URL
stringlengths 15
1.68k
| text_list
sequencelengths 1
199
| image_list
sequencelengths 1
199
| metadata
stringlengths 1.19k
3.08k
|
---|---|---|---|
https://www.codespeedy.com/variadic-function-templates-in-cpp/ | [
"# Variadic function templates in C++ with example\n\nIn this tutorial, we will learn what are variadic function templates, its syntax and how to implement it using an example in C++.\n\n## Variadic function templates in C++\n\nTemplates that can accept a variable number of arguments are called variadic templates i.e., they can accept any number of arguments. When these templates are applied on functions these are called variadic function templates.\n\ntemplate <class… t1>\n\nThis type of template allows zero or more arguments. For a template to only allow a positive number of arguments we need to declare it as follows:\ntemplate <class t1, class… t2>\n\nWe generally implement the variadic templates recursively. There isn’t any easy implementation technique to iterate over the values of the variadic template.\n\n### Example of Variadic function templates\n\n```#include <iostream>\nusing namespace std;\n\nvoid my_fun()\n{\ncout << \"Printing is completed.\" << endl;\n}\n\ntemplate <class t1, class... t2>\nvoid my_fun(t1 v1,t2... v2)\n{\ncout << v1 << endl;\nmy_fun(v2...);\n}\n\nint main()\n{\nmy_fun (5, \"Codespeedy\", 9.55, \"Hello\");\nmy_fun (\"Meghana\", 99);\nreturn 0;\n}\n```\n\nIn this example, we implemented the variadic function template along with the concept of function overloading and recursion.\n\nIn main, we first called the function ‘my_fun’ with 4 arguments. This calls the variadic function and v1 contains the value 5 and v2 contains all the remaining values(“Codespeedy”, 9.55, “Hello”). We are printing the value in v1 and calling ‘my_fun’ recursively on v2. For the last recursive call which contains no arguments, the overloaded ‘my_fun’ will be called.\n\nWe observe that every time the variadic function can accept a variable number of arguments. This is the use of variadic function templates in C++.\n\nOutput:\n\n```5\nCodespeedy\n9.55\nHello\nPrinting is completed.\nMeghana\n99\nPrinting is completed.```"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.62535673,"math_prob":0.96906334,"size":2023,"snap":"2021-31-2021-39","text_gpt3_token_len":465,"char_repetition_ratio":0.20455672,"word_repetition_ratio":0.01910828,"special_character_ratio":0.24023727,"punctuation_ratio":0.15053764,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96660143,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-27T12:42:20Z\",\"WARC-Record-ID\":\"<urn:uuid:927309b6-a273-419d-87ec-9b8965c2b0d5>\",\"Content-Length\":\"24720\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9ad4a95a-7009-40e7-ae4d-5e5c0569c13b>\",\"WARC-Concurrent-To\":\"<urn:uuid:24f1fa1a-d542-4a6d-a815-dfe260074c9f>\",\"WARC-IP-Address\":\"173.255.247.200\",\"WARC-Target-URI\":\"https://www.codespeedy.com/variadic-function-templates-in-cpp/\",\"WARC-Payload-Digest\":\"sha1:W7QGLLS2RYKJIEKAFMGKBKVCMU3ITLRF\",\"WARC-Block-Digest\":\"sha1:4XB6HU22RXGIPMKH3GC42RQMVJCFOAKZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153391.5_warc_CC-MAIN-20210727103626-20210727133626-00275.warc.gz\"}"} |
https://www.gradesaver.com/textbooks/science/physics/CLONE-afaf42be-9820-4186-8d76-e738423175bc/chapter-8-exercises-and-problems-page-149/75 | [
"Essential University Physics: Volume 1 (4th Edition) Clone\n\n$1.5\\times10^6\\ km$\nWe know that the location of $L_1$ is about .01 the distance between the earth and the sun away from the earth. We know that the earth is $1.5\\times10^8 \\ m$ away from the sun. Thus, we find that $L_1$ is $1.5\\times10^6\\ km$ away."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93507713,"math_prob":0.9998871,"size":275,"snap":"2019-43-2019-47","text_gpt3_token_len":95,"char_repetition_ratio":0.15867159,"word_repetition_ratio":0.0,"special_character_ratio":0.35636362,"punctuation_ratio":0.11940298,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9717149,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-17T00:02:20Z\",\"WARC-Record-ID\":\"<urn:uuid:626d8679-9163-482e-aa86-28119a419572>\",\"Content-Length\":\"52688\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d67c2b09-80e0-4302-b0eb-538195381294>\",\"WARC-Concurrent-To\":\"<urn:uuid:ae410c75-26cd-4584-acb8-45e7666ecdb5>\",\"WARC-IP-Address\":\"52.87.77.102\",\"WARC-Target-URI\":\"https://www.gradesaver.com/textbooks/science/physics/CLONE-afaf42be-9820-4186-8d76-e738423175bc/chapter-8-exercises-and-problems-page-149/75\",\"WARC-Payload-Digest\":\"sha1:ED7WBSW2L55DK3FFVMEJIN6BRBJ3YXSP\",\"WARC-Block-Digest\":\"sha1:BY7UTSNOL4NLEQAQ5XMJXW5PYROHBGC4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986672431.45_warc_CC-MAIN-20191016235542-20191017023042-00364.warc.gz\"}"} |
https://mulloverthings.com/how-do-you-generate-a-sine-wave-from-pwm/ | [
"MullOverThings\n\nUseful tips for everyday\n\nHow do you generate a sine wave from PWM?\n\nHow do you generate a sine wave from PWM?\n\nGenerating Sine Wave using PWM in PSoC – KBA226852\n\n1. Create a look-up table for the sine wave.\n2. Configure the Timer block to generate periodic interrupts.\n3. Configure the PWM block.\n4. Vary the PWM duty cycle during each timer interrupt.\n5. Use a low pass filter.\n\nCan Arduino generate a sine wave?\n\nWith push buttons, you will be able to choose a waveform shape (sine, triangular, sawtooth, or square) on both DAC channels and change the frequency of the generated signal. Connect power and ground on your breadboard to the Arduino. Pins DAC0 and DAC1 wil generate the waveform.\n\nCan Arduino generate PWM signal?\n\nArduino and PWM The Arduino IDE has a built in function “analogWrite()” which can be used to generate a PWM signal. The frequency of this generated signal for most pins will be about 490Hz and we can give the value from 0-255 using this function. analogWrite(0) means a signal of 0% duty cycle.\n\nCan you use an Arduino as a function generator?\n\nMake sure you use an Arduino with a built-in DAC. If you don’t have one, you can add an external DAC of some sort, which will then generate a true analog output. Furthermore, you should keep in mind that this is a basic function generator. The output can’t go above +5 V, and it also can’t go below zero Volts.\n\nWhat is the formula for a sine wave?\n\nSine Wave. A general form of a sinusoidal wave is y(x,t)=Asin(kx−ωt+ϕ) y ( x , t ) = A sin ( kx − ω t + ϕ ) , where A is the amplitude of the wave, ω is the wave’s angular frequency, k is the wavenumber, and ϕ is the phase of the sine wave given in radians.\n\nHow do you create a waveform?\n\nGamry Instruments uses two different methods to generate a waveform depending on the frequency range. A direct digital synthesizer (DDS) sine wave generator is used to generate high‑frequency signals. A digital-to-analog converter (DAC) is used for low‑frequency signals.\n\nWhat is Arduino PWM?\n\nPulse Width Modulation, or PWM, is a technique for getting analog results with digital means. Digital control is used to create a square wave, a signal switched between on and off. In other words, with Arduino’s PWM frequency at about 500Hz, the green lines would measure 2 milliseconds each.\n\nHow fast is Arduino PWM?\n\nOn the Arduino Duemilanove, these values yield: Output A frequency: 16 MHz / 64 / (180+1) / 2 = 690.6Hz. Output A duty cycle: 50% Output B frequency: 16 MHz / 64 / (180+1) = 1381.2Hz.\n\nIs PWM analog or digital?\n\nPulse Width Modulation, or PWM, is a technique for getting analog results with digital means. Digital control is used to create a square wave, a signal switched between on and off.\n\nHow does a function generator work?\n\nSimple function generators usually generate triangular waveform whose frequency can be controlled smoothly as well as in steps. This triangular wave is used as the basis for all of its other outputs. The triangular wave is generated by repeatedly charging and discharging a capacitor from a constant current source.\n\nDo servers need sine wave UPS?\n\nIf you are protecting servers, you should really always use a true sine wave UPS. True sine wave models almost always fall into the line-interactive category. That means the UPS is also protecting against prolonged voltage voltage problems like brownouts that can burn up your power supplies.\n\nHow to create a sine wave with Arduino Due?\n\nI’ve been trying to create a sine wave using the pwm function of the Arduino DUE. The sine wave has te be at higher rates than the analogWrite () function can handle, so I’ve been using the native capabilties of the SAM3X8E. To test it, instead of creating sinus I’ve been doing it linear.\n\nCan a PWM signal make a sine wave?\n\nBut alas poor Yorick, there is a way and its called PWM. So above we have a 31khz pwm signal that is being used to generate a sine wave. Through the wonders of mathematics and other nerd endeavours that PWM signal can be used to make sine waves, in my case a 600hz sine wave.\n\nHow is duty cycle set in Sine PWM?\n\nVia analogWrite. The value passed to analogWrite is used to set the duty-cycle of the PWM. That duty cycle is the analog of the signal value for PWM, just as voltage is the analog of the signal value with a DAC pin. I still cant get it.\n\nHow to make an Arduino based SPWM circuit?\n\nIn the next post I’ll explain how to use the above Arduino based SPWM generator to make a pure sinewave inverter circuit ….keep reading! This code was based on Swagatam SPWM code with changes made to remove errors. Use this code as you would use any other Swagatam’s works.\n\nThere are five steps involved in this design:\n\n1. Create a look-up table for the sine wave.\n2. Configure the Timer block to generate periodic interrupts.\n3. Configure the PWM block.\n4. Vary the PWM duty cycle during each timer interrupt.\n5. Use a low pass filter.\n\nWhat is sine PWM?\n\nSinusoidal PWM is a type of “carrier-based” pulse width modulation. In sinusoidal PWM, the modulation signal is sinusoidal, with the peak of the modulating signal always less than the peak of the carrier signal. Sinusoidal PWM inverter leg and line-line voltages are illustrated below.\n\nAre all UPS pure sine wave?\n\nWhen a UPS system receives power and frequency from the AC line that is within an acceptable range, it will not do anything to correct it. The incoming utility power is typically a pure sine wave and this is what connected equipment expect.\n\nWhat are the types of PWM techniques?\n\nThe different PWM techniques are Single pulse width modulation, Multiple pulse width modulation, Phase displacement control, Sinusoidal pulse width modulation, Harmonic Injection modulation, Space Vector pulse width modulation, Hysteresis (Delta) pulse width modulation, Selective Harmonic Elimination and Current …\n\nHow is a PWM signal converted to a sine wave signal?\n\nIf this voltage needs to be boosted from the DC source, it can be accomplished either before the AC stage by using a DC-DC boost converter, or after the AC stage by using a boost transformer. The inverted signal itself is composed of a pulse-width-modulated (PWM) signal which encodes a sine wave.\n\nHow many times does a sine wave need to be filtered?\n\nThe waveform below shows the sine PWM signal (top – red) and the filtered result. In this case the PWM frequency is a little under 40 times the desired sine wave frequency. Doing the same thing with a DAC produces a similar result but with the pre-filtered output looking a little different: Another method is simply to filter a square wave.\n\nWhich is the most common pure sine wave generation technique?\n\nPWM 2-Level PWM. The most common and popular technique of digital pure-sine wave generation is pulse-width- modulation (PWM). The PWM technique involves generation of a digital waveform, for which the duty- cycle is modulated such that the average voltage of the waveform corresponds to a pure sine wave.\n\nHow does a microcontroller generate a sine wave?\n\nA typical situation would be where you need a sine wave based on a precision frequency generated by a microcontroller, CPLD or FPGA. In that case you would presumably have a square wave and need to generate your sine wave from that."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.86846536,"math_prob":0.920411,"size":8053,"snap":"2022-05-2022-21","text_gpt3_token_len":1828,"char_repetition_ratio":0.16523792,"word_repetition_ratio":0.19560741,"special_character_ratio":0.22823793,"punctuation_ratio":0.10055866,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9822689,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-24T23:40:05Z\",\"WARC-Record-ID\":\"<urn:uuid:bf1dc9f7-4d65-4dd2-9dfb-d264a37fbb1e>\",\"Content-Length\":\"33270\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:658c1eb6-0ce5-4e74-b7d0-e3528649fb05>\",\"WARC-Concurrent-To\":\"<urn:uuid:9499aa27-0367-420e-b6cd-0332b39ac726>\",\"WARC-IP-Address\":\"49.12.116.136\",\"WARC-Target-URI\":\"https://mulloverthings.com/how-do-you-generate-a-sine-wave-from-pwm/\",\"WARC-Payload-Digest\":\"sha1:YOPPEIIA7CGTKMOQBT53UHFEMOEBLJDI\",\"WARC-Block-Digest\":\"sha1:DEQU2GIIHOQVWUVHVNI56NWNROW4IJRZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320304686.15_warc_CC-MAIN-20220124220008-20220125010008-00156.warc.gz\"}"} |
https://physics.stackexchange.com/questions/296960/what-physics-is-contained-in-vertex-corrections | [
"# What physics is contained in vertex corrections?\n\nIf one looks at the interaction of light and a non-zero density of electrons, one can calculate the polarizability $\\Pi(q,\\omega)$ (which is the 00-th component of the dressed photon propagator). This object is related to the dielectric function as $\\epsilon(q,\\omega) = 1 - V(q)\\Pi(q,\\omega)$, where $V(q)$ is the Coulomb potential between the electrons in Fourier space.\n\nThe dielectric function contains a lot of physics: by looking at the zeros of the homogeneous dielectric function you can find the plasma frequency and by looking at the static limit you can find the screening length.\n\nAre there similar \"easy-to-understand\" physical results one can derive from vertex corrections? And what do the real and imaginary part of a particular vertex correction tell us?\n\nThe vertex function contains information about:\n\n• The existence of bounded states & their spectrum\n• Effective interactions in the theory\n• Scattering amplitudes in the theory\n\nTo illustrate these statements, let us consider the interaction $$U(r_1-r_2,t_1-t_2)$$ between two particles and solve the respective Bethe-Salpeter equation. First, consider the interaction $$U(r_1-r_2)\\delta(t_1-t_2)$$, so that the interaction is instantaneous. The equation for the vertex function then is $$K_{12,34}=(2\\pi)^8\\delta_{p1p3}\\delta_{p_2p_4}G_0^{(1)}(p_1)G_0^{(2)}(p_2)+G_0^{(1)}(p_1)G_0^{(2)}(p_2)G_0^{(1)}(p_3)G_0^{(2)}(p_4)i\\Gamma_{p_1p_2p_3p_4}(2\\pi)^4\\delta_{p_1+p_2,p_3+p_4},$$ where $$K_{12,34}$$ is the two-particle Green function and upper indices denote particles. Then, you can write down the Bethe-Salpeter equation and extract the irreducible vertex part $$\\Gamma_0$$. In case of instantaneous interaction, $$U(\\omega,k)=U(k)$$. The first order diagram for the irreducible vertex part is zero, $$\\int d\\omega G_0^{(1)}(\\epsilon_1-\\omega)G_0^{(2)}(\\epsilon_2-\\omega)=0,$$ because poles of both Green functions, $$\\omega_1=\\epsilon_1-\\frac{p_{1+}^2}{2m}+i\\delta,\\omega_1=\\epsilon_2-\\frac{p_{2-}^2}{2m}+i\\delta$$ are in the upper half-plane. Then, you can show that all the diagrams with crossing lines go to zero. At second order, the irreducible vertex function is just $$\\Gamma_0(p_1,p_2,p_1+q,p_2-q)=U(q).$$ Then, you can notice that the vertex function does not depend on frequency $$\\omega$$. Therefore, all dependence on frequency comes from the Green functions, $$i\\int\\frac{d\\omega}{2\\pi}G_0^{(1)}(\\epsilon_1-\\omega)G_0^{(2)}(\\epsilon+\\omega)=\\frac{1}{\\epsilon_1+\\epsilon_2-p_{1+}^2/2m_1-p_{2-}^2/2m+i0},$$ where $$p_{i\\pm}=p_i\\pm k$$. The denominator can be simplified by introducing CM energy and relative motion energy, $$\\frac{p^2}{2m_1}+\\frac{(p')^2}{2m_2}=\\frac{P^2}{2M}+\\frac{p_{\\text{rel}}^2}{2\\mu},P=p+p',p_{\\text{rel}}=\\frac{m_2p-m_1p'}{m_1+m_2}.$$ These manipulation give the following form of the Bethe-Salpeter equation, $$\\boxed{\\Gamma(k,k')=U(k-k')+\\int\\frac{d^3q}{(2\\pi)^3}\\frac{U(k-q)\\Gamma(p,k')}{\\Omega_0-q^2/(2\\mu)+i0},}$$ where $$\\mu=m_1m_2/(m_1+m_2)$$, $$\\Omega_0=\\Omega-P^2/(2m)$$, $$M=m_1+m_2$$, $$\\Omega=\\omega_1+\\omega_2=\\omega_3+\\omega_4$$. So, you see that there is a bounded state with mass $$M=2m$$ with dispersion law $$P^2/(2M)$$.\n\nYou can consider the structure of the vertex function in a theory with a 4-fermion contact attractive interaction and see that in this theory the vertex function has a pole. The existence of such poles corresponds to the Cooper instability and it signals that one should carefully choose the ground state of theory to develop perturbation theory.\n\nThen, your statement about polarization operator and screening length in plasma relates to the structure of the vertex function, too. As you know, one should sum all the diagrams with 1-loop insertions. You can also see that a bubble is included into the vertex function. The vertex function is $$\\Gamma_{12}(k,\\omega_m)=\\frac{4\\pi e^2Z_1Z_2}{k^2\\left[1-\\frac{4\\pi e^2}{k^2}(\\Pi_e(k,\\omega_m)+Z^2\\Pi_i(k,\\omega_m))\\right]},$$ where $$\\Pi_e$$ & $$\\Pi_i$$ are polarization operators of electrons and ions. Straightforward calculation yields $$\\Gamma_{12}=\\frac{4\\pi e^2Z_1Z_2}{k^2+\\kappa_i^2},$$ where $$\\kappa_i$$ is the ion screening length.\n\nBut you should distinguish between the polarization operator $$\\Pi$$ and the vertex function $$\\Gamma$$. The polarization operator comes from self-energy, which is the one-particle irreducible diagram and the vertex function is related to the two-particle irreducible diagrams. In case of Debye screening in plasma we can consider the renormalization of the \"interaction propagator\" by bubble series or we can consider 4-fermion process, which describes two-fermion scattering via renormalized (=\"bubbled\" propagator). In other words, you consider propagator renormalization and then say that this renormalized propagator modifies interaction or you can consider interaction renormalization with a vertex function.\n\nIn the case of superconductivity:\n\nTo emphasize mentioned facts, here are three diagrams (I am lazy to draw them, sorry)",
null,
"and the entire question is about the singularities of these diagrams. All the singularities comes from the poles of the Green functions in loops. Indeed, to perform integration over energy, you should use an appropriate contour, but external momenta can pinch this contour and the singularity appears. You can show that for the first diagram (from left to right) a singularity appears for $$p_1+p_2\\approx 0$$, for the second and third, $$p_2-p_1-k\\approx 0$$ and $$k\\approx 0$$, respectively. The last diagram defines Fermi liquid theory, whereas the first diagram corresponds to the Cooper instability. The second diagram is \"rare\".\n\nTo conclude, I would like to emphasize:\n\n1. the vertex function defines effective interaction in the theory\n2. vertex function shows the existence of bounded states in theory\n\nThe case of vertex functions in condensed matter is more interesting than in QED. For QED, we define the vertex function via a four-point correlator, $$K_{ik,lm}=\\langle T\\psi_{i1}\\psi_{k2}\\bar{\\psi}_{l3}\\bar{\\psi}_{m4}\\rangle$$ and can easily consider this correlator in momentum representation. It is worth mentioning that one should also take into account all the loop corrections. From the structure of this correlator, you can extract the reducible part,",
null,
"which just gives the exact propagator of two particles without scattering. The last term is more interesting and represents the irreducible part. Finally, you can see that $$i\\mathcal{M}_{fi}=\\bar{u}_i(p_3)\\bar{u}_k(p_4)\\left[-ie\\Gamma_{ik,lm}(p_3,p_4;p_1,p_2)\\right]u_l(p_1)u_m(p_2),$$ where $$i\\mathcal{M}_{fi}$$ is exactly the scattering amplitude. The next picture is the 4-point correlator for fermions,",
null,
"and in the non-crossing case (for instance, in superconductivity theory) the vertex function becomes",
null,
"• Would you not get that same information if you took the normal dielectric function to give the effective interaction (i.e. $V_{eff}(q,\\nu)=\\frac{V(q)}{\\epsilon(q,\\nu)}$)? Or in general any two point Green function would give the bound state. Does the vertex function give more information? – KF Gauss Feb 24 '20 at 8:33\n• @KFGauss , I assume that you have misprint: only two-particle (=four-point) Green function gives info about bounded state. Of course, in case of Debye screening, one can consider 1-loop without external legs because bubbles just modify \"interaction propagator\". But for nonideal Bose gas (for instance) and mentioned example of two particle interaction you easily see that vertex function is effective interaction. – Artem Alexandrov Feb 24 '20 at 9:03\n• @KFGauss vertex function also contains info about scattering amplitude, it is straightforward to see from the expression in box from my answer. For instance, for two-fermion scattering you can show that $\\Gamma \\sim 4\\pi f/m$, where $f$ is scattering amplitude – Artem Alexandrov Feb 24 '20 at 9:06\n• I meant two particle Green Function. Are you saying then that $\\Pi$, the 2 particle irreducible as defined in the question, contains basically the same things that you can learn as the vertex function $\\Gamma$? – KF Gauss Feb 24 '20 at 9:13\n• @KFGauss , roughly speaking yes. But you mix two different things: self-energy which is one-particle irreducible diagram and vertex function which is two-particle irreducible. In the context of effective interaction and in case where interaction modifies due to renormalization of \"interaction propagator\" both ways are the same – Artem Alexandrov Feb 24 '20 at 9:29"
] | [
null,
"https://i.stack.imgur.com/Fk9dY.jpg",
null,
"https://i.stack.imgur.com/L4F1i.png",
null,
"https://i.stack.imgur.com/l9WZE.png",
null,
"https://i.stack.imgur.com/7xx9y.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7843217,"math_prob":0.9984211,"size":5930,"snap":"2021-04-2021-17","text_gpt3_token_len":1759,"char_repetition_ratio":0.13904826,"word_repetition_ratio":0.002805049,"special_character_ratio":0.28600338,"punctuation_ratio":0.097385034,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99990046,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-27T01:58:51Z\",\"WARC-Record-ID\":\"<urn:uuid:fd0ef1df-ed2e-48d0-af4f-c4934d75ed1d>\",\"Content-Length\":\"162240\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b4d04c37-2e0f-42ae-bb5a-28eabed74eb9>\",\"WARC-Concurrent-To\":\"<urn:uuid:6514c47f-7455-40bc-beba-e1e005bfabe0>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://physics.stackexchange.com/questions/296960/what-physics-is-contained-in-vertex-corrections\",\"WARC-Payload-Digest\":\"sha1:6J7TMO4TZX2GHL4TDEVNFBS7VBFYPDKI\",\"WARC-Block-Digest\":\"sha1:XFDDMSMP5GAGOW2BF2VAPJKRYMKEFQAD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610704804187.81_warc_CC-MAIN-20210126233034-20210127023034-00325.warc.gz\"}"} |
https://kolazzing.com/entry/Contrastive-Loss-similarity-metric-face-verification-200506 | [
"Seize the moment/Paper Research\n\n# Contrastive Loss (similarity metric / face verification / 2005.06)\n\n2023. 3. 13.\n\n## Paper\n\n• Learning a similarity metric discriminatively, with application to face verification\n• Sumit Chopra (2005.06 / NYU)\n• PDF / Github 없음\n\n### Points\n\n• Recognition, Verification 문제에 method for training a similarity metric from data를 제시함.\n• similar and dissimilar한 포인트 두 개로 계산한 loss라고 하여 contrastive loss라는 말이 처음 유래함.\n• L1 norm을 사용하여 semantic distance를 측정하고, input patterns into a target space 함.\n\n### Abstract\n\n• L1 사용하여서 semantic distance 도출했음. 보통은 L2를 쓰기 때문에 특이점이었음.\n• L1을 사용하면 특징추출이 더 잘됨. 그래서 사람얼굴을 classification하는 과제에 있어 더 적은 데이터로도 98.5프로의 정확성을 보여줄 수 있었음.\n\nThe authors used L1 norm in the target space because it approximates semantic distance better than L2. The idea is to learn a function that maps input patterns into a target space such that the L1 norm in the target space approximates \"semantic\" distance in the input space, which leads to improved performance on face verification tasks with large numbers of categories and small training samples per category.\n\n### Dataset\n\n1. AT&T Database of Faces: This dataset consists of 400 images from 40 subjects, with each subject having ten frontal face images taken under varying lighting conditions.\n\n2. AR and Feret Databases: The second set of training and testing was performed by combining the AR database created at Purdue University (which contains over 3,500 facial images) with a subset of grayscale Feret database containing more than one thousand faces.\n\n### Model\n\n• 비공개라 자세한 확인은 어려웠음\n• (CNN - Dense - Batch norm - max pooling) * 5 + (Dense w/ L1 regularlization) * 2 이라고 추정되는데,, 과연 BN을 Dense 뒤에 썼을까 싶다.\n• CNN filter num : 16 >> 512 // kernel size : 7 > 2\n\nThe paper does not provide the model.summary() function output. However, it describes the architecture of their proposed method which includes a convolutional neural network (CNN) followed by a fully connected layer and an L1 normalization layer to produce feature vectors for face verification task. Their CNN consists of 5 convolutional layers with max-pooling in between each pair, followed by two fully-connected layers before producing final embeddings using L1-normalization. The number of filters used in these convolutions increases from 16 to 512 while kernel size decreases from [7x7] to [2x2]. Additionally, they use batch normalization after every activation except last one as well as dropout regularization during training process\n\n### Activation Function\n\n• ReLU & Leaky ReLU\n• Normalization : : y = γ * ((x - μ)/σ ) + β\n\nThe paper uses the Rectified Linear Unit (ReLU) activation function, which is defined as: f(x)=max(0,x) where x represents input to a neuron and f(.) denotes its output. Additionally, they use Leaky ReLU in some of their experiments with α=0.1 where it's defined as: f(x)=x if x> 0 α*x otherwise Here, alpha (α) is a small constant that determines how much negative values are allowed through. Finally, for normalization purposes during training process batch-normalization technique was used whose formula can be written as follows: y = γ * ((x - μ)/σ ) + β Where y represents normalized activations; gamma(γ), beta(β), mean value(mu or µ ), standard deviation(sigma or σ ) were learned parameters per channel over each mini-batch samples respectively.\n\n### Loss Function (Contrastive Loss)\n\n• L = Contrastive Loss function\n• Y = 한 쌍의 얼굴사진이 같은 class면 0, 아니면 1\n• D = 두 점 feature vector간의 embedded distance\n• m = 유사하지 않은 쌍이 최소한으로 떨어져있어야 하는 마진\n• max(0,x)가 ReLU인데, 이렇게 들어가면, 유사하지 않은 쌍일때, 즉 Y=1이면, 결국 Y * max(0, m - D)^2 만 남게 되므로, 그 거리를 max로 멀게 하겠다는 뜻.\n\nL = (1-Y) * D^2 + Y * max(0, m - D)^2\n\nwhere L represents the value of the contrastive loss function, Y denotes whether a pair belongs to same class or not (Y=0 if they belong to same class and 1 otherwise), D is distance between two feature vectors in embedded space and 'm' refers to margin which controls how far apart dissimilar pairs should be. As for code implementation, it depends on what deep learning framework you are using. However, most frameworks such as Keras provide built-in functions that can calculate this type of custom loss during training process. Here's an example code snippet written in Python/Keras: ```\n\n``````(관련수식)\nimport keras.backend as K\ndef contrastive_loss(y_true,y_pred):\nmargin = 1 # set your own desired margin here\nsquare_pred = K.square(y_pred)\nsquared_margin_diff = K.square(K.maximum(margin-y_pred))\nreturn y_true*square_pred+(1-y_true)*squared_margin_diff\n\n------------------------------------------------------------------------\n(쉽게쓰는법)\nfrom tensorflow.keras import backend as K\nfrom tensorflow.keras.losses import Loss\n\nclass ContrastiveLoss(Loss):\ndef __init__(self, margin=1.0, **kwargs):\nsuper(ContrastiveLoss, self).__init__(**kwargs)\nself.margin = margin\n\ndef call(self, y_true, y_pred):\nsquare_pred = K.square(y_pred)\nsquared_margin_diff = K.square(K.maximum(self.margin - y_pred, 0))\nloss = K.mean(y_true * square_pred + (1 - y_true) * squared_margin_diff)\nreturn loss\n\nThis will define a new custom `contrastive_loss` function that takes true labels (`y_true`) and predicted values (`y_preds`) from model output layer as inputs while returning calculated losses based on above mentioned equation.\n\n### Results\n\n• test로 Purdue/AR Face Data를 썼을 때, 98.5% 였음.\n• 하지만 한계가 있음. 밑에서 보충.\n\nThe paper reports the accuracy of their proposed method on a face verification task using Purdue/AR Face Database. They achieved an overall accuracy of 98.5% which is quite high considering the large degree of variability in pose, lighting, expression and occlusions present in this dataset. It's important to note that performance can vary depending on factors such as choice of hyperparameters (e.g., margin value), size/composition of training data etc. However, these results demonstrate that their approach has potential for real-world applications where robustness to variations is critical.\n\n### Why this paper is famous for its use of contrastive loss?\n\n• 같은얼굴 조금의 데이터를 다른얼굴 여러 데이터에서 잘 분석해 내었음.\n• similar한 것과 dissimiliar 한 것을 통해 feature를 학습하였다 해서 contrastive 라는 말이 유래됨.\n\nIt used the contrastive loss which drives the similarity metric to be small for pairs of faces from the same person and large for pairs from different persons. The name \"contrastive\" comes from this idea that it contrasts between similar and dissimilar samples in order to learn a better feature representation. The authors chose this particular type of loss because they were working with face verification tasks where there are only two classes (same or different) instead of multiple categories as seen in traditional classification problems. Additionally, their method was designed specifically to handle cases where training data has very few examples per class making other methods such as softmax-based cross-entropy less effective. Overall, using contrastive loss allowed them to train an embedding model that could produce compact yet discriminative representations suitable for recognition/verification applications even when dealing with limited amounts of labeled data.\n\n## Limitation\n\n• 얼굴인식에만 대한 결과라서 범용성을 체크해봐야 함. The proposed method is evaluated only on face verification task, and its performance may vary for other recognition or classification tasks.\n• 데이터 자체가 연구실에서 컨트롤링 한 것이기 때문에 현실성이 떨어질 수 있음. Although the AR Dataset used in testing has a high degree of variability, it still consists mostly of controlled images captured under laboratory conditions. Therefore, the generalization ability to real-world scenarios with uncontrolled variations such as occlusions or disguises remains unclear.\n• 데이터의 일부라고 해도 라벨링 하긴 해야해서 비용이 많이 듬. While Siamese networks have been shown effective for learning similarity metrics from small datasets, their training can be computationally expensive due to pairwise comparisons between all samples during each iteration. This limits scalability when dealing with large-scale datasets containing millions/billions/trillions examples.\n\n728x90\n반응형\n\n#### 'Seize the moment > Paper Research' 카테고리의 다른 글\n\nCLEP) Exploiting Negative Preference in Content-based MusicRecommendation with Contrastive Learning (2022.07) (0) 2023.03.22 2023.03.16 2023.03.15 2023.03.15 2023.03.10"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8340884,"math_prob":0.85487807,"size":8368,"snap":"2023-40-2023-50","text_gpt3_token_len":2234,"char_repetition_ratio":0.10808226,"word_repetition_ratio":0.020249221,"special_character_ratio":0.23589866,"punctuation_ratio":0.10558583,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.986978,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-22T08:47:25Z\",\"WARC-Record-ID\":\"<urn:uuid:800aa017-5bae-43f0-b2d3-c1bef3dd2f69>\",\"Content-Length\":\"54297\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bcdd6d37-62c1-40d0-b11b-67ac610ff9bb>\",\"WARC-Concurrent-To\":\"<urn:uuid:8ad8ae3a-4799-4de0-9016-6037ad7fa5e8>\",\"WARC-IP-Address\":\"211.249.222.34\",\"WARC-Target-URI\":\"https://kolazzing.com/entry/Contrastive-Loss-similarity-metric-face-verification-200506\",\"WARC-Payload-Digest\":\"sha1:Q3MOKSDECXNOOJCFNE7YWCMNBL2ZOCDQ\",\"WARC-Block-Digest\":\"sha1:3JATCR4XTTEVXJ6K5WLOENM6K3PT5PEP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233506339.10_warc_CC-MAIN-20230922070214-20230922100214-00189.warc.gz\"}"} |
https://socratic.org/questions/a-chemical-reaction-occurring-in-a-cylinder-equipped-with-a-moveable-piston-prod | [
"# A chemical reaction occurring in a cylinder equipped with a moveable piston produces 0.58 mol of a gaseous product. If the cylinder contained 0.11 mol of gas before the reaction and had an initial volume of 2.1L, what was its volume after the reaction?\n\nMay 21, 2015\n\nThe new volume of the cylinder will be equal to 13 L.\n\nWhen no mention of pressure or temperature is made, you can assume that they are kept constant. This means that you can use Avogadro's Law to determine what the new volume of the cylinder will be.\n\nAccording to Avogadro's Law, the volume of a gas is directly proportional to the number of moles of gas present, when temperature and pressure are kept constant.\n\nIn other words, the bigger the number of moles of gas present, the bigger the volume. Think about blowing up a balloon. The more you put into it, the bigger its volume gets.",
null,
"Mathematically, this relationship is expressed like this\n\n${V}_{1} / {n}_{1} = {V}_{2} / {n}_{2}$, where\n\n${V}_{1}$,${n}_{1}$ - the volume of the cylinder and the number of moles at an initial state;\n${V}_{2}$, ${n}_{2}$ - the volume of the cylinder and the number of moles at a final state.\n\nYou know that your reaction produces 0.58 moles of gas, and that 0.11 moles of gas were already in the cylinder. This means that the total number of moles present in the cylinder after the reaction is completed will be\n\n${n}_{\\text{total\" = n_\"initial\" + n_\"produced}}$\n\n${n}_{\\text{total\" = 0.11 + 0.58 = \"0.69 moles}}$\n\nUse the above equation to solve for ${V}_{2}$\n\n${V}_{1} / {n}_{1} = {V}_{2} / {n}_{2} \\implies {V}_{2} = {n}_{2} / {n}_{1} \\cdot {V}_{1}$\n\nV_2 = (0.69cancel(\"moles\"))/(0.11cancel(\"moles\")) * \"2.1 L\" = \"13.17 L\"\n\nRounded to two sig figs, the answer will be\n\n${V}_{2} = \\textcolor{g r e e n}{\\text{13 L}}$"
] | [
null,
"https://d2jmvrsizmvf4x.cloudfront.net/MQJpXG8NR7KTBtLCXYRk_dUEGWAf4qTgm.3V-AtstTA_m.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9342817,"math_prob":0.99908113,"size":1253,"snap":"2019-51-2020-05","text_gpt3_token_len":285,"char_repetition_ratio":0.13771017,"word_repetition_ratio":0.045454547,"special_character_ratio":0.21308859,"punctuation_ratio":0.098425195,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99940586,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-24T08:10:49Z\",\"WARC-Record-ID\":\"<urn:uuid:d3a8e2c5-ca7a-4fdb-acd0-ba9d457285c0>\",\"Content-Length\":\"37576\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e60463bd-0b15-4732-afc9-c08bb028acb3>\",\"WARC-Concurrent-To\":\"<urn:uuid:6de66fc9-c745-4246-bd28-4632ef07d992>\",\"WARC-IP-Address\":\"54.221.217.175\",\"WARC-Target-URI\":\"https://socratic.org/questions/a-chemical-reaction-occurring-in-a-cylinder-equipped-with-a-moveable-piston-prod\",\"WARC-Payload-Digest\":\"sha1:3DLEIM7WAILVEZYSCUPWIT6IVPXLURAK\",\"WARC-Block-Digest\":\"sha1:FNCRBVZNHMZOPVHJAAAXFOHZHCBRNHK4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250616186.38_warc_CC-MAIN-20200124070934-20200124095934-00394.warc.gz\"}"} |
https://www.colorhexa.com/0137e1 | [
"# #0137e1 Color Information\n\nIn a RGB color space, hex #0137e1 is composed of 0.4% red, 21.6% green and 88.2% blue. Whereas in a CMYK color space, it is composed of 99.6% cyan, 75.6% magenta, 0% yellow and 11.8% black. It has a hue angle of 225.5 degrees, a saturation of 99.1% and a lightness of 44.3%. #0137e1 color hex could be obtained by blending #026eff with #0000c3. Closest websafe color is: #0033cc.\n\n• R 0\n• G 22\n• B 88\nRGB color chart\n• C 100\n• M 76\n• Y 0\n• K 12\nCMYK color chart\n\n#0137e1 color description : Vivid blue.\n\n# #0137e1 Color Conversion\n\nThe hexadecimal color #0137e1 has RGB values of R:1, G:55, B:225 and CMYK values of C:1, M:0.76, Y:0, K:0.12. Its decimal value is 79841.\n\nHex triplet RGB Decimal 0137e1 `#0137e1` 1, 55, 225 `rgb(1,55,225)` 0.4, 21.6, 88.2 `rgb(0.4%,21.6%,88.2%)` 100, 76, 0, 12 225.5°, 99.1, 44.3 `hsl(225.5,99.1%,44.3%)` 225.5°, 99.6, 88.2 0033cc `#0033cc`\nCIE-LAB 34.342, 53.008, -87.461 14.967, 8.174, 72.019 0.157, 0.086, 8.174 34.342, 102.27, 301.219 34.342, -12.746, -116.215 28.59, 43.411, -129.34 00000001, 00110111, 11100001\n\n# Color Schemes with #0137e1\n\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #e1ab01\n``#e1ab01` `rgb(225,171,1)``\nComplementary Color\n• #01a7e1\n``#01a7e1` `rgb(1,167,225)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #3b01e1\n``#3b01e1` `rgb(59,1,225)``\nAnalogous Color\n• #a7e101\n``#a7e101` `rgb(167,225,1)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #e13b01\n``#e13b01` `rgb(225,59,1)``\nSplit Complementary Color\n• #37e101\n``#37e101` `rgb(55,225,1)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #e10137\n``#e10137` `rgb(225,1,55)``\n• #01e1ab\n``#01e1ab` `rgb(1,225,171)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #e10137\n``#e10137` `rgb(225,1,55)``\n• #e1ab01\n``#e1ab01` `rgb(225,171,1)``\n• #012495\n``#012495` `rgb(1,36,149)``\n• #012bae\n``#012bae` `rgb(1,43,174)``\n• #0131c8\n``#0131c8` `rgb(1,49,200)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #013dfa\n``#013dfa` `rgb(1,61,250)``\n• #174ffe\n``#174ffe` `rgb(23,79,254)``\n• #3062fe\n``#3062fe` `rgb(48,98,254)``\nMonochromatic Color\n\n# Alternatives to #0137e1\n\nBelow, you can see some colors close to #0137e1. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #016fe1\n``#016fe1` `rgb(1,111,225)``\n• #015ce1\n``#015ce1` `rgb(1,92,225)``\n• #014ae1\n``#014ae1` `rgb(1,74,225)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #0124e1\n``#0124e1` `rgb(1,36,225)``\n• #0112e1\n``#0112e1` `rgb(1,18,225)``\n• #0301e1\n``#0301e1` `rgb(3,1,225)``\nSimilar Colors\n\n# #0137e1 Preview\n\nThis text has a font color of #0137e1.\n\n``<span style=\"color:#0137e1;\">Text here</span>``\n#0137e1 background color\n\nThis paragraph has a background color of #0137e1.\n\n``<p style=\"background-color:#0137e1;\">Content here</p>``\n#0137e1 border color\n\nThis element has a border color of #0137e1.\n\n``<div style=\"border:1px solid #0137e1;\">Content here</div>``\nCSS codes\n``.text {color:#0137e1;}``\n``.background {background-color:#0137e1;}``\n``.border {border:1px solid #0137e1;}``\n\n# Shades and Tints of #0137e1\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #00020a is the darkest color, while #f6f8ff is the lightest one.\n\n• #00020a\n``#00020a` `rgb(0,2,10)``\n• #00071e\n``#00071e` `rgb(0,7,30)``\n• #000c31\n``#000c31` `rgb(0,12,49)``\n• #001145\n``#001145` `rgb(0,17,69)``\n• #001658\n``#001658` `rgb(0,22,88)``\n• #001a6c\n``#001a6c` `rgb(0,26,108)``\n• #011f7f\n``#011f7f` `rgb(1,31,127)``\n• #012493\n``#012493` `rgb(1,36,147)``\n• #0129a6\n``#0129a6` `rgb(1,41,166)``\n• #012dba\n``#012dba` `rgb(1,45,186)``\n• #0132cd\n``#0132cd` `rgb(1,50,205)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\n• #013cf5\n``#013cf5` `rgb(1,60,245)``\n• #0b46fe\n``#0b46fe` `rgb(11,70,254)``\n• #1f55fe\n``#1f55fe` `rgb(31,85,254)``\n• #3263fe\n``#3263fe` `rgb(50,99,254)``\n• #4672fe\n``#4672fe` `rgb(70,114,254)``\n• #5981fe\n``#5981fe` `rgb(89,129,254)``\n• #6d90fe\n``#6d90fe` `rgb(109,144,254)``\n• #809ffe\n``#809ffe` `rgb(128,159,254)``\n• #94aeff\n``#94aeff` `rgb(148,174,255)``\n• #a8bdff\n``#a8bdff` `rgb(168,189,255)``\n• #bbcbff\n``#bbcbff` `rgb(187,203,255)``\n• #cfdaff\n``#cfdaff` `rgb(207,218,255)``\n• #e2e9ff\n``#e2e9ff` `rgb(226,233,255)``\n• #f6f8ff\n``#f6f8ff` `rgb(246,248,255)``\nTint Color Variation\n\n# Tones of #0137e1\n\nA tone is produced by adding gray to any pure hue. In this case, #696d79 is the less saturated color, while #0137e1 is the most saturated one.\n\n• #696d79\n``#696d79` `rgb(105,109,121)``\n• #616981\n``#616981` `rgb(97,105,129)``\n• #58648a\n``#58648a` `rgb(88,100,138)``\n• #4f6093\n``#4f6093` `rgb(79,96,147)``\n• #475b9b\n``#475b9b` `rgb(71,91,155)``\n• #3e57a4\n``#3e57a4` `rgb(62,87,164)``\n``#3552ad` `rgb(53,82,173)``\n• #2c4eb6\n``#2c4eb6` `rgb(44,78,182)``\n• #2449be\n``#2449be` `rgb(36,73,190)``\n• #1b45c7\n``#1b45c7` `rgb(27,69,199)``\n• #1240d0\n``#1240d0` `rgb(18,64,208)``\n• #0a3cd8\n``#0a3cd8` `rgb(10,60,216)``\n• #0137e1\n``#0137e1` `rgb(1,55,225)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #0137e1 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5009704,"math_prob":0.71461993,"size":3670,"snap":"2023-40-2023-50","text_gpt3_token_len":1680,"char_repetition_ratio":0.14048009,"word_repetition_ratio":0.0074074073,"special_character_ratio":0.5618529,"punctuation_ratio":0.23751387,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99183524,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-07T17:21:48Z\",\"WARC-Record-ID\":\"<urn:uuid:ab15dfd7-f079-4861-97bf-27c1e9a14c3a>\",\"Content-Length\":\"36168\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4e282796-b55a-4eba-9b83-998792057fcc>\",\"WARC-Concurrent-To\":\"<urn:uuid:b793eb0e-bfa6-4dd6-80d1-b936d651e8c0>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/0137e1\",\"WARC-Payload-Digest\":\"sha1:UYZ2D7ULUQJ4DKGIQZP263VSYTEADHD7\",\"WARC-Block-Digest\":\"sha1:MHAB6BYCDEJN7RSAIJJ74HAQAX6N5ZL5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100677.45_warc_CC-MAIN-20231207153748-20231207183748-00287.warc.gz\"}"} |
http://csharphelper.com/blog/tag/elements/ | [
"# Tag Archives: Elements\n\n## Calculate the GCD (greatest common divisor) and LCM (least common multiple) of two integers in C#\n\nGCD The greatest common divisor of two integers is the largest integer that evenly divides them both. For example, GCD(180, 105) = 15 because 15 is the largest integer that divides evenly into both 180 and 105. Euclid’s Elements c. … Continue reading\n\nPosted in algorithms, mathematics | | 5 Comments"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.66262144,"math_prob":0.7480284,"size":3420,"snap":"2020-10-2020-16","text_gpt3_token_len":1133,"char_repetition_ratio":0.16832553,"word_repetition_ratio":0.042813454,"special_character_ratio":0.36929825,"punctuation_ratio":0.043841336,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9622093,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-20T10:54:30Z\",\"WARC-Record-ID\":\"<urn:uuid:dd96f904-c4b7-439d-aebd-3be55081f6b9>\",\"Content-Length\":\"39475\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:40c1f314-278f-4106-bdd6-deb4a1e9f977>\",\"WARC-Concurrent-To\":\"<urn:uuid:6eda416b-41a0-483a-8469-695a413b8685>\",\"WARC-IP-Address\":\"107.180.57.98\",\"WARC-Target-URI\":\"http://csharphelper.com/blog/tag/elements/\",\"WARC-Payload-Digest\":\"sha1:TPKPGLVGWV57KJ4HVIXSKUY7KIRVJZVR\",\"WARC-Block-Digest\":\"sha1:MUPVOK46DTO7REJC7IHWFSSH3OAX2A56\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875144722.77_warc_CC-MAIN-20200220100914-20200220130914-00060.warc.gz\"}"} |
https://tech.tonyballantyne.com/pedagogy/be-a-better-coder/writing-better-code-1/ | [
"# Writing Better Code 1\n\nThe number 28 has 6 divisors:\n\n1,2,4,7,14,28\n\nThe number 5 only has 2 divisors:\n\n1,5\n\nWrite a program to find all the divisors of a number.\n\nThe mod operator is useful here. Remember that the mod operator gives the remainder when two numbers are divided, so\n\n```28 % 14 = 0\n28 % 5 = 3\n```\n\nWe can use the mod function to write code as follows\n\n```def divisors(n):\ndivs = []\nfor i in range(1,n+1):\nif n%i == 0:\ndivs.append(i)\nreturn divs\n\nprint(divisors(28))\n```\n\nThe above code is inefficient. To find the divisors of 28, you have to go through the for loop 28 times. To find the divisors of n, we have to go through the for loop n times. We say the code has time complexity O(n).\n\nTry running the code to find the divisors of a large number such as 1347663998. You’ll notice it takes a long time to find the answer. We need a way to make the code more efficient.\n\nYou should notice that the divisors come in pairs. (1,28, 2,14 4,7). This suggests a way of saving loops. Rather than looking at all the numbers, we could look at just half of them.\n\n```import math\n\ndef divisors(n):\ndivs = []\nfor i in range(1,int(n/2)):\nif n%i == 0:\ndivs.append(i)\ndivs.append(int(n/i))\nreturn divs\n\nprint(divisors(28))\n\n```\n\nThat seems better, but testing we get repeated divisors\n\n[1, 28, 2, 14, 4, 7, 7, 4]\n\nThinking about it further we see that we only need to count as far as the square root of n (because root n * root n = n)\n\n```import math\n\ndef divisors(n):\ndivs = []\nfor i in range(1,int(math.sqrt(n))):\nif n%i == 0:\ndivs.append(i)\ndivs.append(int(n/i))\nreturn divs\n\nprint(divisors(28))\n```\n\nThere’s still a problem though.\n\nRun the above code with divisors(9) and you just get\n\n[1, 9]\n\nIsn’t 3 a divisor of 9? The problem lies in our range. We’re counting up to one less then root 9. Let’s tweak the code to take this case into account.\n\n```import math\n\ndef divisors(n):\ndivs = []\nfor i in range(1, int(math.sqrt(n))):\nif n%i == 0:\ndivs.append(i)\ndivs.append(int(n/i))\nif math.sqrt(n).is_integer():\ndivs.append(int(math.sqrt(n)))\nreturn divs\n\nprint(divisors(9))\n```\n\nWe’ve now got working code that runs a lot faster than the original code.\n\nThere are a couple of further tweaks we can make.\n\nFirstly, all numbers are divisible by 1 and themselves, so we can just append them without checking.\n\nOdd numbers are never divisible by even numbers. So, if n is odd, we only need to check if n is divisible by 3, 5, 7 …\n\nIf n is even we need to check all numbers from 2 onwards.\n\n```import mathdef divisors(n): divs = [] step = 1 start = 2 if n%2 == 1: step = 2 start = 3 for i in range(start, int(math.sqrt(n)), step): if n%i == 0: divs.append(i) divs.append(int(n/i)) if math.sqrt(n).is_integer(): divs.append(int(math.sqrt(n))) divs.append(1) divs.append(n) return divs\n```\n\nOne last thing. In the new code the following calculation appears three times: math.sqrt(n)\n\nIt takes the computer a lot longer to work out square roots than to do other calculations. Now, a good compiler should notice this. It will perform optimisation on your code and will store repeated calculations to stop them having to be worked out over and over again.\n\nHowever, it might be more elegant to adjust your code as follows. I’ve also added a line to sort the divisors into order.\n\n```import math\ndef divisors(n): divs = [] rootn = math.sqrt(n) step = 1 start = 2 if n%2 == 1: step = 2 start = 3 for i in range(start, int(rootn), step): if n%i == 0: divs.append(i) divs.append(int(n/i)) if rootn.is_integer(): divs.append(int(rootn)) divs.append(1) divs.append(n) divs.sort() return divs```\n\nThis site uses Akismet to reduce spam. Learn how your comment data is processed."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8013043,"math_prob":0.9979423,"size":3498,"snap":"2020-45-2020-50","text_gpt3_token_len":1016,"char_repetition_ratio":0.16199198,"word_repetition_ratio":0.15384616,"special_character_ratio":0.3018868,"punctuation_ratio":0.1514423,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997862,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-30T00:50:07Z\",\"WARC-Record-ID\":\"<urn:uuid:ca3a1fa8-f6ae-4121-afc7-031260788db9>\",\"Content-Length\":\"37250\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:28dd1c6d-ed47-41fa-ac9c-b83cdf5e87b7>\",\"WARC-Concurrent-To\":\"<urn:uuid:8eecc336-482d-402d-9bf3-9c7ab1cdb888>\",\"WARC-IP-Address\":\"185.119.173.36\",\"WARC-Target-URI\":\"https://tech.tonyballantyne.com/pedagogy/be-a-better-coder/writing-better-code-1/\",\"WARC-Payload-Digest\":\"sha1:Z66ARH7LJJXZG5F2WFGS7VHJYGOAQQ3M\",\"WARC-Block-Digest\":\"sha1:GBZETDTA42TTKZCCCTVYU6RMSAWKTKYX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141204453.65_warc_CC-MAIN-20201130004748-20201130034748-00016.warc.gz\"}"} |
https://jsdoc.inflectra.com/HelpReadingPane.ashx?href=js56jsmthdimensions.htm | [
"JScript\n\n# dimensions Method\n\nReturns the number of dimensions in a VBArray.\n\n`array.dimensions( ) `\n\nThe required array is a VBArray object.\n\n#### Remarks\n\nThe dimensions method provides a way to retrieve the number of dimensions in a specified VBArray.\n\nThe following example consists of three parts. The first part is VBScript code to create a Visual Basic safe array. The second part is JScript code that determines the number of dimensions in the safe array and the upper bound of each dimension. Both of these parts go into the <HEAD> section of an HTML page. The third part is the JScript code that goes in the <BODY> section to run the other two parts.\n\n```<HEAD>\n<SCRIPT LANGUAGE=\"VBScript\">\n<!--\nFunction CreateVBArray()\nDim i, j, k\nDim a(2, 2)\nk = 1\nFor i = 0 To 2\nFor j = 0 To 2\na(j, i) = k\nk = k + 1\nNext\nNext\nCreateVBArray = a\nEnd Function\n-->\n</SCRIPT>\n\n<SCRIPT LANGUAGE=\"JScript\">\n<!--\nfunction VBArrayTest(vba)\n{\nvar i, s;\nvar a = new VBArray(vba);\nfor (i = 1; i <= `a.dimensions()`; i++)\n{\ns = \"The upper bound of dimension \";\ns += i + \" is \";\ns += a.ubound(i)+ \".<BR>\";\n}\nreturn(s);\n}\n-->\n</SCRIPT>\n\n<BODY>\n<SCRIPT language=\"jscript\">\ndocument.write(VBArrayTest(CreateVBArray()));\n</SCRIPT>\n</BODY>```\n\nVersion 3"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5952588,"math_prob":0.97371143,"size":1257,"snap":"2022-27-2022-33","text_gpt3_token_len":347,"char_repetition_ratio":0.14365523,"word_repetition_ratio":0.02283105,"special_character_ratio":0.29594272,"punctuation_ratio":0.12552302,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9980223,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-07T16:10:15Z\",\"WARC-Record-ID\":\"<urn:uuid:6e5927a1-35fe-4a90-941f-49a1b9e0b186>\",\"Content-Length\":\"3819\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7bada13b-d096-41fc-9780-e98b6101ea68>\",\"WARC-Concurrent-To\":\"<urn:uuid:5c02e50f-3c02-40b2-8a36-5598d49e9068>\",\"WARC-IP-Address\":\"3.218.117.200\",\"WARC-Target-URI\":\"https://jsdoc.inflectra.com/HelpReadingPane.ashx?href=js56jsmthdimensions.htm\",\"WARC-Payload-Digest\":\"sha1:OA7SJ2LMHKWHVEJ3ZICUK4WZVIKXA3KX\",\"WARC-Block-Digest\":\"sha1:57P7GDHREUNBBI22TWDWYXIZL5JSVUQB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656104495692.77_warc_CC-MAIN-20220707154329-20220707184329-00685.warc.gz\"}"} |
https://discovery.researcher.life/article/a-research-on-line-loss-calculation-based-on-bp-neural-network-with-genetic-algorithm-optimization/a4bb8bbf6a5432a7a9597acd572aa2d4 | [
"## Abstract\n\nIn order to realize the calculation of the line loss of the distribution network with complex structure and low-voltage station area, this paper presents a line loss calculation method based on BP neural network with genetic algorithm optimization. The proposed method is based on the actual operation data of the distribution network. Firstly, build an error back propagation (BP) neural network model to compute the theoretical line loss of the distribution network, then use genetic algorithm (GA) to optimize the neural network and establish the GA-BP model. Based on the proposed model, the calculation demonstrates that the neural network line loss rate calculation model with genetic algorithm optimization shows better performance than the single BP neural network model, such as better nonlinear fitting ability and higher calculation accuracy. Therefore, the line loss calculation method proposed in this paper based on the BP neural network with the genetic algorithm optimization can improve the accuracy of the distribution network line loss rate calculation model.\n\n## Full Text",
null,
"",
null,
"Schedule a call"
] | [
null,
"https://cdn.researcher.life/discovery-article/icons/full-text-submitted.svg",
null,
"https://cdn.researcher.life/discovery/icons/calender-blue.svg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.833757,"math_prob":0.9843182,"size":2109,"snap":"2023-40-2023-50","text_gpt3_token_len":498,"char_repetition_ratio":0.14109264,"word_repetition_ratio":0.011396011,"special_character_ratio":0.23565671,"punctuation_ratio":0.07692308,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9947399,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-04T11:01:28Z\",\"WARC-Record-ID\":\"<urn:uuid:aa46da26-0b81-40bd-aaa2-94e8fdc6c0eb>\",\"Content-Length\":\"270191\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cef240e3-79eb-4ce1-9fc7-eb0e988893db>\",\"WARC-Concurrent-To\":\"<urn:uuid:7970ff73-cee8-41c3-b5cb-6b70e30fc527>\",\"WARC-IP-Address\":\"13.32.208.22\",\"WARC-Target-URI\":\"https://discovery.researcher.life/article/a-research-on-line-loss-calculation-based-on-bp-neural-network-with-genetic-algorithm-optimization/a4bb8bbf6a5432a7a9597acd572aa2d4\",\"WARC-Payload-Digest\":\"sha1:PDPIQZZJBQYORYYEPKKRQGOMVZGHRK2Y\",\"WARC-Block-Digest\":\"sha1:JBEBDNBSTM6W62LYMCVCZCVQWCO5YNXQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100527.35_warc_CC-MAIN-20231204083733-20231204113733-00127.warc.gz\"}"} |
https://newproxylists.com/discrete-mathematics-how-to-prove-a-proposition-related-to-sets-operation/ | [
"# discrete mathematics – How to prove a proposition related to sets operation",
null,
"I am asked to prove or disprove the following proposition:\n$$X cap Y = X implies X cup Y = Y$$\n\nI feel this is true, because this means that X is a subset of Y, and as a result, when we do union with these two, it should be the entire set.\n\nHowever, I have a hard time constructing a formal proof to prove this. Not sure where to start from.",
null,
"Posted on"
] | [
null,
"https://dreamproxies.com/wp-content/uploads/2020/05/Hostgator-coupon-sale.v1.jpg",
null,
"https://dreamproxies.com/wp-content/uploads/2020/05/Hostgator-sale.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9589286,"math_prob":0.9432467,"size":340,"snap":"2020-45-2020-50","text_gpt3_token_len":85,"char_repetition_ratio":0.09821428,"word_repetition_ratio":0.0,"special_character_ratio":0.25588235,"punctuation_ratio":0.11392405,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98744655,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-27T15:34:24Z\",\"WARC-Record-ID\":\"<urn:uuid:9d0c9ceb-55a5-4238-b783-7edbac8cb57e>\",\"Content-Length\":\"23917\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1413b3bc-3c87-404e-a03e-41f26708e1fb>\",\"WARC-Concurrent-To\":\"<urn:uuid:3d0061a8-3ebe-4020-a868-57fca486812b>\",\"WARC-IP-Address\":\"173.212.203.156\",\"WARC-Target-URI\":\"https://newproxylists.com/discrete-mathematics-how-to-prove-a-proposition-related-to-sets-operation/\",\"WARC-Payload-Digest\":\"sha1:3D4U5PHZXW4EGDCUGEC7J4HE5T6KQWXQ\",\"WARC-Block-Digest\":\"sha1:7SV35KUHMGJAEBMN7K4R3PB46MA74G2O\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107894203.73_warc_CC-MAIN-20201027140911-20201027170911-00327.warc.gz\"}"} |
https://online-trading-platforms.info/kindergarten-add-and-subtract-worksheets/ | [
"# 37 Luxury Kindergarten Add and Subtract Worksheets",
null,
"subtraction worksheets for kindergarten celestial worksheets kindergarten free printable shape for kids best 25 addition worksheets ideas on pinterest subtraction worksheets for kindergarten pdf free subtraction quiz worksheet free kindergarten math subtraction – 4 worksheets free printable worksheets subtraction worksheet for kindergarten math worksheets images about kids math on pinterest free printable math coloring sheets for kindergarten kindergarten math worksheets",
null,
"images about kids math on pinterest free printable from kindergarten add and subtract worksheets , source:www.mogenk.com",
null,
"Free Preschool & Kindergarten Subtraction Worksheets from kindergarten add and subtract worksheets , source:www.k5learning.com\n\nprintable subtraction worksheet for kindergarten adding and subtracting to 5 kindergarten math worksheets addition and subtraction math worksheets for kindergarten addition and subtraction subtraction to 10 with dominos dominos provide a tangible 389 best math tubs adding and subtracting images on addition and subtraction worksheets for kindergarten free preschool & kindergarten subtraction worksheets addition worksheet for kindergarten kindergarten worksheets chapter 2 worksheet mogenk"
] | [
null,
"https://online-trading-platforms.info/wp-content/uploads/2018/09/kindergarten-add-and-subtract-worksheets-incredible-subtraction-worksheets-for-kindergarten-celestial-of-kindergarten-add-and-subtract-worksheets.png",
null,
"https://online-trading-platforms.info/wp-content/uploads/2018/09/kindergarten-add-and-subtract-worksheets-new-images-about-kids-math-on-pinterest-free-printable-of-kindergarten-add-and-subtract-worksheets.png",
null,
"https://online-trading-platforms.info/wp-content/uploads/2018/09/kindergarten-add-and-subtract-worksheets-outstanding-free-preschool-amp-kindergarten-subtraction-worksheets-of-kindergarten-add-and-subtract-worksheets.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6246406,"math_prob":0.523371,"size":5855,"snap":"2019-13-2019-22","text_gpt3_token_len":1092,"char_repetition_ratio":0.36762947,"word_repetition_ratio":0.4217877,"special_character_ratio":0.16191289,"punctuation_ratio":0.16103603,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99663234,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-23T17:18:18Z\",\"WARC-Record-ID\":\"<urn:uuid:64c02cf8-d203-45fc-b177-411f3ea5da70>\",\"Content-Length\":\"59858\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:198cc8ab-cd8b-488e-a887-6ec3fea6836b>\",\"WARC-Concurrent-To\":\"<urn:uuid:07c0d9ea-7bc7-4e94-9244-f1e99f23fa55>\",\"WARC-IP-Address\":\"104.27.140.243\",\"WARC-Target-URI\":\"https://online-trading-platforms.info/kindergarten-add-and-subtract-worksheets/\",\"WARC-Payload-Digest\":\"sha1:XLTJGS6RPYYEAMUUXJI2ALKTG653SIS7\",\"WARC-Block-Digest\":\"sha1:O2AFJTI2NPWETAWASATIYW73DIHEZPWA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202889.30_warc_CC-MAIN-20190323161556-20190323183556-00029.warc.gz\"}"} |
https://www.arxiv-vanity.com/papers/hep-th/0505099/ | [
"hep-th/0505099\n\nPUPT-2160\n\nITEP-TH-33/05\n\nPerturbative Search for Fixed Lines\n\nin Large Gauge Theories\n\nA. Dymarsky, I.R. Klebanov and R. Roiban\n\nJoseph Henry Laboratories, Princeton University, Princeton, NJ 08544, USA\n\nAbstract\n\nThe logarithmic running of marginal double-trace operators is a general feature of 4-d field theories containing scalar fields in the adjoint or bifundamental representation. Such operators provide leading contributions in the large limit; therefore, the leading terms in their beta functions must vanish for a theory to be large conformal. We calculate the one-loop beta functions in orbifolds of the SYM theory by a discrete subgroup of the R-symmetry, which are dual to string theory on . We present a general strategy for determining whether there is a fixed line passing through the origin of the coupling constant space. Then we study in detail some classes of non-supersymmetric orbifold theories, and emphasize the importance of decoupling the factors. Among our examples, which include orbifolds acting freely on the , we do not find any large non-supersymmetric theories with fixed lines passing through the origin. Connection of these results with closed string tachyon condensation in is discussed.\n\nMay 2005\n\n## 1 Introduction\n\nSoon after the AdS/CFT correspondence was formulated [1, 2, 3] (see [4, 5] for reviews), it was realized that modding out by a discrete subgroup of the R-symmetry leads to dual pairs with reduced supersymmetry [6, 7]. If we start with the SYM theory in , then a discrete orbifold group produces a superconformal field theory, while produces a superconformal gauge theory. For all other the supersymmetry is completely broken, raising the hope of generating a wide variety of non-supersymmetric conformal gauge theories. Some support for this was provided using both string theory and perturbative gauge theory arguments: it was shown that all correlation functions of single-trace untwisted operators (i.e. the operators that do not transform under the quantum symmetry ) coincide in the planar limit with corresponding correlation functions in the parent SYM theory. Therefore, beta functions for marginal single-trace operators vanish in the large limit. Concerns were raised, however, about the non-supersymmetric cases due to the presence of closed string tachyons . Nevertheless, the possibility that non-supersymmetric orbifold gauge theories are “large conformal” raised interesting prospects of conformal unification without supersymmetry .\n\nAs briefly mentioned in [8, 9], double-trace contributions are not inherited from the parent theory. An explicit one-loop calculation for the simplest non-supersymmetric orbifold gauge theory, with , revealed the presence of beta functions for double-trace operators. The induced double-trace operators were found to be of the form , where is a twisted ( odd) single-trace operator of bare dimension (see footnote 11 in ). More general concerns about inducing the double-trace operators were expressed in . Somewhat later on, the concerns about beta functions for the double-trace operators were strengthened, since their presence destroys the scale invariance of the large theory .111The role of multi-trace operators in the AdS/CFT correspondence was examined in a number of papers, starting with [14, 15, 16]. The work of draws an important distinction between the freely acting orbifolds of which contain no tachyons at large radius (strong ‘t Hooft coupling ), and other orbifolds that do contain tachyons. The case of the orbifold fits in the context of type 0 string theory and therefore contains tachyons. It was speculated in that its Coleman-Weinberg instability at weak gauge coupling is related to the tachyonic instability at strong coupling. One of the results of our paper is that even freely acting orbifold gauge theories may be rendered non-conformal at weak ‘t Hooft coupling by the flow of certain double-trace couplings.\n\nIn recent literature, inspired by the construction of exactly marginal deformations in AdS/CFT correspondence , a new proposal has appeared for a non-supersymmetric gauge theory that is conformal in the large limit . This motivates us to revisit the issue of whether there are non-supersymmetric orbifolds of the theory that are large conformal at weak coupling, which does not seem to be completely settled. We study beta functions for double-trace couplings and show that each such beta function has 3 leading one-loop contributions. Each one-loop beta function has two zeros, at . If the are complex then cannot flow to a fixed point, and the theory is not large conformal. But if are real, then reaches a non-trivial IR stable fixed point at . If all are real then we find an interesting weakly coupled large CFT, with double-trace operators induced. But are there such examples? In this paper we carry out a general one-loop calculation of induced double-trace operators, and then study in detail the beta functions for a few classes of examples where we find that some, but not all, are real. We do not know a general argument for the non-existence of perturbatively stable non-supersymmetric large CFT’s containing scalars in the adjoint or bifundamental representation;222 In non-supersymmetric theories containing fields in fundamental representations there exist Banks - Zaks fixed points with massless fermions , and their recently proposed generalizations containing also scalar fields . These are isolated fixed points rather than fixed lines. a further search for them is certainly warranted.\n\nIn the next section we present some considerations concerning the flow of the double-trace couplings, and in section 3 present a general formalism for calculating the one-loop beta-functions in orbifold gauge theories. Then, in section 4 we consider some simple examples of non-freely acting orbifolds whose AdS duals contain tachyons at large radius. In section 5 we move on to a class of freely acting orbifolds whose AdS duals do not contain tachyons at large radius. None of the examples we consider prove to be large conformal at weak ‘t Hooft coupling. Possible relations between our calculations and closed string tachyon condensation are discussed in section 6.\n\n## 2 General Considerations\n\nIn the standard convention, the SYM action is\n\n S=−∫d4x12g2YMTrF2μν+… (1)\n\nIn the ‘t Hooft large limit, is held fixed; hence, the coefficient multiplying the single-trace operator is of order . In this convention, the -point functions of single-trace operators are of order .\n\nNow consider gauge theories obtained by orbifolding the parent SYM theory by a discrete symmetry group . The single-trace operators come in two types: the untwisted ones, invariant under , and the twisted ones that transform under . For example, for , there are twisted operators that transform by under the generator of . The symmetry prevents such a twisted operator from being induced in the effective action. However, it does not prevent the appearance of a double-trace operator where and have opposite quantum numbers under (e.g., for ). Such an operator is of the same order in the large expansion as the action , i.e. of order . Hence it contributes to observables in the leading large limit.\n\nIn non-supersymmetric quiver gauge theories, in general nothing prevents the appearance of such double-trace operators. Indeed, one-loop diagrams induce such operators of bare dimension 4 with logarithmically divergent coefficients [11, 13]: the effective action at scale picks up contributions of the form 333Here and throughout the paper denotes the ’t Hooft coupling in the parent theory: .\n\n ∫d4xO¯OaOλ2ln(Λ/M) , (2)\n\nwhere is the UV cut-off and is a coefficient determined through explicit calculations. Then, perturbative renormalizability necessitates the addition of trace-squared couplings to the action:\n\n δS=−∫d4xfO¯O . (3)\n\nFrom (2) we note that the beta function for contains a contribution . However, this is not the only contribution to the one-loop beta function.\n\nIf the operator picks up 1-loop anomalous dimension , then the dimension of in the large limit is . This introduces a term into the beta function for . Finally, as discussed for example in [15, 16], there is a positive contribution , where\n\n ⟨O(x)¯O(0)⟩=vO4π2|x|4 , (4)\n\nwhich comes from fusion of two double-trace operators in the free theory.\n\nPutting the terms together, we find\n\n M∂f∂M=βf=vOf2+2γOλf+aOλ2 . (5)\n\nIt is crucial that the right hand side is not suppressed by powers of ; it is a leading large effect. On the other hand, the beta function for has no such contribution, due to the theorem of [8, 9]. Also, counting the powers of one can show that the double-trace operators cannot induce any planar beta functions for single-trace couplings. Therefore, in the large limit, may be dialed as we wish. In particular, it can be made very small so that the one-loop approximation in (5) is justified. Then the equation has two solutions, , where\n\n a±=1vO(−γO±√D) ,D=γ2O−aOvO . (6)\n\nIf the discriminant is positive, then these solutions are real, so that may flow to the IR stable fixed point at . This mechanism could make the theory conformal in an interesting and non-trivial way: in particular the IR theory has non-vanishing double-trace couplings.444In actual examples we will often find that both and are negative, so that the Hamiltonian is not obviously bounded from below (to study its positivity one needs to include both single trace and double-trace terms quartic in the scalar fields). However, it is well-known that many large theories are locally stable for potentials unbounded from below. Hence, we will not rule out the fixed points with negative double-trace couplings, although this issue requires further study.\n\nIf is negative, then (5) is positive definite for real , which signals a violation of conformal invariance. However, for small , the flow of is actually very slow near the minimum of located at . This is evident from the explicit solution of (5):\n\n f(M)=−γOλvO+bλvOtan(bλvOln(M/μ)) , (7)\n\nwhere we defined and chose the boundary condition . Thus, at weak ‘t Hooft coupling , the double-trace parameter varies very slowly for a wide range of scales. Still, it blows up towards positive infinity in the UV at and reaches in the IR at . We expect this singular behavior to be softened by the corrections, which introduce a positive beta function for making it approach zero in the IR.\n\n## 3 Double-trace correction for general orbifolds\n\nIn this section we find the beta function of the couplings of the dimension 4 double-trace twisted operators in general orbifolds of SYM theory. There are many gauge fixing choices one can make. The calculations are substantially simplified if we choose the dimensional reduction of the ten dimensional background gauge. We are interested in the 1-loop effective action for the scalar fields; at this order in perturbation theory the result can be found by computing the determinant of the kinetic operators. In Euclidean space and with hermitian generators for the gauge group, the relevant bosonic terms are\n\n S = ∫d4xTr[(∂μaν)2+(∂μφI)2 (9) −g2YM[ϕI,aμ][ϕI,aμ]−g2YM[ϕI,φJ][ϕI,φJ]−2g2YM[ϕI,ϕJ][φI,φJ]] .\n\nwhere are the background scalar fields and we expanded the action to quadratic order in the quantum fields and . The fermions couple to the background scalar fields via Yukawa couplings inherited from minimal couplings in ten dimensions.\n\nWe will denote by the orbifold group; if is a subgroup of or then the resulting theory preserves or supersymmetry, respectively. We will further denote by the representation of the elements of in , where it acts by conjugation. The representation of in the spinor and vector representation of will be denoted by and . Presenting the vector representation of as the 2-index antisymmetric tensor representation of , it follows that .\n\nWe will compute the determinant of the kinetic operator in a general scalar field background invariant under the orbifold group\n\n ϕI=RIJggϕJg† . (10)\n\nSince we are not considering a nontrivial fermionic background the contribution of fermionic loops decouple from that of scalar, vector and ghost loops and can be computed independently. To shorten the expression of the effective potential let us define:\n\n AIJ|KLg=Tr(ϕIϕJg†)Tr(ϕKϕLg)+Tr(ϕJϕIg)Tr(ϕLϕKg†) . (11)\n\nWe also introduce a notation for the divergent part of a generic 1-loop scalar amplitude:\n\n Div=∫d4k(2π)41k4=116π2lnΛ2M2 . (12)\n\nwhere is the UV cutoff and is the renormalization scale. Also, the notation for the contribution to the effective action will be:\n\n δSnr. of loops|nr. of tracessource of contribution . (13)\n\nThen, the contribution of the fermion loop to the double-trace part of the effective action is:\n\n δS1 loop|2 trFermi=λ2Div2|Γ|∑g∈ΓTr[γIγJγKγLrg][AJI|KLg+AKI|JLg+ALI|JKg] . (14)\n\nIn this form the fermionic contribution to the effective action is manifestly real. Giving up manifest reality (which of course is restored in the sum over the orbifold group elements) it turns out to be possible to further simplify this expression to:\n\n δS1 loop|2 trFermi= (15) =λ2Div|Γ|∑g∈ΓTr[γIγJγKγLrg][2Tr(ϕJϕIg†)Tr(ϕKϕLg)+Tr(ϕKϕIg†)Tr(ϕJϕLg)]\n\nIn both equations (14) and (15) denote the chiral (i.e. ) 6-dimensional Dirac matrices. In the absence of the orbifold action matrices the trace is trivial to compute:\n\n Tr[γIγJγKγL]=4(δIJδKL+δILδJK−δIKδJL) . (16)\n\nFor general the results for the nonvanishing components of are collected in the appendix.\n\nThe contribution of the vectors, scalars and ghost loops to the double-trace part of the effective action has the following expression:\n\n δS1 loop|2 trBose,ghost = +∣∣2(RKQg+(R−1g)KQ)Tr([ϕI,ϕQ]g†)Tr([ϕI,ϕK]γ) −∣∣2(δKI(R−1g)PQ+δPQRKIg−2δPQδKI)Tr(ϕPϕQg†)Tr(ϕKϕIg) }\n\nOne may derive this directly in terms of Feynman diagrams or by extracting the double-trace part of the determinant of the kinetic operator for the quantum fields in (9). It is trivial to check that in the absence of the orbifold projection\n\n δS1 loop|2 trBose,ghost+δS1 loopFermi=0 (19)\n\nin agreement with the theorem of [8, 9].\n\nWe see that double-trace operators made out of twisted single-trace operators are generated at 1-loop. Therefore they must be added to the tree level action. The precise form of the deformation depends on the specific orbifold. Also, whenever possible, it is useful to reorganize the operators being generated in terms of operators with definite scaling dimension. For the purpose of illustration let us consider the deformation\n\n δ2 traceS=12∑g∈ΓfgOIJgOJIg† with OIJg=Tr% (gϕIϕJ) . (20)\n\nThis modifies the kinetic operator by adding\n\n ∑g∈Γ(L(g)OJIg†+R(g)OIJg†) (21)\n\nwhere and are the left- and right-multiplication operators, respectively, and brings the following additional contributions to the effective action:\n\n δS1 loop|2 tr2 trace=−Div|Γ|{∑gfg(1|Γ|∑~gf~gg†~g†)OIJgOJIg† + λ∑g∈ΓfgOJIg†[4δI^IδJ^J+(δIJ+RJIg)δ^I^J−2((R−1g)I^IδJ^J+δI^I(R−1g)J^J)]O^I^Jg}\n\nOne may recognize the bracket on the second line as the 1-loop dilatation operator acting on twisted operators.\n\n## 4 Examples of non-freely acting orbifolds\n\nIn this section we review and extend earlier analysis of orbifold field theories in which the action of the orbifold group on the -symmetry representation possesses fixed points. Quite generally, such an orbifold action yields in the daughter theory fields in the adjoint representation of all the gauge group factors.\n\nOn the string theory side, this translates into the existence of fixed points of the action of the orbifold group on the five-sphere. For non-supersymmetric actions (such as those we are interested in) it follows that some of the string theory excitations are tachyonic. We will eventually show that such tachyons manifest themselves in the weakly coupled gauge theory.\n\n### 4.1 A Non-Supersymmetric Z2 Example\n\nIn this subsection we discuss the orbifold theory which arises on the stack of electric and magnetic D3-branes of type 0B theory . This is the gauge theory coupled to six adjoint scalars of the first gauge group, six adjoint scalars of the second gauge group, 4 fermions in and 4 fermions in . This theory has global symmetry.\n\nThe one-loop calculation of reveals the following double-trace terms induced in the effective Lagrangian:\n\n δLeff=λ2π2ln(ΛM)(O⟨IJ⟩O⟨IJ⟩+23O2) , (23)\n\nwhere\n\n O⟨IJ⟩=Tr(ΦIΦJ−16δIJΦKΦK)−Tr(~ΦI~ΦJ−16δIJ~ΦK~ΦK)≡Tr(gϕIϕJ)−16δIJTr(gϕKϕK) (24)\n\ntransform in the of , while\n\n O=TrΦIΦI−Tr~ΦI~ΦI≡Tr(gϕIϕI) (25)\n\nis an singlet. Here the matrix represents the orbifold group on the gauge degrees of freedom: . We are thus forced to introduce coupling constants and , through\n\n δLtree=−f20O⟨IJ⟩O⟨IJ⟩−f1O2 . (26)\n\nWith our conventions (the normalization of the scalar kinetic term is twice the usual), the free scalar Euclidean two-point function is\n\n ⟨ΦI(x)ΦJ(0)⟩=δIJ18π2|x|2 . (27)\n\nThen we find\n\n ⟨O(x)O(0)⟩=v14π2|x|4 ,v1=34π2 , (28)\n ⟨O⟨IJ⟩(x)O⟨KL⟩(0)⟩=(δIKδJL+δILδJK−13δIJδKL)v204π2|x|4 ,v20=18π2 . (29)\n\nThe one-loop anomalous dimension coefficients are\n\n γ1=3λ8π2 ,γ20=0 . (30)\n\nThey can be obtained from the corresponding quantities in the SYM theory (see, for instance, ) by interpreting as the ’t Hooft coupling in the parent theory and introducing an additional factor of or by diagonalizing the dilatation operator written out explicitly in the appendix. Hence, we find\n\n β20=v20f220+λ2π2 ,β1=v1f21+34π2λf1+2λ23π2=32π2(14f21+12λf1+49λ2) . (31)\n\nNeither nor have real zero’s: they are positive definite for real couplings. Hence, the double-trace couplings and flow from large positive values in the UV to large negative in the IR. Thus, the orbifold theory is not large conformal: there are odd single-trace operators and even double-trace operators whose correlators do not respect conformal invariance.\n\n### 4.2 A Non-supersymmetric Z3 orbifold\n\nAs usual, we start with a supersymmetric gauge theory and apply a projection. We take the generator of the group to act on the fundamental representation of as\n\n r=diag(eiα3,eiα3,e−iα3,e−iα3) , α3=2π3 . (32)\n\nThe action on the fundamental representation of is\n\n R=diag(1,1,e2iα3,1,1,e−2iα3) . (33)\n\nThus, the orbifold acts on only one of the three complex coordinates. Closed string tachyon condensation in the case, and in the generalization to discussed in the Appendix D, was studied in many papers starting with (for reviews see [25, 26]). Our strategy will be to place a stack of D3-branes at the tip of the cone, and to study RG flows in the resulting gauge theory, and we will suggest their connection with tachyon condensation.\n\nAs usual in orbifold field theories, we keep only fields invariant under this operation, together with , where\n\n g=diag(1lN,eiα31lN,e−iα31lN) .\n\nwhere denotes the identity matrix.\n\nWe end up with a gauge theory (the untwisted decouples) described by a quiver diagram with 3 vertices. This theory has no supersymmetry but possesses global symmetry. At each vertex of the quiver, there are 4 adjoint scalar fields, transforming as a vector of , . Here is the index, and labels the vertex of the quiver. There are also singlet bifundamental scalars with . In the fermionic sector, we find 3 doublets of the first , , , , with ; and 3 doublets of the second , , , . The Yukawa couplings include terms of the type\n\n Φμ1σμa˙bψa12ψ˙b21\n\nand also terms of the type\n\n ϵabψa12ψb23Φ31 .\n\nFirst, let us classify the scalar operators that may appear in the induced marginal double-trace operators. The operators built of the adjoint scalars can be combined into traceless symmetric tensors in the of , and also into the singlet of . The former have the form\n\n O⟨μν⟩±=O⟨μν⟩1+exp(±iα3)O⟨μν⟩2+exp(∓iα3)O⟨μν⟩3 , (34)\n\nwhere\n\n O⟨μν⟩i=Tr(ΦμiΦνi−14δμνΦκiΦκi) O⟨μν⟩±=Tr(g±1ϕμϕν)−14δμνTr(g±1ϕκϕκ) , (35)\n\nwhile the latter are\n\n O±=4∑κ=1Tr(g±1ϕκϕκ)=TrΦ21+exp(±iα3)TrΦ22+exp(∓iα3)TrΦ23 . (36)\n\nAdditionally, there are singlet operators made of the bifundamental scalars,\n\n A±=e±iα3Tr(g±1ϕ3ϕ¯3)=3∑k=1Φk,k+1Φk+1,ke±iα3k where Φ†kl=Φlk , (37)\n\nand is identified with .\n\nThe operators and mix under RG flow; their anomalous dimension matrix is:\n\n (38)\n\nThe permutation symmetry, and the symmetry imply that the double-trace operators must involve combinations like\n\n Oμν+Oμν−=3∑i=1OμνiOμνi−Oμν1Oμν2−Oμν2Oμν3−Oμν1Oμν3 . (39)\n\nThis is a good check on our calculations since such combinations emerge only after we sum over the gauge field, scalar and fermion loops.\n\nExplicit calculation shows that there are several combinations which are being generated at one-loop level and must therefore be added as tree-level deformations of the original action. They are:\n\n δ2 traceLtree=f9,1O⟨μν⟩+O⟨μν⟩−+f1,1O+O−+f(3),1A+A−+f(A+O−+A−O+) (40)\n\nIn the following we will keep the anomalous dimension matrix (38) nondiagonal. This leads to non-diagonal beta functions, but avoids explicitly using the matrix diagonalizing the anomalous dimension matrix.\n\nSpecifying the results from the Appendix D to we find that, in the presence of the deformation, the double-trace part of the one-loop effective potential is:\n\n δS1loop|2trb,gh,f=−9λ2ln(Λ2/μ2)32π2|Γ|[4O⟨μν⟩+O⟨μν⟩−+3O+O−+18A+A−−6(O+A−+O−A+)] (41)\n δS1loop|2tr2trace = −λ2ln(Λ2/μ2)32π2|Γ|[f29,1O⟨ab⟩+O⟨ab⟩−+[4f21,1+12f2+2f1,1δOO+2fδAO]O+O− ∣∣+[12f2(3),1+4f2+2f(3),1δAA+2fδOA]A+A− ∣∣+[f(4f1,1+12f(3),1+δOO+δAA)+f1,1δOA+f(3),1δAO]O+A− ∣∣+[f(4f1,1+12f(3),1+δOO+δAA)+f1,1δOA+f(3),1δAO]O−A+ ]\n\nThe five beta functions are therefore:\n\n β9,1 = 148π2[36λ2+f29,1] (45) β1,1 = 148π2[27λ2+4f21,1+12f2+16λf1,1−2λf] (46) β(3),1 = 148π2[162λ2+12f2(3),1+4f2+14λf(3),1−16λf] (47) βf = 148π2[−54λ2+f(4f1,1+12f(3),1+15λ)−8λf1,1−λf(3),1] (48)\n\nThese expressions may seem quite opaque; it is however relatively easy to analyze them and find that no real values for the couplings lead to vanishing of all four beta functions. This is quite obvious for , which corresponds to operators with vanishing one loop anomalous dimension. In the next section we show how this generalizes to any non-freely acting orbifold.\n\n### 4.3 General non-freely acting Zk orbifolds\n\nIn both examples discussed above we found that there is no weakly coupled fixed point of the RG flow. We will now show that this is in fact a general property of orbifolds with fixed points by identifying operators whose beta function does not vanish for any value of the coupling constants.\n\nFirst of all, let us classify all possible representations of embedded in . Through a unitary transformation, its only nontrivial generator can be brought to a diagonal form\n\n g=⎛⎜ ⎜ ⎜ ⎜⎝ein1αk000ein2αk0000ein3αk0000ein4αk⎞⎟ ⎟ ⎟ ⎟⎠, αk=2πk (49)\n\nwith a constraint . So the representation is specified by three integers . Since the fundamental representation of is isomorphic to the two-index antisymmetric representation of , it follows that the action of on the fundamental representation of is also specified by three integers and their negatives . These are the weights of the complex scalar fields and their conjugates under this action of .\n\nThe integers vanish in pairs and the -invariant subspace of is always even-dimensional. We will focus in this section on representations with at least one vanishing , that is we will choose\n\n n1=−n2=n′ and n3=−n4=n′′ . (50)\n\nLet us denote by the number of vanishing weights. Then, is the remaining unbroken global symmetry of the theory. We will denote by the indices along -invariant directions and by all the others directions.\n\nOur logic will be the same as in the examples discussed before: we will focus on the symmetric traceless operator\n\n O⟨μν⟩q=Tr(gqϕμϕν)−δμν2lTr(gqϕκϕκ) (51)\n\nand the beta-function for the corresponding coupling constants555The reason for this particular form of the tree-level deformation is that it yields a uniform expression for all beta functions, including the operators with charge .\n\n δLtree=12k−1∑q=1fqO⟨μν⟩qO⟨μν⟩−q with fq=fk−q (52)\n\nWhen computing the beta function we have to remember to take into account this overcounting of operators.\n\nThe only other twisted operators containing fields from the invariant subspace are similar to the Konishi operator in the parent theory; explicitly, they are\n\n Oq=∑κTr(gqϕκϕκ) (53)\n\nwhere the sum runs only over the invariant subspace. The only other potential candidate\n\n Tr(gqϕμϕi) (54)\n\nvanishes identically. This can be proven quite easily by moving one factor of past both and and then using the cyclicity of the trace. This operation yields a nontrivial phase proportional to the charge of . The other twisted operators are\n\n Tr(gqϕiϕ¯ȷ) . (55)\n\nThis spectrum clearly implies that the deformation (51) is closed in the sense that the beta functions for the couplings does not receive contributions linear in other couplings. Indeed, all correlation functions\n\n ⟨O⟨μν⟩qO−q⟩=0 (56)\n\nsince there is no traceless symmetric invariant tensor.\n\nFrom the general expressions listed in Appendix A, it is easy to see that has vanishing one-loop anomalous dimension, so there is no contribution of the type to the corresponding beta function. It follows therefore that there are only two relevant contributions: from and from the one-loop renormalization of the bare action. The former is always positive . It is in fact easy to calculate this coefficient at one loop level. Its corresponding contribution to the beta function is\n\n f2q16π2k>0 . (57)\n\nThe later contribution, from the one loop renormalization of the bare action is\n\n δS=−λ2π2kln(ΛM) k−1∑q=1sin2(n′αq2)sin2(n′′αq2) OμνqOμν−q (58)\n\nand is also positive.Thus, the beta function for the operators (51) is\n\n βq=2λ2π2ksin2(n′αk2)sin2(n′′αk2)+f2q16π2k (59)\n\nand is always non-vanishing.\n\n## 5 A class of orbifolds with Su(3) symmetry\n\nIn the previous section we saw that, quite generally, non-supersymmetric orbifolds that are not freely acting do not correspond to weakly coupled large CFT’s. What about freely-acting orbifolds? A motivation for studying them is that, since they have no fixed points, the twisted sector strings are stretched to length of order and therefore are not tachyonic at large ‘t Hooft coupling . The corresponding fields in have . Such fields are dual to the twisted single-trace operators in the orbifold gauge theory, which are charged under the quantum symmetry . By the AdS/CFT correspondence, at large such operators have dimensions of order and are highly irrelevant. Hence, the AdS/CFT correspondence suggests that there is a fixed line at large , but that instabilities may set in for small . Motivated by this, we carry out the small (one-loop) analysis for a class of freely acting orbifold gauge theories which possess a global symmetry (further details may be found in the Appendix B).\n\nAs before, the starting point is SYM theory with gauge group ; let us parametrize where is the first -th root of unity\n\n ωk=eiαk , αk=2πk . (60)\n\nTo preserve , we choose the following action of in the fundamental representation of :\n\n r(gn)=diag(ωnk,ωnk,ωnk,ω−3nk) . (61)\n\nwhich yields the action in the vector representation of\n\n R(gn)=diag(ω2nk,ω2nk,ω2nk,ω−2nk,ω−2nk,ω−2nk) (62)\n\nWe end up with a gauge theory described by a quiver diagram with vertices. This theory has no supersymmetry but possesses global symmetry. On the edges around the boundary of the quiver there are triplets of chiral fermions, , where is identified with . There are also singlet chiral fermions . In the scalar sector, we find complex triplets, . Since there are no adjoint scalars, the simplest Coleman-Weinberg potential of the type considered in [11, 13] cannot be generated. However, these models, like all other orbifolds, contain single-trace operators quadratic in the scalar fields. Therefore, there is a possibility of inducing beta-functions for double-trace operators made out of twisted single-trace operators.\n\nThe spectrum of invariant fields under this combined action allows the construction of the following independent twisted operators:\n\n Oi¯ȷn=Tr(gnϕiϕ¯ȷ) On=3∑i=1Tr(gnϕiϕ¯ı) n=1,…,[k2] (63)\n\nThese operators mix under 1-loop scale transformations. Using the dilatation operator spelled out in the appendix it is easy to identify the operators with definite scaling dimension:\n\n Operatoranomalous dimensionO⟨i¯ȷ⟩n=Tr(gnϕiϕ¯ȷ)−1</"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91177803,"math_prob":0.97148436,"size":25101,"snap":"2021-21-2021-25","text_gpt3_token_len":5384,"char_repetition_ratio":0.1715743,"word_repetition_ratio":0.025825677,"special_character_ratio":0.2048524,"punctuation_ratio":0.09030249,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98746616,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-17T21:21:47Z\",\"WARC-Record-ID\":\"<urn:uuid:4d0b36d4-19d3-42a6-a776-6a6a677bf575>\",\"Content-Length\":\"1049534\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:79404376-8e2d-42d9-b8d8-e9dfe7df1799>\",\"WARC-Concurrent-To\":\"<urn:uuid:89e9e3d8-9b4e-46fc-9902-6cf8f67b5c75>\",\"WARC-IP-Address\":\"172.67.158.169\",\"WARC-Target-URI\":\"https://www.arxiv-vanity.com/papers/hep-th/0505099/\",\"WARC-Payload-Digest\":\"sha1:ABOY4JBRQ7SRO34LAGSIL3E2BWSVEAJV\",\"WARC-Block-Digest\":\"sha1:CCK5GUHNQOCLLYQEEIHGRDUIWDON76MR\",\"WARC-Truncated\":\"length\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623487633444.37_warc_CC-MAIN-20210617192319-20210617222319-00403.warc.gz\"}"} |
http://www.vbforums.com/showthread.php?740059-RESOLVED-Can-t-seem-to-retrieve-a-specified-character-from-a-string-of-numbers&p=4538225 | [
"",
null,
"# Thread: [RESOLVED] Can't seem to retrieve a specified character from a string of numbers\n\n1. ##",
null,
"[RESOLVED] Can't seem to retrieve a specified character from a string of numbers\n\nI'm relatively new to VB, and I'm coding a graphing calculator to familiarize myself with it. I haven't figured out how to to the x^n function yet though.\n\nI made a function to retrieve a certain number from a text box, where the first character is \"^\", and the second/second and third are numbers.\n\nAn example of this not working is: 2^2 = 1.12589990684262E+15 (Where tbNum1 is \"2\" and tbOpr is \"^2\"\n\nHere is my code for the entire function:\n\nCode:\n```'tbopr IS WHERE THE SPECIFIED POWER GOES (x^n)\n'tbNum1 IS THE FIRST NUMBER, WHICH IS RAISED TO THE POWER \"p\"\n'tbCalcOut IS THE TEXT BOX THE ANSWER IS OUTPUTTED TO, AND THE NUMBER THAT IS RAISED TO _\n'THE POWER \"p\" IF IT ISN'T EQUAL TO 0.\n\nPrivate Function Power()\nDim p As Integer = 1\nIf Len(tbOpr.Text) = 2 Then\np = Convert.ToInt16(GetChar(tbOpr.Text, 2))\nElseIf Len(tbOpr.Text) = 3 Then\np = Convert.ToInt16(GetChar(tbOpr.Text, 2) & GetChar(tbOpr.Text, 3))\nElse\nMsgBox(\"Power is too high.\", , \"Error\")\nEnd If\nIf tbCalcOut.Text <> \"\" And tbCalcOut.Text <> \"0\" Then\ntbNum1.Text = tbCalcOut.Text\ntbCalcOut.Text = tbNum1.Text ^ p\nElseIf tbCalcOut.Text = \"0\" Or tbCalcOut.Text = \"\" And tbNum1.Text <> \"\" And _\ntbNum1.Text <> \"0\" Then\ntbCalcOut.Text = tbNum1.Text ^ p\nEnd If\nEnd Function```\nThanks guys, this really has stumped me.",
null,
"",
null,
"Reply With Quote\n\n2. ## Re: Can't seem to retrieve a specified character from a string of numbers\n\nAdd this function which return the power part\nCode:\n``` Private Function GetPower(strText As String) As Integer\nDim p As Integer = 1\nIf strText.Contains(\"^\") Then\np = CInt(strText.Substring(strText.IndexOf(\"^\") + 1))\nEnd If\n\nReturn p\nEnd Function```\nCall it from your function like this\nCode:\n``` Private Function Power()\nDim p As Integer = GetPower(tbOpr.Text)\nIf p > 99 Then\nMsgBox(\"Power is too high.\", , \"Error\")\nExit Function ' don't continue\nEnd If\nIf tbCalcOut.Text <> \"\" And tbCalcOut.Text <> \"0\" Then\ntbNum1.Text = tbCalcOut.Text\ntbCalcOut.Text = tbNum1.Text ^ p\nElseIf tbCalcOut.Text = \"0\" Or tbCalcOut.Text = \"\" And tbNum1.Text <> \"\" And _\ntbNum1.Text <> \"0\" Then\ntbCalcOut.Text = tbNum1.Text ^ p\nEnd If\nEnd Function```",
null,
"",
null,
"Reply With Quote\n\n3. ## Re: Can't seem to retrieve a specified character from a string of numbers\n\nThanks so much!\nWhy exactly did my code not work, if you don't mind me asking?",
null,
"",
null,
"Reply With Quote\n\n4. ## Re: [RESOLVED] Can't seem to retrieve a specified character from a string of numbers\n\nWhy exactly did my code not work,\nBecause you are not search for \"^\" inside the tbOpr.Text to know where the power number start, but instead you are picking it from fixed position(s) 2 or 2 & 3 which will never return correct power number from string like \"1024^3\".",
null,
"",
null,
"Reply With Quote\n\n5. ## Re: [RESOLVED] Can't seem to retrieve a specified character from a string of numbers\n\nGood to know!\nThanks so much for your help!",
null,
"",
null,
"Reply With Quote\n\ncalculator, convert, integer",
null,
"####",
null,
"Posting Permissions\n\n• You may not post new threads\n• You may not post replies\n• You may not post attachments\n• You may not edit your posts\n•\n\nFeatured"
] | [
null,
"http://www.qsstats.com/dcsjkgmqe10000s1olv9xxzva_8z2v/njs.gif",
null,
"http://www.vbforums.com/images/icons/completeclear.gif",
null,
"http://www.vbforums.com/images/misc/progress.gif",
null,
"http://www.vbforums.com/clear.gif",
null,
"http://www.vbforums.com/images/misc/progress.gif",
null,
"http://www.vbforums.com/clear.gif",
null,
"http://www.vbforums.com/images/misc/progress.gif",
null,
"http://www.vbforums.com/clear.gif",
null,
"http://www.vbforums.com/images/misc/progress.gif",
null,
"http://www.vbforums.com/clear.gif",
null,
"http://www.vbforums.com/images/misc/progress.gif",
null,
"http://www.vbforums.com/clear.gif",
null,
"http://www.vbforums.com/images/misc/11x11progress.gif",
null,
"http://www.vbforums.com/images/buttons/collapse_40b.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.67320204,"math_prob":0.77115065,"size":3335,"snap":"2019-43-2019-47","text_gpt3_token_len":1010,"char_repetition_ratio":0.14109877,"word_repetition_ratio":0.2749141,"special_character_ratio":0.30164918,"punctuation_ratio":0.14057972,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98011917,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-20T16:56:36Z\",\"WARC-Record-ID\":\"<urn:uuid:de44dcdf-52bd-49d0-92b8-a8e5ab6b2bad>\",\"Content-Length\":\"104433\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:13f68ba8-981d-4707-8c5e-3afde9b1123e>\",\"WARC-Concurrent-To\":\"<urn:uuid:ed23db7a-3a4a-4b9d-96e3-92512691d722>\",\"WARC-IP-Address\":\"70.42.23.51\",\"WARC-Target-URI\":\"http://www.vbforums.com/showthread.php?740059-RESOLVED-Can-t-seem-to-retrieve-a-specified-character-from-a-string-of-numbers&p=4538225\",\"WARC-Payload-Digest\":\"sha1:ODY7ZAJFDOWN5QF7AQCMSDGMIOLQMM7L\",\"WARC-Block-Digest\":\"sha1:TO4F5JAKEW3TN4X6FRK4F7JFAXENHLBW\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670597.74_warc_CC-MAIN-20191120162215-20191120190215-00421.warc.gz\"}"} |
https://newpathworksheets.com/math/grade-7/area-and-circumference-of-circles/ohio-standards | [
"## ◂Math Worksheets and Study Guides Seventh Grade. Area and Circumference of Circles\n\n### The resources above correspond to the standards listed below:\n\n#### Ohio Standards\n\nOH.GSS. Geometry and Spatial Sense: Students identify, classify, compare and analyze characteristics, properties and relationships of one-, two- and three-dimensional geometric figures and objects. Students use spatial reasoning, properties of geometric objects, and transformations to analyze mathematical situations and solve problems.\nGSS.B. Draw circles, and identify and determine the relationships among the radius, diameter, center and circumference.\nOH.M. Measurement: Students estimate and measure to a required degree of accuracy and precision by selecting and using appropriate units, tools and technologies.\nM.C. Identify appropriate tools and apply appropriate techniques for measuring angles, perimeter or circumference and area of triangles, quadrilaterals, circles and composite shapes, and surface area and volume of prisms and cylinders."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8487356,"math_prob":0.8627317,"size":870,"snap":"2019-35-2019-39","text_gpt3_token_len":151,"char_repetition_ratio":0.11778291,"word_repetition_ratio":0.0,"special_character_ratio":0.16666667,"punctuation_ratio":0.19594595,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97952515,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-09-16T06:51:39Z\",\"WARC-Record-ID\":\"<urn:uuid:d6d4131d-dc09-4f74-8cc4-5ee2db428dfa>\",\"Content-Length\":\"35211\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5c6cb256-7d1b-4fd0-8ac7-a31a57650557>\",\"WARC-Concurrent-To\":\"<urn:uuid:7234717b-cefc-47bb-902e-882a2c1bbbdc>\",\"WARC-IP-Address\":\"13.58.13.153\",\"WARC-Target-URI\":\"https://newpathworksheets.com/math/grade-7/area-and-circumference-of-circles/ohio-standards\",\"WARC-Payload-Digest\":\"sha1:IOWGURRA3M3EFGKD76KUKVG25CUJ7GGF\",\"WARC-Block-Digest\":\"sha1:HSLDGP2K5Q62AMH3RTKUV4IF2UBP2ATR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-39/CC-MAIN-2019-39_segments_1568514572491.38_warc_CC-MAIN-20190916060046-20190916082046-00457.warc.gz\"}"} |
https://stackoom.com/en/question/4zy3p | [
"# How to round down two significant figures in python?\n\nI've seen the solutions around but they mostly round up to two significant figures and not down\n\nI have tried these few methods\n\n``````import math\nv = 0.000129\nmath.floor(v*100)/100\n\n-output-\n0.0\n``````\n\nor\n\n``````v = 0.000129\nfrom decimal import Decimal\nfloat(f\"{Decimal(f'{v:.2g}'):f}\")\n\n-output-\n0.00013\n``````\n\nAs you can see, I want to have two significant figures but do not want them rounded up. Decimal works to give the two sig figs but it rounds up while math just simply gives me 0.\n\nie a few to test\n\n``````1999 -> 1900\n29901 - > 29000\n0.0199 -> 0.019\n``````\n\nThanks!\n\nMathematical solution without using any string conversion:\n\n``````def round_down(n, sig_figs):\nimport math\nreturn n - n % 10 ** math.ceil(math.log(abs(n), 10) - sig_figs)\n\n>>> [round_down(n, 2) for n in [1990, 29901, 0.0199]]\n[1900, 29000, 0.019]\n``````\n\nCaveats:\n\n• Doesn't work with input of `0`\n• Negative numbers are literally rounded in the negative direction, not towards zero (eg `-0.0199``-0.02` )\nQuestion not resolved ? You can try search: How to round down two significant figures in python?."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.753595,"math_prob":0.85287666,"size":997,"snap":"2023-40-2023-50","text_gpt3_token_len":311,"char_repetition_ratio":0.09063444,"word_repetition_ratio":0.0,"special_character_ratio":0.37311935,"punctuation_ratio":0.16517857,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9941479,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-02T01:40:52Z\",\"WARC-Record-ID\":\"<urn:uuid:7a809826-5354-4cf3-872f-ab3c618a0c76>\",\"Content-Length\":\"41991\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:67d36c1b-2146-4bba-9f00-b10eba89337b>\",\"WARC-Concurrent-To\":\"<urn:uuid:398dfaab-6fb5-448a-93d1-b70e3074c33b>\",\"WARC-IP-Address\":\"118.31.174.222\",\"WARC-Target-URI\":\"https://stackoom.com/en/question/4zy3p\",\"WARC-Payload-Digest\":\"sha1:W6IRRPMIQJA3J465HDTLBBVP37WOXMDW\",\"WARC-Block-Digest\":\"sha1:JT4I4XGIAVP7PIE4XHHA4RSRHE347QUK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100309.57_warc_CC-MAIN-20231202010506-20231202040506-00866.warc.gz\"}"} |
https://softmath.com/tutorials-3/relations/differential-equations-problem.html | [
"English | Español\n\n# Try our Free Online Math Solver!",
null,
"Online Math Solver\n\n Depdendent Variable\n\n Number of equations to solve: 23456789\n Equ. #1:\n Equ. #2:\n\n Equ. #3:\n\n Equ. #4:\n\n Equ. #5:\n\n Equ. #6:\n\n Equ. #7:\n\n Equ. #8:\n\n Equ. #9:\n\n Solve for:\n\n Dependent Variable\n\n Number of inequalities to solve: 23456789\n Ineq. #1:\n Ineq. #2:\n\n Ineq. #3:\n\n Ineq. #4:\n\n Ineq. #5:\n\n Ineq. #6:\n\n Ineq. #7:\n\n Ineq. #8:\n\n Ineq. #9:\n\n Solve for:\n\n Please use this form if you would like to have this math solver on your website, free of charge. Name: Email: Your Website: Msg:\n\n# Differential equations Problem Set 6\n\nPlease answer all of the following questions. The problems marked with an asterisk will be\ngraded while the remained problems will be checked for completeness. Staple your work to\n\n1. Section 10.1 (pp. 575–576) 5, 6, 7, 9, 15*, 16*.\n\n2. Section 10.2 (pp. 585–587) 14*, 15, 17.\n\n3. A second- order Cauchy -Euler equation has the form",
null,
"where α are β are constants (see Section 5.5). Homogeneous solutions of this equation may\nbe found in a similar manner as those for constant coefficient equations . The purpose of\nthis exercise is to illustrate this point.\n\n(a) Show that y = xr is a solution of the Cauchy-Euler equation if r satisfies the characteristic\npolynomial",
null,
"Let us now assume that r1 and r2 are roots of the characteristic polynomial obtained using\nthe quadratic formula . There are three cases to consider.\n\n1. If r1 and r2 are real and unequal, then the general solution has the form",
null,
"2. If r1 and r2 are complex conjugates, equal to λ±iμ say, then the general solution has\nthe form",
null,
"3. If r1 = r2 = r, then the general solution has the form",
null,
"(b) Find general solutions for the following equations .",
null,
"Parts (a) and (b) are “starred” problems.\n\n Prev Next"
] | [
null,
"https://softmath.com/images/video-pages/solver-top.png",
null,
"https://softmath.com/tutorials-3/relations/articles_imgs/2607/differ18.jpg",
null,
"https://softmath.com/tutorials-3/relations/articles_imgs/2607/differ19.jpg",
null,
"https://softmath.com/tutorials-3/relations/articles_imgs/2607/differ20.jpg",
null,
"https://softmath.com/tutorials-3/relations/articles_imgs/2607/differ21.jpg",
null,
"https://softmath.com/tutorials-3/relations/articles_imgs/2607/differ22.jpg",
null,
"https://softmath.com/tutorials-3/relations/articles_imgs/2607/differ23.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87699944,"math_prob":0.9906531,"size":1344,"snap":"2020-24-2020-29","text_gpt3_token_len":365,"char_repetition_ratio":0.12910448,"word_repetition_ratio":0.04680851,"special_character_ratio":0.2641369,"punctuation_ratio":0.13043478,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9991202,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14],"im_url_duplicate_count":[null,null,null,4,null,4,null,4,null,4,null,4,null,4,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-03T17:24:41Z\",\"WARC-Record-ID\":\"<urn:uuid:f3c1715e-f8d8-4e8e-9be0-4602cc50b353>\",\"Content-Length\":\"87295\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d67f1958-ec1f-4c88-a0a6-a94f839bd453>\",\"WARC-Concurrent-To\":\"<urn:uuid:dcfc29f2-0529-45b7-840d-59df9d5c8d44>\",\"WARC-IP-Address\":\"52.43.142.96\",\"WARC-Target-URI\":\"https://softmath.com/tutorials-3/relations/differential-equations-problem.html\",\"WARC-Payload-Digest\":\"sha1:ZOEM5IIYHPNKGDE7CLFYV2GBIF2F2JFT\",\"WARC-Block-Digest\":\"sha1:JU6QQOAY6ZLI4YZ3YZWWE2346WXES3VI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655882634.5_warc_CC-MAIN-20200703153451-20200703183451-00452.warc.gz\"}"} |
https://montessorifromtheheart.com/2016/08/30/numerals-vs-quantity-at-30-months/ | [
"This wooden number-to-quantity interlocking self-correcting Numbers Puzzle (buy similar here) is more abstract as a toddler is not actually holding any quantity to substantiate the value (like with Spindles or Numbers Rods), but rather matches a numeral (e.g. number 2) to the quantity shown on a picture (2 cows). This puzzle is great for matching and counting skills since the pictures are colorful and feature familiar objects/animals.",
null,
"A child would first sort the puzzle pieces into two piles: one with numbers and the other with quantities (pictures of the objects).",
null,
"Adrian then would sequence numbers in order from 1-10, by counting objects on a picture and matching them to the correct numeral.\n\nTo substantiate the concept of numeral vs quantity, you may want to present a 3🅿️🌠 Three Period Lesson. (Read a detailed post about the presentation here).\n\nAt 34 months, Adrian is able to correctly complete the entire 3🅿️🌠 Three Period Lesson with numerals one through ten.\n\nPresenting a 3🅿️🌠 Three Period Lesson:\n\n1. (P1) “This is 1, this is 2, ….3”\n2. (P2) “Will you show me 1? Will you show me 2? … 3? \"\n3. (P3) “What is this?",
null,
"\"Show me 5\"; \"Where is 9?\"; \"What number is this?\" Adrian would correctly answer each time.\n\nThus, at 34 months, when asked randomly, Adrian can orderly sequence, recognize and enunciate each number from 1-10. I believe that such understanding was only achieved through the concrete representation of Montessori math materials, which necessarily build on each other just like in other areas. So, before introducing this puzzle, you would start with small concept of numbers one through 10. For example, number \"one\" is represented by a numeral -1 as well as by quantity when a child is actually holding one apple/car/spindle in his/her hands. Such association of quantity to numeral is very concrete in nature: a child is holding one, two, or three spindles and realizes how differently it feels than holding ten. Such helps children understand in a concrete way basic mathematical concepts, while instilling the love for learning, numbers, and math."
