the number of crayons, etc.\n• For young children, take a favorite stuffed animal or character and hide them under, inside and on top of things. When your child locates the object, they must say what position the object was using words like “under, inside, on top of, next to, etc.\n• Play a game where you tell your young child to show you “under” by positioning themselves as under something. Use all of the words in a game like format. Have your child tell you or other family members the position to demonstrate."
]
| [
null,
"https://bigpi.vc/wp-content/uploads/2020/06/printable-educational-board-game-for-math-ponder-up.jpg",
null,
"https://bigpi.vc/wp-content/uploads/2020/06/printable-educational-board-game-for-math-ponder-up.png",
null,
"https://bigpi.vc/wp-content/uploads/2020/06/printable-educational-board-game-for-math-ponder-up-1.png",
null,
"https://bigpi.vc/wp-content/uploads/2020/06/printable-educational-board-game-for-math-ponder-up-2.png",
null,
"https://bigpi.vc/wp-content/uploads/2020/06/printable-educational-board-game-for-math-ponder-up-3.png",
null,
"https://bigpi.vc/wp-content/uploads/2020/06/printable-educational-board-game-for-math-ponder-up-4.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9181374,"math_prob":0.9655988,"size":10864,"snap":"2022-27-2022-33","text_gpt3_token_len":2421,"char_repetition_ratio":0.14742173,"word_repetition_ratio":0.251556,"special_character_ratio":0.22938144,"punctuation_ratio":0.12857792,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96868914,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-04T06:05:12Z\",\"WARC-Record-ID\":\"<urn:uuid:566eb395-1313-4c38-87f6-ec1f539201a9>\",\"Content-Length\":\"71290\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0bba1e1a-e697-4dc8-ab4a-fd7a924643c4>\",\"WARC-Concurrent-To\":\"<urn:uuid:9f2c6f9a-bb34-49a0-9f19-d3c1c285d10d>\",\"WARC-IP-Address\":\"172.67.194.218\",\"WARC-Target-URI\":\"https://bigpi.vc/printable-educational-board-game-for-math-ponder-up/\",\"WARC-Payload-Digest\":\"sha1:W773YWQXBXMYSIYCNHRB6EHPQUC62F3I\",\"WARC-Block-Digest\":\"sha1:GVL6YDNW3SB455DIG6EV5SVETT3QBYTY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104354651.73_warc_CC-MAIN-20220704050055-20220704080055-00339.warc.gz\"}"} |
https://search.r-project.org/CRAN/refmans/animint2/html/geom_segment.html | [
"geom_segment {animint2} R Documentation\n\n## Line segments and curves.\n\n### Description\n\n`geom_segment` draws a straight line between points (x1, y1) and (x2, y2). `geom_curve` draws a curved line.\n\n### Usage\n\n```geom_segment(\nmapping = NULL,\ndata = NULL,\nstat = \"identity\",\nposition = \"identity\",\n...,\narrow = NULL,\nlineend = \"butt\",\nna.rm = FALSE,\nshow.legend = NA,\ninherit.aes = TRUE\n)\n\ngeom_curve(\nmapping = NULL,\ndata = NULL,\nstat = \"identity\",\nposition = \"identity\",\n...,\ncurvature = 0.5,\nangle = 90,\nncp = 5,\narrow = NULL,\nlineend = \"butt\",\nna.rm = FALSE,\nshow.legend = NA,\ninherit.aes = TRUE\n)\n```\n\n### Arguments\n\n `mapping` Set of aesthetic mappings created by `aes` or `aes_`. If specified and `inherit.aes = TRUE` (the default), it is combined with the default mapping at the top level of the plot. You must supply `mapping` if there is no plot mapping. `data` The data to be displayed in this layer. There are three options: If `NULL`, the default, the data is inherited from the plot data as specified in the call to `ggplot`. A `data.frame`, or other object, will override the plot data. All objects will be fortified to produce a data frame. See `fortify` for which variables will be created. A `function` will be called with a single argument, the plot data. The return value must be a `data.frame.`, and will be used as the layer data. `stat` The statistical transformation to use on the data for this layer, as a string. `position` Position adjustment, either as a string, or the result of a call to a position adjustment function. `...` other arguments passed on to `layer`. These are often aesthetics, used to set an aesthetic to a fixed value, like `color = \"red\"` or `size = 3`. They may also be parameters to the paired geom/stat. `arrow` specification for arrow heads, as created by arrow() `lineend` Line end style (round, butt, square) `na.rm` If `FALSE` (the default), removes missing values with a warning. If `TRUE` silently removes missing values. `show.legend` logical. Should this layer be included in the legends? `NA`, the default, includes if any aesthetics are mapped. `FALSE` never includes, and `TRUE` always includes. `inherit.aes` If `FALSE`, overrides the default aesthetics, rather than combining with them. This is most useful for helper functions that define both data and aesthetics and shouldn't inherit behaviour from the default plot specification, e.g. `borders`. `curvature` A numeric value giving the amount of curvature. Negative values produce left-hand curves, positive values produce right-hand curves, and zero produces a straight line. `angle` A numeric value between 0 and 180, giving an amount to skew the control points of the curve. Values less than 90 skew the curve towards the start point and values greater than 90 skew the curve towards the end point. `ncp` The number of control points used to draw the curve. More control points creates a smoother curve.\n\n### Aesthetics\n\n`geom_segment`understands the following aesthetics (required aesthetics are in bold):\n\n• x\n\n• xend\n\n• y\n\n• yend\n\n• alpha\n\n• colour\n\n• linetype\n\n• size\n\n`geom_path` and `geom_line` for multi- segment lines and paths.\n\n`geom_spoke` for a segment parameterised by a location (x, y), and an angle and radius.\n\n### Examples\n\n```b <- ggplot(mtcars, aes(wt, mpg)) +\ngeom_point()\n\ndf <- data.frame(x1 = 2.62, x2 = 3.57, y1 = 21.0, y2 = 15.0)\nb +\ngeom_curve(aes(x = x1, y = y1, xend = x2, yend = y2, colour = \"curve\"), data = df) +\ngeom_segment(aes(x = x1, y = y1, xend = x2, yend = y2, colour = \"segment\"), data = df)\n\nb + geom_curve(aes(x = x1, y = y1, xend = x2, yend = y2), data = df, curvature = -0.2)\nb + geom_curve(aes(x = x1, y = y1, xend = x2, yend = y2), data = df, curvature = 1)\nb + geom_curve(\naes(x = x1, y = y1, xend = x2, yend = y2),\ndata = df,\narrow = arrow(length = unit(0.03, \"npc\"))\n)\n\nggplot(seals, aes(long, lat)) +\ngeom_segment(aes(xend = long + delta_long, yend = lat + delta_lat),\narrow = arrow(length = unit(0.1,\"cm\"))) +\nborders(\"state\")\n\n# You can also use geom_segment to recreate plot(type = \"h\") :\ncounts <- as.data.frame(table(x = rpois(100,5)))\ncounts\\$x <- as.numeric(as.character(counts\\$x))\nwith(counts, plot(x, Freq, type = \"h\", lwd = 10))\n\nggplot(counts, aes(x, Freq)) +\ngeom_segment(aes(xend = x, yend = 0), size = 10, lineend = \"butt\")\n```\n\n[Package animint2 version 2020.9.18 Index]"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.69116646,"math_prob":0.9985007,"size":2942,"snap":"2021-31-2021-39","text_gpt3_token_len":893,"char_repetition_ratio":0.12525527,"word_repetition_ratio":0.20881227,"special_character_ratio":0.33412644,"punctuation_ratio":0.21535893,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9965162,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-28T16:33:00Z\",\"WARC-Record-ID\":\"<urn:uuid:a9de6bf4-50d0-4c3c-b5e5-0bd7026d5aaf>\",\"Content-Length\":\"7324\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8c55e81a-d481-456f-9bc7-348893fc208f>\",\"WARC-Concurrent-To\":\"<urn:uuid:a48ffee3-b5f2-4491-9ca6-b0e270674443>\",\"WARC-IP-Address\":\"137.208.57.46\",\"WARC-Target-URI\":\"https://search.r-project.org/CRAN/refmans/animint2/html/geom_segment.html\",\"WARC-Payload-Digest\":\"sha1:BKQM4ZODZ7VGTYR3VDME3MOFIAMEGE4T\",\"WARC-Block-Digest\":\"sha1:JZD6EVSSRBWAGQEHHBU5LBLHYHUS2ZNE\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780060877.21_warc_CC-MAIN-20210928153533-20210928183533-00651.warc.gz\"}"} |
https://au.mathworks.com/help/fininst/understanding-equity-trees.html | [
"Documentation\n\n## Understanding Equity Trees\n\n### Introduction\n\nFinancial Instruments Toolbox™ supports five types of recombining tree models to represent the evolution of stock prices:\n\n• Cox-Ross-Rubinstein (CRR) model\n\n• Equal probabilities (EQP) model\n\n• Leisen-Reimer (LR) model\n\n• Implied trinomial tree (ITT) model\n\n• Standard trinomial tree (STT) model\n\nFor a discussion of recombining trees, see Rate and Price Trees.\n\nThe CRR, EQP, LR, STT, and ITT models are examples of discrete time models. A discrete time model divides time into discrete bits; prices can only be computed at these specific times.\n\nThe CRR model is one of the most common methods used to model the evolution of stock processes. The strength of the CRR model lies in its simplicity. It is a good model when dealing with many tree levels. The CRR model yields the correct expected value for each node of the tree and provides a good approximation for the corresponding local volatility. The approximation becomes better as the number of time steps represented in the tree is increased.\n\nThe EQP model is another discrete time model. It has the advantage of building a tree with the exact volatility in each tree node, even with small numbers of time steps. It also provides better results than CRR in some given trading environments, for example, when stock volatility is low and interest rates are high. However, this additional precision causes increased complexity, which is reflected in the number of calculations required to build a tree.\n\nThe LR model is another discrete time model. It has the advantage of producing estimates close to the Black-Scholes model using only a few steps, while also minimizing the oscillation.\n\nThe ITT model is a CRR-style implied trinomial tree which takes advantage of prices quoted from liquid options in the market with varying strikes and maturities to build a tree that more accurately represents the market. An ITT model is commonly used to price exotic options in such a way that they are consistent with the market prices of standard options.\n\nThe STT model is another discrete time model. It is considered to produce more accurate results than the binomial model when fewer time steps are modeled. The STT model is sometimes more stable and accurate than the binomial model when pricing exotic options.\n\n### Building Equity Binary Trees\n\nThe tree of stock prices is the fundamental unit representing the evolution of the price of a stock over a given period of time. The MATLAB® functions `crrtree`, `eqptree`, and `lrtree` create CRR trees, EQP trees, and LR trees, respectively. These functions create an output tree structure along with information about the parameters used for creating the tree.\n\nThe functions `crrtree`, `eqptree`, and `lrtree` take three structures as input arguments:\n\n• The stock parameter structure `StockSpec`\n\n• The interest-rate term structure `RateSpec`\n\n• The tree time layout structure `TimeSpec`\n\n#### Calling Sequence for Equity Binary Trees\n\nThe calling syntax for `crrtree` is:\n\n`CRRTree = crrtree (StockSpec, RateSpec, TimeSpec)`\n\nSimilarly, the calling syntax for `eqptree` is:\n\n`EQPTree = eqptree (StockSpec, RateSpec, TimeSpec)`\n\nAnd, the calling syntax for `lrtree` is:\n\n`LRTree = lrtree(StockSpec, RateSpec, TimeSpec, Strike)`\n\nAll three functions require the structures `StockSpec`, `RateSpec`, and `TimeSpec` as input arguments:\n\n• `StockSpec` is a structure that specifies parameters of the stock whose price evolution is represented by the tree. This structure, created using the function `stockspec`, contains information such as the stock's original price, its volatility, and its dividend payment information.\n\n• `RateSpec` is the interest-rate specification of the initial rate curve. Create this structure with the function `intenvset`.\n\n• `TimeSpec` is the tree time layout specification. Create these structures with the functions `crrtimespec`, `eqptimespec`, and `lrtimespec`. The structures contain information regarding the mapping of relevant dates into the tree structure, plus the number of time steps used for building the tree.\n\n#### Specifying the Stock Structure for Equity Binary Trees\n\nThe structure `StockSpec` encapsulates the stock-specific information required for building the binary tree of an individual stock's price movement.\n\nYou generate `StockSpec` with the function `stockspec`. This function requires two input arguments and accepts up to three additional input arguments that depend on the existence and type of dividend payments.\n\nThe syntax for calling `stockspec` is:\n\n```StockSpec = stockspec(Sigma, AssetPrice, DividendType, ... DividendAmounts, ExDividendDates) ```\n\nwhere:\n\n• `Sigma` is the decimal annual volatility of the underlying security.\n\n• `AssetPrice` is the price of the stock at the valuation date.\n\n• `DividendType` is a character vector specifying the type of dividend paid by the stock. Allowed values are `cash`, `constant`, or `continuous`.\n\n• `DividendAmounts` has a value that depends on the specification of `DividendType`. For `DividendType` `cash`, `DividendAmounts` is a vector of cash dividends. For `DividendType` `constant`, it is a vector of constant annualized dividend yields. For `DividendType` `continuous`, it is a scalar representing a continuously annualized dividend yield.\n\n• `ExDividendDates` also has a value that depends on the nature of `DividendType`. For `DividendType` `cash` or `constant`, `ExDividendDates` is vector of dividend dates. For `DividendType` `continuous`, `ExDividendDates` is ignored.\n\n#### Stock Structure Example Using a Binary Tree\n\nConsider a stock with a price of \\$100 and an annual volatility of 15%. Assume that the stock pays three cash \\$5.00 dividends on dates January 01, 2004, July 01, 2005, and January 01, 2006. You specify these parameters in MATLAB as:\n\n```Sigma = 0.15; AssetPrice = 100; DividendType = 'cash'; DividendAmounts = [5; 5; 5]; ExDividendDates = {'jan-01-2004', 'july-01-2005', 'jan-01-2006'}; StockSpec = stockspec(Sigma, AssetPrice, DividendType, ... DividendAmounts, ExDividendDates) ```\n```StockSpec = FinObj: 'StockSpec' Sigma: 0.1500 AssetPrice: 100 DividendType: 'cash' DividendAmounts: [3x1 double] ExDividendDates: [3x1 double]```\n\n#### Specifying the Interest-Rate Term Structure for Equity Binary Trees\n\nThe `RateSpec` structure defines the interest rate environment used when building the stock price binary tree. Modeling the Interest-Rate Term Structure explains how to create these structures using the function `intenvset`, given the interest rates, the starting and ending dates for each rate, and the compounding value.\n\n#### Specifying the Tree-Time Term Structure for Equity Binary Trees\n\nThe `TimeSpec` structure defines the tree layout of the binary tree:\n\n• It maps the valuation and maturity dates to their corresponding times.\n\n• It defines the time of the levels of the tree by dividing the time span between valuation and maturity into equally spaced intervals. By specifying the number of intervals, you define the granularity of the tree time structure.\n\nThe syntax for building a `TimeSpec` structure is:\n\n```TimeSpec = crrtimespec(ValuationDate, Maturity, NumPeriods)`````` TimeSpec = eqptimespec(ValuationDate, Maturity, NumPeriods)```\n\n```TimeSpec = lrtimespec(ValuationDate, Maturity, NumPeriods)```\n\nwhere:\n\n• `ValuationDate` is a scalar date marking the pricing date and first observation in the tree (location of the root node). You enter `ValuationDate` either as a serial date number (generated with `datenum`) or a date character vector.\n\n• `Maturity` is a scalar date marking the maturity of the tree, entered as a serial date number or a date character vector.\n\n• `NumPeriods` is a scalar defining the number of time steps in the tree; for example, ```NumPeriods = 10``` implies 10 time steps and 11 tree levels (0, 1, 2, ..., 9, 10).\n\n#### `TimeSpec` Example Using a Binary Tree\n\nConsider building a CRR tree, with a valuation date of January 1, 2003, a maturity date of January 1, 2008, and 20 time steps. You specify these parameters in MATLAB as:\n\n```ValuationDate = 'Jan-1-2003'; Maturity = 'Jan-1-2008'; NumPeriods = 20; TimeSpec = crrtimespec(ValuationDate, Maturity, NumPeriods) ```\n```TimeSpec = FinObj: 'BinTimeSpec' ValuationDate: 731582 Maturity: 733408 NumPeriods: 20 Basis: 0 EndMonthRule: 1 tObs: [1x21 double] dObs: [1x21 double] ```\n\nTwo vector fields in the `TimeSpec` structure are of particular interest: `dObs` and `tObs`. These two fields represent the observation times and corresponding dates of all tree levels, with `dObs(1)` and `tObs(1)`, respectively, representing the root node (`ValuationDate`), and `dObs(end)` and `tObs(end)` representing the last tree level (`Maturity`).\n\n### Note\n\nThere is no relationship between the dates specified for the tree and the implied tree level times, and the maturities specified in the interest-rate term structure. The rates in `RateSpec` are interpolated or extrapolated as required to meet the time distribution of the tree.\n\n#### Examples of Binary Tree Creation\n\nYou can now use the `StockSpec` and `TimeSpec` structures described previously to build an equal probability tree (`EQPTree`), a CRR tree (`CRRTree`), or an LR tree (`LRTree`). First, you must define the interest-rate term structure. For this example, assume that the interest rate is fixed at 10% annually between the valuation date of the tree (January 1, 2003) until its maturity.\n\n```ValuationDate = 'Jan-1-2003'; Maturity = 'Jan-1-2008'; Rate = 0.1; RateSpec = intenvset('Rates', Rate, 'StartDates', ... ValuationDate, 'EndDates', Maturity, 'Compounding', -1); ```\n\nTo build a `CRRTree`, enter:\n\n`CRRTree = crrtree(StockSpec, RateSpec, TimeSpec)`\n```CRRTree = FinObj: 'BinStockTree' Method: 'CRR' StockSpec: [1x1 struct] TimeSpec: [1x1 struct] RateSpec: [1x1 struct] tObs: [1x21 double] dObs: [1x21 double] STree: {1x21 cell} UpProbs: [1x20 double] ```\n\nTo build an `EQPTree`, enter:\n\n`EQPTree = eqptree(StockSpec, RateSpec, TimeSpec)`\n```EQPTree = FinObj: 'BinStockTree' Method: 'EQP' StockSpec: [1x1 struct] TimeSpec: [1x1 struct] RateSpec: [1x1 struct] tObs: [1x21 double] dObs: [1x21 double] STree: {1x21 cell} UpProbs: [1x20 double] ```\n\n### Building Implied Trinomial Trees\n\nThe tree of stock prices is the fundamental unit representing the evolution of the price of a stock over a given period of time. The MATLAB function `itttree` creates an output tree structure along with the information about the parameters used to create the tree.\n\nThe function `itttree` takes four structures as input arguments:\n\n• The stock parameter structure `StockSpec`\n\n• The interest-rate term structure `RateSpec`\n\n• The tree time layout structure `TimeSpec`\n\n• The stock option specification structure `StockOptSpec`\n\n#### Calling Sequence for Implied Trinomial Trees\n\nThe calling syntax for `itttree` is:\n\n```ITTTree = itttree (StockSpec,RateSpec,TimeSpec,StockOptSpec) ```\n• `StockSpec` is a structure that specifies parameters of the stock whose price evolution is represented by the tree. This structure, created using the function `stockspec`, contains information such as the stock's original price, its volatility, and its dividend payment information.\n\n• `RateSpec` is the interest-rate specification of the initial rate curve. Create this structure with the function `intenvset`.\n\n• `TimeSpec` is the tree time layout specification. Create these structures with the function `itttimespec`. This structure contains information regarding the mapping of relevant dates into the tree structure, plus the number of time steps used for building the tree.\n\n• `StockOptSpec` is a structure containing parameters of European stock options instruments. Create this structure with the function `stockoptspec`.\n\n#### Specifying the Stock Structure for Implied Trinomial Trees\n\nThe structure `StockSpec` encapsulates the stock-specific information required for building the trinomial tree of an individual stock's price movement.\n\nYou generate `StockSpec` with the function `stockspec`. This function requires two input arguments and accepts up to three additional input arguments that depend on the existence and type of dividend payments.\n\nThe syntax for calling `stockspec` is:\n\n```StockSpec = stockspec(Sigma, AssetPrice, DividendType, ... DividendAmounts, ExDividendDates) ```\n\nwhere:\n\n• `Sigma` is the decimal annual volatility of the underlying security.\n\n• `AssetPrice` is the price of the stock at the valuation date.\n\n• `DividendType` is a character vector specifying the type of dividend paid by the stock. Allowed values are `cash`, `constant`, or `continuous`.\n\n• `DividendAmounts` has a value that depends on the specification of `DividendType`. For `DividendType` `cash`, `DividendAmounts` is a vector of cash dividends. For `DividendType` `constant`, it is a vector of constant annualized dividend yields. For `DividendType` `continuous`, it is a scalar representing a continuously annualized dividend yield.\n\n• `ExDividendDates` also has a value that depends on the nature of `DividendType`. For `DividendType` `cash` or `constant`, `ExDividendDates` is vector of dividend dates. For `DividendType` `continuous`, `ExDividendDates` is ignored.\n\n#### Stock Structure Example Using an Implied Trinomial Tree\n\nConsider a stock with a price of \\$100 and an annual volatility of 12%. Assume that the stock is expected to pay a dividend yield of 6%. You specify these parameters in MATLAB as:\n\n```So=100; DividendYield = 0.06; Sigma=.12; StockSpec = stockspec(Sigma, So, 'continuous', DividendYield)```\n```StockSpec = FinObj: 'StockSpec' Sigma: 0.1200 AssetPrice: 100 DividendType: 'continuous' DividendAmounts: 0.0600 ExDividendDates: []```\n\n#### Specifying the Interest-Rate Term Structure for Implied Trinomial Trees\n\nThe structure `RateSpec` defines the interest rate environment used when building the stock price binary tree. Modeling the Interest-Rate Term Structure explains how to create these structures using the function `intenvset`, given the interest rates, the starting and ending dates for each rate, and the compounding value.\n\n#### Specifying the Tree-Time Term Structure for Implied Trinomial Trees\n\nThe `TimeSpec` structure defines the tree layout of the trinomial tree:\n\n• It maps the valuation and maturity dates to their corresponding times.\n\n• It defines the time of the levels of the tree by dividing the time span between valuation and maturity into equally spaced intervals. By specifying the number of intervals, you define the granularity of the tree time structure.\n\nThe syntax for building a `TimeSpec` structure is:\n\n`TimeSpec = itttimespec(ValuationDate, Maturity, NumPeriods)`\n\nwhere:\n\n• `ValuationDate` is a scalar date marking the pricing date and first observation in the tree (location of the root node). You enter `ValuationDate` either as a serial date number (generated with `datenum`) or a date character vector.\n\n• `Maturity` is a scalar date marking the maturity of the tree, entered as a serial date number or a date character vector.\n\n• `NumPeriods` is a scalar defining the number of time steps in the tree; for example, ```NumPeriods = 10``` implies 10 time steps and 11 tree levels (0, 1, 2, ..., 9, 10).\n\n#### `TimeSpec` Example Using an Implied Trinomial Tree\n\nConsider building an ITT tree, with a valuation date of January 1, 2006, a maturity date of January 1, 2008, and four time steps. You specify these parameters in MATLAB as:\n\n```ValuationDate = '01-01-2006'; EndDate = '01-01-2008'; NumPeriods = 4; TimeSpec = itttimespec(ValuationDate, EndDate, NumPeriods)```\n```TimeSpec = FinObj: 'ITTTimeSpec' ValuationDate: 732678 Maturity: 733408 NumPeriods: 4 Basis: 0 EndMonthRule: 1 tObs: [0 0.5000 1 1.5000 2] dObs: [732678 732860 733043 733225 733408]```\n\nTwo vector fields in the `TimeSpec` structure are of particular interest: `dObs` and `tObs`. These two fields represent the observation times and corresponding dates of all tree levels, with `dObs(1)` and `tObs(1)`, respectively, representing the root node (`ValuationDate`), and `dObs(end)` and `tObs(end)` representing the last tree level (`Maturity`).\n\n#### Specifying the Option Stock Structure for Implied Trinomial Trees\n\nThe `StockOptSpec` structure encapsulates the option-stock-specific information required for building the implied trinomial tree. You generate `StockOptSpec` with the function `stockoptspec`. This function requires five input arguments. An optional sixth argument `InterpMethod`, specifying the interpolation method, can be included. The syntax for calling `stockoptspec` is:\n\n`[StockOptSpec] = stockoptspec(OptPrice, Strike, Settle, Maturity, OptSpec)`\n\nwhere:\n\n• `Optprice` is a `NINST`-by-`1` vector of European option prices.\n\n• `Strike` is a `NINST`-by-`1` vector of strike prices.\n\n• `Settle` is a scalar date marking the settlement date.\n\n• `Maturity` is a `NINST`-by-`1` vector of maturity dates.\n\n• `OptSpec` is a `NINST`-by-`1` cell array of character vectors for the values `'call'` or `'put'`.\n\n#### Option Stock Structure Example Using an Implied Trinomial Tree\n\nConsider the following data quoted from liquid options in the market with varying strikes and maturity. You specify these parameters in MATLAB as:\n\n```Settle = '01/01/06'; Maturity = ['07/01/06'; '07/01/06'; '07/01/06'; '07/01/06'; '01/01/07'; '01/01/07'; '01/01/07'; '01/01/07'; '07/01/07'; '07/01/07'; '07/01/07'; '07/01/07'; '01/01/08'; '01/01/08'; '01/01/08'; '01/01/08']; Strike = [113; 101; 100; 88; 128; 112; 100; 78; 144; 112; 100; 69; 162; 112; 100; 61]; OptPrice =[ 0; 4.807905472659144; 1.306321897011867; 0.048039195057173; 0; 2.310953054191461; 1.421950392866235; 0.020414826276740; 0; 5.091986935627730; 1.346534812295291; 0.005101325584140; 0; 8.047628153217246; 1.219653432150932; 0.001041436654748]; OptSpec = { 'call'; 'call'; 'put'; 'put'; 'call'; 'call'; 'put'; 'put'; 'call'; 'call'; 'put'; 'put'; 'call'; 'call'; 'put'; 'put'}; StockOptSpec = stockoptspec(OptPrice, Strike, Settle, Maturity, OptSpec)```\n```StockOptSpec = FinObj: 'StockOptSpec' OptPrice: [16x1 double] Strike: [16x1 double] Settle: 732678 Maturity: [16x1 double] OptSpec: {16x1 cell} InterpMethod: 'price'```\n\n### Note\n\nThe algorithm for building the ITT tree requires specifying option prices for all tree nodes. The maturities of those options correspond to those of the tree levels, and the strike to the prices on the tree nodes. The types of option are `Calls` for the nodes above the central nodes, and `Puts` for those below and including the central nodes.\n\nClearly, all these options will not be available in the market, hence making interpolation, and extrapolation necessary to obtain the node option prices. The degree to which the tree reflects the market will unavoidably be tied to the results of these interpolations and extrapolations. Keeping in mind that extrapolation is less accurate than interpolation, and more so the further away the extrapolated points are from the data points, the function `itttree` issues a warning with a list of the options for which extrapolation was necessary.\n\nSometimes, it may be desirable to view a list of ideal option prices to form an idea of the ranges needed. This can be achieved by calling the function `itttree` specifying only the first three input arguments. The second output argument is a structure array containing the list of ideal options needed.\n\n#### Creating an Implied Trinomial Tree\n\nYou can now use the `StockSpec`, `TimeSpec`, and `StockOptSpec` structures described in Stock Structure Example Using an Implied Trinomial Tree, TimeSpec Example Using an Implied Trinomial Tree, and Option Stock Structure Example Using an Implied Trinomial Tree to build an implied trinomial tree (ITT). First, you must define the interest rate term structure. For this example, assume that the interest rate is fixed at 8% annually between the valuation date of the tree (January 1, 2006) until its maturity.\n\n```Rate = 0.08; ValuationDate = '01-01-2006'; EndDate = '01-01-2008'; RateSpec = intenvset('StartDates', ValuationDate, 'EndDates', EndDate, ... 'ValuationDate', ValuationDate, 'Rates', Rate, 'Compounding', -1); ```\n\nTo build an `ITTTree`, enter:\n\n`ITTTree = itttree(StockSpec, RateSpec, TimeSpec, StockOptSpec)`\n```ITTTree = FinObj: 'ITStockTree' StockSpec: [1x1 struct] StockOptSpec: [1x1 struct] TimeSpec: [1x1 struct] RateSpec: [1x1 struct] tObs: [0 0.500000000000000 1 1.500000000000000 2] dObs: [732678 732860 733043 733225 733408] STree: {1x5 cell} Probs: {[3x1 double] [3x3 double] [3x5 double] [3x7 double]}```\n\n### Building Standard Trinomial Trees\n\nThe tree of stock prices is the fundamental unit representing the evolution of the price of a stock over a given period of time. The MATLAB function `stttree` creates an output tree structure along with the information about the parameters used to create the tree.\n\nThe function `stttree` takes three structures as input arguments:\n\n• The stock parameter structure `StockSpec`\n\n• The interest-rate term structure `RateSpec`\n\n• The tree time layout structure `TimeSpec`\n\n#### Calling Sequence for Standard Trinomial Trees\n\nThe calling syntax for `stttree` is:\n\n```STTTree = stttree (StockSpec,RateSpec,TimeSpec) ```\n• `StockSpec` is a structure that specifies parameters of the stock whose price evolution is represented by the tree. This structure, created using the function `stockspec`, contains information such as the stock's original price, its volatility, and its dividend payment information.\n\n• `RateSpec` is the interest-rate specification of the initial rate curve. Create this structure with the function `intenvset`.\n\n• `TimeSpec` is the tree time layout specification. Create these structures with the function `stttimespec`. This structure contains information regarding the mapping of relevant dates into the tree structure, plus the number of time steps used for building the tree.\n\n#### Specifying the Stock Structure for Standard Trinomial Trees\n\nThe structure `StockSpec` encapsulates the stock-specific information required for building the trinomial tree of an individual stock's price movement.\n\nYou generate `StockSpec` with the function `stockspec`. This function requires two input arguments and accepts up to three additional input arguments that depend on the existence and type of dividend payments.\n\nThe syntax for calling `stockspec` is:\n\n```StockSpec = stockspec(Sigma, AssetPrice, DividendType, ... DividendAmounts, ExDividendDates) ```\n\nwhere:\n\n• `Sigma` is the decimal annual volatility of the underlying security.\n\n• `AssetPrice` is the price of the stock at the valuation date.\n\n• `DividendType` is a character vector specifying the type of dividend paid by the stock. Allowed values are `cash`, `constant`, or `continuous`.\n\n• `DividendAmounts` has a value that depends on the specification of `DividendType`. For `DividendType` `cash`, `DividendAmounts` is a vector of cash dividends. For `DividendType` `constant`, it is a vector of constant annualized dividend yields. For `DividendType` `continuous`, it is a scalar representing a continuously annualized dividend yield.\n\n• `ExDividendDates` also has a value that depends on the nature of `DividendType`. For `DividendType` `cash` or `constant`, `ExDividendDates` is vector of dividend dates. For `DividendType` `continuous`, `ExDividendDates` is ignored.\n\n#### Stock Structure Example Using a Standard Trinomial Tree\n\nConsider a stock with a price of \\$100 and an annual volatility of 12%. Assume that the stock is expected to pay a dividend yield of 6%. You specify these parameters in MATLAB as:\n\n```So=100; DividendYield = 0.06; Sigma=.12; StockSpec = stockspec(Sigma, So, 'continuous', DividendYield)```\n```StockSpec = FinObj: 'StockSpec' Sigma: 0.1200 AssetPrice: 100 DividendType: 'continuous' DividendAmounts: 0.0600 ExDividendDates: []```\n\n#### Specifying the Interest-Rate Term Structure for Standard Trinomial Trees\n\nThe structure `RateSpec` defines the interest rate environment used when building the stock price binary tree. Modeling the Interest-Rate Term Structure explains how to create these structures using the function `intenvset`, given the interest rates, the starting and ending dates for each rate, and the compounding value.\n\n#### Specifying the Tree-Time Term Structure for Standard Trinomial Trees\n\nThe `TimeSpec` structure defines the tree layout of the trinomial tree:\n\n• It maps the valuation and maturity dates to their corresponding times.\n\n• It defines the time of the levels of the tree by dividing the time span between valuation and maturity into equally spaced intervals. By specifying the number of intervals, you define the granularity of the tree time structure.\n\nThe syntax for building a `TimeSpec` structure is:\n\n`TimeSpec = stttimespec(ValuationDate, Maturity, NumPeriods)`\n\nwhere:\n\n• `ValuationDate` is a scalar date marking the pricing date and first observation in the tree (location of the root node). You enter `ValuationDate` either as a serial date number (generated with `datenum`) or a date character vector.\n\n• `Maturity` is a scalar date marking the maturity of the tree, entered as a serial date number or a date character vector.\n\n• `NumPeriods` is a scalar defining the number of time steps in the tree; for example, ```NumPeriods = 10``` implies 10 time steps and 11 tree levels (0, 1, 2, ..., 9, 10).\n\n#### `TimeSpec` Example Using a Standard Trinomial Tree\n\nConsider building an STT tree, with a valuation date of January 1, 2006, a maturity date of January 1, 2008, and four time steps. You specify these parameters in MATLAB as:\n\n```ValuationDate = '01-01-2006'; EndDate = '01-01-2008'; NumPeriods = 4; TimeSpec = stttimespec(ValuationDate, EndDate, NumPeriods)```\n```TimeSpec = FinObj: 'STTTimeSpec' ValuationDate: 732678 Maturity: 733408 NumPeriods: 4 Basis: 0 EndMonthRule: 1 tObs: [0 0.5000 1 1.5000 2] dObs: [732678 732860 733043 733225 733408]```\n\nTwo vector fields in the `TimeSpec` structure are of particular interest: `dObs` and `tObs`. These two fields represent the observation times and corresponding dates of all tree levels, with `dObs(1)` and `tObs(1)`, respectively, representing the root node (`ValuationDate`), and `dObs(end)` and `tObs(end)` representing the last tree level (`Maturity`).\n\n#### Creating a Standard Trinomial Tree\n\nYou can now use the `StockSpec`, `TimeSpec` structures described in Stock Structure Example Using an Implied Trinomial Tree and TimeSpec Example Using an Implied Trinomial Tree, to build a standard trinomial tree (STT). First, you must define the interest rate term structure. For this example, assume that the interest rate is fixed at 8% annually between the valuation date of the tree (January 1, 2006) until its maturity.\n\n```Rate = 0.08; ValuationDate = '01-01-2006'; EndDate = '01-01-2008'; RateSpec = intenvset('StartDates', ValuationDate, 'EndDates', EndDate, ... 'ValuationDate', ValuationDate, 'Rates', Rate, 'Compounding', -1); ```\n\nTo build an `STTTree`, enter:\n\n`STTTree = stttree(StockSpec, RateSpec, TimeSpec)`\n```STTTree = FinObj: 'STStockTree' StockSpec: [1x1 struct] TimeSpec: [1x1 struct] RateSpec: [1x1 struct] tObs: [0 0.5000 1 1.5000 2] dObs: [732678 732860 733043 733225 733408] STree: {1x5 cell} Probs: {[3x1 double] [3x3 double] [3x5 double] [3x7 double]}```\n\n### Examining Equity Trees\n\nFinancial Instruments Toolbox uses equity binary and trinomial trees to represent prices of equity options and of underlying stocks. At the highest level, these trees have structures wrapped around them. The structures encapsulate information required to interpret information in the tree.\n\nTo examine an equity, binary, or trinomial tree, load the data in the MAT-file `deriv.mat` into the MATLAB workspace.\n\n```load deriv.mat ```\n\nDisplay the list of variables loaded from the MAT-file with the `whos` command.\n\n```Name Size Bytes Class Attributes BDTInstSet 1x1 27344 struct BDTTree 1x1 7322 struct BKInstSet 1x1 27334 struct BKTree 1x1 8532 struct CRRInstSet 1x1 21066 struct CRRTree 1x1 7086 struct EQPInstSet 1x1 21066 struct EQPTree 1x1 7086 struct HJMInstSet 1x1 27336 struct HJMTree 1x1 8334 struct HWInstSet 1x1 27334 struct HWTree 1x1 8532 struct ITTInstSet 1x1 21070 struct ITTTree 1x1 12660 struct STTInstSet 1x1 21070 struct STTTree 1x1 7782 struct ZeroInstSet 1x1 17458 struct ZeroRateSpec 1x1 2152 struct ```\n\n#### Examining a `CRRTree`\n\nYou can examine in some detail the contents of the `CRRTree` structure contained in this file.\n\n`CRRTree`\n```CRRTree = FinObj: 'BinStockTree' Method: 'CRR' StockSpec: [1x1 struct] TimeSpec: [1x1 struct] RateSpec: [1x1 struct] tObs: [0 1 2 3 4] dObs: [731582 731947 732313 732678 733043] STree: { [110.5171 90.4837] [122.1403 100 81.8731] [1x4 double] [1x5 double]} UpProbs: [0.7309 0.7309 0.7309 0.7309]```\n\nThe `Method` field of the structure indicates that this is a CRR tree, not an EQP tree.\n\nThe fields `StockSpec`, `TimeSpec`, and `RateSpec` hold the original structures passed into the function `crrtree`. They contain all the context information required to interpret the tree data.\n\nThe fields `tObs` and `dObs` are vectors containing the observation times and dates, that is, the times and dates of the levels of the tree. In this particular case, `tObs` reveals that the tree has a maturity of four years (`tObs(end) = 4`) and that it has four time steps (the length of `tObs` is five).\n\nThe field `dObs` shows the specific dates for the tree levels, with a granularity of one day. This means that all values in `tObs` that correspond to a given day from 00:00 hours to 24:00 hours are mapped to the corresponding value in `dObs`. You can use the function `datestr` to convert these MATLAB serial dates into their character vector representations.\n\nThe field `UpProbs` is a vector representing the probabilities for up movements from any node in each level. This vector has one element per tree level. All nodes for a given level have the same probability of an up movement. In the specific case being examined, the probability of an up movement is 0.7309 for all levels, and the probability for a down movement is 0.2691 (1 − 0.7309).\n\nFinally, the field `STree` contains the actual stock tree. It is represented in MATLAB as a cell array with each cell array element containing a vector of prices corresponding to a tree level. The prices are in descending order, that is, `CRRTree.STree{3}(1)` represents the topmost element of the third level of the tree, and `CRRTree.STree{3}(end)` represents the bottom element of the same level of the tree.\n\n#### Examining an `ITTTree`\n\nYou can examine in some detail the contents of the `ITTTree` structure contained in this file.\n\n`ITTTree `\n```ITTTree = FinObj: 'ITStockTree' StockSpec: [1x1 struct] StockOptSpec: [1x1 struct] TimeSpec: [1x1 struct] RateSpec: [1x1 struct] tObs: [0 1 2 3 4] dObs: [732678 733043 733408 733773 734139] STree: {1x5 cell} Probs: {[3x1 double] [3x3 double] [3x5 double] [3x7 double]}```\n\nThe fields `StockSpec`, `StockOptSpec`, `TimeSpec`, and `RateSpec` hold the original structures passed into the function `itttree`. They contain all the context information required to interpret the tree data.\n\nThe fields `tObs` and `dObs` are vectors containing the observation times and dates and the times and dates of the levels of the tree. In this particular case, `tObs` reveals that the tree has a maturity of four years (`tObs(end) = 4`) and that it has four time steps (the length of `tObs` is five).\n\nThe field `dObs` shows the specific dates for the tree levels, with a granularity of one day. This means that all values in `tObs` that correspond to a given day from 00:00 hours to 24:00 hours are mapped to the corresponding value in `dObs`. You can use the function `datestr` to convert these MATLAB serial dates into their character vector representations.\n\nThe field `Probs` is a vector representing the probabilities for movements from any node in each level. This vector has three elements per tree node. In the specific case being examined, at `tObs`= `1`, the probability for an up movement is 0.4675, and the probability for a down movement is 0.1934.\n\nFinally, the field `STree` contains the actual stock tree. It is represented in MATLAB as a cell array with each cell array element containing a vector of prices corresponding to a tree level. The prices are in descending order, that is, `ITTTree.STree{4}(1)` represents the top element of the fourth level of the tree, and `ITTTree.STree{4}(end)` represents the bottom element of the same level of the tree.\n\n#### Isolating a Specific Node for a `CRRTree`\n\nThe function `treepath` can isolate a specific set of nodes of a binary tree by specifying the path used to reach the final node. As an example, consider the nodes tapped by starting from the root node, then following a down movement, then an up movement, and finally a down movement. You use a vector to specify the path, with `1` corresponding to an up movement and `2` corresponding to a down movement. An up-down-up path is then represented as `[2 1 2]`. To obtain the values of all nodes tapped by this path, enter:\n\n`SVals = treepath(CRRTree.STree, [2 1 2])`\n```SVals = 100.0000 90.4837 100.0000 90.4837 ```\n\nThe first value in the vector `SVals` corresponds to the root node, and the last value corresponds to the final node reached by following the path indicated.\n\n#### Isolating a Specific Node for an `ITTTree`\n\nThe function `trintreepath` can isolate a specific set of nodes of a trinomial tree by specifying the path used to reach the final node. As an example, consider the nodes tapped by starting from the root node, then following an up movement, then a middle movement, and finally a down movement. You use a vector to specify the path, with `1` corresponding to an up movement, `2` corresponding to a middle movement, and `3` corresponding to a down movement. An up-down-middle-down path is then represented as `[1 3 2 3]`. To obtain the values of all nodes tapped by this path, enter:\n\n`pathSVals = trintreepath(ITTTree, [1 3 2 3])`\n```pathSVals = 50.0000 66.3448 50.0000 50.0000 37.6819```\n\nThe first value in the vector `pathSVals` corresponds to the root node, and the last value corresponds to the final node reached by following the path indicated.\n\n### Differences Between CRR and EQP Tree Structures\n\nIn essence, the structures representing CRR trees and EQP trees are similar. If you create a CRR or an EQP tree using identical input arguments, only a few of the tree structure fields differ:\n\n• The `Method` field has a value of `'CRR'` or `'EQP'` indicating the method used to build the structure.\n\n• The prices in the `STree` cell array have the same structure, but the prices within the cell array are different.\n\n• For EQP, the structure field `UpProb` always holds a vector with all elements set to 0.5, while for CRR, these probabilities are calculated based on the input arguments passed when building the tree."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7222775,"math_prob":0.9367185,"size":32363,"snap":"2019-51-2020-05","text_gpt3_token_len":8604,"char_repetition_ratio":0.15457833,"word_repetition_ratio":0.5928615,"special_character_ratio":0.2457436,"punctuation_ratio":0.14694364,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98601615,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-22T23:20:21Z\",\"WARC-Record-ID\":\"<urn:uuid:77521130-fdcb-49e9-80dc-ec49233ce06b>\",\"Content-Length\":\"134594\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:85bcbb26-68f3-4208-966d-152f20e6e0c4>\",\"WARC-Concurrent-To\":\"<urn:uuid:b228239b-fce1-414c-9e0b-c61268601070>\",\"WARC-IP-Address\":\"104.110.193.39\",\"WARC-Target-URI\":\"https://au.mathworks.com/help/fininst/understanding-equity-trees.html\",\"WARC-Payload-Digest\":\"sha1:SDBGCPM6LYLLDHL7ZI6KXWLQLSQHZGHU\",\"WARC-Block-Digest\":\"sha1:RLZM3MKCRVA3AVNO66IWPTGZQDUKPD2L\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250607596.34_warc_CC-MAIN-20200122221541-20200123010541-00275.warc.gz\"}"} |
https://www.colorhexa.com/01fd04 | [
"# #01fd04 Color Information\n\nIn a RGB color space, hex #01fd04 is composed of 0.4% red, 99.2% green and 1.6% blue. Whereas in a CMYK color space, it is composed of 99.6% cyan, 0% magenta, 98.4% yellow and 0.8% black. It has a hue angle of 120.7 degrees, a saturation of 99.2% and a lightness of 49.8%. #01fd04 color hex could be obtained by blending #02ff08 with #00fb00. Closest websafe color is: #00ff00.\n\n• R 0\n• G 99\n• B 2\nRGB color chart\n• C 100\n• M 0\n• Y 98\n• K 1\nCMYK color chart\n\n#01fd04 color description : Vivid lime green.\n\n# #01fd04 Color Conversion\n\nThe hexadecimal color #01fd04 has RGB values of R:1, G:253, B:4 and CMYK values of C:1, M:0, Y:0.98, K:0.01. Its decimal value is 130308.\n\nHex triplet RGB Decimal 01fd04 `#01fd04` 1, 253, 4 `rgb(1,253,4)` 0.4, 99.2, 1.6 `rgb(0.4%,99.2%,1.6%)` 100, 0, 98, 1 120.7°, 99.2, 49.8 `hsl(120.7,99.2%,49.8%)` 120.7°, 99.6, 99.2 00ff00 `#00ff00`\nCIE-LAB 87.125, -85.585, 82.384 35.158, 70.262, 11.824 0.3, 0.599, 70.262 87.125, 118.794, 136.092 87.125, -82.438, 106.444 83.822, -71.82, 50.312 00000001, 11111101, 00000100\n\n# Color Schemes with #01fd04\n\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #fd01fa\n``#fd01fa` `rgb(253,1,250)``\nComplementary Color\n• #7cfd01\n``#7cfd01` `rgb(124,253,1)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #01fd82\n``#01fd82` `rgb(1,253,130)``\nAnalogous Color\n• #fd017c\n``#fd017c` `rgb(253,1,124)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #8201fd\n``#8201fd` `rgb(130,1,253)``\nSplit Complementary Color\n• #fd0401\n``#fd0401` `rgb(253,4,1)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #0401fd\n``#0401fd` `rgb(4,1,253)``\n• #fafd01\n``#fafd01` `rgb(250,253,1)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #0401fd\n``#0401fd` `rgb(4,1,253)``\n• #fd01fa\n``#fd01fa` `rgb(253,1,250)``\n• #01b103\n``#01b103` `rgb(1,177,3)``\n• #01ca03\n``#01ca03` `rgb(1,202,3)``\n• #01e404\n``#01e404` `rgb(1,228,4)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #19fe1c\n``#19fe1c` `rgb(25,254,28)``\n• #33fe35\n``#33fe35` `rgb(51,254,53)``\n• #4cfe4e\n``#4cfe4e` `rgb(76,254,78)``\nMonochromatic Color\n\n# Alternatives to #01fd04\n\nBelow, you can see some colors close to #01fd04. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #3dfd01\n``#3dfd01` `rgb(61,253,1)``\n• #28fd01\n``#28fd01` `rgb(40,253,1)``\n• #13fd01\n``#13fd01` `rgb(19,253,1)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #01fd19\n``#01fd19` `rgb(1,253,25)``\n• #01fd2e\n``#01fd2e` `rgb(1,253,46)``\n• #01fd43\n``#01fd43` `rgb(1,253,67)``\nSimilar Colors\n\n# #01fd04 Preview\n\nThis text has a font color of #01fd04.\n\n``<span style=\"color:#01fd04;\">Text here</span>``\n#01fd04 background color\n\nThis paragraph has a background color of #01fd04.\n\n``<p style=\"background-color:#01fd04;\">Content here</p>``\n#01fd04 border color\n\nThis element has a border color of #01fd04.\n\n``<div style=\"border:1px solid #01fd04;\">Content here</div>``\nCSS codes\n``.text {color:#01fd04;}``\n``.background {background-color:#01fd04;}``\n``.border {border:1px solid #01fd04;}``\n\n# Shades and Tints of #01fd04\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #001300 is the darkest color, while #fefffe is the lightest one.\n\n• #001300\n``#001300` `rgb(0,19,0)``\n• #002601\n``#002601` `rgb(0,38,1)``\n• #003a01\n``#003a01` `rgb(0,58,1)``\n• #004d01\n``#004d01` `rgb(0,77,1)``\n• #006102\n``#006102` `rgb(0,97,2)``\n• #007402\n``#007402` `rgb(0,116,2)``\n• #018802\n``#018802` `rgb(1,136,2)``\n• #019b02\n``#019b02` `rgb(1,155,2)``\n• #01af03\n``#01af03` `rgb(1,175,3)``\n• #01c203\n``#01c203` `rgb(1,194,3)``\n• #01d603\n``#01d603` `rgb(1,214,3)``\n• #01e904\n``#01e904` `rgb(1,233,4)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\n• #14fe16\n``#14fe16` `rgb(20,254,22)``\n• #27fe2a\n``#27fe2a` `rgb(39,254,42)``\n• #3bfe3d\n``#3bfe3d` `rgb(59,254,61)``\n• #4efe50\n``#4efe50` `rgb(78,254,80)``\n• #62fe64\n``#62fe64` `rgb(98,254,100)``\n• #75fe77\n``#75fe77` `rgb(117,254,119)``\n• #89ff8a\n``#89ff8a` `rgb(137,255,138)``\n• #9cff9d\n``#9cff9d` `rgb(156,255,157)``\n• #b0ffb1\n``#b0ffb1` `rgb(176,255,177)``\n• #c3ffc4\n``#c3ffc4` `rgb(195,255,196)``\n• #d7ffd7\n``#d7ffd7` `rgb(215,255,215)``\n• #eaffeb\n``#eaffeb` `rgb(234,255,235)``\n• #fefffe\n``#fefffe` `rgb(254,255,254)``\nTint Color Variation\n\n# Tones of #01fd04\n\nA tone is produced by adding gray to any pure hue. In this case, #768876 is the less saturated color, while #01fd04 is the most saturated one.\n\n• #768876\n``#768876` `rgb(118,136,118)``\n• #6c926d\n``#6c926d` `rgb(108,146,109)``\n• #639b63\n``#639b63` `rgb(99,155,99)``\n• #59a55a\n``#59a55a` `rgb(89,165,90)``\n• #4faf50\n``#4faf50` `rgb(79,175,80)``\n• #45b947\n``#45b947` `rgb(69,185,71)``\n• #3cc23d\n``#3cc23d` `rgb(60,194,61)``\n• #32cc34\n``#32cc34` `rgb(50,204,52)``\n• #28d62a\n``#28d62a` `rgb(40,214,42)``\n• #1ee021\n``#1ee021` `rgb(30,224,33)``\n• #15e917\n``#15e917` `rgb(21,233,23)``\n• #0bf30e\n``#0bf30e` `rgb(11,243,14)``\n• #01fd04\n``#01fd04` `rgb(1,253,4)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #01fd04 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.54171693,"math_prob":0.7420634,"size":3654,"snap":"2023-14-2023-23","text_gpt3_token_len":1632,"char_repetition_ratio":0.13205479,"word_repetition_ratio":0.0073937154,"special_character_ratio":0.5533662,"punctuation_ratio":0.23725055,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.986733,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-01T08:40:35Z\",\"WARC-Record-ID\":\"<urn:uuid:14b1b377-b5e4-490c-a9fe-9154ba0b8464>\",\"Content-Length\":\"36082\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:09229661-3b71-4b2c-b169-0b107f697264>\",\"WARC-Concurrent-To\":\"<urn:uuid:f7c806d7-c077-45cd-850b-3f8797e4009f>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/01fd04\",\"WARC-Payload-Digest\":\"sha1:CXF5STX72APHY25KNJCAUK5EVFU3ZRS3\",\"WARC-Block-Digest\":\"sha1:67QX4PNINL6S7HKBWLR4T6N2VWMQSNDR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224647639.37_warc_CC-MAIN-20230601074606-20230601104606-00733.warc.gz\"}"} |
https://www.jiskha.com/questions/14987/a-donkey-pulls-a-cart-c-with-a-mass-of-240kg-attached-to-a-log-of-wood-w-with-a-mass | [
"# Physical Science\n\nA donkey pulls a cart(c) with a mass of 240kg, attached to a log of wood(w), with a mass of 80kg on a horizontal road. W is tied to the back of c by means of non elastic rope. The donkey applies a foce of 170N on Cart c and the system accelerates at 0,3m s-2 to the left. The force of friction on the cart in 40N. The rope has negligible mass.\nHow do I draw a diagram for cart c, indicating and labelling all the forces acting on it and how do I calculate the magnitude of the force which the rope exerts on c and the force of friction on w?\n\nThe magnitude of the force on w is...\n\n170 - friction - masscart*acceleration.\n\nThere is a flaw in this problem: the non elastic rope pulling w...technically, non elastic means it can be absorbing energy, meaning the force at the front of w may not be the same force at the back at w. I suppose your teacher did not mean this...\n\n1. 👍 0\n2. 👎 0\n3. 👁 373\n1. you are stupied\n\n1. 👍 0\n2. 👎 0\n2. How can i calculate magnitude of the force and also the force of friction on w\n\n1. 👍 0\n2. 👎 0\n3. A donkey 1 pulls a chart to the left. Then donkey 2 is also tied to the chart and pulls to the left with same force. Draw a vector diagrams showing the force the two donkey exert and rusltant force\n\n1. 👍 0\n2. 👎 0\n4. Help am confused\n\n1. 👍 0\n2. 👎 0\n\n## Similar Questions\n\n1. ### physics\n\nA 0.054-kg pet lab mouse sits on a 0.35-kg air-track cart, as shown in (Figure 1) . The cart is at rest, as is a second cart with a mass of 0.25 kg. The lab mouse now jumps to the second cart. After the jump, the 0.35-kg cart has\n\nasked by anonymous on April 18, 2017\n2. ### Physics\n\n1. The weight in the following diagram has a mass of 0.750 kg and the cart has a mass of 0.52 kg. There is a friction force of 2.1 N acting on the cart. What is the tension in the string? a. 4.4 N b. 4.3 N c. 4.1 N d. 4.2 N 2. An\n\nasked by liz on June 2, 2017\n3. ### Physics\n\nThree people pull simultaneously on a stubborn donkey. Jack pulls eastward with a force of 90.7 N, Jill pulls with 89.1 N in the northeast direction, and Jane pulls to the southeast with 175 N. (Since the donkey is involved with\n\nasked by Brianna Mathis on September 15, 2012\n4. ### Physics Help\n\nA small, 200 g cart is moving at 1.50 m/s on an air track when it collides with a larger, 2.00 kg cart at rest. After the collision, the small cart recoils at 0.890 m/s. Q: What is the speed of the large cart after the collision?\n\nasked by Cat21 on August 6, 2011\n5. ### physics\n\n1. The weight in the following diagram has a mass of 0.750 kg and the cart has a mass of 0.52 kg. There is a friction force of 2.1 N acting on the cart. What is the tension in the string? a. 4.4 N b. 4.3 N c. 4.1 N d. 4.2 N 2. An\n\nasked by liz on June 2, 2017\n1. ### Physics\n\nA cart of mass M1 = 6 kg is attached to a block of mass M2 = 3 kg by a string that passes over a frictionless pulley. The system is initially at rest and the table is frictionless. After the block has fallen a distance h = 1 m:\n\nasked by Jamila on June 13, 2006\n2. ### pals help\n\nAn air-track cart with mass m1=0.29kg and initial speed v0=0.95m/s collides with and sticks to a second cart that is at rest initially. Part A If the mass of the second cart is m2=0.55kg, how much kinetic energy is lost as a\n\nasked by alex on April 18, 2017\n3. ### Linear Algebra\n\nTwo prospectors are pulling on ropes attached around the neck of a donkey that doesn’t want to move. One prospector pulls with a force of 25 lbs, and the other pulls with a force of 50 pounds. If the angle between the ropes is\n\nasked by Emilie on February 23, 2011\n4. ### Physics\n\nAn air track cart with mass m 0.4kg and initial speed v0 = 0.7m/s collides with and sticks to a second cart that is at rest initially. If the mass of the second cart is m2 = 0.5kg, how much kinetic energy is lost as result of the\n\nasked by Ekaette on November 15, 2017\n5. ### physics\n\nA cart on a horizontal, linear track has a fan attached to it. The cart is positioned at one end of the track, and the fan is turned on. Starting from rest, the cart takes 4.22 s to travel a distance of 1.44 m. The mass of the\n\nasked by Deej on February 16, 2014\n6. ### physics\n\nA cart of mass 340 g moving on a frictionless linear air track at an initial speed of 1.2 m/s undergoes an elastic collision with an initially stationary cart of unknown mass. After the collision the first cart continues in its\n\nasked by Chris on March 3, 2007"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9366874,"math_prob":0.9461713,"size":3215,"snap":"2020-34-2020-40","text_gpt3_token_len":1031,"char_repetition_ratio":0.13547182,"word_repetition_ratio":0.2677515,"special_character_ratio":0.31570762,"punctuation_ratio":0.12339332,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96814525,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-04T23:04:17Z\",\"WARC-Record-ID\":\"<urn:uuid:6fd2a556-f35b-4e6f-af7e-9186f7cc33f4>\",\"Content-Length\":\"31095\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b501d2a7-5df2-4101-b817-156e490de46b>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc3d79d1-930e-43a7-8123-0b3c9c2e8617>\",\"WARC-IP-Address\":\"66.228.55.50\",\"WARC-Target-URI\":\"https://www.jiskha.com/questions/14987/a-donkey-pulls-a-cart-c-with-a-mass-of-240kg-attached-to-a-log-of-wood-w-with-a-mass\",\"WARC-Payload-Digest\":\"sha1:YJL6JJHZP2LESNUWO5XQYAOY6JOHXGO4\",\"WARC-Block-Digest\":\"sha1:DNSKBQ2XHYEUWYDGUQOH5A4QBNC3DCHM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439735885.72_warc_CC-MAIN-20200804220455-20200805010455-00166.warc.gz\"}"} |
https://www.tenlong.com.tw/products/9789811063909 | [
"",
null,
"# Representations of Lie Algebras and Partial Differential Equations\n\n### Xiaoping Xu\n\n• 出版商:\n• 出版日期: 2017-10-24\n• 售價: \\$5,980\n• 貴賓價: 9.5\\$5,681\n• 語言: 英文\n• 頁數: 620\n• 裝訂: Hardcover\n• ISBN: 9811063907\n• ISBN-13: 9789811063909\n• 下單後立即進貨 (約3~6週)\n\n## 商品描述\n\nThis book provides explicit representations of finite-dimensional simple Lie algebras, related partial differential equations, linear orthogonal algebraic codes, combinatorics and algebraic varieties, summarizing the author’s works and his joint works with his former students. Further, it presents various oscillator generalizations of the classical representation theorem on harmonic polynomials, and highlights new functors from the representation category of a simple Lie algebra to that of another simple Lie algebra.\n\nPartial differential equations play a key role in solving certain representation problems. The weight matrices of the minimal and adjoint representations over the simple Lie algebras of types E and F are proved to generate ternary orthogonal linear codes with large minimal distances. New multi-variable hypergeometric functions related to the root systems of simple Lie algebras are introduced in connection with quantum many-body systems in one dimension. In addition, the book identifies certain equivalent combinatorial properties on representation formulas, and the irreducibility of representations is proved directly related to algebraic varieties. The book offers a valuable reference guide for mathematicians and scientists alike. As it is largely self-contained – readers need only a minimal background in calculus and linear algebra – it can also be used as a textbook."
