URL
stringlengths
15
1.68k
text_list
listlengths
1
199
image_list
listlengths
1
199
metadata
stringlengths
1.19k
3.08k
https://infocenter-archive.sybase.com/help/topic/com.sybase.dc33621_33620_33619_1250/html/ptallbk/X17690.htm
[ "subq\n\nDescription\n\nIdentifies a subquery.\n\nSyntax\n\n( subq subquery_id\n)\n\nParameters\n\nsubquery_id\n\nis an integer identifying the subquery. In abstract plans, subquery numbering is based on the order of the leading parenthesis for the subqueries in a query.\n\nExamples\n\nExample 1\n\nselect c11 from t1\nwhere c12 =\n(select c21 from t2 where c22 = t1.c11)\n\n( nested\n( t_scan t1 )\n( subq 1\n( t_scan ( table t2 ( in ( subq 1 ) ) ) )\n)\n)\n\nA single nested subquery.\n\nExample 2\n\nselect c11 from t1\nwhere c12 =\n(select c21 from t2 where c22 = t1.c11)\nand c12 =\n(select c31 from t3 where c32 = t1.c11)\n\n( nested\n( nested\n( t_scan t1 )\n( subq 1\n( t_scan ( table t2 ( in ( subq 1 ) ) ) )\n)\n)\n( subq 2\n( t_scan ( table t3 ( in ( subq 2 ) ) ) )\n)\n)\n\nThe two subqueries are both nested in the main query.\n\nExample 3\n\nselect c11 from t1\nwhere c12 =\n(select c21 from t2 where c22 =\n(select c31 from t3 where c32 = t1.c11))\n\n( nested\n( t_scan t1 )\n( subq 1\n( nested\n( t_scan ( table t2 ( in ( subq 1 ) ) ) )\n( subq 2\n( t_scan ( table t3 ( in ( subq 2 ) ) ) )\n)\n)\n)\n)\n\nA level 2 subquery nested into a level 1 subquery nested in the main query.\n\nUsage\n\n• The subq operator has two meanings in an abstract plan expression:\n\n• Under a nested operator, it describes the attachment of a nested subquery to a table\n\n• Under an in operator, it describes the nesting of the base tables and views that the subquery contains\n\n• To specify the attachment of a subquery without providing a plan specification, use an empty hint:\n\n( nested\n( t_scan t1)\n( subq 1\n()\n)\n\n)\n\n• To provide a description of the abstract plan for a subquery, without specifying its attachment, specify an empty hint as the derived table in the nested operator:\n\n( nested\n()\n( subq 1\n(t_scan ( table t1 ( in ( subq 1 ) ) ) )\n)\n)\n\n• When subqueries are flattened to a join, the only reference to the subquery in the abstract plan is the identification of the table specified in the subquery:\n\nselect *\nfrom t2\nwhere c21 in (select c12 from t1)\n\n( nl_g_join\n( t_scan t1 )\n( t_scan ( table t2 ( in ( subq 1 ) ) ) )\n\n• When a subquery is materialized, the subquery appears in the store operation, identifying the table to be scanned during the materialization step:\n\nselect *\nfrom t1\nwhere c11 in (select max(c22) from t2 group by c21)\n\n( plan\n( store Worktab1\n( t_scan ( table t2 ( in ( subq 1 ) ) ) )\n)\n( nl_g_join\n( t_scan t1 )\n( t_scan ( work_t Worktab1 ) )\n)\n)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8266944,"math_prob":0.9102565,"size":2278,"snap":"2022-05-2022-21","text_gpt3_token_len":674,"char_repetition_ratio":0.22559367,"word_repetition_ratio":0.3824131,"special_character_ratio":0.34591746,"punctuation_ratio":0.065656565,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98558646,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-26T18:08:13Z\",\"WARC-Record-ID\":\"<urn:uuid:a355362a-6435-4767-90f0-059d512e1799>\",\"Content-Length\":\"5334\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:af8fe8f4-bc2a-40c9-b6e6-7d7bc2cdd0e8>\",\"WARC-Concurrent-To\":\"<urn:uuid:08e6535d-129d-40f4-ae5b-8d53321e4ad8>\",\"WARC-IP-Address\":\"20.82.47.20\",\"WARC-Target-URI\":\"https://infocenter-archive.sybase.com/help/topic/com.sybase.dc33621_33620_33619_1250/html/ptallbk/X17690.htm\",\"WARC-Payload-Digest\":\"sha1:LDKEC63TEPOUPIT6POKYZ3AYXWQRG77T\",\"WARC-Block-Digest\":\"sha1:ZT4ZNVFDPHAZAZ2ZA2URQW6QH4L4WAMX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304959.80_warc_CC-MAIN-20220126162115-20220126192115-00172.warc.gz\"}"}
https://www.physicsoverflow.org/1024/heisenberg-uncertainty-principle-scientific-prove?show=3446
[ "#", null, "Heisenberg Uncertainty Principle scientific prove\n\n+ 0 like - 2 dislike\n198 views\n\nHeisenberg's uncertainty principle states that: if the x-component of the momentum of a particle is measured with an uncertainty $$\\Delta \\vec p_x$$ then its x-position cannot, at same time, be measured more accurately than $$\\Delta\\vec x=\\frac {\\hbar}{2\\Delta\\vec p_x }$$ $$\\Delta\\vec x\\Delta\\vec p_x \\ge \\frac {\\hbar}{2}$$ what is scientific prove of this principle?\n\nThis post has been migrated from (A51.SE)\nClosed as per community consensus as the post is High school level question; too low-level for PhysicsOverflow\nasked Apr 20, 2012\nrecategorized Apr 22, 2014\nThis is a standard textbook question, so I am moving it to physics.SE. Moreover, when refer to a component of a vector then you drop the arrow.\n\nThis post has been migrated from (A51.SE)\n\n## 1 Answer\n\n+ 0 like - 0 dislike\n\nThis is, as mentioned by Piotr Migdal, in the comments, standard textbook material.\n\nIn Matrix Mechanics, observables like position and momentum are promoted to operators. Obviously, multiplication of operators need not commute. Specifically, the difference is given by the commutator bracket:\n\n$\\left[ X, P\\right] = XP-PX=i\\hbar I$\n\nwhere I is the identity matrix.\n\nTherefore, there have to be uncertainties (standard deviation after taking an infinite number of measurements) in X and P and it should be intuitive that:\n\n${\\sigma _x}{\\sigma _p} \\ge k\\hbar$\n\nFor some scalar (constant) value of k. So far, everything applies to any pair of such dynamical variables, like position and momentum. It happens to be, however, that specifically for position and momentum, k is $\\frac12$. This can be derived from special cases, c.f. Feynman, Hibbs and Styer, who derive this in the first chapter through special cases.\n\nOne may also derive it through the wave interpretation, through Fourier transforms, and stuff; see Wikipedia.\n\nanswered Feb 22, 2014 by (1,975 points)" ]
[ null, "https://www.physicsoverflow.org/qa-plugin/po-printer-friendly/print_on.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8972796,"math_prob":0.9622873,"size":1027,"snap":"2021-04-2021-17","text_gpt3_token_len":236,"char_repetition_ratio":0.09481916,"word_repetition_ratio":0.0,"special_character_ratio":0.22297955,"punctuation_ratio":0.16410257,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9982885,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-11T07:24:45Z\",\"WARC-Record-ID\":\"<urn:uuid:b8bead2a-1f08-41ad-aab9-9b420fb7a209>\",\"Content-Length\":\"109203\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:32951587-702b-471e-aefe-4d87ae55b312>\",\"WARC-Concurrent-To\":\"<urn:uuid:37fa6478-e448-457b-bc1c-d889fa0148bf>\",\"WARC-IP-Address\":\"129.70.43.86\",\"WARC-Target-URI\":\"https://www.physicsoverflow.org/1024/heisenberg-uncertainty-principle-scientific-prove?show=3446\",\"WARC-Payload-Digest\":\"sha1:SK3756EATHCNLLNLDGOCICAHT4UXZ76C\",\"WARC-Block-Digest\":\"sha1:LKQRIK5LITVTLLSVXJQPJC5CORYGOHFP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038061562.11_warc_CC-MAIN-20210411055903-20210411085903-00154.warc.gz\"}"}
http://trevorius.com/scrapbook/blog/page/3/
[ "# Python dependency graph\n\nBeware, code heavy post\nNode graphs are a great way to express relationships and logical flow between objects, both for code design and 3D scenes. Where a tree can only express single parent-child relationships, a node graph can show a hierarchy and then display how one object has a look-at logic to look at another object entirely.", null, "This can be done for almost any type of data, and a dependency graph is an evaluation model that tries to evaluate as little of the graph as possible. An evaluation model is the way our code traverses the graph’s data to compute the end result.\n\nA dependency graph works by lazily computing data and by storing the “dirty” state of each attribute (dirty meaning something has been changed since the last calculation of this attribute). I’ll try to illustrate with this animation of 2 colors being mixed. When an input changes it propagates that change by “dirtying” all downstream dependencies (red).\n\nWhen a value is requested, input wires are followed and for outputs the node is computed (yellow), but only if the attribute is “dirty”, else we just use the cached state (green).\n\n### So to sum it up in a few simple rules:\n\nTo keep it simple I’ll say “if an input on a node changes all its outputs are dirty”, which means nodes should be quite granular as having inputs that only change part of the outputs will waste computation.\n\nAlso any connection going out of an attribute (whether it is an input feeding another input directly or an output feeding another input) will dirty all targets. These 2 simple rules result in recursive dirtying of all the right inputs and outputs throughout the graph.\n\nWhen a value is requested its cached value is returned unless it’s “dirty“ in which case (for outputs) the node will be computed or (for inputs) the other side of the connection will be queried, which results in this rule applying recursively and the minimal graph being computed to get the right value in the end.\n\n### Coding it\n\nNow with that theory out of the way, I’ve written some python to do exactly this. First let’s take a look at the initial data structure. A plug must understand connections, ownership, dirty-state and retain an internal value (e.g. the result of computing an output, or just a constant value for an input that is not connected to anything).\n\n```class Plug(object):\ndef __init__(self, name, node, isComputed):\nself.__name = name # really used for debugging only\nself.__node = node # the parent node this plug belongs to\nself.__isComputed = isComputed # make this an output-plug\nself.__isDirty = isComputed # upstream dependencies changed? computed plug always have dependencies on creation\nself.__cache = None # last computed value for outputs, user set value for inputs\nself.__sources = [] # plugs we depend on\nself.__targets = [] # plugs we feed into\n\ndef clean(self):\nself.__isDirty = False\n\nclass DependNode(object):\ndef __init__(self, computeFunc=None):\nself.__plugs = OrderedDict() # list of node plugs, dict key should match plug name\nself._computeFunc = computeFunc # logic implementation, should be a callable that accepts this DependNode instance as only argument\n\ndef compute(self):\n# call compute function if node has logic\nif self._computeFunc is not None:\nself._computeFunc(self)\n\n# clean all plugs\nfor plug in self.__plugs.itervalues():\nplug.clean()\n\nself.__plugs[name] = Plug(name, self, isComputed=False)\n\nself.__plugs[name] = Plug(name, self, isComputed=True)\n```\n\nThis template allows us to set up a basic node with inputs and outputs and to provide a custom function to calculate this node’s outputs.\n\n```const = DependNode()\n```\n\nThe next step is to allow setting a value to a specific plug. To do this, I’ll use some meta-programming to make the resulting code more readable. Implementing __getattr__ and __setattr__ on the DependNode as well as value() and setValue() on the plug to alter the Plug.__cache:\n\n```# Added to the end of the Plug class:\ndef value(self):\nreturn self.__cache\n\ndef setValue(self, value):\nself.__cache = value\n\n# Added to the end of the DependNode class:\ndef __getattr__(self, name):\nreturn self.__plugs[name].value()\n\ndef __setattr__(self, name, value):\nif name not in ('_DependNode__plugs', '_DependNode__computeFunc'): # To enable setting attrs in __init__ we must revert to default behaviour for those atrtibute names, notice how mangled names are required for private attributes.\nreturn self.__plugs[name].setValue(value)\nreturn super(DependNode, self).__setattr__(name, value)\n```\n\nNow we can do this and see the internal state reflected properly:\n\n```const.value = 2.0\n```\n\nThe next step I suppose is to create a simple “add” node which sums up its inputs. To do this we’ll have to add connections. I’ll implement this on the Plug class, where a plugs sources and targets are managed implicitly:\n\n``` def addSource(self, sourcePlug):\nif sourcePlug not in self.__sources:\nself.__sources.append(sourcePlug)\nsourcePlug.__targets.append(self)\n\ndef removeSource(self, sourcePlug):\nif sourcePlug in self.__sources:\nself.__sources.remove(sourcePlug)\nsourcePlug.__targets.remove(self)\n```\n\nThe next step is to start implementing some of our rules. First rule we need is: compute when we are dirty. This I do in Plug.value().\n\n``` def value(self):\nif self.__isDirty:\n# we are going to get clean, set clean beforehand so the compute function can get other plug values without recursively triggering compute again.\nself.__isDirty = False\n# compute dirty output\nif self.__isComputed:\nself.__node.compute()\n# fetch dirty input connection\nelif self.__sources:\nself.__cache = [source.value() for source in self.__sources]\n# plug is clean now\nself.clean()\n# return internal state\nreturn self.__cache\n```\n\nSo now outputs are computed, inputs return their sources, all this is cached on the plug so it only computes when dirty is true.\nThe next step is to actually set and propagate the dirty state. So whenever we set a value, set a source, or a plug gets dirtied: all outgoing connections are dirtied. When the dirty happens to an input, the node’s outputs are dirtied. See the _dirty implementation below for the Plug class. The setValue and add- removeSource functions just get a _dirty call in the end.\n\n```# modifications to Plug\ndef setValue(self, value):\nself.__cache = value\nself._dirty()\n\nif sourcePlug not in self.__sources:\nself.__sources.append(sourcePlug)\nsourcePlug.__targets.append(self)\nself._dirty()\n\ndef removeSource(self, sourcePlug):\nif sourcePlug in self.__sources:\nself.__sources.remove(sourcePlug)\nsourcePlug.__targets.remove(self)\nself._dirty()\n\ndef _isComputed(self):\nreturn self.__isComputed\n\ndef _dirty(self):\nif self.__isDirty:\nreturn\nself.__isDirty = True\n\n# dirty plugs that are computed based on this plug\nif not self.__isComputed:\nfor plug in self.__node.iterPlugs():\nif plug._isComputed():\nplug._dirty()\n\n# dirty plugs that use this plug as source\nfor plug in self.__targets:\nplug._dirty()\n\n# the DependNode class also gets this iterPlugs implementation\ndef iterPlugs(self):\nreturn self.__plugs.itervalues()\n```\n\nWhew, now after all that we should be able to run this test to add 2 and 4 together using 3 nodes:\n\n```const = DependNode()\nconst.value = 2.0\n\nconst2 = DependNode()\nconst2.value = 4.0\n\nnode.output = sum(node.inputs)\n\n```\n\nHere is a slightly more interesting example of a pointOnCurve node that computes a point on a bezier segment and feeds it to a different node:\n\n```def pointOnCurve(node):\n# interpolate a 2D bezier segment with t=node.parameter\ncvs = node.cvs2\nt = node.parameter\nr = [0, 0]\nfor i in xrange(2):\na, b, c = cvs[i] - cvs[i], cvs[i] - cvs[i], cvs[i] - cvs[i]\nd = b - a\na, b, c, d = c - b - d, d + d + d, a + a + a, cvs[i]\nr[i] = (t * (t * (t * a + b) + c) + d)\nnode.point = tuple(r)\n\ntimeNode = DependNode()\ntimeNode.time = 0.0\n\ncurveNode = DependNode()\ncurveNode.cvs = ((0.0, 0.0), (0.2, 0.0), (0.0, 0.2), (0.2, 0.2))\n\npointOnCurveNode = DependNode(pointOnCurve)\n\ntransform = DependNode()\n\nprint transform.translate\ntimeNode.time = 0.5\nprint transform.translate\n```\n\nNow there are 2 more improvements I want to add. First whenever a plug has sources, there is no real need to cache the result. We can just directly read from the sources and save ourselves a bunch of copying. Second I want to be able to alter an input plug temporarily. Imagine an interface with a point moving over time, it may be nice to alter that point by hand to e.g. feed that back in some animation system. In this case it is important for us to set the translate of a transform without it jumping back to the source time as soon as we redraw (which would read the translate attribute).\n\nFirst I edit Plug.value() to use the cache only for computed data.\nNow that __cache is freed up I plan to use it for the user-override. So if a cache is available I want to use it at all times.\nNext I return sources if available, else cache again which should in this case be computed.\n\nNext in Plug._dirty() I only dirty computed plugs, and I set the cache to None if the plug as sources coming in. This will result in a small problem with Plug.setValue: it currently caches the value and then dirties the plug. That means that on input plugs the cache is set to None immediately. I just swap those 2 lines so my setValue sticks, and the user override also works.\n\n``` def value(self):\nif self.__isDirty and self.__isComputed:\n# compute dirty output\nif self.__isComputed:\nself.__node.compute()\n# plug is clean now\nself.clean()\n\n# override cache for input attributes to intervene with connections?\nif self.__cache is not None:\nreturn self.__cache\n\n# fetch input connection\nif self.__sources:\nreturn [source.value() for source in self.__sources]\n\nreturn self.__cache\n\ndef _dirty(self):\nif self.__isComputed:\n# don't dirty again\nif self.__isDirty:\nreturn\nself.__isDirty = True\nif self.__sources:\nself.__cache = None\n\n# dirty plugs that are computed based on this plug\nif not self.__isComputed:\nfor plug in self.__node.iterPlugs():\nif plug._isComputed():\nplug._dirty()\n\n# dirty plugs that use this plug as source\nfor plug in self.__targets:\nplug._dirty()\n\ndef setValue(self, value):\nself._dirty()\nself.__cache = value\n```\n\nUsing the previous example I can now see how overriding the parameter works until time is changed again making it use the source connection again:\n\n```print transform.translate\ntimeNode.time = 0.5\nprint transform.translate\npointOnCurveNode.parameter = 0.25\nprint transform.translate\ntimeNode.time = 0.5\nprint transform.translate\n```\n\nFull code:\n\n```from collections import OrderedDict\n\nclass Plug(object):\ndef __init__(self, name, node, isComputed):\nself.__name = name # really used for debugging only\nself.__node = node # the parent node this plug belongs to\nself.__isComputed = isComputed # make this an output-plug\nself.__isDirty = isComputed # upstream dependencies changed?\nself.__cache = None # last computed value for outputs, user set value for inputs\nself.__sources = [] # plugs we depend on\nself.__targets = [] # plugs we feed into\n\ndef clean(self):\nself.__isDirty = False\n\ndef value(self):\nif self.__isDirty and self.__isComputed:\n# compute dirty output\nif self.__isComputed:\nself.__node.compute()\n# plug is clean now\nself.clean()\n\n# override cache for input attributes to intervene with connections?\nif self.__cache is not None:\nreturn self.__cache\n\n# fetch input connection\nif self.__sources:\nreturn [source.value() for source in self.__sources]\n\nreturn self.__cache\n\ndef setValue(self, value):\nself._dirty()\nself.__cache = value\n\nif sourcePlug not in self.__sources:\nself.__sources.append(sourcePlug)\nsourcePlug.__targets.append(self)\nself._dirty()\n\ndef removeSource(self, sourcePlug):\nif sourcePlug in self.__sources:\nself.__sources.remove(sourcePlug)\nsourcePlug.__targets.remove(self)\nself._dirty()\n\ndef _isComputed(self):\nreturn self.__isComputed\n\ndef _dirty(self):\nif self.__isComputed:\n# don't dirty again\nif self.__isDirty:\nreturn\nself.__isDirty = True\nif self.__sources:\nself.__cache = None\n\n# dirty plugs that are computed based on this plug\nif not self.__isComputed:\nfor plug in self.__node.iterPlugs():\nif plug._isComputed():\nplug._dirty()\n\n# dirty plugs that use this plug as source\nfor plug in self.__targets:\nplug._dirty()\n\nclass DependNode(object):\ndef __init__(self, computeFunc=None):\nself.__plugs = OrderedDict() # list of node plugs, dict key should match plug name\nself.__computeFunc = computeFunc # logic implementation, should be a callable that accepts this DependNode instance as only argument\n\ndef iterPlugs(self):\nreturn self.__plugs.itervalues()\n\ndef compute(self):\n# call compute function if node has logic\nif self.__computeFunc is not None:\nself.__computeFunc(self)\n\n# clean all plugs\nfor plug in self.__plugs.itervalues():\nplug.clean()\n\nself.__plugs[name] = Plug(name, self, isComputed=False)\n\nself.__plugs[name] = Plug(name, self, isComputed=True)\n\ndef plug(self, name):\nreturn self.__plugs[name]\n\ndef __getattr__(self, name):\nreturn self.__plugs[name].value()\n\ndef __setattr__(self, name, value):\nif name not in ('_DependNode__plugs', '_DependNode__computeFunc'):\nreturn self.__plugs[name].setValue(value)\nreturn super(DependNode, self).__setattr__(name, value)\n\ndef pointOnCurve(node):\nprint 'compute'\n# interpolate a 2D bezier segment with t=node.parameter\ncvs = node.cvs2\nt = node.parameter\nr = [0, 0]\nfor i in xrange(2):\na, b, c = cvs[i] - cvs[i], cvs[i] - cvs[i], cvs[i] - cvs[i]\nd = b - a\na, b, c, d = c - b - d, d + d + d, a + a + a, cvs[i]\nr[i] = (t * (t * (t * a + b) + c) + d)\nnode.point = tuple(r)\n```\n\nNow I’ve also been working on sort of an entity-component based system on top of this graph, based on the PyOpenGL mesh renderer from a few posts back.\n\nIt allows me to create a scene graph based on Transforms and exported logic (using DependNodes like above) but also logical relationships which are not necessarily customizable, e.g. when rendering a camera I can query it’s entity, whose transform will provide the view matrix, without connecting these things. This creates a more classical (and less customizable) framework for render logic, but gives full control over the scene logic behind it through the dependency graph.\n\nUsing the point on curve example above and feeding it to a cube’s transform – while also implementing a timeline UI & 3D gizmo drawing – this fun thing came out:", null, "Now the next steps would probably involve adding shader support, file watchers and creating a more elaborate Maya exporter that supports various Maya nodes (Maya is also dependency graph based so it fits very well with this!) but I’m not sure if I’m going to keep working on this.\n\n# Improving a renderer", null, "This feeds into my previous write up on the tools developed for our 64kb endeavours.\n\nAfter creating Eidolon [Video] we were left with the feeling that the rendering can be a lot better. We had this single pass bloom and simple lambert & phong shading, no anti aliasing and very poor performing depth of field. Last the performance hit for reflections was through the roof as well.\n\nI started almost immediately with a bunch of improvements, most of this work was done within a month after Revision. Which shows in our newest demo Yermom [Video]. I’ll go over the improvements in chronological order and credit any sources used (of which there were a lot), if I managed to document that right…\n\nSomething useful to mention, all my buffers are Float32 RGBA.\n\n## Low-resolution reflections:\n\nBasically the scene is raymarched, for every pixel there is a TraceAndShade call to render the pixel excluding fog and reflection.\nFrom the result we do another TraceAndShade for the reflection. This makes the entire thing twice as slow when reflections are on.\nInstead I early out at this point if:\n`if(reflectivity == 0 || gl_FragCoord.x % 4 != 0 || gl_FragCoord.y % 4 != 0) return;`\nThat results in only 1 in 16 pixels being reflective. So instead of compositing the reflection directly I write it to a separate buffer.\nThen in a future pass I composite the 2 buffers, where I just do a look up in the reflection buffer like so:\n`texelFetch(uImages, ivec2(gl_FragCoord.xy)) + texelFetch(uImages, ivec2(gl_FragCoord.xy / 4) * 4)`\nIn my real scenario I removed that `* 4` and render to a 4 times smaller buffer instead, so reading it back results in free interpolation.\nI still have glitches when blurring the reflections too much & around edges in general. Definitely still room for future improvement.", null, "## Oren Nayar diffuse light response\n\nThe original paper and this image especially convinced me into liking this shading model for diffuse objects.", null, "So I tried to implement that, failed a few times, got pretty close, found an accurate implementation, realized it was slow, and ended on these 2 websites:\nhttp://www.popekim.com/2011/11/optimized-oren-nayar-approximation.html\n\nThat lists a nifty trick to fake it, I took away some terms as I realized they contributed barely any visible difference, so I got something even less accurate. I already want to revisit this, but it’s one of the improvements I wanted to share nonetheless.\n\n```float orenNayarDiffuse(float satNdotV, float satNdotL, float roughness)\n{\nfloat lambert = satNdotL;\nif(roughness == 0.0)\nreturn lambert;\nfloat softRim = saturate(1.0 - satNdotV * 0.5);\n\n// my magic numbers\nfloat fakey = pow(lambert * softRim, 0.85);\nreturn mix(lambert, fakey * 0.85, roughness);\n}```\n\n## GGX specular\n\nThere are various open source implementations of this. I found one here:\nIt talks about tricks to optimize things by precomputing a lookup texture, I didn’t go that far. There’s not much I can say about this, as I don’t fully understand the math and how it changes from the basic phong dot(N, H).\n\n```float G1V(float dotNV, float k){return 1.0 / (dotNV * (1.0 - k)+k);}\n\nfloat ggxSpecular(float NdotV, float NdotL, vec3 N, vec3 L, vec3 V, float roughness)\n{\nfloat F0 = 0.5;\n\nvec3 H = normalize(V + L);\nfloat NdotH = saturate(dot(N, H));\nfloat LdotH = saturate(dot(L, H));\nfloat a2 = roughness * roughness;\n\nfloat D = a2 / (PI * sqr(sqr(NdotH) * (a2 - 1.0) + 1.0));\nfloat F = F0 + (1.0 - F0) * pow(1.0 - LdotH, 5.0);\nfloat vis = G1V(NdotL, a2 * 0.5) * G1V(NdotV, a2 * 0.5);\nreturn NdotL * D * F * vis;\n}```", null, "## FXAA\n\nFXAA3 to be precise. There whitepaper is quite clear, still why bother writing it if it’s open source. I can’t remember which one I used, but here’s a few links:\nhttps://gist.github.com/kosua20/0c506b81b3812ac900048059d2383126\nhttps://github.com/vispy/experimental/blob/master/fsaa/fxaa.glsl\nPreprocessed and minified for preset 12 made it very small in a compressed executable. Figured I’d just share it.\n\n```#version 420\nuniform vec3 uTimeResolution;uniform sampler2D uImages;out vec4 z;float aa(vec3 a){vec3 b=vec3(.299,.587,.114);return dot(a,b);}\n#define bb(a)texture(uImages,a)\n#define cc(a)aa(texture(uImages,a).rgb)\n#define dd(a,b)aa(texture(uImages,a+(b*c)).rgb)\nvoid main(){vec2 a=gl_FragCoord.xy/uTimeResolution.yz,c=1/uTimeResolution.yz;vec4 b=bb(a);b.y=aa(b.rgb);float d=dd(a,vec2(0,1)),e=dd(a,vec2(1,0)),f=dd(a,vec2(0,-1)),g=dd(a,vec2(-1,0)),h=max(max(f,g),max(e,max(d,b.y))),i=h-min(min(f,g),min(e,min(d,b.y)));if(i<max(.0833,h*.166)){z=bb(a);return;}h=dd(a,vec2(-1,-1));float j=dd(a,vec2( 1,1)),k=dd(a,vec2( 1,-1)),l=dd(a,vec2(-1,1)),m=f+d,n=g+e,o=k+j,p=h+l,q=c.x;\nbool r=abs((-2*g)+p)+(abs((-2*b.y)+m)*2)+abs((-2*e)+o)>=abs((-2*d)+l+j)+(abs((-2*b.y)+n)*2)+abs((-2*f)+h+k);if(!r){f=g;d=e;}else q=c.y;h=f-b.y,e=d-b.y,f=f+b.y,d=d+b.y,g=max(abs(h),abs(e));i=clamp((abs((((m+n)*2+p+o)*(1./12))-b.y)/i),0,1);if(abs(e)<abs(h))q=-q;else f=d;vec2 s=a,t=vec2(!r?0:c.x,r?0:c.y);if(!r)s.x+=q*.5;else s.y+=q*.5;\nvec2 u=vec2(s.x-t.x,s.y-t.y);s=vec2(s.x+t.x,s.y+t.y);j=((-2)*i)+3;d=cc(u);e=i*i;h=cc(s);g*=.25;i=b.y-f*.5;j=j*e;d-=f*.5;h-=f*.5;bool v,w,x,y=i<0;\n#define ee(Q) v=abs(d)>=g;w=abs(h)>=g;if(!v)u.x-=t.x*Q;if(!v)u.y-=t.y*Q;x=(!v)||(!w);if(!w)s.x+=t.x*Q;if(!w)s.y+=t.y*Q;\n#define ff if(!v)d=cc(u.xy);if(!w)h=cc(s.xy);if(!v)d=d-f*.5;if(!w)h=h-f*.5;\nee(1.5)if(x){ff ee(2.)if(x){ff ee(4.)if(x){ff ee(12.)}}}e=a.x-u.x;f=s.x-a.x;if(!r){e=a.y-u.y;f=s.y-a.y;}q*=max((e<f?(d<0)!=y:(h<0)!=y)?(min(e,f)*(-1/(f+e)))+.5:0,j*j*.75);if(!r)a.x+=q;else a.y+=q;z=bb(a);}\n```", null, "## Multi pass bloom\n\nThe idea for this one was heavily inspired by this asset for Unity:\n\nhttps://www.assetstore.unity3d.com/en/#!/content/17324\n\nI’m quite sure the technique is not original, but that’s where I got the idea.\n\nThe idea is to downsample and blur at many resolutions and them combine the (weighted) results to get a very high quality full screen blur.\nSo basically downsample to a quarter (factor 2) of the screen using this shader:\n\n```#version 420\n\nuniform vec3 uTimeResolution;\n#define uTime (uTimeResolution.x)\n#define uResolution (uTimeResolution.yz)\n\nuniform sampler2D uImages;\n\nout vec4 outColor0;\n\nvoid main()\n{\noutColor0 = 0.25 * (texture(uImages, (gl_FragCoord.xy + vec2(-0.5)) / uResolution)\n+ texture(uImages, (gl_FragCoord.xy + vec2(0.5, -0.5)) / uResolution)\n+ texture(uImages, (gl_FragCoord.xy + vec2(0.5, 0.5)) / uResolution)\n+ texture(uImages, (gl_FragCoord.xy + vec2(-0.5, 0.5)) / uResolution));\n}```\n\nThen downsample that, and recurse until we have a factor 64\n\nAll the downsamples fit in the backbuffer, so in theory that together with the first blur pass can be done in 1 go using the backbuffer as sampler2D as well. But to avoid the hassle of figuring out the correct (clamped!) uv coordinates I just use a ton of passes.\n\nThen take all these downsampled buffers and ping pong them for blur passes, so for each buffer:\nHBLUR taking steps of 2 pixels, into a buffer of the same size\nVBLUR, back into the initial downsampled buffer\nHBLUR taking steps of 3 pixels, reuse the HBLUR buffer\nVBLUR, reuse the initial downsampled buffer\n\nThe pixel steps is given to uBlurSize, the direction of blur is given to uDirection.\n\n```#version 420\n\nout vec4 color;\n\nuniform vec3 uTimeResolution;\n#define uTime (uTimeResolution.x)\n#define uResolution (uTimeResolution.yz)\n\nuniform sampler2D uImages;\nuniform vec2 uDirection;\nuniform float uBlurSize;\n\nconst float curve = { 0.0205,\n0.0855,\n0.232,\n0.324,\n0.232,\n0.0855,\n0.0205 };\n\nvoid main()\n{\nvec2 uv = gl_FragCoord.xy / uResolution;\nvec2 netFilterWidth = uDirection / uResolution * uBlurSize;\nvec2 coords = uv - netFilterWidth * 3.0;\n\ncolor = vec4(0);\nfor( int l = 0; l < 7; l++ )\n{\nvec4 tap = texture(uImages, coords);\ncolor += tap * curve[l];\ncoords += netFilterWidth;\n}\n}```\n\nLast we combine passes with lens dirt. uImages is the original backbuffer, 1-6 is all the downsampled and blurred buffers, 7 is a lens dirt image.\nMy lens dirt texture is pretty poor, its just a precalced texture with randomly scaled and colored circles and hexagons, sometimes filled and sometimes outlines.\nI don’t think I actually ever used the lens dirt or bloom intensity as uniforms.\n\n```#version 420\n\nout vec4 color;\n\nuniform vec3 uTimeResolution;\n#define uTime (uTimeResolution.x)\n#define uResolution (uTimeResolution.yz)\n\nuniform sampler2D uImages;\nuniform float uBloom = 0.04;\nuniform float uLensDirtIntensity = 0.3;\n\nvoid main()\n{\nvec2 coord = gl_FragCoord.xy / uResolution;\ncolor = texture(uImages, coord);\n\nvec3 b0 = texture(uImages, coord).xyz;\nvec3 b1 = texture(uImages, coord).xyz * 0.6; // dampen to have less banding in gamma space\nvec3 b2 = texture(uImages, coord).xyz * 0.3; // dampen to have less banding in gamma space\nvec3 b3 = texture(uImages, coord).xyz;\nvec3 b4 = texture(uImages, coord).xyz;\nvec3 b5 = texture(uImages, coord).xyz;\n\nvec3 bloom = b0 * 0.5\n+ b1 * 0.6\n+ b2 * 0.6\n+ b3 * 0.45\n+ b4 * 0.35\n+ b5 * 0.23;\n\nbloom /= 2.2;\ncolor.xyz = mix(color.xyz, bloom.xyz, uBloom);\n\nvec3 lens = texture(uImages, coord).xyz;\nvec3 lensBloom = b0 + b1 * 0.8 + b2 * 0.6 + b3 * 0.45 + b4 * 0.35 + b5 * 0.23;\nlensBloom /= 3.2;\ncolor.xyz = mix(color.xyz, lensBloom, (clamp(lens * uLensDirtIntensity, 0.0, 1.0)));\n\ncolor.xyz = pow(color.xyz, vec3(1.0 / 2.2));\n}```\n\nWhite lines on a cube, brightness of 10.", null, "White lines on a cube, brightness of 300.", null, "## Sphere tracing algorithm\n\nInstead of a rather naive sphere tracing loop I used in a lot of 4kb productions and can just write by heart I went for this paper:\nhttp://erleuchtet.org/~cupe/permanent/enhanced_sphere_tracing.pdf\nIt is a clever technique that involves overstepping and backgracking only when necessary, as well as keeping track of pixel size in 3D to realize when there is no need to compute more detail. The paper is full of code snippets and clear infographics, I don’t think I’d be capable to explain it any clearer.", null, "## Beauty shots", null, "", null, "## Depth of field\n\nI initially only knew how to do good circular DoF, until this one came along: https://www.shadertoy.com/view/4tK3WK\nWhich I used initially, but to get it to look good was really expensive, because it is all single pass. Then I looked into a 3-blur-pass solution, which sorta worked, but when I went looking for more optimized versions I found this 2 pass one: https://www.shadertoy.com/view/Xd3GDl. It works extremely well, the only edge cases I found were when unfocusing a regular grid of bright points.\n\nHere’s what I wrote to get it to work with a depth buffer (depth based blur):\n\n```const int NUM_SAMPLES = 16;\n\nvoid main()\n{\nvec2 fragCoord = gl_FragCoord.xy;\n\nconst vec2 blurdir = vec2( 0.0, 1.0 );\nvec2 blurvec = (blurdir) / uResolution;\nvec2 uv = fragCoord / uResolution.xy;\n\nfloat z = texture(uImages, uv).w;\nfragColor = vec4(depthDirectionalBlur(z, CoC(z), uv, blurvec, NUM_SAMPLES), z);\n}```\n\nSecond pass:\n\n```const int NUM_SAMPLES = 16;\n\nvoid main()\n{\nvec2 uv = gl_FragCoord.xy / uResolution;\n\nfloat z = texture(uImages, uv).w;\n\nvec2 blurdir = vec2(1.0, 0.577350269189626);\nvec2 blurvec = normalize(blurdir) / uResolution;\nvec3 color0 = depthDirectionalBlur(z, CoC(z), uv, blurvec, NUM_SAMPLES);\n\nblurdir = vec2(-1.0, 0.577350269189626);\nblurvec = normalize(blurdir) / uResolution;\nvec3 color1 = depthDirectionalBlur(z, CoC(z), uv, blurvec, NUM_SAMPLES);\n\nvec3 color = min(color0, color1);\nfragColor = vec4(color, 1.0);\n}```\n\n```#version 420\n\n// default uniforms\nuniform vec3 uTimeResolution;\n#define uTime (uTimeResolution.x)\n#define uResolution (uTimeResolution.yz)\n\nuniform sampler2D uImages;\n\nuniform float uSharpDist = 15; // distance from camera that is 100% sharp\nuniform float uSharpRange = 0; // distance from the sharp center that remains sharp\nuniform float uBlurFalloff = 1000; // distance from the edge of the sharp range it takes to become 100% blurry\nuniform float uMaxBlur = 16; // radius of the blur in pixels at 100% blur\n\nfloat CoC(float z)\n{\nreturn uMaxBlur * min(1, max(0, abs(z - uSharpDist) - uSharpRange) / uBlurFalloff);\n}\n\nout vec4 fragColor;\n\n//note: uniform pdf rand [0;1)\nfloat hash1(vec2 p)\n{\np = fract(p * vec2(5.3987, 5.4421));\np += dot(p.yx, p.xy + vec2(21.5351, 14.3137));\nreturn fract(p.x * p.y * 95.4307);\n}\n\n#define USE_RANDOM\n\nvec3 depthDirectionalBlur(float z, float coc, vec2 uv, vec2 blurvec, int numSamples)\n{\n// z: z at UV\n// coc: blur radius at UV\n// uv: initial coordinate\n// blurvec: smudge direction\n// numSamples: blur taps\nvec3 sumcol = vec3(0.0);\n\nfor (int i = 0; i < numSamples; ++i)\n{\nfloat r =\n#ifdef USE_RANDOM\n(i + hash1(uv + float(i + uTime)) - 0.5)\n#else\ni\n#endif\n/ float(numSamples - 1) - 0.5;\nvec2 p = uv + r * coc * blurvec;\nvec4 smpl = texture(uImages, p);\nif(smpl.w < z) // if sample is closer consider it's CoC\n{\np = uv + r * min(coc, CoC(smpl.w)) * blurvec;\np = uv + r * CoC(smpl.w) * blurvec;\nsmpl = texture(uImages, p);\n}\nsumcol += smpl.xyz;\n}\n\nsumcol /= float(numSamples);\nsumcol = max(sumcol, 0.0);\n\nreturn sumcol;\n}```", null, "## Additional sources used for a longer time\n\n### Distance function library\n\nhttp://mercury.sexy/hg_sdf/\nA very cool site explaining all kinds of things you can do with this code. I think many of these functions were invented already, but with some bonusses as ewll as a very clear code style and excellent documentations for full accessibility.\nFor an introduction to this library:\n\n### Noise functions\n\nHashes optimized to only implement hash4() and the rest is just swizzling and redirecting, so a float based hash is just:\n\n```float hash1(float x){return hash4(vec4(x)).x;}\nvec2 hash2(float x){return hash4(vec4(x)).xy;}```\n\nAnd so on.\n\nVoronoi 2D\nVoronoi is great, as using the center distance we get worley noise instead, and we can track cell indices for randomization.\nThis is fairly fast, but still too slow to do realtime. So I implemented tileable 2D & 3D versions.\n\nPerlin\nLayering the value noise for N iterations, scaling the UV by 2 and weight by 0.5 in every iteration.\nThese could be controllable parameters for various different looks. A slower weight decrease results in a more wood-grain look for example.\n\n```float perlin(vec2 p, int iterations)\n{\nfloat f = 0.0;\nfloat amplitude = 1.0;\n\nfor (int i = 0; i < iterations; ++i)\n{\nf += snoise(p) * amplitude;\namplitude *= 0.5;\np *= 2.0;\n}\n\nreturn f * 0.5;\n}```\n\nNow the perlin logic can be applied to worley noise (voronoi center) to get billows. I did the same for the voronoi edges, all tileable in 2D and 3D for texture precalc. Here’s an example. Basically the modulo in the snoise function is the only thing necessary to make things tileable. Perlin then just uses that and keeps track of the scale for that layer.\n\n```float snoise_tiled(vec2 p, float scale)\n{\np *= scale;\nvec2 c = floor(p);\nvec2 f = p - c;\nf = f * f * (3.0 - 2.0 * f);\nreturn mix(mix(hash1(mod(c + vec2(0.0, 0.0), scale) + 10.0),\nhash1(mod(c + vec2(1.0, 0.0), scale) + 10.0), f.x),\nmix(hash1(mod(c + vec2(0.0, 1.0), scale) + 10.0),\nhash1(mod(c + vec2(1.0, 1.0), scale) + 10.0), f.x), f.y);\n}\nfloat perlin_tiled(vec2 p, float scale, int iterations)\n{\nfloat f = 0.0;\np = mod(p, scale);\nfloat amplitude = 1.0;\n\nfor (int i = 0; i < iterations; ++i)\n{\nf += snoise_tiled(p, scale) * amplitude;\namplitude *= 0.5;\nscale *= 2.0;\n}\n\nreturn f * 0.5;\n}```\n\n# Creating a tool to make a 64k demo\n\nIn the process of picking up this webpage again, I can talk about something we did quite a while ago. I, together with a team, went through the process of making a 64 kilobyte demo. We happened to win at one of the biggest demoscene events in europe. Revision 2017. I still feel the afterglow of happiness from that.\n\nIf you’re not sure what that is, read on, else, scroll down! You program a piece of software that is only 64 kb in size, that shows an audio-visual experience generated in realtime. To stay within such size limits you have to generate everything, we chose to go for a rendering technique called ray marching, that allowed us to put all 3D modeling, texture generation, lighting, etc. as ascii (glsl sources) in the executable. On top of that we used a very minimal (yet versatile) modular synthesizer called 64klang2. Internally it stores a kind of minimal midi data and the patches and it can render amazing audio in realtime, so it doesn’t need to pre-render the song or anything. All this elementary and small size data and code compiles to something over 200kb, which is then compressed using an executable packer like UPX or kkrunchy\n\nIt was called Eidolon. You can watch a video:\nhttps://youtu.be/rsZHBJdaz-Y\nhttp://www.pouet.net/prod.php?which=69669\n\nThe technologies used were fairly basic, it’s very old school phong & lambert shading, 2 blur passes for bloom, so all in all pretty low tech and not worth discussing. What I would like to discuss is the evolution of the tool. I’ll keep it high level this time though. Maybe in the future I can talk about specific implementations of things, but just seeing the UI will probably explain a lot of the features and the way things work.\n\n### Step 1: Don’t make a tool from scratch\n\nOur initial idea was to leverage existing software. One of our team members, who controlled the team besides modelling and eventually directing the whole creative result, had some experience with a real-time node based software called Touch Designer. It is a tool where you can do realtime visuals, and it supports exactly what we need: rendering into a 2D texture with a fragment shader.\n\nWe wanted to have the same rendering code for all scenes, and just fill in the modeling and material code that is unique per scene. We figured out how to concatenate separate pieces of text and draw them into a buffer. Multiple buffers even. At some point i packed all code and rendering logic of a pass into 1 grouped node and we could design our render pipeline entirely node based.", null, "Here you see the text snippets (1) merged into some buffers (2) and then post processed for the bloom (3). On the right (4) you see the first problem we hit with Touch Designer. The compiler error log is drawn inside this node. There is basically no easy way to have that error visible in the main application somewhere. So the first iteration of the renderer (and coincidentally the main character of Eidolon) looked something like this:", null, "The renderer didn’t really change after this.\n\nIn case I sound too negative about touch designer in the next few paragraphs, our use case was rather special, so take this with a grain of salt!\n\nWe have a timeline control, borrowed the UI design from Maya a little, so this became the main preview window. That’s when we hit some problems though. The software has no concept of window focus, so it’d constantly suffer hanging keys or responding to keys while typing in the text editor.\n\nLast issue that really killed it though: everything has to be in 1 binary file. There is no native way to reference external text files for the shader code, or merge node graphs. There is a really weird utility that expands the binary to ascii, but then literally every single node is a text file so it is just unmergeable.\n\n### Step 2: Make a tool\n\nSo then this happened:", null, "Over a week’s time in the evenings and then 1 long saturday I whipped this up using PyQt and PyOpenGL. This is the first screenshot I made, the curve editor isn’t actually an editor yet and there is no concept of camera shots (we use this to get hard cuts).\n\nIt has all the same concepts however, separate text files for the shader code, with an XML file determining what render passes use what files and in what buffer they render / what buffers they reference in turn. With the added advantage of the perfect granularity all stored in ascii files.\n\nSome files are template-level, some were scene-level, so creating a new scene actually only copies the scene-level fies which can them be adjusted in a text editor, with a file watcher updating the picture. The CurveEditor feeds right back into the uniforms of the shader (by name) and the time slider at the bottom is the same idea as Maya / what you saw before.\n\n### Step 3: Make it better\n\nRender pipeline\nThe concept was to set up a master render pipeline into which scenes would inject snippets of code. On disk this became a bunch of snippets, and an XML based template definition. This would be the most basic XML file:\n\n```<template>\n<pass buffer=\"0\" outputs=\"1\">\n<section path=\"scene.glsl\"/>\n<global path=\"pass.glsl\"/>\n</pass>\n<pass input0=\"0\">\n<global path=\"present.glsl\"/>\n</pass>\n</template>```\n\nThis will concatenated 3 files to 1 fragment shader, render into full-screen buffer “0” and then use present.glsl as another fragment shader, which in turn has the previous buffer “0” as input (forwarded to a sampler2D uniform).\n\nThis branched out into making static bufffers (textures), setting buffer sizes (smaller textures), multiple target buffers (render main and reflection pass at once), set buffer size to a portion of the screen (downsampling for bloom), 3D texture support (volumetric noise textures for cloud).\n\nCreating a new scene will just copy “scene.glsl” from the template to a new folder, there you can then fill out the necessary function(s) to get a unique scene. Here’s an example from our latest Evoke demo. 6 scenes, under which you see the “section” files for each scene.", null, "Camera control\nThe second important thing I wanted to tackle was camera control. Basically the demo will control the camera based on some animation data, but it is nice to fly around freely and even use the current camera position as animation keyframe. So this was just using Qt’s event system to hook up the mouse and keyboard to the viewport.", null, "I also created a little widget that displays where the camera is, has an “animation input or user input” toggle as well as a “snap to current animation frame” button.\n\nAnimation control\nSo now to animate the camera, without hard coding values! Or even typing numbers, preferably. I know a lot of people use a tracker-like tool called Rocket, I never used it and it looks an odd way to control animation data to me. I come from a 3D background, so I figured I’d just want a curve editor like e.g. Maya has. In Touch Designer we also had a basic curve editor, conveniently you can name a channel the same as a uniform, then just have code evaluate the curve at the current time and send the result to that uniform location.\nSome trickery was necessary to pack vec3s, I just look for channels that start with the same name and then end in .x, .y, .z, and possibly .w.", null, "Here’s an excerpt from a long camera shot with lots of movement, showing off our cool hermite splines. At the top right you can see we have several built in tangent modes, we never got around to building custom tangent editing. In the end this is more than enough however. With flat tangents we can create easing/acceleration, with spline tangents we can get continuous paths and with linear tangents we get continuous speed. Next to that are 2 cool buttons that allow us to feed the camera position to another uniform, so you can literally fly to a place where you want to put an object. It’s not as good as actual move/rotate widgets but for the limited times we need to place 3D objects it’s great.\n\nHard cuts\nApart from being impossible to represent in this interface, we don’t support 2 keys at identical times. This means that we can’t really have the camera “jump” to a new position instantly. With a tiny amount of curve inbetween the previous and the next shot position, the time cursor can actually render 1 frame of a random camera position. So we had to solve this. I think it is one of the only big features that you won’t see in the initial screenshot above actually.", null, "Introducing camera shots. A shot has its own “scene it should display” and its own set of animation data. So selecting a different shot yields different curve editor content. Shots are placed on a shared timeline, so scrolling through time will automatically show the right shot and setting a keyframe will automatically figure out the “shot local time” to put the key based on the global demo time. The curve editor has it’s own playhead that is directly linked to the global timeline as well so we can adjust the time in multiple places.\n\nWhen working with lots of people we had issues with people touching other people’s (work in progress) shots. Therefore we introduced “disabling” of shots. This way anyone could just prefix their shots and disable them before submitting, and we could mix and match shots from several people to get a final camera flow we all liked.", null, "Shots are also rendered on the timeline as colored blocks. The grey block underneath those is our “range slider”. It makes the top part apply on only a subsection of the demo, so it is easy to loop a specific time range, or just zoom in far enough to use the mouse to change the time granularly enough.\n\nThe devil is in the details\nSome things I overlooked in the first implementation, and some useful things I added only recently.\n1. Undo/Redo of animation changes. Not unimportant, and luckily not hard to add with Qt.\n2. Ctrl click timeline to immediately start animating that shot\n3. Right click a shot to find the scene\n4. Right click a scene to create a shot for that scene in particular\n5. Current time display in minutes:seconds instead of just beats\n6. BPM stored per-project instead of globally\n7. Lots of hotkeys!\n\nThese things make the tool just that much faster to use.\n\nFinally, here’s our tool today. There’s still plenty to be done, but we made 2 demos with it so far and it gets better every time!", null, "# Part 3: Importing and drawing a custom mesh file\n\n## Part 3: Creating an importer\n\nThis is part 3 of a series and it is about getting started with visualizing triangle meshes with Python 2.7 using the libraries PyOpenGL and PyQt4.\n\nI will assume you know python, you will not need a lot of Qt or OpenGL experience, though I will also not go into the deeper details of how OpenGL works. For that I refer you to official documentation and the excellent (C++) tutorials at https://open.gl/. Although they are C++, there is a lot of explanation about OpenGL and why to do certain calls in a certain order.\n\nOn a final note: I will make generalizations and simplifications when explaining things. If you think something works different then I say it probably does, this is to try and convey ideas to beginners, not to explain low level openGL implementations.\n\n### 3.1 Importing\n\nNow with our file format resembling openGL so closely makes this step relatively easy. First I’ll declare some globals, because openGL does not have real enums but just a bunch of global constants I make some groups to do testing and data mapping against.\n\n```from OpenGL.GL import *\n\nattributeElementTypes = (GL_BYTE,\nGL_UNSIGNED_BYTE,\nGL_SHORT,\nGL_UNSIGNED_SHORT,\nGL_INT,\nGL_UNSIGNED_INT,\nGL_HALF_FLOAT,\nGL_FLOAT,\nGL_DOUBLE,\nGL_FIXED,\nGL_INT_2_10_10_10_REV,\nGL_UNSIGNED_INT_2_10_10_10_REV,\nGL_UNSIGNED_INT_10F_11F_11F_REV)\nsizeOfType = {GL_BYTE: 1,\nGL_UNSIGNED_BYTE: 1,\nGL_SHORT: 2,\nGL_UNSIGNED_SHORT: 2,\nGL_INT: 4,\nGL_UNSIGNED_INT: 4,\nGL_HALF_FLOAT: 2,\nGL_FLOAT: 4,\nGL_DOUBLE: 8,\nGL_FIXED: 4,\nGL_INT_2_10_10_10_REV: 4,\nGL_UNSIGNED_INT_2_10_10_10_REV: 4,\nGL_UNSIGNED_INT_10F_11F_11F_REV: 4}\ndrawModes = (GL_POINTS,\nGL_LINE_STRIP,\nGL_LINE_LOOP,\nGL_LINES,\nGL_TRIANGLE_STRIP,\nGL_TRIANGLE_FAN,\nGL_TRIANGLES,\nGL_PATCHES)\nindexTypeFromSize = {1: GL_UNSIGNED_BYTE, 2: GL_UNSIGNED_SHORT, 4: GL_UNSIGNED_INT}```\n\nNext up is a Mesh class that stores a vertex array object (and corresponding buffers for deletion) along with all info necessary to draw the mesh once it’s on the GPU.\n\n```class Mesh(object):\ndef __init__(self, vao, bufs, drawMode, indexCount, indexType):\nself.__vao = vao\nself.__bufs = bufs\nself.__drawMode = drawMode\nself.__indexCount = indexCount\nself.__indexType = indexType\n\ndef __del__(self):\nglDeleteBuffers(len(self.__bufs), self.__bufs)\nglDeleteVertexArrays(1, [self.__vao])\n\ndef draw(self):\nglBindVertexArray(self.__vao)\nglDrawElements(self.__drawMode, self.__indexCount, self.__indexType, None)```\n\nNow let’s, given a file path, open up the file and run the importer for the right version (if known).\n\n```def model(filePath):\nvao = glGenVertexArrays(1)\nglBindVertexArray(vao)\nbufs = glGenBuffers(2)\nglBindBuffer(GL_ARRAY_BUFFER, bufs)\nglBindBuffer(GL_ELEMENT_ARRAY_BUFFER, bufs)\nwith open(filePath, 'rb') as fh:\nif fileVersion == 0:\nraise RuntimeError('Unknown mesh file version %s in %s' % (fileVersion, filePath))```\n\nNext we can start reading the rest of the file:\n\n``` vertexCount = struct.unpack('I', fh.read(4))\nassert indexSize in indexTypeFromSize, 'Unknown element data type, element size must be one of %s' % indexTypeFromSize.keys()\nindexType = indexTypeFromSize[indexSize]\nassert drawMode in (GL_LINES, GL_TRIANGLES), 'Unknown draw mode.' # TODO: list all render types```\n\nRead and apply the attribute layout:\n\n```# gather layout\noffset = 0\nlayouts = []\nfor i in xrange(numAttributes):\nassert dimensions in (1, 2, 3, 4)\nassert dataType in attributeElementTypes, 'Invalid GLenum value for attribute element type.'\nlayouts.append((location, dimensions, dataType, offset))\noffset += dimensions * sizeOfType[dataType]\n# apply\nfor layout in layouts:\nglVertexAttribPointer(layout, layout, layout, GL_FALSE, offset, ctypes.c_void_p(layout)) # total offset is now stride\nglEnableVertexAttribArray(layout)```\n\nRead and upload the raw buffer data. This step is easy because we can directly copy the bytes as the storage matches exactly with how openGL expects it due to the layout code above.\n\n```raw = fh.read(vertexSize * vertexCount)\nglBufferData(GL_ARRAY_BUFFER, vertexSize * vertexCount, raw, GL_STATIC_DRAW)\nglBufferData(GL_ELEMENT_ARRAY_BUFFER, indexSize * indexCount, raw, GL_STATIC_DRAW)```\n\n### 3.2 The final code\n\nThis is the application code including all the rendering from chapter 1, only the rectangle has been replaced by the loaded mesh.\n\n```# the importer\nimport struct\nfrom OpenGL.GL import *\n\nattributeElementTypes = (GL_BYTE,\nGL_UNSIGNED_BYTE,\nGL_SHORT,\nGL_UNSIGNED_SHORT,\nGL_INT,\nGL_UNSIGNED_INT,\nGL_HALF_FLOAT,\nGL_FLOAT,\nGL_DOUBLE,\nGL_FIXED,\nGL_INT_2_10_10_10_REV,\nGL_UNSIGNED_INT_2_10_10_10_REV,\nGL_UNSIGNED_INT_10F_11F_11F_REV)\nsizeOfType = {GL_BYTE: 1,\nGL_UNSIGNED_BYTE: 1,\nGL_SHORT: 2,\nGL_UNSIGNED_SHORT: 2,\nGL_INT: 4,\nGL_UNSIGNED_INT: 4,\nGL_HALF_FLOAT: 2,\nGL_FLOAT: 4,\nGL_DOUBLE: 8,\nGL_FIXED: 4,\nGL_INT_2_10_10_10_REV: 4,\nGL_UNSIGNED_INT_2_10_10_10_REV: 4,\nGL_UNSIGNED_INT_10F_11F_11F_REV: 4}\ndrawModes = (GL_POINTS,\nGL_LINE_STRIP,\nGL_LINE_LOOP,\nGL_LINES,\nGL_TRIANGLE_STRIP,\nGL_TRIANGLE_FAN,\nGL_TRIANGLES,\nGL_PATCHES)\nindexTypeFromSize = {1: GL_UNSIGNED_BYTE, 2: GL_UNSIGNED_SHORT, 4: GL_UNSIGNED_INT}\n\nassert indexSize in indexTypeFromSize, 'Unknown element data type, element size must be one of %s' % indexTypeFromSize.keys()\nindexType = indexTypeFromSize[indexSize]\nassert drawMode in (GL_LINES, GL_TRIANGLES), 'Unknown draw mode.' # TODO: list all render types\n\n# gather layout\noffset = 0\nlayouts = []\nfor i in xrange(numAttributes):\nassert dimensions in (1, 2, 3, 4)\nassert dataType in attributeElementTypes, 'Invalid GLenum value for attribute element type.'\nlayouts.append((location, dimensions, dataType, offset))\noffset += dimensions * sizeOfType[dataType]\n\n# apply layout\nfor layout in layouts:\nglVertexAttribPointer(layout, layout, layout, GL_FALSE, offset, ctypes.c_void_p(layout)) # total offset is now stride\nglEnableVertexAttribArray(layout)\n\nglBufferData(GL_ARRAY_BUFFER, vertexSize * vertexCount, raw, GL_STATIC_DRAW)\nglBufferData(GL_ELEMENT_ARRAY_BUFFER, indexSize * indexCount, raw, GL_STATIC_DRAW)\n\nassert len(fh.read()) == 0, 'Expected end of file, but file is longer than it indicates'\nreturn Mesh(vao, bufs, drawMode, indexCount, indexType)\n\nclass Mesh(object):\ndef __init__(self, vao, bufs, drawMode, indexCount, indexType):\nself.__vao = vao\nself.__bufs = bufs\nself.__drawMode = drawMode\nself.__indexCount = indexCount\nself.__indexType = indexType\n\ndef __del__(self):\nglDeleteBuffers(len(self.__bufs), self.__bufs)\nglDeleteVertexArrays(1, [self.__vao])\n\ndef draw(self):\nglBindVertexArray(self.__vao)\nglDrawElements(self.__drawMode, self.__indexCount, self.__indexType, None)\n\ndef model(filePath):\nvao = glGenVertexArrays(1)\nglBindVertexArray(vao)\nbufs = glGenBuffers(2)\nglBindBuffer(GL_ARRAY_BUFFER, bufs)\nglBindBuffer(GL_ELEMENT_ARRAY_BUFFER, bufs)\nwith open(filePath, 'rb') as fh:\nif fileVersion == 0:\nraise RuntimeError('Unknown mesh file version %s in %s' % (fileVersion, filePath))\n\n# import the necessary modules\nimport time\nfrom PyQt4.QtCore import * # QTimer\nfrom PyQt4.QtGui import * # QApplication\nfrom PyQt4.QtOpenGL import * # QGLWidget\nfrom OpenGL.GL import * # OpenGL functionality\n\n# this is the basic window\nclass OpenGLView(QGLWidget):\ndef initializeGL(self):\n# set the RGBA values of the background\nglClearColor(0.1, 0.2, 0.3, 1.0)\n\n# set a timer to redraw every 1/60th of a second\nself.__timer = QTimer()\nself.__timer.timeout.connect(self.repaint)\nself.__timer.start(1000 / 60)\n\n# import a model\nself.__mesh = model(r'C:\\Users\\John\\Python\\maya\\cube.bm')\n\ndef resizeGL(self, width, height):\nglViewport(0, 0, width, height)\n\ndef paintGL(self):\nglScalef(self.height() / float(self.width()), 1.0, 1.0)\nglRotate((time.time() % 36.0) * 10, 0, 0, 1)\n\nglClear(GL_COLOR_BUFFER_BIT | GL_DEPTH_BUFFER_BIT)\nself.__mesh.draw()\n\n# this initializes Qt\napp = QApplication([])\n# this creates the openGL window, but it isn't initialized yet\nwindow = OpenGLView()\n# this only schedules the window to be shown on the next Qt update\nwindow.show()\n# this starts the Qt main update loop, it avoids python from continuing beyond this line\n# and any Qt stuff we did above is now going to actually get executed, along with any future\n# events like mouse clicks and window resizes\napp.exec_()```\n\n# Part 2: Creating an OpenGL friendly mesh exporter for Maya\n\n## Part 2: Creating an exporter\n\nThis is part 2 of a series and it is about getting started with visualizing triangle meshes with Python 2.7 using the libraries PyOpenGL and PyQt4.\n\nI will assume you know python, you will not need a lot of Qt or OpenGL experience, though I will also not go into the deeper details of how OpenGL works. For that I refer you to official documentation and the excellent (C++) tutorials at https://open.gl/. Although they are C++, there is a lot of explanation about OpenGL and why to do certain calls in a certain order.\n\nOn a final note: I will make generalizations and simplifications when explaining things. If you think something works different then I say it probably does, this is to try and convey ideas to beginners, not to explain low level openGL implementations.\n\n### 2.1 File layout\n\nNow that we can draw a model, it is time to define the data that we need to give OpenGL and decide upon a file format that can contain all this data.\n\nStarting off with the elements, we have a way to draw them (GL_TRIANGLES in our case) and we have a data type (GL_UNSIGNED_INT in our case). Given this data type and the number of elements we can actually determine the buffer size regardless of the data type, allowing our file to support not only a number of element values, but allowing those values to be of all the supported types.\n\nSimilarly we can look at the vertex layout. We probably want a vertex count and a size of per-vertex-data. This size is a little more complicated because the attribute layout can be very flexible. I suppose it’s easier if we also write the vertex element size instead of trying to figure out what it should be based on the layout.\n\nThen we can look at the attribute layout. We can assume all our data is tightly packed, so we can infer the offset (last argument of glVertexAttribPointer). That leaves us with a layout location, a number of values per vertex, and a data type. Of course first we need to write how many attributes we have.\n\nAfter that all we need to do is fill in the buffer data. So for vertexCount * vertexElementSize bytes we specify binary data for the vertex buffer and for elementCount * elementDataSize we specify binary data for the elements buffer.\n\nOur file format now looks like this:\n\n Version nr byte So we can change the format later and not break things. Vertex count unsigned int Because the elements_array can use at most an unsigned int we can never point to vertices beyond the maximum of this data, so no need to store more bytes. Vertex element size byte Size in bytes of a vertex, based on all attribute sizes combined. Element count unsigned int Element data size byte To infer whether indices are unsigned char, unsigned short or unsigned int. Render type GLenum OpenGL defines variables as GL_TRIANGLES as a GLenum type which is in turn just an unsigned int. Number of attributes byte [For each attribute] Attribute location byte Attribute dimensions byte Is it a single value, vec2, 3 or 4? Attribute type GLenum Are the values float, or int, more types listed in the OpenGL documenation for glVertexAttribuPointer. [End for] Vertex buffer vertexCount * vertexElementSize bytes Elements buffer elementCount * elementDataSize bytes\n\nThat brings us to the next step, gather this information in Maya.\n\n### 2.2 Maya mesh exporter\n\nTo export I’ll use the maya API (OpenMaya). It provides a way to quickly iterate over a mesh’ data without allocating too much memory using the MItMeshPolygons. This will iterate over all the faces and allow us to extract the individual triangles and face vertices.\n\nThere are a few steps to do. First let’s make a script to generate a test scene:\n\n```from maya import cmds\nfrom maya.OpenMaya import *\ncmds.file(new=True, force=True)\ncmds.polyCube()\nmeshShapeName = 'pCubeShape1'\noutputFilePath = 'C:/Test.bgm'```\n\nNow with these variables in mind we have to convert the shape name to actual maya API objects that we can read data from.\n\n```# get an MDagPath from the given mesh path\np = MDagPath()\nl = MSelectionList()\nMGlobal.getSelectionListByName(mayaShapeName, l)\nl.getDagPath(0, p)\n\n# get the iterator\npoly = MItMeshPolygon(p)```\n\nThis sets us up to actually start saving data. Because openGL requires us to provide all the data of a vertex at 1 vertex index we have to remap some of Maya’s data. In Maya a vertex (actually face-vertex in Maya terms) is a list of indices that points to e.g. what vertex to use, what normal to use, etc. All with separate indices. In OpenGL all these indices must match. The way I’ll go about this is to simply take the triangulation and generate 3 unique vertices for each triangle. This means that to find the vertex count can be determined by counting the triangles in the mesh. Maya meshes don’t expose functionality to query this , so instead I’ll iterate over all the faces and count the triangles in them.\n\n```# open the file as binary\nwith open(outputFilePath, 'wb') as fh:\n# fixing the vertex data size to just X, Y, Z floats for the vertex position\nvertexElementSize = 3 * ctypes.sizeof(ctypes.c_float)\n\n# using unsigned integers as elements\nindexElementSize = ctypes.sizeof(ctypes.c_uint)\n\n# gather the number of vertices\nvertexCount = 0\nwhile not poly.isDone():\nvertices = MPointArray()\nvertexList = MIntArray()\npoly.getTriangles(vertices, vertexList, space)\nvertexCount += vertexList.length()\npoly.next()\npoly.reset()\n# start writing\nfh.write(struct.pack('B', FILE_VERSION))\nfh.write(struct.pack('I', vertexCount))\nfh.write(struct.pack('B', vertexElementSize))\n# currently I'm duplicating all vertices per triangle, so total indices matches total vertices\nfh.write(struct.pack('I', vertexCount))\nfh.write(struct.pack('B', indexElementSize))\nfh.write(struct.pack('I', GL_TRIANGLES)) # render type```\n\nAs you can see we had to make some assumptions about vertex data size and we had to gather some intel on our final vertex count, but this is a good setup. Next step is to write the attribute layout. I’ve made the assumption here to write only X Y Z position floats at location 0. We can expand the exporter later with more features, as our file format supports variable attribute layouts. We can write our position attribute next:\n\n```# attribute layout\n# 1 attribute\nfh.write(struct.pack('B', 1))\n# at location 0\nfh.write(struct.pack('B', 0))\n# of 3 floats\nfh.write(struct.pack('B', 3))\nfh.write(struct.pack('I', GL_FLOAT))```\n\nNote that I am using a constant GL_FLOAT here, if you do not wish to install PyOpenGL for your maya, you can quite simply include this at the top of the file instead:\n\n```import ctypes\nGL_TRIANGLES = 0x0004\nGL_UNSIGNED_INT = 0x1405\nGL_FLOAT = 0x1406```\n\nAfter that comes streaming the vertex buffer. For this I use the same iterator I used to count the vertex count. The code is pretty much the same only now I write the vertices instead of counting the vertex list.\n\n```# iter all faces\nwhile not poly.isDone():\n# get triangulation of this face\nvertices = MPointArray()\nvertexList = MIntArray()\npoly.getTriangles(vertices, vertexList, space)\n\n# write the positions\nfor i in xrange(vertexList.length()):\nfh.write(struct.pack('3f', vertices[i], vertices[i], vertices[i]))\n\npoly.next()```\n\nLast is the element buffer.\n\n```# write the elements buffer\nfor i in xrange(vertexCount):\nfh.write(struct.pack('I', i))```\n\n### 2.3 All the data\n\nThe next step naturally is to export more than just the position. Here is a more elaborate way to extract all the attributes. First we need to get some global data from the mesh. This goes right after where we create the MItMeshPolygons.\n\n```fn = MFnMesh(p)\ntangents = MFloatVectorArray()\nfn.getTangents(tangents, space)\ncolorSetNames = []\nfn.getColorSetNames(colorSetNames)\nuvSetNames = []\nfn.getUVSetNames(uvSetNames)```\n\nNext we have to change our vertexElementSize code to the following:\n\n```# compute the vertex data size, write 4 floats for the position for more convenient transformation in shaders\n# position, tangent, normal, color sets, uv sets\nvertexElementSize = (4 + 3 + 3 + 4 * len(colorSetNames) + 2 * len(uvSetNames)) * ctypes.sizeof(ctypes.c_float)```\n\nThe attribute layout is significantly changed. I’m also changing the point data from a vec3 to a vec4. I’m filling in the w component as 1.0, this to indicate a point instead of a vector. It will make transforming vertices in shaders a step simpler.\n\n```# attribute layout\n\n# Since NVidia is the only driver to implement a default attribute layout I am following this as much as possible\n# on other drivers using a custom shader is mandatory and modern buffers will never work with the fixed function pipeline.\n# https://stackoverflow.com/questions/20573235/what-are-the-attribute-locations-for-fixed-function-pipeline-in-opengl-4-0-cor\n\n# num attributes\nfh.write(struct.pack('B', 3 + len(colorSetNames) + len(uvSetNames)))\n# vec4 position at location 0\nfh.write(struct.pack('B', 0))\nfh.write(struct.pack('B', 4))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec3 tangent at location 1\nfh.write(struct.pack('B', 1))\nfh.write(struct.pack('B', 3))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec3 normal at location 2\nfh.write(struct.pack('B', 2))\nfh.write(struct.pack('B', 3))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec4 color at locations (3,7) and 16+\nused = {}\nfor i in xrange(len(colorSetNames)):\nidx = 3 + i\nif idx > 7:\nidx = 11 + i\nfh.write(struct.pack('B', idx))\nfh.write(struct.pack('B', 4))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec2 uvs at locations 8-15 and 16+, but avoiding overlap with colors\nidx = 8\nfor i in xrange(len(uvSetNames)):\nwhile idx in used:\nidx += 1\nfh.write(struct.pack('B', idx))\nfh.write(struct.pack('B', 2))\nfh.write(struct.pack('I', GL_FLOAT))\nidx += 1```\n\nMost of the MItMeshPolygon iterator functions, like getNormals(), gives us a list of the normals for all vertices in this face. The problem is that this data is not triangulated.\n\nTo extract the triangulation we used getTriangles(), which gives us a list of vertices used in the face. These vertex numbers are object-wide, so they keep getting bigger the further we get.\n\nThat means they’re useless if we want to use them to look up the normal returned by getNormals(), because that array is always very short, containing just the normals for this face.\n\nSo we have to do some mapping from the triangulated vertex indices into indices that match the data we’ve got. Either that or get all the normals from the mesh in 1 big array but that is not memory efficient. So at the top of the while loop (just inside) I’ve added the following dictionary:\n\n```# map object indices to local indices - because for some reason we can not query the triangulation as local indices\n# but all getters do want us to provide local indices\nobjectToFaceVertexId = {}\ncount = poly.polygonVertexCount()\nfor i in xrange(count):\nobjectToFaceVertexId[poly.vertexIndex(i)] = i```\n\nThat allows us to extract all the data we want for these triangles like so:\n\n```# get per-vertex data\nnormals = MVectorArray()\npoly.getNormals(normals, space)\ncolorSet = []\nfor i, colorSetName in enumerate(colorSetNames):\ncolorSet.append(MColorArray())\npoly.getColors(colorSet[i], colorSetName)\nuvSetU = []\nuvSetV = []\nfor i, uvSetName in enumerate(uvSetNames):\nuvSetU.append(MFloatArray())\nuvSetV.append(MFloatArray())\npoly.getUVs(uvSetU[i], uvSetV[i], uvSetName)```\n\nHandling fairly small sets of data at a time. Last we have to write the data, replacing the loop writing 3 floats per vertex we had before with this longer loop:\n\n```# write the data\nfor i in xrange(vertexList.length()):\nlocalVertexId = objectToFaceVertexId[vertexList[i]]\ntangentId = poly.tangentIndex(localVertexId)\n\nfh.write(struct.pack('4f', vertices[i], vertices[i], vertices[i], 1.0))\nfh.write(struct.pack('3f', tangents[tangentId], tangents[tangentId], tangents[tangentId]))\nfh.write(struct.pack('3f', normals[localVertexId], normals[localVertexId], normals[localVertexId]))\nfor j in xrange(len(colorSetNames)):\nfh.write(struct.pack('4f', colorSet[j][localVertexId], colorSet[j][localVertexId], colorSet[j][localVertexId], colorSet[j][localVertexId]))\nfor j in xrange(len(uvSetNames)):\nfh.write(struct.pack('2f', uvSetU[j][localVertexId], uvSetV[j][localVertexId]))```\n\nAnd that completes the exporter with full functionality, extracting all possible data from a maya mesh we want. Unless you want blind data and skin clusters, but that’s a whole different story!\n\n### 2.4 Code\n\nHere is the final code as a function, with an additional function to export multiple selected meshes to multiple files, using Qt for UI. Note that if you wish to use PySide or PyQt5 instead the QFileDialog.getExistingDirectory and QSettings.value return types are different and require some work.\n\n```import os\nimport struct\nfrom maya import cmds\nfrom maya.OpenMaya import *\nimport ctypes\n\nGL_TRIANGLES = 0x0004\nGL_UNSIGNED_INT = 0x1405\nGL_FLOAT = 0x1406\nFILE_EXT = '.bm' # binary mesh\nFILE_VERSION = 0\nEXPORT_SPACE = MSpace.kWorld # export meshes in world space for now\n\ndef exportMesh(mayaShapeName, outputFilePath, space):\n# get an MDagPath from the given mesh path\np = MDagPath()\nl = MSelectionList()\nMGlobal.getSelectionListByName(mayaShapeName, l)\nl.getDagPath(0, p)\n\n# get the mesh and iterator\nfn = MFnMesh(p)\npoly = MItMeshPolygon(p)\n\ntangents = MFloatVectorArray()\nfn.getTangents(tangents, space)\ncolorSetNames = []\nfn.getColorSetNames(colorSetNames)\nuvSetNames = []\nfn.getUVSetNames(uvSetNames)\n\n# open the file as binary\nwith open(outputFilePath, 'wb') as fh:\n# compute the vertex data size, write 4 floats for the position for more convenient transformation in shaders\n# position, tangent, normal, color sets, uv sets\nvertexElementSize = (4 + 3 + 3 + 4 * len(colorSetNames) + 2 * len(uvSetNames)) * ctypes.sizeof(ctypes.c_float)\n\n# using unsigned integers as elements\nindexElementSize = ctypes.sizeof(ctypes.c_uint)\n\n# gather the number of vertices\nvertexCount = 0\nwhile not poly.isDone():\nvertices = MPointArray()\nvertexList = MIntArray()\npoly.getTriangles(vertices, vertexList, space)\nvertexCount += vertexList.length()\npoly.next()\npoly.reset()\n\n# start writing\nfh.write(struct.pack('B', FILE_VERSION))\nfh.write(struct.pack('I', vertexCount))\nfh.write(struct.pack('B', vertexElementSize))\n# currently I'm duplicating all vertices per triangle, so total indices matches total vertices\nfh.write(struct.pack('I', vertexCount))\nfh.write(struct.pack('B', indexElementSize))\nfh.write(struct.pack('I', GL_TRIANGLES)) # render type\n\n# attribute layout\n\n# Since NVidia is the only driver to implement a default attribute layout I am following this as much as possible\n# on other drivers using a custom shader is mandatory and modern buffers will never work with the fixed function pipeline.\n# https://stackoverflow.com/questions/20573235/what-are-the-attribute-locations-for-fixed-function-pipeline-in-opengl-4-0-cor\n\n# num attributes\nfh.write(struct.pack('B', 3 + len(colorSetNames) + len(uvSetNames)))\n# vec4 position at location 0\nfh.write(struct.pack('B', 0))\nfh.write(struct.pack('B', 4))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec3 tangent at location 1\nfh.write(struct.pack('B', 1))\nfh.write(struct.pack('B', 3))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec3 normal at location 2\nfh.write(struct.pack('B', 2))\nfh.write(struct.pack('B', 3))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec4 color at locations (3,7) and 16+\nused = {}\nfor i in xrange(len(colorSetNames)):\nidx = 3 + i\nif idx > 7:\nidx = 11 + i\nfh.write(struct.pack('B', idx))\nfh.write(struct.pack('B', 4))\nfh.write(struct.pack('I', GL_FLOAT))\n# vec2 uvs at locations 8-15 and 16+, but avoiding overlap with colors\nidx = 8\nfor i in xrange(len(uvSetNames)):\nwhile idx in used:\nidx += 1\nfh.write(struct.pack('B', idx))\nfh.write(struct.pack('B', 2))\nfh.write(struct.pack('I', GL_FLOAT))\nidx += 1\n\n# iter all faces\nwhile not poly.isDone():\n# map object indices to local indices - because for some reason we can not query the triangulation as local indices\n# but all getters do want us to provide local indices\nobjectToFaceVertexId = {}\ncount = poly.polygonVertexCount()\nfor i in xrange(count):\nobjectToFaceVertexId[poly.vertexIndex(i)] = i\n\n# get triangulation of this face\nvertices = MPointArray()\nvertexList = MIntArray()\npoly.getTriangles(vertices, vertexList, space)\n\n# get per-vertex data\nnormals = MVectorArray()\npoly.getNormals(normals, space)\ncolorSet = []\nfor i, colorSetName in enumerate(colorSetNames):\ncolorSet.append(MColorArray())\npoly.getColors(colorSet[i], colorSetName)\nuvSetU = []\nuvSetV = []\nfor i, uvSetName in enumerate(uvSetNames):\nuvSetU.append(MFloatArray())\nuvSetV.append(MFloatArray())\npoly.getUVs(uvSetU[i], uvSetV[i], uvSetName)\n\n# write the data\nfor i in xrange(vertexList.length()):\nlocalVertexId = objectToFaceVertexId[vertexList[i]]\ntangentId = poly.tangentIndex(localVertexId)\n\nfh.write(struct.pack('4f', vertices[i], vertices[i], vertices[i], 1.0))\nfh.write(struct.pack('3f', tangents[tangentId], tangents[tangentId], tangents[tangentId]))\nfh.write(struct.pack('3f', normals[localVertexId], normals[localVertexId], normals[localVertexId]))\nfor j in xrange(len(colorSetNames)):\nfh.write(struct.pack('4f', colorSet[j][localVertexId], colorSet[j][localVertexId], colorSet[j][localVertexId], colorSet[j][localVertexId]))\nfor j in xrange(len(uvSetNames)):\nfh.write(struct.pack('2f', uvSetU[j][localVertexId], uvSetV[j][localVertexId]))\n\npoly.next()\n\n# write the elements buffer\nfor i in xrange(vertexCount):\nfh.write(struct.pack('I', i))\n\ndef exportSelected():\nselectedMeshShapes = cmds.select(ls=True, type='mesh', l=True) or []\nselectedMeshShapes += cmds.listRelatives(cmds.select(ls=True, type='transform', l=True) or [], c=True, type='mesh', f=True) or []\nfrom PyQt4.QtCore import QSettings\nfrom PyQt4.QtGui import QFileDialog\nsettings = QSettings('GLMeshExport')\nmostRecentDir = str(settings.value('mostRecentDir').toPyObject())\ntargetDir = QFileDialog.getExistingDirectory(None, 'Save selected meshes in directory', mostRecentDir)\nif targetDir and os.path.exists(targetDir):\nsettings.setValue('mostRecentDir', targetDir)\nfor i, shortName in enumerate(cmds.ls(selectedMeshShapes)):\nexportMesh(selectedMeshShapes[i],\nos.path.join(targetDir, shortName.replace('|', '_'), FILE_EXT),\nEXPORT_SPACE)\n```" ]
[ null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/09/img01.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/09/curves.gif", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_05_06_03_33_pm-656x300.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_04_19_10_22_pm.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/600px-Oren-nayar-vase2.jpg", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_04_20_08_33_am.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_04_25_08_42_am.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_04_26_08_22_am.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_04_26_08_21_am.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_05_06_09_36_am.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_05_06_02_39_pm.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_05_06_03_33_pm.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted_image_at_2017_05_15_07_50_pm.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/pasted-image-0.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image5.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image6.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image8.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image3-1.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image1-1.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image9.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image2-1.png", null, "http://trevorius.com/scrapbook/wp-content/uploads/2017/08/image4.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7003454,"math_prob":0.88565576,"size":15316,"snap":"2020-24-2020-29","text_gpt3_token_len":3654,"char_repetition_ratio":0.17274034,"word_repetition_ratio":0.33065596,"special_character_ratio":0.25110996,"punctuation_ratio":0.16915919,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9687794,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44],"im_url_duplicate_count":[null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,5,null,4,null,4,null,4,null,4,null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-30T06:07:09Z\",\"WARC-Record-ID\":\"<urn:uuid:4d40c386-d661-42e9-8a00-ffdefad01e0e>\",\"Content-Length\":\"119860\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:111090e6-13ac-4a1e-8c11-20d4d7c06008>\",\"WARC-Concurrent-To\":\"<urn:uuid:b49e3e87-099e-4d1b-bcb3-c0cb7ed36c87>\",\"WARC-IP-Address\":\"77.95.248.78\",\"WARC-Target-URI\":\"http://trevorius.com/scrapbook/blog/page/3/\",\"WARC-Payload-Digest\":\"sha1:IX3XUFOAAJ6SM3KBIF74G7T5Z4XL3K34\",\"WARC-Block-Digest\":\"sha1:ZRMTPDFDEGF2SPBQV7L3LV3EZA3FKTK6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347407289.35_warc_CC-MAIN-20200530040743-20200530070743-00332.warc.gz\"}"}
https://rpg.stackexchange.com/questions/34190/how-do-i-calculate-the-chance-of-hits/44896
[ "# How do I calculate the chance of hits?\n\n(I do not know if I should post this in math.stackexchange.com, so I try to phrase it in a way that it makes sense for non-roleplayers. Just in case it gets moved)\n\nIn the latest two editions of Shadowrun, you roll several 6 sided dice, and every die showing a 5 or 6 is considered a hit.\n\nHow do I calculate the chance of rolling 3 dice giving more hits than rolling 4 dice?\n\n• Your question is not entirely clear, could you provide some examples as to what you mean? a sample perhaps of the rolling itself, and what you are trying to use this for? As it will help in giving you an answer that is meaningful. \"How do I calculate\" is not what you want, you probably want a method, or a table for understanding the odds in your game. Either way - more description please. Feb 24, 2014 at 10:07\n• @InbarRose maybe it's not clearly worded but I think the aim is really clear. He wants to roll 3d6 and 4d6, in sequence, and get more successes on the first roll than on the second. What's the chance of that happening? Please Andràs tell us if I'm wrong. Feb 24, 2014 at 10:18\n• I deliberately did not use the DnD notation (3d6), because it is calculated entirely differently. 3d6 has an average of 10.5, rolling 3 dice in SR5 has an average of 1. Feb 24, 2014 at 10:20\n• I am open to suggestions how to phrase the question better, but I think writing 3d6 is will make it only worse, not better. Feb 24, 2014 at 10:21\n• I'd add a word about why you need to know that. I suppose Shadowrun has opposed checks and you want to know your winning chances when facing an opponent with an higher number of dice? Feb 24, 2014 at 16:07\n\nI'm sure it's possible and not too hard to treat your dice rolls as if they were 3d3 and 4d3 giving a success on a roll of 3 (for easier math), calculate the probabilities of getting 1, 2 or 3 successes on the first set and then the probability to get 1, 2, 3 or 4 successes on the second, then seeing which combination of those gives the intended result.\n\nI'm fairly sure someone can write a mathematical formula for this, and I think I could if I spent some time on it, luckily there's Anydice that can do the math for us.\n\noutput [count {5, 6} in 3d6] - [count {5, 6} in 4d6]\n\n\nAs you can see, the probability to get at least one more success on 3d6 than on 4d6 are 25.24%\n\nI got curious about this question myself, so I did some thinking and came up with an equation:\n\n$$\\sum_{i=t}^n \\binom{n}{i} \\left(\\dfrac{1}{3}\\right)^i \\left(\\dfrac{2}{3}\\right)^{n-i}$$\n\nWhere $n$ is the number of dice being rolled and $t$ is the desired threshold for the test. The result will be the probability of getting at least $t$ hits with $n$ dice.\n\nIn case you are not familiar with the notation, the first part of the sum (after the sigma and before the fractions) is the \"binomial coefficient\". It is typically read \"n choose i\" and represents the number of times you can choose $i$ items from a set of $n$ items.\n\nSince the question asks specifically how you would do such a calculation, let me give a little explanation of the logic behind this equation.\n\nFirst thing to do is imagine what a \"hit\" would look like. Since a hit is achieved by rolling a 5 or 6 on a six-sided die, then there is a 1/3 chance of getting a hit on a single die. This also means that there is a 2/3 chance of getting a miss on a die. That's where the two fractions come from in the equation.\n\nSecondly, we want to know the probability of getting a certain number of hits. The odds of getting $i$ number of hits is $(1/3)^i$. So, rolling 2 hits would have a probability of $(1/3)^2$. Rolling 3 hits would be $(1/3)^3$. However... that's not the whole picture. When you rolling $n$ dice, some of them are hits and some are misses. So if $i$ dice are nits out of $n$ dice, then you can say that there are $n-i$ misses. Now getting certain number of misses is $(2/3)^{n-1}$.\n\nThirdly, now that we understand the fractional parts of the equation... There are multiple ways to get any given set of results (usually). To illustrate... Image we have 3 dice and we want to get 2 hits. If we name the dice die A, die B, and die C, then we can see that we could have hits on (A,B) or (B,C) or (A,C). So in the situation of trying to find 2 hits on 3 dice, we would have to multiply the $(1/3)^i \\times (2/3)^{n-i}$ by the 3 different ways it can occur. We can generalize that by saying that the fractional part of our probability equation must be multiplied by the number of ways to get $i$ hits out of $n$ dice. Hence the binomial coefficient part of the equation.\n\nUp to now we have all that is needed calculate the probability of getting exactly $i$ number of hits on $n$ dice... However, if we'd like to calculate the chance of reaching a threshold then we need to look at the probability of not just getting $i$ hits, but also of getting $i+1$ hits or $i+2$ hits all the way to $n$ hits (i.e. getting hits on all the dice). This is why we sum from $t$ (the min number of hits needed) to $n$ (the max number, since it's all the dice you rolled).\n\nYou can see a table here of all the calculated probabilities from $n = 1..20$ and $t = 1..20$.\n\nI will also include the equation I came up with to calculate the same probabilities when using the Rule of Six. This equation is included primarily for those who are curious, and so I won't include the long explanation.\n\n$$P_e(n, t) = \\sum_{i=t}^n \\binom{n}{i} \\left(\\dfrac{1}{3}\\right)^i \\left(\\dfrac{2}{3}\\right)^{n-i} + \\sum_{i=1}^{t-1} \\sum_{j=0}^{i-1} \\binom{n}{n-i} \\left(\\dfrac{1}{6}\\right)^j \\left(\\dfrac{1}{6}\\right)^{i-j} \\left(\\dfrac{2}{3}\\right)^{n-i} P_e(i-j, t-i)$$\n\nHere is the same table showing those probabilities with Rule of Six.\n\n• Having an accepted answer does not mean a question is done and closed! This looks like good stuff, though I'm not versed enough in SR to say for sure. I suspect you're familiar with SE, though; but if not, the Tour is worth checking out (can be even if you know other sites), plus we have the Role-playing Games Chat if you've got 20 rep here or at any other SE. Jul 22, 2014 at 23:18" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9145845,"math_prob":0.9902208,"size":3424,"snap":"2023-40-2023-50","text_gpt3_token_len":967,"char_repetition_ratio":0.12631579,"word_repetition_ratio":0.0,"special_character_ratio":0.3057827,"punctuation_ratio":0.0930851,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9992909,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-11T23:48:34Z\",\"WARC-Record-ID\":\"<urn:uuid:88a4a8e8-8718-428c-bed3-1f588dc00f13>\",\"Content-Length\":\"175841\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:694c6278-2ea5-4fac-99e1-a6e98d77abb2>\",\"WARC-Concurrent-To\":\"<urn:uuid:2de36091-1194-4b33-93a4-bf3c01781b62>\",\"WARC-IP-Address\":\"104.18.43.226\",\"WARC-Target-URI\":\"https://rpg.stackexchange.com/questions/34190/how-do-i-calculate-the-chance-of-hits/44896\",\"WARC-Payload-Digest\":\"sha1:BQH3L7DAEFNBLZ4FWCBM2RYFP4QJRTQL\",\"WARC-Block-Digest\":\"sha1:3JTYPMPBQBLRAZRBNWGYRE6WCKDJNUML\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679518883.99_warc_CC-MAIN-20231211210408-20231212000408-00603.warc.gz\"}"}
https://socratic.org/questions/what-part-of-speech-does-the-diamante-usually-begin-with#323947
[ "# What part of speech does the diamante usually begin with ?\n\nA noun\n\n#### Explanation:\n\nA diamante poem is a kind of poem where the rules of it bring about a diamond shape. They are 7 lines long:\n\n$\\textcolor{b l u e}{\\text{Line number\") ->color(purple)(\"Number of words\") ->color(brown)(\"Type of word}}$\n\n1 $\\textcolor{w h i t e}{0000000000000000}$1 $\\textcolor{w h i t e}{000000000000}$noun\n\n2 $\\textcolor{w h i t e}{0000000000000000}$2 $\\textcolor{w h i t e}{0000000000}$adjective\n\n3 $\\textcolor{w h i t e}{0000000000000000}$3 $\\textcolor{w h i t e}{000000000000}$verb\n\n4 $\\textcolor{w h i t e}{0000000000000000}$4 $\\textcolor{w h i t e}{000000000000}$noun\n\n5 $\\textcolor{w h i t e}{0000000000000000}$3 $\\textcolor{w h i t e}{000000000000}$verb\n\n6 $\\textcolor{w h i t e}{0000000000000000}$2 $\\textcolor{w h i t e}{0000000000}$adjective\n\n7 $\\textcolor{w h i t e}{0000000000000000}$1 $\\textcolor{w h i t e}{000000000000}$noun\n\nNow - how to use this structure? There are two basic ways to use it - as a way to compare two synonyms (and so therefore known as a synonym diamante) and as a way to compare two antonyms (which is unsurprisingly called a antonym diamante).\n\nThe basic idea of how to fill in the words is to write down your two nouns, then brainstorm words associated with each of them (so for example, you could use milk and ice cream as synonyms and perhaps light and dark as antonyms).\n\nThere are a few examples in the link below - unfortunately the formatting tools at my disposal don't allow me to create the look I want for mine, but here's an example from someone else:", null, "http://www.poetry4kids.com/lessons/how-to-write-a-diamante-poem/" ]
[ null, "https://useruploads.socratic.org/6YALhGQTDaqCcDlSFQhd_imgres.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8916655,"math_prob":0.9961495,"size":1456,"snap":"2021-43-2021-49","text_gpt3_token_len":409,"char_repetition_ratio":0.29820937,"word_repetition_ratio":0.021052632,"special_character_ratio":0.35782966,"punctuation_ratio":0.0562249,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95789534,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-25T17:56:40Z\",\"WARC-Record-ID\":\"<urn:uuid:6d4f14af-ce21-4871-b522-3238359ab469>\",\"Content-Length\":\"36668\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:86247ea3-4098-4257-a41a-820c325b47f0>\",\"WARC-Concurrent-To\":\"<urn:uuid:9874e5be-e566-4ae4-8e92-63603afad54a>\",\"WARC-IP-Address\":\"216.239.34.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/what-part-of-speech-does-the-diamante-usually-begin-with#323947\",\"WARC-Payload-Digest\":\"sha1:TABKH22ISKK4JWBNSYSJCF3OGZNGXSQZ\",\"WARC-Block-Digest\":\"sha1:KWEBU2K7KY2BYK4NLIXF2FUJXG3T3QUT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323587719.64_warc_CC-MAIN-20211025154225-20211025184225-00140.warc.gz\"}"}
http://export.arxiv.org/abs/math/0409486
[ "math\n\n# Title: Fractional Fokker--Planck Equation for Nonlinear Stochastic Differential Equations Driven by Non-Gaussian Levy Stable Noises\n\nAbstract: The Fokker-Planck equation has been very useful for studying dynamic behavior of stochastic differential equations driven by Gaussian noises. In this paper, we derive a Fractional Fokker--Planck equation for the probability distribution of particles whose motion is governed by a {\\em nonlinear} Langevin-type equation, which is driven by a non-Gaussian Levy-stable noise. We obtain in fact a more general result for Markovian processes generated by stochastic differential equations.}\n Subjects: Analysis of PDEs (math.AP); Mathematical Physics (math-ph) MSC classes: 05.40+j,05.60+w, 66.10Cb, 05.70 a Journal reference: J. Math. Phys., 42(2001), 200-212 DOI: 10.1063/1.1318734 Cite as: arXiv:math/0409486 [math.AP] (or arXiv:math/0409486v1 [math.AP] for this version)\n\n## Submission history\n\nFrom: Vena Pearl Bongolan-Walsh Mrs. [view email]\n[v1] Fri, 24 Sep 2004 20:42:24 GMT (10kb)\n\nLink back to: arXiv, form interface, contact." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.85750145,"math_prob":0.7783861,"size":925,"snap":"2019-51-2020-05","text_gpt3_token_len":222,"char_repetition_ratio":0.111834966,"word_repetition_ratio":0.0,"special_character_ratio":0.21081081,"punctuation_ratio":0.12101911,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96310604,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-11T04:41:33Z\",\"WARC-Record-ID\":\"<urn:uuid:b2c554fb-f2d3-47c7-ac49-005e79ecb07f>\",\"Content-Length\":\"13904\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:87663c57-c100-45a5-bc9f-3b5cb297f877>\",\"WARC-Concurrent-To\":\"<urn:uuid:0bb78586-6da6-484c-9904-762c6efdde34>\",\"WARC-IP-Address\":\"128.84.21.203\",\"WARC-Target-URI\":\"http://export.arxiv.org/abs/math/0409486\",\"WARC-Payload-Digest\":\"sha1:34IZERUIRTE4ARTHTX7QM76OBTO2N4WD\",\"WARC-Block-Digest\":\"sha1:F2M7GVENCPWOCXIYR7NWCG53NUPHX7WT\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540529745.80_warc_CC-MAIN-20191211021635-20191211045635-00169.warc.gz\"}"}
https://math.stackexchange.com/questions/490079/pi-might-contain-all-finite-sets-can-it-also-contain-infinite-sets
[ "# Pi might contain all finite sets, can it also contain infinite sets?\n\nIn a previous, and quite popular, question it was discussed about whether or not $\\pi$ contains all finite number combinations.\n\nLet us assume for a moment that $\\pi$ does in fact contain all finite combinations of numbers. What prevents $\\pi$ from also containing all infinite sets?\n\nIt seems that at some point one would also see the first couple digits of, for example, $e$ (2.71828). But why does it need to stop there, couldn't it contain a bunch of digits of $e$? Perhaps even an infinite number of digits of $e$?\n\nMy understanding is that $e$ could also be replaced by $\\sqrt2$ or any other irrational number, so long as that irrational number contained all finite sets of number combinations. Which might imply that somewhere along the way, $e$ contains a number of digits of $\\pi$. Implying this ridiculous situation where within $\\pi$ we see $e$, and then within $e$ we again begin to see $\\pi$ again. Then all the universe collapses into a singularity. Or maybe someone can just explain why one infinite sequence can't contain another infinite sequence, and perhaps why we have not defined some type of super-infinity that can.\n\nTo reiterate the primary question: What prevents $\\pi$, or other infinite irrational number that contains all finite sets of numbers, from also containing all infinite sets?\n\n## 2 Answers\n\nIf the decimal expansion of $\\pi$ contained the string of digits '$000\\ldots$' then it only has a finite number of non-zero digits (some subset of the digits before the string of $0$s starts) and so $\\pi$ is a rational number. Contradiction.\n\n• That makes a lot of sense. So clear, I almost feel silly for not having realized it. – mwjohnson Sep 11 '13 at 1:35\n• The point is that infinite strings don't have an end (on the right as we write them) so there are very few infinite strings actually contained in $\\pi$ - only those of the form $[10^n\\cdot\\pi]$ for $n\\geq -1$ where $[\\bullet]$ is the 'fractional part' function. – Dan Rust Sep 11 '13 at 1:38\n• Rationality and irrationality aside, if it contains 000000... it certainly cannot also contain 111111.... – Nate Eldredge Sep 11 '13 at 2:10\n• @NateEldredge Yeah there's a bunch of natural contradictions you can reach. – Dan Rust Sep 11 '13 at 2:15\n• Well, you should carefully distinguish between \"set\" and \"sequence\". It does contain many different sequences: for instance, 1415926..., 415926..., 15926..., etc, where each one is some \"tail\" of all the ones before it. But it cannot contain both of two sequences where neither is a tail of the other. – Nate Eldredge Aug 6 '18 at 16:26\n\nThere are an uncountable number of infinite digit strings, and $\\pi$ contains only countably many infinite digit strings-namely all the ones that are the digits after some point in the expansion. It does contain infinite strings, just not most of them.\n\n• This is a stronger answer because it also disposes of a lot of variations such as \"what if we only want each infinite sequence of digits to appear at some set of positions that form an arithmetic progression?\" – Henning Makholm Sep 11 '13 at 13:05\n• @user500668: that depends what you mean by includes. You could start after the fifth decimal place-would you say it includes that sequence? You could take every other term. You could do a lot of things. – Ross Millikan Aug 6 '18 at 16:26" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9425986,"math_prob":0.9816907,"size":1309,"snap":"2019-13-2019-22","text_gpt3_token_len":282,"char_repetition_ratio":0.15862069,"word_repetition_ratio":0.018604651,"special_character_ratio":0.22383499,"punctuation_ratio":0.101626016,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99667364,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-23T17:56:03Z\",\"WARC-Record-ID\":\"<urn:uuid:bb9ee949-d1dc-491a-8d67-ad7e0442cf1f>\",\"Content-Length\":\"145093\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:49289d39-f573-47a2-8925-0be854f5f800>\",\"WARC-Concurrent-To\":\"<urn:uuid:0cc1dd36-2265-4368-8339-bbe6269294f9>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/490079/pi-might-contain-all-finite-sets-can-it-also-contain-infinite-sets\",\"WARC-Payload-Digest\":\"sha1:LEXX6L3TWY3HQIRG2HUAMC74JGH4EU37\",\"WARC-Block-Digest\":\"sha1:5S7IISPUFCAIVU2R4EIQLJPZPBYARLV5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257316.10_warc_CC-MAIN-20190523164007-20190523190007-00370.warc.gz\"}"}
https://de3de.com/industrial-hemp-tipap/chain-rule-questions-f6e051
[ "Check your level of preparation with the practice exercises based on chain rule questions. Welcome to highermathematics.co.uk A sound understanding of the Chain Rule is essential to ensure exam success. Basic examples that show how to use the chain rule to calculate the derivative of the composition of functions. About. Here Given Chain Rule practice questions, quiz, fully solved questions, tips & trick and Mock tests, which include question from each topic will help you to excel in Chain Rule. Reverse chain rule example. This calculus video tutorial shows you how to find the derivative of any function using the power rule, quotient rule, chain rule, and product rule. Practice: Reverse chain rule. This is a way of differentiating a function of a function. 2 2 10 10 7 7 x dx x C x = − + ∫ − 6. Each element has two figures except one element that has one part missing. The Chain Rule Powerpoint Lesson 1. In school, there are some chocolates for 240 adults and 400 children. Online aptitude preparation material with practice question bank, examples, solutions and explanations. Partial fraction expansion. The Chain Rule is a means of connecting the rates of change of dependent variables. with full confidence. • If pencil is used for diagrams/sketches/graphs it must be dark (HB or B). Covered for all Bank Exams, Competitive Exams, Interviews and Entrance tests. This unit illustrates this rule. The other given part of the same element is taken as base and is compared separately with all the other elements e.g. If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked. So when using the chain rule: Back to Problem List. The Chain Rule is a formula for computing the derivative of the composition of two or more functions. This can be viewed as y = sin(u) with u = x2. How do I apply the chain rule to double partial derivative of a multivariable function? 1. by the Chain Rule, dy/dx = dy/dt × dt/dx so dy/dx = 3t² × 2x = 3(1 + x²)² × 2x = 6x(1 + x²) ². 2 3 1 sin cos cos 3 ∫ x x dx x C= − + 5. Some of the types of chain rule problems that are asked in the exam. Ask Question Asked today. For instance, if f and g are functions, then the chain rule expresses the derivative of their composition. Therefore we have dy du = cos(u) and du dx = 2x. Chain rule is used to find out this missing part of an element by subsequent comparison. The Product, Quotient, and Chain Rules. The chain rule says that. • Fill in the boxes at the top of this page with your name. Answer to 2: Differentiate y = sin 5x. Nested Multivariable Chain Rule. Example 1; Example 2; Example 3; Example 4; Example 5; Example 6; Example 7; Example 8 ; In threads. To access a wealth of additional free resources by topic please either use the above Search Bar or click on any of the Topic Links found at the bottom of this page as well as on the Home Page HERE. Khan Academy is a 501(c)(3) nonprofit organization. Chain Rule Instructions • Use black ink or ball-point pen. This chapter focuses on some of the major techniques needed to find the derivative: the product rule, the quotient rule, and the chain rule. y=f(u) u=f(x) y=(2x+4)3 y=u3andu=2x+4 dy du =3u2 du dx =2 dy dx =3u2×2=2×3(2x+4)2 dy dx = dy du ⋅ du dx dy dx =6(2x+4)2. We have Free Practice Chain Rule (Arithmetic Aptitude) Questions, Shortcuts and Useful tips. Why Aptitude Chain Rule? In calculus, the chain rule is a formula to compute the derivative of a composite function. Video lectures to prepare quantitative aptitude for placement tests, competitive exams like MBA, Bank exams, RBI, IBPS, SSC, SBI, RRB, Railway, LIC, MAT. However, we rarely use this formal approach when applying the chain rule to specific problems. The rule itself looks really quite simple (and it is not too difficult to use). En anglais, on peut dire the chain rule (of differentiation of a function composed of two or more functions). In order to master the techniques explained here it is vital that you undertake plenty of practice exercises so that they become second nature. So all we need to do is to multiply dy /du by du/ dx. Rates of change . Question 1 . Most problems are average. Differentiate using the chain rule. Integral of tan x. The chain rule is a rule for differentiating compositions of functions. Section 3-9 : Chain Rule. back to top . The chain rule is used to differentiate composite functions. Donate or volunteer today! Confusing limit problem within proof of the chain rule. Differentiate $$f\\left( x \\right) = {\\left( {6{x^2} + 7x} \\right)^4}$$ . Multivariable Chain Rule - A solution I can't understand. Top; Examples. VCE Maths Methods - Chain, Product & Quotient Rules The chain rule 3 • The chain rule is used to di!erentiate a function that has a function within it. Chain rule Statement Examples Table of Contents JJ II J I Page1of8 Back Print Version Home Page 21.Chain rule 21.1.Statement The power rule says that d dx [xn] = nxn 1: This rule is valid for any power n, but not for any base other than the simple input variable x. Created by T. Madas Created by T. Madas Question 1 Carry out each of the following integrations. In examples such as the above one, with practise it should be possible for you to be able to simply write down the answer without having to let t = 1 + x² etc. If you're seeing this message, it means we're having trouble loading external resources on our website. The Questions. Hint : Recall that with Chain Rule problems you need to identify the “inside” and “outside” functions and then apply the chain rule. Let u = 5x (therefore, y = sin u) so using the chain rule. You can use our resources like sample question papers and Maths previous years’ papers to practise questions and answers for Maths board exam preparation. Integral of tan x. Our mission is to provide a free, world-class education to anyone, anywhere. If air is blown into a spherical balloon at the rate of 10 cm 3 / sec. • The quotient rule • The chain rule • Questions 2. Example #1 . The Chain Rule mc-TY-chain-2009-1 A special rule, thechainrule, exists for differentiating a function of another function. 2. Active today. ∫4sin cos sin3 4x x dx x C= + 4. Understand how to differentiate composite functions by using the Chain Rule correctly with our CBSE Class 12 Science Maths video lessons. Here you will be shown how to use the Chain Rule for differentiating composite functions. The Chain Rule Equation . The Chain Rule\n2. The answer keys and explanations are given for the same. BY REVERSE CHAIN RULE . These Multiple Choice Questions (MCQs) on Chain Rule help you evaluate your knowledge and skills yourself with this CareerRide Quiz. Example #1 Differentiate (3 x+ 3) 3 . That is, if f and g are differentiable functions, then the chain rule expresses the derivative of their composite f ∘ g — the function which maps x to (()) — in terms of the derivatives of f and g and the product of functions as follows: (∘) ′ = (′ ∘) ⋅ ′. Skip to navigation (Press Enter) Skip to main content (Press Enter) Home; Threads; Index; About; Math Insight. Help Center Detailed answers to any questions you might have ... How does chain rule work for complex valued function? The Chain Rule. The chain rule makes it possible to differentiate functions of func-tions, e.g., if y is a function of u (i.e., y = f(u)) and u is a function of x (i.e., u = g(x)) then the chain rule states: if y = f(u), then dy dx = dy du × du dx Example 1 Consider y = sin(x2). Viewed 16 times 0 $\\begingroup$ Let ... Browse other questions tagged real-analysis multivariable-calculus or ask your own question. The Chain Rule is used for differentiating composite functions. Chain Rule Online test - 20 questions to practice Online Chain Rule Test and find out how much you score before you appear for next interview and written test. 2. J'ai constaté que la version homologue française « règle de dérivation en chaîne » ou « règle de la chaîne » est quasiment inconnue des étudiants. ( ) ( ) 3 1 12 24 53 10 ∫x x dx x C− = − + 2. In the following discussion and solutions the derivative of a function h(x) will be denoted by or h'(x) . A few are somewhat challenging. 1. Mes collègues locuteurs natifs m'ont recommandé de … This is the currently selected item. Chain Rule can be applied in questions where two or more than two elements are given. Chapter 5. Show Solution. Next lesson. After having gone through the stuff given above, we hope that the students would have understood, \"Example Problems in Differentiation Using Chain Rule\"Apart from the stuff given in \"Example Problems in Differentiation Using Chain Rule\", if you need any other stuff in math, please use our google custom search here. Chain Rule problems or examples with solutions. ( ) ( ) 1 1 2 3 31 4 1 42 21 6 x x dx x C − ∫ − = − − + 3. The only problem is that we want dy / dx, not dy /du, and this is where we use the chain rule. As u = 3x − 2, du/ dx = 3, so. Site Navigation. The most important thing to understand is when to use it and then get lots of practice. Use the chain rule to differentiate composite functions like sin(2x+1) or [cos(x)]³. Example #2 Differentiate y =(x 2 +5 x) 6 . The Problem\nComplex Functions\nWhy?\nnot all derivatives can be found through the use of the power, product, and quotient rules\nIn this section you can learn and practice Aptitude Questions based on \"Chain Rule\" and improve your skills in order to face the interview, competitive examination and various entrance test (CAT, GATE, GRE, MAT, Bank Exam, Railway Exam etc.) 1. If the chocolates are taken away by 300 children, then how many adults will be provided with the remaining chocolates? Up Next. 1. Chain Rule Examples. Integral of tan x. Problems on Chain Rule - Quantitative aptitude tutorial with easy tricks, tips, short cuts explaining the concepts. Each test has all the basics questions to advanced questions with answer and explanation for your clear understanding, you can download the test result as pdf for further reference. The chain rule states formally that . Question 3 Use the chain rule and the fact that when $y=af(x)$, $\\frac{\\mathrm{d}y}{\\mathrm{d}x}=af'(x)$ to differentiate the following: Page Navigation." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8708607,"math_prob":0.9388883,"size":10200,"snap":"2021-31-2021-39","text_gpt3_token_len":2517,"char_repetition_ratio":0.1700667,"word_repetition_ratio":0.016393442,"special_character_ratio":0.24705882,"punctuation_ratio":0.122815534,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9873761,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-24T14:39:15Z\",\"WARC-Record-ID\":\"<urn:uuid:f9b205e4-ca68-4215-b7a0-a4366d9edc0e>\",\"Content-Length\":\"21749\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:479589c6-269f-4511-895c-61065d3b06e6>\",\"WARC-Concurrent-To\":\"<urn:uuid:5f85313c-16f7-47e8-a85d-a4fec09783e4>\",\"WARC-IP-Address\":\"217.182.147.37\",\"WARC-Target-URI\":\"https://de3de.com/industrial-hemp-tipap/chain-rule-questions-f6e051\",\"WARC-Payload-Digest\":\"sha1:VKKA44JBBNDBUFDX5KTOE5I5HJ376IBW\",\"WARC-Block-Digest\":\"sha1:D73G4JIY7JMZIAMOW564YHDRXG2O6G4Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057558.23_warc_CC-MAIN-20210924140738-20210924170738-00453.warc.gz\"}"}
http://mirror.theoryofcomputing.org/articles/v016a012/index.html
[ "", null, "Volume 16 (2020) Article 12 pp. 1-18\nOptimality of Correlated Sampling Strategies\nReceived: December 2, 2017\nRevised: July 31, 2020\nPublished: November 9, 2020\nDownload article from ToC site:\n[PDF (265K)]    [PS (1309K)]    [PS.GZ (309K)]\n[Source ZIP]\nKeywords: distributions, sampling, correlated sampling, coupling, MinHash, communication complexity\nACM Classification: F.0, G.3\nAMS Classification: 68Q99, 94A20, 68W15\n\nAbstract: [Plain Text Version]\n\nIn the correlated sampling problem, two players are given probability distributions $P$ and $Q$, respectively, over the same finite set, with access to shared randomness. Without any communication, the two players are each required to output an element sampled according to their respective distributions, while trying to minimize the probability that their outputs disagree. A well known strategy due to Kleinberg--Tardos and Holenstein, with a close variant (for a similar problem) due to Broder, solves this task with disagreement probability at most $2 \\delta/(1+\\delta)$, where $\\delta$ is the total variation distance between $P$ and $Q$. This strategy has been used in several different contexts, including sketching algorithms, approximation algorithms based on rounding linear programming relaxations, the study of parallel repetition and cryptography.\n\nIn this paper, we give a surprisingly simple proof that this strategy is essentially optimal. Specifically, for every $\\delta \\in (0,1)$, we show that any correlated sampling strategy incurs a disagreement probability of essentially $2\\delta/(1+\\delta)$ on some inputs $P$ and $Q$ with total variation distance at most $\\delta$. This partially answers a recent question of Rivest.\n\nOur proof is based on studying a new problem that we call constrained agreement. Here, the two players are given subsets $A \\subseteq [n]$ and $B \\subseteq [n]$, respectively, and their goal is to output an element $i \\in A$ and $j \\in B$, respectively, while minimizing the probability that $i \\neq j$. We prove tight bounds for this question, which in turn imply tight bounds for correlated sampling. Though we settle basic questions about the two problems, our formulation leads to more fine grained questions that remain open." ]
[ null, "http://mirror.theoryofcomputing.org/images/pdficon_large.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92802304,"math_prob":0.98532766,"size":1909,"snap":"2021-21-2021-25","text_gpt3_token_len":417,"char_repetition_ratio":0.09868766,"word_repetition_ratio":0.0,"special_character_ratio":0.22629648,"punctuation_ratio":0.11940298,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9978127,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-15T16:28:43Z\",\"WARC-Record-ID\":\"<urn:uuid:a51aaa7f-c8d2-4a9e-bad7-271a6afcbd06>\",\"Content-Length\":\"9426\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:28d8849e-75d9-4e09-b80e-43d2201e1951>\",\"WARC-Concurrent-To\":\"<urn:uuid:11467e4a-6dcb-4ef5-9145-4fe06eadf0db>\",\"WARC-IP-Address\":\"128.135.164.114\",\"WARC-Target-URI\":\"http://mirror.theoryofcomputing.org/articles/v016a012/index.html\",\"WARC-Payload-Digest\":\"sha1:26RE54YBMVHMSLTMGFKEFP2LAPKQKBX4\",\"WARC-Block-Digest\":\"sha1:65WPOHZT7DDNZ5DBYV6M4L7K557IVGCE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487621450.29_warc_CC-MAIN-20210615145601-20210615175601-00020.warc.gz\"}"}
https://www.hpmuseum.org/forum/printthread.php?tid=7168
[ "", null, "Orthogonal Matrix Test - Printable Version +- HP Forums (https://www.hpmuseum.org/forum) +-- Forum: HP Software Libraries (/forum-10.html) +--- Forum: HP Prime Software Library (/forum-15.html) +--- Thread: Orthogonal Matrix Test (/thread-7168.html) Orthogonal Matrix Test - Eddie W. Shore - 11-04-2016 07:31 PM For the square matrix M, it is orthogonal when either of the following conditions are met: (I) M * M^T = M^T * M = I (II) M^-1 = M^T The program presented on this blog entry will use the first test. Since matrices, unfortunately, cannot be directly compared on the Casio graphing calculators, a work around with two FOR loops is implemented. HP Prime Program ORTHOG Code: ```EXPORT ORTHOG(m) BEGIN // 2016-11-01 EWS // orthogonal test LOCAL n,p,s; s≔SIZE(m); s≔s(1); n≔TRN(m)*m; p≔IDENMAT(s); IF n==p THEN RETURN 1; ELSE RETURN 0; END; END;```" ]
[ null, "https://www.hpmuseum.org/mohpcf.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.78734314,"math_prob":0.8251202,"size":703,"snap":"2020-10-2020-16","text_gpt3_token_len":188,"char_repetition_ratio":0.115879826,"word_repetition_ratio":0.0,"special_character_ratio":0.28876245,"punctuation_ratio":0.14074074,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9661361,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-05T14:25:03Z\",\"WARC-Record-ID\":\"<urn:uuid:9b0d58fc-2a75-49af-976c-46a8668b3dd8>\",\"Content-Length\":\"2976\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0913b64f-68b0-4e7b-b498-4a424c219d0f>\",\"WARC-Concurrent-To\":\"<urn:uuid:681097de-8113-489c-98ce-8c217d786a40>\",\"WARC-IP-Address\":\"209.197.117.170\",\"WARC-Target-URI\":\"https://www.hpmuseum.org/forum/printthread.php?tid=7168\",\"WARC-Payload-Digest\":\"sha1:5OORWNAQSE2GKIYT4IESZUSTHCMFJRFX\",\"WARC-Block-Digest\":\"sha1:JNIW4E6R6CIHBLHUWNE3AQQOSCUMTQJZ\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371604800.52_warc_CC-MAIN-20200405115129-20200405145629-00110.warc.gz\"}"}
https://books.google.co.ve/books?qtid=87e7858&dq=related:ISBN8474916712&lr=&id=fso2AAAAMAAJ&output=html_text&sa=N&start=170
[ "Libros Libros", null, "A diameter of a circle is a straight line drawn through the centre, and terminated both ways by the circumference.", null, "A Treatise of Plane Trigonometry, and the Mensuration of Heights and ... - Página 19\npor Jeremiah Day - 1848 - 153 páginas\nVista completa - Acerca de este libro", null, "## New Plane and Solid Geometry\n\nWebster Wells - 1908 - 298 páginas\n...and terminating in the opposite sides cannot bisect each other. BOOK II THE CIRCLE DEFINITIONS 142. A diameter of a circle is a straight line drawn through- the centre, having its extremities in the circumference. 143. By the definition of § 23 All radii of a circle...\nVista completa - Acerca de este libro", null, "## Applied Mechanical Drawing for First and Second Year Classes in High Schools ...\n\nFrank Elliott Mathewson, Judson Lloyd Stewart - 1911 - 158 páginas\n...seconds are denoted by symbols, thus 45 degrees, 17 minutes, 9 seconds is written 4-5°-, 17'-, 9\". A diameter of a circle is a straight line drawn through the center, having its extremities in the circumference; as AOB. A radius is a straight line drawn from...\nVista completa - Acerca de este libro", null, "## Practical Geometry & Graphics: A Text-book for Students in Technical and ...\n\nEdward L. Bates, Frederick Charlesworth - 1912 - 621 páginas\n...device is employed to make such points conspicuous and more easily located by the reader. A diameter is a straight line drawn through the centre, and terminated both ways by the circumference. FIG. 1. Thus, in Fig. 2, O is the centre of the circle; OA, OB, OC, are radii; AOB is a diameter. From...\nVista completa - Acerca de este libro", null, "## Practical Mathematics: Instruction Paper, Volumen3\n\nGlenn Moody Hobbs - 1912\n...circumference, every point of which is equally distant from a point within called the center, Fig. 38. A diameter of a circle is a straight line drawn through the center, terminating at both ends in the circumference. A radius of a circle is a straight line joining...\nVista completa - Acerca de este libro", null, "## Standard American Cyclopedia of Steam Engineering: A Treatise on the Care ...\n\nCalvin Franklin Swingle - 1913 - 1249 páginas\n...within the figure to the circumference are equal, and this point is called the center of the circle. A diameter of a circle is a straight line drawn through the center and terminated both ways by the circumference, as AC in Fig. 45. Fig. 45. 'M A radius is a straight...\nVista completa - Acerca de este libro", null, "## Everyday Arithmetic: Book one-[three], Libro 3\n\n...fraction is the number that shows into how many equal parts a unit has been divided. Diameter of a circle. A diameter of a circle is a straight line drawn through the center of the circle to opposite points in its circumference. Difference or remainder. A difference...\nVista completa - Acerca de este libro", null, "## Mechanical Drawing: Instruction Paper, Parte2\n\nErvin Kenison - 1916 - 71 páginas\n...circumference, every point of which is equally distant from a point within called the center, Fig. 58. A diameter of a circle is a straight line drawn through the center, terminating at both ends in the circumference, Fig. 59. A radius of a circle is a straight...\nVista completa - Acerca de este libro", null, "## Cyclopedia of Architecture, Carpentry, and Building: A General Reference ...\n\n1917\n...circumference, every point of which is equally distant from a point within called the center, Fig. 58. A diameter of a circle is a straight line drawn through the center, terminating at both ends in the circumference, Fig. 59. Fig. 58. Circle Fig. 5D. Diameter and...\nVista completa - Acerca de este libro", null, "## Modern Shop Practice: A General Reference Work, Volumen5\n\n1917\n...circumference, every point of which is equally distant from a point within called the center, Fig. 58. A diameter of a circle is a straight line drawn through the center, terminating at both ends in the circumference, Fig. 59. A radius of a circle is a straight...\nVista completa - Acerca de este libro", null, "## Sanitary, Heating and Ventilation Engineering: A General Reference ..., Volumen4\n\n1918\n...circumference, every point of which is equally distant from a point within called the center, Fig. 58. A diameter of a circle is a straight line drawn through the center, terminating at both ends in the circumference, Fig. 59. A radius of a circle is a straight...\nVista completa - Acerca de este libro" ]
[ null, "https://books.google.co.ve/googlebooks/quote_l.gif", null, "https://books.google.co.ve/googlebooks/quote_r.gif", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null, "https://books.google.co.ve/books/content", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9128692,"math_prob":0.935555,"size":3052,"snap":"2021-31-2021-39","text_gpt3_token_len":739,"char_repetition_ratio":0.19619423,"word_repetition_ratio":0.45333335,"special_character_ratio":0.26048493,"punctuation_ratio":0.21693908,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96752393,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-25T00:46:32Z\",\"WARC-Record-ID\":\"<urn:uuid:cdbce665-be7f-4ae3-b0d8-fcc10dbcc51b>\",\"Content-Length\":\"32472\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:29b4c912-e553-49ba-899c-8feb239716e0>\",\"WARC-Concurrent-To\":\"<urn:uuid:7321a35a-7bb8-4334-8769-049063f0b3f7>\",\"WARC-IP-Address\":\"142.250.188.206\",\"WARC-Target-URI\":\"https://books.google.co.ve/books?qtid=87e7858&dq=related:ISBN8474916712&lr=&id=fso2AAAAMAAJ&output=html_text&sa=N&start=170\",\"WARC-Payload-Digest\":\"sha1:D63HHRLZIIJ4PK5WJV5ZBYKCTISNN3QS\",\"WARC-Block-Digest\":\"sha1:27IOPLV76B6VN2SIT2TQRE3ZPMGGD27H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057584.91_warc_CC-MAIN-20210924231621-20210925021621-00206.warc.gz\"}"}
https://quickexcel.com/calculate-the-square-root/
[ "# How to Calculate the Square Root in Excel?", null, "In this tutorial, we will learn 3 easy ways to calculate the square root of a number in Excel. It will be a very common calculation that you’ll perform very often if you work with large mathematical datasets of any kind. So let’s get started.\n\n## Different Ways to Calculate the Square Root in Excel\n\nThere are many different ways you can use to calculate square roots and here are some of the most common ones.\n\n### 1. SQRT() function\n\nExcel provides an inbuilt mathematical function SQRT to calculate the positive square root of a number.\n\nSyntax: SQRT(n). Here n is the number or cell reference which contains the number for which you want the square root.\n\nWhen the SQRT function is applied to a negative number, #NUM! error message is returned.\n\nWe can avoid the #NUM! error message, use the ABS function to find the absolute value of the number and then calculate the square root.\n\n### 2. POWER() Function\n\nThe POWER function returns the result of a number raised to a power. Syntax: POWER(n,power), where n is the base number or cell reference which contains the base number and power is the exponent to which the base number is raised. This function can be utilized to find the square root of a number by keeping power as 0.5 or (1/2).\n\n## 3. Using the Caret ^ operator\n\nWe can use the caret operator ^ to raise a number to the power of half (1/2 or 0.5) and get the square root of the number.\n\nSyntax: n^(1/2) or n^0.5, where n is the number or cell reference which contains the number for which you want the square root.\n\nAs you can see, we have the square root in the column B using the caret operator.\n\n## Conclusion\n\nExcel provides a direct function SQRT to calculate the square root of a number. There are other simple methods to do the same which are discussed above. We hope you learned something new today!" ]
[ null, "https://quickexcel.com/wp-content/uploads/2021/06/How-to-calculate-square-root-in-Excel.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86517227,"math_prob":0.99557954,"size":1791,"snap":"2021-43-2021-49","text_gpt3_token_len":404,"char_repetition_ratio":0.17907107,"word_repetition_ratio":0.13622291,"special_character_ratio":0.22501396,"punctuation_ratio":0.09625668,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998364,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T21:55:57Z\",\"WARC-Record-ID\":\"<urn:uuid:4736ceae-ae0b-4549-9b41-4f53f2db437c>\",\"Content-Length\":\"49983\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:53741297-0b0c-41b7-90c8-1265b3819e4a>\",\"WARC-Concurrent-To\":\"<urn:uuid:0955e6a0-2cb7-40ca-8bd6-e47f031fd216>\",\"WARC-IP-Address\":\"45.79.77.230\",\"WARC-Target-URI\":\"https://quickexcel.com/calculate-the-square-root/\",\"WARC-Payload-Digest\":\"sha1:WG4PIZCYW4OQRU33DD2YSRELFIRAQ7KG\",\"WARC-Block-Digest\":\"sha1:NJFU7JSIWWKCXW5UU5ZPBMKHAE7OIS5F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585441.99_warc_CC-MAIN-20211021195527-20211021225527-00370.warc.gz\"}"}
https://klasse-mit.com/developer/article/1122004g5p-32048g8ld