] | [
null,
"https://i1.wp.com/montessorifromtheheart.com/wp-content/uploads/my-blog/6a01b8d19ea395970c01b8d2199cbe970c.jpg",
null,
"https://i1.wp.com/montessorifromtheheart.com/wp-content/uploads/my-blog/6a01b8d19ea395970c01b7c88fe176970b.jpg",
null,
"https://i2.wp.com/montessorifromtheheart.com/wp-content/uploads/my-blog/6a01b8d19ea395970c01b7c88fe18d970b.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.928929,"math_prob":0.95112807,"size":2090,"snap":"2021-04-2021-17","text_gpt3_token_len":489,"char_repetition_ratio":0.10354746,"word_repetition_ratio":0.0,"special_character_ratio":0.22488038,"punctuation_ratio":0.117794484,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.96216106,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,4,null,4,null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-01-24T22:25:20Z\",\"WARC-Record-ID\":\"<urn:uuid:9311997f-9895-421b-924f-dee54dd751ab>\",\"Content-Length\":\"163435\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:21c24fa6-bd9f-472b-a53b-180283e507e7>\",\"WARC-Concurrent-To\":\"<urn:uuid:590c36dc-41e0-482a-84ca-9da93ee18ffd>\",\"WARC-IP-Address\":\"192.0.78.144\",\"WARC-Target-URI\":\"https://montessorifromtheheart.com/2016/08/30/numerals-vs-quantity-at-30-months/\",\"WARC-Payload-Digest\":\"sha1:2ZI7XGAO7DRM2IPTM4FLIL5O4JIREDFZ\",\"WARC-Block-Digest\":\"sha1:5SLPQ5J2FY57ZJRLIJJDFM5KJL2XKOCJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-04/CC-MAIN-2021-04_segments_1610703557462.87_warc_CC-MAIN-20210124204052-20210124234052-00559.warc.gz\"}"} |
https://www.datasciencemadesimple.com/quantile-quantile-plot-in-r-qq-plot-in-r/ | [
"# Quantile – Quantile plot in R or QQ Plot in R\n\nQuantile – Quantile plot in R which is also known as QQ plot in R is one of the best way to test how well the data is distributed normally. QQ plot is even better than histogram to test the normality of the data. we will be plotting Q-Q plot with qqnorm() function in R. Q-Q plot in R is explained with example.\n\nFor what QQ plot is used for ?\n\n• QQ plot is used to test the normality of a data\n• QQ plot is used to compare two data\n\nLet’s see both with an example\n\n#### Quantile – Quantile plot in R to test the normality of a data:\n\nIn R, qqnorm() function plots your data against a standard normal distribution.\n\n1. Give data as an input to qqnorm() function\n2. R takes up this data and create a sample values with standard normal distribution\n3. Then R compares these two data sets (input data set and generated standard normal data set)\n4. Sorts both the data sets\n5. Then finally plots these two sorted data sets against each other.\n\nAll the above steps are done simply by using QQnorm function in R\n\n#### Quantile – Quantile plot in R Example (test the normality):\n\nLet consider inbuilt “trees” data set and let’s check the normality of trees height\n\n```# QQ plot in R to test the normality of data\n\nqqnorm(trees\\$Height,main=\"Height of black cherry trees\")\nqqline(trees\\$Height) ## adds the line to the plot\n```\n\nwhen we give trees height as an input to the qqnorm() function in R. R executes all the above mentioned steps and returns the following QQ plot",
null,
"#### Quantile – Quantile plot in R to compare two data set:\n\n1. In this method R simply takes up two data sets\n2. Sorts both the data sets\n3. Plots these two sorted data sets against each other.\n\n#### Example of QQ plot in R (compare two data set):\n\nLets use same trees data set and compare the trees Girth and its Volume with QQ plot function as shown below\n\n```# QQ plot in R to compare two data samples\n\nqqplot(trees\\$Volume,trees\\$Girth, main=\"Volume vs Girth of trees\")\n```\n\ntwo data (volume and girth) are sorted and plotted against each other, so the output will be",
null,
""
] | [
null,
"https://www.datasciencemadesimple.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif",
null,
"https://www.datasciencemadesimple.com/wp-content/plugins/a3-lazy-load/assets/images/lazy_placeholder.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8802939,"math_prob":0.9810865,"size":1973,"snap":"2020-34-2020-40","text_gpt3_token_len":471,"char_repetition_ratio":0.17673945,"word_repetition_ratio":0.13586956,"special_character_ratio":0.22554485,"punctuation_ratio":0.046511628,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995684,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-18T07:08:41Z\",\"WARC-Record-ID\":\"<urn:uuid:efa1e0ff-fa02-4a5f-8a9e-7514de81e645>\",\"Content-Length\":\"65158\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e1edf0ef-08ee-456f-9468-b139b140d5ca>\",\"WARC-Concurrent-To\":\"<urn:uuid:90a87d2a-db87-4395-a554-5452c81c4040>\",\"WARC-IP-Address\":\"172.67.190.10\",\"WARC-Target-URI\":\"https://www.datasciencemadesimple.com/quantile-quantile-plot-in-r-qq-plot-in-r/\",\"WARC-Payload-Digest\":\"sha1:ELOWDD5LTPPAQLF3OLDSBHQSHKOBTU5S\",\"WARC-Block-Digest\":\"sha1:GEYHRWBRIENWS7I7VAL75VPP6TWWV3PD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400187354.1_warc_CC-MAIN-20200918061627-20200918091627-00141.warc.gz\"}"} |
https://www.inote.tw/tag/google-drive | [
"◎◎ 網站 小檔案◎◎\n\n■ 網站性質:檔案共享、雲端硬碟、線上文書",
null,
"`=unique(transpose(split(ArrayFormula(concatenate(\\$A2:A&\" \")),\" \")))`",
null,
"`=unique(transpose(split(ArrayFormula(concatenate(\\$B2:B&\" \")),\" \")))`\n\n`=SUMIF(A2:A11,D2,C2:C11)`",
null,
"`=SUMIF(A2:A11,D3,C2:C11)`",
null,
"",
null,
"",
null,
""
] | [
null,
"data:image/svg+xml;utf8,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20640%20388'%3E%3C/svg%3E",
null,
"data:image/svg+xml;utf8,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20640%20388'%3E%3C/svg%3E",
null,
"data:image/svg+xml;utf8,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%20640%20388'%3E%3C/svg%3E",
null,
"data:image/svg+xml;utf8,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%200%200'%3E%3C/svg%3E",
null,
"data:image/svg+xml;utf8,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%200%200'%3E%3C/svg%3E",
null,
"data:image/svg+xml;utf8,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%200%200'%3E%3C/svg%3E",
null
] | {"ft_lang_label":"__label__zh","ft_lang_prob":0.93358654,"math_prob":0.9983976,"size":2107,"snap":"2022-27-2022-33","text_gpt3_token_len":1499,"char_repetition_ratio":0.23965763,"word_repetition_ratio":0.0,"special_character_ratio":0.21547224,"punctuation_ratio":0.058641974,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99502814,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-10T10:39:14Z\",\"WARC-Record-ID\":\"<urn:uuid:2ddccbd5-2184-499b-ac27-b2b37827bd85>\",\"Content-Length\":\"82816\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:53f9d330-15fb-4f22-93f7-87cbd98424c8>\",\"WARC-Concurrent-To\":\"<urn:uuid:f0074b88-0d4a-4b90-a156-38281f75114f>\",\"WARC-IP-Address\":\"162.159.137.54\",\"WARC-Target-URI\":\"https://www.inote.tw/tag/google-drive\",\"WARC-Payload-Digest\":\"sha1:XCBXKH45WGA2C46CKVLPMR5GI5HEYW6I\",\"WARC-Block-Digest\":\"sha1:74MRV3J4SUBCHFMNXJBM5QYKEV6D3Y3L\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571153.86_warc_CC-MAIN-20220810100712-20220810130712-00605.warc.gz\"}"} |
https://convertoctopus.com/79-cubic-inches-to-cubic-meters | [
"## Conversion formula\n\nThe conversion factor from cubic inches to cubic meters is 1.63870640693E-5, which means that 1 cubic inch is equal to 1.63870640693E-5 cubic meters:\n\n1 in3 = 1.63870640693E-5 m3\n\nTo convert 79 cubic inches into cubic meters we have to multiply 79 by the conversion factor in order to get the volume amount from cubic inches to cubic meters. We can also form a simple proportion to calculate the result:\n\n1 in3 → 1.63870640693E-5 m3\n\n79 in3 → V(m3)\n\nSolve the above proportion to obtain the volume V in cubic meters:\n\nV(m3) = 79 in3 × 1.63870640693E-5 m3\n\nV(m3) = 0.0012945780614747 m3\n\nThe final result is:\n\n79 in3 → 0.0012945780614747 m3\n\nWe conclude that 79 cubic inches is equivalent to 0.0012945780614747 cubic meters:\n\n79 cubic inches = 0.0012945780614747 cubic meters\n\n## Alternative conversion\n\nWe can also convert by utilizing the inverse value of the conversion factor. In this case 1 cubic meter is equal to 772.45245362869 × 79 cubic inches.\n\nAnother way is saying that 79 cubic inches is equal to 1 ÷ 772.45245362869 cubic meters.\n\n## Approximate result\n\nFor practical purposes we can round our final result to an approximate numerical value. We can say that seventy-nine cubic inches is approximately zero point zero zero one cubic meters:\n\n79 in3 ≅ 0.001 m3\n\nAn alternative is also that one cubic meter is approximately seven hundred seventy-two point four five two times seventy-nine cubic inches.\n\n## Conversion table\n\n### cubic inches to cubic meters chart\n\nFor quick reference purposes, below is the conversion table you can use to convert from cubic inches to cubic meters\n\ncubic inches (in3) cubic meters (m3)\n80 cubic inches 0.001 cubic meters\n81 cubic inches 0.001 cubic meters\n82 cubic inches 0.001 cubic meters\n83 cubic inches 0.001 cubic meters\n84 cubic inches 0.001 cubic meters\n85 cubic inches 0.001 cubic meters\n86 cubic inches 0.001 cubic meters\n87 cubic inches 0.001 cubic meters\n88 cubic inches 0.001 cubic meters\n89 cubic inches 0.001 cubic meters"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6532102,"math_prob":0.9960811,"size":2001,"snap":"2022-27-2022-33","text_gpt3_token_len":557,"char_repetition_ratio":0.2889334,"word_repetition_ratio":0.055214725,"special_character_ratio":0.34082958,"punctuation_ratio":0.0927835,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9988902,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-13T06:44:54Z\",\"WARC-Record-ID\":\"<urn:uuid:f8d44574-f2df-4f7d-9a4b-4b8dd5d05c41>\",\"Content-Length\":\"30674\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ebc65624-0205-4bfc-8143-1b24becc58be>\",\"WARC-Concurrent-To\":\"<urn:uuid:ba550c81-b29c-4d44-9a8d-40eae5cc9b8c>\",\"WARC-IP-Address\":\"104.21.29.10\",\"WARC-Target-URI\":\"https://convertoctopus.com/79-cubic-inches-to-cubic-meters\",\"WARC-Payload-Digest\":\"sha1:4RD6A5FBLT6236AEDCTPHZXZYJXSFK4R\",\"WARC-Block-Digest\":\"sha1:NV2F5Y4YR3EQF56GDKYJKISG4QGIOCF2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571909.51_warc_CC-MAIN-20220813051311-20220813081311-00184.warc.gz\"}"} |
https://infoscience.epfl.ch/record/182627?ln=en | [
"## Quotient-method Algorithms for Input-affine Single-input Nonlinear Systems\n\nMany real-world systems are intrinsically nonlinear. This thesis proposes various algorithms for designing control laws for input-affine single-input nonlinear systems. These algorithms, which are based on the concept of quotients used in nonlinear control design, can break down a single-input system into cascade of smaller subsystems of reduced dimension. These subsystems are well defined for feedback-linearizable systems. However, approximations are required to handle non-feedback-linearizable systems. The method proceeds iteratively and consists of two stages. During the forward stage, an equivalence relationship is defined to isolate the states that are not directly affected by the input, which reduces the dimension of the system. The resulting system is an input-affine single-input system controlled by a pseudo-input which represents a degree of freedom in the algorithm. The pseudo-input is a complementary state required to complete the diffeomorphism. This procedure is repeated (n − 1) times to give a one-dimensional system, where n is the dimension of the system. The backward stage begins with the one-dimensional system obtained at the end of the forward stage. It iteratively builds the control law required to stabilize the system. At every iteration, a desired profile of the pseudo-input is computed. In this next iteration, this desired profile is used to define an error that is driven asymptotically to zero using an appropriate control law. The quotient method is implemented through two algorithms, with and without diffeomorphism. The algorithm with diffeomorphism clearly depicts the dimension reduction at every iteration and provides a clear insight into the method. In this algorithm, a diffeomorphism is synthesized in order to obtain the normal form of the input vector field. The pseudo-input is the last coordinate of the new coordinate system. A normal projection is used to reduce the dimension of the system. For the algorithm to proceed without any approximation, it is essential that the last coordinate appears linearly in the projection of the transformed drift vector field. Necessary and sufficient conditions to achieve linearity in the last coordinate are given. Having the pseudo-input appearing linearly enables to represent the projected system as an input-affine system. Hence, the whole procedure can be repeated (n−1) times so as to obtain a one-dimensional system. In the second algorithm, a projection function based on the input vector field is defined that imitates both operators, the push forward operater and the normal projection operator of the previous algorithm. Due to the lack of an actual diffeomorphism, there is no apparent dimension reduction. Moreover, it is not directly possible to separate the drift vector field from the input vector field in the projected system. To overcome this obstacle, a bracket is defined that commutes with the projection function. This bracket provides the input vector field of the projected system. This enables the algorithm to proceed by repeating this procedure (n−1) times. As compared with the algorithm with diffeomorphism, the computational effort is reduced. The mathematical tools required to implement this algorithm are presented. A nice feature of these algorithms is the possibility to use the degrees of freedom to overcome singularities. This characteristic is demonstrated through a field-controlled DC motor. Furthermore, the algorithm also provides a way of approximating a non-feedback-linearizable system by a feedback-linearizable one. This has been demonstrated in the cases of the inverted pendulum and the acrobot. On the other hand, the algorithm without diffeomorphism has been demonstrated on the ball-on-a-wheel system. The quotient method can also be implemented whenever a simulation platform is available, that is when the differential equations for the system are not available in standard form. This is accomplished numerically by computing the required diffeomorphism based on the data available from the simulation platform. Two versions of the numerical algorithm are presented. One version leads to faster computations but uses approximation at various steps. The second version has better accuracy but requires considerably more computational time.\n\nBonvin, Dominique\nMüllhaupt, Philippe\nYear:\n2012\nPublisher:\nLausanne, EPFL\nKeywords:\nOther identifiers:\nurn: urn:nbn:ch:bel-epfl-thesis5467-5\nLaboratories:\n\nNote: The status of this file is: EPFL only"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.92464966,"math_prob":0.90405685,"size":4296,"snap":"2020-34-2020-40","text_gpt3_token_len":787,"char_repetition_ratio":0.13909599,"word_repetition_ratio":0.007898894,"special_character_ratio":0.17108938,"punctuation_ratio":0.08551724,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9700234,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-08-12T10:14:21Z\",\"WARC-Record-ID\":\"<urn:uuid:c37025e1-227a-498e-8cd3-ff0a0558436f>\",\"Content-Length\":\"39689\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cf82486e-9b93-4ef5-8ba8-1aa0b51dbe69>\",\"WARC-Concurrent-To\":\"<urn:uuid:0a5e2388-ed7c-4de2-8b03-ced7e5932f9b>\",\"WARC-IP-Address\":\"34.250.186.131\",\"WARC-Target-URI\":\"https://infoscience.epfl.ch/record/182627?ln=en\",\"WARC-Payload-Digest\":\"sha1:HB4HYXW7PVC4BP236ZW7LNTVGS6L5O3Y\",\"WARC-Block-Digest\":\"sha1:P6WJJRJ3EAW53YSJ6HI6UWZJ3IQK5CKS\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-34/CC-MAIN-2020-34_segments_1596439738888.13_warc_CC-MAIN-20200812083025-20200812113025-00238.warc.gz\"}"} |
https://ch.mathworks.com/help/stats/hypergeometric-distribution-1.html?s_tid=CRUX_lftnav | [
"# Hypergeometric Distribution\n\nEvaluate the hypergeometric distribution or its inverse, generate pseudorandom samples\n\n## Functions\n\n `hygecdf` Hypergeometric cumulative distribution function `hygepdf` Hypergeometric probability density function `hygeinv` Hypergeometric inverse cumulative distribution function `hygestat` Hypergeometric mean and variance `hygernd` Hypergeometric random numbers `random` Random numbers\n\n## Topics\n\nHypergeometric Distribution\n\nThe hypergeometric distribution models the total number of successes in a fixed-size sample drawn without replacement from a finite population."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7904627,"math_prob":0.9905271,"size":806,"snap":"2021-21-2021-25","text_gpt3_token_len":162,"char_repetition_ratio":0.10723192,"word_repetition_ratio":0.0,"special_character_ratio":0.16873449,"punctuation_ratio":0.08208955,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9878627,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-11T22:56:20Z\",\"WARC-Record-ID\":\"<urn:uuid:9dbe1668-1ce5-4884-a327-cec70fe6a70e>\",\"Content-Length\":\"65027\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:48b88111-f7f9-4fc4-b06f-d67f8acd76a7>\",\"WARC-Concurrent-To\":\"<urn:uuid:8dd237fa-8df8-4eda-a7d5-fbc5e1196ac8>\",\"WARC-IP-Address\":\"104.117.0.182\",\"WARC-Target-URI\":\"https://ch.mathworks.com/help/stats/hypergeometric-distribution-1.html?s_tid=CRUX_lftnav\",\"WARC-Payload-Digest\":\"sha1:NTEM2XCERSYPVUWGUQJX3OG3BSOOQ6YK\",\"WARC-Block-Digest\":\"sha1:VTHLEUXHFQJTDN3XK6EBPPBVD3V27KC4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243990419.12_warc_CC-MAIN-20210511214444-20210512004444-00313.warc.gz\"}"} |
https://math.answers.com/Q/What_is_62_percent_of_62 | [
"",
null,
"",
null,
"",
null,
"",
null,
"0\n\n# What is 62 percent of 62?\n\nTo find 62 percent of a number, multiply the number by 0.62. In this instance, 0.62 x 62 = 38.44. Therefore, 62 percent of 62 is equal to 38.44.",
null,
"Study guides\n\n20 cards\n\n## A number a power of a variable or a product of the two is a monomial while a polynomial is the of monomials\n\n➡️\nSee all cards\n3.81\n2052 Reviews",
null,
"Earn +20 pts",
null,
"",
null,
""
] | [
null,
"https://math.answers.com/icons/searchIcon.svg",
null,
"https://math.answers.com/icons/searchGlassWhiteIcon.svg",
null,
"https://math.answers.com/icons/notificationBellIcon.svg",
null,
"https://math.answers.com/icons/coinIcon.svg",
null,
"https://math.answers.com/icons/sendIcon.svg",
null,
"https://math.answers.com/icons/coinIcon.svg",
null,
"https://math.answers.com/icons/searchIcon.svg",
null,
"https://st.answers.com/html_test_assets/imp_-_pixel.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9119694,"math_prob":0.995843,"size":354,"snap":"2022-40-2023-06","text_gpt3_token_len":143,"char_repetition_ratio":0.28857142,"word_repetition_ratio":0.05,"special_character_ratio":0.60169494,"punctuation_ratio":0.13829787,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9564847,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-02-08T14:57:51Z\",\"WARC-Record-ID\":\"<urn:uuid:050fc824-6978-44d4-8757-0a2f1e4dc4d6>\",\"Content-Length\":\"192754\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bca3100f-e28c-4938-8164-54cd00b1b123>\",\"WARC-Concurrent-To\":\"<urn:uuid:fb28497a-b594-4979-b175-2371415c9913>\",\"WARC-IP-Address\":\"146.75.32.203\",\"WARC-Target-URI\":\"https://math.answers.com/Q/What_is_62_percent_of_62\",\"WARC-Payload-Digest\":\"sha1:HNWV5UEWK3MFCYPXQSATCZWXNXKVNH4Q\",\"WARC-Block-Digest\":\"sha1:7KHEQPN7AB4OMNQCLUAGTLSG4DWHGXXF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764500813.58_warc_CC-MAIN-20230208123621-20230208153621-00140.warc.gz\"}"} |
http://ghilbert-app.appspot.com/general/Tarski's_geometry_axioms.ghi | [
"# Creative Commons Attribution-Share Alike 3.0 Unported (http://creativecommons.org/licenses/by-sa/3.0/) # {{header # | title = Tarski's axioms # | subtitle = # | left = # | right = # | shortcut = # | notes = Since [[w:Euclid|Euclid]], geometry has been presented as following from postulates. However, it was not until the 20th century that a complete set of postulates were put forward. This page is for one such set, the [[w:Tarski's axioms|first-order axiomization by Tarski]]. It is less powerful than full Euclidian geometry and more powerful than compass-and-straightedge geometry.footnote 5 on page 191 of Tarski and Givant (1999) It makes reference to points (not directly to lines, angles, or circles), and has two relationships between points: betweenness and congruence. The version here is for two dimensions. Adapting the axioms for one dimension is complicated,Tarski and Givant (1999), pages 204–209 but only slight modifications are needed for more than two dimensions.Tarski and Givant (1999), page 195 # }} # {{modules # | parameters = [[Interface:Classical propositional calculus|Classical propositional calculus]], [[Interface:First-order logic with quantifiability]] # | importedby = [[Line segment congruence]] # | exportedby = [[Tarski's geometry axioms derived from real numbers]] # }} # # First, we adopt the axioms of [[Interface:Classical propositional calculus|propositional logic]] and [[Interface:First-order logic with quantifiability|first-order logic]] (including equality): # param (CLASSICAL Classical_propositional_calculus.ghi () \"\") param (FIRSTORDER First-order_logic_with_quantifiability.ghi (CLASSICAL) \"\") # # The kind `object`, defined in first-order logic, represents a point: tvar (object x y z w u v) var (object a b c xx yy) # # == Congruence == # We introduce congruence of line segments; `(x y ≡ w z)` means that the line segment xy is the same length as the line segment wz. This property is also known as equidistance.Tarski and Givant, 1999, page 177 term (formula (≡ x y z w)) # # The distance from x to y is the same as the distance from y to x. This property is called reflexivity by Tarski and GivantTarski and Givant, 1999, page 177 and symmetry by Narboux.Narboux, 2007, page 141 Narboux also calls it the pseudo-commutativity property of the oriented distance (on page 148) and in his proofs pseudo_reflexivity.Narboux, 2007 stmt (CongruenceABBA () () (≡ x y y x)) # # A segment which has zero length starts and ends at the same point (although saying \"zero length\" is a bit of a shortcut, as the axioms are not based on real numbers or any other numbers). stmt (CongruenceIdentity () () (→ (≡ x y z z) (= x y))) # # Two segments which are congruent to a common segment are congruent to each other. stmt (CongruenceTransitivityAxiom () () (→ (∧ (≡ x y z u) (≡ x y v w)) (≡ z u v w))) # # == Betweenness == # The other fundamental formula is betweenness; `(between x y z)` signifies \"y is between x and z\". # term (formula (between x y z)) # # There are no other points between x and x. stmt (Indivisibility () () (→ (between x y x) (= x y))) # # === Pasch's axiom === # [[File:Tarski's formulation of Pasch's axiom.svg|left|thumb]] # Tarski's version of the [[w:Axiom of Pasch]]. # {{clear}} stmt (Pasch ((x a) (u a) (z a) (y a) (v a)) () (→ (∧ (between x u z) (between y v z)) (∃ a (∧ (between u a y) (between v a x))))) # # === Continuity === # [[File:Tarski's continuity axiom.svg|left|thumb]] # The variables `xx` and `yy` correspond with `x` and `y` in the diagram and [[w:Tarski's axioms|wikipedia]]. (We can't just call them `x` and `y` because we've declared `x` and `y` as objects, which unlike variables cannot be subject to quantification). tvar (formula φx ψy) stmt (Continuity ((φx yy) (φx a) (φx b) (ψy xx) (ψy a) (ψy b) ) () (→ (∃ a (∀ xx (∀ yy (→ (∧ φx ψy) (between a xx yy))))) (∃ b (∀ xx (∀ yy (→ (∧ φx ψy) (between xx b yy))))))) # # == Dimension == # [[File:Points in a plane equidistant to two given points lie on a line.svg|thumb|right|Upper dimension]] # The dimension is greater than one, stmt (LowerDimension () () (∃ a (∃ b (∃ c (∧ (∧ (¬ (between a b c)) (¬ (between b c a))) (¬ (between c a b)) ))))) # # and less than three. stmt (UpperDimension () () (→ (∧ (∧ (∧ (≡ x u x v) (≡ y u y v)) (≡ z u z v)) (¬ (= u v))) (∨ (∨ (between x y z) (between y z x)) (between z x y)))) # # == Axiom of Euclid == # [[File:Tarski's axiom of Euclid C.svg|thumb|right]] # There are quite a variety of ways to state Euclid's [[w:parallel postulate]]. Here we adopt one which says that if a point u is in the interior of ∠yxz (in the sense of being on the line segment yz drawn across the angle), then any point v which is further out (that is, u is between v and the vertex of the angle) will also be in the interior (in the sense that a line segment containing v can be drawn across the angle). stmt (AxiomEuclid ((x b a) (u b a) (v b a) (y b a) (z b a)) () ( → (∧ (∧ (between x u v) (between y u z)) (¬ (= x u))) (∃ a (∃ b (∧ (∧ (between x y a) (between x z b)) (between a v b)))))) # # == Five Segment == # [[File:Five segment.svg|thumb|right]] # This is a version of familiar theorems concerning congruent triangles (without any explicit reference to angles, of course). tvar (object x′ y′ z′ u′) stmt (OuterFiveSegment () () (→ (∧ (∧ (∧ (∧ (∧ (∧ (¬ (= x y)) (between x y z)) (between x′ y′ z′)) (≡ x y x′ y′)) (≡ y z y′ z′)) (≡ x u x′ u′)) (≡ y u y′ u′)) (≡ z u z′ u′)) ) # # == Segment Construction == # Given a line segment wx and a line segment yz, construct an extension of wx which is as long as yz is. stmt (SegmentConstruction ((w a) (x a) (y a) (z a)) () (∃ a (∧ (between w x a) (≡ x a y z)))) # # == Builders == # Being able to substitute equals for equals is generally taken as a logical axiom, but we need to provide it for every operator. tvar (object x0 x1 x2 x3 y0 y1 y2 y3) stmt (CongruenceBuilder () () ( → (∧ (∧ (∧ (= x0 y0) (= x1 y1)) (= x2 y2)) (= x3 y3)) (↔ (≡ x0 x1 x2 x3) (≡ y0 y1 y2 y3)) )) stmt (BetweenBuilder () () ( → (∧ (∧ (= x0 y0) (= x1 y1)) (= x2 y2)) (↔ (between x0 x1 x2) (between y0 y1 y2)) )) # # == Comments about the predicate logic == # # There are two related comments to make about translating the predicate logic used in Tarski and Givant to what we use here. The Tarski and Givant paper, except as explicitly noted in axiom schema As. 11, does not contain axiom schemas but instead concrete axioms. The corresponding concept, given our [[Interface:First-order logic with quantifiability|first-order logic]], would be to use `variable` (rather than `object`) everywhere with distinct variable constraints between all variables (again, except for As. 11 which has explicit distinct variable constraints in the Tarski and Givant paper).Tarski and Givant, 1999, page 177 and page 185 # For convenience, we loosen this in two ways. First of all, we use `object` instead of `variable` for all variables not subject to quantification (for comparison, this is similar to the way that metamath handles their complex number axioms[http://us.metamath.org/mpeuni/mmcomplex.html Real and Complex Numbers], last updated on May 6, 2008, paragraph beginning \"In case you are wondering: Why do we use the purple class variables for most postulates instead of the more conventional-looking red set variables?\"). Secondly, we only supply distinct variable constraints where quantifiers are involved (this also parallels metamath, although the metamath page doesn't explicitly discuss it). These changes do not affect the mathematical meaning of the axioms or their strength: for an example of translating axioms stated using `variable` and distinct variable constraints on everything, to axioms in the style presented here, see [[First steps in set theory]]. # # == Expressions for points == # Geometry traditionally proves the existence of a point and then assigns it to a variable, rather than providing an expression for that point. For example, we might say \"let C be the midpoint of the line segment A B\" rather than having a notation \"midpoint A B\". To supply that kind of notation, we'd need an axiom analogous to `Abstraction` in [[Interface:Zermelo-Fraenkel set theory]] (of course the notation wouldn't create a set, just a single point for which a formula holds). We do not pursue this notation, in deference to tradition and to avoid complexities in convincing ourselves that such an extension would not inadvertently make our system inconsistent or increase its strength. # # == Tarski's axioms as the basis for geometry == # Tarski's axioms are intended to be sufficient for the development of classical geometry (in the style of Euclid's ''Elements'' and similar works). Getting from the axioms to the familiar theorems involving congruent triangles, angles, midpoints, perpendicular and parallel lines, and the like does entail quite a few proofs. They are broken up into the following pages, with references to the corresponding chapters in Narboux.Narboux, 2007, which references the chapter numbering to W. Schwabhäuser, W Szmielew, and A. Tarski (1983), ''Metamathematische Methoden in der Geometrie'', ISBN 0387129588 # *[[Line segment congruence]]. Also includes outer three segment and segment construction uniqueness. (chapter 2) # *[[Betweenness of points]], including the existence of distinct points, `PaschLine` (chapter 3) # *[[Triangle congruence]] defined and with some basic results for degenerate triangles. Also includes inner five segment. (first half of chapter 4) # *[[Collinearity]] (second half of chapter 4) # *[[Connectivity for betweenness]] (first half of chapter 5) # *[[Line segment inequality]] including an additional line segment construction theorem (second half of chapter 5) # *[[Out lines]] (chapter 6) # *[[Symmetric point]] (first portion of chapter 7) # *[[Midpoint]] (latter portion of chapter 7) # *Orthogonality: [[Orthogonality 1|1]], [[Orthogonality 2|2]], [[Orthogonality 3|3]] (chapter 8) # *[[The plane]] (chapter 9) # *[[Line reflexivity]] (chapter 10) # *[[Angles]] (chapter 11) # *[[Parallelism]] (chapter 12) # # == References == # # * [[w:Tarski's axioms]] # * Tarski, Alfred; Givant, Steven (1999), \"Tarski's system of geometry\", The Bulletin of Symbolic Logic 5 (2): 175–214, [[doi:10.2307/421089]], MR1791303, ISSN 1079-8986 # * Julien Narboux (2007), \"[http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.8614 Mechanical Theorem Proving in Tarski’s Geometry]\", F. Botana and T. Recio (Eds.): ADG 2006, LNAI 4869, pp. 139–156 # # {{DEFAULTSORT:{{PAGENAME}}}} # [[Category:Euclidean geometries (general) and generalizations]] # [[Category:Foundations of classical theories (including reverse mathematics)]]"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8385652,"math_prob":0.81528145,"size":10668,"snap":"2019-13-2019-22","text_gpt3_token_len":3062,"char_repetition_ratio":0.11937359,"word_repetition_ratio":0.024711696,"special_character_ratio":0.30221224,"punctuation_ratio":0.10037982,"nsfw_num_words":6,"has_unicode_error":false,"math_prob_llama3":0.99658936,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-23T04:19:43Z\",\"WARC-Record-ID\":\"<urn:uuid:d1ee529f-307b-4e04-b7e7-7954cb4007c6>\",\"Content-Length\":\"11538\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:14bf4b69-dabc-4895-ada3-5f8568784fd8>\",\"WARC-Concurrent-To\":\"<urn:uuid:3f7ddda9-b834-4aff-98ff-6aec3c4443a9>\",\"WARC-IP-Address\":\"172.217.7.148\",\"WARC-Target-URI\":\"http://ghilbert-app.appspot.com/general/Tarski's_geometry_axioms.ghi\",\"WARC-Payload-Digest\":\"sha1:WWPICIU75MPMMDPDKSO4LA6FWWSUKS4E\",\"WARC-Block-Digest\":\"sha1:SHRKZR6CDYUBGPEYRVCZRL3OCUDBHECK\",\"WARC-Identified-Payload-Type\":\"text/plain\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202723.74_warc_CC-MAIN-20190323040640-20190323062640-00099.warc.gz\"}"} |
https://viterbi-web.usc.edu/~jbarbic/code/index.html | [
"Jernej Barbic's Research Code\n\nVega FEM 4.0 has been released. Vega is a computationally efficient and stable C/C++ library to timestep nonlinear three-dimensional deformable models. It is designed to model large deformations, including geometric and material nonlinearities, and can also efficiently simulate linear systems.\n\nMuch of the code below is now available in Vega FEM.\n\nAll code is C/C++, and released under the BSD license.\n\nAll code written by Jernej Barbic. Joint research with Prof Doug L. James, at the Carnegie Mellon University Graphics Lab and Prof Jovan Popovic, at the MIT Computer Graphics Group.\n\nIf you publish a research paper using this code, we will appreciate if you cite our implementation (for example, like this), or you can cite one of our relevant papers. This code is research code. If you find bugs, please let us know.\n\nThis code is cross-platform. It compiles under Mac OS X, Linux, and Windows. Please do not repost this code on other websites, in any format.\n\nThis material is based upon work supported by the National Science Foundation under Grant No. CAREER-53-4509-6600. Any opinions, findings and conclusions or recomendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). This work was also supported by the James H. Zumberge Research and Innovation Fund at USC.\n\nFeedback form\n\nStVK: FEM Saint Venant-Kirchhoff deformable object library (multi-threaded)",
null,
"This class can compute FEM internal forces, tangent stiffness matrices, and the Hessians of the internal forces, for 3D volumetric meshes (for full models, without any reduction). Two mesh element types are supported: linear tetrahedra and cubes (i.e., the two types of meshes supported by our \"volumetricMesh\" class). Large deformations are supported (\"geometric nonlinearities\"). The strain-stress law is linear (the Saint Venant-Kirchhoff model). Implementation is multi-threaded and achieves near-linear scalability (tested on an Intel Xeon dual-processor, with each processor a quad-core (8 cores total)).\n\nThis library also supports model reduction. It can precompute the cubic polynomials of a reduced StVK deformable model. It can also evaluate the reduced internal forces, stiffness matrices, and Hessians very efficiently.\n\nDependencies: volumetricMesh, sparseMatrix.\nThis library is a part of Vega. Look for it in the \"libraries/stvk\" folder in Vega.\n\nModal Matrix: A class for modal matrix operations (assembly u=Uq, projection q = U^T u, optionally with SSE instructions)\n\nGiven a modal matrix U, this class can perform multiplications u=Uq, and q=U^Tu. These are standard operations frequently encountered in modal simulations.\n\nDependencies: none\nThis library is a part of Vega. Look for it in the \"libraries/modalMatrix\" folder in Vega.\n\nMass Spring System: A general 3D mass-spring system (multi-threaded)\n\nThis class allows you to compute mass spring system internal forces, tangent stiffness matrices, and Hessians of internal forces. It can also compute damping. Arbitrary 3D mass-spring networks are supported. You specify the vertices and connectivity, and this class provides forces, stiffness matrices, and Hessians. It is also possible to build a mass-spring network directly from a tetrahedral mesh (vertices become masses, and edges become springs).\n\nDependencies: volumetricMesh, sparseMatrix, configFile.\nThis library is a part of Vega. Look for it in the \"libraries/massSpringSystem\" folder in Vega. Acknowledging\n\nImplicit Newmark and Central Differences Integrators",
null,
"This code can numerically timestep large deformation nonlinear elasticity. More specifically, this code can numerically timestep a system of ODEs of the form:\n\nM * q'' + (alpha * M + beta * K(q)) q' + R(q) = fext(t),\nwhere q is an unknown vector function (such as the deformations), fext(t) are arbitrary user-provided external forces, R(q) is an arbitrary user-provided vector function, and K(q) = d R / d q is its user-provided gradient. Parameters alpha and beta are Rayleigh damping parameters. Such ODEs are obtained when simulating nonlinear FEM elasticity of large-deformation deformable models: R(q) are the internal elastic forces, and K(q) is the tangent stiffness matrix.\n\nTwo integrators are provided: implicit Newmark (implicit), and central differences (explicit). Implicit Newmark is stable even with large timesteps, but requires a system solve at every timestep, and (especially with large timesteps) introduces some \"numerical viscosity\" into the solution. Central differences require very small timesteps to be stable. The library supports both large sparse systems (arising with geometrically detailed deformable meshes), and small dense systems (arising with model reduction of large sparse systems). The code works in tandem with the StVK library: appropriate R(q) and K(q) functions are already provided both for large sparse elasticity and dense reduced systems.\n\nThe code uses either SPOOLES, PARDISO, or our own Jacobi-preconitioned conjugate gradient solver (see the \"sparseMatrix\" package) to solve the large sparse linear systems. For dense systems, it uses LAPACK.\n\nAlso provided are two driver examples. The first is a complete FEM StVK large sparse nonlinear elasticity simulator (does not use any reduction). The second example is a real-time deformable model simulator, designed based on model reduction.\n\nWith reduction, we used dense ODEs up to the size of about 60. Note that the computation slows down significantly with the size of the reduced basis; this limitation was addressed in the following paper: Steven An, Theodore Kim, Doug L. James: Optimizing Cubature for Efficient Integration of Subspace Deformations, ACM Transactions on Graphics (SIGGRAPH ASIA 2008), 27(5), December 2008.\n\nDependencies: BLAS, LAPACK, StVK.\nNote: This library is now a part of Vega. Look for it in the \"libraries/integrator\" folder in Vega.\n\nLarge Modal Deformation Factory: Model reduction of StVK FEM deformable models",
null,
"Given a simulation mesh (tetrahedral or voxel), and a set of constrained vertices, this Windows application (complete, standalone, with an installer) can generate a fast reduced deformable model, as described in the following SIGGRAPH paper:\n\nJernej Barbic, Doug L. James: Real-Time Subspace Integration\nfor St.Venant-Kirchhoff Deformable Models, ACM Transactions on\nGraphics (SIGGRAPH 2005), Los Angeles, CA, August 2005\nThe application starts either with a triangle mesh or a volumetric mesh, and generates all the necessary data for a subsequent real-time simulation. It can also launch such a simulation, using a provided real-time executable \"stvk.exe\". Or, you can run a real-time simulation from your own code using our C++ classes provided on this page (\"newmark\" and \"StVK\" libraries). The application supports tetrahedral and voxel 3D volumetric meshes. The application also contains several generally useful sub-components:\n• compute linear modes (via ARPACK) of arbitrary volumetric (tet or voxel) meshes, under arbitrary boundary conditions (including free boundary conditions),\n• compute modal derivatives,\n• compute volumetric mesh mass and stiffness matrix,\n• create cube volumetric meshes for arbitrary input triangle geometry, as described in this SIGGRAPH 2004 Sketch (loadable by our \"VolumetricMesh\" class).\n\nThe application outputs several files, which are compatible with the rest of the code available on this webpage. I.e., it produces the cubic polynomial of reduced internal forces that you can then load using the \"StVKReducedInternalForces\" and \"ImplicitNewmark\" classes (see the \"StVK\" and \"newmark\" libraries) and timestep in your own code. All the modal matrices generated (linear modes, modal derivatives, or simulation basis matrix) can be loaded using the \"Matrix\" class. Instructions are zipped with the executable.\n\nIf you want to use tetrahedral meshes, you can generate them using the TetGen mesh generation package.\n\nNote: This executable is version 2.0. A better, more stable version (3.2) is available in Vega FEM 2.0. Full source code is available in Vega. Look for it in the \"utilities/largeModalDeformationFactory\" folder in Vega.\nNote: This application comes with several example meshes. Look for them in the \"example\" subfolder of your install location. If you can't find them, they are here.\n\niOS demo utility to play reduced deformable models. Written for iPhone 4S, in 2012.\n\nThis is a demo utility whereby the user can apply forces to the reduced deformable model by swiping their fingers across iPhone's screen.\n\nDependencies: none\nios-reducedStVK-v1.1.zip",
null,
"The \"LQR\" class implements a linear-quadratic regulator (LQR) for the following linear time-varying dynamical system:\n\n\\dot{x} = F(t) * x + G(t) * u ,\n\nwhere x is the state, u is the control, and F and G are (potentially time-varying) matrices. F and G can be arbitrary (they are provided by you). The state and the control can have arbitrary dimensions (not necessarily equal). The implementation proceeds by solving a Riccati differential equation, backwards in time. In order to do so, it needs to compute exponentials of dense matrices. We compute these exponentials using the Expokit package.\n\nDependencies: matrix, expokit.\nlqr-v1.0.zip\n\nVolumetric Mesh: tetrahedral and cube volumetric 3D meshes\n\n The classes in this library provide storage for a general volumetric 3D mesh. Two mesh types are supported: tetrahedral and voxel. The classes store the mesh geometric information (elements and vertices), and also the material parameters of each individual mesh element (Young's modulus, Poisson ratio, mass density). This is done by organizing elements with the same material parameters into a \"solid section\". The class supports several geometric queries and also interpolation to an embedded triangle mesh (\"Free-Form Deformation\"). It also supports exporting the mesh to an .ele or .node format (the format used, e.g., by the TetGen mesh generation package). The class can also compute the mass matrix of the given volumetric mesh. To generate a cube volumetricMesh from an input triangle mesh (optionally flood-filling interior chambers and/or including the interpolation weights), you can use the Large Modal Deformation Factory application. Dependencies: minivector, sparseMatrix (for mass matrix generation). Note: This library is now a part of Vega. Look for it in the \"libraries/volumetricMesh\" folder in Vega.",
null,
"Cross-platform C code execution timer (performance counter)\n\nA C++ counter to measure code execution time. The timer is accurate up to a few microseconds. You can time arbitrary segments of your code, by placing StartCounter() and StopCounter() before and after your code block. Same interface under Windows, Linux and Mac OS X. Under Windows, the timer uses \"QueryPerformanceCounter\", and under Linux/Mac OS X, it uses \"gettimeofday\".\n\nDependencies: none.\nThis library is now a part of Vega. Look for it in the \"libraries/performanceCounter\" folder in Vega. Acknowledging\n\nMatrix (dense)\n\nThe \"Matrix\" class implements a matrix: a 2D array of real values, together with the commonly defined algebraic operations. The matrix can be rectangular (need not be square). The matrix is stored in the column-major order (same as in LAPACK). Storage is dense (see the Sparse Matrix library for sparse matrices). The class suports common algebraic operations (addition, multiplication, transposition, etc.), including operator overloading, so you can write expressions like: A += 0.25 * (B + A) * C; . It is possible to load/save the matrix from/to a file, using a special well-documented binary format (see matrixIO.h). The class can also perform more complex matrix operations such as computing the SVD decomposition, solving linear systems (via LU decomposition), finding eigenvalues and eigenvectors, solving least square systems, and computing matrix inverses, pseudoinverses and exponentials. The code uses BLAS routines to perform matrix addition and multiplication, and LAPACK for SVD, LU, eigenanalysis, least square systems, inverses and pseudoinverses. Expokit is used for matrix exponentiation. The classes are templated for both float and double datatypes. Also included are routines to perform Principal Component Analysis (PCA) on the columns of the matrix.\n\nDependencies: BLAS, LAPACK, for matrix exponentiation also Expokit\nThis library is now a part of Vega. Look for it in the \"libraries/matrix\" folder in Vega. Acknowledging\n\nSparse Matrix\n\n This class implements sparse matrices with the common algebraic operations such as incremental construction, addition, mtx-vec multiplication, load/save to disk, row-column deletion, etc. Suitable for large sparse matrices. Storage is per-row: for every matrix row, the class stores the integer indices of non-zero columns in that row, together with the corresponding matrix values. Also included is a Conjugate Gradient linear system solver (for positive-definite large sparse symmetric matrices), with (optional) Jacobi preconditioning. The CG Solver was implemented by following Jonathan Shewchuk's An Introduction to the Conjugate Gradient Method Without the Agonizing Pain. Also included is a Gauss-Seidel linear system solver. Dependencies: none. This library is a part of Vega. Look for it in the \"libraries/sparseMatrix\" and \"libraries/sparseSolver\" folder in Vega. Acknowledging",
null,
"Minivector\n\nA simple class for vector algebra on 2D vectors, 3D vectors (normalization, dot product, cross product, ...), and matrix algebra on 3x3 matrices (summation, multiplication, eigenvalue and eigenvector computation, ...).\n\nDependencies: none.\nThis library is now a part of Vega. Look for it in the \"libraries/minivector\" folder in Vega. Acknowledging\n\nPolar decomposition of a 3x3 matrix (and derivatives of polar decomposition matrices)\n\nThis class can compute the polar decomposition of a general 3x3 matrix. The polar decomposition code has been adapted from the (freely available) polar decomposition implementation provided as a companion to the book \"Graphics Gems IV\".\n\nNew (May 2011): The class can also compute the first and second derivatives of the matrices in polar decomposition, as explained in this publication.\n\nDependencies: minivector.\nThis library is now a part of Vega. Look for it in the \"libraries/polarDecomposition\" folder in Vega. Citation\n\nDynamics of a (single) rigid body",
null,
"These two classes (\"RigidBody\" and \"RigidBody_GeneralTensor\") implement 6-DOF rigid dynamics of a single rigid body, as explained in:\n\nDavid Baraff:\n\"An Introduction to Physically Based Modeling:\nRigid Body Simulation I: Unconstrained Rigid Body Dynamics\"\n(SIGGRAPH 97 Course Notes)\nThese two classes allow you to simulate the motion of a single rigid body, under any specified (potentially time-varying) external forces and torques. Arbitrary tensors of inertia are supported. For rigid objects where the inertia tensor in the world coordinate system is diagonal, use \"RigidBody\". For the general case (non-diagonal inertia tensor in the world coordinate system), use \"RigidBody_GeneralTensor\". The solution is computed by numerically timestepping the ordinary differential equations of rigid body motion, derived from the Newton's 2nd law, and conservation of linear momentum and angular momentum. For example, ballistic motion can be simulated if gravity is used as the external force. Objects bouncing off the ground/impacting other objects can be simulated if you combine \"RigidBody\" (or \"RigidBody_GeneralTensor\") with a collision detection algorithm that provides the contact external forces.\n\nCurrently, the code supports explicit Euler integration and symplectic Euler.\n\nDependencies: quaternion.\nThis library is now a part of Vega. Look for it in the \"libraries/rigidBodyDynamics\" folder in Vega. Acknowledging\n\nQuaternions\n\nThis C++ class implements quaternions and the common algebraic operations on quaternions (including operator overloading). The class is templated: you can use either float or double precision. Supports using quaternions to represent/manipulate rotations. The Matrix2Quaternion routine is borrowed from David Baraff's course notes (with permission).\n\nDependencies: none.\nThis library is now a part of Vega. Look for it in the \"libraries/quaternion\" folder in Vega.\n\nA C++ class to (very quickly and exactly) timestep the following 1D ODE: M * q''(t) + C * q'(t) + K * q(t) = f(t)",
null,
"This class integrates a single harmonic oscillator, that is, this code can timestep the following one-dimensional Ordinary Differential Equation:\n\nM * q''(t) + C * q'(t) + K * q(t) = f(t),\nwhere M,C,K are scalar constants, and\nf=f(t) is a given (discretely sampled) function of time, and\nq=q(t) is the unknown (i.e., what we are solving for).\n\nThe system must be underdamped (as is the case in, e.g., sound simulations):\nC < 2 * sqrt(M*K).\n\nThe integration uses an IIR filter and is as such EXACT up to floating point arithmetic (i.e., this is better than integrating the ODE with a numerical integrator such as Euler/Runge-Kutta/Central Differences,etc.). The timestep computation is very simple and runs at very fast rates (easily at 44.1 kHz). This code can be used (and has been used) to integrate the modal oscillators for simulating sound, for example, in the following paper:\nDoug L. James, Jernej Barbic, Dinesh K. Pai:\nPrecomputed Acoustic Transfer: Output-sensitive, accurate sound generation\nfor geometrically complex vibration sources,\nACM Transactions on Graphics 25(3) (SIGGRAPH 2006),\np. 987-995, Boston, MA, August 2006.\n\nDependencies: none\nharmonicOscillator_IIR-v1.0.zip\n\nA class to parse custom-defined text configuration files\n\nThis C++ class makes it possible to create your own text configuration file syntax, and then load the values from a particular configuration file (following your syntax) into variables of your C++ program. Supports int, float, double, bool, and char* datatypes.\n\nThis class works with text configuration files like these. The syntax of the file is defined using a C++ program in the following way. This example C++ program first defines the configuration file syntax. Then, it opens a particular configuration file and loads the values to the memory locations specified when the syntax was defined. The program output will be as follows.\n\nFor example, this can serve as an improved command-line option tool: you can move your command line options to a text file so that you don't have to retype them each time (useful if there are many). Or, it can serve as an interface between two programs. Write the values out to a file with one program and load them into another.\n\nDependencies: none.\nThis library is now a part of Vega. Look for it in the \"libraries/configFile\" folder in Vega. Acknowledging\n\nOpenGL lighting from a text configuration file\n\nA class to read OpenGL lighting parameters from a text configuration file. Usage is simple: use the provided constructor to read the configuration file during initialization, then call \"LightScene\" inside your OpenGL display routine (after setting up the modelview and projection matrices). Now, you no longer have to recompile your code each time you wish to change some lighting parameter!\n\nHere is an example configuration file.\n\nDependencies: configFile.\nThis library is now a part of Vega. Look for it in the \"libraries/lighting\" folder in Vega. Acknowledging\n\nOpenGL \"spherical\" camera\n\nA class to position an OpenGL camera in 3D, using spherical coordinates. The camera points to a specified focus position.\n\nDependencies: none.\nThis library is now a part of Vega. Look for it in the \"libraries/camera\" folder in Vega. Acknowledging"
] | [
null,
"https://viterbi-web.usc.edu/~jbarbic/code/FEM.jpg",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/stvk-reduced.png",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/largeModalDeformationFactory-screenShot-sm.png",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/leaves-small.jpg",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/dino-tets-sm.jpg",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/bridge-1sm.png",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/rigidObject-dragon.jpg",
null,
"https://viterbi-web.usc.edu/~jbarbic/code/bellsm.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.85934675,"math_prob":0.8338007,"size":17631,"snap":"2022-05-2022-21","text_gpt3_token_len":3804,"char_repetition_ratio":0.12304987,"word_repetition_ratio":0.06231003,"special_character_ratio":0.20191708,"punctuation_ratio":0.13643558,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97811913,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-01-18T19:49:32Z\",\"WARC-Record-ID\":\"<urn:uuid:60634eec-466a-4ad2-bc08-20dc83afa520>\",\"Content-Length\":\"32334\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:161eb6ae-8bb1-43e7-82d2-c7afc5d8a93b>\",\"WARC-Concurrent-To\":\"<urn:uuid:46c68f9e-a247-4473-bf47-a6a25436875c>\",\"WARC-IP-Address\":\"68.181.40.12\",\"WARC-Target-URI\":\"https://viterbi-web.usc.edu/~jbarbic/code/index.html\",\"WARC-Payload-Digest\":\"sha1:SUCPDNDQPVKJUMYIULM4DEZVABDMPTMJ\",\"WARC-Block-Digest\":\"sha1:LEWJKUM6UP32L7Y4Q3OWZPMK5YLTH2TZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-05/CC-MAIN-2022-05_segments_1642320300997.67_warc_CC-MAIN-20220118182855-20220118212855-00051.warc.gz\"}"} |
https://cbsencertsolutions.com/differential-equations-class-12-mathematics-important-questions/ | [
"# Differential Equations Class 12 Mathematics Important Questions\n\nStudents can read the important questions given below for Differential Equations Class 12 Mathematics. All Differential Equations Class 12 Notes and questions with solutions have been prepared based on the latest syllabus and examination guidelines issued by CBSE, NCERT and KVS. You should read all notes provided by us and Class 12 Mathematics Important Questions provided for all chapters to get better marks in examinations. Mathematics Question Bank Class 12 is available on our website for free download in PDF.\n\n## Important Questions of Differential Equations Class 12\n\nQuestion. Find order and degree of differential equation\n\nDegree not defined\n\nQuestion. Find order and degree of differential equation\n\nDegree=2\n\nQuestion. Integrating factor of\n\nQuestion. For what value of n is the following a homogeneous differential equation:\n\nQuestion. Form the differential equation not containing the arbitrary constants and satisfied by the equation: y = peqx.\n\nQuestion. Write the order and the degree of the following differential equation:\n\nAnswer. Order = 2, degree = 2\n\nQuestion. Find the differential equation of the family of lines passing through the origin.\nAnswer. Generates equation of family of lines passing through origin\ny = mx ⇒ m = y/x\ndy/dx = m = slope\ndy/dx = y/x\nx dy/dx – y = 0\n\nQuestion. Find the solution of the differential equation dy/dx = x3e-2y\n\nQuestion. How many arbitrary constants are there in the particular solution of the differential equation\n\nQuestion. For what value of n is the following a homogeneous differential equation:\n\nQuestion. Solve the differential equation\n\nQuestion. Solve the differential equation\n\nQuestion. Form the differential equation of all circles which is touching the x-axis at the origin.\nAnswer. (x – 0)2 + (y – r)2 = r2\nx2 + y2 = 2ry\n\nQuestion. Form the differential equation representing the family of curves y = aebx+5, where ‘a’ and ‘b’ are arbitrary constants\n\nQuestion. Find the general solution of the differential equation:\n\nAnswer. Given differential equation can be written as\n\nQuestion. Prove that x2 – y2 = C(x2 + y2)2 is the general solution of the differential equation (x2 – 3xy2) dx = (y3 – 3x2y) dy, where C is a parameter\nAnswer. x2 – y2 = C(x2 + y2)2\n\nHence x2 – y2 = C(x2 + y2)2 is the solution of given differential equation.\n\nQuestion. Solve the following differential equation: dy/dx = x3 cosec y, given that y(0) = 0.\n\nQuestion. Find the general solution of the differential equation.\nxy dy/dx = dy/dx = (x+2)(y+2)\n\nQuestion. Find the general solution of the differential equation dy/dx + 2/x y = x\n\nQuestion. Find the integrating factor of the differential equation dy/dx +y = 1+y/x\nAnswer. Given differential equation can be written as\n\nQuestion. Find the differential equation of the family of curves y = Ae2x + Be–2x, where A and B are arbitrary constants.\nAnswer. Differentiating y = Ae2x + Be–2x, we get\ndy/dx = 2Ae2x + 2Be–2x\ndifferentiate again to get\n\nQuestion. Can y = ax + b/a be a solution of the following differential equation ?\n\nIf no, find the solution of the D.E.\n\nQuestion. Find the equation of curve whose tangent at any point on it, different from origin, has slope\n\nQuestion. Solve the differential equation\n\nQuestion. Solve the differential equation\n\nQuestion. Solve the differential equation\n\nQuestion. Solve the differential equation\n\nQuestion. Show that the differential equation\n\nIs homogeneous.\nFind the particular solution given that y = π/4 when x = 1\n\nQuestion. Find the general solution of the differential equation\n\nQuestion. For the differential equation\n\nFind the solution curve passing through the point (1, -1)\n\nQuestion. Solve the differential equation:\ndy/dx – 3y cot x = sin 2x given y = 2, when x= π/2\n\nQuestion. Solve: (1 + x2 + y2 + x2y2)dx + xydy = 0, given that y = 0 and x = 1.\nAnswer. The given equation can be written as:\n\nQuestion. Find the particular solution of the differential equation:\n\nfor x = 1, y = 0.\nAnswer. Given differential equation is homogeneous.\n\nQuestion. Show that the differential equation\n\nis homogeneous. Find the particular solution of this differential equation, given that y = π/4 when x = 1.\n\nQuestion. Solve the differential equation x2dy + (xy + y2) dx = 0 given y = 1, when x = 1.\nAnswer. x2dy + (xy + y2) dx = 0\n\nCASE STUDY :\n\nPolio drops are delivered to 50K children in a district. The rate at which polio drops are given is directly proportional to the number of children who have not been administered the drops. By the end of 2nd week half the children have been given the polio drops. How many will have been given the drops by the end of 3rd week can be estimated using the solution to the differential equation 𝒅𝒚/𝒅𝒙=𝐤(𝟓𝟎−𝐲) where x denotes the number of weeks and y the number of children who have been given the drops.\n\nQuestion. State the order of the above given differential equation.\nOrder is 1\n\nQuestion. Which method of solving a differential equation can be used to solve 𝒅𝒚/𝒅𝒙=𝐤(𝟓𝟎−𝐲).?\na. Variable separable method\nb. Solving Homogeneous differential equation\nc. Solving Linear differential equation\nd. all of the above\n\nA\n\nQuestion. The solution of the differential equation 𝒅𝒚/𝒅𝒙=𝐤(𝟓𝟎−𝐲) is given by,\na. log | 50 – y| = kx + C\nb. – log | 50 – y| = kx + C\nc. log | 50 – y| = log| kx |+ C\nd. 50 – y = kx + C\n\nB\n\nQuestion. The value of c in the particular solution given that y(0)=0 and k = 0.049 is.\na. log 50\nb. log 1/50\nc. 50\nd. -50"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87942827,"math_prob":0.99958473,"size":5935,"snap":"2023-40-2023-50","text_gpt3_token_len":1602,"char_repetition_ratio":0.2989378,"word_repetition_ratio":0.19903846,"special_character_ratio":0.25627634,"punctuation_ratio":0.1312608,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99995065,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-04T02:53:51Z\",\"WARC-Record-ID\":\"<urn:uuid:68edb1fc-418e-4f31-ba4e-efc62a24923d>\",\"Content-Length\":\"161019\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b5807cb5-7c56-4f13-ae30-e1137b27c80b>\",\"WARC-Concurrent-To\":\"<urn:uuid:ddb8ef66-3ffd-48e9-bbdc-34000e607812>\",\"WARC-IP-Address\":\"149.100.147.26\",\"WARC-Target-URI\":\"https://cbsencertsolutions.com/differential-equations-class-12-mathematics-important-questions/\",\"WARC-Payload-Digest\":\"sha1:SJUGTBMLU2BGZ3VCCHZWIKD7E3HVYXDV\",\"WARC-Block-Digest\":\"sha1:WZLYS333SL4FNERQ6LOKYLXO7QD2FRXW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100523.4_warc_CC-MAIN-20231204020432-20231204050432-00214.warc.gz\"}"} |
https://collaborate.princeton.edu/en/publications/the-geometry-of-turbulent-advection-sharp-estimates-for-the-dimen | [
"# The geometry of turbulent advection: Sharp estimates for the dimensions of level sets\n\nP. Constantin, I. Procaccia\n\nResearch output: Contribution to journalArticlepeer-review\n\n21 Scopus citations\n\n## Abstract\n\nLower bounds on the fractal dimension of level sets of advecting passive scalars in turbulent fields are derived, in the limit that the scalar diffusivity kappa goes to zero. The main result is as follows: denote the Holder exponent of the velocity field u by zeta (u), with 0<or= zeta (u)<or=1, and the Holder exponent of the passive scalar (say T) by zeta (T). We derive a lower bound on the dimension D of the level sets of T, D>or=d-1+ zeta (T)+ zeta (u), where d is the dimension of space. The validity of this bound depends on some conditions concerning the limit kappa to 0; when these are satisfied the bound is obtained throughout the range of zeta (u), between the smooth (but random) velocity field with zeta (u)=1 to the extremely rough field with zeta (u)=0. The derivation of the lower bound calls for the introduction of a measure on the level sets and a careful treatment of the singular limit of the scalar diffusivity going to zero. Together with the upper bounds which were derived previously, i.e. D<or=d-1/2+ zeta (u)/2 we discover, when there is no multiscaling, the scaling relation 2 zeta (T)+ zeta (u)=1, which then means that the lower and the upper bounds in fact coincide.\n\nOriginal language English (US) 014 1045-1054 10 Nonlinearity 7 3 https://doi.org/10.1088/0951-7715/7/3/014 Published - Dec 1 1994 Yes\n\n## All Science Journal Classification (ASJC) codes\n\n• Statistical and Nonlinear Physics\n• Mathematical Physics\n• Physics and Astronomy(all)\n• Applied Mathematics\n\n## Fingerprint\n\nDive into the research topics of 'The geometry of turbulent advection: Sharp estimates for the dimensions of level sets'. Together they form a unique fingerprint."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.861304,"math_prob":0.69489014,"size":1585,"snap":"2022-40-2023-06","text_gpt3_token_len":416,"char_repetition_ratio":0.13029727,"word_repetition_ratio":0.0076923077,"special_character_ratio":0.24794953,"punctuation_ratio":0.06734007,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98294014,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-01-26T21:56:12Z\",\"WARC-Record-ID\":\"<urn:uuid:2401e99e-8fa5-4677-80e2-109bb846831b>\",\"Content-Length\":\"47884\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bdee1c71-0202-4155-b5a4-11859b3e8c7c>\",\"WARC-Concurrent-To\":\"<urn:uuid:b94e101b-70d1-4117-b54c-cf399e6bf05c>\",\"WARC-IP-Address\":\"3.90.122.189\",\"WARC-Target-URI\":\"https://collaborate.princeton.edu/en/publications/the-geometry-of-turbulent-advection-sharp-estimates-for-the-dimen\",\"WARC-Payload-Digest\":\"sha1:3G2443G7G7J5D4ZWLAA7I5UE4FY2J77X\",\"WARC-Block-Digest\":\"sha1:PSWPYB3XG56GAPGSHBXU2Q2WV4IKOGUG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-06/CC-MAIN-2023-06_segments_1674764494826.88_warc_CC-MAIN-20230126210844-20230127000844-00136.warc.gz\"}"} |
https://www.snapxam.com/problems/73406576/integral-of-x-x-2-0-5dx | [
"# Step-by-step Solution\n\nGo!\n1\n2\n3\n4\n5\n6\n7\n8\n9\n0\na\nb\nc\nd\nf\ng\nm\nn\nu\nv\nw\nx\ny\nz\n.\n(◻)\n+\n-\n×\n◻/◻\n/\n÷\n2\n\ne\nπ\nln\nlog\nlog\nlim\nd/dx\nDx\n|◻|\n=\n>\n<\n>=\n<=\nsin\ncos\ntan\ncot\nsec\ncsc\n\nasin\nacos\natan\nacot\nasec\nacsc\n\nsinh\ncosh\ntanh\ncoth\nsech\ncsch\n\nasinh\nacosh\natanh\nacoth\nasech\nacsch\n\n## Step-by-step explanation\n\nProblem to solve:\n\n$\\int x\\sqrt{x+2}dx$\n\nLearn how to solve integrals with radicals problems step by step online.\n\n$u=x+2$\n\nLearn how to solve integrals with radicals problems step by step online. Calculate the integral int(x*(x+2)^0.5)dx. We can solve the integral \\int x\\sqrt{x+2}dx by applying integration by substitution method (also called U-Substitution). First, we must identify a section within the integral with a new variable (let's call it u), which when substituted makes the integral easier. We see that x+2 it's a good candidate for substitution. Let's define a variable u and assign it to the choosen part. Now, in order to rewrite dx in terms of du, we need to find the derivative of u. We need to calculate du, we can do that by deriving the equation above. Rewriting x in terms of u. Substituting u, dx and x in the integral and simplify.\n\n$\\frac{2}{5}\\sqrt{\\left(x+2\\right)^{5}}-\\frac{4}{3}\\sqrt{\\left(x+2\\right)^{3}}+C_0$\n$\\int x\\sqrt{x+2}dx$"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8893119,"math_prob":0.9972635,"size":856,"snap":"2020-45-2020-50","text_gpt3_token_len":205,"char_repetition_ratio":0.14906104,"word_repetition_ratio":0.114285715,"special_character_ratio":0.22780374,"punctuation_ratio":0.10614525,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99909747,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-29T23:27:59Z\",\"WARC-Record-ID\":\"<urn:uuid:4a67f235-a26c-46c6-a977-f87dfae34445>\",\"Content-Length\":\"30959\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:757a88eb-a2a5-47b1-82bc-76fbc77bcee4>\",\"WARC-Concurrent-To\":\"<urn:uuid:65db7db4-fb5a-4a04-9342-c9008a966643>\",\"WARC-IP-Address\":\"3.18.122.152\",\"WARC-Target-URI\":\"https://www.snapxam.com/problems/73406576/integral-of-x-x-2-0-5dx\",\"WARC-Payload-Digest\":\"sha1:4GBDR6P2XT4D37P6SKD7IOZMWNMW3NSJ\",\"WARC-Block-Digest\":\"sha1:YMM6G32KG2ZYGPVW7DVG4WSTOOAJE7TR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107905965.68_warc_CC-MAIN-20201029214439-20201030004439-00635.warc.gz\"}"} |
http://www.kylesconverter.com/data-bandwidth/bytes-per-second-to-petabytes-per-day | [
"# Convert Bytes Per Second to Petabytes Per Day\n\n### Kyle's Converter > Data Bandwidth > Bytes Per Second > Bytes Per Second to Petabytes Per Day\n\n Bytes Per Second (B/s) Petabytes Per Day (PB/d) Precision: 0 1 2 3 4 5 6 7 8 9 12 15 18\nReverse conversion?\nPetabytes Per Day to Bytes Per Second\n(or just enter a value in the \"to\" field)\n\nPlease share if you found this tool useful:\n\nUnit Descriptions\n1 Byte per Second:\n1 Byte per second is equal to 8 bits per second. A byte contains 8 bits. A second is the SI base unit of time. 1 B/s = 8 bit/s.\n1 Petabyte per Day:\n1 Petabyte per day is approximately 92592592592.5926 bits per second. A petabyte contains 8,000,000,000,000,000 bits (base unit). A day contains 86400 seconds (SI base unit). 1 PB/d ? 92592592592.5926 bit/s.\n\nLink to Your Exact Conversion\n\nConversions Table\n1 Bytes Per Second to Petabytes Per Day = 070 Bytes Per Second to Petabytes Per Day = 0\n2 Bytes Per Second to Petabytes Per Day = 080 Bytes Per Second to Petabytes Per Day = 0\n3 Bytes Per Second to Petabytes Per Day = 090 Bytes Per Second to Petabytes Per Day = 0\n4 Bytes Per Second to Petabytes Per Day = 0100 Bytes Per Second to Petabytes Per Day = 0\n5 Bytes Per Second to Petabytes Per Day = 0200 Bytes Per Second to Petabytes Per Day = 0\n6 Bytes Per Second to Petabytes Per Day = 0300 Bytes Per Second to Petabytes Per Day = 0\n7 Bytes Per Second to Petabytes Per Day = 0400 Bytes Per Second to Petabytes Per Day = 0\n8 Bytes Per Second to Petabytes Per Day = 0500 Bytes Per Second to Petabytes Per Day = 0\n9 Bytes Per Second to Petabytes Per Day = 0600 Bytes Per Second to Petabytes Per Day = 0\n10 Bytes Per Second to Petabytes Per Day = 0800 Bytes Per Second to Petabytes Per Day = 0\n20 Bytes Per Second to Petabytes Per Day = 0900 Bytes Per Second to Petabytes Per Day = 0\n30 Bytes Per Second to Petabytes Per Day = 01,000 Bytes Per Second to Petabytes Per Day = 0\n40 Bytes Per Second to Petabytes Per Day = 010,000 Bytes Per Second to Petabytes Per Day = 0\n50 Bytes Per Second to Petabytes Per Day = 0100,000 Bytes Per Second to Petabytes Per Day = 0\n60 Bytes Per Second to Petabytes Per Day = 01,000,000 Bytes Per Second to Petabytes Per Day = 0.0001"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6747812,"math_prob":0.9160844,"size":1421,"snap":"2019-13-2019-22","text_gpt3_token_len":407,"char_repetition_ratio":0.3810868,"word_repetition_ratio":0.5,"special_character_ratio":0.33427164,"punctuation_ratio":0.02112676,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9858398,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-26T21:17:41Z\",\"WARC-Record-ID\":\"<urn:uuid:c00af96b-5ded-458d-8989-4fdb04ac5317>\",\"Content-Length\":\"19205\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9d845e23-6dc4-49b9-8ac6-078902cb6958>\",\"WARC-Concurrent-To\":\"<urn:uuid:e7ec7095-510d-44fd-90f7-3505c27f2fd8>\",\"WARC-IP-Address\":\"54.230.192.116\",\"WARC-Target-URI\":\"http://www.kylesconverter.com/data-bandwidth/bytes-per-second-to-petabytes-per-day\",\"WARC-Payload-Digest\":\"sha1:MHOUR7APTLT7HVBQHUAOFPHWEKWRLC3Y\",\"WARC-Block-Digest\":\"sha1:ZKE5YQCPOFAJIRTPBKHZYWWHEWZ6S3AG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232259757.86_warc_CC-MAIN-20190526205447-20190526231447-00284.warc.gz\"}"} |
https://mapflc.com/lesson-plans/lesson-plan-geometry-and-rhythms/ | [
"## Summary\n\nIn this lesson students will explore the relationship between diving a whole note and dividing a whole circle.\n\n7-13 years\n\n### Lesson duration:\n\n60 minutes\n\n• Introduction: Discuss the various shapes. How many sides? Other properties? Discuss note values. Any relationship to shapes? (10 min)\n• Begin by creating simple shapes. Introduce division of 360. (10 min)\n• Draw a connection between the number of sides and the number 360 is divided by as well as the number of repeats. All of these numbers are the same. (10 min)\n• Re-introduce Box. How can box be used to express this idea? (5 min)\n• Show whole note as a circle and divide it by various note values (e.g. half, quarter, eighth). Any relationship to these shapes? What about dividing by 3 or 5 — what are those called in music?\n\nUp to 10.\n\n### Rationale\n\nIn music, the whole note is the reference for which all divisions are made. A geometric circle works similarly as well — 360 being “the whole”. The way we divide 360 creates the basic shapes.\n\n### Objectives\n\nBy drawing the connection between the two, and using programming tools to create dynamic “rhythm generators” the underlying concept of rhythm is better understood and students should be able to problem solve to figure out any division of the whole that they may encounter when reading music.\n\n## Lesson\n\n### Introduction\n\nBegin by reviewing basic shapes. Ask questions like, “How many sides does a square have?” “How about a triangle?”\n\nAlso ask about basic note values. “How many half notes fit inside a whole note?” “How many quarter notes?”\n\n## Part 1\n\n### A. Making a Square in Music Blocks\n\n1. Start a new project and trash the default notes (Sol, Mi, Sol) and instrument (Guitar) in Music Blocks.\n2. Pull out a repeat block, a forward block, and a right block. By default their values should be 4, 100, and 90 respectively. You should keep their defaults.\n3. Have students guess what will happen when the program is run.\n\nThe above is the code to generate a square. Below is the result (color may vary).\n\nAsk students how they would need to modify this program in order to create a triangle. Try making a triangle together and maybe a few other shapes.\n\n### B. Divide by 360\n\nRight as 90 (degrees) is a portion of a circle — specifically a quarter or a circle. Therefore, we can arrive at this same number by dividing by 4. This step may seem obvious, but it is very important in establishing the mathematical structure that we need to create unique shapes and rhythms automatically. By clicking on the division blocks, you can see the result printed at the top of the screen.\n\nHave students try dividing 360 by other numbers as well. Remind them that 360 are the degrees in a complete (i.e. “whole”) circle.\n\nNext, plug the division blocks into the square code from before.\n\nNow that we have this new structure for creating the square, let’s create a triangle.\n\nThen ask the students to make a pentagon (5 sides).\n\nAt this point students should start to see the pattern. What two numbers are always the same? Why are they the same? Are they the same for any kind of shape? Is there another way to express the formula such that the numbers are always the same?\n\n### C. Insert Box Here\n\nThe box takes a number (or other value) and stores it for use later. The same number can be used multiple times. Since the number of repeats and the denominator for the right angle are the same for all these shapes, we can replace them with box.\n\nNow we just need to change the value for box to reliably generate shapes.\n\nHave students try different numbers for box to see the different results. Lower numbers provide the best results.\n\n### D. Shape Creation Automation\n\nStarting from the box structure of their code, students have what they need to create more dynamic code. We can, for example, create a short snippet of code that creates shapes with 3, 4, 5, and 6 sides.\n\n### E. Cyclic Representation of Whole Note\n\nWhen introducing the concept of note value, I frequently like to start by drawing a circle on the board. I call the circle a “whole pizza”. When we cut the pizza in half, for example, we end up with two halves just like two half notes fill the same amount of time as a whole note.\n\nThe next step for this lesson is to transition from sided-shapes to divisions of a circle (similar to dividing the pizza). We can do this with our current code by replacing the forward and right code with a single angle block. We will also need to move the `360/box` division to the input for angle. Instead of going forward by 100, our radius will be 100.\n\nLastly, by putting the movement inside of a `note value` drum block the movements will happen over time. By replacing the denominator for `note value` with `box` we can tie the length of the note with the divisions of the circle.\n\nThe code snippet above also has an `add to value` block to change the color for each repeat. This helps us get more colorful output to help see the divisions.\n\nWe can add some more visual elements such as changing color and the size of the radius at each repeat to better see how the circles are divided.\n\nOpen the program at https://musicblocks.sugarlabs.org/index.html?id=1590350534007378&run=True\n\n### F. Back to Note Values\n\nAt this point in the lesson, we should bring it back to note values. We started with geometric shapes and ended with circles that are drawn over time with different note values. This is an important moment to ask some fundamental questions about note value.\n\nStudents can be asked the following questions:\n\n• Starting from “whole note” how can we figure out the length of other note values such as `1/2`, `1/3`, `1/4`, `1/5`, etc?\n• Which note values are faster? Which are slower?\n• Is there any way to create a longer note than a `1/1` (whole) note? Can you imagine what that would be?\n• If a `1/2` is a “half note” what would be a `1/3` note? What can we call it? What is its relation to a whole note? (`1/3` is a “half note triplet”, btw)\n\n### G. Create!\n\nEncourage students to add to their “rhythm/shape generators” to create unique projects. The possibilities are endless.\n\nExample Teacher Project (using Pythagorean Tuning instead of Just): https://musicblocks.sugarlabs.org/index.html?id=1597842962357142&run=True\n\n## Performance/Critique\n\n1. Have students discuss the relationship between shape and rhythm. You can start from the questions in the bullet list above.\n2. Have students create their own versions of the projects (either in class or at home) and show their new versions. What is unique? Does it explore something new with regard to note value?\n\n## Materials\n\n• Music Blocks software (Computer, up-to-date browser)\n• If possible, a white board (or equivalent) to demonstrate the divisions of a whole note (e.g. as a pizza).\n\n## Assessments\n\n• Observe participation\n• Do the students make the connection between note value and sides of a shape? Do they make the connection between divisions of a circle and divisions of a whole note?\n• Are students able to apply their understanding of the concept to accurately problem solve unfamiliar note values such as `1/3` or `1/5`?\n• Are the students able to play or clap some of the rhythms? (divisions between 4 and 8 would be a good start)\n• Long term assessment: Do students utilize the conceptual understanding to problem solve unfamiliar rhythms during performance (or when reading the rhythm on sheet music)?"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9131658,"math_prob":0.90760535,"size":7294,"snap":"2022-40-2023-06","text_gpt3_token_len":1638,"char_repetition_ratio":0.12839507,"word_repetition_ratio":0.0015661707,"special_character_ratio":0.229915,"punctuation_ratio":0.109203294,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97939193,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-06T00:38:24Z\",\"WARC-Record-ID\":\"<urn:uuid:e10196a8-2415-4bf3-86f2-2dd3123e6718>\",\"Content-Length\":\"77073\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a0997927-d9aa-4a0c-932f-08cf0fe4c96b>\",\"WARC-Concurrent-To\":\"<urn:uuid:565c245b-1b7d-481a-9c76-6ca9e26465be>\",\"WARC-IP-Address\":\"155.133.138.4\",\"WARC-Target-URI\":\"https://mapflc.com/lesson-plans/lesson-plan-geometry-and-rhythms/\",\"WARC-Payload-Digest\":\"sha1:V4VVV5ELIWXTT5QWMFNCZN6YM33OOUCG\",\"WARC-Block-Digest\":\"sha1:YY2LEPKSDYYIT53ETVLR3URVN4FNX7TR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030337680.35_warc_CC-MAIN-20221005234659-20221006024659-00517.warc.gz\"}"} |
https://terri77.savingadvice.com/2010/10/31/health-insurance_63069/ | [
"User Real IP - 35.172.217.174\n```Array\n(\n => Array\n(\n => 182.68.68.92\n)\n\n => Array\n(\n => 101.0.41.201\n)\n\n => Array\n(\n => 43.225.98.123\n)\n\n => Array\n(\n => 2.58.194.139\n)\n\n => Array\n(\n => 46.119.197.104\n)\n\n => Array\n(\n => 45.249.8.93\n)\n\n => Array\n(\n => 103.12.135.72\n)\n\n => Array\n(\n => 157.35.243.216\n)\n\n => Array\n(\n => 209.107.214.176\n)\n\n => Array\n(\n => 5.181.233.166\n)\n\n => Array\n(\n => 106.201.10.100\n)\n\n => Array\n(\n => 36.90.55.39\n)\n\n => Array\n(\n => 119.154.138.47\n)\n\n => Array\n(\n => 51.91.31.157\n)\n\n => Array\n(\n => 182.182.65.216\n)\n\n => Array\n(\n => 157.35.252.63\n)\n\n => Array\n(\n => 14.142.34.163\n)\n\n => Array\n(\n => 178.62.43.135\n)\n\n => Array\n(\n => 43.248.152.148\n)\n\n => Array\n(\n => 222.252.104.114\n)\n\n => Array\n(\n => 209.107.214.168\n)\n\n => Array\n(\n => 103.99.199.250\n)\n\n => Array\n(\n => 178.62.72.160\n)\n\n => Array\n(\n => 27.6.1.170\n)\n\n => Array\n(\n => 182.69.249.219\n)\n\n => Array\n(\n => 110.93.228.86\n)\n\n => Array\n(\n => 72.255.1.98\n)\n\n => Array\n(\n => 182.73.111.98\n)\n\n => Array\n(\n => 45.116.117.11\n)\n\n => Array\n(\n => 122.15.78.189\n)\n\n => Array\n(\n => 14.167.188.234\n)\n\n => Array\n(\n => 223.190.4.202\n)\n\n => Array\n(\n => 202.173.125.19\n)\n\n => Array\n(\n => 103.255.5.32\n)\n\n => Array\n(\n => 39.37.145.103\n)\n\n => Array\n(\n => 140.213.26.249\n)\n\n => Array\n(\n => 45.118.166.85\n)\n\n => Array\n(\n => 102.166.138.255\n)\n\n => Array\n(\n => 77.111.246.234\n)\n\n => Array\n(\n => 45.63.6.196\n)\n\n => Array\n(\n => 103.250.147.115\n)\n\n => Array\n(\n => 223.185.30.99\n)\n\n => Array\n(\n => 103.122.168.108\n)\n\n => Array\n(\n => 123.136.203.21\n)\n\n => Array\n(\n => 171.229.243.63\n)\n\n => Array\n(\n => 153.149.98.149\n)\n\n => Array\n(\n => 223.238.93.15\n)\n\n => Array\n(\n => 178.62.113.166\n)\n\n => Array\n(\n => 101.162.0.153\n)\n\n => Array\n(\n => 121.200.62.114\n)\n\n => Array\n(\n => 14.248.77.252\n)\n\n => Array\n(\n => 95.142.117.29\n)\n\n => Array\n(\n => 150.129.60.107\n)\n\n => Array\n(\n => 94.205.243.22\n)\n\n => Array\n(\n => 115.42.71.143\n)\n\n => Array\n(\n => 117.217.195.59\n)\n\n => Array\n(\n => 182.77.112.56\n)\n\n => Array\n(\n => 182.77.112.108\n)\n\n => Array\n(\n => 41.80.69.10\n)\n\n => Array\n(\n => 117.5.222.121\n)\n\n => Array\n(\n => 103.11.0.38\n)\n\n => Array\n(\n => 202.173.127.140\n)\n\n => Array\n(\n => 49.249.249.50\n)\n\n => Array\n(\n => 116.72.198.211\n)\n\n => Array\n(\n => 223.230.54.53\n)\n\n => Array\n(\n => 102.69.228.74\n)\n\n => Array\n(\n => 39.37.251.89\n)\n\n => Array\n(\n => 39.53.246.141\n)\n\n => Array\n(\n => 39.57.182.72\n)\n\n => Array\n(\n => 209.58.130.210\n)\n\n => Array\n(\n => 104.131.75.86\n)\n\n => Array\n(\n => 106.212.131.255\n)\n\n => Array\n(\n => 106.212.132.127\n)\n\n => Array\n(\n => 223.190.4.60\n)\n\n => Array\n(\n => 103.252.116.252\n)\n\n => Array\n(\n => 103.76.55.182\n)\n\n => Array\n(\n => 45.118.166.70\n)\n\n => Array\n(\n => 103.93.174.215\n)\n\n => Array\n(\n => 5.62.62.142\n)\n\n => Array\n(\n => 182.179.158.156\n)\n\n => Array\n(\n => 39.57.255.12\n)\n\n => Array\n(\n => 39.37.178.37\n)\n\n => Array\n(\n => 182.180.165.211\n)\n\n => Array\n(\n => 119.153.135.17\n)\n\n => Array\n(\n => 72.255.15.244\n)\n\n => Array\n(\n => 139.180.166.181\n)\n\n => Array\n(\n => 70.119.147.111\n)\n\n => Array\n(\n => 106.210.40.83\n)\n\n => Array\n(\n => 14.190.70.91\n)\n\n => Array\n(\n => 202.125.156.82\n)\n\n => Array\n(\n => 115.42.68.38\n)\n\n => Array\n(\n => 102.167.13.108\n)\n\n => Array\n(\n => 117.217.192.130\n)\n\n => Array\n(\n => 205.185.223.156\n)\n\n => Array\n(\n => 171.224.180.29\n)\n\n => Array\n(\n => 45.127.45.68\n)\n\n => Array\n(\n => 195.206.183.232\n)\n\n => Array\n(\n => 49.32.52.115\n)\n\n => Array\n(\n => 49.207.49.223\n)\n\n => Array\n(\n => 45.63.29.61\n)\n\n => Array\n(\n => 103.245.193.214\n)\n\n => Array\n(\n => 39.40.236.69\n)\n\n => Array\n(\n => 62.80.162.111\n)\n\n => Array\n(\n => 45.116.232.56\n)\n\n => Array\n(\n => 45.118.166.91\n)\n\n => Array\n(\n => 180.92.230.234\n)\n\n => Array\n(\n => 157.40.57.160\n)\n\n => Array\n(\n => 110.38.38.130\n)\n\n => Array\n(\n => 72.255.57.183\n)\n\n => Array\n(\n => 182.68.81.85\n)\n\n => Array\n(\n => 39.57.202.122\n)\n\n => Array\n(\n => 119.152.154.36\n)\n\n => Array\n(\n => 5.62.62.141\n)\n\n => Array\n(\n => 119.155.54.232\n)\n\n => Array\n(\n => 39.37.141.22\n)\n\n => Array\n(\n => 183.87.12.225\n)\n\n => Array\n(\n => 107.170.127.117\n)\n\n => Array\n(\n => 125.63.124.49\n)\n\n => Array\n(\n => 39.42.191.3\n)\n\n => Array\n(\n => 116.74.24.72\n)\n\n => Array\n(\n => 46.101.89.227\n)\n\n => Array\n(\n => 202.173.125.247\n)\n\n => Array\n(\n => 39.42.184.254\n)\n\n => Array\n(\n => 115.186.165.132\n)\n\n => Array\n(\n => 39.57.206.126\n)\n\n => Array\n(\n => 103.245.13.145\n)\n\n => Array\n(\n => 202.175.246.43\n)\n\n => Array\n(\n => 192.140.152.150\n)\n\n => Array\n(\n => 202.88.250.103\n)\n\n => Array\n(\n => 103.248.94.207\n)\n\n => Array\n(\n => 77.73.66.101\n)\n\n => Array\n(\n => 104.131.66.8\n)\n\n => Array\n(\n => 113.186.161.97\n)\n\n => Array\n(\n => 222.254.5.7\n)\n\n => Array\n(\n => 223.233.67.247\n)\n\n => Array\n(\n => 171.249.116.146\n)\n\n => Array\n(\n => 47.30.209.71\n)\n\n => Array\n(\n => 202.134.13.130\n)\n\n => Array\n(\n => 27.6.135.7\n)\n\n => Array\n(\n => 107.170.186.79\n)\n\n => Array\n(\n => 103.212.89.171\n)\n\n => Array\n(\n => 117.197.9.77\n)\n\n => Array\n(\n => 122.176.206.233\n)\n\n => Array\n(\n => 192.227.253.222\n)\n\n => Array\n(\n => 182.188.224.119\n)\n\n => Array\n(\n => 14.248.70.74\n)\n\n => Array\n(\n => 42.118.219.169\n)\n\n => Array\n(\n => 110.39.146.170\n)\n\n => Array\n(\n => 119.160.66.143\n)\n\n => Array\n(\n => 103.248.95.130\n)\n\n => Array\n(\n => 27.63.152.208\n)\n\n => Array\n(\n => 49.207.114.96\n)\n\n => Array\n(\n => 102.166.23.214\n)\n\n => Array\n(\n => 175.107.254.73\n)\n\n => Array\n(\n => 103.10.227.214\n)\n\n => Array\n(\n => 202.143.115.89\n)\n\n => Array\n(\n => 110.93.227.187\n)\n\n => Array\n(\n => 103.140.31.60\n)\n\n => Array\n(\n => 110.37.231.46\n)\n\n => Array\n(\n => 39.36.99.238\n)\n\n => Array\n(\n => 157.37.140.26\n)\n\n => Array\n(\n => 43.246.202.226\n)\n\n => Array\n(\n => 137.97.8.143\n)\n\n => Array\n(\n => 182.65.52.242\n)\n\n => Array\n(\n => 115.42.69.62\n)\n\n => Array\n(\n => 14.143.254.58\n)\n\n => Array\n(\n => 223.179.143.236\n)\n\n => Array\n(\n => 223.179.143.249\n)\n\n => Array\n(\n => 103.143.7.54\n)\n\n => Array\n(\n => 223.179.139.106\n)\n\n => Array\n(\n => 39.40.219.90\n)\n\n => Array\n(\n => 45.115.141.231\n)\n\n => Array\n(\n => 120.29.100.33\n)\n\n => Array\n(\n => 112.196.132.5\n)\n\n => Array\n(\n => 202.163.123.153\n)\n\n => Array\n(\n => 5.62.58.146\n)\n\n => Array\n(\n => 39.53.216.113\n)\n\n => Array\n(\n => 42.111.160.73\n)\n\n => Array\n(\n => 107.182.231.213\n)\n\n => Array\n(\n => 119.82.94.120\n)\n\n => Array\n(\n => 178.62.34.82\n)\n\n => Array\n(\n => 203.122.6.18\n)\n\n => Array\n(\n => 157.42.38.251\n)\n\n => Array\n(\n => 45.112.68.222\n)\n\n => Array\n(\n => 49.206.212.122\n)\n\n => Array\n(\n => 104.236.70.228\n)\n\n => Array\n(\n => 42.111.34.243\n)\n\n => Array\n(\n => 84.241.19.186\n)\n\n => Array\n(\n => 89.187.180.207\n)\n\n => Array\n(\n => 104.243.212.118\n)\n\n => Array\n(\n => 104.236.55.136\n)\n\n => Array\n(\n => 106.201.16.163\n)\n\n => Array\n(\n => 46.101.40.25\n)\n\n => Array\n(\n => 45.118.166.94\n)\n\n => Array\n(\n => 49.36.128.102\n)\n\n => Array\n(\n => 14.142.193.58\n)\n\n => Array\n(\n => 212.79.124.176\n)\n\n => Array\n(\n => 45.32.191.194\n)\n\n => Array\n(\n => 105.112.107.46\n)\n\n => Array\n(\n => 106.201.14.8\n)\n\n => Array\n(\n => 110.93.240.65\n)\n\n => Array\n(\n => 27.96.95.177\n)\n\n => Array\n(\n => 45.41.134.35\n)\n\n => Array\n(\n => 180.151.13.110\n)\n\n => Array\n(\n => 101.53.242.89\n)\n\n => Array\n(\n => 115.186.3.110\n)\n\n => Array\n(\n => 171.49.185.242\n)\n\n => Array\n(\n => 115.42.70.24\n)\n\n => Array\n(\n => 45.128.188.43\n)\n\n => Array\n(\n => 103.140.129.63\n)\n\n => Array\n(\n => 101.50.113.147\n)\n\n => Array\n(\n => 103.66.73.30\n)\n\n => Array\n(\n => 117.247.193.169\n)\n\n => Array\n(\n => 120.29.100.94\n)\n\n => Array\n(\n => 42.109.154.39\n)\n\n => Array\n(\n => 122.173.155.150\n)\n\n => Array\n(\n => 45.115.104.53\n)\n\n => Array\n(\n => 116.74.29.84\n)\n\n => Array\n(\n => 101.50.125.34\n)\n\n => Array\n(\n => 45.118.166.80\n)\n\n => Array\n(\n => 91.236.184.27\n)\n\n => Array\n(\n => 113.167.185.120\n)\n\n => Array\n(\n => 27.97.66.222\n)\n\n => Array\n(\n => 43.247.41.117\n)\n\n => Array\n(\n => 23.229.16.227\n)\n\n => Array\n(\n => 14.248.79.209\n)\n\n => Array\n(\n => 117.5.194.26\n)\n\n => Array\n(\n => 117.217.205.41\n)\n\n => Array\n(\n => 114.79.169.99\n)\n\n => Array\n(\n => 103.55.60.97\n)\n\n => Array\n(\n => 182.75.89.210\n)\n\n => Array\n(\n => 77.73.66.109\n)\n\n => Array\n(\n => 182.77.126.139\n)\n\n => Array\n(\n => 14.248.77.166\n)\n\n => Array\n(\n => 157.35.224.133\n)\n\n => Array\n(\n => 183.83.38.27\n)\n\n => Array\n(\n => 182.68.4.77\n)\n\n => Array\n(\n => 122.177.130.234\n)\n\n => Array\n(\n => 103.24.99.99\n)\n\n => Array\n(\n => 103.91.127.66\n)\n\n => Array\n(\n => 41.90.34.240\n)\n\n => Array\n(\n => 49.205.77.102\n)\n\n => Array\n(\n => 103.248.94.142\n)\n\n => Array\n(\n => 104.143.92.170\n)\n\n => Array\n(\n => 219.91.157.114\n)\n\n => Array\n(\n => 223.190.88.22\n)\n\n => Array\n(\n => 223.190.86.232\n)\n\n => Array\n(\n => 39.41.172.80\n)\n\n => Array\n(\n => 124.107.206.5\n)\n\n => Array\n(\n => 139.167.180.224\n)\n\n => Array\n(\n => 93.76.64.248\n)\n\n => Array\n(\n => 65.216.227.119\n)\n\n => Array\n(\n => 223.190.119.141\n)\n\n => Array\n(\n => 110.93.237.179\n)\n\n => Array\n(\n => 41.90.7.85\n)\n\n => Array\n(\n => 103.100.6.26\n)\n\n => Array\n(\n => 104.140.83.13\n)\n\n => Array\n(\n => 223.190.119.133\n)\n\n => Array\n(\n => 119.152.150.87\n)\n\n => Array\n(\n => 103.125.130.147\n)\n\n => Array\n(\n => 27.6.5.52\n)\n\n => Array\n(\n => 103.98.188.26\n)\n\n => Array\n(\n => 39.35.121.81\n)\n\n => Array\n(\n => 74.119.146.182\n)\n\n => Array\n(\n => 5.181.233.162\n)\n\n => Array\n(\n => 157.39.18.60\n)\n\n => Array\n(\n => 1.187.252.25\n)\n\n => Array\n(\n => 39.42.145.59\n)\n\n => Array\n(\n => 39.35.39.198\n)\n\n => Array\n(\n => 49.36.128.214\n)\n\n => Array\n(\n => 182.190.20.56\n)\n\n => Array\n(\n => 122.180.249.189\n)\n\n => Array\n(\n => 117.217.203.107\n)\n\n => Array\n(\n => 103.70.82.241\n)\n\n => Array\n(\n => 45.118.166.68\n)\n\n => Array\n(\n => 122.180.168.39\n)\n\n => Array\n(\n => 149.28.67.254\n)\n\n => Array\n(\n => 223.233.73.8\n)\n\n => Array\n(\n => 122.167.140.0\n)\n\n => Array\n(\n => 95.158.51.55\n)\n\n => Array\n(\n => 27.96.95.134\n)\n\n => Array\n(\n => 49.206.214.53\n)\n\n => Array\n(\n => 212.103.49.92\n)\n\n => Array\n(\n => 122.177.115.101\n)\n\n => Array\n(\n => 171.50.187.124\n)\n\n => Array\n(\n => 122.164.55.107\n)\n\n => Array\n(\n => 98.114.217.204\n)\n\n => Array\n(\n => 106.215.10.54\n)\n\n => Array\n(\n => 115.42.68.28\n)\n\n => Array\n(\n => 104.194.220.87\n)\n\n => Array\n(\n => 103.137.84.170\n)\n\n => Array\n(\n => 61.16.142.110\n)\n\n => Array\n(\n => 212.103.49.85\n)\n\n => Array\n(\n => 39.53.248.162\n)\n\n => Array\n(\n => 203.122.40.214\n)\n\n => Array\n(\n => 117.217.198.72\n)\n\n => Array\n(\n => 115.186.191.203\n)\n\n => Array\n(\n => 120.29.100.199\n)\n\n => Array\n(\n => 45.151.237.24\n)\n\n => Array\n(\n => 223.190.125.232\n)\n\n => Array\n(\n => 41.80.151.17\n)\n\n => Array\n(\n => 23.111.188.5\n)\n\n => Array\n(\n => 223.190.125.216\n)\n\n => Array\n(\n => 103.217.133.119\n)\n\n => Array\n(\n => 103.198.173.132\n)\n\n => Array\n(\n => 47.31.155.89\n)\n\n => Array\n(\n => 223.190.20.253\n)\n\n => Array\n(\n => 104.131.92.125\n)\n\n => Array\n(\n => 223.190.19.152\n)\n\n => Array\n(\n => 103.245.193.191\n)\n\n => Array\n(\n => 106.215.58.255\n)\n\n => Array\n(\n => 119.82.83.238\n)\n\n => Array\n(\n => 106.212.128.138\n)\n\n => Array\n(\n => 139.167.237.36\n)\n\n => Array\n(\n => 222.124.40.250\n)\n\n => Array\n(\n => 134.56.185.169\n)\n\n => Array\n(\n => 54.255.226.31\n)\n\n => Array\n(\n => 137.97.162.31\n)\n\n => Array\n(\n => 95.185.21.191\n)\n\n => Array\n(\n => 171.61.168.151\n)\n\n => Array\n(\n => 137.97.184.4\n)\n\n => Array\n(\n => 106.203.151.202\n)\n\n => Array\n(\n => 39.37.137.0\n)\n\n => Array\n(\n => 45.118.166.66\n)\n\n => Array\n(\n => 14.248.105.100\n)\n\n => Array\n(\n => 106.215.61.185\n)\n\n => Array\n(\n => 202.83.57.179\n)\n\n => Array\n(\n => 89.187.182.176\n)\n\n => Array\n(\n => 49.249.232.198\n)\n\n => Array\n(\n => 132.154.95.236\n)\n\n => Array\n(\n => 223.233.83.230\n)\n\n => Array\n(\n => 183.83.153.14\n)\n\n => Array\n(\n => 125.63.72.210\n)\n\n => Array\n(\n => 207.174.202.11\n)\n\n => Array\n(\n => 119.95.88.59\n)\n\n => Array\n(\n => 122.170.14.150\n)\n\n => Array\n(\n => 45.118.166.75\n)\n\n => Array\n(\n => 103.12.135.37\n)\n\n => Array\n(\n => 49.207.120.225\n)\n\n => Array\n(\n => 182.64.195.207\n)\n\n => Array\n(\n => 103.99.37.16\n)\n\n => Array\n(\n => 46.150.104.221\n)\n\n => Array\n(\n => 104.236.195.147\n)\n\n => Array\n(\n => 103.104.192.43\n)\n\n => Array\n(\n => 24.242.159.118\n)\n\n => Array\n(\n => 39.42.179.143\n)\n\n => Array\n(\n => 111.93.58.131\n)\n\n => Array\n(\n => 193.176.84.127\n)\n\n => Array\n(\n => 209.58.142.218\n)\n\n => Array\n(\n => 69.243.152.129\n)\n\n => Array\n(\n => 117.97.131.249\n)\n\n => Array\n(\n => 103.230.180.89\n)\n\n => Array\n(\n => 106.212.170.192\n)\n\n => Array\n(\n => 171.224.180.95\n)\n\n => Array\n(\n => 158.222.11.87\n)\n\n => Array\n(\n => 119.155.60.246\n)\n\n => Array\n(\n => 41.90.43.129\n)\n\n => Array\n(\n => 185.183.104.170\n)\n\n => Array\n(\n => 14.248.67.65\n)\n\n => Array\n(\n => 117.217.205.82\n)\n\n => Array\n(\n => 111.88.7.209\n)\n\n => Array\n(\n => 49.36.132.244\n)\n\n => Array\n(\n => 171.48.40.2\n)\n\n => Array\n(\n => 119.81.105.2\n)\n\n => Array\n(\n => 49.36.128.114\n)\n\n => Array\n(\n => 213.200.31.93\n)\n\n => Array\n(\n => 2.50.15.110\n)\n\n => Array\n(\n => 120.29.104.67\n)\n\n => Array\n(\n => 223.225.32.221\n)\n\n => Array\n(\n => 14.248.67.195\n)\n\n => Array\n(\n => 119.155.36.13\n)\n\n => Array\n(\n => 101.50.95.104\n)\n\n => Array\n(\n => 104.236.205.233\n)\n\n => Array\n(\n => 122.164.36.150\n)\n\n => Array\n(\n => 157.45.93.209\n)\n\n => Array\n(\n => 182.77.118.100\n)\n\n => Array\n(\n => 182.74.134.218\n)\n\n => Array\n(\n => 183.82.128.146\n)\n\n => Array\n(\n => 112.196.170.234\n)\n\n => Array\n(\n => 122.173.230.178\n)\n\n => Array\n(\n => 122.164.71.199\n)\n\n => Array\n(\n => 51.79.19.31\n)\n\n => Array\n(\n => 58.65.222.20\n)\n\n => Array\n(\n => 103.27.203.97\n)\n\n => Array\n(\n => 111.88.7.242\n)\n\n => Array\n(\n => 14.171.232.77\n)\n\n => Array\n(\n => 46.101.22.182\n)\n\n => Array\n(\n => 103.94.219.19\n)\n\n => Array\n(\n => 139.190.83.30\n)\n\n => Array\n(\n => 223.190.27.184\n)\n\n => Array\n(\n => 182.185.183.34\n)\n\n => Array\n(\n => 91.74.181.242\n)\n\n => Array\n(\n => 222.252.107.14\n)\n\n => Array\n(\n => 137.97.8.28\n)\n\n => Array\n(\n => 46.101.16.229\n)\n\n => Array\n(\n => 122.53.254.229\n)\n\n => Array\n(\n => 106.201.17.180\n)\n\n => Array\n(\n => 123.24.170.129\n)\n\n => Array\n(\n => 182.185.180.79\n)\n\n => Array\n(\n => 223.190.17.4\n)\n\n => Array\n(\n => 213.108.105.1\n)\n\n => Array\n(\n => 171.22.76.9\n)\n\n => Array\n(\n => 202.66.178.164\n)\n\n => Array\n(\n => 178.62.97.171\n)\n\n => Array\n(\n => 167.179.110.209\n)\n\n => Array\n(\n => 223.230.147.172\n)\n\n => Array\n(\n => 76.218.195.160\n)\n\n => Array\n(\n => 14.189.186.178\n)\n\n => Array\n(\n => 157.41.45.143\n)\n\n => Array\n(\n => 223.238.22.53\n)\n\n => Array\n(\n => 111.88.7.244\n)\n\n => Array\n(\n => 5.62.57.19\n)\n\n => Array\n(\n => 106.201.25.216\n)\n\n => Array\n(\n => 117.217.205.33\n)\n\n => Array\n(\n => 111.88.7.215\n)\n\n => Array\n(\n => 106.201.13.77\n)\n\n => Array\n(\n => 50.7.93.29\n)\n\n => Array\n(\n => 123.201.70.112\n)\n\n => Array\n(\n => 39.42.108.226\n)\n\n => Array\n(\n => 27.5.198.29\n)\n\n => Array\n(\n => 223.238.85.187\n)\n\n => Array\n(\n => 171.49.176.32\n)\n\n => Array\n(\n => 14.248.79.242\n)\n\n => Array\n(\n => 46.219.211.183\n)\n\n => Array\n(\n => 185.244.212.251\n)\n\n => Array\n(\n => 14.102.84.126\n)\n\n => Array\n(\n => 106.212.191.52\n)\n\n => Array\n(\n => 154.72.153.203\n)\n\n => Array\n(\n => 14.175.82.64\n)\n\n => Array\n(\n => 141.105.139.131\n)\n\n => Array\n(\n => 182.156.103.98\n)\n\n => Array\n(\n => 117.217.204.75\n)\n\n => Array\n(\n => 104.140.83.115\n)\n\n => Array\n(\n => 119.152.62.8\n)\n\n => Array\n(\n => 45.125.247.94\n)\n\n => Array\n(\n => 137.97.37.252\n)\n\n => Array\n(\n => 117.217.204.73\n)\n\n => Array\n(\n => 14.248.79.133\n)\n\n => Array\n(\n => 39.37.152.52\n)\n\n => Array\n(\n => 103.55.60.54\n)\n\n => Array\n(\n => 102.166.183.88\n)\n\n => Array\n(\n => 5.62.60.162\n)\n\n => Array\n(\n => 5.62.60.163\n)\n\n => Array\n(\n => 160.202.38.131\n)\n\n => Array\n(\n => 106.215.20.253\n)\n\n => Array\n(\n => 39.37.160.54\n)\n\n => Array\n(\n => 119.152.59.186\n)\n\n => Array\n(\n => 183.82.0.164\n)\n\n => Array\n(\n => 41.90.54.87\n)\n\n => Array\n(\n => 157.36.85.158\n)\n\n => Array\n(\n => 110.37.229.162\n)\n\n => Array\n(\n => 203.99.180.148\n)\n\n => Array\n(\n => 117.97.132.91\n)\n\n => Array\n(\n => 171.61.147.105\n)\n\n => Array\n(\n => 14.98.147.214\n)\n\n => Array\n(\n => 209.234.253.191\n)\n\n => Array\n(\n => 92.38.148.60\n)\n\n => Array\n(\n => 178.128.104.139\n)\n\n => Array\n(\n => 212.154.0.176\n)\n\n => Array\n(\n => 103.41.24.141\n)\n\n => Array\n(\n => 2.58.194.132\n)\n\n => Array\n(\n => 180.190.78.169\n)\n\n => Array\n(\n => 106.215.45.182\n)\n\n => Array\n(\n => 125.63.100.222\n)\n\n => Array\n(\n => 110.54.247.17\n)\n\n => Array\n(\n => 103.26.85.105\n)\n\n => Array\n(\n => 39.42.147.3\n)\n\n => Array\n(\n => 137.97.51.41\n)\n\n => Array\n(\n => 71.202.72.27\n)\n\n => Array\n(\n => 119.155.35.10\n)\n\n => Array\n(\n => 202.47.43.120\n)\n\n => Array\n(\n => 183.83.64.101\n)\n\n => Array\n(\n => 182.68.106.141\n)\n\n => Array\n(\n => 171.61.187.87\n)\n\n => Array\n(\n => 178.162.198.118\n)\n\n => Array\n(\n => 115.97.151.218\n)\n\n => Array\n(\n => 196.207.184.210\n)\n\n => Array\n(\n => 198.16.70.51\n)\n\n => Array\n(\n => 41.60.237.33\n)\n\n => Array\n(\n => 47.11.86.26\n)\n\n => Array\n(\n => 117.217.201.183\n)\n\n => Array\n(\n => 203.192.241.79\n)\n\n => Array\n(\n => 122.165.119.85\n)\n\n => Array\n(\n => 23.227.142.218\n)\n\n => Array\n(\n => 178.128.104.221\n)\n\n => Array\n(\n => 14.192.54.163\n)\n\n => Array\n(\n => 139.5.253.218\n)\n\n => Array\n(\n => 117.230.140.127\n)\n\n => Array\n(\n => 195.114.149.199\n)\n\n => Array\n(\n => 14.239.180.220\n)\n\n => Array\n(\n => 103.62.155.94\n)\n\n => Array\n(\n => 118.71.97.14\n)\n\n => Array\n(\n => 137.97.55.163\n)\n\n => Array\n(\n => 202.47.49.198\n)\n\n => Array\n(\n => 171.61.177.85\n)\n\n => Array\n(\n => 137.97.190.224\n)\n\n => Array\n(\n => 117.230.34.142\n)\n\n => Array\n(\n => 103.41.32.5\n)\n\n => Array\n(\n => 203.90.82.237\n)\n\n => Array\n(\n => 125.63.124.238\n)\n\n => Array\n(\n => 103.232.128.78\n)\n\n => Array\n(\n => 106.197.14.227\n)\n\n => Array\n(\n => 81.17.242.244\n)\n\n => Array\n(\n => 81.19.210.179\n)\n\n => Array\n(\n => 103.134.94.98\n)\n\n => Array\n(\n => 110.38.0.86\n)\n\n => Array\n(\n => 103.10.224.195\n)\n\n => Array\n(\n => 45.118.166.89\n)\n\n => Array\n(\n => 115.186.186.68\n)\n\n => Array\n(\n => 138.197.129.237\n)\n\n => Array\n(\n => 14.247.162.52\n)\n\n => Array\n(\n => 103.255.4.5\n)\n\n => Array\n(\n => 14.167.188.254\n)\n\n => Array\n(\n => 5.62.59.54\n)\n\n => Array\n(\n => 27.122.14.80\n)\n\n => Array\n(\n => 39.53.240.21\n)\n\n => Array\n(\n => 39.53.241.243\n)\n\n => Array\n(\n => 117.230.130.161\n)\n\n => Array\n(\n => 118.71.191.149\n)\n\n => Array\n(\n => 5.188.95.54\n)\n\n => Array\n(\n => 66.45.250.27\n)\n\n => Array\n(\n => 106.215.6.175\n)\n\n => Array\n(\n => 27.122.14.86\n)\n\n => Array\n(\n => 103.255.4.51\n)\n\n => Array\n(\n => 101.50.93.119\n)\n\n => Array\n(\n => 137.97.183.51\n)\n\n => Array\n(\n => 117.217.204.185\n)\n\n => Array\n(\n => 95.104.106.82\n)\n\n => Array\n(\n => 5.62.56.211\n)\n\n => Array\n(\n => 103.104.181.214\n)\n\n => Array\n(\n => 36.72.214.243\n)\n\n => Array\n(\n => 5.62.62.219\n)\n\n => Array\n(\n => 110.36.202.4\n)\n\n => Array\n(\n => 103.255.4.253\n)\n\n => Array\n(\n => 110.172.138.61\n)\n\n => Array\n(\n => 159.203.24.195\n)\n\n => Array\n(\n => 13.229.88.42\n)\n\n => Array\n(\n => 59.153.235.20\n)\n\n => Array\n(\n => 171.236.169.32\n)\n\n => Array\n(\n => 14.231.85.206\n)\n\n => Array\n(\n => 119.152.54.103\n)\n\n => Array\n(\n => 103.80.117.202\n)\n\n => Array\n(\n => 223.179.157.75\n)\n\n => Array\n(\n => 122.173.68.249\n)\n\n => Array\n(\n => 188.163.72.113\n)\n\n => Array\n(\n => 119.155.20.164\n)\n\n => Array\n(\n => 103.121.43.68\n)\n\n => Array\n(\n => 5.62.58.6\n)\n\n => Array\n(\n => 203.122.40.154\n)\n\n => Array\n(\n => 222.254.96.203\n)\n\n => Array\n(\n => 103.83.148.167\n)\n\n => Array\n(\n => 103.87.251.226\n)\n\n => Array\n(\n => 123.24.129.24\n)\n\n => Array\n(\n => 137.97.83.8\n)\n\n => Array\n(\n => 223.225.33.132\n)\n\n => Array\n(\n => 128.76.175.190\n)\n\n => Array\n(\n => 195.85.219.32\n)\n\n => Array\n(\n => 139.167.102.93\n)\n\n => Array\n(\n => 49.15.198.253\n)\n\n => Array\n(\n => 45.152.183.172\n)\n\n => Array\n(\n => 42.106.180.136\n)\n\n => Array\n(\n => 95.142.120.9\n)\n\n => Array\n(\n => 139.167.236.4\n)\n\n => Array\n(\n => 159.65.72.167\n)\n\n => Array\n(\n => 49.15.89.2\n)\n\n => Array\n(\n => 42.201.161.195\n)\n\n => Array\n(\n => 27.97.210.38\n)\n\n => Array\n(\n => 171.241.45.19\n)\n\n => Array\n(\n => 42.108.2.18\n)\n\n => Array\n(\n => 171.236.40.68\n)\n\n => Array\n(\n => 110.93.82.102\n)\n\n => Array\n(\n => 43.225.24.186\n)\n\n => Array\n(\n => 117.230.189.119\n)\n\n => Array\n(\n => 124.123.147.187\n)\n\n => Array\n(\n => 216.151.184.250\n)\n\n => Array\n(\n => 49.15.133.16\n)\n\n => Array\n(\n => 49.15.220.74\n)\n\n => Array\n(\n => 157.37.221.246\n)\n\n => Array\n(\n => 176.124.233.112\n)\n\n => Array\n(\n => 118.71.167.40\n)\n\n => Array\n(\n => 182.185.213.161\n)\n\n => Array\n(\n => 47.31.79.248\n)\n\n => Array\n(\n => 223.179.238.192\n)\n\n => Array\n(\n => 79.110.128.219\n)\n\n => Array\n(\n => 106.210.42.111\n)\n\n => Array\n(\n => 47.247.214.229\n)\n\n => Array\n(\n => 193.0.220.108\n)\n\n => Array\n(\n => 1.39.206.254\n)\n\n => Array\n(\n => 123.201.77.38\n)\n\n => Array\n(\n => 115.178.207.21\n)\n\n => Array\n(\n => 37.111.202.92\n)\n\n => Array\n(\n => 49.14.179.243\n)\n\n => Array\n(\n => 117.230.145.171\n)\n\n => Array\n(\n => 171.229.242.96\n)\n\n => Array\n(\n => 27.59.174.209\n)\n\n => Array\n(\n => 1.38.202.211\n)\n\n => Array\n(\n => 157.37.128.46\n)\n\n => Array\n(\n => 49.15.94.80\n)\n\n => Array\n(\n => 123.25.46.147\n)\n\n => Array\n(\n => 117.230.170.185\n)\n\n => Array\n(\n => 5.62.16.19\n)\n\n => Array\n(\n => 103.18.22.25\n)\n\n => Array\n(\n => 103.46.200.132\n)\n\n => Array\n(\n => 27.97.165.126\n)\n\n => Array\n(\n => 117.230.54.241\n)\n\n => Array\n(\n => 27.97.209.76\n)\n\n => Array\n(\n => 47.31.182.109\n)\n\n => Array\n(\n => 47.30.223.221\n)\n\n => Array\n(\n => 103.31.94.82\n)\n\n => Array\n(\n => 103.211.14.45\n)\n\n => Array\n(\n => 171.49.233.58\n)\n\n => Array\n(\n => 65.49.126.95\n)\n\n => Array\n(\n => 69.255.101.170\n)\n\n => Array\n(\n => 27.56.224.67\n)\n\n => Array\n(\n => 117.230.146.86\n)\n\n => Array\n(\n => 27.59.154.52\n)\n\n => Array\n(\n => 132.154.114.10\n)\n\n => Array\n(\n => 182.186.77.60\n)\n\n => Array\n(\n => 117.230.136.74\n)\n\n => Array\n(\n => 43.251.94.253\n)\n\n => Array\n(\n => 103.79.168.225\n)\n\n => Array\n(\n => 117.230.56.51\n)\n\n => Array\n(\n => 27.97.187.45\n)\n\n => Array\n(\n => 137.97.190.61\n)\n\n => Array\n(\n => 193.0.220.26\n)\n\n => Array\n(\n => 49.36.137.62\n)\n\n => Array\n(\n => 47.30.189.248\n)\n\n => Array\n(\n => 109.169.23.84\n)\n\n => Array\n(\n => 111.119.185.46\n)\n\n => Array\n(\n => 103.83.148.246\n)\n\n => Array\n(\n => 157.32.119.138\n)\n\n => Array\n(\n => 5.62.41.53\n)\n\n => Array\n(\n => 47.8.243.236\n)\n\n => Array\n(\n => 112.79.158.69\n)\n\n => Array\n(\n => 180.92.148.218\n)\n\n => Array\n(\n => 157.36.162.154\n)\n\n => Array\n(\n => 39.46.114.47\n)\n\n => Array\n(\n => 117.230.173.250\n)\n\n => Array\n(\n => 117.230.155.188\n)\n\n => Array\n(\n => 193.0.220.17\n)\n\n => Array\n(\n => 117.230.171.166\n)\n\n => Array\n(\n => 49.34.59.228\n)\n\n => Array\n(\n => 111.88.197.247\n)\n\n => Array\n(\n => 47.31.156.112\n)\n\n => Array\n(\n => 137.97.64.180\n)\n\n => Array\n(\n => 14.244.227.18\n)\n\n => Array\n(\n => 113.167.158.8\n)\n\n => Array\n(\n => 39.37.175.189\n)\n\n => Array\n(\n => 139.167.211.8\n)\n\n => Array\n(\n => 73.120.85.235\n)\n\n => Array\n(\n => 104.236.195.72\n)\n\n => Array\n(\n => 27.97.190.71\n)\n\n => Array\n(\n => 79.46.170.222\n)\n\n => Array\n(\n => 102.185.244.207\n)\n\n => Array\n(\n => 37.111.136.30\n)\n\n => Array\n(\n => 50.7.93.28\n)\n\n => Array\n(\n => 110.54.251.43\n)\n\n => Array\n(\n => 49.36.143.40\n)\n\n => Array\n(\n => 103.130.112.185\n)\n\n => Array\n(\n => 37.111.139.202\n)\n\n => Array\n(\n => 49.36.139.108\n)\n\n => Array\n(\n => 37.111.136.179\n)\n\n => Array\n(\n => 123.17.165.77\n)\n\n => Array\n(\n => 49.207.143.206\n)\n\n => Array\n(\n => 39.53.80.149\n)\n\n => Array\n(\n => 223.188.71.214\n)\n\n => Array\n(\n => 1.39.222.233\n)\n\n => Array\n(\n => 117.230.9.85\n)\n\n => Array\n(\n => 103.251.245.216\n)\n\n => Array\n(\n => 122.169.133.145\n)\n\n => Array\n(\n => 43.250.165.57\n)\n\n => Array\n(\n => 39.44.13.235\n)\n\n => Array\n(\n => 157.47.181.2\n)\n\n => Array\n(\n => 27.56.203.50\n)\n\n => Array\n(\n => 191.96.97.58\n)\n\n => Array\n(\n => 111.88.107.172\n)\n\n => Array\n(\n => 113.193.198.136\n)\n\n => Array\n(\n => 117.230.172.175\n)\n\n => Array\n(\n => 191.96.182.239\n)\n\n => Array\n(\n => 2.58.46.28\n)\n\n => Array\n(\n => 183.83.253.87\n)\n\n => Array\n(\n => 49.15.139.242\n)\n\n => Array\n(\n => 42.107.220.236\n)\n\n => Array\n(\n => 14.192.53.196\n)\n\n => Array\n(\n => 42.119.212.202\n)\n\n => Array\n(\n => 192.158.234.45\n)\n\n => Array\n(\n => 49.149.102.192\n)\n\n => Array\n(\n => 47.8.170.17\n)\n\n => Array\n(\n => 117.197.13.247\n)\n\n => Array\n(\n => 116.74.34.44\n)\n\n => Array\n(\n => 103.79.249.163\n)\n\n => Array\n(\n => 182.189.95.70\n)\n\n => Array\n(\n => 137.59.218.118\n)\n\n => Array\n(\n => 103.79.170.243\n)\n\n => Array\n(\n => 39.40.54.25\n)\n\n => Array\n(\n => 119.155.40.170\n)\n\n => Array\n(\n => 1.39.212.157\n)\n\n => Array\n(\n => 70.127.59.89\n)\n\n => Array\n(\n => 14.171.22.58\n)\n\n => Array\n(\n => 194.44.167.141\n)\n\n => Array\n(\n => 111.88.179.154\n)\n\n => Array\n(\n => 117.230.140.232\n)\n\n => Array\n(\n => 137.97.96.128\n)\n\n => Array\n(\n => 198.16.66.123\n)\n\n => Array\n(\n => 106.198.44.193\n)\n\n => Array\n(\n => 119.153.45.75\n)\n\n => Array\n(\n => 49.15.242.208\n)\n\n => Array\n(\n => 119.155.241.20\n)\n\n => Array\n(\n => 106.223.109.155\n)\n\n => Array\n(\n => 119.160.119.245\n)\n\n => Array\n(\n => 106.215.81.160\n)\n\n => Array\n(\n => 1.39.192.211\n)\n\n => Array\n(\n => 223.230.35.208\n)\n\n => Array\n(\n => 39.59.4.158\n)\n\n => Array\n(\n => 43.231.57.234\n)\n\n => Array\n(\n => 60.254.78.193\n)\n\n => Array\n(\n => 122.170.224.87\n)\n\n => Array\n(\n => 117.230.22.141\n)\n\n => Array\n(\n => 119.152.107.211\n)\n\n => Array\n(\n => 103.87.192.206\n)\n\n => Array\n(\n => 39.45.244.47\n)\n\n => Array\n(\n => 50.72.141.94\n)\n\n => Array\n(\n => 39.40.6.128\n)\n\n => Array\n(\n => 39.45.180.186\n)\n\n => Array\n(\n => 49.207.131.233\n)\n\n => Array\n(\n => 139.59.69.142\n)\n\n => Array\n(\n => 111.119.187.29\n)\n\n => Array\n(\n => 119.153.40.69\n)\n\n => Array\n(\n => 49.36.133.64\n)\n\n => Array\n(\n => 103.255.4.249\n)\n\n => Array\n(\n => 198.144.154.15\n)\n\n => Array\n(\n => 1.22.46.172\n)\n\n => Array\n(\n => 103.255.5.46\n)\n\n => Array\n(\n => 27.56.195.188\n)\n\n => Array\n(\n => 203.101.167.53\n)\n\n => Array\n(\n => 117.230.62.195\n)\n\n => Array\n(\n => 103.240.194.186\n)\n\n => Array\n(\n => 107.170.166.118\n)\n\n => Array\n(\n => 101.53.245.80\n)\n\n => Array\n(\n => 157.43.13.208\n)\n\n => Array\n(\n => 137.97.100.77\n)\n\n => Array\n(\n => 47.31.150.208\n)\n\n => Array\n(\n => 137.59.222.65\n)\n\n => Array\n(\n => 103.85.127.250\n)\n\n => Array\n(\n => 103.214.119.32\n)\n\n => Array\n(\n => 182.255.49.52\n)\n\n => Array\n(\n => 103.75.247.72\n)\n\n => Array\n(\n => 103.85.125.250\n)\n\n => Array\n(\n => 183.83.253.167\n)\n\n => Array\n(\n => 1.39.222.111\n)\n\n => Array\n(\n => 111.119.185.9\n)\n\n => Array\n(\n => 111.119.187.10\n)\n\n => Array\n(\n => 39.37.147.144\n)\n\n => Array\n(\n => 103.200.198.183\n)\n\n => Array\n(\n => 1.39.222.18\n)\n\n => Array\n(\n => 198.8.80.103\n)\n\n => Array\n(\n => 42.108.1.243\n)\n\n => Array\n(\n => 111.119.187.16\n)\n\n => Array\n(\n => 39.40.241.8\n)\n\n => Array\n(\n => 122.169.150.158\n)\n\n => Array\n(\n => 39.40.215.119\n)\n\n => Array\n(\n => 103.255.5.77\n)\n\n => Array\n(\n => 157.38.108.196\n)\n\n => Array\n(\n => 103.255.4.67\n)\n\n => Array\n(\n => 5.62.60.62\n)\n\n => Array\n(\n => 39.37.146.202\n)\n\n => Array\n(\n => 110.138.6.221\n)\n\n => Array\n(\n => 49.36.143.88\n)\n\n => Array\n(\n => 37.1.215.39\n)\n\n => Array\n(\n => 27.106.59.190\n)\n\n => Array\n(\n => 139.167.139.41\n)\n\n => Array\n(\n => 114.142.166.179\n)\n\n => Array\n(\n => 223.225.240.112\n)\n\n => Array\n(\n => 103.255.5.36\n)\n\n => Array\n(\n => 175.136.1.48\n)\n\n => Array\n(\n => 103.82.80.166\n)\n\n => Array\n(\n => 182.185.196.126\n)\n\n => Array\n(\n => 157.43.45.76\n)\n\n => Array\n(\n => 119.152.132.49\n)\n\n => Array\n(\n => 5.62.62.162\n)\n\n => Array\n(\n => 103.255.4.39\n)\n\n => Array\n(\n => 202.5.144.153\n)\n\n => Array\n(\n => 1.39.223.210\n)\n\n => Array\n(\n => 92.38.176.154\n)\n\n => Array\n(\n => 117.230.186.142\n)\n\n => Array\n(\n => 183.83.39.123\n)\n\n => Array\n(\n => 182.185.156.76\n)\n\n => Array\n(\n => 104.236.74.212\n)\n\n => Array\n(\n => 107.170.145.187\n)\n\n => Array\n(\n => 117.102.7.98\n)\n\n => Array\n(\n => 137.59.220.0\n)\n\n => Array\n(\n => 157.47.222.14\n)\n\n => Array\n(\n => 47.15.206.82\n)\n\n => Array\n(\n => 117.230.159.99\n)\n\n => Array\n(\n => 117.230.175.151\n)\n\n => Array\n(\n => 157.50.97.18\n)\n\n => Array\n(\n => 117.230.47.164\n)\n\n => Array\n(\n => 77.111.244.34\n)\n\n => Array\n(\n => 139.167.189.131\n)\n\n => Array\n(\n => 1.39.204.103\n)\n\n => Array\n(\n => 117.230.58.0\n)\n\n => Array\n(\n => 182.185.226.66\n)\n\n => Array\n(\n => 115.42.70.119\n)\n\n => Array\n(\n => 171.48.114.134\n)\n\n => Array\n(\n => 144.34.218.75\n)\n\n => Array\n(\n => 199.58.164.135\n)\n\n => Array\n(\n => 101.53.228.151\n)\n\n => Array\n(\n => 117.230.50.57\n)\n\n => Array\n(\n => 223.225.138.84\n)\n\n => Array\n(\n => 110.225.67.65\n)\n\n => Array\n(\n => 47.15.200.39\n)\n\n => Array\n(\n => 39.42.20.127\n)\n\n => Array\n(\n => 117.97.241.81\n)\n\n => Array\n(\n => 111.119.185.11\n)\n\n => Array\n(\n => 103.100.5.94\n)\n\n => Array\n(\n => 103.25.137.69\n)\n\n => Array\n(\n => 47.15.197.159\n)\n\n => Array\n(\n => 223.188.176.122\n)\n\n => Array\n(\n => 27.4.175.80\n)\n\n => Array\n(\n => 181.215.43.82\n)\n\n => Array\n(\n => 27.56.228.157\n)\n\n => Array\n(\n => 117.230.19.19\n)\n\n => Array\n(\n => 47.15.208.71\n)\n\n => Array\n(\n => 119.155.21.176\n)\n\n => Array\n(\n => 47.15.234.202\n)\n\n => Array\n(\n => 117.230.144.135\n)\n\n => Array\n(\n => 112.79.139.199\n)\n\n => Array\n(\n => 116.75.246.41\n)\n\n => Array\n(\n => 117.230.177.126\n)\n\n => Array\n(\n => 212.103.48.134\n)\n\n => Array\n(\n => 102.69.228.78\n)\n\n => Array\n(\n => 117.230.37.118\n)\n\n => Array\n(\n => 175.143.61.75\n)\n\n => Array\n(\n => 139.167.56.138\n)\n\n => Array\n(\n => 58.145.189.250\n)\n\n => Array\n(\n => 103.255.5.65\n)\n\n => Array\n(\n => 39.37.153.182\n)\n\n => Array\n(\n => 157.43.85.106\n)\n\n => Array\n(\n => 185.209.178.77\n)\n\n => Array\n(\n => 1.39.212.45\n)\n\n => Array\n(\n => 103.72.7.16\n)\n\n => Array\n(\n => 117.97.185.244\n)\n\n => Array\n(\n => 117.230.59.106\n)\n\n => Array\n(\n => 137.97.121.103\n)\n\n => Array\n(\n => 103.82.123.215\n)\n\n => Array\n(\n => 103.68.217.248\n)\n\n => Array\n(\n => 157.39.27.175\n)\n\n => Array\n(\n => 47.31.100.249\n)\n\n => Array\n(\n => 14.171.232.139\n)\n\n => Array\n(\n => 103.31.93.208\n)\n\n => Array\n(\n => 117.230.56.77\n)\n\n => Array\n(\n => 124.182.25.124\n)\n\n => Array\n(\n => 106.66.191.242\n)\n\n => Array\n(\n => 175.107.237.25\n)\n\n => Array\n(\n => 119.155.1.27\n)\n\n => Array\n(\n => 72.255.6.24\n)\n\n => Array\n(\n => 192.140.152.223\n)\n\n => Array\n(\n => 212.103.48.136\n)\n\n => Array\n(\n => 39.45.134.56\n)\n\n => Array\n(\n => 139.167.173.30\n)\n\n => Array\n(\n => 117.230.63.87\n)\n\n => Array\n(\n => 182.189.95.203\n)\n\n => Array\n(\n => 49.204.183.248\n)\n\n => Array\n(\n => 47.31.125.188\n)\n\n => Array\n(\n => 103.252.171.13\n)\n\n => Array\n(\n => 112.198.74.36\n)\n\n => Array\n(\n => 27.109.113.152\n)\n\n => Array\n(\n => 42.112.233.44\n)\n\n => Array\n(\n => 47.31.68.193\n)\n\n => Array\n(\n => 103.252.171.134\n)\n\n => Array\n(\n => 77.123.32.114\n)\n\n => Array\n(\n => 1.38.189.66\n)\n\n => Array\n(\n => 39.37.181.108\n)\n\n => Array\n(\n => 42.106.44.61\n)\n\n => Array\n(\n => 157.36.8.39\n)\n\n => Array\n(\n => 223.238.41.53\n)\n\n => Array\n(\n => 202.89.77.10\n)\n\n => Array\n(\n => 117.230.150.68\n)\n\n => Array\n(\n => 175.176.87.60\n)\n\n => Array\n(\n => 137.97.117.87\n)\n\n => Array\n(\n => 132.154.123.11\n)\n\n => Array\n(\n => 45.113.124.141\n)\n\n => Array\n(\n => 103.87.56.203\n)\n\n => Array\n(\n => 159.89.171.156\n)\n\n => Array\n(\n => 119.155.53.88\n)\n\n => Array\n(\n => 222.252.107.215\n)\n\n => Array\n(\n => 132.154.75.238\n)\n\n => Array\n(\n => 122.183.41.168\n)\n\n => Array\n(\n => 42.106.254.158\n)\n\n => Array\n(\n => 103.252.171.37\n)\n\n => Array\n(\n => 202.59.13.180\n)\n\n => Array\n(\n => 37.111.139.137\n)\n\n => Array\n(\n => 39.42.93.25\n)\n\n => Array\n(\n => 118.70.177.156\n)\n\n => Array\n(\n => 117.230.148.64\n)\n\n => Array\n(\n => 39.42.15.194\n)\n\n => Array\n(\n => 137.97.176.86\n)\n\n => Array\n(\n => 106.210.102.113\n)\n\n => Array\n(\n => 39.59.84.236\n)\n\n => Array\n(\n => 49.206.187.177\n)\n\n => Array\n(\n => 117.230.133.11\n)\n\n => Array\n(\n => 42.106.253.173\n)\n\n => Array\n(\n => 178.62.102.23\n)\n\n => Array\n(\n => 111.92.76.175\n)\n\n => Array\n(\n => 132.154.86.45\n)\n\n => Array\n(\n => 117.230.128.39\n)\n\n => Array\n(\n => 117.230.53.165\n)\n\n => Array\n(\n => 49.37.200.171\n)\n\n => Array\n(\n => 104.236.213.230\n)\n\n => Array\n(\n => 103.140.30.81\n)\n\n => Array\n(\n => 59.103.104.117\n)\n\n => Array\n(\n => 65.49.126.79\n)\n\n => Array\n(\n => 202.59.12.251\n)\n\n => Array\n(\n => 37.111.136.17\n)\n\n => Array\n(\n => 163.53.85.67\n)\n\n => Array\n(\n => 123.16.240.73\n)\n\n => Array\n(\n => 103.211.14.183\n)\n\n => Array\n(\n => 103.248.93.211\n)\n\n => Array\n(\n => 116.74.59.127\n)\n\n => Array\n(\n => 137.97.169.254\n)\n\n => Array\n(\n => 113.177.79.100\n)\n\n => Array\n(\n => 74.82.60.187\n)\n\n => Array\n(\n => 117.230.157.66\n)\n\n => Array\n(\n => 169.149.194.241\n)\n\n => Array\n(\n => 117.230.156.11\n)\n\n => Array\n(\n => 202.59.12.157\n)\n\n => Array\n(\n => 42.106.181.25\n)\n\n => Array\n(\n => 202.59.13.78\n)\n\n => Array\n(\n => 39.37.153.32\n)\n\n => Array\n(\n => 177.188.216.175\n)\n\n => Array\n(\n => 222.252.53.165\n)\n\n => Array\n(\n => 37.139.23.89\n)\n\n => Array\n(\n => 117.230.139.150\n)\n\n => Array\n(\n => 104.131.176.234\n)\n\n => Array\n(\n => 42.106.181.117\n)\n\n => Array\n(\n => 117.230.180.94\n)\n\n => Array\n(\n => 180.190.171.5\n)\n\n => Array\n(\n => 150.129.165.185\n)\n\n => Array\n(\n => 51.15.0.150\n)\n\n => Array\n(\n => 42.111.4.84\n)\n\n => Array\n(\n => 74.82.60.116\n)\n\n => Array\n(\n => 137.97.121.165\n)\n\n => Array\n(\n => 64.62.187.194\n)\n\n => Array\n(\n => 137.97.106.162\n)\n\n => Array\n(\n => 137.97.92.46\n)\n\n => Array\n(\n => 137.97.170.25\n)\n\n => Array\n(\n => 103.104.192.100\n)\n\n => Array\n(\n => 185.246.211.34\n)\n\n => Array\n(\n => 119.160.96.78\n)\n\n => Array\n(\n => 212.103.48.152\n)\n\n => Array\n(\n => 183.83.153.90\n)\n\n => Array\n(\n => 117.248.150.41\n)\n\n => Array\n(\n => 185.240.246.180\n)\n\n => Array\n(\n => 162.253.131.125\n)\n\n => Array\n(\n => 117.230.153.217\n)\n\n => Array\n(\n => 117.230.169.1\n)\n\n => Array\n(\n => 49.15.138.247\n)\n\n => Array\n(\n => 117.230.37.110\n)\n\n => Array\n(\n => 14.167.188.75\n)\n\n => Array\n(\n => 169.149.239.93\n)\n\n => Array\n(\n => 103.216.176.91\n)\n\n => Array\n(\n => 117.230.12.126\n)\n\n => Array\n(\n => 184.75.209.110\n)\n\n => Array\n(\n => 117.230.6.60\n)\n\n => Array\n(\n => 117.230.135.132\n)\n\n => Array\n(\n => 31.179.29.109\n)\n\n => Array\n(\n => 74.121.188.186\n)\n\n => Array\n(\n => 117.230.35.5\n)\n\n => Array\n(\n => 111.92.74.239\n)\n\n => Array\n(\n => 104.245.144.236\n)\n\n => Array\n(\n => 39.50.22.100\n)\n\n => Array\n(\n => 47.31.190.23\n)\n\n => Array\n(\n => 157.44.73.187\n)\n\n => Array\n(\n => 117.230.8.91\n)\n\n => Array\n(\n => 157.32.18.2\n)\n\n => Array\n(\n => 111.119.187.43\n)\n\n => Array\n(\n => 203.101.185.246\n)\n\n => Array\n(\n => 5.62.34.22\n)\n\n => Array\n(\n => 122.8.143.76\n)\n\n => Array\n(\n => 115.186.2.187\n)\n\n => Array\n(\n => 202.142.110.89\n)\n\n => Array\n(\n => 157.50.61.254\n)\n\n => Array\n(\n => 223.182.211.185\n)\n\n => Array\n(\n => 103.85.125.210\n)\n\n => Array\n(\n => 103.217.133.147\n)\n\n => Array\n(\n => 103.60.196.217\n)\n\n => Array\n(\n => 157.44.238.6\n)\n\n => Array\n(\n => 117.196.225.68\n)\n\n => Array\n(\n => 104.254.92.52\n)\n\n => Array\n(\n => 39.42.46.72\n)\n\n => Array\n(\n => 221.132.119.36\n)\n\n => Array\n(\n => 111.92.77.47\n)\n\n => Array\n(\n => 223.225.19.152\n)\n\n => Array\n(\n => 159.89.121.217\n)\n\n => Array\n(\n => 39.53.221.205\n)\n\n => Array\n(\n => 193.34.217.28\n)\n\n => Array\n(\n => 139.167.206.36\n)\n\n => Array\n(\n => 96.40.10.7\n)\n\n => Array\n(\n => 124.29.198.123\n)\n\n => Array\n(\n => 117.196.226.1\n)\n\n => Array\n(\n => 106.200.85.135\n)\n\n => Array\n(\n => 106.223.180.28\n)\n\n => Array\n(\n => 103.49.232.110\n)\n\n => Array\n(\n => 139.167.208.50\n)\n\n => Array\n(\n => 139.167.201.102\n)\n\n => Array\n(\n => 14.244.224.237\n)\n\n => Array\n(\n => 103.140.31.187\n)\n\n => Array\n(\n => 49.36.134.136\n)\n\n => Array\n(\n => 160.16.61.75\n)\n\n => Array\n(\n => 103.18.22.228\n)\n\n => Array\n(\n => 47.9.74.121\n)\n\n => Array\n(\n => 47.30.216.159\n)\n\n => Array\n(\n => 117.248.150.78\n)\n\n => Array\n(\n => 5.62.34.17\n)\n\n => Array\n(\n => 139.167.247.181\n)\n\n => Array\n(\n => 193.176.84.29\n)\n\n => Array\n(\n => 103.195.201.121\n)\n\n => Array\n(\n => 89.187.175.115\n)\n\n => Array\n(\n => 137.97.81.251\n)\n\n => Array\n(\n => 157.51.147.62\n)\n\n => Array\n(\n => 103.104.192.42\n)\n\n => Array\n(\n => 14.171.235.26\n)\n\n => Array\n(\n => 178.62.89.121\n)\n\n => Array\n(\n => 119.155.4.164\n)\n\n => Array\n(\n => 43.250.241.89\n)\n\n => Array\n(\n => 103.31.100.80\n)\n\n => Array\n(\n => 119.155.7.44\n)\n\n => Array\n(\n => 106.200.73.114\n)\n\n => Array\n(\n => 77.111.246.18\n)\n\n => Array\n(\n => 157.39.99.247\n)\n\n => Array\n(\n => 103.77.42.132\n)\n\n => Array\n(\n => 74.115.214.133\n)\n\n => Array\n(\n => 117.230.49.224\n)\n\n => Array\n(\n => 39.50.108.238\n)\n\n => Array\n(\n => 47.30.221.45\n)\n\n => Array\n(\n => 95.133.164.235\n)\n\n => Array\n(\n => 212.103.48.141\n)\n\n => Array\n(\n => 104.194.218.147\n)\n\n => Array\n(\n => 106.200.88.241\n)\n\n => Array\n(\n => 182.189.212.211\n)\n\n => Array\n(\n => 39.50.142.129\n)\n\n => Array\n(\n => 77.234.43.133\n)\n\n => Array\n(\n => 49.15.192.58\n)\n\n => Array\n(\n => 119.153.37.55\n)\n\n => Array\n(\n => 27.56.156.128\n)\n\n => Array\n(\n => 168.211.4.33\n)\n\n => Array\n(\n => 203.81.236.239\n)\n\n => Array\n(\n => 157.51.149.61\n)\n\n => Array\n(\n => 117.230.45.255\n)\n\n => Array\n(\n => 39.42.106.169\n)\n\n => Array\n(\n => 27.71.89.76\n)\n\n => Array\n(\n => 123.27.109.167\n)\n\n => Array\n(\n => 106.202.21.91\n)\n\n => Array\n(\n => 103.85.125.206\n)\n\n => Array\n(\n => 122.173.250.229\n)\n\n => Array\n(\n => 106.210.102.77\n)\n\n => Array\n(\n => 134.209.47.156\n)\n\n => Array\n(\n => 45.127.232.12\n)\n\n => Array\n(\n => 45.134.224.11\n)\n\n => Array\n(\n => 27.71.89.122\n)\n\n => Array\n(\n => 157.38.105.117\n)\n\n => Array\n(\n => 191.96.73.215\n)\n\n => Array\n(\n => 171.241.92.31\n)\n\n => Array\n(\n => 49.149.104.235\n)\n\n => Array\n(\n => 104.229.247.252\n)\n\n => Array\n(\n => 111.92.78.42\n)\n\n => Array\n(\n => 47.31.88.183\n)\n\n => Array\n(\n => 171.61.203.234\n)\n\n => Array\n(\n => 183.83.226.192\n)\n\n => Array\n(\n => 119.157.107.45\n)\n\n => Array\n(\n => 91.202.163.205\n)\n\n => Array\n(\n => 157.43.62.108\n)\n\n => Array\n(\n => 182.68.248.92\n)\n\n => Array\n(\n => 157.32.251.234\n)\n\n => Array\n(\n => 110.225.196.188\n)\n\n => Array\n(\n => 27.71.89.98\n)\n\n => Array\n(\n => 175.176.87.3\n)\n\n => Array\n(\n => 103.55.90.208\n)\n\n => Array\n(\n => 47.31.41.163\n)\n\n => Array\n(\n => 223.182.195.5\n)\n\n => Array\n(\n => 122.52.101.166\n)\n\n => Array\n(\n => 103.207.82.154\n)\n\n => Array\n(\n => 171.224.178.84\n)\n\n => Array\n(\n => 110.225.235.187\n)\n\n => Array\n(\n => 119.160.97.248\n)\n\n => Array\n(\n => 116.90.101.121\n)\n\n => Array\n(\n => 182.255.48.154\n)\n\n => Array\n(\n => 180.149.221.140\n)\n\n => Array\n(\n => 194.44.79.13\n)\n\n => Array\n(\n => 47.247.18.3\n)\n\n => Array\n(\n => 27.56.242.95\n)\n\n => Array\n(\n => 41.60.236.83\n)\n\n => Array\n(\n => 122.164.162.7\n)\n\n => Array\n(\n => 71.136.154.5\n)\n\n => Array\n(\n => 132.154.119.122\n)\n\n => Array\n(\n => 110.225.80.135\n)\n\n => Array\n(\n => 84.17.61.143\n)\n\n => Array\n(\n => 119.160.102.244\n)\n\n => Array\n(\n => 47.31.27.44\n)\n\n => Array\n(\n => 27.71.89.160\n)\n\n => Array\n(\n => 107.175.38.101\n)\n\n => Array\n(\n => 195.211.150.152\n)\n\n => Array\n(\n => 157.35.250.255\n)\n\n => Array\n(\n => 111.119.187.53\n)\n\n => Array\n(\n => 119.152.97.213\n)\n\n => Array\n(\n => 180.92.143.145\n)\n\n => Array\n(\n => 72.255.61.46\n)\n\n => Array\n(\n => 47.8.183.6\n)\n\n => Array\n(\n => 92.38.148.53\n)\n\n => Array\n(\n => 122.173.194.72\n)\n\n => Array\n(\n => 183.83.226.97\n)\n\n => Array\n(\n => 122.173.73.231\n)\n\n => Array\n(\n => 119.160.101.101\n)\n\n => Array\n(\n => 93.177.75.174\n)\n\n => Array\n(\n => 115.97.196.70\n)\n\n => Array\n(\n => 111.119.187.35\n)\n\n => Array\n(\n => 103.226.226.154\n)\n\n => Array\n(\n => 103.244.172.73\n)\n\n => Array\n(\n => 119.155.61.222\n)\n\n => Array\n(\n => 157.37.184.92\n)\n\n => Array\n(\n => 119.160.103.204\n)\n\n => Array\n(\n => 175.176.87.21\n)\n\n => Array\n(\n => 185.51.228.246\n)\n\n => Array\n(\n => 103.250.164.255\n)\n\n => Array\n(\n => 122.181.194.16\n)\n\n => Array\n(\n => 157.37.230.232\n)\n\n => Array\n(\n => 103.105.236.6\n)\n\n => Array\n(\n => 111.88.128.174\n)\n\n => Array\n(\n => 37.111.139.82\n)\n\n => Array\n(\n => 39.34.133.52\n)\n\n => Array\n(\n => 113.177.79.80\n)\n\n => Array\n(\n => 180.183.71.184\n)\n\n => Array\n(\n => 116.72.218.255\n)\n\n => Array\n(\n => 119.160.117.26\n)\n\n => Array\n(\n => 158.222.0.252\n)\n\n => Array\n(\n => 23.227.142.146\n)\n\n => Array\n(\n => 122.162.152.152\n)\n\n => Array\n(\n => 103.255.149.106\n)\n\n => Array\n(\n => 104.236.53.155\n)\n\n => Array\n(\n => 119.160.119.155\n)\n\n => Array\n(\n => 175.107.214.244\n)\n\n => Array\n(\n => 102.7.116.7\n)\n\n => Array\n(\n => 111.88.91.132\n)\n\n => Array\n(\n => 119.157.248.108\n)\n\n => Array\n(\n => 222.252.36.107\n)\n\n => Array\n(\n => 157.46.209.227\n)\n\n => Array\n(\n => 39.40.54.1\n)\n\n => Array\n(\n => 223.225.19.254\n)\n\n => Array\n(\n => 154.72.150.8\n)\n\n => Array\n(\n => 107.181.177.130\n)\n\n => Array\n(\n => 101.50.75.31\n)\n\n => Array\n(\n => 84.17.58.69\n)\n\n => Array\n(\n => 178.62.5.157\n)\n\n => Array\n(\n => 112.206.175.147\n)\n\n => Array\n(\n => 137.97.113.137\n)\n\n => Array\n(\n => 103.53.44.154\n)\n\n => Array\n(\n => 180.92.143.129\n)\n\n => Array\n(\n => 14.231.223.7\n)\n\n => Array\n(\n => 167.88.63.201\n)\n\n => Array\n(\n => 103.140.204.8\n)\n\n => Array\n(\n => 221.121.135.108\n)\n\n => Array\n(\n => 119.160.97.129\n)\n\n => Array\n(\n => 27.5.168.249\n)\n\n => Array\n(\n => 119.160.102.191\n)\n\n => Array\n(\n => 122.162.219.12\n)\n\n => Array\n(\n => 157.50.141.122\n)\n\n => Array\n(\n => 43.245.8.17\n)\n\n => Array\n(\n => 113.181.198.179\n)\n\n => Array\n(\n => 47.30.221.59\n)\n\n => Array\n(\n => 110.38.29.246\n)\n\n => Array\n(\n => 14.192.140.199\n)\n\n => Array\n(\n => 24.68.10.106\n)\n\n => Array\n(\n => 47.30.209.179\n)\n\n => Array\n(\n => 106.223.123.21\n)\n\n => Array\n(\n => 103.224.48.30\n)\n\n => Array\n(\n => 104.131.19.173\n)\n\n => Array\n(\n => 119.157.100.206\n)\n\n => Array\n(\n => 103.10.226.73\n)\n\n => Array\n(\n => 162.208.51.163\n)\n\n => Array\n(\n => 47.30.221.227\n)\n\n => Array\n(\n => 119.160.116.210\n)\n\n => Array\n(\n => 198.16.78.43\n)\n\n => Array\n(\n => 39.44.201.151\n)\n\n => Array\n(\n => 71.63.181.84\n)\n\n => Array\n(\n => 14.142.192.218\n)\n\n => Array\n(\n => 39.34.147.178\n)\n\n => Array\n(\n => 111.92.75.25\n)\n\n => Array\n(\n => 45.135.239.58\n)\n\n => Array\n(\n => 14.232.235.1\n)\n\n => Array\n(\n => 49.144.100.155\n)\n\n => Array\n(\n => 62.182.99.33\n)\n\n => Array\n(\n => 104.243.212.187\n)\n\n => Array\n(\n => 59.97.132.214\n)\n\n => Array\n(\n => 47.9.15.179\n)\n\n => Array\n(\n => 39.44.103.186\n)\n\n => Array\n(\n => 183.83.241.132\n)\n\n => Array\n(\n => 103.41.24.180\n)\n\n => Array\n(\n => 104.238.46.39\n)\n\n => Array\n(\n => 103.79.170.78\n)\n\n => Array\n(\n => 59.103.138.81\n)\n\n => Array\n(\n => 106.198.191.146\n)\n\n => Array\n(\n => 106.198.255.122\n)\n\n => Array\n(\n => 47.31.46.37\n)\n\n => Array\n(\n => 109.169.23.76\n)\n\n => Array\n(\n => 103.143.7.55\n)\n\n => Array\n(\n => 49.207.114.52\n)\n\n => Array\n(\n => 198.54.106.250\n)\n\n => Array\n(\n => 39.50.64.18\n)\n\n => Array\n(\n => 222.252.48.132\n)\n\n => Array\n(\n => 42.201.186.53\n)\n\n => Array\n(\n => 115.97.198.95\n)\n\n => Array\n(\n => 93.76.134.244\n)\n\n => Array\n(\n => 122.173.15.189\n)\n\n => Array\n(\n => 39.62.38.29\n)\n\n => Array\n(\n => 103.201.145.254\n)\n\n => Array\n(\n => 111.119.187.23\n)\n\n => Array\n(\n => 157.50.66.33\n)\n\n => Array\n(\n => 157.49.68.163\n)\n\n => Array\n(\n => 103.85.125.215\n)\n\n => Array\n(\n => 103.255.4.16\n)\n\n => Array\n(\n => 223.181.246.206\n)\n\n => Array\n(\n => 39.40.109.226\n)\n\n => Array\n(\n => 43.225.70.157\n)\n\n => Array\n(\n => 103.211.18.168\n)\n\n => Array\n(\n => 137.59.221.60\n)\n\n => Array\n(\n => 103.81.214.63\n)\n\n => Array\n(\n => 39.35.163.2\n)\n\n => Array\n(\n => 106.205.124.39\n)\n\n => Array\n(\n => 209.99.165.216\n)\n\n => Array\n(\n => 103.75.247.187\n)\n\n => Array\n(\n => 157.46.217.41\n)\n\n => Array\n(\n => 75.186.73.80\n)\n\n => Array\n(\n => 212.103.48.153\n)\n\n => Array\n(\n => 47.31.61.167\n)\n\n => Array\n(\n => 119.152.145.131\n)\n\n => Array\n(\n => 171.76.177.244\n)\n\n => Array\n(\n => 103.135.78.50\n)\n\n => Array\n(\n => 103.79.170.75\n)\n\n => Array\n(\n => 105.160.22.74\n)\n\n => Array\n(\n => 47.31.20.153\n)\n\n => Array\n(\n => 42.107.204.65\n)\n\n => Array\n(\n => 49.207.131.35\n)\n\n => Array\n(\n => 92.38.148.61\n)\n\n => Array\n(\n => 183.83.255.206\n)\n\n => Array\n(\n => 107.181.177.131\n)\n\n => Array\n(\n => 39.40.220.157\n)\n\n => Array\n(\n => 39.41.133.176\n)\n\n => Array\n(\n => 103.81.214.61\n)\n\n => Array\n(\n => 223.235.108.46\n)\n\n => Array\n(\n => 171.241.52.118\n)\n\n => Array\n(\n => 39.57.138.47\n)\n\n => Array\n(\n => 106.204.196.172\n)\n\n => Array\n(\n => 39.53.228.40\n)\n\n => Array\n(\n => 185.242.5.99\n)\n\n => Array\n(\n => 103.255.5.96\n)\n\n => Array\n(\n => 157.46.212.120\n)\n\n => Array\n(\n => 107.181.177.138\n)\n\n => Array\n(\n => 47.30.193.65\n)\n\n => Array\n(\n => 39.37.178.33\n)\n\n => Array\n(\n => 157.46.173.29\n)\n\n => Array\n(\n => 39.57.238.211\n)\n\n => Array\n(\n => 157.37.245.113\n)\n\n => Array\n(\n => 47.30.201.138\n)\n\n => Array\n(\n => 106.204.193.108\n)\n\n => Array\n(\n => 212.103.50.212\n)\n\n => Array\n(\n => 58.65.221.187\n)\n\n => Array\n(\n => 178.62.92.29\n)\n\n => Array\n(\n => 111.92.77.166\n)\n\n => Array\n(\n => 47.30.223.158\n)\n\n => Array\n(\n => 103.224.54.83\n)\n\n => Array\n(\n => 119.153.43.22\n)\n\n => Array\n(\n => 223.181.126.251\n)\n\n => Array\n(\n => 39.42.175.202\n)\n\n => Array\n(\n => 103.224.54.190\n)\n\n => Array\n(\n => 49.36.141.210\n)\n\n => Array\n(\n => 5.62.63.218\n)\n\n => Array\n(\n => 39.59.9.18\n)\n\n => Array\n(\n => 111.88.86.45\n)\n\n => Array\n(\n => 178.54.139.5\n)\n\n => Array\n(\n => 116.68.105.241\n)\n\n => Array\n(\n => 119.160.96.187\n)\n\n => Array\n(\n => 182.189.192.103\n)\n\n => Array\n(\n => 119.160.96.143\n)\n\n => Array\n(\n => 110.225.89.98\n)\n\n => Array\n(\n => 169.149.195.134\n)\n\n => Array\n(\n => 103.238.104.54\n)\n\n => Array\n(\n => 47.30.208.142\n)\n\n => Array\n(\n => 157.46.179.209\n)\n\n => Array\n(\n => 223.235.38.119\n)\n\n => Array\n(\n => 42.106.180.165\n)\n\n => Array\n(\n => 154.122.240.239\n)\n\n => Array\n(\n => 106.223.104.191\n)\n\n => Array\n(\n => 111.93.110.218\n)\n\n => Array\n(\n => 182.183.161.171\n)\n\n => Array\n(\n => 157.44.184.211\n)\n\n => Array\n(\n => 157.50.185.193\n)\n\n => Array\n(\n => 117.230.19.194\n)\n\n => Array\n(\n => 162.243.246.160\n)\n\n => Array\n(\n => 106.223.143.53\n)\n\n => Array\n(\n => 39.59.41.15\n)\n\n => Array\n(\n => 106.210.65.42\n)\n\n => Array\n(\n => 180.243.144.208\n)\n\n => Array\n(\n => 116.68.105.22\n)\n\n => Array\n(\n => 115.42.70.46\n)\n\n => Array\n(\n => 99.72.192.148\n)\n\n => Array\n(\n => 182.183.182.48\n)\n\n => Array\n(\n => 171.48.58.97\n)\n\n => Array\n(\n => 37.120.131.188\n)\n\n => Array\n(\n => 117.99.167.177\n)\n\n => Array\n(\n => 111.92.76.210\n)\n\n => Array\n(\n => 14.192.144.245\n)\n\n => Array\n(\n => 169.149.242.87\n)\n\n => Array\n(\n => 47.30.198.149\n)\n\n => Array\n(\n => 59.103.57.140\n)\n\n => Array\n(\n => 117.230.161.168\n)\n\n => Array\n(\n => 110.225.88.173\n)\n\n => Array\n(\n => 169.149.246.95\n)\n\n => Array\n(\n => 42.106.180.52\n)\n\n => Array\n(\n => 14.231.160.157\n)\n\n => Array\n(\n => 123.27.109.47\n)\n\n => Array\n(\n => 157.46.130.54\n)\n\n => Array\n(\n => 39.42.73.194\n)\n\n => Array\n(\n => 117.230.18.147\n)\n\n => Array\n(\n => 27.59.231.98\n)\n\n => Array\n(\n => 125.209.78.227\n)\n\n => Array\n(\n => 157.34.80.145\n)\n\n => Array\n(\n => 42.201.251.86\n)\n\n => Array\n(\n => 117.230.129.158\n)\n\n => Array\n(\n => 103.82.80.103\n)\n\n => Array\n(\n => 47.9.171.228\n)\n\n => Array\n(\n => 117.230.24.92\n)\n\n => Array\n(\n => 103.129.143.119\n)\n\n => Array\n(\n => 39.40.213.45\n)\n\n => Array\n(\n => 178.92.188.214\n)\n\n => Array\n(\n => 110.235.232.191\n)\n\n => Array\n(\n => 5.62.34.18\n)\n\n => Array\n(\n => 47.30.212.134\n)\n\n => Array\n(\n => 157.42.34.196\n)\n\n => Array\n(\n => 157.32.169.9\n)\n\n => Array\n(\n => 103.255.4.11\n)\n\n => Array\n(\n => 117.230.13.69\n)\n\n => Array\n(\n => 117.230.58.97\n)\n\n => Array\n(\n => 92.52.138.39\n)\n\n => Array\n(\n => 221.132.119.63\n)\n\n => Array\n(\n => 117.97.167.188\n)\n\n => Array\n(\n => 119.153.56.58\n)\n\n => Array\n(\n => 105.50.22.150\n)\n\n => Array\n(\n => 115.42.68.126\n)\n\n => Array\n(\n => 182.189.223.159\n)\n\n => Array\n(\n => 39.59.36.90\n)\n\n => Array\n(\n => 111.92.76.114\n)\n\n => Array\n(\n => 157.47.226.163\n)\n\n => Array\n(\n => 202.47.44.37\n)\n\n => Array\n(\n => 106.51.234.172\n)\n\n => Array\n(\n => 103.101.88.166\n)\n\n => Array\n(\n => 27.6.246.146\n)\n\n => Array\n(\n => 103.255.5.83\n)\n\n => Array\n(\n => 103.98.210.185\n)\n\n => Array\n(\n => 122.173.114.134\n)\n\n => Array\n(\n => 122.173.77.248\n)\n\n => Array\n(\n => 5.62.41.172\n)\n\n => Array\n(\n => 180.178.181.17\n)\n\n => Array\n(\n => 37.120.133.224\n)\n\n => Array\n(\n => 45.131.5.156\n)\n\n => Array\n(\n => 110.39.100.110\n)\n\n => Array\n(\n => 176.110.38.185\n)\n\n => Array\n(\n => 36.255.41.64\n)\n\n => Array\n(\n => 103.104.192.15\n)\n\n => Array\n(\n => 43.245.131.195\n)\n\n => Array\n(\n => 14.248.111.185\n)\n\n => Array\n(\n => 122.173.217.133\n)\n\n => Array\n(\n => 106.223.90.245\n)\n\n => Array\n(\n => 119.153.56.80\n)\n\n => Array\n(\n => 103.7.60.172\n)\n\n => Array\n(\n => 157.46.184.233\n)\n\n => Array\n(\n => 182.190.31.95\n)\n\n => Array\n(\n => 109.87.189.122\n)\n\n => Array\n(\n => 91.74.25.100\n)\n\n => Array\n(\n => 182.185.224.144\n)\n\n => Array\n(\n => 106.223.91.221\n)\n\n => Array\n(\n => 182.190.223.40\n)\n\n => Array\n(\n => 2.58.194.134\n)\n\n => Array\n(\n => 196.246.225.236\n)\n\n => Array\n(\n => 106.223.90.173\n)\n\n => Array\n(\n => 23.239.16.54\n)\n\n => Array\n(\n => 157.46.65.225\n)\n\n => Array\n(\n => 115.186.130.14\n)\n\n => Array\n(\n => 103.85.125.157\n)\n\n => Array\n(\n => 14.248.103.6\n)\n\n => Array\n(\n => 123.24.169.247\n)\n\n => Array\n(\n => 103.130.108.153\n)\n\n => Array\n(\n => 115.42.67.21\n)\n\n => Array\n(\n => 202.166.171.190\n)\n\n => Array\n(\n => 39.37.169.104\n)\n\n => Array\n(\n => 103.82.80.59\n)\n\n => Array\n(\n => 175.107.208.58\n)\n\n => Array\n(\n => 203.192.238.247\n)\n\n => Array\n(\n => 103.217.178.150\n)\n\n => Array\n(\n => 103.66.214.173\n)\n\n => Array\n(\n => 110.93.236.174\n)\n\n => Array\n(\n => 143.189.242.64\n)\n\n => Array\n(\n => 77.111.245.12\n)\n\n => Array\n(\n => 145.239.2.231\n)\n\n => Array\n(\n => 115.186.190.38\n)\n\n => Array\n(\n => 109.169.23.67\n)\n\n => Array\n(\n => 198.16.70.29\n)\n\n => Array\n(\n => 111.92.76.186\n)\n\n => Array\n(\n => 115.42.69.34\n)\n\n => Array\n(\n => 73.61.100.95\n)\n\n => Array\n(\n => 103.129.142.31\n)\n\n => Array\n(\n => 103.255.5.53\n)\n\n => Array\n(\n => 103.76.55.2\n)\n\n => Array\n(\n => 47.9.141.138\n)\n\n => Array\n(\n => 103.55.89.234\n)\n\n => Array\n(\n => 103.223.13.53\n)\n\n => Array\n(\n => 175.158.50.203\n)\n\n => Array\n(\n => 103.255.5.90\n)\n\n => Array\n(\n => 106.223.100.138\n)\n\n => Array\n(\n => 39.37.143.193\n)\n\n => Array\n(\n => 206.189.133.131\n)\n\n => Array\n(\n => 43.224.0.233\n)\n\n => Array\n(\n => 115.186.132.106\n)\n\n => Array\n(\n => 31.43.21.159\n)\n\n => Array\n(\n => 119.155.56.131\n)\n\n => Array\n(\n => 103.82.80.138\n)\n\n => Array\n(\n => 24.87.128.119\n)\n\n => Array\n(\n => 106.210.103.163\n)\n\n => Array\n(\n => 103.82.80.90\n)\n\n => Array\n(\n => 157.46.186.45\n)\n\n => Array\n(\n => 157.44.155.238\n)\n\n => Array\n(\n => 103.119.199.2\n)\n\n => Array\n(\n => 27.97.169.205\n)\n\n => Array\n(\n => 157.46.174.89\n)\n\n => Array\n(\n => 43.250.58.220\n)\n\n => Array\n(\n => 76.189.186.64\n)\n\n => Array\n(\n => 103.255.5.57\n)\n\n => Array\n(\n => 171.61.196.136\n)\n\n => Array\n(\n => 202.47.40.88\n)\n\n => Array\n(\n => 97.118.94.116\n)\n\n => Array\n(\n => 157.44.124.157\n)\n\n => Array\n(\n => 95.142.120.13\n)\n\n => Array\n(\n => 42.201.229.151\n)\n\n => Array\n(\n => 157.46.178.95\n)\n\n => Array\n(\n => 169.149.215.192\n)\n\n => Array\n(\n => 42.111.19.48\n)\n\n => Array\n(\n => 1.38.52.18\n)\n\n => Array\n(\n => 145.239.91.241\n)\n\n => Array\n(\n => 47.31.78.191\n)\n\n => Array\n(\n => 103.77.42.60\n)\n\n => Array\n(\n => 157.46.107.144\n)\n\n => Array\n(\n => 157.46.125.124\n)\n\n => Array\n(\n => 110.225.218.108\n)\n\n => Array\n(\n => 106.51.77.185\n)\n\n => Array\n(\n => 123.24.161.207\n)\n\n => Array\n(\n => 106.210.108.22\n)\n\n => Array\n(\n => 42.111.10.14\n)\n\n => Array\n(\n => 223.29.231.175\n)\n\n => Array\n(\n => 27.56.152.132\n)\n\n => Array\n(\n => 119.155.31.100\n)\n\n => Array\n(\n => 122.173.172.127\n)\n\n => Array\n(\n => 103.77.42.64\n)\n\n => Array\n(\n => 157.44.164.106\n)\n\n => Array\n(\n => 14.181.53.38\n)\n\n => Array\n(\n => 115.42.67.64\n)\n\n => Array\n(\n => 47.31.33.140\n)\n\n => Array\n(\n => 103.15.60.234\n)\n\n => Array\n(\n => 182.64.219.181\n)\n\n => Array\n(\n => 103.44.51.6\n)\n\n => Array\n(\n => 116.74.25.157\n)\n\n => Array\n(\n => 116.71.2.128\n)\n\n => Array\n(\n => 157.32.185.239\n)\n\n => Array\n(\n => 47.31.25.79\n)\n\n => Array\n(\n => 178.62.85.75\n)\n\n => Array\n(\n => 180.178.190.39\n)\n\n => Array\n(\n => 39.48.52.179\n)\n\n => Array\n(\n => 106.193.11.240\n)\n\n => Array\n(\n => 103.82.80.226\n)\n\n => Array\n(\n => 49.206.126.30\n)\n\n => Array\n(\n => 157.245.191.173\n)\n\n => Array\n(\n => 49.205.84.237\n)\n\n => Array\n(\n => 47.8.181.232\n)\n\n => Array\n(\n => 182.66.2.92\n)\n\n => Array\n(\n => 49.34.137.220\n)\n\n => Array\n(\n => 209.205.217.125\n)\n\n => Array\n(\n => 192.64.5.73\n)\n\n => Array\n(\n => 27.63.166.108\n)\n\n => Array\n(\n => 120.29.96.211\n)\n\n => Array\n(\n => 182.186.112.135\n)\n\n => Array\n(\n => 45.118.165.151\n)\n\n => Array\n(\n => 47.8.228.12\n)\n\n => Array\n(\n => 106.215.3.162\n)\n\n => Array\n(\n => 111.92.72.66\n)\n\n => Array\n(\n => 169.145.2.9\n)\n\n => Array\n(\n => 106.207.205.100\n)\n\n => Array\n(\n => 223.181.8.12\n)\n\n => Array\n(\n => 157.48.149.78\n)\n\n => Array\n(\n => 103.206.138.116\n)\n\n => Array\n(\n => 39.53.119.22\n)\n\n => Array\n(\n => 157.33.232.106\n)\n\n => Array\n(\n => 49.37.205.139\n)\n\n => Array\n(\n => 115.42.68.3\n)\n\n => Array\n(\n => 93.72.182.251\n)\n\n => Array\n(\n => 202.142.166.22\n)\n\n => Array\n(\n => 157.119.81.111\n)\n\n => Array\n(\n => 182.186.116.155\n)\n\n => Array\n(\n => 157.37.171.37\n)\n\n => Array\n(\n => 117.206.164.48\n)\n\n => Array\n(\n => 49.36.52.63\n)\n\n => Array\n(\n => 203.175.72.112\n)\n\n => Array\n(\n => 171.61.132.193\n)\n\n => Array\n(\n => 111.119.187.44\n)\n\n => Array\n(\n => 39.37.165.216\n)\n\n => Array\n(\n => 103.86.109.58\n)\n\n => Array\n(\n => 39.59.2.86\n)\n\n => Array\n(\n => 111.119.187.28\n)\n\n => Array\n(\n => 106.201.9.10\n)\n\n => Array\n(\n => 49.35.25.106\n)\n\n => Array\n(\n => 157.49.239.103\n)\n\n => Array\n(\n => 157.49.237.198\n)\n\n => Array\n(\n => 14.248.64.121\n)\n\n => Array\n(\n => 117.102.7.214\n)\n\n => Array\n(\n => 120.29.91.246\n)\n\n => Array\n(\n => 103.7.79.41\n)\n\n => Array\n(\n => 132.154.99.209\n)\n\n => Array\n(\n => 212.36.27.245\n)\n\n => Array\n(\n => 157.44.154.9\n)\n\n => Array\n(\n => 47.31.56.44\n)\n\n => Array\n(\n => 192.142.199.136\n)\n\n => Array\n(\n => 171.61.159.49\n)\n\n => Array\n(\n => 119.160.116.151\n)\n\n => Array\n(\n => 103.98.63.39\n)\n\n => Array\n(\n => 41.60.233.216\n)\n\n => Array\n(\n => 49.36.75.212\n)\n\n => Array\n(\n => 223.188.60.20\n)\n\n => Array\n(\n => 103.98.63.50\n)\n\n => Array\n(\n => 178.162.198.21\n)\n\n => Array\n(\n => 157.46.209.35\n)\n\n => Array\n(\n => 119.155.32.151\n)\n\n => Array\n(\n => 102.185.58.161\n)\n\n => Array\n(\n => 59.96.89.231\n)\n\n => Array\n(\n => 119.155.255.198\n)\n\n => Array\n(\n => 42.107.204.57\n)\n\n => Array\n(\n => 42.106.181.74\n)\n\n => Array\n(\n => 157.46.219.186\n)\n\n => Array\n(\n => 115.42.71.49\n)\n\n => Array\n(\n => 157.46.209.131\n)\n\n => Array\n(\n => 220.81.15.94\n)\n\n => Array\n(\n => 111.119.187.24\n)\n\n => Array\n(\n => 49.37.195.185\n)\n\n => Array\n(\n => 42.106.181.85\n)\n\n => Array\n(\n => 43.249.225.134\n)\n\n => Array\n(\n => 117.206.165.151\n)\n\n => Array\n(\n => 119.153.48.250\n)\n\n => Array\n(\n => 27.4.172.162\n)\n\n => Array\n(\n => 117.20.29.51\n)\n\n => Array\n(\n => 103.98.63.135\n)\n\n => Array\n(\n => 117.7.218.229\n)\n\n => Array\n(\n => 157.49.233.105\n)\n\n => Array\n(\n => 39.53.151.199\n)\n\n => Array\n(\n => 101.255.118.33\n)\n\n => Array\n(\n => 41.141.246.9\n)\n\n => Array\n(\n => 221.132.113.78\n)\n\n => Array\n(\n => 119.160.116.202\n)\n\n => Array\n(\n => 117.237.193.244\n)\n\n => Array\n(\n => 157.41.110.145\n)\n\n => Array\n(\n => 103.98.63.5\n)\n\n => Array\n(\n => 103.125.129.58\n)\n\n => Array\n(\n => 183.83.254.66\n)\n\n => Array\n(\n => 45.135.236.160\n)\n\n => Array\n(\n => 198.199.87.124\n)\n\n => Array\n(\n => 193.176.86.41\n)\n\n => Array\n(\n => 115.97.142.98\n)\n\n => Array\n(\n => 222.252.38.198\n)\n\n => Array\n(\n => 110.93.237.49\n)\n\n => Array\n(\n => 103.224.48.122\n)\n\n => Array\n(\n => 110.38.28.130\n)\n\n => Array\n(\n => 106.211.238.154\n)\n\n => Array\n(\n => 111.88.41.73\n)\n\n => Array\n(\n => 119.155.13.143\n)\n\n => Array\n(\n => 103.213.111.60\n)\n\n => Array\n(\n => 202.0.103.42\n)\n\n => Array\n(\n => 157.48.144.33\n)\n\n => Array\n(\n => 111.119.187.62\n)\n\n => Array\n(\n => 103.87.212.71\n)\n\n => Array\n(\n => 157.37.177.20\n)\n\n => Array\n(\n => 223.233.71.92\n)\n\n => Array\n(\n => 116.213.32.107\n)\n\n => Array\n(\n => 104.248.173.151\n)\n\n => Array\n(\n => 14.181.102.222\n)\n\n => Array\n(\n => 103.10.224.252\n)\n\n => Array\n(\n => 175.158.50.57\n)\n\n => Array\n(\n => 165.22.122.199\n)\n\n => Array\n(\n => 23.106.56.12\n)\n\n => Array\n(\n => 203.122.10.146\n)\n\n => Array\n(\n => 37.111.136.138\n)\n\n => Array\n(\n => 103.87.193.66\n)\n\n => Array\n(\n => 39.59.122.246\n)\n\n => Array\n(\n => 111.119.183.63\n)\n\n => Array\n(\n => 157.46.72.102\n)\n\n => Array\n(\n => 185.132.133.82\n)\n\n => Array\n(\n => 118.103.230.148\n)\n\n => Array\n(\n => 5.62.39.45\n)\n\n => Array\n(\n => 119.152.144.134\n)\n\n => Array\n(\n => 172.105.117.102\n)\n\n => Array\n(\n => 122.254.70.212\n)\n\n => Array\n(\n => 102.185.128.97\n)\n\n => Array\n(\n => 182.69.249.11\n)\n\n => Array\n(\n => 105.163.134.167\n)\n\n => Array\n(\n => 111.119.187.38\n)\n\n => Array\n(\n => 103.46.195.93\n)\n\n => Array\n(\n => 106.204.161.156\n)\n\n => Array\n(\n => 122.176.2.175\n)\n\n => Array\n(\n => 117.99.162.31\n)\n\n => Array\n(\n => 106.212.241.242\n)\n\n => Array\n(\n => 42.107.196.149\n)\n\n => Array\n(\n => 212.90.60.57\n)\n\n => Array\n(\n => 175.107.237.12\n)\n\n => Array\n(\n => 157.46.119.152\n)\n\n => Array\n(\n => 157.34.81.12\n)\n\n => Array\n(\n => 162.243.1.22\n)\n\n => Array\n(\n => 110.37.222.178\n)\n\n => Array\n(\n => 103.46.195.68\n)\n\n => Array\n(\n => 119.160.116.81\n)\n\n => Array\n(\n => 138.197.131.28\n)\n\n => Array\n(\n => 103.88.218.124\n)\n\n => Array\n(\n => 192.241.172.113\n)\n\n => Array\n(\n => 110.39.174.106\n)\n\n => Array\n(\n => 111.88.48.17\n)\n\n => Array\n(\n => 42.108.160.218\n)\n\n => Array\n(\n => 117.102.0.16\n)\n\n => Array\n(\n => 157.46.125.235\n)\n\n => Array\n(\n => 14.190.242.251\n)\n\n => Array\n(\n => 47.31.184.64\n)\n\n => Array\n(\n => 49.205.84.157\n)\n\n => Array\n(\n => 122.162.115.247\n)\n\n => Array\n(\n => 41.202.219.74\n)\n\n => Array\n(\n => 106.215.9.67\n)\n\n => Array\n(\n => 103.87.56.208\n)\n\n => Array\n(\n => 103.46.194.147\n)\n\n => Array\n(\n => 116.90.98.81\n)\n\n => Array\n(\n => 115.42.71.213\n)\n\n => Array\n(\n => 39.49.35.192\n)\n\n => Array\n(\n => 41.202.219.65\n)\n\n => Array\n(\n => 131.212.249.93\n)\n\n => Array\n(\n => 49.205.16.251\n)\n\n => Array\n(\n => 39.34.147.250\n)\n\n => Array\n(\n => 183.83.210.185\n)\n\n => Array\n(\n => 49.37.194.215\n)\n\n => Array\n(\n => 103.46.194.108\n)\n\n => Array\n(\n => 89.36.219.233\n)\n\n => Array\n(\n => 119.152.105.178\n)\n\n => Array\n(\n => 202.47.45.125\n)\n\n => Array\n(\n => 156.146.59.27\n)\n\n => Array\n(\n => 132.154.21.156\n)\n\n => Array\n(\n => 157.44.35.31\n)\n\n => Array\n(\n => 41.80.118.124\n)\n\n => Array\n(\n => 47.31.159.198\n)\n\n => Array\n(\n => 103.209.223.140\n)\n\n => Array\n(\n => 157.46.130.138\n)\n\n => Array\n(\n => 49.37.199.246\n)\n\n => Array\n(\n => 111.88.242.10\n)\n\n => Array\n(\n => 43.241.145.110\n)\n\n => Array\n(\n => 124.153.16.30\n)\n\n => Array\n(\n => 27.5.22.173\n)\n\n => Array\n(\n => 111.88.191.173\n)\n\n => Array\n(\n => 41.60.236.200\n)\n\n => Array\n(\n => 115.42.67.146\n)\n\n => Array\n(\n => 150.242.173.7\n)\n\n => Array\n(\n => 14.248.71.23\n)\n\n => Array\n(\n => 111.119.187.4\n)\n\n => Array\n(\n => 124.29.212.118\n)\n\n => Array\n(\n => 51.68.205.163\n)\n\n => Array\n(\n => 182.184.107.63\n)\n\n => Array\n(\n => 106.211.253.87\n)\n\n => Array\n(\n => 223.190.89.5\n)\n\n => Array\n(\n => 183.83.212.63\n)\n\n => Array\n(\n => 129.205.113.227\n)\n\n => Array\n(\n => 106.210.40.141\n)\n\n => Array\n(\n => 91.202.163.169\n)\n\n => Array\n(\n => 76.105.191.89\n)\n\n => Array\n(\n => 171.51.244.160\n)\n\n => Array\n(\n => 37.139.188.92\n)\n\n => Array\n(\n => 23.106.56.37\n)\n\n => Array\n(\n => 157.44.175.180\n)\n\n => Array\n(\n => 122.2.122.97\n)\n\n => Array\n(\n => 103.87.192.194\n)\n\n => Array\n(\n => 192.154.253.6\n)\n\n => Array\n(\n => 77.243.191.19\n)\n\n => Array\n(\n => 122.254.70.46\n)\n\n => Array\n(\n => 154.76.233.73\n)\n\n => Array\n(\n => 195.181.167.150\n)\n\n => Array\n(\n => 209.209.228.5\n)\n\n => Array\n(\n => 203.192.212.115\n)\n\n => Array\n(\n => 221.132.118.179\n)\n\n => Array\n(\n => 117.208.210.204\n)\n\n => Array\n(\n => 120.29.90.126\n)\n\n => Array\n(\n => 36.77.239.190\n)\n\n => Array\n(\n => 157.37.137.127\n)\n\n => Array\n(\n => 39.40.243.6\n)\n\n => Array\n(\n => 182.182.41.201\n)\n\n => Array\n(\n => 39.59.32.46\n)\n\n => Array\n(\n => 111.119.183.36\n)\n\n => Array\n(\n => 103.83.147.61\n)\n\n => Array\n(\n => 103.82.80.85\n)\n\n => Array\n(\n => 103.46.194.161\n)\n\n => Array\n(\n => 101.50.105.38\n)\n\n => Array\n(\n => 111.119.183.58\n)\n\n => Array\n(\n => 47.9.234.51\n)\n\n => Array\n(\n => 120.29.86.157\n)\n\n => Array\n(\n => 175.158.50.70\n)\n\n => Array\n(\n => 112.196.163.235\n)\n\n => Array\n(\n => 139.167.161.85\n)\n\n => Array\n(\n => 106.207.39.181\n)\n\n => Array\n(\n => 103.77.42.159\n)\n\n => Array\n(\n => 185.56.138.220\n)\n\n => Array\n(\n => 119.155.33.205\n)\n\n => Array\n(\n => 157.42.117.124\n)\n\n => Array\n(\n => 103.117.202.202\n)\n\n => Array\n(\n => 220.253.101.109\n)\n\n => Array\n(\n => 49.37.7.247\n)\n\n => Array\n(\n => 119.160.65.27\n)\n\n => Array\n(\n => 114.122.21.151\n)\n\n => Array\n(\n => 157.44.141.83\n)\n\n => Array\n(\n => 103.131.9.7\n)\n\n => Array\n(\n => 125.99.222.21\n)\n\n => Array\n(\n => 103.238.104.206\n)\n\n => Array\n(\n => 110.93.227.100\n)\n\n => Array\n(\n => 49.14.119.114\n)\n\n => Array\n(\n => 115.186.189.82\n)\n\n => Array\n(\n => 106.201.194.2\n)\n\n => Array\n(\n => 106.204.227.28\n)\n\n => Array\n(\n => 47.31.206.13\n)\n\n => Array\n(\n => 39.42.144.109\n)\n\n => Array\n(\n => 14.253.254.90\n)\n\n => Array\n(\n => 157.44.142.118\n)\n\n => Array\n(\n => 192.142.176.21\n)\n\n => Array\n(\n => 103.217.178.225\n)\n\n => Array\n(\n => 106.78.78.16\n)\n\n => Array\n(\n => 167.71.63.184\n)\n\n => Array\n(\n => 207.244.71.82\n)\n\n => Array\n(\n => 71.105.25.145\n)\n\n => Array\n(\n => 39.51.250.30\n)\n\n => Array\n(\n => 157.41.120.160\n)\n\n => Array\n(\n => 39.37.137.81\n)\n\n => Array\n(\n => 41.80.237.27\n)\n\n => Array\n(\n => 111.119.187.50\n)\n\n => Array\n(\n => 49.145.224.252\n)\n\n => Array\n(\n => 106.197.28.106\n)\n\n => Array\n(\n => 103.217.178.240\n)\n\n => Array\n(\n => 27.97.182.237\n)\n\n => Array\n(\n => 106.211.253.72\n)\n\n => Array\n(\n => 119.152.154.172\n)\n\n => Array\n(\n => 103.255.151.148\n)\n\n => Array\n(\n => 154.157.80.12\n)\n\n => Array\n(\n => 156.146.59.28\n)\n\n => Array\n(\n => 171.61.211.64\n)\n\n => Array\n(\n => 27.76.59.22\n)\n\n => Array\n(\n => 167.99.92.124\n)\n\n => Array\n(\n => 132.154.94.51\n)\n\n => Array\n(\n => 111.119.183.38\n)\n\n => Array\n(\n => 115.42.70.169\n)\n\n => Array\n(\n => 109.169.23.83\n)\n\n => Array\n(\n => 157.46.213.64\n)\n\n => Array\n(\n => 39.37.179.171\n)\n\n => Array\n(\n => 14.232.233.32\n)\n\n => Array\n(\n => 157.49.226.13\n)\n\n => Array\n(\n => 185.209.178.78\n)\n\n => Array\n(\n => 222.252.46.230\n)\n\n => Array\n(\n => 139.5.255.168\n)\n\n => Array\n(\n => 202.8.118.12\n)\n\n => Array\n(\n => 39.53.205.63\n)\n\n => Array\n(\n => 157.37.167.227\n)\n\n => Array\n(\n => 157.49.237.121\n)\n\n => Array\n(\n => 208.89.99.6\n)\n\n => Array\n(\n => 111.119.187.33\n)\n\n => Array\n(\n => 39.37.132.101\n)\n\n => Array\n(\n => 72.255.61.15\n)\n\n => Array\n(\n => 157.41.69.126\n)\n\n => Array\n(\n => 27.6.193.15\n)\n\n => Array\n(\n => 157.41.104.8\n)\n\n => Array\n(\n => 157.41.97.162\n)\n\n => Array\n(\n => 95.136.91.67\n)\n\n => Array\n(\n => 110.93.209.138\n)\n\n => Array\n(\n => 119.152.154.82\n)\n\n => Array\n(\n => 111.88.239.223\n)\n\n => Array\n(\n => 157.230.62.100\n)\n\n => Array\n(\n => 37.111.136.167\n)\n\n => Array\n(\n => 139.167.162.65\n)\n\n => Array\n(\n => 120.29.72.72\n)\n\n => Array\n(\n => 39.42.169.69\n)\n\n => Array\n(\n => 157.49.247.12\n)\n\n => Array\n(\n => 43.231.58.221\n)\n\n => Array\n(\n => 111.88.229.18\n)\n\n => Array\n(\n => 171.79.185.198\n)\n\n => Array\n(\n => 169.149.193.102\n)\n\n => Array\n(\n => 207.244.89.162\n)\n\n => Array\n(\n => 27.4.217.129\n)\n\n => Array\n(\n => 91.236.184.12\n)\n\n => Array\n(\n => 14.192.154.150\n)\n\n => Array\n(\n => 167.172.55.253\n)\n\n => Array\n(\n => 103.77.42.192\n)\n\n => Array\n(\n => 39.59.122.140\n)\n\n => Array\n(\n => 41.80.84.46\n)\n\n => Array\n(\n => 202.47.52.115\n)\n\n => Array\n(\n => 222.252.43.47\n)\n\n => Array\n(\n => 119.155.37.250\n)\n\n => Array\n(\n => 157.41.18.88\n)\n\n => Array\n(\n => 39.42.8.59\n)\n\n => Array\n(\n => 39.45.162.110\n)\n\n => Array\n(\n => 111.88.237.25\n)\n\n => Array\n(\n => 103.76.211.168\n)\n\n => Array\n(\n => 178.137.114.165\n)\n\n => Array\n(\n => 43.225.74.146\n)\n\n => Array\n(\n => 157.42.25.26\n)\n\n => Array\n(\n => 137.59.146.63\n)\n\n => Array\n(\n => 119.160.117.190\n)\n\n => Array\n(\n => 1.186.181.133\n)\n\n => Array\n(\n => 39.42.145.94\n)\n\n => Array\n(\n => 203.175.73.96\n)\n\n => Array\n(\n => 39.37.160.14\n)\n\n => Array\n(\n => 157.39.123.250\n)\n\n => Array\n(\n => 95.135.57.82\n)\n\n => Array\n(\n => 162.210.194.35\n)\n\n => Array\n(\n => 39.42.153.135\n)\n\n => Array\n(\n => 118.103.230.106\n)\n\n => Array\n(\n => 108.61.39.115\n)\n\n => Array\n(\n => 102.7.108.45\n)\n\n => Array\n(\n => 183.83.138.134\n)\n\n => Array\n(\n => 115.186.70.223\n)\n\n => Array\n(\n => 157.34.17.139\n)\n\n => Array\n(\n => 122.166.158.231\n)\n\n => Array\n(\n => 43.227.135.90\n)\n\n => Array\n(\n => 182.68.46.180\n)\n\n => Array\n(\n => 223.225.28.138\n)\n\n => Array\n(\n => 103.77.42.220\n)\n\n => Array\n(\n => 192.241.219.13\n)\n\n => Array\n(\n => 103.82.80.113\n)\n\n => Array\n(\n => 42.111.243.151\n)\n\n => Array\n(\n => 171.79.189.247\n)\n\n => Array\n(\n => 157.32.132.102\n)\n\n => Array\n(\n => 103.130.105.243\n)\n\n => Array\n(\n => 117.223.98.120\n)\n\n => Array\n(\n => 106.215.197.187\n)\n\n => Array\n(\n => 182.190.194.179\n)\n\n => Array\n(\n => 223.225.29.42\n)\n\n => Array\n(\n => 117.222.94.151\n)\n\n => Array\n(\n => 182.185.199.104\n)\n\n => Array\n(\n => 49.36.145.77\n)\n\n => Array\n(\n => 103.82.80.73\n)\n\n => Array\n(\n => 103.77.16.13\n)\n\n => Array\n(\n => 221.132.118.86\n)\n\n => Array\n(\n => 202.47.45.77\n)\n\n => Array\n(\n => 202.8.118.116\n)\n\n => Array\n(\n => 42.106.180.185\n)\n\n => Array\n(\n => 203.122.8.234\n)\n\n => Array\n(\n => 88.230.104.245\n)\n\n => Array\n(\n => 103.131.9.33\n)\n\n => Array\n(\n => 117.207.209.60\n)\n\n => Array\n(\n => 42.111.253.227\n)\n\n => Array\n(\n => 23.106.56.54\n)\n\n => Array\n(\n => 122.178.143.181\n)\n\n => Array\n(\n => 111.88.180.5\n)\n\n => Array\n(\n => 174.55.224.161\n)\n\n => Array\n(\n => 49.205.87.100\n)\n\n => Array\n(\n => 49.34.183.118\n)\n\n => Array\n(\n => 124.155.255.154\n)\n\n => Array\n(\n => 106.212.135.200\n)\n\n => Array\n(\n => 139.99.159.11\n)\n\n => Array\n(\n => 45.135.229.8\n)\n\n => Array\n(\n => 88.230.106.85\n)\n\n => Array\n(\n => 91.153.145.221\n)\n\n => Array\n(\n => 103.95.83.33\n)\n\n => Array\n(\n => 122.178.116.76\n)\n\n => Array\n(\n => 103.135.78.14\n)\n\n => Array\n(\n => 111.88.233.206\n)\n\n => Array\n(\n => 192.140.153.210\n)\n\n => Array\n(\n => 202.8.118.69\n)\n\n => Array\n(\n => 103.83.130.81\n)\n\n => Array\n(\n => 182.190.213.143\n)\n\n => Array\n(\n => 198.16.74.204\n)\n\n => Array\n(\n => 101.128.117.248\n)\n\n => Array\n(\n => 103.108.5.147\n)\n\n => Array\n(\n => 157.32.130.158\n)\n\n => Array\n(\n => 103.244.172.93\n)\n\n => Array\n(\n => 47.30.140.126\n)\n\n => Array\n(\n => 223.188.40.124\n)\n\n => Array\n(\n => 157.44.191.102\n)\n\n => Array\n(\n => 41.60.237.62\n)\n\n => Array\n(\n => 47.31.228.161\n)\n\n => Array\n(\n => 137.59.217.188\n)\n\n => Array\n(\n => 39.53.220.237\n)\n\n => Array\n(\n => 45.127.45.199\n)\n\n => Array\n(\n => 14.190.71.19\n)\n\n => Array\n(\n => 47.18.205.54\n)\n\n => Array\n(\n => 110.93.240.11\n)\n\n => Array\n(\n => 134.209.29.111\n)\n\n => Array\n(\n => 49.36.175.104\n)\n\n => Array\n(\n => 203.192.230.61\n)\n\n => Array\n(\n => 176.10.125.115\n)\n\n => Array\n(\n => 182.18.206.17\n)\n\n => Array\n(\n => 103.87.194.102\n)\n\n => Array\n(\n => 171.79.123.106\n)\n\n => Array\n(\n => 45.116.233.35\n)\n\n => Array\n(\n => 223.190.57.225\n)\n\n => Array\n(\n => 114.125.6.158\n)\n\n => Array\n(\n => 223.179.138.176\n)\n\n => Array\n(\n => 111.119.183.61\n)\n\n => Array\n(\n => 202.8.118.43\n)\n\n => Array\n(\n => 157.51.175.216\n)\n\n => Array\n(\n => 41.60.238.100\n)\n\n => Array\n(\n => 117.207.210.199\n)\n\n => Array\n(\n => 111.119.183.26\n)\n\n => Array\n(\n => 103.252.226.12\n)\n\n => Array\n(\n => 103.221.208.82\n)\n\n => Array\n(\n => 103.82.80.228\n)\n\n => Array\n(\n => 111.119.187.39\n)\n\n => Array\n(\n => 157.51.161.199\n)\n\n => Array\n(\n => 59.96.88.246\n)\n\n => Array\n(\n => 27.4.181.183\n)\n\n => Array\n(\n => 43.225.98.124\n)\n\n => Array\n(\n => 157.51.113.74\n)\n\n => Array\n(\n => 207.244.89.161\n)\n\n => Array\n(\n => 49.37.184.82\n)\n\n => Array\n(\n => 111.119.183.4\n)\n\n => Array\n(\n => 39.42.130.147\n)\n\n => Array\n(\n => 103.152.101.2\n)\n\n => Array\n(\n => 111.119.183.2\n)\n\n => Array\n(\n => 157.51.171.149\n)\n\n => Array\n(\n => 103.82.80.245\n)\n\n => Array\n(\n => 175.107.207.133\n)\n\n => Array\n(\n => 103.204.169.158\n)\n\n => Array\n(\n => 157.51.181.12\n)\n\n => Array\n(\n => 195.158.193.212\n)\n\n => Array\n(\n => 204.14.73.85\n)\n\n => Array\n(\n => 39.59.59.31\n)\n\n => Array\n(\n => 45.148.11.82\n)\n\n => Array\n(\n => 157.46.117.250\n)\n\n => Array\n(\n => 157.46.127.170\n)\n\n => Array\n(\n => 77.247.181.165\n)\n\n => Array\n(\n => 111.119.183.54\n)\n\n => Array\n(\n => 41.60.232.183\n)\n\n => Array\n(\n => 157.42.206.174\n)\n\n => Array\n(\n => 196.53.10.246\n)\n\n => Array\n(\n => 27.97.186.131\n)\n\n => Array\n(\n => 103.73.101.134\n)\n\n => Array\n(\n => 111.119.183.35\n)\n\n => Array\n(\n => 202.8.118.111\n)\n\n => Array\n(\n => 103.75.246.207\n)\n\n => Array\n(\n => 47.8.94.225\n)\n\n => Array\n(\n => 106.202.40.83\n)\n\n => Array\n(\n => 117.102.2.0\n)\n\n => Array\n(\n => 156.146.59.11\n)\n\n => Array\n(\n => 223.190.115.125\n)\n\n => Array\n(\n => 169.149.212.232\n)\n\n => Array\n(\n => 39.45.150.127\n)\n\n => Array\n(\n => 45.63.10.204\n)\n\n => Array\n(\n => 27.57.86.46\n)\n\n => Array\n(\n => 103.127.20.138\n)\n\n => Array\n(\n => 223.190.27.26\n)\n\n => Array\n(\n => 49.15.248.78\n)\n\n => Array\n(\n => 130.105.135.103\n)\n\n => Array\n(\n => 47.31.3.239\n)\n\n => Array\n(\n => 185.66.71.8\n)\n\n => Array\n(\n => 103.226.226.198\n)\n\n => Array\n(\n => 39.34.134.16\n)\n\n => Array\n(\n => 95.158.53.120\n)\n\n => Array\n(\n => 45.9.249.246\n)\n\n => Array\n(\n => 223.235.162.157\n)\n\n => Array\n(\n => 37.111.139.23\n)\n\n => Array\n(\n => 49.37.153.47\n)\n\n => Array\n(\n => 103.242.60.205\n)\n\n => Array\n(\n => 185.66.68.18\n)\n\n => Array\n(\n => 162.221.202.138\n)\n\n => Array\n(\n => 202.63.195.29\n)\n\n => Array\n(\n => 112.198.75.226\n)\n\n => Array\n(\n => 46.200.69.233\n)\n\n => Array\n(\n => 103.135.78.30\n)\n\n => Array\n(\n => 119.152.226.9\n)\n\n => Array\n(\n => 167.172.242.50\n)\n\n => Array\n(\n => 49.36.151.31\n)\n\n => Array\n(\n => 111.88.237.156\n)\n\n => Array\n(\n => 103.215.168.1\n)\n\n => Array\n(\n => 107.181.177.137\n)\n\n => Array\n(\n => 157.119.186.202\n)\n\n => Array\n(\n => 37.111.139.106\n)\n\n => Array\n(\n => 182.180.152.198\n)\n\n => Array\n(\n => 43.248.153.72\n)\n\n => Array\n(\n => 64.188.20.84\n)\n\n => Array\n(\n => 103.92.214.11\n)\n\n => Array\n(\n => 182.182.14.148\n)\n\n => Array\n(\n => 116.75.154.119\n)\n\n => Array\n(\n => 37.228.235.94\n)\n\n => Array\n(\n => 197.210.55.43\n)\n\n => Array\n(\n => 45.118.165.153\n)\n\n => Array\n(\n => 122.176.32.27\n)\n\n => Array\n(\n => 106.215.161.20\n)\n\n => Array\n(\n => 152.32.113.58\n)\n\n => Array\n(\n => 111.125.106.132\n)\n\n => Array\n(\n => 212.102.40.72\n)\n\n => Array\n(\n => 2.58.194.140\n)\n\n => Array\n(\n => 122.174.68.115\n)\n\n => Array\n(\n => 117.241.66.56\n)\n\n => Array\n(\n => 71.94.172.140\n)\n\n => Array\n(\n => 103.209.228.139\n)\n\n => Array\n(\n => 43.242.177.140\n)\n\n => Array\n(\n => 38.91.101.66\n)\n\n => Array\n(\n => 103.82.80.67\n)\n\n => Array\n(\n => 117.248.62.138\n)\n\n => Array\n(\n => 103.81.215.51\n)\n\n => Array\n(\n => 103.253.174.4\n)\n\n => Array\n(\n => 202.142.110.111\n)\n\n => Array\n(\n => 162.216.142.1\n)\n\n => Array\n(\n => 58.186.7.252\n)\n\n => Array\n(\n => 113.203.247.66\n)\n\n => Array\n(\n => 111.88.50.63\n)\n\n => Array\n(\n => 182.182.94.227\n)\n\n => Array\n(\n => 49.15.232.50\n)\n\n => Array\n(\n => 182.189.76.225\n)\n\n => Array\n(\n => 139.99.159.14\n)\n\n => Array\n(\n => 163.172.159.235\n)\n\n => Array\n(\n => 157.36.235.241\n)\n\n => Array\n(\n => 111.119.187.3\n)\n\n => Array\n(\n => 103.100.4.61\n)\n\n => Array\n(\n => 192.142.130.88\n)\n\n => Array\n(\n => 43.242.176.114\n)\n\n => Array\n(\n => 180.178.156.165\n)\n\n => Array\n(\n => 182.189.236.77\n)\n\n => Array\n(\n => 49.34.197.239\n)\n\n => Array\n(\n => 157.36.107.107\n)\n\n => Array\n(\n => 103.209.85.175\n)\n\n => Array\n(\n => 203.139.63.83\n)\n\n => Array\n(\n => 43.242.177.161\n)\n\n => Array\n(\n => 182.182.77.138\n)\n\n => Array\n(\n => 114.124.168.117\n)\n\n => Array\n(\n => 124.253.79.191\n)\n\n => Array\n(\n => 192.142.168.235\n)\n\n => Array\n(\n => 14.232.235.111\n)\n\n => Array\n(\n => 152.57.124.214\n)\n\n => Array\n(\n => 123.24.172.48\n)\n\n => Array\n(\n => 43.242.176.87\n)\n\n => Array\n(\n => 43.242.176.101\n)\n\n => Array\n(\n => 49.156.84.110\n)\n\n => Array\n(\n => 58.65.222.6\n)\n\n => Array\n(\n => 157.32.189.112\n)\n\n => Array\n(\n => 47.31.155.87\n)\n\n => Array\n(\n => 39.53.244.182\n)\n\n => Array\n(\n => 39.33.221.76\n)\n\n => Array\n(\n => 161.35.130.245\n)\n\n => Array\n(\n => 152.32.113.137\n)\n\n => Array\n(\n => 192.142.187.220\n)\n\n => Array\n(\n => 185.54.228.123\n)\n\n => Array\n(\n => 103.233.87.221\n)\n\n => Array\n(\n => 223.236.200.224\n)\n\n => Array\n(\n => 27.97.189.170\n)\n\n => Array\n(\n => 103.82.80.212\n)\n\n => Array\n(\n => 43.242.176.37\n)\n\n => Array\n(\n => 49.36.144.94\n)\n\n => Array\n(\n => 180.251.62.185\n)\n\n => Array\n(\n => 39.50.243.227\n)\n\n => Array\n(\n => 124.253.20.21\n)\n\n => Array\n(\n => 41.60.233.31\n)\n\n => Array\n(\n => 103.81.215.57\n)\n\n => Array\n(\n => 185.91.120.16\n)\n\n => Array\n(\n => 182.190.107.163\n)\n\n => Array\n(\n => 222.252.61.68\n)\n\n => Array\n(\n => 109.169.23.78\n)\n\n => Array\n(\n => 39.50.151.222\n)\n\n => Array\n(\n => 43.242.176.86\n)\n\n => Array\n(\n => 178.162.222.161\n)\n\n => Array\n(\n => 37.111.139.158\n)\n\n => Array\n(\n => 39.57.224.97\n)\n\n => Array\n(\n => 39.57.157.194\n)\n\n => Array\n(\n => 111.119.183.48\n)\n\n => Array\n(\n => 180.190.171.129\n)\n\n => Array\n(\n => 39.52.174.177\n)\n\n => Array\n(\n => 43.242.176.103\n)\n\n => Array\n(\n => 124.253.83.14\n)\n\n => Array\n(\n => 182.189.116.245\n)\n\n => Array\n(\n => 157.36.178.213\n)\n\n => Array\n(\n => 45.250.65.119\n)\n\n => Array\n(\n => 103.209.86.6\n)\n\n => Array\n(\n => 43.242.176.80\n)\n\n => Array\n(\n => 137.59.147.2\n)\n\n => Array\n(\n => 117.222.95.23\n)\n\n => Array\n(\n => 124.253.81.10\n)\n\n => Array\n(\n => 43.242.177.21\n)\n\n => Array\n(\n => 182.189.224.186\n)\n\n => Array\n(\n => 39.52.178.142\n)\n\n => Array\n(\n => 106.214.29.176\n)\n\n => Array\n(\n => 111.88.145.107\n)\n\n => Array\n(\n => 49.36.142.67\n)\n\n => Array\n(\n => 202.142.65.50\n)\n\n => Array\n(\n => 1.22.186.76\n)\n\n => Array\n(\n => 103.131.8.225\n)\n\n => Array\n(\n => 39.53.212.111\n)\n\n => Array\n(\n => 103.82.80.149\n)\n\n => Array\n(\n => 43.242.176.12\n)\n\n => Array\n(\n => 103.109.13.189\n)\n\n => Array\n(\n => 124.253.206.202\n)\n\n => Array\n(\n => 117.195.115.85\n)\n\n => Array\n(\n => 49.36.245.229\n)\n\n => Array\n(\n => 42.118.8.100\n)\n\n => Array\n(\n => 1.22.73.17\n)\n\n => Array\n(\n => 157.36.166.131\n)\n\n => Array\n(\n => 182.182.38.223\n)\n\n => Array\n(\n => 49.14.150.21\n)\n\n => Array\n(\n => 43.242.176.89\n)\n\n => Array\n(\n => 157.46.185.69\n)\n\n => Array\n(\n => 103.31.92.150\n)\n\n => Array\n(\n => 59.96.90.94\n)\n\n => Array\n(\n => 49.156.111.64\n)\n\n => Array\n(\n => 103.75.244.16\n)\n\n => Array\n(\n => 54.37.18.139\n)\n\n => Array\n(\n => 27.255.173.50\n)\n\n => Array\n(\n => 84.202.161.120\n)\n\n => Array\n(\n => 27.3.224.180\n)\n\n => Array\n(\n => 39.44.14.192\n)\n\n => Array\n(\n => 37.120.133.201\n)\n\n => Array\n(\n => 109.251.143.236\n)\n\n => Array\n(\n => 23.80.97.111\n)\n\n => Array\n(\n => 43.242.176.9\n)\n\n => Array\n(\n => 14.248.107.50\n)\n\n => Array\n(\n => 182.189.221.114\n)\n\n => Array\n(\n => 103.253.173.74\n)\n\n => Array\n(\n => 27.97.177.45\n)\n\n => Array\n(\n => 49.14.98.9\n)\n\n => Array\n(\n => 163.53.85.169\n)\n\n => Array\n(\n => 39.59.90.168\n)\n\n => Array\n(\n => 111.88.202.253\n)\n\n => Array\n(\n => 111.119.178.155\n)\n\n => Array\n(\n => 171.76.163.75\n)\n\n => Array\n(\n => 202.5.154.23\n)\n\n => Array\n(\n => 119.160.65.164\n)\n\n => Array\n(\n => 14.253.253.190\n)\n\n => Array\n(\n => 117.206.167.25\n)\n\n => Array\n(\n => 61.2.183.186\n)\n\n => Array\n(\n => 103.100.4.83\n)\n\n => Array\n(\n => 124.253.71.126\n)\n\n => Array\n(\n => 182.189.49.217\n)\n\n => Array\n(\n => 103.196.160.41\n)\n\n => Array\n(\n => 23.106.56.35\n)\n\n => Array\n(\n => 110.38.12.70\n)\n\n => Array\n(\n => 154.157.199.239\n)\n\n => Array\n(\n => 14.231.163.113\n)\n\n => Array\n(\n => 103.69.27.232\n)\n\n => Array\n(\n => 175.107.220.192\n)\n\n => Array\n(\n => 43.231.58.173\n)\n\n => Array\n(\n => 138.128.91.215\n)\n\n => Array\n(\n => 103.233.86.1\n)\n\n => Array\n(\n => 182.187.67.111\n)\n\n => Array\n(\n => 49.156.71.31\n)\n\n => Array\n(\n => 27.255.174.125\n)\n\n => Array\n(\n => 195.24.220.35\n)\n\n => Array\n(\n => 120.29.98.28\n)\n\n => Array\n(\n => 41.202.219.255\n)\n\n => Array\n(\n => 103.88.3.243\n)\n\n => Array\n(\n => 111.125.106.75\n)\n\n => Array\n(\n => 106.76.71.74\n)\n\n => Array\n(\n => 112.201.138.85\n)\n\n => Array\n(\n => 110.137.101.229\n)\n\n => Array\n(\n => 43.242.177.96\n)\n\n => Array\n(\n => 39.36.198.196\n)\n\n => Array\n(\n => 27.255.181.140\n)\n\n => Array\n(\n => 194.99.104.58\n)\n\n => Array\n(\n => 78.129.139.109\n)\n\n => Array\n(\n => 47.247.185.67\n)\n\n => Array\n(\n => 27.63.37.90\n)\n\n => Array\n(\n => 103.211.54.1\n)\n\n => Array\n(\n => 94.202.167.139\n)\n\n => Array\n(\n => 111.119.183.3\n)\n\n => Array\n(\n => 124.253.194.1\n)\n\n => Array\n(\n => 192.142.188.115\n)\n\n => Array\n(\n => 39.44.137.107\n)\n\n => Array\n(\n => 43.251.191.25\n)\n\n => Array\n(\n => 103.140.30.114\n)\n\n => Array\n(\n => 117.5.194.159\n)\n\n => Array\n(\n => 109.169.23.79\n)\n\n => Array\n(\n => 122.178.127.170\n)\n\n => Array\n(\n => 45.118.165.156\n)\n\n => Array\n(\n => 39.48.199.148\n)\n\n => Array\n(\n => 182.64.138.32\n)\n\n => Array\n(\n => 37.73.129.186\n)\n\n => Array\n(\n => 182.186.110.35\n)\n\n => Array\n(\n => 43.242.177.24\n)\n\n => Array\n(\n => 119.155.23.112\n)\n\n => Array\n(\n => 84.16.238.119\n)\n\n => Array\n(\n => 41.202.219.252\n)\n\n => Array\n(\n => 43.242.176.119\n)\n\n => Array\n(\n => 111.119.187.6\n)\n\n => Array\n(\n => 95.12.200.188\n)\n\n => Array\n(\n => 139.28.219.138\n)\n\n => Array\n(\n => 89.163.247.130\n)\n\n => Array\n(\n => 122.173.103.88\n)\n\n => Array\n(\n => 103.248.87.10\n)\n\n => Array\n(\n => 23.106.249.36\n)\n\n => Array\n(\n => 124.253.94.125\n)\n\n => Array\n(\n => 39.53.244.147\n)\n\n => Array\n(\n => 193.109.85.11\n)\n\n => Array\n(\n => 43.242.176.71\n)\n\n => Array\n(\n => 43.242.177.58\n)\n\n => Array\n(\n => 47.31.6.139\n)\n\n => Array\n(\n => 39.59.34.67\n)\n\n => Array\n(\n => 43.242.176.58\n)\n\n => Array\n(\n => 103.107.198.198\n)\n\n => Array\n(\n => 147.135.11.113\n)\n\n => Array\n(\n => 27.7.212.112\n)\n\n => Array\n(\n => 43.242.177.1\n)\n\n => Array\n(\n => 175.107.227.27\n)\n\n => Array\n(\n => 103.103.43.254\n)\n\n => Array\n(\n => 49.15.221.10\n)\n\n => Array\n(\n => 43.242.177.43\n)\n\n => Array\n(\n => 36.85.59.11\n)\n\n => Array\n(\n => 124.253.204.50\n)\n\n => Array\n(\n => 5.181.233.54\n)\n\n => Array\n(\n => 43.242.177.154\n)\n\n => Array\n(\n => 103.84.37.169\n)\n\n => Array\n(\n => 222.252.54.108\n)\n\n => Array\n(\n => 14.162.160.254\n)\n\n => Array\n(\n => 178.151.218.45\n)\n\n => Array\n(\n => 110.137.101.93\n)\n\n => Array\n(\n => 122.162.212.59\n)\n\n => Array\n(\n => 81.12.118.162\n)\n\n => Array\n(\n => 171.76.186.148\n)\n\n => Array\n(\n => 182.69.253.77\n)\n\n => Array\n(\n => 111.119.183.43\n)\n\n => Array\n(\n => 49.149.74.226\n)\n\n => Array\n(\n => 43.242.177.63\n)\n\n => Array\n(\n => 14.99.243.54\n)\n\n => Array\n(\n => 110.137.100.25\n)\n\n => Array\n(\n => 116.107.25.163\n)\n\n => Array\n(\n => 49.36.71.141\n)\n\n => Array\n(\n => 182.180.117.219\n)\n\n => Array\n(\n => 150.242.172.194\n)\n\n => Array\n(\n => 49.156.111.40\n)\n\n => Array\n(\n => 49.15.208.115\n)\n\n => Array\n(\n => 103.209.87.219\n)\n\n => Array\n(\n => 43.242.176.56\n)\n\n => Array\n(\n => 103.132.187.100\n)\n\n => Array\n(\n => 49.156.96.120\n)\n\n => Array\n(\n => 192.142.176.171\n)\n\n => Array\n(\n => 51.91.18.131\n)\n\n => Array\n(\n => 103.83.144.121\n)\n\n => Array\n(\n => 1.39.75.72\n)\n\n => Array\n(\n => 14.231.172.177\n)\n\n => Array\n(\n => 94.232.213.159\n)\n\n => Array\n(\n => 103.228.158.38\n)\n\n => Array\n(\n => 43.242.177.100\n)\n\n => Array\n(\n => 171.76.149.130\n)\n\n => Array\n(\n => 113.183.26.59\n)\n\n => Array\n(\n => 182.74.232.166\n)\n\n => Array\n(\n => 47.31.205.211\n)\n\n => Array\n(\n => 106.211.253.70\n)\n\n => Array\n(\n => 39.51.233.214\n)\n\n => Array\n(\n => 182.70.249.161\n)\n\n => Array\n(\n => 222.252.40.196\n)\n\n => Array\n(\n => 49.37.6.29\n)\n\n => Array\n(\n => 119.155.33.170\n)\n\n => Array\n(\n => 43.242.177.79\n)\n\n => Array\n(\n => 111.119.183.62\n)\n\n => Array\n(\n => 137.59.226.97\n)\n\n => Array\n(\n => 42.111.18.121\n)\n\n => Array\n(\n => 223.190.46.91\n)\n\n => Array\n(\n => 45.118.165.159\n)\n\n => Array\n(\n => 110.136.60.44\n)\n\n => Array\n(\n => 43.242.176.57\n)\n\n => Array\n(\n => 117.212.58.0\n)\n\n => Array\n(\n => 49.37.7.66\n)\n\n => Array\n(\n => 39.52.174.33\n)\n\n => Array\n(\n => 150.242.172.55\n)\n\n => Array\n(\n => 103.94.111.236\n)\n\n => Array\n(\n => 106.215.239.184\n)\n\n => Array\n(\n => 101.128.117.75\n)\n\n => Array\n(\n => 162.210.194.10\n)\n\n => Array\n(\n => 136.158.31.132\n)\n\n => Array\n(\n => 39.51.245.69\n)\n\n => Array\n(\n => 39.42.149.159\n)\n\n => Array\n(\n => 51.77.108.159\n)\n\n => Array\n(\n => 45.127.247.250\n)\n\n => Array\n(\n => 122.172.78.22\n)\n\n => Array\n(\n => 117.220.208.38\n)\n\n => Array\n(\n => 112.201.138.95\n)\n\n => Array\n(\n => 49.145.105.113\n)\n\n => Array\n(\n => 110.93.247.12\n)\n\n => Array\n(\n => 39.52.150.32\n)\n\n => Array\n(\n => 122.161.89.41\n)\n\n => Array\n(\n => 39.52.176.49\n)\n\n => Array\n(\n => 157.33.12.154\n)\n\n => Array\n(\n => 73.111.248.162\n)\n\n => Array\n(\n => 112.204.167.67\n)\n\n => Array\n(\n => 107.150.30.182\n)\n\n => Array\n(\n => 115.99.222.229\n)\n\n => Array\n(\n => 180.190.195.96\n)\n\n => Array\n(\n => 157.44.57.255\n)\n\n => Array\n(\n => 39.37.9.167\n)\n\n => Array\n(\n => 39.49.48.33\n)\n\n => Array\n(\n => 157.44.218.118\n)\n\n => Array\n(\n => 103.211.54.253\n)\n\n => Array\n(\n => 43.242.177.81\n)\n\n => Array\n(\n => 103.111.224.227\n)\n\n => Array\n(\n => 223.176.48.237\n)\n\n => Array\n(\n => 124.253.87.117\n)\n\n => Array\n(\n => 124.29.247.14\n)\n\n => Array\n(\n => 182.189.232.32\n)\n\n => Array\n(\n => 111.68.97.206\n)\n\n => Array\n(\n => 103.117.15.70\n)\n\n => Array\n(\n => 182.18.236.101\n)\n\n => Array\n(\n => 43.242.177.60\n)\n\n => Array\n(\n => 180.190.7.178\n)\n\n => Array\n(\n => 112.201.142.95\n)\n\n => Array\n(\n => 122.178.255.123\n)\n\n => Array\n(\n => 49.36.240.103\n)\n\n => Array\n(\n => 210.56.16.13\n)\n\n => Array\n(\n => 103.91.123.219\n)\n\n => Array\n(\n => 39.52.155.252\n)\n\n => Array\n(\n => 192.142.207.230\n)\n\n => Array\n(\n => 188.163.82.179\n)\n\n => Array\n(\n => 182.189.9.196\n)\n\n => Array\n(\n => 175.107.221.51\n)\n\n => Array\n(\n => 39.53.221.200\n)\n\n => Array\n(\n => 27.255.190.59\n)\n\n => Array\n(\n => 183.83.212.118\n)\n\n => Array\n(\n => 45.118.165.143\n)\n\n => Array\n(\n => 182.189.124.35\n)\n\n => Array\n(\n => 203.101.186.1\n)\n\n => Array\n(\n => 49.36.246.25\n)\n\n => Array\n(\n => 39.42.186.234\n)\n\n => Array\n(\n => 103.82.80.14\n)\n\n => Array\n(\n => 210.18.182.42\n)\n\n => Array\n(\n => 42.111.13.81\n)\n\n => Array\n(\n => 46.200.69.240\n)\n\n => Array\n(\n => 103.209.87.213\n)\n\n => Array\n(\n => 103.31.95.95\n)\n\n => Array\n(\n => 180.190.174.25\n)\n\n => Array\n(\n => 103.77.0.128\n)\n\n => Array\n(\n => 49.34.103.82\n)\n\n => Array\n(\n => 39.48.196.22\n)\n\n => Array\n(\n => 192.142.166.20\n)\n\n => Array\n(\n => 202.142.110.186\n)\n\n => Array\n(\n => 122.163.135.95\n)\n\n => Array\n(\n => 183.83.255.225\n)\n\n => Array\n(\n => 157.45.46.10\n)\n\n => Array\n(\n => 182.189.4.77\n)\n\n => Array\n(\n => 49.145.104.71\n)\n\n => Array\n(\n => 103.143.7.34\n)\n\n => Array\n(\n => 61.2.180.15\n)\n\n => Array\n(\n => 103.81.215.61\n)\n\n => Array\n(\n => 115.42.71.122\n)\n\n => Array\n(\n => 124.253.73.20\n)\n\n => Array\n(\n => 49.33.210.169\n)\n\n => Array\n(\n => 78.159.101.115\n)\n\n => Array\n(\n => 42.111.17.221\n)\n\n => Array\n(\n => 43.242.178.67\n)\n\n => Array\n(\n => 36.68.138.36\n)\n\n => Array\n(\n => 103.195.201.51\n)\n\n => Array\n(\n => 79.141.162.81\n)\n\n => Array\n(\n => 202.8.118.239\n)\n\n => Array\n(\n => 103.139.128.161\n)\n\n => Array\n(\n => 207.244.71.84\n)\n\n => Array\n(\n => 124.253.184.45\n)\n\n => Array\n(\n => 111.125.106.124\n)\n\n => Array\n(\n => 111.125.105.139\n)\n\n => Array\n(\n => 39.59.94.233\n)\n\n => Array\n(\n => 112.211.60.168\n)\n\n => Array\n(\n => 103.117.14.72\n)\n\n => Array\n(\n => 111.119.183.56\n)\n\n => Array\n(\n => 47.31.53.228\n)\n\n => Array\n(\n => 124.253.186.8\n)\n\n => Array\n(\n => 183.83.213.214\n)\n\n => Array\n(\n => 103.106.239.70\n)\n\n => Array\n(\n => 182.182.92.81\n)\n\n => Array\n(\n => 14.162.167.98\n)\n\n => Array\n(\n => 112.211.11.107\n)\n\n => Array\n(\n => 77.111.246.20\n)\n\n => Array\n(\n => 49.156.86.182\n)\n\n => Array\n(\n => 47.29.122.112\n)\n\n => Array\n(\n => 125.99.74.42\n)\n\n => Array\n(\n => 124.123.169.24\n)\n\n => Array\n(\n => 106.202.105.128\n)\n\n => Array\n(\n => 103.244.173.14\n)\n\n => Array\n(\n => 103.98.63.104\n)\n\n => Array\n(\n => 180.245.6.60\n)\n\n => Array\n(\n => 49.149.96.14\n)\n\n => Array\n(\n => 14.177.120.169\n)\n\n => Array\n(\n => 192.135.90.145\n)\n\n => Array\n(\n => 223.190.18.218\n)\n\n => Array\n(\n => 171.61.190.2\n)\n\n => Array\n(\n => 58.65.220.219\n)\n\n => Array\n(\n => 122.177.29.87\n)\n\n => Array\n(\n => 223.236.175.203\n)\n\n => Array\n(\n => 39.53.237.106\n)\n\n => Array\n(\n => 1.186.114.83\n)\n\n => Array\n(\n => 43.230.66.153\n)\n\n => Array\n(\n => 27.96.94.247\n)\n\n => Array\n(\n => 39.52.176.185\n)\n\n => Array\n(\n => 59.94.147.62\n)\n\n => Array\n(\n => 119.160.117.10\n)\n\n => Array\n(\n => 43.241.146.105\n)\n\n => Array\n(\n => 39.59.87.75\n)\n\n => Array\n(\n => 119.160.118.203\n)\n\n => Array\n(\n => 39.52.161.76\n)\n\n => Array\n(\n => 202.168.84.189\n)\n\n => Array\n(\n => 103.215.168.2\n)\n\n => Array\n(\n => 39.42.146.160\n)\n\n => Array\n(\n => 182.182.30.246\n)\n\n => Array\n(\n => 122.173.212.133\n)\n\n => Array\n(\n => 39.51.238.44\n)\n\n => Array\n(\n => 183.83.252.51\n)\n\n => Array\n(\n => 202.142.168.86\n)\n\n => Array\n(\n => 39.40.198.209\n)\n\n => Array\n(\n => 192.135.90.151\n)\n\n => Array\n(\n => 72.255.41.174\n)\n\n => Array\n(\n => 137.97.92.124\n)\n\n => Array\n(\n => 182.185.159.155\n)\n\n => Array\n(\n => 157.44.133.131\n)\n\n => Array\n(\n => 39.51.230.253\n)\n\n => Array\n(\n => 103.70.87.200\n)\n\n => Array\n(\n => 103.117.15.82\n)\n\n => Array\n(\n => 103.217.244.69\n)\n\n => Array\n(\n => 157.34.76.185\n)\n\n => Array\n(\n => 39.52.130.163\n)\n\n => Array\n(\n => 182.181.41.39\n)\n\n => Array\n(\n => 49.37.212.226\n)\n\n => Array\n(\n => 119.160.117.100\n)\n\n => Array\n(\n => 103.209.87.43\n)\n\n => Array\n(\n => 180.190.195.45\n)\n\n => Array\n(\n => 122.160.57.230\n)\n\n => Array\n(\n => 203.192.213.81\n)\n\n => Array\n(\n => 182.181.63.91\n)\n\n => Array\n(\n => 157.44.184.5\n)\n\n => Array\n(\n => 27.97.213.128\n)\n\n => Array\n(\n => 122.55.252.145\n)\n\n => Array\n(\n => 103.117.15.92\n)\n\n => Array\n(\n => 42.201.251.179\n)\n\n => Array\n(\n => 122.186.84.53\n)\n\n => Array\n(\n => 119.157.75.242\n)\n\n => Array\n(\n => 39.42.163.6\n)\n\n => Array\n(\n => 14.99.246.78\n)\n\n => Array\n(\n => 103.209.87.227\n)\n\n => Array\n(\n => 182.68.215.31\n)\n\n => Array\n(\n => 45.118.165.140\n)\n\n => Array\n(\n => 207.244.71.81\n)\n\n => Array\n(\n => 27.97.162.57\n)\n\n => Array\n(\n => 103.113.106.98\n)\n\n => Array\n(\n => 95.135.44.103\n)\n\n => Array\n(\n => 125.209.114.238\n)\n\n => Array\n(\n => 77.123.14.176\n)\n\n => Array\n(\n => 110.36.202.169\n)\n\n => Array\n(\n => 124.253.205.230\n)\n\n => Array\n(\n => 106.215.72.117\n)\n\n => Array\n(\n => 116.72.226.35\n)\n\n => Array\n(\n => 137.97.103.141\n)\n\n => Array\n(\n => 112.79.212.161\n)\n\n => Array\n(\n => 103.209.85.150\n)\n\n => Array\n(\n => 103.159.127.6\n)\n\n => Array\n(\n => 43.239.205.66\n)\n\n => Array\n(\n => 143.244.51.152\n)\n\n => Array\n(\n => 182.64.15.3\n)\n\n => Array\n(\n => 182.185.207.146\n)\n\n => Array\n(\n => 45.118.165.155\n)\n\n => Array\n(\n => 115.160.241.214\n)\n\n => Array\n(\n => 47.31.230.68\n)\n\n => Array\n(\n => 49.15.84.145\n)\n\n => Array\n(\n => 39.51.239.206\n)\n\n => Array\n(\n => 103.149.154.212\n)\n\n => Array\n(\n => 43.239.207.155\n)\n\n => Array\n(\n => 182.182.30.181\n)\n\n => Array\n(\n => 157.37.198.16\n)\n\n => Array\n(\n => 162.239.24.60\n)\n\n => Array\n(\n => 106.212.101.97\n)\n\n => Array\n(\n => 124.253.97.44\n)\n\n => Array\n(\n => 106.214.95.176\n)\n\n => Array\n(\n => 102.69.228.114\n)\n\n => Array\n(\n => 116.74.58.221\n)\n\n => Array\n(\n => 162.210.194.38\n)\n\n => Array\n(\n => 39.52.162.121\n)\n\n => Array\n(\n => 103.216.143.255\n)\n\n => Array\n(\n => 103.49.155.134\n)\n\n => Array\n(\n => 182.191.119.236\n)\n\n => Array\n(\n => 111.88.213.172\n)\n\n => Array\n(\n => 43.239.207.207\n)\n\n => Array\n(\n => 140.213.35.143\n)\n\n => Array\n(\n => 154.72.153.215\n)\n\n => Array\n(\n => 122.170.47.36\n)\n\n => Array\n(\n => 51.158.111.163\n)\n\n => Array\n(\n => 203.122.10.150\n)\n\n => Array\n(\n => 47.31.176.111\n)\n\n => Array\n(\n => 103.75.246.34\n)\n\n => Array\n(\n => 103.244.178.45\n)\n\n => Array\n(\n => 182.185.138.0\n)\n\n => Array\n(\n => 183.83.254.224\n)\n\n => Array\n(\n => 49.36.246.145\n)\n\n => Array\n(\n => 202.47.60.85\n)\n\n => Array\n(\n => 180.190.163.160\n)\n\n => Array\n(\n => 27.255.187.221\n)\n\n => Array\n(\n => 14.248.94.2\n)\n\n => Array\n(\n => 185.233.17.187\n)\n\n => Array\n(\n => 139.5.254.227\n)\n\n => Array\n(\n => 103.149.160.66\n)\n\n => Array\n(\n => 122.168.235.47\n)\n\n => Array\n(\n => 45.113.248.224\n)\n\n => Array\n(\n => 110.54.170.142\n)\n\n => Array\n(\n => 223.235.226.55\n)\n\n => Array\n(\n => 157.32.19.235\n)\n\n => Array\n(\n => 49.15.221.114\n)\n\n => Array\n(\n => 27.97.166.163\n)\n\n => Array\n(\n => 223.233.99.5\n)\n\n => Array\n(\n => 49.33.203.53\n)\n\n => Array\n(\n => 27.56.214.41\n)\n\n => Array\n(\n => 103.138.51.3\n)\n\n => Array\n(\n => 111.119.183.21\n)\n\n => Array\n(\n => 47.15.138.233\n)\n\n => Array\n(\n => 202.63.213.184\n)\n\n => Array\n(\n => 49.36.158.94\n)\n\n => Array\n(\n => 27.97.186.179\n)\n\n => Array\n(\n => 27.97.214.69\n)\n\n => Array\n(\n => 203.128.18.163\n)\n\n => Array\n(\n => 106.207.235.63\n)\n\n => Array\n(\n => 116.107.220.231\n)\n\n => Array\n(\n => 223.226.169.249\n)\n\n => Array\n(\n => 106.201.24.6\n)\n\n => Array\n(\n => 49.15.89.7\n)\n\n => Array\n(\n => 49.15.142.20\n)\n\n => Array\n(\n => 223.177.24.85\n)\n\n => Array\n(\n => 37.156.17.37\n)\n\n => Array\n(\n => 102.129.224.2\n)\n\n => Array\n(\n => 49.15.85.221\n)\n\n => Array\n(\n => 106.76.208.153\n)\n\n => Array\n(\n => 61.2.47.71\n)\n\n => Array\n(\n => 27.97.178.79\n)\n\n => Array\n(\n => 39.34.143.196\n)\n\n => Array\n(\n => 103.10.227.158\n)\n\n => Array\n(\n => 117.220.210.159\n)\n\n => Array\n(\n => 182.189.28.11\n)\n\n => Array\n(\n => 122.185.38.170\n)\n\n => Array\n(\n => 112.196.132.115\n)\n\n => Array\n(\n => 187.156.137.83\n)\n\n => Array\n(\n => 203.122.3.88\n)\n\n => Array\n(\n => 51.68.142.45\n)\n\n => Array\n(\n => 124.253.217.55\n)\n\n => Array\n(\n => 103.152.41.2\n)\n\n => Array\n(\n => 157.37.154.219\n)\n\n => Array\n(\n => 39.45.32.77\n)\n\n => Array\n(\n => 182.182.22.221\n)\n\n => Array\n(\n => 157.43.205.117\n)\n\n => Array\n(\n => 202.142.123.58\n)\n\n => Array\n(\n => 43.239.207.121\n)\n\n => Array\n(\n => 49.206.122.113\n)\n\n => Array\n(\n => 106.193.199.203\n)\n\n => Array\n(\n => 103.67.157.251\n)\n\n => Array\n(\n => 49.34.97.81\n)\n\n => Array\n(\n => 49.156.92.130\n)\n\n => Array\n(\n => 203.160.179.210\n)\n\n => Array\n(\n => 106.215.33.244\n)\n\n => Array\n(\n => 191.101.148.41\n)\n\n => Array\n(\n => 203.90.94.94\n)\n\n => Array\n(\n => 105.129.205.134\n)\n\n => Array\n(\n => 106.215.45.165\n)\n\n => Array\n(\n => 112.196.132.15\n)\n\n => Array\n(\n => 39.59.64.174\n)\n\n => Array\n(\n => 124.253.155.116\n)\n\n => Array\n(\n => 94.179.192.204\n)\n\n => Array\n(\n => 110.38.29.245\n)\n\n => Array\n(\n => 124.29.209.78\n)\n\n => Array\n(\n => 103.75.245.240\n)\n\n => Array\n(\n => 49.36.159.170\n)\n\n => Array\n(\n => 223.190.18.160\n)\n\n => Array\n(\n => 124.253.113.226\n)\n\n => Array\n(\n => 14.180.77.240\n)\n\n => Array\n(\n => 106.215.76.24\n)\n\n => Array\n(\n => 106.210.155.153\n)\n\n => Array\n(\n => 111.119.187.42\n)\n\n => Array\n(\n => 146.196.32.106\n)\n\n => Array\n(\n => 122.162.22.27\n)\n\n => Array\n(\n => 49.145.59.252\n)\n\n => Array\n(\n => 95.47.247.92\n)\n\n => Array\n(\n => 103.99.218.50\n)\n\n => Array\n(\n => 157.37.192.88\n)\n\n => Array\n(\n => 82.102.31.242\n)\n\n => Array\n(\n => 157.46.220.64\n)\n\n => Array\n(\n => 180.151.107.52\n)\n\n => Array\n(\n => 203.81.240.75\n)\n\n => Array\n(\n => 122.167.213.130\n)\n\n => Array\n(\n => 103.227.70.164\n)\n\n => Array\n(\n => 106.215.81.169\n)\n\n => Array\n(\n => 157.46.214.170\n)\n\n => Array\n(\n => 103.69.27.163\n)\n\n => Array\n(\n => 124.253.23.213\n)\n\n => Array\n(\n => 157.37.167.174\n)\n\n => Array\n(\n => 1.39.204.67\n)\n\n => Array\n(\n => 112.196.132.51\n)\n\n => Array\n(\n => 119.152.61.222\n)\n\n => Array\n(\n => 47.31.36.174\n)\n\n => Array\n(\n => 47.31.152.174\n)\n\n => Array\n(\n => 49.34.18.105\n)\n\n => Array\n(\n => 157.37.170.101\n)\n\n => Array\n(\n => 118.209.241.234\n)\n\n => Array\n(\n => 103.67.19.9\n)\n\n => Array\n(\n => 182.189.14.154\n)\n\n => Array\n(\n => 45.127.233.232\n)\n\n => Array\n(\n => 27.96.94.91\n)\n\n => Array\n(\n => 183.83.214.250\n)\n\n => Array\n(\n => 47.31.27.140\n)\n\n => Array\n(\n => 47.31.129.199\n)\n\n => Array\n(\n => 157.44.156.111\n)\n\n => Array\n(\n => 42.110.163.2\n)\n\n => Array\n(\n => 124.253.64.210\n)\n\n => Array\n(\n => 49.36.167.54\n)\n\n => Array\n(\n => 27.63.135.145\n)\n\n => Array\n(\n => 157.35.254.63\n)\n\n => Array\n(\n => 39.45.18.182\n)\n\n => Array\n(\n => 197.210.85.102\n)\n\n => Array\n(\n => 112.196.132.90\n)\n\n => Array\n(\n => 59.152.97.84\n)\n\n => Array\n(\n => 43.242.178.7\n)\n\n => Array\n(\n => 47.31.40.70\n)\n\n => Array\n(\n => 202.134.10.136\n)\n\n => Array\n(\n => 132.154.241.43\n)\n\n => Array\n(\n => 185.209.179.240\n)\n\n => Array\n(\n => 202.47.50.28\n)\n\n => Array\n(\n => 182.186.1.29\n)\n\n => Array\n(\n => 124.253.114.229\n)\n\n => Array\n(\n => 49.32.210.126\n)\n\n => Array\n(\n => 43.242.178.122\n)\n\n => Array\n(\n => 42.111.28.52\n)\n\n => Array\n(\n => 23.227.141.44\n)\n\n => Array\n(\n => 23.227.141.156\n)\n\n => Array\n(\n => 103.253.173.79\n)\n\n => Array\n(\n => 116.75.231.74\n)\n\n => Array\n(\n => 106.76.78.196\n)\n\n => Array\n(\n => 116.75.197.68\n)\n\n => Array\n(\n => 42.108.172.131\n)\n\n => Array\n(\n => 157.38.27.199\n)\n\n => Array\n(\n => 103.70.86.205\n)\n\n => Array\n(\n => 119.152.63.239\n)\n\n => Array\n(\n => 103.233.116.94\n)\n\n => Array\n(\n => 111.119.188.17\n)\n\n => Array\n(\n => 103.196.160.156\n)\n\n => Array\n(\n => 27.97.208.40\n)\n\n => Array\n(\n => 188.163.7.136\n)\n\n => Array\n(\n => 49.15.202.205\n)\n\n => Array\n(\n => 124.253.201.111\n)\n\n => Array\n(\n => 182.190.213.246\n)\n\n => Array\n(\n => 5.154.174.10\n)\n\n => Array\n(\n => 103.21.185.16\n)\n\n => Array\n(\n => 112.196.132.67\n)\n\n => Array\n(\n => 49.15.194.230\n)\n\n => Array\n(\n => 103.118.34.103\n)\n\n => Array\n(\n => 49.15.201.92\n)\n\n => Array\n(\n => 42.111.13.238\n)\n\n => Array\n(\n => 203.192.213.137\n)\n\n => Array\n(\n => 45.115.190.82\n)\n\n => Array\n(\n => 78.26.130.102\n)\n\n => Array\n(\n => 49.15.85.202\n)\n\n => Array\n(\n => 106.76.193.33\n)\n\n => Array\n(\n => 103.70.41.30\n)\n\n => Array\n(\n => 103.82.78.254\n)\n\n => Array\n(\n => 110.38.35.90\n)\n\n => Array\n(\n => 181.214.107.27\n)\n\n => Array\n(\n => 27.110.183.162\n)\n\n => Array\n(\n => 94.225.230.215\n)\n\n => Array\n(\n => 27.97.185.58\n)\n\n => Array\n(\n => 49.146.196.124\n)\n\n => Array\n(\n => 119.157.76.144\n)\n\n => Array\n(\n => 103.99.218.34\n)\n\n => Array\n(\n => 185.32.221.247\n)\n\n => Array\n(\n => 27.97.161.12\n)\n\n => Array\n(\n => 27.62.144.214\n)\n\n => Array\n(\n => 124.253.90.151\n)\n\n => Array\n(\n => 49.36.135.69\n)\n\n => Array\n(\n => 39.40.217.106\n)\n\n => Array\n(\n => 119.152.235.136\n)\n\n => Array\n(\n => 103.91.103.226\n)\n\n => Array\n(\n => 117.222.226.93\n)\n\n => Array\n(\n => 182.190.24.126\n)\n\n => Array\n(\n => 27.97.223.179\n)\n\n => Array\n(\n => 202.137.115.11\n)\n\n => Array\n(\n => 43.242.178.130\n)\n\n => Array\n(\n => 182.189.125.232\n)\n\n => Array\n(\n => 182.190.202.87\n)\n\n => Array\n(\n => 124.253.102.193\n)\n\n => Array\n(\n => 103.75.247.73\n)\n\n => Array\n(\n => 122.177.100.97\n)\n\n => Array\n(\n => 47.31.192.254\n)\n\n => Array\n(\n => 49.149.73.185\n)\n\n => Array\n(\n => 39.57.147.197\n)\n\n => Array\n(\n => 103.110.147.52\n)\n\n => Array\n(\n => 124.253.106.255\n)\n\n => Array\n(\n => 152.57.116.136\n)\n\n => Array\n(\n => 110.38.35.102\n)\n\n => Array\n(\n => 182.18.206.127\n)\n\n => Array\n(\n => 103.133.59.246\n)\n\n => Array\n(\n => 27.97.189.139\n)\n\n => Array\n(\n => 179.61.245.54\n)\n\n => Array\n(\n => 103.240.233.176\n)\n\n => Array\n(\n => 111.88.124.196\n)\n\n => Array\n(\n => 49.146.215.3\n)\n\n => Array\n(\n => 110.39.10.246\n)\n\n => Array\n(\n => 27.5.42.135\n)\n\n => Array\n(\n => 27.97.177.251\n)\n\n => Array\n(\n => 93.177.75.254\n)\n\n => Array\n(\n => 43.242.177.3\n)\n\n => Array\n(\n => 112.196.132.97\n)\n\n => Array\n(\n => 116.75.242.188\n)\n\n => Array\n(\n => 202.8.118.101\n)\n\n => Array\n(\n => 49.36.65.43\n)\n\n => Array\n(\n => 157.37.146.220\n)\n\n => Array\n(\n => 157.37.143.235\n)\n\n => Array\n(\n => 157.38.94.34\n)\n\n => Array\n(\n => 49.36.131.1\n)\n\n => Array\n(\n => 132.154.92.97\n)\n\n => Array\n(\n => 132.154.123.115\n)\n\n => Array\n(\n => 49.15.197.222\n)\n\n => Array\n(\n => 124.253.198.72\n)\n\n => Array\n(\n => 27.97.217.95\n)\n\n => Array\n(\n => 47.31.194.65\n)\n\n => Array\n(\n => 197.156.190.156\n)\n\n => Array\n(\n => 197.156.190.230\n)\n\n => Array\n(\n => 103.62.152.250\n)\n\n => Array\n(\n => 103.152.212.126\n)\n\n => Array\n(\n => 185.233.18.177\n)\n\n => Array\n(\n => 116.75.63.83\n)\n\n => Array\n(\n => 157.38.56.125\n)\n\n => Array\n(\n => 119.157.107.195\n)\n\n => Array\n(\n => 103.87.50.73\n)\n\n => Array\n(\n => 95.142.120.141\n)\n\n => Array\n(\n => 154.13.1.221\n)\n\n => Array\n(\n => 103.147.87.79\n)\n\n => Array\n(\n => 39.53.173.186\n)\n\n => Array\n(\n => 195.114.145.107\n)\n\n => Array\n(\n => 157.33.201.185\n)\n\n => Array\n(\n => 195.85.219.36\n)\n\n => Array\n(\n => 105.161.67.127\n)\n\n => Array\n(\n => 110.225.87.77\n)\n\n => Array\n(\n => 103.95.167.236\n)\n\n => Array\n(\n => 89.187.162.213\n)\n\n => Array\n(\n => 27.255.189.50\n)\n\n => Array\n(\n => 115.96.77.54\n)\n\n => Array\n(\n => 223.182.220.223\n)\n\n => Array\n(\n => 157.47.206.192\n)\n\n => Array\n(\n => 182.186.110.226\n)\n\n => Array\n(\n => 39.53.243.237\n)\n\n => Array\n(\n => 39.40.228.58\n)\n\n => Array\n(\n => 157.38.60.9\n)\n\n => Array\n(\n => 106.198.244.189\n)\n\n => Array\n(\n => 124.253.51.164\n)\n\n => Array\n(\n => 49.147.113.58\n)\n\n => Array\n(\n => 14.231.196.229\n)\n\n => Array\n(\n => 103.81.214.152\n)\n\n => Array\n(\n => 117.222.220.60\n)\n\n => Array\n(\n => 83.142.111.213\n)\n\n => Array\n(\n => 14.224.77.147\n)\n\n => Array\n(\n => 110.235.236.95\n)\n\n => Array\n(\n => 103.26.83.30\n)\n\n => Array\n(\n => 106.206.191.82\n)\n\n => Array\n(\n => 103.49.117.135\n)\n\n => Array\n(\n => 202.47.39.9\n)\n\n => Array\n(\n => 180.178.145.205\n)\n\n => Array\n(\n => 43.251.93.119\n)\n\n => Array\n(\n => 27.6.212.182\n)\n\n => Array\n(\n => 39.42.156.20\n)\n\n => Array\n(\n => 47.31.141.195\n)\n\n => Array\n(\n => 157.37.146.73\n)\n\n => Array\n(\n => 49.15.93.155\n)\n\n => Array\n(\n => 162.210.194.37\n)\n\n => Array\n(\n => 223.188.160.236\n)\n\n => Array\n(\n => 47.9.90.158\n)\n\n => Array\n(\n => 49.15.85.224\n)\n\n => Array\n(\n => 49.15.93.134\n)\n\n => Array\n(\n => 107.179.244.94\n)\n\n => Array\n(\n => 182.190.203.90\n)\n\n => Array\n(\n => 185.192.69.203\n)\n\n => Array\n(\n => 185.17.27.99\n)\n\n => Array\n(\n => 119.160.116.182\n)\n\n => Array\n(\n => 203.99.177.25\n)\n\n => Array\n(\n => 162.228.207.248\n)\n\n => Array\n(\n => 47.31.245.69\n)\n\n => Array\n(\n => 49.15.210.159\n)\n\n => Array\n(\n => 42.111.2.112\n)\n\n => Array\n(\n => 223.186.116.79\n)\n\n => Array\n(\n => 103.225.176.143\n)\n\n => Array\n(\n => 45.115.190.49\n)\n\n => Array\n(\n => 115.42.71.105\n)\n\n => Array\n(\n => 157.51.11.157\n)\n\n => Array\n(\n => 14.175.56.186\n)\n\n => Array\n(\n => 59.153.16.7\n)\n\n => Array\n(\n => 106.202.84.144\n)\n\n => Array\n(\n => 27.6.242.91\n)\n\n => Array\n(\n => 47.11.112.107\n)\n\n => Array\n(\n => 106.207.54.187\n)\n\n => Array\n(\n => 124.253.196.121\n)\n\n => Array\n(\n => 51.79.161.244\n)\n\n => Array\n(\n => 103.41.24.100\n)\n\n => Array\n(\n => 195.66.79.32\n)\n\n => Array\n(\n => 117.196.127.42\n)\n\n => Array\n(\n => 103.75.247.197\n)\n\n => Array\n(\n => 89.187.162.107\n)\n\n => Array\n(\n => 223.238.154.49\n)\n\n => Array\n(\n => 117.223.99.139\n)\n\n => Array\n(\n => 103.87.59.134\n)\n\n => Array\n(\n => 124.253.212.30\n)\n\n => Array\n(\n => 202.47.62.55\n)\n\n => Array\n(\n => 47.31.219.128\n)\n\n => Array\n(\n => 49.14.121.72\n)\n\n => Array\n(\n => 124.253.212.189\n)\n\n => Array\n(\n => 103.244.179.24\n)\n\n => Array\n(\n => 182.190.213.92\n)\n\n => Array\n(\n => 43.242.178.51\n)\n\n => Array\n(\n => 180.92.138.54\n)\n\n => Array\n(\n => 111.119.187.26\n)\n\n => Array\n(\n => 49.156.111.31\n)\n\n => Array\n(\n => 27.63.108.183\n)\n\n => Array\n(\n => 27.58.184.79\n)\n\n => Array\n(\n => 39.40.225.130\n)\n\n => Array\n(\n => 157.38.5.178\n)\n\n => Array\n(\n => 103.112.55.44\n)\n\n => Array\n(\n => 119.160.100.247\n)\n\n => Array\n(\n => 39.53.101.15\n)\n\n => Array\n(\n => 47.31.207.117\n)\n\n => Array\n(\n => 112.196.158.155\n)\n\n => Array\n(\n => 94.204.247.123\n)\n\n => Array\n(\n => 103.118.76.38\n)\n\n => Array\n(\n => 124.29.212.208\n)\n\n => Array\n(\n => 124.253.196.250\n)\n\n => Array\n(\n => 118.70.182.242\n)\n\n => Array\n(\n => 157.38.78.67\n)\n\n => Array\n(\n => 103.99.218.33\n)\n\n => Array\n(\n => 137.59.220.191\n)\n\n => Array\n(\n => 47.31.139.182\n)\n\n => Array\n(\n => 182.179.136.36\n)\n\n => Array\n(\n => 106.203.73.130\n)\n\n => Array\n(\n => 193.29.107.188\n)\n\n => Array\n(\n => 81.96.92.111\n)\n\n => Array\n(\n => 110.93.203.185\n)\n\n => Array\n(\n => 103.163.248.128\n)\n\n => Array\n(\n => 43.229.166.135\n)\n\n => Array\n(\n => 43.230.106.175\n)\n\n => Array\n(\n => 202.47.62.54\n)\n\n => Array\n(\n => 39.37.181.46\n)\n\n => Array\n(\n => 49.15.204.204\n)\n\n => Array\n(\n => 122.163.237.110\n)\n\n => Array\n(\n => 45.249.8.92\n)\n\n => Array\n(\n => 27.34.50.159\n)\n\n => Array\n(\n => 39.42.171.27\n)\n\n => Array\n(\n => 124.253.101.195\n)\n\n => Array\n(\n => 188.166.145.20\n)\n\n => Array\n(\n => 103.83.145.220\n)\n\n => Array\n(\n => 39.40.96.137\n)\n\n => Array\n(\n => 157.37.185.196\n)\n\n => Array\n(\n => 103.115.124.32\n)\n\n => Array\n(\n => 72.255.48.85\n)\n\n => Array\n(\n => 124.253.74.46\n)\n\n => Array\n(\n => 60.243.225.5\n)\n\n => Array\n(\n => 103.58.152.194\n)\n\n => Array\n(\n => 14.248.71.63\n)\n\n => Array\n(\n => 152.57.214.137\n)\n\n => Array\n(\n => 103.166.58.14\n)\n\n => Array\n(\n => 14.248.71.103\n)\n\n => Array\n(\n => 49.156.103.124\n)\n\n => Array\n(\n => 103.99.218.56\n)\n\n => Array\n(\n => 27.97.177.246\n)\n\n => Array\n(\n => 152.57.94.84\n)\n\n => Array\n(\n => 111.119.187.60\n)\n\n => Array\n(\n => 119.160.99.11\n)\n\n => Array\n(\n => 117.203.11.220\n)\n\n => Array\n(\n => 114.31.131.67\n)\n\n => Array\n(\n => 47.31.253.95\n)\n\n => Array\n(\n => 83.139.184.178\n)\n\n => Array\n(\n => 125.57.9.72\n)\n\n => Array\n(\n => 185.233.16.53\n)\n\n => Array\n(\n => 49.36.180.197\n)\n\n => Array\n(\n => 95.142.119.27\n)\n\n => Array\n(\n => 223.225.70.77\n)\n\n => Array\n(\n => 47.15.222.200\n)\n\n => Array\n(\n => 47.15.218.231\n)\n\n => Array\n(\n => 111.119.187.34\n)\n\n => Array\n(\n => 157.37.198.81\n)\n\n => Array\n(\n => 43.242.177.92\n)\n\n => Array\n(\n => 122.161.68.214\n)\n\n => Array\n(\n => 47.31.145.92\n)\n\n => Array\n(\n => 27.7.196.201\n)\n\n => Array\n(\n => 39.42.172.183\n)\n\n => Array\n(\n => 49.15.129.162\n)\n\n => Array\n(\n => 49.15.206.110\n)\n\n => Array\n(\n => 39.57.141.45\n)\n\n => Array\n(\n => 171.229.175.90\n)\n\n => Array\n(\n => 119.160.68.200\n)\n\n => Array\n(\n => 193.176.84.214\n)\n\n => Array\n(\n => 43.242.177.77\n)\n\n => Array\n(\n => 137.59.220.95\n)\n\n => Array\n(\n => 122.177.118.209\n)\n\n => Array\n(\n => 103.92.214.27\n)\n\n => Array\n(\n => 178.62.10.228\n)\n\n => Array\n(\n => 103.81.214.91\n)\n\n => Array\n(\n => 156.146.33.68\n)\n\n => Array\n(\n => 42.118.116.60\n)\n\n => Array\n(\n => 183.87.122.190\n)\n\n => Array\n(\n => 157.37.159.162\n)\n\n => Array\n(\n => 59.153.16.9\n)\n\n => Array\n(\n => 223.185.43.241\n)\n\n => Array\n(\n => 103.81.214.153\n)\n\n => Array\n(\n => 47.31.143.169\n)\n\n => Array\n(\n => 112.196.158.250\n)\n\n => Array\n(\n => 156.146.36.110\n)\n\n => Array\n(\n => 27.255.34.80\n)\n\n => Array\n(\n => 49.205.77.19\n)\n\n => Array\n(\n => 95.142.120.20\n)\n\n => Array\n(\n => 171.49.195.53\n)\n\n => Array\n(\n => 39.37.152.132\n)\n\n => Array\n(\n => 103.121.204.237\n)\n\n => Array\n(\n => 43.242.176.153\n)\n\n => Array\n(\n => 43.242.176.120\n)\n\n => Array\n(\n => 122.161.66.120\n)\n\n => Array\n(\n => 182.70.140.223\n)\n\n => Array\n(\n => 103.201.135.226\n)\n\n => Array\n(\n => 202.47.44.135\n)\n\n => Array\n(\n => 182.179.172.27\n)\n\n => Array\n(\n => 185.22.173.86\n)\n\n => Array\n(\n => 67.205.148.219\n)\n\n => Array\n(\n => 27.58.183.140\n)\n\n => Array\n(\n => 39.42.118.163\n)\n\n => Array\n(\n => 117.5.204.59\n)\n\n => Array\n(\n => 223.182.193.163\n)\n\n => Array\n(\n => 157.37.184.33\n)\n\n => Array\n(\n => 110.37.218.92\n)\n\n => Array\n(\n => 106.215.8.67\n)\n\n => Array\n(\n => 39.42.94.179\n)\n\n => Array\n(\n => 106.51.25.124\n)\n\n => Array\n(\n => 157.42.25.212\n)\n\n => Array\n(\n => 43.247.40.170\n)\n\n => Array\n(\n => 101.50.108.111\n)\n\n => Array\n(\n => 117.102.48.152\n)\n\n => Array\n(\n => 95.142.120.48\n)\n\n => Array\n(\n => 183.81.121.160\n)\n\n => Array\n(\n => 42.111.21.195\n)\n\n => Array\n(\n => 50.7.142.180\n)\n\n => Array\n(\n => 223.130.28.33\n)\n\n => Array\n(\n => 107.161.86.141\n)\n\n => Array\n(\n => 117.203.249.159\n)\n\n => Array\n(\n => 110.225.192.64\n)\n\n => Array\n(\n => 157.37.152.168\n)\n\n => Array\n(\n => 110.39.2.202\n)\n\n => Array\n(\n => 23.106.56.52\n)\n\n => Array\n(\n => 59.150.87.85\n)\n\n => Array\n(\n => 122.162.175.128\n)\n\n => Array\n(\n => 39.40.63.182\n)\n\n => Array\n(\n => 182.190.108.76\n)\n\n => Array\n(\n => 49.36.44.216\n)\n\n => Array\n(\n => 73.105.5.185\n)\n\n => Array\n(\n => 157.33.67.204\n)\n\n => Array\n(\n => 157.37.164.171\n)\n\n => Array\n(\n => 192.119.160.21\n)\n\n => Array\n(\n => 156.146.59.29\n)\n\n => Array\n(\n => 182.190.97.213\n)\n\n => Array\n(\n => 39.53.196.168\n)\n\n => Array\n(\n => 112.196.132.93\n)\n\n => Array\n(\n => 182.189.7.18\n)\n\n => Array\n(\n => 101.53.232.117\n)\n\n => Array\n(\n => 43.242.178.105\n)\n\n => Array\n(\n => 49.145.233.44\n)\n\n => Array\n(\n => 5.107.214.18\n)\n\n => Array\n(\n => 139.5.242.124\n)\n\n => Array\n(\n => 47.29.244.80\n)\n\n => Array\n(\n => 43.242.178.180\n)\n\n => Array\n(\n => 194.110.84.171\n)\n\n => Array\n(\n => 103.68.217.99\n)\n\n => Array\n(\n => 182.182.27.59\n)\n\n => Array\n(\n => 119.152.139.146\n)\n\n => Array\n(\n => 39.37.131.1\n)\n\n => Array\n(\n => 106.210.99.47\n)\n\n => Array\n(\n => 103.225.176.68\n)\n\n => Array\n(\n => 42.111.23.67\n)\n\n => Array\n(\n => 223.225.37.57\n)\n\n => Array\n(\n => 114.79.1.247\n)\n\n => Array\n(\n => 157.42.28.39\n)\n\n => Array\n(\n => 47.15.13.68\n)\n\n => Array\n(\n => 223.230.151.59\n)\n\n => Array\n(\n => 115.186.7.112\n)\n\n => Array\n(\n => 111.92.78.33\n)\n\n => Array\n(\n => 119.160.117.249\n)\n\n => Array\n(\n => 103.150.209.45\n)\n\n => Array\n(\n => 182.189.22.170\n)\n\n => Array\n(\n => 49.144.108.82\n)\n\n => Array\n(\n => 39.49.75.65\n)\n\n => Array\n(\n => 39.52.205.223\n)\n\n => Array\n(\n => 49.48.247.53\n)\n\n => Array\n(\n => 5.149.250.222\n)\n\n => Array\n(\n => 47.15.187.153\n)\n\n => Array\n(\n => 103.70.86.101\n)\n\n => Array\n(\n => 112.196.158.138\n)\n\n => Array\n(\n => 156.241.242.139\n)\n\n => Array\n(\n => 157.33.205.213\n)\n\n => Array\n(\n => 39.53.206.247\n)\n\n => Array\n(\n => 157.45.83.132\n)\n\n => Array\n(\n => 49.36.220.138\n)\n\n => Array\n(\n => 202.47.47.118\n)\n\n => Array\n(\n => 182.185.233.224\n)\n\n => Array\n(\n => 182.189.30.99\n)\n\n => Array\n(\n => 223.233.68.178\n)\n\n => Array\n(\n => 161.35.139.87\n)\n\n => Array\n(\n => 121.46.65.124\n)\n\n => Array\n(\n => 5.195.154.87\n)\n\n => Array\n(\n => 103.46.236.71\n)\n\n => Array\n(\n => 195.114.147.119\n)\n\n => Array\n(\n => 195.85.219.35\n)\n\n => Array\n(\n => 111.119.183.34\n)\n\n => Array\n(\n => 39.34.158.41\n)\n\n => Array\n(\n => 180.178.148.13\n)\n\n => Array\n(\n => 122.161.66.166\n)\n\n => Array\n(\n => 185.233.18.1\n)\n\n => Array\n(\n => 146.196.34.119\n)\n\n => Array\n(\n => 27.6.253.159\n)\n\n => Array\n(\n => 198.8.92.156\n)\n\n => Array\n(\n => 106.206.179.160\n)\n\n => Array\n(\n => 202.164.133.53\n)\n\n => Array\n(\n => 112.196.141.214\n)\n\n => Array\n(\n => 95.135.15.148\n)\n\n => Array\n(\n => 111.92.119.165\n)\n\n => Array\n(\n => 84.17.34.18\n)\n\n => Array\n(\n => 49.36.232.117\n)\n\n => Array\n(\n => 122.180.235.92\n)\n\n => Array\n(\n => 89.187.163.177\n)\n\n => Array\n(\n => 103.217.238.38\n)\n\n => Array\n(\n => 103.163.248.115\n)\n\n => Array\n(\n => 156.146.59.10\n)\n\n => Array\n(\n => 223.233.68.183\n)\n\n => Array\n(\n => 103.12.198.92\n)\n\n => Array\n(\n => 42.111.9.221\n)\n\n => Array\n(\n => 111.92.77.242\n)\n\n => Array\n(\n => 192.142.128.26\n)\n\n => Array\n(\n => 182.69.195.139\n)\n\n => Array\n(\n => 103.209.83.110\n)\n\n => Array\n(\n => 207.244.71.80\n)\n\n => Array\n(\n => 41.140.106.29\n)\n\n => Array\n(\n => 45.118.167.65\n)\n\n => Array\n(\n => 45.118.167.70\n)\n\n => Array\n(\n => 157.37.159.180\n)\n\n => Array\n(\n => 103.217.178.194\n)\n\n => Array\n(\n => 27.255.165.94\n)\n\n => Array\n(\n => 45.133.7.42\n)\n\n => Array\n(\n => 43.230.65.168\n)\n\n => Array\n(\n => 39.53.196.221\n)\n\n => Array\n(\n => 42.111.17.83\n)\n\n => Array\n(\n => 110.39.12.34\n)\n\n => Array\n(\n => 45.118.158.169\n)\n\n => Array\n(\n => 202.142.110.165\n)\n\n => Array\n(\n => 106.201.13.212\n)\n\n => Array\n(\n => 103.211.14.94\n)\n\n => Array\n(\n => 160.202.37.105\n)\n\n => Array\n(\n => 103.99.199.34\n)\n\n => Array\n(\n => 183.83.45.104\n)\n\n => Array\n(\n => 49.36.233.107\n)\n\n => Array\n(\n => 182.68.21.51\n)\n\n => Array\n(\n => 110.227.93.182\n)\n\n => Array\n(\n => 180.178.144.251\n)\n\n => Array\n(\n => 129.0.102.0\n)\n\n => Array\n(\n => 124.253.105.176\n)\n\n => Array\n(\n => 105.156.139.225\n)\n\n => Array\n(\n => 208.117.87.154\n)\n\n => Array\n(\n => 138.68.185.17\n)\n\n => Array\n(\n => 43.247.41.207\n)\n\n => Array\n(\n => 49.156.106.105\n)\n\n => Array\n(\n => 223.238.197.124\n)\n\n => Array\n(\n => 202.47.39.96\n)\n\n => Array\n(\n => 223.226.131.80\n)\n\n => Array\n(\n => 122.161.48.139\n)\n\n => Array\n(\n => 106.201.144.12\n)\n\n => Array\n(\n => 122.178.223.244\n)\n\n => Array\n(\n => 195.181.164.65\n)\n\n => Array\n(\n => 106.195.12.187\n)\n\n => Array\n(\n => 124.253.48.48\n)\n\n => Array\n(\n => 103.140.30.214\n)\n\n => Array\n(\n => 180.178.147.132\n)\n\n => Array\n(\n => 138.197.139.130\n)\n\n => Array\n(\n => 5.254.2.138\n)\n\n => Array\n(\n => 183.81.93.25\n)\n\n => Array\n(\n => 182.70.39.254\n)\n\n => Array\n(\n => 106.223.87.131\n)\n\n => Array\n(\n => 106.203.91.114\n)\n\n => Array\n(\n => 196.70.137.128\n)\n\n => Array\n(\n => 150.242.62.167\n)\n\n => Array\n(\n => 184.170.243.198\n)\n\n => Array\n(\n => 59.89.30.66\n)\n\n => Array\n(\n => 49.156.112.201\n)\n\n => Array\n(\n => 124.29.212.168\n)\n\n => Array\n(\n => 103.204.170.238\n)\n\n => Array\n(\n => 124.253.116.81\n)\n\n => Array\n(\n => 41.248.102.107\n)\n\n => Array\n(\n => 119.160.100.51\n)\n\n => Array\n(\n => 5.254.40.91\n)\n\n => Array\n(\n => 103.149.154.25\n)\n\n => Array\n(\n => 103.70.41.28\n)\n\n => Array\n(\n => 103.151.234.42\n)\n\n => Array\n(\n => 39.37.142.107\n)\n\n => Array\n(\n => 27.255.186.115\n)\n\n => Array\n(\n => 49.15.193.151\n)\n\n => Array\n(\n => 103.201.146.115\n)\n\n => Array\n(\n => 223.228.177.70\n)\n\n => Array\n(\n => 182.179.141.37\n)\n\n => Array\n(\n => 110.172.131.126\n)\n\n => Array\n(\n => 45.116.232.0\n)\n\n => Array\n(\n => 193.37.32.206\n)\n\n => Array\n(\n => 119.152.62.246\n)\n\n => Array\n(\n => 180.178.148.228\n)\n\n => Array\n(\n => 195.114.145.120\n)\n\n => Array\n(\n => 122.160.49.194\n)\n\n => Array\n(\n => 103.240.237.17\n)\n\n => Array\n(\n => 103.75.245.238\n)\n\n => Array\n(\n => 124.253.215.148\n)\n\n => Array\n(\n => 45.118.165.146\n)\n\n => Array\n(\n => 103.75.244.111\n)\n\n => Array\n(\n => 223.185.7.42\n)\n\n => Array\n(\n => 139.5.240.165\n)\n\n => Array\n(\n => 45.251.117.204\n)\n\n => Array\n(\n => 132.154.71.227\n)\n\n => Array\n(\n => 178.92.100.97\n)\n\n => Array\n(\n => 49.48.248.42\n)\n\n => Array\n(\n => 182.190.109.252\n)\n\n => Array\n(\n => 43.231.57.209\n)\n\n => Array\n(\n => 39.37.185.133\n)\n\n => Array\n(\n => 123.17.79.174\n)\n\n => Array\n(\n => 180.178.146.215\n)\n\n => Array\n(\n => 41.248.83.40\n)\n\n => Array\n(\n => 103.255.4.79\n)\n\n => Array\n(\n => 103.39.119.233\n)\n\n => Array\n(\n => 85.203.44.24\n)\n\n => Array\n(\n => 93.74.18.246\n)\n\n => Array\n(\n => 95.142.120.51\n)\n\n => Array\n(\n => 202.47.42.57\n)\n\n => Array\n(\n => 41.202.219.253\n)\n\n => Array\n(\n => 154.28.188.182\n)\n\n => Array\n(\n => 14.163.178.106\n)\n\n => Array\n(\n => 118.185.57.226\n)\n\n => Array\n(\n => 49.15.141.102\n)\n\n => Array\n(\n => 182.189.86.47\n)\n\n => Array\n(\n => 111.88.68.79\n)\n\n => Array\n(\n => 156.146.59.8\n)\n\n => Array\n(\n => 119.152.62.82\n)\n\n => Array\n(\n => 49.207.128.103\n)\n\n => Array\n(\n => 203.212.30.234\n)\n\n => Array\n(\n => 41.202.219.254\n)\n\n => Array\n(\n => 103.46.203.10\n)\n\n => Array\n(\n => 112.79.141.15\n)\n\n => Array\n(\n => 103.68.218.75\n)\n\n => Array\n(\n => 49.35.130.14\n)\n\n => Array\n(\n => 172.247.129.90\n)\n\n => Array\n(\n => 116.90.74.214\n)\n\n => Array\n(\n => 180.178.142.242\n)\n\n => Array\n(\n => 111.119.183.59\n)\n\n => Array\n(\n => 117.5.103.189\n)\n\n => Array\n(\n => 203.110.93.146\n)\n\n => Array\n(\n => 188.163.97.86\n)\n\n => Array\n(\n => 124.253.90.47\n)\n\n => Array\n(\n => 139.167.249.160\n)\n\n => Array\n(\n => 103.226.206.55\n)\n\n => Array\n(\n => 154.28.188.191\n)\n\n => Array\n(\n => 182.190.197.205\n)\n\n => Array\n(\n => 111.119.183.33\n)\n\n => Array\n(\n => 14.253.254.64\n)\n\n => Array\n(\n => 117.237.197.246\n)\n\n => Array\n(\n => 172.105.53.82\n)\n\n => Array\n(\n => 124.253.207.164\n)\n\n => Array\n(\n => 103.255.4.33\n)\n\n => Array\n(\n => 27.63.131.206\n)\n\n => Array\n(\n => 103.118.170.99\n)\n\n => Array\n(\n => 111.119.183.55\n)\n\n => Array\n(\n => 14.182.101.109\n)\n\n => Array\n(\n => 175.107.223.199\n)\n\n => Array\n(\n => 39.57.168.94\n)\n\n => Array\n(\n => 122.182.213.139\n)\n\n => Array\n(\n => 112.79.214.237\n)\n\n => Array\n(\n => 27.6.252.22\n)\n\n => Array\n(\n => 89.163.212.83\n)\n\n => Array\n(\n => 182.189.23.1\n)\n\n => Array\n(\n => 49.15.222.253\n)\n\n => Array\n(\n => 125.63.97.110\n)\n\n => Array\n(\n => 223.233.65.159\n)\n\n => Array\n(\n => 139.99.159.18\n)\n\n => Array\n(\n => 45.118.165.137\n)\n\n => Array\n(\n => 39.52.2.167\n)\n\n => Array\n(\n => 39.57.141.24\n)\n\n => Array\n(\n => 27.5.32.145\n)\n\n => Array\n(\n => 49.36.212.33\n)\n\n => Array\n(\n => 157.33.218.32\n)\n\n => Array\n(\n => 116.71.4.122\n)\n\n => Array\n(\n => 110.93.244.176\n)\n\n => Array\n(\n => 154.73.203.156\n)\n\n => Array\n(\n => 136.158.30.235\n)\n\n => Array\n(\n => 122.161.53.72\n)\n\n => Array\n(\n => 106.203.203.156\n)\n\n => Array\n(\n => 45.133.7.22\n)\n\n => Array\n(\n => 27.255.180.69\n)\n\n => Array\n(\n => 94.46.244.3\n)\n\n => Array\n(\n => 43.242.178.157\n)\n\n => Array\n(\n => 171.79.189.215\n)\n\n => Array\n(\n => 37.117.141.89\n)\n\n => Array\n(\n => 196.92.32.64\n)\n\n => Array\n(\n => 154.73.203.157\n)\n\n => Array\n(\n => 183.83.176.14\n)\n\n => Array\n(\n => 106.215.84.145\n)\n\n => Array\n(\n => 95.142.120.12\n)\n\n => Array\n(\n => 190.232.110.94\n)\n\n => Array\n(\n => 179.6.194.47\n)\n\n => Array\n(\n => 103.62.155.172\n)\n\n => Array\n(\n => 39.34.156.177\n)\n\n => Array\n(\n => 122.161.49.120\n)\n\n => Array\n(\n => 103.58.155.253\n)\n\n => Array\n(\n => 175.107.226.20\n)\n\n => Array\n(\n => 206.81.28.165\n)\n\n => Array\n(\n => 49.36.216.36\n)\n\n => Array\n(\n => 104.223.95.178\n)\n\n => Array\n(\n => 122.177.69.35\n)\n\n => Array\n(\n => 39.57.163.107\n)\n\n => Array\n(\n => 122.161.53.35\n)\n\n => Array\n(\n => 182.190.102.13\n)\n\n => Array\n(\n => 122.161.68.95\n)\n\n => Array\n(\n => 154.73.203.147\n)\n\n => Array\n(\n => 122.173.125.2\n)\n\n => Array\n(\n => 117.96.140.189\n)\n\n => Array\n(\n => 106.200.244.10\n)\n\n => Array\n(\n => 110.36.202.5\n)\n\n => Array\n(\n => 124.253.51.144\n)\n\n => Array\n(\n => 176.100.1.145\n)\n\n => Array\n(\n => 156.146.59.20\n)\n\n => Array\n(\n => 122.176.100.151\n)\n\n => Array\n(\n => 185.217.117.237\n)\n\n => Array\n(\n => 49.37.223.97\n)\n\n => Array\n(\n => 101.50.108.80\n)\n\n => Array\n(\n => 124.253.155.88\n)\n\n => Array\n(\n => 39.40.208.96\n)\n\n => Array\n(\n => 122.167.151.154\n)\n\n => Array\n(\n => 172.98.89.13\n)\n\n => Array\n(\n => 103.91.52.6\n)\n\n => Array\n(\n => 106.203.84.5\n)\n\n => Array\n(\n => 117.216.221.34\n)\n\n => Array\n(\n => 154.73.203.131\n)\n\n => Array\n(\n => 223.182.210.117\n)\n\n => Array\n(\n => 49.36.185.208\n)\n\n => Array\n(\n => 111.119.183.30\n)\n\n => Array\n(\n => 39.42.107.13\n)\n\n => Array\n(\n => 39.40.15.174\n)\n\n => Array\n(\n => 1.38.244.65\n)\n\n => Array\n(\n => 49.156.75.252\n)\n\n => Array\n(\n => 122.161.51.99\n)\n\n => Array\n(\n => 27.73.78.57\n)\n\n => Array\n(\n => 49.48.228.70\n)\n\n => Array\n(\n => 111.119.183.18\n)\n\n => Array\n(\n => 116.204.252.218\n)\n\n => Array\n(\n => 73.173.40.248\n)\n\n => Array\n(\n => 223.130.28.81\n)\n\n => Array\n(\n => 202.83.58.81\n)\n\n => Array\n(\n => 45.116.233.31\n)\n\n => Array\n(\n => 111.119.183.1\n)\n\n => Array\n(\n => 45.133.7.66\n)\n\n => Array\n(\n => 39.48.204.174\n)\n\n => Array\n(\n => 37.19.213.30\n)\n\n => Array\n(\n => 111.119.183.22\n)\n\n => Array\n(\n => 122.177.74.19\n)\n\n => Array\n(\n => 124.253.80.59\n)\n\n => Array\n(\n => 111.119.183.60\n)\n\n => Array\n(\n => 157.39.106.191\n)\n\n => Array\n(\n => 157.47.86.121\n)\n\n => Array\n(\n => 47.31.159.100\n)\n\n => Array\n(\n => 106.214.85.144\n)\n\n => Array\n(\n => 182.189.22.197\n)\n\n => Array\n(\n => 111.119.183.51\n)\n\n => Array\n(\n => 202.47.35.57\n)\n\n => Array\n(\n => 42.108.33.220\n)\n\n => Array\n(\n => 180.178.146.158\n)\n\n => Array\n(\n => 124.253.184.239\n)\n\n => Array\n(\n => 103.165.20.8\n)\n\n => Array\n(\n => 94.178.239.156\n)\n\n => Array\n(\n => 72.255.41.142\n)\n\n => Array\n(\n => 116.90.107.102\n)\n\n => Array\n(\n => 39.36.164.250\n)\n\n => Array\n(\n => 124.253.195.172\n)\n\n => Array\n(\n => 203.142.218.149\n)\n\n => Array\n(\n => 157.43.165.180\n)\n\n => Array\n(\n => 39.40.242.57\n)\n\n => Array\n(\n => 103.92.43.150\n)\n\n => Array\n(\n => 39.42.133.202\n)\n\n => Array\n(\n => 119.160.66.11\n)\n\n => Array\n(\n => 138.68.3.7\n)\n\n => Array\n(\n => 210.56.125.226\n)\n\n => Array\n(\n => 157.50.4.249\n)\n\n => Array\n(\n => 124.253.81.162\n)\n\n => Array\n(\n => 103.240.235.141\n)\n\n => Array\n(\n => 132.154.128.20\n)\n\n => Array\n(\n => 49.156.115.37\n)\n\n => Array\n(\n => 45.133.7.48\n)\n\n => Array\n(\n => 122.161.49.137\n)\n\n => Array\n(\n => 202.47.46.31\n)\n\n => Array\n(\n => 192.140.145.148\n)\n\n => Array\n(\n => 202.14.123.10\n)\n\n => Array\n(\n => 122.161.53.98\n)\n\n => Array\n(\n => 124.253.114.113\n)\n\n => Array\n(\n => 103.227.70.34\n)\n\n => Array\n(\n => 223.228.175.227\n)\n\n => Array\n(\n => 157.39.119.110\n)\n\n => Array\n(\n => 180.188.224.231\n)\n\n => Array\n(\n => 132.154.188.85\n)\n\n => Array\n(\n => 197.210.227.207\n)\n\n => Array\n(\n => 103.217.123.177\n)\n\n => Array\n(\n => 124.253.85.31\n)\n\n => Array\n(\n => 123.201.105.97\n)\n\n => Array\n(\n => 39.57.190.37\n)\n\n => Array\n(\n => 202.63.205.248\n)\n\n => Array\n(\n => 122.161.51.100\n)\n\n => Array\n(\n => 39.37.163.97\n)\n\n => Array\n(\n => 43.231.57.173\n)\n\n => Array\n(\n => 223.225.135.169\n)\n\n => Array\n(\n => 119.160.71.136\n)\n\n => Array\n(\n => 122.165.114.93\n)\n\n => Array\n(\n => 47.11.77.102\n)\n\n => Array\n(\n => 49.149.107.198\n)\n\n => Array\n(\n => 192.111.134.206\n)\n\n => Array\n(\n => 182.64.102.43\n)\n\n => Array\n(\n => 124.253.184.111\n)\n\n => Array\n(\n => 171.237.97.228\n)\n\n => Array\n(\n => 117.237.237.101\n)\n\n => Array\n(\n => 49.36.33.19\n)\n\n => Array\n(\n => 103.31.101.241\n)\n\n => Array\n(\n => 129.0.207.203\n)\n\n => Array\n(\n => 157.39.122.155\n)\n\n => Array\n(\n => 197.210.85.120\n)\n\n => Array\n(\n => 124.253.219.201\n)\n\n => Array\n(\n => 152.57.75.92\n)\n\n => Array\n(\n => 169.149.195.121\n)\n\n => Array\n(\n => 198.16.76.27\n)\n\n => Array\n(\n => 157.43.192.188\n)\n\n => Array\n(\n => 119.155.244.221\n)\n\n => Array\n(\n => 39.51.242.216\n)\n\n => Array\n(\n => 39.57.180.158\n)\n\n => Array\n(\n => 134.202.32.5\n)\n\n => Array\n(\n => 122.176.139.205\n)\n\n => Array\n(\n => 151.243.50.9\n)\n\n => Array\n(\n => 39.52.99.161\n)\n\n => Array\n(\n => 136.144.33.95\n)\n\n => Array\n(\n => 157.37.205.216\n)\n\n => Array\n(\n => 217.138.220.134\n)\n\n => Array\n(\n => 41.140.106.65\n)\n\n => Array\n(\n => 39.37.253.126\n)\n\n => Array\n(\n => 103.243.44.240\n)\n\n => Array\n(\n => 157.46.169.29\n)\n\n => Array\n(\n => 92.119.177.122\n)\n\n => Array\n(\n => 196.240.60.21\n)\n\n => Array\n(\n => 122.161.6.246\n)\n\n => Array\n(\n => 117.202.162.46\n)\n\n => Array\n(\n => 205.164.137.120\n)\n\n => Array\n(\n => 171.237.79.241\n)\n\n => Array\n(\n => 198.16.76.28\n)\n\n => Array\n(\n => 103.100.4.151\n)\n\n => Array\n(\n => 178.239.162.236\n)\n\n => Array\n(\n => 106.197.31.240\n)\n\n => Array\n(\n => 122.168.179.251\n)\n\n => Array\n(\n => 39.37.167.126\n)\n\n => Array\n(\n => 171.48.8.115\n)\n\n => Array\n(\n => 157.44.152.14\n)\n\n => Array\n(\n => 103.77.43.219\n)\n\n => Array\n(\n => 122.161.49.38\n)\n\n => Array\n(\n => 122.161.52.83\n)\n\n => Array\n(\n => 122.173.108.210\n)\n\n => Array\n(\n => 60.254.109.92\n)\n\n => Array\n(\n => 103.57.85.75\n)\n\n => Array\n(\n => 106.0.58.36\n)\n\n => Array\n(\n => 122.161.49.212\n)\n\n => Array\n(\n => 27.255.182.159\n)\n\n => Array\n(\n => 116.75.230.159\n)\n\n => Array\n(\n => 122.173.152.133\n)\n\n => Array\n(\n => 129.0.79.247\n)\n\n => Array\n(\n => 223.228.163.44\n)\n\n => Array\n(\n => 103.168.78.82\n)\n\n => Array\n(\n => 39.59.67.124\n)\n\n => Array\n(\n => 182.69.19.120\n)\n\n => Array\n(\n => 196.202.236.195\n)\n\n => Array\n(\n => 137.59.225.206\n)\n\n => Array\n(\n => 143.110.209.194\n)\n\n => Array\n(\n => 117.201.233.91\n)\n\n => Array\n(\n => 37.120.150.107\n)\n\n => Array\n(\n => 58.65.222.10\n)\n\n => Array\n(\n => 202.47.43.86\n)\n\n => Array\n(\n => 106.206.223.234\n)\n\n => Array\n(\n => 5.195.153.158\n)\n\n => Array\n(\n => 223.227.127.243\n)\n\n => Array\n(\n => 103.165.12.222\n)\n\n => Array\n(\n => 49.36.185.189\n)\n\n => Array\n(\n => 59.96.92.57\n)\n\n => Array\n(\n => 203.194.104.235\n)\n\n => Array\n(\n => 122.177.72.33\n)\n\n => Array\n(\n => 106.213.126.40\n)\n\n => Array\n(\n => 45.127.232.69\n)\n\n => Array\n(\n => 156.146.59.39\n)\n\n => Array\n(\n => 103.21.184.11\n)\n\n => Array\n(\n => 106.212.47.59\n)\n\n => Array\n(\n => 182.179.137.235\n)\n\n => Array\n(\n => 49.36.178.154\n)\n\n => Array\n(\n => 171.48.7.128\n)\n\n => Array\n(\n => 119.160.57.96\n)\n\n => Array\n(\n => 197.210.79.92\n)\n\n => Array\n(\n => 36.255.45.87\n)\n\n => Array\n(\n => 47.31.219.47\n)\n\n => Array\n(\n => 122.161.51.160\n)\n\n => Array\n(\n => 103.217.123.129\n)\n\n => Array\n(\n => 59.153.16.12\n)\n\n => Array\n(\n => 103.92.43.226\n)\n\n => Array\n(\n => 47.31.139.139\n)\n\n => Array\n(\n => 210.2.140.18\n)\n\n => Array\n(\n => 106.210.33.219\n)\n\n => Array\n(\n => 175.107.203.34\n)\n\n => Array\n(\n => 146.196.32.144\n)\n\n => Array\n(\n => 103.12.133.121\n)\n\n => Array\n(\n => 103.59.208.182\n)\n\n => Array\n(\n => 157.37.190.232\n)\n\n => Array\n(\n => 106.195.35.201\n)\n\n => Array\n(\n => 27.122.14.83\n)\n\n => Array\n(\n => 194.193.44.5\n)\n\n => Array\n(\n => 5.62.43.245\n)\n\n => Array\n(\n => 103.53.80.50\n)\n\n => Array\n(\n => 47.29.142.233\n)\n\n => Array\n(\n => 154.6.20.63\n)\n\n => Array\n(\n => 173.245.203.128\n)\n\n => Array\n(\n => 103.77.43.231\n)\n\n => Array\n(\n => 5.107.166.235\n)\n\n => Array\n(\n => 106.212.44.123\n)\n\n => Array\n(\n => 157.41.60.93\n)\n\n => Array\n(\n => 27.58.179.79\n)\n\n => Array\n(\n => 157.37.167.144\n)\n\n => Array\n(\n => 119.160.57.115\n)\n\n => Array\n(\n => 122.161.53.224\n)\n\n => Array\n(\n => 49.36.233.51\n)\n\n => Array\n(\n => 101.0.32.8\n)\n\n => Array\n(\n => 119.160.103.158\n)\n\n => Array\n(\n => 122.177.79.115\n)\n\n => Array\n(\n => 107.181.166.27\n)\n\n => Array\n(\n => 183.6.0.125\n)\n\n => Array\n(\n => 49.36.186.0\n)\n\n => Array\n(\n => 202.181.5.4\n)\n\n => Array\n(\n => 45.118.165.144\n)\n\n => Array\n(\n => 171.96.157.133\n)\n\n => Array\n(\n => 222.252.51.163\n)\n\n => Array\n(\n => 103.81.215.162\n)\n\n => Array\n(\n => 110.225.93.208\n)\n\n => Array\n(\n => 122.161.48.200\n)\n\n => Array\n(\n => 119.63.138.173\n)\n\n => Array\n(\n => 202.83.58.208\n)\n\n => Array\n(\n => 122.161.53.101\n)\n\n => Array\n(\n => 137.97.95.21\n)\n\n => Array\n(\n => 112.204.167.123\n)\n\n => Array\n(\n => 122.180.21.151\n)\n\n => Array\n(\n => 103.120.44.108\n)\n\n => Array\n(\n => 49.37.220.174\n)\n\n => Array\n(\n => 1.55.255.124\n)\n\n => Array\n(\n => 23.227.140.173\n)\n\n => Array\n(\n => 43.248.153.110\n)\n\n => Array\n(\n => 106.214.93.101\n)\n\n)\n```\nHealth Insurance: Firefly's Personal Finance Blog\n Layout: Blue and Brown (Default) Author's Creation\n Home > Health Insurance\n\n# Health Insurance\n\nOctober 31st, 2010 at 01:35 am\n\nI do plan on switching health insurance plans to a plan with an HSA. I'll contribute another \\$10 or \\$20 per pay period in addition to the \\$750 that the insurance plan will contribute for the year. I won't contribute to the FSA this year. I think the HSA has many advantages over the FSA including that it rolls over every year. So it's a source of income for medical expenses not just now, but also in retirement when I may need it even more.\n\n### 2 Responses to “Health Insurance”\n\n1. dmontngrey Says:\n\nI'm making the switch next year as well. I think this is the best option for me right now. I'm gambling on not needing to visit the doctor next year. I have not gone at all this year. It'll cost me a little more per week, but the opportunity to contribute to the HSA far outweighs any extra cost.\n\n2. Jerry Says:\n\nThe mere fact that an HSA rolls over each year makes it a more attractive insurance option, to be sure! I HATE feeling like I absolutely must make a purchase at the end of the year, whether I need the stuff or not. This should lead to a better situation, I would think. Good luck!\nJerry\n\n(Note: If you were logged in, we could automatically fill in these fields for you.)\n Name: * Email: Will not be published. Subscribe: Notify me of additional comments to this entry. URL: Verification: * Please spell out the number 4. [ Why? ]\n\nvB Code: You can use these tags: [b] [i] [u] [url] [email]"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.97809124,"math_prob":0.9994267,"size":1467,"snap":"2021-43-2021-49","text_gpt3_token_len":362,"char_repetition_ratio":0.12987013,"word_repetition_ratio":0.8868613,"special_character_ratio":0.265167,"punctuation_ratio":0.078688525,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9997441,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-21T00:03:08Z\",\"WARC-Record-ID\":\"<urn:uuid:16feea47-844a-4027-8c72-1d74113095de>\",\"Content-Length\":\"314028\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:371b44ed-336f-48ac-85f0-bab5395ef3e7>\",\"WARC-Concurrent-To\":\"<urn:uuid:e4f9f8f3-33ad-4e85-8b37-0e962feb8321>\",\"WARC-IP-Address\":\"173.231.200.26\",\"WARC-Target-URI\":\"https://terri77.savingadvice.com/2010/10/31/health-insurance_63069/\",\"WARC-Payload-Digest\":\"sha1:H33YOG5LMJC4JIHHZ2EB4E5YKEDM5SC4\",\"WARC-Block-Digest\":\"sha1:55FHEOY2LZ5XDPKPHSNUE4AYGJP7FWUS\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585353.52_warc_CC-MAIN-20211020214358-20211021004358-00224.warc.gz\"}"} |
https://link.springer.com/article/10.1007/s10255-006-0348-x?error=cookies_not_supported&code=50a8f290-b0f1-493c-8415-da8ebe57cc3e | [
"# Gevrey Class Regularity and Exponential Decay Property for Navier-Stokes-α Equations\n\n## Abstract\n\nThe Navier-Stokes-α equations subject to the periodic boundary conditions are considered. Analyticity in time for a class of solutions taking values in a Gevrey class of functions is proven. Exponential decay of the spatial Fourier spectrum for the analytic solutions and the lower bounds on the rate defined by the exponential decay are also obtained.\n\nThis is a preview of subscription content, access via your institution.\n\n## References\n\n1. 1.\n\nConstantin, P., Foias, C. Navier-Stokes equations. The University of Chicago Press, Chicago, 1988\n\n2. 2.\n\nDoering, C. R., Titi, E. S. Exponential decay rate of the power spectrum for solutions of the Navier-Stokes equations. Phys. Fluids, 7: 1384–1390 (1995)\n\n3. 3.\n\nFoias, C., Holm, D. D. and Titi E. S. The three dimensional Viscous Camassa-Holm equations and their relation to the Navier-Stokes equations and turbulence theory. J. Dyna. Diff. Equa., 4: 1–35 (2002)\n\n4. 4.\n\nFoias, C., Holm, D. D. and Titi, E. S. The Navier-Stokes-α model of fluid turbulence. Physica D., 152: 505–519 (2001)\n\n5. 5.\n\nFoias, C., Temam, R. Gevrey class regularity for the solutions of the Navier-Stokes equations. J. Func. Anal., 87: 359–369 (1989)\n\n6. 6.\n\nFoias, C., Temam, R. Navier-Stokes equations and turbulence. Cambridge University Press, Cambridge, 2001\n\n7. 7.\n\nHolm, D. D., Mardsen, J. E. and Ratiu, T. S. Euler-Poincar´e equations and semidirect products with applications to continuum theories. Adv. in Math., 137: 1–81 (1998)\n\n8. 8.\n\nYu, Y.J., Li, K.T. Existence of solutions and Gevrey class regularity for Leray-alpha equations. J. Math. Anal. Appl., 306: 227–242 (2005)\n\nDownload references\n\n## Author information\n\nAuthors\n\n### Corresponding author\n\nCorrespondence to Yong-jiang Yu.\n\n## Rights and permissions\n\nReprints and Permissions\n\n## About this article\n\n### Cite this article\n\nYu, Yj., Li, Kt. & Huang, Ax. Gevrey Class Regularity and Exponential Decay Property for Navier-Stokes-α Equations. Acta Mathematicae Applicatae Sinica, English Series 23, 49–58 (2007). https://doi.org/10.1007/s10255-006-0348-x\n\nDownload citation\n\n• Received:\n\n• Revised:\n\n• Issue Date:\n\n### Keywords\n\n• Gevrey class regularity\n• Navier-Stokes-α equations\n• exponential decay\n\n• 35Q30\n• 35Q35"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.68983835,"math_prob":0.7768255,"size":2037,"snap":"2021-04-2021-17","text_gpt3_token_len":614,"char_repetition_ratio":0.14658141,"word_repetition_ratio":0.013333334,"special_character_ratio":0.30044183,"punctuation_ratio":0.27352297,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97835,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-18T19:09:52Z\",\"WARC-Record-ID\":\"<urn:uuid:3d9d12e7-9cdd-4c3e-9f5c-a16a1d30e1ec>\",\"Content-Length\":\"88000\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a79889c3-f8a7-4560-9dae-5092545aceaa>\",\"WARC-Concurrent-To\":\"<urn:uuid:b631d54d-572a-4188-a7ef-75d401afaf7e>\",\"WARC-IP-Address\":\"151.101.200.95\",\"WARC-Target-URI\":\"https://link.springer.com/article/10.1007/s10255-006-0348-x?error=cookies_not_supported&code=50a8f290-b0f1-493c-8415-da8ebe57cc3e\",\"WARC-Payload-Digest\":\"sha1:CDPMTPDMYSYIG523FBWULRFRPRZ3O6FA\",\"WARC-Block-Digest\":\"sha1:HO7A7JCOORXHDKD2T3KXF3ZDNGRNISCO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038507477.62_warc_CC-MAIN-20210418163541-20210418193541-00319.warc.gz\"}"} |
https://codesweetly.com/number-vs-numeral-vs-digit-vs-character | [
"# Number vs Numeral vs Digit vs Character\n\nWhat is the difference between a number, numeral, digit, and character? Let's find out.\n\n## Number\n\nA number is an idea of quantity.\n\nFor instance, suppose you think of the quantity of novels you've read. In such a case, your thought (of the quantity of novels) is a number.\n\nThere are different ways to translate a number (your thought of quantity) into its physical form.\n\nFor instance, you can relate the quantity of novels with your fingers, pieces of bones, tapping the table, symbols, numerals, and so on.\n\n## Numeral\n\nA numeral is the written form of a number.\n\nIn other words, suppose you express a number as a writable character. In that case, the character you used to represent the number is the numeral.\n\nFor instance, the following are numerals used to express the number seven:\n\nnote\n\nAmongst the diverse ways of expressing numbers, the Hindu-Arabic numeral is the most common—as it allows multiple ways to do arithmetic quickly and compactly. For instance, the Hindu-Arabic numeral system allows mathematical calculations in binary (base 2), octal (base 8), decimal (base 10), and hexadecimal (base 16) numeral systems.\n\n## Digit\n\nA digit is each individual character of a numeral—for instance, 794 consists of the digits 7, 9, and 4.\n\n## Character\n\nA character is a writable (or printable) mark.\n\nSome examples of characters are as follows:\n\n• Alphabetical letters (For instance, a, g, and z)\n• Digits (For example, 0, 5, and 9)\n• Punctuations (For instance, semicolon (;), question mark (?), and colon (:))\n\nIn the image above, digits 7, 9, and 4 are digital characters.\n\nnote\n• \"185\" contains three-character digits: 1, 8, and 5.\n• \"TEN\" contains three-character letters: T, E, and N.\n• \"=%&@\" contains four-character symbols: =, %, &, and @.\n• \"&61#;\" contains five characters (three symbols and two digits): an ampersand sign, digit six, digit one, octothorpe sign, and semicolon sign.\n\n## Overview\n\n• A number is the abstract form of a quantity.\n• A numeral is the written form of a number.\n• Digits are the individual characters of a numeral.\n• A character is a written (or printed) mark."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8545221,"math_prob":0.98539895,"size":2176,"snap":"2023-40-2023-50","text_gpt3_token_len":541,"char_repetition_ratio":0.16850829,"word_repetition_ratio":0.02739726,"special_character_ratio":0.25459558,"punctuation_ratio":0.18013857,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99139464,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-10-01T15:47:45Z\",\"WARC-Record-ID\":\"<urn:uuid:edccdff5-a462-49e4-bfee-40890ef51fd6>\",\"Content-Length\":\"46988\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:634e9f7a-08b7-42a8-ac1a-8e0e7ae6388b>\",\"WARC-Concurrent-To\":\"<urn:uuid:c5f08384-eaa3-4566-846b-43811617663d>\",\"WARC-IP-Address\":\"18.213.222.111\",\"WARC-Target-URI\":\"https://codesweetly.com/number-vs-numeral-vs-digit-vs-character\",\"WARC-Payload-Digest\":\"sha1:3DP2FGCSRVVFURSMGLNAVB4TGXBXXMC5\",\"WARC-Block-Digest\":\"sha1:23UNLBCWNYVJTK3DFVXV6OHOGKBDOJUR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510903.85_warc_CC-MAIN-20231001141548-20231001171548-00234.warc.gz\"}"} |
https://confluence.cornell.edu/display/SIMULATION/FLUENT+-+Turbulent+Flow+Past+a+Sphere+-+Step+6 | [
"##### Child pages\n• FLUENT - Turbulent Flow Past a Sphere - Step 6\n\n# FLUENT - Turbulent Flow Past a Sphere - Step 6\n\nUNDER CONSTRUCTION\n\nAuthor: Daniel Kantor and Andrew Einstein, Cornell University\n\n## Step 6: Analyze Results\n\nFor all of our analysis we will be looking at the Sphere surface under Surfaces, unless otherwise noted.\n\n#### Plot Velocity Vectors\n\nLet's plot the velocity vectors obtained from the FLUENT solution.\n\nDisplay > Vectors",
null,
"If we look closely at the sphere we can start to see where the separation occurs.\n\nZoom in the cylinder using the middle mouse button.\n\nNow, let's take a look at the Contour of Velocity magnitude around the sphere.\n\nDisplay > Contours\n\nUnder Contours of, choose Velocity... and Velocity Magnitude. Select the Filled option. Increase the number of contour levels plotted: set Levels to `100`.",
null,
"Click Display.",
null,
"We see the flow is mostly what we would expect in this case.\n\nNow, let's take a look at the Contour of Turbulent Intensity around the sphere. This will give us a picture of the turbulence that is occurring around the sphere.\n\nDisplay > Contours\n\nUnder Contours of, choose Turbulence... and Turbulent Intensity. Select the Filled option. Increase the number of contour levels plotted: set Levels to `100`.\n\nClick Display.",
null,
"#### Pressure Coefficient\n\nPressure coefficient is a dimensionless parameter defined by the equation",
null,
"where p is the static pressure, p ref is the reference pressure, and q ref is the reference dynamic pressure defined by",
null,
"The reference pressure, density, and velocity are defined in the Reference Values panel in Step 5.\n\nLet's plot pressure coefficient vs x-direction along the cylinder.\n\nPlot > XY Plot...\n\nChange the Y Axis Function to Pressure..., followed by Pressure Coefficient. Then, select Sphere under Surfaces.",
null,
"Click Plot.",
null,
"We see that there is a lot of scatter in our data, so we will be creating a line along the sphere to try and get a better picture of the pressure coefficient. To accomplish this we will create a surface of Z-axis position zero, and plot the line y^2+(x-12)^2-9, which is the equation of a ring around the sphere in the x-y plane.\n\nSurface > Iso-Surface\n\nUnder Surface of Constant choose Grid... and Z-Coordinate. Under Iso-Values input 0. This will create a plane in our flow in which the Z coordinate is zero everywhere.",
null,
"Call this Zero_Plane and click Create.\n\nDefine > Custom Field Functions\n\nHere we input our formula y^2+(x-12)^2 - 9 under Definition. To do use the Field Functions section and choose Grid... and choose X-Coordinate and Y-Coordinate for the \"x\" and \"y\" in the above formula.",
null,
"Call this Ring and click Define.\n\nSurface > Iso-Surface\n\nNow under Surface of Constant choose Custom Field Functions and choose our function Ring. Keep the default Iso-Values to 0. Then, within From Surfaces select Zero_Plane.",
null,
"Call this CpLine and click Create.\n\nWe have now created the necessary line around the sphere to view the data better. Follow the same steps as before to plot the Pressure Coefficient, except that under Surfaces choose CpLine.\n\nWe now see that the data is has less scatter (this effect, however, is far more significant on a more refined mesh).",
null,
"Comparison\n\nWith our simulation data, we can now compare the Fluent with experimental data. Click HERE to download the experimental data. The two sets of data for Pressure Coefficients are shown here:",
null,
"The Red dots are the experimental data (labeled \"sphere1\"), while the white dots are our data (labeled CPline).\n\nLets display the coefficient of drag:\n\nReport > Forces\n\nMake sure that under Force Vector the X has a 1 by it (this represents the drag on the sphere), and that under Wall Zones, sphere is highlighted.",
null,
"Click Print.\n\nThe two sets of data for drag coefficient are shown here:\n\n Experimental 0.1 Simulation 0.4485\n\nGo to Step 7: Refine Mesh\n\nSee and rate the complete Learning Module\n\nGo to all FLUENT Learning Modules\n\n• No labels"
] | [
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/Vectors.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/Contours.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/VelocityMag.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/TurbulentInt.jpg",
null,
"https://confluence.cornell.edu/plugins/servlet/confluence/placeholder/unknown-attachment",
null,
"https://confluence.cornell.edu/plugins/servlet/lateximageservlet",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/PressCoeffsetup.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/PressCoeff.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/isosurface.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/Customfield2.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/isosurface2.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/Cpline.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/CPcomp.jpg",
null,
"https://confluence.cornell.edu/download/thumbnails/109223169/dragbox.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.82190067,"math_prob":0.79081047,"size":3928,"snap":"2023-40-2023-50","text_gpt3_token_len":889,"char_repetition_ratio":0.12104995,"word_repetition_ratio":0.079147644,"special_character_ratio":0.21817718,"punctuation_ratio":0.13229571,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98564476,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,null,null,null,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T13:40:15Z\",\"WARC-Record-ID\":\"<urn:uuid:c16c7fd3-6490-468a-b3cd-f5c0389cc3bf>\",\"Content-Length\":\"73766\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1b5e26a9-a358-4536-b711-bca24329366e>\",\"WARC-Concurrent-To\":\"<urn:uuid:bfc95c21-2f58-4a8a-90ce-b8bd6086d889>\",\"WARC-IP-Address\":\"199.102.164.156\",\"WARC-Target-URI\":\"https://confluence.cornell.edu/display/SIMULATION/FLUENT+-+Turbulent+Flow+Past+a+Sphere+-+Step+6\",\"WARC-Payload-Digest\":\"sha1:NIC3AMTJ5YOIFM4LUEEUUUUYX72S4DOI\",\"WARC-Block-Digest\":\"sha1:M65Z7RYU274SDQANNWLPJ7ILGXUL5ZOH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100745.32_warc_CC-MAIN-20231208112926-20231208142926-00895.warc.gz\"}"} |
https://indiakhelega.com/lumbar-puncture-ziqune/aa2368-the-number-of-times-an-event-occurs-is-called-its | [
"Δ The latter method introduces a random error into the count of between zero and one count, so on average half a count. The frequency of the 'hum' in an audio recording can show where the recording was made, in countries using a European, or an American, grid frequency. report flag outlined. ......▓..........ٮ..........▓ When it receives an event, it adds the event's \"action command\" (which is set to the text on the button's label) to the top text area. Even in dispersive media, the frequency f of a sinusoidal wave is equal to the phase velocity v of the wave divided by the wavelength λ of the wave: In the special case of electromagnetic waves moving through a vacuum, then v = c, where c is the speed of light in a vacuum, and this expression becomes: When waves from a monochrome source travel from one medium to another, their frequency remains the same—only their wavelength and speed change. A downside of this method is that an object rotating at an integral multiple of the strobing frequency will also appear stationary. ..........▓▓..........▓▓ If the two signals are close together in frequency the heterodyne is low enough to be measured by a frequency counter. {\\displaystyle f} For example, if you flip a coin 10 times and record the number of heads, you perform … Higher frequencies are usually measured with a frequency counter. When speaking about the frequency (in singular) of a sound, it means the property that most determines pitch. {\\displaystyle {\\frac {\\Delta f}{f}}={\\frac {1}{2fT_{m}}}} The probability of an event is a real number in the interval [0, 1]. ..▓▓......▓ Another word for proportion. Other species have different hearing ranges. This is an intense repetitively flashing light (strobe light) whose frequency can be adjusted with a calibrated timing circuit. - 3468436 Measurement of frequency can be done in the following ways. what is the exchange rate for converting British pounds (GBP) to Australian dollars (AUD)? One of the event listeners (an instance of a class called MultiListener) listens for events from both buttons. It gives the size (in bytes) of a pointer in your architecture, which is a constant number (e.g. A previous name for this unit was cycles per second (cps). Sure event occurs every time an experiment is repeated and has the probability 1. = T They all travel through a vacuum at the same speed (the speed of light), giving them wavelengths inversely proportional to their frequencies. Event \"M\" : The Event of the die showing up an even number on its face Event \"N\" : The Event of the die showing up an odd number on its face If getting a number divisible by 2 is an event, getting 1 is another event and getting a non even prime number is another event, then there are three possible Events or Outcomes. 5.5 × 10^3 meters As a matter of convenience, longer and slower waves, such as ocean surface waves, tend to be described by wave period rather than frequency. Visible light is an electromagnetic wave, consisting of oscillating electric and magnetic fields traveling through space. The SI unit for the period is the second. You can specify a function with the same name as an attribute when you create a trigger if you want to publish that attribute when the event occurs. ........▓▓......▓▓....▓▓ The event probability estimates the likelihood of an event occurring, such as drawing an ace from a deck of cards or manufacturing a non-conforming part. The frequency of the wave determines its color: 4×1014 Hz is red light, 8×1014 Hz is violet light, and between these (in the range 4-8×1014 Hz) are all the other colors of the visible spectrum. The example contains two event sources (JButton instances) and two event listeners. ........▓▓..▓▓....▓▓..▓▓................▓▓ Frequency. It … f A traditional unit of measure used with rotating mechanical devices is revolutions per minute, abbreviated r/min or rpm. These situations are perfect examples for measuring probability. The period is the duration of time of one cycle in a repeating event, so the period is the reciprocal of the frequency. For example: if a newborn baby's heart beats at a frequency of 120 times a minute (2 hertz), its period, T, — the time interval between beats—is half a second (60 seconds divided by 120 beats). Δ C. 0. Often recorded in a table or displayed in a graph, this is the number of times a specific value or observation occurs in a set of data. ....▓............❤............▓ An older method of measuring the frequency of rotating or vibrating objects is to use a stroboscope. y=1/2x- 4 m Current research is extending this method to infrared and light frequencies (optical heterodyne detection). Log in to add comment. This is an outline designed to demonstrate or explain the number of times a specified periodic phenomenon occurs within a specified interval. , or a fractional error of The set of all possible outcomes for (a,b) is called the sample space of this probability experiment. For example, if given linked list is 1->2->1->2->1->3 … f A reference signal of a known frequency near the unknown frequency is mixed with the unknown frequency in a nonlinear mixing device such as a diode. ν = In addition, the .trigger() method can trigger both standard browser event names and custom event names to call attached handlers. The value determined by dividing the number of times an event occurs by the total number of times the event was completed. A radio wave has a frequency of 5.5 × 10^4 hertz and travels at a speed of 3.0 × 10^8 meters/second. So, the total number of joint outcomes (a,b) is 6 times 6 which is 36. Thus, the 36 possible outcomes in the throw of two dice are assumed equally likely, and the probability of obtaining “six” is the number of favourable cases, 5, divided by 36, or 5/36. Use the drawing tools to form the correct answer on the graph. When the frequency of the strobe equals the frequency of the rotating or vibrating object, the object completes one cycle of oscillation and returns to its original position between the flashes of light, so when illuminated by the strobe the object appears stationary. I'm working on a small program that counts the number of times an integer appears in an array. ....▓......^..........^......▓ ..▓▓......▓▓..................▓▓▓▓ ....▓..........................▓ For the film, see, A resonant-reed frequency meter, an obsolete device used from about 1900 to the 1940s for measuring the frequency of alternating current. .......▓......................▓ Suppose an event E can happen in r ways out of a total of n possible equally likely ways. Empirical. {\\displaystyle T} Graph this system of equations on the coordinate plane: Frequency is an important parameter used in science and engineering to specify the rate of oscillatory and vibratory phenomena, such as mechanical vibrations, audio signals (sound), radio waves, and light. .....▓.........................▓ m 2 All of these waves, from the lowest-frequency radio waves to the highest-frequency gamma rays, are fundamentally the same, and they are all called electromagnetic radiation. Probability that is based on situations in which we observe how frequently an event occurs is called _____. {\\displaystyle \\nu } B. This error decreases with frequency, so it is generally a problem at low frequencies where the number of counts N is small. This is an electronic instrument which measures the frequency of an applied repetitive electronic signal and displays the result in hertz on a digital display. Like Pfizer and BioNTech, Moderna makes its vaccine from a genetic molecule called messenger RNA (mRNA). When you roll a six-sided die many times, you should not expect any outcome to happen more often than another (assuming that it is a … The probability that event B occurs, given that event A has already occurred is P(B|A) = P(A and B) / P(A) This formula comes from the general multiplication principle and … This is comparing apples and oranges, and will always return false, so the if will never succeed. Commented: KARANAM ANILBABU on 10 Feb 2019 Accepted Answer: Azzi Abdelmalek. De nition 2 The function f whose value for each real number xis given by (2), or equiva-lently by (1), is called the probability function of the random variable X. So 1-in-20 event will happen with 95% confident with 3 times 20 = 60 sample. For example, if 71 events occur within 15 seconds the frequency is: If the number of counts is not very large, it is more accurate to measure the time interval for a predetermined number of occurrences, rather than the number of occurrences within a specified time. PLS HELP I JDAHFJAH PLS Look at this linear inequality. Short and fast waves, like audio and radio, are usually described by their frequency instead of period. f Probability is the branch of mathematics that deals with the likelihood that certain outcomes will occur. Another word for proportion. T/F: If an even is certain to occur, its probability is 1. A. For example, consider the exper… T Cyclic processes that are not electrical, such as the rotation rate of a shaft, mechanical vibrations, or sound waves, can be converted to a repetitive electronic signal by transducers and the signal applied to a frequency counter. Photo Credit Coronavirus Vaccine Tracker Probability of an impossible event is 0. profile. The probability of Event A or Event B then is 9/25. Given a singly linked list and a key, count number of occurrences of given key in linked list. In Europe, Africa, Australia, Southern South America, most of Asia, and Russia, the frequency of the alternating current in household electrical outlets is 50 Hz (close to the tone G), whereas in North America and Northern South America, the frequency of the alternating current in household electrical outlets is 60 Hz (between the tones B♭ and B; that is, a minor third above the European frequency). ..▓▓......▓▓..............▓▓......▓▓▓▓ 1 The probability of an impossible event, denoted usually by; is 0. A First event happens first. The answer is Relative Frequency on usa test prep anyway, This site is using cookies under cookie policy. There are five basic rules, or axioms, that one must understand while studying the fundamentals of probability. Similarly, {N(t) n} implies {S n t}, yielding the equality in (2.2). 4 on 32-bit systems). Likewise, an electromagnetic wave can have a frequency higher than 8×1014 Hz, but it will be invisible to the human eye; such waves are called ultraviolet (UV) radiation. …. T {\\displaystyle T} It consists of a strip of metal with reeds of graduated lengths, vibrated by an, Conversion: frequency to wavelength and back, Conversion: period, cycle duration, periodic time to frequency, Keyboard frequencies = naming of notes – The English and American system versus the German system, Teaching resource for 14-16yrs on sound including frequency, A simple tutorial on how to build a frequency meter, A frequency generator with sound, useful for hearing tests, https://en.wikipedia.org/w/index.php?title=Frequency&oldid=993445395, Short description is different from Wikidata, Creative Commons Attribution-ShareAlike License, This page was last edited on 10 December 2020, at 17:24. I managed to do this but there is … In general, frequency components of a sound determine its \"color\", its timbre. We can show the probability of any one value using this style: P(X = value) = probability of that value For example, some dog breeds can perceive vibrations up to 60,000 Hz.. The strobe light is pointed at the rotating object and the frequency adjusted up and down. The smaller number is called the lower class limit and the greater number is called the upper-class limit. Frequency is measured in units of hertz (Hz) which is equal to one occurrence of a repeating event per second. An Annual event is an event that occurs once a year. Our goal is to assign probability to certain events.For example, suppose that we would like to know the probability that the outcome of rolling a fair die is an even number. You can specify conditions of storing and accessing cookies in your browser. How about the likelihood of a shark attack? Use the Mark Feature tool to indicate the solution to the system on the graph. Can you please help me with this question, ....▓▓▓▓ Count the number of times a number appears in an array. With the sample space now identified, formal probability theory requires that we identify the possible events. In other words, the probability function of Xhas the set of all real numbers as its domain, and the function assigns to each real number xthe probability that Xhas the value x. ....▓▓....▓.. A Second event occurs second. Number of occurrences or cycles per unit time, \"Frequencies\" redirects here. An electromagnetic wave can have a frequency less than 4×1014 Hz, but it will be invisible to the human eye; such waves are called infrared (IR) radiation. …, 5.0 × 10^3 meters For cyclical processes, such as rotation, oscillations, or waves, frequency is defined as a number of cycles per unit time. Active 4 years, 3 months ago. For example, the database startup and shutdown triggers have attributes for the instance number and the database name, and the logon and logoff triggers have attributes for the user name. , of a repeating event or oscillation is given by. The probability of Event A or Event B would be the total number of outcomes in the orange area divided by the total number of possible outcomes. Sound propagates as mechanical vibration waves of pressure and displacement, in air or other substances. The relation between the frequency and the period, A very interesting short-cut to solve this problem is the \"rule-of-three\". To reach higher frequencies, several stages of heterodyning can be used. T These commonly used conversions are listed below: For periodic waves in nondispersive media (that is, media in which the wave speed is independent of frequency), frequency has an inverse relationship to the wavelength, λ (lambda). Given a array, is there any way to count the number of times a value occurs within a specific row of that array? A compound event is an event with more than one outcome. For example: if a newborn baby's heart beats at a frequency of 120 times a minute (2 hertz), its period, T, — the time interval between beats—is half a second (60 seconds divided by 120 beats). Which graph shows the solution to the linear inequality. The number of laser photons hitting a detector in a particular time interval; Assumptions and validity. Use COUNT() to return the number of times the same value occurs. {\\displaystyle \\Delta f={\\frac {1}{2T_{m}}}} This equation is essentially obvious from Figure 2.1, but is one of those peculiar An event OCCURRING once a year is not dependent on intention, but on occurrence. Count the number of times a value occurs in a specific of an array. Frequency is the number of occurrences of a repeating event for unit of time. Frequency Diagram. As of 2018, frequency counters can cover the range up to about 100 GHz. Which value of x makes 7 - (x + 3) = 18 a true statement? An event can be just one outcome: Getting a Tail when tossing a coin; Rolling a \"5\" An event can include more than one outcome: Choosing a \"King\" from a deck of cards (any of the 4 Kings) Rolling an \"even number\" (2, 4 or 6) In dispersive media, such as glass, the speed depends somewhat on frequency, so the wavelength is not quite inversely proportional to frequency. Select all the values of x that will generate an output of -113. The audible frequency range for humans is typically given as being between about 20 Hz and 20,000 Hz (20 kHz), though the high frequency limit usually reduces with age. To find the frequency, we use tally marks. One hertz means that an event repeats once per second. The value determined by dividing the number of times an event occurs by the total number of times the event was completed. Ask Question Asked 6 years, 4 months ago. y=-3x + 3 Event probability is also called predicted probability. 0 ⋮ Vote. For example, in rolling one six-sided die, rolling an even number could occur with one of three outcomes: 2, 4, and 6. f D. Sure event is in fact the sample space S: An event that never occurs when an experiment is performed is called impossible event. An event can be a first annual event only upon reflection of its occurrence. f where c is the speed of light (c in a vacuum or less in other media), f is the frequency and λ is the wavelength. It uses digital logic to count the number of cycles during a time interval established by a precision quartz time base. Frequency is the number of times a particular entry occurs. 2. 60 rpm equals one hertz.. Even higher-frequency waves are called X-rays, and higher still are gamma rays. The size ( in singular ) of a sound determine its color '', its probability is 1 hertz... Oscillating electric and magnetic fields traveling through space 3468436 the number of occurrences given! Five basic rules, or axioms, that one must understand while studying the fundamentals of probability electromagnetic are! Oscillation is given by Pfizer and BioNTech, Moderna makes its Vaccine from a genetic molecule messenger. To Australian dollars ( AUD ) the graph ( cps ) frequently an event occurs every time experiment! Formal probability theory requires that we identify the possible events x makes 7 - ( +. Accepted answer: Azzi Abdelmalek or vibrating objects is to use a stroboscope situations in we... Or cycles per second the same value occurs that will generate an output -113... Mathematics that deals with the sample space, and at still lower frequencies is... Of laser photons hitting a detector in a particular entry occurs time an is. Last 30 days ) Tyler on 17 Jul 2014 implies { S n t } of. Call attached handlers very interesting short-cut to solve this problem is the hertz ( Hz ) is... Cycles during a time interval ; Assumptions and validity [ 1 ] in! - 3468436 the number of occurrences of a pointer in your browser waves pressure! By the total number of times a value occurs within a specified periodic phenomenon occurs within specified... Rna ( mRNA ) detection ) subset of the number of cycles per unit time, ''... That one must understand while studying the fundamentals of probability the strobe light whose... Class limit and the reference frequency to about 100 GHz described by their frequency instead period. Occurs to the memory address chr points to after the German physicist Heinrich hertz. [ 3 ] size in! 3.0 × 10^8 meters/second and fast waves, like audio and radio, are usually with. The reference frequency called a microwave, and higher still are gamma rays,! Particular time interval ; Assumptions and validity select all the values of x makes 7 - ( x 3... Return false, so the period is the rule-of-three '' if will never succeed and. Occurs is called an event with more than one outcome to occur, its probability is 1 with sample. Converting British pounds ( GBP ) to return the number of times the event listeners an... This result is not dependent on intention, but on occurrence defined as a number of or... Indirect methods and oranges, and at still lower frequencies it is called an event by! Still are gamma rays cycles per unit time and any subset of the number of joint outcomes a. Of all outcomes is called its ____ probability frequency adjusted up and.. Guide Authored by Corin B. Arenas, published on September 24, 2019 Ever thought about your chances winning. Measurement of frequency can be a first Annual event only upon reflection its... An array above this must be measured by indirect methods [ 7 ] difference between unknown! Heterodyning can be done in the interval [ 0, 1 ] it is a! Always return false, so it is called the sample space, and will return! Within a specific range of frequency is the rule-of-three '' [ 7.! Displacement, in air or other substances B. Arenas, published on September 24, 2019 Ever thought your. At the difference between the unknown frequency and the period is the branch of mathematics deals. Or axioms, that one must understand while studying the fundamentals of probability rotating mechanical is! R ways out of a repeating event, which would be equal one! Photons hitting a detector in a linked list and a key, count number of times specified... Flashing light ( strobe light ) whose frequency can be adjusted with a calibrated timing circuit rolling a.. Years, 4 months ago this represents the limit of direct counting methods ; above... Use a stroboscope so 1-in-20 event will happen with 95 % confident with 3 20. With a calibrated timing circuit be equal to 11/25: an event repeats once per.! Which would be equal to one occurrence of a sound determine its color! Which value of x makes 7 - ( x + 3 ) = 18 a true statement upon... X makes 7 - ( x + 3 ) = 18 a true statement formal theory!, its probability is 1 { \\displaystyle t }, yielding the equality in ( 2.2.! Light is an event is an electromagnetic wave, consisting of oscillating electric and magnetic traveling! 1-In-20 event will happen with 95 % confident with 3 times 20 = 60 sample chr to., such as rotation, oscillations, or axioms, that one must while... Test prep anyway, this site is using cookies under cookie policy also stationary! Is the exchange rate for converting British pounds ( GBP ) to Australian dollars ( AUD?! Frequency instead of period Mark Feature tool to indicate the solution to the system on the.! Heterodyning can be read from the calibrated readout on the graph the equality in ( 2.2.! Fundamentals of probability the number of times an event occurs is called its 3.0 × 10^8 meters in addition, the total number of times event. Pressure and displacement, in air or other substances fields traveling through space such as rotation, oscillations, waves. Once a year a particular time interval established by a precision quartz time base objects... Can be read from the calibrated readout on the stroboscope to form the correct answer on the.... T ) n } implies { S n t }, yielding the equality in 2.2... A time interval established by a frequency counter is based on situations in which we observe how an. Electromagnetic signals are close together in frequency the heterodyne is low enough to measured! Wave has a frequency counter particular time interval established by a precision quartz time.! Pls HELP i JDAHFJAH pls Look at this linear inequality event that once! Updated: 18-12-2019 occurs when an experiment is performed is called its ____ probability form the correct answer on stroboscope. If a TV has a frequency of rotating or vibrating objects is to use a stroboscope this must measured. }, of a sound determine its color '', its probability is 1 equal! That deals with the sample space is called the lower class limit and the reference frequency hertz ( )... Given int occurs in a linked list and a key, count number of occurrences or cycles second. 4 use the Mark Feature tool to indicate the solution to the total number of n! Function that counts the number of times the event listeners ( an instance of a repeating event for unit time! Is 6 times 6 which is a constant number ( e.g of direct counting methods frequencies... Accessing cookies in your architecture, which emphasizes the contrast to spatial frequency and the is. Greater number is called an outcome research is extending this method is an... Contrast to spatial frequency and the frequency of rotating or vibrating objects is use... Particular entry occurs optical heterodyne detection ) photo Credit Coronavirus Vaccine Tracker a compound is... Answer is Relative frequency on usa test prep anyway, this site is using under! Of 2018, frequency components of a repeating event, denoted usually by ; is 0, published September. Months ago lt ; -4x - 1 which graph shows the solution to the total of. Used with rotating mechanical devices is revolutions per minute, abbreviated r/min or rpm shows the to! To a specific range of frequencies in bytes ) of a sound, it means the property that determines. The property that most determines pitch up and down to the linear inequality the is! And fast waves, frequency components of a repeating event, denoted usually by ; is 0 and down value! Measured indirectly utilizing heterodyning ( frequency conversion ) a small program that counts the number of counts n is.... True statement '' redirects here: y=-3x + 3 ) = 18 a statement. Will never succeed, the frequencies an ear can hear are limited to a specific row of array! Explain the number of occurrences of a sound, it means the property that most determines pitch a timing! That will generate an output of -113 int occurs in a particular time interval established by a frequency counter 1. [ 1 ] it is also referred to as temporal frequency, so the if never... Days ) Tyler on 17 Jul 2014 frequency and the period is the branch of mathematics that with. Of storing and accessing cookies in your architecture, which would be equal the number of times an event occurs is called its occurrence. List Last Updated: 18-12-2019 a trial probability of an event occurs called. Be a first Annual event is a real number in the interval 0! Object rotating at an integral multiple of the number of times an occurs. Credit Coronavirus Vaccine Tracker a compound event is in fact the sample space S: an event occurs called! A singly linked list was cycles per second ( cps ) of period flipping coin... A year is not dependent on intention, but on occurrence refresh rate of 1 hertz the TV will. The greater number is called an outcome constant number ( e.g an event with more than outcome... Intense repetitively flashing light ( strobe light ) whose frequency can be read the. Hitting a detector in a linked list Last Updated: 18-12-2019 find the frequency of the strobing frequency also...\nLinkedin Ryan Kroonenburg, Nonprofit Mental Health Mission Statement, Sustainable Transport System Pdf, Stoli Crushed Calories, Paleontology Degree Online, Gorgonzola Cream Sauce Pasta, Google Search Questions, Jee Advanced 2019 Question Paper, It's It Ice Cream Sandwich Ingredients,"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91954994,"math_prob":0.9734104,"size":26126,"snap":"2021-21-2021-25","text_gpt3_token_len":5772,"char_repetition_ratio":0.1561519,"word_repetition_ratio":0.17605951,"special_character_ratio":0.23532113,"punctuation_ratio":0.17102048,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98041654,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-08T16:58:45Z\",\"WARC-Record-ID\":\"<urn:uuid:168a892a-ebdf-41d7-af30-f99114566202>\",\"Content-Length\":\"36041\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b1e9dba0-c823-4e59-9f81-504a7efaef76>\",\"WARC-Concurrent-To\":\"<urn:uuid:f8b7812f-b642-405f-95c5-5346261d6ef0>\",\"WARC-IP-Address\":\"107.180.46.235\",\"WARC-Target-URI\":\"https://indiakhelega.com/lumbar-puncture-ziqune/aa2368-the-number-of-times-an-event-occurs-is-called-its\",\"WARC-Payload-Digest\":\"sha1:2JKKGX3KRDOBGQQK7H7OXJBM6XPBWBPM\",\"WARC-Block-Digest\":\"sha1:T34XCLJQW4Z5YOH2UW2LGBBSIGPEICZY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243988882.94_warc_CC-MAIN-20210508151721-20210508181721-00133.warc.gz\"}"} |
http://bleibeberlin.info/how-much-does-a-porch-cost/how-much-does-a-porch-cost-cost-how-much-does-a-screen-porch-cost/ | [
"# How Much Does A Porch Cost Cost How Much Does A Screen Porch Cost",
null,
"how much does a porch cost cost how much does a screen porch cost.\n\nhow much does a porch cost in texas,how much does a porch cost 2015,how much does a screen porch cost,how much does a concrete porch cost,how much does a porch cost ireland,how much does a porch cost 2015 dodge,how much does a porch cost in chicago,how much would a porch cost to build,how much does a upvc porch cost,how much does a porch cost to build,how much does adding a porch cost."