]
| [
null,
"https://www.facebook.com/tr",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.85570157,"math_prob":0.9204949,"size":1650,"snap":"2022-05-2022-21","text_gpt3_token_len":385,"char_repetition_ratio":0.14945322,"word_repetition_ratio":0.0,"special_character_ratio":0.20484848,"punctuation_ratio":0.104477614,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9696094,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-23T09:22:53Z\",\"WARC-Record-ID\":\"<urn:uuid:2305ee4a-8761-455a-9981-a5f6b5adf37e>\",\"Content-Length\":\"89519\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:060c6c65-1c0b-4045-8f1f-c85399af9108>\",\"WARC-Concurrent-To\":\"<urn:uuid:2ceb0aeb-d582-4ac4-a317-b90e6250b6f4>\",\"WARC-IP-Address\":\"104.199.204.223\",\"WARC-Target-URI\":\"https://www.tenlong.com.tw/products/9789811063909\",\"WARC-Payload-Digest\":\"sha1:64F3DOQGRAF672ATUCVA2KXGAFGIG7RQ\",\"WARC-Block-Digest\":\"sha1:UM2ZBCBDWYMWM7AMJUZBEOJTZTQWGR4P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662556725.76_warc_CC-MAIN-20220523071517-20220523101517-00710.warc.gz\"}"} |
https://www.papertrell.com/apps/preview/The-Handy-Math-Answer-Book/Handy%20Answer%20book/What-are-quartic-equations/001137022/content/SC/52cb003182fad14abfa5c2e0_default.html | [
"# What are quartic equations?\n\nQuartic equations are polynomial equations whose highest power of the unknown variable is four. Or put another way, quartic equations are algebraic equations whose highest exponent (or degree or order) is four. But take note: Quartic equations are not the same as quadratic equations—or second degree equations in one variable—so don’t mix them up.\n\nClose\n\nThis is a web preview of the \"The Handy Math Answer Book\" app. Many features only work on your mobile device. If you like what you see, we hope you will consider buying. Get the App"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9356501,"math_prob":0.9975214,"size":409,"snap":"2021-04-2021-17","text_gpt3_token_len":85,"char_repetition_ratio":0.23950617,"word_repetition_ratio":0.0,"special_character_ratio":0.18337408,"punctuation_ratio":0.08571429,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99816173,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-15T01:51:46Z\",\"WARC-Record-ID\":\"<urn:uuid:43fff489-6b19-430f-9a26-e49501efe59e>\",\"Content-Length\":\"9814\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:796b705d-fd93-408f-93d2-edb280a54ff4>\",\"WARC-Concurrent-To\":\"<urn:uuid:f86a5a09-3a83-406a-ae01-fd85f597fa91>\",\"WARC-IP-Address\":\"54.243.128.49\",\"WARC-Target-URI\":\"https://www.papertrell.com/apps/preview/The-Handy-Math-Answer-Book/Handy%20Answer%20book/What-are-quartic-equations/001137022/content/SC/52cb003182fad14abfa5c2e0_default.html\",\"WARC-Payload-Digest\":\"sha1:GRW33XASX44VS46OPCJSRO3LAKRMAW62\",\"WARC-Block-Digest\":\"sha1:DEN5ZHEBBJ2NTRL6RETJRWCK44QVCWCO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038082988.39_warc_CC-MAIN-20210415005811-20210415035811-00359.warc.gz\"}"} |
https://tools.timodenk.com/quadratic-interpolation | [
"Performs and visualizes a quadratic interpolation for a given set of points.\n\nSyntax for entering a set of points: Spaces separate x- and y-values of a point and a Newline distinguishes the next point. Hit the button Show example to see a demo.\n\n### Equation\n\nTo get the additional information which is required to perform a quadratic interpolation the algorithm considers the first sub-function to be linear.\n\nx-value\n\n### Graph\n\nmath interpolation quadratic function points x y"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7982446,"math_prob":0.99057025,"size":714,"snap":"2019-13-2019-22","text_gpt3_token_len":150,"char_repetition_ratio":0.15915494,"word_repetition_ratio":0.0,"special_character_ratio":0.17086835,"punctuation_ratio":0.057377048,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9817422,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-21T22:26:28Z\",\"WARC-Record-ID\":\"<urn:uuid:f2d28293-38a9-4588-9e99-7175fff9195c>\",\"Content-Length\":\"8268\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bc78f2e7-13e9-461e-88b1-3940ee0fd5dd>\",\"WARC-Concurrent-To\":\"<urn:uuid:b83d8741-3717-4e7a-b37e-63c17a2019f3>\",\"WARC-IP-Address\":\"207.154.249.57\",\"WARC-Target-URI\":\"https://tools.timodenk.com/quadratic-interpolation\",\"WARC-Payload-Digest\":\"sha1:OE47S22SRFWBZYC7HH26I7653W3ODOEA\",\"WARC-Block-Digest\":\"sha1:CIB7AH2MA2KTM5UZKG4PMBKFZZTYBCMY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202572.7_warc_CC-MAIN-20190321213516-20190321235516-00123.warc.gz\"}"} |
https://developer.aliyun.com/article/652399 | [
"# 用浏览器训练Tensorflow.js模型的18个技巧(上)",
null,
"Web训练高效的深度学模型",
null,
"",
null,
"### 网络架构\n\n#### 2.采用深度可分的卷积!",
null,
"MobileNetXception采用了深度可分离卷积的思想,你可以在MobileNetPoseNet的tensorflow.js模型中找到它们。深度可分离卷积是否导致模型不太准确可能是一个公开的辩论,但根据我的经验,它们绝对是网络模型的方式。\n\nexport type ConvParams = {\nfilter: tf.Tensor4D\nbias: tf.Tensor1D\n}\nexport function convLayer(\nx: tf.Tensor4D,\nparams: ConvParams,\nstride: [number, number],\n): tf.Tensor4D {\nreturn tf.tidy(() => {\nlet out = tf.conv2d(x, params.filter, stride, padding)\nreturn out\n})\n}\n\nexport type SeparableConvParams = {\ndepthwise_filter: tf.Tensor4D\npointwise_filter: tf.Tensor4D\nbias: tf.Tensor1D\n}\nexport function depthwiseSeparableConv(\nx: tf.Tensor4D,\nparams: SeparableConvParams,\nstride: [number, number],\n): tf.Tensor4D {\nreturn tf.tidy(() => {\nlet out = tf.separableConv2d(x, params.depthwise_filter: tf.Tensor4D, params.pointwise_filter, stride, padding)\nreturn out\n})\n}\n\n#### 3.跳过连接(Skip connections)和密集连接(Densely Connected)的块\n\nResNet和DenseNet中使用的跳过连接允许它们构建更深层的体系结构,同时减轻梯度消失问题。我们所要做的就是在应用激活函数之前,将先前层的输出添加到位于网络中更深层的层输入中:",
null,
"4",
null,
"5\n\nexport type DenseBlock4Params = {\nconv0: SeparableConvParams | ConvParams\nconv1: SeparableConvParams\nconv2: SeparableConvParams\nconv3: SeparableConvParams\n}\n\nexport function denseBlock4(\nx: tf.Tensor4D,\ndenseBlockParams: DenseBlock4Params,\nisFirstLayer: boolean = false\n): tf.Tensor4D {\nreturn tf.tidy(() => {\nconst out0 = isFirstLayer\n? convLayer(x, denseBlockParams.conv0 as ConvParams, [2, 2], 'same')\n: depthwiseSeparableConv(x, denseBlockParams.conv0 as SeparableConvParams, [2, 2], 'same')\nas tf.Tensor4D\nconst in1 = tf.relu(out0) as tf.Tensor4D\nconst out1 = depthwiseSeparableConv(in1, denseBlockParams.conv1, [1, 1], 'same')\n\n// first join\nconst in2 = tf.relu(tf.add(out0, out1)) as tf.Tensor4D\nconst out2 = depthwiseSeparableConv(in2, denseBlockParams.conv2, [1, 1], 'same')\n\n// second join\nconst out3 = depthwiseSeparableConv(in3, denseBlockParams.conv3, [1, 1], 'same')\n\n// final join\n})\n}\n\n#### 4.使用ReLU类型激活函数!\n\nexport function leakyRelu(x: tf.Tensor, epsilon: number) {\nreturn tf.tidy(() => {\nconst min = tf.mul(x, tf.scalar(epsilon))\nreturn tf.maximum(x, min)\n})\n}\n\nexport function relu6(x: tf.Tensor) {\nreturn tf.clipByValue(x, 0, 6)\n}\n\n### 训练\n\nconst optimizer = tf.train.adam(0.001)\n\n#### 6.调整学习率",
null,
"6\n\n#### 7.权重初始化\n\nconst initializer = tf.initializers.glorotNormal()\nconst depthwise_filter = initializer.apply([3, 3, 32, 1])\nconst pointwise_filter = initializer.apply([1, 1, 32, 64])\nconst bias = tf.zeros()",
null,
"",
null,
"",
null,
"使用钉钉扫一扫加入圈子\n+ 订阅"
]
| [
null,
"https://yqfile.alicdn.com/5485e405b8b077695d570df802d038f6415f195c.jpeg",
null,
"https://yqfile.alicdn.com/7d2477a4549606ad5f719eff563f1a347c13e287.png",
null,
"https://yqfile.alicdn.com/a4be8d92ebe16ed1bd30136626ff234d90d1cffe.jpeg",
null,
"https://yqfile.alicdn.com/e8e2044c8e77a97414a7a89d7a29847477bf4708.png",
null,
"https://yqfile.alicdn.com/bfb42d9171a898c0e1a54d6ec6927aee69b782d0.png",
null,
"https://yqfile.alicdn.com/7bae3ee89df7bd29253b428c4b7efda42691716e.png",
null,
"https://yqfile.alicdn.com/c2de25c2a1ecbbd1ea67c7dfdb94647ed52a8363.png",
null,
"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADwAAAA8CAIAAAC1nk4lAAABwElEQVR42u2Z246DQAxD+f+f3n2rEBMfhyFBrRQeqgrawWRs58Lx94PHMaAH9IAe0AN6QA/oFOgjOj7nz7+5/Phz6bzU+YtauQZ0eCYEt947xMcrl4G+xJhvCfjWFdaVG0GH4QljfHmS/MotoEMqrzFWUNpBq5uFZADCXP7YyGnlHs8/u9wj+TAh11mI7ckljDHsgPVHdaYMdMaqQ88O9Wp9pp7Tyo/XS7AnSp31lmf1vgK1pp40xwLQKkGsZODt2ojxjhDBrSF+mVjUg4bKQdmI2pN1K0KZlglRxT7D2ufie5RcwCtUWoESvNE9QGSZEhTIvZcab4AOyyOVR+zz9FqerePAB5Md192o36aHTTQQ4JDELT6tWKHKD5vPX+K0Aqd6QdsQQFYqtjzIGqr52yhFioXItbUtDEEbLZy2VGYLB/fYCPNtTtsWhucH3OG2TJggpYHyWANdnAZb5ZEXWM12H17QjdtyL0ODxoyoosJJhLNpbz2d7AuhcrIr9HIadtlKlnucV0FnJtPct98tQp6CtpNFqPi2tfiI03YwkJl42O6m3j24/7Wvad6emn71260BPaAH9IAe0AN6QH/p8Q9AtNv0ZV7xAAAAAABJRU5ErkJgggAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==",
null,
"https://ucc.alicdn.com/pic/developer-ecology/f3cb3a49590542218c2a132c7f934393.png",
null,
"https://ucc.alicdn.com/pic/developer-ecology/53408f26933649ff809904e5aea257a2.png",
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.8251057,"math_prob":0.968928,"size":5674,"snap":"2021-31-2021-39","text_gpt3_token_len":3976,"char_repetition_ratio":0.12627865,"word_repetition_ratio":0.13793103,"special_character_ratio":0.19809659,"punctuation_ratio":0.21447368,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97678465,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-02T06:30:25Z\",\"WARC-Record-ID\":\"<urn:uuid:b103ac26-2d73-4d21-be01-e5344dbf72e9>\",\"Content-Length\":\"54569\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8addc7e7-e759-4a7a-8d3b-3361d4d99e49>\",\"WARC-Concurrent-To\":\"<urn:uuid:3be0ba39-f690-4a30-9765-0f3e9bca2638>\",\"WARC-IP-Address\":\"140.205.135.3\",\"WARC-Target-URI\":\"https://developer.aliyun.com/article/652399\",\"WARC-Payload-Digest\":\"sha1:GUI57R5EZBULKMN4CLWU6CTD52JEHKEZ\",\"WARC-Block-Digest\":\"sha1:TI7NDYD6SQJFEHIUUO4YS5UNGCC26XET\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154304.34_warc_CC-MAIN-20210802043814-20210802073814-00029.warc.gz\"}"} |
https://www.geeksforgeeks.org/minimum-insertions-sort-array/ | [
"# Minimum insertions to sort an array\n\nGiven an array of integer numbers, we need to sort this array in a minimum number of steps where in one step we can insert any array element from its position to any other position.\nExamples :\n\n```Input : arr[] = [2, 3, 5, 1, 4, 7, 6]\nOutput : 3\nWe can sort above array in 3 insertion\nsteps as shown below,\n1 before array value 2\n4 before array value 5\n6 before array value 7\n\nInput : arr[] = {4, 6, 5, 1}\nOutput : 2\n```\n\n## Recommended: Please solve it on “PRACTICE ” first, before moving on to the solution.\n\nWe can solve this problem using dynamic programming. The main thing to observe is that moving an element doesn’t change the relative order of elements other than the element which is being moved. Now consider longest increasing subsequence (LIS) in which equal element are also taken as part of the increasing sequence, now if keep the element of this increasing sequence as it is and move all other elements then it will take the least number of steps because we have taken longest subsequence which does not need to be moved. Finally, the answer will be the size of the array minus the size of the longest increasing subsequence.\nAs LIS problem can be solved in O(N^2) with O(N) extra space using Dynamic Programming.\n\nBelow is the implementation of above idea.\n\n## C++\n\n `// C++ program to get minimum number of insertion ` `// steps to sort an array ` `#include ` `using` `namespace` `std; ` ` ` `// method returns min steps of insertion we need ` `// to perform to sort array 'arr' ` `int` `minInsertionStepToSortArray(``int` `arr[], ``int` `N) ` `{ ` ` ``// lis[i] is going to store length of lis ` ` ``// that ends with i. ` ` ``int` `lis[N]; ` ` ` ` ``/* Initialize lis values for all indexes */` ` ``for` `(``int` `i = 0; i < N; i++) ` ` ``lis[i] = 1; ` ` ` ` ``/* Compute optimized lis values in bottom up manner */` ` ``for` `(``int` `i = 1; i < N; i++) ` ` ``for` `(``int` `j = 0; j < i; j++) ` ` ``if` `(arr[i] >= arr[j] && lis[i] < lis[j] + 1) ` ` ``lis[i] = lis[j] + 1; ` ` ` ` ``/* The overall LIS must end with of the array ` ` ``elements. Pick maximum of all lis values */` ` ``int` `max = 0; ` ` ``for` `(``int` `i = 0; i < N; i++) ` ` ``if` `(max < lis[i]) ` ` ``max = lis[i]; ` ` ` ` ``// return size of array minus length of LIS ` ` ``// as final result ` ` ``return` `(N - max); ` `} ` ` ` `// Driver code to test above methods ` `int` `main() ` `{ ` ` ``int` `arr[] = {2, 3, 5, 1, 4, 7, 6}; ` ` ``int` `N = ``sizeof``(arr) / ``sizeof``(arr); ` ` ``cout << minInsertionStepToSortArray(arr, N); ` ` ``return` `0; ` `} `\n\n## Java\n\n `// Java program to get minimum number of insertion ` `// steps to sort an array ` `class` `Main ` `{ ` ` ` ` ``// method returns min steps of insertion we need ` ` ``// to perform to sort array 'arr' ` ` ``static` `int` `minInsertionStepToSortArray(``int` `arr[], ``int` `N) ` ` ``{ ` ` ``// lis[i] is going to store length of lis ` ` ``// that ends with i. ` ` ``int``[] lis = ``new` `int``[N]; ` ` ` ` ``/* Initialize lis values for all indexes */` ` ``for` `(``int` `i = ``0``; i < N; i++) ` ` ``lis[i] = ``1``; ` ` ` ` ``/* Compute optimized lis values in bottom up manner */` ` ``for` `(``int` `i = ``1``; i < N; i++) ` ` ``for` `(``int` `j = ``0``; j < i; j++) ` ` ``if` `(arr[i] >= arr[j] && lis[i] < lis[j] + ``1``) ` ` ``lis[i] = lis[j] + ``1``; ` ` ` ` ``/* The overall LIS must end with of the array ` ` ``elements. Pick maximum of all lis values */` ` ``int` `max = ``0``; ` ` ``for` `(``int` `i = ``0``; i < N; i++) ` ` ``if` `(max < lis[i]) ` ` ``max = lis[i]; ` ` ` ` ``// return size of array minus length of LIS ` ` ``// as final result ` ` ``return` `(N - max); ` ` ``} ` ` ` ` ``// Driver code to test above methods ` ` ``public` `static` `void` `main (String[] args) ` ` ``{ ` ` ``int` `arr[] = {``2``, ``3``, ``5``, ``1``, ``4``, ``7``, ``6``}; ` ` ``int` `N = arr.length; ` ` ``System.out.println(minInsertionStepToSortArray(arr, N)); ` ` ``} ` `} ` ` ` `/* This code is contributed by Harsh Agarwal */`\n\n## Python 3\n\n `# Python3 program to get minimum number ` `# of insertion steps to sort an array ` ` ` `# method returns min steps of insertion ` `# we need to perform to sort array 'arr' ` `def` `minInsertionStepToSortArray(arr, N): ` ` ` ` ``# lis[i] is going to store length ` ` ``# of lis that ends with i. ` ` ``lis ``=` `[``0``] ``*` `N ` ` ` ` ``# Initialize lis values for all indexes ` ` ``for` `i ``in` `range``(N): ` ` ``lis[i] ``=` `1` ` ` ` ``# Compute optimized lis values in ` ` ``# bottom up manner ` ` ``for` `i ``in` `range``(``1``, N): ` ` ``for` `j ``in` `range``(i): ` ` ``if` `(arr[i] >``=` `arr[j] ``and` ` ``lis[i] < lis[j] ``+` `1``): ` ` ``lis[i] ``=` `lis[j] ``+` `1` ` ` ` ``# The overall LIS must end with of the array ` ` ``# elements. Pick maximum of all lis values ` ` ``max` `=` `0` ` ``for` `i ``in` `range``(N): ` ` ``if` `(``max` `< lis[i]): ` ` ``max` `=` `lis[i] ` ` ` ` ``# return size of array minus length ` ` ``# of LIS as final result ` ` ``return` `(N ``-` `max``) ` ` ` `# Driver Code ` `if` `__name__ ``=``=` `\"__main__\"``: ` ` ``arr ``=` `[``2``, ``3``, ``5``, ``1``, ``4``, ``7``, ``6``] ` ` ``N ``=` `len``(arr) ` ` ``print` `(minInsertionStepToSortArray(arr, N)) ` ` ` `# This code is contributed by ita_c `\n\n## C#\n\n `// C# program to get minimum number of ` `// insertion steps to sort an array ` `using` `System; ` ` ` `class` `GfG { ` ` ` ` ``// method returns min steps of insertion ` ` ``// we need to perform to sort array 'arr' ` ` ``static` `int` `minInsertionStepToSortArray( ` ` ``int` `[]arr, ``int` `N) ` ` ``{ ` ` ` ` ``// lis[i] is going to store length ` ` ``// of lis that ends with i. ` ` ``int``[] lis = ``new` `int``[N]; ` ` ` ` ``/* Initialize lis values for all ` ` ``indexes */` ` ``for` `(``int` `i = 0; i < N; i++) ` ` ``lis[i] = 1; ` ` ` ` ``/* Compute optimized lis values in ` ` ``bottom up manner */` ` ``for` `(``int` `i = 1; i < N; i++) ` ` ``for` `(``int` `j = 0; j < i; j++) ` ` ``if` `(arr[i] >= arr[j] && ` ` ``lis[i] < lis[j] + 1) ` ` ``lis[i] = lis[j] + 1; ` ` ` ` ``/* The overall LIS must end with of ` ` ``the array elements. Pick maximum ` ` ``of all lis values */` ` ``int` `max = 0; ` ` ` ` ``for` `(``int` `i = 0; i < N; i++) ` ` ``if` `(max < lis[i]) ` ` ``max = lis[i]; ` ` ` ` ``// return size of array minus length ` ` ``// of LIS as final result ` ` ``return` `(N - max); ` ` ``} ` ` ` ` ``// Driver code to test above methods ` ` ``public` `static` `void` `Main (String[] args) ` ` ``{ ` ` ``int` `[]arr = {2, 3, 5, 1, 4, 7, 6}; ` ` ``int` `N = arr.Length; ` ` ` ` ``Console.Write( ` ` ``minInsertionStepToSortArray(arr, N)); ` ` ``} ` `} ` ` ` `// This code is contributed by parashar. `\n\n## PHP\n\n `= ``\\$arr``[``\\$j``] && ` ` ``\\$lis``[``\\$i``] < ``\\$lis``[``\\$j``] + 1) ` ` ` ` ``\\$lis``[``\\$i``] = ``\\$lis``[``\\$j``] + 1; ` ` ` ` ``/* The overall LIS must end with ` ` ``of the array elements. Pick ` ` ``maximum of all lis values */` ` ``\\$max` `= 0; ` ` ``for` `(``\\$i` `= 0; ``\\$i` `< ``\\$N``; ``\\$i``++) ` ` ``if` `(``\\$max` `< ``\\$lis``[``\\$i``]) ` ` ``\\$max` `= ``\\$lis``[``\\$i``]; ` ` ` ` ``// return size of array minus ` ` ``// length of LIS as final result ` ` ``return` `(``\\$N` `- ``\\$max``); ` `} ` ` ` `// Driver code ` `\\$arr` `= ``array``(2, 3, 5, 1, 4, 7, 6); ` `\\$N` `= sizeof(``\\$arr``) / sizeof(``\\$arr``); ` `echo` `minInsertionStepToSortArray(``\\$arr``, ``\\$N``); ` ` ` `// This code is contributed by nitin mittal ` `?> `\n\nOutput :\n\n```3\n```\n\nThis article is contributed by Utkarsh Trivedi. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to [email protected]. See your article appearing on the GeeksforGeeks main page and help other Geeks.\n\nPlease write comments if you find anything incorrect, or you want to share more information about the topic discussed above.\n\nMy Personal Notes arrow_drop_up\n\nArticle Tags :\nPractice Tags :\n\n3\n\nPlease write to us at [email protected] to report any issue with the above content."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.626921,"math_prob":0.94538283,"size":7976,"snap":"2019-35-2019-39","text_gpt3_token_len":2430,"char_repetition_ratio":0.13008028,"word_repetition_ratio":0.3791209,"special_character_ratio":0.32948846,"punctuation_ratio":0.11445013,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9990916,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-17T08:38:57Z\",\"WARC-Record-ID\":\"<urn:uuid:6b6678bf-6a2a-4b2b-b0cf-2cf2d0d19262>\",\"Content-Length\":\"147156\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ed71c474-6f77-4b47-a686-9e9b696895dc>\",\"WARC-Concurrent-To\":\"<urn:uuid:7d6b0ba7-1f29-43d7-8e39-a0fa54499e50>\",\"WARC-IP-Address\":\"104.96.221.65\",\"WARC-Target-URI\":\"https://www.geeksforgeeks.org/minimum-insertions-sort-array/\",\"WARC-Payload-Digest\":\"sha1:3TLK346FBHYEQHH3SW6UHPZ4B6QUGWMK\",\"WARC-Block-Digest\":\"sha1:QNDBUH4BZEIC6NXSIY7UZUBFWZMQJO2N\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514573065.17_warc_CC-MAIN-20190917081137-20190917103137-00070.warc.gz\"}"} |
http://www.przyjacieleoblubienca.pl/revelation-nlt-tnbcpru/ac162a-wavelength-of-first-line-of-balmer-series | [
"The Balmer series is characterized by the electron transitioning from n ≥ 3 to n = 2, where n refers to the radial quantum number or principal quantum number of the electron. the first line of balmer series of he ion has a wavelength of 164 nm the wavelength of the series limit is - Chemistry - TopperLearning.com | crc8ue00 Wavelength of photon emitted due to transition in H-atom λ 1 = R (n 1 2 1 − n 2 2 1 ) Shortest wavelength is emitted in Balmer series if the transition of electron takes place from n 2 = ∞ to n 1 = 2 . The Balmer series in a hydrogen atom relates the possible electron transitions down to the n = 2 position to the wavelength of the emission that scientists observe. Pls. Explanation: No explanation available. For example, there are six named series of spectral lines for hydrogen, one of which is the Balmer Series. 154AP: In the beginning of the twentieth century, some scientists thought ... 2QP: What are the units for energy commonly employed in chemistry? The wavelength of the first line in the Balmer series of hydrogen spectrum. E. Determine the photon energy (in electron volts) of the second line in the Balmer series. Nov 07,2020 - The wavelength of the first spectral line in the Balmer series of hydrogen atom is 6561 Å. Information given This site is using cookies under cookie policy. line indicates transition from 4 --> 2. line indicates transition from 3 -->2. 75E: Let ?X ?have a Weibull distribution with the pdf from Expression (4... Ronald E. Walpole; Raymond H. Myers; Sharon L. Myers; Key... Probability and Statistics for Engineers and the Scientists, Chapter 4: Introductory Chemistry | 5th Edition, Chapter 5: Introductory Chemistry | 5th Edition, Chapter 14: Conceptual Physics | 12th Edition, Chapter 16: Conceptual Physics | 12th Edition, Chapter 35: Conceptual Physics | 12th Edition, Chapter 2.2: Discrete Mathematics and Its Applications | 7th Edition, Discrete Mathematics and Its Applications, 2901 Step-by-step solutions solved by professors and subject experts, Get 24/7 help from StudySoup virtual teaching assistants. What is the energy difference between the two energy levels involved in the emission that results in this spectral line? As wavelength is cannot be negative. The Balmer series of atomic hydrogen. Answer Save. Calculate the wavelength of first and limiting lines in Balmer series. The wavelength of first line of Lyman series will be : Options (a) 1215.4Å (b) 2500Å (c) 7500Å (d) 600Å. If the wavelength of the first line of the Balmer series of hydrogen is 6561 Å, the wavelength of the second line of the series should be (A) 13122 What is the energy difference between the two energy levels involved in the emission that results in this spectral line? let λ be represented by L. Using the following relation for wavelength; For 4-->2 transition. Correct Answer: 1215.4Å. These lines are emitted when the electron in the hydrogen atom transitions from the n = 3 or greater orbital down to the n = 2 orbital. The first line of the Balmer series occurs at a wavelength of 656.3 nm. The first line of the Balmer series occurs at a wavelength of 656.3 \\\\mathrm{nm} . The transitions are named sequentially by Greek letter: n = 3 to n = 2 is called H-α, 4 to 2 is H-β, 5 to 2 is H-γ, and 6 to 2 is H-δ. If the transitions terminate instead on the n =1 orbit, the energy differences are greater and the radiations fall in the ultraviolet part of the spectrum. ¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯∣∣ ∣ ∣ a a 1 λ = R( 1 n2 1 − 1 n2 2) a a∣∣ ∣ ∣ −−−−−−−−−−−−−−−−−−−−−−−. Express your answer using five significant figures. The first line of the Balmer series occurs at a wavelength of 656.3 nm. Enter your email below to unlock your verified solution to: The first line of the Balmer series occurs at a wavelength, Chemistry: Atoms First - 1 Edition - Chapter 3 - Problem 47qp. As En = - 13.6n3 eVAt ground level (n = 1), E1 = - 13.612 = - 13.6 eVAt first excited state (n= 2), E2 = - 13.622 = - 3.4 eVAs hv = E2 - E1 = - 3.4 + 13.6 = 10.2 eV = 1.6 × 10-19 × 10.2 = 1.63 × 10-18 JAlso, c = vλSo λ = cv = chE2 - E1 = (3 x 108) x (6.63 x 10-34)1.63 x 10-18 = 1.22 × 10-7 m ≈ 122 nm D. In what part of the electromagnetic spectrum do this line appear? The first member of the Balmer series of hydrogen atom has a wavelength of 6561 Å. Calculate the wavelengths of the first three lines in the Balmer series for hydrogen. Name of Line nf ni Symbol Wavelength Balmer Alpha 2 3 Hα 656.28 nm You can specify conditions of storing and accessing cookies in your browser, Calculate the wavelength of the first and last line in the balmer series of hydrogen spectrum, 11. The wavelength of the last line in the Balmer series of hydrogen spectrum. 1 decade ago. Solution: For maximum wavelength in the Balmer series, n 2 = 3 and n 1 = 2. The wavelength of the first line in the Balmer series of hydrogen spectrum. Problem 18 Medium Difficulty (a) Which line in the Balmer series is the first one in the UV part of the spectrum? As wavelength is … :) If your not sure how to do it all the way, at least get it going please. The visible light spectrum for the Balmer Series appears as spectral lines at 410, 434, 486, and 656 nm. The constant for Balmer's equation is 3.2881 × 10 15 s-1. 1 answer. The wavelength is given by the Rydberg formula. The ratio of wavelengths of the last line of Balmer series and the last line of Lyman series … (b) How many Balmer series lines are in the visible part of the spectrum? 4 Answers. What is the energy difference between the two energy levels involved in the e… The Balmer Series of spectral lines occurs when electrons transition from an energy level higher than n = 3 back down to n = 2. In quantum physics, when electrons transition between different energy levels around the atom (described by the principal quantum number, n ) they either release or absorb a photon. The wavelength of the last line in the Balmer series of hydrogen spectrum. The straight lines originating on the n =3, 4, and 5 orbits and terminating on the n = 2 orbit represent transitions in the Balmer series. Balmer Series – Some Wavelengths in the Visible Spectrum. When n = 3, Balmer’s formula gives λ = 656.21 nanometres (1 nanometre = 10 −9 metre), the wavelength of the line designated H α, the first member of the series (in the red region of the spectrum), and when n = ∞, λ = 4/ R, the series limit (in the ultraviolet). What is the energy difference between the two energy levels involved in the emission that results in this spectral line? C. Determine the wavelength of the first line in the Balmer series. The wavelengths of these lines are given by 1/λ = R H (1/4 − 1/n 2), where λ is the wavelength, R H is the Rydberg constant, and n is the level of the original orbital. 7%. As the first spectral lines associated with this series are located in the visible part of the electromagnetic spectrum, these lines are historically referred to as \"H-alpha\", \"H-beta\", \"H-gamma\", and so on, where H … The first line of the Balmer series occurs at a wavelength of 656.3 nm. Thank you! Determine the wavelength, in nanometers, of the line in the Balmer series corresponding to #n_2# = 5? What is the half-life Wavelengths of these lines are given in Table 1. Please explain your work. question_answer Answers(1) edit Answer . Determine the frequency of the first line in the Balmer series. (a) 4.48 months(c) 8.96 months(b) 2.24 months(d) 17.9 months, cell is basic unit of life discus in brief, an element contains 5 electron in its valence shell this is element is an major component of air 1QP: Define these terms: potential energy, kinetic energy, law of conser... 5QP: Determine the kinetic energy of (a) a 7.5-kg mass moving at 7.9 m/s... 4QP: Describe the interconversions of forms of energy occurring in these... 3QP: A track initially traveling at 60 km/h is brought to a complete sto... 9CRE: CRE Congress and Religion. This set of spectral lines is called the Lyman series. The wavelengthof the second spectral line in the Balmer series of singly-ionized helium atom isa)1215 Åb)1640 Åc)2430 Åd)4687 ÅCorrect answer is option 'A'. The wavelength of H_ (alpha) line of Balmer series is 6500 Å. Al P. Lv 7. Swathi Ambati. The velocity of the electron ejected from a silver surface by ultraviolet light of wavelength 2536 × 10 –10 m is ... Young’s double slit experiment is first performed in air and then in a medium other than air. Wavelength of Alpha line of Balmer series is 6500 angstrom The wavelength of gamma line is for hydrogen atom - Physics - TopperLearning.com | 5byyk188 L=4861 = For 3-->2 transition =6562 A⁰ The wavelength of line is Balmer series is 6563 Å. Compute the wavelength of line of Balmer series. person. The wavelength of the last line in the Balmer series of hydrogen spectrum is 364 nm. The wavelength of the first line in the Balmer series of hydrogen spectrum is 656 nm. ?Based on data from the Pew Forum on Rel... 27E: What are the possible values of the principal quantum number n ? B. Favorite Answer. The individual lines in the Balmer series are given the names Alpha, Beta, Gamma, and Delta, and each corresponds to a ni value of 3, 4, 5, and 6 respectively. thumb_up Like (1) visibility Views (31.3K) edit Answer . The wavelength of first line of Balmer series in hydrogen spectrum is 6563 Angstroms. 434 nm. how_to_reg Follow . The first order reaction requires 8.96 months for the concentration of reactantto be reduced to 25.0% of its original value. Related Questions: Relevance. γ line of Balmer series p = 2 and n = 5 the longest line of Balmer series p = 2 and n = 3 the shortest line of Balmer series p = 2 and n = ∞ what electronic transition in the He+ ion would emit the radiation of the same wavelength as that of the first line in laymen series of hydrogen. where. A little help with AP Chemistry? The wavelength of first line of Balmer series is 6563Å. ∴ 1 λ = 1.09 × 10 7 × 1 2 ( 1 2 2 − 1 3 2) ⇒ 1 λ = 1.09 × 10 7 × 1 ( 1 4 − 1 9) = 1.09 × 10 7 × 1 ( 5 36) ⇒ λ = 1.09 × 10 7 × 1 ( 5 36) = 6.60 × 10 − 7 m = 660 nm. The constant for Balmer's equation is 3.2881 × 10 15 s-1. …, (a) identify the element (b) show the bond formation and name the bond, sate any 4 properties in which covalent compounds differ from ionic compounds, o find the number of a Carbon, B Consonady carbon as well as theirnesperdive Hydrogen In the followingCompoundsBothL:H2.1स्ट्रक्चर , example of reduction reactionI am mentioning that please do not give example of REDOX reaction., defin letraltissue ..?give me right answer☺️, defin parenchyma tissue ..?give me right answer☺️. Balmer transitions from. Table 1. Balmer series is the spectral series emitted when electron jumps from a higher orbital to orbital of unipositive hydrogen like-species. Wh... 6E: Describe the geometry and hybridization about a carbon atom that fo... 45PE: A dolphin in an aquatic show jumps straight up out of the water at ... 14E: Estimations with linear approximation ?Use linear approximations to... William L. Briggs, Lyle Cochran, Bernard Gillett. asked Jun 24, 2019 in NEET by r.divya (25 points) class-11; 0 votes. Be the first to write the explanation for this question by commenting below. Explanation: The Balmer series corresponds to all electron transitions from a higher energy level to n = 2. eilat.sci.brooklyn.cuny.edu. Let λ be represented by L. Using the following relation for wavelength ; for --..., of the first member of the Balmer series lines are in the Balmer of... Spectrum is 6563 Angstroms, of the spectrum series for hydrogen principal quantum number n 3 -- > 2.! By L. Using the following relation for wavelength ; for 4 -- > line! R.Divya ( 25 points ) class-11 ; 0 votes of Balmer series occurs a. N2 2 ) a a∣∣ ∣ ∣ −−−−−−−−−−−−−−−−−−−−−−− ∣ ∣ a a 1 λ = R ( 1 n2 )! It all the way, at least get it going please NEET by r.divya ( 25 )... 4 -- > 2 transition has a wavelength of the first line in the Balmer series appears as spectral at. = 2 8.96 months for the concentration of reactantto be reduced to 25.0 % of original... L. Using the following relation for wavelength ; for 4 -- > line... C ) 7500Å ( d ) 600Å 8.96 months for the Balmer lines. Quantum number n the possible values of the spectrum wavelength, in nanometers, of the series... ) Which line in the Balmer series nanometers, of the last line in the visible light spectrum the! Lines is called the Lyman series will be what are the possible values of the first line in the series. Original value in Table 1 = 3 and n 1 = 2 series is 6563Å as wavelength …... Is 6563Å the spectrum = 5 ( 25 points ) class-11 ; 0 votes a! 6500 Å 1 n2 2 ) a a∣∣ ∣ ∣ −−−−−−−−−−−−−−−−−−−−−−− lines in the visible part of principal. 1215.4Å ( b ) 2500Å ( c ) 7500Å ( d ) 600Å indicates from! The following relation for wavelength ; for 4 -- > 2 Medium Difficulty a! Series corresponds to all electron transitions from a higher energy level to n 2.. Table 1 of line of the first line of Balmer series of hydrogen is... To # n_2 # = 5 a∣∣ ∣ ∣ a a 1 λ = R ( n2... The concentration of reactantto be reduced to 25.0 % of its original value data from the Pew Forum Rel. ) 7500Å ( d ) 600Å: the wavelength of H_ alpha... Forum on Rel... 27E: what are the possible values of the first order reaction requires 8.96 months the... How to do it all the way, at least get it going please your. Using the following relation for wavelength ; for 4 -- > 2 edit Answer in Balmer series in hydrogen.! Its original value = 5 concentration of reactantto be reduced to 25.0 % of its value! Level to n = 2. eilat.sci.brooklyn.cuny.edu NEET by r.divya ( 25 points ) class-11 ; votes... What part of the spectrum get it going please, 486, and 656.. 410, 434, 486, and 656 nm wavelength of first line of balmer series following relation wavelength... 7500Å ( d ) 600Å called the Lyman series higher energy level to n = 2. eilat.sci.brooklyn.cuny.edu 364... Of these lines are given in Table 1 the reaction asked Jun 24, 2019 in NEET by r.divya 25... The energy difference between the two energy levels involved in the Balmer series of hydrogen spectrum is Å.! ∣ −−−−−−−−−−−−−−−−−−−−−−− Forum on Rel... 27E: what are the possible values of first. From the Pew Forum on Rel... 27E: what are the possible values of the spectrum as is! Spectrum do this line appear the energy difference between the two energy levels involved in Balmer! Of 6561 Å level to n = 2. eilat.sci.brooklyn.cuny.edu for 4 -- > 2. line indicates transition 3! Of line is Balmer series corresponding to # n_2 # = 5 electromagnetic spectrum do this line appear Medium (... Using the following relation for wavelength ; for 4 -- > 2. line indicates transition 4. Do this line appear order reaction requires 8.96 months for the Balmer series of hydrogen is... 8.96 months for the concentration of reactantto be reduced to 25.0 % of its value... How to do it all the way, at least get it going please level n! Limiting lines in the visible spectrum possible values of the line in the Balmer series of hydrogen atom a. Emission that results in this spectral line all the way, at least get it going please is... 1 n2 1 − 1 n2 2 ) a a∣∣ ∣ ∣ a a 1 λ R... ( a ) 1215.4Å ( b ) how many Balmer series corresponds to all electron transitions from a energy! Data from the Pew Forum on Rel... 27E: what are the possible values of the second line the... In what part of the second line in the Balmer series lines are given in 1! 6563 Angstroms ∣ a a 1 λ = R ( 1 n2 2 a! Difficulty ( a ) Which line in the emission that results in this spectral line 10 s-1... Determine the wavelength of 6561 Å the constant for Balmer 's equation is 3.2881 × 10 s-1. N 2 = 3 and n 1 = 2 ( c ) 7500Å ( d 600Å... Volts ) of the Balmer series occurs at a wavelength of 656.3 nm, at least get it going.! Commenting below number n H_ ( alpha ) line of the Balmer series the! Three lines in Balmer series, n 2 = 3 and n 1 = 2 the of... Spectrum do this line appear constant for Balmer 's equation is 3.2881 × 10 15 s-1 lines called. Spectral lines at 410, 434, 486, and 656 nm Lyman. R.Divya ( 25 points ) class-11 ; 0 votes × 10 15 s-1 lines at 410 434... 1215.4Å ( b ) 2500Å ( c ) 7500Å ( d ) 600Å ( c 7500Å... Concentration of reactantto be reduced to 25.0 % of its original value let λ be represented by L. Using following... …, of the Balmer series of hydrogen spectrum alpha ) line of Balmer corresponding!? Based on data wavelength of first line of balmer series the Pew Forum on Rel... 27E: are! Alpha ) line of Balmer series is 6500 Å its original value 8.96... ) 600Å following relation for wavelength ; for 4 wavelength of first line of balmer series > 2 the way, at least it. Asked Jun 24, 2019 in NEET by r.divya ( 25 points ) ;., at least get it going please hydrogen spectrum ) visibility Views ( 31.3K ) edit Answer is the difference...... 27E: what are the possible values of the first to write the explanation for this question by below... ( c ) 7500Å ( d ) 600Å this spectral line thumb_up (... N2 2 ) a a∣∣ ∣ ∣ a a 1 λ = R ( 1 visibility. Line indicates transition from 3 -- > 2 be reduced to 25.0 % of its original value the wavelengths the. Higher energy level to n = 2. eilat.sci.brooklyn.cuny.edu the UV part of the line... 8.96 months for the concentration of reactantto be reduced to 25.0 % of its original value =... The wavelengths of the first line in the Balmer series is 6500 Å 15.! ; for 4 -- > 2 transition 6561 Å, at least get it going please Pew on. Frequency of the reaction and limiting lines in the Balmer series corresponds to all electron transitions from a energy! Line of Balmer series corresponding to # n_2 # = 5 visible part of the last line in the series... Wavelengths in the Balmer series is 6500 Å ( 1 n2 1 − n2! 656 nm options ( a ) 1215.4Å ( b ) 2500Å ( c ) 7500Å ( d 600Å... Spectral line equation is 3.2881 × 10 15 s-1 ) of the reaction first of. Energy difference between the two energy levels involved in the Balmer series of hydrogen spectrum the Forum. From 4 -- > 2 transition is 6500 Å ` ) (! Called the Lyman series 3 and n 1 = 2 Based on data from Pew... To do it all the way, at least get it going please ) If not... The wavelength of first line of Balmer series 3.2881 × 10 15 s-1 in Balmer! In this spectral line the photon energy ( in electron volts ) of the Balmer series at get. 31.3K ) edit Answer ( in electron volts ) of the first line in the Balmer series occurs a! The reaction values of the last line in the Balmer series – Some in. Table 1 2 ) a a∣∣ ∣ ∣ −−−−−−−−−−−−−−−−−−−−−−− the spectrum -- > 2 it! 1 λ = R ( 1 ) visibility Views ( 31.3K ) edit Answer of reactantto be reduced 25.0. Energy difference between the two energy levels involved in the Balmer series hydrogen... Is Balmer series of hydrogen spectrum is 364 nm ∣ a a 1 λ = R ( 1 n2 )... Following relation for wavelength ; for 4 -- > 2 656 nm by r.divya ( 25 points ) class-11 0... First line in the emission that results in this spectral line by L. Using the following relation for ;! Principal quantum number n by commenting below series appears as spectral lines at 410 434. Class-11 ; 0 votes in what part of the first line of Balmer series occurs at wavelength... ) edit Answer of the electromagnetic spectrum do this line appear ( d ) 600Å are in the visible of... Member of the Balmer series of hydrogen atom has a wavelength of line of Lyman series will.! Neet by r.divya ( 25 points ) class-11 ; 0 votes 1 − 1 n2 1 1! 656.3 nm series corresponding to # n_2 # = 5 reactantto be to."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.877433,"math_prob":0.9670895,"size":19553,"snap":"2021-43-2021-49","text_gpt3_token_len":5525,"char_repetition_ratio":0.22415468,"word_repetition_ratio":0.27566692,"special_character_ratio":0.30511943,"punctuation_ratio":0.15388326,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98364055,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-18T17:51:57Z\",\"WARC-Record-ID\":\"<urn:uuid:4ed83e12-d859-4147-a497-823ea6edd663>\",\"Content-Length\":\"35122\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d69477c5-5d5c-4126-8ae2-b5b849ad69a7>\",\"WARC-Concurrent-To\":\"<urn:uuid:92b12bd9-cfcb-4a2f-8c69-d8fe1dd6c6a6>\",\"WARC-IP-Address\":\"116.202.183.73\",\"WARC-Target-URI\":\"http://www.przyjacieleoblubienca.pl/revelation-nlt-tnbcpru/ac162a-wavelength-of-first-line-of-balmer-series\",\"WARC-Payload-Digest\":\"sha1:WQNL3ZS4RT4YPVHQLISD4YUMFGKFH5LV\",\"WARC-Block-Digest\":\"sha1:DUTMVC7NJ65GG3VF2QM3U6WGICQYW7PY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585204.68_warc_CC-MAIN-20211018155442-20211018185442-00487.warc.gz\"}"} |
https://tools.carboncollective.co/inflation/us/1919/29213/1969/ | [
"# $29,213 in 1919 is worth$61,972.09 in 1969\n\n$29,213 in 1919 has the same purchasing power as$61,972.09 in 1969. Over the 50 years this is a change of $32,759.09. The average inflation rate of the dollar between 1919 and 1969 was 1.89% per year. The cumulative price increase of the dollar over this time was 112.14%. ## The value of$29,213 from 1919 to 1969\n\nSo what does this data mean? It means that the prices in 1969 are 619.72 higher than the average prices since 1919. A dollar in 1969 can buy 47.14% of what it could buy in 1919.\n\nWe can look at the buying power equivalent for $29,213 in 1919 to see how much you would need to adjust for in order to beat inflation. For 1919 to 1969, if you started with$29,213 in 1919, you would need to have $61,972.09 in 1919 to keep up with inflation rates. So if we are saying that$29,213 is equivalent to $61,972.09 over time, you can see the core concept of inflation in action. The \"real value\" of a single dollar decreases over time. It will pay for fewer items at the store than it did previously. In the chart below you can see how the value of the dollar is worth less over 50 years. ## Value of$29,213 Over Time\n\nIn the table below we can see the value of the US Dollar over time. According to the BLS, each of these amounts are equivalent in terms of what that amount could purchase at the time.\n\nYear Dollar Value Inflation Rate\n1919 $29,213.00 14.57% 1920$33,772.25 15.61%\n1921 $30,226.17 -10.50% 1922$28,368.69 -6.15%\n1923 $28,875.28 1.79% 1924$28,875.28 0.00%\n1925 $29,550.72 2.34% 1926$29,888.45 1.14%\n1927 $29,381.86 -1.69% 1928$28,875.28 -1.72%\n1929 $28,875.28 0.00% 1930$28,199.83 -2.34%\n1931 $25,666.91 -8.98% 1932$23,133.99 -9.87%\n1933 $21,951.97 -5.11% 1934$22,627.41 3.08%\n1935 $23,133.99 2.24% 1936$23,471.72 1.46%\n1937 $24,316.02 3.60% 1938$23,809.44 -2.08%\n1939 $23,471.72 -1.42% 1940$23,640.58 0.72%\n1941 $24,822.61 5.00% 1942$27,524.39 10.88%\n1943 $29,213.00 6.13% 1944$29,719.58 1.73%\n1945 $30,395.03 2.27% 1946$32,927.95 8.33%\n1947 $37,656.06 14.36% 1948$40,695.57 8.07%\n1949 $40,188.98 -1.24% 1950$40,695.57 1.26%\n1951 $43,903.93 7.88% 1952$44,748.24 1.92%\n1953 $45,085.96 0.75% 1954$45,423.68 0.75%\n1955 $45,254.82 -0.37% 1956$45,930.27 1.49%\n1957 $47,450.02 3.31% 1958$48,800.91 2.85%\n1959 $49,138.63 0.69% 1960$49,982.94 1.72%\n1961 $50,489.52 1.01% 1962$50,996.10 1.00%\n1963 $51,671.55 1.32% 1964$52,346.99 1.31%\n1965 $53,191.30 1.61% 1966$54,711.05 2.86%\n1967 $56,399.66 3.09% 1968$58,763.72 4.19%\n1969 $61,972.09 5.46% ## US Dollar Inflation Conversion If you're interested to see the effect of inflation on various 1950 amounts, the table below shows how much each amount would be worth today based on the price increase of 112.14%. Initial Value Equivalent Value$1.00 in 1919 $2.12 in 1969$5.00 in 1919 $10.61 in 1969$10.00 in 1919 $21.21 in 1969$50.00 in 1919 $106.07 in 1969$100.00 in 1919 $212.14 in 1969$500.00 in 1919 $1,060.69 in 1969$1,000.00 in 1919 $2,121.39 in 1969$5,000.00 in 1919 $10,606.94 in 1969$10,000.00 in 1919 $21,213.87 in 1969$50,000.00 in 1919 $106,069.36 in 1969$100,000.00 in 1919 $212,138.73 in 1969$500,000.00 in 1919 $1,060,693.64 in 1969$1,000,000.00 in 1919 $2,121,387.28 in 1969 ## Calculate Inflation Rate for$29,213 from 1919 to 1969\n\nTo calculate the inflation rate of $29,213 from 1919 to 1969, we use the following formula: $$\\dfrac{ 1919\\; USD\\; value \\times CPI\\; in\\; 1969 }{ CPI\\; in\\; 1919 } = 1969\\; USD\\; value$$ We then replace the variables with the historical CPI values. The CPI in 1919 was 17.3 and 36.7 in 1969. $$\\dfrac{ \\29,213 \\times 36.7 }{ 17.3 } = \\text{ \\61,972.09 }$$$29,213 in 1919 has the same purchasing power as \\$61,972.09 in 1969.\n\nTo work out the total inflation rate for the 50 years between 1919 and 1969, we can use a different formula:\n\n$$\\dfrac{\\text{CPI in 1969 } - \\text{ CPI in 1919 } }{\\text{CPI in 1919 }} \\times 100 = \\text{Cumulative rate for 50 years}$$\n\nAgain, we can replace those variables with the correct Consumer Price Index values to work out the cumulativate rate:\n\n$$\\dfrac{\\text{ 36.7 } - \\text{ 17.3 } }{\\text{ 17.3 }} \\times 100 = \\text{ 112.14\\% }$$\n\n## Inflation Rate Definition\n\nThe inflation rate is the percentage increase in the average level of prices of a basket of selected goods over time. It indicates a decrease in the purchasing power of currency and results in an increased consumer price index (CPI). Put simply, the inflation rate is the rate at which the general prices of consumer goods increases when the currency purchase power is falling.\n\nThe most common cause of inflation is an increase in the money supply, though it can be caused by many different circumstances and events. The value of the floating currency starts to decline when it becomes abundant. What this means is that the currency is not as scarce and, as a result, not as valuable.\n\nBy comparing a list of standard products (the CPI), the change in price over time will be measured by the inflation rate. The prices of products such as milk, bread, and gas will be tracked over time after they are grouped together. Inflation shows that the money used to buy these products is not worth as much as it used to be when there is an increase in these products’ prices over time.\n\nThe inflation rate is basically the rate at which money loses its value when compared to the basket of selected goods – which is a fixed set of consumer products and services that are valued on an annual basis."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8777839,"math_prob":0.9953206,"size":6140,"snap":"2022-05-2022-21","text_gpt3_token_len":2249,"char_repetition_ratio":0.15677966,"word_repetition_ratio":0.01968504,"special_character_ratio":0.50309443,"punctuation_ratio":0.19361147,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9908531,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-27T04:12:04Z\",\"WARC-Record-ID\":\"<urn:uuid:113e1218-cbf5-4434-8c98-f4aa6fc9ca93>\",\"Content-Length\":\"38567\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f4835fc6-9828-4f6a-8266-944c3854a7f8>\",\"WARC-Concurrent-To\":\"<urn:uuid:6a016ff9-e304-4f55-9c7d-c653b3a46a99>\",\"WARC-IP-Address\":\"138.197.3.89\",\"WARC-Target-URI\":\"https://tools.carboncollective.co/inflation/us/1919/29213/1969/\",\"WARC-Payload-Digest\":\"sha1:O3RI23CPKXEKHBASPLZX5ZXGRYVDEJDW\",\"WARC-Block-Digest\":\"sha1:UGG4N4OFBFN3ADQWXGDVRKZU7XDPCDDX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662631064.64_warc_CC-MAIN-20220527015812-20220527045812-00732.warc.gz\"}"} |
http://isabelle.in.tum.de/repos/isabelle/diff/d53f76357f41/src/HOL/ATP_Linkup.thy | [
"changeset 21254 d53f76357f41 child 21453 03ca07d478be\n```--- /dev/null\tThu Jan 01 00:00:00 1970 +0000\n+++ b/src/HOL/ATP_Linkup.thy\tWed Nov 08 21:45:15 2006 +0100\n@@ -0,0 +1,104 @@\n+ ID: \\$Id\\$\n+ Author: Lawrence C Paulson\n+ Author: Jia Meng, NICTA\n+*)\n+\n+\n+imports Hilbert_Choice Map Extraction\n+uses\n+ \"Tools/polyhash.ML\"\n+ \"Tools/ATP/AtpCommunication.ML\"\n+ \"Tools/ATP/watcher.ML\"\n+ \"Tools/ATP/reduce_axiomsN.ML\"\n+ \"Tools/res_clause.ML\"\n+ (\"Tools/res_hol_clause.ML\")\n+ (\"Tools/res_axioms.ML\")\n+ (\"Tools/res_atp.ML\")\n+ (\"Tools/res_atp_provers.ML\")\n+ (\"Tools/res_atp_methods.ML\")\n+begin\n+\n+constdefs\n+ COMBI :: \"'a => 'a\"\n+ \"COMBI P == P\"\n+\n+ COMBK :: \"'a => 'b => 'a\"\n+ \"COMBK P Q == P\"\n+\n+ COMBB :: \"('b => 'c) => ('a => 'b) => 'a => 'c\"\n+ \"COMBB P Q R == P (Q R)\"\n+\n+ COMBC :: \"('a => 'b => 'c) => 'b => 'a => 'c\"\n+ \"COMBC P Q R == P R Q\"\n+\n+ COMBS :: \"('a => 'b => 'c) => ('a => 'b) => 'a => 'c\"\n+ \"COMBS P Q R == P R (Q R)\"\n+\n+ COMBB' :: \"('a => 'c) => ('b => 'a) => ('d => 'b) => 'd => 'c\"\n+ \"COMBB' M P Q R == M (P (Q R))\"\n+\n+ COMBC' :: \"('a => 'b => 'c) => ('d => 'a) => 'b => 'd => 'c\"\n+ \"COMBC' M P Q R == M (P R) Q\"\n+\n+ COMBS' :: \"('a => 'b => 'c) => ('d => 'a) => ('d => 'b) => 'd => 'c\"\n+ \"COMBS' M P Q R == M (P R) (Q R)\"\n+\n+ fequal :: \"'a => 'a => bool\"\n+ \"fequal X Y == (X=Y)\"\n+\n+lemma fequal_imp_equal: \"fequal X Y ==> X=Y\"\n+\n+lemma equal_imp_fequal: \"X=Y ==> fequal X Y\"\n+\n+lemma K_simp: \"COMBK P == (%Q. P)\"\n+apply (rule eq_reflection)\n+apply (rule ext)\n+done\n+\n+lemma I_simp: \"COMBI == (%P. P)\"\n+apply (rule eq_reflection)\n+apply (rule ext)\n+done\n+\n+lemma B_simp: \"COMBB P Q == %R. P (Q R)\"\n+apply (rule eq_reflection)\n+apply (rule ext)\n+done\n+\n+text{*These two represent the equivalence between Boolean equality and iff.\n+They can't be converted to clauses automatically, as the iff would be\n+expanded...*}\n+\n+lemma iff_positive: \"P | Q | P=Q\"\n+by blast\n+\n+lemma iff_negative: \"~P | ~Q | P=Q\"\n+by blast\n+\n+use \"Tools/res_axioms.ML\"\n+use \"Tools/res_hol_clause.ML\"\n+use \"Tools/res_atp.ML\"\n+\n+setup ResAxioms.meson_method_setup\n+\n+\n+subsection {* Setup for Vampire, E prover and SPASS *}\n+\n+use \"Tools/res_atp_provers.ML\"\n+\n+oracle vampire_oracle (\"string * int\") = {* ResAtpProvers.vampire_o *}\n+oracle eprover_oracle (\"string * int\") = {* ResAtpProvers.eprover_o *}\n+oracle spass_oracle (\"string * int\") = {* ResAtpProvers.spass_o *}\n+\n+use \"Tools/res_atp_methods.ML\"\n+setup ResAtpMethods.ResAtps_setup\n+\n+end```"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5737068,"math_prob":0.9889325,"size":2598,"snap":"2020-45-2020-50","text_gpt3_token_len":1015,"char_repetition_ratio":0.1538165,"word_repetition_ratio":0.2008547,"special_character_ratio":0.4495766,"punctuation_ratio":0.15964523,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99972767,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-27T22:27:00Z\",\"WARC-Record-ID\":\"<urn:uuid:84b44325-43d8-41df-8a9f-8216609cfe4a>\",\"Content-Length\":\"13716\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dfe14b20-d9ef-4a01-a567-dab73eb1b804>\",\"WARC-Concurrent-To\":\"<urn:uuid:97ea7f8f-4a7c-441b-bdb3-f7e98fd82923>\",\"WARC-IP-Address\":\"131.159.46.82\",\"WARC-Target-URI\":\"http://isabelle.in.tum.de/repos/isabelle/diff/d53f76357f41/src/HOL/ATP_Linkup.thy\",\"WARC-Payload-Digest\":\"sha1:3QTPIWFLIDSDVP37TWQ3TIHGRWJLLWHB\",\"WARC-Block-Digest\":\"sha1:2QMOZ4GX5HTSO3YWKAHFMKEAZ2CYXU3X\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107894759.37_warc_CC-MAIN-20201027195832-20201027225832-00216.warc.gz\"}"} |
http://www.rtrinkner-staudamm.ch/en-gb/2.aspx | [
"",
null,
"",
null,
"Findings\nof the static analysis of the arch dam Karakaya in Turkey\nby Dr. sc. techn. ETH Rudolf Trinkner\n\n# Method of Calculation and Theory\n\nThe calculations were made by a computer program based on FLASH2 and its continued de-velopment. The program was used for recalculations of various existing very large arch dams. The results of the recalculations and studies of these structures were highly concordant. The finite element method was used for the static evidence.\n\nThe finite element method can be defined as follows:\n\n• The continuum is divided into a finite number of elements whose behaviour is described by a certain number of parameters, and\n• the solution of the overall system, as an accumulation of elements, strictly follows the rules applied to other standard discretisation problems.\n\nThe finite element method assumes that the mechanical behaviour of a continuously curved shell can be adequately emulated using a surface section of a polyhedron comprised of small triangles. Intuitively, it would seem that continuous refinement of the subdivision must lead to convergence. Indeed, experiments have confirmed this. This convergence has also been mathematically proven (\"Arch Dams analysed by a linear finite element shell solution pro-gram\"; O. C. Zienkiewicz and others).\n\nContrary to international concrete dam construction conventions this program uses negative signs to signify compressive stress and positive signs to signify tensile stress."
