URL
stringlengths
15
1.68k
text_list
sequencelengths
1
199
image_list
sequencelengths
1
199
metadata
stringlengths
1.19k
3.08k
https://math.stackexchange.com/questions/3126698/is-it-true-that-given-a-set-e-every-point-in-the-set-of-boundary-points-of-e-i
[ "# Is it true that, given a set E, every point in the set of boundary points of E is an accumulation point of the set of boundary points?\n\nSuppose $$E\\subset \\mathbb{R}^n.$$ Is it true that for all $$x\\in\\partial E,$$ $$x$$ is an accumulation point of $$\\partial E$$?\n\nThe reason I think this is true (despite my feeling it is false) is that we have $$\\partial E=\\{ p \\in \\mathbb{R}^n, \\forall r>0 \\text{ one has } B(p,r)\\cap E\\neq\\emptyset \\text{ and } B(p,r)\\cap E^C \\neq \\emptyset \\}$$\n\nwhich implies, with some extra reasoning, that every ball about every point in $$\\partial E$$ Intersects $$S-\\{p\\}.$$\n\n• What is the boundary of the set $\\{0\\}$ in $\\mathbb R$? What are the accumulation points? – GEdgar Feb 25 at 22:15\n• @GEdgar the boundary is 0 and there are no accumulation points. Got it. Counter example. Thanks. – Jake Feb 25 at 22:17\n\n$$E=(0,1) \\subseteq \\mathbb R$$ only has two boundary points and these are not accumulation points of that finite boundary...." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8313551,"math_prob":0.9998779,"size":454,"snap":"2019-43-2019-47","text_gpt3_token_len":155,"char_repetition_ratio":0.12,"word_repetition_ratio":0.0,"special_character_ratio":0.31938326,"punctuation_ratio":0.091836736,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999474,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-15T08:08:30Z\",\"WARC-Record-ID\":\"<urn:uuid:e1ad9351-4245-418b-b495-3262cf9c5998>\",\"Content-Length\":\"138071\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2b41ed2a-c2fb-4808-b878-16d3ac971e1b>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc04ce70-0593-41ed-88ec-0f9ccf2aa750>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/3126698/is-it-true-that-given-a-set-e-every-point-in-the-set-of-boundary-points-of-e-i\",\"WARC-Payload-Digest\":\"sha1:NHO2YN2UPCK2K4XDURIPPFRRHM5BSAUS\",\"WARC-Block-Digest\":\"sha1:3CTIV37OGHG3B3QNDM45PO4L5MJGA2E6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496668594.81_warc_CC-MAIN-20191115065903-20191115093903-00034.warc.gz\"}"}
https://developer.arm.com/docs/ddi0596/i/simd-and-floating-point-instructions-alphabetic-order/frint32x-scalar-floating-point-round-to-32-bit-integer-using-current-rounding-mode-scalar
[ "You copied the Doc URL to your clipboard.\n\n## FRINT32X (scalar)\n\nFloating-point Round to 32-bit Integer, using current rounding mode (scalar). This instruction rounds a floating-point value in the SIMD&FP source register to an integral floating-point value that fits into a 32-bit integer size using the rounding mode that is determined by the FPCR, and writes the result to the SIMD&FP destination register.\n\nA zero input returns a zero result with the same sign. When the result value is not numerically equal to the input value, an Inexact exception is raised. When the input is infinite, NaN or out-of-range, the instruction returns {for the corresponding result value} the most negative integer representable in the destination size, and an Invalid Operation floating-point exception is raised.\n\nA floating-point exception can be generated by this instruction. Depending on the settings in FPCR, the exception results in either a flag being set in FPSR, or a synchronous exception being generated. For more information, see Floating-point exception traps.\n\nDepending on the settings in the CPACR_EL1, CPTR_EL2, and CPTR_EL3 registers, and the current Security state and Exception level, an attempt to execute the instruction might be trapped.\n\n### Floating-point(Armv8.5)\n\n 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 0 0 0 1 1 1 1 0 0 x 1 0 1 0 0 0 1 1 0 0 0 0 Rn Rd ftype op\n\n#### Single-precision (ftype == 00)\n\nFRINT32X <Sd>, <Sn>\n\n#### Double-precision (ftype == 01)\n\nFRINT32X <Dd>, <Dn>\n\n```if !HaveFrintExt() then UNDEFINED;\ninteger d = UInt(Rd);\ninteger n = UInt(Rn);\n\ninteger esize;\ncase ftype of\nwhen '00' esize = 32;\nwhen '01' esize = 64;\nwhen '1x' UNDEFINED;\n\nFPRounding rounding = FPRoundingMode(FPCR[]);```\n\n### Assembler Symbols\n\n\nIs the 64-bit name of the SIMD&FP destination register, encoded in the \"Rd\" field.\n Is the 64-bit name of the SIMD&FP source register, encoded in the \"Rn\" field.\n Is the 32-bit name of the SIMD&FP destination register, encoded in the \"Rd\" field.\n Is the 32-bit name of the SIMD&FP source register, encoded in the \"Rn\" field.\n\n### Operation\n\n```CheckFPAdvSIMDEnabled64();\n\nFPCRType fpcr = FPCR[];\nboolean merge = IsMerging(fpcr);\nbits(128) result = if merge then V[d] else Zeros();\nbits(esize) operand = V[n];\n\nElem[result, 0, esize] = FPRoundIntN(operand, fpcr, rounding, 32);\n\nV[d] = result;```" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.66792864,"math_prob":0.9725795,"size":2272,"snap":"2021-04-2021-17","text_gpt3_token_len":650,"char_repetition_ratio":0.13580246,"word_repetition_ratio":0.13440861,"special_character_ratio":0.30853873,"punctuation_ratio":0.11659193,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9614374,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-15T16:09:34Z\",\"WARC-Record-ID\":\"<urn:uuid:95798f23-5a29-48e5-9ce6-e867f870724a>\",\"Content-Length\":\"179186\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4cd9a3d7-cd93-46ff-9976-16c0905e69ec>\",\"WARC-Concurrent-To\":\"<urn:uuid:a2f3fd80-e392-47d1-a98a-7e0cd98412ba>\",\"WARC-IP-Address\":\"104.111.77.174\",\"WARC-Target-URI\":\"https://developer.arm.com/docs/ddi0596/i/simd-and-floating-point-instructions-alphabetic-order/frint32x-scalar-floating-point-round-to-32-bit-integer-using-current-rounding-mode-scalar\",\"WARC-Payload-Digest\":\"sha1:Y42DDQVJPTMPXSCIIJH2MF7M4FQEVQU7\",\"WARC-Block-Digest\":\"sha1:UO2RZWKWIQWNJRF25QXBDSVWHFCN65V2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703495901.0_warc_CC-MAIN-20210115134101-20210115164101-00461.warc.gz\"}"}
https://rustcc.cn/article?id=13a7adbe-56fb-4459-9f99-ba31aa7138d7
[ "< 返回版块\n\n## Rust FFI 编程 - 手动绑定 C 库入门 05\n\nMike Tang 发表于 2020-06-27 19:26\n\nTags:rust,ffi\n\n1. 被调函数在 C 端,接收一个函数指针作为回调函数,并调用;\n2. 主函数在 Rust 中,在 Rust 中调用 C 端的这个函数;\n3. 在 Rust 中,传递一个 Rust 中定义的函数,到这个 C 端的被调函数中作为回调函数。\n\n1. 有可能想在底层事件(异步)框架中,注册一个函数,事件触发的时候,调用;\n2. 底层采用注册一个路由表的形式,在程序开始的时候,注册一堆函数操作进去;\n3. 其它。\n\n### 基础示例\n\n1. C 端,设计一个函数,sum_square_cb01, 接收两个整型参数 a, b,和一个函数指针,计算 a2 + b2 的值,并且将值传递进第三个参数(函数中),进行打印;\n2. Rust 端,定义一个回调函数 cb_func,在这个回调函数中,打印上述平方和;\n3. Rust 端,引入 C 中定义的 sum_square_cb01;\n4. 在 Rust 的 main 中,调用 sum_square_cb01。\n\n``````// csrc/ccode01.c\n\n#include<stdio.h>\n\ntypedef void (*SumSquareCB)(int result);\n\nvoid sum_square_cb01(int a, int b, SumSquareCB cb) {\nint result = a*a + b*b;\ncb(result);\n}\n``````\n\nRust 端:\n\n``````// src/r01.rs\n\nuse std::os::raw::c_int;\n\npub type SumSquareCB = unsafe extern fn(c_int);\n\nextern {\npub fn sum_square_cb01(a: c_int, b: c_int, cb: SumSquareCB);\n}\n\npub unsafe extern fn cb_func(result: c_int) {\nprintln!(\"The result in callback function is: {}\", result);\n}\n\nfn main() {\nunsafe {\nsum_square_cb01(3, 4, cb_func);\n}\n}\n``````\n\n• 两边都需要定义回调函数的类型(签名),而且定义要一致。\n\nC 中定义:\n\n``````typedef void (*SumSquareCB)(int result);\n``````\n\nRust 中定义:\n\n``````pub type SumSquareCB = unsafe extern fn(c_int);\n``````\n\n`fn` 是 Rust 中的函数指针类型。具体可参见标准库文档 fn,解释得非常详尽。\n\n• Rust 中的回调函数定义\n``````pub unsafe extern fn cb_func(result: c_int) {\nprintln!(\"The result in callback function is: {}\", result);\n}\n``````\n\n• 代码的编译方式,见前一篇,此不赘述。\n\n``````RUSTFLAGS='-L .' LD_LIBRARY_PATH=\".\" cargo run --bin r01\n``````\n\n``````The result in callback function is: 25\n``````\n\n### 在回调函数中,更新外部数据\n\n``````// src/r01-1.rs\n\nuse std::os::raw::c_int;\n\npub type SumSquareCB = unsafe extern fn(c_int);\n\nextern {\npub fn sum_square_cb01(a: c_int, b: c_int, cb: SumSquareCB);\n}\n\nfn main() {\nlet mut sum = 0;\n\npub unsafe extern fn cb_func(result: c_int) {\nsum += result;\n}\n\nunsafe {\nsum_square_cb01(3, 4, cb_func);\n}\n\nprintln!(\"The result in callback function is: {}\", sum);\n}\n``````\n\n``````error[E0434]: can't capture dynamic environment in a fn item\n--> src/r01-1.rs:14:9\n|\n14 | sum += result;\n| ^^^\n|\n= help: use the `|| { ... }` closure form instead\n\nerror: aborting due to previous error\n``````\n\n``````// src/r01-2.rs\n\nuse std::os::raw::c_int;\n\npub type SumSquareCB = unsafe extern fn(c_int);\n\nextern {\npub fn sum_square_cb01(a: c_int, b: c_int, cb: SumSquareCB);\n}\n\nfn main() {\nlet mut sum = 0;\n\nunsafe {\nsum_square_cb01(3, 4, |r| sum += r );\n}\n\nprintln!(\"The result in callback function is: {}\", sum);\n}\n``````\n\n``````error[E0308]: mismatched types\n--> src/r01-1.rs:14:31\n|\n14 | sum_square_cb01(3, 4, |r| sum += r );\n| ^^^^^^^^^^^^ expected fn pointer, found closure\n|\n= note: expected fn pointer `unsafe extern \"C\" fn(i32)`\nfound closure `[closure@src/r01-1.rs:14:31: 14:43 sum:_]`\n\nerror: aborting due to previous error\n``````\n\n`void *` 是一种通用指针,意思是”指向某个东西的指针“,它的灵活和强大之处在于,可以强制转换到任何指针类型。这里,我们也可以使用 `void *` 来传递我们的”数据块“。\n\n1. 在 Rust 的 main 函数中,定义一个变量 sum;\n2. 在 Rust 中定义的回调函数中,更新这个变量 sum;\n3. 由于需要传递数据块地址,需要修改回调函数的签名定义;\n\nC端:\n\n``````// csrc/ccode02.c\n\n#include<stdio.h>\n\ntypedef void (*SumSquareCB)(int result, void *user_data);\n\nvoid sum_square_cb02(int a, int b, SumSquareCB cb, void *user_data) {\nint result = a*a + b*b;\ncb(result, user_data);\n}\n``````\n\nRust 端:\n\n``````use std::os::raw::c_int;\nuse std::ffi::c_void;\n\npub type SumSquareCB = unsafe extern fn(c_int, *mut c_void);\n\nextern {\npub fn sum_square_cb02(a: c_int, b: c_int, cb: SumSquareCB, user_data: *mut c_void);\n}\n\npub unsafe extern fn cb_func(result: c_int, user_data: *mut c_void) {\nlet data = &mut *(user_data as *mut c_int);\n*data += result;\n}\n\nfn main() {\nlet mut sum = 0;\n\nunsafe {\nsum_square_cb02(\n3,\n4,\ncb_func,\n&mut sum as *mut c_int as *mut c_void);\n}\n\nprintln!(\"The sum is {}\", sum);\n}\n``````\n\n``````RUSTFLAGS='-L .' LD_LIBRARY_PATH=\".\" cargo run --bin r01\n``````\n\n``````The sum is 25\n``````\n\nRust 端引入了 `std::ffi::c_void;`。这是 Rust 给我们提供的强大的基础设施,不然我们真要愁眉苦脸了。从标准库页面可以学习到,Rust 中的 `*const c_void` 等于 C 的 `const void*`,Rust 中的 `*mut c_void` 等于 C 的 `void*`。(C 中的 void 函数返回值本身,与 Rust 的空值类型 () 相等)\n\n• 回调函数中的类型强制转换\n``````pub unsafe extern fn cb_func(result: c_int, user_data: *mut c_void) {\nlet data = &mut *(user_data as *mut c_int);\n*data += result;\n}\n``````\n\n``````let data = &mut *(user_data as *mut c_int);\n``````\n\n``````*data += result;\n``````\n\n• 传参时的\n`````` unsafe {\nsum_square_cb02(\n3,\n4,\ncb_func,\n&mut sum as *mut c_int as *mut c_void);\n}\n``````\n\n``````&mut sum as *mut c_int as *mut c_void\n``````\n\n• 打印语句\n\n### 更新结构体\n\nC 端:\n\n``````#include<stdio.h>\n\ntypedef void (*SumSquareCB)(int result, void *user_data);\n\nvoid sum_square_cb03(int a, int b, SumSquareCB cb, void *user_data) {\nint result = a*a + b*b;\ncb(result, user_data);\n}\n``````\n\nRust 端:\n\n``````use std::os::raw::c_int;\nuse std::ffi::c_void;\n\npub type SumSquareCB = unsafe extern fn(c_int, *mut c_void);\n\nextern {\npub fn sum_square_cb03(a: c_int, b: c_int, cb: SumSquareCB, user_data: *mut c_void);\n}\n\npub unsafe extern fn cb_func(result: c_int, user_data: *mut c_void) {\nlet data = &mut *(user_data as *mut SumRecord);\ndata.sum += result;\ndata.elem_number += 1;\n}\n\n#[derive(Debug, Default, Clone, PartialEq)]\nstruct SumRecord {\nsum: c_int,\nelem_number: usize,\n}\n\nfn main() {\nlet mut sum = SumRecord::default();\n\nunsafe {\nsum_square_cb03(\n3,\n4,\ncb_func,\n&mut sum as *mut SumRecord as *mut c_void);\n}\n\nprintln!(\"The sum is {:?}\", sum);\n}\n``````\n\n``````RUSTFLAGS='-L .' LD_LIBRARY_PATH=\".\" cargo run --bin r03\n``````\n\n``````The sum is SumRecord { sum: 25, elem_number: 1 }\n``````\n\n• C 中代码没变\n\n• Rust 中加了结构体定义\n``````#[derive(Debug, Default, Clone, PartialEq)]\nstruct SumRecord {\nsum: c_int,\nelem_number: usize,\n}\n``````\n\n• 魔法在哪里?\n\nRust 中的回调函数签名都没有变化。变化在下面这里:\n\n`````` let data = &mut *(user_data as *mut SumRecord);\ndata.sum += result;\ndata.elem_number += 1;\n``````\n\n`````` unsafe {\nsum_square_cb03(\n3,\n4,\ncb_func,\n&mut sum as *mut SumRecord as *mut c_void);\n}\n``````\n\n1 共 0 条评论, 1 页" ]
[ null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.68516445,"math_prob":0.9911593,"size":7373,"snap":"2020-24-2020-29","text_gpt3_token_len":3777,"char_repetition_ratio":0.1613516,"word_repetition_ratio":0.4037461,"special_character_ratio":0.31669605,"punctuation_ratio":0.1912088,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9941949,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-06T05:05:52Z\",\"WARC-Record-ID\":\"<urn:uuid:01495b20-d296-4a3c-b373-852a80e0f6b9>\",\"Content-Length\":\"19060\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:51f84395-9418-4f9a-8eab-1370ac61c344>\",\"WARC-Concurrent-To\":\"<urn:uuid:046ee52e-3f1a-4951-821d-fded3d2dc0f4>\",\"WARC-IP-Address\":\"39.100.77.211\",\"WARC-Target-URI\":\"https://rustcc.cn/article?id=13a7adbe-56fb-4459-9f99-ba31aa7138d7\",\"WARC-Payload-Digest\":\"sha1:U4VDS42HMXPQTZ6JHZOOMNZKX4H6DJFY\",\"WARC-Block-Digest\":\"sha1:UQ3VPABZQLT3ULJU7GDJ4K7357B5MOMQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655890105.39_warc_CC-MAIN-20200706042111-20200706072111-00430.warc.gz\"}"}
https://www.mycompiler.io/view/A51wt6Y
[ "# Write a python function to print the multiplication table of a given number.\n\n· September 23, 2021 ·", null, "Python\n```def reversed_Array(num):\nfor i in reversed(range(1,11)):\nprint(str(num)+\" X \",i,\"=\",num*i)\n\nreversed_Array(5)\n```" ]
[ null, "https://www.mycompiler.io/img/lang/python_small.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.69250727,"math_prob":0.74237156,"size":359,"snap":"2021-43-2021-49","text_gpt3_token_len":90,"char_repetition_ratio":0.115492955,"word_repetition_ratio":0.0,"special_character_ratio":0.2534819,"punctuation_ratio":0.1388889,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95798004,"pos_list":[0,1,2],"im_url_duplicate_count":[null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-07T09:13:37Z\",\"WARC-Record-ID\":\"<urn:uuid:067c60df-f258-47b2-959a-93348b957f16>\",\"Content-Length\":\"12681\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dc348b50-647b-446f-970c-f1eb9f4d5aad>\",\"WARC-Concurrent-To\":\"<urn:uuid:14ff3437-3f66-4515-b080-0332df18c8ff>\",\"WARC-IP-Address\":\"104.21.55.187\",\"WARC-Target-URI\":\"https://www.mycompiler.io/view/A51wt6Y\",\"WARC-Payload-Digest\":\"sha1:GTRPI4CJ3TBYHELMLXTKFAWI7BH7VL3M\",\"WARC-Block-Digest\":\"sha1:6SKFNJM3JIVXKI53AGSK72DTIFXMXGSS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363337.27_warc_CC-MAIN-20211207075308-20211207105308-00608.warc.gz\"}"}
https://www.colorhexa.com/1b462b
[ "# #1b462b Color Information\n\nIn a RGB color space, hex #1b462b is composed of 10.6% red, 27.5% green and 16.9% blue. Whereas in a CMYK color space, it is composed of 61.4% cyan, 0% magenta, 38.6% yellow and 72.5% black. It has a hue angle of 142.3 degrees, a saturation of 44.3% and a lightness of 19%. #1b462b color hex could be obtained by blending #368c56 with #000000. Closest websafe color is: #333333.\n\n• R 11\n• G 27\n• B 17\nRGB color chart\n• C 61\n• M 0\n• Y 39\n• K 73\nCMYK color chart\n\n#1b462b color description : Very dark cyan - lime green.\n\n# #1b462b Color Conversion\n\nThe hexadecimal color #1b462b has RGB values of R:27, G:70, B:43 and CMYK values of C:0.61, M:0, Y:0.39, K:0.73. Its decimal value is 1787435.\n\nHex triplet RGB Decimal 1b462b `#1b462b` 27, 70, 43 `rgb(27,70,43)` 10.6, 27.5, 16.9 `rgb(10.6%,27.5%,16.9%)` 61, 0, 39, 73 142.3°, 44.3, 19 `hsl(142.3,44.3%,19%)` 142.3°, 61.4, 27.5 333333 `#333333`\nCIE-LAB 26.121, -22.182, 11.9 3.078, 4.788, 3.047 0.282, 0.439, 4.788 26.121, 25.172, 151.788 26.121, -17.428, 15.081 21.88, -13.18, 7.059 00011011, 01000110, 00101011\n\n# Color Schemes with #1b462b\n\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #461b36\n``#461b36` `rgb(70,27,54)``\nComplementary Color\n• #21461b\n``#21461b` `rgb(33,70,27)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #1b4641\n``#1b4641` `rgb(27,70,65)``\nAnalogous Color\n• #461b21\n``#461b21` `rgb(70,27,33)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #411b46\n``#411b46` `rgb(65,27,70)``\nSplit Complementary Color\n• #462b1b\n``#462b1b` `rgb(70,43,27)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #2b1b46\n``#2b1b46` `rgb(43,27,70)``\n• #36461b\n``#36461b` `rgb(54,70,27)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #2b1b46\n``#2b1b46` `rgb(43,27,70)``\n• #461b36\n``#461b36` `rgb(70,27,54)``\n• #060f09\n``#060f09` `rgb(6,15,9)``\n• #0d2114\n``#0d2114` `rgb(13,33,20)``\n• #143420\n``#143420` `rgb(20,52,32)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #225836\n``#225836` `rgb(34,88,54)``\n• #296b42\n``#296b42` `rgb(41,107,66)``\n• #307d4d\n``#307d4d` `rgb(48,125,77)``\nMonochromatic Color\n\n# Alternatives to #1b462b\n\nBelow, you can see some colors close to #1b462b. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #1b4620\n``#1b4620` `rgb(27,70,32)``\n• #1b4624\n``#1b4624` `rgb(27,70,36)``\n• #1b4627\n``#1b4627` `rgb(27,70,39)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #1b462f\n``#1b462f` `rgb(27,70,47)``\n• #1b4632\n``#1b4632` `rgb(27,70,50)``\n• #1b4636\n``#1b4636` `rgb(27,70,54)``\nSimilar Colors\n\n# #1b462b Preview\n\nThis text has a font color of #1b462b.\n\n``<span style=\"color:#1b462b;\">Text here</span>``\n#1b462b background color\n\nThis paragraph has a background color of #1b462b.\n\n``<p style=\"background-color:#1b462b;\">Content here</p>``\n#1b462b border color\n\nThis element has a border color of #1b462b.\n\n``<div style=\"border:1px solid #1b462b;\">Content here</div>``\nCSS codes\n``.text {color:#1b462b;}``\n``.background {background-color:#1b462b;}``\n``.border {border:1px solid #1b462b;}``\n\n# Shades and Tints of #1b462b\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #050d08 is the darkest color, while #fefffe is the lightest one.\n\n• #050d08\n``#050d08` `rgb(5,13,8)``\n• #0b1c11\n``#0b1c11` `rgb(11,28,17)``\n• #102a1a\n``#102a1a` `rgb(16,42,26)``\n• #163822\n``#163822` `rgb(22,56,34)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #205434\n``#205434` `rgb(32,84,52)``\n• #26623c\n``#26623c` `rgb(38,98,60)``\n• #2b7045\n``#2b7045` `rgb(43,112,69)``\n• #317f4e\n``#317f4e` `rgb(49,127,78)``\n• #368d56\n``#368d56` `rgb(54,141,86)``\n• #3c9b5f\n``#3c9b5f` `rgb(60,155,95)``\n• #41a968\n``#41a968` `rgb(65,169,104)``\n• #47b771\n``#47b771` `rgb(71,183,113)``\n• #54bd7b\n``#54bd7b` `rgb(84,189,123)``\n• #63c386\n``#63c386` `rgb(99,195,134)``\n• #71c891\n``#71c891` `rgb(113,200,145)``\n• #7fce9c\n``#7fce9c` `rgb(127,206,156)``\n• #8dd3a7\n``#8dd3a7` `rgb(141,211,167)``\n• #9bd8b2\n``#9bd8b2` `rgb(155,216,178)``\n• #a9debd\n``#a9debd` `rgb(169,222,189)``\n• #b7e3c8\n``#b7e3c8` `rgb(183,227,200)``\n• #c6e9d3\n``#c6e9d3` `rgb(198,233,211)``\n• #d4eede\n``#d4eede` `rgb(212,238,222)``\n• #e2f4e9\n``#e2f4e9` `rgb(226,244,233)``\n• #f0f9f3\n``#f0f9f3` `rgb(240,249,243)``\n• #fefffe\n``#fefffe` `rgb(254,255,254)``\nTint Color Variation\n\n# Tones of #1b462b\n\nA tone is produced by adding gray to any pure hue. In this case, #2e3330 is the less saturated color, while #016024 is the most saturated one.\n\n• #2e3330\n``#2e3330` `rgb(46,51,48)``\n• #2a372f\n``#2a372f` `rgb(42,55,47)``\n• #263b2e\n``#263b2e` `rgb(38,59,46)``\n• #223f2d\n``#223f2d` `rgb(34,63,45)``\n• #1f422c\n``#1f422c` `rgb(31,66,44)``\n• #1b462b\n``#1b462b` `rgb(27,70,43)``\n• #174a2a\n``#174a2a` `rgb(23,74,42)``\n• #144d29\n``#144d29` `rgb(20,77,41)``\n• #105128\n``#105128` `rgb(16,81,40)``\n• #0c5527\n``#0c5527` `rgb(12,85,39)``\n• #085926\n``#085926` `rgb(8,89,38)``\n• #055c25\n``#055c25` `rgb(5,92,37)``\n• #016024\n``#016024` `rgb(1,96,36)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #1b462b is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.55881214,"math_prob":0.68883073,"size":3680,"snap":"2021-43-2021-49","text_gpt3_token_len":1674,"char_repetition_ratio":0.12350381,"word_repetition_ratio":0.011029412,"special_character_ratio":0.5597826,"punctuation_ratio":0.23555556,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99081784,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-08T21:24:56Z\",\"WARC-Record-ID\":\"<urn:uuid:ffd899f9-72e3-4779-850d-497c838d29bf>\",\"Content-Length\":\"36113\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2b939275-a191-48d9-87aa-7a45d3d4262a>\",\"WARC-Concurrent-To\":\"<urn:uuid:06bb07fb-58a2-4c6a-8eef-2991ea536240>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/1b462b\",\"WARC-Payload-Digest\":\"sha1:ZBMJCAQ4U4LNWOAKTWNW72BG5SNRZQ3W\",\"WARC-Block-Digest\":\"sha1:BPY5T3DJAWSP64XRULTTHHSCTKT63F42\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363598.57_warc_CC-MAIN-20211208205849-20211208235849-00605.warc.gz\"}"}
https://tex.stackexchange.com/questions/54032/text-following-subequations-is-slightly-indented-if-a-label-is-used
[ "Text following subequations is slightly indented if a label is used\n\nThe following minimal code causes a small indentation at the beginning of the line of text, smaller than the usual indentation at the start of a paragraph. It disappears if the label in subequations is removed.\n\n\\documentclass{article}\n\\usepackage{mathtools}\n\n\\begin{document}\n\\begin{subequations}\n\\begin{gather}\na = b\\\\\nb = c\n\\end{gather}\n\\label{eqn:test}\n\\end{subequations}\nLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua \\ref{eqn:test}.\n\\end{document}\n\nI haven't noticed this effect in any other maths environments - is this a bug in subequations?\n\nEDIT: replace gather* with gather\n\n• The * in gather was a mistake. It was in the minimal test code – mjr May 2 '12 at 0:16\n\nsubequations only plays around with the equation number and does nothing else. Therefore, placing it as the surrounding environment for gather actually sets it in text mode and leaves a spurious space if you don't end a line with %.\n\nSolution: Insert % at the end of the \\label: \\label{...}%\n\n• All the answers were essentially the same, except you called my attention to the fact about subequations and it working in text mode. Thanks – mjr May 2 '12 at 11:20\n\nPut a % after \\label{eqn:test}.\n\n\\begin{subequations}\n\\begin{gather*}\na = b\\\\\nb = c\n\\end{gather*}\n\\label{eqn:test}% %%<---here\n\\end{subequations}\nLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua \\ref{eqn:test}.\n\nActually the label should be written before the begin{gather*}. Then the Lorem... will start as a new para as in\n\n\\documentclass{article}\n\\usepackage{mathtools}\n\\begin{document}\n\\begin{subequations}\n\\label{eqn:test}%\n\\begin{gather*}\na = b\\\\\nb = c\n\\end{gather*}\n\\end{subequations}\nLorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua \\ref{eqn:test}.\n\\end{document}\n\nNote: Using \\label to a un-numbered equations doesn't mean anything (starred version does not produce equation number and hence referring to that equation!.....). Use gather instead.\n\nThe \\label is to subequations, so\n\n\\begin{subequations}\\label{eqn:test}\n\\begin{gather}\na = b\\\\\nb = c\n\\end{gather}\n\\end{subequations}\n\nwon't have spurious spaces. Notice that using subequations with gather* is meaningless: there will be no equation number to reference. You probably mean gather, without *, so each equation in the alignment will receive a subnumber." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5793618,"math_prob":0.987002,"size":658,"snap":"2019-43-2019-47","text_gpt3_token_len":163,"char_repetition_ratio":0.12691131,"word_repetition_ratio":0.0,"special_character_ratio":0.21276596,"punctuation_ratio":0.08928572,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99619204,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-16T10:31:37Z\",\"WARC-Record-ID\":\"<urn:uuid:35181de6-f002-4944-9fae-03d6ec097a0b>\",\"Content-Length\":\"151940\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1c04a17b-abac-4079-ae09-55574786df3a>\",\"WARC-Concurrent-To\":\"<urn:uuid:a10a53d7-72cd-4a9c-be5b-0ad5e01914f6>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://tex.stackexchange.com/questions/54032/text-following-subequations-is-slightly-indented-if-a-label-is-used\",\"WARC-Payload-Digest\":\"sha1:BDUYKHYMKTYIH4SEH3OIXGJWHQYWMENI\",\"WARC-Block-Digest\":\"sha1:SUCUTIIH7EJBKU2BN2TSTCVMFKI72DKT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986666959.47_warc_CC-MAIN-20191016090425-20191016113925-00320.warc.gz\"}"}
https://math.stackexchange.com/questions/1733746/faithful-character-of-degree-less-than-p-gives-abelian-p-sylow-groups
[ "# Faithful character of degree less than p gives abelian p-Sylow groups.\n\nI am trying to prove:\n\nSuppose $p$ divides $|G|$ and let $\\chi \\in Irr(G)$ if $\\chi$ is faithful and its degree is less than $p$ then any $p$-Sylow subgroup of $G$ is abelian.\n\nI have tried to decompose the restriction of $\\chi$ to $P$, a $p$-group, into irreducibles and I guess I should try to prove that this gives me all one dimensional constituents, but I have no idea how to proceed.\n\nAny hints, links to good sources or other help is much appreciated.\n\nThanks.\n\n• It's restriction to a Sylow $p$-subgroup $P$ is faithful and must be a sum of linear characters, so $P$ is abelian. (Remember that the degree of an irreducible character of $P$ must divide $|P|$.) – Derek Holt Apr 8 '16 at 19:18\n• That's a really nice quick little argument. Much obliged! (I'll accept if you choose to repost as an answer.) – Winston Apr 8 '16 at 20:02\n• @DerekHolt Sounds like an answer, not a comment. – zibadawa timmy Apr 8 '16 at 20:02\n\n## 1 Answer\n\nOK, I'll make it an answer. The restriction $\\chi_P$ of $\\chi$ to $P \\in {\\rm Sy}_p(G)$ decomposes into irreducible characters of $P$. Since the degree of any such character divides $|P|$, it must be power of $p$. But $\\deg(\\chi) < p$, so all of the irreducible constituents of $\\chi_P$ have degree $1$. Since $\\chi$ and hence $\\chi_P$ is faithful, so $P$ must be abelian.\n\nBy the way, there is no need to assume that $\\chi$ is irreducible, just that it is faithful." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93703943,"math_prob":0.9944254,"size":463,"snap":"2019-13-2019-22","text_gpt3_token_len":127,"char_repetition_ratio":0.100217864,"word_repetition_ratio":0.0,"special_character_ratio":0.26565874,"punctuation_ratio":0.0927835,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.999554,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-26T12:58:55Z\",\"WARC-Record-ID\":\"<urn:uuid:cee4dc87-612f-4dd1-b6a3-9227e8e414e6>\",\"Content-Length\":\"133418\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2507e0b3-5b83-417b-b6ff-3a9a68643e93>\",\"WARC-Concurrent-To\":\"<urn:uuid:453f6f6d-a6d3-450c-9aee-4c2f953a4e5b>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/1733746/faithful-character-of-degree-less-than-p-gives-abelian-p-sylow-groups\",\"WARC-Payload-Digest\":\"sha1:VRKHOM4W7FSRIZWND4DQ5ZDNHSPOX4V7\",\"WARC-Block-Digest\":\"sha1:MUJMDMXFPH46PQGFWEAHLS7XEGTFKPJJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232259177.93_warc_CC-MAIN-20190526125236-20190526151236-00379.warc.gz\"}"}
https://imath.co.za/grade12e/nr1207graph.html
[ "#### Different kinds of graphs.\n\n1.\nThe diagrams below show the graphs of variables a and b. Variable a is plotted on the\nhorisontal axis, the x-axis, and b on the vertical axis, the y-axis.\nWhat is the relationship between a and b? Give reasons. Use the expressions directly\nproportional, inversely proportional or unknown to describe the relationship between a and b.\n1.1\n1.2\n1.3", null, "", null, "", null, "1.4\n1.5\n1.6", null, "", null, "", null, "1.7\n1.8\n1.9", null, "", null, "", null, "1.10\n1.11\n1.12", null, "", null, "", null, "2.\nThe table below shows the cost to manufacture n articles:\n Number of articles, n 1 2 5 6 8 Cost 4 8 20 24 32\n2.1\nWill the cost to manufacture n articles be directly proportional to n, the number of articles?\nExplain.\n2.2\nWhat shape will the graph have if number of articles is plotted on the x-axis and cost\n2.3\nDraw the graph of number of articles on the x-axis and cost on the y-axis.\n2.4\nDoes the graph have the shape which you predicted in 2.2?\n2.5\nRead from the graph the following values and clearly mark the point where you took the reading\nwith the letter in brackets:\n2.5.1\ncost to manufacture 4 articles (P).\n2.5.2\nthe number of articles that can be manufactured if the cost is R26. (Q)\n2.6\n3.\nThe table below shows the number of hours that a number of men must work to complete a task:\n Number of men 1 2 3 6 16 24 48 Number of hours 48 24 16 8 3 2 1\n3.1\nIs the number of hours directly proportional to the number of men? Explain.\n3.2\nWhat shape will the graph of the data above have if number of men is plotted on the x-axis and\nnumber of hours is plotted on the y-axis? Explain.\n3.3\nDraw the graph with number of men on the x-axis and the number of hours on the y-axis.\n3.4\nDoes the graph have the predicted shape?\n3.5\nRead the requested values from the graph and clearly mark the point where you made the reading.\n3.5.1\nHow many hours must 5 men work to complete the task? Is it a suitable answer? Explain.\n3.5.2\nHow many men must work for 20 hours to complete the task? Is it a suitable answer? Explain.\n3.6\nWhat is the greatest number of hours needed to complete the task if everybody works at the\nsame rate? Explain.\n3.7\nCan the work be completed in 15 minutes? How many men will be needed? Is it a suitable\n4.\nIn an experiment a student obtains the following values:\n a 0 1 2 3 4 8 b 0 3 6,05 7,9 12,5 23,9\n4.1\nCan the student claim that b is directly propotional to a? Explain.\n4.2\nWrite down the relationship between a and b in words and in symbols.\n4.3\nWhat shape will the graph of a, on the x-axis, and b, on the y-axis, have? Explain.\n4.4\nDraw the graph of a, on the x-axis, and b, on the y-axis.\n4.5\nRead from the graph the following values and mark the point where you take the reading with the\nletter in brackets:\n4.5.1\nthe value of b if a = 6 (P)\n4.5.2\nthe value of a if b = 10,5 (Q)\n4.6\nUse the formula that you wrote down in 4.2 to calculate the values of a and b in 4.5.1 and 4.5.2\nHow do the calculated values correspond with the values read from the graph?\n5.\nThe table below contains values for a and b.\n a 1 4 8 16 b 16 4 2 1\n5.1\n5.2\nDescribe the relationship between a and b in words and in symbols.\n5.3\nWhat shape will the graph of a against b have? Motivate your answer.\n5.4\nDraw the graph of a, on the x-axis, and b, on the y-axis.\n5.5\nRead from the graph the following values and mark the point where you take the reading with the\nletter in brackets:\n5.5.1\nthe value of b if a = 8 (P)\n5.5.2\nthe value of a if b = 10 (Q)\n5.6\nUse the formula that you wrote down in 5.2 to calculate the values of a and b in 5.5.1 and 5.5.2\nHow do the calculated values correspond with the values read from the graph?\n6.\nValues for a and b are given in the table below.\n a 0 1 2 4 b 0 1 4 16\n6.1\n6.2\nDescribe the relationship between a and b in words and in symbols.\n6.3\nWhat will the shape of the graph of a against b be? Motivate your answer.\n6.4\nDraw the graph of a, on the x-axis, and b, on the y-axis.\n6.5\nRead from the graph the following values and mark the point where you take the reading with the\nletter in brackets:\n6.5.1\nthe value of b if a = 1,5 (Q)\n6.5.2\nthe value of a if b = 9 (P)\n6.6\nUse the formula that you wrote down in 6.2 to calculate the values of a and b in 6.5.1 and 6.5.2\nHow do the calculated values correspond with the values read from the graph?\n7.\nA farmer wants to make a coop with an area of 36 m². Please help the farmer.\n7.1\nWrite down the relationship between the length and breadth of the coop in words and in symbols.\n7.2\nWhat shape will the graph of length, on the x-axis, and breadth, on the y-axis, have? Explain.\n7.3\nDraw up a table containing suitable possible values for the length and breadth of the coop.\n7.4\nDraw the graph, f, of length on the x-axis and breadth on the y-axis.\n7.5\nRead the following measurements from the graph and clearly mark the point where you take\nthe reading with the letter in brackets:\n7.5.1\nthe breadth if the length is 3 m (P).\n7.5.2\nthe length if the breadth is 20 m. (Q)\n7.6\nDraw the line g: y = x and let f and g intersect at R. Write down the co-ordinates of R.\n7.7\nWhat is special about point R?\n7.8\nThe farmer wants the coop to be a square. Read from the graph the length of the sides of the square\nand mark the point where the readings are taken.\n7.9\nWhat length of wire netting will be necessary to fence in the coop?\n7.10\nThe farmer has 24,4 m of wire netting to use. What will the measurements of the coop be?" ]
[ null, "https://imath.co.za/grafieke12/e12graf04.gif", null, "https://imath.co.za/grafieke12/e12graf05.gif", null, "https://imath.co.za/grafieke12/e12graf06.gif", null, "https://imath.co.za/grafieke12/e12graf07.gif", null, "https://imath.co.za/grafieke12/e12graf08.gif", null, "https://imath.co.za/grafieke12/e12graf09.gif", null, "https://imath.co.za/grafieke12/e12graf10.gif", null, "https://imath.co.za/grafieke12/e12graf11.gif", null, "https://imath.co.za/grafieke12/e12graf12.gif", null, "https://imath.co.za/grafieke12/e12graf20.gif", null, "https://imath.co.za/grafieke12/e12graf21.gif", null, "https://imath.co.za/grafieke12/e12graf22.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8707218,"math_prob":0.978705,"size":5607,"snap":"2021-43-2021-49","text_gpt3_token_len":1699,"char_repetition_ratio":0.14991969,"word_repetition_ratio":0.25065964,"special_character_ratio":0.30586767,"punctuation_ratio":0.15261324,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99765307,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-20T16:46:12Z\",\"WARC-Record-ID\":\"<urn:uuid:0e8a2ee2-73b6-4fc4-9688-8cb3ee7a5821>\",\"Content-Length\":\"25564\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:88e38a45-cdf7-4d23-96b7-e11477817515>\",\"WARC-Concurrent-To\":\"<urn:uuid:e4831e3b-dccc-42f4-a466-d2384f8bbeaf>\",\"WARC-IP-Address\":\"197.221.17.210\",\"WARC-Target-URI\":\"https://imath.co.za/grade12e/nr1207graph.html\",\"WARC-Payload-Digest\":\"sha1:XVYWQJFN2Y4AL3FVQUODLZ6JLHG46JS7\",\"WARC-Block-Digest\":\"sha1:6B7HQTAM6UTBD55A7YCAHXYBM67UUS6T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585322.63_warc_CC-MAIN-20211020152307-20211020182307-00006.warc.gz\"}"}
http://git.sourceforge.jp/view?p=pf3gnuchains/gcc-fork.git;a=commitdiff;h=ad2e42a870731f72f4813b6c41b10c8b7e768272
[ "author sandra Sat, 8 May 2010 15:53:59 +0000 (15:53 +0000) committer Masaki Muranaka Sun, 23 May 2010 05:03:46 +0000 (14:03 +0900)\nPR middle-end/28685\n\ngcc/\n* tree-ssa-reassoc.c (eliminate_redundant_comparison): New function.\n(optimize_ops_list): Call it.\n\ngcc/testsuite/\n* gcc.dg/pr28685-1.c: New file.\n\ngit-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@159189 138bc75d-0d04-0410-961f-82ee72b054a4\n\n gcc/ChangeLog patch | blob | history gcc/testsuite/ChangeLog patch | blob | history gcc/tree-ssa-reassoc.c patch | blob | history\n\nindex cb1661c..28fd31f 100644 (file)\n@@ -1,3 +1,9 @@\n+2010-05-08  Sandra Loosemore  <[email protected]>\n+\n+       PR middle-end/28685\n+       * tree-ssa-reassoc.c (eliminate_redundant_comparison): New function.\n+       (optimize_ops_list): Call it.\n+\n2010-05-08  Richard Guenther  <[email protected]>\n\nPR tree-optimization/44030\nindex 66630e8..38501a7 100644 (file)\n@@ -1,3 +1,8 @@\n+2010-05-08  Sandra Loosemore  <[email protected]>\n+\n+       PR middle-end/28685\n+       * gcc.dg/pr28685-1.c: New file.\n+\n2010-05-08  Richard Guenther  <[email protected]>\n\nPR tree-optimization/44030\nindex aa08085..6bdb57e 100644 (file)\n@@ -1215,6 +1215,113 @@ undistribute_ops_list (enum tree_code opcode,\nreturn changed;\n}\n\n+/* If OPCODE is BIT_IOR_EXPR or BIT_AND_EXPR and CURR is a comparison\n+   expression, examine the other OPS to see if any of them are comparisons\n+   of the same values, which we may be able to combine or eliminate.\n+   For example, we can rewrite (a < b) | (a == b) as (a <= b).  */\n+\n+static bool\n+eliminate_redundant_comparison (enum tree_code opcode,\n+                               VEC (operand_entry_t, heap) **ops,\n+                               unsigned int currindex,\n+                               operand_entry_t curr)\n+{\n+  tree op1, op2;\n+  enum tree_code lcode, rcode;\n+  gimple def1, def2;\n+  int i;\n+  operand_entry_t oe;\n+\n+  if (opcode != BIT_IOR_EXPR && opcode != BIT_AND_EXPR)\n+    return false;\n+\n+  /* Check that CURR is a comparison.  */\n+  if (TREE_CODE (curr->op) != SSA_NAME)\n+    return false;\n+  def1 = SSA_NAME_DEF_STMT (curr->op);\n+  if (!is_gimple_assign (def1))\n+    return false;\n+  lcode = gimple_assign_rhs_code (def1);\n+  if (TREE_CODE_CLASS (lcode) != tcc_comparison)\n+    return false;\n+  op1 = gimple_assign_rhs1 (def1);\n+  op2 = gimple_assign_rhs2 (def1);\n+\n+  /* Now look for a similar comparison in the remaining OPS.  */\n+  for (i = currindex + 1;\n+       VEC_iterate (operand_entry_t, *ops, i, oe);\n+       i++)\n+    {\n+      tree t;\n+\n+      if (TREE_CODE (oe->op) != SSA_NAME)\n+       continue;\n+      def2 = SSA_NAME_DEF_STMT (oe->op);\n+      if (!is_gimple_assign (def2))\n+       continue;\n+      rcode = gimple_assign_rhs_code (def2);\n+      if (TREE_CODE_CLASS (rcode) != tcc_comparison)\n+       continue;\n+      if (operand_equal_p (op1, gimple_assign_rhs1 (def2), 0)\n+         && operand_equal_p (op2, gimple_assign_rhs2 (def2), 0))\n+       ;\n+      else if (operand_equal_p (op1, gimple_assign_rhs2 (def2), 0)\n+              && operand_equal_p (op2, gimple_assign_rhs1 (def2), 0))\n+       rcode = swap_tree_comparison (rcode);\n+      else\n+       continue;\n+\n+      /* If we got here, we have a match.  See if we can combine the\n+        two comparisons.  */\n+      t = combine_comparisons (UNKNOWN_LOCATION,\n+                              (opcode == BIT_IOR_EXPR\n+                               ? TRUTH_OR_EXPR : TRUTH_AND_EXPR),\n+                              lcode, rcode, TREE_TYPE (curr->op), op1, op2);\n+      if (!t)\n+       continue;\n+      if (dump_file && (dump_flags & TDF_DETAILS))\n+       {\n+         fprintf (dump_file, \"Equivalence: \");\n+         print_generic_expr (dump_file, curr->op, 0);\n+         fprintf (dump_file, \" %s \", op_symbol_code (opcode));\n+         print_generic_expr (dump_file, oe->op, 0);\n+         fprintf (dump_file, \" -> \");\n+         print_generic_expr (dump_file, t, 0);\n+         fprintf (dump_file, \"\\n\");\n+       }\n+\n+      /* Now we can delete oe, as it has been subsumed by the new combined\n+         expression t.  */\n+      VEC_ordered_remove (operand_entry_t, *ops, i);\n+      reassociate_stats.ops_eliminated ++;\n+\n+      /* If t is the same as curr->op, we're done.  Otherwise we must\n+        replace curr->op with t.  Special case is if we got a constant\n+        back, in which case we add it to the end instead of in place of\n+        the current entry.  */\n+      if (TREE_CODE (t) == INTEGER_CST)\n+       {\n+         VEC_ordered_remove (operand_entry_t, *ops, currindex);\n+         add_to_ops_vec (ops, t);\n+       }\n+      else if (TREE_CODE (t) != lcode)\n+       {\n+         tree tmpvar;\n+         gimple sum;\n+         enum tree_code subcode;\n+         tree newop1;\n+         tree newop2;\n+         tmpvar = create_tmp_var (TREE_TYPE (t), NULL);\n+         add_referenced_var (tmpvar);\n+         extract_ops_from_tree (t, &subcode, &newop1, &newop2);\n+         sum = build_and_add_sum (tmpvar, newop1, newop2, subcode);\n+         curr->op = gimple_get_lhs (sum);\n+       }\n+      return true;\n+    }\n+\n+  return false;\n+}\n\n/* Perform various identities and other optimizations on the list of\noperand entries, stored in OPS.  The tree code for the binary\n@@ -1276,7 +1383,8 @@ optimize_ops_list (enum tree_code opcode,\nif (eliminate_not_pairs (opcode, ops, i, oe))\nreturn;\nif (eliminate_duplicate_pair (opcode, ops, &done, i, oe, oelast)\n-         || (!done && eliminate_plus_minus_pair (opcode, ops, i, oe)))\n+         || (!done && eliminate_plus_minus_pair (opcode, ops, i, oe))\n+         || (!done && eliminate_redundant_comparison (opcode, ops, i, oe)))\n{\nif (done)\nreturn;\nAbout OSDN\nFind Software\nDevelop Software" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5905425,"math_prob":0.92562604,"size":3691,"snap":"2021-21-2021-25","text_gpt3_token_len":1146,"char_repetition_ratio":0.12584758,"word_repetition_ratio":0.020066889,"special_character_ratio":0.36060688,"punctuation_ratio":0.2585034,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96233994,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-12T14:52:14Z\",\"WARC-Record-ID\":\"<urn:uuid:a94a901d-70b9-48af-86ae-d9422f4f573c>\",\"Content-Length\":\"32185\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:723c54ac-34be-4ef5-b590-9127c52e60ff>\",\"WARC-Concurrent-To\":\"<urn:uuid:3c7e0761-e656-4a61-846c-5088389b5456>\",\"WARC-IP-Address\":\"44.240.209.230\",\"WARC-Target-URI\":\"http://git.sourceforge.jp/view?p=pf3gnuchains/gcc-fork.git;a=commitdiff;h=ad2e42a870731f72f4813b6c41b10c8b7e768272\",\"WARC-Payload-Digest\":\"sha1:QKMFZOAPH7CF6IPN2ZKJWQFYXHAA2DAY\",\"WARC-Block-Digest\":\"sha1:BD2TVKJVFGYRNTSD6AIQQWZVIYJYHRDK\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487584018.1_warc_CC-MAIN-20210612132637-20210612162637-00134.warc.gz\"}"}
https://riptutorial.com/asp-net-mvc/example/2289/basic-syntax
[ "# asp.net-mvc Basic Syntax\n\n## Example\n\nRazor code can be inserted anywhere within HTML code. Razor code blocks are enclosed in `@{ ... }`. Inline variable and functions start with `@`. Code inside the Razor brackets follow the normal C# or VB rules.\n\nSingle line statement:\n\n``````@{ var firstNumber = 1; }\n``````\n\nMulti-line code block:\n\n``````@{\nvar secondNumber = 2;\nvar total = firstNumber + secondNumber;\n}\n``````\n\nUsing a variable inline:\n\n``````<h1>The total count is @total</h1>\n``````\n\nUsing a variable inline explicitly:\n\n``````<h2>Item@(item.Id)</h2>\n``````\n\nFor this particular example we will not be able to use the implicit syntax because `[email protected]` looks like an email and will be rendered as such by Razor.\n\nEnclose code inside control flow statements:\n\n``````<h1>Start with some HTML code</h1>\n\n@for (int i = 0; i < total; i++){\nConsole.Write(i);\n}\n\n<p>Mix in some HTML code for fun!</p>\n\n@if (total > 3)\n{\nConsole.Write(\"The total is greater than 3\");\n}\nelse\n{\nConsole.Write(\"The total is less than 3\");\n}\n``````\n\nThis same syntax would be used for all statements such as `for`, `foreach`, `while`, `if`, `switch`, etc.\n\n``````@if (total > 3)\n{\nif(total == 10)\n{\nConsole.Write(\"The total is 10\")\n}\n}\n``````\n\nNote that you don't need to type the `@` at the second `if`. After code you can just type other code behind the existing code.\n\nIf you want to add code after a HTML element you do need to type a `@`.", null, "PDF - Download asp.net-mvc for free" ]
[ null, "https://riptutorial.com/Images/icon-pdf-2.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.75700283,"math_prob":0.9001495,"size":1340,"snap":"2020-24-2020-29","text_gpt3_token_len":353,"char_repetition_ratio":0.11377245,"word_repetition_ratio":0.008264462,"special_character_ratio":0.29328358,"punctuation_ratio":0.14338236,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97791135,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-03T15:37:39Z\",\"WARC-Record-ID\":\"<urn:uuid:7105a08a-08f2-464e-97d3-3f9bfd622675>\",\"Content-Length\":\"42890\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f01dced4-57fa-4f91-92e5-0ee8d11086b7>\",\"WARC-Concurrent-To\":\"<urn:uuid:12755813-78e3-4dfb-9ae2-8969967cffb2>\",\"WARC-IP-Address\":\"40.83.160.29\",\"WARC-Target-URI\":\"https://riptutorial.com/asp-net-mvc/example/2289/basic-syntax\",\"WARC-Payload-Digest\":\"sha1:OQYRSGQH3NFG2MOPBIYO5FEMCYLLKX5Z\",\"WARC-Block-Digest\":\"sha1:PAM7ALBQ4VNH6DUW3HX7OXNY2QPFBRLG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655882634.5_warc_CC-MAIN-20200703153451-20200703183451-00554.warc.gz\"}"}
https://socratic.org/questions/57cb071c7c0149358fc7f631
[ "Question 7f631\n\nJan 13, 2017\n\n$- \\text{33.4g}$\n\nExplanation:\n\nStart by converting the speed of the car from kilometers per hour to meters per second\n\n85 color(red)(cancel(color(black)(\"km\")))/color(red)(cancel(color(black)(\"h\"))) * (10^3\"m\")/(1color(red)(cancel(color(black)(\"km\")))) * (1color(red)(cancel(color(black)(\"h\"))))/\"3600 s\" = \"23.61 m s\"^(-1)\n\nNow, notice that the car goes from a speed of ${\\text{23.61 m s}}^{- 1}$ to rest, i.e. to a speed of ${\\text{0 m s}}^{- 1}$, so right from the start, you should expect the average acceleration to come out negative.\n\nIn other words, the car is decelerating, which means that its acceleration is acting in the opposite direction to its direction of movement.\n\nAnother thing to notice here is that the speed of the car is decreasing significantly over a very short distance. From the moment of impact, it takes only\n\n$d = \\text{0.85 m}$\n\nfor the speed of the car to decrease by ${\\text{23.61 m s}}^{- 1}$, This tells you that the acceleration of the car will have a very high absolute value, i.e. its magnitude will be very high.\n\nYour tool of choice here will be this equation\n\n$\\textcolor{b l u e}{\\underline{\\textcolor{b l a c k}{{v}_{f}^{2} = {v}_{0}^{2} + 2 \\cdot a \\cdot d}}}$\n\nHere\n\n• ${v}_{f}$ is the final speed of the car\n• ${v}_{0}$ is its initial speed, i.e. its speed before the impact\n• $a$ is its acceleration\n• $d$ is the distance covered by the driver after the impact\n\nRearrange the above equation to solve for $a$\n\n$2 \\cdot a \\cdot d = {v}_{f}^{2} - {v}_{0}^{2} \\implies a = \\frac{{v}_{f}^{2} - {v}_{0}^{2}}{2 \\cdot d}$\n\nPlug in your values to find\n\na = ( 0^2 \"m\"^color(red)(cancel(color(black)(2))) \"s\"^(-2) - 23.61^2 \"m\"^color(red)(cancel(color(black)(2))) \"s\"^(-2))/(2 * 0.85 color(red)(cancel(color(black)(\"m\")))) = -\"327.9 m s\"^(-2)#\n\nAs you can see, the acceleration is indeed negative. Convert the acceleration to $\\text{g}$'s to get\n\n$- 327.9 \\textcolor{red}{\\cancel{\\textcolor{b l a c k}{\\text{m s\"^(-2)))) * \"1.00g\"/(9.80color(red)(cancel(color(black)(\"m s\"^(-2))))) = color(darkgreen)(ul(color(black)(-\"33.4g}}}}$\n\nI'll leave the answer rounded to three sig figs." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82680744,"math_prob":0.999621,"size":1700,"snap":"2019-43-2019-47","text_gpt3_token_len":527,"char_repetition_ratio":0.19575472,"word_repetition_ratio":0.012295082,"special_character_ratio":0.35470587,"punctuation_ratio":0.068862274,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9994623,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-19T19:59:30Z\",\"WARC-Record-ID\":\"<urn:uuid:6c7b8ad5-b411-45e4-9506-16fce524c16f>\",\"Content-Length\":\"38620\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:858408cd-db5a-4377-9eb4-d0a4a4c2afdc>\",\"WARC-Concurrent-To\":\"<urn:uuid:2a68e971-5cc6-4904-b97c-eac457f1fc99>\",\"WARC-IP-Address\":\"54.221.217.175\",\"WARC-Target-URI\":\"https://socratic.org/questions/57cb071c7c0149358fc7f631\",\"WARC-Payload-Digest\":\"sha1:QSBZD5YDJODT6HU2Y76RAQGYAWOPNLV3\",\"WARC-Block-Digest\":\"sha1:ZTC3PJLD634XQCHZZLF5G5MYDZC6J5IE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986697760.44_warc_CC-MAIN-20191019191828-20191019215328-00033.warc.gz\"}"}
https://socratic.org/questions/how-do-you-find-the-definite-integral-of-int-x-2-2-x-1-from-0-2#361532
[ "# How do you find the definite integral of int (x^2-2)/(x+1) from [0,2]?\n\nJan 7, 2017\n\n$- \\ln 3$\n\n#### Explanation:\n\nStart by dividing the numerator by the denominator using long or synthetic division.", null, "Thus:\n\n${\\int}_{0}^{2} \\frac{{x}^{2} - 2}{x + 1} \\mathrm{dx} = {\\int}_{0}^{2} x - 1 + - \\frac{1}{x + 1} \\mathrm{dx}$\n\nWe can integrate using the rules $\\int \\left(\\frac{1}{x}\\right) \\mathrm{dx} = \\ln | x | + C$ and $\\int \\left({x}^{n}\\right) \\mathrm{dx} = {x}^{n + 1} / \\left(n + 1\\right) + C$.\n\n$= {\\left[\\frac{1}{2} {x}^{2} - x - \\ln | x + 1 |\\right]}_{0}^{2}$\n\nEvaluate using ${\\int}_{a}^{b} F \\left(x\\right) = f \\left(b\\right) - f \\left(a\\right)$, where $f ' \\left(x\\right) = F \\left(x\\right)$.\n\n$= \\frac{1}{2} {\\left(2\\right)}^{2} - 2 - \\ln | 3 | - \\left(\\frac{1}{2} {\\left(0\\right)}^{2} - 0 - \\ln | 0 + 1 |\\right)$\n\n$= \\frac{1}{2} \\left(4\\right) - 2 - \\ln | 3 | - 0$\n\n$= - \\ln 3$\n\nIn celebration of this being the 2000th answer I ever wrote for socratic, I've included a whole bunch of practice exercises for your improvement\n\nPractice exercises\n\n1. Evaluate each definite integral. Round answers to the nearest integer.\n\na) ${\\int}_{1}^{4} \\frac{{x}^{3} + 7 x + 14}{x + 2} \\mathrm{dx}$\n\nb) ${\\int}_{7}^{15} \\frac{2 {x}^{4} - 18 {x}^{3} + 2 {x}^{2} - 5 x + 1}{2 x + 1}$\n\nc) ${\\int}_{3}^{6} \\frac{5 {x}^{5} + 2 {x}^{2} - 8}{2 \\left(x + 4\\right)}$\n\nBonus\nHint: Use substitution\nb) ${\\int}_{e}^{e + 3} \\frac{{e}^{2 x} - {e}^{x}}{\\sqrt{{e}^{x}}} \\mathrm{dx}$\n\nHopefully this helps!\n\n$1. 33$\n$2. 2920$\n$3. 2102$\nbonus: $3474$", null, "" ]
[ null, "https://useruploads.socratic.org/8We6lFNhRgq50UkjQzXg_MSP641b593e8a0eb27gg70000396aefa89ci9f3i5.gif", null, "https://useruploads.socratic.org/JPI98gxpQG2smaf61FQP_2000.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7987694,"math_prob":1.0000094,"size":622,"snap":"2022-27-2022-33","text_gpt3_token_len":141,"char_repetition_ratio":0.116504855,"word_repetition_ratio":0.0,"special_character_ratio":0.22186495,"punctuation_ratio":0.10619469,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99999106,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-02T02:42:03Z\",\"WARC-Record-ID\":\"<urn:uuid:8c7e7f42-d264-4727-9e4a-0bf1730f0730>\",\"Content-Length\":\"35464\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:34e9fb29-87c4-43e2-8d63-08ea14746886>\",\"WARC-Concurrent-To\":\"<urn:uuid:bf0eb0b3-474a-49a3-b791-48a9a9189a0d>\",\"WARC-IP-Address\":\"216.239.32.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-do-you-find-the-definite-integral-of-int-x-2-2-x-1-from-0-2#361532\",\"WARC-Payload-Digest\":\"sha1:HKRPIU26CAUC5SWFVGB2PPHJTJSF26F4\",\"WARC-Block-Digest\":\"sha1:3NFKKMCNYHVNJWJMKZNQMNRIXR74BBA6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103983398.56_warc_CC-MAIN-20220702010252-20220702040252-00155.warc.gz\"}"}
https://thebuckwheater.com/33-excel-chart-x-axis-text/
[ "By | June 27, 2019\n\nLuxury 33 Illustration Excel Chart X Axis Text\nscatter chart with one text non numerical axis super user excel scatter plots cannot take names instead of values on their x axis they assume a number series for the x axis if you want to replicate the effect of a scatter plot but use named x axis values how to display text labels in the x axis of scatter chart 1 select the data you use and click insert insert line area chart line with markers to select a line chart see screenshot 2 then right click on the line in the chart to select format data s change axis labels in a chart office support your chart uses text from its source data for these axis labels dont confuse the horizontal axis labels qtr 1 qtr 2 qtr 3 and qtr 4 as shown below with the legend labels below them how to wrap x axis labels in an excel chart your best step 4 to show all parts of the names please double click on x axis then in the alignment change the custom angle to 0 degrees and text direction as horizontal many users may not use this steps graph how to create a text based y axis on excel chart the xy scatter series is on the secondary axis also not too useful i formatted the xy series and changed the axis to primary top left chart below the 0 5 values in column g make the points line adding text axis labels to excel scatter chart super user i have a spreadsheet with data like this label data pa 1 1 pa 2 2 pb 1 3 with hundreds of rows i want to create a scatter graph where the x axis contains the names in the label column how to wrap x axis labels in a chart in excel extendoffice how to wrap x axis labels in a chart in excel when the chart area is not wide enough to show its x axis labels in excel all the axis labels will be rotated and slanted in excel change the scale of the horizontal category axis in a chart the horizontal category axis also known as the x axis of a chart displays text labels instead of numeric intervals and provides fewer scaling options than are available for a vertical value axis text labels on a vertical column chart in excel peltier in excel 2003 go to the chart menu choose chart options and check the category x axis checkmark now the chart has four axes we want the rating labels at the left side of the chart and we how to position excel chart x axis text position c i am developing a chart programmatically using c and excel interop dll i have to develop this kind of char here is the screen shot just see the arrow sign i want to put that text at the right hand  Luxury 33 Illustration Excel Chart X Axis Text\n\nExcel Chart X Axis Text Excel Adding Text to Legend Presenting Data with\n\nExcel Chart X Axis Text Adding Colored Regions to Excel Charts Duke Libraries\n\nExcel Chart X Axis Text How to Add Axis Label to Chart In Excel\n\nExcel Chart X Axis Text Excel Chart Tips Danjharrington\n\nExcel Chart X Axis Text Excel 2007 Line Graph Change X Axis Values Excel 2007\n\nexcel chart order, excel chart guide, excel chart exploded pie, excel chart variable range, excel chart tutorial, excel chart change order, excel," ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.80301464,"math_prob":0.7226464,"size":3039,"snap":"2019-51-2020-05","text_gpt3_token_len":646,"char_repetition_ratio":0.19110379,"word_repetition_ratio":0.06324787,"special_character_ratio":0.20631787,"punctuation_ratio":0.011744967,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96221983,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-29T20:08:04Z\",\"WARC-Record-ID\":\"<urn:uuid:00fe28c0-aa0b-4d3b-82c5-032d1d340222>\",\"Content-Length\":\"66195\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cee80099-8391-4261-95a2-29d2e3a103dc>\",\"WARC-Concurrent-To\":\"<urn:uuid:fff9ac9d-558e-4299-b3e5-678ed8629889>\",\"WARC-IP-Address\":\"104.28.2.231\",\"WARC-Target-URI\":\"https://thebuckwheater.com/33-excel-chart-x-axis-text/\",\"WARC-Payload-Digest\":\"sha1:NI6Y44OE34JH72DI4JHLF646YRF56W3D\",\"WARC-Block-Digest\":\"sha1:WTXNSFJ2ISMNULVXJWQJSA7B4WJKKNNW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251802249.87_warc_CC-MAIN-20200129194333-20200129223333-00329.warc.gz\"}"}
http://frinklang.org/fsp/colorize.fsp?f=SolarCooker.frink
[ "# SolarCooker.frink\n\n``` // Solar cooker design program f = eval[input[\"Enter focal length [4 feet]: \", \"4 feet\"]] length = eval[input[\"Enter length of reflective material, long axis [100 in]: \", \"100 in\"]] width = eval[input[\"Enter width of reflective material, short axis [36 in]: \", \"36 in\"]] longspars = eval[input[\"Enter number of long spars : \", 3]] shortspars = eval[input[\"Enter number of short spars : \", 7]] inset = eval[input[\"Enter inset [2 in]: \", \"2 in\"]] longdiff = (width - (2*inset)) / (longspars - 1) shortdiff = (length - (2*inset)) / (shortspars - 1) println[] println[\"\\$longspars long spars will be \" + (longdiff -> \"in\") + \" apart.\"] println[\"\\$shortspars short spars will be \" + (shortdiff -> \"in\") + \" apart.\"] b = 100 in println[\"Arc length is \" + format[arclen[b,f], \"in\", 2]] a = 36 in println[\"Arc length is \" + format[arclen[a,f], \"in\", 2]] // Max height maxHeight = parabolaHeight[length/2, width/2, f] println[\"Maximum height is \" + format[maxHeight, \"in\", 2]] maxHeight = parabolaHeight[length/2, 0 in, f] println[\"Centerline height is \" + format[maxHeight, \"in\", 2]] println[\"long\\tshort\\theight\"] wmin = shortspars mod 2 == 1 ? 0 in : longdiff lmin = longspars mod 2 == 1 ? 0 in : shortdiff println[\"\\nCutting short spars:\"] for w = wmin to b/2 step shortdiff {    if w == 0 in       print[\"x 1\"]    else       print[\"x 2\"]    println[\" (length \" + format[a, \"in\", 2] + \"), \" + format[w, \"in\", 1] + \" from center\"]    for l = lmin to a/2 step longdiff    {       print[format[l, \"in\", 1] + \"\\t\"]       print[format[parabolaHeight[l,w,f], \"in\", 1]]       println[]    }    println[] } println[\"\\nCutting long spars:\"] for l = lmin to a/2 step longdiff {    if l == 0 in       print[\"x 1\"]    else       print[\"x 2\"]    println[\" (length \" + format[b, \"in\", 2] + \"), \" + format[l, \"in\", 1] + \" from center\"]    for w = wmin to b/2 step shortdiff    {       print[format[w, \"in\", 1] + \"\\t\"]       print[format[parabolaHeight[l,w,f], \"in\", 1]]       println[]    }    println[] } // Find arclength of the curve over a box length b: // (b sqrt[16 + (b/f)^2])/8 + 2 f arccsch[4 f/b] arclen[b, f] := (b sqrt[16 + (b/f)^2])/8 + 2 f arccsch[4 f/b] // Parabola height // Equation for a parabola with focal length f is z = d^2/(4 f) // where d is the distance from the center and z is the height. parabolaHeight[x, y, f] := {    d = sqrt[x^2 + y^2]    return d^2/(4 f) } ```\n\nThis is a program written in the programming language Frink.\nFor more information, view the Frink Documentation or see More Sample Frink Programs.\n\nAlan Eliasen was born 18354 days, 1 hours, 9 minutes ago." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6052155,"math_prob":0.9916371,"size":2582,"snap":"2019-43-2019-47","text_gpt3_token_len":876,"char_repetition_ratio":0.1625291,"word_repetition_ratio":0.22624435,"special_character_ratio":0.37955073,"punctuation_ratio":0.14426878,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9894267,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-20T01:03:27Z\",\"WARC-Record-ID\":\"<urn:uuid:5d0a2bf7-69ff-4f13-aa0b-30d4afeb87f3>\",\"Content-Length\":\"7226\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7856809a-5737-4bac-8d4c-1452a9f0646d>\",\"WARC-Concurrent-To\":\"<urn:uuid:2d84b42a-daa1-4f6e-9ab6-2786f9816c32>\",\"WARC-IP-Address\":\"97.118.48.61\",\"WARC-Target-URI\":\"http://frinklang.org/fsp/colorize.fsp?f=SolarCooker.frink\",\"WARC-Payload-Digest\":\"sha1:6MRQE4TJGF7ASQ72HTCOGB4VSD7ST7BP\",\"WARC-Block-Digest\":\"sha1:224T2BNYSFSB7WGLBB5EFMYQPN4XQAAI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670389.25_warc_CC-MAIN-20191120010059-20191120034059-00288.warc.gz\"}"}
https://win-vector.com/2014/09/01/what-is-a-win-vector/
[ "# What is a win vector?\n\nFrom time to time we are asked “what is the company name Win-Vector LLC referring to?” It is a cryptic pun trying to be an encoding of “we deliver victory.”\n\nThe story is an inside joke referring to something really only funny to one of the founders. But a joke that amuses the teller is always enjoyed by at least one person. Win-Vector LLC’s John Mount had the honor of co-authoring a 1997 paper titled “The Polytope of Win Vectors.” The paper title is obviously mathematical terms in an odd combination. However the telegraphic grammar is coincidentally similar to deliberately ungrammatical gamer slang such as “full of win” and “so much win.”", null, "If we treat “win” as a concrete noun (say something you can put in a sack) and “vector” in its non-mathematical sense (as an entity of infectious transmission) we have “Win-Vector LLC is an infectious delivery of victory.” I.e.: we deliver success to our clients. Of course, we have now attempt to explain a weak joke. It is not as grand as “winged victory,” but it does encode a positive company value: Win-Vector LLC delivers successful data science projects and training to clients.", null, "Winged Victory: from Wikipedia\n\nLet’s take this as an opportunity to describe what a win vector is.\n\nWe take the phrase “win vector” from a technical article titled “The Polytope of Win Vectors” by J.E. Bartles, J. Mount, and D.J.A. Welsh (Annals of Combinatorics I, 1997, pp. 1-15. The topic of this paper concerns the possible outcomes of game tournaments (or other things that can be expressed as tournaments). For example: we could have four teams (A,B,C, and D) scheduled to play each other a number of times, as indicated in the diagram below.", null, "This graph is just saying in the tournament: A will play B 5 times, B will not play C, and so on. We assume each game can end in a win for one team (given them 1 point), or a loss or tie (giving them zero points). We can record a summary of the tournament outcomes as a vector (vector now back to its mathematical sense) that just records how often each team won. For example the vector [10,1,1,0] is a win vector compatible with the above diagram (it encodes A winning all matches and D losing all matches). The vector [0,0,0,5] is not a valid win vector for the digram as D did not play 5 games (so can not have 5 wins). (The Win-Vector LLC logo is itself a stylized single game tournament diagram, with the directed arrow representing both victory and reminiscent of vectors in the mathematical sense.)", null, "The idea is that a win vector might be treated as a sufficient statistic for the tournament. Or more accurately the win vector may be all that is known about a previously run tournament. Such censored observations may be all that is possible in field biology where wins represent territory or offspring. The question is then: given knowledge of the tournament structure (the graph) and the summary of outcomes (the win vector) is there evidence one team is dominant, or are the effects random? So we have well-formed statistical questions about effect strength and significance.\n\nThe question of significance is: when we introduce a notion of effect strength how likely are we to see an effect of that size assuming identical players. For example if we make our notion of effect strength the maximum ratio of wins to plays seen in the win vector should we consider this evidence of a strong player, or is it to be expected by random fluctuation? We need to estimate how strong a conditioning effect our tournament constraints impose on unobserved outcomes (to determine if irregularities in distribution are from player strengths our tournament mis-design).\n\nRelating distributions of unobserved details to observed totals (or margins) is one of the most fundamental problems in statistics. We have written on it many times (two examples: Google ad market reporting and checking scientific claims). In all cases you would be better off with direct detailed observations (i.e. without the censorship); but often you have to work with the data you have instead of the experiment you would design.\n\nThe math is a little easier to explain for a related problem: working out the number of ways to fill in a matrix with non-negative integers to meet given row and column totals. I’ll move on to discuss this contingency table problem a bit.\n\nThe statistical ideas largely come from “Testing for Independence in a Two-Way Table: New Interpretations of the Chi-Square Statistic”, Persi Diaconis and Bradley Efron, Ann. Statist., Vol. 13, No. 3, 1985 pp. 845-874. A contingency table is a matrix of non-negative integers, and the statistical problem is relating known row and column totals to possible fill-ins. In this paper the authors criticize some of the standard significance tests (chi-square, Fisher’s exact test) and propose a parameterized family of tests that at the extreme end considers a null-model of uniform fill-ins (each possible fill in equally likely). Obviously a uniform model is very different than the more standard distributions which tend to have cell counts more highly concentrated around their means. But the idea is: this proposed test takes more of the structure of the margin totals into account (or equivalently assumes away less of the margin mediated cell dependencies) and has its own merits.\n\nHowever, we are actually describing the work of mathematicians and theoretical computer scientists. In that style you only speak with “applied types” (such as theoretical statisticians) to justify working on a snappy math problem. In this case: counting the number of ways to fill in a contingency table or the number of detailed results compatible with a given win vector (the link between counting, and generation having been strongly established in “Randomised Algorithms for Counting and Generating Combinatorial Structures”, A.J. Sinclair, Ph.D. thesisUniversity of Edinburgh (1988) and related works).\n\nThe contingency table problem is partially solved in:\n\n• “Sampling contingency tables” Martin Dyer, Ravi Kannan, John Mount, Random Structures and Algorithms Vol. 10, no. 4, July 1997 pp. 487-506.\n• “Fast Unimodular Counting” John Mount, Combinatorics Probability and Computing, Vol. 9, No. 3, May 2000, pp 277-285.\n\nThe second paper (strengthening some results from my Ph.D. thesis) lets you calculate that the number of ways to fill in the following four by four contingency table with non-negative integers to meet the shown row and column totals is exactly `350854066054593772938684218633979710637454260` (about `3.508541e+44`).\n\n``` x(0,0) x(0,1) x(0,2) x(0,3) 154179 x(1,0) x(1,1) x(1,2) x(1,3) 255424 x(2,0) x(2,1) x(2,2) x(2,3) 277000 x(3,0) x(3,1) x(3,2) x(3,3) 160179 191780 288348 165221 201433 ```\n\nThe point being: the table could arise as the summary from a data set with `846782` (`=191780 + 288348 + 165221 + 201433`) items; to characterize probabilities over such a tables you need good methods to sample over the astronomical family of potential alternate fill-ins (and this is where you apply the link between counting and sampling for self-reducible problem families). We have example code, notes, improved runtime proof, and results here.\n\n“The Polytope of Win Vectors” introduced additional ideas from integral polymatroids to more strongly relate volume to number of integer vectors (and gets more complete theoretical results for its problem).\n\nAll the “big hammer” math is trying to extend some of the beauty of G.H. Hardy and J.E. Littlewood, “Some problems of Diophantine approximation: the lattice points of a right-angled triangle,” Hamburg. Math.Abh., 1 (1921) 212–249 to more general settings.\n\nOr more succinctly: we just like the word “win.”", null, "", null, "" ]
[ null, "https://i0.wp.com/win-vector.com/wp-content/uploads/2020/06/10215-2829551-full_of_win.jpg", null, "https://i0.wp.com/win-vector.com/wp-content/uploads/2020/06/0ae82-640px-nike_of_samothrake_louvre_ma2369_n4.jpg", null, "https://i0.wp.com/win-vector.com/wp-content/uploads/2020/06/af618-wv.png", null, "https://i0.wp.com/win-vector.com/wp-content/uploads/2020/06/1d142-page0_1.jpg", null, "https://i0.wp.com/win-vector.com/wp-content/uploads/2020/06/95083-somuchwin.jpg", null, "https://secure.gravatar.com/avatar/92a7340d55e6770e6659e961a10909e4", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9276849,"math_prob":0.901064,"size":7809,"snap":"2022-40-2023-06","text_gpt3_token_len":1795,"char_repetition_ratio":0.09352979,"word_repetition_ratio":0.014913658,"special_character_ratio":0.23805866,"punctuation_ratio":0.11205766,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9672892,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,2,null,2,null,3,null,3,null,2,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-29T03:05:52Z\",\"WARC-Record-ID\":\"<urn:uuid:f492a468-8a45-4349-a24b-3095fab0188b>\",\"Content-Length\":\"54986\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7ced5dac-12c1-4d10-ab01-ef0d3bfc2642>\",\"WARC-Concurrent-To\":\"<urn:uuid:52b7bc8e-8c5b-471f-83a7-c07dc4f549ba>\",\"WARC-IP-Address\":\"192.0.78.211\",\"WARC-Target-URI\":\"https://win-vector.com/2014/09/01/what-is-a-win-vector/\",\"WARC-Payload-Digest\":\"sha1:MZNJWBB37T3EOH7FH5JETZDX5S7GXW6J\",\"WARC-Block-Digest\":\"sha1:GY75KKB3MNWWCNO4EFZME3ZOGKBXBI6T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764499697.75_warc_CC-MAIN-20230129012420-20230129042420-00199.warc.gz\"}"}
https://certainerror.com/portfolio_category/statistics/
[ "# Portfolio Category: Statistics\n\nThe use of curve-fitting or regression can have the additional result of the tolerance factor that defines confidence limits for the best-fit function.  Often this is completed as a second effort following determination of the best-fit function.  The traditional theory involves posing random errors about the data and minimizing deviations either by forming a linear…\nA ‘statistic’ refers to a single number measure of a sample.  Statistics relevant to uncertainty are mean value, total covariance, total deviation, standard covariance and standard deviation.  The formulas needed to calculate these with traditional arithmetic are known.  However, the theory does not present error propagation.   A comprehensive theory should be valid for choices…\nCurve fitting is the practical way of converting data to a best-fit function that can be carried forward into other calculations.  The candidate function is a special case of datum that varies with an independent variable.  What is ‘best’ is assessed by minimizing deviation of the data from the local datum.  For example, the linear…" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9038139,"math_prob":0.98293084,"size":1147,"snap":"2020-34-2020-40","text_gpt3_token_len":209,"char_repetition_ratio":0.104986876,"word_repetition_ratio":0.0,"special_character_ratio":0.17436792,"punctuation_ratio":0.072164945,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9935516,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-09T17:16:12Z\",\"WARC-Record-ID\":\"<urn:uuid:80ac98eb-f20d-43ee-8d74-d519db2fb628>\",\"Content-Length\":\"29184\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:73049de5-99e9-4ea1-8690-490274ea8b01>\",\"WARC-Concurrent-To\":\"<urn:uuid:fffefc99-c334-40e0-973f-4640dd9ee30d>\",\"WARC-IP-Address\":\"199.250.223.82\",\"WARC-Target-URI\":\"https://certainerror.com/portfolio_category/statistics/\",\"WARC-Payload-Digest\":\"sha1:2EKF3MMLLYJL6M55QYBNIJN3NJEKGLCG\",\"WARC-Block-Digest\":\"sha1:B4ICNXEF2D2YBLUU2L7US56PYS7X2X2W\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738562.5_warc_CC-MAIN-20200809162458-20200809192458-00352.warc.gz\"}"}
http://www.loopandbreak.com/logic/
[ "### Logic\n\nLogic refers to the reasoning used by electronic machines. The term is also used in reference to the circuits that make up digital devices and systems.\n\n#### Boolean Algebra\n\nBoolean algebra is a system of mathematical logic using the numbers 0 and 1 with the operations AND (multiplication), OR (addition), and NOT (negation). Combinations of these operations are NAND (NOT AND) and NOR (NOT OR). This peculiar form of mathematical logic, which gets its name from the nineteenth century British mathematician George Boole, is used in the design of digital logic circuits.\n\n#### Symbology\n\nX Y -X X*Y X+Y\n0 0 1 0 0\n0 1 1 0 1\n1 0 0 0 1\n1 1 0 1 1\n\nIn Boolean algebra, the AND operation, also called logical conjunction, is written using an asterisk (*), a multiplication symbol (×), or by running two characters together, for example, X*Y. The NOT operation, also called logical inversion, is denoted by placing a tilde (~) over the quantity, as a minus sign (−) or dash (-) followed by the quantity, as a “lazy inverted L” (¬) followed by the quantity, or as the quantity followed by an accent or “prime sign” (′). An example is −X. The OR operation, also called logical disjunction, is written using a plus sign (+), for example,\nX + Y.\nThe foregoing are the symbols used by engineers. Above table shows the values of these functions, where 0 indicates “falsity” and 1 indicates “truth.” In mathematics and philosophy courses involving logic, you may see other symbols used for conjunction and disjunction. The AND operation in some texts is denoted by a detached arrow head pointing up (\u0001) or by an ampersand (&), and the OR operation is denoted by a detached arrowhead pointing down (\u0002).\n\n#### Theorems\n\nTheorem (logic equation) What it’s called\nX+0 = X OR identity\nX*1 = X AND identity\nX+1 = 1\nX*0 = 0\nX+X = X\nX*X = X\n−(−X) = X Double negation\nX+(−X) = 1" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89585227,"math_prob":0.98279876,"size":2872,"snap":"2020-34-2020-40","text_gpt3_token_len":804,"char_repetition_ratio":0.10808926,"word_repetition_ratio":0.01622718,"special_character_ratio":0.27889973,"punctuation_ratio":0.08648649,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99751514,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-19T10:07:28Z\",\"WARC-Record-ID\":\"<urn:uuid:d8616b89-3576-4796-ab87-877540a39008>\",\"Content-Length\":\"85221\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cc90ba7a-4eda-4454-98f1-d262712c28c6>\",\"WARC-Concurrent-To\":\"<urn:uuid:ce09e6e2-6038-4efe-9e2d-c565ea198a81>\",\"WARC-IP-Address\":\"104.238.95.146\",\"WARC-Target-URI\":\"http://www.loopandbreak.com/logic/\",\"WARC-Payload-Digest\":\"sha1:JNFDO2WEYD2MAWIOBCE7B6CGNQH7CRKM\",\"WARC-Block-Digest\":\"sha1:DSEFD652VKQBOGVBYKVCLNDG6HDTJBI3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400191160.14_warc_CC-MAIN-20200919075646-20200919105646-00377.warc.gz\"}"}
https://www.neuraldump.net/2016/05/neural-networks-the-node/
[ "# Neural Networks: The Node\n\nAs I covered previously in “Introduction to Neural Networks,” artificial neural networks (ANN) are simplified representations of biological neural networks in which the basic computational unit known as an artificial neuron, or node, represents its biological counterpart, the neuron. In order to understand how neural networks can be taught to identify and classify, it is first necessary to explore the characteristics and functionality of the basic building block itself, the node.\n\n### The Node\n\nFor a given node, there are n inputs labeled", null, ". Each input also has a weight associated with it:", null, ". Again, these inputs represent biological synapses connected to the dendrites of the neuron. The activation level of the node, a, is determined by calculating the sum of each input multiplied by it’s weight,", null, ".\n\nSo,", null, "or,", null, "This activation value is passed through a function known as the activation or transfer function,", null, ", to determine the output of the node, y.", null, "Substituting for a gives us:", null, "", null, "### Transfer Functions\n\nThe transfer function can either be linear or non-linear. Linear functions are seldom chosen for multi-layer neural networks since a multi-layer network made up of nodes with linear transfer functions has an equivalent single-layer network. In order to realize the advantages of a multi-layer network, non-linear transfer functions must be used.\n\nThe simplest transfer function is a discontinuous, step function also known as threshold function. The output is binary, usually a 1 or a 0. The outputs may also be -1 and 1 as long as the threshold value falls between the lower and upper value. If a node has a threshold value, θ, then when a >= θ, = 1, otherwise = 0.", null, "", null, "Non-linear transfer functions are almost always sigmoid functions. Sigmoid functions are a group of functions so named because of their “S” shape. The properties of a sigmoid function include:\n\n• is real-valued and differentiable\n• has a non-negative or non-positive first derivative\n• has one local minimum and one local maximum\n\nAll smooth, positive, bump-shaped functions have a sigmoidal integral so there are many functions to choose from, but the most common sigmoid transfer function is a special case of the logistic function:", null, "", null, "If an output range of -1 to 1 is desired instead, the hyperbolic tangent is often used:", null, "", null, "### McCulloch-Pitts Neurons\n\nThe first artificial neurons were proposed by Warren McCulloch and Walter Pitts in 1943. Their neuron’s primary function is as a Threshold Logic Unit (TLU), a computational unit that takes as it’s input an array of values and a corresponding array of weights for those values, sums them, compares that sum to a threshold value, and if that sum exceeds the threshold, outputs a value. In other words, a TLU is a single node with 2 or more inputs that uses a step function as it’s transfer function. These are also known as McCulloch-Pitts (MP) neurons, in deference to their creators, or threshold neurons.\n\nEven a single MP neuron can classify data. Imagine a node with two inputs both with a weight of 1. The threshold value, θ, is 1.5. For the inputs <0,0>, <0,1>, <1,0>, and <1,1> the respective outputs are: 0, 0, 0, and 1. Since the output is binary, the node is capable of identifying exactly two groups: in this case its the group where both inputs are 1s, designated by an output value of 1, and the group where at least one value is not a 1 (either two 0s or a 1 and 0), designated by an output of 0. This single TLU “knows” the Boolean AND function.\n\nMP neurons have been generalized and modified to serve as the building block of artificial neural networks. The most frequent modification is to use the sigmoid function as the transfer function instead of the original threshold operation.\n\nIn the next article, we will begin to put everything together. Although a single MP neuron is actually capable of classification as illustrated above, it is only when nodes are connected into single- and multi-layer networks does the true power of this AI method become apparent.\n\nThis site uses Akismet to reduce spam. Learn how your comment data is processed." ]
[ null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-c3dd828e297e091f8a0f52c389a1ec68_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-efd018c3091faa5c4c7efca753128baa_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-03048b833526b0a97e233ee1eb718189_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-ba26e0ee4697f965d376dc32aed89cef_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-4f1f9893c6f2fb1825af6fed539d6dd2_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-2fc1420548678acdde95dd792c2a7151_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-94c58c48d0d6ed56929a5614dae8e2b6_l3.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-5a8e2799e2f705ab2d1bdf12d059a8da_l3.png", null, "http://www.neuraldump.com/wp-content/uploads/2016/05/ann_pt1_dia1.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-489e5b4a451f999d0cec47f70f21353f_l3.png", null, "http://www.neuraldump.com/wp-content/uploads/2016/05/ann_pt1_dia2-300x218.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-b5cfc74d3fe7a3f932fa9e06daedca4a_l3.png", null, "http://www.neuraldump.com/wp-content/uploads/2016/05/ann_pt1_dia3-300x218.png", null, "https://www.neuraldump.net/wp-content/ql-cache/quicklatex.com-d7534dadb64875b548ae7ae2143d6c2e_l3.png", null, "http://www.neuraldump.com/wp-content/uploads/2016/05/ann_pt1_dia4-300x218.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9169398,"math_prob":0.9611089,"size":3989,"snap":"2020-34-2020-40","text_gpt3_token_len":864,"char_repetition_ratio":0.14730239,"word_repetition_ratio":0.0,"special_character_ratio":0.2128353,"punctuation_ratio":0.11696658,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9905615,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,null,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-19T21:28:53Z\",\"WARC-Record-ID\":\"<urn:uuid:09ebe7ed-39a4-4c52-af64-914e96ca9631>\",\"Content-Length\":\"56550\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:56348b2c-4fb2-47d4-a582-a8ed65d71b42>\",\"WARC-Concurrent-To\":\"<urn:uuid:6db9fc71-3492-48e2-99c8-f1b964b14b45>\",\"WARC-IP-Address\":\"207.38.94.44\",\"WARC-Target-URI\":\"https://www.neuraldump.net/2016/05/neural-networks-the-node/\",\"WARC-Payload-Digest\":\"sha1:43Y4TJBZ5Z6CW44MTGAOP4IZL3M55XOF\",\"WARC-Block-Digest\":\"sha1:X4J3IZMB3M33237CLAFAQFHDSWKIVBCL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400192887.19_warc_CC-MAIN-20200919204805-20200919234805-00563.warc.gz\"}"}
https://groupprops.subwiki.org/wiki/Isomorph-normal_coprime_automorphism-invariant_implies_fusion_system-relatively_weakly_closed
[ "# Isomorph-normal coprime automorphism-invariant implies weakly closed for any fusion system\n\nSuppose", null, "$P$ is a group of prime power order, and", null, "$H$ is an Isomorph-normal coprime automorphism-invariant subgroup (?) of", null, "$P$, i.e.,", null, "$H$ is an Isomorph-normal subgroup (?) of", null, "$P$ and it is also coprime automorphism-invariant in", null, "$P$. In particular,", null, "$H$ is an Isomorph-normal coprime automorphism-invariant subgroup of group of prime power order (?).\nThen, for any fusion system", null, "$\\mathcal{F}$ on", null, "$P$,", null, "$H$ is a weakly closed subgroup for", null, "$\\mathcal{F}$." ]