] | [
null,
"http://bleibeberlin.info/data/how-much-does-a-porch-cost/images/how-much-does-a-porch-cost-cost-how-much-does-a-screen-porch-cost.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9210423,"math_prob":0.5590488,"size":853,"snap":"2019-43-2019-47","text_gpt3_token_len":211,"char_repetition_ratio":0.3262662,"word_repetition_ratio":0.16216215,"special_character_ratio":0.20750293,"punctuation_ratio":0.068571426,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9973462,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-15T14:07:39Z\",\"WARC-Record-ID\":\"<urn:uuid:02586927-c597-4cef-9dcf-64aadce72c2c>\",\"Content-Length\":\"45445\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4bd01380-ac6c-480b-82a0-8fa8f9b6ca76>\",\"WARC-Concurrent-To\":\"<urn:uuid:c3940640-aaa4-4f6c-8a48-7b29337b3ef8>\",\"WARC-IP-Address\":\"104.27.179.46\",\"WARC-Target-URI\":\"http://bleibeberlin.info/how-much-does-a-porch-cost/how-much-does-a-porch-cost-cost-how-much-does-a-screen-porch-cost/\",\"WARC-Payload-Digest\":\"sha1:4TCRBWM7HS6TOPZW7ELKPXTNY2CWTKWW\",\"WARC-Block-Digest\":\"sha1:4SIZU3GB76IXRFF42SMZ2EYHXL2SU6UF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496668644.10_warc_CC-MAIN-20191115120854-20191115144854-00356.warc.gz\"}"} |
https://math.stackexchange.com/questions/4568698/are-these-assertions-about-boundary-open-and-closed-sets-correct | [
"# Are these assertions about boundary, open, and closed sets correct?\n\nAre the assertions below about boundary, closed, and open sets correct? They help visualize several of the key concepts and are correspond more closely with intuition (at least my intuition).\n\n$$\\partial S$$ is the set of points $$x$$ such that for any $$\\varepsilon > 0$$, there exists $$s \\in S$$ and $$r \\notin S$$ such that $$x \\in B_\\varepsilon(s) \\cap B_\\varepsilon(r)$$. That is, $$x$$ is arbitrarily close to (or in) both $$S$$ and its complement. This makes clear that $$\\partial S = \\partial(S^c)$$, and matches the intuitive sense of \"boundary.\"\n\n(This definition works for any metric space. I'm not sure how to extend it to a general topological space.)\n\nA closed set is a set that includes its boundary. An open set is a set that's intersection with its boundary is empty. This makes clear that a clopen set is precisely a set with an empty boundary, and matches the intuitive sense of \"open\" and \"closed\".\n\nThe closure of a set is the union of the set and its boundary. The interior of a set is the set with its boundary removed. This makes clear that $$\\overline S^c = S^{c^o}$$ and $$\\overline{S^c} = S^{o^c}.$$\n\nyour definition of $$\\partial S$$ is right though it is not the \"standard \"definition(of course it is equivalent to it):$$x\\in \\partial S \\leftrightarrow \\forall \\epsilon >0,B(x,\\epsilon)\\cap S \\neq \\emptyset \\land B(x,\\epsilon)\\cap S^{c} \\neq \\emptyset$$,the the definition stays the \"same\" (replacing open balls which are basic nbds with open subsets or a system of open nbds) in the case of topological space: $$x\\in \\partial S \\leftrightarrow \\forall U\\in V_{x},U\\cap S \\neq \\emptyset \\land U\\cap S^{c} \\neq \\emptyset$$ where $$V_{x}$$ denote the set of nbds of $$x$$.the rest of characterizations are also right."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.94388735,"math_prob":0.99935037,"size":1101,"snap":"2023-14-2023-23","text_gpt3_token_len":284,"char_repetition_ratio":0.13855971,"word_repetition_ratio":0.031578947,"special_character_ratio":0.25976384,"punctuation_ratio":0.08558559,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998136,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-22T15:53:54Z\",\"WARC-Record-ID\":\"<urn:uuid:41b79784-f460-4fa6-b65c-c91703ca3c26>\",\"Content-Length\":\"127550\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f68fc892-5ab6-4a70-a1ed-ef590e9ac1e3>\",\"WARC-Concurrent-To\":\"<urn:uuid:7634fb66-4672-43fd-a6fa-702ca6bf25f0>\",\"WARC-IP-Address\":\"151.101.65.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/4568698/are-these-assertions-about-boundary-open-and-closed-sets-correct\",\"WARC-Payload-Digest\":\"sha1:4XKHXNNUMQKSAFDMM5SMSCHRJOPQREEY\",\"WARC-Block-Digest\":\"sha1:AQNIZWE4T52MJUB3P5IBMAW2WJ5AOVSH\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296943845.78_warc_CC-MAIN-20230322145537-20230322175537-00678.warc.gz\"}"} |
https://www.upczilla.com/online-upc-validation-tool/?validate-upc=713382710183 | [
"## STAY AT HOMEreorder with our app! Buy online, stay safe!",
null,
"# Online UPC validation tool\n\nUPCZilla’s tool for validating UPCs which also gives you a handy explanation of how the validation was performed.\n\n713382710183 is a valid UPC-A (though that doesn't mean it's assigned to any products, click here to see if it is: 713382710183 - if you haven't already).\n\n## How do we check if a UPC is valid?\n\nTo check if a UPC is valid, we need to perform some calculations on its digits, as follows:\n\n1. We take the six odd numbered digits (counting from the left, not including the final digit - more about that at the end) and we add them together:`7 1 3 3 8 2 7 1 0 1 8 (3) - last digit ignored for now7 (digit 1) + 3 (digit 3) + 8 (digit 5) + 7 (digit 7) + 0 (digit 9) + 8 (digit 11) = 33`\n\n2. Then we multiply that number (33) by 3:`33 X 3 = 99 (we'll be using this number in a minute)`\n\n3. Then, similar to the first step, we take the FIVE (not six) EVEN numbered digits and we add them together as well:`7 1 3 3 8 2 7 1 0 1 8 (3) - last digit still ignored1 (digit 2) + 3 (digit 4) + 2 (digit 6) + 1 (digit 8) + 1 (digit 10) = 8`\n\n4. We get the number we got in step 3 (8) and we ADD it to the number we got in step 2 (99):`8 + 99 = 107`\n\n5. Now we take the number we got in step 4 (107) and work out how much we have to add to round it up to the nearest 10. In order to round 107 up to the nearest 10 (110) we have to add... 3\n\n6. Is this value of 3 the same as the last (rightmost) digit in our code - the one we ignored in steps 1 and 3 (that's our checksum)?\n\nYES, the checksum in our UPC was also 3 so the UPC is valid!\n\nThe rightmost digit in a UPC is a checksum, because it provides some insurance that all the other numbers are right by performing the above calculation on them. The system is not foolproof, but if any number is wrong then you will typically get a wrong checksum."
] | [
null,
"https://play.google.com/intl/en_us/badges/images/generic/en_badge_web_generic.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89444387,"math_prob":0.9928208,"size":1797,"snap":"2020-45-2020-50","text_gpt3_token_len":552,"char_repetition_ratio":0.13329615,"word_repetition_ratio":0.07253886,"special_character_ratio":0.33834168,"punctuation_ratio":0.06532663,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9788182,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-30T16:45:16Z\",\"WARC-Record-ID\":\"<urn:uuid:7b24f1a6-0ead-4b0c-8d89-b84209bde7cd>\",\"Content-Length\":\"28953\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fd59d60d-e945-4eb5-a624-fcd5c5099414>\",\"WARC-Concurrent-To\":\"<urn:uuid:77b31595-9fa7-43bf-94f2-e16d9c0e426c>\",\"WARC-IP-Address\":\"198.55.114.236\",\"WARC-Target-URI\":\"https://www.upczilla.com/online-upc-validation-tool/?validate-upc=713382710183\",\"WARC-Payload-Digest\":\"sha1:O6P6PWAOLMWCEJ54NMNSAHXP5SDFDH2P\",\"WARC-Block-Digest\":\"sha1:NBMWDCYU4EI4TZF3N7GJL2ZLFFV26T6P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107911027.72_warc_CC-MAIN-20201030153002-20201030183002-00574.warc.gz\"}"} |
https://power-calculation.com/solar-photovoltaic-PV-power-calculator.php | [
"Principle Formula Calculator\n\n# Calculation of solar photovoltaic power and energy.\n\n## Principle\n\nThe principle of solar photovoltaic is to convert solar energy of light (photons) into electricity. When photons heat special materials they create a displacement of electrons that generate a continuous current. Solar cells are connected in series to form photovoltaic panels that are connected together to crate a PV generator. This generator can be connected to an inverter to transform continuous current in alternative current 3-phase or single phase and connected to the grid or to a storage system.\n\n## Formula to calculate PV energy\n\nHow to calculate annual output energy of a solar photovoltaic (PV) system? The simplest formula is :",
null,
"Where :\nE = electric energy PV production (kWh/year)\nHi = global incident radiation (kWh/m²/year)\nPstc = sum of peak power at STC conditions of photovoltaic solar panels (kWp)\nPR = Performance ratio of the solar PV system (without unit)\n\n## Calculator : solar PV energy and financial gain\n\nEnter your own values in the white boxes, results are displayed in the green boxes.\n\nPower of solar panels, Pstc : kWp\nGlobal incident radiation, Hi : kWh/m²/year\nPerformance ratio, PR : without unit\nThe performance ratio include all losses of the photovoltaic solar system : temperature derating, inverter yield, losses in cables, losses due to snow and smear and dust... A typical value of PR is between 0.7 and 0.8.\nAverage annual energy in output of solar PV generator : kWh/year\nMWh/year\nCurrency\nCost of energy : /kWh\nTotal annual amount of electricity bill : /year"
] | [
null,
"https://power-calculation.com/images/formula_solar_photovoltaic_energy.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8471715,"math_prob":0.9814793,"size":1067,"snap":"2022-05-2022-21","text_gpt3_token_len":222,"char_repetition_ratio":0.13264346,"word_repetition_ratio":0.0,"special_character_ratio":0.19119026,"punctuation_ratio":0.06111111,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9748861,"pos_list":[0,1,2],"im_url_duplicate_count":[null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-05-23T21:23:48Z\",\"WARC-Record-ID\":\"<urn:uuid:18e00adc-79f6-4778-b579-55a2e6cbbb8b>\",\"Content-Length\":\"21847\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:738cef7a-a038-4e24-b9b7-aa85b2096a19>\",\"WARC-Concurrent-To\":\"<urn:uuid:b194fbb2-7fe1-44b4-ac0a-0156991af1b8>\",\"WARC-IP-Address\":\"213.186.33.16\",\"WARC-Target-URI\":\"https://power-calculation.com/solar-photovoltaic-PV-power-calculator.php\",\"WARC-Payload-Digest\":\"sha1:H4WUP4LRNXNW4YP6KOQXWBGG7J25A36F\",\"WARC-Block-Digest\":\"sha1:UTLO3RUEWEWNZC2YZZFIFZNI73JOH37P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-21/CC-MAIN-2022-21_segments_1652662561747.42_warc_CC-MAIN-20220523194013-20220523224013-00045.warc.gz\"}"} |
https://teachen.info/cspp/unit3/u0307-accumulator.html | [
"Lesson 03-07: Accumulator Algorithms¶\n\nLearning Target: I can write an accumulator algorithm.\n\nAn Example of an Accumulator Algorithm¶\n\nAccumulator comes from the word accumulate, which means “gradually gather or acquire”. In programming, we use accumulator algorithms for the same purpose. For example, if we wanted to use loops to add up all positive integers up to 10, how would we do that?\n\nHere is that same code, except with added print statements to detail the process:\n\nBreaking Down the Accumulator Algorithm¶",
null,
"The accumulator algorithm can be broken down into three parts:\n\n1. Variable Initialization - You will have to have a variable that keeps track of your running total. This variable has to be initialized outside the loop. If you initialize it inside the loop, you will be repeatedly setting it to 0.\n2. The Iterator - You need to figure out what iterator (in these cases, a range) will work best for your loop. Need to look at all the even numbers between 2 and 100? Better use a range(2,101,2). Later on, we’ll learn how to iterate over strings and lists as well.\n3. The Update Statement - Since this is an accumulator algorithm, you should probably be accumulating something! This statement is for updating your running total with the new total. This doesn’t have to happen every time the loop runs, for example, if it’s inside of an if statement.\n\nLet’s do an example: Let’s get the product (multiplication) all the numbers that end in “4” from 1 to 100.\n\nWe start with our variable initialization - I’m gonna call mine total and set it to 1. I don’t want to set it to zero because I know I’m going to be multiplying, and if I multiply anything by zero, it will always be zero!\n\n 1 total = 1\n\nNext, I have to think about what I want to look at - in this case, what numbers do I need to look at? I could look at every number between 1 and 100, and that would be a waste - but I’m going to do it anyway to illustrate a point. Our range will therefore be range(1,101), since we want to include 100.\n\n 1 2 total = 1 for n in range(1,101):\n\nNext is the update statement. I know my update statement is multiplication, and that statement would look like total = total * num. However, I only want to do that when the number ends in 4. How do we know if a number ends in 4? Well, it’s a bit tricky, but we can do this:\n\nn % 10 == 4\n\nThis will take the remainder of dividing the number by 10, which drops everything except for the last digit 10, 100, 100, etc are all divisible by 10, so they all go away). This boolean expression will tell us if a number ends in 4 or not.\n\n 1 2 3 4 total = 1 for n in range(1,101): if n % 10 == 4: total = total * num\n\nFinally, I want to make sure I’m correct, so I print out the number and run it!.\n\nAlthough I don’t know what the actual answer is, so I will just punch the following into wolframalpha:\n\n4 * 14 * 24 * 34 * 44 * 54 * 64 * 74 * 84 * 94\n\nAnd I get 4060162871525376 as my answer. It matches!\n\nWhat I did was the inefficient way as well - a clever programmer may have figured out that I could simply make a better range and come to the same conclusion:\n\n(This code will loop 10 times, whereas the other loops 100 times)\n\nChecks For Understanding¶\n\nQ#1¶\n\nUsing an accumulator algorithm, find the sum of all odd positive integers from 1 to 1000. Print out the result. If the result matches 250000, then you got it correct! If you want to use codelens/pythontutor for help, you can find it by clicking here. Be sure to switch over to Python 3.3!\n\nQ#2¶\n\nA factorial ! of an integer is the product of all positive integers up to and including the integer. For example, $$3! = 3 \\times 2 \\times 1$$ and $$5! = 5 \\times 4 \\times 3 \\times 2 \\times 1$$. Using an accumulator algorithm, find the result of $$10!$$. If the result matches 3628800, then you got it correct! If you want to use codelens/pythontutor for help, you can find it by clicking here. Be sure to switch over to Python 3.3!\n\nQ#3 (extension)¶\n\nNot exactly an algorithm, as nothing is accumulated, but it has a similar algorithm. Use a for loop to test if 990023 is a prime number or not. Have it print out either \"990023 is a prime number!\" or \"990023 is NOT a prime number!\". Note that your range will only have to reach $$990023 \\div 2$$ at maximum since there can’t be any factors greater than that.\n\nTry to implement tricks into your range to reduce the number of times it has to loop!\n\n(yes - 990023 is prime - but you should write your program as it should work for any number!)\n\nNext Section - Lesson 03-08: The while Loop"
] | [
null,
"https://teachen.info/cspp/_images/accumulator.svg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90031636,"math_prob":0.9637469,"size":4481,"snap":"2019-43-2019-47","text_gpt3_token_len":1158,"char_repetition_ratio":0.11324548,"word_repetition_ratio":0.076744184,"special_character_ratio":0.28074092,"punctuation_ratio":0.11422638,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99079937,"pos_list":[0,1,2],"im_url_duplicate_count":[null,3,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-18T15:30:23Z\",\"WARC-Record-ID\":\"<urn:uuid:93956f8e-6a90-49d7-b743-754717f7a302>\",\"Content-Length\":\"32999\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:44296480-2930-4a91-bb1e-7be561bacd0e>\",\"WARC-Concurrent-To\":\"<urn:uuid:d46ae32b-1faa-4c64-9196-788e8cd7a50e>\",\"WARC-IP-Address\":\"151.101.65.195\",\"WARC-Target-URI\":\"https://teachen.info/cspp/unit3/u0307-accumulator.html\",\"WARC-Payload-Digest\":\"sha1:6PBUCF2DYSNVBMSLBAZWDU3G3VICSXFM\",\"WARC-Block-Digest\":\"sha1:BYVOYPFZ46QM34DOI7TS36H67TEE6N5C\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986682998.59_warc_CC-MAIN-20191018131050-20191018154550-00383.warc.gz\"}"} |
https://physics.stackexchange.com/questions/328165/charge-conjugation-operator-and-gamma-matrices | [
"# Charge conjugation operator and gamma matrices\n\nThe gamma matrices are defined by their anticommutation relations, which are symmetrical in permutations of $\\gamma_1, \\gamma_2, \\gamma_3$. Given this symmetry, why is the change conjugation operator $\\gamma_2$, rather than some symmetrical expression in $\\gamma_1, \\gamma_2, \\gamma_3$?\n\n• Why make it more complicated than it needs to be? – Demosthene Apr 22 '17 at 1:49\n• @Demosthene No doubt $\\gamma_2$ is a simple expression for the charge conjugation operator, but why does it lack the expected symmetry? – Sergei Patiakin Apr 22 '17 at 8:18\n\nThe charge conjugation operator $C$ cannot be expressed as a representation-invariant polynomial in $\\gamma^0, \\gamma^1, \\gamma^2, \\gamma^3$. Proof: Under a spinor basis change $U$, the gamma matrices transform as $\\gamma^\\mu \\rightarrow U \\gamma^\\mu U^{-1}$, so any polynomial $P$ will transform likewise. But the charge conjugation operator transforms as $C \\rightarrow U^* C U^{*-1}$, so cannot be expressed by any $P$.\nIn the Dirac representation, $C$ happens to be given by $\\gamma^2$. This is a coincidence due to our choice of basis - in another basis it will not be true. As shown above, no polynomial expression can hold for every basis, no matter whether the expression is symmetrical in $\\gamma^{1,2,3}$ or not."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8328361,"math_prob":0.993003,"size":1320,"snap":"2019-51-2020-05","text_gpt3_token_len":351,"char_repetition_ratio":0.14209726,"word_repetition_ratio":0.0,"special_character_ratio":0.27424243,"punctuation_ratio":0.13168724,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9995464,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-20T13:21:34Z\",\"WARC-Record-ID\":\"<urn:uuid:ef3aab00-41f6-4d87-ad11-66de913b94cc>\",\"Content-Length\":\"135270\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:30868eeb-a644-4cc8-b675-795c09c2a7cf>\",\"WARC-Concurrent-To\":\"<urn:uuid:d7bb3384-4b62-4930-9cf2-2049eebfc957>\",\"WARC-IP-Address\":\"151.101.1.69\",\"WARC-Target-URI\":\"https://physics.stackexchange.com/questions/328165/charge-conjugation-operator-and-gamma-matrices\",\"WARC-Payload-Digest\":\"sha1:CDF5FVSEQGXOBDN6O5RIJEYSJSZRLASW\",\"WARC-Block-Digest\":\"sha1:FULFE66CYBH33E7MLLFS2I43CRPD64F5\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250598726.39_warc_CC-MAIN-20200120110422-20200120134422-00050.warc.gz\"}"} |
https://brainmass.com/math/discrete-math/logic-problem-truth-value-35775 | [
"Explore BrainMass\n\n# Logic Problem and Truth Value\n\nNot what you're looking for? Search our solutions OR ask your own Custom question.\n\nThis content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!\n\nLet p represent a statement having a truth value T, q represent a statement having a truth value F, and r represent a statement having a truth value T. Find the truth value for the following:\n\np^(~q)\n\np^q^r\n\np^(qVr)\n\n~(p^q)\n\n(~p)V(~q).\n\nhttps://brainmass.com/math/discrete-math/logic-problem-truth-value-35775\n\n#### Solution Preview\n\nHere are the basic boolean operators:\n\n~ is logical NOT\n\n~T=F (not true is false)\n~F=T (not false is true)\n\n^ is logical AND\n\nF^F=F (false and false is false)\nF^T=F (false and true is false)\nT^F=F (true ...\n\n#### Solution Summary\n\nThis solution is comprised of a detailed explanation to find the truth value.\n\n\\$2.49"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8199088,"math_prob":0.89616317,"size":910,"snap":"2021-31-2021-39","text_gpt3_token_len":252,"char_repetition_ratio":0.13134658,"word_repetition_ratio":0.0647482,"special_character_ratio":0.26153848,"punctuation_ratio":0.12041885,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99784106,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-08-02T00:17:37Z\",\"WARC-Record-ID\":\"<urn:uuid:96584d07-8d50-4083-b03b-4e5a2f36aeb6>\",\"Content-Length\":\"330501\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5556866c-71c8-44d0-88f6-0970ca8a5513>\",\"WARC-Concurrent-To\":\"<urn:uuid:4ef7cbd9-b967-4562-ad4a-dab684939a5a>\",\"WARC-IP-Address\":\"172.67.75.38\",\"WARC-Target-URI\":\"https://brainmass.com/math/discrete-math/logic-problem-truth-value-35775\",\"WARC-Payload-Digest\":\"sha1:LO35Q4G6FSWTS7UIBDYBKQDNMDCWM76I\",\"WARC-Block-Digest\":\"sha1:WHXZ52MXZKUCVLWGXCOT6XTP2ECEBBNK\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046154277.15_warc_CC-MAIN-20210801221329-20210802011329-00480.warc.gz\"}"} |
https://www.easycalculation.com/chemistry/nuclear-decay.php | [
"The radioactive or nuclear decay takes place, when an unstable atom loses its energy by emitting radiation like alpha, beta, and other particles. These radiations can enter into human skin and damage cells, hence they are dangerous. The elements greater than 83 in the periodic table are radioactive elements and can be found using radioactive decay calculator. Select the element, initial number of moles, time period, the nuclear decay calculator finds the remaining moles of nuclei.\n\n## Nuclear Decay Calculator\n\ndays\n\nThe radioactive or nuclear decay takes place, when an unstable atom loses its energy by emitting radiation like alpha, beta, and other particles. These radiations can enter into human skin and damage cells, hence they are dangerous. The elements greater than 83 in the periodic table are radioactive elements and can be found using radioactive decay calculator. Select the element, initial number of moles, time period, the nuclear decay calculator finds the remaining moles of nuclei.\n\nCode to add this calci to your website",
null,
"",
null,
"#### Formula:\n\nc = (1000 x a x e-(log 2 / d) x b ) / 1000 Where, c = Moles of Nuclei Remain a = Initial Number of Moles of Nuclei b = Time Period d= Element\n\n### Example:\n\nFind the remaining moles of nuclei for the element uranium-238, where the initial number of moles is 100 and the time period is 34 days.\n\n#### Solution:\n\nc = (1000 x 100 x e-(log 2 / 32) x 34) / 1000\n=100 moles of nuclei remain."
] | [
null,
"https://www.easycalculation.com/images/embed-plus.gif",
null,
"https://www.easycalculation.com/images/embed-minus.gif",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8406399,"math_prob":0.99519235,"size":1183,"snap":"2020-24-2020-29","text_gpt3_token_len":250,"char_repetition_ratio":0.13061917,"word_repetition_ratio":0.75,"special_character_ratio":0.22062553,"punctuation_ratio":0.11363637,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99637544,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-05T23:08:03Z\",\"WARC-Record-ID\":\"<urn:uuid:62b277a5-3182-4e90-b6f1-748b04d098f3>\",\"Content-Length\":\"26909\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1553f5e5-5aa4-433b-a9d6-eb9e9beaad44>\",\"WARC-Concurrent-To\":\"<urn:uuid:c5d1fb42-fb13-4a1a-8d92-a450853230bc>\",\"WARC-IP-Address\":\"173.255.199.118\",\"WARC-Target-URI\":\"https://www.easycalculation.com/chemistry/nuclear-decay.php\",\"WARC-Payload-Digest\":\"sha1:2NBLDNKR7MF2IPO3DRHHOLXIAUVCYGP7\",\"WARC-Block-Digest\":\"sha1:JCTB3IVK4SIWUECSVZE34POVLO6N3W6F\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590348504341.78_warc_CC-MAIN-20200605205507-20200605235507-00190.warc.gz\"}"} |
http://www.ms.lt/sodas/Book/AlgebraicGeometryTheorems?action=print | [
"# Book: AlgebraicGeometryTheorems\n\nI'm organizing theorems in Algebraic Geometry that are listed in Wikipedia.\n\nAbhyankar's lemma allows one to kill tame ramification by taking an extension of a base field. More precisely, Abhyankar's lemma states that if A, B, C are local fields such that A and B are finite extensions of C, with ramification indices a and b, and B is tamely ramified over C and b divides a, then the compositum AB is an unramified extension of A.\n\nTo 'classify' addition theorems it is necessary to put some restriction on the type of function G admitted, such that F(x + y) = G(F(x), F(y)). In this identity one can assume that F and G are vector-valued (have several components). An algebraic addition theorem is one in which G can be taken to be a vector of polynomials?, in some set of variables. The conclusion of the mathematicians of the time was that the theory of abelian functions? essentially exhausted the interesting possibilities: considered as a functional equation? to be solved with polynomials, or indeed rational functions? or algebraic functions?, there were no further types of solution.\n\nBehrend's formula is a generalization of the Grothendieck–Lefschetz trace formula to a smooth algebraic stack over a finite field.\n\nAlgebraic curves\n\nBézout's theorem is a statement in algebraic geometry concerning the number of common points, or intersection points, of two plane algebraic curves, which do not share a common component (that is, which do not have infinitely many common points). The theorem claims that the number of common points of two such curves is at most equal to the product of their degrees, and equality holds if one counts points at infinity, points with complex coordinates (or more generally, coordinates from the algebraic closure of the ground field), and if each point is counted with its intersection multiplicity.\n\nBelyi's theorem on algebraic curves states that any non-singular algebraic curve C, defined by algebraic number coefficients, represents a compact Riemann surface which is a ramified covering of the Riemann sphere, ramified at three points only.\n\nBeauville–Laszlo theorem is a result in commutative algebra and algebraic geometry that allows one to \"glue\" two sheaves over an infinitesimal neighborhood of a point on an algebraic curve.\n\nAF+BG theorem (Max Noether's fundamental theorem) describes when the equation of an algebraic curve in the complex projective plane can be written in terms of the equations of two other algebraic curves.\n\nAbhyankar–Moh theorem states that if {$\\displaystyle L$} is a complex line in the complex affine plane {$\\displaystyle \\mathbb {C} ^{2}$}, then every embedding of {$\\displaystyle L$} into {$\\displaystyle \\mathbb {C} ^{2}$} extends to an automorphism of the plane. More generally, the same theorem applies to lines and planes over any algebraically closed field of characteristic zero, and to certain well-behaved subsets of higher-dimensional complex affine spaces.\n\nCayley–Bacharach theorem is a statement about cubic curves (plane curves of degree three) in the projective plane P2. Every cubic curve C1 on an algebraically closed field that passes through a given set of eight points P1, ..., P8 also passes through a certain (fixed) ninth point P9, counting multiplicities.\n\nChasles–Cayley–Brill formula (also known as the Cayley-Brill formula) states that a correspondence T of valence k from an algebraic curve C of genus g to itself has d + e + 2kg united points, where d and e are the degrees of T and its inverse.\n\nChasles' theorem says that if two pencils of curves have no curves in common, then the intersections of those curves form another pencil of curves the degree of which can be calculated from the degrees of the initial two pencils.\n\nde Franchis theorem is one of a number of closely related statements applying to compact Riemann surfaces, or, more generally, algebraic curves, X and Y, in the case of genus g > 1. The simplest is that the automorphism group of X is finite (see though Hurwitz's automorphisms theorem). More generally,\n\n• the set of non-constant morphisms from X to Y is finite;\n• fixing X, for all but a finite number of such Y, there is no non-constant morphism from X to Y.\n\nEnriques–Babbage theorem states that a canonical curve is either a set-theoretic intersection of quadrics, or trigonal, or a plane quintic.\n\nFaltings's theorem states that a curve of genus greater than 1 over the field Q of rational numbers has only finitely many rational points. It was later generalized by replacing Q by any number field.\n\nGudkov's conjecture is now a theorem, which states that \"a M-curve* of even degree 2d obeys p – n ≡ d2 (mod 8)\", where p is the number of positive ovals and n the number of negative ovals of the M-curve.\n\nHarnack's curve theorem describes the possible numbers of connected components that an algebraic curve can have, in terms of the degree of the curve.\n\nHodge index theorem for an algebraic surface V determines the signature of the intersection pairing on the algebraic curves C on V. It says, roughly speaking, that the space spanned by such curves (up to linear equivalence) has a one-dimensional subspace on which it is positive definite (not uniquely determined), and decomposes as a direct sum of some such one-dimensional subspace, and a complementary subspace on which it is negative definite.\n\nReiss relation is a condition on the second-order elements of the points of a plane algebraic curve meeting a given line.\n\nTorelli theorem is a classical result of algebraic geometry over the complex number field, stating that a non-singular projective algebraic curve (compact Riemann surface) C is determined by its Jacobian variety J(C), when the latter is given in the form of a principally polarized abelian variety. In other words, the complex torus J(C), with certain 'markings', is enough to recover C. The same statement holds over any algebraically closed field.\n\nTsen's theorem states that a function field K of an algebraic curve over an algebraically closed field is quasi-algebraically closed (i.e., C1). This implies that the Brauer group of any such field vanishes, and more generally that all the Galois cohomology groups H i(K, K*) vanish for i ≥ 1. This result is used to calculate the étale cohomology groups of an algebraic curve.\n\nWeber's theorem. Consider two non-singular curves C and C′ having the same genus g > 1. If there is a rational correspondence φ between C and C′, then φ is a birational transformation.\n\nWeil reciprocity law is a result holding in the function field K(C) of an algebraic curve C over an algebraically closed field K. Given functions f and g in K(C), i.e. rational functions on C, then f((g)) = g((f)) where the notation has this meaning: (h) is the divisor of the function h, or in other words the formal sum of its zeroes and poles counted with multiplicity; and a function applied to a formal sum means the product (with multiplicities, poles counting as a negative multiplicity) of the values of the function at the points of the divisor. With this definition there must be the side-condition, that the divisors of f and g have disjoint support (which can be removed).\n\nElliptic curves\n\nModularity theorem states that elliptic curves over the field of rational numbers are related to modular forms. The theorem states that any elliptic curve over Q can be obtained via a rational map with integer coefficients from the classical modular curve {$X_{0}(N)$} for some integer N.\n\nNéron–Ogg–Shafarevich criterion states that if A is an elliptic curve or abelian variety over a local field K and ℓ is a prime not dividing the characteristic of the residue field of K then A has good reduction if and only if the ℓ-adic Tate module Tℓ of A is unramified.\n\nRaynaud's isogeny theorem relates the Faltings heights of two isogeneous elliptic curves.\n\nVector bundles, line bundles\n\nBirkhoff–Grothendieck theorem classifies holomorphic vector bundles over the complex projective line. In particular every holomorphic vector bundle over {$\\displaystyle \\mathbb {CP} ^{1}$} is a direct sum of holomorphic line bundles.\n\nAppell–Humbert theorem describes the line bundles on a complex torus or complex abelian variety.\n\nLange's conjecture is a conjecture about stability of vector bundles over curves.\n\nLefschetz theorem on (1,1)-classes, named after Solomon Lefschetz, is a classical statement relating holomorphic line bundles on a compact Kähler manifold to classes in its integral cohomology.\n\nReider's theorem gives conditions for a line bundle on a projective surface to be very ample.\n\nGroup action on variety\n\nBorel fixed-point theorem is a fixed-point theorem in algebraic geometry generalizing the Lie–Kolchin theorem. If G is a connected, solvable, algebraic group acting regularly on a non-empty, complete algebraic variety V over an algebraically closed field k, then there is a G fixed-point of V.\n\nLuna's slice theorem describes the local behavior of an action of a reductive algebraic group on an affine variety.\n\nSumihiro's theorem states that a normal algebraic variety with an action of a torus can be covered by torus-invariant affine open subsets.\n\nCohomology\n\nBorel's theorem says the cohomology ring of a classifying space or a classifying stack is a polynomial ring.\n\nAtiyah–Bott formula says the cohomology ring {$\\operatorname {H}^{*}(\\operatorname {Bun}_{G}(X),{\\mathbb {Q}}_{l})$} of the moduli stack of principal bundles is a free graded-commutative algebra on certain homogeneous generators.\n\nGrauert–Riemenschneider vanishing theorem is an extension of the Kodaira vanishing theorem on the vanishing of higher cohomology groups of coherent sheaves on a compact complex manifold.\n\nGrothendieck trace formula expresses the number of points of a variety over a finite field in terms of the trace of the Frobenius endomorphism on its cohomology groups. There are several generalizations: the Frobenius endomorphism can be replaced by a more general endomorphism, in which case the points over a finite field are replaced by its fixed points, and there is also a more general version for a sheaf over the variety, where the cohomology groups are replaced by cohomology with coefficients in the sheaf.\n\nGrothendieck–Riemann–Roch theorem is a far-reaching result on coherent cohomology. It is a generalisation of the Hirzebruch–Riemann–Roch theorem, about complex manifolds, which is itself a generalisation of the classical Riemann–Roch theorem for line bundles on compact Riemann surfaces.\n\nHirzebruch–Riemann–Roch theorem, named after Friedrich Hirzebruch, Bernhard Riemann, and Gustav Roch, is Hirzebruch's 1954 result contributing to the Riemann–Roch problem for complex algebraic varieties of all dimensions. It was the first successful generalisation of the classical Riemann–Roch theorem on Riemann surfaces to all higher dimensions, and paved the way to the Grothendieck–Hirzebruch–Riemann–Roch theorem proved about three years later.\n\nHolomorphic Lefschetz formula is an analogue for complex manifolds of the Lefschetz fixed-point formula that relates a sum over the fixed points of a holomorphic vector field of a compact complex manifold to a sum over its Dolbeault cohomology groups.\n\nKawamata–Viehweg vanishing theorem is an extension of the Kodaira vanishing theorem, on the vanishing of coherent cohomology groups, to logarithmic pairs. The theorem states that if L is a big nef line bundle (for example, an ample line bundle) on a complex projective manifold with canonical line bundle K, then the coherent cohomology groups Hi(L⊗K) vanish for all positive i.\n\nRamanujam vanishing theorem is an extension of the Kodaira vanishing theorem that in particular gives conditions for the vanishing of first cohomology groups of coherent sheaves on a surface.\n\nKempf vanishing theorem states that the higher cohomology group Hi(G/B,L(λ)) (i > 0) vanishes whenever λ is a dominant weight of B. Here G is a reductive algebraic group over an algebraically closed field, B a Borel subgroup, and L(λ) a line bundle associated to λ. In characteristic 0 this is a special case of the Borel–Weil–Bott theorem, but unlike the Borel–Weil–Bott theorem, the Kempf vanishing theorem still holds in positive characteristic.\n\nKodaira vanishing theorem is a basic result of complex manifold theory and complex algebraic geometry, describing general conditions under which sheaf cohomology groups with indices q > 0 are automatically zero. The implications for the group with index q = 0 is usually that its dimension — the number of independent global sections — coincides with a holomorphic Euler characteristic that can be computed using the Hirzebruch-Riemann-Roch theorem.\n\nLefschetz hyperplane theorem is a precise statement of certain relations between the shape of an algebraic variety and the shape of its subvarieties. More precisely, the theorem says that for a variety X embedded in projective space and a hyperplane section Y, the homology, cohomology, and homotopy groups of X determine those of Y.\n\nLeray's theorem relates abstract sheaf cohomology with Čech cohomology.\n\nLet F be a sheaf on a topological space X and U an open cover of X . If F is acyclic on every finite intersection of elements of U, then {${\\check {H}}^{q}({\\mathcal {U}},{\\mathcal {F}})=H^{q}(X,{\\mathcal {F}}),$} {${\\check {H}}^{q}({\\mathcal {U}},{\\mathcal {F}})=H^{q}(X,{\\mathcal {F}}),$} where {$\\displaystyle {\\check {H}}^{q}({\\mathcal {U}},{\\mathcal {F}})$} {$\\displaystyle {\\check {H}}^{q}({\\mathcal {U}},{\\mathcal {F}})$} is the q-th Čech cohomology group of F with respect to the open cover U.\n\nPoincaré duality theorem, named after Henri Poincaré, is a basic result on the structure of the homology and cohomology groups of manifolds. It states that if M is an n-dimensional oriented closed manifold (compact and without boundary), then the kth cohomology group of M is isomorphic to the (n − k)th homology group of M, for all integers k {$H^{k}(M)\\cong H_{n-k}(M).$}\n\nProper base change theorem states the following: let {$f:X\\to S$} be a proper morphism between noetherian schemes, and F S-flat coherent sheaf on X. If {$S=\\operatorname {Spec} A$}, then there is a finite complex {$0\\to K^{0}\\to K^{1}\\to \\cdots \\to K^{n}\\to 0$} of finitely generated projective A-modules and a natural isomorphism of functors {$H^{p}(X\\times _{S}\\operatorname {Spec} -,{\\mathcal {F}}\\otimes _{A}-)\\to H^{p}(K^{\\bullet }\\otimes _{A}-),p\\geq 0$} on the category of A-algebras.\n\nThe proper base change theorem of étale cohomology states that the higher direct image {$R^{i}f_{*}{\\mathcal {F}}$} of a torsion sheaf F along a proper morphism f commutes with base change. A closely related, the finiteness theorem states that the étale cohomology groups of a constructible sheaf on a complete variety are finite. Theorem (finiteness): Let X be a variety over a separably closed field and F a constructible sheaf on {$X_{\\text{et}}$}. Then {$H^{r}(X,{\\mathcal {F}})$} are finite in each of the following cases: (i) X is complete, or (ii) F has no p-torsion, where p is the characteristic of k.\n\nSheaves\n\nCartan's theorems A and B are two results proved by Henri Cartan around 1951, concerning a coherent sheaf F on a Stein manifold X.\n\n• Theorem A. F is spanned by its global sections.\n• Theorem B. H p(X, F) = 0 for all p > 0.\n\nMumford vanishing theorem states that if L is a semi-ample invertible sheaf with Iitaka dimension at least 2 on a complex projective manifold, then {$H^{i}(X,L^{-1})=0{\\text{ for }}i=0,1.\\$}\n\nProjection formula states that, for a quasi-compact separated morphism of schemes {$f:X\\to Y$}, a quasi-coherent sheaf F on X, a locally free sheaf E on Y, the natural maps of sheaves {$R^{i}f_{*}{\\mathcal {F}}\\otimes {\\mathcal {E}}\\to R^{i}f_{*}({\\mathcal {F}}\\otimes f^{*}{\\mathcal {E}})$} are isomorphisms.\n\nSpectrum\n\nChevalley–Iwahori–Nagata theorem states that if a linear algebraic group G is acting linearly on a finite-dimensional vector space V, then the map from V/G to the spectrum of the ring of invariant polynomials is an isomorphism if this ring is finitely generated and all orbits of G on V are closed\n\nGrothendieck's connectedness theorem states that if A is a complete local ring whose spectrum is k-connected and f is in the maximal ideal, then Spec(A/fA) is (k − 1)-connected.\n\nAlgebraic groups\n\nChevalley's structure theorem states that a smooth connected algebraic group over a perfect field has a unique normal smooth connected affine algebraic subgroup such that the quotient is an abelian variety.\n\nSchemes\n\nChow's lemma A proper morphism is fairly close to being a projective morphism. If X is a scheme that is proper over a noetherian base S, then there exists a projective -scheme {$X'$} and a surjective {$S$} -morphism {$f\\colon X'\\to X$} that induces an isomorphism {$f^{-1}(U)\\simeq U$} for some dense open {$U\\subseteq X$}.\n\nGrothendieck existence theorem gives conditions that enable one to lift infinitesimal deformations of a scheme to a deformation, and to lift schemes over infinitesimal neighborhoods over a subscheme of a scheme S to schemes over S.\n\nRegular Embedding A closed immersion {$i:X\\hookrightarrow Y$} of schemes is a regular embedding of codimension r if each point x in X has an open affine neighborhood U in Y such that the ideal of {$X\\cap U$} is generated by a regular sequence of length r.\n\nSerre–Tate theorem says that under certain conditions an abelian scheme and its p-divisible group have the same infinitesimal deformation theory.\n\nTheorem on formal functions states the following: Let {$f:X\\to S$} be a proper morphism of noetherian schemes with a coherent sheaf F on X. Let {$S_{0}$} be a closed subscheme of S defined by I and {${\\widehat {X}},{\\widehat {S}}$} formal completions with respect to {$X_{0}=f^{-1}(S_{0})$} and {$S_{0}$}. Then for each {$p\\geq 0$} the canonical (continuous) map {$(R^{p}f_{*}{\\mathcal {F}})^{\\wedge }\\to \\varprojlim _{k}R^{p}f_{*}{\\mathcal {F}}_{k}$} is an isomorphism of (topological) {${\\mathcal {O}}_{\\widehat {S}}$}-modules, where\n\n• The left term is {$\\varprojlim R^{p}f_{*}{\\mathcal {F}}\\otimes _{{\\mathcal {O}}_{S}}{\\mathcal {O}}_{S}/{{\\mathcal {I}}^{k+1}}$}.\n• {${\\mathcal {F}}_{k}={\\mathcal {F}}\\otimes _{{\\mathcal {O}}_{S}}({\\mathcal {O}}_{S}/{\\mathcal {I}}^{k+1})$}\n• The canonical map is one obtained by passage to limit.\n\nAlgebraic cycles\n\nChow's moving lemma states: given algebraic cycles Y, Z on a nonsingular quasi-projective variety X, there is another algebraic cycle Z' on X such that Z' is rationally equivalent to Z and Y and Z' intersect properly. The lemma is one of key ingredients in developing the intersection theory, as it is used to show the uniqueness of the theory.\n\nClifford's theorem on special divisors is a result of W. K. Clifford (1878) on algebraic curves, showing the constraints on special linear systems on a curve C. For an effective special divisor D, ℓ(D) − 1 ≤ d/2, and the case of equality here is only for D zero or canonical, or C a hyperelliptic curve and D linearly equivalent to an integral multiple of a hyperelliptic divisor.\n\nIntegral over moduli spaces\n\nELSV formula is an equality between a Hurwitz number (counting ramified coverings of the sphere) and an integral over the moduli space of stable curves.\n\nAlgebraic sets, varieties, subvarieties\n\nFulton–Hansen connectedness theorem states that if V and W are irreducible algebraic subvarieties of a projective space P, all over an algebraically closed field, and if dim(V) + dim (W) > dim (P) in terms of the dimension of an algebraic variety, then the intersection U of V and W is connected.\n\nGram's theorem states that an algebraic set in a finite-dimensional vector space invariant under some linear group can be defined by absolute invariants.\n\nHonda–Tate theorem classifies abelian varieties over finite fields up to isogeny. It states that the isogeny classes of simple abelian varieties over a finite field of order q correspond to algebraic integers all of whose conjugates (given by eigenvalues of the Frobenius endomorphism on the first cohomology group or Tate module) have absolute value √q.\n\nMnev's universality theorem is a result which can be used to represent algebraic (or semi algebraic) varieties as realizations of oriented matroids.\n\nNagata's compactification theorem implies that every abstract variety can be embedded in a complete variety, and more generally shows that a separated and finite type morphism to a Noetherian scheme S can be factored into an open immersion followed by a proper mapping.\n\nGiven an algebraic variety (or more generally scheme) X, states that if\n\n• (1) X is quasi-compact, and\n• (2) for every quasi-coherent ideal sheaf I of OX, {$H^{1}(X,I)=0$},\n\nthen X is affine.\n\nTate's isogeny theorem states that two abelian varieties over a finite field are isogeneous if and only if their Tate modules are isomorphic (as Galois representations).\n\nZariski's connectedness theorem says that under certain conditions the fibers of a morphism of varieties are connected. It is an extension of Zariski's main theorem to the case when the morphism of varieties need not be birational. Suppose that f is a proper surjective morphism of varieties from X to Y such that the function field of Y is separably closed in that of X. Then Zariski's connectedness theorem says that the inverse image of any normal point of Y is connected.\n\nPolynomial rings\n\nHilbert's Nullstellensatz is a theorem that establishes a fundamental relationship between geometry and algebra. This relationship is the basis of algebraic geometry, an important branch of mathematics. It relates algebraic sets to ideals in polynomial rings over algebraically closed fields. Let k be a field (such as the rational numbers) and K be an algebraically closed field extension (such as the complex numbers), consider the polynomial ring k[X1,X2,..., Xn] and let I be an ideal in this ring. The algebraic set V(I) defined by this ideal consists of all n-tuples x = (x1,...,xn) in Kn such that f(x) = 0 for all f in I. Hilbert's Nullstellensatz states that if p is some polynomial in k[X1,X2,..., Xn] that vanishes on the algebraic set V(I), i.e. p(x) = 0 for all x in V(I), then there exists a natural number r such that pr is in I.\n\nKodaira embedding theorem characterises non-singular projective varieties, over the complex numbers, amongst compact Kähler manifolds. In effect it says precisely which complex manifolds are defined by homogeneous polynomials.\n\nStengle's Positivstellensatz characterizes polynomials that are positive on a semialgebraic set, which is defined by systems of inequalities of polynomials with real coefficients, or more generally, coefficients from any real closed field. It can be thought of as an ordered analogue of Hilbert's Nullstellensatz.\n\nTarski–Seidenberg theorem states that a set in (n + 1)-dimensional space defined by polynomial equations and inequalities can be projected down onto n-dimensional space, and the resulting set is still definable in terms of polynomial identities and inequalities. It implies that quantifier elimination is possible over the reals, that is that every formula constructed from polynomial equations and inequalities by logical connectors ∨ (or), ∧ (and), ¬ (not) and quantifiers ∀ (for all), ∃ (exists) is equivalent with a similar formula without quantifiers. An important consequence is the decidability of the theory of real-closed fields.\n\nAutomorphism groups\n\nHurwitz's automorphisms theorem bounds the order of the group of automorphisms, via orientation-preserving conformal mappings, of a compact Riemann surface of genus g > 1, stating that the number of such automorphisms cannot exceed 84(g − 1). A group for which the maximum is achieved is called a Hurwitz group, and the corresponding Riemann surface a Hurwitz surface. Because compact Riemann surfaces are synonymous with non-singular complex projective algebraic curves, a Hurwitz surface can also be called a Hurwitz curve.\n\nAlgebraic spaces\n\nKeel–Mori theorem gives conditions for the existence of the quotient of an algebraic space by a group.\n\nVector\n\nKempf–Ness theorem gives a criterion for the stability of a vector in a representation of a complex reductive group. If the complex vector space is given a norm that is invariant under a maximal compact subgroup of the reductive group, then the Kempf–Ness theorem states that a vector is stable if and only if the norm attains a minimum value on the orbit of the vector.\n\nFrobenius morphism\n\nLang's theorem, introduced by Serge Lang, states: if G is a connected smooth algebraic group over a finite field {${F} _{q}$}, then, writing {$\\displaystyle \\sigma :G\\to G,\\,x\\mapsto x^{q}$} for the Frobenius, the morphism of varieties {$\\displaystyle G\\to G,\\,x\\mapsto x^{-1}\\sigma (x)$} is surjective. Note that the kernel of this map (i.e.,{$\\displaystyle G=G({\\overline {\\mathbf {F} _{q}}})\\to G({\\overline {\\mathbf {F} _{q}}})$} is precisely {$\\displaystyle G(\\mathbf {F} _{q})$}. The theorem implies that {$\\displaystyle H^{1}(\\mathbf {F} _{q},G)=H_{\\mathrm {{\\acute {e}}t} }^{1}(\\operatorname {Spec} \\mathbf {F} _{q},G)$} vanishes, and, consequently, any G-bundle on {$\\displaystyle \\operatorname {Spec} \\mathbf {F} _{q}$} is isomorphic to the trivial one. Also, the theorem plays a basic role in the theory of finite groups of Lie type.\n\nField extensions\n\nLüroth's theorem asserts that every field that lies between two other fields K and K(X) must be generated as an extension of K by a single element of K(X).\n\nAlgebraic surfaces\n\nNoether's theorem on rationality for surfaces is a classical result of Max Noether on complex algebraic surfaces, giving a criterion for a rational surface. Let S be an algebraic surface that is non-singular and projective. Suppose there is a morphism φ from S to the projective line, with general fibre also a projective line. Then the theorem states that S is rational.\n\nRiemann–Roch theorem is an important theorem in mathematics, specifically in complex analysis and algebraic geometry, for the computation of the dimension of the space of meromorphic functions with prescribed zeroes and allowed poles. It relates the complex analysis of a connected compact Riemann surface with the surface's purely topological genus g, in a way that can be carried over into purely algebraic settings. The Riemann–Roch theorem for a compact Riemann surface of genus g with canonical divisor K states {$\\ell (D)-\\ell (K-D)=\\deg(D)-g+1.$}\n\nKawasaki's Riemann–Roch formula is the Riemann–Roch formula for orbifolds.\n\nRiemann–Roch theorem for surfaces describes the dimension of linear systems on an algebraic surface. One form of the Riemann–Roch theorem states that if D is a divisor on a non-singular projective surface then {$\\chi (D)=\\chi (0)+{\\tfrac {1}{2}}D.(D-K)\\,$} where χ is the holomorphic Euler characteristic, the dot . is the intersection number, and K is the canonical divisor. The constant χ(0) is the holomorphic Euler characteristic of the trivial bundle, and is equal to 1 + pa, where pa is the arithmetic genus of the surface. For comparison, the Riemann–Roch theorem for a curve states that χ(D) = χ(0) + deg(D).\n\nDegeneracy locus\n\nPorteous formula Given a morphism of vector bundles E, F of ranks m and n over a smooth variety, its k-th degeneracy locus (k ≤ min(m,n)) is the variety of points where it has rank at most k. If all components of the degeneracy locus have the expected codimension (m – k)(n – k) then Porteous's formula states that its fundamental class is the determinant of the matrix of size m – k whose (i, j) entry is the Chern class cn–k+j–i(F – E).\n\nLocal ring\n\nRamanujam–Samuel theorem gives conditions for a divisor of a local ring to be principal.\n\nSchlessinger's theorem is a theorem in deformation theory that gives conditions for a functor of artinian local rings to be pro-representable, refining an earlier theorem of Grothendieck.\n\nGalois representations\n\nRibet's theorem is a statement in number theory concerning properties of Galois representations associated with modular forms. Let f be a weight 2 newform on Γ0(qN)–i.e. of level qN where q does not divide N–with absolutely irreducible 2-dimensional mod p Galois representation ρf,p unramified at q if q ≠ p and finite flat at q = p. Then there exists a weight 2 newform g of level N such that {$\\rho _{f,p}\\simeq \\rho _{g,p}.$} In particular, if E is an elliptic curve over Q with conductor qN, then the Modularity theorem guarantees that there exists a weight 2 newform f of level qN such that the 2-dimensional mod p Galois representation ρf, p of f is isomorphic to the 2-dimensional mod p Galois representation ρE, p of E.\n\nHyperplane sections\n\nTheorem of Bertini is an existence and genericity theorem for smooth connected hyperplane sections for smooth projective varieties over algebraically closed fields. Let X be a smooth quasi-projective variety over an algebraically closed field, embedded in a projective space {$\\mathbf {P} ^{n}$}. Let {$|H|$} denote the complete system of hyperplane divisors in {$\\mathbf {P} ^{n}$}. Recall that it is the dual space {$(\\mathbf {P} ^{n})^{\\star }$} of {$\\mathbf {P} ^{n}$} and is isomorphic to {$\\mathbf {P} ^{n}$}. The theorem of Bertini states that the set of hyperplanes not containing X and with smooth intersection with X contains an open dense subset of the total system of divisors {$|H|$}. The set itself is open if X is projective. If dim(X) ≥ 2, then these intersections (called hyperplane sections of X) are connected, hence irreducible.\n\nTorsion group\n\nThe torsion conjecture or uniform boundedness conjecture for abelian varieties states that the order of the torsion group of an abelian variety over a number field can be bounded in terms of the dimension of the variety and the number field. A stronger version of the conjecture is that the torsion is bounded in terms of the dimension of the variety and the degree of the number field.\n\nProjective spaces\n\nVeblen–Young theorem states that a projective space of dimension at least 3 can be constructed as the projective space associated to a vector space over a division ring. Non-Desarguesian planes give examples of 2-dimensional projective spaces that do not arise from vector spaces over division rings, showing that the restriction to dimension at least 3 is necessary.\n\nBirational map\n\nZariski's main theorem is a statement about the structure of birational morphisms stating roughly that there is only one branch at any normal point of a variety. It is the special case of Zariski's connectedness theorem when the two varieties are birational. ... The total transform of a normal fundamental point of a birational map has positive dimension.\n\nParsiųstas iš http://www.ms.lt/sodas/Book/AlgebraicGeometryTheorems\nPuslapis paskutinį kartą pakeistas 2016 lapkričio 13 d., 20:27"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9015159,"math_prob":0.9930237,"size":30077,"snap":"2019-35-2019-39","text_gpt3_token_len":7402,"char_repetition_ratio":0.16523127,"word_repetition_ratio":0.02696536,"special_character_ratio":0.21860558,"punctuation_ratio":0.07980187,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99948806,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-08-19T19:26:25Z\",\"WARC-Record-ID\":\"<urn:uuid:f3ff4a04-2867-44f1-b124-8382af83c418>\",\"Content-Length\":\"49123\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:975f1800-1784-4042-829f-2b23852fc692>\",\"WARC-Concurrent-To\":\"<urn:uuid:2b37d692-ea8a-4e31-945b-54165f421a0b>\",\"WARC-IP-Address\":\"193.219.5.19\",\"WARC-Target-URI\":\"http://www.ms.lt/sodas/Book/AlgebraicGeometryTheorems?action=print\",\"WARC-Payload-Digest\":\"sha1:66IQ6KNC4KQOM4SZWNST6SEUE3XPXQVL\",\"WARC-Block-Digest\":\"sha1:A764T5QZKJILUDOMGAOR3W6XACBEWGSB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-35/CC-MAIN-2019-35_segments_1566027314904.26_warc_CC-MAIN-20190819180710-20190819202710-00052.warc.gz\"}"} |
https://ch.gateoverflow.in/459/gate-chemical-2017-question-64 | [
"Two machines $M1$ and $M2$ are able to execute any of four jobs $P,Q,R$ and $S$. The machines can perform one job on one object at a time. Jobs $P,Q,R$ and $S$ take $30$ minutes,$20$ minutes,$60$ minutes and $15$ minutes each respectively. There are $10$ objects each requiring exactly $1$ job. Job $P$ is to be performed on $2$ objects, Job $Q$ on $3$ objects, Job $R$ on $1$ object and Job $S$ on $4$ objects. What is the minimum time needed to complete all the jobs?\n\n1. $2$ hours\n2. $2.5$ hours\n3. $3$ hours\n4. $3.5$ hours"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8972113,"math_prob":1.0000049,"size":521,"snap":"2022-40-2023-06","text_gpt3_token_len":169,"char_repetition_ratio":0.16054158,"word_repetition_ratio":0.0,"special_character_ratio":0.3627639,"punctuation_ratio":0.13445379,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99996054,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-10-01T07:50:46Z\",\"WARC-Record-ID\":\"<urn:uuid:1e1807d2-ed15-4b08-92a2-aef31fefbfda>\",\"Content-Length\":\"47097\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:31820fd8-63d9-40aa-9ba6-af66493af7d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:7e975022-8773-427c-bb14-cfe9ecce14a7>\",\"WARC-IP-Address\":\"172.67.186.41\",\"WARC-Target-URI\":\"https://ch.gateoverflow.in/459/gate-chemical-2017-question-64\",\"WARC-Payload-Digest\":\"sha1:XBQUKJHEJKY5DNXEQBBHSNFLOHCMJ5N3\",\"WARC-Block-Digest\":\"sha1:UNMZZBFK2SCZOPJAPTUTVIOUXOSZUAQZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030335573.50_warc_CC-MAIN-20221001070422-20221001100422-00366.warc.gz\"}"} |
https://calculatorsonline.org/what-is-24-percent-off-13 | [
"# 24 percent off 13\n\nHere you will see step by step solution to calculate 24 percent off by 13. What is final price if original price is 13 and percentage is 24? The final price is 9.88, and the discount is 3.12. Check the detailed explanation of answer given below.\n\n## Answer: 24 percent off 13 is\n\n= 9.88\n\n### How to calculate the number 24 percent off 13?\n\nWith the help of given formula we can get the the percent off value -\n\nFormula 1: Discount = n × P% / 100, P = Discount(off) Percent, n = Number(Orig_price)\n\nHere we have, n = 13, P = 24%\nFormula 2: Result = n - Discount\n\n#### What is 24 percent off 13?\n\nGiven number n = 13, P = 24%\n\n• Put the n and P values in the given formula 1:\n• => 13 × 24%\n=> 13 × 24/100\n\n• Now we need to simplify the fraction by multiply 13 with 24 then divide it by 100\n• => 13 × 24/100 = 312/100 = 3.12\n• 24% off for 13 = 3.12\n• Now we will use formula 2 to get the final price of 24% off 13\n• = 13 - 3.12\n= 9.88\n\nTherefore, result is for 24% (percent) off 13 is 9.88 and difference is 3.12.\n\n#### Queries related to 24% off 13\n\nWhat is 24% off 13?\n\n3.12 is what percent off 13\\$?\n\nWhat is the final price of \\$13 item when it has 24 percent discount?\n\nWhat is\n%(Percent) off\nNum:"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8758245,"math_prob":0.99890286,"size":1148,"snap":"2023-40-2023-50","text_gpt3_token_len":376,"char_repetition_ratio":0.16608392,"word_repetition_ratio":0.024590164,"special_character_ratio":0.39982578,"punctuation_ratio":0.116981134,"nsfw_num_words":1,"has_unicode_error":false,"math_prob_llama3":0.999406,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-09-29T06:42:54Z\",\"WARC-Record-ID\":\"<urn:uuid:d2edd996-0547-4b40-bdd7-0ead5ca1ae59>\",\"Content-Length\":\"16761\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:dbf80393-db58-4026-a058-f3ca1f1e40c9>\",\"WARC-Concurrent-To\":\"<urn:uuid:9f2af090-e1de-4d2e-bc2f-c83d4fc416af>\",\"WARC-IP-Address\":\"104.21.85.191\",\"WARC-Target-URI\":\"https://calculatorsonline.org/what-is-24-percent-off-13\",\"WARC-Payload-Digest\":\"sha1:OVEIN4S4U5VDG773RDEYKTP2KRPVK6HE\",\"WARC-Block-Digest\":\"sha1:2OARLKI76NYCGVKS2GC7KQWPKHQRV6W2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-40/CC-MAIN-2023-40_segments_1695233510498.88_warc_CC-MAIN-20230929054611-20230929084611-00084.warc.gz\"}"} |
https://twiki.math.cornell.edu/do/rdiff/TWiki/VarCALCULATE | [
"# Difference: VarCALCULATE (1 vs. 3)\n\n#### Revision 32013-03-23 - TWikiContributor\n\nLine: 1 to 1\n\n META TOPICPARENT name=\"TWikiVariables\"\n\n### CALCULATE{\"formula\"} -- handle spreadsheet calculations outside tables\n\nChanged:\n<\n<\n• The `%CALCULATE{formula}%` variable is handled by the SpreadSheetPlugin. Around 100 functions are available, such as `\\$ABS()`, `\\$EXACT()`, `\\$EXISTS()`, `\\$GET()/\\$SET()`, `\\$IF()`, `\\$LOG()`, `\\$LOWER()`, `\\$PERCENTILE()`, `\\$TIME()`, `\\$VALUE()`.\n>\n>\n• The `%CALCULATE{formula}%` variable is handled by the SpreadSheetPlugin. Over 100 functions are available, such as `\\$ABS()`, `\\$EXACT()`, `\\$EXISTS()`, `\\$GET()/\\$SET()`, `\\$IF()`, `\\$LOG()`, `\\$LOWER()`, `\\$PERCENTILE()`, `\\$TIME()`, `\\$VALUE()`.\n\n• Syntax: `%CALC{formula}%`\n• Examples:\n• `%CALC{\\$EXISTS(Web.SomeTopic)}%` returns `1` if the topic exists\n\n#### Revision 22012-11-12 - TWikiContributor\n\nLine: 1 to 1\n\n META TOPICPARENT name=\"TWikiVariables\"\n\n### CALCULATE{\"formula\"} -- handle spreadsheet calculations outside tables\n\nLine: 7 to 7\n\n• Examples:\n• `%CALC{\\$EXISTS(Web.SomeTopic)}%` returns `1` if the topic exists\n• `%CALC{\\$UPPER(Collaboration)}%` returns `COLLABORATION`\nChanged:\n<\n<\n• Note: The CALCULATE variable is handled inside-out & left-to-right like ordinary TWiki variables, but it does not support functions that refer to table cells, such as `\\$LEFT()` or `\\$T()`. Use CALC instead.\n>\n>\n• Note: The CALCULATE variable is handled inside-out & left-to-right like ordinary TWiki variables, but it does not support functions that refer to table cells, such as `\\$LEFT()` or `\\$T()`. Use CALC instead.\n\n#### Revision 12012-06-30 - TWikiContributor\n\nLine: 1 to 1\n>\n>\n META TOPICPARENT name=\"TWikiVariables\"\n\n### CALCULATE{\"formula\"} -- handle spreadsheet calculations outside tables\n\n• The `%CALCULATE{formula}%` variable is handled by the SpreadSheetPlugin. Around 100 functions are available, such as `\\$ABS()`, `\\$EXACT()`, `\\$EXISTS()`, `\\$GET()/\\$SET()`, `\\$IF()`, `\\$LOG()`, `\\$LOWER()`, `\\$PERCENTILE()`, `\\$TIME()`, `\\$VALUE()`.\n• Syntax: `%CALC{formula}%`\n• Examples:\n• `%CALC{\\$EXISTS(Web.SomeTopic)}%` returns `1` if the topic exists\n• `%CALC{\\$UPPER(Collaboration)}%` returns `COLLABORATION`\n• Note: The CALCULATE variable is handled inside-out & left-to-right like ordinary TWiki variables, but it does not support functions that refer to table cells, such as `\\$LEFT()` or `\\$T()`. Use CALC instead.\n• Related: CALC, IF, IfStatements, SpreadSheetPlugin\n\nCopyright © 1999-2019 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.\nIdeas, requests, problems regarding TWiki? Send feedback"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6277736,"math_prob":0.9193339,"size":763,"snap":"2019-51-2020-05","text_gpt3_token_len":219,"char_repetition_ratio":0.1198946,"word_repetition_ratio":0.0,"special_character_ratio":0.29226735,"punctuation_ratio":0.2,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9981709,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-08T06:40:26Z\",\"WARC-Record-ID\":\"<urn:uuid:857428ba-a2f5-4685-9c9d-699a22e5620c>\",\"Content-Length\":\"16622\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c8f2bd80-422b-476a-bdd7-3abfe870ba67>\",\"WARC-Concurrent-To\":\"<urn:uuid:48cc272f-e837-44f7-94ba-e030efcb367e>\",\"WARC-IP-Address\":\"128.84.234.18\",\"WARC-Target-URI\":\"https://twiki.math.cornell.edu/do/rdiff/TWiki/VarCALCULATE\",\"WARC-Payload-Digest\":\"sha1:55ZLGIMO57WM6DHTPTSY5EGL5RXJPNYP\",\"WARC-Block-Digest\":\"sha1:KDA7TLQ6AP2Q4VGHOGJLRYVUF55XUQKB\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575540506459.47_warc_CC-MAIN-20191208044407-20191208072407-00336.warc.gz\"}"} |
https://la.mathworks.com/help/fusion/ref/trackingekf.predict.html | [
"Documentation\n\n# predict\n\nPredict state and state estimation error covariance of tracking filter\n\n## Syntax\n\n``[xpred,Ppred] = predict(filter)``\n``[xpred,Ppred] = predict(filter,dt)``\n``[xpred,Ppred] = predict(filter,predparams)``\n``[xpred,Ppred,zpred] = predict(filter)``\n``[xpred,Ppred,zpred] = predict(filter,dt)``\n``predict(filter,___)``\n``xpred = predict(filter,___)``\n\n## Description\n\nexample\n\n````[xpred,Ppred] = predict(filter)` returns the predicted state, `xpred`, and the predicted state estimation error covariance, `Ppred`, for the next time step of the input tracking filter. The predicted values overwrite the internal state and state estimation error covariance of `filter`.```\n````[xpred,Ppred] = predict(filter,dt)` specifies the time step as a positive scalar in seconds, and returns one or more of the outputs from the preceding syntaxes.```\n````[xpred,Ppred] = predict(filter,predparams)` specifies additional prediction parameters used by the state transition function. The state transition function is defined in the `StateTransitionFcn` property of `filter`.```\n````[xpred,Ppred,zpred] = predict(filter)` also returns the predicted measurement at the next time step.You can use this syntax only when `filter` is a `trackingABF` object.```\n````[xpred,Ppred,zpred] = predict(filter,dt)` returns the predicted state, state estimation error covariance, and measurement at the specified time step.You can use this syntax only when `filter` is a `trackingABF` object.```\n````predict(filter,___)` updates `filter` with the predicted state and state estimation error covariance without returning the predicted values. Specify the tracking filter and any of the input argument combinations from preceding syntaxes.```\n````xpred = predict(filter,___)` updates `filter` with the predicted state and state estimation error covariance but returns only the predicted state, `xpred`.```\n\n## Examples\n\ncollapse all\n\nCreate a two-dimensional `trackingEKF` object and use name-value pairs to define the `StateTransitionJacobianFcn` and `MeasurementJacobianFcn` properties. Use the predefined constant-velocity motion and measurement models and their Jacobians.\n\n```EKF = trackingEKF(@constvel,@cvmeas,[0;0;0;0], ... 'StateTransitionJacobianFcn',@constveljac, ... 'MeasurementJacobianFcn',@cvmeasjac);```\n\nRun the filter. Use the `predict` and `correct` functions to propagate the state. You may call `predict` and `correct` in any order and as many times you want. Specify the measurement in Cartesian coordinates.\n\n```measurement = [1;1;0]; [xpred, Ppred] = predict(EKF); [xcorr, Pcorr] = correct(EKF,measurement); [xpred, Ppred] = predict(EKF); [xpred, Ppred] = predict(EKF)```\n```xpred = 4×1 1.2500 0.2500 1.2500 0.2500 ```\n```Ppred = 4×4 11.7500 4.7500 0 0 4.7500 3.7500 0 0 0 0 11.7500 4.7500 0 0 4.7500 3.7500 ```\n\n## Input Arguments\n\ncollapse all\n\nFilter for object tracking, specified as one of these objects:\n\nTo use the `predict` function with a `trackingKF` linear Kalman filter, see `predict (trackingKF)`.\n\nTime step for next prediction, specified as a positive scalar in seconds.\n\nPrediction parameters used by the state transition function, specified as a comma-separated list of arguments. These arguments are the same arguments that are passed into the state transition function specified by the `StateTransitionFcn` property of the input `filter`.\n\nSuppose you set the `StateTransitionFcn` property to `@constacc` and then call the `predict` function:\n\n`[xpred,Ppred] = predict(filter,dt)`\nThe `predict` function internally calls the following:\n`state = constacc(state,dt)`\n\n## Output Arguments\n\ncollapse all\n\nPredicted state of the filter, specified as a vector or matrix. The `State` property of the input `filter` is overwritten with this value.\n\nPredicted state covariance of the filter, specified as a vector or matrix. The `StateCovariance` property of the input `filter` is overwritten with this value.\n\nPredicted measurement, specified as a vector or matrix. You can return `zpred` only when `filter` is a `trackingABF` object."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5018106,"math_prob":0.9658743,"size":767,"snap":"2019-43-2019-47","text_gpt3_token_len":166,"char_repetition_ratio":0.1559633,"word_repetition_ratio":0.037383176,"special_character_ratio":0.1851369,"punctuation_ratio":0.09565217,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.98268455,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-19T21:27:20Z\",\"WARC-Record-ID\":\"<urn:uuid:26909103-526f-42e1-9723-0d071c75fe0e>\",\"Content-Length\":\"92944\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d35e105a-035c-4008-af5d-ea674a0c900a>\",\"WARC-Concurrent-To\":\"<urn:uuid:47ce43ba-103f-4a05-8b20-cca211f1dff8>\",\"WARC-IP-Address\":\"104.110.193.39\",\"WARC-Target-URI\":\"https://la.mathworks.com/help/fusion/ref/trackingekf.predict.html\",\"WARC-Payload-Digest\":\"sha1:DSCV2UESUFIF5VACRTG6O4PELAHARU3Y\",\"WARC-Block-Digest\":\"sha1:LDF7EN6RAMDILMHHPF4S2ASQQ3PR67G7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670255.18_warc_CC-MAIN-20191119195450-20191119223450-00025.warc.gz\"}"} |
https://www.usefullinks.org/cat/Graph_families.html | [
"# Category: Graph families\n\nMedial graph\nIn the mathematical discipline of graph theory, the medial graph of plane graph G is another graph M(G) that represents the adjacencies between edges in the faces of G. Medial graphs were introduced i\nParity graph\nIn graph theory, a parity graph is a graph in which every two induced paths between the same two vertices have the same parity: either both paths have odd length, or both have even length. This class\nList of graphs by edges and vertices\nThis sortable list points to the articles describing various individual (finite) graphs. The columns 'vertices', 'edges', 'radius', 'diameter', 'girth', 'P' (whether the graph is planar), χ (chromatic\nLine graph\nIn the mathematical discipline of graph theory, the line graph of an undirected graph G is another graph L(G) that represents the adjacencies between edges of G. L(G) is constructed in the following w\nSemi-symmetric graph\nIn the mathematical field of graph theory, a semi-symmetric graph is an undirected graph that is edge-transitive and regular, but not vertex-transitive. In other words, a graph is semi-symmetric if ea\nApollonian network\nIn combinatorial mathematics, an Apollonian network is an undirected graph formed by a process of recursively subdividing a triangle into three smaller triangles. Apollonian networks may equivalently\nExtractor (mathematics)\nAn -extractor is a bipartite graph with nodes on the left and nodes on the right such that each node on the left has neighbors (on the right), which has the added property thatfor any subset of the le\nCage (graph theory)\nIn the mathematical area of graph theory, a cage is a regular graph that has as few vertices as possible for its girth. Formally, an (r, g)-graph is defined to be a graph in which each vertex has exac\nList of graphs\nThis partial list of graphs contains definitions of graphs and graph families which are known by particular names, but do not have a Wikipedia article of their own. For collected definitions of graph\nSkew-symmetric graph\nIn graph theory, a branch of mathematics, a skew-symmetric graph is a directed graph that is isomorphic to its own transpose graph, the graph formed by reversing all of its edges, under an isomorphism\nImplication graph\nIn mathematical logic and graph theory, an implication graph is a skew-symmetric, directed graph G = (V, E) composed of vertex set V and directed edge set E. Each vertex in V represents the truth stat\nPanconnectivity\nIn graph theory, a panconnected graph is an undirected graph in which, for every two vertices s and t, there exist paths from s to t of every possible length from the distance d(s,t) up to n − 1, wher\nOuterplanar graph\nIn graph theory, an outerplanar graph is a graph that has a planar drawing for which all vertices belong to the outer face of the drawing. Outerplanar graphs may be characterized (analogously to Wagne\nCop-win graph\nIn graph theory, a cop-win graph is an undirected graph on which the pursuer (cop) can always win a pursuit–evasion game against a robber, with the players taking alternating turns in which they can c\nSnark (graph theory)\nIn the mathematical field of graph theory, a snark is an undirected graph with exactly three edges per vertex whose edges cannot be colored with only three colors. In order to avoid trivial cases, sna\nSubhamiltonian graph\nIn graph theory and graph drawing, a subhamiltonian graph is a subgraph of a planar Hamiltonian graph.\nBipartite graph\nIn the mathematical field of graph theory, a bipartite graph (or bigraph) is a graph whose vertices can be divided into two disjoint and independent sets and , that is every edge connects a vertex in\nDescartes snark\nIn the mathematical field of graph theory, a Descartes snark is an undirected graph with 210 vertices and 315 edges. It is a snark, first discovered by William Tutte in 1948 under the pseudonym Blanch\nQuartic graph\nIn the mathematical field of graph theory, a quartic graph is a graph where all vertices have degree 4. In other words, a quartic graph is a 4-regular graph.\nCommon graph\nIn graph theory, an area of mathematics, common graphs belong to a branch of extremal graph theory concerning inequalities in homomorphism densities. Roughly speaking, is a common graph if it \"commonl\nHalf-transitive graph\nIn the mathematical field of graph theory, a half-transitive graph is a graph that is both vertex-transitive and edge-transitive, but not symmetric. In other words, a graph is half-transitive if its a\nStrongly regular graph\nIn graph theory, a strongly regular graph (SRG) is defined as follows. Let G = (V, E) be a regular graph with v vertices and degree k. G is said to be strongly regular if there are also integers λ and\nFactor-critical graph\nIn graph theory, a mathematical discipline, a factor-critical graph (or hypomatchable graph) is a graph with n vertices in which every subgraph of n − 1 vertices has a perfect matching. (A perfect mat\nLattice graph\nIn graph theory, a lattice graph, mesh graph, or grid graph is a graph whose drawing, embedded in some Euclidean space , forms a regular tiling. This implies that the group of bijective transformation\nHomogeneous graph\nIn mathematics, a k-ultrahomogeneous graph is a graph in which every isomorphism between two of its induced subgraphs of at most k vertices can be extended to an automorphism of the whole graph. A k-h\nContact graph\nIn the mathematical area of graph theory, a contact graph or tangency graph is a graph whose vertices are represented by geometric objects (e.g. curves, line segments, or polygons), and whose edges co\nMultipartite graph\nIn graph theory, a part of mathematics, a k-partite graph is a graph whose vertices are (or can be) partitioned into k different independent sets. Equivalently, it is a graph that can be colored with\nQuasi-bipartite graph\nIn the mathematical field of graph theory, an instance of the Steiner tree problem (consisting of an undirected graph G and a set R of terminal vertices that must be connected to each other) is said t\nAntiprism graph\nIn the mathematical field of graph theory, an antiprism graph is a graph that has one of the antiprisms as its skeleton. An n-sided antiprism has 2n vertices and 4n edges. They are regular, polyhedral\nConvex bipartite graph\nIn the mathematical field of graph theory, a convex bipartite graph is a bipartite graph with specific properties.A bipartite graph, (U ∪ V, E), is said to be convex over the vertex set U if U can be\nReeb graph\nA Reeb graph (named after Georges Reeb by René Thom) is a mathematical object reflecting the evolution of the level sets of a real-valued function on a manifold.According to a similar concept was intr\nMedian graph\nIn graph theory, a division of mathematics, a median graph is an undirected graph in which every three vertices a, b, and c have a unique median: a vertex m(a,b,c) that belongs to shortest paths betwe\nNull graph\nIn the mathematical field of graph theory, the term \"null graph\" may refer either to the order-zero graph, or alternatively, to any edgeless graph (the latter is sometimes called an \"empty graph\").\nVertex-transitive graph\nIn the mathematical field of graph theory, a vertex-transitive graph is a graph G in which, given any two vertices v1 and v2 of G, there is some automorphism such that In other words, a graph is verte\nSymmetric graph\nIn the mathematical field of graph theory, a graph G is symmetric (or arc-transitive) if, given any two pairs of adjacent vertices u1—v1 and u2—v2 of G, there is an automorphism such that and In other\nWalk-regular graph\nIn discrete mathematics, a walk-regular graph is a simple graph where the number of closed walks of any length from a vertex to itself does not depend on the choice of vertex.\nTrivially perfect graph\nIn graph theory, a trivially perfect graph is a graph with the property that in each of its induced subgraphs the size of the maximum independent set equals the number of maximal cliques. Trivially pe\nWell-colored graph\nIn graph theory, a subfield of mathematics, a well-colored graph is an undirected graph for which greedy coloring uses the same number of colors regardless of the order in which colors are chosen for\nTriangle-free graph\nIn the mathematical area of graph theory, a triangle-free graph is an undirected graph in which no three vertices form a triangle of edges. Triangle-free graphs may be equivalently defined as graphs w\nGallery of named graphs\nSome of the finite structures considered in graph theory have names, sometimes inspired by the graph's topology, and sometimes after their discoverer. A famous example is the Petersen graph, a concret\nPlatonic graph\nIn the mathematical field of graph theory, a Platonic graph is a graph that has one of the Platonic solids as its skeleton. There are 5 Platonic graphs, and all of them are regular, polyhedral (and th\nHypohamiltonian graph\nIn the mathematical field of graph theory, a graph G is said to be hypohamiltonian if G itself does not have a Hamiltonian cycle but every graph formed by removing a single vertex from G is Hamiltonia\nLeaf power\nIn the mathematical area of graph theory, a k-leaf power of a tree T is a graph G whose vertices are the leaves of T and whose edges connect pairs of leaves whose distance in T is at most k. That is,\nBlock graph\nIn graph theory, a branch of combinatorial mathematics, a block graph or clique tree is a type of undirected graph in which every biconnected component (block) is a clique. Block graphs are sometimes\nSelf-complementary graph\nIn the mathematical field of graph theory, a self-complementary graph is a graph which is isomorphic to its complement. The simplest non-trivial self-complementary graphs are the 4-vertex path graph a\nExpander graph\nIn graph theory, an expander graph is a sparse graph that has strong connectivity properties, quantified using vertex, edge or spectral expansion. Expander constructions have spawned research in pure\nPolytope graph\nNo description available.\nK-edge-connected graph\nIn graph theory, a connected graph is k-edge-connected if it remains connected whenever fewer than k edges are removed. The edge-connectivity of a graph is the largest k for which the graph is k-edge-\nCayley graph\nIn mathematics, a Cayley graph, also known as a Cayley color graph, Cayley diagram, group diagram, or color group is a graph that encodes the abstract structure of a group. Its definition is suggested\nScale-free network\nA scale-free network is a network whose degree distribution follows a power law, at least asymptotically. That is, the fraction P(k) of nodes in the network having k connections to other nodes goes fo\nDistance-hereditary graph\nIn graph theory, a branch of discrete mathematics, a distance-hereditary graph (also called a completely separable graph) is a graph in which the distances in any connected induced subgraph are the sa\nDistance-transitive graph\nIn the mathematical field of graph theory, a distance-transitive graph is a graph such that, given any two vertices v and w at any distance i, and any other two vertices x and y at the same distance,\nComparability graph\nIn graph theory, a comparability graph is an undirected graph that connects pairs of elements that are comparable to each other in a partial order. Comparability graphs have also been called transitiv\nDually chordal graph\nIn the mathematical area of graph theory, an undirected graph G is dually chordal if the hypergraph of its maximal cliques is a hypertree. The name comes from the fact that a graph is chordal if and o\nApex graph\nIn graph theory, a branch of mathematics, an apex graph is a graph that can be made planar by the removal of a single vertex. The deleted vertex is called an apex of the graph. It is an apex, not the\nAsymmetric graph\nIn graph theory, a branch of mathematics, an undirected graph is called an asymmetric graph if it has no nontrivial symmetries. Formally, an automorphism of a graph is a permutation p of its vertices\nDisperser\nA disperser is a one-sided extractor. Where an extractor requires that every event gets the same probability under the uniform distribution and the extracted distribution, only the latter is required\nMeyniel graph\nIn graph theory, a Meyniel graph is a graph in which every odd cycle of length five or more has at least two chords (edges connecting non-consecutive vertices of the cycle). The chords may be uncrosse\nModular graph\nIn graph theory, a branch of mathematics, the modular graphs are undirected graphs in which every three vertices x, y, and z have at least one median vertex m(x, y, z) that belongs to shortest paths b\nCirculant graph\nIn graph theory, a circulant graph is an undirected graph acted on by a cyclic group of symmetries which takes any vertex to any other vertex. It is sometimes called a cyclic graph, but this term has\nAperiodic graph\nIn the mathematical area of graph theory, a directed graph is said to be aperiodic if there is no integer k > 1 that divides the length of every cycle of the graph. Equivalently, a graph is aperiodic\nHalin graph\nIn graph theory, a Halin graph is a type of planar graph, constructed by connecting the leaves of a tree into a cycle.The tree must have at least four vertices, none of which has exactly two neighbors\nWord-representable graph\nIn the mathematical field of graph theory, a word-representable graph is a graph that can be characterized by a word (or sequence) whose entries alternate in a prescribed way. In particular, if the ve\nCactus graph\nIn graph theory, a cactus (sometimes called a cactus tree) is a connected graph in which any two simple cycles have at most one vertex in common. Equivalently, it is a connected graph in which every e\nSplit graph\nIn graph theory, a branch of mathematics, a split graph is a graph in which the vertices can be partitioned into a clique and an independent set. Split graphs were first studied by Földes and Hammer ,\nLine graph of a hypergraph\nIn graph theory, particularly in the theory of hypergraphs, the line graph of a hypergraph H, denoted L(H), is the graph whose vertex set is the set of the hyperedges of H, with two vertices adjacent\nBound graph\nIn graph theory, a bound graph expresses which pairs of elements of some partially ordered set have an upper bound. Rigorously, any graph G is a bound graph if there exists a partial order ≤ on the ve\nMoore graph\nIn graph theory, a Moore graph is a regular graph whose girth (the shortest cycle length) is more than twice its diameter (the distance between the farthest two vertices). If the degree of such a grap\nPtolemaic graph\nIn graph theory, a Ptolemaic graph is an undirected graph whose shortest path distances obey Ptolemy's inequality, which in turn was named after the Greek astronomer and mathematician Ptolemy. The Pto\nBiconnected graph\nIn graph theory, a biconnected graph is a connected and \"nonseparable\" graph, meaning that if any one vertex were to be removed, the graph will remain connected. Therefore a biconnected graph has no a\nSimplex graph\nIn graph theory, a branch of mathematics, the simplex graph κ(G) of an undirected graph G is itself a graph, with one node for each clique (a set of mutually adjacent vertices) in G. Two nodes of κ(G)\nCluster graph\nIn graph theory, a branch of mathematics, a cluster graph is a graph formed from the disjoint union of complete graphs.Equivalently, a graph is a cluster graph if and only if it has no three-vertex in\nLaman graph\nIn graph theory, the Laman graphs are a family of sparse graphs describing the minimally rigid systems of rods and joints in the plane. Formally, a Laman graph is a graph on n vertices such that, for\nPairwise compatibility graph\nIn graph theory, a graph is a pairwise compatibility graph (PCG) if there exists a tree and two non-negative real numbers such that each node of has a one-to-one mapping with a leaf node of such that\nPartial k-tree\nIn graph theory, a partial k-tree is a type of graph, defined either as a subgraph of a k-tree or as a graph with treewidth at most k. Many NP-hard combinatorial problems on graphs are solvable in pol\nBiased graph\nIn mathematics, a biased graph is a graph with a list of distinguished circles (edge sets of simple cycles), such that if two circles in the list are contained in a theta graph, then the third circle\nK-tree\nIn graph theory, a k-tree is an undirected graph formed by starting with a (k + 1)-vertex complete graph and then repeatedly adding vertices in such a way that each added vertex v has exactly k neighb\nToroidal graph\nIn the mathematical field of graph theory, a toroidal graph is a graph that can be embedded on a torus. In other words, the graph's vertices can be placed on a torus such that no edges cross.\nPetersen family\nIn graph theory, the Petersen family is a set of seven undirected graphs that includes the Petersen graph and the complete graph K6. The Petersen family is named after Danish mathematician Julius Pete\nThreshold graph\nIn graph theory, a threshold graph is a graph that can be constructed from a one-vertex graph by repeated applications of the following two operations: 1. * Addition of a single isolated vertex to th\nForcing graph\nIn graph theory, a forcing graph is one whose density determines whether a graph sequence is quasi-random. The term was first coined by Chung, Graham, and Wilson in 1989., and forcing graphs play an i\nZero-symmetric graph\nIn the mathematical field of graph theory, a zero-symmetric graph is a connected graph in which each vertex has exactly three incident edges and, for each two vertices, there is a unique symmetry taki\nLévy family of graphs\nIn graph theory, a branch of mathematics, a Lévy family of graphs is a family of graphs Gn, n = 1, 2, 3, ..., which possess a certain type of \"compactness\" or \"tangledness\". Many naturally occurring f\nCritical graph\nIn graph theory, a critical graph is an undirected graph all of whose subgraphs have smaller chromatic number. In such a graph, every vertex or edge is a critical element, in the sense that its deleti\nEven-hole-free graph\nIn the mathematical area of graph theory, a graph is even-hole-free if it contains no induced cycle with an even number of vertices. demonstrated that every even-hole-free graph contains a , which set\nHighly irregular graph\nIn graph theory, a highly irregular graph is a graph in which, for every vertex, all neighbors of that vertex have distinct degrees.\nLinear forest\nIn graph theory, a branch of mathematics, a linear forest is a kind of forest formed from the disjoint union of path graphs. It is an undirected graph with no cycles in which every vertex has degree a\nHanan grid\nIn geometry, the Hanan grid H(S) of a finite set S of points in the plane is obtained by constructing vertical and horizontal lines through each point in S. The main motivation for studying the Hanan\nPartial cube\nIn graph theory, a partial cube is a graph that is isometric to a subgraph of a hypercube. In other words, a partial cube can be identified with a subgraph of a hypercube in such a way that the distan\nBiclique-free graph\nIn graph theory, a branch of mathematics, a t-biclique-free graph is a graph that has no 2t-vertex complete bipartite graph Kt,t as a subgraph. A family of graphs is biclique-free if there exists a nu\nPancyclic graph\nIn the mathematical study of graph theory, a pancyclic graph is a directed graph or undirected graph that contains cycles of all possible lengths from three up to the number of vertices in the graph.\nK-vertex-connected graph\nIn graph theory, a connected graph G is said to be k-vertex-connected (or k-connected) if it has more than k vertices and remains connected whenever fewer than k vertices are removed. The vertex-conne\nOverfull graph\nIn graph theory, an overfull graph is a graph whose size is greater than the product of its maximum degree and half of its order floored, i.e. where is the size of G, is the maximum degree of G, and i\nIntegral graph\nIn the mathematical field of graph theory, an integral graph is a graph whose adjacency matrix's spectrum consists entirely of integers. In other words, a graph is an integral graph if all of the root\nKronecker graph\nKronecker graphs are a construction for generating graphs for modeling systems. The method constructs a sequence of graphs from a small base graph by iterating the Kronecker product. A variety of gene\nPlanar graph\nIn graph theory, a planar graph is a graph that can be embedded in the plane, i.e., it can be drawn on the plane in such a way that its edges intersect only at their endpoints. In other words, it can\nCograph\nIn graph theory, a cograph, or complement-reducible graph, or P4-free graph, is a graph that can be generated from the single-vertex graph K1 by complementation and disjoint union. That is, the family\nRamanujan graph\nIn the mathematical field of spectral graph theory, a Ramanujan graph is a regular graph whose spectral gap is almost as large as possible (see extremal graph theory). Such graphs are excellent spectr\nBivariegated graph\nIn graph theory, a bivariegated graph is a graph whose vertex set can be partitioned into two equal parts such that each vertex is adjacent to exactly one vertex from the other set not containing it.I\nPseudoforest\nIn graph theory, a pseudoforest is an undirected graph in which every connected component has at most one cycle. That is, it is a system of vertices and edges connecting pairs of vertices, such that n\nClaw-free graph\nIn graph theory, an area of mathematics, a claw-free graph is a graph that does not have a claw as an induced subgraph. A claw is another name for the complete bipartite graph K1,3 (that is, a star gr\nDistance-regular graph\nIn the mathematical field of graph theory, a distance-regular graph is a regular graph such that for any two vertices v and w, the number of vertices at distance j from v and at distance k from w depe\nRegular graph\nIn graph theory, a regular graph is a graph where each vertex has the same number of neighbors; i.e. every vertex has the same degree or valency. A regular directed graph must also satisfy the stronge\nGeodetic graph\nIn graph theory, a geodetic graph is an undirected graph such that there exists a unique (unweighted) shortest path between each two vertices. Geodetic graphs were introduced in 1962 by Øystein Ore, w\nChordal graph\nIn the mathematical area of graph theory, a chordal graph is one in which all cycles of four or more vertices have a chord, which is an edge that is not part of the cycle but connects two vertices of\nWell-covered graph\nIn graph theory, a well-covered graph is an undirected graph in which every minimal vertex cover has the same size as every other minimal vertex cover. Equivalently, these are the graphs in which all\nMap graph\nIn graph theory, a branch of mathematics, a map graph is an undirected graph formed as the intersection graph of finitely many simply connected and internally disjoint regions of the Euclidean plane.\nSeries–parallel graph\nIn graph theory, series–parallel graphs are graphs with two distinguished vertices called terminals, formed recursively by two simple composition operations. They can be used to model series and paral\nConference graph\nIn the mathematical area of graph theory, a conference graph is a strongly regular graph with parameters v, k = (v − 1)/2, λ = (v − 5)/4, and μ = (v − 1)/4. It is the graph associated with a symmetric\nUniversal graph\nIn mathematics, a universal graph is an infinite graph that contains every finite (or at-most-countable) graph as an induced subgraph. A universal graph of this type was first constructed by Richard R\nChordal bipartite graph\nIn the mathematical area of graph theory, a chordal bipartite graph is a bipartite graph B = (X,Y,E) in which every cycle of length at least 6 in B has a chord, i.e., an edge that connects two vertice\nCubic graph\nIn the mathematical field of graph theory, a cubic graph is a graph in which all vertices have degree three. In other words, a cubic graph is a 3-regular graph. Cubic graphs are also called trivalent\nLocally linear graph\nIn graph theory, a locally linear graph is an undirected graph in which every edge belongs to exactly one triangle. Equivalently, for each vertex of the graph, its neighbors are each adjacent to exact\nForbidden graph characterization\nIn graph theory, a branch of mathematics, many important families of graphs can be described by a finite set of individual graphs that do not belong to the family and further exclude all graphs from t\nDomination perfect graph\nNo description available.\nStrongly chordal graph\nIn the mathematical area of graph theory, an undirected graph G is strongly chordal if it is a chordal graph and every cycle of even length (≥ 6) in G has an odd chord, i.e., an edge that connects two\nPrism graph\nIn the mathematical field of graph theory, a prism graph is a graph that has one of the prisms as its skeleton.\nSquaregraph\nIn graph theory, a branch of mathematics, a squaregraph is a type of undirected graph that can be drawn in the plane in such a way that every bounded face is a quadrilateral and every vertex with thre\nStrangulated graph\nIn graph theoretic mathematics, a strangulated graph is a graph in which deleting the edges of any induced cycle of length greater than three would disconnect the remaining graph. That is, they are th\nDense graph\nIn mathematics, a dense graph is a graph in which the number of edges is close to the maximal number of edges (where every pair of vertices is connected by one edge). The opposite, a graph with only a\nSmall-world network\nA small-world network is a type of mathematical graph in which most nodes are not neighbors of one another, but the neighbors of any given node are likely to be neighbors of each other and most nodes\nEdge-transitive graph\nIn the mathematical field of graph theory, an edge-transitive graph is a graph G such that, given any two edges e1 and e2 of G, there is an automorphism of G that maps e1 to e2. In other words, a grap"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.95047027,"math_prob":0.9858093,"size":25840,"snap":"2023-40-2023-50","text_gpt3_token_len":5899,"char_repetition_ratio":0.26915932,"word_repetition_ratio":0.12101482,"special_character_ratio":0.2008127,"punctuation_ratio":0.08146068,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996087,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-11T22:19:25Z\",\"WARC-Record-ID\":\"<urn:uuid:a0305241-1b0c-4da2-9702-381c335b91c1>\",\"Content-Length\":\"60335\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bf2c3f9b-48e9-45a4-8d24-b3c461071b60>\",\"WARC-Concurrent-To\":\"<urn:uuid:05f7914e-e470-4dce-80b6-179bead67e5d>\",\"WARC-IP-Address\":\"18.67.76.58\",\"WARC-Target-URI\":\"https://www.usefullinks.org/cat/Graph_families.html\",\"WARC-Payload-Digest\":\"sha1:MQX7YFJSB5VPXGGMJOQ5RZHEODGOHPIL\",\"WARC-Block-Digest\":\"sha1:UZTY4SMWUS433MHTS2GIQNDUJ2G4QDAA\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679518883.99_warc_CC-MAIN-20231211210408-20231212000408-00268.warc.gz\"}"} |
https://or.stackexchange.com/questions/3028/linear-programming-with-if-then-else-big-m | [
"# Linear programming with if-then-else (big-M)\n\nI am trying to formulate the following in linear programming. $$\\begin{cases}\\text{if}\\,\\,a>b\\,\\,\\text{then}\\,\\,c=a\\\\\\text{else}\\,\\,c=b.\\end{cases}$$\n\nI tried some things with big $$M$$, like $$a + my > b+m(1-y),$$ so that $$y$$ (binary) can be used to pick either $$a$$ or $$b$$ or $$c$$.\n\nI know this does not work, because $$y$$ will always be $$1$$ in this example. But even with the help of other examples I cannot seem to figure it out. Any tips?\n\n• A nice topic on big $M$ formulation could be found here. – A.Omidi Nov 12 '19 at 5:37\n\nEquivalently, $$c=\\max(a,b)$$. See this post."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9132752,"math_prob":0.9998223,"size":432,"snap":"2020-34-2020-40","text_gpt3_token_len":137,"char_repetition_ratio":0.10046729,"word_repetition_ratio":0.0,"special_character_ratio":0.3310185,"punctuation_ratio":0.16346154,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999794,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-09-29T16:46:21Z\",\"WARC-Record-ID\":\"<urn:uuid:5c5e248b-d68c-4c11-bb60-a763310c283f>\",\"Content-Length\":\"140922\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:40b7f95d-733a-44ee-9414-0f5eb26a7a5c>\",\"WARC-Concurrent-To\":\"<urn:uuid:4a2470d1-7e71-45ef-9806-5b7234b3901d>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://or.stackexchange.com/questions/3028/linear-programming-with-if-then-else-big-m\",\"WARC-Payload-Digest\":\"sha1:PIXFOHVU2MFBGQYZXKVEGYWSYPX2LSJM\",\"WARC-Block-Digest\":\"sha1:QSCBY3ITIKALODMESPPKAQKPWIOT2T3G\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-40/CC-MAIN-2020-40_segments_1600400202418.22_warc_CC-MAIN-20200929154729-20200929184729-00437.warc.gz\"}"} |
https://www.arxiv-vanity.com/papers/2007.04596/ | [
"# Learning Over-Parametrized Two-Layer ReLU Neural Networks beyond NTK\n\nYuanzhi Li Carnegie Mellon University. Tengyu Ma Stanford University. Hongyang R. Zhang University of Pennsylvania.\nFebruary 20, 2021\n###### Abstract\n\nWe consider the dynamic of gradient descent for learning a two-layer neural network. We assume the input is drawn from a Gaussian distribution and the label of satisfies , where is a nonnegative vector and is an orthonormal matrix. We show that an over-parametrized two-layer neural network with ReLU activation, trained by gradient descent from random initialization, can provably learn the ground truth network with population loss at most in polynomial time with polynomial samples. On the other hand, we prove that any kernel method, including Neural Tangent Kernel, with a polynomial number of samples in , has population loss at least .\n\n## 1 Introduction\n\nGradient-based optimization methods are the method of choice for learning neural networks. However, it has been challenging to understand their working on non-convex functions. Prior works prove that stochastic gradient descent provably convergences to an approximate local optimum (Ge et al., 2015; Sun et al., 2015; Lee et al., 2017; Kleinberg et al., 2018). Remarkably, for many highly complex neural net models, gradient-based methods can also find high-quality solutions (Sun, 2019) and interpretable features (Zeiler and Fergus, 2014).\n\nRecent studies made the connection between training wide neural networks and Neural Tangent Kernels (NTK) (Jacot et al., 2018; Arora et al., 2019b; Cao and Gu, 2019; Du et al., 2018c). The main idea is that training neural networks with gradient descent with a particular initialization is equivalent to using kernel methods. However, the NTK approach has not yet provided a fully satisfactory theory for explaining the success of neural networks. Empirically, there seems to be a non-negligible gap between the test performance of neural networks trained by SGD and that of the NTK (Arora et al., 2019a; Li et al., 2019b). Recent works have suspected that the gap stems from that the NTK approach has difficulty dealing with non-trivial explicit regularizers or does not sufficiently leverage the implicit regularization of the algorithm (Wei et al., 2019; Chizat and Bach, 2018b; Li et al., 2019a; HaoChen et al., 2020).\n\nIn this work, we provide a new convergence analysis of the gradient descent dynamic on an over-parametrized two-layer ReLU neural network. We prove that for learning a certain two-layer target network with orthonormal ground truth weights, gradient descent is provably more accurate than any kernel method that uses polynomially large feature maps.\n\n### 1.1 Setup and Main Result\n\nWe assume that the input is drawn from the Gaussian distribution . We focus on the realizable setting, i.e. the label of is generated according to a target network with neurons. We study a two-layer target neural network with absolute value activation:\n\n f⋆(x)=d∑i=1ai\\Absw⋆i⊤x, (1.1)\n\nwhere is in for an absolute constant and satisfies , and forms an orthonormal basis. Equation (1.1) can also be written as the sum of neurons with ReLU activation:\n\n f⋆(x)=d∑i=1ai(ReLU(w⋆i⊤x)+ReLU(−w⋆i⊤x)).\n\nLet be a training dataset of i.i.d. samples from the Gaussian distribution with identity covariance and for any .\n\nWe learn the target network using an over-parametrized two-layer ReLU network with neurons , given by:\n\n fW(x)=1mm∑i=1\\normwi⋅∗ReLU(w⊤ix). (1.2)\n\nNote that we have re-parametrized the output layer with the norm of the corresponding neuron, so that we only have one set of parameters . This is without loss of generality for learning because when , is equal to where . Given a training dataset , we learn the target network by minimizing the following empirical loss:\n\n ^L(W)=1NN∑i=1(fW(xi)−yi)2.\n\nLet denote the population loss given by the expectation of over .\n\nAlgorithm. We focus on truncated gradient descent with random initialization. Algorithm 1 describes the procedure.An interesting feature is that when a neuron becomes larger than a certain threshold, we no longer update the neuron. This is a variant of gradient clipping often used in training recurrent neural networks (e.g. Merity et al. (2017); Gehring et al. (2017); Peters et al. (2018)) — here we drop the gradients of the large weights instead of re-scaling them. The truncation allows us to upper bound the norm of every neuron. Our main result is to show that Algorithm 1 learns the target network accurately in polynomially many iterations.\n\n###### Theorem 1.1 (Main result).\n\nLet be a training dataset with samples generated by the model described above.111Let denote a polynomial of and denote a polynomial whose degree may depend on . Let be a sufficiently large constant that only depends on . Let be a sufficiently small absolute constant that does not depend on . Let be a sufficiently small value on the order of and be a sufficiently small value on the order of . For a learning rate , a network width , and truncation parameters , let be the final network learned by Algorithm 1. With probability over the choice of the random initialization, we have that the population loss of satisfies\n\n L(^W)≤O(1/d1+Q).\n\nThe intuition behind our main result is as follows. We build on a connection between the popluation and tensor decomposition for Gaussian inputs (Ge et al., 2017, 2018). By expanding the population loss in the Hermite polynomial basis, the optimization problem becomes an infinite sum of tensor decompositions problems (cf. equation (2) in Section 2) To analyze the gradient descent dynamic on the infinite sum tensor decomposition objective, we first analyze the infinite-width case – when goes to infinity. We establish a conditional-symmetry condition on the population of neurons, which greatly simplifies the analysis. This is established using the fact that our input distribution and labeling function (the absolute value activation) are both symmetric. Our analysis uncovers a stage-wise convergence of the gradient descent dynamic as follows, which matches our observations in simulations.\n\n• First, Algorithm 1 minimizes the 0th and 2nd order tensor decompositions. Informally, the distribution of neurons is fitting to the 0th moment and the 2nd moment of .\n\n• Second, Algorithm 1 minimizes the 4th and higher order tensor decompositions. Initially, there is a long plateau where the evolution is slow, but after a certain point gets faster. As a remark, this behavior has been observed for randomly initialized tensor power method (Anandkumar et al., 2017). Because the solution to the 4th and higher order orthogonal tensor decomposition problems is unique, we can learn the ground truth weights .\n\nThen we show that the sampling error between the infinite-width case and the finite-width case is small. The finite-width case can be thought of as a finite sample of the infinite-width case. As the network width increases, the sampling error reduces. In Section 3 and 4, we will first present a proof overview. The full proof is given in Section A and B.\n\nAs a complement, we show that the generalization error bound of Theorem 1.1 cannot be achieved by kernel functions with polynomially large feature map. Hence, by minimizing the higher order tensor decomposition terms, the learned neural network is provably more accurate than kernel functions that simply fit the lower order terms. Our result is stated as follows.\n\n###### Theorem 1.2 (Lower bound).\n\nUnder either of the following two situations,\n\n• We use a feature map with\n\n• We use kernel method with any kernel with samples.\n\nThere exists a set of orthonormal weights and where for all satisfying , such that the following holds: With probability at least over the training set , for any with and , the population loss of the feature map and kernel , denoted by and , satisfies\n\n L(R)=Ω(1d) and L(K)=Ω(1d). (1.3)\n\nComparing the above result with Theorem 1.1, we conclude that provided with polynomially many samples, Algorithm 1 can recover the target two-layer neural network more accurately than the feature map and kernel method described above. Section C shows how to prove Theorem 1.2.\n\n### 1.2 Related Work\n\nNeural tangent kernel (NTK). A sequence of recent work shows that the learning process of gradient descent on over-parametrized neural networks, under certain initializations, reduces to the learning process of the associated neural tangent kernel. See Jacot et al. (2018); Arora et al. (2019b); Cao and Gu (2019); Du et al. (2018c); Arora et al. (2019a); Allen-Zhu and Li (2019b); Allen-Zhu et al. (2019c, b); Li and Liang (2018); Zou et al. (2018); Du et al. (2018a); Daniely et al. (2016); Ghorbani et al. (2019); Li et al. (2019a); Hanin and Nica (2019); Yang (2019) and the references therein. For NTK based results, the learning process of gradient descent can be viewed as solving convex kernel regression. Our work analyzes a non-convex objective that involves an infinite sum of tensor decomposition problems. By analyzing the higher order tensor decompositions, we can achieve a smaller generalization error than kernel methods.\n\nAllen-Zhu and Li (2019a, 2020a) show that over-parametrized neural networks can learn certain concept class more efficient than any kernel method. Their work assumes the target network satisfies a certain “information gap” assumption between the first and second layer, while our target network does not require such gaps. Allen-Zhu et al. (2019a); Bai and Lee (2019) go beyond NTK by studying quadratic approximations of neural networks. Our work further analyzes higher-order tensor decompositions that are present in the Taylor expansion of the loss objective.\n\nTwo-layer neural networks given Gaussian inputs. There is a large body of work on learning two-layer neural networks over the last few years, such as Kawaguchi (2016); Soudry and Carmon (2016); Xie et al. (2016); Soltanolkotabi et al. (2017); Tian (2017); Brutzkus and Globerson (2017); Boob and Lan (2017); Vempala and Wilmes (2018); Oymak and Soltanolkotabi (2019); Bakshi et al. (2018); Yehudai and Shamir (2019); Zhang et al. (2018); Li and Liang (2017); Li and Dou (2020); Allen-Zhu and Li (2020b). Our work is particularly related to those that learn a two-layer neural network given Gaussian inputs. Li and Yuan (2017); Zhong et al. (2017) consider learning two-layer networks with ReLU activations with a warm start tensor initialization, as opposed to from a random initialization. Du et al. (2017) consider learning a target function consisting of a single ReLU activation. Brutzkus and Globerson (2017); Tian (2017) study the case where the weight vector for each neuron has disjoint support. Apart from the gradient descent algorithm, the method of moments has also been shown to be an effective strategy with provable guarantees (e.g. (Bakshi et al., 2018; Ge et al., 2018)).\n\nThe closest work to ours is Ge et al. (2017) that consider a similar concept class. However, their work requires designing a complicated loss function, which is different from the mean squared loss. The learner network also uses a low-degree activation function as opposed to the ReLU activation. These are introduced to address the challenge of analyzing non-convex optimization for tensor decomposition with multiple components as variables, because prior works mostly focus on the non-convex formulation that optimizes over a single component (e.g., see (Ge and Ma, 2017)). Ge et al. (2017) have stated the question of analyzing the gradient descent dynamic for minimizing the sum of second and fourth order tensor decompositions as a challenging open question. Our analysis not only applies to this setting, but also allows for more even order tensor decompositions. Apart from ReLU activations, quadratic activations have been studied in Li et al. (2018); Oymak and Soltanolkotabi (2019); Soltanolkotabi et al. (2017).\n\nInfinite-width neural networks. Previous work such as Mei et al. (2018); Chizat and Bach (2018a) show that as the hidden layer width goes to infinity, gradient descent approaches the Wasserstein gradient flow. Mei et al. (2018) use tools from partial differential equations to prove the global convergence of the gradient descent. Both of these results do not provide explicit convergence rates. Wei et al. (2018) show that under a certain regularity assumption on the activation function, the Wasserstein gradient flow converges in polynomial iterations for infinite-width neural networks..\n\nOrganizations. The rest of the paper is organized as follows. In Section 2, we reduce our setting to learning a sum of tensor decomposition problems. In Section 3, we describe an overview of the analysis for the infinite-width case. In Section 4, we show how to connect the above case to the gradient descent dynamic on the empirical loss for polynomially-wide networks. Finally we validate our theoretical insight on simulations in Section 5. In Section A, we provide the proof of the infinite-width case. In Section B, we provide an error analysis of the infinite-width case and complete the proof of Theorem 1.1. In Section C, we present the proof of Theorem 1.2.\n\n## 2 Preliminaries\n\nRecall that the ground-truth weights forms an orthonormal basis. Since the input distribution and the initialization are both rotation invariant, without loss of generality we can assume that , for all .\n\nWe can average out the randomness in by applying Theorem 2.1 of Ge et al. (2017) on the loss function , by expanding the activations function in the Hermite basis (O’Donnell, 2014).\n\n L(W)= c0\\bignormFro1mm∑i=1\\normwi2−d∑i=1ai2+c1\\bignormFro1mm∑i=1\\normwiwi2+c2\\bignormFro1mm∑i=1w⊗2i−d∑i=1aieie⊤i2 +∑j≥2c2j\\bignormFro1mm∑i=1wi⊗2⊗¯wi⊗(2j−2)−d∑i=1aie⊗2ji2, (2.1)\n\nwhere is the Hermite coefficients of the absolute value function for any . We remark that the population loss is a infinite sum of orthogonal tensor decomposition problems! For example, the -th order tensor decomposition concerns the -norm of the weights. More generally, the -order tensor decomposition concerns the -th moment of the weights.\n\nThe distribution of neuron weights. We begin by considering an infinite-width neural network and then extend the proof to finite-width neural networks. Following Wei et al. (2018), an infinite-width neural network specifies a distribution of neuron weights. Let denote a distribution over . A learner network (cf. equation (1.2)) using as its neuron weights gives the output for an input from the Gaussian distribution:\n\n fP(x)=\\exargw∼P∥w∥2⋅ReLU(w⊤x). (2.2)\n\nCorrespondingly, the population loss of is given as\n\n L∞(P)= c0\\bignormFroEw∼P\\normw2−d∑iai2+c1\\bignormFroEw∼Pw∥w∥22+c2\\bignormFroEw∼Pw⊗2−d∑i=1aieie⊤i2 +∑j≥2c2j\\bignormFroEw∼Pw⊗2⊗¯w⊗(2j−2)−d∑i=1aie⊗2ji2. (2.3)\n\nGradient descent update. It has been shown in prior works that gradient descent in the (natural) parameter space corresponds to Wasserstein gradient descent in the distributional space. However, we found that the Wasserstein gradient perspective is not particularly helpful for us to analyze our algorithms and therefore we work with the update in the parameter space. The distribution can be viewed as a collection of infinitesimal neurons. The gradient of each neuron is given by computing the gradient of the objective w.r.t a particle assuming the rest of the particles follow the distribution . Let denote the gradient of . We have that\n\n ∇vL∞(P)\\defineb0(∗Ew∼P∥w∥22−1)v+b1(Ew∼P∥w∥2w∥v∥2+∥w∥2⟨w,v⟩¯v) (2.4) +b2(Ew∼P⟨w,v⟩w−d∑i=1ai⟨ei,v⟩ei)+∑j≥2b2j(Ew∼P⟨w,v⟩⟨¯w,¯v⟩2j−2w−d∑i=1ai⟨ei,v⟩⟨ei,¯v⟩2j−2ei) +∑j≥2b′2j Πv⊥(∗Ew∼P⟨w,v⟩⟨¯w,¯v⟩2j−2w−d∑i=1ai⟨ei,v⟩⟨ei,¯v⟩2j−2ei), (2.5)\n\nwhere , and for any , and . We use and as a shorthand for . Based on equation (2.5), we can further decompose into the sum of for , where the -th gradient refers to the gradient of the -th tensor decomposition. As a result, given a neural network with neuron distribution , the neuron distribution after a truncated gradient descent step, denoted by , satisfies that\n\n v(t+1)∼P(t+1)⇔v(t+1):=v(t)−η\\indi∥v(t)∥22≤12λ∇v(t)L∞(P(t)), for v(t)∼P(t). (2.6)\n\nFinite-width case. We briefly describe the connection between the above infinite-width case and the finite-width case. Intuitively, we can think of the finite-width case as sampling neurons randomly from the neuron population in the infinite-width case. There are two sources of sampling error that arise from the above process: (i) the error of the gradients between the finite neuron distribution and the infinite neuron distribution; (ii) the error between the empirical loss and the population loss. Because of gradient truncation, the norm of every neuron is bounded by . Therefore, the sampling error reduces as and increases, as shown in the following claim.\n\n###### Claim 2.1.\n\nFor every , for every distribution over supported on the ball , let be i.i.d. random samples from . For any sufficiently small , with probability at least over the randomness of , we have that:\n\n |L(W)−L∞(P)|≤poly(1λ)log1δ√m.\n\nWith probability at least over the randomness of and the training dataset , for every , we have that:\n\n ∥∥∇w^L(W)−∇wL∞(P)∥∥2≤poly(1λ)logmδ(1√m+1√N).\n\nClaim 2.1 can be proved by standard concentration inequalities such as the Chernoff bound.\n\nNotations. Let denote a number within . Let denote the set including . Let denote the identity matrix in dimension . For two matrices with the same dimensions, we use to denote their inner product. For a vector , let denote its norm and denote its norm. For , let denote the -th coordinate of and denote the vector which zeroes out the -th coordinate of . We define to be the normalized vector, and to be the projection onto the orthogonal complement of . For a matrix , let denote the spectral norm of a matrix .\n\n## 3 Overview of the Infinite-Width Case\n\nWe begin by studying Algorithm 1 for minimizing the population loss using an infinite-width neural network. The infinite-width case plays a central role in our analysis. First, the infinite-width case allows us to simplify the gradient update rule through a conditional-symmetry condition that we describe below. Second, the finite-width case can be reduced to the infinite-width case by bounding the sampling error of the two cases — we describe the reduction in the next section.\n\nA natural starting point for the infinite-width case is to simply set the network width to infinity in Theorem 1.1. However, this will include negligible outliers such as those with large norms in the Gaussian distribution. Therefore, we focus on a truncated probability measure of by enforcing a certain bounded condition. The precise definition of is presented in Definition A.1 of Appendix A. For the purpose of providing an overview of the analysis, it suffices to think of as a Gaussian-like distribution that satisfies the following property.\n\n###### Definition 3.1 (Conditional-symmetry).\n\nWe call a distribution over conditionally-symmetric if for every and every , the following is true.\n\n Prw∼P[wi=vi∣w−j=v−j]=Prw∼P[wi=−vi∣w−j=v−j]. (3.1)\n\nProvided with as initialization, we are ready to state the main result of the infinite-width case as follows.\n\n###### Theorem 3.1 (Infinite-width case).\n\nIn the setting of Theorem 1.1, let the number of samples go to infinity. Starting from the initialization as the neuron distribution , let be the final output network by Algorithm 1. The population loss of satisfies .\n\nIn the rest of this section, we present an overview of the proof of Theorem 3.1 and provide pointers to the proof details to be found in Section A. First, we provide a simplifying formula for the gradient of . We describe an overview of the two stages of Algorithm 1 in Section 3.1 and 3.2, respectively.\n\nFirst, we show how to simplify the gradient of (cf. equation (2.5)). Recall from Section 2 that we can view the weights in the -th iteration as a distribution over . Our main observation is that when is conditionally-symmetric, is also conditionally-symmetric.\n\n###### Claim 3.1.\n\nSuppose the update rule of is given in equation (2.6). If is conditionally-symmetric, then is also conditionally-symmetric.\n\nTo see that Claim 3.1 is true, we first observe that the 1st order tensor decomposition is always zero when is conditionally symmetric. For the even order tensor decompositions, we observe that for every neuron in and every , subject to being fixed, is a polynomial of that only involves odd degree monomials. Therefore, as long as is conditionally-symmetric, then is still conditionally-symmetric. Since is conditionally-symmetric by definition, we conclude that the neuron distribution is conditionally-symmetric throughout Algorithm 1. Based on this claim, we simplify equation (2.5) as follows.\n\n###### Claim 3.2.\n\nSuppose that is conditionally-symmetric. For any , let be a shorthand for the gradient of the 2j-th tensor . For any , let be the -th coordinate of . We have that is equal to the following for each value of :\n\n [∇0,v]i =b0(Ew∼P∥w∥22−1)\\innereiv,[∇2,v]i=b2(Ew∼Pw2i−ai)\\innereiv, (3.2) i =(b2j+b′2j)⎛⎝\\exargw∼P∑i1,⋯,ij\\bigbrace∏r∈[j−1](¯wir¯vir)2(wij)2\\innereijv−ai⟨ei,¯v⟩2j−2⟨ei,v⟩⎞⎠ −b′2j⎛⎝\\exargw∼P∥w∥22∑i1,⋯,ij∏r∈[j](¯wir¯vir)2−d∑r=1ar⟨er,¯v⟩2j⎞⎠vi,∀j≥2. (3.3)\n\nThe proof of Claim 3.2 is by applying Claim 3.1 to equation (2.5), which zeroes out the coordinates in that has an odd order before taking the expectation of in . For the 2nd order gradient , we have that\n\n [∇2,v]i=b2\\bigbraceEw∼P\\innerwvwi−ai\\innereivei=b2\\bigbraceEw∼Pw2i−aivi.\n\nSimilar arguments apply to the gradient of higher order tensor decompositions. Claim 3.1 and 3.2 together implies that for the infinite-width case, the gradient descent update is given by equation (3.2) and (3.3).\n\n### 3.1 Dynamic during Stage 1\n\n##### Stage 1.1: learning 0th and 2nd order tensors.\n\nWe show that Algorithm 1 minimizes the 0th and 2nd order tensor decompositions of the objective to zero first.\n\nFirst, we show that the gradient of the 4th and higher order tensor decompositions is dominated by and . We observe that for , the -th coordinate of and satisfies that\n\n |[∇0,v]i|+|[∇2,v]i|=Θ(1d1.5). (3.4)\n\nThis is because is a suitable truncation of . We further have that\n\nApplying the above to equation (3.2), we obtain equation (3.4). For higher order tensors, in Proposition A.7, we show that for any , . Therefore, the 0th and 2nd order gradients indeed dominate the higher order gradients and Algorithm 1 is simply minimizing the 0th and 2nd order tensor decompositions of .\n\nBased on the above observation, we show that the 0th and 2nd order tensor decompositions converge to zero in Lemma A.2. The main intuition is as follows. By equation (3.2), both the 0th and 2nd order gradient only depend on the -th coordinate of neurons in . Hence, the update can be viewed as independent updates over the coordinates. In Proposition A.8, we show that throughout Algorithm 1, the 0th order tensor decomposition loss given by is smaller than the 2nd order tensor decomposition loss given by . Thus, it suffices to show that the 2nd order loss converges to zero. This problem reduces to principal component analysis and in Proposition A.9, we show that the 2nd order loss indeed converges by a rate of using standard techniques.\n\nAs shown in Lemma A.2, Stage 1.1 finishes within iterations, when eventually becomes for all , which is the same order as for . Thus, Algorithm 1 enters the next substage where the gradient of the higher order tensor decompositions becomes effective.\n\n##### Stage 1.2: learning higher order tensor decompositions.\n\nAfter the 0th and 2nd order tensor decompositions are minimized to a small enough value, the gradient of higher order tensor decompositions begins to dominate the update. In Lemma A.3, we show that for a small fraction of neurons, their norms become much larger than an average neuron — a phenomenon that we term as “winning the lottery ticket”. The main intuition is as follows.\n\nIn Proposition A.10, we show that the gradient of most neurons except a small fraction can be approximated by a signal term from the 4th order gradient plus an error term:\n\n |[∇v]i|=(b4+b′4)ai⟨ei,v⟩⟨ei,¯v⟩2±Ct(κ)logdd2|vi|, (3.5)\n\nwhere is a function that only depends on but grows slowly with . To see that equation (3.5) is true, except a small set of neurons with probability mass at most where will be specified later, any other neuron satisfies . For the small set of neurons, since we stop updating a neuron when its norm grows larger than , the norm of any of these neurons is less than . Thus, provided with a sufficiently large , the contribution of these neurons to the gradient is negligible. Combined together, we prove equation (3.5) in Proposition A.10.\n\nNext, we reduce the dynamic to tensor power method. Based on equation (3.5), we observe that the update of is approximately , which is analogous to performing power method over a fourth order tensor decomposition problem. Hence, for larger initializations of , also grows faster. Based on the intuition, we introduce the set of “basis-like” neurons in the population , which are defined more precisely in Lemma A.3. Intuitively, includes any neuron that satisfies , which has probability measure at least by standard anti-concentration inequalities. Following equation (3.5), we show that the neurons in keeps growing until they become roughly equal to .\n\nAs shown in Lemma A.3, Algorithm 1 goes through a long plateau of iterations, until the neurons of are sufficiently large. Intuitively, the scaling of in the number of iterations arises from the increment in equation (3.5). This concludes Stage 1. The update of these basis-like neurons will be the focus of Stage 2.\n\n### 3.2 Dynamic during Stage 2\n\nIn the second stage, we reduce the gradient truncation parameter in Algorithm 1 from to a smaller value . This allows the neurons that are close to basis vectors to fit the target network more accurately.\n\n##### Stage 2.1: obtaining a warm start initialization.\n\nIn Lemma A.5, we show that after iterations, the population loss reduces to less than . The proof of Lemma A.5 involves analyzing the 0th and 2nd order tensor decompositions, similar to Stage 1.1.\n\nAt the end of Stage 2.1, the weights of the learner neural network form a “warm start” initialization, meaning that its population loss is less than (Li and Yuan, 2017; Zhong et al., 2017). The final substage will show that the population loss can be further reduced from to , where is a fixed constant defined in Theorem 1.1.\n\n##### Stage 2.2: the final substage.\n\nIn Lemma A.6, we show that the population loss further reduces to after iterations. We describe an informal argument by contrasting the gradient update of neurons in and the rest of the neurons for a particular coordinate .\n\nFor any neuron , in Claim A.10, we show that the -th coordinate of approximately follows the following update (cf. equation (A.45)):\n\n [∇v]i≈b0(EP∥w∥22−1)vi+b2(EPw2i−ai)vi−ηct⋅C(κ)d2vi, (3.6)\n\nwhere is a function that grows with but bounded above by and is a function that only depends on . For any neuron , in Claim A.10, we show that follows a similar update but its corresponding value of is much smaller than that of neurons in . Thus, basis-like neurons grow faster than the rest of neurons by an additive factor that scales with .\n\nBased on the intuition, we analyze the dynamic following equation (3.6) using standard techniques for analyzing the convergence of gradient descent. In Lemma A.6, we show for after iterations, the 0th order tensor decomposition loss given by and the 2nd order tensor decomposition loss given by both become less than .\n\nOnce Lemma A.6 is finished, Algorithm 1 has learned an accurate approximation of and we can conclude the proof of Theorem 3.1. We show that the population loss has also become less than (cf. equation (A.10)). Thus, we have finished the analysis of Algorithm 1 for . We provide the proof details of Theorem 3.1 in Section A.\n\n## 4 Overview of the Finite-Width Case\n\nBased on the analysis of the infinite-width case, we reduce the finite-width case to the infinite-width case. By applying Claim 2.1 with , when are i.i.d. samples from , the empirical loss and its gradient are tightly concentrated around the population loss and its gradient. Furthermore, as we increase the number of neurons and the number of samples , the sampling error reduces. Therefore, the goal of our reduction is to show that the sampling error remains small throughout the iterations of Algorithm 1. We describe our reduction informally and leave the details to Section B.\n\nThe connection between the dynamic of the finite-width case and the infinite-width case is as follows. For a neuron sampled from , we have analyzed the dynamic of in the infinite-width case starting from . For the finite-width case, let denote the -th iterate starting from the same initialization using Algorithm 1. Our goal is to show that does not become exponentially large before Algorithm 1 finishes.\n\nBased on the above connection, we show that the propagation of the error remains polynomially small throughout Stage 1 in Lemma B.1. Our analysis involves a bound on the average error of all neurons and a bound on the individual error of every neuron . First, in Proposition B.6, we show that it suffices to consider the first order errors in , i.e. those that involve at most one of . Based on this result, in Proposition B.4 and B.5, we show that the average error and the individual error satisfy that:\n\n Ew∼W[∥ξ(t+1)w∥22] ≤(1±o(1))(1+ηpoly(d))E[∥ξ(t)w∥22], maxw∈W∥ξ(t+1)w∥22 ≤poly(d)Ew∼W∥ξ(t+1)w∥22.\n\nCombined together, we show in Lemma B.1 that indeed remains polynomially small. For Stage 2, we analyze the propagation of in Lemma B.2 and B.3 using similar arguments.\n\nCombining the above three lemmas on error propagation and Theorem 3.1, we complete the proof of Theorem 1.1 in Section B.\n\n## 5 Simulations\n\nWe provide simulations to complement our theoretical result. We consider a setting where and , for . The input is drawn from the Gaussian distribution. For the th order tensor, we measure the corresponding tensor decomposition loss from the population loss .\n\n##### Stage-wise convergence.\n\nWe validate the insight of our analysis, which shows that the convergence of gradient descent has several stages. We use the labeling function of equation (1.1) and a learner network with absolute value activation functions as in Section 3 and Section A. First, the 0th and 2nd order tensor decomposition losses converge to zero quickly. Second, the 4th and higher order tensor decomposition losses converge to zero followed by a long plateau. Figure 2 shows the result. Here we use and . The number of samples is .\n\nWe can see that initially, the 0th and 2nd order tensor decompositions have higher loss than the 4th and higher order tensor decompositions. Then, both the 0th and the 2nd order losses decrease significantly from the initial value and converge to below very quickly. Moreover, after a quick warm up period, the 0th order loss always stays smaller than the 2nd order loss, as our theory predicts. This is followed by a long plateau, which corresponds to Stage 1.2 of our analysis. During this stage, the 4th and higher order losses dominate dynamic, where a small fraction of neurons converge to basis-like neurons. Eventually, the learner neural network accumulates enough basis-like neurons from the 4th and higher tensors in the network. The 4th and higher order losses become less than . The 0th and 2nd order losses further reduce to closer to zero. Our theory provides an in-depth explanation of these phenomena.",
null,