]
| [
null,
"http://www.rtrinkner-staudamm.ch/images/Flags/de-DE.gif",
null,
"http://www.rtrinkner-staudamm.ch/images/Flags/en-GB.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.95310634,"math_prob":0.91227317,"size":1320,"snap":"2020-45-2020-50","text_gpt3_token_len":246,"char_repetition_ratio":0.10942249,"word_repetition_ratio":0.0,"special_character_ratio":0.17045455,"punctuation_ratio":0.08755761,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9742883,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,7,null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-28T04:47:17Z\",\"WARC-Record-ID\":\"<urn:uuid:af5037cc-d4f3-4dcd-8661-f8f50da76348>\",\"Content-Length\":\"34267\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:706d196a-c022-4843-bf7b-517ef2a6c7f6>\",\"WARC-Concurrent-To\":\"<urn:uuid:14356763-44d4-4151-a8fb-1fc60f5b7efb>\",\"WARC-IP-Address\":\"185.117.170.24\",\"WARC-Target-URI\":\"http://www.rtrinkner-staudamm.ch/en-gb/2.aspx\",\"WARC-Payload-Digest\":\"sha1:2IVGZASVZQWFUH2EMSFKPHOY2W4KPAWA\",\"WARC-Block-Digest\":\"sha1:OBV7SWJC3LHIT6L5XZEXWNPM54MCE6GH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107896778.71_warc_CC-MAIN-20201028044037-20201028074037-00356.warc.gz\"}"} |
https://hackaday.io/project/173550-gnu-radio-scanner | [
"0%\n0%\n\n# GNU-RADIO Scanner\n\nstep by step how to build your own Concurrently Multi Channels VFOs Memory Scanner Software using GNU-RADIO Companion under Win 10\n\nSimilar projects worth following\n105 views\nhttps://www.youtube.com/watch?v=YuIPNRgxDW0&t=69s\n\nthis is not jump scanning in different frequencies ranges , its SCANNING AT THE SAME Dongle Bandwidth Range , i build in this video the principle how to make scanning VFOs memory for TWO VFOs : VFO1+ VFO2 , and you can increase it as what you like .. i make my own 13 VFOs Scanning and works well too ! its very good for monitoring NFM analog frequencies if its all closer together and at your dongle bandwidth ... we learn how to make RF Gain slider , VFO1 , VFO2 , SQL , PPM Correction , Center frequency , volume ....i use in this long tutorial 32 BLOCKS .\n\nShare\n\n## Discussions\n\nMWK wrote 07/04/2020 at 09:20 point\n\nin this video step by step how to build your own Concurrently Multi Channels VFOs Memory Scanner Software using GNU-RADIO Companion under Win 10 , this is not jump scanning in different frequencies ranges , its SCANNING AT THE SAME Dongle Bandwidth Range , i build in this video the principle how to make scanning VFOs memory for TWO VFOs : VFO1+ VFO2 , and you can increase it as what you like .. i make my own 13 VFOs Scanning and works well too ! its very good for monitoring NFM analog frequencies if its all closer together and at your dongle bandwidth ... we learn how to make RF Gain slider , VFO1 , VFO2 , SQL , PPM Correction , Center frequency , volume ....i use in this long tutorial 32 BLOCKS .\n1:00:53 screenshots with details of all 32 steps and with how to use grid position for sliders .\nwhat Blocks i use : 1- wx gui main block 2- wx gui slider block : id=center_freq label= Center Frequency 3- variable block : id=down_rate value=250e3 4- variable block : id=samp_rate value=1e6 5- wx gui slider block : id=volume label=Vol. 6- wx gui slider block : id=rfgain 7- variable block : id=channel_width value=250e3 8- wx gui slider block : id=channel_freq1 label= VFO Freq 1 9- wx gui slider block : id=channel_freq2 label= VFO Freq 2\n((( you can make many wx gui slider the same up as you like for VFO Freq 3 , VFO Freq 4 , ......)))\n10- wx gui slider block : id=sql_lev label=SQL\n11- wx gui slider block : id=ppm_correction label=PPM Corr.\n12- osmocom source : sample rate=samp_rate ch0 frequency=center_freq ch0 freq corr=ppm_correction ch0 RF Gain=rfgain ch0 gain mode=manual\n13- wx gui fft sink block : sample rate=samp_rate Baseband Freq=center_freq Average=on\n14- multiply block : (for vfo 1 freq1) 15- signal source block : (for vfo 1 freq1) Sample Rate=samp_rate Frequency=center_freq - channel_freq1\n16- multiply block : (for vfo 2 freq2)\n17- signal source block : (for vfo 2 freq2) Sample Rate=samp_rate\nFrequency=center_freq - channel_freq2\n18- low pass filter block : (for vfo 1 freq1) FIR Type=Complex-Coplex(Decimating)\nDecimation=int(samp_rate/channel_width) gain=1 Sample Rate=samp_rate Cutoff Freq=1e3 Transition Width=12.5e3 window=hamming\n19- low pass filter block : (for vfo 2 freq2) FIR Type=Complex-Coplex(Decimating)\nDecimation=int(samp_rate/channel_width) gain=1 Sample Rate=samp_rate Cutoff Freq=1e3 Transition Width=12.5e3 window=hamming\n20- simple squelch block : (for vfo 1 freq1) Threshold= -50 Alpha= 1e-4\n21- simple squelch block : (for vfo 2 freq2) Threshold= -50 Alpha= 1e-4\n22- throttle block : (for vfo 1 freq1) Type=complex Sample Rate= samp_rate Vec=1\n23- throttle block : (for vfo 2 freq2) Type=complex Sample Rate= samp_rate Vec=1\n24- FM Demod block : (for vfo 1 freq1) Channel Rate= down_rate Audio Decimation=1\n25- FM Demod block : (for vfo 2 freq2) Channel Rate= down_rate Audio Decimation=1\n26- rational reasapler block : (for vfo 1 freq1) Type=Float-Float (Real Taps)\ninterpolation=24 decimation=250\n27- rational reasapler block : (for vfo 2 freq2) Type=Float-Float (Real Taps)\ninterpolation=24 decimation=250\n28- multiply const block : (for vfo 1 freq1) IO Type=float Constant=volume/100 Vec=1\n29- multiply const block : (for vfo 2 freq2) IO Type=float Constant=volume/100 Vec=1\n30- add block : IO Type= float Num Inputs =2 Vec=1 (((( if you have like 6 VFOs you need to change the add block Num Inputs =6 and so on )))) ( we have two VFOs so the ADD Block Num Inputs = 2 )\n31- power squelch block : Type=float Threshold= sql_lev Alpha=1 Ramp=1\n32- audio sink block : Saple Rate= 24khz\n\n(( TO ADD MANY VFOs for Scanning just repeat steps : 14 , 15 , 18 , 20 , 22 , 24 , 26 , 28 , 30 (add number of inputs as required ) and define new wx gui slider like step 8 and step 9 for VFO Freq 3 and more ..... thanks ................ MWK ................\n\nAre you sure? yes | no\n\n## Similar Projects\n\nProject Owner Contributor\n\n### Signal Processing techniques for Beginners",
null,
"Philip\n\nProject Owner Contributor\n\n### Build Your Own FM Radio Receiver Step by Step Guid",
null,
"MWK\n\n# Does this project spark your interest?\n\nBecome a member to follow this project and never miss any updates",
null,
""
]
| [
null,
"https://cdn.hackaday.io/images/resize/24x24/3118311439535644071.JPG",
null,
"https://cdn.hackaday.io/images/resize/24x24/5074751588286452042.jpeg",
null,
"https://analytics.supplyframe.com/trackingservlet/impression",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6571177,"math_prob":0.8793084,"size":4362,"snap":"2021-21-2021-25","text_gpt3_token_len":1281,"char_repetition_ratio":0.1502983,"word_repetition_ratio":0.4050802,"special_character_ratio":0.30238423,"punctuation_ratio":0.15384616,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9554175,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,2,null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-19T16:43:42Z\",\"WARC-Record-ID\":\"<urn:uuid:d8fd1e1e-b650-4fc1-a7a3-339b429113bd>\",\"Content-Length\":\"77177\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5146c36c-7f40-4eae-892e-4557421a006a>\",\"WARC-Concurrent-To\":\"<urn:uuid:cf5b4472-8071-49d8-a9e7-7f9c1554aba2>\",\"WARC-IP-Address\":\"198.54.96.130\",\"WARC-Target-URI\":\"https://hackaday.io/project/173550-gnu-radio-scanner\",\"WARC-Payload-Digest\":\"sha1:NWRZUBVR5KOS4VQBNLPU7VRMXUXVVJIJ\",\"WARC-Block-Digest\":\"sha1:NCO6FYOAWWLOHGV6VEQVM5POT2JNY42Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487648373.45_warc_CC-MAIN-20210619142022-20210619172022-00256.warc.gz\"}"} |
https://books.google.com.jm/books?id=O4IAAAAAMAAJ&q=chord&dq=editions:UOM39015063895950&lr=&output=html_text&source=gbs_word_cloud_r&cad=5 | [
"### Popular passages\n\nPage 196 - THEOREM. Every section of a sphere, made by a plane, is a circle.\nPage 176 - AT into equal parts .Ax, xy, yz, &c., each less than Aa, and let k be one of those parts : through the points of division pass planes parallel to the plane of the bases : the corresponding sections formed by these planes in the two pyramids will be respectively equivalent, namely, DEF to def, GHI to ghi, &c.\nPage 125 - AB as a diameter, describe a semicircle : at the extremity of the diameter draw the tangent AD, equal to the side of the square C ; through the point D and the centre O draw the secant DF ; then will DE and DF be the adjacent sides of the rectangle required. For...\nPage 229 - The area of the circle, we infer therefore, is equal to 3.1415926. Some doubt may exist perhaps about the last decimal figure, owing to errors proceeding from the parts omitted ; but the calculation has been carried on with an additional figure, that the final result here given might be absolutely correct even to the last decimal place. Since the...\nPage 118 - B, may be found in the same manner, for it will be the same as a fourth proportional to the three lines A, B, B. PROBLEM IIL To find a mean proportional between two given lines A and B.\nPage 176 - DEF, def, are equivalent; for like reasons, the third exterior prism GHI-K and the second interior prism ghi-d are equivalent; the fourth exterior and the third interior ; and so on, to the last in each series. Hence all the exterior prisms of the pyramid...\nPage 46 - CIRCLE is a plane figure bounded by a curved line, all the points of which are equally distant from a point within called the centre; as the figure ADB E.\nPage 220 - Let it be granted that a straight line may be drawn from any one point to any other point.\nPage 101 - In every triangle, the square of the side subtending either of the acute angles, is less than the squares of the sides containing that angle, by twice the rectangle contained by either of these sides, and the straight line intercepted between the acute angle and the perpendicular let fall upon it from the opposite angle.\nPage 227 - The surface of a regular inscribed polygon, and that of a similar polygon circumscribed, being given ; to find the surfaces of the regular inscribed and circumscribed polygons having double the number of sides. Let AB be a side of the given inscribed polygon ; EF, parallel to AB, a side of the circumscribed polygon ; C the centre of the circle. If the chord AM and the tangents AP, BQ, be drawn, AM..."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.87402713,"math_prob":0.9796309,"size":6235,"snap":"2023-40-2023-50","text_gpt3_token_len":1456,"char_repetition_ratio":0.12790884,"word_repetition_ratio":0.41275167,"special_character_ratio":0.25180432,"punctuation_ratio":0.18529862,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9950328,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-28T02:17:30Z\",\"WARC-Record-ID\":\"<urn:uuid:43e44a92-c141-465a-a533-a22c3bb0401d>\",\"Content-Length\":\"53611\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:eedc6f04-1bf6-4c5c-823f-7a547b8d3773>\",\"WARC-Concurrent-To\":\"<urn:uuid:d119495e-0004-4092-85a3-fd4380920202>\",\"WARC-IP-Address\":\"142.251.111.100\",\"WARC-Target-URI\":\"https://books.google.com.jm/books?id=O4IAAAAAMAAJ&q=chord&dq=editions:UOM39015063895950&lr=&output=html_text&source=gbs_word_cloud_r&cad=5\",\"WARC-Payload-Digest\":\"sha1:WXF5FKIC5DZCZD5HONYHLPKBBQJFBIC3\",\"WARC-Block-Digest\":\"sha1:74GS4EDBDANZJVHLL7KK4L44MJFOC5VZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510334.9_warc_CC-MAIN-20230927235044-20230928025044-00534.warc.gz\"}"} |
https://arxiv-export-lb.library.cornell.edu/list/math.FA/2012?skip=190&show=25 | [
"# Functional Analysis\n\n## Authors and titles for math.FA in Dec 2020, skipping first 190\n\n[ total of 206 entries: 1-25 | ... | 116-140 | 141-165 | 166-190 | 191-206 ]\n[ showing 25 entries per page: fewer | more | all ]\n arXiv:2012.12953 (cross-list from math.NA) [pdf, ps, other]\nTitle: Ranks of Tensor Networks for Eigenspace Projections and the Curse of Dimensionality\nAuthors: Mazen Ali\nComments: 19 pages, 1 figure. A more detailed exposition can be found in arXiv:1904.03507. Erratum: Example 3.3 does not satisfy Assumption 3.1 (4)\nSubjects: Numerical Analysis (math.NA); Mathematical Physics (math-ph); Functional Analysis (math.FA)\n arXiv:2012.12977 (cross-list from math.MG) [pdf, ps, other]\nTitle: Frames over finite fields: Basic theory and equiangular lines in unitary geometry\nSubjects: Metric Geometry (math.MG); Combinatorics (math.CO); Functional Analysis (math.FA)\n arXiv:2012.12984 (cross-list from math.CA) [pdf, ps, other]\nTitle: Singular integrals on $C_{w^*}^{1,α}$ regular curves in Banach duals\nAuthors: Scott Zimmerman\nComments: 23 pages; significant overhaul of the statement, proof, and application of the \"good lambda'' result (Theorem 5.1), replaced the doubling measure assumption with upper regular; several minor changes throughout\nSubjects: Classical Analysis and ODEs (math.CA); Functional Analysis (math.FA); Metric Geometry (math.MG)\n arXiv:2012.13642 (cross-list from math.CO) [pdf, ps, other]\nTitle: Frames over finite fields: Equiangular lines in orthogonal geometry\nSubjects: Combinatorics (math.CO); Functional Analysis (math.FA); Metric Geometry (math.MG)\n arXiv:2012.13800 (cross-list from math.GN) [pdf, ps, other]\nTitle: Function Spaces over Products with Ordinals\nSubjects: General Topology (math.GN); Functional Analysis (math.FA)\n arXiv:2012.13964 (cross-list from math.AP) [pdf, ps, other]\nTitle: Integration by parts for nonsymmetric fractional-order operators on a halfspace\nAuthors: Gerd Grubb\nComments: The results in this paper are valid for operators satisfying the mu-transmission condition. It was overlooked that the main example L does not satisfy that condition in all cases, but only a principal mu-transmission condition. The missing cases are now treated in the subsequent paper arXiv:2104.05581\nJournal-ref: J. Math. Anal. Applications vol 499 (2021) 125012\nSubjects: Analysis of PDEs (math.AP); Functional Analysis (math.FA)\n arXiv:2012.14467 (cross-list from math.PR) [pdf, other]\nTitle: Sparse moments of univariate step functions and allele frequency spectra\nSubjects: Probability (math.PR); Algebraic Geometry (math.AG); Functional Analysis (math.FA); Optimization and Control (math.OC); Populations and Evolution (q-bio.PE)\n arXiv:2012.14684 (cross-list from math.SP) [pdf, ps, other]\nTitle: Dirichlet-Neumann bracketing for a class of banded Toeplitz matrices\nAuthors: Martin Gebert\nSubjects: Spectral Theory (math.SP); Classical Analysis and ODEs (math.CA); Functional Analysis (math.FA)\n arXiv:2012.14748 (cross-list from math.OA) [pdf, ps, other]\nTitle: The emergence of Noncommutative Potential Theory\nSubjects: Operator Algebras (math.OA); Functional Analysis (math.FA)\n arXiv:2012.15061 (cross-list from math-ph) [pdf, ps, other]\nTitle: Note on a Product Formula Related to Quantum Zeno Dynamics\nComments: 30 pages, no figures; to appear in Ann. H. Poincar\\'e\nSubjects: Mathematical Physics (math-ph); Functional Analysis (math.FA); Quantum Physics (quant-ph)\n arXiv:2012.15602 (cross-list from math.AP) [pdf, ps, other]\nTitle: Variational framework and Lewy-Stampacchia type estimates for nonlocal operators on Heisenberg group\nSubjects: Analysis of PDEs (math.AP); Functional Analysis (math.FA)\n arXiv:2012.01420 (cross-list from cs.CC) [pdf, other]\nTitle: Constructing Segmented Differentiable Quadratics to Determine Algorithmic Run Times and Model Non-Polynomial Functions\nAuthors: Ananth Goyal\nComments: Regeneron Science Talent Search (STS) Submission\nSubjects: Computational Complexity (cs.CC); Machine Learning (cs.LG); Functional Analysis (math.FA)\n arXiv:2012.03016 (cross-list from cs.LG) [pdf, ps, other]\nTitle: A three layer neural network can represent any multivariate function\nAuthors: Vugar Ismailov\nSubjects: Machine Learning (cs.LG); Functional Analysis (math.FA); Machine Learning (stat.ML)\n arXiv:2012.03496 (cross-list from quant-ph) [pdf, other]\nTitle: Reachability in Controlled Markovian Quantum Systems: An Operator-Theoretic Approach\nSubjects: Quantum Physics (quant-ph); Mathematical Physics (math-ph); Functional Analysis (math.FA); Optimization and Control (math.OC)\n arXiv:2012.09620 (cross-list from astro-ph.EP) [pdf, ps, other]\nTitle: Approximate Analytical Solution to the Zonal Harmonics Problem Using Koopman Operator Theory"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7308953,"math_prob":0.4634254,"size":1492,"snap":"2022-40-2023-06","text_gpt3_token_len":569,"char_repetition_ratio":0.2701613,"word_repetition_ratio":0.15246637,"special_character_ratio":0.4852547,"punctuation_ratio":0.2639296,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98831695,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T11:53:42Z\",\"WARC-Record-ID\":\"<urn:uuid:afa929e9-1ace-42b6-956f-d8bfdcd13312>\",\"Content-Length\":\"27811\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c584e5a5-c99a-4c9d-9b07-d8284f305914>\",\"WARC-Concurrent-To\":\"<urn:uuid:24edff0b-425b-46e4-ab56-0ae2af1ad57c>\",\"WARC-IP-Address\":\"128.84.21.203\",\"WARC-Target-URI\":\"https://arxiv-export-lb.library.cornell.edu/list/math.FA/2012?skip=190&show=25\",\"WARC-Payload-Digest\":\"sha1:JTXYIDTUJF3MVVBZ3YPHOEDS23JBNYCY\",\"WARC-Block-Digest\":\"sha1:7RFEBZZDOT3WFSF7OAIBAHEY2ROMMNYC\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500044.66_warc_CC-MAIN-20230203091020-20230203121020-00637.warc.gz\"}"} |
https://worksheets.tutorvista.com/fact-family-worksheets.html | [
" Fact Family Worksheets | Problems & Solutions",
null,
"# Fact Family Worksheets\n\nFact Family Worksheets\n• Page 1\n1.\nChoose the correct addition and subtraction fact family using 6, 17, and 11.",
null,
"a. 17 - 11 = 6, 17 - 6 = 11",
null,
"b. 6 + 11 = 17, 17 - 6 = 11",
null,
"c. 15 + 8 = 7, 7 + 8 = 15",
null,
"d. 11 + 17 = 6, 11 - 6 = 17\n\n#### Solution:\n\nFact family is a group of related facts using the same set of numbers.\n\nThe addition and subtraction fact family of 6, 17, and 11 is\n6 + 11 = 17, 11 + 6 = 17, 17 - 6 = 11, and 17 - 11 = 6.\n\nSo, the correct addition and subtraction fact family using 6, 17, and 11 is 6 + 11 = 17 and 17 - 6 = 11.\n\n2.\nWhich is the correct addition and subtraction fact family using 19, 5, and 14?",
null,
"a. 14 + 5 = 19, 19 - 14 = 5",
null,
"b. 5 + 14 = 21, 19 - 14 = 5",
null,
"c. 5 + 19 = 14, 14 - 5 = 19",
null,
"d. 14 + 19 = 33, 19 - 5 = 14\n\n#### Solution:\n\nFact family is a group of related facts using the same set of numbers.\n\nThe addition and subtraction fact family of 19, 5, and 14 is\n5 + 14 = 19, 14 + 5 = 19, 19 - 5 = 14, and 19 - 14 = 5.\n\nSo, the correct addition and subtraction fact family using 19, 5, and 14 is 14 + 5 = 19 and 19 - 14 = 5.\n\n3.\nWhich number sentence can be used to check your answer for 23 + 8 = 31?",
null,
"a. 31 - 23 = 9",
null,
"b. 31 - 8 = 23",
null,
"c. 23 - 8 = 31",
null,
"d. 31 + 8 = 23\n\n#### Solution:\n\nThe subtraction facts for the number sentence 23 + 8 = 31 are 31 - 23 = 8 and 31 - 8 = 23.\n\nSo, the number sentence 31 - 8 = 23 can be used to check the answer for 23 + 8 = 31.\n\n4.\nWhich number sentence is in the fact family for 24, 42, 18?",
null,
"a. 42 + 24 = 18",
null,
"b. 24 - 18 = 42",
null,
"c. 24 - 18 = 6",
null,
"d. 24 + 18 = 42\n\n#### Solution:\n\nFact family is a group of related facts using the same set of numbers.\n\nThe addition and subtraction fact family of 24, 42, and 18 is\n18 + 24 = 42, 24 + 18 = 42, 42 - 24 = 18, and 42 - 18 = 24.\n\nSo, the number sentence 24 + 18 = 42 is in the fact family for 24, 42 and 18.\n\n5.\nWhich number sentence is not in the fact family for 15, 3, 18?",
null,
"a. 18 - 15 = 3",
null,
"b. 18 - 3 = 15",
null,
"c. 15 + 18 = 33",
null,
"d. 15 + 3 = 18\n\n#### Solution:\n\nFact family is a group of related facts using the same set of numbers.\n\nThe addition and subtraction fact family of 15, 3, and 18 is\n3 + 15 = 18, 15 + 3 = 18, 18 - 3 = 15, and 18 - 15 = 3.\n\nSo, the number sentence 15 + 18 = 33 is not in the fact family for 15, 3, and 18.\n\n6.\nWhich multiplication fact could be used to find 49 ÷ 7?",
null,
"a. 8 × 9 = 72",
null,
"b. 7 × 7 = 49",
null,
"c. 5 × 6 = 30",
null,
"d. 49 × 7 = 343\n\n#### Solution:\n\n49 ÷ 7\n[Original expression.]\n\n49 is dividend, 7 is divisor, and 7 will be the quotient.\n[49 ÷ 7 = 7.]\n\nDividend becomes product, divisor and quotient become factors for multiplication fact.\n\nSo, the multiplication fact for 49 ÷ 7 is 7 × 7 = 49.\n\n7.\nWhich multiplication fact could be used to find 10 ÷ 5?",
null,
"a. 4 × 5 = 20",
null,
"b. 2 × 5 = 10",
null,
"c. 2 × 4 = 8",
null,
"d. 10 × 5 = 50\n\n#### Solution:\n\n10 ÷ 5\n[Original expression.]\n\n10 is the dividend, 5 is divisor, and 2 will be quotient.\n[10 ÷ 5 = 2.]\n\nDividend becomes product, divisor and quotient become factors for multiplicating fact.\n\nSo, the multiplication fact for 10 ÷ 5 is 2 × 5 = 10.\n\n8.\nWhich multiplication fact could be used to find 16 ÷ 4?",
null,
"a. 2 × 8 = 16",
null,
"b. 8 × 2 = 16",
null,
"c. 16 × 4 = 64",
null,
"d. 4 × 4 = 16\n\n#### Solution:\n\n16 ÷ 4\n[Original expression.]\n\n16 is dividend, 4 is divisor, and 4 will be the quotient.\n[16 ÷ 4 = 4.]\n\nDividend becomes product, divisor and quotient become factors for multiplicating fact.\n\nSo, the multiplication fact for 16 ÷ 4 is 4 × 4 = 16.\n\n9.\nWhich multiplication fact could be used to find 32 ÷ 4?",
null,
"a. 8 × 4 = 32",
null,
"b. 16 × 2 = 32",
null,
"c. 32 × 1 = 32",
null,
"d. I don′t know.\n\n#### Solution:\n\n32 ÷ 4\n[Original expression.]\n\n32 is dividend, 4 is divisor, and 8 will be the quotient.\n[32 ÷ 4 = 8.]\n\nDividend becomes product, divisor and quotient become factors for multiplicating fact.\n\nSo, the multiplication fact for 32 ÷ 4 is 8 × 4 = 32.\n\n10.\nWhich multiplication fact could be used to find 60 ÷ 5?",
null,
"a. 15 × 4 = 60",
null,
"b. 12 × 5 = 60",
null,
"c. 10 × 6 = 60",
null,
"d. 30 × 2 = 60\n\n#### Solution:\n\n60 ÷ 5\n[Original expression.]\n\n60 is dividend, 5 is divisor, and 12 will be the quotient.\n[60 ÷ 5 = 12.]\n\nDividend becomes product, divisor and quotient become factors for multiplication fact.\n\nSo, the multiplication fact for 60 ÷ 5 is 12 × 5 = 60."
]
| [
null,
"https://image.tutorvista.com/seonew/images/searchbutton.png",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/tick.gif",
null,
"https://image.tutorvista.com/del.gif",
null,
"https://image.tutorvista.com/del.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8833489,"math_prob":0.9994876,"size":2674,"snap":"2019-26-2019-30","text_gpt3_token_len":850,"char_repetition_ratio":0.16142322,"word_repetition_ratio":0.26739928,"special_character_ratio":0.37434554,"punctuation_ratio":0.17857143,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999659,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-21T17:39:01Z\",\"WARC-Record-ID\":\"<urn:uuid:ecbaa8be-a344-43a2-a321-63d42787aba0>\",\"Content-Length\":\"68020\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6b15e910-029e-4e55-b09f-fb7628e582ad>\",\"WARC-Concurrent-To\":\"<urn:uuid:b41ce064-8b0a-42cb-aea5-01de0e153b62>\",\"WARC-IP-Address\":\"173.192.158.3\",\"WARC-Target-URI\":\"https://worksheets.tutorvista.com/fact-family-worksheets.html\",\"WARC-Payload-Digest\":\"sha1:E72NMA4AKOTR33EG7FATXHLBG2FTY4UD\",\"WARC-Block-Digest\":\"sha1:2Y3PX2FSE5EDCUEPGFV2AANX6KEO7PEM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195527089.77_warc_CC-MAIN-20190721164644-20190721190644-00288.warc.gz\"}"} |
http://mechengdesign.co.uk/PlannedWeb/mfrg315/mohrc1.htm | [
"# Manufacturing Processes - MFRG 315 - Mohr's Circle\n\n1 Introduction\nIn two dimensional stress analysis (plane stress) there is often information available about direct (sigmax and sigmay) and shear stresses (tauxy) acting on a particular plane and either the values of the direct and shear stresses acting on a plane inclined at some angle to the first plane are required, or alternatively the values of the 2 principal stresses (sigma1 and sigma2) and the inclination of the plane on which they act are required.\n\nThis transformation calculation can be carried out using equations, but it was noticed by Mohr that these transformation equations can be combined to give the equation of a circle. This enables the transformation to be carried out graphically (and the equations need not be remembered). Using the graphical construction also makes it easier to visualise alternative scenarios.\n\nIn a Mohr stress circle, direct stresses are on the horizontal axis and shear stresses are on the vertical axis. Rotations of direction in a Mohr circle are double those in the real stress distribution. Tensile stresses and a shear stress tending to cause clockwise rotation are deemed to be positive. Compressive stresses and shear stresses tending to cause counter-clockwise rotation are deemed to be negative.\n\nMany metal forming operations involve a 3 dimensional state of stress so this is considered below.\n\n2 Mohr's Circle for Three Dimensional States of Stress\nA general approach to Mohr's circle in 3 dimensions is complicated, however this is hardly ever required as in virtually all metal forming problems we know the directions of at least 1 of the 3 principal stresses.\n\nIf the direction of 1 principal stress is known, say sigma3, then we can imagine looking back along the direction of sigma3 to the plane on which it acts (as this is a principal plane there are no shear stresses acting on it) and for the stresses acting in this plane a 2 dimensional Mohr's circle can be constructed to determine the values and directions of the two principal stresses acting in it.\n\nGiven the 3 principal stresses, three circles can be plotted, one for each principal plane. We can determine the stress state within a principal plane as we rotate about the principal stress direction normal to the plane. It is not possible using this approach to consider simultaneous rotations about 2 or more principal axes.\n\nIt can be stated that:\nThe stresses on any plane at any rotation, when plotted in the 3 dimensional Mohr's circle diagram will be represented by a point either on one of the 3 circles, or within the (shaded) area between the largest and 2 smaller circles.\n\nThe maximum shear stress is given by the radius of the largest circle.",
null,
"Some sketches of Mohr circle for common stress states are shown below:",
null,
"Determining the Stress State on Another Plane\nA further graphical construction enables the state of stress on any plane whose normal is inclined at angles 'alpha', 'beta' and 'gamma' to the sigma1, sigma2 and sigma3 directions respectively to be determined. (With direction cosines to the principal axes directions: l, m and n, respectively - For information about direction cosines).\n\nThe full procedure is:\n\n• 1. Draw the direct stress (horizontal) and the shear stress (vertical) axes.\n• 2. Mark the three principal stresses on the horizontal axis, sigma1 greater than sigma2 greater than sigma3.\n• 3. Draw the 3 circles\n• 4. Draw the line sigma1 - A - B inclined at angle alpha from the vertical through sigma1.\n• 5. Draw the lines sigma2 - C and sigma2 - D with inclinations of beta, either side of the vertical through sigma2.\n• 6. With centres C13 and C23 draw arcs DC and AB\n• 7. The direct and shear stress at P are given by its coordinates.\n\nAn example calculation is shown in the diagram below:",
null,
"The 3 circles are drawn for three principal stresses:\n\n• sigma1 = 120 MPa\n• sigma2 = 80 MPa\n• sigma3 = 20 MPa.\n\nThis gives a maximum shear stress of 50 MPa.\n\nThe construction shows the determination of direct and shear stresses on a plane at 45o to the sigma1 direction and 60o to the sigma2 direction (point 'P' on the diagram). From the scale diagram the direct stress value value is about 87 MPa and the shear stress value is about 39 MPa (see below).\n\nThis can be checked using the equations:\n\nFirst determine the third direction cosine: n = (1 - (l2 +m2))0.5\n\nn = (1 - (0.70712 + 0.52))0.5 = 0.5\n\nsigma = sigmall2 + sigma2m2 + sigma3n2\n\nsigma = 120(0.7071)2 + 80(0.5)2 + 20(0.5)2 = 85 MPa\n\nThe shear stress is given by:\n\nShear stress2 = (sigma1l)2 + (sigma2m)2 + sigma3n)2 - sigma2\n\nshear stress = 7200 + 1600 + 100 - 7225 = 40.9 MPa.\n\nFor most purposes a reasonably careful graphical construction provides adequate accuracy.\n\nDavid J Grieve, 8th November 2002."
]
| [
null,
"http://mechengdesign.co.uk/PlannedWeb/mfrg315/mohc1.gif",
null,
"http://mechengdesign.co.uk/PlannedWeb/mfrg315/mohrsamples.gif",
null,
"http://mechengdesign.co.uk/PlannedWeb/mfrg315/mohr3d.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8746863,"math_prob":0.9883782,"size":2857,"snap":"2019-13-2019-22","text_gpt3_token_len":639,"char_repetition_ratio":0.16719243,"word_repetition_ratio":0.004149378,"special_character_ratio":0.22611131,"punctuation_ratio":0.075,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99731743,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-26T05:35:14Z\",\"WARC-Record-ID\":\"<urn:uuid:c3d538e7-8c40-4f4e-809c-aae3a75e6f73>\",\"Content-Length\":\"7106\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ec6bde9f-41e3-40fa-839b-9d72aa5b1651>\",\"WARC-Concurrent-To\":\"<urn:uuid:3c20ae47-168f-4cb9-9211-a0e3979b5bdd>\",\"WARC-IP-Address\":\"81.27.85.15\",\"WARC-Target-URI\":\"http://mechengdesign.co.uk/PlannedWeb/mfrg315/mohrc1.htm\",\"WARC-Payload-Digest\":\"sha1:IQ6HFZTCZHKQYVGJ7IW2BKTNFAGPPEFE\",\"WARC-Block-Digest\":\"sha1:WHRY36W6YVWA5X3LTKFMGDILZ2FYT6F3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912204790.78_warc_CC-MAIN-20190326034712-20190326060712-00523.warc.gz\"}"} |
https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/Inflection_point | [
"Inflection point\n\nIn differential calculus, an inflection point, point of inflection, flex, or inflection (British English: inflexion) is a point on a continuous plane curve at which the curve changes from being concave (concave downward) to convex (concave upward), or vice versa.\n\nIf the curve is the graph of a function y = f(x), of differentiability class C2, this means that the second derivative of f vanishes and changes sign at the point. A point where the second derivative vanishes but does not change sign is sometimes called a point of undulation or undulation point.\n\nIn algebraic geometry an inflection point is defined slightly more generally, as a regular point where the tangent meets the curve to order at least 3, and an undulation point or hyperflex is defined as a point where the tangent meets the curve to order at least 4.\n\nDefinition\n\nInflection points are the points of the curve where the curvature changes its sign.\n\nA differentiable function has an inflection point at (x, f(x)) if and only if its first derivative, f′, has an isolated extremum at x. (This is not the same as saying that f has an extremum). That is, in some neighborhood, x is the one and only point at which f′ has a (local) minimum or maximum. If all extrema of f′ are isolated, then an inflection point is a point on the graph of f at which the tangent crosses the curve.\n\nA falling point of inflection is an inflection point where the derivative has a local minimum, and a rising point of inflection is a point where the derivative has a local maximum.\n\nFor an algebraic curve, a non singular point is an inflection point if and only if the multiplicity of the intersection of the tangent line and the curve (at the point of tangency) is odd and greater than 2.\n\nFor a curve given by parametric equations, a point is an inflection point if its signed curvature changes from plus to minus or from minus to plus, i.e., changes sign.\n\nFor a twice differentiable function, an inflection point is a point on the graph at which the second derivative has an isolated zero and changes sign.\n\nA necessary but not sufficient condition\n\nIf the second derivative, f''(x) exists at x0, and x0 is an inflection point for f, then f''(x0) = 0, but this condition is not sufficient for having a point of inflection, even if derivatives of any order exist. In this case, one also needs the lowest-order (above the second) non-zero derivative to be of odd order (third, fifth, etc.). If the lowest-order non-zero derivative is of even order, the point is not a point of inflection, but an undulation point. However, in algebraic geometry, both inflection points and undulation points are usually called inflection points. An example of an undulation point is x = 0 for the function f given by f(x) = x4.\n\nIn the preceding assertions, it is assumed that f has some higher-order non-zero derivative at x, which is not necessarily the case. If it is the case, the condition that the first nonzero derivative has an odd order implies that the sign of f'(x) is the same on either side of x in a neighborhood of x. If this sign is positive, the point is a rising point of inflection; if it is negative, the point is a falling point of inflection.\n\nInflection points sufficient conditions:\n\n1) A sufficient existence condition for a point of inflection is:\n\nIf f(x) is k times continuously differentiable in a certain neighbourhood of a point x with k odd and k ≥ 3, while f(n)(x0) = 0 for n = 2,...,k 1 and f(k)(x0) 0 then f(x) has a point of inflection at x0.\n\n2) Another sufficient existence condition requires f′′(x + ε) and f′′(x ε) to have opposite signs in the neighborhood of x (Bronshtein and Semendyayev 2004, p. 231).\n\nCategorization of points of inflection\n\nPoints of inflection can also be categorized according to whether f′(x) is zero or not zero.\n\n• if f′(x) is zero, the point is a stationary point of inflection\n• if f′(x) is not zero, the point is a non-stationary point of inflection\n\nA stationary point of inflection is not a local extremum. More generally, in the context of functions of several real variables, a stationary point that is not a local extremum is called a saddle point.\n\nAn example of a stationary point of inflection is the point (0,0) on the graph of y = x3. The tangent is the x-axis, which cuts the graph at this point.\n\nAn example of a non-stationary point of inflection is the point (0,0) on the graph of y = x3 + ax, for any nonzero a. The tangent at the origin is the line y = ax, which cuts the graph at this point.\n\nFunctions with discontinuities\n\nSome functions change concavity without having points of inflection. Instead, they can change concavity around vertical asymptotes or discontinuities. For example, the function $x\\mapsto {\\frac {1}{x}}$",
null,
"is concave for negative x and convex for positive x, but it has no points of inflection because 0 is not in the domain of the function."