[ null, "https://groupprops.subwiki.org/w/images/math/4/4/c/44c29edb103a2872f519ad0c9a0fdaaa.png ", null, "https://groupprops.subwiki.org/w/images/math/c/1/d/c1d9f50f86825a1a2302ec2449c17196.png ", null, "https://groupprops.subwiki.org/w/images/math/4/4/c/44c29edb103a2872f519ad0c9a0fdaaa.png ", null, "https://groupprops.subwiki.org/w/images/math/c/1/d/c1d9f50f86825a1a2302ec2449c17196.png ", null, "https://groupprops.subwiki.org/w/images/math/4/4/c/44c29edb103a2872f519ad0c9a0fdaaa.png ", null, "https://groupprops.subwiki.org/w/images/math/4/4/c/44c29edb103a2872f519ad0c9a0fdaaa.png ", null, "https://groupprops.subwiki.org/w/images/math/c/1/d/c1d9f50f86825a1a2302ec2449c17196.png ", null, "https://groupprops.subwiki.org/w/images/math/2/6/a/26afd73f8c17f310707120691ccc4a35.png ", null, "https://groupprops.subwiki.org/w/images/math/4/4/c/44c29edb103a2872f519ad0c9a0fdaaa.png ", null, "https://groupprops.subwiki.org/w/images/math/c/1/d/c1d9f50f86825a1a2302ec2449c17196.png ", null, "https://groupprops.subwiki.org/w/images/math/2/6/a/26afd73f8c17f310707120691ccc4a35.png ", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8620544,"math_prob":0.9935695,"size":975,"snap":"2019-51-2020-05","text_gpt3_token_len":234,"char_repetition_ratio":0.17095777,"word_repetition_ratio":0.07575758,"special_character_ratio":0.18461539,"punctuation_ratio":0.11515152,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997516,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-06T18:33:04Z\",\"WARC-Record-ID\":\"<urn:uuid:e462ac72-8bbe-425d-8998-e3b200352748>\",\"Content-Length\":\"27552\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fac2208e-5fd7-4bc1-872f-058932ecf0fc>\",\"WARC-Concurrent-To\":\"<urn:uuid:67de7968-04c2-4493-adb9-daee270acbde>\",\"WARC-IP-Address\":\"96.126.114.7\",\"WARC-Target-URI\":\"https://groupprops.subwiki.org/wiki/Isomorph-normal_coprime_automorphism-invariant_implies_fusion_system-relatively_weakly_closed\",\"WARC-Payload-Digest\":\"sha1:QYTGDRPLECGFDVFZXUSJGNVHX3ILDEG5\",\"WARC-Block-Digest\":\"sha1:PM7EKFLENUJYQ7XYFOEN2FQCZ2JGAJKO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540490743.16_warc_CC-MAIN-20191206173152-20191206201152-00314.warc.gz\"}"}
http://www.machineintellegence.com/knn-k-nearest-neighbour/
[ "# KNN: K-Nearest Neighbour\n\nThis is the story of a person found at JORDAN border, the country is surrounded by 5 neighbors, so how can we find the person belong to which country. KNN plays a vital role here,\n\nKNN is a algorithm which stores the whole model, i.e. it will never make any function. It will check the person with N numbers of countries who are neighbor to it. This algorithm has following names as it consider the whole sample set.\n\n1-Instance-Based Learning\n\n2-Lazy Learner\n\n3-Non-Parametric\n\nIt is used for classification as well as regression problems. It works good for small data sets but hold problem when the dimensions increases and suffer from “Curse of Dimensionality\n\nLets Take the problem of Iris Data set,\n\n`import numpy as npimport pandas as pdfrom sklearn.datasets import load_irisimport seaborn as sns`\n\niris.data.shape–>150,4–>means 150 rows and 4 column\n\nWe can create a data frame like this,\n\n`df=pd.DataFrame(iris.data,columns=iris.feature_names)df['Target']=iris.target`\n\nOutput:\n\n`from sklearn.neighbors import NearestNeighborsnn = NearestNeighbors(5) #The arguements specify to return the Fast 5 most among the #dataset nn.fit(iris.data)ornn.fit(df.iloc[:,:-1])`\n\nOutput:\n\n```NearestNeighbors(algorithm='auto', leaf_size=30, metric='minkowski',\nmetric_params=None, n_jobs=None, n_neighbors=5, p=2,\n\nThe distance is of many types , please refer: here\n\nIn Order to predict a sample:\n\n`sample = np.array([[5.4,2,2,2.3]])`\n`nn.kneighbors(sample)`\n\nOutput:\n\n```(array([[1.6673332 , 1.90525589, 1.94679223, 2.02484567, 2.09523268]]),\narray([[98, 93, 57, 60, 79]]))```\n\nprint(df.ix[[98, 93, 23, 60, 79],])\n\nSo, 4 neighbors show it belongs to class1 and sample 23 states it belongs to class 0.\n\nThe probability of class is defines as:\n\n•", null, "oprolevorter\n•", null, "vurtil opmer" ]
[ null, "http://2.gravatar.com/avatar/8c6933fb74ee741e550ba14201b7e1af", null, "http://0.gravatar.com/avatar/3f2544ec73f133a919247770d76b21d9", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8156357,"math_prob":0.976463,"size":2217,"snap":"2023-40-2023-50","text_gpt3_token_len":590,"char_repetition_ratio":0.08359693,"word_repetition_ratio":0.0,"special_character_ratio":0.27289128,"punctuation_ratio":0.17118998,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99060035,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-03T14:15:38Z\",\"WARC-Record-ID\":\"<urn:uuid:41cc9d57-a9a2-4c4e-b416-5c744cae160a>\",\"Content-Length\":\"53876\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:551fbf92-36d7-4f51-8840-e94d31bef586>\",\"WARC-Concurrent-To\":\"<urn:uuid:aa7b4f74-4b1e-43ae-986f-55b15001eb60>\",\"WARC-IP-Address\":\"43.255.154.8\",\"WARC-Target-URI\":\"http://www.machineintellegence.com/knn-k-nearest-neighbour/\",\"WARC-Payload-Digest\":\"sha1:YQORFPP33KIMLHJDOWIN4UL6KZVCU6V2\",\"WARC-Block-Digest\":\"sha1:KZNKJ7O7YKOK2LIC3ZWZZIHYXC3JQ2SI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233511106.1_warc_CC-MAIN-20231003124522-20231003154522-00611.warc.gz\"}"}
https://www.math.fsu.edu/e-prints/archive/paper21.abs.html
[ "Jacobian of the Picard Curve\n\nJack Quine\n\nWe compute the Jacobian of the genus $3$ curve with $48$ automorphisms and show that the minimum non-zero norm is $1 + \\sqrt3/3$. This show that Klein's surface with with minimum non-zero norm $4/\\sqrt7$ is not extremal for genus 3. We show that the lattice obtained is the isodual lattice $M(E_6)$ discovered by Conway and Sloane. Our computation gives a cyclotomic construction of this lattice." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87971437,"math_prob":0.992236,"size":436,"snap":"2022-27-2022-33","text_gpt3_token_len":113,"char_repetition_ratio":0.12962963,"word_repetition_ratio":0.0,"special_character_ratio":0.24311927,"punctuation_ratio":0.05,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98037124,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-02T20:57:42Z\",\"WARC-Record-ID\":\"<urn:uuid:8b71f703-d842-4549-8e01-8ea144f0d9ea>\",\"Content-Length\":\"768\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2ee65388-81d5-4766-b2bc-e19c6c3f30f3>\",\"WARC-Concurrent-To\":\"<urn:uuid:0e827003-4e64-4e13-9842-aa6913322e81>\",\"WARC-IP-Address\":\"128.186.104.71\",\"WARC-Target-URI\":\"https://www.math.fsu.edu/e-prints/archive/paper21.abs.html\",\"WARC-Payload-Digest\":\"sha1:COS7YSYQAR3MLIVTBZPTRSIPIVFCCEZX\",\"WARC-Block-Digest\":\"sha1:5S3FNEUI7VF4RPU262LLAY35OWC5J2ZI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104204514.62_warc_CC-MAIN-20220702192528-20220702222528-00730.warc.gz\"}"}
https://www.statisticsviews.com/details/book/8679561/Linear-Algebra-Ideas-and-Applications-4th-Edition.html
[ "# Linear Algebra: Ideas and Applications, 4th Edition\n\n## Books", null, "Praise for the Third Edition\n\n“This volume is ground-breaking in terms of mathematical texts in that it does not teach from a detached perspective, but instead, looks to show students that competent mathematicians bring an intuitive understanding to the subject rather than just a master of applications.”\n\n– Electric Review\n\nA comprehensive introduction, Linear Algebra: Ideas and Applications, Fourth Edition provides a discussion of the theory and applications of linear algebra that blends abstract and computational concepts. With a focus on the development of mathematical intuition, the book emphasizes the need to understand both the applications of a particular technique and the mathematical ideas underlying the technique.\n\nThe book introduces each new concept in the context of an explicit numerical example, which allows the abstract concepts to grow organically out of the necessity to solve specific problems. The intuitive discussions are consistently followed by rigorous statements of results and proofs.\n\nLinear Algebra: Ideas and Applications, Fourth Edition also features:\n\n• Two new and independent sections on the rapidly developing subject of wavelets\n• A thoroughly updated section on electrical circuit theory\n• Illuminating applications of linear algebra with self-study questions for additional study\n• End-of-chapter summaries and sections with true-false questions to aid readers with further comprehension of the presented material\n• Numerous computer exercises throughout using MATLAB code\n\nLinear Algebra: Ideas and Applications, Fourth Edition is an excellent undergraduate-level textbook for one or two semester courses for students majoring in mathematics, science, computer science, and engineering. With an emphasis on intuition development, the book is also an ideal self-study reference.\n\nPreface xi\n\nFeatures of the Text xiii\n\nAcknowledgments xvii\n\n1 Systems of Linear Equations 1\n\n1.1 The Vector Space of m × n Matrices 1\n\nThe Space Rn 4\n\nLinear Combinations and Linear Dependence 6\n\nWhat is a Vector Space? 11\n\nExercises 17\n\n1.1.1 Computer Projects 22\n\n1.1.2 Applications to Graph Theory I 25\n\nExercises 27\n\n1.2 Systems 28\n\nRank: The Maximum Number of Linearly Independent Equations 35\n\nExercises 38\n\n1.2.1 Computer Projects 41\n\n1.2.2 Applications to Circuit Theory 41\n\nExercises 46\n\n1.3 Gaussian Elimination 47\n\nSpanning in Polynomial Spaces 58\n\nComputational Issues: Pivoting 61\n\nExercises 63\n\nComputational Issues: Counting Flops 68\n\n1.3.1 Computer Projects 69\n\n1.3.2 Applications to Traffic Flow 72\n\n1.4 Column Space and Nullspace 74\n\nSubspaces 77\n\nExercises 86\n\n1.4.1 Computer Projects 94\n\nChapter Summary 95\n\n2 Linear Independence and Dimension 97\n\n2.1 The Test for Linear Independence 97\n\nBases for the Column Space 104\n\nTesting Functions for Independence 106\n\nExercises 108\n\n2.1.1 Computer Projects 113\n\n2.2 Dimension 114\n\nExercises 123\n\n2.2.1 Computer Projects 127\n\n2.2.2 Applications to Differential Equations 128\n\nExercises 131\n\n2.3 Row Space and the rank-nullity theorem 132\n\nBases for the Row Space 134\n\nComputational Issues: Computing Rank 142\n\nExercises 143\n\n2.3.1 Computer Projects 146\n\nChapter Summary 147\n\n3 Linear Transformations 149\n\n3.1 The Linearity Properties 149\n\nExercises 157\n\n3.1.1 Computer Projects 162\n\n3.2 Matrix Multiplication (Composition) 164\n\nPartitioned Matrices 171\n\nComputational Issues: Parallel Computing 172\n\nExercises 173\n\n3.2.1 Computer Projects 178\n\n3.2.2 Applications to Graph Theory II 180\n\nExercises 181\n\n3.3 Inverses 182\n\nComputational Issues: Reduction versus Inverses 188\n\nExercises 190\n\n3.3.1 Computer Projects 195\n\n3.3.2 Applications to Economics 197\n\nExercises 202\n\n3.4 The LU Factorization 203\n\nExercises 212\n\n3.4.1 Computer Projects 214\n\n3.5 The Matrix of a Linear Transformation 215\n\nCoordinates 215\n\nIsomorphism 228\n\nInvertible Linear Transformations 229\n\nExercises 230\n\n3.5.1 Computer Projects 235\n\nChapter Summary 236\n\n4 Determinants 238\n\n4.1 Definition of the Determinant 238\n\n4.1.1 The Rest of the Proofs 246\n\nExercises 249\n\n4.1.2 Computer Projects 251\n\n4.2 Reduction and Determinants 252\n\nUniqueness of the Determinant 256\n\nExercises 258\n\n4.2.1 Volume 261\n\nExercises 263\n\n4.3 A Formula for Inverses 264\n\nExercises 268\n\nChapter Summary 269\n\n5 Eigenvectors and Eigenvalues 271\n\n5.1 Eigenvectors 271\n\nExercises 279\n\n5.1.1 Computer Projects 282\n\n5.1.2 Application to Markov Processes 283\n\nExercises 285\n\n5.2 Diagonalization 287\n\nPowers of Matrices 288\n\nExercises 290\n\n5.2.1 Computer Projects 292\n\n5.2.2 Application to Systems of Differential Equations 293\n\nExercises 295\n\n5.3 Complex Eigenvectors 296\n\nComplex Vector Spaces 303\n\nExercises 304\n\n5.3.1 Computer Projects 305\n\nChapter Summary 306\n\n6 Orthogonality 308\n\n6.1 The Scalar Product in RN 308\n\nOrthogonal/Orthonormal Bases and Coordinates 312\n\nExercises 316\n\n6.2 Projections: The Gram-Schmidt Process 318\n\nThe QR Decomposition 325\n\nUniqueness of the QR Factorization 327\n\nExercises 328\n\n6.2.1 Computer Projects 331\n\n6.3 Fourier Series: Scalar Product Spaces 333\n\nExercises 341\n\n6.3.1 Application to Data Compression: Wavelets 344\n\nExercises 352\n\n6.3.2 Computer Projects 353\n\n6.4 Orthogonal Matrices 355\n\nHouseholder Matrices 361\n\nExercises 364\n\nDiscrete Wavelet Transform 367\n\n6.4.1 Computer Projects 369\n\n6.5 Least Squares 370\n\nExercises 377\n\n6.5.1 Computer Projects 380\n\n6.6 Quadratic Forms: Orthogonal Diagonalization 381\n\nThe Spectral Theorem 385\n\nThe Principal Axis Theorem 386\n\nExercises 392\n\n6.6.1 Computer Projects 395\n\n6.7 The Singular Value Decomposition (SVD) 396\n\nApplication of the SVD to Least-Squares Problems 402\n\nExercises 404\n\nComputing the SVD Using Householder Matrices 406\n\nDiagonalizing Matrices Using Householder Matrices 408\n\n6.8 Hermitian Symmetric and Unitary Matrices 410\n\nExercises 417\n\nChapter Summary 419\n\n7 Generalized Eigenvectors 421\n\n7.1 Generalized Eigenvectors 421\n\nExercises 429\n\n7.2 Chain Bases 431\n\nJordan Form 438\n\nExercises 443\n\nThe Cayley-Hamilton Theorem 445\n\nChapter Summary 445\n\n8 Numerical Techniques 446\n\n8.1 Condition Number 446\n\nNorms 446\n\nCondition Number 448\n\nLeast Squares 451\n\nExercises 451\n\n8.2 Computing Eigenvalues 452\n\nIteration 453\n\nThe QR Method 457\n\nExercises 462\n\nChapter Summary 464\n\nIndex 487\n\n## Books & Journals\n\n### Books", null, "#### Simulation Modeling and Arena, 2nd Edition", null, "#### Weight-of-Evidence for Forensic DNA Profiles, 2nd Edition", null, "View all\n\n### Journals", null, "#### Mathematical Logic Quarterly", null, "#### Statistica Neerlandica", null, "View all" ]
[ null, "https://media.wiley.com/product_data/coverImage/85/11189095/1118909585.jpg", null, "https://media.wiley.com/product_data/coverImage/10/11186079/1118607910.jpg", null, "https://media.wiley.com/product_data/coverImage/5X/11188145/111881455X.jpg", null, "https://media.wiley.com/product_data/coverImage/54/11190619/1119061954.jpg", null, "https://www.statisticsviews.com/common/images/thumbnails/small/13ab0de8af1.gif", null, "https://www.statisticsviews.com/common/images/thumbnails/small//1389e6d7a6f.gif", null, "https://www.statisticsviews.com/common/images/thumbnails/small///1389ad71abd.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7038129,"math_prob":0.6558299,"size":6283,"snap":"2019-51-2020-05","text_gpt3_token_len":1699,"char_repetition_ratio":0.19111323,"word_repetition_ratio":0.010810811,"special_character_ratio":0.2732771,"punctuation_ratio":0.116479725,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95388746,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,5,null,2,null,5,null,5,null,null,null,null,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-24T03:15:38Z\",\"WARC-Record-ID\":\"<urn:uuid:8d417590-2657-4f90-9207-90b1dc7fa570>\",\"Content-Length\":\"52896\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cb8150c1-90bd-4e57-91e3-1d887999c441>\",\"WARC-Concurrent-To\":\"<urn:uuid:53906a84-ecbe-45c8-ae6b-04db95f4a79a>\",\"WARC-IP-Address\":\"52.55.157.122\",\"WARC-Target-URI\":\"https://www.statisticsviews.com/details/book/8679561/Linear-Algebra-Ideas-and-Applications-4th-Edition.html\",\"WARC-Payload-Digest\":\"sha1:X3NKO34PDTSWI37QKBGLNRDRT6QP6ZBC\",\"WARC-Block-Digest\":\"sha1:NIEGRFIJXA53LMSBR4NKK5Z44KZQL6C4\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250614880.58_warc_CC-MAIN-20200124011048-20200124040048-00118.warc.gz\"}"}
https://slideplayer.com/slide/5329040/
[ "", null, "# Summarizing Quantitative Data Frequency Distribution Relative Frequency and Percent Frequency Distributions Histogram Cumulative Distributions Ogive.\n\n## Presentation on theme: \"Summarizing Quantitative Data Frequency Distribution Relative Frequency and Percent Frequency Distributions Histogram Cumulative Distributions Ogive.\"— Presentation transcript:\n\nSummarizing Quantitative Data Frequency Distribution Relative Frequency and Percent Frequency Distributions Histogram Cumulative Distributions Ogive\n\nConstructing a Frequency Distribution for Quantitative Data 3 initial steps 1.Determine the number of nonoverlapping classes. 2.Determine the width of each class. 3.Determine the class limits\n\nExample: Hudson Auto Repair The manager of Hudson Auto would like to have a better understanding of the cost of parts used in the engine tune-ups performed in the shop. She examines 50 customer invoices for tune-ups. The costs of parts, rounded to the nearest dollar, are listed on the next slide.\n\nExample: Hudson Auto Repair n Sample of Parts Cost for 50 Tune-ups\n\nFrequency Distribution Guidelines for Selecting Number of Classes Use between 5 and 20 classes. Use between 5 and 20 classes. Data sets with a larger number of elements Data sets with a larger number of elements usually require a larger number of classes. usually require a larger number of classes. Smaller data sets usually require fewer classes Smaller data sets usually require fewer classes\n\nFrequency Distribution Guidelines for Selecting Width of Classes Use classes of equal width. Use classes of equal width. Approximate Class Width = Approximate Class Width =\n\nFrequency Distribution We decide that SIX (6) classes are appropriate for our purposes Thus the approximate class width is given by: Approximate Class Width = (109 - 52)/6 = 9.5  10\n\nThus we have: Parts Cost(\\$)Frequency 50-592 60-6913 70-7916 80-897 90-997 100-1095 Total50\n\nUsing Excel’s Frequency Function to Construct a Frequency Distribution Note: Rows 9-51 are not shown. Formula Worksheet (showing data entered)\n\nUsing Excel’s Frequency Function to Construct a Frequency Distribution Note: Rows 9-51 are not shown. Formula Worksheet\n\nRelative Frequency and Percent Frequency Parts Cost (\\$) Relative Frequency Percent Frequency 50-59.044 60-69.2626 70-79.3232 80-89.1414 90-99.1414 100-109.1010 Total1.00100 2/50.04(100 )\n\nUsing Excel’s Frequency Function to Construct a Frequency Distribution Note: Rows 9-51 are not shown. Value Worksheet\n\nAudit Time Example We want to construct a frequency distribution to describe the days required to complete year end audits for our clients. Here we have data for 20 of our clients Year End Audit Times (in Days) 12141918 15 1817 20272223 22213328 14181630.5\n\n5 classes should be sufficient, given the size of our data set. Approximate class width is given by: Audit example We round up to the next highest integer, so our class interval is 5.\n\nUsing Excel’s Frequency Function to Construct a Frequency Distribution 1.Step 1: Select cells D2:D6, the cells in which we want the frequencies to appear 2.Step 2: Type the following formula in the formula bar: =FREQUENCY(A2:A21,{14,19,24,29,34}) 3.Step 3: Press Ctrl-Shift-Enter\n\nThe Audit Example Audit TimeFrequencyRelative FrequencyPercent Frequency 10-1440.220 15-1980.440 20-2450.2525 25-2920.110 30-3410.055 Total201100\n\nThe Histogram This is a bar graph of a frequency distribution for quantitative data. The variable of interest is measured on the horizontal axis. Frequency, relative frequency, or percent frequency for each class is measured on the vertical axis. There are no spaces between the bars on a histogram—the rectangles are adjacent.\n\nHistogram Parts Cost (\\$) Parts Cost (\\$) 2 2 4 4 6 6 8 8 10 12 14 16 18 Frequency 50 60 70 80 90 100 110 120 Tune-up Parts Cost\n\nUsing Excel’s Chart Wizard to Construct a Histogram: Audit Example 1.Step 1: Select cells C1:D6. 2.Click the Chart Wizard button. 3.When Chart Type dialog box appears, select Clustered Column from the Chart sub-type display. Click Next>. 4.At Step 2 —Chart Data Source —Click Next>. 5.At Step 3 – Chart Options – select Titles Tab and then type Histogram for Audit Time Data in the Chart title box. Type Audit Time in Days in the Category (X) axis box and type Frequency in the Value (Y) axis box. Select the Legend tab and then remove the check in the Show Legend box. Click Next>. 6.Step 6: Click Finish\n\nRemoving the Gaps Between Rectangles (bars) Step 1: Click right on any rectangle (bar) in the chart to produce a list of options. Step 2: Select the Format Data Series option Step 3: Select the Options tab and then enter 0 in the Gap width box. Click OK\n\nIt looks like this:\n\nCumulative Distributions These show the number of data items with values less than or equal to the class limit of each class. Cumulative relative frequency distributions show the proportion of data items with values less than or equal to the class limit of each class. Cumulative frequency distributions show the proportion of data items with values less than or equal to the class limit of each class.\n\nCumulative Distributions Hudson Auto Repair <59 <69 <79 <89 <99 <109 Cost (\\$) Cumulative CumulativeFrequency RelativeFrequencyCumulativePercent Frequency Frequency 2 15 31 38 45 50.04.30.62.76.90 1.00 4 30 62 76 90 100 2 + 13 15/50.30(100)\n\nParts Parts Cost (\\$) Parts Parts Cost (\\$) 20 40 60 80 100 Cumulative Percent Frequency 50 60 70 80 90 100 110 (89.5, 76) Ogive with Cumulative Percent Frequencies Cumulative Percent Frequencies Tune-up Parts Cost\n\nOgive for Audit Example\n\nDownload ppt \"Summarizing Quantitative Data Frequency Distribution Relative Frequency and Percent Frequency Distributions Histogram Cumulative Distributions Ogive.\"\n\nSimilar presentations" ]
[ null, "https://slideplayer.com/static/blue_design/img/slide-loader4.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7427646,"math_prob":0.8726592,"size":5393,"snap":"2021-43-2021-49","text_gpt3_token_len":1348,"char_repetition_ratio":0.15976991,"word_repetition_ratio":0.15028901,"special_character_ratio":0.28258854,"punctuation_ratio":0.10581506,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95473313,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-18T21:25:17Z\",\"WARC-Record-ID\":\"<urn:uuid:528ef288-927c-45fa-ac6b-5e9391696bbe>\",\"Content-Length\":\"179583\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d0d9163f-401f-4403-926f-4d7cbae849dc>\",\"WARC-Concurrent-To\":\"<urn:uuid:0f329d84-ac8a-4410-acd7-98f3fde0d846>\",\"WARC-IP-Address\":\"138.201.54.25\",\"WARC-Target-URI\":\"https://slideplayer.com/slide/5329040/\",\"WARC-Payload-Digest\":\"sha1:BPTBNQPO2ODZKH4IJCGBKVJX6UVJ4YOQ\",\"WARC-Block-Digest\":\"sha1:OBALWO5MUCOKRN77PLPCU7MVFI2ZQJLW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585209.43_warc_CC-MAIN-20211018190451-20211018220451-00384.warc.gz\"}"}
https://physics.stackexchange.com/questions/122741/capillary-action-meniscus-height-in-a-tube-fitted-inside-another-tube
[ "# Capillary action meniscus height in a tube fitted inside another tube?\n\nI was thinking about how would capillary action change in a tube (classic example) and in a tube fitted inside another tube (considering water as the liquid involved).\n\nHeight of liquid column:", null, "where:\n\n$\\gamma$ = liquid-air surface tension\n\n$\\theta$ = contact angle\n\n$\\rho$ = density of liquid\n\n$g$ = gravity acceleration\n\n$r$ = radius\n\nI tried my best to draw the examples I'm interested in order to help my explanation.\n\nI didn't consider the capillarity inside the smaller tube in both example #2 and #3 because I'd like to assume that $a/2$ in example #1 is close to $c$ in example #2 and #3 (drawings not to scale).", null, "Since from what I understand the column height is given, among other things (most of which can't be changed, like liquid-air surface tension, contact angle, density of liquid and gravity acceleration), by the tube radius, I'd like to know if $c$ in example #2 can be considered as $a/2$ in example #1 to calculate column height using above formula.\n\nAlso I'd like to know how having beads of slightly smaller diameter than $c$ between the two tubes (example #3) would affect the column height.\n\nIf said beads were less dense than water, could they still improve column height or would they just form a floating mat on top of 1 unit thickness?\n\nWhat'd be the column height of example #2 and #3 assuming $c$ as 1mm?\n\nI'm quite sure that given the same reached height $h$ in example #2 and #3, $c$ of #2 has to be smaller than $c$ in #3.\n\nIf $c\\ll R$ the radius of your outer tube, the total curvature is approximately $\\cos \\theta/c$, so you will get $$h = \\frac{\\gamma}{\\rho g} \\frac{\\cos \\theta}{c}.$$" ]
[ null, "https://i.stack.imgur.com/P5s6S.png", null, "https://i.stack.imgur.com/Au1cp.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9558098,"math_prob":0.9819818,"size":1443,"snap":"2019-35-2019-39","text_gpt3_token_len":353,"char_repetition_ratio":0.14246005,"word_repetition_ratio":0.0,"special_character_ratio":0.25433126,"punctuation_ratio":0.06498195,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997491,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,4,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-17T08:41:30Z\",\"WARC-Record-ID\":\"<urn:uuid:e8bbd332-5b38-4cdc-a6c4-cfd47ed86cb9>\",\"Content-Length\":\"138832\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4675bece-ba59-4682-a54a-a17c426c5de9>\",\"WARC-Concurrent-To\":\"<urn:uuid:b839871e-2234-4876-bfff-d7d6c69dd6e6>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://physics.stackexchange.com/questions/122741/capillary-action-meniscus-height-in-a-tube-fitted-inside-another-tube\",\"WARC-Payload-Digest\":\"sha1:ZZ4SYY35K4K2DHZO334JALNCCVZ2DIDT\",\"WARC-Block-Digest\":\"sha1:WSMF7VGP4D2FXDT5745KW7ROLC3CCFL4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514573065.17_warc_CC-MAIN-20190917081137-20190917103137-00044.warc.gz\"}"}
https://dsp.stackexchange.com/questions/52738/ofdm-rf-signal-waveform/52745#52745
[ "# OFDM RF signal waveform\n\nFrom the Wikipedia article: \"An inverse FFT is computed on each set of symbols, giving a set of complex time-domain samples. These samples are then quadrature-mixed to passband in the standard way. The real and imaginary components are first converted to the analogue domain using digital-to-analogue converters (DACs); the analogue signals are then used to modulate cosine and sine waves at the carrier frequency, f{c}, respectively. These signals are then summed to give the transmission signal, s(t).\"\n\nSo, information is added to a pure sine (or cosine) wave. This causes the wave to have not just one frequency, but a range of frequencies within a bandwidth that can be seen in the frequency domain of the signal. Having found out about this only yesterday, there are a number of questions. I've added an image of a regular time domain OFDM signal found somewhere on the internet.\n\n1. Does the modulated signal really pass through the very narrow (ideally, 20 MHz in regular LTE) bandpass filter at the receiver? At a center frequency of 2 GHz that would mean to bandpass only what is within 1.99 GHz and 2.01 GHz, which sounds impressive to me.\n2. Wouldn't even the slightest distortion from the emitter move the frequency of the signal out of the passband?\n3. At 2 GHz operating frequency (analog time domain signal, at the LNA), there are 2*10^9 cycles in a second. If the number of carriers is 2048, and a symbol is a string of 2048 cycles or slightly more including the cyclic prefix, doesn't it mean that the theoretical maximum symbol rate is (2*10^-9)/(2048+prefix length)? This would mean that the signal is transmitted continuously. This is not true, however, since the symbol rate is a function of the sampling time, Ts, which is 32.552 ns. So, I don't really understand what FFT samples has to do with the 2 GHz analog signal that is present at the receiving LNA. My reasoning is that I could digitize the signal with any number of samples, get a plot for each 2048-cycle sequence then apply FFT.\n\nIf the graph below is the LNA signal of 2 GHz LTE, what would the period of a cycle be in nanoseconds? There are about 20 cycles from what I understand. How many cycles of this type would a symbol take?\n\nLater edit: Regarding the third question, I've found an answer. Digital processing of the signal is done in the baseband, which is independent of carrier frequency. It needs to be converted into the passband. These links have more information: IFFT and OFDM upconversion\n\nbaseband and passband modulation\n\nLater edit 2: it seems that there are many ways to convert the baseband OFDM into the passband. Constant Envelope OFDM is one interesting way to do it, the baseband OFDM signal is phase modulating the carrier. This is in contrast to regular OFDM where the baseband is somesort of amplitude modulating the carrier. More info at \"Constant Envelope OFDM Phase Modulation\", for example.", null, "(1) Yes, if the technology permits it for the power handling requirements of the design, the strategy is to filter as much as possible immediately at the front-end of the receiver prior to the LNA. The primary reason is jamming from stronger signals. Depending on receiver topology used we would be concerned with 2nd and 3rd order intermodulation products and receiver phase noise that can be induced on out of band signals if significantly stronger all creating noise in band that would limit our receiver sensitivity.\n\nFBAR technology is an excellent choice for front-end filters combining low loss and exceptional rejection. I have used FBAR filters in the design of femtocell cellular base-stations where the constraint was to receive the entire band (in this case it was a duplexer so would be used to receive 1850-1910 MHz and transmit 1930-1990 MHz --- notice the 20 MHz spacing between these two bands that this technology was able to provide exceptional isolation up at 2 GHz). We use the low loss band-selecting filter due to linearity/intermodulation concerns with the LNA, however with FBAR one must also be very careful with inter-modulation effects especially when using these filters in multi-carrier designs. Here is a good online article with more details about FBAR and other filtering considerations.\n\nhttp://www.linleygroup.com/mpr/article.php?id=11440\n\n(2) The distortion you are referring to is concern with frequency offset. Frequency offset will always exist since the typical transmitter/receiver set do not use a shared clock. The two dominant sources of frequency offset are the offset of the clocks themselves and additional offsets under dynamic conditions due to Doppler. The relevant standards will specify the maximum allowable clock offset for the design, but < 5 KHz is a reasonable maximum possible frequency offset at 2 GHz for lower cost technologies (this is driven by the ppm specification for the master oscillator used). If I calculated correctly the Doppler at this frequency when the transmitter and receiver are moving apart from each other at 60 mph would only be 179 Hz. The combination of both of these numbers will be well within the passband of whatever front-end filter is used, as no such filter would have a brick-wall response.\n\n(3) I think you are confusing the carrier (2 GHz) with the bandwidth at that carrier (20 MHz). The actual carrier frequency is irrelevant to how much data we can transmit (without consideration to path loss effects on signal power for the SNR component of capacity). The theoretical maximum symbol rate is given by the Shannon-Hartley equation for maximum channel capacity which accounts for both SNR and BW:\n\n$$C = B \\log_2(1+ SNR)$$\n\nWhere:\n\nC is the maximum capacity in B/sec B is the bandwidth of the channel is Hz SNR is the signal to noise power ratio (not in dB but ratio of power)\n\nNote MIMO technologies exceed this by utilizing multipath to send multiple \"channels\" simultaneously." ]
[ null, "https://i.stack.imgur.com/n8L4I.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9513316,"math_prob":0.9212299,"size":2898,"snap":"2021-43-2021-49","text_gpt3_token_len":658,"char_repetition_ratio":0.119212165,"word_repetition_ratio":0.0,"special_character_ratio":0.22084196,"punctuation_ratio":0.10350877,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96537817,"pos_list":[0,1,2],"im_url_duplicate_count":[null,7,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-17T15:01:27Z\",\"WARC-Record-ID\":\"<urn:uuid:b196b7e4-5a53-4fac-8732-89b5a3f5897e>\",\"Content-Length\":\"172256\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:14cee990-689b-4267-96a2-e49eddc90dee>\",\"WARC-Concurrent-To\":\"<urn:uuid:6eb77729-bc91-479d-be3d-dbc8c2693d9d>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://dsp.stackexchange.com/questions/52738/ofdm-rf-signal-waveform/52745#52745\",\"WARC-Payload-Digest\":\"sha1:CTXO3UEHXSUERQ5RXA5APHAOQSFYMZC5\",\"WARC-Block-Digest\":\"sha1:QBRL3YVL32F2KRLPSDGMSEC4YUZ53565\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585178.60_warc_CC-MAIN-20211017144318-20211017174318-00314.warc.gz\"}"}
https://www.daniweb.com/programming/software-development/threads/482482/search-in-file-handling-in-c
[ "Hello Friends ! I am working on a project of CD CAFE. In which I have arranged movies like this :\nMovie Name::::Genre::::Hero of Movie::::Heroine of Movie\n\nand I have entered data in this. Now I want to add search option in my program that I can search by Movie name or genre or hero or heroine it searches all records from texgt file and give me all matches searched results.\nCan Anyone help me ??\n\nI would suggest that when the program starts you read in all of the data in the file and load it into an collection of \"Movie Records\". Then you can search that collection for the records you want.\n\nYou may say more details are not\n\nCreate a class\n\n``````class Movie\n\npublic name\npublic genre\n``````\n\nThen you search by those class attributes, or you could create an associative array same thing.\n\nGoogle classes or assoc arrays in c++.\n\nYou may like to file your data using commas to delimit the data record fields.\n\nThat way you can easily handle missing fields:\n\nMovieName1,Genre1,HeroOfMovie1,HeroineOfMovie1\nMovieName2,Genre2,,HeroineOfMovie2\nMovieName3,Genre3,HeroOfMovie3,\n\nAnd display as:\n\nMovieName1::::Genre1::::HeroOfMovie1::::HeroineOfMovie1\nMovieName2::::Genre2::::NA_HERO::::HeroineOfMovie2\nMovieName3::::Genre3::::HeroOfMovie3::::NA_HEROINE\n\nThis example of sorting data records and finding data records using the C++ library functions may help you to get started.\n\nThis example uses an array of Student records. It demo's the idea of sorting on various fields and finding records that have particular field values.\n\n``````// sortStudentsById_with_find2.cpp //\n\n#include <iostream>\n#include <iomanip>\n#include <string>\n#include <cctype> // re. tolower ...\n\n#include <algorithm> // re array sort, find, etc...\n#include <vector>\n\nusing namespace std;\n\nconst int SIZE_STUDENT_ARY = 5;\n\nclass Student\n{\npublic:\n// ctors...\nStudent() : age(0), grade(0), id(0) {}\nStudent( int age, int grade, int id, const string& name )\n\nvoid setAge( int age ) { this->age = age; }\nvoid setId( int id ) { this->id = id ; }\nvoid setName( const string& name ) { this->name = name ; }\n\nint getAge() const { return age; }\nint getId() const { return id; }\nstring getName() const { return name; }\n\nvoid print( ostream& os ) const\n{\nos << left << setw(14) << name << ' '\n<< setw(7) << id << ' '\n<< setw(7) << grade << ' '\n<< age << right;\n}\nprivate:\nint age;\nint id;\nstring name;\n\n// to permit sorting by id's ... //\nfriend bool cmpById( const Student& a, const Student& b );\n\n// to permit finding by id and thus if id was used already ... //\nfriend bool operator == ( const Student& a, const Student& b );\n\n// to permit sorting and binary_search by name ... //\nfriend bool cmpByName( const Student& a, const Student& b );\n} ;\n\n// def'n of friend functions ...\nbool cmpById( const Student& a, const Student& b )\n{\nreturn a.id < b.id;\n}\nbool operator == ( const Student& a, const Student& b )\n{\nreturn a.id == b.id;\n}\nbool cmpByName( const Student& a, const Student& b )\n{\nreturn a.name < b.name;\n}\n\n// def'n of overloaded << for Student objects ...\nostream& operator << ( ostream& os, const Student& s )\n{\ns.print( os );\nreturn os;\n}\n\n// some utilities used here ..\n\n{\ncout << left << setw(14) << \"NAME\" << ' '\n<< setw(7) << \"ID\" << ' '\n<< setw(7) << \"GRADE\" << ' '\n<< \"AGE\" << right << endl;\n}\n\nstring toCapsOnAllFirstLetters( const string& strIn )\n{\nstring str = strIn;\nint prev_was_space = 1;\nint len = str.size();\nfor( int i = 0; i < len; ++ i )\n{\nif( prev_was_space )\nstr[i] = std::toupper( str[i] );\nprev_was_space = isspace( str[i] );\n}\nreturn str;\n}\nstring takeInString( const string& msg = \"\" )\n{\ncout << msg << flush;\nstring val;\ngetline( cin, val );\nreturn val;\n}\nchar takeInChr( const std::string& msg = \"\" )\n{\nstring reply = takeInString( msg );\n// else ...\nreturn 0;\n}\nbool more()\n{\nif( tolower( takeInChr( \"More (y/n) ? \" )) == 'n' )\nreturn false;\n// else ...\nreturn true;\n}\nint takeInValidInt( const char* msg )\n{\nint val;\nwhile( true )\n{\ncout << msg << flush;\nif( cin >> val && cin.get() == '\\n' )\nbreak;\nelse\n{\ncout << \"Invalid input ... numbers only!\\n\";\ncin.clear(); // clear error flags\ncin.sync(); // 'flush' cin stream ...\n}\n}\nreturn val;\n}\n\nint main()\n{\nStudent students[SIZE_STUDENT_ARY];\n\n// Ok ... take in an array of Student records ...\n\nint size = 0;\ndo\n{\nstudents[size].setName(\ntoCapsOnAllFirstLetters( takeInString(\"Enter Name : \" )));\nstudents[size].setAge( takeInValidInt( \"Enter Age : \" ));\nstudents[size].setId( takeInValidInt( \"Enter Id : \" ));\n\nif( find( students, students+size, students[size] )\n!= students+size ) // then found\n{\ncout << \"Sorry ... that ID is taken ... \\n\";\ncontinue;\n}\n\ncout << students[size];\nif( tolower(takeInChr( \" ... Ok (y/n) ? \" )) == 'y' )\n++size;\nelse\ncout << \"Ok ... that student was NOT entered ...\\n\";\n\nif( size == SIZE_STUDENT_ARY )\n{\ncout << \"You have reached \"\n<< SIZE_STUDENT_ARY\n<< \", the max space here!\\n\";\nbreak;\n}\n}\nwhile( more() );\n\n// Ok ... output results ...\n\ncout<< \"\\nStudents in entered order ... \\n\";\nfor( int x = 0; x < size; ++x )\n{\nstudents[x].print( cout );\ncout << endl;\n}\n\ncout<< \"Students ordered by ID ... \\n\";\nsort( students, students+size, cmpById );\n\nfor( int x = 0; x < size; ++x )\n{\ncout << students[x] << endl; // using overloaded <<\n}\n\ncout<< \"Students ordered by name ... \\n\";\nstable_sort( students, students+size, cmpByName );\nfor( int x = 0; x < size; ++x )\n{\ncout << students[x] << endl; // using overloaded <<\n}\n\ncout << \"\\nLoop to test binary_search by name ...\\n\";\ndo\n{\nStudent tmp;\ntmp.setName( toCapsOnAllFirstLetters(takeInString(\n\"Enter name to find: \" )) );\nif( binary_search( students, students+size, tmp, cmpByName ) )\n{\ncout << \"'\"<< tmp.getName() << \"' was found ...\\n\";\n}\n}\nwhile( more() );\n\ncout << \"\\nloop to test find by name using 'lower bound' ...\\n\";\ndo\n{\nStudent tmp;\ntmp.setName( toCapsOnAllFirstLetters(takeInString(\n\"Enter name to find: \" )) );\n\nStudent* low = lower_bound( students, students+size, tmp,\ncmpByName );\nbool found = false;\nwhile( low->getName() == tmp.getName() )\n{\ncout << \"'\"<< tmp.getName() << \"' was found: \"\n<< *low << endl;\nfound = true;\nlow = lower_bound( low+1, students+size, tmp,\ncmpByName );\n}\nif( !found )" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86296594,"math_prob":0.87436926,"size":397,"snap":"2020-10-2020-16","text_gpt3_token_len":89,"char_repetition_ratio":0.117048346,"word_repetition_ratio":0.0,"special_character_ratio":0.23677582,"punctuation_ratio":0.2,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9849239,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-18T04:28:22Z\",\"WARC-Record-ID\":\"<urn:uuid:16289a3c-3c2a-4731-bcee-1e8fcb72e615>\",\"Content-Length\":\"61809\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dccf2b41-c91a-4609-a310-f3fd5e11605e>\",\"WARC-Concurrent-To\":\"<urn:uuid:9d3d92e3-c318-41dd-b055-e98a46eadcee>\",\"WARC-IP-Address\":\"169.55.25.107\",\"WARC-Target-URI\":\"https://www.daniweb.com/programming/software-development/threads/482482/search-in-file-handling-in-c\",\"WARC-Payload-Digest\":\"sha1:UYMMU3BBAPXOQP2E7L3XZWZ4GKZPCKH7\",\"WARC-Block-Digest\":\"sha1:YZJXNBAMMBQLN7T6OYSMSOT555OAOUOU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875143505.60_warc_CC-MAIN-20200218025323-20200218055323-00017.warc.gz\"}"}
https://dsp.stackexchange.com/questions/tagged/2d?tab=Votes
[ "# Questions tagged [2d]\n\nThe tag has no usage guidance.\n\n60 questions\nFilter by\nSorted by\nTagged with\n4k views\n\n### Fast/efficient way to decompose separable integer 2D filter coefficients\n\nI would like to be able to quickly determine whether a given 2D kernel of integer coefficients is separable into two 1D kernels with integer coefficients. E.g. ...\n1k views\n\n### Determining Type and Bandwidth of a filter\n\nGiven a filter, if it is given as an equation such as: $$f(x,y) = \\left(\\frac{\\partial^2}{\\partial x^2} + \\frac{\\partial^2}{\\partial y^2}\\right) \\exp\\left(-\\frac{x^2 + y^2}{\\sigma^2}\\right)$$ Or in ...\n628 views\n\n### Data fusion using 2d discrete wavelet transform (DWT)\n\nI am working on a project that employs a linear array sensor that provides data from the same object at two different energies. Collected in time, I end up with two images (16-bit sensor values, MxM ...\n4k views\n\n### Standard Deviation in Gaussian Blur\n\nI have a function that performs gaussian blur on image for some specific $\\sigma$ (the standard deviation). It first computes kernel of size $\\lceil 3\\sigma \\rceil$ and then performs convolution with ...\n295 views\n\n### Efficient implementation of 2-d circularly symmetric low-pass filter\n\nHow can a two-dimensional ideal circularly symmetric low-pass filter or its approximation be efficiently implemented on data sampled on a square grid? I'm referring to an ideal filter with a spatial ...\n1k views\n\nDoes anyone know about different adaptive filtering implementations (LMS, RLS ...) in 2D or even 3D ? I have sequences of 2D images and 3D volumes with repeating patterns but small differences. I was ...\n308 views\n\n### How to separate the upwards-propagating from the downwards-propagating waves?\n\nI've got a real 2D image of propagating waves in both directions. How can I separate this image into one with the upward-propagating waves and one with the downward-propagating ones? This example has ...\n1k views\n\n### Image Processing and applicability of 2D Fourier Transform\n\nAs a newbie in the world of signal processing, I am having a hard time in appreciating image 2-D fourier transforms. I am fully able to appreciate the concept of 1-D Fourier transform. Essentially, ...\n453 views\n\n### 2D Convolution in MATLAB Causes Artifacts (Boundary Issues)\n\nIm trying to do a 2D fast convolution in Matlab of large matrices. If I use FFT version based on convolution theorem ( https://en.wikipedia.org/wiki/Convolution_theorem ), there are some artefacts in ...\n4k views\n\n### How do you interpolate between points in an image (2D), e.g. using splines?\n\nI can understand just fine how to use 1-dimensional interpolation on data points where one coordinate is a function of the other: y = f(x). However, when we have an ...\n759 views\n\n### 2D FFT of Vector\n\nI have a bunch of 8x8 images which have been vectorized and formed into a 64xN matrix, X. I'd like to take the 2D-FFT of each of these images without reshaping each column of X into an 8x8 image and ...\n1k views\n\n### Laplacian Operator with and without Diagonal Direction Elements in the Kernel\n\nThis is a general question on the laplacian operator, which has two different versions. The first version is : \\begin{matrix} 0 & 1 & 0 \\\\ 1 & -4 & 1 \\\\ 0 & 1 & 0 \\end{...\n788 views\n\n### Image 2D Real Cepstrum with DFT, Is ifftshift` Needed?\n\nThis is my testing image,it is taken from this paper: I tried to transform it into its real cepstrum domain with this simple MATLAB code: ...\n261 views\n\n### Easy way to get rid of noise in a hand drawing\n\nI would like to take a user's hand drawn input, and filter out \"noise\", aka small sketches or blobs, where the user might have screwed up and accidentally touched his hand to the drawing device, or ...\n2k views\n\n### Harmonics in 2-D FFT Signal\n\nIn case of 1-D FFT it is far more easier to find number of harmonics and their Respective frequencies and amplitudes. Lets say if i have 8 points signal the harmonics of it then would be 7 with one DC ...\n8k views\n\n### 2D Deconvolution in matlab\n\nI am trying to solve the following equation for h (an [MxM matrix]): $$k[\\tau_1,\\tau_2]=\\sum_{i_1=0}^M \\sum_{i_2=0}^M h[i_1,i_2]x[\\tau_1-i_1]x[\\tau_2-i_2]$$ I have k, which is a 2D [MxM] symmetric ...\n1k views\n\n### Finding an Image's Orientation With DFT Frequency Amplitudes\n\nI'm looking to get some general idea of an image's orientation so that I can then rotate it to the nearest 90 degree angle. My idea on how to do this is to take the DFT on the image, then do a \"radar ...\n418 views\n\n### Understanding 2D FFT result of an image having a pattern\n\nI have created Fast Fourier Transform (FFT 2D) of the following image (without pattern angle markers) using ejectamenta online tool. Input (Original image is here) Output I got is the following As ...\n276 views\n\nI've read there are two admissibility criteria for wavelets, both of which are designed to preserve total power of the signal (source: http://en.wikipedia.org/wiki/Wavelet#Mother_wavelet, as well as ...\n4k views\n\n### Calculate 1D Power Spectrum from 2D Images\n\nImagine satellite images, these are irregular sampled in X and Y direction and the shapes are of course are oddly off. We now want to estimate a 1D power spectrum from the whole image to estimate the ...\n133 views\n\n### Upsampling Methods for Computed-Tomography\n\nI have two sets of data of given Field of view, one of them only covers a subset of the FOV of the other. I therefore want to upsample the one with the larger FOV to combine it with the other one. So ...\n1k views\n\n### How does MATLAB recover picture from magnitude spectrum alone?\n\nThis is the transformation I did. The code fft2() the Lena picture than ifft2() it back to the original. Add some ...\n43 views\n\n### Why does this plot correspond to this function?\n\nI have a function: $$u_1(\\mathbf{x})= \\begin{cases} 1, & \\text{if} \\;\\;|x_1|\\le r_1, |x_2| \\le r_2 \\\\ 0, & \\text{otherwise} \\end{cases} ,\\mathbf{x}=[x_1,x_2]^T \\in \\mathbb{R}^2$$ And I'm ...\n87 views\n\n32 views\n\n### how to interpret the 2D FFT\n\nI know how to compute the 1D FFT (and interpret values from 0 to Nyq). When computing the 2D FFT, do we compute the FFT of row then the FFT of row then the FFT of row up to the last row. ...\n1k views\n\n### MATLAB phase of 2D rectangular pulse's Fourier transform\n\nI'm trying to plot the graph of the phase of the Fourier transform of a 2D rectangular pulse. I've been able to evaluate the FFT but I'm not sure if the phase is correct because there are some tilts I ...\n356 views\n\n### Linearity and shift-invariance of 2-D system on lattice\n\nI know how to check a 1-D system for these conditions, but am confused about translating this to a 2-D system over a lattice. The system $H$ is define as: w[\\mathbf x] = H\\left\\{u[\\mathbf x]\\right\\}...\n329 views\n\n### Fast/efficient way to compute Laplacian edge enhancement filter\n\nI would like to implement a somewhat smarter Laplacian edge enhancement convolution. Right now it is implemented as (generic 3x3 convolution): ...\n3k views\n\n### partial derivative of image\n\nI have to find the partial derivative of an image with respect to its x dimension. I am using central difference method i.e $\\partial_x F(x) = \\frac{F(x+1,y)-F(x-1,y)}{2}$ Here $F(x,y)$ ...\n178 views\n\n### How do I implement the CDF wavelet inverse?\n\nI understand and have implemented a 2D discrete wavelet transform that uses a Haar wavelet to process images. Now I would like to implement a 2D Cohen-Daubechies-Feauveau wavelet transform, but I am ...\n96 views\n\n### Two-dimensional wavelet analysis\n\nCould you tell me why wavelets without scaling functions can't be used for two-dimensional analysis? What is the role of scaling function?\n35 views\n\n### Require explanation for Matlab freqz2\n\nQuestion I browsed the code of the Matlab freqz2 function (to find out how it is different to simple fft2.) First of all it ..." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8894385,"math_prob":0.9182748,"size":13310,"snap":"2020-10-2020-16","text_gpt3_token_len":3606,"char_repetition_ratio":0.12971592,"word_repetition_ratio":0.014175258,"special_character_ratio":0.26235914,"punctuation_ratio":0.11706422,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99668825,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-27T05:27:03Z\",\"WARC-Record-ID\":\"<urn:uuid:a890704a-b792-4400-b3ba-bee275020523>\",\"Content-Length\":\"253278\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c4580a8b-f0c7-4663-9f18-edb32e9b3052>\",\"WARC-Concurrent-To\":\"<urn:uuid:347aa03a-d126-497e-a491-dc929daab335>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://dsp.stackexchange.com/questions/tagged/2d?tab=Votes\",\"WARC-Payload-Digest\":\"sha1:AIODV5GJKLSWLKJNENGPG346I46A7B5W\",\"WARC-Block-Digest\":\"sha1:7V4JODZR43BCRFBXDUQ2ANUGMWD6GSBT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875146647.82_warc_CC-MAIN-20200227033058-20200227063058-00039.warc.gz\"}"}
https://www.alibabacloud.com/help/doc-detail/63451.htm
[ "Log Service supports time functions, date functions, interval functions, and a time series padding function. You can use the functions described in this topic in analysis statements.\n\n## Date and time data types\n\n1. Unix timestamp: the number of seconds that have elapsed since 00:00:00 (UTC) on January 1, 1970. The value is of the integer type. For example, `1512374067` indicates the time ```Mon Dec 4 15:54:27 CST 2017```. The built-in time `__time__` in each log of Log Service is of this type.\n2. timestamp: the time in the format of string, for example, `2017-11-01 13:30:00`.\n\n## Date functions\n\nThe following table describes the common date functions supported by Log Service.\n\nFunction Description Example\n`current_date` Returns the current date. `latency>100| select current_date`\n`current_time` Returns the current time. `latency>100| select current_time`\n`current_timestamp` Returns the current timestamp by combining the results of current_date and current_time. `latency>100| select current_timestamp`\n`current_timezone()` Returns the current time zone. `latency>100| select current_timezone()`\n`from_iso8601_timestamp(string)` Parses an ISO 8601-formatted time into a timestamp that contains the time zone. ```latency>100| select from_iso8601_timestamp(iso8601)```\n`from_iso8601_date(string)` Parses an ISO 8601-formatted time into a date. ```latency>100| select from_iso8601_date(iso8601)```\n`from_unixtime(unixtime)` Returns a Unix timestamp as a timestamp. ```latency>100| select from_unixtime(1494985275) ```\n`from_unixtime(unixtime,string)` Returns a Unix timestamp as a timestamp that uses the specified string as the time zone. `latency>100| select from_unixtime (1494985275,'Asia/Shanghai')`\n`localtime` Returns the current time. `latency>100| select localtime `\n`localtimestamp` Returns the current timestamp. `latency>100| select localtimestamp `\n`now()` Functions the same as `current_timestamp`. N/A\n`to_unixtime(timestamp)` Returns a timestamp as a Unix timestamp. `*| select to_unixtime('2017-05-17 09:45:00.848 Asia/Shanghai')`\n\n## Time functions\n\nMySQL time formats\n\nLog Service supports the MySQL time formats, such as %a, %b, and %y.\n\nFunction Description Example\n`date_format(timestamp, format)` Formats a timestamp as a string by using the specified format. `latency>100`| `select date_format (date_parse('2017-05-17 09:45:00','%Y-%m-%d %H:%i:%S'), '%Y-%m-%d')`\n`date_parse(string, format)` Parses a string into a timestamp by using the specified format. `latency>100`|`select date_format (date_parse(time,'%Y-%m-%d %H:%i:%S'), '%Y-%m-%d')`\nTable 1. Format description\nFormat Description\n%a The abbreviation of a day in a week, such as Sun and Sat.\n%b The abbreviation of a month, such as Jan and Dec.\n%c The month, of the numeric type. Valid values: [1, 12].\n%D The day in a month with a suffix, such as 0th, 1st, 2nd, and 3rd.\n%d The day in a month, in decimal format. Valid values: [01, 31].\n%e The day in a month, in decimal format. Valid values: [1, 31].\n%H The hour in 24-hour format.\n%h The hour in 12-hour format.\n%I The hour in 12-hour format.\n%i The minutes, of the numeric type. Valid values: [00, 59].\n%j The day in a year. Valid values: [001, 366].\n%k The hour. Valid values: [0, 23].\n%l The hour. Valid values: [1, 12].\n%M The month. Valid values: January, February, March, April, May, June, July, August, September, October, November, and December.\n%m The month, of the numeric type. Valid values: [01, 12].\n%p The abbreviation of a period in 12-hour format. Valid values: AM and PM.\n%r The time in 12-hour format: `hh:mm:ss AM/PM`.\n%S The seconds. Valid values: [00, 59].\n%s The seconds. Valid values: [00, 59].\n%T The time in 24-hour format: `hh:mm:ss`.\n%U The week in a year, where Sunday is the first day of each week. Valid values: [00, 53].\n%u The week in a year, where Monday is the first day of each week. Valid values: [00, 53].\n%V The week in a year, where Sunday is the first day of each week. Valid values: [01, 53]. %V is used with %X.\n%v The week in a year, where Monday is the first day of each week. Valid values: [01, 53]. %v is used with %x.\n%W The day in a week. Valid values: Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday.\n%w The day in a week, where Sunday is the first day of each week. Valid values: [0, 6].\n%Y The year in four-digit format.\n%y The year in two-digit format.\n%% The escape character %.\n\n## Truncation function\n\nLog Service supports a truncation function, which can return a time truncated by the second, minute, hour, day, month, and year. The truncation function is applicable to time-based statistics.\n\n• Function syntax:\n``date_trunc(unit, x)``\n• Parameters:\n\nThe value of the x parameter can be a timestamp or Unix timestamp.\n\nThe following table lists the values of the unit parameter and the output results when the x parameter is set to `2001-08-22 03:04:05.000`.\nValue Output result\nsecond 2001-08-22 03:04:05.000\nminute 2001-08-22 03:04:00.000\nhour 2001-08-22 03:00:00.000\nday 2001-08-22 00:00:00.000\nweek 2001-08-20 00:00:00.000\nmonth 2001-08-01 00:00:00.000\nquarter 2001-07-01 00:00:00.000\nyear 2001-01-01 00:00:00.000\n• Example:\n\nThe date_trunc function is applicable only to statistics at a fixed time interval. For statistics based on flexible time dimensions, for example, every 5 minutes, you need to use a GROUP BY clause according to the mathematical modulus method.\n\n``* | SELECT count(1) as pv, __time__ - __time__% 300 as minute5 group by minute5 limit 100``\n\nIn the preceding statement, `%300` indicates that modulus and truncation are performed every 5 minutes.\n\nThe following example shows how to use the date_trunc function:\n``````*|select date_trunc('minute' , __time__) as t,\ntruncate (avg(latency) ) ,\ncurrent_date\ngroup by t\norder by t desc\nlimit 60``````\n\n## Interval functions\n\nInterval functions are used to perform interval-related calculation. For example, add or subtract an interval based on a date, or calculate the interval between two dates.\n\nFunction Description Example\n`date_add(unit, value, timestamp)` Adds an interval `value` of the `unit` type to a `timestamp`. To subtract an interval, use a negative `value`. `date_add('day', -7, '2018-08-09 00:00:00')`: indicates seven days before August 9.\n`date_diff(unit, timestamp1, timestamp2)` Returns the time difference between `timestamp1` and `timestamp2` expressed in terms of `unit`. `date_diff('day', '2018-08-02 00:00:00', '2018-08-09 00:00:00') = 7`\nThe following table lists the values of the unit parameter supported by the interval functions.\nValue Description\nmillisecond The millisecond.\nsecond The second.\nminute The minute.\nhour The hour.\nday The day.\nweek The week.\nmonth The month.\nquarter The quarter, namely, three months.\nyear The year.\n\n## Time series padding function\n\nThe time series padding function time_series is used to pad time series data with the missing time.\n\n• Function format:\n``time_series(time_column, window, format, padding_data)``\n• The following table describes the parameters.\nParameter Description\ntime_column The sequence of time, such as the default time field `__time__` provided by Log Service. The value is of the long or timestamp type.\nwindow The size of the time window, which is composed of a number and a unit. Unit: s (seconds), m (minutes), H (hours), or d (days). For example, 2h, 5m, or 3d.\nformat The MySQL time format, which is the final output format.\npadding_data The content to be added. Valid values:\n• 0: adds 0.\n• null: adds null.\n• last: adds the last value.\n• next: adds the next value.\n• avg: adds the average value of the last and next values.\n• Example:\n\nThe following statement is used to format data every 2 hours:\n\n``````* | select time_series(__time__, '2h', '%Y-%m-%d %H:%i:%s', '0')  as stamp, count(*) as num from log group by stamp order by stamp\n``````\nThe following figure shows the output result.", null, "" ]
[ null, "http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/13111/156205726337530_en-US.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6646607,"math_prob":0.9225431,"size":7692,"snap":"2019-35-2019-39","text_gpt3_token_len":2179,"char_repetition_ratio":0.15816857,"word_repetition_ratio":0.1015953,"special_character_ratio":0.32163286,"punctuation_ratio":0.19358894,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9575681,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-22T17:57:13Z\",\"WARC-Record-ID\":\"<urn:uuid:09d7d67a-cc11-402d-b3b1-963d2d293f31>\",\"Content-Length\":\"208617\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c102c19e-cc9b-423f-b742-fef8a3f77f87>\",\"WARC-Concurrent-To\":\"<urn:uuid:a7f218c4-f981-4568-85bb-a8cebcd0e1bb>\",\"WARC-IP-Address\":\"47.88.73.19\",\"WARC-Target-URI\":\"https://www.alibabacloud.com/help/doc-detail/63451.htm\",\"WARC-Payload-Digest\":\"sha1:WBKBV6WJWDDP7KAIJVXMKJ5QXPZ5GRRW\",\"WARC-Block-Digest\":\"sha1:W662LWEGKUUY5GEEBTKGR6W4EMIM4LWQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027317339.12_warc_CC-MAIN-20190822172901-20190822194901-00527.warc.gz\"}"}
https://www.thecrazyprogrammer.com/2021/01/c-map-check-if-key-exists.html
[ "# C++ Map Check if Key Exists – 2 Ways to Check\n\nHello everyone, In this article, we will see different ways by which we can check if a particular key exists in a map or not. Let’s first go through what a map is:\n\nC++ map stores information in <key, value> pairs and we can access the value field from the key in O(logn) time. Now the problem is to check if there exists a particular key in the map or not.\n\n## Method 1: Using map::find\n\nWe can take the help of the standard library function find for map. map::find returns an iterator to the <key, value> pair if the key exists or it points to the standard iterator end in the map. So if for any particular key if find is returning an iterator pointing to the standard operator end then we can say that map doesn’t have that particular key. Here is the code:\n\nThe time complexity to check is the same as map::find function which is O(logn).\n\n## Method 2: Using map::count\n\nWe can also make use of the c + + count method which returns 1 if the particular key is present otherwise returns 0. Here is the code illustrating the same:\n\nThe time complexity for the above code is O(logn) as well. This is widely used to check if a key is present or not.\n\nNote: If the particular key is not present and if somewhere we use it then the key will be created in the map and initiated default value (0 for int. “” for string) will be created. So never check a key exists or not with the below condition:\n\nCheck the below code for better understanding:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.68480825,"math_prob":0.94250894,"size":2494,"snap":"2022-27-2022-33","text_gpt3_token_len":793,"char_repetition_ratio":0.1124498,"word_repetition_ratio":0.32572615,"special_character_ratio":0.38171613,"punctuation_ratio":0.15833333,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9560228,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-07T16:46:00Z\",\"WARC-Record-ID\":\"<urn:uuid:72f0c61e-fbb1-4794-a040-debeb7ffe684>\",\"Content-Length\":\"161475\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:399804dc-5226-41e4-bda9-a7c2f1f715e7>\",\"WARC-Concurrent-To\":\"<urn:uuid:783edfee-eb24-40f4-9862-8ebbe247620a>\",\"WARC-IP-Address\":\"104.21.59.152\",\"WARC-Target-URI\":\"https://www.thecrazyprogrammer.com/2021/01/c-map-check-if-key-exists.html\",\"WARC-Payload-Digest\":\"sha1:AHGFWHXFQYIADZBYUZV6E4GYIO65DLMV\",\"WARC-Block-Digest\":\"sha1:KI4PSN4PJNBRO3HWYTJEM24PUNK4XL2H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104495692.77_warc_CC-MAIN-20220707154329-20220707184329-00570.warc.gz\"}"}
https://intellinuts.com/java/java-pow-method
[ "", null, "", null, "# Java Pow() Method\n\nShow\n\n## Description\n\nThe process returns the price of the first disagreement raised to the supremacy of the second argument. The java.lang.Math.pow() is utilized to calculate an integer raised to the power of several other numbers. This meaning accepts two parameters and returns the charge of the first stricture raised to the second parameter.\n\n### Syntax\n\n`double pow(double base, double exponent)`\n\n### Parameters\n\nHere is the detail of parameters −\n\n• base − Any primitive data type.\n• exponent − Any primitive data type.\n\n### Return Value\n\n• This method returns the value of the first argument raised to the power of the second argument.\n\n#### Example\n\n```public class Test {\n\npublic static void main(String args[]) {\ndouble x = 11.635;\ndouble y = 2.76;\n\nSystem.out.printf(\"The value of e is %.4f%n\", Math.E);\nSystem.out.printf(\"pow(%.3f, %.3f) is %.3f%n\", x, y, Math.pow(x, y));\n}\n}```\n\nThis will produce the following result:\n\n#### Output\n\n```The value of e is 2.7183\npow(11.635, 2.760) is 874.008```\n\nHere at Intellinuts, we have created a complete Java tutorial for Beginners to get started in Java." ]
[ null, "https://intellinuts.com/image/logo.png", null, "http://sdimg.intellinuts.com/img/java.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7201405,"math_prob":0.87456673,"size":821,"snap":"2022-05-2022-21","text_gpt3_token_len":208,"char_repetition_ratio":0.11138311,"word_repetition_ratio":0.0,"special_character_ratio":0.28501827,"punctuation_ratio":0.2,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98917174,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-18T19:13:06Z\",\"WARC-Record-ID\":\"<urn:uuid:f035bed8-80c6-475d-9b02-ac0cc5be3b4c>\",\"Content-Length\":\"17925\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4c9a89fe-4d37-434a-8b64-8c8a0cb5c394>\",\"WARC-Concurrent-To\":\"<urn:uuid:1639e90f-5b83-4269-876b-34f0318b1fc4>\",\"WARC-IP-Address\":\"68.168.220.124\",\"WARC-Target-URI\":\"https://intellinuts.com/java/java-pow-method\",\"WARC-Payload-Digest\":\"sha1:J6EZX6HH2TE6F4D5VTP4C3JJ3F3ZV7EF\",\"WARC-Block-Digest\":\"sha1:KTMIG75TRSK3M2RDSNK4DWJYIYHZGIUK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662522309.14_warc_CC-MAIN-20220518183254-20220518213254-00647.warc.gz\"}"}
https://in.mathworks.com/examples/matlab-hdl-coder/mw/hdlcoder_product-mlhdlc_tutorial_image_heq-image-enhancement-by-histogram-equalization
[ "MATLAB Examples\n\n# Image Enhancement by Histogram Equalization\n\nThis example shows how to generate HDL code from a MATLAB® design that does image enhancement using histogram equalization.\n\n## Algorithm\n\nThe Histogram Equalization algorithm enhances the contrast of images by transforming the values in an intensity image so that the histogram of the output image is approximately flat.\n\n```I = imread('pout.tif');\nJ = histeq(I);\nsubplot(2,2,1);\nimshow( I );\nsubplot(2,2,2);\nimhist(I)\nsubplot(2,2,3);\nimshow( J );\nsubplot(2,2,4);\nimhist(J)\n```", null, "## MATLAB Design\n\n```design_name = 'mlhdlc_heq'; testbench_name = 'mlhdlc_heq_tb'; ```\n\nLet us take a look at the MATLAB design\n\n```type(design_name); ```\n```%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % heq.m % Histogram Equalization Algorithm %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% function [x_out, y_out, pixel_out] = ... mlhdlc_heq(x_in, y_in, pixel_in, width, height) % Copyright 2011-2015 The MathWorks, Inc. persistent histogram persistent transferFunc persistent histInd persistent cumSum if isempty(histogram) histogram = zeros(1, 2^14); transferFunc = zeros(1, 2^14); histInd = 0; cumSum = 0; end % Figure out indexes based on where we are in the frame if y_in < height && x_in < width % valid pixel data histInd = pixel_in + 1; elseif y_in == height && x_in == 0 % first column of height+1 histInd = 1; elseif y_in >= height % vertical blanking period histInd = min(histInd + 1, 2^14); elseif y_in < height % horizontal blanking - do nothing histInd = 1; end %Read histogram (must be outside conditional logic) histValRead = histogram(histInd); %Read transfer function (must be outside conditional logic) transValRead = transferFunc(histInd); %If valid part of frame add one to pixel bin and keep transfer func val if y_in < height && x_in < width histValWrite = histValRead + 1; %Add pixel to bin transValWrite = transValRead; %Write back same value cumSum = 0; elseif y_in >= height %In blanking time index through all bins and reset to zero histValWrite = 0; transValWrite = cumSum + histValRead; cumSum = transValWrite; else histValWrite = histValRead; transValWrite = transValRead; end %Write histogram (must be outside conditional logic) histogram(histInd) = histValWrite; %Write transfer function (must be outside conditional logic) transferFunc(histInd) = transValWrite; pixel_out = transValRead; x_out = x_in; y_out = y_in; ```\n```type(testbench_name); ```\n```%Test bench for Histogram Equalization % Copyright 2011-2015 The MathWorks, Inc. testFile = 'mlhdlc_img_peppers.png'; imgOrig = imread(testFile); [height, width] = size(imgOrig); imgOut = zeros(height,width); hBlank = 20; % make sure we have enough vertical blanking to filter the histogram vBlank = ceil(2^14/(width+hBlank)); for frame = 1:2 disp(['working on frame: ', num2str(frame)]); for y_in = 0:height+vBlank-1 %disp(['frame: ', num2str(frame), ' of 2, row: ', num2str(y_in)]); for x_in = 0:width+hBlank-1 if x_in < width && y_in < height pixel_in = double(imgOrig(y_in+1, x_in+1)); else pixel_in = 0; end [x_out, y_out, pixel_out] = ... mlhdlc_heq(x_in, y_in, pixel_in, width, height); if x_out < width && y_out < height imgOut(y_out+1,x_out+1) = pixel_out; end end end % normalize image to 255 imgOut = round(255*imgOut/max(max(imgOut))); figure(1) subplot(2,2,1); imshow(imgOrig, [0,255]); title('Original Image'); subplot(2,2,2); imshow(imgOut, [0,255]); title('Equalized Image'); subplot(2,2,3); hist(double(imgOrig(:)),2^14-1); axis([0, 255, 0, 1500]) title('Histogram of original Image'); subplot(2,2,4); hist(double(imgOut(:)),2^14-1); axis([0, 255, 0, 1500]) title('Histogram of equalized Image'); end ```\n\n## Simulate the Design\n\nIt is always a good practice to simulate the design with the testbench prior to code generation to make sure there are no runtime errors.\n\n```mlhdlc_heq_tb ```\n```working on frame: 1 working on frame: 2 ```", null, "## Setup for the Example\n\nExecuting the following lines copies the necessary files into a temporary folder\n\n```mlhdlc_demo_dir = fullfile(matlabroot, 'toolbox', 'hdlcoder', 'hdlcoderdemos', 'matlabhdlcoderdemos'); mlhdlc_temp_dir = [tempdir 'mlhdlc_heq']; % create a temporary folder and copy the MATLAB files cd(tempdir); [~, ~, ~] = rmdir(mlhdlc_temp_dir, 's'); mkdir(mlhdlc_temp_dir); cd(mlhdlc_temp_dir); % copy files to the temp dir copyfile(fullfile(mlhdlc_demo_dir, [design_name,'.m*']), mlhdlc_temp_dir); copyfile(fullfile(mlhdlc_demo_dir, [testbench_name,'.m*']), mlhdlc_temp_dir); copyfile(fullfile(mlhdlc_demo_dir, 'mlhdlc_img_peppers.png'), mlhdlc_temp_dir); ```\n\n## Create a New HDL Coder™ Project\n\n```coder -hdlcoder -new mlhdlc_heq_prj\n```\n\nNext, add the file 'mlhdlc_heq.m' to the project as the MATLAB Function and 'mlhdlc_heq_tb.m' as the MATLAB Test Bench.\n\nYou can refer to Getting Started with MATLAB to HDL Workflow tutorial for a more complete tutorial on creating and populating MATLAB HDL Coder projects.\n\n## Run Fixed-Point Conversion and HDL Code Generation\n\nLaunch HDL Advisor and right click on the 'Code Generation' step and choose the option 'Run to selected task' to run all the steps from the beginning through the HDL code generation.\n\nExamine the generated HDL code by clicking on the hyperlinks in the Code Generation Log window.\n\n## Clean up the Generated Files\n\nYou can run the following commands to clean up the temporary project folder.\n\n```mlhdlc_demo_dir = fullfile(matlabroot, 'toolbox', 'hdlcoder', 'hdlcoderdemos', 'matlabhdlcoderdemos');\nmlhdlc_temp_dir = [tempdir 'mlhdlc_heq'];\nclear mex;\ncd (mlhdlc_demo_dir);\nrmdir(mlhdlc_temp_dir, 's');\n```" ]
[ null, "https://www.mathworks.com/help/releases/R2018b/examples/hdlcoder_product/win64/mlhdlc_histeq_io.png", null, "https://www.mathworks.com/help/releases/R2018b/examples/hdlcoder_product/win64/mlhdlc_tutorial_image_heq_01.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5864854,"math_prob":0.97753406,"size":5507,"snap":"2019-13-2019-22","text_gpt3_token_len":1503,"char_repetition_ratio":0.14228603,"word_repetition_ratio":0.0685871,"special_character_ratio":0.30107138,"punctuation_ratio":0.19263157,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99125123,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-23T07:31:21Z\",\"WARC-Record-ID\":\"<urn:uuid:d13e120d-67fd-4d65-9218-59b8a4230a58>\",\"Content-Length\":\"67602\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c8e0237c-a15e-4889-a650-9afc69bed832>\",\"WARC-Concurrent-To\":\"<urn:uuid:75bbe399-322f-4b04-aa6b-b7fd40637cb1>\",\"WARC-IP-Address\":\"104.104.76.25\",\"WARC-Target-URI\":\"https://in.mathworks.com/examples/matlab-hdl-coder/mw/hdlcoder_product-mlhdlc_tutorial_image_heq-image-enhancement-by-histogram-equalization\",\"WARC-Payload-Digest\":\"sha1:B5DRNFDZ77UXBHYCPRUPW7BJFRIUHWIC\",\"WARC-Block-Digest\":\"sha1:OIN2GNRYVKP3QG6Y7LNTUI46TJZ5VZSU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202728.21_warc_CC-MAIN-20190323060839-20190323082839-00044.warc.gz\"}"}
https://doc.cgal.org/Manual/3.3/doc_html/cgal_manual/Kernel_23_ref/Class_Segment_2.html
[ "", null, "## CGAL::Segment_2<Kernel>\n\n### Definition\n\nAn object s of the data type Segment_2<Kernel> is a directed straight line segment in the two-dimensional Euclidean plane", null, "2, i.e. a straight line segment [p,q] connecting two points p,q in", null, "2. The segment is topologically closed, i.e. the end points belong to it. Point p is called the source and q is called the target of s. The length of s is the Euclidean distance between p and q. Note that there is only a function to compute the square of the length, because otherwise we had to perform a square root operation which is not defined for all number types, which is expensive, and may not be exact.\n\n### Creation\n\n Segment_2 s ( Point_2 p, Point_2 q); introduces a segment s with source p and target q. The segment is directed from the source towards the target.\n\n### Operations\n\n bool s.operator== ( q) Test for equality: Two segments are equal, iff their sources and targets are equal. bool s.operator!= ( q) Test for inequality. Point_2 s.source () returns the source of s. Point_2 s.target () returns the target of s. Point_2 s.min () returns the point of s with lexicographically smallest coordinate. Point_2 s.max () returns the point of s with lexicographically largest coordinate. Point_2 s.vertex ( int i) returns source or target of s: vertex(0) returns the source of s, vertex(1) returns the target of s. The parameter i is taken modulo 2, which gives easy access to the other vertex. Point_2 s.point ( int i) returns vertex(i). Point_2 s.operator[] ( int i) returns vertex(i). Kernel::FT s.squared_length () returns the squared length of s. Direction_2 s.direction () returns the direction from source to target of s. Vector_2 s.to_vector () returns the vector s.target() - s.source(). Segment_2 s.opposite () returns a segment with source and target point interchanged. Line_2 s.supporting_line () returns the line l passing through s. Line l has the same orientation as segment s.\n\n### Predicates\n\nbool s.is_degenerate () segment s is degenerate, if source and target are equal.\n\nbool s.is_horizontal ()\nbool s.is_vertical ()\n\nbool s.has_on ( Point_2<Kernel> p) A point is on s, iff it is equal to the source or target of s, or if it is in the interior of s.\n\nbool s.collinear_has_on ( Point_2<Kernel> p)\nchecks if point p is on segment s. This function is faster than function has_on().\n Precondition: p is on the supporting line of s.\n\n### Miscellaneous\n\n Bbox_2 s.bbox () returns a bounding box containing s. Segment_2 s.transform ( Aff_transformation_2 t) returns the segment obtained by applying t on the source and the target of s." ]
[ null, "https://doc.cgal.org/Manual/3.3/doc_html/cgal_manual/Kernel_23_ref/cc_Class.gif", null, "https://doc.cgal.org/Manual/3.3/doc_html/cgal_manual/Kernel_23_ref/cc_mathbb_E.gif", null, "https://doc.cgal.org/Manual/3.3/doc_html/cgal_manual/Kernel_23_ref/cc_mathbb_R.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7058557,"math_prob":0.98666686,"size":1338,"snap":"2023-14-2023-23","text_gpt3_token_len":332,"char_repetition_ratio":0.26536733,"word_repetition_ratio":0.11372549,"special_character_ratio":0.27952167,"punctuation_ratio":0.13492064,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9875635,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-01T02:55:39Z\",\"WARC-Record-ID\":\"<urn:uuid:8f4f65ee-2184-44ff-b854-e89155d7f443>\",\"Content-Length\":\"17116\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:169e8c36-2f60-4b26-98ad-265a2a230bdb>\",\"WARC-Concurrent-To\":\"<urn:uuid:99c92751-164b-4202-9a3e-a6e6ae5f2df9>\",\"WARC-IP-Address\":\"213.186.33.40\",\"WARC-Target-URI\":\"https://doc.cgal.org/Manual/3.3/doc_html/cgal_manual/Kernel_23_ref/Class_Segment_2.html\",\"WARC-Payload-Digest\":\"sha1:MO436FWO2RKP4UZZHIFFNJ5E7OGR44ZP\",\"WARC-Block-Digest\":\"sha1:DZWCS4C4XW5A7NZH7NTN66OXE5HER77C\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224647525.11_warc_CC-MAIN-20230601010402-20230601040402-00556.warc.gz\"}"}
https://itvoyagers.in/5-best-java-program-to-convert-decimal-to-binary/
[ "# 5 – Best Java program to convert decimal to binary\n\n## Java program to convert decimal to binary\n\nDecimal number have base 10 and they ranges from 0 to 9.\n\nBinary number have base 2 and they ranges from 0 to 1.\n\nFollowing is the java program to convert decimal to binary.\n\n### Logic to convert decimal to binary in java\n\n`//always check name of classimport java.util.*;//itvoyagers.inclass DecToBin{ public static void main(String agr[]) { int[] bin = new int; Scanner in = new Scanner(System.in); System.out.println(\"Enter any number : \"); int dnum = in.nextInt(); int i; for(i = 0; dnum>0; i++) { bin[i] = dnum % 2; dnum = dnum / 2; } for(int j=i-1; j>=0; j--) { System.out.print(bin[j]); } }}`\n\nOutput :\n\nEnter any number :\n54\n110110\n\n### Connect with us on following platforms\n\nWe are aiming to explain all concepts of Java in easiest terms as possible.", null, "ITVoyagers\nAuthor" ]
[ null, "data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6672828,"math_prob":0.9074246,"size":876,"snap":"2023-40-2023-50","text_gpt3_token_len":239,"char_repetition_ratio":0.10091743,"word_repetition_ratio":0.054054055,"special_character_ratio":0.29680365,"punctuation_ratio":0.15846995,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96083707,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-24T09:39:01Z\",\"WARC-Record-ID\":\"<urn:uuid:d5623aa4-7d98-468c-9a57-bf0f41640cea>\",\"Content-Length\":\"180968\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bdc3df32-08ed-46a5-b999-77b976480c3d>\",\"WARC-Concurrent-To\":\"<urn:uuid:f6948c2d-c741-4cb4-bbef-55875c54856f>\",\"WARC-IP-Address\":\"104.21.22.36\",\"WARC-Target-URI\":\"https://itvoyagers.in/5-best-java-program-to-convert-decimal-to-binary/\",\"WARC-Payload-Digest\":\"sha1:HV4P2TUORRCHZV53QROWJGISL3BNC6EU\",\"WARC-Block-Digest\":\"sha1:XTMAWQXGD53VKHPSL3RKERULOQHUCZZA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506632.31_warc_CC-MAIN-20230924091344-20230924121344-00258.warc.gz\"}"}
https://www.mcsweeneys.net/articles/more-academic-euphemisms-for-masturbating
[ "Integrating the derivative\nC=2∏r\nSterilizing the test tube\nExperiment with a scientific control\nDosing out the placebo\nForce = Mass x Acceleration\nNormalizing the units\nGraphing the cosine\nConverting from Cartesian to Polar coordinates\nMeasuring plate tectonics\nPosing a hypothesis\nConcluding with the empirical method\nProving a theorem" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.70901686,"math_prob":0.87143165,"size":451,"snap":"2023-40-2023-50","text_gpt3_token_len":109,"char_repetition_ratio":0.13199106,"word_repetition_ratio":0.0,"special_character_ratio":0.14412417,"punctuation_ratio":0.0,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9872757,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-01T01:02:33Z\",\"WARC-Record-ID\":\"<urn:uuid:91c39bf5-3745-479c-a3e0-f0802b7205a8>\",\"Content-Length\":\"78491\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f07563e8-4761-47ba-ac6f-ea5223cb4642>\",\"WARC-Concurrent-To\":\"<urn:uuid:e0848a8f-04f9-49f2-800f-ae8039c879ed>\",\"WARC-IP-Address\":\"54.162.128.250\",\"WARC-Target-URI\":\"https://www.mcsweeneys.net/articles/more-academic-euphemisms-for-masturbating\",\"WARC-Payload-Digest\":\"sha1:QGNXST6I7D76OOGKEIFSMJV5QQVPHHFU\",\"WARC-Block-Digest\":\"sha1:LKGEVEBBM7GP3L7Q2LO7LJP5AXZILXOP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100258.29_warc_CC-MAIN-20231130225634-20231201015634-00134.warc.gz\"}"}
https://swlaschin.gitbooks.io/fsharpforfunandprofit/content/posts/fvsc-quicksort.html