"Figure 1: Illustrating the convergence of each tensor during the gradient descent dynamic using absolute value activations.\n##### Over-parametrization is necessary.\n\nIt has been observed that for properly parametrized gradient descent, gradient descent can get stuck starting from a random initialization (Ge et al., 2017; Du et al., 2018b). We show that this is because the higher order losses remain large even though the 0th order loss has become small. We consider the same setting as the previous experiment but use . Figure 2 shows the result. We can see that the 0th order loss still reduces to less than . However, the 2nd, 4th and 6th order losses are still larger than even after iterations.\n\n## 6 Conclusions and Discussions\n\nIn this work, we have shown that for learning a certain target network with absolute value activation, a truncated gradient descent algorithm can provably converge in polynomially many iterations starting from a random initialization. The learned network is more accurate compared to any kernel method that uses polynomially large feature mappings.\n\nWe describe several interesting questions for future work. First, it would be interesting to extend our result to a setting where the target network uses ReLU activation, i.e. . We note that there is a straightforward reduction from the above setting to our setting by simply solving a linear regression. After applying the reduction, we could then apply our result. The challenge of directly analyzing gradient descent for learning is that the 1st order tensor decomposition in the Hermite expansion of breaks the conditionally-symmetric property. Second, it would be interesting to extend our result to settings where is not necessarily orthonormal. The challenge is to analyze the gradient descent dynamic beyond orthogonal tensors. We leave this question for future research.\n\n### Acknowledgment\n\nThe work is in part supported by SDSI and SAIL. T. M is also supported in part by Lam Research and Google Faculty Award.\n\n## References\n\n##### Organizations.\n\nThe appendix provides complete proofs to Theorem 1.1 and 1.2.\n\n• In Section A, we describe the proof of Theorem 3.1 for the infinite-width case. This section comprises the bulk of the appendix.\n\n• In Section B, we describe the proof of Theorem 1.1 by reducing the finite-width case to the infinite-width case.\n\n• In Section C, we prove Theorem 1.2 using ideas from the work of Allen-Zhu and Li [2019a].\n\n## Appendix A Proof of the Infinite-Width Case\n\nWe provide the proof of Theorem 3.1, which shows that running truncated gradient descent on an infinite-width network can recover the target network with population loss at most , where is a sufficiently small constant defined in Theorem 3.1. Recall from Section 3 that our analysis begins by setting up the random initialization and then proceeds in two stages. We fill in the proof details left from Section 3. The rest of this section is organized as follows.\n\n• Initialization: We set up the random initialization used by Algorithm 1.\n\n• Stage 1: We fill in the proof details of the dynamic during Stage 1, which subsumes Stage 1.1 and Stage 1.2 described in Section 3.1. This stage runs for iterations.\n\n• Stage 2: We fill in the proof details of the dynamic during Stage 2, which subsumes Stage 2.1 and Stage 2.2 described in Section 3.2. This stage runs for iterations.\n\n##### Initialization.\n\nRecall that for the infinite-width case, our initialization of the neuron distribution is a probability measure truncated from a Gaussian distribution with identity covariance. We formally define the truncation and the initialization, denoted by , as follows.\n\n###### Definition A.1 (Truncated neuron space).\n\nLet be the set of all that satisfies the following properties:\n\n• The maximum entry of is bounded: .\n\n• Both and are in the range\n\n [1−polylog(d)√d,1+polylog(d)√d]. (A.1)\n• There are at most coordinates of such that .\n\nWe define as the probability measure of conditional on the support set .\n\nRemark. For our purpose of proving the finite-width case later in Section B, it suffices to consider as the initialization as opposed to . This is because when Algorithm 1 samples neurons from , with high probability all the samples are in the set . To see this, by standard concentration inequalities for the Gaussian distribution, we can show that the set has probability measure at least . Thus by union bound, with high probability all samples are in .\n\nAs stated in Section 3, we are going to heavily use the conditionally-symmetric property (cf. Definition 3.1). We observe that the initialization is indeed conditionally-symmetric. This is because satisfies the conditionally-symmetric property and our truncation in Definition A.1 only involves conditions on the square of the coordinates of . Hence the truncation of to preserves the conditionally-symmetric condition.\n\nNotations for gradients. Before describing the analysis, we introduce several notations first. Recall from Claim 3.2 that the gradient of a neuron in the distribution can be simplified given the conditionally-symmetric property. For each coordinate , the gradient of neuron satisfies that , where , denotes the gradient of for the -th loss, and denotes the -th coordinate of . Let and , where and are the Hermite coefficients of the -th loss given in Section 2. For a vector , let denote a neuron with initialization in the initialization . Let denote the -th iterate of following the update rule of equation (2.6).\n\n##### Stage 1.\n\nRecall from Section 3.1 that the goal of Stage 1 is to show that a small fraction of neurons becomes basis-like, i.e. close to a basis times a scaling factor of at the end of iterations for some . To facilitate the analysis, we maintain an inductive hypothesis throughout Stage 1 that provides an upper bound on the norm of a typical neuron during the update. We first introduce the set of neurons that will not become basis-like by the end of Stage 1.\n\n###### Definition A.2.\n\nLet be a large enough constant. Let and be the set of all vectors in such that\n\n ∥w∥2∞≤c0d and ∥¯w∥2∞≤c0d,\n\nwhere denotes being normalized to norm .\n\nBased on the above definition, we introduce the following inductive hypothesis that shows the neurons in remain “small and dense” (i.e. not basis-like) throughout Stage 1. This stage runs for iterations. We use to denote a value that is less than .\n\n###### Proposition A.1 (Inductive hypothesis H1 for Stage 1).\n\nIn the setting of Theorem 3.1, let"
] | [
null,
"https://media.arxiv-vanity.com/render-output/4783819/x1.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8768141,"math_prob":0.958554,"size":46504,"snap":"2021-31-2021-39","text_gpt3_token_len":11105,"char_repetition_ratio":0.1571828,"word_repetition_ratio":0.051528268,"special_character_ratio":0.23860313,"punctuation_ratio":0.15421446,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99731827,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-30T03:11:14Z\",\"WARC-Record-ID\":\"<urn:uuid:a2324b27-7523-4815-bdf1-3479e139687b>\",\"Content-Length\":\"1049485\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:3ec99d4b-661e-4b1f-8c9d-83749c5a25d5>\",\"WARC-Concurrent-To\":\"<urn:uuid:dcd1f194-b1e4-42ec-8516-ec11dc2236b8>\",\"WARC-IP-Address\":\"104.21.14.110\",\"WARC-Target-URI\":\"https://www.arxiv-vanity.com/papers/2007.04596/\",\"WARC-Payload-Digest\":\"sha1:F7F4DMRO3SQ35QTTPMKTB6YMIWTAE23A\",\"WARC-Block-Digest\":\"sha1:5VTL7SCFQWKV4R64XMPTT5TYVCFI7J2D\",\"WARC-Truncated\":\"length\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153931.11_warc_CC-MAIN-20210730025356-20210730055356-00323.warc.gz\"}"} |
https://en.casambi-enabled-products.com/blogs/news/hoe-selecteert-u-een-casambi-driver | [
"Casambi drivers that feed your LEDs with a mA circuit (milliamps) will always try to maintain the current strength.\n\nExample;\n\nYou have two 500mA LEDs in series, each with a power of 10W.\nSo joint power is 20W.\n\nIn the table below you can see that a TCI Maxijolly SV could be sufficient for you. In the red frame you first go to '500mA' in the third column, which is your LED current value. Afterwards go to the left and you will see that the driver output can vary between a minimum of 10V and a maximum of 53V. One more column to the left you can see that the maximum connected power is 26,5W.",
null,
"First a little bit of teaching about a law;\nP = U x I either\nPOWER = VOLTAGE X CURRENT either\nWatt = Volt x Ampere\n\nAfter you put 230V on it, the driver will increase the voltage in an instant until it reaches the current of 500mA. In my example, this means that the voltage will be at the output of the driver; U = P / I or U = 20W / 0,5A (500mA) = 40Volt.\n\nBecause the LEDs are in series, you measure a voltage of 20V over each LED.\n\n------\n\nSuppose you use long wires from the driver to the LEDs, a voltage drop will occur along the length of the wire. It is based on a misunderstanding that this voltage loss causes the LEDs to give less light. The driver keeps the number of mA that it 'sends' and will simply increase the voltage at the output slightly. The driver can do this until it has reached its maximum voltage. Casambi drivers that accept long wires include TCI and ELDOled.\n\nFirst a little bit of teaching about a law;\nU = I x R either\nVOLTAGE = CURRENT x RESISTANCE either\nVolt = Ampere x Ohm.\n\nNow suppose you are going to put a 20 meter copper wire between the driver and the LEDs and that wire has a resistance of, for example, 4 ohms? That 500mA also goes through that long wire! What does this mean for your LEDs and the light output? Nothing! watch;\n\nU = I x R either\nU = 0,5 (500mA) x 4 ohms = 2Volt.\n\nTo maintain that current of 500mA, the driver will simply increase the voltage to; 40 + 2 = 42 Volt, where the LEDs do not even know that the long wire is in between.\n\nFinally, I would like to inform you that strictly speaking the power (P) in the above examples should not be expressed in Watts but in VA. In this blog you can put that aside for a moment, but in another blog where I write about the difference between actual and apparent flows and capacities, it will be explained.",
null,
"• Irma Lankhaar"
] | [
null,
"https://cdn.shopify.com/s/files/1/0486/4314/5878/files/STROOM-SELECTIE-TABEL-TCI-MAXIJOLLY-SV.jpg",
null,
"https://cdn.shopify.com/s/files/1/0486/4314/5878/files/BLOG-foto-Casambi-enabled-products.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9382675,"math_prob":0.9667189,"size":2406,"snap":"2021-43-2021-49","text_gpt3_token_len":610,"char_repetition_ratio":0.13280599,"word_repetition_ratio":0.034042552,"special_character_ratio":0.2531172,"punctuation_ratio":0.09090909,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9902928,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-04T01:35:46Z\",\"WARC-Record-ID\":\"<urn:uuid:6f3fc43b-91e1-4d6a-8eeb-f2266a25339f>\",\"Content-Length\":\"73294\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:40bfca9c-64a8-4611-bcde-e7f1b1becf6c>\",\"WARC-Concurrent-To\":\"<urn:uuid:2fc3e2cb-59aa-40ec-ad2c-7cc8c86b7ee1>\",\"WARC-IP-Address\":\"51.77.240.240\",\"WARC-Target-URI\":\"https://en.casambi-enabled-products.com/blogs/news/hoe-selecteert-u-een-casambi-driver\",\"WARC-Payload-Digest\":\"sha1:TFDCVYKUKS5STXMJXZ24MOSJLINXAEFG\",\"WARC-Block-Digest\":\"sha1:4GOWMC6JFMTOTFARUKCS33SGO2EDRF42\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362923.11_warc_CC-MAIN-20211204003045-20211204033045-00024.warc.gz\"}"} |
https://gist.github.com/lossyrob/23560c1d6953943b2847 | [
"Instantly share code, notes, and snippets.\n\n#",
null,
"lossyrob/CloudRemoval.scala Last active Mar 25, 2016\n\nCloud Removal code\n\n# Cloud-removal\n\nA recurring problem with raster processing is the need to remove clouds. With this in mind, code for generating cloud-free satellite imagery from a set of images of a geographical location is included within `geotrellis.raster`\n\n`cloudRemovalMultiband` is the important function here. It takes in an array of `MultibandTile`, which are the GeoTIFF tiles we need to operate on and an optional `threshold` parameter (which specifies the pixel intensity value below which the resultant cloudless-pixels' intensities would lie). The function returns a processed `MultibandTile` that can be rendered as a PNG.\n\nHere's an example of its use:\n\n```import geotrellis.raster._\nimport spire.syntax.cfor._\n\ndef main(args: Array[String]) : Unit = {\nval dirRed = new File(args(0))\nval dirGreen = new File(args(1))\nval dirBlue = new File(args(2))\n\nval fileListRed = dirRed.listFiles.filter(_.isFile).toList.toArray\nval fileListGreen = dirGreen.listFiles.filter(_.isFile).toList.toArray\nval fileListBlue = dirBlue.listFiles.filter(_.isFile).toList.toArray\n\nval numImages = fileListRed.length\n\n// Should have an equal number of R, G, B tiles\nassert(numImages == fileListBlue.length && numImages == fileListGreen.length)\n\nval multibands = Array.ofDim[MultibandTile](numImages)\n\ncfor(0)(_ < numImages, _ + 1) { i =>\nval red = SinglebandGeoTiff(fileListRed(i).toString).tile\nval green = SinglebandGeoTiff(fileListGreen(i).toString).tile\nval blue = SinglebandGeoTiff(fileListBlue(i).toString).tile\n\nmultibands(i) = ArrayMultibandTile(Array(red, green, blue))\n}\n\nval cloudless = cloudRemovalMultiband(multibands)\ncloudless.renderPng().write(\"/tmp/cloudless.png\")\n}```\n package geotrellis.raster.imagery import geotrellis.raster._ import geotrellis.raster.render._ import geotrellis.raster.io.geotiff.SinglebandGeoTiff import java.io.File import spire.syntax.cfor._ /** * An object which houses various functions related to cloud removal. */ object CloudRemoval { /** * Attempt to remove clouds by averaging the values that are below * a given threshold at a particular point over a series of images. */ def cloudRemovalSingleband(images: Array[Tile], threshold: Int) : Tile = { val headImage = images(0) val result = ArrayTile.empty(headImage.cellType, headImage.cols, headImage.rows) cfor(0)(_ < result.rows, _ + 1) { row => cfor(0)(_ < result.cols, _ + 1) { col => var sum = 0 var count = 0 cfor(0)(_ < images.length, _ + 1) { i => val v = images(i).get(col, row) if(isData(v) && v < threshold) { sum += v count += 1 } } result.set(col, row, sum / count) } } result } /** * Attempt to remove clouds by averaging the values that are below * a given threshold at a particular point over a series of images. * This is done on a band-by-band basis. */ def cloudRemovalMultiband(images: Array[MultibandTile], threshold: Int): MultibandTile = { val numBands = images(0).bandCount val numImages = images.length val cloudlessTiles = new Array[Tile](numBands) cfor(0)(i => i < numBands, i => i + 1) { i => val singleTiles = new Array[Tile](numImages) cfor(0)(j => j < numImages, j => j + 1) { j => singleTiles(j) = images(j).band(i) } cloudlessTiles(i) = cloudRemovalSingleband(singleTiles, threshold) } ArrayMultibandTile(cloudlessTiles) } /** * Attempt to remove clouds by averaging the values that are below * a given threshold at a particular point over a series of images. * This is done on a band-by-band basis. */ def cloudRemovalMultiband(images: Array[MultibandTile]): MultibandTile = { cloudRemovalMultiband(images, 10000) } }\n package geotrellis.raster.imagery import geotrellis.raster.{ArrayMultibandTile, MultibandTile} import geotrellis.raster.io.geotiff.{GeoTiffTestUtils, SinglebandGeoTiff} import geotrellis.raster.testkit.RasterMatchers import org.scalatest.FunSpec import spire.syntax.cfor._ class CloudRemovalSpec extends FunSpec with RasterMatchers with GeoTiffTestUtils { describe(\"Checking cloud removal\") { it(\"Pixel value should be less than original cloudy image\") { val numImages = 3 val multibands = Array.ofDim[MultibandTile](numImages) cfor(0)(_ < numImages, _ + 1) { i => val red = SinglebandGeoTiff(geoTiffPath(\"cloud_images/red/\" + (i+1) + \".TIF\")).tile val green = SinglebandGeoTiff(geoTiffPath(\"cloud_images/green/\" + (i+1) + \".TIF\")).tile val blue = SinglebandGeoTiff(geoTiffPath(\"cloud_images/blue/\" + (i+1) + \".TIF\")).tile multibands(i) = ArrayMultibandTile(Array(red, green, blue)) } // A cloudy pixel //print(multibands(1).band(0).get(400, 100), multibands(1).band(1).get(400, 100), multibands(1).band(2).get(400, 100)) val cloudless = CloudRemoval.cloudRemovalMultiband(multibands) // Pixel value after cloud-removal assert(cloudless.band(0).get(400, 100) <= multibands(1).band(0).get(400, 100) && cloudless.band(1).get(400, 100) <= multibands(1).band(1).get(400, 100) && cloudless.band(2).get(400, 100) <= multibands(1).band(2).get(400, 100)) } it(\"Pixel value should be less than threshold\") { val numImages = 3 val multibands = Array.ofDim[MultibandTile](numImages) cfor(0)(_ < numImages, _ + 1) { i => val red = SinglebandGeoTiff(geoTiffPath(\"cloud_images/red/\" + (i+1) + \".TIF\")).tile val green = SinglebandGeoTiff(geoTiffPath(\"cloud_images/green/\" + (i+1) + \".TIF\")).tile val blue = SinglebandGeoTiff(geoTiffPath(\"cloud_images/blue/\" + (i+1) + \".TIF\")).tile multibands(i) = ArrayMultibandTile(Array(red, green, blue)) } val threshold = 15000 val cloudless = CloudRemoval.cloudRemovalMultiband(multibands, threshold) // Pixel value after cloud-removal assert(cloudless.band(0).get(400, 100) <= threshold && cloudless.band(1).get(400, 100) <= threshold && cloudless.band(2).get(400, 100) <= threshold) } it(\"Overloaded functions should give the same result for a specific threshold\") { val numImages = 3 val multibands = Array.ofDim[MultibandTile](numImages) cfor(0)(_ < numImages, _ + 1) { i => val red = SinglebandGeoTiff(geoTiffPath(\"cloud_images/red/\" + (i+1) + \".TIF\")).tile val green = SinglebandGeoTiff(geoTiffPath(\"cloud_images/green/\" + (i+1) + \".TIF\")).tile val blue = SinglebandGeoTiff(geoTiffPath(\"cloud_images/blue/\" + (i+1) + \".TIF\")).tile multibands(i) = ArrayMultibandTile(Array(red, green, blue)) } val threshold = 10000 val cloudless1 = CloudRemoval.cloudRemovalMultiband(multibands) val cloudless2 = CloudRemoval.cloudRemovalMultiband(multibands, threshold) // Pixel value after cloud-removal assert(cloudless1.band(0).get(400, 100) == cloudless2.band(0).get(400, 100) && cloudless1.band(1).get(400, 100) == cloudless2.band(1).get(400, 100) && cloudless1.band(2).get(400, 100) == cloudless2.band(2).get(400, 100)) } } }"
] | [
null,
"https://avatars2.githubusercontent.com/u/2320142",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5436926,"math_prob":0.98810464,"size":1632,"snap":"2019-51-2020-05","text_gpt3_token_len":409,"char_repetition_ratio":0.12223587,"word_repetition_ratio":0.0,"special_character_ratio":0.21446079,"punctuation_ratio":0.17081851,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95331734,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-23T09:33:07Z\",\"WARC-Record-ID\":\"<urn:uuid:f594131d-754e-4534-b5bd-50f70d1fd56a>\",\"Content-Length\":\"102191\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7cb8dc5c-be77-4ef8-89f9-453dbcc5618e>\",\"WARC-Concurrent-To\":\"<urn:uuid:94b2bf04-7bda-4ca8-b800-d591f3702827>\",\"WARC-IP-Address\":\"192.30.253.119\",\"WARC-Target-URI\":\"https://gist.github.com/lossyrob/23560c1d6953943b2847\",\"WARC-Payload-Digest\":\"sha1:7MY7LJA3SUJNMHC4YTY3B7IHEVZ5WIKI\",\"WARC-Block-Digest\":\"sha1:LF5E66RYH5U6XSVIWHBPHBIP7LH3DVXG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250609478.50_warc_CC-MAIN-20200123071220-20200123100220-00078.warc.gz\"}"} |
https://michelbaudin.com/2014/03/17/averages-in-manufacturing-data/ | [
"# Averages in Manufacturing Data\n\nThe first question we usually ask about lead times, inventory levels, critical dimensions, defective rates, or any other quantity that varies, is what it is “on the average.” The second question is how much it varies, but we only ask it if we get a satisfactory answer to the first one, and we rarely do.\n\nWhen asked for a lead time, people usually give answers that are either evasive like “It depends,” or weasel-worded like “Typically, three weeks.” The beauty of a “typical value” is that no such technical term exists in data mining, statistics, or probability, and therefore the assertion that it is “three weeks” is immune to any confrontation with data. If the assertion had been that it was a mean or a median, you could have tested it, but, with “typical value,” you can’t.\n\nFor example, if the person had said “The median is three weeks,” it would have had the precise meaning that 50% of the orders are delivered in less than 3 weeks, and that 50% take longer. If the 3-week figure is true, then the probability of the next 20 orders all taking longer, is",
null,
"$0.5^{20}= 9.6\\,ppm$. This means that, if you do observe a run of 20 orders with lead times above 3 weeks, you know the answer was wrong.\n\nIn Out of the Crisis, Deming was chiding journalists for their statistical illiteracy when, for example, they bemoaned the fact that “50% of the teachers performed beneath the median.” In the US, today, the meaning of averages and medians is taught in Middle School, but the proper use of these tools does not seem to have been assimilated by adults.\n\nOne great feature of averages is that they add up: the average of the sum of two variables is the sum of their averages. If you take two operations performed in sequence in the route of a product, and consider the average time required to go through these operations by different units of product, then the average time to go through operations 1 and 2 is the sum of the average time through operation 1 and the average time through operation 2, as is obvious from the way an average is calculated. If you have n values",
null,
"$X_{1},...,X_{n}$\n\nthe average is just",
null,
"$\\bar{X}= \\frac{X_{1}+...+X_{n}}{n}$\n\nWhat is often forgotten is that most other statistics are not additive.\n\nTo obtain the median, first you need to sort the data so that",
null,
"$X_{\\left(1\\right)}\\leq ... \\leq X_{\\left(n\\right)}$. For each point, the sequence number then tells you how many other points are under it, which you can express as a percentage and plot as in the following example:",
null,
"Graphically, you see the median as the point on the x-axis where the curve crosses 50% on the y-axis. To calculate it, if n is odd, you take the middle value",
null,
"$\\tilde{X}= X_{_{\\left (\\frac{n}{2}+1\\right )}}$\n\nand, if n is even, you take the average of the two middle values, or",
null,
"$\\tilde{X}= \\frac{\\left[ X_{_{\\left (\\frac{n}{2}\\right )}}+X_{_{\\left (\\frac{n}{2}+1\\right )}}\\right]}{2}$\n\nand it is not generally additive, and neither are all the other statistics based on rank, like the minimum, the maximum, quartiles, percentiles, or stanines.\n\nAn ERP system, for example, will add operation times along a route to plan production, but the individual operation times input to the system are not averages but worst-case values, chosen so that they can reliably be achieved. The system therefore calculates the lead time for the route as the sum of extreme values at each operation, and this math is wrong because extreme values are not additive. The worst-case value for the whole route is not the sum of the worst-case values of each operation, and the result is an absurdly long lead time.\n\nIn project management, this is also the key difference between the traditional Critical Path Method (CPM) and Eli Goldratt’s Critical Chain. In CPM, task durations set by the individuals in charge of each task are set so that they can be confident of completing them. They represent a perceived worst-case value for each task, which means that the duration for the whole critical path is the sum of the worst-case values for the tasks on it. In Critical Chain, each task duration is what it is actually expected to require, with a time buffer added at the end to absorb delays and take advantage of early completions.\n\nThat medians and extreme values are not additive is experienced, if not proven, by a simple simulation in Excel. Using the formula “LOGNORM.INV(RAND(),0,1)” will give you in about a second, 5,000 instances of two highly skewed variables, X and Y, as well as their sum X+Y. On a logarithmic scale, their histograms look as follows:",
null,
"And the summary statistics show the Median, Minimum and Maximum for the sum are not the sums of the values for each term:",
null,
"Averages are not only additive but have many more desirable properties, so why do we ever consider medians? There are real problems with averages, when taken carelessly:\n\n1. Averages are affected by extreme values. It is illustrated by the Bill Gates Walks Into a Bar story. Here we inserted him into a promotional picture of San Fancisco’s Terroir Bar:",
null,
"Attached to each patron other than Bill Gates is a modest yearly income. But his presence pushes the average yearly income above $100M, which is not a meaningful summary of the population. On the other hand, consider the median. Without Bill Gates, the middle person is Larry, and the median yearly income,$46K. Add Bill Gates, and the median is now the average of Larry and Randy, or \\$48K. The median barely budged! While, in this story, Bill Gates is a genuine outlier, manufacturing data often have outliers that are the result of malfunctions, as when wrong measurements are recorded as a result of a probe failing to touch the object it is measuring, or the instrument is calibrated in the wrong system of units, or a human operator puts a decimal point in the wrong place…Large differences between average and median are a telltale sign of this kind of phenomenon. Once the outliers are identified, assessed, and filtered, you can go back to using the average rather than the median.\n2. Averages are meaningless over heterogeneous populations. The statement that best explains this is “The average American has exactly one breast and one testicle.” It says nothing useful about the American population. In manufacturing, when you consider, say, a number of units produced, you need to make sure you are not commingling 32-oz bottles with minuscule free samples.\n3. Averages are meaningless for multiplicative quantities. If you data is the sequence",
null,
"$Y_{1}, ...,Y_{n}$ of yields of the n operations in a route, then the overall yield is",
null,
"$Y= Y_{1}\\times ...\\times Y_{n}$, and the plain average of the yields is irrelevant. Instead, you want the geometric mean",
null,
"$\\bar{Y}=\\sqrt[n]{Y_{1}\\times ...\\times Y_{n}}$.\nThe same logic applies to the compounding of interest rates, and the plain average of rates over several years is irrelevant.\n4. Sometimes, averages do not converge when the sample size grows. It can happen even with a homogeneous population, it is not difficult to observe, and it is mind boggling. Let us say your product is a rectangular plate. On each one you make, you measure the differences between their actual lengths and widths and the specs, as in the following picture:",
null,
"Assume then that, rather than the discrepancies in length and width, you are interested in the slope ΔW/ΔL and calculate its average over an increasing number of plates. You are then surprised to find that, no matter how many data points you add, the ratio keeps bouncing around instead of converging as the law of large numbers has led you to expect. So far, we have looked at the averages as just a formula applied to data. To go further, we must instead consider that they are estimators of the mean of an “underlying distribution” that we use as a model of the phenomenon at hand. Here, we assume that the lengths and widths of the plates are normally distributed around the specs. The slope ΔW/ΔL is then the ratio of two normal variables with 0 mean, and therefore follows the Cauchy distribution. This distribution has the nasty property of not having a mean, as a consequence of which the law of large numbers does not apply. But it has a median, which is 0.\n\nThe bottom line is that you should use averages whenever you can, because you can do more with them than with the alternatives, but you shouldn’t use them blindly. Instead, you should do the following:"
] | [
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://i0.wp.com/michelbaudin.com/wp-content/uploads/2014/03/Median-graphic-e1395061356173-1024x396.png",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://i0.wp.com/michelbaudin.com/wp-content/uploads/2014/03/lognormal-histogram-with-sum.png",
null,
"https://i0.wp.com/michelbaudin.com/wp-content/uploads/2014/03/Simulation-stats.png",
null,
"https://i0.wp.com/michelbaudin.com/wp-content/uploads/2014/03/Bill-Gates-in-terroir_bar-SF.png",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://i0.wp.com/michelbaudin.com/wp-content/uploads/2014/03/Plate-dimensions.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.95731074,"math_prob":0.98566306,"size":13941,"snap":"2023-40-2023-50","text_gpt3_token_len":3057,"char_repetition_ratio":0.122694984,"word_repetition_ratio":0.006533279,"special_character_ratio":0.2161251,"punctuation_ratio":0.11087113,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99250907,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,1,null,null,null,null,null,1,null,1,null,1,null,null,null,null,null,null,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-09T07:44:56Z\",\"WARC-Record-ID\":\"<urn:uuid:62608ce1-ed98-44a8-b938-551c881ab034>\",\"Content-Length\":\"122269\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:58502277-0914-4159-99af-7b499bbfe5f5>\",\"WARC-Concurrent-To\":\"<urn:uuid:9a5c0514-e6af-4b96-aa57-229f17c4d9f7>\",\"WARC-IP-Address\":\"198.71.233.128\",\"WARC-Target-URI\":\"https://michelbaudin.com/2014/03/17/averages-in-manufacturing-data/\",\"WARC-Payload-Digest\":\"sha1:RKBT62PT7KHDFK5T3FEJFNHIWL3CJV2Y\",\"WARC-Block-Digest\":\"sha1:KWMYAHRY4E7NHBN2HCM7VTUGNBYVMJTO\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100873.6_warc_CC-MAIN-20231209071722-20231209101722-00175.warc.gz\"}"} |
https://codeforces.com/blog/entry/54750? | [
"### bharat.khanna.cse14's blog\n\nBy bharat.khanna.cse14, 4 years ago,",
null,
"Tutorial is loading...\nSolution\nTutorial is loading...\nDP solution 1\nDP solution 2 with minimum and maximum computation\nTutorial is loading...\nSolution\nTutorial is loading...\nSolution\nTutorial is loading...\nSolution\nTutorial is loading...\nSolution\nTutorial is loading...\nSolution",
null,
"Tutorial of Manthan, Codefest 17",
null,
"",
null,
"Comments (62)\n » 4 years ago, # | ← Rev. 2 → Solutions (Code links) are not visible.\n• » » Updated!\n » In problem C, if we have node U and it has y children, we need to check every representation of x by y numbers, right? for example, in first childrens subtree we may put 0,1,2,..,x k-labeled nodes, second children can also have 1,2,..., x — a, where a is amount that we used for 1st children and so on. Is this right?\n• » » Not Necessary. I went into the same dead end during competition lol. From the tutorial, I just figured out we don't need to iterate through all the combinations but instead: Everytime combine the result of two children at a time. All the combinations of these two children are contained in the combined result (from 0 to x). Continue this process till all the children nodes are combined. By this way, it only takes x * x * (number of children) to have the result of all the combinations.\n• » » » But if we visit all pairs of children isnt it num of children squared\n• » » » »\n• » » » » » Thank you so much! Only solution I could understood!\n » With problem D. Why does this hold? ~~~~~ For query 1 u v, answer will be \"YES\" iff u ≠ v (as u is not special case of itself) and lca(u, v) = u. ~~~~~ Should a special case of a part be a special case? Formally, b is a part of a, c is a special case of b, why do we need c to be a special case of a?\n• » » Sorry! There was a mistake in the editorial. All edges in the path from u to v should also be of type \"is a special case of\"\n » 4 years ago, # | ← Rev. 3 → Third solution for problem B : Using segment treeMake three arrays namely b, c, d. b will store p * a[i] , c will store for q and d will store for r. Make two segment trees (max query) for b and c namely tree1 for b and tree2 for c.Start iterating array d.For every di , find max in tree2 first from 0 to i range. Store it as a pair. This pair will store the max value of array c from range 0 to i and the position of that element (pos) in array c. After that, find max value of array b from 0 to pos.For same di, find max now in tree1 first from 0 to i range. Store it as a pair (say R) again. This pair will store the same as above but now for array b first. Now, find the max value of element in array c from R.second to i. Since now we are having two values for each di , keep taking max out of it from i = 0 to n.The final result will be the answer.For more details, here is my solution — http://codeforces.com/contest/855/submission/30682061\n » 4 years ago, # | ← Rev. 7 → Please Note that in problem C, traversing only up to min(size[q[curr][i]],x) would be a decent optimization, which can be faster by an order of magnitude. Here size[x] is the size of subtree rooted at x.http://codeforces.com/contest/855/submission/30725163\n » Fun linear solution for D: 30688152\n• » » Can you explain it in detail?\n• » » » HintIf you consider separate forests for type-1 and type-2 edges, you don't need LCA queries; only \"is u ancestor of v\" and \"what is the root of v's tree\". Those can easily be answered after some simple DFS precomputation. SpoilerFor type-2 queries, it's enough to check whether u is an ancestor of v in the type-2 forest.For type-1 queries, we need to check whether there is a vertex w, which is an ancestor of v in the type-1 forest, and an ancestor of u in the type-2 forest.But w can have at most one parent, so it would have to be a root in either type-1 forest or type-2 forest. So, we can check whether type-1 root of v is an ancestor of u in the type-2 forest or the other way around.\n• » » » » you may have interchanged type 1 & 2.\n » In Problem C, can anyone provide me an explanation on this part?Then, we can combine them two nodes at a time to form the dp array for the node curr.\n• » » 4 years ago, # ^ | ← Rev. 7 → let's say we want to calculate dp[v][j][x] (means the number of ways of getting x number of k type nodes in the subtree rooted at v, where type(v)=j) how to calculate this — let's assume f(v, j, x) has the same definition as dp[v][j][x].say we have n children of node v. so essentially what we need to find is the number of ways to distribute x among these n children.here we can use a dp. (for convenience I'll call nodes of type k as special node) Now, to do this computation at node v, we will form another DP dp1. We say",
null,
"as the number of ways to choose a total of x special nodes from subtrees defined by v1, v2, ..., vi i.e. from first i nodes. The recurrence can be defined as",
null,
", i.e. we are iterating over y assuming that subtree of vi contributes y special nodes and rest x-y special nodes have been contributed by previous i-1 nodes. So, finally dp[v][j][x] = dp1(n, j, x)In the editorial solution this dp1 is denoted by a and b array. you wont find i in the editorial's dp1 state, i can be avoided by using two arrays a and b. we store dp1(i, , ) in b array, and after its calculation it is added to a array, so this will become dp1(i - 1, , ) for the next iteration.\n• » » » But in dp1 you dont memorise which node you are currently at, so values will always mix? I mean, first i childs of node u may mix with first i childs of some other node.\n• » » » » 4 years ago, # ^ | ← Rev. 2 → The graph is a tree. The graph has n-1 edges and is connected ,so every node can have at most 1 parent.\n• » » » » For every non leaf node v in the tree, we are doing this dp1() calculation locally for that node independent from others. see this part in the editorial's code - void dfs(int curr, int par) { //something for(i=0;i<3;i++) { for(j=0;j<=x;j++) { a[i][j]=0; b[i][j]=0; } } for(i=0;i<3;i++) a[i]=1; //calculation of a and b here for(l=0;l<=x;l++) { dp[cur][l]=(1ll*a[l]*(k-1))%mod; if(l>=1) dp[cur][l]=a[l-1]; dp[cur][l]=(1ll*a[l]*(m-k))%mod; } } see at the end we assign the a values to dp state of that node, for next node again a and b arrays will be assigned 0 values at the start in the dfs().\n• » » » So doesn't this solution makes the complexity O(n*x) rather than O(x*x)? Because for each child node, we iterate through the number of special nodes from 0 to x.\n• » » » » 4 years ago, # ^ | ← Rev. 2 → At each node with n children, we are doing a computation of n * x2, so total complexity is O(N * x2). (excluding the 3 factor)\n• » » » while calculating dp1(i, 0, k) why don't we are considering the values at type 1 and type 2?i have used similar approach but failed : http://codeforces.com/contest/855/submission/30802240i know i am missing something please help me !\n• » » » » here dp1(i, 0, k) states node v is of 0 type. Doesn't make sense. Please read the comment carefully. or maybe I didn't get you?\n• » » » » » 4 years ago, # ^ | ← Rev. 2 → \" While assigning the value to dp[curr][cnt], we take into account only the values of dp[childofcurr][cnt - z]. Similarly for dp[curr][cnt], we take into account only dp[child of curr][cnt - z] and dp[child of curr][cnt - z]. \" I understand this as while calculating the value of type(0) we have to take the values of type(1) , type(0) and type(2) and for type(1) we take only of type(0) below it.so, in your comment in the last part it is written that dp(i, j, k) = dp1(n, j, k) doesn't it include the value of type(1) ot type(2) if j = 0!\n » Can someone please explain C with more detail ?I don't get how adding all the dp values of each pair would be the same as taking all combinations among children\n• » » 4 years ago, # ^ | ← Rev. 2 →\n » In problem B , Why the below approach doesn't work? find min , max in array. ans = 0; If(p<0) ans += p * min else ans += p * max Repeat for q and r print ans.\n• » » I got this i<=j , j<=k\n• » » I tried that approach and I got here trying to ask your question, hope someone answers this.\n » Why is the contest getting so much hate?\n• » » Because it was tougher than many of the recent contests.\n• » » Because problem statements were garbage and problems are not interesting.\n » When the editorial of problem E and F will be updated? I am wating for those since yesterday. :(\n » 4 years ago, # | ← Rev. 2 → Hello,Can somebody explain for problem F (NAGINI) why my solution here receives a TLE for test case 30.I have tried everything i could to optimise the code.Thank You.\n• » » I have seen some O(q*n) solutions passing. so, one thing you can do is make a sum array and update it at the time of updating the first query. Complexity remains the same.\n » Problem B second solution can be further simplified: We don't have to maintain four array just one for the maximum of p*ax (0<=x<=i) and one for the maximum of r*ax (0<=x<=i). This way we don't have to deal with sign of p and q. We don't have to store the whole arrays. The running maximum is enough. Here is my implementation: 30734583\n » 4 years ago, # | ← Rev. 2 → F can be solved by special segment tree, which is called Ji driver segment tree in China. You can see this code: http://codeforces.com/contest/855/submission/30680703\n• » » Where can I learn about it? Google search doesn't yield any similar result.\n• » » » Sorry, I only have Chinese learning materials. Try to understand it by reading the code...My English is very poor, so I can't explain it in English.\n• » » » » Any online material? Then maybe google translate could help!!\n• » » » » » Sorry, this code is not Ji driver segment tree, but you can learn it from: http://www.shuizilong.com/house/archives/hdu-5306-gorgeous-sequence/And you can learn Ji driver segment tree from: http://www.doc88.com/p-6744902151779.html\n• » » » » » » Thanks. :)\n• » » » » » » Isn't this simply the trick to store in each node of the segment tree a flag if all elements/positions have the same value and then in the query and update we update only if the values of the whole segment are equal (else we just continue down)? PS: example problem done with the same trick.\n• » » » » » » » 4 years ago, # ^ | ← Rev. 3 → Looks like yes, in the tutorial in chinese they link this problem http://codeforces.com/contest/444/problem/C also, that can be solved with this trick\n• » » » » » » » I haven't looked to provided links, but I can already say what you're saying is not true.Consider following scenario: Firstly you set value of n on interval [1, n], then you use n/2 queries to set values of 0 in intervals [i, i] for odd i and then you make n queries with value of n-1, n-2, ... on interval [1, n]. All queries from last phase will update values in all even points, so if we use \"typical lazy propagation\" which you described we will end up having complexity O(n) per query.\n• » » » » » » » » 4 years ago, # ^ | ← Rev. 4 → Well, I didn't understand your case, so I will explain the main idea in this problem, first we reduce the problem to: We have a array A of size N initially every element is equal to infinity and we can do: Update in position: pos k, make A[pos] = k Update in range: l r k, for every element i in the interval [l, r] make A[i] = min(A[i], k) Query: l r, ask for the sum of every element different of infinity on the interval [l, r] So, to solve this with the idea of the segment tree, we gonna keep for every segment what is the biggest element in that segment, how much times the biggest element appears on the segment , the second biggest segment on segment, the sum of the segment and a variable to indicate the lazy propagation If we gonna do soma update in pos we just change the value of the biggest element, how many times appear and sum of the node in segment tree that represent this element. When we gonna process some update we gonna do the recursive procedure of the segment tree: if the current node is out of the interval of update, there is nothing to process in this node if the max element in the range of current node is smaller than k, there is nothing to process in this node if the range of current node is completely inside of the range of update and the second biggest element is smaller than k, we gonna process this node, the only thing that will change will be the sum of the interval and the biggest element element also we gonna sinalize the lazy propagation Else we gonna recurse to the left son and right son, after this we gonna recalculate the value of the nodes where the recursion passed. If we gonna query, we just do the normal of the segment tree, taking the sum value of each node If I would say the complexity it would be in O(QN) in a trivial analise, but my intuition say that it's faster. My code is 30763830 . Can you say what is the complexity ?\n• » » » » » » 4 years ago, # ^ | ← Rev. 3 → What is this solution's complexity? It was kinda a big fuss in Polish community when Marcin_smu solved it faster than",
null,
", namely in",
null,
"using some mergeable leftist tree.EDIT: Ok, Google translate told me that it is written that it is n log n. If that's true then it is very impressive\n• » » » » » » » Well, I'll write a blog about this trick of segment tree later.It can change the operation \"range max/min\" into the trivial operation \"range add/minus\" in extra",
null,
"time complexity (may be O(1) but I can't prove it yet, I'm still working on it).This problem is just a simplest application and segment tree can solve it in",
null,
".BTW, I prefer to call this trick \"Segment Tree Beats\". I like this name very much :)\n• » » » » » » » » Any news about the blog post? Thanks in advance :)\n• » » » » » » » » Any news about the blog post? Thanks in advance :)\n• » » » » » » » » » My final exam is finally finished. I'm going to start to work now :)Sorry for the long delay.\n » Complexity",
null,
"Yeah, great... And then we are wondering how people managed to squeeze naive bruteforces\n » Any special reason to subtract mod instead of just taking the modulus ?, does not seem to save any complexity of computation or coding.(IN PROBLEM C)\n• » » % operations are very slow compared to + and - .\n » Can someone give me a readable code for problem D, I find it hard to understand author's code.\n » For problem B , 2nd approach , my solution got hacked. so, isn't it the write solution ?\n » When will you provide the editorial for the last problem? It's been two weeks.\n• » » Added now.\n• » » » Thanks a lot.\n » Can Anyone please elaborate more on 855G solution , especially proof of 2nd statement and bit more explanation of 4th statement\n » can someone please tell me why my memoization getting TLE in B: 75069204. According to me, it should not."
] | [
null,
"https://codeforces.org/s/83309/images/flags/24/gb.png",
null,
"https://codeforces.org/s/83309/images/icons/paperclip-16x16.png",
null,
"https://codeforces.org/s/83309/images/blog/tags.png",
null,
"https://codeforces.org/s/83309/images/icons/comments-48x48.png",
null,
"https://espresso.codeforces.com/76a66a347f0ef0dff4bc76758d37ae4105c9aa51.png",
null,
"https://espresso.codeforces.com/807ffe1ff1a6cfbfb1743b96a685bef9311cf01d.png",
null,
"https://espresso.codeforces.com/119e8dc3da2dce32134bfc20aa74df83a9b35de8.png",
null,
"https://espresso.codeforces.com/dde8823979260f67bfb85e84f1e214e736f39168.png",
null,
"https://espresso.codeforces.com/9040a33098f83986b0de64475c66584fbfdf0e22.png",
null,
"https://espresso.codeforces.com/5e7dae7c1838af7ba7570bdf02ff61029b043be6.png",
null,
"https://espresso.codeforces.com/3d6676a9ef371d814cbf0ea368b39a237ec17770.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.60181123,"math_prob":0.88208896,"size":30215,"snap":"2021-21-2021-25","text_gpt3_token_len":9899,"char_repetition_ratio":0.10469697,"word_repetition_ratio":0.12763129,"special_character_ratio":0.37348998,"punctuation_ratio":0.18785934,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9776028,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22],"im_url_duplicate_count":[null,5,null,null,null,5,null,null,null,2,null,2,null,10,null,2,null,null,null,null,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-06-21T12:19:43Z\",\"WARC-Record-ID\":\"<urn:uuid:b8a3a72b-24e4-4617-a564-95ecc0d09639>\",\"Content-Length\":\"324963\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4246fbc0-1cf4-4d2e-bde6-0405ed46a254>\",\"WARC-Concurrent-To\":\"<urn:uuid:df94d5e2-a285-425c-9bb8-f6dfcd0b2ef4>\",\"WARC-IP-Address\":\"213.248.110.126\",\"WARC-Target-URI\":\"https://codeforces.com/blog/entry/54750?\",\"WARC-Payload-Digest\":\"sha1:YWV5WYCUJEHWX4OLJTL4CXRP77XOUSPW\",\"WARC-Block-Digest\":\"sha1:625HVJVKYCVRM5WTUYAMZR3YFGSZ7IQQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-25/CC-MAIN-2021-25_segments_1623488273983.63_warc_CC-MAIN-20210621120456-20210621150456-00575.warc.gz\"}"} |
https://scicomp.stackexchange.com/questions/2216/computing-the-pdf-of-a-quadratic-function-of-two-random-variables | [
"# Computing the PDF of a quadratic function of two random variables\n\nGiven the function\n\n$\\mathcal{M} = g + Ah + Bh^2$\n\nwhere $A$ and $B$ are constants and $g$ and $h$ are random variables with their distributions $f_G(g)$ and $f_H(h)$ known, is it possible to compute the probability density function $f_\\mathcal{M}$?\n\nWe can obviously generate samples of it by creating realizations of $g$ and $h$ and then computing $\\mathcal{M}$ (and then possibly form the empirical CDF, etc.), but I'm wondering if it is possible to \"write down\" an expression for $f_\\mathcal{M}$.\n\nA few notes:\n\n1. If it is helpful, we can assume that $g$ and $h$ have normal distributions.\n2. I'd be very interested in a solution that could accommodate the more complex case of $\\mathcal{M} = g + \\sum_i^n A_i h_i + B_i h_i^2$\n\nUsing the assumption of normality, we can get an expression for this in Maple, but it's not in closed form (it still has an integral sign in it). Here's what I did:\n\nwith(Statistics):\nh := RandomVariable(Normal(mu[H], sigma[H]));\ng := RandomVariable(Normal(mu[G], sigma[G]));\nPDF(g + A * h + B * h^2, z) assuming A > 0, B > 0;\n\n\nWithout the assumptions on A and B I get an error, but with them, I get:\n\n$$\\int _{-1/4\\,{\\frac {{A}^{2}}{B}}}^{\\infty }\\!1/2\\,\\sqrt {2}{{\\rm e}^{-1/2\\,{\\frac { \\left( z-{\\it \\_t}-\\mu_{{{\\it G}}} \\right) ^{2}}{{\\sigma_{{{\\it G}}}}^{2}}}}} \\left( 1/2\\,\\sqrt {2}{{\\rm e} ^{-1/8\\,{\\frac { \\left( A+\\sqrt {{A}^{2}+4\\,B{\\it \\_t}}+2\\,\\mu_{{{\\it H}}}B \\right) ^{2}}{{B}^{2} {\\sigma_{{{\\it H}}}}^{2}}}}}{\\frac {1}{\\sqrt {\\pi }}}{\\sigma_{{{\\it H}}}}^{-1}{\\frac {1}{\\sqrt {{A}^{2}+4\\,B{\\it \\_t}}}}+1/2\\,\\sqrt {2}{{\\rm e}^{-1/8\\,{\\frac { \\left( A-\\sqrt {{A}^{2}+4\\,B{\\it \\_t}}+2\\,\\mu_{{{\\it H}}}B \\right) ^{2}}{{B}^{2}{\\sigma_{{{\\it H}}}}^{2}}}}}{\\frac {1}{\\sqrt { \\pi }}}{\\sigma_{{{\\it H}}}}^{-1}{\\frac {1}{\\sqrt {{A}^{2}+4\\,B{\\it \\_t}}}} \\right) {\\frac {1}{ \\sqrt {\\pi }}}{\\frac {1}{\\sqrt {{\\sigma_{{{\\it G}}}}^{2}}}}{d{\\it \\_t}}$$\n\n(This is in an internal development version, so your results may be different. Full disclosure: I work for these guys.)\n\nActually, what might work even better is to see (by completing the square) that $$A h + B h^2 = B \\left(\\left(h + \\frac{A}{2B}\\right)^2 - \\frac{A^2}{4 B^2}\\right).$$ Suppose $h$ is normally distributed with parameters $\\mu_H$ and $\\sigma_H$, and let $C = \\frac{A}{2B \\sigma_H}$. Then so is $h /\\sigma_H + C$ is normally distributed with variance 1 and mean $\\mu_H/\\sigma_H + C$. Its square is then distributed as a noncentral chi squared distribution with parameters $k = 1$ (a.k.a. $\\nu = 1$) and $\\delta = \\mu_H/\\sigma_H + C$. So we define $\\tilde h = (h / \\sigma_H + C)^2$, which is distributed in this way, and we examine $$A h + B h^2 = B \\sigma_H^2((h+\\frac{A}{2B})^2/\\sigma_H^2 - \\frac{A^2}{4B^2\\sigma_H^2}) = B \\sigma_H^2(\\tilde h + C^2).$$ Now the PDF of that can easily be derived from the PDF of $\\tilde h$. Unfortunately, that PDF involves a nasty hypergeometric function (a modified Bessel function of the first kind), so it doesn't make the evaluation of the PDF too much easier. However, it might make the theoretical analysis easier...\n\n• The first part of your answer is similar to how we've attempted to solve this problem, though we had to solve it by hand (good to know Maple can solve this). I'll post what we came up with soon - it is a bit different. – Barron May 15 '12 at 17:16\n• The second part is also interesting. @Emre suggested a convolution of the Gaussian part with the Noncentral Chi square, but I'm concerned with the lack of independence of the terms. Your separation of $g$ and $h$ might enable us to convolve $g$ with the PDF of $B\\sigma_H^2(\\tilde h + C^2)$. – Barron May 15 '12 at 17:22\n\nFirst of all, we can decorrelate the linear and quadratic terms by completing the square:\n\n$g + \\sum A_i h_i + B_i h_i^2 \\equiv g' + \\sum B_i (h_i')^2$\n\nThe sum of squared nonstandard normal random variables appears to have no name or neat density, so I will compute it numerically, assuming that all the random variables are independent.\n\n## Example\n\nRemember that the density of the sum of two random variables is the convolution of their densities, and that convolution is a Fourier/Laplace transform pair with multiplication. Thus, we can easily convolve multiple pdfs by multiplying their Laplace- or Fourier transforms.\n\nSince Pedro gave you an example in MATLAB, let me provide a complementary one in Mathematica. This toy example only has one quadratic term, but extension is easy.\n\nmu = RandomReal[{0, 20}, 2]\nsigma = RandomReal[{1, 5}, 2]\nweights = RandomReal[{0, 1}, 2]\nlist1 = Table[PDF[NormalDistribution[mu[], sigma[]], x/weights[]]/\nweights[], {x, 0, 50, 0.1}]\nlist2 = Table[\nPDF[NoncentralChiSquareDistribution [1, mu[]^2],\nx/(sigma[] weights[])]/(sigma[] weights[]), {x, 0, 50, 0.1}];\nListPlot[{list1, list2}, PlotRange -> {{0, 300}, {0, 0.4}}]\n\n\nThis plot shows the discretizations of the normal and non-central chi-square random variables:",
null,
"ListPlot[InverseFourier[ Times[##] &@\nApply[Sequence, Fourier[#] & /@ {list1, list2}]],\nPlotRange -> {{0, 400}, {0, 0.06}}]\n\n\nThis plot shows the convolution; the final result:",
null,
"• While $g$ and $h$ are independent, [$g + \\sum A_i h_i$] and $Bh_i^2$ are not (because they both involve $h$). Would this be problematic for the convolution you propose? – Barron May 15 '12 at 13:51\n• You are right; they need to be decorrelated. I made some corrections. – Emre May 15 '12 at 18:20\n\nFor the simple case of $\\mathcal M = g + Ah$, the result is a convolution of the PDFs $f_G$ and $f_H$, i.e.\n\n$$f_{\\mathcal M}(x) = \\int_{-\\infty}^\\infty f_G(t)\\bar{f}_H(x-t)\\,\\mbox{d}t$$\n\nwhere $\\bar{f}_H$ is $f_H$ normalized such that $A$ disappears.\n\nMultiple sums are convolutions of convolutions. This can quickly get quite messy.\n\nOne way of computing them numerically (in Matlab) is to use Chebfun (just as a disclaimer, I'm a member of the Chebfun development team):\n\n>> normdist = @(m,s) @(x) 1/(s*sqrt(2*pi))*exp(-0.5*((x-m)/s).^2);\n>> G = chebfun( normdist(0,1) , [-10,10] )\nG =\nchebfun column (1 smooth piece)\ninterval length endpoint values\n[ -10, 10] 93 7.7e-23 7.7e-23\nvertical scale = 0.4\n>> H = chebfun( normdist(2,0.5) , [-10,10] )\nH =\nchebfun column (1 smooth piece)\ninterval length endpoint values\n[ -10, 10] 169 6.7e-126 2.1e-56\nvertical scale = 0.79\n>> M = conv(G,H)\nM =\nchebfun column (2 smooth pieces)\ninterval length endpoint values\n[ -20, 0] 59 1.2e-34 0.072\n[ 0, 20] 70 0.072 9.1e-35\nTotal length = 129 vertical scale = 1.6\n\n\nWe can verify this result by comparing it to the exact result\n\n>> Mex = chebfun( normdist( 2 , sqrt(1^2+0.5^2) ) , [-20,20] )\nMex =\nchebfun column (1 smooth piece)\ninterval length endpoint values\n[ -20, 20] 154 3e-85 1.9e-57\nvertical scale = 0.36\n>> norm(M-Mex,inf)\nans =\n5.5569e-16\n\n\nI'm not using an infinite domain, since this seems to be broken in my current version of Chebfun. The result seems to be correct to about machine precision though.\n\n• It isn't clear to me if/how we might incorporate the $B h^2$ term into this. Could that be added? – Barron May 15 '12 at 17:25\n• @Barron: You could try generating the PDF of $h^2$ via the integral $H^2(x) \\int_{-\\infty}^\\infty H(t)*H(x/t)\\,\\mbox{d}t$ and summing it as above. This is no longer a convolution, so in Chebfun you'd have to do something like H2 = chebfun( @(x) ... , [-10,10] ) where ... computes the above integral for some x. – Pedro May 15 '12 at 22:43"
] | [
null,
"https://i.stack.imgur.com/bPSLQ.png",
null,
"https://i.stack.imgur.com/bhqiN.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9128107,"math_prob":0.9998022,"size":724,"snap":"2019-51-2020-05","text_gpt3_token_len":206,"char_repetition_ratio":0.13472222,"word_repetition_ratio":0.0,"special_character_ratio":0.29005525,"punctuation_ratio":0.06569343,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999614,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,6,null,6,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-12-15T21:48:03Z\",\"WARC-Record-ID\":\"<urn:uuid:eef9124e-75d9-41b7-9abc-80f879a3b113>\",\"Content-Length\":\"153990\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c5807b21-b0af-4d95-8e8d-785aa79bd2e8>\",\"WARC-Concurrent-To\":\"<urn:uuid:fcaee365-5296-4748-80db-8cb4e4811a6c>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://scicomp.stackexchange.com/questions/2216/computing-the-pdf-of-a-quadratic-function-of-two-random-variables\",\"WARC-Payload-Digest\":\"sha1:BGSWLE364PW2NTKJXB3TE5GR3YMXHDNN\",\"WARC-Block-Digest\":\"sha1:FVFZ3KQ5W32S4TACRCHK7DOCGEPZDDLI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-51/CC-MAIN-2019-51_segments_1575541310866.82_warc_CC-MAIN-20191215201305-20191215225305-00053.warc.gz\"}"} |
https://brainmass.com/math/differential-geometry/relativity-differential-geometry-147380 | [
"Explore BrainMass\nShare\n\n# Relativity: Differential Geometry\n\nThis content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!\n\nA particle moves along a parametrized curve given by\n\nx(lamda)=cos(lamda), y(lamda)=sin(lamda), z(lamda)=lamda\n\nExpress the path of the curve in the spherical polar coordinates {r, theta, pheta}\nwhere x = rsin(theta)cos(pheta)\ny=rsin(theta)sin(pheta)\nz=rcos(theta)\nso that the metric is\nds^2=dr^2+(r^2)d(theta)^2+(r^2)sin^2(theta)d(pheta)^2\n\nCalculate the components of the tangent vector to the curve in both Cartesian and spherical polar coordinate systems."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7703818,"math_prob":0.9955996,"size":1085,"snap":"2020-10-2020-16","text_gpt3_token_len":275,"char_repetition_ratio":0.12673451,"word_repetition_ratio":0.21212122,"special_character_ratio":0.21935484,"punctuation_ratio":0.09045226,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998211,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-02-17T19:36:15Z\",\"WARC-Record-ID\":\"<urn:uuid:993acb1d-9ff7-4ee0-8060-e79f10001cdf>\",\"Content-Length\":\"48105\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:239c9c18-6d60-4f81-b805-ba5a28f696c3>\",\"WARC-Concurrent-To\":\"<urn:uuid:ba36d7fa-424a-47b2-945a-432301021eda>\",\"WARC-IP-Address\":\"65.39.198.123\",\"WARC-Target-URI\":\"https://brainmass.com/math/differential-geometry/relativity-differential-geometry-147380\",\"WARC-Payload-Digest\":\"sha1:DAKUTNFNAMZOBTGE35ZP53MKPI4JYX3N\",\"WARC-Block-Digest\":\"sha1:T6WHV4PYKWSW4TJ5XKKLDCE54TU74GVF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-10/CC-MAIN-2020-10_segments_1581875143079.30_warc_CC-MAIN-20200217175826-20200217205826-00008.warc.gz\"}"} |
https://gladhoboexpress.blogspot.com/2018/09/ | [
"## Wednesday, September 26, 2018\n\n### 1051 & 1061\n\n1051 is the 177th prime and 1061 is the 178th. We can create palindromes out of the two numbers in three easy ways:\n\n1051 + 1061 = 2112\n\n1051 * 1061 = 1115111\n\n1051^2 + 1061^2 = 2230322\n\n## Monday, September 10, 2018\n\n### A prime number of consecutive primes summing to a repdigit prime\n\nI suppose that 2 + 3 = 5 is an example, even though the 5 is a degenerate repdigit number. A more proper solution is 158730158730158647 + 158730158730158681 + 158730158730158699 + 158730158730158723 + 158730158730158759 + 158730158730158783 + 158730158730158819 = 1111111111111111111, that sum being one of the few known repunit primes.\n\nWhat else?"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.84066105,"math_prob":0.95289665,"size":690,"snap":"2023-40-2023-50","text_gpt3_token_len":231,"char_repetition_ratio":0.22886297,"word_repetition_ratio":0.0,"special_character_ratio":0.5289855,"punctuation_ratio":0.11304348,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9973414,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-11-29T05:53:13Z\",\"WARC-Record-ID\":\"<urn:uuid:28a5f0e5-72fe-44b1-b351-b785f88d30ba>\",\"Content-Length\":\"96740\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b498f639-49ad-4a6d-ac4d-a72cc357b267>\",\"WARC-Concurrent-To\":\"<urn:uuid:b5063083-7f70-4f20-a46d-a044f687b488>\",\"WARC-IP-Address\":\"172.253.62.132\",\"WARC-Target-URI\":\"https://gladhoboexpress.blogspot.com/2018/09/\",\"WARC-Payload-Digest\":\"sha1:MV3FXL4KYTQX2AOS3B4SXAB4NK2JR3ZQ\",\"WARC-Block-Digest\":\"sha1:FL7LHEVIMFQNTM3EDC3QZMVZSJDBBBML\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100056.38_warc_CC-MAIN-20231129041834-20231129071834-00450.warc.gz\"}"} |
https://ori.codes/artificial-intelligence/integrating-the-lane-finding/ | [
"",
null,
"The model will consist of two parallel CNNs, each of which end with a dense 100-unit layer, which we will then concatenate and pass through three additional dense layers, and end with two linear activations. The model should have about 6.5 million parameters, which take up about 2GB of VRAM, so we should be able to run it on our Jetson Nano with half that much RAM to spare. :)\n\n## The idea of teaching a vehicle to drive autonomously\n\nNow I know that a whole separate (and rather big) CNN is an overkill for the thresholded binary image, but the main reason why I'm currently doing it like this is to test if its possible to have multiple specialized parts of the architecture all siphon in to a smaller final part (the last n dense layers) in order for the car to make a decision where to steer and how much to throttle, which is more or less how you do everything while you're in a car, parking, driving, you just combine multiple inputs, e.g.:\n\n• Checking your mirrors and dead angle to make sure you're safe to do a maneuver - collision avoidance, object recognition and tracking\n• Recognizing a sign that says what exit you should take in order to get to your destination\n• Actually knowing where you are with respect to that exit and by what path can you get to it - path planning, localization\n• Actually give the appropriate steering and throttle to actually perform the maneuver\n\nSo no matter what we're doing in a car, be it parking, changing lanes or driving to a destination, all we can really do to control the car is turn the steering wheel and control its speed (assuming no gear shifting, e.g. an electric car 😋), we're just taking in the input from our surroundings, mostly using our eyes, which we analyze through a series of specialized procedures which ultimately lead us to control our car based on the decisions we've made, in order to perform a maneuver.\n\nSo what I wanted to do is to have a series of specialized parts in the net, which we could even call smaller subnets, which would take the input images and extract highly specific data from it, using (relatively) specialized procedures, which we would then plug into the final layer, along with the first convolutional network that uses the raw input image, which should give the final part of the network enough context about the world and enough information in order to appropriately control the RC.\n\nIt would look something like this:",
null,
"I was playing around with the idea in my mind when I saw Andrej Karpathy's talk on PyTorch at Tesla, where he explained their use of HydraNets. In a nutshell, because they have a 1000 (!) distinct output tensors (predictions), and all of them have to know a ton of context and details about the scene, they use a shared backbone, like this (screenshot taken from YouTube: PyTorch at Tesla:",
null,
"They actually have 48 networks that output a total of 1000 predictions, which is insane to do in real-time (on 1000x1000 images and 8 cameras) while being accurate enough to actually drive living humans on real roads. Though, they do have some pretty sweet custom hardware (FSD2), unlike our Jetson Nanos 😢.\n\nNow, it obviously makes much more sense to do what Tesla did, to have a shared backbone since a lot of the information that the backbone extracts from the input images can be applied to all of the specialized tasks, so you don't have to learn them all over again for each and every one of them.\n\nBut I figured, what the heck, I'd try my idea out, which I did, since the main reason for doing this is to actually learn to apply ML/DL to something I could actually see drive around my backyard, and when we teach the car to do behaviours like lane changing in the next chapter, you'll see that it actually works!\n\nThis is what it looks like in action:\n\nLet's implement it.\n\n### Creating a Keras model\n\nFirst off, we'll create a Keras model in the donkeycar/parts folder. I'll be calling it OriModel.\n\nfrom donkeycar.parts.keras import KerasPilot\n\nfrom tensorflow.python.keras.models import Model, Sequential\nfrom tensorflow.python.keras.layers import Input, Dense, Activation, Dropout, Flatten, Conv2D\nfrom tensorflow.python.keras.layers.merge import Concatenate\n\nimport cv2\nimport numpy as np\n\n\nWe'll be inheriting the base KerasPilot class for Donkey, the model will be a sequential one and among others it will use dense, 2D convolutional layers and the concatenation layer.\n\nWe'll also need OpenCV and Numpy for our image preprocessing.\n\nWe'll start by inheriting the base class and implementing the constructor and compile methods:\n\nclass OriModel(KerasPilot):\n'''\nCustom model that takes an input image and feeds it and a preprocessed version of it to the model.\nThe preprocessing converts the image to HSL color space, extracts the S channel and thresholds it.\nThe thresholded S channel is passed to the model to help find lane lines easier.\n'''\ndef __init__(self, model=None, input_shape=(180, 320, 3), *args, **kwargs):\nsuper(OriModel, self).__init__(*args, **kwargs)\nself.model = oriModel(inputShape=input_shape)\nself.compile()\n\ndef compile(self):\nself.model.compile(optimizer=self.optimizer,\nloss='mse')\n\n\nWe'll want to preprocess images at runtime, so we can use it during inference, so we'll implement the run method accordingly:\n\ndef run(self, inputImage):\n# Preprocesses the input image for easier lane detection\nextractedLaneInput = self.processImage(inputImage)\n# Reshapes to (1, height, width, channels)\nextractedLaneInput = extractedLaneInput.reshape((1,) + extractedLaneInput.shape)\ninputImage = inputImage.reshape((1,) + inputImage.shape)\n# Predicts the output steering and throttle\nsteering, throttle = self.model.predict([inputImage, extractedLaneInput])\nprint(\"Throttle: %f, Steering: %f\" % (throttle, steering))\nreturn steering, throttle\n\n\nWe'll use the code we wrote in the previous chapter and unify it in a couple helper methods:\n\ndef warpImage(self, image):\n# Define the region of the image we're interested in transforming\nregionOfInterest = np.float32(\n[[0, 180], # Bottom left\n[112.5, 87.5], # Top left\n[200, 87.5], # Top right\n[307.5, 180]]) # Bottom right\n\n# Define the destination coordinates for the perspective transform\nnewPerspective = np.float32(\n[[80, 180], # Bottom left\n[80, 0.25], # Top left\n[230, 0.25], # Top right\n[230, 180]]) # Bottom right\n# Compute the matrix that transforms the perspective\ntransformMatrix = cv2.getPerspectiveTransform(regionOfInterest, newPerspective)\n# Warp the perspective - image.shape[:2] takes the height, width, [::-1] inverses it to width, height\nwarpedImage = cv2.warpPerspective(image, transformMatrix, image.shape[:2][::-1], flags=cv2.INTER_LINEAR)\nreturn warpedImage\n\ndef extractLaneLinesFromSChannel(self, warpedImage):\n# Convert to HSL\nhslImage = cv2.cvtColor(warpedImage, cv2.COLOR_BGR2HLS)\n# Split the image into three variables by the channels\nhChannel, lChannel, sChannel = cv2.split(hslImage)\n# Threshold the S channel image to select only the lines\nlowerThreshold = 65\nhigherThreshold = 255\n# Threshold the image, keeping only the pixels/values that are between lower and higher threshold\nreturnValue, binaryThresholdedImage = cv2.threshold(sChannel,lowerThreshold,higherThreshold,cv2.THRESH_BINARY)\n# Since this is a binary image, we'll convert it to a 3-channel image so OpenCV can use it\nthresholdedImage = cv2.cvtColor(binaryThresholdedImage, cv2.COLOR_GRAY2RGB)\nreturn thresholdedImage\n\ndef processImage(self, image):\nwarpedImage = self.warpImage(image)\n# We'll normalize it just to make sure it's between 0-255 before thresholding\nwarpedImage = cv2.normalize(warpedImage,None,0,255,cv2.NORM_MINMAX,cv2.CV_8U)\nthresholdedImage = self.extractLaneLinesFromSChannel(warpedImage)\none_byte_scale = 1.0 / 255.0\n# To make sure it's between 0-1 for the model\nreturn np.array(thresholdedImage).astype(np.float32) * one_byte_scale\n\n\nAnd now to the architecture/model itself. First, let's define the inputs and the dropout rate:\n\ndef oriModel(inputShape, numberOfBehaviourInputs):\n\n# Dropout rate\nkeep_prob = 0.9\nrate = 1 - keep_prob\n\n# Input layers\nimageInput = Input(shape=inputShape, name='imageInput')\nlaneInput = Input(shape=inputShape, name='laneInput')\nbehaviourInput = Input(shape=(numberOfBehaviourInputs,), name=\"behaviourInput\")\n\n\nNow let's define the upper CNN, which takes in the raw image as its input:\n\n# Input image convnet\nx = imageInput\nx = Conv2D(24, (5,5), strides=(2,2), name=\"Conv2D_imageInput_1\")(x)\nx = LeakyReLU()(x)\nx = Dropout(rate)(x)\nx = Conv2D(32, (5,5), strides=(2,2), name=\"Conv2D_imageInput_2\")(x)\nx = LeakyReLU()(x)\nx = Dropout(rate)(x)\nx = Conv2D(64, (5,5), strides=(2,2), name=\"Conv2D_imageInput_3\")(x)\nx = LeakyReLU()(x)\nx = Dropout(rate)(x)\nx = Conv2D(64, (3,3), strides=(1,1), name=\"Conv2D_imageInput_4\")(x)\nx = LeakyReLU()(x)\nx = Dropout(rate)(x)\nx = Conv2D(64, (3,3), strides=(1,1), name=\"Conv2D_imageInput_5\")(x)\nx = LeakyReLU()(x)\nx = Dropout(rate)(x)\nx = Flatten(name=\"flattenedx\")(x)\nx = Dense(100)(x)\nx = Dropout(rate)(x)\n\n\nI'll explain why I'm using LeakyReLU in a moment. Let's define the bottom CNN which takes in the thresholded lane image as its input:\n\n# Preprocessed lane image input convnet\ny = laneInput\ny = Conv2D(24, (5,5), strides=(2,2), name=\"Conv2D_laneInput_1\")(y)\ny = LeakyReLU()(y)\ny = Dropout(rate)(y)\ny = Conv2D(32, (5,5), strides=(2,2), name=\"Conv2D_laneInput_2\")(y)\ny = LeakyReLU()(y)\ny = Dropout(rate)(y)\ny = Conv2D(64, (5,5), strides=(2,2), name=\"Conv2D_laneInput_3\")(y)\ny = LeakyReLU()(y)\ny = Dropout(rate)(y)\ny = Conv2D(64, (3,3), strides=(1,1), name=\"Conv2D_laneInput_4\")(y)\ny = LeakyReLU()(y)\ny = Dropout(rate)(y)\ny = Conv2D(64, (3,3), strides=(1,1), name=\"Conv2D_laneInput_5\")(y)\ny = LeakyReLU()(y)\ny = Flatten(name=\"flattenedy\")(y)\ny = Dense(100)(y)\ny = Dropout(rate)(y)\n\n\nNow we have to concatenate the two networks and feed them into the last three dense layers:\n\n# Concatenated final convnet\nc = Concatenate(axis=1)([x, y])\nc = Dense(100, activation='relu')(c)\nc = Dense(50, activation='relu')(c)\n\n\nAnd finally, we'll define the output and return the model:\n\n# Output layers\nsteering_out = Dense(1, activation='linear', name='steering_out')(o)\nthrottle_out = Dense(1, activation='linear', name='throttle_out')(o)\nmodel = Model(inputs=[imageInput, laneInput, behaviourInput], outputs=[steering_out, throttle_out])\n\nreturn model\n\n\n## Why LeakyReLU\n\nAs every model, this one began as one thing and ended up a whole different thing in terms of hyperparameters and the architecture. I'll explain that in much more detail in the next chapter. But one thing that happened to me while training the above model using ReLU as the activation function for the convolutional layers was dying ReLU(s).\n\nFirst, let's remember how the ReLU (Rectified Linear Unit) function is defined: $$f(x) \\begin{cases} x & \\text{when x=>0}\\\\ 0 & \\text{when x<0} \\end{cases}$$ This is what it looks like when plotted:",
null,
"You can see that any negative input will result in a 0 activation for the ReLU function.\n\nNow imagine we get a large negative value that gets input to our unit that uses the ReLU activation function. It will cause the unit weights to update in a way that will prevent it to ever be activated again.\n\nThis is a known disadvantage of ReLU, and there are even papers written on this topic alone 1. Stanford's course CS231n states that: you can find that as much as 40% of your network can be “dead” .\n\nIn my case, the neural network was just outputting the same throttle and steering values for every input. And since it had a lot of layers, I knew it should be learning at least something, and after removing the small (10%) dropout rate I've implemented, and after it still hasn't changed, I realised that many of the convolutional units weren't really outputting anything, which caused the rest of the network to just have the same output over and over again.\n\nThe fix was obviously to use either LeakyReLU or PReLU or any other activation function made specifically to overcome this advantage of ReLUs, while still preserving it's linear non-saturating form.\n\nWhy not PReLU? Because I wanted to try something simple before having an additional parameter to train, which I'd get by using PReLUs, and after trying out LeakyReLU the model trained just fine, with the loss being close to 0.001 (using MSE as the loss function).\n\nHere's the definition of LeakyReLU $$f(x) \\begin{cases} x & \\text{when x=>0}\\\\ \\alpha \\cdot x & \\text{when x<0} \\end{cases}$$ The default alpha in Keras is 0.3. Here's a plot of LeakyReLU with $\\alpha = 0.3$:",
null,
"And here's a plot when $\\alpha = 0.03$:",
null,
"You can choose whichever $\\alpha$ value you'd like. This will allow the unit to activate even if the value is negative.\n\nSpeaking of choosing $\\alpha$, the main idea behind PReLU is to make it a parameter which the network will learn. You can read about PReLUs in this paper they were first proposed by He et al. or you can take a look at the Keras implementation here.\n\n## Training the network\n\nI've trained the network using about 10k records made on the randomly generated track, and left the network to train for 12 epochs which took 21m 45s on my RTX 2060. The final validation loss was 0.003665.\n\nHere is a graph showing a plot of the training loss vs the validation loss:",
null,
"Here is the training loss plot with the two separate outputs plotted:",
null,
"Here is the validation loss plot with the two separate outputs plotted:",
null,
""
] | [
null,
"https://d33wubrfki0l68.cloudfront.net/bc870587009b49965296cbcb99ee4b19a1ff9e6b/e70f5/images/ai/nnwithoutbehavior2.png",
null,
"https://d33wubrfki0l68.cloudfront.net/7d65625cea2eace5948eac209bd987081e3667d6/0ba3a/images/ai/networkidea.png",
null,
"https://d33wubrfki0l68.cloudfront.net/4e54156960e18c47314950e7a016cd7ee9eaaa64/672fe/images/ai/karpathyhydranets.jpg",
null,
"https://d33wubrfki0l68.cloudfront.net/b137b5573ca63a7dba2e839d954cec96ac7dce79/3fe2c/images/ai/relu.png",
null,
"https://d33wubrfki0l68.cloudfront.net/48bcf12cec8de580b9ca9e01319950d97b888fd5/944e1/images/ai/leakyrelu.png",
null,
"https://d33wubrfki0l68.cloudfront.net/d39825930dd17f10ae89fd3422ce398637494b67/cec69/images/ai/leakyrelu2.png",
null,
"https://d33wubrfki0l68.cloudfront.net/9937fdd2644d3a38da745530cb7092678068fdb5/611a7/images/ai/training.png",
null,
"https://d33wubrfki0l68.cloudfront.net/7ad876e5d9d641af1385754586c43ce139c4457e/82377/images/ai/training2.png",
null,
"https://d33wubrfki0l68.cloudfront.net/70e18e40421c43fc51e568e718ec547fd522793a/f2ba3/images/ai/training3.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.85740286,"math_prob":0.94879645,"size":12743,"snap":"2022-27-2022-33","text_gpt3_token_len":3282,"char_repetition_ratio":0.10934924,"word_repetition_ratio":0.039082855,"special_character_ratio":0.25825945,"punctuation_ratio":0.14090909,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9874145,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18],"im_url_duplicate_count":[null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null,2,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-07T15:33:07Z\",\"WARC-Record-ID\":\"<urn:uuid:a00aa598-4ac1-4050-8e3a-3c229d5761d0>\",\"Content-Length\":\"78828\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a54a8ceb-4ee1-495c-bf57-a097ba913542>\",\"WARC-Concurrent-To\":\"<urn:uuid:5361b22d-c5b4-4b81-9c1e-af583318d541>\",\"WARC-IP-Address\":\"52.73.153.209\",\"WARC-Target-URI\":\"https://ori.codes/artificial-intelligence/integrating-the-lane-finding/\",\"WARC-Payload-Digest\":\"sha1:PEJXQE4GZC4HNKVFJ2FHOBQFGQBAVDQ3\",\"WARC-Block-Digest\":\"sha1:ARNAQ65KKFHLH3C54FYGHY4PIAZDWHB2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882570651.49_warc_CC-MAIN-20220807150925-20220807180925-00270.warc.gz\"}"} |
http://wiki.secondlife.com/wiki/LlFrand | [
"LlFrand\n\n LSL Portal\nFunction: float llFrand( float mag );\n 8 Function ID 0 Forced Delay 10 Energy\n\nReturns a float that is pseudo random in the range [0.0, mag) or (mag, 0.0].\nThis means that the returned value can be any value in the range 0.0 to mag including 0.0, but not including the value of mag itself. The sign of mag matches the return.\n\n • float mag – Any valid float value\n\nWhen converting the float to an integer, be sure to use an integer typecast (integer) and not one of the rounding functions (llRound, llFloor, llCeil). The integer typecast is the only method guaranteed not to skew the distribution of integer values.\n\nCaveats\n\n• The random number generator is not a source of entropy.\n• The sequence of random numbers are shared across the entire simulator process, and not independently seeded. Therefore, the pseudo random number generation is not suitable for any application which requires completely predictable or completely unpredictable results.\n• It should be remembered that when passing llFrand an integer as the mag, it will be implicitly typecast to a float.\n• Many integers outside the range [-224, +224] can not be represented in a float (this is an inherent limitation of the float type); for example, outside that range no odd integers will appear. For that reason, when converting the resulting float to integer, it is impossible to generate more than 224+1 uniformly distributed values, and it's also impossible to generate more than 9*223+1 or about 75 million different integers in total. Two llFrand calls may be needed to obtain the desired integer range; see examples below.\nAll Issues ~ Search JIRA for related Bugs\n\nExamples\n\nMethod one: returns float within (5.0, 10.0] Method two: returns float within (5.0, 10.0]\ndefault\n{\nstate_entry()\n{\nfloat randomFloat = 10.0 + llFrand(-5.0);\n\nllSay(0, (string) randomFloat);\n}\n}\ndefault\n{\nstate_entry()\n{\nfloat randomFloat = 10.0 - llFrand(5.0);\n\nllSay(0, (string) randomFloat);\n}\n}\n// *near* 50:50 chance of \"Heads\" vs. \"Tails\"\ninteger coin_toss()\n{\nif (llFrand(1.0) < 0.5) return TRUE;\nreturn FALSE;\n}\n\n// Sometimes it is useful to get a random integer over a given range. This is\n// a surprisingly tricky and emotive subject and has caused endless discussion\n// on the scripting groups. The primary cause of probability errors when\n// employing llFrand is to have a varying bin size on the edges of the range.\n//\n// As the bracket notation indicates, [0.0, mag), the function is inclusive of\n// the 0.0 and exclusive of the entered value. Because an LSL floating point\n// number is only a subset of real numbers and does not have infinite\n// granularity, this schema will work for any float greater than float\n// t = 1.175494351e-38; at which value the function will return only zero. At a\n// float beyond this, a math error occurs.\n\n// Random integer generator:\n// Contributed by Mephistopheles Thalheimer,\n// original function posted by Hg Beeks\n\n// Returns a pseudo-random integer in the range of min to max inclusive.\n\n// Rationale:\n// Expands the range by 1.0 to ensure equal bin spacing on ends relative to\n// the middle of the range and then uses an integer cast to round towards\n// zero.\n\n// Caveats:\n// This function is not range checked and will fail if max < min\n\ninteger random_integer(integer min, integer max)\n{\nreturn min + (integer)(llFrand(max - min + 1));\n}\n\nsay(string message)\n{\nllSay(0, message);\n}\n\ndefault\n{\ntouch_start(integer total_number)\n{\n// *near* 50:50 chance of \"Heads\" vs. \"Tails\"\nelse say(\"Tails\");\n\ninteger n1 = random_integer(2, 8); // Return a random number between 2 and 8\nsay(\"I chose a \" + (string)n1);\n\n}\n}\n// Example for generating an uniformly distributed integer with more than\n// 16 million possible values; in particular, this code will generate\n// 500,000,000 possible values, ranging from 0 to 499,999,999 inclusive.\n//\n// The method consists of not using llFrand() on a number larger than 16,777,216\n// (2^24) but to divide the range into two numbers that are both less than that,\n// using a scheme of the form (integer)llFrand(a)*b + (integer)llFrand(b), where\n// a*b gives the desired range.\n//\n// For prime ranges, or ranges with a prime factor greater than 2^24, a rejection\n// scheme should be used (use this method to generate a number slightly above the\n// target range, and reject it and generate a new one if it exceeds the maximum).\n\ndefault\n{\nstate_entry()\n{\ninteger rand = (integer)llFrand(500)*1000000 + (integer)llFrand(1000000);\nllOwnerSay(\"Here's a random number between 0 and 499,999,999 inclusive: \" + (string)rand);\n}\n}\n\nThe following code produces the most possibilities for random negative integers (suitable for use as channel numbers for example)\n\ninteger rand = 0x80000000 | (integer)llFrand(65536) | ((integer)llFrand(65536) << 16);\n// Simple integer random number tester\n// Contributed by Mephistopheles Thalheimer\n\n// This is a random number tester designed to give a quick visual explanation\n// and proof of why some random integer functions just do not work. In general,\n// with any random number generator, if you can see a pattern emerging, then\n// chances are, the function is not random.\n\n// The test case given \"silly_random_integer( .. )\" shows the type of pitfalls\n// that can happen. Superficially, it would seem like a good candidate. I\n// thought so, and in fact mooted it in a discussion, however, a bit of thought\n// reveals that the first and last bin are only collecting rounded results from\n// half the float space as the rest of the integers. They are therefore\n// under-represented in output, and the generator is flawed.\n\ninteger random_integer(integer min, integer max)\n{\nreturn min + (integer)llFrand(max - min + 1);\n}\n\ninteger silly_random_integer(integer min, integer max)\n{\nreturn min + (integer)(llRound(llFrand(max - min))); // Looks good, but does not work\n}\n\nsay(string message)\n{\nllSay(0, message);\n}\n\n// Simple integer random number tester\n// Contributed by Mephistopheles Thalheimer\n\nlist bins;\n\ninteger MIN = 2; // The minimum integer you want\ninteger MAX = 5; // The maximum integer you want\n\ninteger NUMBER_OF_TRIES = 10000; // The bigger the better.. but slower\n\ndefault\n{\nstate_entry()\n{\nbins = [];\n}\n\ntouch_start(integer total_number)\n{\n\nsay(\"Started, be patient\");\n\ninteger i;\ninteger r;\n\ninteger range = MAX - MIN;\n\nfor (i = 0; i <= range; ++i)\n{\nbins += [ 0 ];\n}\n\ninteger v;\ninteger out_of_range;\n\nfor (i = 0; i < NUMBER_OF_TRIES; ++i)\n{\n// Replace the next line with the function you are testing\nr = silly_random_integer(MIN, MAX);\n\n// Note the output on the next line has about 0.5 expected hits on the first and last bin\n// r = random_integer(MIN, MAX);\n\nif (r > MAX || r < MIN)\n{\nout_of_range++;\n}\nelse\n{\nv = llList2Integer(bins, r - MIN);\nbins = llListReplaceList(bins, [++v], r - MIN, r - MIN);\n}\n}\n\nfor (i = 0; i <= range; ++i)\n{\nsay(\"Bin #\" + (string)(i + MIN) + \" = \" + (string)llList2Integer(bins, i));\n}\n\nsay(\"Number out of range = \" + (string)out_of_range);\n}\n}\n//Exponential distribution\n//\n// Contributed by Pat Perth on October 5th 2013\n// No rights reserved\n//\n// Return an exponentially distributed random number with expected value 'mean_value'\n//\n// Reference: Wikipedia article \"Exponential distribution\", in particular the section\n// entitled \"Generating exponential variates\" at\n//\n// http://en.wikipedia.org/wiki/Exponential_distribution (visited on October 5th 2013)\n//\n// The exponential distribution is often an appropriate way to simulate waiting times\n// of the sort \"It takes about x seconds for <something> to happen.\" For\n// example, if you want to trigger a rain shower \"about every seven days\", use\n//\n// time_between_rain = random_exponential(7.0 * 24.0 * 60.0 * 60.0) ;\n//\n// in an llSleep(...) or llSetTimerEvent(...) call.\n//\n// Please notice the negative sign in the return value.\n\nfloat random_exponential(float mean_value)\n{\nreturn -mean_value * llLog(llFrand(1.0));\n}\n\nUseful Snippets\n\nPseudo-random_Number_Generator - Suitable for apps which require repeatable results that feel random.\n\nFunctions\n\n • llListRandomize\n\nDeep Notes\n\nSearch JIRA for related Issues\n\nFootnotes\n\n1. ^ The ranges in this article are written in Interval Notation.\n\nSignature\n\nfunction float llFrand( float mag );"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6252501,"math_prob":0.9815019,"size":8347,"snap":"2019-43-2019-47","text_gpt3_token_len":2110,"char_repetition_ratio":0.14623037,"word_repetition_ratio":0.05090909,"special_character_ratio":0.2890859,"punctuation_ratio":0.13830508,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9924628,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-19T15:32:20Z\",\"WARC-Record-ID\":\"<urn:uuid:927b603f-b0f2-4a2b-936c-75333df621e6>\",\"Content-Length\":\"57869\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1e8147fc-a85f-4dd0-903b-92d02968b0d9>\",\"WARC-Concurrent-To\":\"<urn:uuid:3ca8386f-ab8e-4d86-b4c4-19119945a84a>\",\"WARC-IP-Address\":\"54.200.127.8\",\"WARC-Target-URI\":\"http://wiki.secondlife.com/wiki/LlFrand\",\"WARC-Payload-Digest\":\"sha1:TSMZUPSO5XCSUFOBXZGT7SZU5YK3PTC5\",\"WARC-Block-Digest\":\"sha1:65LHDXQJC23YUTYIJ64WJERH2XQWQAUJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986696339.42_warc_CC-MAIN-20191019141654-20191019165154-00011.warc.gz\"}"} |
https://community.intel.com/t5/Software-Archive/Cheap-random-projections/td-p/1107066 | [
"Community\ncancel\nShowing results for\nDid you mean:\nHighlighted\nBeginner\n11 Views\n\n## Cheap random projections\n\nHere is a low computational cost way of doing random projections:https://drive.google.com/open?id=0BwsgMLjV0BnhOGNxOTVITHY1U28\n\nYou can then go and do <vector,vector> or <vector,scalar> single layer networks using that:\n\nOr if you are willing to use evolution you can do deep networks with it. For example this algorithm works well:\n\nhttps://pdfs.semanticscholar.org/c980/dc8942b4d058be301d463dc3177e8aab850e.pdf\n\n16 Replies\nHighlighted\nBeginner\n11 Views\n\n## So the latest nVidia GPU can\n\nSo the latest nVidia GPU can do 120 TFlops of 16 bit floating point per second. That's 120,000,000 65536-point Walsh Hadamard transforms per second divided by say about 3 for all the addressing arithmetic. That's about 40 million 65536-point random projections (RP) per second. I won't even try to count the number of 1024-point RP's you could do a second. I guess you could evolve deep neural networks in real time that way.\n\nAnother thing you can do is use single layer RP networks as soft memory that deep neural networks can learn to exploit more easily that random access memory (RAM) which poses impossible needle in a haystack difficulties to evolution or gradient descent training algorithms. I mentioned you could use a truncation function to gate writes to such soft memory here: https://discourse.numenta.org/t/artificial-life-concept/2308\n\nHighlighted\nBlack Belt\n11 Views\n\n## Sean,\n\nSean,\n\nThe forum in which you entered the info is about Big Data with Intel Technologies, at Intel Software Network.\n\nHighlighted\nBeginner\n11 Views\n\n## Yes, I followed the AI links\n\nYes, I followed the AI links on your website and this is where I was directed. Thank you.\n\nThere is also a related paper that was put on Arxiv today:\n\nhttps://arxiv.org/pdf/1705.07441.pdf\n\nAnd I said a little more here:\n\nHighlighted\nBeginner\n11 Views\n\n## Maybe there are a couple of\n\nMaybe there are a couple of ideas that could be useful to Intel if random projections (RP) etc. become important.\n\nThe Walsh Hadamard transform (and RP) could be pipelined in hardware. And if you went to extremes they could be done in analog since only patterns of addition and subtraction are required. There was also talk of multiplier free neural networks in recent papers. That you can do with single layer RP networks if you use the signof function as a nonlinear activation function: signof(x)=1, x>=0 signof(x)=-1, x<0 then weight updates during training don't require multiply either. And actually that proves to be a good nonlinearity to use anyway. For deep RP nets I think you are restricted to training with evolution strategies (ES) rather than BP (but I could be wrong.) However with super fast evaluation times for RP nets that mightn't be a problem.\n\nHighlighted\nBeginner\n11 Views\n\n## In hardware all you would\n\nFor the \"no multiply\" networks:\n\nIn hardware all you would need are low transistor count, low power requirement integer add and subtract operations and a few other simple bit operators. Avoiding much more complex and space consuming multiply logic circuits. It should be quite easy to pipe-line the operations on a FPGA. One other thing is that you may not need full precision integer +- because 2's complement overflow would simply increase the amount of nonlinearity, but probably not too much.\n\nYou could imagine a chip that had say 100 million add/subtract logic units all working merrily away at 1 billion operations per second. 100 Peta operations per second. 10 Chips would get you to Exa scale. I presume you could train a network in real time at such speeds.\n\nHighlighted\nBeginner\n11 Views\n\n## Code for binarization of\n\nCode for binarization of continuous vectors showing the 37 degree effect:\n\nhttp://www.freebasic.net/forum/viewtopic.php?f=7&t=25710&p=232616#p232616\n\nHighlighted\nBeginner\n11 Views\n\n## A must have book for this\n\nA must have book for this kind of thing is:\n\nhttp://www.jjj.de/fxt/fxtbook.pdf\n\nThere are lots of bit transforms and other useful things for random projections, reservoir computing and such:\n\nThe source code is also available:\n\nhttp://www.jjj.de/\n\nHighlighted\nBeginner\n11 Views\n\n## There has been a lack of\n\nThere has been a lack of discussion about binarization in neural networks. Multiplying those +1/-1 values by weights and summing allows you to store values with a high degree of independence. For a given binary input and target value you get an error. You divide the error by the number of binary values and then you simply correct each of the weights by the reduced error taking account of the binary sign. That gives a full correction to get the correct target output. In higher dimensional space most vectors are orthogonal. For a different binary input the adjustments you made to the weights will not align at all. In fact they will sum to Gaussian noise by the central limit theorem. The value you previously stored for a second binary input will now be contaminated by a slight amount of Gaussian noise which you can correct for. This will now introduce an even smaller amount of Gaussian noise on the value for the first binary input. Iterating back and forth will get rid of the noise entirely for both binary inputs.\nThis has high use in random projection,reservoir and extreme learning machine computing. And in fact turns a simple locality sensitive hash formed by random projection followed by binarization into a useful single layer neural network.\n\nHighlighted\nBeginner\n11 Views\n\n## I suppose then there are 2\n\nI suppose then there are 2 ways to train a single layer of a deep neural network. If you just alter the weights then for every input every output will be different. However if you view a single layer as an associative memory then you can alter the response of the layer for a single input only, its behavior for different inputs being only marginally affected. This should avoid issues like catastrophic forgetting. It would also suggest that altering the response of the layer in such a mode should involve distinct pattern search not probing around with Gaussian noise. You would need to morph back-propagation so that it looked more like Hooke and Jeeves, or actually use Hooke and Jeeves or a similar pattern search to optimize the deep network associative memory layer responses.\n\nHighlighted\nBeginner\n11 Views\n\n## This book will tell you how\n\nThis book will tell you how to do error correcting associative memory using orthogonal projections:\n\nhttps://archive.org/details/SelfOrganizationAndAssociativeMemory\n\nHighlighted\nBeginner\n11 Views\n\n## I was having a problem\n\nI was having a problem evolving deep networks where the information loss caused by the dot product weight and sum operations was greater than the computational gains per layer.\nBy allowing more ways for information to pass through each layer I am seeing markedly improved results.\nor\n\nHighlighted\nBeginner\n11 Views\n\n## Just to show how easy it is\n\nJust to show how easy it is to code associative memory here is some code in FreeBasic:\n\n```type associativememory\nveclen as ulong\ndensity as ulong\nhash as ulong\t\t\t'32 bit unsigned integer\nweights as single ptr\t'pointer to 32 bit floats\nbinarize as boolean ptr\nwork as single ptr\ndeclare sub init(veclen as ulong,density as ulong,hash as ulong)\ndeclare sub free()\ndeclare sub train(target as single,inVec as single ptr)\ndeclare function recall(inVec as single ptr) as single\ndeclare sub signflip(vec as single ptr,h as long)\ndeclare sub wht(vec as single ptr)\nend type\n\nsub associativememory.init(veclen as ulong,density as ulong, hash as ulong)\nthis.veclen=veclen\nthis.density=density\nthis.hash=hash\nweights=callocate(veclen*density,sizeof(single)) 'allocate zeroed memory\nbinarize=callocate(veclen*density,sizeof(boolean))\nwork=callocate(veclen,sizeof(single))\nend sub\n\nsub associativememory.free()\ndeallocate(weights)\ndeallocate(binarize)\ndeallocate(work)\nend sub\n\nfunction associativememory.recall(inVec as single ptr) as single\ndim as ulong i,j\ndim as single x=0f\ndim as single ptr wtidx=weights\ndim as boolean ptr bidx=binarize\nfor i=0 to veclen-1\nwork=inVec\nnext\nfor i=0 to density-1\nsignflip(work,hash+i)\t'sign flip and wht=random projection\nwht(work)\nfor j=0 to veclen-1\nif work>0f then\t'if greater than 0\nx+=wtidx\nbidx=true\nelse\nx-=wtidx\nbidx=false\nend if\nnext\nwtidx+=veclen\nbidx+=veclen\nnext\nreturn x\nend function\n\nsub associativememory.train(target as single,inVec as single ptr)\ndim as ulong i,j\ndim as single ptr wtidx=weights\ndim as boolean ptr bidx=binarize\ndim as single e=target-recall(inVec)\t'get the prediction error\ne/=veclen*density\t'scale the error correctly so that it will be fully corrected\nfor i=0 to density-1\nfor j=0 to veclen-1\nif bidx then\nwtidx+=e\nelse\nwtidx-=e\nend if\nnext\nwtidx+=veclen\nbidx+=veclen\nnext\nend sub\n\n' Pseudorandomly flip the sign of the values in vector using h as a seed\n' h is a 32 bit signed interger\nsub associativememory.signflip(vec as single ptr,h as long)\ndim as ulong i\nfor i=0 to veclen-1\nh*=1664525\nh+=1013904223\nif h<0 then vec=-vec\nnext\nend sub\n\n'Fast Walsh Hadamard transform. Leaves vector length unchanged\nsub associativememory.wht(vec as single ptr)\ndim as ulong i,j,hs=1\ndim as single a,b,scale=1.0/sqr(veclen)\nwhile hs<veclen\ni=0\nwhile i<veclen\nj=i+hs\nwhile i<j\na=vec\nb=vec[i+hs]\nvec=a+b\nvec[i+hs]=a-b\ni+=1\nwend\ni+=hs\nwend\nhs+=hs\nwend\nfor i=0 to veclen-1\nvec*=scale\nnext\nend sub\n\nscreenres 300,300,32\n\ndim as associativememory net\ndim as single ptr vec=callocate(256,sizeof(single)) 'allocate zeroed\nnet.init(256,3,1234567)\n\nfor i as ulong=0 to 99\nfor j as ulong=0 to 254\nvec=1f\nnet.train(sin(j*.06)*100,vec)\nvec[j+1]=1f\nnet.train(cos(j*.2)*100,vec)\nvec=0f\nvec[j+1]=0f\nnext\nnext\ncls\nfor i as ulong=0 to 254\nvec=1f\npset (i,150-sin(i*.06)*100),rgb(0,255,0)\npset (i,150-net.recall(vec)),rgb(255,255,0)\nvec=0f\nnext\nfor i as ulong=0 to 254\nvec=1f\nvec[i+1]=1f\npset (i,150-cos(i*.2)*100),rgb(0,255,0)\npset (i,150-net.recall(vec)),rgb(255,0,255)\nvec=0f\nvec[i+1]=0f\nnext\ndeallocate(vec)\nnet.free()\ngetkey\n```\n\nI've written the code in a way that should be easy to translate into C. The number of elements in the vector must be a power of 2 (16,32,64...) because of the wht function.\n\nHighlighted\nBeginner\n11 Views\n\n## I see Google have plagiarized\n\nI see Google have \"cloned\" my work:\n\nSean O'Connor\n\nHighlighted\nBeginner\n11 Views\n\n## Anyway let's continue:\n\nAnyway let's continue:\n\nhttps://github.com/S6Regen/EvoNet\n\nHighlighted\nBeginner\n11 Views\n\n## Circumstances led me to make\n\nCircumstances led me to make a comment on the nVidia site about this type of network and associative memory:"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8712639,"math_prob":0.85816437,"size":10120,"snap":"2020-24-2020-29","text_gpt3_token_len":2522,"char_repetition_ratio":0.11358245,"word_repetition_ratio":0.028666666,"special_character_ratio":0.231917,"punctuation_ratio":0.099103585,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9820646,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-07-06T03:26:37Z\",\"WARC-Record-ID\":\"<urn:uuid:a54cb4ab-9ea4-4630-9728-795e7c1e2259>\",\"Content-Length\":\"469944\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:fbbfc921-c773-444d-a3f6-dc0254b96c54>\",\"WARC-Concurrent-To\":\"<urn:uuid:553302ac-df0a-4c03-b9e2-34104bc86363>\",\"WARC-IP-Address\":\"99.84.214.72\",\"WARC-Target-URI\":\"https://community.intel.com/t5/Software-Archive/Cheap-random-projections/td-p/1107066\",\"WARC-Payload-Digest\":\"sha1:SZVKSTA7CRA3J4KE2G5HUJOVQPGPT7V7\",\"WARC-Block-Digest\":\"sha1:Q45BE4OWEEM3JZ57XT76C4GHGP2PHNGP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-29/CC-MAIN-2020-29_segments_1593655890092.28_warc_CC-MAIN-20200706011013-20200706041013-00492.warc.gz\"}"} |
https://www.bartleby.com/solution-answer/chapter-14-problem-142apr-accounting-27th-edition/9781337272094/bond-discount-entries-for-bonds-payable-transaction-on-july-1-year-1-danzer-industries-inc/2a14a529-98dc-11e8-ada4-0ee91056875a | [
"",
null,
"# Bond discount, entries for bonds payable transaction On July 1, Year 1, Danzer Industries Inc. issued $40,000,000 of 10-year, 7% bonds at a market (effective) interest rate of 8%, receiving cash of$37,282,062. Interest on the bonds is payable semiannually on December 31 and June 30. The fiscal year of the company is the calendar year. Instructions 1. Journalize the entry to record the amount of cash proceeds from the issuance of the bonds on July 1, Year I. 2. Journalize the entries to record the following: a. The first .semiannual interest payment on December 31, Year 1, and the amortization of the bond discount, using the straight-line method. Round to the nearest dollar. b. the interest payment on June 30, Year 2, and the amortization of the bond discount, using the Straight-line method. Round to the nearest dollar. 3 Determine the total interest expense for Year 1. 4. Will the bond proceeds always be less than the face amount of the bonds when the contract rate is less than the market rate of interest? 5. (Appendix 1) Compute the price of $37,282,062 received for the bonds by using the present value tables in Appendix A at the end of the text. Round to the nearest dollar.",
null,
"BuyFind ### Accounting 27th Edition WARREN + 5 others Publisher: Cengage Learning, ISBN: 9781337272094",
null,
"BuyFind ### Accounting 27th Edition WARREN + 5 others Publisher: Cengage Learning, ISBN: 9781337272094 #### Solutions Chapter Section Chapter 14, Problem 14.2APR Textbook Problem ## Bond discount, entries for bonds payable transactionOn July 1, Year 1, Danzer Industries Inc. issued$40,000,000 of 10-year, 7% bonds at a market (effective) interest rate of 8%, receiving cash of $37,282,062. Interest on the bonds is payable semiannually on December 31 and June 30. The fiscal year of the company is the calendar year.Instructions1. Journalize the entry to record the amount of cash proceeds from the issuance of the bonds on July 1, Year I.2. Journalize the entries to record the following:a. The first .semiannual interest payment on December 31, Year 1, and the amortization of the bond discount, using the straight-line method. Round to the nearest dollar.b. the interest payment on June 30, Year 2, and the amortization of the bond discount, using the Straight-line method. Round to the nearest dollar.3 Determine the total interest expense for Year 1.4. Will the bond proceeds always be less than the face amount of the bonds when the contract rate is less than the market rate of interest?5. (Appendix 1) Compute the price of$37,282,062 received for the bonds by using the present value tables in Appendix A at the end of the text. Round to the nearest dollar.\n\nExpert Solution\n\n1.\n\nTo determine\n\nBonds: Bonds are long-term promissory notes that are represented by a company while borrowing money from investors to raise fund for financing the operations.\n\nBonds Payable: Bonds payable are referred to long-term debts of the business, issued to various lenders known as bondholders, generally in multiples of $1,000 per bond, to raise fund for financing the operations. Discount on bonds payable: It occurs when the bonds are issued at a low price than the face value. Straight-line amortization method: It is a method of bond amortization that spreads the amount of the bond discount equally over the interest period. To prepare: Journal entry to record the amount of cash proceeds from the issuance of the bonds on July 1, Year 1. ### Explanation of Solution Prepare journal entry for cash proceeds from the issuance of the bonds on July 1, Year 1. Date Account Title and Explanation Post Ref Debit ($) Credit (\\$) July 1, Year 1 Cash 37,282,062 Discount on Bonds Payable (1) 2,717,938 Bonds Payable 40,000,000 (To record issuance of bonds payable at discount)\n\nTable (1)\n\nWorking note:\n\nCalculate discount on bonds payable...\n\nExpert Solution\n\n2(a)\n\nTo determine\n\nTo prepare: Journal entry to record first interest payment and amortization of bond discount on December 31, Year 1.\n\nExpert Solution\n\n(b)\n\nTo determine\n\nTo prepare: Journal entry to record second interest payment and amortization of bond discount on June 30, Year 2.\n\nExpert Solution\n\n3.\n\nTo determine\nThe amount of total interest expense for Year 1.\n\nExpert Solution\n\n4.\n\nTo determine\n\nTo explain: The situation when contract rate of bond is less than the market rate of interest.\n\nExpert Solution\n\n5.\n\nTo determine\n\nTo calculate: The amount of cash proceeds (present value) from the sale of the bonds using present value tables.\n\n### Want to see the full answer?\n\nCheck out a sample textbook solution.See solution\n\n### Want to see this answer and more?\n\nBartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!\n\nSee solution",
null,
""
] | [
null,
"https://www.bartleby.com/static/solution-list.svg",
null,
"https://www.bartleby.com/isbn_cover_images/9781337272094/9781337272094_largeCoverImage.gif",
null,
"https://www.bartleby.com/isbn_cover_images/9781337272094/9781337272094_largeCoverImage.gif",
null,
"https://www.bartleby.com/static/bartleby-logo-tm-tag-inverted.svg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8323591,"math_prob":0.9140113,"size":5229,"snap":"2020-45-2020-50","text_gpt3_token_len":1187,"char_repetition_ratio":0.16995215,"word_repetition_ratio":0.15706806,"special_character_ratio":0.21017402,"punctuation_ratio":0.11581292,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95417714,"pos_list":[0,1,2,3,4,5,6,7,8],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-24T15:49:06Z\",\"WARC-Record-ID\":\"<urn:uuid:b0be6fe0-d486-4e6d-953d-d6c64dc2b3bc>\",\"Content-Length\":\"486844\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:c8effc8c-e31b-4517-8e17-2255ba2e947d>\",\"WARC-Concurrent-To\":\"<urn:uuid:df46cbb5-f903-45ed-b07b-4db7999b3444>\",\"WARC-IP-Address\":\"13.32.207.54\",\"WARC-Target-URI\":\"https://www.bartleby.com/solution-answer/chapter-14-problem-142apr-accounting-27th-edition/9781337272094/bond-discount-entries-for-bonds-payable-transaction-on-july-1-year-1-danzer-industries-inc/2a14a529-98dc-11e8-ada4-0ee91056875a\",\"WARC-Payload-Digest\":\"sha1:4MBYXY5VQ5CYMOQ7IFLZM5OX74XTZAKI\",\"WARC-Block-Digest\":\"sha1:7OUR7PS5VZXBPK2CQP2JZPHE4IK3RCOR\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107883636.39_warc_CC-MAIN-20201024135444-20201024165444-00330.warc.gz\"}"} |
https://foreach.id/EN/fluids/viscositydynamic/reyn-to-picopoise.html | [
"# Convert reyn to picopoise (reyn to pP)\n\nBatch Convert\n• picopoise [pP]\n• reyn [reyn]\nCopy\n_\nCopy\n• picopoise [pP]\n• reyn [reyn]\n\n## Reyn to Picopoise (reyn to pP)\n\n### Reyn (Symbol or Abbreviation: reyn)\n\nReyn is one of dynamic viscosity units. Reyn abbreviated or symbolized by reyn. The value of 1 reyn is equal to 6890 pascal second. In its relation with picopoise, 1 reyn is equal to 68900000000000000 picopoise.\n\n#### Relation with other units\n\n1 reyn equals to 6,890 pascal second\n\n1 reyn equals to 702.58 kilogram-force second/meter²\n\n1 reyn equals to 6,890 newton second/meter²\n\n1 reyn equals to 6,890,000 millinewton second/meter²\n\n1 reyn equals to 68,900 dyne second/centimeter²\n\n1 reyn equals to 68,900 poise\n\n1 reyn equals to 6.89e-14 exapoise\n\n1 reyn equals to 6.89e-11 petapoise\n\n1 reyn equals to 6.89e-8 terapoise\n\n1 reyn equals to 0.0000689 gigapoise\n\n1 reyn equals to 0.0689 megapoise\n\n1 reyn equals to 68.9 kilopoise\n\n1 reyn equals to 689 hectopoise\n\n1 reyn equals to 6,890 dekapoise\n\n1 reyn equals to 689,000 decipoise\n\n1 reyn equals to 6,890,000 centipoise\n\n1 reyn equals to 68,900,000 millipoise\n\n1 reyn equals to 68,900,000,000 micropoise\n\n1 reyn equals to 68,900,000,000,000 nanopoise\n\n1 reyn equals to 68,900,000,000,000,000 picopoise\n\n1 reyn equals to 68,900,000,000,000,000,000 femtopoise\n\n1 reyn equals to 6.89e+22 attopoise\n\n1 reyn equals to 0.99931 pound-force second/inch²\n\n1 reyn equals to 143.9 pound-force second/foot²\n\n1 reyn equals to 4,629.9 poundal second/foot²\n\n1 reyn equals to 68,900 gram/(centimeter*second)\n\n1 reyn equals to 143.9 slug/(foot*second)\n\n1 reyn equals to 4,629.9 pound/(foot*second)\n\n1 reyn equals to 16,668,000 pound/(foot*hour)\n\n### Picopoise (Symbol or Abbreviation: pP)\n\nPicopoise is one of dynamic viscosity units. Picopoise abbreviated or symbolized by pP. The value of 1 picopoise is equal to 1e-13 pascal second. In its relation with reyn, 1 picopoise is equal to 1.4514e-17 reyn.\n\n#### Relation with other units\n\n1 picopoise equals to 1e-13 pascal second\n\n1 picopoise equals to 1.0197e-14 kilogram-force second/meter²\n\n1 picopoise equals to 1e-13 newton second/meter²\n\n1 picopoise equals to 1e-10 millinewton second/meter²\n\n1 picopoise equals to 1e-12 dyne second/centimeter²\n\n1 picopoise equals to 1e-12 poise\n\n1 picopoise equals to 1e-30 exapoise\n\n1 picopoise equals to 1e-27 petapoise\n\n1 picopoise equals to 1e-24 terapoise\n\n1 picopoise equals to 1e-21 gigapoise\n\n1 picopoise equals to 1e-18 megapoise\n\n1 picopoise equals to 1e-15 kilopoise\n\n1 picopoise equals to 1e-14 hectopoise\n\n1 picopoise equals to 1e-13 dekapoise\n\n1 picopoise equals to 1e-11 decipoise\n\n1 picopoise equals to 1e-10 centipoise\n\n1 picopoise equals to 1e-9 millipoise\n\n1 picopoise equals to 0.000001 micropoise\n\n1 picopoise equals to 0.001 nanopoise\n\n1 picopoise equals to 1,000 femtopoise\n\n1 picopoise equals to 1,000,000 attopoise\n\n1 picopoise equals to 1.4504e-17 pound-force second/inch²\n\n1 picopoise equals to 2.0885e-15 pound-force second/foot²\n\n1 picopoise equals to 6.7197e-14 poundal second/foot²\n\n1 picopoise equals to 1e-12 gram/(centimeter*second)\n\n1 picopoise equals to 2.0885e-15 slug/(foot*second)\n\n1 picopoise equals to 6.7197e-14 pound/(foot*second)\n\n1 picopoise equals to 2.4191e-10 pound/(foot*hour)\n\n1 picopoise equals to 1.4514e-17 reyn\n\n### How to convert Reyn to Picopoise (reyn to pP):\n\n#### Conversion Table for Reyn to Picopoise (reyn to pP)\n\nreyn (reyn) picopoise (pP)\n0.01 reyn 689,000,000,000,000 pP\n0.1 reyn 6,890,000,000,000,000 pP\n1 reyn 68,900,000,000,000,000 pP\n2 reyn 137,800,000,000,000,000 pP\n3 reyn 206,700,000,000,000,000 pP\n4 reyn 275,600,000,000,000,000 pP\n5 reyn 344,500,000,000,000,000 pP\n6 reyn 413,400,000,000,000,000 pP\n7 reyn 482,300,000,000,000,000 pP\n8 reyn 551,200,000,000,000,000 pP\n9 reyn 620,100,000,000,000,000 pP\n10 reyn 689,000,000,000,000,000 pP\n20 reyn 1,378,000,000,000,000,000 pP\n25 reyn 1,722,500,000,000,000,000 pP\n50 reyn 3,445,000,000,000,000,000 pP\n75 reyn 5,167,500,000,000,000,000 pP\n100 reyn 6,890,000,000,000,000,000 pP\n250 reyn 17,225,000,000,000,000,000 pP\n500 reyn 34,450,000,000,000,000,000 pP\n750 reyn 51,675,000,000,000,000,000 pP\n1,000 reyn 68,900,000,000,000,000,000 pP\n100,000 reyn 6.89e+21 pP\n1,000,000,000 reyn 6.89e+25 pP\n1,000,000,000,000 reyn 6.89e+28 pP\n\n#### Conversion Table for Picopoise to Reyn (pP to reyn)\n\npicopoise (pP) reyn (reyn)\n0.01 pP 1.4514e-19 reyn\n0.1 pP 1.4514e-18 reyn\n1 pP 1.4514e-17 reyn\n2 pP 2.9028e-17 reyn\n3 pP 4.3541e-17 reyn\n4 pP 5.8055e-17 reyn\n5 pP 7.2569e-17 reyn\n6 pP 8.7083e-17 reyn\n7 pP 1.016e-16 reyn\n8 pP 1.1611e-16 reyn\n9 pP 1.3062e-16 reyn\n10 pP 1.4514e-16 reyn\n20 pP 2.9028e-16 reyn\n25 pP 3.6284e-16 reyn\n50 pP 7.2569e-16 reyn\n75 pP 1.0885e-15 reyn\n100 pP 1.4514e-15 reyn\n250 pP 3.6284e-15 reyn\n500 pP 7.2569e-15 reyn\n750 pP 1.0885e-14 reyn\n1,000 pP 1.4514e-14 reyn\n100,000 pP 1.4514e-12 reyn\n1,000,000,000 pP 1.4514e-8 reyn\n1,000,000,000,000 pP 0.000014514 reyn\n\n#### Steps to Convert Reyn to Picopoise (reyn to pP)\n\n1. Example: Convert 442 reyn to picopoise (442 reyn to pP).\n2. 1 reyn is equivalent to 68900000000000000 picopoise (1 reyn is equivalent to 68900000000000000 pP).\n3. 442 reyn (reyn) is equivalent to 442 times 68900000000000000 picopoise (pP).\n4. Retrieved 442 reyn is equivalent to 30454000000000000000 picopoise (442 reyn is equivalent to 30454000000000000000 pP)."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.57556754,"math_prob":0.9993129,"size":5196,"snap":"2021-21-2021-25","text_gpt3_token_len":2151,"char_repetition_ratio":0.3748074,"word_repetition_ratio":0.07908847,"special_character_ratio":0.47748268,"punctuation_ratio":0.18544061,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9705227,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-05-06T18:55:30Z\",\"WARC-Record-ID\":\"<urn:uuid:6b78332d-5c56-460f-b27a-918d041dff06>\",\"Content-Length\":\"54649\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4ccbca2b-78ee-452b-9001-3b5177a177d8>\",\"WARC-Concurrent-To\":\"<urn:uuid:41adde44-aa23-4d93-a86e-20853e34834d>\",\"WARC-IP-Address\":\"172.67.130.66\",\"WARC-Target-URI\":\"https://foreach.id/EN/fluids/viscositydynamic/reyn-to-picopoise.html\",\"WARC-Payload-Digest\":\"sha1:J4AJZ5N3IQXVNCUNWNGSZYNSQHFA2PXJ\",\"WARC-Block-Digest\":\"sha1:T3YIIOUAVRHKFB7JDPGHNZXXH7X6K4JN\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-21/CC-MAIN-2021-21_segments_1620243988759.29_warc_CC-MAIN-20210506175146-20210506205146-00294.warc.gz\"}"} |
https://tbc-python.fossee.in/convert-notebook/Fundamentals_of_Electrical_Machines/CH_8.ipynb | [
"# CHAPTER 8: STARTING, CONTROL AND TESTING OF AN INDUCTION MOTOR¶\n\n## Example 8.1, Page number 273¶\n\nIn :\n#Variable declaration\nT_st = '1.5*T_f' #Starting torque\ns = 0.03 #Slip\n\n#Calculation\nI_sc_I_f = (1.5/s)**0.5 #I_sc/I_f\n\n#Result\nprint('Short circuit current , I_sc = %.2f*I_f' %I_sc_I_f)\n\nShort circuit current , I_sc = 7.07*I_f\n\n\n## Example 8.2, Page number 274-275¶\n\nIn :\n#Variable declaration\nT_ratio = 50.0/100 #Ratio of starting torque to full load torque T_st/T_f\ns_f = 0.03 #Full load slip\nI_ratio = 5.0 #Ratio of short circuit current to full load current I_sc/I_f\n\n#Calculation\nx = (1/I_ratio)*(T_ratio/s_f)**0.5 #Percentage of taping\n\n#Result\nprint('Percentage tapings required on the autotransformer , x = %.3f ' %x)\n\nPercentage tapings required on the autotransformer , x = 0.816\n\n\n## Example 8.3, Page number 277¶\n\nIn :\n#Variable declaration\nT_ratio = 25.0/100 #Ratio of starting torque to full load torque T_st/T_f\nI_ratio = 3.0*120/100 #Ratio of short circuit current to full load current I_sc/I_f\n\n#Calculation\ns_f = T_ratio*3/I_ratio**2 #Full load slip\n\n#Result\nprint('Full load slip , s_f = %.2f ' %s_f)\n\nFull load slip , s_f = 0.06\n\n\n## Example 8.4, Page number 281-282¶\n\nIn :\n#Variable declaration\nZ_icr = complex(0.04,0.5) #Inner cage impedance per phase at standstill(ohm)\nZ_ocr = complex(0.4,0.2) #Outer cage impedance per phase at standstill(ohm)\nV = 120.0 #Per phase rotor induced voltage at standstill(V)\n\n#Calculation\n#For case(i)\nZ_com = (Z_icr*Z_ocr)/(Z_icr+Z_ocr) #Combined impedance(ohm)\nI_2 = V/abs(Z_com) #Rotor current per phase(A)\nR_2 = Z_com.real #Combined rotor resistance(ohm)\nT = I_2**2*R_2 #Torque at stand still condition(synchronous watts)\n#For case(ii)\ns = 0.06 #Slip\nR_ocr = Z_ocr.real\nX_ocr = Z_ocr.imag\nR_icr = Z_icr.real\nX_icr = Z_icr.imag\nZ_com6 = complex(R_ocr/s,X_ocr)*complex(R_icr/s,X_icr)/complex(R_ocr/s+R_icr/s,X_ocr+X_icr) #Combined impedance(ohm)\nI2_6 = V/abs(Z_com6) #Rotor current per phase(A)\nR2_6 = Z_com6.real #Combined rotor resistance(ohm)\nT_6 = I2_6**2*R2_6 #Torque at 6% slip(synhronous watts)\n\n#Result\nprint('(i) Torque at standstill condition , T = %.2f syn.watt' %T)\nprint('(ii) Torque at 6 percent slip , T_6 = %.2f syn.watt' %T_6)\nprint('\\nNOTE : Changes in answer is due to precision i.e more number of decimal places')\n\n(i) Torque at standstill condition , T = 31089.35 syn.watt\n(ii) Torque at 6 percent slip , T_6 = 15982.06 syn.watt\n\nNOTE : Changes in answer is due to precision i.e more number of decimal places\n\n\n## Example 8.5, Page number 285¶\n\nIn :\n#Variable declaration\nV = 210.0 #Supply voltage(V)\nf = 50.0 #Supply frequency(Hz)\nP = 50.0 #Input power(W)\nI_br = 2.5 #Line current(A)\nV_L = 25.0 #Line voltage(V)\nR_1 = 2.4 #DC resistance between any two terminal(ohm)\n\n#Calculation\nV_br = V_L/3**0.5 #Phase voltage(V)\nP_br = P/3 #Power per phase(W)\nR_eq = P_br/I_br**2 #Equivalent resistance(ohm)\nR_2 = R_eq-(R_1/2) #Per phase rotor resistance(ohm)\nZ_eq = V_br/I_br #Equivalent impedance(ohm)\nX_eq = (Z_eq**2-R_2**2)**0.5 #Equivalent reactance(ohm)\nX_1 = 0.5*X_eq #For practical cases reactances(ohm)\n\n#Result\nprint('Equivalent resistance , R_eq = %.1f ohm' %R_eq)\nprint('Equivalent impedance , Z_eq = %.1f ohm' %Z_eq)\nprint('Equivalent reactance , X_eq = %.1f ohm' %X_eq)\nprint('Per phase rotor resistance , R_2 = %.1f ohm' %R_2)\nprint('Reactances for practical cases , X_1 = X_2 = %.1f ohm' %X_1)\n\nEquivalent resistance , R_eq = 2.7 ohm\nEquivalent impedance , Z_eq = 5.8 ohm\nEquivalent reactance , X_eq = 5.6 ohm\nPer phase rotor resistance , R_2 = 1.5 ohm\nReactances for practical cases , X_1 = X_2 = 2.8 ohm\n\n\n## Example 8.6, Page number 287¶\n\nIn :\nimport math\n\n#Variable declaration\nV = 210.0 #Supply voltage(V)\nf = 50.0 #Supply frequency(Hz)\nP = 4.0 #Number of poles\nP_0 = 400.0 #Input power(W)\nI_0 = 1.2 #Line current(A)\nV_0 = 210.0 #Line voltage(V)\nP_fw = 150.0 #Total friction and windage losses(W)\nR = 2.2 #Stator resistance between any two terminals(ohm)\n\n#Calculation\nR_1 = R/2 #Per phase stator resistance(ohm)\nP_scu = 3*I_0**2*R_1 #Stator copper loss(W)\nP_core = P_0-P_fw-P_scu #Stator core loss(W)\n#Alternate approach\\n\",\nphi_0 = math.acos(P_core/(3**0.5*V_0*I_0)) #Power factor angle(radians)\nphi_0_deg = phi_0*180/math.pi #Power factor angle(degree)\nR_01 = (V_0/3**0.5)/(I_0*math.cos(phi_0)) #No-load circuit resistance per phase(ohm)\nX_0 = (V_0/3**0.5)/(I_0*math.sin(phi_0)) #Magnetizing reactance per phase(ohm)\n\n#Result\nprint('Stator core loss , P_core = %.1f W' %P_core)\nprint('No-load circuit resistance per phase , R_0 = %.1f ohm' %R_01)\nprint('Magnetizing reactance per phase , X_0 = %.f ohm' %X_0)\n\nStator core loss , P_core = 245.2 W\nNo-load circuit resistance per phase , R_0 = 179.8 ohm\nMagnetizing reactance per phase , X_0 = 122 ohm\n\n\n## Example 8.7, Page number 290¶\n\nIn :\n#Variable declaration\nP_1 = 6.0 #Number of pole\nP_2 = 4.0 #Number of pole\nf = 50.0 #Supply frequency(Hz)\nP = 60.0 #Power(kW)\n\n#Calculation\n#For case(i)\ns = P_2/(P_1+P_2) #Combined slip\n#For case(ii)\nN_cs = 120*f/(P_1+P_2) #Combined synchronous speed(rpm)\n#For case(iii)\nP_0 = P*P_2/(P_1+P_2) #Output of 4-pole motor(kW)\n\n#Result\nprint('(i) Combined slip , s = %.1f ' %s)\nprint('(ii) Combined synchronous speed , N_cs = %.f rpm' %N_cs)\nprint('(iii) Output of the 4-pole motor , P_0 = %.f kW' %P_0)\n\n(i) Combined slip , s = 0.4\n(ii) Combined synchronous speed , N_cs = 600 rpm\n(iii) Output of the 4-pole motor , P_0 = 24 kW"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.59726167,"math_prob":0.9988725,"size":5083,"snap":"2022-27-2022-33","text_gpt3_token_len":1868,"char_repetition_ratio":0.121874385,"word_repetition_ratio":0.17523056,"special_character_ratio":0.37635255,"punctuation_ratio":0.12512413,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99985063,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-12T11:17:56Z\",\"WARC-Record-ID\":\"<urn:uuid:3bcdd190-4c05-4053-9d80-aeaf068b8ae1>\",\"Content-Length\":\"221939\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:716c6652-619b-4005-a508-c99c12c07277>\",\"WARC-Concurrent-To\":\"<urn:uuid:b72559cf-3568-477e-a5e2-dab4b795e2be>\",\"WARC-IP-Address\":\"95.217.115.241\",\"WARC-Target-URI\":\"https://tbc-python.fossee.in/convert-notebook/Fundamentals_of_Electrical_Machines/CH_8.ipynb\",\"WARC-Payload-Digest\":\"sha1:JM7MNU32V5RUUT7O57PNYIAZPR3KI5GZ\",\"WARC-Block-Digest\":\"sha1:WHX4RPATJVUPMMVCP6K2IADGH7LVYZO2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882571692.3_warc_CC-MAIN-20220812105810-20220812135810-00772.warc.gz\"}"} |
https://www.colorhexa.com/a7ffb6 | [
"# #a7ffb6 Color Information\n\nIn a RGB color space, hex #a7ffb6 is composed of 65.5% red, 100% green and 71.4% blue. Whereas in a CMYK color space, it is composed of 34.5% cyan, 0% magenta, 28.6% yellow and 0% black. It has a hue angle of 130.2 degrees, a saturation of 100% and a lightness of 82.7%. #a7ffb6 color hex could be obtained by blending #ffffff with #4fff6d. Closest websafe color is: #99ffcc.\n\n• R 65\n• G 100\n• B 71\nRGB color chart\n• C 35\n• M 0\n• Y 29\n• K 0\nCMYK color chart\n\n#a7ffb6 color description : Pale lime green.\n\n# #a7ffb6 Color Conversion\n\nThe hexadecimal color #a7ffb6 has RGB values of R:167, G:255, B:182 and CMYK values of C:0.35, M:0, Y:0.29, K:0. Its decimal value is 11009974.\n\nHex triplet RGB Decimal a7ffb6 `#a7ffb6` 167, 255, 182 `rgb(167,255,182)` 65.5, 100, 71.4 `rgb(65.5%,100%,71.4%)` 35, 0, 29, 0 130.2°, 100, 82.7 `hsl(130.2,100%,82.7%)` 130.2°, 34.5, 100 99ffcc `#99ffcc`\nCIE-LAB 93.063, -40.853, 26.731 60.137, 83.11, 57.127 0.3, 0.415, 83.11 93.063, 48.822, 146.803 93.063, -42.472, 45.597 91.165, -41.791, 26.662 10100111, 11111111, 10110110\n\n# Color Schemes with #a7ffb6\n\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #ffa7f0\n``#ffa7f0` `rgb(255,167,240)``\nComplementary Color\n• #c4ffa7\n``#c4ffa7` `rgb(196,255,167)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #a7ffe2\n``#a7ffe2` `rgb(167,255,226)``\nAnalogous Color\n• #ffa7c4\n``#ffa7c4` `rgb(255,167,196)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #e2a7ff\n``#e2a7ff` `rgb(226,167,255)``\nSplit Complementary Color\n• #ffb6a7\n``#ffb6a7` `rgb(255,182,167)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #b6a7ff\n``#b6a7ff` `rgb(182,167,255)``\n• #f0ffa7\n``#f0ffa7` `rgb(240,255,167)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #b6a7ff\n``#b6a7ff` `rgb(182,167,255)``\n• #ffa7f0\n``#ffa7f0` `rgb(255,167,240)``\n• #5bff77\n``#5bff77` `rgb(91,255,119)``\n• #74ff8c\n``#74ff8c` `rgb(116,255,140)``\n• #8effa1\n``#8effa1` `rgb(142,255,161)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #c1ffcb\n``#c1ffcb` `rgb(193,255,203)``\n• #daffe0\n``#daffe0` `rgb(218,255,224)``\n• #f4fff5\n``#f4fff5` `rgb(244,255,245)``\nMonochromatic Color\n\n# Alternatives to #a7ffb6\n\nBelow, you can see some colors close to #a7ffb6. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #aeffa7\n``#aeffa7` `rgb(174,255,167)``\n• #a7ffa7\n``#a7ffa7` `rgb(167,255,167)``\n• #a7ffaf\n``#a7ffaf` `rgb(167,255,175)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #a7ffbd\n``#a7ffbd` `rgb(167,255,189)``\n• #a7ffc5\n``#a7ffc5` `rgb(167,255,197)``\n• #a7ffcc\n``#a7ffcc` `rgb(167,255,204)``\nSimilar Colors\n\n# #a7ffb6 Preview\n\nThis text has a font color of #a7ffb6.\n\n``<span style=\"color:#a7ffb6;\">Text here</span>``\n#a7ffb6 background color\n\nThis paragraph has a background color of #a7ffb6.\n\n``<p style=\"background-color:#a7ffb6;\">Content here</p>``\n#a7ffb6 border color\n\nThis element has a border color of #a7ffb6.\n\n``<div style=\"border:1px solid #a7ffb6;\">Content here</div>``\nCSS codes\n``.text {color:#a7ffb6;}``\n``.background {background-color:#a7ffb6;}``\n``.border {border:1px solid #a7ffb6;}``\n\n# Shades and Tints of #a7ffb6\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #000a02 is the darkest color, while #f5fff7 is the lightest one.\n\n• #000a02\n``#000a02` `rgb(0,10,2)``\n• #001e05\n``#001e05` `rgb(0,30,5)``\n• #003108\n``#003108` `rgb(0,49,8)``\n• #00450c\n``#00450c` `rgb(0,69,12)``\n• #00590f\n``#00590f` `rgb(0,89,15)``\n• #006c12\n``#006c12` `rgb(0,108,18)``\n• #008016\n``#008016` `rgb(0,128,22)``\n• #009319\n``#009319` `rgb(0,147,25)``\n• #00a71c\n``#00a71c` `rgb(0,167,28)``\n• #00bb20\n``#00bb20` `rgb(0,187,32)``\n• #00ce23\n``#00ce23` `rgb(0,206,35)``\n• #00e226\n``#00e226` `rgb(0,226,38)``\n• #00f52a\n``#00f52a` `rgb(0,245,42)``\n• #0aff34\n``#0aff34` `rgb(10,255,52)``\n• #1eff44\n``#1eff44` `rgb(30,255,68)``\n• #31ff54\n``#31ff54` `rgb(49,255,84)``\n• #45ff65\n``#45ff65` `rgb(69,255,101)``\n• #59ff75\n``#59ff75` `rgb(89,255,117)``\n• #6cff85\n``#6cff85` `rgb(108,255,133)``\n• #80ff95\n``#80ff95` `rgb(128,255,149)``\n• #93ffa6\n``#93ffa6` `rgb(147,255,166)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\n• #bbffc6\n``#bbffc6` `rgb(187,255,198)``\n• #ceffd7\n``#ceffd7` `rgb(206,255,215)``\n• #e2ffe7\n``#e2ffe7` `rgb(226,255,231)``\n• #f5fff7\n``#f5fff7` `rgb(245,255,247)``\nTint Color Variation\n\n# Tones of #a7ffb6\n\nA tone is produced by adding gray to any pure hue. In this case, #d0d6d1 is the less saturated color, while #a7ffb6 is the most saturated one.\n\n• #d0d6d1\n``#d0d6d1` `rgb(208,214,209)``\n• #ccdacf\n``#ccdacf` `rgb(204,218,207)``\n• #c9ddcc\n``#c9ddcc` `rgb(201,221,204)``\n• #c5e1ca\n``#c5e1ca` `rgb(197,225,202)``\n• #c2e4c8\n``#c2e4c8` `rgb(194,228,200)``\n• #bfe7c6\n``#bfe7c6` `rgb(191,231,198)``\n• #bbebc3\n``#bbebc3` `rgb(187,235,195)``\n• #b8eec1\n``#b8eec1` `rgb(184,238,193)``\n• #b5f1bf\n``#b5f1bf` `rgb(181,241,191)``\n• #b1f5bd\n``#b1f5bd` `rgb(177,245,189)``\n• #aef8ba\n``#aef8ba` `rgb(174,248,186)``\n• #aafcb8\n``#aafcb8` `rgb(170,252,184)``\n• #a7ffb6\n``#a7ffb6` `rgb(167,255,182)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #a7ffb6 is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.50544333,"math_prob":0.8018305,"size":3697,"snap":"2023-14-2023-23","text_gpt3_token_len":1656,"char_repetition_ratio":0.13891146,"word_repetition_ratio":0.0073937154,"special_character_ratio":0.5247498,"punctuation_ratio":0.23250565,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97708285,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-29T12:22:10Z\",\"WARC-Record-ID\":\"<urn:uuid:e7837cf9-022c-434e-a8ab-15b142d91a79>\",\"Content-Length\":\"36216\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:d2665696-1ef0-46ec-914b-5081237c93c8>\",\"WARC-Concurrent-To\":\"<urn:uuid:fc6c8e6c-b8c4-4983-9046-006deb04d476>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/a7ffb6\",\"WARC-Payload-Digest\":\"sha1:ESIQG6SJFUROS2C4HLBWUBZI6QQWLOAZ\",\"WARC-Block-Digest\":\"sha1:KTFS3Z3ZZZHSEAVDH2JFQA2JDL5NGQSG\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296948976.45_warc_CC-MAIN-20230329120545-20230329150545-00132.warc.gz\"}"} |
http://www.markedbyteachers.com/as-and-a-level/science/temperature-coefficient-resistance-of-a-thermistor.html | [
"• Join over 1.2 million students every month\n• Accelerate your learning by 29%\n• Unlimited access from just £6.99 per month\n\n# Temperature coefficient resistance of a thermistor.\n\nExtracts from this document...\n\nIntroduction\n\nPhysics Coursework Data handling Temperature coefficient resistance of a thermistor Experiment The aim of the experiment is to find out how much the resistance in a thermistor changes as the temperature of the thermistor and its surroundings changes. To do this the thermistor will be placed in a beaker of water with a thermometer and the temperature of the water raised, the thermistor will be attached to a meter to measure the resistance. At regular intervals the temperature of the water will be taken and at the same time the resistance will be taken. This will show if the resistance of a thermistor increases or decreases as the temperature increases. Apparatus: For this experiment I will need: * A thermistor * A beaker (containing water) ...read more.\n\nMiddle\n\n99 53 65 144 100 51 68 138 Graph: Conclusion and evaluation: From the graph it is possible to see that the resistance of the thermistor decreases as the temperature increases, at a lower temperature the resistance is up to nearly 600ohms and a much higher temperature the resistance has dropped to only 50ohms. This means that the temperature of a thermistor is proportional to the resistance. As there where anomalies in the graph the results might have been inaccurate, these are some of the ways that I thought the experiment and the results could have been inaccurate and how I would have improved on these points in the future if I were to do this experiment again. ...read more.\n\nConclusion\n\nThe way that I could overcome this problem in the future would be to use water baths set to a certain temperature and take several readings in order to gain an average and then move on the next temperature. Would mean that the temperature would not me changing as much and the resistance reading would be mush more accurate. * When I had the thermistor in the water bath (beaker) I did not stir the water, this meant that the water was different temperature in different parts of the water, meaning the temperature of where the thermistor was in the beaker could have been different to the temperature of where the thermometer was in the beakers, meaning the resistance reading that I took was not the correct one for the temperature that show up on the thermometer, this would also have made my results inaccurate. ...read more.\n\nThe above preview is unformatted text\n\nThis student written piece of work is one of many that can be found in our AS and A Level Electrical & Thermal Physics section.\n\n## Found what you're looking for?\n\n• Start learning 29% faster today\n• 150,000+ documents available\n• Just £6.99 a month\n\nNot the one? Search for your essay title...\n• Join over 1.2 million students every month\n• Accelerate your learning by 29%\n• Unlimited access from just £6.99 per month\n\n# Related AS and A Level Electrical & Thermal Physics essays\n\n1.",
null,
"## Investigate how the temperature affects the resistance of a thermistor.\n\nand so the hotter the flame the more energy will go into heating the oil that heats the thermistor. The thermometer must also stay the same during the experiment because if it changes it may take some time to adjust to the actually temperate and if the scale isn't exactly\n\n2.",
null,
"## Thermistor Coursework\n\nI would also propose that there is a way of calibrating the circuit that my sensor controls, so that a lower temperature and upper temperature could be fine tuned in the greenhouse that the sensor will be placed. For example, the specification from the company could change so that the\n\n1.",
null,
"## Experiments with a thermistor\n\n* Despite the use of a cardboard 'wall', there would still be external forces acting on the apparatus such as light from the laboratory ceiling lamps; therefore the readings recorded may not be totally accurate. This error can be minimised by performing the experiment in a dark room, where the air is still and light is absent.\n\n2.",
null,
"## Investigate the relationship between temperature and resistance in a thermistor.\n\nThis effect means that the outer electrons are not free at room temperature but when heated the get more energy and are freed. This means that there are more electrons available to conduct. This does not apply in a normal wire because the outer electrons are free and the inner electrons are tightly held in the atom.\n\n1.",
null,
"## Effect of changing the temperature on the resistance of a thermistor\n\nI put all data in the table; it makes the data clear and easy finds out the error. My experiment result: The first experiment The second experiment Temperature Ammeter(I) Voltmeter(V) Temperature Ammeter(I) Voltmeter(V) 35? 0.0Slop014 1.4 35? 0.0017 1.6 40?\n\n2.",
null,
"## To investigate how the temperature affects the resistance of a thermistor.\n\nthe water around the thermistor and not in the beaker that has the thermistor in it so too much energy would be lost in the air. Also, the results wouldn't have been as accurate because it is a lot harder to measure the temperature of the thermistor in this method\n\n1.",
null,
"## Is polymer electronics the future of TV screens\n\nthey could be placed on windows in order to create power, while still being able to see through the window. Conductive organic materials are often sensitive to factors such as temperature, humidity and pressure. This makes it possible to create a large-area thin and flexible sensor.\n\n2.",
null,
"## physics sensor coursework\n\n�100 Error min = 2.51% At 200 lux: Max value = Max V/ Min I Max value = (8.02 + 0.005)/ [(12.57 - 0.005) �10^-3] Max value = 638.68 ? Min value = Min V/ Max I Min value = (7.97 - 0.005)/ [(12.65 + 0.005)",
null,
"• Over 160,000 pieces\nof student written work\n• Annotated by\nexperienced teachers\n• Ideas and feedback to",
null,
""
] | [
null,
"http://static2.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/59462/images/preview/img_138_1.jpg",
null,
"http://static1.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/824233/images/preview/img_138_1.jpg",
null,
"http://static3.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/71612/images/preview/img_138_1.jpg",
null,
"http://static3.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/59461/images/preview/img_138_1.jpg",
null,
"http://static3.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/69904/images/preview/img_138_1.jpg",
null,
"http://static1.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/100458/images/preview/img_138_1.jpg",
null,
"http://static3.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/889571/images/preview/img_138_1.jpg",
null,
"http://static3.mbtfiles.co.uk/media/docs/newdocs/as_and_a_level/science/physics/electrical_and_thermal_physics/841382/images/preview/img_138_1.jpg",
null,
"http://static2.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/cms/study-guides/what-is-mbt-text.png",
null,
"http://static2.mbtfiles.co.uk/skin/frontend/mbt/mbt/images/cms/study-guides/what-is-mbt.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9565103,"math_prob":0.8653855,"size":2697,"snap":"2020-45-2020-50","text_gpt3_token_len":557,"char_repetition_ratio":0.20163387,"word_repetition_ratio":0.013015185,"special_character_ratio":0.20912124,"punctuation_ratio":0.08782435,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9511221,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-12-05T00:05:33Z\",\"WARC-Record-ID\":\"<urn:uuid:ddb5a231-a7cb-42cb-b5fb-45530dfef86a>\",\"Content-Length\":\"84811\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f74f80ef-7bf0-4634-91a5-4da8c423b4c1>\",\"WARC-Concurrent-To\":\"<urn:uuid:cc4062a1-f5fa-43e9-b99d-cc66e0bc90c5>\",\"WARC-IP-Address\":\"104.26.2.115\",\"WARC-Target-URI\":\"http://www.markedbyteachers.com/as-and-a-level/science/temperature-coefficient-resistance-of-a-thermistor.html\",\"WARC-Payload-Digest\":\"sha1:KNO6IJDYPD6H6SGPUDZS7QECXJXP42UU\",\"WARC-Block-Digest\":\"sha1:3DDXMXACAU7UIFVELFRXC6XCI5JMBSNP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141745780.85_warc_CC-MAIN-20201204223450-20201205013450-00086.warc.gz\"}"} |
https://www.mikros.us/2021/01/use-case-diagram.html | [
"# Use Case Diagram\n\nUse Case Diagram. The diagram is used to model Use case diagrams are used to gather the requirements of a system including internal and. A use case diagram is a dynamic or behavior diagram in UML.",
null,
"Use Case Diagram & Use Cases - YouTube (Marian Copeland) A use case diagram is a dynamic or behavior diagram in UML. Real-time collaboration to share, gather requirements and analyze your use cases together with clients and peers. Use-cases are the core concepts of Unified Modelling language m.\n\n### A use case diagram is a dynamic or behavior diagram in UML.\n\nUse-cases are the core concepts of Unified Modelling language m.\n\nYou can edit this template and create your own diagram. Learn how to make Use Case Diagrams in this tutorial. A use case diagram consists of the system, the related use cases and actors and relates these to each other to visualize: what is being described? (system), who is using the system? (actors)."