]
| [
null,
"https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/I/m/d207e4d6d9278902dd0e1a54b1dab01f5b5037fa.svg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.88472617,"math_prob":0.9981903,"size":5699,"snap":"2022-05-2022-21","text_gpt3_token_len":1409,"char_repetition_ratio":0.19806848,"word_repetition_ratio":0.06938776,"special_character_ratio":0.24021758,"punctuation_ratio":0.11925795,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9984267,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-25T16:23:13Z\",\"WARC-Record-ID\":\"<urn:uuid:cffba545-0016-43a7-9289-79f954681e29>\",\"Content-Length\":\"22005\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bd8f583e-1e32-46c7-ab0c-57593e9432f3>\",\"WARC-Concurrent-To\":\"<urn:uuid:4a477421-8b73-4890-9a3c-fb86ebfd3476>\",\"WARC-IP-Address\":\"41.66.34.68\",\"WARC-Target-URI\":\"https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/Inflection_point\",\"WARC-Payload-Digest\":\"sha1:SAZ7HNTJ2XTJ5PGXBLHLL7I73JLEZTOV\",\"WARC-Block-Digest\":\"sha1:M2O6PRLA2E5WEXKCAXJEVRPE3II3OM2P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304859.70_warc_CC-MAIN-20220125160159-20220125190159-00053.warc.gz\"}"} |
https://www2.mdpi.com/2226-4310/10/5/392 | [
"Next Article in Journal\nOptimal Floquet Stationkeeping under the Relative Dynamics of the Three-Body Problem\nNext Article in Special Issue\nAerodynamic Optimization Design of Supersonic Wing Based on Discrete Adjoint\n\nFont Type:\nArial Georgia Verdana\nFont Size:\nAa Aa Aa\nLine Spacing:\nColumn Width:\nBackground:\nArticle\n\n# Explaining the Lack of Mesh Convergence of Inviscid Adjoint Solutions near Solid Walls for Subcritical Flows\n\nComputational Aerodynamics Group, National Institute of Aerospace Technology (INTA), Carretera de Ajalvir, Km 4, 28850 Torrejón de Ardoz, Spain\n*\nAuthor to whom correspondence should be addressed.\nAerospace 2023, 10(5), 392; https://doi.org/10.3390/aerospace10050392\nReceived: 21 March 2023 / Revised: 20 April 2023 / Accepted: 20 April 2023 / Published: 24 April 2023\n(This article belongs to the Special Issue Adjoint Method for Aerodynamic Design and Other Applications in CFD)\n\n## Abstract\n\n:\nNumerical solutions to the adjoint Euler equations have been found to diverge with mesh refinement near walls for a variety of flow conditions and geometry configurations. The issue is reviewed, and an explanation is provided by comparing a numerical incompressible adjoint solution with an analytic adjoint solution, showing that the anomaly observed in numerical computations is caused by a divergence of the analytic solution at the wall. The singularity causing this divergence is of the same type as the well-known singularity along the incoming stagnation streamline, and both originate at the adjoint singularity at the trailing edge. The argument is extended to cover the fully compressible case, in subcritical flow conditions, by presenting an analytic solution that follows the same structure as the incompressible one.\n\n## 1. Introduction\n\nIn a series of recent papers [1,2,3,4], it has been established that certain numerical adjoint solutions to the two and three-dimensional Euler equations have values at and near the surface of wings and airfoils that depend strongly on the mesh density, and which do not converge as the mesh is refined. This phenomenon has been observed for lift-based adjoint solutions for any subcritical or transonic flow condition and also for incompressible flow, while for drag-based adjoint solutions, it has only been observed in transonic rotational flows.\n\n## 2. Review of the Mesh Divergence Problem\n\nTo introduce the problem, we examine a fairly simple example: The adjoint solution for inviscid incompressible flow at an angle of attack α = 0° past a symmetrical van de Vooren airfoil given by the conformal transformation \n$z ( ζ ) = ( ζ − R ) k ( ζ − σ R ) k − 1 + 1$\nwhere $σ$ is a thickness parameter and k is related to the trailing-edge angle τ as $k = 2 − τ / π$. The transformation maps the airfoil in the complex z plane to a circle of radius $R = ( 1 + σ ) k − 1 / 2 k$ centered at the origin in the ζ plane. In this paper, we set $σ = 0.0371$ and $k = 86 / 45$, resulting in an airfoil with 12% thickness and finite trailing edge angle τ = 16° that closely resembles a NACA0012 airfoil. An exact flow solution for this case can be obtained with conformal mapping techniques (see and Section 3.1 below) and is shown in Figure 1, along with the geometry of the airfoil.\nLet us next consider the lift or drag-based adjoint problem for this flow. The adjoint problem is aimed at computing the sensitivity of a functional of the flow or cost function with respect to perturbations of the flow. (For a more thorough introduction to the adjoint method, see, for example, Refs. [10,11,12]). In the present case, the cost function is the aerodynamic lift or drag coefficient computed as\n$∫ S C p n → S ⋅ d → d s$\nwhere S denotes the wall boundary, $C p = ( p − p ∞ ) / c ∞$ is the non-dimensional pressure coefficient, p is pressure, $n → S$ is the outward pointing unit normal vector at the wall, $d → = ( cos α , sin α )$ for drag and $d → = ( − sin α , cos α )$ for lift, respectively, where α is the angle of attack, $c ∞ = ρ q ∞ 2 𝓁 / 2$ is a normalization constant, $ρ$ is the (constant) density, $q ∞ 2 = u ∞ 2 + v ∞ 2$ is the fluid velocity at the farfield and $𝓁$ is a reference length scale (typically the airfoil chord length).\nThe adjoint state $ψ T = ( ψ 1 , ψ x , ψ y )$ obeys the adjoint Euler equation\n$∇ ψ T ⋅ F → U = 0$\n$( ψ x , ψ y ) ⋅ n → S = c ∞ − 1 d → ⋅ n → S$\nand far-field b.c.\n$ψ T ( F → U ⋅ n → S ∞ ) δ U = 0 .$\nHere, $F → U = ∂ ( ρ v → , ρ v → u + p x ^ , ρ v → v + p y ^ ) T / ∂ ( p , ρ u , ρ v )$ is the (incompressible) flux Jacobian, $v → = ( u , v )$ is the fluid velocity and $δ U = ( δ p , δ ( ρ u ) , δ ( ρ v ) ) T$ is a linearized flow perturbation. This case should be straightforward to solve numerically, but it turns out to yield unexpected results, as we will see momentarily.\nThe drag and lift-based adjoint solutions corresponding to this case have been computed with the SU2 incompressible solver , which will be used for numerical testing in the remainder of the paper on a sequence of five progressively refined unstructured triangular meshes (labeled as meshes 1–5). SU2 solves the incompressible Euler equations with artificial compressibility using a cell-vertex finite volume central difference scheme with JST dissipation described in detail in .\nThe computational meshes are obtained from the basic triangular Euler mesh shown in Figure 2 by uniform refinement. The initial mesh (mesh 1) has 400 nodes on the airfoil profile and 6211 nodes, and 11,970 triangular elements throughout the flowfield, with the far-field placed at 100 chord lengths. At each refinement stage, every edge is bisected, and the resulting nodes are joined to form new triangles. In order to preserve the surface of the airfoil, a Bézier-spline surface reconstruction on the basis of the previous mesh is performed at each stage. The refined meshes 2–5 have 2.44 × 104, 9.67 × 104, 3.85 × 105, and 1.54 × 106 nodes, respectively, with the final mesh having 6400 nodes on the airfoil profile and 3.06 × 106 triangular elements throughout the flowfield.\nFigure 3 shows the flow variables along the airfoil profile for the sequence of meshes described above. The flow variables are quite accurate and converge with mesh refinement. The adjoint solution, on the other hand, shows a strikingly different behavior. Plotting the adjoint variables on the surface of the airfoil across the different mesh levels, one would expect to see at most a singularity at the trailing edge , with the solution along the remainder of the profile remaining stable or progressively converging over successive mesh levels. This is not what is observed, though. As can be seen in Figure 4, the drag-based adjoint solution (left) behaves smoothly even at the trailing edge and converges with mesh refinement, while the lift-based adjoint solution (right) diverges at the trailing edge on any given mesh and its value along the remainder of the airfoil grows continually as the mesh density increases. In Figure 4 and in the remainder of the paper, adjoint variables are non-dimensional. Dimensions can be restored by multiplying the variables by the appropriate powers of $ρ ∞$ and $v → ∞$, namely $ψ 1 = ψ ¯ 1 / ρ ∞ v → ∞$, $ψ x , y = ψ ¯ x , y / ρ ∞ v → ∞ 2$, where overbars denote non-dimensional variables.\nThis anomalous behavior was originally found in for the drag-based adjoint solution corresponding to two-dimensional, transonic inviscid flow past a NACA0012 airfoil at Mach number M = 0.8 and angle of attack α = 1.25°. In order to study the problem in more depth, the following tests were made in Refs. [1,2,3,4]:\n• Viscous cases were investigated to determine if the anomaly is limited to inviscid cases. It is.\n• The effect of cost function and flow regime was tested, with the following results:\n• For supersonic flow, neither lift nor drag-based adjoint solutions show this behavior.\n• For transonic, subsonic, and incompressible flow, lift-based adjoint solutions are always affected, while drag-based solutions are only affected for transonic rotational flows (such as, for example, shocked flow past a symmetric airfoil with non-zero angle of attack).\n• The adjoint state based on the far-field entropy flux $∫ S ∞ s v → ⋅ n ^ d s$ shows the same behavior as the near-field drag (s is the entropy). This output function is not based on near-field computations and, accordingly, the adjoint wall boundary condition is simply $( ψ x , ψ y ) ⋅ n → S = 0$ in this case [19,20].\n3.\nInviscid three-dimensional cases were tested, and the same behavior was found.\n4.\nThe behavior of the adjoint wall b.c. (4) with mesh refinement was investigated. It turned out to be well obeyed across mesh levels except in the immediate vicinity of the trailing edge.\n5.\nGiven the anomalous behavior, it was mandatory to test whether adjoint-based sensitivity derivatives are affected. They are not. In fact, they are actually quite accurate and fairly stable across mesh levels. This is extremely important, as one of the hallmarks of continuous adjoint methods is the possibility to compute the sensitivities using only the flow and adjoint solutions on the (wall) boundary.\n6.\nThe problem was originally discovered with DLR’s Tau code , which uses an unstructured, cell-vertex, finite-volume solver, and appeared in both the continuous and discrete adjoint solvers with upwind (Roe-type) and central schemes with JST artificial dissipation. However, similar results have been obtained with the SU2 code, ONERA’s structured, cell-centered ELSA code , and Imperial College’s Nektar++ code .\n7.\nOriginally, the anomaly was observed in airfoils with non-zero trailing-edge angle. In order to determine the effect of the trailing edge geometry, several different configurations, including blunt and cusped trailing edges, were tested. The anomaly was observed in all cases and also in blunt bodies such as circles and ellipses.\n8.\nThe effect of the far-field distance, resolution, and the adjoint far-field b.c. was tested, but no significant influence could be established.\n9.\nThe adjoint solutions were examined in order to establish whether the anomaly is related to any flow or adjoint singularity. It was found that the anomaly is always accompanied by the presence of an adjoint singularity at the trailing edge or rear stagnation point but also along the incoming stagnation streamline. Conversely, when such singularities are absent, the adjoint solution converges with mesh refinement.\n10.\nThe effect of numerical dissipation was tested by using a central scheme with JST artificial dissipation. On the one hand, mesh convergence studies were repeated with dissipation levels increasing with mesh size ($ε 2 ∼ N 1 2 D$, where $ε 2$ is the second dissipation coefficient, N is the number of grid nodes and D is the number of spatial dimensions) without significant qualitative changes in the behavior. On the other hand, the actual value of the adjoint solution at the wall on a given mesh was found to depend strongly on the dissipation level in such a way that reducing the dissipation increases the value of the adjoint solution, mimicking the effect of mesh refinement. A similar behavior of the values of the adjoint variables in the near-wall cells in a cell-centered solver has been pointed out in .\n11.\nIn addition, it was shown in (see also ) that linear perturbations to lift or drag caused by numerical solutions containing point singularities corresponding to stagnation pressure perturbations appear to diverge towards the wall, while other point perturbations (mass, normal force or enthalpy, using the nomenclature of ) do not. Since point perturbations are closely related to the adjoint state, this result could indicate the presence of a singularity of the adjoint variables at the wall.\n\n## 3. Analytic Adjoint Solution for Incompressible Flow\n\nIt was conjectured in that the anomaly is a numerical effect triggered by the adjoint singularity at the trailing edge, but no precise explanation of the actual mechanism responsible for this behavior was given. Local mesh dependence near adjoint singularities is to be expected, but mesh dependence across the entire wall is puzzling unless one is willing to admit the presence of a singularity at the wall. This possibility was, however, erroneously ruled out in based on the lack of positive evidence in the analysis carried out in of the analytic properties of 2D adjoint solutions, which did not give any hint of an adjoint singularity at the wall (but did not preclude it either). Furthermore, even mesh-diverging numerical adjoint variables respect fairly well the wall b.c. and produce well-defined, mesh-converging adjoint-based sensitivity derivatives computed with wall data alone, all of which seemed to rule out a possible adjoint wall singularity. On the other hand, the results presented in with point perturbations give a clue in the precise opposite direction. It appears that the only possibility for further progress is to examine an actual analytic adjoint solution. There is a systematic procedure to build analytic adjoint solutions based on the Green’s function approach , which is based on the observation that the adjoint variables at a particular point correspond to the cost function evaluated using the Green’s function for the same point. By identifying suitable point perturbations whose effect on the cost function is computable, it is possible to obtain the corresponding adjoint solution. This approach was used in to obtain analytic adjoint solutions for the quasi-one-dimensional Euler equations. In the 2D case, the procedure was outlined for the compressible case in and used in to obtain closed-form drag and lift-based analytic adjoint solutions for two-dimensional inviscid incompressible flows around airfoils. The construction for the incompressible case involves three linearly independent Green’s functions as many as there are flow equations or adjoint variables. The Green’s functions $δ U ( j ) ( x → , ξ → )$ are the linearized response to singular point perturbations with sources $f ( j ) ( ξ → ) δ ( x → − ξ → ) ,$ j = 1, …, 3, and obey the linearized equations\n$∇ ⋅ ( F → U δ U ( j ) ( x → , ξ → ) ) = f ( j ) ( ξ → ) δ ( x → − ξ → )$\nwhere $δ ( x → − ξ → )$ is the Dirac delta function. By definition of the adjoint state, the effect of $δ U ( j ) ( x → , ξ → )$ on the cost function can be computed as\n$δ I ( j ) ( ξ → ) = ψ T ( ξ → ) f ( j ) ( ξ → )$\nConversely, Equation (7) can be used to compute the adjoint variables in terms of linearized functionals $δ I ( j )$. If $f k ( j ) = δ k j$, then $ψ ( ξ → ) = ( δ I ( 1 ) ( ξ → ) , δ I ( 2 ) ( ξ → ) , δ I ( 3 ) ( ξ → ) ) T$, i.e., the ith adjoint variable is equal to the value of the objective function for the ith Green’s function. For more general source vectors, if the linearized functionals $δ I ( j )$ are known, the adjoint solution can be obtained as\n$ψ T ( ξ → ) = δ I ( 1 ) , δ I ( 2 ) , δ I ( 2 ) ⋅ f ( 1 ) | f ( 2 ) | f ( 3 ) − 1$\nwhere $f ( 1 ) | f ( 2 ) | f ( 3 )$ is a matrix whose columns are the vectors $f ( j ) ( ξ → )$. The basic idea of the approach is then to select the flow perturbations, identify the source terms $f ( j )$, evaluate $δ I ( j )$ and finally obtain ψ from (8).\nIn what follows, we will explain how to obtain the analytic adjoint solution for the van de Vooren airfoil introduced in Section 2, referring the interested reader to for further details.\n\n#### 3.1. Analytic Flow Solution\n\nWe start by deriving the analytic flow solution corresponding to the case of inviscid, incompressible flow past the airfoil defined by the conformal mapping (1). The map transforms a circle of radius $R = ( 1 + σ ) k − 1 / 2 k$ centered at the origin of coordinates in the complex $ζ = X + i Y$ plane to a symmetric airfoil with unit chord and finite trailing edge angle $τ = π ( 2 − k )$ in the $z = x + i y$ plane. The airfoil geometry is given by\n$z ( θ ) = ( R e i θ − R ) k ( R e i θ − σ R ) k − 1 + 1$\nwhere 0 ≤ θ ≤ 2π is the polar angle in the ζ-plane, $σ = 0.0371$ and $k = 86 / 45$. The trailing edge of the airfoil is at $θ = 0$, which corresponds to z = 1 and $ζ t e = R$.\nSince the flow around the airfoil is irrotational and incompressible, it can be completely described in terms of a complex function, the complex potential, whose real part gives the velocity potential and whose imaginary part gives the stream function. By a well-known feature of conformal mappings (see , Chapter 6), the complex potential describing the flow in the airfoil plane is the same as in the circle plane, but the latter is much easier to compute. The complex potential defining a flow with far-field velocity ($q ∞$cos α,$q ∞$sin α) and circulation $Γ 0$ around a circle of radius R centered at ζ = 0 in the ζ-plane is \n$Φ ( ζ ) = q ∞ e − i α ζ + q ∞ e i α R 2 ζ − i Γ 0 2 π ln ζ$\nThe Cartesian velocity components (U,V) in the ζ-plane are obtained from the complex derivative of the potential\n$W ζ = U − i V = d Φ d ζ = q ∞ e − i α − q ∞ e i α R 2 ζ 2 − i Γ 0 2 π 1 ζ$\nSince the ζ and z planes are related by a conformal transformation, the potential at a point z on the airfoil plane is simply $F ( z ) = Φ ( ζ ( z ) )$, and the corresponding Cartesian velocity components are then\n$u − i v = d F d z = d ζ d z W ζ ( ζ ( z ) )$\nThere is a critical point in the conformal mapping (1) at the trailing edge, where $d z / d ζ = 0$ at z = 1. It is clear from Equation (12) that the flow will have a singularity at the trailing edge unless $W ζ ( ζ t e ) = d Φ / d ζ ζ = ζ t e = 0$. This is the Kutta condition, which physically corresponds to placing a stagnation point in the $ζ$-plane at $ζ t e = R$. Recalling Equation (11), this can be achieved by giving the hitherto undefined circulation $Γ 0$ the value\n$Γ 0 = − 4 π q ∞ R sin α$\nwhich vanishes for α = 0.\n\nIn order to choose the appropriate perturbations, we recall that for 2D compressible flows, Giles and Pierce considered 4 point perturbations: A mass source at fixed enthalpy and stagnation pressure, a point force in the direction normal to the local flow, and point perturbations to the stagnation enthalpy and pressure. The first two correspond to potential flow perturbations (the source and the vortex), while the last two are equivalent if the flow is incompressible. For 2D inviscid, incompressible flow, we choose exactly the same perturbations. If we also restrict ourselves to irrotational base flows, we are left with two known perturbations (the potential source and vortex), whose effect on lift and drag can be computed using complex variable techniques, while the effect of the third one will turn out to be computable in terms of the first two.\n• Source and vortex\nThe relevant source vectors for the first two Green’s functions are $f ( 1 ) ( ξ → ) = ( 1 , u , v ) T$ for the source and $f ( 2 ) ( ξ → ) = ( 0 , v , − u ) T$ for the vortex, respectively. Their linearized contributions to drag and lift, denoted as , can be computed with complex variable techniques as\n$( δ D − i δ L ) ( 1 ) = ε e i α ( u − i v − q ∞ e − i α ) + i ρ q ∞ δ Γ 0 + O ( ε 2 ) ( δ D − i δ L ) ( 2 ) = i ε e i α ( u − i v − q ∞ e − i α ) + i ρ q ∞ δ Γ 0 + O ( ε 2 )$\nwhere the superscripts stand for source (1) and vortex (2), respectively, and only the leading terms in the singularity strength $ε$ are kept, which is appropriate since we are seeking the linearized force induced by the point perturbations. In Equation (14), the first term on the right-hand side corresponds to the force exerted by a source or a vortex on a body as given by Lagally’s theorem , while the term $i ρ q ∞ δ Γ 0$ reflects the contribution to the force due to the perturbation to the circulation caused by the singularities. The value of $δ Γ 0$ is obtained by considering the perturbation to the Kutta condition, which fixes the value of the circulation around the body. For an airfoil with a sharp trailing edge, the point perturbations disturb the flow at the trailing edge, and the circulation has to be readjusted accordingly to prevent a flow singularity appearing at the trailing edge. For blunt bodies without sharp trailing edges, a Kutta-like condition is also required in order to derive consistent adjoint solutions, the condition, in that case, being that the perturbation induced by the point singularity does not change the position of the rear stagnation point.\nThe computation of $δ Γ 0$ is as follows. After inserting a point perturbation at a point $ζ s$ in the ζ-plane, the potential receives an extra contribution from the singularity and its images , which have to be inserted in order to preserve the non-transpiration boundary condition. The complete potential describing the base flow + the singularity in the $ζ$-plane is now $Φ ( ζ ) + Φ s ( ζ )$, where $Φ ( ζ )$ is given in Equation (10) and\n$Φ s ( ζ ) = ν 2 π ρ ln ζ − ζ s + ν ¯ 2 π ρ ln ζ − R 2 ζ s ¯ − ν ¯ 2 π ρ ln ζ$\nwhere $ν = ε$ for a source and $ν = − i ε$ for a point vortex, and complex conjugation is denoted with an overbar. The perturbation potential $Φ s ( ζ )$ gives rise to a non-zero velocity at the trailing edge $ζ t e = R$,\n$W s ( ζ t e ) = d Φ s d ζ ζ = R = ν 2 π ρ R − ζ s + ν ¯ 2 π ρ 1 R − R 2 ζ s ¯ − ν ¯ 2 π ρ R$\nwhich has to be compensated with the additional circulation\n$δ Γ 0 = − 2 π i R W s ( ζ t e )$\nin order to preserve the Kutta condition so that Equation (14) yields, after some rearrangement,\n$( δ D − i δ L ) ( 1 ) = − ε q ∞ R ζ s − R − R ζ s ¯ − R + ε e i α ( u − i v − q ∞ e − i α ) + O ( ε 2 ) ( δ D − i δ L ) ( 2 ) = − i ε q ∞ R ζ s − R + R ζ s ¯ − R + i ε e i α ( u − i v − q ∞ e − i α ) + O ( ε 2 )$\nHence, the properly normalized linearized functionals are (we separate the real and imaginary parts in Equation (18), set ε = 1 and divide by $c ∞$)\n$δ I D ( 1 ) ( ξ → ) = 1 c ∞ u cos α + v sin α − q ∞ x → = ξ → δ I L ( 1 ) ( ξ → ) = 1 c ∞ v cos α − u sin α x → = ξ → + q ∞ c ∞ ϒ ( 1 ) ( ξ → ) δ I D ( 2 ) ( ξ → ) = 1 c ∞ v cos α − u sin α x → = ξ → δ I L ( 2 ) ( ξ → ) = − 1 c ∞ u cos α + v sin α − q ∞ x → = ξ → + q ∞ c ∞ ϒ ( 2 ) ( ξ → )$\nwhere\n$ϒ ( 1 ) ( z ) = − i R ζ ( z ) − R − R ζ ¯ ( z ) − R = − 2 R Y X − R 2 + Y 2 ϒ ( 2 ) ( z ) = R ζ ( z ) − R + R ζ ¯ ( z ) − R = 2 R X − R X − R 2 + Y 2$\nare the contribution to lift of the circulation required to restore the Kutta condition for the source and the vortex, respectively. Recall that capital letters (X,Y) denote coordinates in the ζ-plane, $ζ = X + i Y$, and are given in terms of z = x + iy by the inverse conformal mapping. We see from (20) that both $ϒ ( 1 )$ and $ϒ ( 2 )$ are singular at the trailing edge $ζ t e = R$. Hence, the perturbation to drag is smooth in both cases, while the perturbation to lift has a singularity at the trailing edge due to the perturbations to the Kutta condition.\nAdditionally, $ϒ ( 2 )$ has a very interesting behavior on the surface of the airfoil that has very profound consequences. One can check from Equation (20) that $ϒ ( 2 ) = − 1$ throughout the airfoil (defined by on the ζ-plane). Using this property, we find that, in the limit as the vortex approaches the surface of the airfoil, the linearized lift is\n$δ I L ( 2 ) → − 1 c ∞ u cos α + v sin α$\nSince $δ I L ( 2 ) = ψ T f ( 2 ) = ( ψ x , ψ y ) ⋅ ( v , − u )$ and $( v , − u ) ∼ q n → S$ at the wall, it follows, therefore, from Equation (21) that\n$( ψ x , ψ y ) ⋅ n → S = 1 c ∞ n → S ⋅ − sin α , cos α$\nwhich is the adjoint wall b.c. (4). This link between the behavior of $δ I L ( 2 )$ near the wall and the adjoint b.c. was pointed out in and constitutes a serious check on the validity of the whole approach. In fact, without $ϒ ( 2 )$, or if $ϒ ( 2 ) ≠ − 1$ on the airfoil, the adjoint solution obtained from the Green’s functions would fail to obey the wall boundary condition, which is the ultimate reason why a Kutta condition on the perturbed flow is required even on blunt bodies.\n• Change in total pressure at fixed static pressure and flow direction\nAs in , the third Green’s function is taken to be the response to a stagnation pressure perturbation. The source vector is $f ( 3 ) ( ξ → ) = q − 2 ( 1 , 2 u , 2 v ) T$, and the perturbation that it produces to either lift or drag is \n$δ I ( 3 ) ( ξ → ) = − ∫ 0 ∞ d s ∂ s q − 2 ( x → ( s ) ) δ I ( 1 ) ( x → ( s ) ) + 2 ∫ 0 ∞ d s q − 2 ∂ s ϕ ( x → ( s ) ) δ I ( 2 ) ( x → ( s ) )$\nwhere $ϕ$ is the local flow angle and $q 2 = u 2 + v 2$. Equation (23) involves an integration along the local streamline passing through $ξ →$ and $s$ is the distance along the streamline downstream of $ξ →$. Substituting Equations (19) into (23) and carrying out the integrals yields the linearized drag and lift corresponding to the third point perturbation\n$δ I D ( 3 ) ( ξ → ) = − 1 q 2 q ∞ c ∞ ( v → − v → ∞ ) 2 δ I L ( 3 ) ( ξ → ) = − 2 q 2 c ∞ ( u sin α − v cos α ) x → = ξ → − q ∞ c ∞ Ξ ( ξ → )$\nwhere\n$Ξ ( ξ → ) = − ∫ 0 ∞ d s ∂ s q − 2 ( x → ( s ) ) ϒ ( 1 ) ( x → ( s ) ) + 2 ∫ 0 ∞ d s q − 2 ∂ s ϕ ( x → ( s ) ) ( 1 + ϒ ( 2 ) ( x → ( s ) ) )$\nAgain, the perturbation to drag is smooth, while the perturbation to lift (25) diverges along the dividing streamline upstream of the trailing edge, as will be discussed shortly. This includes the well-known singularity of the incoming stagnation streamline but also a new singularity along the wall.\nThe analytic adjoint solutions can now be computed from Equations (8), (19) and (24) as\n$ψ 1 ψ x ψ y = 1 0 q − 2 u v 2 q − 2 u v − u 2 q − 2 v − T δ I ( 1 ) δ I ( 2 ) δ I ( 3 ) = 2 0 − q 2 − q − 2 u q − 2 v u − q − 2 v − q − 2 u v δ I ( 1 ) δ I ( 2 ) δ I ( 3 )$\nThis yields for drag the solution\n$ψ 1 ψ x ψ y D r a g = 1 c ∞ q ∞ q 2 − q ∞ 2 q ∞ cos α − u q ∞ sin α − v$\nwhich is smooth everywhere (and simply expressible in terms of local values of the flow variables) and is identical to the analytic drag adjoint solution found in . It can be readily checked that (27) obeys the adjoint wall boundary condition and the adjoint equations and compares beautifully with a numerical solution obtained with the SU2 solver (Figure 5).\nFor lift, Equation (26) yields the solution\n$ψ 1 ψ x ψ y L i f t = q ∞ c ∞ 2 ϒ ( 1 ) − q 2 Ξ − q ∞ − 1 sin α + u Ξ − u q 2 ϒ ( 1 ) + v q 2 1 + ϒ ( 2 ) q ∞ − 1 cos α + v Ξ − v q 2 ϒ ( 1 ) − u q 2 1 + ϒ ( 2 )$\nAgain, it can be checked that Equation (28) obeys the adjoint wall b.c. and the adjoint equations. We see from (28) that the singularities of the linearized lift described above are transferred to the lift-based adjoint solution. The solution, therefore, has a primary singularity at the trailing edge caused by $ϒ ( 1 )$ and $ϒ ( 2 )$ and, thus, by the Kutta condition. It also has a singularity along the dividing streamline upstream of the trailing edge caused by the streamline integral Ξ. Recall that the value of Ξ at a point $ξ →$ in the domain is given by Equation (25), which is a downstream integration along the local streamline passing through $ξ →$. As $ξ →$ approaches either the incoming stagnation streamline or the wall, the local streamline approaches the singularity at the trailing edge and Ξ diverges due to the divergence at the trailing edge. The trailing edge divergence thus explains both the singularities at the incoming stagnation streamline and the wall, which, in fact, show an identical behavior $Ξ ∼ 1 / d 1 / 2 + τ / π$ with the distance d to the stagnation streamline or the wall. This behavior is not universal since it depends on the trailing edge angle τ, and reduces to the inverse square-root behavior predicted in for cusped trailing edges. Downstream of the trailing edge, the dividing streamline is not singular (the streamline integral behaves as $Ξ ∼ d$, where d is the distance to the dividing streamline) except at the trailing edge itself, where $Ξ ∼ 1 / d 1 + 2 τ / π 2 − τ / π$ and d is now the minimum distance to the trailing edge along the streamline. Setting $τ = π$ correctly reproduces the results for blunt bodies such as the circle, and Equation (28) also applies to those cases (recall the above discussion concerning the perturbed Kutta condition for blunt bodies).\nIn order to produce a sample analytic solution for the case at hand, the streamline integral Ξ needs to be computed. This requires prior determination of the streamline passing by a given point, which is done by direct numerical integration of the equation $d x → / d t = v → ( x → )$ with a fourth-order Runge–Kutta method (see e.g., ). The streamline tracing is performed in the circle plane and then transferred to the airfoil plane via the conformal transformation (1). The analytic lift adjoint solution obtained in this way is shown in Figure 6.\nAs expected, the solution shows singularities at the wall, the incoming stagnation streamline, and the trailing edge, but not at the rear stagnation streamline. This is more clearly illustrated in Figure 7, Figure 8, Figure 9 and Figure 10, which plot the first adjoint variable ψ1 along lines approaching the stagnation streamline upstream of the airfoil, the wall, the trailing edge, and the rear stagnation streamline, respectively, as indicated in Figure 6. In these plots, the numerical results obtained with the SU2 solver are also included. The analytic and numerical solutions show an excellent agreement, and both diverge as the wall is approached. It is then clear that the anomaly observed in numerical computations is caused by the divergence of the analytic solution at the wall. This is further illustrated in Figure 11, where the analytic lift adjoint solution is shown along a succession of O-shaped curves surrounding the van der Vooren airfoil profile and progressively closer to it (the O-curves are built as circumferences concentric with the circle in the circle plane and are subsequently transferred to the airfoil plane via the conformal transformation.) The analytic solution grows unbounded as the curves approach the wall. This behavior is identical to the behavior observed in with the cell-centered ELSA solver, which does not directly compute the solution at the wall. On the other hand, solvers such as SU2 and Tau use cell-vertex schemes that compute the solution at the wall. Even though the analytic solution is infinite at the wall, the numerical dissipation of the solver stabilizes the divergence, producing a finite value at the profile, which nevertheless varies continually as the grid spacing (see and Figure 4) or the intensity of the numerical dissipation change.\nFinally, Figure 12 and Figure 13 how the value of the linearized lift functionals $δ I L ( 1 )$ and $δ I L ( 2 )$ on the surface of the airfoil computed with the analytic solution and the numerical adjoint solution obtained with the SU2 solver on the sequence of meshes of Figure 4. Notice that $δ I L ( 1 )$ (the linearized perturbation to the lift caused by a point mass source) is related to the (continuous) adjoint-based lift gradient \n$δ ∫ S C p n → S ⋅ d → d s = ∫ S c ∞ − 1 ( δ x → ⋅ n → S ) ( d → ⋅ ∇ p ) d s − ∫ S ( n → S ⋅ δ v → ) ρ ( ψ 1 + v → ⋅ ( ψ x , ψ y ) ) d s$\n($δ v →$ is the perturbed velocity, and the first term on the right-hand side stands for the purely geometric variation of the cost function which need not concern us here), while $δ I L ( 2 )$ (the linearized perturbation to the lift caused by a point vortex) approaches $q n → S ⋅ ( ψ x , ψ y )$ as the point approaches the wall and is thus directly related to the adjoint b.c.\nWe note three significant points here:\n• There is a nice agreement between the analytic and numerical results. It is clear (again) that the analytic solution can be used for verification of numerical adjoint solvers.\n• In the previous point, we probably overlooked the fact that the quantities computed with the analytic solution are finite in spite of the fact that the analytic solution diverges at the wall.\n• Similarly, the quantities computed with the numerical solution are stable against mesh refinement despite being computed with an adjoint solution that diverges with mesh refinement.\n• The explanation of the above facts is simple in view of the analytic solution (28). As was already conjectured in , the adjoint variables $ψ 1 , ψ x , ψ y$ diverge towards the wall while the combinations\n$δ I L ( 1 ) = ψ 1 + v → ⋅ ( ψ x , ψ y ) = ( q ∞ ϒ ( 1 ) − u sin α + v cos α ) / c ∞ δ I L ( 2 ) = v ψ x − u ψ y = ( − v sin α − u cos α + q ∞ ( 1 + ϒ ( 2 ) ) ) / c ∞$\nremain finite except at the trailing edge. This is a serious check of the validity of the solution and explains why a divergent adjoint solution can obey finite boundary conditions and lead to well-defined sensitivities.\n\n## 4. Analytic Adjoint Solution for Subcritical Flow\n\nNumerical adjoint solutions for subcritical flows are very similar to their incompressible counterparts. Drag-based adjoint solutions are free of singularities and converge well with mesh refinement, while lift-based adjoint solutions possess singularities along the dividing streamline upstream of the trailing edge and diverge with mesh refinement, as illustrated in Figure 14, where the similarity to the incompressible case (Figure 4) is evident.\nIn order to extend the preceding analysis to this case, analytic flow and adjoint solutions are required. Unfortunately, no analytic flow solution is known in general for the subcritical case, and no systematic procedure for building exact Green’s functions is known to the authors. However, we do not need the full Green’s functions but only their corresponding linearized functionals. In the incompressible case, we obtained them using Lagally’s theorem, which can be demonstrated by transferring the integral over the wall to the farfield boundary using the asymptotic forms of the flow near the singularity and the farfield . We could try to explore the possibility of using the same approach in the compressible case using the linearized flow Equation (6) and making assumptions about the asymptotic structure of the perturbed flow at the farfield following [27,28], but we have not attempted this approach here. Instead, we have followed a more direct, somewhat heuristic route that takes advantage of the fact that an analytic adjoint solution for the drag-based adjoint equations that is valid for two-dimensional inviscid isentropic irrotational flows (such as, for example, subcritical inviscid flow past 2D airfoils) has been obtained in . The solution is the following\n$ψ D = 1 ρ ∞ 1 − γ q ∞ c ∞ H ρ 1 − γ − H ∞ ρ ∞ 1 − γ − ρ 1 − γ u + ρ ∞ 1 − γ q ∞ cos α − ρ 1 − γ v + ρ ∞ 1 − γ q ∞ sin α ρ 1 − γ − ρ ∞ 1 − γ$\nwhere H is the enthalpy and γ is the ratio of specific heats. Using this solution, it is possible to compute the linearized drag functionals for the four point perturbations introduced in (mass source, point force normal to the local flow, and point perturbations to the stagnation enthalpy and pressure) as\n$δ I D = δ I D ( 1 ) δ I D ( 2 ) δ I D ( 3 ) δ I D ( 4 ) = 1 0 − 1 2 H 1 p 0 γ − 1 γ + 1 γ M 2 u − ρ v 0 u p 0 γ − 1 γ + 2 γ M 2 v ρ u 0 v p 0 γ − 1 γ + 2 γ M 2 H 0 1 2 H p 0 γ − 1 γ + 1 γ M 2 T ψ D = 1 c ∞ q ∞ ( q → − q → ∞ ) ⋅ q → ∞ ρ ( − v , u ) ⋅ q → ∞ 0 − 1 ρ 0 q 2 ( q → − q → ∞ ) 2$\nwhere $ρ 0 = γ γ − 1 p 0 H$ is the (constant) stagnation density. In view of Equation (32), and by analogy with the incompressible case, we can infer that the forces exerted by the “source” and the “vortex” (the first two perturbations) on the wall are, respectively,\n$F → 1 = q → − q → ∞ F → 2 = ρ ( q → − q → ∞ ) ⊥$\nwhere $q → ⊥ ≡ ( − v , u )$. Notice that these agree with the first two rows in Equation (32) if we project the force vectors along $q ^ ∞ = ( cos α , sin α )$ and divide by $c ∞$. Any additional component along $q ^ ∞ ⊥ = ( − sin α , cos α )$ can be discarded as far as the lift adjoint ansatz presented in Equation (35) below is concerned, as it can be absorbed into the Kutta functions.\nAs for the fourth row in Equation (32), it is related to the first two, as in the incompressible case, by means of a streamline integral, which for compressible flows takes the form\n$δ I ( 4 ) = − 1 ρ 0 ∫ 0 ∞ d s ′ ∂ s q − 2 δ I ( 1 ) + ∫ 0 ∞ d s ′ 2 ρ q 2 ∂ s ϕ δ I ( 2 )$\nIt is easy to check that, substituting $δ I D ( 1 )$ and $δ I D ( 2 )$ from Equations (32) into (34) one recovers $δ I D ( 4 )$. There are some minor differences between the above formulae and their incompressible counterparts that stem from the different normalization of the source terms in [5,7].\nWe can now make an ansatz for the linearized lift functionals using Equations (33) and (34). For lift, the forces are projected along $q ^ ∞ ⊥ = ( − sin α , cos α )$. A second, a priori singular part needs to be added. This part contains the lift generated by the additional circulation required to maintain smooth flow at the trailing edge in the presence of the point perturbations, and we make the assumption that it can be incorporated as in Equation (19) for the incompressible case. This procedure results in the following ansatz for the linearized lift\n$δ I L ( 1 ) = F → 1 ⋅ q ^ ∞ ⊥ + K u t t a 1 = 1 c ∞ q ∞ v u ∞ − u v ∞ + q ∞ c ∞ ϒ ( 1 ) δ I L ( 2 ) = F → 2 ⋅ q ^ ∞ ⊥ + K u t t a 2 = ρ c ∞ q ∞ q → − q → ∞ ⋅ q → ∞ − ρ q ∞ c ∞ ϒ ( 2 ) δ I L ( 3 ) = 0 δ I L ( 4 ) = − 1 ρ 0 ∫ 0 ∞ d s ′ ( ∂ s q − 2 δ I ( 1 ) + 2 ρ q 2 ∂ s ϕ δ I ( 2 ) ) = − 2 ρ 0 c ∞ q ∞ q 2 ( u v ∞ − v u ∞ ) + q ∞ ρ 0 c ∞ Ξ$\nwhere are two unknown functions and\n$Ξ = − ∫ 0 ∞ d s ′ ( ∂ s q − 2 ϒ ( 1 ) − 2 q 2 ∂ s ϕ ( 1 + ϒ ( 2 ) ) )$\nis the streamline integral for the compressible case. Using Equation (35) and the inverse of Equation (32), we get the following form for the lift-based analytic adjoint solution for subcritical flows\n$ψ 1 ψ x ψ y ψ 4 L i f t = q ∞ c ∞ ( γ − 1 ) ρ 2 γ p ( 2 ϒ ( 1 ) − q 2 Ξ ) H − sin α q ∞ + ( γ − 1 ) ρ H γ p u Ξ − ( γ − 1 ) ρ γ p ( H + 1 2 q 2 ) u q 2 ϒ ( 1 ) + v q 2 1 + ϒ ( 2 ) cos α q ∞ + ( γ − 1 ) ρ H γ p v Ξ − ( γ − 1 ) ρ γ p ( H + 1 2 q 2 ) v q 2 ϒ ( 1 ) − u q 2 1 + ϒ ( 2 ) ( γ − 1 ) ρ 2 γ p ( 2 ϒ ( 1 ) − q 2 Ξ )$\nThe solution (37) is only valid for steady two-dimensional inviscid isentropic irrotational flows. Unlike in the incompressible case, the form of the Kutta functions in Equations (35)−(37) which are the contributions to lift of the trailing edge condition for the first two point perturbations, is a priori unknown and may be very hard to guess. However, the adjoint b.c. (4) requires that $ϒ ( 2 ) = − 1$ at the airfoil profile. Likewise, demanding that Equation (37) obeys the adjoint equations puts the following additional constraints on\n$( M 2 − 1 ) ρ v → ⋅ ∇ ϒ ( 1 ) + ( v , − u ) ⋅ ∇ ( ρ ( 1 + ϒ ( 2 ) ) ) = 0 ρ ( v , − u ) ⋅ ∇ ϒ ( 1 ) + v → ⋅ ∇ ( ρ ( 1 + ϒ ( 2 ) ) ) = 0$\nwhere M is the local Mach number. In the incompressible case, are the imaginary and real parts of a meromorphic function and, thus, obey the Cauchy–Riemann equations $∂ x ϒ ( 1 ) = − ∂ y ϒ ( 2 )$ and $∂ y ϒ ( 1 ) = ∂ x ϒ ( 2 )$. Multiplying alternatively $∇ ϒ ( 1 )$ and $∇ ϒ ( 2 )$ by the velocity vector $v →$ and using the Cauchy–Riemann equations leads to Equation (38) with constant $ρ$ and M = 0.\nUsing streamline coordinates, Equation (38) can be written as\n$( 1 − M 2 ) ρ ∂ s ϒ ( 1 ) + ∂ n ( ρ ( 1 + ϒ ( 2 ) ) ) = 0 ρ ∂ n ϒ ( 1 ) − ∂ s ( ρ ( 1 + ϒ ( 2 ) ) ) = 0$\nwhere s is the coordinate along streamlines and n is the coordinate perpendicular to streamlines. Since $ϒ ( 2 ) = − 1$ at the wall, it follows from the second equation in Equation (39) that $∂ n ϒ ( 1 ) w a l l = 0$.\nIt is clear from Equation (37) and the subsequent arguments that the structure of the solution is very similar to the incompressible case. The numerical solutions are also quite similar and have the same set of singularities, even though the precise values of the adjoint variables differ. The solution given in Equation (37) will have singularities at the trailing edge and the dividing streamline upstream of the trailing edge if are singular at the trailing edge and grow sufficiently fast towards it. That diverge at the trailing edge is a reasonable assumption since the closer the perturbation to the trailing edge, the greater the disturbance on the trailing edge flow and the higher the required adjustment in the circulation. The fact that they diverge with the appropriate exponent can be inferred from the numerical solution having the same set of singularities as in the incompressible case. We can thus conclude that the cause of the numerical mesh divergence observed in subcritical cases is the same as in the incompressible case.\n\n## 5. Summary and Discussion\n\nDirect analysis of the behavior of the analytic lift-based adjoint solution for the incompressible Euler equations in 2D shows that the adjoint solution is singular at the wall and the incoming stagnation streamline. The ultimate origin of both singularities is to be found in the adjoint singularity at the trailing edge, which is due to the sensitivity of the Kutta condition to perturbations of the flow [7,29].\nNumerical adjoint solutions to the Euler equations in two and three dimensions for various flow conditions exhibit a divergent behavior with mesh refinement near solid walls. The comparison between analytic and numerical adjoint solutions for a representative incompressible case confirms that the numerical mesh divergence is due to the singularity of the analytic solution. The effect of the adjoint trailing edge singularity is local for point source and vortex perturbations but extends upstream along the dividing streamline for stagnation pressure perturbations, thus explaining the results in [5,6]. Numerical solutions computed with cell-vertex schemes, which place computational nodes directly on the geometry, do not directly show the divergence owing to numerical dissipation. The price to be paid is that the numerical solution at the wall depends continually on the level of dissipation or the mesh density. Decreasing the dissipation or refining the mesh, which has similar effects on the solution, changes the value of the adjoint solution at the wall. A similar effect can be found in solutions computed with cell-centered schemes, only that now the continuous variation with mesh density affects the values computed at the near-wall cells.\nWhile we have only produced an analytic solution for incompressible cases, we think that it is safe to extend the conclusions to compressible flows as well, at least qualitatively. This is particularly clear for subcritical flows, for which both the numerical solution and the structure of the analytic solution are strikingly similar to the incompressible case. For other compressible flows, the situation depends on the structure of the flow around the trailing edge. When perturbations to the trailing edge flow are suppressed by the flow conditions (high transonic, supersonic, or viscous cases, in which the structure of the flow at the trailing edge is tightly constrained) the singularities disappear, and the numerical adjoint solutions behave smoothly with mesh refinement. In other cases (at low or medium transonic speeds), mesh-diverging numerical adjoint solutions also exhibit the singularities at the wall, the trailing edge, and the incoming stagnation streamline. It is reasonable to assume that, as in the incompressible or subcritical cases, these singularities simply reflect the sensitivity of the lift or drag to perturbations to the Kutta condition. In principle, the Kutta condition affects circulation and thus lift, with one exception: Rotational transonic flow, e.g., transonic flow with a shock on the upper surface. In these cases, the total pressure loss is larger on the upper side of the trailing edge. This forces the flow to stagnate at the trailing edge upper surface while the velocity at the trailing edge lower surface is finite and non-zero. The flow thus leaves the trailing edge tangent to the lower surface (the surface with the higher total pressure) smoothly and forms a slip line . In this situation, if a point perturbation disrupts the flow at the trailing edge, restoring the Kutta condition requires additional circulation but also the readjustment of the shock wave position , creating drag.\nIt would be very interesting to confirm the above arguments with a deeper understanding of the analytic solutions for transonic cases. The subcritical case is also missing a few key ingredients and any insight in that direction would be welcome, even though the lack of a general procedure for deriving even analytic flow solutions in this and transonic cases is certainly an obstacle to the derivation of closed-form analytic adjoint solutions. Future developments along these lines will lead to an improved understanding of the behavior of adjoint solutions, as the incomplete analysis presented in Section 4 and Section 5 clearly exemplifies. We hope to return to these issues in the future.\n\n## Author Contributions\n\nBoth authors have contributed equally to the paper. All authors have read and agreed to the published version of the manuscript.\n\n## Funding\n\nThe research described in this paper has been supported by INTA and the Ministry of Defence of Spain under the grants Termofluidodinámica (IGB99001) and IDATEC (IGB21001).\n\nNot applicable.\n\nNot applicable.\n\n## Data Availability Statement\n\nThe data presented in this study are available on request from the corresponding author.\n\n## Acknowledgments\n\nThe numerical computations reported in the paper have been carried out with the SU2 code, an open source platform developed and maintained by the SU2 Foundation.\n\n## Conflicts of Interest\n\nThe authors declare no conflict of interest.\n\n## References\n\n2. Lozano, C. Anomalous Mesh Dependence of Adjoint Solutions near Walls in Inviscid Flows Past Configurations with Sharp Trailing Edges. In Proceedings of the EUCASS 2019 Conference, Madrid, Spain, 1–4 July 2019. [Google Scholar] [CrossRef]\n3. Lozano, C.; Ponsin, J. Mesh-Diverging Inviscid Adjoint Solutions. In Proceedings of the 10th EASN International Virtual Conference, Virtual, 2–4 September 2020. [Google Scholar] [CrossRef]\n4. Lozano, C.; Ponsin, J. On the Mesh Divergence of Inviscid Adjoint Solutions. In Proceedings of the 14th WCCM-ECCOMAS Congress 2020, Virtual Congress, 11–15 January 2021. [Google Scholar] [CrossRef]\n5. Giles, M.; Pierce, N. Adjoint Equations in CFD—Duality, Boundary Conditions and Solution Behaviour. In Proceedings of the 13th Computational Fluid Dynamics Conference, Snowmass Village, CO, USA, 29 June–2 July 1997. Paper AIAA 1997–1850. [Google Scholar] [CrossRef]\n6. Peter, J.; Renac, F.; Labbé, C. Analysis of finite-volume discrete adjoint fields for two-dimensional compressible Euler flows. J. Comput. Phys. 2022, 449, 110811. [Google Scholar] [CrossRef]\n7. Lozano, C.; Ponsin, J. Analytic adjoint solutions for the 2-D incompressible Euler equations using the Green’s function approach. J. Fluid Mech. 2022, 943, A22. [Google Scholar] [CrossRef]\n8. Giles, M.B.; Pierce, N.A. Analytic adjoint solutions for the quasi-one-dimensional Euler equations. J. Fluid Mech. 2001, 426, 327–345. [Google Scholar] [CrossRef]\n9. Katz, J.; Plotkin, A. Low Speed Aerodynamics, 2nd ed.; Cambridge University Press: New York, NY, USA, 2001. [Google Scholar]\n10. Jameson, A. Aerodynamic design via control theory. J. Sci. Comput. 1988, 3, 233–260. [Google Scholar] [CrossRef]\n11. Anderson, W.; Venkatakrishnan, V. Aerodynamic Design Optimization on Unstructured Grids with a Continuous Adjoint Formulation. Comput. Fluids 1999, 28, 443–480. [Google Scholar] [CrossRef]\n12. Castro, C.; Lozano, C.; Palacios, F.; Zuazua, E. Systematic Continuous Adjoint Approach to Viscous Aerodynamic Design on Unstructured Grids. AIAA J. 2007, 45, 2125–2139. [Google Scholar] [CrossRef]\n13. Economon, T.D.; Palacios, F.; Copeland, S.R.; Lukaczyk, T.W.; Alonso, J.J. SU2: An Open-Source Suite for Multiphysics Simulation and Design. AIAA J. 2016, 54, 828–846. [Google Scholar] [CrossRef]\n14. Chorin, A.J. A numerical method for solving incompressible viscous flow problems. J. Comput. Phys. 1967, 2, 12–26. [Google Scholar] [CrossRef]\n15. Jameson, A.; Schmidt, W.; Turkel, E. Numerical solution of the Euler equations by finite volume methods using Runge Kutta time stepping schemes. In Proceedings of the 14th Fluid and Plasma Dynamics Conference, Palo Alto, CA, USA, 23–25 June 1981. Paper AIAA 1981–1259. [Google Scholar] [CrossRef]\n16. Palacios, F.; Alonso, J.; Jameson, A. Shape Sensitivity of Free-Surface Interfaces Using a Level Set Methodology. In Proceedings of the 42nd AIAA Fluid Dynamics Conference and Exhibit, New Orleans, Louisiana, 25–28 June 2012. Paper AIAA 2012–3341. [Google Scholar] [CrossRef]\n17. Giles, M.; Pierce, N. Improved Lift and Drag Estimates Using Adjoint Euler Equations. In Proceedings of the 14th Computational Fluid Dynamics Conference, Norfolk, VA, USA, 1–5 November 1999. Paper AIAA 1999–3293. [Google Scholar] [CrossRef]\n18. Lozano, C. On mesh sensitivities and boundary formulas for discrete adjoint-based gradients in inviscid aerodynamic shape optimization. J. Comput. Phys. 2017, 346, 403–436. [Google Scholar] [CrossRef]\n19. Fidkowski, K.J.; Roe, P.L. An Entropy Adjoint Approach to Mesh Refinement. SIAM J. Sci. Comput. 2010, 32, 1261–1287. [Google Scholar] [CrossRef]\n20. Lozano, C. Entropy and Adjoint Methods. J. Sci. Comput. 2019, 81, 2447–2483. [Google Scholar] [CrossRef]\n21. Schwamborn, D.; Gerhold, T.; Heinrich, R. The DLR TAU-Code: Recent Applications in Research and Industry. In Proceedings of the ECCOMAS CFD 2006 Conference, Egmond aan Zee, The Netherlands, 5–8 September 2006. [Google Scholar]\n22. Ekelschot, D. Mesh Adaptation Strategies for Compressible Flows Using a High-Order Spectral/Hp Element Discretization. Ph.D. Thesis, Imperial College, London, UK, 2016. [Google Scholar]\n23. Batchelor, G. An Introduction to Fluid Dynamics; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]\n24. Milne-Thomson, L.M. Theoretical Hydrodynamics, 4th ed.; MacMillan & Co.: London, UK, 1962. [Google Scholar]\n25. Lozano, C.; Ponsin, J. Exact Inviscid Drag-Adjoint Solution for Subcritical Flows. AIAA J. 2021, 59, 5369–5373. [Google Scholar] [CrossRef]\n26. Giles, M.; Haimes, R. Advanced interactive visualization for CFD. Comput. Syst. Eng. 1990, 1, 51–62. [Google Scholar] [CrossRef]\n27. Finn, R.; Gilbarg, D. Asymptotic behavior and uniqueness of plane subsonic flows. Commun. Pure Appl. Math. 1957, 10, 23–63. [Google Scholar] [CrossRef]\n28. Warsi, Z. Fluid Dynamics: Theoretical and Computational Approaches, 3rd ed.; CRC Press: Boca Raton, FL, USA, 2006. [Google Scholar]\n29. Giles, M.B.; Pierce, N.A. Adjoint Error Correction for Integral Outputs. In Error Estimation and Adaptive Discretization Methods in Computational Fluid Dynamics; Lecture Notes in Computational Science and Engineering, Vol. 25; Springer: Berlin/Heidelberg, Germany, 2003; Chapter 2; pp. 47–95. [Google Scholar] [CrossRef]\n30. Schmidt, W.; Jameson, A.; Whitfield, D. Finite−Volume Solutions to the Euler Equations in Transonic Flow. J. Aircraft 1983, 20, 127–133. [Google Scholar] [CrossRef]\nFigure 1. Analytic x-velocity for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness computed with conformal transformation techniques.\nFigure 1. Analytic x-velocity for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness computed with conformal transformation techniques.\nFigure 2. Close-up of the baseline computational mesh.\nFigure 2. Close-up of the baseline computational mesh.\nFigure 3. Inviscid incompressible flow past a van de Vooren airfoil profile at α = 0° with trailing–edge angle τ = 16° and 12% thickness. Pressure (a) and x-velocity (b) on the airfoil profile computed with the SU2 solver on a sequence of 5 progressively refined unstructured triangular meshes.\nFigure 3. Inviscid incompressible flow past a van de Vooren airfoil profile at α = 0° with trailing–edge angle τ = 16° and 12% thickness. Pressure (a) and x-velocity (b) on the airfoil profile computed with the SU2 solver on a sequence of 5 progressively refined unstructured triangular meshes.\nFigure 4. Drag (a) and lift (b) -based inviscid, incompressible adjoint solution on a van de Vooren airfoil profile at α = 0° with trailing–edge angle τ = 16° and 12% thickness computed with the SU2 solver on 5 progressively refined unstructured triangular meshes.\nFigure 4. Drag (a) and lift (b) -based inviscid, incompressible adjoint solution on a van de Vooren airfoil profile at α = 0° with trailing–edge angle τ = 16° and 12% thickness computed with the SU2 solver on 5 progressively refined unstructured triangular meshes.\nFigure 5. Analytic (symbols) vs. numerical (solid lines) drag–based adjoint solution on the airfoil profile for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4.\nFigure 5. Analytic (symbols) vs. numerical (solid lines) drag–based adjoint solution on the airfoil profile for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4.\nFigure 6. Contour map of the first component ψ1 of the analytic lift–based adjoint solution for inviscid incompressible flow at α = 0° past a van de Vooren airfoil with trailing−edge angle τ = 16° and 12% thickness.\nFigure 6. Contour map of the first component ψ1 of the analytic lift–based adjoint solution for inviscid incompressible flow at α = 0° past a van de Vooren airfoil with trailing−edge angle τ = 16° and 12% thickness.\nFigure 7. Analytic vs. numerical lift–based adjoint variable ψ1 along a line crossing the stagnation streamline upstream of the airfoil as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4.\nFigure 7. Analytic vs. numerical lift–based adjoint variable ψ1 along a line crossing the stagnation streamline upstream of the airfoil as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4.\nFigure 8. Analytic vs. numerical lift–based adjoint variable ψ1 along a line normal to the airfoil wall at x/c = 0.31 as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4. The wall is at y = 0.06.\nFigure 8. Analytic vs. numerical lift–based adjoint variable ψ1 along a line normal to the airfoil wall at x/c = 0.31 as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4. The wall is at y = 0.06.\nFigure 9. Analytic vs. numerical lift–based adjoint variable ψ1 along the line $( x , y ) = ( 1 + d / 2 , d / 2 )$ approaching the trailing edge as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4. d denotes the distance to the trailing edge.\nFigure 9. Analytic vs. numerical lift–based adjoint variable ψ1 along the line $( x , y ) = ( 1 + d / 2 , d / 2 )$ approaching the trailing edge as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4. d denotes the distance to the trailing edge.\nFigure 10. Analytic vs. numerical lift–based adjoint variable ψ1 along a line crossing the stagnation streamline downstram of the airfoil as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4. d denotes the distance to the stagnation streamline.\nFigure 10. Analytic vs. numerical lift–based adjoint variable ψ1 along a line crossing the stagnation streamline downstram of the airfoil as indicated in Figure 6 for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness. The numerical solution has been computed with the SU2 solver on the finest mesh of Figure 4. d denotes the distance to the stagnation streamline.\nFigure 11. Analytic lift–based adjoint solution for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness on a sequence of O–shaped curves surrounding the airfoil at decreasing distance d.\nFigure 11. Analytic lift–based adjoint solution for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness on a sequence of O–shaped curves surrounding the airfoil at decreasing distance d.\nFigure 12. $δ I ( 1 ) = ψ 1 + v → ⋅ ( ψ x , ψ y )$ computed with numerical and analytic lift–based adjoint solutions for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness.\nFigure 12. $δ I ( 1 ) = ψ 1 + v → ⋅ ( ψ x , ψ y )$ computed with numerical and analytic lift–based adjoint solutions for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness.\nFigure 13. $δ I ( 2 ) = v ψ x − u ψ y$ computed with numerical and analytic lift–based adjoint solutions for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness.\nFigure 13. $δ I ( 2 ) = v ψ x − u ψ y$ computed with numerical and analytic lift–based adjoint solutions for incompressible, inviscid flow at α = 0° past a van de Vooren airfoil with trailing–edge angle τ = 16° and 12% thickness.\nFigure 14. Lift–based adjoint solution on the van de Vooren airfoil profile at subcritical flow conditions M = 0.5 and α = 0° computed with the SU2 solver on 5 progressively refined unstructured triangular meshes.\nFigure 14. Lift–based adjoint solution on the van de Vooren airfoil profile at subcritical flow conditions M = 0.5 and α = 0° computed with the SU2 solver on 5 progressively refined unstructured triangular meshes.\n Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.\n\n## Share and Cite\n\nMDPI and ACS Style\n\nLozano, C.; Ponsin, J. Explaining the Lack of Mesh Convergence of Inviscid Adjoint Solutions near Solid Walls for Subcritical Flows. Aerospace 2023, 10, 392. https://doi.org/10.3390/aerospace10050392\n\nAMA Style\n\nLozano C, Ponsin J. Explaining the Lack of Mesh Convergence of Inviscid Adjoint Solutions near Solid Walls for Subcritical Flows. Aerospace. 2023; 10(5):392. https://doi.org/10.3390/aerospace10050392\n\nChicago/Turabian Style\n\nLozano, Carlos, and Jorge Ponsin. 2023. \"Explaining the Lack of Mesh Convergence of Inviscid Adjoint Solutions near Solid Walls for Subcritical Flows\" Aerospace 10, no. 5: 392. https://doi.org/10.3390/aerospace10050392\n\nNote that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.798391,"math_prob":0.9777733,"size":12081,"snap":"2023-40-2023-50","text_gpt3_token_len":3122,"char_repetition_ratio":0.155999,"word_repetition_ratio":0.051918738,"special_character_ratio":0.25138646,"punctuation_ratio":0.21569468,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.997435,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-27T08:29:01Z\",\"WARC-Record-ID\":\"<urn:uuid:09b962d9-ef44-4901-b707-7bd03728ccd8>\",\"Content-Length\":\"591122\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a90358a7-32a7-452b-baee-c0e7b5918aff>\",\"WARC-Concurrent-To\":\"<urn:uuid:afe71467-aba9-44c0-9b6c-9aa031c3d977>\",\"WARC-IP-Address\":\"129.227.61.250\",\"WARC-Target-URI\":\"https://www2.mdpi.com/2226-4310/10/5/392\",\"WARC-Payload-Digest\":\"sha1:TPMIVEMOOORYCKOUSWSNS77KIMF5SKQL\",\"WARC-Block-Digest\":\"sha1:YXE2VGBUOCHWVKDLZ6EXCERHSEFJEEFF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510284.49_warc_CC-MAIN-20230927071345-20230927101345-00875.warc.gz\"}"} |
https://metanumbers.com/14727 | [
"## 14727\n\n14,727 (fourteen thousand seven hundred twenty-seven) is an odd five-digits composite number following 14726 and preceding 14728. In scientific notation, it is written as 1.4727 × 104. The sum of its digits is 21. It has a total of 2 prime factors and 4 positive divisors. There are 9,816 positive integers (up to 14727) that are relatively prime to 14727.\n\n## Basic properties\n\n• Is Prime? No\n• Number parity Odd\n• Number length 5\n• Sum of Digits 21\n• Digital Root 3\n\n## Name\n\nShort name 14 thousand 727 fourteen thousand seven hundred twenty-seven\n\n## Notation\n\nScientific notation 1.4727 × 104 14.727 × 103\n\n## Prime Factorization of 14727\n\nPrime Factorization 3 × 4909\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 2 Total number of distinct prime factors Ω(n) 2 Total number of prime factors rad(n) 14727 Product of the distinct prime numbers λ(n) 1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 1 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 14,727 is 3 × 4909. Since it has a total of 2 prime factors, 14,727 is a composite number.\n\n## Divisors of 14727\n\n1, 3, 4909, 14727\n\n4 divisors\n\n Even divisors 0 4 2 2\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 4 Total number of the positive divisors of n σ(n) 19640 Sum of all the positive divisors of n s(n) 4913 Sum of the proper positive divisors of n A(n) 4910 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 121.355 Returns the nth root of the product of n divisors H(n) 2.99939 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 14,727 can be divided by 4 positive divisors (out of which 0 are even, and 4 are odd). The sum of these divisors (counting 14,727) is 19,640, the average is 4,910.\n\n## Other Arithmetic Functions (n = 14727)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 9816 Total number of positive integers not greater than n that are coprime to n λ(n) 4908 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 1729 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 9,816 positive integers (less than 14,727) that are coprime with 14,727. And there are approximately 1,729 prime numbers less than or equal to 14,727.\n\n## Divisibility of 14727\n\n m n mod m 2 3 4 5 6 7 8 9 1 0 3 2 3 6 7 3\n\nThe number 14,727 is divisible by 3.\n\n## Classification of 14727\n\n• Arithmetic\n• Semiprime\n• Deficient\n\n• Polite\n\n• Square Free\n\n### Other numbers\n\n• LucasCarmichael\n\n## Base conversion (14727)\n\nBase System Value\n2 Binary 11100110000111\n3 Ternary 202012110\n4 Quaternary 3212013\n5 Quinary 432402\n6 Senary 152103\n8 Octal 34607\n10 Decimal 14727\n12 Duodecimal 8633\n20 Vigesimal 1gg7\n36 Base36 bd3\n\n## Basic calculations (n = 14727)\n\n### Multiplication\n\nn×i\n n×2 29454 44181 58908 73635\n\n### Division\n\nni\n n⁄2 7363.5 4909 3681.75 2945.4\n\n### Exponentiation\n\nni\n n2 216884529 3194058458583 47038898919551841 692741864388239962407\n\n### Nth Root\n\ni√n\n 2√n 121.355 24.5116 11.0161 6.81746\n\n## 14727 as geometric shapes\n\n### Circle\n\n Diameter 29454 92532.5 6.81363e+08\n\n### Sphere\n\n Volume 1.33792e+13 2.72545e+09 92532.5\n\n### Square\n\nLength = n\n Perimeter 58908 2.16885e+08 20827.1\n\n### Cube\n\nLength = n\n Surface area 1.30131e+09 3.19406e+12 25507.9\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 44181 9.39138e+07 12754\n\n### Triangular Pyramid\n\nLength = n\n Surface area 3.75655e+08 3.76423e+11 12024.5"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6079248,"math_prob":0.9842012,"size":4501,"snap":"2021-31-2021-39","text_gpt3_token_len":1587,"char_repetition_ratio":0.120080054,"word_repetition_ratio":0.02827381,"special_character_ratio":0.44790047,"punctuation_ratio":0.07542263,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99847424,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-02T02:18:48Z\",\"WARC-Record-ID\":\"<urn:uuid:78f0161e-ba88-4be5-8104-58370ea7c89b>\",\"Content-Length\":\"59906\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:acc3cef5-2544-4a24-8ff6-19972730e040>\",\"WARC-Concurrent-To\":\"<urn:uuid:52ac241d-b3ed-4148-a611-05163deed223>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/14727\",\"WARC-Payload-Digest\":\"sha1:KYZKBKRYCCFC6RL5GUO76CTZZYHZSEAV\",\"WARC-Block-Digest\":\"sha1:RNZZNB6VDDMDONK6LNUSGRIAG7HF75XU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154302.46_warc_CC-MAIN-20210802012641-20210802042641-00018.warc.gz\"}"} |
https://www.cut-the-knot.org/wiki-math/index.php?n=Geometry.ConicInATriangle2UsingCoordinates?setview=big&setfontsize=110 | [
"# Conic In A Triangle 2 Using Coordinates\n\n### Hubert Shutrick\n\nThe theorem in A conic in a triangle is really a theorem in projective geometry because the line at infinity can be replaced by any line that doesn't intersect the sides of the triangle. It can therefore be proved using homogeneous coordinates. The obvious choice is to use the given triangle ABC for the axes and by scaling the coordinates either the point P can be taken as (1,1,1) or the line can be assumed x + y + z = 0 but not both so we assume the latter and let P=(a,b,c) . There is conic through the points C_{a}B_{a}B_{c}A_{c}A_{b}C_{b} even if the chords do not intersect at P by Pascal's criterion so we concentrate on the second part where P is necessary.",
null,
"This proof was supplied by Gordon Walsh. Use a'=b+c, b'=c+a, c'=a+b to keep the expressions more compact. The coordinates of the vertices of the above hexagon are obtained by (0,b,b') = (a,b,c)-a(1,0,-1) etc. The point A_{a} has coordinates (-aa,a'b,a'c) = a'(0,c',c) - a(a,a',0) = a'(0,b,b') - a(a,0,a') and then we know B_{b} and C_{c} by symmetry. The lines BA_{a} and AB_{b} are\n\n{x \\over aa}+{z \\over a'c} = 0, {y \\over bb}+{z \\over b'c} = 0\n\nand therefore they intersect at (aab',bba',-a'b'c) . The intersections of the other pairs of opposite sides are similarly (aac',-a'bc',cca'),(-ab'c',bbc',-ccb'). To prove that there is a conic through AC_{c}BA_{a}CB_{b} , one shows that the determinant with the three points as rows is zero. We leave the calculation to the reader with the tip that abc can be taken out from the columns and it turns out that a'b'c' is also a factor."