[ "# Comparing F# with C#: Sorting\n\nIn this next example, we will implement a quicksort-like algorithm for sorting lists and compare an F# implementation to a C# implementation.\n\nHere is the logic for a simplified quicksort-like algorithm:\n\n```If the list is empty, there is nothing to do.\nOtherwise:\n1. Take the first element of the list\n2. Find all elements in the rest of the list that\nare less than the first element, and sort them.\n3. Find all elements in the rest of the list that\nare >= than the first element, and sort them\n4. Combine the three parts together to get the final result:\n(sorted smaller elements + firstElement +\nsorted larger elements)\n```\n\nNote that this is a simplified algorithm and is not optimized (and it does not sort in place, like a true quicksort); we want to focus on clarity for now.\n\nHere is the code in F#:\n\n``````let rec quicksort list =\nmatch list with\n| [] -> // If the list is empty\n[] // return an empty list\n| firstElem::otherElements -> // If the list is not empty\nlet smallerElements = // extract the smaller ones\notherElements\n|> List.filter (fun e -> e < firstElem)\n|> quicksort // and sort them\nlet largerElements = // extract the large ones\notherElements\n|> List.filter (fun e -> e >= firstElem)\n|> quicksort // and sort them\n// Combine the 3 parts into a new list and return it\nList.concat [smallerElements; [firstElem]; largerElements]\n\n//test\nprintfn \"%A\" (quicksort [1;5;23;18;9;1;3])\n``````\n\nAgain note that this is not an optimized implementation, but is designed to mirror the algorithm closely.\n\nLet's go through this code:\n\n• There are no type declarations anywhere. This function will work on any list that has comparable items (which is almost all F# types, because they automatically have a default comparison function).\n• The whole function is recursive -- this is signaled to the compiler using the `rec` keyword in \"`let rec quicksort list =`\".\n• The `match..with` is sort of like a switch/case statement. Each branch to test is signaled with a vertical bar, like so:\n``````match x with\n| caseA -> something\n| caseB -> somethingElse\n``````\n• The \"`match`\" with `[]` matches an empty list, and returns an empty list.\n• The \"`match`\" with `firstElem::otherElements` does two things.\n• First, it only matches a non-empty list.\n• Second, it creates two new values automatically. One for the first element called \"`firstElem`\", and one for the rest of the list, called \"`otherElements`\". In C# terms, this is like having a \"switch\" statement that not only branches, but does variable declaration and assignment at the same time.\n• The `->` is sort of like a lambda (`=>`) in C#. The equivalent C# lambda would look something like `(firstElem, otherElements) => do something`.\n• The \"`smallerElements`\" section takes the rest of the list, filters it against the first element using an inline lambda expression with the \"`<`\" operator and then pipes the result into the quicksort function recursively.\n• The \"`largerElements`\" line does the same thing, except using the \"`>=`\" operator\n• Finally the resulting list is constructed using the list concatenation function \"`List.concat`\". For this to work, the first element needs to be put into a list, which is what the square brackets are for.\n• Again note there is no \"return\" keyword; the last value will be returned. In the \"`[]`\" branch the return value is the empty list, and in the main branch, it is the newly constructed list.\n\nFor comparison here is an old-style C# implementation (without using LINQ).\n\n``````public class QuickSortHelper\n{\npublic static List<T> QuickSort<T>(List<T> values)\nwhere T : IComparable\n{\nif (values.Count == 0)\n{\nreturn new List<T>();\n}\n\n//get the first element\nT firstElement = values;\n\n//get the smaller and larger elements\nvar smallerElements = new List<T>();\nvar largerElements = new List<T>();\nfor (int i = 1; i < values.Count; i++) // i starts at 1\n{ // not 0!\nvar elem = values[i];\nif (elem.CompareTo(firstElement) < 0)\n{\n}\nelse\n{\n}\n}\n\n//return the result\nvar result = new List<T>();\nreturn result;\n}\n}\n``````\n\nComparing the two sets of code, again we can see that the F# code is much more compact, with less noise and no need for type declarations.\n\nFurthermore, the F# code reads almost exactly like the actual algorithm, unlike the C# code. This is another key advantage of F# -- the code is generally more declarative (\"what to do\") and less imperative (\"how to do it\") than C#, and is therefore much more self-documenting.\n\n## A functional implementation in C#\n\nHere's a more modern \"functional-style\" implementation using LINQ and an extension method:\n\n``````public static class QuickSortExtension\n{\n/// <summary>\n/// Implement as an extension method for IEnumerable\n/// </summary>\npublic static IEnumerable<T> QuickSort<T>(\nthis IEnumerable<T> values) where T : IComparable\n{\nif (values == null || !values.Any())\n{\nreturn new List<T>();\n}\n\n//split the list into the first element and the rest\nvar firstElement = values.First();\nvar rest = values.Skip(1);\n\n//get the smaller and larger elements\nvar smallerElements = rest\n.Where(i => i.CompareTo(firstElement) < 0)\n.QuickSort();\n\nvar largerElements = rest\n.Where(i => i.CompareTo(firstElement) >= 0)\n.QuickSort();\n\n//return the result\nreturn smallerElements\n.Concat(new List<T>{firstElement})\n.Concat(largerElements);\n}\n}\n``````\n\nThis is much cleaner, and reads almost the same as the F# version. But unfortunately there is no way of avoiding the extra noise in the function signature.\n\n## Correctness\n\nFinally, a beneficial side-effect of this compactness is that F# code often works the first time, while the C# code may require more debugging.\n\nIndeed, when coding these samples, the old-style C# code was incorrect initially, and required some debugging to get it right. Particularly tricky areas were the `for` loop (starting at 1 not zero) and the `CompareTo` comparison (which I got the wrong way round), and it would also be very easy to accidentally modify the inbound list. The functional style in the second C# example is not only cleaner but was easier to code correctly.\n\nBut even the functional C# version has drawbacks compared to the F# version. For example, because F# uses pattern matching, it is not possible to branch to the \"non-empty list\" case with an empty list. On the other hand, in the C# code, if we forgot the test:\n\n``````if (values == null || !values.Any()) ...\n``````\n\nthen the extraction of the first element:\n\n``````var firstElement = values.First();\n``````\n\nwould fail with an exception. The compiler cannot enforce this for you. In your own code, how often have you used `FirstOrDefault` rather than `First` because you are writing \"defensive\" code. Here is an example of a code pattern that is very common in C# but is rare in F#:\n\n``````var item = values.FirstOrDefault(); // instead of .First()\nif (item != null)\n{\n// do something if item is valid\n}\n``````\n\nThe one-step \"pattern match and branch\" in F# allows you to avoid this in many cases.\n\n## Postscript\n\nThe example implementation in F# above is actually pretty verbose by F# standards!\n\nFor fun, here is what a more typically concise version would look like:\n\n``````let rec quicksort2 = function\n| [] -> []\n| first::rest ->\nlet smaller,larger = List.partition ((>=) first) rest\nList.concat [quicksort2 smaller; [first]; quicksort2 larger]\n\n// test code\nprintfn \"%A\" (quicksort2 [1;5;23;18;9;1;3])\n``````\n\nNot bad for 4 lines of code, and when you get used to the syntax, still quite readable." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.77154505,"math_prob":0.83464366,"size":7480,"snap":"2022-27-2022-33","text_gpt3_token_len":1767,"char_repetition_ratio":0.14245586,"word_repetition_ratio":0.051779937,"special_character_ratio":0.2528075,"punctuation_ratio":0.13531114,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9638849,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-15T09:25:47Z\",\"WARC-Record-ID\":\"<urn:uuid:0df4bc9b-6718-4fc4-80a8-2583718f9178>\",\"Content-Length\":\"87916\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:531a1673-4082-4163-aca5-9587d5415776>\",\"WARC-Concurrent-To\":\"<urn:uuid:9fe2aa80-6691-45b1-a9c6-58c3c6e6ba49>\",\"WARC-IP-Address\":\"104.18.3.206\",\"WARC-Target-URI\":\"https://swlaschin.gitbooks.io/fsharpforfunandprofit/content/posts/fvsc-quicksort.html\",\"WARC-Payload-Digest\":\"sha1:AIQEGQ3EQVMVKD4W7TZTUNUBEIUUAXEO\",\"WARC-Block-Digest\":\"sha1:K76P4NGRI57RRU4AZXN33TAR47MF2ORP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882572163.61_warc_CC-MAIN-20220815085006-20220815115006-00142.warc.gz\"}"}
http://www.webpgomez.com/docencia/discrete-mathematics-2011/287-solution-to-project-1
[ "Menú\n\n### 1 Description of the Magic Effect\n\n1. The magic effect consists of the following steps:\n2. Take a 3-digit number and reverse it.\n3. Subtract the smallest number from the greatest number.\n4. Take the result and reverse it again.\n5. Sum the result and the reversed number.\n\n### 2 Mathematical Principle Behind the Magic Effect\n\nLet n be the chosen number and write it in positional notation as n = xyz. This means that n = 100x + 10y + z. When the volunteer is asked to reverse the number and then subtract the smallest from the greatest, the following operations are carried out:", null, "At this point it is clear that the effect will not work if the number is palindromic, that is, if we obtain the same number when read backwards. In this case the subtraction will be zero. Without loss of generality, we can assume that x > z. We re-write the result as 99(x - z) = 11 ⋅ 9 ⋅ (x - z). Since x - z < 9, the product 9 ⋅ (x - z) is a multiple of 9 between 9 and 81. This multiple can be written as 9 ⋅ (x - z) = a10 + b, for certain a,b in ℕ. By substituting this expression in the product 99(x - z), we will obtain:", null, "We reverse the number and sum the original number:", null, "Since a10 + b is a multiple of 9, the sum of its digits is 9, and, therefore, (a + b)121 = 9 ⋅ 121 = 1089. This shows that the magic effect always works as long as the chosen number is not a palindrome.\n\nNote: Some people have put forward a simpler, not so deep explanation. I have taken it as valid as this one.\n\n### 3 The 2-digit Version\n\nLet n be a 2-digit number. As before, we write it in positional notation, n = xy = 10x + y. Then, the number is reversed and subtracted from each other.", null, "Again, we must require x is not equal to y, that is, the number cannot be a palindrome. Let us assume, for example, that x > y. Let us write number 9(x - y) as 10a + b, as done before.", null, "### 4 The 4-digit Version\n\nFirst of all, the same situation arises when a palindromic number is chosen. Let us take a non-palindromic number. Even in that case, the final result is not unique. Consider the following numbers as a point in case:\n\nn = 1,000: 1,000 - 0001 = 999", null, "999 + 999 = 1,998.\nn = 1,003: 3,001 - 1,003 = 1,998", null, "1,998 + 8,991 = 10,989.\nn = 1,011 : 1,101 - 1,011 = 90", null, "90 + 09 = 99.\nn = 7,451 : 7,451 - 1,547 = 5,904", null, "5,904 + 4,095 = 9,999.\n\n### Docencia\n\n• ##### Proyectos de fin de carrera", null, "" ]
[ null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution0x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution1x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution2x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution3x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution5x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution6x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution6x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution6x.png", null, "http://www.webpgomez.com/images/stories/Docencia/Discrete-Mathematics/Project-1/Class-Project-1-solution6x.png", null, "http://www.webpgomez.com/images/jsn_air_pro/backgrounds/hr-bg.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9036305,"math_prob":0.9986843,"size":2262,"snap":"2020-34-2020-40","text_gpt3_token_len":677,"char_repetition_ratio":0.12533215,"word_repetition_ratio":0.004310345,"special_character_ratio":0.34305924,"punctuation_ratio":0.15779468,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997161,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-19T02:16:41Z\",\"WARC-Record-ID\":\"<urn:uuid:9d196b85-ff79-4279-9b14-60c514dff9b9>\",\"Content-Length\":\"31137\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:47727b4f-8232-49f2-9263-65166cba2bec>\",\"WARC-Concurrent-To\":\"<urn:uuid:a33c653f-55a2-4f74-a046-ce039c528b2c>\",\"WARC-IP-Address\":\"5.135.40.7\",\"WARC-Target-URI\":\"http://www.webpgomez.com/docencia/discrete-mathematics-2011/287-solution-to-project-1\",\"WARC-Payload-Digest\":\"sha1:XLO5QBZ3HHHLB4PYLQ3ELQD77ARE2E5J\",\"WARC-Block-Digest\":\"sha1:WGBCZBA7XKA23RYNJL4THIHBPPZNLQPJ\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400189928.2_warc_CC-MAIN-20200919013135-20200919043135-00462.warc.gz\"}"}
https://davidlovezoe.club/wordpress/archives/419
[ "# Go语言单元测试入门\n\n#### 单元测试的定义\n\nThe difference between unit and integration tests is that unit tests usually isolate dependencies that communicate with network, disk etc. Unit tests normally test only one thing such as a function.\n\n#### 官方自带的测试姿势\n\nGo语言之所以令人感到欣喜,很大的一个原因是那些设计者们已经为广大的开发者做好了很多轮子,包括测试框架,试问自带测试框架的编程语言有几个。\n\n```func twoSum(nums []int, target int) []int {\nmapv := make(map[int]int)\nfor i, v := range nums {\nif val, ok := mapv[target-v]; ok {\nreturn []int{i, val}\n}\nmapv[v] = i\n}\nreturn nil\n}```\n\n```import (\n\"testing\"\n\"reflect\"\n)\n\nfunc TestTwoSum(t *testing.T) {\ntc := []int{1, 2, 3, 4}\ntarget := 5\nexpected := []int{2, 1}\ngot := TwoSum(tc, target)\n\n// because slice type can only be compared to nil via ==\n// use DeepEqual instead, it does check the length and each elements of two slice array\n// you can find details via source code or here(https://gist.github.com/nevermosby/d373dfc07335c51477087f0f544e3b7c).\nif !reflect.DeepEqual(got, expected) {\nt.Errorf(\"TwoSum(%v, %v) = %v, expect %v\", tc, target,got, expected)\n}\n}```\n\n• -v,老司机肯定懂,通过添加verbose参数,输出更多信息,这里如果你的单元测试里使用Log或Logf,就会全量输出相关信息\n• -cover,大家也能猜出一二,顾名思义,就是开启测试覆盖率分析,即在测试执行完毕后同时输出该单元测试可以覆盖源代码行数的比例\n\n1. 单元测试文件是以*_test.go命名\n2. 测试函数是以Test作为命名前缀\n3. 测试函数的入参是*testing.T\n4. 单元测试文件没有main函数\n5. 对单个测试文件执行测试\n\n• 普通测试函数(Test)\n• 基准测试函数(Benchmark)\n• 示例函数(Example)\n\n#### 个人推荐的测试姿势——表格驱动\n\n```func TestFoo(t *testing.T) {\n// setup code\nt.Run(\"A=1\", func(t *testing.T) { … })\nt.Run(\"A=2\", func(t *testing.T) { … })\nt.Run(\"B=1\", func(t *testing.T) { … })\n// teardown code\n}```\n\n```func TestFoo(t *testing.T) {\n// define test data by table\ntestData := []struct {\ncaseName string\ninput string\nwant bool\n}{\n{\"if-A\",\"A\",true},\n{\"if-B\",\"B\",true},\n{\"if-A&B\",\"AB\",false},\n{\"if-C\",\"C\",false},\n}\nfor _, test := range testData {\nt.Run(test.name, func(t *testing.T){\nif got := Foo(test.input); got != test.want {\nt.Errorf(\"Foo(%v) = %v, expect %v\", test.input ,got, want)\n}\n})\n}\n}```\n\n`gotests` makes writing Go tests easy. It’s a Golang commandline tool that generates table driven tests based on its target source files’ function and method signatures. Any new dependencies in the test files are automatically imported.\n\n```# Firstly, create the target test file\n# Otherwise \"gotests\" will throw errors for \"no such file or directory\"\n> touch twosum_test.go\n# \"-all\" means to generate go tests for all functions and methods in target file\n# \"-w\" means to write output to files instead of stdout\n> gotests -all -w twosum_test.go twosum.go\n> Generated TestTwoSum```\n\n```import (\n\"reflect\"\n\"testing\"\n)\n\nfunc TestTwoSum(t *testing.T) {\ntype args struct {\nnums []int\ntarget int\n}\ntests := []struct {\nname string\nargs args\nwant []int\n}{\n}\nfor _, tt := range tests {\nt.Run(tt.name, func(t *testing.T) {\nif got := TwoSum(tt.args.nums, tt.args.target); !reflect.DeepEqual(got, tt.want) {\nt.Errorf(\"TwoSum() = %v, want %v\", got, tt.want)\n}\n})\n}\n}```\n\nAlt+Insert 可以选择生成函数的类型,但内容上只是一个模板,比gotests生成的要简单很多,参见以下操作视频:\n\n1.", null, "雪儿?说道:" ]
[ null, "https://secure.gravatar.com/avatar/c7293066193afab9b205629571374688", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.64749986,"math_prob":0.87800866,"size":4454,"snap":"2021-43-2021-49","text_gpt3_token_len":2285,"char_repetition_ratio":0.09820225,"word_repetition_ratio":0.015521064,"special_character_ratio":0.2429277,"punctuation_ratio":0.1704871,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96005267,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-05T23:48:54Z\",\"WARC-Record-ID\":\"<urn:uuid:902c3bac-3760-41ad-8aeb-57f5deeaa0fa>\",\"Content-Length\":\"63120\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2a599bff-ca57-4ea6-ab0b-453c5a266aeb>\",\"WARC-Concurrent-To\":\"<urn:uuid:ea9b3d81-e70d-4464-b005-c08481877cab>\",\"WARC-IP-Address\":\"35.189.182.55\",\"WARC-Target-URI\":\"https://davidlovezoe.club/wordpress/archives/419\",\"WARC-Payload-Digest\":\"sha1:3U7CY3X25YVZQ2X46HK7OO6NWRTCAHLE\",\"WARC-Block-Digest\":\"sha1:HFXZNI4QBYNOQXQOKWWGO3NRFJHL5C4H\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964363226.68_warc_CC-MAIN-20211205221915-20211206011915-00025.warc.gz\"}"}
http://bonneshonneur.pw/8159592748/4702/one-tailed-two-tailed-test-difference.html
[ " One tailed two tailed test difference - so, depending on\nHome\n\n# One tailed two tailed test difference\n\n### Difference Between One-tailed and Two-tailed Test (with\n\nBasis of Comparison One-tailed Test Two-tailed Test; Meaning: A statistical hypothesis test in which alternative hypothesis has only one end, is known as one tailed test A two-tailed test allows you to determine if two means are different from one another. A direction does not have to be specified prior to testing. A direction does not have to be specified prior to testing One-tailed tests have more statistical power to detect an effect in one direction than a two-tailed test with the same design and significance level. One-tailed tests occur most frequently for studies where one of the following is true statisticslectures.com - where you can find free lectures, videos, and exercises, as well as get your questions answered on our forums In statistical significance testing, a one-tailed test and a two-tailed test are alternative ways of computing the statistical significance of a parameter inferred from a data set, in terms of a test statistic. A two-tailed test is appropriate if the estimated value may be more than or less than the reference value, for example, whether a test taker may score above or below the historical.\n\n### The Difference Between One-Tailed & Two-Tailed Testing\n\nThis project was created with Explain Everything ™ Interactive Whiteboard for iPad In essence, one-tailed tests allow for the possibility of an effect in just one direction where with two-tailed tests, you are testing for the possibility of an effect in two directions - both positive and negative\n\n### One-Tailed and Two-Tailed Hypothesis Tests Explained\n\nA statistical test is based on two competing hypotheses: the null hypothesis H0 and the alternative hypothesis Ha. The type of alternative hypothesis Ha defines if a. The choice of one-tailed or two-tailed tests follows the logic of the hypothesis that is being tested! The one-tailed test, if appropriate, will be more powerful I'm not sure that the difference between one and two tails would particularly matter for sample size. In general, the difference between a one-tailed test and a two. This lesson explores the difference between the one-tailed and two-tailed tests. We will look at what they mean in statistical testing, as well as when you should and should not use them\n\n### One-Tailed and Two-Tailed Tests - YouTub\n\n• I am currently working on my dissertation and one of my committee members suggested that I should have used a one-tailed test as I have a directional hypothesis, but I think that a two-tailed test is just as appropriate based on several of the reasons listed on the blog\n• A two tailed test tests for a difference in either direction. Thus the P value would be the area under the t distribution to the right of t=1.92 PLUS the area under.\n\n### One- and two-tailed tests - Wikipedi\n\n1. This entry was posted in A/B Testing, Conversion Optimization, Statistical Significance, Statistics and tagged composite hypothesis, null hypothesis, one-sided, one-tailed, statistical significance, t test, two-sided, two-tailed, z test\n2. As you can see, the one-tailed test requires a less extreme t-value (1.725) to produce a statistically significant result in the right tail than the two-tailed test (2.086). In other words, a smaller effect is statistically significant in the one-tailed test\n3. The difference between a one-tailed and two-tailed test of significance is that a one-tailed test looks for an increase or decrease in the parameter and a two-tailed.\n4. · One-tailed test looks at the probability that the sample mean was either greater than, or less than or equal to · Two-tailed test, sees if two means are different from each other (ie from.\n\n### choosing between a one tailed and a two tailed test - YouTub\n\nIf you were able to reject the null in a two-tailed test you will be able to reject it in a one-tailed too (with the right side of the association chosen). Conduct a one-tailed test if your 2-tailed test was not enough powered While studying for my stats course, I was trying to understand the difference between one-tailed and two-tailed hypothesis tests. Specifically, why does the one-tailed test reject the null while th.. A couple of assumptions were made: that the distribution is normal, A two-tailed test was used at a confidence level of 95%, the critical value = 1.96. canadacouncil.ca Les hypothèses suivantes ont été posées : la distribution est normal e, un te st bilatéral a été fait à un niveau de confiance de 95 %, et la valeur critique est de 1,96 The test of such a hypothesis is nondirectional or two‐tailed because an extreme test statistic in either tail of the distribution (positive or negative) will lead to the rejection of the null hypothesis of no difference Two-tailed tests are more widely used in clinical trials than the one-tailed test, in view of the fact that the two-tailed test is more stringent and more conservative (4646Norman GR, Streiner DL. From: Clinical Trials (Second Edition) , 201", null, "You will often see a statistical test or a hypothesis referred to as one-tailed or two-tailed. A one-tailed hypothesis is simply one that specifies the direction of a difference or correlation, while a two-tailed hypothesis is one that does not In the 2003 report, Table 2, the one-tailed Fisher exact test p-value for the 2003 nest occupancy rate (Nesting Activity) is reported as 0.109: it appears that the wrong tail was used in the test - the correct value is 0.957 Should you use a one-tailed test or a two-tailed test for your data analysis? Posted March 14, 2017 When creating your data analysis plan or working on your results, you may have to decide if your statistical test should be a one-tailed test or a two-tailed test (also known as directional and non-directional tests respectively)\n\nTwo-tailed test (Image Source) One-tailed Test (Image Source) Chris Stucchio does a great job explaining the difference between the two tests in context Assess individual situations to determine whether a one-tailed or two-tailed test is necessary. Define acceptance sampling. Skill Level Intermediate. 1h 56m Duration. 733,992 Views. Show More Show Less. Related Courses. Preview course. Excel Statistics E.\n\nA one-tailed test is a statistical test in which the critical area of a distribution is one-sided so that it is either greater than or less than a certain value, but not both Figure showing one-tailed and two-tailed tests with the corresponding values of the z statistic As can be seen from the above figure, the value of the z statistic in a one-tailed test is 1.65. This means that a test statistic greater than 1.65 will be considered statistically significant, resulting in rejection of the null hypothesis A two-tailed test splits your significance level and applies it in both directions, thus each direction is only half as strong as a one-tailed test (which puts all the significance in one direction) and thus requires more subjects to reach significance A two-tailed test would be used to test these null hypotheses: There will be no significant difference in IQ scores between males and females. There will be no significant difference between blue collar and white collar workers. There is no significant difference in strength between Superman and the average person. A one-tailed probability is exactly half the value of a two-tailed probability A one-tailed test looks for an increase or decrease in the parameter whereas a two-tailed test looks for any change in the parameter (which can be any change- increase or decrease). We can perform the test at any level (usually 1%, 5% or 10%)\n\n### One-Tailed vs Two-Tailed Tests (Does It Matter?) - CX\n\n• One-tailed and two-tailed tests. More significance testing videos. Hypothesis testing and p-values. One-tailed and two-tailed tests . This is the currently selected item. Z-statistics vs. T-statistics. Small sample hypothesis test. Large sample proportion.\n• Note that, if we wanted to use the same 95% confidence level we employed in the one-tailed test, we would need the white areas to each correspond to 2.5% of the possible values; that is, we would need to use critical values corrseponding to those for a one-tailed test at the 97.5% confidence level\n• g a hypothesis test, its time to learn about the difference between two-tailed and one tail tests. To help you understand this let us take two different scenarios\n• One of the first steps is to look up a z-score, and in order to do that, you need to know if it's a one tailed test or two. You can figure this out in just a couple of steps. You can figure this out in just a couple of steps\n\n### What is the difference between a two-tailed and a one-tailed\n\n• By way of example, if you used a two-tailed test (which you should not), you would reject the null if the test statistic is large, regardless of whether it is negative or positive\n• It's not always true that the significance of a two-tailed test is twice the significance of a one-tailed test, that's a feature of this particular example. But the two-tailed significance is always the same or higher as the significance of a one-tailed test with the same data. In this case, we are testing the hypothesis that the program makes no difference against the alternative that it.\n• The null hypothesis for the two-tailed test is π = 0.5. By contrast, the null hypothesis for the one-tailed test is π ≤ 0.5. Accordingly, we reject the two-tailed hypothesis if the sample proportion deviates greatly from 0.5 in either direction. The one-tailed hypothesis is rejected only if the sample proportion is much greater than 0.5. The alternative hypothesis in the two-tailed test is.\n• One-Tailed and Two-Tailed Tests. One important concept in significance testing is whether to use a one-tailed or two-tailed test of significance\n\nBest Answer: That depends on your data. Look at the grades of people taking sports and the grades of people that are not taking sports A two-tailed test is a statistical test in which the critical area of a distribution is two-sided and tests whether a sample is greater than or less than a certain. Two-tailed tests are more widely used in clinical trials than the one-tailed test, in view of the fact that the two-tailed test is more stringent and more conservative (46, 47). Read full chapter Biostatistics—Part Yes, a two-tailed test is correct because the maximum amount consumed by men can be more or less than that of women. Experimentally, you should establish the rejection region before you collect the data, and as it is possible in theory at least that men could drink less than women, you should include that The two tailed test is called a two tailed test because the rejection region can be in either tail. Here's what the right tailed test looks like on a graph: As you can see, the rejection region (shaded in yellow) is to the right of the graph\n\n### Difference between one and two tailed tests - answers\n\nVariations of the t-Test: 2 Sample 1 tail 1 2 Sample t-Test (1 tailed, equal variance) Suppose we have two samples of ceramic sherd thickness collected from a One- and two-tailed tests explained In statistical significance testing , a one-tailed test and a two-tailed test are alternative ways of computing the statistical significance of a parameter inferred from a data set, in terms of a test statistic One-tailed and two-tailed Test: When comparing two groups of continuous data, the null hypothesis is that there is no real difference between the groups (A and B)\n\nTwo-tailed tests are much more common than one-tailed tests in scientific research because an outcome signifying that something other than chance is operating is usually worth noting. One-tailed tests are appropriate when it is not important to distinguish between no effect and an effect in the unexpected direction. For example, consider an experiment designed to test the efficacy of a. Now, if you are doing a one-tailed test, this means that you predicted that the difference will be in one side of the normal curve but not the other, so if you had a .05 significant level then all of the .05 is in the tail that you predicted the difference would be in The difference from the one‐tailed situation discussed earlier occurs because the alternative hypothesis for a two‐tailed test is non‐contiguous, being divided into two separate regions by the null hypothesis When I am doing two-tailed t-test to compare two means (Null Hypothesis: µ1 =µ2, Alternative: µ1≠ µ2) the result no significant difference at alpha = 0.05 and. A two-tailed test is a statistical test in which the critical area of a distribution is two-sided and tests whether a sample is greater than or less than a certain range of values\n\nTraductions en contexte de one tailed test en anglais-français avec Reverso Context : Treatment groups should be compared to a control group using techniques such as ANOVA followed by pairwise comparisons (e.g. Dunnett's one tailed test) and the criterion for statistical difference, for example, p <= 0,05 The significance test is always defined as either one-tailed or two-tailed. A two-tailed test is a test that will be interpreted if the effect meets the criterion for significance and falls in either direction, and is appropriate for the vast majority of research studies. A one-tailed test is a test that will be interpreted only if the effect meets the criterion for significance and falls in. Testing Hypotheses • Overview • 5 Steps for testing hypotheses Chapter 13 - 1 • Research and null hypotheses • One and two-tailed tests • Type 1 and Type. Here we should apply a two-tailed test because we are interested in a difference in either direction. Our null hypothesis is that the two population means are equal, H 0 : μ 1 = μ 2 while the alternative hypothesis is that the two population means are not equal, H 1 : μ 1 ≠ μ 2\n\n### What is the difference between one-tailed test or two-tailed\n\nTwo of these correspond to one-tailed tests and one corresponds to a two-tailed test. What is Two Tail Test : A two-tailed test is a statistical test in which the critical area of a distribution is two-sided and tests whether a sample is greater than or less than a certain range of values One-Sided or One-Tailed Hypothesis TestsIn most applications, a two-sided or two-tailed hypothesis testis the most appropriate approach. This approach is based onthe expression of the null and alternative hypotheses asfollows: H0: = 170 vs H1: ≠ 170To test the above hypothesis, we set up the rejection andacceptance regions as shown on the next slide, where we areusing = 0.05\n\n### One-Tailed Vs. Two-Tailed Tests: Differences & Examples ..\n\n• CliffsNotes study guides are written by real teachers and professors, so no matter what you're studying, CliffsNotes can ease your homework headaches and help you.\n• In other words, a single tailed t-test at 10% significance level have the rejection area either in left or right side of the mean, while for two tailed t-test at 10% significance level have 5% rejection area on the left side & remaining 5% rejection area on the right side of the mean\n• ed. Hypothesis states related for studies are provided\n• Comparing one- and two-tailed tests (with a constant alpha level and sample size), the probability of rejection will be higher for a. the two-tailed test b. the one-tailed test, if you have correctly predicted the direction of the difference c. neither, the probability of rejection does not change d. the test with the most conservative test statisti\n• If the test is performed using the actual population mean and variance, rather than an estimate from a sample, it would be called a one- or two-tailed Z test The statistical tables for Z and for t provide critical values for both one- and two-tailed tests\n\nA two-sided hypothesis and a two-tailed test should be used only when we would act the same way, or draw the same conclusions if we discover a statistically significant difference in any direction. But this is clearly not how one would act in making an actual business decision with a two-tailed test One-Tailed vs. Two-Tailed Tests Remember that, in looking at the differences between the two groups, if the researcher is trying to determine if there is an improvement or an increase in the dependent variable being measured (or a deterioration or a decrease), then this is a one-tailed test H 1: μ ≠ μ 0, where a difference is hypothesized and this is called a two-tailed test. The exact form of the research hypothesis depends on the investigator's belief about the parameter of interest and whether it has possibly increased, decreased or is different from the null value\n\n### One-tailed and Two-tailed Tests - The Analysis Facto\n\nYep one-tailed means that you are predicting a certain thing will happen (e.g. X will be more than Y, X will increase Y etc) and two-tailed means you're just predicting some relationship (e.g. X will affect Y) but you're not predicting exactly how it will affect it This means that given p and t values from a two-tailed test, you would reject the null hypothesis of a greater-than test when p/2 < alpha and t > 0, and of a less-than test when p/2 < alpha and t < 0 Questions. When to use one-tailed and when two-tailed test? One-tailed probability. In the James Bond case study, Mr. Bond was given 16 trials on which he judged. If a population parameter is hypothesized to be greater than or less than some value, a one-tailed test is used. When no direction is indicated in the research hypothesis, a two-tailed test is used. A two-tailed test will show whether or not there is a difference in the values of the variables involved\n\nMyth #4: One should not do a one-sided test after a two-tailed test or after a one-tailed test in the opposite direction This claim is encountered in much of the literature and is enshrined in statistical guidelines and requirements in the form of requiring pre-specification One-Tailed Test: Definition & Examples . Chapter 14 for two separate one-tailed tests of significance. A one-tailed test is a type of significance test used when the hypothesis being tested is. one tailed or two tailed hypothesis One tailed or two tailed hypothesis 8.9 out of 10 based on 786 ratings. A one-tailed writing a college level paper test has one tailed or two tailed hypothesis the entire 5% of the alpha level in one tail god is one essay (in either the left, thesis statement for a research paper or the right tail) If the test is performed using the actual population mean and variance, rather than an estimate from a sample, it would be called a one- or two-tailed Z test The statistical tables for Z and for t provide critical values for both one- and two-tailed tests The following simulation is like one on the previous page, but a 1-tailed test is used to compare the population means. Samples of size 20 are again selected from two populations, both of which are normal with mean 75 and standard deviation 8\n\nA one-tailed test is appropriate if the estimated value may depart from the reference value in only one direction, for example, whether a machine produces more than one-percent defective products. Alternative names are one-sided and two-sided tests; the t. Chi-square tests were preplanned to test the difference between positive and negative attitudes for each questionnaire, with the test being one-tailed for the. one-tail test is applied. If words such as ^change, the same, different/difference and so on _ are used in the claim of the question (≠ is used in H 1), a two-tailed test is applied. In a one-tailed test, the critical region has just one part (the gree. There are really two different one-tailed t-tests, one for each tail. In a one-tailed t-test, all the area associated with a is placed in either one tail or the other When doing a two-tailed t-test, the null hypothesis is a particular value, and there are two alternative hypotheses, one positive and one negative. When the null hypothesis is rejected, one of the alternative hypotheses is accepted and the other rejected, depending upon the direction of the results\n\nThe two ways of carrying out statistical significance test of a A one-tailed test is used to ascertain if there is any relationship between. When you conduct a test. Calculates the T-test on TWO RELATED samples of scores, a and b. This is a two-sided test for the null hypothesis that 2 related or repeated samples have identical average (expected) values. Two-sided means two-tailed Attachments. One-tailed Vs.Two-tailed test.docx What is the difference between a one-tailed and a two-tailed test of significanc... read more by clicking on the.\n\nThe right tailed test and the left tailed test are examples of one-tailed tests. They are called one tailed tests because the rejection region (the area where you would reject the null hypothesis) is only in one tail. The two tailed test is called a two tailed test because the rejection region can be in either tail Most of the tests that you would use to compare two samples in R have been set by default to run a two-tailed test. This means that, when running these tests, you.\n\n### Difference between one-tailed and two-tailed testing? - Cross\n\n1. Two tailed test is a hypothesis test performed if there is no reason to think the parameter is higher or lower than the assumed parameter of the null hypothesis. The null hypothesis should be rejected when the test value is in either of the two critical regions. Two tailed test simply show a difference\n2. The U test is used to find the difference of distribution between two small groups and also for finding the difference of means between two small groups. It make me confused because my data is.\n3. e if there is a difference between the statistic and a value, then we have a two-tail test\n4. Explain the difference between a left-tailed, two-tailed, and right-tailed test and how do wetell the direction of the test by looking at the pair of hypothesis. read more Sk1ll\n5. The analysis is done using formal test of hypothesis for the difference between two means of financial performances of corporations with three different supervisory board characteristics using both directional one-tailed and nondirectional two-tailed tests\n\nOn the other hand, A one-sided hypothesis and a one-tailed test should be used when we would act a certain way, or draw certain conclusions, if we discover a statistically significant difference in a particular direction, but not in the other direction The use of a one or two tailed test is an important issue. What every analysis I've read fails to understand is that the issue cannot be decided at the level of statistics alone - it needs to be decided from within the context of a decision procedure Two-Tailed Test of Population Proportion The null hypothesis of the two-tailed test about population proportion can be expressed as follows: where p 0 is a hypothesized value of the true population proportion p E) One-tailed tests and two-tailed tests - A two-tailed test is a significance test in which the alternative hypothesis specifies no direction of difference from the population parameter value such as m. Equal rejection regions are in both tails of the distribution. In a one-tailed test w", null, "A two-tailed test is used when the two samples being compared are related in some way. For example, you would use a two-tailed test if one random sample was 15 quarter horses and the second sample was 15 sires or dams of those same horses A two-tailed test requires us to consider both sides of the Ho distribution, so we split and place half in each tail. A directional hypothesis only considers one tail (the other tail is ignored as irrelevant to H1), thus all of can be placed in that one tail\n\n### The Lonely Journey: What are the differences between one\n\n1. We didn't say one tailed two tailed hypothesis whether the drug would lower the response time one tailed two tailed hypothesis or raise the response time. in case the research hypothesis entails the direction of interrelation or difference, then one-tailed test is applied, but if the research hypothesis does not signifies the direction of interaction or difference, we use two-tailed test.\n2. It depends on what the experimenter is interested in. Suppose a new drug is tested to see if it reduces blood pressure. The experimenter would use a one-tailed test\n3. e whether there is a difference at all, no directionality implied. They test for differences in.\n4. Many translated example sentences containing two-tailed test - French-English dictionary and search engine for French translations\n5. Chapter 9: One-Tailed Tests, Two-Tailed Tests, and Logarithms Chapter 9 Outline • A One-Tailed Hypothesis Test: The Downward Sloping Demand Curv\n\n### One-tailed vs Two-tailed Tests of Significance in A/B Testing\n\n1. Two-tailed test is used when the alternate hypothesis does not have a single direction of deviation from the null rather, it only says that the null is not true\n2. A test of a statistical hypothesis , where the region of rejection is on only one side of the sampling distribution , is called a one-tailed test. For example, suppose the null hypothesis states that the mean is less than or equal to 10\n3. Meilleure réponse: If you are testing whether two quantities are different, use a two-tailed test, as the first quantity can be either less than or.\n4. A two tailed test looks at whether the sample is is greater than and/or less than the distribution. Two tailed means that you are looking at both sides (known as tails) of a distribution and seeing their relationship to the sample\n5. One and Two Tail Tests We use the Analyze->Compare Means->Independent Samples T Test SPSS command sequence to test difference between means hypotheses. In the Output for this procedure, the cell headed Sig. (2-tailed) provides the basis.", null, "### When Can I Use One-Tailed Hypothesis Tests? - Statistics By Ji\n\n1. Answer: One-tailed test happens if we want to test the difference between two groups in one direction (ie. either greater or lesser) Two-tailed test happens if we want to test the difference between two groups in two.\n2. However, if the alternate hypothesis was stated so that a one-tailed test could be used (that is, male lawyers make more money than female lawyers), it is entirely conceivable that the one-tailed test could find that a \\$2,000 difference is statistically significant at a P value less than\n3. A two-tailed test will test both if the mean is significantly greater than x and if the mean significantly less than x. The mean is considered significantly different from x if the test statistic is in the top 2.5% or bottom 2.5% of its probability distribution, resulting in a p-value less than 0.05\n4. I am doing hypothesis testing using t-test and p-value. I calculate my p-value based on the degrees of freedom and the t-test value. The p-value is a two-tailed.\n5. We calculated the volume ratio in 52 donors and tested the difference between the segmental volume ratios with a one-tailed t-test. NAID 120003290178 対人遠隔作用における受信者弁別力指標の推�\n\npopulaire:\n\n•", null, "5 cartons rouges.\n•", null, "Saint gobain france.\n•", null, "Junkudo.\n•", null, "Election federale belge 2018.\n•", null, "Diligence definition english.\n•", null, "Ma copine est jalouse de moi.\n•", null, "Hedi slimane ses origines.\n•", null, "Prendre l'avion pour la première fois peur.\n•", null, "Blick.\n•", null, "Salaire vendeur italie.\n•", null, "Magasin art deco bruxelles.\n•", null, "4 images 1 mot pomme argent.\n•", null, "Embargo iran date.\n• Ferratum bank interdit bancaire.\n•", null, "Pll mere de spencer.\n•", null, "The grand tour rmc decouverte replay.\n•", null, "Photos fruits et légumes gratuites.\n• Logis le belvédère restaurant guillaume viala bozouls.\n•", null, "Alumni insa lyon.\n• Audition maitre de conférence pdf.\n•", null, "Salaire bibliothécaire.\n•", null, "Ordre des pharmaciens paris.\n•", null, "Ecran tactile.\n•", null, "Monteurunterkunft pension.\n•", null, "Infj.\n•", null, "Sujet capes maths 2017.\n•", null, "Lever et coucher du soleil montréal 2018.\n•", null, "Ludacris au gabon.\n• Prédire l'avenir synonyme.\n•", null, "Economie france 2018.\n•", null, "Probleme chaudiere beretta.\n•", null, "Marie claire plus.\n•", null, "Foot regional 1 poule b.\n•", null, "Irritabilité symptome.\n•", null, "Branchement visiophone 4 fils.\n•", null, "Hanna marin age.\n•", null, "Table pliante camping intersport.\n•", null, "Bus aeroport perpignan canet plage.\n•", null, "Pitch deck netflix.\n•", null, "Diametre abdominal foetus.\n•", null, "Frederic ii experience." ]
[ null, "https://tse1.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse4.mm.bing.net/th", null, "https://tse3.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse1.mm.bing.net/th", null, "https://tse2.mm.bing.net/th", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.94453245,"math_prob":0.60459614,"size":17399,"snap":"2021-04-2021-17","text_gpt3_token_len":3753,"char_repetition_ratio":0.21902846,"word_repetition_ratio":0.10693739,"special_character_ratio":0.20673601,"punctuation_ratio":0.07144993,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98804617,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-11T16:46:31Z\",\"WARC-Record-ID\":\"<urn:uuid:8c12fadf-b12d-4090-8c42-271aa3f11d34>\",\"Content-Length\":\"41337\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fbebbc04-7de1-47d7-9aed-8fe929829bca>\",\"WARC-Concurrent-To\":\"<urn:uuid:14ba1392-894c-4362-9f32-a5e1d507f28f>\",\"WARC-IP-Address\":\"5.45.70.44\",\"WARC-Target-URI\":\"http://bonneshonneur.pw/8159592748/4702/one-tailed-two-tailed-test-difference.html\",\"WARC-Payload-Digest\":\"sha1:W4WCEK5WKV446K7NK4ESQVSDUKGF53Q5\",\"WARC-Block-Digest\":\"sha1:3HLZLXXM75X46XUXRXEPRG4WQEOCI7PL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038064520.8_warc_CC-MAIN-20210411144457-20210411174457-00021.warc.gz\"}"}
https://math.stackexchange.com/questions/3784325/can-we-apply-reidemeister-moves-to-self-crossings-of-one-component-only-of-a-tr
[ "# Can we apply Reidemeister moves to self crossings of one component only of a “trivial” link and keep the others unchanged?\n\nSuppose $$L=L_1 \\cup L_2 \\cup L_3$$ be a classical link of three components. Suppose $$L$$ is an unlink, that is $$L$$ can be splitted into three simple closed curves. Assume that $$L$$ has a diagram in 2-plane such that\n\n• There are some crossings between $$L_1$$ and $$L_2$$ And between $$L_1$$ and $$L_3$$.\n• There are some crossings between $$L_2$$ and $$L_3$$.\n• There are some self intersections of each $$L_i, i=1,2,3$$.\n\nI have two questions:\n\nQ1: Can we apply a finite sequence of Reidemeister moves to the self crossings of $$L_1$$ only so that all self crossings of $$L_1$$ are eliminated without affecting the other crossings of $$L$$. If the answer is yes, then this can be generalized to $$L_2$$ and $$L_3$$. This means we can first eliminate self crossings of $$L$$ and then we may deal with the crossings between the components. Is this possible always?\n\nQ2: Can we first apply a finite sequence of Reidemeister moves to split $$L_1$$ from the link $$L$$ without affecting the crossings which are not between $$L_1$$ and $$L_i, i=1,2,3$$. If so, then we may split the components of the link first and then deal with the self crossings of each component.\n\nI know that the answer of both of my questions is no if the link $$L$$ is not trivial link. The whitehead link with five crossings is a counterexample. How about the case of an unlink?\n\nSo, I believe the answer is no for each question. Here is not so much as a proof, but a couple candidate links for you to consider. I think it is easy to see these are indeed unlinks. But I got away with two components in each. Making similar links with 3 components should not be hard, but I leave that to you.", null, "The first link has twists in each component that cannot be removed without some type II moves or type III moves first, between the shared crossings.\n\nThe second question is harder. I think this link does it though. You cannot unlink the red, keeping the blue fixed without a type II first. If you fix the red, then you will need a few moves between red and blue to get to a type I move with the blue before you can go any further.\n\nNow, this is in now way a proof. I am not sure how you might have to go about showing these are in fact, counter-examples. Perhaps looking at the Reidemeister graph and somehow showing that every path to the trivial diagram must go though a \"bad\" point, or something. Cooking up counter-examples to conjectures like this is a good way to build intuition into how crappy diagrams really are in knot theory. But its what we got. Good luck.\n\nEdit\n\nSo upon further reflection, I am now sure that my link for Question 2 does not hold up. You can slide the blue link down the red and off of it without any blue only Reidemeister move.\n\nOne definition of the unlink is a link where each component simultaneously bounds an embedded disk and these disks are all disjoint. This allows us to pick any component $$L_1$$ and isotope it along this disk to a small unknot component which has no crossings with any other components. This lets us keep the other components fixed the whole time we are running this isotopy. But I don't see how to guarantee that the crossings of $$L_1$$ are not subjected to Reidemeister moves or not in this.\n\nQuick summary: We can fix any components of an unlink we like and isotope the rest away.\n\n• I think the answer is yes for the second question. Since each of the three components bounds an embedded disk in 3-space, we may move the closed disk of the component $L_1$ freely in 3-space so that all crossings between $L_1$ and the other components are eliminated, that is $L_1$ is splitted from $L$. In general, we may split the components first and then eliminate the self crossings of each component. Am I right? Aug 17, 2020 at 23:53\n• @user113715 This is where it gets sticky. Maybe it doesn't matter for your situation, but the isotopy we have from the disk might produce Reidemeister moves between the crossing of just $L_1$. You can definitely split the components like you say, but I can't see a guarantee that the diagram of $L_1$ alone will be unmodified after you split it. But if you only care about getting them apart, leaving the other components unchanged, you are good. Aug 18, 2020 at 13:03" ]
[ null, "https://i.stack.imgur.com/cd2kO.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90387505,"math_prob":0.9895698,"size":1306,"snap":"2023-40-2023-50","text_gpt3_token_len":358,"char_repetition_ratio":0.14823349,"word_repetition_ratio":0.06896552,"special_character_ratio":0.27182236,"punctuation_ratio":0.09737828,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99320793,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-10T22:32:57Z\",\"WARC-Record-ID\":\"<urn:uuid:426628e4-15b2-413a-adcc-827eb65a6710>\",\"Content-Length\":\"145037\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e250badf-12a7-4e84-abf8-5998543f947d>\",\"WARC-Concurrent-To\":\"<urn:uuid:dd123213-750b-4bd2-b67a-bf7b2594e6ff>\",\"WARC-IP-Address\":\"172.64.144.30\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/3784325/can-we-apply-reidemeister-moves-to-self-crossings-of-one-component-only-of-a-tr\",\"WARC-Payload-Digest\":\"sha1:IKZMG2V3VUO5EBYLQGA2LVPZYE4URU6V\",\"WARC-Block-Digest\":\"sha1:2VL3NLDDXZQY6PX5PEOWDEHDAIPMODRY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679102697.89_warc_CC-MAIN-20231210221943-20231211011943-00760.warc.gz\"}"}
http://global-sci.com/intro/article_detail/aamm/12108.html
[ "Volume 8, Issue 4\nSpectral-Collocation Method for Volterra Delay Integro-Differential Equations with Weakly Singular Kernels\n\nAdv. Appl. Math. Mech., 8 (2016), pp. 648-669.\n\nPublished online: 2018-05\n\nPreview Full PDF 3 694\nExport citation\n\nCited by\n\n• Abstract\n\nA spectral Jacobi-collocation approximation is proposed for Volterra delay integro-differential equations with weakly singular kernels. In this paper, we consider the special case that the underlying solutions of equations are sufficiently smooth. We provide a rigorous error analysis for the proposed method, which shows that both the errors of approximate solutions and the errors of approximate derivatives decay exponentially in L ∞ norm and weighted L 2 norm. Finally, two numerical examples are presented to demonstrate our error analysis.\n\n• Keywords\n\nVolterra integro-differential equations, spectral Jacobi-collocation method, pantograph delay, weakly singular kernel.\n\n65R20, 65M70, 45D05\n\n• BibTex\n• RIS\n• TXT\n@Article{AAMM-8-648, author = {}, title = {Spectral-Collocation Method for Volterra Delay Integro-Differential Equations with Weakly Singular Kernels}, journal = {Advances in Applied Mathematics and Mechanics}, year = {2018}, volume = {8}, number = {4}, pages = {648--669}, abstract = {\n\nA spectral Jacobi-collocation approximation is proposed for Volterra delay integro-differential equations with weakly singular kernels. In this paper, we consider the special case that the underlying solutions of equations are sufficiently smooth. We provide a rigorous error analysis for the proposed method, which shows that both the errors of approximate solutions and the errors of approximate derivatives decay exponentially in L ∞ norm and weighted L 2 norm. Finally, two numerical examples are presented to demonstrate our error analysis.\n\n}, issn = {2075-1354}, doi = {https://doi.org/10.4208/aamm.2015.m1088}, url = {http://global-sci.org/intro/article_detail/aamm/12108.html} }\nTY - JOUR T1 - Spectral-Collocation Method for Volterra Delay Integro-Differential Equations with Weakly Singular Kernels JO - Advances in Applied Mathematics and Mechanics VL - 4 SP - 648 EP - 669 PY - 2018 DA - 2018/05 SN - 8 DO - http://dor.org/10.4208/aamm.2015.m1088 UR - https://global-sci.org/intro/aamm/12108.html KW - Volterra integro-differential equations, spectral Jacobi-collocation method, pantograph delay, weakly singular kernel. AB -\n\nA spectral Jacobi-collocation approximation is proposed for Volterra delay integro-differential equations with weakly singular kernels. In this paper, we consider the special case that the underlying solutions of equations are sufficiently smooth. We provide a rigorous error analysis for the proposed method, which shows that both the errors of approximate solutions and the errors of approximate derivatives decay exponentially in L ∞ norm and weighted L 2 norm. Finally, two numerical examples are presented to demonstrate our error analysis.\n\nXiulian Shi & Yanping Chen. (2020). Spectral-Collocation Method for Volterra Delay Integro-Differential Equations with Weakly Singular Kernels. Advances in Applied Mathematics and Mechanics. 8 (4). 648-669. doi:10.4208/aamm.2015.m1088\nCopy to clipboard\nThe citation has been copied to your clipboard" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87683845,"math_prob":0.75821954,"size":1334,"snap":"2020-24-2020-29","text_gpt3_token_len":291,"char_repetition_ratio":0.10977443,"word_repetition_ratio":0.8087432,"special_character_ratio":0.22713643,"punctuation_ratio":0.14529915,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.962568,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-11T20:03:01Z\",\"WARC-Record-ID\":\"<urn:uuid:b18ca145-2234-4cc9-910c-20175d0d4b24>\",\"Content-Length\":\"41171\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:97ea5842-a126-4620-8310-353fb4a89da8>\",\"WARC-Concurrent-To\":\"<urn:uuid:39b48913-cfd1-46a6-a33e-6fbc52e485ba>\",\"WARC-IP-Address\":\"47.52.67.10\",\"WARC-Target-URI\":\"http://global-sci.com/intro/article_detail/aamm/12108.html\",\"WARC-Payload-Digest\":\"sha1:WRUFYU6A7R4MMG3NRYWAAMAAYAMAYO7K\",\"WARC-Block-Digest\":\"sha1:DNFMNB4FPGKRHIB7EBSY3ZJXJ6QIYE4Y\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655937797.57_warc_CC-MAIN-20200711192914-20200711222914-00202.warc.gz\"}"}
https://dsp.stackexchange.com/questions/63202/understand-diagram-of-a-process/63203
[ "# Understand diagram of a process\n\nI've found this diagram in a slide, but i have no backround to properly understand it. Could you explain to me, in simple terms, how this process behaves and what's the purpose of the blocks $$z^{-1}$$ ?", null, "That's a simple process, where $$y(k)=u(k-3)$$, as the $$z^{-1}$$ blocks just perform a delay by one sample. $$x_1(k)$$, $$x_2(k)$$ and $$x_3(k)$$ are just arbitrary names. In other words: output will be exactly like input, only delayed by three samples." ]
[ null, "https://i.stack.imgur.com/c2jaf.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92659235,"math_prob":0.99935395,"size":446,"snap":"2021-43-2021-49","text_gpt3_token_len":123,"char_repetition_ratio":0.09276018,"word_repetition_ratio":0.0,"special_character_ratio":0.29596412,"punctuation_ratio":0.13402061,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997334,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-03T05:40:44Z\",\"WARC-Record-ID\":\"<urn:uuid:6fc2e42c-26ca-4003-8db1-959c4e69eec4>\",\"Content-Length\":\"134874\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:47e387d0-ed5e-4525-916b-b66b75115372>\",\"WARC-Concurrent-To\":\"<urn:uuid:d947b006-f25d-495b-9a9d-0f0aa78a1d62>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://dsp.stackexchange.com/questions/63202/understand-diagram-of-a-process/63203\",\"WARC-Payload-Digest\":\"sha1:TZSVYLQTXDWXGJJQAXTFET47KR5FUIQY\",\"WARC-Block-Digest\":\"sha1:PAXOBHR7YJUWB2Y6KWSPAGG34HVOKKBW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362589.37_warc_CC-MAIN-20211203030522-20211203060522-00439.warc.gz\"}"}
https://lkml.iu.edu/hypermail/linux/kernel/2009.2/01136.html
[ "# [PATCH v5 3/3] arm: dts: add new device nodes to NPCM750 device tree\n\nFrom: Tomer Maimon\nDate: Wed Sep 16 2020 - 17:02:55 EST\n\nAdd the following new device nodes to NPCM750 and\nNPCM750 evolution board device tree:\n\n- NPCM7xx Pin controller and GPIO\n- NPCM7xx PWM and FAN.\n- NPCM7xx EHCI USB.\n- NPCM7xx KCS.\n- NPCM Reset.\n- NPCM Peripheral SPI.\n- NPCM FIU SPI.\n- NPCM HWRNG.\n- NPCM I2C.\n- STMicro STMMAC.\n\nSigned-off-by: Tomer Maimon <tmaimon77@xxxxxxxxx>\n---\narch/arm/boot/dts/nuvoton-common-npcm7xx.dtsi | 953 +++++++++++++++++-\narch/arm/boot/dts/nuvoton-npcm750-evb.dts | 404 +++++++-\n.../boot/dts/nuvoton-npcm750-pincfg-evb.dtsi | 157 +++\narch/arm/boot/dts/nuvoton-npcm750.dtsi | 18 +\n4 files changed, 1508 insertions(+), 24 deletions(-)\ncreate mode 100644 arch/arm/boot/dts/nuvoton-npcm750-pincfg-evb.dtsi\n\ndiff --git a/arch/arm/boot/dts/nuvoton-common-npcm7xx.dtsi b/arch/arm/boot/dts/nuvoton-common-npcm7xx.dtsi\nindex 72e364054e72..7d4be1ded470 100644\n--- a/arch/arm/boot/dts/nuvoton-common-npcm7xx.dtsi\n+++ b/arch/arm/boot/dts/nuvoton-common-npcm7xx.dtsi\n@@ -4,12 +4,18 @@\n\n#include <dt-bindings/interrupt-controller/arm-gic.h>\n#include <dt-bindings/clock/nuvoton,npcm7xx-clock.h>\n+#include <dt-bindings/reset/nuvoton,npcm7xx-reset.h>\n\n/ {\n#size-cells = <1>;\ninterrupt-parent = <&gic>;\n\n+ memory {\n+ device_type = \"memory\";\n+ reg = <0x0 0x40000000>;\n+ };\n+\n/* external reference clock */\nclk_refclk: clk_refclk {\ncompatible = \"fixed-clock\";\n@@ -64,12 +70,6 @@\ninterrupt-parent = <&gic>;\nranges = <0x0 0xf0000000 0x00900000>;\n\n- gcr: gcr@800000 {\n- compatible = \"nuvoton,npcm750-gcr\", \"syscon\",\n- \"simple-mfd\";\n- reg = <0x800000 0x1000>;\n- };\n-\nscu: scu@3fe000 {\ncompatible = \"arm,cortex-a9-scu\";\nreg = <0x3fe000 0x1000>;\n@@ -92,6 +92,16 @@\nreg = <0x3ff000 0x1000>,\n<0x3fe100 0x100>;\n};\n+\n+ gcr: gcr@800000 {\n+ compatible = \"nuvoton,npcm750-gcr\", \"syscon\", \"simple-mfd\";\n+ reg = <0x800000 0x1000>;\n+ };\n+\n+ rst: rst@801000 {\n+ compatible = \"nuvoton,npcm750-rst\", \"syscon\", \"simple-mfd\";\n+ reg = <0x801000 0x6C>;\n+ };\n};\n\nahb {\n@@ -101,6 +111,12 @@\ninterrupt-parent = <&gic>;\nranges;\n\n+ rstc: rstc@f0801000 {\n+ compatible = \"nuvoton,npcm750-reset\";\n+ reg = <0xf0801000 0x70>;\n+ #reset-cells = <2>;\n+ };\n+\nclk: clock-controller@f0801000 {\ncompatible = \"nuvoton,npcm750-clk\", \"syscon\";\n#clock-cells = <1>;\n@@ -110,6 +126,63 @@\nclocks = <&clk_refclk>, <&clk_sysbypck>, <&clk_mcbypck>;\n};\n\n+ gmac0: eth@f0802000 {\n+ device_type = \"network\";\n+ compatible = \"snps,dwmac\";\n+ reg = <0xf0802000 0x2000>;\n+ interrupts = <GIC_SPI 14 IRQ_TYPE_LEVEL_HIGH>;\n+ interrupt-names = \"macirq\";\n+ ethernet = <0>;\n+ clocks = <&clk_rg1refck>, <&clk NPCM7XX_CLK_AHB>;\n+ clock-names = \"stmmaceth\", \"clk_gmac\";\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&rg1_pins\n+ &rg1mdio_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ ehci1:usb@f0806000 {\n+ compatible = \"nuvoton,npcm750-ehci\";\n+ reg = <0xf0806000 0x1000>;\n+ interrupts = <GIC_SPI 61 IRQ_TYPE_LEVEL_HIGH>;\n+ status = \"disabled\";\n+ };\n+\n+ fiu0: spi@fb000000 {\n+ compatible = \"nuvoton,npcm750-fiu\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ reg = <0xfb000000 0x1000>, <0x80000000 0x10000000>;\n+ reg-names = \"control\", \"memory\";\n+ clocks = <&clk NPCM7XX_CLK_SPI0>;\n+ clock-names = \"clk_spi0\";\n+ status = \"disabled\";\n+ };\n+\n+ fiu3: spi@c0000000 {\n+ compatible = \"nuvoton,npcm750-fiu\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ reg = <0xc0000000 0x1000>, <0xA0000000 0x20000000>;\n+ reg-names = \"control\", \"memory\";\n+ clocks = <&clk NPCM7XX_CLK_SPI3>;\n+ clock-names = \"clk_spi3\";\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&spi3_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ fiux: spi@fb001000 {\n+ compatible = \"nuvoton,npcm750-fiu\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ reg = <0xfb001000 0x1000>, <0xf8000000 0x2000000>;\n+ reg-names = \"control\", \"memory\";\n+ clocks = <&clk NPCM7XX_CLK_SPIX>;\n+ clock-names = \"clk_spix\";\n+ status = \"disabled\";\n+ };\n+\napb {\n#size-cells = <1>;\n@@ -117,6 +190,69 @@\ninterrupt-parent = <&gic>;\nranges = <0x0 0xf0000000 0x00300000>;\n\n+ lpc_kcs: lpc_kcs@7000 {\n+ compatible = \"nuvoton,npcm750-lpc-kcs\",\n+ \"simple-mfd\", \"syscon\";\n+ reg = <0x7000 0x40>;\n+ reg-io-width = <1>;\n+\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ ranges = <0x0 0x7000 0x40>;\n+\n+ kcs1: kcs1@0 {\n+ compatible = \"nuvoton,npcm750-kcs-bmc\";\n+ reg = <0x0 0x40>;\n+ interrupts = <GIC_SPI 9 IRQ_TYPE_LEVEL_HIGH>;\n+ kcs_chan = <1>;\n+ status = \"disabled\";\n+ };\n+\n+ kcs2: kcs2@0 {\n+ compatible = \"nuvoton,npcm750-kcs-bmc\";\n+ reg = <0x0 0x40>;\n+ interrupts = <GIC_SPI 9 IRQ_TYPE_LEVEL_HIGH>;\n+ kcs_chan = <2>;\n+ status = \"disabled\";\n+ };\n+\n+ kcs3: kcs3@0 {\n+ compatible = \"nuvoton,npcm750-kcs-bmc\";\n+ reg = <0x0 0x40>;\n+ interrupts = <GIC_SPI 9 IRQ_TYPE_LEVEL_HIGH>;\n+ kcs_chan = <3>;\n+ status = \"disabled\";\n+ };\n+ };\n+\n+ spi0: spi@200000 {\n+ compatible = \"nuvoton,npcm750-pspi\";\n+ reg = <0x200000 0x1000>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&pspi1_pins>;\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ interrupts = <GIC_SPI 31 IRQ_TYPE_LEVEL_HIGH>;\n+ clocks = <&clk NPCM7XX_CLK_APB5>;\n+ clock-names = \"clk_apb5\";\n+ resets = <&rstc NPCM7XX_RESET_IPSRST2 NPCM7XX_RESET_PSPI1>;\n+ status = \"disabled\";\n+ };\n+\n+ spi1: spi@201000 {\n+ compatible = \"nuvoton,npcm750-pspi\";\n+ reg = <0x201000 0x1000>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&pspi2_pins>;\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ interrupts = <GIC_SPI 28 IRQ_TYPE_LEVEL_HIGH>;\n+ clocks = <&clk NPCM7XX_CLK_APB5>;\n+ clock-names = \"clk_apb5\";\n+ resets = <&rstc NPCM7XX_RESET_IPSRST2 NPCM7XX_RESET_PSPI2>;\n+ status = \"disabled\";\n+ };\n+\ntimer0: timer@8000 {\ncompatible = \"nuvoton,npcm750-timer\";\ninterrupts = <GIC_SPI 32 IRQ_TYPE_LEVEL_HIGH>;\n@@ -183,6 +319,811 @@\nreg-shift = <2>;\nstatus = \"disabled\";\n};\n+\n+ rng: rng@b000 {\n+ compatible = \"nuvoton,npcm750-rng\";\n+ reg = <0xb000 0x8>;\n+ status = \"disabled\";\n+ };\n+\n+ compatible = \"nuvoton,npcm750-adc\";\n+ reg = <0xc000 0x8>;\n+ interrupts = <GIC_SPI 0 IRQ_TYPE_LEVEL_HIGH>;\n+ clocks = <&clk NPCM7XX_CLK_ADC>;\n+ resets = <&rstc NPCM7XX_RESET_IPSRST1 NPCM7XX_RESET_ADC>;\n+ status = \"disabled\";\n+ };\n+\n+ pwm_fan:pwm-fan-controller@103000 {\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ compatible = \"nuvoton,npcm750-pwm-fan\";\n+ reg = <0x103000 0x2000>, <0x180000 0x8000>;\n+ reg-names = \"pwm\", \"fan\";\n+ clocks = <&clk NPCM7XX_CLK_APB3>,\n+ <&clk NPCM7XX_CLK_APB4>;\n+ clock-names = \"pwm\",\"fan\";\n+ interrupts = <GIC_SPI 96 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 97 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 98 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 99 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 100 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 101 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 102 IRQ_TYPE_LEVEL_HIGH>,\n+ <GIC_SPI 103 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&pwm0_pins &pwm1_pins\n+ &pwm2_pins &pwm3_pins\n+ &pwm4_pins &pwm5_pins\n+ &pwm6_pins &pwm7_pins\n+ &fanin0_pins &fanin1_pins\n+ &fanin2_pins &fanin3_pins\n+ &fanin4_pins &fanin5_pins\n+ &fanin6_pins &fanin7_pins\n+ &fanin8_pins &fanin9_pins\n+ &fanin10_pins &fanin11_pins\n+ &fanin12_pins &fanin13_pins\n+ &fanin14_pins &fanin15_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c0: i2c@80000 {\n+ reg = <0x80000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 64 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb0_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c1: i2c@81000 {\n+ reg = <0x81000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 65 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb1_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c2: i2c@82000 {\n+ reg = <0x82000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 66 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb2_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c3: i2c@83000 {\n+ reg = <0x83000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 67 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb3_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c4: i2c@84000 {\n+ reg = <0x84000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 68 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb4_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c5: i2c@85000 {\n+ reg = <0x85000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 69 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb5_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c6: i2c@86000 {\n+ reg = <0x86000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 70 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb6_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c7: i2c@87000 {\n+ reg = <0x87000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 71 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb7_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c8: i2c@88000 {\n+ reg = <0x88000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 72 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb8_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c9: i2c@89000 {\n+ reg = <0x89000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 73 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb9_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c10: i2c@8a000 {\n+ reg = <0x8a000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 74 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb10_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c11: i2c@8b000 {\n+ reg = <0x8b000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 75 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb11_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c12: i2c@8c000 {\n+ reg = <0x8c000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 76 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb12_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c13: i2c@8d000 {\n+ reg = <0x8d000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 77 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb13_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c14: i2c@8e000 {\n+ reg = <0x8e000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 78 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb14_pins>;\n+ status = \"disabled\";\n+ };\n+\n+ i2c15: i2c@8f000 {\n+ reg = <0x8f000 0x1000>;\n+ compatible = \"nuvoton,npcm750-i2c\";\n+ #address-cells = <1>;\n+ #size-cells = <0>;\n+ clocks = <&clk NPCM7XX_CLK_APB2>;\n+ interrupts = <GIC_SPI 79 IRQ_TYPE_LEVEL_HIGH>;\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&smb15_pins>;\n+ status = \"disabled\";\n+ };\n+ };\n+ };\n+\n+ pinctrl: pinctrl@f0800000 {\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ compatible = \"nuvoton,npcm750-pinctrl\", \"syscon\", \"simple-mfd\";\n+ ranges = <0 0xf0010000 0x8000>;\n+ status = \"okay\";\n+ gpio0: gpio@f0010000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x0 0x80>;\n+ interrupts = <GIC_SPI 116 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 0 32>;\n+ };\n+ gpio1: gpio@f0011000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x1000 0x80>;\n+ interrupts = <GIC_SPI 117 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 32 32>;\n+ };\n+ gpio2: gpio@f0012000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x2000 0x80>;\n+ interrupts = <GIC_SPI 118 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 64 32>;\n+ };\n+ gpio3: gpio@f0013000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x3000 0x80>;\n+ interrupts = <GIC_SPI 119 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 96 32>;\n+ };\n+ gpio4: gpio@f0014000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x4000 0x80>;\n+ interrupts = <GIC_SPI 120 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 128 32>;\n+ };\n+ gpio5: gpio@f0015000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x5000 0x80>;\n+ interrupts = <GIC_SPI 121 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 160 32>;\n+ };\n+ gpio6: gpio@f0016000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x6000 0x80>;\n+ interrupts = <GIC_SPI 122 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 192 32>;\n+ };\n+ gpio7: gpio@f0017000 {\n+ gpio-controller;\n+ #gpio-cells = <2>;\n+ reg = <0x7000 0x80>;\n+ interrupts = <GIC_SPI 123 IRQ_TYPE_LEVEL_HIGH>;\n+ gpio-ranges = <&pinctrl 0 224 32>;\n+ };\n+\n+ iox1_pins: iox1-pins {\n+ groups = \"iox1\";\n+ function = \"iox1\";\n+ };\n+ iox2_pins: iox2-pins {\n+ groups = \"iox2\";\n+ function = \"iox2\";\n+ };\n+ smb1d_pins: smb1d-pins {\n+ groups = \"smb1d\";\n+ function = \"smb1d\";\n+ };\n+ smb2d_pins: smb2d-pins {\n+ groups = \"smb2d\";\n+ function = \"smb2d\";\n+ };\n+ lkgpo1_pins: lkgpo1-pins {\n+ groups = \"lkgpo1\";\n+ function = \"lkgpo1\";\n+ };\n+ lkgpo2_pins: lkgpo2-pins {\n+ groups = \"lkgpo2\";\n+ function = \"lkgpo2\";\n+ };\n+ ioxh_pins: ioxh-pins {\n+ groups = \"ioxh\";\n+ function = \"ioxh\";\n+ };\n+ gspi_pins: gspi-pins {\n+ groups = \"gspi\";\n+ function = \"gspi\";\n+ };\n+ smb5b_pins: smb5b-pins {\n+ groups = \"smb5b\";\n+ function = \"smb5b\";\n+ };\n+ smb5c_pins: smb5c-pins {\n+ groups = \"smb5c\";\n+ function = \"smb5c\";\n+ };\n+ lkgpo0_pins: lkgpo0-pins {\n+ groups = \"lkgpo0\";\n+ function = \"lkgpo0\";\n+ };\n+ pspi2_pins: pspi2-pins {\n+ groups = \"pspi2\";\n+ function = \"pspi2\";\n+ };\n+ smb4den_pins: smb4den-pins {\n+ groups = \"smb4den\";\n+ function = \"smb4den\";\n+ };\n+ smb4b_pins: smb4b-pins {\n+ groups = \"smb4b\";\n+ function = \"smb4b\";\n+ };\n+ smb4c_pins: smb4c-pins {\n+ groups = \"smb4c\";\n+ function = \"smb4c\";\n+ };\n+ smb15_pins: smb15-pins {\n+ groups = \"smb15\";\n+ function = \"smb15\";\n+ };\n+ smb4d_pins: smb4d-pins {\n+ groups = \"smb4d\";\n+ function = \"smb4d\";\n+ };\n+ smb14_pins: smb14-pins {\n+ groups = \"smb14\";\n+ function = \"smb14\";\n+ };\n+ smb5_pins: smb5-pins {\n+ groups = \"smb5\";\n+ function = \"smb5\";\n+ };\n+ smb4_pins: smb4-pins {\n+ groups = \"smb4\";\n+ function = \"smb4\";\n+ };\n+ smb3_pins: smb3-pins {\n+ groups = \"smb3\";\n+ function = \"smb3\";\n+ };\n+ spi0cs1_pins: spi0cs1-pins {\n+ groups = \"spi0cs1\";\n+ function = \"spi0cs1\";\n+ };\n+ spi0cs2_pins: spi0cs2-pins {\n+ groups = \"spi0cs2\";\n+ function = \"spi0cs2\";\n+ };\n+ spi0cs3_pins: spi0cs3-pins {\n+ groups = \"spi0cs3\";\n+ function = \"spi0cs3\";\n+ };\n+ smb3c_pins: smb3c-pins {\n+ groups = \"smb3c\";\n+ function = \"smb3c\";\n+ };\n+ smb3b_pins: smb3b-pins {\n+ groups = \"smb3b\";\n+ function = \"smb3b\";\n+ };\n+ bmcuart0a_pins: bmcuart0a-pins {\n+ groups = \"bmcuart0a\";\n+ function = \"bmcuart0a\";\n+ };\n+ uart1_pins: uart1-pins {\n+ groups = \"uart1\";\n+ function = \"uart1\";\n+ };\n+ jtag2_pins: jtag2-pins {\n+ groups = \"jtag2\";\n+ function = \"jtag2\";\n+ };\n+ bmcuart1_pins: bmcuart1-pins {\n+ groups = \"bmcuart1\";\n+ function = \"bmcuart1\";\n+ };\n+ uart2_pins: uart2-pins {\n+ groups = \"uart2\";\n+ function = \"uart2\";\n+ };\n+ bmcuart0b_pins: bmcuart0b-pins {\n+ groups = \"bmcuart0b\";\n+ function = \"bmcuart0b\";\n+ };\n+ r1err_pins: r1err-pins {\n+ groups = \"r1err\";\n+ function = \"r1err\";\n+ };\n+ r1md_pins: r1md-pins {\n+ groups = \"r1md\";\n+ function = \"r1md\";\n+ };\n+ smb3d_pins: smb3d-pins {\n+ groups = \"smb3d\";\n+ function = \"smb3d\";\n+ };\n+ fanin0_pins: fanin0-pins {\n+ groups = \"fanin0\";\n+ function = \"fanin0\";\n+ };\n+ fanin1_pins: fanin1-pins {\n+ groups = \"fanin1\";\n+ function = \"fanin1\";\n+ };\n+ fanin2_pins: fanin2-pins {\n+ groups = \"fanin2\";\n+ function = \"fanin2\";\n+ };\n+ fanin3_pins: fanin3-pins {\n+ groups = \"fanin3\";\n+ function = \"fanin3\";\n+ };\n+ fanin4_pins: fanin4-pins {\n+ groups = \"fanin4\";\n+ function = \"fanin4\";\n+ };\n+ fanin5_pins: fanin5-pins {\n+ groups = \"fanin5\";\n+ function = \"fanin5\";\n+ };\n+ fanin6_pins: fanin6-pins {\n+ groups = \"fanin6\";\n+ function = \"fanin6\";\n+ };\n+ fanin7_pins: fanin7-pins {\n+ groups = \"fanin7\";\n+ function = \"fanin7\";\n+ };\n+ fanin8_pins: fanin8-pins {\n+ groups = \"fanin8\";\n+ function = \"fanin8\";\n+ };\n+ fanin9_pins: fanin9-pins {\n+ groups = \"fanin9\";\n+ function = \"fanin9\";\n+ };\n+ fanin10_pins: fanin10-pins {\n+ groups = \"fanin10\";\n+ function = \"fanin10\";\n+ };\n+ fanin11_pins: fanin11-pins {\n+ groups = \"fanin11\";\n+ function = \"fanin11\";\n+ };\n+ fanin12_pins: fanin12-pins {\n+ groups = \"fanin12\";\n+ function = \"fanin12\";\n+ };\n+ fanin13_pins: fanin13-pins {\n+ groups = \"fanin13\";\n+ function = \"fanin13\";\n+ };\n+ fanin14_pins: fanin14-pins {\n+ groups = \"fanin14\";\n+ function = \"fanin14\";\n+ };\n+ fanin15_pins: fanin15-pins {\n+ groups = \"fanin15\";\n+ function = \"fanin15\";\n+ };\n+ pwm0_pins: pwm0-pins {\n+ groups = \"pwm0\";\n+ function = \"pwm0\";\n+ };\n+ pwm1_pins: pwm1-pins {\n+ groups = \"pwm1\";\n+ function = \"pwm1\";\n+ };\n+ pwm2_pins: pwm2-pins {\n+ groups = \"pwm2\";\n+ function = \"pwm2\";\n+ };\n+ pwm3_pins: pwm3-pins {\n+ groups = \"pwm3\";\n+ function = \"pwm3\";\n+ };\n+ r2_pins: r2-pins {\n+ groups = \"r2\";\n+ function = \"r2\";\n+ };\n+ r2err_pins: r2err-pins {\n+ groups = \"r2err\";\n+ function = \"r2err\";\n+ };\n+ r2md_pins: r2md-pins {\n+ groups = \"r2md\";\n+ function = \"r2md\";\n+ };\n+ ga20kbc_pins: ga20kbc-pins {\n+ groups = \"ga20kbc\";\n+ function = \"ga20kbc\";\n+ };\n+ smb5d_pins: smb5d-pins {\n+ groups = \"smb5d\";\n+ function = \"smb5d\";\n+ };\n+ lpc_pins: lpc-pins {\n+ groups = \"lpc\";\n+ function = \"lpc\";\n+ };\n+ espi_pins: espi-pins {\n+ groups = \"espi\";\n+ function = \"espi\";\n+ };\n+ rg1_pins: rg1-pins {\n+ groups = \"rg1\";\n+ function = \"rg1\";\n+ };\n+ rg1mdio_pins: rg1mdio-pins {\n+ groups = \"rg1mdio\";\n+ function = \"rg1mdio\";\n+ };\n+ rg2_pins: rg2-pins {\n+ groups = \"rg2\";\n+ function = \"rg2\";\n+ };\n+ ddr_pins: ddr-pins {\n+ groups = \"ddr\";\n+ function = \"ddr\";\n+ };\n+ smb0_pins: smb0-pins {\n+ groups = \"smb0\";\n+ function = \"smb0\";\n+ };\n+ smb1_pins: smb1-pins {\n+ groups = \"smb1\";\n+ function = \"smb1\";\n+ };\n+ smb2_pins: smb2-pins {\n+ groups = \"smb2\";\n+ function = \"smb2\";\n+ };\n+ smb2c_pins: smb2c-pins {\n+ groups = \"smb2c\";\n+ function = \"smb2c\";\n+ };\n+ smb2b_pins: smb2b-pins {\n+ groups = \"smb2b\";\n+ function = \"smb2b\";\n+ };\n+ smb1c_pins: smb1c-pins {\n+ groups = \"smb1c\";\n+ function = \"smb1c\";\n+ };\n+ smb1b_pins: smb1b-pins {\n+ groups = \"smb1b\";\n+ function = \"smb1b\";\n+ };\n+ smb8_pins: smb8-pins {\n+ groups = \"smb8\";\n+ function = \"smb8\";\n+ };\n+ smb9_pins: smb9-pins {\n+ groups = \"smb9\";\n+ function = \"smb9\";\n+ };\n+ smb10_pins: smb10-pins {\n+ groups = \"smb10\";\n+ function = \"smb10\";\n+ };\n+ smb11_pins: smb11-pins {\n+ groups = \"smb11\";\n+ function = \"smb11\";\n+ };\n+ sd1_pins: sd1-pins {\n+ groups = \"sd1\";\n+ function = \"sd1\";\n+ };\n+ sd1pwr_pins: sd1pwr-pins {\n+ groups = \"sd1pwr\";\n+ function = \"sd1pwr\";\n+ };\n+ pwm4_pins: pwm4-pins {\n+ groups = \"pwm4\";\n+ function = \"pwm4\";\n+ };\n+ pwm5_pins: pwm5-pins {\n+ groups = \"pwm5\";\n+ function = \"pwm5\";\n+ };\n+ pwm6_pins: pwm6-pins {\n+ groups = \"pwm6\";\n+ function = \"pwm6\";\n+ };\n+ pwm7_pins: pwm7-pins {\n+ groups = \"pwm7\";\n+ function = \"pwm7\";\n+ };\n+ mmc8_pins: mmc8-pins {\n+ groups = \"mmc8\";\n+ function = \"mmc8\";\n+ };\n+ mmc_pins: mmc-pins {\n+ groups = \"mmc\";\n+ function = \"mmc\";\n+ };\n+ mmcwp_pins: mmcwp-pins {\n+ groups = \"mmcwp\";\n+ function = \"mmcwp\";\n+ };\n+ mmccd_pins: mmccd-pins {\n+ groups = \"mmccd\";\n+ function = \"mmccd\";\n+ };\n+ mmcrst_pins: mmcrst-pins {\n+ groups = \"mmcrst\";\n+ function = \"mmcrst\";\n+ };\n+ clkout_pins: clkout-pins {\n+ groups = \"clkout\";\n+ function = \"clkout\";\n+ };\n+ serirq_pins: serirq-pins {\n+ groups = \"serirq\";\n+ function = \"serirq\";\n+ };\n+ lpcclk_pins: lpcclk-pins {\n+ groups = \"lpcclk\";\n+ function = \"lpcclk\";\n+ };\n+ scipme_pins: scipme-pins {\n+ groups = \"scipme\";\n+ function = \"scipme\";\n+ };\n+ sci_pins: sci-pins {\n+ groups = \"sci\";\n+ function = \"sci\";\n+ };\n+ smb6_pins: smb6-pins {\n+ groups = \"smb6\";\n+ function = \"smb6\";\n+ };\n+ smb7_pins: smb7-pins {\n+ groups = \"smb7\";\n+ function = \"smb7\";\n+ };\n+ pspi1_pins: pspi1-pins {\n+ groups = \"pspi1\";\n+ function = \"pspi1\";\n+ };\n+ faninx_pins: faninx-pins {\n+ groups = \"faninx\";\n+ function = \"faninx\";\n+ };\n+ r1_pins: r1-pins {\n+ groups = \"r1\";\n+ function = \"r1\";\n+ };\n+ spi3_pins: spi3-pins {\n+ groups = \"spi3\";\n+ function = \"spi3\";\n+ };\n+ spi3cs1_pins: spi3cs1-pins {\n+ groups = \"spi3cs1\";\n+ function = \"spi3cs1\";\n+ };\n+ groups = \"spi3quad\";\n+ function = \"spi3quad\";\n+ };\n+ spi3cs2_pins: spi3cs2-pins {\n+ groups = \"spi3cs2\";\n+ function = \"spi3cs2\";\n+ };\n+ spi3cs3_pins: spi3cs3-pins {\n+ groups = \"spi3cs3\";\n+ function = \"spi3cs3\";\n+ };\n+ nprd_smi_pins: nprd-smi-pins {\n+ groups = \"nprd_smi\";\n+ function = \"nprd_smi\";\n+ };\n+ smb0b_pins: smb0b-pins {\n+ groups = \"smb0b\";\n+ function = \"smb0b\";\n+ };\n+ smb0c_pins: smb0c-pins {\n+ groups = \"smb0c\";\n+ function = \"smb0c\";\n+ };\n+ smb0den_pins: smb0den-pins {\n+ groups = \"smb0den\";\n+ function = \"smb0den\";\n+ };\n+ smb0d_pins: smb0d-pins {\n+ groups = \"smb0d\";\n+ function = \"smb0d\";\n+ };\n+ ddc_pins: ddc-pins {\n+ groups = \"ddc\";\n+ function = \"ddc\";\n+ };\n+ rg2mdio_pins: rg2mdio-pins {\n+ groups = \"rg2mdio\";\n+ function = \"rg2mdio\";\n+ };\n+ wdog1_pins: wdog1-pins {\n+ groups = \"wdog1\";\n+ function = \"wdog1\";\n+ };\n+ wdog2_pins: wdog2-pins {\n+ groups = \"wdog2\";\n+ function = \"wdog2\";\n+ };\n+ smb12_pins: smb12-pins {\n+ groups = \"smb12\";\n+ function = \"smb12\";\n+ };\n+ smb13_pins: smb13-pins {\n+ groups = \"smb13\";\n+ function = \"smb13\";\n+ };\n+ spix_pins: spix-pins {\n+ groups = \"spix\";\n+ function = \"spix\";\n+ };\n+ spixcs1_pins: spixcs1-pins {\n+ groups = \"spixcs1\";\n+ function = \"spixcs1\";\n+ };\n+ clkreq_pins: clkreq-pins {\n+ groups = \"clkreq\";\n+ function = \"clkreq\";\n+ };\n+ hgpio0_pins: hgpio0-pins {\n+ groups = \"hgpio0\";\n+ function = \"hgpio0\";\n+ };\n+ hgpio1_pins: hgpio1-pins {\n+ groups = \"hgpio1\";\n+ function = \"hgpio1\";\n+ };\n+ hgpio2_pins: hgpio2-pins {\n+ groups = \"hgpio2\";\n+ function = \"hgpio2\";\n+ };\n+ hgpio3_pins: hgpio3-pins {\n+ groups = \"hgpio3\";\n+ function = \"hgpio3\";\n+ };\n+ hgpio4_pins: hgpio4-pins {\n+ groups = \"hgpio4\";\n+ function = \"hgpio4\";\n+ };\n+ hgpio5_pins: hgpio5-pins {\n+ groups = \"hgpio5\";\n+ function = \"hgpio5\";\n+ };\n+ hgpio6_pins: hgpio6-pins {\n+ groups = \"hgpio6\";\n+ function = \"hgpio6\";\n+ };\n+ hgpio7_pins: hgpio7-pins {\n+ groups = \"hgpio7\";\n+ function = \"hgpio7\";\n};\n};\n};\ndiff --git a/arch/arm/boot/dts/nuvoton-npcm750-evb.dts b/arch/arm/boot/dts/nuvoton-npcm750-evb.dts\nindex 15f744f1beea..0af79573ab28 100644\n--- a/arch/arm/boot/dts/nuvoton-npcm750-evb.dts\n+++ b/arch/arm/boot/dts/nuvoton-npcm750-evb.dts\n@@ -4,36 +4,404 @@\n\n/dts-v1/;\n#include \"nuvoton-npcm750.dtsi\"\n+#include \"dt-bindings/gpio/gpio.h\"\n+#include \"nuvoton-npcm750-pincfg-evb.dtsi\"\n\n/ {\nmodel = \"Nuvoton npcm750 Development Board (Device Tree)\";\ncompatible = \"nuvoton,npcm750\";\n\n+ aliases {\n+ ethernet2 = &gmac0;\n+ ethernet3 = &gmac1;\n+ serial0 = &serial0;\n+ serial1 = &serial1;\n+ serial2 = &serial2;\n+ serial3 = &serial3;\n+ i2c0 = &i2c0;\n+ i2c1 = &i2c1;\n+ i2c2 = &i2c2;\n+ i2c3 = &i2c3;\n+ i2c4 = &i2c4;\n+ i2c5 = &i2c5;\n+ i2c6 = &i2c6;\n+ i2c7 = &i2c7;\n+ i2c8 = &i2c8;\n+ i2c9 = &i2c9;\n+ i2c10 = &i2c10;\n+ i2c11 = &i2c11;\n+ i2c12 = &i2c12;\n+ i2c13 = &i2c13;\n+ i2c14 = &i2c14;\n+ i2c15 = &i2c15;\n+ spi0 = &spi0;\n+ spi1 = &spi1;\n+ fiu0 = &fiu0;\n+ fiu1 = &fiu3;\n+ fiu2 = &fiux;\n+ };\n+\nchosen {\nstdout-path = &serial3;\n};\n\n- memory {\n- reg = <0 0x40000000>;\n- };\n-};\n+ ahb {\n+ gmac0: eth@f0802000 {\n+ phy-mode = \"rgmii-id\";\n+ status = \"okay\";\n+ };\n\n-&watchdog1 {\n- status = \"okay\";\n-};\n+ gmac1: eth@f0804000 {\n+ phy-mode = \"rgmii-id\";\n+ status = \"okay\";\n+ };\n\n-&serial0 {\n- status = \"okay\";\n-};\n+ ehci1: usb@f0806000 {\n+ status = \"okay\";\n+ };\n\n-&serial1 {\n- status = \"okay\";\n-};\n+ fiu0: spi@fb000000 {\n+ status = \"okay\";\n+ spi-nor@0 {\n+ compatible = \"jedec,spi-nor\";\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ spi-rx-bus-width = <2>;\n+ reg = <0>;\n+ spi-max-frequency = <5000000>;\n+ partitions@80000000 {\n+ compatible = \"fixed-partitions\";\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ bbuboot1@0 {\n+ label = \"bb-uboot-1\";\n+ reg = <0x0000000 0x80000>;\n+ };\n+ bbuboot2@80000 {\n+ label = \"bb-uboot-2\";\n+ reg = <0x0080000 0x80000>;\n+ };\n+ envparam@100000 {\n+ label = \"env-param\";\n+ reg = <0x0100000 0x40000>;\n+ };\n+ spare@140000 {\n+ label = \"spare\";\n+ reg = <0x0140000 0xC0000>;\n+ };\n+ kernel@200000 {\n+ label = \"kernel\";\n+ reg = <0x0200000 0x400000>;\n+ };\n+ rootfs@600000 {\n+ label = \"rootfs\";\n+ reg = <0x0600000 0x700000>;\n+ };\n+ spare1@D00000 {\n+ label = \"spare1\";\n+ reg = <0x0D00000 0x200000>;\n+ };\n+ spare2@0F00000 {\n+ label = \"spare2\";\n+ reg = <0x0F00000 0x200000>;\n+ };\n+ spare3@1100000 {\n+ label = \"spare3\";\n+ reg = <0x1100000 0x200000>;\n+ };\n+ spare4@1300000 {\n+ label = \"spare4\";\n+ reg = <0x1300000 0x0>;\n+ };\n+ };\n+ };\n+ };\n\n-&serial2 {\n- status = \"okay\";\n-};\n+ fiu3: spi@c0000000 {\n+ pinctrl-0 = <&spi3_pins>, <&spi3quad_pins>;\n+ status = \"okay\";\n+ spi-nor@0 {\n+ compatible = \"jedec,spi-nor\";\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ spi-rx-bus-width = <2>;\n+ reg = <0>;\n+ spi-max-frequency = <5000000>;\n+ partitions@A0000000 {\n+ compatible = \"fixed-partitions\";\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ system1@0 {\n+ label = \"spi3-system1\";\n+ reg = <0x0 0x0>;\n+ };\n+ };\n+ };\n+ };\n+\n+ fiux: spi@fb001000 {\n+ spix-mode;\n+ };\n+\n+ apb {\n+\n+ watchdog1: watchdog@901C {\n+ status = \"okay\";\n+ };\n+\n+ rng: rng@b000 {\n+ status = \"okay\";\n+ };\n+\n+ serial0: serial@1000 {\n+ status = \"okay\";\n+ };\n+\n+ serial1: serial@2000 {\n+ status = \"okay\";\n+ };\n+\n+ serial2: serial@3000 {\n+ status = \"okay\";\n+ };\n+\n+ serial3: serial@4000 {\n+ status = \"okay\";\n+ };\n+\n+ status = \"okay\";\n+ };\n+\n+ otp:otp@189000 {\n+ status = \"okay\";\n+ };\n+\n+ lpc_kcs: lpc_kcs@7000 {\n+ kcs1: kcs1@0 {\n+ status = \"okay\";\n+ };\n\n-&serial3 {\n- status = \"okay\";\n+ kcs2: kcs2@0 {\n+ status = \"okay\";\n+ };\n+\n+ kcs3: kcs3@0 {\n+ status = \"okay\";\n+ };\n+ };\n+\n+ /* lm75 on SVB */\n+ i2c0: i2c@80000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ lm75@48 {\n+ compatible = \"lm75\";\n+ reg = <0x48>;\n+ status = \"okay\";\n+ };\n+ };\n+\n+ /* lm75 on EB */\n+ i2c1: i2c@81000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ lm75@48 {\n+ compatible = \"lm75\";\n+ reg = <0x48>;\n+ status = \"okay\";\n+ };\n+ };\n+\n+ /* tmp100 on EB */\n+ i2c2: i2c@82000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ tmp100@48 {\n+ compatible = \"tmp100\";\n+ reg = <0x48>;\n+ status = \"okay\";\n+ };\n+ };\n+\n+ i2c3: i2c@83000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ i2c5: i2c@85000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ /* tmp100 on SVB */\n+ i2c6: i2c@86000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ tmp100@48 {\n+ compatible = \"tmp100\";\n+ reg = <0x48>;\n+ status = \"okay\";\n+ };\n+ };\n+\n+ i2c7: i2c@87000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ i2c8: i2c@88000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ i2c9: i2c@89000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ i2c10: i2c@8a000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ i2c11: i2c@8b000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ i2c14: i2c@8e000 {\n+ clock-frequency = <100000>;\n+ status = \"okay\";\n+ };\n+\n+ pwm_fan:pwm-fan-controller@103000 {\n+ status = \"okay\";\n+ fan@0 {\n+ reg = <0x00>;\n+ fan-tach-ch = /bits/ 8 <0x00 0x01>;\n+ cooling-levels = <127 255>;\n+ };\n+ fan@1 {\n+ reg = <0x01>;\n+ fan-tach-ch = /bits/ 8 <0x02 0x03>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ fan@2 {\n+ reg = <0x02>;\n+ fan-tach-ch = /bits/ 8 <0x04 0x05>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ fan@3 {\n+ reg = <0x03>;\n+ fan-tach-ch = /bits/ 8 <0x06 0x07>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ fan@4 {\n+ reg = <0x04>;\n+ fan-tach-ch = /bits/ 8 <0x08 0x09>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ fan@5 {\n+ reg = <0x05>;\n+ fan-tach-ch = /bits/ 8 <0x0A 0x0B>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ fan@6 {\n+ reg = <0x06>;\n+ fan-tach-ch = /bits/ 8 <0x0C 0x0D>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ fan@7 {\n+ reg = <0x07>;\n+ fan-tach-ch = /bits/ 8 <0x0E 0x0F>;\n+ cooling-levels = /bits/ 8 <127 255>;\n+ };\n+ };\n+\n+ spi0: spi@200000 {\n+ cs-gpios = <&gpio6 11 GPIO_ACTIVE_LOW>;\n+ status = \"okay\";\n+ Flash@0 {\n+ compatible = \"winbond,w25q128\",\n+ \"jedec,spi-nor\";\n+ reg = <0x0>;\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ spi-max-frequency = <5000000>;\n+ partition@0 {\n+ label = \"spi0_spare1\";\n+ reg = <0x0000000 0x800000>;\n+ };\n+ partition@1 {\n+ label = \"spi0_spare2\";\n+ reg = <0x800000 0x0>;\n+ };\n+ };\n+ };\n+\n+ spi1: spi@201000 {\n+ cs-gpios = <&gpio0 20 GPIO_ACTIVE_LOW>;\n+ status = \"okay\";\n+ Flash@0 {\n+ compatible = \"winbond,w25q128fw\",\n+ \"jedec,spi-nor\";\n+ reg = <0x0>;\n+ #address-cells = <1>;\n+ #size-cells = <1>;\n+ spi-max-frequency = <5000000>;\n+ partition@0 {\n+ label = \"spi1_spare1\";\n+ reg = <0x0000000 0x800000>;\n+ };\n+ partition@1 {\n+ label = \"spi1_spare2\";\n+ reg = <0x800000 0x0>;\n+ };\n+ };\n+ };\n+ };\n+ };\n+\n+ pinctrl: pinctrl@f0800000 {\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = < &iox1_pins\n+ &pin8_input\n+ &pin9_output_high\n+ &pin10_input\n+ &pin11_output_high\n+ &pin16_input\n+ &pin24_output_high\n+ &pin25_output_low\n+ &pin32_output_high\n+ &jtag2_pins\n+ &pin61_output_high\n+ &pin62_output_high\n+ &pin63_output_high\n+ &lpc_pins\n+ &pin160_input\n+ &pin162_input\n+ &pin168_input\n+ &pin169_input\n+ &pin170_input\n+ &pin187_output_high\n+ &pin190_input\n+ &pin191_output_high\n+ &pin192_output_high\n+ &pin197_output_low\n+ &ddc_pins\n+ &pin218_input\n+ &pin219_output_low\n+ &pin220_output_low\n+ &pin221_output_high\n+ &pin222_input\n+ &pin223_output_low\n+ &spix_pins\n+ &pin228_output_low\n+ &pin231_output_high\n+ &pin255_input>;\n+ };\n};\ndiff --git a/arch/arm/boot/dts/nuvoton-npcm750-pincfg-evb.dtsi b/arch/arm/boot/dts/nuvoton-npcm750-pincfg-evb.dtsi\nnew file mode 100644\nindex 000000000000..edb4190826e6\n--- /dev/null\n+++ b/arch/arm/boot/dts/nuvoton-npcm750-pincfg-evb.dtsi\n@@ -0,0 +1,157 @@\n+// Copyright (c) 2018 Nuvoton Technology tomer.maimon@xxxxxxxxxxx\n+\n+/ {\n+ pinctrl: pinctrl@f0800000 {\n+ pin8_input: pin8-input {\n+ pins = \"GPIO8/LKGPO1\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin9_output_high: pin9-output-high {\n+ pins = \"GPIO9/LKGPO2\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin10_input: pin10-input {\n+ pins = \"GPIO10/IOXHLD\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin11_output_high: pin11-output-high {\n+ pins = \"GPIO11/IOXHCK\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin16_input: pin16-input {\n+ pins = \"GPIO16/LKGPO0\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin24_output_high: pin24-output-high {\n+ pins = \"GPIO24/IOXHDO\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin25_output_low: pin25-output-low {\n+ pins = \"GPIO25/IOXHDI\";\n+ bias-disable;\n+ output-low;\n+ };\n+ pin32_output_high: pin32-output-high {\n+ pins = \"GPIO32/nSPI0CS1\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin61_output_high: pin61-output-high {\n+ pins = \"GPO61/nDTR1_BOUT1/STRAP6\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin62_output_high: pin62-output-high {\n+ pins = \"GPO62/nRTST1/STRAP5\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin63_output_high: pin63-output-high {\n+ pins = \"GPO63/TXD1/STRAP4\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin160_input: pin160-input {\n+ pins = \"GPIO160/CLKOUT/RNGOSCOUT\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin162_input: pin162-input {\n+ pins = \"GPIO162/SERIRQ\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin168_input: pin168-input {\n+ pins = \"GPIO168/nCLKRUN/nESPIALERT\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin169_input: pin169-input {\n+ pins = \"GPIO169/nSCIPME\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin170_input: pin170-input {\n+ pins = \"GPIO170/nSMI\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin187_output_high: pin187-output-high {\n+ pins = \"GPIO187/nSPI3CS1\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin190_input: pin190-input {\n+ pins = \"GPIO190/nPRD_SMI\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin191_output_high: pin191-output-high {\n+ pins = \"GPIO191\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin192_output_high: pin192-output-high {\n+ pins = \"GPIO192\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin197_output_low: pin197-output-low {\n+ pins = \"GPIO197/SMB0DEN\";\n+ bias-disable;\n+ output-low;\n+ };\n+ pin218_input: pin218-input {\n+ pins = \"GPIO218/nWDO1\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin219_output_low: pin219-output-low {\n+ pins = \"GPIO219/nWDO2\";\n+ bias-disable;\n+ output-low;\n+ };\n+ pin220_output_low: pin220-output-low {\n+ pins = \"GPIO220/SMB12SCL\";\n+ bias-disable;\n+ output-low;\n+ };\n+ pin221_output_high: pin221-output-high {\n+ pins = \"GPIO221/SMB12SDA\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin222_input: pin222-input {\n+ pins = \"GPIO222/SMB13SCL\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ pin223_output_low: pin223-output-low {\n+ pins = \"GPIO223/SMB13SDA\";\n+ bias-disable;\n+ output-low;\n+ };\n+ pin228_output_low: pin228-output-low {\n+ pins = \"GPIO228/nSPIXCS1\";\n+ bias-disable;\n+ output-low;\n+ };\n+ pin231_output_high: pin231-output-high {\n+ pins = \"GPIO230/SPIXD3\";\n+ bias-disable;\n+ output-high;\n+ };\n+ pin255_input: pin255-input {\n+ pins = \"GPI255/DACOSEL\";\n+ bias-disable;\n+ input-enable;\n+ };\n+ };\n+};\ndiff --git a/arch/arm/boot/dts/nuvoton-npcm750.dtsi b/arch/arm/boot/dts/nuvoton-npcm750.dtsi\nindex a37bb2294b8f..13eee0fe5642 100644\n--- a/arch/arm/boot/dts/nuvoton-npcm750.dtsi\n+++ b/arch/arm/boot/dts/nuvoton-npcm750.dtsi\n@@ -32,6 +32,7 @@\nnext-level-cache = <&l2>;\n};\n};\n+\nsoc {\ntimer@3fe600 {\ncompatible = \"arm,cortex-a9-twd-timer\";\n@@ -41,4 +42,21 @@\nclocks = <&clk NPCM7XX_CLK_AHB>;\n};\n};\n+\n+ ahb {\n+ gmac1: eth@f0804000 {\n+ device_type = \"network\";\n+ compatible = \"snps,dwmac\";\n+ reg = <0xf0804000 0x2000>;\n+ interrupts = <GIC_SPI 17 IRQ_TYPE_LEVEL_HIGH>;\n+ interrupt-names = \"macirq\";\n+ ethernet = <1>;\n+ clocks = <&clk_rg2refck>, <&clk NPCM7XX_CLK_AHB>;\n+ clock-names = \"stmmaceth\", \"clk_gmac\";\n+ pinctrl-names = \"default\";\n+ pinctrl-0 = <&rg2_pins\n+ &rg2mdio_pins>;\n+ status = \"disabled\";\n+ };\n+ };\n};\n--\n2.22.0" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.52658683,"math_prob":0.9981222,"size":34509,"snap":"2022-40-2023-06","text_gpt3_token_len":13476,"char_repetition_ratio":0.2847703,"word_repetition_ratio":0.27195916,"special_character_ratio":0.49589962,"punctuation_ratio":0.29857007,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97316694,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-26T13:34:38Z\",\"WARC-Record-ID\":\"<urn:uuid:81a5c2c3-1361-4e02-8695-07701d06b04d>\",\"Content-Length\":\"55687\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:584908d5-5b63-44a4-b516-56294cc5be2e>\",\"WARC-Concurrent-To\":\"<urn:uuid:67d080ce-154e-4b49-95dc-434e101dba37>\",\"WARC-IP-Address\":\"129.79.113.48\",\"WARC-Target-URI\":\"https://lkml.iu.edu/hypermail/linux/kernel/2009.2/01136.html\",\"WARC-Payload-Digest\":\"sha1:UQJIUT6PGJ54LU54JXPO6NDUNTD7XO35\",\"WARC-Block-Digest\":\"sha1:WFWXA4OKBNRAJW57QINWIFUOUKAAPOFX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334871.54_warc_CC-MAIN-20220926113251-20220926143251-00602.warc.gz\"}"}
https://ai.stackexchange.com/questions/28465/which-policy-do-i-need-to-use-in-updating-q-function/28466
[ "# Which policy do I need to use in updating Q function?\n\nPolicy function can be of two types: deterministic policy and stochastic policy.\n\nDeterministic policy is of the form $$\\pi : S \\rightarrow A$$\n\nStochastic policy is defined using conditional probability distributions and I generally remember as $$\\pi: S \\times A \\rightarrow [0,1]$$. (I personally don't know whether the function prototype is correct or not)\n\nI am guessing that both type of policies can be used for Q learning. As one can read from this answer that both reward and policy function are needed to implement $$Q$$ learning algorithm\n\nIn addition to the RF, you also need to define an exploratory policy (an example is the $$\\epsilon$$-greedy), which allows you to explore the environment and learn the state-action value function $$\\hat{q}$$.\n\nI have no doubt about the necessity of reward function as it is obvious from the updating equation of $$Q$$.\n\nAnd coming to the (usage of policy), you can find it from the line 5 of the pseudocode provided in the answer\n\nChoose $$a$$ from $$s$$ using policy derived from $$Q$$\n\nOne can notice that policy is used for computing $$Q$$ and $$Q$$ updation also needs a policy.\n\nHenceforth I conclused myself that the correct statement for the line 5 of pseudocode has to be\n\nChoose $$a$$ from $$s$$ using policy derived from $$Q$$ updated so far\n\nIs my conclusion true? Else, how is it possible to break that cyclic dependency between policy and $$Q$$ function?\n\n• Comments are not for extended discussion; this conversation has been moved to chat.\n– nbro\nJul 1 at 12:15\n\nI am going to stick with Q learning here to keep things simple. Most value-based reinforcement learning used for optimal control will have some statement similar to:\n\nChoose $$a$$ from $$s$$ using policy derived from $$Q$$\n\nFirst, yes this is always the current Q function or Q table, evaluated for the state of interest.\n\nWhen you are choosing the agent's best guess at optimal actions, then this derivation of policy is fixed:\n\n$$\\pi(s) = \\text{argmax}_a Q(s,a)$$\n\nThis matches your form for a deterministic policy (although it is always possible to express a deterministic policy as a stochastic one with probabitly of 1 choosing its selected action). In Q-learning this policy is the target policy that you are currently learning the value of.\n\nWhen it comes to taking actions in the environment to gain new observations, you do not use the target policy, because it does not explore. Instead you use a different behaviour (or exploring) policy. It is important for Q learning to work in theory that this policy is \"soft\" - that it has some non-zero chance of selecting any action.\n\nA popular choice for the behaviour policy is to use $$\\epsilon$$-greedy, which is a stochastic policy that selects a random actiom with probability $$\\epsilon$$, otherwise it selects the greedy policy. The greedy policy is definitely \"derived from Q\", so the $$\\epsilon$$-greedy is too.\n\nIn fact it is not 100% necessary to use a \"policy derived from Q\" for the behaviour policy for Q learning to work. A completely random policy can work, for instance. The learning rate is better though - often much better - if current highest action value estimates are selected more often. This allows the agent to explore state action pairs close to its best guess at optimal.\n\nThere are a few other ways to derive behaviour policies from Q table. There is an unwritten assumption in the pseudocode that this will be done in a way that favours the higher-valued actions.\n\nYou can come up with any method that creates a stochastic policy function from Q values and has the following traits:\n\n• There is a chance of selecting any action\n\n• There is a higher chance of selecting the current highest valued actions\n\n• Optionally, the preference for highest valued actions becomes stronger as the agent becomes better at the task\n\nIf you can do this, then Q learning should work well. It is still sometimes a challenge to find the balance point between exploring enough to learn new things about the environment, yet doing so close to what is currently known to be best.\n\nRegarding this:\n\nChoose $$a$$ from $$s$$ using policy derived from $$Q$$ updated so far\n\nYes although most sources do not spell that out in full, relying on the use of $$Q$$ as a variable/data structure to imply it.\n\nThe target policy in Q learning is not directly the optimal policy (that is not possible unless you already know it), but the best guess at what would maximise expected return given the updates to Q so far. This keeps shifting as more knowledge is obtained." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93729997,"math_prob":0.97761005,"size":2979,"snap":"2021-43-2021-49","text_gpt3_token_len":625,"char_repetition_ratio":0.1297479,"word_repetition_ratio":0.01953125,"special_character_ratio":0.20879489,"punctuation_ratio":0.06964286,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9945293,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-20T21:47:26Z\",\"WARC-Record-ID\":\"<urn:uuid:3eeb6c1f-a74a-4fd0-8db1-b98ca0c11cc0>\",\"Content-Length\":\"171236\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0b32bec3-efac-4730-8b2a-cb2df078b422>\",\"WARC-Concurrent-To\":\"<urn:uuid:f1a04ce9-1839-4468-b170-c570ed70c07c>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://ai.stackexchange.com/questions/28465/which-policy-do-i-need-to-use-in-updating-q-function/28466\",\"WARC-Payload-Digest\":\"sha1:GBX7OVEDIJCO3FNRZUOEZXA4LL4FP3KZ\",\"WARC-Block-Digest\":\"sha1:RY6QPZ44KUOVIYUWNFYGDBIZL43KV6AE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585353.52_warc_CC-MAIN-20211020214358-20211021004358-00537.warc.gz\"}"}
https://www.pd4u.nl/bond-work-index-calculation-mill-efficiency_37430.html
[ " bond work index calculation mill efficiency\n• ### Bond Ball Mill Work Index (Grindability Tests) - YouTube\n\nMay 18, 2013· This video was put together by Joshua Wright and Aldo Vasquerizo as a supplemental lecture for University of Nevada Reno. If you have any questions, need advice, or need to conduct a …\n\n• ### comparative bond ball mill work index - alianzcanineitalia.it\n\n20150505 Bond Efficiency-GMG-ICE-v1-r04 Determining the ... WiBM Bond Ball Mill Test Work Index (kWh/t) Wic Bond Impact Crushing Test Work Index (kWh/t) WioACT Actual Operating Bond Work Index determined from measurements on the circuit (kWh/t) WiRM Bond Rod Mill Test Work Index (kWh/t) WiSTD Standard Circuit Bond Work Index (expected or designed) used for circuit design.\n\n• ### A study of simulating the calculation method of the Bond ...\n\nBased on the nth order grinding kinetic equation and the theory of linear additivity in the grinding process, the grinding kinetic characteristics of the feed and the circulating load in standard Bond rod-mill grindability tests are studied.A new method of simulating the calculation of the Bond rod-mill work index by using the grinding kinetic test data of the feed is proposed.\n\n• ### Mill (grinding) - Wikipedia\n\nW is the work index measured in a laboratory ball mill (kilowatt-hours per metric or short ton) P 80 is the mill circuit product size in micrometers; F 80 is the mill circuit feed size in micrometers. Rod mill. A rotating drum causes friction and attrition between steel rods and ore particles.\n\n• ### Procedure for determination of ball Bond work index in the ...\n\nThe Bond ball mill grindability test is run in a laboratory until a circulating load of 250% is developed. It provides the Bond Ball Mill Work Index which expresses the resistance of material to ...\n\n• ### A quick method for bond work index approximate value ...\n\nQuick method for bond work index approximate value determination. 331. ... 3.327 mm.In this work, a procedure for the calculation of the Bond work index is suggested for cases when the Bond ...\n\n• ### how to calculate mill bond or work index - august-gille.be\n\nSee this useful summary Table of Bond Work Index by Minerals. For any circuit, whether a crushing circuit, a rod mill, or a closed ball mill circuit, the Work Index always means the equivalent amount of energy to reduce one ton of the ore from a very large size to 100 um.\n\n• ### CORRELATION BETWEEN BOND WORK INDEX AND …\n\nThe Bond's standard ball mill is used to determine the work index value of differ ent samples. The Bond work index is defined as the kilowatt-hours per short ton required to break from infinite size to a product size of 80% passing 100 µm. If the breakage characteristics of a material remain constant over all size ranges, the calcul ated work ...\n\n• ### Relationships between comminution J energy and product ...\n\nmill was measured using a purpose built power meter to facilitate the calculation of specific grinding energy. Results Table I shows the Bond ball mill work index obtained for the ore samples as well as the iron and silica content in concentrate and tail after LIMS. The concentrate weight recovery was in the order of 50–60%. Furthermore it may be\n\n• ### Comminution service offering Minerals Processing Division ...\n\nBENCH SCALE COMMINUTION TEST WORK qBond Work Index Testing Bond Ball Work Index Bond Rod Work Index Bond Crushability Work Index Bond Abrasion Work Index qJK Tech Testing JK Drop weight Test SAG Milling Comminution Test (SMC) COMMINUTION PILOT PLANT qAG/SAG Pilot Milling Mill dimensions: Ø1.7m x 0.6m length ... and process efficiency ...\n\n• ### Application of Operating Work Indices in Autogenous ...\n\nBond Ball Mill Work Index, BWi, kWh/t 13.4 Bond Rod Mill Work Index, RWi, kWh/t 18.1 Table 1. Example of AG/SAG Ball Mill Circuit Wio Calculations ABstrAct Optimum use of power in grinding, both in terms of grinding efficiency and use of installed capital, can have a …\n\n• ### Ball Mill Operatng Work Index Calculation - tristandahl.co.za\n\nball mill work index calculation xls - nfbborder1000. ball mill work index calculation xls. JKTech Laboratory ServicesJKTech Laboratory Services Bond Ball Mill is a standard test for determining the Ball Mill Work Index of Based on this equation it is possible to calculate -ball mill work index calculation xls-,sagdesign comENERGY REQUIREMENTS CALCULATION testing measures the macro and …\n\n• ### bead mill grinding media calculation\n\nThe most widely known measure of grindability is. Bond's work index which is defined as the resistance of the material to grinding. The standard equation used by them for the ball mill work index . Ball_mill_Finish Mill Ball Charge Calculation Scribd\n\n• ### Bond Grinding Circuit Efficiency - ceecthefuture.org\n\nBond Grinding Circuit Efficiency Meeting of Bond Efficiency Guideline Working Group of the Global Mining and Standards Group Salt lake City, 2014 Based on Presentation to the 2008 Meeting of SME, by C.A. Rowland, Jr. and R.E. McIvor. Bond Grinding Circuit Efficiency • The Bond Work Index equation • Ore test WI • Circuit operating WI\n\n• ### impact ball mill kinetic energy calculation\n\nJun 23, 2019· impact ball mill kinetic energy calculation_High Energy Ball Mill Processing IPENWhen the goal is the production of amounts of the order of tones, ... influence on the particle breakage rate and energy efficiency of the grinding process [15, 18, 22, 28]. A comparison between ball mils and cylpebs is …\n\n• ### USING THE SMC TEST® TO PREDICT COMMINUTION …\n\nwork index covering grinding of fine particles is labelled M ib (Morrell, 2008). M ia values are provided as a standard output from a SMC Test® (Morrell, 2004a) whilst M ib values can be determined using the data generated by a conventional Bond ball mill work index test (M ib is NOT the Bond ball work index). M ic and M ih values are also ...\n\n• ### Ball Mill Design/Power Calculation - LinkedIn\n\nDec 12, 2016· Ball Mill Power Calculation Example A wet grinding ball mill in closed circuit is to be fed 100 TPH of a material with a work index of 15 and a size distribution of …\n\n• ### A New Approach to the Calculation of Work Index and the ...\n\nThe work index . W. i. was defined by F. Bond as the specific energy (kWh/ton) required to reduce a particulate ... tests which is similar to the Bond test but with the exist- ing mill of known power. ... A New Approach to the Calculation of Work Index and the Potential Energy of a Particulate Material ...\n\n• ### A Method of C alculating Autogenous/ Semi-Autogenous ...\n\nrod mill work index has not been de ned as yet. The ball fi mill work index is con rmed at 16 kWh/t. The operating fi work index, though, is in the range of 21 kWh/t to 25 kWh/t showing high ineffi ciency. This raises the point that, in some cases, the Bond EF4 oversize factor calculation …\n\n• ### Circulating load - SlideShare\n\nNov 18, 2014· Test design Slide 12 Main purpose Maximum Capacity Cost low Energy Size Division Less fines Production Bond's work index 13. Test design Slide 13 Effect of circulating load on Bond's work index The follow figures shown variation in the Bond work index …\n\n• ### Bond Ball Mill Index Test | JKTech\n\nThe Bond Ball Mill Work Index is a measure of the resistance of the material to grinding in a ball mill. It can be used to determine the grinding power required for a given throughput of material under ball mill grinding conditions. It is a 'locked cycle' test conducted in closed circuit with a laboratory screen.\n\n• ### JKTech Laboratory Services\n\nJKTech Laboratory Services Bond Ball Mill Index Test (BRMWI) A Bond Ball Mill Index Test (BBMWI) is a standard test for determining the Ball Mill Work Index of a sample of ore. The BBMWI is a measure of the resistance of the material to crushing and grinding. It can be used to determine\n\n• ### Bond Ball Mill Work Index (Grindability Tests) - YouTube\n\nMay 18, 2013· This video was put together by Joshua Wright and Aldo Vasquerizo as a supplemental lecture for University of Nevada Reno. If you have any questions, need advice, or need to conduct a metallurgical ...\n\n• ### Bond Tests | Mining | SGS\n\nBond Rod Mill Grindability Test. The test determines the Bond Rod Mill Work Index which is used with Bond's Third Theory of Comminution to calculate net power requirements when sizing ball mills*. Various correction factors may have to be applied. The test is a closed-circuit dry grindability test performed in a standard rod mill.\n\n• ### ball mill work index calculation - BINQ Mining\n\nCorrelations for the Grindability of the Ball Mill As a Measure of …. standard equation used by them for the ball mill work index … to bond index calculation where the power consumption will indicate directly about the cost »More detailed\n\n• ### Calculation ball crusher - bandstraverhuur.nl\n\nBond Work Index Formula-Equation. See this useful summary Table of Bond Work Index by Minerals. For any circuit, whether a crushing circuit, a rod mill, or a closed ball mill circuit, the Work Index always means the equivalent amount of energy to reduce one ton of the ore from a very large size to 100 um.\n\n• ### Cement Grinding Optimization - SlideShare\n\nJul 31, 2014· Semi-Batch Dry Grinding Tests of a Pilot Scale Vertical Stirred Mill. Proceedings of VIII Balkan Mineral Processing Conference, Belgrade, Yugoslavia. Rowland, C.A., 1975. \"The tools of power: How to evaluate grinding mill performance using Bond Work Index to measure grinding efficiency\" AIME Annual Meeting, Tucson, Arizona.\n\n• ### O. I. SKARIN N. O. TIKHONOV CALCULATION OF THE …\n\ngeous for being based on the Bond work indexes that are de-terminable in any well-fitted ore pretreatment laboratory (it is UDC 622.732 O. I. SKARIN (RIVS Science and Production Association) N. O. TIKHONOV (JV \"IVS\") CALCULATION OF THE REQUIRED SEMIAUTOGENOUS MILL POWER BASED ON THE BOND WORK INDEXES O. I. SKARIN, Senior Researcher,\n\n• ### Bond Work Index Formula-Equation\n\nIn grinding, operating Efficiency compares the operating work index of a comminution machine to the Bond work index from bench scale crushing and grindability tests or/and pilot plant tests. Economic Efficiency is comparing the income from production to the planned income from production. Energy as consumed in comminution machines and the required energy as determined, from bench scale ...\n\n• ### MODELING THE SPECIFIC GRINDING ENERGY AND BALL …\n\n2 MODELLING THE SPECIFIC GRINDING ENERGY AND BALL-MILL SCALEUP Ball-mill scale up (Bond's Law)Data: zBond work index w i zFeed D f and product d size (both 80% cumulative passing) Result: The specific grinding energy w Mill power draw P = wT, where T the mill capacity Mill dimensions (from Tables or charts)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8939928,"math_prob":0.8848236,"size":255,"snap":"2020-10-2020-16","text_gpt3_token_len":61,"char_repetition_ratio":0.015936255,"word_repetition_ratio":0.0,"special_character_ratio":0.23137255,"punctuation_ratio":0.08510638,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95308125,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-04T02:16:52Z\",\"WARC-Record-ID\":\"<urn:uuid:36b05cba-9c3e-4f94-803f-9ed9aefb8439>\",\"Content-Length\":\"27000\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2f47b3c6-85d8-47ff-a242-a57543c26637>\",\"WARC-Concurrent-To\":\"<urn:uuid:c4f2acb9-cff1-4c56-be98-e1bd13ad4970>\",\"WARC-IP-Address\":\"104.24.96.172\",\"WARC-Target-URI\":\"https://www.pd4u.nl/bond-work-index-calculation-mill-efficiency_37430.html\",\"WARC-Payload-Digest\":\"sha1:W4X7HAGBX27VKC5COAMBCWV7NQZBGHB6\",\"WARC-Block-Digest\":\"sha1:7QEPHZCEY5DQNV7LABU4SEQSGR3ZDXBX\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585370519111.47_warc_CC-MAIN-20200404011558-20200404041558-00049.warc.gz\"}"}
https://news.yahoo.com/mathematicians-discovered-computer-problem-no-161400959.html
[ "# Mathematicians Discovered a Computer Problem that No One Can Ever Solve\n\nMathematicians have discovered a problem they cannot solve. It's not that they're not smart enough; there simply is no answer.\n\nThe problem has to do with machine learning — the type of artificial-intelligence models some computers use to \"learn\" how to do a specific task.\n\nWhen Facebook or Google recognizes a photo of you and suggests that you tag yourself, it's using machine learning. When a self-driving car navigates a busy intersection, that's machine learning in action. Neuroscientists use machine learning to \"read\" someone’s thoughts. The thing about machine learning is that it's based on math. And as a result, mathematicians can study it and understand it on a theoretical level. They can write proofs about how machine learning works that are absolute and apply them in every case. [Photos: Large Numbers That Define the Universe]\n\nIn this case, a team of mathematicians designed a machine-learning problem called \"estimating the maximum\" or \"EMX.\"\n\nTo understand how EMX works, imagine this: You want to place ads on a website and maximize how many viewers will be targeted by these ads. You have ads pitching to sports fans, cat lovers, car fanatics and exercise buffs, etc. But you don't know in advance who is going to visit the site. How do you pick a selection of ads that will maximize how many viewers you target? EMX has to figure out the answer with just a small amount of data on who visits the site.\n\nThe researchers then asked a question: When can EMX solve a problem?\n\nIn other machine-learning problems, mathematicians can usually say if the learning problem can be solved in a given case based on the data set they have. Can the underlying method Google uses to recognize your face be applied to predicting stock market trends? I don't know, but someone might.\n\nThe trouble is, math is sort of broken. It's been broken since 1931, when the logician Kurt Gödel published his famous incompleteness theorems. They showed that in any mathematical system, there are certain questions that cannot be answered. They're not really difficult — they're unknowable. Mathematicians learned that their ability to understand the universe was fundamentally limited. Gödel and another mathematician named Paul Cohen found an example: the continuum hypothesis.\n\nThe continuum hypothesis goes like this: Mathematicians already know that there are infinities of different sizes. For instance, there are infinitely many integers (numbers like 1, 2, 3, 4, 5 and so on); and there are infinitely many real numbers (which include numbers like 1, 2, 3 and so on, but they also include numbers like 1.8 and 5,222.7 and pi). But even though there are infinitely many integers and infinitely many real numbers, there are clearly more real numbers than there are integers. Which raises the question, are there any infinities larger than the set of integers but smaller than the set of real numbers? The continuum hypothesis says, no, there aren't.\n\nGödel and Cohen showed that it's impossible to prove that the continuum hypothesis is right, but also it's impossible to prove that it's wrong. \"Is the continuum hypothesis true?\" is a question without an answer.\n\nIn a paper published Monday, Jan. 7, in the journal Nature Machine Intelligence, the researchers showed that EMX is inextricably linked to the continuum hypothesis.\n\nIt turns out that EMX can solve a problem only if the continuum hypothesis is true. But if it's not true, EMX can't.. That means that the question, \"Can EMX learn to solve this problem?\" has an answer as unknowable as the continuum hypothesis itself.\n\nThe good news is that the solution to the continuum hypothesis isn't very important to most of mathematics. And, similarly, this permanent mystery might not create a major obstacle to machine learning.\n\n\"Because EMX is a new model in machine learning, we do not yet know its usefulness for developing real-world algorithms,\" Lev Reyzin, a professor of mathematics at the University of Illinois in Chicago, who did not work on the paper, wrote in an accompanying Nature News & Views article. \"So these results might not turn out to have practical importance,\" Reyzin wrote.\n\nRunning up against an unsolvable problem, Reyzin wrote, is a sort of feather in the cap of machine-learning researchers.\n\nIt's evidence that machine learning has \"matured as a mathematical discipline,\" Reyzin wrote.\n\nMachine learning \"now joins the many subfields of mathematics that deal with the burden of unprovability and the unease that comes with it,\" Reyzin wrote. Perhaps results such as this one will bring to the field of machine learning a healthy dose of humility, even as machine-learning algorithms continue to revolutionize the world around us. \"\n\nEditor's note: This story was updated on Jan. 14 at 2:15 p.m. EST to correct the definition of the continuum hypothesis. The article originally said that if the continuum hypothesis is true, then there are infinities larger than the set of integers but smaller than the set of real numbers. In fact, if the continuum hypothesis is true, then there are not infinities larger than the set of integers but smaller than the set of real numbers.\n\nOriginally published on Live Science.\n\nOur goal is to create a safe and engaging place for users to connect over interests and passions. In order to improve our community experience, we are temporarily suspending article commenting" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.96085995,"math_prob":0.7290063,"size":5255,"snap":"2021-43-2021-49","text_gpt3_token_len":1109,"char_repetition_ratio":0.14340125,"word_repetition_ratio":0.054524362,"special_character_ratio":0.20190296,"punctuation_ratio":0.11526795,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96312386,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-19T07:19:07Z\",\"WARC-Record-ID\":\"<urn:uuid:07a20717-4c14-4cc8-910f-4151fd2f3cb1>\",\"Content-Length\":\"491148\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a24d5b1c-f750-4a7b-a349-bc8cd4ca25d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:5a12c082-5b9c-4de6-8b67-f9c308ab5482>\",\"WARC-IP-Address\":\"74.6.143.18\",\"WARC-Target-URI\":\"https://news.yahoo.com/mathematicians-discovered-computer-problem-no-161400959.html\",\"WARC-Payload-Digest\":\"sha1:BG2HJSTMKVN25YDGJCNBAGY74PTJ7XCW\",\"WARC-Block-Digest\":\"sha1:Q7MV5BWDIIX4236J7MOUE2IRUH2U2UMI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585242.44_warc_CC-MAIN-20211019043325-20211019073325-00281.warc.gz\"}"}
https://www.geeksforgeeks.org/minimize-operations-to-reduce-n-to-2-by-repeatedly-reducing-by-3-or-dividing-by-5/
[ "", null, "Open in App\nNot now\n\n# Minimize operations to reduce N to 2 by repeatedly reducing by 3 or dividing by 5\n\n• Difficulty Level : Medium\n• Last Updated : 18 Aug, 2021\n\nGiven a positive integer N, the task is to find the minimum number of operations needed to convert N to 2 either by decrementing N by 3 or dividing N by 5 if N is divisible by 5. If it is not possible to reduce N to 2, then print “-1”.\n\nExamples:\n\nInput: N =10\nOutput: 1\nExplanation:\nFollowing are the operations performed to reduce N to 2:\n\n1. Dividing N by 5, reduces N to 10/5 = 2.\n\nAfter the above operations, N is reduced to 2. Therefore, the minimum number of operations required is 1.\n\nInput: N = 25\nOutput: 2\n\nApproach: The given problem can be solved by using Dynamic Programming, the idea is to start iterating from 2 and perform both the operations in a reverse manner i.e., instead of subtracting, perform addition of 3 and instead of dividing, perform multiplication with 5 at every state and store the minimum number of operations for every possible value of N in the array dp[].\n\nIf the value of N is reached, then print the value of dp[N] as the minimum number of operations. Otherwise, print -1. Follow the steps below to solve the problem:\n\n• Initialize an auxiliary array, say dp[] of size (N + 1), and initialize all array elements with INT_MAX.\n• Set the value of dp equal to 0.\n• Iterate over the range [0, N], and update the value of dp[i] as:\n• dp[i * 5] = min(dp[i * 5], dp[i] + 1).\n• dp[i + 3] = min(dp[i + 3], dp[i] + 1).\n• If the value of dp[N] is INT_MAX, then print -1. Otherwise, print dp[N] as the result.\n\nBelow is the implementation of the above approach:\n\n## C++\n\n `// C++ program for the above approach``#include ``using` `namespace` `std;` `// Function to find the minimum number``// of operations to reduce N to 2 by``// dividing N by 5 or decrementing by 3``int` `minimumOperations(``int` `N)``{``    ``// Initialize the dp array``    ``int` `dp[N + 1];``    ``int` `i;` `    ``// Initialize the array dp[]``    ``for` `(``int` `i = 0; i <= N; i++) {``        ``dp[i] = 1e9;``    ``}` `    ``// For N = 2 number of operations``    ``// needed is zero``    ``dp = 0;` `    ``// Iterating over the range [1, N]``    ``for` `(i = 2; i <= N; i++) {` `        ``// If it's not possible to``        ``// create current N``        ``if` `(dp[i] == 1e9)``            ``continue``;` `        ``// Multiply with 5``        ``if` `(i * 5 <= N) {``            ``dp[i * 5] = min(dp[i * 5],``                            ``dp[i] + 1);``        ``}` `        ``// Adding the value 3``        ``if` `(i + 3 <= N) {``            ``dp[i + 3] = min(dp[i + 3],``                            ``dp[i] + 1);``        ``}``    ``}` `    ``// Checking if not possible to``    ``// make the number as 2``    ``if` `(dp[N] == 1e9)``        ``return` `-1;` `    ``// Return the minimum number``    ``// of operations``    ``return` `dp[N];``}` `// Driver Code``int` `main()``{``    ``int` `N = 25;``    ``cout << minimumOperations(N);` `    ``return` `0;``}`\n\n## Java\n\n `// Java program for the above approach``import` `java.io.*;``class` `GFG {` `    ``// Function to find the minimum number``    ``// of operations to reduce N to 2 by``    ``// dividing N by 5 or decrementing by 3``    ``static` `int` `minimumOperations(``int` `N)``    ``{``      ` `        ``// Initialize the dp array``        ``int``[] dp = ``new` `int``[N + ``1``];``        ``int` `i;` `        ``// Initialize the array dp[]``        ``for` `(i = ``0``; i <= N; i++) {``            ``dp[i] = (``int``)1e9;``        ``}` `        ``// For N = 2 number of operations``        ``// needed is zero``        ``dp[``2``] = ``0``;` `        ``// Iterating over the range [1, N]``        ``for` `(i = ``2``; i <= N; i++) {` `            ``// If it's not possible to``            ``// create current N``            ``if` `(dp[i] == (``int``)1e9)``                ``continue``;` `            ``// Multiply with 5``            ``if` `(i * ``5` `<= N) {``                ``dp[i * ``5``] = Math.min(dp[i * ``5``], dp[i] + ``1``);``            ``}` `            ``// Adding the value 3``            ``if` `(i + ``3` `<= N) {``                ``dp[i + ``3``] = Math.min(dp[i + ``3``], dp[i] + ``1``);``            ``}``        ``}` `        ``// Checking if not possible to``        ``// make the number as 2``        ``if` `(dp[N] == 1e9)``            ``return` `-``1``;` `        ``// Return the minimum number``        ``// of operations``        ``return` `dp[N];``    ``}` `    ``// Driver Code``    ``public` `static` `void` `main(String[] args)``    ``{``        ``int` `N = ``25``;` `        ``System.out.println(minimumOperations(N));``    ``}``}` `// This code is contributed by Potta Lokesh`\n\n## C#\n\n `// C# program for above approach``using` `System;` `class` `GFG{` `    ``// Function to find the minimum number``    ``// of operations to reduce N to 2 by``    ``// dividing N by 5 or decrementing by 3``    ``static` `int` `minimumOperations(``int` `N)``    ``{``      ` `        ``// Initialize the dp array``        ``int``[] dp = ``new` `int``[N + 1];``        ``int` `i;` `        ``// Initialize the array dp[]``        ``for` `(i = 0; i <= N; i++) {``            ``dp[i] = (``int``)1e9;``        ``}` `        ``// For N = 2 number of operations``        ``// needed is zero``        ``dp = 0;` `        ``// Iterating over the range [1, N]``        ``for` `(i = 2; i <= N; i++) {` `            ``// If it's not possible to``            ``// create current N``            ``if` `(dp[i] == (``int``)1e9)``                ``continue``;` `            ``// Multiply with 5``            ``if` `(i * 5 <= N) {``                ``dp[i * 5] = Math.Min(dp[i * 5], dp[i] + 1);``            ``}` `            ``// Adding the value 3``            ``if` `(i + 3 <= N) {``                ``dp[i + 3] = Math.Min(dp[i + 3], dp[i] + 1);``            ``}``        ``}` `        ``// Checking if not possible to``        ``// make the number as 2``        ``if` `(dp[N] == 1e9)``            ``return` `-1;` `        ``// Return the minimum number``        ``// of operations``        ``return` `dp[N];``    ``}` `// Driver Code``public` `static` `void` `Main(String[] args)``{``    ``int` `N = 25;` `    ``Console.Write(minimumOperations(N));``}``}` `// This code is contributed by sanjoy_62.`\n\n## Javascript\n\n ``\n\n## Python3\n\n `# Python 3 program for the above approach` `# Function to find the minimum number``# of operations to reduce N to 2 by``# dividing N by 5 or decrementing by 3``def` `minimumOperations(N):``    ``# Initialize the dp array``    ``dp ``=` `[``0` `for` `i ``in` `range``(N ``+` `1``)]` `    ``# Initialize the array dp[]``    ``for` `i ``in` `range``(N``+``1``):``        ``dp[i] ``=` `1000000000` `    ``# For N = 2 number of operations``    ``# needed is zero``    ``dp[``2``] ``=` `0` `    ``# Iterating over the range [1, N]``    ``for` `i ``in` `range``(``2``,N``+``1``,``1``):``        ``# If it's not possible to``        ``# create current N``        ``if` `(dp[i] ``=``=` `1000000000``):``            ``continue` `        ``# Multiply with 5``        ``if` `(i ``*` `5` `<``=` `N):``            ``dp[i ``*` `5``] ``=` `min``(dp[i ``*` `5``], dp[i] ``+` `1``)` `        ``# Adding the value 3``        ``if` `(i ``+` `3` `<``=` `N):``            ``dp[i ``+` `3``] ``=` `min``(dp[i ``+` `3``], dp[i] ``+` `1``)` `    ``# Checking if not possible to``    ``# make the number as 2``    ``if` `(dp[N] ``=``=` `1000000000``):``        ``return` `-``1` `    ``# Return the minimum number``    ``# of operations``    ``return` `dp[N]` `# Driver Code``if` `__name__ ``=``=` `'__main__'``:``    ``N ``=` `25``    ``print``(minimumOperations(N))`\n\nOutput:\n\n`2`\n\nTime Complexity: O(N)\nAuxiliary Space: O(N)\n\nMy Personal Notes arrow_drop_up" ]
[ null, "https://media.geeksforgeeks.org/gfg-gg-logo.svg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6641712,"math_prob":0.99480164,"size":6588,"snap":"2022-40-2023-06","text_gpt3_token_len":2208,"char_repetition_ratio":0.14565614,"word_repetition_ratio":0.52828854,"special_character_ratio":0.38782635,"punctuation_ratio":0.11464497,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998573,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T04:28:48Z\",\"WARC-Record-ID\":\"<urn:uuid:c4422751-a394-4343-88eb-156d012cf010>\",\"Content-Length\":\"201698\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2d9cbda0-2e61-4995-9a23-f0ee11c23c00>\",\"WARC-Concurrent-To\":\"<urn:uuid:145746aa-42a3-4dde-8fdb-fc1ce52dffe4>\",\"WARC-IP-Address\":\"23.62.230.103\",\"WARC-Target-URI\":\"https://www.geeksforgeeks.org/minimize-operations-to-reduce-n-to-2-by-repeatedly-reducing-by-3-or-dividing-by-5/\",\"WARC-Payload-Digest\":\"sha1:TRWR2H3CREVF4MGDE4JSNVGQUMDWM22S\",\"WARC-Block-Digest\":\"sha1:UP3ETIXVEBZKH6TTU5URPU5WFJM7EB5K\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500042.8_warc_CC-MAIN-20230203024018-20230203054018-00737.warc.gz\"}"}
https://fractioncalculator.pro/What-is__1%7C3_of__1%7C6_
[ "# What is 1/3 of 1/6 - Multiplying Fraction\n\nUse this calculator to add, subtract, multiply and divide fractions. How to figure out multiply 1/3 by 1/6?\n\n### Fraction Calculator\n\nPlease, enter two fractions the select the operation:\n\n=\n\n=" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8631352,"math_prob":0.9822624,"size":257,"snap":"2020-34-2020-40","text_gpt3_token_len":72,"char_repetition_ratio":0.16205534,"word_repetition_ratio":0.7,"special_character_ratio":0.27237353,"punctuation_ratio":0.14035088,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99891245,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-18T07:10:28Z\",\"WARC-Record-ID\":\"<urn:uuid:c7a3554e-9e8f-4b84-8ab7-bfe9ae248b8f>\",\"Content-Length\":\"32256\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:38917fab-ded0-4ad0-acb8-6799d00538f9>\",\"WARC-Concurrent-To\":\"<urn:uuid:9ac07a81-261d-4f49-a00f-b2dd7c555cf2>\",\"WARC-IP-Address\":\"104.18.49.216\",\"WARC-Target-URI\":\"https://fractioncalculator.pro/What-is__1%7C3_of__1%7C6_\",\"WARC-Payload-Digest\":\"sha1:D6GHTVONHL5XW4TWR54QTUXKR6XELHBE\",\"WARC-Block-Digest\":\"sha1:HDK5UPOXCDGOK636QXWN7XXCPUIVIYDN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400187354.1_warc_CC-MAIN-20200918061627-20200918091627-00387.warc.gz\"}"}
https://sources.debian.org/src/mathomatic/14.0.6-2/globals.c/
[ "File: globals.c\n\npackage info (click to toggle)\nmathomatic 14.0.6-2\n `1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798` ``````/* * Mathomatic global variables and arrays. * C initializes global variables and arrays to zero by default. * This is required for proper operation. * * Copyright (C) 1987-2008 George Gesslein II. * * Most global variables for Mathomatic are defined here and duplicated in \"externs.h\". */ #include \"includes.h\" int n_tokens = DEFAULT_N_TOKENS; /* maximum size of expressions, must only be set during startup */ int n_equations; /* number of equation spaces allocated */ int cur_equation; /* current equation space number (origin 0) */ /* expression storage pointers and current length (they go together) */ token_type *lhs[N_EQUATIONS], /* The Left Hand Sides of equation spaces */ *rhs[N_EQUATIONS]; /* The Right Hand Sides of equation spaces */ int n_lhs[N_EQUATIONS], /* number of tokens in each lhs[], 0 means equation space is empty */ n_rhs[N_EQUATIONS]; /* number of tokens in each rhs[], 0 means not an equation */ token_type *tlhs, /* LHS during solve and temporary storage for expressions */ *trhs, /* RHS during solve and temporary storage for expressions */ *tes, /* temporary equation side, used only in commands */ *scratch; /* very temporary storage for expressions */ int n_tlhs, /* number of tokens in tlhs */ n_trhs, /* number of tokens in trhs */ n_tes; /* number of tokens in tes */ token_type zero_token, /* the constant 0.0 as a token */ one_token; /* the constant 1.0 as a token */ /* set options */ int precision = 14; /* the display precision for doubles (number of digits) */ int case_sensitive_flag = true; /* \"set case_sensitive\" flag */ int factor_int_flag; /* factor integers when displaying expressions */ int display2d = true; /* \"set display2d\" flag */ int preserve_roots = true; /* set option to preserve roots like (2^.5) */ int true_modulus = true; /* true for mathematically correct modulus */ volatile int screen_columns = STANDARD_SCREEN_COLUMNS; /* screen width of the terminal; 0 = infinite */ volatile int screen_rows = STANDARD_SCREEN_ROWS; /* screen height of the terminal; 0 = infinite */ int finance_option; /* for displaying dollars and cents */ int autosolve = true; /* Allows solving by typing the variable name at the prompt */ int autocalc = true; /* Allows automatically calculating a numerical expression */ char special_variable_character = '\\\\'; /* user defined special character for variable names */ int integer_coefficients = true; /* if true, prefer displaying all integer coefficients */ int right_associative_power; /* if true, evaluate power operators right to left */ int power_starstar; /* if true, display power operator as \"**\" */ #if !SILENT int debug_level; /* current debug level */ #endif /* variables having to do with color mode */ int color_flag = true; /* \"set color\" flag, true for color mode */ int bold_colors; /* \"set bold_colors\" flag, true for bold colors if ANSI color mode */ int cur_color = -1; /* current color on the terminal */ int html_flag; /* true for HTML output mode */ /* epsilon constants */ double small_epsilon = 0.000000000000005; /* for small round-off errors */ double epsilon = 0.00000000000005; /* for larger, accumulated round-off errors */ /* string variables */ char *var_names[MAX_VAR_NAMES]; /* index for storage of variable name strings */ char var_str[MAX_VAR_LEN+80]; /* temp storage for listing a variable name */ char prompt_str[MAX_PROMPT_LEN]; /* temp storage for the prompt string */ #if CYGWIN char *dir_path; /* directory path to the executable, only set and used in CYGWIN version */ #endif char *prog_name = \"mathomatic\"; /* name of this program */ /* The following are for integer factoring (filled by factor_one()): */ double unique; /* storage for the unique prime factors */ int ucnt; /* number of times the factor occurs */ int uno; /* number of unique factors stored in unique[] */ /* misc. variables */ sign_array_type sign_array; /* for keeping track of unique \"sign\" variables */ FILE *gfp; /* global output file pointer */ jmp_buf jmp_save; /* for setjmp(3) to longjmp(3) to when an error happens deep within this code */ int test_mode; /* test mode flag (-t) */ int quiet_mode; /* quiet mode (-q, don't display prompts) */ int readline_enabled = true; /* set to false (-r) to disable readline */ int partial_flag; /* true for partial unfactoring of algebraic fractions */ int symb_flag; /* true for \"simplify symbolic\" */ int high_prec; /* flag to output constants in higher precision (used when saving equations) */ int input_column; /* current column number on the screen at the beginning of a parse */ int sign_cmp_flag; /* true when all \"sign\" variables are to compare equal */ int domain_check; /* flag to track domain errors in the pow() function */ int approximate_roots; /* true if in calculate command (force approximation of roots like (2^.5)) */ volatile int abort_flag; /* if true, abort current operation */ /* library variables go here */ const char *error_str; /* last error string */ char *result_str; /* returned result when using as library */ ``````" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.57813597,"math_prob":0.9449164,"size":5287,"snap":"2019-26-2019-30","text_gpt3_token_len":1348,"char_repetition_ratio":0.1404505,"word_repetition_ratio":0.028634362,"special_character_ratio":0.33251372,"punctuation_ratio":0.10851809,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9824195,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-17T01:35:37Z\",\"WARC-Record-ID\":\"<urn:uuid:3c5f2e5e-0ae2-4843-862c-03af8a859f9f>\",\"Content-Length\":\"21221\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4bb7bc40-7856-4017-99e9-1fd1ec4a9e13>\",\"WARC-Concurrent-To\":\"<urn:uuid:a06648eb-0235-4ac8-8dbd-2aaeb3f618b6>\",\"WARC-IP-Address\":\"5.153.231.38\",\"WARC-Target-URI\":\"https://sources.debian.org/src/mathomatic/14.0.6-2/globals.c/\",\"WARC-Payload-Digest\":\"sha1:3KFA3B43RM6CKNGSPC4QOUD2TZKZUW67\",\"WARC-Block-Digest\":\"sha1:TZ4W55OQQB5IDHU2NRPU7S6I7KOFFBMM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560627998339.2_warc_CC-MAIN-20190617002911-20190617024911-00212.warc.gz\"}"}
https://groups.google.com/g/comp.lang.python/c/A6koelKOO6s/m/hnjUH2MQC58J
[ "# recursion\n\n3 views\n\n### Gigs_\n\nSep 13, 2007, 9:59:07 AM9/13/07\nto\nCan someone explain me this\n\n>>> def f(l):\nif l == []:\nreturn []\nelse:\nreturn f(l[1:]) + l[:1] # <= cant figure this, how is all sum at the end?\n\nthanks!\n\n### Tom Wright\n\nSep 13, 2007, 10:08:44 AM9/13/07\nto\n\nIf you think about building up from the simplest case:\nf([]) = []\nf(['a']) = f([]) + ['a'] = [] + ['a'] = ['a']\n\nNow f(['a', 'b']) is going to be:\nf(['b']) + ['a']\n= ['b'] + ['a']\n= ['b', 'a']\n\nSimilarly, for f(['a', 'b', 'c']), that will be:\nf(['b', 'c']) + ['a']\n\nOf course, if you want to do this you can always use list.reverse() but I\nguess you're trying to get a handle on recursion rather than just reverse a\nlist. I find thinking up from the base case helps when trying to\nunderstand recursive code but when writing it, I tend to work the other way\naround.\n\n--\nI'm at CAMbridge, not SPAMbridge\n\n### Neil Cerutti\n\nSep 13, 2007, 12:01:48 PM9/13/07\nto\n\nIn plain English, the above program says:\n\nThe sum of the items in list l is zero if the list is empty.\nOtherwise, the sum is the value of the first item plus the sum of\nthe rest of the items in the list.\n\nWell, it would say that if it weren't somewhat buggy. l[:1]\ndoesn't evaluate to a number, but to a list containing one\nnumber, so the above program doesn't do what you say it does.\n\ndef my_sum(seq):\nif len(seq) == 0:\nreturn 0\nelse:\nreturn seq + my_sum(seq[1:])\n\nThe tough part of recursion is the leap of faith required to\nbelieve that it works. However, you can often use an inductive\nproof of correctness to help obviate the faith.\n\nProof that my_sum(seq) computes the sum of the items in seq (this\nproof is modeled on proofs written by Max Hailperin, Barbara\nKaiser, and Karl Knight, in _Concrete Abstractions_):\n\nBase case: my_sum(seq) terminates with value 0 when len(seq) is\nzero, because of the evaluation rules for if, len and ==.\n\nInduction hypothesis: Assume that my_sum(subseq) evaluates to\nthe sum of all the items in subsequence of seq, where 0 <=\nlen(subseq) < len(seq).\n\nInductive step: Consider evaluating my_sum(seq) where the\nlength of seq is greater than 0. This will terminate if\nmy_sum(seq[1:]) terminates, and will have the value of seq +\nmy_sum(seq[1:]). Because seq[1:] evaluates to the subsequence of\nthe rest of the items in seq (all except the first), and 0 <=\nlen(subseq) < len(seq), we can assume by our induction\nhypothesis that my_sum(seq[1:]) does terminate, with a value\nequal to the sum of the the rest of the items in seq.\nTherefore, seq + my_sum(seq[1:]) evaluates to seq + the\nsum of all the items in seq[1:]. Because seq + the sum of\nthe rest of the items in seq equals the sum of all the items in\nseq, we see that my_sum(seq) does terminate with the correct\nvalue for any arbitrary length of seq, under the inductive\nhypothesis of correct operation for subsequences of seq.\n\nConclusion: Therefore, by mathematical induction on the length\nof seq, my_sum(seq) terminates with the value of the sum of all\nthe items in seq for any length of seq.\n\nBut really I prefer the first first plain English version. ;)\n\n--\nNeil Cerutti\nFor those of you who have children and don't know it, we have a nursery\ndownstairs. --Church Bulletin Blooper\n\n### Ian Clark\n\nSep 13, 2007, 12:14:42 PM9/13/07\nto [email protected]\nNeil Cerutti wrote:\n> On 2007-09-13, Gigs_ <[email protected]> wrote:\n>> Can someone explain me this\n>>\n>>>>> def f(l):\n>> if l == []:\n>> return []\n>> else:\n>> return f(l[1:]) + l[:1] # <= cant figure this, how is all sum at the end?\n>\n> In plain English, the above program says:\n>\n> The sum of the items in list l is zero if the list is empty.\n> Otherwise, the sum is the value of the first item plus the sum of\n> the rest of the items in the list.\n\nAm I missing something? What does this have to do with summing?\n\n>>> def f(l):\n... if l == []:\n... return []\n... else:\n... return f(l[1:]) + l[:1]\n...\n>>> f([1, 2, 3, 4])\n[4, 3, 2, 1]\n\nIan\n\n### James Stroud\n\nSep 13, 2007, 1:20:45 PM9/13/07\nto\n\nRound Sum\n\n0 f([1, 2, 3, 4])\n1 f([2, 3, 4]) + \n2 f([3, 4]) + + \n3 f() + + + \n4 f([]) + + + + \n\nTotal [] + + + + = [4, 3, 2, 1]\n\nJames\n\n### Neil Cerutti\n\nSep 13, 2007, 1:32:38 PM9/13/07\nto\n\nIt says: You need to read more than the first sentence of a\nmessage before responsing:\n\n> Well, it would say that if it weren't somewhat buggy. l[:1]\n> doesn't evaluate to a number, but to a list containing one\n> number, so the above program doesn't do what you say it does.\n>\n> It should read something like:\n>\n> def my_sum(seq):\n> if len(seq) == 0:\n> return 0\n> else:\n> return seq + my_sum(seq[1:])\n\n--\nNeil Cerutti\n\n### Gigs_\n\nSep 14, 2007, 7:40:17 AM9/14/07\nto\nsorry i think that i express wrong. having problem with english\n\nwhat i mean is how python knows to add all thing at the end of recursion\n\n>>> def f(l):\nif l == []:\nreturn []\nelse:\nreturn f(l[1:]) + l[:1]\n\nf([1,2,3])\n\nrecursion1 f([2,3]) + \n\nrecursion2 f() + or [2, 1]?\n\nrecursion3 f([]) + or [3, 2, 1]\n\ni dont get all this\n\n>>> def f(l):\nif l == []:\n\nprint l\n\nreturn []\nelse:\nreturn f(l[1:]) + l[:1]\n\n>>> f([1,2,3])\n[]\n[3, 2, 1] # how this come here? how python save variables from each recursion?\n\nsorry again for first post\n\nthanks\n\n### Marc 'BlackJack' Rintsch\n\nSep 14, 2007, 8:04:51 AM9/14/07\nto\nOn Fri, 14 Sep 2007 13:40:17 +0200, Gigs_ wrote:\n\n> sorry i think that i express wrong. having problem with english\n>\n>\n> what i mean is how python knows to add all thing at the end of recursion\n\nBecause you have written code that tells Python to do so. ;-)\n\n> >>> def f(l):\n> if l == []:\n> return []\n> else:\n> return f(l[1:]) + l[:1]\n>\n>\n> f([1,2,3])\n>\n> recursion1 f([2,3]) + \n>\n> recursion2 f() + or [2, 1]?\n>\n> recursion3 f([]) + or [3, 2, 1]\n\nBoth alternatives in recursion 2 and 3 are wrong. You have to simply\nreplace the function invocation by its result which gives:\n\nf([1, 2, 3])\nr1 f([2, 3]) + \nr2 f() + + \nr3 f([]) + + + \nr4 [] + + + \n\nAnd now the calls return:\n\nr3 + + \nr2 [3, 2] + \nr1 [3, 2, 1]\n\n> i dont get all this\n>\n> >>> def f(l):\n> if l == []:\n> print l\n> return []\n> else:\n> return f(l[1:]) + l[:1]\n>\n> >>> f([1,2,3])\n> []\n> [3, 2, 1] # how this come here? how python save variables from each\n> recursion?\n\nThere is not just one `l` but one distinct `l` in each call.\n\nCiao,\nMarc 'BlackJack' Rintsch\n\n### Steve Holden\n\nSep 14, 2007, 8:47:18 AM9/14/07\nto [email protected]\nI think the thing you are missing is that the recursive call f(l[1:]) in\nthe return statement causes the current call to be suspended until the\nrecursive call is complete. The new call has its own value for l, which\nis the caller's l[1:]. Each new call creates a completely new namespace.\n\nA less complicated function might make it a little more obvious.\n\ndef factorial(n):\nprint \"n =\", n\nif n=0:\nreturn 1\nelse:\nreturn n * factorial(n-1)\n\nTry running that with a few different arguments to show you how the\nrecursion works.\n\nregards\nSteve\n--\nSteve Holden +1 571 484 6266 +1 800 494 3119\nHolden Web LLC/Ltd http://www.holdenweb.com\nSkype: holdenweb http://del.icio.us/steve.holden\n\nSorry, the dog ate my .sigline\n\n### John Machin\n\nSep 14, 2007, 8:53:07 AM9/14/07\nto\n\nI reckon that what the OP wants is a simple explanation of how\nfunction calls use a stack mechanism for arguments and local\nvariables, and how this allows recursive calls, unlike the good ol'\nFORTRAN IV of blessed memory. Perhaps someone could oblige him?\n\nI'd try but it's time for my beauty sleep :-)\n<yawn>\nGood night all\nJohn\n\n### Gigs_\n\nSep 14, 2007, 9:58:39 AM9/14/07\nto\nif n==0:\n\nreturn 1\nelse:\nreturn n * factorial(n-1)\n\n>>> factorial(3)\nn = 3\nn = 2\nn = 1\nn = 0\n6\n\nnow i understand. but one question at the end this function return 1. how python\nknows that it needs to multiply 1 with all recursive returns. (why python didnt\nsum recursive return with 1?)\n\nthat will be all, thanks in advance\n\n### J. Clifford Dyer\n\nSep 14, 2007, 9:43:27 AM9/14/07\nto Gigs_\n\nOn Fri, Sep 14, 2007 at 01:40:17PM +0200, Gigs_ wrote regarding Re: recursion:\n>\n> what i mean is how python knows to add all thing at the end of recursion\n>\n> >>> def f(l):\n> if l == []:\n> return []\n> else:\n> return f(l[1:]) + l[:1]\n>\n\nThe following script does exactly the same thing, except it creates print\nstatements to help you figure out what's going on, and it binds f(L[1:]) to\na variable so you can use it again.\n\ndef f(L): # l capitalized to accentuate difference between l and 1.\nprint \"L =\", L\nprint \"L[1:] =\", L[1:]\nprint \"L[:1] =\", L[:1]\nif L == []:\nprint \"Return: \", []\nreturn []\nelse:\nnext = f(L[1:])\nprint \"Return: \", next, \"+\", L[:1], \"=\", next + L[:1]\nreturn next + L[:1]\n\nif __name__=='__main__':\nprint f(['A', 'B', 'C', 'D'])\n\nTry it out. See what happens.\n\nCheers,\nCliff\n\n### Neil Cerutti\n\nSep 14, 2007, 10:20:41 AM9/14/07\nto\n\nI may as well stick my neck out again, since I'm already\nbeautiful. ;)\n\nAnother way of understanding recursion is to break it up into\nseperate functions, so the spectre of a function calling itself\ndoesn't appear.\n\ndef f(l):\nif l == []:\nreturn []\nelse:\nreturn f(l[1:]) + l[:1]\n\nThe function above reverses a list of arbitrary length. To help\nunderstand how it works, I'll write several discreet functions\nthat sort lists of fixed lengths.\n\nonly comes with experience), reversing a two-element list:\n\ndef f2(l): # reverse a two-element list\nreturn [l, l]\n\nNext build up to the next level, writing a function that can\nreverse a three-element list. The key is to be as lazy as\npossible. You must figure out a way of taking advantage of the\nfunction that reverses a two-element list. The obvious solution\nis to use f2 to reverse the last two elements in our list, and\nappend the first element in the list to that result:\n\ndef f3(l): # reverse a three-element list\nreturn f2(l[1:]) + l[:1]\n\nAnd so on:\n\ndef f4(l):\nreturn f3(l[1:]) + l[:1]\n\ndef f5(l):\nreturn f4(l[1:]) + l[:1]\n\ndef f6(l):\nreturn f5(l[1:]) + l[:1]\n\nA definite pattern had emerged, and it should be apparent now how\nto combine all those functions into one:\n\ndef f_(l):\nif len(l) == 2:\nreturn [l, l]\nelse:\nreturn f_(l[1:]) + l[:1]\n\nBut the function above breaks for lists with less than two items.\n\n>>> f_()\nTraceback (most recent call last):\nFile \"<stdin>\", line 1, in <module>\nFile \"<stdin>\", line 2, in f2\nIndexError: list index out of range\n\nWe can handle that. The reverse of a zero or one-element list is\njust itself.\n\ndef f_(l):\nif len(l) < 2:\nreturn l\nelif len(l) == 2:\nreturn [l, l]\nelse:\nreturn f_(l[1:]) + l[:1]\n\nAnd we've arrived at an OK recursive function that can handle\narbitrary length lists. It's not as simple as it could be,\nhowever. A little intuitive leap, perhaps, will allow you to note\nthat the case of a two-element list can actually be handled\nwithout a special case:\n\ndef f(l):\nif len(l) < 2:\nreturn l\n\nelse:\nreturn f(l[1:]) + l[:1]\n\nFinal note: for reasons of tradition, base cases are almost\nalways set up as it was in the original function, checking for a\nzero-length list, and returning a new empty list, the truly\nsimplest base case. Another intuitive leap is possibly required\nto note that a one-element list is not a special case after all:\nit's a reverse of a zero-element list with that one element\nappended.\n\ndef f(l):\nif len(l) == 0:\n\nreturn []\nelse:\nreturn f(l[1:]) + l[:1]\n\nClear as mud?\n\n--\nNeil Cerutti\n\n### Marc 'BlackJack' Rintsch\n\nSep 14, 2007, 10:38:16 AM9/14/07\nto\nOn Fri, 14 Sep 2007 15:58:39 +0200, Gigs_ wrote:\n\n> >>> def factorial(n):\n> print \"n =\", n\n> if n==0:\n> return 1\n> else:\n> return n * factorial(n-1)\n>\n> >>> factorial(3)\n> n = 3\n> n = 2\n> n = 1\n> n = 0\n> 6\n>\n>\n> now i understand. but one question at the end this function return 1. how python\n> knows that it needs to multiply 1 with all recursive returns. (why python didnt\n> sum recursive return with 1?)\n\nBecause there is a ``*`` and not a ``+`` in the last line of the function.\n\nLet's play this through (I abbreviate the function name to just `f()`):\n\nExecution of f(3) leads to the second return:\n\nr1 f(3): return 3 * f(2)\n\nThis multiplication can't take place until ``f(2)`` is calculated so the\ncurrent function call is \"suspended\" and evaluated later, when the result\nof ``f(2)`` is known. The call in that line is replaces with the result\n\nr2 f(2): return 2 * f(1)\n\nThe same again, another call to `f()` with 1 as argument:\n\nr3 f(1): return 1 * f(0)\n\nNow the last call takes the other ``if`` branch:\n\nr4 f(0): return 1\n\nThe 1 is returned to the previus call:\n\nr3 f(1): return 1 * 1\n\nThis can be evaluated now and is returned to its caller:\n\nr2 f(2): return 2 * 1\n\nAgain this is evaluated and returned to its caller:\n\nr1 f(3): return 3 * 2\n\nAnd here we have the final result that is returned from the first call to\n`f()`.\n\nCiao,\nMarc 'BlackJack' Rintsch\n\n### Steve Holden\n\nSep 14, 2007, 10:47:22 AM9/14/07\nto [email protected]\nGigs_ wrote:\n> Steve Holden wrote:\n[...]\n\n>>\n>> regards\n>> Steve\n> >>> def factorial(n):\n> print \"n =\", n\n> if n==0:\n> return 1\n> else:\n> return n * factorial(n-1)\n>\n> >>> factorial(3)\n> n = 3\n> n = 2\n> n = 1\n> n = 0\n> 6\n>\n>\n> now i understand. but one question at the end this function return 1. how python\n> knows that it needs to multiply 1 with all recursive returns. (why python didnt\n> sum recursive return with 1?)\n>\n>\n> that will be all, thanks in advance\n\nAah, that's the magic of recursion (not that it's really magic at all).\n\nWhen you call factorial(3), the function sees the value of n as 3. So\nthe if condition is false, so it must execute the return statement.\n\nIn order to do that it has to multiply n by the value of factorial n-1.\nSo it makes a call to a *new copy* of factorial, and this one has the\nvalue 2 for n. The if statement again needs to execute the return\nstatement, and before it can do that it needs the value of factorial\nn-1, so it makes a call to a *new copy* of factorial, and this one has\nthe value 1 for n. The if statement again needs to execute the return\nstatement, and before it can do that it needs the value of factorial\nn-1, so it makes a call to a *new copy* of factorial, and this one has\nthe value 0 for n. [Are you detecting a pattern here?].\n\nFinally *this* copy of factorial can immediately return the value of 1\nto its caller, which then multiplies that by 1 and returns it ti *its\ncaller, which multiplies it by 2 and returns that to *its* caller, when\nmultiplies it by 3 and returns the result, 6.\n\nIn other words, the computer builds a \"stack\" of partially-completed\nfunctions, and unwinds it when the innermost (topmost, whatever) finally\nsees that it can return a result without creating another stacked call\nto factorial.\n\nHope this straightens it out for you, it's a bit of a head-twister when\nyou first come across it.\n\n### Terry Reedy\n\nSep 14, 2007, 1:06:03 PM9/14/07\nto [email protected]\n\n\"Marc 'BlackJack' Rintsch\" <[email protected]> wrote in message\nnews:[email protected]...\n\n| f([1, 2, 3])\n| r1 f([2, 3]) + \n| r2 f() + + \n| r3 f([]) + + + \n| r4 [] + + + \n\nI might help to note that the above is effectively parenthesized\n\n( ( ([]+{3]) + ) +)\n\n*and* that each addition (in each pair of parentheses) is done\nin a different execution frame (see below).\n\n| And now the calls return:\n|\n| r3 + + \n| r2 [3, 2] + \n| r1 [3, 2, 1]\n\n| > [3, 2, 1] # how this come here? how python save variables from each\n| > recursion?\n\n*Each time* a function is called, an execution frame is created(1) that is\nseparate from the function object itself. Each execution frame has its own\nset of local variables. In particular, each has its own slices of the\noriginal list.\n\nThere have been languages, for instance, Fortran IV, where local variables\nwere part of the function 'object' and which therefore prohibited recursion\nbecause of the very problem you alluded to in your question. (My guess is\nthe functions had an InUse flag that was checked when the function was\ncalled.)\n\ntjr\n\n(1) A minor variation would be for function objects to have one\npre-allocated execution frame for non-recursive calls and others allocated\nas needed for recursive calls.\n\n### John Machin\n\nSep 14, 2007, 6:04:01 PM9/14/07\nto\nOn Sep 15, 3:06 am, \"Terry Reedy\" <[email protected]> wrote:\n>\n> There have been languages, for instance, Fortran IV, where local variables\n> were part of the function 'object' and which therefore prohibited recursion\n> because of the very problem you alluded to in your question. (My guess is\n> the functions had an InUse flag that was checked when the function was\n> called.)\n\nNo way. Waste of space for instructions to check the flag at the start\nand reset it at the end. Waste of CPU time. Divide by zero? Subroutine\ncalls itself? Drive against the traffic flow on the freeway? Expected\noutcome: crash or other unwanted result. Simple: don't do that! Why\nbother checking? No self-respecting FORTRAN programmer would want to\nuse recursion anyway. And mixed case in a variable name? Sheesh." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8556673,"math_prob":0.93013114,"size":13699,"snap":"2022-27-2022-33","text_gpt3_token_len":4043,"char_repetition_ratio":0.13012049,"word_repetition_ratio":0.15292758,"special_character_ratio":0.3260822,"punctuation_ratio":0.1440508,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9849052,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-26T18:23:12Z\",\"WARC-Record-ID\":\"<urn:uuid:24837080-4cc3-4592-9f33-b9e58fde83b3>\",\"Content-Length\":\"675082\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:de2b284b-e4b6-4803-adff-53b46ff31ee9>\",\"WARC-Concurrent-To\":\"<urn:uuid:6bd12e54-d59a-486e-a3d6-f4e69e2789d2>\",\"WARC-IP-Address\":\"172.253.122.139\",\"WARC-Target-URI\":\"https://groups.google.com/g/comp.lang.python/c/A6koelKOO6s/m/hnjUH2MQC58J\",\"WARC-Payload-Digest\":\"sha1:XYH3C7375RIBG54MXG77NWD4PCF6FUGY\",\"WARC-Block-Digest\":\"sha1:DCI3W35V4HVJEEXGCIVSFE4O452EAFMU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103271763.15_warc_CC-MAIN-20220626161834-20220626191834-00425.warc.gz\"}"}
https://www2.bartleby.com/essay/Regression-Analysis-In-Machine-Learning-FCZ5ECL4R
[ "# Regression Analysis In Machine Learning\n\n732 Words3 Pages\nReview paper – Regression Analysis in Machine Learning Abstract- Machine learning is the indispensable quality of artificial intelligence. Predicting or numeric featuring is called Regression in the statistical literature and it is the subject of research in both machine learning and statistics. Regression analysis in its simplest form is a method of fitting of a line through a given set of data points plotted on a graph in which the points are dependent on both the parameters which are stated on the x-axis and y-axis. Through regression analysis we aim to build predictive models which will consist of parameters on which we input the value of one parameter and get the output of the other parameter (no matter which technique of regression we…show more content…\nOne of the main features of supervised learning algorithms is that they model dependencies and relationships between the target output and input features to predict the value for new data. Regression algorithms predict the output values based on input features from the data fed in the system. The go-to methodology is the algorithm builds a model on the features of Types of Regression- There are 7 main types of regression models which are used in machine learning and data interpretation Linear regression- Linear regression which is of two types simple and multiple is the first of the few common things taught in learning the predictive model, it creates the relation between two types of dependent and independent where the independent can be of two types that is continuous and discrete. This type of regression is used to calculate the value of the outcome of the variable Y based on the input of the variable X. The mathematical equation of the linear regression is as follows: Y= β1 + β2X + ϵ Where β1 is the intercept and β2 is the slope. They are called the regression coefficients and ϵ is the error term Linear Regression can be represent by the equation of line y=(a+b)*x +c where a and b are the intercept and c is the error term given in the equation we have different ways to find out the values of a and…show more content…\nThen we have to remove collinearity which is followed by gaussian distributions and then comes rescaling the inputs. To obtain the best fit line- the least square line method is the easiest and most common way of making a regression line. If the datasets are well defined there is no better regression than linear regression, but it can suffer from multicollinearity, heteroscedasticity etc. Logistic regression- The logistic regression model is the method to fit a regression curve of y and x where Y=f(x) when y is categorical variable.it is used to find the probability of how much chance there is suh a case that the event is success or the same event is a failure. Logistic regression model is binary to check is if the answer is 0 or 1 as in on or off ; true or false. This model is also called as the binomial logistic model since the variable to predict is binary, also this model can also predict the data series if there is a dependent variable which can assume more than 2" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9487351,"math_prob":0.9845845,"size":3766,"snap":"2022-40-2023-06","text_gpt3_token_len":749,"char_repetition_ratio":0.081871346,"word_repetition_ratio":0.003508772,"special_character_ratio":0.19516729,"punctuation_ratio":0.093701996,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.9996673,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-03T06:14:35Z\",\"WARC-Record-ID\":\"<urn:uuid:61b531db-75c1-4a9f-afe3-689fcad53682>\",\"Content-Length\":\"35891\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f591796-dee9-4773-8419-20a6b7517bd2>\",\"WARC-Concurrent-To\":\"<urn:uuid:26ea6d6b-df93-4464-b41d-3b47db75d56e>\",\"WARC-IP-Address\":\"108.138.85.65\",\"WARC-Target-URI\":\"https://www2.bartleby.com/essay/Regression-Analysis-In-Machine-Learning-FCZ5ECL4R\",\"WARC-Payload-Digest\":\"sha1:7MQU2QBS4ZSTUQQHE7GBPR3AZYTR5BOG\",\"WARC-Block-Digest\":\"sha1:55A4SBDAHNIIFCU7QDO7MQH5IUDJHJZT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500044.16_warc_CC-MAIN-20230203055519-20230203085519-00468.warc.gz\"}"}
https://geekalgo.com/python/python-christmas-tree/
[ "Home » Blog » Make a Python Christmas tree using the Numpy module\n\n# Make a Python Christmas tree using the Numpy module\n\n• Projects, Python\n\n### Introduction:\n\nOne of the key features of Python is its focus on code readability, which is achieved through the use of indentation and straightforward syntax. This makes it an excellent language for beginners to learn and understand programming concepts. Python’s philosophy of “readability counts” emphasizes the importance of writing code that is easy to comprehend, making it a great choice for collaborative projects and maintaining existing codebases.\n\nPython is a versatile language that supports both procedural and object-oriented programming paradigms. It offers a vast standard library, providing a rich set of modules and functions that can be used for various purposes, ranging from web development and data analysis to artificial intelligence and scientific computing. Additionally, Python has a large and active community, which means there are plenty of resources, tutorials, and libraries available to help developers solve problems and streamline their development process.\n\nDue to its simplicity and versatility, Python has been adopted by various industries and domains, including web development, data science, machine learning, and automation. Its ease of use, combined with its powerful capabilities, has made it a popular choice for both beginners and experienced developers alike. Whether you’re just starting your programming journey or looking to expand your skill set, Python provides a solid foundation and endless possibilities for building a wide range of applications.\n\n### Numpy:\n\nNumPy is a fundamental Python library that stands for “Numerical Python.” It provides a powerful array object called `ndarray`, which allows you to efficiently store and manipulate large, multidimensional arrays of homogeneous data. NumPy is widely used in scientific computing, data analysis, and machine learning due to its speed, efficiency, and extensive mathematical functions.\n\nOne of the main advantages of NumPy is its ability to perform element-wise operations on arrays, which means that operations are automatically applied to each element of the array without the need for explicit loops. This feature significantly improves performance and simplifies the code. NumPy also provides a wide range of mathematical functions, such as trigonometric functions, exponential functions, statistical functions, and linear algebra operations.\n\nAnother essential feature of NumPy is its support for multidimensional arrays. The `ndarray` object allows you to create arrays with any number of dimensions, from simple one-dimensional arrays to complex multidimensional arrays. This makes NumPy particularly useful for handling data with multiple dimensions, such as images, time series, or scientific simulations.\n\nNumPy also provides a set of tools for efficient array manipulation, including indexing, slicing, reshaping, and concatenating arrays. These operations enable you to extract specific elements or subarrays from an array, change the shape of an array, or combine multiple arrays together. NumPy’s indexing capabilities are particularly powerful, allowing you to access and modify specific elements or subsets of an array based on Boolean conditions or integer indices.\n\nIn addition to its core functionality, NumPy integrates well with other Python libraries, such as pandas for data analysis and matplotlib for data visualization. Many libraries in the scientific Python ecosystem rely on NumPy as a foundation, making it an essential tool for any data scientist or researcher working with numerical data.\n\nIn summary, NumPy is a powerful Python module that provides efficient and flexible tools for working with large, multi-dimensional arrays and performing a wide range of mathematical operations. It is a fundamental component of the scientific Python ecosystem and is widely used for data manipulation, numerical computations, and scientific simulations.\n\nSimple Projects using turtle\n\n## Make Christmas tree:\n\nI am writing the code for a Christmas tree made by using the NumPy module. It is simple to write. It is just 12 line code. Here we go,\n\n``````import numpy as np\n\nx = np.arange(7,16)\ny = np.arange(1,10)\n\nz = np.column_stack((x[::-1],y))\nfor i,j in z:\nprint(' '*i + \"*\"*(2*j))\nfor r in range(3):\nprint(' '*13,' || ')\nprint(' '*12, end = ' \\====/')\nprint(' ')``````\n\nArange Function: The `arange` function is useful for creating sequences of numbers that can be used for various purposes, such as generating indices for array manipulation, creating custom ranges for looping, or specifying time intervals in simulations.\n\nColumn_stack: The `column_stack` function in NumPy is a utility function that is used to stack 1-D arrays as columns into a 2-D array. It takes a sequence of 1-D arrays as input and returns a 2-D array where each input array is treated as a column. The `column_stack` function is particularly useful when you want to combine multiple 1-D arrays into a single 2-D array, where each array becomes a column.\n\nsince z is a 2-dimensional array with two columns, with values of x stacked vertically as the first column, and values of y stacked as the second column. when we use,\n\n``for i,j in z:``\n\ni and j take the corresponding element from x and y simultaneously based on the iteration.\n\n### Let’s see the output of it:\n\nAfter running this it will look like as shown in the image. Let’s see how it looks.\n\n## 4 thoughts on “Make a Python Christmas tree using the Numpy module”\n\n1.", null, "This site was… how do I say it? Relevant!! Finally I have\nfound something that helped me. Many thanks!\n\n2.", null, "Hello Dear, are you in fact visiting this web site on a regular basis,\nif so after that you will without doubt get fastidious know-how.\n\n3.", null, "Highly descriptive post, I enjoyed that a lot. Will there be a part 2?\n\n1.", null, "Thank you for your comment. I don’t think that I will make part 2 of this blog." ]