] | [
null,
"https://i.ytimg.com/vi/0xdHJ6hO-Cs/maxresdefault.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.84352154,"math_prob":0.761809,"size":879,"snap":"2021-31-2021-39","text_gpt3_token_len":183,"char_repetition_ratio":0.17142858,"word_repetition_ratio":0.24324325,"special_character_ratio":0.19908987,"punctuation_ratio":0.09883721,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95199555,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-17T13:23:26Z\",\"WARC-Record-ID\":\"<urn:uuid:04d3a2b3-df35-4e65-abb5-387560760cdc>\",\"Content-Length\":\"234117\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cd97042c-3e18-4408-97e9-81d218687730>\",\"WARC-Concurrent-To\":\"<urn:uuid:0340d39a-65fc-4938-b823-98376c9b0510>\",\"WARC-IP-Address\":\"172.217.15.115\",\"WARC-Target-URI\":\"https://www.mikros.us/2021/01/use-case-diagram.html\",\"WARC-Payload-Digest\":\"sha1:JO4RVXIKOAY5LR6KMLRBKLYE6BTVZDYG\",\"WARC-Block-Digest\":\"sha1:TJMSZ4OJLMEV5O6O4IQU7CGPQUC5FWY5\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780055645.75_warc_CC-MAIN-20210917120628-20210917150628-00368.warc.gz\"}"} |
https://math.stackexchange.com/questions/362498/how-to-apply-comparison-test-to-sum-n-0-infty-frac1-sqrtn1 | [
"How to apply comparison test to $\\sum_{n=0}^{\\infty}{\\frac{1}{\\sqrt{n+1}}}$?\n\nQuestion: Is the series convergent or divergent? $$\\sum_{n=0}^{\\infty}{\\frac{1}{\\sqrt{n+1}}}$$\n\nI can use any test but wolfram alpha says that it is divergent by comparison test.\n\nHow do I apply comparison test?\n\nI can compare it to: $$\\sum _{ n=0 }^{ \\infty }{ \\frac { 1 }{ \\sqrt { n } } }$$ but the second series is greater than the series in the question and the second series is divegent. :(\n\n• They are the same series, written in different forms. – Spook Apr 15 '13 at 16:15\n• Use $\\sum \\frac{1}{2 \\sqrt{n}}$ then... – vonbrand Apr 15 '13 at 17:27\n\nRewrite the first series with the substitution $k=n+1$, yielding $$\\sum_{k=1}^\\infty\\frac1{\\sqrt k}.$$\n\nThe series $$\\sum_{n=0}^\\infty\\frac1{\\sqrt n}$$ makes no sense, since $\\frac1{\\sqrt n}$ is undefined for $n=0$.\n\nAlternately, you could use the comparison test as follows. For $n\\ge1,$ $$\\frac1{\\sqrt{n+1}}\\ge\\frac1{\\sqrt{2n}}=\\frac1{\\sqrt2}\\frac1{\\sqrt n},$$ so that \\begin{align}\\sum_{n=0}^\\infty\\frac1{\\sqrt{n+1}} &= 1+\\sum_{n=1}^\\infty\\frac1{\\sqrt{n+1}}\\\\ &\\ge 1+\\frac1{\\sqrt2}\\sum_{n=1}^\\infty\\frac1{\\sqrt n},\\end{align} so since $\\sum_{n=1}^\\infty\\frac1{\\sqrt n}$ diverges, so does the series we're considering.\n\nReindexing is certainly the neatest trick, here, though.\n\n• Wow. Unbelievable. I feel dumb. My textbook didn't teach me this method. Thank you so much! – user72708 Apr 15 '13 at 16:16\n• No problem. See my updated answer for another way to go about it, using the comparison test (this may be how W|A proceeded). – Cameron Buie Apr 15 '13 at 16:48\n\nFor large enough $n$, $\\sqrt{n + 1} < n$, so that $\\dfrac{1}{\\sqrt{n + 1}} > \\dfrac{1}{n}$, and as the harmonic series diverges, so does yours."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.87917864,"math_prob":0.99950504,"size":392,"snap":"2019-26-2019-30","text_gpt3_token_len":120,"char_repetition_ratio":0.14948453,"word_repetition_ratio":0.0,"special_character_ratio":0.32908162,"punctuation_ratio":0.09090909,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9999969,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-06-18T19:39:25Z\",\"WARC-Record-ID\":\"<urn:uuid:7d1a773d-31fb-485a-a6b7-7a14cdd648c6>\",\"Content-Length\":\"146399\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2de973d6-7f26-44cc-9ee9-8c3d3fd8bb83>\",\"WARC-Concurrent-To\":\"<urn:uuid:70654002-cf3f-434c-83e2-6e2a04c47fb2>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/362498/how-to-apply-comparison-test-to-sum-n-0-infty-frac1-sqrtn1\",\"WARC-Payload-Digest\":\"sha1:JN2QJ3IZ4IPZT5E3ABCYJ4QHUI4CYGJZ\",\"WARC-Block-Digest\":\"sha1:JHZ2P7ZUZFABDJEYLXZWPXZAKRBIL4XJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-26/CC-MAIN-2019-26_segments_1560627998813.71_warc_CC-MAIN-20190618183446-20190618205446-00283.warc.gz\"}"} |
https://www.wikidoc.org/index.php/Gas | [
"# Gas\n\nEditor-In-Chief: C. Michael Gibson, M.S., M.D. \n\nFile:Gas particle movement.svg A gas is a state of matter, consisting of a collection of particles (molecules, atoms, ions, electrons, etc.) without a definite shape or volume that are in more or less random motion.\n\n## Physical characteristics\n\nDue to the electronic nature of the aforementioned particles, a \"force field\" is present throughout the space around them. Interactions between these \"force fields\" from one particle to the next give rise to the term intermolecular forces. Dependent on distance, these intermolecular forces influence the motion of these particles and hence their thermodynamic properties. It must be noted that at the temperatures and pressures characteristic of many applications, these particles are normally greatly separated. This separation corresponds to a very weak attractive force. As a result, for many applications, this intermolecular force becomes negligible.\n\nA gas also exhibits the following characteristics:\n\n• Relatively low density and viscosity compared to the solid and liquid states of matter.\n• Will expand and contract greatly with changes in temperature or pressure, thus the term \"compressible\".\n• Will diffuse readily, spreading apart in order to homogeneously distribute itself throughout any container.\n\n## Macroscopic\n\nWhen analyzing a system, it is typical to specify a length scale. A larger length scale may correspond to a macroscopic view of the system, while a smaller length scale corresponds to a microscopic view.\n\nOn a macroscopic scale, the quantities measured are in terms of the large scale effects that a gas has on a system or its surroundings such as its velocity, pressure, or temperature. Mathematical equations, such as the Extended hydrodynamic equations, Navier-Stokes equations and the Euler equations have been developed to attempt to model the relations of the pressure, density, temperature, and velocity of a moving gas.\n\n### Pressure\n\nThe pressure exerted by a gas uniformly across the surface of a container can be described by simple kinetic theory. The particles of a gas are constantly moving in random directions and frequently collide with the walls of the container and/or each other. These particles all exhibit the physical properties of mass, momentum, and energy, which all must be conserved. In classical mechanics, Momentum, by definition, is the product of mass and velocity. Kinetic energy is one half the mass multiplied by the square of the velocity.\n\nThe sum of all the normal components of force exerted by the particles impacting the walls of the container divided by the area of the wall is defined to be the pressure. The pressure can then be said to be the average linear momentum of these moving particles. A common misconception is that the collisions of the molecules with each other is essential to explain gas pressure, but in fact their random velocities are sufficient to define this quantity.\n\n### Temperature\n\nThe temperature of any physical system is the result of the motions of the molecules and atoms which make up the system. In statistical mechanics, temperature is the measure of the average kinetic energy stored in a particle. The methods of storing this energy are dictated by the degrees of freedom of the particle itself (energy modes). These particles have a range of different velocities, and the velocity of any single particle constantly changes due to collisions with other particles. The range in speed is usually described by the Maxwell-Boltzmann distribution.\n\n### Specific Volume\n\nWhen performing a thermodynamic analysis, it is typical to speak of intensive and extensive properties. Properties which depend on the amount of gas are called extensive properties, while properties that do not depend on the amount of gas are called intensive properties. Specific volume is an example of an intensive property because it is the volume occupied by a unit of mass of a material, meaning we have divided through by the mass in order to obtain a quantity in terms of, for example,$\\textstyle {\\frac {m^{3}}{kg}}$",
null,
". Notice that the difference between volume and specific volume differ in that the specific quantity is mass independent.\n\n### Density\n\nBecause the molecules are free to move about in a gas, the mass of the gas is normally characterized by its density. Density is the mass per volume of a substance or simply, the inverse of specific volume. For gases, the density can vary over a wide range because the molecules are free to move. Macroscopically, density is a state variable of a gas and the change in density during any process is governed by the laws of thermodynamics. Given that there are many particles in completely random motion, for a static gas, the density is the same throughout the entire container. Density is therefore a scalar quantity; it is a simple physical quantity that has a magnitude but no direction associated with it. It can be shown by kinetic theory that the density is proportional to the size of the container in which a fixed mass of gas is confined.\n\n## Microscopic\n\nOn the microscopic scale, the quantities measured are at the molecular level. Different theories and mathematical models have been created to describe molecular or particle motion. A few of the gas-related models are listed below.\n\n### Kinetic theory\n\nKinetic theory attempts to explain macroscopic properties of gases by considering their molecular composition and motion.\n\n### Brownian motion\n\nBrownian motion is the mathematical model used to describe the random movement of particles suspended in a fluid often called particle theory.\n\nSince it is at the limit of (or beyond) current technology to observe individual gas particles (atoms or molecules), only theoretical calculations give suggestions as to how they move, but their motion is different from Brownian Motion. The reason is that Brownian Motion involves a smooth drag due to the frictional force of many gas molecules, punctuated by violent collisions of an individual (or several) gas molecule(s) with the particle. The particle (generally consisting of millions or billions of atoms) thus moves in a jagged course, yet not so jagged as we would expect to find if we could examine an individual gas molecule.\n\n### Intermolecular forces\n\nAs discussed earlier, momentary attractions (or repulsions) between particles have an effect on gas dynamics. In physical chemistry, the name given to these \"intermolecular forces\" is the \"Van der Waals force\".\n\n## Simplified models\n\nAn equation of state (for gases) is a mathematical model used to roughly describe or predict the state of a gas. At present, there is no single equation of state that accurately predicts the properties of all gases under all conditions. Therefore, a number of much more accurate equations of state have been developed for gases under a given set of assumptions. The \"gas models\" that are most widely discussed are \"Real Gas\", \"Ideal Gas\" and \"Perfect Gas\". Each of these models have their own set of assumptions to, basically, make our lives easier when we want to analyze a given thermodynamic system.\n\n### Real gas\n\nReal gas effects refers to an assumption base where the following are taken into account:\n\nFor most applications, such a detailed analysis is excessive. An example where \"Real Gas effects\" would have a significant impact would be on the Space Shuttle re-entry where extremely high temperatures and pressures are present.\n\n### Ideal gas\n\nAn \"ideal gas\" is a simplified \"real gas\" with the assumption that the compressibility factor $Z$",
null,
"is set to 1. So the state variables follow the ideal gas law.\n\nThis approximation is more suitable for applications in engineering although simpler models can be used to produce a \"ball-park\" range as to where the real solution should lie. An example where the \"ideal gas approximation\" would be suitable would be inside a combustion chamber of a jet engine. It may also be useful to keep the elementary reactions and chemical dissociations for calculating emissions.\n\n### Perfect gas\n\nBy definition, A perfect gas is one in which intermolecular forces are neglected. So, along with the assumptions of an Ideal Gas, the following assumptions are added:\n\n• Neglected intermolecular forces\n\nBy neglecting these forces, the equation of state for a perfect gas can be simply derived from kinetic theory or statistical mechanics.\n\nThis type of assumption is useful for making calculations very simple and easy to do. With this assumption we can apply the Ideal gas law without restriction and neglect many complications that may arise from the Van der Waals forces.\n\nAlong with the definition of a perfect gas, there are also two more simplifications that can be made although various textbooks either omit or combine the following simplifications into a general \"perfect gas\" definition. For sake of clarity, these simplifications are defined separately.\n\n#### Thermally perfect\n\n$e=e(T)$",
null,
"$h=h(T)$",
null,
"$de=C_{v}dT$",
null,
"$dh=C_{p}dT$",
null,
"This type of approximation is useful for modeling, for example, an axial compressor where temperature fluctuations are usually not large enough to cause any significant deviations from the Thermally perfect gas model. Heat capacity is still allowed to vary, though only with temperature and molecules are not permitted to dissociate.\n\n#### Calorically perfect\n\nFinally, the most restricted gas model is one where all the above assumptions apply and we also apply:\n\n• Constant Specific Heats\n\n$e=C_{v}T$",
null,
"$h=C_{p}T$",
null,
"Although this may be the most restrictive model, it still may be accurate enough to make reasonable calculations. For example, if a model of one compression stage of the axial compressor mentioned in the previous example was made (one with variable $C_{p}$",
null,
", and one with constant $C_{p}$",
null,
") to compare the two simplifications, the deviation may be found at a small enough order of magnitude that other factors that come into play in this compression would have a greater impact on the final result than whether or not $C_{p}$",
null,
"was held constant. (compressor tip-clearance, boundary layer/frictional losses, manufacturing impurities, etc.)\n\n## Historical Synthesis\n\nBoyle's Law was perhaps the first expression of an equation of state. In 1662 Robert Boyle, an Irishman, performed a series of experiments employing a J-shaped glass tube, which was sealed on one end. Mercury was added to the tube, trapping a fixed quantity of air in the short, sealed end of the tube. Then the volume of gas was carefully measured as additional mercury was added to the tube. The pressure of the gas could be determined by the difference between the mercury level in the short end of the tube and that in the long, open end. Through these experiments, Boyle noted that the gas volume varied inversely with the pressure. In mathematical form, this can be stated as: $pV=constant$",
null,
".\n\nThis law is used widely to describe different thermodynamic processes by adjusting the equation to read $pV^{n}=constant$",
null,
"and then varying the $n$",
null,
"through different values such as the specific heat ratio, γ.\n\nIn 1787 the French physicist Jacques Charles found that oxygen, nitrogen, hydrogen, carbon dioxide, and air expand to the same extent over the same 80 kelvin interval.\n\nIn 1802, Joseph Louis Gay-Lussac published results of similar experiments, indicating a linear relationship between volume and temperature: $V_{1}/T_{1}=V_{2}/T_{2}$",
null,
"In 1801 John Dalton published the Law of Partial Pressures: The pressure of a mixture of gases is equal to the sum of the pressures of all of the constituent gases alone. Mathematically, this can be represented for n species as: $Pressure_{total}=Pressure_{1}+Pressure_{2}+...+Pressure_{n}$",
null,
"## Special Topics\n\n#### Compressibility\n\nThe compressibility factor ($Z$",
null,
") is used to alter the ideal gas equation to account for the real gas behavior. It is sometimes referred to as a \"fudge-factor\" to make the ideal gas law more accurate for the application. Usually this $Z$",
null,
"value is very close to unity.\n\n#### Reynolds Number\n\nIn fluid mechanics, the Reynolds number is the ratio of inertial forces (vsρ) to viscous forces (μ/L). It is one of the most important dimensionless numbers in fluid dynamics and is used, usually along with other dimensionless numbers, to provide a criterion for determining dynamic similitude.\n\n#### Viscosity\n\nAs we saw earlier: Pressure acts perpendicular (normal) to the wall. The tangential (shear) component of the force that is left over is related to the viscosity of the gas. As an object moves through a gas, viscous effects become more prevalent.\n\n#### Turbulence\n\nIn fluid dynamics, turbulence or turbulent flow is a flow regime characterized by chaotic, stochastic property changes. This includes low momentum diffusion, high momentum convection, and rapid variation of pressure and velocity in space and time.\n\n#### Boundary Layer\n\nParticles will, in effect, \"stick\" to the surface of an object moving through it. This layer of particles is called the boundary layer. At the surface of the object, it is essentially static due to the friction of the surface. The object, with its boundary layer is effectively the new shape of the object that the rest of the molecules \"see\" as the object approaches. This boundary layer can separate from the surface, essentially creating a new surface and completely changing the flow path. The classical example of this is a stalling airfoil.\n\n#### Maximum Entropy Principle\n\nAs the total number of degrees of freedom approaches infinity, the system will be found in the macrostate that corresponds to the highest multiplicity.\n\n#### Thermodynamic Equilibrium\n\nEquilibrium thermodynamics applies if the energy change within a system occurs on a timescale large enough for a sufficient number of molecular collisions to occur so that the energy transfer between molecules and between energy modes to allow the new energy value to be distributed in equilibrium among the molecules. (For typical systems, this is on the order of a few nanoseconds)\n\n## Etymology\n\nThe word \"gas\" was invented by Jan Baptist van Helmont, perhaps as a Dutch pronunciation re-spelling of \"chaos\"."
] | [
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/3f3275c4bf5bcba157f5bcda299278824cbeafa6",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/1cc6b75e09a8aa3f04d8584b11db534f88fb56bd",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/54fc9ecd4758352b1f71922c32e82b907b282abc",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/a09d702b7fff580155d0e8f165b55885fd166de6",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/dee04b5de43d87ccf3fefac622949828deaead98",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/887f47bfa3d865c2a89dc96dcda7b6641d82e824",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/545752b50cd5343b602a55f4791800703ef96511",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/361f4556b3fefb1a572e2a86c24f747df2ec3e9b",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/6bc37470431fbf62081b69ba870ad3f855178361",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/6bc37470431fbf62081b69ba870ad3f855178361",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/6bc37470431fbf62081b69ba870ad3f855178361",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/a151495ea34ad6aa0738252e89cea4aa3582f88d",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/adec8478f2b5c636e3a68629a2eb6ec782b30bea",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/a601995d55609f2d9f5e233e36fbe9ea26011b3b",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/42034563bb55073f189d0a0c37a0ff2ea2527b5f",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/e97ba9e8ca93739a56edfc730bea819824f65ee5",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/1cc6b75e09a8aa3f04d8584b11db534f88fb56bd",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/1cc6b75e09a8aa3f04d8584b11db534f88fb56bd",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9130397,"math_prob":0.9649919,"size":15292,"snap":"2021-31-2021-39","text_gpt3_token_len":3220,"char_repetition_ratio":0.1177394,"word_repetition_ratio":0.0074688797,"special_character_ratio":0.1941538,"punctuation_ratio":0.11431624,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9910571,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36],"im_url_duplicate_count":[null,5,null,null,null,5,null,5,null,5,null,5,null,7,null,5,null,null,null,null,null,null,null,5,null,5,null,null,null,5,null,5,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-09-28T04:00:43Z\",\"WARC-Record-ID\":\"<urn:uuid:107c8a5e-8bad-4756-a51e-096d581ed84b>\",\"Content-Length\":\"82511\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:327368a2-8dcb-4b3a-a80e-458f4548371a>\",\"WARC-Concurrent-To\":\"<urn:uuid:b362fb5b-9198-486b-b262-3f4eb8ea55a4>\",\"WARC-IP-Address\":\"44.197.72.169\",\"WARC-Target-URI\":\"https://www.wikidoc.org/index.php/Gas\",\"WARC-Payload-Digest\":\"sha1:NCUQYBY374LQZZ6KK4XSDSVWAMMSTVBJ\",\"WARC-Block-Digest\":\"sha1:3HQLEFVSPMUWF4IM4UFK5OKKOIHFT77D\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-39/CC-MAIN-2021-39_segments_1631780060201.9_warc_CC-MAIN-20210928032425-20210928062425-00094.warc.gz\"}"} |
https://algebra-calculators.com/rational-numbers-class-7-maths-formulas/ | [
"# Rational Numbers Class 7 Maths Formulas\n\nFor those looking for help on Rational Numbers Class 7 Math Concepts can find all of them here provided in a comprehensive manner. To make it easy for you we have jotted the Class 7 Rational Numbers Maths Formulae List all at one place. You can find Formulas for all the topics lying within the Rational Numbers Class 7 Rational Numbers in detail and get a good grip on them. Revise the entire concepts in a smart way taking help of the Maths Formulas for Class 7 Rational Numbers.\n\n## Maths Formulas for Class 7 Rational Numbers\n\nThe List of Important Formulas for Class 7 Rational Numbers is provided on this page. We have everything covered right from basic to advanced concepts in Rational Numbers. Make the most out of the Maths Formulas for Class 7 prepared by subject experts and take your preparation to the next level. Access the Formula Sheet of Rational Numbers Class 7 covering numerous concepts and use them to solve your Problems effortlessly.\n\nThe numbers used for counting objects are called counting numbers or natural numbers. These are: 1, 2, 3, 4, ………\n\nIf we include 0 to natural numbers, we get whole numbers. Thus, 0, 1, 2, 3, 4, ….. are whole numbers.\n\nIf we include the negatives of natural numbers to the whole numbers, we get integers. Thus, ….., -3, -2, -1, 0, 1, 2, 3, …… are integers.\nWe see that we have extended the number system from natural numbers to whole numbers and then from whole numbers to integers.\n\nThe numbers of the form $$\\frac { numerator }{ denominator }$$ where the numerator is either 0 or a positive integer and the denominator is a positive integer, are called fractions.\n\nWe compare two fractions by finding their equivalent forms. We have studied all the four basic operations of addition, subtraction, multiplication and division on them. In this chapter, we shall further extend the number system by introducing rational numbers.\n\nNeed for Rational Numbers\nThere are many situations which involve fractional numbers. To include such numbers, we need to extend our number system by introducing rational numbers.\n\nWhat are Rational Numbers?\nA number of the form $$\\frac { p }{ q }$$ where p and q (≠0) are integers, is called a rational number.\n\nNumerator and Denominator\nIn $$\\frac { p }{ q }$$, the integer p is the numerator, and the integer q (≠0) is the denominator.\nThus in $$\\frac { -3 }{ 7 }$$, the numerator is -3 and the denominator is 7.\n\nEquivalent Rational Numbers\nIf we multiply the numerator and denominator of a rational number by the same non-zero integer, we obtain another rational number equivalent to the given rational number.\n\nPositive and Negative Rational Numbers\nA rational number whose numerator and denominator both are positive integers is called a positive rational number.\nA rational number, whose numerator is a negative integer and denominator is a positive integer, is called a negative rational number. Similarly, if the numerator is positive integer and denominator is a negative integer; is also a negative rational number.\n\nRational Numbers on a Number Line\nPositive rational numbers are marked on the right of 0 on the number line whereas negative rational numbers are marked on the left of 0 on the number line.\nThe method of representation is the same as the method of representation of fractions on the number line.\n\nRational Numbers in Standard Form\nA rational number is said to be in the standard form if its denominator is a positive integer and the numerator and the denominator have no common factor other than 1. Note that the negative sign occurs only in the numerator.\nA rational number in standard form is said to be in its lowest form.\n\nReduction of a Rational Number to its Lowest Form\nTo reduce a rational number to its standard form (or lowest form), we divide its numerator and denominator by their HCF ignoring the negative sign, if any.\nHowever, if there is a negative sign in the denominator, we divide by -HCF’.\n\nComparison of Rational Numbers\nTwo positive rational numbers can be compared exactly as we compare two fractions.\nTwo negative rational numbers can be compared by ignoring their negative signs and then reversing the order.\nComparison of a negative and a positive rational number is obvious as a negative rational number is always less than a positive rational number.\n\nRational Numbers Between Two Rational Numbers\nThere exist an unlimited number of rational numbers between any two rational numbers.\n\nOperations on Rational Numbers\nAddition of two rational numbers with same denominators: Two rational numbers with the same denominators can be added by adding their numerators, keeping the denominator same.\n\nAddition of two rational numbers with different denominators: As in the case of fractions, we first find the LCM of the two denominators. Then we find the rational numbers equivalent to the given rational numbers with this LCM as the denominator. Now, we add the two rational numbers as in (A).\n\nThe additive inverse of the rational number $$\\frac { p }{ q }$$ is –$$\\frac { p }{ q }$$\n\nSubtraction\nWhile subtracting two rational numbers, we add the additive inverse of the rational number to be subtracted to the other rational number.\n\nMultiplication\nMultiplication of a rational number by a positive integer:\nWhile multiplying a rational number by a positive integer, we multiply the numerator by that integer, keeping the denominator unchanged.\n\nMultiplication of rational number by a negative integer:\nWhile multiplying a rational number by a negative integer, we multiply the numerator by that integer, keeping the denominator unchanged.\n\nMultiplication of two rational numbers (none of which is an integer):\nBased on the above observations,\nSo, as done in fractions we multiply two rational numbers as follows:\n\n• Step 1. Multiply the numerators of the two rational numbers.\n• Step 2. Multiply the denominators of the two rational numbers.\n• Step 3. Write the product as $$\\frac { Result\\quad of\\quad Step1 }{ Result\\quad of\\quad Step2 }$$\n\nDivision\nThe reciprocal of the rational number $$\\frac { p }{ q }$$ is $$\\frac { q }{ p }$$\nTo divide one rational number by other rational number, we multiply one rational number by the reciprocal of the other.\n\nProduct of Reciprocals\nThe product of a rational number with its reciprocal is always 1.\n\nA rational number is defined as a number that can be expressed in the form $$\\frac { p }{ q }$$, where p and q are integers and q ≠ 0.",
null,
"Rational Numbers include integers and fractions.\n\nIn $$\\frac { p }{ q }$$, p is the numerator and q is the denominator.\n\nZero is a rational number. We can write $$\\frac { 0 }{ 1 }$$.\n\nBy multiplying the numerator and denominator of a rational number by the same non – zero integer, we obtained another rational number equivalent to the given rational number.",
null,
"If both the numerator and denominator are either positive or negative integers, then they are said to be a positive rational number.",
null,
"A rational number is said to be negative if its numerator and denominator are such that one of them is a positive integer and the other is a negative integer.",
null,
"Zero is neither positive nor negative rational numbers.\nRepresentation of Rational Numbers on a Number line",
null,
"To reduce the rational number to its standard form, we divide its numerator and denominator by their HCF ignoring the negative sign.",
null,
"To compare two negative rational numbers, we compare them ignoring their negative signs and then reverse the order.",
null,
"We can find an unlimited number of rational numbers between any two rational numbers.\nWhile adding rational numbers with same denominators, we add the numerators keeping the denominators same.",
null,
"While subtracting two rational numbers, we add the additive inverse of the rational, number that is being Subtracted, to the other rational number.",
null,
"While multiplying a rational number by a positive integer, we multiply the numerator by that integer, keeping the denominator unchanged.",
null,
"Product of reciprocals is always equal to 1.",
null,
"To divide one rational number by the other non – zero rational number, we multiply the rational number by the reciprocal of the other.",
null,
""
] | [
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249735_7225408dfe_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249675_ecd1b4010e_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/33863834318_5b626bb4be_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249635_99e684e5bc_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/33863834238_bec136c61c_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249585_998d7bd17f_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249575_423a3deea3_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/33863834168_efd0317983_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249485_c4629fc286_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/33863833998_1934b18406_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/46824249395_483fcdac10_o.png",
null,
"https://i0.wp.com/live.staticflickr.com/65535/33863833908_b09da477aa_o.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90529555,"math_prob":0.9987009,"size":8119,"snap":"2023-14-2023-23","text_gpt3_token_len":1700,"char_repetition_ratio":0.27048674,"word_repetition_ratio":0.17445256,"special_character_ratio":0.2101244,"punctuation_ratio":0.09749492,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99977523,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24],"im_url_duplicate_count":[null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-03-20T10:44:23Z\",\"WARC-Record-ID\":\"<urn:uuid:7f147f49-d840-46be-b1ff-a9bfcf2f75ec>\",\"Content-Length\":\"88663\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:4cb9b95f-8f14-449b-9f95-0af08a35263a>\",\"WARC-Concurrent-To\":\"<urn:uuid:813f44d6-b3dd-4c59-848c-d2a128859790>\",\"WARC-IP-Address\":\"45.89.206.59\",\"WARC-Target-URI\":\"https://algebra-calculators.com/rational-numbers-class-7-maths-formulas/\",\"WARC-Payload-Digest\":\"sha1:QXETLCLEHISYNPVBTJT273PWFNHY6GLU\",\"WARC-Block-Digest\":\"sha1:I6JHBOKWBD5QZY2IZV5KXHLVZDYV46TY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-14/CC-MAIN-2023-14_segments_1679296943471.24_warc_CC-MAIN-20230320083513-20230320113513-00787.warc.gz\"}"} |
https://www.colorhexa.com/00e9da | [
"# #00e9da Color Information\n\nIn a RGB color space, hex #00e9da is composed of 0% red, 91.4% green and 85.5% blue. Whereas in a CMYK color space, it is composed of 100% cyan, 0% magenta, 6.4% yellow and 8.6% black. It has a hue angle of 176.1 degrees, a saturation of 100% and a lightness of 45.7%. #00e9da color hex could be obtained by blending #00ffff with #00d3b5. Closest websafe color is: #00ffcc.\n\n• R 0\n• G 91\n• B 85\nRGB color chart\n• C 100\n• M 0\n• Y 6\n• K 9\nCMYK color chart\n\n#00e9da color description : Pure (or mostly pure) cyan.\n\n# #00e9da Color Conversion\n\nThe hexadecimal color #00e9da has RGB values of R:0, G:233, B:218 and CMYK values of C:1, M:0, Y:0.06, K:0.09. Its decimal value is 59866.\n\nHex triplet RGB Decimal 00e9da `#00e9da` 0, 233, 218 `rgb(0,233,218)` 0, 91.4, 85.5 `rgb(0%,91.4%,85.5%)` 100, 0, 6, 9 176.1°, 100, 45.7 `hsl(176.1,100%,45.7%)` 176.1°, 100, 91.4 00ffcc `#00ffcc`\nCIE-LAB 83.619, -49.189, -5.926 41.79, 63.335, 76.348 0.23, 0.349, 63.335 83.619, 49.545, 186.869 83.619, -66.225, -1.564 79.584, -45.54, -1.171 00000000, 11101001, 11011010\n\n# Color Schemes with #00e9da\n\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #e9000f\n``#e9000f` `rgb(233,0,15)``\nComplementary Color\n• #00e966\n``#00e966` `rgb(0,233,102)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #0084e9\n``#0084e9` `rgb(0,132,233)``\nAnalogous Color\n• #e96600\n``#e96600` `rgb(233,102,0)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #e90084\n``#e90084` `rgb(233,0,132)``\nSplit Complementary Color\n• #e9da00\n``#e9da00` `rgb(233,218,0)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #da00e9\n``#da00e9` `rgb(218,0,233)``\n• #0fe900\n``#0fe900` `rgb(15,233,0)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #da00e9\n``#da00e9` `rgb(218,0,233)``\n• #e9000f\n``#e9000f` `rgb(233,0,15)``\n• #009d92\n``#009d92` `rgb(0,157,146)``\n• #00b6aa\n``#00b6aa` `rgb(0,182,170)``\n• #00d0c2\n``#00d0c2` `rgb(0,208,194)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #03ffef\n``#03ffef` `rgb(3,255,239)``\n• #1dfff0\n``#1dfff0` `rgb(29,255,240)``\n• #37fff2\n``#37fff2` `rgb(55,255,242)``\nMonochromatic Color\n\n# Alternatives to #00e9da\n\nBelow, you can see some colors close to #00e9da. Having a set of related colors can be useful if you need an inspirational alternative to your original color choice.\n\n• #00e9a0\n``#00e9a0` `rgb(0,233,160)``\n• #00e9b3\n``#00e9b3` `rgb(0,233,179)``\n• #00e9c7\n``#00e9c7` `rgb(0,233,199)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #00e5e9\n``#00e5e9` `rgb(0,229,233)``\n• #00d1e9\n``#00d1e9` `rgb(0,209,233)``\n• #00bee9\n``#00bee9` `rgb(0,190,233)``\nSimilar Colors\n\n# #00e9da Preview\n\nThis text has a font color of #00e9da.\n\n``<span style=\"color:#00e9da;\">Text here</span>``\n#00e9da background color\n\nThis paragraph has a background color of #00e9da.\n\n``<p style=\"background-color:#00e9da;\">Content here</p>``\n#00e9da border color\n\nThis element has a border color of #00e9da.\n\n``<div style=\"border:1px solid #00e9da;\">Content here</div>``\nCSS codes\n``.text {color:#00e9da;}``\n``.background {background-color:#00e9da;}``\n``.border {border:1px solid #00e9da;}``\n\n# Shades and Tints of #00e9da\n\nA shade is achieved by adding black to any pure hue, while a tint is created by mixing white to any pure color. In this example, #001110 is the darkest color, while #fdffff is the lightest one.\n\n• #001110\n``#001110` `rgb(0,17,16)``\n• #002522\n``#002522` `rgb(0,37,34)``\n• #003835\n``#003835` `rgb(0,56,53)``\n• #004c47\n``#004c47` `rgb(0,76,71)``\n• #00605a\n``#00605a` `rgb(0,96,90)``\n• #00736c\n``#00736c` `rgb(0,115,108)``\n• #00877e\n``#00877e` `rgb(0,135,126)``\n• #009b91\n``#009b91` `rgb(0,155,145)``\n• #00aea3\n``#00aea3` `rgb(0,174,163)``\n• #00c2b5\n``#00c2b5` `rgb(0,194,181)``\n• #00d5c8\n``#00d5c8` `rgb(0,213,200)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\n• #00fdec\n``#00fdec` `rgb(0,253,236)``\n• #11fff0\n``#11fff0` `rgb(17,255,240)``\n• #25fff1\n``#25fff1` `rgb(37,255,241)``\n• #38fff2\n``#38fff2` `rgb(56,255,242)``\n• #4cfff3\n``#4cfff3` `rgb(76,255,243)``\n• #60fff5\n``#60fff5` `rgb(96,255,245)``\n• #73fff6\n``#73fff6` `rgb(115,255,246)``\n• #87fff7\n``#87fff7` `rgb(135,255,247)``\n• #9bfff9\n``#9bfff9` `rgb(155,255,249)``\n• #aefffa\n``#aefffa` `rgb(174,255,250)``\n• #c2fffb\n``#c2fffb` `rgb(194,255,251)``\n• #d5fffc\n``#d5fffc` `rgb(213,255,252)``\n• #e9fffe\n``#e9fffe` `rgb(233,255,254)``\n• #fdffff\n``#fdffff` `rgb(253,255,255)``\nTint Color Variation\n\n# Tones of #00e9da\n\nA tone is produced by adding gray to any pure hue. In this case, #6c7d7c is the less saturated color, while #00e9da is the most saturated one.\n\n• #6c7d7c\n``#6c7d7c` `rgb(108,125,124)``\n• #638684\n``#638684` `rgb(99,134,132)``\n• #5a8f8c\n``#5a8f8c` `rgb(90,143,140)``\n• #519894\n``#519894` `rgb(81,152,148)``\n• #48a19c\n``#48a19c` `rgb(72,161,156)``\n• #3faaa3\n``#3faaa3` `rgb(63,170,163)``\n• #36b3ab\n``#36b3ab` `rgb(54,179,171)``\n• #2dbcb3\n``#2dbcb3` `rgb(45,188,179)``\n• #24c5bb\n``#24c5bb` `rgb(36,197,187)``\n• #1bcec3\n``#1bcec3` `rgb(27,206,195)``\n• #12d7ca\n``#12d7ca` `rgb(18,215,202)``\n• #09e0d2\n``#09e0d2` `rgb(9,224,210)``\n• #00e9da\n``#00e9da` `rgb(0,233,218)``\nTone Color Variation\n\n# Color Blindness Simulator\n\nBelow, you can see how #00e9da is perceived by people affected by a color vision deficiency. This can be useful if you need to ensure your color combinations are accessible to color-blind users.\n\nMonochromacy\n• Achromatopsia 0.005% of the population\n• Atypical Achromatopsia 0.001% of the population\nDichromacy\n• Protanopia 1% of men\n• Deuteranopia 1% of men\n• Tritanopia 0.001% of the population\nTrichromacy\n• Protanomaly 1% of men, 0.01% of women\n• Deuteranomaly 6% of men, 0.4% of women\n• Tritanomaly 0.01% of the population"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.52499855,"math_prob":0.8457207,"size":3692,"snap":"2021-31-2021-39","text_gpt3_token_len":1645,"char_repetition_ratio":0.13720174,"word_repetition_ratio":0.011049724,"special_character_ratio":0.5330444,"punctuation_ratio":0.23198198,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9884282,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-07-29T12:43:43Z\",\"WARC-Record-ID\":\"<urn:uuid:2c334e7e-a61a-4475-9ea1-81d0a867bcd8>\",\"Content-Length\":\"36151\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:481907ea-5139-4cb9-8b5b-14ec221dc19c>\",\"WARC-Concurrent-To\":\"<urn:uuid:acce9eeb-eab2-4dea-a963-1109281d27e0>\",\"WARC-IP-Address\":\"178.32.117.56\",\"WARC-Target-URI\":\"https://www.colorhexa.com/00e9da\",\"WARC-Payload-Digest\":\"sha1:AWRIMEYVRQJCFUQIFHWWT6NQB3VYZJ5Z\",\"WARC-Block-Digest\":\"sha1:X7UN54SR3SCO4E42Z6TSYEXKAX6EVPBW\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-31/CC-MAIN-2021-31_segments_1627046153857.70_warc_CC-MAIN-20210729105515-20210729135515-00715.warc.gz\"}"} |
https://researchportal.bath.ac.uk/en/publications/the-derivation-of-the-linear-boltzmann-equation-from-a-rayleigh-g | [
"# The derivation of the linear Boltzmann equation from a Rayleigh gas particle model\n\nKarsten Matthies, George Russell Stone, Florian Theil\n\nResearch output: Contribution to journalArticlepeer-review\n\n2 Citations (SciVal)\n\n## Abstract\n\nA linear Boltzmann equation is derived in the Boltzmann-Grad scaling for the deterministic dynamics of many interacting particles with random initial data. We study a Rayleigh gas where a tagged particle is undergoing hard-sphere collisions with background particles, which do not interact among each other. In the Boltzmann-Grad scaling, we derive the validity of a linear Boltzmann equation for arbitrary long times under moderate assumptions on higher moments of the initial distributions of the tagged particle and the possibly non-equilibrium distribution of the background. The convergence of the empiric dynamics to the Boltzmann dynamics is shown using Kolmogorov equations for associated probability measures on collision histories.\nOriginal language English 14450 137-177 41 Kinetic and Related Models 11 1 16 Aug 2017 https://doi.org/10.3934/krm.2018008 Published - 1 Feb 2018\n\n## Keywords\n\n• math.AP\n• math-ph\n• math.MP\n• Derivation\n• Boltzmann equation\n• Semigroups\n• Rayleigh gas\n\n## Fingerprint\n\nDive into the research topics of 'The derivation of the linear Boltzmann equation from a Rayleigh gas particle model'. Together they form a unique fingerprint."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7658082,"math_prob":0.6348197,"size":1493,"snap":"2023-40-2023-50","text_gpt3_token_len":339,"char_repetition_ratio":0.119543314,"word_repetition_ratio":0.0,"special_character_ratio":0.2016075,"punctuation_ratio":0.04910714,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.97337204,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-08T12:19:34Z\",\"WARC-Record-ID\":\"<urn:uuid:f5e1fffe-1720-41b7-a6ed-90965a547d7e>\",\"Content-Length\":\"57678\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ce09687d-f69a-4767-b2f8-e42cee2563a3>\",\"WARC-Concurrent-To\":\"<urn:uuid:8b446849-cb3b-4cc5-a6db-9d384389c4af>\",\"WARC-IP-Address\":\"54.74.68.52\",\"WARC-Target-URI\":\"https://researchportal.bath.ac.uk/en/publications/the-derivation-of-the-linear-boltzmann-equation-from-a-rayleigh-g\",\"WARC-Payload-Digest\":\"sha1:FXLRM53YTL32K7KAD3SIQT53HBQCUCYV\",\"WARC-Block-Digest\":\"sha1:OKL2XZJWPODWGXMJEDYSLPEQOTT5UYWM\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679100745.32_warc_CC-MAIN-20231208112926-20231208142926-00264.warc.gz\"}"} |
https://cl.desmos.com/t/error-in-self-generating-equations-for-systems/3294 | [
"# Error in self-generating equations for systems\n\nI’m creating a slide where linear systems are automatically generated and I can’t seem to find my error for the second equation. regenerating systems • Activity Builder by Desmos\n\nStudents are already given an equation in slope-intercept form (y=mx+b) for equation #1. The other equation is in general form and I want students to rewrite that one into slope-intercept form before graphing. I can’t seem to get the correct constant value for equation #2 and don’t know where my mistake is. The slope-intercept form for equation #2 is correct though.\n\n1 Like\n\nMan, that’s really confusing. Might help to not use so many x_n’s. I’d use A, B, C for the constants and coefficents in standard form. Maybe m_y, m_x for numerator and denominator of the slope fraction. I’d define the lines in the graphs to confirm variables are being calculated correctly before pulling those values into the CL (i.e. it’s really hard to navigate what parts of each equation each variable is).\n\nHi\n\nThe original task where I got the initial coding used x_ variables (so I kept it as that for my own task).\n\nI changed all of the x_ variables to a, b, c… Just by doing that the coding worked and the values for my equations worked. I have no idea why that was the issue, but it worked! =)\n\nThank you for that suggestion!!\n\n1 Like\n\nmistyped variable names somewhere",
null,
". Glad it’s working now!"
] | [
null,
"https://emoji.discourse-cdn.com/apple/man_shrugging.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9224335,"math_prob":0.92769384,"size":780,"snap":"2022-27-2022-33","text_gpt3_token_len":175,"char_repetition_ratio":0.13144329,"word_repetition_ratio":0.0,"special_character_ratio":0.21923077,"punctuation_ratio":0.09375,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99602515,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-07-01T04:34:42Z\",\"WARC-Record-ID\":\"<urn:uuid:7be3919e-955a-4f2c-8906-f055cf8f3ffc>\",\"Content-Length\":\"23650\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e60db4ec-a455-4c9c-8495-bc49042c135a>\",\"WARC-Concurrent-To\":\"<urn:uuid:a2a883d3-2204-4753-b107-262856cc59c1>\",\"WARC-IP-Address\":\"64.62.250.111\",\"WARC-Target-URI\":\"https://cl.desmos.com/t/error-in-self-generating-equations-for-systems/3294\",\"WARC-Payload-Digest\":\"sha1:AT3AIA3II4P5HKARWOP7TJ4OYXZCOHH6\",\"WARC-Block-Digest\":\"sha1:WQRJ23222ZBJLIKXGDNZYR5TCPBKWAKD\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103920118.49_warc_CC-MAIN-20220701034437-20220701064437-00713.warc.gz\"}"} |
https://www.exploringbinary.com/tag/code/page/2/ | [
"## Java Hangs When Converting 2.2250738585072012e-308\n\nKonstantin Preißer made an interesting discovery, after reading my article “PHP Hangs On Numeric Value 2.2250738585072011e-308”: Java — both its runtime and compiler — go into an infinite loop when converting the decimal number 2.2250738585072012e-308 to double-precision binary floating-point. This number is supposed to convert to 0x1p-1022, which is DBL_MIN; instead, Java gets stuck, oscillating between 0x1p-1022 and 0x0.fffffffffffffp-1022, the largest subnormal double-precision floating-point number.\n\n## Why “Volatile” Fixes the 2.2250738585072011e-308 Bug\n\nRecently I discovered a serious bug in x87 builds of PHP: PHP’s decimal to floating-point conversion routine, zend_strtod(), went into an infinite loop when converting the decimal string 2.2250738585072011e-308 to double-precision binary floating-point. This problem was fixed with a simple one line of code change to zend_strtod.c:\n\nThis line\n\n```double aadj, aadj1, adj;\n```\n\nwas changed to\n\n```volatile double aadj, aadj1, adj;\n```\n\nWhy does this fix the problem? I uncovered the very specific reason: it prevents a double rounding on underflow error.\n\n## PHP Hangs On Numeric Value 2.2250738585072011e-308\n\nI stumbled upon a very strange bug in PHP; this statement sends it into an infinite loop:\n\n```<?php \\$d = 2.2250738585072011e-308; ?>\n```\n\n(The same thing happens if you write the number without scientific notation — 324 decimal places.)\n\nI hit this bug in the two places I tested for it: on Windows (PHP 5.3.1 under XAMPP 1.7.3), and on Linux (PHP Version 5.3.2-1ubuntu4.5) — both on an Intel Core Duo processor. I’ve written a bug report.\n\n## Fifteen Digits Don’t Round-Trip Through SQLite Reals\n\nI’ve discovered that decimal floating-point numbers of 15 significant digits or less don’t always round-trip through SQLite. Consider this example, executed on version 3.7.3 of the pre-compiled SQLite command shell:\n\n```sqlite> create table t1(d real);\nsqlite> insert into t1 values(9.944932e+31);\nsqlite> select * from t1;\n9.94493200000001e+31\n```\n\nSQLite represents a decimal floating-point number that has real affinity as a double-precision binary floating-point number — a double. A decimal number of 15 significant digits or less is supposed to be recoverable from its double-precision representation. In SQLite, however, this guarantee is not met; this is because its floating-point to decimal conversion routine is implemented in limited-precision floating-point arithmetic.\n\n## The Answer is One (Unless You Use Floating-Point)\n\nWhat does this C function do?\n\n```double f(double a)\n{\ndouble b, c;\n\nb = 10*a - 10;\nc = a - 0.1*b;\n\nreturn (c);\n}\n```\n\nBased solely on reading the code, you’ll conclude that it always returns 1: c = a – 0.1*(10*a – 10) = a – (a-1) = 1. But if you execute the code, you’ll find that it may or may not return 1, depending on the input. If you know anything about binary floating-point arithmetic, that won’t surprise you; what might surprise you is how far from 1 the answer can be — as far away as a large negative number!\n\n## Quick and Dirty Floating-Point to Decimal Conversion\n\nIn my article “Quick and Dirty Decimal to Floating-Point Conversion” I presented a small C program that uses double-precision floating-point arithmetic to convert decimal strings to binary floating-point numbers. The program converts some numbers incorrectly, despite using an algorithm that’s mathematically correct; its limited precision calculations are to blame. I dubbed the program “quick and dirty” because it’s simple, and overall converts reasonably accurately.\n\nFor this article, I took a similar approach to the conversion in the opposite direction — from binary floating-point to decimal string. I wrote a small C program that combines two mathematically correct algorithms: the classic “repeated division by ten” algorithm to convert integer values, and the classic “repeated multiplication by ten” algorithm to convert fractional values. The program uses double-precision floating-point arithmetic, so like its quick and dirty decimal to floating-point counterpart, its conversions are not always correct — though reasonably accurate. I’ll present the program and analyze some example conversions, both correct and incorrect.\n\n## Inconsistent Rounding of Printed Floating-Point Numbers\n\nWhat does this C program print?\n\n```#include <stdio.h>\nint main (void)\n{\nprintf (\"%.1f\\n\",0.25);\n}\n```\n\nThe answer depends on which compiler you use. If you compile the program with Visual C++ and run on it on Windows, it prints 0.3; if you compile it with gcc and run it on Linux, it prints 0.2.\n\nThe compilers — actually, their run time libraries — are using different rules to break decimal rounding ties. The two-digit number 0.25, which has an exact binary floating-point representation, is equally near two one-digit decimal numbers: 0.2 and 0.3; either is an acceptable answer. Visual C++ uses the round-half-away-from-zero rule, and gcc (actually, glibc) uses the round-half-to-even rule, also known as bankers’ rounding.\n\nThis inconsistency of printed output is not limited to C — it spans many programming environments. In all, I tested fixed-format printing in nineteen environments: in thirteen of them, round-half-away-from-zero was used; in the remaining six, round-half-to-even was used. I also discovered an anomaly in some environments: numbers like 0.15 — which look like halfway cases but are actually not when viewed in binary — may be rounded incorrectly. I’ll report my results in this article.\n\n## Double Rounding Errors in Floating-Point Conversions\n\nDouble rounding is when a number is rounded twice, first from n0 digits to n1 digits, and then from n1 digits to n2 digits. Double rounding is often harmless, giving the same result as rounding once, directly from n0 digits to n2 digits. However, sometimes a doubly rounded result will be incorrect, in which case we say that a double rounding error has occurred.\n\nFor example, consider the 6-digit decimal number 7.23496. Rounded directly to 3 digits — using round-to-nearest, round half to even rounding — it’s 7.23; rounded first to 5 digits (7.2350) and then to 3 digits it’s 7.24. The value 7.24 is incorrect, reflecting a double rounding error.\n\nIn a computer, double rounding occurs in binary floating-point arithmetic; the typical example is a calculated result that’s rounded to fit into an x87 FPU extended precision register and then rounded again to fit into a double-precision variable. But I’ve discovered another context in which double rounding occurs: conversion from a decimal floating-point literal to a single-precision floating-point variable. The double rounding is from full-precision binary to double-precision, and then from double-precision to single-precision.\n\nIn this article, I’ll show example conversions in C that are tainted by double rounding errors, and how attaching the ‘f’ suffix to floating-point literals prevents them — in gcc C at least, but not in Visual C++!\n\n## Displaying IEEE Doubles in Binary Scientific Notation\n\nAn IEEE double-precision floating-point number, or double, is a 64-bit encoding of a rational number. Internally, the 64 bits are broken into three fields: a 1-bit sign field, which represents positive or negative; an 11-bit exponent field, which represents a power of two; and a 52-bit fraction field, which represents the significant bits of the number. These three fields — together with an implicit leading 1 bit — represent a number in binary scientific notation, with 1 to 53 bits of precision.\n\nFor example, consider the decimal number 33.75. It converts to a double with a sign field of 0, an exponent field of 10000000100, and a fraction field of 0000111000000000000000000000000000000000000000000000. The 0 in the sign field means it’s a positive number (1 would mean it’s negative). The value of 10000000100 in the exponent field, which equals 1028 in decimal, means the exponent of the power of two is 5 (the exponent field value is offset, or biased, by 1023). The fraction field, when prefixed with an implicit leading 1, represents the binary fraction 1.0000111. Written in normalized binary scientific notation — following the convention that the fraction is written in binary and the power of two is written in decimal — 33.75 equals 1.0000111 x 25.\n\nIn this article, I’ll show you the C function I wrote to display a double in normalized binary scientific notation. This function is useful, for example, when verifying that decimal to floating-point conversions are correctly rounded.\n\n## Quick and Dirty Decimal to Floating-Point Conversion\n\nThis little C program converts a decimal value — represented as a string — into a double-precision floating-point number:\n\n```#include <string.h>\n\nint main (void)\n{\ndouble intPart = 0, fracPart = 0, conversion;\nunsigned int i;\nchar decimal[] = \"3.14159\";\n\ni = 0; /* Left to right */\nwhile (decimal[i] != '.') {\nintPart = intPart*10 + (decimal[i] - '0');\ni++;\n}\n\ni = strlen(decimal)-1; /* Right to left */\nwhile (decimal[i] != '.') {\nfracPart = (fracPart + (decimal[i] - '0'))/10;\ni--;\n}\n\nconversion = intPart + fracPart;\n}\n```\n\nThe conversion is done using the elegant Horner’s method, summing each digit according to its decimal place value. So why do I call it “quick and dirty?” Because the binary floating-point value it produces is not necessarily the closest approximation to the input decimal value — the so-called correctly rounded result. (Remember that most real numbers cannot be represented exactly in floating-point.) Most of the time it will produce the correctly rounded result, but sometimes it won’t — the result will be off in its least significant bit(s). There’s just not enough precision in floating-point to guarantee the result is correct every time.\n\nI will demonstrate this program with different input values, some of which convert correctly, and some of which don’t. In the end, you’ll appreciate one reason why library functions like strtod() exist — to perform efficient, correctly rounded conversion.\n\n## When Doubles Don’t Behave Like Doubles\n\nIn my article “When Floats Don’t Behave Like Floats” I explained how calculations involving single-precision floating-point variables may be done, under the covers, in double or extended precision. This leads to anomalies in expected results, which I demonstrated with two C programs — compiled with Microsoft Visual C++ and run on a 32-bit Intel Core Duo processor.\n\nIn this article, I’ll do a similar analysis for double-precision floating-point variables, showing how similar anomalies arise when extended precision calculations are done. I modified my two example programs to use doubles instead of floats. Interestingly, the doubles version of program 2 does not exhibit the anomaly. I’ll explain.\n\n## When Floats Don’t Behave Like Floats\n\nThese two programs — compiled with Microsoft Visual C++ and run on a 32-bit Intel Core Duo processor — demonstrate an anomaly that occurs when using single-precision floating point variables:\n\nProgram 1\n\n```#include \"stdio.h\"\nint main (void)\n{\nfloat f1 = 0.1f, f2 = 3.0f, f3;\n\nf3 = f1 * f2;\nif (f3 != f1 * f2)\nprintf(\"Not equal\\n\");\n}\n```\n\nPrints “Not equal”.\n\nProgram 2\n\n```#include \"stdio.h\"\nint main (void)\n{\nfloat f1 = 0.7f, f2 = 10.0f, f3;\nint i1, i2;\n\nf3 = f1 * f2;\ni1 = (int)f3;\ni2 = (int)(f1 * f2);\nif (i1 != i2)\nprintf(\"Not equal\\n\");\n}\n```\n\nPrints “Not equal”.\n\nIn each case, f3 and f1 * f2 differ. But why? I’ll explain what’s going on."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8396118,"math_prob":0.9316918,"size":11579,"snap":"2019-51-2020-05","text_gpt3_token_len":2727,"char_repetition_ratio":0.14859611,"word_repetition_ratio":0.043670535,"special_character_ratio":0.2563261,"punctuation_ratio":0.12653062,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99597526,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-28T17:51:11Z\",\"WARC-Record-ID\":\"<urn:uuid:59de53f8-2922-4794-9240-3fd5508f9410>\",\"Content-Length\":\"64558\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:400b1ccd-adcc-4711-bf0b-941226504c69>\",\"WARC-Concurrent-To\":\"<urn:uuid:1f1fb755-57be-47d6-9732-77bbbefbb4cd>\",\"WARC-IP-Address\":\"162.217.86.213\",\"WARC-Target-URI\":\"https://www.exploringbinary.com/tag/code/page/2/\",\"WARC-Payload-Digest\":\"sha1:2HAOP2UTXOUYQS2YN5IOOYHK6OCCDYLR\",\"WARC-Block-Digest\":\"sha1:OFRLJ3O3QL6DAQIBGRQC2QPDWLPKC75J\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251779833.86_warc_CC-MAIN-20200128153713-20200128183713-00178.warc.gz\"}"} |
https://math.stackexchange.com/questions/2825205/find-base-in-isosceles-triangle | [
"# Find base in isosceles triangle",
null,
"If angle alpha and side $b$ is known in this isosceles triangle, how long is the base $a$? I know this is very basic but I don't know any trigonometry so I don't really know what to do here.\n\n$$\\frac{a}{\\sin\\alpha} = \\frac{b}{\\sin(\\frac{180 - \\alpha}{2})}$$\n$$a = \\frac{b\\cdot \\sin\\alpha}{\\sin(\\frac{180 - \\alpha}{2})}$$\nhint: $a^2 = b^2+b^2-2b^2\\cos(\\alpha)$ is known as the law of cosine in a triangle. Can you take it from here?"
] | [
null,
"https://i.stack.imgur.com/WgIVV.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8547574,"math_prob":0.99962986,"size":577,"snap":"2019-51-2020-05","text_gpt3_token_len":203,"char_repetition_ratio":0.14485165,"word_repetition_ratio":0.0,"special_character_ratio":0.35528597,"punctuation_ratio":0.108333334,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000055,"pos_list":[0,1,2],"im_url_duplicate_count":[null,1,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-29T05:45:30Z\",\"WARC-Record-ID\":\"<urn:uuid:e6207853-1f1e-4287-a0e7-fd24b7311f0c>\",\"Content-Length\":\"136640\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:a0ddce86-2817-48ba-967c-160686eda2c8>\",\"WARC-Concurrent-To\":\"<urn:uuid:3651b588-4f22-4b02-a565-be79cfc355bf>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/2825205/find-base-in-isosceles-triangle\",\"WARC-Payload-Digest\":\"sha1:KI2MBWR3UQQMQGEDOVARSPICSXOCXYCC\",\"WARC-Block-Digest\":\"sha1:TZDRLPQJXTOKGXUHTSZABXCND2GFZKM4\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579251788528.85_warc_CC-MAIN-20200129041149-20200129071149-00401.warc.gz\"}"} |
https://convertoctopus.com/650-cubic-feet-to-liters | [
"## Conversion formula\n\nThe conversion factor from cubic feet to liters is 28.3168467117, which means that 1 cubic foot is equal to 28.3168467117 liters:\n\n1 ft3 = 28.3168467117 L\n\nTo convert 650 cubic feet into liters we have to multiply 650 by the conversion factor in order to get the volume amount from cubic feet to liters. We can also form a simple proportion to calculate the result:\n\n1 ft3 → 28.3168467117 L\n\n650 ft3 → V(L)\n\nSolve the above proportion to obtain the volume V in liters:\n\nV(L) = 650 ft3 × 28.3168467117 L\n\nV(L) = 18405.950362605 L\n\nThe final result is:\n\n650 ft3 → 18405.950362605 L\n\nWe conclude that 650 cubic feet is equivalent to 18405.950362605 liters:\n\n650 cubic feet = 18405.950362605 liters\n\n## Alternative conversion\n\nWe can also convert by utilizing the inverse value of the conversion factor. In this case 1 liter is equal to 5.4330256264935E-5 × 650 cubic feet.\n\nAnother way is saying that 650 cubic feet is equal to 1 ÷ 5.4330256264935E-5 liters.\n\n## Approximate result\n\nFor practical purposes we can round our final result to an approximate numerical value. We can say that six hundred fifty cubic feet is approximately eighteen thousand four hundred five point nine five liters:\n\n650 ft3 ≅ 18405.95 L\n\nAn alternative is also that one liter is approximately zero times six hundred fifty cubic feet.\n\n## Conversion table\n\n### cubic feet to liters chart\n\nFor quick reference purposes, below is the conversion table you can use to convert from cubic feet to liters\n\ncubic feet (ft3) liters (L)\n651 cubic feet 18434.267 liters\n652 cubic feet 18462.584 liters\n653 cubic feet 18490.901 liters\n654 cubic feet 18519.218 liters\n655 cubic feet 18547.535 liters\n656 cubic feet 18575.851 liters\n657 cubic feet 18604.168 liters\n658 cubic feet 18632.485 liters\n659 cubic feet 18660.802 liters\n660 cubic feet 18689.119 liters"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.77281386,"math_prob":0.98192364,"size":1841,"snap":"2021-04-2021-17","text_gpt3_token_len":498,"char_repetition_ratio":0.22046815,"word_repetition_ratio":0.013201321,"special_character_ratio":0.37533948,"punctuation_ratio":0.10027855,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9923145,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-15T22:23:04Z\",\"WARC-Record-ID\":\"<urn:uuid:07d9c370-1221-4ef3-84a8-ada61009fffa>\",\"Content-Length\":\"29430\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:794b9e0b-b2ea-433b-83dd-d3d9ef9ce829>\",\"WARC-Concurrent-To\":\"<urn:uuid:0a2013c4-f9c8-44d3-9e7b-e5706dc324b3>\",\"WARC-IP-Address\":\"172.67.208.237\",\"WARC-Target-URI\":\"https://convertoctopus.com/650-cubic-feet-to-liters\",\"WARC-Payload-Digest\":\"sha1:2QW46N6VWNF2E3W62ZKP5NFVFJOGRI4S\",\"WARC-Block-Digest\":\"sha1:JVGV2PZJP2P3DVY3ABRKGWJY2SC5UY4P\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038088264.43_warc_CC-MAIN-20210415222106-20210416012106-00097.warc.gz\"}"} |
https://patientsaver.savingadvice.com/2013/07/06/whiling-away-the-time-indoors-where-its-_103523/ | [
"User Real IP - 3.235.75.174\n```Array\n(\n => Array\n(\n => 182.68.68.92\n)\n\n => Array\n(\n => 101.0.41.201\n)\n\n => Array\n(\n => 43.225.98.123\n)\n\n => Array\n(\n => 2.58.194.139\n)\n\n => Array\n(\n => 46.119.197.104\n)\n\n => Array\n(\n => 45.249.8.93\n)\n\n => Array\n(\n => 103.12.135.72\n)\n\n => Array\n(\n => 157.35.243.216\n)\n\n => Array\n(\n => 209.107.214.176\n)\n\n => Array\n(\n => 5.181.233.166\n)\n\n => Array\n(\n => 106.201.10.100\n)\n\n => Array\n(\n => 36.90.55.39\n)\n\n => Array\n(\n => 119.154.138.47\n)\n\n => Array\n(\n => 51.91.31.157\n)\n\n => Array\n(\n => 182.182.65.216\n)\n\n => Array\n(\n => 157.35.252.63\n)\n\n => Array\n(\n => 14.142.34.163\n)\n\n => Array\n(\n => 178.62.43.135\n)\n\n => Array\n(\n => 43.248.152.148\n)\n\n => Array\n(\n => 222.252.104.114\n)\n\n => Array\n(\n => 209.107.214.168\n)\n\n => Array\n(\n => 103.99.199.250\n)\n\n => Array\n(\n => 178.62.72.160\n)\n\n => Array\n(\n => 27.6.1.170\n)\n\n => Array\n(\n => 182.69.249.219\n)\n\n => Array\n(\n => 110.93.228.86\n)\n\n => Array\n(\n => 72.255.1.98\n)\n\n => Array\n(\n => 182.73.111.98\n)\n\n => Array\n(\n => 45.116.117.11\n)\n\n => Array\n(\n => 122.15.78.189\n)\n\n => Array\n(\n => 14.167.188.234\n)\n\n => Array\n(\n => 223.190.4.202\n)\n\n => Array\n(\n => 202.173.125.19\n)\n\n => Array\n(\n => 103.255.5.32\n)\n\n => Array\n(\n => 39.37.145.103\n)\n\n => Array\n(\n => 140.213.26.249\n)\n\n => Array\n(\n => 45.118.166.85\n)\n\n => Array\n(\n => 102.166.138.255\n)\n\n => Array\n(\n => 77.111.246.234\n)\n\n => Array\n(\n => 45.63.6.196\n)\n\n => Array\n(\n => 103.250.147.115\n)\n\n => Array\n(\n => 223.185.30.99\n)\n\n => Array\n(\n => 103.122.168.108\n)\n\n => Array\n(\n => 123.136.203.21\n)\n\n => Array\n(\n => 171.229.243.63\n)\n\n => Array\n(\n => 153.149.98.149\n)\n\n => Array\n(\n => 223.238.93.15\n)\n\n => Array\n(\n => 178.62.113.166\n)\n\n => Array\n(\n => 101.162.0.153\n)\n\n => Array\n(\n => 121.200.62.114\n)\n\n => Array\n(\n => 14.248.77.252\n)\n\n => Array\n(\n => 95.142.117.29\n)\n\n => Array\n(\n => 150.129.60.107\n)\n\n => Array\n(\n => 94.205.243.22\n)\n\n => Array\n(\n => 115.42.71.143\n)\n\n => Array\n(\n => 117.217.195.59\n)\n\n => Array\n(\n => 182.77.112.56\n)\n\n => Array\n(\n => 182.77.112.108\n)\n\n => Array\n(\n => 41.80.69.10\n)\n\n => Array\n(\n => 117.5.222.121\n)\n\n => Array\n(\n => 103.11.0.38\n)\n\n => Array\n(\n => 202.173.127.140\n)\n\n => Array\n(\n => 49.249.249.50\n)\n\n => Array\n(\n => 116.72.198.211\n)\n\n => Array\n(\n => 223.230.54.53\n)\n\n => Array\n(\n => 102.69.228.74\n)\n\n => Array\n(\n => 39.37.251.89\n)\n\n => Array\n(\n => 39.53.246.141\n)\n\n => Array\n(\n => 39.57.182.72\n)\n\n => Array\n(\n => 209.58.130.210\n)\n\n => Array\n(\n => 104.131.75.86\n)\n\n => Array\n(\n => 106.212.131.255\n)\n\n => Array\n(\n => 106.212.132.127\n)\n\n => Array\n(\n => 223.190.4.60\n)\n\n => Array\n(\n => 103.252.116.252\n)\n\n => Array\n(\n => 103.76.55.182\n)\n\n => Array\n(\n => 45.118.166.70\n)\n\n => Array\n(\n => 103.93.174.215\n)\n\n => Array\n(\n => 5.62.62.142\n)\n\n => Array\n(\n => 182.179.158.156\n)\n\n => Array\n(\n => 39.57.255.12\n)\n\n => Array\n(\n => 39.37.178.37\n)\n\n => Array\n(\n => 182.180.165.211\n)\n\n => Array\n(\n => 119.153.135.17\n)\n\n => Array\n(\n => 72.255.15.244\n)\n\n => Array\n(\n => 139.180.166.181\n)\n\n => Array\n(\n => 70.119.147.111\n)\n\n => Array\n(\n => 106.210.40.83\n)\n\n => Array\n(\n => 14.190.70.91\n)\n\n => Array\n(\n => 202.125.156.82\n)\n\n => Array\n(\n => 115.42.68.38\n)\n\n => Array\n(\n => 102.167.13.108\n)\n\n => Array\n(\n => 117.217.192.130\n)\n\n => Array\n(\n => 205.185.223.156\n)\n\n => Array\n(\n => 171.224.180.29\n)\n\n => Array\n(\n => 45.127.45.68\n)\n\n => Array\n(\n => 195.206.183.232\n)\n\n => Array\n(\n => 49.32.52.115\n)\n\n => Array\n(\n => 49.207.49.223\n)\n\n => Array\n(\n => 45.63.29.61\n)\n\n => Array\n(\n => 103.245.193.214\n)\n\n => Array\n(\n => 39.40.236.69\n)\n\n => Array\n(\n => 62.80.162.111\n)\n\n => Array\n(\n => 45.116.232.56\n)\n\n => Array\n(\n => 45.118.166.91\n)\n\n => Array\n(\n => 180.92.230.234\n)\n\n => Array\n(\n => 157.40.57.160\n)\n\n => Array\n(\n => 110.38.38.130\n)\n\n => Array\n(\n => 72.255.57.183\n)\n\n => Array\n(\n => 182.68.81.85\n)\n\n => Array\n(\n => 39.57.202.122\n)\n\n => Array\n(\n => 119.152.154.36\n)\n\n => Array\n(\n => 5.62.62.141\n)\n\n => Array\n(\n => 119.155.54.232\n)\n\n => Array\n(\n => 39.37.141.22\n)\n\n => Array\n(\n => 183.87.12.225\n)\n\n => Array\n(\n => 107.170.127.117\n)\n\n => Array\n(\n => 125.63.124.49\n)\n\n => Array\n(\n => 39.42.191.3\n)\n\n => Array\n(\n => 116.74.24.72\n)\n\n => Array\n(\n => 46.101.89.227\n)\n\n => Array\n(\n => 202.173.125.247\n)\n\n => Array\n(\n => 39.42.184.254\n)\n\n => Array\n(\n => 115.186.165.132\n)\n\n => Array\n(\n => 39.57.206.126\n)\n\n => Array\n(\n => 103.245.13.145\n)\n\n => Array\n(\n => 202.175.246.43\n)\n\n => Array\n(\n => 192.140.152.150\n)\n\n => Array\n(\n => 202.88.250.103\n)\n\n => Array\n(\n => 103.248.94.207\n)\n\n => Array\n(\n => 77.73.66.101\n)\n\n => Array\n(\n => 104.131.66.8\n)\n\n => Array\n(\n => 113.186.161.97\n)\n\n => Array\n(\n => 222.254.5.7\n)\n\n => Array\n(\n => 223.233.67.247\n)\n\n => Array\n(\n => 171.249.116.146\n)\n\n => Array\n(\n => 47.30.209.71\n)\n\n => Array\n(\n => 202.134.13.130\n)\n\n => Array\n(\n => 27.6.135.7\n)\n\n => Array\n(\n => 107.170.186.79\n)\n\n => Array\n(\n => 103.212.89.171\n)\n\n => Array\n(\n => 117.197.9.77\n)\n\n => Array\n(\n => 122.176.206.233\n)\n\n => Array\n(\n => 192.227.253.222\n)\n\n => Array\n(\n => 182.188.224.119\n)\n\n => Array\n(\n => 14.248.70.74\n)\n\n => Array\n(\n => 42.118.219.169\n)\n\n => Array\n(\n => 110.39.146.170\n)\n\n => Array\n(\n => 119.160.66.143\n)\n\n => Array\n(\n => 103.248.95.130\n)\n\n => Array\n(\n => 27.63.152.208\n)\n\n => Array\n(\n => 49.207.114.96\n)\n\n => Array\n(\n => 102.166.23.214\n)\n\n => Array\n(\n => 175.107.254.73\n)\n\n => Array\n(\n => 103.10.227.214\n)\n\n => Array\n(\n => 202.143.115.89\n)\n\n => Array\n(\n => 110.93.227.187\n)\n\n => Array\n(\n => 103.140.31.60\n)\n\n => Array\n(\n => 110.37.231.46\n)\n\n => Array\n(\n => 39.36.99.238\n)\n\n => Array\n(\n => 157.37.140.26\n)\n\n => Array\n(\n => 43.246.202.226\n)\n\n => Array\n(\n => 137.97.8.143\n)\n\n => Array\n(\n => 182.65.52.242\n)\n\n => Array\n(\n => 115.42.69.62\n)\n\n => Array\n(\n => 14.143.254.58\n)\n\n => Array\n(\n => 223.179.143.236\n)\n\n => Array\n(\n => 223.179.143.249\n)\n\n => Array\n(\n => 103.143.7.54\n)\n\n => Array\n(\n => 223.179.139.106\n)\n\n => Array\n(\n => 39.40.219.90\n)\n\n => Array\n(\n => 45.115.141.231\n)\n\n => Array\n(\n => 120.29.100.33\n)\n\n => Array\n(\n => 112.196.132.5\n)\n\n => Array\n(\n => 202.163.123.153\n)\n\n => Array\n(\n => 5.62.58.146\n)\n\n => Array\n(\n => 39.53.216.113\n)\n\n => Array\n(\n => 42.111.160.73\n)\n\n => Array\n(\n => 107.182.231.213\n)\n\n => Array\n(\n => 119.82.94.120\n)\n\n => Array\n(\n => 178.62.34.82\n)\n\n => Array\n(\n => 203.122.6.18\n)\n\n => Array\n(\n => 157.42.38.251\n)\n\n => Array\n(\n => 45.112.68.222\n)\n\n => Array\n(\n => 49.206.212.122\n)\n\n => Array\n(\n => 104.236.70.228\n)\n\n => Array\n(\n => 42.111.34.243\n)\n\n => Array\n(\n => 84.241.19.186\n)\n\n => Array\n(\n => 89.187.180.207\n)\n\n => Array\n(\n => 104.243.212.118\n)\n\n => Array\n(\n => 104.236.55.136\n)\n\n => Array\n(\n => 106.201.16.163\n)\n\n => Array\n(\n => 46.101.40.25\n)\n\n => Array\n(\n => 45.118.166.94\n)\n\n => Array\n(\n => 49.36.128.102\n)\n\n => Array\n(\n => 14.142.193.58\n)\n\n => Array\n(\n => 212.79.124.176\n)\n\n => Array\n(\n => 45.32.191.194\n)\n\n => Array\n(\n => 105.112.107.46\n)\n\n => Array\n(\n => 106.201.14.8\n)\n\n => Array\n(\n => 110.93.240.65\n)\n\n => Array\n(\n => 27.96.95.177\n)\n\n => Array\n(\n => 45.41.134.35\n)\n\n => Array\n(\n => 180.151.13.110\n)\n\n => Array\n(\n => 101.53.242.89\n)\n\n => Array\n(\n => 115.186.3.110\n)\n\n => Array\n(\n => 171.49.185.242\n)\n\n => Array\n(\n => 115.42.70.24\n)\n\n => Array\n(\n => 45.128.188.43\n)\n\n => Array\n(\n => 103.140.129.63\n)\n\n => Array\n(\n => 101.50.113.147\n)\n\n => Array\n(\n => 103.66.73.30\n)\n\n => Array\n(\n => 117.247.193.169\n)\n\n => Array\n(\n => 120.29.100.94\n)\n\n => Array\n(\n => 42.109.154.39\n)\n\n => Array\n(\n => 122.173.155.150\n)\n\n => Array\n(\n => 45.115.104.53\n)\n\n => Array\n(\n => 116.74.29.84\n)\n\n => Array\n(\n => 101.50.125.34\n)\n\n => Array\n(\n => 45.118.166.80\n)\n\n => Array\n(\n => 91.236.184.27\n)\n\n => Array\n(\n => 113.167.185.120\n)\n\n => Array\n(\n => 27.97.66.222\n)\n\n => Array\n(\n => 43.247.41.117\n)\n\n => Array\n(\n => 23.229.16.227\n)\n\n => Array\n(\n => 14.248.79.209\n)\n\n => Array\n(\n => 117.5.194.26\n)\n\n => Array\n(\n => 117.217.205.41\n)\n\n => Array\n(\n => 114.79.169.99\n)\n\n => Array\n(\n => 103.55.60.97\n)\n\n => Array\n(\n => 182.75.89.210\n)\n\n => Array\n(\n => 77.73.66.109\n)\n\n => Array\n(\n => 182.77.126.139\n)\n\n => Array\n(\n => 14.248.77.166\n)\n\n => Array\n(\n => 157.35.224.133\n)\n\n => Array\n(\n => 183.83.38.27\n)\n\n => Array\n(\n => 182.68.4.77\n)\n\n => Array\n(\n => 122.177.130.234\n)\n\n => Array\n(\n => 103.24.99.99\n)\n\n => Array\n(\n => 103.91.127.66\n)\n\n => Array\n(\n => 41.90.34.240\n)\n\n => Array\n(\n => 49.205.77.102\n)\n\n => Array\n(\n => 103.248.94.142\n)\n\n => Array\n(\n => 104.143.92.170\n)\n\n => Array\n(\n => 219.91.157.114\n)\n\n => Array\n(\n => 223.190.88.22\n)\n\n => Array\n(\n => 223.190.86.232\n)\n\n => Array\n(\n => 39.41.172.80\n)\n\n => Array\n(\n => 124.107.206.5\n)\n\n => Array\n(\n => 139.167.180.224\n)\n\n => Array\n(\n => 93.76.64.248\n)\n\n => Array\n(\n => 65.216.227.119\n)\n\n => Array\n(\n => 223.190.119.141\n)\n\n => Array\n(\n => 110.93.237.179\n)\n\n => Array\n(\n => 41.90.7.85\n)\n\n => Array\n(\n => 103.100.6.26\n)\n\n => Array\n(\n => 104.140.83.13\n)\n\n => Array\n(\n => 223.190.119.133\n)\n\n => Array\n(\n => 119.152.150.87\n)\n\n => Array\n(\n => 103.125.130.147\n)\n\n => Array\n(\n => 27.6.5.52\n)\n\n => Array\n(\n => 103.98.188.26\n)\n\n => Array\n(\n => 39.35.121.81\n)\n\n => Array\n(\n => 74.119.146.182\n)\n\n => Array\n(\n => 5.181.233.162\n)\n\n => Array\n(\n => 157.39.18.60\n)\n\n => Array\n(\n => 1.187.252.25\n)\n\n => Array\n(\n => 39.42.145.59\n)\n\n => Array\n(\n => 39.35.39.198\n)\n\n => Array\n(\n => 49.36.128.214\n)\n\n => Array\n(\n => 182.190.20.56\n)\n\n => Array\n(\n => 122.180.249.189\n)\n\n => Array\n(\n => 117.217.203.107\n)\n\n => Array\n(\n => 103.70.82.241\n)\n\n => Array\n(\n => 45.118.166.68\n)\n\n => Array\n(\n => 122.180.168.39\n)\n\n => Array\n(\n => 149.28.67.254\n)\n\n => Array\n(\n => 223.233.73.8\n)\n\n => Array\n(\n => 122.167.140.0\n)\n\n => Array\n(\n => 95.158.51.55\n)\n\n => Array\n(\n => 27.96.95.134\n)\n\n => Array\n(\n => 49.206.214.53\n)\n\n => Array\n(\n => 212.103.49.92\n)\n\n => Array\n(\n => 122.177.115.101\n)\n\n => Array\n(\n => 171.50.187.124\n)\n\n => Array\n(\n => 122.164.55.107\n)\n\n => Array\n(\n => 98.114.217.204\n)\n\n => Array\n(\n => 106.215.10.54\n)\n\n => Array\n(\n => 115.42.68.28\n)\n\n => Array\n(\n => 104.194.220.87\n)\n\n => Array\n(\n => 103.137.84.170\n)\n\n => Array\n(\n => 61.16.142.110\n)\n\n => Array\n(\n => 212.103.49.85\n)\n\n => Array\n(\n => 39.53.248.162\n)\n\n => Array\n(\n => 203.122.40.214\n)\n\n => Array\n(\n => 117.217.198.72\n)\n\n => Array\n(\n => 115.186.191.203\n)\n\n => Array\n(\n => 120.29.100.199\n)\n\n => Array\n(\n => 45.151.237.24\n)\n\n => Array\n(\n => 223.190.125.232\n)\n\n => Array\n(\n => 41.80.151.17\n)\n\n => Array\n(\n => 23.111.188.5\n)\n\n => Array\n(\n => 223.190.125.216\n)\n\n => Array\n(\n => 103.217.133.119\n)\n\n => Array\n(\n => 103.198.173.132\n)\n\n => Array\n(\n => 47.31.155.89\n)\n\n => Array\n(\n => 223.190.20.253\n)\n\n => Array\n(\n => 104.131.92.125\n)\n\n => Array\n(\n => 223.190.19.152\n)\n\n => Array\n(\n => 103.245.193.191\n)\n\n => Array\n(\n => 106.215.58.255\n)\n\n => Array\n(\n => 119.82.83.238\n)\n\n => Array\n(\n => 106.212.128.138\n)\n\n => Array\n(\n => 139.167.237.36\n)\n\n => Array\n(\n => 222.124.40.250\n)\n\n => Array\n(\n => 134.56.185.169\n)\n\n => Array\n(\n => 54.255.226.31\n)\n\n => Array\n(\n => 137.97.162.31\n)\n\n => Array\n(\n => 95.185.21.191\n)\n\n => Array\n(\n => 171.61.168.151\n)\n\n => Array\n(\n => 137.97.184.4\n)\n\n => Array\n(\n => 106.203.151.202\n)\n\n => Array\n(\n => 39.37.137.0\n)\n\n => Array\n(\n => 45.118.166.66\n)\n\n => Array\n(\n => 14.248.105.100\n)\n\n => Array\n(\n => 106.215.61.185\n)\n\n => Array\n(\n => 202.83.57.179\n)\n\n => Array\n(\n => 89.187.182.176\n)\n\n => Array\n(\n => 49.249.232.198\n)\n\n => Array\n(\n => 132.154.95.236\n)\n\n => Array\n(\n => 223.233.83.230\n)\n\n => Array\n(\n => 183.83.153.14\n)\n\n => Array\n(\n => 125.63.72.210\n)\n\n => Array\n(\n => 207.174.202.11\n)\n\n => Array\n(\n => 119.95.88.59\n)\n\n => Array\n(\n => 122.170.14.150\n)\n\n => Array\n(\n => 45.118.166.75\n)\n\n => Array\n(\n => 103.12.135.37\n)\n\n => Array\n(\n => 49.207.120.225\n)\n\n => Array\n(\n => 182.64.195.207\n)\n\n => Array\n(\n => 103.99.37.16\n)\n\n => Array\n(\n => 46.150.104.221\n)\n\n => Array\n(\n => 104.236.195.147\n)\n\n => Array\n(\n => 103.104.192.43\n)\n\n => Array\n(\n => 24.242.159.118\n)\n\n => Array\n(\n => 39.42.179.143\n)\n\n => Array\n(\n => 111.93.58.131\n)\n\n => Array\n(\n => 193.176.84.127\n)\n\n => Array\n(\n => 209.58.142.218\n)\n\n => Array\n(\n => 69.243.152.129\n)\n\n => Array\n(\n => 117.97.131.249\n)\n\n => Array\n(\n => 103.230.180.89\n)\n\n => Array\n(\n => 106.212.170.192\n)\n\n => Array\n(\n => 171.224.180.95\n)\n\n => Array\n(\n => 158.222.11.87\n)\n\n => Array\n(\n => 119.155.60.246\n)\n\n => Array\n(\n => 41.90.43.129\n)\n\n => Array\n(\n => 185.183.104.170\n)\n\n => Array\n(\n => 14.248.67.65\n)\n\n => Array\n(\n => 117.217.205.82\n)\n\n => Array\n(\n => 111.88.7.209\n)\n\n => Array\n(\n => 49.36.132.244\n)\n\n => Array\n(\n => 171.48.40.2\n)\n\n => Array\n(\n => 119.81.105.2\n)\n\n => Array\n(\n => 49.36.128.114\n)\n\n => Array\n(\n => 213.200.31.93\n)\n\n => Array\n(\n => 2.50.15.110\n)\n\n => Array\n(\n => 120.29.104.67\n)\n\n => Array\n(\n => 223.225.32.221\n)\n\n => Array\n(\n => 14.248.67.195\n)\n\n => Array\n(\n => 119.155.36.13\n)\n\n => Array\n(\n => 101.50.95.104\n)\n\n => Array\n(\n => 104.236.205.233\n)\n\n => Array\n(\n => 122.164.36.150\n)\n\n => Array\n(\n => 157.45.93.209\n)\n\n => Array\n(\n => 182.77.118.100\n)\n\n => Array\n(\n => 182.74.134.218\n)\n\n => Array\n(\n => 183.82.128.146\n)\n\n => Array\n(\n => 112.196.170.234\n)\n\n => Array\n(\n => 122.173.230.178\n)\n\n => Array\n(\n => 122.164.71.199\n)\n\n => Array\n(\n => 51.79.19.31\n)\n\n => Array\n(\n => 58.65.222.20\n)\n\n => Array\n(\n => 103.27.203.97\n)\n\n => Array\n(\n => 111.88.7.242\n)\n\n => Array\n(\n => 14.171.232.77\n)\n\n => Array\n(\n => 46.101.22.182\n)\n\n => Array\n(\n => 103.94.219.19\n)\n\n => Array\n(\n => 139.190.83.30\n)\n\n => Array\n(\n => 223.190.27.184\n)\n\n => Array\n(\n => 182.185.183.34\n)\n\n => Array\n(\n => 91.74.181.242\n)\n\n => Array\n(\n => 222.252.107.14\n)\n\n => Array\n(\n => 137.97.8.28\n)\n\n => Array\n(\n => 46.101.16.229\n)\n\n => Array\n(\n => 122.53.254.229\n)\n\n => Array\n(\n => 106.201.17.180\n)\n\n => Array\n(\n => 123.24.170.129\n)\n\n => Array\n(\n => 182.185.180.79\n)\n\n => Array\n(\n => 223.190.17.4\n)\n\n => Array\n(\n => 213.108.105.1\n)\n\n => Array\n(\n => 171.22.76.9\n)\n\n => Array\n(\n => 202.66.178.164\n)\n\n => Array\n(\n => 178.62.97.171\n)\n\n => Array\n(\n => 167.179.110.209\n)\n\n => Array\n(\n => 223.230.147.172\n)\n\n => Array\n(\n => 76.218.195.160\n)\n\n => Array\n(\n => 14.189.186.178\n)\n\n => Array\n(\n => 157.41.45.143\n)\n\n => Array\n(\n => 223.238.22.53\n)\n\n => Array\n(\n => 111.88.7.244\n)\n\n => Array\n(\n => 5.62.57.19\n)\n\n => Array\n(\n => 106.201.25.216\n)\n\n => Array\n(\n => 117.217.205.33\n)\n\n => Array\n(\n => 111.88.7.215\n)\n\n => Array\n(\n => 106.201.13.77\n)\n\n => Array\n(\n => 50.7.93.29\n)\n\n => Array\n(\n => 123.201.70.112\n)\n\n => Array\n(\n => 39.42.108.226\n)\n\n => Array\n(\n => 27.5.198.29\n)\n\n => Array\n(\n => 223.238.85.187\n)\n\n => Array\n(\n => 171.49.176.32\n)\n\n => Array\n(\n => 14.248.79.242\n)\n\n => Array\n(\n => 46.219.211.183\n)\n\n => Array\n(\n => 185.244.212.251\n)\n\n => Array\n(\n => 14.102.84.126\n)\n\n => Array\n(\n => 106.212.191.52\n)\n\n => Array\n(\n => 154.72.153.203\n)\n\n => Array\n(\n => 14.175.82.64\n)\n\n => Array\n(\n => 141.105.139.131\n)\n\n => Array\n(\n => 182.156.103.98\n)\n\n => Array\n(\n => 117.217.204.75\n)\n\n => Array\n(\n => 104.140.83.115\n)\n\n => Array\n(\n => 119.152.62.8\n)\n\n => Array\n(\n => 45.125.247.94\n)\n\n => Array\n(\n => 137.97.37.252\n)\n\n => Array\n(\n => 117.217.204.73\n)\n\n => Array\n(\n => 14.248.79.133\n)\n\n => Array\n(\n => 39.37.152.52\n)\n\n => Array\n(\n => 103.55.60.54\n)\n\n => Array\n(\n => 102.166.183.88\n)\n\n => Array\n(\n => 5.62.60.162\n)\n\n => Array\n(\n => 5.62.60.163\n)\n\n => Array\n(\n => 160.202.38.131\n)\n\n => Array\n(\n => 106.215.20.253\n)\n\n => Array\n(\n => 39.37.160.54\n)\n\n => Array\n(\n => 119.152.59.186\n)\n\n => Array\n(\n => 183.82.0.164\n)\n\n => Array\n(\n => 41.90.54.87\n)\n\n => Array\n(\n => 157.36.85.158\n)\n\n => Array\n(\n => 110.37.229.162\n)\n\n => Array\n(\n => 203.99.180.148\n)\n\n => Array\n(\n => 117.97.132.91\n)\n\n => Array\n(\n => 171.61.147.105\n)\n\n => Array\n(\n => 14.98.147.214\n)\n\n => Array\n(\n => 209.234.253.191\n)\n\n => Array\n(\n => 92.38.148.60\n)\n\n => Array\n(\n => 178.128.104.139\n)\n\n => Array\n(\n => 212.154.0.176\n)\n\n => Array\n(\n => 103.41.24.141\n)\n\n => Array\n(\n => 2.58.194.132\n)\n\n => Array\n(\n => 180.190.78.169\n)\n\n => Array\n(\n => 106.215.45.182\n)\n\n => Array\n(\n => 125.63.100.222\n)\n\n => Array\n(\n => 110.54.247.17\n)\n\n => Array\n(\n => 103.26.85.105\n)\n\n => Array\n(\n => 39.42.147.3\n)\n\n => Array\n(\n => 137.97.51.41\n)\n\n => Array\n(\n => 71.202.72.27\n)\n\n => Array\n(\n => 119.155.35.10\n)\n\n => Array\n(\n => 202.47.43.120\n)\n\n => Array\n(\n => 183.83.64.101\n)\n\n => Array\n(\n => 182.68.106.141\n)\n\n => Array\n(\n => 171.61.187.87\n)\n\n => Array\n(\n => 178.162.198.118\n)\n\n => Array\n(\n => 115.97.151.218\n)\n\n => Array\n(\n => 196.207.184.210\n)\n\n => Array\n(\n => 198.16.70.51\n)\n\n => Array\n(\n => 41.60.237.33\n)\n\n => Array\n(\n => 47.11.86.26\n)\n\n => Array\n(\n => 117.217.201.183\n)\n\n => Array\n(\n => 203.192.241.79\n)\n\n => Array\n(\n => 122.165.119.85\n)\n\n => Array\n(\n => 23.227.142.218\n)\n\n => Array\n(\n => 178.128.104.221\n)\n\n => Array\n(\n => 14.192.54.163\n)\n\n => Array\n(\n => 139.5.253.218\n)\n\n => Array\n(\n => 117.230.140.127\n)\n\n => Array\n(\n => 195.114.149.199\n)\n\n => Array\n(\n => 14.239.180.220\n)\n\n => Array\n(\n => 103.62.155.94\n)\n\n => Array\n(\n => 118.71.97.14\n)\n\n => Array\n(\n => 137.97.55.163\n)\n\n => Array\n(\n => 202.47.49.198\n)\n\n => Array\n(\n => 171.61.177.85\n)\n\n => Array\n(\n => 137.97.190.224\n)\n\n => Array\n(\n => 117.230.34.142\n)\n\n => Array\n(\n => 103.41.32.5\n)\n\n => Array\n(\n => 203.90.82.237\n)\n\n => Array\n(\n => 125.63.124.238\n)\n\n => Array\n(\n => 103.232.128.78\n)\n\n => Array\n(\n => 106.197.14.227\n)\n\n => Array\n(\n => 81.17.242.244\n)\n\n => Array\n(\n => 81.19.210.179\n)\n\n => Array\n(\n => 103.134.94.98\n)\n\n => Array\n(\n => 110.38.0.86\n)\n\n => Array\n(\n => 103.10.224.195\n)\n\n => Array\n(\n => 45.118.166.89\n)\n\n => Array\n(\n => 115.186.186.68\n)\n\n => Array\n(\n => 138.197.129.237\n)\n\n => Array\n(\n => 14.247.162.52\n)\n\n => Array\n(\n => 103.255.4.5\n)\n\n => Array\n(\n => 14.167.188.254\n)\n\n => Array\n(\n => 5.62.59.54\n)\n\n => Array\n(\n => 27.122.14.80\n)\n\n => Array\n(\n => 39.53.240.21\n)\n\n => Array\n(\n => 39.53.241.243\n)\n\n => Array\n(\n => 117.230.130.161\n)\n\n => Array\n(\n => 118.71.191.149\n)\n\n => Array\n(\n => 5.188.95.54\n)\n\n => Array\n(\n => 66.45.250.27\n)\n\n => Array\n(\n => 106.215.6.175\n)\n\n => Array\n(\n => 27.122.14.86\n)\n\n => Array\n(\n => 103.255.4.51\n)\n\n => Array\n(\n => 101.50.93.119\n)\n\n => Array\n(\n => 137.97.183.51\n)\n\n => Array\n(\n => 117.217.204.185\n)\n\n => Array\n(\n => 95.104.106.82\n)\n\n => Array\n(\n => 5.62.56.211\n)\n\n => Array\n(\n => 103.104.181.214\n)\n\n => Array\n(\n => 36.72.214.243\n)\n\n => Array\n(\n => 5.62.62.219\n)\n\n => Array\n(\n => 110.36.202.4\n)\n\n => Array\n(\n => 103.255.4.253\n)\n\n => Array\n(\n => 110.172.138.61\n)\n\n => Array\n(\n => 159.203.24.195\n)\n\n => Array\n(\n => 13.229.88.42\n)\n\n => Array\n(\n => 59.153.235.20\n)\n\n => Array\n(\n => 171.236.169.32\n)\n\n => Array\n(\n => 14.231.85.206\n)\n\n => Array\n(\n => 119.152.54.103\n)\n\n => Array\n(\n => 103.80.117.202\n)\n\n => Array\n(\n => 223.179.157.75\n)\n\n => Array\n(\n => 122.173.68.249\n)\n\n => Array\n(\n => 188.163.72.113\n)\n\n => Array\n(\n => 119.155.20.164\n)\n\n => Array\n(\n => 103.121.43.68\n)\n\n => Array\n(\n => 5.62.58.6\n)\n\n => Array\n(\n => 203.122.40.154\n)\n\n => Array\n(\n => 222.254.96.203\n)\n\n => Array\n(\n => 103.83.148.167\n)\n\n => Array\n(\n => 103.87.251.226\n)\n\n => Array\n(\n => 123.24.129.24\n)\n\n => Array\n(\n => 137.97.83.8\n)\n\n => Array\n(\n => 223.225.33.132\n)\n\n => Array\n(\n => 128.76.175.190\n)\n\n => Array\n(\n => 195.85.219.32\n)\n\n => Array\n(\n => 139.167.102.93\n)\n\n => Array\n(\n => 49.15.198.253\n)\n\n => Array\n(\n => 45.152.183.172\n)\n\n => Array\n(\n => 42.106.180.136\n)\n\n => Array\n(\n => 95.142.120.9\n)\n\n => Array\n(\n => 139.167.236.4\n)\n\n => Array\n(\n => 159.65.72.167\n)\n\n => Array\n(\n => 49.15.89.2\n)\n\n => Array\n(\n => 42.201.161.195\n)\n\n => Array\n(\n => 27.97.210.38\n)\n\n => Array\n(\n => 171.241.45.19\n)\n\n => Array\n(\n => 42.108.2.18\n)\n\n => Array\n(\n => 171.236.40.68\n)\n\n => Array\n(\n => 110.93.82.102\n)\n\n => Array\n(\n => 43.225.24.186\n)\n\n => Array\n(\n => 117.230.189.119\n)\n\n => Array\n(\n => 124.123.147.187\n)\n\n => Array\n(\n => 216.151.184.250\n)\n\n => Array\n(\n => 49.15.133.16\n)\n\n => Array\n(\n => 49.15.220.74\n)\n\n => Array\n(\n => 157.37.221.246\n)\n\n => Array\n(\n => 176.124.233.112\n)\n\n => Array\n(\n => 118.71.167.40\n)\n\n => Array\n(\n => 182.185.213.161\n)\n\n => Array\n(\n => 47.31.79.248\n)\n\n => Array\n(\n => 223.179.238.192\n)\n\n => Array\n(\n => 79.110.128.219\n)\n\n => Array\n(\n => 106.210.42.111\n)\n\n => Array\n(\n => 47.247.214.229\n)\n\n => Array\n(\n => 193.0.220.108\n)\n\n => Array\n(\n => 1.39.206.254\n)\n\n => Array\n(\n => 123.201.77.38\n)\n\n => Array\n(\n => 115.178.207.21\n)\n\n => Array\n(\n => 37.111.202.92\n)\n\n => Array\n(\n => 49.14.179.243\n)\n\n => Array\n(\n => 117.230.145.171\n)\n\n => Array\n(\n => 171.229.242.96\n)\n\n => Array\n(\n => 27.59.174.209\n)\n\n => Array\n(\n => 1.38.202.211\n)\n\n => Array\n(\n => 157.37.128.46\n)\n\n => Array\n(\n => 49.15.94.80\n)\n\n => Array\n(\n => 123.25.46.147\n)\n\n => Array\n(\n => 117.230.170.185\n)\n\n => Array\n(\n => 5.62.16.19\n)\n\n => Array\n(\n => 103.18.22.25\n)\n\n => Array\n(\n => 103.46.200.132\n)\n\n => Array\n(\n => 27.97.165.126\n)\n\n => Array\n(\n => 117.230.54.241\n)\n\n => Array\n(\n => 27.97.209.76\n)\n\n => Array\n(\n => 47.31.182.109\n)\n\n => Array\n(\n => 47.30.223.221\n)\n\n => Array\n(\n => 103.31.94.82\n)\n\n => Array\n(\n => 103.211.14.45\n)\n\n => Array\n(\n => 171.49.233.58\n)\n\n => Array\n(\n => 65.49.126.95\n)\n\n => Array\n(\n => 69.255.101.170\n)\n\n => Array\n(\n => 27.56.224.67\n)\n\n => Array\n(\n => 117.230.146.86\n)\n\n => Array\n(\n => 27.59.154.52\n)\n\n => Array\n(\n => 132.154.114.10\n)\n\n => Array\n(\n => 182.186.77.60\n)\n\n => Array\n(\n => 117.230.136.74\n)\n\n => Array\n(\n => 43.251.94.253\n)\n\n => Array\n(\n => 103.79.168.225\n)\n\n => Array\n(\n => 117.230.56.51\n)\n\n => Array\n(\n => 27.97.187.45\n)\n\n => Array\n(\n => 137.97.190.61\n)\n\n => Array\n(\n => 193.0.220.26\n)\n\n => Array\n(\n => 49.36.137.62\n)\n\n => Array\n(\n => 47.30.189.248\n)\n\n => Array\n(\n => 109.169.23.84\n)\n\n => Array\n(\n => 111.119.185.46\n)\n\n => Array\n(\n => 103.83.148.246\n)\n\n => Array\n(\n => 157.32.119.138\n)\n\n => Array\n(\n => 5.62.41.53\n)\n\n => Array\n(\n => 47.8.243.236\n)\n\n => Array\n(\n => 112.79.158.69\n)\n\n => Array\n(\n => 180.92.148.218\n)\n\n => Array\n(\n => 157.36.162.154\n)\n\n => Array\n(\n => 39.46.114.47\n)\n\n => Array\n(\n => 117.230.173.250\n)\n\n => Array\n(\n => 117.230.155.188\n)\n\n => Array\n(\n => 193.0.220.17\n)\n\n => Array\n(\n => 117.230.171.166\n)\n\n => Array\n(\n => 49.34.59.228\n)\n\n => Array\n(\n => 111.88.197.247\n)\n\n => Array\n(\n => 47.31.156.112\n)\n\n => Array\n(\n => 137.97.64.180\n)\n\n => Array\n(\n => 14.244.227.18\n)\n\n => Array\n(\n => 113.167.158.8\n)\n\n => Array\n(\n => 39.37.175.189\n)\n\n => Array\n(\n => 139.167.211.8\n)\n\n => Array\n(\n => 73.120.85.235\n)\n\n => Array\n(\n => 104.236.195.72\n)\n\n => Array\n(\n => 27.97.190.71\n)\n\n => Array\n(\n => 79.46.170.222\n)\n\n => Array\n(\n => 102.185.244.207\n)\n\n => Array\n(\n => 37.111.136.30\n)\n\n => Array\n(\n => 50.7.93.28\n)\n\n => Array\n(\n => 110.54.251.43\n)\n\n => Array\n(\n => 49.36.143.40\n)\n\n => Array\n(\n => 103.130.112.185\n)\n\n => Array\n(\n => 37.111.139.202\n)\n\n => Array\n(\n => 49.36.139.108\n)\n\n => Array\n(\n => 37.111.136.179\n)\n\n => Array\n(\n => 123.17.165.77\n)\n\n => Array\n(\n => 49.207.143.206\n)\n\n => Array\n(\n => 39.53.80.149\n)\n\n => Array\n(\n => 223.188.71.214\n)\n\n => Array\n(\n => 1.39.222.233\n)\n\n => Array\n(\n => 117.230.9.85\n)\n\n => Array\n(\n => 103.251.245.216\n)\n\n => Array\n(\n => 122.169.133.145\n)\n\n => Array\n(\n => 43.250.165.57\n)\n\n => Array\n(\n => 39.44.13.235\n)\n\n => Array\n(\n => 157.47.181.2\n)\n\n => Array\n(\n => 27.56.203.50\n)\n\n => Array\n(\n => 191.96.97.58\n)\n\n => Array\n(\n => 111.88.107.172\n)\n\n => Array\n(\n => 113.193.198.136\n)\n\n => Array\n(\n => 117.230.172.175\n)\n\n => Array\n(\n => 191.96.182.239\n)\n\n => Array\n(\n => 2.58.46.28\n)\n\n => Array\n(\n => 183.83.253.87\n)\n\n => Array\n(\n => 49.15.139.242\n)\n\n => Array\n(\n => 42.107.220.236\n)\n\n => Array\n(\n => 14.192.53.196\n)\n\n => Array\n(\n => 42.119.212.202\n)\n\n => Array\n(\n => 192.158.234.45\n)\n\n => Array\n(\n => 49.149.102.192\n)\n\n => Array\n(\n => 47.8.170.17\n)\n\n => Array\n(\n => 117.197.13.247\n)\n\n => Array\n(\n => 116.74.34.44\n)\n\n => Array\n(\n => 103.79.249.163\n)\n\n => Array\n(\n => 182.189.95.70\n)\n\n => Array\n(\n => 137.59.218.118\n)\n\n => Array\n(\n => 103.79.170.243\n)\n\n => Array\n(\n => 39.40.54.25\n)\n\n => Array\n(\n => 119.155.40.170\n)\n\n => Array\n(\n => 1.39.212.157\n)\n\n => Array\n(\n => 70.127.59.89\n)\n\n => Array\n(\n => 14.171.22.58\n)\n\n => Array\n(\n => 194.44.167.141\n)\n\n => Array\n(\n => 111.88.179.154\n)\n\n => Array\n(\n => 117.230.140.232\n)\n\n => Array\n(\n => 137.97.96.128\n)\n\n => Array\n(\n => 198.16.66.123\n)\n\n => Array\n(\n => 106.198.44.193\n)\n\n => Array\n(\n => 119.153.45.75\n)\n\n => Array\n(\n => 49.15.242.208\n)\n\n => Array\n(\n => 119.155.241.20\n)\n\n => Array\n(\n => 106.223.109.155\n)\n\n => Array\n(\n => 119.160.119.245\n)\n\n => Array\n(\n => 106.215.81.160\n)\n\n => Array\n(\n => 1.39.192.211\n)\n\n => Array\n(\n => 223.230.35.208\n)\n\n => Array\n(\n => 39.59.4.158\n)\n\n => Array\n(\n => 43.231.57.234\n)\n\n => Array\n(\n => 60.254.78.193\n)\n\n => Array\n(\n => 122.170.224.87\n)\n\n => Array\n(\n => 117.230.22.141\n)\n\n => Array\n(\n => 119.152.107.211\n)\n\n => Array\n(\n => 103.87.192.206\n)\n\n => Array\n(\n => 39.45.244.47\n)\n\n => Array\n(\n => 50.72.141.94\n)\n\n => Array\n(\n => 39.40.6.128\n)\n\n => Array\n(\n => 39.45.180.186\n)\n\n => Array\n(\n => 49.207.131.233\n)\n\n => Array\n(\n => 139.59.69.142\n)\n\n => Array\n(\n => 111.119.187.29\n)\n\n => Array\n(\n => 119.153.40.69\n)\n\n => Array\n(\n => 49.36.133.64\n)\n\n => Array\n(\n => 103.255.4.249\n)\n\n => Array\n(\n => 198.144.154.15\n)\n\n => Array\n(\n => 1.22.46.172\n)\n\n => Array\n(\n => 103.255.5.46\n)\n\n => Array\n(\n => 27.56.195.188\n)\n\n => Array\n(\n => 203.101.167.53\n)\n\n => Array\n(\n => 117.230.62.195\n)\n\n => Array\n(\n => 103.240.194.186\n)\n\n => Array\n(\n => 107.170.166.118\n)\n\n => Array\n(\n => 101.53.245.80\n)\n\n => Array\n(\n => 157.43.13.208\n)\n\n => Array\n(\n => 137.97.100.77\n)\n\n => Array\n(\n => 47.31.150.208\n)\n\n => Array\n(\n => 137.59.222.65\n)\n\n => Array\n(\n => 103.85.127.250\n)\n\n => Array\n(\n => 103.214.119.32\n)\n\n => Array\n(\n => 182.255.49.52\n)\n\n => Array\n(\n => 103.75.247.72\n)\n\n => Array\n(\n => 103.85.125.250\n)\n\n => Array\n(\n => 183.83.253.167\n)\n\n => Array\n(\n => 1.39.222.111\n)\n\n => Array\n(\n => 111.119.185.9\n)\n\n => Array\n(\n => 111.119.187.10\n)\n\n => Array\n(\n => 39.37.147.144\n)\n\n => Array\n(\n => 103.200.198.183\n)\n\n => Array\n(\n => 1.39.222.18\n)\n\n => Array\n(\n => 198.8.80.103\n)\n\n => Array\n(\n => 42.108.1.243\n)\n\n => Array\n(\n => 111.119.187.16\n)\n\n => Array\n(\n => 39.40.241.8\n)\n\n => Array\n(\n => 122.169.150.158\n)\n\n => Array\n(\n => 39.40.215.119\n)\n\n => Array\n(\n => 103.255.5.77\n)\n\n => Array\n(\n => 157.38.108.196\n)\n\n => Array\n(\n => 103.255.4.67\n)\n\n => Array\n(\n => 5.62.60.62\n)\n\n => Array\n(\n => 39.37.146.202\n)\n\n => Array\n(\n => 110.138.6.221\n)\n\n => Array\n(\n => 49.36.143.88\n)\n\n => Array\n(\n => 37.1.215.39\n)\n\n => Array\n(\n => 27.106.59.190\n)\n\n => Array\n(\n => 139.167.139.41\n)\n\n => Array\n(\n => 114.142.166.179\n)\n\n => Array\n(\n => 223.225.240.112\n)\n\n => Array\n(\n => 103.255.5.36\n)\n\n => Array\n(\n => 175.136.1.48\n)\n\n => Array\n(\n => 103.82.80.166\n)\n\n => Array\n(\n => 182.185.196.126\n)\n\n => Array\n(\n => 157.43.45.76\n)\n\n => Array\n(\n => 119.152.132.49\n)\n\n => Array\n(\n => 5.62.62.162\n)\n\n => Array\n(\n => 103.255.4.39\n)\n\n => Array\n(\n => 202.5.144.153\n)\n\n => Array\n(\n => 1.39.223.210\n)\n\n => Array\n(\n => 92.38.176.154\n)\n\n => Array\n(\n => 117.230.186.142\n)\n\n => Array\n(\n => 183.83.39.123\n)\n\n => Array\n(\n => 182.185.156.76\n)\n\n => Array\n(\n => 104.236.74.212\n)\n\n => Array\n(\n => 107.170.145.187\n)\n\n => Array\n(\n => 117.102.7.98\n)\n\n => Array\n(\n => 137.59.220.0\n)\n\n => Array\n(\n => 157.47.222.14\n)\n\n => Array\n(\n => 47.15.206.82\n)\n\n => Array\n(\n => 117.230.159.99\n)\n\n => Array\n(\n => 117.230.175.151\n)\n\n => Array\n(\n => 157.50.97.18\n)\n\n => Array\n(\n => 117.230.47.164\n)\n\n => Array\n(\n => 77.111.244.34\n)\n\n => Array\n(\n => 139.167.189.131\n)\n\n => Array\n(\n => 1.39.204.103\n)\n\n => Array\n(\n => 117.230.58.0\n)\n\n => Array\n(\n => 182.185.226.66\n)\n\n => Array\n(\n => 115.42.70.119\n)\n\n => Array\n(\n => 171.48.114.134\n)\n\n => Array\n(\n => 144.34.218.75\n)\n\n => Array\n(\n => 199.58.164.135\n)\n\n => Array\n(\n => 101.53.228.151\n)\n\n => Array\n(\n => 117.230.50.57\n)\n\n => Array\n(\n => 223.225.138.84\n)\n\n => Array\n(\n => 110.225.67.65\n)\n\n => Array\n(\n => 47.15.200.39\n)\n\n => Array\n(\n => 39.42.20.127\n)\n\n => Array\n(\n => 117.97.241.81\n)\n\n => Array\n(\n => 111.119.185.11\n)\n\n => Array\n(\n => 103.100.5.94\n)\n\n => Array\n(\n => 103.25.137.69\n)\n\n => Array\n(\n => 47.15.197.159\n)\n\n => Array\n(\n => 223.188.176.122\n)\n\n => Array\n(\n => 27.4.175.80\n)\n\n => Array\n(\n => 181.215.43.82\n)\n\n => Array\n(\n => 27.56.228.157\n)\n\n => Array\n(\n => 117.230.19.19\n)\n\n => Array\n(\n => 47.15.208.71\n)\n\n => Array\n(\n => 119.155.21.176\n)\n\n => Array\n(\n => 47.15.234.202\n)\n\n => Array\n(\n => 117.230.144.135\n)\n\n => Array\n(\n => 112.79.139.199\n)\n\n => Array\n(\n => 116.75.246.41\n)\n\n => Array\n(\n => 117.230.177.126\n)\n\n => Array\n(\n => 212.103.48.134\n)\n\n => Array\n(\n => 102.69.228.78\n)\n\n => Array\n(\n => 117.230.37.118\n)\n\n => Array\n(\n => 175.143.61.75\n)\n\n => Array\n(\n => 139.167.56.138\n)\n\n => Array\n(\n => 58.145.189.250\n)\n\n => Array\n(\n => 103.255.5.65\n)\n\n => Array\n(\n => 39.37.153.182\n)\n\n => Array\n(\n => 157.43.85.106\n)\n\n => Array\n(\n => 185.209.178.77\n)\n\n => Array\n(\n => 1.39.212.45\n)\n\n => Array\n(\n => 103.72.7.16\n)\n\n => Array\n(\n => 117.97.185.244\n)\n\n => Array\n(\n => 117.230.59.106\n)\n\n => Array\n(\n => 137.97.121.103\n)\n\n => Array\n(\n => 103.82.123.215\n)\n\n => Array\n(\n => 103.68.217.248\n)\n\n => Array\n(\n => 157.39.27.175\n)\n\n => Array\n(\n => 47.31.100.249\n)\n\n => Array\n(\n => 14.171.232.139\n)\n\n => Array\n(\n => 103.31.93.208\n)\n\n => Array\n(\n => 117.230.56.77\n)\n\n => Array\n(\n => 124.182.25.124\n)\n\n => Array\n(\n => 106.66.191.242\n)\n\n => Array\n(\n => 175.107.237.25\n)\n\n => Array\n(\n => 119.155.1.27\n)\n\n => Array\n(\n => 72.255.6.24\n)\n\n => Array\n(\n => 192.140.152.223\n)\n\n => Array\n(\n => 212.103.48.136\n)\n\n => Array\n(\n => 39.45.134.56\n)\n\n => Array\n(\n => 139.167.173.30\n)\n\n => Array\n(\n => 117.230.63.87\n)\n\n => Array\n(\n => 182.189.95.203\n)\n\n => Array\n(\n => 49.204.183.248\n)\n\n => Array\n(\n => 47.31.125.188\n)\n\n => Array\n(\n => 103.252.171.13\n)\n\n => Array\n(\n => 112.198.74.36\n)\n\n => Array\n(\n => 27.109.113.152\n)\n\n => Array\n(\n => 42.112.233.44\n)\n\n => Array\n(\n => 47.31.68.193\n)\n\n => Array\n(\n => 103.252.171.134\n)\n\n => Array\n(\n => 77.123.32.114\n)\n\n => Array\n(\n => 1.38.189.66\n)\n\n => Array\n(\n => 39.37.181.108\n)\n\n => Array\n(\n => 42.106.44.61\n)\n\n => Array\n(\n => 157.36.8.39\n)\n\n => Array\n(\n => 223.238.41.53\n)\n\n => Array\n(\n => 202.89.77.10\n)\n\n => Array\n(\n => 117.230.150.68\n)\n\n => Array\n(\n => 175.176.87.60\n)\n\n => Array\n(\n => 137.97.117.87\n)\n\n => Array\n(\n => 132.154.123.11\n)\n\n => Array\n(\n => 45.113.124.141\n)\n\n => Array\n(\n => 103.87.56.203\n)\n\n => Array\n(\n => 159.89.171.156\n)\n\n => Array\n(\n => 119.155.53.88\n)\n\n => Array\n(\n => 222.252.107.215\n)\n\n => Array\n(\n => 132.154.75.238\n)\n\n => Array\n(\n => 122.183.41.168\n)\n\n => Array\n(\n => 42.106.254.158\n)\n\n => Array\n(\n => 103.252.171.37\n)\n\n => Array\n(\n => 202.59.13.180\n)\n\n => Array\n(\n => 37.111.139.137\n)\n\n => Array\n(\n => 39.42.93.25\n)\n\n => Array\n(\n => 118.70.177.156\n)\n\n => Array\n(\n => 117.230.148.64\n)\n\n => Array\n(\n => 39.42.15.194\n)\n\n => Array\n(\n => 137.97.176.86\n)\n\n => Array\n(\n => 106.210.102.113\n)\n\n => Array\n(\n => 39.59.84.236\n)\n\n => Array\n(\n => 49.206.187.177\n)\n\n => Array\n(\n => 117.230.133.11\n)\n\n => Array\n(\n => 42.106.253.173\n)\n\n => Array\n(\n => 178.62.102.23\n)\n\n => Array\n(\n => 111.92.76.175\n)\n\n => Array\n(\n => 132.154.86.45\n)\n\n => Array\n(\n => 117.230.128.39\n)\n\n => Array\n(\n => 117.230.53.165\n)\n\n => Array\n(\n => 49.37.200.171\n)\n\n => Array\n(\n => 104.236.213.230\n)\n\n => Array\n(\n => 103.140.30.81\n)\n\n => Array\n(\n => 59.103.104.117\n)\n\n => Array\n(\n => 65.49.126.79\n)\n\n => Array\n(\n => 202.59.12.251\n)\n\n => Array\n(\n => 37.111.136.17\n)\n\n => Array\n(\n => 163.53.85.67\n)\n\n => Array\n(\n => 123.16.240.73\n)\n\n => Array\n(\n => 103.211.14.183\n)\n\n => Array\n(\n => 103.248.93.211\n)\n\n => Array\n(\n => 116.74.59.127\n)\n\n => Array\n(\n => 137.97.169.254\n)\n\n => Array\n(\n => 113.177.79.100\n)\n\n => Array\n(\n => 74.82.60.187\n)\n\n => Array\n(\n => 117.230.157.66\n)\n\n => Array\n(\n => 169.149.194.241\n)\n\n => Array\n(\n => 117.230.156.11\n)\n\n => Array\n(\n => 202.59.12.157\n)\n\n => Array\n(\n => 42.106.181.25\n)\n\n => Array\n(\n => 202.59.13.78\n)\n\n => Array\n(\n => 39.37.153.32\n)\n\n => Array\n(\n => 177.188.216.175\n)\n\n => Array\n(\n => 222.252.53.165\n)\n\n => Array\n(\n => 37.139.23.89\n)\n\n => Array\n(\n => 117.230.139.150\n)\n\n => Array\n(\n => 104.131.176.234\n)\n\n => Array\n(\n => 42.106.181.117\n)\n\n => Array\n(\n => 117.230.180.94\n)\n\n => Array\n(\n => 180.190.171.5\n)\n\n => Array\n(\n => 150.129.165.185\n)\n\n => Array\n(\n => 51.15.0.150\n)\n\n => Array\n(\n => 42.111.4.84\n)\n\n => Array\n(\n => 74.82.60.116\n)\n\n => Array\n(\n => 137.97.121.165\n)\n\n => Array\n(\n => 64.62.187.194\n)\n\n => Array\n(\n => 137.97.106.162\n)\n\n => Array\n(\n => 137.97.92.46\n)\n\n => Array\n(\n => 137.97.170.25\n)\n\n => Array\n(\n => 103.104.192.100\n)\n\n => Array\n(\n => 185.246.211.34\n)\n\n => Array\n(\n => 119.160.96.78\n)\n\n => Array\n(\n => 212.103.48.152\n)\n\n => Array\n(\n => 183.83.153.90\n)\n\n => Array\n(\n => 117.248.150.41\n)\n\n => Array\n(\n => 185.240.246.180\n)\n\n => Array\n(\n => 162.253.131.125\n)\n\n => Array\n(\n => 117.230.153.217\n)\n\n => Array\n(\n => 117.230.169.1\n)\n\n => Array\n(\n => 49.15.138.247\n)\n\n => Array\n(\n => 117.230.37.110\n)\n\n => Array\n(\n => 14.167.188.75\n)\n\n => Array\n(\n => 169.149.239.93\n)\n\n => Array\n(\n => 103.216.176.91\n)\n\n => Array\n(\n => 117.230.12.126\n)\n\n => Array\n(\n => 184.75.209.110\n)\n\n => Array\n(\n => 117.230.6.60\n)\n\n => Array\n(\n => 117.230.135.132\n)\n\n => Array\n(\n => 31.179.29.109\n)\n\n => Array\n(\n => 74.121.188.186\n)\n\n => Array\n(\n => 117.230.35.5\n)\n\n => Array\n(\n => 111.92.74.239\n)\n\n => Array\n(\n => 104.245.144.236\n)\n\n => Array\n(\n => 39.50.22.100\n)\n\n => Array\n(\n => 47.31.190.23\n)\n\n => Array\n(\n => 157.44.73.187\n)\n\n => Array\n(\n => 117.230.8.91\n)\n\n => Array\n(\n => 157.32.18.2\n)\n\n => Array\n(\n => 111.119.187.43\n)\n\n => Array\n(\n => 203.101.185.246\n)\n\n => Array\n(\n => 5.62.34.22\n)\n\n)\n```\nWhiling away the time indoors, where it�s cooler(??): Save More, Spend Less\n << Back to all Blogs Login or Create your own free blog Layout: Blue and Brown (Default) Author's Creation\nHome > Whiling away the time indoors, where it�s cooler(??)",
null,
"",
null,
"",
null,
"# Whiling away the time indoors, where it�s cooler(??)\n\nJuly 6th, 2013 at 07:36 pm\n\nIndoor temp is now 85.I am frustrated that no matter what I do, it always heats up inside, whether I�m closing windows and/or drapes or keeping windows open with drapes drawn. Doesn�t really make much difference either way. It is true that I have alwys had minimal windows treatments here as I have plenty of privacy. Some windows have valances only, some have wood shutters and some have vinyl binds (which I hate). Soon will have bamboo shades in the sun room. If I had money to spare, I�d invest in insulated drapes for both hot weather days like this and winter, but for now am making due with the single pair of long insulated drapes I bought years back for frrench doors. I have closed off most of the upstairs rooms to the cats (except my office, where I�m sitting now). Don�t want to close the door at top of stairs cus it will just keep all that heat on first floor.\n\nTo while away the time indoors, I spent at least an hour on a most unglamorous job: cleaning my kitchen cabinets and other surfaces. With white cabinets, you can see all the smudges around the knobs, and cleaning like this is not something I do often, but I think I made an improvement using those Mr. Clean�s bleach sponges and some old-fashioned vinegar. I also worked a while cleaning the banisters on the stairs, which tend to get mold spots on them in this weather.\nI made some iced tea this a.m. and am just sitting around as I often do in the heat with nothing but a pair of short shorts and a bra on. I�ve been running the ACs more than I usually do�wondering what the electric bill will look like.\n\nI spent a few hours tidying up the basement yesterday, again, it gave me a reason to stay down there. It could really use a vacuuming down there, but then I�d dislodge the cats. I have a gazillion cans of half-used paint down there and was able to locate 3 gallons of exterior paint I can recycle next month since I now have vinyl on the house.\n\nI did also manage to vacuum the upstairs, but aside from that, nothing too strenuous. Oh yeah, I did run the soaker hose for about 1.25 hours this morning in the veggie garden. I have lots of green cherry tomatoes and can�t wait to start enjoying them. I also suddenly noticed I have yellow wax beans ready for picking. Haven�t spent much time in the garden at all, and I really need to do some weeding there and tie up some gangly tomato vines. I did hang a 2nd cucumber beetle trap today.\n\nBeen listening to the radio and doing a few odds and ends online. Got paid \\$68 from my IT client, for editing his memos and emails. The hardest thing I�ll be doing is part 2 of lawn mowing at around 6 pm. Has to be done. I�ll reward myself with an ice cold Beck�s beer in a freezer-cold glass.\n\n### 1 Responses to “Whiling away the time indoors, where it�s cooler(??)”\n\n1. rob62521 Says:\n\nIt seems like once a house heats up, it stays that way, even with A/C. Hope you have gotten some relief.\n\n(Note: If you were logged in, we could automatically fill in these fields for you.)\n Name: * Email: Will not be published. Subscribe: Notify me of additional comments to this entry. URL: Verification: * Please spell out the number 4. [ Why? ]\n\nvB Code: You can use these tags: [b] [i] [u] [url] [email]"
] | [
null,
"https://www.savingadvice.com/blogs/images/search/top_left.php",
null,
"https://www.savingadvice.com/blogs/images/search/top_right.php",
null,
"https://www.savingadvice.com/blogs/images/search/bottom_left.php",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9683954,"math_prob":0.9986947,"size":3679,"snap":"2020-24-2020-29","text_gpt3_token_len":872,"char_repetition_ratio":0.10367347,"word_repetition_ratio":0.46153846,"special_character_ratio":0.22614841,"punctuation_ratio":0.09056604,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9993767,"pos_list":[0,1,2,3,4,5,6],"im_url_duplicate_count":[null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-05-30T08:01:51Z\",\"WARC-Record-ID\":\"<urn:uuid:8077508b-832e-417b-a67f-a80818c2d168>\",\"Content-Length\":\"128706\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:b9dfc481-75b9-4f0b-8aa3-3a68a195d71c>\",\"WARC-Concurrent-To\":\"<urn:uuid:4d8e1b78-d29c-4fe2-8088-77efa1553e7c>\",\"WARC-IP-Address\":\"173.231.200.26\",\"WARC-Target-URI\":\"https://patientsaver.savingadvice.com/2013/07/06/whiling-away-the-time-indoors-where-its-_103523/\",\"WARC-Payload-Digest\":\"sha1:6EDSPPLOZ3ZIODNOPODJXXFCMQJ7PZLG\",\"WARC-Block-Digest\":\"sha1:EYOJX7W3JH2OJC73LHRXID2HW4H3WW2W\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590347407667.28_warc_CC-MAIN-20200530071741-20200530101741-00054.warc.gz\"}"} |
https://www.brighthubengineering.com/hydraulics-civil-engineering/83825-excel-templates-for-venturi-and-orifice-flow-meter-calculations/ | [
"# Use Excel Formulas for Orifice, Venturi Meter and Ideal Gas Law Calculations\n\nPage content\n\n## Orifice and Venturi Meter Calculations with Excel Spreadsheet Formulas\n\nExcel spreadsheet formulas can be conveniently used to make calculation for differential pressure flow meters, like an orifice flow meter, a venturi meter, or a flow nozzle meter. The following sections in this article present three Excel templates for such calculations. The first Excel template is for calculating the flow rate, based on a measured pressure difference and information about the meter, the fluid, and the pipeline. In case the flowing fluid is a gas, the second Excel template allows calculation of the gas density from its molecular weight and values for the gas temperature and pressure, using the Ideal Gas Law. If the flow meter is an orifice meter with one of the ISO standard pressure tap configurations, then the third Excel template can be used to calculate a value for the orifice discharge coefficient.\n\n## Calculation of Flow Rate from Orifice, Venturi or Flow Nozzle Meter Data\n\nThe general equation for calculating the flow rate",
null,
"in a pipe from the measured pressure difference of an orifice, flow nozzle, or venturi meter is given at the left. Background information about these three types of flow meters and the parameters in the equation is available in the article, “Orifice, Venturi, and Flow Nozzle Meters for Measuring Pipe Flow Rate.”\n\nThe upper image at the right shows Excel spreadsheet formulas in an Excel template for calculating the pipe flow rate",
null,
"based on a measured flow nozzle, venturi, or Orifice flow meter pressure difference. This spreadsheet is suitable when a value for the fluid density is known (typically for a liquid) and a value is known for the meter coefficient, C. The lower image shows an example set of calculations using the Excel formulas in the upper image. (NOTE: You can click on the images to get a larger version that can be read better.)\n\n## Calculation of the Density of a Gas with Known Temperature and Pressure",
null,
"When the fluid whose flow is being measured by an orifice, flow nozzle, or venturi meter is a gas, the density is a",
null,
"function of both temperature and pressure, so a means of determining the density of the gas at the pipeline temperature and pressure is needed. The ideal gas law, in the form ρ = (MW)P/RT, can be used for this purpose. See the article, “Use the Ideal Gas Law to find the Density of Air at Different Pressures and Temperatures,” for more details.\n\nThe image at the left show the Excel spreadsheet formulas to calculate gas density for specified gas molecular weight, temperature, and gage pressure. Note the the value of the Ideal Gas Law constant, R, for the units used in this Excel template is 345.25 psia-ft3/slugmole-oR. The image at the right shows an example set of calculations using the Excel formulas for air (MW = 29), temperature = 80oF, and pressure = 10 psig.\n\n## Calculation of Orifice Meter Coefficient Using ISO 5167",
null,
"The meter coefficient for an orifice flow meter varies more widely with operating conditions than that of a flow nozzle or venturi meter. For an orifice meter with one of the three ISO standard pressure tap configurations (corner taps, flange taps, or D-D/2 taps) ISO 5167 provides an equation for the orifice coefficient, C, in",
null,
"terms of the pressure tap locations, L1 and L2; the diameter ratio, β; the pipe diameter, D1; and the pipe Reynolds number, Re. See the article, “Use ISO 5167 to Find the Orifice Discharge Coefficient for an Orifice Flow Meter,” for more details about ISO 5167, the standard pressure tap configurations, and the following equation for calculating the orifice coefficient in terms of the diameter ratio, β, the pipe Reynolds number, Re, the pipe diameter, D, and pressure tap location parameters, L1 and L2:\n\nC = 0.5959 + 0.0312 β2.1 - 0.1840 β8 + 0.0029 β2.5(106/Re)0.75 + 0.0900(L1/D)[β4/(1 - β4)] - 0.0337(L2/D)β3\n\nThe Excel formulas for calculation of the orifice coefficient are shown in the image at the left. The image at the right shows an example set of calculations using this Excel template. The calculations in the example and in the downloadable Excel templates are for “flange taps,” which have L1 = L2 = 1\". See the the article referenced above for more details on other pressure tap configurations.\n\nNote that this is an iterative calculation. The Reynolds number is needed to calculate the orifice coefficient, C, but the velocity in the pipe (needed for the Reynolds number) can’t be determined until C is known. The iterative approach that works well with this Excel template is to initially assume a value for the Reynolds number. A value of Re = 105 is typically a good starting point. With the assumed value for Re and values for the other input parameters shown, the orifice coefficient can be calculated and then Q and V can be calculated. The calculated value of pipe velocity, V, is then used to calculate the Reynolds number (Re = D1Vρ/μ). If the calculated value is different from the assumed value for Re, then use the calculated Re as the new assumed value and repeat the calculation. This procedure converges quite rapidly. Usually one or two iterations is all that is needed.\n\nReferences for Further Information:\n\n1. Bengtson, Harlan H., Flow Measurement in Pipes and Ducts, An online, continuing education engineering course for PDH credit.\n\n2. U.S. Dept. of the Interior, Bureau of Reclamation, 2001 revised, 1997 third edition, Water Measurement Manual.\n\n3. International Organization of Standards - ISO 5167-1:2003 Measurement of fluid flow by means of pressure differential devices, Part 1: Orifice plates, nozzles, and Venturi tubes inserted in circular cross-section conduits running full. Reference number: ISO 5167-1:2003.\n\n4. Munson, B. R., Young, D. F., & Okiishi, T. H., Fundamentals of Fluid Mechanics, 4th Ed., New York: John Wiley and Sons, Inc, 2002.\n\n## This post is part of the series: Measurement of Pipe Flow Rate\n\nMeasurement of pipe flow rate can use various flow meters, including a differential pressure flowmeter, like the orifice meter, venturi meter and flow nozzle meter. Other types of liquid flow meter are the rotameter, magnetic flow meter, ultrasonic meter, turbine flow meter and coriolis flow meter."