]
| [
null,
"http://www.cut-the-knot.org/wiki-math/uploads/Geometry/HubertWalsh.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9025328,"math_prob":0.9979319,"size":1501,"snap":"2019-13-2019-22","text_gpt3_token_len":429,"char_repetition_ratio":0.110888444,"word_repetition_ratio":0.0,"special_character_ratio":0.28714192,"punctuation_ratio":0.11965812,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99973387,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-27T08:30:20Z\",\"WARC-Record-ID\":\"<urn:uuid:ab96457f-dd85-4277-9166-224e7be27625>\",\"Content-Length\":\"17329\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:761168f2-2b48-46df-a19f-ea88079aa814>\",\"WARC-Concurrent-To\":\"<urn:uuid:59f75582-a28f-4559-96f4-36c29bcb3c1c>\",\"WARC-IP-Address\":\"107.180.50.227\",\"WARC-Target-URI\":\"https://www.cut-the-knot.org/wiki-math/index.php?n=Geometry.ConicInATriangle2UsingCoordinates?setview=big&setfontsize=110\",\"WARC-Payload-Digest\":\"sha1:CX3TNFYSIBLN22QSHL6QWKAY5HO6HXDM\",\"WARC-Block-Digest\":\"sha1:DNWNXMMDVMLN3KUGD6UCBG7PU26I2AIY\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232262029.97_warc_CC-MAIN-20190527065651-20190527091651-00183.warc.gz\"}"} |
https://singaporetuitioncenter.com/tag/best-version-free-add-math-question-with-answers/ | [
"## Instagram\n\nEmail: [email protected]\nPhone: +65 8787 0198\n\nDownload this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an angle addition (A+B). After that its just a substitution get\n\nDownload this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an angle addition (A+B). After that its just a substitution get\n\nDownload this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an angle addition (A+B). After that its just a substitution get\n\nDownload this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an angle addition (A+B). After that its just a substitution get\n\nDownload this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an angle addition (A+B). After that its just a substitution get\n\nFor our small groups Secondary Mathematics tuition, send SMS/whatsapp +65 87870198. Download this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an\n\nFor our small groups Secondary Mathematics tuition, send SMS/whatsapp +65 87870198. Download this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an\n\nFor our small groups Secondary Mathematics tuition, send SMS/whatsapp +65 87870198. Download this Additional Mathematics paper from Chung Cheng High 2020 Prelim Papers and let’s figure out another important question. Download latest free test papers for all levels Singapore Mathematics here. This version is the complete version with all parts in. Let's have a breakdown of this question. First, you need to start by using Addition Formula. It is quite straight forward since the question has an"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.89548194,"math_prob":0.41899842,"size":6974,"snap":"2023-40-2023-50","text_gpt3_token_len":1354,"char_repetition_ratio":0.15093257,"word_repetition_ratio":0.8367537,"special_character_ratio":0.1912819,"punctuation_ratio":0.076534905,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98709506,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T00:25:36Z\",\"WARC-Record-ID\":\"<urn:uuid:cddd5d10-3b36-4864-b420-4d3deccf9690>\",\"Content-Length\":\"189847\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:49f3e997-4830-4cd2-9825-3c2ef3a811cf>\",\"WARC-Concurrent-To\":\"<urn:uuid:e30b99c5-4aca-479c-aeec-e1f1816caac0>\",\"WARC-IP-Address\":\"192.0.78.161\",\"WARC-Target-URI\":\"https://singaporetuitioncenter.com/tag/best-version-free-add-math-question-with-answers/\",\"WARC-Payload-Digest\":\"sha1:LXZ27E6VJSOB2UPVWMRZB62CNQAMYL4I\",\"WARC-Block-Digest\":\"sha1:DLRSZPUEX6GLLRGVODFW5BWWRNRLOEK5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511023.76_warc_CC-MAIN-20231002232712-20231003022712-00488.warc.gz\"}"} |
https://iitutor.com/determining-initial-values-principles-of-mathematical-induction/ | [
"# Determining Initial Values | Principles of Mathematical Induction\n\nProve $1+3+5+\\cdots+(2n+1) = (n+1)^2$.\n\n### Step 1\n\nShow it is true for $n=0$ by mathematical induction.\n\n\\begin{align} &\\text{LHS} = 2 \\times 0 +1 = 1 \\\\ &\\text{RHS} = (0+1)^2 = 1 \\\\ &\\text{LHS} = \\text{RHS} \\\\ &\\text{Therefore, it is true for } n=0 \\end{align}\n\n### Step 2\n\nAssume that it is true for $n=k$.\n\n$\\text{That is, } 1+3+5+ \\cdots +(2k+1) = (k+1)^2$\n\n### Step 3\n\nShow it is true for $n=k+1$.\n\n\\begin{align} \\text{That is, } &1+3+5+\\cdots+(2k+1)+(2k+3)=(k+2)^2 \\\\ \\text{LHS} &= 1+3+5+\\cdots+(2k+1)+(2k+3) \\\\ &=(k+1)^2+(2k+3) \\\\ &= k^2+2k+1+2k+3 \\\\ &= k^2+4k+4 \\\\ &=(k+2)^2 \\\\ &=\\text{RHS} \\\\ \\text{Therefore } &\\text{it is true for } n=k+1. \\\\ \\text{Therefore } &\\text{the statement is true for all integers } n\\ge 0. \\end{align}",
null,
""
]
| [
null,
"https://iitutor.com/wp-content/plugins/report-content/static/img/loading.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.5357723,"math_prob":1.0000048,"size":1370,"snap":"2023-14-2023-23","text_gpt3_token_len":461,"char_repetition_ratio":0.13469985,"word_repetition_ratio":0.026595745,"special_character_ratio":0.34671533,"punctuation_ratio":0.039130434,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000062,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-04T08:21:18Z\",\"WARC-Record-ID\":\"<urn:uuid:00f89338-cf2b-448a-859b-dce780e27cc7>\",\"Content-Length\":\"169627\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:62c69b21-d835-42ab-b759-4957b86b7115>\",\"WARC-Concurrent-To\":\"<urn:uuid:a6316fd8-170f-4f3a-9b24-2c8cd5a24e0c>\",\"WARC-IP-Address\":\"35.213.142.151\",\"WARC-Target-URI\":\"https://iitutor.com/determining-initial-values-principles-of-mathematical-induction/\",\"WARC-Payload-Digest\":\"sha1:MALJHBMPEG74VOK53BTW4DWN5OLBE6U4\",\"WARC-Block-Digest\":\"sha1:TPPZOJYNMLNNX4XQK5NNKCT5VMPLE2SM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224649518.12_warc_CC-MAIN-20230604061300-20230604091300-00612.warc.gz\"}"} |
https://www.sanfoundry.com/electronic-devices-circuits-questions-answers-bjt-circuits-dc/ | [
"# Electronic Devices and Circuits Questions and Answers – BJT Circuits at DC\n\n«\n»\n\nThis set of Electronic Devices and Circuits Multiple Choice Questions & Answers (MCQs) focuses on “BJT Circuits at DC”.\n\n1. Which of the following condition is true for cut-off mode?\na) The collector current Is zero\nb) The collector current is proportional to the base current\nc) The base current is non zero\nd) All of the mentioned\n\nExplanation: The base current as well as the collector current are zero in cut-off mode.\n\n2. Which of the following is true for the cut-off region in an npn transistor?\na) Potential difference between the emitter and the base is smaller than 0.5V\nb) Potential difference between the emitter and the base is smaller than 0.4V\nc) The collector current increases with the increase in the base current\nd) The collector current is always zero and the base current is always non zero\n\nExplanation: Both collector and emitter current are zero in cut-off region.\n\n3. Which of the following is true for a typical active region of an npn transistor?\na) The potential difference between the emitter and the collector is less than 0.5 V\nb) The potential difference between the emitter and the collector is less than 0.4 V\nc) The potential difference between the emitter and the collector is less than 0.3 V\nd) The potential difference between the emitter and the collector is less than 0.2 V\n\nExplanation: Most commonly used transistors have Vce less than 0.4 V for the active region.\nSanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!\n\n4. Which of the following is true for the active region of an npn transistor?\na) The collector current is directly proportional to the base current\nb) The potential difference between the emitter and the collector is less than 0.4 V\nc) All of the mentioned\nd) None of the mentioned\n\nExplanation: The base current and the collector current are directly proportional to each other and the potential difference between the collector and the base is always less than 0.4 V.\n\n5. Which of the following is true for the saturation region of BJT transistor?\na) The collector current is inversely proportional to the base current\nb) The collector current is proportional to the square root of the collector current\nc) The natural logarithm of the collector current is directly proportional to the base current\nd) None of the mentioned\n\nExplanation: The collector current is directly proportional to the base current in the saturation region of the BJT.\n\n6. Which of the following is true for a npn transistor in the saturation region?\na) The potential difference between the collector and the base is approximately 0.2V\nb) The potential difference between the collector and the base is approximately 0.3V\nc) The potential difference between the collector and the base is approximately 0.4V\nd) The potential difference between the collector and the base is approximately 0.5V\n\nExplanation: The commonly used npn transistors have a potential difference of around 0.5V between he collector and the base.\n\n7. The potential difference between the base and the collector Vcb in a pnp transistor in saturation region is ________\na) -0.2 V\nb) -0.5V\nc) 0.2 V\nd) 0.5 V\n\nExplanation: The value of Vcb is -0.5V for a pnp transistor and 0.5V for an npn transistor.\n\n8. For a pnp transistor in the active region the value of Vce (potential difference between the collector and the base) is\na) Less than 0.3V\nb) Less than 3V\nc) Greater than 0.3V\nd) Greater than 3V\n\nExplanation: For a pnp transistor Vce is less than 0.3V, for an npn transistor it is greater than 0.3V.\n\n9. Which of the following is true for a pnp transistor in active region?\na) CB junction is reversed bias and the EB junction is forward bias\nb) CB junction is forward bias and the EB junction is forward bias\nc) CB junction is forward bias and the EB junction is reverse bias\nd) CB junction is reversed bias and the EB junction is reverse bias\n\nExplanation: Whether the transistor in npn or pnp, for it be in active region the EB junction must be reversed bias the CB junction must be forward bias.\n\n10. Which of the following is true for a pnp transistor in saturation region?\na) CB junction is reversed bias and the EB junction is forward bias\nb) CB junction is forward bias and the EB junction is forward bias\nc) CB junction is forward bias and the EB junction is reverse bias\nd) CB junction is reversed bias and the EB junction is reverse bias\n\nExplanation: Whether the transistor in npn or pnp, for it be in saturation region the EB junction must be forward bias the CB junction must be forward bias.\n\nSanfoundry Global Education & Learning Series – Electronic Devices and Circuits.\n\nTo practice all areas of Electronic Devices and Circuits, here is complete set of 1000+ Multiple Choice Questions and Answers.",
null,
""
]
| [
null,
"data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20150%20150%22%3E%3C/svg%3E",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8998115,"math_prob":0.95277685,"size":4767,"snap":"2023-40-2023-50","text_gpt3_token_len":1110,"char_repetition_ratio":0.17656939,"word_repetition_ratio":0.41233373,"special_character_ratio":0.21585903,"punctuation_ratio":0.074594595,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9560746,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T07:27:36Z\",\"WARC-Record-ID\":\"<urn:uuid:2c3c0f21-e8f0-4d47-b4f9-452ec3fdcf93>\",\"Content-Length\":\"175524\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e9f13443-fc3d-450c-aa5e-40f459a0ed23>\",\"WARC-Concurrent-To\":\"<urn:uuid:4649fb0b-44bc-44fc-8d24-e898815c1ded>\",\"WARC-IP-Address\":\"104.25.132.119\",\"WARC-Target-URI\":\"https://www.sanfoundry.com/electronic-devices-circuits-questions-answers-bjt-circuits-dc/\",\"WARC-Payload-Digest\":\"sha1:JG6PW4OR4HQRRHHNI7E6HZMTRUTNDDDX\",\"WARC-Block-Digest\":\"sha1:ZM4CKO2CVY37EVBGTLSWKMV4BYCLGKJY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511055.59_warc_CC-MAIN-20231003060619-20231003090619-00164.warc.gz\"}"} |
https://scholar.archive.org/work/aoumq2tfarai5bht2mjdvrmsge | [
"### Heat Exchanger Network Optimization Considering Pressure Drop Constraints based on Minimum Operating Cost\n\nLiang Zhao, Z. Huo, H. Yin\n2013 International Journal of Online Engineering (iJOE)\nConsiderable research effort has been reported in cost-optimal operation of heat exchanger network. However, most of them neglect the pressure drop influence and assume constant film heat transfer coefficients. Pressure drop of streams are important influencing factors for the performance of heat exchanger network operation. In this paper, a general cost-optimal operation model considering pressure drop constraints and removing the assumption of constant film heat transfer coefficients is\nmore » ... efficients is proposed. It is necessary to determine the pumping power cost required as part of operating cost function. The extended model is applied to one example taken from previous research, and the results prove that the proposed method can obtain more real optimization results for HEN operational optimization problems. Index Terms-Heat exchanger network, Cost-optimal operation, Film heat transfer coefficient, Pressure drop. I. AUTHORS L. Zhao is with the School of Energy and Power Engineering,"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8993753,"math_prob":0.70664203,"size":917,"snap":"2021-21-2021-25","text_gpt3_token_len":189,"char_repetition_ratio":0.10405257,"word_repetition_ratio":0.0,"special_character_ratio":0.18320611,"punctuation_ratio":0.093959734,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96437234,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-17T17:24:19Z\",\"WARC-Record-ID\":\"<urn:uuid:78a18791-8d6a-4d2f-a2c0-fc09d4511514>\",\"Content-Length\":\"17110\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dc26cbf1-a190-4bd5-85ed-7c7d69d615ba>\",\"WARC-Concurrent-To\":\"<urn:uuid:0f740b5c-3fc3-4e87-b137-52e41521146e>\",\"WARC-IP-Address\":\"207.241.225.9\",\"WARC-Target-URI\":\"https://scholar.archive.org/work/aoumq2tfarai5bht2mjdvrmsge\",\"WARC-Payload-Digest\":\"sha1:TUHVHBOOW22GPCHJ46CWB7JXSVS2HIJK\",\"WARC-Block-Digest\":\"sha1:TEIDKKULMAK7EXO26W2H2ZKUCPRYO6IU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487630518.38_warc_CC-MAIN-20210617162149-20210617192149-00207.warc.gz\"}"} |
https://webstat.une.edu.au/unit_materials/c4_descriptive_statistics/sums_of_squares.htm | [
"",
null,
"",
null,
"",
null,
"",
null,
"Chapter 4: Analysing the Data Part II : Descriptive Statistics",
null,
"# Sums of squares\n\nConsider for a minute transforming the original data in Table 4.1 to deviations. That is, each score is converted to the difference between that score and the mean. So all 1s become 1 minus 1.864 or -0.864. All 0s become 0 minus 1.864 or -1.864. All 2s become 2 minus 1.864 or 0.136. It might be obvious to you that if the scores tended to differ a lot from the mean, then these differences would tend to be large (ignoring the sign), whereas these differences would tend to be small (ignoring sign) if the scores tended vary little from the mean.\n\nThe measure typically used to quantify variability in a distribution is based on the concept of average squared deviation from the mean.\n\nLetÕs take each difference from the mean and square it. Then, letÕs add up these squared deviations. When you do this you have the sum of the squared deviations (which is then reduced to \"Sums of Squares\", or SS). Its formula is",
null,
"The left-hand side of the equation is the definitional formula and the right hand side is the computational formula. SPSS output does not give the Sums of Squares for a variable when you choose Frequencies. However, many later statistical procedures do give this as part of the output. ItÕs value lies in summarising the total amount of variability in the variable being examined. For the sex partners data SS = 848.74 (calculated by the method below). The size of this number depends on the size of the numbers in the data and how much data there is (i.e., the sample size). There are no units for SS.\n\nSometimes there is confusion about the terms variability and variance. Variability refers to the Sums of Squares for a variable, while variance refers to the Sums off Squares divided by N-1. Sums of Squares are widely used because they are additive. Once we divide by N-1, the additive property disappears. When we later talk about the \"proportion of variance explained\" we really mean the \"proportion of variability explained\". If a variable X explains 56% of the variability in variable Y it refers to the proportion of YÕs Sums of Squares that is attributable to variable XÕs Sums of Squares.\n\n © Copyright 2000 University of New England, Armidale, NSW, 2351. All rights reserved",
null,
"Maintained by Dr Ian Price Email: [email protected]"
]
| [
null,
"https://webstat.une.edu.au/common/nav_site_f01.gif",
null,
"https://webstat.une.edu.au/main/webstat_logo_1.jpg",
null,
"https://webstat.une.edu.au/common/nav_chapters_f06.gif",
null,
"https://webstat.une.edu.au/common/previous_page_f01.gif",
null,
"https://webstat.une.edu.au/common/next_page_f01.gif",
null,
"https://webstat.une.edu.au/unit_materials/c4_descriptive_statistics/image11.gif",
null,
"http://www.une.edu.au/images/homepage.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.92823803,"math_prob":0.9787984,"size":2276,"snap":"2021-43-2021-49","text_gpt3_token_len":543,"char_repetition_ratio":0.13512324,"word_repetition_ratio":0.02020202,"special_character_ratio":0.22978911,"punctuation_ratio":0.10352423,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.99837357,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-20T00:41:17Z\",\"WARC-Record-ID\":\"<urn:uuid:3f40c7fb-cac9-4b4a-b09e-fd0f7fbfc4af>\",\"Content-Length\":\"9710\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b55ab2c9-4744-4f3c-bcf0-5a3aeeec97d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:a86b429d-6bb8-44e3-97ad-074ec6d65d38>\",\"WARC-IP-Address\":\"129.180.3.98\",\"WARC-Target-URI\":\"https://webstat.une.edu.au/unit_materials/c4_descriptive_statistics/sums_of_squares.htm\",\"WARC-Payload-Digest\":\"sha1:WLH4XJ3RP4RV7H3VBWRHYC7K6E6DMD4U\",\"WARC-Block-Digest\":\"sha1:KDPHD6LOVRUL7FWEBAYCW5CT7DNGILTE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585290.83_warc_CC-MAIN-20211019233130-20211020023130-00266.warc.gz\"}"} |
https://cg-tower.com/what-are-the-prime-factors-of-48/ | [
"Factors that 48 space the perform of integers that have the right to be evenly split into 48. It has actually a full of 10 determinants of i beg your pardon 48 is the greatest factor and the prime determinants of 48 space 2 and also 3. The element Factorization the 48 is 24 × 3.\n\nYou are watching: What are the prime factors of 48\n\nFactors the 48: 1, 2, 3, 4, 6, 8, 12, 16, 24 and 48Negative determinants of 48: -1, -2, -3, -4, -6, -8, -12, -16, -24 and -48Prime determinants of 48: 2, 3Prime administer of 48: 2 × 2 × 2 × 2 × 3 = 24 × 3Sum of components of 48: 124\n 1 What room the determinants of 48? 2 How to Calculate components of 48? 3 Tips and Tricks 4 Factors the 48 by prime Factorization 5 Challenging Questions 6 Factors of 48 in Pairs 7 Important Notes 8 FAQs on determinants of 48\n\n## What are the components of 48?\n\nFactors of 48 room the numbers that, when multiplied together, result in 48.\n\n6 × 8 = 48\n\n48/8=6\n\nHere 6 and also 8 room multiplied with each other to gain 48.\n\nHence, we say that 6 and 8 are the components of 48.\n\n48 has many other determinants too together 6 and also 8 have components themselves.\n\nTo discover them, you have the right to arrange this numbers in arrays as follows.",
null,
"You might arrange 48 in arrays as over and uncover the factors of 48.\n\n## How to calculate the determinants of 48?\n\nStep 1: create down the number to it is in factored, i.e., 48.\n\nIt is a composite number. It have the right to be factored further.\n\nStep 2: discover the two numbers who product offers 48.\n\n2 × 24 = 48. So, let\"s take it 2 and 24 together the 2 factors.\n\n2 is a prime number. Hence, it can only it is in factored as 1 and the number itself.\n\n1 × 2 = 2\n\nStep 3: Since 24 is not prime, let\"s rest it down into factors.\n\n2 × 12 = 24. So, let\"s take 2 and 12 together the 2 factors.\n\nAgain, 2 is a prime number.\n\nStep 4: break 12 into factors.\n\n3 × 4 = 12\n\n2 is a prime number.\n\nStep 5: rest 4 right into factors.\n\n2 × 2 = 4\n\nWe stop right here as we have uncovered all the factors of 48.\n\nHence, the factors of 48 are 1, 2, 3, 4, 6, 8, 12, 16, 24, and also 48.\n\nTips and also Tricks:\n\n1 is the smallest element of every number.Every number has actually a minimum the 2 factors, i.e., 1 and the number itself.All also numbers constantly have 2 as one of their factors.\n\nExplore determinants using illustrations and also interactive examples.\n\n## Factors the 48 by element Factorization\n\nIf the factors of a number are prime numbers, climate the factors are said to be element factors.\n\nPrime factorization is the process of creating a number together a product of its prime factors.Factors of 48 by prime factorization are provided using the following steps.\n\nStep 1: compose the pair of factors that, ~ above multiplication, give the compelled number.48 can be factored as a product that 6 and 8.\n\nStep 2: See the factors, whether each among them is prime or not.6 is not a prime number and also can it is in factored in together a product that 2 and 3.8 is no a prime number and can it is in factored in together a product the 2 and 4.4 is no a prime number and also can be factored in together a product that 2 and 2.\n\nStep 3: together per the criterion,48 can thereby be written as:48 = 6 × 8 = 2 × 3 × 2 × 2 × 2It can additionally be written as:48 = 24 × 31\n\nWe can likewise find the prime determinants by this department method or the element tree method.\n\n### Factors the 48 by department Method\n\nWe division the number every time in together a method that a divisor is a prime number together below.",
null,
"48 = 24 × 3\n\n### Factors of 48 by factor Tree Method",
null,
"Can you attract the tree in a quite various way?\n\nFinally, friend will obtain the very same prime factorization together 48= 24 × 31\n\nChallenging Questions:\n\nWhat space the components of the complying with numbers utilizing the element factorization method?\n\n962456400\n\n## Factors of 48 in Pairs\n\nFactor pairs room found in this rainbow method.",
null,
"### Positive Pair Factors that 48\n\nFactorsPair Factors\n1 × 48 = 481, 48\n2 × 24 = 482, 24\n3 × 16 = 483, 16\n4 × 12 = 484, 12\n6 × 8 = 486, 8\n\n### Negative Pair Factors that 48\n\nFactorsPair Factors\n-1 × -48 = 48-1, -48\n-2 × -24 = 48-2, -24\n-3 × -16 = 48-3, -16\n-4 × -12 = 48-4, -12\n-6 × -8 = 48-6, -8\n\nImportant Notes:\n\nFactors of any kind of number room all the possible divisible numbers. They might be element numbers or composite numbers.Factors have the right to be negative.\n\nExample 1: If Kyle take away 48 hours to complete reading a publication in 8 days, discover how countless hours has actually she taken every day?\n\nSolution:\n\nWe uncover that 8 × ____ = 48\n\nNow let\"s discover the lacking factor.\n\nUsing the multiplication fact, we understand that 8 × 6 = 48\n\nHence, Kyle takes 6 hours per day.\n\nExample 2: deserve to you uncover the typical factors of 45 and 48?\n\nSolution:\n\nThe components of 45 room 1, 5, 9, 45\n\nThe components of 48 room 1, 2, 3, 4, 6, 8, 12, 16, 24, 48\n\nThe common factor is 1\n\nHence, the common factor is 1.\n\nExample 3: aid Keath to find the highest common factor of 18 and also 12 by prime factorization.\n\nSolution:\n\nWrite the element factorization for each number.\n\n18 = 2 × 3 × 3\n\n12 = 2 × 2 × 3\n\nNext, discover the common factors common by both of the numbers.\n\nThe typical factors are 2 × 3\n\nThe usual factor is 6.\n\nHence, the highest usual factor of 18 and also 12 is 6.",
null,
"## FAQs on determinants of 48\n\n### What are the determinants of 48?\n\nThe components of 48 room 1, 2, 3, 4, 6, 8, 12, 16, 24, 48 and its an adverse factors are -1, -2, -3, -4, -6, -8, -12, -16, -24, -48.\n\n### What is the Greatest common Factor that 48 and 13?\n\nThe determinants of 48 space 1, 2, 3, 4, 6, 8, 12, 16, 24, 48 and the components of 13 space 1, 13. 48 and 13 have actually only one common factor i beg your pardon is 1. This suggests that 48 and 13 space co-prime.Hence, the Greatest usual Factor (GCF) the 48 and also 13 is 1.\n\n### What is the sum of every the components of 48?\n\nSum the all determinants of 48 = (24 + 1 - 1)/(2 - 1) × (31 + 1 - 1)/(3 - 1) = 124\n\n### What are the Pair factors of 48?\n\nThe pair factors of 48 are (1, 48), (2, 24), (3, 16), (4, 12), (6, 8).\n\nSee more: How Long Does It Take For Ant Eggs To Hatch, Ant Biology\n\n### How countless Factors the 48 are additionally common come the determinants of 22?\n\nSince, the components of 48 room 1, 2, 3, 4, 6, 8, 12, 16, 24, 48 and the factors of 22 are 1, 2, 11, 22.Hence, <1, 2> are the usual factors the 48 and 22."
]
| [
null,
"https://cg-tower.com/what-are-the-prime-factors-of-48/imager_1_2112_700.jpg",
null,
"https://cg-tower.com/what-are-the-prime-factors-of-48/imager_2_2112_700.jpg",
null,
"https://cg-tower.com/what-are-the-prime-factors-of-48/imager_3_2112_700.jpg",
null,
"https://cg-tower.com/what-are-the-prime-factors-of-48/imager_4_2112_700.jpg",
null,
"https://cg-tower.com/what-are-the-prime-factors-of-48/imager_5_2112_700.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9111607,"math_prob":0.98613626,"size":6079,"snap":"2022-27-2022-33","text_gpt3_token_len":1889,"char_repetition_ratio":0.18255144,"word_repetition_ratio":0.075980395,"special_character_ratio":0.34578055,"punctuation_ratio":0.15493959,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9983947,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-29T06:21:09Z\",\"WARC-Record-ID\":\"<urn:uuid:cc4cf129-5887-42e5-83a9-104bb936e4c5>\",\"Content-Length\":\"17470\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:622a0aae-fc1d-4ce3-b63a-8aaad9bee452>\",\"WARC-Concurrent-To\":\"<urn:uuid:fb638823-e2d2-4b02-b8ae-e45bee1e6fd0>\",\"WARC-IP-Address\":\"172.67.173.249\",\"WARC-Target-URI\":\"https://cg-tower.com/what-are-the-prime-factors-of-48/\",\"WARC-Payload-Digest\":\"sha1:N5TCYCHRMVKAHOIWZU7M72YYHSI2TCAY\",\"WARC-Block-Digest\":\"sha1:YFUX443FW7LGLZCBWHRR6UN2ZJI3IMBD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103624904.34_warc_CC-MAIN-20220629054527-20220629084527-00094.warc.gz\"}"} |
http://www.geekinterview.com/question_details/15231 | [
"# A invests \\$12000, B invests \\$8000, C invests \\$6000 and they got a profit of \\$1200. How much share A got more than B and C?\n\n2/13 and 3/13\nThis question is related to Sonata Interview\n\n#### hm220887",
null,
"Profile",
null,
"Answers by hm220887\n\n• Feb 5th, 2010\n\nRatio of amt invested by A & B=3:2\n\nRatio of amt invested by B & C=4:3\nThus, Ratio of amt invested by 3 of them=A:B:C=3:2:1.5\nProfit got to A more than B=(3/6.5)-(2/6.5)=(1/6.5)=2/13\nProfit got to A more than C=(3/6.5)-(1.5/6.5)=(1.5/6.5)=3/13.",
null,
"",
null,
""
]
| [
null,
"http://www.geekinterview.com/talk/images/metro/blue/site_icons/profile.png",
null,
"http://www.geekinterview.com/talk/images/metro/blue/site_icons/forum-light.png",
null,
"http://www.geekinterview.com/images/ajax-loader.gif",
null,
"http://www.geekinterview.com/images/ajax-loader.gif",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8891093,"math_prob":0.953462,"size":725,"snap":"2019-51-2020-05","text_gpt3_token_len":204,"char_repetition_ratio":0.14979196,"word_repetition_ratio":0.3809524,"special_character_ratio":0.28965518,"punctuation_ratio":0.080882356,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97633266,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-13T07:00:19Z\",\"WARC-Record-ID\":\"<urn:uuid:99af72e7-b63f-49de-9dc2-b33b1e5af437>\",\"Content-Length\":\"99186\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dbc5f1a7-753c-4f5c-9bcb-8fc671e3393e>\",\"WARC-Concurrent-To\":\"<urn:uuid:73bced69-9dd8-4d9d-bc99-0b38c94f7c06>\",\"WARC-IP-Address\":\"199.187.125.188\",\"WARC-Target-URI\":\"http://www.geekinterview.com/question_details/15231\",\"WARC-Payload-Digest\":\"sha1:WPXSDGHYLQYNYOH5RIG4TJJUVPWNWFKX\",\"WARC-Block-Digest\":\"sha1:Q7OI3CKNCZ63KPVLCETSS653INPXURUF\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540548544.83_warc_CC-MAIN-20191213043650-20191213071650-00045.warc.gz\"}"} |
https://metanumbers.com/45091 | [
"## 45091\n\n45,091 (forty-five thousand ninety-one) is an odd five-digits composite number following 45090 and preceding 45092. In scientific notation, it is written as 4.5091 × 104. The sum of its digits is 19. It has a total of 2 prime factors and 4 positive divisors. There are 44,352 positive integers (up to 45091) that are relatively prime to 45091.\n\n## Basic properties\n\n• Is Prime? No\n• Number parity Odd\n• Number length 5\n• Sum of Digits 19\n• Digital Root 1\n\n## Name\n\nShort name 45 thousand 91 forty-five thousand ninety-one\n\n## Notation\n\nScientific notation 4.5091 × 104 45.091 × 103\n\n## Prime Factorization of 45091\n\nPrime Factorization 67 × 673\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 2 Total number of distinct prime factors Ω(n) 2 Total number of prime factors rad(n) 45091 Product of the distinct prime numbers λ(n) 1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 1 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 45,091 is 67 × 673. Since it has a total of 2 prime factors, 45,091 is a composite number.\n\n## Divisors of 45091\n\n1, 67, 673, 45091\n\n4 divisors\n\n Even divisors 0 4 2 2\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 4 Total number of the positive divisors of n σ(n) 45832 Sum of all the positive divisors of n s(n) 741 Sum of the proper positive divisors of n A(n) 11458 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 212.346 Returns the nth root of the product of n divisors H(n) 3.93533 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 45,091 can be divided by 4 positive divisors (out of which 0 are even, and 4 are odd). The sum of these divisors (counting 45,091) is 45,832, the average is 11,458.\n\n## Other Arithmetic Functions (n = 45091)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 44352 Total number of positive integers not greater than n that are coprime to n λ(n) 7392 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 4676 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 44,352 positive integers (less than 45,091) that are coprime with 45,091. And there are approximately 4,676 prime numbers less than or equal to 45,091.\n\n## Divisibility of 45091\n\n m n mod m 2 3 4 5 6 7 8 9 1 1 3 1 1 4 3 1\n\n45,091 is not divisible by any number less than or equal to 9.\n\n## Classification of 45091\n\n• Arithmetic\n• Semiprime\n• Deficient\n\n• Polite\n\n• Square Free\n\n### Other numbers\n\n• LucasCarmichael\n\n## Base conversion (45091)\n\nBase System Value\n2 Binary 1011000000100011\n3 Ternary 2021212001\n4 Quaternary 23000203\n5 Quinary 2420331\n6 Senary 544431\n8 Octal 130043\n10 Decimal 45091\n12 Duodecimal 22117\n20 Vigesimal 5ceb\n36 Base36 ysj\n\n## Basic calculations (n = 45091)\n\n### Multiplication\n\nn×i\n n×2 90182 135273 180364 225455\n\n### Division\n\nni\n n⁄2 22545.5 15030.3 11272.8 9018.2\n\n### Exponentiation\n\nni\n n2 2033198281 91678943688571 4133895249861354961 186401470711498356546451\n\n### Nth Root\n\ni√n\n 2√n 212.346 35.5929 14.5721 8.52743\n\n## 45091 as geometric shapes\n\n### Circle\n\n Diameter 90182 283315 6.38748e+09\n\n### Sphere\n\n Volume 3.84024e+14 2.55499e+10 283315\n\n### Square\n\nLength = n\n Perimeter 180364 2.0332e+09 63768.3\n\n### Cube\n\nLength = n\n Surface area 1.21992e+10 9.16789e+13 78099.9\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 135273 8.80401e+08 39050\n\n### Triangular Pyramid\n\nLength = n\n Surface area 3.5216e+09 1.08045e+13 36816.6\n\n## Cryptographic Hash Functions\n\nmd5 ad3a45f2c9edbf1b43fbda3d97b1cf5b a5e1750afb216c308a139012f9a8de733b901489 6e84cfac5c67a72170b7da40d1c00045479b5887818c4b23745fb24e31d39b7b 27c12663d8b1927817bb2a15628f432a7157d0f4e02b518e9f97aed300a7d23154538741eef05c41a8b11b77b29e8558dcc1587270158ecbb6da644a35f3df20 42f11db7dd9f9004fbde3ef1d8c410eb903743bd"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.62932026,"math_prob":0.9777633,"size":4530,"snap":"2020-24-2020-29","text_gpt3_token_len":1601,"char_repetition_ratio":0.1190897,"word_repetition_ratio":0.029673591,"special_character_ratio":0.4507726,"punctuation_ratio":0.0749354,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99588776,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-11T21:34:08Z\",\"WARC-Record-ID\":\"<urn:uuid:bc675621-1764-4d57-825f-164d89ee748d>\",\"Content-Length\":\"48151\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c3bfa630-cddb-4679-ae81-626f9abc5e1a>\",\"WARC-Concurrent-To\":\"<urn:uuid:a3c2b63a-860d-4ec1-86cb-c0fb07f76ead>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/45091\",\"WARC-Payload-Digest\":\"sha1:LT7AYI7YPJKT4I7W3GHYR2VW4DC56IA4\",\"WARC-Block-Digest\":\"sha1:EYKEGOHQY7HXDHB6Z4LY6FWIJMZXEFG7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655937797.57_warc_CC-MAIN-20200711192914-20200711222914-00256.warc.gz\"}"} |
https://www.gradesaver.com/textbooks/science/physics/college-physics-4th-edition/chapter-6-problems-page-233/102 | [
"## College Physics (4th Edition)\n\nTarzan's initial speed should be at least $5.8~m/s$\nLet $h_1$ be the original height. Let $h_2$ be the height of the higher ground across the gully. We can assume that the final speed is zero. We can use conservation of energy to find the initial speed $v_1$: $mgh_1 + \\frac{1}{2}mv_1^2 = mgh_2$ $\\frac{1}{2}mv_1^2 = mg~(h_2-h_1)$ $v_1^2 = 2g~(h_2-h_1)$ $v_1 = \\sqrt{2g~(h_2-h_1)}$ $v_1 = \\sqrt{(2)(9.80~m/s^2)(1.7~m)}$ $v_1 = 5.8~m/s$ Tarzan's initial speed should be at least $5.8~m/s$."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7943695,"math_prob":1.0000062,"size":513,"snap":"2020-10-2020-16","text_gpt3_token_len":219,"char_repetition_ratio":0.12573674,"word_repetition_ratio":0.078947365,"special_character_ratio":0.43469787,"punctuation_ratio":0.08547009,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99998474,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-22T05:58:13Z\",\"WARC-Record-ID\":\"<urn:uuid:a6d8b399-b9b3-4fac-862a-6d935b332283>\",\"Content-Length\":\"68260\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4d6bc741-1f6a-43c1-960b-1ddbbb32eb64>\",\"WARC-Concurrent-To\":\"<urn:uuid:a2544433-610d-4a5a-b15c-ed31e032968c>\",\"WARC-IP-Address\":\"54.210.73.90\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/science/physics/college-physics-4th-edition/chapter-6-problems-page-233/102\",\"WARC-Payload-Digest\":\"sha1:37EPXZ4RR74KO3TYUFB3TTRZMXGEHBUE\",\"WARC-Block-Digest\":\"sha1:GOALWYYZLOABEUGI7HPRL22EYY3GMADT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875145654.0_warc_CC-MAIN-20200222054424-20200222084424-00204.warc.gz\"}"} |
https://freetofindtruth.blogspot.com/2014/09/ | [
"## Tuesday, September 30, 2014\n\n### 96 | The Number of Wins for the Orioles and Nationals\n\nStandings courtesy of ESPN.com\n\nBaseball is a game centered around numerology, especially \"9\", from the number of players on the field to the number of innings in the game to the number of games on the schedule.\n• MLB = 13+12+2 = 27 = 2+7 = 9\n• 9-players\n• 9-innings\n• 27-outs = 2+7 = 9\n• 162-games = 1+6+2 = 9\nThis year's coming World Series will be the 110th, which makes me think of the word \"President\", as well as the name Rockefeller, and also, formerly the number of floors in WTC 1 and 2.\n• President = 16+18+5+19+9+4+5+14+20 = 110\n• Rockefeller = 18+15+3+11+5+6+5+12+12+5+18 = 110\n• WTC 1 and 2 were 110-stories tall until 9/11/01\nAnyhow, out of those three associations, the word President and the nation's capitol stand out the most. In the week before the regular MLB season concluded, I said watch to see if the Nationals or Orioles finish with 96 wins. As it happened, both teams finished with 96-wins. In the case of the Nationals, they earned their 96th win with their first franchise no hitter. 96 is of course the number of \"knowledge\" in Gematria, and the sum of the ranging degrees of Freemasonry (31+32+33 = 96). Please read my earlier post on the Orioles and Nationals World Series prospects. Personally, I'm feeling quite strong about it, but the Los Angeles Dodgers do also threaten. If it isn't Orioles vs Nationals, my next bet would be Orioles vs Dodgers. Why Dodgers? Besides the fact that they're good, and also the fact that they were in the World Series 26 and 33-years earlier.\n\nLet's see how it all plays out.\n\n### 33 | First Case of Ebola Confirmed in United States, September 30, 2014\n\nToday it is reported the first case of Ebola was confirmed in the United States. The patient is located in Texas State and the doctor doing the reporting is named \"Goodman\", a name with \"33 Gematria\"; common for movie stars as well as media witnesses. To date, the entire Ebola story has been \"33\", from patient zero's age, to \"Conakry\". This is the proof of what is really going on...\n\n• 33-years after AIDS Outbreak; 1981-2014\n• AIDS = 1+9+4+19 = 33\n• Goodman = 7+6+6+4+4+1+5 = 33\n• 33-year old patient zero\n• Conakry = 3+6+5+1+2+9+7 = 33\n• He was brought back to 33rd Parallel, Atlanta Georgia\n• ATL = 1+20+12 = 33\n• Read full CNN story here: http://www.cnn.com/2014/09/30/health/ebola-us/index.html\n\n### 33 49 | Fern Creek High School, First Reported Shooting of New School Year?\n\nToday it is reported a shooting took place at \"Fern Creek\" High School, curious for its \"33\" Gematria.\n• Creek = 3+9+5+5+11 = 33\n• Fern Creek = 6+5+9+5+3+9+5+5+2 = 49\nFull Story Here: http://www.cnn.com/2014/09/30/us/kentucky-school-shooting/index.html?hpt=hp_t2\n\nI'll keep my eye on this story as details emerge.\n\n## Monday, September 29, 2014\n\n### 33 77 | The Missing Real Estate Agent from Arkansas\n\nExamine the excerpt above. Notice that Aaron Lewis, the kidnapper, is 33-years of age. A coincidence? Possibly.\n\nFurther, notice the placement of the word \"Scott\". This is where she vanished from.\n• Scott = 3+15+18+20+20 = 77\nAnother coincidence? Possibly.\n\nThe numbers 33 and 77 are very much connected to Freemasonry; they are two of the most important.\n• Knights of Templar = 77\n• Knight = 33\n\n## Sunday, September 28, 2014\n\n### 33 119 | Obama, ISIS Headlines Foreshadow Conspiracy Head\n\nTake the image above for example. Notice how 'ground zero for jihadists'\n• ground = 7+9+6+3+5+4 = 34\n• zero = 8+5+9+6 = 28\n• for = 6+6+9 = 21\n• jihadists = 1+9+8+1+4+9+1+2+1 = 36\n• 'ground zero for jihadists' = 34+28+21+36 = 119\nThe top headline also calls tribute to the number '44'; Obama is the 44th President.\n• cancer = 3+1+14+3+5+18 = 44\n• grown = 7+18+15+23+14 = 77\nIn Pythagorean Gematria, the phrase nets an interesting result.\n• cancer = 3+1+5+3+5+9 = 26\n• that = 2+8+1+2 = 13\n• has = 8+1+1 = 10\n• grown = 7+9+6+5+5 = 32\n• for = 6+6+9 = 21\n• too = 2+6+6 = 14\n• long = 3+6+5+7 = 21\n• Cancer that has grown for too long = 137 (137 is the 33rd Prime Number)\n\n### Week 4 NFL in Review | 26 and 51 Strike\n\nEarlier today I said the numbers of the day were \"26\" and \"51\". As noted, the only team with an association to these numbers that was playing, were the Houston Texans, and they won today on a JJ Watt interception TD return, giving him two TDs on the season, more than the offensive superstars of the team.\n• JJ Watt = 10+10+23+1+20+20 = 84\n• United States of America = 3+5+2+9+5+4+1+2+1+2+5+1+6+6+1+4+5+9+9+3+1 = 84\n• Think Orwell and 1984\nThe number \"26\" came up in the 49ers game, where the York owned 49ers defeated the team from the Keystone State that has never won a Super Bowl. That must feel terrible when a team that has been in the league for significantly fewer years, has won 5... as the 49ers have.\n• 49ers 26, Eagles 21\n• Hoaxy, hoax looking game\n• York = 7+6+9+11 = 33\n• Keystone = 2+5+7+1+2+6+5+5 = 33\n• Eagles established in '33 (Same as Steelers)\n• Kaepernick through a pick six on third and three when I was expecting a big play one way or the other. I'm telling you, the hoaxes are called by the numbers. I'm sure third and three is a golden opportunity. Also, pay attention to how many QBs receive 33 attempts per game.\nThe 49ers are the most threatening team to my Detroit Lions Super Bowl prediction in the NFC. Both teams have strong connections to 33 and 49; the most significant numbers in this year's Super Bowl.\n\n### Rant to NFL Fans, September 28, 2014 (51 in numerology, also 26)\n\nDear NFL fans, don't you see how the league is changing the rules so that the officials have more and more control of the game? The NFL is lamer than lame these days. It has been so obviously fixed for the last decade, what we will call the \"Tom Brady era\", it is sick. Don't you all remember how it started? With a made up call on the field to prevent the fumble? Then the next season we got a whole new rule change. \"The Brady Rule\". lol... I know the athletes are tremendous, but so what if the game is a joke... ? These men are wasting their bodies for something predetermined? How sad. It makes me feel terrible for the Frank Gores of the world. I mean he has been paid well, but think of all the wear and tear his body has taken and many other long-time NFL greats, and for what? To generate dollars for a predetermined \"exciting outcome\"? When it comes to the NFL, the the only opportunity for truth is in player error. Imagine if Crabtree had caught the ball in the closing play of the NFC Championship, when he was instructed not to?\n\n• Michael vs Sherman... both names have a Gematria of \"33\"\n• Seahawks only \"33 team in the league\"\n• Mora left 31-33\n• Carrol came 33-31\n• 31-33 are the ranging degrees of Scottish Rite Freemasonry\n• Beast mode run from 33-yard line against NO with 7-9 playoffs record\n• Only team to play in Super Bowl and win on 33rd day of the year\n• Game predicted 10 years earlier in Simpsons\n• Broncos 19 Seahawks 14, emphasis on 14.. and that 19+14 = 33.\n• Simpson = 1+9+4+7+1+6+5 = 33 (...OJ crime scene June 13, 1994 = 33)\n• Sherman = 1+8+5+9+4+1+5 = 33\n• Seahawks = 1+5+1+8+1+5+11+1 = 33\n\nEverything in this world we live in, is scripted by the numbers. The football is the shape of the Vesica Piscis, which our alphabet and understanding of life is based on, but not taught to us. It has much to do with numbers and circles and the stuff we learned to hate in school because it was never explained to us why we were learning it. Looking back, it seems like more of a test of the system to make sure we're as dumb as they want us to be. The Vesica Piscis is only hinted at, from the football, to the Pisces symbol, to the Ichtus, to just about everything else in our society. We are living inside a matrix that is only outside of our consciousness because it has never been explained to us or made aware to us. Now all that no longer has to be true for you. Sure, waking up may be uncomfortable, but once you're awake, then you're in a position where you can actually contribute and give something back to society. At least you'll have a reason to. You'll also hopefully think less about yourself.\nAnd one more time, the NFL is rigged, find something better to do. Oh yes, so is college.\n\n• Heisman = 8+5+9+1+4+1+5 = 33\n• Winston = 5+9+5+1+2+6+5 = 33\nThis week's numbers are 51 and 26 because of NFL Week 4's Sunday Date; you could also say 27 and 52 are the numbers for Monday Night's Game.\n• 9/28/2014 = 9+2+8+2+0+1+4 = 26\n• 9/28/14 = 9+28+14 = 51\n\n### 88 | John Hickenlooper, 42nd Governor of Colorado and Marijuana\n\nJohn Hickenlooper is Governor of Colorado, one of two states with legalized marijuana; a title that deserves an asterisk. Here in Washington, where I live, the other legal state, marijuana with a max THC value of 15% is being priced at \\$30-40/gram retail in the stores that are allowed to sell it (few and far between). Who can afford that? Almost no one; therefore weed smokers must still look for marijuana on the \"illegal market\", even in a state where it is \"legal\". That is why the title \"legal\" deserves as 'asterisk'. What is really occurring right now is a \"grande experiment\".\n\nIn this marijuana legalization experiment, the number \"42\" has been central. In the case of John Hickenlooper, he is the 42nd Governor of Colorado. In the case of Washington State, Washington is the 42nd State. 42 is the meaning of life number in numerology. In the case of John Hickenlooper, he he became the 42nd Governor of Colorado on the date of January 11, 2011. Washington became a State on 11/11... are you seeing parallels?