[ null, "data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==", null, "data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==", null, "data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==", null, "data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8936919,"math_prob":0.833876,"size":5702,"snap":"2023-14-2023-23","text_gpt3_token_len":1119,"char_repetition_ratio":0.111793615,"word_repetition_ratio":0.009029346,"special_character_ratio":0.19642231,"punctuation_ratio":0.11820782,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95851964,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-04T07:27:36Z\",\"WARC-Record-ID\":\"<urn:uuid:08ba8ab8-3183-4b8a-9ac0-46ec4f26275d>\",\"Content-Length\":\"94113\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4388559c-d042-4998-bb21-624824df0e7c>\",\"WARC-Concurrent-To\":\"<urn:uuid:99e2a256-345c-488e-b390-586f8a0a98dd>\",\"WARC-IP-Address\":\"52.226.134.64\",\"WARC-Target-URI\":\"https://geekalgo.com/python/python-christmas-tree/\",\"WARC-Payload-Digest\":\"sha1:XTQPK7FD5AJ5KIPD2IY4S2PLUQPVYK4N\",\"WARC-Block-Digest\":\"sha1:W5UVUYTFCOSB2VK5UWLH3326AVXBNTHB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224649518.12_warc_CC-MAIN-20230604061300-20230604091300-00787.warc.gz\"}"}
https://www.doubtnut.com/question-answer/if-sina-b1-2cosa-b1-20lta-ble90-a-gt-b-then-find-a-and-b-449652031
[ "Getting Image", null, "", null, "", null, "", null, "Register now for special offers", null, "+91\n\nHome\n\n>\n\nEnglish\n\n>\n\nClass 10\n\n>\n\nMaths\n\n>\n\nChapter\n\n>\n\nMbd New Style Model Test Paper -1\n\n>\n\nIf sin(A-B)=(1)/(2),cos(A+B)=(...", null, "Text Solution\n\nAnswer :  A = 45^@, B = 15^@\n\n## Related Videos\n\n645000562\n\n300\n\n1.2 K\n\n1:32\nIf sin(A-B)=1/2,cos(A+B)=1/2,0^(@)ltA+Ble90^(@),AgtB, find A and B.\n76132350\n\n3.4 K\n\n9.1 K\n\n2:03\nयदि (A-B)=1/2,cos(A+B)=1/2,0^(@)ltA+Ble90^(@),AgtB तो A और B ज्ञात कीजिए।\n441436550\n\n0\n\n3.3 K\n\nIf sin(A+B)=(sqrt3)/(2) and sin(A-B)=(1)/(2), 0^(@)lt A+Ble90^(@), A gt B, then find the value of A and B.\n544312571\n\n0\n\n8.0 K\n\n2:57\nIf tan (A+B) = sqrt3 and tan(A-B)=1/sqrt3,0^(@)ltA+Ble90^(@),A gt B , find A and B .\n646954708\n\n0\n\n2.5 K\n\n1:53\nIf tan(A+B)=sqrt3 and tan(A-B)=1/sqrt3 , 0^@angleA+Ble90^@ , A>B, find A and B .\n441436549\n\n5.3 K\n\n6.8 K\n\n2:54\nIf tan(A+B)=sqrt3 and tan(A-B)=(1)/(sqrt3),0^(@)lt A+Ble90^(@), A gt B, then find the value of A and B.", null, "", null, "" ]
[ null, "https://d10lpgp6xz60nq.cloudfront.net/images/doubtnut_header_logo_white_new.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/mweb-us-icon-small-camera.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/video-page-ic-search-white.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/mweb-home-white-hamburger-icon.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/mweb-india-country-flag-small.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/mweb-icon-video-page-icon-small-text-book.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/user-comment.svg", null, "https://d10lpgp6xz60nq.cloudfront.net/images/loader.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.58325183,"math_prob":0.999464,"size":280,"snap":"2022-40-2023-06","text_gpt3_token_len":82,"char_repetition_ratio":0.028985508,"word_repetition_ratio":0.0,"special_character_ratio":0.26785713,"punctuation_ratio":0.14285715,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998629,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-29T21:12:03Z\",\"WARC-Record-ID\":\"<urn:uuid:249c0676-c244-4740-aeef-a0536741ed20>\",\"Content-Length\":\"236219\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:31024429-3d74-459e-85a1-c07bdd6f9b8d>\",\"WARC-Concurrent-To\":\"<urn:uuid:b3000c48-9d79-4c8b-bb3a-14452b298f6c>\",\"WARC-IP-Address\":\"99.84.191.66\",\"WARC-Target-URI\":\"https://www.doubtnut.com/question-answer/if-sina-b1-2cosa-b1-20lta-ble90-a-gt-b-then-find-a-and-b-449652031\",\"WARC-Payload-Digest\":\"sha1:Q4YYQKEUIZVHVTCWFZMLRCY5P5CYOEUY\",\"WARC-Block-Digest\":\"sha1:5RSQB4MLWQWBW64QAPCZQXVRYE3PM3Q5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335365.63_warc_CC-MAIN-20220929194230-20220929224230-00178.warc.gz\"}"}
https://www.abheist.com/5-non-constructible-change/
[ "## Non-Constructible Change", null, "", null, "Given an array of positive integers representing the values of coins in your possession, write a function that returns the minimum amount of change (the minimum sum of money) that you cannot create. The given coins can have any positive integer value and aren’t necessarily unique (i.e., you can have multiple coins of the same value).\n\nFor example, if you’re given coins = [1, 2, 5], the minimum amount of change that you can’t create is 4. If you’re given no coins, the minimum amount of change that you can’t create is 1.\n\n### Sample Input\n\n`1coins = [5, 7, 1, 1, 2, 3, 22]`\n\n`120`\n\n### Hints\n\nHint 1\n\nOne approach to solve this problem is to attempt to create every single amount of change, starting at 1 and going up until you eventually can’t create an amount. While this approach works, there is a better one.\n\nHint 2\n\nStart by sorting the input array. Since you’re trying to find the minimum amount of change that you can’t create, it makes sense to consider the smallest coins first.\n\nHint 3\n\nTo understand the trick to this problem, consider the following example: coins = [1, 2, 4]. With this set of coins, we can create 1, 2, 3, 4, 5, 6, 7 cents worth of change. Now, if we were to add a coin of value 9 to this set, we would not be able to create 8 cents. However, if we were to add a coin of value 7, we would be able to create 8 cents, and we would also be able to create all values of change from 1 to 15. Why is this the case?\n\nHint 4\n\nCreate a variable to store the amount of change that you can currently create up to. Sort all of your coins, and loop through them in ascending order. At every iteration, compare the current coin to the amount of change that you can currently create up to. Here are the two scenarios that you’ll encounter:\n\n• The coin value is greater than the amount of change that you can currently create plus 1.\n• The coin value is smaller than or equal to the amount of change that you can currently create plus 1.\n\nIn the first scenario, you simply return the current amount of change that you can create plus 1, because you can’t create that amount of change. In the second scenario, you add the value of the coin to the amount of change that you can currently create up to, and you continue iterating through the coins.\n\nThe reason for this is that, if you’re in the second scenario, you can create all of the values of change that you can currently create plus the value of the coin that you just considered. If you’re given coins [1, 2], then you can make 1, 2, 3 cents. So if you add a coin of value 4, then you can make 4 + 1 cents, 4 + 2 cents, and 4 + 3 cents. Thus, you can make up to 7 cents.\n\nOptimal Space & Time Complexity\n\n`O(nlogn) time | O(1) space - where n is the number of coins`\n\n`1function nonConstructibleChange(coins) {2 // if no coins return 13 coins.sort((a,b) => a - b);4 5 let currentValue = 0;6 for (let coin of coins) {7 if (coin > currentValue + 1) return currentValue + 1;8 9 currentValue += coin;10 }11 12 return currentValue + 1;13}`\n\n🎒\n\nDo you have any questions, or simply wish to contact me privately? Don't hesitate to shoot me a DM on Twitter.\n\nHave a wonderful day.\nAbhishek 🙏\n\n##### Subscribe to my newsletter\n\nGet email from me about my ideas, full-stack development resources, tricks and tips as well as exclusive previews of upcoming articles.\n\nNo spam. Just the highest quality ideas you’ll find on the web.\n\nThanks for reading. It makes a difference. I'll try to help developers with tutorials & blogs. Blogs on design, development and happy-productive life. And it will also support and motivate me to share my knowledge with the community.\n\n© 2022, ABHISHEK KUMAR SINGH 🌺" ]
[ null, "data:image/svg+xml;charset=utf-8,%3Csvg height='491' width='1152' xmlns='http://www.w3.org/2000/svg' version='1.1'%3E%3C/svg%3E", null, "data:image/svg+xml,%3csvg%20xmlns='http://www.w3.org/2000/svg'%20width='1152'%20height='491'%20viewBox='0%200%201152%20491'%20preserveAspectRatio='none'%3e%3cpath%20d='M0%20246v245h90c91%200%2096%200%2093-3-1-2%200-3%204-7%202-1%202-1%202%201l1%201h1c1%201%202%201%205-1%205-2%207-2%207%200l-1%201h-2l1%201v1l-2%202c-1-1-7%201-8%203-1%201%209%201%2080%201a370%20370%200%200087-3v-2l1-2c2%200%202%201%202%202-1%201%200%202%201%203%203%203%2024%203%2027%200h2a494%20494%200%200084%202%2012385%2012385%200%2000312-3c-2%200-2%200%200-2h2l1%201v-1l1-2%201-2c0-1%201-2%205-2%205-1%207-1%206%201s3%204%206%204l4-1-2-1v-1h3v4l2%201%202%202c0%202%201%202%2031%202s31%200%2028-2l-3-2c0-1%205-2%207-1h3l4%203h-3l-2%201%2021%201c19%200%2020%200%2019-2h2c3%202%2010%202%20115%202h113V0H0v246m405-36c-18%204-28%2020-26%2041%203%2021%2015%2032%2036%2031%2020-1%2029-11%2029-31l1-7-16-1h-15v12h16v3c-3%2012-21%2015-30%206-8-9-7-31%202-38%208-7%2020-5%2025%204%202%203%202%203%2010%203s8%200%205-6c-5-12-22-20-37-17m73%200c-10%202-18%208-23%2018-4%209-4%2027%200%2035%203%207%208%2013%2013%2015%203%202%204%202%203%203-2%202-1%203%203%203l12-1c15-1%2025-7%2031-19%202-6%203-7%203-18s-1-12-3-18c-7-14-23-21-39-18m378%200c-12%204-17%2010-17%2021s5%2017%2019%2020c18%204%2020%205%2020%2011-1%2010-21%2011-26%201-2-3-2-3-8-3-8%200-8%201-7%206%203%2010%2013%2016%2028%2016%2019%200%2031-11%2028-25-2-11-7-14-27-19-12-2-16-8-11-13%206-7%2023-3%2023%205l7%201c8%200%209-1%205-8-5-11-21-16-34-13m-102%201l-1%2035v35h14v-24c-1-27-2-28%2010%204l8%2020h11l7-20%2010-23c1-3%201%200%201%2020v23h14v-70h-16c-1%200-5%208-11%2024l-11%2025-10-25-10-24-8-1-8%201m-474%203a4324%204324%200%2000-24%2066l8%201h8l3-8%202-9h25l3%209%202%208h8l8-1-13-35-11-34h-9c-9%200-9%200-10%203m50%2032v35h46v-12h-31v-58h-15v35m199-1v34h-3l-2%201%202%201h10l9-1%202-2v-1c-3%200-2-1%202-3%203-2%204-2%206-1h8c1-1%202%201%203%203l2%205h18l-7-13-7-14%205-5c9-8%2010-22%201-31-5-6-9-7-31-7h-18v34m65-26l-1%2035v27h16v-26l-1-35v-9h-14v8m22-2l1%206h20v58h15v-5c0-6%200-6%204-7l3-1h-7v-45h20v-12h-56v6m64%2029v35h15v-29h31v29h16v-70h-15v28h-32v-28h-15v35m-202-23c-14%207-15%2037-1%2044%207%203%2016%202%2020-2%2012-11%209-36-4-42h-15m66%2010v11h9c11-1%2013-2%2015-8%202-9-3-14-16-14h-8v11m-258%204l-5%2014c0%202%201%202%208%202h9v-3l-8-25-4%2012m259%2027l1%207h4a167%20167%200%20019-1h2c1-2%200-3-2-8l-3-6h-11v8M400%20377l-11%201-5%201-4%204c-1%200-2-1-1-2%200-3%200-3-4-3-3%200-4%200-4%202l1%201-1%202c-3%202-5%202-11%203l-9%201-3%201-3%201-2%201-2%201-5%202c-4%202-5%202-5%205l1%204%201%202c0%201%200%202%201%201l1-2c-1-1%200-2%203-4%205-2%208-2%206%200%200%202%208%200%2011-2%203-1%206-2%204%200-1%201-1%201%201%201l4%201h3l3-2%204-1h2c0%202%202%201%203-1a2833%202833%200%200110-1l2-2%202-1c0-2%205-5%208-5l1-1v-1c1-1%202-2%201-3l2-2c2%200%203-3%201-3l-6%201m188%2011l-3%201a2408%202408%200%2001-10%202c-7%201-8%203-1%203%206%201%2014%200%2014-1h2l2-1%203-3%203-1h-4l-4-1-2%201m309%203l-2%201-7%201c-3%201-2%204%201%205l2%201h11l8-1c7%200%208-1%201-1l-3-2-3-1h-3l1-1v-2c-3-2-6-3-6%200'%20fill='%235945e4'%20fill-rule='evenodd'/%3e%3c/svg%3e", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86787736,"math_prob":0.9165022,"size":3066,"snap":"2022-40-2023-06","text_gpt3_token_len":792,"char_repetition_ratio":0.2034618,"word_repetition_ratio":0.13597246,"special_character_ratio":0.26418787,"punctuation_ratio":0.12220566,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9596393,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-27T01:10:11Z\",\"WARC-Record-ID\":\"<urn:uuid:b670a702-23c2-46dd-b52a-e21ef1e55a44>\",\"Content-Length\":\"142555\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:8ab0838e-6c60-4587-b872-cef4c9c4914a>\",\"WARC-Concurrent-To\":\"<urn:uuid:c00208c2-44ae-4a2e-924a-5c78e97fda33>\",\"WARC-IP-Address\":\"76.76.21.98\",\"WARC-Target-URI\":\"https://www.abheist.com/5-non-constructible-change/\",\"WARC-Payload-Digest\":\"sha1:RISA4QIAXH36EUMA52M4WXA5SUMK77I7\",\"WARC-Block-Digest\":\"sha1:ZL2OOLBWC5MXQ45INTSTLTIO6C5SZ2IE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334974.57_warc_CC-MAIN-20220927002241-20220927032241-00332.warc.gz\"}"}
https://www.gradesaver.com/textbooks/science/physics/university-physics-with-modern-physics-14th-edition/chapter-9-rotation-of-rigid-bodies-problems-exercises-page-297/9-43
[ "## University Physics with Modern Physics (14th Edition)\n\nLet $v$ be the speed of the stone after it drops a height $h$. We can calculate the required speed $v$. $KE = \\frac{1}{2}I\\omega^2 = 4.50~J$ $\\frac{1}{2}(\\frac{1}{2}m_p~r^2)(\\frac{v}{r})^2 = 4.50~J$ $v^2 = \\frac{(4)(4.50~J)}{m_p}$ $v^2 = \\frac{(4)(4.50~J)}{2.50~kg}$ $v^2 = 7.20~m^2/s^2$ We can find the required height $h$ for the stone to fall. $m_sgh = \\frac{1}{2}m_sv^2+\\frac{1}{2}I\\omega^2$ $m_sgh = \\frac{1}{2}m_sv^2+\\frac{1}{2}(\\frac{1}{2}m_p~r^2)(\\frac{v}{r})^2$ $m_sgh = \\frac{1}{2}m_sv^2+\\frac{1}{4}m_p~v^2$ $h = \\frac{v^2~(\\frac{1}{2}m_s+\\frac{1}{4}m_p)}{m_s~g}$ $h = \\frac{(7.20~m^2/s^2)~[\\frac{1}{2}(1.50~kg)+\\frac{1}{4}(2.50~kg)]}{(1.50~kg)(9.80~m/s^2)}$ $h = 0.673~m$ (b) We can find the kinetic energy of the stone. $KE = \\frac{1}{2}m_sv^2$ $KE = \\frac{1}{2}(1.50~kg)(7.20~m^2/s^2)$ $KE = 5.40~J$ We can find the percent of kinetic energy in the pulley. $\\frac{4.50~J}{4.50~J+5.40~J}\\times 100\\% = 45.5\\%$ The pulley has 45.5% of the total kinetic energy." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6343683,"math_prob":1.0000099,"size":1066,"snap":"2019-43-2019-47","text_gpt3_token_len":532,"char_repetition_ratio":0.21280603,"word_repetition_ratio":0.07874016,"special_character_ratio":0.5393996,"punctuation_ratio":0.09931507,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000085,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-22T17:16:03Z\",\"WARC-Record-ID\":\"<urn:uuid:008ced69-3139-4cc4-b06b-c789eb577f04>\",\"Content-Length\":\"68076\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f78b194b-ef2e-4e3b-8cb9-78fda0cf687e>\",\"WARC-Concurrent-To\":\"<urn:uuid:e39029a1-4856-45a5-95de-725aedfcbef6>\",\"WARC-IP-Address\":\"54.82.171.166\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/science/physics/university-physics-with-modern-physics-14th-edition/chapter-9-rotation-of-rigid-bodies-problems-exercises-page-297/9-43\",\"WARC-Payload-Digest\":\"sha1:ENZ6YGKLNB5BVUZTYT3WQ3NHOHMKRGIW\",\"WARC-Block-Digest\":\"sha1:MM6WBINM5NVOCLM2LSULFQHS3AO5Y7ZO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496671411.14_warc_CC-MAIN-20191122171140-20191122200140-00388.warc.gz\"}"}
https://metanumbers.com/13290340
[ "## 13290340\n\n13,290,340 (thirteen million two hundred ninety thousand three hundred forty) is an even eight-digits composite number following 13290339 and preceding 13290341. In scientific notation, it is written as 1.329034 × 107. The sum of its digits is 22. It has a total of 6 prime factors and 48 positive divisors. There are 4,476,672 positive integers (up to 13290340) that are relatively prime to 13290340.\n\n## Basic properties\n\n• Is Prime? No\n• Number parity Even\n• Number length 8\n• Sum of Digits 22\n• Digital Root 4\n\n## Name\n\nShort name 13 million 290 thousand 340 thirteen million two hundred ninety thousand three hundred forty\n\n## Notation\n\nScientific notation 1.329034 × 107 13.29034 × 106\n\n## Prime Factorization of 13290340\n\nPrime Factorization 22 × 5 × 7 × 59 × 1609\n\nComposite number\nDistinct Factors Total Factors Radical ω(n) 5 Total number of distinct prime factors Ω(n) 6 Total number of prime factors rad(n) 6645170 Product of the distinct prime numbers λ(n) 1 Returns the parity of Ω(n), such that λ(n) = (-1)Ω(n) μ(n) 0 Returns: 1, if n has an even number of prime factors (and is square free) −1, if n has an odd number of prime factors (and is square free) 0, if n has a squared prime factor Λ(n) 0 Returns log(p) if n is a power pk of any prime p (for any k >= 1), else returns 0\n\nThe prime factorization of 13,290,340 is 22 × 5 × 7 × 59 × 1609. Since it has a total of 6 prime factors, 13,290,340 is a composite number.\n\n## Divisors of 13290340\n\n48 divisors\n\n Even divisors 32 16 8 8\nTotal Divisors Sum of Divisors Aliquot Sum τ(n) 48 Total number of the positive divisors of n σ(n) 3.24576e+07 Sum of all the positive divisors of n s(n) 1.91673e+07 Sum of the proper positive divisors of n A(n) 676200 Returns the sum of divisors (σ(n)) divided by the total number of divisors (τ(n)) G(n) 3645.59 Returns the nth root of the product of n divisors H(n) 19.6545 Returns the total number of divisors (τ(n)) divided by the sum of the reciprocal of each divisors\n\nThe number 13,290,340 can be divided by 48 positive divisors (out of which 32 are even, and 16 are odd). The sum of these divisors (counting 13,290,340) is 32,457,600, the average is 676,200.\n\n## Other Arithmetic Functions (n = 13290340)\n\n1 φ(n) n\nEuler Totient Carmichael Lambda Prime Pi φ(n) 4476672 Total number of positive integers not greater than n that are coprime to n λ(n) 46632 Smallest positive number such that aλ(n) ≡ 1 (mod n) for all a coprime to n π(n) ≈ 865440 Total number of primes less than or equal to n r2(n) 0 The number of ways n can be represented as the sum of 2 squares\n\nThere are 4,476,672 positive integers (less than 13,290,340) that are coprime with 13,290,340. And there are approximately 865,440 prime numbers less than or equal to 13,290,340.\n\n## Divisibility of 13290340\n\n m n mod m 2 3 4 5 6 7 8 9 0 1 0 0 4 0 4 4\n\nThe number 13,290,340 is divisible by 2, 4, 5 and 7.\n\n• Arithmetic\n• Abundant\n\n• Polite\n• Practical\n\n## Base conversion (13290340)\n\nBase System Value\n2 Binary 110010101100101101100100\n3 Ternary 221000012220211\n4 Quaternary 302230231210\n5 Quinary 11400242330\n6 Senary 1152505204\n8 Octal 62545544\n10 Decimal 13290340\n12 Duodecimal 454b204\n20 Vigesimal 4315h0\n36 Base36 7wuw4\n\n## Basic calculations (n = 13290340)\n\n### Multiplication\n\nn×i\n n×2 26580680 39871020 53161360 66451700\n\n### Division\n\nni\n n⁄2 6.64517e+06 4.43011e+06 3.32258e+06 2.65807e+06\n\n### Exponentiation\n\nni\n n2 176633137315600 2347514450191011304000 31199265197951605174003360000 414648842230944136308263815542400000\n\n### Nth Root\n\ni√n\n 2√n 3645.59 236.871 60.3787 26.5893\n\n## 13290340 as geometric shapes\n\n### Circle\n\n Diameter 2.65807e+07 8.35057e+07 5.54909e+14\n\n### Sphere\n\n Volume 9.83325e+21 2.21964e+15 8.35057e+07\n\n### Square\n\nLength = n\n Perimeter 5.31614e+07 1.76633e+14 1.87954e+07\n\n### Cube\n\nLength = n\n Surface area 1.0598e+15 2.34751e+21 2.30195e+07\n\n### Equilateral Triangle\n\nLength = n\n Perimeter 3.9871e+07 7.64844e+13 1.15098e+07\n\n### Triangular Pyramid\n\nLength = n\n Surface area 3.05938e+14 2.76657e+20 1.08515e+07\n\n## Cryptographic Hash Functions\n\nmd5 78d705f25e7ebb82a808b2ae20b737c9 174aef534cf46c342f5c1b7c5b5172fd89e3a7df 5ec26548a1b1f78ea5ec3a196af5d28de1672af43f9cd9895b67e3073e1f7333 af862e2b2415f03492ebc449ae8d5ea4dfb00283836815ada38ab6095fb921ca0fbe78e6860547e77866a23d99be62648fb048fdd39c569e7a0647eb2df9d234 deb7d92003efc4e9d162777301261c7d5f8dbd19" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6252299,"math_prob":0.9845502,"size":4814,"snap":"2020-34-2020-40","text_gpt3_token_len":1718,"char_repetition_ratio":0.12099792,"word_repetition_ratio":0.044992745,"special_character_ratio":0.47943497,"punctuation_ratio":0.08968059,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9955876,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-21T20:23:02Z\",\"WARC-Record-ID\":\"<urn:uuid:07b767db-0b41-461e-bae8-68445dfa79f2>\",\"Content-Length\":\"49176\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0e7d2498-762e-4ca7-9030-57533e1972d4>\",\"WARC-Concurrent-To\":\"<urn:uuid:762ea009-0ca5-4461-ad3d-79562599d95e>\",\"WARC-IP-Address\":\"46.105.53.190\",\"WARC-Target-URI\":\"https://metanumbers.com/13290340\",\"WARC-Payload-Digest\":\"sha1:MO4RAJGFBYP3BA42TFVTPJJE67VWPVWF\",\"WARC-Block-Digest\":\"sha1:MZDQMQLP45FCS5KOWR2JNGIKVSRDCVCN\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400202007.15_warc_CC-MAIN-20200921175057-20200921205057-00431.warc.gz\"}"}
https://blog.myrank.co.in/carnots-ideal-refrigerator/
[ "# Carnot’s Ideal Refrigerator\n\nAny device removing heat from the cold place and adding it to a hotter place is called a “refrigerator”. It is essentially a heat engine running back-wards. In a heat engine, the working substance takes in heat from a body at a higher temperature, converts a part of it into mechanical work, and gives out the rest to a body at a lower temperature. In refrigerator, a working substance takes in heat from a body at a lower temperature, has a net amount of work done on it by an external agent, and gives out a larger amount heat to a hot body (fig. 4). Thus, it continually transfer heat from a cold to a hot body at the expense of mechanical energy supplied to it by an external agent. The working substance is called “refrigerant”.\n\nThe engine employing the Carnot cycle may be adopted as a refrigerator. Each step in the cycle is reversible, therefore it is possible to reverse the entire cycle.", null, "Let Q2 be the heat removed from the cold body at temperature T2, W the work done on the refrigerant, and Q1 the heat delivered to the hot body at temperature T1. Then, we have\n\nQ1 = Q2 + W\n\nOr\n\nW = Q1 – Q2 = Q2 (Q1/Q2 – 1)\n\nAs in Carnot’s, if we use an ideal gas as working substance, we can show that\n\nQ1/Q2 = T1/T2\n\n∴ W = Q2 (T1/T2– 1) = Q2 (T1– T2/T2)\n\nThis is the expression for the work that must be supplied to run the refrigerator.\n\nCoefficient of Performance:\n\nThis purpose of the refrigerator is remove as much heat Q2as possible from the cold body with expenditure of a little work (W) as possible. Therefore, a measure of the performance of the refrigerator is expressed by the “coefficient of performance” K which is defined as the ratio of the heat taken from the cold body to the work needed to run the refrigerator. That is\n\nK = Q2/W\n\nSubstituting the value of W in the above equation we get\n\nK = T2/T1 – T2\n\nThis is the expression for the coefficient performance. A good refrigerator should have a high coefficient of performance, typically 5 or 6. Thicker and high quality insulation tends to increase the coefficient of performance.\n\nExample: A refrigerator is to maintain eatables kept inside at 90C. If room temperature is 360C. Calculate the coefficient of performance.\n\nAnswer: Here T1 = 360C = 36 + 273 = 309K\n\nT2 = 100C = 10 + 273 = 283K\n\nCOP = T2/T1 – T2 = 283/309 – 283\n\n= 283/26 = 10.9" ]
[ null, "http://blog.myrank.co.in/wp-content/uploads/2017/05/Carnots-Ideal-Refrigerator.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.91370827,"math_prob":0.975164,"size":2291,"snap":"2020-34-2020-40","text_gpt3_token_len":589,"char_repetition_ratio":0.13904679,"word_repetition_ratio":0.041860465,"special_character_ratio":0.26538628,"punctuation_ratio":0.08278867,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98914343,"pos_list":[0,1,2],"im_url_duplicate_count":[null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-12T17:28:25Z\",\"WARC-Record-ID\":\"<urn:uuid:05707d02-db4b-4de2-938a-63840f3e0fd7>\",\"Content-Length\":\"236056\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f2452ba4-e19d-40a2-b9f9-3cfc86c42585>\",\"WARC-Concurrent-To\":\"<urn:uuid:e9974ef2-cdb7-4fc4-9528-4b2c92a31765>\",\"WARC-IP-Address\":\"162.144.143.67\",\"WARC-Target-URI\":\"https://blog.myrank.co.in/carnots-ideal-refrigerator/\",\"WARC-Payload-Digest\":\"sha1:UD2LXGWA2YFOK73MBRQULNUQ2YZT65NG\",\"WARC-Block-Digest\":\"sha1:KHI4H6Q5BX6DT2JPSKSWA5U3OKNN2Z2X\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738913.60_warc_CC-MAIN-20200812171125-20200812201125-00124.warc.gz\"}"}
https://socratic.org/questions/how-do-you-rationalize-the-denominator-and-simplify-3-sqrt3-1
[ "# How do you rationalize the denominator and simplify 3/(sqrt3-1)?\n\n$= 3 \\frac{\\sqrt{3} + 1}{2}$\nMultiplying numerator and denominator of$\\frac{3}{\\sqrt{3} - 1}$ by $\\sqrt{3} + 1$\n3(sqrt3+1)/((sqrt3-1)(sqrt3+1)\n$= 3 \\frac{\\sqrt{3} + 1}{3 - 1}$\n$= 3 \\frac{\\sqrt{3} + 1}{2}$" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5679517,"math_prob":1.0000099,"size":275,"snap":"2020-34-2020-40","text_gpt3_token_len":66,"char_repetition_ratio":0.11439114,"word_repetition_ratio":0.0,"special_character_ratio":0.22545454,"punctuation_ratio":0.06382979,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999924,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-24T06:05:16Z\",\"WARC-Record-ID\":\"<urn:uuid:a176a2f7-6a62-4c89-9c3e-e8e5a82bbcac>\",\"Content-Length\":\"32440\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:30fb4e0c-2ad1-4869-b4e9-a68b03f25825>\",\"WARC-Concurrent-To\":\"<urn:uuid:48a71015-3501-4f64-9d64-e743ba324564>\",\"WARC-IP-Address\":\"216.239.38.21\",\"WARC-Target-URI\":\"https://socratic.org/questions/how-do-you-rationalize-the-denominator-and-simplify-3-sqrt3-1\",\"WARC-Payload-Digest\":\"sha1:BZWK5IQ7IBXNA6I6VBFTZJVAMYQ5AFFU\",\"WARC-Block-Digest\":\"sha1:3OZ6LDAYJ2UWHVITINEZYRZC4OTLBSNI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400213454.52_warc_CC-MAIN-20200924034208-20200924064208-00473.warc.gz\"}"}
https://www.excel-learner.com/how-to-fix-the-excel-error-an-item-name-cannot-be-found-check-that-youve-typed-the-name-correctly-and-the-item-is-present-in-the-pivottable-report/
[ "# How To Fix The Excel Error An Item Name Cannot Be Found, Check That You’ve Typed The Name Correctly And The Item Is Present In The PivotTable Report\n\nRecently when I add a calculated field in an excel PivotTable, I encounter the error An item name cannot be found, check that you’ve typed the name correctly and the item is present in the PivotTable report. In this article, I will tell you how to fix this error.\n\n## 1. How To Fix The Excel Error An Item Name Cannot Be Found, Check That You’ve Typed The Name Correctly And The Item Is Present In The PivotTable Report.\n\n1. Below is the error dialog box, this error happened when I click the Add button to add a calculated field to an excel PivotTable.", null, "2. The reason for this error is that the item name Sales in the formula =SUM(Sales)/SUM(Quantity) is not correct.\n3. From the Fileds list, we can see that the item Sales is a string field because there is a white space at the beginning of the item.\n4. So you should insert the field Sales to the formula by first inputting the text =SUM( in the Formula input text box.\n5. Then select the item Sales from the Fields list and then click the Insert Field button to insert the item into the formula.\n6. And then you will get the formula like =SUM(‘Sales’.\n7. Input the left part of the formula using the same steps, then you can get the entire formula text =SUM(‘Sales’)/SUM(Quantity) in the Formula input text box.\n8. Now when you click the Add button to add the calculated field, the error will be fixed.\n9. The main reason for this error is that you select or typed the wrong field name so that it can not find the item name from the fields list.\n10. So you had better use the Insert Field button to add the existing field to the formula, then it will insert the correct field name to the formula." ]
[ null, "https://www.excel-learner.com/wp-content/uploads/2023/03/excel-pivot-table-add-calculated-field-using-formula-an-item-name-cannot-be-found-error.webp", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7723265,"math_prob":0.5335936,"size":1634,"snap":"2023-40-2023-50","text_gpt3_token_len":368,"char_repetition_ratio":0.1588957,"word_repetition_ratio":0.052117262,"special_character_ratio":0.2239902,"punctuation_ratio":0.06906907,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9846151,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-01T04:42:40Z\",\"WARC-Record-ID\":\"<urn:uuid:38db1ff7-4099-42b3-a9c4-3e82331a6f8d>\",\"Content-Length\":\"229766\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fc9d0271-27a6-4433-b8f8-5132e310ee8e>\",\"WARC-Concurrent-To\":\"<urn:uuid:6b2bbf76-966d-407b-b285-a65fb79322a3>\",\"WARC-IP-Address\":\"172.67.182.225\",\"WARC-Target-URI\":\"https://www.excel-learner.com/how-to-fix-the-excel-error-an-item-name-cannot-be-found-check-that-youve-typed-the-name-correctly-and-the-item-is-present-in-the-pivottable-report/\",\"WARC-Payload-Digest\":\"sha1:WCOLGKUET476VV5FX46RHTQPRWZLXKGW\",\"WARC-Block-Digest\":\"sha1:J3PTLDJT4DKNQXSRJQP6TOUJJZQ2G42B\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510781.66_warc_CC-MAIN-20231001041719-20231001071719-00493.warc.gz\"}"}
https://forums.aat.org.uk/Forum/discussion/comment/455331/
[ "Current updates regarding coronavirus (Covid-19) and the precautions AAT are taking will be continually updated on the below page.\n\nWe hope you are all safe and well and if you need us we will be here. 💚\n\n# HELP!!!\n\nedited June 2017\nHello,\n\nI'm wondering if someone could please offer me some assistance when working out interpolation equations.\n\n10% + 5510/14080 x 10 = 13.9 - 14 %\n\nI just cant seem to get 13.9% or 14% when I work this out with a calculator. is there something I am missing out or am I just not working it out correctly?\n\nAny help or assistance will be greatly appreciated\n\n• edited June 2017\nLooks like it works to me, maybe its the order of calculations throwing you off.\n\nDivision and multiplication first:\n(5510/14080) = 0.39134\n0.39134 x 10 = 3.9 (to 1 d.p)\n10+3.9= 13.9% or 14% rounded up\n\nHope this helps.\n• Thank you. But please can I ask how you are meant to know the order of those equations when in the textbook you are shown a formula to follow? Is there an easier way to reach this conclusion? I am finding this most confusing, nowhere in my AAT textbook is the equation explained the way you have explained above.\n\nMany thanks", null, "• All mathematical calculations follow the rules of BODMAS/BIDMAS which determines the order in which to solve the equation.\n\nBrackets\nOrder / Index\nDivision\nMultiplication" ]
[ null, "https://forums.aat.org.uk/plugins/emojiextender/emoji/twitter/smile.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8539768,"math_prob":0.8585941,"size":1558,"snap":"2020-34-2020-40","text_gpt3_token_len":430,"char_repetition_ratio":0.09266409,"word_repetition_ratio":0.61538464,"special_character_ratio":0.28626445,"punctuation_ratio":0.099358976,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9740736,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-12T07:13:01Z\",\"WARC-Record-ID\":\"<urn:uuid:2323e7c4-65a9-4b20-9d22-c4b58982a378>\",\"Content-Length\":\"51186\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:14663f1d-01b2-4137-82a9-5c3fb9aa2a3d>\",\"WARC-Concurrent-To\":\"<urn:uuid:d5aa98c3-17fc-45d0-b7f0-856f40937c64>\",\"WARC-IP-Address\":\"162.159.128.79\",\"WARC-Target-URI\":\"https://forums.aat.org.uk/Forum/discussion/comment/455331/\",\"WARC-Payload-Digest\":\"sha1:YNMES2OMF6EN7HK45YXMW5ONW2EJR3OV\",\"WARC-Block-Digest\":\"sha1:7KZ4K7ULCHRLQCCZIJ3V7OGJKZCXYIYX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738878.11_warc_CC-MAIN-20200812053726-20200812083726-00394.warc.gz\"}"}
https://www.hindawi.com/journals/js/2015/506909/
[ "/ / Article\nSpecial Issue\n\n## Energy-Efficient Data Fusion Technique and Applications in Wireless Sensor Networks\n\nView this Special Issue\n\nResearch Article | Open Access\n\nVolume 2015 |Article ID 506909 | https://doi.org/10.1155/2015/506909\n\nChao Chen, Kyogu Lee, Joon-Sang Park, Seung Jun Baek, \"Minimum Cost Data Aggregation for Wireless Sensor Networks Computing Functions of Sensed Data\", Journal of Sensors, vol. 2015, Article ID 506909, 17 pages, 2015. https://doi.org/10.1155/2015/506909\n\n# Minimum Cost Data Aggregation for Wireless Sensor Networks Computing Functions of Sensed Data\n\nAcademic Editor: Yun Liu\nReceived11 Dec 2014\nAccepted12 Jan 2015\nPublished01 Jun 2015\n\n#### Abstract\n\nWe consider a problem of minimum cost (energy) data aggregation in wireless sensor networks computing certain functions of sensed data. We use in-network aggregation such that data can be combined at the intermediate nodes en route to the sink. We consider two types of functions: firstly the summation-type which includes sum, mean, and weighted sum, and secondly the extreme-type which includes max and min. However for both types of functions the problem turns out to be NP-hard. We first show that, for sum and mean, there exist algorithms which can approximate the optimal cost by a factor logarithmic in the number of sources. For weighted sum we obtain a similar result for Gaussian sources. Next we reveal that the problem for extreme-type functions is intrinsically different from that for summation-type functions. We then propose a novel algorithm based on the crucial tradeoff in reducing costs between local aggregation of flows and finding a low cost path to the sink: the algorithm is shown to empirically find the best tradeoff point. We argue that the algorithm is applicable to many other similar types of problems. Simulation results show that significant cost savings can be achieved by the proposed algorithm.\n\n#### 1. Introduction\n\nMotivation. In this paper we consider the problem of minimum cost (energy) data aggregation in wireless sensor networks (WSN) where the aggregated data is to be reported to a single sink. A common objective of WSN is to retrieve certain summary of sensed data instead of the entire set of data. The relevant summary is defined as a certain function applied to a set of measured data . Specifically we are given a function such that, for a set of measurement data , the goal of the sink is to retrieve . Examples of are  mean,  max,  min, and so forth. When  mean function is used, . For applications such as “alarm” systems, one can use  max as , for example, where can be temperature values in forest-fire monitoring systems or the structural stress values measured in a building. We will refer to as a summary function throughout this paper. Certain types of allow us to combine data at the intermediate nodes en route to the sink. Such combining techniques are commonly referred to as in-network aggregation . By using in-network aggregation one can potentially save communication costs by reducing the amount of traffic . For instance, in the applications such as wireless multimedia sensor networks (WMSN) where the transmitted multimedia data has a far greater volume than that in typical WSNs, the in-network aggregation technique is crucial for the purpose of saving energy and extending network lifetime [8, 9]. While in-network aggregation offers many benefits, it poses significant challenge for network design, for example, designing routing algorithms so as to minimize costs such as energy expenditure and delay. In particular, we show that it is crucial to take into account how the summary function affects the statistical properties of sensed data.\n\nObjectives. In this paper we study the minimum cost aggregation problem for several types of . The performance of in-network aggregation relies heavily on the properties of the function . To be specific let us briefly look at the problem formulation. Consider the single-sink aggregation problem where we define the cost function as follows. Let denote the set of links in the network. We would like to minimizewhere represents the weight associated with link and represents the average number of bits transmitted over . Note that the objective similar to (1) has been considered in as well. The most relevant objective associated with (1) is the energy consumption. To see this, let us define weight where is the distance between nodes connected by Link , is the path loss exponent, and is the related channel parameter. Hence (1) is proportional to the total transmitted energy consumed throughout the data aggregation. Note in [13, 14], the authors consider the same energy cost function. We refer to as the aggregation cost function (we will use notation to denote the cost function in general, whereas is used to denote the cost function specifically on Link ). Note that depends on the source measurements aggregated on , and also on which is the summary function applied to the measurements. The work in also studies an aggregation problem in sensor networks computing summary functions, assuming that all the packets generated in the network have the same size. However, the amount of information generated at intermediate nodes may vary, since a summary of data can be statistically different from the original data, which is our key observation.\n\nLet us take an example. Consider the network in Figure 1 where Nodes 1 and 2 are the source nodes, and the node in shaded color represents the sink. The sink wants to receive a summary of information from Nodes 1 and 2. The sensor readings generated at Nodes 1 and 2 are represented by the random variables (RV) and , respectively. Since Node 1 is a “leaf” node, Node 1 will simply transmit the raw reading to Node 2. Node 2 will combine with its own data, , by computing the summary function which is then transmitted to the sink. We define the aggregation cost function as follows. Suppose the sensor information to be transmitted on Edge is random variable . The average number of bits to be transmitted on , or , is defined as (We temporarily ignore communication overheads incurred in addition to the sensor information, e.g., the packet header size. We will however take such overheads into account later when we formally define .)where denotes the entropy function. Note that the entropy function has been also adopted as cost function in [10, 12], and throughout this paper we will define in terms of . The average numbers of bits transmitted on Edges 1 and 2 are, respectively, given bySuppose is given by  sum. Since , the costs incurred at Edges 1 and 2, that is, and , are different. If we had used other types of , such as  max, we would have that which would incur different cost from the case where was  sum. In many cases we will assume symmetric sources; that is, depends only on the number of sensor readings to which is applied. In those cases we will treat as a function ; that is, (we will also examine the cases of asymmetric sources as well). We will show that determines the properties of such as convexity and monotonicity, and the structure of the aggregation problem heavily depends on those properties. Hence the aggregation scheme must be designed to capture key aspects of aggregation cost functions under the given summary function. The abovementioned links among summary functions, cost functions, and optimal aggregation strategies have not been previously well studied, as we will see in Section 2 through reviewing related works.\n\nContributions. In this paper we investigate the minimum energy aggregation problem for several widely used summary functions. We consider two types of . The first type is called the summation type which involves sums of measurements: specifically  sum,  mean, and  weighted sum. The second type is called the extreme type which is related to the extreme statistics of the data: specifically  max and  min. We will use the entropy function as the measure of information rate. We show that, when is  sum or  mean, and if the source data is i.i.d., is indeed concave and increasing, irrespective of the distribution of the source data. This implies that one can use well-known algorithms such as the Hierarchical Matching (HM) algorithm in order to approximate the optimal cost. When is  weighted sum however, it is unclear how we make association between the flow aggregation problem and the cost function. Nonetheless we prove that, if the source data is independent Gaussian random variables, there exists an efficient algorithm for the problem of aggregating  weighted sum of data with arbitrary weights.\n\nNext we consider extreme type summary functions such as  max. We will show that for certain distributions of source data, can be convex and decreasing in the (nonzero) number of aggregated measurements. Note that the single-sink aggregation problems for concave/increasing or convex/increasing cost functions [21, 22] have been widely studied, however convex and decreasing has not been well studied yet. We propose a novel algorithm which effectively captures such properties of . We begin by observing that there are two aspects in cost reduction as follows. Since is convex and decreasing, decreases faster when the number of aggregated data is smaller. The intuition is that it pays to locally aggregate data among nearby sources in the early stages of aggregation, that is, when the number of measurements aggregated at sensors is small. This leads us to find a low-cost local clustering of sources, which is a “microscopic” aspect of cost reduction. Meanwhile we need to simultaneously find a low-cost route to the sink, which must take the global structure of the network into account and thus is a “macroscopic” aspect of cost reduction. These are conflicting aspects and a good tradeoff point between them should be sought. To that end we propose Hierarchical Cover and Steiner Tree (HCST) algorithm. The algorithm consists of multiple stages and is designed to empirically find the best tradeoff point over the stages. We show that, by simulation, the algorithm can significantly reduce cost compared to baseline schemes such as a greedy heuristic using shortest path routing, or the HM algorithm.\n\nOur results show that the summary function can significantly impact the design of aggregation schemes. However there are many choices for : suppose for example, we would like to compute norm of the vector of measurement data. Note  sum  and  max  functions which we study in this paper are in fact related such that, if the measurement data is always positive, then  sum  function is simply norm and  max  is norm of a data vector. One could ask: what are good aggregation strategies if we take as a different norm, say norm? We leave such questions as future work.\n\nPaper Organization. We briefly review related work in Section 2. Section 3 introduces the model and problem formulation. Sections 4 and 5 discuss the optimal routing problem for summation and extreme type summary functions, respectively. Simulation results are presented in Section 6. Section 7 concludes the paper.\n\nIn general the single-sink aggregation problem to minimize (1) is NP-hard , and a substantial amount of research has been devoted to designing approximated algorithms depending on certain properties of . In our case it is important to note that such properties of are determined by the choice of . Let us briefly review the related work on the single sink aggregation problem for two types of . Most research on the single sink aggregation problem has focused on the case where is concave and increasing. Due to the concavity of , the link costs associated with the amount of aggregated data exhibit economies of scale, that is, the marginal cost of adding a flow at a link is cheaper when the current number of aggregated flows is greater at the link. Buy-at-bulk network design [23, 24] is based on such property of . A number of approximation algorithms have been proposed, for example, . When is known in advance, a constant factor approximation to the optimal cost is possible [20, 25]. Even when is unknown but is concave and increasing, Goel and Estrin have proposed a simple and randomized algorithm called Hierarchical Matching (HM). The algorithm computes minimum weight matchings of the source nodes hierarchically over stages, and outputs a tree for aggregation. HM algorithm can approximate the optimal cost by a factor logarithmic in the number of sources . Nonuniform variants of this problem such that differs among the links are also studied [26, 27] in which a polylogarithmic approximation to the optimal cost is shown to be achievable.\n\nThe case where is convex and increasing in the number of aggregated measurements has been studied in [21, 22]. Here exhibits (dis)economies of scale, that is, the marginal cost of routing a flow at a link is more expensive when a greater number of flows are aggregated at the link. Such phenomenon can be observed from many applications, such as speed scaling of microprocessors modeled by where is the clock speed, and are constants, and is the energy consumption at the processor. Notably the authors show that the problem can intrinsically differ from that for a concave and increasing . For example the authors show that constant-factor approximation algorithms do not exist for certain convex and increasing . They nevertheless proposed a constant factor approximation algorithm for the case . These results show that the single-sink aggregation problem crucially depends on certain properties of such as convexity. However, none of the above works deal with convex and decreasing which we will study in the sequel.\n\nThere have been many studies regarding the intermediate data combining in conjunction with routing in order for an efficient retrieval of the complete sensor readings. Scaling laws for achievable rates under joint source coding and routing are studied in . The work studies the problem of minimizing the flow costs under distributed source coding. They show that when is linear in , firstly applying Slepian-Wolf coding at the sources, and secondly routing coded information via shortest path tree from the sources to the sink is optimal. In a single-input coding model was adopted in which the coding of information among the nodes can be done only in pairs, but joint coding of the source data from more than two nodes is not allowed. Assuming reduction in packet size is a linear function of correlation coefficient between each pair of nodes, they proposed a minimum-energy routing algorithm. The impact of spatial correlation on routing has been explored in . They showed that, assuming the correlation decays over distance, it pays to form clusters of nearby nodes and aggregate data at the clusterheads. The aggregated information is then routed from clusterheads to the sink. The algorithm is shown to perform well for various correlation models. The tradeoff between integrity of aggregated information and energy consumption has been studied in . Further works on in-network aggregation combined with routing include [30, 31] which propose efficient protocols for routing excessive values among sensed data. A scheme using spatially adaptive aggregation so as to mitigate traffic congestion was proposed in .\n\nThe above works aim at retrieving the entire set of data, instead of a summary, subject to certain degrees of data integrity. In our case, we design energy efficient aggregation schemes to compute the summary function of the sensor readings. Also in the above mentioned works, the in-network aggregation reduces cost mainly by removing correlation among the data set. In our work, by contrast, we will focus on losslessly retrieving a summary of statistically independent sensor readings. We assume the independence of sensor readings because we would like to decouple the cost savings from removing correlation, and the savings from applying the summary function in association with aggregation strategies; we focus on the latter. Moreover, the assumption of the independence among the readings represents the “worst” case in terms of cost savings, since one cannot reduce the energy cost by removing correlations in sensor readings. In fact, the independence assumption can be valid in certain cases. For example, consider a large sensor network assuming that the sensed data is spatially correlated and the correlation decays quickly over distance. If the source nodes are sparsely deployed and thus tend to be far apart from one another, the correlation among their data can be very weak. Obviously such sparse node placement is motivated by cost efficiency: sparse placement of nodes enables us to reap as much information given a fixed number of sensor devices, assuming that the network senses a homogeneous field and the measure of information is given by the joint entropy function.\n\n#### 3. Model\n\n##### 3.1. Preliminaries\n\nWe are given an undirected graph where and denote the set of vertices and edges, respectively. For , denotes the (undirected) edge connecting nodes and . For each edge in we associate a weight defined by . A weight captures the cost of transmitting unit amount of data between two nodes, for example, expenditure of transmission energy in order to compensate path loss. The set denotes the set of source nodes, that is, the nodes which generate measurement data to be reported to the sink. Also define where denotes the cardinality of a set. For a source node , its measured data is modeled by an RV denoted by . We assume that ’s are independent and identically distributed among the sources. The measured data is to be aggregated at the sink node denoted by . The nodes which are not source nodes act as relays in the aggregation process. For simplicity we will assume that any node in the network transmits data at most once during the aggregation process. Such an assumption has been made in other works such as . Thus the routes for aggregation constitute a tree whose root is given by . We refer to such tree as an aggregation tree. The aggregation process is performed as follows. The sources initiate transmissions. An intermediate node waits for all the data from the sources which are descendants of the node to arrive. Next the node computes the summary function of the aggregated data which is then relayed to the next hop.\n\nIn this paper a summary function is defined to be a nonnegative function denoted by which is a divisible function. Divisible functions are a class of summary functions which can be computed in a divide-and-conquer manner . Divisible functions are defined as follows: given data samples, consider a partition of the samples into sets of size and denoted by and , respectively. If is divisible, holds for any and . Examples of divisible functions are  sum,  max  and  min. Particularly when is divisible, the aggregation can be performed in a divide-and-conquer manner as follows. Suppose a set of data samples are aggregated at a node. If the node is a source, it applies to the collected samples and its own data. If the node is simply a relay, it applies to the aggregated data samples to obtain a summary of the samples where the summary of its aggregated data is transmitted to the next hop.\n\nAbusing notation for the sake of simplicity, we let the function take a set, a vector, or their combination as its argument. For example if is  sum, , and , and also . For some , we define as the set of RVs representing the measurements from the nodes in ; that is, . Thus is the aggregation function applied to the set , for example, if is  sum  then\n\n##### 3.2. Problem Formulation\n\nWe will define the problem of minimizing communication costs as follows. There exists a sink to which the data is to be aggregated. Our goal is to find a minimum-cost aggregation tree rooted at the sink. We would like to solve the following aggregation problem:where represents the average number of bits communicated over Edge . Note that the objective of (5) has been considered in the works [10, 12] as well. We call as aggregation cost function which we define as follows.\n\nWe will use the entropy function as our measure of information rate similar to works [13, 14]. We assume that the average number of bits to represent random sensor measurement is given by . A precise definition of the entropy function depends on the nature of : if is a discrete RV, denotes the usual Shannon entropy. If is a continuous RV, is implicitly defined to be where is a discrete RV obtained by applying uniform scalar quantization to with some quantization step size, say for some integer . If the quantization precision is sufficiently high, it is known that where denotes the differential entropy of continuous RVs. Note that a similar approximation has been made in defining the information rates for continuous RVs in [13, 14]. Hence in this paper, we will assume that continuous RV incurs the cost of bits where is a sufficiently large parameter, and we denote such costs by .\n\nIn addition, the measured data is transmitted as a packet in the network. Hence for each packet transmission, there is an overhead of metadata, for example, packet header. For any measurement , no matter how small , there is always an overhead of transmitting such metadata in practice. We will assume the header length is fixed to bits throughout this paper. Hence the average number of bits required to send measurement information per transmission over a link is given byFor a given aggregation tree , let denote the path from a source to the sink. For a given Edge , let denote the set of source nodes whose aggregated measurements are transmitted over , that is, . The information to be communicated over Edge is the function applied to the set of measurement value from , that is, . Hence we define the aggregation cost function as follows:We would like to solve using the definition of given by (7). In the following sections we investigate several widely used summary functions and the associated optimal aggregation problems.\n\n#### 4. Aggregation Schemes for Summation-Type Summary Functions\n\nWe consider the summary functions of  sum,  mean, and  weighted sum.\n\n##### 4.1. sum  and  mean\n\nWe first discuss the case where is  sum. We have thatClearly  sum  is a divisible function. Thus the aggregation process is as follows: a node simply applies  sum  function to the aggregated data, and relays the aggregated information to the next hop.\n\nWhen the source data is i.i.d., we will show that there exists a randomized algorithm which finds an aggregation tree whose expected cost is within a factor of of the optimal cost to (5).\n\nProposition 1. Suppose ’s are i.i.d. For any distribution of , there exists an algorithm yielding the mean cost within a factor of of the optimal cost of .\nGoel and Estrin studied a single-sink data aggregation problem as follows. A source generates a unit flow which needs to be routed to a sink where the flows are aggregated though a tree. Their objective is to minimize the following cost function:where is the weight on Edge , is the number of flows on Edge and is a function that maps the total size of flow to its cost. They proposed an algorithm to minimize (9) when is a canonical aggregation function defined as follows.\n\nDefinition 2 (see ). The function is called a canonical aggregation function (CAF) if it has the following property: (1).(2) is increasing.(3) is concave.Their algorithm, called Hierarchical Matching (HM) , guarantees the mean cost to be within the factor of of the optimal irrespective of , provided that is a CAF. As mentioned previously, since ’s are i.i.d., depends only on . Specifically we will define as follows:We will show that is a CAF by showing that satisfies the three properties of Definition 2. Note this implies that HM algorithm can be used to approximately solve , since (9) and the objective of are identical.\n\nProof of Proposition 1. For the first property, it trivially holds that . For the second property, for any two independent RVs and , it is known that implying that , that is, the sum of independent RVs always increases entropy , which implies that is increasing in . For the third property, consider the following. It is shown in that the entropy of the sum of independent RVs is a submodular set function. That is, the following holds for independent RVs , and [34, Theorem I]:Now consider sensor measurements , and make substitutions , , and in (11). We have thatIf we apply the definition of given by (10) to (12), the following holds due to symmetry:Hence holds, or the slope is decreasing in , which implies that is concave on the domain of integers. Thus satisfies all the properties of Definition 2, and is a CAF. This implies that, by using HM algorithm, one can achieve the expected cost which is within the factor of of the optimal cost of .\n\nNext we consider  mean  as the summary function. Note that  mean, as well as  weighted sum considered in the next section, are not divisible functions in general. We will nevertheless show that the problem for those summary functions can be reduced to  sum  problem as follows. Suppose every source node is aware of the total number of the sources, that is, . In our scheme every source simply scales its measurement by prior to transmission, that is, Source transmits , then such scaled measurements are aggregated in a similar way as the  sum  problem. The average number of bits transmitted over Edge can be written as . Since ’s are i.i.d., for the minimum cost aggregation problem for  mean  we can use the same algorithm as that used for  sum, for example, HM algorithm.\n\n##### 4.2. weighted sum\n\nNext we consider the case where is  weighted  sum  as follows. We assign arbitrary weights , , to the source nodes. The goal of the sink is to compute . Our method of aggregation is similar to that for the case of  mean, that is, Source scales its measurement by , then transmits where the aggregation process is the same as that for  sum. However the effective source data seen by the network is no longer i.i.d., unless ’s are identical for all . The aggregation cost function is given byThe difficulty lies in it is difficult to associate a “flow” with the source data due to asymmetry, that is, the problem is no longer a flow optimization. Moreover, it is easily seen that (14) is not a CAF in general. Thus we restrict our attention to a specific distribution of . We will show that, if are independent Gaussian RVs, the problem for  weighted sum is indeed a single-sink aggregation problem with concave costs, and there exist algorithms similar to HM algorithm which have good approximation ratio. Specifically we prove that our problem is equivalent to the single-sink aggregation/flow optimization problem with nonuniform source demands.\n\nProposition 3. Suppose , and are independent. Let be  weighted sum with arbitrary weights . For sufficiently large , there exists an algorithm yielding the mean cost within a factor of of the optimal cost of .\n\nProof. Consider the information communicated over Edge denoted by :Since ’s are independent Gaussian RVs, is also Gaussian with variance where . Thus the differential entropy of is given byWe observe that, from (16), we can treat as the “flow” generated by Source , and the sum of flows at Edge incurs the entropy cost as in (16). Specifically we will make the following definitions:Here represents the (unsplittable) flow demand generated by Source , and denotes the minimum demand. Hence under a flow routing scheme, the total amount of flow at Link is given by . Then from (16), the associated communication cost incurred at Link is given by bits, that is, represents the information rate of a flow aggregated at Link . Unlike the previously defined cost functions, is no longer a function of the number of sources on a link, but instead the function of the amount of flow on that link. Finally we define the aggregation cost function in terms of as in (20) in order to meet the concavity condition for as follows: is essentially identical to , and ifone can show that is concave and increasing for all . Hence under the condition (21), is an increasing concave function of the total flow aggregated on a link. In that case we can use the algorithm proposed by Meyerson et al. which essentially extends the HM algorithm to the problems with nonuniform source flow demands, and can approximate the optimal cost by a factor of on average.\n\nIn summary, the key question was whether can be cast as a flow aggregation problem, if is  weighted sum. In general, it is difficult to make such association due to asymmetry; however, we revealed that such formulation is possible for independent Gaussian sources.\n\n##### 4.3. Discussions\n\nNote that some properties regarding ’s such as the submodularity relation in (11), used to show that is a CAF rely heavily on the independence of ’s. When ’s are correlated, we can find examples of which are not CAF for the summary function of  sum as follows. Let and be jointly Gaussian with the same marginal given by with . Then is distributed according to , thus we have that, if , thenThus the entropy function does not satisfy the second condition of Definition 2, that is, the increasing property, as a CAF. Hence for arbitrarily correlated sources, presumably few meaningful arguments can be made on optimal aggregation problems, even for simple summary functions such as  sum.\n\nThe discussion so far enables us to deal with more general objective functions extended from . Consider a function which is concave and increasing. We now define communication overhead on an edge as the function of the average number of bits transmitted over the edge. Namely, we consider the following extension of :Consider for the summary function  sum  for i.i.d. sources and  weighted sum for independent Gaussian sources. Note that the composition of two concave and increasing functions is also concave and increasing . Thus is a concave and increasing function of the amount of flows at an edge, and thus is a CAF. Hence HM algorithm can be used to approximate .\n\n#### 5. Aggregation Schemes for Extreme-Type Summary Functions\n\n##### 5.1. Case Study\n\nIn this section we consider summary functions regarding the extreme statistics of measurements, that is,  max  or  min. We will first investigate the entropy of the extreme statistics of a set of RVs. Consider measurements denoted by , . Since , we will focus only on  max  without loss of generality. It is easily seen that  max function is divisible, thus the aggregation process is similar to that for  sum: a node simply applies  max function to the aggregated data. For example, suppose a node receives data given by . The node simply computes and forwards it to the next hop.\n\nFor extreme-type summary functions, we will show that is in general not a CAF. In particular we consider several cases of practical importance.\n\nCase 1 (Gaussian RVs). We consider the problem of retrieving the maximum of i.i.d. Gaussian RVs. We assume that for where we again assume that for and some constant . We provide a numerical evaluation of on the left of Figure 2. We observe that is strictly convex and decreasing in for , thus is not a CAF.\n\nCase 2 (Extreme data retrieval problem). We consider the problem of extreme data retrieval defined as follows. Assume that a source node measures some physical quantity which is distributed according to a continuous RV . We assume ’s are independent but not necessarily identically distributed. Suppose with some probability is equal to a large number, which indicates an “abnormal” event. An important application of sensor networks is to detect the maximum abnormality among the measurements. The abnormality is defined as how far a sensor’s measurement has deviated from its usual statistics as follows. Let us denote the cumulative distribution function (CDF) of by or , . Consider realizations of given by . We will quantify the abnormality at Source in terms of how unlikely the measurement is: specifically the goal of the sink is to retrieve , or alternatively,thus the abnormality of is defined by . Let . We will assume that the nodes transmit and aggregate instead of , and the goal of the sink is to retrieve . Note since is the RV evaluated at its distribution function, one can show that ’s are i.i.d. RVs uniformly distributed on . Thus the problem reduces to an optimal aggregation problem retrieving  max  of i.i.d. uniform RVs.\n\nWe will show that associated with the extreme data retrieval problem is convex and decreasing function when the number of aggregated measurements is greater than or equal to 2. Suppose the data aggregated at a node is given by and define . As previously we assume that the node requires on average bits to transmit .\n\nProposition 4. Consider the extreme data retrieval problem. The aggregation cost function is convex and decreasing for .\n\nProof. Since is the maximum of i.i.d. uniform RV’s, the CDF of denoted by is given byThus the probability density function (pdf) of denoted by is given by . If we compute ,ThusBy regarding as a continuous variable, we have that, for ,Clearly is decreasing for , and since its second order derivative is nonnegative for , is convex for .\n\nOn the right of Figure 2 the plot of is shown. Note is strictly convex for , but overall appears to be approximately convex. Note that is nonpositive, thus one could select a sufficiently large such that , so that for all .\n\nIn general, for a convex and decreasing , is clearly NP-hard since the problem contains the Steiner tree problem as a special case. In the following section we present a novel algorithm which captures key properties of convex and decreasing . Later we show by simulation the algorithm effectively achieves low cost.\n\n##### 5.2. Algorithm for Convex and Decreasing Aggregation Cost Functions\n###### 5.2.1. Motivation\n\nBefore we describe our algorithm we present the motivation behind the algorithm. An important observation for the data aggregation problems was made in for concave and increasing . They proposed a “hub-and-spoke” model for so-called facility location problem. The idea is that when is concave and increasing, one should first aggregate flows to some “hubs,” then route the aggregated flow from the hubs to the sink at the minimum cost; this is done by building an approximately optimal Steiner tree where the hubs (facility locations) are the Steiner nodes. The rationale is that, once multiple flows are aggregated at hubs, the cost of routing them collectively to the sink is cheaper than routing the sources’ flows separately, due to the concavity of . We observe two aspects in such hub-and-spoke schemes. Firstly by local aggregation of flows at hubs we aim at greedily reducing costs based on local information, which we view as the microscopic approach to reduce cost. Secondly by building an approximately optimal Steiner tree with respect to the hubs and the sink, we take the global network structure into account, which can thus be seen as the macroscopic aspect for cost reduction. Hence there exists a tradeoff between microscopic and macroscopic aspects of the cost reduction. A similar observation on such tradeoff was made in . However our key question is that, how do we achieve an optimal tradeoff between those aspects for a convex and decreasing ?\n\nConsider the three examples of aggregation cost functions denoted by , , and which are decreasing and convex for as shown in Figure 3. In case of , we see that is flat for , that is, the average number of bits communicated over a link is constant irrespective of the number of flows passed through it. Thus, the minimum cost routing problem reduces to a Steiner tree problem, in which case a completely “macroscopic” solution is optimal. In case of , we see that decreases slowly in . Thus, the more number of flows merges at a link, it takes the less number of bits to transmit the merged information. Suppose we use the hub-and-spoke scheme to aggregate flows in a local manner. The amount of aggregated flows at a hub is at least 2: note that however, is approximately “flat” for . This implies that, once more than two flows are aggregated, the benefits from further local flow aggregation will be negligible. Hence the optimal routing problem from the hubs to the sink approximately reduces to the Steiner tree problem! Thus one could expect that local aggregation (microscopic approach) followed by an optimal Steiner tree construction (macroscopic approach) would yield a good solution. Now let us consider . The overall rate of decrease of is higher than that of . It appears that when the number of aggregated flows is significantly high, for example, is greater than 6, becomes effectively “flat.” This suggests that, one should keep aggregating flows until sufficient amount of flows, say 6, is aggregated, that is, the microscopic cost reduction should be applied for multiple times in a hierarchical manner, then build an optimal Steiner tree with respect to the aggregated sources, that is, applying macroscopic reduction.\n\nThe example provides us with some insights. Since is convex decreasing, the marginal benefit of local aggregation is large for small but decreases with increasing . In other words, when is small, that is, in the early stages of the overall aggregation process, one should focus on low-cost local aggregation in order to benefit from high rate of decrease of for small . Meanwhile, once a large number of flows are aggregated, it pays to perform macroscopic cost reduction from there on by building the optimal Steiner trees since becomes more “flat” with increasing . This suggests that there exists a tradeoff point at which such microscopic and macroscopic reduction are optimally balanced. Unfortunately it is difficult to know such a tradeoff point in advance. The proposed algorithm not only exploits both the microscopic and macroscopic aspects of cost reduction for a convex and decreasing , but also empirically searches for the optimal tradeoff point. Details are presented in the following section.\n\n###### 5.2.2. Outline\n\nAn outline of the proposed algorithm is presented as follows. The algorithm consists of multiple stages. A hub-and-spoke problem (or facility location problem) is approximately solved at each stage. The flows from source nodes are merged at the hubs. The hubs at the present stage become the source nodes in the next stage, that is, the flows are merged hierarchically. Instead of solving complex facility location problem, we find a minimum weight edge cover (MWEC) on the source nodes at each stage as a simple approximation. The rationale is that we would like to cluster sources for local aggregation at low costs, and by definition the MWEC incurs low cost in doing that. MWEC consists of multiple connected components, each of which is a tree. For each connected component we select a source as a hub and call it a center node (details on the selection of center nodes are provided later). The flows in that component is aggregated at the center node.\n\nAt each stage, once the center nodes are determined, we build an approximately optimal Steiner tree with respect to the center nodes and the sink. We use algorithm in for the Steiner tree construction. Their algorithm provides the best known -approximation for Steiner tree problem where .\n\nEach stage outputs an aggregation tree. The output tree at Stage is the union of the paths from all the hierarchical aggregations found up to Stage and the Steiner tree built at Stage . Namely, the output tree at Stage is a combination of consecutive hierarchical aggregations (microscopic cost reduction) and a Steiner tree with respect to the sink and Stage hubs (macroscopic cost reduction).\n\nHence, over the stages, the algorithm progressively changes the balance between microscopic and macroscopic aspects of cost reduction in the output trees. Roughly speaking, the output trees from later stages are more biased towards the microscopic aspect. After the stages are over, we pick the tree with the minimum cost among the output trees. As a result the algorithm empirically searches for the point of the “best” balance between the two aspects of cost reduction over the stages. Hence one could expect that our algorithm will work well for any convex and decreasing .\n\n###### 5.2.3. Algorithm Description\n\nWe present a formal description of the proposed algorithm followed by an explanation of further details. For given aggregation tree , let denote the total energy cost associated with , as in the objective of .\n\nHierarchical Cover and Steiner Tree (HCST) Algorithm\n\nBegin Algorithm(1)(Metric completion of ) If is not a complete graph, perform a metric completion of to yield a complete graph. Namely, if there exist any pair of vertices without an edge, create an edge between the pair and assign the edge a weight which is the distance between the pair. The distance is measured in terms of the sum of the weights on the shortest path between the pair.(2)(Initialization) , .(3)(Initialize flows at sources) , for all .(4)(Initial output is a Steiner tree) Jump to Step 7.(5)(Minimum weight edge cover) Let us denote the subgraph of induced by by . Find a minimum-weight edge cover in . Let be the subgraph of induced by the cover.(6)(Node selection) Suppose has connected components, and denote the th connected component of by for . For each , select a node with the maximum degree (ties are arbitrarily broken), say , which is called a center node. is a tree, and becomes the root of . All the flows in are aggregated at such that every node transmits data to its parent node after the data from its child nodes has been aggregated at the node. The total flow at is updated as follows:Remove all the noncenter nodes from , and let be the resulting set of source nodes.(7)(Steiner tree construction) Build -optimal Steiner tree with respect to the source nodes in and the sink, using the algorithm in .(8)(Merging trees) If , merge all the MWECs found up to the present stage and the Steiner tree found in Step 7; that is, letIf , . We call the output tree of Stage .(9)(Loop) If , and go back to Step 5. If , continue to Step 10.(10)(Tree selection) The final output is the tree such thatthat is, the minimum cost tree among the output trees from all the stages.\n\nEnd Algorithm\n\n###### 5.2.4. Comments\n\nWe explain the details of several steps in the algorithm. In Step 3 the flow variables denoted by , , associated with the source nodes are initialized where we will track the amount of flows throughout the algorithm. In Step 6 it is natural to select a node with the maximum degree as the center node, since such node is literally a “hub.” When solving the hub-and-spoke problem at each stage, we choose to solve the MWEC problem whereas in the load-balanced facility location problem is solved. An advantage of solving MWEC problem is that it is considerably simpler than load-balanced facility location problems since an MWEC problem can be reduced to a minimum weight perfect matching problem . Note that the algorithm in solves the hub-and-spoke problem only once, that is, its output is analogous to the output tree from Stage 1 of our algorithm. Meanwhile HM algorithm solves minimum weight perfect matching at each stage in order to locally aggregate flows with low costs. HM algorithm solves the matching problem hierarchically until all the flows are aggregated to a single source, and the final output is the union of those matchings. Thus its final output is analogous to that from the final stage of our algorithm. In other words, the outputs of the abovementioned algorithms correspond to those from intermediate stages in our algorithm. The HIERARCHY algorithm proposed in hierarchically constructs Steiner trees and solves load-balanced facility location problems, however in a way which heavily relies on the concave and increasing property of . Thus the algorithm may not be suitable for convex and decreasing .\n\n##### 5.3. Performance Analysis\n\nIn this section we analyze the performance of HCST algorithm. For set of weighted edges, let denote the sum of its edge weights, that is, . For given source set , let denote the edge set of the optimal Steiner tree associated with .\n\nProposition 5. For given network graph , the cost achieved by HCST algorithm is higher than the optimal algorithm by a factor of at most defined aswhere denotes the stage at which HCST algorithm terminates. denotes the approximation ratio for Steiner tree problem, and is the ratio of the sums of edge weights between MWEC at Stage of HCST algorithm and the Steiner tree associated with source set , that is,Also is defined aswhere , and denotes the th smallest value of the edge weights of . Note that the second summation term of (32) is defined to be 0 if .\n\nProof. Denote the optimal cost by . We first find a lower bound for . Let denote the set of edges of the optimal aggregation tree. Let us sort the amount of edge flows of in increasing order, and denote them by , that is, where has edges. There are at least nonzero flows since there are sources, hence and hold. In addition is at most , since is a tree. Also it is clear that , for , and is at most for . This implies that, since is decreasing, , . Let us denote the weight of the edge that carries flow by . For real numbers and , let . We have thatwhere (36) is by Jensen’s inequality due to the convexity of , and (37) is from the definition of Steiner trees. Considering that is decreasing, we would like to make the argument of in (37) as large as possible in order to find a lower bound for . Hence we would like to maximize defined aswhere , are chosen from the edge weights of . For the purpose of maximizing (38), we will assume WLOG, because over all possible permutations of , is maximized when .\nWe first observe that is decreasing in , since if , we have thatHence can be maximized over by choosing smallest weights from the edge weights of , that is, by letting for .\nNext we would like to derive an upper bound for as follows:For inequality (42), we used the fact that (41) is increasing in , hence we chose and the largest possible weights for , in order to maximize . From (42), we obtain . Hence from (37), we obtainNow let us consider the cost of output tree at Stage of HCST algorithm, or . Recall that in HCST algorithm, denotes the source set at Stage , and denotes the output tree at Stage . The cost of is divided into (i) the cost incurred by hierarchical MWECs , and (ii) the cost of -approximate Steiner tree associated with . Hencewhere denote the amount of flow at Edge under HCST algorithm. Note that, the amount of flow in the network at Stage is at least , since the flows are agglomerated through MWECs at every stage. Since is decreasing, the first summation of (44) is at mostNote that the first summation of (44) is 0 for Stage 0. As for the second summation of (44),Inequality (48) is due to ; specifically, the Steiner tree for is a tree that spans , hence by definition, the sum of edge weights of is no more than that of the Steiner tree associated with .\nIn conclusion, we have that, from (43), (45) and (48),Since the cost of HCST algorithm is , the proposition is proved.\n\nAn interpretation for ratio in (32) is as follows: the first term in the bracket of represents a bound on the macroscopic cost associated with the Steiner tree approximation. The second term in the bracket of is a bound on the cost associated with the hierarchical aggregation of flows, that is, the microscopic cost reduction. Clearly we have that , due to , thus , is a decreasing sequence where , for all . The progressive cost reduction due to hierarchical flow aggregation is reflected in . As in (32), is the minimum of numbers, each of which contains a weighted sum of in different combination of weights . Hence represents the empirical minimum of different degrees of tradeoff between microscopic and macroscopic cost reduction.\n\nNext we discuss constant in (34). Firstly observe that ; the first summation of the numerator of (34) is at most , in which case the first term of (34) is at most . Note that a naive upper bound for is simply , yielding a lower bound ; however we observe that our bound (43) improves such a bound since .