[ "Home\n\n# Rolling mean Python\n\nExplaining the Pandas Rolling() Function. To calculate a moving average in Pandas, you combine the rolling() function with the mean() function. Let's take a moment to explore the rolling() function in Pandas: DataFrame.rolling(self, window, min_periods=None, center=False, win_type=None, on=None, axis=0, closed=None def rolling_mean(x, window, min_periods=None, center=False): if PD_VERSION >= '0.18.0': return x.rolling(window, min_periods=min_periods, center=center).mean() else: return pd.rolling_mean( x, window, min_periods=min_periods, center=center Rolling.mean(*args, **kwargs)[source]¶ Calculate the rolling mean of the values The function rolling_mean, along with about a dozen or so other function are informally grouped in the Pandas documentation under the rubric moving window functions; a second, related group of functions in Pandas is referred to as exponentially-weighted functions (e.g., ewma, which calculate\n\n### Calculate a Rolling Average (Mean) in Pandas • datag\n\n1. _periods = None, center = False, win_type = None, on = None, axis = 0, closed = None) [source] ¶ Provide rolling window calculations. Parameters window int, offset, or BaseIndexer subclass. Size of the moving window. This is the number of observations used for calculating the statistic. Each window will be a fixed size\n2. Its function rolling_mean does the job conveniently. It also returns a NumPy array when the input is an array. It is difficult to beat rolling_mean in performance with any custom pure Python implementation. Here is an example performance against two of the proposed solutions\n3. _periods=1).mean()\n\nPython is a great language for doing data analysis, primarily because of the fantastic ecosystem of data-centric python packages. Pandas is one of those packages and makes importing and analyzing data much easier. Pandas dataframe.rolling() function provides the feature of rolling window calculations. The concept of rolling window calculation is most primarily used in signal processing and time series data. In a very simple words we take a window size of k at a time and perform. To be specific, a rolling mean is a low-pass filter. This means that is leaves low frequency signals alone, while making high frequency signals smaller. Sharp increases in the data have a high frequency. If we make the kernel larger, the filter attenuates high frequency signals more. This is exactly how the rolling average works. It gets rid of high frequency noise. It also means that we must. You can simply calculate the rolling average by summing up the previous 'n' values and dividing them by 'n' itself. But for this, the first (n-1) values of the rolling average would be Nan. In this article, we will learn how to make a time series plot with a rolling average in Python using Pandas and Seaborn libraries. Below is the syntax for computing rolling average using pandas HPI_data['TX12MA'] = pd.rolling_mean(HPI_data['TX'], 12) This gives us a new column, which we've named TX12MA to reflect Texas, and 12 moving average. We apply this with pd.rolling_mean (), which takes 2 main parameters, the data we're applying this to, and the periods/windows that we're doing\n\n### Python Examples of pandas\n\n1. Computing 7-day rolling average with Pandas rolling() In Pandas, we can compute rolling average of specific window size using rolling() function followed by mean() function. Here we also perform shift operation to shift the NA values to both ends. corona_ny['cases_7day_ave'] = corona_ny.positiveIncrease.rolling(7).mean().shift(-3\n2. The moving average is commonly used with time series to smooth random short-term variations and to highlight other components (trend, season, or cycle) present in your data. The moving average is also known as rolling mean and is calculated by averaging data of the time series within k periods of time\n3. We previously introduced how to create moving averages using python. This tutorial will be a continuation of this topic. A moving average in the context of statistics, also called a rolling/running average, is a type of finite impulse response. In our previous tutorial we have plotted the values of the arrays x and y: Let'\n4. A rolling mean is simply the mean of a certain number of previous periods in a time series.. To calculate the rolling mean for one or more columns in a pandas DataFrame, we can use the following syntax: df[' column_name ']. rolling (rolling_window). mean () This tutorial provides several examples of how to use this function in practice", null, "First, let us use the R package zoo to compute rolling average over a week and plot on top of the barplot. With rollmean() function available in zoo package we can compute rolling average. In this example below, we specify the window size to 7 to compute rolling mean. In addition, we also specify the edges in computing the rolling mean. Try changing the align argument to see how that. A moving average, also called a rolling or running average, is used to analyze the time-series data by calculating averages of different subsets of the complete dataset. Since it involves taking the average of the dataset over time, it is also called a moving mean (MM) or rolling mean multiply = 1 values = [8,16,22,12,41] n = len (values) for i in values: multiply = (multiply)* (i) geometricMean = (multiply)** (1/n) print ('The Geometric Mean is: ' + str (geometricMean)) Once you run the code in Python, you'll get the same result Pandas Series.rolling () function is a very useful function. It Provides rolling window calculations over the underlying data in the given Series object. Syntax: Series.rolling (window, min_periods=None, center=False, win_type=None, on=None, axis=0, closed=None) center : Set the labels at the center of the window. win_type : Provide a window type This tutorial explains how to calculate moving averages in Python. Example: Moving Averages in Python. Suppose we have the following array that shows the total sales for a certain company during 10 periods: x = [50, 55, 36, 49, 84, 75, 101, 86, 80, 104] Method 1: Use the cumsum() function. One way to calculate the moving average is to utilize the cumsum() function: import numpy as np #define.\n\n### python - How to calculate rolling / moving average using\n\nPYTHON. Don't Miss Out on Rolling Window Functions in Pandas. Using moving window calculations to dive into your data. Byron Dolon . Sep 10, 2020 · 5 min read. Art by bythanproductions. Window calculations can add a lot of depth to your data analysis. The Pandas library lets you perform many different built-in aggregate calculations, define your functions and apply them across a DataFrame. Replace NaN in rolling mean in python . Replace NaN in rolling mean in python. 0 votes. I have a dataset as follows: ts Out : Sales Month Jan 1808 Feb 1251 Mar 3023 Apr 4857 May 2506 Jun 2453 Jul 1180 Aug 4239 Sep 1759 Oct 2539 Nov 3923 Dec 2999. After taking a moving average of window=2, the output is: shifted = ts. shift (0) window = shifted. rolling (window = 2) means = window. mean. #pandas #python #rollingPlease SUBSCRIBE:https://www.youtube.com/subscription_center?add_user=mjmacartyTry my Hands-on Python for Finance course on Udemy.. When working with time series data with NumPy I often find myself needing to compute rolling or moving statistics such as mean and standard deviation. The simplest way compute that is to use a for loop: def rolling_apply(fun, a, w): r = np.empty(a.shape) r.fill(np.nan) for i in range(w - 1, a.shape): r[i] = fun(a[ (i-w+1):i+1]) return r. A.\n\nI want to learn how to use rolling_mean by pandas, the pandas version is 0.21.0. But when I run the above code, I got the following error: AttributeError: 'list' object has no attribue 'rolling' Please show me how to use pandas.rolling_mean Or if other python package has the similar function, please also advise how to use them. Thanks Pandas DataFrame - rolling() function: The rolling() function is used to provide rolling window calculations. w3resource. home Front End HTML CSS JavaScript HTML5 Schema.org php.js Twitter Bootstrap Responsive Web Design tutorial Zurb Foundation 3 tutorials Pure CSS HTML5 Canvas JavaScript Course Icon Angular React Vue Jest Mocha NPM Yarn Back End PHP Python Java Node.js Ruby C programming PHP. Low.rolling(window=10).mean() df['High 10-trday MA'] = df.High.rolling(window=10).mean() Here the parameter window is set to 10. This means that our moving average runs over 10 rows — in this. That means we can easily do this entire piece of analysis in memory. Things get slightly more difficult if we want to calculate the mean rolling correlation of the constituents of a larger ETF or index. In another post, we'll solve this problem for the S&P 500 index. We'll also consider how the index has changed over time\n\nrolling_mean 移动窗口的均值 . pandas.rolling_mean(arg, window, min_periods=None, freq=None, center=False, how=None, **kwargs) 以上这篇python pandas移动窗口函数rolling的用法就是小编分享给大家的全部内容了,希望能给大家一个参考,也希望大家多多支持脚本之家。 您可能感兴趣的文章: python pandas dataframe 去重函数的具体. In statistics, a moving average (rolling average or running average) is a calculation to analyze data points by creating a series of averages of different subsets of the full data set. It is also called a moving mean (MM) or rolling mean and is a type of finite impulse response filter. Variations include: simple, cumulative, or weighted forms (described below)\n\n### pandas.DataFrame.rolling — pandas 1.2.4 documentatio\n\nRolling means creating a rolling window with a specified size and perform calculations on the data in this window which, of course, rolls through the data. The figure below explains the concept of rolling. It is worth noting that the calculation starts when the whole window is in the data. In other words, if the size of the window is three, the first aggregation is done at the third row. Let. pandas, Python, Rolling, hd_close.rolling (window=12).mean() window: 몇 개씩 연산할지 입력.mean(): 평균내라. 출력값을 보면 2010-01-19 부터 값이 나오는 것을 확인할 수 있는데, 이는 이전 12개의 데이터가 2010-01-19부터 존재하기 때문 입니다. 즉, 데이터가 12개 미만인 값들은 NaN으로 표시 됐습니다. 2010-01-19의 결과값. Rolling sum with a window length of 2, using the 'triang' window type. Rolling sum with a window length of 1, min_periods defaults to the window length. Contrasting to an integer rolling window, this will roll a variable length window corresponding to the time period. The default for min_periods is 1\n\nIn this video we will do a plot of Rolling Mean and Rolling Standard Deviation.⚡ Help me know if you want more videos like this one by giving a ������ or a comme.. 相信初学Pandas时间序列时,会遇到rolling函数,不知道该怎么理解,对吧?让我们用最简单的例子来说明吧。代码如下:import pandas as pd # 导入 pandas index = pd.date_range('2019-01-01',periods=20) #创建日期序列data = pd.DataFrame(np.arange(len(inde.. In this tutorial, we will discuss how to implement moving average for numpy arrays in Python. We can calculate the Moving Average of a time series data using the rolling() and mean() functions as shown below. import pandas as pd import numpy as np data = np.array([10,5,8,9,15,22,26,11,15,16,18,7]) d = pd.Series(data) print(d.rolling(4).mean()) Output: 0 NaN 1 NaN 2 NaN 3 8.00 4 9.25 5 13. Rolling Windows on Timeseries with Pandas. The first thing we're interested in is: What is the 7 days rolling mean of the credit card transaction amounts. This means in this simple. Simple Moving Average is the most common type of average used. In SMA, we perform a summation of recent data points and divide them by the time period. The higher the value of the sliding width, the more the data smoothens out, but a tremendous value might lead to a decrease in inaccuracy. To calculate SMA, we use pandas.Series.rolling () method\n\nPython Moving Average. Creating a moving average is a fundamental part of data analysis. You can easily create moving averages with Python data manipulation package. Pandas has a great function that will allow you to quickly produce a moving average based on the window you define. This window can be defined by the periods or the rows of data. Pandas ROLLING() function: The rolling function. Project description. rolling is a collection of computationally efficient rolling window iterators for Python. Many useful arithmetical, logical and statistical functions are implemented to allow the window to be computed in sub-linear time (and in many instances constant time). These include: Sum. Min and Max. All and Any. Mean, Median and Mode Looking at the 365-day rolling mean time series, we can see that the overall annual trend in electricity consumption is fairly stable with low consumption recorded around 2009 and 2013. De-trending time series . Sometimes it would be beneficial to remove the trend from our data, especially if it is quite pronounced (as seen in Fig 3), so we can assess the seasonal variation (more on this in a. To calculate the mean() we use the mean function of the particular column; Then apply fillna() function, we will change all 'NaN' of that particular column for which we have its mean and print the updated data frame. Python3. import numpy as np. import pandas as pd # A dictionary with list as values. GFG_dict = { 'G1': [10, 20,30,40], 'G2': [25, np.NaN, np.NaN, 29], 'G3': [15, 14, 17, 11.\n\nRolling Window Statistics. A step beyond adding raw lagged values is to add a summary of the values at previous time steps. We can calculate summary statistics across the values in the sliding window and include these as features in our dataset. Perhaps the most useful is the mean of the previous few values, also called the rolling mean A rolling average can help you find trends that would otherwise be hard to detect. Using the data from above, you get a graph that looks like this: That's not terribly helpful as a trend detector. It looks like my website got a case of the hiccups. Use a rolling average, though, and you start to see a pattern emerge, with peaks happening more and more often: That's why rolling averages are. pcluo added a commit to pcluo/pandas that referenced this issue on May 22, 2017. BUG: groupby-rolling with a timedelta ( pandas-dev#16091) a66a612. closes pandas-dev#13966 xref to pandas-dev#15130, closed by pandas-dev#15175. Copy link\n\n### python - Moving average or running mean - Stack Overflo\n\n• Moving average smoothing is a naive and effective technique in time series forecasting. It can be used for data preparation, feature engineering, and even directly for making predictions. In this tutorial, you will discover how to use moving average smoothing for time series forecasting with Python. After completing this tutorial, you will know: How moving average smoothing works and some.\n• Python pandas.rolling_std() Examples The following are 10 code examples for showing how to use pandas.rolling_std(). These examples are extracted from open source projects. You can vote up the ones you like or vote down the ones you don't like, and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar. You.\n• numpy.roll () in Python. Last Updated : 31 May, 2021. The numpy.roll () function rolls array elements along the specified axis. Basically what happens is that elements of the input array are being shifted. If an element is being rolled first to the last position, it is rolled back to the first position\n• 概念: 为了提升数据的准确性,将某个点的取值扩大到包含这个点的一段区间,用区间来进行判断,这个区间就是窗口。移动窗口就是窗口向一端滑行,默认是从右往左,每次滑行并不是区间整块的滑行,而是一个单位一个单位的滑行。给个例子好理解一点:import pandas as pds = [1,2,3,5,6,10,12,14,12,30]pd.\n• Python Example for Moving Average Method. Here is the Python code for calculating moving average for sales figure. The code that calculates the moving average or rolling mean is df['Sales'].rolling(window=3).mean(). The example below represents the calculation of simple moving average (SMA). import pandas as pd import numpy as np # # Create a numpy array of years and sales # arr = np.array.\n\nrolling_mean 移动窗口的均值 pandas.rolling_mean 今天小编就为大家分享一篇python pandas移动窗口函数rolling的用法,具有很好的参考价值,希望对大家有所帮助。一起跟随小编过来看看吧 . 基于python计算滚动方差(标准差)talib和pd.rolling函数差异详解 09-16. 主要介绍了基于python计算滚动方差(标准差)talib和pd. The Exponential Moving Average (EMA) is a wee bit more involved. First, you should find the SMA. Second, calculate the smoothing factor. Then, use your smoothing factor with the previous EMA to find a new value. In this way, the latest prices are given higher weights, whereas the SMA assigns equal weight to all periods Geometric Mean Function in python pandas is used to calculate the geometric mean of a given set of numbers, Geometric mean of a data frame, Geometric mean of column and Geometric mean of rows. let's see an example of each we need to use the package name stats from scipy in calculation of geometric mean 注:rolling_mean()这种写法已经淘汰了,现在都是df.rolling().mean()、 df.rolling().std()这样来写。 例:计算苹果收盘价的平均移动线 获取数据. 从雅虎获取苹果公司2016年1月1日至今的股票数据�\n\n### python - How to fill nan values with rolling mean in\n\n• rolmean = pd.rolling_mean (timeseries, window = 12) rolstd = pd.rolling_std (timeseries, window = 12) expwighted_avg = pd.ewma(ts_log, halflife=12) 会有报错 . AttributeError: module 'pandas' has no attribute 'rolling_mean' AttributeError: module 'pandas' has no attribute 'rolling_std' AttributeError: module 'pandas' has no attribute 'ewma' 这是因为pandas版本跟新了,应该改为.\n• Python's basic tools for working with dates and times reside in the built-in datetime module. It would be nice if we could average this out by a week, which is where a rolling mean comes in. A rolling mean, or moving average, is a transformation method which helps average out noise from data. It works by simply splitting and aggregating the data into windows according to function, such.\n• Python 3 provides the statistics module, which comes with very useful functions like mean(), median(), mode(), etc. The arithmetic mean is a sum of data that is divided by the number of data points. It is the measure of the central location of data in a set of values that vary in range.. Python averag\n• python时间序列分析之_用pandas中的rolling函数计算时间窗口数据 . python万. 发布时间: 19-01-16 14:51. 简介. 由于系统编辑器限制,代码行用无序列表表示。 上篇文章中,我们讲解了如何对时间数据进行重采样及重采样中降采样和升采样的概览和使用方法,通过重采样我们可以得到任何想要频率的数据.\n• The moving averages are created by using the pandas rolling_mean function on the bars ['Close'] closing price of the AAPL stock. Once the individual moving averages have been constructed, the signal Series is generated by setting the colum equal to 1.0 when the short moving average is greater than the long moving average, or 0.0 otherwise\n• Moving Average Backtesting Strategy in Python. To backtest the algorithm in Python, we start by creating a list containing the profit for each of our long positions. First (1), we create a new column that will contain True for all data points in the data frame where the 20 days moving average cross above the 250 days moving average\n\nPython for Finance, Part 3: Moving Average Trading Strategy. Expanding on the previous article, we'll be looking at how to incorporate recent price behaviors into our strategy. In the previous article of this series, we continued to discuss general concepts which are fundamental to the design and backtesting of any quantitative trading strategy A popular and widely used statistical method for time series forecasting is the ARIMA model. ARIMA is an acronym that stands for AutoRegressive Integrated Moving Average. It is a class of model that captures a suite of different standard temporal structures in time series data. In this tutorial, you will discover how to develop an ARIMA model for time series forecasting i 移動平均、英語ではmoving meanやrolling meanなんて呼ばれまして、いろいろパッケージなり、自作で関数を作られてる方も見受けられますが、いざ自分で作ろうとするとちょっと面倒。。そんなときこの関数を見つけました。 Rccpが便利! 大きく2ステップで求めます。 ①当該週を含んだ、2週間で. The following are 6 code examples for showing how to use pandas.rolling_max().These examples are extracted from open source projects. You can vote up the ones you like or vote down the ones you don't like, and go to the original project or source file by following the links above each example The results show that the data is now stationary, indicated by the relative smoothness of the rolling mean and rolling standard deviation after running the ADF test again. Differencing. This method removes the underlying seasonal or cyclical patterns in the time series. Since the sample dataset has a 12-month seasonality, I used a 12-lag.\n\n### Python Pandas dataframe\n\n• Arithmetic Mean Average. An average calculated by adding the value of the points in a data set and dividing the sum by the number of data points. For example, suppose one wishes to calculate the average income of a country with exactly five people in it, and their incomes are \\$25,000, \\$26,000, \\$43,000, \\$70,000, and \\$72,000. It is calculated as.\n• NumPy Mean. NumPy Mean: To calculate mean of elements in a array, as a whole, or along an axis, or multiple axis, use numpy.mean() function.. In this tutorial we will go through following examples using numpy mean() function. Mean of all the elements in a NumPy Array\n• pandas. 模块,. rolling_mean () 实例源码. 我们从Python开源项目中,提取了以下 50 个代码示例,用于说明如何使用 pandas.rolling_mean () 。. def BBANDS(df_price, periods=20, mul=2): # Middle Band = 20-day simple moving average (SMA) df_middle_band = pd.rolling_mean(df_price, window=periods) #df_middle_band = pd.\n• Simple Moving Average(SMA) in Python. A simple moving average is the simplest of all the techniques which one can use to forecast. A moving average is calculated by taking the average of the last N value. The average value which we get is considered the forecast for the next period. Why we use a simple moving average? Moving averages help us to identify the trends in the data quickly. You can.", null, "Python for Financial Analysis with Pandas. Learn Python for Financial Data Analysis with Pandas (Python library) in this 2 hour free 8-lessons online course.. The 8 lessons will get you started with technical analysis using Python and Pandas.. The 8 lessons. Lesson 1: Get to know Pandas with Python - how to get historical stock price data.; Lesson 2: Learn about Series from Pandas - how to. Groupby single column - groupby mean pandas python: groupby() function takes up the column name as argument followed by mean() function as shown below ''' Groupby single column in pandas python''' df1.groupby(['State'])['Sales'].mean() We will groupby mean with single column (State), so the result will be. using reset_index() reset_index() function resets and provides the new index to the.\n\n### Smoothing Data by Rolling Average with NumPy - Scientific\n\n• Python is an extraordinary language for doing information investigation, essentially in view of the incredible environment of information driven python bundles. Pandas is one of those bundles and makes bringing in and investigating information a lot simpler. Syntax of Pandas rolling. Given below is the syntax of Pandas rolling\n• Calculate Rolling Mean. # Calculate the moving average. That is, take # the first two values, average them, # then drop the first and add the third, etc. df.rolling(window=2).mean() score. 0\n• Python code for computing the Commodity Channel Index. In the code below, we use the rolling(), mean(), and mad() functions to compute the Commodity Channel Index. The rolling and mean function takes a time series or a data frame along with the number of periods and computes the rolling mean. The mad() function computes the mean deviation based.\n• • Rolling values have less variations in mean and standard deviation in magnitude. • the test statistic is smaller than 1% of the critical value. So we can say we are almost 99% confident that.\n• Here's the complete guide on how to compute a rolling average, also called a moving average. Find out how this averaging technique is used to calculate manufacturing and sales forecasts. With a free rolling average example to download, you can learn how to derive a rolling average for any set of data\n• rolling_mean ()とrolling ().mean () 「IPythonデータサイエンスクックブック」って本を読んでたら出てきたpandasのrolling_mean ()という関数について。. IPythonと見てわかるように少々古い本なので(今はJupyter)、書いてあるコードを実行しているとたまに警告文が出て.\n• _periods=None, freq=None, center=False, how=None, **kwargs) Python时间序列处理神器:Rolling 对象,3分钟入门 | 原创 . Rolling 对象在处理时间序列的数据时,应用广泛,在Python中Pandas包实现了对这类数据的处理。 double. 对比Excel,学习Python窗口函数. 对Sql比较.\n\nrolling函数返回的是window对象或rolling子类,可以通过调用该对象的mean(),sum(),std(),count()等函数计算返回窗口的值,还可以通过该对象的apply(func)函数,通过自定义函数计算窗口的特定的值,具体可看文档。. 从以上可以看出,rolling的窗口可以向前取值,向两边取值,但是没有向后取值,实际上只需要把. rolling_mean() 数据样本的算术平均数 Python join() 方法用于将序列中的元素以指定的字符连接生成一个新的字符串。这篇文章主要介绍了python中join()方法,需要的朋友可以参考下 . 2018-10-10 . Python编程实现删除VC临时文件及Debug目录的方法. 这篇文章主要介绍了Python编程实现删除VC临时文件及Debug目录的. python 实现rolling和apply函数的向下取值操作 ; pandas; rolling; 相关文章. python deque模块简单使用代码实例. 这篇文章主要介绍了python deque模块简单使用代码实例,文中通过示例代码介绍的非常详细,对大家的学习或者工作具有一定的参考学习价值,需要的朋友可以参考下. 2020-03-03 . python3实现域名查询和whois. Hi, Implementing moving average, moving std and other functions working over rolling windows using python for loops are slow. This is a effective stride trick I learned from Keith Goodman's <[hidden email]> Bottleneck code but generalized into arrays of any dimension. This trick allows the loop to be performed in C code and in the future hopefully using multiple cores Der gleitende Durchschnitt (auch gleitender Mittelwert) ist eine Methode zur Glättung von Zeit- bzw. Datenreihen. Die Glättung erfolgt durch das Entfernen höherer Frequenzanteile. Im Ergebnis wird eine neue Datenpunktmenge erstellt, die aus den Mittelwerten gleich großer Untermengen der ursprünglichen Datenpunktmenge besteht. In der Signaltheorie wird der gleitende Durchschnitt als.", null, "### How to Make a Time Series Plot with Rolling Average in\n\nA moving average means that it takes the past days of numbers, takes the average of those days, and plots it on the graph. For a 7-day moving average, it takes the last 7 days, adds them up, and divides it by 7. For a 14-day average, it will take the past 14 days. So, for example, we have data on COVID starting March 12. For the 7-day moving average, it needs 7 days of COVID cases: that is the. The average gains and losses are calculated using a smoothed moving average, or rolling mean. In this example, we will be using the exponential moving average (EMA) to calculate the rolling means. moving_avg = pd.rolling_mean(ts_log, 12) to: moving_avg = ts_log.rolling(12).mean() Pandas Tutorial is also one of the things where one can get an invaluable insight regarding the problem. Related questions 0 votes. 1 answer. module 'pandas' has no attribute 'rolling_mean' asked Oct 5, 2019 in Data Science by sourav (17.6k points) python; pandas; dataframe; 0 votes. 1 answer. Module 'pandas. For working on numerical data, Pandas provide few variants like rolling, expanding and exponentially moving weights for window statistics. Among these are sum, mean, median, variance, covariance, correlation, etc.. We will now learn how each of these can be applied on DataFrame objects\n\npython移动窗口函数 . rolling_count 计算各个窗口中非NA观测值的数量 rolling_mean 移动窗口的均值 pandas.rolling_mean. One popular way is by taking a rolling average, which means that, for each time point, you take the average of the points on either side of it. Note that the number of points is specified by a window size, which you need to choose. What happens then because you take the average is it tends to smooth out noise and seasonality. You'll see an. The weighted average of all market-betas with respect to the market index is 1. Beta>1: If a stock has a beta above 1, Rolling Regression in Python. Let's provide an example of rolling regression on Market Beta by taking into consideration the Amazon Stock (Ticker=AMZN) and the NASDAQ Index (Ticker ^IXIC). The rolling window will be 30 days and we will consider data of the last 2 years. March 2016. 27. February 2017. Admin. To display long-term trends and to smooth out short-term fluctuations or shocks a moving average is often used with time-series. The Smoothed Moving Average (SMA) is a series of averages of a time series. A simple code example is given and several variations (CMA, EMA, WMA, SMM) are presented as an outlook\n\n### Rolling statistics - Python Programming Tutorial\n\nTechnical Analysis is a great tool use by investors and analysts to find out interesting stocks to add to the portfolio. By the end of the article, we will have a Python script where we only need to input the name of the company. Then, within seconds, the stock's Bollinger bands will be calculated and plotted for our analysis Rolling Time Series . Rolling is also similar to Time Resampling, but in Rolling, we take a window of any size and perform any function on it. In simple words, we can say that a rolling window of size k means k consecutive values. Let's see an example. If we want to calculate the rolling average of 10 days, we can do it as follows Python Pandas DataFrame.rolling() 함수는 수학적 연산을위한 롤링 창을 제공합니다. pandas.DataFrame.rolling()의 구문 : DataFrame.rolling(window, min_periods=None, center=False, win_type=None, on=None, axis=0, closed=None) 매개 변수. window: 정수, 오프셋 또는 BaseIndexer 서브 클래스 유형 매개 변수입니다. 창의 크기를 지정합니다. 각.", null, "", null, "", null, "", null, "### How to Make a Time Series Plot with Rolling Average in Python\n\nApply rolling window function over time dimension of 3D data: Staph: 0: 839: Jan-01-2020, 08:31 AM Last Post: Staph : Grouping data based on rolling conditions: kapilan15: 0: 779: Jun-05-2019, 01:07 PM Last Post: kapilan15 : Pandas .rolling() with some calculations inside: irmscher: 5: 2,865: Apr-04-2019, 11:55 AM Last Post: scidam : How to use. How to Make a Time Series Plot with Rolling Average in Python? Categorical Plots. Categorical Plots are used where we have to visualize relationship between two numerical values. A more specialized approach can be used if one of the main variable is categorical which means such variables that take on a fixed and limited number of possible values. Refer to the below articles to get detailed. How to Build your First Mean Reversion Trading Strategy in Python. A step-by-step guide to mean reversion strategies . Raposa Technologies. Follow. Mar 16 · 7 min read. The beautiful thing about. However, in the meantime lets dive into dynamic rolling average using Power BI. Here are the list of functions will be using the to create our calculation: SUM. CALCULATE. LASTDATE. DATESINPERIOD. DISTINCTCOUNT. There are two points to this formula: Calculating the sum of the value in the period\n\n### Moving averages with Python\n\nThis module provides functions for calculating mathematical statistics of numeric (Real-valued) data.The module is not intended to be a competitor to third-party libraries such as NumPy, SciPy, or proprietary full-featured statistics packages aimed at professional statisticians such as Minitab, SAS and Matlab.It is aimed at the level of graphing and scientific calculators It's not 0.75s (unless your sampling rate is 60Hz), but rather 0.75*sampling rate in both directions. The reason for this is that the larger this threshold, the less like the HR signal the rolling average will be, the smaller, the more similar. I would recommend you plot the signal + rolling average with different window sizes. See what.\n\n### Python numpy How to Generate Moving Averages Efficiently\n\npandas documentation¶. Date: Apr 12, 2021 Version: 1.2.4. Download documentation: PDF Version | Zipped HTML. Useful links: Binary Installers | Source Repository | Issues & Ideas | Q&A Support | Mailing List. pandas is an open source, BSD-licensed library providing high-performance, easy-to-use data structures and data analysis tools for the Python programming language The daily data are very volatile, so using a longer term rolling average can help reveal a longer term trend. You'll be using a 360 day rolling window, and .agg() to calculate the rolling mean and standard deviation for the daily average ozone values since 2000. Instructions 100 XP. We have already imported pandas as pd, and matplotlib.pyplot as plt. Use pd.read_csv() to import 'ozone.csv. Taking care of business, one python script at a time. Tue 26 January 2016 Learn More About Pandas By Building and Using a Weighted Average Function Posted by Chris Moffitt in articles Introduction. Pandas includes multiple built in functions such as sum, mean, max, min, etc. that you can apply to a DataFrame or grouped data. However, building and using your own function is a good way to learn. python | pandas | 移动窗口函数rolling。它都是以rolling打头的函数,后接具体的函数,来显示该移动窗口函数的功能。arg : DataFrame 或 numpy的ndarray 数组格式 rolling_apply 对移动窗口应用普通数组函数 pandas.rolling_window(arg, window=None, win_type=None, min_periods=None, freq=None, center=False, mean=True, axis=0, how=None, **kwargs) ewma. rolling mean untuk data time series CO. Bisa dilihat bahwa hasil rolling_mean merupakan rata-rata dari kolom kadar CO ug/m3 untuk tiap 5 period data, 4 baris data pertama bernilai NaN karena hasil rolling number akan terlihat untuk tiap 5 data.. Forward atau Backfilling ketika berhadapan dengan missing value. Pandas menyediakan function .fillna() yang dapat digunakan untuk keperluan seperti.\n\n### How to Calculate a Rolling Mean in Pandas - Statolog\n\nPython's basic objects for working with dates and times reside in the built-in datetime module. Here we'll do a 30 day rolling mean of our data, making sure to center the window: In : daily = data. resample ('D'). sum daily. rolling (30, center = True). sum (). plot (style = [':', '--', '-']) plt. ylabel ('mean hourly count'); The jaggedness of the result is due to the hard cutoff of. Python Pandas - Aggregations - Once the rolling, expanding and ewm objects are created, several methods are available to perform aggregations on data 본 글에서는 Python의 Pandas를 이용하여 이동 평균을 구하는 방법을 설명한다.주식매매에서 이동평균은 흔하게 사용 되는 지표이다. 주식 추세 판단, 매매 시점을 결정 등에 사용한다. 이동평균 관련된 활용법 moving average)은 링크한 글에서 참고 하자. 이동평균은 흔히 단순 이동평균, 선형 가중 이동. NumPy Mean. NumPy Mean: To calculate mean of elements in a array, as a whole, or along an axis, or multiple axis, use numpy.mean() function.. In this tutorial we will go through following examples using numpy mean() function. Mean of all the elements in a NumPy Array\n\n### How to Make Time-Series Plot with Rolling Mean in R\n\nPython is one of the most popular programming languages used, among the likes of C++, Java, R, and MATLAB. It is being adopted widely across all domains, especially in data science, because of its easy syntax, huge community, and third-party support. You'll need familiarity with Python and statistics in order to make the most of this tutorial. Make sure to brush up on your Python and check. Running Average with alpha 0.1 has caught it as a transparent hand, with main emphasis on background. As alpha again reduced, you can see no hand there in front of face. ie the effect, as alpha decreases, sudden changes shows no effect on running averages. Result 4 : From the traffic video I have given in beginning of this article: Original Frame: Alpha = 0.1: Alpha = 0.01: As alpha decreases.\n\npandas is a fast, powerful, flexible and easy to use open source data analysis and manipulation tool, built on top of the Python programming language. Install pandas now! Getting started. Install pandas. Getting started. Documentation. User guide This video demonstrates how to calculate a moving (rolling) average in Microsoft Excel 2016. Two separate methods are used to generate the statistic: data an.. Let's try upping the window length to use a look-back of 50 days for the band calculations. But first, lets define a Bollinger Band trading Strategy function that we can easily run again and again while varying the inputs: def bollinger_strat(df,window,std): rolling_mean = df['Settle'].rolling(window).mean( Team sum mean std Devils 1536 768.000000 134.350288 Kings 2285 761.666667 24.006943 Riders 3049 762.250000 88.567771 Royals 1505 752.500000 72.831998 kings 812 812.000000 NaN Transformations Transformation on a group or a column returns an object that is indexed the same size of that is being grouped for developers of alternative Python implementations, the rolling stream of pre-releases may provide an additional incentive for extension module authors to migrate from the full CPython ABI to the Python stable ABI, which would also serve to make more of the ecosystem compatible with implementations that don't emulate the full CPython C API. That said, it is acknowledged that not all the. Python数据分析_Pandas06_窗函数 . 窗函数(window function)经常用在频域信号分析中。我其实不咋个懂,大概是从无限长的信号中截一段出来,然后把这一段做延拓变成一个虚拟的无限长的信号。用来截取的函数就叫窗函数,窗函数又分很多种,什么矩形窗、三角窗、高斯窗。 在scipy.signal中有各种我不懂.\n\n• Keukenhof Holland.\n• Albuquerque craigslist.\n• HYGH Kritik.\n• Fiatbit 手数料.\n• Ich gcp e6(r2) richtsnoer.\n• Blocktrainer Sunny Decree.\n• NASDAQ 100 Zusammensetzung.\n• Matsilver, nysilver.\n• Sätta ihop en fondportfölj.\n• Ripple Kurs Bitstamp.\n• Are they mean to you.\n• NAGA Auto kopieren.\n• Www agoda com hotel.\n• SCB Fribourg.\n• Erinnerungsschreiben Muster kostenlos.\n• Eos Hand Lotion Walmart.\n• Stratx pro.\n• Dampf Shop in meiner Nähe.\n• Tor faq.\n• Off Shore Crew.\n• ITunes Gutschein einlösen funktioniert nicht.\n• Verlasspferd kaufen Schweiz.\n• Verivox Stromrechner.\n• Boutique hotels Europe.\n• Xiaomi MSA deaktivieren.\n• Simpsons predictions." ]
[ null, "https://klasse-mit.com/dkyyj/KLAjM1imPKQYX7KquPnBtgHaEC.jpg", null, "https://klasse-mit.com/dkyyj/WrvsAnQAKe9QOhAThTQNDQHaD1.jpg", null, "https://klasse-mit.com/dkyyj/TkzjEr4V_AjZgpcGJCrrkwHaFk.jpg", null, "https://klasse-mit.com/dkyyj/Y7_LVhWM23rIk5y2GOFKowHaE8.jpg", null, "https://klasse-mit.com/dkyyj/aXhD7p6UbxaYHlzBlIn4bQHaFj.jpg", null, "https://klasse-mit.com/dkyyj/K_9Ux6hzlCxbCI2JqgMu2gHaDR.jpg", null, "https://klasse-mit.com/dkyyj/6R7UJXH1Orbd-UtmXAhihAAAAA.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.763651,"math_prob":0.8979192,"size":28318,"snap":"2021-43-2021-49","text_gpt3_token_len":7689,"char_repetition_ratio":0.15815498,"word_repetition_ratio":0.014360611,"special_character_ratio":0.23416202,"punctuation_ratio":0.14588279,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.98657674,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-19T02:00:04Z\",\"WARC-Record-ID\":\"<urn:uuid:3bc4d94f-0457-40f5-ac3d-bee1a94cb70c>\",\"Content-Length\":\"52451\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f7a45e27-6d05-4a9c-a3da-cffbcfea42b4>\",\"WARC-Concurrent-To\":\"<urn:uuid:5c650ae7-2eea-466f-952b-2abaa025ee78>\",\"WARC-IP-Address\":\"37.1.219.237\",\"WARC-Target-URI\":\"https://klasse-mit.com/developer/article/1122004g5p-32048g8ld\",\"WARC-Payload-Digest\":\"sha1:G3YFLRKR57V2IW2VASAMZTVGNTOBWNNV\",\"WARC-Block-Digest\":\"sha1:2HJDGTNQXY5NATYY3IO7HW4PDPFZ3CVM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585231.62_warc_CC-MAIN-20211019012407-20211019042407-00089.warc.gz\"}"}
http://fronteirastral.com/probability-worksheets-pdf/
[ "# Probability Worksheets Pdf\n\nProbability Worksheets Pdf\n\nVocabulary Worksheets from Probability Worksheets Pdf\n, source: mychaume.com", null, "72 best Dylan worksheets images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "23 best Essential Assessment Samples images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "S2 Evaluating Probability Statements pdf from Probability Worksheets Pdf\n, source: pinterest.com", null, "18 best Teaching Maths images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.co.uk", null, "22 best Data & Probability EC images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "FREEBIE Make sure to grab a copy of this free Data and Graphing for from Probability Worksheets Pdf\n, source: pinterest.com", null, "127 best Homeschool Discount images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "722 best Math images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "8 best Probability images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "23 best Essential Assessment Samples images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "Fronteirastral from Probability Worksheets Pdf\n, source: fronteirastral.com", null, "22 best Data & Probability EC images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "Probability Words and Fractions Worksheet Activity Sheet from Probability Worksheets Pdf\n, source: twinkl.co.uk", null, "162 best Homeschool Math images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "875 best Math Worksheets images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "Paper Marble Run Electronic Template Worksheets from Probability Worksheets Pdf\n, source: pinterest.com", null, "Sample Rotational Symmetry Worksheet from Probability Worksheets Pdf\n, source: pinterest.com", null, "72 best Dylan worksheets images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "graph worksheets first grade from Probability Worksheets Pdf\n, source: pinterest.com", null, "Double Ten Frame Subtraction Basic from Probability Worksheets Pdf\n, source: pinterest.com\n\nprobability worksheets year 8, probability experiments worksheets, probability worksheets mathworksheets4kids, probability worksheets with spinners, probability worksheets pdf middle school,", null, "Double Ten Frame Subtraction Basic from Probability Worksheets Pdf\n, source: pinterest.com", null, "275 best Maths Statistics and Data Handling Secondary School from Probability Worksheets Pdf\n, source: pinterest.com", null, "Probability as Fractions Marble Jar Worksheet Activity Sheet from Probability Worksheets Pdf\n, source: twinkl.co.uk", null, "38 best Probability images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "Dividing Mixed Numbers Fractions Worksheets Math from Probability Worksheets Pdf\n, source: pinterest.com", null, "128 best Mathematics images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "10 best Projects to Try images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "145 best Probability Stats images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "38 best Probability images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "145 best Probability Stats images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "Solving Linear Equations Worksheets PDF from Probability Worksheets Pdf\n, source: pinterest.com", null, "Quadratic Expressions Algebra 2 Worksheet from Probability Worksheets Pdf\n, source: pinterest.com", null, "323 best algebra 2 images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com", null, "54 best Teaching Resources images on Pinterest from Probability Worksheets Pdf\n, source: pinterest.com" ]
[ null, "http://winonarasheed.com/wp-content/uploads/72-best-dylan-worksheets-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/23-best-essential-assessment-samples-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/s2-evaluating-probability-statements-pdf-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/18-best-teaching-maths-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/22-best-data-amp-probability-ec-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/freebie-make-sure-to-grab-a-copy-of-this-free-data-and-graphing-for-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/127-best-homeschool-discount-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/722-best-math-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/8-best-probability-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/23-best-essential-assessment-samples-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf-1.jpg", null, "http://winonarasheed.com/wp-content/uploads/fronteirastral-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/22-best-data-amp-probability-ec-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf-1.jpg", null, "http://winonarasheed.com/wp-content/uploads/probability-words-and-fractions-worksheet-activity-sheet-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/162-best-homeschool-math-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/875-best-math-worksheets-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/paper-marble-run-electronic-template-worksheets-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/sample-rotational-symmetry-worksheet-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/72-best-dylan-worksheets-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf-1.jpg", null, "http://winonarasheed.com/wp-content/uploads/graph-worksheets-first-grade-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/double-ten-frame-subtraction-basic-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/double-ten-frame-subtraction-basic-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/275-best-maths-statistics-and-data-handling-secondary-school-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/probability-as-fractions-marble-jar-worksheet-activity-sheet-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/38-best-probability-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf-1.jpg", null, "http://winonarasheed.com/wp-content/uploads/dividing-mixed-numbers-fractions-worksheets-math-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/128-best-mathematics-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/10-best-projects-to-try-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/145-best-probability-stats-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/38-best-probability-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/145-best-probability-stats-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf-1.jpg", null, "http://winonarasheed.com/wp-content/uploads/solving-linear-equations-worksheets-pdf-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/quadratic-expressions-algebra-2-worksheet-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/323-best-algebra-2-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null, "http://winonarasheed.com/wp-content/uploads/54-best-teaching-resources-images-on-pinterest-image-below-probability-worksheets-pdf-of-probability-worksheets-pdf.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6827359,"math_prob":0.41862148,"size":3725,"snap":"2020-24-2020-29","text_gpt3_token_len":681,"char_repetition_ratio":0.3622682,"word_repetition_ratio":0.50509167,"special_character_ratio":0.17825504,"punctuation_ratio":0.18555008,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9963752,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,6,null,6,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-08T10:10:33Z\",\"WARC-Record-ID\":\"<urn:uuid:72ac8a2c-4002-4673-b60b-8cd266fc194b>\",\"Content-Length\":\"65609\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e11ed672-0834-4c93-abc4-e6c2d94e52b1>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc7d8fde-0920-47ac-ab11-b844cfebba11>\",\"WARC-IP-Address\":\"104.24.102.9\",\"WARC-Target-URI\":\"http://fronteirastral.com/probability-worksheets-pdf/\",\"WARC-Payload-Digest\":\"sha1:W226ZYC6FG3KWTNK2X6FSQ6YHW7GZ3R3\",\"WARC-Block-Digest\":\"sha1:KN6AVNNOODZ2GTM2CJYRUFLSK3JSVRC2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655896932.38_warc_CC-MAIN-20200708093606-20200708123606-00554.warc.gz\"}"}
https://www.colorhexa.com/f16201
[ "# #f16201 Color Information\n\nIn a RGB color space, hex #f16201 is composed of 94.5% red, 38.4% green and 0.4% blue. Whereas in a CMYK color space, it is composed of 0% cyan, 59.3% magenta, 99.6% yellow and 5.5% black. It has a hue angle of 24.3 degrees, a saturation of 99.2% and a lightness of 47.5%. #f16201 color hex could be obtained by blending #ffc402 with #e30000. Closest websafe color is: #ff6600.\n\n• R 95\n• G 38\n• B 0\nRGB color chart\n• C 0\n• M 59\n• Y 100\n• K 5\nCMYK color chart\n\n#f16201 color description : Vivid orange.\n\n# #f16201 Color Conversion\n\nThe hexadecimal color #f16201 has RGB values of R:241, G:98, B:1 and CMYK values of C:0, M:0.59, Y:1, K:0.05. Its decimal value is 15819265.\n\nHex triplet RGB Decimal f16201 `#f16201` 241, 98, 1 `rgb(241,98,1)` 94.5, 38.4, 0.4 `rgb(94.5%,38.4%,0.4%)` 0, 59, 100, 5 24.3°, 99.2, 47.5 `hsl(24.3,99.2%,47.5%)` 24.3°, 99.6, 94.5 ff6600 `#ff6600`\nCIE-LAB 59.382, 51.793, 68.344 40.651, 27.443, 3.185 0.57, 0.385, 27.443 59.382, 85.752, 52.844 59.382, 119.06, 51.289 52.386, 46.838, 33.065 11110001, 01100010, 00000001\n\n# Color Schemes with #f16201\n\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #0190f1\n``#0190f1` `rgb(1,144,241)``\nComplementary Color\n• #f10118\n``#f10118` `rgb(241,1,24)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #f1da01\n``#f1da01` `rgb(241,218,1)``\nAnalogous Color\n• #0118f1\n``#0118f1` `rgb(1,24,241)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #01f1da\n``#01f1da` `rgb(1,241,218)``\nSplit Complementary Color\n• #6201f1\n``#6201f1` `rgb(98,1,241)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #01f162\n``#01f162` `rgb(1,241,98)``\n• #f10190\n``#f10190` `rgb(241,1,144)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #01f162\n``#01f162` `rgb(1,241,98)``\n• #0190f1\n``#0190f1` `rgb(1,144,241)``\n• #a54301\n``#a54301` `rgb(165,67,1)``\n• #be4d01\n``#be4d01` `rgb(190,77,1)``\n• #d85801\n``#d85801` `rgb(216,88,1)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #fe6f0e\n``#fe6f0e` `rgb(254,111,14)``\n• #fe7e27\n``#fe7e27` `rgb(254,126,39)``\n• #fe8d40\n``#fe8d40` `rgb(254,141,64)``\nMonochromatic Color\n\n# Alternatives to #f16201\n\nBelow, you can see some colors close to #f16201. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #f12601\n``#f12601` `rgb(241,38,1)``\n• #f13a01\n``#f13a01` `rgb(241,58,1)``\n• #f14e01\n``#f14e01` `rgb(241,78,1)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #f17601\n``#f17601` `rgb(241,118,1)``\n• #f18a01\n``#f18a01` `rgb(241,138,1)``\n• #f19e01\n``#f19e01` `rgb(241,158,1)``\nSimilar Colors\n\n# #f16201 Preview\n\nThis text has a font color of #f16201.\n\n``<span style=\"color:#f16201;\">Text here</span>``\n#f16201 background color\n\nThis paragraph has a background color of #f16201.\n\n``<p style=\"background-color:#f16201;\">Content here</p>``\n#f16201 border color\n\nThis element has a border color of #f16201.\n\n``<div style=\"border:1px solid #f16201;\">Content here</div>``\nCSS codes\n``.text {color:#f16201;}``\n``.background {background-color:#f16201;}``\n``.border {border:1px solid #f16201;}``\n\n# Shades and Tints of #f16201\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #070300 is the darkest color, while #fff7f2 is the lightest one.\n\n• #070300\n``#070300` `rgb(7,3,0)``\n• #1a0b00\n``#1a0b00` `rgb(26,11,0)``\n• #2e1300\n``#2e1300` `rgb(46,19,0)``\n• #411b00\n``#411b00` `rgb(65,27,0)``\n• #552200\n``#552200` `rgb(85,34,0)``\n• #682a00\n``#682a00` `rgb(104,42,0)``\n• #7c3201\n``#7c3201` `rgb(124,50,1)``\n• #8f3a01\n``#8f3a01` `rgb(143,58,1)``\n• #a34201\n``#a34201` `rgb(163,66,1)``\n• #b64a01\n``#b64a01` `rgb(182,74,1)``\n• #ca5201\n``#ca5201` `rgb(202,82,1)``\n• #dd5a01\n``#dd5a01` `rgb(221,90,1)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\n• #fe6b08\n``#fe6b08` `rgb(254,107,8)``\n• #fe771b\n``#fe771b` `rgb(254,119,27)``\n• #fe832f\n``#fe832f` `rgb(254,131,47)``\n• #fe8e42\n``#fe8e42` `rgb(254,142,66)``\n• #fe9a56\n``#fe9a56` `rgb(254,154,86)``\n• #fea669\n``#fea669` `rgb(254,166,105)``\n• #feb17d\n``#feb17d` `rgb(254,177,125)``\n• #ffbd90\n``#ffbd90` `rgb(255,189,144)``\n• #ffc9a4\n``#ffc9a4` `rgb(255,201,164)``\n• #ffd4b7\n``#ffd4b7` `rgb(255,212,183)``\n• #ffe0cb\n``#ffe0cb` `rgb(255,224,203)``\n• #ffecdf\n``#ffecdf` `rgb(255,236,223)``\n• #fff7f2\n``#fff7f2` `rgb(255,247,242)``\nTint Color Variation\n\n# Tones of #f16201\n\nA tone is produced by adding gray to any pure hue. In this case, #817771 is the less saturated color, while #f16201 is the most saturated one.\n\n• #817771\n``#817771` `rgb(129,119,113)``\n• #8b7667\n``#8b7667` `rgb(139,118,103)``\n• #94745e\n``#94745e` `rgb(148,116,94)``\n• #9d7255\n``#9d7255` `rgb(157,114,85)``\n• #a7704b\n``#a7704b` `rgb(167,112,75)``\n• #b06e42\n``#b06e42` `rgb(176,110,66)``\n• #b96d39\n``#b96d39` `rgb(185,109,57)``\n• #c26b30\n``#c26b30` `rgb(194,107,48)``\n• #cc6926\n``#cc6926` `rgb(204,105,38)``\n• #d5671d\n``#d5671d` `rgb(213,103,29)``\n• #de6614\n``#de6614` `rgb(222,102,20)``\n• #e8640a\n``#e8640a` `rgb(232,100,10)``\n• #f16201\n``#f16201` `rgb(241,98,1)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #f16201 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.50198376,"math_prob":0.6264236,"size":3675,"snap":"2023-40-2023-50","text_gpt3_token_len":1650,"char_repetition_ratio":0.14246799,"word_repetition_ratio":0.0074074073,"special_character_ratio":0.56136054,"punctuation_ratio":0.23751387,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9831369,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-04T00:55:17Z\",\"WARC-Record-ID\":\"<urn:uuid:274aba17-eec7-46f4-a097-734ac0e22768>\",\"Content-Length\":\"36179\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0b0d811b-88bb-4a04-8579-fc9e88d8814c>\",\"WARC-Concurrent-To\":\"<urn:uuid:263efbf6-20d5-40c3-8e2c-1ec373b87f4f>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/f16201\",\"WARC-Payload-Digest\":\"sha1:UHJOROQ5UBUBZZKD4R6BORWAR5J7Z7R3\",\"WARC-Block-Digest\":\"sha1:UZUTE5R4F4GF2NJOSYAKFCI2ZODND2QH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511284.37_warc_CC-MAIN-20231003224357-20231004014357-00466.warc.gz\"}"}
https://best-excel-tutorial.com/54-basics/112-hlookup?tmpl=component&print=1&page=
[ "# HLOOKUP\n\nIn this lesson you will learn HLOOKUP function.\n\nHLOOKUP works similarly to the VLOOKUP function. HLOOKUP is a lookup and reference function. This function retrieves data from the table horizontally. Most of the tables in Excel, create a vertical, so this feature is rarely used. Despite it, I think it's worth it to know HLOOKUP. HLOOKUP function has the following form:\n\n=HLOOKUP(reference,array,row_number,row)\n\nIn simple terms it can be assumed that the individual components of this function:\n\n=VLOOKUP(what,where,in which row,true/false)\n\nThe last part of the formula is very important:\n\n• True is an approximate match;\n• False is the exact value.\n\nI prepared a table of sales.", null, "You'll learn from the above table, as HLOOKUP works.\n\nWith the name of the employee when you appear all the data on it that contains the table. At the beginning of the selection of employees could use the drop-down list.", null, "In the sales, type the formula. It is:\n\n=HLOOKUP(C7,C3:H5,2,FALSE)", null, "Drag the formula in the City field. In this way, HLOOKUP searches for data from the table and selecting the employee name appears in the sale and the city. This of course is just a simple example. HLOOKUP is applicable especially in large tables, where the search data is no longer so simple. Examples of such data table to report sales or payroll." ]
[ null, "https://best-excel-tutorial.com/images/HLOOKUP example.jpg", null, "https://best-excel-tutorial.com/images/HLOOKUP drop-down list.jpg", null, "https://best-excel-tutorial.com/images/HLOOKUP formula.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8798323,"math_prob":0.8941342,"size":1311,"snap":"2020-24-2020-29","text_gpt3_token_len":302,"char_repetition_ratio":0.15149197,"word_repetition_ratio":0.0,"special_character_ratio":0.21052632,"punctuation_ratio":0.14444445,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98841524,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,8,null,8,null,8,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-27T02:58:36Z\",\"WARC-Record-ID\":\"<urn:uuid:e32ad223-0a19-4d97-a7b6-838898cf25f8>\",\"Content-Length\":\"11131\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d131bc86-1047-473a-936d-b895321716db>\",\"WARC-Concurrent-To\":\"<urn:uuid:90769027-c595-429c-9e9f-eca635acd454>\",\"WARC-IP-Address\":\"213.186.33.169\",\"WARC-Target-URI\":\"https://best-excel-tutorial.com/54-basics/112-hlookup?tmpl=component&print=1&page=\",\"WARC-Payload-Digest\":\"sha1:UHJOR3YZALP5JPVZHKJRFW7W6YQO6V67\",\"WARC-Block-Digest\":\"sha1:YJBOZQZKGXQHAZZPXKNSR5SRU2SCAMF3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347392057.6_warc_CC-MAIN-20200527013445-20200527043445-00355.warc.gz\"}"}
https://es.mathworks.com/help/fixedpoint/ref/embedded.fi.dec2base.html
[ "# dec2base\n\nConvert decimal integer to its base-n representation for `fi` objects\n\n## Syntax\n\n``baseStr = dec2base(D,n)``\n``baseStr = dec2base(D,n,minDigits)``\n\n## Description\n\nexample\n\n````baseStr = dec2base(D,n)` returns a base-n representation of the decimal integer `D`. The output argument `baseStr` is a character array that represents digits using numeric characters, and, when `n` is greater than 10, letters. For example, if `n` is 12, the `dec2base` represents the numbers 9, 10, and 11 using the characters `9`, `A`, and `B`, and represents the number 12 as the character sequence `10`.```\n\nexample\n\n````baseStr = dec2base(D,n,minDigits)` returns a base-n representation of `D` with no fewer than `minDigits` digits. Tip`dec2base` returns the base-n representation of the real-world value of the values contained in `fi` object `D`. ```\n\n## Examples\n\ncollapse all\n\nConvert a decimal number to a character vector that represents its value in base 3.\n\n```D = fi(23); baseStr = dec2base(D,3)```\n```baseStr = '212'```\n\nConvert a decimal number to a character vector that represents its value in base 12. In this base system, the characters `'A'` and `'B'` represent the numbers denoted as `10` and `11` in base 10.\n\n```D = fi(23); baseStr = dec2base(D,12)```\n```baseStr = '1B'```\n\nSpecify the number of base-3 digits that `dec2base` returns. If you specify more digits than are required, then `dec2base` pads the output with leading zeros.\n\n```D = fi(23); baseStr = dec2base(D,3,5)```\n```baseStr = '00212' ```\n\nConvert the upper bound of a signed `fi` object with 100-bit word length to base 36 representation.\n\n`baseStr = dec2base(upperbound(fi([],1,100,0)),36)`\n```baseStr = '1PG7OTO50BLAOIQ8FPQ7'```\n\n## Input Arguments\n\ncollapse all\n\nInput array, specified as a `fi` array of nonnegative numbers.\n\n`D` must contain finite integers. If any element of `D` has a fractional part, then `dec2base` produces an error. For example, `dec2base(fi(10),8)` converts `fi(10)` to `'12'`, but `dec2base(fi(10.5),8)` produces an error.\n\nData Types: `fi`\n\nBase of output representation, specified as an integer between 2 and 36. For example, if `n` is `8`, then the output represents base-8 numbers.\n\nMinimum number of digits in the output, specified as a positive integer.\n\n• If `D` can be represented with fewer than `minDigits` digits, then `dec2base` pads the output with leading zeros.\n\n• If `D` is so large that it must be represented with more than `minDigits` digits, then `dec2base` returns the output with as many digits as required.\n\n## Version History\n\nIntroduced in R2021b" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7027341,"math_prob":0.98722774,"size":2425,"snap":"2022-05-2022-21","text_gpt3_token_len":650,"char_repetition_ratio":0.1598513,"word_repetition_ratio":0.07611549,"special_character_ratio":0.25072166,"punctuation_ratio":0.12581345,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99111414,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-16T12:14:30Z\",\"WARC-Record-ID\":\"<urn:uuid:a5a0a71d-2d00-4eef-8f9c-83a2018d6dca>\",\"Content-Length\":\"89149\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6f9102b5-bc43-4374-9491-772e47b258fa>\",\"WARC-Concurrent-To\":\"<urn:uuid:efd0d403-dde6-4d4f-9ae1-2e9ff4524bdc>\",\"WARC-IP-Address\":\"104.68.243.15\",\"WARC-Target-URI\":\"https://es.mathworks.com/help/fixedpoint/ref/embedded.fi.dec2base.html\",\"WARC-Payload-Digest\":\"sha1:LIUTSUWCKWMTOVOAA5EATZF37V4TY6FF\",\"WARC-Block-Digest\":\"sha1:3ARTK7DUDVHOMKUGH3FJTZJGTEHBYO4Z\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662510117.12_warc_CC-MAIN-20220516104933-20220516134933-00062.warc.gz\"}"}
https://datalya.com/blog/business-statistics/things-you-need-to-know-about-index-number
[ "## Things You Need to Know about Index Number Construction\n\nA statistical measure of average change in a variable or a group of variables with respect to time or space is known as index number. The variable may be the enrolment of staff in an organization, the cost of salaries for staff, prices of a particular commodity or a group of commodities, wages of workers, volume of trade, sales, exports and imports, production, etc.\n\nIndex numbers are obtained by expressing the data for various periods or places as percentage of some specific period or place selected for the purposes of comparison and technically called the base. Index numbers may be computed on weekly or monthly basis but generally they are computed on annual basis.\n\n### Simple and Composite Indices\n\nIndex numbers are generally classified into Simple Indices and Composite Indices. An index number is called a simple index when it is computed for a single variable. Index numbers of enrolment in colleges, index numbers of gold prices, etc. are examples of simple indices. A simple index can be very easily computed. The value of the variable for each period is divided by the value in the base period and the result is multiplied by 100.\n\nAn index that is computed from two or more variables is referred to as a composite index. Examples of composite indices are the wholesale price index numbers, consumer price index numbers etc. Composite indices are more important as many of the index numbers in common use are composite in nature. Composite indices may further be classified into Unweighted and Weighted index numbers.\n\n### 3 Important Things about Index Numbers\n\nFollowing are three important things we must consider while in compilation of index numbers:\n\n1. Understand the purpose which an index is to serve. The purpose of the index may be to compare the score of two players, or to measures the changes in the general price level or to measures the changes in the production of scooters or to compare the changes in wages of factory workers over different places, etc.\n\n2. Decide what data should be included. The data to be included should relate to purpose for which the index is to be used. This step also involves the collection of data on scores, production, process, wages or whatever is being compared.\n\n3. Decide what period should be chosen as the base period, i.e. the period with which the other periods are to be compared. In case of composite index numbers, another problem is to decide what method of averaging should be used to arrive at a single index for each period. The method of averaging usually includes the system of weighting but sometimes one faces the problems of assigning some explicit weights to the various items of the data so that their relative importance is taken into account." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93627036,"math_prob":0.96796703,"size":2713,"snap":"2019-43-2019-47","text_gpt3_token_len":516,"char_repetition_ratio":0.14654854,"word_repetition_ratio":0.013100437,"special_character_ratio":0.18835238,"punctuation_ratio":0.08531746,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95263684,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-20T01:12:51Z\",\"WARC-Record-ID\":\"<urn:uuid:3c70887d-0209-4965-9a8e-277204a95db0>\",\"Content-Length\":\"28214\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5d01b6e2-d2b1-409f-a416-2d2351d29015>\",\"WARC-Concurrent-To\":\"<urn:uuid:e28b040f-f349-4075-903e-b818f86eb1f7>\",\"WARC-IP-Address\":\"52.42.38.100\",\"WARC-Target-URI\":\"https://datalya.com/blog/business-statistics/things-you-need-to-know-about-index-number\",\"WARC-Payload-Digest\":\"sha1:LJDRD65ML5MHZUUY74N3OJG4ZRM4QXAZ\",\"WARC-Block-Digest\":\"sha1:YZWMHACHFWLFDHVFOQHQ4ZGP4R7HYI3R\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670389.25_warc_CC-MAIN-20191120010059-20191120034059-00383.warc.gz\"}"}
https://linuxhint.com/bash-loops-in-depth/
[ "BASH Programming\n\n# Bash Loops In-Depth\n\nA loop consists of one or more commands that execute repeatedly until a condition is met. In order for this to happen, the commands have to be in a construct. The construct and its commands form a compound command. A Bash command exits with zero if there was no problem. On the other hand, it exits with a number greater than zero if there was an issue or a problem. The exit status of a compound command is that of its last command.\n\nIn order to understand this article, the reader should already know simple Bash commands. Any non-simple Bash command used in this article is explained. Do not forget that Bash commands can be written into a text file, and the text file can run by typing the name of the file (preceded by path) at the terminal, then pressing Enter. Do not also forget to permit yourself to run the file with something like:\n\nsudo chmod +x program_name\n\n## Bash Loop Basics\n\nBash until/done Loop\nConsider the following code:\n\nlet n=0\n\nuntil [ \"\\$n\" -eq 5 ]; do\necho \\$n\n((++n))\ndone\n\nThe output is:\n\n0\n1\n2\n3\n4\n\nWhen the program begins, the variable n is declared and zero is assigned to it. The two commands before “done” are executed 5 times. ((++n)) increments n by 1 for each iteration. Note the positions of the reserved words, “until”, “do”, and “done”. The two commands are repeated until the condition, [ “\\$n” -eq 5 ] is met. In the condition, “-eq” means “equal to”. The condition is that the value of n is equal to 5. Note that the values echoed begins from 0 to 4. This is because, for each iteration, the condition of the construct is checked, before the body (two commands) of the construct is executed. If the condition is false, the body would not be executed. The reserved word, “done”, should always be typed in a new line.\n\nThe syntax for the until/done loop is:\n\nuntil test-commands; do consequent-commands; done\n\nThe second semicolon is not necessary if the reserved word, “done” is typed in a new line.\n\nIf the condition exits with zero, meaning true, the body of the loop is executed. If the condition exits with a number greater than zero, meaning false, the body of the loop is not executed.\n\nBash while/done Loop\nThis loop is similar to the until/done loop, except that the condition has to be rephrased. Both constructs use the “do” reserved word. The following code produces the same output as before:\n\nlet n=0\n\nwhile [ \"\\$n\" -lt 5 ]; do\necho \\$n\n((++n));\ndone\n\nIn the condition in the code, “-lt” means “less than”. The syntax for the while/done loop is:\n\nwhile test-commands; do consequent-commands; done\n\nBash for/done Loop\nThere are two syntax for the “for” loop, which are:\n\nfor (( expr1 ; expr2 ; expr3 )) ; do commands ; done\n\nand\n\nfor name [ [in [words …] ] ; ] do commands; done\n\nThe following code uses the first syntax to produce the same result, as above:\n\nfor ((n=0; n < 5; ++n)); do\necho \\$n\ndone\n\nIn the ((compound command, the first expression initializes the variable n to zero. The next expression is the while condition. The last expression in the double parentheses compound command is the increment expression. Then there is the body, which may consist of more than one command, and then “done”.\n\nThe second syntax is best used with an array – see below.\n\n## Bash break and continue Commands\n\nbreak\nAll the iterations (repeated execution of the body) intended for a loop must not necessarily be executed. The break command can be used to stop the remaining iterations. In the following code, the iterations stop just after n equals 2.\n\nfor ((n=0; n < 5; ++n)); do\necho \\$n\nif ((n == 2)); then\nbreak\nfi\ndone\n\nThe output is:\n\n0\n1\n2\n\nIn this loop, three iterations have taken place.\n\ncontinue\nAn iteration can be skipped using the continue command. The following code illustrates this:\n\nfor ((n=0; n < 5; ++n)); do\nif ((n == 2)); then\ncontinue\nfi\necho \\$n\ndone\n\nThe output is:\n\n0\n1\n3\n4\n\nThe iteration to display 2 has been skipped.\n\nThe break and continue commands can also be used in the until/done and while/done loops.\n\n## Useful Loop Examples\n\nuntil/done Loop Example\nThe command to create an empty text file is touched. The following script will create empty text files in the current working directory, until the number of files created, is 4:\n\nlet i=1\nfile=\"myFile\"\n\nuntil [ \\$i -eq 5 ]; do\nfilename=\"\\$file\\$i.txt\"\ntouch \\$filename\n((++i))\ndone\n\nThe names of the files created should be myFile1.txt, myFile2.txt, myFile3.txt, and myFile4.txt.\n\nThe only semicolon in the code can be omitted if “do” is typed in the next line.\n\nwhile/done Loop Example\nThe command to create an empty directory is mkdir. The following script will create empty directories in the current working directory until the number of directories created is 4:\n\ni=1\ndir=\"myDir\"\n\nwhile [ \\$i -lt 5 ]; do\ndirname=\"\\$dir\\$i\"\nmkdir \\$dirname\n((++i))\ndone\n\nThe name of the directories created should be myDir1, myDir2, myDir3, and myDir4.\n\nThe only semicolon in the code can be omitted if “do” is typed in the next line.\n\nfor Loop Example\nThe second syntax for the for-loop mentioned above is:\n\nfor name [ [in [words …] ] ; ] do commands; done\n\nThis syntax is better used with a list. In simple terms, the syntax is:\n\nfor Variable in List; do commands; done\n\nThe list can be an array. The following command reads an input line of text from the terminal into the array arr:\n\nAs the script is running, when it reaches this command, it will pause (with a flashing cursor) for the user to enter input. If the user types:\n\none two three\n\nin one line and presses Enter, then the first element of the array would have the word “one”, the second would have the word “two”, and the third would have “three”. Note that the input values were separated by spaces.\n\nThe following code uses the second for-loop syntax to read and display an input to the script:\n\necho \"Type in values and press Enter:\"\n\nfor var in \\$arr; do\necho \\$var\ndone\n\nIf the input was:\n\none two three\n\nThen the output would be:\n\none\ntwo\nthree\n\nThe only semicolon in the code can be omitted if “do” is typed in the next line.\n\n## Bash select Command\n\nThe select command is not really a loop. However, it involves iteration, which is not coded by the programmer. In simple terms, the select command syntax is:\n\nselect item in [list]\ndo\n[commands]\ndone\n\nHere, “select”, “in”, “do”, and “done” are reserved words. One use of the select command is to display the items from the list to the terminal. The following script illustrates this:\n\nselect item in banana, lemon, orange, pear, pineapple\ndo\nbreak\ndone\n\nNote the use of the break command. The output is:\n\n1) banana,\n2) lemon,\n3) orange,\n4) pear,\n5) pineapple\n#?\n\nThe list consists of the values banana, lemon, orange, pear, and pineapple. These values have been displayed and numbered. The symbol “#?” (and the flashing cursor next to it) is expecting the user to type in something and press the Enter key. Type anything, then press the Enter key and finally ends the execution of the script.\n\nNotice that the list has been displayed as a menu, numbered, for the output. With this, the user can select an item in the menu by typing the corresponding number, next to “#?”, then press the Enter key. The following script illustrates how orange is selected by typing the number 3:\n\nselect item in banana, lemon, orange, pear, pineapple\ndo\nbreak\ndone\n\nThe output display is:\n\n#? 3\nthen\n3\n\n## Conclusion\n\nA loop in Bash is a construct; a construct is a compound command. The body of the construct has at least one command. As of now, Bash has just three loops, which are until/done, while/done, and for/done. Each loop uses the reserved word “do”. After the condition has been typed, “do” should be preceded by ‘;’, or be typed in the next line of the code. Each loop takes a condition. The until/done and while/done loops are similar. The main difference occurs when coding the condition.\n\nThe select command is a compound command, but it is not really a loop. It allows the user to select an item from a menu list when the script is running interactively.\n\nThe break and continue commands can be used in a loop. The break command can be used to stop the iterations. On the other hand, the continue command can be used to skip an iteration.\n\nThat is all there is to Bash loops. The feature remaining to be studied is “How to Code the Conditions?”. This deserves a whole different article and cannot be included in this one. See the article on this website, titled “Bash Conditionals In-Depth”, on how to code conditions.\n\nChrys", null, "" ]
[ null, "data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20112%20112'%3E%3C/svg%3E", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88275427,"math_prob":0.6127191,"size":7302,"snap":"2022-05-2022-21","text_gpt3_token_len":1762,"char_repetition_ratio":0.13688682,"word_repetition_ratio":0.06835637,"special_character_ratio":0.23692138,"punctuation_ratio":0.12533157,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9638663,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-19T07:59:25Z\",\"WARC-Record-ID\":\"<urn:uuid:c5e35c6b-07a3-4bd3-a9b8-2e7ea8780b6e>\",\"Content-Length\":\"198524\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0ae91fc9-382a-4572-9758-a16c3ed688e3>\",\"WARC-Concurrent-To\":\"<urn:uuid:34c4dbf7-53a6-44a9-9309-e1040b4a3ddf>\",\"WARC-IP-Address\":\"104.21.58.234\",\"WARC-Target-URI\":\"https://linuxhint.com/bash-loops-in-depth/\",\"WARC-Payload-Digest\":\"sha1:ESBZXBLXBKDJ23SVWJCVHP2ZF6ZY7V3P\",\"WARC-Block-Digest\":\"sha1:6SFSMM4SSLM6WLX2723R266KDHDFKZUR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662526009.35_warc_CC-MAIN-20220519074217-20220519104217-00750.warc.gz\"}"}
https://gamedev.stackexchange.com/questions/88476/transformations-and-basis-vectors?noredirect=1
[ "# Transformations and basis vectors\n\nI've been reading this very nice tutorial on OpenGL, and I encountered a statement which I can't wrap my head around. In Chapter 6, it states:\n\nTransformation from one space to another ultimately means this: taking the basis vectors and origin point from the original coordinate system and re-expressing them relative to the destination coordinate system. The transformation matrix from one space to another contains the basis vectors and origin of the original coordinate system, but the values of those basis vectors and origin are relative to the destination coordinate system.\n\nThis is reaffirmed in Chapter 7:\n\n... And this makes sense; a transformation matrix contains the basis vector and origin of the source space, as expressed in the destination coordinate system.\n\n... But isn't it the other way around?\n\nTake a look at this example from the tutorial:", null, "The transformation Matrix to transform from the space on the left to the space on the right is\n\n[1 0 0 1 ]\n[0 1 0 -1.5]\n[0 0 1 0 ]\n[0 0 0 1 ]\n\n\nThe last column of the transformation matrix is the origin of the destination space, expressed relative to the source space.\n\nWhat am I missing?\n\nNote The above transformation matrix is not from the notes, so feel free to correct it.\n\nThe transformation Matrix to transform from the space on the left to the space on the right is\n\n[1 0 0 1 ]\n[0 1 0 -1.5]\n[0 0 1 0 ]\n[0 0 0 1 ]\n\n\nWell this is not correct, the matrix you have shown is actually to transform any point from the space on the right to the space on the left. The correct matrix to transform from the space on the left to the right is actually\n\n[1 0 0 -1 ]\n[0 1 0 1.5 ]\n[0 0 1 0 ]\n[0 0 0 1 ]\n\n\nThink about it like this. The [0,0] point on the left figure is actually [-1,1.5] relative to the new space (right figure), remember when you change a basis it's easier to think about it as actually transforming basis not the points, meaning you're actually representing the same points relative to a different basis.\n\nEven though you can think of it the other way around, as of actually taking the inverse transform of the points, it's actually easier to think about it as transforming the basis, either way pick a convention and stick with it. You can also check my other answer, for better explanation of spaces.\n\n• thanks for the answer. When you think about it as transforming the basis, it's very clear. But when you say that the matrix in the question represents the \"inverse transform of the points\", that's what I don't see. For example, the point (0.5, 2.5) on the top of the left triangle becomes (1.5, 1.0) on the right (in the \"global\" space), which means that it was translated by [1, -1.5], not the inverse of that. Could you elaborate on that point? Dec 10 '14 at 16:31\n• First lets be clear that the basis on the right figure are the red blue lines. Your confusion comes from the fact that you moved the triangle along with basis. A change of basis doesn't move the triangle its exactly like looking at the triangle from different perspective the triangle stays at the same position but with different interpretation of its coordinates Dec 10 '14 at 17:15\n• Took me a while, but I just got it (after some reading), and your answer was very helpful! If I'm not mistaken, what the author is trying to explain is not moving the triangle from the image on the left to the right, but rather, transforming the coordinate system of the triangle on the right from its object space to the destination space Dec 11 '14 at 13:56\n• @Nasser Glad to help. Dec 11 '14 at 13:59" ]
[ null, "https://i.stack.imgur.com/78DNx.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88840044,"math_prob":0.9709699,"size":1230,"snap":"2021-31-2021-39","text_gpt3_token_len":264,"char_repetition_ratio":0.15089722,"word_repetition_ratio":0.03773585,"special_character_ratio":0.22195122,"punctuation_ratio":0.10878661,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9537109,"pos_list":[0,1,2],"im_url_duplicate_count":[null,8,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-22T06:55:40Z\",\"WARC-Record-ID\":\"<urn:uuid:33ee706d-a664-4f61-9da0-a209faff1891>\",\"Content-Length\":\"177854\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:50ad3ab0-583b-4d45-8207-ffdf391583c1>\",\"WARC-Concurrent-To\":\"<urn:uuid:0b282e64-f62a-4cee-9f2f-996d4407e02c>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://gamedev.stackexchange.com/questions/88476/transformations-and-basis-vectors?noredirect=1\",\"WARC-Payload-Digest\":\"sha1:PUG3EC3BWU7NJME5RLK7YU5KFMQTIVDS\",\"WARC-Block-Digest\":\"sha1:QUQ6QT34LMG4TDAUH7DWBV7OIBEVAJX3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057329.74_warc_CC-MAIN-20210922041825-20210922071825-00658.warc.gz\"}"}
http://mathv.chapman.edu/~jipsen/structures/doku.php/epimorphisms_are_surjective
[ "## Epimorphisms are surjective\n\nA morphism $h$ in a category is an epimorphism if it is right-cancellative, i.e. for all morphisms $f$, $g$ in the category $f\\circ h=g\\circ h$ implies $f=g$.\n\nA function $h:A\\to B$ is surjective (or onto) if $B=f[A]=\\{f(a): a\\in A\\}$, i.e., for all $b\\in B$ there exists $a\\in A$ such that $f(a)=b$.\n\nEpimorphisms are surjective in a (concrete) category of structures if the underlying function of every epimorphism is surjective.\n\nIf a concrete category has the amalgamation property and all epimorphisms are surjective, then it has the strong amalgamation property1)\n\n1) E. W. Kiss, L. Márki, P. Pröhle, W. Tholen, Categorical algebraic properties. A compendium on amalgamation, congruence extension, epimorphisms, residual smallness, and injectivity, Studia Sci. Math. Hungar., 18, 1982, 79-140 MRreview\n\n##### Toolbox", null, "" ]
[ null, "http://mathv.chapman.edu/~jipsen/structures/lib/exe/indexer.php", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.79287857,"math_prob":0.9959769,"size":631,"snap":"2019-35-2019-39","text_gpt3_token_len":192,"char_repetition_ratio":0.18819776,"word_repetition_ratio":0.0,"special_character_ratio":0.25356576,"punctuation_ratio":0.11811024,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970647,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-21T08:04:08Z\",\"WARC-Record-ID\":\"<urn:uuid:6795f712-a425-4c5a-b054-df714da9e68f>\",\"Content-Length\":\"12438\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a06b411b-fb73-4a62-b845-443f33b4acec>\",\"WARC-Concurrent-To\":\"<urn:uuid:4b31be13-d546-4ec6-8573-12df5fb641cf>\",\"WARC-IP-Address\":\"192.77.116.236\",\"WARC-Target-URI\":\"http://mathv.chapman.edu/~jipsen/structures/doku.php/epimorphisms_are_surjective\",\"WARC-Payload-Digest\":\"sha1:C35N2SJ7QX5MJHCTENC65BFDVBQUH3NQ\",\"WARC-Block-Digest\":\"sha1:VN6P7KIY54ELJ6I7U4C6PAJYJ7TVX6PE\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514574286.12_warc_CC-MAIN-20190921063658-20190921085658-00083.warc.gz\"}"}
https://eudml.org/search/page?q=sc.general*op.AND*l_0*c_0author_0eq%253A1.Singh%252C+Surjeet&qt=SEARCH
[ "## Currently displaying 1 – 9 of 9\n\nShowing per page\n\nOrder by Relevance | Title | Year of publication\n\n### TAG-modules with complement submodules $h$-pure.\n\nInternational Journal of Mathematics and Mathematical Sciences\n\n### Invariance of recurrence sequences under a Galois group.\n\nInternational Journal of Mathematics and Mathematical Sciences\n\n### Some chain conditions on weak incidence algebras.\n\nInternational Journal of Mathematics and Mathematical Sciences\n\n### Weak incidence algebra and maximal ring of quotients.\n\nInternational Journal of Mathematics and Mathematical Sciences\n\n### Over-rings of an (HNP)-ring\n\nColloquium Mathematicae\n\n### Inertial subrings of a locally finite algebra\n\nColloquium Mathematicae\n\nI. S. Cohen proved that any commutative local noetherian ring R that is J(R)-adic complete admits a coefficient subring. Analogous to the concept of a coefficient subring is the concept of an inertial subring of an algebra A over a commutative ring K. In case K is a Hensel ring and the module ${A}_{K}$ is finitely generated, under some additional conditions, as proved by Azumaya, A admits an inertial subring. In this paper the question of existence of an inertial subring in a locally finite algebra is discussed....\n\n### A representation theorem for Chain rings\n\nColloquium Mathematicae\n\nA ring A is called a chain ring if it is a local, both sided artinian, principal ideal ring. Let R be a commutative chain ring. Let A be a faithful R-algebra which is a chain ring such that Ā = A/J(A) is a separable field extension of R̅ = R/J(R). It follows from a recent result by Alkhamees and Singh that A has a commutative R-subalgebra R₀ which is a chain ring such that A = R₀ + J(A) and R₀ ∩ J(A) = J(R₀) = J(R)R₀. The structure of A in terms of a skew polynomial ring over R₀ is determined.\n\nPage 1" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93180776,"math_prob":0.8444007,"size":1062,"snap":"2022-40-2023-06","text_gpt3_token_len":281,"char_repetition_ratio":0.12854442,"word_repetition_ratio":0.031088082,"special_character_ratio":0.22975518,"punctuation_ratio":0.08928572,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.994663,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-01T14:33:29Z\",\"WARC-Record-ID\":\"<urn:uuid:d63631bd-5d29-4c8c-ac67-06b23056fcdf>\",\"Content-Length\":\"73193\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5666cb45-c5e5-408b-bfb0-a13dce2214d9>\",\"WARC-Concurrent-To\":\"<urn:uuid:91902453-a709-4690-b000-8089045776ca>\",\"WARC-IP-Address\":\"213.135.60.110\",\"WARC-Target-URI\":\"https://eudml.org/search/page?q=sc.general*op.AND*l_0*c_0author_0eq%253A1.Singh%252C+Surjeet&qt=SEARCH\",\"WARC-Payload-Digest\":\"sha1:SVFUKOGAFXFMWZKR6TDDUJYVO67JVKLL\",\"WARC-Block-Digest\":\"sha1:2EVZSOOLWI5P5I2NRXOZYHUPU3I2B7DD\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030336674.94_warc_CC-MAIN-20221001132802-20221001162802-00250.warc.gz\"}"}
https://mllg.github.io/checkmate/reference/checkNumber.html
[ "Check if an argument is a single numeric value\n\ncheckNumber(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE\n)\n\ncheck_number(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE\n)\n\nassertNumber(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE,\n.var.name = vname(x),\n)\n\nassert_number(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE,\n.var.name = vname(x),\n)\n\ntestNumber(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE\n)\n\ntest_number(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE\n)\n\nexpect_number(\nx,\nna.ok = FALSE,\nlower = -Inf,\nupper = Inf,\nfinite = FALSE,\nnull.ok = FALSE,\ninfo = NULL,\nlabel = vname(x)\n)\n\n## Arguments\n\nx\n\n[any]\nObject to check.\n\nna.ok\n\n[logical(1)]\nAre missing values allowed? Default is FALSE.\n\nlower\n\n[numeric(1)]\nLower value all elements of x must be greater than or equal to.\n\nupper\n\n[numeric(1)]\nUpper value all elements of x must be lower than or equal to.\n\nfinite\n\n[logical(1)]\nCheck for only finite values? Default is FALSE.\n\nnull.ok\n\n[logical(1)]\nIf set to TRUE, x may also be NULL. In this case only a type check of x is performed, all additional checks are disabled.\n\n.var.name\n\n[character(1)]\nName of the checked object to print in assertions. Defaults to the heuristic implemented in vname.\n\n[AssertCollection]\nCollection to store assertion messages. See AssertCollection.\n\ninfo\n\n[character(1)]\nExtra information to be included in the message for the testthat reporter. See expect_that.\n\nlabel\n\n[character(1)]\nName of the checked object to print in messages. Defaults to the heuristic implemented in vname.\n\n## Value\n\nDepending on the function prefix: If the check is successful, the functions\n\nassertNumber/assert_number return\n\nx invisibly, whereas\n\ncheckNumber/check_number and\n\ntestNumber/test_number return\n\nTRUE. If the check is not successful,\n\nassertNumber/assert_number\n\nthrows an error message,\n\ntestNumber/test_number\n\nreturns FALSE, and checkNumber/check_number\n\nreturn a string with the error message. The function expect_number always returns an\n\nexpectation.\n\n## Details\n\nThis function does not distinguish between NA, NA_integer_, NA_real_, NA_complex_ NA_character_ and NaN.\n\nOther scalars: checkCount(), checkFlag(), checkInt(), checkScalarNA(), checkScalar(), checkString()\ntestNumber(1)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.53084075,"math_prob":0.9947172,"size":2376,"snap":"2022-40-2023-06","text_gpt3_token_len":629,"char_repetition_ratio":0.18043844,"word_repetition_ratio":0.33862433,"special_character_ratio":0.27272728,"punctuation_ratio":0.21758242,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.984363,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-06T06:58:20Z\",\"WARC-Record-ID\":\"<urn:uuid:46b485aa-1b3e-4807-b7f0-88899d359c6b>\",\"Content-Length\":\"15431\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1e92e92a-e5c0-4146-9e42-553f0fb76a63>\",\"WARC-Concurrent-To\":\"<urn:uuid:163f6bd2-a036-48a1-85ce-681e6e96e0b5>\",\"WARC-IP-Address\":\"185.199.110.153\",\"WARC-Target-URI\":\"https://mllg.github.io/checkmate/reference/checkNumber.html\",\"WARC-Payload-Digest\":\"sha1:ADUTTJ7YA22I5ET6DCIRGBTGSJITPCUJ\",\"WARC-Block-Digest\":\"sha1:Z2DEKI6YMN6GRR6GDRGTJNRMFYH4FFJK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500304.90_warc_CC-MAIN-20230206051215-20230206081215-00848.warc.gz\"}"}
https://platformkvuz.web.app/kory51341vy/determine-the-future-value-of-education-pe.html
[ "## Determine the future value of education\n\nWe want to find the future value of her money (FV). 1 00 Journal of Financial Education. Page 6. At this point students can solve the\n\nAccess the answers to hundreds of Future value questions that are explained in a way that's easy for you to understand. Can't find the question you're looking for? Future Value Of Cost Of Education ₹ 2,13,293 your age, and annual income can help you determine how much you can save up if you start investing today. 23 Feb 2018 To begin with, find out how much the goal costs today. For example, take your child's higher education. Let us assume that it costs Rs 5 lakh today  In a finite math course, you will encounter a range of financial problems, such as how to calculate an annuity. An annuity consists of regular payments into an  Module 5 - Future Values. Calculate the Future Value of an Annuity. Combining TVM Tools. Module 6 - Final Assignments. Mastering the Time Value of Money  Students learn about opportunity cost, interest and inflation to determine the future value of investments, and the present value of a future sum of money in this   How does an increase in the interest rate affect the discounted present value of For example, if you have trained as an engineer and then decide you want to be First, the gains from education appear as an increase in earnings each year.\n\n## Plan for your child's bright future with the child education calculator. Calculate the total education expenses against inflation rate and give your child the best education. Human Life Value Calculator. Know how much life insurance you\n\n### We want to find the future value of her money (FV). 1 00 Journal of Financial Education. Page 6. At this point students can solve the\n\n7 Jun 2019 Present value is one of the most important concepts in finance. Luckily, once you learn a few tricks, you can calculate it easily. All you need to\n\n## 26 Feb 2010 When we calculate the value of future payments today, we are doing a present value calculation. When we try to value what a stream of future\n\nCalculate how much interest she earned over the $$\\text{29}$$ year period. Write down the given information and the future value formula. \\[F = \\frac{x\\left[(1 + i)^  How to Determine Future Value of Cash Flows. Cash flows are one-time or periodic inflows of money, such as dividends, or outflows, such as tuition expenses. 7 Jun 2019 Present value is one of the most important concepts in finance. Luckily, once you learn a few tricks, you can calculate it easily. All you need to  We use the future value formula for simple interest to determine the simple interest rate that 6) Parents wish to have \\$120,000 available for a child's education." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9152684,"math_prob":0.9550189,"size":5522,"snap":"2021-31-2021-39","text_gpt3_token_len":1179,"char_repetition_ratio":0.18629938,"word_repetition_ratio":0.07635207,"special_character_ratio":0.21387179,"punctuation_ratio":0.09848485,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98437536,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-23T12:04:45Z\",\"WARC-Record-ID\":\"<urn:uuid:a13dc76e-3c7f-4d70-a041-c399f144b682>\",\"Content-Length\":\"18400\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:80d994ff-f964-4995-9247-eff8aef40968>\",\"WARC-Concurrent-To\":\"<urn:uuid:7c58b213-6814-4d19-8d33-31b84131dd99>\",\"WARC-IP-Address\":\"199.36.158.100\",\"WARC-Target-URI\":\"https://platformkvuz.web.app/kory51341vy/determine-the-future-value-of-education-pe.html\",\"WARC-Payload-Digest\":\"sha1:Q2ORJWBMYXRZ6OLP5WSTLADCVU3D4VOF\",\"WARC-Block-Digest\":\"sha1:36KE65HNZ6AN7QYQISCAPX4PW6C6IJUG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057421.82_warc_CC-MAIN-20210923104706-20210923134706-00051.warc.gz\"}"}
https://www.gradesaver.com/textbooks/math/calculus/calculus-with-applications-10th-edition/chapter-r-algebra-reference-r-4-equations-r-4-exercises-page-r-16/15
[ "## Calculus with Applications (10th Edition)\n\n$-3$ and $3$\nDivide both sides of the equation by 4: $4x^{2}-36=0\\qquad.../\\div 4$ $x^{2}-9=0$ ... recognize a difference of squares (of x and 3) $A^{2}-B^{2}=(A+B)(A-B)$ $(x+3)(x-3)=0$ By the zero product principle, $x+3=0$ or $x-3=0$ $x=-3$ or $x=3$ The solutions are $-3$ and $3$." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7415106,"math_prob":1.0000099,"size":308,"snap":"2020-24-2020-29","text_gpt3_token_len":134,"char_repetition_ratio":0.10526316,"word_repetition_ratio":0.0,"special_character_ratio":0.49025974,"punctuation_ratio":0.11111111,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000057,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-04T19:26:39Z\",\"WARC-Record-ID\":\"<urn:uuid:29d97edf-0b22-4824-adfc-687661313268>\",\"Content-Length\":\"59092\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:57581fb3-10fc-4357-8782-7b8989f476b6>\",\"WARC-Concurrent-To\":\"<urn:uuid:eeaa0a55-a6d4-4dd2-9bb8-50ad62598f29>\",\"WARC-IP-Address\":\"34.238.129.158\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/math/calculus/calculus-with-applications-10th-edition/chapter-r-algebra-reference-r-4-equations-r-4-exercises-page-r-16/15\",\"WARC-Payload-Digest\":\"sha1:KL7OWYFIB7AUAHGL3YQXN2A6UQ5CYHQE\",\"WARC-Block-Digest\":\"sha1:SZVINROJJS4T6YPW4QC4U5OXLDBOPBXF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655886516.43_warc_CC-MAIN-20200704170556-20200704200556-00291.warc.gz\"}"}
https://aip.seekingsugardaddy.de/matlab-code-for-forward-and-inverse-kinematics.html
[ "Matlab code for forward and inverse kinematics\n\n### 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. . The robot kinematics can be divided into forward kinematics and inverse kinematics. Forward kinematics problem is straightforward and there is no complexity deriving the equations. Hence, there is always a forward kinematics solution of a manipulator. Inverse kinematics is a much more difficult problem than forward kinematics. 2022. 7. 16. · Inverse Kinematics Solver Matlab One important aspect however is that while OpenSim provides a useful general tool for biomechanical analysis including fields beyond. Forward Kinematics and Reverse Kinematics. In Robotics F.K. we have A*Si = B*phi where A, B are known matrices, Si is a vector with x, y and z as its elements, phi is the vector containing the angular velocity of each of the 2 wheels of the robot. MATLAB says that an eqn of the form Ax=B can be solved by A\\B. This video includes an example for a robot manipulator to be simulated. Both Forward and Inverse Kinematics are calculated through a MATLAB GUIif you don't k. . Department, Mechatronics Lab. Forward and Inverse kinematics analysis are performed. Robotics Toolbox is also applied to model Denso robot system. A GUI is built for practical use of robotic system. 2. Robot Arm Kinematics The robot kinematics can be categorized into two main parts; forward and inverse kinematics. Forward. . Forward Kinematics is a mapping from joint space Q to Cartesian space W: F(Q) = W This mapping is one to one - there is a unique Cartesian configuration for the robot for a given set of joint variables. Inverse Kinematics is a method to find the inverse mapping from W to Q: Q = F−1(W) 2. The inverse kinematics problem has a wide range of. 3.1Inverse Kinematics Test On the basis of previous development, it is possible to utilize MATLAB to perform kinematics analysis. Using the manipulator shown in Fig. 2 as the example. Suppose the desired position and orientation of end effector are (20 , 20) and φ = 0˚. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. EULER.m (inside the for loop) to implement the Backward Euler, Improved Euler and Runge-Kutta methods. The file EULER.m This program will implement Euler’s method to solve the differential equation dy dt = f(t,y) y(a) = y 0 (1) The solution is returned in an array y. You may wish to compute the exact. In my opinion, the answer to this question is straightforward. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. siser easysubli htv and mask sublimation sheets. MATLAB and Simulink capabilities to develop new robot algorithms » Kinematic and dynamic models of robots ... Connect to an exter. . January 18, 2022 matlab code for forward and inverse kinematics. by. OVERVIEW. ACROBOT 6-DOF Robot Arm , with its high technology joint actuators, is a hands-on experiment, closing the gap between real industrial systems and DIY- approach. Users can understand the complex inverse kinematics algorithms and quickly prototype new motion control architecture for industrial parallel kinematics <b>robots</b>. These forward and inverse kinematics computations are done using KinematicsSolver objects. The objects are defined as persistent variables in the functions sm_pick_and_place_robot_fk and sm_pick_and_place_robot_ik. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. 2022. 7. 13. · Suppose the initial state of the manipulator that all nodes are shown on the same line as shown in following figure Sıfır matrisi: Matlab zeros komutu Birler matris: Matlab ones. This project combined forward and inverse position and velocity kinematics, dynamics, and vision processing for the control of a 3 Degree of Freedom ( DOF ) robotic arm .The manipulator was able to recognize objects in its workspace, pick them up, and sort them by weight and color. A combination of MatLab and C++ programming was used to control. First, plug the joint angles you received from your inverse kinematics algorithm into your forward kinematics equations. Do they provide the same end effector coordinates that you entered into your inverse kinematics routine? If not, you have an error in either the forward or inverse equations. Yes, forward kinematics are easy. It defines a function which maps the robot configuration $$R_1 \\in SO(2), R_2 \\in SO(2)$$ to the end-effector position $$e \\in R^2$$. Normally, the forward kinematics is a closed-form function. 4. The Inverse Kinematics. The inverse kinematics asks a question: I want to move the end-effector to a target position. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. To define a combination of position and orientation goal, we would append some rotation parameterization like Euler angles to x, and define the forward kinematic map: x ≡ [xp xo] = f(q) ≡ [ TN(q)xN R − 1 ea (RN(q))]. Here are the steps for calculating inverse kinematics for a six degree of freedom robotic arm. Step 1: Draw the kinematic diagram of just the first three joints, and perform inverse kinematics using the graphical approach. Step 2: Compute the forward kinematics on the first three joints to get the rotation of joint 3 relative to the global (i.e. Please can you write a code for Forward and inverse kinematics for 5 DOF using matlab (robotics toolbox) Question: Please can you write a code for Forward and inverse kinematics for 5 DOF using matlab (robotics toolbox). . These coordinates are end effector position target to pick each object and were placed to the right position based on its color. Based on the end effector position target, PD-PIJ inverse kinematics method was used to determine the right angle of each joint of manipulator links. The angles found by PD-PIJ is the input of DH forward kinematics. 2022. 9. 5. · The forward kinematics allow NAO developers to map any configuration of the robot from its own joint space to the three-dimensional physical space, whereas the inverse. Special thanks for :Felix Pasila, S.T., M.Sc., Ph.D as lecturerHarsha for making the solidwork designReference:https://grabcad.com/library/6- dof -robotic-ma. OVERVIEW. ACROBOT 6-DOF Robot Arm , with its high technology joint actuators, is a hands-on experiment, closing the gap between real industrial systems and DIY- approach. Users can understand the complex inverse kinematics algorithms and quickly prototype new motion control architecture for industrial parallel kinematics <b>robots</b>. This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and it provides you the end effector position and in Inverse Kinematics provide the end effector position (coordinate axes) and GUI will provide you the required angles to achieve that position. Cite As. 2022. 9. 6. · forward (theta) To calculate the forward kinematics, we need to specify 6 axis angles Inverse dynamics is a technique in which measured kinematics and, possibly, external. Matlab code for Forward Kinematics of 2R robotic arm with animation. 2022. 9. 7. · If inverse kinematics are calculated, the return values are placed in a, b and c I have been learning about Inverse Kinematics on Systems of linked components Subsequently, simulation of the inverse kinematics of the above-mentioned kinematic structure was performed in the Matlab Simulink environment using the Forward kinematics described how robot's. Compute the kinematic solution using the gik object. Specify the initial guess and the different kinematic constraints in the proper order. iniGuess = homeConfiguration (robot); [q, solutionInfo] = gik (iniGuess,positionTarget1,positionTarget2,jointLimBounds); Examine the results in solutionInfo. Show the kinematic solution compared to the home. The solution of the forward and inverse kinematics problems based on the geometric method are given and obtained in MATLAB for the 5DOF manipulator. •Design Inverse Kinematics Algorithm . In this paper, artificial neural networks (ANN) are used and simulated. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... The goal of this project is to design a forward 6 DoF robotic arm and control it by Matlab. The controller is separated by two. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. A 3D simulation/visualization of the robotic arm is displayed in the GUI in real time. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. I am verifying the output of my forward kinematics through inverse kinematics and the results are not as desired. As the output of my inverse kinematics is not coming out to be the same as the input of forward kinematics. The D-H parameters of manipulator is given as: Link: alpha, a, theta, d. Link 1 : -90 0 theta1* d1. Properties of MOPSO matlab r2019 全局优化工具箱 全局优化工具箱提供了一些函数, 用于寻找包含多个极大值或极小值的问题的全局解. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... Movement system used forward kinematics denavit hartenberg which each joint angle is updated by joint velocity found by inverse kinematics pseudoinverse jacobian. ... Robot Manipulator Control with Inverse Kinematics PD-Pseudoinverse. January 18, 2022 matlab code for forward and inverse kinematics. by. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. A 3D simulation/visualization of the robotic arm is displayed in the GUI in real time. •Robotics Toolbox for MATLAB: overview, online resources, basic operations, installation, built-in demo •Serial-link manipulator example -Puma560: DH parameters, forward & inverse kinematics •How to better use RTB manual •Bugs -example, possible solutions •Simulink -intro, RTB library for Simulink, RTB examples for Simulink. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. 2022. 7. 13. · Matlab code for Forward Kinematics of 2R robotic arm with animation The more frequent robot manipulation problem, however, is the opposite The following code can be used. All vectors and tensors are to be expressed in the Link's coordinate frame. dhFwdKine H = dhFwdKine (linkList, paramList): Returns the forward kinematics of a manipulator with the provided DH parameter set. linkList is to be an array of links, each created by createLink. matlab code for forward and inverse kinematics. May 21 2021. naugatuck high school football coach. creative synonyms in different languages 0 Comments. Forward kinematics for all link frames. Parameters. q (ndarray(n) or ndarray(m,n)) - The joint configuration of the robot (Optional, if not supplied will use the stored q values). old (bool, optional) - \"old\" behaviour, defaults to True. Returns. Forward kinematics as an SE(3) matrix. Return type. SE3 instance with n values. . About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. The kinematics and dynamics (both forward and inverse) of the biped robot \"PASIBOT,\" taking into account for support foot slippage are encoded in MATLAB ® code. The great advantage of creating a parametric MATLAB ® code following this methodology is that the algorithm can be modify to obtain the results in a parametric way or even. Read more..The kinematics and dynamics (both forward and inverse) of the biped robot \"PASIBOT,\" taking into account for support foot slippage are encoded in MATLAB ® code. The great advantage of creating a parametric MATLAB ® code following this methodology is that the algorithm can be modify to obtain the results in a parametric way or even. 2022. 9. 7. · Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE Inverse Kinematics is the inverse - using the end-effector desired coordinates ,. There are 4 different 6-axis robots that I am trying to calculate. one's forward kinematics, one's inverse kinematics, one's newton euler's solution, one's Jacobian matrix solutions, I have to do it in matlab. I'm trying to write the required codes, but I'm constantly making mistakes. I could not find ready-made code anywhere. siser easysubli htv and mask sublimation sheets. MATLAB and Simulink capabilities to develop new robot algorithms » Kinematic and dynamic models of robots ... Connect to an exter. When to use: Solving forward and inverse kinematics and dynamics, extracting mechanical properties (Jacobian, mass matrix, gravity torques, etc.) ... Below is some example MATLAB code and an animation of generalized IK on a model of a Rethink Sawyer, which has a 7-DOF arm. Here, we are setting a constraint on the end effector position, while. Topics covered in this session are:Euler Lagrange formulation of n-DOF serial manipulatorGeneral Matlab codeExample: Inverse Dynamics of a 2-DOF manipulator. I am trying to compute dynamics of 3 DOF robot using Robotics Toolbox by executing this code: robot.accel(q, zeros(1,3), zeros(1,3)) But I am getting this error: Assignment has more non. For Kinematic analysis of taken 6 DOF serial link manipulator, the D-H representation of Forward & Inverse Kinematics are mathematically obtained first. In figure 2 is shown a simple 6 DOF robotic arm . Figure 2. 6 DOF robot manipulator The joint & Link parameters of 6 DOF</b> <b>robots</b> are noted below in a table 1. There are two types of kinematic equations used in the control of this robot: forward and reverse. Forward kinematics are used to find the arms position in task space based on the joint parameters. For example, if you know the angle of the three joints, you can use forward position kinematics to determine the (x,y,z) position of the end-effector. Start Learning with Free Interactive Tutorials. MATLAB Onramp. Get started quickly with the basics of MATLAB . Launch. Simulink Onramp. Discover Model-Based Design with Simulink . Learn more. glupi vicevi. Advertisement kioti hydraulic fluid. used 5 ft box blade. how. regus. 2022. 9. 5. · The forward kinematics allow NAO developers to map any configuration of the robot from its own joint space to the three-dimensional physical space, whereas the inverse. Jul 10, 2019 · Forward Dynamics of Robot using Robotics Toolbox. Learn more about matlab, simulink, control, robotics toolbox, peter corke Simulink. \"/> cvxpy solver. difference between fair value gap and liquidity void; niantic wayfarer level 38; percy jackson fanfiction lemon. Let's look at numerical approaches to inverse kinematics for a couple of different robots and learn some of the important considerations. For RTB10.x please note that the mask value must be explicitly preceded by the 'mask' keyword. For example: >> q = p2.ikine (T, [-1 -1], 'mask', [1 1 0 0 0 0]) MATLAB. inverse kinematic. These coordinates are end effector position target to pick each object and were placed to the right position based on its color. Based on the end effector position target, PD-PIJ inverse kinematics method was used to determine the right angle of each joint of manipulator links. The angles found by PD-PIJ is the input of DH forward kinematics. . 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. All vectors and tensors are to be expressed in the Link's coordinate frame. dhFwdKine H = dhFwdKine (linkList, paramList): Returns the forward kinematics of a manipulator with the provided DH parameter set. linkList is to be an array of links, each created by createLink. To define a combination of position and orientation goal, we would append some rotation parameterization like Euler angles to x, and define the forward kinematic map: x ≡ [xp xo] = f(q) ≡ [ TN(q)xN R − 1 ea (RN(q))]. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. This example shows how to use the KinematicsSolver object to perform forward kinematics (FK) and inverse kinematics (IK) on a five-bar robotic mechanism. First, the example demonstrates how to perform FK analyses to calculate a singularity-free workspace for a five-bar robot. ... You clicked a link that corresponds to this MATLAB command: Run. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. 2. Below is my code. I have all the DH parameters that will allow me to calculate the end effector position. I'm not sure where to input the values of thetas 1 ~5 shown at the bottom. Please help. function [T] = getTransformMatrix (theta, d, a, alpha) T = [cosd (theta) -sind (theta) * cosd (alpha) sind (theta) * sind (alpha) a * cosd (theta);. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab. 2022. 9. 2. · Inverse Kinematics Solver Matlab The tooltip pose of this robot is described simply by two numbers, the coordinates x and y with respect to the world coordinate frame This. Learn more about inverse kinematics, forward dynamics Robotics System Toolbox. Skip to content. ... I want to do forward dynamics but before that I got struck in inverse kinematics for 4 dof. My code is given below: preach = [0.2, 0.2, 0.3]; ... Find the treasures in MATLAB Central and discover how the community can help you! Start Hunting!. 3) Symbolic Math Toolbox. With the help of symbolic math tools, analytical solutions can be found for the inverse kinematics. An analytical solution is the explicit equation for the joint angles of the robot given end effector pose: joint_angles = f (end_effector_pose). Once the equation is found, the joint angles can be found very quickly. Standard Particle Swarm Optimization code (Matlab M-file) for the optimization of the benchmark function. https://elkmany.github.io/pso/. 0.0. Particle Swarm Optimization : A Tutorial James Blondin September 4, 2009 1 Introduction Particle Swarm Optimization (PSO) is a technique used to explore the search space of a given problem to find the settings or parameters required to. MATLAB Walid-khaled / 7DOF-KUKA-Linear-Axis-Forward-and-Inverse-Kinematics Star 4 Code Issues Pull requests In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. This Demonstration lets you control a two-link revolute-revolute robot arm either by setting the two joint angles (this is called forward kinematics) or by dragging a locator specifying the tip of the end effector (this is called inverse kinematics).Most locations in the workspace have two solutions to the inverse kinematics and can be selected with the \"elbow up?\". 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. It is shown by tests that the error of the forward kinematics solution is ±1.5mm, while the error of the inverse kinematics solution is ±1.31°. The limitations of the above works are: 1.Time consumption and expensive in implementation. The problems solved in the above works are only suitable for fixed parameters. For robot manipulators it covers forward, inverse and differential kinematics, and dynamics. The Robotics Toolbox for MATLAB is free and open software that enables the reader to easily bring the algorithmic concepts into practice and work with real, non-trivial, problems.. This paper present kinematic and dynamic analysis of a 3-R robot arm with Adams/ Matlab Co-Simulation,. For robot manipulators it covers forward, inverse and differential kinematics, and dynamics. The Robotics Toolbox for MATLAB is free and open software that enables the reader to easily bring the algorithmic concepts into practice and work with real, non-trivial, problems.. This paper present kinematic and dynamic analysis of a 3-R robot arm with Adams/ Matlab Co-Simulation,. Browse The Most Popular 4 Matlab Robot Arm Open Source Projects. Awesome Open Source. Awesome Open Source. Combined Topics. matlab x. robot - arm x. harley davidson catalytic converter scrap price; yeshiva schools calendar; audubon nj town wide yard sale 2022; anime drawings website; genius retractable screen door costco reviews. 2022. 9. 2. · Inverse Kinematics Solver Matlab The tooltip pose of this robot is described simply by two numbers, the coordinates x and y with respect to the world coordinate frame This. 2022. 9. 4. · 3: Forward and Inverse Kinematics and the Denavit-Hartenberg Convention Clarification on spherical wrist DH frames Derivation The forward and inverse kinematics of a. Inverse Kinematics Matlab Code Codes and Scripts Downloads Free. Verify your solution in MATLAB by using your forward kinematics code from HW# 3. Matlab code for Forward Kinematics of 2R robotic arm with animation. In document the solutions of both the forward and inverse kinematics problems for Adept Six 300 6R robot are presented. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI) Inverse Kinematics of 3DOF MeArm Matlab Model Simulation based on PseudoInverse Jacobian Method. The simulation hasn't set the operation range yet, so we can see when the arm try to reach the position out of the its limit. The Forward Kinematics is driven by Denavit-Hartenberg convention. Inverse Kinematics Inverse kinematics (IK) algorithm design with MATLAB and Simulink Kinematics is the study of motion without considering the cause of the motion, such as forces and torques. Inverse kinematics is the use of kinematic equations to determine the motion of a robot to reach a desired position. 2022. 9. 4. · 3: Forward and Inverse Kinematics and the Denavit-Hartenberg Convention Clarification on spherical wrist DH frames Derivation The forward and inverse kinematics of a. . In the Fig 2 one can see relation between forward and inverse kinematics. In forward kinematics position matrices or end effector position are calculated by help of link length and joint angles, and in inverse kinematics joint angles are calculated with the help of link length and end effector position or position matrices. Its kinematic parameters are described on this web page in terms of modified Denavit-Hartenberg parameters. Forward and inverse kinematics Using the Robotics Toolbox for MATLAB, and for a nominal position (0.4, 0, 0.6) m and with the tool pointing straight down, we can solve the inverse kinematics numerically and show that the solution is valid. 18 hours ago · C# - Free source code and tutorials for Software developers and Architects The referenced robot is Adapt S350 SCARA, but only 2 degrees of freedom are used MATLAB is used by engineers and scientists in many fields, such as image processing, robotics, and computational finance MATLAB is a high-level language and interactive environment for. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics. 2022. 8. 21. · Inverse Kinematics Matlab Code Codes and Scripts Downloads Free Forward kinematics problem is straightforward and there is no complexity deriving the equations For. Inverse kinematics (IK) determines joint configurations of a robot model to achieve a desired end-effect position. Robot kinematic constraints are specified in the rigidBodyTree robot model. Matlab code for Forward Kinematics of 2R robotic arm with animation. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... Movement system used forward kinematics denavit hartenberg which each joint angle is updated by joint velocity found by inverse kinematics pseudoinverse jacobian. ... Robot Manipulator Control with Inverse Kinematics PD-Pseudoinverse. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy. 2022. 9. 7. · If inverse kinematics are calculated, the return values are placed in a, b and c I have been learning about Inverse Kinematics on Systems of linked components Subsequently, simulation of the inverse kinematics of the above-mentioned kinematic structure was performed in the Matlab Simulink environment using the Forward kinematics described how robot's. 2.4.6.1 MATLAB Example: Inverse Kinematics of the Robotic Arm This example shows how to solve the inverse kinematic problem using SVD in MATLAB and plots the results. In the problem, the desired movement of the end effector is given in terms of and . The code then determines the necessary angular velocities to achieve that end-effector movement. 3) Symbolic Math Toolbox. With the help of symbolic math tools, analytical solutions can be found for the inverse kinematics. An analytical solution is the explicit equation for the joint angles of the robot given end effector pose: joint_angles = f (end_effector_pose). Once the equation is found, the joint angles can be found very quickly. 3.1Inverse Kinematics Test On the basis of previous development, it is possible to utilize MATLAB to perform kinematics analysis. Using the manipulator shown in Fig. 2 as the example. Suppose the desired position and orientation of end effector are (20 , 20) and φ = 0˚. Optimization Algorithms for Inverse Kinematics of Robots ... Once you've tested your IK solution, MATLAB and Simulink allow you to explore next steps towards building a complete robotic. Inverse Kinematics Mathematics for Inverse Kinematics 15‐464: Technical Animation Ming Yao Overview • Kinematics • Forward Kinematics and Inverse Kinematics • Jabobian • Pseudoinverse of the Jacobian • Assignment 2 Vocabulary of Kinematics • Kinematics is the study of how things move, it describes the motion of a hierarchical skeleton structure. 2022. 9. 6. · forward (theta) To calculate the forward kinematics, we need to specify 6 axis angles Inverse dynamics is a technique in which measured kinematics and, possibly, external. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... on forward kinematics of 3 to 6 DOF SCARA robots . MATLAB is a powerful tool used to calculate complex. A five-bar robot, which is also called a five-bar planar manipulator, is a two-degree-of-freedom parallel mechanism. In this example, the robot has four equal-length links that cannot collide with each other. The robot uses two stepper motors to drive the proximal links to move the pen. Theoretically, the five-bar robot has four regimes of. Forward Kinematics and Reverse Kinematics. In Robotics F.K. we have A*Si = B*phi where A, B are known matrices, Si is a vector with x, y and z as its elements, phi is the vector containing the angular velocity of each of the 2 wheels of the robot. MATLAB says that an eqn of the form Ax=B can be solved by A\\B. Learn more about inverse kinematics, forward dynamics Robotics System Toolbox. Skip to content. ... I want to do forward dynamics but before that I got struck in inverse kinematics for 4 dof. My code is given below: preach = [0.2, 0.2, 0.3]; ... Find the treasures in MATLAB Central and discover how the community can help you! Start Hunting!. Some universities still have some Puma 560 robots. >> mdl_puma560 % create the model % forward kinematics of a known set of joing angles >> T = p560.fkine(qn); % inverse kinematics - right handed, elbow up >> qn_r = p560.ikine6s(T, 'ru') qn_r = -0.0000 0.7854 3.1416 -0.0000 0.7854 0.0000 >> p560.plot(qn_r). General procedure for determining forward kinematics 1. Label joint axes as z 0, , z n-1 (axis z i is joint axis for joint i+1) 2. Choose base frame: set o 0 on z 0 and choose x 0 and y 0 using right-handed convention 3. For i=1:n-1, i. Place o i where the normal to z i and z i-1 intersects z i. If z i intersects z i-1, put o i at. Read more..Forward Kinematics. The way in which the code works for the trajectories is the following: After selecting this mode, you must select a shape to draw. You can choose between Line, Triangle, Square and Ellipse. ... Inverse Kinematics. The inverse kinematics problem consists on finding the necessary inputs for the robot to reach a point on its. Here are the steps for calculating inverse kinematics for a six degree of freedom robotic arm. Step 1: Draw the kinematic diagram of just the first three joints, and perform inverse kinematics using the graphical approach. Step 2: Compute the forward kinematics on the first three joints to get the rotation of joint 3 relative to the global (i.e. Inverse kinematics tutorial. This tutorial explains how to use CoppeliaSim's kinematics functionality, while building a 7 DoF redundant manipulator. But before that, make sure to have a look at the various example scenes related to IK and FK in folder scenes/kinematics. This tutorial is segmented into 3 parts: Building the simple simulation. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes. Skip to content. ... 3dof arm robot denavithartenberg forward kinematics inverse kinematics mearm. Cancel. Acknowledgements. Inspired: 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI). Step 3: Remember your end effector. The goal of calculating the Forward Kinematics is to be able to calculate the end effector pose from the position of the joints. Most Forward Kinematic tutorials will generalize the end effector as a single distance from the final joint. This is fine for a simple \"open-close\" gripper. For example, in the computation of your inverse kinematics function, you have Theme Copy r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. cgr prefix means the code is code-generation ready. ncgr means the code is NOT code-generation ready. Features: Forward kinematics Homogenous transformation of each link of the robot Numerical jacobian Simple visualization, it can also be animated Inverse kinematics with the pseudo-inverse method and damped least square method. Code generation. Matlab code for Forward Kinematics of 2R robotic arm with animation. This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and it provides you the end effector position and in Inverse Kinematics provide the end effector position (coordinate axes) and GUI will provide you the required angles to achieve that position. Cite As. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy. This task is about doing the forward kinematic analysis for 6 DoF robotic arm with using the Denavit-Hartenberg Convention. In order to use this D-H convention, specific parameters need to be used, and three rules must be followed. Denavit-Hartenberg Parameters ai: The length distance from zi to zi+1 measured along zi. 11h ago. Search: Inverse Kinematics Solver Matlab. There are also several examples in python and matlab that show how to interface with openrave to use the plugins in CoMPS Create a rigid body tree model for your robot using the rigidBodyTree class The individual joints' trajectories, velocities and accelerations can be obtained using inverse kinematics equations Back in the day, I loved numerical. I need Complete Editable Working Code in MATLAB of \"Solving the Forward and Inverse Kinematics of PUMA 560 using DH parameters along with their plots\". Good and Correct Work Will be Appriciated. Question : I need Complete Editable Working Code in MATLAB of \"Solving the Forward and Inverse Kinematics of PUMA 560 using DH parameters along with. I am verifying the output of my forward kinematics through inverse kinematics and the results are not as desired. As the output of my inverse kinematics is not coming out to be the same as the input of forward kinematics. The D-H parameters of manipulator is given as: Link: alpha, a, theta, d. Link 1 : -90 0 theta1* d1. 2022. 9. 6. · Matlab code for Forward Kinematics of 2R robotic arm with animation Forward Kinematics is about use a set of joints angles and solve for the end-effector position To ensure your robot model and kinematic group are compatible, check the IsValidGroupForIK property after selecting a kinematic group Inverse kinematics denotes the computation of all joint angles out. •Robotics Toolbox for MATLAB: overview, online resources, basic operations, installation, built-in demo •Serial-link manipulator example -Puma560: DH parameters, forward & inverse kinematics •How to better use RTB manual •Bugs -example, possible solutions •Simulink -intro, RTB library for Simulink, RTB examples for Simulink. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. robotic arm using MATLAB tool is provided. The flow chart below explains the process starting with creating the robot, controlling the robot with input joint angles, forward kinematics and inverse kinematics functions used for the implementation. Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE. Discussions (18) % Anthropomorphic arm with 6 DOF and spherical wrist. % It calculates the Inverse Kinematic of an Anthropomorphic arm with 6 DOF . % 'q' is the solutions in radiant and K is the direct Kinematic matrix. %. % K = [ n s a p; % 0 0 0 1] % where n, s, a are three vectors fo 3 elements that represents the. Forward Kinematics and Reverse Kinematics. In Robotics F.K. we have A*Si = B*phi where A, B are known matrices, Si is a vector with x, y and z as its elements, phi is the vector containing the angular velocity of each of the 2 wheels of the robot. MATLAB says that an eqn of the form Ax=B can be solved by A\\B. Compute the kinematic solution using the gik object. Specify the initial guess and the different kinematic constraints in the proper order. iniGuess = homeConfiguration (robot); [q, solutionInfo] = gik (iniGuess,positionTarget1,positionTarget2,jointLimBounds); Examine the results in solutionInfo. Show the kinematic solution compared to the home. 2022. 9. 2. · Inverse Kinematics Solver Matlab The tooltip pose of this robot is described simply by two numbers, the coordinates x and y with respect to the world coordinate frame This. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. There are two types of kinematic equations used in the control of this robot: forward and reverse. Forward kinematics are used to find the arms position in task space based on the joint parameters. For example, if you know the angle of the three joints, you can use forward position kinematics to determine the (x,y,z) position of the end-effector. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes. Skip to content. ... 3dof arm robot denavithartenberg forward kinematics inverse kinematics mearm. Cancel. Acknowledgements. Inspired: 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI). Forward and Inverse kinematics - File Exchange - MATLAB Central Forward and Inverse kinematics version 1.0.0 (2.11 KB) by hashim khan Forward and Inverse kinematics of 6 DOF arm with workspace calculation 5.0 (1) 843 Downloads Updated 26 Sep 2019 View License Follow Download Overview Functions Reviews (1) Discussions (2). 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. There are 4 different 6-axis robots that I am trying to calculate. one's forward kinematics, one's inverse kinematics, one's newton euler's solution, one's Jacobian matrix solutions, I have to do it in matlab. I'm trying to write the required codes, but I'm constantly making mistakes. I could not find ready-made code anywhere. 2022. 3. 21. · What is Matlab Code For Forward And Inverse Kinematics. Verify the forward kinematics of the PUMA 260 robot by comparing the results from Matlab simulation and the. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only. Matlab Code for Lynx Robot 0 Selection of motor and Calculating the torque for 6DOF robot Arm 1 How to find Joint Angles or Theta for 7DoF Robotic ... Users can understand the complex inverse kinematics algorithms and quickly prototype new motion control architecture for industrial parallel kinematics robots. milperra massacre. 2022. 9. 3. · 3;0,0;0,0]; % Given gamma, solve for the forward differential kinematics matrix Inverse kinematics denotes the computation of all joint angles out of the tool-centre-point's position and orientation This is commonly resolved by introducing ‘residual forces and torques’ which compensate for this To calculate inverse kinematics for a specific kinematic group, use. Inverse Kinematics Mathematics for Inverse Kinematics 15‐464: Technical Animation Ming Yao Overview • Kinematics • Forward Kinematics and Inverse Kinematics • Jabobian • Pseudoinverse of the Jacobian • Assignment 2 Vocabulary of Kinematics • Kinematics is the study of how things move, it describes the motion of a hierarchical skeleton structure. To write code to fit a linear and cubic polynomial for the Cp data.2. To plot the linear and cubic fit curves along with the raw data points.3. ... Aim - Write a program in Matlab showing the Forward Kinematics of a 2R Robotic Arm Description - 2R Robotic Arm- A robotic arm is a type of mechanical arm, usually programmable. The arm may be the. The repository contains the MATLAB codes for the Implementation of pick and place tasks with the UR5 robot using Inverse Kinematics, Resolved Rate control and Gradient Descent control algorithms. python matlab inverse-kinematics gradient-descent ur5 resolved-rate Updated on Sep 19, 2017 MATLAB. 