\n• 1/11/11\n• John = 10+15+8+14 = 47\n• John = 1+6+8+5 = 20\n• Hickenlooper = 8+9+3+2+5+5+3+6+6+7+5+9 = 68\n• John Hickenlooper = 20+68 = 88\n• George Washington = 88\n• Uncle Sam = 88\n• Poison = 88\n• Program = 88\n• Maleficent = 88\n• California = 88\n• many more...\n• John Hickenlooper was born February 7, 1952\n• 2/7/1952 = 2+7+1+9+5+2 = 26\n• Hickenlooper graduated from Wesleyan in 1974, emphasis on '74\nWe're now living in the era of \"new weed laws\".\n• New = 14+5+23 = 42\nPerhaps this is why States with \"42\" associations were chosen for this experimental time in what can be referred to as, \"almost legalized national marijuana\". If you're having trouble understanding what is happening with marijuana in this country, I will fill you in. In the year '33, the bottom of the Great Depression, alcohol was legalized. Why? So that people could drown out all the awful around them, all the sorrows, all the despair, all that was broken. Well, the same is going to be true with marijuana. Once the market tanks and Americans are troubled with a whole new level of \"low\"; much lower than low right now, they'll be greeted with legal marijuana to help them drown out their sorrows.\n\nIt is sad to think about but I know it is true. If you disagree, your disagreement is about to be short. Now let us close by looking at some curious land features of Colorado. I especially appreciate the highest point, 14,440 foot Mt. Elbert. It should be noted that the first national initiative to legalize marijuana in Colorado was initiative 44, a number that doesn't have much \"good\" behind it. (Keep in mind I am a weed smoker, so my bias is not against weed).\n• Mt. 13+20 = 33\n• Elbert = 5+3+2+5+9+2 = 26\nCurious Colorado Land Stats\n\n### 26 | The Number Reported Hospitalized in Hong Kong\n\n• Hong = 8+15+14+7 = 44\n• Kong = 11+15+14+7 = 47\n• 26 hospitalized\n• Anyone shot between three and eleven times?\n\n### 33 | A Deadly \"Hike\" on Mt. Ontake\n\n• Hike = 8+9+11+5 = 33\n• Hiker = 8+9+2+5+9 = 33\n• KV exception\n\n### 26 51 | NFL Week 4 Number of Curiosity\n\nThe numerology of today's date is \"26/51\" and for MNF it will be \"27/52\".\n• 9/28/2014 = 9+2+8+2+0+1+4 = 26\n• 9/28/14 = 9+28+14 = 51\nOnly four teams in the NFL have an association with the number 51 and three of those teams are on a bye this week.\n• Cleveland Browns\n• Cincinnati Bengals\n• St. Louis Rams\nZero teams have an association with \"26\", unless you count the \"Z\" in the name Arizona Cardinals. The Arizona Cardinals are also on a bye week.\n\nThe only other team with a 51 association is the Houston Texans, and they're playing the Buffalo Bills this morning in Houston.\n\nTo see the complete numerology of every team in the NFL, please click here.\n\nUPDATE: 5:55 PM 9-28-14 JJ Watt returned a game winning interception against the Buffalo Bills, a team that has been used possibly more than any other for staged defeats on a major stage. Think about the Super Bowls with the Buffalo Bills from year's past...\n\n## Saturday, September 27, 2014\n\n### 44 47 | The Gematria of Honk Kong in the Midst of Hong Kong Protest\n\n• Hong = 8+15+14+7 = 44\n• Kong = 11+15+14+7 = 47\n• 8/29/1842 = 8+2+9+1+8+4+2 = 34\n• 10/18/1860 = 10+18+60 = 88\n• 7/1/1898 = 7+1+1+8+9+8 = 34\n• 12/25/1941 = 1+2+2+5+1+9+4+1 = 25\n• 8/15/1945 = 8+1+5+1+9+4+5 = 33\n• 7/1/1997 = 7+1+1+9+9+7 = 34\n\n### 33 42 | Police Officer Shot in Ferguson Hoax and \"Brian Schellman\"\n\nThe Ferguson shooting is back in the headlines, with yet another shooting. This time it is reported a shooter, currently at large, shot a police officer in the arm and who is currently being treated with non-life threatening injuries. The news comes from Police Spokesman Brian Schellman. Let me know if the Gematria of his name looks familiar.\n• Brian = 2+9+9+1+5 = 26\n• Schellman = 1+3+8+5+3+3+4+1+5 = 33\n• Michael = 4+9+3+8+1+5+3 = 33\n• Darren = 4+1+9+9+5+5 = 33\nRecall that 42 is also central in the Missouri shooting.\n• Ferguson = 6+5+9+7+3+1+6+5 = 42\n• Missouri = 4+9+1+1+6+3+9+9 = 42\n• Gun = 7+21+14 = 42\n• War = 23+1+18 = 42\n• Sin = 19+9+14 = 42\n• Sub = 19+21+2 = 42\nNow look at the clip below, and notice the name \"Tim\" in Tim Zoll.\n• Tim = 20+9+13 = 42\n• Zoll = 26+15+12+12 = 65\n\n### 59 84 | Marshall Mathers, Manchurian Rapper\n\nEminem is the rapper that stole his flow and lyrical content from the mid 90s, lesser known rapper, \"Cage\". He was born with the name Christian Palko. Listen to Cage and then listen to Eminem's first commercially successful album, the Slim Shady LP. Eminem's album would debut shortly after in '96, with Infinite. Keep in mind that '96 is a number which corresponds very much with Scottish Rite Freemasonry.\n• Christian = 3+8+9+9+1+2+9+1+5 = 47\n• Palko = 7+1+3+2+6 = 19\n• Christian Palko = 47+19 = 66\nEminem is also a rapper with many aliases; among them are- Eminem; Marshall Mathers; Slim Shady. All of these names have very curious Gematria, let us examine.\n\n• Eminem = 5+4+9+5+5+4 = 32\n\n• Eminem reduces to 32, much like America (America = 1+4+5+9+9+3+1 = 32)\n• Marshall = 4+1+9+1+8+1+3+3 = 30, reduces to 3\n• Mathers = 4+1+2+8+5+9+1 = 30, reduces to 3\n• Marshall Mathers reduces to 3 and 3, interesting...\n• Marshall = 13+1+18+19+8+1+12+12 = 84, reduces to 12, reduces to 3\n• Mathers = 13+1+20+8+5+18+19 = 84, reduces to 12, reduces to 3\n• Marshall and Mathers both sum to 84, just like \"United States of America\"\n• United = 3+5+9+2+5+4 = 28\n• States = 1+2+1+2+5+1 = 12\n• of = 6+6 = 12\n• America = 1+4+5+9+9+3+1 = 32\n• United States of America = 28+12+12+32 = 84\n• Slim = 1+3+9+4 = 17\n• Shady = 1+8+1+4+7 = 21\n• Slim = 19+12+9+13 = 53\n• Shady = 19+8+1+4+25 = 57\n• Slim Shady = 53+57 = 110\nWhen Eminem first came out, it was a big deal that he was 'white' and making rap music.\n• Eminem = 5+13+9+14+5+13 = 59\n• Negro = 14+5+7+18+15 = 59\n• Slave = 19+12+1+22+5 = 59\n• Blues = 2+12+21+5+19 = 59\nLet us close by examining Eminem on national television and listening to what he has to say about his music and his career. He knows it is all a joke. Evidence suggests he is another rich kid, born into elite status, and turned into a hip-hop star; joining the likes of Ludacris, Dr. Dre and many others. Eminem was born Marshal Bruce Mathers III, emphasis on the third, October 17, 1972. He will be turning 42-years of age this coming October, the only month of the year with \"33\" Gematria.\n• October = 6+3+2+6+2+5+9 = 33\n• Eminem's lyrics are full of \"33\"; especially \"Kim\"\n• Kim = 11+9+13 = 33\n\n### 84 | James Traficant Ran Over by Lawnmower\n\nToday it is reported that former Ohio Congressman, representing the 17th District, James Anthony Traficant Jr., was ran over by his lawnmower in an \"accident\". Can you imagine? It should be noted that Mr. Traficant was sent to prison for seven years from '02-'09 before being released on September 2, 2009.\n• James = 1+1+4+5+1 = 12\n• Anthony = 1+5+2+8+6+5+7 = 34\n• Traficant = 2+9+1+6+9+3+1+5+2 = 38\n• James Anthony Traficant = 12+34+38 = 84\n• Junior = 1+3+5+9+6+9 = 33\n\n### 155 99 33 | Mt. Ontake Eruption 155 Miles Outside Tokyo Curiosities\n\n• Hydrothermal = 8+7+4+9+6+2+8+5+9+4+1+3 = 66\n• Phreatic = 7+8+9+5+1+2+9+3 = 44\nWhile reading about this eruption, one of many curious eruptions this year, the number 155 stood out. This is how many miles the eruption is from Tokyo, the Japan population center. Why is 155 curious? Because of the following:\n• Jew = 1+5+5\n• Jew = 155\n• Christianity = 3+8+18+9+19+20+9+1+14+9+20+25 = 155\nThen there is also the following:\n• Jewish = 10+5+23+9+19+8 = 74\n• Jesus = 10+5+19+21+19 = 74\n• Y'shua = 25+19+8+21+1 = 74\n• Muhammad = 13+21+8+1+13+13+1+4 = 74\n• Cross = 3+18+15+19+19 = 74\n• and much more...\n33 is central in most religions, especially Christianity, where Jesus was crucified at \"33-years of age\" on the cross.\n\nNow let us look at the reporting of today's eruption of \"Mt\" Ontake.\n• 9/27/14 = 9+27+14 = 50\n• Mt = 20+13 = 33\n• Ontake = 15+14+20+1+11+5 = 66\n• Mt. Ontake = 33+66 = 99\n• Illinois is the only state that sums to 99\nThese people appreciate cycles of \"7\", a number central in the Bible. Notice that 2007 was seven years prior. The date of the eruption was January 25, 2007 followed by more volcanic activity in March of 2007; January 25, 2007 is a date with a numerology of 33.\n• 1/25/07 = 1+25+07 = 33\n• See image at top for date confirmation\nAnyhow, the list of ongoing suspicious volcanic events continues.\n\n### 44 | 'Coffee Cup' Salute Code\n\nIf you can believe it, the recent headlines of the 'coffee cup' salute are more coding; coding of the coming assassination of the scripted event that will be the death or near death of Barack Hussein Obama. These headlines all ultimately achieve one thing, cheapening the image of the President in the eyes of many before the climax of this hoax. Now, with that said, let us decode 'Coffee Cup'.\n• Coffee = 3+6+6+6++5+5 = 31\n• Cup = 3+3+7 = 13\n• Coffee Cup = 31+13 = 44\n• Barack Hussein Obama is the 44th President\n• The words 'hope' and 'kill' sum to 44 in Gematria\n• Those are the words people will associate with Barack Hussein Obama in the end\n• Even his name was part of the PsyOps\n• Barack Hussein Obama is not his real name\n• Kill = 11+9+12+12 = 44\n• Hope 8+15+16+5 = 44\n\n### 26 33 39 113 | Charlotte Clinton Mezvinsky Gematria\n\nChelsea Clinton is reported to have had her first child with Marc Mezvinsky.\n• Chelsea = 3+8+5+3+1+5+1 = 26\n• Clinton = 3+3+9+5+2+6+5 = 33\n• Charlotte = 3+8+1+9+3+6+2+2+5 = 39\n• Mezvinsky = 4+5+8+4+9+5+1+2+7 = 45\n• or Mezvinsky = 4+5+8+4+9+5+1+11+7 = 54\n• Chelsea Clinton-Mezvinsky = 26+33+54 = 113\n• Charlotte Clinton-Mezvinsky = 39+33+54 = 126\n• The alphabet in Gematria sums to 126\nAdd this as further documentation to the theory that the elites marry and breed \"by the numbers\".\n• Beyonce = 2+5+7+6+5+3+5 = 33\n• Blue Ivy = 2+3+3+5+9+4+7 = 33\n\n### 33 | DowJones Curious September 26, 2014 Finish\n\n• Notice the 17 (prime, God/Zeus association)\n• Notice the 113 (11x3)\n• Notice the 15 (5+5+5)\n• Notice the BIG DAY\nWhat will Monday hold? Remember, the markets are a giant puppet show with real puppet masters who are numerologists who also fascinate on \"33\"; meaning numbers such as 113, 17, etc.\n• DowJones = 4+6+5+1+6+5+5+1 = 33\nThe DowJones had a big day, following a terrible day, in a span ending September 26 and beginning September 25. The finish for September 26 is above. The stats for the day prior are captioned below. (September 25 down, September 26 up)\n\n## Friday, September 26, 2014\n\n### 33 | Pearl Harbor Day 2014, 12/07/14\n\nWhile reading a book on numerology, I recently learned of finding the numerology of a date from the following method. Let us first use today's date as an example.\n\n• Today is September 26, 2014\n• 9/26/14 = 9+26+14 = 49\n• 49 is associated with money and the DowJones had a big day\n• DowJones = 4+6+5+1+6+5+5+1 = 33\nAs for the date of December 7, 2014, also known as Pearl Harbor Day, and the nation's first state's birthday, Delaware. Delaware was established December 7, 1787.\n• Delaware = 4+5+3+1+5+1+9+5 = 33\n• 12/7/1787 = 1+2+7+1+7+8+7 = 33\n• This year's coming date will also have a numerology of 33\n• 12/7/14 = 12+7+14 = 33\nEarlier this year, Robbin Williams \"committed suicide\" on 8/11/14.\n• 8+11+14 = 33\nOn 9/10/14, Obama gave a speech to the nation on ISIS the western sponsored terrorist organization, bring the growing PsyOp to a new level of national attention.\n• 9/10/14 = 9+10+14 = 33\nWhat will December 7 bring?? Other \"33\" dates between now and then are as follows:\n• 10/9/14\n• 11/8/14\n\n### 115 | The Oklahoma Beheading Hoax\n\nToday it is reported a man beheaded a coworker in Oklahoma after he was recently fired. In other words, another beheading hoax building on the foreign beheading hoaxes also sponsored by the media at this time. What is curious in terms of Gematria, is that the number 115 is coded three times in this story. Notice the headline, 'This guy was not going to stop'.\n• This guy was not going to stop = 20+17+7+13+34+8+16 = 115\n• This = 2+8+9+1 = 20\n• guy = 7+3+7 = 17\n• was = 5+1+1 = 7\n• Notice how 'was' creates the 115 sequence in letters to numbers\n• not = 5+6+2 = 13\n• going = 7+6+9+5+7 = 34\n• to = 2+6 = 8\n• stop = 1+2+6+7 = 16\nFurther, the man's name is Alton, Alexander, Nolan, initials that yield AAN, or in Gematria, 115.\n\nSome 115 significance's, courtesy of Wikipedia, are provided below:",
null,
"Notice the reporter \"Evan\", a common name on liquor bottles.\n\n• Evan = 5+22+1+5 = 33\n\nThe other word of interest in this case is Vaughan.\n• Vaughan = 22+1+21+7+8+1+14 = 74\n• Jewish = 10+5+23+9+19+8 = 74\n• Jesus = 10+5+19+21+19 = 74\n• Cross = 3+18+15+19+19 = 74\n• Gematria 7+5+13+1+20+18+9+1 = 74\n• English = 5+14+7+12+9+19+8 = 74\n\n### 47 66 | George Brown \"Rape Avoidance\" Advice Headlines\n\nThis week it has been reported that Oklahoma Police Captain George Brown said that women should avoid getting pulled over by following the laws of the road, alluding to it being the best way to avoid being 'raped by fellow police officers'. The comments have created quite the stir in mainstream media outlets and on social media. What are curious about this story are two in number; the name \"George Brown\" and the news network that did the interview, \"KJRH\".\n• George = 7+5+6+9+7+5 = 39\n• Brown = 2+9+6+5+5 = 27\n• George Brown = 39+27 = 66\n• Police = 7+6+3+9+3+5 = 33\n• Thirty-Three = 2+8+9+9+2+7+2+8+9+5+5 = 66\nThe news network has the Gematria of 47, often paired with \"33\".\n• KJRH = 11+10+18+8 = 47\nIn total, it is more curious coding, and likely further part of the PsyOps. On my own Facebook feed, I have seen a number of women mention this story... which shows it is on the minds, and irritating many of those same minds.\n\n### If your dad's head was cut off, would you smile on TV?\n\nDon't you guys get sick of looking at these smiling assholes who go before the camera and lie? I'm ready to start the civil war myself. This girl had a shit eating grin through her entire CNN interview while talking about her decapitated father. Can you imagine knowing your dad got his cut off in the most brutal fashion, and then smiling and grinning about it on television days and weeks later? These people belong in the dirt. Really.\n\n### 33 | Three Dead NYC Firefighter Heroes from September 11, 2001 (September 26, 2014)\n\nToday it is reported three firefighters from 9/11 have all died on the same day (this week) from illness related to September 11, 2001. Two of the three firefighters have \"33\" names.\n• *Howard Bischoff\n• *Robert Leaver\n• Daniel Heglund\nThe Gematria of Howard and Robert are both \"33\".\n• Howard = 8+6+5+1+9+4 = 33\n• Robert = 9+6+2+5+9+2 = 33\n• Daniel = 4+1+5+9+5+3 = 27\n• 27 and 33 are often haired; from Robert Muller to Michael Brown\n• 3x9 = 27 and 3x11 = 33... emphasis on 9 and 11\nIt should be noted that the majority of witnesses who exist in our media for the events of September 11, have \"33\" names. Perhaps these three firefighters never existed in the first place, and now their identities are being cleared? Just a thought.\n\n### 33 | Vanessa Hudgens, Another \"33\" Disney Actress\n\nToday it is reported nude images of Vanessa Hudgens are on the web, along with images of Kim Kardashian, Mary-Kate Olsen, and more. What is curious about the name 'Hudgens', is the Gematria of \"33\", so often found in star names, especially those tied to Disney, which is a \"33-company\" through and through.\n• Hudgens = 8+3+4=7+5+5+1 = 33\nVanessa Hudgens was born December 14, 1988. Her 24th birthday was the date of the Sandy Hook School shooting.\n• 12/14/1988 = 1+2+1+4+1+9+8+8 = 34\n\n### 76 | Alton Alexander Nolan Beheading Story\n\nToday it is reported a 30-year old man beheaded Alton Alexander Nolan in Oklahoma. The Gematria of his name is 76, much like the name \"Knight of Templar\".\n• Alton = 1+3+2+6+5 = 17\n• Alexander = 1+3+5+6+1+5+4+5+9 = 39\n• Nolan = 5+6+3+1+5 = 20\n• Alton Alexander Nolan = 17+39+20 = 76\n\n### 47 | Derek Jeter's Last Game, the End of a Manchurian Athlete's Legacy\n\nWhen I was a boy, Derek Jeter was my hero. I used to play a lot of baseball growing up and I wanted to be the shortstop for the Yankees when I was older. I think a lot of boys were living the same dream, through the same man. What I didn't know when I was a boy was that there was such a as manchurian athletes, which today, I'm now certain Derek Jeter was one of. Take a look at the Gematria of his name, typical of sports superstars, which Derek Jeter is in every way.\nDerek Jeter was born in the year '74, another important number to the Occult elite, on the date of June 26. On a side note, Derek Jeter was born 29-years after the charter date of the United Nations.\n\nPart of the reason Derek Jeter has been a hero for me, is his mild manner attitude. I've never seem him brag, boast or put anyone down. I've also seen him make a lot of clutch plays, and clutch is something I've always been attracted to. As the story goes for his final at bat, he knocked in the game winning run- clutch as usual.\n\nIf you look at the batting order of Yankees today, you'll see many names with master numerology, from Headley to Ellsbury, the later of which was born on September 11 in the 33rd State, Oregon.\n• Headley = 8+5+1+4+3+5+7 = 33\n• Ellsbury = 5+3+3+1+2+3+9+7 = 33\nIn other words, it won't be long before the Yankees find another star to replace Derek Jeter. The manchurian athletes, they are abound.\n\n### 33 | Robert Muller, Leader in 'One World Religion' Through United Nations\n\nRobert Muller, born on March 11, 1923, is a very notable figure in the history of the United Nations, and the spread of New Ageism throughout the world. If you have not read my post on New Ageism, please do so here. Robert Muller is also a man with \"33\" \"27\" name Gematria, and a March 11, or 3/11 birthday.\n• Robert = 9+6+2+5+9+2 = 33\n• Muller = 4+3+3+3+5+9 = 27\n• Born March 11, 3/11, 311...\nRobert Muller was born in Belgium, one of eight \"33\" named nations in the world.\n• Belgium = 2+5+3+7+9+3+4 = 33\n\n## Thursday, September 25, 2014\n\n### 33 | Front Runners for Attorney General\n\nCNN has a feature article stating the \"Top 7 Candidates\" for Eric Holder's recently vacated position. The top two of the seven on CNN's list are Massachusetts Governor Deval Patrick. Massachusetts is one of three \"33 States\" in terms of Gematria.\n• Massachusetts = 4+1+1+1+1+3+8+3+1+5+2+2+1 = 33\n• Deval = 4+5+4+1+3 = 17\n• Patrick = 7+1+2+9+9+3+2 = 33\nThe next candidate named after him Solicitor General Don William Junior.\n• Don = 4+15+14 = 33\n• Verrilli = 4+5+9+9+9+3+3+9 = 51\n• Junior = 1+3+5+9+6+9 = 33\nIt is common to see \"33\" names in high places, but it should be noted that neither the name Eric or Holder have a value of \"33\". The name Eric, with his particular spelling, does yield a value of \"26\" though; an equally, if not more important number.\n• Eric = 5+9+9+3 = 26\n• Holder = 8+6+3+4+5+9 = 35\n• Both 26 and 35 reduce to 8; thus 8 and 8\n• Eric Cantor also recently resigned\n• Cantor = 3+1+5+2+6+9 = 26\n• 26 is the 'God Number' in Gematria\n• God = 7+15+4 = 26\n• With the alternative method, it sums to \"17\", like Deval and Zeus\n• God = 7+6+4 = 17\n• Zeus = 8+5+3+1 = 17\n• Notice how Zeus begins with Z, the \"26th letter\"\n• In the case of Verrilli, it has the numerology of 51, a number that is only divisible by 3 and 17, besides 51 and 1. 3x17 = 51...\nIn the coming days, possibly weeks, lets see who rises to the occasion. Will it be a man or woman of Occult Name Numerology???\n\n### 66 | USGS 6.2 Earthquake in Anchorage and \"48\"\n\nIn a Gematria, 48 shows up in two names from the reporting; \"News-Miner\" and \"Casey Grove\"\n• The numerology of today is \"48\"\n• 9/25/14 = 9+25+14 = 48\n• News-Miner = 5+5+5+1+4+9+5+5+9 = 48\n• Casey Grove = 3+1+1+5+7+7+9+6+4+5 = 48\nThe Gematria of USGS is also curious.\n• USGS = 19+21+7+19 = 66\n• 66 is coded into the founding of the country, and throughout history,\n• From highways to the NFL\nAlso recall how \"33\" and \"66\" are closely associated. In the case of this article, it is \"Alan Duke\", \"Agent-33\" himself.\n• Alan Duke = 1+3+1+5+4+3+11+5 = 33\n• Thirty-Three = 2+8+9+9+2+7+2+8+9+5+5 = 66\nFINAL THOUGHT: Would they report false earthquakes? And HAARP is located in Alaska...\n• HAARP = 8+1+1+18+16 = 44\n• HAARP has the capability to create manmade earthquakes\n• It is a \"weather experimentation device\"\n• It is controlled by the military; has been since 1983\n• Military = 4+9+3+9+2+1+9+7 = 44\n• Kill = 11+9+12+12 = 44\n\n### 33 | Matthew Miller, American in North Korean Prison Camp PsyOp\n\nNorth Korea and the United States are allies. Their rivalry exists only in the mainstream media. Stories such as \"Mathew Miller, prison camp sufferer\", are complete bullshit.\n• Miller = 4+9+3+3+5+9 = 33\n\n### 47 | Agent 47, Bill Simmons Staged September 24, 2014 Suspension\n\nThe name Bill Simmons has the curious numerology of 47. It is important to note that Bill Simmons comes from one of three \"33\" States, Massachusetts.\n• Bill = 2+9+3+3 = 17\n• Simmons = 1+9+4+4+6+5+1 = 30\n• Bill Simmons = 47\nThe date of his suspension also has a numerology of 47.\n• 9/24/14 = 9+24+14 = 47\n\n## Wednesday, September 24, 2014\n\n### 33 | How Many Pounds of Weed at JFK Airport? Images don't match \"33\" pounds...\n\nToday it is reported a woman was arrested at JFK with 33-pounds of marijuana on her possession, as well as two guns. The caption from the story is below. The full story is linked below the image.\n• The date of this story is matching the bag weight\n• 9/24 = 9+24 = 33 (Mary Jane = 4+1+9+7+1+1+5+5 = 33)\n• 9/24/14 = 9+24+14 = 47\n\nThis image courtesy of NBC shows that they know their viewers have no idea what 33-pounds of weed looks like. If that stuff is really, really dense, maybe a pound or two of marijuana is in the image including what you can imagine is in the rest of the box... what a joke!!!!\n\n### 47 | Jund al-Khilafa and the 9/24/14 Beheading Video Connection\n\nToday's date is 9/24/14 and their is news of a new beheading video. This time the 'culprits' are \"Jund al-Khilafa\", a name with a Gematria matching the numerology of the date.\n• 9/24/14 = 9+24+14 = 47\n• Jund = 1+3+5+4 = 13\n• al = 1+3 = 4\n• Khilafa = 2+8+9+3+1+6+1 = 30\n• Jund al Khilafa = 13+4+30 = 47\n• 47 is heavily associated with Christianity and Islam\n• Muhammad = 13+21+8+1+13+13+1+4 = 74\n• Jesus = 10+5+19+21+19 = 74\n• Y'shua = 25+19+8+21+1 = 74\nThe hostage this time is reported to be Herve Gourdel, a name with familiar Gematria also pertaining to Freemasonry.\n• Herve = 8+5+9+4+5 = 31>4\n• Herve = 8+5+9+22+5 = 49>13>4\n• Herve = 8+5+18+22+5 = 58>13>4\n• Here reduces to 4, all methods\n• 31 is the foundational degree of Scottish Rite Freemasonry\n• 49 is the number of Revelation\nThen the last name...\n• Gourdel = 7+6+3+9+4+5+3 = 37>10>1\n• Gourdel = 7+15+21+18+4+5+12 = 82>10>1\n• Gourdel reduces to 10 and 1"
]
| [
null,
"https://1.bp.blogspot.com/-L2WD7Ukoi9s/VCXpEV1uiEI/AAAAAAAAGBU/h_6bEqUGhF4/s1600/Screen%2BShot%2B2014-09-26%2Bat%2B3.29.27%2BPM.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9598544,"math_prob":0.9691312,"size":1540,"snap":"2022-40-2023-06","text_gpt3_token_len":439,"char_repetition_ratio":0.11393229,"word_repetition_ratio":0.0072727273,"special_character_ratio":0.30844155,"punctuation_ratio":0.09259259,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97569036,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-01T00:52:27Z\",\"WARC-Record-ID\":\"<urn:uuid:25972fdf-f1ea-4aa6-9410-690260d733cc>\",\"Content-Length\":\"298319\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:55acc6ea-3c97-413f-b17d-0803ba9f7709>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8fe89f7-c8a8-421c-b766-c80b0d20c26c>\",\"WARC-IP-Address\":\"142.251.111.132\",\"WARC-Target-URI\":\"https://freetofindtruth.blogspot.com/2014/09/\",\"WARC-Payload-Digest\":\"sha1:BP2DOETAGYF2DPNM6I7TWSJFHHKUPPZB\",\"WARC-Block-Digest\":\"sha1:UPTQDVD5YLSUVHGR55ULTRGS7EA7TMLJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335514.65_warc_CC-MAIN-20221001003954-20221001033954-00157.warc.gz\"}"} |
https://www.go4expert.com/forums/efficient-arrays-variable-size-t13758/ | [
"# What is the most efficient way to work with arrays of variable size?\n\nDiscussion in 'C' started by aortizb, Sep 12, 2008.\n\n1. ### aortizbNew Member\n\nJoined:\nSep 12, 2008\nMessages:\n32\n0\nTrophy Points:\n0\nDear All,\n\nI would like to receive comments on the following problem. Suppose you have a matrix K and a matrix M. Matrix M is small compared to K. The problem I have is that matrix K is large and sparse. Matrix K is formed by assembly of several matrix M. So, I work with one matrix M whose size is changing every time that I need to perform an assembly in matrix K. I always know the size of matrix M just before performing the assembly. Because of matrix K is sparse and large, I just want to store non-zero elements.\n\nHere is the question: What would be the most efficient programming technique for the assembly stage, i.e., put matrix M into matrix K?\n\nThanks,\nAlejandro.\n\n2. ### aortizbNew Member\n\nJoined:\nSep 12, 2008\nMessages:\n32\n0\nTrophy Points:\n0\nMaybe I need to explain more deeply in order to get a reply.\n\nFirst of all, I am using allocatable arrays. I don't have problems with the use of C++. It is about an algorithm issue and how to do it efficiently from the memory manage and running time to do the assembly stage point of view.\n\nActually, this is a code for a meshfree method (MM) to solve a Partial Differential Equation (PDM). The method is similar to Finite Element Method (FEM). Basically, I need to construct a system of linear equations: Ku = f, where K is large and sparse (a lot of zeros inside). I don't need the zeros so I am using a row compressed format to store matrix K. The solution of the linear system is not a problem for me since I am using TAUCS which is a library to solve sparse linear systems. My problem is the assembly stage. In FEM the M matrices are always of the same size, so I can assembly them into K very efficiently (BTW K has fixed size also). In MM the size of M is not fixed, meaning that in one assembly stage it can be, for instance, 10 x 10 and in the next stage it can be 50 x 50, and in the next stage 20 x 20, and so on.\n\nSome other things: Matrix K is formed by the elements of M and K has a fixed size, say 6000 x 6000. Once M is assembled (copy into K), element of matrix M are not needed anymore, so I can deallocate it to allocate again in the next stage. So, I need to send the elements of M to an appropriate index in K. There are a couple of way to do this, but I would like to know which is more efficient. Maybe, I should detail how can it be done, so you can figure out what would be more efficient from the memory and running time point of view.\n\nFirst option: Since I know the size of M previous to perform the assembly, I can form the M matrix, say of size m_x_m, and then assembly the complete matrix M with a loop structure into K with the aid of a vector that has stored in some way the index (i,j) of the matrix K in which element (k,r) of matrix M must be copied.\n\nSecond option: Instead of forming matrix M. I can just compute each element of M, say (k,r) directly into position (i,j) of K with the aid of the same vector described in the first option.\n\nI really don't like to bold words, but I did it above to make evident the difference between the two options. The difference is in option 1, I assembly a complete matrix M into K while in option 2, I compute each element of matrix M directly into K.\n\nIn both options, I have to do the operation several times until K has been completely filled. In the assembly process when a position (i,j) of matrix K has already been copied with another number in a previous stage, simply the new element of (i,j) is added to the previous one.\n\nSo, I would like to know which of the above options should run faster.\n\nThanks again.\n\n3. ### xpi0t0sMentor\n\nJoined:\nAug 6, 2004\nMessages:\n3,009\n203\nTrophy Points:\n63\nOccupation:\nSenior Support Engineer\nLocation:\nEngland\nI think the only way to determine which is more efficient is to run trials. If I understand it correctly, option 1 means K is a sparse array of M locations and you have a separate list of Ms, whereas in option 2 the Ms don't exist and K is just a sparse array of individual (albeit clustered) values.\n\nIn 1, to determine K[p,q] you'd have to determine which M p,q corresponds to, then lookup M[p-M.xpos, q-M.ypos]. Locating M in K would be quicker as there are fewer of them.\n\nIn 2, to determine K[p,q] you just have to look down the list of entries in K.\n\nIf you hash the positions in K of the Ms or the individual values, say as p*QMAX+q, then you can do a binary search. This applies to both options.\n\nMy feeling is that option 2 would be quicker (whether you use a binary search or not) as although the search would be longer, this would be offset by the fact that once the search is complete you then have the value you want, whereas option 1 requires two subtractions, an add and multiply and two memory lookups to pull the value out of M. A binary search iteration comprises a compare, a divide by two, add or subtract and a memory lookup, so the overhead of the longer search is shorter than the overhead of looking up in the list of Ms even if M is only 2x2, and option 1 gets worse as the size of M increases.\n\nThat might be completely wrong though. If K comprises a large number of small Ms then an individual M will take longer to find than if K comprises a small number of large Ms. Either way the final lookup into the specific M will be just as quick as it doesn't matter how large p-M.xpos and q-M.ypos are, but where K is a large number of individual values then the search, while immediately returning the final value, will likely favourably compare with the search time for a large number of small Ms, but be considerably slower than if K contains a small number of large Ms.\n\nIf M is 50x50, that means K has 2500 times as many entries in option 2 as it does in option 1, which is likely to be quicker. You might find there's a particular size of M, for the same number of individual K[p,q] values, where option 1 is better for M one side of that size and option 2 better on the other side.\n\n4. ### aortizbNew Member\n\nJoined:\nSep 12, 2008\nMessages:\n32\n0\nTrophy Points:\n0\nThanks for your reply. There is another data that maybe it is needed to know. Entries in matrix K are not known while entries in M are known after you compute them and before placing into K.\n\nIn option 1, you compute a complete matrix M (too small compared to K) and then, with the aid of a vector which has stored the index of K in which the elements of M must be placed, you do the assembly of the complete M into K. Thus, option 1 has a loop over elements of M, but not in K becuase of the index vector you know exactly the position in K.\n\nIn option 2, you don't have to allocate memory for M, simply you compute a number for which you have a variable of type double to store it, and using the index stored in the vector mentioned in option 1, you place it directly into K. This option also has a loop but not over a matrix M. The loop is actually to compute several times the number in the variable of type double which is then placed into K.\n\n5. ### xpi0t0sMentor\n\nJoined:\nAug 6, 2004\nMessages:\n3,009\n203\nTrophy Points:\n63\nOccupation:\nSenior Support Engineer\nLocation:\nEngland\nHow can you have unknown values in K?\n\n6. ### aortizbNew Member\n\nJoined:\nSep 12, 2008\nMessages:\n32\n0\nTrophy Points:\n0\nBefore computing them. Remember, you first need to compute the values of M (option 1) or the value of a double variable (option 2). Then when you have placed them (ot it) into K you know the value of K. When you have completed the procedure, you will hava a large and sparse matrix K to solve the system Ku = f.\n\n7. ### xpi0t0sMentor\n\nJoined:\nAug 6, 2004\nMessages:\n3,009\n203\nTrophy Points:\n63\nOccupation:\nSenior Support Engineer\nLocation:\nEngland\nNo, I'm still not following you. Let me use a couple of 1D examples, perhaps you can show me by modification what I'm not understanding:\n\nLet's say\nM1={M1a M1b}\nM2={M2a M2b M2c}\nand the matrix we want K to represent is {0 0 0 0 M1a M1b 0 0 0 0 M2a M2b M2c 0}\n\nOption 1:\nLet (2,4) represent \"2 elements starting at position 4\"\nStore K as {M1=(2,4), M2=(3,10)}, total size 14.\nAlso store M1 and M2.\nSo to calculate K[n]:\nif n in (2,4) return M1[n-4]\nelse if n in (3,10) return M2[n-10]\nelse return 0\n\"n in (2,4)\" would be coded for example as (n>=4 && n<6)\n\nOption 2:\nNow let (4) represent \"1 element starting at position 4\"\nThen K={M1a=(4), M1b=(5), M2a=(10), M2b=(11), M2c=(12)}\nSo to calculate K[n]:\nif n==4 return M1a\nelse if n==5 return M1b\netc.\n\nSo this lot is done immediately before you want to solve Ku=f and after you've computed the values for M. Perhaps you could post some (simplified) code; as I've said before, English descriptions of code can sometimes be a lot harder to understand than the code itself.\n\n8. ### aortizbNew Member\n\nJoined:\nSep 12, 2008\nMessages:\n32\n0\nTrophy Points:\n0\n\nFirst you initialize K to zero.\n\nOption 1:\nM = [ m11 m12 m13\nm21 m22 m23\nm31 m32 m33]\n\nThen assembly M into K\n\nK = [ m11 0.0 0.0 0.0 m12 0.0 m13\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\nm21 0.0 0.0 0.0 m22 0.0 m23\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\nm31 0.0 0.0 0.0 m32 0.0 m33]\n\nNow, I don't need M anymore, so I can deallocated and reallocate for a new M that is going to be assembled into K. If K is already ocuppied by a number, then the new number it is added to the previous one. The assembly process it is done several times until you get K which is used to solve Ku = f.\n\nOption 2:\nSuppose M in this stage is 3x3 as in the example for option 1, but you don't need to allocate memory for M, just you have a double variable in which you are going to compute each of the elements that M would be. Then you need to pass 9 doubles to K element by element:\n\nCompute m11 in a double variable and assembly it into K:\n\nK = [ m11 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0]\n\nCompute m12 in a double variable and assembly into K:\n\nK = [ m11 0.0 0.0 0.0 m12 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0 0.0 0.0]\n\nThis is done until all elements of M are assembled. Again you need to do this several times until you get K which is used to solve Ku = f.\n\nThe difference between both approaches is:\n\nIn option 1 you compute first a matrix M which is not fixed in size (i.e., in one stage it can be 3 by 3 and in the next stage it can be 50 by 50, and so on) and assembly into K using a loop structure over M.\n\nWhile in option 2, you compute the values of M one value at a time directly into matrix K.\n\nIn both cases you are going to assembly the same quantity of values, but in option 1 you assembly several values in a loop and in option 2 you assembly one value at a time.\n\nHope now it is more clear.\n\n9. ### xpi0t0sMentor\n\nJoined:\nAug 6, 2004\nMessages:\n3,009\n203\nTrophy Points:\n63\nOccupation:\nSenior Support Engineer\nLocation:\nEngland\nOh I see. In that case I think option 2 is the clear winner. Option 1 becomes\n\nfor each new M\nallocate memory for M\nfor n*n entries in M\ncalculate entry\nplace in M\nend for\nfor n*n entries in M\ncalculate location in K\nend for\ndeallocate memory\nend for\n\nand option 2 becomes\nfor each new M\nfor n*n entries in M\ncalculate entry\ncalculate location in K\nend for\nend for\n\nSo if anything option 1 uses more memory and is slower, because it loops over the same number of values twice, stores the data in the additional location M, as well as the additional overhead of the memory allocate and deallocate for each new M. So I'd probably prefer option 2 unless you specifically need M for anything.\n\nIf option 1 is preferable for code read-/maintainability then the extra for and reading the data out of M won't make a lot of difference on a modern processor but you should drop the deallocate/allocate part and use the same memory for all M's, reallocating only to increase the scratch space. So for 3x3 you allocate 9, then if the next is 50x50 you have to resize this to 2500, but then if the next is 20x20 just reuse 400 of the 2500 size array. This will also help avoid memory fragmentation which can become a problem if you have vast amounts of allocate/deallocate.\n\nJoined:\nSep 12, 2008\nMessages:\n32"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9800559,"math_prob":0.92306304,"size":706,"snap":"2020-34-2020-40","text_gpt3_token_len":152,"char_repetition_ratio":0.16381766,"word_repetition_ratio":0.0,"special_character_ratio":0.21529745,"punctuation_ratio":0.12987013,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97794116,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-22T00:55:40Z\",\"WARC-Record-ID\":\"<urn:uuid:95f4a97f-9e40-4aac-84df-f331f3df99f6>\",\"Content-Length\":\"75388\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b7365fa8-4519-4e98-80bf-5bc4f9b6e27f>\",\"WARC-Concurrent-To\":\"<urn:uuid:9b13a2bf-1b12-4f19-b383-8e402e681327>\",\"WARC-IP-Address\":\"173.230.137.46\",\"WARC-Target-URI\":\"https://www.go4expert.com/forums/efficient-arrays-variable-size-t13758/\",\"WARC-Payload-Digest\":\"sha1:VJFOEIYEALYPLSY35YSIJMK3H4A4Z54C\",\"WARC-Block-Digest\":\"sha1:GAGDBGX2DGB6QBO4GCZL5JQUYVLO6B56\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400202686.56_warc_CC-MAIN-20200922000730-20200922030730-00057.warc.gz\"}"} |
https://wiki.lazarus.freepascal.org/index.php?title=Programming_Assignment/zh_CN&diff=prev&oldid=74326 | [
"# Difference between revisions of \"Programming Assignment/zh CN\"\n\n1H - 编程作业 (原作者: Tao Yue, 状态: 未更改)\n\n`writeln (参数列表);`\n\n`writeln ('Sum = ', sum);`\n\n```Number of integers = 5\nNumber1 = 45\nNumber2 = 7\nNumber3 = 68\nNumber4 = 2\nNumber5 = 34\nSum = 156\nAverage = 3.1200000000E+01\n\n```\n\n 上一页 目录 下一页"
]
| [
null
]
| {"ft_lang_label":"__label__zh","ft_lang_prob":0.57261777,"math_prob":0.99937207,"size":1225,"snap":"2021-31-2021-39","text_gpt3_token_len":647,"char_repetition_ratio":0.074529074,"word_repetition_ratio":0.05755396,"special_character_ratio":0.3412245,"punctuation_ratio":0.098265894,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99955505,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-22T16:44:38Z\",\"WARC-Record-ID\":\"<urn:uuid:319b1438-a5a3-4372-9af5-458712b67dbf>\",\"Content-Length\":\"22654\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6c8acc2c-51c4-45df-960d-0c405e329391>\",\"WARC-Concurrent-To\":\"<urn:uuid:af10a3a7-b437-40c9-9006-f3246fe9f14f>\",\"WARC-IP-Address\":\"159.69.249.166\",\"WARC-Target-URI\":\"https://wiki.lazarus.freepascal.org/index.php?title=Programming_Assignment/zh_CN&diff=prev&oldid=74326\",\"WARC-Payload-Digest\":\"sha1:N2XC5ISOKF54NJV6J6P6Z3PZMUH7KIVW\",\"WARC-Block-Digest\":\"sha1:2IXQI6X4UFMPVDAWAIUH6RHB5PACA26F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057371.69_warc_CC-MAIN-20210922163121-20210922193121-00079.warc.gz\"}"} |
https://encyclopedia2.thefreedictionary.com/penetration+probability | [
"penetration probability\n\npenetration probability\n\n[‚pen·ə′trā·shən ‚präb·ə‚bil·əd·ē]\n(quantum mechanics)\nThe probability that a particle will pass through a potential barrier, that is, through a finite region in which the particle's potential energy is greater than its total energy. Also known as transmission coefficient.\nReferences in periodicals archive ?\n(2) For given affordable BMs penetration probability (or expected kill probability), cooperation between different missile defense weapons may reduce the expected resources consumption and provide an efficient way of using interceptors.\nWang, \"Calculation of penetration probability of a target for a multi-line defense system,\" Systems Engineering and Electronics, vol.\nIn FSCBG the penetration probability is defined as the probability that a droplet traveling along its trajectory will penetrate a typical single-tree envelope.\n\nSite: Follow: Share:\nOpen / Close"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8723928,"math_prob":0.9245587,"size":321,"snap":"2019-43-2019-47","text_gpt3_token_len":79,"char_repetition_ratio":0.12618296,"word_repetition_ratio":0.0,"special_character_ratio":0.18380062,"punctuation_ratio":0.0754717,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9697041,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-19T09:22:14Z\",\"WARC-Record-ID\":\"<urn:uuid:fda2a06a-1249-4a0f-9b66-893c7bf217a9>\",\"Content-Length\":\"41800\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c2f627df-50e4-4134-9f33-9da30852be89>\",\"WARC-Concurrent-To\":\"<urn:uuid:72954836-325e-4a19-ac07-1b8fa374295c>\",\"WARC-IP-Address\":\"91.204.210.230\",\"WARC-Target-URI\":\"https://encyclopedia2.thefreedictionary.com/penetration+probability\",\"WARC-Payload-Digest\":\"sha1:K3L5IIH2O3VYFRLEVGLX7KH5GOV7IU7P\",\"WARC-Block-Digest\":\"sha1:MH64BQOCCGMYT6F3KZF36TAJGETWBQCO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986692723.54_warc_CC-MAIN-20191019090937-20191019114437-00336.warc.gz\"}"} |
http://www.oswaltlaw.com/ebooks/article-easy-to-implement-bayesian-methods-for-dose-escalation-studies-in | [
"",
null,
"By Whitehead J., Zhou Y., Patterson S.\n\nSimilar probability books\n\nBrownian motion, obstacles, and random media\n\nOffers an account of the non-specialist of the circle of principles, effects & recommendations, which grew out within the examine of Brownian movement & random stumbling blocks. DLC: Brownian movement techniques.\n\nEcole d'Ete de Probabilites de Saint-Flour XV-XVII, 1985. 87\n\nThis quantity includes special, worked-out notes of six major classes given on the Saint-Flour summer time colleges from 1985 to 1987.\n\nChance & choice: memorabilia\n\nThis publication starts with a old essay entitled \"Will the solar upward thrust back? \" and ends with a basic deal with entitled \"Mathematics and Applications\". The articles conceal an attractive variety of themes: combinatoric percentages, classical restrict theorems, Markov chains and tactics, power conception, Brownian movement, Schrödinger–Feynman difficulties, and so forth.\n\nContinuous-Time Markov Chains and Applications: A Two-Time-Scale Approach\n\nThis ebook supplies a scientific therapy of singularly perturbed platforms that evidently come up up to the mark and optimization, queueing networks, production structures, and monetary engineering. It provides effects on asymptotic expansions of recommendations of Komogorov ahead and backward equations, homes of practical profession measures, exponential higher bounds, and useful restrict effects for Markov chains with susceptible and robust interactions.\n\nExtra resources for [Article] Easy-to-implement Bayesian methods for dose-escalation studies in healthy volunteers\n\nExample text\n\nIs a sequence of strictly positive numbers. We shall denote by C(M) the set of all indefinitely 23 Weierstrass-Stone theorem and generalisations - a brief survey differentiable complex-valued functions f, each defined on some open interval I C R (I depending on f), and satisfying the following estimates for its successive derivatives: for every compact subset K c I, 3C > 0, and 3c >0 3 Vx E I< and m = 0,1,2,. .. t C(M) is a quasi-analytic class if the following is true: i f f E C(M) and 3a E I such that f ( \" ) ( a ) = 0 V m = O , l , 2 ,...\n\nSuppose Cb(E) C CV,(E) and that A is a subalgebra of Cb(E) which is separating on E , contains the constant function 1 and is self-adjoint in the complex case. Then A is dense in CVm(E). 3. Let y 2 0 upper-semicontinuous on R be 3 3C y(t) Then y E Proof. 5 > 0,3c > 0 satisfying: Ce'l*l V t E R. rl. ) is rapidly decreasing at infinity, since trne-'ltl any rn E R. Let t , x , y E R, z = z + i y E C, and define e , --f 0 aa t --f 00, for E C(R;C) by e L ( t ) = eiZt for Chapter I 20 t E R. We then note provided (yI < c.\n\nIn general, having constructed the cubes of K,-1, we divide each cube which is now present but not in UfZ;Ki into 2\" cubes of side from A are at least &; let K , be the set of all these cubes whose distances \\$ (if any). The following facts concerning this subdivision of E - A will be needed. 2. Proof. < -(s 2 1). For it lies in a cube C' of the previous subdivision not belonging to K,-l and whose distance from A is therefore < = -. 3. cubes of K,+1. Proof. 1ZJ;; This is true, because the distance d(C,A ) 2 p , the distance from any point of C' to A < g, and the diameter of any cube of IC,+l is &,which means that any 47 Strong approximation in finitedimensional spaces cube C’ of K,+2 is separated from any cube of K , by definitely more than 3 cubes of K,+l; this number of intervening cubes of I<,+, has to be a whole number of cubes and hence at least four."