\n\ncan be numerically computed for a given graph, and in the next section we provide numerical examples of . We also apply HCST algorithm to a specific graph as an example.\n\n##### 5.4. Illustrating Examples\n\nIn this section we consider a simple convex and decreasing . As previously the packet header length is bits, and we assume that the maximum packet size is 10 times the header length, that is, . We will accordingly consider which is convex and decreasing for of the following form:Clearly holds for .\n\nFigures 4 and 5 show the numerical examples of the performance bound . is computed and averaged over randomly generated graphs of uniformly distributed nodes in a square area. In Figure 4, network size is fixed to 200, and is plotted against the number of source nodes . We consider two types of cost functions: the curve labelled “harmonic” represents the cost function (50) in which decreases as a harmonic sequence. The curve labelled “exp” corresponds to the case where the term in (50) is replaced by where the parameter controls the decay rates of the cost function. We set in this example. In addition, we compare with a simple analytical bound; suppose we build a -approximate Steiner tree based on . The cost under that tree is at most . By combining that cost with (43), we obtain a simple approximation ratio of for the approximately optimal Steiner tree. In Figure 4, the plots of such bounds based on -approximate Steiner tree are added for both harmonic and exponential cost functions, and are labelled as “Steiner(har)” and “Steiner(exp),” respectively. We observe that provides improved bounds as compared to those based on -approximate Steiner tree. In Figure 5, is plotted against varying under the aforementioned harmonic and exponential cost function where we fixed to 10. In Figures 4 and 5, we observe that eventually becomes nearly constant, or increases very slowly at most, even if the system size grows. Hence we conclude that provides an approximation ratio which remains effectively constant irrespective of the system size.\n\nNext we present an example of the application of the HCST algorithm to a specific graph. An example of is given in Figure 6(a). consists of nodes where Node 1 is the sink, that is, . There are four source nodes: where the sources are depicted in a shaded color. Each source generates 1 unit of data. We will again consider convex and decreasing given by (50), and assume . Figure 6(b) shows the output of Stage 0 or which is an approximately optimal Steiner tree. Figure 7 shows the MWECs over the stages. Figure 7(a) shows the metric completion of the subgraph induced by . Figure 7(b) shows the MWEC at Stage 1. Node 4 and 5 became the center nodes as emphasized in the figure. Figure 7(c) shows the MWEC and the center node at Stage 2.\n\nFigure 8(a) shows the full paths of the MWEC at Stage 1, that is, that in Figure 7(b), in . By building an approximately optimal Steiner tree associated with and taking the union of and as in Step 8, we get as in Figure 8(b). Similarly Figure 9 demonstrates Stage 2 of the algorithm. The full paths for the MWEC from Figure 7(c) in are shown in Figure 9(a). Note that Node 4 is selected as the center node, and the output from Stage 2 or is shown in Figure 9(b). Let us compare the energy costs from all the stages. For , a total of three flows pass through the link between Node 1 and 3, while the flow on the other links is simply 1. Thus, the cost of from Stage 0 is given bySimilarly, we have thatThus the final output of HCST is with the final cost of 275.5. Note that in this example, the Shortest Path Tree (SPT) heuristic incurs the energy cost of 374.\n\nNext consider such thatAssume that the algorithm has yielded the same , and as the previous case. Since is constant for , the problem reduces to the Steiner tree problem, thus one would expect that would perform the best since is intended to be an approximately optimal Steiner tree. The energy costs are given bythus indeed the HCST algorithm will output as the best solution with cost 37, whereas the SPT heuristic will yield the energy cost of 41. This demonstrates that our algorithm can effectively deal with various types of convex and decreasing aggregation cost functions. In the following section we will evaluate the performance of the HCST algorithm by simulation.\n\n#### 6. Simulation\n\nIn our simulation we randomly generate as follows. The node locations are generated independently and uniformly on a unit square. We define as the Delaunay graph induced by the node locations. An example of is depicted in Figure 10 for . As previously it is assumed that the average number of bits required to transmit the aggregated information is approximately where we set header length to 1 and the number of quantization bits to 3. The edge weights are randomly selected from which represents the energy consumption per transmitted bit. In our simulation two types of sources are considered. The first type, called uniform type, is associated with the extreme data retrieval problem, that is, are i.i.d. uniformly on . The second type, called Gaussian type, is associated with retrieving the maximum of Gaussian source data where . The summary function is given by  max  function.\n\nWe will compare the performance of the HCST algorithm with HM algorithm and SPT heuristic. Figure 11 shows the average energy consumption of the algorithms when we fix the number of sources to 8 with varying . The energy cost shown on the left (resp. right) of Figure 11 is associated with the sources of uniform (resp. Gaussian) type. We observe that the HCST algorithm achieves lower energy costs than the SPT heuristic in both types of the sources. The gain in the energy savings by the HCST algorithm ranges 35–38% for uniform type sources and 24-25% for Gaussian type sources. Compared to HM algorithm, our algorithm reduces the energy consumption by 20-21% and 14-15% for uniform and Gaussian type sources, respectively. HM algorithm focuses on microscopic cost reduction, which may be effective for concave and increasing cost functions, however not for convex and decreasing cost functions. Comparing SPT heuristic and HCST algorithm, we observe that the difference in the mean energy consumption of the algorithms slightly increases with . This can be interpreted as follows: for larger networks, there is further room for improvement by HCST, for example, there are more choices for Steiner nodes and more ways to merge sources at low costs by MWEC. Thus the performance gain from the HCST algorithm relative to the SPT heuristic is expected to grow with as shown in the simulation.\n\nFigure 12 shows the mean energy costs with varying where we scale the number of the sources proportional to . Specifically in the simulation we let , that is, one out of five nodes is a source node. In the figure we see that the HCST algorithm again outperforms the SPT heuristic. The relative savings in energy by HCST algorithm ranges 19–41% for uniform type sources and 14–27% for Gaussian type sources. Relative to HM algorithm, HCST algorithm saves energy costs by 20–23% and 14–17% for uniform and Gaussian type sources, respectively. The difference in the energy cost of the algorithms increases with similar to the case of fixed number of sources, however, such a rate of increase is higher in the case of varying number of sources. This can be explained as follows. When we increase the network size, the number of sources also increases proportionally. When the network size grows, from the previous argument such that there is further room for improvement by HCST, its relative gain will increase with the network size. In addition to that, since the number of sources grows, the total number of stages at the end of the HCST algorithm will also increase. Since HCST chooses the best tree from the intermediate output trees collected over stages, a large number of stages implies that we can choose the final output tree from a large pool of trees having various degrees of tradeoff between microscopic and macroscopic aspects of the cost reduction. Thus the abundance of source nodes enables us to choose an aggregation tree with a “refined” tradeoff, which is crucial for a convex and decreasing . This explains the enhanced performance of HCST with increasing number of sources. Hence we conclude from the simulation that the HCST algorithm can improve performance for various proportions of source nodes among the network.\n\n#### 7. Conclusion\n\nIn this paper we have studied a single-sink aggregation problem for wireless sensor networks computing several widely used summary functions. It is observed that the problem is characterized by the aggregation cost function which maps the amount of aggregated measurements to transmission costs at a link. We show that the properties of depend heavily on the chosen summary function . When is given by  sum or  mean, we showed that is concave and increasing, implying that there exist algorithms such as the HM algorithm which can approximate the optimal algorithm by a factor logarithmic in the number of sources. A similar argument was made when is  weighted  sum  for i.i.d. Gaussian sources. When is given by  max, however, we have shown that is convex and decreasing for certain types of sources. For such we identify that there exists a tradeoff between the following two aspects of cost reduction: firstly local clustering of sources which is the microscopic aspect, and secondly a low-cost routing from the clustered sources to the sink which is the macroscopic aspect. We proposed the Hierarchical Cover and Steiner Tree algorithm which empirically finds the best tradeoff point between the aspects. Numerical examples and simulation results were presented to demonstrate that the HCST algorithm is versatile and improves performance for various types of convex and decreasing . A future direction would be investigating the optimal aggregation problems for a wider range of summary functions. In addition, the evaluation of the HCST algorithm in a real-world testbed environment is also part of our future work.\n\n#### Conflict of Interests\n\nThe authors declare that there is no conflict of interests regarding the publication of this paper.\n\n#### Acknowledgments\n\nThis work was supported by Basic Science Research Program through The National Research Foundation of Korea (NRF) funded by The Ministry of Science, ICT & Future Planning (NRF-2013R1A1A1062500), and in part by the ICT R&D program of MSIP/IITP, (10-911-05-006, High Speed Virtual Router that Supports Dynamic Circuit Network).\n\n1. A. Giridhar and P. R. Kumar, “Computing and communicating functions over sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 755–764, 2005. View at: Publisher Site | Google Scholar\n2. J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan, “Building efficient wireless sensor networks with low-level naming,” ACM SIGOPS Operating Systems Review, vol. 35, no. 5, pp. 146–159, 2001. View at: Publisher Site | Google Scholar\n3. C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th annual international conference on Mobilecomputing and networking, pp. 56–67, ACM, August 2000. View at: Google Scholar\n4. L. Krishnamachari, D. Estrin, and S. Wicker, “The impact of data aggregation in wireless sensor networks,” in Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops, pp. 575–578, IEEE, 2002. View at: Publisher Site | Google Scholar\n5. M. Bagaa, Y. Challal, A. Ksentini, A. Derhab, and N. Badache, “Data aggregationscheduling algorithms in wireless sensor networks: solutionsand challenges,” IEEE Communications Surveys and Tutorials, vol. 16, no. 3, pp. 1339–1368, 2014. View at: Publisher Site | Google Scholar\n6. L. A. Villas, A. Boukerche, H. S. Ramos, H. A. B. F. de Oliveira, R. B. de Araujo, and A. A. F. Loureiro, “DRINA: a lightweight and reliable routing approach for in-network aggregation in wireless sensor networks,” IEEE Transactions on Computers, vol. 62, no. 4, pp. 676–689, 2013. View at: Publisher Site | Google Scholar\n7. J. Ma, W. Lou, and X.-Y. Li, “Contiguous link scheduling for data aggregation in wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 1691–1701, 2014. View at: Publisher Site | Google Scholar\n8. Z.-J. Zhang, C.-F. Lai, and H.-C. Chao, “A green data transmission mechanism for wireless multimedia sensor networks using information fusion,” IEEE Wireless Communications, vol. 21, no. 4, pp. 14–19, 2014. View at: Publisher Site | Google Scholar\n9. I. F. Akyildiz, T. Melodia, and K. R. Chowdury, “Wireless multimedia sensor networks: a survey,” IEEE Wireless Communications, vol. 14, no. 6, pp. 32–39, 2007. View at: Publisher Site | Google Scholar\n10. P. Von Rickenbach and R. Wattenhofer, “Gathering correlated data in sensor networks,” in Proceedings of the Joint Workshop on Foundations of Mobile Computing, pp. 60–66, ACM, 2004. View at: Google Scholar\n11. R. Cristescu, B. Beferull-Lozano, and M. Vetterli, “Networked slepianwolf: theory, algorithms, and scaling laws,” IEEE Transactions on Information Theory, vol. 51, no. 12, pp. 4057–4073, 2005. View at: Publisher Site | Google Scholar\n12. S. Pattem, B. Krishnamachari, and R. Govindan, “The impact of spatial correlation on routing with compression in wireless sensor networks,” in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04), pp. 28–35, Berkeley, Calif, USA, April 2004. View at: Publisher Site | Google Scholar\n13. R. Cristescu, B. Beferull-Lozano, and M. Vetterli, “On network correlated data gathering,” in Proceedings of the 23rd AnnualJoint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), vol. 4, pp. 2571–2582, March 2004. View at: Publisher Site | Google Scholar\n14. J. Liu, M. Adler, D. Towsley, and C. Zhang, “On optimal communication cost for gathering correlated data through wireless sensor networks,” in Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), pp. 310–321, ACM, September 2006. View at: Google Scholar\n15. S. Hariharan and N. Shroff, “Maximizing aggregated revenue in sensor networks under deadline constraints,” in Proceedings of the 48th IEEE Conference on Decision and Control, pp. 4846–4851, 2010. View at: Google Scholar\n16. A. Goel and D. Estrin, “Simultaneous optimization for concave costs: single sink aggregation or single source buy-at-bulk,” in Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA '03), pp. 499–505, SIAM, 2003. View at: Google Scholar\n17. M. Andrews and L. Zhang, “The access network design problem,” in Proceedings of the of IEEE Symposium on Foundations of Computer Science (FOCS '98), p. 40, IEEE Computer Society, 1998. View at: Google Scholar\n18. Y. Bartal, “On approximating arbitrary metrics by tree metrics,” in Proceedings of the 30th Annual ACM Symposium on Theory of Computing, pp. 161–168, ACM, May 1998. View at: Google Scholar\n19. A. Meyerson, K. Munagala, and S. Plotkin, “Cost-distance: two metric network design,” in Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS '00), p. 624, IEEE Computer Society, 2000. View at: Google Scholar\n20. S. Guha, A. Meyerson, and K. Munagala, “A constant factor approximation for the single sink edge installation problems,” in Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, pp. 383–388, ACM, 2001. View at: Google Scholar\n21. M. Andrews, A. Anta, L. Zhang, and W. Zhao, “Routing for energy minimizationin the speed scaling model,” in Proceedings of the IEEE INFOCOM, pp. 1–9, IEEE, San Diego, Calif, USA, March 2010. View at: Publisher Site | Google Scholar\n22. M. Andrews, S. Antonakopoulos, and L. Zhang, “Minimum-cost network design with (Dis)economies of scale,” in Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science (FOCS '10), pp. 585–592, Las Vegas, Nev, USA, October 2010. View at: Publisher Site | Google Scholar\n23. F. S. Salman, J. Cheriyan, R. Ravi, and S. Subramanian, “Buy-at-bulk network design: approximating the single-sink edge installation problem,” in Proceedings of the 8th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 619–628, Society for Industrial and Applied Mathematics, January 1997. View at: Google Scholar\n24. B. Awerbuch and Y. Azar, “Buy-at-bulk network design,” in Proceedings of the 38th IEEE Annual Symposium on Foundations of Computer Science (FOCS '97), IEEE Computer Society, pp. 542–547, October 1997. View at: Publisher Site | Google Scholar\n25. D. R. Karger and M. Minkoff, “Building Steiner trees with incomplete global knowledge,” in Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS '00), pp. 613–623, IEEE Computer Society, November 2000. View at: Google Scholar\n26. M. Charikar and A. Karagiozova, “On non-uniform multicommodity buy-at-bulk network design,” in Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 176–182, ACM, 2005. View at: Google Scholar\n27. C. Chekuri, M. T. Hajiaghayi, G. Kortsarz, and M. R. Salavatipour, “Approximation algorithms for non-uniform buy-at-bulk network design,” in Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS '06), pp. 677–686, Berkeley, Calif, USA, October 2006. View at: Publisher Site | Google Scholar\n28. A. Scaglione and S. D. Servetto, “On the interdependence of routing and data compression in multi-hop sensor networks,” in Proceedings of the 8th ACM Annual International Conference on Mobile Computing and Networking (MobiCom '02), pp. 140–147, Atlanta, Ga, USA, September 2002. View at: Publisher Site | Google Scholar\n29. L. Galluccio, S. Palazzo, and A. T. Campbell, “Efficient data aggregation in wireless sensor networks: an entropy-driven analysis,” in Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '08), pp. 1–6, September 2008. View at: Publisher Site | Google Scholar\n30. D. Kandris, P. Tsioumas, A. Tzes, G. Nikolakopoulos, and D. D. Vergados, “Power conservation through energy efficient routing in wireless sensor networks,” Sensors, vol. 9, no. 9, pp. 7320–7342, 2009. View at: Publisher Site | Google Scholar\n31. D. Kandris, M. Tsagkaropoulos, I. Politis, A. Tzes, and S. Kotsopoulos, “Energy efficient and perceived QoS aware video routing over wireless multimedia sensor networks,” Ad Hoc Networks, vol. 9, no. 4, pp. 591–607, 2011. View at: Publisher Site | Google Scholar\n32. L. Galluccio, A. T. Campbell, and S. Palazzo, “Concert: aggregation-based congestion control for sensor networks,” in Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, pp. 274–275, San Diego, California, USA, November 2005. View at: Publisher Site | Google Scholar\n33. T. Cover and J. Thomas, Elements of Information Theory, John Wiley & Sons, New York, NY, USA, 1991.\n34. M. Madiman, “On the entropy of sums,” in Proceedings of the Information Theory Workshop (ITW '08), pp. 303–307, IEEE, Porto, Portugal, May 2008. View at: Publisher Site | Google Scholar\n35. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, Cambridge, UK, 2004. View at: Publisher Site\n36. J. Byrka, F. Grandoni, T. Rothvoß, and L. Sanità, “An improved LP-based approximation for steiner tree,” in Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC '10), pp. 583–592, June 2010. View at: Publisher Site | Google Scholar\n37. A. Schrijver, Combinatorial Optimization, Springer, New York, NY, USA, 2003." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93064636,"math_prob":0.9588637,"size":68174,"snap":"2021-21-2021-25","text_gpt3_token_len":14604,"char_repetition_ratio":0.1636497,"word_repetition_ratio":0.06143045,"special_character_ratio":0.21668084,"punctuation_ratio":0.1309816,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9937237,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-22T18:12:12Z\",\"WARC-Record-ID\":\"<urn:uuid:e6d6c5fb-4e2b-4bf1-8fe5-9e36c399fc29>\",\"Content-Length\":\"1049303\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:abef0103-0594-46a7-a841-cb9da0061211>\",\"WARC-Concurrent-To\":\"<urn:uuid:e6ab30cc-2038-47f7-86da-13dc44ec7662>\",\"WARC-IP-Address\":\"13.32.199.68\",\"WARC-Target-URI\":\"https://www.hindawi.com/journals/js/2015/506909/\",\"WARC-Payload-Digest\":\"sha1:Y7FI5TKU33QGDKS6J4DVNAECCURMBFWS\",\"WARC-Block-Digest\":\"sha1:IR4NO4JLTFP46VUW4XQFC3ALZS4KZEWK\",\"WARC-Truncated\":\"length\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488519183.85_warc_CC-MAIN-20210622155328-20210622185328-00245.warc.gz\"}"}
https://www.physicsforums.com/threads/linear-log-plot.155103/
[ "# Linear-Log Plot\n\nWhat is meant by a linear-log plot and why is it used?\n\nIn the book I have, the author is demonstrating that some data fits an exponential distribution. So what he does is a linear-log plot of both the exponential distribution and the empirical data, and then overlaps the 2 graphs so show they follow a similar path.\n\nSo my question is, what exactly is a linear-log plot, and when/why do you use it?\nFor exmaple, if I was to show the data fitted an exponential distribution, I would just plot the data and exponetial distribution as they were, and overlap them and show they fit (or don't fit).\n\nIf you have data that happens to lie close to a curve of the form y= A log(x)+ B, (conversely, $x= e^{\\frac{y-B}{A}$) then Plotting y against \"X= log(x)\" rather than x itself puts the points close to the straight line y= AX+ B. Yes, you could overlap your raw data and an exponential (if you were sure of the constants involved) and show that they matched but it is typically much easier to spot a straight line than more complex curves and there are standard formulae for the \"best fit\" line." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.97236586,"math_prob":0.96567756,"size":1148,"snap":"2021-43-2021-49","text_gpt3_token_len":265,"char_repetition_ratio":0.15384616,"word_repetition_ratio":0.8899522,"special_character_ratio":0.22560975,"punctuation_ratio":0.09623431,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9988417,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-02T13:58:11Z\",\"WARC-Record-ID\":\"<urn:uuid:529c9880-e591-4fbc-af8c-52557d73ba66>\",\"Content-Length\":\"61994\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:12c7c05c-6b34-454d-ad1d-57c7129f7931>\",\"WARC-Concurrent-To\":\"<urn:uuid:967cf2b8-0a26-43e4-8238-754bdfc38604>\",\"WARC-IP-Address\":\"104.26.14.132\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/linear-log-plot.155103/\",\"WARC-Payload-Digest\":\"sha1:XTUQXMBJKRYB3N6ZU6ZXUYMVGWXKIGTC\",\"WARC-Block-Digest\":\"sha1:DV74HIBSWU3ZT76LNGWCLD3XU6RMMBPX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362219.5_warc_CC-MAIN-20211202114856-20211202144856-00512.warc.gz\"}"}
https://www.siyavula.com/read/maths/grade-8/integers/02-integers?id=toc-id-8
[ "In this chapter you will work with whole numbers smaller than 0. These numbers are called negative numbers. The whole numbers larger than 0, 0 itself and the negative whole numbers together are called the integers. Mathematicians have agreed that negative numbers should have certain properties that would make them useful for various purposes. You will learn about these properties and how they make it possible to do calculations with negative numbers.", null, "", null, "What is beyond\n\nWhy people decided to have negative numbers\n\nBelow, you can see how Jimmy prefers to work when doing calculations such as 542 + 253.\n\n$500 + 200 = 700 \\\\ 40 + 50 = 90 \\\\ 2 + 3 = 5 \\\\ 700 + 90 + 5 = 795$\n\nHe tries to calculate 542 - 253 in a similar way:\n\n\\begin{align} 500 - 200 &= 300 \\\\ 40 - 50 &= ? \\end{align}\n\nJimmy clearly has a problem. He reasons as follows:\n\nI can subtract 40 from 40; that gives 0. But then there is still 10 that I have to subtract.\n\nHe decides to deal with the 10 that he still has to subtract later, and continues:\n\n\\begin{align} 500 - 200 &= 300 \\\\ 40 - 50 &= 0 \\textit{, but there is still 10 that I have to subtract.} \\\\ 2 - 3 &= 0 \\textit{, but there is still 1 that I have to subtract.} \\end{align}\n\n1. What must Jimmy still subtract, and what will his final answer be?\n2. When Jimmy did another subtraction problem, he ended up with this writing at one stage:\n\n600 and (-)50 and (-)7\n\nWhat do you think is Jimmy's final answer for this subtraction problem?\n\nAbout 500 years ago, some mathematicians proposed that a \"negative number\" may be used to describe the result in a situation such as in Jimmy's subtraction problem above, where a number is subtracted from a number smaller than itself.\n\nFor example, we may say $10 - 20 = (-10)$\n\nThis proposal was soon accepted by other mathematicians, and it is now used all over the world.\n\nMathematicians are people who do mathematics for a living. Mathematics is their profession, like health care is the profession of nurses and medical doctors.\n\n1. Calculate each of the following:\n1. $16 - 20$\n2. $16 - 30$\n3. $16 - 40$\n4. $16 - 60$\n5. $16 - 200$\n6. $5 - 1 000$\n2. Some numbers are shown on the lines below. Fill in the missing numbers.", null, "", null, "The numbers 1; 2; 3; 4 etc. are called the natural numbers. The natural numbers, 0 and the negative whole numbers together are called the integers.\n\nThe following statement is true if the number is 5:\n\n15 - (a certain number) = 10\n\nA few centuries ago, some mathematicians decided they wanted to have numbers that will also make sentences like the following true:\n\n15 + (a certain number) = 10\n\nBut to go from 15 to 10 you have to subtract 5.\n\nThe number we need to make the sentence 15 + (a certain number) = 10 true must have the following strange property:\n\nIf you add this number, it should have the same effect as to subtract 5.\n\nNow the mathematicians of a few centuries ago really wanted to have numbers for which such strange sentences would be true. So they thought:\n\nLet us decide, and agree amongst ourselves, that the number we call negative 5 will have the property that if you add it to another number, the effect will be the same as when you subtract the natural number 5.\n\nThis means that the mathematicians agreed that $15 + (-5)$ is equal to $15 - 5$.\n\nStated differently, instead of adding negative 5 to a number, you may subtract 5.\n\nAdding a negative number has the same effect as subtracting a natural number.\n\nFor example: $20 + (-15) = 20 - 15 = 5$\n\n1. Calculate each of the following:\n1. $500 + (-300)$\n2. $100 + (-20) + (-40)$\n3. $500 + (-200) + (-100)$\n4. $100 + (-60)$\n2. Make a suggestion of what the answer for $(-20) + (-40)$ should be. Give reasons for your suggestion.\n3. Continue the lists of numbers below to complete the table.\n (a) (b) (c) (d) (e) (f) (g) 10 100 3 -3 -20 150 0 9 90 6 -6 -18 125 -5 8 80 9 -9 -16 100 -10 7 70 12 -12 -14 75 -15 6 60 15 -15 50 -20 5 50 -25 4 40 3 30 2 20 1 10 -1 -10\n\nThe following statement is true if the number is 5:\n\n15 + (a certain number) = 20\n\nWhat properties should a number have so that it makes the following statement true?\n\n15 - (a certain number) = 20\n\nTo go from 15 to 20 you have to add 5. The number we need to make the sentence 15 - (a certain number) = 20 true must have the following property:\n\nIf you subtract this number, it should have the same effect as to add 5.\n\nLet us agree that $15 - (-5)$ is equal to $15 + 5$.\n\nStated differently, instead of subtracting negative 5 from a number, you may add 5.\n\nSubtracting a negative number has the same effect as adding a natural number.\n\nFor example: $20 - (-15) = 20 + 15 = 35$\n\n1. Calculate.\n1. $30 - (-10)$\n2. $30 + 10$\n3. $30 + (-10)$\n4. $30 - 10$\n5. $30 - (-30)$\n6. $30 + 30$\n7. $30 + (-30)$\n8. $30 - 30$\n\nYou probably agree that\n\n\\begin{align} 5 + (-5) &= 0 \\\\ 10 + (-10) &= 0 \\\\ \\text{and} \\\\ 20 + (-20) &= 0 \\end{align}\n\nWe may say that for each \"positive\" number there is a corresponding or opposite negative number. Two positive and negative numbers that correspond, for example 3 and (-3), are called additive inverses. They wipe each other out when you add them.\n\nWhat may each of the following be equal to?\n\n$(-8) + 5$\n\n$(-5) + (-8)$\n\nWhen you add any number to its additive inverse, the answer is 0 (the additive property of 0). For example, $120 + (-120) = 0$.\n\n1. Write the additive inverse of each of the following numbers:\n1. 24\n2. -24\n3. -103\n4. 2 348\n\nThe idea of additive inverses may be used to explain why $8 + (-5)$ is equal to 3:\n\n$8 + (-5) = 3 + \\boxed{5 + (-5)} = 3 + 0 = 3$\n\n1. Use the idea of additive inverses to explain why each of these statements is true:\n1. $43 + (-30) = 13$\n2. $150 + (-80) = 70$\n\nStatements that are true for many different numbers\n\nFor how many different pairs of numbers can the following statement be true, if only natural (positive) numbers are allowed?\n\na number + another number = 10\n\nFor how many different pairs of numbers can the statement be true if negative numbers are also allowed?\n\nAdding and subtracting with integers\n\nAdding can make less and subtraction can make more\n\n1. Calculate each of the following:\n1. $10 + 4 + (-4)$\n2. $10 + (-4) + 4$\n3. $3 + 8 + (-8)$\n4. $3 + (-8) + 8$\n\nThe numbers 1; 2; 3; 4; etc. that we use to count, are called natural numbers.\n\nNatural numbers can be arranged in any order to add and subtract them. This is also the case for integers.\n\n1. Calculate each of the following:\n1. $18 + 12$\n2. $12 + 18$\n3. $2 + 4 + 6$\n4. $6 + 4 + 2$\n5. $2 + 6 + 4$\n6. $4 + 2 + 6$\n7. $4 + 6 + 2$\n8. $6 + 2 + 4$\n9. $6 + (-2) + 4$\n10. $4 + 6 + (-2)$\n11. $4 + (-2) + 6$\n12. $(-2) + 4 + 6$\n13. $6 + 4 + (-2)$\n14. $(-2) + 6 + 4$\n15. $(-6) + 4 + 2$\n2. Calculate each of the following:\n1. $(-5) + 10$\n2. $10 + (-5)$\n3. $(-8) + 20$\n4. $20 - 8$\n5. $30 + (-10)$\n6. $30 + (-20)$\n7. $30 + (-30)$\n8. $10 + (-5) + (-3)$\n9. $(-5) + 7 + (-3) + 5$\n10. $(-5) + 2 + (-7) + 4$\n3. In each case, find the number that makes the statement true. Give your answer by writing a closed number sentence.\n1. 20 + (an unknown number) = 50\n2. 50 + (an unknown number) = 20\n3. 20 + (an unknown number) = 10\n4. (an unknown number) + (-25) = 50\n5. (an unknown number) + (-25) = -50\n\nStatements like these are also called number sentences.\n\nAn incomplete number sentence, where some numbers are not known at first, is sometimes called an open number sentence:\n\n8 - (a number) = 10\n\nA closed number sentence is where all the numbers are known:\n\n$8 + 2 = 10$\n\n1. Use the idea of additive inverses to explain why each of the following statements is true:\n1. $43 + (-50) = -7$\n2. $60+ (-85) = -25$\n2. Complete the table as far as you can.\n (a) (b) (c) $5 - 8 =$ $5 + 8 =$ $8 - 3 =$ $5 - 7 =$ $5 + 7 =$ $7 - 3 =$ $5 - 6 =$ $5 + 6 =$ $6 - 3 =$ $5 - 5 =$ $5 + 5 =$ $5 - 3 =$ $5 - 4 =$ $5 + 4 =$ $4 - 3 =$ $5 - 3 =$ $5 + 3 =$ $3 - 3 =$ $5 - 2 =$ $5 + 2 =$ $2 - 3 =$ $5 - 1 =$ $5 + 1 =$ $1 - 3 =$ $5 - 0 =$ $5 + 0 =$ $0 - 3 =$ $5 - (-1) =$ $5 + (-1) =$ $(-1) - 3 =$ $5 - (-2) =$ $5 + (-2) =$ $(-2) - 3 =$ $5 - (-3) =$ $5 + (-3) =$ $(-3) - 3 =$ $5 - (-4) =$ $5 + (-4) =$ $(-4) - 3 =$ $5 - (-5) =$ $5 + (-5) =$ $(-5) - 3 =$ $5 - (-6) =$ $5 + (-6) =$ $(-6) - 3 =$\n3. Calculate.\n1. $80 + (-60)$\n2. $500 + (-200) + (-200)$\n1. Is $100 + (-20) + (-20) = 60$, or does it equal something else?\n2. What do you think $(-20) + (-20)$ is equal to?\n4. Calculate.\n1. $20 - 20$\n2. $50 - 20$\n3. $(-20) - (-20)$\n4. $(-50) - (-20)$\n5. Calculate.\n1. $20 - (-10)$\n2. $100 - (-100)$\n3. $20 + (-10)$\n4. $100 + (-100)$\n5. $(-20) - (-10)$\n6. $(-100) - (-100)$\n7. $(-20) + (-10)$\n8. $(-100) + (-100)$\n6. Complete the table as far as you can.\n (a) (b) (c) $5 - (-8)$ = $(-5) + 8 =$ $8 - (-3) =$ $5 - (-7) =$ $(-5) + 7 =$ $7 - (-3) =$ $5 - (-6) =$ $(-5) + 6 =$ $6 - (-3) =$ $5 - (-5) =$ $(-5) + 5 =$ $5 - (-3) =$ $5 - (-4) =$ $(-5) + 4 =$ $4 - (-3) =$ $5 - (-3) =$ $(-5) + 3 =$ $3 - (-3) =$ $5 - (-2) =$ $(-5) + 2 =$ $2 - (-3) =$ $5 - (-1) =$ $(-5) + 1 =$ $1 - (-3) =$ $5 - 0 =$ $(-5) + 0 =$ $0 - (-3) =$ $5 - 1 =$ $(-5) + (-1) =$ $(-1) - (-3) =$ $5 - 2 =$ $(-5) + (-2) =$ $(-2) - (-3) =$ $5 - 3 =$ $(-5) + (-3) =$ $(-3) - (-3) =$ $5 - 4 =$ $(-5) + (-4) =$ $(-4) - (-3) =$ $5 - 5 =$ $(-5) + (-5) = -$ $(-5) - (-3) =$\n7. In each case, state whether the statement is true or false and give a numerical example to demonstrate your answer.\n1. Subtracting a positive number from a negative number has the same effect as dding the additive inverse of the positive number.\n2. Adding a negative number to a positive number has the same effect as adding the additive inverse of the negative number.\n3. Subtracting a negative number from a positive number has the same effect as subtracting the additive inverse of the negative number.\n4. Adding a negative number to a positive number has the same effect as subtracting the additive inverse of the negative number.\n5. Adding a positive number to a negative number has the same effect as adding the additive inverse of the positive number.\n6. Adding a positive number to a negative number has the same effect as subtracting the additive inverse of the positive number.\n7. Subtracting a positive number from a negative number has the same effect as subtracting the additive inverse of the positive number.\n8. Subtracting a negative number from a positive number has the same effect as adding the additive inverse of the negative number.\n\nComparing integers and solving problems\n\n1. Fill <, > or = into the block to make the relationship between the numbers true:\n1. -103 ☐ -99\n2. -699 ☐ -701\n3. 30 ☐ -30\n4. 10-7 ☐ -(10-7)\n5. -121 ☐ -200\n6. -12 - 5 ☐ -(12 + 5)\n7. -199 ☐ -110\n2. At 5 a.m. in Bloemfontein the temperature was -5 °C. At 1 p.m., it was 19 °C. By how many degrees did the temperature rise?\n3. A diver swims 150 m below the surface of the sea. She moves 75 m towards the surface. How far below the surface is she now?\n4. One trench in the ocean is 800 m deep and another is 2 200 m deep. What is the difference in their depths?\n5. An island has a mountain which is 1 200 m high. The surrounding ocean has a depth of 860 m. What is the difference in height?\n6. On a winter's day in Upington the temperature rose by 19 °C. If the minimum temperature was -4 °C, what was the maximum temperature?\n\nMultiplying and dividing with integers\n\nMultiplication with integers\n\n1. Calculate.\n1. $-5 + -5 + -5 + -5 + -5 + -5 + -5 + -5 + -5 + -5$\n2. $-10 + -10 + -10 + -10 + -10$\n3. $-6 + -6 + -6 + -6 + -6 + -6 + -6 + -6$\n4. $-8 + -8 + -8 + -8 + -8 + -8$\n5. $-20 + -20 + -20 + -20 + -20 + -20 + -20$\n2. In each case, show whether you agree (✓) or disagree (✗) with the given statement.\n1. $10 \\times (-5) = 50$\n2. $8 \\times (-6) = (-8) \\times 6$\n3. $(-5) \\times 10 = 5 \\times (-10)$\n4. $6 \\times (-8) = -48$\n5. $(-5) \\times 10 = 10 \\times (-5)$\n6. $8 \\times (-6) = 48$\n7. $4 \\times 12 = -48$\n8. $(-4) \\times 12 = -48$\n\nMultiplication of integers is commutative:\n\n$(-20) \\times 5 = 5 \\times (-20)$\n\n1. Is addition of integers commutative? Demonstrate your answer with three different examples.\n2. Calculate.\n1. $20 \\times (-10)$\n2. $(-5) \\times 4$\n3. $(-20) \\times 10$\n4. $4 \\times (-25)$\n5. $29 \\times (-20)$\n6. $(-29) \\times (-2)$\n3. Calculate.\n1. $10 \\times 50 + 10 \\times (-30)$\n2. $50 + (-30)$\n3. $10 \\times {\\bf(}50 + (-30){\\bf)}$\n4. $(-50) + (-30)$\n5. $10 \\times (-50) + 10 \\times (-30)$\n6. $10 \\times {\\bf(}(-50) + (-30){\\bf)}$\n\nThe product of two positive numbers is a positive number, for example $5 \\times 6 = 30$.\n\nThe product of a positive number and a negative number is a negative number, for example $5 \\times (-6) = -30$.\n\nThe product of a negative number and a positive number is a negative number, for example $(-5) \\times 6 = -30$.\n\n1. Four numerical expressions are given below. Underline the expressions that you would expect to have the same answers. Do not do the calculations.\n\n$14 \\times (23 + 58) \\\\ 23 \\times (14 + 58) \\\\ 14 \\times 23 + 14 \\times 58 \\\\ 14 \\times 23 + 58$\n\n2. What property of operations is demonstrated by the fact that two of the above expressions have the same value?\n1. Consider your answers for question 6.\n1. Does multiplication distribute over addition in the case of integers?\n2. Illustrate your answer with two examples.\n2. Three numerical expressions are given below. Underline the expressions that you would expect to have the same answers. Do not do the calculations.\n\n$10 \\times {\\bf(}(-50) - (-30){\\bf)} \\\\ 10 \\times (-50) - (-30) \\\\ 10 \\times (-50) - 10 \\times (-30)$\n\n3. Do the three sets ofcalculations given in question 8.\n\nYour work in questions 5, 8 and 9 demonstrates that multiplication with a positive number distributes over addition and subtraction of integers. For example:\n\n$10 \\times {\\bf(}5 + (-3){\\bf)} = 10 \\times 2 = {\\bf20} \\text{ and } 10 \\times 5 + 10 \\times (-3) = 50 + (-30) = {\\bf 20}$\n\n$10 \\times {\\bf(}5 - (-3){\\bf)} = 10 \\times 8 = {\\bf 80} \\text{ and } 10 \\times 5 - 10 \\times (-3) = 50 - (-30) = {\\bf 80}$\n\n1. Calculate: $(-10) \\times {\\bf(}5 + (-3){\\bf)}$\n\nNow consider the question of whether multiplication with a negative number distributes over addition and subtraction of integers. For example, would $(-10) \\times 5 + (-10) \\times (-3)$ also have the answer -20, as does $(-10) \\times {\\bf(}5 + (-3){\\bf)}$?\n\n1. What must $(-10) \\times (-3)$ be equal to, if we want $(-10) \\times 5 + (-10) \\times (-3)$ to be equal to -20?\n\nIn order to ensure that multiplication distributes over addition and subtraction in the system of integers, we have to agree that\n\n(a negative number) $\\times$ (a negative number) is a positive number,\n\nfor example $(-10) \\times (-3) = 30$.\n\n1. Calculate.\n1. $(-10) \\times (-5)$\n2. $(-10) \\times 5$\n3. $10 \\times 5$\n4. $10 \\times (-5)$\n5. $(-20) \\times (-10) + (-20) \\times (-6)$\n6. $(-20) \\times {\\bf(}(-10) + (-6){\\bf)}]$\n7. $(-20) \\times (-10) - (-20) \\times (-6)$\n8. $(-20) \\times {\\bf(}(-10) - (-6){\\bf)}$\n\nHere is a summary of the properties of integers that make it possible to do calculations with integers:\n\n• When a number is added to its additive inverse, the result is 0, for example $(+12) + (-12) = 0$.\n• Adding an integer has the same effect as subtracting its additive inverse. For example, $3 + (-10)$ can be calculated by doing $3 - 10$, and the answer is -7.\n• Subtracting an integer has the same effect as adding its additive inverse. For example, $3 - (-10)$ can be calculated by doing $3 + 10$, and the answer is 13.\n• The product of a positive and a negative integer is negative, for example $(-15) \\times 6 = -90$.\n• The product of a negative and a negative integer is positive, for example $(-15) \\times (-6) = 90$.\n\nDivision with integers\n\n1. Calculate $25 \\times 8$.\n2. How much is $200 \\div 25?$\n3. How much is $200 \\div 8?$\n\nDivision is the inverse of multiplication. Hence, if two numbers and the value of their product are known, the answers to two division problems are also known.\n\n1. Calculate.\n1. $25 \\times\\ (-8) )$\n2. $(-125) \\times 8$\n2. Use the work you have done for question 2 to write the answers for the following division questions:\n1. $(-1 000) \\div (-125)$\n2. $(-1 000) \\div 8$\n3. $(-200) \\div 25$\n4. $(-200) \\div 8$\n3. Can you also work out the answers for the following division questions by using the work you have done for question 2?\n1. $1 000 \\div (-125)$\n2. $(-1 000) \\div (-8)$\n3. $(-100) \\div (-25)$\n4. $100 \\div (-25)$\n\nWhen two numbers are multiplied, for example $30 \\times 4 = 120$, the word \"product\" can be used in various ways to describe the situation:\n\n• An expression that specifies multiplication only, such as $30 \\times 4$, is called a product or a product expression.\n• The answer obtained is also called the product of the two numbers. For example, 120 is called the product of 30 and 4.\n\nAn expression that specifies division only, such as $30 \\div 5$, is called a quotient or a quotient expression. The answer obtained is also called the quotient of the two numbers. For example, 6 is called the quotient of 30 and 5.\n\n1. In each case, state whether you agree or disagree with the statement, and give an example to illustrate your answer.\n1. The quotient of a positive and a negative integer is negative.\n2. The quotient of a positive and a positive integer is negative.\n3. The quotient of a negative and a negative integer is negative.\n4. The quotient of a negative and a negative integer is positive.\n2. Do the necessary calculations to enable you to provide the values of the quotients.\n1. $(-500) \\div (-20)$\n2. $(-144) \\div 6$\n3. $1 440 \\div (-60)$\n4. $(-1 440) \\div (-6)$\n5. $-14 400 \\div 600$\n6. $500 \\div (-20)$\n\nThe associative properties of operations with integers\n\nMultiplication of whole numbers is associative. This means that in a product with several factors, the factors can be placed in any sequence, and the calculations can be performed in any sequence. For example, the following sequences of calculations will all produce the same answer:\n\n1. $2 \\times 3$, the answer of $2 \\times 3$ multiplied by 5, the new answer multiplied by 10\n2. $2 \\times 5$, the answer of $2 \\times 5$ multiplied by 10, the new answer multiplied by 3\n3. $10 \\times 5$, the answer of $10 \\times 5$ multiplied by 3, the new answer multiplied by 2\n4. $3 \\times 5$, the answer of $3 \\times 5$ multiplied by 2, the new answer multiplied by 10\n1. Do the four sets of calculations given in A to D to check whether they really produce the same answers.\n\n1. If the numbers 3 and 10 in the calculation sequences A, B, C and D are replaced with -3 and -10, do you think the four answers will still be the same?\n2. Investigate, to check your expectation.\n\nMultiplication with integers is associative.\n\nThe calculation sequence A can be represented in symbols in only two ways:\n\n• $2 \\times 3 \\times 5 \\times 10$. The convention to work from left to right unless otherwise indicated with brackets ensures that this representation corresponds to A.\n• $5 \\times (2 \\times 3) \\times 10$, where brackets are used to indicate that $2 \\times 3$ should be calculated first. When brackets are used, there are different possibilities to describe the same sequence.\n1. Express the calculation sequences B, C and D given above symbolically, without using brackets.\n2. Investigate, in the same way that you did for multiplication in question 2, whether addition with integers is associative. Use sequences of four integers.\n1. Calculate: $80 - 30 + 40 - 20$\n2. Calculate: $80 + (-30) + 40 + (-20)$\n3. Calculate: $30 - 80 + 20 - 40$\n4. Calculate: $(-30) + 80 + (- 20) + 40$\n5. Calculate: $20 + 30 - 40 - 80$\n\nMixed calculations with integers\n\n1. Calculate.\n1. $-3 \\times 4 + (-7) \\times 9$\n2. $-20(-4 - 7)$\n3. $20 \\times (-5) - 30 \\times 7$\n4. $-9(20 - 15)$\n5. $-8 \\times (-6) - 8 \\times 3$\n6. $(-26 - 13) \\div (-3)$\n7. $-15 \\times (-2) + (-15) \\div (-3)$\n8. $-15(2 - 3)$\n9. $(-5 + -3) \\times 7$\n10. $-5 \\times (-3 + 7) + 20 \\div (-4)$\n2. Calculate.\n1. $20 \\times (-15 + 6) - 5 \\times (-2 - 8) - 3 \\times (-3 - 8)$\n2. $40 \\times (7 + 12 - 9) + 25 \\div (-5) - 5 \\div 5$\n3. $-50(20 - 25) + 30(-10 + 7) - 20(-16 + 12)$\n4. $-5 \\times (-3 + 12 - 9)$\n5. $-4 \\times (30 - 50) + 7 \\times (40 - 70) - 10 \\times (60 - 100)$\n6. $-3 \\times (-14 + 6) \\times (-13 + 7) \\times (-20 + 5)$\n7. $20 \\times (-5) + 10 \\times (-3) + (-5) \\times (-6) - (3 \\times 5)$\n8. $-5(-20 - 5) + 10(-7 - 3) - 20(-15 - 5) + 30(-40 - 35)$\n9. $(-50 + 15 - 75) \\div (-11) + (6 - 30 + 12) \\div (-6)$\n\nSquares, cubes and roots with integers\n\nSquares and cubes of integers\n\n1. Calculate.\n1. $20 \\times 20$\n2. $20 \\times (-20)$\n2. Write the answers for each of the following:\n1. $(-20) \\times 20$\n2. $(-20) \\times (-20)$\n3. Complete the table.\n $x$ 1 -1 2 -2 5 -5 10 -10 $x^2$ which is $x \\times x$ $x^3$\n4. In each case, state for which values of $x$, in the table in question 3, the given statement is true.\n1. $x^3$ is a negative number\n2. $x^2$ is a negative number\n3. $x^2$ > $x^3$\n4. $x^2$ < $x^3$\n5. Complete the table.\n $x$ 3 -3 4 -4 6 -6 7 -7 $x^2$ $x^3$\n6. Ben thinks of a number. He adds 5 to it, and his answer is 12.\n1. What number did he think of?\n2. Is there another number that would also give 12 when 5 is added to it?\n7. Lebo also thinks of a number. She multiplies the number by itself and gets 25.\n1. What number did she think of?\n2. Is there more than one number that will give 25 when multiplied by itself?\n8. Mary thinks of a number and calculates (the number) $\\times$ (the number) $\\times$ (the number). Her answer is 27.\n\nWhat number did Mary think of?\n\n$10^2$ is 100 and $(-10)^2$ is also 100.\n\nBoth 10 and (-10) are called square roots of 100. 10 maybe called the posistive square root of 100> and (-10) may be called the neagtive square root of 100\n\n1. Write the positive square root and the negative square root of each number.\n1. 64\n2. 9\n2. Complete the table.\n Number 1 4 9 16 25 36 49 64 Positive square root 3 8 Negative square root -3 -8\n3. Complete the tables.\n1. $x$ 1 2 3 4 5 6 7 8 $x^3$\n2. $x$ -1 -2 -3 -4 -5 -6 -7 -8 $x^3$\n\n$3^3$ is 27 and $(-5)^3$ is -125.\n\n3 is called the cube root of 27, because $3^3 = 27$.\n\n-5 is called the cube root of -125 because $(-5)^3 = -125$.\n\n1. Complete the table.\n Number -1 8 -27 -64 -125 -216 1 000 Cube root -3 10\n\nThe symbol $\\sqrt{}$ is used to indicate \"root\".\n\n$\\sqrt{-125}$ represents the cube root of -125. That means $\\sqrt{-125} = -5$.\n\n$\\sqrt{36}$ represents the positive square root of 36, and $- \\sqrt{36}$ represents the negative square root. The \"2\" that indicates \"square\" is normally omitted, so $\\sqrt{36} = 6$ and $- \\sqrt{36} = - 6$.\n\n1. Complete the table.\n $\\sqrt{-8}$ $\\sqrt{121}$ $\\sqrt{-64}$ $- \\sqrt{64}$ $\\sqrt{64}$ $\\sqrt{-1}$ $-\\sqrt{1}$ $\\sqrt{-216}$\n1. Use the numbers -8, -5 and -3 to demonstrate each of the following:\n1. Multiplication with integers distributes over addition.\n2. Multiplication with integers distributes over subtraction.\n3. Multiplication with integers is associative.\n4. Addition with integers is associative.\n2. Calculate each of the following without using a calculator:\n1. $5 \\times (-2)^3$\n2. $3 \\times (-5)^2$\n3. $2 \\times (-5)^3$\n4. $10 \\times (-3)^2$\n3. Use a calculator to calculate each of the following:\n1. $24 \\times (-53) + (-27) \\times (-34) - (-55) \\times 76$\n2. $64 \\times (27 - 85) - 29 \\times (-47 + 12)$\n4. Use a calculator to calculate each of the following:\n1. $-24 \\times 53 + 27 \\times 34 + 55 \\times 76$\n2. $64 \\times (-58) + 29 \\times (47 - 12)$\n\nIf you don't get the same answers in questions 3 and 4, you have made mistakes." ]
[ null, "https://www.siyavula.com/read/maths/grade-8/integers/images/Maths-Gr8-Eng-Term1-p29.png", null, "https://www.siyavula.com/read/maths/grade-8/integers/images/Maths-Gr8-Eng-Term1-p30.png", null, "https://www.siyavula.com/read/maths/grade-8/integers/images/84456.png", null, "https://www.siyavula.com/read/maths/grade-8/integers/images/84447.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8315064,"math_prob":0.9999875,"size":25548,"snap":"2019-43-2019-47","text_gpt3_token_len":8533,"char_repetition_ratio":0.20102568,"word_repetition_ratio":0.20729622,"special_character_ratio":0.46062315,"punctuation_ratio":0.07784562,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.99997044,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,6,null,6,null,6,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-14T19:03:00Z\",\"WARC-Record-ID\":\"<urn:uuid:261f4e7d-ce84-4de8-be99-92120860b53b>\",\"Content-Length\":\"118845\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ba0736ed-5513-4436-a026-58944f9cf23b>\",\"WARC-Concurrent-To\":\"<urn:uuid:5f27ec3d-27be-4ca6-972e-d8ddc5e62dd1>\",\"WARC-IP-Address\":\"197.221.50.110\",\"WARC-Target-URI\":\"https://www.siyavula.com/read/maths/grade-8/integers/02-integers?id=toc-id-8\",\"WARC-Payload-Digest\":\"sha1:RG5CMPUEW4MMCNRSABM6WNR4JW7KS64F\",\"WARC-Block-Digest\":\"sha1:IYMIIHHCINX5MKTAHJAHXSFLHWZR72RF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986654086.1_warc_CC-MAIN-20191014173924-20191014201424-00555.warc.gz\"}"}
https://commons.apache.org/proper/commons-math/javadocs/api-3.5/org/apache/commons/math3/stat/correlation/StorelessCovariance.html
[ "org.apache.commons.math3.stat.correlation\n\n## Class StorelessCovariance\n\n• public class StorelessCovariance\nextends Covariance\nCovariance implementation that does not require input data to be stored in memory. The size of the covariance matrix is specified in the constructor. Specific elements of the matrix are incrementally updated with calls to incrementRow() or increment Covariance().\n\nThis class is based on a paper written by Philippe Pébay: Formulas for Robust, One-Pass Parallel Computation of Covariances and Arbitrary-Order Statistical Moments, 2008, Technical Report SAND2008-6212, Sandia National Laboratories.\n\nNote: the underlying covariance matrix is symmetric, thus only the upper triangular part of the matrix is stored and updated each increment.\n\nSince:\n3.0\n• ### Constructor Summary\n\nConstructors\nConstructor and Description\nStorelessCovariance(int dim)\nCreate a bias corrected covariance matrix with a given dimension.\nStorelessCovariance(int dim, boolean biasCorrected)\nCreate a covariance matrix with a given number of rows and columns and the indicated bias correction.\n• ### Method Summary\n\nMethods\nModifier and Type Method and Description\nvoid append(StorelessCovariance sc)\nAppends sc to this, effectively aggregating the computations in sc with this.\ndouble getCovariance(int xIndex, int yIndex)\nGet the covariance for an individual element of the covariance matrix.\nRealMatrix getCovarianceMatrix()\nReturns the covariance matrix\ndouble[][] getData()\nReturn the covariance matrix as two-dimensional array.\nint getN()\nThis Covariance method is not supported by a StorelessCovariance, since the number of bivariate observations does not have to be the same for different pairs of covariates - i.e., N as defined in Covariance.getN() is undefined.\nvoid increment(double[] data)\nIncrement the covariance matrix with one row of data.\n• ### Methods inherited from class org.apache.commons.math3.stat.correlation.Covariance\n\ncomputeCovarianceMatrix, computeCovarianceMatrix, computeCovarianceMatrix, computeCovarianceMatrix, covariance, covariance\n• ### Methods inherited from class java.lang.Object\n\nclone, equals, finalize, getClass, hashCode, notify, notifyAll, toString, wait, wait, wait\n• ### Constructor Detail\n\n• #### StorelessCovariance\n\npublic StorelessCovariance(int dim)\nCreate a bias corrected covariance matrix with a given dimension.\nParameters:\ndim - the dimension of the square covariance matrix\n• #### StorelessCovariance\n\npublic StorelessCovariance(int dim,\nboolean biasCorrected)\nCreate a covariance matrix with a given number of rows and columns and the indicated bias correction.\nParameters:\ndim - the dimension of the covariance matrix\nbiasCorrected - if true the covariance estimate is corrected for bias, i.e. n-1 in the denominator, otherwise there is no bias correction, i.e. n in the denominator.\n• ### Method Detail\n\n• #### getCovariance\n\npublic double getCovariance(int xIndex,\nint yIndex)\nthrows NumberIsTooSmallException\nGet the covariance for an individual element of the covariance matrix.\nParameters:\nxIndex - row index in the covariance matrix\nyIndex - column index in the covariance matrix\nReturns:\nthe covariance of the given element\nThrows:\nNumberIsTooSmallException - if the number of observations in the cell is < 2\n• #### increment\n\npublic void increment(double[] data)\nthrows DimensionMismatchException\nIncrement the covariance matrix with one row of data.\nParameters:\ndata - array representing one row of data.\nThrows:\nDimensionMismatchException - if the length of rowData does not match with the covariance matrix\n• #### append\n\npublic void append(StorelessCovariance sc)\nthrows DimensionMismatchException\nAppends sc to this, effectively aggregating the computations in sc with this. After invoking this method, covariances returned should be close to what would have been obtained by performing all of the increment(double[]) operations in sc directly on this.\nParameters:\nsc - externally computed StorelessCovariance to add to this\nThrows:\nDimensionMismatchException - if the dimension of sc does not match this\nSince:\n3.3\n• #### getCovarianceMatrix\n\npublic RealMatrix getCovarianceMatrix()\nthrows NumberIsTooSmallException\nReturns the covariance matrix\nOverrides:\ngetCovarianceMatrix in class Covariance\nReturns:\ncovariance matrix\nThrows:\nNumberIsTooSmallException - if the number of observations in a cell is < 2\n• #### getData\n\npublic double[][] getData()\nthrows NumberIsTooSmallException\nReturn the covariance matrix as two-dimensional array.\nReturns:\na two-dimensional double array of covariance values\nThrows:\nNumberIsTooSmallException - if the number of observations for a cell is < 2" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7006957,"math_prob":0.9368086,"size":3684,"snap":"2021-31-2021-39","text_gpt3_token_len":821,"char_repetition_ratio":0.19375,"word_repetition_ratio":0.19246861,"special_character_ratio":0.17833877,"punctuation_ratio":0.10594796,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.983237,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-18T06:56:36Z\",\"WARC-Record-ID\":\"<urn:uuid:dc125351-3896-4f99-9214-91d12f7ec834>\",\"Content-Length\":\"26890\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4e0b4927-a9d9-4071-82bd-0e559c5ccde5>\",\"WARC-Concurrent-To\":\"<urn:uuid:6657a50a-ba08-482e-84e2-df2120498a2c>\",\"WARC-IP-Address\":\"151.101.2.132\",\"WARC-Target-URI\":\"https://commons.apache.org/proper/commons-math/javadocs/api-3.5/org/apache/commons/math3/stat/correlation/StorelessCovariance.html\",\"WARC-Payload-Digest\":\"sha1:QSPWZHEOTYKEATU7MYGTAZ4YWGZZWCEA\",\"WARC-Block-Digest\":\"sha1:UCVSSAFWCXJK7WDIXZKNCXYXRURUNVUW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780056348.59_warc_CC-MAIN-20210918062845-20210918092845-00427.warc.gz\"}"}
https://community.powerbi.com/t5/Desktop/DAX-Multiple-If/m-p/1504874
[ "cancel\nShowing results for\nDid you mean:", null, "Helper IV\n\n## DAX Multiple If\n\nHi\n\nI have a visual table that displays the following columns 'week start' and 'w number' (Note the w number is a measure)\n\nI require a multiple IF to show text based on the 'w number' results in my visual table.\n\nI have tried this DAX\n\nW-Result = IF(AND([W number]>=0,[W number]<=1),\"X1\"&IF(AND([W number]>1,[W number]<=2),\"X2\"&IF(AND([W number]>2,[W number]<=20),\"X3\")))\n\nHere are the results which are not what I expected (Below are my expected results)\n Week start W number W-Result 21/09/2020 1.4 28/09/2020 1.2 05/10/2020 1.6 12/10/2020 1.2 26/10/2020 1.6 02/11/2020 1.1 09/11/2020 1.8 16/11/2020 1.7 19/10/2020 0.8 X1\n\nThis is what I am expecting\n Week start W number W-Result 21/09/2020 1.4 X2 28/09/2020 1.2 X2 05/10/2020 1.6 X2 12/10/2020 3.1 X3 26/10/2020 1.6 X2 02/11/2020 1.1 X2 09/11/2020 1.8 X2 16/11/2020 1.7 X2 19/10/2020 0.8 X1\n\nThank you\n\nRichard\n\n1 ACCEPTED SOLUTION", null, "Solution Specialist\n\nYou are using AND that resukts whn satatement is true\n\nTry the bottom.\n\nResultado W-Result á IF(AND([W number]>-0,[W number]<-1),\"X1\",IF(AND([W number]>1,[W number]<-2),\"X2\",IF(AND([W number]>2,[W number]<-20),\"X3\")))\n\nRehards,\n\nManikumar\n\n3 REPLIES 3", null, "Helper IV\n\nThank you", null, "Solution Specialist\n\nLeave a like if you find helpful.\n\nRegards,\n\nManikumar", null, "Solution Specialist\n\nYou are using AND that resukts whn satatement is true\n\nTry the bottom.\n\nResultado W-Result á IF(AND([W number]>-0,[W number]<-1),\"X1\",IF(AND([W number]>1,[W number]<-2),\"X2\",IF(AND([W number]>2,[W number]<-20),\"X3\")))\n\nRehards,\n\nManikumar", null, "", null, "" ]
[ null, "https://community.powerbi.com/html/rank_icons/Posts Rank [email protected]", null, "https://community.powerbi.com/html/rank_icons/Solutions Rank [email protected]", null, "https://community.powerbi.com/html/rank_icons/Posts Rank [email protected]", null, "https://community.powerbi.com/html/rank_icons/Solutions Rank [email protected]", null, "https://community.powerbi.com/html/rank_icons/Solutions Rank [email protected]", null, "https://community.powerbi.com/skins/images/43426777FFE7DA5AE0DFBB54E125F730/responsive_peak/images/icon_anonymous_message.png", null, "https://community.powerbi.com/html/assets/spinner-slide.gif", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7167359,"math_prob":0.9764257,"size":1547,"snap":"2021-04-2021-17","text_gpt3_token_len":588,"char_repetition_ratio":0.18988982,"word_repetition_ratio":0.20960699,"special_character_ratio":0.45119587,"punctuation_ratio":0.1312336,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9687756,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-18T18:01:37Z\",\"WARC-Record-ID\":\"<urn:uuid:a30c016f-2d47-4d5f-a509-7db0132bf61f>\",\"Content-Length\":\"467057\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5505b9ee-2475-4cd2-a40a-852e12f29987>\",\"WARC-Concurrent-To\":\"<urn:uuid:a00d5b01-11d2-408a-bce1-01bf21efcef9>\",\"WARC-IP-Address\":\"104.111.102.26\",\"WARC-Target-URI\":\"https://community.powerbi.com/t5/Desktop/DAX-Multiple-If/m-p/1504874\",\"WARC-Payload-Digest\":\"sha1:FDVAEM2Y6IWGT4HOF34TQ2K7AMYPW7JE\",\"WARC-Block-Digest\":\"sha1:AZGVI2QWPSKXHD4UQBE5RAURRE2RQJVL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703515075.32_warc_CC-MAIN-20210118154332-20210118184332-00651.warc.gz\"}"}
https://divisiblebot.com/divisors/537/
[ "# Divisors of 537\n\nIn this article we are going to list out the divisors of 537, explain and define what a divisor is, and also show you how to calculate and find the divisors of 537 (or any number) yourself.\n\nWhen you are trying to solve a word problem that is written like \"X divided by Y equals Z\", there are three main parts which we are concerned with. These are the Dividend, the Divisor, and the Quotient.\n\nDividend (X) / Divisor (Y) = Quotient\n\nWe are looking in this case for the divisors of 537. The divisors of 537 must be a whole number, and the resulting quotient must also be a whole number.\n\n537 / Divisor (Whole Number) = Quotient (Whole Number)\n\nTo do this manually, you can divide the number 537 by every whole number from 1 to 537. For example:\n\n• 537 / 1 = 537\n• 537 / 2 = 268.5\n• 537 / 3 = 179\n• 537 / 4 = 134.25\n• 537 / 5 = 107.4\n• etc...\n\nOnce you have done that you can go through the list of divisors and find only those that have a quotient that is a whole number. Each of those is a divisor of 537.\n\nThis can be done a lot quicker and a lot easier by computers than it can be by hand, so we have gone through all of the divisors of 537 automatically for you and found the entire list of divisors.\n\nHere are all of the divisors of 537:\n\n• 1\n• 3\n• 179\n• 537\n\nIf you need the divisors of 537 in a comma separated list, here they are:\n\n1, 3, 179, and 537\n\nIf you want to practice this yourself you can grab a pencil and a piece of paper and try to find the divisors of another whole number from 4-100.\n\n### Link To or Reference This Page\n\nIf you found this content useful in your research, please do us a great favor and use the tool below to make sure you properly reference us wherever you use it. We really appreciate your support!\n\n• \"Divisors of 537\". DivisibleBot.com. Accessed on June 12, 2021. https://divisiblebot.com/divisors/537/.\n\n• \"Divisors of 537\". DivisibleBot.com, https://divisiblebot.com/divisors/537/. Accessed 12 June, 2021.\n\n• Divisors of 537. DivisibleBot.com. Retrieved from https://divisiblebot.com/divisors/537/.\n\n## Random Calculations\n\nHere are some more random calculations for you:" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.906618,"math_prob":0.82380325,"size":2193,"snap":"2021-21-2021-25","text_gpt3_token_len":594,"char_repetition_ratio":0.17907721,"word_repetition_ratio":0.005050505,"special_character_ratio":0.30050159,"punctuation_ratio":0.12798265,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9760967,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-12T17:24:01Z\",\"WARC-Record-ID\":\"<urn:uuid:f439e43e-0615-4822-a573-63ade33907fa>\",\"Content-Length\":\"17875\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c514325c-e6f8-4e44-baf3-5a6572eeced6>\",\"WARC-Concurrent-To\":\"<urn:uuid:15e450a6-beff-46b2-96a6-c6286ee27756>\",\"WARC-IP-Address\":\"104.131.1.205\",\"WARC-Target-URI\":\"https://divisiblebot.com/divisors/537/\",\"WARC-Payload-Digest\":\"sha1:X7KPJVLKXBSTA2WO22YJZOGYMNZJAO3R\",\"WARC-Block-Digest\":\"sha1:PEOIMGVU5TARWMQWYNO7EALMPXNQL3TB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487586239.2_warc_CC-MAIN-20210612162957-20210612192957-00478.warc.gz\"}"}
https://docs.microsoft.com/en-gb/dotnet/api/system.windows.rect.parse?view=netframework-4.8
[ "# Rect.Parse(String)Rect.Parse(String)Rect.Parse(String)Rect.Parse(String) Method\n\n## Definition\n\nCreates a new rectangle from the specified string representation.\n\n``````public:\nstatic System::Windows::Rect Parse(System::String ^ source);``````\n``public static System.Windows.Rect Parse (string source);``\n``static member Parse : string -> System.Windows.Rect``\n``Public Shared Function Parse (source As String) As Rect``\n\n#### Parameters\n\nsource\nString String String String\n\nThe string representation of the rectangle, in the form \"x, y, width, height\".\n\n#### Returns\n\nThe resulting rectangle.\n\n## Examples\n\nThe following example shows how to use the Parse method to convert a string representation of a rectangle into a Rect structure.\n\n``````private Rect parseExample()\n{\n\n// Converts a string representation of a Rect into a Rect structure\n// using the Parse static method.\nRect resultRect = Rect.Parse(\"10,5, 200,50\");\n\nreturn resultRect;\n\n}\n``````\n``````Private Function parseExample() As Rect\n\n' Converts a string representation of a Rect into a Rect structure\n' using the Parse static method.\nDim resultRect As Rect = Rect.Parse(\"10,5, 200,50\")\n\nReturn resultRect\n\nEnd Function\n``````" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5460041,"math_prob":0.5162172,"size":1051,"snap":"2019-35-2019-39","text_gpt3_token_len":224,"char_repetition_ratio":0.16045845,"word_repetition_ratio":0.120567374,"special_character_ratio":0.226451,"punctuation_ratio":0.18781726,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95330894,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-18T09:36:41Z\",\"WARC-Record-ID\":\"<urn:uuid:7906037e-4151-4b0b-ad05-498870e31c16>\",\"Content-Length\":\"32967\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b106e3ef-3eaf-4b85-8577-9aae29fa302e>\",\"WARC-Concurrent-To\":\"<urn:uuid:2eb6ea60-45be-46ad-bd09-d421ff9748e8>\",\"WARC-IP-Address\":\"23.4.185.212\",\"WARC-Target-URI\":\"https://docs.microsoft.com/en-gb/dotnet/api/system.windows.rect.parse?view=netframework-4.8\",\"WARC-Payload-Digest\":\"sha1:2KFZL7NZOXJJQ2YBXCSJVN3QD6CYZDJN\",\"WARC-Block-Digest\":\"sha1:7AZLBIOC4FBUN3XTRSEPGMHMWLEANIOF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027313747.38_warc_CC-MAIN-20190818083417-20190818105417-00143.warc.gz\"}"}
https://thewebdev.info/2021/05/11/how-to-add-a-property-to-each-object-in-an-array-of-objects-with-javascript/
[ "Categories\n\n# How to Add a Property to Each Object in an Array of Objects with JavaScript?\n\nSpread the love\n\nSometimes, we want to add a property to each object in an array of JavaScript objects.\n\nIn this article, we’ll look at how to add a property to each object in an array of JavaScript objects.\n\n### Add a Property to Each Object in an Array of Objects with JavaScript with forEach\n\nWe can use the `forEach` method to loop through each element in an object and add a property to each.\n\nFor instance, we can write:\n\n``````const arr = [{\na: 'foo'\n}, {\na: 'bar'\n}, {\na: 'baz'\n}]\narr.forEach((element) => {\nelement.b = 'qux'\n});\nconsole.log(arr)\n``````\n\nWe have the `arr` array.\n\nThen we call `forEach` with a callback that has the `element` parameter with the object being iterated through and we assign the `b` property to a value.\n\nTherefore, `arr` is:\n\n``````[\n{\n\"a\": \"foo\",\n\"b\": \"qux\"\n},\n{\n\"a\": \"bar\",\n\"b\": \"qux\"\n},\n{\n\"a\": \"baz\",\n\"b\": \"qux\"\n}\n]\n``````\n\naccording to the console log.\n\n### Add a Property to Each Object in an Array of Objects with JavaScript with map\n\nAlso, we can use the `map` method to do the same thing.\n\nFor instance, we can write:\n\n``````const arr = [{\na: 'foo'\n}, {\na: 'bar'\n}, {\na: 'baz'\n}]\nconst mapped = arr.map((element) => ({\n...element,\nb: 'qux'\n}));\nconsole.log(mapped)\n``````\n\nWe call `map` with a callback where we spread the `element` object and add a `b` property to the same object.\n\nAnd `mapped` is:\n\n``````[\n{\n\"a\": \"foo\",\n\"b\": \"qux\"\n},\n{\n\"a\": \"bar\",\n\"b\": \"qux\"\n},\n{\n\"a\": \"baz\",\n\"b\": \"qux\"\n}\n]\n``````\n\naccording to the console log.\n\n### Conclusion\n\nWe can use the `forEach` method to loop through each element in an object and add a property to each.\n\nAlso, we can use the `map` method to do the same thing." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.77889204,"math_prob":0.71014106,"size":1528,"snap":"2021-21-2021-25","text_gpt3_token_len":429,"char_repetition_ratio":0.13517061,"word_repetition_ratio":0.54915255,"special_character_ratio":0.31871727,"punctuation_ratio":0.1958457,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9680249,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-19T13:01:23Z\",\"WARC-Record-ID\":\"<urn:uuid:e553aee3-17c8-4b49-a07d-0eb3a855025f>\",\"Content-Length\":\"367380\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:71107775-d848-4f5f-a0b4-235ba411cb3b>\",\"WARC-Concurrent-To\":\"<urn:uuid:e97df750-7668-4875-8225-33de8f9651ba>\",\"WARC-IP-Address\":\"50.16.49.81\",\"WARC-Target-URI\":\"https://thewebdev.info/2021/05/11/how-to-add-a-property-to-each-object-in-an-array-of-objects-with-javascript/\",\"WARC-Payload-Digest\":\"sha1:JC4Y6N6AZSLZW6VXD7EZKBJHT7L6KBTS\",\"WARC-Block-Digest\":\"sha1:IN7FUQHGXNG5VAQ5T3RKP5OYZES5X7JZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487648194.49_warc_CC-MAIN-20210619111846-20210619141846-00471.warc.gz\"}"}
https://r-graph-gallery.com/257-input-formats-for-network-charts.html
[ "# Network chart with R and igraph from any type of input\n\nThis post explains how to get started with the `igraph` package from any type of input. It shows how to build a network diagram from adjacency matrix, edge list, litteral list and more.\n\nAn adjacency matrix is a square matrix where individuals in rows and columns are the same.\n\nIt’s typically the kind of matrix you get when calculating the correlation between each pair of individual. In this example, we have 1 connection from E to C, and 2 connections from C to E. By default, we get an unweighted and oriented network.", null, "", null, "``````#library\nlibrary(igraph)\n\n# Create data\nset.seed(10)\ndata <- matrix(sample(0:2, 25, replace=TRUE), nrow=5)\ncolnames(data) = rownames(data) = LETTERS[1:5]\n\n# build the graph object\n\n# plot it\nplot(network)``````\n\n# Incidence matrix\n\nAn incidence matrix is not square and entities provided in rows and columns are not necessary the same.\n\nNote: by default, the graph object is directed from rows to columns.", null, "", null, "``````# lib\nlibrary(igraph)\n\n# data\nset.seed(1)\ndata <- matrix(sample(0:2, 15, replace=TRUE), nrow=3)\ncolnames(data) <- letters[1:5]\nrownames(data) <- LETTERS[1:3]\n\n# create the network object\nnetwork <- graph_from_incidence_matrix(data)\n\n# plot it\nplot(network)``````\n\n# Edge list\n\nAn edge list has 2 columns. Each row represents a connection between an origin (first column) and a destination (left column).\n\nNote: this kind of input often goes with another dataframe providing features for each node. (See this post). It is also possible to add information concerning each link in the edge list.", null, "", null, "``````# create data:\nsource=c(\"A\",\"A\", \"A\", \"A\", \"A\",\"F\", \"B\"),\ntarget=c(\"B\",\"B\", \"C\", \"D\", \"F\",\"A\",\"E\")\n)\n\n# create the network object\n\n# plot it\nplot(network)``````\n\n# Literal List of connections\n\nLast option that is less often used: a litteral list of the connection. Can be understand by `igraph` thanks to the `graph_from_literal()` function.", null, "``````# create data:\nnetwork <- graph_from_literal( A-B-C-D, E-A-E-A, D-C-A, D-A-D-C )\n\n# plot it\nplot(network)``````\n\nRelated chart types\n\n## Contact\n\nThis document is a work by Yan Holtz. Any feedback is highly encouraged. You can fill an issue on Github, drop me a message on Twitter, or send an email pasting yan.holtz.data with gmail.com." ]
[ null, "https://r-graph-gallery.com/img/table/SquareMatrix.png", null, "https://r-graph-gallery.com/257-input-formats-for-network-charts_files/figure-html/thecode2-1.png", null, "https://r-graph-gallery.com/img/table/AdjacencyRect.png", null, "https://r-graph-gallery.com/257-input-formats-for-network-charts_files/figure-html/thecode3-1.png", null, "https://r-graph-gallery.com/img/table/EdgeList.png", null, "https://r-graph-gallery.com/257-input-formats-for-network-charts_files/figure-html/thecode4-1.png", null, "https://r-graph-gallery.com/257-input-formats-for-network-charts_files/figure-html/thecode5-1.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7888967,"math_prob":0.9297994,"size":1881,"snap":"2023-40-2023-50","text_gpt3_token_len":474,"char_repetition_ratio":0.1097496,"word_repetition_ratio":0.03533569,"special_character_ratio":0.26262626,"punctuation_ratio":0.1456044,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9919949,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-01T13:01:12Z\",\"WARC-Record-ID\":\"<urn:uuid:77059789-d0ec-4ee4-9ae9-8ffda79a7f65>\",\"Content-Length\":\"21990\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7ae80346-7ebe-4642-b209-06813ae2074d>\",\"WARC-Concurrent-To\":\"<urn:uuid:e92d06ee-29d2-48b1-b5d5-3a6d09905378>\",\"WARC-IP-Address\":\"185.199.109.153\",\"WARC-Target-URI\":\"https://r-graph-gallery.com/257-input-formats-for-network-charts.html\",\"WARC-Payload-Digest\":\"sha1:JLDKSJWPPG5RT63YIKK4WJIIGCYS2FAO\",\"WARC-Block-Digest\":\"sha1:EU2T4FHMC5OPLCXBPTFRIHBHNLK34ZOP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100287.49_warc_CC-MAIN-20231201120231-20231201150231-00792.warc.gz\"}"}
https://community.jmp.com/t5/Discussions/How-does-JMP-Pro-compute-the-RSquare-for-neural-networks-and/m-p/109125
[ "Share your ideas for the JMP Scripting Unsession at Discovery Summit by September 17th. We hope to see you there!\nChoose Language Hide Translation Bar\nHighlighted\n\n## How does JMP Pro compute the RSquare for neural networks and bootstrap forests?\n\nDear all, I am wondering how does JMP compute the RSquare for neural nets and bootstrap forest? What are the formulas? For example, I know the calculation of RSquare for least square regression: \"RSquare: Estimates the proportion of variation in the response that can be attributed to the model rather than to random error. Using quantities from the corresponding Analysis of Variance table, RSquare (also called the coefficient of multiple determination) is calculated as: sum of squares (Model)/ sum of squares (C. Total)\" I found that in the manual there are two RSquares for neural nets and bootstrap forests: Generalized RSquare & Entropy RSquare. However, when I ran my neural nets and bootstrap forests, I only got one RSquare: RSquare, which is not explained in the manual. So I am writing to ask how is this RSquare be calculated? Is there a formula? Thank you.\n1 ACCEPTED SOLUTION\n\nAccepted Solutions\nHighlighted\n\n## Re: How does JMP Pro compute the RSquare for neural networks and bootstrap forests?\n\nIf your response variable is continuous then you get R square the same as for linear regression. If your response is categorical, then you get the other two R square measures.\n\nThe generalized R square is the same as R square for a continuous response.\n\nThe entropy R square is the ratio of the log likelihood difference between the full and reduced model to the log likelihood of the reduced model.\n\nLearn it once, use it forever!\n3 REPLIES 3\nHighlighted\n\n## Re: How does JMP Pro compute the RSquare for neural networks and bootstrap forests?\n\nIf your response variable is continuous then you get R square the same as for linear regression. If your response is categorical, then you get the other two R square measures.\n\nThe generalized R square is the same as R square for a continuous response.\n\nThe entropy R square is the ratio of the log likelihood difference between the full and reduced model to the log likelihood of the reduced model.\n\nLearn it once, use it forever!\nHighlighted\n\n## Re: How does JMP Pro compute the RSquare for neural networks and bootstrap forests?\n\nIs there a equation of how to calculate RSquare for neural networks with 10-fold cross validation?\n\nI just wondering if JMP overestimate the RSquare.\n\nI ran a neural network (10-fold cross validation, Robust fit, 1 Tour), both RSquares of Training and Validation are > 0.8 (Fig1.png).\n\nThen I generated a new column \"Predicted Y\" by \"Save Fast Formulas\".\n\nHowever, the RSquare between Y and Predicted Y is only 0.74 (Fig2.png).\n\nHighlighted\n\n## Re: How does JMP Pro compute the RSquare for neural networks and bootstrap forests?\n\nHello Leon,\n\nthe validation strategy separates your data into two groups and the rsquare is calculated for both groups separately. When you save the prediction formula and plot predicted vs observed that thenm takes all data into one set. Clearly the rsquare of this regression is less than that of the two separate groups.\n\nArticle Labels\n\nThere are no labels assigned to this post." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9318486,"math_prob":0.9767809,"size":1585,"snap":"2020-34-2020-40","text_gpt3_token_len":330,"char_repetition_ratio":0.13978495,"word_repetition_ratio":0.4962963,"special_character_ratio":0.20567824,"punctuation_ratio":0.09120521,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99563295,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-21T03:35:08Z\",\"WARC-Record-ID\":\"<urn:uuid:03eb7949-8d6e-4528-8bec-0def7bc304f5>\",\"Content-Length\":\"712715\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b167caf6-2d15-448e-8e4e-200571047f71>\",\"WARC-Concurrent-To\":\"<urn:uuid:943d8a29-bb45-4335-a108-3ed2048cf097>\",\"WARC-IP-Address\":\"208.74.205.23\",\"WARC-Target-URI\":\"https://community.jmp.com/t5/Discussions/How-does-JMP-Pro-compute-the-RSquare-for-neural-networks-and/m-p/109125\",\"WARC-Payload-Digest\":\"sha1:ONLH2LHNA3TM5F3WH4HQCWRFVQ4RCENI\",\"WARC-Block-Digest\":\"sha1:KY77J5O5GVNYHGR3N2PMMMFBK6EPOM2F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400198887.3_warc_CC-MAIN-20200921014923-20200921044923-00232.warc.gz\"}"}
https://studylib.net/doc/25397543/themochem
[ "# ThemoChem", null, "```I.\nThermochemistry\nA. The study of the transfer of energy as heat that accompany chemical reactions and\nphysical changes\nB. Enthalpy\n1. Energy flow as heat\n2. Represented by a capital H\n3. ΔH\n4. Change\na) Final-Initial\nC. Laws of Thermodynamics (3)\n1. Law #1\na) Energy cannot be created or destroyed, just transferred or\ntransformed\nb) Law of Conservation of Energy\nc) Key terms\n(1) Joule(J)\n(a) The unit for heat as well as all other forms of\nenergy\n(2) Heat\n(a) Can be thought of as the energy between samples of\nmatter because of a difference in their temperatures\n(3) Temperature\n(a) The measure of the average kinetic energy of the\nparticles in a sample of matter\n(b) Warmer = zipping/moving faster/higher energy\n(c)\n(4) Exothermic vs. Endothermic\n(a) Exothermic\n(i)\nOut to system\n(b) Endothermic\n(i)\nIn\n(c) Which direction does the energy (heat) flow in each\ncase?\n(i)\nHigh to low\n(5) Calorimetry\n(a) The energy absorbed or released as heat in a\nchemical or physical change is measure in a\ncalorimeter\n(6) Two Types\n(a) Coffee Cup vs. Bomb\n(i)\nIn coffee cup (the more common), known\nquantities of reactants are sealed in a\nreaction chamber, which is immersed in a\nknown quantity of water in an insulated\nvessel\n(ii) The energy absorbed during the reaction is\nequal to the energy absorbed by the known\nquantity of water\n(iii)\nThe amount of energy is determined from\nthe temperature change of the known mass\nof surrounding water\n(iv)\nThe quantity of energy transferred as heat\nduring a temperature change depends on the\nnature on\n(a) What substance\n(b) How much of the substance\n(c) How much of change\n(b) Formula\n(i)\nq = c * m * Δt\n(a) q is energy lost of gain (+ or -)\n(i)\nNegative=losing energy to\nenvironment\n(ii) Exo\n(iii)\nPositive\n(iv)\nendo\n(b) m is mass in grams of material\n(c) Δt the difference between initial and\nfinal temperatures in C\n(d) C is specific heat. This is the amount\nof energy required to raise the\ntemperature of one gram of\nsubstance by one degree Celsius.\nFinal -Initial. Unkown.\n(j/g*C)aserr6t\n```" ]
[ null, "https://s3.studylib.net/store/data/025397543_1-7746276a90a0ab27c88893d6270d3adb-768x994.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.93235105,"math_prob":0.9674001,"size":2050,"snap":"2021-31-2021-39","text_gpt3_token_len":525,"char_repetition_ratio":0.12707722,"word_repetition_ratio":0.0,"special_character_ratio":0.24487805,"punctuation_ratio":0.05154639,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9802118,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-30T16:49:38Z\",\"WARC-Record-ID\":\"<urn:uuid:637f3042-e050-4c42-ba6e-e256a2b5b632>\",\"Content-Length\":\"41841\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:580b357b-6958-4667-ad8b-b10e94512773>\",\"WARC-Concurrent-To\":\"<urn:uuid:836ed7ac-5197-4b77-8d34-499633f96bf1>\",\"WARC-IP-Address\":\"104.21.72.58\",\"WARC-Target-URI\":\"https://studylib.net/doc/25397543/themochem\",\"WARC-Payload-Digest\":\"sha1:RR6SEFXC54LYQ4NKRHNETKM7W4DE7OES\",\"WARC-Block-Digest\":\"sha1:WJHKNLNMIR27PFPBN3YJA3EG57QJKE7L\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153971.20_warc_CC-MAIN-20210730154005-20210730184005-00386.warc.gz\"}"}
https://blog.hawkeslearning.com/2019/02/11/answer-equivalence-in-calculus-courseware/?shared=email&msg=fail
[ "# Answer Equivalence in Calculus Courseware\n\nWe know that oftentimes in calculus, there’s more than one way to solve a problem. While some online systems don’t allow for multiple correct answers, Hawkes Learning’s courseware was built by subject matter experts who painstakingly went through examples to ensure students are given credit for equivalent answers.\n\nMarvin, one of our lead calculus content editors, explained why it’s so important to include equivalent answers in the courseware: “There are often different methods of solving, and we don’t want to penalize students for getting a correct answer. When that happens, students get frustrated and doubt themselves. We want to boost their confidence.”\n\nOur calculus subject matter experts Marvin and Claudia shared a few examples that show our courseware giving credit for correct alternative answers.\n\n# Sample Problem from Trigonometric Integrals\n\nThe first two correct answers are generated using Method 1 of solving, while the next three are generated using Method 2 of solving.\n\n## Problem\n\nEvaluate the indefinite integral ∫ 7tan(4x)sec6(4x)dx. Use C for the constant of integration. Write the exact answer. Do not round.\n\nMethod 1: We can use u-substitution with u = sec(4x) after rewriting the integral as\n7 ∫ sec5(4x) · sec(4x)tan(4x)dx. Note that the answer has the fraction 7/24 as the coefficient of the secant function.", null, "Method 1: We can use u-substitution with u = sec(4x) after rewriting the integral as\n7 ∫ sec5(4x) · sec(4x) tan(4x)dx. Note that the answer has the secant function as part of the numerator of the answer.", null, "Method 2: We can use u-substitution with u = tan(4x) after rewriting the integral as\n7 ∫ tan(4x) [1 + tan2(4x)]2sec2(4x)dx. Note that the answer has several terms with tangent and fractional coefficients.", null, "Method 2: We can use u-substitution with u = tan(4x) after rewriting the integral as\n7 ∫ tan(4x) [1 + tan2(4x)]2sec2(4x)dx. Note that the answer has the fraction 7/8 factored out.", null, "Method 2: We can use u-substitution with u = tan(4x) after rewriting the integral as\n7 ∫ tan(4x) [1 + tan2(4x)]2sec2(4x)dx. Note that the answer has the fraction 7tan2(4x)/8 factored out.", null, "## Correct Answers 6 & 7\n\nIf students rewrite the integrand in terms of sine and cosine and work it out correctly, credit is also given.\n\nBelow are two examples of a student answering the problem using cos(4x).", null, "", null, "# Sample Problem from The Chain Rule\n\nThis question shows the application of the Chain Rule, and the correct answer can be written in different ways as shown below.\n\n## Problem\n\nFind the derivative of the function F(x) = – 3(13 + 2√x)-5.\n\nThe student applies the Chain Rule and writes the last factor as 1/√x.", null, "The student applies the Chain Rule and writes the last factor as x -1/2.", null, "The student applies the Chain Rule and rewrites the square root of x in terms of fractional exponents.", null, "The student applies the Chain Rule and rewrites the whole answer as one fraction using the positive exponent 6 for the expression in parentheses.", null, "The student applies the Chain Rule and rewrites the answer as one fraction using the exponent of negative 6 for the expression in parentheses.", null, "# Sample Problem from Integration by Parts\n\n## Problem\n\nEvaluate the integral ∫(t + 1)e4tdt. Use C for the constant of integration. Write the exact answer. Do not round. (Hint: Use an alternative method if integration by parts is not required.)\n\nThe student applies integration by parts and writes the answer obtained by evaluating\nuv – ∫ v du.", null, "The student applies integration by parts and writes the answer as one fraction with the common denominator and e4t factored out.", null, "The student applies integration by parts and writes the answer with e4t factored out but no common denominator for the fractions.", null, "", null, "Interested in seeing more of the calculus courseware? Contact us today at [email protected] or 1-800-426-9538 to get free access to the student courseware!\n\n## 2 thoughts on “Answer Equivalence in Calculus Courseware”\n\n1.", null, "Nick belloit says:\n\nFor the first example involving trigonometric integrals, you did cover many of the possible answers. However, a common approach by students is to rewrite the integrand in terms of sine and cosine. In that case, let u = cos(4x) and the result would be (7/24)(cos(4x))^-6 + C.\n\n•", null, "HawkesLearning says:\n\nGreat point, Professor Belloit! Our courseware does accept that as correct. I’ve updated the blog post with a few screenshots addressing that method. I appreciate you looking at the answers so closely! Thank you, and let us know if you have more questions." ]