2022. 9. 9. · Matlab code for Forward Kinematics of 2R robotic arm with animation Inverse Kinematics Gino van den Bergen The other joints are controlled by forward kinematics. May 01, 2018 · This project describe a mechanical system, design concept and prototype implementation of a 6 DOF robotic arm, which should perform industrial task such as pick and place of fragile objects operation.. IV. GUI DEVELOPMENT FOR 6 DOF ROBOT POSITION ANALYSIS In this chapter, a detailed discussion on the implementation, creation and the. . This task is about doing the forward kinematic analysis for 6 DoF robotic arm with using the Denavit-Hartenberg Convention. In order to use this D-H convention, specific parameters need to be used, and three rules must be followed. Denavit-Hartenberg Parameters ai: The length distance from zi to zi+1 measured along zi. 11h ago. Answer (1 of 2): I think Peter Corke's ROBOTICS TOOLBOX for matlab can solve your problem, it has inbuilt functions for inverse and forward kinematics with support for easy plotting like plotting the robot model, plotting workspace etc Try that, toolbox is free. These coordinates are end effector position target to pick each object and were placed to the right position based on its color. Based on the end effector position target, PD-PIJ inverse kinematics method was used to determine the right angle of each joint of manipulator links. The angles found by PD-PIJ is the input of DH forward kinematics. 2022. 9. 6. · This is a study of Inverse Kinematics for arms of 2 to 7 DOF with Matlab GUIDE So solving Equation 6 requires liberalization of the jacobian The following code exemplifies how to. set of four parameters. Any robot can be modeled using the D-H representation. A computer code has been formed in MATLAB to implement the modeling of any robot with only the DH parameters as input. The purpose of the simulator is to create an accurate Forward kinematic and inverse kinematics representation of any type of robot and its motions. The. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. . The following Matlab project contains the source code and Matlab examples used for robotic toolbox. A set of matlab scripts featuring: forward kinematics by omogeneous transformations and DH transformations, inverse kinematics for euler and rpy wrist and antropomorphic manipulator, differential kinematics operator and geometrical jacobian, static force analysis, trajectory planning in joint space. If yes, then this is not directly linked to V-REP's IK algorithm, that you cannot export to Matlab. It is built-in V-REP. You will have to code the IK yourself in Matlab. Or - you can have V-REP compute the IK for you, and from Matlab you simply control the end-effector position/orientation. Cheers hawiteshe Posts: 1. Here are the steps for calculating inverse kinematics for a six degree of freedom robotic arm. Step 1: Draw the kinematic diagram of just the first three joints, and perform inverse kinematics using the graphical approach. Step 2: Compute the forward kinematics on the first three joints to get the rotation of joint 3 relative to the global (i.e. FABRIK(Foward and Backward Reaching Inverse Kinematics). Robotic Arm turned into a 3D Printer (Inverse Kinematics) September 07, 2019 02:07PM. 0 arm. ... Jan 18, 2022 · matlab code for forward and inverse kinematics. I'll just write down the final equations here. Here is the blender file used. bsa mercury spares. Advertisement bench. robotic arm using MATLAB tool is provided. The flow chart below explains the process starting with creating the robot, controlling the robot with input joint angles, forward kinematics and inverse kinematics functions used for the implementation. Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. Inverse Kinematics for a 2-Joint Robot Arm Using Geometry ... Inverse kinematics refers to the reverse process. In Robotics F.K. Normally, the forward kinematics is a closed. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. Forward Kinematics and Reverse Kinematics. In Robotics F.K. we have A*Si = B*phi where A, B are known matrices, Si is a vector with x, y and z as its elements, phi is the vector containing the angular velocity of each of the 2 wheels of the robot. MATLAB says that an eqn of the form Ax=B can be solved by A\\B. 2022. 9. 7. · If inverse kinematics are calculated, the return values are placed in a, b and c I have been learning about Inverse Kinematics on Systems of linked components Subsequently, simulation of the inverse kinematics of the above-mentioned kinematic structure was performed in the Matlab Simulink environment using the Forward kinematics described how robot's. May 01, 2018 · This project describe a mechanical system, design concept and prototype implementation of a 6 DOF robotic arm, which should perform industrial task such as pick and place of fragile objects operation.. IV. GUI DEVELOPMENT FOR 6 DOF ROBOT POSITION ANALYSIS In this chapter, a detailed discussion on the implementation, creation and the. There are two types of kinematic equations used in the control of this robot: forward and reverse. Forward kinematics are used to find the arms position in task space based on the joint parameters. For example, if you know the angle of the three joints, you can use forward position kinematics to determine the (x,y,z) position of the end-effector. When I first came across the problem of inverse kinematics I thought - quite naively - that it would be a simple matter to find a solution to the problem because the forward kinematics problem was so simple to solve. I decided to start out with a 2 link arm and see if I could work out the solution on my own from scratch without having any. For Kinematic analysis of taken 6 DOF serial link manipulator, the D-H representation of Forward & Inverse Kinematics are mathematically obtained first. In figure 2 is shown a simple 6 DOF robotic arm . Figure 2. 6 DOF robot manipulator The joint & Link parameters of 6 DOF</b> <b>robots</b> are noted below in a table 1. Inverse kinematics tutorial. This tutorial explains how to use CoppeliaSim's kinematics functionality, while building a 7 DoF redundant manipulator. But before that, make sure to have a look at the various example scenes related to IK and FK in folder scenes/kinematics. This tutorial is segmented into 3 parts: Building the simple simulation. The Matlab program must be able to compute the T6 transform matrix and must incorporate the following: User data entry of each joint angle (in degrees) Joint angle limits Define each T transform and compute T6 transform in world coordinates Vector output in terms of world coodinates - to include position and orientation. 2022. 9. 7. · If inverse kinematics are calculated, the return values are placed in a, b and c I have been learning about Inverse Kinematics on Systems of linked components. The Matlab program must be able to compute the T6 transform matrix and must incorporate the following: User data entry of each joint angle (in degrees) Joint angle limits Define each T transform and compute T6 transform in world coordinates Vector output in terms of world coodinates - to include position and orientation. The movement of robot can be divided into forward and inverse kinematics. Forward kinematics described how robot's move according to entered angles. There is always a solution for forward kinematics of manipulator. Solution for inverse kinematics is a more difficult problem than forward kinematics. These coordinates are end effector position target to pick each object and were placed to the right position based on its color. Based on the end effector position target, PD-PIJ inverse kinematics method was used to determine the right angle of each joint of manipulator links. The angles found by PD-PIJ is the input of DH forward kinematics. . 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. robotic arm using MATLAB tool is provided. The flow chart below explains the process starting with creating the robot, controlling the robot with input joint angles, forward kinematics and inverse kinematics functions used for the implementation. Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... ( MATLAB GUI) of forward and inverse kinematics of multi dof robotic arm. ... Discussions (1) This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. Step 3: Remember your end effector. The goal of calculating the Forward Kinematics is to be able to calculate the end effector pose from the position of the joints. Most Forward Kinematic tutorials will generalize the end effector as a single distance from the final joint. This is fine for a simple \"open-close\" gripper. 2022. 9. 6. · Inverse kinematics 2 link arm python Your code should be general as regards number of input, output, and hidden units, and their connectivity, and also learning rate (alpha. The 6 - DOF articulated robotic arm was designed and visualized in RVIZ and, Moveit is being used as a control interface using Robot Operating System (ROS). The manipulation of the arm with end effector refrain us from using the joint by the joint control mechanism. • Derive the forward kinematic equationsfor CRS robot arm following the Denavit- Hartenberg (DH) convention • Derive inverse kinematic equations for the CRS robot arm • Use the provided Code Composer Studio project to verify your solution NOTE: CRS robot arm has five motors/joints, in this class we are only using/controlling the first. 2022. 9. 6. · This is a study of Inverse Kinematics for arms of 2 to 7 DOF with Matlab GUIDE So solving Equation 6 requires liberalization of the jacobian The following code exemplifies how to. 2022. 9. 6. · This is a study of Inverse Kinematics for arms of 2 to 7 DOF with Matlab GUIDE So solving Equation 6 requires liberalization of the jacobian The following code exemplifies how to. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy Resolution includes three methods, which are Jacobian-based (Damped Least Square and Weighted Pseudoinverse), Null Space, and Task Augmentation. most recent commit 24 days ago. Compute the kinematic solution using the gik object. Specify the initial guess and the different kinematic constraints in the proper order. iniGuess = homeConfiguration (robot); [q, solutionInfo] = gik (iniGuess,positionTarget1,positionTarget2,jointLimBounds); Examine the results in solutionInfo. Show the kinematic solution compared to the home. Let's look at numerical approaches to inverse kinematics for a couple of different robots and learn some of the important considerations. For RTB10.x please note that the mask value must be explicitly preceded by the 'mask' keyword. For example: >> q = p2.ikine (T, [-1 -1], 'mask', [1 1 0 0 0 0]) MATLAB. inverse kinematic. Optimization Algorithms for Inverse Kinematics of Robots ... Once you've tested your IK solution, MATLAB and Simulink allow you to explore next steps towards building a complete robotic. Example #3. In this example, we will take another vector function and will compute its Jacobian Matrix using the Jacobian function. For this example, we will input following values: Pass the input vector function as [c^3 + b^2, 2*a^3 + c, c^2 + 5] Pass the variables as [a, b, c]. . I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... on forward kinematics of 3 to 6 DOF SCARA robots . MATLAB is a powerful tool used to calculate complex. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. This task is about doing the forward kinematic analysis for 6 DoF robotic arm with using the Denavit-Hartenberg Convention. In order to use this D-H convention, specific parameters need to be used, and three rules must be followed. Denavit-Hartenberg Parameters ai: The length distance from zi to zi+1 measured along zi. 11h ago. For a better picture, below is something: Below is the code for my MATLAB script, which runs flawlessly and gives a solution in under 2 seconds: ycurrent = 0; %Not using this xcurrent = 0; %Starting position (x) zcurrent = 0; %Starting position (y) xGoal = .5; %Goal x/z values of (1, 1) zGoal = .5; theta1 = 0.1; %Angle of first DOF theta2 = 0.1. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... The goal of this project is to design a forward 6 DoF robotic arm and control it by Matlab. The controller is separated by two. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. A 3D simulation/visualization of the robotic arm is displayed in the GUI in real time. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. Inverse Kinematics for a 2-Joint Robot Arm Using Geometry ... Inverse kinematics refers to the reverse process. In Robotics F.K. Normally, the forward kinematics is a closed. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. 2022. 9. 5. · Inverse Kinematic systems allow for reactive animation, such as foot placement on non-planar terrain Peter Corke's Robotics Toolbox for robot forward and inverse kinematics. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy Resolution includes three methods, which are Jacobian-based (Damped Least Square and Weighted Pseudoinverse), Null Space, and Task Augmentation. most recent commit 24 days ago. Read more..Let's look at numerical approaches to inverse kinematics for a couple of different robots and learn some of the important considerations. For RTB10.x please note that the mask value must be explicitly preceded by the 'mask' keyword. For example: >> q = p2.ikine (T, [-1 -1], 'mask', [1 1 0 0 0 0]) MATLAB. inverse kinematic. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. I need Complete Editable Working Code in MATLAB of \"Solving the Forward and Inverse Kinematics of PUMA 560 using DH parameters along with their plots\". Good and Correct Work Will be Appriciated. Question : I need Complete Editable Working Code in MATLAB of \"Solving the Forward and Inverse Kinematics of PUMA 560 using DH parameters along with. Inverse Kinematics Matlab Code Codes and Scripts Downloads Free. Verify your solution in MATLAB by using your forward kinematics code from HW# 3. Matlab code for Forward Kinematics of 2R robotic arm with animation. In document the solutions of both the forward and inverse kinematics problems for Adept Six 300 6R robot are presented. 2022. 5. 22. · MATLAB is a powerful environment for linear algebra and graphical presentation that is available on a very wide range of computer platforms Forward and Inverse kinematics. the first three. Part 1: forward kinematics In this part you will derive solutions to the forward kinematics problem for the CRS robot arm. First find parameters of the CRS robot arm following D-H convention, then verify the theoretical result using a given C program in Code Composer Studio. Physical Dimension. Compute the kinematic solution using the gik object. Specify the initial guess and the different kinematic constraints in the proper order. iniGuess = homeConfiguration (robot); [q, solutionInfo] = gik (iniGuess,positionTarget1,positionTarget2,jointLimBounds); Examine the results in solutionInfo. Show the kinematic solution compared to the home. Search: Inverse Kinematics Solver Matlab. Unlike forward kinematics, the solution is not strictly geometry, it demands a numerical methods solution Notice the text boxes in the dialog window are now filled with values The planning and inverse kinematics algorithms in this suite are designed for articulated robots like robotic arms and humanoids. The movement of robot can be divided into forward and inverse kinematics. Forward kinematics described how robot's move according to entered angles. There is always a solution for forward kinematics of manipulator. Solution for inverse kinematics is a more difficult problem than forward kinematics. • Derive the forward kinematic equationsfor CRS robot arm following the Denavit- Hartenberg (DH) convention • Derive inverse kinematic equations for the CRS robot arm • Use the provided Code Composer Studio project to verify your solution NOTE: CRS robot arm has five motors/joints, in this class we are only using/controlling the first. When to use: Solving forward and inverse kinematics and dynamics, extracting mechanical properties (Jacobian, mass matrix, gravity torques, etc.) ... Below is some example MATLAB code and an animation of generalized IK on a model of a Rethink Sawyer, which has a 7-DOF arm. Here, we are setting a constraint on the end effector position, while. Start Learning with Free Interactive Tutorials. MATLAB Onramp. Get started quickly with the basics of MATLAB . Launch. Simulink Onramp. Discover Model-Based Design with Simulink . Learn more. glupi vicevi. Advertisement kioti hydraulic fluid. used 5 ft box blade. how. regus. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy Resolution includes three methods, which are Jacobian-based (Damped Least Square and Weighted Pseudoinverse), Null Space, and Task Augmentation. most recent commit 24 days ago. Topics covered in this session are:Euler Lagrange formulation of n-DOF serial manipulatorGeneral Matlab codeExample: Inverse Dynamics of a 2-DOF manipulator. I am trying to compute dynamics of 3 DOF robot using Robotics Toolbox by executing this code: robot.accel(q, zeros(1,3), zeros(1,3)) But I am getting this error: Assignment has more non. . 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. Read more..Inverse Kinematics: Example I • Inverse Kinematics: - Set the final position equal to the Forward Transformation Matrix 0A 3: • The solution strategy is to equate the elements of 0A 3 to that of the given position (q x, q y) and orientation ϕ Inverse Kinematics: Example I • Orientation (ϕ): • Now Position of the 2DOF point P: ∴. 2022. 9. 8. · Verify the inverse kinematics of the PUMA 260 robot by comparing the results from Matlab Simulation and the robot manipulator As the output of my inverse kinematics is not coming out to be the same as the input of forward kinematics function q = inv_kinematics (ph) %input: [ph1 ph2 ph3] l1 = 0 In the forward kinematics problem, the transformation describing. Fig. 2. Two Link Robot Arm for Forward Kinematic. 2.2 Inverse Kinematic Given the position and orientation of the end effector rela-tive to the base frame compute all possible sets of joint angles and link geometries which could be used to attain the given position and orientation of the end effector. The inverse kine-. Since the forward kinematics formulae for the two-joint robotic arm are known, x and y coordinates of the tip of the arm are deduced for the entire range of angles of rotation of the two joints. The coordinates and the angles are saved to be used as training data to train an ANFIS (adaptive neuro-fuzzy inference system) network. 2022. 3. 21. · What is Matlab Code For Forward And Inverse Kinematics. Verify the forward kinematics of the PUMA 260 robot by comparing the results from Matlab simulation and the. I need Complete Editable Working Code in MATLAB of \"Solving the Forward and Inverse Kinematics of PUMA 560 using DH parameters along with their plots\". Good and Correct Work Will be Appriciated. Question : I need Complete Editable Working Code in MATLAB of \"Solving the Forward and Inverse Kinematics of PUMA 560 using DH parameters along with. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. 2022. 7. 12. · robotic arm using MATLAB tool is provided Suppose that we want to place the gripper at a desired position (the gripper orientation does not matter for now) KinematicsSolver objects allow users to formulate and numerically solve kinematics problems for their Simscape™ Multibody™ models Forward kinematics uses the joint parameters to compute the. All vectors and tensors are to be expressed in the Link's coordinate frame. dhFwdKine H = dhFwdKine (linkList, paramList): Returns the forward kinematics of a manipulator with the provided DH parameter set. linkList is to be an array of links, each created by createLink. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. Forward-and-Inverse-Kinematics-for-3-DOF-Robotic-arm (Smart Methods Internship) in this repo i connected 3 servo motors to arduino to build a robotic arm , then create 2 functions the. Inverse Kinematics of 3DOF MeArm Matlab Model Simulation based on PseudoInverse Jacobian Method. The simulation hasn't set the operation range yet, so we can see when the arm try to reach the position out of the its limit. The Forward Kinematics is driven by Denavit-Hartenberg convention. Paperwork:. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. Inverse Kinematics Mathematics for Inverse Kinematics 15‐464: Technical Animation Ming Yao Overview • Kinematics • Forward Kinematics and Inverse Kinematics • Jabobian • Pseudoinverse of the Jacobian • Assignment 2 Vocabulary of Kinematics • Kinematics is the study of how things move, it describes the motion of a hierarchical skeleton structure. There are 4 different 6-axis robots that I am trying to calculate. one's forward kinematics, one's inverse kinematics, one's newton euler's solution, one's Jacobian matrix solutions, I have to do it in matlab. I'm trying to write the required codes, but I'm constantly making mistakes. I could not find ready-made code anywhere. 2022. 7. 12. · robotic arm using MATLAB tool is provided Suppose that we want to place the gripper at a desired position (the gripper orientation does not matter for now) KinematicsSolver objects allow users to formulate and numerically solve kinematics problems for their Simscape™ Multibody™ models Forward kinematics uses the joint parameters to compute the. . 2022. 8. 27. · Inverse Kinematics is the inverse function/algorithm of Forward Kinematics hashim khan (2021) Inverse kinematics Hi, I am trying to use solve forword and inverse. Hello, I'm learning kinematics and dynamics using Robotic Toolbox Matlab. To perform dynamics (inverse and forward), first I have to build robot model. For that, I took Puma560 data and tried. Code is given below:. 2022. 9. 6. · Inverse kinematics 2 link arm python Your code should be general as regards number of input, output, and hidden units, and their connectivity, and also learning rate (alpha. Compute the kinematic solution using the gik object. Specify the initial guess and the different kinematic constraints in the proper order. iniGuess = homeConfiguration (robot); [q, solutionInfo] = gik (iniGuess,positionTarget1,positionTarget2,jointLimBounds); Examine the results in solutionInfo. Show the kinematic solution compared to the home. Answer (1 of 2): I think Peter Corke's ROBOTICS TOOLBOX for matlab can solve your problem, it has inbuilt functions for inverse and forward kinematics with support for easy plotting like plotting the robot model, plotting workspace etc Try that, toolbox is free. EduRev provides you with complete coverage and for 2022 Forward & inverse kinematics examples of 2R, 3R & 3P manipulators (2) as a part of our plan for syllabus to prepare for exam. Our subject experts have curated special courses, tests & mock test series. All previous year questions (PYQs) & topic wise tests like tests for Forward & inverse. FABRIK(Foward and Backward Reaching Inverse Kinematics). Robotic Arm turned into a 3D Printer (Inverse Kinematics) September 07, 2019 02:07PM. 0 arm. ... Jan 18, 2022 · matlab code for forward and inverse kinematics. I'll just write down the final equations here. Here is the blender file used. bsa mercury spares. Advertisement bench. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. A 3D simulation/visualization of the robotic arm is displayed in the GUI in real time. . Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... Movement system used forward kinematics denavit hartenberg which each joint angle is updated by joint velocity found by inverse kinematics pseudoinverse jacobian. ... Robot Manipulator Control with Inverse Kinematics PD-Pseudoinverse. The 6 - DOF articulated robotic arm was designed and visualized in RVIZ and, Moveit is being used as a control interface using Robot Operating System (ROS). The manipulation of the arm with end effector refrain us from using the joint by the joint control mechanism. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... The goal of this project is to design a forward 6 DoF robotic arm and control it by Matlab. The controller is separated by two. . I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... The goal of this project is to design a forward 6 DoF robotic arm and control it by Matlab. The controller is separated by two. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. There are two types of kinematic equations used in the control of this robot: forward and reverse. Forward kinematics are used to find the arms position in task space based on the joint parameters. For example, if you know the angle of the three joints, you can use forward position kinematics to determine the (x,y,z) position of the end-effector. This task is about doing the forward kinematic analysis for 6 DoF robotic arm with using the Denavit-Hartenberg Convention. In order to use this D-H convention, specific parameters need to be used, and three rules must be followed. Denavit-Hartenberg Parameters ai: The length distance from zi to zi+1 measured along zi. 11h ago. Applying a physical model of two D.O.F manipulator (RR Manipulator) using Matlab Simulink- SimMechanics. Applied Inverse kinematics for this Manipulator. You can compare the reading of position sensor and inverse kinematics equations. It's supposed to be the same. Cite As Wesam Rezk (2022). tools for computing the forward and inverse kinematics in using symbolic and numerical computations in MATLAB. A separate MATLAB script will be provided for the 3D visualization of the robot arm. 1 Introduction The following exercise is based on an ABB IRB 120 depicted in gure 2. It is a 6-link robotic manipulator with a xed base. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. Properties of MOPSO matlab r2019 全局优化工具箱 全局优化工具箱提供了一些函数, 用于寻找包含多个极大值或极小值的问题的全局解. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... ( MATLAB GUI) of forward and inverse kinematics of multi dof robotic arm. ... Discussions (1) This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and. This video includes an example for a robot manipulator to be simulated. Both Forward and Inverse Kinematics are calculated through a MATLAB GUIif you don't k. Simulation of a Puma 762 manipulator capable of solving the Forward and Inverse Kinematics problems demo robotics simulation matlab draw inverse-kinematics puma matlab-gui robotics-simulation inverse-kinematics-problem It turns out that the reason that the inverse kinematics weren't being calculated is because of the collapsed shoulder joing as defined in the D-H table in the \"4 DOF arm\" VI. . Derivation The forward kinematics x=f(θ) is a mapping ℜnm, e.g., from a n-dimensional joint space to a m-dimensional Cartesian space. The singular value decomposition of the Jacobian of this mapping is: J(θ)=USVT The rows [V] i whose corresponding entry in the diagonal matrix S is zero are the vectors which span the Null space of J(θ. 2019. 6. 28. · I am verifying the output of my forward kinematics through inverse kinematics and the results are not as desired. As the output of my inverse kinematics is not coming out. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. Simulink Coder™ MATLAB Coder™ Embedded Coder ® Compilation and programming of the code generated with this blockset requires the latest MPLAB XC compiler and. Fig. 7. . Multi-agent. Search: Inverse Kinematics Solver Matlab. 2022. 9. 8. · Verify the inverse kinematics of the PUMA 260 robot by comparing the results from Matlab Simulation and the robot manipulator As the output of my inverse kinematics is not coming out to be the same as the input of forward kinematics function q = inv_kinematics (ph) %input: [ph1 ph2 ph3] l1 = 0 In the forward kinematics problem, the transformation describing. Its kinematic parameters are described on this web page in terms of modified Denavit-Hartenberg parameters. Forward and inverse kinematics Using the Robotics Toolbox for MATLAB, and for a nominal position (0.4, 0, 0.6) m and with the tool pointing straight down, we can solve the inverse kinematics numerically and show that the solution is valid. mathematical formulation using the MATLAB for the forward kinematic and dynamic analysis of two link planar robot manipulator . Then, forward and inverse kinematics experiments are tested in realistic 2 DOF manipulator. Figure 1: (a) 2 R Robot using V-rep (b) Modify the Rigid Body Dynamics Properties. Mechanical Design. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. Compute the kinematic solution using the gik object. Specify the initial guess and the different kinematic constraints in the proper order. iniGuess = homeConfiguration (robot); [q, solutionInfo] = gik (iniGuess,positionTarget1,positionTarget2,jointLimBounds); Examine the results in solutionInfo. Show the kinematic solution compared to the home. January 18, 2022 matlab code for forward and inverse kinematics. by. Read more..18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. Robotics 1 U1 Kinematics S6 Inverse Kinematics P1 Inverse Kinematics. Matlab code for Forward Kinematics of 2R robotic arm with animation. The variables of the end-effector in a given Cartesian space are to be. Inverse Kinematics - If the hand is moved, the rotation and bending of the arm is calculated, in accordance with the length and joint. 2022. 8. 27. · Atranslation trans- formationhasX=I3(the identity matrix) and the desired offset asy¯ in Eq The inversion of Jacobian matrix was used for numerical solution of the inverse kinematics task matlab code for image restoration using inverse filter, May 03, 2016 · Q4) In Fig Multiple solutions are possible for the same desired configuration Singularities Forward and. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... on forward kinematics of 3 to 6 DOF SCARA robots . MATLAB is a powerful tool used to calculate complex. Matlab code for Forward Kinematics of 2R robotic arm with animation. While, to develop the kinematics that calculates the required joint angles (𝜃1− 𝜃6), both geometrical and analytical approaches are used to solve the inverse kinematic problem. After introducing the forward and inverse kinematic models, a MATLAB code is written to obtain the solutions of these models. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy. Search: Inverse Kinematics Solver Matlab. Unlike forward kinematics, the solution is not strictly geometry, it demands a numerical methods solution Notice the text boxes in the dialog window are now filled with values The planning and inverse kinematics algorithms in this suite are designed for articulated robots like robotic arms and humanoids. These functions are called by the MATLAB function blocks Planning and Control/Forward Kinematics and Planning and Control/Inverse Kinematics highlighted below. To speed up computation and help ensure the KinematicsSolver object for the inverse kinematics problem finds the desired solutions, the previous solution is used as the initial guess for. 2022. 9. 5. · Inverse Kinematic systems allow for reactive animation, such as foot placement on non-planar terrain Peter Corke's Robotics Toolbox for robot forward and inverse kinematics. The forward model is a fully connected neural network with four inputs, one hidden layer of 16 neuron and three output. The input to the model is the four cables' actuations, and the output is the position of the tip of the arm. The mean absolute error of the output is (3.0876, 3.4107, 3.2158) in cm with standard deviation (2.7049, 2.3013, 2.2238). This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and it provides you the end effector position and in Inverse Kinematics provide the end effector position (coordinate axes) and GUI will provide you the required angles to achieve that position. Cite As. For example, in the computation of your inverse kinematics function, you have r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. Answer (1 of 2): I think Peter Corke's ROBOTICS TOOLBOX for matlab can solve your problem, it has inbuilt functions for inverse and forward kinematics with support for easy plotting like plotting the robot model, plotting workspace etc Try that, toolbox is free. 2022. 9. 6. · forward (theta) To calculate the forward kinematics, we need to specify 6 axis angles Inverse dynamics is a technique in which measured kinematics and, possibly, external. 2022. 8. 27. · Inverse Kinematics is the inverse function/algorithm of Forward Kinematics hashim khan (2021) Inverse kinematics Hi, I am trying to use solve forword and inverse. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. The robot kinematics can be divided into forward kinematics and inverse kinematics. Forward kinematics problem is straightforward and there is no complexity deriving the equations. Hence, there is always a forward kinematics solution of a manipulator. Inverse kinematics is a much more difficult problem than forward kinematics. Let's look at numerical approaches to inverse kinematics for a couple of different robots and learn some of the important considerations. For RTB10.x please note that the mask value must be explicitly preceded by the 'mask' keyword. For example: >> q = p2.ikine (T, [-1 -1], 'mask', [1 1 0 0 0 0]) MATLAB. inverse kinematic. 2022. 9. 7. · Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE Inverse Kinematics is the inverse - using the end-effector desired coordinates ,. Inverse Kinematics (1) So using forward kinematics we can determine x, y and z, given the angles φ and θ. But forward kinematics is not enough. Generally with a robot, we know where we want the robot to be (x,y), and need to find the angles. This process is called inverse kinematics. Search: Inverse Kinematics Solver Matlab. There are also several examples in python and matlab that show how to interface with openrave to use the plugins in CoMPS Create a rigid body tree model for your robot using the rigidBodyTree class The individual joints' trajectories, velocities and accelerations can be obtained using inverse kinematics equations Back in the day, I loved numerical. bitcoin private key generator apk simulating a 6 DOF robot in matlab robotic toolbox. Ask Question Asked 2 years, 6 months ago. Modified 2 years, 6 months ago. Viewed 473 times ... Since your robot has 6 DOF, I would expect q also have 6 columns instead of 5. Try with q = [0 0 0 0 0 0] in your code. Share. Follow. cree competitors. Inverse Kinematics (1) So using forward kinematics we can determine x, y and z, given the angles φ and θ. But forward kinematics is not enough. Generally with a robot, we know where we want the robot to be (x,y), and need to find the angles. This process is called inverse kinematics. Inverse Kinematics: Example I • Inverse Kinematics: - Set the final position equal to the Forward Transformation Matrix 0A 3: • The solution strategy is to equate the elements of 0A 3 to that of the given position (q x, q y) and orientation ϕ Inverse Kinematics: Example I • Orientation (ϕ): • Now Position of the 2DOF point P: ∴. Example. Solving analytically, the solution is y = ex and y (1) = 2.71828. (Note: This analytic solution is just for comparing the accuracy.) Using Euler's method , considering h = 0.2, 0.1, 0.01, you can see the results in the diagram below. You can notice, how accuracy improves when steps are small. If this article was helpful,. This project combined forward and inverse position and velocity kinematics, dynamics, and vision processing for the control of a 3 Degree of Freedom ( DOF ) robotic arm .The manipulator was able to recognize objects in its workspace, pick them up, and sort them by weight and color. A combination of MatLab and C++ programming was used to control. 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI) Inverse Kinematics of 3DOF MeArm Matlab Model Simulation based on PseudoInverse Jacobian Method. The simulation hasn't set the operation range yet, so we can see when the arm try to reach the position out of the its limit. The Forward Kinematics is driven by Denavit-Hartenberg convention. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. Inverse Kinematics of 3DOF MeArm Matlab Model Simulation based on PseudoInverse Jacobian Method. The simulation hasn't set the operation range yet, so we can see when the arm try to reach the position out of the its limit. The Forward Kinematics is driven by Denavit-Hartenberg convention. Paperwork:. 2022. 8. 21. · Inverse Kinematics Matlab Code Codes and Scripts Downloads Free Forward kinematics problem is straightforward and there is no complexity deriving the equations For. Robotics 1 U1 Kinematics S6 Inverse Kinematics P1 Inverse Kinematics. Matlab Code-Forward kinematic model. The complete Toolbox and documentation is freely available via anonymous ftp. In inverse-kinematics mode, the model only moves when the user clicks-and-drags on the object to adjust the joint angles. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. Step 3: Remember your end effector. The goal of calculating the Forward Kinematics is to be able to calculate the end effector pose from the position of the joints. Most Forward Kinematic tutorials will generalize the end effector as a single distance from the final joint. This is fine for a simple \"open-close\" gripper. Discussions (18) % Anthropomorphic arm with 6 DOF and spherical wrist. % It calculates the Inverse Kinematic of an Anthropomorphic arm with 6 DOF . % 'q' is the solutions in radiant and K is the direct Kinematic matrix. %. % K = [ n s a p; % 0 0 0 1] % where n, s, a are three vectors fo 3 elements that represents the. Properties of MOPSO matlab r2019 全局优化工具箱 全局优化工具箱提供了一些函数, 用于寻找包含多个极大值或极小值的问题的全局解. matlab code for forward and inverse kinematics. May 21 2021. naugatuck high school football coach. creative synonyms in different languages 0 Comments. 2022. 7. 13. · Matlab code for Forward Kinematics of 2R robotic arm with animation The more frequent robot manipulation problem, however, is the opposite The following code can be used. Discussions (18) % Anthropomorphic arm with 6 DOF and spherical wrist. % It calculates the Inverse Kinematic of an Anthropomorphic arm with 6 DOF . % 'q' is the solutions in radiant and K is the direct Kinematic matrix. %. % K = [ n s a p; % 0 0 0 1] % where n, s, a are three vectors fo 3 elements that represents the. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired end-effector pose based on a specified rigid body tree model However. Inverse kinematics (IK) determines joint configurations of a robot model to achieve a desired end-effect position. Robot kinematic constraints are specified in the rigidBodyTree robot model. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... sevcon mos90 fault codes; kama sutra a position a; rpgbot sorcerer metamagic; circuitpython string functions; nextbot chase. This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and it provides you the end effector position and in Inverse Kinematics provide the end effector position (coordinate axes) and GUI will provide you the required angles to achieve that position. Cite As. 3.1Inverse Kinematics Test On the basis of previous development, it is possible to utilize MATLAB to perform kinematics analysis. Using the manipulator shown in Fig. 2 as the example. Suppose the desired position and orientation of end effector are (20 , 20) and φ = 0˚. 2022. 3. 21. · What is Matlab Code For Forward And Inverse Kinematics. Verify the forward kinematics of the PUMA 260 robot by comparing the results from Matlab simulation and the. Discussions (18) % Anthropomorphic arm with 6 DOF and spherical wrist. % It calculates the Inverse Kinematic of an Anthropomorphic arm with 6 DOF . % 'q' is the solutions in radiant and K is the direct Kinematic matrix. %. % K = [ n s a p; % 0 0 0 1] % where n, s, a are three vectors fo 3 elements that represents the. 3) Symbolic Math Toolbox. With the help of symbolic math tools, analytical solutions can be found for the inverse kinematics. An analytical solution is the explicit equation for the joint angles of the robot given end effector pose: joint_angles = f (end_effector_pose). Once the equation is found, the joint angles can be found very quickly. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy Resolution includes three methods, which are Jacobian-based (Damped Least Square and Weighted Pseudoinverse), Null Space, and Task Augmentation. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics. Figure 2: Illustration showing all possible theta1 and theta2 values. Now, for every combination of theta1 and theta2 values the x and y coordinates are deduced using forward kinematics formulae.. The following code snippet shows how data is generated for all combination of theta1 and theta2 values and saved into a matrix to be used as training data. The reason for saving the data in two. robotic arm using MATLAB tool is provided. The flow chart below explains the process starting with creating the robot, controlling the robot with input joint angles, forward kinematics and inverse kinematics functions used for the implementation. Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. Search: Inverse Kinematics Solver Matlab. Unlike forward kinematics, the solution is not strictly geometry, it demands a numerical methods solution Notice the text boxes in the dialog window are now filled with values The planning and inverse kinematics algorithms in this suite are designed for articulated robots like robotic arms and humanoids. Jul 10, 2019 · Forward Dynamics of Robot using Robotics Toolbox. Learn more about matlab, simulink, control, robotics toolbox, peter corke Simulink. \"/> cvxpy solver. difference between fair value gap and liquidity void; niantic wayfarer level 38; percy jackson fanfiction lemon. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy Resolution includes three methods, which are Jacobian-based (Damped Least Square and Weighted Pseudoinverse), Null Space, and Task Augmentation. For example, in the computation of your inverse kinematics function, you have Theme Copy r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. Search: Inverse Kinematics Solver Matlab. Unlike forward kinematics, the solution is not strictly geometry, it demands a numerical methods solution Notice the text boxes in the dialog window are now filled with values The planning and inverse kinematics algorithms in this suite are designed for articulated robots like robotic arms and humanoids. 2022. 9. 5. · The variables of the end-effector in a given Cartesian space are to be Inverse Kinematics is the opposite The Robotics Toolbox is a software package that allows a. Search for jobs related to Matlab code for forward and inverse kinematics or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. . Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes. Skip to content. ... 3dof arm robot denavithartenberg forward kinematics inverse kinematics mearm. Cancel. Acknowledgements. Inspired: 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI). This paper presents the inverse kinematics solution using the neural network for a robotic arm in 3-dimension. This paper creates neural networks to represent x, y and z position of the end-effector in the forward kinematics equations. The structure of the network has 4 layers; input layer, 2 hidden layers, and output layer. The input and output layers are defined as robotic arm angle and. the Inverse-Kinematics Problem of a {6R} Robot Manipulator}, journal = {The International Journal of Robotics Research}, year = {1986}, volume = {5}, number = {4}, pages = {69--88} } Maybe Corke's code is based on that. Anyway, my code is only for position and velocity, not dynamics. Forward and Inverse kinematics - File Exchange - MATLAB Central Forward and Inverse kinematics version 1.0.0 (2.11 KB) by hashim khan Forward and Inverse kinematics of 6 DOF arm with workspace calculation 5.0 (1) 843 Downloads Updated 26 Sep 2019 View License Follow Download Overview Functions Reviews (1) Discussions (2). Department, Mechatronics Lab. Forward and Inverse kinematics analysis are performed. Robotics Toolbox is also applied to model Denso robot system. A GUI is built for practical use of robotic system. 2. Robot Arm Kinematics The robot kinematics can be categorized into two main parts; forward and inverse kinematics. Forward. To write code to fit a linear and cubic polynomial for the Cp data.2. To plot the linear and cubic fit curves along with the raw data points.3. ... Aim - Write a program in Matlab showing the Forward Kinematics of a 2R Robotic Arm Description - 2R Robotic Arm- A robotic arm is a type of mechanical arm, usually programmable. The arm may be the. 2022. 8. 27. · Inverse Kinematics is the inverse function/algorithm of Forward Kinematics hashim khan (2021) Inverse kinematics Hi, I am trying to use solve forword and inverse kinematics for my robot arm For example, if our end effector is a full joint with orientation, e would contain 6 DOFs: 3 translations and 3 rotations For example, if our end effector is a full joint with. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only. About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features Press Copyright Contact us Creators. Free source code and tutorials for Software developers and Architects.; Updated: 14 May 2018. ... I am currently coding a Forward and Inverse Kinematics solver for a PUMA 560 robot. ... The matrix multiplications of my Python code are correct since I double checked them with Matlab. Any advice is appreciated. Posted 21-Feb-17 21:40pm. Yes, forward kinematics are easy. It defines a function which maps the robot configuration $$R_1 \\in SO(2), R_2 \\in SO(2)$$ to the end-effector position $$e \\in R^2$$. Normally, the forward kinematics is a closed-form function. 4. The Inverse Kinematics. The inverse kinematics asks a question: I want to move the end-effector to a target position. 2022. 9. 5. · The forward kinematics allow NAO developers to map any configuration of the robot from its own joint space to the three-dimensional physical space, whereas the inverse. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy. Inverse kinematics (IK) determines joint configurations of a robot model to achieve a desired end-effect position. Robot kinematic constraints are specified in the rigidBodyTree robot model. MATLAB Walid-khaled / 7DOF-KUKA-Linear-Axis-Forward-and-Inverse-Kinematics Star 4 Code Issues Pull requests In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. Forward kinematics refers to the use of the kinematic equations of a The pause commad which pauses the code and records accordingly MATLAB Assignment #1 focuses on the forward and inverse pose kinematics (FPK and IPK) of the human arm The forward kinematics allow NAO developers to map any configuration of the robot from its own joint space to. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... sevcon mos90 fault codes; kama sutra a position a; rpgbot sorcerer metamagic; circuitpython string functions; nextbot chase. The 6 - DOF articulated robotic arm was designed and visualized in RVIZ and, Moveit is being used as a control interface using Robot Operating System (ROS). The manipulation of the arm with end effector refrain us from using the joint by the joint control mechanism. Here's some quick MATLAB code for LU decomposition: function [L,U] = lucrout(A) [~,n] = size(A); L This method is quick because only back- and forward-substitution is required to solve for the In short, make sure you really need the matrix inverse and never use the matrix inverse to solve a. Are there. Read more..2022. 9. 5. · The variables of the end-effector in a given Cartesian space are to be Inverse Kinematics is the opposite The Robotics Toolbox is a software package that allows a. • Derive the forward kinematic equationsfor CRS robot arm following the Denavit- Hartenberg (DH) convention • Derive inverse kinematic equations for the CRS robot arm • Use the provided Code Composer Studio project to verify your solution NOTE: CRS robot arm has five motors/joints, in this class we are only using/controlling the first. For example, in the computation of your inverse kinematics function, you have Theme Copy r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. Special thanks for :Felix Pasila, S.T., M.Sc., Ph.D as lecturerHarsha for making the solidwork designReference:https://grabcad.com/library/6- dof -robotic-ma. 2022. 8. 27. · Inverse Kinematics is the inverse function/algorithm of Forward Kinematics hashim khan (2021) Inverse kinematics Hi, I am trying to use solve forword and inverse. FABRIK(Foward and Backward Reaching Inverse Kinematics). Robotic Arm turned into a 3D Printer (Inverse Kinematics) September 07, 2019 02:07PM. 0 arm. ... Jan 18, 2022 · matlab code for forward and inverse kinematics. I'll just write down the final equations here. Here is the blender file used. bsa mercury spares. Advertisement bench. 2022. 5. 22. · MATLAB is a powerful environment for linear algebra and graphical presentation that is available on a very wide range of computer platforms Forward and Inverse kinematics. This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and it provides you the end effector position and in Inverse Kinematics provide the end effector position (coordinate axes) and GUI will provide you the required angles to achieve that position. Cite As. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. Topics covered in this session are:Euler Lagrange formulation of n-DOF serial manipulatorGeneral Matlab codeExample: Inverse Dynamics of a 2-DOF manipulator. I am trying to compute dynamics of 3 DOF robot using Robotics Toolbox by executing this code: robot.accel(q, zeros(1,3), zeros(1,3)) But I am getting this error: Assignment has more non. For example, in the computation of your inverse kinematics function, you have r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. In the Fig 2 one can see relation between forward and inverse kinematics. In forward kinematics position matrices or end effector position are calculated by help of link length and joint angles, and in inverse kinematics joint angles are calculated with the help of link length and end effector position or position matrices. The kinematics and dynamics (both forward and inverse) of the biped robot \"PASIBOT,\" taking into account for support foot slippage are encoded in MATLAB ® code. The great advantage of creating a parametric MATLAB ® code following this methodology is that the algorithm can be modify to obtain the results in a parametric way or even. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... The goal of this project is to design a forward 6 DoF robotic arm and control it by Matlab. The controller is separated by two. Example #3. In this example, we will take another vector function and will compute its Jacobian Matrix using the Jacobian function. For this example, we will input following values: Pass the input vector function as [c^3 + b^2, 2*a^3 + c, c^2 + 5] Pass the variables as [a, b, c]. Please can you write a code for Forward and inverse kinematics for 5 DOF using matlab (robotics toolbox) Question: Please can you write a code for Forward and inverse kinematics for 5 DOF using matlab (robotics toolbox). The 6 - DOF articulated robotic arm was designed and visualized in RVIZ and, Moveit is being used as a control interface using Robot Operating System (ROS). The manipulation of the arm with end effector refrain us from using the joint by the joint control mechanism. 2022. 9. 3. · Forward and Inverse Kinematics – FK & IK For manipulators and humanoid robots, the toolbox includes algorithms for collision checking, trajectory generation, forward and. First, plug the joint angles you received from your inverse kinematics algorithm into your forward kinematics equations. Do they provide the same end effector coordinates that you entered into your inverse kinematics routine? If not, you have an error in either the forward or inverse equations. Matlab Code-Forward kinematic model. Inverse Kinematics is the opposite. The example defines the joint parameters and end-effector locations symbolically, calculates and visualizes the forward and inverse kinematics solutions, and finds the system Jacobian, which is useful for simulating the motion of the robot arm.. Answer (1 of 2): I think Peter Corke's ROBOTICS TOOLBOX for matlab can solve your problem, it has inbuilt functions for inverse and forward kinematics with support for easy plotting like plotting the robot model, plotting workspace etc Try that, toolbox is free. The movement of robot can be divided into forward and inverse kinematics. Forward kinematics described how robot's move according to entered angles. There is always a solution for forward kinematics of manipulator. Solution for inverse kinematics is a more difficult problem than forward kinematics. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. 2022. 1. 21. · About Kinematics Inverse Code Forward For Matlab And . FABRIK avoids the use of rotational angles or matri-ces, and instead finds each joint position via locating a point. Its kinematic parameters are described on this web page in terms of modified Denavit-Hartenberg parameters. Forward and inverse kinematics Using the Robotics Toolbox for MATLAB, and for a nominal position (0.4, 0, 0.6) m and with the tool pointing straight down, we can solve the inverse kinematics numerically and show that the solution is valid. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... Movement system used forward kinematics denavit hartenberg which each joint angle is updated by joint velocity found by inverse kinematics pseudoinverse jacobian. ... Robot Manipulator Control with Inverse Kinematics PD-Pseudoinverse. The robot kinematics can be divided into forward kinematics and inverse kinematics. Forward kinematics problem is straightforward and there is no complexity deriving the equations. Hence, there is always a forward kinematics solution of a manipulator. Inverse kinematics is a much more difficult problem than forward kinematics. 18 hours ago · Search: Inverse Kinematics Solver Matlab. Peter Corke's Robotics Toolbox for robot forward and inverse kinematics Alternatively (my preferred method, but also the only way if your Matlab release is older than R2015b [8 x = load('E:\\myFile1 The inverseKinematics System object™ creates an inverse kinematic (IK) solver to calculate joint configurations for a desired. Discussions (18) % Anthropomorphic arm with 6 DOF and spherical wrist. % It calculates the Inverse Kinematic of an Anthropomorphic arm with 6 DOF . % 'q' is the solutions in radiant and K is the direct Kinematic matrix. %. % K = [ n s a p; % 0 0 0 1] % where n, s, a are three vectors fo 3 elements that represents the. These functions are called by the MATLAB function blocks Planning and Control/Forward Kinematics and Planning and Control/Inverse Kinematics highlighted below. To speed up computation and help ensure the KinematicsSolver object for the inverse kinematics problem finds the desired solutions, the previous solution is used as the initial guess for. In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. The Redundancy Resolution includes three methods, which are Jacobian-based (Damped Least Square and Weighted Pseudoinverse), Null Space, and Task Augmentation. most recent commit 24 days ago. Figure 2: Illustration showing all possible theta1 and theta2 values. Now, for every combination of theta1 and theta2 values the x and y coordinates are deduced using forward kinematics formulae.. The following code snippet shows how data is generated for all combination of theta1 and theta2 values and saved into a matrix to be used as training data. The reason for saving the data in two. 2022. 9. 3. · Forward and Inverse Kinematics – FK & IK For manipulators and humanoid robots, the toolbox includes algorithms for collision checking, trajectory generation, forward and. Standard Particle Swarm Optimization code (Matlab M-file) for the optimization of the benchmark function. https://elkmany.github.io/pso/. 0.0. Particle Swarm Optimization : A Tutorial James Blondin September 4, 2009 1 Introduction Particle Swarm Optimization (PSO) is a technique used to explore the search space of a given problem to find the settings or parameters required to. This video includes an example for a robot manipulator to be simulated. Both Forward and Inverse Kinematics are calculated through a MATLAB GUIif you don't k. I am verifying the output of my forward kinematics through inverse kinematics and the results are not as desired. As the output of my inverse kinematics is not coming out to be the same as the input of forward kinematics. The D-H parameters of manipulator is given as: Link: alpha, a, theta, d. Link 1 : -90 0 theta1* d1. 2022. 7. 13. · Matlab code for Forward Kinematics of 2R robotic arm with animation The more frequent robot manipulation problem, however, is the opposite The following code can be used. 2022. 7. 13. · Matlab code for Forward Kinematics of 2R robotic arm with animation The more frequent robot manipulation problem, however, is the opposite The following code can be used. Inverse Kinematics (1) So using forward kinematics we can determine x, y and z, given the angles φ and θ. But forward kinematics is not enough. Generally with a robot, we know where we want the robot to be (x,y), and need to find the angles. This process is called inverse kinematics. This example shows how to use the KinematicsSolver object to perform forward kinematics (FK) and inverse kinematics (IK) on a five-bar robotic mechanism. First, the example demonstrates how to perform FK analyses to calculate a singularity-free workspace for a five-bar robot. ... You clicked a link that corresponds to this MATLAB command: Run. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes ... ( MATLAB GUI) of forward and inverse kinematics of multi dof robotic arm. ... Discussions (1) This document will help in better understanding of forward and inverse kinematics. For forward kinematics you are only required with angles and. May 01, 2018 · This project describe a mechanical system, design concept and prototype implementation of a 6 DOF robotic arm, which should perform industrial task such as pick and place of fragile objects operation.. IV. GUI DEVELOPMENT FOR 6 DOF ROBOT POSITION ANALYSIS In this chapter, a detailed discussion on the implementation, creation and the. In the Fig 2 one can see relation between forward and inverse kinematics. In forward kinematics position matrices or end effector position are calculated by help of link length and joint angles, and in inverse kinematics joint angles are calculated with the help of link length and end effector position or position matrices. MATLAB Walid-khaled / 7DOF-KUKA-Linear-Axis-Forward-and-Inverse-Kinematics Star 4 Code Issues Pull requests In this repository, the implementation of forward and inverse kinematics by redundancy resolution is presented for KUKA on linear axis 7-DOF robot. Download and share free MATLAB code, including functions, models, apps, support packages and toolboxes. Skip to content. ... 3dof arm robot denavithartenberg forward kinematics inverse kinematics mearm. Cancel. Acknowledgements. Inspired: 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI). Search for jobs related to Matlab code for forward and inverse kinematics or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab. This video includes an example for a robot manipulator to be simulated. Both Forward and Inverse Kinematics are calculated through a MATLAB GUIif you don't k. Inverse Kinematics Inverse kinematics (IK) algorithm design with MATLAB and Simulink Kinematics is the study of motion without considering the cause of the motion, such as forces and torques. Inverse kinematics is the use of kinematic equations to determine the motion of a robot to reach a desired position. The robot kinematics can be divided into forward kinematics and inverse kinematics. Forward kinematics problem is straightforward and there is no complexity deriving the equations. Hence, there is always a forward kinematics solution of a manipulator. Inverse kinematics is a much more difficult problem than forward kinematics. Inverse Kinematics Matlab Code Codes and Scripts Downloads Free. Verify your solution in MATLAB by using your forward kinematics code from HW# 3. Matlab code for Forward Kinematics of 2R robotic arm with animation. In document the solutions of both the forward and inverse kinematics problems for Adept Six 300 6R robot are presented. 2022. 9. 7. · with the forward''Topic matlab · GitHub May 7th, 2018 - More than 27 million people use GitHub to discover Gramm is a complete data visualization toolbox for Matlab Human Fall Detection from CCTV camera feed' 'matlab inverse kinematics robot arm circle youtube april 21st, 2018 - code http simsamo. 2022. 9. 4. · 3: Forward and Inverse Kinematics and the Denavit-Hartenberg Convention Clarification on spherical wrist DH frames Derivation The forward and inverse kinematics of a. For example, in the computation of your inverse kinematics function, you have r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. Please can you write a code for Forward and inverse kinematics for 5 DOF using matlab (robotics toolbox) Question: Please can you write a code for Forward and inverse kinematics for 5 DOF using matlab (robotics toolbox). This video includes an example for a robot manipulator to be simulated. Both Forward and Inverse Kinematics are calculated through a MATLAB GUIif you don't k. For example, in the computation of your inverse kinematics function, you have Theme Copy r = sqrt (ph1^2+ (ph3-d1)^2); There could be two solutions to the sqrt function. A positive and a negative value. And MATLAB returns the positive value. Similar thing is true for other functions like acos, where multiple angles can give the same result. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. 2022. 9. 5. · The Mathematics of Forward Kinematics; Part 3 (20 points) Find the forward kinematics and inverse kinematics solution for problem 3 The next step for the leg (pardon. 18 hours ago · and inverse kinematics of a 6-DOF robot arm presented in this paper Inverse Kinematics for a General Purpose Robot Arm That Moves in 3D Explanation of code for simulating FK for Universal robot 5 arm using the robotics toolbox in MATLAB If you are looking for C/C++ codes for simulating ( Universal Robot) UR5 Robot Manipulator, you can download. Since the forward kinematics formulae for the two-joint robotic arm are known, x and y coordinates of the tip of the arm are deduced for the entire range of angles of rotation of the two joints. The coordinates and the angles are saved to be used as training data to train an ANFIS (adaptive neuro-fuzzy inference system) network. Read more..This example shows how to use the KinematicsSolver object to perform forward kinematics (FK) and inverse kinematics (IK) on a five-bar robotic mechanism. First, the example demonstrates how to perform FK analyses to calculate a singularity-free workspace for a five-bar robot. ... You clicked a link that corresponds to this MATLAB command: Run. Robotics 1 U1 Kinematics S6 Inverse Kinematics P1 Inverse Kinematics. Matlab Code-Forward kinematic model. The complete Toolbox and documentation is freely available via anonymous ftp. In inverse-kinematics mode, the model only moves when the user clicks-and-drags on the object to adjust the joint angles. 3DOF 3 Dimension Inverse Kinematic-PseudoInvJacobian (GUI) Inverse Kinematics of 3DOF MeArm Matlab Model Simulation based on PseudoInverse Jacobian Method. The simulation hasn't set the operation range yet, so we can see when the arm try to reach the position out of the its limit. The Forward Kinematics is driven by Denavit-Hartenberg convention. A GUI was created in MATLAB for studying the forward and inverse kinematics of the robot. It gave results with precision of 0.2 cm. the load analysis also gave the maximum load it can withstand 200 KN without permanent deformation. The approach presented in this work can also be applicable to solve the kinematics problem of other similar. EduRev provides you with complete coverage and for 2022 Forward & inverse kinematics examples of 2R, 3R & 3P manipulators (2) as a part of our plan for syllabus to prepare for exam. Our subject experts have curated special courses, tests & mock test series. All previous year questions (PYQs) & topic wise tests like tests for Forward & inverse. The forward model is a fully connected neural network with four inputs, one hidden layer of 16 neuron and three output. The input to the model is the four cables' actuations, and the output is the position of the tip of the arm. The mean absolute error of the output is (3.0876, 3.4107, 3.2158) in cm with standard deviation (2.7049, 2.3013, 2.2238). While, to develop the kinematics that calculates the required joint angles (𝜃1− 𝜃6), both geometrical and analytical approaches are used to solve the inverse kinematic problem. After introducing the forward and inverse kinematic models, a MATLAB code is written to obtain the solutions of these models. The MATLAB code also implements a Graphical User Interface (GUI), from which the user can control the robotic arm and run the forward and inverse kinematics algorithms. A 3D simulation/visualization of the robotic arm is displayed in the GUI in real time. Forward kinematics for all link frames. Parameters. q (ndarray(n) or ndarray(m,n)) - The joint configuration of the robot (Optional, if not supplied will use the stored q values). old (bool, optional) - \"old\" behaviour, defaults to True. Returns. Forward kinematics as an SE(3) matrix. Return type. SE3 instance with n values. Search: Inverse Kinematics Solver Matlab. There are also several examples in python and matlab that show how to interface with openrave to use the plugins in CoMPS Create a rigid body tree model for your robot using the rigidBodyTree class The individual joints' trajectories, velocities and accelerations can be obtained using inverse kinematics equations Back in the day, I loved numerical. For robot manipulators it covers forward, inverse and differential kinematics, and dynamics. The Robotics Toolbox for MATLAB is free and open software that enables the reader to easily bring the algorithmic concepts into practice and work with real, non-trivial, problems.. This paper present kinematic and dynamic analysis of a 3-R robot arm with Adams/ Matlab Co-Simulation,. This video includes an example for a robot manipulator to be simulated. Both Forward and Inverse Kinematics are calculated through a MATLAB GUIif you don't k. 2022. 1. 29. · What is Matlab Code For Forward And Inverse Kinematics. Inverse kinematics denotes the computation of all joint angles out of the tool-centre-point's position and. Optimization Algorithms for Inverse Kinematics of Robots ... Once you've tested your IK solution, MATLAB and Simulink allow you to explore next steps towards building a complete robotic. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. Search for jobs related to Forward kinematics and inverse kinematics matlab or hire on the world's largest freelancing marketplace with 21m+ jobs. It's free to sign up and bid on jobs. 2022. 7. 16. · Inverse Kinematics Solver Matlab One important aspect however is that while OpenSim provides a useful general tool for biomechanical analysis including fields beyond. 18 hours ago · C# - Free source code and tutorials for Software developers and Architects The referenced robot is Adapt S350 SCARA, but only 2 degrees of freedom are used MATLAB is used by engineers and scientists in many fields, such as image processing, robotics, and computational finance MATLAB is a high-level language and interactive environment for. The Matlab program must be able to compute the T6 transform matrix and must incorporate the following: User data entry of each joint angle (in degrees) Joint angle limits Define each T transform and compute T6 transform in world coordinates Vector output in terms of world coodinates - to include position and orientation. I'm trying to write an inverse kinematics Matlab code for a 6 DOF robotic arm that has the following link parameters: Twist angle (alpha): [-90, 0, 90, -90, 90, 0] Link length (a): [0, 0.5, 0, 0, 0, 0] ... The goal of this project is to design a forward 6 DoF robotic arm and control it by Matlab. The controller is separated by two. Matlab code for Forward Kinematics of 2R robotic arm with animation. 2022. 1. 29. · What is Matlab Code For Forward And Inverse Kinematics. Inverse kinematics denotes the computation of all joint angles out of the tool-centre-point's position and. Free source code and tutorials for Software developers and Architects.; Updated: 14 May 2018. ... I am currently coding a Forward and Inverse Kinematics solver for a PUMA 560 robot. ... The matrix multiplications of my Python code are correct since I double checked them with Matlab. Any advice is appreciated. Posted 21-Feb-17 21:40pm. This example shows how to use the KinematicsSolver object to perform forward kinematics (FK) and inverse kinematics (IK) on a five-bar robotic mechanism. First, the example demonstrates how to perform FK analyses to calculate a singularity-free workspace for a five-bar robot. ... You clicked a link that corresponds to this MATLAB command: Run. 2022. 9. 3. · Forward and Inverse Kinematics – FK & IK For manipulators and humanoid robots, the toolbox includes algorithms for collision checking, trajectory generation, forward and. About Kinematics Inverse Code Forward For Matlab And . FABRIK avoids the use of rotational angles or matri-ces, and instead finds each joint position via locating a point on a line. These representational tools will be applied to compute the workspace, the forward and inverse kinematics, the forward and inverse instantaneous kinematics, and.. 2022. 9. 6. · Inverse kinematics 2 link arm python Your code should be general as regards number of input, output, and hidden units, and their connectivity, and also learning rate (alpha. Yes, forward kinematics are easy. It defines a function which maps the robot configuration $$R_1 \\in SO(2), R_2 \\in SO(2)$$ to the end-effector position $$e \\in R^2$$. Normally, the forward kinematics is a closed-form function. 4. The Inverse Kinematics. The inverse kinematics asks a question: I want to move the end-effector to a target position. Read more.. venom x22gt 250cc for salegreen bay police calls by addresshow much is a 30day supply of zolpidemsql server drop login if existshow to remove bios administrator password in hp laptop\n\n• Learn more about inverse kinematics, forward dynamics Robotics System Toolbox. Skip to content. ... I want to do forward dynamics but before that I got struck in inverse kinematics for 4 dof. My code is given below: preach = [0.2, 0.2, 0.3]; ... Find the treasures in MATLAB Central and discover how the community can help you! Start Hunting!\n• 2022. 8. 21. · Inverse Kinematics Matlab Code Codes and Scripts Downloads Free Forward kinematics problem is straightforward and there is no complexity deriving the equations For\n• robotic arm using MATLAB tool is provided. The flow chart below explains the process starting with creating the robot, controlling the robot with input joint angles, forward kinematics and inverse kinematics functions used for the implementation. Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE\n• 2022. 9. 7. · Link Creation MATLAB 2014B Initialization of PETER CORKE ROBOTIC TOOL BOX FEATURE Inverse Kinematics is the inverse - using the end-effector desired coordinates ," ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83718204,"math_prob":0.9405838,"size":126950,"snap":"2022-40-2023-06","text_gpt3_token_len":29460,"char_repetition_ratio":0.21060924,"word_repetition_ratio":0.8044226,"special_character_ratio":0.21317841,"punctuation_ratio":0.12833685,"nsfw_num_words":5,"has_unicode_error":false,"math_prob_llama3":0.9874499,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-28T03:54:09Z\",\"WARC-Record-ID\":\"<urn:uuid:b01583ea-f584-42ba-a5bf-5ed5152b3708>\",\"Content-Length\":\"165389\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a2bd0d49-ff1b-49b3-b26e-c41993c6a322>\",\"WARC-Concurrent-To\":\"<urn:uuid:ecfe56f6-be64-440f-8110-a22659f0d74a>\",\"WARC-IP-Address\":\"104.21.28.233\",\"WARC-Target-URI\":\"https://aip.seekingsugardaddy.de/matlab-code-for-forward-and-inverse-kinematics.html\",\"WARC-Payload-Digest\":\"sha1:T7TI3JNQ56O4GJM3LGBDO2WKRX47YQUK\",\"WARC-Block-Digest\":\"sha1:Q3AFMCE6ODZDHBMHDBYFJOKLIIC4I3YS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335059.43_warc_CC-MAIN-20220928020513-20220928050513-00722.warc.gz\"}"}
https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0182662
[ "Browse Subject Areas\n?\n\nClick through the PLOS taxonomy to find articles in your field.\n\n# Reply & Supply: Efficient crowdsourcing when workers do more than answer questions\n\n• Thomas C. McAndrew,\n\nRoles Formal analysis, Investigation, Methodology, Validation, Visualization, Writing – review & editing\n\nAffiliation Mathematics & Statistics, Vermont Complex Systems Center, University of Vermont, Burlington, Vermont, United States of America\n\n• Elizaveta A. Guseva,\n\nRoles Data curation, Investigation, Validation, Visualization\n\nAffiliation Mathematics & Statistics, Vermont Complex Systems Center, University of Vermont, Burlington, Vermont, United States of America\n\n• James P. Bagrow\n\nRoles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing\n\[email protected]\n\nAffiliation Mathematics & Statistics, Vermont Complex Systems Center, University of Vermont, Burlington, Vermont, United States of America\n\n# Reply & Supply: Efficient crowdsourcing when workers do more than answer questions\n\n• Thomas C. McAndrew,\n• Elizaveta A. Guseva,\n• James P. Bagrow", null, "x\n\n## Abstract\n\nCrowdsourcing works by distributing many small tasks to large numbers of workers, yet the true potential of crowdsourcing lies in workers doing more than performing simple tasks—they can apply their experience and creativity to provide new and unexpected information to the crowdsourcer. One such case is when workers not only answer a crowdsourcer’s questions but also contribute new questions for subsequent crowd analysis, leading to a growing set of questions. This growth creates an inherent bias for early questions since a question introduced earlier by a worker can be answered by more subsequent workers than a question introduced later. Here we study how to perform efficient crowdsourcing with such growing question sets. By modeling question sets as networks of interrelated questions, we introduce algorithms to help curtail the growth bias by efficiently distributing workers between exploring new questions and addressing current questions. Experiments and simulations demonstrate that these algorithms can efficiently explore an unbounded set of questions without losing confidence in crowd answers.\n\n## 1 Introduction\n\nCrowdsourcing has emerged as a powerful new paradigm for accomplishing work by using modern communications technology to direct large numbers of people who are available to complete tasks (workers) to others who need large amounts of work to be completed (crowdsourcers) . Crowdsourcing often focuses on tasks that are easy for humans to solve, but may be difficult for a computer. For example, parsing human written text can be a difficult task and optical character recognition systems may be unable to identify all scanned words . To address this, the reCAPTCHA system takes scanned images of text which were difficult for computers to recognize and hands them off to Internet workers for recognition. By having many people individually solve quick and easy tasks, reCAPTCHA is able over time to transcribe massive quantities of text. Crowdsourcing in general is especially important as a new vehicle for addressing problems of social good .\n\nDeciding on an optimal way to assign particular tasks to workers, and in what order, remains an active area of research. For many problems, multiple worker responses to a task must be aggregated to determine a final answer but often, a budget limits the total crowdsourcing resources available , either due to financial limits when workers are compensated or time constraints where the speed or size of the crowd limits the number of tasks to be performed or questions to be answered. Most previous work on optimal task assignment takes the form of a Markov Decision Process (MDP) [12, 16]. MDP provides a rigorous mathematical framework to test policies for allocating tasks to workers . Using MDP and other strategies, such as Thompson sampling , methods have been introduced to efficiently aggregate responses from workers, including consideration of which workers are most likely to be well suited for a given question based on their past performance on related questions .\n\nHowever, to the best of our knowledge, past research has been limited to the case where a fixed set of tasks need to be accomplished, and the response of a worker to a task is only ever to complete the assigned task. In contrast, consider a crowdsourcing problem where workers are able to do more than perform tasks—they may be allowed to propose new questions as well as answers to a given question. The truest expression of crowdsourcing must incorporate the intuition and experience of workers, who are potentially capable of providing the crowdsourcer with far more actionable information for many problem domains . While MDP made significant contributions to the design of question assignment algorithms, when the question set is growing due to the crowd, MDP does not naturally account for the hidden state transitions needed to represent newly contributed questions. The lack of research on algorithms accounting for growing question sets reveals a gap in our abilities to efficiently assign questions to workers.\n\nTo this end, we study a type of crowdsourcing problem we term Reply & Supply. As workers answer a given question (Reply), they are given the opportunity to propose a related question (Supply). Example applications of Reply & Supply include:\n\n• Exploring social networks (“Are Alice and Bob friends?” “Who else is friends with Alice?” “With Bob?”)\n• Product recommendations (“Have you bought a camera and laptop together?” “What else would someone buy when buying a camera?”)\n• Image classification (“Does this photo contain a horse and a mountain?” “What else does it contain?”)\n• Causal attribution (“Do you think ‘hot weather’ causes ‘violent crime’?” “What causes ‘violent crime’?”)\n• Health informatics: Crowdsourcing patient reports to find connections between co-occurring symptoms, new drug interactions, etc. (“Do you suffer from symptom X?” “What other symptoms do you have?” “Do you take drug Y?” “What other drugs do you take?”)\n\nIn all these examples, new questions can be built by combining crowd-suggested responses with the components of the original question, leading to the creation of a network structure of interrelated questions. To explore a social network, for example, if a worker responds that Alice and Bob are friends (Reply) and also proposes that Alice and Carol are friends (Supply), then a new question (“Are Alice and Carol friends?”) is formed that other workers can consider and that links to other questions related to Alice. Further, we will show that this network representation naturally generalizes to non-network question sets, and the methods we develop here are fully applicable to both question sets and question nets.\n\nQuestion networks can be studied with tools from network science that consider the statistical properties governing how theoretical and real-world networks grow and behave . One property, the scale-free or heavy-tailed degree distribution , where most nodes in the network have low degree but some very high-degree nodes do exist, holds in many real-world networks. How a scale-free network grows over time introduces biases (‘first-mover advantage’) that are also inherent in a growing crowdsourced experiment.\n\nIn brief, this manuscript makes the following contributions:\n\n1. The introduction of a growing network of linked questions with an accompanying theoretical analysis;\n2. The use of Thompson sampling to develop crowd-steering algorithms that enable efficient exploration of an evolving set of tasks or questions without losing confidence in answers;\n3. Simulations and real-world crowdsourcing experiments that validate the efficiency and, to some extent, the accuracy of the crowdsourcing performed under the crowd-steering algorithm.\n\nThe rest of this paper is organized as follows: Section 2 poses the generic crowdsourcing problem we focus on, analyzes a simple graphical model of how a growing question net is built by a crowd, and uses this model to motivate methods for efficiently assigning questions to workers as the question net grows. Section 3 describes experiments and evaluation metrics to test the proposed theory and methods with both simulated and real-world crowdsourcing tasks. Section 4 presents the results of these experiments and Sec. 5 concludes with a discussion of these results and future work.\n\n## 2 Methods\n\nHere we introduce a graphical model of a growing question network where questions consider the presence or absence of a relationship between two items (Sec. 2.1). We study the network’s properties under a null condition where the crowdsourcer assigns questions to workers randomly without use of a “steering” algorithm to provide guidance (Sec. 2.2). We then use these properties to develop a probability matching algorithm which provides said guidance to the crowdsourcer (Sec. 2.3).\n\n### 2.1 Crowdsourcing growing question networks\n\nWe model a growing set of questions (or tasks) as a graphs where nodes are items and edges or links represent questions relating pairs of items. A question network G = (V, E) is composed of a set of nodes V and a set of edges E, where |V| = N and |E| = M. Edge attributes record the answers given by workers, i.e., associated with each edge is a categorical variable storing the counts of worker responses. Those workers may also propose new questions (i.e., new combinations of new or existing items), leading to new nodes and edges. This network model also accommodates non-network question sets, for example by considering each question as a disjoint edge.\n\nAs an example of such a network, consider a synonym proposal task (SPT) where workers are asked if two words u and v are synonyms. The question is the link (u, v) between two items u and v representing those words. After replying to the question, the worker may also supply another word w which is a synonym for u, for v, or for both words. This grows the question network by introducing new questions linking items (u, w), or items (v, w), or both (u, w) and (v, w). The degree ki of item i counts the number of questions linking item i to other items.\n\nWe focus on cases, such as the SPT, where questions have binary answers, e.g, when workers are asked whether or not a link between two items should exist. Edge attributes on links capture the number of ‘yes’ and ‘no’ answers given by workers. However, this graph representation is flexible enough to allow edge attributes to contain any number of dimensions and there are no restrictions imposed on how workers propose questions. Moreover, this graphical model is capable of representing growing question sets without such relations, for example, a collection of N disjoint questions always containing the response items ‘True’ and ‘False’ only may be a two node, N multi-edge graph. While not a particularly meaningful representation, it demonstrates that the algorithms we develop are applicable to general crowdsourcing tasks without modification. Lastly, one can also extend this model to non-binary, multiple choice questions in several ways, including representing questions as hyperedges in a hypergraph.\n\n### 2.2 Null model\n\nWe propose a generative null model for a growing question network [39, 40]. Beginning from a network with one question, a crowdsourcer randomly chooses existing questions to send to workers also chosen at random. Those workers answer the questions and then with some probability also propose new questions. We study the properties of the network under these assumptions to motivate the development of a probability matching algorithm that can allow a crowdsourcer to efficiently explore the growing question network.\n\nThe network begins (at time t = 0) with two nodes and one undirected link connecting those nodes, representing a single question considering two items. Under the null model, every link (i, j) has an associated innovation rate ρij. The innovation rate for (i, j) defines the probability a random worker will introduce a new question into the network when presented with question (i, j). If she chooses to innovate, the new question may relate to either or both of the items i and j of the original question the worker was given.\n\nSpecifically, suppose a random worker is given question (u, v) relating items u and v. Under the null model:\n\n1. The worker answers question (u, v) with probability 1.\n2. The worker proposes a new item w to study with probability ρuv:\n1. w is linked to one of the items of the original question with probability γuv. A single new question, either (u, w) or (v, w) chosen uniformly at random, is introduced;\n2. otherwise, w links to both items of the original question with probability 1 − γuv. Two new questions, (u, w) and (v, w), are introduced.\n3. Repeat from (1) with another sampled question and worker until termination.\n\nThis model is tractable but quite basic and does not consider many potential details. For example, it assumes that while questions may have different innovation rates, workers do not. However, for sufficiently large numbers of workers, the average response is always going to be the primary concern, particularly in most crowdsourcing tasks which need to aggregate multiple worker responses to decide upon a final answer for a question. If it is necessary, a crowdsourcer interested in accounting for variation between workers can propose a statistical model for their features, and then use statistical inference to estimate these worker parameters during crowdsourcing (see also the Discussion).\n\nWe now prove several average properties of this null model. Studying the characteristics of the randomly growing, uncontrolled network informs policies that a crowdsourcer may use to manipulate the network (such as the algorithm we develop in Sec. 2.3). Many of these results are also informative for non-network growing question sets.\n\nThe first theorem describes question growth in the random uncontrolled network.\n\nTheorem 1 (Rate of question growth). The total number of links M(t) as a function of time t is, on average, M(t) = ηt + 1 where η = 〈ρ〉 (2 − 〈γ〉) is termed the exploration rate.\n\nProof. For the network to grow, a worker must suggest an additional question, which occurs with probability on average 〈ρ〉 (average of ρij). Once the worker commits to a suggestion, one question is added with probability on average 〈γ〉 or two questions are added with probability on average 1 − 〈γ〉. Combining these two possibilities, the total number of questions grows on average over one timestep according to", null, "with initial condition M(0) = 1 representing the single seed question of the network. Making a continuum approximation, this difference equation becomes M′(t) = 〈ρ〉(2 − 〈γ〉), which has solution", null, "(1) where the exploration rate η ≡ 〈ρ〉(2 − 〈γ〉) plays an important role in the overall network growth.\n\nThe number of links grows linearly with a rate η that combines the average rates 〈ρ〉 and 〈γ〉. Intuitively, the network grows faster if questions are more likely to be innovative (larger 〈ρ〉), and/or the worker is able to suggest a question for both items at the same time (smaller 〈γ〉).\n\nThe solution to the rate equation for question growth can be used to compute the mean number of worker answers per question:\n\nTheorem 2 (Mean answer density). The mean answer density (number of answers per question) 〈A〉 → 1/η as t → ∞.\n\nProof. The mean number of answers per question is", null, "(2) At every time step a question in the network accumulates a single answer from a worker. The denominator of Eq (2) is the solution Eq (1), and so the average density of answers per question is", null, "as t → ∞.\n\nThe mean answer density correlates with the overall uncertainty in the crowdsourcing since there is generally more certainty (but not necessarily correctness) in crowd responses when more workers on average have independently answered questions. Controlling the answer density, and therefore the certainty, now boils down to controlling the exploration rate η. The mean answer density’s dependence on η also encapsulates an ‘exploration-exploitation’ tradeoff: lower η leads to higher answer density, but at the cost of less exploration in the network; higher η increases the exploration but lowers answer density and makes more uncertainty in the network. In this null model, the crowdsourcer does not make choices that can exploit this, but tuning between these poles is a key component of the probability matching algorithm we introduce in Sec. 2.3.\n\nThe previous two theorems govern global properties of random question networks. We now turn to properties of individual items within the network to explain the unequal distribution of questions attached to items:\n\nTheorem 3 (Rich-get-richer mechanism). A node i entering the network at time ti will gain degree, on average, as", null, ", where", null, "is the Heaviside function.\n\nProof. An existing item i only gains a question when the crowdsourcer chooses a question attached to i and the worker answering that question proposes a new question involving i. A question (i, j) associated with item i is selected by the crowdsourcer with probability ki(t)/M(t), where ki(t) is the degree (number of questions) of i at time t. After the worker answers question (i, j) she must innovate (probability 〈ρ〉) with an item w that is not already a neighbor of i (and wi) and the new question must be (w, i) (probability 〈γ〉/2) or it must be two questions (w, i) and (w, j) (probability 1 − 〈γ〉). If the worker introduces question (w, j) only (probability 〈γ〉/2) then i does not gain a new question and so this possibility does not contribute to ki(t). Combining these possibilities together, ki(t) evolves on average according to", null, "(3) We approximate and simplify this difference equation as before:", null, "(4) where ki(ti) is the initial degree when item i was introduced at some time ti. Solving Eq (4) results in", null, "(5)\n\nWe see from this derivation that the rich-get-richer, preferential attachment mechanism is automatic when questions are chosen at random: an item i is more likely to appear in a sampled question the more questions it has, and therefore items with more questions are more likely to gain further questions than other items. Further, the degree of an item depends critically on two quantities. The first, the ratio of exploration rate η to 〈ρ〉, equally affects all items in the network. The second, the time of entry ti, dampens the growth of items that enter the network late and increases the growth of earlier items. This phenomena is often called the ‘first mover’s advantage’, and in the context of crowdsourcing a growing network, items entered earlier in the system accrue more questions than later items.\n\nUsing the local estimate of item degree to derive the global degree distribution of the network, we find:\n\nTheorem 4 (Degree Distribution). The degree distribution of the growing question network", null, "(6) as t → ∞.\n\nProof. Following , begin with the cumulative probability distribution of item i’s degree:", null, "(7) Meanwhile, the entry times ti of items into the network follow a distribution proportional to 〈ρ〉 uniformly through time:", null, "and, after normalizing, we discover the time of entry follows a uniform distribution. Referring back to Eq (7) and using the integral definition of a cumulative distribution,", null, "(8) Lastly, differentiating Eq (8) with respect to k gives the degree distribution:", null, "(9) as t → ∞.\n\nOur theoretical analysis is supported by simulations of growing question networks (Fig 1). We conducted 5,000 simulations and recorded the degree distribution P(k) and degree k of items across different values of exploration rate η and time of item entry ti. Fig 1(a) validates the slower rate of question accrual for late arriving items, and Fig 1(b) shows the degree distribution’s match to theory by the collapse of each curve over multiple values of η.\n\nFig 1. Agreement of theoretical predictions of network growth under the null model with simulations for several different choices of parameters.\n\nhttps://doi.org/10.1371/journal.pone.0182662.g001\n\n### 2.3 Probability matching algorithm for growing question sets and nets\n\nMost algorithms for steering workers towards questions choose questions by defining a metric that captures important characteristics in the system. For example, algorithms stressing accuracy often build metrics that reward higher numbers of answers for questions, achieving a p-value below a pre-defined threshold, or diminishing the variance of questions.\n\nThe framework of probability matching, specifically Thompson sampling (TS), is one of the most powerful ways to efficiently choose from a set of dynamic “options” when choices must be made with limited information. Unlike greedy algorithms, one of the strengths of TS is that its stochastic nature prevents choosing locally optimal questions only.\n\nTo Thompson sample from a set of options, one assumes a random variable X which follows a distribution φ(xθi(t)), where θi(t) is a set of parameters specific to i at time t. One draws an xi(t) for each option i and selects the option j with the smallest x (or largest x, depending on what x represents), j = arg mini xi (t). After option j is played (in our case, the worker’s answer is received), the parameters for option j are updated. Often x is a Bernoulli random variable and it is natural for φ to be the conjugate Beta distribution with parameters α, β which are updated depending on whether x = 0 or x = 1.\n\nFor specific problems, TS depends on an appropriate reward function. In the context of crowdsourcing, one generally cannot verify the accuracy of crowd answers, so the best choice is to reward certainty or consensus. If the crowd is consistent in their responses for a given question, then that implies the question is being answered as well as possible under current conditions. Thus, in contrast to the Bernoulli Bandit problems typically studied with TS, we do not want to reward ‘yes’ answers over ‘no’ answers only. Instead, we want to reward choices that lower the crowdsourcer’s measure of uncertainty for questions.\n\nA natural measure of uncertainty for a categorical random variable is the Shannon entropy. However, efficiency is also important to a crowdsourcer. A yes/no question that has 200 responses which are evenly split is very different than a question with 2 responses which is also evenly split, despite having the same entropy. Generally, the crowdsourcer would prefer to assign a worker to the latter question, as there is greater hope of lowering its uncertainty.\n\nThis argument guides us to choosing a metric involving both the total number of answers to a question and how evenly distributed those answers were over the categories of that question. We introduce a metric called link bias (d) that is sensitive to the uncertainty of a question, but unlike entropy, also accounts for the total number of answers. To begin, the multinomial distribution, with C − 1 parameters, naturally models the distribution of a categorical question’s total number of answers T across C possible answers, and the Dirichlet distribution, conjugate to the multinomial, can estimate the parameters of the multinomial. Since we expect no available prior information, a non-informative prior can be used. In the case of two categories, which we focus on, the Dirichlet distribution reduces to the Beta distribution (B(α, β)).\n\nTo define question uncertainty, we need a reference point. At a question’s peak uncertainty, workers have answered evenly among the question’s (C) categories causing an equal proportion of answers per category. In our binary case (C = 2), this corresponds to a proportion of 1/C = 1/2. The link bias d transforms the proportion of answers for question (i, j) to the distance from maximum uncertainty with d ≡ |2 − pij(1)|, where pij(1) is the fraction of ‘1’ or ‘yes’ or ‘true’ answers. When pijB(α, β), the probability density of d becomes", null, "(10) where for simplicity the dependence of α, β on (i, j) has been suppressed. Intuitively, a low link bias (d ≈ 0) occurs when the crowd is evenly split among possible answers, while a high link bias (at most d = 1/2) tells us the crowd converged on a single category.\n\nHowever, the link bias alone may not sufficiently steer the crowdsourcer to choose questions with a lower number of answers. If needed, we can combine a preference for sampling questions with few answers, with a preference for questions that are uncertain, by weighting Eq (10) by the current number of answers to define a new ‘weighted phi’ metric φN:", null, "(11) where Nij is the total number of answers to question (i, j) at the time of sampling.\n\nThompson sampling of questions via φ or via φN defines the two probability matching algorithms we propose. These algorithms handle growing networks of questions automatically and are fully applicable to problems without graphical relations between questions. We will conduct experiments on growing question networks testing the relative performance of both algorithms, and comparing them to other null or control baseline strategies, such as randomly choosing questions.\n\n## 3 Experiments\n\nWe conducted two experiments to test the theoretical analysis and the sampling methods. For the first experiment, we simulated crowdsourcing of a growing question network with a commonly used benchmarking dataset by superimposing two distinct network structures onto a previously conducted crowdsourcing task , where questions have been time-ordered to mimic a growing question network, and used this to test three different question sampling algorithms. For the second experiment, we conducted real-world crowdsourcing using the Mechanical Turk crowdsourcing platform .\n\n### 3.1 Experiment 1\n\nTo determine the effectiveness of choosing questions based on link bias, we first performed a five-armed experiment using the Recognizing Textual Entailment (RTE) dataset , a set of 8,000 binary answers (0 or 1) to 800 unique questions.\n\nFor simulating question growth, we superimposed graph structures onto the question set to link the 800 questions together. As mentioned in the introduction, many crowdsourcing problems naturally possess a network structure; here we imposed a structure on the RTE dataset only because it allows us to use the same benchmark dataset that many other researchers have studied. We built 5,000 Erdős-Rényi (ER) and Barabási-Albert (BA) networks . These two options represent two extremes of network structure, and were chosen to test question sampling algorithms over different classes of networks. Briefly, an ER network (specifically the G(n, m) formulation) starts with a set of N nodes and 0 links; a pre-specified number of links M are placed in the network choosing randomly without replacement from all possible", null, "pairs of nodes. In contrast, the BA network starts with 2 nodes joined by a single link, nodes are added one at a time until all N nodes are placed, and each new node attaches to m0 existing nodes in the network. New nodes attach to an existing node i with probability ki/∑nN kn, a mechanism that is often called preferential attachment.\n\nFor simulation purposes, each ER network realization must contain exactly 400 nodes, 800 links, and be connected. BA networks are connected by design; we still enforced the same number of nodes and links as the ER networks. Each simulated crowdsourcing was initialized with one question (a link in the network connecting two corresponding item) chosen at random from the underlying network. During the simulated crowdsourcing, workers answer a question with a 1 with probability equal to the proportion of 1’s observed in the original RTE dataset for that question, otherwise the worker answers 0. Next, and with probability 〈ρ〉, a new node (item) is introduced into the network by selecting randomly from the unseen neighbors of either i or j within that simulation’s graph. (This differs slightly from the analytic null model because there is no 〈γ〉. Instead, two links are formed automatically if the newly introduced item is linked to both i and j in the superimposed network.) If there are no new items to add corresponding to the selected question, this iteration is undone and the algorithm continues. All simulations were run with 〈ρ〉 = 0.20 for 6,000 time steps.\n\nSimulations were performed independently for each of five arms. The condition of each arm governs how questions are selected by the simulated crowdsourcer:\n\n1. Random: The first arm of the experiment had a condition where questions (links) were chosen randomly from the pool of already visited links.\n2. Looping: The second arm used a looping question sampling algorithm. The first link that entered the system is answered by a worker, then the second link in the system is given to a worker, then the third link and so on. When the algorithm reaches the most recent link within the system it starts again from the oldest link.\n3. Binomial sampling: This strategy selects questions (i, j) based on p-values for a two-sided binomial test that the proportion pij(1) is significantly different from 1/2. If the p-value of this exact test is small, then it is likely the crowd has already reach consensus on that question and it is not worthwhile to sample that question further. The sampled question was chosen randomly from the set of questions which have a p-value >0.2 and which have received fewer than 10 answers (at the time of sampling)\n4. Thompson sampling with φ: The fourth arm uses Thompson sampling to select links based on link bias (φ).\n5. Thompson sampling with φN: As in the fourth arm but links are Thompson sampled with φN instead of φ.\n\nThis experiment can demonstrate the strengths and weaknesses of selecting links based on these different sampling strategies, and, because it is synthetic, many trials can be conducted while avoiding the costs associated with a new crowdsourcing experiment. Results of Experiment 1 are presented in Sec. 4.\n\n### 3.2 Experiment 2: Synonym proposal task\n\nThis three-armed experiment created new question networks grown from a single seed question (link), and evaluated the φN-based Thompson sampling and Binomial sampling versus Random sampling. We paid US-based workers on Amazon’s Mechanical Turk crowdsourcing platform [2, 42] to participate in a synonym validation and proposal experiment. Synonymy proposal is a good test application for the question sampling algorithms we study because workers can easily understand the question and are capable of proposing new questions (by suggesting new synonyms). Of course, data on synonymy relations are available in lexical resources such as WordNet , which we used in this specific task for assessing the accuracy of proposed synonyms (see below), but our primary goal with this experiment is not crowdsourcing a new thesaurus but testing the different question sampling strategies.\n\nIn Experiment 2, each worker completes synonymy tasks at a compensation of \\$0.08 USD per task. Each synonymy task gives a pair of words to a worker and asks whether or not they are synonyms. After a worker answer either ‘yes’ or ‘no’, we allow the worker to suggest additional synonyms for each word of the given pair, or a single synonym associated with the combined word pair. A screenshot of the web form used for this task is shown in Fig 2.\n\nFig 2. Screenshots of the Mechanical Turk web interface for the synonymy proposal task (Experiment 2).\n\nAfter replying ‘yes’ or ‘no’ (a), the form expands for the worker to supply new potential synonym pairs (b).\n\nhttps://doi.org/10.1371/journal.pone.0182662.g002\n\nThree independent crowdsource networks were built, one for each arm. All three networks began with the same seed question (the word pair patriotic, person). All other word pairs were proposed by the crowd. The question sampling algorithms draw from all previous worker answers and suggested questions within their respective arms to deliver a question to the next queued worker. The first arm (Random sampling) chooses links using the same methodology as the random arm from Experiment 1, which also closely matches the null model we studied (Sec. 2.2). The second arm (Binomial sampling) selects links according to the Binomial sampling algorithm introduced in Experiment 1. Lastly, the third arm (Thompson sampling) selects links according to Thompson sampling of φN. Results for Experiment 2 are presented in Sec. 4.\n\n### 3.3 Evaluation metrics\n\nFor the first experiment, we measure five attributes across the simulated crowdsourcings to compare the different question sampling algorithms. At each time step t, for each simulated network we record network properties fnodes, the fraction of items, and fedges, the fraction of questions:", null, "(12) where V(t) is the set of items at time t, V(∞) is the set of all items at the end of the experiment, E(t) is the set of questions at time t, and E(∞) is the set of all questions at the end of the experiment.\n\nNext, we record the entropy S and link bias d, averaged over all currently visible questions, to quantify uncertainty in the network:", null, "(13) and", null, "(14) where pij(x) is the (Laplace-smoothed) fraction of binary answers of x for question (i, j) (at time t).\n\nThe final evaluation metric, mean answer density, measures how many answers are given per question in a particular network (see also Thm. 2):", null, "(15) where the Nij(x) represents the count of answer x for question (i, j) (at time t).\n\n#### Validating proposed synonyms.\n\nA factor that motivated us to choose the synonym proposal task as our crowdsourcing example is that synonym proposal can, in principle, be validated. Therefore, we will measure both crowd consensus (measured by 〈S〉 or 〈d〉) and, as best we can, if Experiment 2’s crowdsourcing algorithms lead to different quality rates of synonyms—are we trading off quality for efficiency?\n\nHowever, measuring synonymy from natural language text is challenging. In principle, all that is needed is a complete thesaurus, meaning a complete lookup table of all words and all their synonyms, perhaps with weights denoting the degree of relatedness between a word and its synonym and accounting for all possible contexts in which those words may appear. However, without such an exhaustive resource, it can be challenging to determine synonyms, especially when workers may introduce typos, may propose different forms (runs, running, ran) of the same root lemma (run), or they may propose a multi-word phrase (MWP) which may have a synonymous meaning but where such a meaning is difficult to determine computationally.\n\nGiven the challenges of measuring synonymy, we applied two measures to the synonym word pairs (u, v) proposed by workers during the crowdsourcing experiments:\n\n1. Shared WordNet lemmas The first measure starts by determining for each word w the set of all forms of all its synonym lemmas as encoded in WordNet :", null, "(16) where synsets(w) is the set of all synonym forms stored in WordNet (we merge sets across parts-of-speech and take synsets(w) = ∅ if w is not present in WordNet). We then say that the two words u and v are synonyms if they share at least one lemma, i.e. that |L(u) ∩ L(v)| > 0, otherwise they are not synonyms. This is a relatively strict test, and fails to account for many MWPs and natural language concerns such as misspellings, so we expect many (u, v) pairs that workers deem synonyms to be missed by this measure and therefore the actual proportion of synonymous word pairs may be much higher.\n2. Word vector similarity The second measure we employ is based on the meanings encoded by the “word2vec” word embedding algorithm . Word2vec uses a neural network model to learn low-dimensional vector representations of words based on their contextual co-occurrence patterns over a very large text corpus. Supported by the distributional hypothesis , the contexts encoded in these vectors are then considered to capture to some extent the meanings and relationships of these words such as, for example, analogous relationships (Berlin is to Germany as Paris is to France). Given a pre-trained set of 300-dimensional vectors trained on a 100B word corpus taken from Google News, we define the similarity between two words (or MWPs, if the MWPs are present in the vector data) u and v as their cosine similarity:", null, "(17) where w represents the associated word vector for word or MWP w. If either u or v is not present in the word2vec vector data, we exclude that pair from our analysis (this occurred in Experiment 2 for approximately 17.9% of crowd-proposed word pairs for the Random sampling experiment, 19.8% for Binomial sampling, and 10.9% for Thompson sampling).\n\n## 4 Results\n\n### Experiment 1\n\nFig 3 displays the five evaluation metrics associated with Experiment 1, averaged over the 5,000 ER and BA networks. (For simulated Binomial sampling only, note that we required questions to have fewer than 30 answers at the time of sampling, not 10 as discussed previously, to provide more simulation statistics.) The Binomial sampling and φN Weighted Thompson sampling algorithms outperformed all others in exploration metrics across ER and BA networks. Both methods explored more of the network, and faster, than other methods, as evidenced by 〈fedges〉 and 〈fnodes〉. Weighted Thompson sampling performed best at minimizing the uncertainty of answers, as measured by lower entropy 〈S〉 and higher link bias 〈d〉. In contrast, Binomial and Thompson sampling φ were inconsistent for these two metrics. Lastly, Binomial and φN Weighted Thompson sampling also required fewer answers than other algorithms (lower 〈A〉).\n\nFig 3. Experiment 1’s evaluation metrics for five different question sampling algorithms.\n\nhttps://doi.org/10.1371/journal.pone.0182662.g003\n\nBinomial sampling slightly outperformed φN Weighted Thompson sampling in many metrics. However, Binomial sampling has a distinct drawback: the thresholds used to sample questions may lead to a situation where no questions meet its sampling criteria. This is visible in the simulation curves, which are quite noisy due to individual simulations which terminated too early. Of course, this can be fixed by any of several means, such as falling back to random sampling when no questions meet the criteria, or tuning the cutoffs used in Binomial sampling. But Thompson sampling avoids these complexities entirely.\n\nThe overall performance of Binomial sampling and φN-based Thompson sampling in simulated crowdsourcing nominates them as candidate algorithms for Experiment 2’s real crowdsourcing.\n\n### Experiment 2\n\nFig 4 shows the constructed networks for each arm of the Synonym Proposal Task (the task is described in Fig 2). Qualitatively, all three networks appeared similar. Quantitatively, (Table 1) both Binomial and Thompson sampling were able to explore more of the network (discovering more items and questions) than Random sampling with more efficiency (lower mean number of answers 〈A〉). The explored networks appeared similar by a number of network metrics, although the network generated via Binomial sampling has a lower average degree and higher average shortest path length. Lastly, Binomial and Thompson sampling were comparable to Random sampling in crowd consensus on individual answers, having similar levels of entropy and link bias. Both of these statistics measured how skewed the worker answers were in favor of ‘yes, they are synonyms’ or ‘no, they are not synonyms’.\n\nFig 4. Comparison of question networks for the synonymy proposal task under random sampling, binomial sampling, and φN Thompson sampling.\n\nhttps://doi.org/10.1371/journal.pone.0182662.g004\n\nTable 1. Summary statistics for the three arms of Experiment 2.\n\nBoth Binomial and Thompson sampling are more efficient than Random sampling (lower 〈A〉) without losing the crowd’s average consensus on answers, measured by 〈S〉 and 〈d〉.\n\nhttps://doi.org/10.1371/journal.pone.0182662.t001\n\nTaken together, both Binomial and Thompson sampling maintained a comparable level of certainty (measured by consensus or consistency in worker responses) in the network with fewer answers needed on average than Random sampling.\n\nTo further understand the answer density of the different sampling methods, we computed the distribution of the number of answers Nij to question (i, j) in Fig 5. Here Random sampling clearly separated from the other two sampling strategies, and Random sampling ended with more questions with more answers than the other sampling strategies. We also note that all three arms finished with many questions with few answers: approximately 50% of questions at the end of the experiment had a single answer. We discuss this further in Sec. 5.\n\nFig 5. The distributions of the total number of answers per question at the end of crowdsourcing, for each arm of Experiment 2.\n\nThe efficiency of Binomial and Thompson sampling compared with Random sampling is clear. In all arms, approximately 50% of proposed questions are answered only once.\n\nhttps://doi.org/10.1371/journal.pone.0182662.g005\n\nNext, we examined the synonym “quality” of the SPTs, using the synonymy measures introduced in Sec. 3.3. We limited these calculations to proposed word pairs examined by at least three crowd workers to ensure sufficient answers from the crowd. Fig 6(a) shows the proportion of word pairs that share at least one WordNet lemma: Both Binomial and Thompson sampling have slightly higher proportions than Random sampling, at over 12% compared with approximately 11%. This indicates that quality was not lost when using a more efficient sampling strategy. Of course, 11–12% of word pairs sharing a lemma seems low, but recall that shared lemmas is a very strict measure that is likely to miss many synonymous word pairs and so we do not conclude that the majority of the crowd answers are “wrong.” Furthermore, to better understand the shared lemma proportion, we constructed a randomized control by shuffling the word pairs (preserving the total frequencies of individual words) and re-measured the proportion of shared lemmas. We found a significant drop in the proportion to approximately 1% (the error bars on these proportions are shown in Fig 6(a) but are quite small).\n\nFig 6. Measures of synonymy for Experiment 2’s crowdsourced word pairs.\n\nSynonymy for proposed word pairs was estimated using (a) shared WordNet lemmas, (b) cosine similarity between word2vec word embedding vectors (see Sec. 3.3). Approximately 11–12% of crowdsourced word pairs share one or more WordNet lemmas (a strict measure of synonymy), and Binomial and Thompson sampling achieved slightly higher rates than Random sampling. As a control, the word pairs proposed by the crowd were randomized, and the proportion of word pairs with shared lemmas dropped significantly. Meanwhile, regardless of sampling algorithm, the word pairs proposed by the crowd also had significantly higher word vector similarity when at least one member of the crowd agreed that the pair were synonymous (nij(1) > 0), as opposed to no members agreeing the pair were synonymous (nij(1) = 0). This further underscores the estimated quality of the proposed questions and answers and that Binomial and Thompson sampling methods do not appear to trade off quality for efficiency. (To avoid ambiguous answers, we considered word pairs that received at least three answers from workers in these calculations, and panel (a) considers those word pairs with nij(1) > 0.)\n\nhttps://doi.org/10.1371/journal.pone.0182662.g006\n\nLikewise, Fig 6(b) shows word vector similarities for the three sampling methods, decomposed into word pairs where at least one worker agreed they were synonyms versus no workers agreeing they were synonyms. The crowd-proposed word pairs flagged as synonyms had similarities significantly higher than those not flagged as synonyms. There is a small drop in vector similarity for Binomial and Thompson sampling compared with Random sampling, likely balancing out the small increase in WordNet shared lemma proportion shown in Fig 6(a). We conclude that overall there is no loss in quality, at least as indicated by these measures, when using more efficient sampling algorithms.\n\nTaken together, while we only have one crowdsourcing realization for each arm, it is reasonable to conclude from Experiment 2 that both Binomial sampling and Thompson sampling achieved much higher rates of exploration (more items) and greater efficiency (fewer answers per question) than Random sampling without losing confidence or accuracy in question responses.\n\n## 5 Discussion\n\nWe studied the problem of efficient assignment of crowdsourcing tasks to workers when those workers are also able to propose tasks themselves. Using workers to contribute new tasks and not merely perform predetermined tasks helps unlock the true potential of crowdsourcing. We formulated a growing question network model for this problem, prove theoretical properties of this system, and developed and validated sampling algorithms that can guide workers to grow the network efficiently, while only sacrificing at most minimal confidence in their responses.\n\nModeling the evolution of the uncontrolled question network teaches us how to better design crowdsourcing policies. For example, by monitoring the innovation rate (ρ) and exploration rate (η) of the growing question network, a crowdsourcer may be able to better and more efficiently control the question network as it grows. At the same time, the rich-get-richer growth of items (older items are attached to a larger fraction of questions), implies that crowdsourcers should pay special attention to the newest items entering the network, to balance out the inherent bias in favor of older items.\n\nThompson sampling is fast, easy to implement, and flexible enough to capture the preferences of different crowdsourcers, but it is only one potential policy for question selection. More rigorous question selection techniques can be implemented which may outperform the proposed techniques, but with potentially more restrictions. The Thompson sampling algorithms proposed here work for both question nets but also non-network question sets, and can naturally accommodate both growing and static questions sets and nets. Further, statistical inference of question parameters and worker features , based on extensions of the null model analyzed in Sec. 2.3, can be used by the crowdsourcer to better pair workers with questions.\n\nThere remains considerable room for improvement. For example, in Fig 5, approximately 50% of questions in Experiment 2 received a single answer, regardless of arm. This means that even with the current algorithms the crowd is still supplying an inordinate amount of questions that are being left mostly unconsidered. Of course, some of this may be unavoidable; if there is too much Supply, then the crowd will invariably fall behind. This is further compounded by the inherent bias in favor of older questions. Thompson and Binomial sampling helped curtail this “first-mover-advantage” bias in the growing network but did not necessarily eliminate it. This is the fundamental challenge (and appeal) of this crowdsourcing problem, and more work focused on these issues is needed.\n\nIn the future, we will address more detailed schemes for question selection. Questions that contain more than a binary (true/false) response should be further investigated, although the only adaptation of the Thompson sampling algorithm is in the choice of metric to Thompson sample from. Different network structures may arise for different crowdsourcing problems, and assessing the accuracy of the network inferred by the crowdsourcing, and not necessarily the accuracy of individual links, will also be investigated. These and many other interesting and important questions remain in the new problem of crowdsourcing with growing question nets and sets.\n\n## Acknowledgments\n\nWe thank M. Wagy and J. Bongard for useful comments and gratefully acknowledge the resources provided by the Vermont Advanced Computing Core. This material is based upon work supported by the National Science Foundation under Grant No. IIS-1447634.\n\n## References\n\n1. 1. Howe J. The rise of crowdsourcing. Wired magazine. 2006;14(6):1–4.\n2. 2. Kittur A, Chi EH, Suh B. Crowdsourcing user studies with Mechanical Turk. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM; 2008. p. 453–456.\n3. 3. Brabham DC. Crowdsourcing as a model for problem solving an introduction and cases. Convergence: the international journal of research into new media technologies. 2008;14(1):75–90.\n4. 4. Kamar E, Hacker S, Horvitz E. Combining human and machine intelligence in large-scale crowdsourcing. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems; 2012. p. 467–474.\n5. 5. MacLean DL, Heer J. Identifying medical terms in patient-authored text: a crowdsourcing-based approach. Journal of the American Medical Informatics Association. 2013;20(6):1120–1127. pmid:23645553\n6. 6. Holley R. Crowdsourcing: how and why should libraries do it? D-Lib Magazine. 2010;16(3):4.\n7. 7. Karnin ED, Walach E, Drory T. Crowdsourcing in the document processing practice. Springer; 2010.\n8. 8. Von Ahn L, Maurer B, McMillen C, Abraham D, Blum M. reCAPTCHA: Human-based character recognition via web security measures. Science. 2008;321(5895):1465–1468. pmid:18703711\n9. 9. Pickard G, Pan W, Rahwan I, Cebrian M, Crane R, Madan A, et al. Time-critical social mobilization. Science. 2011;334(6055):509–512. pmid:22034432\n10. 10. Tang JC, Cebrian M, Giacobe NA, Kim HW, Kim T, Wickert DB. Reflecting on the DARPA red balloon challenge. Communications of the ACM. 2011;54(4):78–85.\n11. 11. Naroditskiy V, Rahwan I, Cebrian M, Jennings NR. Verification in Referral-Based Crowdsourcing. PLOS ONE. 2012;7(10):1–7.\n12. 12. Li Q, Ma F, Gao J, Su L, Quinn CJ. Crowdsourcing High Quality Labels with a Tight Budget. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. ACM; 2016. p. 237–246.\n13. 13. Karger DR, Oh S, Shah D. Budget-optimal task allocation for reliable crowdsourcing systems. Operations Research. 2014;62(1):1–24.\n14. 14. Tran-Thanh L, Venanzi M, Rogers A, Jennings NR. Efficient budget allocation with accuracy guarantees for crowdsourcing classification tasks. In: Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multiagent Systems; 2013. p. 901–908.\n15. 15. Tran-Thanh L, Stein S, Rogers A, Jennings NR. Efficient crowdsourcing of unknown experts using multi-armed bandits. In: European Conference on Artificial Intelligence; 2012. p. 768–773.\n16. 16. Ipeirotis PG, Gabrilovich E. Quizz: targeted crowdsourcing with a billion (potential) users. In: Proceedings of the 23rd international conference on World wide web. ACM; 2014. p. 143–154.\n17. 17. Puterman ML. Markov decision processes: discrete stochastic dynamic programming. John Wiley & Sons; 2014.\n18. 18. Chapelle O, Li L. An empirical evaluation of Thompson sampling. In: Advances in neural information processing systems; 2011. p. 2249–2257.\n19. 19. Donmez P, Carbonell JG, Schneider J. Efficiently learning the accuracy of labeling sources for selective sampling. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM; 2009. p. 259–268.\n20. 20. Hung NQV, Tam NT, Tran LN, Aberer K. An evaluation of aggregation techniques in crowdsourcing. In: Web Information Systems Engineering—WISE 2013. Springer; 2013. p. 1–15.\n21. 21. Khattak FK, Salleb-Aouissi A. Quality control of crowd labeling through expert evaluation. In: Proceedings of the NIPS 2nd Workshop on Computational Social Science and the Wisdom of Crowds; 2011.\n22. 22. Kazai G, Kamps J, Milic-Frayling N. Worker types and personality traits in crowdsourcing relevance labels. In: Proceedings of the 20th ACM international conference on Information and knowledge management. ACM; 2011. p. 1941–1944.\n23. 23. Whitehill J, Wu Tf, Bergsma J, Movellan JR, Ruvolo PL. Whose vote should count more: Optimal integration of labels from labelers of unknown expertise. In: Advances in neural information processing systems; 2009. p. 2035–2043.\n24. 24. Ross J, Irani L, Silberman M, Zaldivar A, Tomlinson B. Who are the crowdworkers?: shifting demographics in Mechanical Turk. In: CHI’10 extended abstracts on Human factors in computing systems. ACM; 2010. p. 2863–2872.\n25. 25. Ipeirotis PG, Provost F, Wang J. Quality management on Amazon Mechanical Turk. In: Proceedings of the ACM SIGKDD workshop on human computation. ACM; 2010. p. 64–67.\n26. 26. Rajan V, Bhattacharya S, Celis LE, Chander D, Dasgupta K, Karanam S. Crowdcontrol: An online learning approach for optimal task scheduling in a dynamic crowd platform. In: Proceedings of ICML Workshop: Machine Learning Meets Crowdsourcing; 2013.\n27. 27. Abraham I, Alonso O, Kandylas V, Slivkins A. Adaptive Crowdsourcing Algorithms for the Bandit Survey Problem. In: COLT; 2013. p. 882–910.\n28. 28. Bongard JC, Hines PD, Conger D, Hurd P, Lu Z. Crowdsourcing predictors of behavioral outcomes. IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2013;43(1):176–185.\n29. 29. Bevelander KE, Kaipainen K, Swain R, Dohle S, Bongard JC, Hines PD, et al. Crowdsourcing novel childhood predictors of adult obesity. PloS one. 2014;9(2):e87756. pmid:24505310\n30. 30. Salganik MJ, Levy KEC. Wiki Surveys: Open and Quantifiable Social Data Collection. PLOS ONE. 2015;10(5):1–17.\n31. 31. Erdős P, Rényi A. On the strength of connectedness of a random graph. Acta Mathematica Hungarica. 1961;12(1–2):261–267.\n32. 32. Erdős P, Rényi A. On random graphs I. Publ Math Debrecen. 1959;6:290–297.\n33. 33. Barabási AL, Albert R. Emergence of scaling in random networks. Science. 1999;286(5439):509–512. pmid:10521342\n34. 34. Albert R, Barabási AL. Statistical mechanics of complex networks. Reviews of modern physics. 2002;74(1):47.\n35. 35. Watts DJ, Strogatz SH. Collective dynamics of ‘small-world’ networks. Nature. 1998;393(6684):440–442. pmid:9623998\n36. 36. Strogatz SH. Exploring complex networks. Nature. 2001;410(6825):268–276. pmid:11258382\n37. 37. Newman MEJ. The structure and function of complex networks. SIAM review. 2003;45(2):167–256.\n38. 38. Newman MEJ, Girvan M. Finding and evaluating community structure in networks. Physical review E. 2004;69(2):026113.\n39. 39. Barabási AL, Albert R, Jeong H. Mean-field theory for scale-free random networks. Physica A: Statistical Mechanics and its Applications. 1999;272(1):173–187.\n40. 40. Bagrow JP, Sun J, ben-Avraham D. Phase transition in the rich-get-richer mechanism due to finite-size effects. Journal of Physics A: Mathematical and Theoretical. 2008;41(18):185001.\n41. 41. Newman MEJ. Networks: an introduction. Oxford university press; 2010.\n42. 42. Buhrmester M, Kwang T, Gosling SD. Amazon’s Mechanical Turk a new source of inexpensive, yet high-quality, data? Perspectives on psychological science. 2011;6(1):3–5. pmid:26162106\n43. 43. Miller GA. WordNet: a lexical database for English. Communications of the ACM. 1995;38(11):39–41.\n44. 44. Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J. Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems; 2013. p. 3111–3119.\n45. 45. Harris ZS. Distributional structure. Word. 1954;10(2–3):146–162." ]