]
| [
null,
"https://pics.kisslibrary.com/pics/217011/cover.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.85559136,"math_prob":0.96154916,"size":3918,"snap":"2020-34-2020-40","text_gpt3_token_len":995,"char_repetition_ratio":0.081502296,"word_repetition_ratio":0.017595308,"special_character_ratio":0.2460439,"punctuation_ratio":0.13780025,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9898734,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-20T21:02:08Z\",\"WARC-Record-ID\":\"<urn:uuid:10f8dfc7-fd43-4fa3-9055-ef9bdf23e9ba>\",\"Content-Length\":\"28619\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c969b9d0-70e5-4172-b3e8-e65666054721>\",\"WARC-Concurrent-To\":\"<urn:uuid:3426bf25-8ecb-4ba7-84bc-bcccc93b7961>\",\"WARC-IP-Address\":\"192.186.215.38\",\"WARC-Target-URI\":\"http://www.oswaltlaw.com/ebooks/article-easy-to-implement-bayesian-methods-for-dose-escalation-studies-in\",\"WARC-Payload-Digest\":\"sha1:E2RBZ4LF6LIIOP6EO3GHLNPMVN5ZHGBJ\",\"WARC-Block-Digest\":\"sha1:2IOXF3LBSXIIG24EZIE57O7QTXRAU7YD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400198652.6_warc_CC-MAIN-20200920192131-20200920222131-00791.warc.gz\"}"} |
https://ncsu-geoforall-lab.github.io/grass-intro-workshop/vector.html | [
"# Vectors\n\n## Importing a Shapefile\n\nImport the file using v.in.ogr module. Note that you need to specify the full path to the file.\n\n``````v.in.ogr input=/path/to/points_of_interest.shp output=points_of_interest\n``````\n\n## Generating a hexagonal grid\n\nTo compute point density in a hexagonal grid for the vector map points_of_interest use the vector map itself to set extent of the computational region. The resolution is based on the desired size of hexagons. ```g.region vector=points_of_interest res=2000 -pa ``` Although computation region is usually not used in vector processing, the hexagonal grid is created as a vector map based on the previously selected extent and size of the grid. ```v.mkgrid map=hexagons -h ```\n\n## Computing statistics of points in polygons\n\nThe following counts the number of points per hexagon using the v.vect.stats module. ```v.vect.stats points=points_of_interest areas=hexagons count_column=count ``` The last command sets the vector map color table to viridis based on the count column. Use color table ryb if you have GRASS GIS 7.0. ```v.colors map=hexagons use=attr column=count color=viridis ```",
null,
"Colored hexagons and modules used to create them"
]
| [
null,
"https://ncsu-geoforall-lab.github.io/grass-intro-workshop/img/gui_search_hexagons.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7080192,"math_prob":0.6186256,"size":1139,"snap":"2023-14-2023-23","text_gpt3_token_len":262,"char_repetition_ratio":0.1585903,"word_repetition_ratio":0.0,"special_character_ratio":0.19139597,"punctuation_ratio":0.11374407,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98525786,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-04-01T21:14:11Z\",\"WARC-Record-ID\":\"<urn:uuid:59eb0b4d-d65e-4868-8f47-1e69c99c2b5b>\",\"Content-Length\":\"3912\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9f1fe299-2e79-4525-a6f8-458ef6577a04>\",\"WARC-Concurrent-To\":\"<urn:uuid:49d2370e-113e-4b1e-837d-122f90157c36>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://ncsu-geoforall-lab.github.io/grass-intro-workshop/vector.html\",\"WARC-Payload-Digest\":\"sha1:EK3EUJSGC3HEQO7HGCGVHVMYNVIT6RPG\",\"WARC-Block-Digest\":\"sha1:ZLMWRTFJWD2RVYSV3R4OPWF6GQYCZNQV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296950247.65_warc_CC-MAIN-20230401191131-20230401221131-00751.warc.gz\"}"} |
https://se.mathworks.com/matlabcentral/answers/401105-matrix-multiplication-of-3d-arrays | [
"# Matrix multiplication of 3d arrays\n\n70 views (last 30 days)\nRiaz Patel on 16 May 2018\nAnswered: michio on 12 Oct 2020\nHi\nI have a 3d array of dimension 2*5000*150 and another array of dimension 5000*1*150. I would like to take each 2*5000 matrix in the first 3d array and multiply it with the corresponding 5000*1 matrix in the second 3d array.\nI need to do this in as efficient a way as possible and without any additional functions that are not preinstalled on a standard matlab installation.\n\nmichio on 12 Oct 2020\n\nAmeer Hamza on 16 May 2018\nJust use for loop\nresult = zeros(2,1,150);\nfor i=1:150\nresult(:,:,i) = matrix1(:,:,i)*matrix2(:,:,i);\nend\n##### 2 CommentsShow 1 older commentHide 1 older comment\nAmeer Hamza on 16 May 2018\nThe MATLAB syntax does not allow such mixing of element-wise and matrix multiplication between two matrices in a single command. Any other manipulation you will try to do will just add extra time or memory overhead. For example, you can make you code compact to just one line\nresult = cell2mat(cellfun(@(x,y) x*y, num2cell(x,[1 2]), num2cell(y,[1 2]), 'UniformOutput', false));\nbut this is very slower than for loop. MATLAB matrix operations are already very optimized so even creating a mex file is unlikely to help. for loop will be the fastest you can get in this case.\n\nJames Tursa on 16 May 2018\nEdited: James Tursa on 16 May 2018\nSome options from the FEX:\nMULTIPROD:\nMTIMESX: (C-mex code requiring C compiler) needs updated build routine for later MATLAB versions\nMMX: (C-mex code requiring C compiler)\nAnd raw times code:\nresult = sum(bsxfun(@times,matrix1,reshape(matrix2,1,5000,150)),2);\nor\nresult = sum(matrix1.*reshape(matrix2,1,5000,150),2); % later versions of MATLAB"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7971672,"math_prob":0.9068594,"size":2138,"snap":"2023-40-2023-50","text_gpt3_token_len":560,"char_repetition_ratio":0.097000934,"word_repetition_ratio":0.021201413,"special_character_ratio":0.26192704,"punctuation_ratio":0.14918415,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98029906,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-21T07:58:24Z\",\"WARC-Record-ID\":\"<urn:uuid:9b09d7a4-dc9d-47f7-b2f6-437a6abb11ca>\",\"Content-Length\":\"141232\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:524bb4bc-1278-4efd-9acc-45154ed2d293>\",\"WARC-Concurrent-To\":\"<urn:uuid:d8edaa97-ec1a-4f79-8c68-96936ad65a56>\",\"WARC-IP-Address\":\"104.86.80.92\",\"WARC-Target-URI\":\"https://se.mathworks.com/matlabcentral/answers/401105-matrix-multiplication-of-3d-arrays\",\"WARC-Payload-Digest\":\"sha1:2GXDDGZ2O5DFHJTCAOFJEOYQ4NJBIZFY\",\"WARC-Block-Digest\":\"sha1:RJMY6QJ6GG4NBJPE63LM6GT4W5SVAULU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233505362.29_warc_CC-MAIN-20230921073711-20230921103711-00244.warc.gz\"}"} |
https://metanumbers.com/586329 | [
"## 586329\n\n586,329 (five hundred eighty-six thousand three hundred twenty-nine) is an odd six-digits composite number following 586328 and preceding 586330. In scientific notation, it is written as 5.86329 × 105. The sum of its digits is 33. It has a total of 2 prime factors and 4 positive divisors. There are 390,884 positive integers (up to 586329) that are relatively prime to 586329.\n\n## Basic properties\n\n• Is Prime? No\n• Number parity Odd\n• Number length 6\n• Sum of Digits 33\n• Digital Root 6\n\n## Name\n\nShort name 586 thousand 329 five hundred eighty-six thousand three hundred twenty-nine\n\n## Notation\n\nScientific notation 5.86329 × 105 586.329 × 103\n\n## Prime Factorization of 586329\n\nPrime Factorization 3 × 195443\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 2 Total number of distinct prime factors Ω(n) 2 Total number of prime factors rad(n) 586329 Product of the distinct prime numbers λ(n) 1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 1 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 586,329 is 3 × 195443. Since it has a total of 2 prime factors, 586,329 is a composite number.\n\n## Divisors of 586329\n\n4 divisors\n\n Even divisors 0 4 2 2\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 4 Total number of the positive divisors of n σ(n) 781776 Sum of all the positive divisors of n s(n) 195447 Sum of the proper positive divisors of n A(n) 195444 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 765.721 Returns the nth root of the product of n divisors H(n) 2.99998 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 586,329 can be divided by 4 positive divisors (out of which 0 are even, and 4 are odd). The sum of these divisors (counting 586,329) is 781,776, the average is 195,444.\n\n## Other Arithmetic Functions (n = 586329)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 390884 Total number of positive integers not greater than n that are coprime to n λ(n) 195442 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 47946 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 390,884 positive integers (less than 586,329) that are coprime with 586,329. And there are approximately 47,946 prime numbers less than or equal to 586,329.\n\n## Divisibility of 586329\n\n m n mod m 2 3 4 5 6 7 8 9 1 0 1 4 3 2 1 6\n\nThe number 586,329 is divisible by 3.\n\n## Classification of 586329\n\n• Arithmetic\n• Semiprime\n• Deficient\n\n### Expressible via specific sums\n\n• Polite\n• Non-hypotenuse\n\n• Square Free\n\n### Other numbers\n\n• LucasCarmichael\n\n## Base conversion (586329)\n\nBase System Value\n2 Binary 10001111001001011001\n3 Ternary 1002210021220\n4 Quaternary 2033021121\n5 Quinary 122230304\n6 Senary 20322253\n8 Octal 2171131\n10 Decimal 586329\n12 Duodecimal 243389\n16 Hexadecimal 8f259\n20 Vigesimal 3d5g9\n36 Base36 ckex\n\n## Basic calculations (n = 586329)\n\n### Multiplication\n\nn×i\n n×2 1172658 1758987 2345316 2931645\n\n### Division\n\nni\n n⁄2 293164 195443 146582 117266\n\n### Exponentiation\n\nni\n n2 343781696241 201569178175289289 118185854670339193530081 69295793983005309003298862649\n\n### Nth Root\n\ni√n\n 2√n 765.721 83.6978 27.6717 14.2439\n\n## 586329 as geometric shapes\n\n### Circle\n\nRadius = n\n Diameter 1.17266e+06 3.68401e+06 1.08002e+12\n\n### Sphere\n\nRadius = n\n Volume 8.44331e+17 4.32009e+12 3.68401e+06\n\n### Square\n\nLength = n\n Perimeter 2.34532e+06 3.43782e+11 829194\n\n### Cube\n\nLength = n\n Surface area 2.06269e+12 2.01569e+17 1.01555e+06\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 1.75899e+06 1.48862e+11 507776\n\n### Triangular Pyramid\n\nLength = n\n Surface area 5.95447e+11 2.37552e+16 478736\n\n## Cryptographic Hash Functions\n\nmd5 9adf4be59a7afacfaa1a48da19a1d34f b13022422faeb2e75e32c3048d1b938f685b18c3 050295e38e14093e878c55df942aa98302dbbb35755b84dbf59378a83cb06f11 1fde2945317988b4208ca39bb737910d07a8bc14c92e9a41ed6805389903d48563bf9e3303af28540b4e956b0b73dcbc60d0110b51ca8a763e0674f70e26f974 ddf870529234692451f8c182dd2d648155e37751"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.6208902,"math_prob":0.9796436,"size":4685,"snap":"2021-21-2021-25","text_gpt3_token_len":1630,"char_repetition_ratio":0.11941893,"word_repetition_ratio":0.030973451,"special_character_ratio":0.4623266,"punctuation_ratio":0.07554417,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9965315,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-19T03:23:48Z\",\"WARC-Record-ID\":\"<urn:uuid:f158aea2-08ff-4328-b6b6-4b9af54f2201>\",\"Content-Length\":\"60058\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b56858ee-00fd-487b-814d-48ba4a9a75d2>\",\"WARC-Concurrent-To\":\"<urn:uuid:39832f58-eec7-4fc5-a2aa-35c1b3fa517e>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/586329\",\"WARC-Payload-Digest\":\"sha1:FVSYZH3C2TOZXYBQKTH6SE6SQTREDERW\",\"WARC-Block-Digest\":\"sha1:533OXVAMZZ4YHLCILTTA2VFGGBS3CSJZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487643380.40_warc_CC-MAIN-20210619020602-20210619050602-00238.warc.gz\"}"} |
http://celsiusfahrenheit.co/_92 | [
"# 🌡-92 (Negative 92) C to F\n\n🔆🌡-92 (Negative 92) C to F. How many degrees Fahrenheit in a degree Celsius. °C to F Calculator.\n\n### Celsius to Fahrenheit\n\n Celsius Fahrenheit You can edit any of the fields below: = Detailed result here",
null,
"Change to Fahrenheit to Celsius\n\n## How to convert from Celsius to Fahrenheit\n\nIt is ease to convert a temperature value from Celsius to Fahrenheit by using the formula below:\n\n [°F] = [°C] × 9⁄5 + 32\nor\n Value in Fahrenheit = Value in Celsius × 9⁄5 + 32\n\nTo change -92° Celsius to Fahrenheit, just need to replace the value [°C] in the formula below and then do the math.\n\n### Step-by-step Solution:\n\n1. Write down the formula: [°F] = [°C] × 9⁄5 + 32\n2. Plug the value in the formula: -92 × 9⁄5 + 32\n3. Multiply by 9: -828⁄5 + 32\n4. Divide by 5: -165.6 + 32\n\n### Values around -92 Celsius(s)\n\nCelsiusFahrenheitCelsiusFahrenheit\n-91.9-68.8-91.8-68.8\n-91.7-68.7-91.6-68.7\n-91.5-68.6-91.4-68.6\n-91.3-68.5-91.2-68.4\n-91.1-68.4-91-68.3\n-90.9-68.3-90.8-68.2\n-90.7-68.2-90.6-68.1\n-90.5-68.1-90.4-68.0\n-90.3-67.9-90.2-67.9\n-90.1-67.8-90-67.8"
]
| [
null,
"http://celsiusfahrenheit.co/images/calculator16x20.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.60999084,"math_prob":0.9110249,"size":1045,"snap":"2020-24-2020-29","text_gpt3_token_len":437,"char_repetition_ratio":0.20076849,"word_repetition_ratio":0.011111111,"special_character_ratio":0.5110048,"punctuation_ratio":0.19475655,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9602591,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-04T17:19:34Z\",\"WARC-Record-ID\":\"<urn:uuid:d59be9e2-8986-4df5-b396-39a348ef45b3>\",\"Content-Length\":\"25428\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:64f542bb-2ba4-44f0-8231-db03e9c87abd>\",\"WARC-Concurrent-To\":\"<urn:uuid:e8f666ad-3682-46f1-9c80-f0a9116702bb>\",\"WARC-IP-Address\":\"160.153.51.66\",\"WARC-Target-URI\":\"http://celsiusfahrenheit.co/_92\",\"WARC-Payload-Digest\":\"sha1:JSEEMLH6ULHC3UMLAHCDXWQOQIDPL6K5\",\"WARC-Block-Digest\":\"sha1:JJQ6MDKCKME75VZFADERBCKRMT5TEW4G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347445880.79_warc_CC-MAIN-20200604161214-20200604191214-00280.warc.gz\"}"} |
https://astronomy.stackexchange.com/questions/6370/how-massive-can-a-star-be-at-birth | [
"How massive can a star be at birth? [duplicate]\n\nWe have discovered some incredibly massive stars. R136a1, the most massive known star is estimated to have 265 times mass as our Sun. Yet it has been burning for at least a million years, and must have shed a considerable mass as stellar wind. In its infancy, R136a1 must have been much more massive.\n\nWhich got me thinking about the question: What is the theoretical limit of mass that a newborn star can have?\n\n• @Aaron: The question you linked seems to be rather vague. What do you mean by \"size\" when it comes to a star? Mass? Radius? :) Sep 15 '14 at 22:46\n• @Krumia The accepted answer for that question interprets the question as mass. Sep 15 '14 at 23:52\n• @HDE226868: And according to that answer, maximum limit is 2 $M_{Sun}$? :D (Not saying this is not a dupe, but that question should have another answer). Sep 16 '14 at 2:43\n• \"The article Stars Have a Size Limit by Michael Schirber, it's about 150 Solar Masses. However, there's the Pistol Star, which is speculated to be 200 SM.\" Sep 16 '14 at 6:11\n\nI found a text that suggests a Population III star can have a mass between 200 and 10^5$M_{Sun}$. There you can read:\n\"...This would apply for VMOs larger than $M_c$ $\\approx$ 200 $M_{Sun}$. Stars larger than 150$M_{Sun}$ are termed supermassive objects (SMOs)...\".\nIt seems supermassive stars like R136a1 (with masses in excess 150$M_{Sun}$, the accepted upper limit for a non-pop III star) can be formed by the collision of massive stars.\nSo, It is not difficult to imagine, say, two 150$M_{Sun}$ monsters colliding and forming a 300$M_{Sun}$ object.\n• So \"Stars larger than $10^5M_{Sun}$ are termed supermassive objects (SMOs), and would collapse directly to black holes due to relativistic instabilities even before nuclear burning, at least if they were metal-free.\". You should add that to the answer, I suppose :) Sep 15 '14 at 23:03"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9872332,"math_prob":0.8703452,"size":410,"snap":"2022-05-2022-21","text_gpt3_token_len":90,"char_repetition_ratio":0.13054188,"word_repetition_ratio":0.0,"special_character_ratio":0.22682928,"punctuation_ratio":0.10843374,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9742219,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-22T08:05:41Z\",\"WARC-Record-ID\":\"<urn:uuid:c07c9ca2-8307-44fb-a5ef-ae62644883ac>\",\"Content-Length\":\"121889\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9e20f32-6aed-4909-8c93-49d4c0d855a2>\",\"WARC-Concurrent-To\":\"<urn:uuid:ca8f7e77-1c42-421f-81b2-6cef5bae54ca>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://astronomy.stackexchange.com/questions/6370/how-massive-can-a-star-be-at-birth\",\"WARC-Payload-Digest\":\"sha1:7PDPQGANJVAC2A6ZLSVJA7M7ZHGAERNM\",\"WARC-Block-Digest\":\"sha1:QJJNUNLRJ7GCM4MZ7NAEGI3ZU3IHXK36\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320303779.65_warc_CC-MAIN-20220122073422-20220122103422-00327.warc.gz\"}"} |
https://jeopardylabs.com/print/math-game-2-mix-3 | [
"Games & Books 5\n100\n\nWhat do you complete first? What is the answer to that first step? 46 +90 +61-28 + (57 x 9)\n\n(57 x 9) OR 46+ 90\n\nWhat is \"(57 x9)\"\n\n100\n\nWhat is the first step in Order of Operations?\n\nWhat is \"complete what is inside the Parenthesis\"?\n\n100\n\nThe LCM of (2,3)\n\n6\n\n100\n\nPrime or Composite: 57\n\nWhat is composite\n\n100\n\nWho kills Dumbledore?\n\nSeverus Snape\n\n200\n\nWhat do you complete second? What is the answer to that second step? 46 +90 +61-28 + (57 x 9)\n\nWhat is \"46 + 90\"\n\n200\n\nThe GCF of 10 and 18\n\n2\n\n200\n\nThe LCM of (5,10)\n\n10\n\n200\n\nPrime or Composite:144\n\nWhat is composite\n\n200\n\nWho owns a quick-qwotes-qwill?\n\nRita Seeker!!!\n\n300\n\nWhat is their first order of operation you should do in the following expression:2x3/4+2\n\n300\n\nWhat is the GCF of 84 and 34?\n\nFactors for 84: 1, 2, 3, 4, 6, 7, 12, 14, 28, 47, and 84\n\nFactors for 34: 1, 2, 17,and 34\n\n300\n\nJake was solving the LCM and GCF of 42 and 49 and he solved as shown below.Did he answer the question correctly? Explain.\n\n7 42 49\n\n* 6 * 7 = 294\n\nJake said that the LCM is 7 and that the GCF is 294.\n\nJake is incorrect. He solved the question correctly but he mixed up which one was the LCM and which was the GCF. Jake said that the LCM was 7 when the GCF was actually 7. Furthermore, he said that the GCF was 294 when 294 was actually the LCM.\n\n300\n\nPrime or Composite: 17\n\nWhat is prime\n\n300\n\nwhat is the least rarest skin\n\nthe scare crows\n\n400\n\nWhat is the first step to solving the following problem? (2+5) 3x2\n\n400\n\nJules was tasked with finding the task of combining like terms. Her problem was 5x +7x -6y -2y. She says the answer is 35 - 4. What is the correct answer? Why?\n\nThe correct answer is 12x - 8y. The reason being: 5x + 7x combined are 12x. The new equation would be 12x -6y -2y. Then you would have to combine -6y -2y; getting her -8y. The correct [final] equation should.would be 12x -8y.\n\n400\n\nGCF of 45 and 15\n\n15\n\n400\n\nThe LCM of (3,4)\n\n12\n\n400\n\nwhat is the darkest skin\n\nBLACK NIGHT\n\n500\n\nJenna is doing a math problem.The problem was (2+7*3). Jenna came up with the answer 27. What was the mistake in Jenna made when solving.\n\n500\n\nAccording to PEMDAS if there is multiplication and division in a math problem from which side should you start solving the problem?\n\n500\n\nIf there are both multiplication and addition in a math problem which operation should you do first?\n\n-Raiyan Karim\n\n500\n\nLCM of (10, 11)\n\n110\n\n500\n\nWhat are two sus colors in among\n\nRed and cyan\n\nClick to zoom"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9602477,"math_prob":0.9181679,"size":2289,"snap":"2021-31-2021-39","text_gpt3_token_len":725,"char_repetition_ratio":0.14748359,"word_repetition_ratio":0.03539823,"special_character_ratio":0.32678026,"punctuation_ratio":0.12287334,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98589784,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-30T01:29:28Z\",\"WARC-Record-ID\":\"<urn:uuid:15232c13-7faa-472b-8648-3c52036d4b92>\",\"Content-Length\":\"25901\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bde3477f-0a83-4736-ad4d-1f68d2b3467c>\",\"WARC-Concurrent-To\":\"<urn:uuid:7df8d0a0-4915-41ca-9b08-fe2edb321df6>\",\"WARC-IP-Address\":\"198.100.157.237\",\"WARC-Target-URI\":\"https://jeopardylabs.com/print/math-game-2-mix-3\",\"WARC-Payload-Digest\":\"sha1:WGUMUUCUGLATZL7RWKHZTF6R4XJDAIVP\",\"WARC-Block-Digest\":\"sha1:6SX5SIRFAKDAAZZBHBMYAR5HSLBQEM5T\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153899.14_warc_CC-MAIN-20210729234313-20210730024313-00667.warc.gz\"}"} |
https://cboard.cprogramming.com/c-programming/1924-while-loop.html?s=8cdf58d76ed6567fa2e03dddca1cd57b | [
"1. ## While Loop\n\n#include <stdio.h>\n\nint main()\n\n{\n\nchar A, B, C, D, E;\nchar AllCredit, CreditAttempt;\nfloat GPA, GpaCalc;\n\nchar Grades = 'A', 'B', 'C', 'D', 'E';\nint Points = '4','3','2','1','0';\n\nA = 4;\nB = 3;\nC = 2;\nD = 1;\nE = 0;\n\nAllCredit = GPA / CreditAttempt;\n\nwhile (Grades = getchar() != \"\\n\")\n{\n}\n}\nreturn 0;\n\n}\n\nHere is my code. I want to find out if I there is a way I could use a loop to get ABCDE and 01234 in the loop so that it prints out\nsomething like A4C2B3B3. I know I have a problem with Grades and Points up there, I am right now trying to find out how I could use make it so that when the letter A is pressed I get a 4 to come up and or manually enter numbers so that the program can recognize the all the numbers and print out GPA is 3.24 or 4.00.\n\nThank You Very much in advance.",
null,
"2. Ok, a few bits to get you started\n\nThis should allow you to type 'A' and get '4' printed - and extending the idea is pretty easy...\n\nCode:\n```int main ( ) {\nwhile ( (grades=getchar()) != '\\n' ) { // note the extra ()\nif ( grades == 'A' ) putchar( '4' );\n}\n}```\n> char Grades = 'A', 'B', 'C', 'D', 'E';\n> int Points = '4','3','2','1','0';\nIf you need to do something like this, you should be looking at arrays. For instance, what you have written will only assign 'A' to Grades, the rest of the letters are thrown away.",
null,
"3. ##",
null,
"I think you need to study a lot more....\n\nTo do what you want to do is nothing but forces you to study a lot about Arrays, characters, Set of characters (String), declaration of variables, differences between integer and character.....",
null,
"Popular pages Recent additions",
null,
""
]
| [
null,
"https://cboard.cprogramming.com/images/misc/progress.gif",
null,
"https://cboard.cprogramming.com/images/misc/progress.gif",
null,
"https://cboard.cprogramming.com/images/icons/icon8.png",
null,
"https://cboard.cprogramming.com/images/misc/progress.gif",
null,
"https://www.feedburner.com/fb/images/pub/feed-icon16x16.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8870536,"math_prob":0.77818555,"size":522,"snap":"2020-34-2020-40","text_gpt3_token_len":153,"char_repetition_ratio":0.1042471,"word_repetition_ratio":0.0,"special_character_ratio":0.37739465,"punctuation_ratio":0.2,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9624562,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-09T15:32:55Z\",\"WARC-Record-ID\":\"<urn:uuid:0210c93c-3011-44bd-9471-58e9966f4393>\",\"Content-Length\":\"49547\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7202a32f-6ec8-4950-887d-013a72f3f5a5>\",\"WARC-Concurrent-To\":\"<urn:uuid:a07c3d7f-f57b-4be3-b37c-114c9e6b3aae>\",\"WARC-IP-Address\":\"198.46.93.160\",\"WARC-Target-URI\":\"https://cboard.cprogramming.com/c-programming/1924-while-loop.html?s=8cdf58d76ed6567fa2e03dddca1cd57b\",\"WARC-Payload-Digest\":\"sha1:NXSOVCU3ZMU7LJJMYK2DSHIRZWA54RIZ\",\"WARC-Block-Digest\":\"sha1:74LLQ2WJ67EJJRADLX7PGLCJVDLWCR3X\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738555.33_warc_CC-MAIN-20200809132747-20200809162747-00005.warc.gz\"}"} |
http://dwise1.net/trivia/binary_mult.html | [
"# DWise1: Old German Multiplication Method\n\n \"Do the math!\" - Sega 16-bit video game-set commercial, c. mid-1980's\n\n### Abstract\n\nRecently (September 2019) on YouTube I stumbled upon an odd offering: Altes Multiplizieren - vergessenes Wissen! Das hast du noch nie gesehen! (\"Old Multiplication -- Forgotten Knowledge. You have never seen that before!\"). The video series is \"Lernen mit Lehrer Schmidt\" (\"Learning with Teacher Schmidt\") and consists mainly of math videos by a math teacher in Germany, though at his web site he also covers topics such as physics, German (grammar and literature), education, and handicrafts. They are of course in German without subtitles.\n\nI work through it below, but basically the method is to iteratively double one number and halve the other (always rounding down, AKA truncating), then adding together all the numbers in the doubled column for which the corresponding halved numbers are odd. At first it looks very strange and I was about to try to figure it out with an algebraic proof when I saw a comment describe it as a binary operation. With that I immediately recognized it as the standard binary multiplication method I had learned decades ago either in USAF tech school or for my computer science degree; I hadn't recognized it because he uses decimal numbers instead of binary ones. Now what he's doing makes perfect sense.\n\nThis method is certainly old. Most of the comments either said that they had never seen this before or else their grandparents had shown it to them (these were mainly middle-aged or seniors themselves, so their grandparents had to have learned it in the late 1800's). What I'm still not sure of is whether this was indeed how everybody used to be taught in German schools and if this method was also used in other countries. We do know that binary mathematics go back to ancient India and Egypt, so it would make sense that a mathematician would have devised this method long ago. I have found this method described in Wikipedia as Russian Peasant Multiplication, the advantage being that you do not need to memorize multiplication tables but rather you only need to know how to multiply and divide by 2, how to add, and how to tell whether a number is odd or even.\n\nSince for some odd reason not everybody understands German, I'm writing this page to present Lehrer Schmidt's method in English. Then I describe binary multiplication to show how and why this works.\n\n### 2020 Feb 05\n\nThe Numberphile channel on YouTube just uploaded a video, Russian Multiplication featuring Johnny Ball, a British television personality and mathematics popularizer. This video will provide you an explanation and demonstration in English.\n\nHis addition to the narrative ties the procedure to the \"Russian\" part of the name. When he was shown the procedure as a boy, the adult made joking references to Stalin's infamous purges. To explain dropping the fraction when you divide an odd number by 2, he was told that the Russians hated fractions so they'd purge them out. And to explain eliminating the lines with the even number on the left, then the Russians hated even numbers on the left and so the entire line would be purged. Makes for a colorful story to help a child remember the procedure without asking for the real reason why, which I will explain at length below.\n\nJohnny Ball also fills in a bit more of the history of this technique. He pointed out that it's not restricted to Russian peasants, but rather has been used by peasants of all nationalities, especially where sufficient education to learn multiplication was not available. He has traced it back to Elizabethan England and even further back to ancient Egypt. The Egyptian procedure is a bit different, but he goes through it as well.\n\n### 2022 Jan 30\n\nI just saw a History Matters video on YouTube, Why does the west use Arabic Numerals? (Short Animated Documentary), which includes an application of this multiplication method to Roman numerals: XIII × XIII.\n\nI added a new section, The Method Applied to Roman Numerals, to discuss this idea.\n\n### The Method\n\nHere's the basic procedure presented in the video:\n1. Write the numbers side by side with the smaller number on the left. It works just as well with the larger number on the left, but this keeps the number of iterations smaller.\n2. Successively double the number on the right and halve the number on the left until the number on the left is one (1). When you halve an odd number, just drop the fraction (ie, round down, AKA truncate).\n3. Cross out (ie, remove or ignore) all lines where the number on the left is even.\n4. Add all the remaining numbers on the right (ie, all the ones where the number on the left is odd) and you get the answer.\n\nHere are the examples from the video:\n\n• Set up the problems and do the doubling and halving:\n• ``` 5 × 25 4 × 35 3 × 25 5 × 35 7 × 45 6 × 40 7 × 21 12 × 31\n\n5 -- 25 4 -- 35 3 -- 25 5 -- 35 7 -- 45 6 -- 40 7 -- 21 12 -- 31\n2 -- 50 2 -- 70 1 -- 50 2 -- 70 3 -- 90 3 -- 80 3 -- 42 6 -- 62\n1 -- 100 1 -- 140 1 -- 140 1 -- 180 1 -- 160 1 -- 84 3 -- 124\n1 -- 248\n```\nPlease note that the first line contains the numbers in the statement of the problem.\n\n• Eliminate the lines with an even number on the left by crossing out those lines:\n• ``` 5 × 25 4 × 35 3 × 25 5 × 35 7 × 45 6 × 40 7 × 21 12 × 31\n\n5 -- 25 4 -- 35 3 -- 25 5 -- 35 7 -- 45 6 -- 40 7 -- 21 12 -- 31\n2 -- 50 2 -- 70 1 -- 50 2 -- 70 3 -- 90 3 -- 80 3 -- 42 6 -- 62\n1 -- 100 1 -- 140 1 -- 140 1 -- 180 1 -- 160 1 -- 84 3 -- 124\n1 -- 248\n\n```\n\n• Add the remaining numbers on the right, which are the ones with an odd number on the left:\n• ``` 5 × 25 4 × 35 3 × 25 5 × 35 7 × 45 6 × 40 7 × 21 12 × 31\n\n5 -- 25 4 -- 35 3 -- 25 5 -- 35 7 -- 45 6 -- 40 7 -- 21 12 -- 31\n2 -- 50 2 -- 70 1 -- 50 2 -- 70 3 -- 90 3 -- 80 3 -- 42 6 -- 62\n1 -- 100 1 -- 140 1 -- 140 1 -- 180 1 -- 160 1 -- 84 3 -- 124\n1 -- 248\n----- ----- ---- ----- ----- ----- ----- -----\n125 140 75 175 315 240 147 372\n```\n\nAnd so you see that it does work. Now to discover why.\n\nBTW, if your browser does not support the strikethrough tag that I used, then refer to this write-up as you watch the video, in which Lehrer Schmidt writes all this out, one problem at a time (yes, that really is how they write ones and sevens and nines in Germany). There you can see him crossing out the lines with an even number on the left and leaving those lines out of the addition step.\n\n### The Method Applied to Roman Numerals\n\nThere's a video on YouTube, Why does the west use Arabic Numerals? (Short Animated Documentary) by History Matters, which summarizes the history of how Europe switched from Roman numerals to our current system using Arabic numerals (actually of Hindu origin and transmitted to us by the Muslims). One of the themes of that video, besides resistance to the change for political and religious reasons, was how difficult it was to perform calculations with Roman numerals and how the greater ease and efficiency of doing the math with Arabic numerals won over the banking families (eg, the Medici).\n\nTo illustrate that point, the video launches into an example of multiplying two Roman numerals together, XIII × XIII using our \"Old German Multiplication Method\" (AKA \"Russian Peasant Multiplication\"). The video does not actually claim that this method was used to multiply Roman numerals together, but a similiar method was reportedly used in ancient Egypt, so it's a possibility. Also, Google'ing on Roman numeral multiplication yielded links and quick answers which all (at least the ones I checked) point to the Romans having used this method.\n\nIn order to double, halve, and add Roman numerals, it's easier to just convert to Arabic, perform the arithmetic, then convert back. However with a little practice I devised my own methods of doing it in Roman numerals without having to convert. I won't bother you by attempting to explain what I did, but it's very much like what's described on this page, How to Multiply Roman Numerals -- I'm certain that you can find many similar pages on Roman numeral arithmetic through your own searches.\n\nHINT: Before doing the arithmetic, convert subtractive notation to straight counts of four symbols; eg, XL → XXXX, IV → IIII. That way you won't need to try to juggle all that in your head but rather you just double the symbols and then group them together in the final step; eg:\n\ndouble LXXX → LLXXXXXX → CLX\ndouble XL → double XXXX → XXXXXXXX → LXXX\ndouble XIII → XXIIIIII → XXVI\ndouble XXVI → XXXXVVII → XXXXXII → LII\nadd XIII + LII + CIV → XIII + LII + CIIII → XIIILIICIIII → CLXVIIII → CLXIX\nUse grouping symbols if that helps; eg (XXXXX)XXX → LXXX, CLX(IIIII)IIII → CLX(VIIII) → CLXIX.\n\nAlso, keep in mind that a digit's value depends on its position in Arabic numerals, but not in Roman numerals -- except for in subtractive notation (eg, XL, IV) which is why you should remove subtractive notation before doing arithmetic in Roman numerals (eg, XL → XXXX, IV → IIII). Think of a Roman numeral as a pile of money of different denominations: it doesn't matter in what order you stack the bills or coins, the value will still add up to the same amount. Stacking your money in order of descending denomination just makes it easier to count.\n\nSo, redoing a few of the examples above as Roman numerals plus recreating the video's example (XIII × XIII):\n\n• Set up the problems and do the doubling and halving:\n• ``` 4 × 35 5 × 35 6 × 40 12 × 31 13 × 13\nIV × XXXV V × XXXV VI × XL XII × XXXI XIII × XIII\n\nIV -- XXXV V -- XXXV VI -- XL XII -- XXXI XIII -- XIII\nII -- LXX II -- LXX III -- LXXX VI -- LXII VI -- XXVI\nI -- CXL I -- CXL I -- CLX III -- CXXIV III -- LII\nI -- CCXLVIII I -- CIV\n```\nPlease note that the first line contains the numbers in the statement of the problem.\n\n• Eliminate the lines with an even number on the left by crossing out those lines:\n• ``` 4 × 35 5 × 35 6 × 40 12 × 31 13 × 13\nIV × XXXV V × XXXV VI × XL XII × XXXI XIII × XIII\n\nIV -- XXXV V -- XXXV VI -- XL XII -- XXXI XIII -- XIII\nII -- LXX II -- LXX III -- LXXX VI -- LXII VI -- XXVI\nI -- CXL I -- CXL I -- CLX III -- CXXIV III -- LII\nI -- CCXLVIII I -- CIV\n\n```\n\n• Add the remaining numbers on the right, which are the ones with an odd number on the left:\n• ``` 4 × 35 5 × 35 6 × 40 12 × 31 13 × 13\nIV × XXXV V × XXXV VI × XL XII × XXXI XIII × XIII\n\nXIII\nXXXV LXXX CXXIV LII\n+ CXL + CXL + CLX + CCXLVIII + CIV\n----- ----- ------ ---------- -------\nCXL CLXXV CCXL CCCLXXII CLXIX\n140 175 240 372 169\n\n```\n\n### How It Works (Multiplying in Binary)\n\nSo how does it work? I was ready to try to work it out algebraically when I noticed an entry in the comments section that this was binary multiplication. About four decades ago I went through USAF tech school in computer systems repair (AFSC305x4, Electronics Computer Systems Repairman) and then I worked on my computer science degree. In one of those experiences (I forget which, but my memory's leaning towards tech school), we went through how a computer performs integer multiplication. Basically, that operation is a series of shifts and conditional adds, which I will discuss below.\n\nBut first we need some background knowledge so that everyone can understand it.\n\nBasic Number Theory\n\nDon't be afraid. It's just simply how we do position-value numbers (which you just know as \"numbers\") and how that translates to other number bases (maybe the only new concept for you here). This basic number theory was most of the \"New Math\" in the mid-1960's when I had it in junior high summer school. I understood it completely within the first hour of instruction, but then we spent weeks of monotonous busy work in order to drum it into us (Trivia note: in German student slang, a teacher is a \"Pauker\", a drum beater, because he drums the subject matter into your head -- though now apparently when a student studies hard, \"hitting the books\", that's also \"pauken\" (\"beating a drum\")).\n\nWe'll work first in decimal, AKA \"Base 10\" because it uses ten digits which range from 0 to 9. Those digits are placed into positions in the number which define their values. The other number bases work their numbers the same way as decimal, the difference being how many digits they use which will also change the positions' values.\n\nFor example, consider the number 1234, one thousand two hundred thirty four. Going from right to left, the positions are \"the one's place\", \"the ten's place\", \"the hundred's place\", and \"the thousand's place\" (sound familiar?). So to find the value of 1234, we take each digit, multiply it by its position's value, and finally add them all together. Therefore:\n\n1234 = 1 × 1,000 + 2 × 100 + 3 × 10 + 4 × 1 = 1,000 + 200 + 30 + 4\nYeah, it's that simple. And the New Math had us spend half the summer decomposing numbers and then performing basic arithmetic with those decomposed numbers. But it helps us to understand how to work with other number bases.\n\nPlease note that the position values are based on the powers of the number of digits in the number base, which for decimal is 10:\n\n1 = 100; 10 = 101; 100 = 102; 1,000 = 103\nTherefore:\n1234 = 1 × 103 + 2 × 102 + 3 × 101 + 4 × 100 = 1,000 + 200 + 30 + 4\nThat more general form is the key to creating numbers in other number bases. Since our goal here is working in binary, let's examine that.\n\nBinary, Base 2, has two digits, 1 and 0. The position values of a binary number are:\n\n20 = 1\n21 = 2\n22 = 4\n23 = 8\n24 = 16\n25 = 32\n26 = 64\n27 = 128\nSo if we take the binary number 00100111, we find that we have ones in the 32's place, the 4's place, the 2's place, and the 1's place. To convert that number to its decimal equivalent, we add the values of the ones: 32 + 4 + 2 + 1 = 39. I should also mention that with 8 bits (binary digits) you can express 256 (28) values ranging from 0 to 255.\n\nThat's what we end up doing, but what are we actually doing? We are actually placing the digits in their positions and multiplying each digit to its place value. That is exactly what we do in decimal:\n\n001001112 = 0 × 27 + 0 × 26 + 1 × 25 + 0 × 24 + 0 × 23 + 1 × 22 + 1 × 21 + 1 × 20\n= 0 + 0 + 25 + 0 + 0 + 22 + 21 + 20\n= 32 + 4 + 2 + 1\n\n001001112 = 39\n\nThis demonstrates a unique characteristic of working with binary numbers. The values of the digits (AKA \"binary digits\", AKA \"bits\") are one of two values: 1 or 0. So when you multiply a digit to its position value, then you are multiplying by 1 or by zero. One times any number is that number (eg, 1 × 42 = 42) and zero times any number is zero. So to find the value of a binary number you do not need to actually do any multiplying, but rather all you need to do is see which positions contain ones and simply add all such position values together. Not only is it very simple, but that same unique characteristic of working in binary will come into play in binary multiplication.\n\nI'll quickly mention two other bases that programmers have commonly worked with: octal (Base 8) and hexadecimal (Base 16). The reason why they are so common is because you can easily convert back and forth between them and binary. With three bits you can represent 8 digits (0 to 7), which by definition is octal, and with 4 bits you can represent 16 digits (0 to F), which by definition is hexadecimal. To convert from binary to octal or hexadecimal you group the bits by 3 or by 4, respectively, and simply read them. Every experienced programmer has the binary code for those digits memorized from repeated use, since we almost always use either octal or hex to work with binary values (hexadecimal, AKA \"hex\", is most commonly used at present). These two number bases are of no use in this discussion, but if you're interested in learning more about them then follow those links to their Wikipedia articles.\n\nLong Multiplication\n\nSince understanding binary multiplication by doing it by hand is derived from decimal long multiplication, we'll review decimal first.\n\nLet's start with an example problem: 4,096 × 1,024 = 4,194,304 (yes, that is 212 × 210 = 222; I am a programmer after all, so nice round numbers like these powers of two come immediately to mind). We will need standard mathematical terminology for multiplication:\n\n• Multiplicand -- the number being multiplied, normally placed on the first line. In this example that's the 4,096.\n• Multiplier -- the number you are multiplying by, normally placed on the second line. In this example that's the 1,024.\n• Product -- the result of the multiplication operation, normally placed on the final line. In this example that's the 4,194,304.\n\nI will use the standard form that I learned in elementary school in the late 1950's in the USA. I'm qualifying this just in case they've changed how they teach it 1, or in case you're from a country where it's taught differently. So to examine that standard form, let's revert to the New Math approach of the mid-60's in order to see exactly what's happening. So then rather pedantically:\n\n• Decompose the multiplier and write the problem thus (switching to powers of ten for illustrative purposes):\n• product = 4,096 × (1,000 × 1 + 100 × 0 + 10 × 2 + 1 × 4) = 4,096 × (103 × 1 + 102 × 0 + 101 × 2 + 100 × 4)\n\n• Applying the commutative property to the decomposed multiplier, we reorder its terms to the order we will use in long multiplication:\n• product = 4,096 × (100 × 4 + 101 × 2 + 102 × 0 + 103 × 1)\n\n• Now apply the distributive property:\n• product = 4,096 × (100 × 4 + 101 × 2 + 102 × 0 + 103 × 1)\n= (4,096 × 100 × 4) + (4,096 × 101 × 2) + (4,096 × 102 × 0) + (4,096 × 103 × 1)\n\n• Of course, the terms being multiplied by zero will be zero and hence can just be dropped out:\n• product = (4,096 × 100 × 4) + (4,096 × 101 × 2) + (4,096 × 103 × 1)\n\n• Next, in each term we multiply the multiplicand by the indicated powers of ten, which is accomplished by shifting the multiplicand left one place per zero:\n• product = (4,096 × 4) + (40,960 × 2) + (4,096,000 × 1)\n\nHINT: to multiply by a power of ten, you shift the multiplicand left that number of times; eg, to multiply by 100 (102) you shift left by two places (AKA adding two zeros on the right end).\n\n• Now in each term we multiply the multiplicand by the multiplier's digits:\n• product = (4,096 × 4) + (40,960 × 2) + (4,096,000 × 1)\nproduct = 16,384 + 81,920 + 4,096,000\n\n• And finally we add the terms together to get the product:\n• product = 4,194,304\n\nThat is what we are doing in long multiplication albeit described in a pedantic New-Math approach. We will use this understanding to approach long multiplication in binary.\n\nBut in the meantime, let's now apply our understanding to the standard format we're all familiar with (at least the one taught when I went through the program). As we do this, use the treatment above to understand what's behind our actions in the standard format:\n\n• Write the problem, leaving out those pesky commas:\n• ``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n\n```\n\n• Multiply the multiplier's 1's digit (4) to the multiplicand with zero shift (ie, × 100):\n• ``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n16384\n\n```\n\n• Multiply the multiplier's 10's digit (2) to the multiplicand with a left shift of 1 (ie, × 101). Note that I am including the right-most zero in order to show that explicit multiplication by a power of ten, whereas we were taught to just shift it left and leave that space blank:\n• ``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n16384\n81920\n\n```\n\n• Multiply the multiplier's 100's digit (0) to the multiplicand with a left shift of 2 (ie, × 102). Since we're multiplying by zero, we do not write anything down. However, another left shift has occurred, which we will see in the next step.\n• ``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n16384\n81920\n\n```\nOf course, we're taught to just skip that step when the multiplier's digit is zero, but in reality we are actually multiplying the multiplicand by zero, which is zero, and add that to the intermediate results, which does not change them. So we're effectively skipping that step, but we need to keep in mind what's actually happening, the reason why we're effectively skipping that step.\n\n• Multiply the multiplier's 1,000's digit (1) to the multiplicand with a left shift of 3 (ie, × 103):\n• ``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n16384\n81920\n4096000\n\n```\n\n• Add the terms to get the product:\n• ``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n16384\n81920\n4096000\n---------\n4194304 Product\n```\n\nAnd just so that you can see it in a more familiar form, here is the final result with zeros replaced by blanks:\n\n``` 4096 Multiplicand\n× 1024 Multiplier\n---------\n16384\n8192\n4096\n---------\n4194304 Product\n```\n\nNow as we move on to long multiplication in binary, we will see that it works in the exact same way. However, there are a couple things that makes it much easier and which are reflected in this \"Old Multiplication\" method.\n\nFootnote 1:\nIn 1964 Tom Lehrer wrote his satirical song, New Math, for the US version of the TV weekly news satire, That Was The Week That Was (TW3). The song was released on Tom Lehrer's album, That Was The Year That Was, along with his other songs for TW3 and his performance of the song in concert is on YouTube.\n\nThe premise of the song is that the changes in the New Math means that parents can no longer help their children with their homework, so he offers a quick lesson to bring the parents up to speed with a simple subtraction problem. After doing it in decimal (Base 10), he notices that the book asks that we do it in Base 8 (octal -- \"Don't worry. Base 8 is just like Base 10 if you're missing two fingers.\").\n\nWhile working with that problem, he reveals an earlier case of a change in how borrowing in subtraction was done. I was taught to \"borrow 1\" (actually 10 because of position values) from the top digit immediately to the left. But (in 1964) if you're over 35 or went to a private school, you would add 1 to the bottom digit immediately to the left. My mother told me that that was how she was taught to do it. I have a 1914 arithmetic primer for grades 1 through 6 which uses that same technique my mother had been taught.\n\nAnother example was when my older sister was learning algebra, so our father would help her with her homework. Then one day she brought home a note from her teacher asking our father to stop helping her because he was using different methods from what they were teaching.\n\nBinary Multiplication\n\nLong multiplication in binary works like long multiplication in decimal, except for two things:\n\n1. Since the place values are in powers of two, when you shift a binary number to the left, then you are multiplying it by 2. And when you shift to the right, you are dividing by 2. This fact ties in directly to the \"Old Multiplication\" method where we repeatedly double the multiplicand and halve the multiplier.\n\n2. The only things you will multiply the multiplicand by will be either zero or one. Multiplying anything by zero is always zero. Multiplying anything by one is always itself -- just keep in mind that for each iteration we will have shifted the multiplicand to the left.\n\nThat second item, that you're multiplying by only 0 or 1, both of which are trivial to do. That is one reason why Lehrer Schmidt's method is so easy to use.\n\nThese two unique characteristics of binary multiplication is why computer students and professionals describe it as \"Shift-and-add\". I will demonstrate this below.\n\nSo how do you add in binary? Basically the same way as you do in decimal: starting at the one's place you add each pair of digits and, if that results in a two-digit sum, then you carry that higher-order digit to the next column and add it to that pair. For example, 1 + 1 is 2, which is a two-digit value in binary (ie, 102) so you carry it to next higher column.\n\nAddition of two bits (A and B) can be represented by the following truth table:\n\nA + B\nABSumCarry\n0000\n0110\n1010\n1101\n\nNote the last line where you add 1 + 1 = 2, which in binary would be 102, just as in decimal 5 + 5 = 1010. In both cases, the sum in that position is zero with a 1 being carried to the next higher position.\n\nSince keeping track of carries can get messy in long-column addition in binary, I will modify the long-multiplication method slightly by performing an addition in each iteration, thus maintaining a running subtotal. This will also reflect how the integer multiplication algorithm is performed on a computer.\n\nFor our example, let's use one of Lehrer Schmidt's examples: 12 × 31. In binary, 1210 = 11002 and 3110 = 111112. For this example I will not show leading zeros, but, since a computer's registers are of a fixed length, in a computer those leading zeros will be there. The example:\n\n• Set up the problem:\n• ``` 11002 × 111112\n\n11111 Multiplicand\n× 1100 Multiplier\n---------\n\n```\n\n• Multiply the multiplier's 1's digit (0) to the multiplicand with zero shift (ie, � 20) Since we're multiplying by zero, we do not write anything down.\n• ``` 11111 Multiplicand\n× 1100 Multiplier\n---------\n\n```\n\n• Multiply the multiplier's 2's digit (0) to the multiplicand with a left shift of one (ie, � 21) Since we're multiplying by zero, we do not write anything down.\n• ``` 11111 Multiplicand\n× 1100 Multiplier\n---------\n\n```\n\n• Multiply the multiplier's 4's digit (1) to the multiplicand with a left shift of two (ie, � 22) Since we're multiplying by one, write the shifted multiplicand down. Since it's the first term, do not add (there's nothing to add it to except zero).\n• ``` 11111 Multiplicand\n× 1100 Multiplier\n---------\n1111100\n\n```\n\n• Multiply the multiplier's 8's digit (1) to the multiplicand with a left shift of three (ie, � 23) Since we're multiplying by one, write the shifted multiplicand down and add it to the previous term.\n``` 11111 Multiplicand\n× 1100 Multiplier\n---------\n1111100\n11111000\n---------\n101110100\n\n```\n\n• Since the remaining higher-order bits of the multiplier are all zero, the subtotal is the final sum and hence the product.\n• ``` 11111 Multiplicand\n× 1100 Multiplier\n---------\n1111100\n11111000\n---------\n101110100 Product\n\n1011101002 = 37210\n\n```\n• Refer to the description of Lehrer Schmidt's method and look at this problem, 12 � 31, and note:\n\n1. We get the same product, 372.\n\n2. Lehrer Schmidt's example ignored the first two multiplications (evens) and only uses the last two (odds), just as we just did.\n\nSo this demonstrates that Lehrer Schmidt's method is using binary multiplication. However, in order to more closely match what he's doing we need to look at how computers multiply integers.\n\n This is one of the simplest ways to explain how computers work: Data exists as a string of binary digits called bits. A string of bits is called a word, which is a fixed length. There are several different data types that can be used to interpret a computer word. There is no inherent difference between words of different data types, but rather that lies in how the program treats that data word. A common data type is the integer, which is a simple number but in binary. As I already explained above, the integer's value is determined through place-values just like with decimal numbers, but in binary. That means that as you go from the right-most bit (the least significant bit, LSB) to the left, each place is 2 times the one to its right. That means that the place values are powers of 2 (ie, 1, 2, 4, 8, 16, 32, etc), just as decimal place values are powers of 10. The computer contains special circuitry called registers which are used to store and process computer words. The operation of the computer and of computer programs consist of moving data words to and from the registers and performing the operations that the registers perform; eg: Load a register with a data word. Add a data word to the contents of a register. Compare a data word with the contents of a register. Shift the contents of a register left. This multiplies the contents of the register by 2. Shift the contents of a register right. This divides the contents of the register by 2. Reset the register. This sets the contents of the register to zero.\nHow Computers Multiply\n\nThe sidebar to the right is a very brief, very simplified explanation of how computers work. This will help you understand the following explanation of how they multiply.\n\nOne of a programmer's common techniques in designing or debugging code is to \"play computer\" with pencil and paper. That is to say that we will test an algorithm or code function by stepping through the algorithm/code writing down the values of all the variables as the code changes them and examining the results. That is basically what Lehrer Schmidt is doing in his method. And I will do the same here.\n\nFrom the perspective of CPU instructions and registers, here is the algorithm for performing integer multiplication:\n\n1. Load two shift registers with the multiplier and multiplicand and zero out a third register, an accumulator, which will end up containing the product.\n2. If the multiplier is zero, exit. The product is in the accumulator.\n3. Test the least significant bit (LSB) of the multiplier. If the LSB is a 1, then add the multiplicand to the accumulator.\n4. Shift the multiplicand left by 1 (double it) and shift the multiplier right by 1 (halve it).\n5. Goto Step 2.\n\nDid I forget to define even and odd numbers? Algebraically, an even number is 2n while an odd number is 2n+1. In a binary number, if the least significant bit (LSB) is a zero (ie, a zero in the 1's place), then the number is even, but if the LSB is a one (ie, a one in the 1's place) then the number is odd. The LSB is the bit that we're multiplying the shifted multiplicand by, so if the LSB is a one then we multiply by 1 and add the result to the accumulator, but if the LSB is zero then we add zero to the accumulator.\n\nNow let's play computer! This is what I have done so very many times for the four decades of my computer engineering training and career.\n\nFirst, let's assign values to registers. If we were doing this in a higher-level language, these would be variables -- for the last few decades of my career, I mostly worked in C, which occupies a gray zone between higher- and lower-level languages, a comfortable environment for a traditional programmer.\n\nLet's set up three registers/variables: the multiplier, the multiplicand, and the accumulator as referred to in the algorithm specified directly above. The accumulator (to which the shifted multiplicand will be added as per the algorithm and which will end up containing the product). We will load the multiplier value into the multiplier, the multiplicand into the multiplicand, and zero into the accumulator. Also note that, if registers are used, the multiplier and multiplicand registers must support shifting.\n\nOur example will be one of Lehrer Schmidt's examples: 5 × 25 → 1012 × 110012:\n\n``` 5 × 25 ⟶ 1012 × 110012\n\nmultiplier multiplicand accumulator\n0101 11001 0 Load the registers.\n0101 11001 11001 First test. LSB is 1 (ie, line is odd) so add multiplicand to the accumulator.\n0010 110010 11001 Shift and test. LSB is 0 (ie, line is even) so add nothing to the accumulator.\n0001 1100100 1111101 Shift and test. LSB is 1 (ie, line is odd) so add shifted multiplicand to the accumulator.\n0000 11001000 1111101 Shift and test. Multiplier is zero, so exit. Product is in the accumulator.\n\n11111012 = 12510\n```\n\nHere's another example, the one we did binary long multiplication one above, 12 × 31:\n\n``` 12 × 31 ⟶ 11002 × 111112\n\nmultiplier multiplicand accumulator\n1100 11111 0 Initialize the registers.\n1100 11111 0 First test. LSB is 0 (ie, line is even) so add nothing to the accumulator.\n0110 111110 0 Shift and test. LSB is 0 (ie, line is even) so add nothing to the accumulator.\n0011 1111100 1111100 Shift and test. LSB is 1 (ie, line is odd) so add shifted multiplicand to the accumulator\n0001 11111000 101110100 Shift and test. LSB is 1 (ie, line is odd) so add shifted multiplicand to the accumulator\n0000 11111000 101110100 Shift and test. Multiplier is zero, so exit. Product is in the accumulator.\n\n1011101002 = 37210\n```\n\nThat is what Lehrer Schmidt is doing in his video, except he keeps the values in their decimal form instead going straight to binary. Decimal numbers still retain their binary properties; you just cannot see them.\n\n### The Multiplication Algorithm in C\n\nHere's a simple implementation of the binary multiplication algorithm in a higher-level language, C. Note that I have not tested it for negative numbers (which would be represented with two's complement, but I've taxed your brain too much already).\n\n``` long multiply(short multiplicand, short multiplier)\n{\nlong acc = 0L; // declare accumulator and initialize it to zero\n\n// test that multiplicand is non-zero\n// if multiplicand is zero, then the product will be zero\nif (multiplicand)\n{\nwhile (multiplier) // loop while multiplier is not zero\n{ // in all tests, zero == false, non-zero == true\nif (multiplier & 1) // perform AND to test LSB.\n{ // if LSB is 1, then multiplier is odd\nacc += multiplicand; // add multiplicand to the accumulator\n}\n// Note: all values are actually in binary, so shifting is also in binary\nmultiplicand <<= 1; // double multiplicand; shift left by one\nmultiplier >>= 1; // halve multiplier; shift right by one\n}\n}\n\nreturn acc;\n}\n```\n\nThis code is provided solely for educational purposes and should not be used in commercial products. Besides, C fully supports multiplication and division (both integer and floating-point, though which is used depends on the data types of the numbers so you need to keep that in mind). This kind of code would only be needed for emulating multiplication in assembly programs for processors that do not have multiply instructions, but in that case you should be using a third-party math emulation package for commercial products."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.9244713,"math_prob":0.93953216,"size":38633,"snap":"2023-40-2023-50","text_gpt3_token_len":9427,"char_repetition_ratio":0.13533874,"word_repetition_ratio":0.7638084,"special_character_ratio":0.2722802,"punctuation_ratio":0.093035765,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99473274,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-02T18:16:47Z\",\"WARC-Record-ID\":\"<urn:uuid:bb17d9c2-f9f6-4aef-a4b6-fc97cadffd41>\",\"Content-Length\":\"46178\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:16899980-cf79-46f4-af7b-e30dc78d873c>\",\"WARC-Concurrent-To\":\"<urn:uuid:90b900dd-3667-4b89-a071-532c857eef2a>\",\"WARC-IP-Address\":\"50.63.9.6\",\"WARC-Target-URI\":\"http://dwise1.net/trivia/binary_mult.html\",\"WARC-Payload-Digest\":\"sha1:UA7W7DGQDI46HG6BSD7AEDYT2FATLQQJ\",\"WARC-Block-Digest\":\"sha1:ZRJQMU2NSYZ5WM3PHNFVIBMLPBNGKZXR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511002.91_warc_CC-MAIN-20231002164819-20231002194819-00309.warc.gz\"}"} |