[ null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc3-1.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc3-2.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc3-3.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc3-4.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc3-5.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/1clc.jpg", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/2clc.jpg", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc1-1.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc1-2.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc1-3.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc1-4.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc1-5.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc2-1.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc2-2.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/clc2-3.png", null, "https://hawkeslearningblog.files.wordpress.com/2019/02/calc-book-and-computer.gif", null, "https://0.gravatar.com/avatar/31aa63b644a62ab0fbd5038bc1b1b7a6", null, "https://2.gravatar.com/avatar/89b7655c739690c63a8d7b2f712dae91", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88400763,"math_prob":0.9084265,"size":4651,"snap":"2021-31-2021-39","text_gpt3_token_len":1143,"char_repetition_ratio":0.16074887,"word_repetition_ratio":0.26631853,"special_character_ratio":0.22898301,"punctuation_ratio":0.07945517,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98713535,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,6,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-28T10:24:25Z\",\"WARC-Record-ID\":\"<urn:uuid:da1ce8c7-edc0-4bb6-bb1a-2466580103f3>\",\"Content-Length\":\"178082\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ff56f583-8520-41fb-81ce-3bfe4806629f>\",\"WARC-Concurrent-To\":\"<urn:uuid:ad86430d-1de3-4fab-b3f6-21919bbc2fd0>\",\"WARC-IP-Address\":\"192.0.78.13\",\"WARC-Target-URI\":\"https://blog.hawkeslearning.com/2019/02/11/answer-equivalence-in-calculus-courseware/?shared=email&msg=fail\",\"WARC-Payload-Digest\":\"sha1:CWB4NYOBZCPZXHXSKXKDIAK63BT4WSL5\",\"WARC-Block-Digest\":\"sha1:XAYMIOAGU2X5JNQEY2GC3OUDZLIVRVPU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780060677.55_warc_CC-MAIN-20210928092646-20210928122646-00365.warc.gz\"}"}
https://www.jpost.com/middle-east/hamas-policemen-arrest-men-with-immodest-haircuts-308995
[ "(function (a, d, o, r, i, c, u, p, w, m) { m = d.getElementsByTagName(o), a[c] = a[c] || {}, a[c].trigger = a[c].trigger || function () { (a[c].trigger.arg = a[c].trigger.arg || []).push(arguments)}, a[c].on = a[c].on || function () {(a[c].on.arg = a[c].on.arg || []).push(arguments)}, a[c].off = a[c].off || function () {(a[c].off.arg = a[c].off.arg || []).push(arguments) }, w = d.createElement(o), w.id = i, w.src = r, w.async = 1, w.setAttribute(p, u), m.parentNode.insertBefore(w, m), w = null} )(window, document, \"script\", \"https://95662602.adoric-om.com/adoric.js\", \"Adoric_Script\", \"adoric\",\"9cc40a7455aa779b8031bd738f77ccf1\", \"data-key\");\nvar domain=window.location.hostname; var params_totm = \"\"; (new URLSearchParams(window.location.search)).forEach(function(value, key) {if (key.startsWith('totm')) { params_totm = params_totm +\"&\"+key.replace('totm','')+\"=\"+value}}); var rand=Math.floor(10*Math.random()); var script=document.createElement(\"script\"); script.src=`https://stag-core.tfla.xyz/pre_onetag?pub_id=34&domain=\\${domain}&rand=\\${rand}&min_ugl=0\\${params_totm}`; document.head.append(script);" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.98285186,"math_prob":0.96919554,"size":2309,"snap":"2023-40-2023-50","text_gpt3_token_len":489,"char_repetition_ratio":0.11800434,"word_repetition_ratio":0.0,"special_character_ratio":0.19878735,"punctuation_ratio":0.08908686,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9789482,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-26T11:48:50Z\",\"WARC-Record-ID\":\"<urn:uuid:a0e48d2d-ff6c-44df-8447-8f709c5c1f21>\",\"Content-Length\":\"86619\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a2b55a5b-f9cf-4d27-8442-060ad8f808d9>\",\"WARC-Concurrent-To\":\"<urn:uuid:8a236c0a-9751-401a-814c-ccbeec0ebae0>\",\"WARC-IP-Address\":\"159.60.130.79\",\"WARC-Target-URI\":\"https://www.jpost.com/middle-east/hamas-policemen-arrest-men-with-immodest-haircuts-308995\",\"WARC-Payload-Digest\":\"sha1:Y4MZTNXHR6D6FJ5VWHFEDBKFNX4BJL7O\",\"WARC-Block-Digest\":\"sha1:3JM5AWX5JBUGXNBIC3L7B7YOYV4KFXGA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510208.72_warc_CC-MAIN-20230926111439-20230926141439-00018.warc.gz\"}"}
https://es.mathworks.com/matlabcentral/cody/problems/43628-find-cosine-between-two-given-vectors-u-and-v/solutions/1031732
[ "Cody\n\n# Problem 43628. Find cosine between two given vectors u and v.\n\nSolution 1031732\n\nSubmitted on 25 Oct 2016 by Andriy Kavetsky\nThis solution is locked. To view this solution, you need to provide a solution of the same size or smaller.\n\n### Test Suite\n\nTest Status Code Input and Output\n1   Pass\nu = [5 2 0 5 3 0]; v = [3 2 5 1 0 2]; y_correct = 0.4611; assert(abs(VecCos(u,v)-y_correct)<10^(-4))\n\nans = 0.4611\n\n2   Pass\nu = 2:0.05:3; v = 3:-0.05:2; y_correct = 0.9711; assert(abs(VecCos(u,v)-y_correct)<10^(-4))\n\nans = 0.9711" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.59678847,"math_prob":0.99440444,"size":451,"snap":"2020-10-2020-16","text_gpt3_token_len":174,"char_repetition_ratio":0.13422818,"word_repetition_ratio":0.0,"special_character_ratio":0.46784922,"punctuation_ratio":0.18348624,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9864304,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-04-09T18:34:59Z\",\"WARC-Record-ID\":\"<urn:uuid:2cb4378c-e887-4540-8fa4-f0a257108e21>\",\"Content-Length\":\"73144\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7771faa8-6df7-4b59-aa12-1e167b47bd29>\",\"WARC-Concurrent-To\":\"<urn:uuid:3123f227-b5f4-440c-9ffc-65df1eb6786c>\",\"WARC-IP-Address\":\"23.32.68.178\",\"WARC-Target-URI\":\"https://es.mathworks.com/matlabcentral/cody/problems/43628-find-cosine-between-two-given-vectors-u-and-v/solutions/1031732\",\"WARC-Payload-Digest\":\"sha1:FWF6EODAQEYRB3R7FQB6U3JGRK6FCMOK\",\"WARC-Block-Digest\":\"sha1:BPQA7GQTHS2VDY3SALVNUQINOKJPIN7L\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-16/CC-MAIN-2020-16_segments_1585371861991.79_warc_CC-MAIN-20200409154025-20200409184525-00484.warc.gz\"}"}
http://www.beatthegmat.com/mba/2010/12/08/breaking-down-a-gmatprep-absolute-value-problem
[ "# Breaking Down a GMATPrep Absolute Value Problem\n\nby , Dec 8, 2010", null, "A student taking the test soon has requested an article on Absolute Value, so thats what were going to tackle this week; the problem is from GMATPrep.\n\nIs |x|>|y|?\n\n(1) (x^2) > (y^2)\n\n(2) x > y\n\nThe first thing youll probably notice: I didnt include the answer choices. The five Data Sufficiency answer choices are always the same, so we should have those memorized. If you dont have them memorized yet, add this to your to do list.\n\nJust in case, here are the five choices (in casual language, not official language):\n\n(A) statement 1 works but statement 2 does not work\n\n(B) statement 2 works but statement 1 does not work\n\n(C) the statements do NOT work alone, but they DO work together\n\n(D) each statement works by itself\n\n(E) nothing works, not even using them together\n\nOkay, now that weve got that out of the way, lets tackle this problem! This ones a tricky theory question; theyre asking us about the concept of absolute value (as opposed to asking us to do more straightforward calculations with absolute value).\n\nI have two variables, x and y, and Im asked a yes/no question about a particular inequality. My task is to determine whether I can answer this question always yes, always no, or sometimes yes, sometimes no given various pieces of information in the statements. An always yes or always no answer is sufficient to answer the question. A sometimes yes, sometimes no answer is NOT sufficient to answer the question.\n\nFirst, I want to decide whether I can figure anything out just from the question stem (before I start addressing the statements). In this case, the question stem asks about a single inequality and provides absolute value symbols in that inequality. The absolute value of a particular number refers to how far that number is from zero on the number line without regard to the sign (positive or negative) of that number. For example, the absolute value of -5 is 5, because -5 is five units away from zero on the number line.\n\nThe question is asking whether the absolute value of x is greater than the absolute value of y. Sketch a quick number line. Draw a few tick marks and label the one in the middle zero (we want some positive and some negative, since this is an absolute value problem). Now think. What would have to be true in order for that statement to be true?\n\nPick a value for y and place it on your number line; show where y would be if it were either positive or negative (but the same number / distance from zero). Where would x have to go in order to make the statement true?\n\nYour drawing might look something like this:", null, "What does the drawing mean in words? In order for the question stem to be true, the distance from zero to x would have to be greater than the distance from zero to y, regardless of the sign. We can simplify that statement a little. The distance from zero to x can be expressed as the magnitude of x. So heres the question in normal language:\n\nIs the magnitude of x greater than the magnitude of y?\n\nNext, I glance at the statements to decide which one I want to address first. If I think one is noticeably easier than the other, though, then I start with the easier one; otherwise, I start with statement 1. Do you think one statement is easier on this problem?\n\nI think statement 2 is easier so were going to start with statement 2. (Note: determining the relative difficulty of the two statements is a somewhat subjective call; different people will disagree and thats okay. Start with the one you think is easier.)\n\n(2) x > y\n\nI have two choices here: I can try some numbers or I can think this through theoretically (if I think I know the theory well enough). Well discuss both ways.\n\nWhat kinds of number combinations could make this true? For example, x could be 3 and y could be 2. That would make the statement x > y valid, so Im allowed to try those numbers. If x = 3 and y = 2, is the answer to my question yes, no, or maybe? (Look at your number line.) The answer is yes.\n\nNow that I have found one example where I can answer yes to my question, my next goal is to see whether I can think of an example that would give me a no answer.What Im really trying to do here is figure out whether theres a pair of numbers that will make the expression x > y true but for which the magnitude of x is not actually greater than the magnitude of y. What about one positive and one negative? Try x = 2 and y = -3. The expression x > y true, but the magnitude of x is now less than the magnitude of y. The answer to our question is no this time.", null, "Alternatively, I can think through the above theoretically. This is often faster than trying numbers, but it is also harder: if I dont know the theory well enough, I either wont be able to tackle the statement this way or Ill be more likely to make a mistake with it. If I do know the theory here, then I also know that placing x > y on a number line is simply a matter of placing x somewhere to the right of y. The question, though, is asking about the distance from x or y to zero. I can place x and y anywhere, so long as x is to the right of y, and the possibilities include placing y closer to zero or placing x closer to zero.\n\nA yes and no answer is insufficient. Eliminate choices B and D.\n\nNow we have to tackle the more annoying (to me!) statement: 1.\n\n[pmath]x^2[/pmath] > [pmath]y^2[/pmath]\n\nMany people will first think: if plain old x < y didnt work, is this one really going to work? But you know the GMAT loves to trap us; let's get to work!\n\nAgain, we can try numbers or think things through theoretically. Lets try numbers first and, wherever it makes sense, try to reuse the numbers you used for the first statement you evaluated (because then you can reuse some of your work!). We first tried x = 3 and y = 2; do those numbers make this statement true? Yes: 9 > 4. Is the answer to our question yes or no using these numbers? Yes, the magnitude of x is greater than the magnitude of y.\n\nHow about our no numbers from the 2nd statement? Can we also use those for this 1st statement? We tried x = 2 and y = -3. Hmm. Plugging those in for the expression in statement 1 yields 4 > 9. Thats not true, so we cant use these numbers. Are there other numbers that do make the expression [pmath]x^2[/pmath] > [pmath]y^2[/pmath]true and that also yield a no answer to our question?\n\nHeres where trying numbers gets tricky. It turns out that we could sit here all day but wed never find numbers that make the expression [pmath]x^2[/pmath] > [pmath]y^2[/pmath]true and that also yield a no answer to our question because this statement is sufficient to answer the question yes always. On the test, youd try three or four sets of different numbers (with different characteristics positives and negatives, fractions, etc.) and, if you kept getting a yes answer, youd go with it, though you wouldnt be 100% positive that you were right (you could have just failed to test the right combination of numbers).\n\nIn this case, youd either try a few different sets and then go with the consistent answer youre getting or you would see whether you could think it through theoretically. So lets test the theory now.\n\nWhat characteristics would the numbers, x and y, have to have in order to make the expression [pmath]x^2[/pmath]>[pmath]y^2[/pmath]true? The signs wouldnt matter. What would matter is only the basic number, stripped of its sign. (Thats interesting just like the signs dont matter in absolute value) What would have to be true of the basic numbers (ignoring the signs)? Hmm. The basic number for x would have to be larger than the basic number for y. Whats the basic number when disregarding the sign? Hey thats just the magnitude or the absolute value of the number! So, in fact, statement 1 is literally defining the expression |x|>|y|. Excellent! Statement 1 is sufficient.\n\nNote: The above is true even for fractions between zero and one. When you square a fraction between zero and one, that number gets smaller instead of getting larger, but when you square a smaller fraction and a larger fraction, the square of the smaller will still be smaller than the square of the larger. For example, if x = 1/2 and y = 1/3, the square of x is 1/4 and the square of y is 1/9. The x value is larger than the y value and the [pmath]x^2[/pmath]value is larger than the [pmath]y^2[/pmath]value.\n\nThe correct answer is A. Also, in future, I want to remember that the expression [pmath]x^2[/pmath]>[pmath]y^2[/pmath]can be rephrased as |x|>|y|. Add this one to your list of Unscramble the Code rephrasings.\n\n## Key Takeaways for Solving Theoretical Absolute Value Problems:\n\n(1) Its worth taking the time to manipulate or simplify the expressions, equations, or inequalities using absolute value symbols. On theory problems, sketch out a number line and use that to understand what the text is really saying or asking. Know how to solve absolute value equations or inequalities algebraically as well (we didnt have a problem that required this today).\n\n(2) If you know the theory inside and out, think it through theoretically; if not, test some numbers. Either way, on data sufficiency yes/no questions, your goal is to try to find a yes and a no. If you can, then you know the info was not sufficient; if you keep getting only yes answers or only no answers, then its probably the case that the info is sufficient.\n\n* GMATPrep questions courtesy of the Graduate Management Admissions Council. Usage of this question does not imply endorsement by GMAC." ]
[ null, "https://static.blog.beatthegmat.com/mba/files/2009/12/mathhmwk-excerpt.jpg", null, "https://static.blog.beatthegmat.com/mba/files/2010/12/Screen-shot-2010-12-05-at-5.56.22-PM.png", null, "https://static.blog.beatthegmat.com/mba/files/2010/12/Screen-shot-2010-12-05-at-5.56.32-PM.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9184974,"math_prob":0.94890475,"size":11677,"snap":"2019-51-2020-05","text_gpt3_token_len":3089,"char_repetition_ratio":0.1387818,"word_repetition_ratio":0.03079044,"special_character_ratio":0.28269246,"punctuation_ratio":0.09225413,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99458,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,4,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-20T10:23:53Z\",\"WARC-Record-ID\":\"<urn:uuid:62d6e195-7762-4564-a58b-3a8b10635b7f>\",\"Content-Length\":\"57860\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b6a6862e-fc32-499a-a523-0268b95fb7cb>\",\"WARC-Concurrent-To\":\"<urn:uuid:13ef5ba7-13d1-42a6-9f09-4342aa3da04b>\",\"WARC-IP-Address\":\"67.43.10.203\",\"WARC-Target-URI\":\"http://www.beatthegmat.com/mba/2010/12/08/breaking-down-a-gmatprep-absolute-value-problem\",\"WARC-Payload-Digest\":\"sha1:VPXKGBZMRMH73Z7Z57C23CYFQMTHVRKG\",\"WARC-Block-Digest\":\"sha1:DVXREEAPAF3OYLOEBG7UFNKI2HJUDD3M\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250598217.23_warc_CC-MAIN-20200120081337-20200120105337-00479.warc.gz\"}"}
https://lists.gnu.org/archive/html/emacs-elpa-diffs/2019-03/msg00081.html
[ "emacs-elpa-diffs\n[Top][All Lists]\n\n## [elpa] externals/peg 2fa278b: * peg.el (merge-error): Don't use add-to-l\n\n From: Stefan Monnier Subject: [elpa] externals/peg 2fa278b: * peg.el (merge-error): Don't use add-to-list on a local var Date: Sun, 10 Mar 2019 18:20:20 -0400 (EDT)\n\n```branch: externals/peg\n\n* peg.el (merge-error): Don't use add-to-list on a local var\n\nFix remaining uses of `cl` and some compiler warnings\n---\n.gitignore | 3 +\npeg.el | 186 ++++++++++++++++++++++++++++++++-----------------------------\n2 files changed, 100 insertions(+), 89 deletions(-)\n\ndiff --git a/.gitignore b/.gitignore\nnew file mode 100644\nindex 0000000..9f246e4\n--- /dev/null\n+++ b/.gitignore\n@@ -0,0 +1,3 @@\n+*.elc\n+peg-pkg.el\ndiff --git a/peg.el b/peg.el\nindex 2d3773f..8f238f1 100644\n--- a/peg.el\n+++ b/peg.el\n@@ -609,24 +609,24 @@ input. PATH is the list of rules that we have visited so\nfar.\"\n(peg-detect-cycles exp path)\nt)\n\n-(peg-add-method detect-cycles char (path c) nil)\n-(peg-add-method detect-cycles set (path r c k) nil)\n-(peg-add-method detect-cycles range (path c1 c2) nil)\n-(peg-add-method detect-cycles str (path s) (equal s \"\"))\n-(peg-add-method detect-cycles = (path s) nil)\n-(peg-add-method detect-cycles syntax-class (p n) nil)\n-(peg-add-method detect-cycles action (path form) t)\n+(peg-add-method detect-cycles char (_path _c) nil)\n+(peg-add-method detect-cycles set (_path _r _c _k) nil)\n+(peg-add-method detect-cycles range (_path _c1 _c2) nil)\n+(peg-add-method detect-cycles str (_path s) (equal s \"\"))\n+(peg-add-method detect-cycles = (_path _s) nil)\n+(peg-add-method detect-cycles syntax-class (_p _n) nil)\n+(peg-add-method detect-cycles action (_path _form) t)\n\n(peg-define-method-table merge-error)\n\n@@ -649,28 +649,35 @@ input. PATH is the list of rules that we have visited so\nfar.\"\n(peg-merge-error e1 merged))\n\n+ (cl-adjoin str merged :test #'equal))\n\n+ (cl-adjoin rule merged :test #'equal))\n\n+ ;; (add-to-list 'merged (string char))\n+ (cl-adjoin (string char) merged :test #'equal))\n\n(peg-add-method merge-error set (merged r c k)\n- (add-to-list 'merged (peg-make-charset-regexp r c k)))\n+ ;; (add-to-list 'merged (peg-make-charset-regexp r c k))\n+ (cl-adjoin (peg-make-charset-regexp r c k) merged :test #'equal))\n\n(peg-add-method merge-error range (merged from to)\n- (add-to-list 'merged (format \"[%c-%c]\" from to)))\n+ ;; (add-to-list 'merged (format \"[%c-%c]\" from to))\n+ (cl-adjoin (format \"[%c-%c]\" from to) merged :test #'equal))\n\n(peg-merge-error exp merged))\n\n+ (cl-adjoin '(any) merged :test #'equal))\n\n+ ;; (add-to-list 'merged `(not ,x))\n+ (cl-adjoin `(not ,x) merged :test #'equal))\n\n(peg-add-method merge-error action (merged _) merged)\n@@ -699,83 +706,85 @@ resp. succeded instead of signaling an error.\"\n\n(defun peg-test ()\n(interactive)\n- (assert (peg-parse-string ((s \"a\")) \"a\" t))\n- (assert (not (peg-parse-string ((s \"a\")) \"b\" t)))\n- (assert (peg-parse-string ((s (not \"a\"))) \"b\" t))\n- (assert (not (peg-parse-string ((s (not \"a\"))) \"a\" t)))\n- (assert (peg-parse-string ((s (if \"a\"))) \"a\" t))\n- (assert (not (peg-parse-string ((s (if \"a\"))) \"b\" t)))\n- (assert (peg-parse-string ((s \"ab\")) \"ab\" t))\n- (assert (not (peg-parse-string ((s \"ab\")) \"ba\" t)))\n- (assert (not (peg-parse-string ((s \"ab\")) \"a\" t)))\n- (assert (peg-parse-string ((s (range ?0 ?9))) \"0\" t))\n- (assert (not (peg-parse-string ((s (range ?0 ?9))) \"a\" t)))\n- (assert (peg-parse-string ((s [0-9])) \"0\" t))\n- (assert (not (peg-parse-string ((s [0-9])) \"a\" t)))\n- (assert (not (peg-parse-string ((s [0-9])) \"\" t)))\n- (assert (peg-parse-string ((s (any))) \"0\" t))\n- (assert (not (peg-parse-string ((s (any))) \"\" t)))\n- (assert (peg-parse-string ((s (eob))) \"\" t))\n- (assert (peg-parse-string ((s (not (eob)))) \"a\" t))\n- (assert (peg-parse-string ((s (or \"a\" \"b\"))) \"a\" t))\n- (assert (peg-parse-string ((s (or \"a\" \"b\"))) \"b\" t))\n- (assert (not (peg-parse-string ((s (or \"a\" \"b\"))) \"c\" t)))\n- (assert (peg-parse-string ((s (and \"a\" \"b\"))) \"ab\" t))\n- (assert (peg-parse-string ((s (and \"a\" \"b\"))) \"abc\" t))\n- (assert (not (peg-parse-string ((s (and \"a\" \"b\"))) \"ba\" t)))\n- (assert (peg-parse-string ((s (and \"a\" \"b\" \"c\"))) \"abc\" t))\n- (assert (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"b\" t))\n- (assert (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"ab\" t))\n- (assert (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"aaab\" t))\n- (assert (not (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"abc\" t)))\n- (assert (peg-parse-string ((s \"\")) \"abc\" t))\n- (assert (peg-parse-string ((s \"\" (eob))) \"\" t))\n- (assert (peg-parse-string ((s (opt \"a\") \"b\")) \"abc\" t))\n- (assert (peg-parse-string ((s (opt \"a\") \"b\")) \"bc\" t))\n- (assert (not (peg-parse-string ((s (or))) \"ab\" t)))\n- (assert (peg-parse-string ((s (and))) \"ab\" t))\n- (assert (peg-parse-string ((s (and))) \"\" t))\n- (assert (peg-parse-string ((s [\"^\"])) \"^\" t))\n- (assert (peg-parse-string ((s [\"^a\"])) \"a\" t))\n- (assert (peg-parse-string ((s [\"-\"])) \"-\" t))\n- (assert (peg-parse-string ((s [\"]-\"])) \"]\" t))\n- (assert (peg-parse-string ((s [\"^]\"])) \"^\" t))\n- (assert (peg-parse-string ((s [alpha])) \"z\" t))\n- (assert (not (peg-parse-string ((s [alpha])) \"0\" t)))\n- (assert (not (peg-parse-string ((s [alpha])) \"\" t)))\n- (assert (not (peg-parse-string ((s [\"][:alpha:]\"])) \"z\" t)))\n- (assert (peg-parse-string ((s (bob))) \"\" t))\n- (assert (peg-parse-string ((s (bos))) \"x\" t))\n- (assert (not (peg-parse-string ((s (bos))) \" x\" t)))\n- (assert (peg-parse-string ((s \"x\" (eos))) \"x\" t))\n- (assert (peg-parse-string ((s (syntax-class whitespace))) \" \" t))\n- (assert (peg-parse-string ((s (= \"foo\"))) \"foo\" t))\n- (assert (let ((f \"foo\")) (peg-parse-string ((s (= f))) \"foo\" t)))\n- (assert (not (peg-parse-string ((s (= \"foo\"))) \"xfoo\" t)))\n- (assert (equal (peg-parse-string ((s `(-- 1 2))) \"\") '(2 1)))\n- (assert (equal (peg-parse-string ((s `(-- 1 2) `(a b -- a b))) \"\") '(2 1)))\n- (assert (equal (peg-parse-string ((s (or (and (any) s)\n+ (cl-assert (peg-parse-string ((s \"a\")) \"a\" t))\n+ (cl-assert (not (peg-parse-string ((s \"a\")) \"b\" t)))\n+ (cl-assert (peg-parse-string ((s (not \"a\"))) \"b\" t))\n+ (cl-assert (not (peg-parse-string ((s (not \"a\"))) \"a\" t)))\n+ (cl-assert (peg-parse-string ((s (if \"a\"))) \"a\" t))\n+ (cl-assert (not (peg-parse-string ((s (if \"a\"))) \"b\" t)))\n+ (cl-assert (peg-parse-string ((s \"ab\")) \"ab\" t))\n+ (cl-assert (not (peg-parse-string ((s \"ab\")) \"ba\" t)))\n+ (cl-assert (not (peg-parse-string ((s \"ab\")) \"a\" t)))\n+ (cl-assert (peg-parse-string ((s (range ?0 ?9))) \"0\" t))\n+ (cl-assert (not (peg-parse-string ((s (range ?0 ?9))) \"a\" t)))\n+ (cl-assert (peg-parse-string ((s [0-9])) \"0\" t))\n+ (cl-assert (not (peg-parse-string ((s [0-9])) \"a\" t)))\n+ (cl-assert (not (peg-parse-string ((s [0-9])) \"\" t)))\n+ (cl-assert (peg-parse-string ((s (any))) \"0\" t))\n+ (cl-assert (not (peg-parse-string ((s (any))) \"\" t)))\n+ (cl-assert (peg-parse-string ((s (eob))) \"\" t))\n+ (cl-assert (peg-parse-string ((s (not (eob)))) \"a\" t))\n+ (cl-assert (peg-parse-string ((s (or \"a\" \"b\"))) \"a\" t))\n+ (cl-assert (peg-parse-string ((s (or \"a\" \"b\"))) \"b\" t))\n+ (cl-assert (not (peg-parse-string ((s (or \"a\" \"b\"))) \"c\" t)))\n+ (cl-assert (peg-parse-string ((s (and \"a\" \"b\"))) \"ab\" t))\n+ (cl-assert (peg-parse-string ((s (and \"a\" \"b\"))) \"abc\" t))\n+ (cl-assert (not (peg-parse-string ((s (and \"a\" \"b\"))) \"ba\" t)))\n+ (cl-assert (peg-parse-string ((s (and \"a\" \"b\" \"c\"))) \"abc\" t))\n+ (cl-assert (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"b\" t))\n+ (cl-assert (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"ab\" t))\n+ (cl-assert (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"aaab\" t))\n+ (cl-assert (not (peg-parse-string ((s (* \"a\") \"b\" (eob))) \"abc\" t)))\n+ (cl-assert (peg-parse-string ((s \"\")) \"abc\" t))\n+ (cl-assert (peg-parse-string ((s \"\" (eob))) \"\" t))\n+ (cl-assert (peg-parse-string ((s (opt \"a\") \"b\")) \"abc\" t))\n+ (cl-assert (peg-parse-string ((s (opt \"a\") \"b\")) \"bc\" t))\n+ (cl-assert (not (peg-parse-string ((s (or))) \"ab\" t)))\n+ (cl-assert (peg-parse-string ((s (and))) \"ab\" t))\n+ (cl-assert (peg-parse-string ((s (and))) \"\" t))\n+ (cl-assert (peg-parse-string ((s [\"^\"])) \"^\" t))\n+ (cl-assert (peg-parse-string ((s [\"^a\"])) \"a\" t))\n+ (cl-assert (peg-parse-string ((s [\"-\"])) \"-\" t))\n+ (cl-assert (peg-parse-string ((s [\"]-\"])) \"]\" t))\n+ (cl-assert (peg-parse-string ((s [\"^]\"])) \"^\" t))\n+ (cl-assert (peg-parse-string ((s [alpha])) \"z\" t))\n+ (cl-assert (not (peg-parse-string ((s [alpha])) \"0\" t)))\n+ (cl-assert (not (peg-parse-string ((s [alpha])) \"\" t)))\n+ (cl-assert (not (peg-parse-string ((s [\"][:alpha:]\"])) \"z\" t)))\n+ (cl-assert (peg-parse-string ((s (bob))) \"\" t))\n+ (cl-assert (peg-parse-string ((s (bos))) \"x\" t))\n+ (cl-assert (not (peg-parse-string ((s (bos))) \" x\" t)))\n+ (cl-assert (peg-parse-string ((s \"x\" (eos))) \"x\" t))\n+ (cl-assert (peg-parse-string ((s (syntax-class whitespace))) \" \" t))\n+ (cl-assert (peg-parse-string ((s (= \"foo\"))) \"foo\" t))\n+ (cl-assert (let ((f \"foo\")) (peg-parse-string ((s (= f))) \"foo\" t)))\n+ (cl-assert (not (peg-parse-string ((s (= \"foo\"))) \"xfoo\" t)))\n+ (cl-assert (equal (peg-parse-string ((s `(-- 1 2))) \"\") '(2 1)))\n+ (cl-assert (equal (peg-parse-string ((s `(-- 1 2) `(a b -- a b))) \"\") '(2\n1)))\n+ (cl-assert (equal (peg-parse-string ((s (or (and (any) s)\n(substring [0-9]))))\n\"ab0cd1ef2gh\")\n'(\"2\")))\n- (assert (equal (peg-parse-string ((s (list x y))\n+ (cl-assert (equal (peg-parse-string ((s (list x y))\n(x `(-- 1))\n(y `(-- 2)))\n\"\")\n'((1 2))))\n- (assert (equal (peg-parse-string ((s (list (* x)))\n+ (cl-assert (equal (peg-parse-string ((s (list (* x)))\n(x \"x\" `(-- 'x)))\n\"xxx\")\n'((x x x))))\n- (assert (equal (peg-parse-string ((s (region (* x)))\n+ (cl-assert (equal (peg-parse-string ((s (region (* x)))\n(x \"x\" `(-- 'x)))\n\"xxx\")\n+ ;; FIXME: Since string positions start at 0, this should\n+ ;; really be '(3 x x x 0) !!\n'(4 x x x 1)))\n- (assert (equal (peg-parse-string ((s (region (list (* x))))\n+ (cl-assert (equal (peg-parse-string ((s (region (list (* x))))\n(x \"x\" `(-- 'x 'y)))\n\"xxx\")\n'(4 (x y x y x y) 1)))\n- (assert (equal (with-temp-buffer\n+ (cl-assert (equal (with-temp-buffer\n(save-excursion (insert \"abcdef\"))\n(list\n(peg-parse (x \"a\"\n@@ -786,8 +795,7 @@ resp. succeded instead of signaling an error.\"\n'(nil \"axyf\")))\n)\n\n-(when (featurep 'cl)\n- (peg-test))\n+(peg-test)\n\n;;; Examples:\n\n@@ -987,7 +995,7 @@ resp. succeded instead of signaling an error.\"\n;; (peg-ex-last-digit2 (make-string 500000 ?-))\n;; (peg-ex-last-digit2 (make-string 500000 ?5))" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.52183104,"math_prob":0.9520062,"size":12324,"snap":"2022-05-2022-21","text_gpt3_token_len":4223,"char_repetition_ratio":0.3708604,"word_repetition_ratio":0.38729978,"special_character_ratio":0.43330088,"punctuation_ratio":0.05337591,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996692,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-20T06:21:46Z\",\"WARC-Record-ID\":\"<urn:uuid:d88b23fb-4df0-4ecb-81ee-a68435842182>\",\"Content-Length\":\"19928\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:276d58db-1475-4f62-81f5-a68dd79d556a>\",\"WARC-Concurrent-To\":\"<urn:uuid:5235a90a-7e1c-44d9-bc6c-6a6497074457>\",\"WARC-IP-Address\":\"209.51.188.17\",\"WARC-Target-URI\":\"https://lists.gnu.org/archive/html/emacs-elpa-diffs/2019-03/msg00081.html\",\"WARC-Payload-Digest\":\"sha1:LZON3MV6KN6TRJXUYFLI2U277L4DNDZL\",\"WARC-Block-Digest\":\"sha1:AR3GNTNHUZU25PSXMULVGSF4UJJEGDJI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662531762.30_warc_CC-MAIN-20220520061824-20220520091824-00381.warc.gz\"}"}
https://republicofsouthossetia.org/question/rewrite-the-following-equation-in-slope-intercept-form-11-y-9-15165575-79/
[ "## Rewrite the following equation in slope-intercept form. X -11 y= 9\n\nQuestion\n\nRewrite the following equation in slope-intercept form. X -11 y= 9\n\nin progress 0\n3 weeks 2021-09-07T00:54:10+00:00 1 Answer 0\n\n1. For this case we have that by definition, the equation of the line of the slope-intersection form is given by:", null, "Where:\n\nm: It is the slope of the line\n\nb: It is the cut point with the y axis\n\nWe have the following equation:", null, "We manipulate algebraically:", null, "Thus, the equation in the slope-intersection form is given by:", null, "", null, "" ]
[ null, "https://republicofsouthossetia.org/wp-content/ql-cache/quicklatex.com-d96e5cbc588d0413a33ec8efdc65dfaf_l3.png", null, "https://republicofsouthossetia.org/wp-content/ql-cache/quicklatex.com-5ef4dc216a81a9986359eeaf26051f4a_l3.png", null, "https://republicofsouthossetia.org/wp-content/ql-cache/quicklatex.com-35762b85b940439b5bce79399d509baf_l3.png", null, "https://republicofsouthossetia.org/wp-content/ql-cache/quicklatex.com-1fde1e7a20a94756a4423ce2ca7ad49a_l3.png", null, "https://republicofsouthossetia.org/wp-content/ql-cache/quicklatex.com-1fde1e7a20a94756a4423ce2ca7ad49a_l3.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.909036,"math_prob":0.98693895,"size":571,"snap":"2021-31-2021-39","text_gpt3_token_len":164,"char_repetition_ratio":0.15520282,"word_repetition_ratio":0.19565217,"special_character_ratio":0.30647987,"punctuation_ratio":0.140625,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99977654,"pos_list":[0,1,2,3,4,5,6,7,8,9,10],"im_url_duplicate_count":[null,4,null,1,null,1,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-26T07:00:48Z\",\"WARC-Record-ID\":\"<urn:uuid:121896ed-2588-4f16-b604-48644197237f>\",\"Content-Length\":\"69087\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:82746593-7dc5-4de1-9e2b-42a05ee77c68>\",\"WARC-Concurrent-To\":\"<urn:uuid:9d7f9a94-d1c9-4805-bc80-92efdc3367cc>\",\"WARC-IP-Address\":\"198.252.99.154\",\"WARC-Target-URI\":\"https://republicofsouthossetia.org/question/rewrite-the-following-equation-in-slope-intercept-form-11-y-9-15165575-79/\",\"WARC-Payload-Digest\":\"sha1:4DZDDZRF76KD3XF37GI4WHNF4VFDYTCB\",\"WARC-Block-Digest\":\"sha1:6GE6XFR44XOM2QM5HAOJK676ORMD6MRF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057830.70_warc_CC-MAIN-20210926053229-20210926083229-00108.warc.gz\"}"}
https://mathzsolution.com/can-someone-explain-the-yoneda-lemma-to-an-applied-mathematician/
[ "# Can someone explain the Yoneda Lemma to an applied mathematician?\n\nI have trouble following the category-theoretic statement and proof of the Yoneda Lemma. Indeed, I followed a category theory course for 4-5 lectures (several years ago now) and felt like I understood everything until we covered the Yoneda Lemma, after which point I lost interest.\n\nI guess what I’m asking for are some concrete examples of the Yoneda Lemma in action. For example, how does it apply to specific categories, like a category with one element, or the category Grp or Set? What results does it generalize? Is there a canonical route to understanding the statement of the Lemma?\n\nIf you need to assume knowledge, then assume I have a fairly rigorous education in pure/applied mathematics at the undergraduate level but no further.\n\nRoughly speaking, the Yoneda lemma says that one can recover an object $X$ up to isomorphism from knowledge of the hom-sets $\\text{Hom}(X, Y)$ for all other objects $Y$. Equivalently, one can recover an object $X$ up to isomorphism from knowledge of the hom-sets $\\text{Hom}(Y, X)$.\n\nAs I have said before on math.SE, there is a meta-principle in category theory that to understand something for all categories, you should first understand it for posets, regarded as categories where $a \\le b$ if and only if there is a single arrow $a \\to b$, and otherwise there are no morphisms from $a$ to $b$. For posets, Yoneda’s lemma says that an object is determined up to isomorphism by the set of objects less than or equal to it (equivalently, the set of objects greater than or equal to it). In other words, it is determined by a Dedekind cut! In other other words, Yoneda’s lemma for posets says the following:\n\n$a \\le b$ if and only if for all objects $c$ we have $c \\le a \\Rightarrow c \\le b$.\n\nThis is a surprisingly useful idea in real analysis. More generally it leads to the idea that Yoneda’s lemma, among other things, embeds a category into a certain “completion” of that category: in fact the standard contravariant Yoneda embedding embeds a category into its free cocompletion, the category given by “freely adjoining colimits.”\n\nAs far as examples go, it turns out that in many categories one can restrict attention to a few specific objects $Y$. For example:\n\n• In $\\text{Set}$ one can completely recover an object $S$ from $\\text{Hom}(1, S)$.\n• In $\\text{Grp}$ one can completely recover an object $G$ from $\\text{Hom}(\\mathbb{Z}, G)$. This is because a homomorphism from $\\mathbb{Z}$ is freely determined by where it sends $1$, and one can recover the multiplication because $\\mathbb{Z}$ is naturally a cogroup object, which is equivalent to the claim that $\\text{Hom}(\\mathbb{Z}, G)$ naturally carries a group structure (that of $G$).\n• In $\\text{CRing}$ (the category of commutative rings) one can completely recover an object $R$ from $\\text{Hom}(\\mathbb{Z}[x], R)$. The story is similar to that above; it is explained in this blog post. Geometrically this means that one can completely recover an affine scheme $\\text{Spec } R$ from $\\text{Hom}(\\text{Spec } R, \\mathbb{A}^1(\\mathbb{Z}))$, the ring of functions on it.\n• In $\\text{Top}$ (the category of topological spaces) one can completely recover an object $X$ from $\\text{Hom}(1, X)$ (the points of $X$) and $\\text{Hom}(X, \\mathbb{S})$, where $\\mathbb{S}$ is the Sierpinski space. The latter precisely gives you the open sets of $X$, and together with knowledge of the composition map $\\text{Hom}(1, X) \\times \\text{Hom}(X, \\mathbb{S}) \\to \\text{Hom}(1, \\mathbb{S})$ you can recover the knowledge of which points sit inside which open sets." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8921058,"math_prob":0.99612796,"size":3569,"snap":"2022-40-2023-06","text_gpt3_token_len":904,"char_repetition_ratio":0.14361851,"word_repetition_ratio":0.05942275,"special_character_ratio":0.23115718,"punctuation_ratio":0.10028248,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99938387,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-30T11:55:14Z\",\"WARC-Record-ID\":\"<urn:uuid:54ea2770-af3a-4c43-a3d3-a2b4de6746cd>\",\"Content-Length\":\"68395\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fe5f5217-c26d-433a-8dc6-3a9531bb38cf>\",\"WARC-Concurrent-To\":\"<urn:uuid:b840f98d-355c-40cf-8821-7687302cc12d>\",\"WARC-IP-Address\":\"50.16.49.81\",\"WARC-Target-URI\":\"https://mathzsolution.com/can-someone-explain-the-yoneda-lemma-to-an-applied-mathematician/\",\"WARC-Payload-Digest\":\"sha1:YGCSIBTLJT5VQSHEC4T2RE33PCPW4WYL\",\"WARC-Block-Digest\":\"sha1:HNQCTWTTLMYANHAGG6W6NZJIQETWT4NA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335469.40_warc_CC-MAIN-20220930113830-20220930143830-00209.warc.gz\"}"}
http://iembra.org/confidence-interval/confidence-intervals-using-standard-error.php
[ "Home > Confidence Interval > Confidence Intervals Using Standard Error\n\n# Confidence Intervals Using Standard Error\n\n## Contents\n\nISBN 0-521-81099-X ^ Kenney, J. Later in this section we will show how to compute a confidence interval for the mean when σ has to be estimated. This probability is small, so the observation probably did not come from the same population as the 140 other children. For a confidence interval with level C, the value p is equal to (1-C)/2. this contact form\n\nIt will be shown that the standard deviation of all possible sample means of size n=16 is equal to the population standard deviation, σ, divided by the square root of the The correct response is to say \"red\" and ignore the fact that the word is \"blue.\" In a second condition, subjects named the ink color of colored rectangles. The blood pressure of 100 mmHg noted in one printer thus lies beyond the 95% limit of 97 but within the 99.73% limit of 101.5 (= 88 + (3 x 4.5)). Instead, the sample mean follows the t distribution with mean and standard deviation .\n\n## Relationship Between Standard Error And Confidence Interval\n\nGiven a sample of disease free subjects, an alternative method of defining a normal range would be simply to define points that exclude 2.5% of subjects at the top end and For many biological variables, they define what is regarded as the normal (meaning standard or typical) range. Please now read the resource text below. Standard error of a proportion or a percentage Just as we can calculate a standard error associated with a mean so we can also calculate a standard error associated with a\n\nFor the purpose of hypothesis testing or estimating confidence intervals, the standard error is primarily of use when the sampling distribution is normally distributed, or approximately normally distributed. The values of t to be used in a confidence interval can be looked up in a table of the t distribution. As a preliminary study he examines the hospital case notes over the previous 10 years and finds that of 120 patients in this age group with a diagnosis confirmed at operation, Confidence Intervals T Test The first step is to obtain the Z value corresponding to the reported P value from a table of the standard normal distribution.\n\nFor a population with unknown mean and unknown standard deviation, a confidence interval for the population mean, based on a simple random sample (SRS) of size n, is + t*, where Confidence Intervals Margin Of Error Gurland and Tripathi (1971) provide a correction and equation for this effect. For an upcoming national election, 2000 voters are chosen at random and asked if they will vote for candidate A or candidate B. http://www.healthknowledge.org.uk/e-learning/statistical-methods/practitioners/standard-error-confidence-intervals This is the 99.73% confidence interval, and the chance of this interval excluding the population mean is 1 in 370.\n\nThe first steps are to compute the sample mean and variance: M = 5 s2 = 7.5 The next step is to estimate the standard error of the mean. Confidence Intervals Median Naming Colored Rectangle Interference Difference 17 38 21 15 58 43 18 35 17 20 39 19 18 33 15 20 32 12 20 45 25 19 52 33 17 31 Scenario 2. Furthermore, it is a matter of common observation that a small sample is a much less certain guide to the population from which it was drawn than a large sample.\n\n## Confidence Intervals Margin Of Error\n\nHowever, without any additional information we cannot say which ones. This probability is small, so the observation probably did not come from the same population as the 140 other children. Relationship Between Standard Error And Confidence Interval Overall Introduction to Critical Appraisal2. Confidence Intervals Standard Deviation With n = 2 the underestimate is about 25%, but for n = 6 the underestimate is only 5%.\n\nIn this scenario, the 400 patients are a sample of all patients who may be treated with the drug. http://iembra.org/confidence-interval/calculating-confidence-intervals-with-standard-error.php This probability is usually used expressed as a fraction of 1 rather than of 100, and written as p Standard deviations thus set limits about which probability statements can be made. We will finish with an analysis of the Stroop Data. This is also the standard error of the percentage of female patients with appendicitis, since the formula remains the same if p is replaced by 100-p. Confidence Intervals Variance\n\n1. These are the 95% limits.\n2. The standard error of the mean of one sample is an estimate of the standard deviation that would be obtained from the means of a large number of samples drawn from\n3. n is the size (number of observations) of the sample.\n4. The mean plus or minus 1.96 times its standard deviation gives the following two figures: We can say therefore that only 1 in 20 (or 5%) of printers in the population\n\nConsider a sample of n=16 runners selected at random from the 9,732. Assume that the following five numbers are sampled from a normal distribution: 2, 3, 5, 6, and 9 and that the standard deviation is not known. Imagine taking repeated samples of the same size from the same population. navigate here This section considers how precise these estimates may be.\n\nAs a preliminary study he examines the hospital case notes over the previous 10 years and finds that of 120 patients in this age group with a diagnosis confirmed at operation, What Is The Critical Value For A 95 Confidence Interval In this case, the standard deviation is replaced by the estimated standard deviation s, also known as the standard error. Response times in seconds for 10 subjects.\n\n## Standard error of a proportion or a percentage Just as we can calculate a standard error associated with a mean so we can also calculate a standard error associated with a\n\nIf σ is not known, the standard error is estimated using the formula s x ¯   = s n {\\displaystyle {\\text{s}}_{\\bar {x}}\\ ={\\frac {s}{\\sqrt {n}}}} where s is the sample Thus the variation between samples depends partly also on the size of the sample. Systematic Reviews5. How To Find A 95 Confidence Interval For The Mean Resource text Standard error of the mean A series of samples drawn from one population will not be identical.\n\nIn general, you compute the 95% confidence interval for the mean with the following formula: Lower limit = M - Z.95σM Upper limit = M + Z.95σM where Z.95 is the Therefore the confidence interval is computed as follows: Lower limit = 16.362 - (2.013)(1.090) = 14.17 Upper limit = 16.362 + (2.013)(1.090) = 18.56 Therefore, the interference effect (difference) for the If we now divide the standard deviation by the square root of the number of observations in the sample we have an estimate of the standard error of the mean. his comment is here Where significance tests have used other mathematical approaches the estimated standard errors may not coincide exactly with the true standard errors.\n\nThis would give an empirical normal range . We can say that the probability of each of these observations occurring is 5%. For example, a 95% confidence interval covers 95% of the normal curve -- the probability of observing a value outside of this area is less than 0.05. However, to explain how confidence intervals are constructed, we are going to work backwards and begin by assuming characteristics of the population.\n\nYou will learn more about the t distribution in the next section. Given a sample of disease free subjects, an alternative method of defining a normal range would be simply to define points that exclude 2.5% of subjects at the top end and and Keeping, E.S. (1963) Mathematics of Statistics, van Nostrand, p. 187 ^ Zwillinger D. (1995), Standard Mathematical Tables and Formulae, Chapman&Hall/CRC. The system returned: (22) Invalid argument The remote host or network may be down." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.89168954,"math_prob":0.9641794,"size":7731,"snap":"2021-21-2021-25","text_gpt3_token_len":1701,"char_repetition_ratio":0.16280575,"word_repetition_ratio":0.16679478,"special_character_ratio":0.23321691,"punctuation_ratio":0.08787466,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99715656,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-16T08:22:37Z\",\"WARC-Record-ID\":\"<urn:uuid:0f622a8e-614f-43d1-a1dd-ab6706c5addf>\",\"Content-Length\":\"13923\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:94925d4b-6f01-46dc-9e73-4a0b69803ab3>\",\"WARC-Concurrent-To\":\"<urn:uuid:3e3c1d27-7901-4543-a0cc-1ada70063d07>\",\"WARC-IP-Address\":\"104.21.28.132\",\"WARC-Target-URI\":\"http://iembra.org/confidence-interval/confidence-intervals-using-standard-error.php\",\"WARC-Payload-Digest\":\"sha1:52FQ6MXYU34KFD7FDDZ5YCHTKCBRZ7UZ\",\"WARC-Block-Digest\":\"sha1:6YOFD2HKGZYLOL5L6EP73J67I4X4CEL2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487622234.42_warc_CC-MAIN-20210616063154-20210616093154-00574.warc.gz\"}"}
http://dongola.info/geometry-plane-and-simple-worksheets/basic-geometry-worksheets-high-school-worksheet-6-3-plane-and-simple/
[ "# Basic Geometry Worksheets High School Worksheet 6 3 Plane And Simple", null, "basic geometry worksheets high school worksheet 6 3 plane and simple.\n\nbasic geometry terms worksheet the best worksheets image collection plane and simple,plane geometry worksheets and simple ,geometry plane and simple worksheets worksheet answers for all , grade worksheet free printable geometry plane and simple worksheets,geometry worksheets points lines and planes for all plane simple , geometry plane and simple worksheets, geometry plane and simple worksheets coordinate solutions examples games questions videos, geometry plane and simple worksheets printable charts for kindergarten graphing worksheet,geometry plane and simple worksheets conditional statements worksheet with answers design of, geometry plane and simple worksheets activities coordinate geometric." ]
[ null, "http://dongola.info/wp-content/uploads/2018/03/basic-geometry-worksheets-high-school-worksheet-6-3-plane-and-simple.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7758946,"math_prob":0.9506889,"size":775,"snap":"2019-13-2019-22","text_gpt3_token_len":117,"char_repetition_ratio":0.3229572,"word_repetition_ratio":0.030612245,"special_character_ratio":0.14709677,"punctuation_ratio":0.096491225,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99601287,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-24T09:53:57Z\",\"WARC-Record-ID\":\"<urn:uuid:97a626c2-0a0c-46dc-9d16-aa6d076e1250>\",\"Content-Length\":\"35900\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:206e8853-7399-4b20-86cb-9d85780d0645>\",\"WARC-Concurrent-To\":\"<urn:uuid:aebed603-5ea2-4db4-96ca-887e814e079f>\",\"WARC-IP-Address\":\"104.28.1.29\",\"WARC-Target-URI\":\"http://dongola.info/geometry-plane-and-simple-worksheets/basic-geometry-worksheets-high-school-worksheet-6-3-plane-and-simple/\",\"WARC-Payload-Digest\":\"sha1:YKXEB2E24JWMGUYFWIHAN5WTQOLDKRH3\",\"WARC-Block-Digest\":\"sha1:HPVWKSI5TF73UJO4WKMVQFFIRL4TNK3G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257601.8_warc_CC-MAIN-20190524084432-20190524110432-00029.warc.gz\"}"}
https://www.investopedia.com/terms/s/spanmargin.asp
[ "## What is SPAN Margin?\n\nSPAN margin is calculated by standardized portfolio analysis of risk (SPAN), a leading system that has been adopted by most options and futures exchanges around the world. SPAN is based on a sophisticated set of algorithms that determine margin requirements according to a global (total portfolio) assessment of the one-day risk for a trader's account.\n\n### Key Takeaways\n\n• SPAN Margin determines margin requirements based on a global assessment of the one-day risk for a trader's account.\n• SPAN margins are calculated using risk arrays and modeled risk scenarios.\n\n## Basics of SPAN Margin\n\nOptions and futures writers are required to have a sufficient amount of margin in their accounts to cover potential losses. The SPAN system, through its algorithms, sets the margin of each position in a portfolio of derivatives and physical instruments to its calculated worst possible one-day move. It is calculated using a risk array that determines the gains or losses for each contract under different conditions. These conditions are referred to as risk scenarios and measure profits (or losses) with respect to price change, volatility change, and decrease in time to expiration.\n\nThe main inputs to the models are strike prices, risk-free interest rates, changes in prices of the underlying securities, changes in volatility, and decreases in time to expiration. The system, after calculating the margin of each position, can shift any excess margin on existing positions to new positions or existing positions that are short of margin." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.92912567,"math_prob":0.8836587,"size":1546,"snap":"2020-34-2020-40","text_gpt3_token_len":285,"char_repetition_ratio":0.1232166,"word_repetition_ratio":0.05,"special_character_ratio":0.18046571,"punctuation_ratio":0.08208955,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9670893,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-21T13:55:55Z\",\"WARC-Record-ID\":\"<urn:uuid:04b880c9-43f7-4459-b5f7-32f610b544cc>\",\"Content-Length\":\"101029\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c7128e5e-2b8e-4445-803e-fc1ac73c09a8>\",\"WARC-Concurrent-To\":\"<urn:uuid:d64ae3fb-8560-4962-a5c9-9357b5018ff5>\",\"WARC-IP-Address\":\"199.232.66.137\",\"WARC-Target-URI\":\"https://www.investopedia.com/terms/s/spanmargin.asp\",\"WARC-Payload-Digest\":\"sha1:B6NCFOM5TJS5Y5I5DLF636DPE4C4LUTV\",\"WARC-Block-Digest\":\"sha1:X4CJLQIBD6BTLMKQZYI6ERLK6OKNCYD5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400201699.38_warc_CC-MAIN-20200921112601-20200921142601-00756.warc.gz\"}"}
https://math.stackexchange.com/questions/3145928/using-coordinate-descent-on-projected-space
[ "# Using Coordinate Descent on Projected Space\n\nMy goal is to maximize an objective function using coordinate descent over a 3-dimensional vector. In the simple case the domain over which I am maximizing is defined as follows:\n\n$$X \\in \\mathcal{X}$$ where $$\\mathcal{X} = \\{X | X\\in \\mathbb{R}^3,X_{lb} < X < X_{ub}\\}$$, where $$X_{lb}$$ and $$X_{ub}$$ are known quantities. This is geometrically a cuboid. Here, I am able to fix a coordinate at a time, optimize and then move to the other coordinate and repeat the process till convergence (i.e. use coordinate descent).\n\nIn the more complicated case, I am projecting the space $$\\mathcal{X}$$, using a projection matrix $$Q$$. The matrix $$Q$$ has two eigenvalues that equal 1 and one eigenvalue that equals 0. In other words, it reduces the cube to a 2-dimensional object in $$\\mathbb{R}^3$$. This object typically has 6 corners and looks like a tilted imperfect hexagon in 3-d space. In other words, I want to optimize over the following domain:\n\n$$X \\in \\mathcal{\\hat{X}}$$ where $$\\mathcal{\\hat{X}} = \\{QX | X\\in \\mathbb{R}^3,X_{lb} < X < X_{ub}\\}$$\n\nWe know that the 2-d object can be represented by a linear combination of the eigenvectors, where the $$v$$ denotes the vectors and $$c$$ denotes the coefficients:\n\n$$c_1$$ $$v_1$$ + $$c_2$$ $$v_2$$\n\nSince I know $$Q$$, I know $$v_1$$ and $$v_2$$. I want to apply coordinate descent on this space, which should be equivalent to treating $$c_1$$ and $$c_2$$ as the new coordinates and optimizing over them, one by one.\n\nThe problem is that given that the shape is irregular and looks like a hexagon, as I vary $$c_2$$, the range for $$c_1$$ varies and vice versa. In other words, the upper and lower bound for $$c_1$$ is a function of $$c_2$$ and vice versa. To employ coordinate descent, I will have to account for the changing bounds.\n\nHow do I compute the function that maps $$c_2$$ to the upper and lower bounds on $$c_1$$ and the function that maps $$c_1$$ to the upper and lower bounds on $$c_2$$? Further, how do I find the overall range for $$c_1$$ and $$c_2$$, which must exist, since the original object is a cuboid?\n\nEdit: Something that I am trying to do is rotating this tilted hexagon onto a flat surface in $$\\mathbb{R}^3$$ and then using a linear program to try and figure out the bounds. But, I am having a hard time finding the correct transformation to do the rotation. I need the flat surface to figure out the correct bounds and implement coordinate descent, I think.\n\n## This question had a bounty worth +50 reputation from user52932 that ended 8 hours ago. Grace period ends in 15 hours\n\nThis question has not received enough attention.\n\n• You know the domain is the projection of a cuboid. Why not use three \"virtual\" coordinates representing the original unflat cuboid $Y=(y_1,y_2,y_3)$, and maximize for $f(QY)$ Then your answer is $QY$. You have more coordinates to go over (3 instead of 2), but the advantage is you already understand the boundary geometry. You don't have to work in the projected co-domain if you can pullback the problem into a nice cuboid domain. – user3257842 16 hours ago" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8731709,"math_prob":0.9994506,"size":2373,"snap":"2019-13-2019-22","text_gpt3_token_len":654,"char_repetition_ratio":0.116926976,"word_repetition_ratio":0.024330901,"special_character_ratio":0.2751791,"punctuation_ratio":0.09543569,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999919,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-22T14:54:40Z\",\"WARC-Record-ID\":\"<urn:uuid:93b1242f-e643-4fae-9f9a-3c663858b3bd>\",\"Content-Length\":\"125945\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0d1d1b42-6db6-4c4a-a140-675e36d74d73>\",\"WARC-Concurrent-To\":\"<urn:uuid:17e5402d-48f5-4096-84da-d1a84a1cf70e>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/3145928/using-coordinate-descent-on-projected-space\",\"WARC-Payload-Digest\":\"sha1:LP3LSDBPC5KNJWK6N4E35MPLHU3RCQ3F\",\"WARC-Block-Digest\":\"sha1:2CZCBL562ORTUYBKYKRIBP7LJBJRSEJ6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202671.79_warc_CC-MAIN-20190322135230-20190322161230-00410.warc.gz\"}"}
http://www.cse.chalmers.se/edu/year/2010/course/TDA451_Functional_Programming/exercises/2/
[ "[an error occurred while processing this directive]\n\n# Exercises for Week 2: Recursion and Datatypes\n\nHere are some exercises designed to help you practice writing and reasoning about recursive definitions and datatypes.\n\nOther helpful exercises can be found in Chapters 3 and 4 of the book.\n\nIf you do not have time to do all these exercises, don't worry. The exercises are intended to provide enough work to keep the most experienced students busy. If you do all exercises marked with an (*) you have probably understood this week's material.\n\nGood luck!\n\n## 1. (*) The Maximum Function\n\nComplete the following function definition:\n\n-- maxi x y returns the maximum of x and y\n\n(We call this function maxi, because there is a standard function max which does the same thing. Of course, you should not use it.)\n\nBegin by writing a type signature for maxi, and a left hand side \"equal to undefined\". Before you write the definition, think of at least one property that you will use for testing your code.\n\nYou will need to consider two cases: what are they? Write the left hand sides, and make sure Hugs accepts them.\n\nComplete your definition and test it with QuickCheck.\n\n## 2. Sum of squares.\n\nDefine a function which computes the sum of the squares of the numbers from 1 to n.\n\n-- sumsq n returns 1*1 + 2*2 + ... + n*n\n\nHint: use recursion to compute sumsq n from sumsq (n-1); do not use a formula (such as the one below) to compute this without recursion.\n\nSome say that sumsq n is equal to n (n+1) (2n + 1) / 6. Use QuickCheck to investigate whether this holds.\n\n## 3. (*) The Towers of Hanoi\n\nThe Towers of Hanoi is an ancient puzzle, consisting of a collection of rings of different sizes, and three posts mounted on a base. At the beginning all the rings are on the left-most post as shown, and the goal is to move them all to the rightmost post, by moving one ring at a time from one post to another. But, at no time may a larger ring be placed on top of a smaller one!", null, "Can you find a strategy for solving the puzzle based on recursion? That is, if you already know how to move n-1 rings from one post to another, can you find a way to move n rings?\n\nIf you try out your strategy, you will quickly discover that quite a large number of moves are needed to solve the puzzle with, say, five rings. Can you define a Haskell function\n\nhanoi n\n\nwhich computes the number of moves needed to move n rings from one post to another using your strategy? How many moves would be needed to solve the puzzle with ten rings? Legend has it that the original version of the puzzle has 32 rings, and is being solved at this very moment by Bhuddist monks in a monastery. When the puzzle is complete, the world will end.\n\nMore difficult (only do this if you want a challenge): Now suppose we add a fourth post to the puzzle. Can you think of a strategy which makes use of the fourth post? Define a Haskell function to compute the number of moves your new strategy needs to solve the puzzle. How many moves are now required to solve the puzzle with ten rings? How much closer would the end of the world be if the monks added a fourth post to their puzzle?\n\nCan you explain this behaviour? Hint: what kind of recursion do your two strategies use?\n\n## 4. Fibonacci Numbers\n\nThe Fibonacci numbers are defined by\n\n##", null, "so the sequence of values begins 1, 1, 2, 3, 5, 8...\n\nWrite a recursive function\n\n-- fib n computes the nth Fibonacci number\n\nbased on the mathematical definition above. Use it to compute the 10th, 15th, 20th, 25th, and 30th Fibonacci number. What do you notice? Can you explain this behaviour?\n\nMore Difficult: There is a faster way to compute Fibonacci numbers. Suppose we define a function fibAux which satisfies the property\n\nfibAux i (fib n) (fib (n+1)) == fib (n+i)\n\nNotice that this is not a definition, it is a property!\n\nFrom this property can you see how we might redefine fib by using fibAux? (Hint: try setting n to 0 in the property).\n\nIt is possible to derive a recursive definition of fibAux from this property just using algebra: the two cases we want are\n\nfibAux 0 a b = ...\n\nfibAux i a b | i>0 = ...\n\nSee if you can use the property to figure out what the right hand sides should be.\n\nUse QuickCheck to test whether the new definition of fib (in terms of fibAux) satisfies the property above.\n\nUse the new version of fib to compute the 10th, 15th, 20th, 25th, and 30th Fibonacci number. What do you notice?\n\nCalculate fibAux 4 1 1 by hand. If you have programmed before, then observe the way the values of i, a, and b change in successive recursive calls. Does it remind you of anything?\n\n## 5. Factors.\n\nA prime number p has only two factors, 1 and p itself. A composite number has more than two factors. Define a function\n\nsmallestFactor n\n\nwhich returns the smallest factor of n larger than one. For example,\n\nsmallestFactor 14 == 2\nsmallestFactor 15 == 3\n\nBefore you program smallestFactor, write at least two QuickCheck properties that it should satisfy. You will need functions for integer division and remainder: investigate the standard functions div and mod for this purpose.\n\nHint: write smallestFactor using an auxiliary function nextFactor k n which returns the smallest factor of n larger than k. You can define smallestFactor using nextFactor, and nextFactor by recursion. Write QuickCheck properties of nextFactor before defining it also.\n\nNow define\n\nnumFactors n\n\nwhich computes the number of factors of n in the range 1..n.\n\nFor the following exercises, you can either use built-in Haskell lists, or (if you want to) the type List we used in the lecture. These types are basically the same, only the syntax is slightly different. For more about the syntax of built-in Haskell lists, read the beginning of chapter 7 of the book.\n\n## 6. (*) Multiplying list elements\n\nDefine a function\n\nmultiply :: Num a => [a] -> a\n\nwhich multiplies together all the elements of a list. (Think: what should its value be for the empty list?). For example\n\nMain> multiply [1,2,3,4,5]\n120\n\n(This is actually a standard function, called product).\n\nYou may do this for the List datatype we saw in the lecture:\n\n```data List a = Empty | Add a (List a)\n```\nSo, your function has the type:\n```multiply :: List Integer -> Integer\n```\n\n## 7. Avoiding Duplicates\n\nIn many situations, lists should not contain duplicate elements. For example, a pack of cards should not contain the same card twice. Define a function\n\nduplicates :: Eq a => [a] -> Bool\n\nwhich returns True if its argument contains duplicate elements.\n\nMain> duplicates [1,2,3,4,5]\nFalse\nMain> duplicates [1,2,3,2]\nTrue\n\nHint: the standard function elem, which tests whether an element occurs in a list, is helpful here.\n\nOne way to ensure a list contains no duplicates is to start with a list that might contain duplicate elements, and remove them. Define a function\n\nremoveDuplicates :: Eq a => [a] -> [a]\n\nwhich returns a list containing the same elements as its argument, but without duplicates. Test it using the following property:\n\nprop_duplicatesRemoved :: [Integer] -> Bool\nprop_duplicatesRemoved xs = not (duplicates (removeDuplicates xs))\n\nDoes this property guarantee that removeDuplicates behaves correctly? If not, what is missing?\n\n(removeDuplicates is actually a standard function, called nub).\n\n## 8. Testing\n\nTake the definition of rankBeats from the lecture, and sabotage it by changing one of the False results to True, or vice versa. Thorough testing of rankBeats ought to reveal the error. Your task is to define one or more properties of rankBeats, which are True for the correct definition, but which enable you to reliably detect the error in the sabotaged definition using QuickCheck.\n\n(Note: Because QuickCheck chooses test data at random, it is always possible that no error is found among the first 100 test cases. If you expect an error, and none is found, just keep testing the same property. If it really is False, then QuickCheck should eventually find a test case that fails).\n\n## 9. (*) Defining Types\n\nDefine a data type Month to represent months, and a function\n\ndaysInMonth :: Month -> Integer -> Integer\n\nwhich computes the number of days in a month, given also the year. (You can ignore leap centuries and the like: just assume that every fourth year is a leap year).\n\nDefine a data type Date, containing a year, month, and day, and a function\n\nvalidDate :: Date ->Bool\n\nthat returns True if the day in the date lies between 1 and the number of days in the month." ]
[ null, "http://upload.wikimedia.org/wikipedia/commons/0/07/Tower_of_Hanoi.jpeg", null, "http://www.cse.chalmers.se/edu/year/2010/course/TDA451_Functional_Programming/exercises/2/fib.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.88702387,"math_prob":0.9007509,"size":8106,"snap":"2020-10-2020-16","text_gpt3_token_len":1860,"char_repetition_ratio":0.12132807,"word_repetition_ratio":0.042156186,"special_character_ratio":0.22995313,"punctuation_ratio":0.12583587,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9901959,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-18T05:38:31Z\",\"WARC-Record-ID\":\"<urn:uuid:d32ce266-45eb-450d-9594-f543997bbd44>\",\"Content-Length\":\"10636\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0fb9a7ed-5564-43e1-b703-e27a88bf280d>\",\"WARC-Concurrent-To\":\"<urn:uuid:d09eb3a0-49cc-44fe-96d6-69f12751fd1e>\",\"WARC-IP-Address\":\"129.16.221.33\",\"WARC-Target-URI\":\"http://www.cse.chalmers.se/edu/year/2010/course/TDA451_Functional_Programming/exercises/2/\",\"WARC-Payload-Digest\":\"sha1:2ER43RSVQ2ZWK64BQA2RYKZCZMJGJAFQ\",\"WARC-Block-Digest\":\"sha1:R5RSW5DMNDRBXM7MK2GF7JBQX4MZOCU2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875143505.60_warc_CC-MAIN-20200218025323-20200218055323-00037.warc.gz\"}"}
https://cm-to-inches.appspot.com/4.8-cm-to-inches.html
[ "Cm To Inches\n\n# 4.8 cm to in4.8 Centimeters to Inches\n\ncm\n=\nin\n\n## How to convert 4.8 centimeters to inches?\n\n 4.8 cm * 0.3937007874 in = 1.8897637795 in 1 cm\nA common question is How many centimeter in 4.8 inch? And the answer is 12.192 cm in 4.8 in. Likewise the question how many inch in 4.8 centimeter has the answer of 1.8897637795 in in 4.8 cm.\n\n## How much are 4.8 centimeters in inches?\n\n4.8 centimeters equal 1.8897637795 inches (4.8cm = 1.8897637795in). Converting 4.8 cm to in is easy. Simply use our calculator above, or apply the formula to change the length 4.8 cm to in.\n\n## Convert 4.8 cm to common lengths\n\nUnitUnit of length\nNanometer48000000.0 nm\nMicrometer48000.0 µm\nMillimeter48.0 mm\nCentimeter4.8 cm\nInch1.8897637795 in\nFoot0.157480315 ft\nYard0.0524934383 yd\nMeter0.048 m\nKilometer4.8e-05 km\nMile2.98258e-05 mi\nNautical mile2.59179e-05 nmi\n\n## What is 4.8 centimeters in in?\n\nTo convert 4.8 cm to in multiply the length in centimeters by 0.3937007874. The 4.8 cm in in formula is [in] = 4.8 * 0.3937007874. Thus, for 4.8 centimeters in inch we get 1.8897637795 in.\n\n## 4.8 Centimeter Conversion Table", null, "## Alternative spelling\n\n4.8 cm to in, 4.8 cm in in, 4.8 Centimeters to Inches, 4.8 Centimeters in Inches, 4.8 Centimeter to in, 4.8 Centimeter in in, 4.8 Centimeters to Inch, 4.8 Centimeters in Inch, 4.8 Centimeter to Inch, 4.8 Centimeter in Inch, 4.8 Centimeters to in, 4.8 Centimeters in in, 4.8 cm to Inch, 4.8 cm in Inch" ]
[ null, "https://cm-to-inches.appspot.com/image/4.8.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8390848,"math_prob":0.81302536,"size":1057,"snap":"2019-13-2019-22","text_gpt3_token_len":384,"char_repetition_ratio":0.26495728,"word_repetition_ratio":0.010638298,"special_character_ratio":0.4011353,"punctuation_ratio":0.2260274,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9855189,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-26T16:48:10Z\",\"WARC-Record-ID\":\"<urn:uuid:b49ce639-1065-4fb3-bccb-c21f264a5546>\",\"Content-Length\":\"28620\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9e214d1f-58a5-4482-b30a-d779cc68966d>\",\"WARC-Concurrent-To\":\"<urn:uuid:496f4996-9367-4cea-8abe-e13aa58777d5>\",\"WARC-IP-Address\":\"172.217.164.148\",\"WARC-Target-URI\":\"https://cm-to-inches.appspot.com/4.8-cm-to-inches.html\",\"WARC-Payload-Digest\":\"sha1:XC4TGPBF2QHKYMB22EL3UQXVBND6GHHH\",\"WARC-Block-Digest\":\"sha1:6MVN5OMVCQ6GJAWH65T2FINWCVE3RR5A\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912205597.84_warc_CC-MAIN-20190326160044-20190326182044-00451.warc.gz\"}"}
https://answers.everydaycalculation.com/gcf/728-10
[ "Solutions by everydaycalculation.com\n\n## What is the GCF of 728 and 10?\n\nThe GCF of 728 and 10 is 2.\n\n#### Steps to find GCF\n\n1. Find the prime factorization of 728\n728 = 2 × 2 × 2 × 7 × 13\n2. Find the prime factorization of 10\n10 = 2 × 5\n3. To find the GCF, multiply all the prime factors common to both numbers:\n\nTherefore, GCF = 2\n\nMathStep (Works offline)", null, "Download our mobile app and learn how to find GCF of upto four numbers in your own time:" ]
[ null, "https://answers.everydaycalculation.com/mathstep-app-icon.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.81375194,"math_prob":0.9871558,"size":565,"snap":"2021-04-2021-17","text_gpt3_token_len":184,"char_repetition_ratio":0.12477718,"word_repetition_ratio":0.0,"special_character_ratio":0.39469028,"punctuation_ratio":0.08108108,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99452835,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-19T04:42:14Z\",\"WARC-Record-ID\":\"<urn:uuid:c57f37b2-0fa6-40b0-a703-11e2acc6073e>\",\"Content-Length\":\"5864\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3f0497d2-312a-4e25-9212-4c1b6f8914cf>\",\"WARC-Concurrent-To\":\"<urn:uuid:84219a07-d4b9-47fc-b9bf-2263469fd6ff>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/gcf/728-10\",\"WARC-Payload-Digest\":\"sha1:HGXVLK4XDZQXHR43TYYMGOQJX3QLUZOK\",\"WARC-Block-Digest\":\"sha1:7XMEGKJKJS677EZ4KA7VD4ZBMJ42CT4U\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703517966.39_warc_CC-MAIN-20210119042046-20210119072046-00465.warc.gz\"}"}
https://freeboson.org/teaching/?dispnote=week01