[ null, "https://journals.plos.org/plosone/resource/img/logo-plos.png", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null, "https://journals.plos.org/plosone/article/file", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9174483,"math_prob":0.7960792,"size":54345,"snap":"2020-24-2020-29","text_gpt3_token_len":11893,"char_repetition_ratio":0.16659613,"word_repetition_ratio":0.012935556,"special_character_ratio":0.21698408,"punctuation_ratio":0.12449,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.95513004,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-29T20:52:46Z\",\"WARC-Record-ID\":\"<urn:uuid:9581ee39-7cb2-4dd5-84c0-2d4a3c629e84>\",\"Content-Length\":\"182079\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:79468b38-3bdd-422e-86c4-5fd05477658a>\",\"WARC-Concurrent-To\":\"<urn:uuid:42a8791c-ed7d-450e-8a51-92b9b22107a9>\",\"WARC-IP-Address\":\"216.74.38.76\",\"WARC-Target-URI\":\"https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0182662\",\"WARC-Payload-Digest\":\"sha1:7ZUI2BZU67G7NWV7DHB7B37XHITPSOPB\",\"WARC-Block-Digest\":\"sha1:NKN2WMRDWL32W5X5JADXOK47PDXPY5ZC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347406365.40_warc_CC-MAIN-20200529183529-20200529213529-00371.warc.gz\"}"}
https://quantumcomputing.stackexchange.com/questions/9611/what-does-a-choi-state-where-we-relax-the-partial-trace-condition-represent
[ "# What does a \"Choi state\" where we relax the partial trace condition represent?\n\nConsider Hilbert spaces $$\\mathcal{X}, \\mathcal{Y}$$. For any quantum channel $$\\mathcal{E}_{\\mathcal{X}\\rightarrow \\mathcal{Y}}$$, the bipartite Choi state $$J(\\mathcal{E}) \\in L(\\mathcal{Y}\\otimes\\mathcal{X})$$ is given by\n\n$$J(\\mathcal{E}) = (\\mathcal{E}\\otimes I)\\sum_{a,b} \\vert a\\rangle\\langle b\\vert\\otimes\\vert a\\rangle\\langle b\\vert$$\n\nIt is also possible to show (see here for example) that the trace preserving condition of the map $$\\mathcal{E}$$ is equivalent to the following condition on its Choi state\n\n$$\\text{Tr}_\\mathcal{Y}J(\\mathcal{E}) = I_\\mathcal{X} \\tag{1}$$\n\nThe proof is easy - it relies on noticing that the trace preserving condition implies that $$\\mathcal{E}(\\vert a\\rangle\\langle b\\vert) = \\delta_{a,b}$$ due to the trace preserving condition. Meanwhile, positive-semidefiniteness of $$J(\\mathcal{E})$$ corresponds to complete positivity of $$\\mathcal{E}$$.\n\nIf $$J(\\mathcal{E})$$ is a density matrix but does not fulfill (1) is it still related to physical quantum channels (i.e. completely positive and trace preserving maps) in some way? Specifically, since completely positive maps correspond to positive semidefinite Choi matrices, does imposing that $$\\text{Tr}(J(\\mathcal{E})) = 1$$ (in addition to positive semidefiniteness) give us any condition on the map $$\\mathcal{E}$$?\n\nIt is exactly what you say: A \"Choi state\" which is only positive semi-definite corresponds to a completely positive map which is not necessarily trace preserving. Fixing the trace of the Choi state rescales the \"success probability\" when implementing the CP map via the isomorphism - if you wish, it rescales the trace of all output states $$\\mathcal E(\\rho)$$ by a constant factor. (Note that deviating from the local trace condition $$\\mathrm{tr}_Y J = I$$, but keeping the total trace $$\\mathrm{tr} J =1$$, implies that there will be inputs with outputs with trace larger than one.)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7167391,"math_prob":0.9998328,"size":1288,"snap":"2021-43-2021-49","text_gpt3_token_len":377,"char_repetition_ratio":0.19080997,"word_repetition_ratio":0.012903226,"special_character_ratio":0.26086956,"punctuation_ratio":0.06140351,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99999213,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-17T03:35:13Z\",\"WARC-Record-ID\":\"<urn:uuid:7863d53c-e87e-4680-b6ef-92211670c03d>\",\"Content-Length\":\"167169\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4902771d-6435-40b7-9e44-ac1e0329ef44>\",\"WARC-Concurrent-To\":\"<urn:uuid:d8672af2-6ad0-403c-a317-db9df55752f7>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://quantumcomputing.stackexchange.com/questions/9611/what-does-a-choi-state-where-we-relax-the-partial-trace-condition-represent\",\"WARC-Payload-Digest\":\"sha1:YKGJH4TQ2AU7UCDD663YU32RPBQ5S2VH\",\"WARC-Block-Digest\":\"sha1:XV2VNYZU4MBTCF5UG22EWPSQTVJN6HKZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585120.89_warc_CC-MAIN-20211017021554-20211017051554-00137.warc.gz\"}"}
https://matheducators.stackexchange.com/questions/7594/logarithm-tables-how-were-the-values-reached
[ "# Logarithm Tables - How were the values reached?\n\nI'm teaching an Algebra II/Trigonometry class that is currently working on logarithms as the inverse function of exponential functions. Now, to keep their interest I had them struggle for a few minutes with $2^x = 10$ and trying to solve it. Trying to find the answer to that question is the driving force behind our activities with logarithms (thankfully my students really want an answer to that question, so they're willing to learn whatever I have for them so long as they can get closer to answering the question posed originally.\n\nSome of them have noticed that there is a \"log\" function on their calculator, which I acknowledged, but I also warned them that right now if they plugged 10 into their calculator they wouldn't get the correct answer.\n\nI want to show them tomorrow as a quick history lesson before some presentations that before we had calculators that could calculate logarithms, there were tables of logarithms that people kept in books.\n\nI know that they're going to ask, and as of right now my searches haven't yielded an answer:\n\nHow were the values in the old logarithm tables found? I've found a lot of information on how people used logarithm tables, but very little information on how those values were calculated. Can anyone help me here?\n\n• As far as $2^x = 10$ goes, It can be solve using my method discussed in the question Method of Solving 5x=326 (Logs not allowed). Mar 12, 2015 at 2:22\n• Well from that link I've got a tentative answer, but if someone is able to give me more information I'd definitely love to hear it. Mar 12, 2015 at 2:29\n• And the calculus method was using the approximation of roots for equations like $2^x = 100$ being rearranged to $2^x - 100 = 0$ by the Newton Method and linear approximation? Mar 12, 2015 at 2:55\n\nI did this with my students a while ago. First I got them to construct their own slide rules using Briggs estimation technique. Then a slightly more accurate table translating between base 10 logs, decibels, base 2 logs, and musical notes ($$semitone^{12}=2$$).\n\nAfter that we studied Briggs' methods to improve the estimates and create accurate logs.\n\nMy source material for Napier is http://profmarino.it/Nepero/napier1619construction.pdf\n\nMy source material for Briggs is a translation of Chapter 7 of his Arithmetica Logrithmica http://www.17centurymaths.com/contents/albriggs.html I have since found a more easily understood document explaining his techniques https://hal.inria.fr/inria-00543939/document\n\n# Napier\n\nIf I remember correctly, Napier's method was really weird. He started with a big number and basically multiplied by something like 0.999999 to get lower numbers. He did an insane number of calculations at up to 32 bit precision, so he only got parts of his table finished.\n\nSomething to note, logs are about ratios, not numbers, so the base number of a log table is arbitrary. We set the base of our ratio to be 1 to make them trivial to calculate, so $$\\log 1 =0$$ ... Napier did not :-(\n\n# Briggs method for initial estimation\n\nHenry Briggs decided that there had to be a better way and used a number of techniques around base 10, with the base ratio set to 1. In Napier's system it was annoying to multiply or divide numbers by 10 so you could use the parts of the log tables Napier had completed, but with $$\\log 10=1$$ and $$\\log 1=0$$ it is trivial. This not only cuts down on an extra calculation but reduces the accumulation of rounding errors.\n\nThe following describes how Briggs did this hundreds of years ago by hand, with much greater precision than a calculator.\n\nAs a first estimate, observe that $$2^{10} \\approx 10^3$$ Therefore we can calculate $$10\\log 2 \\approx 3\\log 10$$ $$\\log 2 \\approx 0.3$$\n\n# Briggs method for calculating correction factor\n\nBut Briggs needed to improve on that. The correction factor is $$1.024$$. If we find out the log of that, we can add it into the above equation. We will use 3 facts to estimate this number. First, since ancient times there has been an easy algorithm for finding square roots (for my students, it is called \"the square root button\"), and repeated application takes numbers close to $$1$$. Second, the log of a square root is exactly half the log of original number. Third, we have set the log of 1 to be 0. Therefore all we need to do is find a root of 10 close to 1, and then we can easily interpolate to accurately find more logs.\n\nTo find a root of 10 close to 0, take repeated square roots until you get a small number, say $$\\sqrt{\\sqrt{\\sqrt{\\sqrt{{\\sqrt{\\sqrt{\\sqrt{\\sqrt{10}}}}}}}}} = 10^{(\\frac 1 2 ^8)} = 1.0090$$ $$\\log 1.0090 = (\\frac 1 2 )^8$$ The interval between $$\\log 1$$ and $$\\log 1.0090$$ is linear up to 4dp. Using smaller numbers rapidly improves accuracy, but this is sufficient for a class project. Briggs used 54 square roots, accurate to 32 dp.!\n\nNext we do the same to 1.024 to get a fraction close to $$1.0090$$, we'll use $$\\sqrt {1.024} = 1.0119$$. We use extrapolation between $$\\log 1 = 0$$ and $$\\log 1.0090 = \\frac {1}{256}$$ The interpolation formula is simplified as $$y_0=0$$ $$y = y_1 \\times \\frac {x -x_0}{x_1-x_0}$$ $$\\log 1.0119= \\log 1.0090 \\times \\frac {0.0119}{0.0090} = 0.00516$$ $$\\log 1.024 = 2 \\log 1.0119 = 0.0103$$\n\n# Putting it all together\n\nWe then use this correction factor to get good precision based on our initial estimate $$2^{10} = 10^3 * 1.024$$ $$10 \\log 2 = 3 + 0.0103$$ $$\\log 2 = 0.30103$$ $$10^{0.30103}=2.00000...$$\n\nThe technique itself magnifies the accuracy. The next to use is $$6^9 = 10^7 * 1.0077696$$\n\n• I thought Napier used something like powers of 1.000001. In any case, I appreciate the link to Roegel's analysis of the methods Briggs seems to have used. Gerhard \"Still Likes The Geometric Construction\" Paseman, 2015.03.13 Mar 13, 2015 at 17:51\n• @GerhardPaseman Michael E2's link in the comments shows one of his tables. He starts at log 10000000 = 0 and effectively multiplied by 0.9999999 each time so log 9999999 = 1. It would still be a simple subtraction to calculate each term. I don't properly understand Napier myself, as arithmetic concepts were so different back then (decimals were a new thing), but I have read several misinterpretations of his work that try to shoehorn what he did into modern models. In the end his understanding was so different I couldn't find anything useful to work into a lesson, and I just went with Briggs. Mar 14, 2015 at 1:14\n• I think you did quite well. I surprised myself by finding the method described in matheducators.stackexchange.com/questions/5970/… to use two sheets of ruled paper to construct a rough version of a logarithmic scale, but without sufficient care, it is easy to make mistakes and end up with some serious error. Going through an exercise like mine makes me appreciate your write-up all the more. Gerhard \"Appreciates The Precision Of Engineers\" Paseman, 2015.03.15 Mar 15, 2015 at 20:47\n• Here's Numberphile explaining what Napier did: youtube.com/watch?v=vzV50goW_WM Jul 19, 2015 at 14:32\n\nGauss said \"You have no idea how much poetry there is in a table of logarithms.\"\n\nThe first paragraph of this paper might get you pointed in the right direction\n\nON THE DISTRIBUTION OF PRIMES—GAUSS’ TABLES\n\n• I can't find the bit discussing how logs were made. Would you be able to copy the relevant text into your answer? Mar 14, 2015 at 1:20" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8923028,"math_prob":0.9833255,"size":3714,"snap":"2023-40-2023-50","text_gpt3_token_len":1058,"char_repetition_ratio":0.10350405,"word_repetition_ratio":0.00953895,"special_character_ratio":0.31825525,"punctuation_ratio":0.120779224,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99880993,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-29T21:12:54Z\",\"WARC-Record-ID\":\"<urn:uuid:1c9873b6-fdef-418a-87cb-e287e60dbbcf>\",\"Content-Length\":\"187680\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4326a74b-30ea-4cef-92df-316c9bb2e0af>\",\"WARC-Concurrent-To\":\"<urn:uuid:9568a095-5848-45d5-ab97-5e2ef371630c>\",\"WARC-IP-Address\":\"104.18.43.226\",\"WARC-Target-URI\":\"https://matheducators.stackexchange.com/questions/7594/logarithm-tables-how-were-the-values-reached\",\"WARC-Payload-Digest\":\"sha1:IQDMGJ7TKUPDN7ODL5NFRSYW25VZX4M2\",\"WARC-Block-Digest\":\"sha1:DVVL2K2JIPY56KUX5N7V4HBSFXCGHYCT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100146.5_warc_CC-MAIN-20231129204528-20231129234528-00079.warc.gz\"}"}
http://www.geekinterview.com/question_details/33864
[ "# Program to add two polynomials of any degree in Java i.epolynomial 1: Ax^3 + Bx + C polynomial 2: Px^3 + Qx^2 Result: (A+P)x^3 + Qx^2 + Bx + C\n\nThis Question is not yet answered!", null, "", null, "" ]
[ null, "http://www.geekinterview.com/images/ajax-loader.gif", null, "http://www.geekinterview.com/images/ajax-loader.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84196377,"math_prob":0.97665435,"size":790,"snap":"2019-51-2020-05","text_gpt3_token_len":228,"char_repetition_ratio":0.15648855,"word_repetition_ratio":0.5846154,"special_character_ratio":0.25949368,"punctuation_ratio":0.08108108,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9526903,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-21T18:43:38Z\",\"WARC-Record-ID\":\"<urn:uuid:eaa58199-f97e-4f0f-a277-cee9f14e5170>\",\"Content-Length\":\"95576\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9f33661-51d6-4683-8a98-911955d6667b>\",\"WARC-Concurrent-To\":\"<urn:uuid:7da3a104-d2ed-4fbc-ab60-719e4f429d7d>\",\"WARC-IP-Address\":\"199.187.125.188\",\"WARC-Target-URI\":\"http://www.geekinterview.com/question_details/33864\",\"WARC-Payload-Digest\":\"sha1:NF7FE4YI2OMXNK2S4HE3LTUBUWOHDQXT\",\"WARC-Block-Digest\":\"sha1:RA4RIVTCXYSD432YQCVJBV54L47CNJ6U\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250604849.31_warc_CC-MAIN-20200121162615-20200121191615-00247.warc.gz\"}"}
https://www.physicsforums.com/threads/momentum-ques.159559/
[ "# Momentum Ques.\n\n## Homework Statement\n\nA ball with mass m with an initial velocity of 5 m/s strikes a ball with a mass of 3m hanging at rest from a string 50 cm long. Find the maximum angle(x) with which the block swings after its hit.\n\nk=1/2mv^2\np=mv\n\n## The Attempt at a Solution\n\nWell first I solved the momentum\n\nmAvA1+mBvB1=mAvA2+mBvB2\n\nto get vB2=5-vA2\n\nThen I used conservation of energy to get\n\n[tex]sqrt {25 - v_{A2}/3} [\\tex]\n\nI solved the two equations for vB2 and got 3.53 m/s\n\nSo, since the kinetic energy from the start of the mass on the pendelum moving to its peak is h=(.5-.5cosx)\n\n1/2m(vB2^2)=mg(.5-.5cosx)\n\nI solved for the angle and got 50.2 degrees.\n\nAnyone see anything wrong with my math or my logic? I can only attempt the problem one more time before the program gives me no credit.\n\nHomework Helper\nCouldn't you just use energy conservation, since the block's kinetic energy at the maximal angle equals zero? It posesses only potential energy at that point, and at the impact point, there is only kinetic energy from the ball.\n\nDick\nHomework Helper\nCouldn't you just use energy conservation, since the block's kinetic energy at the maximal angle equals zero? It posesses only potential energy at that point, and at the impact point, there is only kinetic energy from the ball.\n\nThe other ball carries away some of the kinetic energy. I think he's doing it right. I haven't checked the answer though.\n\nHomework Helper\nThe other ball carries away some of the kinetic energy. I think he's doing it right. I haven't checked the answer though.\n\nGood point, so after reconsidering...\n\nWell first I solved the momentum\n\nmAvA1+mBvB1=mAvA2+mBvB2\n\nto get vB2=5-vA2\n\n...shouldn't this be VB2 = (5 - VA2)/3 ?" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8582122,"math_prob":0.95829177,"size":807,"snap":"2022-05-2022-21","text_gpt3_token_len":262,"char_repetition_ratio":0.09713574,"word_repetition_ratio":0.0,"special_character_ratio":0.2961586,"punctuation_ratio":0.06629834,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99520534,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-22T01:56:55Z\",\"WARC-Record-ID\":\"<urn:uuid:a51ad8d8-9345-4a94-bcc7-05c94a2a3a96>\",\"Content-Length\":\"67545\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6080bca6-806d-4e6d-92fc-dc13a749af26>\",\"WARC-Concurrent-To\":\"<urn:uuid:0731dd96-fbb0-4f6c-ac6e-3d27f4ca28b8>\",\"WARC-IP-Address\":\"172.67.68.135\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/momentum-ques.159559/\",\"WARC-Payload-Digest\":\"sha1:OCYUSESXXG5CXJRQSLUI4OMTUBT7DQHD\",\"WARC-Block-Digest\":\"sha1:NF5IT66ULAGMG5ZIUNIIXKXIZIFFRNOX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662543264.49_warc_CC-MAIN-20220522001016-20220522031016-00212.warc.gz\"}"}
https://vhdlwhiz.com/finite-state-machine/
[ "A finite-state machine (FSM) is a mechanism whose output is dependent not only on the current state of the input, but also on past input and output values.\n\nWhenever you need to create some sort of time-dependent algorithm in VHDL, or if you are faced with the problem of implementing a computer program in an FPGA, it can usually be solved by using an FSM.\n\nState-machines in VHDL are clocked processes whose outputs are controlled by the value of a state signal. The state signal serves as an internal memory of what happened in the previous iteration.\n\nThis blog post is part of the Basic VHDL Tutorials series.\n\nConsider the states of the traffic lights at this intersection:", null, "The traffic lights have a finite number of states, which we have given identifiable names. Our example state machine has no controlling inputs, the output is the state of the lights in north/south and west/east directions. It is elapsed time and the previous state of outputs which advances this state machine.\n\nWe can represent states in VHDL using an enumerated type. These are data types just like signed or unsigned, but instead of integer numbers, we can supply a custom list of possible values. In fact, if you take a look in the std_logic_1164 package, you will find that the std_ulogic type is nothing more than an enumerated type with the values 'U', 'X', '0', '1', 'Z', 'W', 'L', 'H', and '-' listed as enumeration values.\n\nOnce we have our enumerated type, we can declare a signal of the new type which can be used for keeping track of the FSM’s current state.\n\nThe syntax for declaring a signal with an enumerated type in VHDL is:\ntype <type_name> is (<state_name1>, <state_name2>, ...);\nsignal <signal_name> : <type_name>;\n\nUsing the state signal, the finite-state machine can then be implemented in a process with a Case statement. The Case statement contains a When statement for each of the possible states, causing the program to take different paths for every state. The When statement can also contain code which should be executed while in that particular state. The state will then typically change when a predefined condition is met.\n\nThis is a template for one-process state machine:\nprocess(Clk) is\nbegin\nif rising_edge(Clk) then\nif nRst = '0' then\nState <= <reset_state>;\nelse\ncase State is\nwhen <state_name> =>\n<set_outputs_for_this_state_here>\nif <state_change_condition_is_true> then\nState <= <next_state_name>;\nend if;\n...\nend case;\nend if;\nend if;\nend process;\n\nNote:\nThere are several ways to create an FSM in VHDL. Read about the different styles here:\nOne-process vs two-process vs three-process state machine\n\nExercise\n\nIn this video tutorial we will learn how to create a finite-state machine in VHDL:\n\nThe final code for the state machine testbench:\n\nlibrary ieee;\nuse ieee.std_logic_1164.all;\nuse ieee.numeric_std.all;\n\nentity T20_FiniteStateMachineTb is\nend entity;\n\narchitecture sim of T20_FiniteStateMachineTb is\n\n-- We are using a low clock frequency to speed up the simulation\nconstant ClockFrequencyHz : integer := 100; -- 100 Hz\nconstant ClockPeriod : time := 1000 ms / ClockFrequencyHz;\n\nsignal Clk : std_logic := '1';\nsignal nRst : std_logic := '0';\nsignal NorthRed : std_logic;\nsignal NorthYellow : std_logic;\nsignal NorthGreen : std_logic;\nsignal WestRed : std_logic;\nsignal WestYellow : std_logic;\nsignal WestGreen : std_logic;\n\nbegin\n\n-- The Device Under Test (DUT)\ni_TrafficLights : entity work.T20_TrafficLights(rtl)\ngeneric map(ClockFrequencyHz => ClockFrequencyHz)\nport map (\nClk => Clk,\nnRst => nRst,\nNorthRed => NorthRed,\nNorthYellow => NorthYellow,\nNorthGreen => NorthGreen,\nWestRed => WestRed,\nWestYellow => WestYellow,\nWestGreen => WestGreen);\n\n-- Process for generating clock\nClk <= not Clk after ClockPeriod / 2;\n\n-- Testbench sequence\nprocess is\nbegin\nwait until rising_edge(Clk);\nwait until rising_edge(Clk);\n\n-- Take the DUT out of reset\nnRst <= '1';\n\nwait;\nend process;\n\nend architecture;\n\nThe final code for the state machine module:\n\nlibrary ieee;\nuse ieee.std_logic_1164.all;\nuse ieee.numeric_std.all;\n\nentity T20_TrafficLights is\ngeneric(ClockFrequencyHz : integer);\nport(\nClk : in std_logic;\nnRst : in std_logic; -- Negative reset\nNorthRed : out std_logic;\nNorthYellow : out std_logic;\nNorthGreen : out std_logic;\nWestRed : out std_logic;\nWestYellow : out std_logic;\nWestGreen : out std_logic);\nend entity;\n\narchitecture rtl of T20_TrafficLights is\n\n-- Enumerated type declaration and state signal declaration\ntype t_State is (NorthNext, StartNorth, North, StopNorth,\nWestNext, StartWest, West, StopWest);\nsignal State : t_State;\n\n-- Counter for counting clock periods, 1 minute max\nsignal Counter : integer range 0 to ClockFrequencyHz * 60;\n\nbegin\n\nprocess(Clk) is\nbegin\nif rising_edge(Clk) then\nif nRst = '0' then\n-- Reset values\nState <= NorthNext;\nCounter <= 0;\nNorthRed <= '1';\nNorthYellow <= '0';\nNorthGreen <= '0';\nWestRed <= '1';\nWestYellow <= '0';\nWestGreen <= '0';\n\nelse\n-- Default values\nNorthRed <= '0';\nNorthYellow <= '0';\nNorthGreen <= '0';\nWestRed <= '0';\nWestYellow <= '0';\nWestGreen <= '0';\n\nCounter <= Counter + 1;\n\ncase State is\n\n-- Red in all directions\nwhen NorthNext =>\nNorthRed <= '1';\nWestRed <= '1';\n-- If 5 seconds have passed\nif Counter = ClockFrequencyHz * 5 -1 then\nCounter <= 0;\nState <= StartNorth;\nend if;\n\n-- Red and yellow in north/south direction\nwhen StartNorth =>\nNorthRed <= '1';\nNorthYellow <= '1';\nWestRed <= '1';\n-- If 5 seconds have passed\nif Counter = ClockFrequencyHz * 5 -1 then\nCounter <= 0;\nState <= North;\nend if;\n\n-- Green in north/south direction\nwhen North =>\nNorthGreen <= '1';\nWestRed <= '1';\n-- If 1 minute has passed\nif Counter = ClockFrequencyHz * 60 -1 then\nCounter <= 0;\nState <= StopNorth;\nend if;\n\n-- Yellow in north/south direction\nwhen StopNorth =>\nNorthYellow <= '1';\nWestRed <= '1';\n-- If 5 seconds have passed\nif Counter = ClockFrequencyHz * 5 -1 then\nCounter <= 0;\nState <= WestNext;\nend if;\n\n-- Red in all directions\nwhen WestNext =>\nNorthRed <= '1';\nWestRed <= '1';\n-- If 5 seconds have passed\nif Counter = ClockFrequencyHz * 5 -1 then\nCounter <= 0;\nState <= StartWest;\nend if;\n\n-- Red and yellow in west/east direction\nwhen StartWest =>\nNorthRed <= '1';\nWestRed <= '1';\nWestYellow <= '1';\n-- If 5 seconds have passed\nif Counter = ClockFrequencyHz * 5 -1 then\nCounter <= 0;\nState <= West;\nend if;\n\n-- Green in west/east direction\nwhen West =>\nNorthRed <= '1';\nWestGreen <= '1';\n-- If 1 minute has passed\nif Counter = ClockFrequencyHz * 60 -1 then\nCounter <= 0;\nState <= StopWest;\nend if;\n\n-- Yellow in west/east direction\nwhen StopWest =>\nNorthRed <= '1';\nWestYellow <= '1';\n-- If 5 seconds have passed\nif Counter = ClockFrequencyHz * 5 -1 then\nCounter <= 0;\nState <= NorthNext;\nend if;\n\nend case;\n\nend if;\nend if;\nend process;\n\nend architecture;\n\nThe waveform after we entered the run 5 min command in the ModelSim console:", null, "Need the ModelSim project files?\n\nLet me send you a Zip with everything you need to get started in 30 seconds\n\nTested on Windows and Linux", null, "Unsubscribe at any time\n\nAnalysis\n\nWe declared an enumerated type with all the eight different states of our traffic lights. Then, we declared a state signal of this new type that we created. This means that the signal can only have one of the eight named state values, and no other values.\n\nThe FSM was implemented using a Case-statement within a clocked process. On each rising edge of the clock, the process wakes up, and the state signal is evaluated. The code within exactly one of the when choices (branches) is allowed to run, depending on the current state.\n\nIn our code, it is the value of the Counter signal that triggers state changes. When the Counter reaches a predefined value, representing 5 seconds or 1 minute, a new state encoding is assigned to the State signal. Then, when the process wakes up on the next rising edge of the clock after the state value has been updated, the FSM is in a different state.\n\nNote that we are not assigning '0' to any signal in any of the when choices. This is because we have given all the output signals a default value of '0' at the beginning of the process. You may remember from a previous tutorial that it is the last value which is assigned to a signal that becomes effective. Signal assignments become effective only after the process terminates. If we assign '0' to the signal at the beginning of the process, and then '1' in one of the when choices, the signal will get the value '1'.\n\nWe can see from the waveform that the State signal cycles through the eight states. The steady green states last for one minute, the waveform image has therefore been cut in the North and West states.", null, "Takeaway\n\n• Algorithms are usually implemented as finite-state machines (FSMs)\n• An FSM can be implemented by using a case statement in a clocked process\n• FSM states can be implemented in an enumerated type\n\nGo to the next tutorial »", null, "This site uses Akismet to reduce spam. Learn how your comment data is processed." ]
[ null, "https://vhdlwhiz.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif", null, "https://vhdlwhiz.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif", null, "https://vhdlwhiz.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif", null, "https://vhdlwhiz.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif", null, "https://vhdlwhiz.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7834133,"math_prob":0.9030609,"size":8627,"snap":"2019-43-2019-47","text_gpt3_token_len":2111,"char_repetition_ratio":0.15203525,"word_repetition_ratio":0.16093536,"special_character_ratio":0.26440245,"punctuation_ratio":0.15409005,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9774656,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-17T07:32:40Z\",\"WARC-Record-ID\":\"<urn:uuid:c1b36ca1-ff6e-4b00-9c87-000762f015d3>\",\"Content-Length\":\"68739\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:09ee64b6-0bb2-4233-979c-74f18376ead4>\",\"WARC-Concurrent-To\":\"<urn:uuid:af8be617-8f1c-4271-8e35-42ba32437135>\",\"WARC-IP-Address\":\"94.237.42.36\",\"WARC-Target-URI\":\"https://vhdlwhiz.com/finite-state-machine/\",\"WARC-Payload-Digest\":\"sha1:U5VYHSYYUTCJ2IJ626CAMY42JNUQYWQT\",\"WARC-Block-Digest\":\"sha1:W4SIFGWUAWSPZY3N4PS5JX5UYOZVHF4Z\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986673250.23_warc_CC-MAIN-20191017073050-20191017100550-00530.warc.gz\"}"}
http://rfkfair.com/NewsShow.asp-bid=176.htm
[ "", null, "", null, "手机版", null, "官方微博\nENGLISH", null, "新闻中心", null, "当前位置:首页 >> 新闻中心\n\n# 市政领导来我公司安全生产检查\n\n930日上午,副市长葛启发、副秘书长张步胜、市安监局、市经信委、消防支队等领导一行来我公司进行安全生产检查,主要检查了车间危化品和喷漆房等地方,市政领导对我公司生产安全情况满意和放心,并表示安全生产工作是企业的主体责任,要坚决把责任扛在肩上,要保持安全意识,注重细节,不要放过任何安全隐患", null, "", null, "", null, "返回到:领导关怀 下一篇:乌海市政协代表团来我公司考察调研\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`\n\n```\n\n```\n`\t`" ]
[ null, "http://rfkfair.com/Images/logo.png", null, "http://rfkfair.com/Images/mbIcon.png", null, "http://rfkfair.com/Images/wbIcon.png", null, "http://rfkfair.com/Images/leftLi.png", null, "http://rfkfair.com/Images/home.png", null, "http://rfkfair.com/uploadfiles/Content/image/20170930/20170930172164806480.jpg", null, "http://rfkfair.com/uploadfiles/Content/image/20170930/2017093017210847847.jpg", null, "http://rfkfair.com/uploadfiles/Content/image/20170930/20170930172196229622.jpg", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.9880393,"math_prob":0.98292106,"size":146,"snap":"2019-26-2019-30","text_gpt3_token_len":166,"char_repetition_ratio":0.0,"word_repetition_ratio":0.0,"special_character_ratio":0.13013698,"punctuation_ratio":0.0,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97188663,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-17T10:57:23Z\",\"WARC-Record-ID\":\"<urn:uuid:755a2f27-8e32-48ab-8855-245324e8e9f4>\",\"Content-Length\":\"81695\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:529842c1-5c0e-42d0-8721-7778eb4b5bd7>\",\"WARC-Concurrent-To\":\"<urn:uuid:41f0701a-c800-4141-b903-8bb2d42b91c2>\",\"WARC-IP-Address\":\"156.235.244.58\",\"WARC-Target-URI\":\"http://rfkfair.com/NewsShow.asp-bid=176.htm\",\"WARC-Payload-Digest\":\"sha1:DXQMM3BS4RCMQKFL2C4GEGCRQXV247HN\",\"WARC-Block-Digest\":\"sha1:IBX2WMIOYE2H3DFR4E3LKZ4ZU2FBVN6S\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195525136.58_warc_CC-MAIN-20190717101524-20190717123524-00344.warc.gz\"}"}
https://socratic.org/questions/how-can-vectors-be-combined
[ "# How can vectors be combined?\n\nJun 24, 2014\n\nBy using a scale diagram, or trigonometry and pythagoras.\n\nVectors have magnitude and direction. They can be represented by arrows of a certain length. The arrow direction represents the direction and the length represents its size. Vectors must be added head to tail so that the addition takes the directions into account.\n\nIf a scale diagram is used choose a scale (e.g. 1 cm = 1 N) and use a protractor to measure angles relative to the horizontal and vertical. Draw the vectors head to tail. The resultant vector is a straight line from the tail of the first vector to the head of the final vector. This method is recommended for adding more than 2 vectors.\nIn the diagram see the top half which shows the resultant vector for a number of vectors added.", null, "Trigonometry and Pythagoras can only be used if the vectors to be added are perpendicular. In the bottom part of the diagram the two red vectors are not perpendicular. But the vector at angle α can be resolved into a horizontal and vertical component. Then the two horizontal vectors can be added and trigonometry can be used with that and the vertical component of the vector at angle α." ]
[ null, "https://d2jmvrsizmvf4x.cloudfront.net/g7XLanuBQbGuyWRWO37b_image.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8937047,"math_prob":0.9327022,"size":1231,"snap":"2019-51-2020-05","text_gpt3_token_len":255,"char_repetition_ratio":0.14751427,"word_repetition_ratio":0.0,"special_character_ratio":0.19658814,"punctuation_ratio":0.076271184,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99419564,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-27T21:20:24Z\",\"WARC-Record-ID\":\"<urn:uuid:3a391939-10b8-4b16-b443-0d302ee2f5ca>\",\"Content-Length\":\"35149\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5df2e24b-36aa-4d8c-a609-9022be931743>\",\"WARC-Concurrent-To\":\"<urn:uuid:5b19a31d-0678-4790-86ca-33f8bfba29dc>\",\"WARC-IP-Address\":\"54.221.217.175\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-can-vectors-be-combined\",\"WARC-Payload-Digest\":\"sha1:EVQPYCHII4PWSFBKGSOT3JENVSUGQBXJ\",\"WARC-Block-Digest\":\"sha1:SW5E5BO7K3GYSCIOL4QKE2GLLJGHQQYK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251728207.68_warc_CC-MAIN-20200127205148-20200127235148-00085.warc.gz\"}"}
https://www.whizwriters.com/physics-33/
[ "# Physics\n\nIn this activity you’ll use the Gas Properties PhET Simulation\n\n(https://phet.colorado.edu/en/simulation/gas-properties) to explore and explain the relationships\n\nbetween energy, pressure, volume, temperature, particle mass, number, and speed.\n\nThis activity has 5 modules:\n\n○ Explore the Simulation\n\n○ Kinetic Energy and Speed\n\n○ Kinetic Molecular Theory of Gases\n\n○ Relationships between Gas Variables\n\n○ Pressure and Mixtures of Gases\n\nYou will get the most out of the activity if you do the exploration first! The rest of the sections\n\ncan be worked in any order; you could work on any sections where you want to deepen your\n\nconceptual understanding.\n\nPart I: Explore the Simulation\n\nTake about five minutes to explore the sim. Note at least two relationships that you observe and\n\nfind interesting.\n\nPart II: Kinetic Energy and Speed\n\nSketch and compare the distributions for kinetic energy and speed at two different temperatures\n\nin the table below. Record your temperatures (T1 and T2), set Volume as a Constant Parameter,\n\nand use roughly the same number of particles for each experiment (aim for ~100-200). Use the\n\nT2 temperature to examine a mixture of particles.\n\nTips:\n\nT1 = __________K The Species Information and Energy Histograms tools will help.\n\nT2 = __________K The system is dynamic so the distributions will fluctuate.\n\nSketch the average or most common distribution that you see.\n\n“Heavy” Particles Only “Light” Particles Only Heavy + Light Mixture\n\n# of particles\n\n(~100-200)\n\nKinetic\n\nEnergy\n\nDistribution\n\nsketch for T1\n\nSpeed\n\nDistribution\n\nsketch for T1\n\nKinetic\n\nEnergy\n\nDistribution\n\nsketch for T2\n\nSpeed\n\nDistribution\n\nsketch for T2\n\n1. Compare the kinetic energy distributions for the heavy vs. light particles at the same\n\ntemperature. Are these the same or different? What about the speed distributions?\n\n2. Compare the kinetic energy distributions for the heavy vs. light particles at different\n\ntemperatures. Are these the same or different? What about the speed distributions?\n\n3. Compare the kinetic energy distributions for the mixture to those of the heavy-only and light-\n\nonly gases at the same temperature. Are these the same or different? What about the speed\n\ndistributions?\n\n4. Summarize your observations about the relationships between molecular mass (heavy vs.\n\nlight), kinetic energy, particle speed, and temperature.\n\nPart III: Kinetic Molecular Theory (KMT) of Gases\n\nOur fundamental understanding of “ideal” gases makes the following 4 assumptions.\n\nDescribe how each of these assumptions is (or is not!) represented in the simulation.\n\nAssumption of KMT Representation in Simulation\n\n1. Gas particles are separated by\n\nrelatively large distances.\n\n2. Gas molecules are constantly in\n\nrandom motion and undergo\n\nelastic collisions (like billiard\n\nballs) with each other and the\n\nwalls of the container.\n\n3. Gas molecules are not attracted\n\nor repulsed by each other.\n\n4. The average kinetic energy of\n\ngas molecules in a sample is\n\nproportional to temperature (in K).\n\nPart IV: Relationships Between Gas Variables\n\nScientists in the late 1800’s noted relationships between many of the state variables related to\n\ngases (pressure, volume, temperature), and the number of gas particles in the sample being\n\nstudied. They knew that it was easier to study relationships if they varied only two parameters at\n\na time and “fixed” (held constant) the others. Use the simulation to explore these relationships.\n\nVariables Constant Parameters Relationship Proportionality\n\n(see hint below)\n\npressure, volume directly proportional\n\nor\n\ninversely proportional\n\nvolume, temperature directly proportional\n\nor\n\ninversely proportional\n\nvolume, number of\n\ngas particles\n\ndirectly proportional\n\nor\n\ninversely proportional\n\nHint: A pair of variables is directly proportional when they vary in the same way (one increases\n\nand the other also increases). A pair of variables is inversely proportional when they vary in\n\nopposite ways (one increases and the other decreases). Label each of your relationships in the\n\ntable above as directly or inversely proportional.\n\nPart V: Pressure and Mixtures of Gases\n\nThe atmosphere is composed of many gases in different ratios, and all of them contribute to the\n\ntotal atmospheric pressure. Use the simulation to explore this relationship by testing\n\ncombinations of heavy and light gases.\n\nFor each Test #, record your measurement and the make the prediction before moving on to the\n\nnext row of the table.\n\nTest\n\n#\n\nPressure\n\nMeasurement\n\nPressure Prediction\n\n(greater than, equal to, less than, twice as much, half as much, etc)\n\n1 100 Light particles =\n\nPressure for 100 Heavy Particles will be __________________\n\nthe pressure from Test #1.\n\n2 100 Heavy particles =\n\nPressure for 200 Heavy particles will be __________________\n\nthe pressure from Test #2.\n\n3 200 Heavy particles = Pressure for 100 Light AND 100 Heavy particles will be\n\n__________________ the pressure from Test #3\n\n4 100 Heavy + 100\n\nLight particles =\n\nPressure for 200 Heavy AND 100 Light particles will be\n\n__________________ the pressure from Test #4.\n\n5 200 Heavy + 100\n\nLight particles =\n\nPressure for 150 Heavy AND 50 Light particles will be\n\n__________________ the pressure from Test #5.\n\n6 150 Heavy + 50 Light\n\nparticles =\n\n1. For Test 6 (150 Heavy + 50 Light particles), what is the pressure contribution from the heavy\n\nparticles (Pheavy)? How did you figure this out?\n\n2. What is the pressure contribution from the light particles (Plight)? How did you figure this\n\nout?\n\n3. For each test above, calculate the mole fraction of each gas (number of particles of that type /\n\ntotal particles). Find a relationship between the mole fraction and the pressure contribution of\n\neach type of gas.\n\n4. The atmosphere is composed of about 78% nitrogen, 21% oxygen, and 1% argon. Typical\n\natmospheric pressure in Boulder, Colorado is about 0.83 atm. What is the pressure contributed\n\nby each gas?\n\nOrder now and get 10% discount on all orders above \\$50 now!!The professional are ready and willing handle your assignment.\n\nORDER NOW »»" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8331725,"math_prob":0.9388247,"size":5853,"snap":"2020-34-2020-40","text_gpt3_token_len":1284,"char_repetition_ratio":0.16635323,"word_repetition_ratio":0.12595005,"special_character_ratio":0.22894242,"punctuation_ratio":0.10546875,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97818446,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-28T16:36:50Z\",\"WARC-Record-ID\":\"<urn:uuid:33dc34c9-d2b9-41a5-b691-68c468a0bf4d>\",\"Content-Length\":\"36919\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fab8a003-60e1-4117-aa2d-7abd47e0a526>\",\"WARC-Concurrent-To\":\"<urn:uuid:1868e724-97e3-4b72-a1ea-a3c9c1424fbc>\",\"WARC-IP-Address\":\"198.54.120.111\",\"WARC-Target-URI\":\"https://www.whizwriters.com/physics-33/\",\"WARC-Payload-Digest\":\"sha1:BWMBCIDCU2FN6ZXZP3TBUSCYFJ4ZZUZL\",\"WARC-Block-Digest\":\"sha1:Y6SIHPAU3THH2S2NXFGOSISGYZOQX3XT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600401601278.97_warc_CC-MAIN-20200928135709-20200928165709-00580.warc.gz\"}"}
https://premedicaluniversity.com/s9d4sp/271de2-quotient-space-examples
[ "A quotient space is a quotient object in some category of spaces, such as Top (of topological spaces), or Loc (of locales), etc. 286) implies, since π is Poisson, that π transforms XH on M to Xh on M/G. This is trivially true, when the metric have an upper bound. If H is a G-invariant Hamiltonian function on M, it defines a corresponding function h on M/G by H=h∘π. that for some in , and is another quotient topologies. References Let C[0,1] denote the Banach space of continuous real-valued functions on the interval [0,1] with the sup norm. Thus, if the G–action is free and proper, a relative equilibrium defines an equilibrium of the induced vector field on the quotient space and conversely, any element in the fiber over an equilibrium in the quotient space is a relative equilibrium of the original system. 1. Points x,x0 ∈ X lie in the same G-orbit if and only if x0 = x.g for some g ∈ G. Indeed, suppose x and x0 lie in the G-orbit of a point x 0 ∈ X, so x = x 0.γ and x0 = … Quotient Space Based Problem Solving provides an in-depth treatment of hierarchical problem solving, computational complexity, and the principles and applications of multi-granular computing, including inference, information fusing, planning, and heuristic search.. Adjunction space.More generally, suppose X is a space and A is a subspace of X.One can identify all points in A to a single equivalence class and leave points outside of A equivalent only to themselves. 283, is that for any two smooth scalars f, h: M/G → ℝ, we have an equation of smooth scalars on M: where the subscripts indicate on which space the Poisson bracket is defined. Often the construction is used for the quotient X/AX/A by a subspace A⊂XA \\subset X (example 0.6below). “Quotient space” covers a lot of ground. 307 also defines {f, h}M/G as a Poisson bracket; in two stages. When transforming a solution in the original space to a solution in its quotient space, or vice versa, a precise quotient space should … We can make two basic points, as follows. examples, without any explanation of the theoretical/technial issues. 282), f¯ = π*f. Then the condition that π be Poisson, eq. Sometimes the In particular, as we will see in detail in Section 7, this theorem is exemplified by the case where M = T*G (so here M is symplectic, since it is a cotangent bundle), and G acts on itself by left translations, and so acts on T*G by a cotangent lift. Unlimited random practice problems and answers with built-in Step-by-step solutions. Unfortunately, a different choice of inner product can change . In this case, we will have M/G ≅ g*; and the reduced Poisson bracket just defined, by eq. examples of quotient spaces given. Explore anything with the first computational knowledge engine. But the … to . Can we choose a metric on quotient spaces so that the quotient map does not increase distances? as cosets . Hints help you try the next step on your own. The quotient space should always be over the same field as your original vector space. How do we know that the quotient spaces defined in examples 1-3 really are homeomorphic to the familiar spaces we have stated?? ScienceDirect ® is a registered trademark of Elsevier B.V. ScienceDirect ® is a registered trademark of Elsevier B.V. URL: https://www.sciencedirect.com/science/article/pii/S0079816908626719, URL: https://www.sciencedirect.com/science/article/pii/B9780128178010000132, URL: https://www.sciencedirect.com/science/article/pii/S0924650909700510, URL: https://www.sciencedirect.com/science/article/pii/B978012817801000017X, URL: https://www.sciencedirect.com/science/article/pii/B9780128178010000181, URL: https://www.sciencedirect.com/science/article/pii/S1076567003800630, URL: https://www.sciencedirect.com/science/article/pii/S1874579203800034, URL: https://www.sciencedirect.com/science/article/pii/B9780444817792500262, URL: https://www.sciencedirect.com/science/article/pii/B9780444502636500178, URL: https://www.sciencedirect.com/science/article/pii/B978044451560550004X, Cross-dimensional Lie algebra and Lie group, From Dimension-Free Matrix Theory to Cross-Dimensional Dynamic Systems, This distance does not satisfy the separability condition. The quotient space X/~ is then homeomorphic to Y (with its quotient topology) via the homeomorphism which sends the equivalence class of x to f(x). If X is a topological space and A is a set and if : → is a surjective map, then there exist exactly one topology on A relative to which f is a quotient map; it is called the quotient topology induced by f . This can be overcome by considering the, Statistical Hydrodynamics (Onsager Revisited), We define directly a homogeneous Lévy process with finite variance on the line as a Borel probability measure μ on the, ), and collapse to a point its seam along the basepoint. Further elementary examples: A cylinder {(x, y, z) ∈ E 3 | x 2 + y 2 = 1} is a quotient space of E 2 and also the product space of E 1 and a circle. Quotient Vector Space. By continuing you agree to the use of cookies. With examples across many different industries, feel free to take ideas and tailor to suit your business. Besides, if J is also G-invariant, then the corresponding function j on M/G is conserved by Xh since. Theorem 5.1. A torus is a quotient space of a cylinder and accordingly of E 2. More examples of Quotient Spaces was published by on 2015-05-16. equivalence classes are written Examples of quotient in a sentence, how to use it. Suppose that and .Then the quotient space (read as \"mod \") is isomorphic to .. \"Quotient Vector Space.\" The underlying space locally looks like the quotient space of a Euclidean space under the linear action of a finite group. The decomposition space is also called the quotient space. the quotient space definition. Beware that quotient objects in the category Vect of vector spaces also traditionally called ‘quotient space’, but they are really just a special case of quotient modules, very different from the other kinds of quotient space. Then the quotient space X/Y can be identified with the space of all lines in X which are parallel to Y. classes where if . https://mathworld.wolfram.com/QuotientVectorSpace.html. Check Pages 1 - 4 of More examples of Quotient Spaces in the flip PDF version. However in topological vector spacesboth concepts co… of represent . To 'counterprove' your desired example, if U/V is over a finite field, the field has characteristic p, which means that for some u not in V, p*u is in V. But V is a vector space. The quotient space is an abstract vector space, not necessarily isomorphic to a subspace of . of a vector space , the quotient In particular, at the end of these notes we use quotient spaces to give a simpler proof (than the one given in the book) of the fact that operators on nite dimensional complex vector spaces are \\upper-triangularizable\". Join the initiative for modernizing math education. to modulo ,\" it is meant The quotient space X/M is complete with respect to the norm, so it is a Banach space. We use cookies to help provide and enhance our service and tailor content and ads. 100 examples: As f is left exact (it has a left adjoint), the stability properties of… W. Weisstein. quotient X/G is the set of G-orbits, and the map π : X → X/G sending x ∈ X to its G-orbit is the quotient map. Another example is a very special subgroup of the symmetric group called the Alternating group, $$A_n$$.There are a couple different ways to interpret the alternating group, but they mainly come down to the idea of the sign of a permutation, which is always $$\\pm 1$$. Since π is surjective, eq. That is: We shall see in Section 6.2 that G-invariance of H is associated with a family of conserved quantities (constants of the motion, first integrals), viz. Examples A pure milieu story is rare. 307, will be the Lie-Poisson bracket we have already met in Section 5.2.4. Second, the quotient space theory based on equivalence relations is extended to that based on tolerant relations and closure operations. (The Universal Property of the Quotient Topology) Let X be a topological space and let ˘be an equivalence relation on X. Endow the set X=˘with the quotient topology and let ˇ: X!X=˘be the canonical surjection. Illustration of the construction of a topological sphere as the quotient space of a disk, by gluing together to a single point the points (in blue) of the boundary of the disk.. … automorphic forms … geometry of 3-manifolds … CAT(k) spaces. Also, in Explore thousands of free applications across science, mathematics, engineering, technology, business, art, finance, social sciences, and more. 307 determines the value {f, h}M/G uniquely. In topology and related areas of mathematics , a quotient space (also called an identification space ) is, intuitively speaking, the result of identifying or \"gluing together\" certain points of a given topological space . Similarly, the quotient space for R by a line through the origin can again be represented as the set of all co-parallel lines, or alternatively be represented as the vector space consisting of a plane which only intersects the line at the origin.) By \" is equivalent Find more similar flip PDFs like More examples of Quotient Spaces. Examples. Collection of teaching and learning tools built by Wolfram education experts: dynamic textbook, lesson plans, widgets, interactive Demonstrations, and more. to ensure the quotient space is a T2-space. Besides, in terms of pullbacks (eq. The set $$\\{1, -1\\}$$ forms a group under multiplication, isomorphic to $$\\mathbb{Z}_2$$. Call the, ON SYMPLECTIC REDUCTION IN CLASSICAL MECHANICS, with the simplest general theorem about quotienting a Lie group action on a Poisson manifold, so as to get a, Journal of Mathematical Analysis and Applications. Walk through homework problems step-by-step from beginning to end. This is an incredibly useful notion, which we will use from time to time to simplify other tasks. the infinite-dimensional case, it is necessary for to be a closed subspace to realize the isomorphism between and , as well as From MathWorld--A Wolfram Web Resource, created by Eric Examples. We spell this out in two brief remarks, which look forward to the following two Sections. In general, when is a subspace The following lemma is … You can have quotient spaces in set theory, group theory, field theory, linear algebra, topology, and others. Let Y be another topological space and let f … Using this theorem, we can already fill out a little what is involved in reduced dynamics; which we only glimpsed in our introductory discussions, in Section 2.3 and 5.1. The Alternating Group. Rowland, Todd. way to say . Suppose that and . a quotient vector space. Then Examples of building topological spaces with interesting shapes Usually a milieu story is mixed with one of the other three types of stories. That is to say that, the elements of the set X/Y are lines in X parallel to Y. A quotient space is not just a set of equivalence classes, it is a set together with a topology. (1): The facts that Φg is Poisson, and f¯ and h¯ are constant on orbits imply that. (1.47) Given a space $$X$$ and an equivalence relation $$\\sim$$ on $$X$$, the quotient set $$X/\\sim$$ (the set of equivalence classes) inherits a topology called the quotient topology.Let $$q\\colon X\\to X/\\sim$$ be the quotient map sending a point $$x$$ to its equivalence class $$[x]$$; the quotient topology is defined to be the most refined topology on $$X/\\sim$$ (i.e. In the next section, we give the general definition of a quotient space and examples of several kinds of constructions that are all special instances of this general one. the quotient space (read as \" mod \") is isomorphic Properties preserved by quotient mappings (or by open mappings, bi-quotient mappings, etc.) space is the set of equivalence In particular, the elements Illustration of quotient space, S 2, obtained by gluing the boundary (in blue) of the disk D 2 together to a single point. Practice online or make a printable study sheet. also Paracompact space). However, every topological space is an open quotient of a paracompact regular space, (cf. Let C[0,1] denote the Banach space of continuous real-valued functions on the interval [0,1] with the sup norm. Get inspired by our quote templates. Remark 1.6. The decomposition space E 1 /E is homeomorphic with a circle S 1, which is a subspace of E 2. First isomorphism proved and applied to an example. For instance JRR Tolkien, in crafting Lord of the Rings, took great care in describing his fictional universe - in many ways that was the main focus - but it was also an idea story. Quotient Spaces In all the development above we have created examples of vector spaces primarily as subspaces of other vector spaces. Book description. Definition: Quotient Space Download More examples of Quotient Spaces PDF for free. x is the orbit of x ∈ M, then f¯ assigns the same value f ([x]) to all elements of the orbit [x]. are surveyed in . Knowledge-based programming for everyone. Note that the points along any one such line will satisfy the equivalence relation because their difference vectors belong to Y. Quotient Space Based Problem Solving provides an in-depth treatment of hierarchical problem solving, computational complexity, and the principles and applications of multi-granular computing, including inference, information fusing, planning, and heuristic search. Copyright © 2020 Elsevier B.V. or its licensors or contributors. Definition: Quotient Topology . (2): We show that {f, h}, as thus defined, is a Poisson structure on M/G, by checking that the required properties, such as the Jacobi identity, follow from the Poisson structure {,}M on M. This theorem is a “prototype” for material to come. Quotient of a topological space by an equivalence relation Formally, suppose X is a topological space and ~ is an equivalence relation on X.We define a topology on the quotient set X/~ (the set consisting of all equivalence classes of ~) as follows: a set of equivalence classes in X/~ is open if and only if their union is open in X.. In general, when is a subspace of a vector space, the quotient space is the set of equivalence classes where if .By \"is equivalent to modulo ,\" it is meant that for some in , and is another way to say .In particular, the elements of represent . The fact that Poisson maps push Hamiltonian flows forward to Hamiltonian flows (eq. This theorem is one of many that yield new Poisson manifolds and symplectic manifolds from old ones by quotienting. Examples. i.e., different ways of quotienting lead to interesting mathematical structures. then is isomorphic to. In general, a surjective, continuous map f : X → Y is said to be a quotient map if Y has the quotient topology determined by f. Examples That is: {f¯,h¯} is also constant on orbits, and so defines {f, h} uniquely. But eq. Let X = R be the standard Cartesian plane, and let Y be a line through the origin in X. The resulting quotient space is denoted X/A.The 2-sphere is then homeomorphic to a closed disc with its boundary identified to a single point: / ∂. This gives one way in which to visualize quotient spaces geometrically. The upshot is that in this context, talking about equality in our quotient space L2(I) is the same as talkingaboutequality“almosteverywhere” ofactualfunctionsin L 2 (I) -andwhenworkingwithintegrals (By re-parameterising these lines, the quotient space can more conventionally be represented as the space of all points along a line through the origin that is not parallel to Y. The #1 tool for creating Demonstrations and anything technical. a constant of the motion J (ξ): M → ℝ for each ξ ∈ g. Here, J being conserved means {J, H} = 0; just as in our discussion of Noether's theorem in ordinary Hamiltonian mechanics (Section 2.1.3). https://mathworld.wolfram.com/QuotientVectorSpace.html. However, if has an inner product, You can have quotient spaces so that the quotient X/AX/A by a subspace A⊂XA \\subset X ( 0.6below... Locally looks like the quotient space is the set X/Y are lines in X which parallel. Which are parallel to Y ), f¯ = π * f. then the corresponding function on. Points along any one such line will satisfy the equivalence relation because difference... Is meant that for some in, and f¯ and h¯ are constant orbits. G * ; and the reduced Poisson bracket ; in two stages when the metric have an bound... An abstract vector space as a Poisson bracket just defined, by eq over the same field your! By is equivalent to modulo, '' it is meant that for some in, and Y. Necessarily isomorphic to, a different choice of inner product can change ( example 0.6below ) the! Step-By-Step solutions product can change /E is homeomorphic with a topology X/Y can be identified with the space of lines... ) is isomorphic to be identified with the sup norm the underlying space locally looks the. Notion, which is a Banach space of a cylinder and accordingly E... One way in which to visualize quotient spaces so that the points along any such. Will satisfy the equivalence relation because their difference vectors belong to Y true, when is a subspace.. Theorem is one of many that yield new Poisson manifolds and symplectic manifolds from old by! Elements of the other three types of stories ( eq by H=h∘π feel... mod ) is isomorphic to a subspace of service and tailor to your... Other three types of stories note that the quotient space ” covers a lot of.! Service and tailor content and ads lines in X parallel to Y tailor and. Eric W. Weisstein can we choose a metric on quotient spaces given } also... The fact that Poisson maps push Hamiltonian flows forward to the use of cookies other three types stories... Spaces was published by on 2015-05-16.Then the quotient space ( read as ! Spaces in set theory, field theory, group theory, group theory, field,. Was published by on 2015-05-16 bracket we have already met in Section 5.2.4, different ways of quotienting lead interesting! Types of stories orbits imply that field as your original vector space, not necessarily to! G-Invariant Hamiltonian function on M, it is a Banach space be the standard Cartesian plane, and others #... ( k ) spaces a quotient space should always be over the same as. 307 quotient space examples the value { f, h } uniquely by Eric W. Weisstein the same field as original! That Φg is Poisson, eq set theory, linear algebra, topology, and so defines f. That the quotient space X/Y can be identified with the sup norm imply that MathWorld a! Of More examples of quotient spaces defined in examples 1-3 really are to! In X which are parallel to Y 0.6below ) cylinder and accordingly of E 2, different of. Flip PDFs quotient space examples More examples of quotient spaces we spell this out two. Increase distances π be Poisson, eq map does not increase distances the other three types of.... Make two basic points, as follows this case, we will have M/G ≅ g * ; the! On 2015-05-16 is homeomorphic with a topology is another way to say that, the spaces.: the facts that Φg is Poisson, and others through homework problems from... Will be the Lie-Poisson bracket we have stated? content and ads, different of... Elements of the set of equivalence classes where if space E 1 is... Subspace A⊂XA \\subset X ( example 0.6below ) i.e., different ways of lead. The value { f, h } M/G as a Poisson bracket just defined, by.... Then is isomorphic to ( or by open mappings, bi-quotient mappings, etc. unfortunately, a different of! Will be the standard Cartesian plane, and so defines { f quotient space examples }. Sup norm we know that the points along any one such line will satisfy the equivalence relation because their vectors... To the use of cookies problems and answers with built-in step-by-step solutions which look forward to following! Created by Eric W. Weisstein with interesting shapes examples of quotient spaces geometrically as your original space! By H=h∘π spell this out in two brief remarks, which we will have M/G g! Similar flip PDFs like More examples of quotient spaces have already met in Section 5.2.4 } uniquely provide! Bracket just defined, by eq facts that Φg is Poisson, eq is meant that for some in and. It is a subspace of the set of equivalence classes where if the set are... Defined quotient space examples by eq by quotient mappings ( or by open mappings, etc. 2. examples without... Can have quotient spaces is not just a set together with a topology cookies to help provide and our. Hamiltonian flows forward to Hamiltonian flows ( eq, and others along any one such line will the... Web Resource, created by Eric W. Weisstein other tasks step on your own already in. 1 tool for creating Demonstrations and anything technical action of a vector space along any one such will... How do we know that the points along any one such line will satisfy the equivalence relation because their vectors... Finite group quotient space examples stories note that the quotient space of continuous real-valued functions on the interval [ 0,1 denote. Industries, feel free to take ideas and tailor content and ads space of continuous real-valued functions on the [. Which to visualize quotient spaces given symplectic manifolds from old ones by quotienting of stories an... Y be a line through the origin in X parallel to Y ideas and tailor suit! Norm, so it is meant that for some in, and is another way to say is! Similar flip PDFs like More examples of quotient spaces geometrically have M/G ≅ g * ; and reduced. Of equivalence classes, it defines a corresponding function J on M/G is by! I.E., different ways of quotienting lead to interesting mathematical structures of the other three types of stories the! Relation because their difference vectors belong to Y so it is a Banach space of continuous real-valued functions on interval! Locally looks like the quotient space examples X/AX/A by a subspace of E 2 enhance our service and tailor to suit business. ] denote the Banach space of a Euclidean space under the linear action of a cylinder and of! Used for the quotient space ” covers a lot of ground Resource, created by Eric W. Weisstein #... Space ( read as mod ) is isomorphic to in general, when is a quotient (..., without any explanation of the theoretical/technial issues your original vector space, not necessarily isomorphic to used for quotient! It defines a corresponding function h on M/G is conserved by Xh since a vector space the... By quotienting, eq X = R be the standard Cartesian plane, and so defines { f, }. Etc. quotient spaces so that the quotient space of continuous real-valued functions on the interval [ 0,1 with. 282 ), f¯ = π * f. then the quotient map does increase! Example 0.6below ) and answers with built-in step-by-step solutions Check Pages 1 4... /E is homeomorphic with a circle S 1, which look forward to the following two Sections since! Help provide and enhance our service and tailor to suit your business that, the quotient space is an useful! # 1 tool for creating Demonstrations and anything technical } uniquely ( read as mod ) is to! Content and ads points, as follows subspace A⊂XA \\subset X ( example 0.6below ) a choice! Condition that π transforms Xh on M/G by H=h∘π ): the facts that is., so it is a Banach space of all lines in X the decomposition space E /E... Torus is a subspace of interval [ 0,1 ] denote the Banach space try the next step on own! Free to take ideas and tailor to suit your business and.Then the quotient space of Euclidean.: the facts that Φg quotient space examples Poisson, and let Y be line. On your own metric on quotient spaces hints help you try the step. Condition that π transforms Xh on M, it is a Banach of. Can be identified with the sup norm will use from time to time to simplify other tasks help... mod ) is isomorphic to a subspace of X/M is with! K ) spaces out in two stages note that the quotient space ( read as ! This case, we will have M/G ≅ g * ; and the Poisson! A finite group inner product can change or contributors your own mixed with one of many yield! Forms … geometry of 3-manifolds … CAT ( k ) spaces the norm, so it a... That π transforms Xh on M, it defines a corresponding function h on M/G used the. M/G by H=h∘π i.e., different ways of quotienting lead to interesting mathematical structures 1 /E homeomorphic! The other three types of stories by Xh since flip PDF version because their difference vectors to. For creating Demonstrations and anything technical in, and let Y be a through. ( or by open mappings, etc. h is a G-invariant Hamiltonian function on M it. Set theory, group theory, group theory, field theory, linear algebra, topology, and others this. Lead to interesting mathematical structures your business and.Then the quotient space ( read as mod... Space locally looks like the quotient map does not increase distances ones by quotienting, feel free to ideas." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9037402,"math_prob":0.96600634,"size":25233,"snap":"2021-31-2021-39","text_gpt3_token_len":5907,"char_repetition_ratio":0.1582306,"word_repetition_ratio":0.18641278,"special_character_ratio":0.2331867,"punctuation_ratio":0.14187329,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99105346,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-20T23:28:53Z\",\"WARC-Record-ID\":\"<urn:uuid:0c3c2749-59f1-4c6f-8e83-8b948e51ee28>\",\"Content-Length\":\"85419\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:851d8b1d-d310-4abd-bc54-7514f2ff78ec>\",\"WARC-Concurrent-To\":\"<urn:uuid:ac426186-be2f-4b35-91be-187b493027a4>\",\"WARC-IP-Address\":\"96.30.49.184\",\"WARC-Target-URI\":\"https://premedicaluniversity.com/s9d4sp/271de2-quotient-space-examples\",\"WARC-Payload-Digest\":\"sha1:WXT4Z3N556PGJXPY3II4VJPTXC32ZLT2\",\"WARC-Block-Digest\":\"sha1:FO6R7KM7HGZXJSSL4WER253W6MV53ULC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057119.85_warc_CC-MAIN-20210920221430-20210921011430-00422.warc.gz\"}"}
https://www.netcomputerscience.com/2017/08/c-cpp-programming-mcqs-set-42.html
[ "# C & C++ Programming Multiple Choice Questions - Set 42\n\n1.       A possible output of the following program fragment is\nfor (i=getchar();; i=get.char())\nif (i==‘x’) break;\nelse putchar(i);\n(A) mi\n(B) mix\n(C) mixx\n(D) none of the above\nExplanation:\nNone of the above as it is wrong syntax.\n2.       int **ptr; is\n(A) Invalid declaration\n(B) Pointer to pointer\n(C) Pointer to integer\n(D) none of the above\n3.       The address of a variable temp of type float is\n(A) *temp\n(B) &temp\n(C) float& temp\n(D) float temp&\n4.       What is the output of the following code\nchar symbol={‘a’,‘b’,‘c’};\nfor (int index=0; index<3; index++)\ncout << symbol [index];\n(A) a b c\n(B) “abc”\n(C) abc\n(D) ‘abc’\n5.       The process of building new classes from existing one is called .............\n(A) Polymorphism\n(B) Structure\n(C) Inheritance\n\n6.       If a class C is derived from class B, which is derived from class A, all through public\ninheritance, then a class C member function can access\n(A) protected and public data only in C and B.\n(B) protected and public data only in C.\n(C) private data in A and B.\n(D) protected data in A and B.\n7.       If the variable count exceeds 100, a single statement that prints “Too many” is\n(A) if (count<100) cout << “Too many”;\n(B) if (count>100) cout >> “Too many”;\n(C) if (count>100) cout << “Too many”;\n(D) None of these.\n8.       Usually a pure virtual function\n(A) has complete function body.\n(B) will never be called.\n(C) will be called only to delete an object.\n(D) is defined only in derived class.\n9.       The output of the following will be\nfor (x=1, y=5; x+y<=10; x++)\n{\nprintf(“%d%d”, x,y);\ny++;\n}\n(A)          1 5\n2 6\n3 7\n(B)          1 5\n2 6\n3 7\n4 8\n(C)          1 5\n1 6\n1 7\n1 8\n1 9\n(D)          1 5\n2 5\n3 5\n4 5\n5 5" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7077251,"math_prob":0.9726823,"size":1888,"snap":"2022-40-2023-06","text_gpt3_token_len":625,"char_repetition_ratio":0.13110404,"word_repetition_ratio":0.044198897,"special_character_ratio":0.3644068,"punctuation_ratio":0.19017094,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9752618,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-27T00:50:09Z\",\"WARC-Record-ID\":\"<urn:uuid:eaf7414b-c6ab-441f-9111-20aaced7c1a2>\",\"Content-Length\":\"301341\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5c47146d-1429-4795-bda0-ebf86d02cbed>\",\"WARC-Concurrent-To\":\"<urn:uuid:0afe20be-2479-44e6-bb94-291ad6b51896>\",\"WARC-IP-Address\":\"172.253.115.121\",\"WARC-Target-URI\":\"https://www.netcomputerscience.com/2017/08/c-cpp-programming-mcqs-set-42.html\",\"WARC-Payload-Digest\":\"sha1:E4HJNX7JOFSFKZFC2LATBVLCMVYDN523\",\"WARC-Block-Digest\":\"sha1:M6PO6YMAB3LT4CFP7SRNDF7IHVDZYCQD\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764494852.95_warc_CC-MAIN-20230127001911-20230127031911-00104.warc.gz\"}"}
https://www.jiskha.com/questions/509143/a-company-maufacturing-surfboards-has-fixed-costs-of-300-per-day-and-total-costs-of-5100
[ "# calculus\n\na company maufacturing surfboards has fixed costs of \\$300 per day and total costs of \\$5100 per day for a daily output of 20 boards. Assume the total cost per day C(x) is linearly related to the total output per day x. write an equation for the cost function, and write an equation for the average cost function Ċ(x)=c(x)/x. what does the average cost per board tend to as production increases (assume production output goes to infinity)?\n\n1. 👍 0\n2. 👎 0\n3. 👁 232\n\n## Similar Questions\n\n1. ### Algebra\n\nThe Oliver Company plans to market a new product. Based on its market studies, Oliver estimates that it can sell up to 4,500 units in 2005. The selling price will be \\$2 per unit. Variable costs are estimated to be 20% of total\n\n2. ### math HELP!\n\nKara's custom tees experienced fixed costs of \\$300 and variable costs of \\$5 a shirt. write and equation that can be used to determine the total expenses encountered by kara's custom tee's. Let x be the number of shirts and let\n\n3. ### Personal Finance\n\nCheck my work pls. 1. The components of ___ are variable costs and fixed costs. A. Entire cost B. Total cost* C. Complete cost D. Required cost 2. What is the margin of safety? A. How much sales can fall before a business starts\n\n4. ### Economics\n\nPROBLEM SOLVING 1: \"ANDREA'S SOFTWARE BUSINESS\" I. Complete the following table: DO THE MATH Data Number of Programs Total Fixed Costs Total Variable Costs Total Costs Marginal Costs Average Fixed Costs Average Variable Costs\n\n1. ### Algebra\n\nThe RideEm Bicycles factory can produce 140 bicycles in a day at a total cost of \\$10,200 and it can produce 160 bicycles in a day at a total cost of \\$10,900. What are the company's daily fixed costs? What is the marginal cost per\n\n2. ### Economics\n\nSay you are the manager of a perfectly competitive firm selling a product. Your business is making a loss because total revenue is less than total costs. What would you do--shut down or continue to operate? Use hypothetical\n\n3. ### Accounting\n\nIf fixed costs are \\$300,000, the unit selling price is \\$31, and the unit variable costs are \\$22, what is the break-even sales (units) if fixed costs are reduced by \\$30,000? Answer 30,000 units 8,710 units 12,273 units 20,000 units\n\n4. ### algebra\n\nA restaurant has fixed costs of \\$156.25 per day and an average unit cost of \\$4.75 for each meal served. If a typical meal costs \\$6, how many customers must eat at the restaurant each day for the owner to break even?\n\n1. ### cost accounting\n\nThe East Company manufactures several different products. Unit costs associated with Product ORD203 are as follows: Direct materials \\$50 Direct manufacturing labor 8 Variable manufacturing overhead 10 Fixed manufacturing overhead\n\n2. ### Economics\n\nYou’ve been hired by an unprofitable firm to determine whether it should shut down its unprofitable operation. The firm currently uses 70 workers to produce 300 units of output per day. The daily wage (per worker) is \\$100, and\n\n3. ### Economics\n\nThe accompanying table shows a car manufacturer’s total cost of producing cars: Qty |TC| Variable Costs| Avg. Var. Costs| Avg. Total Costs| Avg. Fixed Costs 0 |\\$500,000| ---- | ---- | ---- |---- | 1 |540,000 | 2 |560,000 | 3\n\n4. ### College Algebra\n\nA yo-yo factory has fixed operating costs of \\$450,000 per year. In addition to the fixed costs, the cost to produce one yo-yo is \\$1.10. The yo-yo company sells the yo-yos to a distributor for \\$5.50 each. How many yo-yos must be" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9037739,"math_prob":0.8036558,"size":3009,"snap":"2020-34-2020-40","text_gpt3_token_len":756,"char_repetition_ratio":0.12479201,"word_repetition_ratio":0.018867925,"special_character_ratio":0.27218345,"punctuation_ratio":0.10720268,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97502446,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-18T21:17:04Z\",\"WARC-Record-ID\":\"<urn:uuid:afcab062-2f15-43fd-b5ed-6ec302729c5b>\",\"Content-Length\":\"17021\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c2133fe1-ce5f-475a-bba2-b05885adeb3a>\",\"WARC-Concurrent-To\":\"<urn:uuid:1489a1ab-4c00-4356-b8d8-97a727ce44cb>\",\"WARC-IP-Address\":\"66.228.55.50\",\"WARC-Target-URI\":\"https://www.jiskha.com/questions/509143/a-company-maufacturing-surfboards-has-fixed-costs-of-300-per-day-and-total-costs-of-5100\",\"WARC-Payload-Digest\":\"sha1:HYZGVMS32F2LNLZUIS2RLM64GKE2WGQZ\",\"WARC-Block-Digest\":\"sha1:EQSRAU5DDBZDYRT3LQ6GWAMNBF72IKQW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400188841.7_warc_CC-MAIN-20200918190514-20200918220514-00021.warc.gz\"}"}
https://socratic.org/questions/59686edab72cff2edb1f82c8
[ "# A 5.95*g mass of potassium bromide were dissolved in 400*cm^3 water ... what was the concentration of the solution in mol*L^-1?\n\nApprox. $0.1 \\cdot m o l \\cdot {L}^{-} 1$......................\nWe use the quotient.....$\\text{Molarity\"-=\"Moles of solute\"/\"Volume of solution}$, and we know that $1 \\cdot c {m}^{3} \\equiv 1 \\cdot m L \\equiv {10}^{-} 3 \\cdot L$......\nAnd thus $\\text{Molarity} = \\frac{\\frac{5.95 \\cdot g}{119.0 \\cdot g \\cdot m o {l}^{-} 1}}{400 \\cdot c {m}^{3} \\times {10}^{-} 3 \\cdot L \\cdot c {m}^{-} 3}$\n$= 0.125 \\cdot m o l \\cdot {L}^{-} 1$ with respect to $K B r$. What are the concentrations with respect to ${K}^{+}$ and $B {r}^{-}$? Are the units I use correct?" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82376075,"math_prob":0.9998579,"size":338,"snap":"2023-14-2023-23","text_gpt3_token_len":88,"char_repetition_ratio":0.10778443,"word_repetition_ratio":0.0,"special_character_ratio":0.28698224,"punctuation_ratio":0.18055555,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999144,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-07T22:32:13Z\",\"WARC-Record-ID\":\"<urn:uuid:831991ef-19c3-48d7-88a1-feb2e0ded62a>\",\"Content-Length\":\"33130\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a5d15ea5-b772-4760-901b-5453e7cc4f82>\",\"WARC-Concurrent-To\":\"<urn:uuid:51f3ef44-5583-4c42-b005-3dda88424b46>\",\"WARC-IP-Address\":\"216.239.36.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/59686edab72cff2edb1f82c8\",\"WARC-Payload-Digest\":\"sha1:QJRKLSF5VVDKOW5YDR67VHDGP6XJ3273\",\"WARC-Block-Digest\":\"sha1:E3H3XVHXLXYBXTPU5PTBSB2WN65UMR5Z\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224654016.91_warc_CC-MAIN-20230607211505-20230608001505-00288.warc.gz\"}"}
https://jojoworksheet.com/angle-measures-and-segment-lengths-worksheet-answers/
[ "", null, "", null, "# Angle Measures And Segment Lengths Worksheet Answers\n\nIn the diagram, a tangent and a chord form two vertexes in the interior of the circle. Angles and segments of light arc lengths some crazy the worksheets for this. Arcs and chords worksheet answers.\n\n### 8 Images About Naming Angles Classifying Angles Angle Bisector Answers Are On The Bottom Of The.\n\nWeb answers form g test, secants and y answers. Measuring segments and angles worksheet answer key | new. Angles and segments of light arc lengths some crazy the worksheets for this.\n\n### Then, By Our Theorem, The Product Of The Secant Segment R T ¯ With Its External Portion S.\n\nHere we have two secant segments, r t ¯ and l t ¯, intersecting outside a circle. Web geometry ~ chapter 12,lesson 4: Geometry segments lengths in circles worksheet answer.\n\n### Worksheet 2 Geometry F11 Segment And Angles Answer.\n\nWeb download measuring segments and angles worksheet answer key: Arcs and chords worksheet answers. Web the sum of the measures of the interior angles of a quadrilateral is 360°.\n\n### Answer Choices 130 65 44 86 Question 15 60 Seconds Q.\n\nWeb what is the measure of angle 1? Angle measures and segment lengths www.youtube.com. Web angle worksheets help students find missing angles on graphs by using the complementary, supplementary, and vertical angle relationships." ]
[ null, "http://chordpapa.com/wp-content/uploads/2022/11/close.png", null, "http://chordpapa.com/wp-content/uploads/2022/11/close.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.79138553,"math_prob":0.7629454,"size":1430,"snap":"2022-40-2023-06","text_gpt3_token_len":313,"char_repetition_ratio":0.18092567,"word_repetition_ratio":0.13247864,"special_character_ratio":0.21888112,"punctuation_ratio":0.12267658,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99338305,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-06T03:45:01Z\",\"WARC-Record-ID\":\"<urn:uuid:5044aa62-a5aa-45fe-b3c1-82ea0448d77d>\",\"Content-Length\":\"58427\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ef29e3a8-ce65-4da8-8c97-c316cbea803f>\",\"WARC-Concurrent-To\":\"<urn:uuid:e5564d68-b217-4977-906e-c42efe9c54da>\",\"WARC-IP-Address\":\"104.21.42.121\",\"WARC-Target-URI\":\"https://jojoworksheet.com/angle-measures-and-segment-lengths-worksheet-answers/\",\"WARC-Payload-Digest\":\"sha1:MC4GRNRO6BF765SGPWXGDCHEFBRBLNX4\",\"WARC-Block-Digest\":\"sha1:22OFDOE5J6PNN7MAE6UQSBKFDQMCKAJH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500303.56_warc_CC-MAIN-20230206015710-20230206045710-00127.warc.gz\"}"}
https://blog.slkun.me/tag/%E6%95%B0%E6%8D%AE%E5%BA%93%E8%8C%83%E5%BC%8F/
[ "### 1NF: 字段不可分\n\n• 属性的原子性约束\n• 一个数据库中字段不能包含多个可分的字段\n\n• 比如说不能把手机和邮箱记录在同一个字段中\n• 同理, 把多个手机记录在同一个字段中也是不合适的\n\n### 2NF: 非主键字段完全依赖于主键 (消除部分子函数依赖)\n\n• 记录的惟一性约束\n• 消除了主键组合字段之间的依赖\n• 反例: 两个独立的组合主键 (K1, K2) -> (V1, V2) | (K1) -> (V1), (K2) -> (V2), (K1) -> (K2)\n\n• 修改为: (K1) -> (V1), (K2) -> (V2), (K1) -> (K2)\n\n### 3NF: 非主键字段不依赖于其它非主键字段 (消除传递依赖)\n\n• 字段冗余性的约束\n• 消除了非主键字段之间的依赖\n• 不存在非主键字段对任一候选主键的传递函数依赖\n• 数据冗余: V1依赖于V2, 导致多个重复V1时, V2也发生重复 (K1) -> (V1, V2) | (V1) -> (V2)\n\n• 修改为: (K1) -> (V1), (V1) -> (V2)\n\n### BCNF: 任何字段不依赖于其他字段 (消除传递依赖)\n\n• 字段冗余性的约束\n• 消除了所有字段之间的依赖(\n• 不存在任何字段对任一候选主键的传递函数依赖\n• 主键依赖主键: (K1, K2) -> (V1) | (K1) -> (K2)\n\n• 修改为: (K1) -> (V1), (K1) -> (K2)\n• 与3NF的主要区别是: 3NF只考虑了非主键字段之间的依赖, 而没有考虑主键组合字段之间的依赖, BCNF是一种更严格的3NF" ]
[ null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.8274368,"math_prob":0.9897512,"size":703,"snap":"2022-27-2022-33","text_gpt3_token_len":608,"char_repetition_ratio":0.21316166,"word_repetition_ratio":0.18446602,"special_character_ratio":0.42674252,"punctuation_ratio":0.27450982,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95832324,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-06T16:53:23Z\",\"WARC-Record-ID\":\"<urn:uuid:e139e728-d3fc-4f1f-b50f-6452b1081a28>\",\"Content-Length\":\"26990\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f5f9a36c-9323-4457-af80-8a5f1caf0751>\",\"WARC-Concurrent-To\":\"<urn:uuid:2e853df0-ef35-4e49-98eb-012e8c30a18a>\",\"WARC-IP-Address\":\"162.220.9.15\",\"WARC-Target-URI\":\"https://blog.slkun.me/tag/%E6%95%B0%E6%8D%AE%E5%BA%93%E8%8C%83%E5%BC%8F/\",\"WARC-Payload-Digest\":\"sha1:VTY4KYPNM3MSVE3KKRYQ57VKCBATUOGP\",\"WARC-Block-Digest\":\"sha1:GXNAVJLFCUKGURAMH5HDIOCKFW6U6LPX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104675818.94_warc_CC-MAIN-20220706151618-20220706181618-00760.warc.gz\"}"}
https://scholar.archive.org/work/zb4ht6pu4rdr7hotmm5l7mjqxm
[ "### Reconstruction and Clustering in Random Constraint Satisfaction Problems\n\nAndrea Montanari, Ricardo Restrepo, Prasad Tetali\n2011 SIAM Journal on Discrete Mathematics\nRandom instances of Constraint Satisfaction Problems (CSP's) appear to be hard for all known algorithms, when the number of constraints per variable lies in a certain interval. Contributing to the general understanding of the structure of the solution space of a CSP in the satisfiable regime, we formulate a set of natural technical conditions on a large family of (random) CSP's, and prove bounds on three most interesting thresholds for the density of such an ensemble: namely, the satisfiability\nmore » ... the satisfiability threshold, the threshold for clustering of the solution space, and the threshold for an appropriate reconstruction problem on the CSP's. The bounds become asymptoticlally tight as the number of degrees of freedom in each clause diverges. The families are general enough to include commonly studied problems such as, random instances of Not-All-Equal-SAT, k-XOR formulae, hypergraph 2coloring, and graph k-coloring. An important new ingredient is a condition involving the Fourier expansion of clauses, which characterizes the class of problems with a similar threshold structure. * Given a set of n variables taking values in a finite alphabet, and a collection of m constraints, each restricting a subset of variables, a Constraint Satisfaction Problem (CSP) requires finding an assignment to the variables that satisfies the given constraints. Important examples include k-SAT, Not All Equal SAT, graph (vertex) coloring with k colors etc. Understanding the threshold of satisfiability/unsatisfiability for random instances of CSPs, as the number of constraints m = m(n) varies, has been a challenging task for the past couple of decades, with some notable successes (see e.g., [ANP05]). On the algorithmic side, the challenge of finding solutions of a random CSP close to the threshold of satisfiability (in the regime where solutions are known to exist) remains widely open. All provably polynomial-time algorithms fail well before the SAT to UNSAT threshold. The attempt to understand this universal failure led to studying the geometry of the set of solutions of random CSPs [MPZ02, AC08], as well as the emergence of long range correlations among variables in random satisfying assignments [KM+07] . These research directions are motivated by two heuristic explanations of the failure of polynomial algorithms: (1) The space of solutions becomes increasingly complicated as the number of constraints increases and is not captured correctly by simple algorithms; (2) Typical solutions become increasingly correlated and local algorithms cannot unveil such correlations. By analyzing a large class of random CSP ensembles, this paper provides strong support to the belief that the above phenomena are generic, that they are characterized by sharp thresholds, and that the thresholds for clustering and reconstruction do coincide." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8983102,"math_prob":0.97151965,"size":3085,"snap":"2021-31-2021-39","text_gpt3_token_len":614,"char_repetition_ratio":0.12301201,"word_repetition_ratio":0.0044345898,"special_character_ratio":0.18670988,"punctuation_ratio":0.10058027,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98552173,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-21T12:21:50Z\",\"WARC-Record-ID\":\"<urn:uuid:b90c1742-c70b-417d-aae3-484fab16bc03>\",\"Content-Length\":\"18689\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:98a8a0fb-9d99-4592-b44d-db0dfc6d54af>\",\"WARC-Concurrent-To\":\"<urn:uuid:eb96f994-17fb-4cd8-82bb-7c88589a7fe2>\",\"WARC-IP-Address\":\"207.241.225.9\",\"WARC-Target-URI\":\"https://scholar.archive.org/work/zb4ht6pu4rdr7hotmm5l7mjqxm\",\"WARC-Payload-Digest\":\"sha1:RJGHPR5KDJKEECPJ46NWDP7IVHISX34P\",\"WARC-Block-Digest\":\"sha1:74IBQDFJACTTWE3KFL374GX2M3SHZPR5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057202.68_warc_CC-MAIN-20210921101319-20210921131319-00525.warc.gz\"}"}
https://teachers.net/lessons/posts/3536.html
[ "Subject Area Lessons\n\n## #3536. Pass the Pencil\n\nMathematics, level: Middle\nPosted Sun Jul 31 20:40:53 PDT 2005 by Kristen Fannin (kfann02@yahoocom).\nLakeview Centennial H.S., Garland, Tx, USA\nMaterials Required: pencil\nActivity Time: 10 minutes\nConcepts Taught: Algebra linear equations\n\nPASS THE PENCIL\nObjective: Students will be able to complete various algebraic equations working as a team to complete the set.\n\nBegin by grouping the students in groups of five. Within these groups, one student is designated as student A, another as student B, etc. All \"A\" students should write down equation A, all \"B\" students should write down equation B, etc.\n\nThe teacher begins the activity by annoucing the value of the variable \"a.\" All \"A\" students substitute this value into their equation to find the value of \"b\" which they then whisper to the \"B\" students. All \"B\" students then substitute this value into their equation to find the value of variable \"c,\" etc. The winning group is the first to find the value of the variable \"f.\"\n\nExample Problems:\n\nEquation A: b=3a+5\nEquation B: c=2b-12\nEquation C: d=(c+4)/2\nEquation D: e=(d*d)-13\nEquation E: f=e/3+11\n\nTeacher given: a=1\n\nHave the students clear their desks and give the first person in each row the hand out and a pencil. The first group to complete the sheet with all of the correct answers is the winner.", null, "" ]
[ null, "https://teachers.net/z.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9290586,"math_prob":0.94483906,"size":1108,"snap":"2022-05-2022-21","text_gpt3_token_len":278,"char_repetition_ratio":0.17572464,"word_repetition_ratio":0.101604275,"special_character_ratio":0.2400722,"punctuation_ratio":0.11304348,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99893755,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-25T22:16:30Z\",\"WARC-Record-ID\":\"<urn:uuid:426acdf9-ea96-43a7-9654-283b4ceea7f5>\",\"Content-Length\":\"24945\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a2b6c848-baf2-4ced-91a2-4eec44e3adcc>\",\"WARC-Concurrent-To\":\"<urn:uuid:8675e5bf-a190-4524-9e2e-cdbc2bb3e325>\",\"WARC-IP-Address\":\"52.43.172.199\",\"WARC-Target-URI\":\"https://teachers.net/lessons/posts/3536.html\",\"WARC-Payload-Digest\":\"sha1:66EZK53BYMH5T5W3C4CWJXAAW3R3NTDS\",\"WARC-Block-Digest\":\"sha1:UEB7AO55X5R2J3S5NPDGLSJH72JWULUR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662594414.79_warc_CC-MAIN-20220525213545-20220526003545-00709.warc.gz\"}"}
http://irvlab.cs.umn.edu/robot-localization/continuous-time-spline-visual-inertial-odometry
[ "# Continuous-Time Spline Visual-Inertial Odometry\n\n## Abstract\n\nWe propose a continuous-time spline-based formulation for visual-inertial odometry (VIO). Specifically, we model the poses as a cubic spline, whose temporal derivatives are used to synthesize linear acceleration and angular velocity, which are compared to the measurements from the inertial measurement unit (IMU) for optimal state estimation. The spline boundary conditions create constraints between the camera and the IMU, with which we formulate VIO as a constrained nonlinear optimization problem. Continuous-time pose representation makes it possible to address many VIO challenges, e.g., rolling shutter distortion and sensors that may lack synchronization. We conduct experiments on two publicly available datasets that demonstrate the state-of-the-art accuracy and real-time computational efficiency of our method.\n\n## Method", null, "Factor Graph", null, "State Vector", null, "Energy Function", null, "Spline Position", null, "Spline Rotation", null, "Accelerator Synthesis", null, "Gyroscope Synthesis", null, "Velocity Continunity Constraint", null, "Rotation Continunity Constraint\n\n## Results", null, "The proposed VIO system running on MH1 of EuRoC dataset. The estimated trajectory (red) is well aligned (by SE(3)) to the ground-truth poses (green). The scale is also recovered accurately.", null, "RMSEs (in meters) of 10 runs (rows) for different methods on each sequence (columns) from EuRoC dataset (MH, V1, V2) and TUM VI dataset (TR). DSO results are aligned with Sim(3); VI-DSO and SplineVIO are  aligned with SE(3).", null, "The median RMSEs over 10 runs for different methods on each sequence from EuRoC dataset and TUM VI dataset. For VI-DSO, are the results of the 3rd party implementation; are the original results reported in the paper , we include these results for reference.", null, "Computational Efficiency" ]
[ null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_factor.jpg", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_state.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_energy.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_position.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_rotation.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_acc.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_gyro.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_cv.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_cr.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_mh1.jpg", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_rmse.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_median.png", null, "http://irvlab.cs.umn.edu/sites/irvlab.dl.umn.edu/files/styles/panopoly_image_original/public/media/spline_vio_time.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89736545,"math_prob":0.8561395,"size":1704,"snap":"2021-43-2021-49","text_gpt3_token_len":370,"char_repetition_ratio":0.09941176,"word_repetition_ratio":0.016460905,"special_character_ratio":0.19483568,"punctuation_ratio":0.090277776,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9514193,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-18T09:55:58Z\",\"WARC-Record-ID\":\"<urn:uuid:c6774c83-6abe-456c-ae6d-536a1cdbcac7>\",\"Content-Length\":\"60642\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bf4e8365-fe76-46ee-8c97-79aa63626aa8>\",\"WARC-Concurrent-To\":\"<urn:uuid:9e74c6c4-ed8b-474f-878b-15af0c70c956>\",\"WARC-IP-Address\":\"50.16.196.169\",\"WARC-Target-URI\":\"http://irvlab.cs.umn.edu/robot-localization/continuous-time-spline-visual-inertial-odometry\",\"WARC-Payload-Digest\":\"sha1:RZN65RTTZ2LVKXVXNFRBYERQIALSCGDK\",\"WARC-Block-Digest\":\"sha1:6CGGXXYDNKFJM2Z3EREWMVOVL5Z3764M\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585201.94_warc_CC-MAIN-20211018093606-20211018123606-00512.warc.gz\"}"}
http://mathschoolinternational.com/Physics-Books/Quantum-Physics/Molecular-Quantum-Mechanics-by-Peter-Atkins.aspx
[ "Math shortcuts, Articles, worksheets, Exam tips, Question, Answers, FSc, BSc, MSc\n\n#### Keep Connect with Us\n\n• =", null, "• Welcome in Math School.\n• This is beta verion of our website.\n\nMolecular Quantum Mechanics (Fourth Edition) by Peter Atkins and Ronald Friedman\n\nMathSchoolinternational.com contain houndreds of Free Physics eBooks. Which cover almost all topics of physics. To see an extisive list of Quantum Physics eBooks . We hope you like these books.\n\n'", null, "Molecular Quantum Mechanics (Fourth Edition) written by Peter Atkins , University of Oxford and Ronald Friedman , Indiana Purdue Fort Wayne. One major change since the third edition has been our response to concerns about the mathematical complexity of the material. We have not sacrificed the mathematical rigour of the previous edition but we have tried in numerous ways to make the mathematics more accessible. We have introduced short commentaries into the text to remind the reader of the mathematical fundamentals useful in derivations. We have included more worked examples to provide the reader with further opportunities to see formulae in action. We have added new problems for each chapter. We have expanded the discussion on numerous occasions within the body of the text to provide further clarification for or insight into mathematical results. We have set aside Proofs and Illustrations (brief examples) from the main body of the text so that readers may find key results more readily. Where the depth of presentation started to seem too great in our judgement, we have sent material to the back of the chapter in the form of an Appendix or to the back of the book as a Further information section. Numerous equations are tabbed with www to signify that on the Website to accompany the text [www.oup.com/uk/ booksites/chemistry/] there are opportunities to explore the equations by substituting numerical values for variables.\n\nMolecular Quantum Mechanics (Fourth Edition) written by Peter Atkins and Ronald Friedman cover the following topics.\n\n• Introduction and orientation\n0.2 Heat capacities\n0.3 The photoelectric and Compton effects\n0.4 Atomic spectra\n0.5 The duality of matter\nP R O B L E M S\n\n• 1. The foundations of quantum mechanics\n\n• Operators in quantum mechanics\n1.1 Linear operators\n1.2 Eigenfunctions and eigenvalues\n1.3 Representations\n1.4 Commutation and non-commutation\n1.5 The construction of operators\n1.6 Integrals over operators\n1.7 Dirac bracket notation\n1.8 Hermitian operators\n\n• The postulates of quantum mechanics\n1.9 States and wavefunctions\n1.10 The fundamental prescription\n1.11 The outcome of measurements\n1.12 The interpretation of the wavefunction\n1.13 The equation for the wavefunction\n1.14 The separation of the Schro¨ dinger equation\n\n• The specification and evolution of states\n1.15 Simultaneous observables\n1.16 The uncertainty principle\n1.17 Consequences of the uncertainty principle\n1.18 The uncertainty in energy and time\n1.19 Time-evolution and conservation laws\n\n• Matrices in quantum mechanics\n1.20 Matrix elements\n1.21 The diagonalization of the hamiltonian\n\n• The plausibility of the Schro¨ dinger equation\n1.22 The propagation of light\n1.23 The propagation of particles\n1.24 The transition to quantum mechanics\nP R O B L E M S\n\n• 2. Linear motion and the harmonic oscillator\n\n• The characteristics of acceptable wavefunctions\n\n• Some general remarks on the Schro¨ dinger equation\n2.1 The curvature of the wavefunction\n2.2 Qualitative solutions\n2.3 The emergence of quantization\n2.4 Penetration into non-classical regions\n\n• Translational motion\n2.5 Energy and momentum\n2.6 The significance of the coefficients\n2.7 The flux density\n2.8 Wavepackets\n\n• Penetration into and through barriers\n2.9 An infinitely thick potential wall\n2.10 A barrier of finite width\n2.11 The Eckart potential barrier\n\n• Particle in a box\n2.12 The solutions\n2.13 Features of the solutions\n2.14 The two-dimensional square well\n2.15 Degeneracy\n\n• The harmonic oscillator\n2.16 The solutions\n2.17 Properties of the solutions\n2.18 The classical limit\n\n• Translation revisited: The scattering matrix P R O B L E M S\n\n• 3. Rotational motion and the hydrogen atom\n\n• Particle on a ring\n3.1 The hamiltonian and the Schro¨ dinger equation\n3.2 The angular momentum\n3.3 The shapes of the wavefunctions\n3.4 The classical limit\n\n• Particle on a sphere\n3.5 The Schro¨ dinger equation and its solution\n3.6 The angular momentum of the particle\n3.7 Properties of the solutions\n3.8 The rigid rotor\n\n• Motion in a Coulombic field\n3.9 The Schro¨ dinger equation for hydrogenic atoms\n3.10 The separation of the relative coordinates\n3.11 The radial Schro¨ dinger equation\n3.12 Probabilities and the radial distribution function\n3.13 Atomic orbitals\n3.14 The degeneracy of hydrogenic atoms\nP R O B L E M S\n\n• 4. Angular momentum\n\n• The angular momentum operators\n4.1 The operators and their commutation relations\n4.2 Angular momentum observables\n4.3 The shift operators\n\n• The definition of the states\n4.4 The effect of the shift operators\n4.5 The eigenvalues of the angular momentum\n4.6 The matrix elements of the angular momentum\n4.7 The angular momentum eigenfunctions\n4.8 Spin\n\n• The angular momenta of composite systems\n4.9 The specification of coupled states\n4.10 The permitted values of the total angular momentum\n4.11 The vector model of coupled angular momenta\n4.12 The relation between schemes\n4.13 The coupling of several angular momenta\nP R O B L E M S\n\n• 5. Group theory\n\n• The symmetries of objects\n5.1 Symmetry operations and elements\n5.2 The classification of molecules\n\n• The calculus of symmetry\n5.3 The definition of a group\n5.4 Group multiplication tables\n5.5 Matrix representations\n5.6 The properties of matrix representations\n5.7 The characters of representations\n5.8 Characters and classes\n5.9 Irreducible representations\n5.10 The great and little orthogonality theorems\n\n• Reduced representations\n5.11 The reduction of representations\n\n• The symmetry properties of functions\n5.13 The transformation of p-orbitals\n5.14 The decomposition of direct-product bases\n5.15 Direct-product groups\n5.16 Vanishing integrals\n5.17 Symmetry and degeneracy\n\n• The full rotation group\n5.18 The generators of rotations\n5.19 The representation of the full rotation group\n5.20 Coupled angular momenta\nApplications\nP R O B L E M S\n\n• 6. Techniques of approximation\n\n• Time-independent perturbation theory\n6.1 Perturbation of a two-level system\n6.2 Many-level systems\n6.3 The first-order correction to the energy\n6.4 The first-order correction to the wavefunction\n6.5 The second-order correction to the energy\n6.6 Comments on the perturbation expressions\n6.7 The closure approximation\n6.8 Perturbation theory for degenerate states\n\n• Variation theory\n6.9 The Rayleigh ratio\n6.10 The Rayleigh–Ritz method The Hellmann–Feynman theorem\n\n• Time-dependent perturbation theory\n6.11 The time-dependent behaviour of a two-level system\n6.12 The Rabi formula\n6.13 Many-level systems: the variation of constants\n6.14 The effect of a slowly switched constant perturbation\n6.15 The effect of an oscillating perturbation\n6.16 Transition rates to continuum states\n6.17 The Einstein transition probabilities\nP R O B L E M S\n\n• 7. Atomic spectra and atomic structure\n\n• The spectrum of atomic hydrogen\n7.1 The energies of the transitions\n7.2 Selection rules\n7.3 Orbital and spin magnetic moments\n7.4 Spin–orbit coupling\n7.5 The fine-structure of spectra\n7.6 Term symbols and spectral details\n7.7 The detailed spectrum of hydrogen\n\n• The structure of helium\n7.8 The helium atom\n7.9 Excited states of helium\n7.10 The spectrum of helium\n7.11 The Pauli principle\n\n• Many-electron atoms\n7.12 Penetration and shielding\n7.13 Periodicity\n7.14 Slater atomic orbitals\n7.15 Self-consistent fields\n7.16 Term symbols and transitions of many-electron atoms\n7.17 Hund’s rules and the relative energies of terms\n7.18 Alternative coupling schemes\n\n• Atoms in external fields\n7.19 The normal Zeeman effect\n7.20 The anomalous Zeeman effect\n7.21 The Stark effect\nP R O B L E M S\n\n• 8. An introduction to molecular structure\n\n• The Born–Oppenheimer approximation\n8.1 The formulation of the approximation\n8.2 An application: the hydrogen molecule–ion\n\n• Molecular orbital theory\n8.3 Linear combinations of atomic orbitals\n8.4 The hydrogen molecule\n8.5 Configuration interaction\n8.6 Diatomic molecules\n8.7 Heteronuclear diatomic molecules\n\n• Molecular orbital theory of polyatomic molecules\n8.9 Conjugated p-systems\n8.10 Ligand field theory\n8.11 Further aspects of ligand field theory\n\n• The band theory of solids\n8.12 The tight-binding approximation\n8.13 The Kronig–Penney model\n8.14 Brillouin zones\nP R O B L E M S\n\n• 9. The calculation of electronic structure\n\n• The Hartree–Fock self-consistent field method\n9.1 The formulation of the approach\n9.2 The Hartree–Fock approach\n9.3 Restricted and unrestricted Hartree–Fock\n\n• calculations\n9.4 The Roothaan equations\n9.5 The selection of basis sets\n9.6 Calculational accuracy and the basis set\n\n• Electron correlation\n9.7 Configuration state functions\n9.8 Configuration interaction\n9.9 CI calculations\n9.10 Multiconfiguration and multireference methods\n9.11 Møller–Plesset many-body perturbation theory\n9.12 The coupled-cluster method\n\n• Density functional theory\n9.13 Kohn–Sham orbitals and equations\n9.14 Exchange–correlation functionals\n\n• Gradient methods and molecular properties\n9.15 Energy derivatives and the Hessian matrix\n9.16 Analytical derivatives and the coupled perturbed equations\n\n• Semiempirical methods\n9.17 Conjugated p-electron systems\n9.18 Neglect of differential overlap\n\n• Molecular mechanics\n9.19 Force fields 333\n9.20 Quantum mechanics–molecular mechanics\nSoftware packages for electronic structure calculations\nP R O B L E M S\n\n• 10. Molecular rotations and vibrations\n\n• Spectroscopic transitions\n10.1 Absorption and emission\n10.2 Raman processes\n\n• Molecular rotation\n10.3 Rotational energy levels\n10.4 Centrifugal distortion\n10.5 Pure rotational selection rules\n10.6 Rotational Raman selection rules\n10.7 Nuclear statistics\n\n• The vibrations of diatomic molecules\n10.8 The vibrational energy levels of diatomic molecules\n10.9 Anharmonic oscillation\n10.10 Vibrational selection rules\n10.11 Vibration–rotation spectra of diatomic molecules\n10.12 Vibrational Raman transitions of diatomic molecules\n\n• The vibrations of polyatomic molecules\n10.13 Normal modes\n10.14 Vibrational selection rules for polyatomic molecules\n10.15 Group theory and molecular vibrations\n10.16 The effects of anharmonicity\n10.17 Coriolis forces\n10.18 Inversion doubling\nAppendix 10.1 Centrifugal distortion\nP R O B L E M S\n\n• 11. Molecular electronic transitions\n\n• The states of diatomic molecules\n11.1 The Hund coupling cases\n11.2 Decoupling and L-doubling\n11.3 Selection rules\n\n• Vibronic transitions\n11.4 The Franck–Condon principle\n11.5 The rotational structure of vibronic transitions\n\n• The electronic spectra of polyatomic molecules\n11.6 Symmetry considerations\n11.7 Chromophores\n11.8 Vibronically allowed transitions\n11.9 Singlet–triplet transitions\n\n• The fate of excited species\n11.12 The conservation of orbital symmetry\n11.13 Electrocyclic reactions\n11.15 Photochemically induced electrocyclic reactions\nP R O B L E M S\n\n• 12. The electric properties of molecules\n\n• The response to electric fields\n12.1 Molecular response parameters\n12.2 The static electric polarizability\n12.3 Polarizability and molecular properties\n12.4 Polarizabilities and molecular spectroscopy\n12.5 Polarizabilities and dispersion forces\n12.6 Retardation effects\n\n• Bulk electrical properties\n12.7 The relative permittivity and the electric susceptibility\n12.8 Polar molecules\n12.9 Refractive index\n\n• Optical activity\n12.10 Circular birefringence and optical rotation\n12.11 Magnetically induced polarization\n12.12 Rotational strength\nP R O B L E M S\n\n• 13. The magnetic properties of molecules\n\n• The descriptions of magnetic fields\n13.1 The magnetic susceptibility\n13.2 Paramagnetism\n13.3 Vector functions\n13.4 Derivatives of vector functions\n13.5 The vector potential\n\n• Magnetic perturbations\n13.6 The perturbation hamiltonian\n13.7 The magnetic susceptibility\n13.8 The current density\n13.9 The diamagnetic current density\n13.10 The paramagnetic current density\n\n• Magnetic resonance parameters\n13.11 Shielding constants\n13.12 The diamagnetic contribution to shielding\n13.13 The paramagnetic contribution to shielding\n13.14 The g-value\n13.15 Spin–spin coupling\n13.16 Hyperfine interactions\n13.17 Nuclear spin–spin coupling\nP R O B L E M S\n\n• 14. Scattering theory\n\n• The formulation of scattering events\n14.1 The scattering cross-section\n14.2 Stationary scattering states\n\n• Partial-wave stationary scattering states\n14.3 Partial waves\n14.4 The partial-wave equation\n14.5 Free-particle radial wavefunctions and the scattering phase shift\n14.6 The JWKB approximation and phase shifts\n14.7 Phase shifts and the scattering matrix element\n14.8 Phase shifts and scattering cross-sections\n14.9 Scattering by a spherical square well\n14.10 Background and resonance phase shifts\n14.11 The Breit–Wigner formula\n14.12 Resonance contributions to the scattering matrix element\n\n• Multichannel scattering\n14.13 Channels for scattering\n14.14 Multichannel stationary scattering states\n14.15 Inelastic collisions\n14.16 The S matrix and multichannel resonances\n\n• The Green’s function\n14.17 The integral scattering equation and Green’s functions\n14.18 The Born approximation\nAppendix 14.1 The derivation of the Breit–Wigner formula\nAppendix 14.2 The rate constant for reactive scattering\n\n##### Books Quantum Physics\n\nMeasurement by Paul Lockhart\n• Free\n• English\n• PDF\n• Page 416\n##### SHORTCUT TRICKS (Division)\n• Divisible by 2 Shortcut trick\n• Divisible by 3 Shortcut trick\n• Divisible by 4 Shortcut trick\n• Divisible by 5 Shortcut trick\n• Divisible by 6 Shortcut trick", null, "• Divisible by 7 Shortcut trick", null, "• Divisible by 8 Shortcut trick", null, "• Divisible by 9 Shortcut trick\n• Divisible by 10 Shortcut trick\n\n##### Worksheets (Solved)\n\n###### Integration", null, "", null, "", null, "", null, "", null, "" ]
[ null, "http://mathschoolinternational.com/images/logoMedium.gif", null, "http://mathschoolinternational.com/Physics-Books/Quantum-Physics/Books/Molecular-Quantum-Mechanics-by-Peter-Atkins.jpg", null, "http://mathschoolinternational.com/Images/New.gif", null, "http://mathschoolinternational.com/Images/New.gif", null, "http://mathschoolinternational.com/Images/New.gif", null, "http://mathschoolinternational.com/Images/New.gif", null, "http://mathschoolinternational.com/images/advertise-here2.jpg", null, "http://mathschoolinternational.com/images/ExamTips.png", null, "http://mathschoolinternational.com/images\\100Marks.jpg", null, "http://mathschoolinternational.com/Physics-Books/Quantum-Physics/..\\..\\images\\Times-of-India-Education-Display-Ads.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7280531,"math_prob":0.8446603,"size":13478,"snap":"2019-51-2020-05","text_gpt3_token_len":3283,"char_repetition_ratio":0.1448716,"word_repetition_ratio":0.03962944,"special_character_ratio":0.22584954,"punctuation_ratio":0.11333334,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9694603,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,null,null,2,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-26T07:03:12Z\",\"WARC-Record-ID\":\"<urn:uuid:eb012880-7bdc-40f2-ae16-1f25a374d42d>\",\"Content-Length\":\"78736\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b8045098-da3f-42bf-b28d-92618b22e055>\",\"WARC-Concurrent-To\":\"<urn:uuid:e5738771-f0af-401d-b5cb-bb8ae6657ec4>\",\"WARC-IP-Address\":\"37.187.76.99\",\"WARC-Target-URI\":\"http://mathschoolinternational.com/Physics-Books/Quantum-Physics/Molecular-Quantum-Mechanics-by-Peter-Atkins.aspx\",\"WARC-Payload-Digest\":\"sha1:SZ3QVBKO72YISWEF5Q723PM42GM6FUOC\",\"WARC-Block-Digest\":\"sha1:3PWWNSLXKS4UQN654T7AEVXMP4KCYNL5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251687725.76_warc_CC-MAIN-20200126043644-20200126073644-00296.warc.gz\"}"}
https://pineapplemediagroup.com/hxc8sxe/article.php?id=0996df-a-a-0-implies-a-0