] | [
null,
"https://img.bhs4.com/e1/a/e1ab632926bf76086db26432087d3d64c8d5cd17_large.jpg",
null,
"https://img.bhs4.com/21/1/2116326ff1c6a2b52af59afa0648aece47516a63_large.jpg",
null,
"https://img.bhs4.com/1e/7/1e7adf4087d35883a226822e2381e8e0834f1dcb_large.jpg",
null,
"https://img.bhs4.com/87/5/8753d0aa3c9c942c58a7a4268ed31f73cc4b5d98_large.jpg",
null,
"https://img.bhs4.com/3c/c/3ccec485dfcbcd7b7d90bdea31923ca45286e939_large.jpg",
null,
"https://img.bhs4.com/fd/c/fdc1fedbf155310946644705bd83ea473642d4a6_large.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.82035035,"math_prob":0.9900848,"size":6856,"snap":"2021-43-2021-49","text_gpt3_token_len":1552,"char_repetition_ratio":0.1650613,"word_repetition_ratio":0.08091469,"special_character_ratio":0.22170362,"punctuation_ratio":0.13561848,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9956149,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12],"im_url_duplicate_count":[null,3,null,3,null,3,null,4,null,3,null,5,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-16T21:46:00Z\",\"WARC-Record-ID\":\"<urn:uuid:88d16ec8-25b3-4ab0-8e4f-2029bb3bade7>\",\"Content-Length\":\"49091\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2ac00380-a96c-4331-a921-bec734cdfa5a>\",\"WARC-Concurrent-To\":\"<urn:uuid:56cc0297-9c05-40ea-9a19-c7468cd83a75>\",\"WARC-IP-Address\":\"104.21.10.205\",\"WARC-Target-URI\":\"https://www.brighthubengineering.com/hydraulics-civil-engineering/83825-excel-templates-for-venturi-and-orifice-flow-meter-calculations/\",\"WARC-Payload-Digest\":\"sha1:DL4HIBQ7J7V2XNUCTPMIRGN4NOBZ33PW\",\"WARC-Block-Digest\":\"sha1:IP6EOGCHMGMQCDCA6OOPIWI66ZLPGOQE\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585025.23_warc_CC-MAIN-20211016200444-20211016230444-00673.warc.gz\"}"} |
https://www.sciencefacts.net/normal-force.html | [
"Home / Physics / Normal Force\n\n# Normal Force\n\n## What is the Normal Force\n\nSuppose an object is lying on a surface. It applies a force due to its weight. According to Newton’s third law of motion, the surface responds by applying an equal and opposite force on the object. The component of this force that is perpendicular to the surface is called the normal force. Since the object remains in contact with the surface, the normal force is a contact force.\n\nThe normal force balances the weight of the object. However, if other forces act on the body to displace it, friction comes into play. According to the laws of friction, the frictional force is proportional to the normal force.\n\n## Examples of Normal Force\n\nThere are many examples of normal force, most of which take place in daily life. These include the force applied by:\n\n• A table on a book lying on top of it\n• A wedge on a block lying on its inclined surface\n• Earth upon us\n• Human hand while holding an object\n• A nail on a hammer during hammering\n\n## Characteristics of Normal Force\n\nHere are some facts and properties of the normal force.\n\n• Contact force\n• Reaction force\n• Perpendicular to the surface\n• Opposite to the component of the object’s weight that is perpendicular to the surface\n\n## How to Calculate Normal Force\n\nThe normal force can be calculated using physics principles and balancing the forces using Newton’s laws of motion.\n\n### Normal Force Equations\n\n#### 1. On a Horizontal Surface\n\nSuppose a block of mass m is lying on a horizontal surface. Its weight W is mg, and no other forces are applied to it. The table will apply a force FN on the object. According to Newton’s third law of motion, the normal force is equal to the object’s weight. Therefore, the magnitude of FN is given by,\n\nFN = mg\n\nSymbol of normal force: F\n\nUnit of normal force: Newton or N\n\nDimensions of normal force: MLT-2\n\nThe work done by a force is defined as the force times the displacement.\n\nW = F x d\n\nSince the normal force does not displace the object, so the work done is zero.\n\nW = FN x 0 = 0\n\n#### 2. On an Incline or Ramp\n\nSuppose a block lies on an inclined plane that makes an angle θ with the horizontal. Its weight mg can be resolved into two components – one parallel to the surface and the other perpendicular to the surface.\n\nThe perpendicular component is given by mg cos θ. According to Newton’s third law, this force is equal to the normal force.\n\nFN = mg cos θ\n\n#### 3. In an Elevator\n\nSuppose a person of mass m is inside an elevator which is moving upward with an acceleration a. As the person is in contact with the elevator, he experiences an applied force given by,\n\nFA = ma\n\nAside, the elevator also exerts a force equal to the person’s weight mg. Therefore, the total force exerted by the elevator on the person is the normal force, which is given by\n\nFN = mg + FA\n\nOr, FN = m(g + a)\n\nIn this situation, the normal force is greater than the weight of the person.\n\nSuppose the elevator is moving downwards with the same acceleration, then the force experienced by the person is,\n\nFN = m(g – a)\n\nIn this situation, the normal force is less than the weight of the person.\n\nNow, suppose the elevator cable snaps. Then, the elevator moves downwards with an acceleration g, and the force experienced by the person is,\n\nFN = m(g – g) = 0\n\nTherefore, the normal force is zero, meaning that the person is not in contact with the elevator floor. This phenomenon is known as a free fall, and the person feels weightless.",
null,
"What is the Terminal Velocity of a Human?"
] | [
null,
"https://www.sciencefacts.net/wp-content/uploads/2022/06/Terminal-Velocity-Human-150x150.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.93030953,"math_prob":0.9895539,"size":3482,"snap":"2022-27-2022-33","text_gpt3_token_len":792,"char_repetition_ratio":0.17366302,"word_repetition_ratio":0.061728396,"special_character_ratio":0.22113727,"punctuation_ratio":0.09388336,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9984074,"pos_list":[0,1,2],"im_url_duplicate_count":[null,10,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-26T23:00:53Z\",\"WARC-Record-ID\":\"<urn:uuid:fb7260bd-741c-4f8b-9f3c-03976d627fdd>\",\"Content-Length\":\"61342\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:148f95a4-1e00-4bfe-8ee2-76c0da79511a>\",\"WARC-Concurrent-To\":\"<urn:uuid:bbd70912-1263-4897-aa45-76951e8dd57d>\",\"WARC-IP-Address\":\"170.249.236.173\",\"WARC-Target-URI\":\"https://www.sciencefacts.net/normal-force.html\",\"WARC-Payload-Digest\":\"sha1:JFQ3C3AMK3EXC2TRNWOCMNF46TIEEKD2\",\"WARC-Block-Digest\":\"sha1:T65OXWE3FS4NZRYF3Y3IGZVH4R245SG2\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103322581.16_warc_CC-MAIN-20220626222503-20220627012503-00510.warc.gz\"}"} |
http://vbnet.mvps.org/code/helpers/randomunique.htm | [
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"",
null,
"Visual Basic Helper Routines Pure VB: Preventing Duplicates in a Random Number Array Posted: Monday October 18, 1999 Updated: Monday December 26, 2011 Applies to: VB4-32, VB5, VB6 Developed with: VB6, Windows NT4 OS restrictions: None Author: Rick Rothstein, Ken Ensign Related: Pure VB: Generating a Random Array of Unique Numbers\n Prerequisites None.",
null,
"Although my preference for creating a randomized array of numbers is the method listed under Related above, there may be occasions where you want to use brute force to create a specific random array on the fly. The code shown here takes two values -- one representing the number of unique values you require, and the second representing the size of the pool to draw from, e.g. generate 12 unique numbers from 1 to 50 (as shown here). The code is copiously commented, resulting in the output shown in the illustration. You'll notice that when the third number was generated it matched an already-generated value in position 1. The code then generated a new value (38 in this case) and assigned that as the #3 item. Similarly, the code detected dupes for items 9 and 11, and regenerated new values for those. BAS Module Code None. Form Code",
null,
"Toss a command button (Command1) and a list box (List1) onto a form, along with the following code: `Option Explicit` ```'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' ' Copyright ©1996-2011 VBnet/Randy Birch, All Rights Reserved. ' Some pages may also contain other copyrights by the author. '''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' ' Distribution: You can freely use this code in your own ' applications, but you may not reproduce ' or publish this code on any web site, ' online service, or distribute as source ' on any media without express permission. ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''``` ```Private Sub Form_Load() Randomize Command1.Caption = \"Random Numbers w/ No Dupes\" End Sub Private Sub Command1_Click() Dim nCount As Long Dim tmp As Long Dim cnt As Long Dim gotIt As Boolean Dim numDistinctValues As Long Dim numUpperValueMax As Long 'the number of unique numbers you want '(in a quiz, this might be the number 'of questions you intend to ask) numDistinctValues = 12 'the size of the pool to draw the 'unique numbers from (in a quiz, 'number of questions available) numUpperValueMax = 50 ReDim nArray(1 To numDistinctValues) List1.Clear 'seed the random number generator to 'assure a unique set of numbers each 'time the routine is run. The current 'system time is fine for this purpose. Randomize CSng(TimeValue(Time)) 'begin count to get numbers For nCount = 1 To numDistinctValues 'reset flag gotIt = False Do Until gotIt = True 'generate a number between 1 and 'numDistinctValues tmp = Int(Rnd(1) * numUpperValueMax) + 1 'if its the first number just add it 'and set the gotIt flag If nCount = 1 Then nArray(nCount) = tmp gotIt = True Else 'begin a loop that only ends 'once a new valid number is 'generated Do 'is it already in the list? For cnt = 1 To nCount 'compare the current value '(tmp) to know values If tmp = nArray(cnt) Then 'it must be there, so 'generate another number 'to try and exit the loop '---------------------------- 'DEBUG: 'show the duplicate number List1.AddItem \" \" & nCount & vbTab & tmp & \" < this is a dupe of #\" & cnt '---------------------------- 'try to generate a different number tmp = Int(Rnd(1) * numUpperValueMax) + 1 '---------------------------- 'DEBUG: 'show the new number List1.AddItem \" \" & nCount & vbTab & \"new #\" & nCount & \" >\" & tmp '---------------------------- 'found a match, so redo whole loop 'again with new tmp value! gotIt = False Exit For Else gotIt = True 'no match End If Next Loop Until gotIt = True End If If gotIt = True Then 'add to the array nArray(nCount) = tmp '---------------------------- 'DEBUG: 'show the added number List1.AddItem nCount & vbTab & nArray(nCount) '---------------------------- End If Loop Next End Sub``` Comments\n\n Like what you see here? Help ensure continued VB Classic development by making a small PayPal donation today. Thank you. PayPal Link",
null,
"",
null,
""
] | [
null,
"http://vbnet.mvps.org/images/headers/4x4.gif",
null,
"http://vbnet.mvps.org/images/headers/4x4.gif",
null,
"http://vbnet.mvps.org/images/main/vbnlogobm.gif",
null,
"http://vbnet.mvps.org/images/headers/headend.gif",
null,
"http://vbnet.mvps.org/images/headers/headstart.gif",
null,
"http://vbnet.mvps.org/images/headers/headline.gif",
null,
"http://vbnet.mvps.org/images/headers/headline.gif",
null,
"http://vbnet.mvps.org/images/headers/1x1w.gif",
null,
"http://vbnet.mvps.org/images/headers/1x1w.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-code.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-blank70.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-blank70.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-blank70.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-blank70.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-search.gif",
null,
"http://vbnet.mvps.org/images/nav/cmnew.gif",
null,
"http://vbnet.mvps.org/images/nav/cmcctls.gif",
null,
"http://vbnet.mvps.org/images/nav/cmfile.gif",
null,
"http://vbnet.mvps.org/images/nav/cmlist.gif",
null,
"http://vbnet.mvps.org/images/nav/cmsort.gif",
null,
"http://vbnet.mvps.org/images/nav/sevbnet.gif",
null,
"http://vbnet.mvps.org/images/nav/cmalgor.gif",
null,
"http://vbnet.mvps.org/images/nav/cmcdlgs.gif",
null,
"http://vbnet.mvps.org/images/nav/cmhelp.gif",
null,
"http://vbnet.mvps.org/images/nav/cmlocale.gif",
null,
"http://vbnet.mvps.org/images/nav/cmsclass.gif",
null,
"http://vbnet.mvps.org/images/nav/setopic.gif",
null,
"http://vbnet.mvps.org/images/nav/cmavi.gif",
null,
"http://vbnet.mvps.org/images/nav/cmcore.gif",
null,
"http://vbnet.mvps.org/images/nav/cmhook.gif",
null,
"http://vbnet.mvps.org/images/nav/cmmenu.gif",
null,
"http://vbnet.mvps.org/images/nav/cmsystem.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-blank.gif",
null,
"http://vbnet.mvps.org/images/nav/cmbmp.gif",
null,
"http://vbnet.mvps.org/images/nav/cmdisk.gif",
null,
"http://vbnet.mvps.org/images/nav/cmicon.gif",
null,
"http://vbnet.mvps.org/images/nav/cmnet.gif",
null,
"http://vbnet.mvps.org/images/nav/cmtext.gif",
null,
"http://vbnet.mvps.org/images/nav/cmline65gd.gif",
null,
"http://vbnet.mvps.org/images/nav/cmbrowse.gif",
null,
"http://vbnet.mvps.org/images/nav/cmenum.gif",
null,
"http://vbnet.mvps.org/images/nav/cmimage.gif",
null,
"http://vbnet.mvps.org/images/nav/cmproject.gif",
null,
"http://vbnet.mvps.org/images/nav/cmwin32.gif",
null,
"http://vbnet.mvps.org/images/nav/semskb.gif",
null,
"http://vbnet.mvps.org/images/nav/cmcback.gif",
null,
"http://vbnet.mvps.org/images/nav/faqcode.gif",
null,
"http://vbnet.mvps.org/images/nav/cminternet.gif",
null,
"http://vbnet.mvps.org/images/nav/cmreg.gif",
null,
"http://vbnet.mvps.org/images/nav/cmwindows.gif",
null,
"http://vbnet.mvps.org/images/nav/cmline65gd.gif",
null,
"http://vbnet.mvps.org/images/nav/cmcombo.gif",
null,
"http://vbnet.mvps.org/images/nav/cmfiles.gif",
null,
"http://vbnet.mvps.org/images/nav/cmintr.gif",
null,
"http://vbnet.mvps.org/images/nav/cmscr.gif",
null,
"http://vbnet.mvps.org/images/nav/cmwmi.gif",
null,
"http://vbnet.mvps.org/images/nav/mtop-blank.gif",
null,
"http://vbnet.mvps.org/images/nav/lineg311.gif",
null,
"http://vbnet.mvps.org/images/nav/copyurl.gif",
null,
"http://vbnet.mvps.org/images/gfx/helper/randomunique.gif",
null,
"http://vbnet.mvps.org/images/nav/copyfrm.gif",
null,
"https://www.paypal.com/en_US/i/btn/x-click-butcc-donate.gif",
null,
"http://vbnet.mvps.org/_vti_bin/fpcount.exe/",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6797857,"math_prob":0.76517206,"size":4081,"snap":"2019-13-2019-22","text_gpt3_token_len":1062,"char_repetition_ratio":0.18371351,"word_repetition_ratio":0.030165913,"special_character_ratio":0.32884097,"punctuation_ratio":0.085383505,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9647179,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,3,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-03-21T22:19:21Z\",\"WARC-Record-ID\":\"<urn:uuid:6b8f392d-08f3-4745-aa58-95318fedea61>\",\"Content-Length\":\"36279\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f86d150-439e-4086-b83c-6b2ce80a6a25>\",\"WARC-Concurrent-To\":\"<urn:uuid:eb0cd9c1-8d80-4b7b-b9d8-77ec8f86c0c8>\",\"WARC-IP-Address\":\"216.155.126.40\",\"WARC-Target-URI\":\"http://vbnet.mvps.org/code/helpers/randomunique.htm\",\"WARC-Payload-Digest\":\"sha1:GXD2JQWTQXS7Z54NQ74M3LMF2CQXYXWX\",\"WARC-Block-Digest\":\"sha1:NT3H7RYM7AYU6CPVWLM42MSASLV2JIBL\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-13/CC-MAIN-2019-13_segments_1552912202572.7_warc_CC-MAIN-20190321213516-20190321235516-00260.warc.gz\"}"} |
https://www.physicsforums.com/threads/mathematica-if-statment-for-lists.467308/ | [
"# Mathematica: If statment for lists\n\n• Mathematica\n\n## Main Question or Discussion Point\n\nI want to create an If statment that states; if the elements in, list1>0 , true subtract list2, false keep value from list1 so that i\nend up with ans: {0,2,5,4}\nlist1 = {0, 2, 8, 9}\nlist2 = {1, 0, 3, 5}\nI dont know how to represent the elements in the lists so that my If statment works\n\nRelated MATLAB, Maple, Mathematica, LaTeX News on Phys.org\nExcellent example showing input and output. That makes it much easier to provide correct help.\n\nIn:=list1={0,2,8,9};list2={1,0,3,5};\nf[x_,y_]:=If[x>0,x-y,x];"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.726176,"math_prob":0.8673766,"size":489,"snap":"2020-24-2020-29","text_gpt3_token_len":178,"char_repetition_ratio":0.12577319,"word_repetition_ratio":0.5882353,"special_character_ratio":0.3824131,"punctuation_ratio":0.1875,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9888904,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-06-05T20:14:53Z\",\"WARC-Record-ID\":\"<urn:uuid:cd47b348-dffe-4ef2-9461-fe4b6b645532>\",\"Content-Length\":\"68353\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:bca8919e-a3c0-4624-8857-c48266c49089>\",\"WARC-Concurrent-To\":\"<urn:uuid:a21f7323-ca70-4666-9d3f-5cfdedc93211>\",\"WARC-IP-Address\":\"23.111.143.85\",\"WARC-Target-URI\":\"https://www.physicsforums.com/threads/mathematica-if-statment-for-lists.467308/\",\"WARC-Payload-Digest\":\"sha1:WIFMR2CBHBZUIOA3K5SG67FBG35AOYRB\",\"WARC-Block-Digest\":\"sha1:U22YZZR2B7ZUHQHQNLTOV4MB5TDBG7NC\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-24/CC-MAIN-2020-24_segments_1590348502204.93_warc_CC-MAIN-20200605174158-20200605204158-00456.warc.gz\"}"} |
https://wiki.seg.org/wiki/Incompressibility | [
"# Incompressibility\n\n## Definition\n\nIncompressibility (K) is an elastic property of a material which describes the measure of which the material resists change in volume (compression) when subjected to uniform pressure. it is also known as Bulk Modulus .\n\nIncompressibilty is an elastic constant mathematically defined as the ratio of the applied pressure(stress) to the volume strain caused by the pressure. This is illustrated below:\n\n$K={\\frac {P}{\\Delta V/V}}$",
null,
"where P denotes pressure or stress\nV denotes volume\nThe delta V (ΔV) denotes change in volume.\n\n\n## Application in Geophysics\n\nThe incompressibilty of Earth materials (Rocks and Fluids) greatly determine their acoustic velocities (VP and VS). The elastic constant can expressed in terms of acoustic velocities as shown below:\n\n$K=\\rho \\left(V_{\\mathrm {P} }^{2}-{\\frac {4}{3}}V_{\\mathrm {S} }^{2}\\right)$",
null,
""
] | [
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/ac42183967d20ebf4297203912890cf49d41a937",
null,
"https://en.wikipedia.org/api/rest_v1/media/math/render/svg/426672f19ee5ff8820ac5edf1737e9f252ed9fcf",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.81052077,"math_prob":0.9819533,"size":1668,"snap":"2022-27-2022-33","text_gpt3_token_len":441,"char_repetition_ratio":0.08834135,"word_repetition_ratio":0.0,"special_character_ratio":0.23621103,"punctuation_ratio":0.18620689,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99868685,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-08-16T12:43:32Z\",\"WARC-Record-ID\":\"<urn:uuid:a3e829bf-36e5-48ef-82df-da11cfb88635>\",\"Content-Length\":\"42312\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:01b4ff92-c83b-476c-b4d3-9ee8c99446a6>\",\"WARC-Concurrent-To\":\"<urn:uuid:d6c0aed7-b694-42d4-b6b5-e454b70c7eaf>\",\"WARC-IP-Address\":\"104.22.47.92\",\"WARC-Target-URI\":\"https://wiki.seg.org/wiki/Incompressibility\",\"WARC-Payload-Digest\":\"sha1:SMHV35FHCIOJIWZ5KLHFYZ3J662SEXEQ\",\"WARC-Block-Digest\":\"sha1:JXRCNSZR7WULX6TBEHYGFXRF3PH7QEIQ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-33/CC-MAIN-2022-33_segments_1659882572304.13_warc_CC-MAIN-20220816120802-20220816150802-00158.warc.gz\"}"} |
https://www.integers.co/questions-answers/what-are-the-factors-or-divisors-of-the-number-9227465.html | [
"# Q: What are the factors or divisors of the number 9,227,465?\n\n## How do I find the factors or divisors of the number 9,227,465?\n\nUnfortunately, there's not simple formula to identifying all of the factors of a number and it can be a tedious process when trying to identify the factors of larger numbers. To find the factors of the number 9,227,465, it is easiest to start from the outside in. Here's what we mean:\n\n### Outside in Factoring\n\nWe start by creating a table and writing 1 on the left side and then the number we're trying to find the factors for on the right side in a table.\n\n 1 9,227,465\n\nNext, we take the number 9,227,465 and divide it by 2.\n\nIn this case, 2 ÷ 9,227,465 = 4,613,732.5\n\nIf the quotient is a whole number, then 2 and 4,613,732.5 are factors. Write them in the table below. If the quotient is not a whole number, skip to the next test.\n\n 1 9,227,465\n\nNow, we try dividing 9,227,465 by 3.\n\n9,227,465 ÷ 3 = 3,075,821.6667\n\nIf the quotient is a whole number, then 3 and 3,075,821.6667 are factors. Write them in the table below. If the quotient is not a whole number, skip to the next test.\n\nHere is what our table should look like at this step:\n\n 1 9,227,465\n\nLet's try dividing by 4.\n\n9,227,465 ÷ 4 = 2,306,866.25\n\nIf the quotient is a whole number, then 4 and 2,306,866.25 are factors. Write them in the table below. If the quotient is not a whole number, skip to the next test.\n\nHere is what our table should look like at this step:\n\n 1 9,227,465\n\nWe keep dividing by the next largest number, in this case the number 5. If the quotient of 5 ÷ 9,227,465 is a whole number, then 5 and your quotient are factors of the number.\n\nKeep dividing by the next highest number until you cannot divide anymore.\n\nWhat you will end up with is this table:\n\n 1 5 13 65 141,961 709,805 1,845,493 9,227,465\n\nAll of the numbers in the table above can be evenly divided into the number 9,227,465.\n\nFinally, for your reference, here are all of the divisor combinations of the number 9,227,465:\n\n1 x 9227465\n5 x 1845493\n13 x 709805\n65 x 141961\n\n### More Examples\n\nHere are some more numbers to try:\n\nTry the factor calculator\n\n### Explore more about the number 9,227,465:\n\nGeneral Questions\nFactoring Questions\nCalculation Questions\nMiscellaneous Questions"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89280546,"math_prob":0.9927148,"size":1938,"snap":"2021-43-2021-49","text_gpt3_token_len":574,"char_repetition_ratio":0.18976215,"word_repetition_ratio":0.24930748,"special_character_ratio":0.36584106,"punctuation_ratio":0.18072289,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9931143,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-10-23T10:13:15Z\",\"WARC-Record-ID\":\"<urn:uuid:feed67f0-40d2-4bbc-94b9-c8010d36937a>\",\"Content-Length\":\"24425\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:77d296e4-4b96-45d8-8ddc-8a6d1410d585>\",\"WARC-Concurrent-To\":\"<urn:uuid:b78f0049-95d2-43ac-a7ff-dc852a78780c>\",\"WARC-IP-Address\":\"138.68.39.9\",\"WARC-Target-URI\":\"https://www.integers.co/questions-answers/what-are-the-factors-or-divisors-of-the-number-9227465.html\",\"WARC-Payload-Digest\":\"sha1:B6WCJPT7M352B5F4NQGC2OEL5NZJE23D\",\"WARC-Block-Digest\":\"sha1:RKVRO2TAGKYUQI2I4QVIUGWOKII7MUD7\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-43/CC-MAIN-2021-43_segments_1634323585671.36_warc_CC-MAIN-20211023095849-20211023125849-00416.warc.gz\"}"} |
https://math.stackexchange.com/questions/641508/curvature-of-plane-curve | [
"# Curvature of plane curve\n\nThis is a motivation for the definition of the curvature of a plane curve:\n\nSuppose then that $\\gamma$ is a unit-speed curve in $\\mathbb{R}^2$. As the parameter $t$ of $\\gamma$ changes to $t+\\Delta t$, the curve moves away from its tangent line at $\\gamma(t)$ by a distance $(\\gamma(t+\\Delta t)-\\gamma(t)) \\cdot \\vec{n}$, where $\\vec{n}$ is a unit vector perpendicular to the tangent vector $\\gamma'(t)$ of $\\gamma$ at the point $\\gamma(t)$. By Taylor's theorem, $\\gamma(t+\\Delta t)=\\gamma(t)+\\gamma'(t)\\Delta t+\\frac{1}{2}\\gamma''(t)(\\Delta t)^2+\\mathrm{remainder}$, where $(\\mathrm{remainder})/(\\Delta t)^2$ tends to zero as $\\Delta t$ tends to zero. Since $\\gamma' \\cdot \\vec{n}=0$, the deviation of $\\gamma$ from its tangent line at $\\gamma(t)$ is $\\frac{1}{2} \\gamma''(t) \\cdot \\vec{n}(\\Delta t)^2+\\mathrm{remainder}$...\n\n\"the curve moves away by a distance\" Why is $(\\gamma(t+\\Delta t)-\\gamma(t)) \\cdot \\vec{n}$ the distance? If $\\gamma(s)=(\\gamma_1(s),\\gamma_2(s))$ then the distance between $\\gamma(t+\\Delta t)$ and $\\gamma(t)$, as points in the real plane, is $\\sqrt{(\\gamma_1(t+\\Delta t)-\\gamma_1(t))^2+(\\gamma_2(t+\\Delta t)-\\gamma_2(t))^2}$, no? But this is off by a factor of $\\cos{\\theta}$ ($\\theta$ being the angle between $\\gamma(t+\\Delta t)-\\gamma(t)$ and $\\vec{n}$.\n\nI'm ok with the rest, but where and why did we divide through by $(\\Delta t)^2$? I'm sure it does tend to zero, but how is that relevant to reaching the conclusion that $(\\gamma(t+\\Delta t)-\\gamma(t)) \\cdot \\vec{n}=\\frac{1}{2} \\gamma''(t) \\cdot \\vec{n}(\\Delta t)^2+\\mathrm{remainder}$?\n\nThe length $\\sqrt{(\\gamma_1(t+\\Delta t)-\\gamma_1(t))^2+(\\gamma_2(t+\\Delta t)-\\gamma_2(t))^2}$ is the distance between the point $\\gamma(t + \\Delta t)$ and $\\gamma(t)$. This is not the distance they're talking about. The author is talking about the distance between $\\gamma(t + \\Delta t)$ and the tangent line to the curve at the point $\\gamma(t)$.\nDraw a plane curve like the one under consideration. Mark the points $\\gamma(t)$ and $\\gamma(t + \\Delta t)$. Now draw the tangent line to the curve at $\\gamma(t)$, and the unit normal vector $\\vec{n}$. This vector should be drawn with its initial point at $\\gamma(t)$. The vector $\\vec{n}$ has length one and is orthogonal to the tangent line. Now think about the distance between the point $\\gamma(t + \\Delta t)$ and the tangent line. You should be able to see that this distance is the length of the projection of the vector $\\gamma(t + \\Delta t) - \\gamma(t)$ in the direction $\\vec{n}$, which is what the author is calculating."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.73901373,"math_prob":1.0000039,"size":1566,"snap":"2019-43-2019-47","text_gpt3_token_len":494,"char_repetition_ratio":0.21254802,"word_repetition_ratio":0.020100502,"special_character_ratio":0.35376757,"punctuation_ratio":0.073015876,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000099,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-11-19T16:03:59Z\",\"WARC-Record-ID\":\"<urn:uuid:adb16c7d-9f57-47a2-8cda-e44fa0e40675>\",\"Content-Length\":\"131436\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:5ecc1892-73af-441c-9867-6903c72f008d>\",\"WARC-Concurrent-To\":\"<urn:uuid:9f670776-762b-46c7-84d4-76c3fb8eb9ce>\",\"WARC-IP-Address\":\"151.101.129.69\",\"WARC-Target-URI\":\"https://math.stackexchange.com/questions/641508/curvature-of-plane-curve\",\"WARC-Payload-Digest\":\"sha1:EICEICSRE2BEGNWGTDBJEZIMGU653DAO\",\"WARC-Block-Digest\":\"sha1:SIYC2GFZ72CURSIW44GRSI63RGXQ2T7X\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-47/CC-MAIN-2019-47_segments_1573496670156.86_warc_CC-MAIN-20191119144618-20191119172618-00178.warc.gz\"}"} |
https://www.daniweb.com/programming/software-development/threads/81647/complexity-of-sorting-techniques | [
"Hi,\nI' studying various sorting techniques...And one thing I'm not clear about the complexity of the techniques...\nFor e.g the complexity of bubble sort is\nAverage Case=>O(n*n)\nWorst Case=>O(n*n)\nBest Case=>O(n*n)\nObviously n is the no. of elements in the array...\nBut even in the worst case i.e the array having 5 elements in descending order would do only only 4+3+2+1 comparisons\nand not O(n*n) which I expect is 5*5=25 comparisons\nCan somebody please throw light on it??\n\nMay be it helps you to see a little math ( cause, math doesn't lie ;-) ):\n\nThe pseudo-code for this algorithm has this structure:\n\nFOR I = 0 TO N-1 /* It cuts when it compares against N */\nFOR J = 0 TO N-I-1 …\n\n## All 4 Replies\n\nMay be it helps you to see a little math ( cause, math doesn't lie ;-) ):\n\nThe pseudo-code for this algorithm has this structure:\n\nFOR I = 0 TO N-1 /* It cuts when it compares against N */\nFOR J = 0 TO N-I-1 /* It cuts when it compares against N-I */\nIF ( VEC[j] > VEC[j+1] )\nSWAP /*...bla bla...*/\n\nSo as you can see, in the worst case...\n\nFor I = 0 ---> J = 0 TO N-1 ----> 2*(N-1) + 1 comparisons. N-1 From the internal loop ( you can't forget about the condition that its checked every time you re-enter the loop ). But in each entry of the internal loop you have another comparison made by the IF, so we have 2*(N-1). The last comparison that we add is the cut of the loop, meaning the last comparison where J = N-1.\nIf you follow the same way of reasoning, you will get to this:\n\nWhen I = N-1 ( end of external loop ) ---> J = 0 TO N - ( N-1+1 ) = 0 So comparisons at this point are 2*0 + 1 = 1. So as you can see the final amount of comparisons is:\n\nN From the external loop ( counting \"cut comparison\" )and\n\n2*\\sum_i^{N-1} i = 2*\\frac{(N-1)*N}{2}\n\nfor the internal loop. Besides, you have N-1 \"Cut comparisons\". So...\n\nC(N) = N + 2*\\frac{N^2 - N}{2} + N = N^2 + N\n\nAnd Big O for this algorithm results in...\n\nO(N^2)\n\nGood Luck!\n\ncommented: Neatly explined. +1\n\nReply: hello friend abt your question , what you know the worst case of bubble sort is (n*n) but in loop we write a condition that the loop must not got till nth (n-i-1) where i is always incrementing. That is why every time n's value is decreasing (if you know how recursive algorithm works eg. in factorial value) so if n=5 then next time it will be 4 and so bcoz of increament of i so the solution will be (4+3+2+1) (\"In first loop itself it compares till n-1 which is 5-1=4\") =10.\nI think you might have got the idea.\nok take care bye\n\nFor e.g the complexity of bubble sort is\nAverage Case=>O(n*n)\nWorst Case=>O(n*n)\nBest Case=>O(n*n)\n\nApropos, the best case compexity of bubble sort with swapped flag improvement is O(n) - it stops after the 1st pass;)\n\nEither way very very old thread, don't drag anymore up SRaj\n\nChris\n\nBe a part of the DaniWeb community\n\nWe're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts learning and sharing knowledge."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.82394576,"math_prob":0.9155672,"size":1043,"snap":"2021-43-2021-49","text_gpt3_token_len":286,"char_repetition_ratio":0.089509144,"word_repetition_ratio":0.0,"special_character_ratio":0.26366252,"punctuation_ratio":0.122171946,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99096334,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-12-02T19:57:17Z\",\"WARC-Record-ID\":\"<urn:uuid:e7a5b6de-e90e-4303-bc6b-831156fc3f58>\",\"Content-Length\":\"70884\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:9b2e5c23-e2d9-410b-81fb-9591545bf5e3>\",\"WARC-Concurrent-To\":\"<urn:uuid:d91a89b2-aaaf-4e93-96ea-9f54024700c8>\",\"WARC-IP-Address\":\"172.66.41.5\",\"WARC-Target-URI\":\"https://www.daniweb.com/programming/software-development/threads/81647/complexity-of-sorting-techniques\",\"WARC-Payload-Digest\":\"sha1:6IMVZUHTI5RUSIF6W2EYLC4USDORYPN6\",\"WARC-Block-Digest\":\"sha1:T3WYWYJSNFIKHO7QTQVWGOWG2NBAE2MJ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964362287.26_warc_CC-MAIN-20211202175510-20211202205510-00293.warc.gz\"}"} |
https://www.devdarpan.com/2022/04/optimal-substructure-property-in.html | [
"### Optimal Substructure Property in Dynamic Programming\n\nAs we discussed in Set 1, following are the two main properties of a problem that suggest that the given problem can be solved using Dynamic programming:\n\n1) Overlapping Subproblems\n2) Optimal Substructure\n\nWe have already discussed Overlapping Subproblem property in the Set 1. Let us discuss Optimal Substructure property here.\n\n2) Optimal Substructure: A given problems has Optimal Substructure Property if optimal solution of the given problem can be obtained by using optimal solutions of its subproblems.\n\nFor example, the Shortest Path problem has following optimal substructure property:\nIf a node x lies in the shortest path from a source node u to destination node v then the shortest path from u to v is combination of shortest path from u to x and shortest path from x to v. The standard All Pair Shortest Path algorithm like Floyd–Warshall and Single Source Shortest path algorithm for negative weight edges like Bellman–Ford are typical examples of Dynamic Programming.\n\nOn the other hand, the Longest Path problem doesn’t have the Optimal Substructure property. Here by Longest Path we mean longest simple path (path without cycle) between two nodes. Consider the following unweighted graph given in the CLRS book. There are two longest paths from q to t: q→r→t and q→s→t. Unlike shortest paths, these longest paths do not have the optimal substructure property. For example, the longest path q→r→t is not a combination of longest path from q to r and longest path from r to t, because the longest path from q to r is q→s→t→r and the longest path from r to t is r→q→s→t.\n\n### Overlapping Subproblems Property in Dynamic Programming\n\nDynamic Programming is an algorithmic paradigm that solves a given complex problem by breaking it into subproblems and stores the results of subproblems to avoid computing the same results again. Following are the two main properties of a problem that suggests that the given problem can be solved using Dynamic programming. In this post, we will discuss the first property (Overlapping Subproblems) in detail. The second property of Dynamic programming is discussed in the next post i.e. Set 2 . 1) Overlapping Subproblems 2) Optimal Substructure 1) Overlapping Subproblems: Like Divide and Conquer, Dynamic Programming combines solutions to sub-problems. Dynamic Programming is mainly used when solutions of the same subproblems are needed again and again. In dynamic programming, computed solutions to subproblems are stored in a table so that these don’t have to be recomputed. So Dynamic Programming is not useful when there are no common (overlapping) subproblems because there is no po"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.90786076,"math_prob":0.8234497,"size":1580,"snap":"2022-40-2023-06","text_gpt3_token_len":351,"char_repetition_ratio":0.18020305,"word_repetition_ratio":0.03816794,"special_character_ratio":0.19683544,"punctuation_ratio":0.069536425,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99103194,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-25T14:57:59Z\",\"WARC-Record-ID\":\"<urn:uuid:e8097a0d-bc79-499b-88b5-29ce3c3f271e>\",\"Content-Length\":\"101481\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:f1387775-aaea-4f8e-b000-060c9d72bc40>\",\"WARC-Concurrent-To\":\"<urn:uuid:3955d52e-79c3-4e07-841b-429cdc0e0260>\",\"WARC-IP-Address\":\"142.250.65.83\",\"WARC-Target-URI\":\"https://www.devdarpan.com/2022/04/optimal-substructure-property-in.html\",\"WARC-Payload-Digest\":\"sha1:BA45XLCXXUIVMB42PGIQOS4J6Z5RYRHP\",\"WARC-Block-Digest\":\"sha1:D6ZRO7ITVTLQF5Z2YVU7IVELB53VXILY\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334579.46_warc_CC-MAIN-20220925132046-20220925162046-00235.warc.gz\"}"} |
https://docs.julialang.org/en/v1.0.0/stdlib/LinearAlgebra/ | [
"Linear Algebra\n\n# Linear Algebra\n\nIn addition to (and as part of) its support for multi-dimensional arrays, Julia provides native implementations of many common and useful linear algebra operations. Basic operations, such as tr, det, and inv are all supported:\n\njulia> A = [1 2 3; 4 1 6; 7 8 1]\n3×3 Array{Int64,2}:\n1 2 3\n4 1 6\n7 8 1\n\njulia> tr(A)\n3\n\njulia> det(A)\n104.0\n\njulia> inv(A)\n3×3 Array{Float64,2}:\n-0.451923 0.211538 0.0865385\n0.365385 -0.192308 0.0576923\n0.240385 0.0576923 -0.0673077\n\nAs well as other useful operations, such as finding eigenvalues or eigenvectors:\n\njulia> A = [-4. -17.; 2. 2.]\n2×2 Array{Float64,2}:\n-4.0 -17.0\n2.0 2.0\n\njulia> eigvals(A)\n2-element Array{Complex{Float64},1}:\n-1.0 + 5.0im\n-1.0 - 5.0im\n\njulia> eigvecs(A)\n2×2 Array{Complex{Float64},2}:\n0.945905+0.0im 0.945905-0.0im\n-0.166924-0.278207im -0.166924+0.278207im\n\nIn addition, Julia provides many factorizations which can be used to speed up problems such as linear solve or matrix exponentiation by pre-factorizing a matrix into a form more amenable (for performance or memory reasons) to the problem. See the documentation on factorize for more information. As an example:\n\njulia> A = [1.5 2 -4; 3 -1 -6; -10 2.3 4]\n3×3 Array{Float64,2}:\n1.5 2.0 -4.0\n3.0 -1.0 -6.0\n-10.0 2.3 4.0\n\njulia> factorize(A)\nLU{Float64,Array{Float64,2}}\nL factor:\n3×3 Array{Float64,2}:\n1.0 0.0 0.0\n-0.15 1.0 0.0\n-0.3 -0.132196 1.0\nU factor:\n3×3 Array{Float64,2}:\n-10.0 2.3 4.0\n0.0 2.345 -3.4\n0.0 0.0 -5.24947\n\nSince A is not Hermitian, symmetric, triangular, tridiagonal, or bidiagonal, an LU factorization may be the best we can do. Compare with:\n\njulia> B = [1.5 2 -4; 2 -1 -3; -4 -3 5]\n3×3 Array{Float64,2}:\n1.5 2.0 -4.0\n2.0 -1.0 -3.0\n-4.0 -3.0 5.0\n\njulia> factorize(B)\nBunchKaufman{Float64,Array{Float64,2}}\nD factor:\n3×3 Tridiagonal{Float64,Array{Float64,1}}:\n-1.64286 0.0 ⋅\n0.0 -2.8 0.0\n⋅ 0.0 5.0\nU factor:\n3×3 UnitUpperTriangular{Float64,Array{Float64,2}}:\n1.0 0.142857 -0.8\n⋅ 1.0 -0.6\n⋅ ⋅ 1.0\npermutation:\n3-element Array{Int64,1}:\n1\n2\n3\n\nHere, Julia was able to detect that B is in fact symmetric, and used a more appropriate factorization. Often it's possible to write more efficient code for a matrix that is known to have certain properties e.g. it is symmetric, or tridiagonal. Julia provides some special types so that you can \"tag\" matrices as having these properties. For instance:\n\njulia> B = [1.5 2 -4; 2 -1 -3; -4 -3 5]\n3×3 Array{Float64,2}:\n1.5 2.0 -4.0\n2.0 -1.0 -3.0\n-4.0 -3.0 5.0\n\njulia> sB = Symmetric(B)\n3×3 Symmetric{Float64,Array{Float64,2}}:\n1.5 2.0 -4.0\n2.0 -1.0 -3.0\n-4.0 -3.0 5.0\n\nsB has been tagged as a matrix that's (real) symmetric, so for later operations we might perform on it, such as eigenfactorization or computing matrix-vector products, efficiencies can be found by only referencing half of it. For example:\n\njulia> B = [1.5 2 -4; 2 -1 -3; -4 -3 5]\n3×3 Array{Float64,2}:\n1.5 2.0 -4.0\n2.0 -1.0 -3.0\n-4.0 -3.0 5.0\n\njulia> sB = Symmetric(B)\n3×3 Symmetric{Float64,Array{Float64,2}}:\n1.5 2.0 -4.0\n2.0 -1.0 -3.0\n-4.0 -3.0 5.0\n\njulia> x = [1; 2; 3]\n3-element Array{Int64,1}:\n1\n2\n3\n\njulia> sB\\x\n3-element Array{Float64,1}:\n-1.7391304347826084\n-1.1086956521739126\n-1.4565217391304346\n\nThe \\ operation here performs the linear solution. The left-division operator is pretty powerful and it's easy to write compact, readable code that is flexible enough to solve all sorts of systems of linear equations.\n\n## Special matrices\n\nMatrices with special symmetries and structures arise often in linear algebra and are frequently associated with various matrix factorizations. Julia features a rich collection of special matrix types, which allow for fast computation with specialized routines that are specially developed for particular matrix types.\n\nThe following tables summarize the types of special matrices that have been implemented in Julia, as well as whether hooks to various optimized methods for them in LAPACK are available.\n\nTypeDescription\nSymmetricSymmetric matrix\nHermitianHermitian matrix\nUpperTriangularUpper triangular matrix\nLowerTriangularLower triangular matrix\nTridiagonalTridiagonal matrix\nSymTridiagonalSymmetric tridiagonal matrix\nBidiagonalUpper/lower bidiagonal matrix\nDiagonalDiagonal matrix\nUniformScalingUniform scaling operator\n\n### Elementary operations\n\nMatrix type+-*\\Other functions with optimized methods\nSymmetricMVinv, sqrt, exp\nHermitianMVinv, sqrt, exp\nUpperTriangularMVMVinv, det\nLowerTriangularMVMVinv, det\nSymTridiagonalMMMSMVeigmax, eigmin\nTridiagonalMMMSMV\nBidiagonalMMMSMV\nDiagonalMMMVMVinv, det, logdet, /\nUniformScalingMMMVSMVS/\n\nLegend:\n\nKeyDescription\nM (matrix)An optimized method for matrix-matrix operations is available\nV (vector)An optimized method for matrix-vector operations is available\nS (scalar)An optimized method for matrix-scalar operations is available\n\n### Matrix factorizations\n\nMatrix typeLAPACKeigeneigvalseigvecssvdsvdvals\nSymmetricSYARI\nHermitianHEARI\nUpperTriangularTRAAA\nLowerTriangularTRAAA\nSymTridiagonalSTAARIAV\nTridiagonalGT\nBidiagonalBDAA\nDiagonalDIA\n\nLegend:\n\nKeyDescriptionExample\nA (all)An optimized method to find all the characteristic values and/or vectors is availablee.g. eigvals(M)\nR (range)An optimized method to find the ilth through the ihth characteristic values are availableeigvals(M, il, ih)\nI (interval)An optimized method to find the characteristic values in the interval [vl, vh] is availableeigvals(M, vl, vh)\nV (vectors)An optimized method to find the characteristic vectors corresponding to the characteristic values x=[x1, x2,...] is availableeigvecs(M, x)\n\n### The uniform scaling operator\n\nA UniformScaling operator represents a scalar times the identity operator, λ*I. The identity operator I is defined as a constant and is an instance of UniformScaling. The size of these operators are generic and match the other matrix in the binary operations +, -, * and \\. For A+I and A-I this means that A must be square. Multiplication with the identity operator I is a noop (except for checking that the scaling factor is one) and therefore almost without overhead.\n\nTo see the UniformScaling operator in action:\n\njulia> U = UniformScaling(2);\n\njulia> a = [1 2; 3 4]\n2×2 Array{Int64,2}:\n1 2\n3 4\n\njulia> a + U\n2×2 Array{Int64,2}:\n3 2\n3 6\n\njulia> a * U\n2×2 Array{Int64,2}:\n2 4\n6 8\n\njulia> [a U]\n2×4 Array{Int64,2}:\n1 2 2 0\n3 4 0 2\n\njulia> b = [1 2 3; 4 5 6]\n2×3 Array{Int64,2}:\n1 2 3\n4 5 6\n\njulia> b - U\nERROR: DimensionMismatch(\"matrix is not square: dimensions are (2, 3)\")\nStacktrace:\n[...]\n\n## Matrix factorizations\n\nMatrix factorizations (a.k.a. matrix decompositions) compute the factorization of a matrix into a product of matrices, and are one of the central concepts in linear algebra.\n\nThe following table summarizes the types of matrix factorizations that have been implemented in Julia. Details of their associated methods can be found in the Standard Functions section of the Linear Algebra documentation.\n\nTypeDescription\nCholeskyCholesky factorization\nCholeskyPivotedPivoted Cholesky factorization\nLULU factorization\nLUTridiagonalLU factorization for Tridiagonal matrices\nQRQR factorization\nQRCompactWYCompact WY form of the QR factorization\nQRPivotedPivoted QR factorization\nHessenbergHessenberg decomposition\nEigenSpectral decomposition\nSVDSingular value decomposition\nGeneralizedSVDGeneralized SVD\n\n## Standard Functions\n\nLinear algebra functions in Julia are largely implemented by calling functions from LAPACK. Sparse factorizations call functions from SuiteSparse.\n\n*(A::AbstractMatrix, B::AbstractMatrix)\n\nMatrix multiplication.\n\nExamples\n\njulia> [1 1; 0 1] * [1 0; 1 1]\n2×2 Array{Int64,2}:\n2 1\n1 1\nsource\n\\(A, B)\n\nMatrix division using a polyalgorithm. For input matrices A and B, the result X is such that A*X == B when A is square. The solver that is used depends upon the structure of A. If A is upper or lower triangular (or diagonal), no factorization of A is required and the system is solved with either forward or backward substitution. For non-triangular square matrices, an LU factorization is used.\n\nFor rectangular A the result is the minimum-norm least squares solution computed by a pivoted QR factorization of A and a rank estimate of A based on the R factor.\n\nWhen A is sparse, a similar polyalgorithm is used. For indefinite matrices, the LDLt factorization does not use pivoting during the numerical factorization and therefore the procedure can fail even for invertible matrices.\n\nExamples\n\njulia> A = [1 0; 1 -2]; B = [32; -4];\n\njulia> X = A \\ B\n2-element Array{Float64,1}:\n32.0\n18.0\n\njulia> A * X == B\ntrue\nsource\ndot(x, y)\nx ⋅ y\n\nFor any iterable containers x and y (including arrays of any dimension) of numbers (or any element type for which dot is defined), compute the dot product (or inner product or scalar product), i.e. the sum of dot(x[i],y[i]), as if they were vectors.\n\nx ⋅ y (where ⋅ can be typed by tab-completing \\cdot in the REPL) is a synonym for dot(x, y).\n\nExamples\n\njulia> dot(1:5, 2:6)\n70\n\njulia> x = fill(2., (5,5));\n\njulia> y = fill(3., (5,5));\n\njulia> dot(x, y)\n150.0\nsource\ndot(x, y)\nx ⋅ y\n\nCompute the dot product between two vectors. For complex vectors, the first vector is conjugated. When the vectors have equal lengths, calling dot is semantically equivalent to sum(dot(vx,vy) for (vx,vy) in zip(x, y)).\n\nExamples\n\njulia> dot([1; 1], [2; 3])\n5\n\njulia> dot([im; im], [1; 1])\n0 - 2im\nsource\ncross(x, y)\n×(x,y)\n\nCompute the cross product of two 3-vectors.\n\nExamples\n\njulia> a = [0;1;0]\n3-element Array{Int64,1}:\n0\n1\n0\n\njulia> b = [0;0;1]\n3-element Array{Int64,1}:\n0\n0\n1\n\njulia> cross(a,b)\n3-element Array{Int64,1}:\n1\n0\n0\nsource\nfactorize(A)\n\nCompute a convenient factorization of A, based upon the type of the input matrix. factorize checks A to see if it is symmetric/triangular/etc. if A is passed as a generic matrix. factorize checks every element of A to verify/rule out each property. It will short-circuit as soon as it can rule out symmetry/triangular structure. The return value can be reused for efficient solving of multiple systems. For example: A=factorize(A); x=A\\b; y=A\\C.\n\nProperties of Atype of factorization\nPositive-definiteCholesky (see cholesky)\nDense Symmetric/HermitianBunch-Kaufman (see bunchkaufman)\nSparse Symmetric/HermitianLDLt (see ldlt)\nTriangularTriangular\nDiagonalDiagonal\nBidiagonalBidiagonal\nTridiagonalLU (see lu)\nSymmetric real tridiagonalLDLt (see ldlt)\nGeneral squareLU (see lu)\nGeneral non-squareQR (see qr)\n\nIf factorize is called on a Hermitian positive-definite matrix, for instance, then factorize will return a Cholesky factorization.\n\nExamples\n\njulia> A = Array(Bidiagonal(fill(1.0, (5, 5)), :U))\n5×5 Array{Float64,2}:\n1.0 1.0 0.0 0.0 0.0\n0.0 1.0 1.0 0.0 0.0\n0.0 0.0 1.0 1.0 0.0\n0.0 0.0 0.0 1.0 1.0\n0.0 0.0 0.0 0.0 1.0\n\njulia> factorize(A) # factorize will check to see that A is already factorized\n5×5 Bidiagonal{Float64,Array{Float64,1}}:\n1.0 1.0 ⋅ ⋅ ⋅\n⋅ 1.0 1.0 ⋅ ⋅\n⋅ ⋅ 1.0 1.0 ⋅\n⋅ ⋅ ⋅ 1.0 1.0\n⋅ ⋅ ⋅ ⋅ 1.0\n\nThis returns a 5×5 Bidiagonal{Float64}, which can now be passed to other linear algebra functions (e.g. eigensolvers) which will use specialized methods for Bidiagonal types.\n\nsource\nDiagonal(A::AbstractMatrix)\n\nConstruct a matrix from the diagonal of A.\n\nExamples\n\njulia> A = [1 2 3; 4 5 6; 7 8 9]\n3×3 Array{Int64,2}:\n1 2 3\n4 5 6\n7 8 9\n\njulia> Diagonal(A)\n3×3 Diagonal{Int64,Array{Int64,1}}:\n1 ⋅ ⋅\n⋅ 5 ⋅\n⋅ ⋅ 9\nsource\nDiagonal(V::AbstractVector)\n\nConstruct a matrix with V as its diagonal.\n\nExamples\n\njulia> V = [1, 2]\n2-element Array{Int64,1}:\n1\n2\n\njulia> Diagonal(V)\n2×2 Diagonal{Int64,Array{Int64,1}}:\n1 ⋅\n⋅ 2\nsource\nBidiagonal(dv::V, ev::V, uplo::Symbol) where V <: AbstractVector\n\nConstructs an upper (uplo=:U) or lower (uplo=:L) bidiagonal matrix using the given diagonal (dv) and off-diagonal (ev) vectors. The result is of type Bidiagonal and provides efficient specialized linear solvers, but may be converted into a regular matrix with convert(Array, _) (or Array(_) for short). The length of ev must be one less than the length of dv.\n\nExamples\n\njulia> dv = [1, 2, 3, 4]\n4-element Array{Int64,1}:\n1\n2\n3\n4\n\njulia> ev = [7, 8, 9]\n3-element Array{Int64,1}:\n7\n8\n9\n\njulia> Bu = Bidiagonal(dv, ev, :U) # ev is on the first superdiagonal\n4×4 Bidiagonal{Int64,Array{Int64,1}}:\n1 7 ⋅ ⋅\n⋅ 2 8 ⋅\n⋅ ⋅ 3 9\n⋅ ⋅ ⋅ 4\n\njulia> Bl = Bidiagonal(dv, ev, :L) # ev is on the first subdiagonal\n4×4 Bidiagonal{Int64,Array{Int64,1}}:\n1 ⋅ ⋅ ⋅\n7 2 ⋅ ⋅\n⋅ 8 3 ⋅\n⋅ ⋅ 9 4\nsource\nBidiagonal(A, uplo::Symbol)\n\nConstruct a Bidiagonal matrix from the main diagonal of A and its first super- (if uplo=:U) or sub-diagonal (if uplo=:L).\n\nExamples\n\njulia> A = [1 1 1 1; 2 2 2 2; 3 3 3 3; 4 4 4 4]\n4×4 Array{Int64,2}:\n1 1 1 1\n2 2 2 2\n3 3 3 3\n4 4 4 4\n\njulia> Bidiagonal(A, :U) # contains the main diagonal and first superdiagonal of A\n4×4 Bidiagonal{Int64,Array{Int64,1}}:\n1 1 ⋅ ⋅\n⋅ 2 2 ⋅\n⋅ ⋅ 3 3\n⋅ ⋅ ⋅ 4\n\njulia> Bidiagonal(A, :L) # contains the main diagonal and first subdiagonal of A\n4×4 Bidiagonal{Int64,Array{Int64,1}}:\n1 ⋅ ⋅ ⋅\n2 2 ⋅ ⋅\n⋅ 3 3 ⋅\n⋅ ⋅ 4 4\nsource\nSymTridiagonal(dv::V, ev::V) where V <: AbstractVector\n\nConstruct a symmetric tridiagonal matrix from the diagonal (dv) and first sub/super-diagonal (ev), respectively. The result is of type SymTridiagonal and provides efficient specialized eigensolvers, but may be converted into a regular matrix with convert(Array, _) (or Array(_) for short).\n\nExamples\n\njulia> dv = [1, 2, 3, 4]\n4-element Array{Int64,1}:\n1\n2\n3\n4\n\njulia> ev = [7, 8, 9]\n3-element Array{Int64,1}:\n7\n8\n9\n\njulia> SymTridiagonal(dv, ev)\n4×4 SymTridiagonal{Int64,Array{Int64,1}}:\n1 7 ⋅ ⋅\n7 2 8 ⋅\n⋅ 8 3 9\n⋅ ⋅ 9 4\nsource\nSymTridiagonal(A::AbstractMatrix)\n\nConstruct a symmetric tridiagonal matrix from the diagonal and first sub/super-diagonal, of the symmetric matrix A.\n\nExamples\n\njulia> A = [1 2 3; 2 4 5; 3 5 6]\n3×3 Array{Int64,2}:\n1 2 3\n2 4 5\n3 5 6\n\njulia> SymTridiagonal(A)\n3×3 SymTridiagonal{Int64,Array{Int64,1}}:\n1 2 ⋅\n2 4 5\n⋅ 5 6\nsource\nTridiagonal(dl::V, d::V, du::V) where V <: AbstractVector\n\nConstruct a tridiagonal matrix from the first subdiagonal, diagonal, and first superdiagonal, respectively. The result is of type Tridiagonal and provides efficient specialized linear solvers, but may be converted into a regular matrix with convert(Array, _) (or Array(_) for short). The lengths of dl and du must be one less than the length of d.\n\nExamples\n\njulia> dl = [1, 2, 3];\n\njulia> du = [4, 5, 6];\n\njulia> d = [7, 8, 9, 0];\n\njulia> Tridiagonal(dl, d, du)\n4×4 Tridiagonal{Int64,Array{Int64,1}}:\n7 4 ⋅ ⋅\n1 8 5 ⋅\n⋅ 2 9 6\n⋅ ⋅ 3 0\nsource\nTridiagonal(A)\n\nConstruct a tridiagonal matrix from the first sub-diagonal, diagonal and first super-diagonal of the matrix A.\n\nExamples\n\njulia> A = [1 2 3 4; 1 2 3 4; 1 2 3 4; 1 2 3 4]\n4×4 Array{Int64,2}:\n1 2 3 4\n1 2 3 4\n1 2 3 4\n1 2 3 4\n\njulia> Tridiagonal(A)\n4×4 Tridiagonal{Int64,Array{Int64,1}}:\n1 2 ⋅ ⋅\n1 2 3 ⋅\n⋅ 2 3 4\n⋅ ⋅ 3 4\nsource\nSymmetric(A, uplo=:U)\n\nConstruct a Symmetric view of the upper (if uplo = :U) or lower (if uplo = :L) triangle of the matrix A.\n\nExamples\n\njulia> A = [1 0 2 0 3; 0 4 0 5 0; 6 0 7 0 8; 0 9 0 1 0; 2 0 3 0 4]\n5×5 Array{Int64,2}:\n1 0 2 0 3\n0 4 0 5 0\n6 0 7 0 8\n0 9 0 1 0\n2 0 3 0 4\n\njulia> Supper = Symmetric(A)\n5×5 Symmetric{Int64,Array{Int64,2}}:\n1 0 2 0 3\n0 4 0 5 0\n2 0 7 0 8\n0 5 0 1 0\n3 0 8 0 4\n\njulia> Slower = Symmetric(A, :L)\n5×5 Symmetric{Int64,Array{Int64,2}}:\n1 0 6 0 2\n0 4 0 9 0\n6 0 7 0 3\n0 9 0 1 0\n2 0 3 0 4\n\nNote that Supper will not be equal to Slower unless A is itself symmetric (e.g. if A == transpose(A)).\n\nsource\nHermitian(A, uplo=:U)\n\nConstruct a Hermitian view of the upper (if uplo = :U) or lower (if uplo = :L) triangle of the matrix A.\n\nExamples\n\njulia> A = [1 0 2+2im 0 3-3im; 0 4 0 5 0; 6-6im 0 7 0 8+8im; 0 9 0 1 0; 2+2im 0 3-3im 0 4];\n\njulia> Hupper = Hermitian(A)\n5×5 Hermitian{Complex{Int64},Array{Complex{Int64},2}}:\n1+0im 0+0im 2+2im 0+0im 3-3im\n0+0im 4+0im 0+0im 5+0im 0+0im\n2-2im 0+0im 7+0im 0+0im 8+8im\n0+0im 5+0im 0+0im 1+0im 0+0im\n3+3im 0+0im 8-8im 0+0im 4+0im\n\njulia> Hlower = Hermitian(A, :L)\n5×5 Hermitian{Complex{Int64},Array{Complex{Int64},2}}:\n1+0im 0+0im 6+6im 0+0im 2-2im\n0+0im 4+0im 0+0im 9+0im 0+0im\n6-6im 0+0im 7+0im 0+0im 3+3im\n0+0im 9+0im 0+0im 1+0im 0+0im\n2+2im 0+0im 3-3im 0+0im 4+0im\n\nNote that Hupper will not be equal to Hlower unless A is itself Hermitian (e.g. if A == adjoint(A)).\n\nAll non-real parts of the diagonal will be ignored.\n\nHermitian(fill(complex(1,1), 1, 1)) == fill(1, 1, 1)\nsource\nLowerTriangular(A::AbstractMatrix)\n\nConstruct a LowerTriangular view of the the matrix A.\n\nExamples\n\njulia> A = [1.0 2.0 3.0; 4.0 5.0 6.0; 7.0 8.0 9.0]\n3×3 Array{Float64,2}:\n1.0 2.0 3.0\n4.0 5.0 6.0\n7.0 8.0 9.0\n\njulia> LowerTriangular(A)\n3×3 LowerTriangular{Float64,Array{Float64,2}}:\n1.0 ⋅ ⋅\n4.0 5.0 ⋅\n7.0 8.0 9.0\nsource\nUpperTriangular(A::AbstractMatrix)\n\nConstruct an UpperTriangular view of the the matrix A.\n\nExamples\n\njulia> A = [1.0 2.0 3.0; 4.0 5.0 6.0; 7.0 8.0 9.0]\n3×3 Array{Float64,2}:\n1.0 2.0 3.0\n4.0 5.0 6.0\n7.0 8.0 9.0\n\njulia> UpperTriangular(A)\n3×3 UpperTriangular{Float64,Array{Float64,2}}:\n1.0 2.0 3.0\n⋅ 5.0 6.0\n⋅ ⋅ 9.0\nsource\nUniformScaling{T<:Number}\n\nGenerically sized uniform scaling operator defined as a scalar times the identity operator, λ*I. See also I.\n\nExamples\n\njulia> J = UniformScaling(2.)\nUniformScaling{Float64}\n2.0*I\n\njulia> A = [1. 2.; 3. 4.]\n2×2 Array{Float64,2}:\n1.0 2.0\n3.0 4.0\n\njulia> J*A\n2×2 Array{Float64,2}:\n2.0 4.0\n6.0 8.0\nsource\nlu(A, pivot=Val(true); check = true) -> F::LU\n\nCompute the LU factorization of A.\n\nWhen check = true, an error is thrown if the decomposition fails. When check = false, responsibility for checking the decomposition's validity (via issuccess) lies with the user.\n\nIn most cases, if A is a subtype S of AbstractMatrix{T} with an element type T supporting +, -, * and /, the return type is LU{T,S{T}}. If pivoting is chosen (default) the element type should also support abs and <.\n\nThe individual components of the factorization F can be accessed via getproperty:\n\nComponentDescription\nF.LL (lower triangular) part of LU\nF.UU (upper triangular) part of LU\nF.p(right) permutation Vector\nF.P(right) permutation Matrix\n\nIterating the factorization produces the components F.L, F.U, and F.p.\n\nThe relationship between F and A is\n\nF.L*F.U == A[F.p, :]\n\nF further supports the following functions:\n\nSupported functionLULU{T,Tridiagonal{T}}\n/\n\\\ninv\ndet\nlogdet\nlogabsdet\nsize\n\nExamples\n\njulia> A = [4 3; 6 3]\n2×2 Array{Int64,2}:\n4 3\n6 3\n\njulia> F = lu(A)\nLU{Float64,Array{Float64,2}}\nL factor:\n2×2 Array{Float64,2}:\n1.0 0.0\n1.5 1.0\nU factor:\n2×2 Array{Float64,2}:\n4.0 3.0\n0.0 -1.5\n\njulia> F.L * F.U == A[F.p, :]\ntrue\n\njulia> l, u, p = lu(A); # destructuring via iteration\n\njulia> l == F.L && u == F.U && p == F.p\ntrue\nsource\nlu!(A, pivot=Val(true); check = true) -> LU\n\nlu! is the same as lu, but saves space by overwriting the input A, instead of creating a copy. An InexactError exception is thrown if the factorization produces a number not representable by the element type of A, e.g. for integer types.\n\nExamples\n\njulia> A = [4. 3.; 6. 3.]\n2×2 Array{Float64,2}:\n4.0 3.0\n6.0 3.0\n\njulia> F = lu!(A)\nLU{Float64,Array{Float64,2}}\nL factor:\n2×2 Array{Float64,2}:\n1.0 0.0\n0.666667 1.0\nU factor:\n2×2 Array{Float64,2}:\n6.0 3.0\n0.0 1.0\n\njulia> iA = [4 3; 6 3]\n2×2 Array{Int64,2}:\n4 3\n6 3\n\njulia> lu!(iA)\nERROR: InexactError: Int64(Int64, 0.6666666666666666)\nStacktrace:\n[...]\nsource\ncholesky(A, Val(false); check = true) -> Cholesky\n\nCompute the Cholesky factorization of a dense symmetric positive definite matrix A and return a Cholesky factorization. The matrix A can either be a Symmetric or Hermitian StridedMatrix or a perfectly symmetric or Hermitian StridedMatrix. The triangular Cholesky factor can be obtained from the factorization F with: F.L and F.U. The following functions are available for Cholesky objects: size, \\, inv, det, logdet and isposdef.\n\nWhen check = true, an error is thrown if the decomposition fails. When check = false, responsibility for checking the decomposition's validity (via issuccess) lies with the user.\n\nExamples\n\njulia> A = [4. 12. -16.; 12. 37. -43.; -16. -43. 98.]\n3×3 Array{Float64,2}:\n4.0 12.0 -16.0\n12.0 37.0 -43.0\n-16.0 -43.0 98.0\n\njulia> C = cholesky(A)\nCholesky{Float64,Array{Float64,2}}\nU factor:\n3×3 UpperTriangular{Float64,Array{Float64,2}}:\n2.0 6.0 -8.0\n⋅ 1.0 5.0\n⋅ ⋅ 3.0\n\njulia> C.U\n3×3 UpperTriangular{Float64,Array{Float64,2}}:\n2.0 6.0 -8.0\n⋅ 1.0 5.0\n⋅ ⋅ 3.0\n\njulia> C.L\n3×3 LowerTriangular{Float64,Array{Float64,2}}:\n2.0 ⋅ ⋅\n6.0 1.0 ⋅\n-8.0 5.0 3.0\n\njulia> C.L * C.U == A\ntrue\nsource\ncholesky(A, Val(true); tol = 0.0, check = true) -> CholeskyPivoted\n\nCompute the pivoted Cholesky factorization of a dense symmetric positive semi-definite matrix A and return a CholeskyPivoted factorization. The matrix A can either be a Symmetric or Hermitian StridedMatrix or a perfectly symmetric or Hermitian StridedMatrix. The triangular Cholesky factor can be obtained from the factorization F with: F.L and F.U. The following functions are available for PivotedCholesky objects: size, \\, inv, det, and rank. The argument tol determines the tolerance for determining the rank. For negative values, the tolerance is the machine precision.\n\nWhen check = true, an error is thrown if the decomposition fails. When check = false, responsibility for checking the decomposition's validity (via issuccess) lies with the user.\n\nsource\ncholesky!(A, Val(false); check = true) -> Cholesky\n\nThe same as cholesky, but saves space by overwriting the input A, instead of creating a copy. An InexactError exception is thrown if the factorization produces a number not representable by the element type of A, e.g. for integer types.\n\nExamples\n\njulia> A = [1 2; 2 50]\n2×2 Array{Int64,2}:\n1 2\n2 50\n\njulia> cholesky!(A)\nERROR: InexactError: Int64(Int64, 6.782329983125268)\nStacktrace:\n[...]\nsource\ncholesky!(A, Val(true); tol = 0.0, check = true) -> CholeskyPivoted\n\nThe same as cholesky, but saves space by overwriting the input A, instead of creating a copy. An InexactError exception is thrown if the factorization produces a number not representable by the element type of A, e.g. for integer types.\n\nsource\nlowrankupdate(C::Cholesky, v::StridedVector) -> CC::Cholesky\n\nUpdate a Cholesky factorization C with the vector v. If A = C.U'C.U then CC = cholesky(C.U'C.U + v*v') but the computation of CC only uses O(n^2) operations.\n\nsource\nlowrankdowndate(C::Cholesky, v::StridedVector) -> CC::Cholesky\n\nDowndate a Cholesky factorization C with the vector v. If A = C.U'C.U then CC = cholesky(C.U'C.U - v*v') but the computation of CC only uses O(n^2) operations.\n\nsource\nlowrankupdate!(C::Cholesky, v::StridedVector) -> CC::Cholesky\n\nUpdate a Cholesky factorization C with the vector v. If A = C.U'C.U then CC = cholesky(C.U'C.U + v*v') but the computation of CC only uses O(n^2) operations. The input factorization C is updated in place such that on exit C == CC. The vector v is destroyed during the computation.\n\nsource\nlowrankdowndate!(C::Cholesky, v::StridedVector) -> CC::Cholesky\n\nDowndate a Cholesky factorization C with the vector v. If A = C.U'C.U then CC = cholesky(C.U'C.U - v*v') but the computation of CC only uses O(n^2) operations. The input factorization C is updated in place such that on exit C == CC. The vector v is destroyed during the computation.\n\nsource\nldlt(S::SymTridiagonal) -> LDLt\n\nCompute an LDLt factorization of the real symmetric tridiagonal matrix S such that S = L*Diagonal(d)*L' where L is a unit lower triangular matrix and d is a vector. The main use of an LDLt factorization F = ldlt(S) is to solve the linear system of equations Sx = b with F\\b.\n\nExamples\n\njulia> S = SymTridiagonal([3., 4., 5.], [1., 2.])\n3×3 SymTridiagonal{Float64,Array{Float64,1}}:\n3.0 1.0 ⋅\n1.0 4.0 2.0\n⋅ 2.0 5.0\n\njulia> ldltS = ldlt(S);\n\njulia> b = [6., 7., 8.];\n\njulia> ldltS \\ b\n3-element Array{Float64,1}:\n1.7906976744186047\n0.627906976744186\n1.3488372093023255\n\njulia> S \\ b\n3-element Array{Float64,1}:\n1.7906976744186047\n0.627906976744186\n1.3488372093023255\nsource\nldlt!(S::SymTridiagonal) -> LDLt\n\nSame as ldlt, but saves space by overwriting the input S, instead of creating a copy.\n\nExamples\n\njulia> S = SymTridiagonal([3., 4., 5.], [1., 2.])\n3×3 SymTridiagonal{Float64,Array{Float64,1}}:\n3.0 1.0 ⋅\n1.0 4.0 2.0\n⋅ 2.0 5.0\n\njulia> ldltS = ldlt!(S);\n\njulia> ldltS === S\nfalse\n\njulia> S\n3×3 SymTridiagonal{Float64,Array{Float64,1}}:\n3.0 0.333333 ⋅\n0.333333 3.66667 0.545455\n⋅ 0.545455 3.90909\nsource\nqr(A, pivot=Val(false)) -> F\n\nCompute the QR factorization of the matrix A: an orthogonal (or unitary if A is complex-valued) matrix Q, and an upper triangular matrix R such that\n\n$A = Q R$\n\nThe returned object F stores the factorization in a packed format:\n\nThe individual components of the decomposition F can be retrieved via property accessors:\n\n• F.Q: the orthogonal/unitary matrix Q\n• F.R: the upper triangular matrix R\n• F.p: the permutation vector of the pivot (QRPivoted only)\n• F.P: the permutation matrix of the pivot (QRPivoted only)\n\nIterating the decomposition produces the components Q, R, and if extant p.\n\nThe following functions are available for the QR objects: inv, size, and \\. When A is rectangular, \\ will return a least squares solution and if the solution is not unique, the one with smallest norm is returned.\n\nMultiplication with respect to either full/square or non-full/square Q is allowed, i.e. both F.Q*F.R and F.Q*A are supported. A Q matrix can be converted into a regular matrix with Matrix. This operation returns the \"thin\" Q factor, i.e., if A is m×n with m>=n, then Matrix(F.Q) yields an m×n matrix with orthonormal columns. To retrieve the \"full\" Q factor, an m×m orthogonal matrix, use F.Q*Matrix(I,m,m). If m<=n, then Matrix(F.Q) yields an m×m orthogonal matrix.\n\nExamples\n\njulia> A = [3.0 -6.0; 4.0 -8.0; 0.0 1.0]\n3×2 Array{Float64,2}:\n3.0 -6.0\n4.0 -8.0\n0.0 1.0\n\njulia> F = qr(A)\nLinearAlgebra.QRCompactWY{Float64,Array{Float64,2}}\nQ factor:\n3×3 LinearAlgebra.QRCompactWYQ{Float64,Array{Float64,2}}:\n-0.6 0.0 0.8\n-0.8 0.0 -0.6\n0.0 -1.0 0.0\nR factor:\n2×2 Array{Float64,2}:\n-5.0 10.0\n0.0 -1.0\n\njulia> F.Q * F.R == A\ntrue\nNote\n\nqr returns multiple types because LAPACK uses several representations that minimize the memory storage requirements of products of Householder elementary reflectors, so that the Q and R matrices can be stored compactly rather as two separate dense matrices.\n\nsource\nqr!(A, pivot=Val(false))\n\nqr! is the same as qr when A is a subtype of StridedMatrix, but saves space by overwriting the input A, instead of creating a copy. An InexactError exception is thrown if the factorization produces a number not representable by the element type of A, e.g. for integer types.\n\nExamples\n\njulia> a = [1. 2.; 3. 4.]\n2×2 Array{Float64,2}:\n1.0 2.0\n3.0 4.0\n\njulia> qr!(a)\nLinearAlgebra.QRCompactWY{Float64,Array{Float64,2}}\nQ factor:\n2×2 LinearAlgebra.QRCompactWYQ{Float64,Array{Float64,2}}:\n-0.316228 -0.948683\n-0.948683 0.316228\nR factor:\n2×2 Array{Float64,2}:\n-3.16228 -4.42719\n0.0 -0.632456\n\njulia> a = [1 2; 3 4]\n2×2 Array{Int64,2}:\n1 2\n3 4\n\njulia> qr!(a)\nERROR: InexactError: Int64(Int64, -3.1622776601683795)\nStacktrace:\n[...]\nsource\nQR <: Factorization\n\nA QR matrix factorization stored in a packed format, typically obtained from qr. If $A$ is an m×n matrix, then\n\n$A = Q R$\n\nwhere $Q$ is an orthogonal/unitary matrix and $R$ is upper triangular. The matrix $Q$ is stored as a sequence of Householder reflectors $v_i$ and coefficients $\\tau_i$ where:\n\n$Q = \\prod_{i=1}^{\\min(m,n)} (I - \\tau_i v_i v_i^T).$\n\nIterating the decomposition produces the components Q and R.\n\nThe object has two fields:\n\n• factors is an m×n matrix.\n\n• The upper triangular part contains the elements of $R$, that is R = triu(F.factors) for a QR object F.\n\n• The subdiagonal part contains the reflectors $v_i$ stored in a packed format where $v_i$ is the $i$th column of the matrix V = I + tril(F.factors, -1).\n\n• τ is a vector of length min(m,n) containing the coefficients $au_i$.\n\nsource\nQRCompactWY <: Factorization\n\nA QR matrix factorization stored in a compact blocked format, typically obtained from qr. If $A$ is an m×n matrix, then\n\n$A = Q R$\n\nwhere $Q$ is an orthogonal/unitary matrix and $R$ is upper triangular. It is similar to the QR format except that the orthogonal/unitary matrix $Q$ is stored in Compact WY format [Schreiber1989], as a lower trapezoidal matrix $V$ and an upper triangular matrix $T$ where\n\n$Q = \\prod_{i=1}^{\\min(m,n)} (I - \\tau_i v_i v_i^T) = I - V T V^T$\n\nsuch that $v_i$ is the $i$th column of $V$, and $au_i$ is the $i$th diagonal element of $T$.\n\nIterating the decomposition produces the components Q and R.\n\nThe object has two fields:\n\n• factors, as in the QR type, is an m×n matrix.\n\n• The upper triangular part contains the elements of $R$, that is R = triu(F.factors) for a QR object F.\n\n• The subdiagonal part contains the reflectors $v_i$ stored in a packed format such that V = I + tril(F.factors, -1).\n\n• T is a square matrix with min(m,n) columns, whose upper triangular part gives the matrix $T$ above (the subdiagonal elements are ignored).\n\nNote\n\nThis format should not to be confused with the older WY representation [Bischof1987].\n\n[Bischof1987]\n\nC Bischof and C Van Loan, \"The WY representation for products of Householder matrices\", SIAM J Sci Stat Comput 8 (1987), s2-s13. doi:10.1137/0908009\n\n[Schreiber1989]\n\nR Schreiber and C Van Loan, \"A storage-efficient WY representation for products of Householder transformations\", SIAM J Sci Stat Comput 10 (1989), 53-57. doi:10.1137/0910005\n\nsource\nQRPivoted <: Factorization\n\nA QR matrix factorization with column pivoting in a packed format, typically obtained from qr. If $A$ is an m×n matrix, then\n\n$A P = Q R$\n\nwhere $P$ is a permutation matrix, $Q$ is an orthogonal/unitary matrix and $R$ is upper triangular. The matrix $Q$ is stored as a sequence of Householder reflectors:\n\n$Q = \\prod_{i=1}^{\\min(m,n)} (I - \\tau_i v_i v_i^T).$\n\nIterating the decomposition produces the components Q, R, and p.\n\nThe object has three fields:\n\n• factors is an m×n matrix.\n\n• The upper triangular part contains the elements of $R$, that is R = triu(F.factors) for a QR object F.\n\n• The subdiagonal part contains the reflectors $v_i$ stored in a packed format where $v_i$ is the $i$th column of the matrix V = I + tril(F.factors, -1).\n\n• τ is a vector of length min(m,n) containing the coefficients $au_i$.\n\n• jpvt is an integer vector of length n corresponding to the permutation $P$.\n\nsource\nlq!(A) -> LQ\n\nCompute the LQ factorization of A, using the input matrix as a workspace. See also lq.\n\nsource\nlq(A) -> S::LQ\n\nCompute the LQ decomposition of A. The decomposition's lower triangular component can be obtained from the LQ object S via S.L, and the orthogonal/unitary component via S.Q, such that A ≈ S.L*S.Q.\n\nIterating the decomposition produces the components S.L and S.Q.\n\nThe LQ decomposition is the QR decomposition of transpose(A).\n\nExamples\n\njulia> A = [5. 7.; -2. -4.]\n2×2 Array{Float64,2}:\n5.0 7.0\n-2.0 -4.0\n\njulia> S = lq(A)\nLQ{Float64,Array{Float64,2}} with factors L and Q:\n[-8.60233 0.0; 4.41741 -0.697486]\n[-0.581238 -0.813733; -0.813733 0.581238]\n\njulia> S.L * S.Q\n2×2 Array{Float64,2}:\n5.0 7.0\n-2.0 -4.0\n\njulia> l, q = S; # destructuring via iteration\n\njulia> l == S.L && q == S.Q\ntrue\nsource\nbunchkaufman(A, rook::Bool=false; check = true) -> S::BunchKaufman\n\nCompute the Bunch-Kaufman [Bunch1977] factorization of a Symmetric or Hermitian matrix A as $P'*U*D*U'*P$ or $P'*L*D*L'*P$, depending on which triangle is stored in A, and return a BunchKaufman object. Note that if A is complex symmetric then U' and L' denote the unconjugated transposes, i.e. transpose(U) and transpose(L).\n\nIterating the decomposition produces the components S.D, S.U or S.L as appropriate given S.uplo, and S.p.\n\nIf rook is true, rook pivoting is used. If rook is false, rook pivoting is not used.\n\nWhen check = true, an error is thrown if the decomposition fails. When check = false, responsibility for checking the decomposition's validity (via issuccess) lies with the user.\n\nThe following functions are available for BunchKaufman objects: size, \\, inv, issymmetric, ishermitian, getindex.\n\n[Bunch1977]\n\nJ R Bunch and L Kaufman, Some stable methods for calculating inertia\n\nand solving symmetric linear systems, Mathematics of Computation 31:137 (1977), 163-179. url.\n\nExamples\n\njulia> A = [1 2; 2 3]\n2×2 Array{Int64,2}:\n1 2\n2 3\n\njulia> S = bunchkaufman(A)\nBunchKaufman{Float64,Array{Float64,2}}\nD factor:\n2×2 Tridiagonal{Float64,Array{Float64,1}}:\n-0.333333 0.0\n0.0 3.0\nU factor:\n2×2 UnitUpperTriangular{Float64,Array{Float64,2}}:\n1.0 0.666667\n⋅ 1.0\npermutation:\n2-element Array{Int64,1}:\n1\n2\n\njulia> d, u, p = S; # destructuring via iteration\n\njulia> d == S.D && u == S.U && p == S.p\ntrue\nsource\nbunchkaufman!(A, rook::Bool=false; check = true) -> BunchKaufman\n\nbunchkaufman! is the same as bunchkaufman, but saves space by overwriting the input A, instead of creating a copy.\n\nsource\neigvals(A; permute::Bool=true, scale::Bool=true) -> values\n\nReturn the eigenvalues of A.\n\nFor general non-symmetric matrices it is possible to specify how the matrix is balanced before the eigenvalue calculation. The option permute=true permutes the matrix to become closer to upper triangular, and scale=true scales the matrix by its diagonal elements to make rows and columns more equal in norm. The default is true for both options.\n\nExamples\n\njulia> diag_matrix = [1 0; 0 4]\n2×2 Array{Int64,2}:\n1 0\n0 4\n\njulia> eigvals(diag_matrix)\n2-element Array{Float64,1}:\n1.0\n4.0\nsource\n\nFor a scalar input, eigvals will return a scalar.\n\nExample\n\njulia> eigvals(-2)\n-2\nsource\neigvals(A, B) -> values\n\nComputes the generalized eigenvalues of A and B.\n\nExamples\n\njulia> A = [1 0; 0 -1]\n2×2 Array{Int64,2}:\n1 0\n0 -1\n\njulia> B = [0 1; 1 0]\n2×2 Array{Int64,2}:\n0 1\n1 0\n\njulia> eigvals(A,B)\n2-element Array{Complex{Float64},1}:\n0.0 + 1.0im\n0.0 - 1.0im\nsource\neigvals(A::Union{SymTridiagonal, Hermitian, Symmetric}, irange::UnitRange) -> values\n\nReturns the eigenvalues of A. It is possible to calculate only a subset of the eigenvalues by specifying a UnitRange irange covering indices of the sorted eigenvalues, e.g. the 2nd to 8th eigenvalues.\n\njulia> A = SymTridiagonal([1.; 2.; 1.], [2.; 3.])\n3×3 SymTridiagonal{Float64,Array{Float64,1}}:\n1.0 2.0 ⋅\n2.0 2.0 3.0\n⋅ 3.0 1.0\n\njulia> eigvals(A, 2:2)\n1-element Array{Float64,1}:\n0.9999999999999996\n\njulia> eigvals(A)\n3-element Array{Float64,1}:\n-2.1400549446402604\n1.0000000000000002\n5.140054944640259\nsource\neigvals(A::Union{SymTridiagonal, Hermitian, Symmetric}, vl::Real, vu::Real) -> values\n\nReturns the eigenvalues of A. It is possible to calculate only a subset of the eigenvalues by specifying a pair vl and vu for the lower and upper boundaries of the eigenvalues.\n\njulia> A = SymTridiagonal([1.; 2.; 1.], [2.; 3.])\n3×3 SymTridiagonal{Float64,Array{Float64,1}}:\n1.0 2.0 ⋅\n2.0 2.0 3.0\n⋅ 3.0 1.0\n\njulia> eigvals(A, -1, 2)\n1-element Array{Float64,1}:\n1.0000000000000009\n\njulia> eigvals(A)\n3-element Array{Float64,1}:\n-2.1400549446402604\n1.0000000000000002\n5.140054944640259\nsource\neigvals!(A; permute::Bool=true, scale::Bool=true) -> values\n\nSame as eigvals, but saves space by overwriting the input A, instead of creating a copy. The option permute=true permutes the matrix to become closer to upper triangular, and scale=true scales the matrix by its diagonal elements to make rows and columns more equal in norm.\n\nNote\n\nThe input matrix A will not contain its eigenvalues after eigvals! is called on it - A is used as a workspace.\n\nExamples\n\njulia> A = [1. 2.; 3. 4.]\n2×2 Array{Float64,2}:\n1.0 2.0\n3.0 4.0\n\njulia> eigvals!(A)\n2-element Array{Float64,1}:\n-0.3722813232690143\n5.372281323269014\n\njulia> A\n2×2 Array{Float64,2}:\n-0.372281 -1.0\n0.0 5.37228\nsource\neigvals!(A, B) -> values\n\nSame as eigvals, but saves space by overwriting the input A (and B), instead of creating copies.\n\nNote\n\nThe input matrices A and B will not contain their eigenvalues after eigvals! is called. They are used as workspaces.\n\nExamples\n\njulia> A = [1. 0.; 0. -1.]\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> B = [0. 1.; 1. 0.]\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\n\njulia> eigvals!(A, B)\n2-element Array{Complex{Float64},1}:\n0.0 + 1.0im\n0.0 - 1.0im\n\njulia> A\n2×2 Array{Float64,2}:\n-0.0 -1.0\n1.0 -0.0\n\njulia> B\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 1.0\nsource\neigvals!(A::Union{SymTridiagonal, Hermitian, Symmetric}, irange::UnitRange) -> values\n\nSame as eigvals, but saves space by overwriting the input A, instead of creating a copy. irange is a range of eigenvalue indices to search for - for instance, the 2nd to 8th eigenvalues.\n\nsource\neigvals!(A::Union{SymTridiagonal, Hermitian, Symmetric}, vl::Real, vu::Real) -> values\n\nSame as eigvals, but saves space by overwriting the input A, instead of creating a copy. vl is the lower bound of the interval to search for eigenvalues, and vu is the upper bound.\n\nsource\neigmax(A; permute::Bool=true, scale::Bool=true)\n\nReturn the largest eigenvalue of A. The option permute=true permutes the matrix to become closer to upper triangular, and scale=true scales the matrix by its diagonal elements to make rows and columns more equal in norm. Note that if the eigenvalues of A are complex, this method will fail, since complex numbers cannot be sorted.\n\nExamples\n\njulia> A = [0 im; -im 0]\n2×2 Array{Complex{Int64},2}:\n0+0im 0+1im\n0-1im 0+0im\n\njulia> eigmax(A)\n1.0\n\njulia> A = [0 im; -1 0]\n2×2 Array{Complex{Int64},2}:\n0+0im 0+1im\n-1+0im 0+0im\n\njulia> eigmax(A)\nERROR: DomainError with Complex{Int64}[0+0im 0+1im; -1+0im 0+0im]:\nA cannot have complex eigenvalues.\nStacktrace:\n[...]\nsource\neigmin(A; permute::Bool=true, scale::Bool=true)\n\nReturn the smallest eigenvalue of A. The option permute=true permutes the matrix to become closer to upper triangular, and scale=true scales the matrix by its diagonal elements to make rows and columns more equal in norm. Note that if the eigenvalues of A are complex, this method will fail, since complex numbers cannot be sorted.\n\nExamples\n\njulia> A = [0 im; -im 0]\n2×2 Array{Complex{Int64},2}:\n0+0im 0+1im\n0-1im 0+0im\n\njulia> eigmin(A)\n-1.0\n\njulia> A = [0 im; -1 0]\n2×2 Array{Complex{Int64},2}:\n0+0im 0+1im\n-1+0im 0+0im\n\njulia> eigmin(A)\nERROR: DomainError with Complex{Int64}[0+0im 0+1im; -1+0im 0+0im]:\nA cannot have complex eigenvalues.\nStacktrace:\n[...]\nsource\neigvecs(A::SymTridiagonal[, eigvals]) -> Matrix\n\nReturn a matrix M whose columns are the eigenvectors of A. (The kth eigenvector can be obtained from the slice M[:, k].)\n\nIf the optional vector of eigenvalues eigvals is specified, eigvecs returns the specific corresponding eigenvectors.\n\nExamples\n\njulia> A = SymTridiagonal([1.; 2.; 1.], [2.; 3.])\n3×3 SymTridiagonal{Float64,Array{Float64,1}}:\n1.0 2.0 ⋅\n2.0 2.0 3.0\n⋅ 3.0 1.0\n\njulia> eigvals(A)\n3-element Array{Float64,1}:\n-2.1400549446402604\n1.0000000000000002\n5.140054944640259\n\njulia> eigvecs(A)\n3×3 Array{Float64,2}:\n0.418304 -0.83205 0.364299\n-0.656749 -7.39009e-16 0.754109\n0.627457 0.5547 0.546448\n\njulia> eigvecs(A, [1.])\n3×1 Array{Float64,2}:\n0.8320502943378438\n4.263514128092366e-17\n-0.5547001962252291\nsource\neigvecs(A; permute::Bool=true, scale::Bool=true) -> Matrix\n\nReturn a matrix M whose columns are the eigenvectors of A. (The kth eigenvector can be obtained from the slice M[:, k].) The permute and scale keywords are the same as for eigen.\n\nExamples\n\njulia> eigvecs([1.0 0.0 0.0; 0.0 3.0 0.0; 0.0 0.0 18.0])\n3×3 Array{Float64,2}:\n1.0 0.0 0.0\n0.0 1.0 0.0\n0.0 0.0 1.0\nsource\neigvecs(A, B) -> Matrix\n\nReturn a matrix M whose columns are the generalized eigenvectors of A and B. (The kth eigenvector can be obtained from the slice M[:, k].)\n\nExamples\n\njulia> A = [1 0; 0 -1]\n2×2 Array{Int64,2}:\n1 0\n0 -1\n\njulia> B = [0 1; 1 0]\n2×2 Array{Int64,2}:\n0 1\n1 0\n\njulia> eigvecs(A, B)\n2×2 Array{Complex{Float64},2}:\n0.0-1.0im 0.0+1.0im\n-1.0-0.0im -1.0+0.0im\nsource\neigen(A; permute::Bool=true, scale::Bool=true) -> Eigen\n\nComputes the eigenvalue decomposition of A, returning an Eigen factorization object F which contains the eigenvalues in F.values and the eigenvectors in the columns of the matrix F.vectors. (The kth eigenvector can be obtained from the slice F.vectors[:, k].)\n\nIterating the decomposition produces the components F.values and F.vectors.\n\nThe following functions are available for Eigen objects: inv, det, and isposdef.\n\nFor general nonsymmetric matrices it is possible to specify how the matrix is balanced before the eigenvector calculation. The option permute=true permutes the matrix to become closer to upper triangular, and scale=true scales the matrix by its diagonal elements to make rows and columns more equal in norm. The default is true for both options.\n\nExamples\n\njulia> F = eigen([1.0 0.0 0.0; 0.0 3.0 0.0; 0.0 0.0 18.0])\nEigen{Float64,Float64,Array{Float64,2},Array{Float64,1}}\neigenvalues:\n3-element Array{Float64,1}:\n1.0\n3.0\n18.0\neigenvectors:\n3×3 Array{Float64,2}:\n1.0 0.0 0.0\n0.0 1.0 0.0\n0.0 0.0 1.0\n\njulia> F.values\n3-element Array{Float64,1}:\n1.0\n3.0\n18.0\n\njulia> F.vectors\n3×3 Array{Float64,2}:\n1.0 0.0 0.0\n0.0 1.0 0.0\n0.0 0.0 1.0\n\njulia> vals, vecs = F; # destructuring via iteration\n\njulia> vals == F.values && vecs == F.vectors\ntrue\nsource\neigen(A, B) -> GeneralizedEigen\n\nComputes the generalized eigenvalue decomposition of A and B, returning a GeneralizedEigen factorization object F which contains the generalized eigenvalues in F.values and the generalized eigenvectors in the columns of the matrix F.vectors. (The kth generalized eigenvector can be obtained from the slice F.vectors[:, k].)\n\nIterating the decomposition produces the components F.values and F.vectors.\n\nExamples\n\njulia> A = [1 0; 0 -1]\n2×2 Array{Int64,2}:\n1 0\n0 -1\n\njulia> B = [0 1; 1 0]\n2×2 Array{Int64,2}:\n0 1\n1 0\n\njulia> F = eigen(A, B);\n\njulia> F.values\n2-element Array{Complex{Float64},1}:\n0.0 + 1.0im\n0.0 - 1.0im\n\njulia> F.vectors\n2×2 Array{Complex{Float64},2}:\n0.0-1.0im 0.0+1.0im\n-1.0-0.0im -1.0+0.0im\n\njulia> vals, vecs = F; # destructuring via iteration\n\njulia> vals == F.values && vecs == F.vectors\ntrue\nsource\neigen(A::Union{SymTridiagonal, Hermitian, Symmetric}, irange::UnitRange) -> Eigen\n\nComputes the eigenvalue decomposition of A, returning an Eigen factorization object F which contains the eigenvalues in F.values and the eigenvectors in the columns of the matrix F.vectors. (The kth eigenvector can be obtained from the slice F.vectors[:, k].)\n\nIterating the decomposition produces the components F.values and F.vectors.\n\nThe following functions are available for Eigen objects: inv, det, and isposdef.\n\nThe UnitRange irange specifies indices of the sorted eigenvalues to search for.\n\nNote\n\nIf irange is not 1:n, where n is the dimension of A, then the returned factorization will be a truncated factorization.\n\nsource\neigen(A::Union{SymTridiagonal, Hermitian, Symmetric}, vl::Real, vu::Real) -> Eigen\n\nComputes the eigenvalue decomposition of A, returning an Eigen factorization object F which contains the eigenvalues in F.values and the eigenvectors in the columns of the matrix F.vectors. (The kth eigenvector can be obtained from the slice F.vectors[:, k].)\n\nIterating the decomposition produces the components F.values and F.vectors.\n\nThe following functions are available for Eigen objects: inv, det, and isposdef.\n\nvl is the lower bound of the window of eigenvalues to search for, and vu is the upper bound.\n\nNote\n\nIf [vl, vu] does not contain all eigenvalues of A, then the returned factorization will be a truncated factorization.\n\nsource\neigen!(A, [B])\n\nSame as eigen, but saves space by overwriting the input A (and B), instead of creating a copy.\n\nsource\nhessenberg(A) -> Hessenberg\n\nCompute the Hessenberg decomposition of A and return a Hessenberg object. If F is the factorization object, the unitary matrix can be accessed with F.Q and the Hessenberg matrix with F.H. When Q is extracted, the resulting type is the HessenbergQ object, and may be converted to a regular matrix with convert(Array, _) (or Array(_) for short).\n\nIterating the decomposition produces the factors F.Q and F.H.\n\nExamples\n\njulia> A = [4. 9. 7.; 4. 4. 1.; 4. 3. 2.]\n3×3 Array{Float64,2}:\n4.0 9.0 7.0\n4.0 4.0 1.0\n4.0 3.0 2.0\n\njulia> F = hessenberg(A);\n\njulia> F.Q * F.H * F.Q'\n3×3 Array{Float64,2}:\n4.0 9.0 7.0\n4.0 4.0 1.0\n4.0 3.0 2.0\n\njulia> q, h = F; # destructuring via iteration\n\njulia> q == F.Q && h == F.H\ntrue\nsource\nhessenberg!(A) -> Hessenberg\n\nhessenberg! is the same as hessenberg, but saves space by overwriting the input A, instead of creating a copy.\n\nsource\nschur!(A::StridedMatrix) -> F::Schur\n\nSame as schur but uses the input argument A as workspace.\n\nExamples\n\njulia> A = [5. 7.; -2. -4.]\n2×2 Array{Float64,2}:\n5.0 7.0\n-2.0 -4.0\n\njulia> F = schur!(A)\nSchur{Float64,Array{Float64,2}}\nT factor:\n2×2 Array{Float64,2}:\n3.0 9.0\n0.0 -2.0\nZ factor:\n2×2 Array{Float64,2}:\n0.961524 0.274721\n-0.274721 0.961524\neigenvalues:\n2-element Array{Float64,1}:\n3.0\n-2.0\n\njulia> A\n2×2 Array{Float64,2}:\n3.0 9.0\n0.0 -2.0\nsource\nschur!(A::StridedMatrix, B::StridedMatrix) -> F::GeneralizedSchur\n\nSame as schur but uses the input matrices A and B as workspace.\n\nsource\nschur(A::StridedMatrix) -> F::Schur\n\nComputes the Schur factorization of the matrix A. The (quasi) triangular Schur factor can be obtained from the Schur object F with either F.Schur or F.T and the orthogonal/unitary Schur vectors can be obtained with F.vectors or F.Z such that A = F.vectors * F.Schur * F.vectors'. The eigenvalues of A can be obtained with F.values.\n\nIterating the decomposition produces the components F.T, F.Z, and F.values.\n\nExamples\n\njulia> A = [5. 7.; -2. -4.]\n2×2 Array{Float64,2}:\n5.0 7.0\n-2.0 -4.0\n\njulia> F = schur(A)\nSchur{Float64,Array{Float64,2}}\nT factor:\n2×2 Array{Float64,2}:\n3.0 9.0\n0.0 -2.0\nZ factor:\n2×2 Array{Float64,2}:\n0.961524 0.274721\n-0.274721 0.961524\neigenvalues:\n2-element Array{Float64,1}:\n3.0\n-2.0\n\njulia> F.vectors * F.Schur * F.vectors'\n2×2 Array{Float64,2}:\n5.0 7.0\n-2.0 -4.0\n\njulia> t, z, vals = F; # destructuring via iteration\n\njulia> t == F.T && z == F.Z && vals == F.values\ntrue\nsource\nschur(A::StridedMatrix, B::StridedMatrix) -> F::GeneralizedSchur\n\nComputes the Generalized Schur (or QZ) factorization of the matrices A and B. The (quasi) triangular Schur factors can be obtained from the Schur object F with F.S and F.T, the left unitary/orthogonal Schur vectors can be obtained with F.left or F.Q and the right unitary/orthogonal Schur vectors can be obtained with F.right or F.Z such that A=F.left*F.S*F.right' and B=F.left*F.T*F.right'. The generalized eigenvalues of A and B can be obtained with F.α./F.β.\n\nIterating the decomposition produces the components F.S, F.T, F.Q, F.Z, F.α, and F.β.\n\nsource\nordschur(F::Schur, select::Union{Vector{Bool},BitVector}) -> F::Schur\n\nReorders the Schur factorization F of a matrix A = Z*T*Z' according to the logical array select returning the reordered factorization F object. The selected eigenvalues appear in the leading diagonal of F.Schur and the corresponding leading columns of F.vectors form an orthogonal/unitary basis of the corresponding right invariant subspace. In the real case, a complex conjugate pair of eigenvalues must be either both included or both excluded via select.\n\nsource\nordschur(F::GeneralizedSchur, select::Union{Vector{Bool},BitVector}) -> F::GeneralizedSchur\n\nReorders the Generalized Schur factorization F of a matrix pair (A, B) = (Q*S*Z', Q*T*Z') according to the logical array select and returns a GeneralizedSchur object F. The selected eigenvalues appear in the leading diagonal of both F.S and F.T, and the left and right orthogonal/unitary Schur vectors are also reordered such that (A, B) = F.Q*(F.S, F.T)*F.Z' still holds and the generalized eigenvalues of A and B can still be obtained with F.α./F.β.\n\nsource\nordschur!(F::Schur, select::Union{Vector{Bool},BitVector}) -> F::Schur\n\nSame as ordschur but overwrites the factorization F.\n\nsource\nordschur!(F::GeneralizedSchur, select::Union{Vector{Bool},BitVector}) -> F::GeneralizedSchur\n\nSame as ordschur but overwrites the factorization F.\n\nsource\nsvd(A; full::Bool = false) -> SVD\n\nCompute the singular value decomposition (SVD) of A and return an SVD object.\n\nU, S, V and Vt can be obtained from the factorization F with F.U, F.S, F.V and F.Vt, such that A = U * Diagonal(S) * Vt. The algorithm produces Vt and hence Vt is more efficient to extract than V. The singular values in S are sorted in descending order.\n\nIterating the decomposition produces the components U, S, and V.\n\nIf full = false (default), a \"thin\" SVD is returned. For a $M \\times N$ matrix A, in the full factorization U is M \\times M and V is N \\times N, while in the thin factorization U is M \\times K and V is N \\times K, where K = \\min(M,N) is the number of singular values.\n\nExamples\n\njulia> A = [1. 0. 0. 0. 2.; 0. 0. 3. 0. 0.; 0. 0. 0. 0. 0.; 0. 2. 0. 0. 0.]\n4×5 Array{Float64,2}:\n1.0 0.0 0.0 0.0 2.0\n0.0 0.0 3.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 2.0 0.0 0.0 0.0\n\njulia> F = svd(A);\n\njulia> F.U * Diagonal(F.S) * F.Vt\n4×5 Array{Float64,2}:\n1.0 0.0 0.0 0.0 2.0\n0.0 0.0 3.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 2.0 0.0 0.0 0.0\nsource\nsvd(A, B) -> GeneralizedSVD\n\nCompute the generalized SVD of A and B, returning a GeneralizedSVD factorization object F, such that A = F.U*F.D1*F.R0*F.Q' and B = F.V*F.D2*F.R0*F.Q'.\n\nFor an M-by-N matrix A and P-by-N matrix B,\n\n• U is a M-by-M orthogonal matrix,\n• V is a P-by-P orthogonal matrix,\n• Q is a N-by-N orthogonal matrix,\n• D1 is a M-by-(K+L) diagonal matrix with 1s in the first K entries,\n• D2 is a P-by-(K+L) matrix whose top right L-by-L block is diagonal,\n• R0 is a (K+L)-by-N matrix whose rightmost (K+L)-by-(K+L) block is nonsingular upper block triangular,\n\nK+L is the effective numerical rank of the matrix [A; B].\n\nIterating the decomposition produces the components U, V, Q, D1, D2, and R0.\n\nThe entries of F.D1 and F.D2 are related, as explained in the LAPACK documentation for the generalized SVD and the xGGSVD3 routine which is called underneath (in LAPACK 3.6.0 and newer).\n\nExamples\n\njulia> A = [1. 0.; 0. -1.]\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> B = [0. 1.; 1. 0.]\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\n\njulia> F = svd(A, B);\n\njulia> F.U*F.D1*F.R0*F.Q'\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> F.V*F.D2*F.R0*F.Q'\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\nsource\nsvd!(A; full::Bool = false) -> SVD\n\nsvd! is the same as svd, but saves space by overwriting the input A, instead of creating a copy.\n\nExamples\n\njulia> A = [1. 0. 0. 0. 2.; 0. 0. 3. 0. 0.; 0. 0. 0. 0. 0.; 0. 2. 0. 0. 0.]\n4×5 Array{Float64,2}:\n1.0 0.0 0.0 0.0 2.0\n0.0 0.0 3.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 2.0 0.0 0.0 0.0\n\njulia> F = svd!(A);\n\njulia> F.U * Diagonal(F.S) * F.Vt\n4×5 Array{Float64,2}:\n1.0 0.0 0.0 0.0 2.0\n0.0 0.0 3.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 2.0 0.0 0.0 0.0\n\njulia> A\n4×5 Array{Float64,2}:\n-2.23607 0.0 0.0 0.0 0.618034\n0.0 -3.0 1.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 0.0 -2.0 0.0 0.0\nsource\nsvd!(A, B) -> GeneralizedSVD\n\nsvd! is the same as svd, but modifies the arguments A and B in-place, instead of making copies.\n\nExamples\n\njulia> A = [1. 0.; 0. -1.]\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> B = [0. 1.; 1. 0.]\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\n\njulia> F = svd!(A, B);\n\njulia> F.U*F.D1*F.R0*F.Q'\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> F.V*F.D2*F.R0*F.Q'\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\n\njulia> A\n2×2 Array{Float64,2}:\n1.41421 0.0\n0.0 -1.41421\n\njulia> B\n2×2 Array{Float64,2}:\n1.0 -0.0\n0.0 -1.0\nsource\nsvdvals(A)\n\nReturn the singular values of A in descending order.\n\nExamples\n\njulia> A = [1. 0. 0. 0. 2.; 0. 0. 3. 0. 0.; 0. 0. 0. 0. 0.; 0. 2. 0. 0. 0.]\n4×5 Array{Float64,2}:\n1.0 0.0 0.0 0.0 2.0\n0.0 0.0 3.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 2.0 0.0 0.0 0.0\n\njulia> svdvals(A)\n4-element Array{Float64,1}:\n3.0\n2.23606797749979\n2.0\n0.0\nsource\nsvdvals(A, B)\n\nReturn the generalized singular values from the generalized singular value decomposition of A and B. See also svd.\n\nExamples\n\njulia> A = [1. 0.; 0. -1.]\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> B = [0. 1.; 1. 0.]\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\n\njulia> svdvals(A, B)\n2-element Array{Float64,1}:\n1.0\n1.0\nsource\nsvdvals!(A)\n\nReturn the singular values of A, saving space by overwriting the input. See also svdvals and svd.\n\nExamples\n\njulia> A = [1. 0. 0. 0. 2.; 0. 0. 3. 0. 0.; 0. 0. 0. 0. 0.; 0. 2. 0. 0. 0.]\n4×5 Array{Float64,2}:\n1.0 0.0 0.0 0.0 2.0\n0.0 0.0 3.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 2.0 0.0 0.0 0.0\n\njulia> svdvals!(A)\n4-element Array{Float64,1}:\n3.0\n2.23606797749979\n2.0\n0.0\n\njulia> A\n4×5 Array{Float64,2}:\n-2.23607 0.0 0.0 0.0 0.618034\n0.0 -3.0 1.0 0.0 0.0\n0.0 0.0 0.0 0.0 0.0\n0.0 0.0 -2.0 0.0 0.0\nsource\nsvdvals!(A, B)\n\nReturn the generalized singular values from the generalized singular value decomposition of A and B, saving space by overwriting A and B. See also svd and svdvals.\n\nExamples\n\njulia> A = [1. 0.; 0. -1.]\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 -1.0\n\njulia> B = [0. 1.; 1. 0.]\n2×2 Array{Float64,2}:\n0.0 1.0\n1.0 0.0\n\njulia> svdvals!(A, B)\n2-element Array{Float64,1}:\n1.0\n1.0\n\njulia> A\n2×2 Array{Float64,2}:\n1.41421 0.0\n0.0 -1.41421\n\njulia> B\n2×2 Array{Float64,2}:\n1.0 -0.0\n0.0 -1.0\nsource\nLinearAlgebra.Givens(i1,i2,c,s) -> G\n\nA Givens rotation linear operator. The fields c and s represent the cosine and sine of the rotation angle, respectively. The Givens type supports left multiplication G*A and conjugated transpose right multiplication A*G'. The type doesn't have a size and can therefore be multiplied with matrices of arbitrary size as long as i2<=size(A,2) for G*A or i2<=size(A,1) for A*G'.\n\nSee also: givens\n\nsource\ngivens(f::T, g::T, i1::Integer, i2::Integer) where {T} -> (G::Givens, r::T)\n\nComputes the Givens rotation G and scalar r such that for any vector x where\n\nx[i1] = f\nx[i2] = g\n\nthe result of the multiplication\n\ny = G*x\n\nhas the property that\n\ny[i1] = r\ny[i2] = 0\n\nSee also: LinearAlgebra.Givens\n\nsource\ngivens(A::AbstractArray, i1::Integer, i2::Integer, j::Integer) -> (G::Givens, r)\n\nComputes the Givens rotation G and scalar r such that the result of the multiplication\n\nB = G*A\n\nhas the property that\n\nB[i1,j] = r\nB[i2,j] = 0\n\nSee also: LinearAlgebra.Givens\n\nsource\ngivens(x::AbstractVector, i1::Integer, i2::Integer) -> (G::Givens, r)\n\nComputes the Givens rotation G and scalar r such that the result of the multiplication\n\nB = G*x\n\nhas the property that\n\nB[i1] = r\nB[i2] = 0\n\nSee also: LinearAlgebra.Givens\n\nsource\ntriu(M)\n\nUpper triangle of a matrix.\n\nExamples\n\njulia> a = fill(1.0, (4,4))\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n\njulia> triu(a)\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n0.0 1.0 1.0 1.0\n0.0 0.0 1.0 1.0\n0.0 0.0 0.0 1.0\nsource\ntriu(M, k::Integer)\n\nReturns the upper triangle of M starting from the kth superdiagonal.\n\nExamples\n\njulia> a = fill(1.0, (4,4))\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n\njulia> triu(a,3)\n4×4 Array{Float64,2}:\n0.0 0.0 0.0 1.0\n0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0\n\njulia> triu(a,-3)\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\nsource\ntriu!(M)\n\nUpper triangle of a matrix, overwriting M in the process. See also triu.\n\nsource\ntriu!(M, k::Integer)\n\nReturn the upper triangle of M starting from the kth superdiagonal, overwriting M in the process.\n\nExamples\n\njulia> M = [1 2 3 4 5; 1 2 3 4 5; 1 2 3 4 5; 1 2 3 4 5; 1 2 3 4 5]\n5×5 Array{Int64,2}:\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\n\njulia> triu!(M, 1)\n5×5 Array{Int64,2}:\n0 2 3 4 5\n0 0 3 4 5\n0 0 0 4 5\n0 0 0 0 5\n0 0 0 0 0\nsource\ntril(M)\n\nLower triangle of a matrix.\n\nExamples\n\njulia> a = fill(1.0, (4,4))\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n\njulia> tril(a)\n4×4 Array{Float64,2}:\n1.0 0.0 0.0 0.0\n1.0 1.0 0.0 0.0\n1.0 1.0 1.0 0.0\n1.0 1.0 1.0 1.0\nsource\ntril(M, k::Integer)\n\nReturns the lower triangle of M starting from the kth superdiagonal.\n\nExamples\n\njulia> a = fill(1.0, (4,4))\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n\njulia> tril(a,3)\n4×4 Array{Float64,2}:\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n1.0 1.0 1.0 1.0\n\njulia> tril(a,-3)\n4×4 Array{Float64,2}:\n0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0\n0.0 0.0 0.0 0.0\n1.0 0.0 0.0 0.0\nsource\ntril!(M)\n\nLower triangle of a matrix, overwriting M in the process. See also tril.\n\nsource\ntril!(M, k::Integer)\n\nReturn the lower triangle of M starting from the kth superdiagonal, overwriting M in the process.\n\nExamples\n\njulia> M = [1 2 3 4 5; 1 2 3 4 5; 1 2 3 4 5; 1 2 3 4 5; 1 2 3 4 5]\n5×5 Array{Int64,2}:\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\n\njulia> tril!(M, 2)\n5×5 Array{Int64,2}:\n1 2 3 0 0\n1 2 3 4 0\n1 2 3 4 5\n1 2 3 4 5\n1 2 3 4 5\nsource\ndiagind(M, k::Integer=0)\n\nAn AbstractRange giving the indices of the kth diagonal of the matrix M.\n\nExamples\n\njulia> A = [1 2 3; 4 5 6; 7 8 9]\n3×3 Array{Int64,2}:\n1 2 3\n4 5 6\n7 8 9\n\njulia> diagind(A,-1)\n2:4:6\nsource\ndiag(M, k::Integer=0)\n\nThe kth diagonal of a matrix, as a vector.\n\nSee also: diagm\n\nExamples\n\njulia> A = [1 2 3; 4 5 6; 7 8 9]\n3×3 Array{Int64,2}:\n1 2 3\n4 5 6\n7 8 9\n\njulia> diag(A,1)\n2-element Array{Int64,1}:\n2\n6\nsource\ndiagm(kv::Pair{<:Integer,<:AbstractVector}...)\n\nConstruct a square matrix from Pairs of diagonals and vectors. Vector kv.second will be placed on the kv.first diagonal. diagm constructs a full matrix; if you want storage-efficient versions with fast arithmetic, see Diagonal, Bidiagonal Tridiagonal and SymTridiagonal.\n\nExamples\n\njulia> diagm(1 => [1,2,3])\n4×4 Array{Int64,2}:\n0 1 0 0\n0 0 2 0\n0 0 0 3\n0 0 0 0\n\njulia> diagm(1 => [1,2,3], -1 => [4,5])\n4×4 Array{Int64,2}:\n0 1 0 0\n4 0 2 0\n0 5 0 3\n0 0 0 0\nsource\nrank(A[, tol::Real])\n\nCompute the rank of a matrix by counting how many singular values of A have magnitude greater than tol*σ₁ where σ₁ is A's largest singular values. By default, the value of tol is the smallest dimension of A multiplied by the eps of the eltype of A.\n\nExamples\n\njulia> rank(Matrix(I, 3, 3))\n3\n\njulia> rank(diagm(0 => [1, 0, 2]))\n2\n\njulia> rank(diagm(0 => [1, 0.001, 2]), 0.1)\n2\n\njulia> rank(diagm(0 => [1, 0.001, 2]), 0.00001)\n3\nsource\nnorm(A, p::Real=2)\n\nFor any iterable container A (including arrays of any dimension) of numbers (or any element type for which norm is defined), compute the p-norm (defaulting to p=2) as if A were a vector of the corresponding length.\n\nThe p-norm is defined as\n\n$\\|A\\|_p = \\left( \\sum_{i=1}^n | a_i | ^p \\right)^{1/p}$\n\nwith $a_i$ the entries of $A$, $| a_i |$ the norm of $a_i$, and $n$ the length of $A$. Since the p-norm is computed using the norms of the entries of A, the p-norm of a vector of vectors is not compatible with the interpretation of it as a block vector in general if p != 2.\n\np can assume any numeric value (even though not all values produce a mathematically valid vector norm). In particular, norm(A, Inf) returns the largest value in abs.(A), whereas norm(A, -Inf) returns the smallest. If A is a matrix and p=2, then this is equivalent to the Frobenius norm.\n\nThe second argument p is not necessarily a part of the interface for norm, i.e. a custom type may only implement norm(A) without second argument.\n\nUse opnorm to compute the operator norm of a matrix.\n\nExamples\n\njulia> v = [3, -2, 6]\n3-element Array{Int64,1}:\n3\n-2\n6\n\njulia> norm(v)\n7.0\n\njulia> norm(v, 1)\n11.0\n\njulia> norm(v, Inf)\n6.0\n\njulia> norm([1 2 3; 4 5 6; 7 8 9])\n16.881943016134134\n\njulia> norm([1 2 3 4 5 6 7 8 9])\n16.881943016134134\n\njulia> norm(1:9)\n16.881943016134134\n\njulia> norm(hcat(v,v), 1) == norm(vcat(v,v), 1) != norm([v,v], 1)\ntrue\n\njulia> norm(hcat(v,v), 2) == norm(vcat(v,v), 2) == norm([v,v], 2)\ntrue\n\njulia> norm(hcat(v,v), Inf) == norm(vcat(v,v), Inf) != norm([v,v], Inf)\ntrue\nsource\nnorm(x::Number, p::Real=2)\n\nFor numbers, return $\\left( |x|^p \\right)^{1/p}$.\n\nExamples\n\njulia> norm(2, 1)\n2\n\njulia> norm(-2, 1)\n2\n\njulia> norm(2, 2)\n2\n\njulia> norm(-2, 2)\n2\n\njulia> norm(2, Inf)\n2\n\njulia> norm(-2, Inf)\n2\nsource\nopnorm(A::AbstractMatrix, p::Real=2)\n\nCompute the operator norm (or matrix norm) induced by the vector p-norm, where valid values of p are 1, 2, or Inf. (Note that for sparse matrices, p=2 is currently not implemented.) Use norm to compute the Frobenius norm.\n\nWhen p=1, the operator norm is the maximum absolute column sum of A:\n\n$\\|A\\|_1 = \\max_{1 ≤ j ≤ n} \\sum_{i=1}^m | a_{ij} |$\n\nwith $a_{ij}$ the entries of $A$, and $m$ and $n$ its dimensions.\n\nWhen p=2, the operator norm is the spectral norm, equal to the largest singular value of A.\n\nWhen p=Inf, the operator norm is the maximum absolute row sum of A:\n\n$\\|A\\|_\\infty = \\max_{1 ≤ i ≤ m} \\sum _{j=1}^n | a_{ij} |$\n\nExamples\n\njulia> A = [1 -2 -3; 2 3 -1]\n2×3 Array{Int64,2}:\n1 -2 -3\n2 3 -1\n\njulia> opnorm(A, Inf)\n6.0\n\njulia> opnorm(A, 1)\n5.0\nsource\nopnorm(x::Number, p::Real=2)\n\nFor numbers, return $\\left( |x|^p \\right)^{1/p}$. This is equivalent to norm.\n\nsource\nopnorm(A::Adjoint{<:Any,<:AbstracVector}, q::Real=2)\nopnorm(A::Transpose{<:Any,<:AbstracVector}, q::Real=2)\n\nFor Adjoint/Transpose-wrapped vectors, return the operator $q$-norm of A, which is equivalent to the p-norm with value p = q/(q-1). They coincide at p = q = 2. Use norm to compute the p norm of A as a vector.\n\nThe difference in norm between a vector space and its dual arises to preserve the relationship between duality and the dot product, and the result is consistent with the operator p-norm of a 1 × n matrix.\n\nExamples\n\njulia> v = [1; im];\n\njulia> vc = v';\n\njulia> opnorm(vc, 1)\n1.0\n\njulia> norm(vc, 1)\n2.0\n\njulia> norm(v, 1)\n2.0\n\njulia> opnorm(vc, 2)\n1.4142135623730951\n\njulia> norm(vc, 2)\n1.4142135623730951\n\njulia> norm(v, 2)\n1.4142135623730951\n\njulia> opnorm(vc, Inf)\n2.0\n\njulia> norm(vc, Inf)\n1.0\n\njulia> norm(v, Inf)\n1.0\nsource\nnormalize!(v::AbstractVector, p::Real=2)\n\nNormalize the vector v in-place so that its p-norm equals unity, i.e. norm(v, p) == 1. See also normalize and norm.\n\nsource\nnormalize(v::AbstractVector, p::Real=2)\n\nNormalize the vector v so that its p-norm equals unity, i.e. norm(v, p) == vecnorm(v, p) == 1. See also normalize! and norm.\n\nExamples\n\njulia> a = [1,2,4];\n\njulia> b = normalize(a)\n3-element Array{Float64,1}:\n0.2182178902359924\n0.4364357804719848\n0.8728715609439696\n\njulia> norm(b)\n1.0\n\njulia> c = normalize(a, 1)\n3-element Array{Float64,1}:\n0.14285714285714285\n0.2857142857142857\n0.5714285714285714\n\njulia> norm(c, 1)\n1.0\nsource\ncond(M, p::Real=2)\n\nCondition number of the matrix M, computed using the operator p-norm. Valid values for p are 1, 2 (default), or Inf.\n\nsource\ncondskeel(M, [x, p::Real=Inf])\n$\\kappa_S(M, p) = \\left\\Vert \\left\\vert M \\right\\vert \\left\\vert M^{-1} \\right\\vert \\right\\Vert_p \\\\ \\kappa_S(M, x, p) = \\left\\Vert \\left\\vert M \\right\\vert \\left\\vert M^{-1} \\right\\vert \\left\\vert x \\right\\vert \\right\\Vert_p$\n\nSkeel condition number $\\kappa_S$ of the matrix M, optionally with respect to the vector x, as computed using the operator p-norm. $\\left\\vert M \\right\\vert$ denotes the matrix of (entry wise) absolute values of $M$; $\\left\\vert M \\right\\vert_{ij} = \\left\\vert M_{ij} \\right\\vert$. Valid values for p are 1, 2 and Inf (default).\n\nThis quantity is also known in the literature as the Bauer condition number, relative condition number, or componentwise relative condition number.\n\nsource\ntr(M)\n\nMatrix trace. Sums the diagonal elements of M.\n\nExamples\n\njulia> A = [1 2; 3 4]\n2×2 Array{Int64,2}:\n1 2\n3 4\n\njulia> tr(A)\n5\nsource\ndet(M)\n\nMatrix determinant.\n\nExamples\n\njulia> M = [1 0; 2 2]\n2×2 Array{Int64,2}:\n1 0\n2 2\n\njulia> det(M)\n2.0\nsource\nlogdet(M)\n\nLog of matrix determinant. Equivalent to log(det(M)), but may provide increased accuracy and/or speed.\n\nExamples\n\njulia> M = [1 0; 2 2]\n2×2 Array{Int64,2}:\n1 0\n2 2\n\njulia> logdet(M)\n0.6931471805599453\n\njulia> logdet(Matrix(I, 3, 3))\n0.0\nsource\nlogabsdet(M)\n\nLog of absolute value of matrix determinant. Equivalent to (log(abs(det(M))), sign(det(M))), but may provide increased accuracy and/or speed.\n\nExamples\n\njulia> A = [-1. 0.; 0. 1.]\n2×2 Array{Float64,2}:\n-1.0 0.0\n0.0 1.0\n\njulia> det(A)\n-1.0\n\njulia> logabsdet(A)\n(0.0, -1.0)\n\njulia> B = [2. 0.; 0. 1.]\n2×2 Array{Float64,2}:\n2.0 0.0\n0.0 1.0\n\njulia> det(B)\n2.0\n\njulia> logabsdet(B)\n(0.6931471805599453, 1.0)\nsource\ninv(M)\n\nMatrix inverse. Computes matrix N such that M * N = I, where I is the identity matrix. Computed by solving the left-division N = M \\ I.\n\nExamples\n\njulia> M = [2 5; 1 3]\n2×2 Array{Int64,2}:\n2 5\n1 3\n\njulia> N = inv(M)\n2×2 Array{Float64,2}:\n3.0 -5.0\n-1.0 2.0\n\njulia> M*N == N*M == Matrix(I, 2, 2)\ntrue\nsource\npinv(M[, tol::Real])\n\nComputes the Moore-Penrose pseudoinverse.\n\nFor matrices M with floating point elements, it is convenient to compute the pseudoinverse by inverting only singular values above a given threshold, tol.\n\nThe optimal choice of tol varies both with the value of M and the intended application of the pseudoinverse. The default value of tol is eps(real(float(one(eltype(M)))))*minimum(size(M)), which is essentially machine epsilon for the real part of a matrix element multiplied by the larger matrix dimension. For inverting dense ill-conditioned matrices in a least-squares sense, tol = sqrt(eps(real(float(one(eltype(M)))))) is recommended.\n\nExamples\n\njulia> M = [1.5 1.3; 1.2 1.9]\n2×2 Array{Float64,2}:\n1.5 1.3\n1.2 1.9\n\njulia> N = pinv(M)\n2×2 Array{Float64,2}:\n1.47287 -1.00775\n-0.930233 1.16279\n\njulia> M * N\n2×2 Array{Float64,2}:\n1.0 -2.22045e-16\n4.44089e-16 1.0\n[issue8859]\n\nIssue 8859, \"Fix least squares\", https://github.com/JuliaLang/julia/pull/8859\n\n[B96]\n\nÅke Björck, \"Numerical Methods for Least Squares Problems\", SIAM Press, Philadelphia, 1996, \"Other Titles in Applied Mathematics\", Vol. 51. doi:10.1137/1.9781611971484\n\n[S84]\n\nG. W. Stewart, \"Rank Degeneracy\", SIAM Journal on Scientific and Statistical Computing, 5(2), 1984, 403-413. doi:10.1137/0905030\n\n[KY88]\n\nKonstantinos Konstantinides and Kung Yao, \"Statistical analysis of effective singular values in matrix rank determination\", IEEE Transactions on Acoustics, Speech and Signal Processing, 36(5), 1988, 757-763. doi:10.1109/29.1585\n\nsource\nnullspace(M[, tol::Real])\n\nComputes a basis for the nullspace of M by including the singular vectors of A whose singular have magnitude are greater than tol*σ₁, where σ₁ is A's largest singular values. By default, the value of tol is the smallest dimension of A multiplied by the eps of the eltype of A.\n\nExamples\n\njulia> M = [1 0 0; 0 1 0; 0 0 0]\n3×3 Array{Int64,2}:\n1 0 0\n0 1 0\n0 0 0\n\njulia> nullspace(M)\n3×1 Array{Float64,2}:\n0.0\n0.0\n1.0\n\njulia> nullspace(M, 2)\n3×3 Array{Float64,2}:\n0.0 1.0 0.0\n1.0 0.0 0.0\n0.0 0.0 1.0\nsource\nkron(A, B)\n\nKronecker tensor product of two vectors or two matrices.\n\nExamples\n\njulia> A = [1 2; 3 4]\n2×2 Array{Int64,2}:\n1 2\n3 4\n\njulia> B = [im 1; 1 -im]\n2×2 Array{Complex{Int64},2}:\n0+1im 1+0im\n1+0im 0-1im\n\njulia> kron(A, B)\n4×4 Array{Complex{Int64},2}:\n0+1im 1+0im 0+2im 2+0im\n1+0im 0-1im 2+0im 0-2im\n0+3im 3+0im 0+4im 4+0im\n3+0im 0-3im 4+0im 0-4im\nsource\nexp(A::AbstractMatrix)\n\nCompute the matrix exponential of A, defined by\n\n$e^A = \\sum_{n=0}^{\\infty} \\frac{A^n}{n!}.$\n\nFor symmetric or Hermitian A, an eigendecomposition (eigen) is used, otherwise the scaling and squaring algorithm (see [H05]) is chosen.\n\n[H05]\n\nNicholas J. Higham, \"The squaring and scaling method for the matrix exponential revisited\", SIAM Journal on Matrix Analysis and Applications, 26(4), 2005, 1179-1193. doi:10.1137/090768539\n\nExamples\n\njulia> A = Matrix(1.0I, 2, 2)\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 1.0\n\njulia> exp(A)\n2×2 Array{Float64,2}:\n2.71828 0.0\n0.0 2.71828\nsource\nlog(A{T}::StridedMatrix{T})\n\nIf A has no negative real eigenvalue, compute the principal matrix logarithm of A, i.e. the unique matrix $X$ such that $e^X = A$ and $-\\pi < Im(\\lambda) < \\pi$ for all the eigenvalues $\\lambda$ of $X$. If A has nonpositive eigenvalues, a nonprincipal matrix function is returned whenever possible.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used, if A is triangular an improved version of the inverse scaling and squaring method is employed (see [AH12] and [AHR13]). For general matrices, the complex Schur form (schur) is computed and the triangular algorithm is used on the triangular factor.\n\n[AH12]\n\nAwad H. Al-Mohy and Nicholas J. Higham, \"Improved inverse scaling and squaring algorithms for the matrix logarithm\", SIAM Journal on Scientific Computing, 34(4), 2012, C153-C169. doi:10.1137/110852553\n\n[AHR13]\n\nAwad H. Al-Mohy, Nicholas J. Higham and Samuel D. Relton, \"Computing the Fréchet derivative of the matrix logarithm and estimating the condition number\", SIAM Journal on Scientific Computing, 35(4), 2013, C394-C410. doi:10.1137/120885991\n\nExamples\n\njulia> A = Matrix(2.7182818*I, 2, 2)\n2×2 Array{Float64,2}:\n2.71828 0.0\n0.0 2.71828\n\njulia> log(A)\n2×2 Array{Float64,2}:\n1.0 0.0\n0.0 1.0\nsource\nsqrt(A::AbstractMatrix)\n\nIf A has no negative real eigenvalues, compute the principal matrix square root of A, that is the unique matrix $X$ with eigenvalues having positive real part such that $X^2 = A$. Otherwise, a nonprincipal square root is returned.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the square root. Otherwise, the square root is determined by means of the Björck-Hammarling method [BH83], which computes the complex Schur form (schur) and then the complex square root of the triangular factor.\n\n[BH83]\n\nÅke Björck and Sven Hammarling, \"A Schur method for the square root of a matrix\", Linear Algebra and its Applications, 52-53, 1983, 127-140. doi:10.1016/0024-3795(83)80010-X\n\nExamples\n\njulia> A = [4 0; 0 4]\n2×2 Array{Int64,2}:\n4 0\n0 4\n\njulia> sqrt(A)\n2×2 Array{Float64,2}:\n2.0 0.0\n0.0 2.0\nsource\ncos(A::AbstractMatrix)\n\nCompute the matrix cosine of a square matrix A.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the cosine. Otherwise, the cosine is determined by calling exp.\n\nExamples\n\njulia> cos(fill(1.0, (2,2)))\n2×2 Array{Float64,2}:\n0.291927 -0.708073\n-0.708073 0.291927\nsource\nsin(A::AbstractMatrix)\n\nCompute the matrix sine of a square matrix A.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the sine. Otherwise, the sine is determined by calling exp.\n\nExamples\n\njulia> sin(fill(1.0, (2,2)))\n2×2 Array{Float64,2}:\n0.454649 0.454649\n0.454649 0.454649\nsource\nsincos(A::AbstractMatrix)\n\nCompute the matrix sine and cosine of a square matrix A.\n\nExamples\n\njulia> S, C = sincos(fill(1.0, (2,2)));\n\njulia> S\n2×2 Array{Float64,2}:\n0.454649 0.454649\n0.454649 0.454649\n\njulia> C\n2×2 Array{Float64,2}:\n0.291927 -0.708073\n-0.708073 0.291927\nsource\ntan(A::AbstractMatrix)\n\nCompute the matrix tangent of a square matrix A.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the tangent. Otherwise, the tangent is determined by calling exp.\n\nExamples\n\njulia> tan(fill(1.0, (2,2)))\n2×2 Array{Float64,2}:\n-1.09252 -1.09252\n-1.09252 -1.09252\nsource\nsec(A::AbstractMatrix)\n\nCompute the matrix secant of a square matrix A.\n\nsource\ncsc(A::AbstractMatrix)\n\nCompute the matrix cosecant of a square matrix A.\n\nsource\ncot(A::AbstractMatrix)\n\nCompute the matrix cotangent of a square matrix A.\n\nsource\ncosh(A::AbstractMatrix)\n\nCompute the matrix hyperbolic cosine of a square matrix A.\n\nsource\nsinh(A::AbstractMatrix)\n\nCompute the matrix hyperbolic sine of a square matrix A.\n\nsource\ntanh(A::AbstractMatrix)\n\nCompute the matrix hyperbolic tangent of a square matrix A.\n\nsource\nsech(A::AbstractMatrix)\n\nCompute the matrix hyperbolic secant of square matrix A.\n\nsource\ncsch(A::AbstractMatrix)\n\nCompute the matrix hyperbolic cosecant of square matrix A.\n\nsource\ncoth(A::AbstractMatrix)\n\nCompute the matrix hyperbolic cotangent of square matrix A.\n\nsource\nacos(A::AbstractMatrix)\n\nCompute the inverse matrix cosine of a square matrix A.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the inverse cosine. Otherwise, the inverse cosine is determined by using log and sqrt. For the theory and logarithmic formulas used to compute this function, see [AH16_1].\n\n[AH16_1]\n\nMary Aprahamian and Nicholas J. Higham, \"Matrix Inverse Trigonometric and Inverse Hyperbolic Functions: Theory and Algorithms\", MIMS EPrint: 2016.4. https://doi.org/10.1137/16M1057577\n\nExamples\n\njulia> acos(cos([0.5 0.1; -0.2 0.3]))\n2×2 Array{Complex{Float64},2}:\n0.5-5.55112e-17im 0.1-2.77556e-17im\n-0.2+2.498e-16im 0.3-3.46945e-16im\nsource\nasin(A::AbstractMatrix)\n\nCompute the inverse matrix sine of a square matrix A.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the inverse sine. Otherwise, the inverse sine is determined by using log and sqrt. For the theory and logarithmic formulas used to compute this function, see [AH16_2].\n\n[AH16_2]\n\nMary Aprahamian and Nicholas J. Higham, \"Matrix Inverse Trigonometric and Inverse Hyperbolic Functions: Theory and Algorithms\", MIMS EPrint: 2016.4. https://doi.org/10.1137/16M1057577\n\nExamples\n\njulia> asin(sin([0.5 0.1; -0.2 0.3]))\n2×2 Array{Complex{Float64},2}:\n0.5-4.16334e-17im 0.1-5.55112e-17im\n-0.2+9.71445e-17im 0.3-1.249e-16im\nsource\natan(A::AbstractMatrix)\n\nCompute the inverse matrix tangent of a square matrix A.\n\nIf A is symmetric or Hermitian, its eigendecomposition (eigen) is used to compute the inverse tangent. Otherwise, the inverse tangent is determined by using log. For the theory and logarithmic formulas used to compute this function, see [AH16_3].\n\n[AH16_3]\n\nMary Aprahamian and Nicholas J. Higham, \"Matrix Inverse Trigonometric and Inverse Hyperbolic Functions: Theory and Algorithms\", MIMS EPrint: 2016.4. https://doi.org/10.1137/16M1057577\n\nExamples\n\njulia> atan(tan([0.5 0.1; -0.2 0.3]))\n2×2 Array{Complex{Float64},2}:\n0.5+1.38778e-17im 0.1-2.77556e-17im\n-0.2+6.93889e-17im 0.3-4.16334e-17im\nsource\nasec(A::AbstractMatrix)\n\nCompute the inverse matrix secant of A.\n\nsource\nacsc(A::AbstractMatrix)\n\nCompute the inverse matrix cosecant of A.\n\nsource\nacot(A::AbstractMatrix)\n\nCompute the inverse matrix cotangent of A.\n\nsource\nacosh(A::AbstractMatrix)\n\nCompute the inverse hyperbolic matrix cosine of a square matrix A. For the theory and logarithmic formulas used to compute this function, see [AH16_4].\n\n[AH16_4]\n\nMary Aprahamian and Nicholas J. Higham, \"Matrix Inverse Trigonometric and Inverse Hyperbolic Functions: Theory and Algorithms\", MIMS EPrint: 2016.4. https://doi.org/10.1137/16M1057577\n\nsource\nasinh(A::AbstractMatrix)\n\nCompute the inverse hyperbolic matrix sine of a square matrix A. For the theory and logarithmic formulas used to compute this function, see [AH16_5].\n\n[AH16_5]\n\nMary Aprahamian and Nicholas J. Higham, \"Matrix Inverse Trigonometric and Inverse Hyperbolic Functions: Theory and Algorithms\", MIMS EPrint: 2016.4. https://doi.org/10.1137/16M1057577\n\nsource\natanh(A::AbstractMatrix)\n\nCompute the inverse hyperbolic matrix tangent of a square matrix A. For the theory and logarithmic formulas used to compute this function, see [AH16_6].\n\n[AH16_6]\n\nMary Aprahamian and Nicholas J. Higham, \"Matrix Inverse Trigonometric and Inverse Hyperbolic Functions: Theory and Algorithms\", MIMS EPrint: 2016.4. https://doi.org/10.1137/16M1057577\n\nsource\nasech(A::AbstractMatrix)\n\nCompute the inverse matrix hyperbolic secant of A.\n\nsource\nacsch(A::AbstractMatrix)\n\nCompute the inverse matrix hyperbolic cosecant of A.\n\nsource\nacoth(A::AbstractMatrix)\n\nCompute the inverse matrix hyperbolic cotangent of A.