[ "Home » Teaching\n\n# Lecture Notes\n\nBelow are the lecture notes from my course on multivariable calculus, as well as some handouts I give to students for some of the experiments in the introductory physics lab courses. Note that I update my notes each term, but this website may not link to the latest editions.\n\n### Notes on MTH3015: Calculus III\n\n$\\newcommand{\\vect}{{\\mathbf{#1}} }$ $\\renewcommand{\\vec}{{\\overrightarrow{#1}} }$ $\\newcommand{\\abs}{{\\lvert#1\\rvert} }$ $\\newcommand{\\norm}{{\\lVert#1\\rVert} }$ $\\newcommand{\\D}{{{\\mathcal D}} }$ $\\newcommand{\\R}{{\\mathbb{R}} }$ $\\newcommand{\\Rtwo}{{\\mathbb{R}^2} }$ $\\newcommand{\\Rthree}{{\\mathbb{R}^3} }$ $\\newcommand{\\V}{{\\mathbb{V}} }$ $\\newcommand{\\nhat}{{\\vect{\\hat{n}}} }$ $\\DeclareMathOperator{\\sgn}{sgn}$ $\\DeclareMathOperator{\\dist}{dist}$\n\nWeek 1: Introduction to 2D and 3D co-ordinate spaces; introduction to vectors, vector spaces, vector operations\n\nSujeet Akula\n\nReview, Notation\n\nFunctions are mappings. More specifically, for a given element of a function's domain, the function will map this element to an element of the function's co-domain. These aspects of the function are specified using the following notation: for a given function $f$, with domain $X$, and co-domain $Y$, we write $f: X\\to Y$. Remember that the domain serves as the set of \"inputs'' to the function and the co-domain serves as the set of possible \"outputs'' from the function. So far, you have studied single-variable functions of a single variable, which is technically written for a function $f$ as $f: \\R \\to \\R$. This means that $f$ takes as an input, an element from the set $\\R$, which is the set of all real numbers. And, the output will also be an element from the set $\\R$. An example of this is the function $f(x) = x^3 + 2x$. For this example, let's consider $f(2.1)=13.461$: here, $f$ \"maps'' the number $2.1$ (a real number) to $13.461$ (another real number). Geometrically, you can visualize the set $\\R$ as the number line. In order to extend the number line into 2D and 3D spaces, the set product is employed. The set $\\R \\times \\R$ which is written as $\\Rtwo$, is the set of all pairs of elements in $\\R$. This means that elements of $\\Rtwo$ look like $(1.32, 7.5)$ and $(7.511, 3.2)$, etc. The set $\\Rtwo$ is visualized geometrically as a plane. Similarly $\\R \\times \\R \\times \\R$, also written as $\\Rthree$, is the set of all triples of elements in $\\R$, and $\\Rthree$ is visualized as 3D space. In this course, we will consider the calculus of several-variable functions of several variables. This means, functions which are written as $f: \\R^m\\to\\R^n$. (Here, $m$ and $n$ are positive integers.) If $m=1$ and $n=2$, i.e., $f:\\R\\to\\Rthree$, then $f$ is a mapping from the number-line to 3D space. An example of such a function is the 3D vector representing the position $\\vect{x}$ of a particle at a given time $t$.\n\n2D and 3D Co-ordinate Spaces\n\nGiven that we will be studying functions that map several variables to several variables, it is necessary to introduce different co-ordinate systems, that may be better suited for analysis of higher dimensional geometries.\n\nTwo Dimensions\n\nThese co-ordinate systems can describe points that lie on a plane, a representation of $\\Rtwo$.\n\n2D Cartesian (or Rectangular) Co-ordinates\n\nThis is the familiar co-ordinate system, where a single point in the plane is marked and labeled as the \"origin'', or simply $O$. Intersecting at this point are the two perpendicular axes for $x$ and $y$. Then, a given point $P$ on this plane can be labeled as $(x,y)$, where $x$ is the distance along the $x$ axis to $P$ and $y$ is the distance along the $y$ axis to $P$. Of course, by now, this system should be intimately familiar to you.\n\nPolar Co-ordinates\n\nHere, we again begin with the origin $O$, but polar co-ordinates only requires a single half-axis called the \"polar axis'' emerging from the origin (i.e., a ray). This is taken to be the positive half of the $x$-axis. Then, a given point $P$ may be labeled by $(r,\\theta)$, where $r$ is the distance from $O$ to $P$, and $\\theta$ is the angle measured from the polar axis to $P$ (or more accurately, to the ray from the origin that also passes through $P$). Following the so-called right-handed convention, $\\theta$ is positive for a counter-clockwise angle, and negative for a clockwise angle. We have the following equations to convert Cartesian to polar co-ordinates: \\begin{equation} \\begin{cases} r^2 = x^2 + y^2 \\\\ \\tan\\theta = \\dfrac{y}{x} \\end{cases} . \\end{equation} Note that $r$ must always be non-negative since it is a distance, and that the equation for $\\theta$ can be inverted as $\\theta = \\arctan\\dfrac{y}{x}$, but the signs of $y$ and $x$ must be considered. For example, the point $(-1,-1)$ gives $\\theta = \\arctan \\dfrac{-1}{-1} = \\arctan 1 = \\dfrac{\\pi}{4}$, but it should be $\\theta=\\dfrac{5\\pi}{4}$. (Actually, $\\arctan 1 = \\dfrac{\\pi}{4} + \\pi n, n = 0, 1, 2, \\dots$ .) So, one must use the correct value of the arc-tangent in order to have the correct polar angle. (This should be something that you are already familiar with.) To convert from polar to Cartesian, we use: \\begin{equation} \\begin{cases} x = r\\cos\\theta \\\\ y = r\\sin\\theta \\end{cases} . \\end{equation}\n\nThree Dimensions\n\nThese co-ordinate systems can describe points that lie in 3D space, a representation of $\\Rthree$.\n\n3D Cartesian (or Rectangular) Co-ordinates\n\nHere, we begin with the 2D Cartesian system, with $x$ and $y$ axes, and create a third axis through the origin that is orthogonal to the $x$--$y$ plane, the $z$-axis. So a point $P$ will be labeled as $(x,y,z)$, where $x$ and $y$ are as before, and now $z$ is as you may suspect, the distance to $P$ from $O$ along the $z$-axis.\n\nCylindrical Co-ordinates\n\nThis is a trivial generalization of the polar co-ordinate system to three dimensions, where the $z$-axis is introduced orthogonal to the plane spanned by $r$ and $\\theta$ so that a point $P$ is labeled by $(r,\\theta,z)$. Again, $z$ is the distance to $P$ from $O$ along the $z$-axis. Note that $r$ is the distance from $O$ to $P$ that on the $x$--$y$ plane. To convert from (3D) Cartesian to cylindrical we have the following equations: \\begin{equation} \\begin{cases} r^2 = x^2 + y^2 \\\\ \\tan\\theta = \\dfrac{y}{x} \\\\ z = z \\end{cases} . \\end{equation} To convert from cylindrical to (3D) Cartesian we have the following equations: \\begin{equation} \\begin{cases} x = r\\cos\\theta \\\\ y = r\\sin\\theta \\\\ z = z \\end{cases} . \\end{equation}\n\nSpherical Co-ordinates\n\nThis is a non-trivial representation of 3D space, using one distance and two angles. Here a point $P$ is labeled by $(\\rho,\\theta,\\phi)$, where $\\rho$ is the distance from $O$ to $P$ in 3D space, $\\theta$ is the angle from the positive $x$-axis to $P$, and $\\phi$ is the angle from the $z$-axis to $P$. To convert from (3D) Cartesian to spherical we have the following equations: \\begin{equation} \\begin{cases} \\rho^2 = x^2 + y^2 + z^2 \\\\ \\tan\\theta = \\dfrac{y}{x} \\\\ \\cos\\phi = \\dfrac{z}{\\sqrt{x^2 + y^2 + z^2}} \\end{cases} . \\end{equation} To convert from spherical to (3D) Cartesian we have the following equations: \\begin{equation} \\begin{cases} x = \\rho\\sin\\phi\\cos\\theta \\\\ y = \\rho\\sin\\phi\\sin\\theta \\\\ z = \\rho\\cos\\phi \\end{cases} . \\end{equation}\n\nVectors\n\nA vector can be considered geometrically as a displace between two points, say from point $P$ to point $Q$, and it is represented as an arrow with its tail at $P$ and the tip at $Q$. The vector would be based at $P$, and $P$ would be called the \"base point'' of the vector. Algebraically, a vector is described by its base point and its displacements from the base point parallel to the axes of a Cartesian co-ordinate system. These displacements are called the \"components'' of the vector. As an example, consider the point $P=(1,2,2)$, based here might be a vector in $\\Rthree$, $\\vect{v} = (2,1,-2)_P$. Here, the tail of the arrow would be at $P$, and the tip of vector would be at the point $(3,3,0)$.\n\nDefinition (Vector addition) If $\\vect{a} = (a_1,a_2)_P$ and $\\vect{b} = (b_1,b_2)_P$ are two vectors in $\\Rtwo$ based at the same point $P$, then, \\begin{equation} \\vect{a} + \\vect{b} = (a_1 + b_1, a_2 + b_2)_P . \\end{equation} Similarly in $\\Rthree$, if $\\vect{a} = (a_1,a_2,a_3)_P$ and $\\vect{b} = (b_1,b_2,b_3)_P$ (here, $P$ is a point in $\\Rthree$), then \\begin{equation} \\vect{a} + \\vect{b} = (a_1 + b_1, a_2 + b_2, a_3 + b_3)_P . \\end{equation} Geometrically, one can consider the two vectors as being adjacent sides of a parallelogram, then the sum of the two vectors is the vector that lies along the diagonal of the parallelogram.\n\nExample \\begin{align} \\mathrm{2D: }& (-1,3)_{(2,1)} + (5,-4)_{(2,1)} = (4,-1)_{(2,1)} \\\\ \\mathrm{3D: }& (2,1,4)_{(1,1,0)} + (1,-6,0)_{(1,1,0)} = (3,-5,4)_{(1,1,0)} \\end{align}\n\nDefinition (Scalar multiplication) If $\\vect{a} = (a_1, a_2)_P$ is a vector in $\\Rtwo$, and $\\alpha \\in \\R$, then $\\alpha\\vect{a}$ is the vector \\begin{equation} \\alpha\\vect{a} = (\\alpha a_1, \\alpha a_2)_P .\\end{equation} Similarly, in three dimensions, if $\\vect{a} = (a_1,a_2,a_3)_P$ (where $P$ is a point in $\\Rthree$), then $\\alpha\\vect{a}$ is the vector \\begin{equation} \\alpha\\vect{a} = (\\alpha a_1, \\alpha a_2, \\alpha a_3)_P .\\end{equation}\n\nExample \\begin{align} \\mathrm{2D: }& \\sqrt{2}\\left(\\sqrt{5},\\sqrt{18}\\right)_{(1,2)} = \\left(\\sqrt{10},6\\right)_{(1,2)} \\\\ \\mathrm{3D: }& (-3)\\left(1,2,\\sqrt{2}\\right)_{(1,2,1)} = \\left(-3,-6,-3\\sqrt{2}\\right)_{(1,2,1)} \\end{align} It is important to note that since the addition of vectors and the multiplication of vectors by scalars involves operations on the components of the vectors, which are all elements of $\\R$, the other rules of algebra follow.\n\nTheorem (Properties of addition and scalar multiplication) Let $P$ be a point (in either $\\Rtwo$ or $\\Rthree$), and let $\\V_P$ denote the set of all vectors based at $P$. Then, if $\\vect{a}$ and $\\vect{b}$ are in $\\V_P$, so is their sum, $\\vect{a} + \\vect{b}$ (closure over vector addition). Also, if $\\vect{a}$ is in $\\V_P$ and $\\alpha$ is in $\\R$, the product $\\alpha\\vect{a}$ is in $\\V_P$ (closure over scalar multiplication). The following properties are satisfied:\n\n• (Associativity of vector addition) For every $\\vect{a}, \\vect{b}, \\vect{c} \\in \\V_P$, \\begin{equation}(\\vect{a} + \\vect{b}) + \\vect{c} = \\vect{a} + (\\vect{b} + \\vect{c}) .\\end{equation}\n• (Vector additive identity) There is a zero vector in $\\V_P$, denoted $\\vect{0}_P$, such that \\begin{equation}\\vect{0}_P + \\vect{a} = \\vect{a} + \\vect{0}_P = \\vect{a} ,\\end{equation} for every vector $\\vect{a}$ in $\\V_P$.\n• (Vector additive inverse) For every $\\vect{a} \\in \\V_P$, there exists a vector $-\\vect{a} \\in \\V_P$, such that \\begin{equation}\\vect{a} + (-\\vect{a}) = (-\\vect{a}) + \\vect{a} = \\vect{0}_P .\\end{equation}\n• (Commutativity of vector addition) For every $\\vect{a}, \\vect{b} \\in \\V_P$, \\begin{equation} \\vect{a} + \\vect{b} = \\vect{b} + \\vect{a} .\\end{equation}\n• (Distributivity of scalar multiplication of vectors) For every $\\vect{a}, \\vect{b} \\in \\V_P$, and every $\\alpha \\in \\R$, \\begin{equation}\\alpha(\\vect{a} + \\vect{b}) = \\alpha\\vect{a} + \\alpha\\vect{b} .\\end{equation}\n• (Distributivity of scalar multiplication of vectors) For every $\\vect{a} \\in \\V_P$, and every $\\alpha,\\beta \\in \\R$, \\begin{equation}(\\alpha + \\beta)\\vect{a} = \\alpha\\vect{a} + \\beta\\vect{a} .\\end{equation}\n• (Associativity of scalar multiplication of vectors) For every $\\vect{a} \\in \\V_P$, and every $\\alpha,\\beta \\in \\R$, \\begin{equation}(\\alpha\\beta)\\vect{a} = \\alpha(\\beta\\vect{a}) .\\end{equation}\n• (Scalar multiplicative identity of vectors) For every $\\vect{a} \\in \\V_P$, \\begin{equation}(1)\\vect{a} = \\vect{a} .\\end{equation} (Here, 1 is the real number 'one'.)\n\nVector Spaces\n\nThe properties listed above for vectors turn out to apply in other contexts as well, and the notion of what a \"vector space'' might be can be generalized.\n\nDefinition A vector space is a set \\V of objects, together with operations of addition and scalar multiplication on these objects, such that the sum of two elements of \\V is also an element of \\V; the product of a real number and an element of \\V is also an element of \\V; finally, the eight properties listed in the theorem above also apply. (The elements of \\V are then called vectors.) This definition allows for one to propose any set as a vector space, if one also provides the rules for addition of two elements of the set as well as the rule for how scalars multiply with elements of the set. These rules are usually self-evident but for more abstract elements, they may be necessary. Such a proposed set then may be verified as truly being a vector space or not by testing whether or not the conditions elaborated in the definition of a vector space above have been satisfied.\n\nExample Let \\V be the set of all functions on the closed interval $[0,1]$. We now need to have definitions for how elements in \\V are added, and for scalar multiplication of elements in \\V. Since the elements in \\V are functions, we already know these operations: for every $f$ and $g$ in \\V, and $\\alpha\\in\\R$, $$(f+g)(x) = f(x) + g(x) \\text{ and } (\\alpha f)(x) = \\alpha \\cdot f(x) .$$ We see that both $f+g$ and $\\alpha f$ are still in \\V, and one can further verify every property in the theorem above, thus \\V is a vector space.\n\nVector Operations\n\nBeyond vector addition and scalar multiplication, vectors have other operations available.\n\nThe Vector Norm\n\nThe norm of a vector is the length of a vector. Recall that we had introduced the notion of a vector as being a displacement from one point to another. So, if a vector $\\vect{v}$ is the displacement from point $P$ to the point $Q$, the norm of $\\vect{v}$ is the distance from $P$ to $Q$. Thus, the norm of $\\vect{v}$ may be written by using the distance formula.\n\nDefinition The norm of a two-dimensional vector $\\vect{a}=(a_1,a_2)_P$ is given by \\begin{equation}\\norm{\\vect{a}} := \\sqrt{a_1^2 + a_2^2} .\\end{equation} Similarly, for a three-dimensional vector $\\vect{b} = (b_1, b_2, b_3)_P$, the norm is \\begin{equation}\\norm{\\vect{b}} := \\sqrt{b_1^2 + b_2^2 + b_3^2} .\\end{equation} A vector with norm equal to one is called a unit vector. Note that the norm operation is defined using double bars. This is to indicate that the norm operation is similar in nature to the absolute value, but it is not the absolute value. We will not assign any meaning to the notion of the absolute value of a vector.\n\nExample \\begin{align} \\mathrm{2D: }& \\norm{(3,1)_{(1,1)}} = \\sqrt{3^2 + 1^2} = \\sqrt{10}\\\\ \\mathrm{3D: }& \\norm{(1,2,2)_{(3,1,1)}} = \\sqrt{1^2 + 2^2 + 2^2} = 3 \\end{align}\n\nThe Dot Product\n\nThe dot product, also called the scalar product, or the inner product, is an operation that maps two vectors to a real number.\n\nDefinition If $\\vect{a} = (a_1, a_2)_P$ and $\\vect{b} = (b1, b2)_P$ are two-dimensional vectors based at the same point, their dot product is the real number given by \\begin{equation} \\vect{a}\\cdot\\vect{b} := a_1b_1 + a_2b_2 .\\end{equation} Similarly, in three dimensions, for $\\vect{a} = (a_1, a_2, a_3)_P$ and $\\vect{b} = (b1, b2, b_3)_P$, the dot product is \\begin{equation} \\vect{a}\\cdot\\vect{b} := a_1b_1 + a_2b_2 + a_3b_3 .\\end{equation}\n\nExample \\begin{align} \\mathrm{2D: }& (3,1)_{(1,1)} \\cdot (2,3)_{(1,1)} = (3)(2) + (1)(3) = 9\\\\ \\mathrm{3D: }& (1,2,0)_{(1,1,2)} \\cdot (2,3,-1)_{(1,1,2)} = (1)(2) + (2)(3) + (0)(-1) = 8 \\end{align} Geometrically, the dot product is proportional to the projection of one vector along the axis of the other vector. This means that for vectors $\\vect{a}$ and $\\vect{b}$ based at the same point, if a right triangle is created by drawing a line from the tip of one vector towards the other vector (so that it is perpendicularly incident), then $\\vect{a}\\cdot\\vect{b}$ is the length of the side of the right triangle along the other vector times the length of that side. This interpretation gives the following formula for the dot product: \\begin{equation} \\vect{a} \\cdot \\vect{b} = \\norm{\\vect{a}} \\norm{\\vect{b}} \\cos\\theta ,\\end{equation} where, $\\theta$ is the angle between $\\vect{a}$ and $\\vect{b}$. Note that this formula relates the norm operation to the dot product, since \\begin{equation} \\norm{\\vect{a}}^2 = \\vect{a}\\cdot\\vect{a} , \\end{equation} since, the angle between the vector $\\vect{a}$ and itself is of course zero, and the cosine of zero is one.\n\nExample Find the angle between the vectors $(1,0,1)_P$ and $(0,1,1)_P$. \\\\ We first calculate the norms of the two vectors: $$\\norm{(1,0,1)_P} = \\sqrt{2} \\text{ and also } \\norm{(0,1,1)_P} = \\sqrt{2} .$$ So, $$(1,0,1)_P \\cdot (0,1,1)_P = \\sqrt{2}\\sqrt{2}\\cos\\theta ,$$ but, can calculate $(1,0,1)_P \\cdot (0,1,1)_P$ directly: $$(1,0,1)_P \\cdot (0,1,1)_P = (1)(0) + (0)(1) + (1)(1) = 1 .$$ Therefore, $\\theta = \\arccos\\frac{1}{2} = \\frac{\\pi}{3}$.\n\nDefinition Vectors $\\vect{a}$ and $\\vect{b}$, based at the same point, are said to be orthogonal if $\\vect{a}\\cdot\\vect{b} = 0$. Note that if two vectors are orthogonal, they need not be perpendicular. Vectors of course are perpendicular if the angle between them is $\\frac{\\pi}{2}$. Meanwhile, if the dot product is equal to zero, this means that either the two vectors are perpendicular or at least one of the two vectors has a zero norm.\n\nTheorem (Properties of the norm and dot product) Let $P$ be a point in $\\Rtwo$ or $\\Rthree$. Let $\\vect{a}$, $\\vect{b}$, and $\\vect{c}$ be vectors based at $P$, and let $\\alpha$ be a real number. Then,\n\n• (Commutativity of the dot product) $\\vect{a} \\cdot \\vect{b} = \\vect{b} \\cdot \\vect{a}$\n• (Distributivity of the dot product) $(\\vect{a} + \\vect{b}) \\cdot \\vect{c} = \\vect{a}\\cdot\\vect{c} + \\vect{b}\\cdot\\vect{c}$\n• (Distributivity of the dot product) $\\vect{a} \\cdot (\\vect{b} + \\vect{c}) = \\vect{a}\\cdot\\vect{b} + \\vect{a}\\cdot\\vect{c}$\n• (Associativity of the dot product) $(\\alpha\\vect{a})\\cdot\\vect{b} = \\alpha(\\vect{a}\\cdot\\vect{b}) = \\vect{a}\\cdot(\\alpha\\vect{b})$\n• (Relation of the norm and dot product) $\\vect{a}\\cdot\\vect{a} = \\norm{\\vect{a}}^2$\n• (Norm of the scalar multiple of a vector) $\\norm{\\alpha\\vect{a}} = \\abs{\\alpha}\\norm{\\vect{a}}$\n• $\\vect{a}\\cdot\\vect{b} = \\norm{\\vect{a}} \\norm{\\vect{b}} \\cos\\theta$, where $\\theta$ is the angle between \\vect{a} and \\vect{b}.\n• (Schwarz's inequality) $\\abs{\\vect{a}\\cdot\\vect{b}} \\le \\norm{\\vect{a}} \\norm{\\vect{b}}$\n• (The triangle inequality) $\\norm{\\vect{a} + \\vect{b}} \\le \\norm{\\vect{a}} + \\norm{\\vect{b}}$\n\nThe Cross Product\n\nIn the last section, we described the dot product, an operation that maps two vectors to a number. We now introduce the cross product, an operation that maps two vectors to another vector. Another difference to note is that while the dot product is defined in both two and three dimensions (actually in any number of dimensions), the cross product is only defined in three dimensions. (Actually, it happens to also be defined in seven dimensions.) The definition of the cross product is motivated as a method of finding a vector that is orthogonal to two other given vectors.\n\nDefinition Let $\\vect{a} = (a_1, a_2, a_3)_P$ and $\\vect{b} = (b_1, b_2, b_3)_P$ be two three-dimensional vectors based at the same point. The cross product of $\\vect{a}$ and $\\vect{b}$ (in that order) is the vector \\begin{equation} \\vect{a}\\times\\vect{b} := (a_2b_3 - a_3b_2, a_3b_1 - a_1b_3, a_1b_2 - a_2b_1)_P . \\end{equation}\n\nExample Let $\\vect{a} = (2,-1,3)_{(1,1,1)}$ and $\\vect{b} = (-1,3,2)_{(1,1,1)}$. Then, $$\\vect{a}\\times\\vect{b} = \\left((-1)(2) - (3)(3), (3)(-1) - (2)(2), (2)(3) - (-1)(-1)\\right)_P = (-11, -7, 5)_P .$$\n\nTheorem Let $P$ be a point in $\\Rthree$. Let $\\vect{a}$, $\\vect{b}$, and $\\vect{c}$ be vectors based at $P$, and let $\\alpha$ be a real number. Then,\n\n• (Anti-commutativity of the cross product) $\\vect{a}\\times\\vect{b} = -\\vect{b}\\times\\vect{a}$\n• (Distributivity of the cross product) $(\\vect{a} + \\vect{b})\\times\\vect{c} = \\vect{a}\\times\\vect{c} + \\vect{b}\\times\\vect{c}$\n• (Distributivity of the cross product) $\\vect{a}\\times (\\vect{b} + \\vect{c}) = \\vect{a}\\times\\vect{b} + \\vect{a}\\times\\vect{c}$\n• (Associativity of the cross product) $(\\alpha\\vect{a})\\times\\vect{b} = \\alpha(\\vect{a}\\times\\vect{b}) = \\vect{a}\\times(\\alpha\\vect{b})$\n• (Norm of the cross product) $\\norm{\\vect{a}\\times\\vect{b}} = \\norm{\\vect{a}} \\norm{\\vect{b}} \\abs{\\sin\\theta}$, where $\\theta$ is the angle between $\\vect{a}$ and $\\vect{b}$\n• $\\vect{a}\\times\\vect{b} = \\vect{0}_P$, if and only if $\\vect{a}$ and $\\vect{b}$ are parallel; $\\vect{a}\\times\\vect{a} = \\vect{0}_P$, for every vector $\\vect{a}$\n\nThe cross product also has a geometric interpretation, which is very important. If two 3D vectors $\\vect{a}$ and $\\vect{b}$ are taken to be two adjacent sides of a parallelogram, then $\\norm{\\vect{a}\\times\\vect{b}}$ is the area of the parallelogram. (This also means that the triangle formed by the common base point of the two vectors and the two tips of the vectors has area $\\frac{1}{2}\\norm{\\vect{a}\\times\\vect{b}}$.)\n\nThe Triple Scalar Product\n\nThe triple scalar product is a combination of the dot product and cross product that maps three vectors (in a given order) to a single number, and it has a very interesting geometric interpretation.\n\nDefinition Let $P$ be a point in $\\Rthree$, and let $\\vect{a}$, $\\vect{b}$, and $\\vect{c}$ be three-dimensional vectors based at $P$. Then the triple scalar product of these three vectors (in that order) is $\\vect{a}\\cdot(\\vect{b}\\times\\vect{c})$. Geometrically, the absolute value of the triple scalar product of three vectors is the volume of the parallelepiped with the three vectors at one of its corners.\n\nThe \"Usual'' Unit Vectors\n\nThe unit vectors are a useful algebraic representation of vectors, that can simplify long computations of dot products and cross products of vectors. In 2D, we have $\\vect{i}$ and $\\vect{j}$. In 3D, we also have $\\vect{k}$. They are always based at the origin $O$. Explicitly, $\\vect{i} = (1,0,0)_O$, $\\vect{j} = (0,1,0)_O$, $\\vect{k} = (0,0,1)_O$. (In 2D, the third components of $\\vect{i}$ and $\\vect{j}$ are omitted.) We have the following algebra for the dot product of unit vectors: \\begin{align} \\vect{i}\\cdot\\vect{i} &= \\vect{j}\\cdot\\vect{j} = \\vect{k}\\cdot\\vect{k} = 1 \\\\ \\vect{i}\\cdot\\vect{j} &= \\vect{i}\\cdot\\vect{k} = \\vect{j}\\cdot\\vect{k} = 0 \\end{align} (Remember that the order of vectors in the dot product can be reversed.) For the cross product of these vectors, we have the following: \\begin{align} \\vect{i}\\times\\vect{i} &= \\vect{j}\\times\\vect{j} = \\vect{k}\\times\\vect{k} = \\vect{0}_P \\\\ \\vect{i}\\times\\vect{j} = \\vect{k} , &\\vect{j}\\times\\vect{k} = \\vect{i} \\text{ , and } \\vect{k}\\times\\vect{i} = \\vect{j} \\\\ \\vect{j}\\times\\vect{i} = -\\vect{k} , &\\vect{k}\\times\\vect{j} = -\\vect{i} \\text{ , and } \\vect{i}\\times\\vect{k} = -\\vect{j} \\end{align} An easy way to remember the cross product rules is to first remember that the cross product of any vector with itself is always the zero vector. Otherwise, remember the following order: $\\vect{i}, \\vect{j}, \\vect{k}, \\vect{i}$. If the cross product involves any pairs of unit vectors in that (left to right) order, then the result is the positive version of the other unit vector, else it is the negative version." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.82873404,"math_prob":0.99999964,"size":23334,"snap":"2021-31-2021-39","text_gpt3_token_len":7435,"char_repetition_ratio":0.18585512,"word_repetition_ratio":0.08846585,"special_character_ratio":0.32446215,"punctuation_ratio":0.11639104,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000085,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-23T00:33:59Z\",\"WARC-Record-ID\":\"<urn:uuid:f9a81b0a-5434-4cf6-a589-b2185b69f2d9>\",\"Content-Length\":\"30157\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e6727e3b-16b0-4794-b73b-e834d8061b4a>\",\"WARC-Concurrent-To\":\"<urn:uuid:4a0b884b-5572-40c9-9adc-a5abb581a79f>\",\"WARC-IP-Address\":\"76.8.60.160\",\"WARC-Target-URI\":\"https://freeboson.org/teaching/?dispnote=week01\",\"WARC-Payload-Digest\":\"sha1:3JKX55IETBXDFA4R6QQTX3YVDUZFXMUQ\",\"WARC-Block-Digest\":\"sha1:O7FWRGYMR24YN3QW6YNAOHSCEHYEXOG6\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780057403.84_warc_CC-MAIN-20210922223752-20210923013752-00049.warc.gz\"}"}
https://wiki.techinc.nl/User:Chotee/constantCurrentSource
[ "# Constant Current Source\n\nA custom design for a constant current source. This was build for the Laser-pop project.\n\n## Uses\n\n• In: Power supply voltage (Vcc), 0 to 30V\n• In: Logic supply voltage (Vdd), 0 to Vcc+1.5V\n• In: Contol voltage, 0 to 5 volts\n• Out: Constant current (Ic). Max 2.1A. Vmax = Vcc-400mV.\n\nThe Current Source is designed to supply current according to a 0 to 5V input voltage control signal. The current scales linearly with control voltage. This signal can be a PWMed signal of a microcontroller (in my case an Arduino PWM signal at around 500Hz) or a constant voltage. How much current will be supplied when the 5V control signal is 5 volts can be set by a variable resistor from approximately 800 to 2100mA.\n\nThe board uses a LT3086 regulator which has a 400mV voltage drop. So maximum voltage output is the supply voltage minus the 400mV. In the case of the LaserPop project, the 5V rail will drive the laser at a maximum of 4.6V.\n\nBesides the supply voltage a different logic voltage can be supplied. A separate logic voltage (Vdd) is required if the maximum ouput voltage of the constant current source is within 1.5V of the Power supply voltage.\n\n## Board\n\nThe boards circuit were designed with LTSpice. Layout was done with Eagle." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87479544,"math_prob":0.94666594,"size":1277,"snap":"2020-24-2020-29","text_gpt3_token_len":333,"char_repetition_ratio":0.17124902,"word_repetition_ratio":0.0,"special_character_ratio":0.24353954,"punctuation_ratio":0.11372549,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.972419,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-28T14:49:49Z\",\"WARC-Record-ID\":\"<urn:uuid:a28a6787-e78b-415b-8bac-63c5e09ad7e3>\",\"Content-Length\":\"18047\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:13275828-2484-4051-9d1d-625812b65a24>\",\"WARC-Concurrent-To\":\"<urn:uuid:532f2f8e-0ce8-4ec8-9227-6472bed69052>\",\"WARC-IP-Address\":\"5.79.113.102\",\"WARC-Target-URI\":\"https://wiki.techinc.nl/User:Chotee/constantCurrentSource\",\"WARC-Payload-Digest\":\"sha1:OHG3SFD5XTWPTHRQ5WBFUUCGLC4BQ4NP\",\"WARC-Block-Digest\":\"sha1:F6RZ4GMJSF2KDQ3OJ5EU35YBUKNWLFZU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347399820.9_warc_CC-MAIN-20200528135528-20200528165528-00149.warc.gz\"}"}
https://answers.everydaycalculation.com/multiply-fractions/3-2-times-6-9
[ "Solutions by everydaycalculation.com\n\n## Multiply 3/2 with 6/9\n\n1st number: 1 1/2, 2nd number: 6/9\n\nThis multiplication involving fractions can also be rephrased as \"What is 3/2 of 6/9?\"\n\n3/2 × 6/9 is 1/1.\n\n#### Steps for multiplying fractions\n\n1. Simply multiply the numerators and denominators separately:\n2. 3/2 × 6/9 = 3 × 6/2 × 9 = 18/18\n3. After reducing the fraction, the answer is 1/1\n\nMathStep (Works offline)", null, "Download our mobile app and learn to work with fractions in your own time:\nAndroid and iPhone/ iPad\n\n×" ]
[ null, "https://answers.everydaycalculation.com/mathstep-app-icon.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.86284405,"math_prob":0.9885052,"size":476,"snap":"2022-40-2023-06","text_gpt3_token_len":231,"char_repetition_ratio":0.18008475,"word_repetition_ratio":0.0,"special_character_ratio":0.48739496,"punctuation_ratio":0.067669176,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9680753,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-25T21:44:26Z\",\"WARC-Record-ID\":\"<urn:uuid:a41450f5-baad-49e7-8d54-d3f81a1514b1>\",\"Content-Length\":\"7986\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f7385e81-d6db-4adf-817a-6c631645422d>\",\"WARC-Concurrent-To\":\"<urn:uuid:fe4b3425-3835-4c67-b219-ff8381a15880>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/multiply-fractions/3-2-times-6-9\",\"WARC-Payload-Digest\":\"sha1:LOS5QX7BMHY2WP5CZ6FA4KPK7JOHWR64\",\"WARC-Block-Digest\":\"sha1:35MIMJM26VQW47NUUZYUJKKDL3DMCEC3\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334596.27_warc_CC-MAIN-20220925193816-20220925223816-00284.warc.gz\"}"}
https://www.colorhexa.com/01fb4d
[ "# #01fb4d Color Information\n\nIn a RGB color space, hex #01fb4d is composed of 0.4% red, 98.4% green and 30.2% blue. Whereas in a CMYK color space, it is composed of 99.6% cyan, 0% magenta, 69.3% yellow and 1.6% black. It has a hue angle of 138.2 degrees, a saturation of 99.2% and a lightness of 49.4%. #01fb4d color hex could be obtained by blending #02ff9a with #00f700. Closest websafe color is: #00ff66.\n\n• R 0\n• G 98\n• B 30\nRGB color chart\n• C 100\n• M 0\n• Y 69\n• K 2\nCMYK color chart\n\n#01fb4d color description : Vivid cyan - lime green.\n\n# #01fb4d Color Conversion\n\nThe hexadecimal color #01fb4d has RGB values of R:1, G:251, B:77 and CMYK values of C:1, M:0, Y:0.69, K:0.02. Its decimal value is 129869.\n\nHex triplet RGB Decimal 01fb4d `#01fb4d` 1, 251, 77 `rgb(1,251,77)` 0.4, 98.4, 30.2 `rgb(0.4%,98.4%,30.2%)` 100, 0, 69, 2 138.2°, 99.2, 49.4 `hsl(138.2,99.2%,49.4%)` 138.2°, 99.6, 98.4 00ff66 `#00ff66`\nCIE-LAB 86.767, -81.711, 66.307 35.847, 69.532, 18.553 0.289, 0.561, 69.532 86.767, 105.23, 140.941 86.767, -80.594, 93.926 83.386, -69.19, 45.179 00000001, 11111011, 01001101\n\n# Color Schemes with #01fb4d\n\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #fb01af\n``#fb01af` `rgb(251,1,175)``\nComplementary Color\n• #32fb01\n``#32fb01` `rgb(50,251,1)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #01fbca\n``#01fbca` `rgb(1,251,202)``\nAnalogous Color\n• #fb0132\n``#fb0132` `rgb(251,1,50)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #ca01fb\n``#ca01fb` `rgb(202,1,251)``\nSplit Complementary Color\n• #fb4d01\n``#fb4d01` `rgb(251,77,1)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #4d01fb\n``#4d01fb` `rgb(77,1,251)``\n• #affb01\n``#affb01` `rgb(175,251,1)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #4d01fb\n``#4d01fb` `rgb(77,1,251)``\n• #fb01af\n``#fb01af` `rgb(251,1,175)``\n• #01af36\n``#01af36` `rgb(1,175,54)``\n• #01c83d\n``#01c83d` `rgb(1,200,61)``\n• #01e245\n``#01e245` `rgb(1,226,69)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #17fe5e\n``#17fe5e` `rgb(23,254,94)``\n• #31fe6f\n``#31fe6f` `rgb(49,254,111)``\n• #4afe81\n``#4afe81` `rgb(74,254,129)``\nMonochromatic Color\n\n# Alternatives to #01fb4d\n\nBelow, you can see some colors close to #01fb4d. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #01fb0f\n``#01fb0f` `rgb(1,251,15)``\n• #01fb23\n``#01fb23` `rgb(1,251,35)``\n• #01fb38\n``#01fb38` `rgb(1,251,56)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #01fb62\n``#01fb62` `rgb(1,251,98)``\n• #01fb77\n``#01fb77` `rgb(1,251,119)``\n• #01fb8c\n``#01fb8c` `rgb(1,251,140)``\nSimilar Colors\n\n# #01fb4d Preview\n\nThis text has a font color of #01fb4d.\n\n``<span style=\"color:#01fb4d;\">Text here</span>``\n#01fb4d background color\n\nThis paragraph has a background color of #01fb4d.\n\n``<p style=\"background-color:#01fb4d;\">Content here</p>``\n#01fb4d border color\n\nThis element has a border color of #01fb4d.\n\n``<div style=\"border:1px solid #01fb4d;\">Content here</div>``\nCSS codes\n``.text {color:#01fb4d;}``\n``.background {background-color:#01fb4d;}``\n``.border {border:1px solid #01fb4d;}``\n\n# Shades and Tints of #01fb4d\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #001105 is the darkest color, while #fcfffd is the lightest one.\n\n• #001105\n``#001105` `rgb(0,17,5)``\n• #00240b\n``#00240b` `rgb(0,36,11)``\n• #003811\n``#003811` `rgb(0,56,17)``\n• #004b17\n``#004b17` `rgb(0,75,23)``\n• #005f1d\n``#005f1d` `rgb(0,95,29)``\n• #007223\n``#007223` `rgb(0,114,35)``\n• #018629\n``#018629` `rgb(1,134,41)``\n• #01992f\n``#01992f` `rgb(1,153,47)``\n``#01ad35` `rgb(1,173,53)``\n• #01c03b\n``#01c03b` `rgb(1,192,59)``\n• #01d441\n``#01d441` `rgb(1,212,65)``\n• #01e747\n``#01e747` `rgb(1,231,71)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\n• #12fe59\n``#12fe59` `rgb(18,254,89)``\n• #25fe67\n``#25fe67` `rgb(37,254,103)``\n• #39fe75\n``#39fe75` `rgb(57,254,117)``\n• #4cfe82\n``#4cfe82` `rgb(76,254,130)``\n• #60fe90\n``#60fe90` `rgb(96,254,144)``\n• #73fe9e\n``#73fe9e` `rgb(115,254,158)``\n• #87ffab\n``#87ffab` `rgb(135,255,171)``\n• #9affb9\n``#9affb9` `rgb(154,255,185)``\n• #aeffc6\n``#aeffc6` `rgb(174,255,198)``\n• #c1ffd4\n``#c1ffd4` `rgb(193,255,212)``\n• #d5ffe2\n``#d5ffe2` `rgb(213,255,226)``\n• #e8ffef\n``#e8ffef` `rgb(232,255,239)``\n• #fcfffd\n``#fcfffd` `rgb(252,255,253)``\nTint Color Variation\n\n# Tones of #01fb4d\n\nA tone is produced by adding gray to any pure hue. In this case, #75877b is the less saturated color, while #01fb4d is the most saturated one.\n\n• #75877b\n``#75877b` `rgb(117,135,123)``\n• #6c9077\n``#6c9077` `rgb(108,144,119)``\n• #629a73\n``#629a73` `rgb(98,154,115)``\n• #58a46f\n``#58a46f` `rgb(88,164,111)``\n``#4fad6b` `rgb(79,173,107)``\n• #45b768\n``#45b768` `rgb(69,183,104)``\n• #3bc164\n``#3bc164` `rgb(59,193,100)``\n• #31cb60\n``#31cb60` `rgb(49,203,96)``\n• #28d45c\n``#28d45c` `rgb(40,212,92)``\n• #1ede58\n``#1ede58` `rgb(30,222,88)``\n• #14e855\n``#14e855` `rgb(20,232,85)``\n• #0bf151\n``#0bf151` `rgb(11,241,81)``\n• #01fb4d\n``#01fb4d` `rgb(1,251,77)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #01fb4d is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5243453,"math_prob":0.7205405,"size":3689,"snap":"2020-45-2020-50","text_gpt3_token_len":1638,"char_repetition_ratio":0.13052917,"word_repetition_ratio":0.011049724,"special_character_ratio":0.5473028,"punctuation_ratio":0.23698781,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98198885,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-31T19:04:42Z\",\"WARC-Record-ID\":\"<urn:uuid:41d5e584-ddc4-443f-87a7-97fc8a5c4fc2>\",\"Content-Length\":\"36248\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b04c5440-3a57-41e4-922e-610e815261de>\",\"WARC-Concurrent-To\":\"<urn:uuid:4c5bf87a-27e1-4ed7-9745-476111be26f7>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/01fb4d\",\"WARC-Payload-Digest\":\"sha1:PYJFY6WF47L7VCHADRG5E4ESNELXW5AW\",\"WARC-Block-Digest\":\"sha1:5SOJDF43S56IASOMMS5UX2N2PDKLLMPQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107922411.94_warc_CC-MAIN-20201031181658-20201031211658-00503.warc.gz\"}"}
https://daynefiler.com/blog/log-sum-exp/
[ "# Log-Sum-Exp trick for getting posterior probabilities from small likelihoods.\n\n###### PUBLISHED ON OCT 10, 2019 — BIOINFORMATICS, STATISTICS\n\nTo formulate the problem, consider calculating the posterior probability given a series of weighted likelihoods. Let\n\n$x_i$\n\nbe the likelihood for observation i. We wish to calculate the posterior probability as:\n\n$p_i = \\frac{x_i}{\\sum_j x_j}$\n\nAs Robert Eisele very nicely discusses in his blog post, we can run into underflow issues. Suppose you have the following vector of logged likelihoods.\n\nx <- c(-9000, -3000, -1000)\nexp(x)/sum(exp(x))\n# NaN NaN NaN\n\nAs we can see, all the values will be zero. However, consider making the calculation in log-space.\n\n\\begin{align} \\text{log}\\left(\\frac{x_i}{\\sum_j x_j}\\right) &= \\text{log}x_i - \\text{log}\\sum_j x_j \\\\ &= \\text{log}x_i - \\text{log}\\sum_j e^{\\text{log}x_j} \\\\ \\end{align}\n\nGiven the proof from Robert Eisele, we know:\n\n$\\text{log}\\sum_i e^{y_i} = \\text{log}\\sum_i e^{y_i - a} + a$\n\nfor arbitrary a. Let a be the maximum log-likelihood value, and we get:\n\n\\begin{align} \\text{log}\\left(\\frac{x_i}{\\sum_j x_j}\\right) &= \\text{log}x_i - \\left(\\text{log}\\sum_j e^{\\text{log}x_j - \\operatorname{max}_j(\\text{log}x_j)} + \\operatorname{max}_j(\\text{log}x_j) \\right) \\\\ p_i & = \\text{exp}\\left\\{ \\text{log}x_i - \\left(\\text{log}\\sum_j e^{\\text{log}x_j - \\operatorname{max}_j(\\text{log}x_j)} + \\operatorname{max}_j(\\text{log}x_j) \\right) \\right\\} \\end{align}\n\nFinally, a simple R function to do the work:\n\ngetPost <- function(l) {\n## l: vector of logged-likelihood values\nexp(l - (log(sum(exp(l - max(l)))) + max(l)))\n}\ngetPost(x)\n# 0 0 1\n\nand we see it gives the exact same values for tractable likelihoods:\n\ny <- c(-9, -3, -1)\nexp(y)/sum(exp(y))\n# 0.0002953872 0.1191677110 0.8805369018\ngetPost(y)\n# 0.0002953872 0.1191677110 0.8805369018" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.6114749,"math_prob":0.9965752,"size":1509,"snap":"2021-21-2021-25","text_gpt3_token_len":495,"char_repetition_ratio":0.18471761,"word_repetition_ratio":0.07035176,"special_character_ratio":0.32736912,"punctuation_ratio":0.07326008,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99999964,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-16T02:43:49Z\",\"WARC-Record-ID\":\"<urn:uuid:7d4fb3bc-a540-497f-af95-da784e2e7169>\",\"Content-Length\":\"8261\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9e5af06c-cfe6-4962-acb7-db5a1266ca8e>\",\"WARC-Concurrent-To\":\"<urn:uuid:e2676132-067a-4883-a738-7890e98619b4>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://daynefiler.com/blog/log-sum-exp/\",\"WARC-Payload-Digest\":\"sha1:P32P4F7BMHBTDRQHEPRGGZVQ4EKF4ZK2\",\"WARC-Block-Digest\":\"sha1:KJUXLCP4VCINJP2DUC4B65GYSY6UEQLY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243991659.54_warc_CC-MAIN-20210516013713-20210516043713-00193.warc.gz\"}"}
https://www.javatpoint.com/applications-of-discrete-mathematics-in-computer-science
[ "# Applications of Discrete Mathematics in Computer Science\n\nThere are various applications of discrete mathematics in computer science, which are described as follows:\n\n### Theoretical Computer Science\n\nDiscrete mathematics is used to include theoretical computer science, which is relevant to computing. Theoretical computer science draws heavily on logic and graph theory. Using theoretical computer science, we can easily compute the mathematical results by studying algorithms. In case of complexity, we will study the time taken by computations. While in the case of computability, we will study what can be computed by following the principle. Computability is closely related to both theories: formal language theory and automata theory.\n\nWe will model computer science with the help of process algebras and Petri nets, and we can also analyze the VLSI electronic circuits by using discrete mathematics methods. In the case of computational geometry, the algorithms will be applied to solve geometrical problems. While in the case of computer image analysis, the algorithms will be applied to represent the images. We can also study topics of continuous computational in theoretical computer science.\n\n### Information theory\n\nThe quantification of information is described using the Information theory. Coding theory and information theory are closely related to each other. It has the ability to design storage methods and reliable and efficient data transmission. A lot of continuous topics are also included in the information theory, like analog encryption, analog signals, mathematical logic, and analog coding.\n\nThe main concern of information theory is to transmit the data over the noisy channel. Using the information theory, we can find the amount of information in a message. We can also find that how much information is contained by distributions, events, and random variables. Machine learning and artificial intelligence widely use the measurement of information.", null, "### Mathematical logic\n\nMathematical logic can also be known as formal logic. In logic, we will learn about the principles of valid inference and reasoning. We can also study completeness, consistency, and soundness. In various logic systems, the law of Peirce's (((P→Q)→P)→P) is considered as theory except for the Intuitionistic logic. In classical logic, it can verify very easily by using the truth table. When we study logic, it is also important to study mathematical proof.\n\nMathematical logic also has some application which is used in formal verification of software and automated theorem proving. Logical formulas are described by the discrete structure, which is used to create directed acyclic graph structures and finite trees. A finite set is produced by the truth values of logical formulas. The finite set is restricted with two values that are false and true, but in fuzzy logic, logic will also have continuous values. In the infinitely logic, we can also study infinite derivation trees or infinite proof trees.\n\n### Set Theory\n\nSet theory can be described as a branch of mathematics in which we study sets. Sets contain the infinite set of prime numbers or objects like green, orange, black, etc. In several areas, we have various applications of sets with other relations and partially ordered sets. In discrete mathematics, our main focus will be on countable sets (including finite sets).\n\nGeorg Cantor's work marks the beginning of set theory, which is used to distinguishing between various types of infinite sets. The trigonometric series provide the motivation to describe different types of infinite sets. The development of infinite sets theory does not exist inside the discrete mathematics scope.", null, "### Combinatorics\n\nCombinatorics is used to describe the way to combine and arrange discrete structures. In enumerative combinatorics, our main concern will be on counting some combinatorial object's numbers. For example, we can count partitions, combinations, and permutations by using the unified framework provided in the twelvefold way. In analytic combinatorics, our main concern will be on enumeration of combinatorial structure. Probability theory and complex analysis have various tools which help in analytic combinatorics. Analytic combinatorics is used to obtain the asymptotic formula. In contrast, enumerative combinatorics describes the result by using the generating functions and combinatorial formula.\n\nThe study of combinatorial design will be described in the design theory, which is used to contain various subsets with certain properties of intersection. In the partition theory, we will study the various asymptotic and enumeration problems, which are related to special functions, q-series, integer partitions, and orthogonal polynomials. Partition theory is a part of analysis and number theory. Now it is considered as a part of independent field or combinatorics. We can study a partially ordered set that is infinite and finite in the order theory.", null, "### Graph theory\n\nGraph theory can be considered as a part of combinatorics. In this, we will study about networks and graphs, but it is grown distinct enough and large enough with their problems, and it has its own right. In discrete mathematics, graph can be described as the prime objects of study. The most ubiquitous models of human-made and natural structure can be described by the Graph. Different types of relationships can be modeled by graphs. It is also able to process dynamics in the social, biological, and physical systems.\n\nIn computer science, a lot of things are represented by graphs that are computational devices, networks of communication, the flow of computations, data organization, etc. In mathematics, the graph can be used in certain parts of topology, that is, knot theory and in geometry. Graph theory and algebraic theory both have a close link with each other. There is also another option of continuous graphs. The domain of discrete mathematics is going to contain most of the research part of graph theory.", null, "### Discrete probability theory\n\nIn countable sample events, a lot of events will occur, and discrete probability theory is able to deal with these types of events. For example, suppose we are observing the number of birds in flocks for count observation. In this case, it will comprise only natural number values that are {0, 1, 2, 3}. In contrast, suppose we are observing the weight of birds for continuous observations. This case will comprise real number values, and the continuous probability distribution like normal will be used to model it.\n\nIf we use discrete probability distribution, it will approximate continuous one and vice versa. Some situations, such as experiments with cards decks or throwing dice, are called highly constrained situations, and in these situations, we will basically use enumeration to calculate the probability of events.", null, "### Number Theory\n\nIn number theory, we will basically study the properties of numbers, especially integers. It contains several applications to linear and quadratic congruence, cryptanalysis, Diophantine equations, cryptography, prime number, primarily testing, cryptology, and particularly with regard to modular arithmetic. The geometry of numbers is included in other discrete aspects of number theory. Various techniques of continuous mathematics can also be used in the analytic number theory. We also have some topics of discrete objects that go beyond, and those topics include Diophantine approximation, transcendental numbers, and analysis and function fields.\n\nThere are two types of examples which is occurred with the help of algebraic structure are continuous examples and discrete examples. Discrete algebra is used to include many things that are: relational algebra, which is used in the database; Boolean algebra, which is used in programming and logic gates; rings, fields, finite and discrete group, which are used in the theory of algebraic coding; monodies, and discrete semigroups, which is appeared in formal languages theory.", null, "### Computational geometry and Discrete geometry\n\nCombinatorial geometry and discrete geometry can be described as the combinatorial properties of geometrical object's discrete collections. In the case of discrete geometry, a long-standing topic is a tiling of the plane. All the geometrical problems can be solved by using the algorithms applied by computational geometry.\n\n### Trees\n\nA tree can be called an acyclic graph. A tree generally contains the non-empty finite set of elements which is known as nodes or vertices with the connected lines or edges between the nodes. The tree does not have multiple edges, simple circles, and loops. If we want to find the possible outcome of any experiment, the tree will be a good option to do this. Each node contains some minimum and maximum degrees. The minimum degree should be 1and the maximum degree can go upto n. The starting symbol of a tree is known as the root, and the root of a tree can't be null.", null, "### Topology\n\nTopology can be described as the field of mathematics. It is used to contain subsets of topological space. Many discrete topics rise only because of using topology. We can provide the focus on topological invariants by doing their parts. The topologic invariants normally take discrete values that are finite topological space, topological graph theory, discrete topological space, combinatorial topology, topology (chemistry), computational topology, etc.", null, "### Feedback", null, "", null, "", null, "" ]
[ null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science2.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science3.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science4.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science5.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science6.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science7.png", null, "https://static.javatpoint.com/tutorial/dms/images/applications-of-discrete-mathematics-in-computer-science8.png", null, "https://www.javatpoint.com/images/facebook32.png", null, "https://www.javatpoint.com/images/twitter32.png", null, "https://www.javatpoint.com/images/pinterest32.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.9383503,"math_prob":0.9447954,"size":9441,"snap":"2023-40-2023-50","text_gpt3_token_len":1794,"char_repetition_ratio":0.14305393,"word_repetition_ratio":0.017265193,"special_character_ratio":0.17752357,"punctuation_ratio":0.11796733,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.997748,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-11T03:39:36Z\",\"WARC-Record-ID\":\"<urn:uuid:4c1de6c9-82cc-4b4a-8197-093ee8dd4a8c>\",\"Content-Length\":\"58820\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aa8eab42-b99f-4f4c-bc53-a54574310181>\",\"WARC-Concurrent-To\":\"<urn:uuid:7fe22660-dd30-4970-891e-127624b32b1c>\",\"WARC-IP-Address\":\"104.21.22.242\",\"WARC-Target-URI\":\"https://www.javatpoint.com/applications-of-discrete-mathematics-in-computer-science\",\"WARC-Payload-Digest\":\"sha1:U44YGQSD3RD6ZENJULZ46FS4ZNHMGDBQ\",\"WARC-Block-Digest\":\"sha1:6NIZHT7XLLPLO474IBJP7L4EATFEMSH6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679103464.86_warc_CC-MAIN-20231211013452-20231211043452-00614.warc.gz\"}"}
http://sammlung-beier.de/pokemon-heart-kghnobn/4e6223-135-lbs-in-kg
[ "Definition: A pound (symbol: lb) is a unit of mass used in the imperial and US customary systems of measurement. How many pounds in 135 Kilograms? Thus, for example, if a user enters 210lbs, the resultant answer of the weight in Jupiter would be 530.67lbs. 135 kg to lbs. What is 135 kg in pounds? Quick and easy pounds to kilograms conversion. This prototype is a platinum-iridium international prototype kept at the International Bureau of Weights and Measures. Take off 1/10th = (50 – 5) = 45 Kg. To convert 135 kg to lbs, multiply 135 by 2.205. To calculate 135 Pounds to the corresponding value in Kilograms, multiply the quantity in Pounds by 0.45359237 (conversion factor). 135 lb → M (kg) Solve the above proportion to obtain the mass M in kilograms: M (kg) = 135 lb × 0.45359237 kg Mass is defined as the tendency of objects at rest to remain so unless acted upon by a force. The international avoirdupois pound (the common pound used today) is defined as exactly 0.45359237 kilograms. Kilograms to Pounds Converter. The avoirdupois pound is equivalent to 16 avoirdupois ounces. How many pounds in 135 Kilograms. Convert 135 Pounds to Kilograms. 135 Kilograms (kg) 297.62405 Pounds (lb) Kilograms : The kilogram (or kilogramme, SI symbol: kg), also known as the kilo, is the fundamental unit of mass in the International System of Units. 135 lbs = 61 kg. kilograms to pounds conversion. It is equal to the mass of the international prototype of the kilogram. Pound. If you're just trying to convert pounds to kilograms for cooking or to know your own weight, there's a handy rule of thumb you can use: To get kilograms, divide by 2 then take off 1/10th of your answer Eg 100 pounds… Divide by two = 50 Kg. 135 Pounds to Kilograms shows you how many kilograms are equal to 135 pounds as well as in other units such as grams, metric tons, milligrams, micrograms, stones and ounces. The kilogram (kg) is the SI unit of mass. One pound, the international avoirdupois pound, is legally defined as exactly 0.45359237 kilograms. Definition of pound. 135 Pounds to Kilograms. l b Kilograms-to-pounds.com kg/g→lb lb→kg/g kg/g→st,lb st,lb→kg/g kg/g→lb,oz lb,oz→kg/g. 54.9 kg to stones and lbs Disclaimer While every effort is made to ensure the accuracy of the information provided on this website, neither this website nor its authors are responsible for any errors or omissions, or for the results obtained from the use of this information. 135 kg to lbs to convert 135 kilograms to pounds and find out how many pounds is 135 kg. - 135 kg is equal to 297.62 pounds. To convert 135 lbs into kg, use the formula: 135 lbs* 1 kg 2.2046 lbs = 61.23496995 kg lb kg lb kg lb kg lb kg lb kg lb kg 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 18.5 19.0 19.5 We can also form a simple proportion to calculate the result: 1 lb → 0.45359237 kg. 135 kilograms or 135000 grams equals 297.62 pounds. kg to pounds kg to lb + oz. The final formula to convert 135 Lb to Kg is: [Lb] = 135 * 0.453592 = 61.23 Kilogram is the SI unit of mass. The units will always match. Definition of kilogram. To convert 135 pounds into kilograms we have to multiply 135 by the conversion factor in order to get the mass amount from pounds to kilograms. Just for the sake of clarity, a user can select the units he wants the answer to appear in, whether grams, kilograms, or pounds, and that unit will show in the answer." ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.84132594,"math_prob":0.9861478,"size":3402,"snap":"2021-31-2021-39","text_gpt3_token_len":932,"char_repetition_ratio":0.1624485,"word_repetition_ratio":0.027642276,"special_character_ratio":0.30305701,"punctuation_ratio":0.12872629,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98750126,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-05T15:20:29Z\",\"WARC-Record-ID\":\"<urn:uuid:31b2cf1e-9e6c-4ca1-9273-daf095ee3f55>\",\"Content-Length\":\"10589\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9d6954d2-824e-4089-a81a-0a718b13735f>\",\"WARC-Concurrent-To\":\"<urn:uuid:27fbc1b3-2541-487d-9e00-4ac378c77e5d>\",\"WARC-IP-Address\":\"193.141.3.68\",\"WARC-Target-URI\":\"http://sammlung-beier.de/pokemon-heart-kghnobn/4e6223-135-lbs-in-kg\",\"WARC-Payload-Digest\":\"sha1:Q7OSJK3WRJYCDNFWTJR2XS45P7HEYYO5\",\"WARC-Block-Digest\":\"sha1:HBTTANNPT37F22CWNB5FSRZOPW72WNQ5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046155925.8_warc_CC-MAIN-20210805130514-20210805160514-00297.warc.gz\"}"}
https://electrical-engineering-portal.com/procedure-for-transformer-lightning-impulse-test
[ "Get access to premium HV/MV/LV technical articles, electrical engineering guides and papers. Check our new membership plans and prices!\n\n# Procedure for transformer lightning impulse test\n\nHome / Technical Articles / Procedure for transformer lightning impulse test\n\n### Lightning impulse test\n\nThe purpose of the impulse voltage test is to secure that the transformer insultations withstand the lightning overvoltages which may occur in service.\n\n### Testing equipment\n\n#### Impulse generator\n\nWhere:\n\n• C1 – Impulse capacitor\n• Rc – Charging resistor\n• Rs – Series resistor\n• Ra – Low-ohmic discharging resistor for switching impulse,\n• Rb – High-ohmic discharging resistor for switching impulse\n• F1…Fn – Main spark-gaps,\n• Fal…Fan – auxiliary spark-gaps\n\nThe impulse generator design is based on the Marx circuit. The basic circuit diagram is shown on Figure 1 above. The impulse capacitors Cs (12 capacitors of 750 nF) are charged in parallel through the charging resistors Rc (45 kΩ) (highest permissible charging voltage 200 kV).\n\nWhen the charging voltage has reached the requider value, breakdown of the spark-gap F1 is initiated by an external triggering pulse. When F1 breaks down, the potential of the following stage (points B and C) rises. Because the series resistor Rs is of low ohmic value compared with the discharging resistor Rb (4.5 kΩ) and the charging resistor Rc, and since the low-ohmic resistor.\n\nRa is separated from the circuit by the auxiliary spark-gap Fa1, the potential difference across the spark-gab F2 rises considerably and the breakdown of F2 is is initiated. Thus the spark-gaps are caused to break down in sequence.\n\nConcequently the capacitors are discharged in series-connection. The high ohmic discharge resistors Rb are dimensioned for switching impulses and the low-ohmic resistors Ra for lightning impulses. The resistors Ra are connected in parallel with the resistors Rb, when the auxiliary spark-gaps break down, with a time dalay of a few hundred nanoseconds.\n\nThis arrangement is necessary in order to secure the functioning of the generator.\n\nThe required voltage is obtained by selecting a suitable number of seriesconnected stages and by adjusting the charging voltage. In order to obtain the necessary disscharge energy parallel or series-parallall connections of the generator can be used. In these cases some of the capacitors are connected in parallel during the discharge.\n\nMax. test voltage amplitudes: 2.1 MV lightning impulse. 1.6 MV switching impulse.\n\nWhere:\n\n• Cr – Resulting impulse capacitance\n• Rsr – Resulting series resistance\n• Rar – Resulting discharge resistance\n• LLp – Stray inductances\n• Ci – Input capacitance of transformer\n• Li – Transformer inductance\n• C1 – Capacitance of voltage divider\n• F1 – Spark gaps of impulse generator\n• F2 – Calibration sphere gap\n• R2 – Protective resistor.\nThe required impulse shape is obtained by selecting the series and discharge resistors of the generator suitably.\n\nThe front time can be calculated approximately from the equation:\n\nT1 ≈ 2,5 · Rsr · (Ci + C1) (formulae 1)\n\nand the time to half value from the equation:\n\nT2 ≈ k · √(Li · Cr) (formulae 2)\n\nThe factor k depends on the quantities Rsr, Rar, Li and Cr. In practice the testing circuit is dimensioned according to experience.\n\n### Voltage measuring circuit\n\nThe impulse shape and the peak value of the impulse voltage are measured by means of an oscilloscope and a peak voltmeter which are connected to the voltage divider (Figure 3). The measuring range can be changed by shortcircuiting part of the high voltage capacitors or changing the low voltage capacitor of the divider.\n\nWhere:\n\n• E – Damped capacitive voltage divider\n• W – Measuring cable (= wave impedance = Rp)\n• P1 – Oscilloscope\n• P2 – Peak voltmeter\n• Rp – Terminal resistance of the measuring cable\n• R1 – Damping resistor of voltage divider\n• C1 – High voltage capacitor of voltage divider\n• C2 – Low voltage capacitor of divider.\n\nThe measuring circuit is checked in accordance with the standards (formulae 2) and (formulae 3). If necessary the sphere-gap calibration of the measuring circuit can be performed in connection with the testing according to the standard (figure 4 below).\n\n### Transformer testing and fault detection connections\n\nThe lightning impulse test is normally applied to all windings. The impulse testsequency is applied successively to each of the line terminals of the tested winding. The other line terminals and the neutral terminal are earthed (singleterminal test, Figure 4a and 4b).\n\nWhere:\n\n• a, b – 1-terminal testing\n• c – 3-terminal testing\n• d – 2-terminal testing\n• e – test with transferred voltages\n• f – neutranl terminal testing\n\nWhen testing low voltage windings of high power the time to half-value obtained is often too short. However, the time to half-value can be increased by connecting suitable resistors (Ra in Figure 4b) between the adjacent terminals and earth.\n\nAccording to the standard IEC 76-3 the resistances of the resistors must be selected so that the voltages at the adjacent terminals do not exceed 75 % of the test voltage and the resistance does not exceed 500 Ω.\n\nA delta-connected winding (and star-connected winding, unless the neutral is available) is also tested with an impulse test-sequence applied to the line terminals of the tested winding connected together, while the other windings are earthed (three-terminal test, Figure 4c).\n\nFor delta-connected windings the single and three-terminal testings can be combined by applying the impulse to two line terminals at a time, while the other line terminals are earthed (two-terminal testing, Figure 4d). In this case two phases are simultaneously tested in a single-terminal connection and one phase in a test connection corresponding to three-terminal testing.\n\nThe two- and three-terminal testings are not included in the standard, but they can be done if it is so agreed.\n\nWhen the low voltage winding cannot in service be subjected to lighting overvoltages from the low voltage system (e.g. step-up transformers, tertiary windings) the low voltage winding may (by agreement between customer and manufackturer) be impulse tested simultaneously with the impulse tests on the high voltage winding with surges transferred from the high voltage winding to the low voltage winding (Figure 4e, test with transferred voltages).\n\nAccording to IEC 76-3 the line terminals of the low voltage winding are connected to earth through resistances of such value (resistances Ra in Figure 4e) that the amplitude of transferred impulse voltage between line terminal and earth or between different line terminals or across a phase winding will be as high as possible but not exceeding the rated impulse withstand voltage.\n\nThe resistance shall not exceed 5000 Ω. The neutral terminal is normally tested indirectly by connecting a high-ohmic resistor between the neutral and earth (voltage divider Ra, Ru) and by appluying the impulse (Figure 4d) to the line terminals connected together.\n\nThe impulse test of a neutral terminal is performed only if requested by the customer.\n\nFor fault detection in single-terminal and two-terminal tests the neutral of star-connected windings are earthed via a low-ohmic resistor (Ru). The current flowing through the detection resistor during the test is rocorded by means of an oscilloscope. Evidence of insultaion failure arising from the test would be given significant discrepacies between the calibration impulse application and the full voltage applications in recorded current wave-shapes.\n\nCertain types of faults give rise to discrepancies in the recorded voltage wave-shapes as well.\n\nFor fault detection in three-terminal tests and tests on the neutral terminal the adjacent winding is earthed through a low-ohmic resistor. The fault detection is then based on recording the capacitive current which is transferred to the adjacent winding.\n\n### Lightning Impulse Test on Transformer (400KV/15KV, 160MVA)\n\nReference // Testing of power transformers – ABB\n\nGet access to premium HV/MV/LV technical articles, electrical engineering guides, research studies and much more! It helps you to shape up your technical skills in your everyday life as an electrical engineer.", null, "### Edvard Csanyi\n\nElectrical engineer, programmer and founder of EEP. Highly specialized for design of LV/MV switchgears and LV high power busbar trunking (<6300A) in power substations, commercial buildings and industry facilities. Professional in AutoCAD programming.\n\n1.", null, "2.", null, "" ]
[ null, "https://electrical-engineering-portal.com/wp-content/uploads/2018/08/Edvard_avatar-150x150.jpg", null, "https://electrical-engineering-portal.com/wp-content/themes/infocus/images/default-avatar.png", null, "https://electrical-engineering-portal.com/wp-content/themes/infocus/images/default-avatar.png", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8846359,"math_prob":0.8973615,"size":6860,"snap":"2019-51-2020-05","text_gpt3_token_len":1498,"char_repetition_ratio":0.15825555,"word_repetition_ratio":0.003652968,"special_character_ratio":0.20568512,"punctuation_ratio":0.06863597,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95413625,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-21T22:29:22Z\",\"WARC-Record-ID\":\"<urn:uuid:928b2245-a017-4734-9bfe-c09a97cc8133>\",\"Content-Length\":\"68017\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:aa53f881-3cd9-4739-99c0-ada05efc03d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:5319ef2a-5c68-419c-b6f7-50d5bf20f192>\",\"WARC-IP-Address\":\"138.68.46.189\",\"WARC-Target-URI\":\"https://electrical-engineering-portal.com/procedure-for-transformer-lightning-impulse-test\",\"WARC-Payload-Digest\":\"sha1:YF3C2CV26RH3NSMG5ZCRRSXWHUR2WYXY\",\"WARC-Block-Digest\":\"sha1:JL63Z5BJUE4NWA6GLDB64BW5PA6BPM74\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250606226.29_warc_CC-MAIN-20200121222429-20200122011429-00256.warc.gz\"}"}
https://www.constructorsknowledge.com/2019/10/how-to-calculate-concrete-volume-of.html
[ "### HOW TO CALCULATE CONCRETE VOLUME OF TRAPEZOIDAL FOOTING/ SLOPED FOOTING\n\nHow to calculate concrete volume of trapezoidal footing\n\n• A trapezoid is a combination of a cuboid and a truncated pyramid.\n• Trapezoidal footing = Volume of cuboid +  volume of truncated pyramid.\nSo to calculate the volume of trapezoidal footing we need to calculate the volume of a cuboid and a truncated pyramid.\n\n1. Volume of rectangular cuboid\n= Length X Breadth X Height\n\n2. Volume of truncated pyramid\n= h/3 { A1 + A2 + √(A1 X A2)}\nWhere,\nh = height of truncated pyramid\nA1 = Area of base of truncated pyramid\nA2 = Area of top of truncated pyramid\n\nLet take an example of Trapezoidal footing to understand it well.\n\nHere is a figure of rectangular trapezoidal footing.\n\nAs per data given in the figure, detailed calculation of the volume of trapezoidal footing are given below.\n\n1. Volume of rectangular cuboid\n= 1.5 X 2.0 X 0.3\n= 0.9 cu.m\n\n2. Volume of truncated pyramid\n= h/3 {A1+A2+√(A1 X A2)}\nWhere,\nA1 = 1.5 X 2.0 = 3 sq.m\nA2 = [0.3 + (2x0.1)] X [0.45+(2x0.1)]\n= 0.325 sq.m\n\n= 0.6/3 ( 3+ 0.325 + √ 3x 0.325)\n= 0.862 cu.m\n\nTotal volume of trapezoidal footing\n= Volume of cuboid + Volume of truncated pyramid\n= 0.9 + 0.862\n= 1.762 cu.m\n\nSo we have a total volume of trapezoidal footing is 1.762 cu.m" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.7635258,"math_prob":0.99806273,"size":2059,"snap":"2021-04-2021-17","text_gpt3_token_len":730,"char_repetition_ratio":0.2024331,"word_repetition_ratio":0.8746803,"special_character_ratio":0.35308403,"punctuation_ratio":0.15221988,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997985,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-16T18:02:09Z\",\"WARC-Record-ID\":\"<urn:uuid:1b672d45-0552-4198-b6ee-55cc435f8d67>\",\"Content-Length\":\"113341\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9fc63078-05e6-4f11-932a-42b00c5951f8>\",\"WARC-Concurrent-To\":\"<urn:uuid:9656fcec-8abc-4c0f-847e-9157c0d5a796>\",\"WARC-IP-Address\":\"172.217.9.211\",\"WARC-Target-URI\":\"https://www.constructorsknowledge.com/2019/10/how-to-calculate-concrete-volume-of.html\",\"WARC-Payload-Digest\":\"sha1:465TYSP4AGQQQOTMOCZFIIIPDEMDCGX6\",\"WARC-Block-Digest\":\"sha1:FPKIVELAZ7OWHCHGU7RGPFMUOKL6GINN\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703506832.21_warc_CC-MAIN-20210116165621-20210116195621-00224.warc.gz\"}"}
http://www.datasoldier.net/archives/370
[ "# SPSS教程学习笔记4:多项logistic逻辑回归案例\n\n## 案例数据介绍", null, "## SPSS多项logistic回归菜单操作步骤", null, "", null, "", null, "", null, "", null, "## 多项logistic回归结果解读", null, "", null, "", null, "", null, "## 多项logistic回归模型\n\nG1=LOG[P(早餐摊)/P(谷物类)]=-1.224+0.984年龄1+1.309年龄2+0.542年龄3+0.843婚姻状况0-0.792生活态度0\n\nG2=LOG[P(燕麦类)/P(谷物类)]=1.134-4.273年龄1-2.532年龄2-1.192年龄3+0.843婚姻状况0+0.186生活态度0\n\nG3=0 (对照组)\n\nP1=exp(G1)/[exp(G1)+exp(G2)+exp(G3)]\n\nP2=exp(G2)/[exp(G1)+exp(G2)+exp(G3)]\n\nP3=exp(G3)/[exp(G1)+exp(G2)+exp(G3)]", null, "", null, "(文/图 数据小兵)", null, "" ]
[ null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u18240722661210709131fm170s4810CF1A118FD8EB4075B4CE020010B0w501h378img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/spss多项logistic回归.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u11735648781821493673fm170s8965DF1479D74CCA167481DB020010B2w211h300img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/回归模型.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u32497004303535370928fm170s8001DF14195ED4CE1CD411CA020050B2w412h318img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/模型预测.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u1155204055753874287fm170s1EAA7423318FCCEE585D30DA0000E0B1w323h355img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/统计结果解读.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u23476702841680103051fm170s3EA87023D18E64EA48FDC5D30000D0B0w393h265img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u2877385619450416646fm170s1AAA7C23B98F4CCA0C75E0DA000080B1w620h391img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/多项logistic回归结果分析.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/u31792257202991405075fm170s3BAC782285F86D8A1CDC91DE000060B1w417h160img.jpg", null, "http://www.datasoldier.net/wp-content/uploads/2018/07/文章内推广20210622.jpg", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.94888747,"math_prob":0.97385925,"size":2598,"snap":"2022-27-2022-33","text_gpt3_token_len":2612,"char_repetition_ratio":0.08828065,"word_repetition_ratio":0.0,"special_character_ratio":0.21439569,"punctuation_ratio":0.05637982,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9968492,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26],"im_url_duplicate_count":[null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,3,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-28T11:43:02Z\",\"WARC-Record-ID\":\"<urn:uuid:6eb35061-fa5d-4e10-94a8-97bff8b8d524>\",\"Content-Length\":\"50457\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e4f5c80a-5a67-40e0-af79-cf9dcfa00c88>\",\"WARC-Concurrent-To\":\"<urn:uuid:1225c268-dcc7-4974-be45-5fa18393c8d6>\",\"WARC-IP-Address\":\"47.94.255.180\",\"WARC-Target-URI\":\"http://www.datasoldier.net/archives/370\",\"WARC-Payload-Digest\":\"sha1:ABS3IH2BLGZXU3SXXDDYNVG4GZIPXCER\",\"WARC-Block-Digest\":\"sha1:WWAY6QTVOEPX7MFXIPT6M737ONYLTYYK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103516990.28_warc_CC-MAIN-20220628111602-20220628141602-00798.warc.gz\"}"}
https://imagej.github.io/Colocalization_by_Cross_Correlation
[ "# Colocalization by Cross Correlation", null, "Name Colocalization by Cross Correlation Software Fiji Author Andrew McCall Maintainer Andrew McCall Source on GitHub Status active Category\n\nThis plugin attempts to determine the average distance between non-randomly spatially associated particles, the standard deviation of that distance (which should also reflect the width of the PSF in the image for diffraction limited images), and a statistical measure of confidence of the association. It currently works on 2D/3D single-channel images, and requires a mask of all possible localizations for the signal in one of the images.\n\nInstalling the Plugin:\n\nAvailable on the list of ImageJ updates sites. Requires Fiji.\n\nHow it works:\n\nThe plugin performs a cross-correlation in frequency space to create a correlation image. To remove non-specific correlations (from background, or high signal density), a correlation image generated from randomized images is then subtracted from the original correlation image. This occurs through cycles of:\n\n1. Randomizing Image1 using the Costes randomization method and a mask of all theoretically possible localizations for the signal in Image1 (i.e. a mask of the cells, or the nuclei).\n\n2. Calculating the cross-correlation of the randomized image with Image2, then averaging this over successive cycles.\n\nAfter the subtraction of non-specific correlations, we generate a radial profile of this data and fit a gaussian curve to it, showing the correlation between the images at different offsets. We also generate a radial profile for the original correlation data before subtraction, as this is needed to establish a measure of confidence. The confidence is calculated as the area under the curve (AUC) of the subtracted correlation radial profile (in the range of mean ± 3×sigma) divided by the AUC of the original correlation radial profile (in same range) as a percentage. The confidence value, along with the mean and sigma of the gaussian fit are displayed in a log window. Higher values of confidence, closer to 100, indicate that two images likely have a true spatial correlation at the indicated distance.\n\nPreparing images:\n\nThis plugin requires two single channel, single frame images (2D or 3D) to be analyzed, and an additional binary mask to define the randomization area (details for mask below). The two images should undergo appropriate background subtraction to lower the background pixel values to zero or near zero. Even low level background (pixel values of 10 to 20 on a 16 bit image) can lower the confidence level and result in false negatives. Additionally, the images (particularly 3D) need to be correctly scaled (Image>Properties), otherwise all axes will be assumed to have the same scale. The mask for the binary image should cover all of the theoretically possible localizations for the signals in the image that is to be randomized. Typically this will simply be a binary mask of the cell volume, however if you are analyzing nuclear proteins, this would be a mask of only the nuclei. Using an inappropriate mask will likely result in the detection of a strong correlation caused by these higher order repeating structures (e.g. you will find a correlation at distances averaging 10-15 microns, caused by the repeating structure of the cells).\n\nRunning the plugin:\n\nThe plugin can be found in the plugins menu (near the bottom) and should be started with the images and mask already open. At the dialog menu, select the two images and the mask to be used, and enter the PSF width and height in pixel units. For the Costes’ randomization cycles count, you can typically input a low number (3-5), however if you have sparse signal within a large mask volume you will probably want to do more cycles. If the “Show intermediate data” box is checked, the plugin will open images showing the correlations (before and after subtraction of random associations), and a sample randomization image. This can be useful for understanding the function of the plugin, or for visualizing the direction of the correlation if your sample has a polarized axis.\n\nInterpreting the results:\n\nAfter the plugin has finished, two new windows will be open:", null, "Correlation plot: A radial profile plot will be displayed, it contains the radial profile of the original correlation image (black line), the radial profile of the correlation after subtraction of random associations (red line), and a Gaussian curve fit to the subtracted profile (blue dots). The Y-axis is the result of the average correlation function at a given distance. While not arbitrary, it is most easily viewed as a measure of relative correlation. The range of the graph is set automatically to fit the Gaussian curve. If you wish to view all the data select More>Set Range to Fit all…\n\nGaussian fit analysis: This text window will contain (in scaled units), the mean distance for the discovered correlation, and the standard deviation of that correlation (sigma), as well as an estimation of confidence for this correlation (range 0-100). The confidence is determined by taking the area under the curve (AUC) of the subtracted correlation radial profile (in range of mean ± 3×sigma) divided by the AUC of the original correlation radial profile (in same range). Values closer to 100 indicate a strong likelihood of true correlation. Values near zero indicate low to no correlation between the two images. I currently estimate that values of ~20 or greater indicate some degree of correlation (within the range specified by the Gaussian curve), though this is with very limited data. Confidence values can be affected by many things, including image noise and background, an inappropriate randomization mask, and optical abberations. Performing a simple background subtraction can improve confidence scores signficantly." ]
[ null, "https://imagej.github.io/images/icons/40px-Information-sign.png", null, "https://imagej.github.io/media/ColocByCorrelate-GaussFit.jpg", null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.87908906,"math_prob":0.91173327,"size":5744,"snap":"2020-45-2020-50","text_gpt3_token_len":1144,"char_repetition_ratio":0.16114983,"word_repetition_ratio":0.059080962,"special_character_ratio":0.19568245,"punctuation_ratio":0.08814888,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9742311,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-30T11:36:13Z\",\"WARC-Record-ID\":\"<urn:uuid:a5789978-36b9-48c3-9fd0-fbd88b521645>\",\"Content-Length\":\"12882\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:25c81e0a-873f-4f9b-9e46-27ae8c57aee0>\",\"WARC-Concurrent-To\":\"<urn:uuid:3005b8c5-619d-4620-a78b-e41e0375b90f>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://imagej.github.io/Colocalization_by_Cross_Correlation\",\"WARC-Payload-Digest\":\"sha1:YBZETBJYDGOAJYPOOXJRHIZ4Z2OXMQN7\",\"WARC-Block-Digest\":\"sha1:L5J3QJGULFZNYDPSYJNJ7JMQXNX4TFXM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141213431.41_warc_CC-MAIN-20201130100208-20201130130208-00680.warc.gz\"}"}
https://www.eefocus.com/component/492452
[ "1、R,G,B提取色域算法原理\n\n算法公式:\n\n`` RR=(R-G)+(R-B) (G>R:R-G=0)(B>R:R-B=0) 2-1`` GG= (G-R)+(G-B) (R>G:G-R=0)(B>G:G-B=0) 2-2`` BB=(B-R)+(B-G) (R>B:B-R=0)(G>B:B-G=0) 2-3``\n\nR,G,B分别代表rgb图像的三个颜色通道,当颜色趋于红色时,RR通道趋于255(灰度白色);当颜色趋于绿色时,GG通道趋于255;当颜色趋于蓝色时,BB通道趋于255。\n\n2、场景实验—蓝色车牌提取\n\n``Matlab代码:``close all``clear all``clc``img = imread('lpr1.bmp');``R=img(:,:,1);``G=img(:,:,2);``B=img(:,:,3);`` ``figure(1),``subplot(221),imshow(img);``title('img');``subplot(222),imshow(R);``title('R');``subplot(223),imshow(G);``title('G');``subplot(224),imshow(B);``title('B');`` ``RR =(R-G)+(R-B);``GG =(G-R)+(G-B);``BB =(B-R)+(B-G);`` ``figure(2),``subplot(221),imshow(img);``title('img');``subplot(222),imshow(RR);``title('RR');``subplot(223),imshow(GG);``title('GG');``subplot(224),imshow(BB);``title('BB');``", null, "", null, "" ]
[ null, "https://wximg.eefocus.com/forward", null, "https://wximg.eefocus.com/forward", null ]
{"ft_lang_label":"__label__zh","ft_lang_prob":0.5332917,"math_prob":0.99915576,"size":863,"snap":"2021-21-2021-25","text_gpt3_token_len":529,"char_repetition_ratio":0.20023283,"word_repetition_ratio":0.0,"special_character_ratio":0.414832,"punctuation_ratio":0.25751072,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9932579,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-15T01:25:15Z\",\"WARC-Record-ID\":\"<urn:uuid:8daa0027-2319-4578-9ca2-8679a7931757>\",\"Content-Length\":\"106441\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fe108bba-b14a-4e6b-9885-08c1ae1da50e>\",\"WARC-Concurrent-To\":\"<urn:uuid:bc82f611-f257-4b82-9133-742bd5f501a6>\",\"WARC-IP-Address\":\"47.102.135.43\",\"WARC-Target-URI\":\"https://www.eefocus.com/component/492452\",\"WARC-Payload-Digest\":\"sha1:LD3WYRJIHKK45Y2EEQHC5DBR6DR7LK3S\",\"WARC-Block-Digest\":\"sha1:GISZD6XI3FTBSMYERXMYJP6J34GN6LY7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243991812.46_warc_CC-MAIN-20210515004936-20210515034936-00193.warc.gz\"}"}
https://answers.ros.org/question/248476/urdf-continuous-joints-just-slides-down/
[ "# URDF: Continuous joints just slides down [closed]\n\nHi there. I'm using ROS Indigo Gazebo 2.2.6\n\nI'm trying to set up a simple car simulation for gazebo which consists of a box as chassis and 4 cylinders as wheels. Also I would like to implement a node which transform the steering angle for a virtual bicycle model to the steering angles of the two front wheels. For that I tried to implement two perpendicular continuous-joints for the front wheels and one continuous-joint each for the back wheels.\n\nHowever, when I start the simulation the chassis seems not to be fixed to the wheels and the chassis just falls down in the front but stays in place in the back.\n\nHere's the code\n\n<robot name=\"erod_macros\" xmlns:xacro=\"http://www.ros.org/wiki/xacro\">\n\n<xacro:macro name=\"wheel\" params=\"wheelname lr fr steerable\">\n\n<joint name=\"wheel_hinge_${wheelname}\" type=\"${steerable}\">\n<child link=\"wheel_hinge_bearing_${wheelname}\"/> <origin xyz=\"${fr*wheel_base/2} ${lr*track_width/2}${wheel_radius}\" rpy=\"0 0 0\"/>\n<axis xyz=\"0 0 1\" rpy=\"0 0 0\"/>\n</joint>\n\n<link name=\"wheel_hinge_bearing_${wheelname}\"> <collision> <origin xyz=\"0 0 0\" rpy=\"0 0 0\"/> <geometry> <sphere radius=\"${wheel_bearing_radius}\"/>\n</geometry>\n</collision>\n<visual>\n<origin xyz=\"0 0 0\" rpy=\"0 0 0\"/>\n<geometry>\n<sphere radius=\"${wheel_bearing_radius}\"/> radius=\"${wheel_bearing_radius}\"/>\n</geometry>\n</visual>\n<inertial>\n<origin xyz=\"0 0 0\" rpy=\"0 0 0\"/>\n<mass value=\"0.0001\"/>\n<inertia ixx=\"0.0001\" ixy=\"0.0\" ixz=\"0.0\" iyy=\"0.0001\" iyz=\"0.0\" izz=\"0.0001\"/>\n</inertial>\n\n<!-- Joint: HingeWheel -->\n<joint name=\"wheel_axis_${wheelname}\" type=\"continuous\"> <parent link=\"wheel_hinge_bearing_${wheelname}\"/>\n<child link=\"wheel_${wheelname}\"/> <origin xyz=\"0 0 0\" rpy=\"0 0 0\"/> <axis xyz=\"0${lr} 0\" rpy=\"0 0 0\"/>\n</joint>\n\n<!-- Link: Wheel -->\n<link name=\"wheel_${wheelname}\"> <collision> <origin xyz=\"0 0 0\" rpy=\"${Pi/2} 0 0\"/>\n<geometry>\n<cylinder length=\"${wheel_width}\" radius=\"${wheel_radius}\"/>\n</geometry>\n</collision>\n<visual>\n<origin xyz=\"0 0 0\" rpy=\"${Pi/2} 0 0\"/> <geometry> <cylinder length=\"${wheel_width}\" radius=\"${wheel_radius}\"/> </geometry> </visual> <inertial> <origin xyz=\"0 0 0\" rpy=\"${Pi/2} 0 0\"/>\n<mass value=\"${wheel_mass}\"/> <inertia ixx=\"${wheel_I_rr}\" ixy=\"0.0\" ixz=\"0.0\" iyy=\"${wheel_I_yy}\" iyz=\"0.0\" izz=\"${wheel_I_rr}\"/>\n\n</inertial>\n\n<!-- Transmission: Steer the wheel -->\n\n<!-- Transmission: Rotate the wheel -->\n\n\n<gazebo reference=\"wheel_\\${wheelname}\"> <mu1 value=\"200.0\"/> <mu2 value=\"200.0\"/> <material>Gazebo/Black</material> </gazebo>\n\n</xacro:macro>\n\n\n</robot>\n\nedit retag reopen merge delete" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.5274409,"math_prob":0.92981553,"size":2586,"snap":"2022-40-2023-06","text_gpt3_token_len":823,"char_repetition_ratio":0.17002323,"word_repetition_ratio":0.17845118,"special_character_ratio":0.36272234,"punctuation_ratio":0.0817757,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9963359,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-06T00:11:43Z\",\"WARC-Record-ID\":\"<urn:uuid:75573227-c4f3-4ff7-b998-5c388844a1d0>\",\"Content-Length\":\"50403\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2b5ec6da-52d5-459d-b9d6-9521dbdc9901>\",\"WARC-Concurrent-To\":\"<urn:uuid:4eca7341-c307-4ec6-90c3-aa1f9e8aacc4>\",\"WARC-IP-Address\":\"140.211.15.248\",\"WARC-Target-URI\":\"https://answers.ros.org/question/248476/urdf-continuous-joints-just-slides-down/\",\"WARC-Payload-Digest\":\"sha1:LXXBAS424ZDSCZCYLIUJ3O3RCHL2Y7CD\",\"WARC-Block-Digest\":\"sha1:2G5BKPUMAIBZFNOGMOCIHK2KS7R5REOA\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337680.35_warc_CC-MAIN-20221005234659-20221006024659-00164.warc.gz\"}"}
https://es.mathworks.com/matlabcentral/answers/579540-calculating-survival-probabilities-from-mortality-tables-in-matlab
[ "# Calculating survival probabilities from Mortality tables in MATLAB\n\n7 views (last 30 days)\nsusman on 14 Aug 2020\nCommented: susman on 17 Aug 2020\nI am working with mortality tables on MATLAB. My aim is to upload any (Mortality Table) data file in Matlab and calculate survival probabilities.\nI tried to calibrate lifetable using MATLAB program [a,elx] = lifetablefit(x,lx). But I am not able to run the code. Matlab returns,\nUnrecognized function or variable 'x'.\nError in lifetable (line 6) [a,elx] = lifetablefit(x,lx);\nI have attached the datafile and I here is my code.\nopts=detectImportOptions('lifetable2000CM.csv', 'PreserveVariableNames', true) % to locate table and return its import options\ndata = readtable('lifetable2000CM.csv',opts); % I have two variables \"x\" which is age and \"lx\" which is number of survivals at each age\n[a,elx] = lifetablefit(x,lx);\nMATLAB works perfectly fine if I write\nMy aim is to to program any kind of lifetable in MATLAB. If anyone has experience in this area please help me out.\n\nTommy on 14 Aug 2020\n[a,elx] = lifetablefit(data.x, data.lx);\nsusman on 17 Aug 2020\nthat works perfectly thanks :)" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.793894,"math_prob":0.44204098,"size":1385,"snap":"2022-27-2022-33","text_gpt3_token_len":366,"char_repetition_ratio":0.12744388,"word_repetition_ratio":0.0,"special_character_ratio":0.24187726,"punctuation_ratio":0.12307692,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97078496,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-03T04:41:42Z\",\"WARC-Record-ID\":\"<urn:uuid:0cefc902-bcab-4762-9a79-c65207d548c0>\",\"Content-Length\":\"118451\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fa9d816a-d4ef-4977-bb55-b9cbb2a8264d>\",\"WARC-Concurrent-To\":\"<urn:uuid:6e0af97d-8330-4b75-aebe-5716cd7dba18>\",\"WARC-IP-Address\":\"23.36.36.88\",\"WARC-Target-URI\":\"https://es.mathworks.com/matlabcentral/answers/579540-calculating-survival-probabilities-from-mortality-tables-in-matlab\",\"WARC-Payload-Digest\":\"sha1:YYE4QJUVOCVLPDLZJTA4XNE234GAKK3Y\",\"WARC-Block-Digest\":\"sha1:7M3YMZWI7SZPOPZILZWC5TDSHKBAIMNF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104215790.65_warc_CC-MAIN-20220703043548-20220703073548-00383.warc.gz\"}"}
https://www.studypug.com/uk/uk-year10/graph-reciprocals-of-linear-functions
[ "# Graphing reciprocals of linear functions\n\n### Graphing reciprocals of linear functions\n\nWe know that taking the reciprocal of a very large number will grant us a very small number. Conversely, if we take the reciprocal of a very small number, we will obtain a very small number. What will happen if we take the reciprocal of a linear function? In this section, we will learn about the concept behind the reciprocal of a linear function, as well as how to graph it, while following the \"5-steps Approach\" noted below.\n\n#### Lessons\n\nSteps to graph the reciprocal of a function:\n1) Plot a horizontal asymptote\nat\n$y=0$\n2) Plot vertical asymptote(s)\nequate the original function to 0; solve for $x$\n3) Plot y-intercept(s)\n$\\frac{1}{\\text {y-intercept(s) of the original function}}$\n4) Plot invariant points:\nequate the original function to +1 and -1; solve for $x$\n5) Place your pen at the invariant points, then smoothly move away while tracing along the asymptotes!\n• Introduction\nGraph $f(x)= \\frac{1}{x}$\n\n• 1.\nGiven that $f(x)=4x$, graph the reciprocal of function $f(x)$\n\n• 2.\nGiven that $f(x)=x+5$ , graph the reciprocal of function $f(x)$\n\n• 3.\nGiven that $f(x)=2x-1$, graph the reciprocal of the function $f(x)$\n\n• 4.\nGiven that $y= \\frac{1}{2}-5x$ , graph the reciprocal of $y$\n\n• 5.\nGiven that $y=\\frac{1}{3}-\\frac{x}{9}$ , graph the reciprocal of $y$" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.8616337,"math_prob":0.99972767,"size":1447,"snap":"2019-13-2019-22","text_gpt3_token_len":342,"char_repetition_ratio":0.1891892,"word_repetition_ratio":0.51028806,"special_character_ratio":0.22874914,"punctuation_ratio":0.107913665,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999852,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-23T13:08:41Z\",\"WARC-Record-ID\":\"<urn:uuid:f988e0c7-1178-4012-a4d5-3d8e5637389f>\",\"Content-Length\":\"186190\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ef909593-4566-42de-8d6e-1b1c4ec21272>\",\"WARC-Concurrent-To\":\"<urn:uuid:07bab020-cf43-4b4d-b0bd-a99433fb9f39>\",\"WARC-IP-Address\":\"34.200.169.6\",\"WARC-Target-URI\":\"https://www.studypug.com/uk/uk-year10/graph-reciprocals-of-linear-functions\",\"WARC-Payload-Digest\":\"sha1:FWCRWJZ6ZQZGMUKGIVX7N3VWG4XVFM4S\",\"WARC-Block-Digest\":\"sha1:JZ7DPNJRA4TN7VHBVNCJIJCVQFHS6YG5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257244.16_warc_CC-MAIN-20190523123835-20190523145835-00477.warc.gz\"}"}
https://www.adrian.idv.hk/2008-12-22-mori-elephant/
[ "Attacking the elephant and mice phenomenon (the vital few and trivial many rule) in a high speed Internet, try to determine the elephant flows. The elephant flows in this paper is defined as those who consumes more than 0.1% of link bandwidth.\n\nSince the network is high speed, processing every packet is not possible. Sampling is required but it may affect the accuracy of identifying elephants. This paper studies the trade-off.\n\nLet there are $N$ packets traversing the network in a unit time and we sample $n$ of them, so that the sampling frequency is $f=n/N$. Assume for a flow $j$, there are $X_j$ packets and we sampled $Y_j$. The distribution of $Y_j$ is hyper-geometric:\n\nand we can use Bayesian Theorem to obtain:\n\nBecause of the Bayesian Theorem and sampling, there are false positive and false negatives. Experiment tells that, for a small $f$ (~1/10000), the false positive rate is very small (~5%) while the false negative rate could be quite high (~77%).\n\nThe above method requires the knowledge of a priori distribution of flow size, which can be determined by previous stage measurement (empirical distribution) or assuming Pareto (theoretical distribution).\n\n@inproceedings{\n}" ]
[ null ]
{"ft_lang_label":"__label__en","ft_lang_prob":0.90068,"math_prob":0.9955183,"size":1613,"snap":"2019-13-2019-22","text_gpt3_token_len":368,"char_repetition_ratio":0.09384711,"word_repetition_ratio":0.0,"special_character_ratio":0.2200868,"punctuation_ratio":0.108391605,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99773306,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-20T17:19:03Z\",\"WARC-Record-ID\":\"<urn:uuid:cad94525-6bc4-4e9e-b595-d49b97779e1f>\",\"Content-Length\":\"12678\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:0c90aff7-b152-4639-8dba-4051cc7ef3a0>\",\"WARC-Concurrent-To\":\"<urn:uuid:021c9e86-16e4-460b-adc4-65c3d0ab152a>\",\"WARC-IP-Address\":\"185.199.111.153\",\"WARC-Target-URI\":\"https://www.adrian.idv.hk/2008-12-22-mori-elephant/\",\"WARC-Payload-Digest\":\"sha1:XMBQ75RWD6F7UVFBGSEWVQFVUISTGJKA\",\"WARC-Block-Digest\":\"sha1:GPHBC2VLYUXVIM3D4XNLUZ6ON66P4W72\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202450.64_warc_CC-MAIN-20190320170159-20190320192159-00297.warc.gz\"}"}