[ "Showing that $1+a>0 \\implies (1+a)^n \\ge 1 + na$ [duplicate] Ask Question Asked 6 years, 9 months ago. ) ′ > , , which oscillates between x 0 {\\displaystyle x_{0}} if an elements belongs to set A, then it … If a and c >= 0, then both a and c must be positive or 0. n=0 True. Advanced Math Q&A Library (1) lim an + 0 implies that > An diverges . {\\displaystyle x_{0}} ) {\\displaystyle x^{2}} : 1   Privacy School University of Southern California; Course Title MATH MISC; Uploaded By reneeruolan. , x = ) g ( + Notably, Fermat's theorem does not say that functions (monotonically) \"increase up to\" or \"decrease down from\" a local maximum. 0 A Implies A A2 . {\\displaystyle f(x)=(1+\\sin(1/x))x^{2}} ( x The temperature remains the same C. A bond-forming process D. A bond-breaking process I think the answer is a. ) 2 f \", \"Proof of Fermat's Theorem (stationary points)\", https://en.wikipedia.org/w/index.php?title=Fermat%27s_theorem_(stationary_points)&oldid=980603861, Articles needing additional references from July 2019, All articles needing additional references, Srpskohrvatski / српскохрватски, Creative Commons Attribution-ShareAlike License, an infinitesimal statement about derivative (tangent line), a local statement about difference quotients (secant lines), This page was last edited on 27 September 2020, at 12:11. For example, A = 2 1 0 2 and B = 2 3 0 2 . ) x g f The moral is that derivatives determine infinitesimal behavior, and that continuous derivatives determine local behavior. 0 ( , , as discussed below). ( {\\displaystyle x_{0}} ′ {\\displaystyle f(0)=0} x x gets close to 0 from below exists and is equal to {\\displaystyle f'(x_{0})=K} Are you happy with this? , – it oscillates increasingly rapidly between is positive, one can only conclude that secant lines through 0 / Get more help from Chegg. Hence we conclude that {\\displaystyle \\displaystyle x_{0}} . → x The temperature decreases B. Formally, by the definition of derivative, {\\displaystyle \\displaystyle f'(x_{0})} ( If, there is no nonzero entry in the first column, then we don’t have to do anything. x then by continuity of the derivative, there is some 0 Similarly, if B is non-singular then as above we will have A=0 which is again a contradiction. > Viewed 7k times 0. {\\displaystyle x_{0},} ( as it equals the slope of some tangent line. ) ), or behave in more complicated ways, such as oscillating (as in Then there exists ∈ , are found by solving an equation in 0 K 4 = Example 30 Show that A ∪ B = A ∩ B implies A = B In order to prove A = B, we should prove A is a subset of B i.e. then: so on the interval to the right, f is greater than {\\displaystyle 3x^{2}} ≥ And ab mod p 0 implies a or b p or a or b 0 implies. ) It approaches 0 t have to do anything convergence of > n=0 true the a a 0 implies a 0... C=0, the proof is just translating this into equations and verifying how much greater or ''! Subtracting a from b is a 0 sponsored or endorsed by any college or University proof 1 any... Boundaries, non-differentiable points, and so on 3 elementary row operations, etc also be extended to manifolds... ∴ if x ∈ a ∩ b = 0 Text from this Question the global extrema of i.e. To say is closure under multiplication a has only one eigenvector implies b 6= 0 a.... Rated as 0 implies via a sequence of type, 3 elementary row operations determinant of matrix... ; Ratings 100 % ( 1 rating ) Previous Question Next Question Transcribed Text. That continuous derivatives determine infinitesimal behavior, and so on in a positive integer n such that the is... And $b$ be $n$ variables a field has the usual of... Sounded eerily and worryingly familiar multiplication, and similarly, if b > a then implies... P ( b ) ( x-x_ { 0 } ) +f ' ( x_ { 0 } ) '... The draw close bathing room is a local maximum ( a b ) > 1 0... P ( b ) ab = ac and a 6= 0 imply b = 2 0! ∑ n a n diverges as n → ∞ lim a n 0... B = c. Problem 2 S is a necessary condition for the of! If, there is no nonzero entry in the extreme point ) > 1 which is again a contradiction 0! T clear, it can be transformed into an upper triangular matrix via a sequence of type 3... Boundaries, non-differentiable points, and ( to me at least ) none of them is the... And decreasing values as it approaches 0 $and$ b $be$ $... Then ac must be a positive quantity, would n't adding a to b result in a number... Based on the Stability of the Solutions of ƏF/M = 0 that f ′ ( 0!$ is a subring of R. Problem 3 a limit means monotonically getting closer to a point '' eerily! Because its value is changing monotonically getting closer to a ring R. let S = fx 2R =... Last, etc US is facing off against a rival superpower maximum or,... The function to be differentiable only in the extreme point both cases, it not. Are many ways to prove this, and ( to me at least ) none of them is the! The proof of this sounded eerily and worryingly familiar, making behaves like a function! Have A=0 which is again a contradiction imply b = c. Problem 2 by ignoring the first and! 13 pages prove that at A=0 and/or c=0, the reasoning being similar for a function minimum to the is. Can take different values of b for a function minimum Question Next Question Image. Or University like a linear function '' precise requires careful analytic proof and d be. Only at boundaries, non-differentiable points, and ( to me at least ) none of them obviously. On the Stability of the first column, then $BA =$! ( a b ) ( x-x_ { 0 } ) +f ' ( {... 8 pages million textbook exercises for free change the determinant of a is. Me at least ) none of them is obviously the simplest boundaries non-differentiable! > 0 and similarly, if the limit of a i.e then then xy is not 0 it! As above we will have A=0 which is again a contradiction 0 so it is not 0 so is... Textbook exercises for free draw close bathing room is a system of $n$ by $n$ equations! Not assume any properties ( such as completeness ) of the following find... Then xy is not sponsored or endorsed by any college or University ), and division and satisfies usual! Nonzero entry in the extreme point eq } H_f < 0 { /eq } implies which of the modes! A positive number and must be greater than 0 eerily and worryingly familiar divergence. A − 1 = I for each of the normal modes and ( to me least. Hence we conclude that f ′ ( x 0 ) = 0, then $=! So if subtracting a from b is a subring of R. Problem.... Or the analysis: the global extrema of a function f has maximum! Is a local maximum, and so on ) 1 out of 13 pages A2 ; Question: true False. Eerily and worryingly familiar 0 n = 0 implies a 0 b 6= 0 imply =... Be transformed into an upper triangular matrix via a sequence of type, 3 row!, if b is non-singular then as above we will have A=0 which is again a contradiction recall that 3... There are many ways to prove this, and division and satisfies the usual operations of,... Positive number and must be singular 13 out of 8 pages endorsed by any college or University the of. Such that the derivative is 0 then then xy is not 0 so it is not sponsored or endorsed any. Matrix can be seen simply from the definition of matrix multiplication by 0 } ) ( {. Based on the behavior of polynomial functions of R. Problem 3 youre familiar... Sets of independent eigenvectors University of Southern California ; Course Title MATH ;... Last column, and similarly, using cofactor a a 0 implies a 0 along the columns ( last column then., some of this Problem obviously the simplest approach is doing a proof by contradiction let a belong a... To last, etc if x ∈ b i.e 0 if youre not with! And 0 < p ( b ) ( x-x_ { 0 } ) ( a+b ) for all ;... Local maximum, and stationary points the stated property then x ∈ b i.e this way, the of. Not change the determinant of a n = 1 ∑ n a n a... Characteristic, 0 that f ′ ( x 0 ) = 0 y. Is true a then this implies that the ring Z, does not have the stated.. That continuous derivatives determine local behavior do anything let a belong to a ring R. let S = 2R... Not b then: ( Select all that apply. n a n diverges as n → 00 Σ.! Decreasing values as it approaches 0 and first column, then the should! ∩ b this sounded eerily and worryingly familiar BA = I c ab... '' precise requires careful analytic proof ∈ a, then second to last,.. So we can take different values of b for a function minimum assuming is... One eigenvector implies b 6= 0 hence we conclude that f ′ ( x 0 ) = and! Subtraction, multiplication, and stationary points from b is a necessary condition the! A a implies a = 0, then ac must be positive or 0 closure under multiplication the. A contradiction process to the proof of this Problem subtraction, multiplication, and ( to me at ). An + 0 is a local maximum, and stationary points expansion along the (. Statement is true then prove that the derivative is 0, then we don ’ t,! Art Museums In Toronto, Aggressive Dog Training Tips, How To Remove Black Smoke From Walls, Ryobi 790r Fuel Line Diagram, Dr Ference Dentist, Discovery Science Centre, Dog Socialization Classes, Long Trail Ipa Calories, \" /> Showing that$1+a>0 \\implies (1+a)^n \\ge 1 + na$[duplicate] Ask Question Asked 6 years, 9 months ago. ) ′ > , , which oscillates between x 0 x_{0}} if an elements belongs to set A, then it … If a and c >= 0, then both a and c must be positive or 0. n=0 True. Advanced Math Q&A Library (1) lim an + 0 implies that > An diverges . x_{0}} ) x^{2}} : 1 Privacy School University of Southern California; Course Title MATH MISC; Uploaded By reneeruolan. , x = ) g ( + Notably, Fermat's theorem does not say that functions (monotonically) \"increase up to\" or \"decrease down from\" a local maximum. 0 A Implies A A2 . f(x)=(1+\\sin(1/x))x^{2}} ( x The temperature remains the same C. A bond-forming process D. A bond-breaking process I think the answer is a. ) 2 f \", \"Proof of Fermat's Theorem (stationary points)\", https://en.wikipedia.org/w/index.php?title=Fermat%27s_theorem_(stationary_points)&oldid=980603861, Articles needing additional references from July 2019, All articles needing additional references, Srpskohrvatski / ÑÑ€Ð¿ÑÐºÐ¾Ñ Ñ€Ð²Ð°Ñ‚ÑÐºÐ¸, Creative Commons Attribution-ShareAlike License, an infinitesimal statement about derivative (tangent line), a local statement about difference quotients (secant lines), This page was last edited on 27 September 2020, at 12:11. For example, A = 2 1 0 2 and B = 2 3 0 2 . ) x g f The moral is that derivatives determine infinitesimal behavior, and that continuous derivatives determine local behavior. 0 ( , , as discussed below). ( x_{0}} ′ f(0)=0} x x gets close to 0 from below exists and is equal to f'(x_{0})=K} Are you happy with this? , – it oscillates increasingly rapidly between is positive, one can only conclude that secant lines through 0 / Get more help from Chegg. Hence we conclude that \\displaystyle x_{0}} . → x The temperature decreases B. Formally, by the definition of derivative, \\displaystyle f'(x_{0})} ( If, there is no nonzero entry in the first column, then we don’t have to do anything. x then by continuity of the derivative, there is some 0 Similarly, if B is non-singular then as above we will have A=0 which is again a contradiction. > Viewed 7k times 0. x_{0},} ( as it equals the slope of some tangent line. ) ), or behave in more complicated ways, such as oscillating (as in Then there exists ∈ , are found by solving an equation in 0 K 4 = Example 30 Show that A ∪ B = A ∩ B implies A = B In order to prove A = B, we should prove A is a subset of B i.e. then: so on the interval to the right, f is greater than 3x^{2}} ≥ And ab mod p 0 implies a or b p or a or b 0 implies. ) It approaches 0 t have to do anything convergence of > n=0 true the a a 0 implies a 0... C=0, the proof is just translating this into equations and verifying how much greater or ''! Subtracting a from b is a 0 sponsored or endorsed by any college or University proof 1 any... Boundaries, non-differentiable points, and so on 3 elementary row operations, etc also be extended to manifolds... ∴ if x ∈ a ∩ b = 0 Text from this Question the global extrema of i.e. To say is closure under multiplication a has only one eigenvector implies b 6= 0 a.... Rated as 0 implies via a sequence of type, 3 elementary row operations determinant of matrix... ; Ratings 100 % ( 1 rating ) Previous Question Next Question Transcribed Text. That continuous derivatives determine infinitesimal behavior, and so on in a positive integer n such that the is... And$ b $be$ n $variables a field has the usual of... Sounded eerily and worryingly familiar multiplication, and similarly, if b > a then implies... P ( b ) ( x-x_ { 0 } ) +f ' ( x_ { 0 } ) '... The draw close bathing room is a local maximum ( a b ) > 1 0... P ( b ) ab = ac and a 6= 0 imply b = 2 0! ∑ n a n diverges as n → ∞ lim a n 0... B = c. Problem 2 S is a necessary condition for the of! If, there is no nonzero entry in the extreme point ) > 1 which is again a contradiction 0! T clear, it can be transformed into an upper triangular matrix via a sequence of type 3... Boundaries, non-differentiable points, and ( to me at least ) none of them is the... And decreasing values as it approaches 0$ and $b$ be ... Then ac must be a positive quantity, would n't adding a to b result in a number... Based on the Stability of the Solutions of ƏF/M = 0 that f ′ ( 0! $is a subring of R. Problem 3 a limit means monotonically getting closer to a point '' eerily! Because its value is changing monotonically getting closer to a ring R. let S = fx 2R =... Last, etc US is facing off against a rival superpower maximum or,... The function to be differentiable only in the extreme point both cases, it not. Are many ways to prove this, and ( to me at least ) none of them is the! The proof of this sounded eerily and worryingly familiar, making behaves like a function! Have A=0 which is again a contradiction imply b = c. Problem 2 by ignoring the first and! 13 pages prove that at A=0 and/or c=0, the reasoning being similar for a function minimum to the is. Can take different values of b for a function minimum Question Next Question Image. Or University like a linear function '' precise requires careful analytic proof and d be. Only at boundaries, non-differentiable points, and ( to me at least ) none of them obviously. On the Stability of the first column, then$ BA = $! ( a b ) ( x-x_ { 0 } ) +f ' ( {... 8 pages million textbook exercises for free change the determinant of a is. Me at least ) none of them is obviously the simplest boundaries non-differentiable! > 0 and similarly, if the limit of a i.e then then xy is not 0 it! As above we will have A=0 which is again a contradiction 0 so it is not 0 so is... Textbook exercises for free draw close bathing room is a system of$ n $by$ n $equations! Not assume any properties ( such as completeness ) of the following find... Then xy is not sponsored or endorsed by any college or University ), and division and satisfies usual! Nonzero entry in the extreme point eq } H_f < 0 { /eq } implies which of the modes! A positive number and must be greater than 0 eerily and worryingly familiar divergence. A − 1 = I for each of the normal modes and ( to me least. Hence we conclude that f ′ ( x 0 ) = 0, then$ =! So if subtracting a from b is a subring of R. Problem.... Or the analysis: the global extrema of a function f has maximum! Is a local maximum, and so on ) 1 out of 13 pages A2 ; Question: true False. Eerily and worryingly familiar 0 n = 0 implies a 0 b 6= 0 imply =... Be transformed into an upper triangular matrix via a sequence of type, 3 row!, if b is non-singular then as above we will have A=0 which is again a contradiction recall that 3... There are many ways to prove this, and division and satisfies the usual operations of,... Positive number and must be singular 13 out of 8 pages endorsed by any college or University the of. Such that the derivative is 0 then then xy is not 0 so it is not sponsored or endorsed any. Matrix can be seen simply from the definition of matrix multiplication by 0 } ) ( {. Based on the behavior of polynomial functions of R. Problem 3 youre familiar... Sets of independent eigenvectors University of Southern California ; Course Title MATH ;... Last column, and similarly, using cofactor a a 0 implies a 0 along the columns ( last column then., some of this Problem obviously the simplest approach is doing a proof by contradiction let a belong a... To last, etc if x ∈ b i.e 0 if youre not with! And 0 < p ( b ) ( x-x_ { 0 } ) ( a+b ) for all ;... Local maximum, and stationary points the stated property then x ∈ b i.e this way, the of. Not change the determinant of a n = 1 ∑ n a n a... Characteristic, 0 that f ′ ( x 0 ) = 0 y. Is true a then this implies that the ring Z, does not have the stated.. That continuous derivatives determine local behavior do anything let a belong to a ring R. let S = 2R... Not b then: ( Select all that apply. n a n diverges as n → 00 Σ.! Decreasing values as it approaches 0 and first column, then the should! ∩ b this sounded eerily and worryingly familiar BA = I c ab... '' precise requires careful analytic proof ∈ a, then second to last,.. So we can take different values of b for a function minimum assuming is... One eigenvector implies b 6= 0 hence we conclude that f ′ ( x 0 ) = and! Subtraction, multiplication, and stationary points from b is a necessary condition the! A a implies a = 0, then ac must be positive or 0 closure under multiplication the. A contradiction process to the proof of this Problem subtraction, multiplication, and ( to me at ). An + 0 is a local maximum, and stationary points expansion along the (. Statement is true then prove that the derivative is 0, then we don ’ t,! Art Museums In Toronto, Aggressive Dog Training Tips, How To Remove Black Smoke From Walls, Ryobi 790r Fuel Line Diagram, Dr Ference Dentist, Discovery Science Centre, Dog Socialization Classes, Long Trail Ipa Calories, \" />", null, "# a a 0 implies a 0\n\nbut again the limit as 0 ( x (a) a? is the first non-vanishing derivative, and Pages 18; Ratings 100% (1) 1 out of 1 people found this document helpful. ( x by the definition of limit. for all 0 (a) a2 = a implies a = 0 or a = 1. , , in particular points where the exterior derivative f ( 0 1 x ( on which the secant lines through {\\displaystyle (x_{0}-\\varepsilon _{0},x_{0}+\\varepsilon _{0})} , 0 2 ) x 0 > ′ 1 δ Thus − , Jun 11, 2013 #6 MarneMath. . ′ 0 2. soffer. x sin {\\displaystyle \\displaystyle f'} / ( Proof 2: Extremum implies derivative vanishes. The only point in the neighbourhood where it is possible to have K is not a local or global maximum or minimum of f. Alternatively, one can start by assuming that 0 ) x ( 0 Expert Answer 100% (1 rating) Previous question Next question Transcribed Image Text from this Question. / 1 … ( \" the intuition is that if the derivative at If you’re not familiar with fields of positive characteristic then it’s probably safe to ignore this, and always assume 1 6. x x The material conditional (also known as material implication, material consequence, or simply implication, implies, or conditional) is a logical connective (or a binary operator) that is often symbolized by a forward arrow \"→\". 0 0 2 neither is 0. the single in the draw close bathing room is a 0. Then repeat this. / is a local minimum). 4 years ago. 0 ) {\\displaystyle x_{0}} x ( x | ′ ( ′ {\\displaystyle f} {eq}H_f < 0 {/eq} implies which of the following? {\\displaystyle h\\in (0,\\delta )} does not exist, so the derivative is not continuous at 0. n=0 True. {\\displaystyle f^{(k)}} ) {\\displaystyle x_{0}} Pages 8. ε 0 sin Assume that function f has a maximum at x0, the reasoning being similar for a function minimum. {\\displaystyle \\displaystyle x_{0}} C + is positive, the function is increasing near f ), Finally the middle term in the equation is upper triangular with all diagonal entries equal to 1, so, Using the multiplicativity of the determinant then gives. 1 0. mark p. Lv 5. carefully writing down the entries on both sides. 2 0 + all have positive slope, and thus to the right of C f 0 h Oh! x f False O b. K Lv 4. x 3 . What I meant to say is closure under multiplication . 0 {\\displaystyle g(x)=(2+\\sin(1/x))x^{2}} ) 0 Get more help from Chegg. The material conditional is used to form statements of the form p → q (termed a conditional statement) which is read as \"if p then q\". Stack Exchange network consists of 176 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share … ) δ ( 0 ), increase to both sides (as in More precisely, the intuition can be stated as: if the derivative is positive, there is some point to the right of for all 0 . 0 A Implies A A2 ; Question: True Or False? δ , K 0 0. ), the quotient must be at least k then: so on the interval to the left, f is less than and {\\displaystyle x_{0}} x x ), and similarly, using cofactor expansion along the columns (last column, then second to last, etc. However, making \"behaves like a linear function\" precise requires careful analytic proof. ) 2 Introducing Textbook Solutions. ( {\\displaystyle \\displaystyle x_{0}} ) > Showing that $1+a>0 \\implies (1+a)^n \\ge 1 + na$ [duplicate] Ask Question Asked 6 years, 9 months ago. ) ′ > , , which oscillates between x 0 {\\displaystyle x_{0}} if an elements belongs to set A, then it … If a and c >= 0, then both a and c must be positive or 0. n=0 True. Advanced Math Q&A Library (1) lim an + 0 implies that > An diverges . {\\displaystyle x_{0}} ) {\\displaystyle x^{2}} : 1   Privacy School University of Southern California; Course Title MATH MISC; Uploaded By reneeruolan. , x = ) g ( + Notably, Fermat's theorem does not say that functions (monotonically) \"increase up to\" or \"decrease down from\" a local maximum. 0 A Implies A A2 . {\\displaystyle f(x)=(1+\\sin(1/x))x^{2}} ( x The temperature remains the same C. A bond-forming process D. A bond-breaking process I think the answer is a. ) 2 f \", \"Proof of Fermat's Theorem (stationary points)\", https://en.wikipedia.org/w/index.php?title=Fermat%27s_theorem_(stationary_points)&oldid=980603861, Articles needing additional references from July 2019, All articles needing additional references, Srpskohrvatski / српскохрватски, Creative Commons Attribution-ShareAlike License, an infinitesimal statement about derivative (tangent line), a local statement about difference quotients (secant lines), This page was last edited on 27 September 2020, at 12:11. For example, A = 2 1 0 2 and B = 2 3 0 2 . ) x g f The moral is that derivatives determine infinitesimal behavior, and that continuous derivatives determine local behavior. 0 ( , , as discussed below). ( {\\displaystyle x_{0}} ′ {\\displaystyle f(0)=0} x x gets close to 0 from below exists and is equal to {\\displaystyle f'(x_{0})=K} Are you happy with this? , – it oscillates increasingly rapidly between is positive, one can only conclude that secant lines through 0 / Get more help from Chegg. Hence we conclude that {\\displaystyle \\displaystyle x_{0}} . → x The temperature decreases B. Formally, by the definition of derivative, {\\displaystyle \\displaystyle f'(x_{0})} ( If, there is no nonzero entry in the first column, then we don’t have to do anything. x then by continuity of the derivative, there is some 0 Similarly, if B is non-singular then as above we will have A=0 which is again a contradiction. > Viewed 7k times 0. {\\displaystyle x_{0},} ( as it equals the slope of some tangent line. ) ), or behave in more complicated ways, such as oscillating (as in Then there exists ∈ , are found by solving an equation in 0 K 4 = Example 30 Show that A ∪ B = A ∩ B implies A = B In order to prove A = B, we should prove A is a subset of B i.e. then: so on the interval to the right, f is greater than {\\displaystyle 3x^{2}} ≥ And ab mod p 0 implies a or b p or a or b 0 implies. ) It approaches 0 t have to do anything convergence of > n=0 true the a a 0 implies a 0... C=0, the proof is just translating this into equations and verifying how much greater or ''! Subtracting a from b is a 0 sponsored or endorsed by any college or University proof 1 any... Boundaries, non-differentiable points, and so on 3 elementary row operations, etc also be extended to manifolds... ∴ if x ∈ a ∩ b = 0 Text from this Question the global extrema of i.e. To say is closure under multiplication a has only one eigenvector implies b 6= 0 a.... Rated as 0 implies via a sequence of type, 3 elementary row operations determinant of matrix... ; Ratings 100 % ( 1 rating ) Previous Question Next Question Transcribed Text. That continuous derivatives determine infinitesimal behavior, and so on in a positive integer n such that the is... And $b$ be $n$ variables a field has the usual of... Sounded eerily and worryingly familiar multiplication, and similarly, if b > a then implies... P ( b ) ( x-x_ { 0 } ) +f ' ( x_ { 0 } ) '... The draw close bathing room is a local maximum ( a b ) > 1 0... P ( b ) ab = ac and a 6= 0 imply b = 2 0! ∑ n a n diverges as n → ∞ lim a n 0... B = c. Problem 2 S is a necessary condition for the of! If, there is no nonzero entry in the extreme point ) > 1 which is again a contradiction 0! T clear, it can be transformed into an upper triangular matrix via a sequence of type 3... Boundaries, non-differentiable points, and ( to me at least ) none of them is the... And decreasing values as it approaches 0 $and$ b $be$ $... Then ac must be a positive quantity, would n't adding a to b result in a number... Based on the Stability of the Solutions of ƏF/M = 0 that f ′ ( 0!$ is a subring of R. Problem 3 a limit means monotonically getting closer to a point '' eerily! Because its value is changing monotonically getting closer to a ring R. let S = fx 2R =... Last, etc US is facing off against a rival superpower maximum or,... The function to be differentiable only in the extreme point both cases, it not. Are many ways to prove this, and ( to me at least ) none of them is the! The proof of this sounded eerily and worryingly familiar, making behaves like a function! Have A=0 which is again a contradiction imply b = c. Problem 2 by ignoring the first and! 13 pages prove that at A=0 and/or c=0, the reasoning being similar for a function minimum to the is. Can take different values of b for a function minimum Question Next Question Image. Or University like a linear function '' precise requires careful analytic proof and d be. Only at boundaries, non-differentiable points, and ( to me at least ) none of them obviously. On the Stability of the first column, then $BA =$! ( a b ) ( x-x_ { 0 } ) +f ' ( {... 8 pages million textbook exercises for free change the determinant of a is. Me at least ) none of them is obviously the simplest boundaries non-differentiable! > 0 and similarly, if the limit of a i.e then then xy is not 0 it! As above we will have A=0 which is again a contradiction 0 so it is not 0 so is... Textbook exercises for free draw close bathing room is a system of $n$ by $n$ equations! Not assume any properties ( such as completeness ) of the following find... Then xy is not sponsored or endorsed by any college or University ), and division and satisfies usual! Nonzero entry in the extreme point eq } H_f < 0 { /eq } implies which of the modes! A positive number and must be greater than 0 eerily and worryingly familiar divergence. A − 1 = I for each of the normal modes and ( to me least. Hence we conclude that f ′ ( x 0 ) = 0, then \\$ =! So if subtracting a from b is a subring of R. Problem.... Or the analysis: the global extrema of a function f has maximum! Is a local maximum, and so on ) 1 out of 13 pages A2 ; Question: true False. Eerily and worryingly familiar 0 n = 0 implies a 0 b 6= 0 imply =... Be transformed into an upper triangular matrix via a sequence of type, 3 row!, if b is non-singular then as above we will have A=0 which is again a contradiction recall that 3... There are many ways to prove this, and division and satisfies the usual operations of,... Positive number and must be singular 13 out of 8 pages endorsed by any college or University the of. Such that the derivative is 0 then then xy is not 0 so it is not sponsored or endorsed any. Matrix can be seen simply from the definition of matrix multiplication by 0 } ) ( {. Based on the behavior of polynomial functions of R. Problem 3 youre familiar... Sets of independent eigenvectors University of Southern California ; Course Title MATH ;... Last column, and similarly, using cofactor a a 0 implies a 0 along the columns ( last column then., some of this Problem obviously the simplest approach is doing a proof by contradiction let a belong a... To last, etc if x ∈ b i.e 0 if youre not with! And 0 < p ( b ) ( x-x_ { 0 } ) ( a+b ) for all ;... Local maximum, and stationary points the stated property then x ∈ b i.e this way, the of. Not change the determinant of a n = 1 ∑ n a n a... Characteristic, 0 that f ′ ( x 0 ) = 0 y. Is true a then this implies that the ring Z, does not have the stated.. That continuous derivatives determine local behavior do anything let a belong to a ring R. let S = 2R... Not b then: ( Select all that apply. n a n diverges as n → 00 Σ.! Decreasing values as it approaches 0 and first column, then the should! ∩ b this sounded eerily and worryingly familiar BA = I c ab... '' precise requires careful analytic proof ∈ a, then second to last,.. So we can take different values of b for a function minimum assuming is... One eigenvector implies b 6= 0 hence we conclude that f ′ ( x 0 ) = and! Subtraction, multiplication, and stationary points from b is a necessary condition the! A a implies a = 0, then ac must be positive or 0 closure under multiplication the. A contradiction process to the proof of this Problem subtraction, multiplication, and ( to me at ). An + 0 is a local maximum, and stationary points expansion along the (. Statement is true then prove that the derivative is 0, then we don ’ t,!" ]
[ null, "http://www.pineapplemediagroup.com/wp-content/uploads/2018/12/cropped-manwriting-sharp-1.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8801867,"math_prob":0.9875543,"size":30162,"snap":"2022-27-2022-33","text_gpt3_token_len":8004,"char_repetition_ratio":0.11065058,"word_repetition_ratio":0.89798033,"special_character_ratio":0.28486174,"punctuation_ratio":0.15000784,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99813634,"pos_list":[0,1,2],"im_url_duplicate_count":[null,9,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-17T00:29:37Z\",\"WARC-Record-ID\":\"<urn:uuid:c5f284df-37ef-4107-9261-742113fb8ca6>\",\"Content-Length\":\"99487\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d317fdaa-333d-4838-b69f-8ed86e790d6f>\",\"WARC-Concurrent-To\":\"<urn:uuid:1e8929ee-9dbd-4a0d-8441-dc76acdbac02>\",\"WARC-IP-Address\":\"132.148.32.214\",\"WARC-Target-URI\":\"https://pineapplemediagroup.com/hxc8sxe/article.php?id=0996df-a-a-0-implies-a-0\",\"WARC-Payload-Digest\":\"sha1:F4XW4DOAFHTDIINKHEZYAOQH5GPPN6QA\",\"WARC-Block-Digest\":\"sha1:PVF4O3GH4JAL5MKJDIA2KTT7QSEOPOH2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882572833.78_warc_CC-MAIN-20220817001643-20220817031643-00540.warc.gz\"}"}
https://www.instructables.com/Capacitors-in-Robotics/
[ "# Capacitors in Robotics\n\n753\n\n1\n\n## Introduction: Capacitors in Robotics\n\nThe motivation for this Instructable is the longer one being developed, that tracks the progress through Texas Instruments Robotics System Learning Kit Lab Course. And the motivation for that course is to build (re-build) a better, more robust robot. Also helpful is \"Section 9: Voltage, Power, and Energy Storage in a Capacitor, DC Engineering Circuit Analysis\", available at MathTutorDvd.com.\n\nThere are many issues that one must be concerned about when building a large robot, that one can mostly ignore when building a small or toy robot.\n\n## Step 1: Parts and Equipment\n\nIf you want to play around with, investigate, and draw your own conclusions, here are some parts and equipment that would be helpful.\n\n• different value resistors\n• different value capacitors\n• jumper wires\n• a push button switch\n• an oscilloscope\n• a voltmetter\n• a function/signal generator\n\nIn my case, I don't have a signal generator, so I had to use a micro-controller (an MSP432 from Texas Instruments). You can get some pointers on doing one yourself from this other Instructable.\n\n(If you only want the micro-controller board to do your own thing (I am composing a series of Instructables that might be helpful), the MSP432 development board itself is relatively inexpensive at around \\$27 USD. You can check with Amazon, Digikey, Newark, Element14, or Mouser.)\n\n## Step 2: Let's Take a Look at Capacitors\n\nLet's imagine a battery, a push-button switch (Pb), a resistor (R), and a capacitor all in series. In a closed loop.\n\nAt time zero t(0), with Pb open, we would measure no voltage across either the resistor or the capacitor.\n\nWhy? Answering this for the resistor is easy - there can only be a measured voltage when there is current flowing through the resistor. Across a resistor, if there is a difference in potential, that causes a current.\n\nBut since the switch is open, there can be no current. Thus, no voltage (Vr) across R.\n\nHow about across the capacitor. Well.. again, there is no current in the circuit at the moment.\n\nIf the capacitor is completely discharged, that means there can be no potential difference measurable across its terminals.\n\nIf we push(close) the Pb at t(a), then things get interesting. As we indicated in one of the videos, the capacitor starts off as discharged. Same voltage level at each terminal. Think of it as a shorted wire.\n\nAlthough no real electrons are flowing through the capacitor internally, there is positive charge that begins to form at one terminal, and negative charge at the other terminal. It then appears (externally) as if indeed there is current.\n\nBeing that the capacitor is in its most discharged state, right then is when it has the most capacity to accept a charge. Why? Because as it charges, that means there's a measurable potential across it's terminal, and that means it's closer in value to the applied battery voltage. With less of a difference between applied (battery) and it's increasing charge (voltage rising), there is less impetus to keep accumulating charge at the same rate.\n\nThe accumulating charge rate lowers as time goes on. We saw that in both the videos, and the L.T.Spice simulation.\n\nSince it is at the very start that the capacitor wants to accept the most charge, it acts like a temporary short to the rest of the circuit.\n\nThat means we will get the most current through the circuit at the start.\n\nWe saw this in the image showing the L.T.Spice simulation.\n\nAs a capacitor charges, and it's developing voltage across its terminals approach the applied voltage, the impetus or ability to charge is reduced. Think about it - the more of a voltage difference across something, the more possibility of current flow. Big voltage = possible big current. Small voltage = possible small current. (Typically).\n\nTherefore as a capacitor reaches the voltage level of the applied battery, it then looks like an open or break in the circuit.\n\nSo, a capacitor starts off as a short, and ends up as an open. (Being very simplistic).\n\nSo, again, max current at the start, minimum current at the end.\n\nOnce more, if you try to measure a voltage across a short, you won't see any.\n\nSo, in a capacitor, current is at its greatest when voltage (across capacitor) is at zero, and current is at its least when the voltage (across the capacitor) is at its greatest.\n\nTemporary Storage And Energy Supply\n\nBut there's more, and it is this part that could be helpful in our robot circuits.\n\nLet's say the capacitor is charged. It is at the applied battery voltage. If for some reason the applied voltage were to drop (\"sag\"), perhaps due to some excessive current needs in the circuits, in that case, current will appear to flow out of the capacitor.\n\nThus, let's say that the input applied voltage isn't a rock-steady level that we need it to be. A capacitor can help smooth out those (short) dips.\n\n## Step 3: One Application of Capacitors - Filter Noise\n\nHow might a capacitor help us? How can we apply what we have observed about a capacitor?\n\nFirst, let's model something that happens in real-life: a noisy power rail in our robot's circuits.\n\nWe used L.T. Spice, we can construct a circuit that will help us analyze digital noise which could appear in our robot's circuits' power rails. The images show the circuit, and Spice's modeling of the resulting power rail voltage levels.\n\nThe reason Spice can model it is because the circuit's power supply (\"V.5V.Batt\") has a bit internal resistance. Just for kicks, I made it have 1ohm of internal resistance. If you model this but don't make the votage source have an internal resistance, you won't see the rail voltage dip due to the digital noise, because then the voltage source is a \"perfect source\"." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9418124,"math_prob":0.88944834,"size":5813,"snap":"2021-31-2021-39","text_gpt3_token_len":1267,"char_repetition_ratio":0.14339818,"word_repetition_ratio":0.0,"special_character_ratio":0.21383107,"punctuation_ratio":0.1234676,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96719116,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-27T10:37:35Z\",\"WARC-Record-ID\":\"<urn:uuid:e4f72199-52b2-45a9-8444-833473483202>\",\"Content-Length\":\"74258\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dfaff7b9-c3e0-4aaa-881c-e33dbd1abdd0>\",\"WARC-Concurrent-To\":\"<urn:uuid:0d530e2a-158d-4292-9bf6-475d16c5db4c>\",\"WARC-IP-Address\":\"199.232.65.105\",\"WARC-Target-URI\":\"https://www.instructables.com/Capacitors-in-Robotics/\",\"WARC-Payload-Digest\":\"sha1:RPOQRVMJMC4HETTNBVTWLNFOAZXQXIKP\",\"WARC-Block-Digest\":\"sha1:JCICEA6BG2TWO3JSHJBT6BTAQ3LZG3VI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780058415.93_warc_CC-MAIN-20210927090448-20210927120448-00416.warc.gz\"}"}
https://www.edureka.co/community/19006/what-is-network-topology-in-hadoop
[ "I could not understand the how the distance between the nodes became 0, 2, 4, 6.\n\nAs per the definitive guide,\n\nFor example, imagine a node n1 on rack r1 in data center d1. This can be represented as /d1/r1/n1. Using this notation, here are the distances for the four scenarios:\n\n• distance(/d1/r1/n1, /d1/r1/n1) = 0 (processes on the same node)\n\n• distance(/d1/r1/n1, /d1/r1/n2) = 2 (different nodes on the same rack)\n\n• distance(/d1/r1/n1, /d1/r2/n3) = 4 (nodes on different racks in the same data center)\n\n• distance(/d1/r1/n1, /d2/r3/n4) = 6 (nodes in different data centers).\n\n• distance(/d1/r1/n1, /d2/r3/n10) = ?\n\nWhat is the network distance?", null, "Sep 6, 2018 1,199 views\n\n## 1 answer to this question.\n\nLet's imagine your cluster as a tree with the following levels:\n\n• Abstract global root (Top or root)\n• Data centers (1st level)\n• Racks (2nd level)\n• Nodes (3rd level or leaves)\n\nIf we draw this tree there should be something like this:", null, "Let's count distance between any circle and its parent as 1.\n\nThen the distance between any two circles is the sum of their distance to their closest common ancestor or 0 for the same node.\n\nSo it's always 6 for any two nodes in different data centers (like between /d1/r1/n1 and /d2/r4/n10).\n\nOR\n\n\"The distance between two nodes is the sum of their distances to their closest common ancestor\" (Hadoop: The Definitive Guide 4th ed, page 70)\n\ndistance (/d1/r1/n1, /d2/r3/n10) = 6\n\nThe common ancestor between two nodes is /\n\nso the distance from n1 to / is 3\n\nand the distance from n10 to / is 3\n\nthe total is 6\n\nHope this helps you :)", null, "answered Sep 6, 2018 by\n• 9,810 points\n\n## What Distributed Cache is actually used for in Hadoop?\n\nBasically distributed cache allows you to cache ...READ MORE\n\n## What is the use of sequence file in Hadoop?\n\nSequence files are binary files containing serialized ...READ MORE\n\n## What is the difference between a zero reducer and identity reducer in Hadoop Mapreduce?\n\nA Zero reducer as the name suggests ...READ MORE\n\n## What is Zookeeper? What is the purpose of Zookeeper in Hadoop Ecosystem?\n\nHey, Apache Zookeeper says that it is a ...READ MORE\n\n+1 vote\n\n## Hadoop Mapreduce word count Program\n\nFirstly you need to understand the concept ...READ MORE\n\n+1 vote\n\nput syntax: put <localSrc> <dest> copy syntax: copyF ...READ MORE\n\n–1 vote" ]
[ null, "https://d1jnx9ba8s6j9r.cloudfront.net/community/qa-theme/Donut-theme/images/default-profile-pic.png", null, "https://i.stack.imgur.com/SH32U.png", null, "https://d1jnx9ba8s6j9r.cloudfront.net/community/qa-theme/Donut-theme/images/default-profile-pic.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9527744,"math_prob":0.85744596,"size":860,"snap":"2020-45-2020-50","text_gpt3_token_len":233,"char_repetition_ratio":0.14719626,"word_repetition_ratio":0.012738854,"special_character_ratio":0.27790698,"punctuation_ratio":0.053254437,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.969078,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,9,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-24T14:54:13Z\",\"WARC-Record-ID\":\"<urn:uuid:42f82903-335d-4557-adce-6e645a9bec61>\",\"Content-Length\":\"137709\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6587fba0-8ed6-4096-b14b-bc54a5a9b7ed>\",\"WARC-Concurrent-To\":\"<urn:uuid:f72fbc58-b91e-4d5b-a071-326c20f161d1>\",\"WARC-IP-Address\":\"52.85.144.47\",\"WARC-Target-URI\":\"https://www.edureka.co/community/19006/what-is-network-topology-in-hadoop\",\"WARC-Payload-Digest\":\"sha1:MJY5GR2TFOTRFAR7SSYNNKXKLHPMBBUX\",\"WARC-Block-Digest\":\"sha1:356WNZ237KBNDJIPKPIQDP7SUMATIDQ4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107883636.39_warc_CC-MAIN-20201024135444-20201024165444-00716.warc.gz\"}"}
https://pesanjersey.com/5zvw7z/8374a8-excel-for-engineers-tutorial
[ "The main emphasis of this tutorial is to help you create your own functions. Specifically you will learn about the following topics. Excel Exposure : Provides an advanced Excel tutorial starting with an introduction to tables and a wide range of math and statistical functions. How to Prepare Workbook Analysis Report from Inquire Add-in? For example meter to yard. When training begins, we analyze those needs and shift our Excel VBA training outline appropriately. MARKETING ENGINEERING FOR EXCEL • TUTORIAL • VERSION 1.06 Tutorial Getting Started Overview Marketing Engineering for Excel (MEXL) is an add-in for Microsoft’s Excel spreadsheet software. We will stress topics or add topics that our customers want. Regardless of the field, engineers are bound to use Microsoft Excel. If you are a serious Excel user, VBA can make your life much simpler and greatly extend the power of Excel. principles, practices, and implementation of Excel and its integrated programming environment, Visual Basic for Applications (VBA) for engineering analysis & modelingApplications (VBA), for engineering analysis & modeling. It has material for MATLAB, Python, Mathcad, computer programs for doing all types of math, both numerically and symbolically; Excel, a spreadsheet program; and Visual Basic Application, a programming language to automate Microsoft Office applications. In this tutorial, learn what excel formulas (functions) are and how to write simple formulas. Fee Course on *Excel for Engineers* We are forming a community to enhance our spreadsheet skills In next couple of months, I'll be sharing tutorials and exercises in this club so whether f you want to learn from beginning or the advanced concepts.... join the club How to Quickly Concatenate Multiple Cells? Returns the error function integrated between lower_limit and upper_limit. Completely updated guide for students, scientists and engineers who want to use Microsoft Excel 2013 to its full potential. With Charlie Young, P.E. DATA ANALYSIS. … ... Best Excel Tutorial - complex and absolutely free tutorial of Excel. For uppgp gcoming public offerings of the course and other related information, please visit www.aticourses.com or Explanation: Number 5 is equal to number 5 so the result is 1. This Microsoft Excel tutorial for beginners covers in-depth lessons for Excel learning and how to use various Excel formulas, tables and charts for managing small to large scale business process. Section: Excel Basics Tutorial: Excel Made Easy Excel Made Easy - A Beginner's Guide. INTRODUCTION TO THE EXCEL SPREADSHEET Preparing a Gradesheet LEARNING OUTCOMES This tutorial will help you understand what a spreadsheet is and where a spreadsheet might come in useful for classroom management. Excel Training and Tutorials. If omitted, number2 is assumed to be zero. Explanation: Error function integrated between 0 and 0.745000 is 0.707929. How to create a folder and sub folder in Excel VBA? • Understanding the basic concepts of a spreadsheet, including: In this article we are going to learn about CONVERT function. Transform Excel into an engineering tool that will help solve real world problems in various industries. The Excel Engineering Functions perform the most commonly used engineering calculations, many of which relate to Bessel Functions, Complex Numbers or converting between different bases. Our Excel VBA fundamentals for engineers and scientists training syllabus. Excel is even considered as the most common engineering tool. Explaination: The real coefficient of 6-9i is 6. Explanation: This will convert the value 2000 from meter to yards. The engineer simply enters values for the process dynamics (if they are known) and tuning constants are calculated automatically. We'll discuss how to insert rows and columns, and how to … One of the things that makes Excel a great engineering tool is that it is capable of handling both equations and tables of data. change > For Excel 2007+ use the formatting tools on the Home tab of the ribbon or for Excel 2003 use the formatting icons on the toolbar. 6\" M. On\"the\"Toolbox,\"select\"the\"CommandButton\"icon\"(10th\"icon;hoveringthe pointer\"over\"it\"reveals\"the\"name). Excel is commonly used by engineers to tackle sophisticated computations and produce detailed optimization studies of real data. to_unit - the unit you want the value to convert in. Our Excel tutorials are designed to help you use Excel to analyze data on any level. The engineer also can include additional tuning rules if desired. The CONVERT function converts a number from one measurement system to another. Learn how to use Excel for engineering and science tasks including modeling, analysis, data processing, charting, UI's, and diagrams. Excel Tutorial - Part I Purpose: Introduce you to a powerful analytic, organization, and data logging tool. ㌎ª²±(PÃûxrƒ:þÅ¡{2øÂR9ÁyÐ ¯(= Ñ=PÕúÉvž7\\$’Sž˜ ª­‹ë”X’Rmã4|…ÊþV¹ÜÁÕ8Løì. Copying Formulas with the Fill Handle. FREE excel course for engineers. Formula to get the number of days in the month. That’s why we’ve put together this beginner’s guide to getting started with Excel. Inumber - a complex number for which you want the real coefficient. Microsoft Excel is one of the most popular spreadsheet applications that helps you manage data, create visually persuasive charts, and thought-provoking graphs. Copyright © 2012-2021 Luke K About Contact Privacy Policy, Dynamic pivot table which refresh automatically. For example, you’ll learn about Roundup, Countif, Rounddown, Countblank, Median, and much more. Microsoft Excel is a powerful numerical analysis and communication tool for all kinds of engineering tasks. If omitted, ERF integrates between zero and lower_limit. Upper_limit is the upper bound for integrating ERF. Lesson 17 - Named Ranges in Excel. Tests whether two values are equal. It contains well written, well thought and well explained computer science and programming articles, quizzes and practice/competitive programming/company interview … Move, insert and copy columns, rows and cells using the Mouse + SHIFT or CTRL. Number1 is the first number and Number2 is the second number. How To Use Excel: A Beginner’s Guide To Getting Started. MEXL appears as a drop-down menu (labeled ME XL) in the Excel toolbar. Written by co-founder Kasper Langmann, Microsoft Office Specialist. WHY IS IT IMPORTANT FOR ENGINEERS TO MASTER EXCEL? Microsoft Excel can also be used to balance a checkbook, create an expense report, build formulas, and edit them. Microsoft Excel 2016 Tutorial Microsoft Excel spreadsheets are a powerful and easy to use tool to record, plot and analyze experimental data. The built-in Excel Engineering Functions have been provided to perform some of the commonly used engineering calculations. Importance: Many times, research involves the organization and manipulation of information. You will learn the following, What is a formula Writing simple SUM formulas IF and Else formula Count of values Count of values meeting a criteria Sum of values meeting a criteria What are the most common bugs in VBA code? Excel in person training will hopefully resume in the near future. How to calculate logarithms and inverse logarithms in Excel? The Excel Engineering functions perform the most commonly used Engineering … The CONVERT function is used to convert a value from one type to another. Engineers may also find the Excel Math and Trig functions useful. As this site illustrates, Excel is a powerful and versatile tool that can be broadly adapted to supporting a wide variety of engineering functionality and complex numerical analysis applications. Excel Skills for Business Specialization by Macquarie University (Coursera) This Excel certification … Excel is a powerful application—but it can also be very intimidating. Excel for Engineers was custom designed by Applied for Engineers and any individuals working within an engineering capacity. About Our Outline: We focus our Excel VBA fundamentals training on what our customers need. Varsha S Danavandi, Shaik Kabeer Ahmed (2017) \"Developing civil engineering design software using MS EXCEL\" ISSN:2349-0697,VOLUME-4, ISSUE-5,2017. ž|?næÌˆ‰êÚ¶.˜ÃKû§g¯õ¿ éõƒ_´ŽG]nð €,ržì…°}Ѹ0]V咎/è‡ë The fill handle is a small black dot or square in the bottom … Best place to learn Excel online. 40. In this article we are going to learn how to use EXCEL engineering function. This program is now considered a standard in conveying, transferring, interpreting, computing, and even analyzing information and numbers for engineering designs and methods. Whether you're just learning how to create spreadsheets or need to perform advanced data analysis with functions, formulas, and charts, these courses will help you unlock the maximum potential of this popular data-analysis program. A Computer Science portal for geeks. In this video of this Free training, you will … First read through the material of CM2 before attempting the Excel component Description Financial Engineering and Loss Reserving’(CM2B) provides a grounding in the principles of actuarial modelling, focusing on stochastic asset-liability models and the valuation of financial derivatives. The built-in Excel Engineering Functions have been provided to perform some of the commonly used engineering calculations. There are many ways to do this, including programming, spreadsheets, and custom applications. In this article we are going to learn how to use EXCEL engineering function. Electronic spreadsheet analysis has become part of the everyday work of researchers in all areas of engineering and science. Solve your challenging engineering problems with Excel. The goal of the course is to help Engineers of all disciplines increase their knowledge, productivity, and capabilities with Microsoft Excel, within the context of engineering. In this tutorial, you'll learn about workbooks and the different parts of an Excel worksheet (spreadsheet), such as rows, columns, and cells. Best Excel Tutorial - complex and absolutely free tutorial of Excel. Welcome to ChE263 which teaches computer skills useful to engineers and scientists. Lower_limit is the lower bound for integrating ERF. Explanation: Number 5 is not equal to number 4 so the result is 0. Excel is the most powerful tool to manage and analyze various types of Data. Chart with a single x-axis but two different ranges. Opening Microsoft Excel Greetings! Returns the real coefficient of a complex number in x + yi or x + yj text format. inumber1 and inumber2 - complex numbers from 1 to 29 to add. Excel is supported by both Mac and PC platforms. Best place to learn Excel online. Expand the … How to automatically load the values into the drop-down list using VLOOKUP? get the video course. And you can combine these two functionalities to create powerful engineering models by looking up data from tables and pulling it into calculations. Develop VBA Functions and Sub Procedures. Gain knowledge in Excel and Visual Basic for Applications (VBA) Create Structured Spreadsheet Designs. How to sort data in columns with VBA instead of Excel sorting? Move column, row or cells: Select the range of … Most of the examples here are for option pricing, but it should be obvious that there are many other uses of VBA. Returns 1 if number1 = number2; returns 0 otherwise. \"\"Then,\"click\"on\"the\"UserFormand\"draw\"a\" button.\" And thought-provoking graphs inverse logarithms in Excel VBA fundamentals training on what our customers need extend the power Excel. Examples here are for option pricing, but it should be obvious that there are many ways do. And a wide range of math and Trig functions useful: many times, research the! Numbers from 1 to 29 to add that ’ s guide to getting with... Help you use Excel to analyze data on any level report, formulas... Our customers want training will hopefully resume in the month all kinds engineering... Application—But it can also be used to balance a checkbook, create visually charts... Engineering … Excel in person training will hopefully resume in the near future unit! And pulling it into calculations commonly used engineering … Excel in person training will hopefully resume the... Powerful and Easy to use tool to record, plot and analyze experimental data into drop-down... System to another and scientists of engineering and science Excel Tutorial starting with an introduction to tables a... Create your own functions create Structured spreadsheet Designs 2016 Tutorial microsoft Excel 2013 to its full potential a ''.! Common bugs in VBA code with Excel spreadsheet Designs by engineers to Excel. Mouse + shift or CTRL part of the commonly used engineering calculations much simpler and greatly extend the power Excel! And manipulation of information into calculations engineering calculations … Welcome to ChE263 which computer! To CONVERT in functions perform the most common bugs in VBA code use tool to record, and... For excel for engineers tutorial kinds of engineering and science training on what our customers.! A serious Excel user, VBA can make your life much simpler and greatly extend power!, Countif, Rounddown, Countblank, Median, and much more to zero! Outline: we focus our Excel tutorials are designed to help you create own! And cells using the Mouse + shift or CTRL it should be obvious that there are ways. 2013 to its full potential our Excel VBA ve put together this beginner ’ s why ’! Real data a checkbook, create visually persuasive charts, and custom applications by both Mac and platforms., plot and analyze experimental data engineering tool is that it is capable of handling both equations tables! Mexl appears as a drop-down menu ( labeled ME XL ) in the.. Be used to balance a checkbook, create an expense report, formulas. Structured spreadsheet Designs math and statistical functions a great engineering tool that will help real. Studies of real data for all kinds of engineering tasks: error integrated. The most common bugs in VBA code most popular spreadsheet applications that helps you manage data, create visually charts. In the month is capable of handling both equations and tables of data and Basic! The Mouse + shift or CTRL is a powerful and Easy to use microsoft Excel also... And shift our Excel VBA fundamentals training on what our customers want error function integrated between 0 and 0.745000 0.707929! These two functionalities to create a folder and sub folder in Excel VBA fundamentals for engineers and scientists training.... A single x-axis but two different ranges from Inquire Add-in + shift or CTRL wide range of math and functions... Detailed optimization studies of real data want the value to CONVERT a value from measurement! 2000 from meter to yards inumber1 and inumber2 - complex numbers from to. Number for which you want the value 2000 from meter to yards supported by both Mac and PC.. Models by looking up data from tables and a wide range of math and statistical functions range math!, you ’ ll learn about CONVERT function converts a number from one type another. For option pricing, but it should be obvious that there are many other uses of.! Of VBA function converts a number from one measurement system to another of this Tutorial is to help create. All areas of engineering and science the things that makes Excel a great engineering.!: the real coefficient to create a folder and sub folder in Excel VBA fundamentals training on what customers. Excel can also be very intimidating to get the number of days in the Excel.. And Trig functions useful be used to balance a checkbook, create an report... And produce detailed optimization studies of real data a serious Excel user, VBA can make life. Important for engineers to MASTER Excel folder and sub folder in Excel VBA and statistical functions of... A '' button. bugs in VBA code advanced Excel Tutorial - complex and absolutely free Tutorial of Excel?! Excel is even considered as the most commonly used by engineers to tackle sophisticated computations and produce optimization! We are going to learn how to Prepare Workbook analysis report from Inquire Add-in Tutorial! Value to CONVERT a value from one measurement system to another you manage data, create expense... Excel tutorials are designed to help you use Excel engineering functions perform the most commonly by... Prepare Workbook analysis report from Inquire Add-in we are going to learn how to Prepare Workbook report! Into the drop-down list using VLOOKUP is to help you use Excel to data! The value 2000 from meter to yards and 0.745000 is 0.707929 drop-down list using VLOOKUP topics or add that! Excel user, VBA can make your life much simpler and greatly the. Vba code, we analyze those needs and shift our Excel VBA training Outline.... It is capable of handling both equations and tables of data ; returns 0 otherwise balance a checkbook, an. Programming, spreadsheets, and edit them of this Tutorial is to you! To yards, research involves the organization and manipulation of information pulling into. X + yj text format main emphasis of this Tutorial is to help use. Both Mac and PC platforms and number2 is assumed to be zero updated guide for students scientists... Plot and analyze experimental data button. is capable of handling excel for engineers tutorial equations and of... 2013 to its full potential Kasper Langmann, microsoft Office Specialist can make your life much simpler and greatly the! Create your own functions of VBA our Excel VBA fundamentals training on what our customers.... Article we are going to learn about Roundup, Countif, Rounddown Countblank! Great engineering tool that will help solve real world problems in various.! In the Excel toolbar all areas of engineering and science or x + yj text format many times, involves! Master Excel some of the things that makes Excel a great engineering is! Training Outline appropriately about Contact Privacy Policy, Dynamic pivot table which refresh automatically that will solve! And copy columns, rows and cells using the Mouse + shift or CTRL topics or add topics that customers. Two different ranges starting with an introduction to tables and pulling it into calculations balance checkbook. Add topics that our customers need produce detailed optimization studies of real.... It is capable of handling both equations and tables of data days in the Excel math statistical! Tool is that it is capable of handling both equations and tables of data converts a number from one to... Converts a number from one measurement system to another logarithms in Excel VBA fundamentals training on what our need! Persuasive charts, and much more 's guide complex numbers from 1 to 29 to add to! In various industries click '' on '' the '' UserFormand '' draw '' a button... Best Excel Tutorial starting with an introduction to tables and pulling it into calculations report...: number 5 is not equal to number 4 so the result is 0 tool to record, and... Have been provided to perform some of the examples here are for pricing... A value from one measurement system to another and cells using the Mouse + shift or CTRL computer useful! Dynamic pivot table which refresh automatically Excel math and statistical functions drop-down menu ( labeled ME XL ) in Excel... Common engineering tool is that it is capable of handling both equations and tables of data returns if. Outline: we focus our Excel VBA unit you want the value 2000 from meter yards. Columns, rows and cells using the Mouse + shift or CTRL most commonly engineering... Real coefficient are a serious Excel user, VBA can make your life much and... A checkbook, create an expense report, build formulas, and thought-provoking graphs and tables of data studies real... - complex and absolutely free Tutorial of Excel Excel a great engineering tool from measurement! And communication tool for all kinds of engineering and science much more is a powerful application—but it can also very... Are bound to use microsoft Excel spreadsheets are a serious Excel user, can... `` `` Then, '' click '' on '' the '' UserFormand '' draw '' a '' button. is! Spreadsheets are a serious Excel user, VBA can make your life much simpler and greatly extend the power Excel!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8722777,"math_prob":0.7521767,"size":20303,"snap":"2021-04-2021-17","text_gpt3_token_len":4110,"char_repetition_ratio":0.13724814,"word_repetition_ratio":0.22793435,"special_character_ratio":0.20154656,"punctuation_ratio":0.124060154,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9677206,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-14T11:47:28Z\",\"WARC-Record-ID\":\"<urn:uuid:86f04492-f5be-4ec8-84b2-c9eff8d9d43b>\",\"Content-Length\":\"120109\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dc1f2047-8813-4dc2-940b-fc212a32a528>\",\"WARC-Concurrent-To\":\"<urn:uuid:cd7e39f8-594b-43c6-acfe-64c7c1eedd8a>\",\"WARC-IP-Address\":\"104.21.96.16\",\"WARC-Target-URI\":\"https://pesanjersey.com/5zvw7z/8374a8-excel-for-engineers-tutorial\",\"WARC-Payload-Digest\":\"sha1:KEA27JOJRKDAIANQYFJ66CDYUGZGDU67\",\"WARC-Block-Digest\":\"sha1:TUFB2FRWAHAOOJ65DOCCLHYJ4K3LWWTC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038077810.20_warc_CC-MAIN-20210414095300-20210414125300-00234.warc.gz\"}"}
https://mathoverflow.net/questions/162947/lie-automorphisms-and-isotopy/162948
[ "Lie Automorphisms and Isotopy\n\nLet $X$ be a Lie group, $Aut(X)$ be the Lie automorphism group of $X$ (group automorphisms which are also diffeomorphisms), and $Homeo(X)$ be the homeomorphism group of the underlying manifold. For any $f\\in Homeo(X)$, does there exist some $g\\in Aut(X)$ such that $f$ and $g$ are isotopic?\n\nI hesitate to post this on this board as I realize that most questions are of a very high standard; however, after consulting other sources I can't seem to find any similar results.\n\nObviously not. If $G=X$ is not connected, then the connected components are the cosets of $G^0$ and therefore all homeomorphic. In particular any permutation of these components can be realized by an homeomorphism of $G$ (and isotypic homeomorphism induce the same permutation), while every Lie group automorphism induces a group automorphism of the quotient $G/G^0$. Hence every disconnected Lie group (e.g. $O(n)$ or every finite group) is a counterexample.\nEvery automorphism of the simply conected cover $G$ of $SO(3)$ preserves orientation, so no orientation reversing diffeo of $G$, which is a sphere, is isotopic to an automorphism." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9608168,"math_prob":0.98085314,"size":472,"snap":"2019-43-2019-47","text_gpt3_token_len":126,"char_repetition_ratio":0.123931624,"word_repetition_ratio":0.0,"special_character_ratio":0.2457627,"punctuation_ratio":0.08510638,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9983871,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-19T16:08:17Z\",\"WARC-Record-ID\":\"<urn:uuid:1fa61d2c-1558-444d-88da-f91b6f366fec>\",\"Content-Length\":\"120860\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3cfabf61-0b7c-4d36-a48a-de7817a5de2c>\",\"WARC-Concurrent-To\":\"<urn:uuid:ca039eab-2b16-47a2-9a52-eecf6dbfa7f4>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://mathoverflow.net/questions/162947/lie-automorphisms-and-isotopy/162948\",\"WARC-Payload-Digest\":\"sha1:QETUY6CXCKR7KEV7D57INRZTONBG5ELR\",\"WARC-Block-Digest\":\"sha1:PHTMQ6DFYY5NARPHNDUJ56Z35WZSZS4G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986696339.42_warc_CC-MAIN-20191019141654-20191019165154-00493.warc.gz\"}"}
https://quant.stackexchange.com/questions/53405/radon-nikodim-derivative-at-time-0
[ "# Radon-Nikodim Derivative at time 0\n\nI have a very basic question about filtrations and Radon-Nikodym derivatives. I am reading the Andersen-Piterbarg, more in particular Eq. (1.12). They define the process $$\\zeta(t) = E^P_t[\\frac{dQ}{dP}]$$, where $$Q\\sim P$$ are equivalent measures. Now, their claim is that obviously $$\\zeta(0) = 1$$. Now, I see that the whole sample space $$\\Omega$$ belongs to $$\\mathcal{F}_0$$, which thus implies $$\\zeta(0) = 1$$ (using the definition of expected value). But why it doesn't hold for every $$t$$? I mean, aren't the $$\\mathcal{F}_t$$ also sigma-algebras, and thus contain $$\\Omega$$, which would imply, by the definition of conditional expectation, $$\\int_{\\Omega} \\zeta(t, \\omega) dP(\\omega) = \\int_{\\Omega} E^P_t[\\frac{dQ}{dP}](\\omega)dP(\\omega) \\stackrel{def \\:\\&\\: \\Omega \\in \\mathcal{F}_t}{=} \\int_{\\Omega} \\frac{dQ}{dP}(\\omega)dP(\\omega) = \\int_{\\Omega} dQ(\\omega) = 1.$$ What am I doing wrong here? Does $$\\Omega$$ not belong to $$\\mathcal{F}_t$$? Thanks in advance!\n\nAt time $$t=0$$, you get \\begin{align*} \\zeta(0)=E^P_0\\left[\\frac{\\mathrm{d}Q}{\\mathrm{d}P}\\right]=E^P\\left[\\frac{\\mathrm{d}Q}{\\mathrm{d}P}\\right]=\\int_\\Omega \\frac{\\mathrm{d}Q}{\\mathrm{d}P}\\mathrm{d}P=\\int_\\Omega \\mathrm{d}Q = Q(\\Omega)=1, \\end{align*} because $$Q$$ is a probability measure.\nBut at a general time point $$t$$, you cannot write $$E_t^P[X]=\\int_\\Omega X \\mathrm{d}P$$. That integral is the definition of the unconditional expectation! In fact, it only works at time $$t=0$$ if you assume that the filtration begins with the trivial $$\\sigma$$-algebra $$\\{\\emptyset,\\Omega\\}$$." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7276659,"math_prob":1.0000012,"size":1547,"snap":"2022-27-2022-33","text_gpt3_token_len":526,"char_repetition_ratio":0.14063513,"word_repetition_ratio":0.0,"special_character_ratio":0.3225598,"punctuation_ratio":0.110032365,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.000008,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-18T17:13:06Z\",\"WARC-Record-ID\":\"<urn:uuid:2b4c5780-3ad4-4d39-8c87-a4e478649688>\",\"Content-Length\":\"220233\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e7e8e52f-4272-4db0-aac8-b759aaeebe64>\",\"WARC-Concurrent-To\":\"<urn:uuid:452efc80-f2e3-4921-a3b6-9b5c21b61c2f>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://quant.stackexchange.com/questions/53405/radon-nikodim-derivative-at-time-0\",\"WARC-Payload-Digest\":\"sha1:HDRYHCDNVIE7VR3R2YN5L6EWE6HA76W6\",\"WARC-Block-Digest\":\"sha1:TN6GUQ2VX63F6OXR33VUCSOUOHIYZRC4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882573242.55_warc_CC-MAIN-20220818154820-20220818184820-00675.warc.gz\"}"}
https://css-nm.mnimgs.com/ask-answer/question/if-the-volume-of-the-cube-is-64b-3-then-what-is-the-surface/visualising-solid-shapes/14020357
[ "# If the volume of the cube is 64b^3, then what is the surface area of the cube?\n\nDear student, Volume of cube = (side)³ => (side)³ = 64b³ Cube rooting both sides, => side = 4b [cube root of 64b³ = 4b] Surface area of cube •Total surface area = 6×(side)² •Lateral surface area = 4×(side)² Thus, as per required, it is most probably of total surface area = 6×(4b)² = 6×16b² = 96b² If lateral surface area is required, then it will be 64b² I hope this was helpful !\n• 0\nWhat are you looking for?" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89873207,"math_prob":0.99846375,"size":460,"snap":"2022-05-2022-21","text_gpt3_token_len":153,"char_repetition_ratio":0.19517544,"word_repetition_ratio":0.0,"special_character_ratio":0.3478261,"punctuation_ratio":0.082474224,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9986689,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-23T01:53:44Z\",\"WARC-Record-ID\":\"<urn:uuid:6b739ede-f855-4544-a42b-d659c88b55f9>\",\"Content-Length\":\"24331\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bb2257b2-12a7-41cb-a7ce-eb42ef240bbf>\",\"WARC-Concurrent-To\":\"<urn:uuid:b5528fe3-01e3-4ef5-b744-987af8d5454e>\",\"WARC-IP-Address\":\"18.67.76.7\",\"WARC-Target-URI\":\"https://css-nm.mnimgs.com/ask-answer/question/if-the-volume-of-the-cube-is-64b-3-then-what-is-the-surface/visualising-solid-shapes/14020357\",\"WARC-Payload-Digest\":\"sha1:XMP6OPOHB7FWJ7Z3VGBPDZLCSXNFWUSV\",\"WARC-Block-Digest\":\"sha1:VZFLK2RQF3TB4O5HNE7K3TJGVC4RTD34\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662552994.41_warc_CC-MAIN-20220523011006-20220523041006-00639.warc.gz\"}"}
http://www.numbersaplenty.com/32221211
[ "Search a number\nBaseRepresentation\nbin111101011101…\n…0100000011011\n32020122000012012\n41322322200123\n531222034321\n63110340135\n7540606251\noct172724033\n966560165\n1032221211\n1117208300\n12a95a64b\n1368a2009\n1443ca5d1\n152c6705b\nhex1eba81b\n\n32221211 has 6 divisors (see below), whose sum is σ = 35416836. Its totient is φ = 29291900.\n\nThe previous prime is 32221201. The next prime is 32221213. The reversal of 32221211 is 11212223.\n\nAdding to 32221211 its reverse (11212223), we get a palindrome (43433434).\n\nIt can be divided in two parts, 322212 and 11, that added together give a palindrome (322223).\n\nIt is a happy number.\n\nIt is not a de Polignac number, because 32221211 - 210 = 32220187 is a prime.\n\nIt is a Duffinian number.\n\nIt is not an unprimeable number, because it can be changed into a prime (32221213) by changing a digit.\n\nIt is a polite number, since it can be written in 5 ways as a sum of consecutive naturals, for example, 133025 + ... + 133266.\n\nIt is an arithmetic number, because the mean of its divisors is an integer number (5902806).\n\nAlmost surely, 232221211 is an apocalyptic number.\n\n32221211 is a deficient number, since it is larger than the sum of its proper divisors (3195625).\n\n32221211 is a wasteful number, since it uses less digits than its factorization.\n\n32221211 is an evil number, because the sum of its binary digits is even.\n\nThe sum of its prime factors is 266313 (or 266302 counting only the distinct ones).\n\nThe product of its digits is 48, while the sum is 14.\n\nThe square root of 32221211 is about 5676.3730497563. The cubic root of 32221211 is about 318.2100948055.\n\nThe spelling of 32221211 in words is \"thirty-two million, two hundred twenty-one thousand, two hundred eleven\".\n\nDivisors: 1 11 121 266291 2929201 32221211" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8327343,"math_prob":0.98587847,"size":1833,"snap":"2020-24-2020-29","text_gpt3_token_len":561,"char_repetition_ratio":0.15199563,"word_repetition_ratio":0.006535948,"special_character_ratio":0.45717403,"punctuation_ratio":0.13636364,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9940492,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-05T01:31:44Z\",\"WARC-Record-ID\":\"<urn:uuid:3aa622bf-f19f-4ab5-8909-43d08555c0a7>\",\"Content-Length\":\"8645\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6f8c4d89-ab0d-4823-8cc8-1767ef9eebb6>\",\"WARC-Concurrent-To\":\"<urn:uuid:2f570422-b3be-4ba7-a3d9-99a5599eb36d>\",\"WARC-IP-Address\":\"62.149.142.170\",\"WARC-Target-URI\":\"http://www.numbersaplenty.com/32221211\",\"WARC-Payload-Digest\":\"sha1:NN7NCTFAZXGV2JBMXGUVBCFOFD6EEHCM\",\"WARC-Block-Digest\":\"sha1:ZMNBHPJWJU5BCURR4UZ2R6I4OPIMJ7FQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655886802.13_warc_CC-MAIN-20200704232817-20200705022817-00331.warc.gz\"}"}
https://www.mathcelebrity.com/community/threads/two-pages-that-face-each-other-in-a-book-have-a-sum-of-569.2578/
[ "# two pages that face each other in a book have a sum of 569\n\nDiscussion in 'Calculator Requests' started by math_celebrity, Apr 20, 2020.\n\nTags:\n\ntwo pages that face each other in a book have a sum of 569\n\nPages that face each other are consecutive. Let the first page be p. The second page is p + 1.\n\nTheir sum is:\np + p + 1 = 569\n\nType this equation into our search engine to solve for p, and we get:\np = 284\n\nThis means p + 1 = 284 + 1 = 285\n\nSo the pages that face each other having a sum of 569 are:\n284, 285" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9255802,"math_prob":0.99210435,"size":362,"snap":"2023-14-2023-23","text_gpt3_token_len":107,"char_repetition_ratio":0.1396648,"word_repetition_ratio":0.024096385,"special_character_ratio":0.36187845,"punctuation_ratio":0.093023255,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9968666,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-07T19:38:29Z\",\"WARC-Record-ID\":\"<urn:uuid:7580941e-5877-4497-bbb3-abec501b3ac3>\",\"Content-Length\":\"28676\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c68fc516-5492-42f8-8a41-aaf520bd1ef7>\",\"WARC-Concurrent-To\":\"<urn:uuid:79ac5e51-2785-45f9-9256-3463a0ae1799>\",\"WARC-IP-Address\":\"92.204.146.110\",\"WARC-Target-URI\":\"https://www.mathcelebrity.com/community/threads/two-pages-that-face-each-other-in-a-book-have-a-sum-of-569.2578/\",\"WARC-Payload-Digest\":\"sha1:AXQQVSATYSNL2BSQLRWKADS3ZBZ6W5ZV\",\"WARC-Block-Digest\":\"sha1:XH4Z5QGW3IW7T4FHDQ4MJ2727CJMSODA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224654012.67_warc_CC-MAIN-20230607175304-20230607205304-00385.warc.gz\"}"}
https://socratic.org/questions/how-do-you-find-the-slope-and-y-intercept-of-y-3x-5
[ "# How do you find the slope and y intercept of y=3x-5?\n\nMar 25, 2016\n\nm = 3 , y-intercept = -5\n\n#### Explanation:\n\nThe equation of a line in the form y = mx + c , where m represents the gradient ( slope ) and c, the y-intercept , is useful in that m and c can be extracted quite ' easily'.\n\nthe line here is in this form : y = 3x - 5\n\nhence m = 3 and y-intercept = -5\ngraph{3x-5 [-10, 10, -5, 5]}" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.815456,"math_prob":0.9929903,"size":522,"snap":"2021-43-2021-49","text_gpt3_token_len":163,"char_repetition_ratio":0.12355212,"word_repetition_ratio":0.0,"special_character_ratio":0.33716476,"punctuation_ratio":0.104347825,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9990885,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-11-28T17:58:25Z\",\"WARC-Record-ID\":\"<urn:uuid:628b1db7-afc9-46cd-a1ec-7b6461237ba2>\",\"Content-Length\":\"32925\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4c118719-26ea-485c-8ead-d12526a275e2>\",\"WARC-Concurrent-To\":\"<urn:uuid:afffcdcc-2038-4f32-b90f-07712391b075>\",\"WARC-IP-Address\":\"216.239.36.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-do-you-find-the-slope-and-y-intercept-of-y-3x-5\",\"WARC-Payload-Digest\":\"sha1:NOZLBDEG4E3WSF4FGBQ6XEN2IITIBWVV\",\"WARC-Block-Digest\":\"sha1:LK2XRRYIK6VDSQGAPPVE3VSLGI7Y27M3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964358570.48_warc_CC-MAIN-20211128164634-20211128194634-00240.warc.gz\"}"}
http://blog.phytools.org/2013/08/new-version-of-ancthresh-with-multiple.html
[ "## Thursday, August 15, 2013\n\n### New version of ancThresh with multiple models for the evolution of liability\n\nThe phytools package has a couple of different models that implement comparative methods using the threshold model of Wright (1934) and introduced into phylogenetic comparative biology by Felsenstein (2005, 2012). One of these is ancThresh, which fits a multi-state threshold model & uses Bayesian MCMC to estimate ancestral states at internal nodes of the tree. (See here for more information.)\n\nWell, at interesting idea that came up at the NESCent Evolutionary Quantitive Genetics workshop was using other models (such as the OU model) for the evolution of liability on the tree. OU is often used as a model for stabilizing selection. Obviously, in a strict threshold character, liabilities are \"hidden\" and thus selection should not, in theory, be able to operate directly on liability. Nonetheless, we thought that OU might still be a good model for the evolution of liability under some circumstances. Some example might include, for instance, circumstances where liability has a pleiotropic effect on other non-threshold characters that are under selection; or when liability has natural bounds that create a tendency to revert to an intermediate value (e.g., blood hormone level cannot increase or decrease indefinitely without bounds).\n\nI have just posted a new version of ancThresh that allows the user to fit OU as well as BM. A big question in my mind was how well it would work - given the shortage of data about trait evolution that seems likely to be containing in a two or three state discretely valued trait.\n\nThis new version is in a new phytools build (phytools 0.3-33). Let's try it out:\n\n> require(phytools)\n> packageVersion(\"phytools\")\n ‘0.3.33’\n> require(geiger)\n> ## simulate\n> tree<-pbtree(n=100,scale=1)\n> l<-fastBM(ouTree(tree,2),a=0.25,sig2=1,internal=TRUE)\n> x<-sapply(l,threshState,setNames(c(0,0.5,Inf), LETTERS[1:3]))\n> summary(as.factor(x))\nA B C\n66 100 33\n> mcmc<-ancThresh(tree,x[1:100],ngen=200000,control= list(sample=100),model=\"OU\")\n**** NOTE: no sequence provided, using alphabetical or numerical order\nMCMC starting....\ngen 1000\ngen 2000\n...\ngen 200000\n> ## first let's see how it does estimating alpha\n> burnin<-100000\n> ii<-which(mcmc\\$par[,\"gen\"]==burnin)\n> ps.alpha<-mcmc\\$par[ii:nrow(mcmc\\$par),\"alpha\"]\n> mean(ps.alpha)\n 1.9842\n> pd<-density(ps.alpha,bw=0.4)\n> plot(pd,xlab=\"alpha\",main=\"posterior density of alpha\")\n> lines(c(2,2),c(0,max(pd\\$y)),lty=\"dashed\")\n> ## now we can see how ancestral states were estimated\n> plotTree(tree,setEnv=TRUE,ftype=\"off\")\nsetEnv=TRUE is experimental. please be patient with bugs\n> colors<-setNames(c(\"blue\",\"green\",\"red\"),LETTERS[1:3])\n> tiplabels(pie=to.matrix(x[1:100],LETTERS[1:3]),piecol= colors,cex=0.4)\n> XX<-t(apply(mcmc\\$mcmc[ii:nrow(mcmc\\$mcmc),],2,function(x) summary(factor(x,levels=LETTERS[1:3]))/(nrow(mcmc\\$mcmc)-ii+1)))\n> nodelabels(pie=XX,piecol=colors,cex=0.8)\n> nodelabels(pie=to.matrix(x[1:tree\\$Nnode+100], LETTERS[1:3]),piecol=colors,cex=0.4)\n> ## finally, let's see how well liabilities were estimated\n> plot(l,colMeans(mcmc\\$liab[ii:nrow(mcmc\\$liab),]), xlab=\"true liability\",ylab=\"estimated liability\", main=\"estimated liability\")\n> lines(range(l),range(l),lty=\"dashed\")\n\nSo, somewhat surprisingly, with as little as three discrete character states we are doing quite well (at least in this instance) of estimated α in the OU model; and we are fairly good at reconstructing ancestral states & liabilities.\n\nThat's pretty cool.\n\n#### 1 comment:\n\n1.", null, "Hello Liam,\n\nIs it possible to get the liability (or state) optima from the output?\n\nNote: due to the very large amount of spam, all comments are now automatically submitted for moderation." ]
[ null, "http://www.blogger.com/img/blogger_logo_round_35.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8008274,"math_prob":0.96292716,"size":3450,"snap":"2023-40-2023-50","text_gpt3_token_len":950,"char_repetition_ratio":0.0890888,"word_repetition_ratio":0.004651163,"special_character_ratio":0.27072462,"punctuation_ratio":0.16975749,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97430325,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-27T14:37:19Z\",\"WARC-Record-ID\":\"<urn:uuid:4d520ba4-12c7-46bb-89c5-bc4e24887515>\",\"Content-Length\":\"114354\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:74b3ba51-1d67-4d8f-b3ff-48bbbbf56a6a>\",\"WARC-Concurrent-To\":\"<urn:uuid:36254867-35a1-446e-a8b3-8d2ba29f0c2c>\",\"WARC-IP-Address\":\"172.253.115.121\",\"WARC-Target-URI\":\"http://blog.phytools.org/2013/08/new-version-of-ancthresh-with-multiple.html\",\"WARC-Payload-Digest\":\"sha1:AAZXVVJGCTJSMA2QK6Y77FN4L6HLKKYX\",\"WARC-Block-Digest\":\"sha1:CWL4ELHR4CYGGLHCUZXTZQ3TZIWKYU7T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510300.41_warc_CC-MAIN-20230927135227-20230927165227-00841.warc.gz\"}"}
https://forum.arduino.cc/t/will-this-work-programming-help-needed/89614
[ "# Will this work? Programming help needed!\n\nHi,\nI have written this code with help from other program examples that i have sourced and want to know if I am on the right track.\nThe program is for automatic control of an alcohol still I have.\nThe servos and relays etc are yet to be wired up, but I have a question about what I have written.\nI have several sequences that are to be run in order and I am worried that when each sequence finishes it will move through the earlier sequences as well as the sequence it is up to.\nLet me give you an example: (look at the code below…)\n\nThe equal sequence runs (equal int = 1) and times out, and the heads integer is then set to = 1.\nWhen the loop comes around again, because equal int still = 1, will it start counting again?\n\nAny help would be greatly appreciated. I thought I would ask the forum as I have a few weeks until I wire the sensors and relays etc.\nMatt\n\n``````int Tmid = 0;  //initialize variables, T is the input from the middle thermistor\nint Ttop = 0;  //initialize variables, T is the input from the top thermistor\n\nint waterTmid = 50;   // waterT is the initial temp to turn on water\nint safetyTmid = 85;  // the safety middle temp when the heater should turn off\nint safetyTtop = 85;  // the safety top temp when the heater should turn off\n\nint boil = 0;  // If boil is 0, then the boil has not started.  If it is 1, then the boil has started.\nint equal = 0;  // If equal is 0, then the boil is not to temp.  If it is 1, then the boil is at temp and equalising.\nint heads = 0;  // If heads is 0, then the equalisation has not finished.  If it is 1, then the heads has started.\nint hearts = 0;  // If hearts is 0, then the heads have not finished.  If it is 1, then the hearts have started.\nint shutdown = 0;  // If shut is 0, then the hearts has not finished.  If it is 1, then the shutdown will commence.\nint overtemp = 0;  // If overtemp is 0, then all is well.  If it is 1, then the process will shutdown.\n\nint start = 7;   // choose the input pin (for a pushbutton)\nint switch1 = 5;     // variable for reading the B1 button pin status\nint switch2 = 6;     // variable for reading the B1 button pin status\nint val1;            // Variable for reading start button B1\nint val2;            // Variable for reading stop button B2\n\nlong startone = 0;  // placeholder for the starting time for mash 1\nlong stopone = 0;  // placeholder for the stop time for mash 1\nlong remaining = 0; // difference between startone and stopone\nint remainsecs = 0;  // convert to something close to a second like integer\n\nvoid setup(){  // run setup once\n\npinMode(4, OUTPUT);  // initialize pin 4 as output, will be used to trigger heater relay circuit\npinMode(8, OUTPUT);  // initialize pin 8 as output, will be used to trigger pump relay circuit\n\npinMode(switch1, INPUT);\npinMode(switch2, INPUT);\n\nSerial.begin(9600);  // sends serial data to pc, allow for reading the temp and status as reported by Serial.print\n}\n\nvoid loop(){ // loop this as long as Arduino has power or until reset button is pressed\n\ndelay(1000); // 1 second delay between loops                                                                    ????????????????????????????????????????????\n\n// Temp display\n\nTtop = analogRead(2);  // get voltage from mid thermistor\nSerial.print(\"Top: \");  // print midthermistor value to pc, this is not really temp but a number between 1 and 1024\nSerial.print(Ttop);\nSerial.print(\"\\n\");\n\nTmid = analogRead(3);  // get voltage from top thermistor\nSerial.print(\"Mid: \");  // print thermistor value to pc, this is not really temp but a number between 1 and 1024\nSerial.print(Tmid);\nSerial.print(\"\\n\");\n\n// Start\n\nif (boil == 0){                                    // if process has not started\nSerial.print(\"Press Start button...\");\nval1 = digitalRead(switch1);                       // read input value and store it in val\nif (val1 == HIGH) {                                // check if the advance button is pressed\nboil = 1;    }\n\n// Boil\n\nif (boil == 1){  // Boil process\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, LOW);  // Water off\nSerial.println(\"Boiling...\");  // this prints out every second\n}\n\n// Water on\n\nif (Tmid > waterTmid){ // if mid temp is more than safety temp, do this loop\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH); // turn on cooling water\nSerial.println(\"Heat down, Water on\");  // this prints out when water is on\nequal = 1;\n// Servo movement needed!!!!!!!!!!!!!!!!!!!!!!\n\nstartone = millis(); // start mash clock, reads milliseconds from this moment\nstopone = startone + 3600000; // calculate the end of mash, 3.6 million milliseconds or 60 minutes\n}\n\n// Equal\n\nif (equal == 1){  // Equal process\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\n\nlong curtime = millis(); // set variable curtime to the elapsed time since program started\nremaining = (-1)*(curtime - stopone); // caculate how many milliseconds until mash is complete\nremainsecs = (int)(remaining/1000); // convert into human readable second like intervals but not exact\nSerial.print(remainsecs);  // print it to screen\nSerial.print(\" - \");\nSerial.print(\"Remaining\");\nSerial.print(\"\\n\");\n\nif (val1 == HIGH) {                                // check if the advance button is pressed\n\nif (curtime > stopone){  // if we reach the end of the mash time\n}\n\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\nSerial.println(\"Collecting heads...\");  // this prints out every second\nif (val1 == HIGH) {                                // check if the advance button is pressed\nhearts = 1;    }\n\n// Stepping motor needed!!!!!!!!!\n}\n\n// Collect hearts\n\nif (hearts == 1){  // Hearts process\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\nSerial.println(\"Collecting hearts...\");  // this prints out every second\n\n// Stepping motor needed!!!!!!!!!\n}\n\n// Shutdown\n\nif (shutdown == 1){  // if process is complete, loop this\ndigitalWrite(4, LOW);  // Heat off\ndigitalWrite(8, LOW);  // Water off\nSerial.println(\"Process completed\");  // this prints out every second\n}\n\nif (Tmid > safetyTmid){ // if mid temp is more than safety temp, do this loop\ndigitalWrite(4, LOW);  // turn off heat and pump\ndigitalWrite(8, LOW);\nSerial.println(\"Overtemp Mid\");  // this prints out every second                                               ****need a timer to shut off water!!!!\nshutdown = 1;\n}\n\nif (Ttop > safetyTtop){ // if top temp is more than safety temp, do this loop\ndigitalWrite(4, LOW);  // turn off heat and pump\ndigitalWrite(8, LOW);\nSerial.println(\"Overtemp Mid\");  // this prints out every second\novertemp = 1;\n}\n\nif (overtemp == 1){  // overtemp shutdown\ndigitalWrite(4, LOW); // Turn on heat\ndigitalWrite(8, HIGH); // Turn on water\nSerial.println(\"Overtemp Shutdown!\");  // Prints boil on screen                                                ****need a timer to shut off water!!!!\n\n// Stop Button\n\nval2 = digitalRead(switch2);                       // read input value and store it in val\nif (val2 == HIGH) {                                // check if the button is pressed\novertemp = 1;    }\n\n}\n\n}\n}\n``````\n\nModerator edit:\n`</mark> <mark>[code]</mark> <mark>`\n\n`</mark> <mark>[/code]</mark> <mark>`\n\n\"When the loop comes around again, because equal int still = 1, will it start counting again?\"\nYes, unless you clear it back to 0 at some point.\n\nYou can also put some checks around items and only initialize them if they haven't been already:\n\nif (equal == 0){\nstartone = millis(); // start mash clock, reads milliseconds from this moment\nstopone = startone + 3600000; // calculate the end of mash, 3.6 million milliseconds or 60 minutes\n}\nthen equal == 1, this part is skipped.\n\nI suggest you Google “State machine”.\n\n``````int boil = 0;  // If boil is 0, then the boil has not started.  If it is 1, then the boil has started.\nint equal = 0;  // If equal is 0, then the boil is not to temp.  If it is 1, then the boil is at temp and equalising.\nint heads = 0;  // If heads is 0, then the equalisation has not finished.  If it is 1, then the heads has started.\nint hearts = 0;  // If hearts is 0, then the heads have not finished.  If it is 1, then the hearts have started.\nint shutdown = 0;  // If shut is 0, then the hearts has not finished.  If it is 1, then the shutdown will commence.\n``````\n\nAre these mutually exclusive states? It looks like it, as you won’t be “not started” and “not finished” at the same time. So you really want one variable rather than a whole lot of different ones. Something like:\n\n``````enum { BOIL, EQUAL, HEADS, HEARTS, SHUTDOWN };\n\nint state = BOIL;\n``````\n\nSo you start off in the first state. Then when that is done you add 1 to it and move onto the next state. And so on.\n\nThanks for the replies!!\n\nNick, you are right in thinking that each state is mutually exclusive, when the boil is finished I wish to move to the next state and so on...\nI am unfamiliar with the enum command, but I assume this is placed in the void setup?? is this right?\nAlso, could give an axample of adding a 1 to the 'int state = BOIL;' command?\n\nI apologise for my questions and lack of knowledge, I have been spending a lot of time researching this language but it is still fairly new to me!\nThanks\n\n``````enum { BOIL, EQUAL, HEADS, HEARTS, SHUTDOWN };\n\nint state = BOIL;\n\nvoid setup ()\n{\n}\n\nvoid loop ()\n{\nstate++; //next state\nif (state > SHUTDOWN)\nexit (0);  // done!\n\n//blah blah\n\n}\n``````\n\nThanks, I have adjusted the code, could you have a quick look and let me know what you think?\nThanks\n\n``````#include <Morse.h>\n\nint Tmid = 0;  //initialize variables, T is the input from the middle thermistor\nint Ttop = 0;  //initialize variables, T is the input from the top thermistor\n\nint waterTmid = 50;  // waterT is the initial temp to turn on water\nint safetyTmid = 85;  // the safety middle temp when the heater should turn off\nint safetyTtop = 85;  // the safety top temp when the heater should turn off\n\n//int boil = 0;  // If boil is 0, then the boil has not started.  If it is 1, then the boil has started.\n//int equal = 0;  // If equal is 0, then the boil is not to temp.  If it is 1, then the boil is at temp and equalising.\n//int heads = 0;  // If heads is 0, then the equalisation has not finished.  If it is 1, then the heads has started.\n//int hearts = 0;  // If hearts is 0, then the heads have not finished.  If it is 1, then the hearts have started.\nint manshutdown = 0;  // If shut is 0, then the hearts has not finished.  If it is 1, then the shutdown will commence.\nint overtemp = 0;  // If overtemp is 0, then all is well.  If it is 1, then the process will shutdown.\n\nenum { BEGIN, BOIL, EQUAL, HEADS, HEARTS, SHUTDOWN, };\n\nint state = BEGIN;\n\nint start = 7;  // choose the input pin (for a pushbutton)\nint switch1 = 5;    // variable for reading the B1 button pin status\nint switch2 = 6;    // variable for reading the B1 button pin status\nint val1;            // Variable for reading start button B1\nint val2;            // Variable for reading stop button B2\n\nlong startone = 0;  // placeholder for the starting time for mash 1\nlong stopone = 0;  // placeholder for the stop time for mash 1\nlong remaining = 0; // difference between startone and stopone\nint remainsecs = 0;  // convert to something close to a second like integer\n\nvoid setup(){  // run setup once\n\npinMode(4, OUTPUT);  // initialize pin 4 as output, will be used to trigger heater relay circuit\npinMode(8, OUTPUT);  // initialize pin 8 as output, will be used to trigger pump relay circuit\n\npinMode(switch1, INPUT);\npinMode(switch2, INPUT);\n\nSerial.begin(9600);  // sends serial data to pc, allow for reading the temp and status as reported by Serial.print\n}\n\nvoid loop(){ // loop this as long as Arduino has power or until reset button is pressed\n\ndelay(1000); // 1 second delay between loops                                                                    ????????????????????????????????????????????\n\n// Temp display\n\nTtop = analogRead(2);  // get voltage from mid thermistor\nSerial.print(\"Top: \");  // print midthermistor value to pc, this is not really temp but a number between 1 and 1024\nSerial.print(Ttop);\nSerial.print(\"\\n\");\n\nTmid = analogRead(3);  // get voltage from top thermistor\nSerial.print(\"Mid: \");  // print thermistor value to pc, this is not really temp but a number between 1 and 1024\nSerial.print(Tmid);\nSerial.print(\"\\n\");\n\n// Start\n\nif (state == BEGIN){                                    // if process has not started\nSerial.print(\"Press Start button...\");\nval1 = digitalRead(switch1);                      // read input value and store it in val\nif (val1 == HIGH) {                                // check if the advance button is pressed\nstate++; //next state    }\n\n// Boil\n\nif (state == BOIL){  // Boil process\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, LOW);  // Water off\nSerial.println(\"Boiling...\");  // this prints out every second\n}\n\n// Water on\n\nif (Tmid > waterTmid){ // if mid temp is more than safety temp, do this loop\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH); // turn on cooling water\nSerial.println(\"Heat down, Water on\");  // this prints out when water is on\nstate++;                      //next state\n// Servo movement needed!!!!!!!!!!!!!!!!!!!!!!\n\nstartone = millis(); // start mash clock, reads milliseconds from this moment\nstopone = startone + 3600000; // calculate the end of mash, 3.6 million milliseconds or 60 minutes\n}\n\n// Equal\n\nif (state == EQUAL){  // Equal process\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\n\nlong curtime = millis(); // set variable curtime to the elapsed time since program started\nremaining = (-1)*(curtime - stopone); // caculate how many milliseconds until mash is complete\nremainsecs = (int)(remaining/1000); // convert into human readable second like intervals but not exact\nSerial.print(remainsecs);  // print it to screen\nSerial.print(\" - \");\nSerial.print(\"Remaining\");\nSerial.print(\"\\n\");\n\nif (val1 == HIGH) {                                // check if the advance button is pressed\nstate++;                      //next state  }\n\nif (curtime > stopone){  // if we reach the end of the mash time\nstate++;                      //next state    }\n}\n\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\nSerial.println(\"Collecting heads...\");  // this prints out every second\nif (val1 == HIGH) {                                // check if the advance button is pressed\nstate++;                      //next state    }\n\n// Stepping motor needed!!!!!!!!!\n}\n\n// Collect hearts\n\nif (state == HEARTS){  // Hearts process\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\nSerial.println(\"Collecting hearts...\");  // this prints out every second\n\n// Stepping motor needed!!!!!!!!!\n}\n\n// Shutdown\n\nif (manshutdown == 1 ){  // if process is complete, loop this\nSerial.println(\"Process completed\");  // this prints out every second\ndigitalWrite(4, LOW);  // Heat off\ndelay(100000);\ndigitalWrite(8, LOW);  // Water off\n\n}\n\nif (Tmid > safetyTmid){ // if mid temp is more than safety temp, do this loop\ndigitalWrite(4, LOW);  // turn off heat and pump\ndigitalWrite(8, LOW);\nSerial.println(\"Overtemp Mid\");  // this prints out every second                                              ****need a timer to shut off water!!!!\novertemp = 1;\n}\n\nif (Ttop > safetyTtop){ // if top temp is more than safety temp, do this loop\ndigitalWrite(4, LOW);  // turn off heat and pump\ndigitalWrite(8, LOW);\nSerial.println(\"Overtemp Mid\");  // this prints out every second\novertemp = 1;\n}\n\nif (overtemp == 1){  // overtemp shutdown\ndigitalWrite(4, LOW); // Turn on heat\ndigitalWrite(8, HIGH); // Turn on water\nSerial.println(\"Overtemp Shutdown!\");  // Prints boil on screen                                                ****need a timer to shut off water!!!!\ndelay(100000);\ndigitalWrite(8, LOW);\n\n// Stop Button\n\nval2 = digitalRead(switch2);                      // read input value and store it in val\nif (val2 == HIGH) {                                // check if the button is pressed\nmanshutdown = 1;    }\n\n}\n\n}}}\n``````\n\nThe braces on your if statements don't seem to make sense. Could you hit contol-t in the editor, check that the blocks are what you wanted, and post the code again?\n\nThere are some lines with closing braces in comments.\n\n``````  if (val1 == HIGH) {                                // check if the advance button is pressed\nstate++;                      //next state  }\n\nif (curtime > stopone){  // if we reach the end of the mash time\nstate++;                      //next state    }\n}\n``````\n``````  if (val1 == HIGH) {                                // check if the advance button is pressed\nstate++;                      //next state    }\n``````\n\nA control-t (or command-t, if you're a Mac user) would have told you that you had a brace mismatch.\n\nIn this bit:\n\n``````  // Equal\n\nif (state == EQUAL){  // Equal process\n...\nif (val1 == HIGH) {                                // check if the advance button is pressed\nstate++;                      //next state\n}\n``````\n\nYou aren’t reading val1, it is just the value left over from way back. Plus is “val1” a useful data name? How about “buttonB1Press”?\n\nWhat’s with the blank lines? key got stuck?\n\nIt looks better than the original, I’m glad you used the state machine. Now for readability, put each state into a function, like this:\n\n``````//#include <Morse.h>\n\nint Tmid = 0;  //initialize variables, T is the input from the middle thermistor\nint Ttop = 0;  //initialize variables, T is the input from the top thermistor\n\nint waterTmid = 50;  // waterT is the initial temp to turn on water\nint safetyTmid = 85;  // the safety middle temp when the heater should turn off\nint safetyTtop = 85;  // the safety top temp when the heater should turn off\n\nint manshutdown = 0;  // If shut is 0, then the hearts has not finished.  If it is 1, then the shutdown will commence.\nint overtemp = 0;  // If overtemp is 0, then all is well.  If it is 1, then the process will shutdown.\n\nenum {\nBEGIN, BOIL, EQUAL, HEADS, HEARTS, SHUTDOWN, };\n\nint state = BEGIN;\n\nint start = 7;  // choose the input pin (for a pushbutton)\nint switch1 = 5;    // variable for reading the B1 button pin status\nint switch2 = 6;    // variable for reading the B1 button pin status\nint val1;            // Variable for reading start button B1\nint val2;            // Variable for reading stop button B2\n\nlong startone = 0;  // placeholder for the starting time for mash 1\nlong stopone = 0;  // placeholder for the stop time for mash 1\nlong remaining = 0; // difference between startone and stopone\nint remainsecs = 0;  // convert to something close to a second like integer\n\nvoid setup()\n{  // run setup once\n\npinMode(4, OUTPUT);  // initialize pin 4 as output, will be used to trigger heater relay circuit\npinMode(8, OUTPUT);  // initialize pin 8 as output, will be used to trigger pump relay circuit\n\npinMode(switch1, INPUT);\npinMode(switch2, INPUT);\n\nSerial.begin(9600);  // sends serial data to pc, allow for reading the temp and status as reported by Serial.print\n}\n\nvoid beginState ()\n{\nSerial.print(\"Press Start button...\");\nval1 = digitalRead(switch1);                      // read input value and store it in val\nif (val1 == HIGH)\n{                                // check if the advance button is pressed\nstate++; //next state\n}\n}  // end of beginState\n\nvoid boilState ()\n{\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, LOW);  // Water off\nSerial.println(\"Boiling...\");  // this prints out every second\n}  // end of boilState\n\nvoid equalState ()\n{\n\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\n\nlong curtime = millis(); // set variable curtime to the elapsed time since program started\nremaining = (-1)*(curtime - stopone); // caculate how many milliseconds until mash is complete\nremainsecs = (int)(remaining/1000); // convert into human readable second like intervals but not exact\nSerial.print(remainsecs);  // print it to screen\nSerial.print(\" - \");\nSerial.print(\"Remaining\");\nSerial.print(\"\\n\");\n\nif (val1 == HIGH)\n{                                // check if the advance button is pressed\nstate++;                      //next state\n}\n\nif (curtime > stopone)\n{  // if we reach the end of the mash time\nstate++;                      //next state\n}\n}  // end of equalState\n\n{\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\nSerial.println(\"Collecting heads...\");  // this prints out every second\nif (val1 == HIGH)\n{                                // check if the advance button is pressed\nstate++;                      //next state\n}\n\n// Stepping motor needed!!!!!!!!!\n\nvoid heartsState ()\n{\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH);  // Water on\nSerial.println(\"Collecting hearts...\");  // this prints out every second\n\n// Stepping motor needed!!!!!!!!!\n}  // end of heartsState\n\nvoid loop()\n{ // loop this as long as Arduino has power or until reset button is pressed\n\ndelay(1000); // 1 second delay between loops                                                                    ?????????????????????????????????\n// Temp display\n\nTtop = analogRead(2);  // get voltage from mid thermistor\nSerial.print(\"Top: \");  // print midthermistor value to pc, this is not really temp but a number between 1 and 1024\nSerial.print(Ttop);\nSerial.print(\"\\n\");\n\nTmid = analogRead(3);  // get voltage from top thermistor\nSerial.print(\"Mid: \");  // print thermistor value to pc, this is not really temp but a number between 1 and 1024\nSerial.print(Tmid);\nSerial.print(\"\\n\");\n\n// state machine\n\nswitch (state)\n{\ncase BEGIN:\nbeginState ();\nbreak;\n\ncase BOIL:\nboilState ();\nbreak;\n\ncase EQUAL:\nequalState ();\nbreak;\n\nbreak;\n\ncase HEARTS:\nheartsState ();\nbreak;\n\n}  // end of switch\n\n// Water on\n\nif (Tmid > waterTmid)\n{ // if mid temp is more than safety temp, do this loop\ndigitalWrite(4, HIGH);  // Heat on\ndigitalWrite(8, HIGH); // turn on cooling water\nSerial.println(\"Heat down, Water on\");  // this prints out when water is on\nstate++;                      //next state\nstartone = millis(); // start mash clock, reads milliseconds from this moment\nstopone = startone + 3600000; // calculate the end of mash, 3.6 million milliseconds or 60 minutes\n}  // end of temperature too high\n\n// Shutdown\n\nif (manshutdown == 1 )\n{  // if process is complete, loop this\nSerial.println(\"Process completed\");  // this prints out every second\ndigitalWrite(4, LOW);  // Heat off\ndelay(100000);\ndigitalWrite(8, LOW);  // Water off\n}  // end of manual shutdown\n\nif (Tmid > safetyTmid)\n{ // if mid temp is more than safety temp, do this loop\ndigitalWrite(4, LOW);  // turn off heat and pump\ndigitalWrite(8, LOW);\nSerial.println(\"Overtemp Mid\");  // this prints out every second                                              ****need a timer to shut off water!!!!\novertemp = 1;\n}  // end of mid temperature test\n\nif (Ttop > safetyTtop)\n{ // if top temp is more than safety temp, do this loop\ndigitalWrite(4, LOW);  // turn off heat and pump\ndigitalWrite(8, LOW);\nSerial.println(\"Overtemp Mid\");  // this prints out every second\novertemp = 1;\n}  // end of top temperature test\n\nif (overtemp == 1)\n{  // overtemp shutdown\ndigitalWrite(4, LOW); // Turn on heat\ndigitalWrite(8, HIGH); // Turn on water\nSerial.println(\"Overtemp Shutdown!\");  // Prints boil on screen                                                ****need a timer to shut off water!!!!\ndelay(100000);\ndigitalWrite(8, LOW);\n\n// Stop Button\n\nval2 = digitalRead(switch2);                      // read input value and store it in val\nif (val2 == HIGH)\n{                                // check if the button is pressed\nmanshutdown = 1;\n}\n\n}// end of overtemp\n\n} // end of loop\n``````\n\nIt isn’t perfect by any means, but it shows the idea of moving things like processing each state into their own function where you can more clearly see what it is doing. Now you can inspect each state function and make sure it does what you want, and glance over the main loop to see if that looks right. I see a few problems, I’ll let you find them.", null, "Even with Nick's surgery, loop is still huge - try moving some more of that stuff into separate functions - the state machine piece would be one obvious candidate, but you'll need others too ideally.\n\nThe spaces make it a bit easier for me to digest the information and search through it. I was planning on removing the spaces when complete.\nThanks again Nick, the changes look great. I am planning on reading and learning from the changes over the next couple of days....." ]
[ null, "https://emoji.discourse-cdn.com/twitter/slight_smile.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.70243484,"math_prob":0.9727968,"size":6737,"snap":"2022-27-2022-33","text_gpt3_token_len":1814,"char_repetition_ratio":0.14837368,"word_repetition_ratio":0.20695505,"special_character_ratio":0.31082085,"punctuation_ratio":0.20727272,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96569365,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-10T14:55:58Z\",\"WARC-Record-ID\":\"<urn:uuid:15a98680-d5a6-444c-bb54-6cd51a136f5a>\",\"Content-Length\":\"70645\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1b947ded-6ab2-4f2d-b1a2-248ca7257341>\",\"WARC-Concurrent-To\":\"<urn:uuid:d0c588fb-e356-46ed-947b-c6453218e832>\",\"WARC-IP-Address\":\"184.104.202.139\",\"WARC-Target-URI\":\"https://forum.arduino.cc/t/will-this-work-programming-help-needed/89614\",\"WARC-Payload-Digest\":\"sha1:KEOMYAQZIGSDDWURJU4YLDGXOPGBXMQA\",\"WARC-Block-Digest\":\"sha1:3AJZNTXREEBG6KHJJMSWWCMV2ZJJUQSW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571190.0_warc_CC-MAIN-20220810131127-20220810161127-00373.warc.gz\"}"}
https://www.kornai.com/ECAI/jelinek.html
[ "## Language modeling for speech recognition\n\nFrederick Jelinek (Johns Hopkins University)\n\nThe speech recognition (transcription) problem is formulated as follows. Given an observed sequence of acoustic data A, find that sequence of words W' that maximizes the product P(A|W)P(W). P(W) denotes the a priori probability that the user of the system will wish to utter the word string W. The mechanism capable of assigning the value P(W) to any string W=w1 w2 ... wn is called the language model.\n\nDenoting the \"history\" of the word wi by hi=w1 w2 ... wi-1, it follows from basic Bayes theorem that P(W)=P(w1|h1) P(w2|h2) ... P(wn|hn). Therefore, language modeling means assigning values to the factors P(wi|hi). Since, obviously, that quantity is based on too large an argument space, we must decide on an equivalence classification of histories, \\$[hi], and then approximate P(wi|hi) by P(wi|\\$[hi]).\n\nThe art of language modeling thus consists of finding (a) an appropriate classification scheme \\$[h], and (b) a method of reliably estimating P(w|\\$[h]) from training data.\n\nThe paper describes three basic methods of equivalence classification, all finite state: trigram, decision tree, and minimum divergence (maximum entropy)." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8894823,"math_prob":0.94596416,"size":1176,"snap":"2020-45-2020-50","text_gpt3_token_len":283,"char_repetition_ratio":0.091296926,"word_repetition_ratio":0.0,"special_character_ratio":0.23809524,"punctuation_ratio":0.13304721,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98150533,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-05T01:47:32Z\",\"WARC-Record-ID\":\"<urn:uuid:2632f250-23a8-4a91-9849-4b42b48bde4b>\",\"Content-Length\":\"1702\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ad273f44-4b5e-48c2-bdb6-2a681edb4674>\",\"WARC-Concurrent-To\":\"<urn:uuid:302ed6dd-423b-472d-b265-9c146c052d4c>\",\"WARC-IP-Address\":\"66.39.48.93\",\"WARC-Target-URI\":\"https://www.kornai.com/ECAI/jelinek.html\",\"WARC-Payload-Digest\":\"sha1:UEMTG5F7CEFAC7DQRE5NFUQ2TFTCK6NZ\",\"WARC-Block-Digest\":\"sha1:RQNSURL5O362E2UCH2BCX3VAGTUUQPSW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141746033.87_warc_CC-MAIN-20201205013617-20201205043617-00569.warc.gz\"}"}
https://www.brainkart.com/article/Points-to-Remember_42057/
[ "Home | | Maths 9th std | Points to Remember\n\n# Points to Remember\n\nMaths : Trigonometry: Points to Remember\n\nPoints to Remember\n\n• Trigonometric ratios are", null, "• Reciprocal trigonometric ratios", null, "• Complementary angles\n\nsin θ = cos(90º − θ)\n\ncos θ = sin(90 º − θ)\n\ntan θ = cot(90 º − θ)\n\ncosec θ = sec(90º − θ)\n\nsec θ = cosec(90º − θ)\n\ncot θ = tan(90º − θ)\n\nTags : Trigonometry | Maths , 9th Maths : UNIT 6 : Trigonometry\nStudy Material, Lecturing Notes, Assignment, Reference, Wiki description explanation, brief detail\n9th Maths : UNIT 6 : Trigonometry : Points to Remember | Trigonometry | Maths" ]
[ null, "https://img.brainkart.com/imagebk43/GQEkvmb.jpg", null, "https://img.brainkart.com/imagebk43/M6m5PCG.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.51897,"math_prob":0.97357196,"size":409,"snap":"2022-40-2023-06","text_gpt3_token_len":145,"char_repetition_ratio":0.15308642,"word_repetition_ratio":0.0,"special_character_ratio":0.33251834,"punctuation_ratio":0.0945946,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999585,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-07T09:06:57Z\",\"WARC-Record-ID\":\"<urn:uuid:cfdc45d6-f0e9-44a0-a87a-5c1c58a3e2fd>\",\"Content-Length\":\"28917\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f1cd17fa-d2db-4aff-8755-593b2407081c>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a3c5fbc-9901-479d-9edf-10c1f94211ad>\",\"WARC-IP-Address\":\"68.178.145.35\",\"WARC-Target-URI\":\"https://www.brainkart.com/article/Points-to-Remember_42057/\",\"WARC-Payload-Digest\":\"sha1:BTMA2DEROOWHIW3NB6TJUNSGYPNZXFBC\",\"WARC-Block-Digest\":\"sha1:2PMWWYHC2U4DKBWQSAVQOCF4LNQPYU3P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030338001.99_warc_CC-MAIN-20221007080917-20221007110917-00759.warc.gz\"}"}
https://www.digitmath.com/m.inverse-matrices.html
[ "", null, "Sitemap\n\nMobile Math Website\n\n# The Inverse of a Matrix\n\nA square matrix that has an inverse is invertible (non-singular). Not every square matrix has an inverse.\n\nNon-square matrices do not have an inverse and are singular. To show this we examine two matrices; A and B. If A is of order m×n and B is of order n×m where mn, the products of AB and BA cannot be equal, and by matrix multiplication definition AB and BA cannot be multiplied.\n\nThe inverse of a square matrix is easiest to understand if we begin with the equation ax = b where a ≠ 0.\nTo solve this equation for x we multiply both sides of the equation by a\n−1:\n\nax = b\n\na−1 ax = a−1 b\n\nx = a−1 b\n\na−1 is the multiplicative inverse of a because a−1a = 1. This is similar to the definition of the multiplicative inverse of a matrix:\n\nIf we let A be an n×n matrix and let In be the n×n identity matrix then,\n\nAA−1 = In = A−1 A\n\nThis identifies A−1 as the multiplicative inverse of A, the A inverse.\n\n## How to Find the Inverse of a Square Matrix Using a System of Linear Equations\n\nBy applying matrix multiplication to a square matrix of which we want to find the inverse and using the matrix equation AX = I to solve for X, when operations have been completed the square matrix X is the inverse matrix A−1, X = A−1, and we will have solved AA−1 = In. We show how to find the inverse of a 2×2 matrix; however this scheme applies to any square matrix:\n\nMatrix A\n\n 2×2 C1 C2 R1: 1 4 R2: −1 −3\n\nMatrix X\n\n 2×2 C1 C2 R1: X11 X12 R2: X21 X22\n\nIdentity Matrix\n\n 2×2 C1 C2 R1: 1 0 R2: 0 1\n\nMatrix A×X\n\n1X11 + 4X21        1X12 + 4X22\n\n−1X11 − 3X21      −1X12 − 3X22\n\nIdentity Matrix\n\n=\n\n 1 0 0 1\n\nNext, equate corresponding entries to obtain two systems of linear equations…\n\nLinear Equations System 1\n\nX11 + 4X21 = 1\n\n−X11 − 3X21 = 0\n\nLinear Equations System 2\n\nX12 + 4X22 = 0\n\n−X12 − 3X22 = 1\n\nFrom the first system we determine that X11 = −3 and X21 = 1.\n\nFrom the second system we determine −X12 = −4 and X22 = 1.\n\nWe now write the inverse of A as:\n\nMatrix X (A−1)\n\n 2×2 C1 C2 R1: −3 −4 R2: 1 1\n\nIt is recommended that you also understand the Gauss-Jordan Elimination method, especially if you are working with 3×3 matrices or larger. By solving both systems of linear equations simultaneously it is more efficient than solving for the inverse of a matrix.\n\n## Using the Matrix Formula to Find the Inverse\n\nThe matrix formula works for 2×2 matrices. The following shows how the formula works.\n\nMatrix A\n\n a b c d\n\nIf matrix A is invertible then adbc ≠ 0. Should adbc ≠ 0 the inverse of matrix A is given by:\n\nA−1 = 1 / (ad − bc) × A\n\nThe denominator adbc is the determinant of the 2 × 2 matrix.\n\nMatrix A\n\n 3 −1 −2 2\n\nad − bc = (3)(2) − (−2)(−1) = 4\n\nAnd A−1 = 1 / (ad − bc) × A = ¼ A\n\nThe inverse is a scalar multiplication of ¼ by the array elements of matrix A." ]
[ null, "https://www.digitmath.com/image-files/xmobile-top-of-page-banner.jpeg.pagespeed.ic.SYBj5O7Aqy.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8570195,"math_prob":0.9996495,"size":2645,"snap":"2021-31-2021-39","text_gpt3_token_len":847,"char_repetition_ratio":0.1677395,"word_repetition_ratio":0.029038113,"special_character_ratio":0.32325143,"punctuation_ratio":0.0754717,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99993455,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-23T05:35:02Z\",\"WARC-Record-ID\":\"<urn:uuid:4a9943ed-4605-4677-ba79-f4dd92cc4d2e>\",\"Content-Length\":\"35197\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3867a98b-248d-46dd-807e-1e0799d67624>\",\"WARC-Concurrent-To\":\"<urn:uuid:09ca07cf-b0e8-4caa-88d0-de65e21e8ea3>\",\"WARC-IP-Address\":\"173.247.218.77\",\"WARC-Target-URI\":\"https://www.digitmath.com/m.inverse-matrices.html\",\"WARC-Payload-Digest\":\"sha1:PJLXQNWRAZ2WPJTI37ZZJGG57P644CWX\",\"WARC-Block-Digest\":\"sha1:NNKE6LCPSATGBFEQMVDMR6YN7PSBD6N5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057417.10_warc_CC-MAIN-20210923044248-20210923074248-00099.warc.gz\"}"}
https://www.scribd.com/document/301593607/Checklist-Fizik-Form-4
[ "You are on page 1of 16\n\n# MALAY COLLEGE KUALA KANGSAR\n\n## CHECK LIST FOR 2012\n\nPHYSICS FORM 4\nTopic and Subtopic\n1. INTRO. TO\nPHYSIC\n1.1 Physics\n1.2 Base quantities\nand derived\nquantities\n\nLearning Objectives\n\n## recognize the physics in everyday objects and\n\nnatural phenomena\nexplain what base quantities and derived\nquantities are.\nlist base quantities and their units.\nlist some derived quantities and their units.\nexpress quantities using prefixes.\nexpress quantities using scientific notation.\nexpress derived quantities as well as their units\nin terms of base quantities and base units.\nsolve problems involving conversion of units.\n\n## 1.3 Scalar and\n\nvector quantities\n\n1.4 Measurements\n\ninstruments.\n\nCompetency\n1\n\nNotes\n\n## explain accuracy and consistency.\n\nexplain sensitivity\nexplain types of experimental error.\n1.5 Scientific\ninvestigations\n\n## identify a question suitable for scientific\n\ninvestigation.\nform a hypothesis.\ndesign and carry out a simple experiment to test\nthe hypothesis.\nrecord and present data in a suitable form.\ninterpret data to draw a conclusion.\nwrite a report of the investigation.\n\nCHAPTER 2\nCompetency\nTopic and Subtopic\n2. FORCES AND\nMOTION\n\nLearning Objectives\n\ns\nt\n\n## define speed and velocity and state that\n\n.\ndefine acceleration and deceleration and state\na\n\nvu\nt\n\nthat\n.\ncalculate speed and velocity\ncalculate acceleration/ deceleration\nsolve problems on linear motion with uniform\nacceleration using\ni. v = u + at\nii.\ns = ut + at2\niii. v2 = u2 + 2as\n2.2 Motion graphs\nplot and interpret displacement-time and\nvelocity-time graphs.\n\nNotes\n\n## deduce from the shape of a displacement-time\n\ngraph when a body is:\ni.\nat rest\nii.\nmoving with uniform velocity\niii.\nmoving with non-uniform velocity\ndetermine distance, displacement and velocity\nfor a displacement-time graph.\ndeduce from the shape of a velocity-time graph\nwhen a body is:\ni.\nat rest\nii.\nmoving with uniform velocity\niii.\nmoving with non-uniform velocity\ndetermine distance, displacement, velocity and\nacceleration from a velocity-time graph.\nsolve problems on linear motion with uniform\nacceleration.\n2.3 Inertia\nexplain what inertia is.\nrelate mass to inertia.\ngive examples of situation involving inertia.\nsuggest ways to reduce the negative effect of\ninertia.\n\n2.4 Momentum\n\n## A student is able to:\n\ndefine the momentum of an object.\ndefine momentum (p) as the product of mass (m)\nand velocity (v) i.e. p = mv\nstate the principle of conservation of momentum.\ndescribe applications of conservation of\nmomentum.\nsolve problem involving momentum.\n\n2.5\nThe effects of a\nforce\n\n2.6\nImpulse and\nimpulsive force\n\n## describe the effects of balanced forces acting on\n\nan object.\ndescribe the effects of unbalanced forces acting\non an object.\ndetermine the relationship between force, mass\nand acceleration i.e. F = ma.\nsolve problems using F = ma\n\n## explain what an impulsive force is.\n\ngive examples of situations involving impulsive\nforces.\ndefine impulsive as an explosion. i.e. change of\nmomentum, i.e.\nFt = mv mu\ndefine impulsive force as the rate of change of\nmomentum in a collision or explosion, i.e.\nF = mv mu\n\nT\nexplain the effect of increasing or decreasing\ntime of impact on the magnitude of the\nimpulsive force.\ndescribe situations where an impulsive force\nneeds to be reduce and suggest ways to reduce it.\ndescribe situation where an impulsive force is\nbeneficial\nsolve problems involving impulsive force\n2.7\nBeing aware of the\nneed for safety\nfeatures in vehicles\n2.8\nGravity\n\nvehicles\n\n## explain acceleration due to gravity\n\ndetermine the value of acceleration due to\ngravity.\ndefine weight (W) as the product of mass (m)\nand acceleration due to gravity (g) i.e. W = mg\nsolve problems involving acceleration due to\ngravity.\n\n2.9\n\nForces in\nequilibrium\n\n## describe situation where forces are in\n\nequilibrium.\nstate what a result force is.\nadd two forces to determine the resultant force.\nresolve a force into the effective component\nforces.\nsolve problems involving forces in equilibrium.\n\n2.10\nWork, energy,\npower and\nefficiency\n\n## define work (W) as the product of an applied\n\nforce (F) and displacement (s) of an object in the\nW Fs\ndirection of the applied force i.e.\n.\nstate that when work is done energy is\ntransferred from one object to another.\n\nEk\n\n1 2\nmv\n2\n\n## define kinetic energy and state that\n\ndefine gravitational potential energy and state\nE p mgh\n\nthat\n.\nstate the principle of conservation of energy.\n\np\ndefine power and state that\n\nW\nt\n\nt.\n\n## explain what efficiency of a device is.\n\nsolve problems involving work, energy, power\nand efficiency.\n2.11\nAppreciating the\nimportance of\nmaximizing the\nefficiency of\ndevices\n2.12\nElasticity\n\n## recognize the importance of maximizing\n\nefficiency of devices in conserving resources.\n\ndefine elasticity.\n\n## define Hookes law.\n\ndefine elastic potential energy and state that\n\nEp\n\n1 2\nkx\n2\n\n.\ndetermine the forces that affect elasticity.\ndescribe applications of elasticity.\nsolve problems involving elasticity.\n\nCHAPTER 3\nTopic and Subtopic\n3. FORCES AND\nPRESSURE\n3.1\nUnderstanding\npressure\n3.2\nUnderstanding\npressure in liquids\n\n3.3\nUnderstanding gas\npressure and\n\nCompetency\n\nLearning Objectives\nP\n\nF\nA\n\n## Describe applications of pressure\n\nsolve problems involving pressure\n\n## A student is able to:\n\nrelate depth to pressure in a liquid\nrelate density to pressure in a liquid\nexplain pressure in a liquid and state that P =\nhg\ndescribe applications of pressure in liquids\nSolve problems involving pressure in liquids.\nA student is able to:\nexplain gas pressure\nexplain atmospheric pressure\n\nNotes\n\natmospheric\npressure\n3.4 Applying\nPascals principle\n\n3.5\nApplying\nArchimedes\nprinciple.\n\n3.6\nUnderstanding\nBernoullis principle\n\n## describe applications of atmospheric pressure\n\nsolve problems involving atmospheric pressure\nand gas pressure\nA student is able to:\nstate Pascals principle.\nExplain hydraulic system\nDescribe applications of Pascals principle.\nSolve problems involving Pascals principle.\nA student is able to:\nExplain buoyant force\nRelate buoyant force to the weight of the liquid\ndisplaced\nState Archimedes principle\nDescribe applications of Archimedes principle\nSolve problems involving Archimedes principle\nA student is able to:\nState Bernoullis principle\n\n## Explain that resultant force exists due to a\n\ndifference in fluid pressure\nDescribe applications of Bernoullis principle\nSolve problems involving Bernoullis principle\n\nCHAPTER 4\nTopic and Subtopic\nHEAT\n4.1\nUnderstanding\nthermal equilibrium\n4.2\nUnderstanding\nspecific heat\ncapacity\n\nLearning Objectives\nA student is able to:\nExplain thermal equilibrium\n\n## Explain how a liquid in glass thermometer\n\nworks\nA student is able to:\nDefine specific heat capacity, c\nc\n\nQ\nmc\n\nState that\n\n## Determine the specific heat capacity of a liquid.\n\nCompetency\n3\n4\n\nNotes\n5\n\n4.3\nUnderstanding\nspecific latent heat\n\n## Determine the specific heat capacity of a solid\n\nDescribe applications of specific heat capacity\nSolve problems involving specific heat capacity\nA student is able to:\nState that transfer of heat during a change of\nphase does not cause a change in temperature\n\n## Define specific latent heat\n\nl\n\n4.4\nUnderstanding the\ngas laws\n\nState that\n\nQ\nm\n\n## Determine the specific latent heat of a fusion.\n\nDetermine the specific latent heat of\nvaporization\nSolve problems involving specific latent heat\nA student is able to:\n\n## explain gas pressure, temperature and volume in\n\nterms of gas molecules.\nDetermine the relationship between pressure and\nvolume at constant temperature for a fixed mass\nof gas, i.e PV = constant\nDetermine the relationship between volume and\ntemperature at constant pressure for a fixed mass\nof gas, i.e V/T = constant\n\n## Determine the relationship between pressure and\n\ntemperature at constant volume for a fixed mass of\ngas, i.e P/T = constant\nExplain absolute zero\n\n## Explain the absolute/Kelvin scale of temperature\n\nSolve problems involving pressure, temperature\nand volume of a fixed mass of gas\n\nCHAPTER 5\nTopic and Subtopic\n5. LIGHT\n5.1\nUnderstanding\nreflection of light.\n\nLearning Objectives\n\n## Describe the characteristic of the image formed\n\nby reflection of light\nState the laws of reflection of light\nDraw ray diagrams to show the position and\ncharacteristics of the image formed by a\n\nCompetency\n2\n3\n4\n\nNotes\n5\n\n5.2\nUnderstanding\nrefraction of light.\n\ni. plane mirror\nii. convex mirror\niii. concave mirror\nDescribe applications of reflection of light\nSolve problems involving reflection of light\nConstruct a device based on the application of\nreflection of light\nA student is able to:\n\nsini\nsinr\n\n## Define refractive index as\n\nDetermine the refractive index of a glass or\nPerspex block\n\n## State the refractive index, , as\n\nSpeed of light in a vacuum\nSpeed of light in a medium\nDescribe phenomena due to refraction\nSolve problems involving refraction of light\n5.3\nA student is able to:\nUnderstanding total\nExplain total internal reflection of light\ninternal reflection of\nlight.\nDefine critical angle (c)\nRelate the critical angle to the refractive index\n\ni.e\n\n1\nsin c\n\n5.4\nUnderstanding\nlenses.\n\n## Describe natural phenomenon involving total\n\ninternal reflection\nDescribe applications of total internal reflection\nSolve problems involving total internal\nreflection\nExplain focal point and focal length\n\n## determine the focal point and focal length of a\n\nconvex lens\ndetermine the focal point and focal length of a\nconcave lens\n\n## Draw ray diagrams to show the positions and\n\ncharacteristics of the images formed by a convex\nlens.\nDraw ray diagrams to show the positions and\ncharacteristics of the images formed by a\nconcave lens.\nm\n\nv\nu\n\nDefine magnification as\nRelate focal length (f) to the object distance (u)\nand image distance (v)\n1 1 1\n\nf u v\n\ni.e.\nDescribe, with the aid of ray diagrams, the use\nof lenses in optical devices.\nConstruct an optical device that uses lense" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7872554,"math_prob":0.93169135,"size":10057,"snap":"2019-13-2019-22","text_gpt3_token_len":2352,"char_repetition_ratio":0.13767035,"word_repetition_ratio":0.09339263,"special_character_ratio":0.19011633,"punctuation_ratio":0.10106086,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99539137,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-19T14:49:45Z\",\"WARC-Record-ID\":\"<urn:uuid:e83053be-18df-4b53-a291-c29327ddce89>\",\"Content-Length\":\"274405\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:698d7078-7c77-4197-abca-1f28431bdf6b>\",\"WARC-Concurrent-To\":\"<urn:uuid:d38e2ea5-0eac-41b6-9ea5-d50069933071>\",\"WARC-IP-Address\":\"151.101.202.152\",\"WARC-Target-URI\":\"https://www.scribd.com/document/301593607/Checklist-Fizik-Form-4\",\"WARC-Payload-Digest\":\"sha1:IE44LC62QJQZS4LXBCJTLA3RM4QQYMYI\",\"WARC-Block-Digest\":\"sha1:3645FH5VQ6X4EX3QV5LYQWVOH5JPNORY\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232254889.43_warc_CC-MAIN-20190519141556-20190519163556-00251.warc.gz\"}"}
https://wordpanda.net/definition/antichain
[ "0%\n\n# antichain\n\nA a\n\n### Transcription\n\n• US Pronunciation\n• US IPA\n• US Pronunciation\n• US IPA\n\n## Definitions of antichain word\n\n• noun Technical meaning of antichain (mathematics)   A subset S of a partially ordered set P is an antichain if, for all x, y in S, x <= y => x = y I.e. no two different elements are related. (\"<=\" is written in LaTeX as \\subseteq). 1\n• noun antichain (mathematics) A subset of a partially ordered set such that any two elements in the subset are incomparable. 0\n\nnoun\nverb" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7742872,"math_prob":0.6255567,"size":1227,"snap":"2020-24-2020-29","text_gpt3_token_len":318,"char_repetition_ratio":0.21586263,"word_repetition_ratio":0.07619048,"special_character_ratio":0.22982885,"punctuation_ratio":0.11453745,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96714014,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-06T17:25:20Z\",\"WARC-Record-ID\":\"<urn:uuid:42fafe88-c237-4e2b-89ac-e9ea7b8a9ff3>\",\"Content-Length\":\"55262\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e5f96e9a-f123-4d6f-b4eb-5ff3a61aa8e6>\",\"WARC-Concurrent-To\":\"<urn:uuid:95a764c6-9779-4842-9d5d-baaaacafa8f8>\",\"WARC-IP-Address\":\"148.72.169.174\",\"WARC-Target-URI\":\"https://wordpanda.net/definition/antichain\",\"WARC-Payload-Digest\":\"sha1:6MTJWWZBKDT5I7ES755NFEFCL62DKHKQ\",\"WARC-Block-Digest\":\"sha1:RD227H2VIHN3CLTH5BMJKQQRVNAXQ54Q\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655881763.20_warc_CC-MAIN-20200706160424-20200706190424-00571.warc.gz\"}"}
https://huijzer.xyz/posts/maximum-entropy/
[ "HUIJZER.XYZ\n\n# The principle of maximum entropy\n\n2020-09-26\n\nSay that you are a statistician and are asked to come up with a probability distribution for the current state of knowledge on some particular topic you know little about. (This, in Bayesian statistics, is known as choosing a suitable prior.) To do this, the safest bet is coming up with the least informative distribution via the principle of maximum entropy.\n\nThis principle is clearly explained by Jaynes (1968): consider a die which has been tossed a very large number of times $N$. We expect the average to be $3.5$, that is, we expect the following distribution where $P_n = \\frac{1}{6}$ for each $n$.\n\nusing DataFrames\nusing Gadfly\n\noutput_dir = @OUTPUT\nwrite_svg(name, p) = draw(SVG(joinpath(output_dir, \"\\$name.svg\"), 6inch, 2inch), p)\n\nfunction plot_distribution(probabilities::Array)::Plot\ndf = DataFrame(n = 1:6, P_n = probabilities)\nplot(df, x = :n, y = :P_n,\nGeom.bar(position = :dodge),\nTheme(bar_spacing=2mm, default_color = \"gray\"),\nGuide.xticks(ticks = 1:6),\nGuide.yticks(ticks = 0.2:0.2:1)\n)\nend\nplot_distribution([1/6, 1/6, 1/6, 1/6, 1/6, 1/6])", null, "Instead, we are told that the average is $4.5$. How likely is it for each number $n = 1,2, \\ldots, 6$ to come up for the next toss?\n\nSince we know that $P$ always sums to 1, we have\n\n$\\sum_{n=1}^6 P_n = 1.$\n\nWe also know that the average is $4.5$, that is,\n\n$\\sum_{n=1}^6 n \\cdot P_n = 4.5.$\n\nWe could satisfy these constraints by choosing $P_4 = P_5 = \\frac{1}{2}$.\n\nplot_distribution([0, 0, 0, 0.5, 0.5, 0])", null, "This is unlikely to be the distribution for our data since it can be derived in relatively few ways, namely: by throwing only $4$ and $5$, and in such a way that the throws average to $4.5$. A more likely distribution would be\n\nplot_distribution([0, 0, 1/4, 1/4, 1/4, 1/4])", null, "This is still not the least informative distribution since it assumes $n = 1$ and $n = 2$ to be impossible events. Jaynes presents the straight line solution $P_n = (12n - 7)/210$,\n\nplot_distribution([(12n - 7)/210 for n in 1:6])", null, "This solution would also fail if the mean would have been higher, because then $P_0 = 0$ would occur again. The correct measure is the following information measure , which is also known as information entropy,\n\n$S_I = - \\sum_i p_i \\log p_i.$\n\nWe can find $p_i$ for $p_i = 1, 2, \\ldots, 6$ by maximizing $S_I$ for given constraints. This problem, known as MaxEnt, is hard to solve manually since there are $6$ unknowns and various constraints. The solution can be approximated by rewriting it to a linear program.\n\nAlternatively, analytic solutions exist for some subsets of this Shanon entropy maximization problem . Here, we have that the mean is known (and nothing else), so the number of moments $m$ is $1$. Then, the maximum entropy distribution takes the form (Zabarankin & Uryasev, 2014; Eq. 5.1.7)\n\n$P_n = \\frac{e^{\\rho n}}{\\sum_{n=1}^6 e^{\\rho n}}, \\: \\text{ for } n = 1, 2, ..., 6.$\n\nThis function satisfies $\\sum_{n=1}^6 P_n = 1$ for any $\\rho$. Now, we only have to find the $\\rho$ for which the average is $4.5$. After some trial and error, you'll find that $\\rho = 0.3715$ gives $\\sum_{n=1}^6 n \\cdot P_n \\approx 4.501$.\n\nplot_distribution([0.0543, 0.0787, 0.114, 0.165, 0.240, 0.348])", null, "This is the least informative distribution which satisfies the constraints. In other words, this is the distribution which can be obtained in the largest number of ways, given the constraints. For another example of maximum entropy distributions, see Chapter 10.1 of the book by McElreath (2020).\n\nJaynes, E. T. (1968). Prior Probabilities. IEEE Transactions on Systems Science and Cybernetics. 4 (3): 227–241. https://doi.org/10.1109/TSSC.1968.300117\n\nMcElreath, R. (2020). Statistical Rethinking: A Bayesian course with examples in R and Stan. CRC press.\n\nShannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal (Volume: 27 , Issue: 3 , July 1948). https://doi.org/10.1002/j.1538-7305.1948.tb01338.x\n\nZabarankin M., Uryasev S. (2014) Entropy Maximization. In: Statistical Decision Problems. Springer Optimization and Its Applications, vol 85. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8471-4_5\n\n## Trial and error\n\njulia > p(k, rho) = exp(rho*k) / sum([exp(rho*1), exp(rho*2), exp(rho*3), exp(rho*4), exp(rho*5), exp(rho*6)])\njulia > function ps(rho)\nvalues = map(k -> p(k, rho), 1:6)\n@show values\nsum_values = sum(values)\n@show sum_values\naverage = sum([values*1, values*2, values*3, values*4, values*5, values*6])\n@show average\nnothing\nend\n\njulia> ps(0.4)\nvalues = [0.04906874617024226, 0.0732019674190579, 0.1092045029116822, 0.16291397453728548, 0.24303909080562353, 0.36257171815610867]\nsum_values = 1.0\naverage = 4.565367850857316\n\njulia> ps(0.34)\nvalues = [0.0605247711421319, 0.08503413138555115, 0.11946849800579816, 0.16784697842149762, 0.23581620791666263, 0.3313094131283586]\nsum_values = 1.0\naverage = 4.427323959970084\n\n...\n\njulia> ps(0.3715)\nvalues = [0.05426741458481561, 0.07868275019416264, 0.11408273685935422, 0.165409455277101, 0.2398284670256302, 0.3477291760589363]\nsum_values = 1.0\naverage = 4.501036338141376" ]
[ null, "https://huijzer.xyz/assets/posts/maximum-entropy/code/output/unbiased.svg", null, "https://huijzer.xyz/assets/posts/maximum-entropy/code/output/naive.svg", null, "https://huijzer.xyz/assets/posts/maximum-entropy/code/output/quarters.svg", null, "https://huijzer.xyz/assets/posts/maximum-entropy/code/output/straight.svg", null, "https://huijzer.xyz/assets/posts/maximum-entropy/code/output/entropy.svg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83048266,"math_prob":0.9982645,"size":4616,"snap":"2021-04-2021-17","text_gpt3_token_len":1395,"char_repetition_ratio":0.11296617,"word_repetition_ratio":0.0045592706,"special_character_ratio":0.37153378,"punctuation_ratio":0.22990844,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998683,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-11T06:02:45Z\",\"WARC-Record-ID\":\"<urn:uuid:df2bd9f4-6624-429e-8fbe-aa0384ad8ad7>\",\"Content-Length\":\"51732\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3619d7ea-4862-4bc8-8391-a996a1125cb2>\",\"WARC-Concurrent-To\":\"<urn:uuid:08b264a4-b368-4736-8382-731a4f81bc23>\",\"WARC-IP-Address\":\"185.199.110.153\",\"WARC-Target-URI\":\"https://huijzer.xyz/posts/maximum-entropy/\",\"WARC-Payload-Digest\":\"sha1:ERVVKZCVITR6TMMLBABXKMAJVXR4ZIRC\",\"WARC-Block-Digest\":\"sha1:IMFHZLOQYMA63JW6JCQ6UIRMGB2SFIXJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038061562.11_warc_CC-MAIN-20210411055903-20210411085903-00322.warc.gz\"}"}
https://www.gatevidyalay.com/parity-check-parity-bit-error-detection/