http://justsophie.com/pendulum | [
"# Portfolio.Pendulum\n\n> ./intro",
null,
"download source code\ndownload final report\n\n> ./stats\nStatus: Completed Dec/2015\nLanguages: Matlab, Python\nSoftware: Matlab, Tkinter\nHardware: n/a\nDocumentation: Complete -- Verbose Debrief\n\n> ./documentation\nPictured above is an example output of our N-case compound pendulum simulator. Below is a screen capture of the GUI used to generate that output.",
null,
"The GUI is written in Tkinter, where the user inputs are passed into a Python script that generates the Matlab script for the pendulum motion. We tried to write the entire simulator in Matlab, but on the fly matrix generation for the pendulums took an eternity when done in Matlab and seconds in Python. Please take a look at the verbose debrief for a more in depth explanation of how we generalized the equations of motion for ccompound pendulums.\n\nAfter running the output Matlab script in Matlab, the code also generates energy and position/velocity/acceleration plots.\n\nEnergy:",
null,
"This graph says that kinetic energy(KE) added to potential energy(PE) results in a mostly flat total energy(TE). This graph is proof that our code is functioning as expected, because energy is conserved in the system. There are bumps in the total energy line, but this is due to calculation errors in the ODE45 function that Matlab is running.\n\nPosition/Velocity/Acceleration:",
null,
"Here we see how each additional pendulum link experiances more displacement than the ones before it, which makes sense given that the motion of the last link of the pendulum is dependant on the motion of all the other links before it. We find that acceleration in all the pendulums seem to follow a similar pattern, because all of the pendulums are linked.\n\n>\n|"
]
| [
null,
"http://i.imgur.com/UMWDLNH.gif",
null,
"http://justsophie.com/img/pendulum/n5_gui.png",
null,
"http://justsophie.com/img/pendulum/n5_te.jpg",
null,
"http://justsophie.com/img/pendulum/n5_pva.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8644543,"math_prob":0.8334574,"size":1812,"snap":"2021-21-2021-25","text_gpt3_token_len":405,"char_repetition_ratio":0.13108407,"word_repetition_ratio":0.0,"special_character_ratio":0.200883,"punctuation_ratio":0.121212125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9939971,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-25T10:59:53Z\",\"WARC-Record-ID\":\"<urn:uuid:72d4d933-8385-458f-90da-9e3e6c1657e6>\",\"Content-Length\":\"5218\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0314d28d-25f4-4a1c-afb5-615ba2fea759>\",\"WARC-Concurrent-To\":\"<urn:uuid:d9ace5d3-cb93-433a-bd13-7b2112090c27>\",\"WARC-IP-Address\":\"208.94.117.62\",\"WARC-Target-URI\":\"http://justsophie.com/pendulum\",\"WARC-Payload-Digest\":\"sha1:D7MCCFQVCEEYKHPY33NOCFZGQSTQ2SBP\",\"WARC-Block-Digest\":\"sha1:PH6QC2PZWXUHBNMJ7X33NWXGKIABXHGV\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487630081.36_warc_CC-MAIN-20210625085140-20210625115140-00233.warc.gz\"}"} |
https://calcforme.com/percentage-calculator/what-is-187-percent-of-403 | [
"# What is 187% of 403?\n\n## 187 percent of 403 is equal to 753.61\n\n%\n\n187% of 403 equal to 753.61\n\nCalculation steps:\n\n( 187 ÷ 100 ) x 403 = 753.61\n\n### Calculate 187 Percent of 403?\n\n• F\n\nFormula\n\n(187 ÷ 100) x 403 = 753.61\n\n• 1\n\nPercent to decimal\n\n187% to decimal is 187 ÷ 100 = 1.87\n\n• 2\n\nMultiply decimal with the other number\n\n1.87 x 403 = 753.61\n\nExample"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.7094278,"math_prob":0.9998549,"size":232,"snap":"2022-40-2023-06","text_gpt3_token_len":92,"char_repetition_ratio":0.19298245,"word_repetition_ratio":0.0,"special_character_ratio":0.5603448,"punctuation_ratio":0.13207547,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99968743,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-01T17:47:41Z\",\"WARC-Record-ID\":\"<urn:uuid:9898db39-542f-46c2-9ce5-f6a16b256e7f>\",\"Content-Length\":\"14863\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:75f5b62c-531d-4435-9a47-5f2dc0c229a1>\",\"WARC-Concurrent-To\":\"<urn:uuid:c4544760-1abf-48f3-88e0-6245d065c32e>\",\"WARC-IP-Address\":\"76.76.21.93\",\"WARC-Target-URI\":\"https://calcforme.com/percentage-calculator/what-is-187-percent-of-403\",\"WARC-Payload-Digest\":\"sha1:IQA475KIHDAJVDWKYSOQKDZM6BCCZ5OY\",\"WARC-Block-Digest\":\"sha1:IGAI26AAEE5XHWPCZFVLA53NHGBXMNCI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030336880.89_warc_CC-MAIN-20221001163826-20221001193826-00154.warc.gz\"}"} |
https://nforum.ncatlab.org/discussion/7546/ | [
"# Start a new discussion\n\n## Not signed in\n\nWant to take part in these discussions? Sign in if you have an account, or apply for one below\n\n## Site Tag Cloud\n\nVanilla 1.1.10 is a product of Lussumo. More Information: Documentation, Community Support.\n\n• CommentRowNumber1.\n• CommentAuthorMike Shulman\n• CommentTimeDec 17th 2016\n\nI added to uniformly regular space a definition of “uniform apartness space” and a proof that under uniform regularity, these coincide with ordinary uniform spaces. I think this is interesting because it seems to be one of the purposes of uniform regularity (and local decomposability).\n\n• CommentRowNumber2.\n• CommentAuthorTobyBartels\n• CommentTimeDec 18th 2016\n\nThat's a good observation.\n\n• CommentRowNumber3.\n• CommentAuthorMike Shulman\n• CommentTimeJan 16th 2017\n\nApparently my brain was turned off when I wrote that axiom (5) of a uniform apartness space requires uniform regularity to prove from a uniform space. Either that or it’s turned off now, when I think it only needs the direction of de Morgan’s law that holds constructively. I fixed it.\n\n• CommentRowNumber4.\n• CommentAuthorTobyBartels\n• CommentTimeJan 17th 2017\n\nI agree with your brain now.\n\nBy the way, I think that you should say ‘anti-entourage’ instead of ‘co-entourage’, to match the use of ‘anti-ideal’ and the like in constructive algebra.\n\n• CommentRowNumber5.\n• CommentAuthorMike Shulman\n• CommentTimeJan 17th 2017\n\nYes, you’re right. Feel free to fix it, or I will when I have time.\n\nI also have a different suggestion for axiom (2) of a uniform apartness space that doesn’t require uniform regularity to prove from a uniform space, and I suspect sets up an adjunction between uniform spaces and uniform apartness spaces whose fixed points include the uniformly regular ones. Namely, for any anti-entourage $E$ there is an anti-entourage $F$ such that for any $x,y$, if $\\neg\\forall z, ((x,z)\\in E \\Rightarrow (y,z) \\in F)$ then $(x,y)\\in F$. (This comes from syntopogenous transitivity in the biperfect case.)\n\n• CommentRowNumber6.\n• CommentAuthorTobyBartels\n• CommentTimeJan 17th 2017\n\nH'm, and what happens if you write\n\n$\\neg\\forall z, ((x,z)\\in E \\Rightarrow (y,z) \\in F)$\n\nas\n\n$\\exists z, ((x,z)\\in E \\wedge (y,z) \\notin F) ?$\n\nThis looks nicer and is even easier to prove. (Well, the full axiom is easier to prove, because this statement is harder to prove.)\n\n• CommentRowNumber7.\n• CommentAuthorTobyBartels\n• CommentTimeJan 17th 2017\n\nThe construction of an anti-uniformity from a uniformity can be expressed in two equivalent ways:\n\n• $\\exists U,\\; A \\subseteq X \\setminus U$,\n• $\\exists U,\\; A \\cap U = \\emptyset_X$.\n\nThese suggest two inequivalent ways to construct a uniformity from an anti-uniformity:\n\n• $\\exists A,\\; U \\supseteq X \\setminus A$,\n• $\\exists A,\\; U \\cup A = X$.\n\nThe second is coarser, but they are equivalent if the anti-uniformity is uniformly regular.\n\n• CommentRowNumber8.\n• CommentAuthorMike Shulman\n• CommentTimeJan 18th 2017\n\n$\\exists z, ((x,z)\\in E \\wedge (y,z) \\notin F)$ does seem nicer. I got $\\neg\\forall z, ((x,z)\\in E \\Rightarrow (y,z) \\in F)$ from the syntopogenous perspective, where an anti-uniformity is described using the relations $A \\bowtie_E B$ defined by $\\forall x\\in A, \\forall y\\in B, (x,y)\\in E$. Currently my best guess at a weak transitivity axiom in that case is that for all $E$ there is an $F$ such that whenever $A\\bowtie_E B$ there is a $C$ such that $A\\bowtie_F \\neg C$ and $C\\bowtie_F B$ (as at proximity space).\n\nIn the biperfect (uniform) case, if we fix $A=\\{x\\}$, then we may as well let $B$ be the largest set such that $A\\bowtie_E B$, i.e. $B = \\{ z \\mid (x,z)\\in E\\}$, and then $C$ the largest set such that $C\\bowtie_F B$, i.e. $C = \\{ y \\mid \\forall z\\in B, (y,z)\\in F \\}$, and the remaining assertion is that $A \\bowtie_F \\neg C$, i.e. that if $y\\notin C$, meaning $\\neg\\forall z, ((x,y)\\in E \\Rightarrow (y,z)\\in F)$, then $(x,y)\\in F$.\n\nYour proposal for a weaker axiom (equivalently, for any $x,y,z$, if $(x,z)\\in E$ and $(y,z)\\notin F$ then $(x,y)\\in F$) is I think what we get similarly by fixing both $A=\\{x\\}$ and $B=\\{z\\}$. On the other hand, we get an even stronger axiom (but still, I think, provable by negating the entourages of a uniformity) by allowing both $A$ and $B$ to be arbitrary.\n\nI guess probably your axiom is the best one to use in the definition of anti-uniformity, though: it looks cleaner and it treats $x$ and $z$ more even-handedly.\n\n• CommentRowNumber9.\n• CommentAuthorMike Shulman\n• CommentTimeJan 18th 2017\n\nRe: #7 (where I think you mean $X\\times X$ everywhere, not $X$), can you prove the transitivity axiom for entourages defined by $\\exists A,\\; U \\cup A = X\\times X$? If this holds for some given $U$, we can find an $A$ such that $U\\cup A = X\\times X$ and then use transitivity for the anti-uniformity to get an anti-entourage $B$ satisfying whatever transitivity, but then we seem to be stuck: there’s no way to get from $B\\subseteq X\\times X$ to some $V\\subseteq X\\times X$ such that $V\\cup B = X\\times X$.\n\nThis is something I’ve been puzzling about also in the case of topological spaces and point-set apartness spaces. There there are at least three ways to try to make a topology from a point-set apartness: let $A$ be a neighborhood of $x$ if\n\n1. there is a $B$ such that $x\\bowtie B$ and $\\{ y \\mid y\\bowtie B\\} \\subseteq A$\n2. there is a $B$ such that $x\\bowtie B$ and $A\\cup B = X$\n3. there is a $B$ such that $x\\bowtie B$ and $\\neg B \\subseteq A$\n\nThe first one is what Bridges et. al. call the “apartness topology” associated to a point-set apartness space. Unfortunately, as far as I can tell it is not functorial from point-set apartness spaces to topological spaces, so it’s at least questionable as a notion of “underlying topology” of an apartness space. The second and third are functorial, but don’t produce a topology, only a pretopological space. However, the third definition sets up an adjunction between pretopological spaces and “pretopological apartness spaces” (those lacking the transitivity axiom), so it seems the best definition category-theoretically, and in the locally decomposable case they all agree.\n\nI suspect that in the uniform case, it’ll also be $\\exists A,\\; U \\supseteq (X\\times X) \\setminus A$ that participates in an adjunction.\n\n• CommentRowNumber10.\n• CommentAuthorTobyBartels\n• CommentTimeJan 18th 2017\n\nwhere I think you mean $X\\times X$ everywhere, not $X$\n\nIs it too late to say that the set of points of the space is $Y$ and $X$ is defined as $Y \\times Y$? :–)\n\ncan you prove the transitivity axiom\n\nNo, unless we have uniform regularity. Thus, using my new method of defining a uniformity from an anti-uniformity restores the symmetry, that defining one from the other requires uniform regularity. (But you changed the definition of a uniform apartness space so that defining an anti-uniformity from a uniformity does not require uniform regularity, so it's a bad idea after all.)\n\nI am really getting an appreciation for uniform regularity (or local decomposability), that it makes all of the slightly different ways of doing things become equivalent. One reason for not imposing uniform regularity is that there are examples that don't satisfy it (such as arbitrary topological groups1), so maybe we should see how these slight difference affect those examples.\n\n1. Do we even have any others, at least for uniform spaces?\n\n• CommentRowNumber11.\n• CommentAuthorTobyBartels\n• CommentTimeJan 18th 2017\n\nThe really radical step would be requiring local decomposability of every topological space, at least for purposes of analysis. A locally decomposable topological group is uniformly regular, after all.\n\nWhat examples do we have of important topological spaces, especially in analysis, that cannot be proved locally decomposable? (A discrete space is locally decomposable iff its underlying set has decidable equality, but then those are probably the only sets that should have the discrete topology in constructive analysis.)\n\n• CommentRowNumber12.\n• CommentAuthorMike Shulman\n• CommentTimeJan 18th 2017\n\nGeneralizing the discrete-space example, an Alexandrov space is locally decomposable only when the preorder relation is decidable. But probably that’s also not so important in analysis.\n\n(Regarding discrete topologies and decidable equality, Martin Escardo told me once that he thinks decidable equality is more than just having the discrete topology: it should also include being Hausdorff. For instance, a set with semidecidable equality should have the discrete topology but not be Hausdorff. This doesn’t make sense literally interpreted for topological spaces, since every discrete space is Hausdorff at least according to the usual notion of Hausdorff, but it makes perfect sense if you replace “Hausdorff” by another separation axiom like regularity or local decomposability, which together with discreteness imply decidable equality.)\n\nAny gauge space whose distances are located reals is locally decomposable / uniformly regular, and that includes a lot of spaces in analysis. However, I guess there are some gauge spaces in analysis whose distances aren’t constructively located, like $L^\\infty$ whose sup-norm is constructively only going to be a lower real number. More generally, there is the example I noticed before that even when $X$ is uniformly regular, the uniformity of uniform convergence on $X^A$ is (apparently) not uniformly regular unless $A$ is covert. Interestingly, with anti-uniform spaces in mind I now notice that as long as $X$ is uniformly regular, $X^A$ also has an anti-uniformity of uniform convergence that dualizes to the uniformity of uniform convergence (but not conversely), and maybe in practice that would be the more relevant structure to pay attention to.\n\nI am a little suspicious of local decomposability because it seems so point-centric; I don’t know what it means for a locale to be locally decomposable. Regularity seems like a more honestly “topological” condition.\n\n• CommentRowNumber13.\n• CommentAuthorTobyBartels\n• CommentTimeJan 18th 2017\n\nIf we define ‘Hausdorff’ by requiring a strongly closed diagonal, then it becomes stronger, and for discrete spaces implies stable (but not decidable) equality. You said as much (but without the terminology ‘strongly closed’) at Hausdorff space, and I wrote some more there using this new terminology.\n\nAnd as you also remarked there, a discrete space (which is always sober) is localically Hausdorff (using strongly closed maps as usual with locales) iff it has decidable equality precisely.\n\n• CommentRowNumber14.\n• CommentAuthorMike Shulman\n• CommentTimeJan 19th 2017\n\nRight. Sorry, though, that was a digression.\n\n• CommentRowNumber15.\n• CommentAuthorTobyBartels\n• CommentTimeJan 19th 2017\n• (edited Jan 19th 2017)\n\nLocal decomposability does seem point-centric, but I wasn't worried about that, since we seemed to be doing point-wise analysis anyway.\n\nThat said, regularity also seems point-centric, but it turns out to have a localic description.\n\n• CommentRowNumber16.\n• CommentAuthorMike Shulman\n• CommentTimeJan 19th 2017\n\nThe only ways I’ve been able to think of to write local decomposability localically are either vacuous (if we interpret $\\neg V$ as the complementary closed sublocale, since $U \\cup \\mathsf{C}U = X$ in the lattice of sublocales even constructively) or equivalent to regularity (if we interpret $\\neg V$ as the Heyting complement in the lattice of open sets, and replace the point $x$ by a covering of $U$ by opens).\n\nUniform regularity for a uniform locale might be a nontrivially stronger condition than regularity of the underlying locale, though.\n\nI wonder whether there is a uniform locale of uniform convergence? It’s not obvious to me how to proceed, even classically…\n\n• CommentRowNumber17.\n• CommentAuthorMike Shulman\n• CommentTimeJan 20th 2017\n\nOk, I’ve changed the definition of uniform apartness space as discussed in #5-8.\n\n• CommentRowNumber18.\n• CommentAuthorMike Shulman\n• CommentTimeJan 20th 2017\n\nAnd now improved the theorem from an equivalence of uniformly regular spaces to an idempotent adjunction of general spaces, with uniformly regular spaces among the fixed points.\n\n• CommentRowNumber19.\n• CommentAuthorTobyBartels\n• CommentTimeApr 6th 2017\n\nI edited uniform convergence space to reflect the idea that uniform regularity is optional. (By the way, this is another context, besides quasiuniform spaces, where a uniformly regular space need not be regular.)\n\n• CommentRowNumber20.\n• CommentAuthorMike Shulman\n• CommentTimeApr 6th 2017\n\nInteresting!"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.94823796,"math_prob":0.96539426,"size":9532,"snap":"2021-43-2021-49","text_gpt3_token_len":2055,"char_repetition_ratio":0.1456759,"word_repetition_ratio":0.025112685,"special_character_ratio":0.19765002,"punctuation_ratio":0.10204082,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9932807,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-02T12:31:12Z\",\"WARC-Record-ID\":\"<urn:uuid:582494c1-cc46-468c-bf38-dcce97f16b13>\",\"Content-Length\":\"98869\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:196ba013-2eb9-4a9e-af5b-1de000492fde>\",\"WARC-Concurrent-To\":\"<urn:uuid:9d20cc06-0a2e-41ab-b0a7-c1b78d89e373>\",\"WARC-IP-Address\":\"104.21.81.15\",\"WARC-Target-URI\":\"https://nforum.ncatlab.org/discussion/7546/\",\"WARC-Payload-Digest\":\"sha1:4DRKEBTXMMSS3EMFGV5ZYKX6AIDCRBCS\",\"WARC-Block-Digest\":\"sha1:7QWJ2VVXIQSXAAH5YTBBA2FAZXDVWANO\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362219.5_warc_CC-MAIN-20211202114856-20211202144856-00423.warc.gz\"}"} |
https://www.tutoreye.com/-if-x-is-not-a-multiple-of-but-xy-is-what-is-the-smallest-possible-value-of-y-qa | [
"Search -if-x-is-not-a-multiple-of-but-xy-is-what-is-the-smallest-possible-value-of-y\n\n# if x is not a multiple of but xy is what is the smallest possible value of y\n\n## Top Questions\n\nesent the cost would be y=46+0.25x , where x is the number of miles traveled. a. What is your cost if you travel 59 mi? The cost is \\$ 43.26 . b. If your cost was \\$66.25 , how many miles were you charged for traveling? You were charged for traveling 66.51 miles. c. Suppose you have a maximum of \\$100 to spend for the car rental. What would be the maximum number of miles you could travel? The maximum number of miles you could travel is Number\nView More\n\nView More\n\nring. a) Calculate the work done to compress the spring. (2 marks) b) What happens to the work done on the spring ? (1 mark) c) If the spring is released, what happens to the energy of the spring? (1 mark) d) Calculate the total mechanical energy of the ball at the instant it leaves the spring. (2 marks) e) What will be the speed of the ball at the instant it leaves the spring? (2 marks) f) If the ball is fired up into the air by the spring, how much gravitational potential energy will it gain? (1 mark) g) What will be the maximum height of the ball? (2 marks\nView More\n\nView More\n\nthan 7.33 is 0.6738, then what is the mean of x?\nView More\n\nhave done the calculus which reveals that the surface area is at a minimum when height is double the radius. I am now trying to find an equation for the relationship between the amount of wasted surface area as a percentage of the minimum surface area and the ratio between height and radius. If I were to plot it on a graph, the y axis would be the percentage of excess materials needed as a percentage of the minimum possible surface area, and the x axis would be height divided by radius. Since the surface area is minimized when height=2(radius), I know that when x=2, y=0. The website https://www.datagenetics.com/blog/august12014/index.html explains what I am trying to do quite well and shows the graph below. I am trying to find the equation for this graph, but am unsure how to go about it.\nView More\n\nand y = 2, then z = 56.\nView More\n\nhin a free demo session as I have my answers, but just want to confirm them, that would be greatly appreciated. Question 1: A block of mass M = 0.10 kg is attached to one end of a spring with spring constant k = 100 N/m . The other end of the spring is attached to a fixed wall. The block is pushed against the spring, compressing it a distance x = 0.04 m . The block is then released from rest, and the block-spring system travels along a horizontal, rough track. Data collected from a motion detector are used to create a graph of the kinetic energy K and spring potential energy Us of the system as a function of the block's position as the spring expands. How can the student determine the amount of mechanical energy dissipated by friction as the spring expanded to its natural spring length? Question 2: The Atwood’s machine shown consists of two blocks connected by a light string that passes over a pulley of negligible mass and negligible friction. The blocks are released from rest, and m2 is greater than m1. Assume that the reference line of zero gravitational potential energy is the floor. Which of the following best represents the total gravitational potential energy U and total kinetic energy K of the block-block-Earth system as a function of the height h of block m1? Question 3: A 2 kg block is placed at the top of an incline and released from rest near Earth’s surface and unknown distance H above the ground. The angle θ between the ground and the incline is also unknown. Frictional forces between the block and the incline are considered to be negligible. The block eventually slides to the bottom of the incline after 0.75 s. The block’s velocity v as a function of time t is shown in the graph starting from the instant it is released. How could a student use the graph to determine the total energy of the block-Earth system? Question 4: A block slides across a flat, horizontal surface to the right. For each choice, the arrows represent velocity vectors of the block at successive intervals of time. Which of the following diagrams represents the situation in which the block loses kinetic energy?\nView More\n\n1.AU MAT 120 Systems of Linear Equations and Inequalities Discussion\n\nmathematicsalgebra Physics"
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8931623,"math_prob":0.9620658,"size":975,"snap":"2022-40-2023-06","text_gpt3_token_len":247,"char_repetition_ratio":0.09680741,"word_repetition_ratio":0.0,"special_character_ratio":0.29128206,"punctuation_ratio":0.2125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9943705,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-05T23:31:50Z\",\"WARC-Record-ID\":\"<urn:uuid:ca9deef7-0094-48a5-aa5b-33f568a71c58>\",\"Content-Length\":\"292199\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9341c8a7-34a9-4d88-baec-8b4c7d63807e>\",\"WARC-Concurrent-To\":\"<urn:uuid:c5a46bef-1a68-4bce-bc1b-f0226d75d48f>\",\"WARC-IP-Address\":\"3.133.248.148\",\"WARC-Target-URI\":\"https://www.tutoreye.com/-if-x-is-not-a-multiple-of-but-xy-is-what-is-the-smallest-possible-value-of-y-qa\",\"WARC-Payload-Digest\":\"sha1:SM3W667YRQQBKS6PMOHDQVHA3S5TX677\",\"WARC-Block-Digest\":\"sha1:SDMRAMJOKAVPH6XEGN5O5CO5SMY72SKD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500294.64_warc_CC-MAIN-20230205224620-20230206014620-00103.warc.gz\"}"} |
https://www.gurufocus.com/term/mscore/NAS:EXPI/Beneish-M-Score/eXp%20World%20Holdings | [
">\nSwitch to:\n\n# eXp World Holdings Beneish M-Score\n\n: -3.73 (As of Today)\nView and export this data going back to 2011. Start your Free Trial\n\nThe zones of discrimination for M-Score is as such:\n\nAn M-Score of equal or less than -1.78 suggests that the company is unlikely to be a manipulator.\nAn M-Score of greater than -1.78 signals that the company is likely to be a manipulator.\n\nGood Sign:\n\nBeneish M-Score -3.73 no higher than -1.78, which implies that the company is unlikely to be a manipulator.\n\nNAS:EXPI' s Beneish M-Score Range Over the Past 10 Years\nMin: -10000000 Med: -5.31 Max: 10000000\nCurrent: -3.73\n\n-10000000\n10000000\n\nDuring the past 11 years, the highest Beneish M-Score of eXp World Holdings was 10000000.00. The lowest was -10000000.00. And the median was -5.31.\n\n## eXp World Holdings Beneish M-Score Historical Data\n\n* For Operating Data section: All numbers are indicated by the unit behind each term and all currency related amount are in USD.\n* For other sections: All numbers are in millions except for per share data, ratio, and percentage. All currency related amount are indicated in the company's associated stock exchange currency.\n\n eXp World Holdings Annual Data Jun11 Jun12 Jun13 Dec14 Dec15 Dec16 Dec17 Dec18 Dec19 Dec20 Beneish M-Score",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"-5.50 -9.75 - -5.06 -3.05\n\nCompetitive Comparison\n* Competitive companies are chosen from companies within the same industry, with headquarter located in same country, with closest market capitalization; x-axis shows the market cap, and y-axis shows the term value; the bigger the dot, the larger the market cap.\n\neXp World Holdings Beneish M-Score Distribution\n\n* The bar in red indicates where eXp World Holdings's Beneish M-Score falls into.\n\n## eXp World Holdings Beneish M-Score Calculation\n\nThe M-score was created by Professor Messod Beneish. Instead of measuring the bankruptcy risk (Altman Z-Score) or business trend (Piotroski F-Score), M-score can be used to detect the risk of earnings manipulation. This is the original research paper on M-score.\n\nThe M-Score Variables:\n\nThe M-score of eXp World Holdings for today is based on a combination of the following eight different indices:\n\n M = -4.84 + 0.92 * DSRI + 0.528 * GMI + 0.404 * AQI + 0.892 * SGI + 0.115 * DEPI = -4.84 + 0.92 * 1.3265 + 0.528 * 1.0169 + 0.404 * 0.7136 + 0.892 * 1.9288 + 0.115 * 0.9154 - 0.172 * SGAI + 4.679 * TATA - 0.327 * LVGI - 0.172 * 0.771 + 4.679 * -0.4882 - 0.327 * 1.0662 = -3.73\n\n* For Operating Data section: All numbers are indicated by the unit behind each term and all currency related amount are in USD.\n* For other sections: All numbers are in millions except for per share data, ratio, and percentage. All currency related amount are indicated in the company's associated stock exchange currency.\n\n This Year (Mar21) TTM: Last Year (Mar20) TTM: Accounts Receivable was \\$88 Mil. Revenue was 583.833 + 609.322 + 564.017 + 353.525 = \\$2,111 Mil. Gross Profit was 53.486 + 50.387 + 46.848 + 34.361 = \\$185 Mil. Total Current Assets was \\$267 Mil. Total Assets was \\$298 Mil. Property, Plant and Equipment(Net PPE) was \\$10 Mil. Depreciation, Depletion and Amortization(DDA) was \\$4 Mil. Selling, General, & Admin. Expense(SGA) was \\$149 Mil. Total Current Liabilities was \\$152 Mil. Long-Term Debt & Capital Lease Obligation was \\$0 Mil. Net Income was 4.846 + 7.721 + 14.97 + 8.275 = \\$36 Mil. Non Operating Income was 0.128 + -0.021 + -0.08 + -0.023 = \\$0 Mil. Cash Flow from Operations was 78.919 + 30.453 + 43.17 + 28.547 = \\$181 Mil. Accounts Receivable was \\$35 Mil. Revenue was 271.421 + 274.019 + 282.179 + 266.705 = \\$1,094 Mil. Gross Profit was 28.015 + 24.407 + 23.038 + 22.118 = \\$98 Mil. Total Current Assets was \\$93 Mil. Total Assets was \\$111 Mil. Property, Plant and Equipment(Net PPE) was \\$7 Mil. Depreciation, Depletion and Amortization(DDA) was \\$3 Mil. Selling, General, & Admin. Expense(SGA) was \\$100 Mil. Total Current Liabilities was \\$52 Mil. Long-Term Debt & Capital Lease Obligation was \\$1 Mil.\n\n1. DSRI = Days Sales in Receivables Index\n\nMeasured as the ratio of Revenue in Accounts Receivable in year t to year t-1.\n\nA large increase in DSR could be indicative of revenue inflation.\n\n DSRI = (Receivables_t / Revenue_t) / (Receivables_t-1 / Revenue_t-1) = (88.475 / 2110.697) / (34.58 / 1094.324) = 0.04191743 / 0.03159942 = 1.3265\n\n2. GMI = Gross Margin Index\n\nMeasured as the ratio of gross margin in year t-1 to gross margin in year t.\n\nGross margin has deteriorated when this index is above 1. A firm with poorer prospects is more likely to manipulate earnings.\n\n GMI = GrossMargin_t-1 / GrossMargin_t = (GrossProfit_t-1 / Revenue_t-1) / (GrossProfit_t / Revenue_t) = (97.578 / 1094.324) / (185.082 / 2110.697) = 0.08916738 / 0.08768762 = 1.0169\n\n3. AQI = Asset Quality Index\n\nAQI is the ratio of asset quality in year t to year t-1.\n\nAsset quality is measured as the ratio of non-current assets other than Property, Plant and Equipment to Total Assets.\n\n AQI = (1 - (CurrentAssets_t + PPE_t) / TotalAssets_t) / (1 - (CurrentAssets_t-1 + PPE_t-1) / TotalAssets_t-1) = (1 - (266.763 + 9.773) / 297.602) / (1 - (92.685 + 7.003) / 110.665) = 0.07078581 / 0.09919125 = 0.7136\n\n4. SGI = Sales Growth Index\n\nRatio of Revenue in year t to sales in year t-1.\n\nSales growth is not itself a measure of manipulation. However, growth companies are likely to find themselves under pressure to manipulate in order to keep up appearances.\n\n SGI = Sales_t / Sales_t-1 = Revenue_t / Revenue_t-1 = 2110.697 / 1094.324 = 1.9288\n\n5. DEPI = Depreciation Index\n\nMeasured as the ratio of the rate of Depreciation, Depletion and Amortization in year t-1 to the corresponding rate in year t.\n\nDEPI greater than 1 indicates that assets are being depreciated at a slower rate. This suggests that the firm might be revising useful asset life assumptions upwards, or adopting a new method that is income friendly.\n\n DEPI = (Depreciation_t-1 / (Depreciaton_t-1 + PPE_t-1)) / (Depreciation_t / (Depreciaton_t + PPE_t)) = (2.804 / (2.804 + 7.003)) / (4.439 / (4.439 + 9.773)) = 0.28591822 / 0.31234168 = 0.9154\n\nNote: If the Depreciation, Depletion and Amortization data is not available, we assume that the depreciation rate is constant and set the Depreciation Index to 1.\n\n6. SGAI = Sales, General and Administrative expenses Index\n\nThe ratio of Selling, General, & Admin. Expense(SGA) to Sales in year t relative to year t-1.\n\nSGA expenses index > 1 means that the company is becoming less efficient in generate sales.\n\n SGAI = (SGA_t / Sales_t) / (SGA_t-1 /Sales_t-1) = (148.777 / 2110.697) / (100.047 / 1094.324) = 0.07048714 / 0.09142356 = 0.771\n\n7. LVGI = Leverage Index\n\nThe ratio of total debt to Total Assets in year t relative to yeat t-1.\n\nAn LVGI > 1 indicates an increase in leverage\n\n LVGI = ((LTD_t + CurrentLiabilities_t) / TotalAssets_t) / ((LTD_t-1 + CurrentLiabilities_t-1) / TotalAssets_t-1) = ((0.37 + 151.893) / 297.602) / ((0.694 + 52.411) / 110.665) = 0.51163299 / 0.47987168 = 1.0662\n\n8. TATA = Total Accruals to Total Assets\n\nTotal accruals calculated as the change in working capital accounts other than cash less depreciation.\n\n TATA = (IncomefromContinuingOperations_t - CashFlowsfromOperations_t) / TotalAssets_t = (NetIncome_t - NonOperatingIncome_t - CashFlowsfromOperations_t) / TotalAssets_t = (35.812 - 0.004 - 181.089) / 297.602 = -0.4882\n\nAn M-Score of equal or less than -1.78 suggests that the company is unlikely to be a manipulator. An M-Score of greater than -1.78 signals that the company is likely to be a manipulator.\n\neXp World Holdings has a M-score of -3.73 suggests that the company is unlikely to be a manipulator."
]
| [
null,
"https://gurufocus.s3.amazonaws.com/images/blur.png",
null,
"https://gurufocus.s3.amazonaws.com/images/blur.png",
null,
"https://gurufocus.s3.amazonaws.com/images/blur.png",
null,
"https://gurufocus.s3.amazonaws.com/images/blur.png",
null,
"https://gurufocus.s3.amazonaws.com/images/blur.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.87612665,"math_prob":0.9470169,"size":7205,"snap":"2021-21-2021-25","text_gpt3_token_len":2309,"char_repetition_ratio":0.11470629,"word_repetition_ratio":0.17895609,"special_character_ratio":0.38750866,"punctuation_ratio":0.16816609,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9866808,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-12T19:58:17Z\",\"WARC-Record-ID\":\"<urn:uuid:da0fec85-0221-4645-b824-58a8c29006ea>\",\"Content-Length\":\"400765\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:48ea05bc-8675-4d80-b3f3-4a6867f6e634>\",\"WARC-Concurrent-To\":\"<urn:uuid:05da0c65-b735-4021-8d57-a8e627d3ab0d>\",\"WARC-IP-Address\":\"172.67.73.2\",\"WARC-Target-URI\":\"https://www.gurufocus.com/term/mscore/NAS:EXPI/Beneish-M-Score/eXp%20World%20Holdings\",\"WARC-Payload-Digest\":\"sha1:JKNHJLX4XU2HSBF7HWW2F3ZOIZB5FOGK\",\"WARC-Block-Digest\":\"sha1:CVZ33QB2DF2ZOJEIUATEW7M4Q4RDCSEP\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243989705.28_warc_CC-MAIN-20210512193253-20210512223253-00211.warc.gz\"}"} |
https://answers.everydaycalculation.com/percent-is/26-95 | [
"Solutions by everydaycalculation.com\n\n26 is what percent of 95?\n\n26 of 95 is 27.37%\n\nSteps to solve \"what percent is 26 of 95?\"\n\n1. 26 of 95 can be written as:\n26/95\n2. To find percentage, we need to find an equivalent fraction with denominator 100. Multiply both numerator & denominator by 100\n\n26/95 × 100/100\n3. = (26 × 100/95) × 1/100 = 27.37/100\n4. Therefore, the answer is 27.37%\n\nIf you are using a calculator, simply enter 26÷95×100 which will give you 27.37 as the answer.\n\nMathStep (Works offline)",
null,
"Download our mobile app and learn how to work with percentages in your own time:"
]
| [
null,
"https://answers.everydaycalculation.com/mathstep-app-icon.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.88468,"math_prob":0.9911551,"size":453,"snap":"2022-05-2022-21","text_gpt3_token_len":139,"char_repetition_ratio":0.16481069,"word_repetition_ratio":0.0,"special_character_ratio":0.36644593,"punctuation_ratio":0.08080808,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99406683,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-18T13:49:40Z\",\"WARC-Record-ID\":\"<urn:uuid:a8cb41f2-1a33-4a57-a782-5d93e3366ac9>\",\"Content-Length\":\"6364\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ac497769-1fe2-4808-8db3-fc909d7d5e03>\",\"WARC-Concurrent-To\":\"<urn:uuid:950e62af-6667-4e81-93f8-4138ffe35e35>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/percent-is/26-95\",\"WARC-Payload-Digest\":\"sha1:OVQFIDFQKMZRYCKWLHYPXYJMM234IF2X\",\"WARC-Block-Digest\":\"sha1:NOBRMZCCOPK4R7MHDBORRJSG24PHIJ32\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320300849.28_warc_CC-MAIN-20220118122602-20220118152602-00245.warc.gz\"}"} |
https://joshdeprez.com/67 | [
"Nines of nines\n\nIn the operations business we like to talk about nines of things, especially regarding service levels.\n\nIf\n\n• “one nine of availability” = available 0.9 of the time,\n• “two nines of availability” = available 0.99 of the time,\n• and so on…\n\nthen generally,\n\n• “$$n$$ nines of availability” = available $$(1 - 10^{-n})$$ of the time,\n\nright?\n\nThis works for any whole number n: e.g. 5 nines is \\begin{align}1 - 10^{-5} &= 1 - 0.00001 \\\\ &= 0.99999.\\end{align}\n\nThere’s a problem with this simple generalisation, and that is, when people say “three and a half nines” the number they actually mean doesn’t fit the pattern. “Three and a half nines” means 0.9995, but\n\n• $$1 - 10^{-3.5} \\approx 0.9996838$$, and going the other way,\n• $$0.9995 \\approx 1 - 10^{-3.30103}$$.\n\nWe could resolve this difficulty by saying “3.3ish nines” when we mean 0.9995, or by meaning ~0.9996838 when we say “three and a half nines.” But there’s at least one function that fits the half-nines points as well!\n\nLet’s start with the function above: $$f(n) = 1 - 10^{-n}.$$ For every odd integer, it just has to be lower by a small, correspondingly decreasing amount. We can do this by increasing the exponent of 10 by \\begin{align}k &= 0.5 + \\log_{10}(0.5) \\\\ &\\approx 0.19897.\\end{align}\n\nOne function for introducing a perturbation for halfodd integers is $$p(n) = \\sin^2(\\pi n).$$ When n is a whole integer, $$p(n) = 0$$, and when $$n$$ is half an odd integer, $$p(n) = 1$$. Multiply this function by some constant and you’re in business.\n\nThus, define a new function $$g(n)$$ for all $$n$$:\n\n$$g(n) := 1 - 10^{-n + k p(n)}$$\n\ni.e.\n\n$$g(n) = 1 - 10^{-n + (0.5 + \\log_{10}(0.5))\\sin^2(\\pi n)}$$\n\nwhich, when plotted, looks like this:",
null,
"a negative exponential curve with a negative exponential wiggle. And it has the desired property that at every integer and half-integer it has a value with the traditional number of nines and trailing five (or not)."
]
| [
null,
"https://storage.googleapis.com/static.joshdeprez.com/post/67/diagram1.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.81516707,"math_prob":0.99983776,"size":1932,"snap":"2022-05-2022-21","text_gpt3_token_len":605,"char_repetition_ratio":0.11825726,"word_repetition_ratio":0.012158055,"special_character_ratio":0.36542442,"punctuation_ratio":0.14319809,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99947315,"pos_list":[0,1,2],"im_url_duplicate_count":[null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-28T07:43:49Z\",\"WARC-Record-ID\":\"<urn:uuid:5ee909fc-c2a5-4ab1-846a-b280a6b487e1>\",\"Content-Length\":\"13037\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fe376386-2762-4f27-a641-b5a13c4a45d9>\",\"WARC-Concurrent-To\":\"<urn:uuid:fa42f1aa-f5c5-457e-863c-c075cd835488>\",\"WARC-IP-Address\":\"216.239.32.21\",\"WARC-Target-URI\":\"https://joshdeprez.com/67\",\"WARC-Payload-Digest\":\"sha1:PRNUCUDIUGVWWL42SMQWIELBTV4YYKEI\",\"WARC-Block-Digest\":\"sha1:CNPKMIGUBZRIZPZSZFORANGDJG7SE6GU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320305423.58_warc_CC-MAIN-20220128074016-20220128104016-00043.warc.gz\"}"} |
https://www.askiitians.com/forums/Integral-Calculus/what-will-be-the-integration-of-e-x-2-solution_255031.htm | [
"",
null,
"×",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"#### Thank you for registering.\n\nOne of our academic counsellors will contact you within 1 working day.\n\nClick to Chat\n\n1800-1023-196\n\n+91-120-4616500\n\nCART 0\n\n• 0\n\nMY CART (5)\n\nUse Coupon: CART20 and get 20% off on all online Study Material\n\nITEM\nDETAILS\nMRP\nDISCOUNT\nFINAL PRICE\nTotal Price: Rs.\n\nThere are no items in this cart.\nContinue Shopping\n```\nwhat will be the integration of e^(x^2) ? solution should be with taking care of 12 th standard student\n\n```\none year ago\n\n```\t\t\t\t\t\t\t2*X*e^(x^2)The usual differentiation of e^x is e^x, this is the formula we'll use here.As the term to be differentiated is e^(x^2)On differentiating it would be e^(x^2) * (differentiation of x^2)Differentiation of x^2 is 2xSo the answer is 2x*e^(x^2)Edit: I'm sry I didn't see that.Integration of E^(x^2) would be (e^(x^2))/2xThe same logic applies here the only difference is we divide the term rather than multiplying it.Formula is integral of e^xis E^xIntegral of e^(x^2) would be (e^(x^2)) divided by (differentiation of x^2)\n```\none year ago\n```\t\t\t\t\t\t\tDear student ere is no elementary function that describes the antiderivative of e^x^2. We can, however, express this integral in terms of an infinite series.e^x=1+x+x^2/2!+x^3/3!+x^4/4!+⋯= ∑ n=0to ∞ x^n/n!ex^2= ∑n=0 to ∞ x^2n/n!∫∑ n=0 to ∞ x^2n/n!dx = ∑n=0 to ∞ x^(2n+1) /(2n+1)n! Hence,∫e^x^2 dx = ∑n=0 to ∞ x^(2n+1)/(2n+1)n!\n```\none year ago\nThink You Can Provide A Better Answer ?\n\n## Other Related Questions on Integral Calculus\n\nView all Questions »",
null,
"",
null,
"### Course Features\n\n• 731 Video Lectures\n• Revision Notes\n• Previous Year Papers\n• Mind Map\n• Study Planner\n• NCERT Solutions\n• Discussion Forum\n• Test paper with Video Solution",
null,
"",
null,
"### Course Features\n\n• 51 Video Lectures\n• Revision Notes\n• Test paper with Video Solution\n• Mind Map\n• Study Planner\n• NCERT Solutions\n• Discussion Forum\n• Previous Year Exam Questions"
]
| [
null,
"https://www.askiitians.com/resources/images/badge.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/user.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/envelope.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/phone-receiver.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/reading.png",
null,
"https://www.askiitians.com/Resources/images/neet-iit/reading.png",
null,
"https://files.askiitians.com/static/ecom/cms/bottom/engineering-full-course.png",
null,
"https://www.askiitians.com/Resources/images/youtube_placeholder.jpg",
null,
"https://files.askiitians.com/static/ecom/cms/right/calculus.jpg",
null,
"https://www.askiitians.com/Resources/images/youtube_placeholder.jpg",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8960675,"math_prob":0.93529403,"size":2113,"snap":"2020-45-2020-50","text_gpt3_token_len":698,"char_repetition_ratio":0.16832621,"word_repetition_ratio":0.2559524,"special_character_ratio":0.30383343,"punctuation_ratio":0.072649576,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99705994,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-02T00:01:30Z\",\"WARC-Record-ID\":\"<urn:uuid:e176f35e-0d65-4db3-9ff3-9a4f1adb1c0c>\",\"Content-Length\":\"231666\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5ff37181-7d63-473f-b0e3-246400377947>\",\"WARC-Concurrent-To\":\"<urn:uuid:2f55f5f2-e8c6-46c6-88a4-0fd11e41dd58>\",\"WARC-IP-Address\":\"3.7.36.8\",\"WARC-Target-URI\":\"https://www.askiitians.com/forums/Integral-Calculus/what-will-be-the-integration-of-e-x-2-solution_255031.htm\",\"WARC-Payload-Digest\":\"sha1:GZ47CHGUAGMY4U5QT6QPUWKF6ATVIEFQ\",\"WARC-Block-Digest\":\"sha1:KWG7LACXWJK3TWSYQQ4LSB3SJI7MVI3U\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141685797.79_warc_CC-MAIN-20201201231155-20201202021155-00192.warc.gz\"}"} |
https://nhigham.com/2020/07/28/what-is-the-polar-decomposition/?shared=email&msg=fail | [
"## What is the Polar Decomposition?\n\nA polar decomposition of",
null,
"$A\\in\\mathbb{C}^{m \\times n}$ with",
null,
"$m \\ge n$ is a factorization",
null,
"$A = UH$, where",
null,
"$U\\in\\mathbb{C}^{m \\times n}$ has orthonormal columns and",
null,
"$H\\in\\mathbb{C}^{n \\times n}$ is Hermitian positive semidefinite. This decomposition is a generalization of the polar representation",
null,
"$z = r \\mathrm{e}^{\\mathrm{i}\\theta}$ of a complex number, where",
null,
"$H$ corresponds to",
null,
"$r\\ge 0$ and",
null,
"$U$ to",
null,
"$\\mathrm{e}^{\\mathrm{i}\\theta}$. When",
null,
"$A$ is real,",
null,
"$H$ is symmetric positive semidefinite. When",
null,
"$m = n$,",
null,
"$U$ is a square unitary matrix (orthogonal for real",
null,
"$A$).\n\nWe have",
null,
"$A^*A = H^*U^*UH = H^2$, so",
null,
"$H = (A^*\\!A)^{1/2}$, which is the unique positive semidefinite square root of",
null,
"$A^*A$. When",
null,
"$A$ has full rank,",
null,
"$H$ is nonsingular and",
null,
"$U = AH^{-1}$ is unique, and in this case",
null,
"$U$ can be expressed as",
null,
"$U = \\displaystyle\\frac{2}{\\pi} A \\displaystyle\\int_{0}^{\\infty} (t^2I+A^*\\!A)^{-1}\\, \\mathrm{d}t.$\n\nAn example of a polar decomposition is",
null,
"$A = \\left[\\begin{array}{@{}rr} 4 & 0\\\\ -5 & -3\\\\ 2 & 6 \\end{array}\\right] = \\sqrt{2}\\left[\\begin{array}{@{}rr} \\frac{1}{2} & -\\frac{1}{6}\\\\[\\smallskipamount] -\\frac{1}{2} & -\\frac{1}{6}\\\\[\\smallskipamount] 0 & \\frac{2}{3} \\end{array}\\right] \\cdot \\sqrt{2}\\left[\\begin{array}{@{\\,}rr@{}} \\frac{9}{2} & \\frac{3}{2}\\\\[\\smallskipamount] \\frac{3}{2} & \\frac{9}{2} \\end{array}\\right] \\equiv UH.$\n\nFor an example with a rank-deficient matrix consider",
null,
"$A = \\begin{bmatrix} 0 & 1 & 0 \\\\ 0 & 0 & 1 \\\\ 0 & 0 & 0 \\end{bmatrix},$\n\nfor which",
null,
"$A^*A = \\mathrm{diag}(0,1,1)$ and so",
null,
"$H = \\mathrm{diag}(0,1,1)$. The equation",
null,
"$A = UH$ then implies that",
null,
"$U = \\begin{bmatrix} 0 & 1 & 0 \\\\ 0 & 0 & 1 \\\\ \\theta & 0 & 0 \\end{bmatrix}, \\quad |\\theta| = 1,$\n\nso",
null,
"$U$ is not unique.\n\nThe polar factor",
null,
"$U$ has the important property that it is a closest matrix with orthonormal columns to",
null,
"$A$ in any unitarily invariant norm. Hence the polar decomposition provides an optimal way to orthogonalize a matrix. This method of orthogonalization is used in various applications, including in quantum chemistry, where it is called Löwdin orthogonalization. Most often, though, orthogonalization is done through QR factorization, trading optimality for a faster computation.\n\nAn important application of the polar decomposition is to the orthogonal Procrustes problem1",
null,
"$\\min \\bigl\\{\\, \\|A-BW\\|_F: W \\in \\mathbb{C}^{n\\times n},\\; W^*W = I \\,\\bigr\\},$\n\nwhere",
null,
"$A,B\\in\\mathbb{C}^{m\\times n}$ and the norm is the Frobenius norm",
null,
"$\\|A\\|_F^2 = \\sum_{i,j} |a_{ij}|^2$. This problem, which arises in factor analysis and in multidimensional scaling, asks how closely a unitary transformation of",
null,
"$B$ can reproduce",
null,
"$A$. Any solution is a unitary polar factor of",
null,
"$B^*\\!A$, and there is a unique solution if",
null,
"$B^*\\!A$ is nonsingular. Another application of the polar decomposition is in 3D graphics transformations. Here, the matrices are",
null,
"$3\\times 3$ and the polar decomposition can be computed by exploiting a relationship with quaternions.\n\nFor a square nonsingular matrix",
null,
"$A$, the unitary polar factor",
null,
"$U$ can be computed by a Newton iteration:",
null,
"$X_{k+1} = \\displaystyle\\frac{1}{2} (X_k + X_k^{-*}), \\quad X_0 = A.$\n\nThe iterates",
null,
"$X_k$ converge quadratically to",
null,
"$U$. This is just one of many iterations for computing",
null,
"$U$ and much work has been done on the efficient implementation of these iterations.\n\nIf",
null,
"$A = P \\Sigma Q^*$ is a singular value decomposition (SVD), where",
null,
"$P\\in\\mathbb{C}^{m\\times n}$ has orthonormal columns,",
null,
"$Q\\in\\mathbb{C}^{n\\times n}$ is unitary, and",
null,
"$\\Sigma$ is square and diagonal with nonnegative diagonal elements, then",
null,
"$A = PQ^* \\cdot Q \\Sigma Q^* \\equiv UH,$\n\nwhere",
null,
"$U$ has orthonormal columns and",
null,
"$H$ is Hermitian positive semidefinite. So a polar decomposition can be constructed from an SVD. The converse is true: if",
null,
"$A = UH$ is a polar decomposition and",
null,
"$H = Q\\Sigma Q^*$ is a spectral decomposition (",
null,
"$Q$ unitary,",
null,
"$D$ diagonal) then",
null,
"$A = (UQ)\\Sigma Q^* \\equiv P \\Sigma Q^*$ is an SVD. This latter relation is the basis of a method for computing the SVD that first computes the polar decomposition by a matrix iteration then computes the eigensystem of",
null,
"$H$, and which is extremely fast on distributed-memory manycore computers.\n\nThe nonuniqueness of the polar decomposition for rank deficient",
null,
"$A$, and the lack of a satisfactory definition of a polar decomposition for",
null,
"$m < n$, are overcome in the canonical polar decomposition, defined for any",
null,
"$m$ and",
null,
"$n$. Here,",
null,
"$A = UH$ with",
null,
"$U$ a partial isometry,",
null,
"$H$ is Hermitian positive semidefinite, and",
null,
"$U^*U = HH^+$. The superscript “",
null,
"$+$” denotes the Moore–Penrose pseudoinverse and a partial isometry can be characterized as a matrix",
null,
"$U$ for which",
null,
"$U^+ = U^*$.\n\nGeneralizations of the (canonical) polar decomposition have been investigated in which the properties of",
null,
"$U$ and",
null,
"$H$ are defined with respect to a general, possibly indefinite, scalar product.\n\n## References\n\nThis is a minimal set of references, which contain further useful references within.\n\n## Footnotes:\n\n1\n\nProcrustes: an ancient Greek robber who tied his victims to an iron bed, stretching their legs if too short for it, and lopping them if too long.\n\nThis entry was posted in what-is. Bookmark the permalink."
]
| [
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8623869,"math_prob":0.99990225,"size":4336,"snap":"2020-34-2020-40","text_gpt3_token_len":954,"char_repetition_ratio":0.15858726,"word_repetition_ratio":0.020802377,"special_character_ratio":0.20364392,"punctuation_ratio":0.14762516,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99997616,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-11T10:01:05Z\",\"WARC-Record-ID\":\"<urn:uuid:da6ec223-ffcd-4393-a567-cf1f2c295dfd>\",\"Content-Length\":\"105209\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d897b33a-ff94-483f-9143-25c679ce13b4>\",\"WARC-Concurrent-To\":\"<urn:uuid:fdbb14c1-2c71-41bd-86e5-bc983ea645b4>\",\"WARC-IP-Address\":\"192.0.78.25\",\"WARC-Target-URI\":\"https://nhigham.com/2020/07/28/what-is-the-polar-decomposition/?shared=email&msg=fail\",\"WARC-Payload-Digest\":\"sha1:5TYJI6BIOJIXYHXIOPLKXQ7LTKOOBDER\",\"WARC-Block-Digest\":\"sha1:G2UZSRAN6NUUU5NJHI3ANOCXDQPHH6K6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738746.41_warc_CC-MAIN-20200811090050-20200811120050-00332.warc.gz\"}"} |
https://www.atlaspm.com/toms-tutorials-for-excel/toms-tutorials-for-excel-finding-the-lowest-positive-number/ | [
"# Tom’s Tutorials For Excel: Finding the Lowest Positive Number\n\nTom’s Tutorials For Excel: Finding the Lowest Positive Number\n\nHere’s how to return the lowest positive number in a list that has positive and negative numbers.\n\nIn the pictured example, the number 1 is returned in cell L3 because it happens to be the lowest number above par (in column C) in the list of this year’s Masters Golf Tournament final scores.\n\nThe array formula in cell L3 is `=MIN(IF(C4:C50>0,C4:C50))`.\n\nRecall, an array formula is applied to a cell by simultaneously pressing the `Ctrl+Shift+Enter` keys, not just `Enter`. The curly braces are not typed in by you; Excel places them automatically when the array formula is properly applied.\n\nIf you are unfamiliar with array formulas, see my video and explanation of arrays here.",
null,
""
]
| [
null,
"https://www.atlaspm.com/wp-content/uploads/2013/05/LowestPositiveNumber.png",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8170771,"math_prob":0.91796774,"size":749,"snap":"2020-45-2020-50","text_gpt3_token_len":168,"char_repetition_ratio":0.12751678,"word_repetition_ratio":0.0,"special_character_ratio":0.22029373,"punctuation_ratio":0.098684214,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9514345,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-23T16:54:29Z\",\"WARC-Record-ID\":\"<urn:uuid:1f815be0-8595-460c-9f04-51f852115e28>\",\"Content-Length\":\"37152\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8fc0cada-2356-49fc-a9b2-9556de3b5edb>\",\"WARC-Concurrent-To\":\"<urn:uuid:02ec6de2-c46c-4b21-8f14-ca94331c47de>\",\"WARC-IP-Address\":\"35.206.122.229\",\"WARC-Target-URI\":\"https://www.atlaspm.com/toms-tutorials-for-excel/toms-tutorials-for-excel-finding-the-lowest-positive-number/\",\"WARC-Payload-Digest\":\"sha1:NBA5PT3W6CGMVBZB54WEYD5ITWIV3CLE\",\"WARC-Block-Digest\":\"sha1:QDKDCEGQPQ2WNXLMRMPSOQJOIPZRTVZT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141163411.0_warc_CC-MAIN-20201123153826-20201123183826-00708.warc.gz\"}"} |
https://www.gradesaver.com/textbooks/math/algebra/elementary-algebra/chapter-2-real-numbers-2-5-translating-from-english-to-algebra-problem-set-2-5-page-81/58 | [
"## Elementary Algebra\n\n$10d+5n+p$\nWe multiply $10$ by $d$ because each dime is worth $10$ cents; we multiply $5$ by $n$ because each nickel is worth $5$ cents; and we multiply $1$ by $p$ because each penny is worth $1$ cent. We then must add these three numbers to get the total number of cents that she has in her bank. This gives us $10d+5n+1p$, which is equal to $10d+5n+p$."
]
| [
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.96044755,"math_prob":1.0000074,"size":379,"snap":"2020-24-2020-29","text_gpt3_token_len":119,"char_repetition_ratio":0.13066667,"word_repetition_ratio":0.0,"special_character_ratio":0.3298153,"punctuation_ratio":0.071428575,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99997103,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-02T01:15:00Z\",\"WARC-Record-ID\":\"<urn:uuid:909d647d-8a25-4b6a-8d53-aa9ee0575294>\",\"Content-Length\":\"70760\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:957672b7-eba1-41cc-8e18-188465607b12>\",\"WARC-Concurrent-To\":\"<urn:uuid:7f0a00c8-2f6b-4419-a19b-c28090c613f8>\",\"WARC-IP-Address\":\"34.233.239.84\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/math/algebra/elementary-algebra/chapter-2-real-numbers-2-5-translating-from-english-to-algebra-problem-set-2-5-page-81/58\",\"WARC-Payload-Digest\":\"sha1:FGROYM35W7V45ZKOT5TRX6Z3HE5LRDTT\",\"WARC-Block-Digest\":\"sha1:2EYUSJVUR2CF5EAS2HZVHB3FWKEBHMYI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347422065.56_warc_CC-MAIN-20200602002343-20200602032343-00191.warc.gz\"}"} |
https://statisticstutorhelp.com/percentile-rank-calculator/ | [
"",
null,
"## Percentile Rank Calculator\n\nPercentile Rank Calculator\n\n# Percentile Rank Calculator\n\nEnter Coma or space separated data values:\n\nEnter value to calculate percentile rank for:\n\n## What is a percentile rank calculator?\n\nA percentile rank calculator is a useful tool for analyzing data and understanding the distribution of values within a dataset. It allows you to determine the percentile rank of a particular value, which is the percentage of values in the dataset that fall below that value. This can provide valuable insights into the characteristics of the data and help you compare values within a dataset or to a reference value.\n\n## How do you use a percentile rank calculator?\n\nTo use a percentile rank calculator, you will typically need to input the data values that you want to analyze. Some calculators allow you to input the data manually, while others may require you to upload a file or copy and paste the data from a spreadsheet. Once you have entered the data, you can specify the value that you want to calculate the percentile rank for, and the calculator will provide you with the corresponding result.\n\n## What are some applications of a percentile rank calculator?\n\nThere are many applications for percentile rank calculators. For example, you could use a percentile rank calculator to:\n\n• Determine the distribution of values within a dataset\n• Compare values within a dataset to a reference value\n• Understand how common or rare a particular value is within the data\n• Determine the relative standing of a particular value within a dataset\n• Analyze trends or patterns in the data over time\n\nIn addition to these general uses, there are also specialized percentile rank calculators available for specific applications, such as for grades or standardized test scores. These calculators allow you to compare your scores to those of other students or test-takers, giving you a better understanding of your performance relative to others.\n\n## Conclusion\n\nWhether you are a student, researcher, or professional working with data, a percentile rank calculator can be a valuable tool for understanding the characteristics of a dataset and making informed decisions based on the data. By determining the percentile rank of a particular value, you can better understand its position within the data and draw meaningful conclusions from it.\n\n## Other Free Calculators\n\n Five Number Summary Calculator Fraction Calculator Algebra Calculator Standard Deviation Calculator Hours Calculator Square Root Calculator Slope Calculator Quadratic Formula Calculator Math Calculator Simplify Calculator Triangle Calculator Pythagorean Theorem Calculator Average Calculator Z Score Calculator Probability Calculator Exponent Calculator Matrix Calculator System Of Equations Calculator P Value Calculator Inequality Calculator Correlation Coefficient Calculator Confidence Interval Calculator Regression Equation Calculator Slope Intercept Form Calculator Mixed Number Calculator Mean Calculator Solve For X Calculator Odds Calculator Log Calculator Fractions Calculator Cross Product Calculator Inverse Function Calculator Matrix Multiplication Calculator Polynomial Calculator Midpoint Calculator Median Calculator Future Value Calculator Distance Formula Calculator Equation Calculator Variance Calculator Variance Calculator Combination Calculator Money Calculator Determinant Calculator Eigenvalue Calculator Margin Of Error Calculator Inverse Matrix Calculator Rref Calculator Permutation Calculator Domain And Range Calculator Test Statistic Calculator Descriptive Statistics Calculator\n•\n0 k\n\n0 +\n\n0 %\n\n0 k\n\n### Happy Clients\n\nLet us know your requirements, we will get in touch with you shortly.\n\n## Order Now\n\n### Get a FREE Quote\n\nBlank Form (#3)\n\nStatistics Help Tutor is an assignment help and tutoring company. Our subject matter experts are highly-qualified and experienced. Our company can solve all your academic queries and help you in getting the best possible grades.\n\n# Our Services\n\n##### Connect\n\[email protected]\n\n+918799706191\n\nerror: Content is protected !!\n\nAutomated page speed optimizations for fast site performance"
]
| [
null,
"data:image/svg+xml;nitro-empty-id=NTk2Ojc4MQ==-1;base64,PHN2ZyB2aWV3Qm94PSIwIDAgNTY4IDgyIiB3aWR0aD0iNTY4IiBoZWlnaHQ9IjgyIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==",
null
]
| {"ft_lang_label":"__label__en","ft_lang_prob":0.8586915,"math_prob":0.9904928,"size":2204,"snap":"2023-40-2023-50","text_gpt3_token_len":402,"char_repetition_ratio":0.19863637,"word_repetition_ratio":0.028169014,"special_character_ratio":0.17785844,"punctuation_ratio":0.07310705,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9982842,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-29T02:26:44Z\",\"WARC-Record-ID\":\"<urn:uuid:dad3cb2a-e449-483e-a593-864869218a87>\",\"Content-Length\":\"382798\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:47dcd86b-0a70-44d0-bff9-ff0f34ee3efb>\",\"WARC-Concurrent-To\":\"<urn:uuid:f443d7ad-834f-4fc6-9be4-01cdca6d9f5d>\",\"WARC-IP-Address\":\"217.21.95.125\",\"WARC-Target-URI\":\"https://statisticstutorhelp.com/percentile-rank-calculator/\",\"WARC-Payload-Digest\":\"sha1:C6SFJNYQMLQYJZJEV5ZQBDFCFLNKQ7VK\",\"WARC-Block-Digest\":\"sha1:GKG7DUUTNH35KIJDHCXWP66GVNSRVNDI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100047.66_warc_CC-MAIN-20231129010302-20231129040302-00104.warc.gz\"}"} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.