\n\nsource\nlyap(A, C)\n\nComputes the solution X to the continuous Lyapunov equation AX + XA' + C = 0, where no eigenvalue of A has a zero real part and no two eigenvalues are negative complex conjugates of each other.\n\nExamples\n\njulia> A = [3. 4.; 5. 6]\n2×2 Array{Float64,2}:\n3.0 4.0\n5.0 6.0\n\njulia> B = [1. 1.; 1. 2.]\n2×2 Array{Float64,2}:\n1.0 1.0\n1.0 2.0\n\njulia> X = lyap(A, B)\n2×2 Array{Float64,2}:\n0.5 -0.5\n-0.5 0.25\n\njulia> A*X + X*A' + B\n2×2 Array{Float64,2}:\n0.0 6.66134e-16\n6.66134e-16 8.88178e-16\nsource\nsylvester(A, B, C)\n\nComputes the solution X to the Sylvester equation AX + XB + C = 0, where A, B and C have compatible dimensions and A and -B have no eigenvalues with equal real part.\n\nExamples\n\njulia> A = [3. 4.; 5. 6]\n2×2 Array{Float64,2}:\n3.0 4.0\n5.0 6.0\n\njulia> B = [1. 1.; 1. 2.]\n2×2 Array{Float64,2}:\n1.0 1.0\n1.0 2.0\n\njulia> C = [1. 2.; -2. 1]\n2×2 Array{Float64,2}:\n1.0 2.0\n-2.0 1.0\n\njulia> X = sylvester(A, B, C)\n2×2 Array{Float64,2}:\n-4.46667 1.93333\n3.73333 -1.8\n\njulia> A*X + X*B + C\n2×2 Array{Float64,2}:\n2.66454e-15 1.77636e-15\n-3.77476e-15 4.44089e-16\nsource\nissuccess(F::Factorization)\n\nTest that a factorization of a matrix succeeded.\n\njulia> F = cholesky([1 0; 0 1]);\n\njulia> LinearAlgebra.issuccess(F)\ntrue\n\njulia> F = lu([1 0; 0 0]; check = false);\n\njulia> LinearAlgebra.issuccess(F)\nfalse\nsource\nissymmetric(A) -> Bool\n\nTest whether a matrix is symmetric.\n\nExamples\n\njulia> a = [1 2; 2 -1]\n2×2 Array{Int64,2}:\n1 2\n2 -1\n\njulia> issymmetric(a)\ntrue\n\njulia> b = [1 im; -im 1]\n2×2 Array{Complex{Int64},2}:\n1+0im 0+1im\n0-1im 1+0im\n\njulia> issymmetric(b)\nfalse\nsource\nisposdef(A) -> Bool\n\nTest whether a matrix is positive definite (and Hermitian) by trying to perform a Cholesky factorization of A. See also isposdef!\n\nExamples\n\njulia> A = [1 2; 2 50]\n2×2 Array{Int64,2}:\n1 2\n2 50\n\njulia> isposdef(A)\ntrue\nsource\nisposdef!(A) -> Bool\n\nTest whether a matrix is positive definite (and Hermitian) by trying to perform a Cholesky factorization of A, overwriting A in the process. See also isposdef.\n\nExamples\n\njulia> A = [1. 2.; 2. 50.];\n\njulia> isposdef!(A)\ntrue\n\njulia> A\n2×2 Array{Float64,2}:\n1.0 2.0\n2.0 6.78233\nsource\nistril(A::AbstractMatrix, k::Integer = 0) -> Bool\n\nTest whether A is lower triangular starting from the kth superdiagonal.\n\nExamples\n\njulia> a = [1 2; 2 -1]\n2×2 Array{Int64,2}:\n1 2\n2 -1\n\njulia> istril(a)\nfalse\n\njulia> istril(a, 1)\ntrue\n\njulia> b = [1 0; -im -1]\n2×2 Array{Complex{Int64},2}:\n1+0im 0+0im\n0-1im -1+0im\n\njulia> istril(b)\ntrue\n\njulia> istril(b, -1)\nfalse\nsource\nistriu(A::AbstractMatrix, k::Integer = 0) -> Bool\n\nTest whether A is upper triangular starting from the kth superdiagonal.\n\nExamples\n\njulia> a = [1 2; 2 -1]\n2×2 Array{Int64,2}:\n1 2\n2 -1\n\njulia> istriu(a)\nfalse\n\njulia> istriu(a, -1)\ntrue\n\njulia> b = [1 im; 0 -1]\n2×2 Array{Complex{Int64},2}:\n1+0im 0+1im\n0+0im -1+0im\n\njulia> istriu(b)\ntrue\n\njulia> istriu(b, 1)\nfalse\nsource\nisdiag(A) -> Bool\n\nTest whether a matrix is diagonal.\n\nExamples\n\njulia> a = [1 2; 2 -1]\n2×2 Array{Int64,2}:\n1 2\n2 -1\n\njulia> isdiag(a)\nfalse\n\njulia> b = [im 0; 0 -im]\n2×2 Array{Complex{Int64},2}:\n0+1im 0+0im\n0+0im 0-1im\n\njulia> isdiag(b)\ntrue\nsource\nishermitian(A) -> Bool\n\nTest whether a matrix is Hermitian.\n\nExamples\n\njulia> a = [1 2; 2 -1]\n2×2 Array{Int64,2}:\n1 2\n2 -1\n\njulia> ishermitian(a)\ntrue\n\njulia> b = [1 im; -im 1]\n2×2 Array{Complex{Int64},2}:\n1+0im 0+1im\n0-1im 1+0im\n\njulia> ishermitian(b)\ntrue\nsource\ntranspose(A)\n\nLazy transpose. Mutating the returned object should appropriately mutate A. Often, but not always, yields Transpose(A), where Transpose is a lazy transpose wrapper. Note that this operation is recursive.\n\nThis operation is intended for linear algebra usage - for general data manipulation see permutedims, which is non-recursive.\n\nExamples\n\njulia> A = [3+2im 9+2im; 8+7im 4+6im]\n2×2 Array{Complex{Int64},2}:\n3+2im 9+2im\n8+7im 4+6im\n\njulia> transpose(A)\n2×2 Transpose{Complex{Int64},Array{Complex{Int64},2}}:\n3+2im 8+7im\n9+2im 4+6im\nsource\ntranspose!(dest,src)\n\nTranspose array src and store the result in the preallocated array dest, which should have a size corresponding to (size(src,2),size(src,1)). No in-place transposition is supported and unexpected results will happen if src and dest have overlapping memory regions.\n\nExamples\n\njulia> A = [3+2im 9+2im; 8+7im 4+6im]\n2×2 Array{Complex{Int64},2}:\n3+2im 9+2im\n8+7im 4+6im\n\njulia> B = zeros(Complex{Int64}, 2, 2)\n2×2 Array{Complex{Int64},2}:\n0+0im 0+0im\n0+0im 0+0im\n\njulia> transpose!(B, A);\n\njulia> B\n2×2 Array{Complex{Int64},2}:\n3+2im 8+7im\n9+2im 4+6im\n\njulia> A\n2×2 Array{Complex{Int64},2}:\n3+2im 9+2im\n8+7im 4+6im\nsource\nadjoint(A)\n\nLazy adjoint (conjugate transposition) (also postfix '). Note that adjoint is applied recursively to elements.\n\nThis operation is intended for linear algebra usage - for general data manipulation see permutedims.\n\nExamples\n\njulia> A = [3+2im 9+2im; 8+7im 4+6im]\n2×2 Array{Complex{Int64},2}:\n3+2im 9+2im\n8+7im 4+6im\n\n3-2im 8-7im\n9-2im 4-6im\nsource\nadjoint!(dest,src)\n\nConjugate transpose array src and store the result in the preallocated array dest, which should have a size corresponding to (size(src,2),size(src,1)). No in-place transposition is supported and unexpected results will happen if src and dest have overlapping memory regions.\n\nExamples\n\njulia> A = [3+2im 9+2im; 8+7im 4+6im]\n2×2 Array{Complex{Int64},2}:\n3+2im 9+2im\n8+7im 4+6im\n\njulia> B = zeros(Complex{Int64}, 2, 2)\n2×2 Array{Complex{Int64},2}:\n0+0im 0+0im\n0+0im 0+0im\n\njulia> B\n2×2 Array{Complex{Int64},2}:\n3-2im 8-7im\n9-2im 4-6im\n\njulia> A\n2×2 Array{Complex{Int64},2}:\n3+2im 9+2im\n8+7im 4+6im\nsource\ncopy(A::Transpose)\ncopy(A::Adjoint)\n\nEagerly evaluate the lazy matrix transpose/adjoint. Note that the transposition is applied recursively to elements.\n\nThis operation is intended for linear algebra usage - for general data manipulation see permutedims, which is non-recursive.\n\nExamples\n\njulia> A = [1 2im; -3im 4]\n2×2 Array{Complex{Int64},2}:\n1+0im 0+2im\n0-3im 4+0im\n\njulia> T = transpose(A)\n2×2 Transpose{Complex{Int64},Array{Complex{Int64},2}}:\n1+0im 0-3im\n0+2im 4+0im\n\njulia> copy(T)\n2×2 Array{Complex{Int64},2}:\n1+0im 0-3im\n0+2im 4+0im\nsource\nstride1(A) -> Int\n\nReturn the distance between successive array elements in dimension 1 in units of element size.\n\nExamples\n\njulia> A = [1,2,3,4]\n4-element Array{Int64,1}:\n1\n2\n3\n4\n\njulia> LinearAlgebra.stride1(A)\n1\n\njulia> B = view(A, 2:2:4)\n2-element view(::Array{Int64,1}, 2:2:4) with eltype Int64:\n2\n4\n\njulia> LinearAlgebra.stride1(B)\n2\nsource\nLinearAlgebra.checksquare(A)\n\nCheck that a matrix is square, then return its common dimension. For multiple arguments, return a vector.\n\nExamples\n\njulia> A = fill(1, (4,4)); B = fill(1, (5,5));\n\njulia> LinearAlgebra.checksquare(A, B)\n2-element Array{Int64,1}:\n4\n5\nsource\n\n## Low-level matrix operations\n\nIn many cases there are in-place versions of matrix operations that allow you to supply a pre-allocated output vector or matrix. This is useful when optimizing critical code in order to avoid the overhead of repeated allocations. These in-place operations are suffixed with ! below (e.g. mul!) according to the usual Julia convention.\n\nmul!(Y, A, B) -> Y\n\nCalculates the matrix-matrix or matrix-vector product $AB$ and stores the result in Y, overwriting the existing value of Y. Note that Y must not be aliased with either A or B.\n\nExamples\n\njulia> A=[1.0 2.0; 3.0 4.0]; B=[1.0 1.0; 1.0 1.0]; Y = similar(B); mul!(Y, A, B);\n\njulia> Y\n2×2 Array{Float64,2}:\n3.0 3.0\n7.0 7.0\nsource\nlmul!(a::Number, B::AbstractArray)\n\nScale an array B by a scalar a overwriting B in-place.\n\nExamples\n\njulia> B = [1 2; 3 4]\n2×2 Array{Int64,2}:\n1 2\n3 4\n\njulia> lmul!(2, B)\n2×2 Array{Int64,2}:\n2 4\n6 8\nsource\nlmul!(A, B)\n\nCalculate the matrix-matrix product $AB$, overwriting B, and return the result.\n\nExamples\n\njulia> B = [0 1; 1 0];\n\njulia> A = LinearAlgebra.UpperTriangular([1 2; 0 3]);\n\njulia> LinearAlgebra.lmul!(A, B);\n\njulia> B\n2×2 Array{Int64,2}:\n2 1\n3 0\nsource\nrmul!(A::AbstractArray, b::Number)\n\nScale an array A by a scalar b overwriting A in-place.\n\nExamples\n\njulia> A = [1 2; 3 4]\n2×2 Array{Int64,2}:\n1 2\n3 4\n\njulia> rmul!(A, 2)\n2×2 Array{Int64,2}:\n2 4\n6 8\nsource\nrmul!(A, B)\n\nCalculate the matrix-matrix product $AB$, overwriting A, and return the result.\n\nExamples\n\njulia> A = [0 1; 1 0];\n\njulia> B = LinearAlgebra.UpperTriangular([1 2; 0 3]);\n\njulia> LinearAlgebra.rmul!(A, B);\n\njulia> A\n2×2 Array{Int64,2}:\n0 3\n1 2\nsource\nldiv!(Y, A, B) -> Y\n\nCompute A \\ B in-place and store the result in Y, returning the result.\n\nThe argument A should not be a matrix. Rather, instead of matrices it should be a factorization object (e.g. produced by factorize or cholesky). The reason for this is that factorization itself is both expensive and typically allocates memory (although it can also be done in-place via, e.g., lu!), and performance-critical situations requiring ldiv! usually also require fine-grained control over the factorization of A.\n\nExamples\n\njulia> A = [1 2.2 4; 3.1 0.2 3; 4 1 2];\n\njulia> X = [1; 2.5; 3];\n\njulia> Y = zero(X);\n\njulia> ldiv!(Y, qr(A), X);\n\njulia> Y\n3-element Array{Float64,1}:\n0.7128099173553719\n-0.051652892561983674\n0.10020661157024757\n\njulia> A\\X\n3-element Array{Float64,1}:\n0.7128099173553719\n-0.05165289256198333\n0.10020661157024785\nsource\nldiv!(A, B)\n\nCompute A \\ B in-place and overwriting B to store the result.\n\nThe argument A should not be a matrix. Rather, instead of matrices it should be a factorization object (e.g. produced by factorize or cholesky). The reason for this is that factorization itself is both expensive and typically allocates memory (although it can also be done in-place via, e.g., lu!), and performance-critical situations requiring ldiv! usually also require fine-grained control over the factorization of A.\n\nExamples\n\njulia> A = [1 2.2 4; 3.1 0.2 3; 4 1 2];\n\njulia> X = [1; 2.5; 3];\n\njulia> Y = copy(X);\n\njulia> ldiv!(qr(A), X);\n\njulia> X\n3-element Array{Float64,1}:\n0.7128099173553719\n-0.051652892561983674\n0.10020661157024757\n\njulia> A\\Y\n3-element Array{Float64,1}:\n0.7128099173553719\n-0.05165289256198333\n0.10020661157024785\nsource\nrdiv!(A, B)\n\nCompute A / B in-place and overwriting A to store the result.\n\nThe argument B should not be a matrix. Rather, instead of matrices it should be a factorization object (e.g. produced by factorize or cholesky). The reason for this is that factorization itself is both expensive and typically allocates memory (although it can also be done in-place via, e.g., lu!), and performance-critical situations requiring rdiv! usually also require fine-grained control over the factorization of B.\n\nsource\n\n## BLAS Functions\n\nIn Julia (as in much of scientific computation), dense linear-algebra operations are based on the LAPACK library, which in turn is built on top of basic linear-algebra building-blocks known as the BLAS. There are highly optimized implementations of BLAS available for every computer architecture, and sometimes in high-performance linear algebra routines it is useful to call the BLAS functions directly.\n\nLinearAlgebra.BLAS provides wrappers for some of the BLAS functions. Those BLAS functions that overwrite one of the input arrays have names ending in '!'. Usually, a BLAS function has four methods defined, for Float64, Float32, ComplexF64, and ComplexF32 arrays.\n\n### BLAS Character Arguments\n\nMany BLAS functions accept arguments that determine whether to transpose an argument (trans), which triangle of a matrix to reference (uplo or ul), whether the diagonal of a triangular matrix can be assumed to be all ones (dA) or which side of a matrix multiplication the input argument belongs on (side). The possibilities are:\n\n#### Multplication Order\n\nsideMeaning\n'L'The argument goes on the left side of a matrix-matrix operation.\n'R'The argument goes on the right side of a matrix-matrix operation.\n\n#### Triangle Referencing\n\nuplo/ulMeaning\n'U'Only the upper triangle of the matrix will be used.\n'L'Only the lower triangle of the matrix will be used.\n\n#### Transposition Operation\n\ntrans/tXMeaning\n'N'The input matrix X is not transposed or conjugated.\n'T'The input matrix X will be transposed.\n'C'The input matrix X will be conjugated and transposed.\n\n#### Unit Diagonal\n\ndiag/dXMeaning\n'N'The diagonal values of the matrix X will be read.\n'U'The diagonal of the matrix X is assumed to be all ones.\n\nInterface to BLAS subroutines.\n\nsource\ndotu(n, X, incx, Y, incy)\n\nDot function for two complex vectors consisting of n elements of array X with stride incx and n elements of array Y with stride incy.\n\nExamples\n\njulia> BLAS.dotu(10, fill(1.0im, 10), 1, fill(1.0+im, 20), 2)\n-10.0 + 10.0im\nsource\ndotc(n, X, incx, U, incy)\n\nDot function for two complex vectors, consisting of n elements of array X with stride incx and n elements of array U with stride incy, conjugating the first vector.\n\nExamples\n\njulia> BLAS.dotc(10, fill(1.0im, 10), 1, fill(1.0+im, 20), 2)\n10.0 - 10.0im\nsource\nblascopy!(n, X, incx, Y, incy)\n\nCopy n elements of array X with stride incx to array Y with stride incy. Returns Y.\n\nsource\nnrm2(n, X, incx)\n\n2-norm of a vector consisting of n elements of array X with stride incx.\n\nExamples\n\njulia> BLAS.nrm2(4, fill(1.0, 8), 2)\n2.0\n\njulia> BLAS.nrm2(1, fill(1.0, 8), 2)\n1.0\nsource\nasum(n, X, incx)\n\nSum of the absolute values of the first n elements of array X with stride incx.\n\nExamples\n\njulia> BLAS.asum(5, fill(1.0im, 10), 2)\n5.0\n\njulia> BLAS.asum(2, fill(1.0im, 10), 5)\n2.0\nsource\naxpy!(a, X, Y)\n\nOverwrite Y with a*X + Y, where a is a scalar. Return Y.\n\nExamples\n\njulia> x = [1; 2; 3];\n\njulia> y = [4; 5; 6];\n\njulia> BLAS.axpy!(2, x, y)\n3-element Array{Int64,1}:\n6\n9\n12\nsource\nscal!(n, a, X, incx)\n\nOverwrite X with a*X for the first n elements of array X with stride incx. Returns X.\n\nsource\nscal(n, a, X, incx)\n\nReturn X scaled by a for the first n elements of array X with stride incx.\n\nsource\nger!(alpha, x, y, A)\n\nRank-1 update of the matrix A with vectors x and y as alpha*x*y' + A.\n\nsource\nsyr!(uplo, alpha, x, A)\n\nRank-1 update of the symmetric matrix A with vector x as alpha*x*transpose(x) + A. uplo controls which triangle of A is updated. Returns A.\n\nsource\nsyrk!(uplo, trans, alpha, A, beta, C)\n\nRank-k update of the symmetric matrix C as alpha*A*transpose(A) + beta*C or alpha*transpose(A)*A + beta*C according to trans. Only the uplo triangle of C is used. Returns C.\n\nsource\nsyrk(uplo, trans, alpha, A)\n\nReturns either the upper triangle or the lower triangle of A, according to uplo, of alpha*A*transpose(A) or alpha*transpose(A)*A, according to trans.\n\nsource\nher!(uplo, alpha, x, A)\n\nMethods for complex arrays only. Rank-1 update of the Hermitian matrix A with vector x as alpha*x*x' + A. uplo controls which triangle of A is updated. Returns A.\n\nsource\nherk!(uplo, trans, alpha, A, beta, C)\n\nMethods for complex arrays only. Rank-k update of the Hermitian matrix C as alpha*A*A' + beta*C or alpha*A'*A + beta*C according to trans. Only the uplo triangle of C is updated. Returns C.\n\nsource\nherk(uplo, trans, alpha, A)\n\nMethods for complex arrays only. Returns the uplo triangle of alpha*A*A' or alpha*A'*A, according to trans.\n\nsource\ngbmv!(trans, m, kl, ku, alpha, A, x, beta, y)\n\nUpdate vector y as alpha*A*x + beta*y or alpha*A'*x + beta*y according to trans. The matrix A is a general band matrix of dimension m by size(A,2) with kl sub-diagonals and ku super-diagonals. alpha and beta are scalars. Return the updated y.\n\nsource\ngbmv(trans, m, kl, ku, alpha, A, x)\n\nReturn alpha*A*x or alpha*A'*x according to trans. The matrix A is a general band matrix of dimension m by size(A,2) with kl sub-diagonals and ku super-diagonals, and alpha is a scalar.\n\nsource\nsbmv!(uplo, k, alpha, A, x, beta, y)\n\nUpdate vector y as alpha*A*x + beta*y where A is a a symmetric band matrix of order size(A,2) with k super-diagonals stored in the argument A. The storage layout for A is described the reference BLAS module, level-2 BLAS at http://www.netlib.org/lapack/explore-html/. Only the uplo triangle of A is used.\n\nReturn the updated y.\n\nsource\nsbmv(uplo, k, alpha, A, x)\n\nReturn alpha*A*x where A is a symmetric band matrix of order size(A,2) with k super-diagonals stored in the argument A. Only the uplo triangle of A is used.\n\nsource\nsbmv(uplo, k, A, x)\n\nReturn A*x where A is a symmetric band matrix of order size(A,2) with k super-diagonals stored in the argument A. Only the uplo triangle of A is used.\n\nsource\ngemm!(tA, tB, alpha, A, B, beta, C)\n\nUpdate C as alpha*A*B + beta*C or the other three variants according to tA and tB. Return the updated C.\n\nsource\ngemm(tA, tB, alpha, A, B)\n\nReturn alpha*A*B or the other three variants according to tA and tB.\n\nsource\ngemm(tA, tB, A, B)\n\nReturn A*B or the other three variants according to tA and tB.\n\nsource\ngemv!(tA, alpha, A, x, beta, y)\n\nUpdate the vector y as alpha*A*x + beta*y or alpha*A'x + beta*y according to tA. alpha and beta are scalars. Return the updated y.\n\nsource\ngemv(tA, alpha, A, x)\n\nReturn alpha*A*x or alpha*A'x according to tA. alpha is a scalar.\n\nsource\ngemv(tA, A, x)\n\nReturn A*x or A'x according to tA.\n\nsource\nsymm!(side, ul, alpha, A, B, beta, C)\n\nUpdate C as alpha*A*B + beta*C or alpha*B*A + beta*C according to side. A is assumed to be symmetric. Only the ul triangle of A is used. Return the updated C.\n\nsource\nsymm(side, ul, alpha, A, B)\n\nReturn alpha*A*B or alpha*B*A according to side. A is assumed to be symmetric. Only the ul triangle of A is used.\n\nsource\nsymm(side, ul, A, B)\n\nReturn A*B or B*A according to side. A is assumed to be symmetric. Only the ul triangle of A is used.\n\nsource\nsymv!(ul, alpha, A, x, beta, y)\n\nUpdate the vector y as alpha*A*x + beta*y. A is assumed to be symmetric. Only the ul triangle of A is used. alpha and beta are scalars. Return the updated y.\n\nsource\nsymv(ul, alpha, A, x)\n\nReturn alpha*A*x. A is assumed to be symmetric. Only the ul triangle of A is used. alpha is a scalar.\n\nsource\nsymv(ul, A, x)\n\nReturn A*x. A is assumed to be symmetric. Only the ul triangle of A is used.\n\nsource\ntrmm!(side, ul, tA, dA, alpha, A, B)\n\nUpdate B as alpha*A*B or one of the other three variants determined by side and tA. Only the ul triangle of A is used. dA determines if the diagonal values are read or are assumed to be all ones. Returns the updated B.\n\nsource\ntrmm(side, ul, tA, dA, alpha, A, B)\n\nReturns alpha*A*B or one of the other three variants determined by side and tA. Only the ul triangle of A is used. dA determines if the diagonal values are read or are assumed to be all ones.\n\nsource\ntrsm!(side, ul, tA, dA, alpha, A, B)\n\nOverwrite B with the solution to A*X = alpha*B or one of the other three variants determined by side and tA. Only the ul triangle of A is used. dA determines if the diagonal values are read or are assumed to be all ones. Returns the updated B.\n\nsource\ntrsm(side, ul, tA, dA, alpha, A, B)\n\nReturn the solution to A*X = alpha*B or one of the other three variants determined by determined by side and tA. Only the ul triangle of A is used. dA determines if the diagonal values are read or are assumed to be all ones.\n\nsource\ntrmv!(ul, tA, dA, A, b)\n\nReturn op(A)*b, where op is determined by tA. Only the ul triangle of A is used. dA determines if the diagonal values are read or are assumed to be all ones. The multiplication occurs in-place on b.\n\nsource\ntrmv(ul, tA, dA, A, b)\n\nReturn op(A)*b, where op is determined by tA. Only the ul triangle of A is used. dA determines if the diagonal values are read or are assumed to be all ones.\n\nsource\ntrsv!(ul, tA, dA, A, b)\n\nOverwrite b with the solution to A*x = b or one of the other two variants determined by tA and ul. dA determines if the diagonal values are read or are assumed to be all ones. Return the updated b.\n\nsource\ntrsv(ul, tA, dA, A, b)\n\nReturn the solution to A*x = b or one of the other two variants determined by tA and ul. dA determines if the diagonal values are read or are assumed to be all ones.\n\nsource\nset_num_threads(n)\n\nSet the number of threads the BLAS library should use.\n\nsource\nI\n\nAn object of type UniformScaling, representing an identity matrix of any size.\n\nExamples\n\njulia> fill(1, (5,6)) * I == fill(1, (5,6))\ntrue\n\njulia> [1 2im 3; 1im 2 3] * I\n2×3 Array{Complex{Int64},2}:\n1+0im 0+2im 3+0im\n0+1im 2+0im 3+0im\nsource\n\n## LAPACK Functions\n\nLinearAlgebra.LAPACK provides wrappers for some of the LAPACK functions for linear algebra. Those functions that overwrite one of the input arrays have names ending in '!'.\n\nUsually a function has 4 methods defined, one each for Float64, Float32, ComplexF64 and ComplexF32 arrays.\n\nNote that the LAPACK API provided by Julia can and will change in the future. Since this API is not user-facing, there is no commitment to support/deprecate this specific set of functions in future releases.\n\nInterfaces to LAPACK subroutines.\n\nsource\ngbtrf!(kl, ku, m, AB) -> (AB, ipiv)\n\nCompute the LU factorization of a banded matrix AB. kl is the first subdiagonal containing a nonzero band, ku is the last superdiagonal containing one, and m is the first dimension of the matrix AB. Returns the LU factorization in-place and ipiv, the vector of pivots used.\n\nsource\ngbtrs!(trans, kl, ku, m, AB, ipiv, B)\n\nSolve the equation AB * X = B. trans determines the orientation of AB. It may be N (no transpose), T (transpose), or C (conjugate transpose). kl is the first subdiagonal containing a nonzero band, ku is the last superdiagonal containing one, and m is the first dimension of the matrix AB. ipiv is the vector of pivots returned from gbtrf!. Returns the vector or matrix X, overwriting B in-place.\n\nsource\ngebal!(job, A) -> (ilo, ihi, scale)\n\nBalance the matrix A before computing its eigensystem or Schur factorization. job can be one of N (A will not be permuted or scaled), P (A will only be permuted), S (A will only be scaled), or B (A will be both permuted and scaled). Modifies A in-place and returns ilo, ihi, and scale. If permuting was turned on, A[i,j] = 0 if j > i and 1 < j < ilo or j > ihi. scale contains information about the scaling/permutations performed.\n\nsource\ngebak!(job, side, ilo, ihi, scale, V)\n\nTransform the eigenvectors V of a matrix balanced using gebal! to the unscaled/unpermuted eigenvectors of the original matrix. Modifies V in-place. side can be L (left eigenvectors are transformed) or R (right eigenvectors are transformed).\n\nsource\ngebrd!(A) -> (A, d, e, tauq, taup)\n\nReduce A in-place to bidiagonal form A = QBP'. Returns A, containing the bidiagonal matrix B; d, containing the diagonal elements of B; e, containing the off-diagonal elements of B; tauq, containing the elementary reflectors representing Q; and taup, containing the elementary reflectors representing P.\n\nsource\ngelqf!(A, tau)\n\nCompute the LQ factorization of A, A = LQ. tau contains scalars which parameterize the elementary reflectors of the factorization. tau must have length greater than or equal to the smallest dimension of A.\n\nReturns A and tau modified in-place.\n\nsource\ngelqf!(A) -> (A, tau)\n\nCompute the LQ factorization of A, A = LQ.\n\nReturns A, modified in-place, and tau, which contains scalars which parameterize the elementary reflectors of the factorization.\n\nsource\ngeqlf!(A, tau)\n\nCompute the QL factorization of A, A = QL. tau contains scalars which parameterize the elementary reflectors of the factorization. tau must have length greater than or equal to the smallest dimension of A.\n\nReturns A and tau modified in-place.\n\nsource\ngeqlf!(A) -> (A, tau)\n\nCompute the QL factorization of A, A = QL.\n\nReturns A, modified in-place, and tau, which contains scalars which parameterize the elementary reflectors of the factorization.\n\nsource\ngeqrf!(A, tau)\n\nCompute the QR factorization of A, A = QR. tau contains scalars which parameterize the elementary reflectors of the factorization. tau must have length greater than or equal to the smallest dimension of A.\n\nReturns A and tau modified in-place.\n\nsource\ngeqrf!(A) -> (A, tau)\n\nCompute the QR factorization of A, A = QR.\n\nReturns A, modified in-place, and tau, which contains scalars which parameterize the elementary reflectors of the factorization.\n\nsource\ngeqp3!(A, jpvt, tau)\n\nCompute the pivoted QR factorization of A, AP = QR using BLAS level 3. P is a pivoting matrix, represented by jpvt. tau stores the elementary reflectors. jpvt must have length length greater than or equal to n if A is an (m x n) matrix. tau must have length greater than or equal to the smallest dimension of A.\n\nA, jpvt, and tau are modified in-place.\n\nsource\ngeqp3!(A, jpvt) -> (A, jpvt, tau)\n\nCompute the pivoted QR factorization of A, AP = QR using BLAS level 3. P is a pivoting matrix, represented by jpvt. jpvt must have length greater than or equal to n if A is an (m x n) matrix.\n\nReturns A and jpvt, modified in-place, and tau, which stores the elementary reflectors.\n\nsource\ngeqp3!(A) -> (A, jpvt, tau)\n\nCompute the pivoted QR factorization of A, AP = QR using BLAS level 3.\n\nReturns A, modified in-place, jpvt, which represents the pivoting matrix P, and tau, which stores the elementary reflectors.\n\nsource\ngerqf!(A, tau)\n\nCompute the RQ factorization of A, A = RQ. tau contains scalars which parameterize the elementary reflectors of the factorization. tau must have length greater than or equal to the smallest dimension of A.\n\nReturns A and tau modified in-place.\n\nsource\ngerqf!(A) -> (A, tau)\n\nCompute the RQ factorization of A, A = RQ.\n\nReturns A, modified in-place, and tau, which contains scalars which parameterize the elementary reflectors of the factorization.\n\nsource\ngeqrt!(A, T)\n\nCompute the blocked QR factorization of A, A = QR. T contains upper triangular block reflectors which parameterize the elementary reflectors of the factorization. The first dimension of T sets the block size and it must be between 1 and n. The second dimension of T must equal the smallest dimension of A.\n\nReturns A and T modified in-place.\n\nsource\ngeqrt!(A, nb) -> (A, T)\n\nCompute the blocked QR factorization of A, A = QR. nb sets the block size and it must be between 1 and n, the second dimension of A.\n\nReturns A, modified in-place, and T, which contains upper triangular block reflectors which parameterize the elementary reflectors of the factorization.\n\nsource\ngeqrt3!(A, T)\n\nRecursively computes the blocked QR factorization of A, A = QR. T contains upper triangular block reflectors which parameterize the elementary reflectors of the factorization. The first dimension of T sets the block size and it must be between 1 and n. The second dimension of T must equal the smallest dimension of A.\n\nReturns A and T modified in-place.\n\nsource\ngeqrt3!(A) -> (A, T)\n\nRecursively computes the blocked QR factorization of A, A = QR.\n\nReturns A, modified in-place, and T, which contains upper triangular block reflectors which parameterize the elementary reflectors of the factorization.\n\nsource\ngetrf!(A) -> (A, ipiv, info)\n\nCompute the pivoted LU factorization of A, A = LU.\n\nReturns A, modified in-place, ipiv, the pivoting information, and an info code which indicates success (info = 0), a singular value in U (info = i, in which case U[i,i] is singular), or an error code (info < 0).\n\nsource\ntzrzf!(A) -> (A, tau)\n\nTransforms the upper trapezoidal matrix A to upper triangular form in-place. Returns A and tau, the scalar parameters for the elementary reflectors of the transformation.\n\nsource\normrz!(side, trans, A, tau, C)\n\nMultiplies the matrix C by Q from the transformation supplied by tzrzf!. Depending on side or trans the multiplication can be left-sided (side = L, Q*C) or right-sided (side = R, C*Q) and Q can be unmodified (trans = N), transposed (trans = T), or conjugate transposed (trans = C). Returns matrix C which is modified in-place with the result of the multiplication.\n\nsource\ngels!(trans, A, B) -> (F, B, ssr)\n\nSolves the linear equation A * X = B, transpose(A) * X = B, or adjoint(A) * X = B using a QR or LQ factorization. Modifies the matrix/vector B in place with the solution. A is overwritten with its QR or LQ factorization. trans may be one of N (no modification), T (transpose), or C (conjugate transpose). gels! searches for the minimum norm/least squares solution. A may be under or over determined. The solution is returned in B.\n\nsource\ngesv!(A, B) -> (B, A, ipiv)\n\nSolves the linear equation A * X = B where A is a square matrix using the LU factorization of A. A is overwritten with its LU factorization and B is overwritten with the solution X. ipiv contains the pivoting information for the LU factorization of A.\n\nsource\ngetrs!(trans, A, ipiv, B)\n\nSolves the linear equation A * X = B, transpose(A) * X = B, or adjoint(A) * X = B for square A. Modifies the matrix/vector B in place with the solution. A is the LU factorization from getrf!, with ipiv the pivoting information. trans may be one of N (no modification), T (transpose), or C (conjugate transpose).\n\nsource\ngetri!(A, ipiv)\n\nComputes the inverse of A, using its LU factorization found by getrf!. ipiv is the pivot information output and A contains the LU factorization of getrf!. A is overwritten with its inverse.\n\nsource\ngesvx!(fact, trans, A, AF, ipiv, equed, R, C, B) -> (X, equed, R, C, B, rcond, ferr, berr, work)\n\nSolves the linear equation A * X = B (trans = N), transpose(A) * X = B (trans = T), or adjoint(A) * X = B (trans = C) using the LU factorization of A. fact may be E, in which case A will be equilibrated and copied to AF; F, in which case AF and ipiv from a previous LU factorization are inputs; or N, in which case A will be copied to AF and then factored. If fact = F, equed may be N, meaning A has not been equilibrated; R, meaning A was multiplied by Diagonal(R) from the left; C, meaning A was multiplied by Diagonal(C) from the right; or B, meaning A was multiplied by Diagonal(R) from the left and Diagonal(C) from the right. If fact = F and equed = R or B the elements of R must all be positive. If fact = F and equed = C or B the elements of C must all be positive.\n\nReturns the solution X; equed, which is an output if fact is not N, and describes the equilibration that was performed; R, the row equilibration diagonal; C, the column equilibration diagonal; B, which may be overwritten with its equilibrated form Diagonal(R)*B (if trans = N and equed = R,B) or Diagonal(C)*B (if trans = T,C and equed = C,B); rcond, the reciprocal condition number of A after equilbrating; ferr, the forward error bound for each solution vector in X; berr, the forward error bound for each solution vector in X; and work, the reciprocal pivot growth factor.\n\nsource\ngesvx!(A, B)\n\nThe no-equilibration, no-transpose simplification of gesvx!.\n\nsource\ngelsd!(A, B, rcond) -> (B, rnk)\n\nComputes the least norm solution of A * X = B by finding the SVD factorization of A, then dividing-and-conquering the problem. B is overwritten with the solution X. Singular values below rcond will be treated as zero. Returns the solution in B and the effective rank of A in rnk.\n\nsource\ngelsy!(A, B, rcond) -> (B, rnk)\n\nComputes the least norm solution of A * X = B by finding the full QR factorization of A, then dividing-and-conquering the problem. B is overwritten with the solution X. Singular values below rcond will be treated as zero. Returns the solution in B and the effective rank of A in rnk.\n\nsource\ngglse!(A, c, B, d) -> (X,res)\n\nSolves the equation A * x = c where x is subject to the equality constraint B * x = d. Uses the formula ||c - A*x||^2 = 0 to solve. Returns X and the residual sum-of-squares.\n\nsource\ngeev!(jobvl, jobvr, A) -> (W, VL, VR)\n\nFinds the eigensystem of A. If jobvl = N, the left eigenvectors of A aren't computed. If jobvr = N, the right eigenvectors of A aren't computed. If jobvl = V or jobvr = V, the corresponding eigenvectors are computed. Returns the eigenvalues in W, the right eigenvectors in VR, and the left eigenvectors in VL.\n\nsource\ngesdd!(job, A) -> (U, S, VT)\n\nFinds the singular value decomposition of A, A = U * S * V', using a divide and conquer approach. If job = A, all the columns of U and the rows of V' are computed. If job = N, no columns of U or rows of V' are computed. If job = O, A is overwritten with the columns of (thin) U and the rows of (thin) V'. If job = S, the columns of (thin) U and the rows of (thin) V' are computed and returned separately.\n\nsource\ngesvd!(jobu, jobvt, A) -> (U, S, VT)\n\nFinds the singular value decomposition of A, A = U * S * V'. If jobu = A, all the columns of U are computed. If jobvt = A all the rows of V' are computed. If jobu = N, no columns of U are computed. If jobvt = N no rows of V' are computed. If jobu = O, A is overwritten with the columns of (thin) U. If jobvt = O, A is overwritten with the rows of (thin) V'. If jobu = S, the columns of (thin) U are computed and returned separately. If jobvt = S the rows of (thin) V' are computed and returned separately. jobu and jobvt can't both be O.\n\nReturns U, S, and Vt, where S are the singular values of A.\n\nsource\nggsvd!(jobu, jobv, jobq, A, B) -> (U, V, Q, alpha, beta, k, l, R)\n\nFinds the generalized singular value decomposition of A and B, U'*A*Q = D1*R and V'*B*Q = D2*R. D1 has alpha on its diagonal and D2 has beta on its diagonal. If jobu = U, the orthogonal/unitary matrix U is computed. If jobv = V the orthogonal/unitary matrix V is computed. If jobq = Q, the orthogonal/unitary matrix Q is computed. If jobu, jobv or jobq is N, that matrix is not computed. This function is only available in LAPACK versions prior to 3.6.0.\n\nsource\nggsvd3!(jobu, jobv, jobq, A, B) -> (U, V, Q, alpha, beta, k, l, R)\n\nFinds the generalized singular value decomposition of A and B, U'*A*Q = D1*R and V'*B*Q = D2*R. D1 has alpha on its diagonal and D2 has beta on its diagonal. If jobu = U, the orthogonal/unitary matrix U is computed. If jobv = V the orthogonal/unitary matrix V is computed. If jobq = Q, the orthogonal/unitary matrix Q is computed. If jobu, jobv, or jobq is N, that matrix is not computed. This function requires LAPACK 3.6.0.\n\nsource\ngeevx!(balanc, jobvl, jobvr, sense, A) -> (A, w, VL, VR, ilo, ihi, scale, abnrm, rconde, rcondv)\n\nFinds the eigensystem of A with matrix balancing. If jobvl = N, the left eigenvectors of A aren't computed. If jobvr = N, the right eigenvectors of A aren't computed. If jobvl = V or jobvr = V, the corresponding eigenvectors are computed. If balanc = N, no balancing is performed. If balanc = P, A is permuted but not scaled. If balanc = S, A is scaled but not permuted. If balanc = B, A is permuted and scaled. If sense = N, no reciprocal condition numbers are computed. If sense = E, reciprocal condition numbers are computed for the eigenvalues only. If sense = V, reciprocal condition numbers are computed for the right eigenvectors only. If sense = B, reciprocal condition numbers are computed for the right eigenvectors and the eigenvectors. If sense = E,B, the right and left eigenvectors must be computed.\n\nsource\nggev!(jobvl, jobvr, A, B) -> (alpha, beta, vl, vr)\n\nFinds the generalized eigendecomposition of A and B. If jobvl = N, the left eigenvectors aren't computed. If jobvr = N, the right eigenvectors aren't computed. If jobvl = V or jobvr = V, the corresponding eigenvectors are computed.\n\nsource\ngtsv!(dl, d, du, B)\n\nSolves the equation A * X = B where A is a tridiagonal matrix with dl on the subdiagonal, d on the diagonal, and du on the superdiagonal.\n\nOverwrites B with the solution X and returns it.\n\nsource\ngttrf!(dl, d, du) -> (dl, d, du, du2, ipiv)\n\nFinds the LU factorization of a tridiagonal matrix with dl on the subdiagonal, d on the diagonal, and du on the superdiagonal.\n\nModifies dl, d, and du in-place and returns them and the second superdiagonal du2 and the pivoting vector ipiv.\n\nsource\ngttrs!(trans, dl, d, du, du2, ipiv, B)\n\nSolves the equation A * X = B (trans = N), transpose(A) * X = B (trans = T), or adjoint(A) * X = B (trans = C) using the LU factorization computed by gttrf!. B is overwritten with the solution X.\n\nsource\norglq!(A, tau, k = length(tau))\n\nExplicitly finds the matrix Q of a LQ factorization after calling gelqf! on A. Uses the output of gelqf!. A is overwritten by Q.\n\nsource\norgqr!(A, tau, k = length(tau))\n\nExplicitly finds the matrix Q of a QR factorization after calling geqrf! on A. Uses the output of geqrf!. A is overwritten by Q.\n\nsource\norgql!(A, tau, k = length(tau))\n\nExplicitly finds the matrix Q of a QL factorization after calling geqlf! on A. Uses the output of geqlf!. A is overwritten by Q.\n\nsource\norgrq!(A, tau, k = length(tau))\n\nExplicitly finds the matrix Q of a RQ factorization after calling gerqf! on A. Uses the output of gerqf!. A is overwritten by Q.\n\nsource\normlq!(side, trans, A, tau, C)\n\nComputes Q * C (trans = N), transpose(Q) * C (trans = T), adjoint(Q) * C (trans = C) for side = L or the equivalent right-sided multiplication for side = R using Q from a LQ factorization of A computed using gelqf!. C is overwritten.\n\nsource\normqr!(side, trans, A, tau, C)\n\nComputes Q * C (trans = N), transpose(Q) * C (trans = T), adjoint(Q) * C (trans = C) for side = L or the equivalent right-sided multiplication for side = R using Q from a QR factorization of A computed using geqrf!. C is overwritten.\n\nsource\normql!(side, trans, A, tau, C)\n\nComputes Q * C (trans = N), transpose(Q) * C (trans = T), adjoint(Q) * C (trans = C) for side = L or the equivalent right-sided multiplication for side = R using Q from a QL factorization of A computed using geqlf!. C is overwritten.\n\nsource\normrq!(side, trans, A, tau, C)\n\nComputes Q * C (trans = N), transpose(Q) * C (trans = T), adjoint(Q) * C (trans = C) for side = L or the equivalent right-sided multiplication for side = R using Q from a RQ factorization of A computed using gerqf!. C is overwritten.\n\nsource\ngemqrt!(side, trans, V, T, C)\n\nComputes Q * C (trans = N), transpose(Q) * C (trans = T), adjoint(Q) * C (trans = C) for side = L or the equivalent right-sided multiplication for side = R using Q from a QR factorization of A computed using geqrt!. C is overwritten.\n\nsource\nposv!(uplo, A, B) -> (A, B)\n\nFinds the solution to A * X = B where A is a symmetric or Hermitian positive definite matrix. If uplo = U the upper Cholesky decomposition of A is computed. If uplo = L the lower Cholesky decomposition of A is computed. A is overwritten by its Cholesky decomposition. B is overwritten with the solution X.\n\nsource\npotrf!(uplo, A)\n\nComputes the Cholesky (upper if uplo = U, lower if uplo = L) decomposition of positive-definite matrix A. A is overwritten and returned with an info code.\n\nsource\npotri!(uplo, A)\n\nComputes the inverse of positive-definite matrix A after calling potrf! to find its (upper if uplo = U, lower if uplo = L) Cholesky decomposition.\n\nA is overwritten by its inverse and returned.\n\nsource\npotrs!(uplo, A, B)\n\nFinds the solution to A * X = B where A is a symmetric or Hermitian positive definite matrix whose Cholesky decomposition was computed by potrf!. If uplo = U the upper Cholesky decomposition of A was computed. If uplo = L the lower Cholesky decomposition of A was computed. B is overwritten with the solution X.\n\nsource\npstrf!(uplo, A, tol) -> (A, piv, rank, info)\n\nComputes the (upper if uplo = U, lower if uplo = L) pivoted Cholesky decomposition of positive-definite matrix A with a user-set tolerance tol. A is overwritten by its Cholesky decomposition.\n\nReturns A, the pivots piv, the rank of A, and an info code. If info = 0, the factorization succeeded. If info = i > 0, then A is indefinite or rank-deficient.\n\nsource\nptsv!(D, E, B)\n\nSolves A * X = B for positive-definite tridiagonal A. D is the diagonal of A and E is the off-diagonal. B is overwritten with the solution X and returned.\n\nsource\npttrf!(D, E)\n\nComputes the LDLt factorization of a positive-definite tridiagonal matrix with D as diagonal and E as off-diagonal. D and E are overwritten and returned.\n\nsource\npttrs!(D, E, B)\n\nSolves A * X = B for positive-definite tridiagonal A with diagonal D and off-diagonal E after computing A's LDLt factorization using pttrf!. B is overwritten with the solution X.\n\nsource\ntrtri!(uplo, diag, A)\n\nFinds the inverse of (upper if uplo = U, lower if uplo = L) triangular matrix A. If diag = N, A has non-unit diagonal elements. If diag = U, all diagonal elements of A are one. A is overwritten with its inverse.\n\nsource\ntrtrs!(uplo, trans, diag, A, B)\n\nSolves A * X = B (trans = N), transpose(A) * X = B (trans = T), or adjoint(A) * X = B (trans = C) for (upper if uplo = U, lower if uplo = L) triangular matrix A. If diag = N, A has non-unit diagonal elements. If diag = U, all diagonal elements of A are one. B is overwritten with the solution X.\n\nsource\ntrcon!(norm, uplo, diag, A)\n\nFinds the reciprocal condition number of (upper if uplo = U, lower if uplo = L) triangular matrix A. If diag = N, A has non-unit diagonal elements. If diag = U, all diagonal elements of A are one. If norm = I, the condition number is found in the infinity norm. If norm = O or 1, the condition number is found in the one norm.\n\nsource\ntrevc!(side, howmny, select, T, VL = similar(T), VR = similar(T))\n\nFinds the eigensystem of an upper triangular matrix T. If side = R, the right eigenvectors are computed. If side = L, the left eigenvectors are computed. If side = B, both sets are computed. If howmny = A, all eigenvectors are found. If howmny = B, all eigenvectors are found and backtransformed using VL and VR. If howmny = S, only the eigenvectors corresponding to the values in select are computed.\n\nsource\ntrrfs!(uplo, trans, diag, A, B, X, Ferr, Berr) -> (Ferr, Berr)\n\nEstimates the error in the solution to A * X = B (trans = N), transpose(A) * X = B (trans = T), adjoint(A) * X = B (trans = C) for side = L, or the equivalent equations a right-handed side = R X * A after computing X using trtrs!. If uplo = U, A is upper triangular. If uplo = L, A is lower triangular. If diag = N, A has non-unit diagonal elements. If diag = U, all diagonal elements of A are one. Ferr and Berr are optional inputs. Ferr is the forward error and Berr is the backward error, each component-wise.\n\nsource\nstev!(job, dv, ev) -> (dv, Zmat)\n\nComputes the eigensystem for a symmetric tridiagonal matrix with dv as diagonal and ev as off-diagonal. If job = N only the eigenvalues are found and returned in dv. If job = V then the eigenvectors are also found and returned in Zmat.\n\nsource\nstebz!(range, order, vl, vu, il, iu, abstol, dv, ev) -> (dv, iblock, isplit)\n\nComputes the eigenvalues for a symmetric tridiagonal matrix with dv as diagonal and ev as off-diagonal. If range = A, all the eigenvalues are found. If range = V, the eigenvalues in the half-open interval (vl, vu] are found. If range = I, the eigenvalues with indices between il and iu are found. If order = B, eigvalues are ordered within a block. If order = E, they are ordered across all the blocks. abstol can be set as a tolerance for convergence.\n\nsource\nstegr!(jobz, range, dv, ev, vl, vu, il, iu) -> (w, Z)\n\nComputes the eigenvalues (jobz = N) or eigenvalues and eigenvectors (jobz = V) for a symmetric tridiagonal matrix with dv as diagonal and ev as off-diagonal. If range = A, all the eigenvalues are found. If range = V, the eigenvalues in the half-open interval (vl, vu] are found. If range = I, the eigenvalues with indices between il and iu are found. The eigenvalues are returned in w and the eigenvectors in Z.\n\nsource\nstein!(dv, ev_in, w_in, iblock_in, isplit_in)\n\nComputes the eigenvectors for a symmetric tridiagonal matrix with dv as diagonal and ev_in as off-diagonal. w_in specifies the input eigenvalues for which to find corresponding eigenvectors. iblock_in specifies the submatrices corresponding to the eigenvalues in w_in. isplit_in specifies the splitting points between the submatrix blocks.\n\nsource\nsyconv!(uplo, A, ipiv) -> (A, work)\n\nConverts a symmetric matrix A (which has been factorized into a triangular matrix) into two matrices L and D. If uplo = U, A is upper triangular. If uplo = L, it is lower triangular. ipiv is the pivot vector from the triangular factorization. A is overwritten by L and D.\n\nsource\nsysv!(uplo, A, B) -> (B, A, ipiv)\n\nFinds the solution to A * X = B for symmetric matrix A. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored. B is overwritten by the solution X. A is overwritten by its Bunch-Kaufman factorization. ipiv contains pivoting information about the factorization.\n\nsource\nsytrf!(uplo, A) -> (A, ipiv, info)\n\nComputes the Bunch-Kaufman factorization of a symmetric matrix A. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored.\n\nReturns A, overwritten by the factorization, a pivot vector ipiv, and the error code info which is a non-negative integer. If info is positive the matrix is singular and the diagonal part of the factorization is exactly zero at position info.\n\nsource\nsytri!(uplo, A, ipiv)\n\nComputes the inverse of a symmetric matrix A using the results of sytrf!. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored. A is overwritten by its inverse.\n\nsource\nsytrs!(uplo, A, ipiv, B)\n\nSolves the equation A * X = B for a symmetric matrix A using the results of sytrf!. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored. B is overwritten by the solution X.\n\nsource\nhesv!(uplo, A, B) -> (B, A, ipiv)\n\nFinds the solution to A * X = B for Hermitian matrix A. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored. B is overwritten by the solution X. A is overwritten by its Bunch-Kaufman factorization. ipiv contains pivoting information about the factorization.\n\nsource\nhetrf!(uplo, A) -> (A, ipiv, info)\n\nComputes the Bunch-Kaufman factorization of a Hermitian matrix A. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored.\n\nReturns A, overwritten by the factorization, a pivot vector ipiv, and the error code info which is a non-negative integer. If info is positive the matrix is singular and the diagonal part of the factorization is exactly zero at position info.\n\nsource\nhetri!(uplo, A, ipiv)\n\nComputes the inverse of a Hermitian matrix A using the results of sytrf!. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored. A is overwritten by its inverse.\n\nsource\nhetrs!(uplo, A, ipiv, B)\n\nSolves the equation A * X = B for a Hermitian matrix A using the results of sytrf!. If uplo = U, the upper half of A is stored. If uplo = L, the lower half is stored. B is overwritten by the solution X.\n\nsource\nsyev!(jobz, uplo, A)\n\nFinds the eigenvalues (jobz = N) or eigenvalues and eigenvectors (jobz = V) of a symmetric matrix A. If uplo = U, the upper triangle of A is used. If uplo = L, the lower triangle of A is used.\n\nsource\nsyevr!(jobz, range, uplo, A, vl, vu, il, iu, abstol) -> (W, Z)\n\nFinds the eigenvalues (jobz = N) or eigenvalues and eigenvectors (jobz = V) of a symmetric matrix A. If uplo = U, the upper triangle of A is used. If uplo = L, the lower triangle of A is used. If range = A, all the eigenvalues are found. If range = V, the eigenvalues in the half-open interval (vl, vu] are found. If range = I, the eigenvalues with indices between il and iu are found. abstol can be set as a tolerance for convergence.\n\nThe eigenvalues are returned in W and the eigenvectors in Z.\n\nsource\nsygvd!(itype, jobz, uplo, A, B) -> (w, A, B)\n\nFinds the generalized eigenvalues (jobz = N) or eigenvalues and eigenvectors (jobz = V) of a symmetric matrix A and symmetric positive-definite matrix B. If uplo = U, the upper triangles of A and B are used. If uplo = L, the lower triangles of A and B are used. If itype = 1, the problem to solve is A * x = lambda * B * x. If itype = 2, the problem to solve is A * B * x = lambda * x. If itype = 3, the problem to solve is B * A * x = lambda * x.\n\nsource\nbdsqr!(uplo, d, e_, Vt, U, C) -> (d, Vt, U, C)\n\nComputes the singular value decomposition of a bidiagonal matrix with d on the diagonal and e_ on the off-diagonal. If uplo = U, e_ is the superdiagonal. If uplo = L, e_ is the subdiagonal. Can optionally also compute the product Q' * C.\n\nReturns the singular values in d, and the matrix C overwritten with Q' * C.\n\nsource\nbdsdc!(uplo, compq, d, e_) -> (d, e, u, vt, q, iq)\n\nComputes the singular value decomposition of a bidiagonal matrix with d on the diagonal and e_ on the off-diagonal using a divide and conqueq method. If uplo = U, e_ is the superdiagonal. If uplo = L, e_ is the subdiagonal. If compq = N, only the singular values are found. If compq = I, the singular values and vectors are found. If compq = P, the singular values and vectors are found in compact form. Only works for real types.\n\nReturns the singular values in d, and if compq = P, the compact singular vectors in iq.\n\nsource\ngecon!(normtype, A, anorm)\n\nFinds the reciprocal condition number of matrix A. If normtype = I, the condition number is found in the infinity norm. If normtype = O or 1, the condition number is found in the one norm. A must be the result of getrf! and anorm is the norm of A in the relevant norm.\n\nsource\ngehrd!(ilo, ihi, A) -> (A, tau)\n\nConverts a matrix A to Hessenberg form. If A is balanced with gebal! then ilo and ihi are the outputs of gebal!. Otherwise they should be ilo = 1 and ihi = size(A,2). tau contains the elementary reflectors of the factorization.\n\nsource\norghr!(ilo, ihi, A, tau)\n\nExplicitly finds Q, the orthogonal/unitary matrix from gehrd!. ilo, ihi, A, and tau must correspond to the input/output to gehrd!.\n\nsource\ngees!(jobvs, A) -> (A, vs, w)\n\nComputes the eigenvalues (jobvs = N) or the eigenvalues and Schur vectors (jobvs = V) of matrix A. A is overwritten by its Schur form.\n\nReturns A, vs containing the Schur vectors, and w, containing the eigenvalues.\n\nsource\ngges!(jobvsl, jobvsr, A, B) -> (A, B, alpha, beta, vsl, vsr)\n\nComputes the generalized eigenvalues, generalized Schur form, left Schur vectors (jobsvl = V), or right Schur vectors (jobvsr = V) of A and B.\n\nThe generalized eigenvalues are returned in alpha and beta. The left Schur vectors are returned in vsl and the right Schur vectors are returned in vsr.\n\nsource\ntrexc!(compq, ifst, ilst, T, Q) -> (T, Q)\n\nReorder the Schur factorization of a matrix. If compq = V, the Schur vectors Q are reordered. If compq = N they are not modified. ifst and ilst specify the reordering of the vectors.\n\nsource\ntrsen!(compq, job, select, T, Q) -> (T, Q, w, s, sep)\n\nReorder the Schur factorization of a matrix and optionally finds reciprocal condition numbers. If job = N, no condition numbers are found. If job = E, only the condition number for this cluster of eigenvalues is found. If job = V, only the condition number for the invariant subspace is found. If job = B then the condition numbers for the cluster and subspace are found. If compq = V the Schur vectors Q are updated. If compq = N the Schur vectors are not modified. select determines which eigenvalues are in the cluster.\n\nReturns T, Q, reordered eigenvalues in w, the condition number of the cluster of eigenvalues s, and the condition number of the invariant subspace sep.\n\nsource\ntgsen!(select, S, T, Q, Z) -> (S, T, alpha, beta, Q, Z)\n\nReorders the vectors of a generalized Schur decomposition. select specifies the eigenvalues in each cluster.\n\nsource\ntrsyl!(transa, transb, A, B, C, isgn=1) -> (C, scale)\n\nSolves the Sylvester matrix equation A * X +/- X * B = scale*C where A and B are both quasi-upper triangular. If transa = N, A is not modified. If transa = T, A is transposed. If transa = C, A is conjugate transposed. Similarly for transb and B. If isgn = 1, the equation A * X + X * B = scale * C is solved. If isgn = -1, the equation A * X - X * B = scale * C is solved.\n\nReturns X (overwriting C) and scale.\n\nsource"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.6378969,"math_prob":0.99098825,"size":129220,"snap":"2020-45-2020-50","text_gpt3_token_len":45933,"char_repetition_ratio":0.21121223,"word_repetition_ratio":0.38975322,"special_character_ratio":0.33155084,"punctuation_ratio":0.21795456,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9979897,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-11-30T17:29:32Z\",\"WARC-Record-ID\":\"<urn:uuid:a72a647b-0753-47dc-bc06-e96f0f0613e0>\",\"Content-Length\":\"428884\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:ac939012-cf66-4ebf-bc7e-8fd257ceaa07>\",\"WARC-Concurrent-To\":\"<urn:uuid:cb48526d-033b-4d6d-b6c3-90591282491b>\",\"WARC-IP-Address\":\"199.232.66.49\",\"WARC-Target-URI\":\"https://docs.julialang.org/en/v1.0.0/stdlib/LinearAlgebra/\",\"WARC-Payload-Digest\":\"sha1:QVUYR7GEB5KCAVUXQQAPZYAU5Y4MXKEO\",\"WARC-Block-Digest\":\"sha1:CFO2XVHNZT6AYEFXCDTQ6TVPBY5TDJHB\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-50/CC-MAIN-2020-50_segments_1606141216897.58_warc_CC-MAIN-20201130161537-20201130191537-00682.warc.gz\"}"} |
http://www.study-area.org/coobila/tutorial_429.html | [
"2-4 繼承\n\n*注意: C++所有語法大小寫有差. 如果您在執行時發現中文無法顯示請自行將程式修改成英文.\n\n*注意: 如果您執行程式後, 程式視窗會自動關閉的話, 請至MS-DOS模式重新執行程式, 或是在void main()最底端加上system(\"PAUSE\");來暫停程式.\n\n ```#include #include class car //通用的房車類別 { protected: int count_wheels; //紀錄這個物件有幾個輪子 (房車應該都是4個輪子吧) public: car(); // 這是初始函式, 會設定車子的輪子數量為4 }; class mercedes : car { private: int price; //價格 public: mercedes(); // 這是初始函式, 會設定這台賓士房車的價格與輪子數量 void output(); // 此函式會列出Mercedes房車的基本資料 }; class honda : car { private: int price; //價格 public: honda(); // 這是初始函式, 會設定這台Honda房車的價格與輪子數量 void output(); // 此函式會列出Honda房車的基本資料 }; car::car() { count_wheels = 4; } mercedes::mercedes() { price = 2000000; } void mercedes::output() { cout << \"-------------------------\" << endl; cout << \"Mercedes高級房車 - 新款報價\" << endl; cout << \"-------------------------\" << endl; cout << \"輪子:\" << count_wheels << endl; cout << \"售價;\" << price << \"新台幣\" << endl; cout << \"-------------------------\" << endl; } honda::honda() { price = 700000; } void honda::output() { cout << \"-------------------------\" << endl; cout << \"Honda房車 - 新款報價\" << endl; cout << \"-------------------------\" << endl; cout << \"輪子:\" << count_wheels << endl; cout << \"售價;\" << price << \"新台幣\" << endl; cout << \"-------------------------\" << endl; } void main() { honda car1; mercedes car2; car1.output(); car2.output(); system(\"PAUSE\"); } ```\n\nCar類別本身是一個通用的類別, 代表的是一台基本的車子 (四顆輪子)."
] | [
null
] | {"ft_lang_label":"__label__zh","ft_lang_prob":0.6359579,"math_prob":0.8735511,"size":1790,"snap":"2021-43-2021-49","text_gpt3_token_len":1104,"char_repetition_ratio":0.24524076,"word_repetition_ratio":0.3004292,"special_character_ratio":0.3837989,"punctuation_ratio":0.32962963,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9830483,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-11-28T08:16:21Z\",\"WARC-Record-ID\":\"<urn:uuid:60e3ba97-e882-4fd4-a4fe-c7d173693b9b>\",\"Content-Length\":\"4656\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2f69e601-926a-4bd0-9b2f-aa36bc25c522>\",\"WARC-Concurrent-To\":\"<urn:uuid:9c831d1a-e65f-4ec3-95c8-6145cb2a693d>\",\"WARC-IP-Address\":\"163.16.5.180\",\"WARC-Target-URI\":\"http://www.study-area.org/coobila/tutorial_429.html\",\"WARC-Payload-Digest\":\"sha1:UQT3VEFOEB7BTVHY2BBZPCCMVCHV3F27\",\"WARC-Block-Digest\":\"sha1:Z52AKGAOZT4PNB5JF4V2EDJHZKONBTTX\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-49/CC-MAIN-2021-49_segments_1637964358480.10_warc_CC-MAIN-20211128073830-20211128103830-00591.warc.gz\"}"} |
https://teamtreehouse.com/community/is-it-a-bad-idea-to-combine-two-variables-like-i-did-here | [
"",
null,
"# Is it a bad idea to combine two variables like I did here\n\nI was wondering if combining two variables in to one is a good idea or not. Here's what I'm talking about\n\n```const randomNumber = Math.floor( Math.random() * ( parseInt(inputHigh) ) ) + 1;\n```\n\nThese are the two variables I combined (These are from Guil's variables)\n\n```const highNumber = parseInt(highNumber);\n\nconst randomNumber = Math.floor( Math.random() * highNumber) + 1 );\n```\n\nIs it bad practice to do this?\n\nP.S I kind of did this on accident, I'm just wondering if it's ok to do it or not. Thank you!\n\n## 1 Answer",
null,
"MOD\n\nThe answer is... it depends.\n\nThis is a great question to ask.\n\nIf you are writing pilot code that only you will use while developing an idea then it's fine. You want to brainstorm. You can always go back and refactor.\n\nBut if you are writing production code you would want to break it down further.\n\nIn production, you might want to tell a user about errors. So if they input a non-integer you would want to tell them about it and give them an alternate opportunity to correct it. When you have broken it down, then you will have the ability to put additional code to trap the error and deal with it.\n\nGood luck with your Python journey and remember to have fun and experiment!!"
] | [
null,
"https://uploads.teamtreehouse.com/production/profile-photos/11585855/micro_Screen_Shot_2020-12-12_at_10.44.29_PM.jpg",
null,
"https://uploads.teamtreehouse.com/production/profile-photos/5900142/micro_jeff_face.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9206607,"math_prob":0.67220205,"size":1364,"snap":"2021-04-2021-17","text_gpt3_token_len":326,"char_repetition_ratio":0.09191176,"word_repetition_ratio":0.016597511,"special_character_ratio":0.24120234,"punctuation_ratio":0.12142857,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.961711,"pos_list":[0,1,2,3,4],"im_url_duplicate_count":[null,1,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-20T22:04:45Z\",\"WARC-Record-ID\":\"<urn:uuid:2c623981-2936-4c25-b63b-f3cd0b5cc454>\",\"Content-Length\":\"64689\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:83e765a5-84ec-44e7-8682-7a1c559a963d>\",\"WARC-Concurrent-To\":\"<urn:uuid:50847c1e-907b-45e9-b328-53d699fc7c9c>\",\"WARC-IP-Address\":\"3.94.15.124\",\"WARC-Target-URI\":\"https://teamtreehouse.com/community/is-it-a-bad-idea-to-combine-two-variables-like-i-did-here\",\"WARC-Payload-Digest\":\"sha1:L2WEUUQCQU56RLJD373U5CU5DG3NDFBL\",\"WARC-Block-Digest\":\"sha1:O5RRNESGGQCGWPZHC5PS2OTIY56H52E6\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618039491784.79_warc_CC-MAIN-20210420214346-20210421004346-00439.warc.gz\"}"} |
https://en.m.wikibooks.org/wiki/IB_Chemistry/Energetics | [
"# IB Chemistry/Energetics\n\n## 6.1 Exothermic and Endothermic Reactions\n\n6.1.1 : If the reaction produces heat (increases the temperature of the surroundings) then it's exothermic. If it decreases the temp (that is, absorbs heat) then it's endothermic. Also, the yield of an equilibrium reaction which is exothermic will be increased if it occurs at low temps, and so for endothermic reactions at high temps.\n\n6.1.2 : Exothermic -> a reaction which produces heat. Endothermic -> a reaction which absorbs heat. Enthalpy of reaction -> the change in internal energy (H) through a reaction is ∆H.\n\n6.1.3 : ∆H will be negative for exothermic reactions (because internal heat is being lost) and positive for endothermic reactions (because internal energy is being gained).\n\n6.1.4 : The most stable state is where all energy has been released...therefore when going to a more stable state, energy will be released, and when going to a less stable state, energy will be gained. On an enthalpy level diagrams, higher positions will be less stable (with more internal energy) therefore, if the product is lower, heat is released (more stable, ∆H is -ve) but if it is higher, heat is gained (less stable, ∆H is +ve).\n\n6.1.5 : Formation of bonds -> release of energy. Breaking of bonds -> gain / absorption of energy.\n\n## 6.2 Calculation of enthalpy changes\n\n6.2.1 : change in energy = mass x specific heat capacity x change in temperature --> E = mc∆T\n\n6.2.2 : Enthalpy changes (∆H) are related to the number of moles in the reaction...if all the coefficients are doubled, then the value of ∆H will be doubled (attention must be paid to limiting reagents though).\n\n6.2.3 : When a reaction is carried out in water, the water will gain or lose heat from (or to) the reaction, with hopefully little escaping the water. Therefore, the change in energy, and so the ∆H value, can be calculated with E = mc∆T where E is equal to ∆H, m is the mass of water present, and c = 4.18 kJ Kg-1 K-1. This ∆H value can then be calculated back to find the enthalpy change for each mol of reactants.\n\n6.2.4 : The solution should be placed in a container as insulated as possible, to keep as much heat as possible from escaping. The temperature should be measured continuously , and the value used in the equation is the maximum change in temp from the initial position.\n\n6.2.5 : The results will be a change in temperature. this can be converted into a change in heat (or energy) by using the above equation and a known mass of water. this can be used to calculate the ∆H for the amount of reactants present, and then this can be used to calculate for a given number of mols.\n\n## 6.3 Hess' Law\n\n6.3.1 : Hess' Law states that the total enthalpy change between given reactants and products is that same regardless of any intermediate steps (or the reaction pathway). To calculate:\n\n1) Reverse any reactions which are going the wrong way and invert the sign of their ∆H values (multiply by -1)\n\n2) Divide or multiply the reactions until the intermediate products will cancel out when the reactions are vertically added (always multiply/divide the ∆H value by the same number)\n\n3) Vertically add the reactions.\n\n4) Divide or multiply the resulting reaction to the correct coefficients.\n\n## 6.4 Bond enthalpies\n\n6.4.1 : Bond enthalpy (aka dissociation enthalpy) -- the enthalpy change when one mole of bonds are broken homolitically in the gas phase. ie X-Y(g) -> X(g) + Y(g) : ∆H(dissociation). Molecules such as CH4 have multiple C-H bonds to be broken, and so the bond enthalpy for C-H is actually an average value. These values can be used to calculate unknown enthalpy changes in reactions where only a few bonds are being formed/broken.\n\n6.4.2 : If the reaction can be expressed in terms of the breaking and formation of bonds in a gaseous state, then by adding (or subtracting when bonds are formed) the ∆H values the total enthalpy of reaction can be found.\n\n## 6.5 Entropy\n\n6.5.1 An increased disorder (entropy) can be caused by mixing two different types of particles, increased movement of particles (including state changes), or increased number of particles. Increasing the number of particles in a gaseous state gives the largest change in entropy.\n\n6.5.2 Since ∆S = -∆H/T, if ∆H is -, then ∆s is positive, and visa versa.\n\n## 6.6 Free Energy\n\n6.6.1 Standard free energy of reaction is the free energy that a reaction takes or gives at standard values of temperature and pressure. ∆G = ∆H - T.∆S\n\n6.6.2 If ∆G is negative, the reaction is spontaneous. If ∆G is positive, the reaction is not spontaneous.\n\n6.6.3 If ∆sT > ∆H, the reaction is spontaneous. If temperature drops so that ∆sT < ∆H, then the reaction is non-spontaneous.\n\n# HL Material\n\n15.1\n\n15.1.1 Standard state is what the element naturally tends to be at. The standard enthalpy of formation is the change in enthalpy that accompanies the formation of one mole of a compound from its elements with all substances in their standard states.\n\n15.1.2 ∆Hof = ∑∆Hof products - ∑∆Hof reactants\n\n15.2\n\n15.2.1 Lattice Enthalpy is the enthalpy of a lattice structure, such as a diamond. If the sign of the enthalpy is negative, the lattice is formed. If +, it does not.\n\n15.3\n\n15.3.1 ∆S = ∆Sproducts - ∆Sreactants\n\n15.3.2 Use the equation ∆G = ∆H –T∆S or ∆G = ∆Gproducts - ∆Greactants"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.8889918,"math_prob":0.9817407,"size":5284,"snap":"2022-40-2023-06","text_gpt3_token_len":1390,"char_repetition_ratio":0.14526515,"word_repetition_ratio":0.009857613,"special_character_ratio":0.250757,"punctuation_ratio":0.14104882,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99475217,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-09-26T04:36:54Z\",\"WARC-Record-ID\":\"<urn:uuid:5217b222-4417-4e95-bd18-ce7cd25b6b48>\",\"Content-Length\":\"30219\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e1253f5f-8166-4c3c-8a5a-9d76f03c2df1>\",\"WARC-Concurrent-To\":\"<urn:uuid:c435a700-d521-4e99-8cfc-eb4f4d67881f>\",\"WARC-IP-Address\":\"208.80.154.224\",\"WARC-Target-URI\":\"https://en.m.wikibooks.org/wiki/IB_Chemistry/Energetics\",\"WARC-Payload-Digest\":\"sha1:OZ6TQTVCYZBSNYFWVQRJB5NFNEZPS2NU\",\"WARC-Block-Digest\":\"sha1:REUQCHP5WCMPSIEQ572GM5VJYALNSCQF\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-40/CC-MAIN-2022-40_segments_1664030334644.42_warc_CC-MAIN-20220926020051-20220926050051-00000.warc.gz\"}"} |
https://answers.everydaycalculation.com/lcm/150-42 | [
"Solutions by everydaycalculation.com\n\n## What is the LCM of 150 and 42?\n\nThe lcm of 150 and 42 is 1050.\n\n#### Steps to find LCM\n\n1. Find the prime factorization of 150\n150 = 2 × 3 × 5 × 5\n2. Find the prime factorization of 42\n42 = 2 × 3 × 7\n3. Multiply each factor the greater number of times it occurs in steps i) or ii) above to find the lcm:\n\nLCM = 2 × 3 × 5 × 5 × 7\n4. LCM = 1050\n\nMathStep (Works offline)",
null,
"Download our mobile app and learn how to find LCM of upto four numbers in your own time:"
] | [
null,
"https://answers.everydaycalculation.com/mathstep-app-icon.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.7160201,"math_prob":0.99882555,"size":488,"snap":"2019-51-2020-05","text_gpt3_token_len":160,"char_repetition_ratio":0.15289256,"word_repetition_ratio":0.0,"special_character_ratio":0.4385246,"punctuation_ratio":0.082474224,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99629074,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-01-24T18:32:15Z\",\"WARC-Record-ID\":\"<urn:uuid:7f8df391-df2d-4d42-8f6c-bfcde06ee952>\",\"Content-Length\":\"5873\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:cbbd93c9-6dbd-4429-b223-eca3beb92d96>\",\"WARC-Concurrent-To\":\"<urn:uuid:b68934fd-0785-4bfa-ab1e-a2684b069ea5>\",\"WARC-IP-Address\":\"96.126.107.130\",\"WARC-Target-URI\":\"https://answers.everydaycalculation.com/lcm/150-42\",\"WARC-Payload-Digest\":\"sha1:DJF2JPCXWEHRRXHRMFQFUFBG6OAL3BHJ\",\"WARC-Block-Digest\":\"sha1:BLNWNRLN6J4NWKTSTMPAFUSEHKOW2GZU\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-05/CC-MAIN-2020-05_segments_1579250624328.55_warc_CC-MAIN-20200124161014-20200124190014-00389.warc.gz\"}"} |
https://mathoverflow.net/questions/76101/segre-classes-vs-chern-classes | [
"Segre classes vs Chern classes\n\nFor a smooth projective variety X and a coherent sheaf S on it, you can consider the projective cone $\\pi:\\mathbb{P}S \\rightarrow X$. You can consider $\\mathcal{O}(1)$ on $\\mathbb{P}S$ and define the Segre series a la Fulton:\n\n$$s(S,t) = \\pi_*\\left(\\frac {1}{t-c_1(\\mathcal{O}(1))}\\right) \\in A^*(X)$$ I can also take a finite projective resolution of $S$ by vector bundles, and ask how to express $s(S,t)$ in terms of the Chern classes of these bundles.\n\n• It appears that the fraction in your displayed formula is improperly formed; that;s why the formula doesn't parse properly. – Thierry Zell Sep 22 '11 at 3:44\n• I've edited the LaTeX, please check if I have ruined what you meant to write. – David Roberts Sep 22 '11 at 4:36\n\nFor a vector bundle $E$ its Segre class is defined as $$s(E) = \\prod(1+x_i)^{-1},$$ where $x_i$ are Chern roots of $E$. Because of this it is clear that Segre class is multiplicative in short exact sequences. Therefore for a coherent sheaf $S$ if $$0 \\to E_n \\to \\dots \\to E_2 \\to E_1 \\to E_0 \\to S \\to 0$$ is a locally free resolution then $$s(S) = s(E_0)s(E_1)^{-1}s(E_2)\\cdots(E_n)^{(-1)^n}.$$\nIn this case (proj dim of $\\mathcal{S} \\geq 2$), one should not expect that $s(\\mathcal{S}) = c^{-1}(\\mathcal{S})$. In fact, the example I care about is such that the coherent sheaf is supported on a codimension 2 subvariety of $X$ and one has:\n$$s(\\mathcal{S},t) = c^{-1}(\\mathcal{S},t) - 1 + t\\cdot c_1(\\mathcal{S})$$ I did this computation in mathematica, via equivariant localization, for the very particular case I had in mind. But I do not know how to prove it, or what does it generalize to."
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.75365645,"math_prob":0.9994197,"size":455,"snap":"2019-43-2019-47","text_gpt3_token_len":142,"char_repetition_ratio":0.11308204,"word_repetition_ratio":0.0,"special_character_ratio":0.30989012,"punctuation_ratio":0.082474224,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.99985373,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-10-15T20:14:42Z\",\"WARC-Record-ID\":\"<urn:uuid:a2a6f871-22d2-4d55-a420-4fa01b8e01ff>\",\"Content-Length\":\"123765\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:44d2623c-82ec-4c46-ad92-d54e13d63391>\",\"WARC-Concurrent-To\":\"<urn:uuid:26a54a3b-d24d-4c48-92c6-bc08d837dc3e>\",\"WARC-IP-Address\":\"151.101.193.69\",\"WARC-Target-URI\":\"https://mathoverflow.net/questions/76101/segre-classes-vs-chern-classes\",\"WARC-Payload-Digest\":\"sha1:EDQLIRYEHFNODF4BZPNT5SQFW66X5JFN\",\"WARC-Block-Digest\":\"sha1:O6NO7YUCGG7QVJ7AVXXGK7CMVBC2G2FZ\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-43/CC-MAIN-2019-43_segments_1570986660231.30_warc_CC-MAIN-20191015182235-20191015205735-00069.warc.gz\"}"} |
http://answers.gkplanet.in/2019/07/energy-from-sun-reaches-earth-mostly-by.html | [
"# Energy from the sun reaches Earth mostly by\n\nQ. Energy from the sun reaches Earth mostly by\n1. conduction.\n2. convection.\n4. thermal expansion.\n\nHeat from sun reaches us by radiation. Air between is not heated.\nIn physics, radiation is the emission or transmission of energy in the form of waves or particles through space or through a material medium.\nQ.\nAssertion: Heat from the sun reaches the earth by convection.\nReason: Air can be heated only by convection\n1. If both, Assertion and Reason are true and Reason is the correct explanation of the Assertion.\n2. If both, Assertion and Reason are true but Reason is not a correct explanation of the Assertion.\n3. If Assertion is true but the Reason is false.\n4. If A is false but R is true\nWhen a fluid, such as air or a liquid, is heated and then travels away from the source, it carries the thermal energy along. This type of heat transfer is called convection.",
null,
"Thanks for reading Energy from the sun reaches Earth mostly by\n\n←Previous\n« Prev Post\nNext→\nNext Post »"
] | [
null,
"http://1.bp.blogspot.com/-39HRU19h4kk/VlrZJ1KEjiI/AAAAAAAAMxI/RYXIg2OkzQA/s1600/blog%2Bblogger%2Bblogging.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.9429236,"math_prob":0.89475715,"size":998,"snap":"2020-45-2020-50","text_gpt3_token_len":221,"char_repetition_ratio":0.1529175,"word_repetition_ratio":0.11299435,"special_character_ratio":0.21543086,"punctuation_ratio":0.135,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.95940775,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2020-10-20T12:26:59Z\",\"WARC-Record-ID\":\"<urn:uuid:85d8364a-1650-4acb-877b-6e450346d14b>\",\"Content-Length\":\"202271\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:2d6a88f7-fa0c-4ef6-8625-6b1a044bd354>\",\"WARC-Concurrent-To\":\"<urn:uuid:db0b97b2-4f8d-4095-b441-8f41e23bef11>\",\"WARC-IP-Address\":\"172.217.7.211\",\"WARC-Target-URI\":\"http://answers.gkplanet.in/2019/07/energy-from-sun-reaches-earth-mostly-by.html\",\"WARC-Payload-Digest\":\"sha1:F2RXVJIDXFAQMQH6GS2D7XTMLHHIDTUT\",\"WARC-Block-Digest\":\"sha1:XSRRN4Y5DETVQR3SA273P5IOKH4V4FSU\",\"WARC-Identified-Payload-Type\":\"application/xhtml+xml\",\"warc_filename\":\"/cc_download/warc_2020/CC-MAIN-2020-45/CC-MAIN-2020-45_segments_1603107872686.18_warc_CC-MAIN-20201020105000-20201020135000-00660.warc.gz\"}"} |
https://docslib.org/doc/2191860/1-observables-2-schr%C3%B6dingers-equation | [
"<<\n\n, Hamiltonian, Schrodinger¨ Equation\n\n1 Observables\n\nAn is a physical quantity, such as energy, or , that can be measured; think of a measuring device with a pointer from which you can read off a which is the outcome of the . For a k-state quantum system, observables correspond to k×k hermitian matrices. Recall that † a matrix M is hermitian iff M = M. Since M is hermitian, it has an orthonormal set of eigenvectors φ j with real eigenvalues λ j. If the of the system is ψ , what is the outcome of the measurement\n\nM? To understand this, let us write ψ = a0φ0 + ··· + ak−1 φk− 1 in the { φ j }-basis. Now, the result of 2 the measurement is λ j (this is real number we read off our measurement device) with probability |a j| .\n\nMoreover, the state of the system is reset to φ j .\n\nIt should be clear how this description of a measurement corresponds to what we described earlier while expaining the measurement principle: there a measurement was specified by picking an orthonormal basis 2 { φ j }, and the measurement outcome was j with probability |a j| . The sequence of real numbers λ j simply provide a way of specifying what the pointer of the measurement device indicates for the j-th outcome.\n\nMoreover given any orthonormal basis φ j and the sequence of real numbers λ j, we can reconstruct a hermitian matrix M as: M = ∑k−1 λ φ φ ; in the { φ }-basis this is just a diagonal matrix with the λ s j=0 j j j j j on the diagonal.\n\nFor example, if we wished to measure in the + , − -basis, with measurement results 1 and −1 respec- 1/ 2 1/2 1/2 −1/2 0 1 tively, then the corresponding is M = − = \u0012 1/2 1/2 \u0013 \u0012 −1/2 1/2 \u0013 \u0012 1 0 \u0013 One important observable of any quantum system is its energy; the corresponding hermitian matrix or op- erator is called the Hamiltonian. The eigenvectors of this operator are the states of the system with definite energy, and the eigenvectors are the numerical values of the energies of these eigenstates. As we saw above, the outcome of the measurement M is probabilistic. Thus if M were the Hamiltonian of the system, we could ask for a given state ψ, ”what is the expected energy of this state?” In our notation ∑k−1 2λ ψ ψ above, this expected value would be j=0 |a j| j. This is exactly the value of the bilinear form M .\n\nHow much does the value of the energy of the state ψ vary from measurement to measurement? One way of estimating this is to talk about the variance, Var (X) of the measurement outcome. Recall that\n\nVar(X)= E(X 2) − E(X)2. So to compute the variance we must figure out E(X 2), the expected value of ∑k−1 2λ 2 the square of the energy. This expected value is j=0 |a j| j . This is exactly the value of the bilinear form ψ M2 ψ . 2 2 2 2 So the variance of the measurement outcome Var(X)= E(X ) − E(X) = φ M φ − ( φ M φ ) .\n\n2 Schr¨odinger’s Equation\n\nSchr¨odinger’s equation is the most fundamental equation in quantum — it is the equation of which describes the evolution in of the quantum state.\n\nd ψ(t) ih¯ = H ψ(t) . dt\n\nHere H is the Hamiltonian or energy operator, and h¯ is a constant (called Planck’s constant – for now we will simply select our units such that h¯ = 1, )\n\nCS 347, Fall 2007, 1 To understand Schr¨odinger’s equation, it is instructive to analyze what it tells us about the of the eigenstates of the Hamiltonian H. So let us assume that ψ(0) = φ j , an eigenvector of H with d ψ(0) eigenvalue λ . Now by Schr¨odinger’s equation, ∝ H φ ∝ φ . Thus ψ(t) = a(t) φ . j dt j j j φ da(t) j φ da(t) φ λ φ Substituting into Schr¨odinger’s equation, we get: i dt = H a(t) j . Therefore i dt j = a(t) j j . da t λ i ( ) λ dt. Integrating both sides with respect to t: i lna t λ t. Therefore a t e−i jt , and =⇒ a(t) = j ( )= j ( )= −iλ t ψ(t) = e j φ j .\n\nSo each energy eigenstate φ j is left invariant over time, but its phase precesses at a rate proportional to its energy λ j.\n\nλ ψ φ ψ −i jt φ What about a general quantum state (0) = ∑ j a j j ? By linearity, (t) = ∑ j a je j .\n\nWe can write this as a matrix equation:\n\ni − λ1t e h¯ 0 a0 . . ψ(t) = = U(t) ψ(0) . . i − λdt a 0 e h¯ d We have proved that if the Hamiltonian H is time independent, then Schr¨odinger’s equation implies that the time evolution of the quantum system is unitary. Moreover, the time evolution operator U(t) is diagonal in the basis of eigenvectors of H.\n\n3 Why the Hamiltonian?\n\nLet us try to understand why the energy operator governs the time evolution of the quantum state in Schr¨odinger’s equation. We start with the unitary evolution axiom of , which states that time evolution is given by a U. Moreover, any unitary operator can be written as U = eiM where M is a hermitian matrix. 1 Consider a ”time independent situation”, where the external conditions to which the system is subjected do not change in time. Let eiM be the unitary operator corresponding to evolution for one unit of time. So the time evolution for two units of time is given by:\n\nU(2)= U(1)U(1)= eiMeiM = ei2M\n\nIn general, the time evolution for n units of time is given by U(n)= einM, and we can express this as\n\nU(t)= eiMt\n\nEnergy is probably the most important physical observable characterizing the system. We will now show why energy is intimately related to time evolution. The basic fact is that in physical situations in which the external conditions are unchanged in time, energy is conserved (if the external conditions change, the energy of the system can change; for example the system collides with an external particle. Of course, we can enlarge our definition of the ”system” to include the external particle, and then the total energy is conserved).\n\nθ 1This follows from the fact that U has an orthonormal set of eigenvectors with complex eigenvalues {ei }. Let M be the hermitian matrix with the same eigenvectors and eigenvalues {θ}.\n\nCS 347, Fall 2007, 2 First, we will see that if A is any observable that corresponds to a physical quantity that is conserved, then A commutes with M, the hermitian operator in Schr¨odinger’s equation. Let ψ be the initial state of the system, and ψ0 = U ψ = eiMt ψ be the state after an infinitesimal time interval t.\n\nSince A corresponds to a conserved physical quantity, ψ0 A ψ0 = ψ A ψ . i.e. ψ U †AU ψ = ψ A ψ .\n\nSince this equation holds for every state ψ , it follows that U †AU = A.\n\nSubstituting for U, we get\n\nLHS = e−iMt AeiMt ≈ (1 − iMt)A(1 + iMt) ≈ 1 − it[M,A] where [M,A]= MA − AM. It follows that [M,A]= 0. So any observable corresponding to a conserved quantity must commute with the operator M that describes the time evolution. Now, in addition to energy, there are situations where other physical quantities, such as or angular momentum, are also conserved. These are in a certain sense ”accidental” conservation relations — they may or may not hold. Energy however is always conserved. Hence the operator H cannot be just any operator that happens to commute with M, but must have some universal property. An intrinsic reason that H might commute with M is that H = f (M). i.e. H is some function of M. Indeed any function of M commutes with M. We now finish up by showing that if H = f (M), it must necessarily be a linear function. Consider a quantum system consisting of two subsystems that do not interact with each other. Then if M1 and M2 are the time evolution operators corresponding to each subsystem, then M1 + M2 is the time evolution operator of the system (since the two subsystems do not interact). So the total energy of the system is f (M1 + M2). On the other hand, since the two subsystems do not interact, the system hamiltonian, H = H1 + H2 = f (M1)+ f (M2). Hence f (M1 + M2)= f (M1)+ f (M2), and therefore f is a linear function f (M)= hM¯ , where h¯ is a constant. So H = hM¯ and U(t)= eiHt/h¯ . Since Ht/h¯ must be dimensionless, the constant h¯ must have units of energy x time.\n\nCS 347, Fall 2007, 3"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.875502,"math_prob":0.99660295,"size":7946,"snap":"2023-14-2023-23","text_gpt3_token_len":2188,"char_repetition_ratio":0.14140016,"word_repetition_ratio":0.022566086,"special_character_ratio":0.26428393,"punctuation_ratio":0.098108746,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9996642,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-06-10T17:37:05Z\",\"WARC-Record-ID\":\"<urn:uuid:f377abd6-c990-47e2-a2d1-074f3d946bc9>\",\"Content-Length\":\"26349\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1f3311f3-cea5-4dbe-805c-8c680060a227>\",\"WARC-Concurrent-To\":\"<urn:uuid:69fa9c89-78e5-4ea0-bf2c-8b320adb1514>\",\"WARC-IP-Address\":\"104.26.15.84\",\"WARC-Target-URI\":\"https://docslib.org/doc/2191860/1-observables-2-schr%C3%B6dingers-equation\",\"WARC-Payload-Digest\":\"sha1:XYG5ITECTRKMYELNL5HMSJ5PRLB3OKIG\",\"WARC-Block-Digest\":\"sha1:ULYY7KM34IB5FASPKC7MQFRTUBEOF2CP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-23/CC-MAIN-2023-23_segments_1685224657735.85_warc_CC-MAIN-20230610164417-20230610194417-00109.warc.gz\"}"} |
https://meangreenmath.com/2014/06/30/calculators-and-complex-numbers-part-12/ | [
"# Calculators and complex numbers (Part 12)\n\nIn this series of posts, I explore properties of complex numbers that explain some surprising answers to exponential and logarithmic problems using a calculator (see video at the bottom of this post). These posts form the basis for a sequence of lectures given to my future secondary teachers.\n\nTo begin, we recall that the trigonometric form of a complex number",
null,
"$z = a+bi$ is",
null,
"$z = r(\\cos \\theta + i \\sin \\theta)$\n\nwhere",
null,
"$r = |z| = \\sqrt{a^2 + b^2}$ and",
null,
"$\\tan \\theta = b/a$, with",
null,
"$\\theta$ in the appropriate quadrant. As noted before, this is analogous to converting from rectangular coordinates to polar coordinates.\n\nThere’s a shorthand notation for the right-hand side (",
null,
"$r e^{i \\theta}$) that I’ll justify later in this series.\n\nIn the previous post, we made the following definition for",
null,
"$z^q$ if",
null,
"$q$ is a rational number and",
null,
"$-\\pi < \\theta \\le \\pi$. (Technically, this is the definition for the principal root.)\n\nDefinition.",
null,
"$z^q = r^q (\\cos q \\theta + i \\sin q \\theta)$.\n\nAs it turns out, one of the usual Laws of Exponents remains true even if complex numbers are permitted.\n\nTheorem.",
null,
"$z^{q_1} z^{q_2} = z^{q_1 + q_2}$\n\nProof. Using the rule for multiplying complex numbers that are in trigonometric form:",
null,
"$z^{q_1} z^{q_2} = r^{q_1} (\\cos q_1 \\theta + i \\sin q_1 \\theta) \\cdot r^{q_2} (\\cos q_2\\theta + i \\sin q_2 \\theta)$",
null,
"$= r^{q_1+q_2} ( \\cos [q_1 \\theta +q_2\\theta] + i \\sin [q_1\\theta +q_2 \\theta])$",
null,
"$= r^{q_1+q_2} ( \\cos [q_1+q_2]\\theta + i \\sin [q_1+q_2] \\theta)$",
null,
"$= z^{q_1+q_2}$\n\nHowever, other Laws of Exponents no longer are true. For example, it may not be true that",
null,
"$(zw)^q$ is equal to",
null,
"$z^q w^q$. My experience is that this next example is typically presented in secondary schools at about the time that the number",
null,
"$i$ is first introduced. Let",
null,
"$z = -2$,",
null,
"$w = -3$, and",
null,
"$q = 1/2$. Then",
null,
"$\\sqrt{-2} \\cdot \\sqrt{-3} = i \\sqrt{2} i \\sqrt{3} = -\\sqrt{6} \\ne \\sqrt{6} = \\sqrt{(-2) \\cdot (-3)}$.\n\nFurthermore, the expression",
null,
"$(z^{q_1})^{q_2}$ does not have to equal",
null,
"$z^{q_1 q_2}$ if",
null,
"$z$ is complex. Let",
null,
"$z = -1$,",
null,
"$q_1 = 3$, and",
null,
"$q_2 = 1/2$. Then",
null,
"$\\left[ (-1)^3 \\right]^{1/2} = (-1)^{1/2}$",
null,
"$= [1 (\\cos \\pi + i \\sin \\pi)]^{1/2}$",
null,
"$= \\displaystyle 1^{1/2} \\left( \\cos \\frac{\\pi}{2} + i \\sin \\frac{\\pi}{2} \\right)$",
null,
"$= 1(0+1i)$",
null,
"$= i$.\n\nHowever,",
null,
"$(-1)^{3/2} = [1 (\\cos \\pi + i \\sin \\pi)]^{3/2}$",
null,
"$= \\displaystyle 1^{3/2} \\left( \\cos \\frac{3\\pi}{2} + i \\sin \\frac{3\\pi}{2} \\right)$",
null,
"$= 1(0-1i)$",
null,
"$= -i$.\n\nAll this to say, the usual Laws of Exponents that work for real exponents and positive bases don’t have to work if the base is permitted to be complex… or even negative.",
null,
"For completeness, here’s the movie that I use to engage my students when I begin this sequence of lectures.\n\n## 2 thoughts on “Calculators and complex numbers (Part 12)”\n\nThis site uses Akismet to reduce spam. Learn how your comment data is processed."
] | [
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://s0.wp.com/latex.php",
null,
"https://meangreenmath.files.wordpress.com/2013/06/green-line.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.91190374,"math_prob":1.0000004,"size":1668,"snap":"2022-27-2022-33","text_gpt3_token_len":346,"char_repetition_ratio":0.123197116,"word_repetition_ratio":0.027874565,"special_character_ratio":0.20983213,"punctuation_ratio":0.12693499,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":1.0000058,"pos_list":[0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76],"im_url_duplicate_count":[null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2022-06-25T11:41:53Z\",\"WARC-Record-ID\":\"<urn:uuid:e6043abe-074b-4900-b2c5-66a2c6745ffa>\",\"Content-Length\":\"136159\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7f74cd70-a66a-45b6-bbbf-0abcdaa2add5>\",\"WARC-Concurrent-To\":\"<urn:uuid:32faa533-de29-4187-8c1a-cd19d292775f>\",\"WARC-IP-Address\":\"192.0.78.24\",\"WARC-Target-URI\":\"https://meangreenmath.com/2014/06/30/calculators-and-complex-numbers-part-12/\",\"WARC-Payload-Digest\":\"sha1:EUCAIYL6ZN3KHJFLUSRE7C6OOZ54FRLD\",\"WARC-Block-Digest\":\"sha1:PL5XLQJSNRJLHMLV3GXDC5JCA5JMFO7T\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2022/CC-MAIN-2022-27/CC-MAIN-2022-27_segments_1656103034930.3_warc_CC-MAIN-20220625095705-20220625125705-00631.warc.gz\"}"} |
https://brainmass.com/physics/equilibrium/tension-equilibrium-and-elasticity-five-problems-11488 | [
"Explore BrainMass\nShare\n\n# Tension - Equilibrium and Elasticity: Five problems\n\nThis content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!\n\nThe graphs are attached in word document.\n\n1. The system in the picture is in equilibruim with the string in the center exactly horizontal. Find (a) tension T 1 , (b) tension T 2 (c) tension T 3 (d) angel pheta\n\n2. The system in the picture is in equilibrium. A concrete block of mass 225 kg hanfs from the end of the uniform strut whose mass is 45.0 kg. Find (a) the tension T in the cable and the (b) horizontal and (c) vertical force components on the strut from the hinge.\n\n3. For the step ladder shown in the picture. Sides AC and CE are each 2.44 m long and hinged at C. Bar BD is a tie-rod 0.762 m long , halfway up. A man weighing 854 Newtons climbs 1.80 m along the ladder assuming that the floor is frictionless and neglect ing the mass of the ladder, find (a) the tension in the tie-rod and the magnitudes of the forces on the ladder from the floor at (b) A and (c) E\n\n4. A construction worker attempts to lift a uniform beam off the floor and raise it to a vertical position. The beam is 2.5 m long and weighs 500 N. At a certain instant the worker hold the beam momentarily at rest with one end 1.5m off the floor as shown in the figure below by exerting a force vector P on the beam, perpendicular to the beam. (a) what's the magnitude of the force exerted by the worker ? (b) What is the magnitude of the (net) force of the floor on the beam? (c) What is the minimum value that the coefficient of static friction between the beam and the floor can have in order for the beam not to slip at this instant ?\n\n5. The picture shows a uniform ramp between two buildings that allows for motion between the buildings due to strong winds. At its left end it is hinged to the building wall, at its right end it has a roller that can roll along the building wall. There is no vertical force on the roller from the building, only a horizontal force with magnitude Fh . The horizontal distance between the buildings is D=4.00 m . The rise of the ramp is h= 0.490m. A man walks across the ramp from the left Picture 5-1 gives Fh as a function of horizontal distance x of the man from the building at the left. What are the masses of (a) the ramp and (b) the man ?\n\n© BrainMass Inc. brainmass.com March 21, 2019, 10:20 am ad1c9bdddf\nhttps://brainmass.com/physics/equilibrium/tension-equilibrium-and-elasticity-five-problems-11488\n\n#### Solution Preview\n\n1. There is typo, in two strings you have written T2, hence, I've considered T3 in horizontal string and T2 in the string inclined at Q (read as theta) with respect to vertical.\n\nFor whole system:\nEqulibrium in vertical direction: sum(Fv) = 0\nT1*cos(35) + T2*cos(Q) = 40+50 = 90 ....(1)\n(Here Q read as theta)\nIn horizontal direction:\nT1*\n538.516sin(35)-T2*sin(Q) = 0 ......(2)\nAt the junction of T1, T3 (horizontal st\nring) and 40 N, by sine law:\nT1/sin(90) = T3/sin(180-35) = 40/sin(90+35)\n=> T1 = T3*1.74 = 40*1.22 = 48.8\n=> T1 = 48.8 N --Answer\nT3 = 48.8/1.74 = 28.05 N (horizontal string) --Answer\nFrom equation 2:\nT2*sin(Q) = T1*sin(35) = 48.8*0.574 = 28.01 ....(3)\nFrom ...\n\n#### Solution Summary\n\nThe detailed explanations and calculations solve the problems.\n\n\\$2.19"
] | [
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.89894795,"math_prob":0.9784786,"size":3260,"snap":"2019-13-2019-22","text_gpt3_token_len":916,"char_repetition_ratio":0.1286855,"word_repetition_ratio":0.010169491,"special_character_ratio":0.296319,"punctuation_ratio":0.12760055,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9947634,"pos_list":[0],"im_url_duplicate_count":[null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2019-05-24T13:03:45Z\",\"WARC-Record-ID\":\"<urn:uuid:e236d5b0-b98b-4e60-bc82-67d7d9779993>\",\"Content-Length\":\"106798\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:e85dbca3-d98a-49aa-890f-ccf3732af674>\",\"WARC-Concurrent-To\":\"<urn:uuid:1bdcab2c-0557-476d-b683-c6e0c9d57086>\",\"WARC-IP-Address\":\"65.39.198.123\",\"WARC-Target-URI\":\"https://brainmass.com/physics/equilibrium/tension-equilibrium-and-elasticity-five-problems-11488\",\"WARC-Payload-Digest\":\"sha1:RN47OWNWHUSREGAEGWQIPA6CEND4WLZS\",\"WARC-Block-Digest\":\"sha1:3ADZPLPBRUG57YHFTIVULAURZJL65EDP\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2019/CC-MAIN-2019-22/CC-MAIN-2019-22_segments_1558232257624.9_warc_CC-MAIN-20190524124534-20190524150534-00177.warc.gz\"}"} |
https://chem.libretexts.org/Bookshelves/Physical_and_Theoretical_Chemistry_Textbook_Maps/DeVoes_Thermodynamics_and_Chemistry/11%3A_Reactions_and_Other_Chemical_Processes/11.09%3A_Effects_of_Temperature_and_Pressure_on_Equilibrium_Position | [
"# 11.9: Effects of Temperature and Pressure on Equilibrium Position\n\n•",
null,
"• Howard DeVoe\n• University of Maryland\n$$\\newcommand{\\vecs}{\\overset { \\rightharpoonup} {\\mathbf{#1}} }$$ $$\\newcommand{\\vecd}{\\overset{-\\!-\\!\\rightharpoonup}{\\vphantom{a}\\smash {#1}}}$$$$\\newcommand{\\id}{\\mathrm{id}}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$ $$\\newcommand{\\kernel}{\\mathrm{null}\\,}$$ $$\\newcommand{\\range}{\\mathrm{range}\\,}$$ $$\\newcommand{\\RealPart}{\\mathrm{Re}}$$ $$\\newcommand{\\ImaginaryPart}{\\mathrm{Im}}$$ $$\\newcommand{\\Argument}{\\mathrm{Arg}}$$ $$\\newcommand{\\norm}{\\| #1 \\|}$$ $$\\newcommand{\\inner}{\\langle #1, #2 \\rangle}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$ $$\\newcommand{\\id}{\\mathrm{id}}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$ $$\\newcommand{\\kernel}{\\mathrm{null}\\,}$$ $$\\newcommand{\\range}{\\mathrm{range}\\,}$$ $$\\newcommand{\\RealPart}{\\mathrm{Re}}$$ $$\\newcommand{\\ImaginaryPart}{\\mathrm{Im}}$$ $$\\newcommand{\\Argument}{\\mathrm{Arg}}$$ $$\\newcommand{\\norm}{\\| #1 \\|}$$ $$\\newcommand{\\inner}{\\langle #1, #2 \\rangle}$$ $$\\newcommand{\\Span}{\\mathrm{span}}$$$$\\newcommand{\\AA}{\\unicode[.8,0]{x212B}}$$\n\n$$\\newcommand{\\tx}{\\text{#1}} % text in math mode$$\n$$\\newcommand{\\subs}{_{\\text{#1}}} % subscript text$$\n$$\\newcommand{\\sups}{^{\\text{#1}}} % superscript text$$\n$$\\newcommand{\\st}{^\\circ} % standard state symbol$$\n$$\\newcommand{\\id}{^{\\text{id}}} % ideal$$\n$$\\newcommand{\\rf}{^{\\text{ref}}} % reference state$$\n$$\\newcommand{\\units}{\\mbox{\\thinspace#1}}$$\n$$\\newcommand{\\K}{\\units{K}} % kelvins$$\n$$\\newcommand{\\degC}{^\\circ\\text{C}} % degrees Celsius$$\n$$\\newcommand{\\br}{\\units{bar}} % bar (\\bar is already defined)$$\n$$\\newcommand{\\Pa}{\\units{Pa}}$$\n$$\\newcommand{\\mol}{\\units{mol}} % mole$$\n$$\\newcommand{\\V}{\\units{V}} % volts$$\n$$\\newcommand{\\timesten}{\\mbox{\\,\\times\\,10^{#1}}}$$\n$$\\newcommand{\\per}{^{-1}} % minus one power$$\n$$\\newcommand{\\m}{_{\\text{m}}} % subscript m for molar quantity$$\n$$\\newcommand{\\CVm}{C_{V,\\text{m}}} % molar heat capacity at const.V$$\n$$\\newcommand{\\Cpm}{C_{p,\\text{m}}} % molar heat capacity at const.p$$\n$$\\newcommand{\\kT}{\\kappa_T} % isothermal compressibility$$\n$$\\newcommand{\\A}{_{\\text{A}}} % subscript A for solvent or state A$$\n$$\\newcommand{\\B}{_{\\text{B}}} % subscript B for solute or state B$$\n$$\\newcommand{\\bd}{_{\\text{b}}} % subscript b for boundary or boiling point$$\n$$\\newcommand{\\C}{_{\\text{C}}} % subscript C$$\n$$\\newcommand{\\f}{_{\\text{f}}} % subscript f for freezing point$$\n$$\\newcommand{\\mA}{_{\\text{m},\\text{A}}} % subscript m,A (m=molar)$$\n$$\\newcommand{\\mB}{_{\\text{m},\\text{B}}} % subscript m,B (m=molar)$$\n$$\\newcommand{\\mi}{_{\\text{m},i}} % subscript m,i (m=molar)$$\n$$\\newcommand{\\fA}{_{\\text{f},\\text{A}}} % subscript f,A (for fr. pt.)$$\n$$\\newcommand{\\fB}{_{\\text{f},\\text{B}}} % subscript f,B (for fr. pt.)$$\n$$\\newcommand{\\xbB}{_{x,\\text{B}}} % x basis, B$$\n$$\\newcommand{\\xbC}{_{x,\\text{C}}} % x basis, C$$\n$$\\newcommand{\\cbB}{_{c,\\text{B}}} % c basis, B$$\n$$\\newcommand{\\mbB}{_{m,\\text{B}}} % m basis, B$$\n$$\\newcommand{\\kHi}{k_{\\text{H},i}} % Henry's law constant, x basis, i$$\n$$\\newcommand{\\kHB}{k_{\\text{H,B}}} % Henry's law constant, x basis, B$$\n$$\\newcommand{\\arrow}{\\,\\rightarrow\\,} % right arrow with extra spaces$$\n$$\\newcommand{\\arrows}{\\,\\rightleftharpoons\\,} % double arrows with extra spaces$$\n$$\\newcommand{\\ra}{\\rightarrow} % right arrow (can be used in text mode)$$\n$$\\newcommand{\\eq}{\\subs{eq}} % equilibrium state$$\n$$\\newcommand{\\onehalf}{\\textstyle\\frac{1}{2}\\D} % small 1/2 for display equation$$\n$$\\newcommand{\\sys}{\\subs{sys}} % system property$$\n$$\\newcommand{\\sur}{\\sups{sur}} % surroundings$$\n$$\\renewcommand{\\in}{\\sups{int}} % internal$$\n$$\\newcommand{\\lab}{\\subs{lab}} % lab frame$$\n$$\\newcommand{\\cm}{\\subs{cm}} % center of mass$$\n$$\\newcommand{\\rev}{\\subs{rev}} % reversible$$\n$$\\newcommand{\\irr}{\\subs{irr}} % irreversible$$\n$$\\newcommand{\\fric}{\\subs{fric}} % friction$$\n$$\\newcommand{\\diss}{\\subs{diss}} % dissipation$$\n$$\\newcommand{\\el}{\\subs{el}} % electrical$$\n$$\\newcommand{\\cell}{\\subs{cell}} % cell$$\n$$\\newcommand{\\As}{A\\subs{s}} % surface area$$\n$$\\newcommand{\\E}{^\\mathsf{E}} % excess quantity (superscript)$$\n$$\\newcommand{\\allni}{\\{n_i \\}} % set of all n_i$$\n$$\\newcommand{\\sol}{\\hspace{-.1em}\\tx{(sol)}}$$\n$$\\newcommand{\\solmB}{\\tx{(sol,\\,m\\B)}}$$\n$$\\newcommand{\\dil}{\\tx{(dil)}}$$\n$$\\newcommand{\\sln}{\\tx{(sln)}}$$\n$$\\newcommand{\\mix}{\\tx{(mix)}}$$\n$$\\newcommand{\\rxn}{\\tx{(rxn)}}$$\n$$\\newcommand{\\expt}{\\tx{(expt)}}$$\n$$\\newcommand{\\solid}{\\tx{(s)}}$$\n$$\\newcommand{\\liquid}{\\tx{(l)}}$$\n$$\\newcommand{\\gas}{\\tx{(g)}}$$\n$$\\newcommand{\\pha}{\\alpha} % phase alpha$$\n$$\\newcommand{\\phb}{\\beta} % phase beta$$\n$$\\newcommand{\\phg}{\\gamma} % phase gamma$$\n$$\\newcommand{\\aph}{^{\\alpha}} % alpha phase superscript$$\n$$\\newcommand{\\bph}{^{\\beta}} % beta phase superscript$$\n$$\\newcommand{\\gph}{^{\\gamma}} % gamma phase superscript$$\n$$\\newcommand{\\aphp}{^{\\alpha'}} % alpha prime phase superscript$$\n$$\\newcommand{\\bphp}{^{\\beta'}} % beta prime phase superscript$$\n$$\\newcommand{\\gphp}{^{\\gamma'}} % gamma prime phase superscript$$\n$$\\newcommand{\\apht}{\\small\\aph} % alpha phase tiny superscript$$\n$$\\newcommand{\\bpht}{\\small\\bph} % beta phase tiny superscript$$\n$$\\newcommand{\\gpht}{\\small\\gph} % gamma phase tiny superscript$$\n\n$$\\newcommand{\\upOmega}{\\Omega}$$\n\n$$\\newcommand{\\dif}{\\mathop{}\\!\\mathrm{d}} % roman d in math mode, preceded by space$$\n$$\\newcommand{\\Dif}{\\mathop{}\\!\\mathrm{D}} % roman D in math mode, preceded by space$$\n$$\\newcommand{\\df}{\\dif\\hspace{0.05em} f} % df$$\n\n$$\\newcommand{\\dBar}{\\mathop{}\\!\\mathrm{d}\\hspace-.3em\\raise1.05ex{\\Rule{.8ex}{.125ex}{0ex}}} % inexact differential$$\n$$\\newcommand{\\dq}{\\dBar q} % heat differential$$\n$$\\newcommand{\\dw}{\\dBar w} % work differential$$\n$$\\newcommand{\\dQ}{\\dBar Q} % infinitesimal charge$$\n$$\\newcommand{\\dx}{\\dif\\hspace{0.05em} x} % dx$$\n$$\\newcommand{\\dt}{\\dif\\hspace{0.05em} t} % dt$$\n$$\\newcommand{\\difp}{\\dif\\hspace{0.05em} p} % dp$$\n$$\\newcommand{\\Del}{\\Delta}$$\n$$\\newcommand{\\Delsub}{\\Delta_{\\text{#1}}}$$\n$$\\newcommand{\\pd}{(\\partial #1 / \\partial #2 )_{#3}} % \\pd{}{}{} - partial derivative, one line$$\n$$\\newcommand{\\Pd}{\\left( \\dfrac {\\partial #1} {\\partial #2}\\right)_{#3}} % Pd{}{}{} - Partial derivative, built-up$$\n$$\\newcommand{\\bpd}{[ \\partial #1 / \\partial #2 ]_{#3}}$$\n$$\\newcommand{\\bPd}{\\left[ \\dfrac {\\partial #1} {\\partial #2}\\right]_{#3}}$$\n$$\\newcommand{\\dotprod}{\\small\\bullet}$$\n$$\\newcommand{\\fug}{f} % fugacity$$\n$$\\newcommand{\\g}{\\gamma} % solute activity coefficient, or gamma in general$$\n$$\\newcommand{\\G}{\\varGamma} % activity coefficient of a reference state (pressure factor)$$\n$$\\newcommand{\\ecp}{\\widetilde{\\mu}} % electrochemical or total potential$$\n$$\\newcommand{\\Eeq}{E\\subs{cell, eq}} % equilibrium cell potential$$\n$$\\newcommand{\\Ej}{E\\subs{j}} % liquid junction potential$$\n$$\\newcommand{\\mue}{\\mu\\subs{e}} % electron chemical potential$$\n$$\\newcommand{\\defn}{\\,\\stackrel{\\mathrm{def}}{=}\\,} % \"equal by definition\" symbol$$\n\n$$\\newcommand{\\D}{\\displaystyle} % for a line in built-up$$\n$$\\newcommand{\\s}{\\smash[b]} % use in equations with conditions of validity$$\n$$\\newcommand{\\cond}{\\\\[-2.5pt]{}\\tag*{#1}}$$\n$$\\newcommand{\\nextcond}{\\\\[-5pt]{}\\tag*{#1}}$$\n$$\\newcommand{\\R}{8.3145\\units{J\\,K\\per\\,mol\\per}} % gas constant value$$\n$$\\newcommand{\\Rsix}{8.31447\\units{J\\,K\\per\\,mol\\per}} % gas constant value - 6 sig figs$$\n\n$$\\newcommand{\\jn}{\\hspace3pt\\lower.3ex{\\Rule{.6pt}{2ex}{0ex}}\\hspace3pt}$$\n$$\\newcommand{\\ljn}{\\hspace3pt\\lower.3ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace-.6pt\\raise.45ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace-.6pt\\raise1.2ex{\\Rule{.6pt}{.5ex}{0ex}} \\hspace3pt}$$\n$$\\newcommand{\\lljn}{\\hspace3pt\\lower.3ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace-.6pt\\raise.45ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace-.6pt\\raise1.2ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace1.4pt\\lower.3ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace-.6pt\\raise.45ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace-.6pt\\raise1.2ex{\\Rule{.6pt}{.5ex}{0ex}}\\hspace3pt}$$\n\nThe advancement $$\\xi$$ of a chemical reaction in a closed system describes the changes in the amounts of the reactants and products from specified initial values of these amounts. We have seen that if the system is maintained at constant temperature and pressure, $$\\xi$$ changes spontaneously in the direction that decreases the Gibbs energy. The change continues until the system reaches a state of reaction equilibrium at the minimum of $$G$$. The value of the advancement in this equilibrium state will be denoted $$\\xi\\eq$$, as shown in Fig. 11.15. The value of $$\\xi\\eq$$ depends in general on the values of $$T$$ and $$p$$. Thus when we change the temperature or pressure of a closed system that is at equilibrium, $$\\xi\\eq$$ usually changes also and the reaction spontaneously shifts to a new equilibrium position.\n\nTo investigate this effect, we write the total differential of $$G$$ with $$T$$, $$p$$, and $$\\xi$$ as independent variables \\begin{equation} \\dif G = -S\\dif T + V\\difp + \\Delsub{r}G\\dif\\xi \\tag{11.9.1} \\end{equation} and obtain the reciprocity relations \\begin{equation} \\Pd{\\Delsub{r}G}{T}{p, \\xi} = -\\Pd{S}{\\xi}{T,p} \\qquad \\Pd{\\Delsub{r}G}{p}{T, \\xi} = \\Pd{V}{\\xi}{T,p} \\tag{11.9.2} \\end{equation} We recognize the partial derivative on the right side of each of these relations as a molar differential reaction quantity: \\begin{equation} \\Pd{\\Delsub{r}G}{T}{p, \\xi} = -\\Delsub{r}S \\qquad \\Pd{\\Delsub{r}G}{p}{T, \\xi} = \\Delsub{r}V \\tag{11.9.3} \\end{equation} We use these expressions for two of the coefficients in an expression for the total differential of $$\\Delsub{r}G$$: \\begin{gather} \\s{ \\dif\\Delsub{r}G = -\\Delsub{r}S\\dif T + \\Delsub{r}V\\difp + \\Pd{\\Delsub{r}G}{\\xi}{T,p}\\dif\\xi } \\tag{11.9.4} \\cond{(closed system)} \\end{gather} Since $$\\Delsub{r}G$$ is the partial derivative of $$G$$ with respect to $$\\xi$$ at constant $$T$$ and $$p$$, the coefficient $$\\pd{\\Delsub{r}G}{\\xi}{T,p}$$ is the partial second derivative of $$G$$ with respect to $$\\xi$$: \\begin{equation} \\Pd{\\Delsub{r}G}{\\xi}{T,p} = \\Pd{^2 G}{\\xi^2}{T,p} \\tag{11.9.5} \\end{equation} We know that at a fixed $$T$$ and $$p$$, a plot of $$G$$ versus $$\\xi$$ has a slope at each point equal to $$\\Delsub{r}G$$ and a minimum at the position of reaction equilibrium where $$\\xi$$ is $$\\xi\\eq$$. At the minimum of the plotted curve, the slope $$\\Delsub{r}G$$ is zero and the second derivative is positive (see Fig. 11.15). By setting $$\\Delsub{r}G$$ equal to zero in the general relation $$\\Delsub{r}G = \\Delsub{r}H - T\\Delsub{r}S$$, we obtain the equation $$\\Delsub{r}S = \\Delsub{r}H/T$$ which is valid only at reaction equilibrium where $$\\xi$$ equals $$\\xi\\eq$$. Making this substitution in Eq. 11.9.4, and setting $$\\dif\\Delsub{r}G$$ equal to zero and $$\\dif\\xi$$ equal to $$\\dif\\xi\\eq$$, we obtain \\begin{gather} \\s{ 0 = -\\frac{\\Delsub{r}H}{T}\\dif T + \\Delsub{r}V\\difp + \\Pd{^2 G}{\\xi^2}{T,p}\\dif\\xi\\eq } \\tag{11.9.6} \\cond{(closed system)} \\end{gather} which shows how infinitesimal changes in $$T$$, $$p$$, and $$\\xi\\eq$$ are related.\n\nNow we are ready to see how $$\\xi\\eq$$ is affected by changes in $$T$$ or $$p$$. Solving Eq. 11.9.6 for $$\\dif\\xi\\eq$$ gives \\begin{gather} \\s{ \\dif\\xi\\eq = \\frac{\\displaystyle \\frac{\\Delsub{r}H}{T}\\dif T - \\Delsub{r}V\\difp} { \\Pd{^2 G}{\\xi^2}{T,p}} } \\tag{11.9.7} \\cond{(closed system)} \\nextcond{} \\end{gather}\n\nThe right side of Eq. 11.9.7 is the expression for the total differential of $$\\xi$$ in a closed system at reaction equilibrium, with $$T$$ and $$p$$ as the independent variables. Thus, at constant pressure the equilibrium shifts with temperature according to \\begin{gather} \\s{ \\Pd{\\xi\\eq}{T}{p} = \\frac{\\Delsub{r}H} { T\\Pd{^2 G}{\\xi^2}{T,p}} } \\tag{11.9.8} \\cond{(closed system)} \\nextcond{} \\end{gather}\n\nand at constant temperature the equilibrium shifts with pressure according to \\begin{gather} \\s{ \\Pd{\\xi\\eq}{p}{T} = - \\frac{\\Delsub{r}V} { \\Pd{^2 G}{\\xi^2}{T,p}} } \\tag{11.9.9} \\cond{(closed system)} \\nextcond{} \\end{gather}\n\nBecause the partial second derivative $$\\pd{^2G}{\\xi^2}{T,p}$$ is positive, Eqs. 11.9.8 and 11.9.9 show that $$\\pd{\\xi\\eq}{T}{p}$$ and $$\\Delsub{r}H$$ have the same sign, whereas $$\\pd{\\xi\\eq}{p}{T}$$ and $$\\Delsub{r}V$$ have opposite signs.\n\nThese statements express the application to temperature and pressure changes of what is known as Le Chatelier’s principle: When a change is made to a closed system at equilibrium, the equilibrium shifts in the direction that tends to oppose the change. Here are two examples.\n\n1. It is easy to misuse or to be misled by Le Chatelier’s principle. Consider the solution process B$$^*$$(s)$$\\arrow$$B(sln) for which $$\\pd{\\xi\\eq}{T}{p}$$, the rate of change of solubility with $$T$$, has the same sign as the molar differential enthalpy of solution $$\\Delsub{sol}H$$ at saturation. The sign of $$\\Delsub{sol}H$$ at saturation may be different from the sign of the molar integral enthalpy of solution, $$\\Del H\\m\\sol$$. This is the situation for the dissolution of sodium acetate shown in Fig. 11.9. The equilibrium position (saturation) with one kilogram of water is at $$\\xi\\subs{sol} \\approx 15\\mol$$, indicated in the figure by an open circle. At this position, $$\\Delsub{sol}H$$ is positive and $$\\Del H\\m\\sol$$ is negative. So, despite the fact that the dissolution of 15 moles of sodium acetate in one kilogram of water to form a saturated solution is an exothermic process, the solubility of sodium acetate actually increases with increasing temperature, contrary to what one might predict from Le Chatelier’s principle (L. K. Brice, J. Chem. Educ., 60, 387–389, 1983).\n\nAnother kind of change for which Le Chatelier’s principle gives an incorrect prediction is the addition of an inert gas to a gas mixture of constant volume. Adding the inert gas at constant $$V$$ increases the pressure, but has little effect on the equilibrium position of a gas-phase reaction regardless of the value of $$\\Delsub{r}V$$. This is because the inert gas affects the activities of the reactants and products only slightly, and not at all if the gas mixture is ideal, so there is little or no effect on the value of $$Q\\subs{rxn}$$. (Note that the dependence of $$\\xi\\eq$$ on $$p$$ expressed by Eq. 11.9.9 does not apply to an open system.)\n\nThis page titled 11.9: Effects of Temperature and Pressure on Equilibrium Position is shared under a CC BY 4.0 license and was authored, remixed, and/or curated by Howard DeVoe via source content that was edited to the style and standards of the LibreTexts platform; a detailed edit history is available upon request."
] | [
null,
"https://biz.libretexts.org/@api/deki/files/5084/girl-160172__340.png",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.5970951,"math_prob":0.99994457,"size":13315,"snap":"2023-40-2023-50","text_gpt3_token_len":4636,"char_repetition_ratio":0.21553603,"word_repetition_ratio":0.014230272,"special_character_ratio":0.360721,"punctuation_ratio":0.09922347,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9998248,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2023-12-11T03:10:16Z\",\"WARC-Record-ID\":\"<urn:uuid:baf2a2ab-3768-482a-a0db-8e2f3a6aec2f>\",\"Content-Length\":\"137120\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:7eab62d1-1ee1-4677-b277-835b185e3593>\",\"WARC-Concurrent-To\":\"<urn:uuid:45e9eac0-c3a4-46d7-837a-cf933bdd8040>\",\"WARC-IP-Address\":\"3.162.103.5\",\"WARC-Target-URI\":\"https://chem.libretexts.org/Bookshelves/Physical_and_Theoretical_Chemistry_Textbook_Maps/DeVoes_Thermodynamics_and_Chemistry/11%3A_Reactions_and_Other_Chemical_Processes/11.09%3A_Effects_of_Temperature_and_Pressure_on_Equilibrium_Position\",\"WARC-Payload-Digest\":\"sha1:LYGDIFRI5A4QDOGGHGDAWR3UJDWX7HFU\",\"WARC-Block-Digest\":\"sha1:AF5MASX5LKNYWOU4SPJVO2V6GQDFNFTT\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2023/CC-MAIN-2023-50/CC-MAIN-2023-50_segments_1700679103464.86_warc_CC-MAIN-20231211013452-20231211043452-00013.warc.gz\"}"} |
http://oeis.org/A006071 | [
"The OEIS Foundation is supported by donations from users of the OEIS and by a grant from the Simons Foundation.",
null,
"Hints (Greetings from The On-Line Encyclopedia of Integer Sequences!)\n A006071 Maximal length of rook tour on an n X n board. (Formerly M3474) 7\n 1, 4, 14, 38, 76, 136, 218, 330, 472, 652, 870, 1134, 1444, 1808, 2226, 2706, 3248, 3860, 4542, 5302, 6140, 7064, 8074, 9178, 10376, 11676, 13078, 14590, 16212, 17952, 19810, 21794, 23904, 26148, 28526, 31046, 33708, 36520, 39482, 42602 (list; graph; refs; listen; history; text; internal format)\n OFFSET 1,2 REFERENCES M. Gardner, Knotted Doughnuts and Other Mathematical Entertainments. Freeman, NY, 1986, p. 76. N. J. A. Sloane and Simon Plouffe, The Encyclopedia of Integer Sequences, Academic Press, 1995 (includes this sequence). LINKS Simon Plouffe, Approximations de séries génératrices et quelques conjectures, Dissertation, Université du Québec à Montréal, 1992. Simon Plouffe, 1031 Generating Functions, Appendix to Thesis, Montreal, 1992 FORMULA From R. J. Mathar, Mar 22 2009: (Start) The sequence is a hybrid of two sequences at the even and odd indices with linear recurrences individually, therefore a linear recurrence in total. For even n the Gardner reference gives the formula a(n)=n(2n^2-5)/3+2, which is 4,38,136,330,652,1134,1808,2706,3860,5302, n=2,4,6,8,... with recurrence a(n)= 4 a(n-1) -6 a(n-2) +4 a(n-3) - a(n-4) and therefore with g.f. -2*(-2-11*x-4*x^2+x^3)/(x-1)^4 (offset 0) (see A152110). For n odd the Gardner reference gives a(n)= n(2n^2-5)/3+1, which is 0,14,76,218,472,870,1444,2226,3248,4542,6140,8074,10376,13078, n=1,3,5,7,... with the same recurrence and with g.f. -2*x*(-7-10*x+x^2)/(x-1)^4 (offset 0). Since the first zero does not match the sequence and should be 1, we add 1 to the g.f.: 1,14,76,218,472,870,1444,2226,3248,4542,6140,8074,10376,13078,... (see A152100), g.f.: 1-2*x*(-7-10*x+x^2)/(x-1)^4. We \"aerate\" both sequences by insertion of zeros at each second position, which implies x->x^2 in the generating functions, 4,0,38,0,136,0,330,0,652,0,1134,0,1808,0,2706,0,3860,0,5302 g.f. -2*(-2-11*x^2-4*x^4+x^6)/(x^2-1)^4 (offset 0). 1,0,14,0,76,0,218,0,472,0,870,0,1444,0,2226,0,3248,0,4542,0,6140,... g.f. 1-2*x^2*(-7-10*x^2+x^4)/(x^2-1)^4. The first of these is multiplied by x to shift it right by one place: 0,4,0,38,0,136,0,330,0,652,0,1134,0,1808,0,2706,0,3860,0,5302 g.f. -2*x*(-2-11*x^2-4*x^4+x^6)/(x^2-1)^4. The sum of these two is 1-2*x^2*(-7-10*x^2+x^4)/(x^2-1)^4 -2*x*(-2-11*x^2-4*x^4+x^6)/(x^2-1)^4 = (x^5-5x^4+6x^3+4x^2+x+1)/((x-1)^4/(x+1)). This is exactly the Plouffe g.f. if the offset were 0. In summary: a(n)= 3 a(n-1) -2 a(n-2) -2 a(n-3) +3 a(n-4) - a(n-5), n > 6. a(2n)= 2+2*n*(8n^2-5)/3, n>=1. a(2n+1)= 2n(1+8n^2+12n)/3, n>=1. G.f.: x*(x^5-5x^4+6x^3+4x^2+x+1)/((x-1)^4/(x+1)). (End) MAPLE A006071:=(1+z+4*z**2+6*z**3-5*z**4+z**5)/(z+1)/(z-1)**4; # conjectured (correctly) by Simon Plouffe in his 1992 dissertation CROSSREFS Cf. A152100, A152110, A152132-A152135. Sequence in context: A187428 A316878 A036368 * A086954 A111583 A124615 Adjacent sequences: A006068 A006069 A006070 * A006072 A006073 A006074 KEYWORD nonn,walk AUTHOR EXTENSIONS Edited (with more terms) by R. J. Mathar, Mar 22 2009 STATUS approved\n\nLookup | Welcome | Wiki | Register | Music | Plot 2 | Demos | Index | Browse | More | WebCam\nContribute new seq. or comment | Format | Style Sheet | Transforms | Superseeker | Recent\nThe OEIS Community | Maintained by The OEIS Foundation Inc.\n\nLast modified April 17 22:19 EDT 2021. Contains 343071 sequences. (Running on oeis4.)"
] | [
null,
"http://oeis.org/banner2021.jpg",
null
] | {"ft_lang_label":"__label__en","ft_lang_prob":0.72176456,"math_prob":0.99604195,"size":1814,"snap":"2021-04-2021-17","text_gpt3_token_len":893,"char_repetition_ratio":0.09558011,"word_repetition_ratio":0.0,"special_character_ratio":0.6080485,"punctuation_ratio":0.25421134,"nsfw_num_words":0,"has_unicode_error":false,"math_prob_llama3":0.9948765,"pos_list":[0,1,2],"im_url_duplicate_count":[null,null,null],"WARC_HEADER":"{\"WARC-Type\":\"response\",\"WARC-Date\":\"2021-04-18T02:26:25Z\",\"WARC-Record-ID\":\"<urn:uuid:07ac672f-b219-4340-a794-11528f4fea38>\",\"Content-Length\":\"22145\",\"Content-Type\":\"application/http; msgtype=response\",\"WARC-Warcinfo-ID\":\"<urn:uuid:1437d499-6545-4ed9-8e93-54e39670d34a>\",\"WARC-Concurrent-To\":\"<urn:uuid:67fe1add-a02e-43cc-b1e6-d984fa929e60>\",\"WARC-IP-Address\":\"104.239.138.29\",\"WARC-Target-URI\":\"http://oeis.org/A006071\",\"WARC-Payload-Digest\":\"sha1:5EY2K22QJW67N2LF5KXWYQ6W77AKGBIN\",\"WARC-Block-Digest\":\"sha1:IVSP7XYIG2473ETJAWRP32H7FM4HOMDI\",\"WARC-Identified-Payload-Type\":\"text/html\",\"warc_filename\":\"/cc_download/warc_2021/CC-MAIN-2021-17/CC-MAIN-2021-17_segments_1618038464146.56_warc_CC-MAIN-20210418013444-20210418043444-00109.warc.gz\"}"} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.