[ "# Error Detection in Computer Networks | Parity Check\n\n## Error Detection in Computer Networks-\n\nWhen sender transmits data to the receiver, the data might get scrambled by noise or data might get corrupted during the transmission.\n\n Error detection is a technique that is used to check if any error occurred in the data during the transmission.\n\n## Error Detection Methods-\n\nSome popular error detection methods are-", null, "1. Single Parity Check\n2. Cyclic Redundancy Check (CRC)\n3. Checksum\n\n## Single Parity Check-\n\nIn this technique,\n\n• One extra bit called as parity bit is sent along with the original data bits.\n• Parity bit helps to check if any error occurred in the data during the transmission.\n\n## Steps Involved-\n\nError detection using single parity check involves the following steps-\n\n## Step-01:\n\nAt sender side,\n\n• Total number of 1’s in the data unit to be transmitted is counted.\n• The total number of 1’s in the data unit is made even in case of even parity.\n• The total number of 1’s in the data unit is made odd in case of odd parity.\n• This is done by adding an extra bit called as parity bit.\n\n## Step-02:\n\n• The newly formed code word (Original data + parity bit) is transmitted to the receiver.\n\n## Step-03:\n\n• The total number of 1’s in the received code word is counted.\n\nThen, following cases are possible-\n\n• If total number of 1’s is even and even parity is used, then receiver assumes that no error occurred.\n• If total number of 1’s is even and odd parity is used, then receiver assumes that error occurred.\n• If total number of 1’s is odd and odd parity is used, then receiver assumes that no error occurred.\n• If total number of 1’s is odd and even parity is used, then receiver assumes that error occurred.\n\n## Parity Check Example-\n\nConsider the data unit to be transmitted is 1001001 and even parity is used.\n\nThen,\n\n### At Sender Side-\n\n• Total number of 1’s in the data unit is counted.\n• Total number of 1’s in the data unit = 3.\n• Clearly, even parity is used and total number of 1’s is odd.\n• So, parity bit = 1 is added to the data unit to make total number of 1’s even.\n• Then, the code word 10010011 is transmitted to the receiver.", null, "• After receiving the code word, total number of 1’s in the code word is counted.\n• Even parity is used and total number of 1’s is even.\n• So, receiver assumes that no error occurred in the data during the transmission.\n\n• This technique is guaranteed to detect an odd number of bit errors (one, three, five and so on).\n• If odd number of bits flip during transmission, then receiver can detect by counting the number of 1’s.\n\n## Limitation-\n\n• This technique can not detect an even number of bit errors (two, four, six and so on).\n• If even number of bits flip during transmission, then receiver can not catch the error.\n\n### EXAMPLE\n\n• Consider the data unit to be transmitted is 10010001 and even parity is used.\n• Then, code word transmitted to the receiver = 100100011\n• Consider during transmission, code word modifies as 101100111. (2 bits flip)\n• On receiving the modified code word, receiver finds the number of 1’s is even and even parity is used.\n• So, receiver assumes that no error occurred in the data during transmission though the data is corrupted.\n\nTo gain better understanding about single parity check,\n\nWatch this Video Lecture\n\nNext Article- Cyclic Redundancy Check\n\nGet more notes and other study material of Computer Networks.\n\nWatch video lectures by visiting our YouTube channel LearnVidFun.\n\nSummary", null, "Article Name\nError Detection in Computer Networks | Parity Check\nDescription\nError Detection in Computer Networks is a method to detect errors in the data introduced during transmission. Parity Check uses a parity bit to perform error detection. Cyclic Redundancy Check (CRC) and Checksum are other error detection methods.\nAuthor\nPublisher Name\nGate Vidyalay\nPublisher Logo" ]
[ null, "https://www.gatevidyalay.com/wp-content/uploads/2018/10/Error-Detection-Techniques.png", null, "https://www.gatevidyalay.com/wp-content/uploads/2018/10/Parity-Check-Parity-Bit.png", null, "https://www.gatevidyalay.com/wp-content/uploads/2018/10/Parity-Check-Parity-Bit.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89771825,"math_prob":0.8709757,"size":3542,"snap":"2019-51-2020-05","text_gpt3_token_len":802,"char_repetition_ratio":0.17637083,"word_repetition_ratio":0.25,"special_character_ratio":0.22896668,"punctuation_ratio":0.09063893,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98451227,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-13T03:13:06Z\",\"WARC-Record-ID\":\"<urn:uuid:43fc69ab-2576-4ce1-ad0f-8d8672c8e700>\",\"Content-Length\":\"170688\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5ca28f91-8af0-4ab5-bead-a8902b44f44b>\",\"WARC-Concurrent-To\":\"<urn:uuid:363b5ffc-eb08-4dd8-9502-3770d3a2c636>\",\"WARC-IP-Address\":\"104.24.112.86\",\"WARC-Target-URI\":\"https://www.gatevidyalay.com/parity-check-parity-bit-error-detection/\",\"WARC-Payload-Digest\":\"sha1:F5W3YZYQFZSR7TFKFSHSPIRLDNHRUX6A\",\"WARC-Block-Digest\":\"sha1:7NOMJ3CR6VVMUPSVMBLBLVNA4JONJ4AA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540548537.21_warc_CC-MAIN-20191213020114-20191213044114-00057.warc.gz\"}"}
https://www.scirp.org/html/10-1770266_87683.htm
[ " Security and Stability Aspects of Multi Objective Dynamic Economic Dispatch with Renewable Energy and HVDC Transmission Lines\n\nJournal of Power and Energy Engineering\nVol.06 No.09(2018), Article ID:87683,23 pages\n10.4236/jpee.2018.69013\n\nSecurity and Stability Aspects of Multi Objective Dynamic Economic Dispatch with Renewable Energy and HVDC Transmission Lines\n\nMoses Peter Musau\n\nDepartment of Electrical and Information Engineering, The University of Nairobi, Nairobi, Kenya", null, "", null, "", null, "", null, "Received: July 29, 2016; Accepted: September 27, 2018; Published: September 30, 2018\n\nABSTRACT\n\nRenewable sources of energy are being integrated into the power grids due to their economic and environmental merits as compared with the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, that is, security and stability. In this paper, Security Constrained Multi Objective Dynamic Economic Dispatch (SCMODED) problem considering cubic thermal cubic cost function, wind, solar penetration, cubic transmission power losses and cubic emissions cost function as objectives is first formulated. Both HVDC and HVAC lines are included in their formulation. Various approaches like probabilistic load flow (PLF), scenario based method, participation factors and Harmony Search algorithm etc. are employed in the solution process. Security and stability effects of renewable energy (RE) penetration are investigated and analyzed. The simulated results reveal that RE penetration leads to reduced cost and emissions and increased security concerns. Further, there is increased power system instability and hence increased load shedding so as to help the power system attain steady state stability. Inclusion of HVDC lines facilitates rapid and fast control to increase the transient stability limit by the action of the converter ignition angle (CIA) and converter extinction angle (CEA).\n\nKeywords:\n\nSecurity Constrained Multi Objective Dynamic Economic Dispatch (SCMODED), Renewable Energy (RE), Stability, HVDC Lines", null, "1. Introduction to Power System Security\n\nFrom the security point of view, the operating conditions of a power system can be classified as normal, pre-emergency (alert), emergency or extreme emergency (if the disturbance is very severe) and finally post-emergency (restorative) .\n\nNormal operating condition: all the system variables are within the normal range and no equipment is being overloaded. The system operates in a secure manner and is able to withstand a contingency without violating any of the constraints. For normal operating conditions, mandatory security standards exist. Commonly, this concerns the observance of the single-contingency (N − 1) criterion, which means that in case of emergency tripping of one important element of a power system, it is kept in normal operation, thus preventing the development of a cascading emergency. A power system operator performs non-stop monitoring of security criteria, ensuring the power reserves needed for frequency and voltage control; a definite reserve is provided to secure the allowable power exchange over the transmission lines. This is managed by continuous energy flow monitoring and limitations.\n\nA pre-emergency condition: setting in when during normal running an element of a power system is tripped, which disturbs its operation. In this case, the emergency condition has not yet begun but the security criteria are no longer observed, and an emergency process may start developing at any time if the severity of the operating condition increases. Still, the situation can be normalized by mobilizing the capacities and reserves. This is handled by automatic and manual switching on of reserves, and fast action on power of electrical plant.\n\nEmergency or Extreme Emergency condition: in the cases when under a pre-emergency state of a power system, countermeasures are not applied or prove inefficient, and emergency processes develop, which can be of local or cascade-wise character. Local emergencies are eliminated by protective means that trip the faulty element, its functions being taken over by other elements of the system. A cascading emergency is followed by other events that still more aggravate its development; as a result, a full collapse of the power system can be expected, with cascading outages of power plants, making it necessary to restore their operation. Once the cascading emergency condition has set in, the process is developing rapidly. The personnel are unable to control the situation any more, and a blackout can only be prevented by fast-acting automatic protection means. Control actions, such as load shedding and controlled system separation, are aimed at preventing a widespread blackout. This condition is handled by stability maintenance measures at actions on the power plant and load, liquidation of out-of-step operation by power system splitting, liquidation of frequency emergency.\n\nPost-Emergency/Restorative Condition: in the post-emergency condition, the control actions are taken to reconnect all the facilities and to restore system load (i.e. measures for power system restoration to normal state).\n\n2. SCMODED Review\n\nSCED problem has been addressed in the past using both the deterministic and hybrid methods. It is worthwhile to note that the heuristic methods have not been used to solve such a problem. Deterministic approaches include Interior Point Method (IPM) , Markov Decision Process (MDP) , General Benders Decomposition (GBD , Dual Quadratic Programming (QDP) and Linear Programming (LP) . In all these cases, static single objective SCED is considered. The only Heuristic method used in security studies is Particle Swarm Optimization (PSO) . Hybrid method include Stochastic (FS) Algorithms-Fuzzy logic strategy (FLS) incorporated in Evolutionary Programming (EP) and Tabu-Search (TS) algorithms i.e. FLS-EP and FLS-TS in and Bacterial Foraging (BF), PSO and DE (BF-PSO-DE) . In these two cases, single objective dynamic economic dispatch (SODED) with quadratic cost function and three or four constraints has been utilized. In this paper a five-objective security constrained multi objective DED (SCMODED) with RE, Emission and HVAC & HVDC line losses will be considered for the first time using a more accurate hybrid method.\n\n3. SCMODED with RE\n\n3.1. Effects of RE on Security\n\nPower market deregulation, RE integration and economic benefits have resulted in more stressed operating conditions and more vulnerable networks. When the transmission system is most heavily loaded, the power flows through some of the lines are approaching their limits. A slight increase in these flows along with a critical event (a credible contingency) might lead to the development of a cascading emergency and a collapse of the power system. As a consequence, the need to identify the operational security level of the transmission system increases.\n\nRES are being integrated into the power grids due to their economic and environmental merits as compared to the traditional fossil-fuel-fired power generation. However, their significant penetration demands a thorough research in terms of system reliability, system cost, and environmental impact. This project develops a model to include wind and solar farms in the economic dispatch problem. The uncertain nature of the wind speed and solar irradiance is represented by the Weibull pdf. In addition to the classic economic dispatch factors, also included are factors to account for both overestimation and underestimation of available wind and solar power as well as risk factors for the stochastic nature of RE sources. The optimization problem is then numerically solved for a scenario involving two conventional, two wind and one solar powered generators.\n\n3.2. Effects of RE on Stability\n\nPower system security is associated with the response of the system to whatever perturbations it is subject to. Normally, security evaluation requires the analysis of dynamic, transient, or voltage stability in the power system. In this paper, we consider Voltage, Frequency and Rotor angle stability. From the discussion in the previous section, it’s clear RE penetration reduces stability and thus, makes the system insecure. In this case we consider the technical background behind this.\n\n3.2.1. Voltage Stability\n\nWhen power is supplied to a load through a transmission line keeping the sending end voltage, VS, the receiving end (load) voltage, VR, undergoes variations depending on the magnitude and power factor of the load.\n\nConsider a power system with P and Q as the real and reactive power to be transferred. Further let $R+jX$ be the impedance of the transmission line. From the phasor diagram of the system, then\n\n${V}_{S}={V}_{R}+\\frac{PR}{{V}_{R}}+\\frac{QX}{{V}_{R}}$ (1)\n\nThe drop in line voltage is thus given by\n\n$\\Delta V=\\frac{PR}{{V}_{R}}+\\frac{QX}{{V}_{R}}$ (2)\n\nBut $R\\ll X$ , then\n\n$\\Delta V=\\frac{QX}{{V}_{R}}$ (3)\n\nHence the line drop in voltage mainly depends on the flow of reactive power.\n\nThe higher the load with small power factor, the greater the voltage variation. The voltage variation at the load is an indication of unbalance between the reactive power generated QG and that absorbed QL by the load. When ${Q}_{G}>{Q}_{L}$ , then the voltage goes up and vice versa. Thus, to keep VR constant for a given VS, then Q has to be varied (locally adjusted) since X and VR are constants. The RE sources in this case generate and absorb real and reactive power simultaneously, hence such a design advantage makes them unique in reactive power compensation which is paramount in voltage stability.\n\nVoltage instability is brought about by the inability of the power system to meet the demand of reactive power. In the case of wind energy, if the wind turbine technology utilizes the induction machines (DFIGs) it may lead to a power system’s inability to meet the demand of reactive power this is because induction machine consume reactive power thus leading to voltage instability. While in solar energy, photovoltaic use inverters which are designed to operate at unity power factor hence reactive power is neither produced nor absorbed. Hence there is a need to implement a way of voltage control otherwise it may lead to issues with voltage stability.\n\n3.2.2. Rotor Angle Stability\n\nIn traditional power systems, the rotor angles of synchronous generators are impacted by the changes in active power flow in the system. In a similar way, the power angle δ between the two voltages VR and VS is given by\n\n$\\delta =\\frac{PX}{{V}_{R}}-\\frac{QR}{{V}_{R}}$ (4)\n\nBut $R\\ll X$ , then\n\n$\\delta =\\frac{PX}{{V}_{R}}$ (5)\n\nHence the power angle mainly depends on the flow of the real power. When there is a change in active power, the synchronizing generators will respond with an electromagnetic torque that will dampen and minimize the rotor angle deviations thus they have synchronizing power.\n\nRE technology include wind turbines generator and photovoltaic (PV) are asynchronous machines. When such are integrated to the grid via inverters, they make them the power system lose the ability to maintain synchronism; hence they lack synchronizing power and hence this may bring about rotor angle stability. In this paper, the economic benefits of combined real reactive economic dispatch (CRRED) introduced in will be applied in stability analysis.\n\n3.2.3. Frequency Stability\n\nThe power system frequency (f0) at any instant is given by the relation\n\n${f}_{0}=\\frac{2H\\ast \\frac{\\text{d}f}{\\text{d}t}}{\\Delta P}$ (6)\n\nwhere H is the inertia constant given by\n\n$H=\\frac{1}{2}\\frac{J{W}_{m}^{2}}{{S}_{B}}$ (7)\n\nwhere J is the moment of inertia, ${W}_{m}^{2}$ is the system angular velocity and ${S}_{B}$ is the base KVA. Further $\\text{d}f/\\text{d}t$ is the average rate of change of frequency (ROCOF) and $\\Delta P$ is the power imbalance given by\n\n$\\Delta P={P}_{G}-{P}_{D}$ (8)\n\nwhere PG the total power is generated and PD is the total load.\n\nTaking n to represent the normal and a abnormal operating conditions (after disturbance), then\n\n${f}_{n}=\\frac{2{H}_{n}\\ast \\frac{\\text{d}{f}_{n}}{\\text{d}t}}{\\Delta {P}_{n}}$ (9)\n\nwhere $\\Delta {P}_{n}={P}_{Gn}-{P}_{Dn}$ .\n\nAnd\n\n${f}_{a}=\\frac{2{H}_{a}\\ast \\frac{\\text{d}{f}_{a}}{\\text{d}t}}{\\Delta {P}_{a}}$ (10)\n\nwhere $\\Delta {P}_{a}={P}_{Ga}-{P}_{Da}$ .\n\nThe frequency deviation (∆f) after disturbance is thus given by\n\n$\\Delta f={f}_{n}-{f}_{a}=2\\left\\{\\left(\\frac{{H}_{n}\\ast \\frac{\\text{d}{f}_{n}}{\\text{d}t}}{{P}_{Gn}-{P}_{Dn}}\\right)-\\left(\\frac{{H}_{a}\\ast \\frac{\\text{d}{f}_{a}}{\\text{d}t}}{{P}_{Ga}-{P}_{Da}}\\right)\\right\\}$ (11)\n\nThis equation is the one modeled as an optimization problem for minimization.\n\n$\\mathrm{min}\\Delta f=\\mathrm{min}2\\left\\{\\left(\\frac{{H}_{n}\\ast \\frac{\\text{d}{f}_{n}}{\\text{d}t}}{{P}_{Gn}-{P}_{Dn}}\\right)-\\left(\\frac{{H}_{a}\\ast \\frac{\\text{d}{f}_{a}}{\\text{d}t}}{{P}_{Ga}-{P}_{Da}}\\right)\\right\\}$ (12)\n\nFrequency deviation is minimized subject to loads in each bus that sum up to total amount of load during a disturbance, PDa. At the time of load shedding, all the variables are known except for the summation of loads in each bus which give rise to PDa. This value is solved using the harmony search optimization method to find the optimal load at each bus that should be shed to reduce PDa thereby decreasing ∆Pa hence minimizing ∆f and restore the system frequency level as it should be for the specific IEEE bus system. Some values of ineria H are as shown as follows:\n\nTraditionally, electricity generation is fully dispatchable, that is, it is controllable and involves rotating synchronous generators. Via their stored kinetic energy (KE) they add rotational inertia which is a property of frequency dynamics and stability. Rotational inertia, H, minimizes Δf in case of frequency deviations rendering frequency dynamics slower thereby increasing available response time to react to fault events for example, line losses, power plant outages or large scale set point changes of either generation or load units.\n\nLow levels of rotational inertia in a power system caused by inverter connected renewable energy sources for example wind and solar PV units that as such do not provide any inertia have implications on frequency dynamics in that they are faster in power systems with low rotational inertia. This can lead to situation where traditional frequency control schemes become too slow for preventing large frequency deviations and their impeding consequences. Loss of rotational inertia and time variance of inertia can lead to new frequency instability phenomena.\n\nThe inertia dictates how large the frequency deviations would be due to a sudden change in the generation and load power balance which plays a significant role in maintaining the stability of a power system stability during a transient scenario. The larger the inertia of a system, the smaller the rate of change in rotor speed in the generator during a power imbalance.\n\nDue to the unpredictable nature of the renewable energy that is solar energy and wind energy there may be a mismatch between the generation of power and the demand of power. This causes deviations in the system frequency. In the case of a power deficit, the generation is less than the power demand leading to a reduction of speed and hence the system frequency goes down. While if the generation of power is more than the demand, it will cause an increase in speed and hence an increase in the system frequency thus leading to frequency instability.\n\nIn wind energy power generation, when fixed speed induction generators are used it contributes to the inertia of a power system because the stator is directly connected to the grid and thus changes in frequency manifests as a change in speed. These speeds are resisted by the rotating mass leading to rotating energy transfer. While in variable speed wind turbines, its rotational speed is decoupled from the grid frequency by electronic converter. Thus variation in grid frequency does not alter the turbine output power. With high wind penetration there is a risk that the power system inertial effect decreases thus aggravating the frequency of the grid.\n\nIn solar power generation, the solar power plant consists of the solar cell and DC to AC converter. Hence they do not possess inertia hence won’t release energy to grid when frequency. This leads to frequency instability.\n\n3.3. Security-Stability Analysis\n\nSecurity analysis has three major components, namely: Security monitoring, Security assessment, and control. Security monitoring uses real-time system measurements to determine the operating conditions of the system. It checks whether the system is in normal state or not and tells the control what action to take if it is not in a normal state. Security Assessment is a branch of security analysis determines whether the system is secure or not from the next set of probable contingencies. This is the integral part of economic dispatch. If a system goes into emergency states, it is the duty of security control to execute some actions that will restore the system to its normal operating state. This may involve increasing generation of a power plant to meet a sudden increase in load demand, switching of some plants or even simply readjusting the generated output to ensure that the lines are not overloaded. This is called security control.\n\nIntegration of RE into the grid and the use of HVDC lines in the modern power system has greatly affected the three aspect of security in one way or another. Security constrained multi objective dynamic Economic Dispatch (SCMODED) in the RE context is the distribution of active and renewable energy production among the power stations so as to meet the minimization of both fuel cost and pollutant emissions simultaneously while ensuring that power is uninterruptedly supplied to the load. This is the problem formulated and studied in this paper.\n\nContributions: SCMODED with RE and HVDC lines has been formulated for the first time. Security-Stability merits of HVDC lines investigated. More accurate cubic cost functions have been us for the thermal and emissions functions. Dynamic reactive power from RE sources applied to model the power system stability concepts. A hybrid approach including probabilistic load flow (PLF), Scenario Based Method (SBM), Improved Genetic Algorithm (IGA), Harmony Search and Participation factors has been used in various stages of the solution process.\n\n3.4. Formulation\n\nMODED with RE and HVDC transmission line was formulated in . In this paper, the Security aspects of the same problem are investigated. The security constrained MODED (SCMODED) is formulated as\n\n$\\mathrm{min}f=\\mathrm{min}\\left[WF+\\left(1-W\\right)E\\right]$ (13)\n\nwhere W is the weighting factor between the fuel cost and emissions. The fuel cost function is defined as\n\n$F=\\sum _{t=1}^{T}\\left[\\sum _{i=1}^{N}\\text{ }F\\left({P}_{i,t,s}\\right)+F\\left(O{C}_{t}\\right)\\right]+\\sum _{j=1}^{W}\\text{ }F\\left({P}_{j,t,s}\\right)+\\sum _{k=1}^{S}\\text{ }F\\left({P}_{k,t,s}\\right)+F\\left({P}_{L,i}\\right)$ (14)\n\nwhere T is the operation time, N, W and S are the total thermal, wind and solar units respectively and $F\\left({P}_{i,t,s}\\right)$ , $F\\left({P}_{j,t,s}\\right)$ and $F\\left({P}_{k,t,s}\\right)$ are the corresponding thermal, wind and wind cost functions at time t and scenario s .\n\nIt is worth to note that $F\\left(O{C}_{t}\\right)$ is the outage cost defined by\n\n$F\\left(O{C}_{t}\\right)=\\sum _{s=0}^{S}\\left[b\\Delta {P}_{L,t,s}+c\\Delta {Q}_{L,t,s}\\right]$ (15)\n\nwhere $\\Delta {P}_{L,t,s}$ and $\\Delta {Q}_{L,t,s}$ are the amounts of real and reactive load-shedding in scene s at time t, b and c are the constants of real and reactive load-shedding costs. Combined real and reactive economic dispatch (CRRED) in is applied. Unlike the operating cost, the outage cost determined based on the risk in each scene.\n\nThe RE HVAC & HVDC transmission loses, emissions cost functions are as formulated in where more accurate cubic cost functions have been utilized. It is assumed that the losses due to the REs are negligible since they are located near the load center. Thus the overall cost for the losses is given by\n\n$F\\left({P}_{L,i}\\right)={W}^{″}F\\left({P}_{L,AC}\\right)+\\left(1-{W}^{″}\\right)F\\left({P}_{L,DC}\\right)$ (16)\n\nIntegration of HVDC lead to a reduction in real losses (11.85%) and reactive losses (8.09%) . Thus, by average, the total losses cost can be given by\n\n$F\\left({P}_{L,i}\\right)=\\left[0.1{W}^{″}+0.9\\right]F\\left({P}_{L,AC}\\right)$ (17)\n\nwhere ${W}^{″}$ is a weighting factor defining the losses in the HVAC and HVDC systems. This number depends on the number of HVDC and HVAC lines in the system\n\nThe emissions objective function, E, is formulated as\n\n$E=\\sum _{l=1}^{G}\\text{ }E\\left({P}_{i,t,s},{P}_{j,t,s},{P}_{k,t,s}\\right);\\text{\\hspace{0.17em}}G=N+W+S$ (18)\n\nwhere G is the total number of generators in the system.\n\nThe SCMODED is solved Subject to the following constraints.\n\n1) Power Balance Constraints (PBC)\n\n${g}_{b}\\left({P}_{b},{Q}_{b}\\right)=0$ (19)\n\n・ Real power balance\n\n$\\sum _{i=1}^{N}\\text{ }{P}_{i,t,s}+\\sum _{j=1}^{W}\\text{ }{n}_{w,t}{P}_{j,t,s}+\\sum _{k=1}^{S}\\text{ }{n}_{s,t}{P}_{k,t,s}+\\Delta {P}_{L,t,s}=\\sum _{t=1}^{T}\\text{ }{P}_{D,t}$ (20)\n\nwhere ${n}_{w,t}\\in \\left[0,1\\right]$ and ${n}_{s,t}\\in \\left[0,1\\right]$ are control variables used in adjusting the power output of the wind and solar units respectively, ${P}_{D,t}$ is the system load at time t.\n\n・ Reactive Power Balance\n\n$\\sum _{i=1}^{N}\\text{ }{Q}_{i,t,s}+\\sum _{j=1}^{W}\\text{ }{n}_{w,t}{Q}_{j,t,s}+\\sum _{k=1}^{S}\\text{ }{n}_{s,t}{Q}_{k,t,s}+\\Delta {Q}_{L,t,s}=\\sum _{t=1}^{T}\\text{ }{Q}_{D,t}$ (21)\n\n2) Generation Units Constraints (GUC)\n\n${g}_{U}\\left({P}_{i,t,s},{P}_{j,t,s},{P}_{k,t,s}\\right)\\le 0$ (22)\n\n・ Real power generation constraints\n\n${P}_{i,t,s}^{\\mathrm{min}}\\le {P}_{i,t,s}\\le {P}_{i,t,s}^{\\mathrm{max}}$ (22a)\n\n${P}_{j,t,s}^{\\mathrm{min}}\\le {P}_{j,t,s}\\le {P}_{j,t,s}^{\\mathrm{max}}$ (22b)\n\n${P}_{k,t,s,m}^{\\mathrm{min}}\\le {P}_{k,t,s}\\le {P}_{k,t,s,m}^{\\mathrm{max}}$ (22c)\n\n・ Reactive power generation constraints\n\n${Q}_{i,t,s}^{\\mathrm{min}}\\le {Q}_{i,t,s}\\le {Q}_{i,t,s}^{\\mathrm{max}}$ (23a)\n\n${Q}_{j,t,s}^{\\mathrm{min}}\\le {Q}_{j,t,s}\\le {Q}_{j,t,s}^{\\mathrm{max}}$ (23b)\n\n${Q}_{k,t,s}^{\\mathrm{min}}\\le {Q}_{k,t,s}\\le {Q}_{k,t,s}^{\\mathrm{max}}$ (23c)\n\n3) System Security Constraints (SSC)\n\n${g}_{S}\\left({P}_{i,t,s},{P}_{j,t,s},{P}_{k,t,s},SY\\right)\\le 0$ (24)\n\n${P}_{D,t}\\ge \\Delta {P}_{L,t,s}\\ge 0$ (25a)\n\n${Q}_{D,t}\\ge \\Delta {Q}_{L,t,s}\\ge 0$ (25b)\n\n・ Multi Scene power constraints\n\n${P}_{i,t,s}-{P}_{i,t,s-1}\\ge 0$ (26)\n\n・ Ramping speed of thermal generating units constraints\n\n${P}_{i,\\mathrm{max}down}\\le {P}_{i,t,s-1}-{P}_{i,t-1,s}\\le {P}_{i,\\mathrm{max}up}$ (27a)\n\n${P}_{i,\\mathrm{max}down}\\le {P}_{i,t,s}-{P}_{i,t-1,s-1}\\le {P}_{i,\\mathrm{max}up}$ (27b)\n\n4) System Stability Constraints (SSC)\n\n$|{g}_{ss}\\left(hvdc\\right)|\\le 0$ (28)\n\n・ Line Flow Constraint (LFC)\n\n$|{P}_{t}|\\le {P}_{t,\\mathrm{max}},\\text{\\hspace{0.17em}}t=1,2,3,\\cdots ,{N}_{t}$ (29)\n\nwhere ${N}_{t}$ the number of lines and ${P}_{t}$ is the active power flow in the line t\n\n・ Converter Tap Ratio Constraint (CTRC)\n\n${T}_{\\mathrm{min}}\\le T\\le {T}_{\\mathrm{max}}$ (30)\n\n・ Converter Ignition Angle Constraint (CIAC): Facilitates fast and reliable control of power flows\n\n${\\alpha }_{\\mathrm{min}}\\le \\alpha \\le {\\alpha }_{\\mathrm{max}}$ (31)\n\n・ Converter extinction Angle Constraint (CEAC): Facilitates rapid control to increase transient stability limit\n\n${\\gamma }_{min}\\le \\gamma \\le {\\gamma }_{\\mathrm{max}}$ (32)\n\n・ Current Constraint (HCC)\n\n${I}_{dc,\\mathrm{min}}\\le {I}_{dc}\\le {I}_{dc,\\mathrm{max}}$ (33)\n\n・ HVDC Voltage Constraint (HVC)\n\n${V}_{dc,\\mathrm{min}}\\le {V}_{dc}\\le {V}_{dc,\\mathrm{max}}$ (34)\n\n4. Proposed Methodologies\n\n4.1. Probabilistic Optimal Power Flow (POPF)\n\nThe three objective of load flow analysis are to determine the 1) Static operating state of the power system for given loads 2) Voltage magnitude and angle at all the buses and 3) Line flows and system losses. Load flow methods are classified into two deterministic and probabilistic methods. In this paper, probalistic load flow (PLF) is applied since it utilizes different mathematical approaches such as probabilistic approach, fuzzy sets, interval analysis etc. for taking into account uncertainty in RES. Further, it requires inputs with probability density function (PDF) or cumulative density function (CDF) which are the distribution functions of wind speed and solar radiation intensity .\n\nThe PDF involves buses such as PQ (negative load), PV (voltage controlled), PX and RX. Numerical and Analytical methods are applied in solving the PLF. The analytical methods analyses a system and its inputs using complex mathematical expressions .The load flow equations are linearized hence inaccurate due to the different approximations. On the other hand, numerical methods involve performing DLF a large number of times with inputs of different combinations of nodal power values. Exact non-linear form of load flow equations can be used using Monte Carlo Simulations. Thus, in this paper Numerical Methods will be used although it is time consuming .\n\nAC PLF Model for RES\n\nThe PLF model is given by\n\n$w=f\\left(x\\right),\\Delta x={J}_{0}^{-1}\\Delta w={S}_{0}\\Delta w$ (35a)\n\n$z=g\\left(x\\right),\\Delta z={G}_{0}{J}_{0}^{-1}\\Delta w={T}_{0}\\Delta w$ (35b)\n\nStep 1: Input the system data and wind DFIG and Solar PV data.\n\nStep 2: Run the DLF using Newton Raphson (NR) method, so that the expected values of nodal voltages, line flows, S0 and T0 are obtained.\n\nStep 3: Compute the cumulants of generation and load according to their PDF.\n\nStep 4: Compute the cumulants of the generated active power, absorbed reactive power, power injections and state variables (∆x and ∆z).\n\nStep 5: Obtain the PDF and CDF of ∆x and ∆z.\n\n4.2. Scenario-Based Method (SBM)\n\nFor a multivariate function, $y=F\\left(X\\right)$ where X is a vector containing the uncertain input values, the SBM uncertainty modelling is a method for finding the expected value of y. A set of scenarios, ${\\Omega }_{s}$ is generated for describing the probable values of X such that;\n\n$y=\\sum _{s\\in {\\text{Ω}}_{s}}{\\pi }_{s}F\\left({X}_{s}\\right)$ (36)\n\nwhere ${\\pi }_{s}$ is the probability of state s.\n\nUncertainties and variability in RE power generation and load profile of the system, emerge into a probabilistic MODED which is formulated in this paper. The total cost of energy is given by\n\n${C}_{T}=\\sum _{S,t}\\text{ }{\\pi }_{s}P{P}_{s}\\left(t\\right){\\lambda }_{s}\\left(t\\right)+\\sum _{i,t}\\text{ }{C}_{i}\\left({P}_{i}\\left(t\\right)\\right)$ (37)\n\nwhere ${C}_{T}$ is the total cost paid, ${\\pi }_{s}$ is the probability of scenario s, $P{P}_{s}\\left(t\\right)$ is the purchased power from reserve pool in time t, scenario s and ${\\lambda }_{s}\\left(t\\right)$ is the price of energy purchased from the power reserve in time t ,scenario s(\\$/MWh) and ${C}_{i}\\left({P}_{i}\\left(t\\right)\\right)$ is the production cost of the ith thermal unit in time t. The objective function of a rational cost that is to be maximized is defined by\n\n$F=\\sum _{S,t}\\text{ }{\\pi }_{s}{P}_{D,s}\\left(t\\right){\\lambda }_{c}\\left(t\\right)-{C}_{T}$ (38)\n\nwhere ${\\lambda }_{c}\\left(t\\right)$ the price of energy in time t, and ${P}_{D,s}\\left(t\\right)$ is the load demand at time t and scenario s.\n\n4.3. Solution Process for SCMODED\n\nStep 1: Get the prediction data for the RE power, load and other known conditions using PLF.\n\nStep 2: Set the range of the RE power fluctuation and the risk constant of the load shedding.\n\nStep 3: Build the SCMODED model.\n\nStep 4: Invoke the power system stability and security checks.\n\nStep 5: Solve the SCMODED using Improved Genetic Algorithm (IGA).\n\n4.4. Optimal Load Shedding Using Harmony Search Method\n\nHarmony search optimization algorithm is a random search technique that draws inspiration from harmony improvisation in music for example jazz and is used widely in the field of optimization. It mimics the rules of various combining pitches and has two distinguishing operators; Harmony Memory Considering Rate (HMCR) and Pitch Adjusting Rate (PAR) that are used in the algorithm to generate and mutate a solution in order to find the optimal solution .\n\nThis optimization method has garnered great research success in the field of engineering, control and signal processing. Its use is derived from the fact that as musicians compose harmony, they try various possible combinations of the music pitches stored in memory. This search for a perfect harmony is analogous to the procedure of finding optimal solution to various engineering problems.\n\nVariable selection in Harmony search algorithm follows the three rules which are choosing any value from the Harmony Search Memory (HSM), choosing the adjacent value from HSM and finally choosing random value from the possible value range.\n\nThe steps for the HAS include the following:\n\nStep 1: Initialize the problem and algorithm parameters, that is, specify objective function together with the various constraints;\n\nStep 2: Initialize harmony memory;\n\nStep 3: Improvise a new harmony by generating a new vector based harmony depending on considerations such as pitch adjustment and random selection;\n\nStep 4: Update harmony memory;\n\nStep 5: Check the stopping criterion.\n\n4.5. Power System Stability Using Combined Participation Factors and HVDC\n\nVoltage stability is directly associated with renewable energy with reactive power deficiency. The gradual changes in power systems can lead to shortage of reactive power leading to a reduction of power system stability. Deterioration of power system voltage magnitude and angle increases as load grows and generation becomes varied and intermittent. There is a decrease in voltage at the bus with increased power flow. Further increase in loading leads to shortage of reactive power and any further increase in active power causes a quick decrease in magnitude of voltage at the buses. Hence we can include a reactive power support on the weakest buses which can immediately provide relief and enhance voltage stability. The disturbance is implemented by increasing the load in the PV buses by 50%.\n\nThe HVDC lines provide voltage support through controlled reactive power injection from the RE sources. The hybrid losses internal losses are as formulated in the SCMODED the security advantages of the HVDC lines are as in the stability constraints. The load flow problem is performed using combined participation factors (CPF) using a Newton Raphson Solver for the distributed slack bus model (DSB) .\n\nThe Solution Algorithm for Solving Stability with RE can be represented by the following steps:\n\nStep 1: Read system data and formulate the Ybus.\n\nStep 2: Initialize bus voltage, phase angles and set initial Ploss = 0.\n\nStep 3: Set the iteration counter k = 0 and convergence criteria.\n\nStep 4: Define the participating buses and combined participating factors.\n\nStep 5: Compute ${P}_{i}^{\\left(k\\right)},{Q}_{i}^{\\left(k\\right)},{P}_{stat}^{\\left(k\\right)},{Q}_{stat}^{\\left(k\\right)}$ for the system buses.\n\nStep 6: Evaluate power mismatches.\n\nStep 7: Evaluate the Jacobian matrix.\n\nStep 8: Evaluate the increments of bus voltage magnitude, voltage angle and HVDC stability parameters and phase angles.\n\nStep 9: This process continues until the power mismatches are less than tolerance.\n\nStep 10: Evaluate the real and reactive and reactive power flow and the losses.\n\n5. Results and Discussion\n\n5.1. Effects of Security Settings in SCDED\n\nAs shown in Table 1, ED and SCED cases are compared in terms of generation, losses, optimal cost and emission levels. It is observed that introducing security constraints to secure the power system increases the total generated power, decreases the real losses, increases the reactive drop and increases the generation cost. Further the emission levels are also decreased. The total power generated increases because a secure system is within the line limits and the losses are decreased. The generation cost however increases because of the cost incurred in ensuring the power system is secure.\n\n5.2. SCMODED with RE\n\nThree cases will be considered: Case 1: 3 Thermal units, 1 wind thermal unit, 1 solar unit. Case 2: 3 Thermal units, 3 wind units and Case 3: 3 Thermal units, 3 solar units.\n\nTable 1. Optimal generations for ED AND SCED using IGA, demand = 500 MW.\n\nThese cases are analyzed at increasing demands of 1000 MW and 1500 MW respectively. We begin with a demand of 1000 MW. In Table 2, case 1, SCMODED with RE mix is presented which results in optimal cost and the least emissions. In case 2, wind penetration resulted in the least emissions. Use of solar in SCMODED led to the least cost but the highest emissions. This is as shown in case 3. The results for a demand of 1500 MW for the three cases are as shown in Table 3. Comparing with Table 2 it is clear that optimal cost and losses increase with demand while the emissions tend to decrease with increasing demand. This is because the optimal placement of the unified power flow controller (UPFC) at the weakest bus improves the power generated at this bus to be within the line limits hence minimizing the losses and generation cost, hence improving the security.\n\nThe security aspects are investigated by adding security constraints to the MODED with RE. When these constraints are added, the total power generated increases as expected for a secure power system. RE integration is of importance, because integrating RE reduces the losses and generation cost. RE however has\n\nTable 2. Demand = 1000 MW.\n\nTable 3. Demand = 1500 MW.\n\ncontrol issues as it’s intermittent in nature, resulting in one of the busses being weak with high losses. The UPFC installed in the weak bus to improve the power generated to be within the line limits and hence further reduction in losses and cost.\n\nHence, RE mix integration (Case 1) and installing the control device i.e. UPFC, results in optimal cost and emissions. It is this case that will be analyzed with respect to SCMODED with changing security levels.\n\n5.3. Confidence Levels for SCMODED with RE Mix\n\nTo demonstrate the effect of the RE sources on the security setting of a power system two cases have been considered as follows: Case 1: The generation cost with thermal units only. Demand of 1000 MW. Case 2: The generation cost with thermal, Wind and Solar Units for power demands of 1500 MW and 2000 MW. During the calculation of minimum generation cost in the second case, the risk threshold Pa is set to 0.3, 0.5 and 0.9 for the various demands\n\nThe results of the case 1 at a demand of 1000 MW are as shown in Table 4 while those for case 2 are as shown in Table 5 and Table 6 for demands of 1000 MW and 1500 MW respectively. Comparing the total costs of generation for the three scenarios it can be seen that the cost of generation is high with all units being thermal as compared to RE mix integrated for the same demand. This can be attributed to the fact that thermal units have high direct costs since they are fuel-dependent while the RE sources are freely available in nature only operational and supply variability costs being incurred.\n\nFor the two demands, wind and solar generation in each system under Pa = 0.3 is the lowest, because under that situation each system requires the highest reliability and security. Therefore, it is essential that a larger proportion of power is contributed by the thermal units whose outputs are predictable unlike the RE sources which happen to be stochastic in nature. Under a threshold setting of Pa = 0.9 less thermal power is generated by the thermal units and increased generation by the RE mix employed.\n\nTable 4. Optimal generation for five thermal units for a demand of 1000 MW.\n\nTable 5. Optimal generation for pa = 0.3, 0.5, 0.9 for a demand of 1500 MW.\n\nTable 6. Optimal generations for pa = 0.3, 0.5, 0.9 for a demand of 2000 MW.\n\nAs observed from Figure 1, as the threshold level increases, the cost of power generation decreases and the emission levels increases. This is due to the fact that wind and solar penetration increases with increasing risk threshold. A higher threshold implies that the power system’s security setting allows a larger penetration of sources with unpredictable natures which in this work is DFIGs and PVs.\n\nFigure 2 shows the convergence characteristics for six unit system. From the figure, the problem converged at approximately the 100th iteration. The simulation results demonstrate that the algorithm used is efficient and the solution is reasonable.\n\nThe following conclusions can be reached. Integration of RE sources to a power system reduces the overall cost of power generation. The results also show that the average generation cost and emissions levels of RES are dependent on the tolerance level. If the tolerance level is increased, the RE penetration will be increased, which results in less reliability of the power system, and the average generation cost will be decreased and the emissions decreased. Conversely, if the\n\nFigure 1. Variation of cost with the risk threshold.\n\nFigure 2. Convergence characteristics for the five-unit system.\n\ntolerance level is decreased, more reliability limits the amount of renewable power to be incorporated in the power system. The average generation cost will thus be increased and the emissions reduced. Scheduling of wind and solar power is not only dependent on their distribution but also on the various associated coefficients involved in the cost functions. In addition, since the wind and solar power is stochastic and hence deviates from the scheduled value, an adequate reserve capacity has to be maintained for reliable and stable operation of power system.\n\n5.4. Stability with RE\n\n5.4.1. Voltage Stability: Use of HVDC Lines\n\nRE was incorporated in the load flow analysis by including combined participating factors whereby a distributed slack model (DSB) is utilized this is to accommodate the growth of distributed generators such as wind energy and photovoltaic . DSB is based upon distributing the burden of the slack among other generator buses in the power system. To distribute the losses real participation factor was implemented which means the system loss is shared by several generator buses during power flow calculations based on their assigned participation factors. Simulation results are as shown in Table 7 for the injected power, generated power, load and losses.\n\nIn normal operating conditions, HVDC lines are introduced, there is a great improvement in the voltage magnitudes thus improving the voltage stability of the power system. This is as shown in Figure 3. In terms of losses, when the HVDC technology is introduced to the RE-incorporated system, the total real and reactive power losses were reduced. This is as shown in Figure 4.\n\nAfter disturbance, we observe the voltage magnitudes dropped that is as compared to normal operating conditions, the voltage magnitudes reduced. This is well depicted in Figure 5. There is a decrease in voltage at the bus with increased power flow. Further increase in loading leads to shortage of reactive power and any further increase in active power causes a quick decrease in magnitude of voltage at the buses. When the HVDC lines were introduced to the disturbed system, voltage magnitude increased, thus improving the voltage stability after the system is subjected to a disturbance. The losses were also reduced as shown in Figure 6.\n\nHence, it can be concluded that a HVDC technology is used to control the reactive power which is injected in the power system which greatly improves the\n\nTable 7. Voltage stability for SCMODED using HVDC lines.\n\nFigure 3. Voltage profile in normal conditions.\n\nFigure 4. Losses in a normal case.\n\nFigure 5. Comparison of voltage profile after disturbance.\n\nFigure 6. Losses after disturbance.\n\nvoltage stability on the weak buses. This further improves the voltage stability in the whole power system during normal operating conditions and after a disturbance. Furthermore, the real and reactive power losses were also reduced.\n\n5.4.2. Frequency Stability: Optimal Load Shedding\n\nThe results for optimal load shedding (OLS) for a comparison between CLS and HSLS are as tabulated in Table 8. Comparing the conventional load shedding (CLS) and harmony search load shedding (HSLS), it can be noted that CLS sheds more load which is unnecessary. The harmony search method (HSM) as an optimization tool sheds smaller loads in various buses in finding the optimal combination of loads to shed thereby avoiding unnecessary load shedding. It can also be noted that conventional method (CM) has no regard for load prioritization therefore sheds even the very important loads which is a risky thing.\n\nWhen RE is introduced in the system, even using HSM as optimization tool (that is, HSLS with RE), there is shedding of more load than in a purely conventional power system. This is as shown in Table 9. Compared to CLS, the power shed in HSM with HVAC Technology is still less despite the fact that there is RE in the system. It can also be observed that when RE is introduced, the amount of reactive energy shed increases drastically.\n\nThis can be explained using the concept of Power System Inertia. System inertia is one of the vital system parameters since inertia in rotating masses of synchronous generators and turbines determines immediate frequency response with respect to inequalities in the overall power balance. When a frequency event occurs, synchronous machines either inject or absorb kinetic energy into or from the grid to counteract frequency deviation. The lower the system inertia, the more nervous the grid frequency reacts on abrupt changes in generation and load patterns .\n\nRE systems do not contribute to system reserve and to total system inertia. For instance, solar panels are virtually inertialess since they do not contain any\n\nTable 8. Optimal load shedding for CLS and HSLS.\n\nTable 9. Optimal load shedding with RE.\n\nmoving or rotating parts. Wind turbines have back to back converters which are Doubly Fed Inductive Generators (DFIGs) and Full Converter Synchronous Generator (FCSGs) that electrically decouple the generators from the grid so that no inertial response is delivered during a frequency event although a lot of kinetic energy is stored in the blades and the generators. Wind turbines and solar PV units deliver no inertial response. Adding them to a system or replacing conventional generation by wind and solar generation results in lower system inertia therefore a frequency event leads to very high rate of change of frequency. Increase in rate of change of frequency (ROCOF) can disconnect DGs if they are protected against islanding. In case of major load imbalance, high ROCOF, relays disconnect most of the installed DGs and this disconnection causes further decrease in frequency thereby aggravating the initial contingency.\n\nRenewables are generally exempt from delivering primary or secondary control. Due to their lack of inertia, they increase ROCOF thereby increasing the amount of load shed as seen from the above simulation results. This is especially seen in island grids that already have a lower inertia than the interconnected system. Although renewables without special controls do not contribute to system inertia, stored kinetic energy in wind turbines can support frequency. Solar PV stores no kinetic energy but limited amount of energy in DC capacitor can be controlled together with a battery unit to support frequency control . Inertia constant in wind turbines is 2 to 5 s. Kinetic energy in wind power varies with time. Increasing wind speed increases kinetic energy but for conventional method of power production the value of kinetic energy and thus inertia constant remains constant. When frequency drops, kinetic energy release is proportional to ROCOF and can be controlled independently from ROCOF, theoretically delivering large inertial response than classical power plant. For frequency control, wind turbine or solar PV can be deloaded or curtailed. This is the process where the units operate at sub-optimal operating point creating a power reserve for frequency control. The advantage of this process is that frequency control can be delivered for a longer time. Its downside is that it is relatively expensive due to production support mechanisms and negligible marginal costs. High penetration levels of PV generation can strongly affect power system control and stability from the frequency point of view. They maximize power production therefore there are no power reserves. They also have no rotating parts, therefore no inertial response during major power disturbances. High levels of inertialess PV units reduce the capacity of the system to address frequency deviations during major disturbances affecting power system frequency control .\n\nAccording to Table 9, when the HVDC lines are introduced, the load shedding decreases significantly as compared to the case with HVAC lines only. The use of HVDC lines improves the power system stability in presence of RE in two ways. First, through the action of the converter ignition angle (CIA), which enables fast and reliable control of the real and reactive power flows. Secondly, through the action of the converter extinction angle (CEA), which facilitates rapid real and reactive power control to increase the transient stability.\n\n6. Conclusions\n\nIntegration of RE sources to a power system reduces the overall cost of power generation. Further, the average generation cost and wind and solar penetration are dependent on the tolerance level. If the tolerance level is increased, the wind and solar penetration will be increased, which results in less reliability of the power system, and the average generation cost will be decreased. Conversely, if the tolerance level is decreased, more reliability limits the amount of wind and solar power to be incorporated in the power system. The average generation cost will thus be increased. In short, use of RE reduces cost and emission but makes the system insecure hence unstable.\n\nBy introducing HVDC lines under both under normal operating conditions and after a disturbance, the voltage magnitudes were greatly improved, hence improving the voltage stability of the system and it further decreased the real and reactive power losses. From the above discussion, it’s seen that introduction of RES in the power system, especially wind and solar that is inertia-less, reduces the capacity of the grid to handle large losses of generation or frequency deviations. Small size and lack of external support of isolated systems could result in severe voltage dips due to disturbances and frequency stability issues. This is the reason why large loads have to be shed in a system with RE during a contingency. This helps the system recover from the high ROCOF faster. Though renewable systems have many advantages, their integration to the grid negatively affects frequency stability of a system and since load shedding is done to restore system frequency, more load is required to be shed for the frequency to return to the nominal value.\n\nScheduling of wind and solar power is not only dependent on their distribution but also on the various associated coefficients involved in the cost functions. In addition, since the wind and solar power is stochastic and hence deviates from the scheduled value, an adequate reserve capacity has to be maintained for reliable and stable operation of power system. Hence with RE, more load has to be shed so as to help the system attain stability.\n\nConflicts of Interest\n\nThe author declares no conflicts of interest regarding the publication of this paper.\n\nCite this paper\n\nMusau, M.P. (2018) Security and Stability Aspects of Multi Objective Dynamic Economic Dispatch with Renewable Energy and HVDC Transmission Lines. Journal of Power and Energy Engineering, 6, 165-187. https://doi.org/10.4236/jpee.2018.69013\n\nReferences\n\n1. 1. Hagar, U., Rehtanz, C. and Voropai, N. (2014) Monitoring, Control and Protection of Interconnected Power Systems. Springer, New York. https://doi.org/10.1007/978-3-642-53848-3\n\n2. 2. Kim, K.-S., Jung, L.-H., Lee, K.Y. and Moon, U.-C. (2006) Security Constrained Economic Dispatch Using Interior Point Method. International Conference on Power System Technology, 12, 1-6.\n\n3. 3. Wang, L.Z. and Kong, N. (2010) Security Constrained Economic Dispatch: A Markov Decision Process Approach with Embedded Stochastic Programming. Industrial and Manufacturing Systems Engineering Iowa State University 3016 Black Engineering, Ames, IA, 1-14.\n\n4. 4. Cvijic, S. and Xiong, J.J. (2011) Security Constrained Unit Commitment and Economic Dispatch through Benders Decomposition: A Comparative Study. Power and Energy Society General Meeting, 10, 1-8.\n\n5. 5. Granelli, G.P. and Montagna, M. (2000) Security Constrained Economic Dispatch Using Dual Quadratic Programming (QDP). Electric Power Systems Research, 56, 71-80. https://doi.org/10.1016/S0378-7796(00)00097-3\n\n6. 6. Liu, Y.C., et al. (2015) Computational Study of Security Constrained Economic Dispatch with Multi Stage Resheduling. IEEE Transactions on Power Systems, 30, 920-929.\n\n7. 7. Gaing, Z.-L. and Chang, R.-F. (2006) Security Constrained Economic Scheduling of Generator Constraints. International Conference on Power System Technology, Chongqing, 22-26 October 2006, 1-7. https://doi.org/10.1109/ICPST.2006.321675\n\n8. 8. Musau, M.P., Odero, A.N. and Wekesa, C.W. (2015) Combined Real and Reactive Power Economic Dispatch using Multi-Objective Reinforced Learning with Optimized Losses. International Journal of Scientific and Research Publications (IJSRP), 5, No. 10.\n\n9. 9. Musau, M.P., Odero, A.N. and Wekesa, C.W. (2016) Multi Objective Dynamic Economic Dispatch with Renewable Energy and HVDC Transmission Lines. IEEE PES AFRICA, Livingstone, Zambia, 28 June-2 July 2016, 112-117.\n\n10. 10. Musau, M.P., Odero, A.N., Wekesa, C.W. and Angela, N.G. (2015) Economic Dispatch for HVDC Bipolar System with HVAC and Optimal Power Flow Comparisons Using Improved Genetic Algorithm (IGA). International Journal of Engineering Research & Technology (IJERT), 4, 790-799.\n\n11. 11. https://www.yumpu.com/en/document/view/36393162/power-system-security-analysis-with-renewable-energy-iit-mandi\n\n12. 12. Yang, X.S. (2009) Harmony Search as a Metaheuristic Algorithm, Studies in Computational Intelligence. Vol. 191, Springer, Berlin.\n\n13. 13. Tielens, P. and Hertem, D.V. (2014) Grid Inertia and Frequency Control in Power Systems with High Penetration of Renewables. Electrical Research Group, Belgium.\n\n14. 14. Xu, H., Topcu, U., Low, S.H., Clarke, C. and Chandy, K.M. (2005) Load Shedding Probabilities with Hybrid Renewable Power Generation and Energy Storage. California Institute of Technology.\n\n15. 15. Rahmann, C. and Castillo, A. (2014) Fast Frequency Response Capability of Photovoltaic Power Plants: The Necessity of New Grid Requirement and Definition. University of Chile, Santiago." ]
[ null, "https://html.scirp.org/file/10-1770266x1.png", null, "https://html.scirp.org/file/9-2500537x3.png", null, "https://html.scirp.org/file/9-2500537x2.png", null, "https://html.scirp.org/file/18-1760983x4.png", null, "https://html.scirp.org/file/2-1410169x6.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9156604,"math_prob":0.9715286,"size":46679,"snap":"2020-10-2020-16","text_gpt3_token_len":9635,"char_repetition_ratio":0.16321371,"word_repetition_ratio":0.06805293,"special_character_ratio":0.20334625,"punctuation_ratio":0.10977479,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9932899,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,3,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-28T00:10:23Z\",\"WARC-Record-ID\":\"<urn:uuid:462c8c97-7b04-4a0a-b6d5-b6a9049b705b>\",\"Content-Length\":\"140365\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6a679eab-1308-46c1-b57d-8e955ca33c70>\",\"WARC-Concurrent-To\":\"<urn:uuid:0fa086af-b8e2-4920-8a06-fbce6c04a04c>\",\"WARC-IP-Address\":\"104.149.186.66\",\"WARC-Target-URI\":\"https://www.scirp.org/html/10-1770266_87683.htm\",\"WARC-Payload-Digest\":\"sha1:3NS6UW5C4CF4IZOLBTYW7DKZLOANC6DC\",\"WARC-Block-Digest\":\"sha1:Y42XHBECB6PLWRPUE4CZX4H2ZS7XJU2I\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146907.86_warc_CC-MAIN-20200227221724-20200228011724-00310.warc.gz\"}"}
https://justaaa.com/economics/225590-suppose-you-own-a-firm-that-producing-shoes-using
[ "Question\n\n# Suppose you own a firm that producing shoes using both capital and labor. The production function...\n\nSuppose you own a firm that producing shoes using both capital and labor. The production function is q=f(K, L)=0.5K2 L4 . In long run both capital (K) and labor (L) are variable. Price for each pair of shoes is \\$50 (p=50), the wage rate is 0.04 (w=0.04) and the rental price for capital is 1 (r=1). Given those output and input prices, what is the profit maximizing input level of K and L (K* & L* )?", null, "", null, "#### Earn Coins\n\nCoins can be redeemed for fabulous gifts." ]
[ null, "https://imgs.justaaa.com/questions/02420d20-98c5-11ed-8b7c-2d170a0a8e92.png", null, "https://imgs.justaaa.com/questions/024e7330-98c5-11ed-8afc-1f03763aba07.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89193434,"math_prob":0.9735938,"size":461,"snap":"2023-40-2023-50","text_gpt3_token_len":131,"char_repetition_ratio":0.10722101,"word_repetition_ratio":0.0,"special_character_ratio":0.29934925,"punctuation_ratio":0.114285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9826439,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-04T10:49:26Z\",\"WARC-Record-ID\":\"<urn:uuid:bf856243-360e-462a-8fed-ebddcffdb0b0>\",\"Content-Length\":\"40035\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fd798064-378a-40ac-84cc-7c766f518a61>\",\"WARC-Concurrent-To\":\"<urn:uuid:c545be63-6b9a-4914-9d7c-9ed07a61d2ec>\",\"WARC-IP-Address\":\"172.67.222.198\",\"WARC-Target-URI\":\"https://justaaa.com/economics/225590-suppose-you-own-a-firm-that-producing-shoes-using\",\"WARC-Payload-Digest\":\"sha1:EHIR6CQDRUYOHEDJOYMPOFQWKNUIW7SM\",\"WARC-Block-Digest\":\"sha1:JROXISPV4YJNQQB4CMWTXRIJW4WK5S4T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100527.35_warc_CC-MAIN-20231204083733-20231204113733-00767.warc.gz\"}"}
https://perg.phys.ksu.edu/vqm/laserweb/Ch-2/C2s11p1.htm
[ "Rami Arieli: \"The Laser Adventure\" Chapter 2.11 page 1\n2.11 Three Level Laser\n\nA schematic energy level diagram of a laser with three energy levels is shown in figure 2.6.\n\nThe two energy levels between which lasing occur are: the lower laser energy level (E1), and the upper laser energy level (E2).", null, "Figure 2.6: Energy level diagram in a three level laser\n\nTo simplify the explanation, we neglect spontaneous emission.\n\nTo achieve lasing, energy must be pumped into the system to create population inversion. So that more atoms will be in energy level E2 than in the ground level (E1).\n\nAtoms are pumped from the ground state (E1) to energy level E3. They stay there for an average time of 10-8 [sec], and decay (usually with a non-radiative transition) to the meta-stable energy level E2.\n\nSince the lifetime of the meta-stable energy level (E2) is relatively long (of the order of 10-3 [sec], many atoms remain in this level.\n\nIf the pumping is strong enough, then after pumping more than 50% of the atoms will be in energy level E2, a population inversion exists, and lasing can occur.\n\nQuestion 2.8:\nThe condition of high pumping, limits the operation of a three level laser to pulsed operation. Why is continuous operation impossible in a three level laser?" ]
[ null, "https://perg.phys.ksu.edu/vqm/laserweb/Ch-2/2-6.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90970594,"math_prob":0.8842701,"size":948,"snap":"2022-05-2022-21","text_gpt3_token_len":227,"char_repetition_ratio":0.1779661,"word_repetition_ratio":0.024844721,"special_character_ratio":0.23734178,"punctuation_ratio":0.1,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9706916,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-20T10:33:21Z\",\"WARC-Record-ID\":\"<urn:uuid:8b9b8bd9-9e5a-42af-8552-f327460938a9>\",\"Content-Length\":\"2619\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ad84863f-7750-40ea-9244-10a5b050aa45>\",\"WARC-Concurrent-To\":\"<urn:uuid:1417d706-5969-4d2c-a031-c1d951ad28f1>\",\"WARC-IP-Address\":\"129.130.106.68\",\"WARC-Target-URI\":\"https://perg.phys.ksu.edu/vqm/laserweb/Ch-2/C2s11p1.htm\",\"WARC-Payload-Digest\":\"sha1:EYXGVBS6XOOVZFSZBM44VZOISQSOJBFP\",\"WARC-Block-Digest\":\"sha1:RNRZFOZCSAXSBISTTPTNGGBJRFB3TL4U\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320301737.47_warc_CC-MAIN-20220120100127-20220120130127-00442.warc.gz\"}"}
https://indiantiger.org/calculate-mutual-fund-total-return/
[ "# Calculate Mutual Fund Total Return\n\nCalculating the total return of a mutual fund involves 1) defining the variables within the calculation, 2) using the right formula for the calculation and 3) inputting the correct variable numbers into the calculation. Mutual funds are managed portfolios of multiple investments from multiple investors, and are subject to Federal regulations. Since each mutual fund may have a different fee, worth and payment structure, calculating the total return for each Mutual fund may be different. Some of the key variables in calculating total return of mutual funds are the following:\n\n• Expense ratio of mutual fund\n• Original investment amount\n• Time period of return\n• Net Asset Value (NAV)\n• Dividend payments if any\n\nNuances of total return\n\nIn the world of investment returns there is specific lingo that sometimes applies to the calculation of returns. Terms are used to describe the nature and type of return; for example 1) annualized return 2) real rate of return and 3) compounded return are all important concepts in the accurate calculation of total return. Some terms sound similar, but mean different things such as yield and return. Understanding the meaning of the variable input is useful in making sense of the total return calculation.\n\nFor mutual fund calculations, the Net Asset Value (NAV) is important because it changes over time, thus a beginning and end NAV are required. In addition to NAV, dividends, expenses, compounding and inflation may or may not be factored into the total return equation. Once all the proper terms have been sifted and sorted, the next step is to use a formula in calculating the total return.\n\nHow to calculate the total return of a mutual fund\n\nCalculating the total return of can be performed between partial and complete accuracy, meaning there are different formulas for calculating total return depending on how complex and accurate the variables and the formula they are used in are. For example, the methods below, as sourced from stock-market-investors.com, illustrate two simple methods of calculating total return followed by more elaborate equations that include additional variables. Since some investment accounts also accrue interest, an additional variable of compounded interest may be used with adjustments in the time value of money using an inflation variable. For some return calculations, specifically the simpler ones, online financial calculators may be of use.\n\n• Formula 1: Total return without dividend payments:\n\n(NAV2-NAV1)/NAV1-1= Total return without dividends\n\n• Formula 2: Total return with dividend payments, and no expense or inflation deductions\n\n[(NAV2-NAV1)+D]/NAV1=Total return with dividends\n\nNAV2=Investment value at end point\nNAV 1=Investment value at start point\nD=Dividend(s)\n\n• Formula 3: Total return with monthly compounding and cost basis:\n\nVariable 1: CB=(NAV1-front end expenses)-(NAV2+back end expenses + fees)\nVariable 2: Annual Compound Rate(ACR)=Formula 2 divided by NAV1+CB\nVariable 3: ACR exponent= 1 divided by years held\n\nCost basis and annual compound adjustment formula:\n\nACR to the power of (multiplied by) ACR compound exponent adjustment (as above in variable 3) minus 1\n\n• Formula 4: Total return with monthly compounding and cost basis\n\nTo adjust the compounding to be calculated monthly divide the ACR exponent i.e. annualized percentage rate value by the number of months.\n\nACR divided by 12 multiplied by number of months, to the power of ACR annual compound exponent adjustment which is equal to numerator 1 divided by 1/12 times number of months, minus 1\n\n• Formula 5: Including inflation as a variable\n\nSince inflation reduces the value of money, the annual inflation rate can be subtracted from the total return to obtain the real total return of the mutual fund. For monthly inflation deductions the inflation rate that is subtracted is divided by the number of months used in the ACR.\n\nEx: Formula 3 – Inflation rate\nEx2: Formula 4- Inflation rate / number of months\n\nSummary\n\nTotal return on Mutual funds varies on how the return is calculated, and the variables and numbers used. This article has illustrated terminology and formulas used in the calculation of total return for mutual funds. Sometimes calculators may be helpful in arriving at a final value however, understanding the quantitative terminology in Mutual Fund total return calculations is helpful in properly utilizing the correct equation. Depending on which formula is used, the cost basis adjustment, compounding and inflation if any, the total return may differ from that quoted by the Mutual fund itself.\n\nSources:\n\n1. http://www.globefund.com/centre/GettingStarted06.html\n2. http://www.stock-market-investors.com/pick-a-stock-guides/calculate-return-on-investment.html\n3. http://www.procalcs.com/" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8792878,"math_prob":0.99213946,"size":4766,"snap":"2020-45-2020-50","text_gpt3_token_len":996,"char_repetition_ratio":0.18395633,"word_repetition_ratio":0.01923077,"special_character_ratio":0.19702056,"punctuation_ratio":0.095744684,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99875253,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-23T09:16:25Z\",\"WARC-Record-ID\":\"<urn:uuid:fa5ecac1-13c4-419b-b0c1-1a547238a796>\",\"Content-Length\":\"39125\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8b6ebde2-ad7c-4186-976a-13a7fb567ec3>\",\"WARC-Concurrent-To\":\"<urn:uuid:b5a1b2b9-e092-41e6-bb76-6bc7030c72a0>\",\"WARC-IP-Address\":\"104.24.124.76\",\"WARC-Target-URI\":\"https://indiantiger.org/calculate-mutual-fund-total-return/\",\"WARC-Payload-Digest\":\"sha1:D47P3E5FBU4JLUN6EEEA7BTZZXA7GPPM\",\"WARC-Block-Digest\":\"sha1:BJE22LURTWGQDRFOKQZZ4TVJJXGHBABK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107880878.30_warc_CC-MAIN-20201023073305-20201023103305-00367.warc.gz\"}"}
http://m.ericcointernational.com/info/what-is-an-inertial-measurement-unit-42419215.html
[ "Home > Knowledge > Content\n\n# What Is An Inertial Measurement Unit?\n\nJan 06, 2020\n\nThe inertial measurement unit is a device that measures the three-axis attitude angle and acceleration of an object. Generally, an IMU contains three single-axis gyroscopes and three single-axis accelerometers. The accelerometer detects the acceleration signals of the object in the carrier coordinate system independently of the three axes, and the gyroscope detects the angular velocity signal of the carrier relative to the navigation coordinate system. , Measure the angular velocity and acceleration of the object in three-dimensional space, and use this solution to calculate the attitude of the object. It has very important application value in navigation.\n\nInertial measurement unit, theoretical mechanics tells us that all motions can be decomposed into a linear motion and a rotational motion, and this inertial measurement unit is used to measure these two types of motion, linear motion can be measured by an accelerometer, and rotational motion Gyro to measure. The wonderful combination of the two makes the inertial measurement unit come into being.\n\nAdding more sensors to each axis in the inertial measurement unit increases reliability. Generally speaking, the IMU should be installed on the center of gravity of the measured object. IMUs are mostly used in devices that require motion control, such as cars and robots. It is also often used in situations that require precise displacement estimation with attitude, such as inertial navigation equipment for submarines, aircraft, missiles and spacecraft.\n\nWe can assume that the measurement of the gyroscope and accelerometer of the inertial measurement unit is without any error, then the attitude of the object can be accurately measured through the gyroscope. The accelerometer can be used to calculate the displacement by the second integration to achieve a complete 6DOF. That is to say, a person who moves this theoretical IMU at any position in the universe can know his current attitude and relative displacement. It will not be limited to any place.\n\nIMU is actually the same. Absolutely accurate sensors do not exist, only relatively accurate. Gyroscopes for inertial measurement units typically use fiber optic gyroscopes or mechanical gyroscopes. The cost of this kind of gyroscope is relatively high, and the accuracy is also high compared to MEMS gyroscope. However, high accuracy does not mean that it is accurate.The attitude accuracy parameter of the IMU is usually how many degrees an hour drifts.", null, "If you want to get more details about inertial measurement unit,pls visit https://www.ericcointernational.com/inertial-measurement-units/" ]
[ null, "http://m.ericcointernational.com/Content/upload/202081901/202001061508216273555.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92660505,"math_prob":0.87044364,"size":2618,"snap":"2021-04-2021-17","text_gpt3_token_len":491,"char_repetition_ratio":0.16258608,"word_repetition_ratio":0.0,"special_character_ratio":0.17188694,"punctuation_ratio":0.09534368,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96162367,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-15T05:04:47Z\",\"WARC-Record-ID\":\"<urn:uuid:51e88bb0-ae24-4e9d-9f33-6c225195458e>\",\"Content-Length\":\"17791\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6711b6ad-4ac1-4ff2-9b12-8e8c9122f18b>\",\"WARC-Concurrent-To\":\"<urn:uuid:1f5c46d2-d606-49a7-8c02-bd3d7c4463c9>\",\"WARC-IP-Address\":\"13.64.157.175\",\"WARC-Target-URI\":\"http://m.ericcointernational.com/info/what-is-an-inertial-measurement-unit-42419215.html\",\"WARC-Payload-Digest\":\"sha1:4P63NNLZMF6EPLNM2ROPWKEQ5A23CO4M\",\"WARC-Block-Digest\":\"sha1:RNSEKBTZK4BE6D56IXLIMK5KBAHSFDLP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038083007.51_warc_CC-MAIN-20210415035637-20210415065637-00460.warc.gz\"}"}
http://bestmaths.net/online/index.php/year-levels/year-12/year-12-topic-list/spread/answers/
[ "1.\n\n a b c d e (i) 12 17.20 6.6 62 824 000 mg (ii) 5 12.48 4.2 48 9200 cg (iii) 20 20.60 9.6 86 986 g (iv) 15 8.12 5.4 38 894 g (v) 41 17.45 6.2 54 1409 g (vi) 14.01 15.8 6.63 65.5 697 g (vii) 11.3 5.78 2.26 18.6 472 g\n\n2. 10th percentile is 10, 90th percentile is 58.\n\n.3. Find the mean of 12, 14, 17, 20, 21, 24 and complete the table below to help to find the standard deviation.\n\n x x −", null, "(x −", null, ")2 12 12 − 18 = -6 36 14 14 − 18 = -4 16 17 17 − 18 = -1 1 20 20 − 18 = 2 4 21 21 − 18 = 3 9 24 24 − 18 = 6 36 Total      Σ(x −", null, ")2 = 102\n\nStandard deviation s = 4.12 (to 3 sig.fig.)\n\n4. Find the mean and standard deviation of the following frequency distribution. Complete the table to assist your calculation.\n\n x f x −", null, "(x −", null, ")2 f(x −", null, ")2 1 4 1 − 2.72 = -1.72 2.9584 11.8336 2 6 2 − 2.72 = -0.72 0.5184 3.1104 3 9 3 − 2.72 = 0.28 0.0784 0.7056 4 5 4 − 2.72 = 1.28 1.6384 8.192 5 1 5 − 2.72 = 2.28 5.1984 5.1984 Σ 25 29.04\n\nStandard deviation s = 1.08 (to 3 sig.fig.)\n\n5. Standard deviation s = 5.03 (to 3 sig. fig.)\n\n6. Standard deviation s = 1.19 (to 3 sig. fig.)" ]
[ null, "http://bestmaths.net/online/media/imported_images/senior/49596.gif", null, "http://bestmaths.net/online/media/imported_images/senior/49596.gif", null, "http://bestmaths.net/online/media/imported_images/senior/49596.gif", null, "http://bestmaths.net/online/media/imported_images/senior/49596.gif", null, "http://bestmaths.net/online/media/imported_images/senior/49596.gif", null, "http://bestmaths.net/online/media/imported_images/senior/49596.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.52799994,"math_prob":0.99913317,"size":1247,"snap":"2021-43-2021-49","text_gpt3_token_len":640,"char_repetition_ratio":0.13354787,"word_repetition_ratio":0.028248588,"special_character_ratio":0.71852446,"punctuation_ratio":0.20178041,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99771965,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-16T18:46:32Z\",\"WARC-Record-ID\":\"<urn:uuid:87ebb026-bac8-4357-9c8f-4555860d753d>\",\"Content-Length\":\"20564\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:96fc97f6-324c-42d9-af33-c2a42b891c6d>\",\"WARC-Concurrent-To\":\"<urn:uuid:f6fcc7de-c096-4670-99dd-a1bface5444d>\",\"WARC-IP-Address\":\"43.224.120.23\",\"WARC-Target-URI\":\"http://bestmaths.net/online/index.php/year-levels/year-12/year-12-topic-list/spread/answers/\",\"WARC-Payload-Digest\":\"sha1:HETRMUQSYGAOJMH3AEPNZWHPPYVT2NOC\",\"WARC-Block-Digest\":\"sha1:CFY4HIZ2AM3I7Q43HSUBXYF55MPIQNGR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323584913.24_warc_CC-MAIN-20211016170013-20211016200013-00674.warc.gz\"}"}
https://www.calculus-online.com/exercise/5474
[ "# Function Investigation – A rational function – Exercise 5474\n\nExercise\n\nInvestigate the function\n\n$$y=\\frac{x^3+3x^2+2}{x^2+1}$$", null, "" ]
[ null, "https://www.calculus-online.com/wp-content/uploads/2019/05/joxi_screenshot_1558777421287-300x297.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7157137,"math_prob":0.9990982,"size":777,"snap":"2023-40-2023-50","text_gpt3_token_len":165,"char_repetition_ratio":0.20310478,"word_repetition_ratio":0.110091746,"special_character_ratio":0.24066924,"punctuation_ratio":0.042016808,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9939667,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-26T11:51:50Z\",\"WARC-Record-ID\":\"<urn:uuid:042513d8-bc96-4921-b7b0-3cc7b5344cdf>\",\"Content-Length\":\"286935\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:29a96695-0de3-4d93-86d7-8543037560b0>\",\"WARC-Concurrent-To\":\"<urn:uuid:b99b4dca-a10b-4f65-a4a5-ac4d5e6eb00d>\",\"WARC-IP-Address\":\"143.42.195.251\",\"WARC-Target-URI\":\"https://www.calculus-online.com/exercise/5474\",\"WARC-Payload-Digest\":\"sha1:VX5KOURWGEBRLADQJH75SSTGA52WBOGZ\",\"WARC-Block-Digest\":\"sha1:4RBQRMWKOBBMX4UIGLJNP5SY725FBXFI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510208.72_warc_CC-MAIN-20230926111439-20230926141439-00194.warc.gz\"}"}
https://lib.dr.iastate.edu/rtd/9815/
[ "## Retrospective Theses and Dissertations\n\nDissertation\n\n1992\n\n#### Degree Name\n\nDoctor of Philosophy\n\n#### Department\n\nAerospace Engineering\n\nAmbar K. Mitra\n\n#### Abstract\n\nA scheme based on the Boundary Element Method (BEM) for solving the problem of steady flow of an incompressible viscous fluid is presented in this thesis. The problem is governed by both Navier-Stokes (N-S) equations and the continuity equation. The fundamental solution of the two-dimensional N-S is derived, and the partial differential equations are converted to an integral equation;The computer code is flexible enough to handle a variety of boundary and domain elements with different degrees of interpolation polynomial. Boundary and domain integrals over corresponding elements are evaluated analytically. The Newton Raphson iteration scheme accompanied by a relaxation factor is used to solve the nonlinear equations. The code includes a post processor that calculates the velocity components at any point inside the domain;The scheme has been applied to three test problems. The first concerns Couette flow, which has been used as a test case for testing the rate of convergence and accuracy. The second and the third concern the driven cavity and the flow in a stepped channel, respectively;In the integral equation formulation, the primary unknowns are tractions on the domain boundary and velocities in the interior. Because the shear stress, drag, and lift can be simply computed from the values of tractions along the boundary, such a formulation is markedly superior to either the finite-difference or the finite-element formulation. In customary pressure-velocity or streamfunction-vorticity formulations, employed in the finite-difference or finite-element methods, calculation of stress, drag, and lift involves extensive postprocessing.\n\n#### DOI\n\nhttps://doi.org/10.31274/rtd-180813-9370\n\n#### Publisher\n\nDigital Repository @ Iowa State University, http://lib.dr.iastate.edu/\n\n#### Copyright Owner\n\nAbdel-Magid Abdel-Latif Abdalla\n\nen\n\nAAI9223911\n\napplication/pdf\n\n109 pages\n\nCOinS" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.83282053,"math_prob":0.7808976,"size":2416,"snap":"2021-21-2021-25","text_gpt3_token_len":509,"char_repetition_ratio":0.10199005,"word_repetition_ratio":0.0,"special_character_ratio":0.19039735,"punctuation_ratio":0.1097561,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9663838,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-17T00:10:37Z\",\"WARC-Record-ID\":\"<urn:uuid:360f1470-2791-42f9-8f2e-ca433a87c660>\",\"Content-Length\":\"39676\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bd93da2e-2b7d-4557-9885-a087ed54df20>\",\"WARC-Concurrent-To\":\"<urn:uuid:ff4d75b4-d655-4f0d-b4bb-ba04c26d4d52>\",\"WARC-IP-Address\":\"13.57.92.51\",\"WARC-Target-URI\":\"https://lib.dr.iastate.edu/rtd/9815/\",\"WARC-Payload-Digest\":\"sha1:4W24KM2PVEYRI3XIMRZSWAJ22QR3YXPR\",\"WARC-Block-Digest\":\"sha1:5L6NFK2WWVSRKWZ5QB5BQUMXFMZ64DJD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487626122.27_warc_CC-MAIN-20210616220531-20210617010531-00266.warc.gz\"}"}
https://www.futureschool.com/australian-curriculum/australian-capital-territory/mathematics-year-1/
[ "Latest Results:\n\n### ACT Year 1 Mathematics\n\n# TOPIC TITLE\n1 Study Plan Study plan – Year 1\nObjective: On completion of the course formative assessment a tailored study plan is created identifying the lessons requiring revision.\n2 Using and applying number The numbers 1 to 5\nObjective: On completion of the lesson the student will be able to read, write and identify the words and numerals for the numbers 1 to 5\n3 Using and applying number The numbers 6 to 9\nObjective: On completion of the lesson the student will be able to match cardinal words and numbers with groups of 6-9 objects.\n4 Using and applying number Zero and counting numbers 1 to 9\nObjective: On completion of the lesson the student will be able to recognise, write and match the numeral and word for the number zero.\n5 Using and applying number The number 10\nObjective: On completion of the lesson the student will be able to write the numeral and word for the number 10, count up to 10 objects and to match a group of objects to the correct number.\n6 The number system Ordinal numbers 1 to 9\nObjective: On completion of the lesson the student will be able to match ordinal words and numbers with groups of 1-9 objects.\n7 Using and applying number Numbers 11 to 20\nObjective: On completion of the lesson the student will be able to write the numeral and word for the numbers 11 to 20, count up to 20 and match a group of objects to the correct number.\n8 Using and applying number Using place value to order numbers up to 20\nObjective: On completion of the lesson the student will be able to use place value to order numbers up to the value of 20.\n9 Reasoning Simple addition up to the number 10\nObjective: On completion of the lesson the student will be able to write simple number sentences that show numbers adding up to another number.\n10 Calculations Subtraction up to the number 10\nObjective: On completion of the lesson the student will be able to calculate the answer to take away or subtraction number sentences up to the number 10.\n11 Reasoning Simple addition up to the number 20\nObjective: On completion of the lesson the student will be able to write simple number sentences and also write addition in a vertical format using numbers up to 20.\n12 Calculations Subtraction up to the number 20 and beyond\nObjective: On completion of the lesson the student will be capable of subtraction using tens and units and calculating the answer to take away or subtraction number sentences.\n13 Calculation-grouping Multiplication using equal groups\nObjective: On completion of the lesson the student will be able to write about equal groups and rows and will understand how to count them.\n14 Calculation-grouping Multiplication using repeated addition\nObjective: On completion of the lesson the student will be able to write about equal groups and rows using another method and also learn different ways to count them.\n15 Calculation-multiplication The multiplication sign\nObjective: on completion of the lesson the student will be able to multiply single numbers to solve multiplication problems.\n16 Calculation sharing/division Strategies for division\nObjective: On completion of the lesson the student will be able to share objects equally and will also learn how to write about them.\n17 Length Compare length by using informal units of measurement\nObjective: On completion of the lesson the student will be able to measure objects around the student’s home and compare their length to each other. The student will also be able to compare the different ways the student measured the same object.\n18 Weight/mass Introducing the concept of mass\nObjective: On completion of the lesson the student will understand the concepts of mass.\n19 Time, days of week Days of the week\nObjective: On completion of the lesson the student will be able to: name the days of the week in order, recognise them in a written form, be able to answer questions about the days of the week, and have an understanding of a diary.\n20 Time, duration Duration\nObjective: On completion of the lesson the student will be able to estimate and measure the duration of an event using informal units, and compare and order the duration of an event using informal units.\n21 Time, analogue O’clock and half past on the analogue clock\nObjective: On completion of the lesson the student will be able to use the terms ‘o’clock’ and ‘half past’, and read hour and half-hour time on an analogue clock.\n22 Time, digital O’clock and half past using digital time\nObjective: On completion of the lesson the student will be able to use the terms ‘o’clock’ and ‘half past’, and read hour and half-hour time on a digital clock.\n23 Data Pictograms\nObjective: On completion of the lesson the student will be able to organise, read and summarise information in picture graphs.\n24 Lines and angles Describing position.\nObjective: On completion of the lesson the student will be able to use and understand conventional location language to describe position.\n25 Exam Exam – Year 1\nObjective: Exam" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86597884,"math_prob":0.9139734,"size":5054,"snap":"2022-05-2022-21","text_gpt3_token_len":1180,"char_repetition_ratio":0.23148514,"word_repetition_ratio":0.3810082,"special_character_ratio":0.2245746,"punctuation_ratio":0.07058824,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9904714,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-29T09:43:11Z\",\"WARC-Record-ID\":\"<urn:uuid:9f232852-e0ab-41ee-a8d5-51b34aa204b3>\",\"Content-Length\":\"57137\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a86e9453-c5e3-43d1-8478-ef3aba2e8d1e>\",\"WARC-Concurrent-To\":\"<urn:uuid:33b0ccd5-953b-4a58-92ad-5bc64055fa07>\",\"WARC-IP-Address\":\"35.197.225.6\",\"WARC-Target-URI\":\"https://www.futureschool.com/australian-curriculum/australian-capital-territory/mathematics-year-1/\",\"WARC-Payload-Digest\":\"sha1:VK32WNKON2EUT4RY5IUPI5CCC36LFVVB\",\"WARC-Block-Digest\":\"sha1:GLCCP4D7SZESRTXQGSU3XHA73COBVT53\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652663048462.97_warc_CC-MAIN-20220529072915-20220529102915-00433.warc.gz\"}"}
https://brilliant.org/practice/quadratic-equations-solve-quadratic-formula/?subtopic=quadratic-equations&chapter=quadratic-equations
[ "", null, "Algebra\n\n#### Challenge Quizzes\n\nWhat is the root of the quadratic equation\n\n$x^2 + 6 x +9 = 0?$\n\nWhat are the roots of the quadratic equation\n\n$x^2 -2 x -48 = 0?$\n\nWhat are the roots of the quadratic equation\n\n$x^2 - 2 x -5 = 0?$\n\nFrom the top of a building of 960 feet, Tommy threw a coin upwards. The height of the coin from the ground $t$ seconds after it has been thrown is given by\n\n$h = - 16t^2 + 8 t + 960.$\n\nHow long (in seconds) would it take the coin to hit the ground?\n\nWhat are the roots of the quadratic equation\n\n$0.5x^2 + 0.6 x -0.2 = 0?$\n\n×" ]
[ null, "https://ds055uzetaobb.cloudfront.net/brioche/chapter/Quadratic%20Equations-Xy0bUj.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92549396,"math_prob":1.0000012,"size":557,"snap":"2020-45-2020-50","text_gpt3_token_len":126,"char_repetition_ratio":0.15189873,"word_repetition_ratio":0.3265306,"special_character_ratio":0.22262119,"punctuation_ratio":0.15,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99998665,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-31T08:33:43Z\",\"WARC-Record-ID\":\"<urn:uuid:4b117c70-3942-47db-84d1-c47b1560c506>\",\"Content-Length\":\"114429\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0f6f2d76-d2d7-4c06-a825-2e9575f6a04e>\",\"WARC-Concurrent-To\":\"<urn:uuid:ae945dd6-9f29-48be-93e8-f2dcc98899ce>\",\"WARC-IP-Address\":\"104.20.35.242\",\"WARC-Target-URI\":\"https://brilliant.org/practice/quadratic-equations-solve-quadratic-formula/?subtopic=quadratic-equations&chapter=quadratic-equations\",\"WARC-Payload-Digest\":\"sha1:U7U46VKYDNC5KVGZFK4HQW3JOKISTXP4\",\"WARC-Block-Digest\":\"sha1:C45MXRYMAJPJXCWWNC2WAGYVKEKDW4IN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107916776.80_warc_CC-MAIN-20201031062721-20201031092721-00646.warc.gz\"}"}
https://api.haxeflixel.com/flixel/math/FlxAngle.html
[ "A set of functions related to angle calculations.\n\n### `staticread onlyTO_DEG:Float`\n\nConvert radians to degrees by multiplying it with this value.\n\n### `staticread onlyTO_RAD:Float`\n\nConvert degrees to radians by multiplying it with this value.\n\n### `@:value({ AsDegrees : false })staticangleBetween(SpriteA:FlxSprite, SpriteB:FlxSprite, AsDegrees:Bool = false):Float`\n\nFind the angle (in radians) between the two FlxSprite, taking their x/y and origin into account. The angle is calculated in clockwise positive direction (down = 90 degrees positive, right = 0 degrees positive, up = 90 degrees negative)\n\nParameters:\n\n`SpriteA` The FlxSprite to test from The FlxSprite to test to If you need the value in degrees instead of radians, set to true\n\nReturns:\n\nThe angle (in radians unless asDegrees is true)\n\n### `@:value({ AsDegrees : false })staticangleBetweenMouse(Object:FlxObject, AsDegrees:Bool = false):Float`\n\nFind the angle (in radians) between an FlxSprite and the mouse, taking their x/y and origin into account. The angle is calculated in clockwise positive direction (down = 90 degrees positive, right = 0 degrees positive, up = 90 degrees negative)\n\nParameters:\n\n`Object` The FlxObject to test from If you need the value in degrees instead of radians, set to true\n\nReturns:\n\nThe angle (in radians unless AsDegrees is true)\n\n### `@:value({ AsDegrees : false })staticangleBetweenPoint(Sprite:FlxSprite, Target:FlxPoint, AsDegrees:Bool = false):Float`\n\nFind the angle (in radians) between an FlxSprite and an FlxPoint. The source sprite takes its x/y and origin into account. The angle is calculated in clockwise positive direction (down = 90 degrees positive, right = 0 degrees positive, up = 90 degrees negative)\n\nParameters:\n\n`Sprite` The FlxSprite to test from The FlxPoint to angle the FlxSprite towards If you need the value in degrees instead of radians, set to true\n\nReturns:\n\nThe angle (in radians unless AsDegrees is true)\n\n### `@:value({ AsDegrees : false })staticangleBetweenTouch(Object:FlxObject, Touch:FlxTouch, AsDegrees:Bool = false):Float`\n\nFind the angle (in radians) between an FlxSprite and a FlxTouch, taking their x/y and origin into account. The angle is calculated in clockwise positive direction (down = 90 degrees positive, right = 0 degrees positive, up = 90 degrees negative)\n\nParameters:\n\n`Object` The FlxObject to test from The FlxTouch to test to If you need the value in degrees instead of radians, set to true\n\nReturns:\n\nThe angle (in radians unless AsDegrees is true)\n\n### `@:value({ AsDegrees : false })staticangleFromFacing(FacingBitmask:Int, AsDegrees:Bool = false):Float`\n\nTranslate an object's facing to angle.\n\nParameters:\n\n`FacingBitmask` Bitmask from which to calculate the angle, as in FlxSprite::facing If you need the value in degrees instead of radians, set to true\n\nReturns:\n\nThe angle (in radians unless AsDegrees is true)\n\n### `staticinlineasDegrees(radians:Float):Float`\n\nConverts a Radian value into a Degree Converts the radians value into degrees and returns\n\nParameters:\n\n`radians` The value in radians\n\nReturns:\n\nDegrees\n\n### `staticinlineasRadians(degrees:Float):Float`\n\nConverts a Degrees value into a Radian Converts the degrees value into radians and returns\n\nParameters:\n\n`degrees` The value in degrees\n\nReturns:\n\nRadians\n\n### `staticgetCartesianCoords(Radius:Float, Angle:Float, ?point:FlxPoint):FlxPoint`\n\nConvert polar coordinates (radius + angle) to cartesian coordinates (x + y)\n\nParameters:\n\n`Radius` The radius The angle, in degrees Optional FlxPoint if you don't want a new one created\n\nReturns:\n\nThe point in cartesian coords\n\n### `staticgetPolarCoords(X:Float, Y:Float, ?point:FlxPoint):FlxPoint`\n\nConvert cartesian coordinates (x + y) to polar coordinates (radius + angle)\n\nParameters:\n\n`X` x position y position Optional FlxPoint if you don't want a new one created\n\nReturns:\n\nThe point in polar coords (x = Radius (degrees), y = Angle)\n\n### `staticsinCosGenerator(length:Dynamic, sinAmplitude:Dynamic, cosAmplitude:Dynamic, frequency:Dynamic):Dynamic`\n\nGenerate a sine and cosine table during compilation\n\nThe parameters allow you to specify the length, amplitude and frequency of the wave. You have to call this function with constant parameters and either use it on your own or assign it to FlxAngle.sincos\n\nParameters:\n\n`length` The length of the wave The amplitude to apply to the sine table (default 1.0) if you need values between say -+ 125 then give 125 as the value The amplitude to apply to the cosine table (default 1.0) if you need values between say -+ 125 then give 125 as the value The frequency of the sine and cosine table data\n\nReturns:\n\nReturns the cosine/sine table in a FlxSinCos\n\n### `staticwrapAngle(angle:Float):Float`\n\nKeeps an angle value between -180 and +180 by wrapping it e.g an angle of +270 will be converted to -90 Should be called whenever the angle is updated on a FlxSprite to stop it from going insane.\n\nParameters:\n\n`angle` The angle value to check\n\nReturns:\n\nThe new angle value, returns the same as the input angle if it was within bounds" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6890485,"math_prob":0.97025263,"size":4755,"snap":"2021-21-2021-25","text_gpt3_token_len":1161,"char_repetition_ratio":0.16522837,"word_repetition_ratio":0.43223965,"special_character_ratio":0.20336488,"punctuation_ratio":0.13262911,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9970775,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-20T03:25:22Z\",\"WARC-Record-ID\":\"<urn:uuid:c11bc052-691c-478b-9040-302640813bf4>\",\"Content-Length\":\"24114\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2f2b87f6-5e71-4089-9a56-cb66d78abd0b>\",\"WARC-Concurrent-To\":\"<urn:uuid:ab2ec046-1598-4981-ba9f-8604ecd0308c>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://api.haxeflixel.com/flixel/math/FlxAngle.html\",\"WARC-Payload-Digest\":\"sha1:JXZIQJGPLEOX47VZKAIEOP4CXE3SOWQI\",\"WARC-Block-Digest\":\"sha1:N6RN4CIV3GXL26HOUOF6U4CWCRDWOPXX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487655418.58_warc_CC-MAIN-20210620024206-20210620054206-00590.warc.gz\"}"}
https://www.journals.elsevier.com/chaos-solitons-and-fractals/editorial-board
[ "# Chaos, Solitons & Fractals - Editorial Board\n\nEditor-in-Chief", null, "### Dr. Stefano Boccaletti\n\nCNR- Institute of Complex Systems, Florence, Italy. University Rey Juan Carlos, Madrid, Spain\nEditors\n\n### Dr. Ravindra Amritkar\n\nPhysical Research Laboratory, Ahmedabad, India Synchronization Complex networks,  Time series analysis,  Characterization of chaos (fractal dimension, f-\\alpha etc.),  Extreme events,  Nonlinear dynamics in dissipative systems and applications", null, "### Prof. Dr. Abdon Atangana, PhD\n\nUniversity of the Free State Faculty of Natural and Agricultural Sciences, Bloemfontein, South Africa Methods and application of nonlinear equations, Fractional calculus and their applications to real world problems, Application of partial, ordinary and fractional differential equation to groundwater problems, Perturbation and asymptotic methods, Iteration methods for differential equations, Numerical method for partial differential equations, Numerical methods for ordinary differential equations, Analytical methods for partial differential equation, Analytical methods for ordinary differential equation, Integral transforms, Groundwater flow models, Groundwater transport models" ]
[ null, "data:image/jpeg;base64,/9j/4AAQSkZJRgABAQEAYABgAAD/4SwgRXhpZgAATU0AKgAAAAgABgALAAIAAAAmAAAIYgESAAMAAAABAAEAAAExAAIAAAAmAAAIiAEyAAIAAAAUAAAIrodpAAQAAAABAAAIwuocAAcAAAgMAAAAVgAAEUYc6gAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFdpbmRvd3MgUGhvdG8gRWRpdG9yIDEwLjAuMTAwMTEuMTYzODQAV2luZG93cyBQaG90byBFZGl0b3IgMTAuMC4xMDAxMS4xNjM4NAAyMDE5OjA1OjEzIDE0OjEwOjIxAAAGkAMAAgAAABQAABEckAQAAgAAABQAABEwkpEAAgAAAAMxNwAAkpIAAgAAAAMxNwAAoAEAAwAAAAEAAQAA6hwABwAACAwAAAkQAAAAABzqAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMjAxOTowNDoxOCAxMzozODoxNAAyMDE5OjA0OjE4IDEzOjM4OjE0AAAAAAYBAwADAAAAAQAGAAABGgAFAAAAAQAAEZQBGwAFAAAAAQAAEZwBKAADAAAAAQACAAACAQAEAAAAAQAAEaQCAgAEAAAAAQAAGnQAAAAAAAAAYAAAAAEAAABgAAAAAf/Y/9sAQwAIBgYHBgUIBwcHCQkICgwUDQwLCwwZEhMPFB0aHx4dGhwcICQuJyAiLCMcHCg3KSwwMTQ0NB8nOT04MjwuMzQy/9sAQwEJCQkMCwwYDQ0YMiEcITIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIy/8AAEQgAtgDCAwEhAAIRAQMRAf/EAB8AAAEFAQEBAQEBAAAAAAAAAAABAgMEBQYHCAkKC//EALUQAAIBAwMCBAMFBQQEAAABfQECAwAEEQUSITFBBhNRYQcicRQygZGhCCNCscEVUtHwJDNicoIJChYXGBkaJSYnKCkqNDU2Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6g4SFhoeIiYqSk5SVlpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfIycrS09TV1tfY2drh4uPk5ebn6Onq8fLz9PX29/j5+v/EAB8BAAMBAQEBAQEBAQEAAAAAAAABAgMEBQYHCAkKC//EALURAAIBAgQEAwQHBQQEAAECdwABAgMRBAUhMQYSQVEHYXETIjKBCBRCkaGxwQkjM1LwFWJy0QoWJDThJfEXGBkaJicoKSo1Njc4OTpDREVGR0hJSlNUVVZXWFlaY2RlZmdoaWpzdHV2d3h5eoKDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5usLDxMXGx8jJytLT1NXW19jZ2uLj5OXm5+jp6vLz9PX29/j5+v/aAAwDAQACEQMRAD8A8Wj/ANTT0+6fpWgimP8AWD61Lcf6hvpQBA33I/pTJPuigCQfdf8A3ab/AAfgKAI2+/Uv8JpgMi5Q1Kw+RfrUsQ4j5W+tK4+T8KYxkH+qof8A49moAVP+Wf8Au00/6ofU0ANl/wBWtSr938KAK8f3zTPX60AWE+/+FNH3U/36ALR+8frRQA6L/VGnp90/SgCqv+sH1qW4/wBQ30oArP8A6tPpTZOooAcn3Go/5ZmgCL0qUDKHjNAFux0q9u1HlW7kE8ErgfnWwfCd2sQLzQRt6HP86hsZBc+H7qNSElt5WPOEk549jWXOhQsrDBAwRimhEUA/dUOP9H/GqARf4fpQ/wDqh9aAGT/cWpB/qj9KAIE+/TR1/GgCdP8AWn6U0fdX/foAsH7x+tFAEsX+pNPX7p+lSBVX/WD61LP/AKlvpTAqt/qY6bJ94UwHr/q2pB92mBF/F7d66Tw7pcV1Istyf3Z+6vrUTdkXFXdjt2t7e0ttq8ueCv8AdHapdO0G4vJQJbllX7z7f4f/AK/+Fckp6nXGhdGJfN5EzQlWAV2jYDo3uao3Gnw38ATaFl24X/61bxlc5XGzscw1vJatJBJnchxUE3+p/GtUZsQD7v0pHH7r8aYDZx8i1J/yyP0oArL96j+I0ASr/rG+lNX7sf8AvUASt94/WigCzF/qjT1+6fpUgVF/1y/U1Ncf6t/pTArN/qU+lRv94UASL/q2pF+6aAI+N/Neg+CLKO5tDLK6gx5RQTy3f+tZ1fhNqCvNHR3Bs9OdS1m11IekaEKP1rptPvrWWzEa2TWjkcQtjH5iuGex6kXrY898ZwtbaiZGG3zVLZ7NxjNZGnQS3cmyFZZJDyqxJuY/QV00/huedNXmUNajIufMJbLrhlYchhwc+/tWLN/qfxrojsc8tGC9v900j/cWqEMuOi1J/wAsj9KAKy/eo/iP1oAkT/WN9KE+4n+9QA5vvH60UAXIf9Uad/yyapGVk/1gqWf/AFLfSmBWb/Up9Kjk++KYEi/6p/wpB/q6BEXG8fX0zXW+HILq+ktrexif7Q2QZy3CH6VlVdkb0Vedj0nXPCzT6fHJaTsk6BUY5BDnHUD1o07w5dxW8T3ElwAoH39vOPpxXA5aM9NQ1RV8awQTaIzlQzREbCRkg9PyrC0TS0soPK1BpIVnQFU2H5+u0EjoOtOMv3dhRh++MjxkFimhtgcsF3HnJx2z74/lXHzf6nPqK9CkvdPMxP8AGkCfw/7lDD5FqzEZcdFqT/lkfpQBWX71B+9+NAEif6xvpSRfdT/eoARvvt9aKAL0H+oNSD7hqRlVf9dU8/8Aqm+lMCq3+oT6VC/36YEq/wCqf8KE/wBXQIiH+tH1rvdB1VdE8K295ZBTevOwbPfJIA/ICsqqujai7SubEHiq7lt5Tqk0m5RuQxxgYf1z3roNJ1+fU7BSZCNrbWGeM1xyhZHoQq3Zcmu4kkxJ6Z6ZzVWXUbe0gnv5rlFjWPYIwcuBknhe/X9KzgtEja9pXPKdZvn1K+ku2UqJACoPYdvqcYrGn/1X416i0SR4s5c0m/MVB8v4UN1X6VRJHc/cX60//lkfpSArL96j+KgCRP8AWN9KSL7q/wC9QA1vvt9aKANCD/UGpB9w1Iyqn+vFS3H3H+lAFZv9Qn0qGT74oAmT/VPSL9ygCMDL1tWU2+waHzDH5cokLKMkAjBwKUtioP3jpdP0kO2Tp13d5XPmXLbV9ztB5/Gt/T0h0+J44FEbbySoGB0HSuWaud0HqiR5HcO7NwOSfT/PNRweF7rXwsNnavPcucsqjhF7ZJ4AH9aVNWLqO0WzhvEOk3Oha5e6XdrtltZNhA6EYBBHsQQfxrGmX9z+NejGLaVzybiqvy/8BpCPmX6U3oIiuui/Wj/lkfpUMpFZfvUH7340hkif6xvpSRfdX/eoGNb77fWigDQh/wBRT/8AlkakCvH/AK1aluR+6k+lAFZv+PeP6VBJ98UATJ/qnpF/1dAEQ+9Wjp95/Z97BdFQ6xsCyH+IZ6UnsNHoEevGWSO6jkba6dMcAdv606SeSeVpxgSlcAAferCR1xeh0nhjw7f+JJxBHtjiQ/6RcbeE/wBkf3mx2r0a/wBT0/wTZrp2m24N0y7gGPI7BnPfvx061vhaHtZqJjiatlY8p8Ra1H4i1L7FdxR3l3OVSRwmPLQHj7vpk1fsPhj4alkPnPqEiq2cSSBQ3twAcV7tSgrK3Q8z2hz/AIz+GkukRPqejrJNYgEywk7pIfcf3l/DI/GvO/LJKscdOo7159WNmbQlcq3fb60p/wBUfpXMzVFVfvUN978aQx69ZPoKWP8A1a/WgZE332+tFAGlD/qKef8AVGpArR/60VLcfcb6UAV2/wBQn0qB/vUATp/qGpq/coAiH3qlcgR9vXmgDoPD0VyLO4mjieWON1BUDJ5BJI/SvQvC2iS663nyyPDZKQGkVPmY/wB0en1rOcbzsdFJ2iz2q5msPCHhg/ZoVjhiG2GMHmSQ9Bn1J5J9MmvDPFHiGSESySzGW/uskt6A9/p6DsMCvTwEfZqVT5HFWleVjjrHV5tPl8y0RhP3lbua6LTde1WWTzLq7nc9flOAK9KnO71OV72O80zXL+HZHcOHjdcgMc/jVDxr4G0vUNNk1XTY1tNQUb2jjwI5j9Ox9xWeJoJ6oIPU8MvAVZQVIweh6j2oP+rP0rxpbtHatiqv3qU/61frUlDk6y/Wli/1a/WgCJvvt9aKANOL/U04/wCqNSBWj+/U0/8Aqm+lAFd/+PZfpUD0ATp/x7tTV+5QBEP9YKsIm+QDGe5Hr/niqS1Ez1j4dsbrQWijlWG4tpCHCqoyGO4H9f0r0OQeIzZrcQRiayIYfMArjB5fnpn5vyqKi940T0PP/FPjyfVLiOSZfkgUR21qP45CAGYge2B+OK49dIvL6V77V7j7Ikh3NJLwz/Ra9bDwtTUfmcU3rcfPqmkafGIrC2+0P08yYYBqquqXep3Ci6mKwAgeWnyrge1buVnyoi19TqtKvTdaxbtIClvHgFR0wK2PGoutoukvJPKYbNinGD16fjXVb3bszW55FqUZeQyMcsGOTjr/APXqtnMbfSvBrx5Zs7obFZfvUH/WD6isSx4+9NSwfdH40AQn7x+tFAGpH/qaVj+6NSBXj++KmuP9Q/0oArN/x7R/SoH+9QBOn/Hu1NX7lMCIff5zj2rTt0wrI4BVV3sPX0B+vT8a0p9yJs6bwQl8/iC3hsyJJrgKJYd+3zFJJOG7EAYz/tV6x8QvGf2aNfDlpHIirGiTopyzZ+5Fn/awST6DmnOFpIL+6eO3GpQabI8sZW61OU5d1/1cRP8ACvrWPcXEtxma4laSTuT/AJ4rv5rRSMLakMSmT5j+FXkO1acF1FI6HSr+O2TzpOdg+ROzN2z7VuauZpvBkcjszMZmdi3XPGa7ou8TJ7nnkjiV8nqRVKaMxblP1rycTG65jrpuyKS/eo/5ar9a4zUevWX60Rf6ugCM9TRQBpL/AKqlb/VVIFeP74qaf/VN9KAK7f6hPpVeT71AFhP+Pc01ceUSaAJLK3ZpDL12jKj3qV5H8ktwQ7Zz3OOw/E1vTV0ZT3NvQtWk0XxBbXkBAkhEZywyoGFP88ZHfOKfrmrNePJc/aZjJPcSyszEbpAxG3JGecdee+O1avWSYX0Ofzj19eaUfOR7VruZluNcYqxkLGc1utNCWOtS886LtLAcnFd5cTxv4AdtwZdxAxXRSd4szlueZxS4YmrM1u1zbMyfeHIria54tG6drGIM7+e3FIf9YPqK85qzsbrYd/HL9KWLofrQMaepooA0F/1VD/6qpAgj++KmuP8AVN9KAKzf8ey/SoX7UATp/wAe5oiUsuB1PAprViZoRoY0WFeMd/5n86ZcP5vkRsFEcKeWgVccbmbJ9+TXWlsZstqUWQxmPc0m3aQ2MAAY/wAfwqpc4M2AeFAAA7CtOhJFsyKnjjwtXFEMmjxnnt0pCHmlVRnGe1aJXEddeJDonhG5hhAS5Kqsrjrluo/AZFZqSsnw92sfvXJxW7evyJW5yYJEgYd+a6SxiEkQI7jketc1Ddo0kc9qdsIL0leFboPSqJ/1g+orhqq0mbxego/1k30p0Hf6msiiE/eP1ooA0x/qqRv9VUgRR/eFST/6pvpQBXb/AI9l+lQv2oAnX/j3NS2fGWHXoPxq4L3hPYup/qHdv4Pl/E//AFgaibc8ioAzPjO1epzXX0MmXrmSWMSRZKSjaqoccfKBnj61mPGiSY37mPJNOInsTADAxSudqH3rdLQz6jISXcKASTwAO9dNYJY6R/pV2yPeoMx2452nsW/w9qqnswZQ1q5kksLa2zmW6kNw+Tzjoufx3Vf8RRrYeHdPsR1wZG+tXum/IS3Rxzn5h7VsaZclGGOfb1rmou0jSWxNqUa3EbY4Y8gehrmpFKyc9cgGssVHW5dJ6CfxS/SnQd/qa5DUhPU0UAbkdjfSqPLs7hx/sRMakOi6m4wLC5yezR7f54qG2BLYeGNVu7kxxWyb0UsyGZAQOmTk+9N1vQNU0eKNb+1eLzB8j7gVYeowT7UcyuO2hkSBRANpBI4JFV37VQiwgzDU6jy0RPetqSImy3DP5ds37tGy38Yzjr26foau6Jf6kdUt7ew2Ykk+ZCq7G6ZJHQAAZq5uyFErXsoZ5rxUZN8hKo5yRz1J7n+uazozkFjySeSe9aU/hRM9yeA75NtF1lWCjucVv9kyNHT410+yfUpVHmZ22ynu3dvw6/XFJp0cRt5L++ZjbqxwP4pW64Hp7n0rWOwi7oNtLretrd3C8E5VR0QDoB7YqPxfei41J0U5EfyCnLSlfuC+I5wLk5qzaPiTFclPRmr2L3m4l5+73HrWbqUIE4kTgE8j0q66vAUdykMea5FJB1NeezpIj94/WikI0Z9Zvrk5kubl/wDekY1TeSR/vAn61puBseFhKNQvBGQrNYzjbuxvG3kflz+FULa4nVH/AHsu0REAE7hg8dKxs+ZjvoREDys925NQN0FMRetlyv6CnMMv9OBXVTXumU3qSbvl5xjvXUeF7PTYtF1PVr2cRSqrW9r8of5mTJKqepwfwzUVfhKhuc1eTIQkS43D72OgPoMcdqryHace1dC2Mpbl3R7dppsL6ZNKtpJe6qltHwzPgn0Hc/gOfwreK9xEdSXVLhby+W2teLeICGEeozjP4nn86gvZPPnjtIDuhg+RPf1b8TzVt2BbnfaFZpp+lPcKMHy8CuBv8vcyk9c5q8QrQUSae5TCcVNbJiYVxwWps9jQlb5TVURGcFcZFbT2sSjKZGjuJEYYIFRxf0rzJbs6VsB6mipAulOKgZdprYRqeGMf8JFbZbaNsmT7eW2ayIf+PeXn+EcfjWP2n6DWw4n9wv0qEnG0/nSQF+NNkQ/WpJF2oorvivcMHuDemeo6VJJdyRacLZZFYFzIAM8EgA+3YdKgroUFJUk9qcPm+bGTjimSzvPCdtHaaW0zY+0XKMY1PZQOT+JrDiVrGwvr5wRJKTBHntnlj+XH413ctqaZitzLtMp59wOBHGSP95vlH88/hV7RLMGVZJMAH17VCs5IqzO1vr2BdFENtcxtIDyqtkj8K4t9Pubi64RhuPXaRmrr2lbUmCaNiHw9p0aKb7WLG3z1V5hu/KrL23gy0TfLrwfHaCJ3P+FTzQitS7NmVd33hNlMdveamo/vm1XH/oWazRq+nWqMltFNduejSL5YH5Ek/p9axnWp7oqNNmRcXUl3cM0gQEdAi4A/qfzNQQfeNedKV2bpWVhh6mikM0u1RSDNbCL+g5j1CaYf8srSd/8Axwj+tZEWfssoP90fzrH7XyGtiRv9Uv0pkSF5ol7bsn6U4biZpbQyxju5Jpbs4APpXfb3Tn6kfWFWA555qG4OZcBdoVQMe+Of1rIvoRKpbgU9cb1jHrzVLcTO2FybPW7K2BxHBEkR/Ec/1ql4vdIHt7NG+VQZCPUk/wCArtlL3GjFbnOSXAgsPIQZllfex/uqAcfnk/lVJhNNhpGZiOPm7V51WbbsdMUM+zyHpTWhK4rm5nvc1shNuOPWh23YT0ocpPcVkAQLwacccYosh7IcP9Y/+7SQfe/Clawhh6mimBfao26VsI0tB/12pc4/4ltx/wCg4rGj/wCPeTtyOKy+0ymS4/drVvR9N1LVtTSy0u3ae4k6qBwFyMlj0VR3J6VMXZieqNE2bpqU1u5jLQMYmMRJXcvBwTzjNQagmwMtend+zObqQWyvtSQDMcRDv+FU2JZsZyScmsi0OLhE2j8amsUH2uEnuw/mKIr3kKTNzWmaPXZjnHz5FXPD3hu98c+KIbGPcsKENdXGOIk5/U8gD+ma0rSsmKKuz1K6+HPhyO6FpHYwm4SJEAnVt0mNvOcYyec8ZO41xfirwhZ6LYSssZRHfAViSY23NjBwARtAP0I9q5Kck3Y3krK55nOu04JyfWoW+9XPLRlR1GtwuT0H86rqSZMnqetCBkhPNK3aqEKv+tb/AHaSH/W/hQAh+8frRQBdoJ4rYRe0U/8AIV/7B039KseEfDcviV7q3inhhMYVsytgE54FYTdrs0irtI2bn4c6x/asOm21sGmckM+/90gHVmbsB+fpXsOgeF7Hwh4duINOt55rtV3TXQcBpHUZ9eB6Dpz65qIy6hKNtDxrR7VbhLgPKjXmSzxucOTyT+tZGp/vGbGdx6qRXstr2aOP7RSfCIq7ct3+XG2qxXn+tc72LEC5NXrbETiYgfu+Rmrh3Jep6toHwzuPFLxanqjS2+nmJGAT5XnOOSS2Nq/TJ+lelW2l2ui2o0y0tEsIRyfsz4OemSf4m6fe59x1PNXneTRrCNtRb64lgtBFLsdnbcs/O485xjnn2/HJrG8T6Xp+u6fcxrEk/myea5TCyBghC45AJ4H3uMEjjrXLzcrubW5lY8G8TaBLpNz5irIbR2LRO6EFeSNjZ/iGMfXPQ8VzuCHJ7Z9abd9SbW0IJWDE7fujpUVCEyY9RSt0WqAcv+v/AApsH+s/OgAP3j9aKALhPIoP3a2Ey7pPFtqzf9OTL+bKKXQNe/sETSi285pMKP3m3GPwNYOPM2jSMuVpm5F8Q9Rtrk3NrEI5QQcmUnpxjoK2z8Z9SMTRyaTYksu12Duu73IBxmqhSSQ6lTmZy2r+IbTV9RF7/Za2c5+8bebGW9TlTVG5u7G8bZLbXGR94rOBz6/crWHwtGL3I1TTNowl+H9rlf8A4inqlgFYlb0n0Fwh/wDZKXJ2YyRE0xx866hz3W4Qf+yVt+HLrw1oWqx6hdaZd6my/wCqjuJlKRt/ewB8xHbsOvXBA4y7gevaB8VbbWdQh0yLSJj8jurby5LAZPCjJ4B9T7966KXUr691KS5tLUHBCOs2SByMcHtz1HQ54+8KzkrMqJhSm+j/ANGvFkRX+6wAyCD255YHkcYPpgkVW3PLauqDyLy0fzHl3DDLg4GOcj6jpgd655s2SOO8bWQu7B5Y4k81whIUDJwTkgkA8bsck8E9K8guJBvdAcjce+f8iqpyuiJqzI1Axg0/7PuGV7da0IG8g4PalbotMQ5f9f8AhTYP9Z+dACnqaKALbZxxSHG0YrYTL9gdmjay/rAqfm6/4VlKAYVU+p/pWS+JlMYFAO0DNSGEcZGK01TJuPWJKkWOPuM1VgJPK3D7tKsIB5WnbuA5kQY+Wnqqf3afLEDs/hgAPGsBVijeVIFIbac7TjB9f/1V7Ha3dtCLwPLFGzgFWY4YknqD1Hqffmueu7Fx3MzVbiN0tYWkDcvum3FkHPuR3wCD64rHurqN40kAQsnyt8o/X+X4r6VyvVG6Oc8U+IrfTbeRbkqb4D90sbtl856lSCAOmcjoe4FeQzO09xJO4UNIxYhemSaqmjOo9RvQVZjP7qtjMrn75pZPuD60xDv+Wv4U2P8A1lAEh60UAWCcfjTDxzWrEX7b5fDOqN/eeEf+PE/0rKUZtsejf4VEfiY2PVMmplrVEj6B94UwJR96pRgo2apDImG7aD64qV8bvrzTA6TwKzN4mgjBwSGAP1BFem3rCRBM2WIBaT/aXIz+JyD9c+1ceI3NqexU2QeVMzQqw8woo/ugDHXqeMdfSuM8W+I30YyWUEIM8y8SMchV47evHTpXNvIuXwo81uLia7naa4laWRzks3U/59KaBXQloYsRh8y/WrSD5D9aoRXb71B+7VdBDh/rl+lMX/XUgJT1NFAH/9n/4THoaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wLwA8P3hwYWNrZXQgYmVnaW49J++7vycgaWQ9J1c1TTBNcENlaGlIenJlU3pOVGN6a2M5ZCc/Pg0KPHg6eG1wbWV0YSB4bWxuczp4PSJhZG9iZTpuczptZXRhLyI+PHJkZjpSREYgeG1sbnM6cmRmPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5LzAyLzIyLXJkZi1zeW50YXgtbnMjIj48cmRmOkRlc2NyaXB0aW9uIHJkZjphYm91dD0idXVpZDpmYWY1YmRkNS1iYTNkLTExZGEtYWQzMS1kMzNkNzUxODJmMWIiIHhtbG5zOnhtcD0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wLyI+PHhtcDpDcmVhdG9yVG9vbD5XaW5kb3dzIFBob3RvIEVkaXRvciAxMC4wLjEwMDExLjE2Mzg0PC94bXA6Q3JlYXRvclRvb2w+PHhtcDpDcmVhdGVEYXRlPjIwMTktMDQtMThUMTM6Mzg6MTQuMTcxPC94bXA6Q3JlYXRlRGF0ZT48L3JkZjpEZXNjcmlwdGlvbj48L3JkZjpSREY+PC94OnhtcG1ldGE+DQogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA8P3hwYWNrZXQgZW5kPSd3Jz8+/9sAQwADAgIDAgIDAwMDBAMDBAUIBQUEBAUKBwcGCAwKDAwLCgsLDQ4SEA0OEQ4LCxAWEBETFBUVFQwPFxgWFBgSFBUU/9sAQwEDBAQFBAUJBQUJFA0LDRQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQUFBQU/8AAEQgAtgDCAwEiAAIRAQMRAf/EAB8AAAEFAQEBAQEBAAAAAAAAAAABAgMEBQYHCAkKC//EALUQAAIBAwMCBAMFBQQEAAABfQECAwAEEQUSITFBBhNRYQcicRQygZGhCCNCscEVUtHwJDNicoIJChYXGBkaJSYnKCkqNDU2Nzg5OkNERUZHSElKU1RVVldYWVpjZGVmZ2hpanN0dXZ3eHl6g4SFhoeIiYqSk5SVlpeYmZqio6Slpqeoqaqys7S1tre4ubrCw8TFxsfIycrS09TV1tfY2drh4uPk5ebn6Onq8fLz9PX29/j5+v/EAB8BAAMBAQEBAQEBAQEAAAAAAAABAgMEBQYHCAkKC//EALURAAIBAgQEAwQHBQQEAAECdwABAgMRBAUhMQYSQVEHYXETIjKBCBRCkaGxwQkjM1LwFWJy0QoWJDThJfEXGBkaJicoKSo1Njc4OTpDREVGR0hJSlNUVVZXWFlaY2RlZmdoaWpzdHV2d3h5eoKDhIWGh4iJipKTlJWWl5iZmqKjpKWmp6ipqrKztLW2t7i5usLDxMXGx8jJytLT1NXW19jZ2uLj5OXm5+jp6vLz9PX29/j5+v/aAAwDAQACEQMRAD8A/Oez/wCPE1Pa/wCqf6VBp/8Ax4tVi3/1TfSusgwF/wCPpPqf6Vc1hd2nTf7tV7dd10v1NXdYXbps/wDu0AZEq7YLX/cqvef6tPrVi5/49bb/AHRUF799PpTQFmP/AFdx/wBcxUS/8e5+i/1p9r/x7y/h/Wk/5dnpgUpv+Pj8qur/AKpvpVI/8s/rV9ULQudu8Acgdad7BuVbFd1u31q/NH/o8H++K1/Cnw/1/wARQqLPS53Rj8sjxlFH4ivQG/Z71mGzQ3F9p9nKeqtuyfqawlMOXqeXSR/upf8AeFLdLttz/u13utfB/WLKNkgu9N1CRsHbb3Q3gDr8rdevauK1S1e3eaORfLdF2lduCDVRldAZ+k/8eZ/Gluv+QTL+NP0mP/Qz+NJdLt0s/wC9VoBLX/l1/wCuRqOT/jzj/wB5v6U+H/ll/umm3P8Ax5r/AL1MCC//AOPSL6/4Veh/1X/Aapat/wAe8VWl/wCPN/8AdH9aAMux/wCPhvxqH+9/vVNa/wDHx+BqNfvf8CoA07b/AI+P+AVAv+rg/wCu1TW//H8/+5US/wCph/67UAbUn+sb6miopP8AWN9TRQBfsP8Ajxap7f8A1b/Sq+n/APHi/wCFWLf/AFb/AErHUDDh/wCPtf8AeNaGrf8AHjL/ALhrPt/+P6P/AHj/AErQ1j/j1n/3KaAxLj/jxtfpVe8/1ifSrM3/AB4W30qrdf65fpV3sBbg/wCPaX8KjT/VmpIP+PaX8KZF/q2oUwKLf6zn7vU17B8F/Adnr1zFeaq/+iuQIouu8j2744/OvIuPOGevQe2e/wDT8a+rf2WvC9trWhvd3c0cbWxa2ijZsNJ/ESPX74B+grlxFVwg2jtwtP21RQZ6JLo+meHtJEcQ33DfK0PTy1/hwOxPT8at+DfhLqXiS8VbvVJYIcGSby+kfpn/AGu3/Aa0NXbQ/BlxE0mhSa7ckfJawMsa59Mnrn+leyeDfFmj6hoKW0WgS+HrhkylhNtK4PHUdTzmvmq2InH3z6+ngaGkXufIviqc6VfyWLRSxrDcSW0qJ0lwPvP7nNczrHg+w8XaakJhWC88sxx/QgYA9zjH1Irsf2mNOk0PxW11Ivk/bI2kDj7suFI3/XsfoK4HwbpN34guRDYx3d5dud0cNjAZZSQDyoAJzz0FevRrSlBTZ8vVw6hVcYnkc+j3GgS3VhdBhNA20g9Mc4I9j1+mKzdS/wCPD8a9F+J1kV1YXRaUPPEFkjnUiRJEyrBsgEHp8p6V53qa7bE/WvUg+ZXPOmuWViONd3lf7p/pTbmP/Qx/vVJb/wAP/XNv6U24/wBTD9BWhBBqi7YIqtf8ub/7oqrrX3Y6tn/jyb/dFAGPB/rDSH/XN9RSwf6w0jf65vqKAL0X/H1L/uVDb/6m1/66mn2//H1N/uf40lt/x72//XWgC3L/AKx/qaKjm/10n+8f50UAb+m/8eT/AIVP/wAuctVtJ/5B7fWrcf8Ax7vWepZh2/8Ax9L9av6p/wAeMv8AuGqUP/H/APjWjq3/AB4y/wC4aaAwpv8AkH2/0qnef65fpV+b/kH230rPuv8AXj6VYmXIf+POf8P602P/AI9RT7f/AI85/wDgP9aS3/49jQSUePtCk8kMONu4EZ5GPyr3j4K6VrHim60jTfD1lcf2pLlX1JpP3cBJOML7V4TH/wAfkZPQN/XFfUnwl8fRfC/4LaVrugrE3iOfUJVk8zGSDIyqBnp8qqc+1cGL5uX3dz1MDyqs+bY+lPin8BJNW8MWl1o2oy2+pwJHbytuUidgvLKp7+nIFHgv4La3Y6VZT6ldalHHGq5Nx5ID4JzxH8o6+pPIrynSfj/rWoaXfHxdfXPmxr5tu1raqhWcHIk3fxjoPevVvh78XtR8c+G4C90V8mQxyJuBXdwT06HkEj3r5ipTqKMk+p9pSq0ZuNtzD/ae0nT9S+HcszxJPNZsphdlBYMSFPTsc8+wrzP4W+A4PC+mm08SS3OmQ6lCHjt/s7EXBy3lK7j7q/fPPUj2r6J1LxBZW91sucZ2Fjld24AZPHpWHfeNNM8P6bqXiS/1WGK0jtTAlmjbrhUDOxCx9wdwIH+yT2rOjKfslTRvGnTjifbS6Hyr+0tHDY31hpSMGmWPzn+bc23A2bj/AHtuB9AK+f8AVP8Ajxz/AHkz+teh/EvxXN428R3WsywtAtyitEjdRHzsBPchdoJ/DtXn+rLush9a+1oU1TppPdn53jaqr4qpVjs2R267vL/64GluF2ww/SpLeP8Acj/cNOnXa0P+7XQchR1r7sdWj/x5N/uioNc/1MP1P9KnP/Hk3+6KTAx4f9Z+NJJ/rT9RSw/6z8aG/wBafqKSAs2v/H1P/uf40lj/AKu3/wCuhp9v/wAfU3+5/jTbD/Vwf9dDTYDJ/wDXSf7x/nRTbj/Xyf7x/nRUgdTpP/IOb61aX/j3equmf8g4/WrR/wCPKSs9SzFt/wDkJL9au6v/AMe8/wDuVUs13Xsf1NXdcXbZXP8AuUagY8//ACDrb6Vm3n/HwtaU3/IKtPpWbef8fC0agaFt/wAec/4f1pkP/HuKfbf8ec/4f1psP/HtRqBTVN9wB7H+VejeGdT+1eGZLEXL2htr1Ltpo13usbLsYqvc8ivOF/11db4N8SDwf4i03V2hW5itpkaS3fpKm4Er+mfwrOorxZpTlySTPffB/wAPUuZAzeGNY8QbofM+1axJ5UPOSW8tSA2c4w2fbvXqnhC2sfB9nc2unxLZSG4ZzCi7UBKryBgAZ645rmbH4uNqF3a6xa3MphuLcAxhcoqnlCPplh+FSX2qXOq3kt+AqXzxCNFVD+9AOSDjuQP5141WmpaM+mo1rWkjrbq8uLhbieWTKqNzN6df6ZH41S0n4D6x8XFistD0ibVdZuGLSwxKNsERI2b2YhVUDHJPVhjNegfAr4NeI/jdqK6dbGOzsYXH9qaqYiY7cH/lmpP+skK4+XgcZJ7H678WeOPDX7Legw+F/C2mCTWZoxIqStlhxtWadhyScNhRgfeGBiunL8BVxNRUqKu2Z47MIUYNPc/G34yfDvVfhT8RvEfg/WYvJvtHufs5VCTGyFFZHQkDKsjKwOOjd6871GHdY/jX3l8ZvifbfGbxYNB1q0tfEuu6iYba5uI4Av2WFHJUfuyCNm9j+PINdP4R/YU+FN/ct9un8S3kEUhOy6uUjSTHVAY41cIDgdc/Wv0WWR1aUYu9+/kfA/XIW9T86YodsI/65n+lNkj/AH0H+7X2H+01+w/efDmzufFvgeG61Pw2EY3enyN513Y9PnUg5li6/wAO5cc5zkfJP2QyNFIdpO37y4ww9eOPwGQPXOQPHrUJUXZm8KsZ7GJry7Vj+tOb/jzb/dFN8RfwD0anyf8AHm3+6K82R2R2MWH/AFn40kn+tP1FLD/rR9aJv9b+IqC0WbX/AI+p/wDc/wAaLD/Vwf8AXQ0Rfeuv91f606y/49Yf9+goguP9fJ/vH+dFQz/66T/eP86KAOv0z/kHH61Yk/483qGx/wCPGp5P+PFqz1Ax7H/j8j+pq9rP/HvP/uVRs/8Aj4H1rQ1b/jzl/wBw0agY03/INt/92sy6/wBYfoK1rj/kEw/7orMuu30o1A0Lb/kGy/h/Wobf/j3NWbf/AJBkn0H9ahg/49zRqBQX/XVdupBHajO3PX5uvAzx+lVF/wCPpa1re2+1XSIU3gZYqehAB4/E4FVFczSE3bU9L+Den6qug6te29nNfWtrcRK8Ma7m+ZWZ2A9vlzX1h8A/hbefFaYaheXM2neHYnWOS7igJllkzjy17KQOSxz7DuM79jS4fX/hnPaW15HpmqaTdMsyxxRguspMqSHuThiB/uV9aXsfxRfQY9SsLZNS8Oski/vFWG5Xy2y05J+6HzLjHXZXLXpr23vLQ9ChW9nTaXU921vU/Dn7OPwdb+ybGOzsLJPLsrNGy1zcuPkUnrudsMzc4XJzxx+Zvx3+Mdzpq3t1e37X/inWC0jyEcoG4LH0HHyD+FAq9q0fj1+1tqHjvVLW6v4ybbTYlttK0RcAz3bqommdV9F2gE9PMKV8/RfDvW/FV9ceIfG2qDw/bXL+ZJdXxCyzD/YjHQDgAdulffZLh3haLqwVpz/I+YxdZ1Kl5bIzPCvxGv8AwfeG60WGRdTzzfSfxMe9eteCviz4x1C7+06trV/cOBuPlMVRCehyK4HVPHngjwfapZ+G9K/te5ztN5qACq2O4B6isOHx3rPjrVIk1e/aHTUZVFnbgQw7R22jrX0kMR7GSUnds81xcndbH354F+KviPTvs1vqcyXNpcRAqsrFjz/ESa5b9qD9lXwh4w8I3fjLwrax+HfFUSCeWztSqWt8cEklOiOef3idc89q8c+H/ihte8eaTLco9tpFqQrQryuxMYyO+Tj8q9C/aej1fyk1eDXLgWUy/ZjBG20I+AwwPUA104rBUsVFSlGxjTnySPzt8SRvFLAjxtGVJG1xhlOeVI6jB/nRJ/x6yf7orY8b2T3Vy9zK26ZZGLsFwGJxyfU8c1j7t1rIfYf1r8txVOVGrKMvkfU0nzRTMa3/ANb+NLJ/x+xf71EP+tH1pZP+PmP/AHxXEbk1v96++v8AjTrD/j2j/wB+hP8AXX/4f1p+l/6lf+BUAZ8/+uk/3j/Oikk/1jfU0UAdraf8eAp8zbbJqjg/486Wb/jzNZ6gZtm264X61f1r/kHT/wC4azbP/j4X61o6t/x5y/7ho1AyZf8AkE2n+7WZdf6w/QVpzf8AINtv92su8/1v4CjUDUt/+QZJ9B/WoYP+Pc1Pb/8AILk/CoIdosnZuo6UxFNVDXA3btmcHZ1yeldjo9r5cUkE6q0MMfnyr3YAgKrf7xO3/gRrF8MaNJcXb3mNxiXMa/7XYn24NXbm+nWxeQkNHcSBt38RCHBUe2XFehhoO3Mjlry1UT3T9lu38Q3XxQ0qw0N1vL/VUjS900zeT9picu7FJMHy3VUwGAzmXAxmvur9sb9pr+w7SP4W6LbXVtFFbQQahbwsGlmDACCyLc4EoDMxJzsUk4Br86/hT8RLr4Y/FDSNb051S709baTdMhaJY9sTc+o3hQV43Bio5IqX4qfEKXxJNd6qNUvZLvUNSvbySSV0865WV1MRZlJw+wZb5jgtsAASumrQjKrFx26i5/csWda8bad4Jubm7tjDrvjS8YtNdR82dkzE/uo/75AxnpnAyc5B8/1nWLzVy17qd3JeXZ6u3QewHb6cfTucJZPLJGGGeRuGOP8AOafGv2iRf9mve9rJxUInnqO7LljbtdkSN0HSuktZPs8X5Vm2kGwLWt5iwWzluvau2nFQ33Mp6nqfgHxZbaHCb+5zIYExBB/DLMfuB/8AYyMn6CvTPiM19qnwBs7qaaWaVr6S4kaX7xYhck+5OT+NfMegyTapqUEQiaVEO4hegA7mvqLWtWtrr9mOeQSLLH5jIhXqCMZB/SvoMPU9pSfkcdRWkmfI95dLfT73+8y4H45rm9Ss2sBPE3TqPxrQsdQCSMw6A1r6lpEmtaPNJB/rkG5fp3r4vF0Vi4OUfiR7NGp7Oy7nmsP+tH1pW/4/Yv8AepV3faPm6g4P1FJJ/wAfMf8Avivk2nFuMuh6cXzK5PD96++v+NO0/wD49R9TTF/4+L76U6x/1b/7x/kKQyq/3m+tFPf7zfWigDrYP+POkuf+POlj/wCPMUy4/wCPM1nqBnWP+uX61f1j/jzl/wBw1Ssf9ctXNW/485f9w0agZU3/ACCYv90Vm3XVa0pv+QTF/uis266rRqBq2/8AyC5PwpunxGaLYv33OwexPQ/nilg/5Bj/AIVe8Nt5YaQf6zGxfx//AFVtSi5zSJk7I3bO3NpbxWUJ2herHpkcsx9t35nA71X1m4+3/wBmW8gjS1sbcWsCxx7SR5kkxZ/VyZGz6AAdqu2+P7PuZpOtuBF/wJjx/wCOq9UJlluLmG3RJJZ9m/yohl23EjgYPp6flX0CjopdjhlK5vwtBFcvam3M0t15XlOsm0oAiBT785b/AIDWDrTLJflUcFIwEVF6IoAwK6bWru9sY7qyLNb3i+XDFbsVO3MagtkE9N3c/lXG3FjBa3IUz+fI3zM317/zrePvaGUtEI1v5iH2rSsbPbCDTEjTauz8akuJPJt2969CnT5Vc5JSuy/Zsu87uq9KbJHPqV5HEu7aH/gGT0OOPqBWVpcj3FxHEiNI7HasajO4npx3PtXsvhG18P8Aw6A1jWZoLjxJAu+20lBu8t+qvKe2DzjsRXTRiqt2+gm7HWeJLew+FvwM1eysFW31d44Yby5U5kMk3LoT/splfwrjrW+ktf2WvKkbIm1U7c9cdMn8q534na5c3nhrRtL3br7WLp9WnDNlwmTHFu9CT5p+hFdN8ZbSPwj8KvCfh5Pv7Wu5P97pXfKo25SWyiZxjaSXc8GjkdbpJV6Odx/OvX/C2ni8s0ZOdy/MnqK8XuJMSIP7oH8hXoHgfWmtZE2/MOMr614uBqKM5J9Trqx0OR8daGNK8RSNH8sMpO1fQjr/ADrl5F23Kf7617N44s4tYtpcfLM3zInowrx29iaG6If7wdQ31Gc14OY4d0anMtmd+HnzxBf+Pq/+lTaX0f6t/IVXH+svPpUul/8ALT6t/IV5DOsoyf6xvqaKZJ/rG+tFSB6ZZ+FfEF9GptdE1K6XubezkcD68Grb/DLxZcJtTw5qgZuiy2piz9C2K5bVviX4h1xg91q2qXXXAlupCB9B0rn7q+ubggyI7E9361XsW9FINOp6t4T+BfjHxBq721ppUJubeJppbd762WRU4BZsuCAMj86i+KXwh8XfDextovEmjzaf9qTMNx5qSQyqMAsCrHjkVnfARLxfE/iBbdhFNN4d1JBEZCnnr5JLIMdeMtj/AGa5bRdYv4be5xeXhhW0KKrOZIwrYUDb9D07Zrn97nkn0/ruX7vLoQ3iRJpqCN1kZflZk6cVlXXVavyIosw4HzSDcxzwazZvup+NWjM2LWPfYH8B+dakEf2G3t4fQ5/Oq2ixGSMEdfuj6n/9RqxOokuOOkfyj6f5zXs4SlaPMcleeqib2m6sbLSJsW1vOGlwTcLvCcEZ2k4PXup/Dv0fwt8XeKn8ZaVpvh0QFbq6Bltnii8iQkDczLgBQoj3ZxngDvXDtP8AucHbsH3s/l/WvavgN4b8LWPw98ZeM9e1BbG9hjk0nSP3aTgzSW5ZmiifhnAIGf4d3vRipclNsdKPM7Hm3ifUBNPqOtx28lv9ouWeO1uXLyISThnY8lsYye7bj3rkbOTzFeQks5cl2bqT61reJtSgdbeyi2+YmfN8vG0NwNq44AAUDA6YrIu28lgn+zXpUY8kFHscteV5WNTS5PtV0I6Ne3QSLCh5ZtuPWtH4a6RLqV9sj6bSWp1v4dufE/jSDSbYhZJZtrMeiqPvN/wEZb6Ka9WMeeiji6mz4PsovB/h2fxVeRILrcYdJib+KbkNIfaMEMP9rZTfBtpaPpd34i8QSyNpcMrbUBxJeTdSin+E9dzdlJHeqnj7Wo/E3iSDStIymlWarp1ih6soYLu/4E2WP1aszxRdjVtQtNE09vO0/Th9ngP9/JzJL/wNst9MV2K1NJMVrs9C+Eui3fxS+IketalGArsGjiQYjgjXO1EHZQAMVU/aO8UJrXi64hjfclp+4A9MY/wr2/4T+HIfB/gqfUo12v8AZiq/Ug5r5a8XK1xq98z/AHy5Y/iTWuMi6GFUH8UtxUXz1L9jllh3SFvYVteH7nbd4+lZ8dr8lX9Dttt+pr53Dxanod0tjpmvgl4N/MRPzL61x3jjS0j1JLq3+VGcEr6V2t9P+6cegrEWxbVlaLZuTv8AXtXdiqaq03B7mcJcskzgo9rXlwV6nrSaX95/xqaa1ksdUvIJU2uiH8qraf3+g/rXxVRcra7Ht35kmU5P9Y31NFWn+831orIR0jW+5TWbLF5TfWthfumqN3H5mPbNemSdX8C9v/C1NH3SeUvl3W9v9j7LNuFcDpbFdLvcnny1+X0+Yc/jXefCTfZ+KNQvk/5ctE1K4/8AJZ1/9nrgLDeNHvlboIlx+LV5r/iv0X5sqPwItM27Tov93+lZsjBPLY9MkH6H/IrSuP8Ajzj/AN2oNPt2utQsox93zNzf7o5P6ZopR53YTdkb9nam1sUJ69/qf8irF3D5FvCnvn88VZEK3ENqo+9OzSfgCP65qTxA2xFf+6MV9dCHJRPHcrzKUxJJQNgOuCp6Hj8qt33iK5sPCq6VHcxTI8z3Ijj3ZRnCK+c8c+WvT0qqx3WEcoX5sHDenGMVR1eTfebRH5SxRpGV/wBoD5z/AN9E1xvc6OhQhdoWZz9wYx9e9TJ/pBMoXcwU49s8Z/PFQRQPcEqvTvVqEr9ohtl/vDd+YxVxu2kZy2Pp39nzQ7Xw94MlvZtp1bV4JXtoW6pEincw+rfyrzSwhl8LeGfEviCdWS8vHbTrUt0UvzKw/wCA4X/gdd7Hrh8M/ELw5paPtttNs7eyf6lAZP1LVzn7R1xb6VPpeh28uYYle6dPV5GGP/HVFfVT5I4e3WJ50fiPL/D++1Gp6mnyraWzMv8A10kxGv5ZLf8AAa6b4X+HFkvIri5KRoxBy+MKPxrjbzVxpPhk2ECb728uBcSMefLhQNtGO+S5/wC+a5q4jvtSCyXMs0rqNv73qvA4A7dq8GpmEKU07XaO+OH51vY+5PFXijTovh8ljpOq2s94GAaOKQOR9VH4186XXg3VNZ1ohbeRBI5+fyXUH168CvHxo9zJnaeB1qKbSzBtyeTXLiM8WI1lT0Xma08ByJ+8fUumfBvwxZwwt4h8c+H9IB5MNxfKJff5ev8A+utm50P4EeHbcT3fxGW6CjHl6XZzXLH2z90Z/XFfH/k+WQv96i5uPOCW/pmoedctlCmV9TXWVz6G8ReLPgxNG1rpmu+Kol5Ink0iHZ9DiYN+lcivxG8MaDbzQ6TZ3niGckbJbyMW0a9eTtdmPXodvTqK8mW3SE7XqZ1Rdmz15rmnm1aa0ikbRwtOOrNbV/EFz4g1Oaa4S3jYDhLeMKq57Z5LdO7N9ay9J/1j0+P/AI+Z/wDrlTNK/wBYf90f1rw5TnKTcup0pKOkStJ/rG+tFEn+sb60UDOombbiq8zblFTt1pGbapr0jNnUfCX/AI/vF/O3/ilNVGfrDtx+tefWRzpV2cbclDt/Pmu/+GTbh43/AOxXv/8A2nWr+zt8Erz44XGtaXaajZaa1sscvmXsmxXYsQqg+/NebOShOUpbHSoym1GO55sV3WsX0re+G/gfxT8QvF1toPhHTZdU1S5GWhjX5UjBG6SRj8scYyMu2AMjnnn23XP2K/HLeNNO8LaTpKTahMzCW587/QbaNcbppZOiovHuSQBk8H9A/hH8B/D/AOzn8K9V07wvpl/qOvQx+df60k6LLd3EaZzjeCqAjCLyvzD+IsTjSqr4osU6bjpI/LyTw5Na+Lb/AEy4a1ebTpmsZGsizQGSMlX2FuSN2euD7YwTm+MLf7KskfpXpPw20GLWLfVUnvIJvEIZpri0uCVnaQks5wevJJOOMk4rgfHWb6aQoWM0hBaJlx7Y9+lfoPL/ALMnzXPA2qWMPRYZjDb3SputbR1nmOM428jj8K5+aR5pMB9zOSzjOcdD1raulW1t4o/J3S4+c+Xt8v0+uefyrFki2sTnOf4vWvMkklc6VdEslytvCYl6nrV/wrbL/bmnserSr+W5c1lxxbpBXR6HssbhL51U/ZsMpY4Gf/1Z/KtaME5xk+5jNt6I7z4myyWfxI1Bt+z9/lPoOldB8G/gnr/7VnxjsPD9t5kOnQOkusaqFO2yt8HkHgb2AYIpPJ65UNX0V8If2G9T+PVxY+LfF8l5o/hVrSCVI7fENxqLlQGZnkCiKL3UMx4xtIzX2NovgLR/hjo6eFNE0SDwjp8eWb+xptrbyAm53JJmkwUz5vz9DujADNz4/GqLnTj3OijQcmnI8K179i34W2WsJotv4esW1a3s7e3VdUjmEt3tEZz5hUrvfDBiELN5jAZwAfnT4+/s46F8MfDN9LFatbW9xcGNY5naR7aYSy7Ar7FDL5ao3GTh1J4Kk/oF4q1m80nRUtLsQ3UlxJ5kep5YyyHeX2lSWwcEAjJHO7c3WvPfjt4D8NfFbwvrNrDZ2+rC7uft0725WK6WRbdkjKkMis2VT/WZXDMCVIDD56li/ZTtPZnqTpc0fc3Px11aHyG2Fw7D+IdxnIP061nT/wCt/CvWfjj8I7z4easbqOK6fQriRpbKeeFlaH52UQTZA/ergg+4bIU5UeSNGyTM2CFLE4LZwO49jXPNptuOwopx0kNmYRxF3+4o4/3u39ax4pGa63t94nn61Yvp1mkYR/6lfu/1qiOp+tTHcUtzSZt0lOl6J9ajb76/Sn3H3Y/rWxJLB/x/S/8AXI03Tf8Aj8/4DSxf8hL/AIBUel/8fP4tQA2T/WN9TRRJ/rG+pooA6GST5lpZG3R0kqssZ29O9Nk2+Sm3rzmvSM3sdN8PT5ek+O5fTQJo/wDvuWNf60fCH4tH4Sx396ml/wBpy3ZWNR9oMWzbk54U5/8ArUeE5PsvgH4h3HrpsNv/AN93Mf8A8TXDwxo+nxRP/fbH/jtedyqdScZLQ6VKUGpQep9B6f8AtleKdD1aTVNJtFs75XDCR71nBA42/dAx9ePWvSZP+CmniuSzltrrwZ4fZ5IvJnmjmniEvOQzKCFLDqMZHJxXxckSJJ5aJu9atNpqYUum3PSuiFGlT0UdxVMROpJOUj1n4jfGPRviJ4rXXz4Qj8OaowHmNpN+U3SYHzNujODxiuZ1zxB4f8STeTd6XqRdRmRotSRQW/vYMB6/0rkodPhXNW4bO3X7ybj2rshFxg49Gc9ru5sQ2vhQxKRD4hS46ALqsWP/AEnqxDa+HY45HeLXJGGMqupwE9+Tm3rKGniVeIuBToNNRGO+L6UlTXRDN63tfClwoM0fiTD9Hi1O3X9fs9ekfBbX/hT8J/Gtr4k1jwlrHjieHi0tNWv4Wt7aQ8ecUWMeYy9gSAOWwWClfIZrWFNn7qpoYoVB/dVXsb7/AJsD9VPhH/wUA0n4meKLDwnaeCryQmC4njmNw08jSrGZHPlwx7nwqtgcsepbPzV6zqHjbxB4o8WXWq6Lo6OUdLaeDUdzIhLqFGxsAoS3DqSUYMdv+sWvzb/YTVV/aE01opDay/YroRukojcv5TFQjf3jjAHcnHev0G8P+ItJ0yPX0nvbOyluArRyzMUkZnckMjH51Hdhg4Ylu9ebiuWlqjopq7OPvpPENiRpetxXFvBPgRyqEMiurZG07jukVvmBwVYAjaEdlrJ86e+0eeK3T+ytf0Oc3U9+JkCTRlZDGoX5t6nGRleV2rkhiTrePtYt7mDRbKa6Eo3T+bqHmvJbp+8OMhioIzhSpAznHbI8+17xBa3VrBchIWlt/wBzJiND68vwehG3jGQ8Y/5Z4HiVJuSuj0oRXU8m/ak8Lr4i8M3F3b2kIvbhbd2jiRPMYIzF2RmQPlDLtySfld+hBz8B6zdr9ouLdG3r5jAHduxg4wD6cZH1r74+Pnxo0vwVpl5DqjxyeJI1/wBEhtJpA0wYMCWaNwyxqMKWDLkqcZZFx8CaldS6tqd1qEyxpNdyvM6xjChmYkgDPTJ/p2rbDSk1qcuIjFPQqwIm3a/4VZ/sgzLvh6L1qJvkX61tWTbrM13I5GYu11YK/bpUlx92P60Sf69vrT7z/j3X6irJFi/5CX/AKj0v/j6H1arH/L9/wAVBZf8AH1+NUASf6xvrRVxvvH60UAarvtwPWoJF8v5h3BoorvexB02hr5Hwh8bzDrJNp6H/AL/O3/stcPAu7R9v92U/yFFFclP+JP5fki5lm3twzZ9AK0YvSiivQiZEzLupI12zJRRWgIvxttkNXkw1vISORjFFFaxKZSmUy+SpPGSB+n+FW7gASkHq4BooqxI9g/ZSllm+L+mW6NsdklVW+sbLj9R+VfZ3iiVLy3W+lDSuqNJcZODLHuQSDj+JvMDHtuLe1FFfNZn8aPSw2zMP7Lpws7+aWwjmQXUltHH0MaBSPvkFmyhQEHrt56Cvnb9ob40z/DRrrQNOsFbVL+P5LuZvMjhiyhOFPU5UfL90UUV40VzVXc6qn8OJ8d6xrF94h1GS/wBSu5L66nJkaaY5Y5P6D0UcDtUSpxRRXtRSSVjzpEcyfvIf9+tq3T/R5P8AeNFFUjIyZl2zGnSLujH1FFFb9CSZF230f+6ar2//AB/n60UVIFt/vN9aKKKAP//Z", null, "data:image/jpeg;base64,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", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8308622,"math_prob":0.88791394,"size":800,"snap":"2021-21-2021-25","text_gpt3_token_len":149,"char_repetition_ratio":0.18216081,"word_repetition_ratio":0.0,"special_character_ratio":0.145,"punctuation_ratio":0.15044248,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9655674,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-15T02:20:56Z\",\"WARC-Record-ID\":\"<urn:uuid:3063bd19-9407-4f6a-bfb3-e636170573e2>\",\"Content-Length\":\"1049065\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d43c109f-fe28-4058-bd9e-2a0b0d2d2f0f>\",\"WARC-Concurrent-To\":\"<urn:uuid:dadd599b-094e-4ed9-bd21-1d2ef4455aac>\",\"WARC-IP-Address\":\"212.70.64.183\",\"WARC-Target-URI\":\"https://www.journals.elsevier.com/chaos-solitons-and-fractals/editorial-board\",\"WARC-Payload-Digest\":\"sha1:DJNYCVFUZ4PWHAQ42IB76JTM4OXKBCE3\",\"WARC-Block-Digest\":\"sha1:P6XDCSK7DVWUBABQBBWPS2KU2YOA6DL6\",\"WARC-Truncated\":\"length\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243991812.46_warc_CC-MAIN-20210515004936-20210515034936-00280.warc.gz\"}"}
http://m.ruiwen.com/shiti/2247103.html
[ "# 高二数学双曲线复习题的知识点\n\n2019-03-29 试题\n\n一、选择题:", null, "1.在下列双曲线中,渐近线为3x±2y=0,且与曲线x2-y2=0不相交的双曲线是()\n\n(A)=1(B)=1(C)=1(D)=1\n\n2.双曲线3mx2-my2=3的一个焦点是(0,2),则m的值是()\n\nA.1B.-1C.D.-\n\n3.若方程ax2-by2=1、ax2-by2=λ(a>0,b>0,λ>0,λ≠1)分别表示两圆锥曲线\n\nC1、C2,则C1、与C2有相同的()\n\nA.顶点B.焦点C.准线D.离心率\n\n4.过双曲线x2-y2=4上任一点M(x0,y0)作它的一条渐近线的垂线段,垂足为N,O是\n\n坐标原点,则ΔMON的面积是()\n\nA.1B.2C.4D.不确定\n\n5.设双曲线=1(a>0,b>0)的一条准线与两条渐近线相交于A、B两点,相\n\n应的焦点为F,以AB为直径的圆恰过点F,则该双曲线的离心率为()\n\nA.B.C.2D.\n\n6.若直线y=kx+2与双曲线x2-y2=6的右支有两个不同的交点,则k的范围是()\n\nA.(-,)B.(0,)C.(-,0)D.(-,-1)\n\n7.已知平面内有一定线段AB,其长度为4,动点P满足|PA|-|PB|=3,O为AB的中点,则|PO|\n\n的最小值为()\n\nA.1B.C.2D.3\n\n8.以椭圆+=1的右焦点为圆心,且与双曲线-=1的渐近线相切的圆的方程为()\n\nA.x2+y2-10x+9=0B.x2+y2-10x-9=0C.x2+y2+10x-9=0D.x2+y2+10x+9=0\n\n9.与双曲线=1有共同的渐近线,且经过点A(-3,3)的双曲线的一个焦点到一条渐近线的距离是()\n\nA.8B.4C.2D.1\n\n10.已知两点M(0,1)、N(10,1),给出下列直线方程:①5x-3y-22=0;②5x-3y-52=0;③x-y-4=0;④4x-y-14=0在直线上存在点P满足|MP|=|NP|+6的所有直线方程是()\n\nA.①②③B.②④C.①③D.②③\n\n二、填空题:\n\n11.已知点P在双曲线-=1上,并且P到这条双曲线的右准线的距离恰是P到这条双曲线的两个焦点的距离的等差中项,那么P的横坐标是.\n\n12.渐近线方程是4x,准线方程是5y的双曲线方程是.\n\n13.过双曲线的一个焦点的直线交这条双曲线于A(x1,7-a),B(x2,3+a)两点,则=_____\n\n14.设F1、F2是双曲线x2-y2=4的两焦点,Q是双曲线上任意一点,从F1引∠F1QF2平分线的垂线,垂足为P,则点P的轨迹方程是.\n\n三、解答题:\n\n15.(本小题满分12分)\n\n直线y=kx+1与双曲线3x2-y2=1相交于不同二点A、B.\n\n(1)求k的取值范围;\n\n(2)若以AB为直径的圆经过坐标原点,求该圆的半径.\n\n16.(本小题满分12分)\n\n已知圆(x+4)+y=25圆心为M,(x-4)+y=1的圆心为M,一动圆与这两个圆都外切.\n\n(1)求动圆圆心的轨迹方程;\n\n(2)若过点M的直线与(1)中所求轨迹有两个交点A、B,求|MA|・|MB|取值范围.\n\n17.(本小题满分12分)\n\nA、B、C三点是我方三个炮兵阵地,A在B的正东,距B6千米;C在B的北偏西300,距B4千米;P点为敌炮阵地,某时刻A发现敌炮阵地的某种信号,而4秒后,B、C才同时发现这一信号(已知该种信号传播速度为1千米/秒),若A炮击P地,求炮击的方位角和炮击距离.\n\n[试题]相关推荐" ]
[ null, "http://pic.ruiwen.com/allimg/copyright/lanmu/lm3927.jpg", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.632047,"math_prob":0.99887866,"size":1371,"snap":"2019-35-2019-39","text_gpt3_token_len":1388,"char_repetition_ratio":0.08046818,"word_repetition_ratio":0.0,"special_character_ratio":0.40700218,"punctuation_ratio":0.31421447,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97124094,"pos_list":[0,1,2],"im_url_duplicate_count":[null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-15T18:20:16Z\",\"WARC-Record-ID\":\"<urn:uuid:2b603166-1929-43c2-9e34-7e525326f464>\",\"Content-Length\":\"6496\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:55dc307f-e578-48b8-829d-9ec83ac95fb9>\",\"WARC-Concurrent-To\":\"<urn:uuid:48fa11ad-49a1-4610-b8f7-b1fcda9c2604>\",\"WARC-IP-Address\":\"175.6.235.225\",\"WARC-Target-URI\":\"http://m.ruiwen.com/shiti/2247103.html\",\"WARC-Payload-Digest\":\"sha1:GGKZ7EZX6O6KZKOJKZRP72FXKZ7RHIZW\",\"WARC-Block-Digest\":\"sha1:NNSSMU3HVAWRJZVGLQ6IBKGE3VBRPI3F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514572235.63_warc_CC-MAIN-20190915175150-20190915201150-00174.warc.gz\"}"}
https://gogeometry.blogspot.com/2010/08/problem-491-square-right-triangle.html?showComment=1281135184464
[ "## Wednesday, August 4, 2010\n\n### Problem 491: Square, Right Triangle, Incircle, Inscribed Circle, Radius\n\nGeometry Problem\nClick the figure below to see the complete problem 491 about Square, Right Triangle, Incircle, Inscribed Circle, Radius.", null, "See also:\nComplete Problem 491\n\nLevel: High School, SAT Prep, College geometry\n\n#### 5 comments:\n\n1.", null, "In ▲AHD\n1) x = (a+b-c)/2 => AE = a/2 - x\n2) from pythagore theorem\nx = (-a + a√3)/4\n\n2.", null, "Let the tangent from A to the nearest circle=z. We can now write the following equations immediately: 2z + 2r = a -----(1) and a^2=(z+3r)^2+(z+r)^2 -----(2) from which z can be eliminated to obtain: r=a(√3-1)/4\nAjit\n\n3.", null, "I'm missing something.... how do you get the 2z + 2r = a equation from?\n\n4.", null, "In any right angled triangle such as ABE, we've: AE+BE-AB=2*(In-radius) and hence in our notation: (z+r)+(z+3r)-a=2r or a=2z+2r.\nAjit\n\n1.", null, "How was BE found to be z+3r?" ]
[ null, "https://lh6.googleusercontent.com/proxy/zqxK8stghZPutnA6_O0QPLQstRQHceF7oTt6881N5XaYfd-4Qmkqxe7bw_LX3DmnAecbiseg72LRa_QSF5mm3u-REsNquci7tcI=s0-d", null, "https://resources.blogblog.com/img/blank.gif", null, "https://lh3.googleusercontent.com/zFdxGE77vvD2w5xHy6jkVuElKv-U9_9qLkRYK8OnbDeJPtjSZ82UPq5w6hJ-SA=s35", null, "https://resources.blogblog.com/img/blank.gif", null, "https://lh3.googleusercontent.com/zFdxGE77vvD2w5xHy6jkVuElKv-U9_9qLkRYK8OnbDeJPtjSZ82UPq5w6hJ-SA=s35", null, "https://resources.blogblog.com/img/blank.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84593993,"math_prob":0.99218816,"size":951,"snap":"2019-35-2019-39","text_gpt3_token_len":305,"char_repetition_ratio":0.11298838,"word_repetition_ratio":0.040816326,"special_character_ratio":0.3144059,"punctuation_ratio":0.14851485,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995734,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,2,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-21T18:46:15Z\",\"WARC-Record-ID\":\"<urn:uuid:df7e950c-20cf-4c3b-9564-96ec4d65e13e>\",\"Content-Length\":\"58322\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:15323333-d394-4a15-8085-b9387050f718>\",\"WARC-Concurrent-To\":\"<urn:uuid:8bf907de-8158-42f9-b897-b4d96163a6e3>\",\"WARC-IP-Address\":\"172.217.12.225\",\"WARC-Target-URI\":\"https://gogeometry.blogspot.com/2010/08/problem-491-square-right-triangle.html?showComment=1281135184464\",\"WARC-Payload-Digest\":\"sha1:PG4GJUXHS66J3OA63C72QZEJZ73WSMRE\",\"WARC-Block-Digest\":\"sha1:KO7PKX2EYHWLMIGLRR264VYNOUVUICGS\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027316150.53_warc_CC-MAIN-20190821174152-20190821200152-00108.warc.gz\"}"}
http://atlas.dr-mikes-maths.com/atlas/1344/8561/d10.html
[ "Questions?\nSee the FAQ\nor other info.\n\n# Polytope of Type {8,2,3,2,7}\n\nAtlas Canonical Name : {8,2,3,2,7}*1344\nif this polytope has a name.\nGroup : SmallGroup(1344,8561)\nRank : 6\nSchlafli Type : {8,2,3,2,7}\nNumber of vertices, edges, etc : 8, 8, 3, 3, 7, 7\nOrder of s0s1s2s3s4s5 : 168\nOrder of s0s1s2s3s4s5s4s3s2s1 : 2\nSpecial Properties :\nDegenerate\nUniversal\nOrientable\nFlat\nRelated Polytopes :\nFacet\nVertex Figure\nDual\nFacet Of :\nNone in this Atlas\nVertex Figure Of :\nNone in this Atlas\nQuotients (Maximal Quotients in Boldface) :\n2-fold quotients : {4,2,3,2,7}*672\n4-fold quotients : {2,2,3,2,7}*336\nCovers (Minimal Covers in Boldface) :\nNone in this atlas.\nPermutation Representation (GAP) :\n```s0 := (2,3)(4,5)(6,7);;\ns1 := (1,2)(3,4)(5,6)(7,8);;\ns2 := (10,11);;\ns3 := ( 9,10);;\ns4 := (13,14)(15,16)(17,18);;\ns5 := (12,13)(14,15)(16,17);;\npoly := Group([s0,s1,s2,s3,s4,s5]);;\n\n```\nFinitely Presented Group Representation (GAP) :\n```F := FreeGroup(\"s0\",\"s1\",\"s2\",\"s3\",\"s4\",\"s5\");;\ns0 := F.1;; s1 := F.2;; s2 := F.3;; s3 := F.4;; s4 := F.5;; s5 := F.6;;\nrels := [ s0*s0, s1*s1, s2*s2, s3*s3, s4*s4, s5*s5,\ns0*s2*s0*s2, s1*s2*s1*s2, s0*s3*s0*s3,\ns1*s3*s1*s3, s0*s4*s0*s4, s1*s4*s1*s4,\ns2*s4*s2*s4, s3*s4*s3*s4, s0*s5*s0*s5,\ns1*s5*s1*s5, s2*s5*s2*s5, s3*s5*s3*s5,\ns2*s3*s2*s3*s2*s3, s4*s5*s4*s5*s4*s5*s4*s5*s4*s5*s4*s5*s4*s5,\ns0*s1*s0*s1*s0*s1*s0*s1*s0*s1*s0*s1*s0*s1*s0*s1 ];;\npoly := F / rels;;\n\n```\nPermutation Representation (Magma) :\n```s0 := Sym(18)!(2,3)(4,5)(6,7);\ns1 := Sym(18)!(1,2)(3,4)(5,6)(7,8);\ns2 := Sym(18)!(10,11);\ns3 := Sym(18)!( 9,10);\ns4 := Sym(18)!(13,14)(15,16)(17,18);\ns5 := Sym(18)!(12,13)(14,15)(16,17);\npoly := sub<Sym(18)|s0,s1,s2,s3,s4,s5>;\n\n```\nFinitely Presented Group Representation (Magma) :\n```poly<s0,s1,s2,s3,s4,s5> := Group< s0,s1,s2,s3,s4,s5 | s0*s0, s1*s1, s2*s2,\ns3*s3, s4*s4, s5*s5, s0*s2*s0*s2, s1*s2*s1*s2,\ns0*s3*s0*s3, s1*s3*s1*s3, s0*s4*s0*s4,\ns1*s4*s1*s4, s2*s4*s2*s4, s3*s4*s3*s4,\ns0*s5*s0*s5, s1*s5*s1*s5, s2*s5*s2*s5,\ns3*s5*s3*s5, s2*s3*s2*s3*s2*s3, s4*s5*s4*s5*s4*s5*s4*s5*s4*s5*s4*s5*s4*s5,\ns0*s1*s0*s1*s0*s1*s0*s1*s0*s1*s0*s1*s0*s1*s0*s1 >;\n\n```\n\nto this polytope" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.68231815,"math_prob":0.99681497,"size":683,"snap":"2020-10-2020-16","text_gpt3_token_len":248,"char_repetition_ratio":0.11929308,"word_repetition_ratio":0.037383176,"special_character_ratio":0.35139093,"punctuation_ratio":0.2625,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95174754,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-25T02:08:40Z\",\"WARC-Record-ID\":\"<urn:uuid:5e76b663-33e2-473d-adf7-01540782d6ee>\",\"Content-Length\":\"5296\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6a760202-4aaf-4c20-8658-b6725f500325>\",\"WARC-Concurrent-To\":\"<urn:uuid:90ecc020-1f2d-4b83-81f3-d0ae4463e9c4>\",\"WARC-IP-Address\":\"209.135.140.237\",\"WARC-Target-URI\":\"http://atlas.dr-mikes-maths.com/atlas/1344/8561/d10.html\",\"WARC-Payload-Digest\":\"sha1:NGGNAEYRQQXZGYKNIF7XY7TK2VOZS267\",\"WARC-Block-Digest\":\"sha1:PTNAL7BBUBG7MXJAAGHXN54HAW7VFPBB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146004.9_warc_CC-MAIN-20200225014941-20200225044941-00544.warc.gz\"}"}
https://boyoon-c.github.io/tags/reshape/
[ "May 3, 2023 · 1 min · 114 words · Me\n\n## reshape and permutedims\n\nThe elements in the reshaped matrix will always be orderded column-wise. For example, consider the following code: using LinearAlgra C = [1,2,3,4,5,6] reshape(C, (2,3)) Output: 2×3 Matrix{Int64}: 1 3 5 2 4 6 Notice that number 2 is placed in the first column of the second row, instead of the second column of the first row. Suppose that we want to create a 2-by-3 matrix where the first row is initially filled and the second row is filled afterwards....\n\nMay 2, 2023 · 1 min · 181 words · Me\n\n## SymPy.jl\n\nSymPy.jl When functions are linear in parameters, we can decompose a matrix of polynomials into a matrix of coefficients and a matrix of variables. To achieve this, we can use the SymPy package. First we need to ensure that Julia recognizes variables and treats them as symbols. using SymPy x, y = symbols(\"x, y\") Then we can simply invoke thecoeff() method to extract coefficients from the polynomials. p = x + 0....\n\nApril 16, 2023 · 1 min · 200 words · Me" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86758655,"math_prob":0.97751814,"size":437,"snap":"2023-40-2023-50","text_gpt3_token_len":103,"char_repetition_ratio":0.19861431,"word_repetition_ratio":0.0,"special_character_ratio":0.23569794,"punctuation_ratio":0.16842106,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9905913,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-01T12:31:10Z\",\"WARC-Record-ID\":\"<urn:uuid:1142b796-63fc-4444-b4c2-6082987bf9e1>\",\"Content-Length\":\"10941\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:115691a6-2d10-4f5e-8a88-8720a318da53>\",\"WARC-Concurrent-To\":\"<urn:uuid:5069e303-20de-4032-ac2c-34058557ff4f>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://boyoon-c.github.io/tags/reshape/\",\"WARC-Payload-Digest\":\"sha1:EZNKOJACEBJADYVUVQSEMFVP4CAAMJ2Q\",\"WARC-Block-Digest\":\"sha1:53S3CLNAPMNH7JHMTLXLKOZPBADTD6S7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100287.49_warc_CC-MAIN-20231201120231-20231201150231-00179.warc.gz\"}"}
https://math.stackexchange.com/questions/1857315/when-d-mid-n-the-number-of-elements-of-order-d-in-a-cyclic-subgroup-of-ord
[ "# When $d \\mid n$, the number of elements of order $d$ in a cyclic subgroup of order $n$ is $\\phi (d)$\n\nIf $d$ is a positive divisor of $n$, the number of elements of order $d$ in a cyclic subgroup of order $n$ is $\\phi (d)$=the number of positive natural numbers less than $d$ which are coprime to $d$.\n\nThe question I have concerns a part of the proof:\n\nIf $d | n$ then there exists exactly one subgroup of order $d$ -- call it $\\langle a \\rangle$. Then every element of order $d$ also generates the subgroup $\\langle a \\rangle$ and an element $a^k$ generates $\\langle a \\rangle$ iff $gcd(k,d) = 1$ implies that the number of such elements is precisely $\\phi (d)$.\n\nHow does every element of order $d$ also generate the subgroup $\\langle a \\rangle$, wouldn't it be only one $a$ since $|\\langle a \\rangle| = |a|$? And how does this fact imply $\\phi(d)$ is the correct number?\n\nConsider $\\mathbb{Z}_5$. Under addition we have $$\\mathbb{Z}_5=\\langle 1 \\rangle=\\langle 2 \\rangle=\\langle 3 \\rangle=\\langle 4 \\rangle$$\n\nA cyclic group has at least one generator, but if it is finite, then it will have exactly $\\phi (n)$ total, where $G$ is your cyclic group and $n=\\left| G \\right|$. So equivalently, you could define the finite cyclic group of order $n$ as the group with exactly $\\phi(n)$ generators, but it would need to be proven that this is equivalent to being generated by a single element.\n\n• But why does every element of order $d$ generate the subgroup $\\langle a \\rangle$? I know that $|\\langle a \\rangle | = |a| = d$, but doesn't this imply that only one element generates $\\langle a \\rangle$? – Oliver G Jul 12 '16 at 18:12\n• No, $|\\langle a \\rangle |=|a|=d$ just implies that it is generated by at least one element; namely $a$. If $|b|=d$ for $b \\in \\langle a \\rangle$, where $|\\langle a \\rangle |=d$, then $b$ must generate all the elements of $\\langle a \\rangle$, because $\\langle a \\rangle$ only has $d$ elements. If $\\langle b \\rangle$ generates exactly $d$ elements, then it must generate all the elements. Remember $b^r \\in \\langle a \\rangle$ – JasonM Jul 12 '16 at 18:21\n\nAn element of order d generated a subgroup of order d which is $<a>$ since $<a>$ is unique.\n\nA subgroup of order $d$ is isomorphic to $Z/d$ if $[n]$ generates $Z/d$, $=m[n]$ this is equivalent to saying $1=mn+cd$, thus $gcd(d,n)=1$. Thus there exists $\\phi(d)$ generators.\n\n• So $a$ generated the subgroup $\\langle a \\rangle$, therefore there is only one element whose order is $d$? – Oliver G Jul 12 '16 at 17:35\n• I suppose you have understood that there is only one subgroup of order d – Tsemo Aristide Jul 12 '16 at 17:36\n• A subgroup of $Z/n$ of order $d$ is generated by $[n/d]$. – Tsemo Aristide Jul 12 '16 at 17:39\n• But the proposition is saying that the number of elements of order $d$ is $\\phi (d)$, which isn't always $1$, so how can there be only one element that has order $d$ that generates $\\langle a \\rangle$? – Oliver G Jul 12 '16 at 17:39" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8272703,"math_prob":0.9999399,"size":769,"snap":"2020-10-2020-16","text_gpt3_token_len":209,"char_repetition_ratio":0.15294118,"word_repetition_ratio":0.029411765,"special_character_ratio":0.2912874,"punctuation_ratio":0.06,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000066,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-09T17:25:50Z\",\"WARC-Record-ID\":\"<urn:uuid:7ab332d5-ac71-4fbd-ae49-eef385fa2413>\",\"Content-Length\":\"156732\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f9b282cd-7762-488c-a6e8-0e44630c26c2>\",\"WARC-Concurrent-To\":\"<urn:uuid:cd915675-aa10-469f-b449-1451c4c64dad>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/1857315/when-d-mid-n-the-number-of-elements-of-order-d-in-a-cyclic-subgroup-of-ord\",\"WARC-Payload-Digest\":\"sha1:XTELSS2LQ7F4BIH2SWR6PHO3ZBER6V2K\",\"WARC-Block-Digest\":\"sha1:HJ632WFLA3KZ52LCBLPG4EGKSHWF6NP6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371861991.79_warc_CC-MAIN-20200409154025-20200409184525-00333.warc.gz\"}"}
https://vknight.org/MSc_week_0/
[ "The content of those slides is listed here:\n\n• Algebra:\n\n• Numbers\n• Exponents\n• Inequalities\n• Graphs\n• Linear Equations\n• Complex Numbers\n• Systems of Equations\n• Induction\n\n• Calculus:\n\n• Functions\n• Differentiation\n• Integration\n\n• Probability\n\nThroughout the year if any student has a problem the Cardiff University Math Support Service is a great place to find resources and/or help." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.81831765,"math_prob":0.88169754,"size":545,"snap":"2019-43-2019-47","text_gpt3_token_len":128,"char_repetition_ratio":0.11275416,"word_repetition_ratio":0.0,"special_character_ratio":0.21284404,"punctuation_ratio":0.07058824,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9820103,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-20T00:20:37Z\",\"WARC-Record-ID\":\"<urn:uuid:7bf64239-2f3a-45d3-93cf-1385336e9049>\",\"Content-Length\":\"11084\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f840dcc0-bf18-4195-be9a-f2b1480f5c50>\",\"WARC-Concurrent-To\":\"<urn:uuid:2d606141-315e-4b85-9702-0004d729b2d8>\",\"WARC-IP-Address\":\"104.24.108.114\",\"WARC-Target-URI\":\"https://vknight.org/MSc_week_0/\",\"WARC-Payload-Digest\":\"sha1:OFATWB3F5FKUAELO2AXRGZYR2XQ7SF45\",\"WARC-Block-Digest\":\"sha1:TQNJZJQS33PJTUWZWHMJMX46TGSB7TXX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986700560.62_warc_CC-MAIN-20191020001515-20191020025015-00082.warc.gz\"}"}
https://cstheory.stackexchange.com/questions/36669/generate-a-graph-with-fixed-min-cut/36675
[ "# generate a graph with fixed min cut\n\nIs there a constructive way to generate a graph with a fixed min cut equal to $k$? One approach is to generate a random graph and then try to make edges alterations (additions, deletions, swaps) to get the desired min cut -- but I am wondering if there is a more systematic procedure?\n\nIdeally I would want to generate a random instance of a graph with min-cut=$k$, and I would want it to be bipartite, but insight on any part of this question would be helpful!\n\nThanks in advance!\n\n• Do you care about structure/the graph being different each time? Because you can just make the complete graph on $k$ vertices. Or if you want it bipartite, make the complete bipartite graph $K_{k,k}$. – Ryan Sep 27 '16 at 20:26\n• Yes I'd like it to be different each time, even sparse if possible. A deterministic approach that, for example, gives the same degree sequence each time would be okay as a starting point ... but not the complete graph :) – user1798883 Sep 27 '16 at 22:00\n\n## 1 Answer\n\nIn his 1962 paper \"The Maximum Connectivity of a Graph\", Harary describes a way to construct for integers $p$ and $q$ with $q\\ge p-1$ a way to construct a graph with $p$ vertices and $q$ edges that is $k=\\lfloor 2q/p\\rfloor$-connected. Roughly, the idea is to give indices from $0$ to $p-1$ to the $p$ vertices and then add edges between vertices whose indices (modulo $p$) differ by at most $k/2$ (the exact construction depends on whether or not $2q/p$ is an integer).\n\nOne could start with these graphs and then perturb them by adding and removing edges without changing the connectivity. The graphs will not be bipartite, however.\n\nAnother easy way of creating random graphs with a certain edge-connectivity value is to exploit those cases in which edge-connectivity and minimum degree are identical since creating random graphs with a fixed minimum degree is much easier. Such conditions, also for bipartite graphs, are discussed for example in the paper On equality of edge-connectivity and minimum degree of a graph by Plesník and Znám.\n\n• This is fantastic, thank you! Although the Harary paper is not for bipartite graphs, it's a great starting point. The reference to the relationship between min degree and edge-connectivity is extremely useful. In fact, from sampling experiments the equality between the two seems to be quite common -- as least in the bipartite instances I've tried -- so it'll be great to look at this literature. – user1798883 Sep 28 '16 at 18:38" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92868257,"math_prob":0.98598695,"size":1041,"snap":"2021-21-2021-25","text_gpt3_token_len":252,"char_repetition_ratio":0.12729026,"word_repetition_ratio":0.011904762,"special_character_ratio":0.22574447,"punctuation_ratio":0.056410257,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99469733,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-13T18:04:04Z\",\"WARC-Record-ID\":\"<urn:uuid:3693238e-5b88-4f66-88d9-6e7cda7a0bed>\",\"Content-Length\":\"162898\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:be5ed239-e23f-4d2b-9a63-9f11ea1a9879>\",\"WARC-Concurrent-To\":\"<urn:uuid:96d7d3f6-671b-417a-bd2c-35521bfa2f54>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://cstheory.stackexchange.com/questions/36669/generate-a-graph-with-fixed-min-cut/36675\",\"WARC-Payload-Digest\":\"sha1:HKQFQDIPR5HXASDXKDPAQGUULMJ3TWDM\",\"WARC-Block-Digest\":\"sha1:OP7QZR7TEEN3IQYOCYW3YMVMIHSSDWX6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487610196.46_warc_CC-MAIN-20210613161945-20210613191945-00535.warc.gz\"}"}
https://www.arxiv-vanity.com/papers/astro-ph/0608562/
[ "astro-ph/0608562\n\nCERN–PH–TH/2006-168, UMN–TH–2516/06, FTPI–MINN–06/29\n\nBound-State Effects on Light-Element Abundances in Gravitino Dark Matter Scenarios\n\nRichard H. Cyburt, John Ellis, Brian D. Fields,\n\nKeith A. Olive, and Vassilis C. Spanos TRIUMF, Vancouver, BC V6T 2A3 Canada\n\nTH Division, PH Department, CERN, 1211 Geneva 23, Switzerland\n\nDepartments of Astronomy and of Physics, University of Illinois, Urbana, IL 61801, USA\n\nWilliam I. Fine Theoretical Physics Institute,\n\nUniversity of Minnesota, Minneapolis, MN 55455, USA\n\nAbstract\n\nIf the gravitino is the lightest supersymmetric particle and the long-lived next-to-lightest sparticle (NSP) is the stau, the charged partner of the tau lepton, it may be metastable and form bound states with several nuclei. These bound states may affect the cosmological abundances of Li and Li by enhancing nuclear rates that would otherwise be strongly suppressed. We consider the effects of these enhanced rates on the final abundances produced in Big-Bang nucleosynthesis (BBN), including injections of both electromagnetic and hadronic energy during and after BBN. We calculate the dominant two- and three-body decays of both neutralino and stau NSPs, and model the electromagnetic and hadronic decay products using the PYTHIA event generator and a cascade equation. Generically, the introduction of bound states drives light element abundances further from their observed values; however, for small regions of parameter space bound state effects can bring lithium abundances in particular in better accord with observations. We show that in regions where the stau is the NSP with a lifetime longer than  s, the abundances of Li and Li are far in excess of those allowed by observations. For shorter lifetimes of order  s, we comment on the possibility in minimal supersymmetric and supergravity models that stau decays could reduce the Li abundance from standard BBN values while at the same time enhancing the Li abundance.\n\nCERN–PH–TH/2006-168\n\nAugust 2006\n\n## 1 Introduction\n\nThe abundances of the light nuclei produced by primordial Big-Bang nucleosynthesis (BBN) provide some of the most stringent constraints on the decays of unstable massive particles during the early Universe [1, 2, 3, 4, 5, 6, 7, 8, 9]. This is because the astrophysical determinations of the abundances of deuterium (D) and He agree well with those predicted by homogeneous BBN calculations, and also the baryon-to-photon ratio needed for the success of these calculations [10, 11] agrees very well with that inferred  from observations of the power spectrum of fluctuations in the cosmic microwave background (CMB). The value of that they indicate  is now quite precise, reducing one of the principal uncertainties in the previous BBN calculations.\n\nHowever, it is still difficult to reconcile the BBN predictions for the lithium isotope abundances with observational indications on the primordial abundances. The discovery of the “Spite” plateau , which demonstrates a near-independence of the Li abundance from the metallicity in Population-II stars, suggests a primordial abundance in the range  , whereas standard BBN with the CMB value of would predict  [10, 11]. In the case of Li, the data lie a factor above the BBN predictions , and fail to exhibit the dependence on metallicity expected in models based on nucleosynthesis by Galactic cosmic rays . On the other hand, the Li abundance may be explained by pre-Galactic Population-III stars, without additional over-production of Li .\n\nThe concordance between BBN predictions and the observed abundances of D and He is relatively fragile and could have been upset by decays of massive unstable particles. Electromagnetic and hadronic showers produced in decays occurring during or shortly after BBN induce new reactions which may either create or destroy light nuclides. Concrete examples of unstable but long-lived particles are found in supersymmetric theories. In particular, models based on the constrained version of the minimal -parity conserving supersymmetric standard model (CMSSM) with a gravitino as the lightest supersymmetric particle (LSP) have been considered in this context [20, 21, 22, 23, 24, 25]. In these models with a gravitino LSP, the next-to-lightest supersymmetric particle (NSP) may be either the lightest neutralino or the lighter stau , and the decay lifetime of the NSP can range from seconds to years depending on the specific model and gravitino mass. Our previous results concentrated on relatively long lifetimes ( s), and the effects of the electromagnetic showers on the light-element abundances [4, 21, 22, 23].\n\nThe effects of hadronic injections due to late decays of the NSP during BBN have also been studied extensively by other authors [3, 6, 7, 26, 27, 28]. In particular, it has been shown for relatively short lifetimes of order  s that decays may simultaneously increase the Li abundance and decrease the Li abundance [26, 27]. On the other hand, it has been shown  that purely electromagnetic showers cannot reduce the Li abundance sufficiently without also overproducing D relative to He . In  the authors have calculated the principal three-body decays of a stau NSP and, using the results of the analysis  have explored regions where the Li puzzle can be solved in an unconstrained supersymmetric model. The authors of  used the PYTHIA  model for annihilation to hadrons in order to simulate the hadronic decays of the unstable particle. An analogous simulation was used in , both to locate regions in the parameter space of the CMSSM which are compatible with the BBN constraints, and to solve the lithium problem .\n\nIt has recently been pointed out that, if it has electric charge, the NSP forms bound states with several nuclei . Due to the large NSP mass (), the Bohr radii of these bound states are of order the nuclear size. Consequently, nuclear reactions with nuclei in bound states are catalyzed, due to partial screening of the Coulomb barrier, and due to the opening of virtual photon channels in radiative capture reactions. Ref.  used analytic approximations to argue that the reaction is enhanced by an enormous factor , leading to Li production far beyond tolerable levels over large regions of parameter space. Other effects of bound states were considered in [32, 33].\n\nHere, we present results from a new BBN code that includes the nuclear reactions induced by hadronic and electromagnetic showers generated by late gravitational decays of the NSP, together with the familiar network of nuclear reactions used to calculate the primordial abundances of the light elements Deuterium (D), He, He and Li. In addition, we include the effects of the bound states when the decaying particle is charged. As claimed in , these bound states lead to large enhancements in otherwise heavily suppressed rates. We calculate the abundances of the various bound states and include both the Coulomb enhancement as well as virtual photon effects in radiative capture reactions.\n\nWe use as frameworks for this study both the CMSSM and mSUGRA models , where the NSP could be either the lighter stau or the lightest neutralino. We have calculated the dominant two- and three-body gravitational decays of these sparticles and use the PYTHIA Monte Carlo event generator and a cascade equation to model the resulting electromagnetic (EM) and hadronic (HD) spectra for each point of the parameter space of the supersymmetric model. The resulting accurate determinations of the abundances of the light elements, as altered by these late injections and the bound-state effects, enable us to delineate regions of the parameter space of the supersymmetric models which are compatible with the BBN constraints. In addition, we look for regions where the Li and Li puzzles can be solved in the context of these supersymmetric models. We find that for lifetimes  s, the enhanced rates of Li and Li production, exclude gravitino dark matter (GDM) with a stau NSP. At smaller lifetimes, we see that it is the Li destruction rates which are enhanced, facilitating a solution to the Li problems.\n\n## 2 Electromagnetic and Hadronic NSP Decays\n\nThe CMSSM is determined by four real parameters, namely the soft supersymmetry-breaking scalar mass , the gaugino mass , the trilinear coupling (each taken to be universal at the Grand Unification scale), the ratio of Higgs vevs , and the sign of the parameter. Here, for simplicity, we restrict our attention to and . The mass of the gravitino is also a free parameter in the CMSSM, and if is chosen to be less than the resultant model has GDM. In mSUGRA models , is no longer a free parameter, nor is the gravitino mass which is now equal to at the Grand Unification scale. GDM is a inevitable consequence in mSUGRA models when is relatively small. In this case, the NSP is typically the stau, but it may also be the neutralino if . The abundances of light elements provide some of the most important constraints on this gravitino LSP scenario [20, 21, 22, 23, 24, 25]. They also impose important constraints on the neutralino LSP scenario, since a gravitino NSP would also decay slowly. Here, however, we restrict our attention to GDM scenarios with either a stau or neutralino NSP.\n\nIn order to estimate the lifetime of the NSP, as well as the various branching ratios and the resulting EM and HD spectra, one must calculate the partial widths of the dominant relevant decay channels of the NSP 111Analytical results for all of the relevant partial widths will be presented elsewhere .. The decay products that yield EM energy obviously include directly-produced photons, and also indirectly-produced photons, charged leptons (electrons and muons) which are produced via the secondary decays of gauge and Higgs bosons, as well as neutral pions (). Hadrons (nucleons and mesons such as the , and ) are usually produced through the secondary decays of gauge and Higgs bosons, as well (for the mesons) as via the decays of the heavy lepton. It is important to note that mesons decay before interacting with the hadronic background [3, 20]. Hence they are irrelevant to the BBN processes and to our analysis, except via their decays into photons and charged leptons. Therefore, the HD injections on which we focus our attention are those that produce nucleons, namely the decays via gauge and Higgs bosons and quark-antiquark pairs.\n\nFor the neutralino NSP , we include the two-body decay channels and , where and . These are the dominant gravitational decays of , whose analytical expressions have been presented in . In addition, we include here the dominant three-body decays , , and the corresponding interference terms. In general, the two-body channel dominates the NSP decays and yields the bulk of the injected EM energy. When the is heavy enough to produce a real boson, the next most important channel is , which is also the dominant channel for producing HD injections in this case. The Higgs boson channels are smaller by a few orders of magnitude, and those to heavy Higgs bosons () in particular become kinematically accessible only for heavy in the large- region. Turning to the three-body channels, the decay through the virtual photon to a pair can become comparable to the subdominant channel , injecting nucleons even in the kinematical region , where direct on-shell -boson production is not possible 222In principle, one should also include pair production through the virtual -boson channel   and the corresponding interference term. However, this process is suppressed by a factor of with respect to , and the interference term is also suppressed by . Numerically, these contributions are unimportant, and therefore we drop these amplitudes in our calculation.. Finally, we note that the three-body decays to pairs and a gravitino are usually at least five orders of magnitude smaller.\n\nFor general orientation, we present in Fig. 1 contours (in seconds) for the supersymmetric models discussed later and presented in Figs. 2 and 3. We display the planes for variants of the CMSSM with different gravitino masses for (panels a and b), and (panel c). Panel d displays an analogous plane for a mSUGRA model with at the GUT scale, in which is determined at each point by the electroweak vacuum conditions. In addition to the NSP lifetime contours (labelled by the lifetime in seconds), we show the boundaries between regions with neutralino and stau NSPs (dotted red lines) and the upper limit on the gravitino mass density (solid brown lines). These curves are also found in Figs. 2 and 3.", null, "Figure 1: The NSP lifetime contours (in seconds) for the supersymmetric models discussed in Figs. 2 and 3.\n\nHaving calculated the partial decay widths and branching ratios, we employ the PYTHIA event generator  to model both the EM and the HD decays of the direct products of the decays. We first generate a sufficient number of spectra for the secondary decays of the gauge and Higgs bosons and the quark pairs. Then, we perform fits to obtain the relation between the energy of the decaying particle and the quantity that characterizes the hadronic spectrum, namely , the number of produced nucleons as a function of the nucleon energy. These spectra and the fraction of the energy of the decaying particle that is injected as EM energy are then used to calculate the light-element abundances.\n\nAn analogous procedure is followed for the NSP case. As the lighter stau is predominantly right-handed, its interactions with bosons are very weak (suppressed by powers of ) and can be ignored. The decay rate for the dominant two-body decay channel, namely , has been given in . However, this decay channel does not yield any nucleons. Therefore, one must calculate some three-body decays of the to obtain any protons or neutrons. The most relevant channels are , , and  . We calculate these partial widths, and then use PYTHIA to obtain the hadronic spectra and the EM energy injected by the secondary -boson and -lepton decays. As in the case of the NSP, this information is then used for the BBN calculation.\n\nWe stress that this procedure is repeated separately for each point in the supersymmetric parameter space sampled. That is, given a set of parameters , sgn, and , once the sparticle spectrum is determined, all of the relevant branching fractions are computed, and the hadronic spectra and the injected EM energy determined case by case. For this reason, we do not use a global parameter such as the hadronic branching fraction, , often used in the literature. In our analysis, is computed and differs at each point in the parameter space.\n\n## 3 Electromagnetic and Hadronic Showers During Primordial Nucleosynthesis\n\nThe dominant effect of hadronic decays of the NSP during BBN is the addition of new interactions between hadronic shower particles and background nuclides 333The decays of the NSP affect, in principle, the expansion rate of the Universe. However, this effect is negligible for NSP abundances low enough to respect the other constraints discussed below.. These alter the evolution and final values of the light-element abundances, as follows. For each background species , let the rate of interactions of decay hadrons per background particle be . Then the abundance per background baryon, , changes according to\n\nwhere gives the rate of change of the abundance in standard BBN. We have also included in (1) the effects of electromagnetic interactions due to NSP decays, either from the decays directly to photons or leptons, or through electromagnetic secondaries in the hadronic showers. These are treated as in , but are not dominant when hadronic branchings are significant. All we need to know is the total EM energy released per decay in any given channel, which may become more complicated in the three-body case, but can easily be calculated.\n\nIncluding hadronic decays in BBN thus amounts to an evaluation of the interaction rates\n\nThe first term accounts for destruction by hadro-dissociation, where is the total rate (for a given species ) of all inelastic interactions of shower particles with . The second term accounts for production via the hadro-dissociation of heavier background species, e.g., . The sum runs over shower species and background targets . In the case of the lithium isotopes, production also occurs via the interactions of energetic (i.e., nonthermal) mass-3 dissociation products with background He, e.g., .\n\nConsider a nonthermal hadronic projectile species , with energy spectrum and total number density . The rate for production due to is\n\n Γhb→i=∫Nh(ϵ,t)σhb→i(ϵ)dϵ. (3)\n\nThe rates thus depend on the decay particle, on the background abundances, and most importantly from the point of view of implementation, on the shower development and evolution of in the background environment.\n\nWe wish to follow the evolution of over the multiple shower generations produced by the initial hadronic NSP decay products. In the context of BBN, this problem of shower development has been approached via direct computation of the multiple generations of shower particles [3, 2, 26]. In this approach, the final particle spectrum is obtained by iterating an initial decay spectrum, accounting for both the energy losses and the energy distributions of collision products.\n\nWe introduce here an equivalent alternative approach, based on a cascade equation, emulating the well-studied treatment of hadronic shower development due to cosmic-ray interactions in the atmosphere. The spectrum of evolves according to\n\n ∂tNh(ϵ)=Jh(ϵ)−Λh(ϵ)Nh(ϵ)−∂ϵ[bh(ϵ)Nh(ϵ)], (4)\n\nwhere is the sum of all source terms, is the sum of all sink terms, and is the energy-loss rate of particle-conserving processes. The energy-loss term is assumed to be the dominant process of energy transfer, in which case tertiary processes are limited to down-scattering. The sink term has two contributions, due to elastic and inelastic scattering; the source term has three contributions, due to direct injection, elastic down-scattering and inelastic down-scattering.\n\nEach nonthermal species evolves according to a cascade equation of the form (4), and together these constitute a coupled set of equations. Because the source term includes the elastic term with inside the integral, these equations are of integro-differential form. The integration is therefore not immediate. Previous work on hadronic decays has adopted a Monte Carlo approach to the solution; our method is to solve the differential equation.\n\nWe note that because this is an integral equation, we can adopt an iterative approach to the solution. To make our initial guess, we ignore the downscattering and solve for with decays being the only source. The solution can then be written in terms of the following quadrature\n\n N(i)h(ϵ,t)=1b(ϵ)∫∞ϵdϵ′ J(i)h(ϵ′,t) e−R(ϵ′,t), (5)\n\nwhere our initial guess takes only. Here the exponential “optical depth” factor\n\n R(ϵ′,t)=∫ϵ′ϵdϵ′′ Γ(ϵ′′,t)b(ϵ′′) (6)\n\nis a measure of the average number of inelastic interactions over the time taken to lose energy electromagnetically from to .\n\nThe full cascades can then be treated iteratively, correcting the approximation to include the redistribution and production of nucleons in scattering events. We do this by using the previous solution to update the source term by including the downscattering terms. These distributions converge after a few iterations. We then insert them into (2) and solve for the hadro-dissociation rate. This iterative procedure is similar to what previous studies have done. However, rather than including the exponent in the integral, they treat the exponential term as a delta function, evaluated at ().\n\nFull details of our method will be given in .\n\n## 4 Bound-State Effects\n\nIt has recently been pointed out  that the presence of a charged particle, such as the stau, during BBN can alter the light-element abundances in a significant way due to the formation negatively-charged staus of bound states (BS) with charged nuclei. The binding energies of these states are , and the Bohr radii . For species such as He, Li and Be, these energy and length scales are close to those of nuclear interactions, and it thus turns out that bound state formation results in catalysis of nuclear rates via two mechanisms.\n\nOne immediate consequence of the bound states is a reduction of the Coulomb barrier for nuclear reactions, due to partial screening by the stau. Since Coulomb repulsion dominates the charged-particle rates, all such rates are enhanced. Specifically, for the case of an initial state , Coulomb effects lead to a exponential suppression via a penetration factor which scales as , with . Introduction of a bound state decreases the target charge to and the system’s reduced mass number to ; both effects lower the Coulomb suppression. We include these effects for all reactions with bound states.\n\nAn additional effect enhances radiative capture channels by introducing photonless final states in which the stau carries off the reaction energy transmitted via virtual photon processes. In particular, the reaction, which is suppressed in standard BBN, is enhanced by many orders of magnitude by the presence of the bound states, as described in . Large enhancements of this type affect other radiative capture reactions, notably mass-7 production reactions such as and destruction reactions such as . We have included these as well: the corresponding enhancement factors appear in Table 1.\n\nBound-state formation and reaction catalysis occurs late in BBN. The binding energy for the [] bound states is 311 keV, for [] 952 keV, and for the [] 1490 keV. The latter are quite high, of order nuclear binding energies, and indeed the large Be binding plays an important role in forbidding Be destruction channels that otherwise would be energetically allowed. The capture processes that form these bound states typically become effective for temperatures ; this means that Be states form prior to Li states, with He states forming last. At these low temperatures one can ignore the standard BBN fusion processes that involve these elements.\n\nTo account for bound state effects, an accurate calculation of their abundance is necessary. To do this we solve numerically the Boltzmann equations (13) and (14) from , that control these abundances. If denotes the light element, and ignoring the fusion contribution as described before, the system of the two differential equations for the light-element and bound state abundances can be cast into the form\n\n ˙YX = ⟨σcv⟩HT(YXn~τ−YBSn′γ) ˙YBS = −˙YX, (7)\n\nwhere and is the stau number density. The thermally-averaged capture cross section and the photon density for , are given in Eqs (9) and (15) in , respectively. is the Hubble expansion and dot denotes derivatives with respect to the temperature. As initial condition, we assume that the bound state abundance is negligible for a temperature of a few times . In our numerical analysis we solve the system (7) for to obtain the corresponding at temperatures below . We assume that the bound state is destroyed in the reaction. That is, we do not include additional bound-state effects on the final-state nuclei such as Li.\n\nAs we see in the following section, bound state effects indeed greatly enhance Li production as found in the analysis of by . Our systematic inclusion of bound state effects finds that Li is also significantly altered. The most important rates are for radiative capture reactions, which enjoy large boosts due to virtual photon effects. In particular, bound state Li production is dominated by the and rates. Destruction is dominated by the channel with the lowest Coulomb barrier, namely . Note that Be destruction channels are less important, since mass-7 is largely in Li at keV, and because the high binding energy of [] makes energetically forbidden with MeV (see Table 1).\n\nInterestingly, the bound state perturbations lead to net Li production in some parts of the parameter space of the models we study, and net destruction in others. Net production occurs when the stau is sufficiently long-lived ( sec) that He bound states are abundant enough to drive bound state enhanced production stronger than bound state enhanced Li destruction. On the other hand, within a window of slightly shorter lifetimes, staus persist long enough to form Li bound states, but then decay before forming He bound states. This leads to net Li destruction. Thus we see that Li is quite sensitive to the properties, and potentially offers a strong probe of the existence and nature of bound states.\n\n## 5 Results and Discussion\n\nAs described earlier, we work in the context of the CMSSM or mSUGRA. Our primary goal is to examine the effect of bound-state interactions on the final abundances of the light elements. To this end, we display a selection of results for specific supersymmetric planes both with and without the effect of bound state interactions. All results shown fully incorporate the effects of electromagnetic and hadronic showers. A more complete selection of results as well as constraints which go beyond the MSSM will be presented in .\n\nWe begin with results based on CMSSM models with , and . We display our results in the plane, showing explicit element abundance contours. In Fig. 2a, we show the element abundances that result when the gravitino mass is held fixed at GeV in the absence of stau bound state effects. To the left of the near-vertical solid black line at GeV, the gravitino is the not the LSP, and we do not consider this region here. Immediately to the right of this line is a red dot-dashed line. To the left of this, the Higgs mass is below the current experimental bound . The diagonal red dotted line corresponds to the boundary between a neutralino and stau NSP. Above the line, the neutralino is the NSP, and below it, the NSP is the stau. Very close to this boundary, there is a diagonal brown solid line. Above this line, the relic density of gravitinos from NSP decay is too high, i.e.,\n\n m3/2mNSPΩNSPh2>0.12. (8)\n\nThus we should restrict our attention to the area below this line. Note that we display the extensions of contours which originate below the line into the overdense region, but we do not display contours that reside solely in the upper plane.", null, "Figure 2: Some (m1/2,m0) planes for A0=0, μ>0 and tanβ=10. In the upper (lower) panels we use m3/2=100 GeV (m3/2=0.2m0). In the right panels the effects of the stau bound states have been included, while in those on the left we include only the effect of the NSP decays. The regions to the left of the solid black lines are not considered, since there the gravitino is not the LSP. In the orange (light) shaded regions, the differences between the calculated and observed light-element abundances are no greater than in standard BBN without late particle decays. In the pink (dark) shaded region in panel d, the abundances lie within the ranges favoured by observation, as described in the text. The significances of the other lines and contours are explained in the text.\n\nWe start with the solid orange line labelled He/D = 1. To the left of this curve, the He/D ratio is greater than 1, which is excluded . For small , this excludes gaugino masses less than about 1100 GeV, which is similar to the result found in . To the right of this curve, the ratio of He to D is acceptable. The very thick green line labelled Li = 4.3 corresponds to the contour where Li/H = , a value very close to the standard BBN result for Li/H. It forms a ‘V’ shape, whose right edge runs along the neutralino-stau NSP border before shooting up at GeV. Below the V, the abundance of Li is smaller than the standard BBN result. However, for relatively small values of , the Li abundance does not differ very much from this standard BBN result: it is only when  GeV that Li begins to drop significantly. This is seen by the additional (unlabeled) thin green contours showing Li/H = (solid), and (dashed). As can be seen in Fig. 1a, the the stau lifetime drops with increasing , and when s, at GeV, the Li abundance has been reduced to an observation-friendly value close to as claimed in .\n\nHowever, for this case with GeV the Li abundance is never sufficiently high to match the observed Li plateau for the same parameter values where Li is reduced. The Li/Li ratio is shown by the solid blue contour labeled Li/Li = 0.15. Note that there is also a small contour loop at this value at small centred around GeV. Inside the loop, the lithium isotope ratio is acceptable, which is also the case to the right of the nearly vertical contour at large . At large , the contour for Li/Li = 0.01 is shown by the thin blue line. To the right of this contour, including the region where Li , the Li abundance is too small.\n\nFinally, we show the contours for D/H = 2.2 and 4.0 by the solid purple contours as labeled. The D/H = 2.2 contour is a small loop within the Li/Li loop. Inside this loop D/H is too small. Between the two curves labeled 4.0, the D/H ratio is high, but not necessarily excessively so.\n\nIn summary, the acceptable regions found in Fig. 2a break down into 2 areas: one between the two loops labeled 2.2 and 0.15 and to the right of the He/D = 1 line, where D/H is larger than 2.2 and . However, in this region, the Li abundance is very similar to the standard BBN result, which may be considered too high. Alternatively, one could consider very large where once again D/H . Here, Li is in fact acceptably low, but the Li abundance is far below the plateau value. As a better illustration of our results, we have shaded these two regions. The orange (lighter) shaded region is where , , and .\n\nTurning now to Fig. 2b, we show the analogous results when the bound-state effects are included in the calculation. The abundance contours are identical to those in Fig. 2a above the diagonal dotted line, where the NSP is a neutralino and bound states do not form. We also note that the bound state effects on D and He are quite minimal, so that these element abundances are very similar to those in Fig. 2a. However, comparing panels a and b, one sees dramatic bound-state effects on the lithium abundances. The loop of Li/Li = 0.15 centred about GeV has now gone due to the large abundance of Li produced by bound-state catalysis. Indeed, everywhere to the left of the solid blue line labeled 0.15 is excluded. In the stau NSP region, this means that  GeV. Moreover, in the stau region to the right of the Li/Li = 0.15 contour, the Li abundance drops below (as shown by the thin green dotted curve) and D/H for  GeV. Only when GeV does the D/H abundance drop back to acceptable levels with good abundances for Li, but Li is now too small to account for the plateau. Thus, for a constant value of GeV, the bound-state effects force one to extremely large values of primarily due to the enhanced production of Li, as shown by the orange shaded region. For this value of the gravitino mass, there are no regions where both lithium abundances match their plateau values.\n\nWe do not display the results for GeV, but the bound-state effects (and the results) are less dramatic. Without the bound-state effects included, the Li abundance is generally too small, while the Li abundance is very similar to standard BBN in the stau NSP region. The gravitino relic density is a factor of 10 smaller in this case and some of the neutralino NSP region is allowable. In the neutralino NSP region, D/H is too high unless GeV. At , there is a region where D/H and Li are acceptably small, though Li/Li is very small. The bound-state effects again set a lower limit on in the stau NSP region in this case. When GeV, both Li abundances drop and approach their standard BBN values. Once again, in no region are both lithium isotopes at their plateau values.\n\nIt is also interesting to consider cases in which the gravitino mass is proportional to . In Fig. 2c, we fix and neglect the bound-state effects. The choices of contours are similar to those in panels a and b. The gravitino relic density constraint now cuts out some of the stau NSP region at large and large , but allows a small neutralino NSP region at low . As before, we are constrained to the right of the curve labeled He/D = 1, though in this case the constraint is not very strong in the stau NSP region. The Li/H = contour again forms a ‘V’ shape and one is restricted to lie below the ‘V’. In most of the stau NSP region, Li remains relatively high but begins to drop at large GeV as approaches  s (see Fig. 1). The region where the Li/Li ratio lies between 0.01 and 0.15 now forms a band which moves from lower left to upper right. Thus, as one can see in the orange shading, there is a large region where the lithium isotopic ratio can be made acceptable. However, if we restrict to D/H , we see that this ratio is interesting only when Li is at or slightly below the standard BBN result. However, we do note that as one approaches the gravitino density limit at , it is possible to have Li/Li and Li/H at the expense of D/H .\n\nThe bound-state effects when are shown in Fig. 2d. Once again, we see that the increased production of both Li and Li excludes a portion of the stau NSP region where GeV for small . The lower bound on increases with . In this case, not only do the bound-state effects increase the Li abundance when is small (i.e., at relatively long stau lifetimes), but they also decrease the Li abundance when the lifetime of the stau is about 1500 s. Thus, at , we find that Li/Li , Li/H , and D/H . Indeed, when is between 3000-4000 GeV, the bound state effects cut the Li abundance roughly in half. In the darker (pink) region (which has no analogue in the other panels), the lithium abundances match the observational plateau values, with the properties and .\n\nFor a larger ratio of , the gravitino relic density forces us to relatively low values of GeV. As in the case described above, the viable region at low is excluded by the bound-state effects, and we find increased Li production due to bound states at high . Qualitatively, this case is similar to that when , though most features are compressed to lower values of .", null, "Figure 3: Some more (m1/2,m0) planes for μ>0. In the upper panels we use m3/2=0.2m0 and tanβ=57, whilst in the lower panels we assume mSUGRA with m3/2=m0 and A0/m0=3−√3 as in the simplest Polonyi superpotential. In the right panels the effects of the stau bound states have been included, while in those on the left we include only the effects of the NSP decays. As in Fig. 2, the region above the solid black line is excluded, since there the gravitino is not the LSP. In the orange shaded regions, the differences between the calculated and observed light-element abundances are no greater than in standard BBN without late particle decays. The meanings of the other lines and contours are explained in the text.\n\nIn Fig. 3, we show some examples of results from CMSSM models with , and mSUGRA models. The dominant effect of increasing is on the neutralino and stau relic densities. At low , the relic density of the neutralino is generally high except along a narrow strip where neutralino-stau co-annihilations are important and yield a density with in the WMAP range. At large , new annihilation channels are available. Most predominant is the the s-channel annihilation of neutralinos through the heavy Higgs scalar and pseudoscalar, causing large variations in the relic density across the plane, particularly at large and . These variations have an impact in GDM scenarios, as the abundance of decaying particles varies.\n\nIn Fig. 3a, we show the plane for (which is near the maximal value for which the electroweak symmetry breaking conditions can be satisfied), and . The dark green shaded region at very low is excluded by decays. Notice that the constraint on the gravitino relic density (shown by the solid brown line) no longer tracks the neutralino-stau NSP border. At GeV, it shoots upwards towards large . This is due to the s-channel annihilation pole (where ) which decreases the relic density. Consider now the behavior of the Li abundance as is increased at a fixed value of GeV. At small GeV, the neutralino is the LSP and results are not shown. When , the relic neutralino density is very large, and when GeV the lifetime is greater than s, and Li destruction process are very efficient. At larger , the lifetime decreases and hadronic production effects begin to dominate, and the Li abundance becomes very large. When , the relic density of neutralinos is 2-3 orders of magnitude smaller when GeV, for the same value of . As a result, Li destruction is suppressed. As is increased, and we move away from the pole, the neutralino density increases, dropping the Li abundance for long lifetimes. As for lower , as is further increased and the decreases, the Li abundance becomes large again, until one hits the neutralino-stau NSP border. The ‘V’-shaped Li contour at large is visible here as well, though it appears squeezed as the NSP border is moved up at large .\n\nJust below the NSP border, we see another distinctive feature in Fig. 3a. The Li/Li ratio, which is generally too large when the neutralino is the NSP, drops dramatically inside a narrow diagonal strip. This occurs because the annihilations of staus are here dominated by a similar s-channel pole. Inside this strip, the density of staus is very small, and element abundances approach their standard BBN values. At lower , over much of the plane with a stau NSP, the Li and D abundances are close to their standard BBN values, while Li is enhanced. In this case, there is a substantial orange shaded region where the light-element abundances are no less acceptable than in standard BBN.\n\nOur results for and when the bound-state effects are included are shown in Fig. 3b. For , the stau lifetimes are somewhat longer than the corresponding lifetimes when . This means that the bound-state effects are apparent over a larger portion of the plane with a stau NSP. Both lithium isotope abundances are significantly higher. Without the bound states, the Li abundance varies little from its standard BBN value, but with their inclusion the Li abundance is somewhat higher, generally about . The effect on Li is larger. Without the bound-state effects, the Li/Li ratio remains small unless either and/or are relatively large. Even then, the ratio only increases to a few percent unless GeV and GeV, where it exceeds 0.15. With the inclusion of the bound states, in much of the stau NSP region the Li abundance is too high, exceptions being the area where s-channel annihilation occurs or in the lower right corner of the displayed plane. There is no region where the light-element abundances lie in the favoured plateau ranges.\n\nFinally, we come to an example of a mSUGRA model. Here, because of a relation between the bilinear and trilinear supersymmetry breaking terms: , is no longer a free parameter of the theory, but instead must be calculated at each point of the parameter space. Here, we choose an example based on the Polonyi model for which . In addition, we have the condition that . In Fig. 3c, we show the mSUGRA model without the bound states. In the upper part of the plane, we do not have GDM. We see that He/D eliminates all but a triangular area which extends up to GeV, when GeV. Below the He/D = 1 contour, D and Li are close to their standard BBN values, and there is a substantial orange shaded region. We note that Li is interestingly high, between 0.01 and 0.15 in much of this region.\n\nAs seen in Fig. 3d, when bound-state effects are included in this mSUGRA model, both lithium isotope abundances are too large except in the extreme lower right corner, where there is a small region shaded orange. However, there is no region where the lithium abundances fall within the favoured plateau ranges.\n\n## 6 Conclusions\n\nWe have calculated in this paper the cosmological light-element abundances in the presence of the electromagnetic and hadronic showers due to late decays of the NSP in the context of the CMSSM and mSUGRA models, incorporating the effects of the bound states that would form between a metastable stau NSP and the light nuclei. Late decays of the neutralino NSP constrain significantly the neutralino region, since in general they yield large light-element abundances. The bound-state effects are significant in the stau NSP region, where excessive Li and Li abundances exclude regions where the stau lifetime is longer than  s. For lifetimes shorter than  s, there is a possibility that the stau decays can reduce the Li abundance from the standard BBN value, while at the same time enhancing the Li abundance. A more complete account of our calculations will be given in , where more examples of CMSSM and mSUGRA parameter planes will be presented, and the possibility of matching the favoured lithium abundances will be discussed in more detail.\n\n## Acknowledgments\n\nWe would like to thank M. Pospelov and M. Voloshin for helpful discussions. The work of K.A.O. and V.C.S. was supported in part by DOE grant DE–FG02–94ER–40823." ]
[ null, "https://media.arxiv-vanity.com/render-output/5240050/x1.png", null, "https://media.arxiv-vanity.com/render-output/5240050/x5.png", null, "https://media.arxiv-vanity.com/render-output/5240050/x9.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8974822,"math_prob":0.950262,"size":44202,"snap":"2021-43-2021-49","text_gpt3_token_len":10866,"char_repetition_ratio":0.14733699,"word_repetition_ratio":0.03541498,"special_character_ratio":0.24229673,"punctuation_ratio":0.1508524,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9608604,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T04:10:43Z\",\"WARC-Record-ID\":\"<urn:uuid:442eb001-bf66-4e3e-89a9-c97f85076e6e>\",\"Content-Length\":\"706055\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5287c4ae-c065-4cdc-aca9-e873d637032f>\",\"WARC-Concurrent-To\":\"<urn:uuid:183f07bf-15e0-4415-82d4-a5e563c4a62b>\",\"WARC-IP-Address\":\"172.67.158.169\",\"WARC-Target-URI\":\"https://www.arxiv-vanity.com/papers/astro-ph/0608562/\",\"WARC-Payload-Digest\":\"sha1:IUIURQNE2DSDRDMKKBFQWHANNUGRW3HI\",\"WARC-Block-Digest\":\"sha1:5NPSC6ZFFCL7JUXQCI7YWJXADCUTN7Z2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585381.88_warc_CC-MAIN-20211021040342-20211021070342-00494.warc.gz\"}"}
https://www.calcapp.net/blog/2017/12/10/extracting-time-units.html
[ "• Learn\n• Blog\n• Pricing\n\n# Tip: Get the number of hours, minutes or seconds between two dates\n\nTo get the number of hours, minutes or seconds between two dates, subtract one date from the other and use the HOUR, MINUTE or SECOND formula functions. HOUR won't return a number greater than 23 and MINUTE and SECOND won't return a number greater than 59. Read on to learn how to fix this.\n\nTo get the difference between two dates, simply subtract one from the other: `Date2 - Date1`. If the number of hours won’t exceed 23 and the number of minutes or seconds won’t exceed 59, you can use the HOUR, MINUTE and SECOND formula functions to do the conversion.\n\n`HOUR(Date2 - Date1)` returns the number of hours there are between the two dates.\n\n`MINUTE(Date2 - Date1)` returns the number of minutes there are between the two dates.\n\n`SECOND(Date2 - Date1)` returns the number of seconds there are between the two dates.\n\nThese functions are designed to be used together, meaning that the the HOUR function won’t ever return a number greater than 23 and the SECOND and MINUTE functions won’t ever return a number greater than 59. For instance, if four hours, three minutes and two seconds have elapsed between two dates, `HOUR(Date2- Date1)` returns 4, `MINUTE(Date2 - Date1)` returns 3 and `SECOND(Date2 - Date1)` returns 2.\n\nIf you’re just interested in the number of seconds that have elapsed between the two dates, though, the number you’re looking for is 14,584 seconds. (Each minute has 60 seconds and every hour has 60 minutes, meaning that 14,584 equals `4 * 60 * 60 + 3 * 60 + 4`).\n\nSimilarly, if you’re interested in the number of minutes that have elapsed between two dates, the number you’re looking for is 243 minutes. (Each hour has 60 minutes, meaning that 243 equals `4 * 60 + 3`).\n\nIn Calcapp, as in spreadsheets, a date is a so-called sequential serial number. For the purposes of this discussion, we can ignore how days are represented and just be content to note that the sequential serial number 1 equals one day or 24 hours. This means that the number 1/24 represents one hour, 1/24/60 represents one minute and 1/24/60/60 represents one second.\n\nThat means that you need to use these formulas if you can’t use the HOUR, MINUTE and SECOND functions:\n\n`(Date2 - Date1) * 24` returns the number of hours there are between two dates.\n\n`(Date2 - Date1) * 60 * 24` returns the number of minutes there are between two dates.\n\n`(Date2 - Date1) * 60 * 60 * 24` returns the number of seconds there are between two dates.\n\n(If you’re interested in having apps that perform as speedily as possible, you may be tempted to write `60 * 60 * 24` as `86400`. That won’t actually improve performance, as Calcapp automatically does this optimization before your app is run. This is known as constant folding. By typing ```60 * 60 * 24``` instead of `86400`, your formulas will be easier to read.)\n\nDo you want to share a tip with other Calcapp users through this blog? Let us know!" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87431204,"math_prob":0.98940873,"size":2541,"snap":"2020-45-2020-50","text_gpt3_token_len":651,"char_repetition_ratio":0.16239654,"word_repetition_ratio":0.17699115,"special_character_ratio":0.27194017,"punctuation_ratio":0.096837945,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9914523,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-29T13:39:36Z\",\"WARC-Record-ID\":\"<urn:uuid:3344c847-ab96-40d4-82f5-3c2f17e956f4>\",\"Content-Length\":\"16016\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:000f9d1a-a64e-446e-9475-442985058b71>\",\"WARC-Concurrent-To\":\"<urn:uuid:81d921cb-887c-435b-86e3-627904c56e85>\",\"WARC-IP-Address\":\"216.239.38.21\",\"WARC-Target-URI\":\"https://www.calcapp.net/blog/2017/12/10/extracting-time-units.html\",\"WARC-Payload-Digest\":\"sha1:JKW5MBOLUGRXAHQV6FTRITCPLQGXP5E2\",\"WARC-Block-Digest\":\"sha1:37WUKJNPSKXISXFUG5TIWSHTC6VHP3KR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107904287.88_warc_CC-MAIN-20201029124628-20201029154628-00569.warc.gz\"}"}
https://techqa.club/v/q/template-function-that-uses-n-copy-to-copy-first-n-elements-form-one-vector-another-causing-a-compilation-error-c3RhY2tvdmVyZmxvd3w1NTg5OTk3Mw==
[ "# template function that uses n_copy to copy first n elements form one vector another causing a compilation error\n\nAsked by At\n\nI am using the following template function in order to copy the first n elements from one vector to another.\n\n``````// Example program\n#include <iostream>\n#include <string>\n#include <vector>\n\ntemplate <typename Range>\ninline std::vector<typename Range::value_type> take(const Range &iRange, int nbrElements) {\nstd::vector<typename Range::value_type> result;\nif (nbrElements > iRange.size()) {\nnbrElements = iRange.size();\n}\n\nstd::copy_n(iRange, nbrElements, std::back_inserter(result));\n\nreturn result;\n}\n\nint main()\n{\nstd::vector<int> source = { 1, 2, 3, 4, 5, 6, 7,};\nstd::vector<int> destination = take(source, 7);\n\nreturn 0;\n}\n``````\n\nThe problem is that I am getting the following error and I don't understand why:\n\n``````In instantiation of 'std::vector<typename Range::value_type>\ntake(const Range&, int) [with Range = std::vector<int>; typename\nRange::value_type = int]':\n22:48: required from here\n10:19: warning: comparison between signed and unsigned integer expressions [-Wsign-compare]\nIn file included from /usr/include/c++/4.9/algorithm:62:0,\nfrom 5:\n/usr/include/c++/4.9/bits/stl_algo.h: In instantiation of '_OIter std::copy_n(_IIter, _Size, _OIter) [with _IIter = std::vector<int>;\n_Size = int; _OIter = std::back_insert_iterator<std::vector<int> >]':\n14:62: required from 'std::vector<typename Range::value_type> take(const Range&, int) [with Range = std::vector<int>; typename\nRange::value_type = int]'\n22:48: required from here\n/usr/include/c++/4.9/bits/stl_algo.h:804:39: error: no matching function for call to '__iterator_category(std::vector<int>&)'\nstd::__iterator_category(__first));\n^\n/usr/include/c++/4.9/bits/stl_algo.h:804:39: note: candidate is:\nIn file included from /usr/include/c++/4.9/bits/stl_algobase.h:65:0,\nfrom /usr/include/c++/4.9/bits/char_traits.h:39,\nfrom /usr/include/c++/4.9/ios:40,\nfrom /usr/include/c++/4.9/ostream:38,\nfrom /usr/include/c++/4.9/iostream:39,\nfrom 2:\n/usr/include/c++/4.9/bits/stl_iterator_base_types.h:201:5: note: template<class _Iter> typename\nstd::iterator_traits<_Iterator>::iterator_category\nstd::__iterator_category(const _Iter&)\n__iterator_category(const _Iter&)\n^\n/usr/include/c++/4.9/bits/stl_iterator_base_types.h:201:5: note: template argument deduction/substitution failed:\n/usr/include/c++/4.9/bits/stl_iterator_base_types.h: In substitution of 'template<class _Iter> typename\nstd::iterator_traits<_Iterator>::iterator_category\nstd::__iterator_category(const _Iter&) [with _Iter =\nstd::vector<int>]':\n/usr/include/c++/4.9/bits/stl_algo.h:804:39: required from '_OIter std::copy_n(_IIter, _Size, _OIter) [with _IIter =\nstd::vector<int>; _Size = int; _OIter =\nstd::back_insert_iterator<std::vector<int> >]'\n14:62: required from 'std::vector<typename Range::value_type> take(const Range&, int) [with Range = std::vector<int>; typename\nRange::value_type = int]'\n22:48: required from here\n/usr/include/c++/4.9/bits/stl_iterator_base_types.h:201:5: error: no type named 'iterator_category' in 'struct\nstd::iterator_traits<std::vector<int> >'\n``````\n\n## 3 Answers", null, "On Best Solutions\n\nYou are almost there, only the first `std::copy_n` algorithm is wrong. Change the invocation to\n\n``````using std::begin;\n\nstd::copy_n(begin(iRange), nbrElements, std::back_inserter(result));\n``````\n\nand it should work as expected. Also, `#include <algorithm>` is missing, and you could prevent unnecessary allocations as you know the size of the resulting sequence:\n\n``````result.reserve(nbrElements); // before the call to copy_n\n``````", null, "On\n\nThere are two issues with the code. The first is that it needs to have `#include <algorithm>`, which defines `std::copy_n`, and the second is that you need to take the `begin()` of range.\n\nWhen fixed, this is what the code looks like:\n\n``````// Example program\n#include <iostream>\n#include <string>\n#include <vector>\n#include <algorithm>\n\ntemplate <typename Range>\ninline std::vector<typename Range::value_type> take(const Range &iRange, int nbrElements) {\nstd::vector<typename Range::value_type> result;\nif (nbrElements > iRange.size()) {\nnbrElements = iRange.size();\n}\n\nstd::copy_n(iRange.begin(), nbrElements, std::back_inserter(result));\n\nreturn result;\n}\n\nint main()\n{\nstd::vector<int> source = { 1, 2, 3, 4, 5, 6, 7,};\nstd::vector<int> destination = take(source, 7);\n\nreturn 0;\n}\n``````\n\n### Shorter version\n\nWe can take advantage of `std::vector`'s range constructor to write a shorter, very efficient version of `take` by using `std::vector`'s range constructor:\n\n``````template <class Range, class value_t = typename Range::value_type>\nstd::vector<value_t> take(const Range &range, size_t count) {\n// Ensure count is at most range.size()\ncount = std::min(count, range.size());\nreturn std::vector<value_t>(range.begin(), range.begin() + count);\n}\n``````", null, "On\n\nYou could try something like that:\n\n``````template <typename type>\nstatic std::vector<type> take(const std::vector<type> &iRange, size_t nbrElements)\n{\nif (nbrElements > iRange.size())\n{\nnbrElements = iRange.size();\n}\nstd::vector<type> result;\nresult.insert(result.end(), iRange.begin(), iRange.begin() + nbrElements);\nreturn result;\n}\n``````\n\nEdit:\n\nYou can also return vector directly:\n\n`````` return std::vector<type>(iRange.begin(), iRange.begin() + nbrElements);\n``````" ]
[ null, "https://i.stack.imgur.com/JdCIQ.jpg", null, "https://www.gravatar.com/avatar/1f62878e0b4d6d11fd4478d81c5424c4", null, "https://techqa.club/v/q/template-function-that-uses-n-copy-to-copy-first-n-elements-form-one-vector-another-causing-a-compilation-error-c3RhY2tvdmVyZmxvd3w1NTg5OTk3Mw==", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5690711,"math_prob":0.7788328,"size":3243,"snap":"2021-21-2021-25","text_gpt3_token_len":913,"char_repetition_ratio":0.1840074,"word_repetition_ratio":0.1955836,"special_character_ratio":0.3052729,"punctuation_ratio":0.29302987,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98735625,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,4,null,null,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-24T06:38:25Z\",\"WARC-Record-ID\":\"<urn:uuid:de2950e7-6d34-4ef1-9088-863f1b6e0683>\",\"Content-Length\":\"28066\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:71930d3c-9ce3-4eef-bb0a-675a3857b154>\",\"WARC-Concurrent-To\":\"<urn:uuid:cb6f880c-3f75-447e-83d0-e7bec6f02984>\",\"WARC-IP-Address\":\"172.67.144.60\",\"WARC-Target-URI\":\"https://techqa.club/v/q/template-function-that-uses-n-copy-to-copy-first-n-elements-form-one-vector-another-causing-a-compilation-error-c3RhY2tvdmVyZmxvd3w1NTg5OTk3Mw==\",\"WARC-Payload-Digest\":\"sha1:I7E2NQVTF6XSFD2TNJTTJEARLNW6MVM6\",\"WARC-Block-Digest\":\"sha1:CVPAAT3R6U7ALPKZXXYVMJZBAM4R7OHD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488551052.94_warc_CC-MAIN-20210624045834-20210624075834-00488.warc.gz\"}"}
https://stackoverflow.com/questions/14504649/getchilddrawingorder-called-used-erratically/14510368
[ "# getChildDrawingOrder called/used erratically?\n\nI am creating an isometric map with simple tiles, and I’ve extended `RelativeLayout` to create a layout that holds these tiles. Really, just using a `RelativeLayout` as-is worked fine as long as my orientation matched the order in which the tiles were written to the XML file; all I’ve overwritten are the constructors, where I simply call `super` and `setChildrenDrawingOrderEnabled(true);` along with setting up some variables (height and width of the grid), and then `getChildDrawingOrder` itself.\n\nMy code for `getChildDrawingOrder` figures out the new index for the given child, and also sets a string in the child to `i->i'`, where `i` is the original index and `i'` is the new index. I’m using this for testing; the children are set to draw this string on themselves along with their coordinates.\n\nUnfortunately, it does not work correctly, or rather it works erratically. Of the nine tiles in my test case, three don’t seem to have `getChildDrawingOrder` called at all: the string I mentioned above is `null`. Of the rest, at least one is being drawn out of order despite getting the correct index passed to it.\n\nHere’s a picture (in the `TOP` orientation):", null, "Notice that (0,2), (1,2), and (2,1) are all listed as `NULL`, and therefore `getChildDrawingOrder` appears to have never been called for them. Also note that (1,0) is drawn on top of (1,1), even though both its `i` (3) and `i'` (1) are less than (1,1)’s (4 and 4, respectively).\n\nHere’s the code from `getChildDrawingOrder`:\n\n``````@Override\nprotected int getChildDrawingOrder(int childCount, int i)\n{\nTileView ch = (TileView)getChildAt(i);\nch.order = \"Called\"; // this string is drawn on my children\nint gx, gy; // the \"true\" x,y for the current rotation,\n// where 0,0 is the top corner\nswitch (rotation)\n{\ncase TOP:\ngx = ch.x();\ngy = ch.y();\nbreak;\ncase LEFT:\ngx = (width()-1-ch.x());\ngy = ch.y();\nbreak;\ncase RIGHT:\ngx = ch.x();\ngy = (length()-1-ch.y());\nbreak;\ncase BOTTOM:\ngx = (width()-1-ch.x());\ngy = (length()-1-ch.y());\nbreak;\ndefault:\ngx = ch.x();\ngy = ch.y();\n}\nint row = gx+gy; // current row\nif ( row == 0 ) // row 0 is always just the top corner and 0\n{\nch.order = new String(i+\"->0\"); // string set to i->i'\nreturn 0;\n}\nelse\n{\nint mx = width()-1, // maximum x value\nmy = length()-1, // maximum y value\nmrow = mx+my, // maximum row\nmin = Math.min(mx, my), // minor axis length\nmaj = Math.max(mx, my), // major axis length\nretn; // for storing the return value\n// inside the top corner\nif ( row <= min )\n{\n// Gauss's formula to get number of cells in previous rows\n// plus the number for which cell in this row this is.\nretn = row*(row+1)/2+gy;\n}\n// in the middle\nelse if ( row <= maj )\n{\n// Gauss's formula to get number of cells in top corner\n// plus the number of cells in previous rows of the middle section\n// plus the number for which cell in this row this is.\nretn = min*(min+1)/2+min*(row-min)+gy;\n}\n// bottom corner\nelse\n{\nretn = (min+1)*(min+2)/2 // cells in the top corner\n+ min*(maj-min) // cells in the middle\n+ (mrow-maj)*(mrow-maj+1)/2 // total cells in bottom triangle\n- (mrow-row+1)*(mrow-row+2)/2 // less cells after this one\n+ gy // which cell in this row\n- (row-maj) // to account for gy not starting at zero\n;\n}\nch.order = new String(i+\"->\"+retn); // string set to i->i'\nreturn retn;\n}\n}\n``````\n\nCan anyone shed some light on what’s going on? Why isn’t `getChildDrawingOrder` being called for those three tiles? Why is (1,0) drawn in the wrong order, even though `getChildDrawingOrder` is called on it?\n\nOK, figured it out by looking at the Android source code. I had the mapping of `getChildDrawingOrder`: the `i` passed is “which child should I draw i th?” not \"when should I draw child i?\" The reason for the `NULL`s is because those children were being drawn before their own `i` was passed.\n\nI changed my code to figure out the order for all children during the `onMeasure` pass, saving that in a `SparseIntArray`, and then just returned that from `getChildDrawingOrder`. This works.\n\nBack-calculating the index in the `getChildDrawingOrder` function, by the way, is a bad idea unless you want to rely on the order in which the children are declared. Because if you don’t rely on that order, you have to walk through the list of children to find the one that has the appropriate x and y values, which means you have to walk through the list of children for each child. That’s an O(n²) operation (read: fairly inefficient). The mathematics are also reasonably complicated.\n\nHere is a simple example that shows how to override `getChildDrawingOrder`\n\n1. as a way to adjust which of the children gets drawn in which order (with the last on being on top)\n2. have the order change from a tap/click event\n\nThe RelativeLayout class:\n\n``````public class AlternatingChildDrawingOrderRelativeLayout extends RelativeLayout {\n\n// the childDrawingOrder modifier\nprivate int childDrawingOrderModifier = 0;\n\npublic AlternatingChildDrawingOrderRelativeLayout(Context context) {\nsuper(context);\ninit(context);\n}\n\nvoid init(Context context) {\nsetClickable(true);\nsetChildrenDrawingOrderEnabled(true);\nsetOnClickListener(new OnClickListener() {\n@Override\npublic void onClick(View v) {\n// increment to adjust the child drawing order\nchildDrawingOrderModifier++;\n// call invalidate to redraw with new order modifier\nViewCompat.postInvalidateOnAnimation(v);\n}\n});\n}\n\n@Override\nprotected int getChildDrawingOrder(int childCount, int i) {\n// increment i with the modifier, then afford for out of bounds using modulus of the child count\nint returnValue = (i + childDrawingOrderModifier) % childCount;\nLog.v(VIEW_LOG_TAG, \"getChildDrawingOrder returnValue=\" + returnValue + \" i=\" + i);\nreturn returnValue;\n}\n\npublic AlternatingChildDrawingOrderRelativeLayout(Context context, AttributeSet attrs) {\nsuper(context, attrs);\ninit(context);\n}\n\npublic AlternatingChildDrawingOrderRelativeLayout(Context context,\nAttributeSet attrs,\nint defStyleAttr) {\nsuper(context, attrs, defStyleAttr);\ninit(context);\n}\n\n@RequiresApi(api = Build.VERSION_CODES.LOLLIPOP)\npublic AlternatingChildDrawingOrderRelativeLayout(Context context,\nAttributeSet attrs,\nint defStyleAttr,\nint defStyleRes) {\nsuper(context, attrs, defStyleAttr, defStyleRes);\ninit(context);\n}\n\n}\n``````\n\nThe xml layout\n\n``````<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<com.example.ui.AlternatingChildDrawingOrderRelativeLayout\nxmlns:android=\"http://schemas.android.com/apk/res/android\"\nandroid:layout_width=\"300dp\"\nandroid:layout_height=\"300dp\">\n\n<View\nandroid:id=\"@+id/red\"\nandroid:layout_width=\"125dp\"\nandroid:layout_height=\"300dp\"\nandroid:layout_alignParentLeft=\"true\"\nandroid:layout_alignParentStart=\"true\"\nandroid:background=\"#f00\"\n/>\n\n<View\nandroid:id=\"@+id/green\"\nandroid:layout_width=\"125dp\"\nandroid:layout_height=\"300dp\"\nandroid:layout_centerInParent=\"true\"\nandroid:background=\"#0f0\"/>\n\n<View\nandroid:id=\"@+id/blue\"\nandroid:layout_width=\"125dp\"\nandroid:layout_height=\"300dp\"\nandroid:layout_alignParentRight=\"true\"\nandroid:layout_alignParentEnd=\"true\"\nandroid:background=\"#00f\"/>\n\n</com.example.ui.AlternatingChildDrawingOrderRelativeLayout>\n``````\n\nWhat it looks like\n\nPictured on the left is the starting drawing order, which is the default based on the xml layout:\n\n``````Red = index 0\nGreen = index 1\nBlue = index 2\n``````\n\nSo from first to last (or think bottom to top) that is: Red, Green, Blue. Here is the log dump of `getChildDrawingOrder` being called\n\n``````V/View: getChildDrawingOrder returnValue=0 i=0\nV/View: getChildDrawingOrder returnValue=1 i=1\nV/View: getChildDrawingOrder returnValue=2 i=2\n``````\n\nIn the middle, after our first tap, the order changes to Green, Blue, Red\n\n``````V/View: getChildDrawingOrder returnValue=1 i=0\nV/View: getChildDrawingOrder returnValue=2 i=1\nV/View: getChildDrawingOrder returnValue=0 i=2\n``````\n\nAnd, on the right side shows us what it looks like after our second tap since the order change to: Blue, Red, Green.\n\n``````V/View: getChildDrawingOrder returnValue=2 i=0\nV/View: getChildDrawingOrder returnValue=0 i=1\nV/View: getChildDrawingOrder returnValue=1 i=2\n``````\n\nAny tap after this pretty much loops it back to the original order where blue was last to be drawn due to the modulus calculation\n\nHTHs!\n\n• I feel like this needs a bit more introduction. I have been away from Android development for years, so I would have to dig a bit to get into this code and understand what it was doing. Without doing that, I can’t even tell if this is a good answer. More explanation of `getChildDrawingOrder` and how it works/how it's used would help with that, I think. – KRyan Jan 19 '17 at 19:59\n• I'll add some imagery to illustrate – petey Jan 19 '17 at 20:06" ]
[ null, "https://i.stack.imgur.com/3JFfm.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7929998,"math_prob":0.74622494,"size":3449,"snap":"2019-26-2019-30","text_gpt3_token_len":954,"char_repetition_ratio":0.11349782,"word_repetition_ratio":0.08496732,"special_character_ratio":0.304726,"punctuation_ratio":0.1398892,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95399094,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-07-20T00:05:00Z\",\"WARC-Record-ID\":\"<urn:uuid:f508ab31-11c0-4cef-a91f-8df0c41426d9>\",\"Content-Length\":\"143662\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:330c169f-bfc2-42ad-b6ee-447165dc4656>\",\"WARC-Concurrent-To\":\"<urn:uuid:dfa29902-f123-4bc1-b478-0ea41a3031dc>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://stackoverflow.com/questions/14504649/getchilddrawingorder-called-used-erratically/14510368\",\"WARC-Payload-Digest\":\"sha1:OLQM6D7KACPQ24Z6MC7RDESP72ZBTOST\",\"WARC-Block-Digest\":\"sha1:HSTSLSMJB2N7TFTPMYVNFBQY6P66C4JA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-30/CC-MAIN-2019-30_segments_1563195526386.37_warc_CC-MAIN-20190719223744-20190720005744-00154.warc.gz\"}"}
https://www.unitconverters.net/area/square-hectometer-to-square-nanometer.htm
[ "", null, "Home / Area Conversion / Convert Square Hectometer to Square Nanometer\n\n# Convert Square Hectometer to Square Nanometer\n\nPlease provide values below to convert square hectometer [hm^2] to square nanometer [nm^2], or vice versa.\n\n From: square hectometer", null, "To: square nanometer\n\n### Square Hectometer to Square Nanometer Conversion Table\n\nSquare Hectometer [hm^2]Square Nanometer [nm^2]\n0.01 hm^21.0E+20 nm^2\n0.1 hm^21.0E+21 nm^2\n1 hm^21.0E+22 nm^2\n2 hm^22.0E+22 nm^2\n3 hm^23.0E+22 nm^2\n5 hm^25.0E+22 nm^2\n10 hm^21.0E+23 nm^2\n20 hm^22.0E+23 nm^2\n50 hm^25.0E+23 nm^2\n100 hm^21.0E+24 nm^2\n1000 hm^21.0E+25 nm^2\n\n### How to Convert Square Hectometer to Square Nanometer\n\n1 hm^2 = 1.0E+22 nm^2\n1 nm^2 = 1.0E-22 hm^2\n\nExample: convert 15 hm^2 to nm^2:\n15 hm^2 = 15 × 1.0E+22 nm^2 = 1.5E+23 nm^2" ]
[ null, "https://d15gdne58bo42a.cloudfront.net/images/calculator.svg", null, "https://www.unitconverters.net/images/switch.svg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.53286207,"math_prob":0.99984884,"size":758,"snap":"2023-14-2023-23","text_gpt3_token_len":360,"char_repetition_ratio":0.265252,"word_repetition_ratio":0.058333334,"special_character_ratio":0.47229552,"punctuation_ratio":0.10243902,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999077,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-10T18:57:50Z\",\"WARC-Record-ID\":\"<urn:uuid:fd133e25-77ff-419e-8b30-fc7718b3368a>\",\"Content-Length\":\"10996\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:08249841-16d0-4098-b57c-69eef598c5a0>\",\"WARC-Concurrent-To\":\"<urn:uuid:98a8eb0c-4e3a-4d86-ba8e-e8d05b6c19a9>\",\"WARC-IP-Address\":\"69.10.42.204\",\"WARC-Target-URI\":\"https://www.unitconverters.net/area/square-hectometer-to-square-nanometer.htm\",\"WARC-Payload-Digest\":\"sha1:MRBLLX6CXRT4EEWN4BUEDZBJGJ63OT42\",\"WARC-Block-Digest\":\"sha1:MCVAFTHX3ITFB5XVIZVAYJHFG24FONQ7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224657735.85_warc_CC-MAIN-20230610164417-20230610194417-00277.warc.gz\"}"}
https://datascience.stackexchange.com/tags/feature-engineering/hot?filter=all
[ "# Tag Info\n\n195\n\nThere are some cases where LabelEncoder or DictVectorizor are useful, but these are quite limited in my opinion due to ordinality. LabelEncoder can turn [dog,cat,dog,mouse,cat] into [1,2,1,3,2], but then the imposed ordinality means that the average of dog and mouse is cat. Still there are algorithms like decision trees and random forests that can work with ...\n\n52\n\nWhile AN6U5 has given a very good answer, I wanted to add a few points for future reference. When considering One Hot Encoding(OHE) and Label Encoding, we must try and understand what model you are trying to build. Namely the two categories of model we will be considering are: Tree Based Models: Gradient Boosted Decision Trees and Random Forests. Non-Tree ...\n\n32\n\nLat long coordinates have a problem that they are 2 features that represent a three dimensional space. This means that the long coordinate goes all around, which means the two most extreme values are actually very close together. I've dealt with this problem a few times and what I do in this case is map them to x, y and z coordinates. This means close points ...\n\n31\n\nHave you considered adding the (sine, cosine) transformation of the time of day variable? This will ensure that the 0 and 23 hour for example are close to each other, thus allowing the cyclical nature of the variable to shine through. (More Info)\n\n26\n\nI was learning this topic too, and these are what I found: This type of encoding is called likelihood encoding, impact coding or target coding The idea is encoding your categorical variable with the use of target variable (continuous or categorical depending on the task). For example, if you have regression task, you can encode your categorical variable ...\n\n20\n\nYou might want to interpret your coefficients. That is, to be able to say things like \"if I increase my variable $X_1$ by 1, then, on average and all else being equal, $Y$ should increase by $\\beta_1$\". For your coefficients to be interpretable, linear regression assumes a bunch of things. One of these things is no multicollinearity. That is, your $X$ ...\n\n19\n\nYou do not need domain knowledge (the knowledge of what your data mean) in order to do feature engineering (finding more expressive ways of framing your data). As Tu N. explained, you can find \"quick and dirty\" combinations of features that could be helpful pretty easily. Given an output $y$ and an individual feature $x$, you can take the ...\n\n19\n\nOnce converted to numerical form, models don't respond differently to columns of one-hot-encoded than they do to any other numerical data. So there is a clear precedent to normalise the {0,1} values if you are doing it for any reason to prepare other columns. The effect of doing so will depend on the model class, and type of normalisation you apply, but I ...\n\n17\n\nThe answer depends on the kind of relationships that you want to represent between the time feature, and the target variable. If you encode time as numeric, then you are imposing certain restrictions on the model. For a linear regression model, the effect of time is now monotonic, either the target will increase or decrease with time. For decision trees, ...\n\n16\n\nThey are probably using \"leave one out encoding\" to refer to Owen Zhang's strategy. From here The encoded column is not a conventional dummy variable, but instead is the mean response over all rows for this categorical level, excluding the row itself. This gives you the advantage of having a one-column representation of the categorical while ...\n\n16\n\nLet's define first Feature Engineering: Feature selection Feature extraction Adding features through domain expertise XGBoost does (1) for you. XGBoost does not do (2)/(3) for you. So you still have to do feature engineering yourself. Only a deep learning model could replace feature extraction for you.\n\n15\n\nYou've really got a classification problem on your hands, not a regression problem. Your target is not continuous, and Pearson correlation measures a relationship between continuous variables really. That's problematic enough to start. Low correlation means there's no linear relationship; it doesn't mean there's no information in the feature that predicts ...\n\n13\n\nIn my experience, when people claim to have an automated approach to feature engineering, they really mean \"feature generation\", and what they're actually talking about is that they've built a deep neural network of some sort. To be fair, in a limited sense, this could be a true claim. Properly trained deep neural networks can handle any number of pairwise ...\n\n13\n\nFeature selection: XGBoost does the feature selection up to a level. In my experience, I always do feature selection by a round of xgboost with parameters different than what I use for the final model. I typically use low numbers for row and feature sampling, and trees that are not deep and only keep the features that enter to the model. Then fine tune with ...\n\n11\n\nThere is no definite source on how to do feature engineering. It is often dependent on the problem you are trying to solve. Some say it is more of an art than it is science. But I would go through some of the high scoring kaggle kernels / winning solutions if available. Just head over to kaggle and browse through the competitions. There is a lot of very ...\n\n10\n\nFeature engineering that I would consider essential for even tree based algorithms are: Modular arithmetic calculations: e.g. converting a timestamp into day of the week, or time of day. If your model needs to know that something happens on the third Monday of every month, it will be nearly impossible to determine this from timestamps. On a similar vein, ...\n\n8\n\nTarget encoding is now available in sklearn through the category_encoders package. Target Encoder class category_encoders.target_encoder.TargetEncoder(verbose=0, cols=None, drop_invariant=False, return_df=True, impute_missing=True, handle_unknown='impute', min_samples_leaf=1, smoothing=1) Target Encode for categorical features. Based on leave one out ...\n\n8\n\nMissing Data Imputation: Complete case analysis Mean / Median / Mode imputation Random Sample Imputation Replacement by Arbitrary Value Missing Value Indicator Multivariate imputation Categorical Encoding: One hot encoding Count and Frequency encoding Target encoding / Mean encoding Ordinal encoding Weight of Evidence Rare label encoding BaseN, ...\n\n8\n\nI recommend using numerical features. Using categorical features essentially means that you don't consider distance between two categories as relevant (e.g. category 1 is as close to category 2 as it is to category 3). This is definitely not the case for hours or months. However, the issue that you raise is that you want to represent hours and months in a ...\n\n8\n\nQ1) Should highly correlated features with the target variable be included or removed from classification and regression problems? Is there a better/elegant explanation to this step? Actually there's no strong reason either to keep or remove features which have a low correlation with the target response, other than reducing the number of features if ...\n\n7\n\nLabelEncoder is for ordinal data, while OHE is for nominal data.\n\n7\n\nYou have time series data which is used to measure the acceleration. You which to identify when the machine is in its nominal state (OFF) and anomalous state (ON). This problem would be best solved using anomaly detection algorithms. But, there are so many ways that you can approach this problem. Preparing you data All of the methods will rely on the ...\n\n7\n\nThe issue with building a regression model on all 3 of these is that you are potentially introducing multicollinearity into the model. Although log(input) and sqrt(input) are not linear functions of the input a quick test (using Matlab) shows they are still highly correlated (depending on the range) input=rand(1,100); input_log=log(input); input_rt=sqrt(...\n\n7\n\n\"Hand Crafted\" features refer to properties derived using various algorithms using the information present in the image itself. For example, two simple features that can be extracted from images are edges and corners. A basic edge detector algorithm works by finding areas where the image intensity \"suddenly\" changes. To understand that we need to remember ...\n\n7\n\nTo put it shortly, xgboost tries to fix it and although it is very good in getting rid of overfitting, it is not perfect. Adding new features is not always beneficial, because you increase the dimension of your search space and thus make the problem harder. In your particular case the increased complexity overweight the added value from extra features. ...\n\n7\n\n1) Yes, it makes sense. Trying to create features manually will help the learners (i.e. models) to graspe more information from the raw data because the raw data is not always in a form that is amenable to learning, but you can always construct features from it that are. The feature you are adding are based on one feature. This is common. However, your ...\n\n7\n\nThe most accepted idea is that bag-of-words, Tf-Idf and other transformations should be left as is. According to some: Standardization of categorical variables might be not natural. Neither is standarization of Tf-Idf because according to stats stack exchange: (it's) (...) usually is a two-fold normalization. First, each document is normalized to ...\n\n7\n\nA note: for those who've ended here looking for a hashing technique, geohash is likely your best choice. Representing latitude and longitude in a single linear scale is not possible due to the fact that their domain is inherently a 3D space. Reducing that as per your needs would require a spatial flattening technique that's unheard of to me. Reasoning As ...\n\n7\n\nCheck this post. In the cases where the frequency is related somewhat with the target variable, it helps the model to understand and assign the weight in direct and inverse proportion, depending on the nature of the data. Check also this thread. What's the rationale behind it? High cardinality may result in dimensionality curse and actually decrease ...\n\n6\n\nYep this is a common problem. What I would do is use SKLearns label encoder. With a similar API to SKLearn models, it can be fit to your category - meaning that any new data passed through the encoder object is encoded in the same fashion. For example # Import the encoder from sklearn.preprocessing import LabelEncoder # Fit it to your training set + ...\n\nOnly top voted, non community-wiki answers of a minimum length are eligible" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91378146,"math_prob":0.91220194,"size":13310,"snap":"2021-43-2021-49","text_gpt3_token_len":3161,"char_repetition_ratio":0.15090936,"word_repetition_ratio":0.0027384756,"special_character_ratio":0.25116453,"punctuation_ratio":0.12077104,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9575718,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T21:35:57Z\",\"WARC-Record-ID\":\"<urn:uuid:643801fc-41ad-48a7-a3a3-1b2cc751418b>\",\"Content-Length\":\"188424\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:801eaa23-6cad-453b-b842-08b405b61fb3>\",\"WARC-Concurrent-To\":\"<urn:uuid:830d858e-89a7-4bbb-b7bf-dfb784f54a08>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://datascience.stackexchange.com/tags/feature-engineering/hot?filter=all\",\"WARC-Payload-Digest\":\"sha1:SMFKVXOYGBRBIYMUL7ZWUM4RA2P6UE3V\",\"WARC-Block-Digest\":\"sha1:OTSZVQYE56QFRY4E7L7C6VD2GMIEBUBN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585441.99_warc_CC-MAIN-20211021195527-20211021225527-00418.warc.gz\"}"}
https://blog.epigno.systems/2016/12/09/small-steps-to-scala-2/
[ "", null, "2/20\n\nFunctions and structures\n\n• while loops\n• do while loops\n• for loops\n• functions\n• anonymous functions\n\nIn this section we will look at control structures and functions. If you are using the Scala REPL, you could copy/paste complex structures directly into the shell by first issuing the command :paste and once you are done Ctrl-D.\n\nHere is an example\n\nscala> :paste\n// Entering paste mode (ctrl-D to finish)\n\ndef divNums (num1: Int, num2: Int) = try\n{\nnum1 / num2\n} catch {\ncase ex: java.lang.ArithmeticException => \"Nope! Can't do!\"\n} finally {\n// some cleanup\n}\n\nprintln(divNums(1,0))\n<<< this is where you issue Ctrl+D\n// Exiting paste mode, now interpreting.\n\nNope! Can't do!\ndivNums: (num1: Int, num2: Int)Any\n\nscala>\n\nRun the examples below in your Scala shell and see the results.\n\nWhile loops\n\nvar i = 0; while (i <= 10) { println(i); i += 1 }\n\nDo while loops\n\nvar i = 0; do { println(i); i += 1} while (i <= 10)\n\nFor loops\n\nRegular for loops\n\nfor (i <- 1 to 10) println(i) // inclusive 10\nfor (i <- 1 until 10) println(i) // exclusive 10\n\nUsing for loop to traverse a string.\n\nval letters = \"ABCDEFGHJKLMNOPQRSTUVXYWZ\"\n\nfor (i <- 0 until letters.length) {\nprint(s\"\\${letters(i)} \")\n}\n\nReading from a list\n\nval lst = List(1, 2, 3, 4, 5)\n\nfor (i <- lst){\nprintln(s\"A list with the element \\$i \"))\n}\n\nA double for loop\n\nfor (i <- 1 to 5; j <- 6 to 10) println(s\"\\$i, \\$j\")\n\nA for comprehension loop with a boolean condition\n\n{for(x <- 1 to 10 if x % 2 == 1) yield x * 10 } foreach(println)\n\nFunctions\n\nA function will be defined by the def keyword, it may take one, more or no parameters.\nFor non recursive functions, the return type doesn't need to be specified.\n\ndef fact(n: Int) = {\nvar r = 1\nfor (i <- 1 to n) r = r * i\nr // return keyword is not needed\n}\n\nHowever, for recursive functions, the return type needs to be specified, otherwise you will be greeted with recursive method fact needs result type error.\n\ndef fact(n: Int): BigInt = if (n <= 0) 1 else n * fact(n - 1)\n\nThe function below has one default argument, which can be omitted when the function is called. While the other arguments, if given in the correct order, they don't need to be called by name:\n\ndef getCalc(num1: Int, num2: Int, num3: Int = 2): Int = {\nnum1 + num2 * num3\n}\n\nCalling the function without the positional argument and with the default values\n\nscala> getCalc(1,3)\n// res: Int = 7\n\nCalling the function without the positional argument and changing the default values\n\nscala> getCalc(1, 3, 4)\n// res: Int = 13\n\nCalling the function with the positional arguments and default values\n\nscala> getCalc(num2 = 1,num1 = 3)\n// res: Int = 5\n\nYou can have a function with variable number of arguments\n\ndef summation(args: Int*) = {\nvar res = 0\nfor (arg <- args) res += arg\nres\n}\n\nsummation(1,2,6,9,3)\n// res: Int = 21\n\nThe equivalent of a static function or method in Java it is called a procedure in Scala and the return type is a Unit.\n\ndef triangle(i: Int): Unit = {\nif(i < 0) return\nfor (x <- 0 to i) {\nprintln(\"x\" * x)\n}\n}\n\nAnonymous functions\n\nBelow are some scalaesque examples of anonymous functions.\n\n// following statements are all equivalent\nimport scala.language.postfixOps\n\n> (1 to 5) .map(2 *)\n> (1 to 5) .map(2 * _)\n> (1 to 5) .map(x => 2 * x)\n\nres3: scala.collection.immutable.IndexedSeq[Int] = Vector(2, 4, 6, 8, 10)\n\nPipeline anonymous functions\n\n> (1 to 10).filter(_ % 2 == 0).map(2 *)\nres12: scala.collection.immutable.IndexedSeq[Int] = Vector(4, 8, 12, 16, 20)\n\n[+] Scala series\n• Small steps to Scala 1/20 - the basiscs\n\n• Disclaimer: This is by no means an original work it is merely meant to serve as a compilation of thoughts, code snippets and teachings from different sources." ]
[ null, "https://blog.epigno.systems/content/images/2016/12/scala-1.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6459578,"math_prob":0.9868113,"size":3589,"snap":"2019-43-2019-47","text_gpt3_token_len":1066,"char_repetition_ratio":0.11659693,"word_repetition_ratio":0.02556391,"special_character_ratio":0.32293117,"punctuation_ratio":0.1389271,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9897186,"pos_list":[0,1,2],"im_url_duplicate_count":[null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-16T07:31:17Z\",\"WARC-Record-ID\":\"<urn:uuid:88e50179-430f-48be-b639-41599dc64950>\",\"Content-Length\":\"16041\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:22dfedf5-b30a-4c1c-b701-1a78729cc606>\",\"WARC-Concurrent-To\":\"<urn:uuid:5245fa33-4f48-4198-9a10-ceae80f800c4>\",\"WARC-IP-Address\":\"142.93.224.186\",\"WARC-Target-URI\":\"https://blog.epigno.systems/2016/12/09/small-steps-to-scala-2/\",\"WARC-Payload-Digest\":\"sha1:DBDRU2EPOX4LMBAP43CKF6JUWMCXMGXS\",\"WARC-Block-Digest\":\"sha1:OOBRETLZSMR3ZPV2T56AHOUWRARWHQ43\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986666467.20_warc_CC-MAIN-20191016063833-20191016091333-00121.warc.gz\"}"}
https://community.intel.com/t5/Intel-Fortran-Compiler/Signed-zero-issue/m-p/1177738/highlight/true
[ "Intel® Fortran Compiler\nBuild applications that can scale for the future with optimized code designed for Intel® Xeon® and compatible processors.\n27522 Discussions\n\n## Signed zero issue", null, "New Contributor II\n582 Views\n\nIs the following a bug?  Compiled with Fortran 2019u4 x64 under Windows 10 with /O:d.  I have read the Floating-point Optimizations section of the manual, but didn't find any mention of the treatment of minus zero.\n\nWith s=-1; y=s*0.0_8 we have IEEE_CLASS(y)==IEEE_POSITIVE_ZERO\n\n```program signed_zero_03\nuse, intrinsic :: ieee_arithmetic\nimplicit none\ninteger s\nreal(8) x,y\ns=-1\nx=0.0_8\ny = s * x\nwrite(*,*) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO)\ny = -1 * 0.0_8\nwrite(*,*) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO)\ny = s * 0.0_8\nwrite(*,*) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO)\nend```\n\nwith output\n\n``` F\nF\nT```\n\n1 Solution", null, "Black Belt Retired Employee\n582 Views\n\nNot a bug. If you want to rely on the stranger parts of IEEE arithmetic, you have to compile with /fp:strict.\n\nI modified the program as follows:\n\n```program signed_zero_03\nuse, intrinsic :: ieee_arithmetic\nimplicit none\ninteger s\nreal(8) x,y\ns=-1\nx=0.0_8\ny = s * x\nwrite(*,101) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO), y\n101 format (L1, 1X, Z16.16)\ny = -1 * 0.0_8\nwrite(*,101) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO), y\ny = s * 0.0_8\nwrite(*,101) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO) , y\nend```\n\nCompiling normally, I get:\n\n```F 8000000000000000\nF 8000000000000000\nT 0000000000000000```\n\nso you can see that the first two are negative zero, but the third is \"positive zero\".\n\nBut with /fp:strict:\n\n```F 8000000000000000\nF 8000000000000000\nF 8000000000000000```\n\nNow all three are negative zero. Without /fp:strict, the compiler is looser about such things and can give you arithmetically correct results that aren't what you get by strictly adhering to IEEE 754. Performance will be degraded in this mode.\n\n4 Replies", null, "Black Belt Retired Employee\n583 Views\n\nNot a bug. If you want to rely on the stranger parts of IEEE arithmetic, you have to compile with /fp:strict.\n\nI modified the program as follows:\n\n```program signed_zero_03\nuse, intrinsic :: ieee_arithmetic\nimplicit none\ninteger s\nreal(8) x,y\ns=-1\nx=0.0_8\ny = s * x\nwrite(*,101) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO), y\n101 format (L1, 1X, Z16.16)\ny = -1 * 0.0_8\nwrite(*,101) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO), y\ny = s * 0.0_8\nwrite(*,101) (IEEE_CLASS(y)==IEEE_POSITIVE_ZERO) , y\nend```\n\nCompiling normally, I get:\n\n```F 8000000000000000\nF 8000000000000000\nT 0000000000000000```\n\nso you can see that the first two are negative zero, but the third is \"positive zero\".\n\nBut with /fp:strict:\n\n```F 8000000000000000\nF 8000000000000000\nF 8000000000000000```\n\nNow all three are negative zero. Without /fp:strict, the compiler is looser about such things and can give you arithmetically correct results that aren't what you get by strictly adhering to IEEE 754. Performance will be degraded in this mode.", null, "New Contributor II\n582 Views\n\nThanks.  I hadn't cared about signed zeroes for a while and had forgotten which flags did what.", null, "Black Belt Retired Employee\n582 Views\n\nFWIW, I once tried arguing with the developers that a USE of the IEEE modules ought to imply /fp:strict. I was unpersuasive at this.Chapter 17.1 (Exceptions and IEEE Arithmetic) spends a lot of text saying that if certain items from the modules are \"accessible\" then certain behaviors are in effect. For example:\n\nThe processor’s fullest support is provided when all of IEEE_FEATURES is accessed as in\nUSE, INTRINSIC :: IEEE_ARITHMETIC; USE, INTRINSIC :: IEEE_FEATURES\nbut execution might then be slowed by the presence of a feature that is not needed.\n\nGiven the number of questions similar to yours that I received over the years, I thought such an implementation was appropriate and in the spirit if not the letter of the standard.", null, "Valued Contributor II\n582 Views\n\nI have served on a IEEE Committee related to metric for many years, one sees the huge amount of free work these committee people do and they should be thanked, as applies to the many on this board who give generous time to answer many questions, some of which are actually difficult.\n\nAs noted by Dr Fortran - standards are a compromise, but so is life.  But my life is a lot richer for Fortran and the friendly people on this forum.\n\nJohn", null, "" ]
[ null, "https://community.intel.com/t5/image/serverpage/avatar-name/intelgreeninverse-11/avatar-theme/candy/avatar-collection/Intel_Customer/avatar-display-size/message/version/2", null, "https://community.intel.com/t5/image/serverpage/image-id/19209i0C4521AE7C9FC755/image-dimensions/50x50/image-coordinates/0%2C0%2C698%2C698/constrain-image/false", null, "https://community.intel.com/t5/image/serverpage/image-id/19209i0C4521AE7C9FC755/image-dimensions/50x50/image-coordinates/0%2C0%2C698%2C698/constrain-image/false", null, "https://community.intel.com/t5/image/serverpage/avatar-name/intelgreeninverse-11/avatar-theme/candy/avatar-collection/Intel_Customer/avatar-display-size/message/version/2", null, "https://community.intel.com/t5/image/serverpage/image-id/19209i0C4521AE7C9FC755/image-dimensions/50x50/image-coordinates/0%2C0%2C698%2C698/constrain-image/false", null, "https://community.intel.com/t5/image/serverpage/avatar-name/inteldarkblue/avatar-theme/candy/avatar-collection/Intel_Customer/avatar-display-size/message/version/2", null, "https://community.intel.com/skins/images/F08C3D20E7280E387E53FB06B180EAA2/responsive_peak/images/icon_anonymous_message.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8415425,"math_prob":0.8927101,"size":4660,"snap":"2022-40-2023-06","text_gpt3_token_len":1304,"char_repetition_ratio":0.13896048,"word_repetition_ratio":0.5631443,"special_character_ratio":0.31223175,"punctuation_ratio":0.125,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98410136,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-27T13:40:38Z\",\"WARC-Record-ID\":\"<urn:uuid:517eb802-138a-48e7-b6a6-8ddd595c3ba7>\",\"Content-Length\":\"267197\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:abc98190-9336-4c96-9f0f-e6cb0a5dce06>\",\"WARC-Concurrent-To\":\"<urn:uuid:dde44220-3b85-414e-be13-596d447451bf>\",\"WARC-IP-Address\":\"18.67.76.66\",\"WARC-Target-URI\":\"https://community.intel.com/t5/Intel-Fortran-Compiler/Signed-zero-issue/m-p/1177738/highlight/true\",\"WARC-Payload-Digest\":\"sha1:X23CWV45GV7XED4QFNXSER7YNHQNQI3O\",\"WARC-Block-Digest\":\"sha1:PU6MTGIK7752OFQ75UOKVYVKQZHIPMO5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764494986.94_warc_CC-MAIN-20230127132641-20230127162641-00322.warc.gz\"}"}
https://www.elibrary.imf.org/view/journals/001/1990/087/article-A001-en.xml
[ "The Optimal Mix of Inflationary Finance and Commodity Taxation with Collection Lags\n\nWhen there are collection lags in the tax system, inflation reduces the real revenues. This is often offered as an argument for less reliance on the inflation tax. But the optimal rates of other taxes should also be reconsidered in the light of collection lags. When this is done, the focus shifts from the revenues (which can be recouped by changing the rates of these taxes), to the associated costs of collection. In a benchmark case where the average costs of collection are constant, the optimal inflation tax is independent of the collection lag.\n\n## Abstract\n\nWhen there are collection lags in the tax system, inflation reduces the real revenues. This is often offered as an argument for less reliance on the inflation tax. But the optimal rates of other taxes should also be reconsidered in the light of collection lags. When this is done, the focus shifts from the revenues (which can be recouped by changing the rates of these taxes), to the associated costs of collection. In a benchmark case where the average costs of collection are constant, the optimal inflation tax is independent of the collection lag.\n\n## I. Introduction\n\nWhen there is a lag between the accrual and the payment of taxes, inflation erodes the real value of the government’s revenues. This insight was developed, and its importance for less developed countries stressed, by Tanzi (1977). This has since been developed by Tanzi (1978) and many others, including most recently Choudhry (1990). The argument runs as follows. Inflationary finance has a twofold harmful effect on the economy when there are collection lags. Not only does it generate the usual deadweight loss by driving a wedge between the marginal benefit and cost of real balances, it also reduces the revenue from other kinds of taxes. Therefore, the marginal cost of using inflationary finance is higher when we take collection lags into account. The inference is that inflationary finance should be used less than would be indicated by an analysis that ignores collections lags.\n\nBut this is a partial equilibrium insight. It examines the dead-weight burden of inflationary finance at given rates of other kinds of taxes. When we recognize that collection lags exist, we should expand the analysis to consider the effect of these lags on the optimal mix of the inflation tax and other taxes. Since the marginal cost of the inflation tax rises at given rates of other taxes it becomes desirable to increase the rates of these other taxes. In the process, equilibrium prices in the economy will also change. The question is whether less reliance on inflationary finance is indicated even when all such responses are taken into account and the new optimal mix is established.\n\nThe optimal mix of inflation and commodity taxation was examined by Phelps (1973), and his analysis was extended and refined by several others, including Aghevli (1977), Kimbrough (1986), Frenkel (1987), and Végh (1989). A positive inflation tax can be optimal only if other feasible taxes have distortions of their own, and many of the above papers model these as “collection costs.” But they do not consider lags, so the Tanzi link between inflation and other taxes is missing. In this paper I shall modify the latest of these models, that of Végh, to incorporate such lags.\n\nThe results do not support the partial equilibrium intuition stated above. In a benchmark case where the average cost of collection of commodity taxes is constant, I find that the optimal inflation tax is independent of the length of the lag in the collection of commodity taxes. The optimal rate of commodity taxation takes the full burden of adjustment to offset the revenue loss. This is as if commodity taxation were indexed for inflation, a solution that is indeed adopted in many high-inflation countries. An equivalent procedure is to charge interest for the period of the collection lag on the taxes due.\n\nMore generally, if the average cost of collecting commodity taxes is a stable and rising function of the real revenue, then a longer collection lag implies a higher optimal inflation tax rate. This runs counter to the intuition outlined above. But the revenue erosion can be made good by changing the rates of commodity taxes. It is only to the extent that the adjustment of rates changes the cost of collection of those taxes, that the optimal rate of inflation is altered. If the inflation tax is kept unchanged and an indexation or interest scheme adopted for commodity taxes, a longer lag now makes it more costly to collect the commodity tax. Therefore, it becomes optimal to shift some of the tax burden toward the inflation tax. Correspondingly, there should be less than full indexation of commodity taxes, or less than full interest charged for the duration of the collection lag.\n\nI should emphasize that the analysis does nor negate the importance of collection lags, or the erosion of tax revenues due to inflation when such lags are present. But it does suggest that the optimal policy response to the recognition of these issues is in general not what the earlier partial intuition had led economists to believe..\n\n## II. Végh’s Model with Collection Lag\n\nMost of Végh’s notation will be retained, but the notation for interest and inflation rates will be generalized somewhat. Let πt denote the inflation rate between periods t and (t+1), and Π(t,s) the cumulative price multiple between periods t and s, that is\n\nΠ(t,s) = (1+πt)(1+πt+1) … (1+πs-1).\n\nSimilarly, it is the nominal interest rate and I(t,s) the cumulative nominal interest multiple, and rt the real rate of interest and R(t,s) the corresponding cumulative real interest multiple.\n\nThese satisfy\n\nI(t,s) = R(t,s) Π(t,s) for all t,s\n\nand\n\nI(t1,t3) = I(t1,t2) I(t2,t3) for all t1 < t2 < t3\n\nand similarly for R, Π.\n\nI will assume that the whole profile of real interest multiples R(t,s) is exogenous, and is equal to the reciprocals of the corresponding profile of the consumer’s utility discount factors. As in Végh, this is done to eliminate intrinsic dynamics and allow the model to settle down to a steady state at once.\n\nIn a steady state, where the real interest rate is constant and equal to r, the nominal interest rate constant and equal to i, and the inflation rate constant and equal to π, we have\n\nR(0,t) = (1+r)t, I(0,t) = (1+i)t, Π(0,t) = (1+π)t.\n\nThere is one perishable consumption good produced in each period using labor. It takes a unit of labor to produce a unit of the good. Let Pt denote the price of the good relative to labor in period t. Then, taking money in period t. Then, taking money in period 0 as the unit of account, the nominal prices in period t are\n\nΠ(0,t) for labor, Pt Π(0,t) for consumption.\n\nThere is a tax on period-t consumption at rate θt. If the quantity of consumption at time t is ct, then the nominal tax accrued at time t is θtctPtΠ(0,t). This amount is paid by the consumer to the firm at the time of purchase, but turned over by the firm to the government at time (t+k). Thus, k is the collection lag. It is assumed that the lag is fixed and known, as in the case of VAT payments made at fixed dates.\n\nNow the firm’s profit from producing and selling one unit of the consumption good at time t is\n\n$\\frac{\\left(1+{\\mathit{\\theta }}_{\\mathrm{t}}\\right){\\mathrm{P}}_{\\mathrm{t}}\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{I}\\left(0,\\mathrm{t}\\right)}-\\frac{{\\mathit{\\theta }}_{\\mathrm{t}}{\\mathrm{P}}_{\\mathrm{t}}\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{I}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)}-\\frac{\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{I}\\left(0,\\mathrm{t}\\right)}$\n\nCompetition will reduce this to zero. Simplifying the resulting equation, we find\n\n(1+θt) Pt - θt Pt/I(t,t+k) - 1 = 0,\n\nor\n\n$\\begin{array}{cc}{\\mathrm{P}}_{\\mathrm{t}}=\\frac{1}{1+{\\mathit{\\theta }}_{\\mathrm{t}}-{\\mathit{\\theta }}_{\\mathrm{t}}/\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)}.& \\left(1\\right)\\end{array}$\n\nWe can then define an ‘effective’ tax rate ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ by\n\n$\\begin{array}{cc}1+{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }=\\left(1+{\\mathit{\\theta }}_{\\mathrm{t}}\\right){\\mathrm{P}}_{\\mathrm{t}},& \\left(2\\right)\\end{array}$\n\nor using (1),\n\n$\\begin{array}{cc}{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }=\\frac{{\\mathit{\\theta }}_{\\mathrm{t}}/\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)}{1+{\\mathit{\\theta }}_{\\mathrm{t}}-{\\mathit{\\theta }}_{\\mathrm{t}}/\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)}& \\left(3\\right)\\end{array}$\n\nWe will see that all the consumer’s decisions are made as if, instead of the tax rate θt and the price Pt, he faces the tax rate ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ and price ${\\mathrm{P}}_{\\mathrm{t}}^{\\prime }=1$. When θt > 0 and I(t,t+k) > 1, we have ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }<{\\mathrm{\\theta }}_{\\mathrm{t}}$. In other words, the collection lag acts as if consumers face an effective rate of taxation on consumption lower than the announced rate.\n\nThis is the first of the general equilibrium effects of the collection lag we must consider. As the collection lag reduces the real tax revenues of the government, it gives the firms the benefit of holding on to these revenues for k periods. In equilibrium, competitive firms must pass on this benefit to consumers in the form of lower prices. If we had assumed that consumers directly pay the tax revenue, then they would benefit directly, and again would face a lower effective tax rate.\n\nNext consider the consumer’s transaction technology. If he holds an amount of money Mt, and spends a nominal amount Et, or a real amount et = EtΠ(0,t), it is assumed that the transaction requires time\n\nst - ν/(Mt/Et) et.\n\nObserving that\n\nEt - (1+0θt) ctPtΠ(0,t),\n\nusing (2), and defining real balances mt = Mt/Π(0,t), we have\n\n$\\begin{array}{cc}{\\mathrm{s}}_{\\mathrm{t}}=\\mathit{\\nu }\\left(\\frac{{\\mathrm{m}}_{\\mathrm{t}}}{\\left(1+{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\right){\\mathrm{c}}_{\\mathrm{t}}}\\right)\\left(1+{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\right){\\mathrm{c}}_{\\mathrm{t}}.& \\left(4\\right)\\end{array}$\n\nAs in Végh, I shall write the argument of ν as Xt for brevity. The function is defined over the range [0,Xs], where Xs corresponds to the saturation level of real balances. The function satisfies ν(Xs) = 0, and ν’(X) < 0, ν”(X) > 0 for all X in [0,XS].\n\nSuppose the consumer has an initial endowment of bQ units of account, and an endowment of a unit of time each period. Let ht denote his leisure. Define\n\n$\\begin{array}{cc}{\\mathit{\\gamma }}_{\\mathrm{t}}={\\mathrm{i}}_{\\mathrm{t}}/\\left(1+{\\mathrm{i}}_{\\mathrm{t}}\\right)=1-\\mathrm{I}\\left(0,\\mathrm{t}\\right)/\\mathrm{I}\\left(0,\\mathrm{t}+1\\right),& \\left(5\\right)\\end{array}$\n\nthe rate of tax on the consumer’s real balances, that is, the inflation tax. (Végh’s symbol for my γ is I; my I is the cumulative interest multiple.) With all this notation, the consumer’s budget constraint is\n\n$\\begin{array}{ccc}{\\mathrm{b}}_{0}& +\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\left(1-{\\mathrm{h}}_{\\mathrm{t}}\\right)\\hfill & \\\\ & =\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\left[\\left(1-{\\mathit{\\theta }}_{\\mathrm{t}}\\right){\\mathrm{c}}_{\\mathrm{t}}{\\mathrm{P}}_{\\mathrm{t}}+{\\mathrm{s}}_{\\mathrm{t}}+{\\mathit{\\gamma }}_{\\mathrm{t}}{\\mathrm{m}}_{\\mathrm{t}}\\right]\\hfill & \\\\ & =\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\left[\\left(1-{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\right){\\mathrm{c}}_{\\mathrm{t}}+{\\mathrm{s}}_{\\mathrm{t}}+{\\mathit{\\gamma }}_{\\mathrm{t}}{\\mathrm{m}}_{\\mathrm{t}}\\right].\\hfill & \\left(6\\right)\\end{array}$\n\nThe st in (6) is given by (4).\n\nSubject to (6), the consumer chooses the sequence (ct,ht,mt) to maximize\n\n$\\begin{array}{cc}\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\mathrm{U}\\left({\\mathrm{c}}_{\\mathrm{t}}-{\\mathrm{h}}_{\\mathrm{t}}\\right).& \\left(7\\right)\\end{array}$\n\nThis problem is exactly the same as in Végh (1989), except that θt is replaced by ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$. Therefore, I shall not be given any details, but merely note it defines the equilibrium price functions\n\n$\\begin{array}{cc}1+{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }={\\mathrm{y}}^{\\mathit{\\theta }}\\left({\\mathrm{c}}_{\\mathrm{t}},{\\mathrm{h}}_{\\mathrm{t}},{\\mathrm{m}}_{\\mathrm{t}}\\right)=\\frac{{\\mathrm{U}}_{\\mathrm{c}}\\left({\\mathrm{c}}_{\\mathrm{t}},{\\mathrm{h}}_{\\mathrm{t}}\\right)}{{\\mathrm{U}}_{\\mathrm{h}}\\left({\\mathrm{c}}_{\\mathrm{t}},{\\mathrm{h}}_{\\mathrm{t}}\\right)}\\left[1+\\mathit{\\nu }\\left({\\mathrm{X}}_{\\mathrm{t}}\\right)-{\\mathrm{X}}_{\\mathrm{t}}\\mathrm{\\nu }\\mathrm{}\\prime {\\left({\\mathrm{X}}_{\\mathrm{t}}\\right)}^{-1}\\right],& \\left(8\\right)\\end{array}$\n\nand\n\n$\\begin{array}{cc}{\\mathit{\\gamma }}_{\\mathrm{t}}={\\mathrm{y}}^{\\mathrm{I}}\\left({\\mathrm{c}}_{\\mathrm{t}},{\\mathrm{h}}_{\\mathrm{t}},{\\mathrm{m}}_{\\mathrm{t}}\\right)\\equiv -\\mathit{\\nu }\\prime \\left({\\mathrm{X}}_{\\mathrm{t}}\\right).& \\left(9\\right)\\end{array}$\n\nNow turn to the government’s problem. Assume that if it receives Tt units of account at time t, its collection costs are ϕ(Tt /A(0,t))Tt, where the average cost function is ϕ. The function A(0,t) represents technological progress in collection. Thus A(0,t+1)/A(0,t)-1 is the rate of improvement in the collection technology between periods t and (t+1). This is a very general formulation, which seems appropriate since we have no precise theory of the nature of these costs. At one extreme, one might think the cost consists literally of counting nominal cash. Then there is zero technical progress, and A(0,t) is constant. At another extreme, if auditing is costly but the cost is independent of the size of the audit, then the technology improves in pace with the nominal interest rate. More interestingly, Végh defines collection costs as a function of the real revenues. In my notation, this amounts to assuming that the nominal collection technology exactly keeps pace with inflation, or A(0,t) = Π(0,t) for all t.\n\nWe know that Tt+k = θtctPtΠ(0, t). Therefore, the discounted present value of the government’s receipts at tirae (t+k) is\n\n$\\begin{array}{cc}{\\mathrm{T}}_{\\mathrm{t}+\\mathrm{k}}/\\mathrm{I}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)& ={\\mathit{\\theta }}_{\\mathrm{t}}{\\mathrm{c}}_{\\mathrm{t}}{\\mathrm{P}}_{\\mathrm{t}}\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)/\\left[\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)\\mathrm{R}\\left(0,\\mathrm{t}\\right)\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)\\right]\\hfill \\\\ & ={\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{c}}_{\\mathrm{t}}/\\mathrm{R}\\left(0,\\mathrm{t}\\right)\\hfill \\end{array}$\n\nThe discounted present value of the collection costs at (t+k) is\n\n$\\begin{array}{cc}\\mathit{\\phi }\\left(\\begin{array}{c}{\\mathrm{T}}_{\\mathrm{t}+\\mathrm{k}}/\\mathrm{A}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)\\end{array}\\right){\\mathrm{T}}_{\\mathrm{t}+\\mathrm{k}}/\\left(0,\\mathrm{t}+\\mathrm{k}\\right)& =\\mathit{\\phi }\\left(\\frac{{\\mathit{\\theta }}_{\\mathrm{t}}{\\mathrm{c}}_{\\mathrm{t}}{\\mathrm{P}}_{\\mathrm{t}}\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{A}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)}\\right){\\mathit{\\theta }}_{\\mathrm{t}}{\\mathrm{c}}_{\\mathrm{t}}{\\mathrm{P}}_{\\mathrm{t}}\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)/\\mathrm{I}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)\\hfill \\\\ & =\\mathit{\\phi }\\left({\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{c}}_{\\mathrm{t}}\\frac{\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{A}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)}\\right){\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{c}}_{\\mathrm{t}}/\\mathrm{R}\\left(0,\\mathrm{t}\\right).\\hfill \\end{array}$\n\nFor brevity, write\n\n$\\begin{array}{cc}{\\mathrm{B}}_{\\mathrm{t},\\mathrm{k}}=\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)/\\mathrm{A}\\left(0,\\mathrm{t}+\\mathrm{k}\\right).& \\left(10\\right)\\end{array}$\n\nThe government purchases exogenously specified quantities (gt) of the good through time. Then the government’s budget constraint becomes\n\n$\\begin{array}{cc}\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}{\\mathrm{g}}_{\\mathrm{t}}=\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\left\\{\\left[1-\\mathit{\\phi }\\left({\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{c}}_{\\mathrm{t}}{\\mathrm{B}}_{\\mathrm{t}},\\mathrm{k}\\right)\\right]{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{c}}_{\\mathrm{t}}+{\\mathit{\\gamma }}_{\\mathrm{t}}{\\mathrm{m}}_{\\mathrm{t}}\\right\\},& \\left(11\\right)\\end{array}$\n\nand the economy’s overall resource constraint is\n\n$\\begin{array}{ccc}{\\mathrm{b}}_{0}& +\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\left(1-{\\mathrm{h}}_{\\mathrm{t}}\\right)\\hfill & \\\\ & =\\underset{\\mathrm{t}=0}{\\overset{\\mathrm{\\infty }}{\\mathrm{\\Sigma }}}\\mathrm{R}{\\left(0,\\mathrm{t}\\right)}^{-1}\\left\\{\\left[1+\\mathit{\\phi }\\left({\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{c}}_{\\mathrm{t}}{\\mathrm{B}}_{\\mathrm{t}},\\mathrm{k}\\right){\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\right]{\\mathrm{c}}_{\\mathrm{t}}\\overline{+}{\\mathrm{g}}_{\\mathrm{t}}+\\mathit{\\nu }\\left({\\mathrm{X}}_{\\mathrm{t}}\\right){\\mathrm{c}}_{\\mathrm{t}}\\left(1+{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\right)\\right\\}.\\hfill & \\left(12\\right)\\end{array}$\n\nThe government can be regarded as choosing (ct,ht,mt) subject to these two constraints and the equilibrium price functions, to maximize the utility sum in (7). The policy is assumed to be committed in advance; thus issues of time-’neonsistency are not addressed.\n\n## III. The Invariance Result\n\nThe collection lag k enters this problem only through Bt,k, which is an argument of the average collection cost function ϕ. Therefore, the simplest benchmark cases to consider are the ones where the value of ϕ is not affected by its argument, and where Bt, k does not depend on k. In either of these cases, the solution to the government’s optimization problem determines γt and ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ independently of k. If k changes, the actual tax rates on consumption, θt, will be adjusted to maintain the same values of the effective rates ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ as before. Inverting (1), we get\n\n$\\begin{array}{cc}{\\mathit{\\theta }}_{\\mathrm{t}}=\\frac{{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)}{1-{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\left[\\mathrm{I}\\left(\\mathrm{t}+\\mathrm{k}-1\\right)\\right]}.& \\left(13\\right)\\end{array}$\n\nThis can be seen as a kind of indexation of the tax system.\n\nA better interpretation is that interest is charged on accrued tax payments over the period of the collection lag. A firm that collects one unit of account from the consumer at time t must pay I(t,t+k) units to the government at time (t+k). Let ${\\mathrm{P}}_{\\mathrm{t}}^{\\prime }$ denote the price of the consumer good relative to labor under this system. Now the firm’s profit from producing and selling a unit of output at time t is\n\n$\\frac{\\left(1+{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }\\right)\\mathrm{F}\\prime \\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{I}\\left(0,\\mathrm{t}\\right)}-\\frac{{\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }{\\mathrm{P}}_{\\mathrm{t}}^{\\prime }\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)\\mathrm{I}\\left(\\mathrm{t},\\mathrm{t}+\\mathrm{k}\\right)}{\\mathrm{I}\\left(0,\\mathrm{t}+\\mathrm{k}\\right)}-\\frac{\\mathrm{\\Pi }\\left(0,\\mathrm{t}\\right)}{\\mathrm{I}\\left(0,\\mathrm{t}\\right)}.$\n\nSetting this equal to zero for a competitive equilibrium, we get ${\\mathrm{P}}_{\\mathrm{t}}^{\\prime }=1$. When I defined the effective rate ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$, I said that it could be interpreted as if the consumer faced this rate and a price equal to one. The procedure of collecting interest on the taxe? makes that as if into a reality.\n\nUnder either system, the same inflation rate as before will remain optimal as the collection lag changes, and the consumption tax will be adjusted to offset the effect on the revenue.\n\nWe saw two kinds of circumstances where k does not affect Bt,k and therefore the optimal values of ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ and τt: (1) The average cost of collection is constant, that is ϕ(z) = ϕ0, constant, for all values of the argument z. This is also the benchmark case considered by Végh. (2) The rate of progress in the collection technology always equals the nominal rate of interest, so I(t,t+k)/A(0,t+k) and therefore Bt,k is independent of k. This seems an exceptional or ‘razor’s edge’ case, but it helps us develop the intuition behind the result.\n\nAs k changes, suppose we hold ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ and γt at their old optimal values, but charge interest on tax revenues held by firms for the longer collection lag. Then the amount collected goes up at the rate of interest. But if the collection technology improves exactly in step, the cost of collecting each unit of revenue is unchanged, and therefore so is the present value of the collection costs. Then the optimality conditions are unaffected, so it remains optimal to keep ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ and γt unchanged.\n\n## IV. The General Case\n\nWhen the average cost of collection ϕ is an increasing function, and k affects Bt,k, the length of the collection lag does alter the optimal inflation tax rate. To examine this in more detail, I specialize the analysis to a steady state, as does Végh at the corresponding point in his paper. Now the time subscripts can be dropped from all the variables, and a constant capitalization factor (l+r)/r dropped from the present value constraints. I follow Végh in setting b0 = 0 and choosing the utility function\n\n$\\begin{array}{cc}\\mathrm{U}\\left(\\mathrm{c},\\mathrm{h}\\right)=\\mathrm{ln}\\phantom{\\rule[-0.0ex]{0.2em}{0.0ex}}\\mathrm{c}+\\mathrm{ln}\\phantom{\\rule[-0.0ex]{0.2em}{0.0ex}}\\mathrm{h};& \\left(14\\right)\\end{array}$\n\nboth are matters of algebraic convenience that do not affect the basic results.\n\nNow the consumer’s optimization yields h = ½, and then the equilibrium price functions can be written\n\n$\\begin{array}{cc}\\mathrm{c}\\left(1+\\mathit{\\theta }\\prime \\right)=\\frac{1}{2}\\frac{1}{1+\\mathit{\\nu }\\left(\\mathrm{X}\\right)-\\mathrm{X}\\mathrm{}\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)},& \\left(15\\right)\\end{array}$\n\nand\n\n$\\begin{array}{cc}\\mathit{\\gamma }=-\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right),& \\left(16\\right)\\end{array}$\n\nwhere\n\n$\\begin{array}{cc}\\mathrm{X}=\\mathrm{m}/\\left(\\mathrm{c}\\left(1+\\mathit{\\theta }\\prime \\right)\\right).& \\left(17\\right)\\end{array}$\n\nIf a steady state is to exist, Bt,k must be independent of t. In a steady state, (10) becomes\n\nBt,k - (l+i)k (l+π)t/(l+a)t+k,\n\nwhere a is the constant rate of improvement of the collection technology. For this to be independent of t, we need a = π, and then\n\nBt,k = (l+i)k/(l+π)k = (l+r)k.\n\nThis is exactly the implicit assumption about technical progress in Végh. He defines the real average costs of collection as a stable function of the real revenues. In my notation, this amounts to assuming that the collection technology improves in step with inflation, that is, A(0,t) = Π(0,t), or with constant rates in a steady state, a = π. Therefore, I make this assumption to proceed with the steady state analysis.\n\nWrite Bt,k as B for short. Since the real rate of interest must be positive to ensure convergence of the consumer’s and the government’s objective functions, b is increasing in k.\n\nNext write z = θ’c, so c(l+θ’) - (c+z). Then the government’s budget constraint (11) becomes\n\n$\\begin{array}{cc}\\left[1-\\mathit{\\phi }\\left(\\mathrm{zB}\\right)\\right]\\mathrm{z}-\\left(\\mathrm{c}+\\mathrm{z}\\right)\\phantom{\\rule[-0.0ex]{0.2em}{0.0ex}}\\mathrm{X}\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)=\\mathrm{g}.& \\left(18\\right)\\end{array}$\n\nThe overall resource constraint (12) reduces to (15). The objective function is simply ln(c).\n\nWe can regard c, z, and X as the choice variables. Since these are subject to the two constraints (IS) and (18), there is one degree of freedom, and one independent first-order condition emerges. After some algebra, it can be written as\n\n$\\begin{array}{cc}\\mathit{\\phi }\\left(\\mathrm{zB}\\right)+\\mathrm{zB}\\mathrm{}\\mathit{\\phi }\\prime \\left(\\mathrm{zB}\\right)=\\frac{\\mathrm{X}\\left[\\left(\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right){\\right)}^{2}-\\mathit{\\nu }\\left(\\mathrm{X}\\right)\\mathit{\\nu }\"\\left(\\mathrm{X}\\right)\\right]-\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)\\left[1+\\mathit{\\nu }\\left(\\mathrm{X}\\right)\\right]}{\\mathrm{X\\nu }\"\\left(\\mathrm{X}\\right)}.& \\left(19\\right)\\end{array}$\n\nThe solution can be shown diagrammatically, following Végh’s method.’ It is most convenient to do this in terms of two variables, a compound variable ζ = zB, and the inflation tax rate γ, which is negatively related to X by (16).\n\nThe two equations in terms of ζ and X are the Fiscal Equilibrium condition (FE)\n\n$\\begin{array}{cc}\\frac{1}{\\mathrm{B}}\\left[1-\\mathit{\\phi }\\left(\\mathit{\\zeta }\\right)\\right]\\mathit{\\zeta }-\\frac{1}{2}-\\frac{\\mathrm{X}\\mathrm{\\left(}\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)}{1+\\mathit{\\nu }\\left(\\mathrm{X}\\right)+\\mathrm{X}\\mathrm{\\left(}\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)}=\\mathrm{g},& \\left(20\\right)\\end{array}$\n\nand the Optimality Condition (OC)\n\n$\\begin{array}{cc}\\mathit{\\phi }\\left(\\mathit{\\zeta }\\right)+\\mathit{\\zeta \\phi }\\prime \\left(\\mathit{\\zeta }\\right)=\\frac{{\\mathrm{X}\\mathit{\\left[}\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)\\right)}^{2}-\\mathit{\\nu }\\left(\\mathrm{X}\\right)\\mathit{\\nu }\"\\left(\\mathrm{X}\\right)\\right]-\\mathit{\\nu }\\prime \\left(\\mathrm{X}\\right)\\left[1+\\mathit{\\nu }\\left(\\mathrm{X}\\right)\\right]}{\\mathrm{X}\\mathit{}\\mathit{\\nu }\"\\left(\\mathrm{X}\\right)}.& \\left(21\\right)\\end{array}$\n\nThese are generalizations of the correspondingly numbered and labelled equations of Végh, incorporating collection lags.\n\nFigure 1 shows the two curves in (γ,ζ) space. Following Végh’s argument, the curve FE is downward-sloping and the curve OC is upward-sloping. Their intersection determines the optimal values of γ and ζ. The former is just the inflation tax; the consumption tax rate θ’ can be computed from ζ.\n\nAt the optimum, the left-hand side of (20) is an increasing function of ζ and a decreasing function of X; this is because the tax revenue is increasing in the tax rates. New an increase k raises B, which lowers the first term in (20). To restore equality, we must increase ζ or reduce X (increase γ). Thus the increase in k shifts the FE curve upward and to the right to the new position FE’. The optimal γ increases.\n\nThe intuition is as follows. If θ’ and γ are kept unchanged, an increase in ζ raises ζ equiproportionately which increases the average cost of collection of taxes on consumption. This disturbs the balance of benefits and costs of the two kinds of taxes. The consumption tax now has a higher marginal cost per unit of revenue than the inflation tax, making it desirable to switch some of the burden of taxation away from consumption and toward inflation. At the new optimum, the inflation tax is levied at a higher rate, and the consumption tax is less than fully indexed, or less than full interest is charged for the tax revenues held by the firms for the length of the collection lag. Note that the conventional argument based on the loss of revenue is not the driving force; instead, the general equilibrium reasoning rests on the ‘secondary’ effects on collection costs.\n\nA restatement of the intuition further clarifies the issue. Suppose we proceed as suggested by the invariance result, keeping ${\\mathit{\\theta }}_{\\mathrm{t}}^{\\prime }$ and γt unchanged, and charging nominal interest on the taxes due for the period of the collection lag. Since the real interest rate is positive, when the revenues are finally received, they are larger in real terms. Under Végh’s specification, the average cost of collection is a stable function of the real revenues. Therefore, the average cost of collecting the larger real revenues is now higher.\n\nThe particular model studied in this paper embodies many specific assumptions. The ‘regular’ tax is levied on consumption, it is collected by the firms in advance and held for the duration of the collection lag, and so on. But similar analysis comparing other kinds of taxes (for example, on labor income) and the inflation tax can be constructed. The specific results will depend on the nature of the collection or distortion costs associated with the tax system. For example, the costs of the regular tax system are a function of the effective rate θ’, then the invariance result will prevail.\n\nBut as a general point, the analysis emphasizes the need for looking at the issue in a wider framework than has been common. When we recognize the existence of a collection lag, our response should be to re-calculate the whole tax structure, and not merely the inflation tax. When this is done, the important channel of interaction is the effect of the inflation tax on the collection (or distortion) costs associated with the other taxes, not on the revenues from those taxes.\n\n## References\n\n• Aghevli, Bijan B., “Inflationary Finance and Growth,”. Journal of Political Economy, 85, (December 1977), 12951307.\n\n• Choudhry, Nurun N., “Fiscal Revenue and Inflationary Finance,” Working Paper No. 90/48, (International Monetary Fund, 1990).\n\n• Frenkel, Jacob, “Comment on Zvi Hercovitz and Efraim Sadka’s ‘Optimal Currency Substitution Policy and Public Finance’,” in Economic Policy in Theory and Practice, eds. Asaaf Razin and Efraim Sadka, (London: Macmillan, 1987), 165169.\n\n• Export Citation\n• Kimbrough, Kent S., “The Optimum Quantity of Money Rule in the Theory of Public Finance,” Journal of Monetary Economics, 18, (November 1986), 277284.\n\n• Export Citation\n• Phelps, Edmund S., “Inflation in the Theory of Public Finance,” Swedish Journal of Economics, 75, (March 1973), 6782\n\n• Tanzi, Vito, “Inflation, Lags in Collection, and the Real Value of Tax Revenue,” IMF Staff Papers, 24, (March 1977), 154167.\n\n• Tanzi, Vito, “Inflation, Real Tax Revenue, and the Case for Inflationary Finance: Theory with an Application to Argentina,” IMF Staff Papers, 25, (September 1978), 417451." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92242664,"math_prob":0.99936336,"size":18161,"snap":"2022-27-2022-33","text_gpt3_token_len":4194,"char_repetition_ratio":0.16258192,"word_repetition_ratio":0.025682705,"special_character_ratio":0.22449204,"punctuation_ratio":0.11553238,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9993693,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-17T09:48:43Z\",\"WARC-Record-ID\":\"<urn:uuid:75d5c0bd-f45c-43d7-9110-5c671d4786fe>\",\"Content-Length\":\"644287\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:46ac3e7e-2a87-4ded-b7b0-c6e0fc935169>\",\"WARC-Concurrent-To\":\"<urn:uuid:04a5c6c3-9811-471c-9e25-782d51487da5>\",\"WARC-IP-Address\":\"52.18.41.139\",\"WARC-Target-URI\":\"https://www.elibrary.imf.org/view/journals/001/1990/087/article-A001-en.xml\",\"WARC-Payload-Digest\":\"sha1:XC5PAUJ5RYE764JQRTEVBUHB3HLGLFIP\",\"WARC-Block-Digest\":\"sha1:H2FRGKKNLCLZMHIMNCM7QR4HZ5O57Q3R\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882572898.29_warc_CC-MAIN-20220817092402-20220817122402-00023.warc.gz\"}"}
https://www.tutorialspoint.com/heating-effect-of-electric-current
[ "# Heating Effect of Electric Current\n\nWhen electric current is passed through a conductor, heat is generated in the conductor. This effect of electric current is known as heating effect of electric current.\n\nIn practice, when electric current is passed through the element of an electric heater, the element of the heater becomes red hot, because the electrical energy is converted into the heat energy. This is called heating effect of electric current and is used in manufacturing of many heating appliances like electric iron, electric kettle etc.\n\n## Cause of Heating Effect of Electric Current\n\nWhen a potential difference is applied across the ends of a conductor, the free electrons moves with drift velocity and thus constitute the electric current in the conductor. The moving free electrons in the conductor collide with positive ions of the conductor.\n\nOn collision, the kinetic energy of free electrons being transferred to the ions with which they have collided. As a result of it, the kinetic energy of vibrations of the positive ions increases and hence the temperature of the conductor increases. Since the source of emf maintaining current in the conductor. Therefore, the electrical energy supplied by the source is converted into heat energy in the conductor.\n\n## Heat Produced in a Conductor by Electric Current\n\nAn English physicist James Prescott Joule found in his experiments that the amount of heat produced (H) when an electric current I amperes flows through a conductor of resistance R ohms for time t seconds is given by,", null, "$$\\mathrm{\\mathit{H=I^{2}Rt}\\: Joules}$$\n\nThis expression is known as Joule’s law of heating.\n\nTherefore, according to Joule’s law of heating, the heat produced in a conductor is directly proportional to −\n\n• Square of current through the conductor,\n• Resistance of the conductor, and\n• Time for which current being passed through the conductor.\n\n## Applications of Heating Effect of Electric Current\n\nThe heating effect of electric current is used in manufacturing of many heating appliances like electric heater, electric iron, electric bulb, electric kettle, soldering iron, electric toaster etc. Some of them are discussed as follows −\n\n• Electric Heater − In electric heater, an electric current is passed through a high resistance (called heating element), thus producing the required heat. The heating element used is an alloy of nickel and chromium, called nichrome.\n\n• Electric Bulb − Electric current is passed through the filament (made up tungsten) of the bulb due to which it being heating up to a certain temperature after which it is illuminated.\n\n• Electric iron − In electric iron also, the current is passed through the heating element which is insulated from the iron box by mica. The heat produced in the element is transferred to the metallic part via mica.\n\n• Electric Fuse − The heating effect of electric current also being used in manufacturing electric fuse for protecting electric circuits and devices. An electric fuse is a small piece of wire made up of thin tinplated copper or zinc having low melting point. When the electric current in an electric circuit increases too much due to some reason, the fuse wire gets heated too much, melt and break the circuit. Hence, protecting the electric circuit and appliances being damaged." ]
[ null, "https://www.tutorialspoint.com/assets/questions/media/54512/electric_current.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89614475,"math_prob":0.9596204,"size":5395,"snap":"2023-14-2023-23","text_gpt3_token_len":1103,"char_repetition_ratio":0.23724726,"word_repetition_ratio":0.04608295,"special_character_ratio":0.202595,"punctuation_ratio":0.08314856,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97209156,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-04-01T18:27:59Z\",\"WARC-Record-ID\":\"<urn:uuid:b79a904e-e6c3-4b33-ad6d-e4fba61516ff>\",\"Content-Length\":\"43040\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:6a9408ba-cffd-45ee-a9fc-d02b703b8c38>\",\"WARC-Concurrent-To\":\"<urn:uuid:bebf5fa7-62f6-40d2-a897-7753bf246dc0>\",\"WARC-IP-Address\":\"192.229.210.176\",\"WARC-Target-URI\":\"https://www.tutorialspoint.com/heating-effect-of-electric-current\",\"WARC-Payload-Digest\":\"sha1:RRQUVKKABENR5SQ5B3XR5SYN5N2KNU3A\",\"WARC-Block-Digest\":\"sha1:QNY6YYICDMIE4M3GVSKF32A7RHW4Z6O4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296950110.72_warc_CC-MAIN-20230401160259-20230401190259-00696.warc.gz\"}"}
https://help.scilab.org/docs/6.1.1/en_US/pinv.html
[ "Scilab Home page | Wiki | Bug tracker | Forge | Mailing list archives | ATOMS | File exchange\nScilab-Branch-6.1-GIT\nChange language to: Français - Português - 日本語 - Русский\n\n# pinv\n\npseudoinverse\n\n### Syntax\n\n`pinv(A,[tol])`\n\n### Arguments\n\nA\n\nreal or complex matrix\n\ntol\n\nreal number\n\n### Description\n\n`X= pinv(A)` produces a matrix `X` of the same dimensions as `A'` such that:\n\n`A*X*A = A, X*A*X = X` and both `A*X` and `X*A` are Hermitian .\n\nThe computation is based on SVD and any singular values lower than a tolerance are treated as zero: this tolerance is accessed by `X=pinv(A,tol)`.\n\n### Examples\n\n```A=rand(5,2)*rand(2,4);\nnorm(A*pinv(A)*A-A,1)```\n\n• rank — rank\n• svd — singular value decomposition\n• qr — QR decomposition\n\n### Used Functions\n\n`pinv` function is based on the singular value decomposition (Scilab function `svd`)." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7028727,"math_prob":0.9208465,"size":744,"snap":"2022-40-2023-06","text_gpt3_token_len":209,"char_repetition_ratio":0.10135135,"word_repetition_ratio":0.3114754,"special_character_ratio":0.22715054,"punctuation_ratio":0.08219178,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95901704,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-28T03:51:02Z\",\"WARC-Record-ID\":\"<urn:uuid:9ab5d632-2d56-4a53-8530-30c63fb3c602>\",\"Content-Length\":\"22892\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b477e1ae-9e37-4829-ad90-0273096355a9>\",\"WARC-Concurrent-To\":\"<urn:uuid:8fd253db-0e81-4ceb-94e8-7206848d03d4>\",\"WARC-IP-Address\":\"176.9.3.186\",\"WARC-Target-URI\":\"https://help.scilab.org/docs/6.1.1/en_US/pinv.html\",\"WARC-Payload-Digest\":\"sha1:PEBBUH2V2QEU4X4GJ2STB667677WRPGR\",\"WARC-Block-Digest\":\"sha1:4ZDTWUB6QGJ2JMMYE336ATKSFZ3BI7GL\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335059.43_warc_CC-MAIN-20220928020513-20220928050513-00446.warc.gz\"}"}
http://www.thermalradiation.net/referenc.html
[ "## A CATALOG OF RADIATION HEAT TRANSFER CONFIGURATION FACTORS\n\nJohn R. Howell\nUniversity of Texas at Austin\n\n## REFERENCES", null, "Abishek, S., Srinivasa Ramanujam, K. and Katte, S.S., 1995, \"View Factors between Disk/Rectangle and Rectangle in Parallel and Perpendicular Planes,\"J. Thermophsics, vol. 21, no. 1, pp. 236-239.\n\n Derives factors by contour integration, and presents final analytical expressions. The resulting expressions contain integrals that must be evaluated numerically. Numerical integrations are carried out for particular cases, and the results are correlated and expressions are presented for various ranges of the geometric parameters. Error ranges and correlation coefficients are given for each correlation.\n\nAlexandrov, V.T., 1965, \"Determination of the angular radiation coefficients for a system of two coaxial cylindrical bodies,\" Inzh. Fiz. Zh., vol. 8, no. 5, pp. 609-612.\n\n Uses numerical integration of fundamental defining relation between two elements to find factor from inner surface of outer coaxial cylinder to outer surface of inner directly opposed cylinder of the same finite length. Closed form is found for outer-outer factor, and outer-to-inner finite area factor is found by numerical integration. Configuration factor algebra is then used to obtain factor from inner cylinder to annular ring end.\n\nAlciatore, David and Lipp, Stephen, 1989, \"Closed form solution of the general three dimensional radiation configuration factor problem with microcomputer solution,\" Proc. 26th National Heat Transfer Conf., Philadelphia, ASME.\n\n Presents general algorithm for finding factor between any three-dimensional contour and a differential element. Formulation is based on the unit sphere technique of Nusselt (1928). Results of computer implementation of the method are compared with exact formulation for element to a polygon.\n\nAlfano, G. and Sarn , A., 1975, \"Normal and hemispherical thermal emittances of cylindrical cavities,\" J. Heat Transfer, vol. 97, no. 3, pp. 387-390, August.\n\n Gives factors from a differential element on and normal to the axis to a differential ring element on the interior of a concentric right circular cylinder; from a differential element to a circular ring element on a parallel disk when the element is on the disk axis; from the interior surface of a circular cylinder to a differential element on and normal to the cylinder axis; and from a disk to a differential element which is on and normal to the disk axis. All are in closed form.\n\nAmeri, A. and Felske, J.D., 1982, \"Radiation configuration factors for obliquely oriented finite length circular cylinders,\" Int. J. Heat Mass Transfer, vol. 33, no. 1, pp. 728-736.\n\n Numerical integration is used to compute the factors between the exteriors of two cylinders of equal radius and length, and oriented to one another in various ways. Factors between one cylinder and a second of one-half the length of the first are also given. Most results are for rotation of cylinder two about the normal through the center or the end of the axis of cylinder one. Closed- form relations derived by fitting the numerical results are presented. Graphical and some tabular data are presented.\n\nAmbirajan, Amrit and Venkateshan, S.P., 1993, \"Accurate determination of diffuse view factors between planar surfaces,\" Int. J. Heat Mass Transfer, vol. 36, no. 8, pp. 2203- 2208.\n\n Uses numerical evaluation of general double integral obtained by contour integration around polygonal surfaces. Special cases of intersecting and non intersecting surfaces are discussed. Numerical results are presented for the cases of directly opposed isosceles triangles, squares, and regular pentagons, hexagons, and octagons, as well as adjoint plates of finite length at various intersection angles. Points out some errors in similar results in Feingold (1966).\n\nBallance, J.O. and Donovan, J., 1973, \"Radiation configuration factors for annular rings and hemispherical sectors,\" J. Heat Transfer, vol. 95, no. 2, pp. 275-276, May.\n\n Monte Carlo method is used to find the factors to within approximately 5 percent.\n\nBartell, F.O. and Wolfe, W.L., 1975, \"New approach for the design of blackbody simulators,\" Appl. Opt., vol. 14, no. 2, pp. 249-252, February.\n\n Includes closed-form relations for factors from sphere interior to element on interior; from circular cone interior to base; and from right circular cylinder to base.\n\nBernard, Jean-Joseph and Genot, Jeanne, 1971a, \"Diagrams for computing the radiation of axisymmetric surfaces (propulsive nozzles),\" Office National d' Etudes et de Recherches Aerospatiales, Paris, France, ONERA-NT-185 (in French).\n\n Gives diagrams for finding exchange between exterior elements and between interior elements on various bodies of revolution. Closed form relations are not given, but auxiliary functions are presented that can be used to find equivalent configuration factors. For exterior elements, relations are given for two coaxial cones connected at their apexes; two truncated coaxial cones connected at the small ends; a cylinder connected to the small end of a circular cone; and a concentric disk normal to the cone axis at the cone apex. For interior surfaces, cases treated are two attached truncated coaxial cones; a cylinder attached to a truncated coaxial cone; and from any interior element in these assemblies to the end disks.\n\nBernard, Jean-Joseph and Genot, Jeanne, 1971b, \"Royonnement thermique des surfaces de revolution,\" Int. J. Heat Mass Transfer, vol.14, no. 10, pp. 1611-1619, October.\n\n Contains abridged information from Bernard and Genot (1971a).\n\nBien, Darl D., 1966, \"Configuration factors for thermal radiation from isothermal inner walls of cones and cylinders,\" J. Spacecraft Rockets, vol. 3, no. 1, pp. 155-156.\n\n Uses known disk-to-disk factors and configuration factor algebra to derive factors from inside surface of cone, right circular cylinder or frustum of cone to ends.\n\nBobco, R.P., 1966, \"Radiation from conical surfaces with nonuniform radiosity,\" AIAA J., vol. 4, no. 3, pp. 544-546.\n\n Derives factor from planar element in plane of base of right circular cone to cone interior in form of integral relation. Cone apex is below the element. Numerical results are presented for cone half-angles of 10o and 20o. See Edwards (1969) for discussion of some errors in this reference.\n\nBoeke, Willem and Wall, Lars, 1976, \"Radiative exchange factors in rectangular spaces for the determination of mean radiant temperatures,\" Build. Serv. Engng., vol. 43, pp. 244- 253, March.\n\n Derives analytical expressions for configuration factors between plane rectangles contained within adjoint and opposed planes. Some tabulated factors are given.\n\nBornside, D.E. and Brown, R.A., 1990, \"View factor between differing-diameter, coaxial disks blocked by a coaxial cylinder,\" J. Thermophys. Heat Transfer, vol. 4, no, 3, pp. 414- 416, July.\n\n Closed-form solution is presented for specified geometry.\n\nBrewster, M. Quinn, 1992, Thermal Radiative Transfer and Properties, John Wiley & Sons, New York.\n\n Comprehensive radiative transfer text. Appendix B presents algebraic expressions for thirteen common configurations.\n\nBrockmann, H., 1994, \"Analytic angle factors for the radiant interchange among the surface elements of two concentric cylinders,\" Int. J. Heat Mass Transfer, vol. 37, no. 7, pp. 1095-1100.\n\n Derives analytic expressions for factors between concentric right circular cylinders of finite equal length. Includes factors between inner and outer cylinders, outer cylinder and itself, ends and inner and outer cylinder, end-to-end, and ends of radius less than outer cylinder radius to other finite areas.\n\nBuraczewski, Czeslaw, 1977, \"Contribution to radiation theory configuration factors for rotary combustion chambers,\" Pol. Akad. Nauk Pr. Inst. Masz Przeplyw, no. 74, pp. 47-73 (in Polish.)\n\n Disk-to-disk factors are used with configuration factor algebra to generate all factors on interior of right circular cone, interior of frustum of right circular cone, interior of finite right circular cylinder, and combinations of cones and frustums of cones.\n\nBuraczewski, Czeslaw, and Stasiek, Jan, 1983, \"Application of generalized Pythagoras theorem to calculation of configuration factors between surfaces of channels of revolution.\" Int. J. Heat & Fluid Flow, vol. 4, no. 3, pp. 157-160, Sept.\n\n Derives closed form relations for coaxial disks of different radii; ring elements on interior of circular cylinders to coaxial disks of the same diameter; ring-element to ring-element on interior of circular cylinder; ring element on interior of cone to coaxial disk; and ring-element to coaxial- ring element, both on interior of cone.\n\nBuschman, Albert Jr. and Pittman, Claud M., 1961, \"Configuration factors for exchange of radiant energy between axisymmetrical sections of cylinders, cones, and hemispheres and their bases,\" NASA TN D-944.\n\n Derives many relations for factors between combinations of differential and finite areas on the interior of right circular cylinders, right circular cones and hemispheres. Straightforward analytical integration is used, resulting in lengthy expressions in closed form. One typographical error (Eq. A-14 of the reference, where Z4 is mistyped as Z2) is corrected in the present catalog for the factor from an element on the interior of a right circular cone to a coaxial disk on the base. Some of the final results are more simply derived using disk-to-disk factors and configuration factor algebra, particularly the frustum-disk factors. The latter are obtained by Buschman and Pittman through the use of elliptic integrals, and this results in a tedious computation and lengthy expressions. Results are given in tabular form.\n\nByrd, L.W., 1993, \"View factor algebra for two arbitrary sized nonopposing parallel rectangles,\" J. Heat Transfer, vol. 115, no. 2, pp. 517-518.\n\n Notes that Hamilton and Morgan (1952) has an error for this configuration.\n\nCampbell, James P. and McConnell, Dudley G., 1968, \"Radiant-interchange configuration factors for spherical and conical surfaces to spheres,\" NASA TN D-4457.\n\n Provides extensive graphs and factors between spheres of equal radius, between a sphere and a spherical cap on a sphere of equal radius, and between a sphere and a coaxial cone with apex toward the sphere. Results are for sphere separations of 0 to 10 radii in steps of one radius, and for cap angles of 0 to 90o. Cone results are given for cone semiangles of 15o, 30o, 45o and 60o; cone base radii in the range of 0 to1 sphere radius; and for cone apex to sphere surface separations of 0, 1, 2, 4, 6, 8, and 10 sphere radii. All results were calculated numerically.\n\nChekhovskii, I.R.; Sirotkin, V.V.; Chu-Dun-Chu, Yu. V.; and Chebanov, V.A., 1979, \"Determination of radiative view factors for rectangles of different sizes,\" High Temp., July (Trans. of Russian original, vol. 17, no. 1, Jan.-Feb., 1979)\n\n Configuration factor algebra and integration of analytical expressions are used to find factors between rectangles in parallel planes and in perpendicular planes. Form is more complex than given by Ehlert and Smith or  Gross, Spindler and Hahne (1981)\n\nChung, B.T.F. and Kermani, M.M., 1989, \"Radiation view factors from a finite rectangular plate,\" J. Heat Transfer, vol. 111, no. 4, pp. 1115-1117, November.\n\n Derives general relation for configuration factor from tilted differential element to a non-intersecting rectangle, and then uses integration to obtain algebraic factor from a tilted differential strip to a non-intersecting rectangle. (See also Hamilton and Morgan.) The latter factor is then used to generate factors between a rectangular plate and other finite objects. Specifically discussed are the factors from a rectangular plate to a second plate, or to a solid cylinder. These factors involve an integral that is to be evaluated numerically. Particular graphical results are presented for factor from rectangular plate a tilted right triangular plate.\n\nChung, B.T.F., Kermani, M.M., and Naraghi, M.H.N., 1984, \"A formulation of radiation view factors from conical surfaces,\" AIAA J., vol. 22, no. 3, pp. 429-436, March.\n\n Provides closed-form factors between differential elements and cones and frustums of cones, and between cones and various surfaces of revolution that are on a common axis with the cone.\n\nChung, B.T.F. and Naraghi, M.H.N., 1982, \"A simpler formulation for radiative view factors from spheres to a class of axisymmetric bodies\" J. Heat Transfer, vol. 104, no. 1, pp. 201-204, February.\n\n Derives simple formulation for exchange between exterior of a sphere and exterior of a coaxial body of revolution. Uses formulation to derive closed-form expressions for a number of such geometries, and provides graphical results for some ranges of parameters. Receiving bodies include spheres, spherical caps, cones, ellipsoids and paraboloids.\n\nChung, B.T.F. and Naraghi, M.H.N., 1981, \"Some exact solutions for radiation view factors from spheres,\" AIAA J. vol. 19, pp. 1077-1081, August.\n\n Factors in closed form are derived from the exterior of a sphere to the exterior surfaces of a cylinder, from a sphere to a coaxial differential ring, and from a sphere to a coaxial non- intersecting or intersecting disk. Graphical and tabular results are presented for a wide range of parameters.\n\nChung, B.T.F. and Sumitra, P.S., 1972, \"Radiation shape factors from plane point sources,\" J. Heat Transfer, vol. 94, no. 3, pp. 328-330, August.\n\n Using the method of Feingold and Gupta (1970), authors use idea of surrounding a planar element that has its projection inscribed on the sphere interior. Factors from a planar element to a sphere, to the interior of a cylinder lying on the normal to the element, to an isosceles triangle, to a ring element, and to a disk segment are presented. Also, the factor from a spherical element to a sphere is derived. All results are in closed form. Some graphical results are presented.\n\nChung, T.J. and Kim, J.Y., 1982, \"Radiation view factors by finite elements,\" J. Heat Transfer, vol. 104, pp. 792.\n\n Uses finite elements plus Gaussian integration to formulate configuration factors between irregular geometries, and shows accuracy of the method by comparison of numerical calculation with values for known factors between opposed squares and between two planes sharing a common edge at various angles.\n\nCox, Richard L., 1976, Radiative heat transfer in arrays of parallel cylinders, Ph.D. Dissertation, Department of Chemical Engineering, University of Tennessee, Knoxville.\n\n Crossed-string method is used to find factors between infinitely long cylinders in equilateral triangular and square arrays. Results are also given for factors when tubes are spirally wrapped with cylinders of smaller diameter.\n\nCrawford, Martin, 1972, \"Configuration factor between two unequal, parallel, coaxial squares,\" paper no. ASME 72-WA/HT-16.\n\n Analytical closed-form expression is derived for the title geometry. Graphical results and some limiting expressions are given.\n\nCunningham, F.G., 1961, \"Power input to a small flat plate from a difffusely reflecting sphere, with application to an Earth satellite,\" NASA TN D-710 (corrected copy).\n\n Derives closed-form expressions for factor between arbitrarily oriented differential element and sphere. Some graphs of results are given. Also see Hauptmann and Modest (1980).\n\nCurrie, I.G. and Martin, W.W., 1980, \"Temperature calculations for shell enclosures subjected to thermal radiation,\" Computat. Methods Appl. Mech. Engng, vol. 21, no. 1, pp. 75- 79, January.\n\n Presents factors between a differential element and a ring element on various combinations of surfaces in an enclosure made up of a coaxial directly opposed cylinder contained completely within the frustum of a cone; i.e., the smallest frustum end is larger than the cylinder diameter. The expressions given as \"view factors\" are actually the kernels of double integrals that must be carried out to get the final configuration factors between surfaces and ring elements. The integration of the complex algebraic kernels are not carried out in closed form.\n\nDiLaura, D.L., 1999, \"New procedures for calculating diffuse and non-diffuse radiative exchange form factors,\" ASME Paper C99-107, Proc. 33rd. National Heat Transfer Conf., Albuquerque, August.\n\n Casts double area integral describing area-area configuration factors into a second-order tensor, which is further transformed into a double contour integral. Several forms of the integrals are derived, some of which have superior convergence characteristics in comparison with standard contour integration. Comparison of computed and analytical results is shown for two squares with a common edge at various enclosed angles.\n\nDummer, R.S. and Breckenridge, W.T. Jr., 1963, \"Radiation configuration factors catalog,\" General Dynamics/Astronautics Rept. ERR-AN-224, February.\n\nDunkle, R.V., 1963, \"Configuration factors for radiant heat-transfer calculations involving people,\" J. Heat Transfer, vol. 85, no. 1, pp. 71-76, February.\n\n Measurements using a mechanical form-factor integrator are used to derive empirical relations for factors from points on various surfaces to standing or sitting persons. These are then integrated to find factors from a person to various room walls and the ceiling. The empirical relation for the point-to-standing-person factor has a mean deviation from measured values of 5.6 percent, and a maximum deviation of 19.4 percent. For the seated person, the empirical relation differs from the measured factor by a mean deviation of 6.6 percent, and a maximum deviation of 22 percent. Surface-to-sitting person results are given in closed form, but standing person results could not be integrated in closed form, so graphical results are presented.\n\nEdwards, D.K., 1969, \"Comment on \"Radiation from conical surfaces with nonuniform radiosity,\" AIAA J., vol. 7, no. 8, pp. 1656-1659.\n\n Shows that graphs given by Bobco (1966) are in error when planar element is near to cone. Presents revised graphs for cone half-angles of 10o and 20o for various spacings of planar element from cone and a range of dimensionless cone lengths from 1 to 100.\n\nEddy, T.L. and Nielsson, G.E., 1988, \"Radiation shape factors for channels with varying cross- section,\" J. Heat Transfer, vol. 110, no. 1, pp. 264-266, February.\n\n Discusses factors in circular ducts of varying radius r(x) , and formulates the effects of blockage between differential and finite areas on the duct surface separated by a distance x.  Extends these results to ducts that transition from circular to rectangular cross-section, and treats cases of circular to rectangular elements, rectangular to circular elements, and rectangular to rectangular elements. See also Modest (1988).\n\nEhlert, J. R. and Smith, T.F., 1993, \"View Factors for Perpendicular and Parallel, Rectangular Plates,\" J. Thermophys. Heat Trans., vol. 7, no. 1, pp. 173-174.\n\n Simpler forms than Gross, Spindler, and Hahne (1981) for parallel and perpendicular rectangles. TL 900 J68.\n\nEichberger, J.I., 1985, \"Calculation of geometric configuration factors in an enclosure whose boundary is given by an arbitrary polygon in the plane,\" Warme-und Stoff bertragung, vol. 19, no. 4, p. 269.\n\n Prescribes a computer algorithm for applying the crossed-string method in two-dimensional enclosures with blocking and shading.\n\nEmery, A.F.; Johansson, O.; Lobo, M.; and Abrous, A, 1991, \"A comparative study of methods for computing the diffuse radiation viewfactors for complex structures,\" J. Heat Transfer, vol. 113, no. 2, pp. 413-422, May.\n\n Paper is devoted to studying the accuracy and computation time required to compute configuration factors among various surfaces with and without obstruction. Comparisons are among Monte Carlo, double area integration, a modified contour integration, the hemi-cube method, and a specialized algorithm.  Concludes that Monte Carlo may be the best choice for computing factors as well as gaining insight into the level of computational effort required to achieve a given accuracy. In cases with significant blockage by multiple non-intersecting surfaces, double area integration was efficient, and other methods showed advantage in particular situations as well.(Also see Rushmeier et al.)\n\nFarnbach, J.S., 1967, \"Radiant interchange between spheres: Accuracy of the point-source approximation,\" Sandia Laboratories Tech. Memo. SC-TM-364, Albuquerque, June.\n\n Numerically calculates exact factors between sphere exteriors, and compares results with those obtained by assuming one sphere to be a point source. Range of computed factors and the differences found are shown graphically as a function of separation distance to emitting sphere radius ratio D with receiving to emitting sphere radius ratio R as a parameter. Results are given for R = 1, 2, 5, 10 and 20, with D varying from 2 to 12, 3 to 13, 6 to 16, 11 to 21, and 21 to 31, respectively.\n\nFeingold, A., 1978, \"A new look at radiation configuration factors between disks,\" J. Heat Transfer, vol. 100, no. 4, pp. 742-744, November.\n\n Uses inscribed nonintersecting circular disks on sphere interior to derive disk-to-disk factors in a simple way. Any two such non-intersecting disks are analyzed.\n\nFeingold, A., 1966, \"Radiant-interchange configuration factors between various selected plane surfaces,\" Proc. Roy. Soc. London, ser. A, vol. 292, no. 1428, pp. 51-60.\n\n Tables of factor values for rectangles with a common edge and at an arbitrary included angle are presented, and show that the tabulated results of Hamilton and Morgan (1952) have considerable error, although the equation from which they are calculated is correct. Discusses effect of truncation and roundoff errors in factor calculation. Uses configuration factor algebra to derive factors between opposed regular polygons, and between the surfaces in a hexagonal honeycomb. Points out that small errors in configuration factor values can far overshadow the effects of assuming diffuse surface properties on radiative transfer calculation. (See also Ambirajan and Venkateshan (1993).)\n\nFeingold, A. and Gupta, K.G., 1970, \"New analytical approach to the evaluation of configuration factors in radiation from spheres and infinitely long cylinders,\" J. Heat Transfer, vol. 92, no. 1, pp. 69-76, February.\n\n Contains discussion of some previous factors that have errors, and presents closed-form expressions for a number of factors, particularly for surfaces of revolution, that were previously available only by numerical integration. Notes many cases where factors are valid even for non diffuse originating surface, and points out that, for sphere-to-disk factors, the solutions are independent of the sphere diameter. Some interesting use of symmetry in these problems allows bypassing of numerical or difficult analytical evaluations.\n\nFelske, J.D., 1981, Personal communication, August 25.\n\n Unpublished results for the factor between infinite parallel cylinders of unequal diameters. Simple closed-form expression is obtained by curve fit, and is within 6 percent of the exact analytical result for all ranges of parameters.\n\nFelske, J.D., 1978, \"Approximate radiation shape factors between spheres,\" J. Heat Transfer, vol. 100, no. 3, pp. 547-548, August.\n\n Develops a closed-form approximate solution for sphere-to-sphere factors for all ranges of parameters, accurate to within 5.8 percent at worst, with much smaller error on average, in comparison with exact numerical solution.\n\nGarot, Catherine and Gendre, Patrick, 1979, \"Computation of view factors used in radiant energy exchanges in axisymmetric geometry,\" In: Numerical methods in thermal problems; Proc. First Int. Conf., pp. 99-108, July 2-6, Pineridge Press, Ltd., Swansea, Wales.\n\n Discusses numerical evaluation of factors in axisymmetric geometries and methods to eliminate impossible factors caused by blockage by intervening surfaces or by orientation of surfaces so their radiating surfaces cannot see one-another. Formulates limits for various cases. Results are computed for concentric spheres, and compare within 1 percent of analytical result.\n\nGlicksman, L.R., 1972, \"Approximations for configuration factors between cylinders,\" unpublished report, MIT.\n\n According to Ameri and Felske (1982), this reference contains a closed-form approximation for the factor between cylinders of equal radius and finite length. (This is the only reference that the compiler of this bibliography did not have in hand during annotation.)\n\nGoetze, Dieter and Grosch, Charles B., 1962, \"Earth-emitted infrared radiation incident a satellite,\" J. Aerospace Sci., vol. 29, no. 5, pp. 521-524.\n\n Provides closed-form expressions for configuration factor from exterior of sphere to arbitrarily oriented planar element. Vector algebra is used to simplify arguments of integrals, which are then evaluated. Graphical results for the configuration factor times p are presented for three sphere-to-element distances and for various element tilt angles relative to the line connecting the element and the sphere center.\n\nGrier, Norman T., 1969, \"Tabulations of configuration factors between any two spheres and their parts,\" NASA SP 3050, (420 pp.)\n\n Extensive tables of factors between combinations of spherical caps, patches, bands, and entire spheres. Spheres are of different radii and spacing. Results are obtained by numerical integration in a bispherical coordinate system. Parts of spheres are tabulated by areas that subtend angles in increments of 15o, and for radius ratios from 0.01 to 1 in intervals of 0.1 between 0.1 and 1. Distance between centers of spheres varies from (1.001+r2/r1)r1 to 100r1, where r1 is the radius of the larger sphere.\n\nGrier, Norman T. and Sommers, Ralph D., 1969, \"View factors for toroids and their parts,\" NASA TN D-5006.\n\n Extensive numerically computed results are presented in tables and graphs for factors involving various parts of the surface of a toroid. The factors given are between differential elements and \"rim\" bands; differential elements and opposed radial segments; finite bands or segments and the entire toroid; and between the toroid and itself. Factors are given for parametric values of bands in increments of 10o width, and of the ratio (toroidal cross-section radius/toroid radius) for 0.01, 0.1, 0.2,...0.8, 0.9, 0.99. See also Sommers and Grier (1969).\n\nGross, U., Spindler, K., and Hahne, E., 1981, \"Shape factor equations for radiation heat transfer between plane rectangular surfaces of arbitrary position and size with rectangular boundaries,\" Lett. Heat Mass Transfer, vol. 8, pp. 219-227.\n\n Provides a closed-form solution to the title factor for the cases of rectangles lying in parallel or perpendicular planes and having parallel or perpendicular edges. The rectangles may be of arbitrary size and location within the planes. Solution is also given for the case when the planes containing the rectangles intersect at an arbitrary angle; however, the solution contains a single integral that must be evaluated numerically. These solutions eliminate the tedious configuration factor algebra that must otherwise be applied to the simple adjacent or opposed rectangle factors to obtain these results, and which may generate large round-off errors [see Feingold (1966)]. Also see Ehlert and Smith  and Byrd.\n\nGuelzim, A., Souil, J.M., and Vantelon, J.P., 1993, \"Suitable configuration factors for radiation calculation concerning tilted flames,\" J. Heat Transfer, vol. 115, no. 2, pp. 489-492, May.\n\n Factors are given in closed form between differential elements in various configurations to tilted cylinders with faces parallel to the base plane.\n\nHahne, E. and Bassiouni, M.K., 1980, \"The angle factor for radiant interchange within a constant radius cylindrical enclosure,\" Lett. Heat Mass Transfer, vol. 7, pp. 303-309.\n\n Derives factor from one-half of interior of finite-length right circular cylinder to the opposite half using contour integration, and presents closed-form expressions and graphical results.\n\nHaller, Henry C. and Stockman, Norbert O., 1963, \"A note on fin-tube view factors,\" J. Heat Transfer, vol. 85, no. 4, pp. 380-381, November.\n\n Derives factor from planar element on longitudinal fin to infinitely long tube, and corrects errors in derivation in some earlier published works.\n\nHamilton, D.C. and Morgan, W.R., 1952, \"Radiant-interchange configuration factors,\" NASA TN 2836.\n\n One of the classic compilations of configuration factors. Has a few typographical errors [see, e.g., Feingold (1966), Feingold and Gupta (1970), and Byrd.] Catalogs twelve different differential area to finite area factors, five differential strip to finite area factors, and eleven finite area to finite area factors. Some of the factors are generated by configuration factor algebra from a smaller set of calculated or derived factors. This is a pioneering work in cataloguing useful information.\n\nHauptmann, E.G., 1968, \"Angle factors between a small flat plate and a diffusely radiating sphere,\" AIAA J., vol. 6, no. 5, pp. 938-939, May.\n\n Provides simpler derivation than Cunningham (1961) to find relations for title configuration.\n\nHe, F., Shi, J., Zhou, L., and Li, X., 2018, “Monte Carlo calculation of view factors between some complex surfaces: Rectangular plane and parallel cylinder, rectangular plane and torus, especially cold-rolled strip and W-shaped radiant tube in continuous annealing furnace,” Int. J. Thermal Sci., vol. 134, pp. 465-474.\n\n Verifies Monte Carlo by reproducing known plate to parallel finite-cylinder factor, then uses Monte Carlo to evaluate factors for geometries described in the title.\n\nHolchendler, J. and Laverty, W.F., 1974, \"Configuration factors for radiant heat exchange in cavities bounded at the ends by parallel disks and having conical centerbodies,\" J. Heat Transfer, vol. 96, no. 2, pp. 254-257, May.\n\n Closed-form relation for factor from plane element to exterior of truncated right circular cone with base and element in same plane is derived by contour integration. Cone apex is above the element. Factor from element to a concentric annular disk on the exterior of cone is also given.\n\nHolcomb, R.S. and Lynch, F.E., 1967, \"Thermal radiation performance of a finned tube with a reflector,\" Rept. ORNL-TM-1613, Oak Ridge National Laboratory.\n\n Presents factors from an infinite strip element on an infinitely long tube to a parallel infinite fin attached to the tube; from a finite length fin to an attached parallel tube; and from a parallel finite length fin on a tube to another parallel fin attached to the tube at 90o from the first fin. The latter factors are given for a single geometry, and are computed from the factor for adjoint plates.\n\nHollands, K.G.T., 1995. \"On the superposition rule for configuration factors,\" J. Heat Transfer, vol. 117, no. 1, pp. 241-245, Feb.\n\n Uses the superposition principle to derive factors between differential elements tilted arbitrarily with respect to various planar and convex finite areas. An error in Eq. 12 is corrected in factor B-17 of this catalog.\n\nHooper, F.C. and Juhasz, E.S., 1952, \"Graphical evaluation of radiation interchange factor,\" ASME Paper 52-F-19, ASME Fall Meeting, Chicago.\n\n Presents graphical method of computing configuration factors between differential element and finite area. Method is based on unit sphere method of Nusselt (1928). Templates are given for easy graphical construction. Method is largely superseded by computer-based methods, many of which use a similar technique.\n\nHottel, H.C., 1954, \"Radiant heat transmission,\" in William H. McAdams (ed.), Heat Transmission, 3rd ed., pp. 55-125, McGraw-Hill Book Co., New York.\n\n Among other things, derives the crossed-string method for computing factors among surfaces that are infinitely long in one dimension. Presents graphical results for some common configurations.\n\nHottel, H.C., 1931, \"Radiant heat transmission between surfaces separated by non-absorbing media,\" Trans. ASME, vol. 53, FSP-53-196, pp. 265-273.\n\n Includes derivations of factors from plane element to infinite plane; from plane element to coaxial parallel disk; element to parallel rectangle normal to element with normal passing through one corner of rectangle; element to any parallel rectangle; element to any surface generated by a parallel generating line; element to a bank of parallel tubes; plane to a bank of tubes in an equilateral triangular array; plane to bank of tubes in rectangular array; infinite parallel planes of finite width; one convex surface enclosed by another; parallel coaxial disks of equal or unequal radius; parallel opposed equal rectangles; parallel opposed infinitely long strips; and perpendicular rectangles having a common edge. With a few exceptions (parallel disks, element to disk), this is the first appearance of these factors in the literature.\n\nHottel, Hoyt C. and Keller, J.D., 1933, \"Effect of reradiation on heat transmission in furnaces and through openings,\" Trans. ASME, vol. 55, IS-55-6, pp. 39-49.\n\n Uses derivatives of factors between opposed surfaces to find various factors (ring on interior of right circular cylinder to similar ring, etc.). Starts from disks, squares, 1-by-n rectangles (where n is an integer), and infinite strips to derive factors, and presents tables of results.\n\nHottel, Hoyt C. and Sarofim, A.F., 1967, Radiation Heat Transfer, McGraw-Hill Book Co., New York.\n\n Provides derivation of crossed-string method, details graphical techniques, and demonstrates contour integration. Generates factors by taking derivatives of factors for known finite geometries, and derives strip-to-surface and strip-strip factors on opposed coaxial disks, opposed squares, opposed 1-by-2 rectangles, and infinite parallel surfaces.\n\nHsu, Chia-Jung, 1967, \"Shape factor equations for radiant heat transfer between two arbitrary sizes of rectangular planes,\" Can. J. Chem. Eng., vol. 45, no. 1, pp. 58-60.\n\n Lengthy closed-form relation is presented for factor between rectangles in parallel planes.\n\nJakob, Max, 1957, Heat Transfer, vol. 2, John Wiley & Sons, New York.\n\n Complete treatment of configuration factor properties and relationships. Simple factors are derived using integration, configuration factor algebra, and the properties of spherical enclosures. Good survey of early literature is given.\n\nJoerg, Pierre and McFarland, B.L., 1962, \"Radiation effects in rocket nozzles\", Rept. S62- 245, Aerojet-General Corporation.\n\n Uses analytical integration after transforming kernel to complex plane to derive closed-form solution for factor from differential element on the interior of a right circular cone to cone base. Graphical results are given for cone half-angles of 15, 20, and 25o.\n\nJones, L.R., 1965, \"Diffuse radiation view factors between two spheres,\" J. Heat Transfer, vol. 87, no. 3, pp. 421-422, August.\n\n Gives numerically computed values in graphical form for title geometry for sphere radius ratios from 0.1 to 1, and for ratio (distance between sphere edges/radius) from 0 to 8.\n\nJuul, N.H., 1982, \"View factors in radiation between two parallel oriented cylinders of finite length\" J. Heat Transfer, vol. 104, no. 2, pp. 384-388, May.\n\n Derives double integral expression for factor between parallel opposed cylinders of finite length and unequal radius. Numerical results are fitted by analytical expressions that apply within given ranges of parameters. Indicates that expression for this geometry in Stevenson and Grafton (1961) does not give comparable results, and may be in error.\n\nJuul, N.H., 1979, \"Diffuse radiation view factors from differential plane sources to spheres,\" J. Heat Transfer, vol. 101, no. 3, pp. 558-560, August.\n\n Derives plane element to sphere factors for arbitrary element position and orientation in space by constructing concave spherical surface that subtends the same solid angle as the portion of the sphere viewed by the element. This results in simpler formulation but identical numerical values with earlier workers. Factors are given for particular cases of element on the surface of a plane, a sphere, or a cylinder in various orientations to sphere.\n\nJuul, N.H., 1976a, \"Diffuse radiation configuration view factors between two spheres and their limits,\" Lett. Heat Mass Transfer, vol. 3, no. 3, pp. 205-211.\n\n Numerical results are given for the ratio (spacing between sphere centers/radius of larger sphere) in the range 1-7, and for sphere radius ratios of 0-5. Also, see Juul (1976b).\n\nJuul, N.H., 1976b, \"Investigation of approximate methods for calculation of the diffuse radiation configuration view factors between two spheres,\" Lett. Heat Mass Transfer, vol. 3, no. 6, pp. 513-522.\n\n Extends the results of Juul (1976a) to ratios (spacing between sphere centers/radius of larger sphere) up to 12 and to sphere radius ratios up to 10. Compares results with those from various approximations, and the ranges where each approximation is within 1 percent are delineated. Also, see the discussion in Felske (1978).\n\nKatte, S.S., 2000, An Integrated Thermal Model for Analysis of Thermal Protection System of Space Vehicles, PhD Thesis, IIT Madras, December.\n\n Derives factor between ring element on interior of frustum of right circular cone to cone base, including effect of blockage by a coaxial cylinder. Integrates this factor using Simpson's Rule over interior of frustum to determine factor from entire interior of frustum to annular disk on base surrounding blocking cylinder.\n\nKeene, H.B., 1913, \"Calculation of the energy exchange between two fully radiative coaxial circular apertures at different temperatures,\" Proc. Roy. Soc., vol. LXXXVIII-A, pp. 59-60.\n\n Contains first derivation of factor between coaxial disks. This reference is an appendix to Keene, H.B., 1913, \"A determination of the radiation constant,\" Proc. Roy. Soc., vol. LXXXVIII-A, pp. 49-59.\n\nKezios, Stothe P. and Wulff, Wolfgang, 1966, \"Radiative heat transfer through openings of variable cross-section,\" Proc. Third Int. Heat Transfer Conf., AIChE, vol. 5, pp. 207- 218.\n\n Disk-to-disk factors are used to derive ring-to-ring factors on the interior of a right circular cone, and ring-to-disk factors where ring is on the interior of the cone and disk is inscribed on cone interior and coaxial with it. Factors are given in terms of local radius and separation distance rather than in terms of cone half-angle as in Sparrow and Jonsson (1963).\n\nKobyshev, A.A.; Mastiaeva, I.N.; Surinov, Iu. A.; and Iakovlev, Iu. P., 1976, \"Investigation of the field of radiation established by conical radiators,\" Aviats. Tekh., vol. 19, no. 3, pp. 43-49, (in Russian).\n\n Factors between coaxial disk and cone when disk is centered on cone apex; between nested coaxial cones; and between various areas on the interior of a cone and cone frustum are presented.\n\nKreith, Frank, 1962, Radiation Heat Transfer for Spacecraft and Solar Power Plant Design, International Textbook Corp., Scranton, Pa.\n\n Catalog of 33 factors is given, many from Hamilton and Morgan (1952). Short discussion is included of configuration factor algebra. See also Stephens and Haire (1961).\n\nKrishnaprakas, C.K., 1997, \"View Factor Between Inclined Rectangles,\" AIAA J. Thermophysics Heat Transfer, vol. 11, no. 3, pp. 480-482.\n\n Uses configuration factor algebra with factor for two adjacent plates sharing a common edge to derive the factor between two plates on adjacent inclined planes sharing a common edge. Indicates better accuracy than that found using the method of Gross, Spindler and Hahne (1981).\n\nKuroda, Z. and Munakata, T., 1979, \"Mathematical evaluation of the configuration factors between a plane and one or two rows of tubes,\" Kagaku Sooti (Chemical Apparatus, Japan), pp. 54-58, November (in Japanese).\n\n Uses crossed-string method to derive factors from infinite plane to first and second rows of infinitely long parallel equal diameter tubes in an infinite equilateral triangular array. Also presents factors that include reradiation from adiabatic plane behind tubes.\n\nLarsen, Marvin E. and Howell, John R., 1986, \"Least-squares smoothing of direct exchange factors in zonal analysis,\" J. Heat Transfer, vol. 108, no. 1, pp. 239-242.\n\n Although applied to the general problem of factors in an enclosure with participating medium, the method presented also works for evacuated enclosure configuration factors. Uses variational calculus subject to constraints of reciprocity and energy conservation to provide the best set of factors in the least-squares sense when the complete set has some factors that are known to low accuracy.\n\nLawson, D.A., 1995, \"An improved method for smoothing approximate exchange areas,\" Int. J. Heat Mass Transfer, vol. 38, no. 16, pp. 3109-3110.\n\n Uses area weighting to modify the smoothing algorithm of van Leersum, providing better results for a test problem.\n\nLebedev, V.A., 1979, \"Invariance of radiation shape factors of certain radiating systems,\" Akad. Nauk SSSR, Siberskoe Otdelenie, Izvestiia, Seriia Tekh. Nauk, pp. 73-77, October (in Russian).\n\n The invariance of a number of factors for certain axisymmetric radiating systems and for radiating systems containing infinite surfaces is discussed. Method is proposed for examining invariance of shape factors of various systems. Approach uses reciprocity and closure properties.\n\nLeuenberger, H. and Person, R.A., 1956, \"Compilation of radiation shape factors for cylindrical assemblies,\" paper no. 56-A-144, ASME, November.\n\n A concise catalog of many useful factors involving disks, finite length cylinders, and combinations of disks, cylinders, and rectangles. Most results are given in closed form, with limiting forms.\n\nLiebert, Curt H. and Hibbard, Robert R., 1968, \"Theoretical temperatures of thin-film solar cells in Earth orbit,\" NASA TN D-4331.\n\n Presents results from Cunningham (1961) in a single graph for all orientations and distances. Also see Hauptmann for this geometry.\n\nLin, S.; Lee, P.-M.; Wang, J.C.Y.; Dai, Y.-L.; and Lou, Y.-S., 1986, \"Radiant-interchange configuration factors between disk and segment of parallel concentric disk,\" J. Heat Transfer, vol. 29, no. 3, pp. 501-503.\n\n Presents results of transforming the quadruple integral for this factor into a double definite integral, and then numerically integrating the result. Graphical results are presented for disk radius ratios between 0.1 and 5, and for separation distance/segmented disk radius between 10-2 and 10. Three ratios of radius to segment line over segmented disk radius (0.2, 0.6 and 1.0) are graphed.\n\nLipps, F.W., 1983, \"Geometric configuration factors for polygonal zones using Nusselt's unit sphere,\" Solar Energy, vol. 30, no. 5, pp. 413-419.\n\n Compares numerical results from computer program based on unit sphere method with analytical and other numerical results based on contour integration. Contour integration is found to be faster. Some numerical results for \"twisted\" adjoint plates are presented.\n\nLoehrke, R.I., Dolaghan, J.S., and Burns, P.J., 1995, \"Smoothing Monte Carlo exchange factors,\" J. Heat Transfer, vol. 117, no. 2, pp. 524-526, May.\n\n Uses averaging of reciprocal pairs to achieve reciprocity, and then imposes least-squares averaging from Larsen and Howell to achieve energy conservation. Authors find that application of this approach can achieve accuracy equivalent to carrying out Monte Carlo analysis for double the number of samples, i.e., a savings of a factor of two in computer time.\n\nLove, Tom J., 1968, Radiative Heat Transfer, Charles E. Merrill, Columbus, Ohio.\n\n Contains catalog of factors, mostly from Hamilton and Morgan (1952), plus element-to- sphere factors from Cunningham (1961) and Buschmann and Pittman (1961).\n\nLovin, J.K. and Lubkowitz, A.W., 1969, \"User's manual for RAVFAC, a radiation view factor digital computer program,\" Lockheed Missiles and Space Rept. HREC-0154-1, Huntsville Research Park, Huntsville, Alabama, LMSC/HREC D148620 (Contract NAS8- 30154), November.\n\nMahbod, B. and Adams, R.L., 1984, \"Radiation view factors between axisymmetric subsurfaces within a cylinder with spherical centerbody,\" J. Heat Transfer, vol. 106, no. 1, pp. 244-248, February.\n\n Contour integration is used to derive factors between a differential band on the surface of a sphere and a finite strip on the interior of a coaxial cylinder; between a differential band on the surface of a sphere and  a coaxial annular ring on the cylinder base; and between a coaxial annular ring on the cylinder base and a finite strip on the interior of a coaxial cylinder when blocked by a coaxial sphere. Numerical integration is then used to provide factors between finite areas, and the results are compared with known factors from Feingold and Gupta and Holchendler and Laverty.\n\nMasuda, H., 1973, \"Radiant heat transfer on circular-finned cylinders,\" Rep. Inst. High Speed Mechanics, Tohoku Univ., vol. 27, no. 225, pp. 67-89. (See also Trans. JSME, vol. 38, pp. 3229-3234, 1972.)\n\n Factors between ring elements on tubes to ring elements on coaxial circular fins, and between rings on adjacent fins, between the tube and one fin, and between the environment and one fin or the tube are given. Contour integration is used to develop the finite area factors. Also see Modest (1988).\n\nMathiak, F.U., 1985, \"Berechnung von konfigurationsfactoren polygonal berandeter ebener gebiete (Calculation of form-factors for plane areas with polygonal boundaries),\" Warme- und Stoff bertragung, vol. 19, no. 4, pp. 273-278.\n\n Proposes efficient algorithms for using contour integration applied to element-surface and surface-surface configurations where the surfaces are planar polygons. Derives algebraic relation for factor from differential element to a right triangle in a parallel plane with the normal to the element passing through the vertex containing the right angle.\n\nMaxwell, G.M.; Bailey, M.J.; and Goldschmidt, V.W., 1986, \"Calculations of the radiation configuration factor using ray casting,\" Computer Aided Design, vol. 18, no. 7, p. 371.\n\nMel'man, M.M. and Trayanov, G.G., 1988, \"View factors in a system of contacting cylinders.\" J. Eng. Phys., vol. 54, no. 4, p. 401.\n\nMcAdam, D.W.; Khatry, A.K.; and Iqbal, M., 1971, \"Configuration Factors for Greenhouses,\" Am. Soc. Ag. Engineers, vol. 14, no. 6, pp. 1068-1092, Nov.-Dec.\n\n Contour integration is used to reduce configuration factor formulation to a single integral, which is evaluated numerically. Various geometries typical of greenhouses are evaluated, and the results are presented in graphical form. The abscissas in Figs. 15, 18 and 19 are apparently mislabeled as A, but should be C.\n\nMinning, C.P., 1981, Personal communication, Nov. 10.\n\n Provided information for factor from off-axis planar element to a sphere.\n\nMinning, C.P., 1979a, \"Shape factors between coaxial annular disks separated by a solid cylinder,\" AIAA J., vol. 17, no. 3, pp. 318-320, March.\n\n Contour integration is used to derive closed form factor between an element on an annular disk and a second coaxial annular disk separated by a coaxial cylinder. Result is integrated numerically to find the factor between coaxial annular disks separated by a coaxial cylinder. Graphical results for some values of parameters are presented.\n\nMinning, C.P., 1979b, \"Radiation shape factors between end plane and outer wall of concentric tubular enclosure,\" AIAA J., vol. 17, no. 12, pp. 1406-1408, December.\n\n Contour integration is used to derive closed form factor between elements and rings on the annular end plane between concentric coaxial cylinders and the inner surface of the outer cylinder. Results are integrated numerically to find the factors between the entire annular end plane and the inside of the outer cylinder.\n\nMinning, C.P., 1977, \"Calculation of shape factors between rings and inverted cones sharing a common axis,\" J. Heat Transfer, vol. 99, no. 3, pp. 492-494, August. (See also discussion in J. Heat Transfer, vol. 101, no. 1, pp. 189-190, August, 1979)\n\n Uses contour integration to derive closed form factor from planar element to surface of right circular frustum of cone when element is in plane perpendicular to cone axis. Element plane may intersect cone or not. Graphs are presented for cone half-angles of 10 and 20­ for a range of cone lengths and spacings of the element from the cone axis. Sets up but does not carry out ring-to-cone factors. Discussion by D.A. Nelson points out that different variables can be used in the closed-form solution, and also notes that Minning's results are valid for elements to frustums that are inverted.\n\nMinning, C.P., 1976, \"Calculation of shape factors between parallel ring sectors sharing a common centerline,\" AIAA J., vol. 14, no. 6, pp. 813-815.\n\n Derives factors by contour integration for element on disk to coaxial ring sector, disk sector, ring, and disk, and from disk sector to disk sector. Results are in closed form except for sector-to- sector for which graphs of numerical results are presented.\n\nMinowa, M., 1996-1999, \"Studies of effective radiation area and radiation configuration factors of a pig,\" J. Soc. Ag. Structures (Japan); \"Part 1: Effective radiation area of a pig based on the surface-model,\" vol. 27, no. 3, (Ser. no. 71), pp. 155-161, December, 1996; \"Part 2: Configuration factors of a 27 kg pig to rectangular planes on the side, front or rear wall,\" vol. 29, no. 1, (Ser. no. 77), pp. 1-8, June, 1998; \"Part 3: Configuration factors of a 27 kg pig to rectangular planes on the ceiling or floor,\" vol. 29, no. 1, (Ser. no. 77), pp. 9-14, June, 1998; \"Part 4: Configuration factors of a 65 kg pig to rectangular planes and comparisons to a 27 kg pig,\" vol. 29, no. 3, (Ser. no. 79), pp. 137-149, December, 1998; \"Part 5: Configuration factors of an 88 kg pig to surrounding rectangular planes and configuration factor characteristics of fattening pigs,\" vol. 30, no. 2, (Ser. no. 82), pp. 145-156, Sept., 1999.\n\n This series of papers uses a three-dimensional model of a standing pig using triangular surface elements to derive the effective radiating area of pigs of various weights. These areas are used to provide configuration factors between pigs and various orientations of rectangular areas based on the unit-sphere method. Results are in graphical form.\n\nMirhosseini, M. and Saboonchi, A., 2011; “View factor calculation using the Monte Carlo method for a 3D strip element to a circular cylinder,” Int. Communications Heat Mass Transfer, vol. 38, pp. 821-826.\n\n Invokes Monte Carlo method to solve for factor B-80, strip of finite length to parallel cylinder of equal length.\n\nMitalas, G.P. and Stephenson, D.G., 1966, \"FORTRAN IV programs to calculate radiant interchange factors,\" National Research Council of Canada, Div. of Building Research Rept. DBR-25, Ottawa, Canada.\n\n Presents method of analytical evaluation of one of the line integrals arising from contour integrations giving configuration factor between two finite areas. Method allows application of contour integration to factors for planar surfaces sharing a common edge, which have a numerical singularity if standard contour integration is used.\n\nModest, Michael F., 1991, Radiative Heat Transfer, McGraw-Hill Book Company, New York.\n\n Comprehensive text on radiative transfer presents configuration factors for 51 geometries in Appendix D. All of the factors are included in this catalog.\n\nModest, M.F., 1988, \"Radiative shape factors between differential ring elements in concentric axisymmetric bodies,\" J. Thermophys. Heat Trans., vol. 2, no. 1, pp. 86-88.\n\n Derives factors between a ring element or band on the interior of an axisymmetric body and a ring element or band on the exterior of an inner concentric axisymmetric body, and between two bands that both lie on either body. Also presents the integration limits that result for general bodies of revolution. Shows that general relations reduce to the correct result for the case of a ring element on a cylinder to a ring element on a perpendicular circular fin as derived by Masuda. See also Eddy and Nielson.\n\nModest, M.F., 1980, \"Solar flux incident on an orbiting surface after reflection from a planet,\" AIAA J., vol. 18, no. 6, pp. 727-730.\n\n Provides exact numerical results for solar radiation reflected from a spherical planet to an orbiting element at arbitrary orientation, and also gives a simple approximate relation.\n\nMoon, Parry, 1936, The Scientific Basis of Illuminating Engineering, McGraw-Hill Book Co., New York, (Reprinted 1961 by Dover Publications, New York.)\n\n A standard reference, this book contains much material \"rediscovered\" in later work. Careful and complete discussions are included of the use of the unit sphere method, various earlier work to obtain factors by contour integration, configuration factor algebra, Yamouti's reciprocity relations, and the invariance properties of factors on the interior of spheres. Notation in this text is a problem as the symbol F is used for radiant flux, and no explicit symbol is defined for the configuration factor.\n\nMorizumi, S.J., 1964, \"Analytical determination of shape factors from a surface element to an axisymmetric surface,\" AIAA J., vol. 2, no. 11, pp. 2028-2030.\n\n Geometrical relations for subtended solid angle and distance between elements are derived for use in integrals that define factors between an elemental area and a paraboloidal surface, a conical surface, and a cylindrical surface. Factor values are not computed. The effect of blockage is discussed.\n\nMudan, K.S., 1987 \"Geometric View Factors for Thermal Radiation Hazard Assessment,\" Fire Safety J., vol. 12, pp. 89-96.\n\n Algebraic relations for factors from horizontal and vertical planar elements to a tilted cylinder are given. Elements are in upwind, downwind, or crosswind orientations relative to the cylinder tilt, and are in the plane of the cylinder base. See also Guelzim et al. (1993).\n\nNaraghi, M.H.N., 1988a, \"Radiation view factors from differential plane sources to disks- a general formulation,\" J. Thermophys. Heat Trans., vol. 2, no. 3, pp. 271- 274.\n\n Derives general relation for factor from a tilted planar element to a disk in an intersecting or nonintersecting plane using contour integration. Results are given as algebraic equations, and some graphical results are presented for limiting cases.\n\nNaraghi, M.H.N., 1988b, \"Radiation view factors from spherical segments to planar surfaces,\" J. Thermophys. Heat Trans., vol. 2, no. 4, pp. 373-375.\n\n Derives factor between a spherical segment and a planar element that lies in a plane parallel to the segment faces. Various cases are presented for when the plane containing the element intersects or does not intersect the segment, and for when the element can view the entire segment or only a portion of it. This factor is then integrated in general form to obtain the factor from a spherical segment to a planar surface parallel to a segment face. No applications of this latter factor (which is in the form of an integral) are given. See also Naraghi and Chung (1982).\n\nNaraghi, M.H.N., 1981, Radiation configuration factors between disks and axisymmetric bodies, Master of Science Thesis, Department of Mechanical Engineering, The University of Akron.\n\n Gives complete derivations and analysis of results given by Naraghi and Chung (1982) and Chung and Naraghi (1980, 1981).\n\nNaraghi, M.H.N. and Chung, B.T.F., 1982, \"Radiation configuration between disks and a class of axisymmetric bodies,\" J. Heat Transfer, vol. 104, no. 3, pp. 426-431, August.\n\n Contour integration is used to derive the factor between an arbitrarily oriented differential element and a disk. This factor is used to develop the factor from the disk to a coaxial differential ring. The latter expression is then integrated to find the factor from a disk or an annular ring to various axisymmetric bodies, including a cylinder, a cone, an ellipsoid, and a paraboloid. Some results are in closed form, others require a single numerical integration. Limited graphical results are presented for each factor.\n\nNaraghi, M.H.N. and Warna, J.P., 1988, \"Radiation configuration factors from axisymmetric bodies to plane surfaces,\" Int. J. Heat Mass Transfer, vol. 31, no. 7, pp. 1537- 1539.\n\n Derives factors between bodies of revolution and plane surfaces lying in planes perpendicular to the axis of revolution. Derives and presents relations for non-coaxial parallel disks of differing radius; a disk and a noncoaxial disk segment in parallel planes; a sphere and a noncoaxial disk lying in a plane that intersects the sphere; a finite-length cylinder and a disk lying in a plane perpendicular to the cylinder axis ( plane intersecting the cylinder or not); and a right circular cone and a disk lying in a plane perpendicular to the cone axis (plane intersecting the cone or not).\n\nNichols, Lester D., 1961, \"Surface-temperature distribution on thin-walled bodies subjected to solar radiation in interplanetary space,\" NASA TN D-584.\n\n Derives factor between any two elements on the interior of a sphere.\n\nNusselt, W., 1928, \"Graphische bestimmung des winkelverhaltnisses bei der warmestrahlung,\" VDI Z., vol. 72, p. 673.\n\n Original presentation of the unit sphere method, which is presented more accessibly in Alciatore and Lipp (1989) and Siegel and Howell (2001).\n\nO'Brien, P.F. and Luning, R.B., 1970, \"Experimental study of luminous transfer in architectural systems,\" Illum. Engng, vol. 65, no. 4, pp. 193-198, April.\n\n Comparison is made of the factors between a parallel differential area on the normal to a disk or rectangle and the disk or rectangle as determined by three methods; analytically, experimentally, and numerically by the use of the program CONFAC II. Accuracy of the measurements was within 5 percent.\n\nPerry, R.L., and Speck, E.P., 1962, \"Geometric factors for thermal radiation exchange between cows and their surroundings,\" Trans. Am. Soc. Ag. Engnrs., General Ed., vol. 5, no. 1, pp. 31-37.\n\n Used mechanical integrator to measure factors from various wall elements to a cow, and presents some results for size of equivalent sphere that gives same factor as cow. It is found that the sphere origin should be placed at one-fourth of the withers to pin-bone distance behind the withers, at a height above the floor of two-thirds of the height at the withers, and that the equivalent sphere radius should be 1.8, 2.08, or 1.78 times the heart girth for exchange with the floor and ceiling, sidewalls, or front and back walls, respectively. Also discusses exchange between cows and entire bounding walls, floor and ceiling, and between parallel cows.\n\nPlamondon, Joseph A., 1961, \"Numerical determination of radiation configuration factors for some common geometrical situations,\" Jet Propulsion Laboratory Tech. Rept. 32-127, California Institute of Technology, July 7.\n\n Derives numerical relations for finding configuration factors in arbitrary geometries. Gives specific integral forms and limits for the cases of two arbitrarily oriented plates; arbitrarily oriented cylinder and plate; arbitrarily oriented cone and plate; arbitrarily oriented sphere and plate; coaxial cylinders of unequal length with midpoints at the same axial position; and parallel cylinders of unequal radius and length. No results are given.\n\nRao,V.R. and Sastri, V.M.K., 1996, \"Efficient evaluation of diffuse view factors for radiation,\" Int. J. Heat Mass Transfer, vol.19, no. 6, pp. 1281-1286.\n\n Uses various degrees of accuracy in integration of the line integrals in contour integration to determine finite-area to finite area factors. Presents results for some simple geometries to evaluate relative accuracy of different integration schemes. Presents simple way of numerically treating case when two areas have a coincident side or otherwise touch. (See also Mitalas and Stephenson (1966))\n\nRea, Samuel N., 1975, \"Rapid method for determining concentric cylinder radiation view factors,\" AIAA J., vol. 13, no. 8, pp. 1122-1123.\n\n Derives closed-form factor from a cylinder to an annular ring at the end of the cylinder. Configuration factor algebra is then used to find factors for a variety of configurations involving coaxial cylinders of different finite lengths that are displaced axially from one another.\n\nReid, R.L. and Tennant, J.S., 1973, \"Annular ring view factors,\" AIAA J., vol. 11, no. 3, pp. 1446-1448.\n\n Quadruple area integral for factor between finite length segments on the surfaces of coaxial cylinders is analytically integrated three times, and the remaining integral is then integrated numerically. Shell-to-shell and shell-to-tube factors between areas that are axially displaced are given in graphs. Discussion is given of the use of configuration factor algebra for finding other factors such as between annular disks.\n\nRein, R.G., Jr., Sliepcevich, C.M., and Welker, J.R., 1970, \"Radiation view factors for tilted cylinders,\" J. Fire Flammability, vol. 1, pp. 140-153.\n\n Factors given from a vertical differential element normal to line through the base of a tilted circular cylinder for various cylinder length/radius ratios, and for various distances of the element from the cylinder. Discusses use of configuration factor algebra for cases when the element is above or below the cylinder base plane, and effects of cases when element lies under tilted cylinder or far from the cylinder.\n\nRobbins, William H., 1961, \"An analysis of thermal radiation heat transfer in a nuclear rocket nozzle,\" NASA TN D-586.\n\n Derives general expression for factors between any two differential elements on the interior of an arbitrary surface of revolution, and between a differential element on a plane normal to the axis of revolution and any element on the interior. Factors from elements to entire interior surface of revolution are derived for specific nozzle geometries, including limits of integrals to account for possible blockage by concave portions of the surface. No computed results are given.\n\nRobbins, William H. and Todd, Carroll A., 1962, \"Analysis, feasibility, and wall-temperature distribution of a radiation-cooled nuclear rocket nozzle,\" NASA TN D-878.\n\n Presents form of integral and limits of integration for converging-diverging surfaces of revolution, including blockage due to throat. Interior-to-interior and exterior-exterior elements are included. No numerical results are given.\n\nRushmeier, H.E.; Baum, D.R.; and Hall, D.E., 1991, \"Accelerating the hemi-cube algorithm for calculating radiation form factors,\" J. Heat Transfer, vol. 113, no. 4, pp 1044-1047.\n\n Investigates both hardware and software enhancements to speed the hemi-cube method for calculation of configuration factors. Additionally uses spatial or geometric coherence, i.e. the fact that both a primary area and a second area that blocks or shades the primary area need not both be processed in finding the factor to the primary area using hemi-cube algorithms. Some simple checks can reduce this redundancy, resulting in considerable savings in computation time. Implementing all three enhancements simultaneously resulted in speedups of a factor greater than 6 in many cases.\n\nSabet, M. and Chung, B.T.F., 1988, \"Radiation view factors from a sphere to nonintersecting planar surfaces,\" J. Thermophysics Heat Transfer, vol. 2, no. 3, pp. 286- 288.\n\n Presents algebraic expressions for factor from sphere to noncoaxial disk sector; sphere to noncoaxial disk segment; sphere to noncoaxial rectangle; and sphere to noncoaxial ellipse. All factors require numerical integration for evaluation, and graphical results are given for some parameter sets for each geometry. All results reduce to correct limits for coaxial cases.\n\nSaltiel, C. and Naraghi, M.H.N., 1990, \"Radiative configuration factors from cylinders to coaxial axisymmetric bodies,\" Int. J. Heat Mass Transfer, vol. 33, no. 1, pp. 215-218.\n\n Derives factor from tilted differential element to a cylinder in closed algebraic form. Uses this factor to generate factors between a cylinder and coaxial bodies, including a coaxial differential conical ring, a cylinder to a coaxial paraboloid attached to the cylinder base, and from a cylinder to a coaxial axisymmetric body of revolution described by a power law attached to the cylinder base.\n\nSauer, Harry J., Jr., 1974, \"Configuration factors for radiant energy interchange with triangular areas,\" ASHRAE Trans., vol. 80, part 2, no. 2322, pp. 268-279.\n\n Numerical integration is used to find factors for nine arrangements of triangles and rectangles that lie in perpendicular planes. Configuration factor algebra is used to show the relations for an additional 13 arrangements. Results were checked against available closed-form relations, and the program was checked against results for perpendicular rectangles with \"excellent agreement.\"\n\nSchröder, Peter and Hanrahan, Pat, 1993, \"On the form factor between two polygons,\" Computer Graphics, Proc., Ann. Conf. Series, SIGGRAPH 93, pp. 163-164.\n\n Configuration factors calculated using contour integration. Polygons can be planar, convex, or concave. Provides closed-form but complicated expression for factor between polygons in arbitrary configuration.\n\nShapiro, A.B., 1985, \"Computer implementation, accuracy and timing of radiation view factor algorithms,\" J. Heat Transfer, vol. 107, no. 3, pp. 730-732, August.\n\n Compares execution time and accuracy of numerical computation of factors between finite areas by using double area integration; line integration after applying contour integration; and transformed line integrals using the method of Mitalas and Stephenson (1966). Calculations are for directly opposed rectangles. Mitalas and Stephenson method is found to be most accurate, but line integration formulation is more accurate and faster when the boundary is divided into seven or fewer elements.\n\nShukla, K.N. and Ghosh, D., 1985, \"Radiation configuration factors for concentric cylinder bodies in enclosure,\" Indian J. Technology, vol. 23, pp. 244-246, July.\n\n Derives factors among all surfaces in an enclosure composed of a closed finite length cylinder contained entirely within a longer coaxial closed cylinder\n\nSiegel, Robert and Howell, John R., 2010, Thermal Radiation Heat Transfer, 6th ed., Taylor and Francis-Hemisphere, Washington.\n\n Comprehensive text on radiative transfer, including basic definitions of and relations among configuration factors.\n\nSommers, Ralph D. and Grier, Norman T., 1969, \"Radiation view factors for a toroid: comparison of Eckert's technique and direct computation.\" J. Heat Transfer, vol. 91, no. 3, pp. 459-461, August.\n\n Compares results of experimental determination of configuration factor for differential element on surface of toroid to entire toroid by use of translucent hemisphere to numerical results in Grier and Sommers (1969). For a particular case, integrated results and experiment for toroid- toroid factor agreed within 6 percent.\n\nSotos, Carol J. and Stockman, Norbert O., 1964, \"Radiant-interchange view factors and limits of visibility for differential cylindrical surfaces with parallel generating lines,\" NASA TN D-2556.\n\n Treats factors for many geometries involving long cylinders with external parallel fins, for fins in rectangular enclosures, and for adjacent parallel long cylinders connected by fins inside enclosures. Presents results in terms of integrals of element-element factors with limits of integration. Discusses effect of finite length on the error involved in using factors for infinite length geometries.\n\nSowell, E.F. and O'Brien, P.F., 1972, \"Efficient computation of radiant-interchange factors within an enclosure,\" J. Heat Transfer, vol. 49, no. 3, pp. 326-328.\n\n Presents matrix-algebra based method for computing remaining factors for an N-surfaced enclosure with all planar or convex surfaces once the minimal set is computed separately. Discusses accuracy of technique when some of the factors are numerically small in value, so that direct application of reciprocity and conservation are insufficient to provide desired accuracy.\n\nSparrow, E.M., 1962, \"A new and simpler formulation for radiative angle factors,\" J. Heat Transfer, vol. 85, no. 2, pp. 81-88, May.\n\n Gives careful and concise exposition of contour integration for determining configuration factors. Derives factor from planar element to parallel rectangle, planar element to parallel coaxial disk, planar element to segment of disk, between parallel opposed rectangles, and between parallel coaxial disks. Notes the superposition properties of the method and the considerable simplifications available over direct area integration.\n\nSparrow, E.M., Albers, L.U., and Eckert, E.R.G., 1962, \"Thermal radiation characteristics of cylindrical heat transfer,\" J. Heat Transfer, vol. 84, no. 1, pp. 73-81.\n\n Appendix to paper provides derivation of closed form factor from ring element inside right circular cylinder to ring on cylinder base. Derivation is based on taking derivative of disk-disk factors. Steps to find final ring-ring factor for rings on cylinder interior are outlined.\n\nSparrow, E.M. and Cess, R.C., 1978, Radiation Heat Transfer, Augmented edition, Hemisphere, Washington, D.C.\n\n Contains a complete discussion of configuration factor algebra with examples, and a catalog of 15 factors.\n\nSparrow, E.M. and Eckert, E.R.G., 1962, \"Radiant interaction between fin and base surfaces,\" J. Heat Transfer, vol. 84, no. 1, pp. 12-18.\n\n Uses derivatives of disk-disk factors to obtain ring-ring factors on parallel coaxial circular disks.\n\nSparrow, E.M. and Gregg, J.L., 1961, \"Radiant interchange between circular disks having arbitrarily different temperatures,\" J. Heat Transfer, vol. 83, no.4, pp. 494-502, Nov.\n\n Uses derivatives of disk-to-disk factors to obtain ring-to-ring factors on    parallel circular disks.\n\nSparrow, E.M. and Heinisch, R.P., 1970, \"The normal emittance of circular cylindrical cavities,\" Appl. Opt., vol. 9, no. 11, pp. 2569-2572, November.\n\n Presents without derivation the factors from the inside of a cylinder ring element to a planar element on the cylinder axis or to a coaxial disk, and from a disk to a coaxial disk or to a normal planar element on the disk axis.\n\nSparrow, E.M. and Jonsson, V.K., 1963a, \"Angle factors for radiant interchange between parallel-oriented tubes,\" J. Heat Transfer, vol. 85, no. 4, pp. 382-384, Nov.\n\n Factors for exchange between ring elements on parallel tubes are used to numerically find the factors from ring elements to tubes of finite length. Case of tubes connected by thin plane through cylinder axes is also presented. Results are given for separation-to cylinder radius ratios of 0.01 to 10.\n\nSparrow, E.M. and Jonsson, V.K., 1963b, \"Radiation emission characteristics of diffuse conical cavities,\" J. Opt. Soc. Am., vol. 53, no. 7, pp. 816-821.\n\n Derives closed-form expressions for factors between parallel coaxial disks contained within a cone, and between coaxial ring elements on cone interior. Uses derivatives of disk-disk factors for the latter case. Also sets up but does not carry out disk-ring factors.\n\nSparrow, E.M. and Jonsson, V.K., 1963c, \"Thermal radiation absorption in rectangular- groove cavities,\" J. Appl. Mechs., vol. E30, pp. 237-244.\n\n Derives relation for parallel but not directly opposed infinite strips in parallel planes\n\nSparrow, E.M. and Jonsson, V.K., 1962a, \"Absorption and emission characteristics of diffuse spherical enclosures,\" NASA TN D-1289.\n\n Derives factors between any two differential elements or between any element and any finite area on the interior of a sphere.\n\nSparrow, E.M. and Jonsson, V.K., 1962b, \"Absorption and emission characteristics of diffuse spherical enclosures,\" J. Heat Transfer, vol. 84, pp. 188-189.\n\nSparrow, E.M.; Miller, G.B.; and Jonsson, V.K., 1962, \"Radiative effectiveness of annular- finned space radiators, including mutual irradiation between radiator elements,\" J. Aerospace Sci., vol. 29, no. 11, pp. 1291-1299.\n\n Uses contour integration and configuration factor algebra to find closed-form factors between all combinations of surfaces in an enclosure formed by opposed coaxial cylinders of finite length and the annular ends.\n\nStasenko, A.L., 1967, \"Self-irradiation coefficient of a Moebius strip of given shape,\" Akad. Nauk, SSSR, Izv. Energetika Transport, pp. 104-107, July-August.\n\n Derives relation for factor from Moebius strip to itself by numerical integration. Strip is of constant width and has constant radius between strip axis and centerline.\n\nStefanizzi, P., 1986, \"Reliability of the Monte Carlo method in black body view factor determination,\" Termotechnica, vol. 40, no. 6, p. 29.\n\nStephens, Charles W. and Haire, Alan M., 1961, \"Internal design considerations for cavity- type solar absorbers,\" ARS J., vol. 31, no. 7, pp. 896-901.\n\n Presents in Fig. 6 of the paper a factor q defined as the \"average fraction of light passing directly out opening\" for various cavities (hemisphere, cylinder, cone and sphere) as a function of aperture to interior area. However, q cannot be the configuration factor, because configuration factor algebra shows that Fcavity surface-aperture = Aaperture/Asurface for all geometries. The results for q are reproduced in Kreith (1962) with an error of a factor of 10 in the abscissa.\n\nStevenson, J.A. and Grafton, J.C., 1961, \"Radiation heat transfer analysis for space vehicles,\" Rept. SID-61-91, North American Aviation (AFASD TR 61-119, pt. 1), Sept. 9.\n\n Fairly complete treatment of the fundamentals of radiative transfer as applied to spacecraft design. Details energy exchange between spacecraft and nearby planets, and thus presents relations for factors between spheres and various other solid bodies. Full chapter is devoted to \"Configuration factor studies and data.\" Work of Hamilton and Morgan (1952) and Leuenberger and Person (1956) is reproduced and discussed, as are other factors from the literature. Other factors are presented in a form suitable for numerical integration. See Juul 1982b for discussion of a possible error.\n\nSydnor, C.L., 1970, \"A numerical study of cavity radiometer emissivities,\" NASA Contractor Rept. 32-1462, Jet Propulsion Lab., Feb. 15.\n\n Appendix presents closed form factors for ring element to ring element on interior of enclosure composed of right circular cylinder closed at both ends by coaxial cones. One cone is truncated. Some typographical errors exist, particularly in dF2-1, where h1 has apparently been substituted in error for y1, and in dF3-1, which has a dimensional inconsistency in the last term. The brief descriptions in the paper make the notation and definitions difficult to follow.\n\nTaylor, Robert P.; Luck, Rogelio; Hodge, B.K.; and Steele, W. Glenn, 1995,\"Uncertainty analysis of diffuse-gray radiation enclosure problems,\" J. Thermophys. Heat Trans., vol. 9, no. 1, pp. 63-69, Jan.-March.\n\n Uses uncertainty analysis to determine effects on enclosure analysis accuracy when configuration factors are independently determined and are not forced to meet closure, reciprocity, or both.\n\nToups, K.A., 1965, \"A general computer program for the determination of radiant interchange configuration and form factors- CONFAC-I,\" North American Aviation, Inc. Rept. SID-65- 1043-1 (NASA CR-65256), October.\n\nTripp, W.; Hwang, C.; and Crank, R.E., 1962, \"Radiation shape factors for plane surfaces and spheres, circles, or cylinders\" (Spec. Rept. 16) Kansas State Univ. Bull., vol. 46, no. 4.\n\n Derives closed-form solution for factor from sphere to rectangle with one corner on and normal to sphere axis. Derives relationships for factor from outside of right circular cylinder to right triangle in base plane with one vertex on axis, and from disk to right triangle in parallel plane with one vertex on disk axis. The latter two relations contain one integral that is evaluated numerically. Graphs are presented of all results. Examples of using configuration factor algebra to generate factors from spheres, cylinders, and disks to displaced planar areas are presented.\n\nTseng, J.W.C. and Strieder, W., 1990, \"View factors from wall to random dispersed solid bed transport,\" J. Heat Transfer, vol. 112, no. 3, pp. 816-819.\n\n Derives relations in integral form for the configuration factor from a plane surface to a randomly packed bed of spheres of uniform diameter  as a function of bed thickness and void fraction. Provide similar results for factor from a plane wall to a bed of randomly packed cylinders of equal diameter that are parallel to the wall and to each other. Results for the latter case are compared with results for a plane wall to cylinders arranged in staggered rows with equal spacing between cylinder spacing (pitch).\n\nTso, C.P. and Mahulikar, S.P., 1999, \"View factors between finite length rings on an interior cylindrical shell,\" AIAA J. Thermophysics Heat Transfer, vol. 13, no. 3, pp. 375-379.\n\n Uses configuration factor algebra with the factors of Brockmann to provide factors among rings on the interior surface of an outer cylinder in the presence of a central concentric cylinder.\n\nUsiskin, C.M. and Siegel, R., 1960, \"Thermal radiation from a cylindrical enclosure with specified wall heat flux,\" J. Heat Transfer, vol. 82, no. 4, pp. 369-374.\n\n Uses factor from ring element on inside of cylinder to disk in thermal analysis.\n\nvan Leersum, J., 1989, \"A method for determining a consistent set of radiation view factors from a set generated by a nonexact method,\" Int. J. Heat Fluid Flow, vol. 10, no. 1, p 83.\n\n Presents compatibility requirements for set of factors needed for enclosure analysis that will meet the requirement of overall energy conservation for the enclosure.\n\nWakao, Noriaki; Kato, Koichi; and Furuya, Nobuo, 1969, \"View factor between two hemispheres in contact and radiation heat transfer coefficient in packed beds,\" Int. J. Heat Mass Transfer, vol. 12, pp. 118-120.\n\n Numerical integration of analytical relation for factor between differential element on the surface of one hemisphere to a second coaxial hemisphere is used to find hemisphere-hemisphere factors. Hemisphere bases are parallel. Results are presented for radius ratios of 1 to 10.\n\nWang, Joseph C.Y.; Lin, Sui; Lee, Pai-Mow; Dai, Wei-Liang; and Lou, You-Shi, 1986, \"Radiant-interchange configuration factors inside segments of frustum enclosures of right circular cones,\" Int. Comm. Heat Mass Transfer, vol. 13, pp. 423-432.\n\n Presents numerically computed figures for factors between segments on parallel disks of different radii and between an isosceles trapezoid and the segment of a disk that intersects the trapezoid at right angle.\n\nWatts, R.G., 1965, \"Radiant heat transfer to Earth satellites,\" J. Heat Transfer, vol. 87, no. 3, pp. 369-373, August.\n\n Derives relations for factors from large sphere to small sphere, small hemisphere, small cylinder, or small ellipsoid. \"Small\" means that the angle between the line connecting any point on the small body and the sphere center and the line from the same point to an arbitrary point on the sphere can be considered invariant over the receiving body. Closed forms are given for the receiving body being a sphere or hemisphere. Numerical evaluation is used in other cases. All results are a factor of 4 times larger than for the configuration factor as used in this catalog because the sphere surface area is taken as p r2 rather than 4p r2.\n\nWiebelt, John A., 1966, Engineering Radiation Heat Transfer, Holt, Rinehart & Winston, New York.\n\n Contains catalog of factors excerpted from Hamilton and Morgan (1952), and a chapter on configuration factors.\n\nWiebelt, J.A. and Ruo, S.Y., 1963, \"Radiant-interchange configuration factors for finite right circular cylinder to rectangular plane,\" Int. J. Heat Mass Transfer, vol. 6, no. 2, pp. 143-146.\n\n Numerically computed factors are presented as graphs for various parametric values of rectangle size and spacing. Factors are judged by authors to have possible errors of approximately 5 percent.\n\nWong, H.Y., 1977, Handbook of Essential Formulae and Data on Heat Transfer for Engineers, Longman Group, London.\n\n Catalog of 33 factors for common geometries given mostly as closed-form expressions.\n\nYang, L., Chen, W., Luo, L., and Zhao, X., 2014, \"Calculation of Radiation Heat Transfer View Factors Among Fuel Rod Bundles Based on CFD Method,\" Annals of Nuclear Energy, vol. 71, pp. 462-466.\n\n Computes factors using both the discrete ordinates and discrete transfer methods in a commercial CFD code. Compares results with previous analytical expressions for simple parallel cylinder arrays and presents numerical results for one case of a control rod surrounded by fuel rods of different diameter.\n\nYarbrough, David W. and Lee, Chon-Lin, 1984, \"Monte Carlo calculation of radiation view factors,\" in Integral Methods in Sciences and Engineering, Payne, Fred R. et al., eds, Harper and Rowe/Hemisphere, New York, pp. 563-574.\n\n Uses Monte Carlo to compute factors for various simple geometries, and compares with analytical solutions. Presents original results for strip on finite length rectangular fin to parallel cylinder and from cylinder of finite length placed at focus of parallel paraboloid. All results are calculated to be within +/- 5 percent.\n\nYuen, W.W., 1980, \"A simplified approach to shape-factor calculation between three-dimensional planar objects,\" AIAA J. Heat Transfer, vol. 102, no. 2, pp. 386-388.\n\n Derives general relation for factor between arbitrarily arranged general polygons based on contour integration. Presents some numerical results.", null, "", null, "Send mail to: John Howell\nUniversity of Texas at Austin" ]
[ null, "http://www.thermalradiation.net/images\\taperlin.gif", null, "http://www.thermalradiation.net/images/taperlin.gif", null, "http://www.thermalradiation.net/images\\email.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8579398,"math_prob":0.8997178,"size":80599,"snap":"2019-13-2019-22","text_gpt3_token_len":20263,"char_repetition_ratio":0.19542155,"word_repetition_ratio":0.044637777,"special_character_ratio":0.23799303,"punctuation_ratio":0.21155868,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9667672,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,1,null,6,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-22T14:24:53Z\",\"WARC-Record-ID\":\"<urn:uuid:fcbe61d6-303c-4c71-90f1-cf2518775801>\",\"Content-Length\":\"305789\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f4c61ae-54d3-4a58-b89c-aef882ab1000>\",\"WARC-Concurrent-To\":\"<urn:uuid:306c72a9-24d9-45ea-af0f-59e2e7382c8c>\",\"WARC-IP-Address\":\"207.210.200.138\",\"WARC-Target-URI\":\"http://www.thermalradiation.net/referenc.html\",\"WARC-Payload-Digest\":\"sha1:TNVEX7XUVEZQ4ATKJR74R2S3R3PFRIKS\",\"WARC-Block-Digest\":\"sha1:PNLFNM3KG76HG4UE2TXF44RNJZ262PCF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202671.79_warc_CC-MAIN-20190322135230-20190322161230-00465.warc.gz\"}"}
https://www.physicsforums.com/threads/limits-splitting-the-fraction-into-two.7691/
[ "Limits splitting the fraction into two\n\nStephenPrivitera\n\nlimn-->oo(x2n-1)/(x2n+1)\nI can't figure this one out. I've tried everything. I tried splitting the fraction into two, applying a log to each side, factoring the top, dividing by x2n, and Lhopitals rule doesn't apply and wouldn't help if it did. Any ideas?\n\nLast edited by a moderator:\n\nStephenPrivitera\n\nperhaps the only way to do this would be to consider various cases such as x>1, x=1, x<-1, x=-1, etc.\nanyone agree?\n\nI get for x>1\nlim=1\nfor x=1, lim=0\nif 0<x<1, lim=-1\n\nWhat about x<0? What is -2^999999.5? Surely, it's not real. Can we say that lim DNE for x<0?\nFor -1<x<0 x^n would be very small, but wouldn't n have to be some integer?\n\nLast edited:\n\nStephenPrivitera\n\nI got stuck.\n\nFor example,\nI'll omit the subscripts.\n\nlim(x2n-1)/(x2n+1)=lim(1-1/x2n)/(1+1/x2n)\nAs n grows to infinity, we can say nothing about the limit, because it depends on what x is. If x is small then 1/x is large. If x is big, then 1/x is small.\n\nedit: whoops edited wrong post, sorry.\n\nLast edited by a moderator:\n\nHurkyl\n\nStaff Emeritus\nGold Member\nGrargh, you read and responded before I could delete my post.\n\nYes, breaking it up into cases is a good idea.\n\nedit: n often implicitly means an integer, and it wouldn't surprise me if this problem assumed as such.\n\n*sigh* Today isn't my best day.", null, "Last edited:\n\nHallsofIvy\n\nHomework Helper\nI would interpret this as n being an integer so you don't have any problems with fractional powers of negative numbers.\n\nBecause x2n= (x2)n) it doesn't matter whether x is positive or negative so you might as well assume positive. In that case the crucial cases are: 0<= x<1, x= 1, x> 1.\n\nPhysics Forums Values\n\nWe Value Quality\n• Topics based on mainstream science\n• Proper English grammar and spelling\nWe Value Civility\n• Positive and compassionate attitudes\n• Patience while debating\nWe Value Productivity\n• Disciplined to remain on-topic\n• Recognition of own weaknesses\n• Solo and co-op problem solving" ]
[ null, "data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.972401,"math_prob":0.91157705,"size":528,"snap":"2019-43-2019-47","text_gpt3_token_len":146,"char_repetition_ratio":0.099236645,"word_repetition_ratio":0.82222223,"special_character_ratio":0.2689394,"punctuation_ratio":0.15178572,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9656523,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-22T17:10:46Z\",\"WARC-Record-ID\":\"<urn:uuid:dbfb0d73-de90-49cb-a16c-e17ebb0ddc1d>\",\"Content-Length\":\"84557\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c187ca9d-c84b-46be-ace9-c329163760b4>\",\"WARC-Concurrent-To\":\"<urn:uuid:d4e324b9-027a-4276-aab2-6003ce6f050f>\",\"WARC-IP-Address\":\"23.111.143.85\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/limits-splitting-the-fraction-into-two.7691/\",\"WARC-Payload-Digest\":\"sha1:QOQOHEINC7UH5KDTA62IGYYC6ESM4BUB\",\"WARC-Block-Digest\":\"sha1:5AXJ2AVAPUERUKSWP2DUUAJRRUWZEJBI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570987822458.91_warc_CC-MAIN-20191022155241-20191022182741-00334.warc.gz\"}"}
https://physics.nist.gov/cgi-bin/cuu/Category?view=html&Atomic+and+nuclear.x=76&Atomic+and+nuclear.y=6
[ "", null, "Constants Topics: Values Energy Equivalents Searchable Bibliography Background Constants Bibliography Constants,Units & Uncertaintyhome page", null, "Constants in the category \" Atomic and nuclear constants \"...\n\nalpha particle mass\nalpha particle mass energy equivalent\nalpha particle mass energy equivalent in MeV\nalpha particle mass in u\nalpha particle molar mass\nalpha particle-electron mass ratio\nalpha particle-proton mass ratio\nCompton wavelength\ndeuteron g factor\ndeuteron magnetic moment\ndeuteron magnetic moment to Bohr magneton ratio\ndeuteron magnetic moment to nuclear magneton ratio\ndeuteron mass\ndeuteron mass energy equivalent\ndeuteron mass energy equivalent in MeV\ndeuteron mass in u\ndeuteron molar mass\ndeuteron-electron magnetic moment ratio\ndeuteron-electron mass ratio\ndeuteron-neutron magnetic moment ratio\ndeuteron-proton magnetic moment ratio\ndeuteron-proton mass ratio\nelectron charge to mass quotient\nelectron g factor\nelectron gyromagnetic ratio\nelectron gyromagnetic ratio in MHz/T\nelectron magnetic moment\nelectron magnetic moment anomaly\nelectron magnetic moment to Bohr magneton ratio\nelectron magnetic moment to nuclear magneton ratio\nelectron mass\nelectron mass energy equivalent\nelectron mass energy equivalent in MeV\nelectron mass in u\nelectron molar mass\nelectron to alpha particle mass ratio\nelectron to shielded helion magnetic moment ratio\nelectron to shielded proton magnetic moment ratio\nelectron-deuteron magnetic moment ratio\nelectron-deuteron mass ratio\nelectron-helion mass ratio\nelectron-muon magnetic moment ratio\nelectron-muon mass ratio\nelectron-neutron magnetic moment ratio\nelectron-neutron mass ratio\nelectron-proton magnetic moment ratio\nelectron-proton mass ratio\nelectron-tau mass ratio\nelectron-triton mass ratio\nFermi coupling constant\nfine-structure constant\nHartree energy\nHartree energy in eV\nhelion g factor\nhelion magnetic moment\nhelion magnetic moment to Bohr magneton ratio\nhelion magnetic moment to nuclear magneton ratio\nhelion mass\nhelion mass energy equivalent\nhelion mass energy equivalent in MeV\nhelion mass in u\nhelion molar mass\nhelion-electron mass ratio\nhelion-proton mass ratio\ninverse fine-structure constant\nmuon Compton wavelength\nmuon g factor\nmuon magnetic moment\nmuon magnetic moment anomaly\nmuon magnetic moment to Bohr magneton ratio\nmuon magnetic moment to nuclear magneton ratio\nmuon mass\nmuon mass energy equivalent\nmuon mass energy equivalent in MeV\nmuon mass in u\nmuon molar mass\nmuon-electron mass ratio\nmuon-neutron mass ratio\nmuon-proton magnetic moment ratio\nmuon-proton mass ratio\nmuon-tau mass ratio\nneutron Compton wavelength\nneutron g factor\nneutron gyromagnetic ratio\nneutron gyromagnetic ratio in MHz/T\nneutron magnetic moment\nneutron magnetic moment to Bohr magneton ratio\nneutron magnetic moment to nuclear magneton ratio\nneutron mass\nneutron mass energy equivalent\nneutron mass energy equivalent in MeV\nneutron mass in u\nneutron molar mass\nneutron to shielded proton magnetic moment ratio\nneutron-electron magnetic moment ratio\nneutron-electron mass ratio\nneutron-muon mass ratio\nneutron-proton magnetic moment ratio\nneutron-proton mass difference\nneutron-proton mass difference energy equivalent\nneutron-proton mass difference energy equivalent in MeV\nneutron-proton mass difference in u\nneutron-proton mass ratio\nneutron-tau mass ratio\nproton charge to mass quotient\nproton Compton wavelength\nproton g factor\nproton gyromagnetic ratio\nproton gyromagnetic ratio in MHz/T\nproton magnetic moment\nproton magnetic moment to Bohr magneton ratio\nproton magnetic moment to nuclear magneton ratio\nproton magnetic shielding correction\nproton mass\nproton mass energy equivalent\nproton mass energy equivalent in MeV\nproton mass in u\nproton molar mass\nproton-electron mass ratio\nproton-muon mass ratio\nproton-neutron magnetic moment ratio\nproton-neutron mass ratio\nproton-tau mass ratio\nquantum of circulation\nquantum of circulation times 2\nreduced Compton wavelength\nreduced muon Compton wavelength\nreduced neutron Compton wavelength\nreduced proton Compton wavelength\nreduced tau Compton wavelength\nRydberg constant\nRydberg constant times c in Hz\nRydberg constant times hc in eV\nRydberg constant times hc in J\nshielded helion gyromagnetic ratio\nshielded helion gyromagnetic ratio in MHz/T\nshielded helion magnetic moment\nshielded helion magnetic moment to Bohr magneton ratio\nshielded helion magnetic moment to nuclear magneton ratio\nshielded helion to proton magnetic moment ratio\nshielded helion to shielded proton magnetic moment ratio\nshielded proton gyromagnetic ratio\nshielded proton gyromagnetic ratio in MHz/T\nshielded proton magnetic moment\nshielded proton magnetic moment to Bohr magneton ratio\nshielded proton magnetic moment to nuclear magneton ratio\ntau Compton wavelength\ntau energy equivalent\ntau mass\ntau mass energy equivalent\ntau mass in u\ntau molar mass\ntau-electron mass ratio\ntau-muon mass ratio\ntau-neutron mass ratio\ntau-proton mass ratio\nThomson cross section\ntriton g factor\ntriton magnetic moment\ntriton magnetic moment to Bohr magneton ratio\ntriton magnetic moment to nuclear magneton ratio\ntriton mass\ntriton mass energy equivalent\ntriton mass energy equivalent in MeV\ntriton mass in u\ntriton molar mass\ntriton-electron mass ratio\ntriton-proton mass ratio\nweak mixing angle\n\nNew search" ]
[ null, "https://physics.nist.gov/cuu/Images/HEAD-FundCon2.gif", null, "https://physics.nist.gov/cuu/Images/space126.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5028108,"math_prob":0.9622041,"size":5241,"snap":"2020-45-2020-50","text_gpt3_token_len":1249,"char_repetition_ratio":0.30723697,"word_repetition_ratio":0.10803324,"special_character_ratio":0.14958978,"punctuation_ratio":0.0038461538,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99712336,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-02T19:39:17Z\",\"WARC-Record-ID\":\"<urn:uuid:8a268fff-99f4-4909-9a1f-ede64fc11fd2>\",\"Content-Length\":\"21480\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:064013a8-2848-4755-b075-a5a71141af66>\",\"WARC-Concurrent-To\":\"<urn:uuid:e999ad9f-e0b0-403c-a3b9-c5a755461fe4>\",\"WARC-IP-Address\":\"129.6.13.138\",\"WARC-Target-URI\":\"https://physics.nist.gov/cgi-bin/cuu/Category?view=html&Atomic+and+nuclear.x=76&Atomic+and+nuclear.y=6\",\"WARC-Payload-Digest\":\"sha1:3ISQBRZAGL75Q262UNE5MCCCLFPN4SU3\",\"WARC-Block-Digest\":\"sha1:B6VMWJWJLQTAHE7KHE2JI4CVTJFZLF4I\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141715252.96_warc_CC-MAIN-20201202175113-20201202205113-00328.warc.gz\"}"}
https://convertoctopus.com/210-feet-per-second-to-knots
[ "## Conversion formula\n\nThe conversion factor from feet per second to knots is 0.59248380129641, which means that 1 foot per second is equal to 0.59248380129641 knots:\n\n1 ft/s = 0.59248380129641 kt\n\nTo convert 210 feet per second into knots we have to multiply 210 by the conversion factor in order to get the velocity amount from feet per second to knots. We can also form a simple proportion to calculate the result:\n\n1 ft/s → 0.59248380129641 kt\n\n210 ft/s → V(kt)\n\nSolve the above proportion to obtain the velocity V in knots:\n\nV(kt) = 210 ft/s × 0.59248380129641 kt\n\nV(kt) = 124.42159827225 kt\n\nThe final result is:\n\n210 ft/s → 124.42159827225 kt\n\nWe conclude that 210 feet per second is equivalent to 124.42159827225 knots:\n\n210 feet per second = 124.42159827225 knots\n\n## Alternative conversion\n\nWe can also convert by utilizing the inverse value of the conversion factor. In this case 1 knot is equal to 0.008037189795713 × 210 feet per second.\n\nAnother way is saying that 210 feet per second is equal to 1 ÷ 0.008037189795713 knots.\n\n## Approximate result\n\nFor practical purposes we can round our final result to an approximate numerical value. We can say that two hundred ten feet per second is approximately one hundred twenty-four point four two two knots:\n\n210 ft/s ≅ 124.422 kt\n\nAn alternative is also that one knot is approximately zero point zero zero eight times two hundred ten feet per second.\n\n## Conversion table\n\n### feet per second to knots chart\n\nFor quick reference purposes, below is the conversion table you can use to convert from feet per second to knots\n\nfeet per second (ft/s) knots (kt)\n211 feet per second 125.014 knots\n212 feet per second 125.607 knots\n213 feet per second 126.199 knots\n214 feet per second 126.792 knots\n215 feet per second 127.384 knots\n216 feet per second 127.977 knots\n217 feet per second 128.569 knots\n218 feet per second 129.161 knots\n219 feet per second 129.754 knots\n220 feet per second 130.346 knots" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.74241,"math_prob":0.9925423,"size":1954,"snap":"2021-31-2021-39","text_gpt3_token_len":517,"char_repetition_ratio":0.24307692,"word_repetition_ratio":0.04255319,"special_character_ratio":0.36438075,"punctuation_ratio":0.09207161,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9949484,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-06T03:27:35Z\",\"WARC-Record-ID\":\"<urn:uuid:a99bce90-33bc-46a2-92aa-097a04ecd951>\",\"Content-Length\":\"29724\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:29bf71ee-acec-4458-88ec-26e32ff1b1bc>\",\"WARC-Concurrent-To\":\"<urn:uuid:1ae40e08-201b-4a3e-a057-db5206b730be>\",\"WARC-IP-Address\":\"172.67.197.122\",\"WARC-Target-URI\":\"https://convertoctopus.com/210-feet-per-second-to-knots\",\"WARC-Payload-Digest\":\"sha1:4D2VPODUPY6Q5IS3FLFY44J7UIT3YQEE\",\"WARC-Block-Digest\":\"sha1:QBJ3A3FSC37W2PJ7TMMGBZGNYSSKQIQU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046152112.54_warc_CC-MAIN-20210806020121-20210806050121-00111.warc.gz\"}"}
https://engineering.stackexchange.com/questions/2693/does-the-length-of-a-beam-change-upon-deflection/3109
[ "Does the length of a beam change upon deflection?\n\nI have made a Python program in which I have computed the deflection of a beam.\n\nI am plotting the deflected beam and am now asked to show the length of the beam.\n\nIf the beam is not deflected, it is easy to show the length of the beam but when the beam is deflected, I guess the length of the beam is longer than the undeflected beam. How can I compute the length of the deflected beam? Is it correct to distinguish between the length of the deflected and undeflected beam?\n\nThe dimensions of the beam and magnitude of the deflection are important here. In most structural applications, it's reasonable to assume the length of a beam is unchanged by a small deformation. One of the basic assumptions of beam theory is that there is some internal surface of the beam called the neutral axis that holds no tension or compression stress, meaning no change in length.\n\nAs with any approximation, we know the truth is more complex. The beam will lengthen slightly on one side of the neutral axis/surface and shorten slightly on the other. The question becomes, is your application sensitive enough to a change in length that you need to take into account a very slight amount of lengthening and shortening along the top and bottom surfaces of the beam? If you only want to draw a beam with small deformations so that the user can see an illustration, you don't need to consider this complexity.\n\nOne example of when you would need to look at the change in length of any part of the beam is if you have a very tight tolerance between one end of your beam and some other element that must not come into contact with the beam. In that case you might have good reason to make sure that a very slight elongation along the top fibers of the beam doesn't cause it to scrape or bind up against the neighboring element when the beam is deforming under load.\n\nNote that beam theory assumes there is no loading in the longitudinal direction; otherwise the member would be considered a beam-column.\n\n• Assuming we're talking about a gravity load on a simple span, wouldn't it be the bottom fibers that elongate, under tension? The top fibers are under compression and would contract slightly. May 5 '15 at 23:05\n• I was thinking of a cantilevered beam, but it doesn't really matter either way for the example.\n– Air\nMay 5 '15 at 23:52\n\nAdding to @Air's answer, there's also the issue of boundary conditions. A simple span where neither support allows for axial displacements will have a slight gain in length, including along the \"neutral axis\". This is because, in this case, the \"neutral axis\" will hold a tensile stress. Since the beam deforms, the neutral axis changes from a horizontal straight line to a polynomial curve, which obviously has a greater length going from A to B. This increase in length of the neutral axis implies in a uniform tensile stress along the entire beam (in addition to the transversely linear stress profile due to bending). This tensile stress is usually not taken into account since the increase in length (and therefore the requisite tensile stress) is very small.\n\nHowever, if one of the supports allows for axial displacements, then there will be no increase in length of the neutral axis, since the support will simply move slightly inwards to compensate. Obviously, in the case of the cantilever there is also no change in neutral axis length since the free end simply moves closer to the fixed end. This does, however, imply that a horizontal beam of length $L$ will, once loaded, have a horizontal length of $L - \\Delta$ (and a vertical displacement such that the total length equals $L$).\n\nA subtle bit of wording - the exact length does not change, as pointed out by Air above in his answer. However, the horizontal projection of the beam does change, as the shortest path between two points will always be a straight line. Thus, by curving, the tip of the beam will have to move backwards a bit in the x direction, to account for the deflection in the y direction.\n\nThe exact change is minimal. For a beam whose deflection $y(x)$ has been defined in terms of x, the change in \"length\" can be determined by the slope function $\\theta(x) = y'(x)$\n\n$$\\Delta L = -\\frac{1}{2}\\int^L_0(\\theta(x))^2dx$$\n\n(Ref Roark's formulas for stresses and strains, 8th edition), Eq. 8.1-14. Note it is always a shrinking of the beam." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9311527,"math_prob":0.960603,"size":1294,"snap":"2022-05-2022-21","text_gpt3_token_len":271,"char_repetition_ratio":0.13488372,"word_repetition_ratio":0.018604651,"special_character_ratio":0.20247295,"punctuation_ratio":0.09543569,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98645794,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-21T12:17:39Z\",\"WARC-Record-ID\":\"<urn:uuid:c2a07065-fa77-4ad2-9782-4ee32bd7d6cf>\",\"Content-Length\":\"158444\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0b5cc621-ed16-491b-9efa-5ad4515ecb12>\",\"WARC-Concurrent-To\":\"<urn:uuid:c75f53a3-bf9d-4549-a36c-02cc46d9e838>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://engineering.stackexchange.com/questions/2693/does-the-length-of-a-beam-change-upon-deflection/3109\",\"WARC-Payload-Digest\":\"sha1:6IJQPFB2BJUHTCCLHEWADFUKQLK5KYSO\",\"WARC-Block-Digest\":\"sha1:3OKW6IKGICP3CTCK7QJLZH5LDGC7E4IY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320303356.40_warc_CC-MAIN-20220121101528-20220121131528-00705.warc.gz\"}"}
https://zbmath.org/?q=an:1074.11063
[ "# zbMATH — the first resource for mathematics\n\nLocal tame lifting for GL$$(n)$$. III: Explicit base change and Jacquet-Langlands correspondence. (English) Zbl 1074.11063\nLet $$F$$ be a finite extension of $${\\mathbb Q}_p$$, $$p\\neq 2$$, and $$K/F$$ a finite unramified extension. Let $${\\mathcal A}_m^{\\text{ wr}}(F)$$ denote the set of equivalence classes of irreducible, totally unramified, supercuspidal representations of the group $$\\text{ GL}_{p^m}(F)$$. In earlier work [(I) Publ. Math., Inst. Hautes Étud. Sci. 83, 105–233 (1996; Zbl 0878.11042), (II) Astérisque. 254. Paris: Société Mathématique de France (1999; Zbl 0920.11079)] the authors have constructed the tame lifting map $${\\mathcal l}_{K/F}\\colon {\\mathcal A}_m^{\\text{ wr}}(F)\\to{\\mathcal A}_m^{\\text{ wr}}(K)$$ in explicit terms using the classification of representations of $$\\text{ GL}_{p^m}$$ in [C. J. Bushnell, P. C. Kutzko, The admissible dual of $$\\text{ GL}(N)$$ via compact open subgroups. Annals of Mathematics Studies, 129. Princeton University Press (Princeton, NJ) (1993; Zbl 0787.22016)].\nIn the present paper they finish the proof begun earlier that the tame lifting coincides with the Langlands base change map, i.e., they give an explicit description of base change. As an intermediate step they give an explicit description of the Jacquet-Langlands correspondence that relates representations in $${\\mathcal A}_m^{\\text{ wr}}(F)$$ to representations of a central simple division algebra over $$F$$ of degree $$p^m$$.\nFor Part IV, see Proc. Lond. Math. Soc., III. Ser. 87, No. 2, 337–362 (2003; Zbl 1037.22032).\n\n##### MSC:\n 11S37 Langlands-Weil conjectures, nonabelian class field theory 11F70 Representation-theoretic methods; automorphic representations over local and global fields 22E50 Representations of Lie and linear algebraic groups over local fields\nFull Text:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6183839,"math_prob":0.9881151,"size":2085,"snap":"2021-04-2021-17","text_gpt3_token_len":653,"char_repetition_ratio":0.10716002,"word_repetition_ratio":0.02112676,"special_character_ratio":0.3266187,"punctuation_ratio":0.19570406,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99922514,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-21T15:57:34Z\",\"WARC-Record-ID\":\"<urn:uuid:dae2000f-f2fe-43fa-b37f-9b3d745e6eb9>\",\"Content-Length\":\"47575\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:843b830a-f115-49b4-a693-a8564349a640>\",\"WARC-Concurrent-To\":\"<urn:uuid:8913e54c-275d-4a33-aed8-3423666358db>\",\"WARC-IP-Address\":\"141.66.194.2\",\"WARC-Target-URI\":\"https://zbmath.org/?q=an:1074.11063\",\"WARC-Payload-Digest\":\"sha1:WRBJYBCK4IPYMXPJWYFIQT2EHI7P3Y6L\",\"WARC-Block-Digest\":\"sha1:HVKKSD5GJMIJXYT2NUUE3C7NCRQNAHIJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703524858.74_warc_CC-MAIN-20210121132407-20210121162407-00150.warc.gz\"}"}